arxiv_id
stringlengths
11
13
markdown
stringlengths
2.09k
423k
paper_doi
stringlengths
13
47
paper_authors
listlengths
1
1.37k
paper_published_date
stringdate
2014-06-03 15:22:49
2024-08-02 17:59:51
paper_updated_date
stringdate
2014-06-03 15:22:49
2025-04-29 20:34:17
categories
listlengths
1
7
title
stringlengths
15
236
summary
stringlengths
57
2.54k
1408.1101v1
## Semi-holographic model including the radiation component Sergio del Campo, 1, ∗ V´ ıctor H. C´ ardenas, 2, 3, † Juan Maga˜ na, 2, 3, ‡ and J. R. Villanueva 2, 3, § 1 Instituto de F´ ısica, Pontificia Universidad Cat´lica o de Valpara´ ıso, Av. Universidad 330, Curauma, Valpara´ ıso, Chile, 2 Instituto de F´ ısica y Astronom´ ıa, Universidad de Valpara´ ıso, Gran Breta˜a 1111, Valpara´ ıso, Chile, n 3 Centro de Astrof´ ısica de Valpara´ ıso, Gran Breta˜a 1111, Playa Ancha, n Valpara´ ıso, Chile. (Dated: August 7, 2014) In this letter we study the semi holographic model which corresponds to the radiative version of the model proposed by Zhang et al. (Phys. Lett. B 694 (2010), 177) and revisited by C´ ardenas et al. (Mon. Not. Roy. Astron. Soc. 438 (2014), 3603). This inclusion makes the model more realistic, so allows us to test it with current observational data and then answer if the inconsistency reported by C´rdenas et al. is relaxed. a PACS numbers: At the moment we may say that the physical nature of the dark sector of the universe still remains as a mystery in spite of the efforts to consistently explain the observations coming from supernovae of type Ia (SNIa)[1], large scale structure (LSS)[2], cosmic microwave background (CMB)[3], the integrated Sachs-Wolfe effect (ISW)[4], baryonic acoustic oscillations (BAO)[5] and gravitational lensing [6]. One of the preferred cosmological model is the so-called λ -cold-dark-matter ( λCDM ). Although it fits quite well most of the observational data, it suffers from two main problems, namely: the low value of the vacuum energy (about 120 magnitude orders below the quantum field theory estimation)[7] and the so-called coincidence problem[8, 9]. In order to solve these problems it has been evoked to quintessence kind of models, where the cosmological constant is substituted for a slowly-varying, spatially inhomogeneous component with a negative equation of state[10]. In this context, it is assumed a dynamical cosmological constant, that leads to a dynamical dark energy model, where a scalar field plays a central role (e.g., K-essence [11], tachyon fields [12], etc.). Also, due to both dark components are characterized through their gravitational effects, it is natural to consider unified models of the cosmological substratum in which one single ∗ Electronic address: [email protected] † Electronic address: [email protected] ‡ Electronic address: [email protected] § Electronic address: [email protected] component plays the role of DM and DE simultaneously. Examples of this type of models are the Chaplygin gas [13-16], and bulk-viscous models [17]. Among the scenarios that are based on a dynamical cosmological constant we distinguish the holographic models[18, 19]. These models are achieved from the context of fundamental principle of quantum gravitational physics, so called holographic principle. This principle arose due to development in the study of black hole physics together with superstring theories. Specifically, it is derived with the help of entropy-area relation of thermodynamics of black hole horizons in general relativity, which is also known as the Bekenstein-Hawking entropy bound, i.e., S /similarequal µ L 2 2 , where S is the maximum entropy of the system of length L and µ = 1 / √ 8 π G is the reduced Planck mass. Using this idea Cohen [20] suggested a relation between the short distance (ultraviolet, UV) cutoff and the long distance (infrared, IR) cutoff which, after identifying infrared with the Hubble radius H -1 , resulted in a DE density very close to the observed critical energy density. After this, Li [21] studied the use of both the particle and event horizons as the IR cutoff length. He found that apparently only a future event horizon cutoff can give a viable DE model. More recently, it was proposed a new cutoff scale, given by the Ricci scalar curvature [22], resulting in the so-called holographic Ricci DE models[23, 24]. Apart of the models described above, it was proposed a model in which the dark energy sector obeys strictly the holographic principle[25]. In this scenario it was found that stable solutions exist that ameliorate the coincidence problem, but out of an accelerated expansion[26] why add radiation. In a preliminary study of this model [27] we showed that is not necessary to add explicitly a cosmological constant to get an accelerated expansion, and also we showed that this model can fit well the supernovae data. However, because we were interested in the low redshift transition from a decelerated phase to the accelerated one, we only tested the performance of the data to fit low redshift data. In this letter we intend to study this sort of model, but where the radiation component is taken into account. After of doing an analytical study we proceed to check the model with recent observational data. After reheating has occurred at the end of the inflationary period, the universe evolves homogeneously and isotropically in an adiabatical way. In a appropriated comoving volume V , expressed by the physical volume V = 4 3 πa 3 where a denotes the scale factor, the first law of thermodynamics for a spatially flat space reads $$d U + p d V = T d S,$$ where U = 4 3 πρa 3 represents the energy in this volume with ρ the energy density, T denotes the temperature, S represents the entropy and p the pressure of the related fluid. Following Ref. [28, 29], it is possible to write the entropy S associated to the apparent horizon in a comoving volume as [25] $$S _ { c } = \frac { 8 \pi ^ { 2 } \mu ^ { 2 } } { H ^ { 2 } } \frac { a ^ { 3 } } { H ^ { - 3 } } = 8 \pi ^ { 2 } \mu ^ { 2 } H a ^ { 3 },$$ where H ≡ ˙ a a is the Hubble parameter. The semi holographic model emerges by assuming that the dark energy component satisfies a similar relationship $$S _ { d e } = 8 \pi ^ { 2 } \mu ^ { 2 } H a ^ { 3 }.$$ Since we have assumed that the expansion of the universe evolves adiabatically, the dark matter entropy contribution reads $$S _ { d m } = C - S _ { d e },$$ where C is a constant representing the total entropy of the comoving volume. Friedmann equation gives us an expression which relate the Hubble parameter, H , with the corresponding energy densities (or equivalently, the entropies via expressions (2) and (3)), as $$H ^ { 2 } = \frac { 1 } { 3 \mu ^ { 2 } } ( \rho _ { d m } + \rho _ { d e } + \rho _ { r } ),$$ where ρ dm denotes the energy density associated to dark matter, ρ de denotes the energy density for the dark energy component, and ρ r denotes the energy density related to the radiation component. We believe that the inclusion in the model of this latter component is necessary in order to make the model more realistic, and thus compares it with other models that have been put forward in the literature. On the other hand, the holographic principle requires that the temperature is related to the Hubble function as [29] $$T = \frac { H } { 2 \pi }.$$ This latter expression is well known for de Sitter spaces. We can get the dark energy evolution equation by combining equations (6), (5), and (3), with the first law, (1) $$\frac { 2 } { 3 } \rho _ { d e } ^ { \prime } & = \rho _ { d m } ( 1 - \omega _ { d m } ) - \rho _ { d e } ( 1 + 3 \omega _ { d e } ) + \frac { 2 } { 3 } \rho _ { r },$$ where a prime means ′ = d/d log a , ω dm indicates the equation of state (EoS) parameter associated to the dark matter, and ω de represents the EoS parameter related to the dark energy. Using instead of (3) the complementary relation (4) for dark matter we find that $$\frac { 2 } { 3 } \rho _ { d m } ^ { \prime } = - \rho _ { d m } ( 3 + \omega _ { d m } ) + \rho _ { d e } ( - 1 + \omega _ { d e } ) - \frac { 2 } { 3 } \rho _ { r }.$$ Finally, as is usual, the evolution of the radiative component is dictated by $$\rho _ { r } ^ { \prime } = - 4 \rho _ { r }.$$ Thus, we have written a set of basic equations, expressions (7), (8) and (9), which in the following we want to analyze. In order to perform this analysis, we write this system as u ′ = M u where u = ( ρ de , ρ dm , ρ r ) is the vector containing the different energy density components and M represents the following matrix $$M = \frac { 3 } { 2 } \left [ \begin{array} { c c c } - 1 - 3 \omega _ { d e } & 1 - \omega _ { d m } & 2 / 3 \\ - 1 + \omega _ { d e } & - 3 - \omega _ { d m } & - 2 / 3 \\ 0 & 0 & 8 / 3 \end{array} \right ].$$ A standard procedure leads to analytic solutions. These solutions are linear combinations of the roots, r , of quadratic equations $$\det \left ( M - r I \right ) = 0.$$ Explicitly, we found that $$\mu _ { d e } \ & = \ \mathfrak { f } ( z ) \left \{ \frac { a _ { 1 } } { ( 1 + z ) ^ { \frac { 3 } { 4 } \eta } } + \frac { a _ { 2 } } { 1 + z } + \frac { a _ { 3 } } { ( 1 + z ) ^ { 1 + \frac { 3 \kappa } { 2 } } } \right \} \\ \rho _ { d m } \ & = \ \mathfrak { f } ( z ) \left \{ \frac { b _ { 1 } } { ( 1 + z ) ^ { \frac { 3 } { 4 } \eta } } + \frac { b _ { 2 } } { 1 + z } + \frac { b _ { 3 } } { ( 1 + z ) ^ { 1 + \frac { 3 \kappa } { 2 } } } \right \},$$ where $$\text{where} \\ a _ { 1 } \, = \, - 2 \, \kappa \, ( 1 - 3 \omega _ { d m } ) \rho _ { r } ^ { ( 0 ) } = - b _ { 1 }, \\ a _ { 2 } \, = \, ( 1 + \varphi ) \left [ \rho _ { d e } ^ { ( 0 ) } ( \kappa + 3 \omega _ { d e } - \omega _ { d m } - 2 ) - 2 \rho _ { d m } ^ { ( 0 ) } ( 1 - \omega _ { d m } ) \right ] + \rho _ { r } ^ { ( 0 ) } \left [ \kappa ( 1 - 3 \omega _ { d m } ) - 3 ( \omega _ { d m } + 1 ) ( \omega _ { d e } - \omega _ { d m } ) \right ], \\ a _ { 3 } \, = \, ( 1 + \varphi ) \left [ \rho _ { d e } ^ { ( 0 ) } ( \kappa - 3 \omega _ { d e } + \omega _ { d m } + 2 ) + 2 \rho _ { d m } ^ { ( 0 ) } ( 1 - \omega _ { d m } ) \right ] + \rho _ { r } ^ { ( 0 ) } \left [ \kappa ( 1 - 3 \omega _ { d m } ) + 3 ( \omega _ { d m } + 1 ) ( \omega _ { d e } - \omega _ { d m } ) \right ], \\ b _ { 2 } \, = \, ( 1 + \varphi ) \left [ 2 \rho _ { d e } ^ { ( 0 ) } ( 1 - \omega _ { d e } ) + \rho _ { d m } ^ { ( 0 ) } ( \kappa - 3 \omega _ { d e } + \omega _ { d m } + 2 ) \right ] - \rho _ { r } ^ { ( 0 ) } \left [ \kappa ( 1 - 3 \omega _ { d e } ) + ( 9 \omega _ { d e } - 7 ) ( \omega _ { d e } - \omega _ { d e } ) \right ] \\ b _ { 3 } \, = \, ( 1 + \varphi ) \left [ - 2 \rho _ { d e } ^ { ( 0 ) } ( 1 - \omega _ { d e } ) + \rho _ { d m } ^ { ( 0 ) } ( \kappa + 3 \omega _ { d e } - \omega _ { d m } - 2 ) \right ] - \rho _ { r } ^ { ( 0 ) } \left [ \kappa ( 1 - 3 \omega _ { d e } ) - ( 9 \omega _ { d e } - 7 ) ( \omega _ { d e } - \omega _ { d m } ) \right ] \\ \kappa \, = \, \sqrt { ( \omega _ { d e } - \omega _ { d m } ) ( - 8 + 9 \omega _ { d e } - \omega _ { d m } ) }, \\ \eta \, = \, \kappa + 3 \omega _ { d e } + \omega _ { d m },$$ and finally the function $$\mathfrak { f } ( z ) = \frac { ( 1 + z ) ^ { 4 + \frac { 3 } { 4 } \eta } } { 2 \, \kappa \, ( 1 + \varphi ) }.$$ Clearly, to get real energy densities solutions, it is needed to impose the condition $$( \omega _ { d e } - \omega _ { d m } ) ( - 8 + 9 \omega _ { d e } - \omega _ { d m } ) \geq 0.$$ We also need to consider the stability of the solutions. The corresponding critical points of the system are $$\rho _ { d e } ^ { ( C ) } = 0, \quad \rho _ { d m } ^ { ( C ) } = 0, \quad \rho _ { r } ^ { ( C ) } = 0.$$ Note that, from (12) and (14) these critical points occur at z = -1. However, as we shall see soon, they depend on the initial conditions. We find that one of these solutions becomes zero for z > 0. In order to make a stability analysis of the dynamical system, we study the perturbations around of the critical points. This drive us to a general expression T = Mδ , where $$t s. \, I \, \text{is drive us to a general expression } I = M \delta, \, \text{where} \\ T = \left ( \begin{array} { c } \frac { d \delta \rho _ { d e } } { d s } \\ \\ \frac { d \delta \rho _ { d m } } { d s } \\ \\ \frac { d \delta \rho _ { r } } { d s } \end{array} \right ), \quad \delta = \left ( \begin{array} { c } \delta \rho _ { d e } \\ \\ \delta \rho _ { d m } \\ \\ \delta \rho _ { r } \end{array} \right ), \\ \text{ix} \, (10) \, \text{introduced previously.}$$ and M is the matrix (10) introduced previously. The corresponding eigenvalues are given by $$\lambda _ { 1, 2 } = - \frac { 3 } { 4 } \left ( 4 + 3 \omega _ { d e } + \omega _ { d m } \pm \kappa \right ), \quad \lambda _ { 3 } = 4.$$ which shows that the system is stable if and only if the condition κ < 4 + 3 ω de + ω dm is satisfied ( λ 1 < 0). In order to enhance the insight about the evolution of this model, we manipulate Eqs. (7) and (8) to put them in a typical 'adiabatic form' as ˙ ρ + 3 H ρ ( + ) = 0, and write down an explicit p form for the effective EoS parameter for each contribution. Using (7), the dark energy density equation leads to an effective pressure term $$p _ { e f f } ^ { d e } = \rho _ { d e } \left [ - \frac { 1 } { 2 } + \frac { 3 } { 2 } w _ { d e } - \frac { \rho _ { d m } } { \rho _ { d e } } ( 1 - w _ { d m } ) - \frac { \rho _ { r } } { 3 \rho _ { d e } } \right ], \\. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \.$$ where through the analytical expressions (12), we can obtain a closed analytical formula depending on the 'bare' EoS parameters and the actual values ρ de (0) and ρ dm (0). The same can be done with the dark matter density equation (8), which leads to the effective pressure $$p _ { e f f } ^ { d m } & = \rho _ { d m } \left [ \frac { 1 } { 2 } + \frac { 1 } { 2 } w _ { d m } + \frac { \rho _ { d e } } { 2 \rho _ { d m } } ( 1 - w _ { d e } ) + \frac { \rho _ { r } } { 3 \rho _ { d m } } \right ]. \\. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad.$$ This expression coincides with Eq.(28) in reference [25] when we neglect radiation ρ r = 0. Using the analytical solution presented above, we can test it against the observations to constrain the ω dm and ω de parameters. In this section we describe the H z ( ), supernova Ia (SNIa), baryon acoustic oscillations (BAO), and cosmic microwave background (CMB) dataset, and we describe the related method to analyze them. ## The case of H z ( ) We use 28 points of the Hubble parameter measurements in 0 07 . ≤ z ≤ 2 3 compiled by [30]. . The χ 2 H can be written as $$\chi _ { H } ^ { 2 } & = \sum _ { i = 1 } ^ { 2 8 } \frac { \left ( H ( z _ { i } ) - H _ { o b 8 } ( z _ { i } ) \right ) ^ { 2 } } { \sigma _ { H _ { i } } ^ { 2 } }, \\ \intertext { m o w e d i n d } \pi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phis \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \PhI \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phid \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phicon \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phip \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phphi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Ph i \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phiph \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phs \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phig \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phic \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \Psi \, \Phi \, \Phi \, \Phi \Phi \Phi \, \Phi \Phi \, \Phi \, \Phi \, \Phi \, \Phi \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Psi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Psi \, \Phi \, \Phi \, \Phi \, \Phi \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi\, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi\Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \,\Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi \, \Phi$$ where H obs ( z i ) is the observed Hubble parameter, H z ( ) is the theoretical value for the model, and σ 2 H i the observational error. ## The SNIa dataset We also use the Union 2 sample consisting in 557 SNIa points in the redshift range 0 511 . < z < 1 12 [31]. . The SNIa data give the distance modulus as a function of redshift µ obs ( z ). Theoretically the distance modulus is a function of the cosmology through the luminosity distance $$d _ { L } ( z ) & = ( 1 + z ) \frac { c } { H _ { 0 } } \int _ { 0 } ^ { z } \frac { d z ^ { \prime } } { E ( z ^ { \prime } ) }, \\ \dots \quad - \lambda \cdot \quad \dots \quad - \dots \cdot \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad.$$ valid for a flat universe with E z ( ) = H z /H ( ) 0 . Explicitly the theoretical value is computed by µ z ( ) = 5 log 10 [ d L ( z / ) Mpc ] + 25. We fit the SNIa with the cosmological model by minimizing the χ 2 value defined by $$\chi ^ { 2 } = \sum _ { i = 1 } ^ { 5 8 0 } \frac { [ \mu ( z _ { i } ) - \mu _ { o b s } ( z _ { i } ) ] ^ { 2 } } { \sigma _ { \mu i } ^ { 2 } }. \\.. \pi _ { - 1 }.. \dots.$$ ## Baryon Acoustic Oscillations The BAO measurements considered in our analysis are obtained from the WiggleZ experiment [32], the SDSS DR7 BAO distance measurements [33], and 6dFGS BAO data [34]. The χ 2 for the WiggleZ BAO data is given by $$\chi ^ { 2 } _ { W i g g l e Z } = ( \bar { A } _ { o b s } - \bar { A } _ { t h } ) C ^ { - 1 } _ { W i g g l e Z } ( \bar { A } _ { o b s } - \bar { A } _ { t h } ) ^ { T },$$ where the data vector is ¯ A obs = (0 474 0 442 0 424) . , . , . for the effective redshift z = 0 44 0 6 and . , . 0.73. The corresponding theoretical value ¯ A th denotes the acoustic parameter A z ( ) introduced by Eisenstein et al. [35]: $$A ( z ) = \frac { D _ { V } ( z ) \sqrt { \Omega _ { m } H _ { 0 } ^ { 2 } } } { c z },$$ and the distance scale D V is defined as $$D _ { V } ( z ) = \frac { 1 } { H _ { 0 } } \left [ ( 1 + z ) ^ { 2 } D _ { A } ( z ) ^ { 2 } \frac { c z } { E ( z ) } \right ] ^ { 1 / 3 },$$ where D A ( z ) is the Hubble-free angular diameter distance which relates to the Hubble-free luminosity distance through D A ( z ) = D L ( z / ) (1 + z ) 2 . The inverse covariance C -1 WiggleZ is given by $$C _ { w i g g l e z } ^ { - 1 } & = \begin{pmatrix} 1 0 4 0. 3 & - 8 0 7. 5 & 3 3 6. 8 \\ - 8 0 7. 5 & 3 7 2 0. 3 & - 1 5 5 1. 9 \\ 3 3 6. 8 & - 1 5 5 1. 9 & 2 9 1 4. 9 \end{pmatrix}. & ( 2 7 ) \\ \text{or the SDSS DR7 BAO distance measurements, the } \chi ^ { 2 } \, \text{can be expressed as } [ 3 3 ]$$ Similarly, for the SDSS DR7 BAO distance measurements, the χ 2 can be expressed as [33] $$\chi ^ { 2 } _ { S D S S } = ( \bar { d } _ { o b s } - \bar { d } _ { t h } ) C ^ { - 1 } _ { S D S S } ( \bar { d } _ { o b s } - \bar { d } _ { t h } ) ^ { T },$$ where ¯ d obs = (0 1905 0 1097) is the datapoints at . , . z = 0 2 and 0 35. . . ¯ d th denotes the distance ratio $$d _ { z } = \frac { r _ { s } ( z _ { d } ) } { D _ { V } ( z ) }.$$ Here, r s ( z ) is the comoving sound horizon, $$r _ { s } ( z ) = c \int _ { z } ^ { \infty } \frac { c _ { s } ( z ^ { \prime } ) } { H ( z ^ { \prime } ) } d z ^ { \prime },$$ where the sound speed c s ( z ) = 1 / √ 3(1 + ¯ R / b (1 + z ), with ¯ R b = 31500Ω b h 2 ( T CMB / . 2 7K) -4 and T CMB = 2.726K. The redshift z d at the baryon drag epoch is fitted with the formula proposed by Eisenstein & Hu [36], $$z _ { d } = \frac { 1 2 9 1 ( \Omega _ { m } h ^ { 2 } ) ^ { 0. 2 5 1 } } { 1 + 0. 6 5 9 ( \Omega _ { m } h ^ { 2 } ) ^ { 0. 8 2 8 } } [ 1 + b _ { 1 } ( \Omega _ { b } h ^ { 2 } ) ^ { b _ { 2 } } ],$$ where $$b _ { 1 } & = 0. 3 1 3 ( \Omega _ { m } h ^ { 2 } ) ^ { - 0. 4 1 9 } [ 1 + 0. 6 0 7 ( \Omega _ { m } h ^ { 2 } ) ^ { 0. 6 7 4 } ],$$ $$b _ { 2 } = 0. 2 3 8 ( \Omega _ { m } h ^ { 2 } ) ^ { 0. 2 2 3 }.$$ C -1 SDSS in Eq. (12) is the inverse covariance matrix for the SDSS data set given by $$C _ { S D S S } ^ { - 1 } = \left ( \begin{array} { c c } 3 0 1 2 4 & - 1 7 2 2 7 \\ - 1 7 2 2 7 & 8 6 9 7 7 \end{array} \right ). \\ \text{AO data [34], there is only one data point at } z = 0. 1 0 6, the \, \chi ^ { 2 } \text{ is easy to}$$ For the 6dFGS BAO data [34], there is only one data point at z = 0 106, the . χ 2 is easy to compute: $$\chi _ { 6 d F G S } ^ { 2 } = \left ( \frac { d _ { z } - 0. 3 3 6 } { 0. 0 1 5 } \right ) ^ { 2 }. \\ - \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon$$ The total χ 2 for all the BAO data sets thus can be written as $$\chi _ { B A O } ^ { 2 } = \chi _ { W i g g l e Z } ^ { 2 } + \chi _ { S D S S } ^ { 2 } + \chi _ { 6 d F G S } ^ { 2 }.$$ ## The Cosmic Microwave Background data We also include CMB information by using the WMAP 9-yr data [45] to probe the expansion history up to the last scattering surface. The χ 2 for the CMB data is constructed as $$\chi ^ { 2 } _ { C M B } = X ^ { T } C ^ { - 1 } _ { C M B } X,$$ where $$X = \left ( \begin{array} { c } l _ { A } - 3 0 2. 4 0 \\ R - 1. 7 2 4 6 \\ z _ { * } - 1 0 9 0. 8 8 \end{array} \right ).$$ Here l A is the 'acoustic scale' defined as $$l _ { A } = \frac { \pi d _ { L } ( z _ { * } ) } { ( 1 + z ) r _ { s } ( z _ { * } ) },$$ where d L ( z ) = D L ( z /H ) 0 and the redshift of decoupling z ∗ is given by [46], $$z _ { * } & = 1 0 4 8 [ 1 + 0. 0 0 1 2 4 ( \Omega _ { b } h ^ { 2 } ) ^ { - 0. 7 3 8 } ] [ 1 + g _ { 1 } ( \Omega _ { m } h ^ { 2 } ) ^ { g _ { 2 } } ], & ( 4 0 )$$ $$g _ { 1 } = \frac { 0. 0 7 8 3 ( \Omega _ { b } h ^ { 2 } ) ^ { - 0. 2 3 8 } } { 1 + 3 9. 5 ( \Omega _ { b } h ^ { 2 } ) ^ { 0. 7 6 3 } }, g _ { 2 } = \frac { 0. 5 6 0 } { 1 + 2 1. 1 ( \Omega _ { b } h ^ { 2 } ) ^ { 1. 8 1 } },$$ The 'shift parameter' R defined as [37] $$\dot { \cdot } \quad R = \frac { \sqrt { \Omega _ { m } } } { c ( 1 + z _ { * } ) } D _ { L } ( z ).$$ C -1 CMB in Eq. (37) is the inverse covariance matrix, $$C _ { C M B } ^ { - 1 } = \left ( \begin{array} { c c c } 3. 1 8 2 & \quad 1 8. 2 5 3 & \quad - 1. 4 2 9 \\ 1 8. 2 5 3 & \quad 1 1 8 8 7. 8 7 9 & \quad - 1 9 3. 8 0 8 \\ - 1. 4 2 9 & \quad - 1 9 3. 8 0 8 & \quad 4. 5 5 6 \end{array} \right ).$$ Assuming a flat geometry, we consider two cases to obtain the best fit to the EoS of dark matter and dark energy. First in case A, we assume the prior Ω dm = 0 235 [38] and we consider as free . parameters h , ω dm , and ω de . The constraints for case A are given in Table I using different data sets. The best fit with χ 2 min = 664 56 derived from the joint analysis including all data sets is . h = 0 61, . ω de = -0 5, and . ω dm = -1 46 with confidence contours at 68 27% and 95 45% shown in . . . the first panel of Figure 1. Furthermore, we consider a second run - which we called case B - in which Ω dm is also considered a free parameter, whose results are displayed also in Table I. Although the best fit parameters point out towards a negative value for Ω dm using H z ( ) and H z ( )+SNIa, this behavior does not shows up once we include BAO data. The best fit with χ 2 min = 664 94 . derived from the joint analysis including all data sets is Ω dm = 0 22, . h = 0 62, . ω de = -0 5, . and ω dm = -1 45. . Notice the constraints are very similar in both cases. This means we can fit the observational data without using an explicit cosmological constant, as was stressed in [25], [27]. Actually, reconstructing the deceleration parameter as a function of redshift q z ( ) (see Fig. 2) we conclude that this model describes an accelerated expansion without a cosmological constant. The transition of a decelerated phase to an accelerated phase occurs at z ∼ 0 4. . However, as we have already found in the previous work [27], it seems that this model presents a fatal failure since there is no chance to satisfied the weak energy condition, because the energy density related to dark energy becomes negative after a fraction of the redshift. In fact, this can be viewed from the explicit solution that we have found, expressed by equation (12). Based on the TABLE I: The best fit values for the free parameters using several data sets in a flat universe. We also show the χ 2 min of the fit divided by the effective degrees of freedom. | Case | χ 2 min /d.o.f. | Ω dm | h | ω dm | ω de | |----------------------|----------------------|----------------------|----------------------|----------------------|----------------------| | A | 15 . 53 / 28 | Fixed | 0 . 72 ± 0 . 05 | - 0 . 57 ± 0 . 12 | - 1 . 38 ± 0 . 67 | | B | 15 . 85 / 28 | - 0 . 03 ± 0 . 51 | 0 . 81 ± 0 . 01 | - 0 . 57 ± 0 . 04 | - 1 . 65 ± 0 . 08 | | H ( z )+SNIa | H ( z )+SNIa | H ( z )+SNIa | H ( z )+SNIa | H ( z )+SNIa | H ( z )+SNIa | | A | 559 . 90 / 585 | Fixed | 0 . 68 ± 0 . 01 | - 0 . 48 ± 0 . 02 | - 0 . 94 ± 0 . 07 | | B | 558 . 82 / 585 | - 0 . 25 | 0 . 68 | - 0 . 33 | - 0 . 68 | | H ( z )+SNIa+BAO | H ( z )+SNIa+BAO | H ( z )+SNIa+BAO | H ( z )+SNIa+BAO | H ( z )+SNIa+BAO | H ( z )+SNIa+BAO | | A | 594 . 01 / 591 | Fixed | 0 . 63 | - 0 . 41 | - 1 . 14 | | B | 589 . 81 / 591 | 0 . 27 | 0 . 62 | - 0 . 41 | - 1 . 17 | | H ( z )+SNIa+BAO+CMB | H ( z )+SNIa+BAO+CMB | H ( z )+SNIa+BAO+CMB | H ( z )+SNIa+BAO+CMB | H ( z )+SNIa+BAO+CMB | H ( z )+SNIa+BAO+CMB | | A | 664 . 56 / 594 | Fixed | 0 . 61 | - 0 . 5 | - 1 . 46 | | B | 663 . 94 / 594 | 0 . 22 | 0 . 61 | - 0 . 5 | - 1 . 45 | best fit values found above, we have plotted the energy densities as a function of redshift in Figure 3, where it is clear that although both energy densities are positive at z = 0, i.e today, one of them (in this case ρ de ) falls below zero near z /similarequal 0 25. . It is interesting to note that this result is not exceptional of this work. Actually in [39] it was shown evidence that relates the tension between low redshift data and those from CMB, with a preference for evolving DE models showing a decreasing DE density evolution with increasing redshift. This results is also consistent with the recent BAO measurement of BOSS DR11 [40], which shows the data prefers a decreasing DE density with increasing redshift. Although this situation looks quite strange since never has been measured a negative energy density, and it is possibly that this case represents an unphysical situation in the sense that it may violate the second law of thermodynamics [41] (although it can be violated [42]), it is still exist the possibility that a negative energy density studied in a background of a FLRW metric results interesting [43]. This could be carried out since the energy conditions in relativity need only be satisfied on a global scale, or on an average measure [44]. It might be interesting to address these issues deeply, in the sense that these energy forms may describe cosmologically interesting scenarios. In this paper we have reviewed the semi-holographic model presented by Zhang, Li and Noh [25] plus radiation. From this, we have found the analytical solutions to the dynamical system FIG. 1: Confidence contour at 1 σ and 2 σ for case A (left panel) and case B (right panel) using all data described in Table 1. The cross indicates the best fit. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1101v1-figure-bab6b667-213e-427c-8da7-fff7725bc17f.jpg) FIG. 2: The deceleration parameter reconstructed from the best fit for case A (left panel) and case B (right panel) using all data. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1101v1-figure-c2f9d4b8-d8fe-44b8-a287-215e2e9e7e9f.jpg) generated by this model, Eqs. (12), finding accelerated expansion without a cosmological constant. Also, we have studied the stability of the system, which drive us to impose constraints on the EoS parameters, ω dm and ω de , Eq. (15). Based on this analysis, we determine the allowed region in parameter space to get stable solutions, which does not agree with those mentioned in [25] (see eqs. (23) and (24) in this reference). The analytical solution of the model was also tested against the latest available observational data from Supernovas Ia, which is a set of 580 points for the module distance. FIG. 3: Analytic solutions (12) of the energy densities, ρ de (red solid line) and ρ dm (blue dashed line) as a function of redshift, using the best fit values for the case A (left panel) and case B (right panel) using all data. Notice how ρ de falls to negative values near z /similarequal 0 25. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1101v1-figure-f0c58a5e-c7c4-48e0-9781-4877efad55c3.jpg) ## Acknowledgments This work was funded by the Comisi´ on Nacional de Investigaci´n o Cient´ ıfica y Tecnol´gica o through FONDECYT Grants No 1110230 (SdC, VHC) and No 11130695 (JRV). JM acknowledges ESO - Comit´ e Mixto, VHC acknowledges also the financial support from DIUV project No. 13/2009. - [1] A. G. Riess et al., Astron. J. 116, 1009 (1998)[astro-ph/9805201 ]; S. J. Perlmutter et al., Astrophys. J. 517, 565(1999); A. G. Riess et al., Astrophys. J. 607, 665(2004). - [2] M. Tegmark et al. [SDSS Collaboration], Phys. Rev. D 69, 103501 (2004); K. Abazajian et al. [SDSS Collaboration], Astron. J. 128, 502 (2004); K. Abazajian et al. [SDSS Collaboration], Astron. J. 129, 1755 (2005). - [3] H. V. Peiris et al., Astrophys. J. Suppl. 148 (2003) 213 [astro-ph/0302225]; C. L. Bennett et al., Astrophys. J. Suppl. 148 1 (2003); D. N. Spergel et al., Astrophys. J. Suppl. 148 175 (2003). - [4] S. Boughn and R. Chrittenden, Nature (London) 427 , 45 (2004); P. Vielva, E. Mart´ ınez-Gonz´lez, and a M. Tucci, Mon. Not. R. Astron. Soc. 365 , 891 (2006). - [5] D. J. Eisenstein et al. [SDSS Collaboration], Astrophys. J. 633 , 560 (2005) [astro-ph/0501171]. - [6] C.R. Contaldi, H. Hoekstra, and A. Lewis, Phys. Rev. Lett. 90 , 221303 (2003). - [7] S. Weinberg, Rev. Mod. Phys. 61, 1 (1989); E.J. Copeland, M. Sami, S. Tsujikawa, Int. J. Mod. Phys. D 15, 1753 (2006). - [8] I. Zlatev, L. Wang and P. J. Steinhardt, Phys. Rev. Lett. 82 896 (1999). - [9] S. del Campo, R. Herrera and D. Pavon, Phys. Rev. D 78 , 021302(RC) (2008). - [10] R.R. Caldwell, R. Dave and P.J. Steinhardt, Phys. Rev. Lett. 80 1582 (1998). - [11] T. Chiba, T. Okabe, M. Yamaguchi, Phys. Rev. D 62, 023511 (2000); C. Armendariz-Picon, V. Mukhanov, P.J. Steinhardt, Phys. Rev. Lett. 85, 4438 (2000). - [12] A. Sen, J. High Energy Phys. 10, 008 (1999); E.A. Bergshoeff, M. de Roo, T.C. de Wit, E. Eyras, S. Panda, J. High Energy Phys. 05, 009 (2000). - [13] A. Kamenshchik, U. Moschella, V. Pasquier, Phys. Lett. B 511, 265 (2001). - [14] S. del Campo and J. R. Villanueva, Int. J. Mod. Phys. D 18 , 2007-2022 (2009). - [15] S. del Campo, Jour. Cosm. Astropart. Phys. (JCAP) 1311 004 (2013). - [16] S. del Campo, C. R. Fadragas, R. Herrera, C. Leiva, G. Leon and J. Saavedra, Phys.Rev. D 88 023532 (2013). - [17] W. S. Hip´lito-Ricaldi, H.E.S. Velten and W. Zimdahl, Phys. Rev. D o 82 , 063507 (2010). - [18] A. G. Cohen, D. B. Kaplan, and A. E. Nelson, Phys. Rev. Lett. 82 , 4971 (1999); M. Li, Phys. Lett. B 603 , 1 (2004); S. D. H. Hsu, Phys. Lett. B 594 , 13 (2004). - [19] S. del Campo, J. C. Fabris, R. Herrera and W. Zimdahl, Phys.Rev. D 83 123006 (2011). - [20] A. G. Cohen, D.B. Kaplan and A.E. Nelson, Phys. Rev. Lett. 82 , 4971 (1999). - [21] M. Li, Phys. Lett. B 603 , 1 (2004). - [22] C. J. Feng, Phys. Lett. B 670 , 231 (2008); L. N. Granda and A. Oliveros, Phys. Lett. B 669 , 275 (2008). - [23] S. del Campo, J. C. Fabris, R. Herrera and W. Zimdahl, Phys. Rev. D 87 , 123002 (2013). - [24] W. Zimdahl, J.C. Fabris, S. del Campo and R. Herrera, Cosmology with Ricci-type dark energy. Conference: C13-05-27.4, e-Print: arXiv:1403.1103[astro-ph.CO]. - [25] H. Zhang, X. -Z. Li and H. Noh, Phys. Lett. B 694 , 177 (2010) [arXiv:1010.1362 [gr-qc]]. - [26] H. Li, H. Zhang and Y. Zhang, arXiv:1212.2360 [astro-ph.CO]. - [27] V. H. C´ ardenas, J. R. Villanueva and J. Maga˜ na, Mon. Not. Roy. Astron. Soc. 438 , 3603 (2014) [arXiv:1306.6612 [astro-ph.CO]]. - [28] D. Bak and S. J. Rey, Class. Quant. Grav. 17 , L83 (2000). - [29] R. G. Cai and S. P. Kim, JHEP 0502 , 050 (2005). - [30] O. Farooq and B. Ratra, Ap. J. 766 , L7 (2013). - [31] R. Amanullah et al., ApJ, 716 , 712 (2010). - [32] Blake C. et al., 2011, MNRAS, 1598 - [33] Percival W. J. et al., 2010, MNRAS, 401, 2148 - [34] Beutler F. et al., 2011, MNRAS, 416, 3017 - [35] Eisenstein D. J. et al., 2005, ApJ, 633, 560 - [36] Eisenstein D. J., Hu W., 1998, ApJ, 496, 605 - [37] Bond J. R., Efstathiou G., Tegmark M., 1997, MNRAS 291, L33 - [38] G. Hinshaw, et al, 2013, ApJS, 208, 19. - [39] V. H. Cardenas, arXiv:1405.5116 [astro-ph.CO]. - [40] T. Delubac et al. [BOSS Collaboration], arXiv:1404.1801 [astro-ph.CO]. - [41] S. W. Hawking and G. F. R. Ellis, The large scale structure of spacetime (University of Chicago Press, 1973). - [42] L. H. Ford and T. A. Roman, Phys. Rev. D 64 , 024023 (2001). - [43] T. Hertog, G. T. Horowitz, K. Maeda, JHEP 0305 , 060 (2003); R. J. Nemiroff, R. Joshi and B. R. Patla, An exposition on Friedmann cosmology with negative energy densities, arXiv:1402.4522[astro-ph.CO]. - [44] L. H. Ford and T. A. Roman, Phys. Rev. D 53 , 1988 (1996); ibid, Phys. Rev. D 77 , 045018 (2008); M. J. Pfenning, arXiv:gr-qc/9805037; M. Visser and C. Barcelo, arXiv:gr-qc/0001099. - [45] G. Hinshaw, D. Larson, E. Komatsu, D. N. Spergel, C. L. Bennett, J. Dunkley, M. R. Nolta and M. Halpern et al. , [arXiv:1212.5226 [astro-ph.CO]]. - [46] Hu W., Sugiyama N., 1996, ApJ 471, 542
null
[ "Sergio del Campo", "Víctor Cárdenas", "Juan Magaña", "J. R. Villanueva" ]
2014-08-05T20:04:35+00:00
2014-08-05T20:04:35+00:00
[ "gr-qc", "astro-ph.CO" ]
Semi-holographic model including the radiation component
In this letter we study the semi holographic model which corresponds to the radiative version of the model proposed by Zhang et al. (Phys. Lett. B 694 (2010), 177) and revisited by C\'ardenas et al. (Mon. Not. Roy. Astron. Soc. 438 (2014), 3603). This inclusion makes the model more realistic, so allows us to test it with current observational data and then answer if the inconsistency reported by C\'ardenas et al. is relaxed.
1408.1102v2
## EARLY GALAXY FORMATION IN WARM DARK MATTER COSMOLOGIES Pratika Dayal 1 , Andrei Mesinger 2 &amp; Fabio Pacucci 2 Draft version May 8, 2015 ## ABSTRACT We present a framework for high-redshift ( z &gt; ∼ 7) galaxy formation that traces their dark matter (DM) and baryonic assembly in four cosmologies: Cold Dark Matter (CDM) and Warm Dark Matter (WDM) with particle masses of m x = 1.5, 3 and 5 keV. We use the same astrophysical parameters regulating star formation and feedback, chosen to match current observations of the evolving ultra violet luminosity function (UV LF). We find that the assembly of observable (with current and upcoming instruments) galaxies in CDM and m x ≥ 3 keV WDM results in similar halo mass to light ratios (M/L), stellar mass densities (SMDs) and UV LFs. However the suppression of small-scale structure leads to a notably delayed and subsequently more rapid stellar assembly in the 1 5 keV WDM model. . Thus galaxy assembly in m x &lt; ∼ 2 keV WDM cosmologies is characterized by: (i) a dearth of smallmass halos hosting faint galaxies; and (ii) a younger, more UV bright stellar population, for a given stellar mass. The higher M/L ratio (effect ii) partially compensates for the dearth of small-mass halos (effect i), making the resulting UV LFs closer to CDM than expected from simple estimates of halo abundances. We find that the redshift evolution of the SMD is a powerful probe of the nature of DM. Integrating down to a limit of M UV = -16 5 for the . James Webb Space Telescope (JWST) , the SMD evolves as log(SMD) ∝ -0 63(1 + . z ) in m x = 1 5 keV WDM, as compared to log(SMD) . ∝ -0 44(1 + . z ) in CDM. Thus high-redshift stellar assembly provides a powerful testbed for WDM models, accessible with the upcoming JWST . ## 1. INTRODUCTION The current Lambda Cold Dark Matter (ΛCDM) cosmological paradigm has been extremely successful in explaining the distribution of matter from ∼ Megaparsec (Mpc) to ∼ Gigaparsec (Gpc) scales. It reproduces the statistics of galaxy cluster abundances (e.g Borgani &amp; Guzzo 2001), galaxy clustering on large scales (e.g. Cole et al. 2005), the temperature anisotropy of the cosmic microwave background (Lange et al. 2001; Fixsen et al. 1996; Hinshaw et al. 2013; Planck Collaboration et al. 2013) and the Lyman Alpha (Ly α ) forest (e.g. Slosar et al. 2013). In spite of this success, the validity of the ΛCDM paradigm has been a subject of close scrutiny given that it seems to predict too-much power on small scales: (i) CDM generically over-predicts the number of observed satellite and field galaxies (e.g. Klypin et al. 1999; Moore et al. 1999a; Papastergis et al. 2011); (ii) CDM models predict halo profiles that are denser and cuspier than those inferred observationally (e.g Navarro et al. 1997; Subramanian et al. 2000); and (iii) CDM predicts a population of massive, concentrated Galactic subhalos that are inconsistent with kinematic observations of Milky Way satellites (e.g. Boylan-Kolchin et al. 2012). warm dark matter (WDM), it could smear out primordial small-scale density fluctuations, helping alleviate some tension with observations (e.g. Blumenthal et al. 1982; Bode et al. 2001; de Vega &amp; Sanchez 2012; though see e.g. Macci` o et al. 2012). For thermal relics that decouple while relativistic, the free-streaming length can be easily translated to a particle mass, m x . A number of different astrophysical approaches have already been used to obtain constraints on m x . Using the Ly α forest power spectrum measured from high-resolution ( z &gt; 4) quasar spectra Viel et al. (2013) obtain a lower limit of m x ≥ 3 3 keV. . Using observations of dwarf spheroidal galaxies de Vega &amp; Sanchez (2010) find m x &gt; 1 0 keV. . Kang et al. (2013) find that simultaneously reproducing stellar mass functions and the Tully-Fisher relation for z = 0 -3 5 . galaxies requires m x ≥ 0 75 keV. . Using the number counts of highz gamma ray bursts (GRBs) with a highly-conservative Bayesian likelihood analysis, de Souza et al. (2013) obtain limits of m &gt; . x 1 6 -1 8 keV. . Finally, using the number density of z ≈ 10 lensed galaxies and no astrophysical assumptions, Pacucci et al. (2013) constrain m x &gt; ∼ 1 keV. Baryonic feedback has had only moderate success in reconciling CDM with small-scale observations (e.g. Boylan-Kolchin et al. 2012; Garrison-Kimmel et al. 2013; Teyssier et al. 2013). A popular alternate solution can be found by appealing to the nature of dark matter itself. If dark matter consisted of ∼ keV particles, so-called 1 Institute for Computational Cosmology, Department of Physics, University of Durham, South Road, Durham DH1 3LE, UK 2 Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa, Italy Given that structure formation proceeds hierarchically and WDM smears-out small-scale power, the effects of WDM would be manifested most strongly through a decrease in the number density and a change in the mass build-up of the smallest galaxies at the highestz . This is an ideal time to use highz ( z &gt; ∼ 7) Lyman break Galaxies (LBGs) to probe the nature of WDM given that instruments like the Wide Field Camera 3 (WFC3) on the Hubble Space telescope (HST) have recently allowed a statistically significant sample of such galaxies to be collected. This sample has been used to obtain excellent constraints on the evolving ultraviolet luminosity function (UV LF; Oesch et al. 2010; Bouwens et al. 2010, 2011; Castellano et al. 2010; McLure et al. 2010, 2013; Bowler et al. 2014; Bradley et al. 2012; Oesch et al. 2013; Bouwens et al. 2014). In addition, broad-band data (colours) have been used to infer the evolution of their global properties including the stellar mass density (SMD; Gonz´lez et al. a 2011; Stark et al. 2013; Labb´ e et al. 2010a,b), specific star formation rates (sSFR; Gonz´lez et al. 2010; Stark a et al. 2009; Yabe et al. 2009; Schaerer &amp; de Barros 2010; Stark et al. 2013) and mass-to-light ratios (M/L; Grazian et al., A&amp;A submitted; Gonz´ alez et al. 2011). In this work, we build a semi-analytic merger-tree based model that traces the growth of DM halos through mergers and smooth-accretion from the intergalactic medium (IGM). We include key baryonic processes of: (i) star formation and its impact on ejecting gas from the DM potential well through supernova (SN) winds (internal feedback), (ii) photo-heating of gas from the outskirts of galaxies exposed to an ultraviolet background (UVB) during reionization (external feedback), and (iii) the merger, accretion and ejection driven growth of stellar and gas mass. Using CDM as the baseline, we explore highz galaxy formation for WDM masses of m x = 1 5 3 . , and 5 keV. Our cosmological parameters are: (Ω m , Ω Λ , Ω b , h, n s , σ 8 ) = (0 2725 0 702 0 04 0 7 0 96 0 83), . , . , . , . , . , . consistent with the latest results from the Planck collaboration (Planck Collaboration 2013). Unless stated otherwise, we quote all quantities in comoving units. ## 2. THEORETICAL MODEL We use the merger-tree based semi-analytic model presented in Dayal et al. (2014) and apply it to four DM models: CDM, and WDM with m x = 1 5 3 and 5 keV. . , In brief, this model simultaneously traces the formation of successively larger DM halos through mergers of smaller progenitors, and follows their baryonic physics including star formation, the growth of stellar mass, and gas mass evolution due to accretion, ejection and mergers. Our model includes baryonic feedback from both SN explosions and photo-heating from reionization. Below we elaborate on the main ingredients. ## 2.1. DM merger trees We construct CDM and WDM merger trees according to the prescription in Benson et al. (2013) wherein the authors show that a number of modifications have to be introduced to obtain WDM merger trees and mass functions that are in agreement with N-body simulations. These include using a modified initial power spectrum that imposes a cut-off in power below a certain length scale depending on the WDM particle mass, using a critical over-density for collapse that depends on the WDM particle mass, using a sharp window function in k -space and calibrating the smooth-accretion of DM from N-body simulations. We start from 400 (800) z = 4 galaxies for CDM and WDM with m x = 3 and 5keV (WDM with m x = 1 5 keV), linearly distributed across the halo . mass range log( M / h M ) = 9 glyph[circledot] -13. From these we build merger-trees using 320 equal redshift steps between z = 20 and 4 with a mass resolution of M res = 10 M 8 glyph[circledot] . As detailed in Parkinson et al. (2008) and Benson et al. (2013), we use the modified binary merger tree algorithm with smooth accretion: we start with the conditional mass function given by the extended Press-Schechter theory (Bower 1991; Lacey &amp; Cole 1993), $$\nu \, \bullet \, \quad \nu \, \quad \nu \, \quad \nu \\ f ( M _ { 1 } | M _ { 2 } ) \, d \ln M _ { 1 } = \sqrt { \frac { 2 } { \pi } } \, \frac { \sigma _ { 1 } ^ { 2 } ( \delta _ { 1 } - \delta _ { 2 } ) } { [ \sigma _ { 1 } ^ { 2 } - \sigma _ { 2 } ^ { 2 } ] ^ { 3 / 2 } } \times \\ \exp \left [ - \frac { 1 } { 2 } \frac { ( \delta _ { 1 } - \delta _ { 2 } ) ^ { 2 } } { ( \sigma _ { 1 } ^ { 2 } - \sigma _ { 2 } ^ { 2 } ) } \right ] \left | \frac { d \ln \sigma } { d \ln M _ { 1 } } \right | \, d \ln M _ { 1 }. \quad ( 1 ) \\ \Gamma \, \cdots \, \tau \, \bar { \lambda } \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar \lambda \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdot \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdelta \, \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdists \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar{ \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \, \cdots \, \bar { \lambda } \. \quad ( 1 )$$ Here f ( M M 1 | 2 ) represents the fraction of mass from halos of mass M 2 at redshift z 2 that is contained in progenitor halos of mass M 1 at an earlier redshift z 1 , while δ 1 and δ 2 are the linear density thresholds for collapse at these two redshifts. The rms linear density fluctuation extrapolated to z = 0 in spheres containing mass M is denoted σ M ( ) with σ 1 ≡ σ M ( 1 ) and σ 2 ≡ σ M ( 2 ). As a consequence, the mean number of halos of mass M 1 into which a halo of mass M 2 splits when one takes a step dz 1 up in redshift is: $$\frac { d N } { d M _ { 1 } } = \frac { 1 } { M _ { 1 } } \ \frac { d f } { d z _ { 1 } } \frac { M _ { 2 } } { M _ { 1 } } d z _ { 1 } \quad ( M _ { 1 } < M _ { 2 } ). \quad ( 2 )$$ In order to reduce the systematic differences between merger trees predictions and N-body simulations, Parkinson et al. (2008) introduced a slight modification to Eqn. 2, by making the following substitution: $$\frac { d N } { d M _ { 1 } } \rightarrow \frac { d N } { d M _ { 1 } } \ G ( \sigma _ { 1 } / \sigma _ { 2 }, \delta _ { 2 } / \sigma _ { 2 } ). \quad \quad ( 3 )$$ With the assumption that: $$G ( \sigma _ { 1 } / \sigma _ { 2 }, \delta _ { 2 } / \sigma _ { 2 } ) = G _ { 0 } \, \left ( \frac { \sigma _ { 1 } } { \sigma _ { 2 } } \right ) ^ { \gamma _ { 1 } } \, \left ( \frac { \delta _ { 2 } } { \sigma _ { 2 } } \right ) ^ { \gamma _ { 2 } }, \quad ( 4 )$$ Then, by specifying a required mass resolution, M res , for the algorithm one can integrate to determine the mean number of progenitors with masses M 1 in the interval M res &lt; M 1 &lt; M / 2 2: $$P = \int _ { M _ { \text{res} } } ^ { M _ { 2 } / 2 } \frac { d N } { d M _ { 1 } } \ d M _ { 1 },$$ and the fraction of mass of the final object in progenitors below this resolution limit: $$F = \int _ { 0 } ^ { M _ { \text{res} } } \frac { d N } { d M _ { 1 } } \ \frac { M _ { 1 } } { M _ { 2 } } \ d M _ { 1 },$$ At a given step time-step, a halo could have progenitors above or below the resolution limit, M res . The masses of progenitors below the resolution limit are treated as 'smooth-accretion' from the IGM. We scale the relative abundances of the merger tree roots to match the z = 4 Sheth-Tormen halo mass function (Sheth &amp; Tormen 1999). ## 2.2. External feedback from reionization Cosmic reionization suppresses the baryonic content of galaxies by photo-heating gas at their outskirts (Klypin et al. 1999; Moore et al. 1999b; Somerville 2002) thereby preventing efficient cooling: what we refer to below as 'external feedback'. External feedback depends on the local thermal histories of gas near halos. As reionization is poorly constrained and very inhomogeneous, this feedback is difficult to quantify. Recently Sobacchi &amp; Mesinger (2013) have run a large suite of 1d cosmological collapse simulations to explore the parameter space allowed by the inhomogeneity of reionization. These authors provide a functional form, motivated by linear theory, for the critical halo mass ( M crit ) that can retain half of its baryons compared to the global value at any redshift z : $$M _ { c r i t } ( z ) = M _ { 0 } J _ { 2 1 } ^ { a } \left ( \frac { 1 + z } { 1 0 } \right ) ^ { b } \left [ 1 - \left ( \frac { 1 + z } { 1 + z _ { I N } } \right ) ^ { c } \right ] ^ { d }, \ \ ( 7 ) \quad \text{CDM}$$ where J 21 represents the ionizing UVB intensity in units of 10 -21 erg s -1 Hz -1 cm -2 sr -1 , z IN is the redshift at which the halo is exposed to the UVB (we take z IN = 9 for this work), and the best-fit parameters are ( M ,a,b,c, d, J 0 21 ) = (2 8 . × 10 M 9 glyph[circledot] , 0 17 . , -2 1 . , 2 0 . , 2 5 . , 0 01). . Sobacchi &amp; Mesinger (2013) also show that the baryon fraction (with respect to the cosmic mean) of a halo of mass M h is well-fit with the simple form: $$f _ { b } ( z ) = 2 ^ { - M _ { c r i t } ( z ) / M _ { h } ( z ) }, \quad \ \ ( 8 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ Here we use the same parameter values for external feedback for all the four DM models explored in this paper: CDM and WDM with m x = 1 5 3 and 5 . , keV. ## 2.3. Internal feedback from supernovae We also include the effects of internal feedback, i.e. gas ejection from DM halos by SN driven winds. As detailed in Dayal et al. (2014), we build a model based on the following simple idea: the SN kinetic energy from star formation exceeding the binding energy of a halo will result in a complete loss of gas mass, quenching further star formation ('inefficient star-formers'). However, halos where the binding energy exceeds the SN kinetic energy will only lose part of their gas and continue forming stars ('efficient star-formers'). To implement this idea, we start by calculating the ejection efficiency ( f ej ∗ ) which is the the fraction of gas that must be converted into stars so that the SN ejection energy ( E SN ) equals the binding energy ( E ej ). We take $$E _ { S N } = f _ { w } \nu E _ { 5 1 } M _ { * } ( z ),$$ where M z ∗ ( ) is the newly formed stellar mass, E 51 = 10 51 ergs is the ejection energy per SN, ν = (134M glyph[circledot] ) -1 is the fraction of stars that explode as SN for the chosen Salpeter IMF between 0 1 . -100M glyph[circledot] and f w is the fraction of total SN energy that drives winds. Further, $$E _ { e j } = \frac { 1 } { 2 } [ M _ { g, i } ( z ) - M _ { * } ( z ) ] v _ { e } ^ { 2 }, \text{ \quad \ \ } ( 1 0 )$$ where M g,i ( z ) -M z ∗ ( ) implies that SN explosions have to eject the part of the initial gas mass not converted into stars, and the escape velocity v e can be expressed in terms of the halo rotational velocity ( v c ) as v e = √ 2 v c . The effective efficiency of star formation can then be expressed as f eff ∗ = min f , f [ ∗ ej ∗ ]: while galaxies hosted in large DM halos (efficient star formers) can continuously convert a fraction f ∗ of their gas into stars, smaller halos (feedback-limited systems/inefficient star formers) can form stars with a maximum efficiency f ej ∗ that decreases with decreasing halo mass. Note that this formalism maximizes the impact of internal feedback by limiting star formation in small-mass halos to be just sufficient to evacuate the remaining gas from their halos. Therefore, below we also present results (Fig. 1) which ignore internal feedback entirely, thus bracketing the expected astrophysical uncertainties. In any case, our results are driven by the relative difference between CDM and WDM, which is more robust to the astrophysical details. ## 2.4. Implementing baryonic physics into merger trees We now briefly describe how star formation and feedback prescriptions are implemented into the DM merger trees. The formalism below closely follows that presented in Dayal et al. (2014), to which we refer the interested reader for more details. Once the merger tree for each galaxy has been constructed, we proceed forward in time from the highest merger tree output redshift, z = 20. Starting from the first DM progenitor (with halo mass M 0 ) along a branch of the merger tree, we assign to it an initial gas mass M g,i ( z ) = f b ( z )(Ω b / Ω m ) M z 0 ( ), where f b ( z ) is the baryon fraction discussed in Sec. 2.2. A part of this gas mass gets converted into newly formed stellar mass M z ∗ ( ), $$M _ { * } ( z ) = f _ { * } ^ { e f f } M _ { g, i } ( z ) \frac { \Delta t } { t _ { s f } }, \text{ \quad \ \ } ( 1 1 )$$ where ∆ t is the time difference between the merger tree output at z and the successive step at z -∆ z where ∆ z = 0 05. . Further, t sf is the star formation timescale which we take to scale with the Hubble time ( t H ) at the redshift considered such that t sf ≈ 0 01 . t H ( z ). To maintain simplicity, we assume that every new stellar population has a fixed metallicity of 0 05Z . glyph[circledot] and an age of 2 Myr so that its UV luminosity (at λ = 1500 ˚ ) A can be calculated as L UV = 10 33 077 . ( M / ∗ M )ergs glyph[circledot] -1 ˚ A -1 using the population synthesis code STARBURST99 (Leitherer et al. 1999). The formation of this stellar mass results in M g,ej ( z ) of gas mass being ejected at the given redshift step: $$M _ { g, e j } ( z ) = [ M _ { g, i } ( z ) - M _ { * } ( z ) ] \frac { f _ { * } ^ { e f f } } { f _ { * } ^ { e j } }, \quad ( 1 2 )$$ where some of the initial gas mass has been converted into stars. The final gas mass, M g,f ( z ), that remains in the galaxy at the end of that redshift-step is then $$M _ { g, f } ( z ) = [ M _ { g, i } ( z ) - M _ { * } ( z ) ] \left [ 1 - \frac { f _ { * } ^ { e f f } } { f _ { * } ^ { e j } } \right ]. \quad ( 1 3 )$$ As seen from Eqn. 13, the final gas mass depends on the ratio of f eff ∗ and f ej ∗ : galaxies which form stars at an efficiency capable of ejecting the rest of the gas (i.e. f eff ∗ = f ej ∗ ) will lose all their gas mass and undergo dry mergers, contributing only stellar mass to their successor. However, galaxies forming stars at a lower efficiency than that required to eject the rest of the gas ( f eff ∗ &lt; f ej ∗ ) will only lose a part of their gas content, resulting in wet mergers, bringing in both gas and stellar mass. Fig. 1.The evolving LBG UV LFs at z glyph[similarequal] 7 -12 for the four different DM models considered, obtained by scaling the appropriate HMF with a halo mass independent star formation efficiency of f ∗ = 0 9% at . z glyph[similarequal] 7 and f ∗ = 1 3% for . z &gt; ∼ 8. In all panels, lines show theoretical results for CDM (black solid line) and WDM with particle masses of 5 keV (blue short-dashed), 3 keV (red long-dashed) and 1 5 keV (violet dot-dashed); dashed vertical lines show the 10 . σ 10 4 s integration limits of the JWST. In all panels points show observational results: (a) z glyph[similarequal] 7: Oesch et al. (2010, filled cyan squares), Bouwens et al. (2010, empty blue circles), Bouwens et al. (2011, filled yellow circles), Castellano et al. (2010, empty purple triangles), McLure et al. (2010, filled red triangles), McLure et al. (2013, empty orange circles) and Bowler et al. (2014, filled purple circles); (b) z glyph[similarequal] 8: Bouwens et al. (2010, empty blue circles), Bouwens et al. (2011, filled yellow circles), McLure et al. (2010, filled green triangles), Bradley et al. (2012, empty purple squares) and McLure et al. (2013, empty orange circles), (c) z glyph[similarequal] 9: McLure et al. (2013, empty blue circles) and Oesch et al. (2013, empty green squares) and, (d) z glyph[similarequal] 10: Bouwens et al. (2014, empty green circles); the downward pointing triangle represents the upper-limit of the z glyph[similarequal] 10 data at M UV glyph[similarequal] -19 25. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-0ed48ec4-e76f-4a8a-8c51-1a36331790f6.jpg) On the other hand, a galaxy that has progenitors inherits a certain amount of stars and gas from them following merging events. In addition, this galaxy also obtains a part of its DM (and gas) mass through smoothaccretion from the IGM: while in principle a cosmological ratio of DM and baryons can be accreted onto the halo, UVB photo-heating feedback suppresses the available gas reservoir for accretion inside the ionized IGM as explained in Sec. 2.2. Thus, the total initial gas mass in the galaxy at z is the sum of the newly accreted gas mass, as well as that brought in by its merging progenitors. This updated gas mass is then used to calculate the new stellar mass formed in the galaxy as described by Eqn. 11. The total stellar mass in this galaxy is now the sum of mass of the newly-formed stars, and that brought in by its progenitors. Our fiducial parameters are selected to match the observed UV LF. Specifically, we take f ∗ = 0 038 . and f w = 0 1 which result . in a good fit to available data at z glyph[similarequal] 7 -10 for all the four DM models considered (see Fig. 2). Roughly speaking, f w affects the faint-end slope of the UV LF where feedback is most effective, while f ∗ determines the amplitude and normalization at the bright-end where galaxies can form stars with the maximum efficiency. Although this model need not be unique in describing the observed LF, we stress again that our main conclusions are driven by the relative differences between the cosmologies, which are more robust to astrophysical uncertainties. ## 3. EARLY GALAXY EVOLUTION IN DIFFERENT DARK MATTER MODELS We now show how highz galaxy assembly varies with the DM particle mass considered, and its impact on observables including the UV LF, the M/L relation and the SMD. ## 3.1. Ultraviolet luminosity functions The evolving UV LF is the most robust piece of information available for z &gt; ∼ 7 galaxies, with the observational estimates for a number of different groups (e.g. Oesch et al. 2010; Bouwens et al. 2010, 2011; Castellano et al. 2010; McLure et al. 2010, 2013; Bowler et al. 2014; Bradley et al. 2012; Oesch et al. 2013; Bouwens et al. 2014) being in good agreement. The simplest approach to obtaining a UV LF is to scale the halo mass function Fig. 2.The evolving LBG UV LF at z glyph[similarequal] 7 -12 in different DM models, computed with our fiducial semi-analytical galaxy formation model. In all panels, lines show the results using the fiducial model that invokes a total of two redshift and mass-independent free parameters: the star formation efficiency ( f ∗ ≈ 0 04) and the fraction of SN energy driving winds ( . f w = 0 1). . In all panels lines show theoretical results for CDM (black solid line) and WDM with particle masses of 5 keV (blue short-dashed), 3 keV (red long-dashed) and 1 5 keV (violet dot-dashed); dashed vertical lines show the 10 . σ 10 4 s integration limits of the JWST. In all panels, points show observational results (see Fig. 1 for references). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-834e805a-570a-45f7-8533-52bf24baca1f.jpg) (HMF) at that redshift assuming a fixed halo mass-tolight ratio. Indeed, Schultz et al. (2014) propose that the cumulative number density of high-redshift galaxies could be used to constrain m x . We caution however that constraints on WDM obtained through such abundance matching directly rely on the assumed halo mass ↔ UV luminosity relation, which Schultz et al. (2014) take to be independent of the DM model and assume a powerlaw extrapolation towards small masses. As we shall see below, this need not be the case. Before presenting results from our complete model which includes feedback, in Fig. 1 we show UV LFs obtained simply by multiplying the HMFs by a constant mass-to-light ratio. Matching to the observations requires a halo star formation efficiency with values f ∗ = (0 9 1 3)% for . , . z = (7 8 , -10); we use f ∗ = 0 013 . for all z glyph[similarequal] 11 and 12 given the lack of data at these z . A constant halo mass ↔ UV luminosity mapping allows us to estimate which halos host observable galaxies: e.g. galaxies with M UV glyph[similarequal] -15 ( -20) reside in halos with M h glyph[similarequal] 10 8 6 . -8 8 . (10 10 8 . -11 2 . )M glyph[circledot] at z = 7 -12. From Fig. 1 we can also estimate the viability of distinguishing between different DM models. We see that the WDM LFs with m x = 3(5) keV are essentially indistinguishable from CDM down to an absolute magnitude of M UV glyph[similarequal] -15 ( -14); this is about 0.5 (1.5) magnitudes fainter than the range of the next generation of instruments such as the JWST. However, the UV LF for WDM with m x = 1 5 keV starts to 'peel-away' from the CDM . UV LF at a value of M h glyph[similarequal] 10 10 M glyph[circledot] at all z = 7 to 12, and exhibits faint-end slope values shallower than the ## TABLE 1 For the redshift shown in column 1, we show the observed faint-end slope of the UV LF (McLure et al. 2009, 2013) in column 2. Columns 3 and 4 show the faint-end slope of the fiducial UV LFs with the 1 -σ errors for CDM and 1 5 keV . WDM, respectively. The faint-end slopes for the theoretical UV LF have been computed over the absolute magnitude range -18 ≤ M UV ≤ -14 . | z | α obs | α CDM | α 1 . 5 keV | |-----|---------------------------|-------------------|-------------------| | 7 | - 1 . 90 +0 . 14 - 0 . 15 | - 1 . 96 ± 0 . 18 | - 1 . 85 ± 0 . 11 | | 8 | - 2 . 02 +0 . 22 - 0 . 23 | - 2 . 06 ± 0 . 22 | - 1 . 93 ± 0 . 13 | | 9 | - | - 2 . 21 ± 0 . 32 | - 2 . 01 ± 0 . 16 | | 10 | - | - 2 . 31 ± 0 . 45 | - 2 . 10 ± 0 . 18 | | 11 | - | - 2 . 39 ± 0 . 32 | - 2 . 22 ± 0 . 28 | | 12 | - | - 2 . 62 ± 0 . 53 | - 2 . 34 ± 0 . 44 | value of α glyph[similarequal] -2 inferred observationally (e.g. McLure et al. 2013). In spite of this peel-away, the faint-end slope values for all the four DM models explored here are equally compatible with current observations, including the deepest z glyph[similarequal] 7 8 data obtained from the Hubble Ul-, tra Deep Field 2012 (HUDF12; Ellis et al. 2013; McLure et al. 2013). With its higher sensitivity 3 , the JWST could potentially constrain the UV LF and hence α to fainter magnitudes, allowing constraints on m x . However, the UV LFs are more complex, shaped by the star-formation histories of each galaxy. While galax- 3 We use the detection limits for a 10 σ 10 4 s observation provided at http://www.stsci.edu/jwst/instruments/nircam/sensitivity/table. Fig. 3.Average stellar mass assembly of galaxies as a function of z . For the final z = 4 M ∗ value quoted in each panel, we show the stellar mass build up for the four different DM models considered: CDM (solid black line), 5 keV WDM (blue short-dashed line), 3 keV WDM (red long-dashed line) and 1 5 keV WDM (violet dot-dashed line). Gray, blue, red and purple shaded regions show the 1 . -σ dispersion for the CDM and WDM models of mass 5 3 and 1 5 keV, respectively. , . As seen, highz star formation is more rapid in WDM models. For example, z = 4 galaxies with M ∗ = 10 8 5 . M glyph[circledot] assemble 90% of their stellar masses within the previous 1.03 (0.64) Gyr in CDM (1.5 keV WDM). This younger stellar population means that for a given stellar mass, WDM galaxies are more UV luminous. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-2c608ff9-2904-46ee-98c2-4c85a8619c80.jpg) ies at the faint end of the UV LF build up most of their gas mass (and hence luminosity) by smoothly-accreting gas from the IGM due their tiny progenitors being SN feedback-limited, the gas mass build-up for galaxies at the bright end is dominated by mergers of gas-rich progenitors. Therefore, for the remainder of this paper, we use our more physical model for galaxy evolution, described in Sec. 2. The corresponding UV LFs are shown in Fig. 2, showing similar trends already noted for the simple HMF scalings in Fig. 1. While our CDM and m x = 3 5keV WDM models are consistent down , to M UV glyph[similarequal] -12 for all z glyph[similarequal] 7 -12, the 1 5 keV model . shows a dearth of galaxies fainter than the JWST limit of M UV = -16 at z ≥ 10. Although our fiducial model results are also in reasonable agreement with observations at z glyph[similarequal] 5 6, we focus at , z &gt; ∼ 7 in this paper since the differences between CDM and WDM are expected to become increasingly pronounced with increasing z . and so are more UV luminous (for a given stellar mass). Thus the dearth of small-mass halos in WDM is somewhat countered by their lower mass-to-light relation. We elaborate further on this in Sec. 3.2. Interestingly, our fiducial model based on merger histories and feedback decreases the differences between WDM and CDM LFs (see Fig. 2), compared to the simple HMF scaling shown in Fig. 1. This is due to the fact that stellar populations are on average younger in WDM, To summarise, our fiducial model shows that the evolving LBG UV LFs in WDM models with masses of m x ≥ 3 keV are indistinguishable from CDM down to M UV = -12 for z glyph[similarequal] 7 -12. However, the LBG UV LF in the 1 5 keV WDM scenario shows a shallower (by . about 0.1-0.3) faint-end slope ( α ) compared to the three other models at all z glyph[similarequal] 7 -12 as shown in Table 1; this naturally leads to a decrease (of about 0.5 dex) in the number density of faint sources ( M UV glyph[similarequal] -15 , -16) at z = 11 12. This slope difference is too small to be distin-, guishable with current data where α and the knee of the UV LF ( M UV, ∗ ) are degenerate (e.g. McLure et al. 2013; Bouwens et al. 2014). Even with its sensitivity extending down to M UV glyph[similarequal] -16 5 at these . z , it is doubtful whether the JWST will be able to accurately pin down the shape and the faint-end slope value of the UV LF and allow differentiating between WDM models with m x &lt; ∼ 2 keV and m x &gt; ∼ 2 keV. Fig. 4.Mass-to-light relation showing galaxy stellar mass as a function of UV magnitude for z glyph[similarequal] 7 -12 as marked. In each panel we show average M ∗ values for given M UV bins from our fiducial model for the four DM models considered in this work: CDM (solid black line), 5 keV WDM (blue short-dashed line), 3 keV WDM (red long-dashed line) and 1 5 keV WDM (violet dot-dashed line). At . z glyph[similarequal] 7, violet points show the values for real galaxies in the CANDELS and HUDF fields, with yellow points showing the observed medians in each UV bin as inferred by Grazian et al. (A&amp;A submitted). In each panel, dashed vertical lines show the 10 σ 10 4 s integration limits of the JWST. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-63af989a-4dda-4d76-8d84-4623f6552f01.jpg) ## 3.2. Assembling early galaxies ## 3.3. Mass to light relation We now explore the build-up of the LFs shown in the previous section. Due to the suppression of small-scale structure in WDM models, star-formation is delayed and more rapid (e.g Calura et al. 2014; Sitwell et al. 2014). We quantify this for our galaxy evolution models in Fig. 3, in which we show the stellar mass assembly histories for four different mass bins ranging from M ∗ = 10 8 5 . -10 10 M . glyph[circledot] As expected in hierarchical structure formation, the larger the final stellar mass, the earlier it started forming (i.e. with flatter assembly histories). For example, z = 4 galaxies with M ∗ = 10 10 M glyph[circledot] build up 90% of their stellar mass within the last 1.26 Gyr in CDM. Smaller galaxies with M ∗ = 10 8 5 . M glyph[circledot] in CDM take only 1.03 Gyr to build-up 90% of the stellar mass. This distinction is even more dramatic in WDM models. For example, z = 4 galaxies with M ∗ = 10 8 5 . (10 10 )M glyph[circledot] assemble 90% of their stellar masses within the previous 0.64 (1.12) Gyr, for m x =1.5 keV. The distinction of WDM with respect to CDM is most notable in the dearth of small halos, near the atomic cooling threshold (e.g. Fig. 1). The lack of these progenitor building blocks results in a sudden appearance of galaxies in WDM models, with little scatter in the assembly history. As shown in Sec. 3.1, the higher particle mass WDM models are difficult to distinguish from CDM with the assembly histories for m x ≥ 3 keV WDM models only differing from CDM in the highz tails. Indeed, stellar mass assembly histories in CDM and the 5 keV WDM model differ by less than 50 Myr, throughout the range shown in Fig. 3. In the previous section we saw that galaxies in WDM models assemble their stars more rapidly compared to CDM. This rapid assembly translates to a younger, more UV luminous stellar population. A useful observational probe of this trend is the mass to light relation, which links the total stellar mass ( M ∗ ) and the UV magnitude ( M UV ). In Fig. 4 we show the M ∗ -M UV relation for our DM models. The M ∗ -M UV relation for CDM (and m x ≥ 3 keV WDM) galaxies brighter than M UV = -15 is well fit by a power law: $$\log M _ { * } = \beta M _ { U V } + \gamma, \text{ \quad \ \ } ( 1 4 )$$ where β = -0 38 . and γ = 2 4 . -0 1 . z . This relation is in good agreement both with estimates using abundance matching (e.g. Kuhlen &amp; Faucher-Giguere 2012; Schultz et al. 2014) and direct observational estimates for LBGs (Grazian et al., A&amp;A submitted); we show the last group's results in the z = 7 panel who also find a slope of β = -0 4. . As seen from Eqn. 14, the normalisation ( γ ) of the M ∗ -M UV relation decreases with increasing z (although the slope remains unchanged), i.e. a given UV luminosity is produced by lower M ∗ galaxies with increasing z . This is due to the fact these galaxies are hosted by increasingly (with z ) rare, biased halos, farther on the exponential tail of the HMF, whose fractional growth is more rapid. While there is little difference between the M ∗ -M UV relation for CDM and m x ≥ 3 keV WDM, this relation starts diverging from the CDM one at M UV glyph[similarequal] -19 at all z = 7 -12 in the 1 5 keV WDM model. The relation . Fig. 5.The SMD as a function of redshift for the four DM models considered in this work (CDM and WDM of m x = 1 5 3 5 keV), as . , , marked. The different coloured contours show the contribution to the total SMD from galaxies brighter than the magnitude value marked in the contour (we only mark every alternate contour for clarity). In each panel the solid red line shows the SMD from galaxies that have already been detected ( M UV ≤ -18) to allow comparison with the data points: Gonz´ alez et al. (2011, filled triangles), Stark et al. (2013, filled circles) and Labb´ e et al. (2010a,b, filled squares). In each panel, the short-dashed black line shows the value of 50% of the total SMD at any z for the appropriate DM model; the long-dashed red line in each panel shows the CDM SMD integrating down to a very conservative magnitude limit of M UV = -17 for the JWST. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-3b059908-ae9e-4c76-b668-4f9773c33637.jpg) for M UV ≤ -15 for 1 5 keV is well-fit by Eqn. . 14 with β = -0 01 . z -0 34 and . γ = -0 31 . z +2 93. This steeper . M ∗ -M UV relation implies that galaxies with a given stellar mass are more UV luminous in WDM cosmologies. This trend is driven by the more rapid assembly, and associated younger, more UV luminous stellar population, as we have seen in Fig. 3. Hence, a steepening of the M ∗ -M UV relation towards faint ( M UV &gt; ∼ -19) galaxies is evidence of WDM with m x &lt; ∼ 2 keV. Using this relation to differentiate between DM models relies on accurate estimates of M ∗ values. Hence it will only be practical for relevant m x values with the advent of JWST and its improved near-infrared (NIR) data. We also caution that self-consistently estimating M ∗ from multi-band photometry should use the correct star-formation histories corresponding to each DM model. We now combine the trends noted above, showing predictions of the redshift evolution of the SMD. Integrated down to a given UV sensitivity threshold, it provides a straightforward estimate of how well upcoming observations can discriminate amongst DM models. In Fig. 5, we show that the assembly of galaxies is very similar in CDM compared to the 3 and 5keV WDM models leading to their SMD contributions from different M UV bins being almost identical: while observed galaxies ( M UV ≤ -18) make up 50% of the total SMD at z = 6, galaxies fainter by about 1.5 orders of magnitude ( M UV ≤ -14) make up 50% of the SMD at z glyph[similarequal] 9. 3.4. Stellar mass density (SMD) evolution with z The SMD, integrated to a fixed UV luminosity threshold, depends both on the number of DM halos and their star formation histories. As shown in the above sections, WDM models with m x &lt; ∼ 2 keV are fundamentally different from colder DM models, having both: (i) a dearth of low-mass DM halos, and (ii) a younger, more luminous UV population at a given stellar mass. Effects (i) and (ii) Fig. 6.Redshift evolution of the SMD for the four DM models considered in this work: CDM (black line), 5 keV WDM (blue line), 3 keV WDM (red line) and 1 5 keV WDM (violet line). . The left and right panels show the SMD from galaxies that have already been detected, i.e. M UV ≤ -18, and galaxies that are expected to be detected using a magnitude limit of M UV ≤ -16 5 for the JWST, respectively. . As seen, while the SMD measured by the JWST will be indistinguishable for CDM and WDM with m x = 3 and 5 keV, our model predicts that these three models will have formed about 3 (10) times more stellar mass per unit volume at z glyph[similarequal] 11 ( z glyph[similarequal] 13) compared to the 1 5 keV . case, providing one of the strongest hints on the nature of DM using highz galaxies. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-8a830777-b591-41b7-8ac8-32cb5a17d33a.jpg) Fig. 7.Redshift evolution of the SMD for the 1 5 keV WDM scenario. . For reference, in each panel we show results using the fiducial 1 5 keV and CDM models (solid purple and black lines, respectively) and a model with no SN feedback in the 1 5 keV WDM scenario (grey . . line). The red and blue dashed lines show 1 5 keV results obtained by varying the two free parameters (star formation efficiency threshold . f ∗ and the fraction of SN energy driving winds f w ) by 50% as compared to the fiducial model. The left and right panels show the SMD from galaxies that have already been detected, i.e. M UV ≤ -18, and galaxies that are expected to be detected using a magnitude limit of M UV ≤ -16 5 for the JWST, respectively. . As seen, varying the free parameter values only affects the normalization of the SMD with the slope remaining unchanged, specially integrating down to M UV = -16 5 (right panel). . The slope of the SMD is independent of the astrophysics implemented, presenting a robust observable to distinguish between DM models. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1102v2-figure-8c6ed1a4-8a0e-42c1-8212-cad19c4ddd86.jpg) act in opposite directions. Younger stellar populations (ii) allow smaller galaxies to be detectable at a given UV threshold, partially compensating for the dearth of corresponding halos (i). Nevertheless, effect (i) dominates, as evidenced by the piling up of M UV contours near the faint end of the 1 5 keV WDM SMDs: . fainter galaxies require lower mass halos which do not exist. Hence, the SMD evolution is steeper with z in the 1 5 keV scenario . compared to the other three DM models: while galaxies with M UV as faint as -10 contribute to the total SMD in the CDM scenario, the contribution mostly comes from M UV ≤ -14 galaxies in the 1 5 keV model since smaller . galaxies can not form due to the large free-streaming scale of this light DM particle. Indeed, at z glyph[similarequal] 9, 50% of the SMD comes from galaxies brighter than M UV = -17 in the 1 5 keV WDM model. . For ease of comparison, in Fig. 6 we show the SMD evolution for all of our DM models, together in the same panels. The SMDs are comparable for all models for galaxies brighter than M UV = -18 up to z = 10; with this bright limit, the SMD in the 1 5keV case starts . showing a steeper evolution at z &gt; 10, and is 0.4 dex lower than in the three other models at z glyph[similarequal] 12 5. . However, the situation changes integrating down by 1.5 magnitudes to M UV = -16 5, . which is a reasonable limit for the JWST. With this limit, the 1 5 keV . SMD evolution becomes steeper than the three other models as early as z glyph[similarequal] 8 and the difference becomes increasingly pronounced with z , with CDM predicting about 0.5 dex (1 dex) more stellar mass per unit volume at z glyph[similarequal] 11 ( z glyph[similarequal] 13). The z -evolution of the SMD can be parameterised as log( SMD ) = γ (1 + z ) + δ where we find ( γ, δ ) = ( -0 44 . , 10 3) . and ( -0 63 11 9) . , . for CDM and the m x = 1 5 keV WDM, respectively. . With its stepper slope, the z -evolution of global quantities like the SMD will be instrumental in differentiating the standard CDM from WDM models that invoke particles lighter then 2 keV. Finally, we show the impact of the free parameter values on the z -evolution of the SMD. We re-calculate the SMD in the 1 5 keV by varying . f ∗ and f w by 50%, in addition to running our model with no SN feedback ( f w = 0). As shown in Fig. 7, varying the two model free parameters only affects the normalization of the SMD. While the slope varies slightly for galaxies brighter than M UV = -18 (left panel), the slope maintains its value of -0 63 . quoted above integrating down to a limit of M UV = -16 5. . This shows that the slope of the SMD is unaffected by astrophysical uncertainties on integrating down to magnitudes accessible by the JWST , and offers a robust method of distinguishing between CDM and WDM models. ## 4. CONCLUSIONS The standard ΛCDM cosmological model has been extremely successful at explaining the large scale structure of the Universe. However, it faces a number of problems on small scales (e.g. the number of satellite galaxies and the DM halo profiles) that can potentially be solved by invoking warm dark matter (WDM) comprised of low mass (keV) particles. Since WDM smears-out power on small scales, it effects are expected to be felt most strongly on the number densities and the assembly history of the earliest (low mass) galaxies that formed in the Universe. Here we explore how current and upcoming observations of highz ( z &gt; ∼ 7) LBGs can constrain the mass of WDM particles. We consider four different DM scenarios: CDM and WDM with m x = 1 5 3 and 5 keV. . , Building on DM merger trees, our galaxy formation model includes the key baryonic processes of star formation, feedback from both supernovae (SN) explosions and photo-heating from reionization, and the merger, accretion and ejection driven growth of stellar and gas mass. Below we summarize our main results. We find that the observed UV LF ( M UV &lt; ∼ -17) is equally well-fit by all four DM models for a maximum star formation efficiency of 3 8%, with 10% of SN energy . driving winds ( f ∗ = 0 038 and . f w = 0 1). . However, the 1 5 keV WDM UV LF starts to peel-away from the . other three (which are identical down to M UV = -12 for z = 7 -12) for M UV &gt; ∼ -16 at z ≥ 10. It exhibits a shallower faint-end slope ( α ) by about 0.1-0.3 and and shows a drop of about 0.5 dex in the number density at M UV glyph[similarequal] -15 , -16 at z = 11 -12. Given the small differences, even with its capabilities of constraining the shape of the UV LF down to M UV glyph[similarequal] -16 the JWST will be hard pressed to obtain constraints on whether m x &gt; ∼ 2 keV or m x &lt; ∼ 2 keV, solely using the UV LF. M/L relation for CDM (and m x ≥ 3 keV WDM) is wellfit by the functional form log M ∗ = -0 38 . M UV +2 4 . -0 1 . z , the M/L ration for the 1 5 keV WDM starts diverg-. ing from this relation at M UV = -19 at z glyph[similarequal] 7, with a z -evolution in both the slope and normalisation. The lower M/L ratios in the 1 5 keV scenario partially com-. pensates for the dearth of low mass halos, as a result of which the UV LFs predicted by our semi-analytic galaxy evolution model are more similar than simple estimates based on scaling of the halo mass functions. Finally we estimate the redshift evolution of the SMDs, which provide a more direct probe of the mass assembly history (albeit requiring accurate multi-band photometry). Integrating down to a limit of M UV glyph[similarequal] -16 5 . (corresponding to a conservative JWST threshold), we find that the 1.5 keV WDM SMDs evolve more rapidly with redshift than those predicted by CDM. Specifically, we find log( SMD ) ∝ -0 44(1 + . z ) for CDM, with a steeper slope of log( SMD ) ∝ -0 63(1 + . z ) for WDM with m x = 1 5 keV. Indeed, CDM predicts about 3 (10) . times more stellar mass per unit volume as compared to the 1 5 keV scenario at . z glyph[similarequal] 11 (13) integrating to magnitudes of M UV glyph[similarequal] -16 5. We also show that the astrophys-. ical parameters only affect the normalization of the SMD, with the slope being independent of the free parameter values integrating down to magnitudes of M UV glyph[similarequal] -16 5. . Maio &amp; Viel (2015) have used cosmological hydrodynamical simulations that include sub-grid treatments of star formation and feedback, metal-line cooling and a metallicity dependent initial mass function, in addition to following the detailed chemical enrichment of early galaxies. Interestingly, in spite of their very different approach, these authors find a similar result, namely that global quantities such as the SMD and specific star formation rate will provide powerful probes of the nature of DM at these early cosmic epochs. To conclude, we find that the build up of observable highz galaxies is similar in CDM as compared to WDM models with m x ≥ 3 keV. However, structure formation (and hence the baryonic assembly) is delayed and subsequently proceeds notably faster for m x &lt; ∼ 2 keV than for CDM. We expect the corresponding rapid redshift evolution of the SMD to be detectable with the upcoming JWST , providing a powerful testbed for WDM models. ## ACKNOWLEDGMENTS The suppression of small scale structure leads to delayed and more rapid stellar assembly in the 1 5 keV . WDM scenario (compared to the three other models) which results in galaxies of a given stellar mass being more UV luminous, i.e. a lower M/L ratio. While the PD acknowledges the support of the Addison Wheeler Fellowship awarded by the Institute of Advanced Study at Durham University and of the European Research Council and thanks M. Haehnelt, A. Mazumdar, R. McLure and M. Viel for useful discussions. The authors thank A. Grazian and co-authors for allowing us to use their results and for their instructive comments. ## REFERENCES Benson, A. J. et al. 2013, MNRAS, 428, 1774 Blumenthal, G. R., Pagels, H., &amp; Primack, J. R. 1982, Nature, 299, 37 Bode, P., Ostriker, J. P., &amp; Turok, N. 2001, ApJ, 556, 93 Borgani, S., &amp; Guzzo, L. 2001, Nature, 409, 39 Bouwens, R. J. et al. 2010, ApJ, 725, 1587 -. 2011, ApJ, 737, 90 -. 2014, ArXiv:1403.4295 Bowler, R. A. A. et al. 2014, MNRAS, 440, 2810 Boylan-Kolchin, M., Bullock, J. S., &amp; Kaplinghat, M. 2012, MNRAS, 422, 1203 Bradley, L. D. et al. 2012, ApJ, 760, 108 Calura, F., Menci, N., &amp; Gallazzi, A. 2014, MNRAS, 440, 2066 Castellano, M. et al. 2010, A&amp;A, 524, A28 Cole, S. et al. 2005, MNRAS, 362, 505 - Dayal, P., Ferrara, A., Dunlop, J., &amp; Pacucci, F. 2014, ArXiv:1405.4862 - de Souza, R. S., Mesinger, A., Ferrara, A., Haiman, Z., Perna, R., &amp; Yoshida, N. 2013, MNRAS, 432, 3218 de Vega, H. J., &amp; Sanchez, N. G. 2010, MNRAS, 404, 885 -. 2012, Phys. Rev. D, 85, 043517 - Ellis, R. S. et al. 2013, ApJ, 763, L7 - Fixsen, D. J., Cheng, E. S., Gales, J. M., Mather, J. C., Shafer, R. A., &amp; Wright, E. L. 1996, ApJ, 473, 576 - Garrison-Kimmel, S., Rocha, M., Boylan-Kolchin, M., Bullock, J., &amp; Lally, J. 2013, ArXiv e-prints - Gonz´ alez, V., Labb´, I., Bouwens, R. J., Illingworth, G., Franx, e M., &amp; Kriek, M. 2011, ApJ, 735, L34 - Gonz´ alez, V., Labb´, I., Bouwens, R. J., Illingworth, G., Franx, e M., Kriek, M., &amp; Brammer, G. B. 2010, ApJ, 713, 115 Hinshaw, G. et al. 2013, ApJS, 208, 19 - Kang, X., Macci`, A. V., &amp; Dutton, A. A. 2013, ApJ, 767, 22 o Klypin, A., Kravtsov, A. V., Valenzuela, O., &amp; Prada, F. 1999, ApJ, 522, 82 - Kuhlen, M., &amp; Faucher-Giguere, C.-A. 2012, MNRAS, 423, 862 Labb´ e, I. et al. 2010a, ApJ, 716, L103 -. 2010b, ApJ, 708, L26 - Lange, A. E. et al. 2001, Phys. Rev. D, 63, 042001 - Leitherer, C. et al. 1999, ApJS, 123, 3 - Macci` o, A. V., Paduroiu, S., Anderhalden, D., Schneider, A., &amp; Moore, B. 2012, MNRAS, 424, 1105 - Maio, U., &amp; Viel, M. 2015, MNRAS, 446, 2760 - McLure, R. J., Cirasuolo, M., Dunlop, J. S., Foucaud, S., &amp; Almaini, O. 2009, MNRAS, 395, 2196 - McLure, R. J. et al. 2013, MNRAS, 432, 2696 - McLure, R. J., Dunlop, J. S., Cirasuolo, M., Koekemoer, A. M., Sabbi, E., Stark, D. P., Targett, T. A., &amp; Ellis, R. S. 2010, MNRAS, 403, 960 - Moore, B., Ghigna, S., Governato, F., Lake, G., Quinn, T., Stadel, J., &amp; Tozzi, P. 1999a, ApJ, 524, L19 Moore, B., Quinn, T., Governato, F., Stadel, J., &amp; Lake, G. 1999b, MNRAS, 310, 1147 Navarro, J. F., Frenk, C. S., &amp; White, S. D. M. 1997, ApJ, 490, 493 Oesch, P. A. et al. 2010, ApJ, 709, L16 -. 2013, ApJ, 773, 75 Pacucci, F., Mesinger, A., &amp; Haiman, Z. 2013, MNRAS, 435, L53 Papastergis, E., Martin, A. M., Giovanelli, R., &amp; Haynes, M. P. 2011, ApJ, 739, 38 Parkinson, H., Cole, S., &amp; Helly, J. 2008, MNRAS, 383, 557 Planck Collaboration, . 2013, ArXiv e-prints:1303.5076 Planck Collaboration et al. 2013, ArXiv e-prints:1303.5062 Schaerer, D., &amp; de Barros, S. 2010, A&amp;A, 515, A73 Schultz, C., O˜orbe, J., Abazajian, K. N., &amp; Bullock, J. S. 2014, n ArXiv:1401.3769 Sheth, R. K., &amp; Tormen, G. 1999, MNRAS, 308, 119 Sitwell, M., Mesinger, A., Ma, Y.-Z., &amp; Sigurdson, K. 2014, MNRAS, 438, 2664 Slosar, A. et al. 2013, J. Cosmology Astropart. Phys., 4, 26 Sobacchi, E., &amp; Mesinger, A. 2013, MNRAS, 432, L51 Somerville, R. S. 2002, ApJ, 572, L23 Stark, D. P., Ellis, R. S., Bunker, A., Bundy, K., Targett, T., Benson, A., &amp; Lacy, M. 2009, ApJ, 697, 1493 Stark, D. P., Schenker, M. A., Ellis, R., Robertson, B., McLure, R., &amp; Dunlop, J. 2013, ApJ, 763, 129 Subramanian, K., Cen, R., &amp; Ostriker, J. P. 2000, ApJ, 538, 528 Teyssier, R., Pontzen, A., Dubois, Y., &amp; Read, J. I. 2013, MNRAS, 429, 3068 Viel, M., Becker, G. D., Bolton, J. S., &amp; Haehnelt, M. G. 2013, Phys. Rev. D, 88, 043502 - Yabe, K., Ohta, K., Iwata, I., Sawicki, M., Tamura, N., Akiyama, M., &amp; Aoki, K. 2009, ApJ, 693, 507
10.1088/0004-637X/806/1/67
[ "Pratika Dayal", "Andrei Mesinger", "Fabio Pacucci" ]
2014-08-05T20:05:16+00:00
2015-05-07T09:45:37+00:00
[ "astro-ph.GA", "astro-ph.CO" ]
Early galaxy formation in warm dark matter cosmologies
We present a framework for high-redshift ($z \geq 7$) galaxy formation that traces their dark matter (DM) and baryonic assembly in four cosmologies: Cold Dark Matter (CDM) and Warm Dark Matter (WDM) with particle masses of $m_x =$ 1.5, 3 and 5 ${\rm keV}$. We use the same astrophysical parameters regulating star formation and feedback, chosen to match current observations of the evolving ultra violet luminosity function (UV LF). We find that the assembly of observable (with current and upcoming instruments) galaxies in CDM and $m_x \geq 3 {\rm keV}$ WDM results in similar halo mass to light ratios (M/L), stellar mass densities (SMDs) and UV LFs. However the suppression of small-scale structure leads to a notably delayed and subsequently more rapid stellar assembly in the $1.5 {\rm keV}$ WDM model. Thus galaxy assembly in $m_x \leq 2 {\rm keV}$ WDM cosmologies is characterized by: (i) a dearth of small-mass halos hosting faint galaxies; and (ii) a younger, more UV bright stellar population, for a given stellar mass. The higher M/L ratio (effect ii) partially compensates for the dearth of small-mass halos (effect i), making the resulting UV LFs closer to CDM than expected from simple estimates of halo abundances. We find that the redshift evolution of the SMD is a powerful probe of the nature of DM. Integrating down to a limit of $M_{UV} =-16.5$ for the James Webb Space Telescope (JWST), the SMD evolves as $\log$(SMD)$\propto -0.63 (1+z)$ in $m_x = 1.5 {\rm keV}$ WDM, as compared to $\log$(SMD)$\propto -0.44 (1+z)$ in CDM. Thus high-redshift stellar assembly provides a powerful testbed for WDM models, accessible with the upcoming JWST.
1408.1104v2
## HOMOTOPY EQUIVALENCE FOR PROPER HOLOMORPHIC MAPPINGS JOHN P. D'ANGELO AND JI ˇ´ I LEBL R Abstract. We introduce several homotopy equivalence relations for proper holomorphic mappings between balls. We provide examples showing that the degree of a rational proper mapping between balls (in positive codimension) is not a homotopy invariant. In domain dimension at least 2, we prove that the set of homotopy classes of rational proper mappings from a ball to a higher dimensional ball is finite. By contrast, when the target dimension is at least twice the domain dimension, it is well known that there are uncountably many spherical equivalence classes. We generalize this result by proving that an arbitrary homotopy of rational maps whose endpoints are spherically inequivalent must contain uncountably many spherically inequivalent maps. We introduce Whitney sequences, a precise analogue (in higher dimensions) of the notion of finite Blaschke product (in one dimension). We show that terms in a Whitney sequence are homotopic to monomial mappings, and we establish an additional result about the target dimensions of such homotopies. AMSClassification Numbers : 32H35, 32H02, 32M99, 32A50, 55P10, 30J10, 14P10. Key Words : Proper holomorphic mappings, homotopy equivalence, spherical equivalence, unit sphere, CR Geometry, Blaschke product. ## 1. Introduction This paper considers proper holomorphic mappings between balls in possibly different dimensional complex Euclidean spaces. Two notions of equivalence (spherical and norm) for such maps have been extensively used. See for example [Fa], [F2], [H], [HJ], [L], [D], [D3], [R], [DL2]. The purpose of this paper is to introduce and investigate a natural but subtle third notion, homotopy equivalence, which is more useful for some purposes. Homotopy equivalence itself has several possible definitions, each of which is useful in different contexts. The one-dimensional situation for homotopy equivalence is precise, beautiful, and easy to describe. See Proposition 2.1. It is natural to attempt to generalize that result to higher dimensions. Theorem 5.1 provides one precise analogue of Proposition 2.1. Several crucial differences arise, however, which we confront in this paper. Let C n denote complex Euclidean space and let B n denote the unit ball in C n . A holomorphic map f : B n → B N is proper if and only if, for each compact subset K of the target ball, the inverse image f -1 ( K ) is compact in the domain ball. The basic properties of homotopy developed in this paper do not depend on regularity assumptions of the mappings at the boundary. Definitions 2.1, 2.2, and 2.3 introduce the various notions of homotopy. One of the key issues, motivating Definition 2.3, allows a homotopy between maps whose target dimensions differ. Proposition 2.4 shows that any pair of proper maps from the same ball are homotopy equivalent in target dimension M when M is sufficiently large. Placing restrictions on M then fits nicely into the general philosophy of complexity theory in CR Geometry. In particular, given proper maps f and g with the same domain ball, there is a minimal M for which f and g are homotopy equivalent in target dimension M . Computing this dimension for explicit rational maps seems to be difficult. When the domain dimension is at least 2, a proper mapping between balls that is smooth up to the boundary must be, by a well-known theorem of Forstneric [F1], a rational mapping. It is therefore important also to consider homotopies where all the maps in the family are rational (Definition 2.2). Example 2.1 is striking; it shows that the degree of a family of rational proper mappings between balls is not a homotopy invariant. Theorem 5.1 provides large classes of homotopic proper rational maps (terms of Whitney sequences) for which the degree need not be a homotopy invariant and clarifies Example 2.1. The proof of this result illuminates a fundamental distinction between the one-dimensional case and the general case. A finite Blaschke product of degree d is the d -th term of a Whitney sequence; in domain dimension at least two, however, the d -th term of a Whitney sequence can be of degree less than d . Furthermore, in the higher dimensional case, there exist rational proper mappings between balls that are not terms of Whitney sequences. Theorem 3.1 gives a finiteness result: for n ≥ 2 and N fixed, the set of homotopy classes of rational proper maps from B n to B N is finite. Theorem 3.1 is useful, because, by contrast, the number of distinct spherical equivalence classes is infinite in general. Theorem 3.2 and Corollary 3.1 decisively illustrate the distinction between homotopy and spherical equivalence. Given two rational but spherically inequivalent maps, a homotopy between them must contain uncountably many spherically inequivalent maps. It follows that the four maps of Faran from B 2 to B 3 are not homotopic through rational maps in target dimension three, although they are homotopic in target dimension five. This particular result provides a new method for establishing that two rational proper maps are homotopically inequivalent through rational maps. To further illuminate the situation for rational homotopies, in section 4 we connect our discussion to the so-called X -variety. The method for computing this variety from [D1] enables us to compute it simultaneously for all the maps in a rational homotopy. The first author acknowledges support from NSF Grants DMS 1066177 and DMS 1361001. The second author acknowledges support from NSF Grant DMS 1362337. Both authors acknowledge AIM. We put the finishing touches on this paper at an AIM workshop in 2014, and discussed related ideas at an earlier AIM workshop. ## 2. definitions and basic properties of homotopy equivalence We will denote the squared Euclidean norm on C n by || || 2 without indicating the dimension. A holomorphic map f : B n → B N is proper if and only if || f ( z ) || 2 tends to 1 when || z || 2 tends to 1. It follows by standard complex analysis that N ≥ n . It is also easy to see that the composition of proper mappings between balls is itself proper. Let U n ( ) denote the group of unitary transformation of C n . Such transformations are of course the simplest examples of automorphisms of B n . We note that U n ( ), as a connected Lie group, is path connected. Proper maps f and g between balls are spherically equivalent if there are automorphisms φ (of the domain ball) and χ (of the target ball) such that g = χ ◦ f ◦ φ . Proper maps f and g are norm equivalent if || f || 2 = || g || 2 as functions; this concept provides an equivalence relation for maps with possibly different target dimensions. When the target dimensions are the same, norm equivalence is a special case of spherical equivalence in which the domain automorphism is the identity and the target automorphism is unitary. Let f be a holomorphic mapping with values in C N . Its embedding dimension is the number of linearly independent components of f . An equivalent definition is the rank of the function || f || 2 ; in other words, the smallest possible number of terms in this squared norm. At least three versions of homotopy equivalence between proper maps are sensible. In some situations we assume that f and g have the same target dimension, whereas in others we allow the target dimensions to differ. We also sometimes wish to demand that the maps in the family have an additional property, such as rationality. By Proposition 2.4, given proper maps f and g with the same domain ball, there is a minimal M for which f and g are homotopy equivalent in target dimension M . Consider a continuous function H : B n × [0 , 1] → C N which is assumed to be holomorphic in the first variable. We write H t for the map z → H z,t ( ). Since H t : B n → C N is a holomorphic mapping, it can be written as a power series $$H _ { t } ( z ) = \sum \mathbf c _ { \alpha } ( t ) z ^ { \alpha } & & ( 1 ) \\ \intertext { a. s. \dots \dots \dots } \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \delta \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dclots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \ dclots \, \dclots \, \dclots \, \dclots \, \dclots \, \dclclots \, \dclclots \, \dclclclots \, \dclclclots \, \dclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclcclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclcl|clclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclip clipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclipclip</$$ in B n . The series, which we have expressed in multi-index notation, converges uniformly on compact subsets of B n . It follows (see Proposition 3.2) that each of these coefficients c α depends continuously on t , and we say that H t is a continuous family . In our homotopy considerations, we assume, for each t , that H t is a proper mapping between balls. We introduce the following definitions of the various homotopy equivalences. Definition 2.1. Let f, g : B n → B N be proper holomorphic mappings. Then f and g are homotopic if, for each t ∈ [0 , 1] there is a proper holomorphic mapping H t : B n → B N such that: - · H t is a continuous family. - · H 0 = f and H 1 = g . Definition 2.2. Let f, g : B n → B N be proper holomorphic mappings. Then f and g are homotopic through rational maps if, for each t ∈ [0 , 1] there is a proper holomorphic mapping H t : B n → B N such that: - · H t is a continuous family. - · H 0 = f and H 1 = g . - · Each H t is a rational mapping. When n ≥ 2 in Definition 2.2, we can replace the condition of rationality by demanding that each H t be smooth on the closed ball. See Section 4. The third definition is required for a full understanding. It is sometimes important to identify a proper map f between balls with the map f ⊕ 0 = ( f, 0). We write f ∼ ( f ⊕ 0). These maps are norm-equivalent, but they are not spherically equivalent because the target dimensions differ. In this way we take advantage of the natural injection of a target ball into a ball in higher dimensions. Definition 2.3. Let f : B n → B N 1 and g : B n → B N 2 be proper holomorphic mappings. Then f and g are homotopic in target dimension k if, for each t ∈ [0 , 1] there is a proper holomorphic mapping H t : B n → B k such that: - · H t is a continuous family. - · H 0 ∼ f ⊕ 0 and H 1 ∼ g ⊕ 0. It is evident that each of the notions of homotopy equivalence is an equivalence relation. We briefly motivate Definition 2.3. Given the target dimensions N and K , and a larger integer M , we have natural injections j 1 : C N → C M and j 2 : C K → C M each given by j ( ζ ) = ( ζ, 0). The definition asks that the maps j 1 ◦ f and j 2 ◦ g be homotopy equivalent. Consider the simple example H t : B 1 → B 2 given by $$H _ { t } ( z ) = ( t z, \sqrt { 1 - t ^ { 2 } } z ^ { 2 } ). \\ 1 \, H _ { 0 } ( z ) \, = \, ( 0, z ^ { 2 } ). \ \text{ Note that } ( z ^ { 2 }$$ Then H 1 ( z ) = ( z, 0) and H 0 ( z ) = (0 , z 2 ). Note that ( z 2 , 0) = U (0 , z 2 ) for some unitary U . We would like to say that z and z 2 are homotopic in target dimension 2, and hence we naturally identify z with ( z, 0) and z 2 with ( z 2 , 0). The following decisive result in one dimension holds: Proposition 2.1. Suppose f : B 1 → B 1 is proper holomorphic. Then there is a unique positive integer m such that f is homotopic in dimension 1 to the map z → z m . ↦ Proof. It is well-known that each proper holomorphic self-map of the unit disk is a finite Blaschke product: $$f ( z ) = e ^ { i \theta } \prod _ { j = 1 } ^ { m } \frac { z - a _ { j } } { 1 - \overline { a } _ { j } z }. & & ( 2 ) \\ \cdot \alpha \, \text{in} \, ( \mathfrak { m c tifico} \, | \alpha \, | \times 1 \ T h o c o \, \text{nointe noad not to do distinct}$$ For each j , the point a j in (2) satisfies | a j | &lt; 1. These points need not be distinct. For t ∈ [0 , 1], define H t by replacing θ in (2) with (1 -t ) θ and each a j in (2) with (1 -t ) a j . Then each H t is proper, H 0 = f and H 1 = z m . The continuity in t is evident. Hence f is homotopic to z m , where m is the degree of the Blaschke product. Next we note the uniqueness. The maps z m and z d cannot be homotopic if m = d because we can recover the exponent m by a line integral: $$m = \frac { 1 } { 2 \pi i } \overset { \cdot } { \int } _ { | z | = 1 } \frac { f ^ { \prime } ( z ) } { f ( z ) } \overset { \cdot } { d z }.$$ /negationslash As usual, an integer-valued continuous function is locally constant. /square The number m is the degree of the rational function f ; it is also the degree of the divisor defining the zero-set of f . Perhaps the most surprising result of this paper is that the degree of a proper rational mapping between balls is not invariant under homotopy. The following example illustrates this point and suggests ideas from the last section of the paper. Example 2.1. We define proper polynomial maps f, g from B 2 to B 5 . Both these maps have embedding dimension 5. These maps are of different degree but they are homotopic in target dimension 5. $$f ( z, w ) = ( z, z w, z w ^ { 2 }, z w ^ { 3 }, w ^ { 4 } ).$$ $$g ( z, w ) = ( - w ^ { 2 }, z w, - z w ^ { 2 }, z ^ { 2 } w, z ^ { 2 } ). & \\ \text{and } a & \text{ is a monomial man with five distinct mo}$$ Since each of f and g is a monomial map with five distinct monomials, the embedding dimension in each case is 5. We check that they are endpoints of a oneparameter family of proper maps. First define a proper map h : B 2 → B 3 by h z, w ( ) = ( z, zw, w 2 ). Next define a unitary matrix U on C 3 by $$\mu _ { \lambda } ^ { \lambda } \\ U = \begin{pmatrix} \cos ( \theta ) & 0 & - \sin ( \theta ) \\ 0 & 1 & 0 \\ \sin ( \theta ) & 0 & \cos ( \theta ) \end{pmatrix}.$$ Finally let W : B 3 → B 5 be the Whitney map defined by Put t = cos( θ ). Define H t by H t = W ◦ U ◦ h ; then H t : B 2 → B 5 . Since the composition of proper maps is proper, each H t : B 2 → B 5 is proper. Writing c for cos( θ ) and s for sin( θ ), we obtain $$\zeta & \to ( \zeta _ { 1 }, \zeta _ { 2 }, \zeta _ { 1 } \zeta _ { 3 }, \zeta _ { 2 } \zeta _ { 3 }, \zeta _ { 3 } ^ { 2 } ). \\ \tau & \colon.. \ t r = \tau \ = \tau \ = \tau \ = \tau \ = \tau \ = \tau \.. \ t r$$ $$H _ { t } ( z, w ) = ( c z - s w ^ { 2 }, z w, ( c z - s w ^ { 2 } ) ( s z + c w ^ { 2 } ), z w ( s z + c w ^ { 2 } ), ( s z + c w ^ { 2 } ) ^ { 2 } ). \quad ( 3 ) \\ \intertext { w n \dots \, \tau \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha. \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha \, \colon \, - \, \alpha$$ When t = 0 in (3) we obtain f and when t = 1 in (3) we obtain g . Other natural numerical invariants such as the maximum number of inverse images of a point also fail to be invariant under homotopy. /negationslash Remark 2.1 . In Example 2.1, the maximum number of inverse images of a point is not a homotopy invariant, even though all maps in the family have the same embedding dimension. Note that f -1 (0 , 0 0 0 , , , a ) has four points for a = 0. No point in the image of g has more than two inverse images. The next example does behave as in the one-dimensional case. Example 2.2. Each automorphism φ of B n is homotopic to the identity map. The proof is easy; each automorphism is a composition of a unitary transformation U and a linear fractional automorphism of the form $$z \rightarrow \frac { L _ { a } ( z ) - a } { 1 - \langle z, a \rangle }. \\ \text{dng continuous} \text{ on}$$ Here L a is a linear map depending continuously on a , and a is a point in the unit ball. By multiplying a by 1 -t , and deforming U into the identity, we obtain a family H t where H 0 ( z ) = φ z ( ) and H 1 ( z ) = z . The following result relates the various equivalence relations. Proposition 2.2. Let f, g : B n → B N be proper holomorphic maps. - · If f and g are norm equivalent, then they are spherically equivalent. The converse fails. - · If f and g are spherically equivalent, then they are homotopy equivalent. The converse fails. Proof. By [D], the equality || f || 2 = || g || 2 implies that there is a unitary map U such that g = Uf and hence f and g are spherically equivalent. The converse fails: if f is the identity and g is an automorphism which moves the origin, then f and g are spherically equivalent but not norm equivalent. Consider the second statement. Suppose there are automorphisms χ and φ for which g = χ ◦ f ◦ φ . We may then deform each automorphism as in Example 2.2 to obtain a homotopy between f and g . The converse fails: consider a Blaschke product f with three distinct factors. By Proposition 2.1, f is homotopic to z 3 ; it is easy to see that f is not spherically equivalent to z 3 . The same idea works in higher dimensions upon replacing product by tensor product. /square Homotopy in the equi-dimensional case is easy. Proposition 2.1 handled the one-dimensional case. For n ≥ 2 we have: Proposition 2.3. For n ≥ 2 , let f : B n → B n be a proper holomorphic map. Then f is homotopic to the identity. Proof. By a well-known result of Pincuk, f must be an automorphism. By Example 2.2, f is homotopic to the identity. /square We note that if f and g are homotopy equivalent in target dimension M 0 , then they are homotopy equivalent in target dimension M if M ≥ M 0 . We have the following simple result, noted years ago (in different language) by the first author in [D]. The map H t in the proof of this proposition is called the juxtaposition of f and g . Proposition 2.4. Let f : B n → B N and g : B n → B K be proper holomorphic maps. Then f and g are homotopic in target dimension M if M ≥ n +max( N,K ) . Furthermore, if f and g are rational, then the same conclusion holds with homotopy replaced by homotopy through rational maps. $$| | H _ { t } ( z ) | | ^ { 2 } = ( 1 - t ^ { 2 } ) | | f ( z ) | | ^ { 2 } + t ^ { 2 } | | g ( z ) | | ^ { 2 }. \quad & ( 4 ) \\ + \tilde { \Delta } \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \alpha \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \beta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Lambda \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \Delta \colon \tilde { \Delta } }$$ Proof. First define H t by H t = √ 1 -t 2 f ⊕ tg . Then When || z || tends to one, || H z t ( ) || also does. It follows that H t is a proper mapping from B n to B N + K . The continuity in t is obvious. Formula (4) makes evident the norm equivalence at the endpoints 0 and 1. Thus f and g are homotopy equivalent in target dimension N + K . We can lower this dimension to n +max( N,K ). To do so, let I denote the identity mapping. By the same reasoning, f is homotopic to I ⊕ 0 in dimension n + N and g is homotopic to I ⊕ 0 in dimension n + K . Since homotopy is an equivalence relation, f and g are homotopic in target dimension n +max( N,K ), and hence also for any larger target dimension. When f and g are rational, the same argument provides a rational homotopy between them. /square ## 3. homotopy equivalence through rational maps (general results) In Example 3.1 below, the number of spherical equivalence classes is finite. In general this number is infinite. For example, as soon as N ≥ 2 n , there are onedimensional families of spherically inequivalent proper mappings. These mappings can be taken to be quadratic polynomials. See pages 168-169 of [D] and also [L]. Quadratic polynomial proper maps also appear in [JZ]. By contrast, when the domain dimension is at least 2, we will show in Theorem 3.1 that the number of homotopy classes for rational proper mappings, in each target dimension, is finite. Proposition 3.1. Fix integers d and n . There exists a constant B = B n,d ( ) such that the following holds: If h : B n → B N is a proper rational map of degree at most d , written as h = p q with p, q of degree at most d , where q (0) = 1 , and q is not zero on B n , then the coefficients of (the polynomials) p and q are bounded by B . Proof. Let p and q be as in the statement. Let us first show that coefficients of q are bounded. It is enough to assume that q (0) = 1 and q is nonzero on the unit ball. In one dimension, the claim follows by simply factorizing q as $$q ( z ) = \prod _ { j } \left ( 1 - z \overline { a } _ { j } \right ).$$ Then the a j are all of modulus at most 1 and the coefficients of q are in fact bounded by the largest binomial coefficient of the form ( ) d k . $$q ( \xi z ) = 1 + \xi q _ { 1 } ( z ) + \xi ^ { 2 } q _ { 2 } ( z ) + \dots + \xi ^ { d } q _ { d } ( z ). \\ \text{media} \colon & \sim \mathcal { C } \text{ has no more on } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in } \mathcal { C } \text{ in }$$ Next, in n dimensions, decompose q into homogeneous parts as q z ( ) = 1+ q 1 ( z )+ q 2 ( z ) + · · · + q d ( z ). For each z ∈ B n we have This polynomial in ξ ∈ C has no zeros on the unit disk. Therefore all its coefficients q j ( z ) are bounded by B (1 , d ) by the argument above. Hence | q z ( ) | ≤ ( d +1) B (1 , d ) for z ∈ B n . Via the Cauchy formula all the coefficients of q are bounded by some constant depending only on n and d . Next, since || h || = 1 on the unit sphere, we have for z in the unit sphere. Again via the Cauchy formula, the coefficients of p are bounded by a constant only depending on n and d . /square $$| | p ( z ) | | = | q ( z ) | \leq d B ( n, d ) \\ \omega \, \dots \, \dots \, \dots \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \omega \, \ome }$$ The proposition says that we can always find a representative p q with bounded coefficients, while at the same time normalizing with q (0) = 1 and not requiring p and q to be in lowest terms. The following set will be useful. Definition 3.1. Fix a positive integer d . Let R denote the set of polynomial maps with the following properties: $$( p, q ) \colon { \mathbf C } ^ { n } \to { \mathbf C } ^ { N } \times { \mathbf C }$$ - · The degree of q and of each component polynomial of p is at most d . - · p q : B n → B N is proper. - · q (0) = 1, and q is not zero on B n . Proposition 3.1 implies that the set R is relatively compact. Let R ∗ denote the closure of R . The first property is obviously preserved under closure. The second property is preserved because of the Hurwitz theorem; since q (0) = 1, the limit function is not identically 0, and hence never 0. The condition that p q must be a proper map need not be preserved, but we can easily identify the limits. By continuity, if ( p, q ) ∈ R ∗ , we must have || p || 2 = | q | 2 on the unit sphere. Then p q is a proper map of balls if it is nonconstant. Hence, R ∗ is a compact set that includes R and also the polynomials ( p, q ), where p q is constant. $$\sum \omega _ { j } | x _ { j } | < \infty. \\ \mathbb { d } \, \ell ^ { 1 } \text{ with weights } \omega _ { i }$$ Given a sequence { ω j } of positive weights, we let /lscript 1 ( ω ) denote the space of sequences { x j } for which We say that { x j } is in weighted /lscript 1 with weights ω j . We will use this space when the sequence is indexed by multi-indices. Let H t : B n → B N be a family of proper mappings between balls. We can expand each H t as a power series converging uniformly on compact subsets of B n . If we assume that the function t → H z t ( ) is continuous, it follows that each Taylor coefficient depends continuously on t . It also follows that the Hermitian matrix of Taylor coefficients of || H t || 2 depends continuously on t . Here we do not require the homotopies to have any regularity on the boundary. Let H t be a family of holomorphic mappings defined on the unit ball. We write $$H _ { t } ( z ) & = \sum \mathbf c _ { \alpha } ( t ) z ^ { \alpha } \\ \dots \dots \sigma & \sigma \dots \dots \sigma & \dots$$ $$\| H _ { t } ( z ) \| ^ { 2 } = \sum _ { \alpha, \beta } a _ { \alpha \beta } ( t ) z ^ { \alpha } \bar { z } ^ { \beta }.$$ Thus a αβ ( ) = t 〈 c α ( ) t , c β ( ) t 〉 . ↦ Proposition 3.2. Let H z t ( ): B n → B N be a homotopy of proper maps. The Taylor coefficients a αβ ( ) t of || H t || 2 and c α ( ) t of H t are continuous functions of t . In fact, there exist fixed weights { ω αβ } such that the map t → [ a αβ ( )] t αβ is a continuous map from [0 , 1] to /lscript 1 ( ω ) . Proof. For each α , the coefficient c α ( ) t is given by a Cauchy integral over the distinguished boundary T of a polydisc P centered at 0 whose closure lies in B n : $$\mathbf c _ { \alpha } ( t ) = \frac { 1 } { ( 2 \pi i ) ^ { n } } \int _ { T } \frac { H _ { t } ( \zeta ) } { \zeta ^ { \alpha + 1 } } d \zeta. \quad \ \ \ \ \ \ \ \ \ \ \ \ ( 9 )$$ Since H t is continuous in t , also each c α is continuous in t . Furthermore, for a constant C α , (9) yields the estimates $$| | c _ { \alpha } ( t ) - c _ { \alpha } ( s ) | | \leq C _ { \alpha } \sup _ { z \in T } | | H _ { t } ( z ) - H _ { s } ( z ) | | \quad \text{ \quad \ \ } ( 1 0 ) \\ \quad \text{ \quad \ \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \text{ \quad \ } \end{cases}$$ $$\| c _ { \alpha } ( t ) \| & \leq C _ { \alpha$$ Note that (11) holds for all t . Next consider the coefficients a αβ in the squared norm. There are constants C αβ such that $$\left \| a _ { \alpha \beta } ( t ) \right \| = \left$$ For an appropriate choice of weights ω αβ (independent of H ) we obtain that [ a αβ ] is in /lscript 1 ( ω ). Estimate $$| a _ { \alpha \beta } ( t ) - a _ { \alpha \beta } ($$ As s tends to t , sup z ∈ T || H z t ( ) -H z s ( ) || tends to zero. Therefore, for the same weights, the map t → [ a αβ ] is continuous from [0 , 1] to /lscript 1 ( ω ). /square ↦ The following lemma is used in verifying the finiteness of the homotopy classes. Given a rational family H t , for each t we can write H t = p t q t for a polynomial q t and a polynomial map p t . Since this choice is not unique, we need to establish continuity in t . Lemma 3.1. Let H t be a homotopy of rational functions of degree at most d in target dimension N . Then there exists a choice of degree d polynomial maps p t : C n → C N and q t : C n → C whose coefficients are continuous functions of t such that ↦ $$z \mapsto \frac { p _ { t } ( z ) } { q _ { t$$ is a rational proper mapping of B n to B N . Furthermore $$\begin{array} {$$ Note that the homotopy obtained in the proof is not necessarily the same as H t . Proof. Let R be as in Definition 3.1 and let R ∗ be its closure as above. Let Φ be the map from R ∗ to the weighted /lscript 1 defined by letting Φ( p, q ) be the sequence of Taylor coefficients at 0 of || p q || 2 . The map Φ is continuous, by similar estimates as in the proof of Proposition 3.2. If p q is a proper map of balls, then by [CS] p q extends holomorphically past the sphere. Thus p q has only removable singularities and stays bounded on the sphere and hence on the torus T (as defined above). Let ( p , q 1 1 ) and ( p , q 2 2 ) be two elements in R ∗ . These two elements are close together in the standard topology on R ∗ if their coefficients are close together. Write q j ( z ) = 1 -Q j ( z ), where Q j (0) = 0. Suppose Q 1 is close enough to Q 2 , such that on T $$| q _ { 1 } ( z ) q _ { 2 } ( z ) | & = | 1 - Q _ { 1 } ( z ) - Q _ { 2 } ( z ) + Q _ { 1 } ( z ) Q _ { 2 } ( z ) | > \frac { 1 } { 2 }. \\ \cdot \dots \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \end{array}$$ Then suppose that ( p , q 1 1 ) and ( p , q 2 2 ) are close enough so that on T Then $$\| p _ { 1 } ( z ) q _ { 2 } ( z ) - p _ { 2 } ( z ) q _ { 1 } ( z ) \| < \epsilon.$$ In other words, the sup norm $$\left \| \frac { p _ { 1 } ( z ) } { q _ { 1 } ( z ) } - \frac { p _ { 2 } ( z ) } { q _ { 2 } ( z ) } \right \| < 2 \epsilon. \\ \intertext { r m } \left | \right | \tilde { \nu } \right | \tilde { \nu } \right \|$$ $$\sup _ { z \in T } & \left \| \frac { p _ { 1 } ( z ) } { q _ { 1 } ( z ) } - \frac { p _ { 2 } ( z ) } { q _ { 2 } ( z ) } \right \| \\ \L \text{the difference of the coefficient}$$ ∥ ∥ can be bounded in terms of the difference of the coefficients of ( p , q 1 1 ) and ( p , q 2 2 ). Then the Taylor coefficient $$\frac { 1 } { ( 2 \pi i ) ^ { n } } \int _ { T } \frac { p ( \zeta ) / q ( \zeta ) } { \zeta ^ { \alpha + 1 } } d \zeta$$ can be bounded in terms of the sup norm of p q over T . Hence, the map Φ is continuous. Fix ( P, Q ) ∈ R ∗ . Next we consider the fiber Φ -1 ( Φ( P, Q ) ) . That is, the set of all choices ( p, q ) ∈ R ∗ , such that || p q || = || P Q || . Our homotopy H t is represented by a path γ : [0 , 1] → /lscript 1 ( ω ) given by the coefficients of || H z t ( ) || 2 . The set Φ -1 ( γ ) is closed in R ∗ and therefore compact. It is also connected: if it were disconnected it would be a union of two disjoint relatively open sets X 1 and X 2 . For every t , as the fiber is connected, Φ -1 ( γ t ( ) ) is a subset of X 1 or X 2 but not both. We could therefore obtain [0 , 1] as a union of two disjoint compact sets Φ( X 1 ) ∪ Φ( X 2 ), a contradiction. It is easy to check that the set of all ( p, q ) ∈ R ∗ with p q = P Q is convex. If || h 1 || = || h 2 || for two maps of spheres h 1 and h 2 , then there is a unitary matrix U such that h 1 = Uh 2 (see [D]), and the set of unitary matrices is connected. Therefore, the fiber Φ -1 ( Φ( P, Q ) ) is connected. The set Φ -1 ( γ ) is therefore connected. Furthermore Φ -1 ( γ ) ⊂ R . We next claim that every connected topological component of R is path connected. This fact follows by showing that R is a semialgebraic set (a set defined by polynomial equations and inequalities). The set R ∗ is an intersection of a closed real algebraic subvariety of the space of polynomials ( p, q ) of degree at most d with a polydisc of fixed radius B , and thus R ∗ is semialgebraic. The set of polynomials ( p, q ) such that p q is a constant (the set R \R ∗ ) is also a subvariety of the space of polynomials, and hence R is semialgebraic. Then there must exist a path in R from ( p , q 0 0 ) to ( p , q 1 1 ) where H 0 = p 0 q 0 and H 1 = p 1 q 1 . This path yields the desired p t and q t . /square Theorem 3.1. Let S denote the set of homotopy classes (of rational mappings and in target dimension N ) of proper rational mappings f : B n → B N . Assume that n ≥ 2 . Then S is a finite set. (For n = 1 , S is countable by Proposition 2.1.) Proof. We first need to know that a degree bound holds. That is, for n ≥ 2 and f as in the statement of the theorem, the degree of f is bounded by some expression c n, N ( ). The sharp bound is not known, [LP], but any bound will do here. For example, by [DL1] $$d \leq \frac { N ( N - 1 ) } { 2 ( 2 n - 3 ) }. \\ \text{rational proper map}$$ Let f = p q : B n → B N be a rational proper map, reduced to lowest terms, and of degree d . We may write $$p ( z ) = \sum _ { | \alpha | = 0 } ^ { d } \mathbf C _ { \alpha } z ^ { \alpha },$$ $$q ( z ) = \sum _ { | \alpha | = 0 } ^ { d } D _ { \alpha } z ^ { \alpha },$$ where C α ∈ C N and D α ∈ C . Consider the Hermitian polynomial R defined by R = || p || 2 -| | q 2 . It is of degree at most d in z and of total degree at most 2 d , and it is divisible by || z || 2 -1. A proper holomorphic mapping f of degree at most d thus determines a Hermitian form $$R ( z, \overline { z } ) = \sum _ { | \alpha |, | \beta | \leq d } c _ { \alpha \beta } z ^ { \alpha } \overline { z } ^ { \beta }$$ on the vector space of polynomials of degree at most d . Note that $$c _ { \alpha \beta } = \langle \mathbf C _ { \alpha }, \mathbf C _ { \beta } \rangle - D _ { \alpha } \overline { D } _ { \beta }. \quad & ( 1 4 ) \\ \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon$$ $$\sum _ { \beta } ( \langle \mathbf C _ { \beta + \nu }, \mathbf C _ { \beta } \rangle - D _ { \beta + \nu } \overline { D } _ { \beta } ) r ^ { 2 \beta } = 0.$$ We next find the explicit condition for the expression in (13) to vanish on the sphere. Put z j = r e j iθ j . Thus r = ( r 1 , ..., r n ) = ( | z 1 | , ..., | z n | ) and θ = ( θ , ..., θ 1 n ). Assume that (13) vanishes on the sphere. Equating Fourier coefficients shows the following: on the set S defined by ∑ r 2 j = 1, and for each multi-index ν , we have By putting x j = r 2 j we can regard these conditions as equalities on the hyperplane x j = 1. $$\sum _ { | \alpha |, | \beta | \leq d } c _ { \alpha \beta } z ^ { \alpha } \overline { z } ^ { \beta }.$$ ∑ Thus a proper holomorphic rational mapping f of degree at most d determines a Hermitian form The space of forms is a finite-dimensional real vector space V . The conditions in (10) are linear in the coefficients c αβ , and hence determine a subspace of V . The forms are restricted further because each such form must have at most N positive and exactly one negative eigenvalue. This restriction is determined by finitely many polynomial inequalities on the c αβ . Since dividing all the coefficients by the same constant does not change the proper map f , we may assume that the squared norm of the coefficients equals one. Hence (the norm equivalence class of) a proper rational map corresponds to the intersection of the unit sphere in a finitedimensional real vector space with a set described by finitely many polynomial inequalities. Such a set can have at most a finite number of components. By the lemma, each component corresponds to a collection of homotopic rational proper mappings with target dimension at most N . /square Theorem 3.2. Assume n ≥ 2 . Let H t : B n → B N be a homotopy of rational proper maps. Fix t 0 ∈ [0 , 1] . The set $$\cdot _ { \ t \sim \ t } \left \{ t \in [ 0, 1 ] \colon H _ { t } \text{ is spherically equivalent to } H _ { t _ { 0 } } \right \}$$ is closed in [0 , 1] . Proof. Let H t 0 = p 0 q 0 . We must show that the set of t for which H t is spherically equivalent to H t 0 is closed. To do so, we must determine all rational maps spherically equivalent to a given one. The degree bounds imply that the degrees of H t for t ∈ [0 , 1] are uniformly bounded by some d = d n, N ( ). Let R be as in Definition 3.1. As before, let R ∗ denote the closure of R in the space of all polynomial mappings. The set R ∗ is compact. Define Φ as in Lemma 3.1. Thus Φ : R → ∗ /lscript 1 ( ω ), and we have shown that Φ is continuous. Since R ∗ is compact, Φ is a closed map. Next we want to see the effect of composition on both sides by automorphisms. Each domain automorphism has the form for U ∈ U ( n ) and a ∈ B n . Here $$U \frac { a - L _ { a } ( z ) } { 1 - \langle z, a \rangle }$$ $$L _ { a } ( z ) = \frac { \langle z, a \rangle a } { s + 1 } + s z$$ and s 2 = 1 -|| a || 2 . Thus Aut ( B n ) can be identified with U ( n ) × B n . We compactify by allowing a to lie in the unit sphere. When || a || = 1, we see that s = 0 and $$\frac { a - L _ { a } ( z ) } { 1 - \langle z, a \rangle } = \frac { a - \langle z, a \rangle a } { 1 - \langle z, a \rangle } = a. \\ \dots \, \max \, \colon = \, \overline { \Lambda \, \dots \, \overline { \mathfrak { H } } \, \cdots } \, \dots \, \dots \, \dots \, \dots \, \dots.$$ Therefore the only new maps in Aut ( B n ) after compactification are constants. We may identify an automorphism with the linear map on C n +1 given by $$( z, w ) & \mapsto ( w a - L _ { a } z, w - \langle z, a \rangle ), \\ \dots \dots \dots$$ ↦ and the constant map with the linear map $$( z, w ) \mapsto ( a ( w - \langle z, a \rangle ), w - \langle z, a \rangle ). \\............... \cdots$$ ↦ We do the same construction in the target C N . Composition on both sides with automorphisms (and with the degenerate maps in the closure) now becomes a continuous map $$\Lambda _ { \ } T \colon \mathcal { R } ^ { * } \times \overline { A u t ( \mathbf B _ { n } ) } \times \overline { A u t ( \mathbf B _ { N } ) } \to \mathcal { R } ^ { * }. \\ \text{is continuous from a cannot eat to a cannot eat }$$ As before, the homotopy H t defines a curve γ : [0 , 1] → /lscript 1 ( ω ) given by the coefficients of || H z t ( ) || 2 . Let X denote the image This map T is continuous from a compact set to a compact set, and therefore maps closed sets to closed sets. Since the maps with || a || = 1 correspond to constant maps, the image of the automorphisms lies in R . $$\mathbf T ( ( p _ { 0 }, q _ { 0 } ) \times \overline { A u t ( \mathbf B _ { n } ) } \times \overline { A u t ( \mathbf B _ { N } ) } ). \\ \mathfrak { A }, \text{ and } X \cap \mathcal { R } \text{ is the image under } \mathbf T \text{ of all } \mathbf p$$ Then X is closed, and X ∩ R is the image under T of all projectivized maps spherically equivalent to H t 0 . The set Φ -1 ( γ ) ∩ X is compact because, as in the proof of Lemma 3.1, Φ -1 ( γ ) ⊂ R . But Φ -1 ( γ ) ∩ X is the set of projectivized maps spherically equivalent to H t 0 . Since Φ is continuous and X is closed, the set of maps in H t that are spherically equivalent to H t 0 is a closed subset of [0 , 1]. /square A homotopy between two spherically inequivalent maps must contain uncountably many spherically inequivalent maps. Corollary 3.1. Suppose H t is a homotopy of proper rational maps between balls in dimension N . If H 0 and H 1 are not spherically equivalent, then H t contains uncountably many spherically inequivalent maps. In particular, the juxtaposition J t ( f, g ) of any two spherically inequivalent rational maps always contains uncountably many inequivalent maps. Proof. Each spherical equivalence class intersects the path in a closed set, as we have shown above. The interval [0 , 1] cannot be written as a union of countably many disjoint closed sets, by Sierpinski's Theorem. Hence, if there are at least two inequivalent maps in the homotopy, then there must be uncountably many. /square Corollary 3.2. All four Faran maps from Example 3.1 below are homotopically inequivalent in target dimension 3 through rational maps. Proof. By Faran's theorem in [Fa], there are only 4 spherical equivalence classes of rational maps from B 2 to B 3 . /square Example 3.1. Here are representatives of the four spherical equivalence classes: $$f ( z, w ) = ( z, w, 0 ) & & ( 1 6. 1 )$$ $$g ( z, w ) = ( z ^ { 2 }, z w, w )$$ $$\Psi ( z, w ) & = ( z ^ { 3 }, \sqrt { 3 } z w, w ^ { 3 } ) \\ \phi ( z, w ) & = ( z ^ { 3 }, \sqrt { 3 } z w, w ^ { 3 } ).$$ $$& y \langle z, w _ { J } - \langle z, z w, w _ { J } & & \langle x. z _ { J } \\ h ( z, w ) = ( z ^ { 2 }, \sqrt { 2 } z w, w ^ { 2 } ) & & ( 1 6. 3 )$$ By Corollary 3.2, none of these maps are homotopy equivalent (through rational maps) in target dimension 3. By Proposition 2.4, all are homotopy equivalent in dimension 5. We analyze what happens in dimensions 4 and 5. The maps f and g are homotopic in dimension 4: $$H _ { t } ( z, w ) = ( \sqrt { 1 - t ^ { 2 } } z, t z ^ { 2 }, t z w, w ). \\ \text{d} \ h \text{ are homotopic in dimension } 4 \colon$$ The maps g and h are homotopic in dimension 4: $$H _ { t } ( z, w ) = ( z ^ { 2 }, \sqrt { 2 - t ^ { 2 } } z w, t w, \sqrt { 1 - t ^ { 2 } } w ^ { 2 } ). \quad & ( 1 7 ) \\ \text{s that } f, q, h \text{ are members of the same equivalence class in dimension } 4.$$ It follows that f, g, h are members of the same equivalence class in dimension 4. We suspect that φ is not, a question we posed at AIM in June 2014. Note that h and φ are homotopy equivalent in dimension 5; here is an explicit homotopy: $$H _ { t } ( z, w ) = ( t z ^ { 2 }, t w ^ { 2 }, \sqrt { 1 - t ^ { 2 } } z ^ { 3 }, \sqrt { 1 - t ^ { 2 } } w ^ { 3 }, \sqrt { 3 - t ^ { 2 } } z w ). \\ \text{us. in target dimension 5 these four mans lie in the same homotonv class. when}$$ Thus, in target dimension 5 these four maps lie in the same homotopy class, whereas in target dimension 3 they lie in 4 distinct homotopy classes. Remark 3.1 . By Corollary 3.1, the family connecting f and g in Example 3.1 consists of spherically inequivalent maps. This result also follows from an old result in [D2]. If polynomial proper maps preserve the origin and are spherically equivalent, then they must be unitarily equivalent. It is easy to check that unitary equivalence fails for the maps in Example 3.1. ## 4. Rational proper mappings between balls Example 2.1 reveals that the degree of a rational proper mapping between balls is not a homotopy invariant. It is natural to further investigate the rational case, because of the following theorem of Forstneric [F1]. One of the key tools in the proof is a variety called the X -variety of f . The method of proof involves the Schwarz reflection principle. The variety X f contains the graph of f , and Forstneric showed that this variety is rational. Assuming the map is rational, the first author developed in [D1] an efficient method for computing this variety, which we will recall and use in this section. The method allows us to understand how this variety depends on t when H t is a family of rational proper mappings. Theorem 4.1 (Forstneric 1989) . Assume n ≥ 2 . Suppose f : B n → B N is proper, holomorphic, and smooth up to the boundary. Then f is a rational mapping. By a follow-up result of Cima-Suffridge ([CS]), f extends holomorphically past the sphere. Hence, for n ≥ 2, we can identify rational proper mappings between balls with holomorphic proper mappings between balls that extend smoothly to the unit sphere. We now develop the properties of X f . Assume R z, z ( ) and r z, z ( ) are realanalytic, and { r = 0 } is a hypersurface. Suppose R vanishes on { r = 0 . } Then R z, w ( ) = 0 on the set defined by r z, w ( ) = 0. This result is known as polarization . Let f : B 1 → B 1 be proper (hence a finite Blaschke product). By polarization, if we know the value of f ( z ) for some z inside the circle, then we automatically know the value of f at the reflected point 1 z = z | z | 2 from the formula $$f ( \frac { z } { | z | ^ { 2 } } ) = \frac { 1 } { \overline { f ( z ) } } \cdot \\ \text{omotov considerat}$$ One of the difficulties in homotopy considerations is that reflection in higher dimensions is much more subtle. Suppose n ≥ 2, and that f : B n → B N is proper and smooth up to the sphere. Then f is rational and holomorphic past the sphere. What do we get from polarization and reflection? $$\langle z, w \rangle = 1 \implies \langle f ( z ), f ( w ) \rangle = 1.$$ Given z we know but this equation does not determine the value of f at the reflected point. $$\langle f ( z ), f ( \frac { z } { | | z | | ^ { 2 } } ) \rangle = 1, \\ \text{determine the value of $f$ at}$$ Definition 4.1. (Forstneric) Suppose f : B n → B N is proper. $$X _ { f } = \{ ( w, \zeta ) \in \mathbf C ^ { n } \times \mathbf C ^ { N } \, \colon \langle z, w \rangle = 1 \, \Longrightarrow \, \langle f ( z ), \zeta \rangle = 1. \} \quad \quad ( X ) \\ \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots$$ It is convenient to decree that (0 , f (0)) ∈ X f . In (X) we could insist that w lie in the domain of f , or we could allow ∞ . For us X f will be the union of the set defined by (X) with the point (0 , f (0)), assuming that f ( w ) is defined. Note that ( w, f ( w )) ∈ X f by polarization. In general X f is a proper superset of the graph. If N is minimal for f , then the fiber over a generic w will be f ( w ), but in most cases exceptional fibers exist. If N is larger than the embedding dimension of f , then the fibers are all positive-dimensional. Saying that X f equals the graph of f amounts to saying f ( w ) is the unique solution to the polarized equation. The method in [D1] uses homogenization techniques to create a matrix C w ( ) of holomorphic polynomial functions with the following properties. Suppose f : B n → B N is rational of degree d . The matrix C w ( ) has N columns. It has K n,d ( ) rows, where K n,d ( ) is the number of homogeneous monomials of degree d in n variables. Thus we can think of C w ( ) as a linear map from C N to H 0 ( P n , O ( d )). Theorem 4.2. Let f = p q : B n → B N be a proper rational holomorphic mapping. Let C w ( ) denote the linear map from above. For each nonzero w in the domain of f , we have ( w, ζ ) ∈ X f if and only if ζ -f ( w ) lies in the null space of C w ( ) . Thus X f equals the graph of f if and only if, for each nonzero w in the domain of f , the null space of C w ( ) is trivial. Furthermore, if H t is a homotopy of rational mappings, then the corresponding linear maps C t ( w ) depends continuously on t . Corollary 4.1. Let f be a rational proper holomorphic mapping between balls. For each nonzero w in the domain of f , the fiber X f ( w ) over w is the affine space f ( w ) + null space( C w ( )) . In particular, the null space of C w ( ) is trivial if and only if the fiber over w is zero-dimensional, when it is the single point f ( w ) . Corollary 4.2. Let H t be a homotopy of rational proper maps. If the X -variety of H t 0 is the graph of H t 0 , then the same holds for t near t 0 . Example 4.1. Let f : B 2 → B 4 be the group-invariant map $$\varkappa _ { 1 } \,. \, \mathcal { M } _ { 2 } \, - \, \mathcal { M } _ { 4 } \, \varkappa \, \cos \, \mathfrak { m g o u p } \, \text{invaliam} \, \mathfrak { m } _ { 2 } \\ f ( z _ { 1 }, z _ { 2 } ) = ( z _ { 1 } ^ { 5 }, \sqrt { 5 } z _ { 1 } ^ { 3 } z _ { 2 }, \sqrt { 5 } z _ { 1 } z _ { 2 } ^ { 2 }, z _ { 2 } ^ { 5 } ).$$ We compute X f as follows. Homogenize: $$( z _ { 1 } ^ { 5 }, \sqrt { 5 } z _ { 1 } ^ { 3 } z _ { 2 } ( z _ { 1 } \overline { w } _ { 1 } + z _ { 2 } \overline { w } _ { 2 } ), \sqrt { 5 } z _ { 1 } z _ { 2 } ^ { 2 } ( z _ { 1 } \overline { w } _ { 1 } + z _ { 2 } \overline { w } _ { 2 } ) ^ { 2 }, z _ { 2 } ^ { 5 } )$$ From (19) we obtain the matrix C w ( ). $$\tan tne matrix \mathcal { U } ( w ). \begin{pmatrix} 1 & 0 & 0 & 0 \\ 0 & \sqrt { 5 } \overline { w } _ { 1 } & 0 & 0 \\ 0 & \sqrt { 5 } \overline { w } _ { 2 } & \sqrt { 5 } \overline { w } _ { 1 } ^ { 2 } & 0 \\ 0 & 0 & 2 \sqrt { 5 } \overline { w } _ { 1 } \overline { w } _ { 2 } & 0 \\ 0 & 0 & \sqrt { 5 } \overline { w } _ { 2 } ^ { 2 } & 0 \\ 0 & 0 & 0 & 1 \end{pmatrix} \quad \, ( 2 0 )$$ The degree of a rational proper map between balls equals the degree of its numerator. The map C w ( ) is independent of w if and only if f is homogeneous. Suppose f t is a family, all of degree at most d , and some f t is of degree d . If all f t have embedding dimension N , then C is of size K by N . We can recover f from C . Let E , ..., E 1 N be the usual basis for C N . Then C w ( )( E k ) is the k -th component of the numerator of f , homogenized by writing 1 = 〈 z, w 〉 . Then we can dehomogenize. Example 4.2. We recall Example 2.1. Put t = cos( θ ) = c and s = sin( θ ). $$H _ { t } ( z _ { 1 }, z _ { 2 } ) =$$ ( cz 1 -sz 2 2 , z 1 z , 2 ( cz 1 -sz 2 2 )( sz 1 + cz 2 2 ) , z 1 z 2 ( sz 1 + cz 2 2 ) , ( sz 1 + cz 2 2 ) 2 ) . (21) For each t , the map H t has embedding dimension 5. When t = 1, the degree drops, and hence the degree is not a homotopy-invariant. To clarify this example, we compute the X -variety for the maps H t . Here is the matrix C w ( ): $$\begin{pmatrix} c w _ { 1 } ^ { 3 } & 0 & c s w _ { 1 } ^ { 2 } & 0 & s ^ { 2 } w _ { 1 } ^ { 2 } \\ 3 c w _ { 1 } ^ { 2 } w _ { 2 } & w _ { 1 } ^ { 2 } & 2 c s w _ { 1 } w _ { 2 } & s w _ { 1 } & 2 s ^ { 2 } w _ { 1 } w _ { 2 } \\ 3 c w _ { 1 } w _ { 2 } ^ { 2 } - s w _ { 1 } ^ { 2 } & 2 w _ { 1 } w _ { 2 } & c s w _ { 2 } ^ { 2 } + ( c ^ { 2 } - s ^ { 2 } ) w _ { 1 } & s w _ { 2 } & 2 s c w _ { 1 } + s ^ { 2 } w _ { 2 } ^ { 2 } \\ c w _ { 2 } ^ { 3 } - 2 s w _ { 1 } w _ { 2 } & w _ { 2 } ^ { 2 } & ( c ^ { 2 } - s ^ { 2 } ) w _ { 2 } & c & 2 s c w _ { 2 } \\ - s w _ { 2 } ^ { 2 } & 0 & - s c & 0 & c ^ { 2 } \end{pmatrix} \\ \text{The determinant of this matrix is } c ^ { 2 } w _ { 1 } ^ { 6 }. \text{ Thus, unless } c = 0, \text{ it is generically}$$ /negationslash The determinant of this matrix is c 2 w 6 1 . Thus, unless c = 0, it is generically invertible. When c = 0, there is an exceptional fiber when w 1 = 0. When c = 0 we have a map of degree 3; hence the rank cannot exceed 4. This example illustrates a general method for constructing homotopies, which we elaborate in the last section. ## 5. Whitney sequences Let f : B n → B N be a proper rational mapping. Let A be a subspace of C N , and let π A denote orthogonal projection onto A . Following the first author's approach from [D], we may form the new proper mapping E A ( f ), defined by $$E _ { A } ( f ) = ( \pi _ { A } f \otimes z ) \oplus ( 1 - \pi _ { A } ) ( f ). \\ \intertext { i s another somewhere of $C^{N}$ of the same dirne}$$ Suppose that B is another subspace of C N of the same dimension d as A , and A ∩ B = { 0 } . Then there is a unitary mapping U ∈ U N ( ) such that U A ( ) = B . Since the unitary group is path connected, we can find a one-parameter family of unitary mappings connecting U to the identity. It follows that the maps E A ( f ) and E B ( f ) are homotopic in dimension K , where K = N + ( d n -1). Example 2.1 is obtained via this construction. Definition 5.1. A Whitney sequence is a collection F , F 0 1 , ... of rational proper maps from B n to B N k defined as follows. Put F 0 ( z ) = φ 0 , where φ 0 is an automorphism of B n . Given F k : B n → B N k , let A k be a non-zero subspace of C n k , and let π k denote orthogonal projection onto A k . Choose an automorphism φ k of B n . Choose a linear, norm-preserving injection j k to whatever target dimension we wish. Define F k +1 ( z ) by $$F _ { k + 1 } = j _ { k } \circ \left ( ( \pi _ { k } F _ { k } \otimes \phi _ { k } ) \oplus ( 1 - \pi _ { k } ) F _ { k } \right ).$$ The degree of the rational function F k is at most k +1, but it can be smaller. The following result provides an analogue of the one-dimensional situation. Theorem 5.1. Let { F k } denote a Whitney sequence of proper mappings. Each F k is homotopic to a monomial proper mapping of degree k +1 . Proof. The idea of the proof comes from Proposition 2.1. We proceed by induction on the number of factors. When k = 0, the function F 0 is an automorphism, and hence homotopic to the identity map (a monomial map of degree 1) by Example 2.2. Suppose for some k that F k is homotopic to a monomial mapping G k of degree k +1. Find a homotopy connecting φ k to the identity. Then F k +1 is homotopic to the mapping $$G _ { k + 1 } & = ( \pi _ { k } G _ { k } \otimes z ) \oplus ( 1 - \pi _ { k } ) G _ { k }. & ( 2 3 ) \\ \mathcal { Q }, \dots & \text{if of $\partial_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho_{\rho\rho_{\rho_{\rho\r\rho_{\rho\rho_{\rho\rho_{\rho\rho\rho_{\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\ r\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\sigma\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\rho\} \ R v t h o \text{induction} }$$ Note that G k +1 if of degree k +2 if π G k k is of degree k +1. By the induction hypothesis G k is of degree k + 1. Since A k is not the trivial subspace, there is a unitary map such that π UG k k is also of degree k +1. Also (1 -π k ) G k has degree at most k +1. Since the unitary group is path-connected, UG k is homotopic to G k . Hence G k +1 is homotopic to a monomial mapping of degree k +2. /square The mappings H t in Example 2.1 are each part of a Whitney sequence. The degree is not a homotopy invariant because the tensor products are taken on different subspaces, and hence the tensor product need not increase the degree. Not every proper rational mapping is a term of a Whitney sequence. For example, even the monomial map ( z, w ) → ( z 3 , √ 3 zw, w 3 ) cannot be obtained in this fashion. One must allow also the inverse operation of replacing F k +1 in (22) with F k . The following result indicates the significance of the target dimension in the definition of homotopy. Theorem 5.2. Let F k : B n → B N be a term in a Whitney sequence. Then, F k ⊕ 0 is homotopic in target dimension N +1 to the injection z → z ⊕ 0 . Proof. We have already shown that F k is homotopy equivalent to a monomial mapping in target dimension N . Furthermore this monomial mapping is in the image of the tensor product construction. We claim that such monomial maps are always homotopically equivalent to the identity in target dimension N +1. This conclusion is trivial for maps of degree 1. For d ≥ 2, consider an arbitrary monomial mapping f of degree d , of embedding dimension N , and in the image of the tensor product operation. We will show that it is homotopic in target dimension N + 1 to a monomial mapping of degree at most d -1, of embedding dimension at most N , and also in the image of the tensor product mapping. To do so, we order the monomials of degree d lexicographically. Choose the last monomial m that occurs. Then there is a monomial q of degree d -1 such that the n monomials z q, . . . , z 1 n q include m . After renumbering we may assume that m = z n q . For some polynomial map g of degree at most d we can write $$f = g \oplus z _ { 1 } q \oplus z _ { 2 } q \oplus \cdots \oplus z _ { n } q. \quad \quad \quad ( 2 4 ) \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon$$ Now we replace the last n of these components with λ times each, and we add an ( N +1)-st component √ 1 -λ q 2 . For each λ ∈ [0 , 1] the result is a proper map to the N +1 ball. When λ = 0 we obtain a map whose last component is q and for which m no longer appears. We continue in this fashion one monomial (of degree d ) at a time, obtaining homotopies in target dimension N +1 that (in finitely many steps) eliminate all terms of degree d . Since homotopy is an equivalence relation, the composition defines a homotopy H t in target dimension N + 1. Since f is a term of a Whitney sequence, we are in the same situation as before, with d lowered. Eventually we reach a linear map and the result follows. /square More information on the tensor product operation appears, for example, in [D] and [D3]. ## 6. bibliography - [CS] J. A. Cima and T. J. Suffridge, Boundary behavior of rational proper maps. Duke Math. J. 60 (1990), no. 1, 135-138 - [D] J. P. D'Angelo, Several Complex Variables and the Geometry of Real Hypersurfaces, CRC Press, Boca Raton, Fla., 1992. - [D1] J. P. D'Angelo, Homogenization, reflection, and the X -variety, Indiana Univ. Math J. 52 (2003), 1113-1134. - [D2] J. P. D'Angelo, Proper holomorphic maps between balls of different dimensions. Michigan Math. J. 35 (1988), no. 1, 83-90. - [D3] J. D'Angelo, Proper holomorphic mappings, positivity conditions, and isometric imbedding, J. Korean Math Society , May 2003, 1-30. - [DL1] J. P. D'Angelo and Jiri Lebl, On the complexity of proper mappings between balls, Complex Variables and Elliptic Equations , Volume 54, Issue 3, Holomorphic Mappings (2009), 187-204. - [DL2] J. P. D'Angelo and J. Lebl, Complexity results for CR mappings between spheres, Int. J. of Math. , Vol. 20, No. 2 (2009), 149-166. - [Fa] James J. Faran, Maps from the two-ball to the three-ball, Invent. Math. 68 (1982), no. 3, 441-475. - [F1] F. Forstneric, Extending proper holomorphic maps of positive codimension, Inventiones Math. , 95(1989), 31-62. - [F2] F. Forstneric, Proper rational maps: A survey, Pp 297-363 in Several Complex Variables: Proceedings of the Mittag-Leffler Institute, 1987-1988 , Mathematical Notes 38, Princeton Univ. Press, Princeton, 1993. - [H] Huang, X., On a linearity problem for proper maps between balls in complex spaces of different dimensions, J. Diff. Geometry 51 (1999), no 1, 13-33. - [HJ] Huang, X., and Ji, S., Mapping B n into B 2 n -1 , Invent. Math. 145 (2001), 219-250. - [JZ] Shan Yu Ji and Yuan Zhang, Classification of rational holomorphic maps from B 2 into B N with degree 2. Sci. China Ser. A 52 (2009), 2647-2667. - [L] J. Lebl, Normal forms, Hermitian operators, and CR maps of spheres and hyperquadrics, Michigan Math. J. 60 (2011), no. 3, 603-628. - [LP] J. Lebl and Peters, H., Polynomials constant on a hyperplane and CR maps of spheres, Illinois J. Math. 56 (2012), no. 1, 155-175. [R] M. Reiter, Holomorphic Mappings of Hyperquadrics from C 2 to C 3 , PhD dissertation, Univ. of Vienna, 2014. Dept. of Mathematics, Univ. of Illinois, 1409 W. Green St., Urbana IL 61801 E-mail address : [email protected] Dept. of Mathematics, Oklahoma State Univ., Stillwater OK 74078 E-mail address : [email protected]
10.1016/j.aim.2015.09.007
[ "John P. D'Angelo", "Jiri Lebl" ]
2014-08-05T20:08:27+00:00
2015-09-21T22:33:19+00:00
[ "math.CV", "32H35, 32H02, 32M99, 32A50, 55P10, 30J10, 14P10" ]
Homotopy equivalence for proper holomorphic mappings
We introduce several homotopy equivalence relations for proper holomorphic mappings between balls. We provide examples showing that the degree of a rational proper mapping between balls (in positive codimension) is not a homotopy invariant. In domain dimension at least 2, we prove that the set of homotopy classes of rational proper mappings from a ball to a higher dimensional ball is finite. By contrast, when the target dimension is at least twice the domain dimension, it is well known that there are uncountably many spherical equivalence classes. We generalize this result by proving that an arbitrary homotopy of rational maps whose endpoints are spherically inequivalent must contain uncountably many spherically inequivalent maps. We introduce Whitney sequences, a precise analogue (in higher dimensions) of the notion of finite Blaschke product (in one dimension). We show that terms in a Whitney sequence are homotopic to monomial mappings, and we establish an additional result about the target dimensions of such homotopies.
1408.1105v3
## Van der Waals black hole Aruna Rajagopal, 1, ∗ David Kubizˇ´ ak, n 1, 2, † and Robert B. Mann 2, ‡ 1 Perimeter Institute, 31 Caroline St. N., Waterloo, Ontario, N2L 2Y5, Canada 2 Department of Physics and Astronomy, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1 (Dated: November 28, 2014) In the context of extended phase space, where the negative cosmological constant is treated as a thermodynamic pressure in the first law of black hole thermodynamics, we find an asymptotically AdS metric whose thermodynamics matches exactly that of the Van der Waals fluid. However, we show that as a solution of Einstein's equations, the corresponding stress energy tensor does not obey any of the energy conditions everywhere outside of the horizon. PACS numbers: 04.50.Gh, 04.70.-s, 05.70.Ce ## I. INTRODUCTION Due to the AdS/CFT correspondence, there has been a revival of interest in the physics of asymptotically AdS black holes in recent years; the main focus being that of understanding strongly coupled thermal field theories living on the AdS boundary. Even from a bulk perspective such black holes are quite interesting, their thermodynamics exhibiting various phase transitions. A primary example is the thermal radiation/black hole first-order phase transition observed for Schwarzschild-AdS black hole spacetimes [1]. Interestingly, when a charge and/or rotation are added, behaviour qualitatively similar to a Van der Waals fluid emerges [2-5]. This analogy becomes even more complete in the extended phase space [6, 7], where the cosmological constant is treated as a thermodynamic pressure P , $$P = - \frac { \Lambda } { 8 \pi } = \frac { 3 } { 8 \pi l ^ { 2 } } \,, \quad \quad ( 1 ) \quad \ t h \, \begin{smallmatrix} \text{$\text{ev}$} \\ \text{th} \\ \text{bo} \end{smallmatrix}$$ and is allowed to vary in the first law of black hole thermodynamics, $$\delta M = T \delta S + V \delta P + \dots, \quad \quad ( 2 ) \quad _ { \ m o } ^ { z }$$ while a quantity thermodynamically conjugate to P is interpreted as a black hole thermodynamic volume [8, 9] $$V = \left ( \frac { \partial M } { \partial P } \right ) _ { S, \dots }. \quad \quad \ \ ( 3 ) \quad \ a \colon \\ \ m \omega$$ This allows one to write down a 'black hole equation of state' P = P V,T ( ) and compare it to the corresponding fluid equation of state, while we identify the black hole and fluid temperatures T ∼ T f , the black hole and fluid volumes V ∼ V f , and the cosmological and fluid pressures P ∼ P f . ∗ [email protected][email protected][email protected] The Van der Waals fluid is described by the Van der Waals equation, which is a closed form two parameter equation of state: $$T = \left ( P + \frac { a } { v ^ { 2 } } \right ) ( v - b ) \,,$$ where v denotes the specific volume of the fluid, v = V/N with N counting fluid's degrees of freedom. The parameter a &gt; 0 measures the attraction in between the molecules of the fluid, and the parameter b measures their volume. The thermodynamics of charged and/or rotating AdS black holes have been shown to qualitatively mimic the behavior of this equation [6, 7], including the existence of a small/large black hole first-order phase transition corresponding to a liquid/gas phase transition that eventually terminates at a critical point characterized by the standard mean field theory critical exponents. In both cases, the corresponding thermodynamic potential, the Gibbs free energy, displays the swallowtail catastrophe. Although remarkable, the analogy between the thermodynamics of charged/rotating AdS black holes and that of the Van der Waals fluid is only qualitative -the corresponding equations of state are not identical and prevent one from identifying the black hole parameters such as charge Q or rotation J with the fluid parameters a and b . Unfortunately, this remains true for all other more complicated examples of black holes, possibly in higher or lower dimensions, which were found to demonstrate a qualitative Van der Waals behavior; for a recent review see [10]. In this letter we turn the logic around and construct an asymptotically AdS black hole whose thermodynamics matches exactly that of the Van der Waals fluid. We show that, as a solution of Einstein's equations, the corresponding stress energy tensor does not obey any of the three standard energy conditions everywhere outside the horizon, though for certain values of the parameters it is possible to satisfy the energy conditions in a region near the horizon. Such black holes are then likely unphysical. ## II. CONSTRUCTING THE SOLUTION In what follows we want to construct an asymptotically AdS black hole metric whose thermodynamics coincide exactly with the given fluid equation of state. For simplicity here we assume the static spherically symmetric ansatz $$d s ^ { 2 } & = - f d t ^ { 2 } + \frac { d r ^ { 2 } } { f } + r ^ { 2 } d \Omega ^ { 2 } \,, \\ f & = \frac { r ^ { 2 } } { l ^ { 2 } } - \frac { 2 M } { r } - h ( r, P ) \,, \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \end{array}$$ $$( 5 )$$ where the function h is to be determined. We further assume that such a metric is a solution of the Einstein field equations with a given energymomentum source, G ab + Λ g ab = 8 πT ab . In order the energy-momentum source be physically plausible, one should require it to satisfy certain conditions such as positivity of energy density and dominance of the energy density over pressure, known as energy conditions, e.g. [11]. Namely, the minimal requirement one should impose is the weak energy condition , demanding T ab ξ a ξ b ≥ 0 for any future-directed timelike vector ξ . Writing the stress energy tensor in an orthonormal basis, T ab = ρe e a 0 b 0 + ∑ i p e i a i e b i , where ρ stands for the energy density and p i denote principal pressures, the energy conditions imply ( i = 1 2 3) , , $$\text{Weak} \colon \quad \rho \geq 0 \,, \quad \rho + p _ { i } \geq 0 \,, \quad \ \ ( 6 ) \quad _ { \sigma \text{ive} } ^ { \text{res} }$$ Strong: Dominant: $$& \text{ong} \colon \ \rho + \sum _ { i } p _ { i } \geq 0 \,, \quad \rho + p _ { i } \geq 0 \,, \quad ( 7 ) \quad \text{$^{g}$} \\ & \text{|ant} \colon \quad \rho \geq | p _ { i } | \,. \quad \text{ \quad } ( 8 ) \quad \text{em}$$ In particular, for a metric ansatz we find (with prime denoting the derivative w.r.t. r ) $$\mu & & \rho = - p _ { 1 } = \frac { 1 - f - r f ^ { \prime } } { 8 \pi r ^ { 2 } } + P \,, & & \text{Wit} \\ p _ { 2 } & = p _ { 3 } = \frac { r f ^ { \prime \prime } + 2 f ^ { \prime } } { 1 6 \pi r } - P \,. & & \text{(9)} & & \text{have} \\ \pi \,. & \cdots & \epsilon & \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \, \pi \right.$$ Once we determine f , we shall check the corresponding energy conditions above. The ansatz (5) implies that the 'mass' of the black hole M is related to the horizon radius r + according to $$M = \frac { 4 } { 3 } \pi r _ { + } ^ { 3 } P - \frac { h ( r _ { + }, P ) r _ { + } } { 2 } \,. \quad \quad ( 1 0 ) \quad \text{$\text{$\text{$the$}$}$}$}$$ Imposing further the first law, (2), the thermodynamic volume V is determined from (3). Since the horizon area is given by A = 4 πr 2 + , we now define the black hole 'specific volume' as $$v = k \frac { V } { N } \,, \ \ N = \frac { A } { L _ { p l } ^ { 2 } } \,, \quad \ \ ( 1 1 ) \, \stackrel { \dots } { \text{len} }$$ where in accord with previous papers we set the constant (in d = 4 dimensions) to be k = 4( d -1) d -2 = 6, and interpret N as the 'number of degrees of freedom' associated with the black hole horizon, with L pl being the Planck length [6, 7, 10], giving $$v = \frac { k } { 4 \pi r _ { + } ^ { 2 } } \left [ \frac { 4 } { 3 } \pi r _ { + } ^ { 3 } - \frac { r _ { + } } { 2 } \frac { \partial h ( r _ { + }, P ) } { \partial P } \right ]. \quad ( 1 2 )$$ Since we are in Einstein gravity, the entropy and the horizon area are related as S = A/ 4. We also know that the black hole temperature reads $$T = \frac { f ^ { \prime } ( r _ { + } ) } { 4 \pi } = 2 r _ { + } P - \frac { h ( r _ { + }, P ) } { 4 \pi r _ { + } } - \frac { 1 } { 4 \pi } \frac { \partial h ( r _ { + }, P ) } { \partial r _ { + } } \,. \ ( 1 3 )$$ This can now be compared to any desired fluid equation of state, T = T v, P ( ). ## III. VAN DER WAALS BLACK HOLE The discussion in the previous section can be applied to any desired equation of state. Let us now specify to the Van der Waals case (4). That is, we compare the expression for T (13) with (4), to get $$\stackrel { s. } { s }, \quad \ \ 2 r _ { + } P - \frac { h } { 4 \pi r _ { + } } - \frac { h ^ { \prime } } { 4 \pi } - \left ( P + \frac { a } { v ^ { 2 } } \right ) ( v - b ) = 0 \,, \quad ( 1 4 )$$ where we substitute for v the expression (12). This represents a partial differential equation for h r, P ( ) which gives a solution to our problem. In particular, we find a solution of this equation by employing the following ansatz: $$h ( r, P ) = A ( r ) - P B ( r ) \,. \quad \quad ( 1 5 )$$ With this ansatz the above PDE becomes of the form F 1 ( r P ) + F 2 ( r ) = 0, where F 1 and F 2 depend on functions A and B and their derivatives. Since both these parts have to vanish separately, we get a system of two ODEs for unknown functions A and B . Solving first F 1 = 0 we find that (setting k = 6) $$B = \left ( C _ { 1 } - \frac { 8 \pi } { 3 } \right ) r ^ { 2 } + 4 \pi b r \,. \quad \quad ( 1 6 )$$ Setting now the integration constant C 1 = 8 π 3 [so that we preserve the AdS structure postulated in (5)], we find that F 2 = 0 gives a solution $$\underset { \underset { \underset { \underset { \underset { \underset { \underset { \underset { \underset { \text{p}} { p e } } { r } } { \sl } } } } } { \text{mic} } } \\ \underset { \underset { \underset { \text{p e } } { \text{pe} } } } { \text{$A=-2\pi a+\frac{3\pi a b^{2}}{r(2r+3b)}+\frac{4\pi a b}{r}$} } \log \left ( \frac { 2 r } { r _ { 0 } } + 3 \frac { b } { r _ { 0 } } \right ), \ \ ( 1 7 )$$ where r 0 is an integration constant with dimensions of length. For simplicity setting r 0 = 2 b yields $$\mu _ { \quad } & \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \ \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \mu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \quad \nu _ { \quad } \\ & f = & 2 \pi a - \frac { 2 M } { r } + \frac { r ^ { 2 } } { l ^ { 2 } } \left ( 1 + \frac { 3 } { 2 } \frac { b } { r } \right ) - \frac { 3 \pi a b ^ { 2 } } { r ( 2 r + 3 b ) }$$ for the 'Van der Waals black hole metric'. For b &lt;&lt; r this expands as $$f & = 2 \pi a - \frac { 2 M } { r } + \frac { 8 \pi P } { 3 } r ^ { 2 } \left ( 1 + \frac { 3 } { 2 } \frac { b } { r } \right ) \\ & \quad - \frac { 4 \pi a b \log ( r / b ) } { r } - \frac { 1 5 \pi a } { 2 } \frac { b ^ { 2 } } { r ^ { 2 } } + O \left [ ( b / r ) ^ { 3 } \right ]. \quad ( 1 9 ) \\ \text{Apart from the strange terms logarithmic and linear in}$$ Apart from the strange terms logarithmic and linear in r , we observe that the requirement for positivity of a , signifying the attraction in between the molecules of the fluid, implies 'spherical' horizon topology of the VdW black hole. Without loss of generality we can set a = 1 / (2 π ). ## IV. CONCLUSIONS The obtained metric (5) with f given by (18) reproduces exactly the Van der Waals equation (4) with the specific volume v , (12), given by $$v = 2 r _ { + } + 3 b \,. \quad \quad \ ( 2 0 ) \quad \stackrel { \_ \cdot } { \text{by} }$$ It is straightforward to show that the corresponding thermodynamic volume V satisfies the reverse isoperimetric inequality [12]. Unfortunately, the requirement for positivity of b implies that none of the standard energy conditions are satisfied everywhere outside of the horizon. However it is possible to satisfy the energy conditions within a region sufficiently close to the horizon provided the pressure is sufficiently small, as shown in Fig. 1. The effect of reducing the effective volume v results in adding 'exotic matter' into the spacetime. 1 We emphasize that our ansatz (15) is essentially unique. It is straightforward to check that inclusion of higher powers of P do not yield solutions consistent with the asymptotic AdS structure postulated in (5). Indeed our ansatz furnishes a general procedure for constructing a metric from a given equation of state, at least in the spherically symmetric case, and our approach can easily be extended to other dimensions. One can, for example, construct a black hole whose thermodynamics coincides with the virial expansion of equation of state to an arbitrary order. However our results also indicate that the asymptotic fall-off behaviour of the metric and matter fields will in general differ from that of standard electrovacuum and perfect fluid cases. For the particular Van der Waals case we consider here, an expansion of the stress-energy tensor 1 On the other hand, the increase of the effective volume can be achieved by adding matter that can obey all three standard energy conditions everywhere outside of the horizon. Consequently, it is easy to construct a black hole with thermodynamics mimicking the 'anti-VdW equation' T = ( P + a/v 2 )( v + ). b FIG. 1. Horizon and energy conditions. We display the energy density ρ (red curves) and the quantity ρ + p 2 (blue curves); we always have ρ + p 1 = 0. The x -axis represents the radial coordinate r , the black curves depict metric function f , which is positive everywhere outside of r + , giving rise to a black hole horizon. For large pressures P , none of the energy conditions are satisfied outside of the horizon, as illustrated by solid thick curves for P = 0 03. . As P decreases energy conditions can be satisfied in the vicinity of the black hole horizon, see dotted curves for P = 0 001. . In this figure, all dimensionful quantities are measured in units of the Van der Waals parameter b , while we have set M = 0 1 and . a = 1 2 π . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1105v3-figure-a426392a-bb1f-4a49-a9d1-411e9b11d616.jpg) at large r yields $$\mu & = - \frac { P b } { r } + \frac { 1 - 2 \pi a } { 8 \pi r ^ { 2 } } + \frac { a b } { 2 r ^ { 3 } } + \cdots, \\ p _ { 2 } & = \frac { P b } { 2 r } + \frac { a b } { 4 r ^ { 3 } } + \cdots, \\ \dots \quad \cdot \quad \cdot \quad. \quad. \quad. \quad.$$ whose corresponding (exotic) matter content remains to be found. We also remark that, apart from the logarithmic term, the obtained metric is qualitatively similar to an exact solution to the field equations of a certain class of conformal gravity theories [13] with vanishing stress-energy, affording an alternate interpretation of our results. Since the first law (2) is satisfied by (5) with f given by (18), we can regard M as a 'mass'. An independent evaluation of this mass via either conformal [14, 15] or counter term [16] methods is problematic due to the weaker subleading falloff behaviour of the metric and the stress-energy. It will be necessary to modify these approaches (somewhat along the lines of Dilaton gravity [17] or asymptotically Lifshitz metrics [18, 19]) to cancel the divergent terms that arise. ## A. Acknowledgments We would like to thank T. Delsate, P. Pani, and M.R. Setare for reading carefully our manuscript. This re- search was supported in part by Perimeter Institute for Theoretical Physics and by the Natural Sciences and Engineering Research Council of Canada. Research at Perimeter Institute is supported by the Government of - [1] S. Hawking and D. N. Page, Thermodynamics of Black Holes in anti-De Sitter Space , Commun.Math.Phys. 87 (1983) 577. - [2] A. Chamblin, R. Emparan, C. Johnson, and R. Myers, Charged AdS black holes and catastrophic holography , Phys.Rev. D60 (1999) 064018, [ hep-th/9902170 ]. - [3] M. Cvetic and S. Gubser, Phases of R charged black holes, spinning branes and strongly coupled gauge theories , JHEP 9904 (1999) 024, [ hep-th/9902195 ]. - [4] M. M. Caldarelli, G. Cognola, and D. Klemm, Thermodynamics of Kerr-Newman-AdS black holes and conformal field theories , Class.Quant.Grav. 17 (2000) 399-420, [ hep-th/9908022 ]. - [5] C. Niu, Y. Tian, and X.-N. Wu, Critical Phenomena and Thermodynamic Geometry of RN-AdS Black Holes , Phys.Rev. D85 (2012) 024017, [ arXiv:1104.3066 ]. - [6] D. Kubiznak and R. B. Mann, P-V criticality of charged AdS black holes , JHEP 1207 (2012) 033, [ arXiv:1205.0559 ]. - [7] S. Gunasekaran, R. B. Mann, and D. Kubiznak, Extended phase space thermodynamics for charged and rotating black holes and Born-Infeld vacuum polarization , JHEP 1211 (2012) 110, [ arXiv:1208.6251 ]. - [8] D. Kastor, S. Ray, and J. Traschen, Enthalpy and the Mechanics of AdS Black Holes , Class.Quant.Grav. 26 (2009) 195011, [ arXiv:0904.2765 ]. - [9] B. Dolan, The cosmological constant and the black hole equation of state , Class.Quant.Grav. 28 (2011) 125020, [ arXiv:1008.5023 ]. - [10] N. Altamirano, D. Kubiznak, R. B. Mann, and Z. Sherkatghanad, Thermodynamics of rotating black Canada through Industry Canada and by the Province of Ontario through the Ministry of Research and Innovation. - holes and black rings: phase transitions and thermodynamic volume , Galaxies 2 (2014) 89-159, [ arXiv:1401.2586 ]. - [11] E. Poisson, A Relativist's Toolkit . Cambridge University Press, 2004. - [12] M. Cvetic, G. Gibbons, D. Kubiznak, and C. Pope, Black Hole Enthalpy and an Entropy Inequality for the Thermodynamic Volume , Phys.Rev. D84 (2011) 024037, [ arXiv:1012.2888 ]. - [13] H. Lu, Y. Pang, C. Pope, and J. Vazquez-Poritz, AdS and Lifshitz Black Holes in Conformal and Einstein-Weyl Gravities , Phys.Rev. D86 (2012) 044011, [ arXiv:1204.1062 ]. - [14] A. Ashtekar and A. Magnon, Asymptotically anti-de Sitter space-times , Class.Quant.Grav. 1 (1984) L39-L44. - [15] A. Ashtekar and S. Das, Asymptotically Anti-de Sitter space-times: Conserved quantities , Class.Quant.Grav. 17 (2000) L17-L30, [ hep-th/9911230 ]. - [16] R. B. Mann, Misner string entropy , Phys.Rev. D60 (1999) 104047, [ hep-th/9903229 ]. - [17] R. B. Mann and R. McNees, Boundary Terms Unbound! Holographic Renormalization of Asymptotically Linear Dilaton Gravity , Class.Quant.Grav. 27 (2010) 065015, [ arXiv:0905.3848 ]. - [18] S. F. Ross and O. Saremi, Holographic stress tensor for non-relativistic theories , JHEP 0909 (2009) 009, [ arXiv:0907.1846 ]. - [19] R. B. Mann and R. McNees, Holographic Renormalization for Asymptotically Lifshitz Spacetimes , JHEP 1110 (2011) 129, [ arXiv:1107.5792 ].
10.1016/j.physletb.2014.08.054
[ "Aruna Rajagopal", "David Kubiznak", "Robert B. Mann" ]
2014-08-05T20:10:16+00:00
2014-11-28T14:17:52+00:00
[ "gr-qc", "hep-th" ]
Van der Waals black hole
In the context of extended phase space, where the negative cosmological constant is treated as a thermodynamic pressure in the first law of black hole thermodynamics, we find an asymptotically AdS metric whose thermodynamics matches exactly that of the Van der Waals fluid. However, we show that as a solution of Einstein's equations, the corresponding stress energy tensor does not obey any of the energy conditions everywhere outside of the horizon.
1408.1106v1
## Hysteresis assisted narrowband resonances in a chain of nonlinear plasmonic arrays 1 3 , 2 1 , 1 3 , S. V. Fedorov , A. V. Chipouline , N. N. Rosanov 1 National Research University of Information Technologies, Mechanics and Optics (University ITMO), 197101 St.Petersburg, Russia, 2 Institute of Applied Physics, Friedrich Schiller University, Jena, Germany 3 Vavilov State Optical Institute, 199034 St.Petersburg, Russia (Dated: August 7, 2014) The plasmonic structures exhibiting narrowband resonances (NBR) are of a great interest for various applications. We propose to use hysteresis behavior in a 1D system of nonlinear nanoresonators in order to achieve the NRB; the nonlinearity is provided by saturation of a two-level quantum system coupled with the nanoresonators (nanolaser/spaser configuration). Quantum Dots ( QD ) were assumed as quantum systems; their numerical parameters have been adopted for estimations. Role of the loss compensation on the quality of the NBR is shown for below (under compensation) and above threshold (generating spasers) operation modes. Amplitude and phase detection schemes of the prospective experimental realization are compared using the developed model. Possible sensor oriented applications of the proposed system are discussed. PACS numbers: 78.67.Pt, 42.25.-p ## I. INTRODUCTION Nanophotonic structures of various natures and shapes receive explosively growing attention during last decade. These structures promise great potential for applications in wide range of science and technology 1 covering practically all areas of modern life. Among the other, the plasmonic structures are used for various sensor applications; both propagating and localized plasmons are well suited for different particular tasks and promise unprecedented sensitivity and selectivity. Both amplitude and phase response of the nanoplasmonic structures were shown to be useful for the sensing applications 2-5 One of the main drawbacks of plasmonic nanostructures, restricting their potential application, is the intrinsic (ohmic) losses caused by the interaction of the free electrons of the metal with thermo bath (irreversible losses) and radiative losses. The more light is localized to the metal surface, the more plasmonic field fraction is concentrated inside the metal resulting in the appearance of higher dissipative losses 6 . Passive losses as a limiting factor was pointed out a rather long time ago 7 8 , and only recently new materials with reduced losses have been suggested 9-12 . Nevertheless, keeping in mind metal as a main candidate for the plasmonic components, the only way to compensate the losses is to use optically active materials in combination with the nanostructures 13-17 The high level of the passive losses stipulates relatively wide bandwidth of the plasmonic resonances, which restricts their sensitivity and selectivity. In this paper we investigate an object, which promises to exhibit ultranarrow band (ultra-NRB) resonances, namely chains of optically coupled nanolasers/spasers. The chain of the optically coupled nanoresonators was shown to exhibit narrow resonances 18 19 , ; the nanolaser/spaser also naturally tends to generate narrowband spectrum lines 20 21 , . Combining these two approaches, it is expected that the chain of the optically coupled nanolasers/spasers will generate the NRB resonances applicable for the sensing applications. The model of the 1D chain of optically coupled nanolasers/spasers has been recently theoretically considered 22 . In this paper the only interaction between neighboring nanolasers/spasers has been taken into account, which excludes appearance of the NRB resonances; the latter requires interaction not only between next spasers in a chain, but rather interaction of each spaser with all other spasers taking into account retardation (see 18 , where source of the narrowband resonances has been clearly shown for the passive case). In order to describe properly the dynamics of the coupled nanolasers, it might be necessary first recall the results from two areas of optical plasmonics, namely: the dynamics of a single nanolaser/spaser, and the dynamics of the coupled nanoplasmonic resonators excited by an external field. Combining these two approaches accepted, a solid background for investigation of the chains of the nanolasers/spasers will be created. The nanoresonator changes the radiative properties of the quantum system coupled to them 23 24 , and can cause both enhancement 25 26 , or inhibition 27 of spontaneous emission. Nevertheless, in the case of regular dynamics of a nanolaser, spontaneous emission does not affect the dynamics when operating well above threshold; influence of the Purcell effect can be taken into account by appropriate choice of the phenomenological coefficients in the model. The nanolaser dynamics is based on energy transfer from the excited quantum emitter to the plasmons, and therefore depends strongly on the positioning of the emitters near the nanoresonator 28 . For example, an appropriate positioning of the emitters can enhance generation of bright and suppress generation of dark modes, and vice versa 28 29 , . The emitters appear to be coupled with the plasmonic modes from ones side and with the far field (radiative) modes from another one. Moreover, the radiative losses can exceed dissipative ones by a factor of two 30 31 , . In the model developed here, the radiative losses are included in the damping coefficient γ for a plasmonic mode. An appropriate positioning of the emitters can redistribute energy transfer in favor of a plasmonic mode which is more effective near sharp angles by a factor of ( kr ) 3 , where k is the wave vector and r is the curvature of the shape of the nanoresontor 32-34 Nevertheless, positioning the emitters too close to the metallic surface can cause quenching of inversion and so must be additionally avoided 35 . The principles of nanolaser design is suggested and developed in 17 36-38 , and was later experimentally realized in various different configurations 20 39-47 , . Recent achievements in this area are summarized in several review articles 13 28 48 , , . Theoretical models of the nanolaser can be approximately divided by fully numerical 49 50 , and semianalytical 38 51 52 , , , with the model developed here belonging to the latter approach. In both versions, the quantum dynamics of the emitters is described by the density matrix method 53 54 , adopted for two, three, or four level schemes. The main difference is in the description of the plasmonic oscillations. In order to make the model treatable (at least to some extent) analytically, the plasmon dynamics can be reduced to some version of the harmonic oscillator equation, which finally results in the well-known point-like dynamic laser model 55 . This model has been used many times for investigation of the laser dynamics as a self-oscillating system, and as a modeling task for various problems of nonlinear (including stochastic) dynamics, stability analysis, etc. 55-57 . To some extent, this model is especially well suited for the nanolaser due to the monomode (or two-mode) oscillation regime 58 , while the usual 'macro' laser tends to operate in multimode regime. Nevertheless, there are several new tasks, which have not been previously addressed, or have not been addressed fully in a consistent manner. One task, for example, is the generation of a nanolaser operating with bright and dark modes simultaneously (mode competition), and another one is the problem of bandwidth of the nanolaser oscillation. It should be emphasized, that the rigorous numerical calculations undoubtedly provide results closer to the experimental ones, but at the same time partially hide the physical insight of the problem. In order to understand necessity of an analytical treatment, consider the problem of instability of the nanolaser operation under the action of an external field. In case of the numerical approach there is no way to subdivide generated by the plasmons and incoming one fields 50 , while analytical modeling provides clear qualitative explanation of appearance of the unstable regimes 52 . The interaction between the small particles (metaatoms), either dielectric or metallic, and the propagation of an optical excitation in a regular chain of such particles has been extensively investigated 59-64 Interest in the behavior of chains of metallic nanoparticles was driven mainly by the pursuit of subwavelength guiding structures for a new generation of the optoelectronic components in the area of communication and information processing. Nevertheless, theoretical tools for the modeling of these chains (irrespective to the nature and sizes) remain invariant: ideally the electromagnetic excitation in the particles is supposed to be described by taking into account all possible eigenmodes 59 61 , and interactions between all particles in a chain. There are several approximations which are typically accepted in these kinds of problems. Firstly, depending on the size of the particles, the model can be restricted by consideration of dipole moment only (for metallic nanoparticles) 60 64 , ; the higher moments and magnetic response can be also taken into consideration 63 65 , . Usually, for the problem of electromagnetic excitation propagation the dipole approximation is enough 66 , provided distance between particles is not less than about three times their dimensions. Secondly, the interaction between the particles in the frame of the quasi-static approximation assumes no retardation; otherwise interaction between dipoles contains terms proportional to the 1 /r and 1 /r 2 in addition to the quasistatic term of 1 /r 3 ( r is the distance between dipoles). The problem possesses an exact solution for the infinite chain in the quasistatic limit, while taking into consideration the retardation leads to known mathematical difficulties and requires continuation into the lower half frequency plane 60 . Consideration of the finite chain is free from these excessive mathematical problems, but can be treated only numerically; the respective solutions for both longitudinal and transverse modes are presented in 60 67 , . In this paper, a comprehensive theoretical study of the dynamics of the 1D chain of the spasers/nanolasers is considered. In the model, each nanolaser in the chain interacts with all other nanolasers in analogy with the model of 18 taking into account retardation between the elements. The well-known effect of the appearance of diverged sums in the unlimited chain of coupled resonators has been extended on the case of active elements, namely nanoresonators coupled with the optically active molecules (dye, quantum dots). Both operation modes - partial loss compensation (below lasing threshold) and complete loss compensation (above lasing threshold) -have been investigated. The paper consists of four parts including this introduction. In the next (second) part, a model to describe the response of the periodically placed nano particles ( NP ) coupled with the quantum dots ( QD ) is elaborated. In the third part, the model is applied for the 1D homogeneous periodic chain (i.e. all pairs NP QD -are assumed to be identical). Results and conclusions summarize the paper in the fifth part. ## II. THE MODEL It is believed, that the semiclassical model 68 is fully appropriate for the considered in the paper system. The quantum dynamics of the active molecules (dye, quantum dots) is described by the well established in laser physics density matrix formalism, while electron dynamics in plasmonic nanoresonators is fully classical and could be to the first approximation modelled by harmonic oscillator equations 69 . In contrast with the other publications 37 22 , , an electric field and respective plasmonic modes are described classically from the beginning, as like as the density matrix operators are used in basis of eigen functions in energy representation. It is stipulated by the fact, that at the stabilized operation the number of photons is huge and there is no necessity to use the quantum optics tools of secondary quantization (birth and annihilation operators). An initial stage of the generation (which starts from the spontaneous emission) undoubtedly requires quantum optics for an adequate consideration; from the other side, in all referred here papers this transition stage has not been considered and the equations were finally used to describe a steady state operation. We investigate the 1D array of plasmonic nano particles ( NP ) optically coupled with each other and with the quantum systems (see Fig. 1). Hereafter, the QD are assumed as quantum systems. The NP s are assumed to be small enough to be adequately descried by a linear harmonic oscillator equation for the dipole moment amplitude ˜ p m ( ): t $$\frac { d ^ { 2 } } { d t ^ { 2 } } \tilde { p } _ { m } ( t ) + 2 \gamma \frac { d } { d t } \tilde { p } _ { m } ( t ) + \omega _ { N P, m } ^ { 2 } \tilde { p } _ { m } ( t ) = 2 \chi \tilde { E } _ { m } ( t ). \ \ ( 1 ) \quad \text{tearct} \quad \text{show}$$ Here ω NP ,m is the eigen NP frequency, γ is the damping coefficient, χ is the susceptibility, ˜ E m is the total electric field acting on this NP which is basically sum of the external field and the field from other oscillators. We assume here layout shown in Fig. 2, namely all NP s are aligned along the x axis, while the 1D array is placed along the z axis. In general, the NP s are anisotropic ones (e.g. have ellipsoid shape) and the values γ , ω NP ,m and χ become tensors. In the presented here picture only ˜ p x,m ( ) is of interest and equation (1) has to be considt ered as an equation for the x dipole vector component. Slowly Varying Approximation (SVA) for the x components of the m-th dipole moment in the chain of the nanoresonators (nanoparticles NP ) and of the field is: $$\frac { d p _ { m } } { d t } + \left ( \gamma _ { N P, m } - i \delta \omega _ { N P, m } \right ) p _ { m } = i \chi _ { N P, m } A _ { m }, \quad ( 2 )$$ here ˜ ( ) = Re[ E t A t ( ) e -iωt ] e x , ˜ p m ( ) t = Re[ ε h p m ( ) t e -iωt ] e x , δω NP ,m = ω -ω NP ,m , χ NP ,m = χ/ ε ω ( h NP ,m ), and γ NP ,m = γ/ε h ω NP ,m . The use of the harmonic oscillator equations for the description of the NP dynamics turned out to be extremely con- venient and combine math simplicity with physical adequateness, making the respective models analytically (or semi analytically) treatable. From the other side the analytical results under certain restrictions correspond with the rigorous numerical and experimental data not only qualitatively, but quantitatively as well 69-71 . The internal quantum QD dynamics is described by the well-known Maxwell-Bloch pair with the artificial pump 68 . For the inversion N nm ( ) t ( n-th QD on m-th NP , see Fig. 2), complex QD dipole moment amplitude R nm ( ) = Re[ t R nm ( ) t e -iωt ] ( p QD ,nm = µ QD ,n R nm ( ) t is the dipole momentum of QD ): $$\underset { \text{$1$. $ It} } { \text{$\text{$item$} } } \quad \frac { d N _ { n m } } { d t } + \gamma _ { 1, n m } \left ( N _ { n m } - N _ { 0 n m } \right ) = \frac { \mu _ { Q D, n m } \text{Im} \left [ A _ { n m } ^ { * } R _ { n m } \right ] } { \hslash }, \\ \text{$\text{ty to} } \quad \frac { d R _ { n m } } { d t } + \left ( \gamma _ { 2, n m } - i \delta \omega _ { Q D, n m } \right ) R _ { n m } = \frac { \mu _ { Q D, n m } A _ { n m } N _ { n m } } { i \hslash }. \\ \text{ge of} \quad \underset { \text{$me$} } { \text{Here $\mu_{0}=\bar{\mu_{0}/}(\(\varepsilon_{h}\varepsilon_{0}^{\prime})\})$ is the reduced $QD$ dipole mo} }$$ Here µ QD = ¯ µ QD / ( ε h ε ′ QD ) is the reduced QD dipole moment, ¯ µ QD is the dipole moment of the transition, ε h is the host dielectric constant, ε QD is the dielectric constant of the QD , and ε ′ QD = ( ε QD +2 ε h ) / 3 ε h is the screening factor 72 ; γ 1 ,nm = 2 ˜ γ 1 1 -N 0 ,nm , N 0 ,nm = ( W -˜ γ 1 ) ( W + ˜ γ 1 ) and γ 2 ,nm are the energy and phase relaxation rates respectively, δω QD ,nm = ω -ω QD ,nm is the frequency detuning of the resonance of ( n, m-th ) QD from the incident field carrier frequency. It is worth noting here, that in the case of the absence of the external field the frequency ω is the spaser generation frequency which is supposed to be found from the stationary solution, provided the pump is high enough to support the spaser generation. In order to develop the model further and include interaction between the NP s and QD s, the realistic picture shown in Fig. 2 has to be simplified. We substitute the NP s by the point dipoles, and all QD s placed on a NP we substitute by a single QD placed at the distance r QD from the NP ; in this case the second subscript of the QD polarization can be left R nm ≡ R m , N nm ≡ N m . Actually, FIG. 1. Possible experimental realization of the 1D chain of the NP QD -. The yellow bricks represent plasmonic nanoresonators (nanoparticles -NP ), while active molecules (i.e. Quantum Dots QD ) are shown by small red circles. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-2ced2205-d95f-4f05-ac6a-32a9de9f0929.jpg) the dynamics of this 'effective QD ' is described by the same density matrix/Maxwell-Bloch equations; from the other side, for the interaction between the 'effective QD ' and the NP s we have to introduce an effective number of the QD s placed on the m-th NP n QD ,m , and effective QD dipole momentum, µ QD ,m = n QD ,m µ QD (and the same effective dipole momentum in host medium, ˜ µ QD ,m = ε h µ QD ,m , ˜ µ QD = ε h µ QD ). System of equation ((3)) is finally reduced to: $$\dots \frac { d N _ { m } } { d t } + \gamma _ { 1, m } \left ( N _ { m } - N _ { 0 m } \right ) = \frac { i \tilde { \mu } _ { Q D, m } \left ( A _ { m } R _ { m } ^ { * } \, - \, A _ { m } ^ { * } R _ { m } \right ) } { 2 \hbar }, \quad \sum _ { m } \\ \frac { d R _ { m } } { d t } + \left ( \gamma _ { 2, m } - i \delta \omega _ { Q D, m } \right ) R _ { m } = - \frac { i \tilde { \mu } _ { Q D, m } A _ { m } N _ { m } } { \hbar }. \\ \text{To this extend, the approximation is equivalent to the} \quad \, A _ { m }.$$ To this extend, the approximation is equivalent to the one accepted in 22 . It is worth noting again, that one of the main differences with 22 is in the model of interaction between the NP s in the chain. Namely, authors of 22 took into account only interaction with the neighboring NP s, which excludes appearance of the narrowband resonances. The narrowband resonances is the consequence of the interaction of each NP with all other NP s in the chain 18 ; investigation of these resonances is the main goal of the presented here consideration. The interaction between the NP s is described in the frame of the dipole approximation for each NP and QD . Namely, the generated by each dipole ( NP plus QD s) m field at the point of the dipole ( NP or QD ) m' is given by: $$A _ { m m ^ { \prime } } \left ( \omega \right ) & = C \left ( r _ { m m ^ { \prime } } \right ) \left ( p _ { m ^ { \prime } } + p _ { Q D, m ^ { \prime } } \right ) e ^ { i k _ { 0 } r _ { m m ^ { \prime } } }, \\ C \left ( r _ { m m ^ { \prime } } \right ) & = \frac { k _ { 0 } ^ { 2 } } { r _ { m m ^ { \prime } } } + \frac { i k _ { 0 } } { r _ { m m ^ { \prime } } ^ { 2 } } - \frac { 1 } { r _ { m m ^ { \prime } } ^ { 3 } }.$$ $$( 5 )$$ Here k 0 is the wave vector of the field in space between the NP s, r mm ′ is the distance between the NP s, and p m ′ and p QD ,m ′ = µ QD ,m ′ R m ′ are the complex amplitudes of the dipole moment of m'-th NP and QD s placed on this NP respectively. Each NP QD / is driven by the field resulted by the sum of an external field A ext,m ( )and all t FIG. 2. Schematic representation of the 1D chain of the NP QD -used to describe the NP QD -chain in Fig. 1. The yellow bricks represent NP (with the main axis a 1 and a 2 ), while active molecules ( QD ) are shown by small red circles. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-4af36065-a0b5-4675-8287-e25e4c5fbf30.jpg) fields from the other NP s/ QD s: $$A _ { m } ( \omega ) = A _ { e x t, m } ( \omega ) + \sum _ { m ^ { \prime } } A _ { m m ^ { \prime } } ( \omega ). \quad \ ( 6 )$$ It is convenient to introduce more concrete equations for the sums involved into the consideration. Taking into account, that the self-action (action of the NP QD / on itself) has to be excluded, we introduce 'sums of interaction', namely: $$\underline { _ { n } } \right ), \quad \sum _ { m ^ { \prime } } A _ { m m ^ { \prime } } ( \omega ) \ = \ \begin{array} { c c } A _ { m, N P } \left ( \omega \right ) + A _ { m, N P, Q D } \left ( \omega \right ) + \\ + A _ { m, Q D, N P } \left ( \omega \right ) + A _ { m, Q D } \left ( \omega \right ) \end{array} \quad \left ( 7 \right )$$ glyph[negationslash] glyph[negationslash] $$A _ { m, \text{NP} } \left ( \omega \right ) = \sum _ { m \neq m ^ { \prime } } C \left ( r _ { m m ^ { \prime } } \right ) p _ { m ^ { \prime } } \left ( \omega \right ) e ^ { i k _ { 0 } r _ { m m ^ { \prime } } }, \\ \text{e} \\ \text{e} \\ \text{$\text{$The$ final field $A_{m}(\omega$)$ acting on $m$-th $NP$ and $QD$ (see $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $i$ $j$}$$ The final field A m ( ω ) acting on m-th NP and QD (see (5)) is given by the sum of all the partial sums - see last equation in (8). The physical means of the partial sums are clear: A m, NP ( ω )is the field acting on the m-th NP from the other NP s, A m, NP QD , ( ω ) is the field acting on the m-th NP from all QD s, A m, QD NP , ( ω ) is the field acting on the m-th QD from all NP s, and A m, QD ( ω ) is the field acting on the m-th QD from all other QD s. Equations (2-7) form the closed system for the coupled dynamics of the coupled NP QD -array. These equations will be used to investigate the stationary states of the considered system depending on the parameters, including the level of pump N 0 ,m . At the absence of pump N 0 ,m = -1, at -1 &lt; N 0 ,m &lt; 0 the QD s still absorb, and at N 0 ,m &gt; 0 starts to amplify the light. glyph[negationslash] Coupled system of the NP QD -is known as spaser (one of the possible realization). Dynamics of the spaser is described by the same system of equations (2-7) without an external field A ext ( ) t = 0. Respective solutions depend on the pump level: it is zero for the pump values below and nonzero for the pumps above some threshold value N th which is supposed to be found from the solution of system (2-7). In the case of the nonzero external field A ext ( ) t = 0 the nonzero solutions exist in both below and above threshold regions; moreover the system possess several solutions manifesting the multistable operation 52 . Here we are interested primarily in solutions for the pump levels below lasing threshold. These values are realized in most experiments, and the resulted response of such system (amplitude and phase) is actually most easily can be compared with the experimental data. Note that the spontaneous emission is included in the model by the energy relaxation rate γ 1 , which is subject to modification by Purcell effect. The relaxation dynamics in this coupled system can be also investigated in the frame of the presented model which is left for further publications. ## III. HOMOGENEOUS 1D ARRAY We assume for simplicity that all the NP s and QD have the same properties (in (2-7) the respective coefficients lose their subscript m ). System of equations (2-7) in this case becomes: $$& \cos \text{vecon} \text{.} \\ & \frac { d N _ { m } } { d t } + \gamma _ { 1 } \left ( N _ { m } - N _ { 0 } \right ) = \frac { i \tilde { \mu } _ { Q D } } { 2 \hslash } \left ( A _ { Q D } ^ { ( m ) } R _ { m } ^ { * } - A _ { Q D } ^ { ( m ) * } R _ { m } \right ), \quad & A _ { i } \\ & \frac { d R _ { m } } { d t } + \left ( \gamma _ { 2 } - i \delta \omega _ { Q D } \right ) R _ { m } = - \frac { i \tilde { \mu } _ { Q D } } { \hslash } A _ { Q D } ^ { ( m ) } N _ { m }, \\ & \frac { d p _ { m } } { d t } + \left ( \gamma _ { N P } - i \delta \omega _ { N P } \right ) p _ { m } = i \chi _ { N P } A _ { N P } ^ { ( m ) }, \quad & \text{Assun} \\ & \quad & \text{at the} \\ & \quad & \text{NP cl} \\ & \text{where}$$ where $$\begin{array} { l } \delta \omega _ { Q D } = \omega - \omega _ { Q D }, & A _ { Q D } ^ { ( m ) } = A _ { e x t, m } + A _ { m, Q D, N P } + A _ { m, Q D }, \\ \delta \omega _ { N P } = \omega - \omega _ { N P }, & A _ { N P } ^ { ( m ) } = A _ { e x t, m } + A _ { m, N P } + A _ { m, N P, Q D }. \quad & \text{Using} \\ \text{done} \end{array}$$ In this paper the consideration is restricted by the stationary operation mode with the respective stationary solution given by zeroing all derivatives in (9): $$\begin{array} { c c c c c } \smile & \smile & \smile & \smile & \smile & \smile & \smile & \\ & N _ { m } = N _ { 0 } + \frac { i \tilde { \mu } _ { Q D } } { 2 \hbar { \gamma } _ { 1 } } \left ( A _ { Q D } ^ { ( m ) } R _ { m } ^ { * } - A _ { Q D } ^ { ( m ) * } R _ { m } \right ), \\ & R _ { m } = - \frac { i \tilde { \mu } _ { Q D } } { \hbar { \left ( \gamma } _ { 2 } - i \delta \omega _ { Q D } \right ) } A _ { Q D } ^ { ( m ) } N _ { m }, & & ( 1 0 ) & \text{in tui} \\ & p _ { m } = \frac { i \chi _ { N P } } { \left ( \gamma _ { N P } - i \delta \omega _ { N P } \right ) } A _ { N P } ^ { ( m ) }. & & \\ & & S \\ \smile & \cdot & \smile & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdot & \cdots & \end{array}$$ in (8) to only one term and sets A m, QD ( ω ) = 0: $$\text{ave} \quad & A _ { m, N P, Q D } \left ( \omega \right ) = \sum _ { m ^ { \prime } } C \left ( r _ { m m ^ { \prime } } \right ) p _ { Q D, m ^ { \prime } } \left ( \omega \right ) e ^ { i k _ { 0 } r _ { m m ^ { \prime } } } = \\ \text{ints} \quad & = C \left ( r _ { Q D } \right ) p _ { Q D, m } \left ( \omega \right ) e ^ { i k _ { 0 } r _ { m m } } \approx - \mu _ { Q D } R _ { m } \left ( \omega \right ) / r _ { Q D } ^ { 3 },$$ $$A _ { m, Q D, N P } \left ( \omega \right ) = \sum _ { m ^ { \prime } } C \left ( r _ { m m ^ { \prime } } \right ) p _ { m ^ { \prime } } \left ( \omega \right ) e ^ { i k _ { 0 } r _ { m m ^ { \prime } } } = \\ = C \left ( r _ { Q D } \right ) p _ { m } \left ( \omega \right ) e ^ { i k _ { 0 } r _ { m m ^ { \prime } } } \approx p _ { m } / r _ { Q D } ^ { 3 }. \\ \text{As minimum that the external field is a name wave in} \text{in} \text{omin} \sigma$$ Assuming that the external field is a plane wave incoming at the angle θ to the perpendicular to the plane with the NP chain, see Fig. 1, which makes for the A ext,m ( ω ): $$A _ { e x t, m } \left ( \omega \right ) = A _ { e x t } \left ( \omega \right ) \exp \left ( i k _ { 0 } m d \sin \left ( \theta \right ) \right ). \quad \left ( 1 3 \right )$$ Using Bloch theorem, assume also the periodic dependence on z for all variables in (10), namely: $$N _ { m } \left ( \omega \right ) & = N \left ( \omega, k \right ) \exp \left ( i k m d \right ), \\ R _ { m } \left ( \omega \right ) & = R \left ( \omega, k \right ) \exp \left ( i k m d \right ), \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad p _ { m } \left ( \omega \right ) & = p \left ( \omega, k \right ) \exp \left ( i k m d \right ).$$ k is the z component of the Bloch vector which allows us in turn to simplify the sums A m, NP and A m, QD in (8): $$^ { \prime } & A _ { m, N P } \left ( \omega, k \right ) = S _ { 1 } \left ( \omega, k \right ) p \left ( \omega, k \right ), \\ & S _ { 1 } \left ( \omega, k \right ) = 2 \, \sum _ { m = 1 } ^ { \infty } C \left ( d m \right ) e ^ { i k _ { 0 } d m } \cos \left ( k d m \right ).$$ System (10) can be further simplified. It is assumed, that the QD s interact mainly with their 'own' resonators, which reduces the sums A m, NP QD , ( ω ) and A m, QD NP , ( ω ) Substituting (10-13) into (10), the system of equations for stable state operation mode becomes: $$\left ( \begin{array} { c } N \left ( \omega, k \right ) \exp \left ( i k m d \right ) = N _ { 0 } + \frac { i \tilde { \mu } _ { Q D } } { 2 \hbar { \gamma } _ { 1 } } \left ( \left ( A _ { e x t } \left ( \omega, k \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) R ^ { * } \left ( \omega, k \right ) - \left ( A _ { e x t } \left ( \omega, k \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) R \left ( \omega, k \right ) \right ), \\ R \left ( \omega, k \right ) = - \frac { i \tilde { \mu } _ { Q D } } { \hbar { \left ( \gamma _ { 2 } } - i \tilde { \delta } \omega _ { Q D } \right ) } \left ( A _ { e x t } \left ( \omega, k \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) N \left ( \omega, k \right ) \exp \left ( i k m d \right ), \\ p \left ( \omega, k \right ) = \frac { i \varsigma _ { \text{NP} } } { \left ( \gamma _ { \text{NP} } - i \tilde { \delta } \omega _ { \text{NP} } \right ) } \left ( A _ { e x t } \left ( \omega, k \right ) + p \left ( \omega, k \right ) S _ { 1 } \left ( \omega, k \right ) - \frac { \mu _ { Q D } R \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ). \end{array} \right ).$$ where A ext ( ω, k ) = A ext ( ω ) exp ( imd k ( 0 sin ( θ ) -k )) and S 1 ( ω, k ) is dipole sum in ((15)). At this stage system possesses pretty clear physical interpretation. Let us suppose first absence of the external field A ext = 0. In this case the considered system is a combination of coupled nanolasers/spasers. It is clear, that there are two possibilities for the steady states: in case of low pump ( N ω,k ( ) &lt; N th , where N th is the threshold inversion i.e. minimum inver- glyph[negationslash] sion necessary for the generation) the nanolaser/spaser cannot reach nonzero steady state at any frequency ω ( p ( ω, k ) = 0 and R ω,k ( ) = 0). In the case of high enough pumps ( N ω,k ( ) &gt; N th ), the nanolaser/spaser after some transition period reaches the steady state which is characterized by nonzero values of p ( ω G , k G ) = 0 and R ω ( G , k G ) = 0; moreover, the generation frequency ω G and k G is the eigen frequency and mode eigen wave vector of the steady state, determined by the solution of (17): glyph[negationslash] $$\begin{cases} \, N \left ( \omega _ { G }, k _ { G } \right ) \exp \left ( i k _ { G } m d \right ) = N _ { 0 } + \frac { i \dot { \mu } _ { Q D } } { 2 \hbar { \gamma } _ { 1 } \dot { \mu } _ { Q D } } \left ( p \left ( \omega _ { G }, k _ { G } \right ) ^ { * } R \left ( \omega _ { G }, k _ { G } \right ) - p \left ( \omega _ { G }, k _ { G } \right ) R ^ { * } \left ( \omega _ { G }, k _ { G } \right ) \right ), \\ R \left ( \omega _ { G }, k _ { G } \right ) = \frac { i \dot { \mu } _ { Q D } } { \hbar { r } _ { Q D } ^ { 3 } \left ( \gamma _ { 2 } - i \left ( \omega _ { G } - \omega _ { Q D } \right ) \right ) } p \left ( \omega _ { G }, k _ { G } \right ) N \left ( \omega _ { G }, k _ { G } \right ) \exp \left ( i k _ { G } m d \right ), \\ p \left ( \omega _ { G }, k _ { G } \right ) = \frac { i \chi _ { N P } } { \left ( \gamma _ { N P } - i \left ( \omega _ { G } - \omega _ { N P } \right ) \right ) } \left ( p \left ( \omega _ { G }, k _ { G } \right ) S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) - \frac { \mu _ { Q D } R \left ( \omega _ { G }, k _ { G } \right ) } { r _ { Q D } ^ { 3 } } \right ), \\ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) = 2 \sum _ { m = 1 } ^ { \infty } \left ( \frac { k _ { 0 } ^ { 2 } } { d m } + \frac { i k _ { 0 } } { d ^ { m } m ^ { 2 } } - \frac { 1 } { d ^ { 3 } m ^ { 3 } } \right ) e i k _ { 0 } d m \cos \left ( k _ { G } d m \right ). \end{cases}$$ Expressing p ( ω G , k G ) from the last and substituting into the first equation of (17), we get: $$\Lambda \text{puses using } p ( \omega _ { G }, \Lambda _ { G } ) \text{ in } u \, u \, a \, s \, a \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \, s \} \\ \begin{cases} N \, ( \omega _ { G }, k ) \exp { ( i k _ { G } m d ) } = \\ = N _ { 0 } - \frac { \tilde { \mu } _ { Q D } ^ { 2 } \overline { N } P } { h \gamma _ { 1 } r _ { Q D } ^ { 6 } } \frac { ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) } { ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } + \left ( \omega _ { G } - \omega _ { N P } + \chi _ { N P } \text{Re} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } } \, | R \left ( \omega _ { G }, k _ { G } \right ) | ^ { 2 }, \quad ( 1 8 ) \\ p ( \omega _ { G }, k _ { G } ) = \frac { - i \chi _ { N P } \text{$\mu$} \text{$Q$} \end{cases} } { r _ { Q D } ^ { 3 } \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] - i \left ( \omega _ { G } - \omega _ { N P } + \chi _ { N P } \text{Re} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) } R \left ( \omega _ { G }, k _ { G } \right ) } \,. \\ \text{Substitution} \, ( 1 8 ) \, \text{ into the second equation of } ( 1 7 ) \, \text{ we obtain two transcendental equations for $\varepsilon$} \, \text{even frequency} \, \text{$\mu$} \,.$$ Substituting (18) into the second equation of (17), we obtain two transcendental equations for eigen frequency ω G , mode eigen wave vector k G , and squares of the amplitudes of the stationary oscillations | R ω ( G , k G ) | 2 and | p ( ω G , k G ) | 2 : $$\text{mode eigen wave vector } k _ { G }, \text{ and squares of the amplitudes of the stationary oscillations } | R ( \omega _ { G }, k _ { G } ) | ^ { \ast } \text{and } | p ( \omega _ { G }, k _ { G } ) | ^ { \ast } \colon \\ \left ( \gamma _ { 2 } = \frac { \dot { \vec { u } } _ { Q D } ^ { 2 } \chi _ { N P } } { h \gamma _ { 1 } ^ { 6 } Q D } \frac { \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] } { \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } + \left ( \omega _ { G } - \omega _ { N P } + \chi _ { N P } \text{Re} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } } \Delta N, \\ \omega _ { G } - \omega _ { Q D } = \frac { \dot { \vec { u } } _ { Q D } ^ { 2 } \chi _ { N P } } { h \gamma _ { 1 } ^ { 6 } Q D } \frac { \omega _ { G } - \omega _ { N P } + \chi _ { N P } \text{Re} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] } { \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } } + \left ( \omega _ { G } - \omega _ { N P } + \chi _ { N P } \text{Re} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) ^ { 2 } } \Delta N, \\ \Delta N = N _ { 0 } - \frac { \dot { \vec { u } } _ { Q D } ^ { 2 } \chi _ { N P } } { h \gamma _ { 1 } ^ { 6 } Q D } \frac { \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k _ { G } \right ) \right ] \right ) | R ( \omega _ { G }, k _ { G } ) | ^ { 2 } } { \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} \left [ S _ { 1 } \left ( \omega _ { G }, k \right ) \right ] \right ) ^ { 2 } }.$$ In case of absence of the interaction between the NP s ( S 1 ( ω G , k G ) = 0) (19) gives the standard equations for eigen frequency and amplitude of the spaser generation; in case of the interaction only with the neighborings (19) describes the stable state in the interacting spaser chain considered in 52 . It is worth noting that the used here (and in 52 ) approach does not allow us to investigate the laser bandwidth, which requires stochastic methods 21 . Full investigation of (19) is out of the scopes of this paper. The question about which spatial modes k G can reach generation depends on the level of pump N 0 ; usually the mode with the minimum threshold appears first. For example, dark modes (with the effective zero dipole moment) have less radiative losses (and consequently lower total losses) and should appear first. The developed here model does not take into account the specific for different modes radiative losses (it has to be included as an extra losses which depend on k ) and therefore is not appropriate for the full analysis. Below, only the first spatial mode ( k G = 0) of the chain will be considered in order to find the generation threshold and distinguish between the operation modes below and above the generation threshold. glyph[negationslash] The physical picture of the stationary dynamics is different in case of a nonzero external field A ext = 0 . In this case k is basically fixed k = k 0 sin ( θ ) and system (16) for stationary solution becomes: $$\begin{array} { c } \frac { 1 } { 2 } } \\ \left ( \begin{array} { c } N \left ( \omega, k \right ) e ^ { i k m d } = N _ { 0 } + \frac { i \dot { \mu } _ { Q D } } { 2 h \gamma _ { 1 } } \left ( \left ( A _ { e x t } \left ( \omega \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) R ^ { * } \left ( \omega, k \right ) \end{array} \right ), & \left ( A _ { e x t } \left ( \omega \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) ^ { * } R \left ( \omega, k \right ) \right ), \\ R \left ( \omega, k \right ) = - \frac { i \dot { \mu } _ { Q D } } { h \left ( \gamma _ { 2 } - i \dot { \omega } _ { Q D } \right ) } \left ( A _ { e x t } \left ( \omega \right ) - \frac { p \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ) N \left ( \omega, k \right ) \exp \left ( i k m d \right ), \\ p \left ( \omega, k \right ) = \frac { i \varkappa _ { N P } } { \left ( \gamma _ { N P } - i \dot { \omega } _ { N P } \right ) } \left ( A _ { e x t } \left ( \omega \right ) + p \left ( \omega, k \right ) S _ { 1 } \left ( \omega, k \right ) - \frac { \mu _ { Q D } R \left ( \omega, k \right ) } { r _ { Q D } ^ { 3 } } \right ), \\ S _ { 1 } \left ( \omega, k \right ) = 2 \sum _ { m = 1 } ^ { \infty } \left ( \frac { k _ { 0 } ^ { 2 } } { d m } + \frac { i k _ { 0 } } { d ^ { 2 } m ^ { 2 } } - \frac { 1 } { d ^ { 2 } m ^ { 3 } } \right ) e ^ { i k _ { 0 } d m } \cos \left ( k d m \right ), \\ k = k _ { 0 } \sin \left ( \theta \right ), \end{array}$$ Physically this case has to be subdivided by two sub problems, namely response of the system with the pump level below and above the generation threshold. It has to be emphasized that these two situations are principally different: in the first case the system is basically passive and it is possible to calculate its spectrum (own resonances and their bandwidths), while in the second case the system is governed by own self consistent dynamics, which is to some extend independent from the external field. The problem of the resonance bandwidths becomes much more sophisticated and requires stochastic methods. As it was mentioned in 52 , the problem is equivalent to the well-known one of the dynamics of macro laser under the action of a resonant external field 57 . In this paper, only perpendicular incidence is supposed, namely sin ( θ ) = 0 which implies k = 0 or, in other words, all NP s in the chain oscillate in phase. It is worth noting that in this case the system response is sought at the frequency of the external field (there is no eigen frequency). In this case system (20) is simplified: $$\text{frequency} \text{). In this case system (20) is simplified: } \quad & \overline { \text{broad} } \\ \left [ \begin{array} { c c } N \left ( \right ) = N _ { 0 } + \frac { i \tilde { \mu } _ { Q D } } { 2 \hbar { \gamma } _ { 1 } } \text{Im} \left [ \left ( A _ { e x t } \left ( \right ) - \frac { p \left ( \right ) } { r _ { Q D } ^ { 3 } } \right ) R ^ { * } \left ( \right ) \right ], & \text{which} \\ R \left ( \right ) = - \frac { i \tilde { \mu } _ { Q D } } { \hbar { \left ( \gamma } _ { 2 } - i \delta \omega _ { Q D } \right ) } \left ( A _ { e x t } \left ( \right ) - \frac { p \left ( \right ) } { r _ { Q D } ^ { 3 } } \right ) N \left ( \right ), & \max _ { \ } \\ p \left ( \right ) = \alpha _ { N P } \left ( A _ { e x t } \left ( \right ) - \frac { \mu _ { Q D } R \left ( \right ) } { r _ { Q D } ^ { 3 } } \right ), & \text{$mines} \\ \text{where definition of polarizability of metallic chain sup-} \quad \text{The $s$;} \\ \text{www+diamond} \, \text{and} \, in \, \text{/} \frac { 1 \in \mathfrak { W } } { 1 \in \mathfrak { W } }. \end{array}$$ where definition of polarizability of metallic chain support dipole sum in ((15)): $$\alpha _ { N P } = \frac { i \chi _ { N P } } { \left ( \gamma _ { N P } - i \delta \omega _ { N P } \right ) \left ( 1 - \frac { i \chi _ { N P } } { \left ( \gamma _ { N P } - i \delta \omega _ { N P } \right ) } S _ { 1 } \left ( \omega \right ) \right ) }, \\ S _ { 1 } \left ( \omega \right ) = 2 \sum _ { m = 1 } ^ { \infty } \left ( \frac { k _ { 0 } ^ { 2 } } { d m } + \frac { i k _ { 0 } } { d ^ { 2 } m ^ { 2 } } - \frac { 1 } { d ^ { 3 } m ^ { 3 } } \right ) e ^ { i k _ { 0 } d m }.$$ Behavior of the sums like S 1 ( ω )in (21) has been investigated in 18 . The logarithmic divergence of these sums at k d 0 = 2 πn , (where n is an integer number) is the reason for the narrowband resonances appearing in the framework of the elaborated model. ## IV. RESULTS REPRESENTATION System (21) has been investigated numerically for the case of the absence of an external field A ext ( ω ) = 0(coupled spasers) and for the case of the external field driving the chain. Throughout the paper, the results will be presented for zero pump ( N 0 = -1) and for the pump values below ( N 0 &lt; N th ) and above ( N 0 &gt; N th ) the generation threshold. To be precise, the numerical values have been taken similar to 69 for a single plasmonic nanoresonator. It is assumed that the axis relation of the spheroidal NP s in the chain is a /a 1 2 = 11 7 (see Fig. 2), averaged radius is , a NP = 3 √ a a 2 1 2 = 20nm, which gives NP eigen resonance at λ NP = 801 1nm. , The resonance bandwidth taking into account the respective radiation losses is $$\text{is two} \quad \text{$\quad $\quad \gamma_{NP} \left ( \omega _ {NP} \right ) \cong \gamma_{NP}^{(0)} + \frac { 2 } { 3 } \left ( k a _ {NP } \right ) ^ { 3 } \tilde { \chi } _ { NP }, \quad \tilde { \chi } _ { N P } = \chi _ { N P } / a _ { N P } ^ { 3 },$$ where we use numerical values to be in keeping with 69 , ˜ χ NP = 6 71 fs . -1 , γ NP = 0 083 fs . -1 ( γ (0) NP = 0 0315 fs . -1 ) for the wavelength of the resulted narrowband resonance λ NBR = 840 5 nm. , The distance between the NP QD -cells was chosen to be 583,7 nm. Only first diffractive resonance has been considered k d 0 = 2 π , k 0 = √ ε h 2 π/λ 0 , ε h = 2 07 . ( n h = 1 44), . which results in the dipole resonances in the chain λ NBR = 840 5nm. The numerical values have , been chosen in order to match the resonance wavelength λ NBR = 840 5 nm with the respective one from , 69 . The QD dipole moment was assumed to be ¯ µ QD = 25 Debay and the number of the QD s per NP is n QD = 200. The QD s are supposed to be a homogeneously broadened with the phase relaxation time γ -1 2 = 100 fs which is comparable with the plasmonic resonance bandwidth. In order to provide an effective interaction, the QD s have to have a transition at the wavelength of the maximum interaction between NP and QD , which appears (as it will be seen later) at λ QD = 841 2 nm. . The distance between QD and nanoparticles, which determines the interaction strength is r QD = 2 a NP = 40nm. Here ˜ γ -1 1 = 0 8 ns is the spontaneous emission rate (both . radiative and non-radiative). The system response has been investigated in the far field region. It is resulted by a coherent summation of the fields generated by each dipole µ QD R ω ( ) and p ( ω ) in both cases of presence or absence of the external field A ext ( ω ). Frequency dependences of both functions µ QD R ω ( ) and p ( ω ) are given by (21), and the total dipole moment of the NP QD -is: $$p _ { t o t a l } = p \left ( \omega \right ) + \mu _ { Q D } R \left ( \omega \right ) \text{ \quad \ \ } ( 2 2 )$$ In order to calculate the total field from the chain (see Fig. 3) the contributions from each NP QD -cell have to be summarized, see Fig. 3. Each NP QD -contributes to the total field with own phase, namely: $$E _ { m, N P - Q D } \left ( \omega \right ) = \frac { p \left ( \omega \right ) + \mu _ { Q D } R \left ( \omega \right ) } { r } k _ { 0 } ^ { 2 } \exp \left ( i k _ { 0 } m d \, s i n \left ( \theta \right ) \right ), \\ \text{for the}$$ $$\text{r the} _ { \lambda } ^ { \lambda } ) \ = \ & \quad \begin{array} { c } \cdot \ \end{array} \cdot \ \begin{array} { c } \cdot \ \end{array} \cdot \\ \text{field} _ { \substack { E _ { t o t a l } } } & = \frac { p \left ( \omega \right ) + \mu _ { Q D } R \left ( \omega \right ) } { r } k _ { 0 } ^ { 2 } \sum _ { m = 0 } ^ { N _ { p } } \exp \left ( i k _ { 0 } m d \, s i n \left ( \theta \right ) \right ) = \\ \text{upsm} \quad & = _ { [ s i n \left ( \theta \right ) = 0 ] } \ \frac { p \left ( \omega \right ) + \mu _ { Q D } R \left ( \omega \right ) } { r } k _ { 0 } ^ { 2 } N _ { p }. \\ \text{taken} \quad & \quad \text{In this paper, it was assumed that $s i n \left ( \theta \right ) = 0$ (perpendic} \ \end{array}$$ In this paper, it was assumed that sin ( θ ) = 0 (perpendicular transmission). All intensities were calculated at the distance of r 0 = 1m from the chain of N p = 400 particles. The scattered field intensity is S total = c 8 π | E total | 2 . This scattered field is pretty easy to measure in case of the spaser chain, because of the pump and scattered light wavelengths are spectrally separated. From the other side, in the case of spaser chain there is no physically justified normalizing field and it makes sense to present the results in absolute values. It is also useful to introduce separately the field intensity generated by NP S NP = c 8 π ∣ ∣ ∣ p ω ( ) r k N 2 0 p ∣ ∣ ∣ 2 , the field intensity generated by QD S QD = c 8 π ∣ ∣ ∣ µ QD R ω ( ) r k N 2 0 p ∣ ∣ ∣ 2 , and characterize the far filed by the relation a S, QD = S QD /S total , which indicates part of the total field generated by the QD s. glyph[negationslash] It is worth noting that the amplitude measurements (measurements of S total ) is not the only option. In case of A ext ( ω ) = 0, the much higher external field intensity makes it difficult to separate the significantly weaker scattered field S total . In this case, interference between both fields (heterodyne detection) could provide an alternative measurement technique. The detector measures (in addition to the intensities of both transmitted and scattered fields) the interference part according to the known expression c 8 π | A ext ( ω ) + E total ( ω ) | 2 = S ext + S total + c 8 π ( A ∗ ext ( ω E ) total ( ω ) + A ext ( ω E ) ∗ total ( ω )). Lock-in technique allows us to separate S ext + S total from the rest of the sum and measure the interference part only; here it is convenient to introduce the normalized intensity a S ( ω )and beating part a Int ( ω ) on external field intensity: $$a _ { S } \left ( \omega \right ) \quad & = S _ { t o t a l } \left ( \omega \right ) / S _ { e x t } \left ( \omega \right ), \\ a _ { I n t } \left ( \omega \right ) \quad & = 2 R e \left [ A _ { e x t } ^ { * } \left ( \omega \right ) E _ { t o t a l } \left ( \omega \right ) \right ] / \left | A _ { e x t } \left ( \omega \right ) \right | ^ { 2 } = \quad \text{In 1} \\ & = 2 \sqrt { a _ { S } } \cos \left ( \Delta \varphi \right ). \\ \text{Here } \Delta \omega \text{ is the nphase difference between the external}$$ Here ∆ ϕ is the phase difference between the external and scattered (total) fields. This characteristic is shown to be more robust to the noise and thus far provides several orders of magnitude higher sensitivity in sensing applications 5 . FIG. 3. Grating type contribution to the total field at the observation point. Gold bricks with red perimeters depict NP QD -cells, ∆ = k mdsin θ 0 ( ) is the pass difference contribution to the phase difference at the total field calculation. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-49d9fd6f-f929-4e40-a865-a46a743dd3ce.jpg) ## V. CHAIN OF COUPLED SPASERS ( A ext ( ω ) = 0 ) The role of the saturation type nonlinearity of the QD coupled with NP , and its influence on the NBR is the main focus of this paper. In the case of lasing (spaser in generation operation mode) the subdivision of a 'linear' and 'nonlinear' dynamics does not make sense: the stationary state is stipulated by a nonlinearity (saturation) and hence is essentially nonlinear. In the case of an external field and low (below threshold) pumps the system exhibits its nonlinear properties only for particular set of parameters (sufficiently high external field intensities and/or significant pump levels). Consider solution of (19) for the first spatial mode i.e. k G = 0, which in turn means equal phases and amplitude for all NP QD -in the chain. The system is in fact 1D array of the coupled spasers, and consequently exhibits typical laser properties, namely the system has a threshold and eigen generation frequency ω G . In the frame of this model the 'dark modes' have the same threshold as the 'bright' ones, in spite of the different levels of the emitted radiation. It is important to note either, that the spectrum bandwidth of the generation (whatever system - single or coupled resonators in 1D arrayis considered) is just delta function in the frame of this model; otherwise the stochastic fluctuations which result in the nonzero spectrum bandwidth have to be incorporated into the model 21 . In the case of absence of the external field system (21) is reduced to: $$\text{al} \quad \begin{cases} \ N _ { s t } \left ( \omega _ { G } \right ) = N _ { 0 } + \frac { \mu _ { Q D } } { 2 \hbar { \gamma } _ { 1 } r _ { Q D } ^ { 3 } } I m \left [ p \left ( \omega _ { G } \right ) R ^ { * } \left ( \omega _ { G } \right ) \right ], \\ R \left ( \omega _ { G } \right ) = \frac { i \mu _ { Q D } } { \hbar { \left ( \gamma } _ { 2 } - i \delta \omega _ { Q D, G } \right ) } \frac { p \left ( \omega _ { G } \right ) } { r _ { Q D } ^ { 3 } } N _ { s t } \left ( \omega _ { G } \right ), \\ p \left ( \omega _ { G } \right ) = - \alpha _ { N P } \left ( \omega _ { G } \right ) \frac { \mu _ { Q D } R \left ( \omega _ { G } \right ) } { r _ { Q D } ^ { 3 } }. \end{cases}$$ which is the typical system describing the generation at eigen frequency ω G which is also supposed to be resulted from (26). Combining second and third equations in (26), we obtain an equation for the stationary inversion N st and respective eigen mode frequency ω G : $$\begin{pmatrix} N _ { s t } \left ( \omega _ { G } \right ) = - \frac { \hbar { \varepsilon } _ { h } r _ { Q D } ^ { 6 } } { \tilde { \mu } _ { Q D } ^ { 2 } } \text{Im} \left [ \frac { \gamma _ { 2 } - i \delta \omega _ { Q D, G } } { \alpha _ { N P } \left ( \omega _ { G } \right ) } \right ], \\ \text{Re} \left [ \frac { \gamma _ { 2 } - i \delta \omega _ { Q D, G } } { \alpha _ { N P } \left ( \omega _ { G } \right ) } \right ] = 0 & \Leftrightarrow \\ \text{tri-} \\ \text{tri-} \\ \text{.} \end{pmatrix} = 0 & \left ( \omega _ { Q D, G } \right ) = \omega _ { G } - \omega _ { 2 1 }, \, \delta \omega _ { N P, G } = \omega _ { G } - \omega _ { N P }.$$ With known stationary inversion and eigen frequency, the stationary intensities | R ω ( G ) | 2 and | p ( ω G ) | 2 are: $$| R \left ( \omega _ { G } \right ) | ^ { 2 } & = \frac { \gamma _ { 1 } } { \gamma _ { 2 } } N _ { s t } \left ( \omega _ { G } \right ) \left [ N _ { 0 } + \frac { \hbar { \varepsilon } _ { h } r _ { Q D } ^ { 6 } } { \tilde { \mu } _ { Q D } ^ { 2 } } I m \left ( \frac { \gamma _ { 2 } - i \delta \omega _ { Q D, G } } { \alpha _ { N P } \left ( \omega _ { G } \right ) } \right ) \right ], \\ | p \left ( \omega _ { G } \right ) | ^ { 2 } & = \frac { \hbar { \gamma } _ { 1 } } { \varepsilon _ { h } } \frac { | \alpha _ { N P } \left ( \omega _ { G } \right ) | ^ { 2 } } { I m \alpha _ { N P } \left ( \omega _ { G } \right ) } \left [ N _ { 0 } + \frac { \hbar { \varepsilon } _ { h } r _ { Q D } ^ { 6 } } { \tilde { \mu } _ { Q D } ^ { 2 } } I m \left ( \frac { \gamma _ { 2 } - i \delta \omega _ { Q D, G } } { \alpha _ { N P } \left ( \omega _ { G } \right ) } \right ) \right ],$$ or substituting α NP ( ω G ) from (26): $$| R \left ( \omega _ { G } \right ) | ^ { 2 } & = \frac { \gamma _ { 1 } } { \gamma _ { 2 } } N _ { s t } \left ( \omega _ { G } \right ) \left [ N _ { 0 } - \frac { \hbar { e } _ { h } r _ { Q D } ^ { 6 } } { \bar { \mu } _ { Q D } ^ { 2 } \mathbb { X } _ { N P } \gamma _ { 2 } } \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} S _ { 1 } \left ( \omega _ { G } \right ) \right ) \left ( \gamma _ { 2 } ^ { 2 } + \delta \omega _ { Q D, G } ^ { 2 } \right ) \right ], \\ | p \left ( \omega _ { G } \right ) | ^ { 2 } & = \frac { \hbar { \gamma } _ { 1 } } { \varepsilon _ { h } } \frac { \chi _ { N P } } { \gamma _ { N P } + \chi _ { N P } \text{Im} S _ { 1 } \left ( \omega _ { G } \right ) } \left [ N _ { 0 } - \frac { \hbar { e } _ { h } r _ { Q D } ^ { 6 } } { \bar { \mu } _ { Q D } ^ { 2 } \chi _ { N P } \gamma _ { 2 } } \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} S _ { 1 } \left ( \omega _ { G } \right ) \right ) \left ( \gamma _ { 2 } ^ { 2 } + \delta \omega _ { Q D, G } ^ { 2 } \right ) \right ].$$ Pump threshold is determined by the evident requirement of the positive values of both intensities: $$N _ { t h } = - \frac { \hbar { e } _ { h } r _ { Q D } ^ { 6 } } { \tilde { \mu } _ { Q D } ^ { 2 } } \text{Im} \left [ \frac { \gamma _ { 2 } - i \delta \omega _ { Q D, G } } { \alpha _ { N P } \left ( \omega _ { G } \right ) } \right ] = \frac { \hbar { e } _ { h } r _ { Q D } ^ { 6 } } { \tilde { \mu } _ { Q D } ^ { 2 } \chi _ { N P } \gamma _ { 2 } } \left ( \gamma _ { N P } + \chi _ { N P } \text{Im} S _ { 1 } \left ( \omega _ { G } \right ) \right ) \left ( \gamma _ { 2 } ^ { 2 } + \delta \omega _ { Q D, G } ^ { 2 } \right ),$$ which coincides with the threshold inversion (27). In particular, for a single NP QD -( S 1 ( ω G ) = 0 and α NP ( ω G ) = iχ NP / ( γ NP -iδω NP ,G )), the stationary inversion, eigen frequencies, and stationary intensities are reduced to the known expressions: $$\dots \dots \dots \dots \dots \dots \dots \dots \\ N _ { t h, s i n g l e } & = \frac { \hbar { e } _ { h } r _ { Q D } ^ { 6 } \gamma _ { 2 } \gamma _ { N P } } { \bar { \mu } _ { Q D } ^ { 2 } \mathcal { X } _ { N P } } \left [ 1 + \left ( \frac { \omega _ { 2 1 } - \omega _ { N P } } { \gamma _ { 2 } + \gamma _ { N P } } \right ) ^ { 2 } \right ], & \text{satur} \quad \text{lineau} \\ \omega _ { G, s i n g l e } & = \frac { \gamma _ { 2 } \omega _ { N P } + \gamma _ { N P } \omega _ { 2 1 } } { \gamma _ { 2 } + \gamma _ { N P } }, & \text{satur} \quad \text{order} \\ | R _ { s i n g l e } | ^ { 2 } & = \frac { \gamma _ { 1 } } { \gamma _ { 2 } } N _ { s t, s i n g l e } \left [ N _ { 0 } - N _ { t h, s i n g l e } \right ], & \text{for} \quad t l \\ | p _ { s i n g l e } | ^ { 2 } & = \frac { \hbar { \gamma } _ { 1 } } { \varepsilon _ { h } } \frac { \mathcal { X } _ { N P } } { \gamma _ { N P } } \left [ N _ { 0 } - N _ { t h, s i n g l e } \right ]. & \text{Th} \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \\ \mathfrak { D } \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots$$ of nanometers. The pump threshold (in our notation) appears to be about N 0 = 0 01. This pretty low value is a , consequence of the relatively high dipole moment for the QD accepted here for the calculation µ QD = 20 Debai , which definitely overestimates experimental values. The high value of the dipole moments leads in turn to lower saturation power and finally to the more pronounced nonlinearity. Nevertheless, we keep this numerical value in order to highlight the main physical effects of the nonlinear caused bistability and to demonstrate its potential for the sensor applications. Results of the spaser chain are presented in figures. First, the eigen generation wavelength dependence on the NP eigen wavelength λ G = λ G ( λ NP ) is shown in Fig. 4 for a single NP QD -(see ((31))) and for the chain of spasers (see ((27))). This figure gives an initial comparative data about sensitivity of the single and a chain of the spasers to the environmental change, e.g. sensor operation. The refractive index changes causes shift of the eigen wavelength λ NP which in turn leads to the observed shift of causes eigen resonance shift of λ G . There is a special point around λ NP = 783nm where even very small changes in λ NP causes significant changes in λ G , so that ∂λ G ∂λ NP →∞ . This effect is caused by a coupling in the chain and demonstrates potential of the considered system for the sensitivity improvements. Next set of pictures demonstrate threshold as a function of the NP wavelength at the fixed resonance QD wavelength for the single (see ((31))) and a chain of the spasers (see ((30))) at environmental dielectric constant ε h = 2 07. The resonant frequency for the spaser . chain turns out to be shifted in blue region by several tens The stationary QD generated intensity S QD , the total generated intensity S total , and the relative intensity of QD a S, QD ( ω ) in the far field zone are presented as functions of the pump N 0 in Fig. 6 for the single and chain of spasers. FIG. 4. Eigen generation wavelength λ G,single (curve 1) and eigen chain generation frequency λ G (curve 2) as a function of the eigen NP generation wavelength λ NP . Horizontal dashed lines mark the center of QD resonance line, λ QD = 841 2 nm . (curve 3), and the center of narrow band resonance (see below), 840 5 nm (curve 4). . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-6f02f545-79f2-4679-95e9-2541708db508.jpg) glyph[negationslash] ## VI. CHAIN OF COUPLED NANORESONATORS DRIVEN BY AN EXTERNAL FIELD ( A ext ( ω ) = 0 ) It is worth noting, that the nonlinearity is crucial for the appearance of the considered here resonances also in the case of the low (below threshold) levels of pump. The coupling between the NP s, described and quantified by the sums S 1 ( ω )in (21), enhances the nonlinear response of the chain. In order to evaluate this effect, let us consider system (21) and assume no action from the QD on the NP s (inverse action from the NP to QD is kept). In the case of the driving external filed it is justified, because of the external field intensities are typically much higher than ones generated by the QD s: $$\begin{cases} \, N \left ( \omega \right ) = N _ { 0$$ Substituting p ( ω )and R ω ( )into the first equation of (32), one can express N ω ( ) as a function of the external field intensity | A ext ( ω ) | 2 , i.e. describe the saturation effect responsible for the nonlinear response: $$N \left ( \omega \right ) = \frac { N _ { 0 } } { 1$$ It is clearly seen, that in addition to the usual saturation term ˜ µ 2 QD | A ext ( ω ) | 2 glyph[planckover2pi1] 2 γ γ 1 2 ( 1+ ( δω QD γ 2 ) ) 2 there is one more term, which describes the nonlinearity enhancement effect due to the coupling in a chain 1 ∣ ∣ ∣ -α NP r 3 QD ∣ ∣ ∣ 2 . It is convenient (and com- FIG. 5. Generation thresholds for the single (dashed curve 1) and chain of the spasers (curve 2, 3) as a function of the eigen NP generation wavelength λ NP . Hysteresis type curve 3 corresponds to the multi branch solution in Fig. 4 (see curve 2 in Fig.4). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-147e9df1-a218-4e2d-8922-9db8a98ccceb.jpg) monly accepted) to introduce the saturation intensity: $$\begin{array} {$$ The lower saturation intensity S sat ( ω ), the stronger nonlinear response of the chain. The saturation intensity S sat ( ω ) decreases as the expression containing susceptibility ∣ ∣ ∣ 1 -α NP r 3 QD ∣ ∣ ∣ increases. This in turn takes place at S 1 ( ω ) → γ NP -iδω NP iχ NP , see (21). In order to visualize this effect, both enhancement factor EF ω ( ) = ∣ ∣ ∣ 1 -α NP r 3 QD ∣ ∣ ∣ and | A sat ( ω ) | 2 are plotted in Fig. 7, 8 for zero pump N 0 = -1. Dependency of the saturation intensity (34) from the pump level is defined by the energy relaxation rates γ 1 = 2˜ γ / 1 (1 -N 0 ), e. g. S sat ( ω ) increases with growth of N 0 . It means that the pump works 'against' the nonlinearity enhancement and has to be avoided. The maximum of the enhancement factor EF corresponds to the minimum of the saturation intensity | A sat ( ω ) | 2 and hence the respective wavelengths are primary candidates for 'working points' of the chain: at these wavelengths the chain exhibits maximum nonlinear response. Minima of the curves in Fig. 8, which coincide with center of QD line, present saturation intensity for the chain of spasers and single spaser re- ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-df254852-8cef-41fb-9c4f-bcf8a5e1435b.jpg) 0 FIG. 6. (a) The stationary intensities, S total (curves 1 - chain of spasers, 2 - single spaser), S QD (curves 3 - single spaser, 4 - chain of spasers), in nW/cm 2 , and (b) relative stationary intensity a S, QD = S QD /S total for single (dashed curve) and chain of spasers (solid curve). FIG. 7. Spectra of the enhancement factor EF ω ( ) = ∣ ∣ ∣ ∣ 1 -α NP r 3 QD ∣ ∣ ∣ ∣ of the chain of spasers (curve 1) and of the single spaser (curve 2) for zero pump N 0 = -1. Vertical gray dashed line indicates position of the QD resonance. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-1c1e2fbf-b3fa-4233-b7ae-1119709610ac.jpg) FIG. 8. Spectra of the saturation intensity S sat = c 8 π | A sat ( ω ) | 2 of the chain of spasers (curve 1) and of the single spaser (curve 2) for zero pump N 0 = -1. Vertical gray dashed line indicates position of the QD resonance. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-3ad6ef9d-4cdc-41b1-8b0a-aae723b011f5.jpg) spectively. The values of intensities differ by an order of magnitude, S sat = 0 88 mW cm . / 2 for the chain and S sat = 9 5 mW cm . / 2 for the single spaser. A distinguishable property of the response of the NP -QD (both single and chain) is the appearance of the hysteresis behavior. It is demonstrated in Fig. 9, where the typical hysteresis curves of the normalized intensity a S and interference signal a Int are plotted for the case of resonance between the single NP and QD , ω 21 = ω NP (maximum of the curve 4, on Fig. 7), or resonance between chain of NP and QD , ω 21 = ω NBR (maximum of the curve 2, on Fig.7), at different pump levels. Natural constant for the normalization of the external field intensity is the value glyph[planckover2pi1] 2 γ γ 1 2 ˜ µ 2 QD (see (29)), and the results hereafter are presented as a function of the normalized external field intensity a ext = | A ext ( ω ) | 2 ( glyph[planckover2pi1] 2 γ 1 γ 2 ˜ 2 µ QD ) . In the case of pump level above threshold of the chain of NP QD -hysteresis behavior arises for essentially lower values of external field a ext &lt; 10 -6 - see Fig. 9 (e), (f). The dipole moments and respective field intensities as a function of the normalized frequency detuning ∆ 2 = ( ω 21 -ω /γ ) 2 are presented in FIG. 9. Normalized field intensity a S in far field zone for (a) single NP QD -and (b) chain of the NP QD -as a function of the external field intensity a ext ; interference signal a Int in far field zone for (c) single NP QD -and (d) chain of the NP QD -as a function of the external field intensity a ext at the pump levels N 0 = -1 (hysteretic curve 1), N 0 = 0 01 (curve 2, hysteresis , is absent), N 0 = 0 02 (curve 3, hysteresis too small); , (e,f) -a S and a Int for the chain of the NP QD -for two values of power below (curve 2) and above (curve 3) threshold. The wavelength of the external field coincides with the resonance wavelength of the QD and single NP (a), (c), or chain of NP (b), (d) , (e,f). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-cec851ba-ddb9-41a7-9769-0bf75dd0c7bf.jpg) Fig. 10 for the case of zero pump N 0 = -1 and the external field intensity corresponding to the middle of the hysteresis range S ext = 0 77 W . / cm . The hysteresis type 2 spectrum curve can be achieved in the vicinity of the QD resonance, where the interaction between NP and QD reaches maximum. Influence of the coupling can be seen comparing the data in Fig. 10 for a single for a chain of the NP QD -. The same set of data is presented in Fig. 11 for lower external field intensity S ext = 0 117W cm . . / 2 Influence of the pump is presented in Fig. 12, where the results for the same set of parameters are presented for the pump level near threshold N 0 = 0 01. . From the presented above data one can conclude, that the narrowband resonances (which are of primary interest in this work) can be achieved if the edge of the hysteresis curve is shifted (by the external field intensity varying) to the resonance of the QD and NP ∆ 2 = ( ω 21 -ω /γ ) 2 → 0 (remind that the both resonances of the QD and chain FIG. 10. Spectrum dependence of a single and a chain of the NP QD -in case of zero pump N 0 = -1 in the middle of the hysteresis interval of the external field intensity S ext = 0 77 W . / cm : 2 (a) NP dipole moment amplitude | p | (in units of µ QD ), (b) QD dipole moment amplitude | R | all QD s in the chain, (c) normalized field intensity a S and (d) interference signal a int (25). Dashed blue parts of the curves 2 correspond to lower branch of hysteresis. Dotted curve 1 in (b), (c) corresponds to a single NP QD -and solid curve 2 - to the chain of NP QD -. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-0b371c26-0192-4b0b-9327-7bbb37fc37d0.jpg) FIG. 11. Spectrum dependence of a single and a chain of the NP QD -in case of zero pump N 0 = -1 and at the lower external field intensity S ext = 0 117W cm : . / 2 (a) NP dipole moment amplitude | p | (in units of µ QD , (b) QD dipole moment amplitude | R | (c) normalized field intensity a s (25), and (d) signal of the interference measurements a int (25). Dotted curve 1 corresponds to a single NP QD -and solid curve 2 - to the chain of NP QD -. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-0ac14db6-7193-4301-b94f-df3adb185a57.jpg) of NP are supposed to coincide with each other. In Fig. 13 the obtained narrowband peaks at the optimum external field intensities are presented for a single and a chain of the NP QD -. The bandwidth of the found narrowband resonances depends significantly on the nonlinear properties of the considered system: the saturation nonlinearity of the QD causes the bandwidth ∆ 2 squeezing below approximately 0,1. In the case of low nonlinear response (or/and weak coupling between the FIG. 12. Spectrum dependence of a single and a chain of the NP QD -in case of pump near threshold N 0 = 0 01 at the , lower external field intensity S ext = 0 117W cm : . / 2 (a) NP dipole moment amplitude | p | (in units of µ QD ), (b) QD dipole moment amplitude | R | , (c) normalized field intensity a s and (d) interference signal a int (25). Dotted curve 1 corresponds to a single NP QD -and solid curve 2 - to the chain of NP QD -. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-06e2c25d-fd9d-465e-90b6-14d8c93d29f5.jpg) FIG. 13. Narrowband resonances at optimized external field intensities for a single and a chain of the NP QD -in case of zero pump N 0 = -1 (curves 2, S ext = 0 26 9W . / cm ) (a) 2 NP dipole moment amplitude | p | (in units of µ QD ), (b) QD dipole moment amplitude | R | (c) normalized scattered field intensity a s (25), and (d) signal of the interference measurements a int (25). All data are presented for a single (dotted curves) and a chain of the NP QD -(solid curves). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-03a674d7-52de-495e-b331-549c8f3b6abb.jpg) NP and QD ) the resonance bandwidth is in the range of ∆ 2 ∼ 4 ÷ 5. The results of the narrowband resonance bandwidth (for both amplitude a S and interference measurements a Int ) are presented in Fig. 14 as a function of the normalized external field intensity at the different pump levels. FIG. 14. Bandwidth of the found narrowband resonances of a S as a function of the normalized external field intensity: (a) for a single and (b) for a chain of the NP QD -in case of different pump levels (curve 1 - zero pump N 0 = -1, curve 2 is for the pump near threshold N 0 = 0 01). , Dashed vertical markers denote the bounds of hysteresis region. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1106v1-figure-9f31993c-aed7-4c2f-b2fd-d558d1c9230a.jpg) ## VII. CONCLUSION In conclusion, it is necessary to discuss the experimental procedure to visualize the found here narrowband resonances. The spectra shown in Figs. 10-13 are not ones typically measured, for example, in transmission/reflection tests. The found spectra are response dependence on the wavelength of the driving external field causing the hysteresis behavior. In order to realize this spectrum experimentally, the hysteresis curves (e.g. Fig. 9) have to be measured for different wavelengths of the external field. Nevertheless, there is a way to realize these spectra dependence in real time. In this case a - 1 N. I. Zheludev, Opt. Photonics News 22 , 30-35 (2011). - 2 A. V. Kabashin, P. I. Nikitin, Quantum. Electron. 27 , 653654 (1997). - 3 A. V. Kabashin, P. I. Nikitin, Opt. Commun. 150 , 5-8 (1998). - 4 A. V. Kabashin, P. Evans, S. Pastkovsky, W. Hendren, G. A. Wurtz, R. Atkinson, R. Pollard, V. A. Podolskiy, A. V. Zayats, Nature materials 8 , 867-871 (2009). - 5 V. G. Kravets, F. Schedin, R. Jalil, L. Britnell, R. V. Gorbachev, D. Ansell, B. Thackray, K. S. Novoselov, A. K. Geim, A. V. Kabashin, A. N. Grigorenko, Nature materials 12 , 304-309 (2013). - 6 S. Maier, Opt. Express 14 , 1957-1964 (2006). - 7 A. D. Boardman, Electromagnetic Surface Modes (John Wiley &amp; Sons, 1982). - 8 H. Raether, Surface Plasmons (Springer, New York, 1988). - 9 C. Soukoulis, M. Wegener, Science 330 , 1633-1634 (2010). - 10 A. Boltasseva, H. Atwater, Science 331 , 290-291 (2011). - 11 S. Anlage, J. Opt. textbf13, 024001 (2011). - 12 H. T. Chen, H. Yang, R. Singh, J. F. O'Hara, A. K. Azad, S. A. Trugman, Q. X. Jia, and A. J. Taylor, Phys. Rev. Lett. 105 , 247402 (2010). - 13 P. Berini and I. De Leon, Nature Photonics 6 , 16-24 (2011). - 14 C. Soukoulis, M. Wegener, Nature Photon. 5 , 523-530 (2011). - 15 W. L. Barnes, J. Mod. Opt. 45 , 661-669 (1998). - 16 S. Ramakrishna and J. Pendry, Phys. Rev. B 67 , 201101 high power driving field has to be accompanied by a wide band low intensity field used to measure spectrum. The high power field delivers the system (chain of QD NP -) to the upper hysteresis branch, and the spectrum has to be measured at the appropriate driving field intensity. The driving field is supposed to be pulsed as well with the typical time duration of about 100 ns, while the spectrum measurement has to be accomplished during about 10 ns at the appropriate time point of the driving pulse. Rigorously speaking, the theoretical data presenting in this paper do not consider the 'real-time' spectrum measurement and have to be adopted for the respective procedure. This 'real-time' spectrum measurement is supposed to be implemented for sensor applications and is a subject of a separated publication. The found in this the paper narrowband resonances are based on the nonlinear hysteresis phenomena and hence differ principally from any types of the linear resonances, e.g. presented in 19 . In combination with the high sensitivity of the multi-stable systems, these narrow band resonances promise to be an alternative approach for different sensor applications. ## ACKNOWLEDGMENTS This work was partially financially supported by Government of Russian Federation, Grant 074-U01, and by RFBR Projects No. 12-02-00853-a (S.V.F). (2003). - 17 D. J. Bergman and M. I. Stockman, Phys. Rev. Lett. 90 , 027402 (2003). - 18 Vadim A Markel, Divergence of dipole sums and the nature of non-Lorentzian exponentially narrow resonances in onedimensional periodic arrays of nanospheres. J. Phys. B: At. Mol. Opt. Phys. 38 , L115-L121 (2005). - 19 V. G. Kravets, F. Schedin, and A. N. Grigorenko, Phys. Rev. Lett. 101 , 087403 (2008). - 20 M. Noginov, G. Zhu, A. Belgrave, R. Bakker, V. Shalaev, E. Narimanov, S. Stout, E. Herz, T. Suteewong and U. Wiesner, Nature 460 , 1110 (2009). - 21 A. S. Chirkin and A. V. Chipouline, JETP Letters 93 , 114 (2011). - 22 E. Andrianov, A. Pukhov, A. Dorofeenko, A. Vinogradov, and A. Lisyansky, Phys. Rev. B 85 , 165419 (2012). - 23 E. M. Purcell, Spontaneous emission probabilities at radio frequencies , Phys. Rev. 69 , 681 (1946) - 24 A. F. Koenderink, Opt. Lett. 35 , 4208-4210 (2010). - 25 N. Bloembergen, R. Pound, Phys. Rev. 95 , 8-12 (1954). - 26 M. W. P. Strandberg, Phys. Rev. 106 , 617-620 (1957). - 27 F. Bunkin, A. Oraevsky, Izv. Vuzov, Radiophysika 2 , 181 (1959). - 28 O. Hess, J. B. Pendry, S. A. Maier, R. F. Oulton, J. M. Hammand K. L. Tsakmakidis, Nature Materials 911 , 573584 (2012). - 29 N. Liu, L. Langguth, J.K.T. Weiss, M. Fleischhauer, T. Pfau, H. Giessen, Nature Materials 8 , 758-762 (2009). - 30 ]C. Rockstuhl, T. Zentgraf, H. Guo, N. Liu, C. Etrich, I. Loa, K. Syassen, J. Kuhl, F. Lederer, and H. Giessen, Appl. Phys. B 84 , 219-227 (2006). - 31 M. Husnik, M. W. Klein, N. Feth, M. Knig, J. Niegemann, K. Busch, S. Linden, and M. Wegener, Nature Photonics 2 , 614-617 (2008). - 32 D. E. Chang, A. S. Sorensen, P. R. Hemmer, and M. D. Lukin, Phys. Rev. Lett. 97 , 053002 (2006). - 33 D. Mart n-Cano, L. Mart n-Moreno, F. Garc a-Vidal, and ı ı ı E. Moreno, Nano Lett. 10 , 3129-3134 (2010). - 34 V. V. Klimov, Nanoplasmonics , Phys. Usp. 51 , 839-844 (2008). - 35 V. V. Klimov, Nanoplasmonika , ISBN 978-5-9221-1205-5, 2010 (in Russian). - 36 M. Stockman, Spaser explained , Nature Photonics 2 , 327329 (2008). - 37 M. Stockman, The spaser as a nanoscale quantum generator and amplifier , Journal of Optics 12 , 024004 (2010). - 38 M. Stockman, Spaser action, loss-compensation, and stability in plasmonic systems with gain , Phys. Rev. Lett. 106 , 156802 (2011). - 39 N. Zheludev, S. Prosvirin, N. Papasimakis and V. Fedotov, Nature Photonics 2 , 351-354 (2008). - 40 R. Oulton, V. Sorger, T. Zentgraf, R.-M. Ma, C. Gladden, L. Dai, G. Bartal and X. Zhang, Nature 461 , 629-632 (2009). - 41 M. Hill, M. Marell, E. Leong, B. Smalbrugge, Y. Zhu, M. Sun, P. van Veldhoven, E. Jan Geluk, F. Karouta, Y.-S. Oei, R. Ntzel, C.-Z. Ning, and M. Smit, Optics Express 17 , 11107-11112 (2009). - 42 Z. Zhu, H. Liu, S. Wang, T. Li, J. Cao, W. Ye, X. Yuan, and S. Zhu, Appl. Phys. Lett. 94 , 103106 (2009). - 43 A. Banerjee, R. Li, and H. Grebel, Appl. Phys. Lett. 95 , 251106 (2009). - 44 M. Nezhad, A. Simic, O. Bondarenko, B. Slutsky, A. Mizrahi, L. Feng, V. Lomakin, and Y. Fainman, Nature Photonics 4 , 395-399 (2010). - 45 R.-M. Ma, R. Oulton, V. Sorger, G. Bartal and X. Zhang, Nature Materials 10 , 110-113 (2011). - 46 R. A. Flynn, C. S. Kim, I. Vurgaftman, M. Kim, J. R. Meyer, A. J. Mkinen, K. Bussmann, L. Cheng, F.-S. Choa, and J. P. Lon, Optics Express 19 , 8954-8961 (2011). - 47 C.-Y. Wu, C.-T. Kuo, C.-Y. Wang, C.-L. He, M.-H. Lin, H. Ahn, and S. Gwo, Nano Lett. 11 , 4256-4260 (2011). - 48 Y. Yin, T. Qiu, J. Li, P. Chu, Nano Energy 1 , 25-41 (2012). - 49 J. A. Gordon, R. W. Ziolkowski, Optics Express 15 , 26222653 (2007). - 50 S. Wuestner, A. Pusch, K. L. Tsakmakidis, J. M. Hamm, and O. Hess, Phil. Trans. R. Soc. A 369 , 3525-3550 (2011). - 51 A. Sarychev, V. Shalaev, Electrodynamics of metamateri- - als , World Sci., Singapore, 2007. - 52 E. Andrianov, A. Pukhov, A. Dorofeenko, A. Vinogradov, and A. Lisyansky, Optics Express 19 , 24849-24857 (2011). - 53 U. Fano.S. Description of States in Quantum Mechanics by Density Matrix and Operator Techniques In: Rev. Mod. Phys. 29 , 74-93 (1957). - 54 V. M. Fain, Quantum radio physics, v. 1: Photons and nonlinear media , Sovetskoe Radio, 1972 (in Russian) - 55 G. Haken, Laser Light Dynamic , North Holland, Amsterdam, 1985. - 56 S. Akhmanov, Yu. D'yakov, and A. Chirkin, Introduction to Statistical Radio Physics and Optics , Nauka, Moscow, 1981 (in Russian). - 57 S. A. Pikovsky, M. Rosenblum, and J. Kurths, Synchronization. A Universal Concept in Nonlinear Sciences , Cambridge University Press, 2001. - 58 I. E. Protsenko, A. V. Uskov, O. A. Zaimidoroga, V. N. Samoilov, and E. P. O?reilly, Phys. Rev. A 71 , 063812 (2005). - 59 C.-S. Deng, H. Xu, and Lev Deych, Phys. Rev. A 82 , 041803(R) (2010). - 60 W. Weber and G. Ford, Phys. Rev. B 70 , 125429 (2004). - 61 M. Quinten, A. Leitner, J. Krenn, and F. Aussenegg, Opt. Lett. 23 (17), 1331-1333 (1998). - 62 N. Gippius, T. Weiss, S. Tikhodeev, and H. Giessen, Optics Express 18 , 7569-7574 (2010). - 63 N. Feth, M. Knig, M. Husnik, K. Stannigel, J. Niegemann, K. Busch, M. Wegener, and S. Linden, Optics Express 18 , 6545-6554 (2010). - 64 A. Al and N. Engheta, Phys. Rev. B 74 , 205436 (2012). - 65 J. Rico-Garca, J. Lpez-Alonso, and A. Aradian, JOSA B 29 , 53-67 (2012). - 66 S. Maier, P. Kik, and H. Atwater, Phys. Rev. B 67 , 205402 (2012). - 67 A. Al and N. Engheta, New J. Phys. 12 , 013015 (2010). - 68 A. Chipouline, S. Sugavanam, V. A. Fedotov, A. E. Nikolaenko, J. Opt. 14 , 114005 (2012). - 69 J. Petschulat, C. Menzel, A. Chipouline, C. Rockstuhl, A. Tnnermann, F. Lederer, and T. Pertsch, Phys. Rev. A 78 , 043811 (2008). - 70 J. J. Petschulat, A. Chipouline, A. Tnnermann, and T. Pertsch, C. Menzel, C. Rockstuhl, T. Paul, and F. Lederer, Phys. Rev. B 82 , 075102 (2010). - 71 A. Chipouline, J. Petschulat, A. Tuennermann, T. Pertsch, C. Menzel, C. Rockstuhl, F. Lederer, Appl. Phys. A. 103 , 899-904 (2011). - 72 A. V. Malyshev, V. A. Malyshev, Phys.Rev. B 84 , 035314 (2011).
10.1364/JOSAB.32.000824
[ "S. V. Fedorov", "A. V. Chipouline", "N. N. Rosanov" ]
2014-08-05T20:11:06+00:00
2014-08-05T20:11:06+00:00
[ "physics.optics" ]
Hysteresis assisted narrowband resonances in a chain of nonlinear plasmonic arrays
The plasmonic structures exhibiting narrowband resonances (NBR) are of a great interest for various applications. We propose to use hysteresis behavior in a 1D system of nonlinear nanoresonators in order to achieve the NRB; the nonlinearity is provided by saturation of a two-level quantum system coupled with the nanoresonators (nanolaser/spaser configuration). Quantum Dots (QD) were assumed as quantum systems; their numerical parameters have been adopted for estimations. Role of the loss compensation on the quality of the NBR is shown for below (under compensation) and above threshold (generating spasers) operation modes. Amplitude and phase detection schemes of the prospective experimental realization are compared using the developed model. Possible sensor oriented applications of the proposed system are discussed.
1408.1107v1
## On the radio spectra of supernova remnants Dejan Uroˇ sevi´ c Received: date / Accepted: date Abstract The theoretical fundamentals of formation of the supernova remnant (SNR) continuum radio spectra are presented in this review. Mainly based on the Fermi 1 theory - also known as diffuse shock acceleration (DSA) - the different shapes (linear or curved in log-log scale) of SNR radio spectra are predicted for both young and evolved SNRs. On the other hand, some particular forms of spectra of older SNRs can be predicted by including the additional processes such as Fermi 2 acceleration mechanism or thermal bremsstrahlung radiation. Also, all of these theoretically predicted forms of radio spectra are compared with real spectra obtained from observations. Finally this review can represent some kind of 'atlas' with initial patterns for the different kinds of SNR radio spectra - it should be helpful for radio astronomers in their interpretation of the observed radio spectra. Keywords radio spectra · acceleration mechanisms · radiation mechanisms · supernova remnants ## 1 Introduction The synchrotron (magneto-bremsstrahlung) mechanism represents the main production mechanism of radio waves in astrophysical sources. It is radiation produced by ultra-relativistic electrons gyrating in a magnetic field. The two fundamental ingredients of the synchrotron process - magnetic field and highenergy electrons - should provide a reservoir of energy which can be transformed to synchrotron radiation. The synchrotron electrons have helicoidal D. Uroˇ sevi´ c Department of Astronomy, Faculty of Mathematics, University of Belgrade, Studentski trg 16, 11000 Belgrade, Serbia Tel.: +381-11-2027827 Fax: +381-11-2630151 E-mail: [email protected] paths around the field lines and their radiation is highly beamed in the direction of velocity vectors. The magnetic field is always embedded in the interstellar medium (ISM), but electrons should be previously accelerated to the ultra-relativistic velocities to be capable of radiating by the synchrotron process. Due to this, we have to know very thoroughly on which way electrons can be accelerated to ultra-relativistic energies. The most efficient process of particle acceleration is the so-called diffuse shock acceleration (DSA)(e.g. Bell 1978a, Blandford and Ostriker 1978). Also known as the Fermi 1 acceleration mechanism, electrons gain energy as the result of multiple crossing of a charged particle through a shock wave. If an astrophysical object contains some form of shock, we can expect acceleration of charged particles from the medium around the shock. Although heavier particles (such as protons and ions) can be accelerated very efficiently to ∼ 10 15 eV, electrons can also be accelerated to the ultra-relativistic energies ( ∼ 10 12 eV) by DSA mechanism - this lower maximal energy of electrons originates from the very rapidly energy loses induced by the synchrotron radiation. If a shock wave propagates through ISM, the electrons from ISM should be accelerated and be captured by the ISM magnetic field, thus generating synchrotron radiation. The supernova remnants (SNRs) (which can be seen in our Galaxy and in nearby galaxies), active galactic nuclei (AGNs) with associated jets and lobes, pulsars and pulsar wind nebulae are strong synchrotron emitters. All of these objects have their own characteristic forms of synchrotron radio spectra. The shapes of these spectra essentially depend on particle acceleration processes. In this review, the different forms of SNR spectra (linear or curved in log-log scale, hereafter linear or curved, respectively) for young and evolved SNRs are predicted and compared with spectra obtained from radio observations. In Section 2 the DSA mechanism and a way of formation of synchrotron radio spectra (as a direct consequence of the acceleration mechanisms) are briefly presented. The theoretically predicted radio spectra of young and evolved SNRs are reviewed in Sections 3 and 4, respectively. In Section 5, the previously theoretically predicted shapes of radio spectra are compared with the observationally obtained radio spectra. The summary of this review is given in Section 6. ## 2 DSA mechanism and synchrotron radiation ## 2.1 The brief review of the DSA fundamentals Fermi proposed in his crucial paper (Fermi 1949) the way of acceleration of charged particles to the energy of cosmic rays (CRs) and derived that the energy gain in one collision between a particle and the magnetic perturbation to be ∝ ( u/v ) 2 , where u is the velocity of magnetic perturbation, and v is the velocity of high-energy particle. In the interstellar case, the mechanism proposed by Fermi is not very efficient but the fact that particles can gain energy in collisions with the irregularities of the magnetic field is at the basis of all acceleration theories. Later, when the Fermi model was established as the ideal starting point, this original mechanism of particle acceleration was called the second order Fermi acceleration mechanism (also known as Fermi 2 acceleration ). On the other hand, DSA is the first order Fermi acceleration mechanism (also known as Fermi 1 acceleration ) where during the collision between a charged particle and the magnetic perturbation (in the case of DSA the magnetic perturbation is represented by a magnetized collisionless shock discontinuity) 1 , the gain of particle energy is ∝ u/v (e.g. Bell 1978a). In the original version of the Fermi acceleration (Fermi 1949) + and -signs in front of linear part ( u/v ) correspond, respectively, to the approaching or receding motion of the magnetic mirror, and hence to a gain or a loss of energy. Due to this, the linear dependence disappears from corresponding equations. Since the direct collisions (approaching) are statistically more numerous than the inverse ones (receding), due to the relative velocities, there is a net energy gain for the particle, whose energy increases continuously due to the accumulated collisions, and this gain is represented by survived second order dependence ( u/v ) 2 . On the other hand, the net energy gain in an acceleration process would be substantially higher if there were only direct (head-on) collisions. It provides that increase is ∆E/E ∝ u/v , that is, first order in u/v and, appropriately, this is referred to as first-order Fermi acceleration (e.g. Longair 2000, Lequeux 2005). Due to this dependence, when only one collision is considered, DSA is more efficient process than Fermi 2 mechanisms. Further, DSA theory is based on multiple transition of one charged particle through the shock discontinuity from upstream to downstream region and vice-versa. In every passage (head-on) across the shock, independent from which side of shock the passage occurs, the test particle gains energy. This process provides high efficiency of particle acceleration 2 . The basic assumption in this theory (the so-called test particle theory) is that the particle before the actual start of DSA mechanism has very high velocity v /greatermuch u . Of course, DSA model is generalized to include lower starting velocities of test particles (e.g. Bell 1978b). The very important result of DSA theory is the prediction of the distribution function for high-energy particles (or energy spectrum). This theory predicted a power-law energy spectrum of accelerated particles in the form N E ( ) ∝ E -γ , where N E ( ) is the number of particles per unit volume at energy E and γ is the energy index. Furthermore this theory predicted a value of γ = 2 (Bell 1978a, Blandford and Ostriker 1978) for acceleration of particles at the strong shock waves with the compression ratio r = u /u 1 2 = 4, where u 1 and u 2 are 1 The magnetic perturbations (from which a high-energy charge particle can be reflected), are connected with turbulent fluid motion in the downstream region. Fast particles are prevented from streaming away upstream of a shock front by the scattering of Alfv´n waves e which they themselves generate and essentially represent magnetic perturbations in the upstream region. 2 The relation between the characteristic acceleration times to energy E for DSA and Fermi 2 mechanisms is given by t acc (DSA) ∝ M -2 A2 t acc (Fermi 2) (Reynolds 2008), where M A2 = u /v 2 A is the Alfv´n Mach number of the downstream flow; e u 2 is the downstream fluid velocity and v A is the Alfv´n speed, defined e by v A = B/ µ /rho1 ( 0 ) 1 / 2 , where B is the magnetic field strength, µ 0 is the magnetic permeability of the vacuum and /rho1 is the mass density. the upstream and downstream fluid velocities with reference to shock front, respectively. Here, only the fundamentals of linear DSA are presented. In the next sections, the upgraded versions of DSA theory will be presented, where necessary, for the explanation of different forms of radio spectra. ## 2.2 The brief review of the Synchrotron radiation fundamentals /negationslash Electrons are charged particles which can be accelerated to ultra-relativistic energies by DSA mechanism. Also, their energy spectrum at high energies is a power-law with the same value of the energy index γ = 2, as it is derived for protons and heavier ions (Bell 1978b). Due to this, DSA mechanism can provide an energy contingent which can be devoted, together with energy contained in the magnetic field, to the synchrotron emission. The synchrotron emission of one electron is continuum emission with its maximum near the so-called critical frequency (Ginzburg and Syrovatskii 1965). The frequency of maximal emission for an electron with energy E in the magnetic field of strength B , with a component B ⊥ orthogonal to the velocity vector, is defined by the expression: ν/ MHz = 16 0( . E/ GeV) ( 2 B /µ ⊥ G) (Cummings 1973). By using this formula we can calculate the kinetic energies of electrons which radiate by the synchrotron mechanism, and their maxima of emitting energy correspond to the limiting frequencies of the radio domain (10MHz - 100GHz). The corresponding energies of electrons are 800MeV (at 10 MHz) and 80GeV (at 100 GHz), for B ⊥ = 1 µ G - the characteristic value of ISM magnetic field. These energies are obviously ultra-relativistic. For example, if we consider the SNR emission, the electrons which mainly produce radiation by the synchrotron mechanism at 1 GHz have energy ∼ 800MeV . It is clear that the 3 synchrotron radiation at one frequency arises mainly from electrons which have approximately same kinetic energy. On the other hand, the energy spectrum of relativistic electrons which is in the form of power-law has to be transformed in the power-law radio spectrum. The energy index from the energy spectrum can be transformed in the so-called spectral index of the radio spectrum ( α ), by the simple linear equation γ = 2 α + 1. Finally, a radio spectrum may be characterized by the power-law form S ν ∝ ν -α , where S ν is the radio flux density at frequency ν . Obviously, the value for spectral index derived directly from DSA theory is α = 0 5. As measured by observations, the large majority . of radio spectra of SNRs (approximately 20% of all observed Galactic SNRs) have α =0.5! 4 (e.g. see available catalogues of Galactic SNR by Guseinov et al. (2003, 2004a,b) and Green (2009)). It is excellent confirmation that predictions of the DSA theory are correct. The theoretical fundamentals of formation of the curved SNR radio spectra and linear spectra for which α = 0 5 will be . presented in the next sections. 3 The value for the magnetic field used here is 100 µ G. It is standard value for the compressed and amplified ISM magnetic field by the strong shock wave of an SNR (Arbutina et al. 2012, 2013). 4 SNR spectral indices are mainly between 0.2 and 0.8. ## 3 Radio spectra of young SNRs ## 3.1 The power-law (linear in log-log scale) radio spectra of young SNRs In this review, the young SNRs are objects where the particle acceleration is very efficient. It mainly corresponds to free-expansion and especially early Sedov phases of SNR evolution (Woltjer 1972, Berezhko and V¨lk 2004, Pavlovi´ o c et al. 2013). Observations show that young SNRs have steep radio spectral indices, around 0.7 (see Green 2009). It is significantly steeper than the expected α = 0 5, derived from test particle DSA. The theory proposed by Bell's . (1978a,b) predicted steep spectral indices for older SNRs, when the shock wave loses significant part of its energy and particle acceleration is less efficient. Contrary to this prediction we obtain from observations the steep indices for young SNRs, for which the particle acceleration should be highly efficient because of the very fast shock waves (between a few thousand and a few tens of thousand km/s), and for which harder spectra should be expected (shallower spectral indices around 0.5). The explanation of this controversy was given in paper of Bell et al. (2011). In the original Bell's theory from 1978, it was assumed that the magnetic field direction is parallel to the shock normal. This assumption provides efficient diffusion from upstream to downstream region and efficient DSA. Due to this, the resulting spectra of high-energy particles should be harder. Bell et al. (2011) showed that young SNRs with the quasiperpendicular orientation of the magnetic field should have steeper spectral indices. The magnetic field might be mainly quasi-perpendicular in the event of strong magnetic field amplification 5 in the precursor driven by the cosmic ray (CR) streaming (Bell 2004, 2005). Field amplification is induced by j CR × B , where j CR is electric current carried by CR streaming and B is the local (small scale) magnetic field. The background plasma is in motion perpendicular to CR current and therefore predominantly perpendicular to the shock normal since j CR is directed away from the shock. Moving of the background plasma produces current in opposite direction to CR current. This is necessary process to provide electrical quasi-neutrality in the system. Finally, the upstream fluid motion stretches the magnetic field orthogonal to the shock normal, producing a quasi-perpendicular orientation of the magnetic field. Briefly, the field amplification leads predominantly to a quasi-perpendicular magnetic field geometry, and this geometry causes the steepening of the spectral index (Fig. 1). This is not contradicted by polarimetric observations which suggest a predominantly radial large scale magnetic fields which are located mainly in downstream regions of SNR shocks. Bell et al. (2011) gave for the first time an explanation based on the DSA theory for the observed steep spectral indices in young SNRs. This model is comprehensive and free of incorrect assumptions. The steeper spectral indices are not obtained only for the low CR scattering rates, as clearly shown in Fig. 5 The magnetic field amplification is driven by the non-linear effects, when pressure of CRs, in addition to the gas pressure, represents a significant part of the total pressure (Bell 2004). A detailed description of the non-linear DSA will be presented later in this review. Fig. 1 Spectral indices at shock velocity v/ 5 and four CR scattering rates ( ν/ω g = 0.03, 0.1, 0.3 and 1.0) - Figure 1, panel (a), in Bell et al. (2011). θ is the shock obliquity. At a perpendicular shock cos θ = 0. At a parallel shock cos θ = 1. The dotted line next to the curve for ν/ω g = 0.03 is a calculation with finer spatial resolution. For more details see Bell et al. (2011). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-b2cf2f53-f085-4ac9-b977-081475e9762b.jpg) - 1. Alternatively, the geometry might be preferentially quasi-perpendicular if an SNR expands into an ISM or circumstellar medium (CSM) in which a pre-existing magnetic field is nearly parallel to the shock front. Jiang et al. (2013) have recently presented a new explanation for the steeper spectra of young SNRs. They emphasized that Alfv´ enic drift effect can make softer spectra (steeper spectral indices). This effect represents a moving of guiding centers of the gyrating charged particles induced by Alfven waves. The Alfv´ enic drift effect depends on the magnetic field because the Alfv´n Mach e number is inversely proportional to the magnetic field M A = u /v 1 A ∝ 1 /B . In the amplified magnetic fields by the non-linear modified shocks, the Alfv´n e speed v A ∝ B/rho1 -1 / 2 has to be higher and thus the Alfv´ enic drift effect is stronger. Therefore, the Alfv´n Mach number has to be lower. This leads to e the reduced shock compression ratio, and therefore the power-law spectrum of young SNRs should be steeper. The explanation for spectral steepening of young SNRs given by Jiang et al. (2013) is simple and therefore very attractive. On the other hand, this model assumes the test particle case in the non-linear DSA approach. These two concepts are essentially in contradiction. For this reason, the explanation proposed by Jiang et al. (2013) should be considered with caution. 3.2 The curved radio spectra of young SNRs The curved, concave-up radio spectra of young SNRs should be the result of non-linear DSA effects (e.g. Reynolds and Ellison 1992, Allen et al. 2008). The pressure of CR particles produced at the shock wave is included in fluid dynamics equations (see Drury 1983). The shock structure must be self-consistently calculated by including the CR pressure and cannot just be assumed. The modification of shock structure implies changes in the spectrum of accelerated electrons so that this is a highly non-linear problem. Basically, the upstream plasma is decelerated by the CR pressure and heated by plasma at the CR precursor region. Due to this, the effective Mach number becomes smaller at the jump of the subshock , and the compression ratio at the subshock becomes less 6 than four ( r &lt; 4). The total compression ratio of the entire modified shock (from far upstream to the downstream) becomes higher than four ( r &gt; 4). This higher compression ratio appears due to the existence of high-energy (CR) particles in the transition region, with adiabatic index of γ ad = 4 3, / ( r = ( γ ad +1) ( / γ ad -1)). Also, the higher compression ratio originates from loss of the shock energy by CR escaping from the transition region. It is similar situation as for the radiative shocks where photons carry off energy from the system. Due to this, very high compression ratios are possible, as is the case with radiative shocks (Eichler 1984). The change of the compression ratio through a modified shock should induce a change in the energy spectrum of accelerated electrons from that predicted by standard DSA. The energy spectrum of low energy electrons becomes softer (the radio spectrum is steeper) than that of linear DSA, because low energy electrons, with smaller Larmor radii, can penetrate only through the subshock ( r &lt; 4). The spectrum of high energy electrons becomes harder (the radio spectrum is shallower) than that of linear DSA, because high energy electrons, with bigger Larmor radius, can pass through the entire modified shock (subshock plus CR precursor, r &gt; 4). Due to significant CR production, we can expect the concave-up radio spectra observed in the cases of young SNRs (Drury and V¨lk 1981, Longair 2000). o This theory which represents the basis for obtaining the concave-up radio spectra of young SNRs is well established, given in logically complete form, at the same time very comprehensive and quite useful. The modified shocks are closer to the particularly strong shocks which can be detected in the ISM. The modified shocks have finite thickness, contrary to idealized shock discontinuities which are infinitely thin. Until the introduction of the modified shocks, this idealization of an infinitely thin discontinuity has been used in all previous theoretical approaches given in this review. ## 4 Radio spectra of evolved SNRs ## 4.1 The linear radio spectra of evolved SNRs In the cases of evolved SNRs, the particle acceleration mechanisms are not efficient. Moreover, their influences on the SNR dynamics gradually decline 6 The idealized vertical profile of the shock discontinuity is degenerated into the weak subshock discontinuity plus the wide transition region, which together represent a modified shock. and become insignificant relatively fast. We can generally say they are in the later phases of the Sedov phase, and in the radiative phases of SNR evolution (Woltjer 1972, McKee and Ostrkier 1977, Berezhko and V¨lk 2004). The linear o DSA predicts spectral indices around 0.5 and they should be steeper with SNR evolution (Bell 1978a,b). The greatest number of evolved SNRs have spectral indices in the interval 0 5 . ≤ α ≤ 0 6. . It is in agreement with the DSA prediction: the particle acceleration efficiency should decline for an older SNR where its associated shock is weaker, due to this the corresponding compression ratio is lower, and finally, its radio spectrum has to be steeper. On the other hand, a number of evolved shell-like SNRs have spectral indices α &lt; 0 5. . These harder spectra can not be explained only by the DSA theory (neither linear nor non-linear). The particle acceleration mechanisms responsible for production of this flatter form of radio spectra should be the second-order Fermi acceleration mechanism coupled with DSA. Electrons are also accelerated by the second-order acceleration process, in the turbulent downstream plasma. Schlickeiser and F¨rst (1989) proposed an explanation of flat SNR u radio spectra by including simultaneously the energy gain from shock crossing and second-order Fermi acceleration in a low β -plasma . Ostrowski (1999) 7 presented a modified approach to the acceleration process at a shock wave, in the presence of the second-order Fermi acceleration in the turbulent medium near the shock. An alternative explanation for the observed flat synchrotron spectra of SNRs in molecular clouds was discussed. It was shown that shocks may produce very flat cosmic ray particle spectra in the presence of momentum diffusion. Due to this, the medium Alfv´n Mach number shocks for such e SNRs can naturally lead to the flatter observed spectral indices. The coupling of DSA and Fermi 2 mechanisms should represent the next step in the development of particle acceleration theory for all types of SNRs and other high energy astrophysical objects. It will be a demanding task in the sense of theoretical analysis. For providing comprehensive results of numerical simulations, significant computational power should be used. At the first glance, the flatter spectra should be expected for very old SNRs in the radiative phases of evolution. The fully radiative (isothermal) shocks feature a very high compression ratio r = M 2 T , where M T is the isothermal Mach number. Due to this, the spectral indices should be significantly flatter because α = 3 (2( / r -1)). Here, we should emphasize that for the flat spectral indices of SNRs (0 2 . &lt; α &lt; 0 5), . the corresponding fully radiative shocks should be very weak, i.e. the values of isothermal Mach numbers should be between 2 and 3 (Fig. 2). Due to this, the detection of a fully radiative SNR with a flat spectral index is highly unrealistic. For a detailed review on SNRs with flat radio spectra, see Oni´ (2013b) c and references therein. 7 Plasma β = p/p mag , where p is the gas pressure, and p mag is the magnetic pressure. Fig. 2 Change of the radio spectral index as function of isothermal Mach number for the totally radiative shock of an SNR (Oni´ 2013b). c ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-9095a756-b48d-48b2-a7c4-d94c75fd23b2.jpg) ## 4.2 The curved radio spectra of evolved SNRs A few evolved SNRs embedded in a dense ISM environment produce the curved radio spectra as a result of a significant component of the thermal bremsstrahlung radiation in their total radio emission (see e.g. Uroˇevi´ and s c Pannuti 2005, Uroˇ sevi´ et al. 2007, Oni´ et al. 2012). Especially at the higher c c radio frequencies, the thermal bremsstrahlung component becomes significant ( S ν ∝ ν -0 1 . ), and when combined with the nominal synchrotron emission detected from SNRs, the spectrum appears flatter than expected when extrapolating from lower radio frequencies where synchrotron component is dominant ( S ν ∝ ν -α ). The thermal bremsstrahlung component manifests itself as a bend in a spectrum in the concave-up form. The necessary conditions for significant thermal emission of an object are that the radiative plasma should be at high densities and low temperatures: 1-10 cm -3 and 1000 - 10000 K, respectively (e.g. Uroˇevi´ and Pannuti 2005, Uroˇ sevi´ et al. 2007). It corres c c sponds to evolved SNRs, especially the class of so-called mixed-morphology or also often called thermal composite 8 SNRs, embedded in molecular cloud environment (Oni´ c et al. 2012). On the other hand, the high frequency thermal emission naturally leads to low-frequency thermal absorption. Due to this we should expect that this concave-up form of spectrum turnovers into the concave-down form at the low-frequency end of the radio domain (for details see Oni´ et al. (2012), Oni´ (2013a,b)). c c This 'thermally active' model is simple and intuitively logical. On the other hand, the most important drawback in this approach is related to the cooling rate of hot gas in an SNR interior. Due to this, the thermal bremsstrahlung 8 The mixed-morphology or thermal composite SNRs appear as shell like in radio, but with bright interiors due to thermal X-rays (e.g. Rho and Petre 1998, Jones et al. 1998). emission is not expected from the hot interiors. It is expected from the same volume from which the synchrotron emission is generated, or from CR and radiative precursors. However this model works very well for SNRs embedded in dense ( n &gt; 1 cm -3 ionized, atomic and primary molecular) environment (e.g. Galactic SNR 3C396, see Oni´ et al. (2012)). c The radio spectra of evolved SNRs could be curved in the opposite direction, i.e. they appear in concave-down form. This kind of spectrum can be explained using DSA theory with the effect of synchrotron losses within the finite emission region. If the thin region near the shock discontinuity is not resolved by the telescope beam, the observed emission contains some emission from electrons which have been diffused away from the place of effective acceleration and lose a significant amount of energy via the synchrotron emission. As these losses are more severe for higher energy electrons, we expect this to steepen the observed synchrotron spectrum. For details see Heavens and Meisenheimer (1987), Longair (2000, and references therein). This concavedown form of radio spectra should correspond to very old SNRs, for which electrons have had enough time to lose a significant amount of energy at the 9 highest radio frequencies, and primarily to distant (mainly extragalactic) SNRs for which the limitation in telescope resolution leads to the capturing of radio emission from the sample of 'exhausted' electrons. ## 5 Examples of different forms of SNR radio spectra obtained from observations The radio spectra of SNRs obtained from observations appear predominantly in linear form but with obvious scattering in the flux densities (e.g. Gao et al. (2011), Sun et al. (2011)). Furthermore, they are generally poorly-studied with respect to number of observational data points at the frequencies available for radio observations. Also, a significant dispersion of values of the flux densities at the same frequency can be found. As a primary problem, the determination of accurate values of the integrated flux densities is a very demanding task with non-unique exiting values. Additionally, the radio spectral index variations, both with frequency and location within several Galactic SNRs were detected and described in the last three decades (for details see Oni´ (2013a,b), c and references therein). Due to these difficulties, at least for the majority of observed SNRs, the present knowledge of radio spectral indices as well as of the overall shapes of the SNR radio continuum spectra is far from being precise. However, some trends toward the curved spectral forms can be found in relatively recent literature. 9 The lifetime of an SNR, as defined by McKee and Ostriker (1977), can be up to one million years - this timescale is comparable to the typical timescale of synchrotron loss for electrons which radiate at the highest radio frequencies. ## 5.1 Young SNRs There is a considerable amount of observational evidence for steep spectral indices of young SNRs. The brief inspection of Galactic SNR catalogues (e.g. Guseinov et al. 2003, 2004a,b, Green 2009) shows that all historical Galactic SNRs (RCW86 - probably remnant of SN185, SN1006, Tycho SNR, Kepler SNR, Cas A, G1.9+0.3) 10 have steep spectral indices between 0.6 and 0.8. The modifications of DSA theory described in this review, in Subsection 3.1, can explain these apparent steeper linear spectral forms of young SNRs. Besides spectra with linear profiles, some of the historical Galactic SNRs show tentatively curved concave-up spectra (hardening to higher energy) predicted by non-linear DSA (this review, Subsection 3.2). Braude et al. (1970) detected mildly concave-up form of Tycho SNR spectrum in the range between 38 MHz and 5 GHz (Fig. 3). It was the first indication of concave-up curvature for an SNR spectrum. After that, Roger et al. (1973) once again confirmed detection of the same spectral form of Tycho SNR. The explanation of this phenomenon was not examined until Reynolds and Ellison (1992) showed that the spectral curvature observed in Tycho and Kepler SNRs should be explained by the non-linear DSA effects. They presented the first model for synchrotron spectra calculated with the self-consistent, modified shock model by the non-linear DSA and compared them with the observed radio spectra of Tycho and Kepler SNRs (Fig. 4), finding reasonable agreement. Additionally, they predicted that if inconsistencies in the total radio spectrum of SN 1006 SNR were resolved, their curved models would fit just as well there. Jones et al. (2003) gave observational evidence that the radio spectrum of Cas A should be concave-up due to their positive identification of infrared synchrotron radiation from this SNR. Their flux density at 2.2 µ m, after correction for extinction, falls significantly above the power-law extrapolation from the radio. If the curvature were constant across this full range of wavelengths, then the local spectral index would change from approximately 0.75 at cm wavelengths to approximately 0.5 at 2.2 µ m. Similar as in previous case, Vink et al. (2006) obtained the concave-up form of spectrum for RCW86 SNR, but using X-ray data. They analyzed the X-ray synchrotron emission from this SNR and concluded that concave-up spectrum is necessary in order to properly fit radio and X-ray data together. Finally, Allen et al. (2008) showed the evidence of a concave-up synchrotron spectrum of SN 1006, demonstrating for the first time that the synchrotron spectrum of SN 1006 seems to flatten with increasing energy. The evidence that the synchrotron spectra (from radio to X-rays) of SN 1006 are curved can be interpreted as evidence of curvature in the GeVto-TeV electron spectra. All previously described concave-up spectra obtained from observations present the evidence of curved electron spectra and suggest 10 Crab nebula and SNR 3C58 represent particular type of SNR, the so-called pulsar wind nebulae, which are not target of this review. Contrary to shell-like, composite and mixedmorphology SNRs which are target of this review, the pulsar wind nebulae typically have flat spectral indices between 0.0 and 0.3 (e.g. Reynolds et al 2012). Fig. 3 The spectra of five discrete radio sources in 10 MHz - 5 GHz frequency range (Braude et al. 1970). The spectrum of Tycho SNR (3C10) is shown - evidently in tentative concave-up form. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-83807a08-72af-47b5-b66a-cbade944b18c.jpg) that cosmic rays are not test particles. The cosmic-ray pressure at the shock is large enough to modify the structure of the shock. Fig. 4 Slightly concave-up spectra of three historical SNRs (Reynolds and Ellison 1992). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-be00a79f-60ab-47fd-a106-dbdbb4895d8e.jpg) ## 5.2 Evolved SNRs The largest fraction of observed SNRs is characterized by spectral indices in the range α ∈ (0 5 . , 0 55). These values were predicted by the test particle DSA . theory. On the other hand a significant number of observed SNRs have flatter indices α &lt; 0 5 (this review, Subsection 4.1). There are several explanations . of the harder radio spectra of SNRs: significant contribution to the observed emission of the second-order Fermi mechanism, high compression ratio ( &gt; 4), contribution of secondary electrons left from the decay of the charged pions (Uchiyama et al. 2010, Vink 2012), and thermal bremsstrahlung contamination. For details regarding flat radio spectra of SNRs see Oni´ (2013b). c The radio spectra of evolved SNRs can be curved. The first ideas about the significant influence of thermal bremsstrahlung in radio emission of evolved SNRs were presented in Uroˇ sevi´ (2000), and Uroˇ sevi´ et al. (2003a,b). The c c first attempts at identifying the concave-up forms of radio spectra of evolved SNRs can be found in Uroˇ sevi´ and Pannuti (2005 - OA184 SNR c 11 ), Uroˇevi´ s c et al. (2007) and Oni´ and Uroˇ sevi´ (2008) for SNR HB3. Oni´ et al. (2012) c c c presented the possible significant contribution of the thermal bremsstrahlung emission inferred from the concave-up spectra of three Galactic SNRs: IC443, 3C391 and 3C396 (Figs. 5 and 6). All these SNRs are evolved and embedded 11 Foster et al. (2006) concluded that OA184 is rather a Galactic HII region then an SNR. Fig. 5 Multiband image of composite and 'radio thermally active' SNR 3C 396. The molecular gas ( 12 CO intensity map) is shown in red, the 24 µ m mid-IR emission in green, and 1.0 - 7.0 keV X-rays in blue. The radio contours at 1.4 GHz are also shown (Su et al. 2011). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-b0976b49-db20-4542-a7ac-85a2d6e38c66.jpg) in a high density molecular cloud environment (for details see Oni´ et al. 2012, c Oni´ c 2013a). By inspection and comparison of Fig. 4 and Fig. 6 it is clear that spectral curving for some young and evolved SNRs exists. At first glance, the concaveup spectral forms for evolved SNRs are visible in Fig. 6 than for young ones (Fig. 4). On the other hand, spectra of young SNRs have more data points, thus providing better statistics. Generally, it can be concluded that these spectra appear in similar form. Also, the slopes of the integrated radio continuum spectra of SNRs at higher frequencies (between 10-100 GHz) could be flatter 12 because of the influence of the spinning dust emission (Scaife at al. 2007). The spinning dust is responsible for a creation of a 'hump' in the high-frequency radio spectrum (Draine and Lazarian 1998). For details see Oni´ (2013b). c This model can not provide an extension of the concave-up form to the Xray part of an SNR spectrum. The spectral extension into X-ray domain can be expected for all SNRs, as such as ones with significant thermal bremsstrahlung emission. Due to this, whether the thermal bremsstrahlung model or spinning dust model is responsible for a concave-up radio spectrum can be determined through X-ray observations. The detection of overall (from radio to X-rays) 12 It results in the concave-up form of overall radio spectrum. Fig. 6 Radio spectra of possible thermally active SNRs: IC443, 3C391 and 3C396 (Oni´ et c al. 2012). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-77589dc6-b055-4c11-92ad-59c9b1249bef.jpg) concave-up spectral forms for evolved SNRs should be an interesting task for observers in near future. A few examples of concave-down radio spectra of evolved SNRs can be found in recent literature. The theoretical background is given in this review, Subsection 4.2. Among the Galactic and some Large Magellanic Cloud (LMC) SNRs there is existence of spectral break and steepening at higher radio fre- quencies. Xiao et al (2008) identified a spectral break at 1.5 GHz for Galactic SNR S147. The low-frequency spectral index is around 0.3, and the highfrequency spectral index is around 1.2. The apparent bending was explained by effects induced by synchrotron losses, during the early phase of the SNR evolution. This would cause a bending at a rather high frequency. The subsequent expansion of S147 would shift the spectral break frequency toward about 1.5 GHz. Crawford et al. (2008) detected concave-down spectrum with steepening at frequencies around 3 GHz for evolved LMC SNR J0455-6838 (Fig. 7). The similar spectral form was detected for LMC SNR J0527-6549 (DEM L204) (Bozzetto et al. 2010), with the spectral break was detected also at around 3 GHz. For the first time Bozzetto et al. (2010) gave an explanation based on DSA theory, by the effect of coupling between synchrotron losses and observational constraints when the distant (extragalactic) emission region stayed unresolved (see Subsection 4.2 in this review). De Horta et al. (2012), Bozzetto et al. (2012), and Bozzetto et al. (2013) presented concave-down spectra of an additional three evolved LMC SNRs. They gave an explanation of bending based on the observational effects - the shortest baseline observations as a result give missing flux because of the lack of short spacings. Additional observations should resolve whether the steepening at high frequencies originates from observational effects or effects based on theoretical predictions: probably the final explanation will be based on a combination of both. Recently, Pivato et al. (2013) detected concave-down spectrum of evolved Galactic mixed-morphology SNR HB 21, with steepening at around 6 GHz (Fig. 8). They analyzed the WMAP 7-year data in frequency range between 23 and 93 GHz, achieving the first detection of HB 21 at four frequencies in this interval. They explained the concave-down form of spectrum by the synchrotron losses in a homogeneous source of continuously injected electrons, as it is described in this review, Subsection 4.2. Fig. 7 The concave-down radio spectrum of LMC SNR J0455-6838 (Crawford et al. 2008). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-51f643bf-54cc-40fc-8f61-3b01597ae1d7.jpg) The low-frequency turnovers were detected in the earliest measurements made of the spectra of SNRs (e.g. Roger et al. 1973). This effect should be Fig. 8 The concave-down radio spectrum of HB21 (Pivato et al. 2013). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-8e14cc9c-5852-42aa-a51f-971b2ca8ca3f.jpg) a result of the thermal absorption in optically thick environment or the synchrotron self-absorption, again in the opaque medium, at low radio frequencies. The corresponding theoretically derived spectral indices are α = -2 and α = -2 5, respectively (see Longair 2000). There are several SNRs with radio . spectra which show breaks at low radio frequencies (Fig. 9). These spectra often lack data points at low radio frequencies. Due to this, the observational confirmation of which of these two processes is dominantly active could be a very demanding task. Additionally, the low-frequency absorption is mainly related to the ISM along the line-of-sight between an SNR and us as observers, for example, in the cases of the SNRs W49B (Lacey et al. 2001), CTB 80 (Castelletti and Dubner 2005), G354.4+0.0 (Roy and Pal 2013). There are a few SNRs with detected intrinsic low-frequency absorption related to the sources themselves (e.g. IC 443, 3C 391, Oni´ c et al. (2012, and references therein)). Fig. 9 The radio spectrum with the low-frequency turnover of SNR IC443 (Oni´ 2013a). c ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1107v1-figure-9c5fefc6-ef13-4775-91db-842ba7711b5f.jpg) ## 6 Summary In this review, I presented: - i) a brief overview of fundamentals of DSA and synchrotron mechanisms. - ii) theoretical explanations for the continuum SNR radio spectra formation. The predictions of linear and curved forms of radio spectra are presented for both young and evolved SNRs. These predictions are mainly based on DSA theory. - iii) examples of SNR radio spectra obtained from observations which are compared with the different theoretically predicted spectral forms. The theoretical predictions and some observational confirmations of different spectral forms in radio of shell-like, composite and mixed-morphology SNRs (mentioned in this review) are summarized in Table 1. Table 1 The theoretically predicted spectral forms and some examples for observationally obtained radio spectra of shell-like, composite and mixed-morphology SNRs. | theoretical predictions | theoretical predictions | theoretical predictions | theoretical predictions | theoretical predictions | theoretical predictions | |---------------------------|--------------------------------|---------------------------------------|---------------------------|------------------------------|-----------------------------| | | linear radio spectra | linear radio spectra | linear radio spectra | curved radio spectra | curved radio spectra | | | α = 0 . 5 | steep ( α > 0 . 5) | flat ( α < 0 . 5) | concave-up | concave-down | | young SNRs | test particle DSA | ampl. mag. field + quasi-perp. shocks | DSA + Fermi 2 | non-linear DSA | obs. effects | | evolved SNRs | DSA | test particle DSA | DSA + Fermi 2 | synch. + brem. or spin. dust | obs. effects + DSA effects | | from observations | from observations | from observations | from observations | from observations | from observations | | | linear radio spectra | linear radio spectra | linear radio spectra | curved radio spectra | curved radio spectra | | | α = 0 . 5 | steep ( α > 0 . 5) | flat ( α < 0 . 5) | concave-up | concave-down | | young SNRs | / | e.g. Cas A, G1.9+0.3 | / | e.g. Tycho, Kepler, SN1006 | / | | evolved SNRs | e.g. Monoceros and Lupus loops | e.g. HB3, HB9 | e.g. W28, Kes67, 3C434.1 | e.g. IC443, 3C391, 3C396 | e.g. S147, HB21, J0455-6838 | Finally, the high-frequency and low-frequency domains of the SNR radio spectra are covered with low number of data points or no data at all. The effects of curving in spectra are connected with these ending regions of the radio domain. Due to this, the new confirmations of the theoretically predicted radio spectral features at high frequencies could be expected from archival or future observations by the upgraded ATCA (Australia Telescope Compact Array), WMAP (Wilkinson Microwave Anisotropy Probe), and ALMA (Atacama Large Millimeter/submillimeter Array) telescopes. Additionally, LOFAR (Low-Frequency Array) interferometer should be used for the detection of the low-frequency turnovers. In the future, SKA (Square Kilometre Array) telescope will probably give final answers for the open questions related to bending in the SNR radio spectra. Acknowledgements I would like to thank the referee for excellent comments and suggestions. Also,I would like to thank N. Duric, T. Pannuti, D. Oni´, B. Arbutina, and M. c Pavlovi´ for c help in many aspects: exciting discussions, careful reviewing and editing of typescript, providing some data and references, etc. Their comments provided that the final version of this review has appeared in significantly better form. Additionally I acknowledge the financial support of the Ministry of Education, Science, and Technological Development of the Republic of Serbia through the project No. 176005 'Emission Nebulae: Structure and Evolution'. ## References - Allen GE, Houck JC, Sturner SJ (2008) Evidence of a curved synchrotron spectrum in the supernova remnant SN 1006. Astrophys J 683:773-785 - Arbutina B, Uroˇ sevi´ D, Andjeli´ MM, Pavlovi´ MZ, Vukoti´ B (2012) modified equipartic c c c tion calculation for supernova remnants. Astrophys J 746:79 - Arbutina B, Uroˇ sevi´ D, Vuˇeti´ MM, Pavlovi´ MZ, Vukoti´ B (2013) Modified equipartition c c c c c calculation for supernova remnants. Cases α = 0.5 and α = 1. Astrophys J 777:31 - Bell AR (1978a) The acceleration of cosmic rays in shock fronts. I. Mon Not R Astron Soc 182:147-156 - Bell AR (1978b) The acceleration of cosmic rays in shock fronts. II. Mon Not R Astron Soc 182:443-455 - Bell AR (2004) Turbulent amplification of magnetic field and diffusive shock acceleration of cosmic rays. Mon Not R Astron Soc 353:550-558 - Bell AR (2005) The interaction of cosmic rays and magnetized plasma. Mon Not R Astron Soc 358:181-187 - Bell AR, Schure KM, Reville B (2011) Cosmic ray acceleration at oblique shocks. Mon Not R Astron Soc 418:1208-1216 - Berezhko EG, V¨lk HJ (2004) The theory of synchrotron emission from supernova remnants. o Astron Astrophys 427:525536 - Blandford RD, Ostriker JP (1978) Particle acceleration by astrophysical shocks. Astrophys J 221:L29-L32 - Bozzetto LM, Filipovi´ MD, Crawford EJ, Bojiˇi´ IS, Payne JL, Mendik A, Wardlaw B, De c c c Horta AY (2010) Multifrequency radio observations of a SNR in the LMC. The case of SNR J0527-6549 (DEM L204). Serb Astron J 181:43-49 Bozzetto LM, Filipovi´ MD, Crawford EJ, Payne JL, De Horta AY, Stupar M (2012) Radio c continuum observations of LMC SNR J0550-6823. Rev Mex Astron Astrophys 48:4146 Bozzetto LM, Filipovi´ MD, Crawford EJ, Sasaki M, Maggi P, Haberl F, Uroˇ sevi´ D, Payne c c - JL, De Horta AY, Stupar M, Gruendl R, Dickel J (2013) Multifrequency study of SNR J0533-7202, a new supernova remnant in the LMC. Mon Not R Astron Soc 432:21772181 - Braude SYa, Megn AV, Ryabov BP, Zhouck IN (1970) The spectra of some discrete radio - sources in 10-5000 MHz frequency range. Astrophys Space Sci 8:275-322 - Castelletti G, Dubner G (2005) A multi-frequency study of the spectral index distribution in the SNR CTB 80. Astron Astrophys 440:171-177 - Crawford EJ, Filipovi´ MD, De Horta AY, Stootman FH, Payne JL (2008) Radio-continuum c study of the supernova remnants in the Large Magellanic Cloud - an SNR with a highly polarised breakout region - SNR J0455-6838. Serb Astron J 177:61-66 - Cummings AC (1973) A study of cosmic ray positron and electron spectra in interplanetary and interstellar space and the solar modulation of cosmic rays. Ph.D. thesis, Caltech - De Horta AY, Filipovi´ c MD, Bozzetto LM, Maggi P, Haberl F, Crawford EJ, Sasaki M, Uroˇ sevi´ D, Pietsch W, Gruendl R, Dickel J, Tothill NFH, Chu Y-H, Payne JL, Collier c JD (2012) Multi-frequency study of supernova remnants in the Large Magellanic Cloud. The case of LMC SNR J05307007. Astron Astrophys 540:25 - Draine BT, Lazarian A (1998) Diffuse galactic emission from spinning dust grains. Astrophys J 494:L19-L22 - Drury LO'C (1983) An introduction to the theory of diffusive shock acceleration of energetic particles in tenuous plasmas. Rep Prog Phys 46:973-1027 - Drury LO'C, V¨ olk HJ (1981) Hydromagnetic shock structure in the presence of cosmic rays. Astron Astrophys 248:344-351 - Eichler D (1984) On the theory of cosmic-ray-mediated shocks with variable compression ratio. Astrophys J 277:429-434 - Fermi E (1949) On the origin of the cosmic radiation. Phys Rev 75:1169-1174 - Foster T, Kothes R, Sun XH, Reich W, Han JL (2006) 10 51 erg less: the Galactic H II region OA 184. Astron Astrophys 454:517-526 - Gao XY, Han JL, Reich W, Reich P, Sun XH, Xiao L(2011) A Sino-German λ 6 cm polarization survey of the Galactic plane. V. Large supernova remnants. Astron Astrophys 529:159 - Ginzburg VL, Syrovatskii SI (1965) Cosmic magnetobremsstrahlung (synchrotron radiation). Annu Rev Astron Astrophys 3:297-350 - Green DA (2009) A revised Galactic supernova remnant catalogue. Bull Astron Soc India 37:45-61 - Guseinov OH, Ankay A, Tagieva SO (2003) Observational data on galactic supernova remnants: I. The supernova remnants within l=0-90 degrees. Serb Astron J 167:93-110 - Guseinov OH, Ankay A, Tagieva SO (2004a) Observational data on galactic supernova remnants: II. The supernova remnants within l=90-270 degrees. Serb Astron J 168:5569 - Guseinov OH, Ankay A, Tagieva SO (2004b) Observational data on galactic supernova remnants: III. The supernova remnants within l=270-360 degrees. Serb Astron J 169:6582 - Heavens AF, Meisenheimer K (1987) Particle acceleration in extragalactic sources - the role of synchrotron losses in determining the spectrum. Mon Not R Astron Soc 225:335-353 Jiang ZJ, Zhang L, Fang J (2013) Spectral evolution of accelerated particles in supernova remnants. Mon Not R Astron Soc 433:1271-1275 - Jones TJ, Rudnick L, DeLaney T, Bowden J (2003) The identification of infrared synchrotron radiation from Cassiopeia A. Astrophys J 587:227-234 - Jones TW, Rudnick L., Jun B-Il, Borkowski KJ, Dubner G., Frail DA, Kang H, Kassim NE, McCray R (1998) 10 51 ergs: the evolution of shell supernova remnants. Publ Astron Soc Pacific 110:125-151 - Lacey CK, Lazio T, Joseph W, Kassim NE, Duric N, Briggs DS, Dyer KK (2001) Spatially resolved thermal continuum absorption against supernova remnant W49B. Astrophys J 559:954-962 - Lequeux J (2005) The interstellar medium, with the collaboration of E Falgarone and C Ryter. Springer-Verlag, Berlin, Heidelberg - Longair MS (2000) High energy astrophysics. Volume 2. Stars, the Galaxy and the interstellar medium. Cambridge University Press, Cambridge (UK) - McKee CF, Ostriker JP (1977) A theory of the interstellar medium - three components regulated by supernova explosions in an inhomogeneous substrate. Astrophys J 218:148169 - Oni´ c D (2013a) Thermal radiation of supernova remnants in radio domain. Ph.D. thesis, University of Belgrade - Oni´ c D (2013b) On the supernova remnants with flat radio spectra. Astrophys Space Sci 346:3-13 - Oni´ c D, Uroˇevi´ D (2008) The analysis of the possible thermal emission at radio frequencies s c from an evolved supernova remnant HB 3 (G132.7+1.3): revisited. Serb astron J 177:6771 - Oni´ c D, Uroˇ sevi´ c D, Arbutina B, Leahy D (2012) On the existence of 'radio thermally active' Galactic supernova remnants. Astrophys J 756:61 - Ostrowski M (1999) Supernova remnants in molecular clouds: on cosmic ray electron spectra. Astron Astrophys 345:256258 - Pavlovi´ MZ, Uroˇ sevi´ c c D, Vukoti´ c B, Arbutina B, G¨ oker ¨ D U (2013) The radio surfacebrightness-to-diameter relation for Galactic supernova remnants: sample selection and robust analysis with various fitting offsets. Astrophys J Suppl Ser 204:4 - Pivato G, Hewitt J, Tibaldo L, Acero F, Ballet J, Brandt TJ, de Palma F, Giordano F, Janssen GH, Johannesson G, Smith DA (2013) Fermi LAT and WMAP observations of the supernova remnant HB 21. Astrophys J 779:179 Reynolds SP (2008) Supernova remnants at high energy. Annu Rev Astron Astrophys 46:89126 Reynolds SP, Ellison DC (1992) Electron acceleration in Tycho's and Kepler's supernova remnants - spectral evidence of Fermi shock acceleration. Astrophys J 399:L75-L78 Reynolds SP, Gaensler BM, Bocchino F (2012) Magnetic fields in supernova remnants and pulsar-wind nebulae. Space Sci Rev 166:231-261 Rho J, Petre R (1998) Mixed-morphology supernova remnants. Astrophys J 503:L167-L170 Roger RS, Bridle AH, Costain CH (1973) The low-frequency spectra of nonthermal radio sources. Astron J 78:1030-1057 Roy S, Pal S (2013) Discovery of the Small-diameter, Young Supernova Remnant G354.4+0.0. Astrophys J 774:150 Scaife A, Green DA, Battye RA, Davies RD, Davis RJ, Dickinson C, Franzen T, GnovaSantos R, Grainge K, Hafez YA, Hobson MP, Lasenby A, Pooley GG, Rajguru N, Rebolo R, Rubino-Martin JA, Saunders RDE, Scott PF, Titterington D, Waldram E, Watson RA (2007) Constraints on spinning dust towards Galactic targets with the Very Small Array: a tentative detection of excess microwave emission towards 3C396. Mon Not R Astron Soc 377:L69L73 Schlickeiser R, F¨rst E (1989) The origin of flat radio spectra in shell-type supernova remu nants. Astron Astrophys 219:192-194 Su Y, Che Y, Yang J, Koo B-C, Zhou X, Lu D-R, Jeong I-G, DeLaney T (2011) Molecular environment and thermal X-ray spectroscopy of the semicircular young composite supernova remnant 3C 396. Astrophys J 727:43 Sun XH, Reich P, Reich W, Xiao L, Gao XY, Han JL (2011) A Sino-German λ 6 cm polarization survey of the Galactic plane. VII. Small supernova remnants. Astron Astrophys 536:83 Uchiyama Y, Blandford RD, Funk S, Tajima H, Tanaka T (2010) Gamma-ray emission from crushed clouds in supernova remnants. Astrophys J 723:L122-L126 Uroˇ sevi´ c D (2000) The Σ -D relation as an indicator of radio loop origin. Ph.D. thesis, University of Belgrade Uroˇ sevi´ c D, Duric N, Pannuti TG (2003a) A modified theoretical Σ -D relation for supernova remnants: I. The case of constant temperature within the supernova remnant. Serb Astron J 166:61-66 Uroˇ sevi´ c D, Duric N, Pannuti TG (2003b) A modified theoretical Σ -D relation for supernova remnants: II. The case of variable temperature within the supernova remnant. Serb Astron J 166:67-70 Uroˇ sevi´ D, Pannuti TG (2005) Thermal emission at radio frequencies from supernova remc nants and a modified theoretical Σ -D relation. Astropart Phys 23:577-587 Uroˇ sevi´ c D, Pannuti TG, Leahy D (2007) An analysis of the broadband (22-3900 MHz) radio spectrum of HB 3 (G132.7+1.3): the detection of thermal radio emission from an evolved supernova remnant? Astrophys J 655:L41-L44 Vink J (2012) Supernova remnants: the X-ray perspective. Astron Astrophys Rev 20:49 Vink J, Bleeker J, van der Heyden K, Bykov A, Bamba A, Yamazak R (2006) The X-ray synchrotron emission of RCW 86 and the implications for its age. Astrophys J 648:L33L37 Woltjer L (1972) Supernova remnants. Annu Rev Astron Astrophys 10:129-158 Xiao L, F¨rst E, Reich W, Han JL (2008) Radio spectral properties and the magnetic field u of the SNR S147. Astron Astrophys 482:783-792
10.1007/s10509-014-2095-4
[ "Dejan Urošević" ]
2014-08-05T20:18:35+00:00
2014-08-05T20:18:35+00:00
[ "astro-ph.HE" ]
On the radio spectra of supernova remnants
The theoretical fundamentals of formation of the supernova remnant (SNR) continuum radio spectra are presented in this review. Mainly based on the Fermi 1 theory - also known as diffuse shock acceleration (DSA) - the different shapes (linear or curved in log-log scale) of SNR radio spectra are predicted for both young and evolved SNRs. On the other hand, some particular forms of spectra of older SNRs can be predicted by including the additional processes such as Fermi 2 acceleration mechanism or thermal bremsstrahlung radiation. Also, all of these theoretically predicted forms of radio spectra are compared with real spectra obtained from observations. Finally this review can represent some kind of "atlas" with initial patterns for the different kinds of SNR radio spectra - it should be helpful for radio astronomers in their interpretation of the observed radio spectra.
1408.1109v2
## Unveiling the nature of dark matter with high redshift 21 cm line experiments ## C. Evoli, a, 1 A. Mesinger, b and A. Ferrara b a II. Institut f¨r Theoretische Physik, Universit¨t Hamburg, u a Luruper Chaussee 149, D-22761 Hamburg, Germany b Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa, Italy E-mail: [email protected], [email protected], [email protected] Abstract. Observations of the redshifted 21 cm line from neutral hydrogen will open a new window on the early Universe. By influencing the thermal and ionization history of the intergalactic medium (IGM), annihilating dark matter (DM) can leave a detectable imprint in the 21 cm signal. Building on the publicly available 21cmFAST code, we compute the 21 cm signal for a 10 GeV WIMP DM candidate. The most pronounced role of DM annihilations is in heating the IGM earlier and more uniformly than astrophysical sources of X-rays. This leaves several unambiguous, qualitative signatures in the redshift evolution of the large-scale ( k ≈ 0 1 Mpc . -1 ) 21 cm power amplitude: (i) the local maximum (peak) associated with IGM heating can be lower than the other maxima; (ii) the heating peak can occur while the IGM is in emission against the cosmic microwave background (CMB); (iii) there can be a dramatic drop in power (a global minimum) corresponding to the epoch when the IGM temperature is comparable to the CMB temperature. These signatures are robust to astrophysical uncertainties, and will be easily detectable with second generation interferometers. We also briefly show that decaying warm dark matter has a negligible role in heating the IGM. ## Contents | 1 | Introduction | Introduction | 1 | |-----|----------------------------------------|-------------------------------------------------|-----| | 2 | Modeling the cosmological 21 cm signal | Modeling the cosmological 21 cm signal | 3 | | | 2.1 | Astrophysical sources of ionization and heating | 4 | | | 2.2 | Dark Matter heating | 5 | | | 2.3 | Simulations | 6 | | 3 | Results | Results | 6 | | | 3.1 | Rates | 6 | | | 3.2 | Global signal | 7 | | | 3.3 | Power-spectrum | 9 | | 4 | Conclusions | Conclusions | 11 | | A | Heating by WDM decay | Heating by WDM decay | 12 | ## 1 Introduction The nature of dark matter (DM) is one of the crucial open questions in cosmology. DM constitutes ∼ 85 per cent of all the matter in the Universe [1, 2]. We know that DM cannot be made of ordinary matter, so particles outside the standard model (SM) of particle physics must exist (see [3] for a review). Among the many DM candidates proposed, Weakly Interacting Massive Particles (WIMPs), with particle mass m χ ∼ 10 -1000 GeV, are well-motivated candidates in a number of theoretical scenarios. For this reason, although WIMPs have not been detected so far, a variety of direct and collider experiments are currently performing dedicated searches. Direct experiments are attempting to detect the tiny nuclear recoils induced by the interaction of DM with ordinary matter. An annual modulation compatible with a DM signal, has been first reported by DAMA/NaI [4], hinting at the existence of a DM particle much lighter ( m χ ∼ 5 -10 GeV) than commonly assumed for WIMPs based on supersymmetry (SUSY) neutralino scenarios. CoGeNT [5] and CRESST [6] have independently reported evidence of light-mass DM at ∼ 10 GeV. More recently, the CDMS collaboration reported the observation by the Silicon detector of three nuclear recoil events with a best fit corresponding to a DM mass of m χ = 8 6 GeV and a WIMP-nucleon cross section consistent with CoGeNT's . findings [7]. On the other hand, strong constraints from the XENON100 experiment [8], and more recently by LUX [9], appear to be incompatible with such hypotheses. Different explanations have been invoked for these apparent discrepancies, either based on a different efficiency for the detector materials [e.g., 10] or by proposing isospin-violating scenarios for the DM candidates [11]. Further analysis of background rates and electronics noise near the energy threshold will clarify the prospects for direct detection of light dark matter [12]. An alternative approach comes from collider searches, such as that at LHC, looking for the production of DM from the interactions of standard model particles. SUSY has not been confirmed by such searches. Moreover, DM candidates as light as the ones compatible with direct searches would tend to have a relic density far above WMAP-measured values [13, 14]. Indirect detections offer a third possibility, looking for relic signals due to DM annihilation or decay in the local Universe. The difficulty here lies in distinguishing such DM signals from astrophysical ones. Recently, PAMELA discovered a positron excess in the galactic cosmic ray flux above 10 GeV [15]. This was later confirmed by Fermi-LAT [16] and more recently by AMS-02 on-board the International Space Station [17]. While this excess may be explained by m χ ∼ TeV DM annihilations or decays into electron-positron pairs [18], it may also explained by astrophysical sources such as pulsars [19] or middle-aged supernova remnants [20]. Alternatively, the detection of monochromatic gamma rays from DM will provide a smoking-gun signal that is very difficult to mimic by astrophysical sources [21]. The tentative discovery of such a signal at ∼ 130 GeV in the Fermi-LAT data in a region-of-interest optimized for particular dark matter distributions towards the Galactic center has spread hopes of a long-awaited clear evidence of a signal [22]. While the statistical significance of the original detection appeared to exclude a statistical fluctuation, the time evolution of the signal did not follow the expected trend [23]. Future observations with a Cherenkov telescope (as, e.g., HESS-II) will have the required sensitivity to independently rule out or confirm the line at 130 GeV. Indirect detections could also come from the distant Universe. On cosmological scales, the redshifted 21 cm line from neutral hydrogen is sensitive to the density, ionization and temperature of the intergalactic medium (IGM; e.g. [24]), thus serving as powerful testbed for models of DM annihilations and decays. Ideally, the effects of DM would be studied before the first astrophysical objects formed, during the epoch referred to as the cosmic Dark Ages ( z &gt; ∼ 40). The advantage of the Dark Ages is that they provide a clean probe of DM, without astrophysical complications. Unfortunately, direct observations of the Dark Ages in 21 cm will likely have to wait for moon-based interferometers. Following the Dark Ages, the first galaxies dramatically amplified the 21 cm signal through their soft UV and X-ray radiation. This epoch is commonly referred to as the Cosmic Dawn. The Cosmic Dawn will be easily detectable with upcoming interferometers such as the Square Kilometre Array (SKA) 1 [25] and Hydrogen Epoch of Reionization Arrays (HERA) 2 [26], and possibly even with the Murchison Widefield Array (MWA) 3 [27] which is currently taking data [28]. At smaller redshifts, in the reionization epoch ( z glyph[lessorsimilar] 10), an upper limit on the 21 cm power-spectrum was found by the Precision Array for Probing the Epoch of Reionization (PAPER) : (52 mK) 4 2 for k = 0 11 . h Mpc -1 at z = 7 7 [29], while the Low . Frequency Array (LOFAR) 5 has not yet published results. The Cosmic Dawn presents a great opportunity to search for indirect signatures of DM, before the thermal and ionization state of the IGM became governed entirely by astrophysical sources. In a previous work [30], we found that the heating of the IGM through DM annihilations is qualitatively different from the fiducial scenario in which the IGM is heated by X-ray sources in galaxies. DM heating suppresses the very deep absorption feature of the mean 21 cm brightness temperature, δT ¯ , b during the Cosmic Dawn. Furthermore, DM annihilation heating is dominated by halos several orders of magnitude smaller than those hosting galax- 1 http://www.skatelescope.org 2 http://reionization.org 3 http://www.MWAtelescope.org/ 4 http://eor.berkeley.edu 5 http://www.lofar.org ies, whose fractional abundance evolves much slower with redshift. Hence DM heating is characterized by a smaller gradient d δT ( ¯ ) b /dν ∼ 4 mK MHz -1 in the range ν ∼ 60 -80 MHz. Although these signatures are relatively robust, they could in principle be mimicked by ad-hoc tuning of star-formation prescriptions. In the present work, we propose another method to discriminate between the gas heating produced by DM annihilation and that associated with astrophysical sources. The method exploits the fact that while DM heating is mainly injected from low-mass, early-forming and uniformly distributed halos, heating from stars is driven by galaxies residing in rare, biased peaks of the density field. While the spatial distribution of heating sources does not significantly impact the global signal, the power spectrum can be dramatically different (e.g. [31]). In the following, we show how one of the most popular CDM candidates can influence the 21 cm power-spectrum. Similar results can be obtained for any DM candidate that, via annihilation or decay, has a sizable impact on IGM temperature. This paper is organized as follows. In § 2 we discuss how we model the cosmological 21 cm signal, including both astrophysical ( § 2.1) and DM ( 2.2) heating sources. We present our § results in § 3, focusing on robust, qualitative signatures of DM annihilation in the evolution of the 21 cm power. We conclude in § 4. Finally, in Appendix A we estimate the heating contribution from the decay of popular Warm Dark Matter particles, finding it to be subdominant to astrophysical sources for reasonable scenarios. Unless stated otherwise, we quote all quantities in comoving units. We adopt a cosmology consistent with Planck results [2]: (Ω Λ , Ω M , Ω , b n , σ 8 , H 0 ) = (0 68, 0 32, 0 049, 0 96, 0 83, 67 km s . . . . . -1 Mpc -1 ). ## 2 Modeling the cosmological 21 cm signal The 21 cm line is associated with the hyperfine transition between the triplet and the singlet levels of the neutral hydrogen ground state. The ratio between the number densities of hydrogen atoms in the singlet ( n 0 ) and triplet ( n 1 ) ground hyperfine levels can be written as n /n 1 0 = 3exp( -T /T glyph[star] S ), where T glyph[star] = 0 068 K corresponds to the transition energy, and . T S is the spin temperature defined by the above expression. In the presence of the CMB alone, T S reaches thermal equilibrium with CMB temperature T γ = 2 73 (1+ . z ) K on a short time-scale, making the HI undetectable either in emission or absorption. However, collisions and scattering of Ly α photons (the so-called WouthuysenField process or Ly α pumping) can couple T S to the gas kinetic temperature, T K , making the neutral hydrogen visible in absorption or emission depending on whether the gas is colder or hotter that the CMB [32-34]. The spin temperature can be calculated as: $$T _ { S } ^ { - 1 } = \frac { T _ { \gamma } ^ { - 1 } + x _ { \alpha } T _ { \alpha } ^ { - 1 } + x _ { c } T _ { K } ^ { - 1 } } { 1 + x _ { \alpha } + x _ { c } }$$ where T α is the color temperature, which is closely coupled to T K [33], and x α and x c are the coupling coefficients corresponding to Ly α scattering and collisions respectively. The observable quantity is the differential brightness temperature between a neutral hydrogen patch and the CMB: $$\delta T _ { b } & = \frac { T _ { S } - T _ { \gamma } } { 1 + z } \, \tau = \\ & \simeq \, 2 7 x _ { \text{HI} } ( 1 + \delta _ { \text{nl} } ) \left ( \frac { H } { d v _ { r } / d r + H } \right ) \left ( 1 - \frac { T _ { \gamma } } { T _ { S } } \right ) \left ( \frac { 1 + z } { 1 0 } \frac { 0. 1 5 } { \Omega _ { M } h ^ { 2 } } \right ) ^ { 1 / 2 } \left ( \frac { \Omega _ { b } h ^ { 2 } } { 0. 0 2 3 } \right ) \, \text{m} K \quad ( 2. 2 )$$ $$( 2. 2 )$$ where τ is the optical depth of the neutral IGM at 21(1 + z ) cm, δ nl ( x, z ) ≡ ρ/ρ ¯ -1 is the density contrast, H z ( ) is the Hubble parameter, dv /dr r is the comoving gradient of the LOS component of the comoving velocity, and all quantities are evaluated at redshift z = ν /ν 0 -1 (where ν 0 is the 21 cm rest frame frequency). As seen from the above, the 21 cm signal depends on: (i) the gas density n H , (ii) the kinetic temperature of the gas, T K ; (iii) the ionized fraction x e ; and (iv) the Ly α background intensity J α (since x α ∝ J α ; e.g. [34]). The ionization and thermal evolution of the IGM can be computed from: $$\frac { d x _ { e } } { d z } = \frac { d t } { d z } \left [ \Gamma _ { \text{ion} } - \alpha _ { \text{B} } C x _ { e } ^ { 2 } n _ { b } f _ { \text{H} } \right ]$$ $$\frac { d T _ { K } } { d z } = \frac { 2 T _ { K } } { 1 + z } + \frac { 2 T _ { K } } { 3 n _ { b } } \frac { d n _ { b } } { d z } - \frac { T _ { K } } { 1 + x _ { e } } \frac { d x _ { e } } { d z } + \frac { 2 } { 3 k _ { B } ( 1 + f _ { H e } + x _ { e } ) } \frac { d t } { d z } \sum _ { p } \epsilon _ { p } \,,$$ where n b = ¯ n b, 0 (1 + z ) 3 (1 + δ nl ) is the total (H + He) baryon number density, α B is the recombination coefficient, Γ ion is the ionization rate per baryon, C ≡ 〈 n 2 〉 / 〈 n 〉 2 is the clumping factor, k B is the Boltzmann constant, f H(He) is the hydrogen (helium) fraction by number, and glyph[epsilon1] p is the heating rate per baryon for process p [35, 36]. In Eq. 2.4, the first term in the right-hand side corresponds to the Hubble expansion, the second corresponds to adiabatic heating and cooling from structure formation, and the third corresponds to the change in the total number of gas particles due to ionizations. In absence of DM heating, the ionization rate per baryon is dominated by the astrophysical contribution, Γ ion = Γ ion , ∗ , while the heating is the sum of two terms: Compton heating from CMB photons, glyph[epsilon1] γ ( z ), and heating from astrophysical X-ray sources, glyph[epsilon1] ∗ ( z ). Finally, the Ly α background intensity receives contributions from X-ray excitation of H I ( J α,X ), and direct stellar emission of photons between Ly α and the Lyman limit ( J α, ∗ ): $$J _ { \alpha, \text{tot} } & = J _ { \alpha, X } + J _ { \alpha, * } & ( 2. 5 )$$ where the second term is dominant for reasonable models [37]. ## 2.1 Astrophysical sources of ionization and heating We assume that galaxies hosting UV and X-ray sources reside in atomically cooled haloes with virial temperatures T vir &gt; 10 4 K (corresponding to halo masses of M halo &gt; 3 × 10 7 M glyph[circledot] at z ∼ 20). We assume a 10% efficiency of conversion of gas into stars [38]. Ly α emission is dominated by early UV sources, assumed to have a typical PopII stellar spectra [39]. The same galaxies produce X-ray emission following a power-law with energy index of 1 5 with a . lower limit of 300 eV, and an X-ray efficiency corresponding to 0 2 X-ray photons per stellar . baryon. In doing this, we assume that the X-ray emission of early galaxies is similar to that observed from local star-forming ones [40-42]. The fraction of photon energy going into ionization, heating and Ly α emission is computed according to [43]. There are many uncertainties associated with the astrophysical parameters mentioned above. A full parameter study (e.g., [28]) is beyond the scope of this work. Instead, in addition to our fiducial model described above, we also present an extreme model to illustrate the allowed range of uncertainties (as in [30]). In the extreme model, we take T vir &gt; 10 5 K, assume that galactic X-ray emission is more locally obscured (with only photons with energies &gt; 900 eV escaping the galaxy), and take an X-ray efficiency corresponding to 2000 X-ray photons per stellar baryon. Thus in our extreme model, primordial galaxies, albeit rarer and appearing later, were much more efficient in generating hard X-rays, saturating the unresolved soft X-ray background by z ∼ 10 [44]. ## 2.2 Dark Matter heating We now summarize how we include DM annihilations in the IGM evolution equations described in the previous section. For further details, the reader is encouraged to see, e.g., [30]. High-energy electrons and positrons injected into the IGM through DM annihilations are quickly cooled down to the ∼ keV scale mostly through inverse Compton cooling (see, e.g., [45, 46]). As discussed above for secondary electrons from X-ray ionizations, once the annihilation-induced shower has reached the keV energy scale it can (i) ionize the IGM; (ii) induce Lyman-excitations, and (iii) heat the plasma. The energy deposition rate per baryon (in erg/s) for DM annihilation can be expressed as: $$\mathcal { E } _ { \chi } = \frac { 1 } { n _ { b } } \frac { d E } { d t d V } ( z ) = ( 1 + z ) ^ { 3 } \frac { \Omega _ { \chi } ^ { 2 } } { \Omega _ { b } } \rho _ { c, 0 } [ 1 + B ( z ) ] m _ { p } c ^ { 2 } \frac { \langle \sigma v \rangle } { m _ { \chi } } \,,$$ where m χ ( m p ) is the DM (proton) mass, and 〈 σv 〉 is the annihilation cross section averaged over the velocity distribution. Non-linear, virialized substructures enhance the DM self-annihilation rate (with respect to the large-scale density field), thus significantly increasing the rate of energy deposition at redshifts z &lt; ∼ 50. Following [47] we include non-linear structures through the parameter, B z ( ), describing the average DM density enhancement from collapsed structures. We evaluate B z ( ) using the Press-Schechter mass function [48] formalism and assuming a NFW [49] halo profile. This procedure relies on modeling the halo mass function many orders of magnitude below scales accessible through observations or cosmological simulations. We parameterize this uncertainty through the minimum halo mass, M h min , . This is usually chosen to be the free-streaming mass, M fs , which strongly depends on the assumed interaction type and mass of the DM particles. Modeling of the kinetic decoupling of WIMPs in the early Universe showed that the smallest halos to be formed range between 10 -9 and almost 10 -3 solar masses [50]. In order to estimate the associated uncertainty we show results for three values of M h min , within this range. We find that B z ( ) can be well-fit (at the ∼ 1% level for z &lt; ∼ 100), with: $$B ( z ) = \frac { b _ { h } } { ( 1 + z ) ^ { \delta } } \text{erfc} \left ( \frac { 1 + z } { 1 + z _ { h } } \right )$$ with 3 free parameters, b h , δ and z h , whose values are given in Table 1 for the different values of M h min , adopted. When the substructure contribution is important, the DM energy deposition is driven by glyph[lessorsimilar] M glyph[circledot] halos [30]. These tiny halos can be treated as uniformly distributed on the large scales ( &gt; ∼ 10 Mpc) of interest here. Our fiducial CDM candidate is a light WIMP with leptonic ( µ + µ -) coupling and an annihilation cross-section compatible with thermal production 〈 σv 〉 = 10 -26 cm 3 s -1 . Such a model has been invoked to explain a promising signal from the Galactic center and, moreover, it would be in the mass range compatible with recent claims of low-energy signals from DM direct detection if a sub-dominant hadronic component is additionally present [51]. The most recent constraints on a 10 GeV WIMP cross section, obtained by combining CMB measurements from Planck, WMAP9, ACT, and SPT, and assuming annihilation products of muons (electrons), is 〈 σv 〉 ∼ &lt; 4 3 (1 5) . . × 10 -26 cm 3 s -1 [52]. Table 1 . Parameters used to determine the structure boost-factor (see Eq. 2.7). | M h , min [M | b h | z h | δ | |----------------|--------------|--------|--------| | 10 - 3 | 1 . 6 × 10 5 | 19 . 5 | 1 . 54 | | 10 - 6 | 6 . 0 × 10 5 | 19 . 0 | 1 . 52 | | 10 - 9 | 2 . 3 × 10 6 | 18 . 6 | 1 . 48 | Armed with eq. 2.6, we can express the additional contribution to the IGM evolution equations (2.3-2.5) from DM annihilations: $$\Gamma _ { \text{ion}, \chi } = \left [ \frac { f _ { \text{ion}, \text{HI} } } { E _ { 0, \text{HI} } } + \frac { f _ { \text{ion}, \text{HeI} } } { E _ { 0, \text{HeI} } } \right ] \mathcal { E } _ { \chi }$$ $$\epsilon _ { \chi } & = f _ { \text{h} } \mathcal { E } _ { \chi }$$ and $$J _ { \alpha, \chi } = \frac { c n _ { b } ( z ) } { 4 \pi h H ( z ) } f _ { \alpha } \mathcal { E } _ { \chi }$$ where E 0 HI , ( E 0 HeI , ) is the ionization energy of hydrogen (helium), λ α is the Ly α wavelength, and f ion HI , , f ion HeI , , f h , f α are the energy fractions deposited into hydrogen ionization, helium ionization, heating and Ly α excitations, respectively. These energy fractions are computed according to [46], whose results are consistent within 20% to the analytic calculation taking into account photon redshifting from [45]. ## 2.3 Simulations Since we are simulating an interferometric signal, we must model inhomogeneous ionizations and heating, integrating the evolution of cosmic structures and radiation fields along the light cone. For this purpose we use the public code 21cmFAST , which generates cosmological 6 density, and astrophysical radiation fields. Our simulation boxes are 600 Mpc on a side, with a resolution of 400 . 3 We modify the code to include the additional (homogeneous) contribution from DM annihilations, as described above. For further details and tests of the code, interested readers are encouraged to see [36, 53, 54]. ## 3 Results ## 3.1 Rates Before presenting estimates of the 21 cm signal, we compare the relative contribution of astrophysical sources and DM annihilations to the evolution of the IGM. In the right panel of Figure 1 we show the heating rates per baryon from DM annihilations, together with 6 http://homepage.sns.it/mesinger/Sim.html Figure 1 . Heating rates (left) and intensity of the Lyα radiation background (right) produced by CDM annihilations assuming various values of M h min , . For comparison, we also show values corresponding to astrophysical sources in the fiducial (black-solid curve) and extreme (gray-solid curve) model, as well as the adiabatic cooling rate (black-dotted curve). The arrows on the top side of the plot indicate the transition between DM and astrophysical sources as dominant heating source (assuming fiducial astrophysics). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1109v2-figure-fc941516-9e35-41c4-a2ae-34d94b7fb21f.jpg) astrophysical X-ray heating. As already noticed in [30], the heating rate from astrophysical sources of X-rays evolves much steeper with redshift than the DM heating. This is expected since the fractional increase of the collapsed fraction in glyph[lessorsimilar] 1 M glyph[circledot] haloes, which drive the DM heating, is much slower than the fractional increase in the high-end tail of the mass function (i.e. the haloes which host the first galaxies). This translates to a shallower redshift gradient of the mean signal, for models in which DM annihilations dominate the IGM evolution [30]. For our three fiducial choices of M h min , , the heating from fiducial astrophysical sources exceeds that of DM annihilations at z &lt; 10 ( M h min , = 10 -9 ), z &lt; 13 ( M h min , = 10 -6 ) and z &lt; 17 ( M h min , = 10 -3 ). In the extreme model, the astrophysical X-ray heating is dominant already at earlier redshifts ( z ∼ 20). From the right panel of Figure 1, we see that the fiducial Ly α background from astrophysical sources dominates over the DM-induced one up to z &lt; ∼ 25-30 (note that the extreme astrophysical model has a lower soft UV emissivity than the fiducial one). Hence, compared to astrophysical sources, DM annihilations have a larger contribution to heating the IGM than they do to WF coupling. As we see below, this means that DM annihilations are not coupling the 21 cm spin temperature with the gas temperature efficiently, except for the lowest M h min , model. ## 3.2 Global signal Before moving on to the power spectrum, in Figure 2 we show the evolution of the mean 21 cm brightness temperature, highlighting the relevant epochs. Without DM annihilations (black-solid line), the global 21 cm signal has the following milestones (e.g., [24]): - 1. At much higher redshifts ( z &gt; ∼ 50) than shown in Figure 2, the IGM is dense enough that the spin temperature is uniformly coupled to the gas kinetic temperature because Figure 2 . Redshift evolution of the average 21 cm brightness temperature offset from the CMB. The arrows on the top side of the plot indicate the transition between DM and astrophysical sources as the dominant heating source. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1109v2-figure-47b9e02e-25dd-483b-8167-56f49fb12a65.jpg) of collisions. Therefore T K = T S &lt; ∼ T γ . The IGM cools adiabatically faster than the CMB, making δT b negative. - 2. As the IGM becomes less dense, the spin temperature starts to decouple from the kinetic temperature, and begins to approach the CMB temperature again, T K &lt; T S &lt; ∼ T γ . As a consequence, δT b starts rising towards zero. This epoch corresponds to z &gt; ∼ 30 in Figure 2. - 3. As soon as the first astrophysical sources turn on, their soft UV photons quickly establish a Ly α background, which again couples T S to T K , through the WF (or Ly α pumping) mechanism. Again, δT b is negative, potentially reaching its largest absolute value. In Figure 2 the corresponding absorption feature reaches δT b &lt; ∼ -200 at around z ∼ 20. - 4. Subsequently, X-rays from galaxies heat the IGM. As the gas temperature surpasses T γ , the 21 cm signal changes from absorption to emission (at around z ∼ 12 here). - 5. Finally, the IGM is reionized, and the signal again approaches zero. This scenario would change considerably if we allow for DM heating. Firstly, the additional heating at very high redshifts can place T K on a higher adiabat already during the collisional decoupling era. This dampens the depth of the absorption trough at z ∼ 20-30. Secondly, if DM annihilations contribute to Ly α pumping and heating, the signal would show a more gradual evolution during the absorption epoch. The main result is the damping and smoothing of the absorption feature observed at 16 &lt; z &lt; 30 in the fiducial model. In particular, depending on the assumed M h min , , the Figure 3 . Evolution of the 21 cm power at k = 0 1 Mpc . -1 for all of the considered DM and astrophysical X-ray models (solid line if the corresponding mean signal is in absorption, dasheddotted line if in emission). The shaded areas correspond to the sensitivity regions calculated in [ ? ] for the experiments: MWA-128T (yellow), LOFAR (green). SKA (HERA) single beam 1000h sensitivity limit is plotted as a dotted red (blue) line. The arrows on the top side of the plot indicate the transition between DM and astrophysical sources as dominant heating source. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1109v2-figure-f00ade6c-86e4-4aea-a727-18b89b1f5351.jpg) variation in δT b at the minimum is predicted to be of 110, 190 and 200 mK for M h min , = 10 -3 , 10 -6 and 10 -9 M glyph[circledot] respectively. However, a similar qualitative trend is also present in the extreme astrophysical model described in Sec. 2.1, in which we allow for an enhanced production of hard X-rays. This partial degeneracy makes is difficult to extract a robust signature of DM annihilation heating from the global signal. In the next Section we show that the different spatial distribution of the relevant heating sources allows to discriminate between the two scenarios. ## 3.3 Power-spectrum As our main observable, we use the spherically averaged power spectrum: $$P _ { 2 1 } \equiv \frac { k ^ { 3 } } { 2 \pi ^ { 2 } V } \delta \bar { T } _ { b } ( z ) ^ { 2 } \langle | \delta _ { 2 1 } ( \mathbf k, z ) | ^ { 2 } \rangle _ { k }$$ where δ 21 ( x , z ) ≡ δT b ( x , z ) /δT ¯ b -1. Our default power spectrum bin width is d ln k = 0 5. . In Figure 3, we show the redshift evolution of the k = 0 1 Mpc . -1 mode of the 21 cm power spectra for the same models shown in Figure 2. This scale roughly corresponds to the narrow window of k -space accessible to the first generation interferometers (e.g. [55, 56]). In order to predict the detectability of the signal, we also show 1 σ thermal noise corresponding to a 1000h, single-beam, observation with some upcoming and current instruments (taken from [ ? ]). Figure 4 . Fraction of the IGM having T /T γ S less than the given value. For each model, the CDFs correspond to the redshift at which T S ∼ T γ (see legend). Regions with T /T γ S &lt; 1 are visible in emission, while the others are visible in absorption against the CMB. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1109v2-figure-5138ae5d-fe66-40da-b376-e3ca03ebd110.jpg) The redshift evolution of the large-scale 21 cm power is characterized by three peaks, corresponding to (from high to low z ): (i) WF coupling (fluctuations in J α ); (ii) X-ray heating (fluctuations in T K ); (iii) reionization (fluctuations in x i ). The earlier peaks (especially the X-ray heating one) are larger, sourced by the larger available contrast during the absorption epochs. Increasing the X-ray efficiency mainly shifts the X-ray heating peak to earlier epochs. If X-ray heating occurs early enough, it overlaps with the Ly α pumping epoch, decreasing the associated peak in power [ ? ]. Similarly, if galactic sources are characterized by hard ( &gt; ∼ 1keV) X-rays with long mean free paths, the heating would be much more uniform, again decreasing the associated peak in power [37, 42]. DM annihilations can impact this picture in several ways. The annihilation products from DM have a larger fractional contribution (compared with astrophysical sources) to the IGM heating rate than the Ly α coupling (see Fig. 1). Hence, the DM imprint is more evident in the middle peak corresponding to the temperature fluctuations during the heating era. If DM annihilations were indeed important contributors, IGM heating would (i) start early and (ii) be more uniform, as discussed above. These two attributes of DM heating have three, robust, qualitative signatures in the 21 cm power spectrum evolution . Firstly, the early heating raises the IGM temperature to values in excess of those reached through adiabatic cooling. Therefore the contrast between the higher T K and T γ is reduced. Moreover, the uniformity of the DM heating does not source large-scale temperature fluctuations. The resulting temperature contrast during the heating epoch and the associated 21 cm peak in large-scale power amplitude is greatly reduced. In fact, with DM annihilations the heating (middle) peak in the evolution of 21 cm power can be lower than the other two peaks (associated with WF coupling and reionization). This qualitative signature is very difficult to mimic with astrophysics, requiring unrealistically hard X-ray spectra (e.g. [42]). Secondly, models in which DM annihilations heat the IGM to temperatures T S &gt; T γ alone (i.e. without astrophysical sources), result in a dramatic drop in large-scale power between the WF and heating epochs. This is evident in our model with M h min , = 10 -9 M . glyph[circledot] In this model, the IGM is pre-heated by annihilations before the astrophysical sources start to contribute. Because this heating is uniform, there are no associated large-scale temperature fluctuations to dominate the 21 cm power when T S = T γ and the mean signal is δT b = 0 (e.g., [57]). This is further illustrated in Fig. 4, where we plot the cumulative distribution functions (CDFs) of T /T γ S , at the redshift when T S ∼ T γ in each model. Models in which the DMannihilations have a stronger contribution to heating result in smaller spatial fluctuations in the IGM temperature. The third imprint of DM annihilations on the 21 cm signal is even more unambiguous. Even if uniform heating by DM dominates, patchy heating driven by astrophysical sources will eventually imprint (some) large-scale temperature fluctuations. The middle peak in the 21 cm power evolution is always set by astrophysical sources (note that in Fig. 3 it always occurs roughly at the same redshift for a given astrophysical model). However, since DM annihilations pre-heat the IGM, the X-ray heating peak occurs when the IGM is already in emission against the CMB. This cannot be mimicked by astrophysics! Without DM heating, the peak in 21 cm power amplitude associated with X-ray heating always occurs when the IGM is in absorption against the CMB, when the temperature distribution is broadest. This signature represents a further motivation for combined all-sky and interferometric observations of the 21 cm signal. ## 4 Conclusions We investigate the impact of DM annihilations on the cosmological HI 21 cm signal. As our fiducial DM candidate we take a 10 GeV WIMP annihilating in µ + µ -with a thermal cross-section. In this context annihilation in leptons provides the largest signal with respect to other (e.g., hadronic) annihilation channels. Building on the public 21cmFAST code, we compute the redshift evolution of the largescale ( k ≈ 0 1 . Mpc -1 ) 21cm power during the Cosmic Dawn. We find that it is easiest to isolate the imprint of DM annihilations during the epoch when the IGM was heated to temperatures exceeding that of the CMB. The DM annihilation contribution to this heating epoch can easily exceed that of astrophysical X-ray sources. Astrophysical sources are hosted by highly-biased galaxies, whose clustering imprints large-scale temperature fluctuations. On the other hand, DM annihilations occur relatively uniformly, driven by small-mass, early appearing halos. This means that they uniformly heat the IGM at very high redshifts ( z &gt; ∼ 20), providing a temperature floor that damps the subsequent galaxy-driven fluctuations. This results in two robust signatures of DM heating in the redshift evolution of the amplitude of the large-scale 21 cm power: - · the second local maximum (associated with IGM heating) is lower than the other two (corresponding to reionization and Ly α pumping); - · this local maximum occurs when the 21 cm global signal is in emission with respect to the CMB. While the former of these could be mimicked by astrophysical heating with very hard Xrays (a highly unlikely scenario; [42]), the later cannot be mimicked by astrophysics . These signatures can easily be detected by second-generation instruments, such as HERA and SKA. Moreover, models in which DM annihilations dominate IGM heating (e.g. our M h min , = 10 -9 M glyph[circledot] model), are also characterized by a dramatic drop in the power spectrum amplitude at the redshifts when T S ∼ T γ . In such scenarios, the DM annihilations heat the IGM well before the clustering of galactic X-ray sources manages to imprint large-scale temperature fluctuations in the IGM. A null detection in that redshift range by interferometers it will provide exciting evidence of DM annihilation driven pre-heating. More generally, the same qualitative trends are expected for any exotic model providing a uniform heating with a ∼ 10 -30 erg/s heating rate at epochs before the first galaxies. This possibility is within a number of the DM supersymmetric candidates proposed in natural extensions of the SM. Furthermore, non-thermal DM production or some other mechanism, such as Sommerfeld enhancement [45], can motivate considerably higher annihilation crosssections than the thermal relic value considered here. ## Acknowledgments C. E. acknowledges a visiting grant from SNS where part of this work has been carried out, and support from the 'Helmholtz Alliance for Astroparticle Physics HAP' funded by the Initiative and Networking Fund of the Helmholtz Association. ## A Heating by WDM decay Over the last decade, warm dark matter (WDM) has been repeatedly proposed as an alternative to CDM. For a given value of m χ and associated degree of freedom g d , DM particles can free-stream over the scale (assuming a relativistic thermal relic) $$r _ { \text{fs} } = 5 7. 2 \, \text{kpc} \, \left ( \frac { \text{keV} } { m _ { \chi } } \right ) \left ( \frac { 1 0 0 } { g _ { d } } \right ) ^ { 1 / 3 } \,,$$ thereby suppressing structures on smaller scales, and helping explain observations of local dwarf galaxies. A popular WDM candidate is the ∼ keV sterile neutrino [58]. Such a particle is predicted to decay into a lighter neutrino and a photon producing a narrow line in the X-ray spectrum at an energy equal to half the mass of the decaying neutrino. The released ∼ keV photon quickly deposits its entire energy into the IGM [59], at a rate of: $$\mathcal { E } _ { \chi } = \frac { 1 } { n _ { b } } \frac { d E } { d t d V } ( z ) = \frac { \Omega _ { \chi } } { \Omega _ { b } } \frac { m _ { p } c ^ { 2 } } { \tau _ { \chi } }$$ where τ χ is the particle life-time and it is dependent on the mass and on the contribution to relic abundance, Ω , as given by numerical simulations [60]: s $$\tau _ { \chi } ^ { - 1 } = \Gamma ( \nu _ { s } \to \gamma \nu _ { \alpha } ) \sim 5. 9 \times 1 0 ^ { - 3 0 } \left ( \frac { \Omega _ { \nu _ { s } } h ^ { 2 } } { 0. 1 2 } \right ) \left ( \frac { m _ { \chi } } { \text{keV} } \right ) ^ { 3. 2 } \, s ^ { - 1 }$$ We assume that the sterile neutrino density dominates the observed DM (Ω χ ) abundance, hence Ω ν s = Ω , and that it is χ a thermal relic. Current measurements place limits of m wdm &gt; ∼ 1 -3 keV [61-65], with various degrees of astrophysical degeneracy. Figure 5 . Heating rates produced by WDM decay and compared with astrophysical heating rates in the fiducial astrophysics model. The adiabatic cooling rate is shown with a dotted curve. Note that also the astrophysical heating rates depend on the particle mass since the abundance of X-ray halos is affected by the power-spectrum suppression induced by WDM free-streaming. Heating through WDM decays is always sub dominant to adiabatic cooling. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1109v2-figure-87eb17eb-f6ae-44db-9a2e-ff4ada0848fe.jpg) We show the associated heating rates in Fig. 5. Unlike for CDM annihilations, the WDM decay heating rate is always lower than the adiabatic cooling rate. Hence WDM decays do not have an notable imprint on the 21 cm signal. Note that in addition to energy injection into the IGM through decays, WDM modifies the 21 cm signal through the associated suppression of halos hosting early galaxies. This imprint could be detectable with upcoming interferometers [31]. ## References - [1] WMAP Collaboration, E. Komatsu et al., Seven-year Wilkinson Microwave Anisotropy Probe (WMAP) Observations: Cosmological Interpretation , ApJS 192 (Feb., 2011) 18, [ arXiv:1001.4538 ]. - [2] PLANCK Collaboration, P. A. R. Ade et al., Planck 2013 results. XVI. Cosmological parameters , ArXiv e-prints (Mar., 2013) [ arXiv:1303.5076 ]. - [3] G. Bertone, Particle Dark Matter : Observations, Models and Searches . Cambridge University Press, 2010. - [4] R. Bernabei, P. Belli, F. Montecchia, W. di Nicolantonio, A. Incicchitti, D. Prosperi, C. Bacci, C. J. Dai, L. K. Ding, H. H. Kuang, and J. M. Ma, Searching for WIMPs by the annual modulation signature , Physics Letters B 424 (Apr., 1998) 195-201. - [5] CoGeNT Collaboration, C. E. Aalseth et al., Results from a Search for Light-Mass Dark Matter with a p-Type Point Contact Germanium Detector , Physical Review Letters 106 (Apr., 2011) 131301-+, [ arXiv:1002.4703 ]. - [6] CRESST-II Collaboration, G. Angloher et al., Results from 730 kg days of the CRESST-II Dark Matter search , European Physical Journal C 72 (Apr., 2012) 1971, [ arXiv:1109.0702 ]. - [7] CDMS Collaboration, R. Agnese et al., Silicon Detector Dark Matter Results from the Final Exposure of CDMS II , ArXiv e-prints (Apr., 2013) [ arXiv:1304.4279 ]. - [8] XENON100 Collaboration, E. Aprile et al., Dark Matter Results from 225 Live Days of XENON100 Data , Physical Review Letters 109 (Nov., 2012) 181301, [ arXiv:1207.5988 ]. - [9] LUX Collaboration, D. S. Akerib et al., First results from the LUX dark matter experiment at the Sanford Underground Research Facility , ArXiv e-prints (Oct., 2013) [ arXiv:1310.8214 ]. - [10] C. Savage, G. Gelmini, P. Gondolo, and K. Freese, XENON10/100 dark matter constraints in comparison with CoGeNT and DAMA: Examining the L eff dependence , Phys. Rev. D 83 (Mar., 2011) 055002, [ arXiv:1006.0972 ]. - [11] J. L. Feng, J. Kumar, D. Marfatia, and D. Sanford, Isospin-violating dark matter , Physics Letters B 703 (Sept., 2011) 124-127, [ arXiv:1102.4331 ]. - [12] P. Panci, New Directions in Direct Dark Matter Searches , Adv.High Energy Phys. 2014 (2014) 681312, [ arXiv:1402.1507 ]. - [13] ATLAS Collaboration, G. Aad et al., Search for supersymmetry using final states with one lepton, jets, and missing transverse momentum with the ATLAS detector in √ s = 7 TeV pp , Phys.Rev.Lett. 106 (2011) 131802, [ arXiv:1102.2357 ]. - [14] CMS Collaboration, S. Chatrchyan et al., Search for Supersymmetry at the LHC in Events with Jets and Missing Transverse Energy , Phys.Rev.Lett. 107 (2011) 221804, [ arXiv:1109.2352 ]. - [15] PAMELA Collaboration, O. Adriani et al., An anomalous positron abundance in cosmic rays with energies 1.5-100GeV , Nature 458 (Apr., 2009) 607-609, [ arXiv:0810.4995 ]. - [16] Fermi-LAT Collaboration, A. A. Abdo et al., Measurement of the Cosmic Ray e + +e -Spectrum from 20GeV to 1TeV with the Fermi Large Area Telescope , Physical Review Letters 102 (May, 2009) 181101, [ arXiv:0905.0025 ]. - [17] AMS-02 Collaboration, M. Aguilar et al., First Result from the Alpha Magnetic Spectrometer on the International Space Station: Precision Measurement of the Positron Fraction in Primary Cosmic Rays of 0.5-350 GeV , Physical Review Letters 110 (Apr., 2013) 141102. - [18] I. Cholis and D. Hooper, Dark matter and pulsar origins of the rising cosmic ray positron fraction in light of new data from the AMS , Phys. Rev. D 88 (July, 2013) 023013, [ arXiv:1304.1840 ]. - [19] G. di Bernardo, C. Evoli, D. Gaggero, D. Grasso, L. Maccione, and M. N. Mazziotta, Implications of the cosmic ray electron spectrum and anisotropy measured with Fermi-LAT , Astroparticle Physics 34 (Feb., 2011) 528-538, [ arXiv:1010.0174 ]. - [20] D. Gaggero, D. Grasso, L. Maccione, G. Di Bernardo, and C. Evoli, PAMELA positron and electron spectra are reproduced by 3-dimensional cosmic-ray modeling , ArXiv e-prints (Nov., 2013) [ arXiv:1311.5575 ]. - [21] T. Bringmann and C. Weniger, Gamma ray signals from dark matter: Concepts, status and prospects , Physics of the Dark Universe 1 (Nov., 2012) 194-217, [ arXiv:1208.5481 ]. - [22] T. Bringmann, X. Huang, A. Ibarra, S. Vogl, and C. Weniger, Fermi LAT search for internal bremsstrahlung signatures from dark matter annihilation , JCAP 7 (July, 2012) 54, [ arXiv:1203.1312 ]. - [23] Fermi-LAT Collaboration, M. Ackermann et al., Search for Gamma-ray Spectral Lines with the Fermi Large Area Telescope and Dark Matter Implications , Phys.Rev. D88 (2013) 082002, [ arXiv:1305.5597 ]. - [24] S. R. Furlanetto, S. P. Oh, and F. H. Briggs, Cosmology at low frequencies: The 21 cm transition and the high-redshift Universe , Phys. Rep. 433 (Oct., 2006) 181-301, [ astro-ph/ ]. - [25] G. Mellema, L. V. E. Koopmans, F. A. Abdalla, G. Bernardi, B. Ciardi, S. Daiboo, A. G. de Bruyn, K. K. Datta, H. Falcke, A. Ferrara, I. T. Iliev, F. Iocco, V. Jeli´, H. Jensen, R. Joseph, c P. Labroupoulos, A. Meiksin, A. Mesinger, A. R. Offringa, V. N. Pandey, J. R. Pritchard, M. G. Santos, D. J. Schwarz, B. Semelin, H. Vedantham, S. Yatawatta, and S. Zaroubi, Reionization and the Cosmic Dawn with the Square Kilometre Array , Experimental Astronomy 36 (Aug., 2013) 235-318, [ arXiv:1210.0197 ]. - [26] J. C. Pober, A. Liu, J. S. Dillon, J. E. Aguirre, J. D. Bowman, R. F. Bradley, C. L. Carilli, D. R. DeBoer, J. N. Hewitt, D. C. Jacobs, M. McQuinn, M. F. Morales, A. R. Parsons, M. Tegmark, and D. J. Werthimer, What Next-generation 21 cm Power Spectrum Measurements can Teach us About the Epoch of Reionization , ApJ 782 (Feb., 2014) 66, [ arXiv:1310.7031 ]. - [27] S. J. Tingay, R. Goeke, J. D. Bowman, D. Emrich, S. M. Ord, D. A. Mitchell, M. F. Morales, T. Booler, B. Crosse, R. B. Wayth, C. J. Lonsdale, S. Tremblay, D. Pallot, T. Colegate, A. Wicenec, N. Kudryavtseva, W. Arcus, D. Barnes, G. Bernardi, F. Briggs, S. Burns, J. D. Bunton, R. J. Cappallo, B. E. Corey, A. Deshpande, L. Desouza, B. M. Gaensler, L. J. Greenhill, P. J. Hall, B. J. Hazelton, D. Herne, J. N. Hewitt, M. Johnston-Hollitt, D. L. Kaplan, J. C. Kasper, B. B. Kincaid, R. Koenig, E. Kratzenberg, M. J. Lynch, B. Mckinley, S. R. Mcwhirter, E. Morgan, D. Oberoi, J. Pathikulangara, T. Prabu, R. A. Remillard, A. E. E. Rogers, A. Roshi, J. E. Salah, R. J. Sault, N. Udaya-Shankar, F. Schlagenhaufer, K. S. Srivani, J. Stevens, R. Subrahmanyan, M. Waterson, R. L. Webster, A. R. Whitney, A. Williams, C. L. Williams, and J. S. B. Wyithe, The Murchison Widefield Array: The Square Kilometre Array Precursor at Low Radio Frequencies , Publications of the Astronomical Society of Australia 30 (Jan., 2013) 7, [ arXiv:1206.6945 ]. - [28] A. Mesinger, A. Ewall-Wice, and J. Hewitt, Reionization and beyond: detecting the peaks of the cosmological 21 cm signal , MNRAS 439 (Apr., 2014) 3262-3274, [ arXiv:1310.0465 ]. - [29] A. R. Parsons, A. Liu, J. E. Aguirre, Z. S. Ali, R. F. Bradley, C. L. Carilli, D. R. DeBoer, M. R. Dexter, N. E. Gugliucci, D. C. Jacobs, P. Klima, D. H. E. MacMahon, J. R. Manley, D. F. Moore, J. C. Pober, I. I. Stefan, and W. P. Walbrugh, New Limits on 21cm EoR From PAPER-32 Consistent with an X-Ray Heated IGM at z=7.7 , ArXiv e-prints (Apr., 2013) [ arXiv:1304.4991 ]. - [30] M. Valdes, C. Evoli, A. Mesinger, A. Ferrara, and N. Yoshida, The nature of dark matter from the global high redshift HI 21 cm signal , MNRAS 2 (429) 2013, [ arXiv:1209.2120 ]. - [31] M. Sitwell, A. Mesinger, Y.-Z. Ma, and K. Sigurdson, The Imprint of Warm Dark Matter on the Cosmological 21-cm Signal , ArXiv e-prints (Sept., 2013) [ arXiv:1310.0029 ]. - [32] S. A. Wouthuysen, On the excitation mechanism of the 21-cm (radio-frequency) interstellar hydrogen emission line. , AJ 57 (1952) 31-32. - [33] G. B. Field, The Spin Temperature of Intergalactic Neutral Hydrogen. , ApJ 129 (May, 1959) 536. - [34] C. M. Hirata, Wouthuysen-Field coupling strength and application to high-redshift 21-cm radiation , MNRAS 367 (Mar., 2006) 259-274, [ astro-ph/ ]. - [35] X. Chen and M. Kamionkowski, Particle decays during the cosmic dark ages , Phys. Rev. D 70 (Aug., 2004) 043502-+, [ astro-ph/ ]. - [36] A. Mesinger, S. Furlanetto, and R. Cen, 21CMFAST: a fast, seminumerical simulation of the high-redshift 21-cm signal , MNRAS 411 (Feb., 2011) 955-972, [ arXiv:1003.3878 ]. - [37] A. Mesinger, A. Ferrara, and D. S. Spiegel, Signatures of X-rays in the early Universe , MNRAS 431 (May, 2013) 621-637, [ arXiv:1210.7319 ]. - [38] C. Evoli and A. Ferrara, Turbulence in the intergalactic medium , MNRAS 413 (June, 2011) 2721-2734, [ arXiv:1101.2449 ]. - [39] R. Barkana and A. Loeb, Detecting the Earliest Galaxies through Two New Sources of 21 Centimeter Fluctuations , ApJ 626 (June, 2005) 1-11, [ astro-ph/ ]. - [40] S. Mineo, M. Gilfanov, and R. Sunyaev, X-ray emission from star-forming galaxies - I. High-mass X-ray binaries , MNRAS 419 (Jan., 2012) 2095-2115, [ arXiv:1105.4610 ]. - [41] S. Mineo, M. Gilfanov, and R. Sunyaev, X-ray emission from star-forming galaxies - II. Hot interstellarmedium , MNRAS 426 (Nov., 2012) 1870-1883, [ arXiv:1205.3715 ]. - [42] F. Pacucci, A. Mesinger, S. Mineo, and A. Ferrara, The X-ray spectra of the first galaxies: 21cm signatures , ArXiv e-prints (Mar., 2014) [ arXiv:1403.6125 ]. - [43] S. R. Furlanetto and S. J. Stoever, Secondary ionization and heating by fast electrons , MNRAS 404 (June, 2010) 1869-1878, [ arXiv:0910.4410 ]. - [44] R. C. Hickox and M. Markevitch, Can Chandra Resolve the Remaining Cosmic X-Ray Background? , ApJ 671 (Dec., 2007) 1523-1530, [ arXiv:0706.3089 ]. - [45] T. R. Slatyer, N. Padmanabhan, and D. P. Finkbeiner, CMB constraints on WIMP annihilation: Energy absorption during the recombination epoch , Phys. Rev. D 80 (Aug., 2009) 043526-+, [ arXiv:0906.1197 ]. - [46] C. Evoli, M. Vald´s, A. Ferrara, and N. Yoshida, e Energy deposition by weakly interacting massive particles: a comprehensive study , MNRAS 422 (May, 2012) 420-433. - [47] M. Cirelli, F. Iocco, and P. Panci, Constraints on Dark Matter annihilations from reionization and heating of the intergalactic gas , JCAP 10 (Oct., 2009) 9-+, [ arXiv:0907.0719 ]. - [48] W. H. Press and P. Schechter, Formation of Galaxies and Clusters of Galaxies by Self-Similar Gravitational Condensation , ApJ 187 (Feb., 1974) 425-438. - [49] J. F. Navarro, C. S. Frenk, and S. D. M. White, The Structure of Cold Dark Matter Halos , ApJ 462 (May, 1996) 563, [ astro-ph/9508025 ]. - [50] T. Bringmann, Particle models and the small-scale structure of dark matter , New Journal of Physics 11 (Oct., 2009) 105027, [ arXiv:0903.0189 ]. - [51] D. Hooper, The empirical case for 10-GeV dark matter , Physics of the Dark Universe 1 (Nov., 2012) 1-23, [ arXiv:1201.1303 ]. - [52] M. S. Madhavacheril, N. Sehgal, and T. R. Slatyer, Current dark matter annihilation constraints from CMB and low-redshift data , Phys. Rev. D 89 (May, 2014) 103508, [ arXiv:1310.3815 ]. - [53] A. Mesinger and S. Furlanetto, Efficient Simulations of Early Structure Formation and Reionization , ApJ 669 (Nov., 2007) 663-675, [ arXiv:0704.0946 ]. - [54] O. Zahn, A. Mesinger, M. McQuinn, H. Trac, R. Cen, and L. E. Hernquist, Comparison of reionization models: radiative transfer simulations and approximate, seminumeric models , MNRAS 414 (June, 2011) 727-738, [ arXiv:1003.3455 ]. - [55] E. Chapman, F. B. Abdalla, G. Harker, V. Jeli´, P. Labropoulos, S. Zaroubi, M. A. Brentjens, c A. G. de Bruyn, and L. V. E. Koopmans, Foreground removal using FASTICA: a showcase of LOFAR-EoR MNRAS , 423 (July, 2012) 2518-2532, [ arXiv:1201.2190 ]. - [56] J. C. Pober, A. R. Parsons, J. E. Aguirre, Z. Ali, R. F. Bradley, C. L. Carilli, D. DeBoer, M. Dexter, N. E. Gugliucci, D. C. Jacobs, P. J. Klima, D. MacMahon, J. Manley, D. F. Moore, I. I. Stefan, and W. P. Walbrugh, Opening the 21 cm Epoch of Reionization Window: Measurements of Foreground Isolation with PAPER , ApJL 768 (May, 2013) L36, [ arXiv:1301.7099 ]. - [57] J. R. Pritchard and S. R. Furlanetto, Descending from on high: Lyman-series cascades and spin-kinetic temperature coupling in the 21-cm line , MNRAS 367 (Apr., 2006) 1057-1066, [ astro-ph/ ]. - [58] S. Dodelson and L. M. Widrow, Sterile neutrinos as dark matter , Physical Review Letters 72 (Jan., 1994) 17-20, [ hep-ph/9303287 ]. - [59] M. Vald´ es and A. Ferrara, The energy cascade from warm dark matter decays , MNRAS 387 (June, 2008) L8-L12, [ arXiv:0803.0370 ]. - [60] K. Abazajian, G. M. Fuller, and M. Patel, Sterile neutrino hot, warm, and cold dark matter , Phys. Rev. D 64 (July, 2001) 023501, [ astro-ph/0101524 ]. - [61] R. Barkana, Z. Haiman, and J. P. Ostriker, Constraints on Warm Dark Matter from Cosmological Reionization , ApJ 558 (Sept., 2001) 482-496, [ astro-ph/0102304 ]. - [62] R. S. de Souza, A. Mesinger, A. Ferrara, Z. Haiman, R. Perna, and N. Yoshida, Constraints on warm dark matter models from high-redshift long gamma-ray bursts , MNRAS 432 (July, 2013) 3218-3227, [ arXiv:1303.5060 ]. - [63] X. Kang, A. V. Macci`, and A. A. Dutton, o The Effect of Warm Dark Matter on Galaxy Properties: Constraints from the Stellar Mass Function and the Tully-Fisher Relation , ApJ 767 (Apr., 2013) 22, [ arXiv:1208.0008 ]. - [64] F. Pacucci, A. Mesinger, and Z. Haiman, Focusing on warm dark matter with lensed high-redshift galaxies , MNRAS 435 (Aug., 2013) L53-L57, [ arXiv:1306.0009 ]. - [65] M. Viel, G. D. Becker, J. S. Bolton, and M. G. Haehnelt, Warm dark matter as a solution to the small scale crisis: New constraints from high redshift Lymanα forest data , Phys. Rev. D 88 (Aug., 2013) 043502, [ arXiv:1306.2314 ].
10.1088/1475-7516/2014/11/024
[ "Carmelo Evoli", "Andrei Mesinger", "Andrea Ferrara" ]
2014-08-05T20:23:50+00:00
2014-11-19T14:39:01+00:00
[ "astro-ph.HE", "astro-ph.CO" ]
Unveiling the nature of dark matter with high redshift 21 cm line experiments
Observations of the redshifted 21 cm line from neutral hydrogen will open a new window on the early Universe. By influencing the thermal and ionization history of the intergalactic medium (IGM), annihilating dark matter (DM) can leave a detectable imprint in the 21 cm signal. Building on the publicly available 21cmFAST code, we compute the 21 cm signal for a 10 GeV WIMP DM candidate. The most pronounced role of DM annihilations is in heating the IGM earlier and more uniformly than astrophysical sources of X-rays. This leaves several unambiguous, qualitative signatures in the redshift evolution of the large-scale ($k\approx0.1$ Mpc$^{-1}$) 21 cm power amplitude: (i) the local maximum (peak) associated with IGM heating can be lower than the other maxima; (ii) the heating peak can occur while the IGM is in emission against the cosmic microwave background (CMB); (iii) there can be a dramatic drop in power (a global minimum) corresponding to the epoch when the IGM temperature is comparable to the CMB temperature. These signatures are robust to astrophysical uncertainties, and will be easily detectable with second generation interferometers. We also briefly show that decaying warm dark matter has a negligible role in heating the IGM.
1408.1110v1
## Modeling Basic Aspects of Cyber-Physical Systems, Part II Yingfu Zeng 1 , Chad Rose 1 , Paul Brauner 1 , Walid Taha 1,2 , Jawad Masood 2 , Roland Philippsen 2 , Marcia O'Malley 1 , and Robert Cartwright 1,2 1 Rice University 2 Halmstad University Abstract -We continue to consider the question of what language features are needed to effectively model cyber-physical systems (CPS). In previous work, we proposed using a core language as a way to study this question, and showed how several basic aspects of CPS can be modeled clearly in a language with a small set of constructs. This paper reports on the result of our analysis of two, more complex, case studies from the domain of rigid body dynamics. The first one, a quadcopter, illustrates that previously proposed core language can support larger, more interesting systems than previously shown. The second one, a serial robot, provides a concrete example of why we should add language support for static partial derivatives, namely that it would significantly improve the way models of rigid body dynamics can be expressed. party [4]. However, creating a framework for conducting virtual experiments requires a concerted, interdisciplinary effort to address a wide range of challenges, including: 1) educating designers in the cyber-physical aspects of the products they will develop, both in terms of how these aspects are modeled, and what types of system-level behaviors are generated; and 2) developing expressive, efficient, and robust modeling and simulation tools to support the innovation process. At each stage in the design process, the underlying models should be easy to understand and analyze. Moreover, it should be easy to deduce the mathematical relationship between the models used in successive stages. ## I. INTRODUCTION The increasing computational power embedded in everyday products promises to revolutionize the way we live. At the same time, the tight coupling between computational and physical mechanisms, often described as cyberphysical systems (CPSs), poses a challenge for the traditional product development cycles, particularly in physical testing. For example, car manufacturers are concerned about the amount of physical testing necessary to assure the safety of autonomous vehicles. Physical testing has been used to assess the qualities of new products for many years. One of its key ingredients is devising a collection of specific test scenarios. But the presence of even simple computational components can make it difficult to identify enough test scenarios to exercise more than a minute fraction of the possible behaviors of the system. In addition, physical testing is very expensive because it only detects flaws at the end of the product development process after physical prototypes have been constructed. These realities are spurring the CPS developers to rethink traditional methods and processes for developing and testing new products. Computer simulations [2] performing virtual experiments [3] can be used to reduce the cost of physical tests. Virtual testing can be used to quickly eliminate obviously bad designs. It can also help build confidence that a new design can pass test scenarios developed by an independent This paper is a followup to a paper presented at the DSLRob 2012 Workshop with the same main title [1]. This second part focuses on modeling rigid body dynamics. This work was supported by the US NSF CPS award 1136099, Swedish KK-Foundation CERES and CAISR Centres, and the Swedish SSF NG-Test Project. Both challenges can be addressed by better languagebased technologies for modeling and simulation. An effective model should have clear and unambiguous semantics that can readily be simulated, showing how the model behaves in concrete scenarios. Engineering methods centered around a notion of executable or effective models can have profound positive impacts on the pace of advancement of knowledge and engineering practice. ## A. The Accessibility Challenge Designing a future smart vehicle or home requires expertise from a number of different disciplines. Even when we can assemble the necessary team of experts, they often lack a common language for discussing key issues - treated differently across disciplines - that arise in CPS design. A critical step towards addressing this accessibility challenge is to discover (and not 'invent') a lingua franca (or 'common language') that can break down artificial linguistic barriers between various scientific and engineering disciplines. Part of such a common language will be a natural language that includes a collection of technical terms from the domain of CPS, and that enables experts to efficiently express common model constructions; part will be executable (meaning computationally effective) modeling formalisms made up from a subset of the mathematical notation already in use . Language research can be particularly helpful in discovering the latter part [5]. Examples of such tools exist, but are usually not available as widely-used, multi-purpose tools. This is the case for languages such as Fortress [6] and equational languages [7], [8], as well as specialized, physicsspecific or even multi-physics tools. When they are available as widely-used, multi-purpose tools, they generally cannot be viewed as executable formalisms. This is the case for most symbolic algebra tools. 1 ## B. The Tool Chain Coherence Challenge Based on our experience in several domains, it appears that scientists and engineers engaged in CPS design are often forced to transfer models through a chain of disparate, specialized design tools. Each tool has a clear purpose. For example, drafting tools like AutoCAD and Solidworks support creating images of new products; MATLAB, R, and Biopython support the simple programming of dynamics and control; and finally, tools like Simulink support the simulation of device operation [5]. Between successive tools in this chain, there is often little or no formal communication. It is the responsibility of the CPS designer to translate any data or valuable knowledge to the next tool. We believe that tool chain coherence should be approached from a linguistic point of view. Precise reasoning about models during each step of the design process can readily be supported by applying classical (programming) language design principles, including defining a formal semantics. Reasoning across design steps can be facilitated by applying two specific ideas from language design: 1) increasing the expressivity of a language to encompass multiple steps in the design process; and 2) automatically compiling models from one step to the next. The latter idea reduces manual work and eliminates opportunities for mistakes in the translation. ## C. Recapitulation of Part I Part I of this work [1] identifies a set of prominent aspects that are common to CPS design, and shows the extent to which a small core language, which we call Acumen, supports the expression of these aspects. The earlier paper considers the following aspects: - 1) Geometry and visual form - 2) Mechanics and dynamics - 3) Object composition - 4) Control - 5) Disturbances - 6) Rigid body dynamics and presents a series of examples illustrating the expressivity and convenience of the language for each of these aspects. In this narrative, the last aspect stands out as more openended and potentially challenging. The early paper considers a single case study involving a rigid body: a single link rod (two masses connected by a fixed-length bar). Thus, it does not address the issue of how well such a small language is suited to modeling larger rigid body systems. ## D. Contributions Modeling continuous dynamics is only one aspect of CPS designs that we may need to model, but it is important because it is particularly difficult. This paper extends previous 1 Because physical phenomena are often continuous and digital computation is often discrete, it is important that such languages support hybrid (continuous/discrete) systems. Part I presents examples of hybrid models, including examples of modeling quantization and discretization. The focus of this paper is on issues that relate only to continuous models. work by considering the linguistic demands posed by two larger case studies drawn from the rigid body domain. After a brief review of Acumen (Section II), the first case study we consider is a quadcopter, which is a complex, rigid body system that is often used as a CPS example. The quadcopter case study shows that Acumen can simply and directly express Newtonian models (Section III). The second case study is a research robot called the RiceWrist-S. In this case, developing a Newtonian model is difficult and inconvenient. It illustrates how the more advanced technique of Lagrangian modeling can be advantageous for some problems. As a prelude to modeling the Rice Wrist-S robot, we consider two ostensibly simple dynamic systems, namely a single pendulum and a double pendulum. For the second system, we show that Lagrangian modeling leads to a much simpler mathematical formalization (Section IV). To confirm this insight, we show how Lagrangian modeling enables us to construct a simple model of the dynamics for the RiceWristS (Section V). This analysis provides stronger evidence of the need to support partial derivatives and implicit equations in any hybrid-systems language that is expected to support the rigid body systems domain (Section VI). 2 ## II. ACUMEN Modeling and simulation languages are an important class of domain-specific languages. For a variety of reasons, determining what are the desirable or even plausible features in a language intended for modeling and simulation of hybrid systems [2] is challenging. For example, there is not only one notion of hybrid systems but numerous: hybrid systems, interval hybrid systems, impulsive differential equations (ordinary, partial), switching systems, and others. Yet we are not aware of even one standard example of such systems that has a simple, executable semantics. To overcome this practical difficulty in our analysis, we use a small language called Acumen [9], [10], and assign it a simple, contant time step, semantics. We are developing this language to apply the linguistic approach to the accessibility and tool chain coherence challenges identified above. The language consists of a small number of core constructs, namely: - · Ground values (e.g., True , 5 1.3 , , "Hello" ) - · Vectors and matrices (e.g., [1,2] [[1,2],[3,4]] , ) - · Expressions and operators on ground and composite types ( + -, , ...) - · Object class definitions ( class C (x,y,z) ... end ) - · Object instantiation and termination operations ( create , terminate ) - · Variable declarations ( private ... end ). For convenience, we included in the set of variables a special variable called \_3D for generating 3D animations. - · Variable derivatives ( x' x'' , , ...) with respect to time 2 The original design for Acumen supported partial derivatives [5]. So far, partial derivatives have been absent from the new design [9]. This paper develops the rational for this construct more systematically, with the goal of justifying its introduction in a future revision of Acumen. - · Continuous assignments ( = ) - · Discrete assignments ( := ) - · Conditional statements ( if , and switch ) It should be noted that derivatives in this core language are only with respect to an implicit variable representing global time. In this paper we will consider concrete examples illustrating why it will be useful (in the future) to introduce partial derivatives to Acumen. Continuous assignment is used to express differential equations, whereas discrete assignments are used to express a discontinuous (sudden) change. Initial values for variables (at the time of the creation of a new object) are specified using discrete assignments. Currently, we take a conservative approach to initial conditions, which require users to express them explicitly even for variables where there is a continuous equation that will immediately override this explicit initial value. Finaly, for the sake of minimality, Acumen has no special notation for introducing constants (in the sense of variables that do not change value over time). We are using this language for a term-long project in a course on CPS [11], which has been enthusiastically received in the first two offerings of this course (see for example [12], [13]). A parsimonious core language can help students see the connections between different concepts and avoid the introduction of artificial distinctions between manifestations of the same concept in different contexts. This bodes well for the utility of such languages for addressing this challenge. However, to fully overcome this challenge, we must develop a clear understanding of how different features in such a language match up with the demands of different types of cyber-physical systems. The Acumen distribution contains implementations of multiple different solvers for simulation, accessible from a 'Semantics' menu. For this paper, we use on the 'Traditional' semantics, which simply uses Eulers method and a constant time step for integration. Remark about Syntax: Since the writing of Part I of this paper, a minor change has been made to the syntax, where := now describes discrete assignments, and = now describes continuous assignments. Also, a syntax highlight feature has been introduced, in order to improve the user experience. ## III. QUADCOPTER A rigid body system consists of a set of solid bodies with well-defined mass and inertia, connected by constraints on distances and/or angles between the solid bodies. The dynamics of many physical systems can be modeled with reasonable accuracy as a rigid body system. It is widely used for describing road vehicles, gear systems, robots, etc. In this section, we consider an example of a complex system that can be successfully modeled as simple rigid body, namely, the quadcopter. ## A. Background The quadcopter is a popular mechatronic system with four rotor blades to provide thrust. This robust design has seen use in many UAV applications, such as surveillance, inspection, and search and rescue. Modeling a quadcopter is technically challenging, because it consists of a close combination of different types of physics, including aerodynamics and mechanics. A mathematical model of a quadcopter may need to address a wide range of effects, including gravity, ground effects, aerodynamics, inertial counter torques, friction, and gyroscopic effects. ## B. Reducing Model Complexity Through Control Even if we limit ourselves to considering just six degrees of freedom (three for position and three for orientation), the system is underactuated (one actuation from each rotor vs. six degrees of freedom) and is therefore not trivial to control. Fortunately, controllers exist that can ensure that actuation is realized by getting the four rotors to work in pairs, to balance the forces and torques of the system. With this approach, the quadcopter can be usefully modeled as a single rigid body with mass and inertia, by taking account of abstract force, gravity and actuation control torques. This model is depicted in Fig. 1. ## C. Mathematical Model To generate the equations for the dynamics of our common quadcopter model [14], we first construct the rotational matrix to translate from an inertial (globally-fixed) reference frame to the body-fixed reference frame shown in Fig. 1. This matrix represents rotation about the y axis ( θ ), followed by rotation about the x axis ( φ ), and then rotation about the z axis ( ψ ). $$\mathfrak { s o f } _ { \substack { R = \begin{bmatrix} C _ { \psi } C _ { \theta } & C _ { \psi } S _ { \theta } C _ { \phi } - S _ { \psi } C _ { \phi } & C _ { \psi } S _ { \theta } C _ { \phi } + S _ { \psi } S _ { \phi } \\ S _ { \psi } C _ { \theta } & S _ { \psi } S _ { \theta } S _ { \phi } + C _ { \psi } C _ { \theta } & S _ { \psi } S _ { \theta } C _ { \phi } - C _ { \psi } S _ { \phi } \\ - S _ { \theta } & C _ { \theta } S _ { \phi } & C _ { \theta } C _ { \phi } \end{bmatrix} _ { ( 1 ) } \\ \mathfrak { d } _ { \quad } \text{ here } C \cdot \emph { S and T refer to case in and tan representative}$$ Here, C , S and T refer to cos , sin , and tan , respectively. Next, summing forces on the quadcopter results in: $$\sum F = m \bar { a } = G + R T$$ where G is the force due to gravity, R is the rotational matrix, and T is the thrust from the motors. This expands to $$\begin{bmatrix} \ddot { x } \\ \ddot { y } \\ \ddot { z } \end{bmatrix} = - g \begin{bmatrix} 0 \\ 0 \\ 1 \end{bmatrix} + \frac { T } { m } \begin{bmatrix} C _ { \psi } S _ { \theta } C _ { \phi } + S _ { \psi } S _ { \phi } \\ S _ { \psi } S _ { \theta } C _ { \phi } - C _ { \psi } S _ { \phi } \\ C _ { \theta } C _ { \phi } \end{bmatrix} \quad ( 3 )$$ Finally, by summing moments about the center of mass, the equations for the dynamics for each of the rotational degrees of freedom can be determined as follows: $$\intertext { a l y }, \quad \begin{bmatrix} \ddot { \phi } \\ \ddot { \theta } \\ \ddot { \psi } \end{bmatrix} \, = \, \begin{bmatrix} 0 & \dot { \phi } C _ { \phi } T _ { \theta } + \dot { \theta } \frac { S _ { \phi } } { C _ { \theta } ^ { 2 } } & - \dot { \phi } S _ { \phi } C _ { \theta } + \dot { \theta } \frac { C _ { \phi } } { C _ { \theta } ^ { 2 } } \\ 0 & - \dot { \phi } S _ { \phi } & - \dot { \phi } C _ { \phi } \\ 0 & \dot { \phi } \frac { C _ { \phi } } { C _ { \theta } } + \dot { \phi } S _ { \phi } \frac { T _ { \theta } } { C _ { \theta } } & - \dot { \phi } \frac { S _ { \phi } } { C _ { \theta } } + \dot { \theta } C _ { \phi } \frac { T _ { \theta } } { C _ { \theta } } \end{bmatrix} \, \nu$$ $$+ W _ { \eta } ^ { - 1 } \dot { \nu } \ \ ( 4 )$$ Fig. 1: Free body diagram of the quadcopter ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-097c2a8c-a6c6-4e45-bb5f-d61dbda73020.jpg) $$\nu = \begin{bmatrix} p \\ q \\ r \end{bmatrix} = W _ { \eta } \begin{bmatrix} \dot { \phi } \\ \dot { \theta } \\ \psi \end{bmatrix} = \begin{bmatrix} 1 & 0 & - S _ { \theta } \\ 0 & C _ { \phi } & C _ { \theta } S _ { p } h i \\ 0 & - S _ { \phi } & C _ { \theta } C _ { \phi } \end{bmatrix} \begin{bmatrix} \dot { \phi } \\ \dot { \theta } \\ \psi \end{bmatrix} & ( 5 ) & q ^ { \prime } \\ \dot { \alpha } ^ { \prime } \\ \dot { \nu } = \begin{bmatrix} \left ( I _ { y } y - I _ { z } z \right ) \frac { q r } { I _ { z } } ^ { q r } \\ ( I _ { z } x - I _ { x } x ) \frac { q r } { I _ { y } } ^ { q r } \\ ( I _ { x } x - I _ { y } y ) \frac { q } { I _ { z } z } \\ - I _ { r } \end{bmatrix} \begin{bmatrix} \frac { q } { I _ { x } x } \\ \frac { p } { I _ { y } } \\ 0 \end{bmatrix} \omega _ { \Gamma } + \begin{bmatrix} \frac { \tau _ { \phi } } { I _ { x } x } \\ \frac { \tau _ { \phi } } { I _ { \phi } } \\ \frac { \tau _ { \phi } } { I _ { z } z } \end{bmatrix} & ( 6 ) & p h i \\ \frac { \tau _ { \phi } } { I _ { z } z } \end{bmatrix} & ( 6 ) & \quad + \\ D. \ A c u n e n { \ } & \text{Adcomer} \quad & \quad \quad \quad$$ ## D. Acumen Model for Quadcopter The equations derived earlier for the dynamics can be expressed in our core language as follows: class QuadCopter(P,phi,theta,psi) private ``` expressed in our core language as follows: ``` ``` T = k* (w1^2 + w2^2 + w3^2 + w4^2); f1 = k * w1^2; TM1 = b * w1^2; f2 = k * w2^2; TM2 = b * w2^2; f3 = k * w3^2; TM3 = b * w3^2; f4 = k * w4^2; TM4 = b * w4^2; wT = w1 - w2 + w3 - w4; Ch = cos(phi); Sh = sin(phi); Sp = sin(psi); Cp = cos(psi); St = sin(theta); Ct = cos(theta); Tt = tan(theta); P''= -g * [0,0,1] + T/m *[Cp*St*Ch+Sp*Sh,Sp*St*Ch-Cp*Sh,Ct*Ch] -1/m*[Ax*dot(P',[1,0,0]), Ay*dot(P',[0,1,0]), Az*dot(P',[0,0,1])]; p' = (Iyy-Izz)*q*r/Ixx - IM*q/Ixx*wT + l*k*(w4^2 - w2^2)/Ixx; (5) q' = (Izz-Ixx)*p*r/Iyy-IM*(-p)/Iyy*wT + l*k*(w ``` Fig. 2 presents snapshots of a 3D visualization of the quadcopter responding to a signal from a basic stabilizing controller [14]. This example shows that the Acumen core language can express models for complex mechatronic systems that are widely used in both research and education today. ## IV. LAGRANGIAN MODELING, AND WHY WE NEED IT Mathematical modeling of rigid body systems draws heavily on the field of classical mechanics. This field started in the 17th century with the introductions of Newton's principles of motion and Newtonian modeling. Newton's foundational work was followed by Lagrangian modeling in the 18th century, and Hamiltonian modeling in the 19th. Today, mechanical engineers make extensive use of the Lagrangian method when analyzing rigid body systems. It is therefore worthwhile to understand the process that engineers follow when using this method, and to consider the extent to which a modeling language can support this process. The Newton method is focused on taking into consideration the forces and torques operating on a rigid body, and then computing the linear and angular accelerations of the center of mass of that rigid body. In general, this method consists of isolating the rigid body of interest in a free body Fig. 2: The simulation results of the quadcopter model with PID control. Here the controller is bringing the quadcopter elevation, roll, pitch, and yaw to zero. Yellow arrows attached to each rotor indicate the thrust force generated by the rotors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-65189940-6e02-403d-8fe1-918f53d6a0e3.jpg) diagram, selecting coordinate frame and summing forces and torques on the rigid body with respect to that frame, then using kinematics to express the linear and angular acceleration terms, before finally deriving the equations for the dynamics. The Lagrangian method is based on the notion of action L = T -V , which is the difference between the kinetic T and potential energy V . The Euler-Lagrange equation is itself a condition for ensuring that the total action in the system is stationary (constant). In Lagrangian modeling of physical systems, this condition should be seen as the analogy of the combined conditions Σ F = ma and Σ τ = Iω ′′ in Newtonian mechanics. The Euler-Lagrange equation is as follows: $$\forall i \in \{ 1 \dots | q | ) \}, \frac { d } { d t } \left ( \frac { \partial L } { \partial \dot { q } _ { i } } \right ) - \frac { \partial L } { \partial q _ { i } } = Q \quad \ \ ( 8 ) \, \prod _ { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t r } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak { r } { \mathfrak { t } { \mathfrak { t } { \mathfrak { t } { \mathfrak$$ Using just this equation, the modeling process is reduced to specifying the kinetic and potential energy in the system. Part of the power of the method comes from the fact that this can be done using Cartesian, polar, spherical, or any other generalized coordinates. Compared to the classic Newtonian, force-vector based methods, the Euler-Lagrange equation is often a more direct specification of the dynamics. The Lagrangian modeling process consists of four steps: - 1) Start with a description of the components of the system, consisting of rigid bodies and joints. This description generally comes with a set of variable names which are collectively called called the generalized coordinates vector q . Intuitively, each variable Fig. 3: Free body diagram for single and double pendulums ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-678cb9a5-1427-4940-a471-ff44ebdcdec2.jpg) represents a quantity corresponding to one of the degrees of freedom for the system. Usually, all of this information can be captured in an intuitive way in a free body diagram . - 2) Determine the expression for the total kinetic and potential energy T and V , respectively, of the system, in terms of the selected set of generalized coordinates q . - 3) Identify and include any 'external forces' Q such as friction. 3 - 4) Substitute the values into the Euler-Lagrange equation (8) for the variables of second the derivative of q . This process and its benefits can be illustrated with two small examples. The benefits apply whether or not the language supports directed or undirected equations. Figure 3 presents a free body diagram marked up with generalized coordinates ( θ in one, and θ , θ 1 2 in the other) for a single and a double pendulum system. First, we consider the single pendulum. A direct application of the angular part of Newton's law gives us the following equation: $$\ddot { \theta } = \frac { g } { l } \cos \theta$$ which is easily expressed in Acumen as follows: $$<_Pascal_> ysica: gy of class pendulum (l) private is as$$ Lagrangian modeling can be applied to the single pendulum problem, but Newton's method works well enough here. However, Lagrangian modeling does pay off for a double pendulum. It is instructive for language designers to recognize that such a seemingly small change in the complexity of the rigid body makes the model most of us learn about in high-school much more cumbersome than necessary. Whether or not this difficulty in modeling is due to weakness in Newtonian modeling or intrinsic complexity in this seemingly simple example is not obvious: The double pendulum is sophisticated enough to be widely used to model a human standing or walking [15], or a basic two-link robot such as the MIT-manus [16]. To derive a model for the double pendulum using Lagrangian modeling, we proceed as follows: - 1) We take q = ( θ , θ 1 2 ) . Here, because the EulerLagrange equation is parameterized by a generalized coordinate vector, we could have chosen to use Cartesian coordinates ( x, z ) for each of the two points. Here we chose angles because they resemble what can be naturally measured and actuated at joints. - 2) The kinetic and potential energies are defined as follows: $$T = \frac { 1 } { 2 } m _ { 1 } v _ { 1 } ^ { 2 } + \frac { 1 } { 2 } m _ { 2 } v _ { 2 } ^ { 2 } \quad \quad ( 1 0 ) \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \ \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \ \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \quad \quad$$ $$V = m _ { 1 } g z _ { 1 } + m _ { 2 } g z _ { 2 } \quad \quad ( 1 1 ) \stackrel { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \subpop { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \sub \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack { \substack \substack { \substack { \substack { \substack { \substack { \substack {$$ where we have introduced shorthands for speeds v 2 1 = l 2 1 ˙ θ 1 2 and v 2 2 = v 2 1 + 1 2 m l θ 2 ( 2 1 ˙ 1 2 + l 2 2 ˙ θ 2 2 + 2 l 1 2 l ˙ θ θ 1 ˙ 2 cos( θ 2 -θ 1 )) , z 1 = l 1 sinθ 1 and heights z 2 = z 1 + l 2 sinθ 2 . Substituting these terms we get: $$T = \frac { 1 } { 2 } m _ { 1 } ( l _ { 1 } \dot { \theta } _ { 1 } ) ^ { 2 } & & \text{end} \\ + \frac { 1 } { 2 } m _ { 2 } ( l _ { 1 } ^ { 2 } \dot { \theta } _ { 1 } ^ { 2 } + l _ { 2 } ^ { 2 } \dot { \theta } _ { 2 } ^ { 2 } + 2 l _ { 1 } l _ { 2 } \dot { \theta } _ { 1 } \dot { \theta } _ { 2 } \cos ( \theta _ { 2 } - \theta _ { 1 } ) ) & & \\ + \cdots & \cdots \wedge \cdots \wedge \cdots \wedge \cdots & & \text{end}$$ V = m gl 1 1 sin θ 1 + m gl 2 2 sin θ 2 + m gl 2 1 sin θ 1 ; (13) - 3) We assume frictionless joints, and so there are no external forces ( Q = 0 ). - 4) By substitution and (manual) symbolic differentiation we get: $$& ( m _ { 1 } + m _ { 2 } ) l _ { 1 } ^ { 2 } \ddot { \theta _ { 1 } } + m _ { 2 } l _ { 1 } l _ { 2 } \ddot { \theta _ { 2 } } \cos { ( \theta _ { 1 } - \theta _ { 2 } ) } \\ & + m _ { 2 } l _ { 1 } l _ { 2 } \dot { \theta _ { 1 } } ^ { 2 } \sin { ( \theta _ { 1 } - \theta _ { 2 } ) } + m _ { 1 } m _ { 2 } g l _ { 1 } \cos { \theta _ { 1 } } = 0 \\ & & & ( 1 4 )$$ $$& m _ { 2 } l _ { 2 } ^ { 2 } \ddot { \theta _ { 2 } } + m _ { 2 } l _ { 1 } l _ { 2 } \ddot { \theta _ { 1 } } \cos { ( \theta _ { 1 } - \theta _ { 2 } ) } - \begin{array} { c } \text{ in the} \\ \text{robots} \\ & m _ { 2 } l _ { 1 } l _ { 2 } \dot { \theta _ { 1 } } \end{array} ^ { 2 } \sin { ( \theta _ { 1 } - \theta _ { 2 } ) } + m _ { 2 } g l _ { 2 } \cos { \theta _ { 2 } } = 0 \quad ( 1 5 ) \quad \text{In this} \quad \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text$$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text$$\text$$\text$$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text $\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$ $\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$ } \end{array} }$$ It is important to note in this case that, while these are ordinary differential equations (ODEs), they are not in the explicit form X ′ = E . Rather, they are in implicit form, because the variable we are solving for ( X ′ ) is not alone on one side of the equation. Using Gaussian elimination (under the assumption that the masses and length are strictly greater than zero), we get: $$\ddot { \theta _ { 1 } } & = m _ { 2 } l _ { 2 } ( \ddot { \theta _ { 2 } } \cos ( \theta _ { 1 } - \theta _ { 2 } ) + \dot { \theta _ { 2 } } ^ { 2 } \sin ( \theta _ { 1 } - \theta _ { 2 } ) \quad \text{ the le} \\ & + ( m _ { 1 } + m _ { 2 } ) g \cos ( \theta _ { 1 } ) ) / ( - l _ { 1 } ( m _ { 1 } + m _ { 2 } ) ) \quad ( 1 6 ) \quad \text{ rehab}$$ $$\ddot { \theta _ { 2 } } = m _ { 2 } l _ { 1 } ( \ddot { \theta _ { 1 } } \cos ( \theta _ { 1 } - \theta _ { 2 } ) - \dot { \theta _ { 1 } } ^ { 2 } \sin ( \theta _ { 1 } - \theta _ { 2 } ) \quad \text{ each } \mathfrak { c } \\ + m _ { 2 } g \cos ( \theta _ { 2 } ) ) / - l _ { 1 } m _ { 2 } \quad ( 1 7 ) \quad \text{ has $tt$} \\ \text{start} \text{in}$$ The following code shows these equations expressed in Acumen: Fig. 4: The RiceWrist-S, with superimposed axes of rotation ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-444fb86a-1a54-4c4c-9788-468caaa12c21.jpg) class double\_pendulum (m\_1, m\_2, L\_1, L\_2) private $$<_FORTRAN_> ` ` class double_pendulum (m_1, m_2, L_1, L_ (l1) private peeds t_1 := 0; t_2 := 0; j2 + t_1' := 0; t_2' := 0; t_1' sights c_1' - - end - c + + e.n < > < </ </ >$$ end ## V. THE RICEWRIST-S ROBOT Equipped with an understanding of Lagrangian modeling in the manner presented above, engineers model multi-link robots much more directly than with the Newtonian method. In this section we present one such case study using the RiceWrist-S research Robot. ## A. Background With an increasing number of individuals surviving once fatal injuries, the need for rehabilitation of damaged limbs is growing rapidly. Each year, approximately 795,000 people suffer a stroke in the United States, where stroke injuries are the leading cause of long-term disability. The RiceWristS [17] is an exoskeleton robot designed to assist in the rehabilitation of the wrist and forearm of stroke or spinal cord injury patients (Fig. 4). It consists of a revolute joint for each of the three degrees of freedom at the wrist. Because it has three rotational axes intersecting at one point, a good starting point to modeling it is the gimbal, a commonly studied mechanical device that also features several rotational axes intersecting at one point. Fig. 5: Free body diagram of the RiceWrist-S as a gimbal ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-3dc9e202-b538-4326-a290-364f3f739c47.jpg) ## B. Analytical Model We can apply the Lagrangian modeling process to determine the dynamics of a gimbal as follows: - 1) We take q = ( θ , θ 1 2 , θ 3 ) , where each of the angles corresponds to one of the three rotations possible in the RiceWrist-S (Fig. 5). We chose to represent the mass of the system as centralized to three locations, one at the origin, one at the bottom of the outermost ring, and one at the end of the third link. The masses in this figure correspond to the motors and handle depicted in Fig. 4. - 2) To describe the energies concisely, it is convenient to use the following angular velocities of the gimbal frames in the kinetic energy terms, and the resulting heights for the potential energy terms: $$\omega _ { 1 } = \dot { \theta _ { 1 } } \cdot \hat { x _ { 1 } }$$ $$\omega _ { 2 } = \dot { \theta _ { 1 } } \cdot \hat { x _ { 1 } } + \dot { \theta _ { 2 } } \cdot \hat { z _ { 2 } }$$ $$\omega _ { 3 } = \dot { \theta _ { 1 } } \cdot \hat { x _ { 1 } } + \dot { \theta _ { 2 } } \cdot \hat { z _ { 2 } } + \dot { \theta _ { 3 } } \cdot \hat { y _ { 3 } } \quad \ ( 2 0 )$$ where ˆ ˆ ˆ x y z i i i refers to the unit vector and coordinate frame about which these rotations occur, as shown in Fig. 5. Here, the ω i terms correspond to the m i masses, and describe the angular velocities of that mass. Since this is a complex rotational system, many of the rotations do not occur in the coordinate frames of the respective gimbal. Therefore, in order to express each ω i in terms of the same coordinate frame, we applied the following coordinate transforms: $$\omega _ { 1 } = \dot { \theta _ { 1 } } \cdot \hat { x _ { 1 } }$$ $$\begin{matrix} \\ \end{matrix}$$ $$\omega _ { 1 } = & \, \dot { \theta } _ { 1 } \cdot \hat { x } _ { 1 } & ( 2 1 ) \quad \text{code} \ | \\ \omega _ { 2 } = & \, \dot { \theta } _ { 1 } ( \cos ( \theta _ { 2 } ) \cdot \hat { x } _ { 2 } - \sin ( \theta _ { 2 } ) \cdot \hat { y } _ { 2 } ) + \dot { \theta } _ { 2 } \cdot \hat { z } _ { 2 } & ( 2 2 ) \quad \text{also a} \\ \omega _ { 3 } = & \, ( \dot { \theta } _ { 1 } ( \cos ( \theta _ { 2 } ) \cos ( \theta _ { 3 } ) ) + \dot { \theta } _ { 2 } ( - \sin ( \theta _ { 3 } ) ) ) \cdot \hat { x } _ { 3 } & \dot { q } \ \text{and} \\ & + ( - \dot { \theta } _ { 1 } \sin ( \theta _ { 2 } ) + \dot { \theta } _ { 3 } ) \cdot \hat { y } _ { 3 } + ( - \dot { \theta } _ { 1 } \sin ( \theta _ { 3 } ) \cos ( \theta _ { 2 } ) \\ & - \dot { \theta } _ { 2 } \cos ( \theta _ { 3 } ) ) \cdot \hat { z } _ { 3 } & \text{express} \\ & \quad ( 2 3 ) \quad \text{of the}$$ (23) Next, we express the heights above the predefined plane of zero potential energy (in Fig. 5, the XY plane) of each of the masses m ,m ,m 1 2 3 , respectively, as the following: $$h _ { 1 } = l _ { 2 } \cos ( \theta _ { 1 } ) \text{ \quad \ \ } ( 2 4 )$$ $$h _ { 2 } = 0$$ $$h _ { 3 } = l _ { 3 } \sin ( \theta _ { 1 } ) \sin ( \theta _ { 3 } ) \text{ \quad \ \ } ( 2 6 )$$ With this completed, the T and V terms can be quickly and easily defined. Since this is a rotational only system, T is defined as the sum of the rotational energy terms, shown below: $$T = \frac { 1 } { 2 } ( I _ { 1 } \omega _ { 1 } \cdot \, \omega _ { 1 } + I _ { 2 } \omega _ { 2 } \cdot \omega _ { 2 } + I _ { 3 } \omega _ { 3 } \cdot \omega _ { 3 } ) \quad ( 2 7 )$$ Where I i is the rotational inertia corresponding to θ i , and ω i is defined as above. And since there are no potential energy storage elements other than those caused by gravity, V can be expressed with these heights: $$V & = m _ { 1 } g h _ { 1 } + m _ { 2 } g h _ { 2 } + m _ { 3 } g h _ { 3 } \\ & = - m _ { 1 } g l _ { 2 } \cos ( \theta _ { 1 } ) + m _ { 3 } g l _ { 3 } \sin ( \theta _ { 1 } ) \sin ( \theta _ { 3 } ) \quad ( 2 8 )$$ - 3) Again, we assumed frictionless joints, so Q = 0 - 4) After substitution and (manual) symbolic differentiation, we get an implicit set of equations. We solve these for q ′′ to get the equations of the systems dynamics. $$\frac { 1 } { 2 } \frac { d } { d t } \left ( I _ { 1 } \frac { \partial \omega _ { 1 } \cdot \omega _ { 1 } } { \partial \dot { \theta } _ { 1 } } + I _ { 2 } \frac { \partial \omega _ { 2 } \cdot \omega _ { 2 } } { \partial \dot { \theta } _ { 1 } } + I _ { 3 } \frac { \partial \omega _ { 3 } \cdot \omega _ { 3 } } { \partial \dot { \theta } _ { 1 } } \right ) + \\ m _ { 1 } g l _ { 2 } s i n ( \theta _ { 1 } ) + m _ { 3 } g l _ { 3 } c o s ( \theta _ { 1 } ) s i n ( \theta _ { 3 } ) = 0 \quad ( 2 9 )$$ $$\frac { 1 } { 2 } \frac { d } { d t } \left ( I _ { 2 } \frac { \partial \omega _ { 2 } \cdot \omega _ { 2 } } { \partial \dot { \theta } _ { 2 } } + I _ { 3 } \frac { \partial \omega _ { 3 } \cdot \omega _ { 3 } } { \partial \dot { \theta } _ { 2 } } \right ) \\ - \frac { 1 } { 2 } \left ( I _ { 2 } \frac { \partial \omega _ { 2 } \cdot \omega _ { 2 } } { \partial \theta _ { 2 } } + I _ { 3 } \frac { \partial \omega _ { 3 } \cdot \omega _ { 3 } } { \partial \theta _ { 2 } } \right ) = 0 \quad ( 3 0 )$$ $$\frac { 1 } { 2 } \frac { d } { d t } \left ( I _ { 3 } \frac { \partial \omega _ { 3 } \cdot \omega _ { 3 } } { \partial \dot { \theta } _ { 3 } } \right ) - \frac { 1 } { 2 } \left ( I _ { 3 } \frac { \partial \omega _ { 3 } \cdot \omega _ { 3 } } { \partial \theta _ { 3 } } \right ) \\ & - m _ { 3 } g l _ { 3 } s i n ( \theta _ { 1 } ) \cos ( \theta _ { 3 } ) = 0 \quad ( 3 1 )$$ After computing the static partial derivatives, and the time derivatives, the resulting ODE's are again, easy to express in Acumen. But they are too long to include here, as is the code [18]. What is significant about this situation is that these equations are linear in ¨ q even though the system is also a non-linear differential equation (when we consider q , ˙ q and ¨ q ). Because the system is linear in ¨ q , we can use standard Gaussian elimination to solve for ¨ q . This converts these implicit equations into an explicit form that is readily expressiable in Acumen. Fig. 6 shows the compound motion of the RW-S Gimbal model. Fig. 6: RiceWrist-S modeled as Gimbal in Acumen. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1110v1-figure-d6d23511-57c6-443b-aef7-7b437eed6fd4.jpg) ## VI. DISCUSSION In this section, we step back to reflect on how to interpret this experience with expressing these various sytems in the small core language described at the outset of the paper. ## A. The Role of a Core Language At the highest level, Acumen can be seen as an untyped core formalism for a subset of hybrid systems modeling and simulation languages such as Modelica [7], Scicos [19] and Simcape [8]. It is easy to see that the CPS aspects that Acumen can express should be expressible by 'larger' languages, but it is less clear what finding a weakspot in the expressivity of Acumen means for larger languages. In reasoning formally about expressivity limitations, it is beneficial that Acumen is untyped: any static type discpline adds restrictions, and whether or not such restrictions affects expressivity complicates such reasoning. While removing typing avoids this particular difficulty, it does not remove all the difficulties. Eventually, we expect to add a typing discpline to Acumen, but no particular direction has been decided at this time. With several annual workshops related to its design and applications, Modelica is the most actively studied of the hybrid languages. It is a large language with many constructs. Acumen is small, with only a few features that are specific to hybrid systems. For example, Open Modelica's parser [20] is roughly four times longer than the parser for Acumen. If Acumen can be seen as a subset of Modelica, it is reasonable to assume that the CPS aspects that Acumen can express can also be expressed in Modelica. At the same time, if features of CPS models are not easily expressed in Acumen, it is not immediately obvious wether or not they can be expressed in Modelica. Another point that requires care in making the connection is the relation between Acumen's notion of an object class and the abstraction mechanisms found in other languages. So far, our comparisons focus on issues relating to the expression and statement parts of these languages. ## B. Supporting Lagrangian Modeling The experience with the RiceWrist-S Robot suggests the need for Lagrangian modeling, which in turn points out to the need for two language features. The first feature is static partial derivatives. It has been observed elsewhere that the type of partial derivatives used in the Euler-Lagrange equation for rigid body dynamics can be removed at compile time (or 'statically') [5]. The pendulum examples show that CPS modeling languages should support the definition of explicit Langrangian models (requiring partial derivatives) because it simplifies the task of modeling rigid body systems, reducing the amount analysis, description, and algebraic manipulation the user would have to carry out. Support for static partial derivatives in larger modeling and simulation tools seems sparse. While the Modelica standard (at least until recently) did not support partial derivatives, one implementation of Modelica, Dymola [21], does provide this support. Static partial derivatives are clearly an important feature to include in any DSL aiming to support CPS design. In response to this observation, we have already introduced support for static partial derivatives in Acumen. The second language feature required (but is not sufficient without the first) to support Lagrangian modeling is implicit equations. The utility of implicit equations can be seen by reviewing the double pendulum example. Implicit equations are present in Modelica and Simscape. The construct does increase the reusability and flexibility of models, making composite models more concise. At this point it is not entirely clear to us how to best introduce implicit equations into a core language. To address this issue, we are currently implementing and experimenting with several different approaches from the literature. While different approaches may be better suited for different purposes (such as numerical precision, runtime performance, or others), our purpose behind this activity is to better understand how to position implicit equations in the context of other CPS DSL design decisions. A particularly interesting question here is whether this feature must be a primitive in the language or whether it can be treated as a conservative extension [22] of a core that does not include it. ## VII. CONCLUSIONS This paper reports our most recent findings as we pursue an appropriate core language for CPS modeling and simulation. In particular, we present two examples. Our first example, a quadcopter, is significantly more sophisticated than any system considered in the first part. It shows that the core language proposed in Part I can express more sophisticated systems than was previously known. The second example, the RiceWrist-S, led us to understand the need for Lagrangian modeling, and as a result, provides us with concrete justification for introducing support for static partial derivatives. The most important lesson from this case study was that a DSL aimed at supporting CPS design should provide static partial derivatives and implicit equations. In order to ensure that we can push this line of investigation further, we have already developed a prototype of the former, and are working to realize the latter. ## ACKNOWLEDGEMENTS We would like to thank the reviewers of DSLRob 2012 for valuable feedback on part I of this paper, and the reviewers of DSLRob 2013 and Adam Duracz for comments and feedback on this draft. ## REFERENCES - [1] Taha Walid and Philippsen Roland. Modeling Basic Aspects of CyberPhysical Systems. arXiv preprint arXiv:1303.2792 , 2013. - [2] Luca Carloni and Roberto Passerone and Alessandro Pinto and Alberto Sangiovanni-Vincentelli. Languages and tools for hybrid systems design. Foundations and Trends in Design Automation , 1(1):1-204, 2006. - [3] Julien Bruneau, Charles Consel, Marcia O'Malley, Walid Taha, and Wail Masry Hannourah. Virtual Testing for Smart Buildings. In Proceedings of the 8th International Conference on Intelligent Environments (IE'12) , Guanajuato's, Mexico, 2012. - [4] Jeff Jensen, Danica Chang, and Edward Lee. A Model-Based Design Methodology for Cyber-Physical Systems. In Proceedings of The First IEEE Workshop on Design, Modeling and Evaluation of Cyber Physical Systems (CyPhy'11) , Istanbul, Turkey, July 2011. - [5] Zhu Yun, Westbrook Edwin, Inoue Jun, Chapoutot Alexandre, Salama Cherif, Peralta Marisa, Martin Travis, Taha Walid, O'Malley Marcia, and Cartwright Robert. Mathematical equations as executable models of mechanical systems. In Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems , pages 1-11. ACM, 2010. - [6] E. Allen, D. Chase, J. Hallett, V. Luchangco, J.-W. Maessen, S. Ryu, G. L. Steele Jr., and S. Tobin-Hochstadt. The Fortress Language Specification. Technical report, Sun Microsystems, Inc., 2007. - [7] Fritzson Peter and Bunus Peter. Modelica A General Object-Oriented Language for Continuous and Discrete-Event System Modeling and Simulation. In SS '02: Proceedings of the 35th Annual Simulation Symposium , page 365, Washington, D.C., USA, 2002. IEEE Computer Society. - [8] Inc. The Mathworks. Simscape documentation. http://www.mathworks.com/help/physmod/simscape/, 2013. - [9] Walid Taha, Paul Brauner, Yingfu Zeng, Robert Cartrwright, Veronica Gaspes, Aaron Ames, and Alexandre Chapoutot. A Core Language for Executable Models of Cyber Physical Systems (Preliminary Report). In Proceedings of The Second International Workshop on CyberPhysical Networking Systems (CPNS'12) , Macau, China, June 2012. - [10] Acumen website. www.acumen-language.org, 2010. - [11] Walid Taha. Lecture notes on cyber-physical systems. Available online from www.effective-modeling.org/p/teaching.html, September 2012. - [12] Taha Walid, Cartwright Robert, Philippsen Roland, and Zeng Yingfu. A First Course on Cyber Physical Systems. In 2013 Workshop on Embedded and Cyber-Physical Systems Education (WESE) , Montreal, Canada, October 2013. - [13] Taha Walid, Cartwright Robert, Philippsen Roland, and Zeng Yingfu. A First Course on Cyber Physical Systems. In Proceedings of the First Workshop on Cyber-Physical Systems Education (CPSEd 2013) at Cyber Physical Systems Week (CPSWeek 2013) , Philadelphia, Pennsylvania, USA, April 2013. Available: http://cpsvo.org/group/edu/workshop/proceedings2013. - [14] Teppo Luukkonen. Modelling and control of quadcopter, 2011. Aalto University, Espoo. - [15] Pekarek David, Ames D. Aaron, and Marsden E. Jerrold. Discrete mechanics and optimal control applied to the compass gait biped. In Decision and Control, 2007 46th IEEE Conference on , pages 53765382. IEEE, 2007. - [16] Neville Hogan, Hermano Igo Krebs, J Charnnarong, P Srikrishna, and Andre Sharon. MIT-MANUS: a workstation for manual therapy and training. i. In Robot and Human Communication, 1992. Proceedings., IEEE International Workshop on , pages 161-165. IEEE, 1992. - [17] A.U Pehlivan, Lee Sangyoon, and M.K. O'Malley. Mechanical design of RiceWrist-S: A forearm-wrist exoskeleton for stroke and spinal cord injury rehabilitation. In Biomedical Robotics and Biomechatronics (BioRob), 2012 4th IEEE RAS EMBS International Conference on , pages 1573-1578, 2012. - [18] Yingfu Zeng, Chad Rose, and Walid Taha. RiceWrist-S: Gimbal model. available online from. http://bit.ly/RiceWristGimbal, 2013. - [19] Ramine Nikoukhah. Modeling hybrid systems in Scicos: a case study. In Proceedings of the 25th IASTED international conference on Modeling, indentification, and control , MIC'06. ACTA Press, 2006. - [20] Modelica. parser. https://www.modelica.org/tools/parser. - [21] H. Olsson, H. Tummescheit, and H. Elmqvist. Using automatic differentiation for partial derivatives of functions in Modelica. In Proceedings of Modelica , pages 105-112, Hamburg, Germany , March 2005. - [22] Matthias Felleisen. On the expressive power of programming languages. In Science of Computer Programming , pages 134-151. Springer-Verlag, 1990.
null
[ "Yingfu Zeng", "Chad Rose", "Paul Brauner", "Walid Taha", "Jawad Masood", "Roland Philippsen", "Marcia O. Malley", "Robert Cartwright" ]
2014-08-05T20:32:31+00:00
2014-08-05T20:32:31+00:00
[ "cs.RO" ]
Modeling Basic Aspects of Cyber-Physical Systems, Part II
We continue to consider the question of what language features are needed to effectively model cyber-physical systems (CPS). In previous work, we proposed using a core language as a way to study this question, and showed how several basic aspects of CPS can be modeled clearly in a language with a small set of constructs. This paper reports on the result of our analysis of two, more complex, case studies from the domain of rigid body dynamics. The first one, a quadcopter, illustrates that previously proposed core language can support larger, more interesting systems than previously shown. The second one, a serial robot, provides a concrete example of why we should add language support for static partial derivatives, namely that it would significantly improve the way models of rigid body dynamics can be expressed.
1408.1111v1
## Riemann Hypothesis for Goss t -adic Zeta Function Javier Diaz-Vargas and Enrique Polanco-Chi. Universidad Aut´noma de Yucat´n, Facultad de Matem´ticas. o a a Perif´rico Norte Tablaje 13615, 97119, M´rida, Yucat´n, M´xico. e e a e [email protected], [email protected]. ## Abstract In this short note, we give a proof of the Riemann hypothesis for Goss v -adic zeta function ζ v ( s ), when v is a prime of F q [ t ] of degree one. The Riemann Hypothesis says that the non-trivial complex zeros of the Riemann zeta function all lie on a line Re( s ) = 1 / 2 in the complex plane. An analog [7, 2, 5] of this statement was proved for the Goss zeta function for F q [ t ], for q a prime by Wan [7] (see also [1]) and for general q by Sheats [4]. The proofs use the calculation of the Newton polygons associated to the power series these zeta functions represent, and their slopes are calculated or estimated by the degrees of power sums which make up the terms. In [1, 4], the exact degrees derivable (as noticed by Thakur) from incomplete work of Carlitz were justified and the Riemann hypothesis was derived. In this paper, we look at the v -adic Goss zeta function and prove analog of the Riemann hypothesis, in case where v is a prime of degree one in F q [ t ], using the valuation formulas for the corresponding power sums given essentially (see below) in [6] and following the method of [1], [5, Sec. 5.8]. We note that for q = 2, this was already shown by Wan [7] using the earlier calculation at the infinite place. See below for the details. We also note that the situation for higher degree v is different [6, Sec. 10] and is not fully understood. We now give the relevant definitions and describe the results precisely. In the function field - number field analogy, we have A = F q [ t ], K = F q ( ), t K ∞ = F q ((1 /t )) and C ∞ , the completion of algebraic closure of K ∞ as analogs of Z , Q , R and C respectively. We consider v -adic situation where v is an irreducible polynomial of A , and K v the completion of K at v , as analog of p -adic situation, where p is a prime in Z and Q p the field of p -adic numbers. For v a prime of F q [ t ], the v -adic zeta function of Goss is defined on the space S v := C ∗ v × lim ← -j Z / q ( deg v -1) p j Z , where C v is the completion of an algebraic closure of K v and the lim ← -j Z / q ( deg v -1) p j Z is isomorphic to the product of Z p with the cyclic group Z / q ( deg v -1) Z . See [2, § 8 3], . [5, § 5 5(b)] for motivation . and details. For s = ( x, y ) ∈ S v , the Goss v -adic zeta function is then defined as $$\zeta _ { v } ( s ) = \sum _ { d = 0 } ^ { \infty } x ^ { d } \sum _ { \substack { a \in \mathbb { F } _ { q } [ t ], \ \text{monic} \\ \deg ( a ) = d \\ ( v, a ) = 1 } } a ^ { y }.$$ Note that a y here, by Fermat's little theorem, is a p -adic power of a one-unit at v , and thus makes sense. For y ∈ Z / q ( deg v -1) Z × Z p we write $$S _ { d, v } ( y ) \coloneqq \sum _ { \substack { a \in \mathbb { F } _ { q } [ t ], \ \text{monic} \\ \deg ( a ) = d \\ ( v, a ) = 1 } } a ^ { y },$$ and let $$v _ { d } ( y ) \coloneqq \, \text{val} _ { v } ( S _ { d, v } ( y ) ).$$ We focus on v of degree one, so that without loss of generality we assume that v = . t In this case, the Riemann hypothesis is the statement that for a fixed y all zeros in x of ζ v ( s ) are in F q (( )) = t K t (inside much bigger field C t ), and they are simple zeros, i.e., with multiplicity 1. We note that for q = 2, and v = , Wan [7] proved this and for general t q , Goss [3, Prop. 9] got the same result for y in ( q -1) S v . This last result can also be derived from the results obtained by Thakur in [6, see corollary 8]. We drop these restrictions. Let q be a power of a prime p . Let n be any positive integer. If we can write n as a sum of positive integers n 0 + · · · + n d , so that when we consider n , . . . , n 0 d in their basep expansions, there is no carry over of coefficients when we perform the sum in basep , we express this by writing n = n 0 ⊕ · · · ⊕ n d . Of all such decompositions of n , choose those such that n d ≤ · · · ≤ n 0 . Having done so, we can order such decompositions of n by saying n 0 ⊕ · · · ⊕ n d ≤ m 0 ⊕ · · · ⊕ m d if for some i, n d = m ,.. . , n d i = m i , but n i -1 &lt; m i -1 , and will say that the minimal such decomposition is 'given by the greedy algorithm.' The next theorem is a slight generalization of Theorem 7 (iii) in [6], which is the special case z ≡ m mod ( q -1). Theorem 1 Let m be a positive integer and y = ( z, m ) ∈ Z / q ( deg v -1) Z × Z p . Let v be a prime of F q [ t ] of degree one. Then either v d ( y ) = min( m 1 + · · · + dm d ) , where m = m 0 ⊕ · · · ⊕ m d , ( q -1) divides m &gt; i 0 for 0 &lt; i &lt; d , and q -1 divides z -m d ; or v d ( k ) is infinite, if there is no such decomposition. When the decomposition exists, the minimum is uniquely given by the greedy algorithm. (If the least non-negative residue mod q -1 of z is r, m d is the least possible sum of p -powers chosen from the p -expansion of m which is r modulo q -1 .) Proof. For v = , we have t $$m$$ $$& \text{For } v = t, \, \text{we have} \\ S _ { d, v } ( y ) & = \sum _ { f _ { i } \in \mathbb { F } _ { q } } f _ { 0 } ^ { z } \left ( 1 + \frac { f _ { 1 } } { f _ { 0 } } t + \dots + \frac { f _ { d - 1 } } { f _ { 0 } } t ^ { d - 1 } + \frac { t ^ { d } } { f _ { 0 } } \right ) ^ { m } \\ & = \sum _ { \substack { f _ { i } \in \mathbb { F } _ { q } \\ f _ { 0 } \neq 0 } } f _ { 0 } ^ { z } \sum _ { \substack { m = m _ { 0 } + \dots + m _ { d } \\ m _ { i } \geq 0, i = 0, \dots, d } } \left ( \frac { m } { m _ { 0 }, \dots, m _ { d } } \right ) \left ( \frac { f _ { 1 } } { f _ { 0 } } \right ) ^ { m _ { 1 } } \cdots \left ( \frac { f _ { d - 1 } } { f _ { 0 } } \right ) ^ { m _ { d - 1 } } \left ( \frac { 1 } { f _ { 0 } } \right ) ^ { m _ { d } } t ^ { m _ { 1 } + \dots + d m _ { d } } \\ & = \sum _ { \substack { f _ { i } \in \mathbb { F } _ { q } \\ f _ { 0 } \neq 0 } } \sum _ { \substack { m = m _ { 0 } + \dots + m _ { d } \\ m _ { i } \geq 0, i = 0, \dots, d } } \left ( \frac { m } { m _ { 0 }, \dots, m _ { d } } \right ) ( f _ { 0 } ) ^ { z - m _ { d } } ( f _ { 1 } ) ^ { m _ { 1 } } \cdots ( f _ { d - 1 } ) ^ { m _ { d - 1 } } t ^ { m _ { 1 } + \dots + d m _ { d } }. \\ & \text{Now, by the theorem of Lucas } \, \left ( \frac { m _ { m _ { 0 }, \dots, m _ { d } } ^ { m } \right ) \, \text{is non-zero if and only if the sum}$$ glyph[negationslash] glyph[negationslash] glyph[negationslash] Now, by the theorem of Lucas ( m m ,...,m 0 d ) is non-zero if and only if the sum m = m 0 + · · · + m d is such that there is no carry over of digits base p . Changing the order of the summation and using the relation $$\sum _ { f \in \mathbb { F } _ { q } } f ^ { h } = \begin{cases} \begin{array} { c c } 0 & \text{if $(q-1) \nmid h$ or $h=0$} \\ - 1 & ( q - 1 ) \end{array} \end{cases}$$ we see that glyph[negationslash] $$S _ { d, v } ( y ) = \sum _ { \substack { f _ { i } \in \mathbb { F } _ { q } \\ f _ { 0 } \neq 0 \\ \stackrel { m = m _ { 0 } \oplus \cdots \oplus m _ { d } } { ( q - 1 ) | m _ { i } \geq 0, i = 1, \dots, d - 1 } } } \binom { m } { m _ { 0 }, \dots, m _ { d } } ( f _ { 0 } ) ^ { z - m _ { d } } ( f _ { 1 } ) ^ { m _ { 1 } } \cdots ( f _ { d - 1 } ) ^ { m _ { d - 1 } } t ^ { m _ { 1 } + \cdots + d m _ { d } }.$$ By Sheats [4], min( m 1 + · · · + dm d ), where m = m 0 ⊕··· ⊕ m d , ( q -1) divides m &gt; i 0 for 0 &lt; i &lt; d , and q -1 divides z -m d is unique. From this, it follows that v d ( y ) = min( m 1 + · · · + dm d ) is this unique minimum. glyph[square] Comment 1 We can go further in Theorem 1 . Not only choose m d that way, but also choose m d -1 to be the least possible sum of p -powers chosen from the expansion of m -m d which is 0 mod q -1 , and so on. In the case that q = p , a prime, we have the following special case of Theorem 1 (see ([6, Thm. 9])). Theorem 2 Let q = p be a prime, v a prime of F q [ t ] of degree one, y = ( z, m ) ∈ Z / q ( deg v -1) Z × Z p and m&gt; 0 an integer. Also, let r be the least nonnegative residue of z mod ( q -1) . Write m = ∑ glyph[lscript] i =1 p e i , with e i monotonically increasing and with not more than p -1 of the consecutive values being the same (i.e., consider the base p -digit expansion sequentially one digit at a time). Then v d ( y ) is infinite if glyph[lscript] &lt; p ( -1)( d -1) + r , and otherwise $$v _ { d } ( y ) = d \sum _ { i = 1 } ^ { r } p ^ { e _ { i } } + \sum _ { j = 1 } ^ { d - 1 } j \sum _ { i = 1 } ^ { p - 1 } p ^ { e _ { ( d - 1 - j ) ( p - 1 ) + r + i } }.$$ ## Proof. We have v d ( y ) = min( m 1 + · · · + dm d ), where m = m 0 + · · · + m d , when this sum has no carry over base p and q -1divides m &gt; u 0 for 0 &lt; u &lt; d and q -1 divides z -m d . Note that p u ≡ 1 mod ( q -1) when q is prime. Hence p -1 powers together give divisibility by q -1. Hence for the minimum we choose r digits for m d and m d -1 , · · · , m 1 are obtained by picking p -1 digits from the base p expansion of m -m d starting from the lowest digits (and dumping the rest of the expansion, if any, into m 0 ). glyph[square] With respect to the location of the zeros of the Goss v -adic zeta function and its multiplicity, when the degree of v is one, Wan [7] showed that for q = 2, the zeros are simple with corresponding x in F q (( )). t For general q , Goss [3, Prop. 9] got the same result for y in ( q -1) S v . This last result can also be derived from the results obtained by Thakur in [6, see corollary 8]. Here we prove the full Riemann hypothesis for the v -adic zeta function for v of degree one, that is, all the zeros of ζ v ( x, y ) are simple with x in F q (( )) inside t C t . For k &gt; 0, let glyph[lscript] ( k ) be the sum of the digits of the base q expansion of k . Now, it is easy to show that, if y = ( z, m ) ∈ Z / q ( deg v -1) Z × Z p , m &gt; 0 an integer, and d &gt; glyph[lscript] ( m ) q -1 +1, then S d,v ( y ) = 0 (see [5, Thm. 5 1 2]). . . So, ζ v ( s ) is a polynomial on x . The Newton polygon of this polynomial determines the v -adic valuation of its zeros. Namely, if the Newton polygon has a side of slope -m whose horizontal projection is of length l , then the polynomial has precisely l roots with valuation m . Furthermore, if $$\zeta _ { m } ( x ) = \prod _ { \substack { \zeta _ { v } ( \alpha ) = 0 \\ \text{val} _ { v } ( \alpha ) = m } } ( x - \alpha )$$ then ζ m ( x ) ∈ F q (( ))[ t x ]. Now, as in [1], we have Lemma 1 Let q = p n , n ≥ 1 . For v = t prime of F q [ t ] of degree one, and for y = ( z, m ) ∈ Z / q ( -1) Z × Z p with m ≥ 0 an integer , the zeros of ζ v ( s ) = ∑ ∞ d =0 S d,v ( y x ) d are simple with x in F q (( )) t . ## Proof. Let us assume that Goss t -adic zeta function is a polynomial of degree d , $$\zeta _ { v } ( s ) = 1 + S _ { 1, v } ( y ) x + \dots + S _ { d, v } ( y ) x ^ { d },$$ and recall that v d ( y ) := val v ( S d,v ( y )). Then, $$v _ { d } ( y ) = m _ { 1 } ( d ) + 2 m _ { 2 } ( d ) + \cdots + d m _ { d } ( d ),$$ with obvious notation. If r is the least non-negative residue of z modulo q -1, by Theorem 1 and Comment 1, m d d ( ) is the least possible sum of p -powers chosen from the p -expansion of m which is r modulo q -1. Next, m d -1 ( d ) is obtained as the least possible sum of p -powers chosen from the expansion of m -m d d ( ) which is 0 mod q -1, and so on. For q = p , a prime number, the greedy solution is achieved in a simpler way, by the previous Theorem 2: m d d ( ) = ∑ r s =1 p e s , m d -1 ( d ) = ∑ p -1 s =1 p e r + s , and so on. Therefore, for q a prime or power of a prime, the valuations v d ( y ) of the coefficients of Goss v -adic zeta functions are: $$v _ { d } ( y ) \ & = \ m _ { 1 } ( d ) + 2 m _ { 2 } ( d ) + \cdots + d m _ { d } ( d ) \\ v _ { d - 1 } ( y ) \ & = \ m _ { 1 } ( d - 1 ) + 2 m _ { 2 } ( d - 1 ) + \cdots + ( d - 1 ) m _ { d - 1 } ( d - 1 ) \\ \vdots \ & = \ \vdots \\ v _ { 1 } ( y ) \ & = \ m _ { 1 } ( 1 ) \\ v _ { 0 } ( y ) \ & = \ 0. \\ \vdots \quad. \cdots \. \cdots \. \cdots \.$$ Now, notice that by construction we have $$m _ { d - j } ( d ) = m _ { d - j - 1 } ( d - 1 ) \text{ for } j = 0, \cdots, d - 2.$$ Using this, straight manipulation allows us to calculate the slope λ d ( ) of the Newton polygon from ( d -1 , v d -1 ( y )) to ( d, v d ( y )) , $$\lambda ( d ) = v _ { d } ( y ) - v _ { d - 1 } ( y ) = m _ { 1 } ( d ) + m _ { 1 } ( d - 1 ) + m _ { 2 } ( d - 1 ) + \cdots + m _ { d - 1 } ( d - 1 ).$$ Finally, λ d ( ) is a strictly increasing function of d since $$\lambda ( d ) - \lambda ( d - 1 ) = m _ { 1 } ( d ) > 0$$ for d &gt; 1. For d = 1 , λ ( d ) -λ d ( -1) = m 1 (1), if we put λ (0) = 0, and in this case m 1 (1) could be zero if z is even, i.e., when z is congruent to 0 mod q -1, but that just states that first slope is zero. This implies that each slope of the Newton polygon has horizontal projection one and so the zeros of ζ v ( s ) are simple with x in F q (( )). t glyph[square] Theorem 3 (Riemann Hypothesis) Let q be any prime power. For the prime v = t of F q [ t ] , and for y = ( z, M ) ∈ Z / q ( -1) Z × Z p , the zeros of ζ v ( x, y ) are simple and have the x in K v = F q (( )) t inside C v . Proof. By the Lemma 1, we can assume that M ∈ Z p is not a non-negative integer. Thus we can choose sufficiently many appropriate p -adic digits to form a positive integer m&gt; 0, which has a decomposition as in Theorem 1 with positive m i 's for all i = 1 , · · · , d -1, so that the valuation stabilizes (exactly as in [1], [5, Sec. 5.8]), as it is independent of m 0 . We can form pairs y m = ( z, m , m &gt; ) 0 that converge to ( z, M ). Hence we can calculate the valuation as ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1111v1-figure-09be7d13-77f1-4a1c-a968-547ec45e64c1.jpg) Then the slope inequalities of the Lemma 1 imply the required result in general. glyph[square] ## Acknowledgement We are grateful to Dinesh Thakur for having suggested us this project. We also thank the referee for the thoughtful comments and suggestions. ## References - [1] J. Diaz-Vargas, Riemann hypothesis for F q [ t ], J. Number Theory 59 (1996) 313 , -318. - [2] D. Goss, Basic Structures of Function Field Arithmetic , Springer-Verlag 1998. - [3] D. Goss, A Riemann hypothesis for characteristic p L -functions, J. Number Theory, 82 (2000) 299 , -322. - [4] J. Sheats, The Riemann hypothesis for the Goss zeta function for F q [ t ], J. Number Theory 71 (1998) 121 , -157. - [5] D. Thakur, Function Field Arithmetic , World Scientific, 2004. - [6] D. Thakur, Valuations of v -adic power sums and zero distribution for the Goss v -adic zeta function for F q [ t ], J. Integer Seq. , 16 (2013), pp. 1-18. Article 13 2 13. . . - [7] D. Wan, On the Riemann hypothesis for the characteristic p zeta function, J. Number Theory, 58 (1996) 196 , -212.
null
[ "Javier Diaz-Vargas", "Enrique Polanco-Chi" ]
2014-08-05T20:48:02+00:00
2014-08-05T20:48:02+00:00
[ "math.NT", "11M38" ]
Riemann Hypothesis for Goss $t$-adic Zeta Function
In this short note, we give a proof of the Riemann hypothesis for Goss $v$-adic zeta function $\zeta_{v}(s)$, when $v$ is a prime of $\mathbb{F}_{q}[t]$ of degree one.
1408.1112v1
## Convection in Cool Stars, as Seen Through Kepler 's Eyes Fabienne A. Bastien 1 2 , 1 Vanderbilt University, 1807 Station B, Nashville, TN 37235, USA 2 Current Affiliation: Hubble Fellow, Pennsylvania State University, 525 Davey Lab, University Park, PA 16803, USA Abstract. Stellar surface processes represent a fundamental limit to the detection of extrasolar planets with the currently most heavily-used techniques. As such, considerable effort has gone into trying to mitigate the impact of these processes on planet detection, with most studies focusing on magnetic spots. Meanwhile, high-precision photometric planet surveys like CoRoT and Kepler have unveiled a wide variety of stellar variability at previously inaccessible levels. We demonstrate that these newly revealed variations are not solely magnetically driven but also trace surface convection through light curve 'flicker.' We show that 'flicker' not only yields a simple measurement of surface gravity with a precision of ∼ 0.1 dex, but it may also improve our knowledge of planet properties, enhance radial velocity planet detection and discovery, and provide new insights into stellar evolution. ## 1. Introduction Most planets are observed only indirectly, through their influence on their host star. The planet properties we infer therefore strongly depend on how well we know those of the stars. Our ability to determine the surface gravity (log g ) of field stars, however, is notoriously limited: broadband photometry, while efficient, yields errors of ∼ 0.5 dex; spectroscopy suffers from well known degeneracies between log g , T eff and metallicity (Torres et al., 2010) while having log g errors of 0.1-0.2 dex (Ghezzi et al., 2010); and asteroseismology, the gold standard for stellar parameter estimation with log g errors of ∼ 0.01 dex (Chaplin et al., 2011, 2014), is time and resource intensive and, particularly for dwarfs, is limited to the brightest stars. Meanwhile, high precision photometric surveys like CoRoT and Kepler have surveyed over ∼ 200 000 Sun-like stars in their hunt for exoplanets, revealing stellar variations that have previously only been robustly observed in the Sun and a handful of bright Sun-like stars - and also variations that were previously unknown but, as we show, encode a simple measure of stellar log g . In what follows, I describe our analysis of the newly unveiled high frequency photometric variations, which we term 'flicker' (or F 8 ) and which enable us to measure log g with an accuracy of ∼ 0.1 dex. I summarize our work thus far in using F 8 to study granulation in Sun-like stars, to examine the impact of granulation in radial velocity planet detection, and to improve size estimates of transiting exoplanets. Figure 1.: Stellar surface gravity manifests in a simple measure of brightness variations. Asteroseismically determined log g shows a tight correlation with F 8 . Color represents the amplitude of the stars' brightness variations; outliers tend to have large brightness variations. Excluding these outliers, a cubic-polynomial fit through the Kepler stars and through the Sun (large star symbol) shows a median absolute deviation of 0.06 dex and a r.m.s. deviation of 0.10 dex. To simulate how the solar log g would appear in data we use to measure log g for other stars, we divide the solar data into 90-d 'quarters'. Our F 8 -log g relation measured over multiple quarters then yields a median solar log g of 4.442 with a median absolute deviation of 0.005 dex and a r.m.s. error of 0.009 dex (the true solar log g is 4.438). From Bastien et al. (2013). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1112v1-figure-514981eb-e5c2-4e4d-9f7a-f01091438542.jpg) ## 2. Photometric 'Flicker:' a Tracer of Granulation and a Simple Measure of Stellar Surface Gravity Using light curves from NASA's Kepler mission, we discovered that stellar log g reveals itself through F 8 a measure of photometric variations on timescales of &lt; 8hr - and may hence be used to measure log g with errors of ∼ 0.1 dex, even for stars too faint for asteroseismology (Bastien et al., 2013, Fig. 1). The measurement of log g from F 8 only requires the discovery light curves, and this measurement not only yields a result with an accuracy that rivals spectroscopy, it also does so very quickly and efficiently, requiring only a simple routine that can be executed by anyone in just a few seconds per star. In Bastien et al. (2013), we ascribed F 8 to granulation power, which is known to depend on the stellar log g (Kjeldsen &amp; Bedding, 2011; Mathur et al., 2011). Recent independent simulations and asteroseismic studies have examined the expected photometric manifestations of granulation (Samadi et al., 2013a,b; Mathur et al., 2011), nominally through the Fourier spectrum from which it can be difficult to extract the granulation signal. We used the simulations to predict the granulation-driven F 8 , and we find excellent agreement with our observed F 8 , demonstrating that the F 8 is indeed granulation-driven (Cranmer et al., 2014). We also determined an empirical correction to the granulation models, particu- Figure 2.: Distributions of log g for the TRILEGAL simulated sample (black) and KOI host stars with F 8 -based log g (red) and broadband photometry/spectroscopy-based log g ('NEA'; cyan curve). We limit the T eff range here to 4700-6500 K, for which the Kepler targets should be representative of the field. Vertical lines indicate the range of log g corresponding to subgiants. We find that F 8 reproduces the expected underlying distribution, and, in particular, recovers the expected population of subgiants, while the NEA parameters are preferentially pushed towards the main sequence. Adapted from Bastien et al. (2014b). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1112v1-figure-dba0d83d-a00d-4f30-918c-442ab5735327.jpg) larly for F stars which have the shallowest convective outer layers. Indeed, our results suggest that these models must include the effects of the magnetic suppression of convection in F stars in order to reproduce the observations. This work can ultimately help to develop our technique of granulation asteroseismology, enabling the precise determination of a larger number of stellar, and hence planetary, parameters. ## 3. Stellar 'Flicker' Suggests Larger Radii for Bright Kepler Planet Host Stars The speed and efficiency with which one can determine accurate log g solely with the discovery light curves translates directly into a rapid assessment of the distribution of bulk planet properties - in particular, with greater accuracy and fewer telescopic and computational resources than similar studies (Batalha et al., 2013; Burke et al., 2014) that of necessity relied on broadband photometric measurements to determine stellar properties. We therefore applied our F 8 technique to a few hundred bright ( Kepler magnitudes between 8 and 13) planet candidates in the Kepler field, and we find that these stars are significantly more evolved than previous studies suggest (Bastien et al., 2014b). As a result, the planet radii are 20-30% larger than previously estimated. In addition, we find that the high proportion of subgiants we derive (48%) is consistent with predictions from galactic models of the underlying stellar population (45%), whereas previous analyses heavily bias stellar parameters towards the main sequence and hence yield a low subgiant fraction (27%; Figs. 2,3). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1112v1-figure-65a774ec-578d-47ce-9fda-64437c0e0545.jpg) eff Figure 3.: H-R diagram of KOI host stars with log g derived from F 8 (middle) and broadband photometry/spectroscopy (bottom), and as predicted by a TRILEGAL (Girardi et al., 2005) simulation (top). Colored curves represent the theoretical evolutionary tracks (masses labeled in M /circledot ). Vertical lines demarcate the range of stellar T eff considered in this study. The horizontal lines demarcate the range of log g for subgiants (3.5 &lt; log g &lt; 4.1). A representative error bar on log g for each stellar sample is in the upper right of each panel. We find that the F 8 -based log g distribution more closely matches expectation than previous log g measurements, particularly in the subgiant domain, perhaps because F 8 involves no main-sequence prior on the F 8 -based log g values. From Bastien et al. (2014b). We expand upon this work by tailoring our initial F 8 relation to be more directly useful to the exoplanet community by deriving a relationship between F 8 and stellar density (Kipping et al., 2014). This relation, which can yield the stellar density with an uncertainty of ∼ 30%, can help to constrain exoplanet eccentricities and enable the application of techniques like astrodensity profiling to hundreds of exoplanet host stars in the Kepler field alone. ## 4. RV Jitter in Magnetically Inactive Stars is Linked to High Frequency 'Flicker' in Light Curves RV planet detection, particularly of small planets, requires precise Doppler measurements, and only a few instruments are able to achieve the precision needed to observe them. Key to the success of RV planet campaigns is the avoidance of 'RV loud' stars - those likely to exhibit large levels of RV jitter that can impede and sometimes even mimic planetary signals (Queloz et al., 2001). Most RV surveys therefore focus their attention on magnetically quiet stars, as magnetic spots tend to drive the largest amount of RV jitter. Nonetheless, magnetically inactive stars can exhibit unexpectedly high levels of RV jitter (Wright, 2005; Galland et al., 2005), and even low jitter levels can impede the detection of small planets. The drivers of RV jitter in inactive stars remain elusive (Dumusque et al., 2011a,b; Boisse et al., 2012), continuing to plague RV planet detection and, in the case of F dwarfs, resulting in the outright avoidance of whole groups of notoriously RV noisy stars, even in transit surveys with large ground-based follow-up efforts like Kepler (Brown et al., 2011). Given the breadth of stellar photometric behavior newly revealed by ultrahigh precision light curves, and the new insights that they are giving into stellar surface processes, we compared different ways of characterizing this photometric behavior with RV jitter for all stars with both ultra-high precision light curves and high precision, long term RV monitoring (Bastien et al., 2014a). These stars have very low photometric amplitudes (less than 3 ppt), a previously unexplored regime of both photometric variability and RV jitter. We find that the RV jitter of these stars, ranging from 3 m s -1 to 135 m s -1 , manifests in the light curve Fourier spectrum, which we then use to develop an empirical predictor of RV jitter. We also find that spot models grossly under-predict the observed jitter by factors of 2-1000. Finally, we demonstrate that F 8 itself is a remarkably clean predictor of RV jitter in magnetically quiet stars (Fig. 4), suggesting that the observed jitter is driven by convective motions on the stellar surface and is strongly tied to log g . ## 5. Summary We find that surface convection in cool stars manifests as the high frequency 'flicker' observed in high precision, long time-baseline light curves, such as those from Kepler . We show that it yields a simple measure of stellar surface gravity and density, and we use it to place empirical constraints on granulation models. We use it to perform an ensemble analysis of exoplanet host stars, finding that the exoplanet radii are larger than previous studies suggested. Finally, we find that it is a clean predictor of RV jitter in magnetically inactive stars and can Figure 4.: Comparison between RV jitter (RV RMS) and F 8 -based log g : RV jitter shows a strong anti-correlation with F 8 -based log g , with a statistical confidence of 97% derived from a survival analysis. A similar trend was found by Wright (2005). F 8 measures granulation power (Bastien et al., 2013), indicating that the RV jitter of magnetically inactive stars is driven by convective motions on the stellar surface whose strength increases as stars evolve. Adapted from Bastien et al. (2014a). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1112v1-figure-731000c9-9e2c-4e39-9011-13d4282b82f9.jpg) hence be used to identify promising targets for RV follow-up campaigns and RV planet searches. More generally, we show that stellar variability - traditionally considered a major noise source and nuisance, particularly in exoplanet detection - can be used to enhance both exoplanet science and our understanding of stellar evolution. Acknowledgements. I thank the Cool Stars 18 SOC for a great conference and for kindly inviting me to share my work. I would like to acknowledge funding support from a NASA Harriet Jenkins Pre-Doctoral Fellowship and helpful discussions with all those who have contributed to the results discussed here. ## References Bastien, F. A., Stassun, K. G., Basri, G., &amp; Pepper, J. 2013, Nature , 500, 427 Bastien, F. A., Stassun, K. G., Pepper, J., et al. 2014, AJ, 147, 29 Bastien, F. A., Stassun, K. G., &amp; Pepper, J. 2014, ApJ, 788, L9 Batalha, N. M., Rowe, J. F., Bryson, S. T., et al. 2013, ApJS, 204, 24 Boisse, I., Bonfils, X., &amp; Santos, N. C. 2012, A&amp;A, 545, A109 Brown, T. M., Latham, D. W., Everett, M. E., &amp; Esquerdo, G. A. 2011, AJ, 142, 112 Burke, C. J., Bryson, S. T., Mullally, F., et al. 2014, ApJS, 210, 19 Cegla, H. M., Stassun, K. G., Watson, C. A., Bastien, F. A., &amp; Pepper, J. 2014, ApJ, 780, 104 Chaplin, W. J., Kjeldsen, H., Christensen-Dalsgaard, J., et al. 2011, Science, 332, 213 Chaplin, W. J., Basu, S., Huber, D., et al. 2014, ApJS, 210, 1 Cranmer, S. R., Bastien, F. A., Stassun, K. G., &amp; Saar, S. H. 2014, ApJ, 781, 124 Dressing, C. D., &amp; Charbonneau, D. 2013, ApJ, 767, 95 Dumusque, X., Udry, S., Lovis, C., Santos, N. C., &amp; Monteiro, M. J. P. F. G. 2011, A&amp;A, 525, A140 Dumusque, X., Santos, N. C., Udry, S., Lovis, C., &amp; Bonfils, X. 2011, A&amp;A, 527, A82 Galland, F., Lagrange, A.-M., Udry, S., et al. 2005, A&amp;A, 443, 337 Ghezzi, L., Cunha, K., Smith, V. V., et al. 2010, ApJ, 720, 1290 Girardi, L., Groenewegen, M. A. T., Hatziminaoglou, E., &amp; da Costa, L. 2005, A&amp;A, 436, 895 Kipping, D. M., Bastien, F. A., Stassun, K. G., et al. 2014, ApJ, 785, L32 Kjeldsen, H., &amp; Bedding, T. R. 2011, A&amp;A, 529, L8 Mathur, S., Hekker, S., Trampedach, R., et al. 2011, ApJ, 741, 119 Petigura, E. A., Marcy, G. W., &amp; Howard, A. W. 2013, ApJ, 770, 69 Queloz, D., Henry, G. W., Sivan, J. P., et al. 2001, A&amp;A, 379, 279 Samadi, R., Belkacem, K., &amp; Ludwig, H.-G. 2013, A&amp;A, 559, A39 Samadi, R., Belkacem, K., Ludwig, H.-G., et al. 2013, A&amp;A, 559, A40 Torres, G., Andersen, J., &amp; Gim´nez, A. 2010, A&amp;A Rev., 18, 67 e Wright, J. T. 2005, PASP, 117, 657
null
[ "Fabienne A. Bastien" ]
2014-08-05T21:05:40+00:00
2014-08-05T21:05:40+00:00
[ "astro-ph.SR" ]
Convection in Cool Stars, as Seen Through Kepler's Eyes
Stellar surface processes represent a fundamental limit to the detection of extrasolar planets with the currently most heavily-used techniques. As such, considerable effort has gone into trying to mitigate the impact of these processes on planet detection, with most studies focusing on magnetic spots. Meanwhile, high-precision photometric planet surveys like CoRoT and Kepler have unveiled a wide variety of stellar variability at previously inaccessible levels. We demonstrate that these newly revealed variations are not solely magnetically driven but also trace surface convection through light curve "flicker." We show that "flicker" not only yields a simple measurement of surface gravity with a precision of ~0.1 dex, but it may also improve our knowledge of planet properties, enhance radial velocity planet detection and discovery, and provide new insights into stellar evolution.
1408.1113v2
## Homogeneous open quantum random Walks on a lattice Raffaella Carbone Dipartimento di Matematica dell'Universit´ di Pavia a via Ferrata, 1, 27100 Pavia, Italy [email protected] Yan Pautrat Laboratoire de Math´ ematiques Universit´ Paris-Sud e 91405 Orsay Cedex, France [email protected] October 22, 2014 Abstract. We study open quantum random walks (OQRW) for which the underlying graph is a lattice, and the generators of the walk are translationinvariant. Using the results obtained recently in [5], we study the quantum trajectory associated with the OQRW, which is described by a position process and a state process. We obtain a central limit theorem and a large deviation principle for the position process. We study in detail the case of homogeneous OQRWs on a lattice, with internal space h = C 2 . ## 1 Introduction Open quantum random walks (OQRW in short) were defined by Attal et al. in [2]. They seem to be a good quantum analogue of Markov chains, and, as such, are a very promising tool to model many physical problems (see [5] and the references therein). In the paper [5], we described the notions of irreducibility and aperiodicity for OQRWs, and derived, in particular, convergence properties for irreducible, or irreducible and aperiodic, OQRWs. In the same way as for classical Markov chains, those convergence results assumed the existence of an invariant state. In the present paper we focus on translation-invariant OQRWs on a lattice, which attracted special attention in many recent papers (see, for instance, [1, 3, 17, 20, 24, 26]). As we have shown in [5], these OQRWs do not have an invariant state so that most of the convergence results from [5] are useless. We will show, however, that there exists an auxiliary map which allows to characterize many properties of the homogeneous open quantum random walk. With the help of the Perron-Frobenius theorem described in [5], we can obtain results about the quantum trajectory associated with the process. More precisely, if the quantum trajectory is given by the position and state couple ( X ,ρ p p ), we obtain a central limit theorem and a large deviation principle for the position process ( X p ) p . The immediate physical application of our results is quantum measurements, or more precisely, repeated indirect measurements. In that framework, a given system S interacts sequentially with external systems R p , p = 1 2 , , . . . representing measuring devices, and after each interaction, a measurement is done on R p . Then the above sequence ( X p ) p represents the sequence of measurement outcomes, and the sequence ( ρ p ) p represents the state of the physical system S after the first p measurements (we refer the reader to section 6 of [1])). Our results immediately give a law of large numbers, a central limit theorem and a large deviation principle for the statistics of the measurements ( X p ) p . We will pay specific attention to the application of our results to the case where the internal state space of the particle (what is sometimes called the coin space ) is two-dimensional. This will allow us to illustrate the full structure of homogeneous OQRWs, and in particular the notions of irreducibility, period, as well as the Baumgartner-Narnhofer ([4]) decompositions discussed previously in [5]. Of the above cited articles, some give a central limit theorem for the position ( X p ) p associated with an OQRW on Z d . The most general result so far is given in [1], and its proof is based on a central limit theorem for martingales and the K¨mmerer-Maassen ergodic theorem (see [19]). u Our proof is based on a completely different strategy, using a computation of the Laplace transform, and uses an irreducibility assumption which does not appear in existing central limit results. We will show, however, that the irreducibility assumption can be dropped in some situations, and that our central limit theorem contains the result of [1], but yields more general formulas. In addition, we can prove a large deviation principle for the position process ( X p ) p associated with an homogeneous OQRW on a lattice. The technique we used, based on the application of the Perron-Frobenius theorem to a suitable deformed positive map, goes back (to the best of our knowledge) to [13]. None of the articles cited above proves a large deviation principle. As we were completing this paper, however, we learnt of the recent article [25], which proves a similar result. We comment on this in section 5. The structure of the present paper is the following: in section 2 we recall the main definitions of open quantum random walks specialized to the case where the underlying graph is a lattice in R d , and define the auxiliary map of an open quantum random walk. In section 3 we recall standard results about irreducibility and period of completely positive maps. In section 4 we characterize irreducibility and period of the open quantum random walk and its auxiliary map. In section 5 we state our main results: the central limit theorem and the large deviation principle. In section 6 we specialize to the situation where the underlying graph is Z d and the internal state space is C 2 , and characterize each situation in terms of the transition operators. In section 7 we study explicit examples, and compare our theoretical results to simulations. ## 2 Homogeneous open quantum random walks In this section we recall basic results and notations about open quantum random walks. We essentially follow the notation of [5], but specialize to the homoge- neous case. For a more detailed exposition we refer the reader to [2]. glyph[negationslash] We consider a Hilbert space h and a locally finite lattice V ⊂ R d , which we assume contains 0, and is positively generated by a set S = { 0 } , in the sense that any v in V can be written as s 1 + . . . + s n with s , . . . , s 1 n ∈ S . In particular, V is an infinite subgroup of R d . The canonical example is V = Z d , with S = {± v , . . . , 1 ± v d } where ( v , . . . , v 1 d ) is the canonical basis of R d . We denote by H the Hilbert space H = h ⊗ C V . We view H as describing the degrees of freedom of a particle constrained to move on V : the ' V -component' describes the spatial degrees of freedom (the position of the particle) while h describes the internal degrees of freedom of the particle. According to quantum mechanical canon, we describe the state of the system as a positive, trace-class operator ρ on H with trace one. Precisely, such an operator will be called a state. We consider a map on the space I 1 ( H ) of trace-class operators, given by ↦ $$\mathfrak { M } \, \colon \rho \mapsto \sum _ { j \in V } \sum _ { s \in S } \left ( L _ { s } \otimes | j + s \rangle \langle j | \right ) \, \rho \left ( L _ { s } ^ { * } \otimes | j \rangle \langle j + s | \right ) \, \quad \ \ ( 2. 1 )$$ where the L s , s ∈ S , are operators acting on h satisfying $$\sum _ { s \in S } L _ { s } ^ { * } L _ { s } = \text{Id}.$$ The L s are thought of as encoding both the probability of a transition by the vector s , and the effect of that transition on the internal degrees of freedom. Equation (2.2) therefore encodes the 'stochasticity' of the transitions. Remark 2.1 . The map M defined above is a special case of a quantum Markov chain, as introduced by Gudder in [12]. See Section 8 of [5] for more comments. We associate with the OQRW M the auxiliary map L on the space I 1 ( h ) of trace-class operators on h defined by ↦ $$\mathfrak { L } \colon \rho \mapsto \sum _ { s \in S } L _ { s } \, \rho \, L _ { s } ^ { * }.$$ Both (2.1) and (2.3) define trace-preserving (TP) maps, which are completely positive (CP), i.e. for any n in N ∗ , the extensions M ⊗ Id and L ⊗ Id to I 1 ( H ⊗ B ) ( C n ) and I 1 ( h ) ⊗ B ( C n ), respectively, are positive. In particular, such a map transforms states (understood here as positive elements of I 1 ( H ) with trace one) into states. A completely-positive, trace-preserving map will be called a CP-TP map. We will call a map M , as defined by (2.1), an open quantum random walk, or OQRW; and we will call L the auxiliary map of M . To be more precise, we should call such an M an homogeneous OQRW, but will drop the adjective homogeneous in the rest of this paper. Let us recall that the topological dual I 1 ( H ) ∗ can be identified with B H ( ) through the duality ↦ $$( \rho, X ) \mapsto \text{Tr} ( \rho \, X ).$$ Remark 2.2 . When Φ = M or Φ = L , the adjoint Φ ∗ is a positive, unital ( i.e. Φ (Id) ∗ = Id) map on B H ( ) (respectively B ( h )), and by the Russo-Dye theorem ([22]) one has ‖ Φ ∗ ‖ = ‖ Φ (Id) ∗ ‖ where the latter is the operator norm on B H ( ) (respectively B H ( )). This implies that trace-preserving positive maps have norm one, and in particular ‖ M ‖ = 1 and ‖ L ‖ = 1. glyph[negationslash] Remark 2.3 . As noted in [2], classical Markov chains can be written as open quantum random walks. In the present case, if we have a subgroup V of R d generated by a set S , and a Markov chain on V with translation-invariant transition matrix P = ( p i,j ) i,j ∈ V induced by the law ( p s ) s ∈ S on S , in the sense that p i,j = 0 if j -i ∈ S and p i,j = p j -i otherwise, then taking h = C and L s = √ p s induces the Markov chain with transition matrix P . This OQRW is called the minimal dilation of the Markov chain (see [5] for a discussion of minimal and non-minimal dilations). Note that in this case the reduced map L is trivial: L = 1. A crucial remark is that, for any initial state ρ on H , which is therefore of the form $$\rho = \sum _ { i, j \in V } \rho ( i, j ) \otimes | i \rangle \langle j |,$$ the evolved state M ( ρ ) is of the form $$\mathfrak { M } ( \rho ) = \sum _ { i \in V } \mathfrak { M } ( \rho, i ) \otimes | i \rangle \langle i |, \text{ where } \mathfrak { M } ( \rho, i ) = \sum _ { s \in S } L _ { s } \, \rho ( i - s, i - s ) \, L _ { s } ^ { * }. \text{ } ( 2. 4 )$$ glyph[negationslash] Each M ( ρ, i ) is a positive, trace-class operator on h and ∑ i ∈ V Tr M ( ρ, i ) = 1. We notice that off-diagonal terms ρ i, j ( ), for i = j , do not appear in M ( ρ ), and M ( ρ ) itself is diagonal. For this reason, from now on, we will only consider states of the form ρ = ∑ i ∈ V ρ i ( ) ⊗| 〉〈 | i i . Equation (2.4) remains valid, replacing ρ i, i ( ) by ρ i ( ). We now describe the (classical) processes of interest associated with M . We begin with an informal discussion of these processes and their laws, and will only define the underlying probability space at the end of this section. We start from a state of the form ρ = ∑ i ∈ V ρ i ( ) ⊗| 〉〈 | i i . We evolve ρ for a time p , obtaining the state M p ( ρ ) which, according to the previous discussion, is of the form $$\mathfrak { M } ^ { p } ( \rho ) = \sum _ { i \in V } \mathfrak { M } ^ { p } ( \rho, i ) \otimes | i \rangle \langle i |.$$ We then make a measurement of the position observable. According to standard rules of quantum measurement, we obtain the result i ∈ V with probability Tr M p ( ρ, i ). Therefore, the result of this measurement is a random variable Q p , with law P ( Q p = i ) = Tr M p ( ρ, i ) for i ∈ V . In addition, if the position Q p = i ∈ V is observed, then the state is transformed to M p ( ρ,i ) Tr M p ( ρ,i ) . This process ( Q , p M p ( ρ,Q p ) Tr M p ( ρ,Q p ) ) we call the process 'without measurement', to emphasize the fact that virtually only one measurement is done, at time p . Notice that, in practice, two values of this process at times p &lt; p ′ cannot be considered simultaneously as the measure at time p perturbs the system, and therefore subsequent measurements. Now assume that we make a measurement at every time p ∈ N , applying the evolution by M between two measurements. Again assume that we start from a state ρ of the form ∑ i ∈ V ρ i ( ) ⊗ | 〉〈 | i i . Suppose that at time p , the position was measured at X p = j and the state (after the measurement) is ρ p ⊗| 〉〈 | j j . Then, after the evolution, the state becomes $$\mathfrak { M } ( \rho _ { p } \otimes | j \rangle \langle j | ) = \sum _ { s \in S } L _ { s } \, \rho _ { p } \, L _ { s } ^ { * } \otimes | j + s \rangle \langle j + s |,$$ so that a measurement at time p +1 gives a position X p +1 = + with probability j s Tr L ρ s p L ∗ s , and then the state becomes ρ p +1 ⊗ | j + s 〉〈 j + s | with ρ p +1 = L ρ s p L ∗ s Tr L ρ s p L ∗ s . The sequence of random variables ( X ,ρ p p ) is therefore a Markov process with transitions defined by $$\mathbb { P } \Big ( ( X _ { p + 1 }, \rho _ { p + 1 } ) = ( j + s, \frac { L _ { s } \, \sigma \, L _ { s } ^ { * } } { \text{Tr} ( L _ { s } \sigma L _ { s } ^ { * } ) } ) \Big | ( X _ { p }, \rho _ { p } ) = ( j, \sigma ) \Big ) = \text{Tr} ( L _ { s } \, \sigma \, L _ { s } ^ { * } ), \ ( 2. 5 )$$ for any j ∈ V , s ∈ S and σ ∈ I 1 ( h ) and initial law P ( ( X ,ρ 0 0 ) = ( i, ρ i ( ) Tr ρ i ( ) ) ) = Tr ρ i . ( ) Note that the sequence X 0 = i 0 , . . . , X p = i p is observed with probability $$\mathbb { P } ( X _ { 0 } = i _ { 0 }, \dots, X _ { p } = i _ { p } ) = \text{Tr} \left ( L _ { s _ { p } } \dots L _ { s _ { 1 } } L _ { i _ { 0 } } \, \rho ( i _ { 0 } ) \, L _ { i _ { 0 } } ^ { * } L _ { s _ { 1 } } ^ { * } \dots L _ { s _ { p } } ^ { * } \right ) \quad ( 2. 6 )$$ if i 1 -i 0 = s 1 ,. . . i p -i p -1 = s p belong to S , and zero otherwise. In addition, this sequence completely determines the state ρ p : $$\rho _ { p } = \frac { L _ { s _ { p } } \dots L _ { s _ { 1 } } \, \rho ( i _ { 0 } ) \, L _ { s _ { 1 } } ^ { * } \dots L _ { s _ { p } } ^ { * } } { \text{Tr} \, L _ { s _ { p } } \dots L _ { s _ { 0 } } \, \rho ( i _ { 0 } ) \, L _ { s _ { 0 } } ^ { * } \dots L _ { s _ { p } } ^ { * } }.$$ As emphasized in [2], this implies that, for every p , the laws of X p and Q p are the same, i.e. $$\mathbb { P } ( X _ { p } = i ) = \mathbb { P } ( Q _ { p } = i ) \ \forall i \in V.$$ We now construct a probability space to carry the processes just described. Fixing an open quantum random walk M on V defined by operators ( L s ) s ∈ S we define the set Ω = V N , equipped with the σ -field generated by cylinder sets. An element of Ω is denoted by ω = ( ω k ) k ∈ N and we denote by ( X p ) p ∈ N the coordinate maps. For any state ρ on H of the form ρ = ∑ i ∈ V ρ i ( ) ⊗| 〉〈 | i i , we define a probability P ( p ) ρ on V p +1 by formula (2.6). One easily shows, using the stochasticity property (2.2), that the family ( P ( p ) ρ ) p is consistent, and can therefore be extended uniquely to a probability P ρ on Ω. We denote by ρ p the random variable $$\rho _ { p } = \frac { L _ { X _ { p } - X _ { p - 1 } } \dots L _ { X _ { 1 } - X _ { 0 } } \, \rho ( X _ { 0 } ) \, L _ { X _ { 1 } - X _ { 0 } } ^ { * } \dots L _ { X _ { p } - X _ { p - 1 } } ^ { * } } { \text{Tr} ( L _ { X _ { p } - X _ { p - 1 } } \dots L _ { X _ { 1 } - X _ { 0 } } \, \rho ( X _ { 0 } ) \, L _ { X _ { 1 } - X _ { 0 } } ^ { * } \dots L _ { X _ { p } - X _ { p - 1 } } ^ { * } ) }.$$ glyph[negationslash] We will also denote Q p = X p , but will only use the notation Q p when we consider 'non-measurement' experiments, and in particular will never consider an event implying simultaneously outcomes Q p and Q p ′ for p = p ′ . These processes reproduce the behaviour of the measurement outcomes and of the associated resulting states. In particular, equation (2.5) above holds in a mathematical sense with P ρ replacing P . From now on, we will usually drop the ρ in P ρ . ## 3 Irreducibility and period: general results In this section we focus on the general notions of irreducibility and period for a completely positive (CP) map Φ on I 1 ( K ), where K is a separable Hilbert space which, in practice, will be either h or H . We assume Φ is given in the form $$\Phi ( \rho ) = \sum _ { \kappa \in K } A _ { \kappa } \rho A _ { \kappa } ^ { * }$$ where K is a countable set, and the series ∑ κ ∈ K A A ∗ κ κ is strongly convergent. This is the case for operators such as M or L and we actually know from the Kraus theorem that this is the case for any completely positive Φ, see [18] or [21], where this is called the operator-sum representation. We recall that such a map is automatically bounded as a linear map on I 1 ( K ) (see e.g. Lemma 2.2 in [23]), so that it is also weak-continuous. In most practical cases, we will additionally assume that ‖ Φ ‖ = 1; this will be the case, in particular, if Φ is trace-preserving. We give various equivalent definitions of the notion of irreducibility for Φ which was originally defined by Davies in [6]. Note that this original definition holds for Φ positive, but for simplicity, we discuss it only for maps Φ which are completely positive (CP), and therefore have a Kraus decomposition (3.1). The equivalence between the different definitions, as well as the relevant references, are discussed in [5]. We recall some standard notations: an operator X on K is called positive, denoted X ≥ 0, if, for φ ∈ K , one has 〈 φ, X φ 〉 ≥ 0. It is called strictly positive, denoted X &gt; 0, if, for φ ∈ K \ { 0 , one has } 〈 φ, X φ 〉 &gt; 0. Definition 3.1. The CP map Φ is called irreducible if one of the following equivalent conditions hold: - · the only orthogonal projections P reducing Φ , i.e. such that Φ ( P I 1 ( K ) P ) ⊂ P I 1 ( K ) P , are P = 0 and Id , glyph[negationslash] - · for any ρ ≥ 0 , ρ = 0 in I 1 ( K ) , there exists t such that e t Φ ( ρ ) &gt; 0 , - · for any non-zero φ ∈ K , the set C [ A φ ] is dense in K , where C [ A ] is the set of polynomials in A , κ κ ∈ K , - · the only subspaces of K that are invariant by all operators A κ are { 0 } and K . Remark 3.2 . Note also that the notion of irreducibility is strongly related to the notion of subharmonic projection, again see [5]. We will also need on occasion the notion of regularity, which is evidently stronger than irreducibility: Definition 3.3. The CP map Φ is called N -regular if one of the equivalent conditions hold: glyph[negationslash] - · for any ρ ≥ 0 , ρ = 0 in I 1 ( K ) , one has Φ N ( ρ ) &gt; 0 , - · for any non-zero φ ∈ K , the set { A κ 1 . . . A κ N φ | κ , . . . , κ 1 N ∈ K } is total in K . The map Φ is called regular if it is N -regular for some N in N ∗ . Remark 3.4 . The following properties are quite immediate: - · If Φ is irreducible, then ∨ κ ∈ K Ran A κ = K (while the converse is not true). - · If ∨ κ ∈ K Ran A κ = K and σ is a faithful state, then Φ( σ ) is faithful. Indeed, we can write σ = ∑ j σ j | u j 〉〈 u j | , with σ j &gt; 0 and ( u j ) j an orthonormal basis for K . Then Φ( σ ) = ∑ j,κ σ j | A u κ j 〉〈 A u κ j | , and the conclusion easily follows. - · If ∨ κ ∈ K Ran A κ = K and Φ in N -regular, N ≥ 1, then Φ is ( N + )-regular n for any n ≥ 0. This is an immediate consequence of the previous point. The following proposition, which is a Perron-Frobenius theorem for positive maps on I 1 ( K ), essentially comes from [9] (for the finite dimensional case) and [23] (for the infinite dimensional case). To state it in sufficient generality, we need to recall the definition of the spectral radius of a map Φ: $$r ( \Phi ) = \sup \{ | \lambda |, \, \lambda \in S p \, \Phi \}$$ where Sp Φ is the spectrum of Φ. Proposition 3.5. Assume a CP map Φ on I 1 ( K ) has an eigenvalue λ of modulus r (Φ) , with eigenvector ρ , and either dim K &lt; ∞ or r (Φ) = ‖ Φ ‖ . Then: - · | λ | is also an eigenvalue, with eigenvector | ρ | , - · if Φ is irreducible, then dimKer(Φ -λ Id) = 1 . In particular, if Φ is irreducible and has an eigenvalue of modulus r (Φ) , then r (Φ) is an eigenvalue with geometric multiplicity one, with an eigenvector that is a strictly positive operator. Remark 3.6 . When Φ is a completely positive, trace-preserving map, one has ‖ Φ ‖ = 1, so that the conclusion applies if λ is of modulus 1. In [5], this was enough, since we applied this result to the operator M . In section 5 we will also need to apply it to a deformation of the operator L , which will no longer be trace-preserving. Remark 3.7 . The previous proposition gives in particular uniqueness and faithfulness of the invariant state, when it exists, for an irreducible map Φ. As one can expect, the converse result holds: if Φ admits a unique invariant state and that state is faithful, then Φ is irreducible (see [5], Section 7). We now turn to the notion of period for positive maps. We will denote by d -, d + the substraction and addition modulo d . Definition 3.8. Let Φ be a CP, trace-preserving, irreducible map and consider a resolution of the identity ( P , . . . , P 0 d -1 ) , i.e. a family of orthogonal projections such that ∑ d -1 j =0 P j = Id . One says that ( P , . . . , P 0 d -1 ) is Φ -cyclic if P A j κ = A P κ j d -1 for j = 0 , . . . , d -1 and any k . The supremum of all d for which there exists a Φ -cyclic resolution of identity ( P , . . . , P 0 d -1 ) is called the period of Φ . If Φ has period 1 then we call it aperiodic. Remark 3.9 . If dim K is finite then the period is always finite. The following proposition is the analog of a standard result for classical Markov chains: Proposition 3.10. Assume Φ is completely positive, irreducible, with finite period d , and denote by P , . . . , P 0 d -1 a cyclic decomposition of Φ . Then : - 1. we have the relation Φ( P ρP i j ) = P i d +1 Φ( ) ρ P j d +1 , - 2. for any j = 0 , . . . , d -1 , the restriction Φ d j of Φ d to P j I 1 ( K ) P j is irreducible aperiodic, - 3. if Φ has an invariant state ρ inv , then Φ d j has a unique invariant state ρ inv j def = d × P ρ j inv P j . ## Proof: - 1. The first relation is obvious, and shows that P j I 1 ( K ) P j is stable by Φ d . - 2. Consider a state P ρP j j in P j I 1 ( K ) P j . By irreducibility of Φ, e t Φ ( P ρP j j ) is faithful, so P j e t Φ ( P ρP j j ) P j is faithful in Ran P j . But by the relation in point 1, $$P _ { j } e ^ { t \Phi } ( P _ { j } \rho P _ { j } ) P _ { j } = \sum _ { n = 0 } ^ { \infty } \frac { t ^ { d n } } { ( d n )! } \, \Phi ^ { d n } ( P _ { j } \rho P _ { j } ) = \sum _ { n = 0 } ^ { \infty } \frac { t ^ { d n } } { ( d n )! } \, ( \Phi _ { j } ^ { d } ) ^ { n } ( P _ { j } \rho P _ { j } ).$$ This shows that Φ d j is irreducible. Now, if Φ d j has a cyclic decomposition of identity ( P j, 0 , . . . , P j,δ -1 ) then by the commutation relations this induces a cyclic decomposition of identity for Φ with d × δ elements. Therefore, δ = 1. - 3. The invariance of ρ inv j is trivial by point 1, and the irreducibility of Φ d j implies the unicity of the invariant state. By remark 4.8 in [5], Tr( P ρ j inv P j ) does not depend on j , so it is 1 /d . glyph[square] The following results were originally proved by Fagnola and Pellicer in [10] (with partial results going back to [9] and [11]). We recall that the point spectrum of an operator is its set of eigenvalues, and that we denote by Sp pp Φ ∗ the point spectrum of Φ . ∗ Proposition 3.11. If Φ is an irreducible, completely positive, trace-preserving map on I 1 ( K ) and has finite period d then: - · the set Sp pp Φ ∗ , is a subgroup of the circle group T , - · the primitive root of unity e i2 π/d belongs to Sp pp Φ ∗ if and only if Φ is d -periodic. An immediate consequence is the following: Proposition 3.12. If a completely positive, trace-preserving map Φ on I 1 ( K ) is irreducible and aperiodic with invariant state ρ inv , and K is finite-dimensional then - · Sp pp Φ ∩ T = 1 { } , - · for any ρ ∈ I 1 ( K ) one has Φ ( ) p ρ → ρ inv as p →∞ . ## 4 Irreducibility and period of M and L Now we turn to the case where the operator Φ is an open quantum random walk M generated by L s , s ∈ S , or the auxiliary map L as defined by (2.3). We will study irreducibility and periodicity properties of both operators M and L and mutual relations. We will first explain why we focus on a study of L , when M should intuitively be the object of interest. For any v in V we denote $$\mathcal { P } _ { \ell } ( v ) = \{ \pi = ( s _ { 1 }, \dots, s _ { \ell } ) \in S ^ { \ell } \, | \, \sum _ { p = 1 } ^ { \ell } s _ { p } = v \}$$ and, in addition, we consider $$\mathcal { P } ( v ) = \cup _ { \ell \geq 1 } \mathcal { P } _ { \ell } ( v ), \quad \mathcal { P } _ { \ell } = \cup _ { v \in V } \mathcal { P } _ { \ell } ( v ) \quad \mathcal { P } = \cup _ { \ell \in \mathbb { N } } \mathcal { P } _ { \ell } = \cup _ { v \in V } \mathcal { P } ( v ).$$ In analogy with [5], we use the notation $$L _ { \pi } = L _ { s _ { \ell } } \cdots L _ { s _ { 1 } }, \quad \text{for $\pi=\left(s_{1},\dots,s_{\ell}) \in \mathcal{P}_{\ell}$.}$$ We remark that the notations for the paths and the set of paths are slightly different from our previous paper [5] since we can use homogeneity, which allows us to drop the dependence on the particular starting point. The irreducibility of L and M are easily characterized in terms of paths. This is true in general for OQRWs (see [5], Proposition 3.9 in particular), but the following characterization for M is specific to homogeneous OQRWs. Lemma 4.1. Let M be an open quantum random walks defined by transition operators L s , s ∈ S , and L its auxiliary map. glyph[negationslash] - 1. The operator L is irreducible if and only if, for any x = 0 in h , the set { L x, π | π ∈ P} is total in h . glyph[negationslash] - 2. The operator M is irreducible if and only if, for any x = 0 in h and v in V , the set { L x, π | π ∈ P ( v ) } is total in h . ## Proof: This lemma is proven by a direct application of Definition 3.1 (third condition). For L , it is immediate. For M , one sees easily that irreducibility amounts to the fact that, for any x ⊗| w 〉 , the set { L x π ⊗| v + w , π 〉 ∈ P ( v ) } is dense in h for any v ∈ V (see the details in Proposition 3.9 of [5]) and this is equivalent to the statement above. glyph[square] This lemma obviously implies the following result: Corollary 4.2. If M is irreducible, then L is irreducible. One can, however, prove a more explicit criterion for irreducibility of M than Lemma 4.1. For consistency we rephrase here one of the equivalent definitions in Definition 3.1: Proposition 4.3. The operator L is irreducible if and only if the operators $$\{ L _ { s }, \ s \in S \}$$ have no invariant closed subspace in common, apart from { 0 } and h . The operator M is irreducible if and only if the operators $$\{ L _ { \pi _ { 0 } }, \, \pi _ { 0 } \in \mathcal { P } ( 0 ) \}$$ have no invariant closed subspace in common, apart from { 0 } and h . ## Proof: The characterization for L immediately follows from the last condition in Definition 3.1. If M is not irreducible then for some v ∈ V , the closed space $$\mathfrak { h } _ { v } = \text{Vect} \{ L _ { \pi } x, \, \pi \in \mathcal { P } ( v ) \}$$ is different from h . Since the concatenation of any π 0 ∈ P (0) with π ∈ P ( v ) gives an element of P ( v ), the space h v must be L π 0 -invariant. Conversely, if all operators L π 0 have an invariant subspace h ′ in common, then for any x ∈ h ′ , the set { L x, π | π ∈ P (0) } is contained in h ′ and M is not irreducible. glyph[square] Proposition 4.3 allows us to construct examples of OQRWs such that L is irreducible, but not M . ## Example 4.4. Let d = 1 and $$L _ { + } = \begin{pmatrix} 0 & a _ { + } \\ b _ { + } & 0 \end{pmatrix} \quad L _ { - } = \begin{pmatrix} 0 & a _ { - } \\ b _ { - } & 0 \end{pmatrix}$$ glyph[negationslash] with a + , a -, b + , b -positive, with a 2 + + b 2 + = a 2 -+ b 2 -= 1 and a + b -= a -b + . Then, by Proposition 4.3, L is irreducible, but M is not, since the vectors of the canonical basis are eigenvectors for any L π , π ∈ P (0) (see also Proposition 7.2). The following proposition is proved in [5]. We reprove it here. Proposition 4.5. Assume M is irreducible. Then it does not have an invariant state. ## Proof: By Corollary 4.2, L is irreducible, so it has a unique invariant state ρ inv on h , which is faithful. Assume M has an invariant state; by irreducibility it is unique. Since M is translation-invariant, any translation of that state would be also invariant, so by unicity the invariant state is translation-invariant. It must then be of the form ∑ i ∈ V ρ inv ⊗| 〉〈 | i i , but this has infinite trace, a contradiction. glyph[square] All ergodic convergence results for M given in [5] assume the existence of an invariant state. This is similar to the situation for classical Markov chains; however, some interesting asymptotic properties of M can be studied in the absence of an invariant state, and this includes large deviations or central limit theorems. As we will see, such properties can be derived from the study of L . This is why, in the study of homogeneous OQRWs, the focus shifts from M to L . To avoid discussing trivial cases, in the rest of this paper we will usually make the following assumption, which by Remark 3.4 automatically holds as soon as L (or M ) is irreducible: $$\text{Assumption } H 1 \colon \text{one has the equality } \overline { \bigvee _ { s \in S } \overline { \text{ ran } L _ { s } } = \mathfrak { h }.$$ This assumption is a natural one, since after just one step, even in the reducible case, the system is effectively restricted to the space ∨ s ∈ S Ran L s . More precisely, for any positive operator ρ on h , one has, for any s , $$\text{supp} \, L _ { s } \, \rho \, L _ { s } ^ { * } \subset \text{supp} \, \mathfrak { L } ( \rho ) \subset \overline { \bigvee _ { s \in S } \text{ ran } L _ { s } }.$$ Note that we have not given results equivalent to Lemma 4.1 for the notion of regularity. We do this here: glyph[negationslash] Lemma 4.6. The operator L is N -regular if and only if for any x = 0 in h , the set { L x, π | π ∈ P N } is total in h . The operator M can never be regular. ## Proof: glyph[negationslash] This is obtained by direct application of Definition 3.3, that shows the criterion for L . It also shows that M is N -regular if and only if for any x = 0 in h , any v in V , the set { L x, π | π ∈ P N ( v ) } is total in h . However, if the distance from the origin to v is larger than N , then P N ( v ) is empty. glyph[square] One could be tempted to consider a weaker version of regularity for L where the index N can depend on ρ . The following result shows that, if h is finitedimensional, this is not weaker than regularity: Lemma 4.7. Assume h is finite-dimensional. If for every ρ ≥ 0 in I 1 ( h ) \ { 0 } , there exists N &gt; 0 such that L N ( ρ ) is faithful, then there exists N 0 such that L is N 0 -regular. ## Proof: First observe that L is necessarily irreducible and so assumption H1 must hold. Besides, the current assumption implies that, for any x in h , there exists N x &gt; 0 such that L N x ( | x 〉〈 x | ) is faithful. Since faithfulness of L N x ( | x 〉〈 x | ) is equivalent to the existence of a family π , . . . , π 1 dim h of paths of length N x , such that the determinant of ( L π 1 x, . . . , L π dim h x ) is nonzero, there exist open subsets B x of the unit ball, such that x ∈ B x 0 implies that L N x 0 ( | x 〉〈 x | ) is faithful. By compactness of the unit ball, there exists a finite covering by B x 1 ∪ . . . ∪ B x p . Remark 3.4 then implies that if we let N 0 = sup i =1 ,...,p N x i one has L N 0 ( | x 〉〈 x | ) faithful for any nonzero x . This implies that L is N 0 -regular. glyph[square] We now turn to the notion of period for L and M . By Definition 3.8, a resolution of identity ( p , . . . , p 0 d -1 ) of h will be L -cyclic if and only if $$p _ { j } L _ { s } = L _ { s } p _ { j ^ { \underline { d } } = 1 } \quad \text{for $j=0,\dots,d-1$ and any $s\in S$.}$$ Consequently, by Proposition 3.10, we have $$\mathfrak { L } ( p _ { j } \, \rho \, p _ { j } ) = p _ { j ^ { \frac { \alpha } { \pm } } _ { 1 } } \, \mathfrak { L } ( \rho ) \, p _ { j ^ { \frac { \alpha } { \pm } } _ { 1 } }.$$ Remark 4.8 . Since the p j sum up to Id h , the period of L cannot be greater than dim h , a feature which will be extremely useful when dim h is small. On the other hand, as we observed in [5], a resolution of identity ( P , . . . , P 0 d -1 ) of H will be M -cyclic if and only if it is of the form $$P _ { k } = \sum _ { i \in V } P _ { k, i } \otimes | i \rangle \langle i | \text{ \ with \ } P _ { k, i } L _ { s } = L _ { s } P _ { k ^ { \frac { d } { } } - 1, i + s }.$$ Remark 4.9 . The cyclic resolutions for M are translation invariant, in the sense that, if P k = ∑ i ∈ V P k,i ⊗| 〉〈 | i i , k = 0 , ...d -1, is a cyclic resolution for M , then also P ′ k = ∑ i ∈ V P k,i + v ⊗| 〉〈 | i i , k = 0 , ...d -1, is a cyclic resolution for any v . We will, however, make little use for a cyclic resolution of identity for M in this paper. On the other hand, the periodicity of L can be an easy source of information on M : Proposition 4.10. We have the following properties: - 1. The period of M , when finite, is even. - 2. If L is irreducible and has even period d , then M is reducible. ## Proof: - 1. Assume that ( P , . . . , P 0 d -1 ) is a M -cyclic resolution of identity associated with M . As we observed above, the P k are of the form $$P _ { k } = \sum _ { i \in V } P _ { k, i } \otimes | i \rangle \langle i | \text{ \ with \ } P _ { k, i } L _ { s } = L _ { s } P _ { k ^ { \underline { d } } _ { 1, i + s } }.$$ Then if we call i in V odd or even depending on the parity of its distance to the origin, define $$P _ { k, \text{odd} } = \sum _ { i \text{odd} } P _ { k, i } \otimes | i \rangle \langle i | \text{ \ and \ } P _ { k, \text{even} } = \sum _ { i \text{ even} } P _ { k, i }.$$ Then ( P 0 odd , , P 1 even , , P 2 odd , , . . . ) is a M -cyclic resolution of identity. - 2. Denote by ( p , . . . , p 0 d -1 ) a cyclic resolution of identity associated with L . Define $$p _ { \text{odd} } = \sum _ { k \text{ odd} } p _ { k } \quad p _ { \text{even} } = \sum _ { k \text{ even} } p _ { k }.$$ It is obvious from relations (4.2) that Ran p odd and Ran p even are nontrivial invariant spaces for any L π 0 , π 0 ∈ P (0). We conclude by Proposition 4.3. glyph[square] Last, we give an analogue of a classical property of Markov chains with finite state space: Lemma 4.11. If h is finite-dimensional, then the map L is irreducible and aperiodic if and only if it is regular. ## Proof: If L is irreducible and aperiodic, then by Proposition 3.12 for any state ρ on h , one has L p ( ρ ) -→ n →∞ ρ inv so that L p ( ρ ) is faithful for large enough p . By Lemma 4.7, this implies the regularity of L . Conversely, if L is regular, then it is irreducible, and for any projection p , the operator L N ( p ) is faithful, so that p cannot be a member of a cyclic resolution of identity unless p = Id. glyph[square] ## 5 Central Limit Theorem and Large Deviations The Perron-Frobenius theorem for CP maps allows us to obtain a large deviations principle and a central limit theorem for the position process ( X p ) p ∈ N (or, equivalently, for the process ( Q p ) p ∈ N ) associated with an open quantum random walk M and an initial state ρ (see section 2). In most of our statements, we assume for simplicity that L is irreducible. We discuss extensions of our results at the end of this section. Before going into the details of the proof, we should mention that, as we were completing the present article, we learnt about the recent paper [25], which proves a large deviation result for empirical measures of outputs of quantum Markov chains, which can be viewed as the 'steps' ( X p -X p -1 ) p taken by an open quantum random walk. This result is similar to the statement in our Remark 5.7, and implies a level-1 large deviation result for the position ( X p ) p when the OQRW is irreducible and aperiodic. In addition, the statement in [25] extends to a large deviations principle for empirical measures of m -tuples of ( X p -X p -1 ) p . Our (independent) result, however, treats the case where the OQRW is irreducible but not aperiodic, and can be extended beyond the irreducible case. For the proofs of this section, it will be convenient to introduce some new notations. For u in R d we define L ( u ) s = e 〈 u,s / 〉 2 L s , and denote L u the map induced by the L ( u ) s , s ∈ S : for ρ in I 1 ( h ), $$\mathfrak { L } _ { u } ( \rho ) = \sum _ { s } L _ { s } ^ { ( u ) } \rho L _ { s } ^ { ( u ) * }.$$ The operators L u will be useful in order to treat the moment generating functions of the random variables ( X p ): Lemma 5.1. For any u in R d one has $$\mathbb { E } ( \exp \left \langle u, X _ { p } - X _ { 0 } \right \rangle ) = \sum _ { i _ { 0 } \in V } \text{Tr} ( \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) ).$$ ## Proof: For any k in N ∗ let S k = X k +1 -X k and consider u ∈ R d . Then we have $$& \mathbb { E } ( \exp \left \langle u, X _ { p } - X _ { 0 } \right \rangle ) \\ & = \quad \sum _ { i _ { 0 } \in V } \sum _ { s _ { 1 }, \dots, s _ { p } \in S ^ { p } } \mathbb { P } ( X _ { 0 } = i _ { 0 }, S _ { 1 } = s _ { 1 }, \dots, S _ { p } = s _ { p } ) \, \exp \left \langle u, s _ { 1 } + \dots + s _ { p } \right \rangle \\ & = \quad \sum _ { i _ { 0 } \in V } \sum _ { s _ { 1 }, \dots, s _ { p } \in S ^ { p } } \text{Tr} ( L _ { s _ { p } } \dots L _ { s _ { 1 } } \, \rho ( i _ { 0 } ) \, L _ { s _ { 1 } } ^ { * } \dots L _ { s _ { p } } ^ { * } ) \, \exp \left \langle u, s _ { 1 } + \dots + s _ { p } \right \rangle \\ & \quad \,.$$ and this gives formula (5.1). glyph[square] Remark 5.2 . One also has $$\mathbb { E } ( \exp \left \langle u, X _ { p } \right \rangle ) = \mathbb { E } ( \exp \left \langle u, Q _ { p } \right \rangle ) = \sum _ { i _ { 0 } \in V } \exp \left \langle u, i _ { 0 } \right \rangle \text{Tr} \left ( \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) \right ).$$ This will allow us to give results analogous to Theorem 5.4 and 5.13 for the process ( Q p ) p . Note that considering X p or X p -X 0 is essentially equivalent, but as we remarked in section 2, Q p and Q 0 cannot be considered simultaneously. The following lemma describes the properties of the largest eigenvalue of L u : ↦ Lemma 5.3. Assume that h is finite-dimensional and L is irreducible. For any u in R , the spectral radius λ u def = r ( L u ) of L u is an algebraically simple eigenvalue of L u , and has an eigenvector ρ u which is a strictly positive operator, and we can normalize it to be a state. In addition, the map u → λ u can be extended to be analytic in a neighbourhood of R d . ## Proof: By Lemma 4.1, if L is irreducible, then so is any L u for u ∈ R d . Proposition 3.5, applied here specifically to an Hilbert space of finite dimension, gives the first sentence except for the algebraic simplicity of the eigenvector λ u , as it implies only the geometric simplicity. If we can prove that, for all u in R d , the eigenvalue λ u is actually algebraically simple then the theory of perturbation of matrix eigenvalues (see Chapter II in [15]) will give us the second sentence. Now, in order to prove the missing point, consider the adjoint L ∗ u of L u on B ( h ), which in this finite-dimensional setting, can be identified, with I 1 ( h ). It is easy to see from Definition 3.1 that L ∗ u is irreducible. Its largest eigenvalue is λ u , with eigenvector M u , which, by Proposition 3.5, is invertible. We can consider the map ↦ $$\widetilde { \mathfrak { L } } _ { u } \colon \rho \mapsto \frac { 1 } { \lambda _ { u } } \, M _ { u } ^ { 1 / 2 } \mathfrak { L } _ { u } ( M _ { u } ^ { - 1 / 2 } \, \rho \, M _ { u } ^ { - 1 / 2 } ) M _ { u } ^ { 1 / 2 }.$$ This ˜ L u is clearly completely positive, and is trace-preserving since ˜ L ∗ u (Id) = Id. Proposition 3.5 shows that ˜ L u has 1 as a geometrically simple eigenvalue, with a strictly positive eigenvector ˜ ρ u . Then 1 must also be algebraically simple, otherwise there exists η u such that ˜ L u ( η u ) = η u + ˜ ρ u , but taking the trace of this equality yields Tr( ˜ ρ u ) = 0, a contradiction. This implies that L u has λ u as a algebraically simple eigenvalue. glyph[square] We can now state our large deviation result: Theorem 5.4. Assume that h is finite-dimensional and that L is irreducible. Then the process ( 1 p ( X p -X 0 )) p ∈ N ∗ associated with M satisfies a large deviation principle with a good rate function I . Explicitly, there exists a lower semicontinuous mapping I : R d → [0 , + ∞ ] with compact level sets { x | I ( x ) ≤ α } , such that, for any open G and closed F with G ⊂ F ⊂ R d , one has $$\cdot \cdot \quad & \cdot \cdot \cdot \\ & - \inf _ { x \in G } I ( x ) \leq \liminf _ { p \to \infty } \frac { 1 } { p } \log P ( \frac { X _ { p } - X _ { 0 } } { p } \in G ) \\ & \leq \limsup _ { p \to \infty } \frac { 1 } { p } \log P ( \frac { X _ { p } - X _ { 0 } } { p } \in F ) \leq - \inf _ { x \in F } I ( x ).$$ Remark 5.5 . If we add the assumption that X 0 has an everywhere defined moment generating function, e.g. that the initial state ρ satisfies E (exp 〈 u, X 0 〉 ) = ∑ i 0 ∈ V e 〈 u,i 0 〉 Tr ρ i ( 0 ) &lt; ∞ for all u in R d , then this theorem also holds for ( X p ) p or equivalently ( Q p ) p in place of ( X p -X 0 ) p . Remark 5.6 . Using the techniques detailed in [25], it is possible, for any m in N , to extend the above theorem and obtain a full large deviation principle for the sequence of ( m + 1)-tuples 1 p ( X p -X ,X 0 p +1 -X ,. . . , X 1 p + m -X m p ) , or (under the same condition as in Remark 5.5) for ( X ,.. . , X p p + m p ) . ## Proof: We start with equation (5.1). Since h is finite-dimensional, if ρ i ( 0 ) is faithful, then, with r u,i 0 = inf Sp( ρ i ( 0 )) &gt; 0 and s u,i 0 = Tr ρ i ( 0 ) inf Sp( ρ u ) &gt; 0 (where Sp( σ ) denotes the spectrum of an operator σ ), $$r _ { u, i _ { 0 } } \, \rho _ { u } \leq \rho ( i _ { 0 } ) \leq s _ { u, i _ { 0 } } \, \rho _ { u }.$$ Note that r u,i 0 ≤ Tr ρ i ( 0 ) so that both r u,i 0 and s u,i 0 are summable along i 0 . Consequently, we shall have $$r _ { u, i _ { 0 } } \, \lambda _ { u } ^ { p } \, \rho _ { u } \leq \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) \leq s _ { u, i _ { 0 } } \, \lambda _ { u } ^ { p } \, \rho _ { u }.$$ Using these bounds in relation (5.1), we immediately obtain, for all u ∈ R d , $$\lambda _ { u } ^ { p } \sum _ { i _ { 0 } \in V } r _ { u, i _ { 0 } } \, \rho _ { u } \leq \mathbb { E } ( \exp \left \langle u, X _ { p } - X _ { 0 } \right \rangle ) \leq \lambda _ { u } ^ { p } \, \sum _ { i _ { 0 } \in V } s _ { u, i _ { 0 } } \, \rho _ { u }$$ where the sums are finite and strictly positive; so that $$\lim _ { p \to \infty } \frac { 1 } { p } \, \log \mathbb { E } ( \exp \langle u, X _ { p } \rangle ) = \log \lambda _ { u }.$$ Now, if ρ i ( 0 ) is not faithful, but L is aperiodic, due to Proposition 3.12, then L N ( ρ i ( 0 )) is faithful for large enough N , and (5.2) holds with L N u ( ρ i ( 0 )) in place of ρ i ( 0 ) and (5.3) holds with ( p -N ) instead of p in the exponents of λ u . We still recover (5.4). glyph[negationslash] Finally, if ρ i ( 0 ) is not faithful and L has period d &gt; 1, then, considering a cyclic decomposition of identity ( p , . . . , p 0 d -1 ), we can consider the single blocks of the form p ρ i j ( 0 ) p j . By Proposition 3.10, L d is irreducible aperiodic when restricted to each p j I 1 ( h ) p j and L d u ( p ρ j u p j ) = λ p ρ d u j u p j . Then, by the regularity of the restrictions of L d , using Remark 3.4 and the obvious extension of (4.1) to L u , there exist N ∈ N and r u,i 0 , s u,i 0 &gt; 0 such that, for any block p ρ i j ( 0 ) p j = 0, $$r _ { u, i _ { 0 } } \, p _ { j } \, \rho _ { u } \, p _ { j } \leq p _ { j } \, \mathfrak { L } _ { u } ^ { d N } \rho ( i _ { 0 } ) \, p _ { j } \leq s _ { u, i _ { 0 } } \, p _ { j } \, \rho _ { u } \, p _ { j }$$ and if p = dN + , r r ∈ { 0 , . . . , d - } 1 , $$r _ { u, i _ { 0 } } \, \lambda _ { u } ^ { p - d N } \, p _ { j + r } \, \rho _ { u } \, p _ { j + r } \leq \mathfrak { L } _ { u } ^ { p } ( p _ { j } \, \rho ( i _ { 0 } ) \, p _ { j } ) \leq s _ { u, i _ { 0 } } \, \lambda _ { u } ^ { p - d N } \, p _ { j + r } \, \rho _ { u } \, p _ { j + r }.$$ Summing over j , we recover equation (5.4) again. ↦ In any case, we obtain (5.4) for all u ∈ R d . Lemma 5.3 shows that u → log λ u is analytic on R . Applying the G¨ artner-Ellis theorem (see [7]) we obtain the bounds mentioned in Theorem 5.4, with rate function $$I ( x ) = \sup _ { u \in \mathbb { R } ^ { d } } \left ( \langle u, x \rangle - \log \lambda _ { u } \right ). \, \Box$$ Remark 5.7 . If ϕ is any function S → R and S p = ∑ p k =1 ϕ X ( k -X k -1 ) then the process ( S p p ) p ∈ N also satisfies a large deviation principle, with rate function $$I _ { \varphi } ( x ) = \sup _ { t \in \mathbb { R } } \, \left ( t \, x - \log \lambda _ { t \varphi } \right )$$ where λ tϕ is the largest eigenvalue of ↦ $$\mathfrak { L } _ { t \varphi } \colon \rho \mapsto \sum _ { s \in S } \mathrm e ^ { t \varphi ( s ) } L _ { s } \, \rho L _ { s } ^ { * }.$$ This is shown by an immediate extension of the proofs of Lemma 5.3 and Theorem 5.4, and yields a level-2 large deviation result for the process ( X p -X p -1 ) ( e.g. using Kifer's theorem [16]). Remark 5.8 . As noted in Remark 2.3, when M is the minimal dilation of a classical Markov chain with transition probabilities ( p s ) s ∈ S , the map L is trivial: it is just multiplication by 1 on R . The maps L u , however, are not trivial: they are multiplication by $$\lambda _ { u } = \sum _ { s \in S } \exp \langle u, s \rangle \, p _ { s }.$$ We therefore recover the same rate function as in the classical case, see e.g. section 3.1.1 of [7]. Remark 5.9 . The technique of applying the Perron-Frobenius theorem to a u -dependent deformation of the completely positive map defining the dynamics, goes back (to the best of our knowledge) to [13], and is a non-commutative adaptation of a standard proof for Markov chains. ↦ We denote by c the map c : R d glyph[owner] u → log λ u . As is well-known (see e.g. section II.6 in [8]), the differentiability of c at zero is related to a law of large numbers for the process ( X p ) p ∈ N . Similarly, the second order differential will be relevant for the central limit theorem. Corollary 5.10. Assume that h has finite dimension and that L is irreducible. The function c on R d is infinitely differentiable at zero. Denote by ↦ $$\mathfrak { L } ^ { \prime } _ { u } \colon \rho \mapsto \sum _ { s \in S } \langle u, s \rangle \, L _ { s } \rho L ^ { * } _ { s } \quad a n d \quad \mathfrak { L } ^ { \prime \prime } _ { u } \colon \rho \mapsto \sum _ { s \in S } \langle u, s \rangle ^ { 2 } L _ { s } \rho L ^ { * } _ { s }.$$ ↦ Then, denoting λ ′ u def = d d t | t =0 λ tu and λ ′′ u def = d 2 d t 2 | t =0 λ tu , we have $$\lambda _ { u } ^ { \prime } = \text{Tr} \left ( \mathfrak { L } _ { u } ^ { \prime } ( \rho ^ { \text{inv} } ) \right )$$ $$\lambda _ { u } ^ { \prime \prime } = \text{Tr} ( \mathfrak { L } _ { u } ^ { \prime \prime } ( \rho ^ { \text{inv} } ) ) + 2 \text{Tr} ( \mathfrak { L } _ { u } ^ { \prime } ( \eta _ { u } ) )$$ where η u is the unique solution with trace zero of the equation $$\left ( \text{Id} - \mathfrak { L } \right ) ( \eta _ { u } ) = \mathfrak { L } _ { u } ^ { \prime } ( \rho ^ { \text{inv} } ) - \text{Tr} \left ( \mathfrak { L } _ { u } ^ { \prime } ( \rho ^ { \text{inv} } ) \right ) \rho ^ { \text{inv} }.$$ This implies immediately that $$\mathrm d c ( 0 ) \left ( u \right ) = \lambda _ { u } ^ { \prime } \quad \mathrm d ^ { 2 } c ( 0 ) \left ( u, u \right ) = \lambda _ { u } ^ { \prime \prime } - \lambda _ { u } ^ { \prime \, 2 }.$$ ## Proof: Lemma 5.3 shows that c u is infinitely differentiable at any u ∈ R d . In addition (again see Chapter II in [15]), the largest eigenvalue λ u of L u is an analytic perturbation of λ 0 = 1, and has an eigenvector ρ u which we can choose to be a state, and this ρ u is an analytic perturbation of ρ 0 . Then one has $$\lambda _ { t u } = 1 + t \lambda _ { u } ^ { \prime } + \frac { t ^ { 2 } } { 2 } \lambda _ { u } ^ { \prime \prime } + o ( t ^ { 2 } )$$ $$\rho _ { t u } = \rho ^ { \text{inv} } + t \, \eta _ { u } + \frac { t ^ { 2 } } { 2 } \, \sigma _ { u } + o ( t ^ { 2 } )$$ $$\mathfrak { L } _ { t u } = \mathfrak { L } + t \, \mathfrak { L } _ { u } ^ { \prime } + \frac { t ^ { 2 } } { 2 } \, \mathfrak { L } _ { u } ^ { \prime \prime } + o ( t ^ { 2 } )$$ and since every ρ tu is a state then Tr η u = Tr σ u = 0. Then the relation L tu ( ρ tu ) = λ tu ρ tu yields $$\mathfrak { L } _ { u } ^ { \prime } ( \rho ^ { \text{inv} } ) + \mathfrak { L } ( \eta _ { u } ) = \eta _ { u } + \lambda _ { u } ^ { \prime } \, \rho ^ { \text{inv} }$$ $$\frac { 1 } { 2 } \mathfrak { L } ( \sigma _ { u } ) + \mathfrak { L } _ { u } ^ { \prime } ( \eta _ { u } ) + \frac { 1 } { 2 } \mathfrak { L } _ { u } ^ { \prime \prime } ( \rho ^ { \text{inv} } ) = \frac { 1 } { 2 } \sigma _ { u } + \lambda _ { u } ^ { \prime } \, \eta _ { u } + \frac { 1 } { 2 } \lambda _ { u } ^ { \prime \prime } \, \rho ^ { \text{inv} }.$$ Taking the trace of the first relation immediately yields relation (5.5). In addition, it yields relation (5.7). Since Id -L has kernel of dimension one, and range in the set of operators with zero trace, it induces a bijection on that state, so that (5.7) has a unique solution with trace zero. Then taking the trace of the second relation above, and using the fact that L is trace-preserving gives relation (5.6). glyph[square] Corollary 5.11. Assume that h has finite dimension and L is irreducible, and let m = ∑ s Tr( L ρ s inv L ∗ s ) s . Then the process ( 1 p ( X p -X 0 )) p ∈ N associated with M converges exponentially to m , i.e. for any ε &gt; 0 there exists N &gt; 0 such that, for large enough p , $$\mathbb { P } ( \left \| \frac { X _ { p } - X _ { 0 } } { p } - m \right \| > \varepsilon ) \leq \exp - p N.$$ This implies the almost-sure convergence of ( X p p ) p ∈ N to m . Remark 5.12 . The almost-sure convergence holds replacing X p by Q p . ## Proof: This is a standard result, see e.g. Theorem II.6.3 and Theorem II.6.4 in [8]. glyph[square] ↦ Theorem 5.13. Assume that h is finite-dimensional and L is irreducible. Denote by m the quantity defined in Corollary 5.11, and by C the covariance matrix associated with the quadratic form u → λ ′′ u -λ ′ u 2 . Then the position process ( X p ) p ∈ N associated with M satisfies $$\frac { X _ { p } - p \, m } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, C )$$ where convergence is in law. Remark 5.14 . Again this result holds replacing X p by Q p . Remark 5.15 . The formulas for the mean and variance are the same as in [1] when V = Z d and S = {± v , i i = 1 , . . . , d } ( v , . . . , v 1 d is the canonical basis of R d ). This can be observed from the fact that, if Y u is the unique (up to a constant multiple of the Id) solution of equation $$( \text{Id} - \mathfrak { L } ^ { * } ) ( Y _ { u } ) = \sum _ { s \in S } \langle u, s \rangle L _ { s } ^ { * } L _ { s } - \langle u, m \rangle \text{ Id},$$ (note that our Y u is the L l of [1]) then $$\text{Tr} ( \mathfrak { L } ^ { \prime } _ { u } ( \eta _ { u } ) ) = \text{Tr} ( \mathfrak { L } ^ { \prime } _ { u } ( \rho ^ { i n v } ) Y _ { u } ) - \text{Tr} ( \mathfrak { L } ^ { \prime } _ { u } ( \rho ^ { i n v } ) ) \text{ Tr} ( \rho ^ { i n v } Y _ { u } )$$ and denoting Y i = Y v i we have $$\langle \cdot$$ $$\langle u, C u \rangle = \sum _ { i, j = 1 } ^ { d } u _ { i } u _ { j } \Big { ( } \mathbf 1 _ { i = j } & \Big { ( } \text{Tr} ( L _ { + i } \rho ^ { \text{inv} } L _ { + i } ^ { * } ) + \text{Tr} ( L _ { - i } \rho ^ { \text{inv} } L _ { - i } ^ { * } ) \Big { ) } \\ & + 2 \text{Tr} ( L _ { + i } \rho ^ { \text{inv} } L _ { + i } ^ { * } Y _ { j } ) - 2 \text{Tr} ( L _ { - i } \rho ^ { \text{inv} } L _ { - i } ^ { * } Y _ { j } ) \\ & - 2 m _ { i } \text{Tr} ( \rho ^ { \text{inv} } Y _ { j } ) - m _ { i } m _ { j } \Big { ) }$$ which leads to the formula for C given in [1]: $$\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \\ C _ { i, j } = & \mathbf 1 _ { i = j } \left ( \text{Tr} ( L _ { + i } \rho ^ { \text{inv} } L _ { + i } ^ { * } ) + \text{Tr} ( L _ { - i } \rho ^ { \text{inv} } L _ { - i } ^ { * } ) \right ) \\ & + \left ( \text{Tr} ( L _ { + i } \rho ^ { \text{inv} } L _ { + i } ^ { * } Y _ { j } ) + \text{Tr} ( L _ { + j } \rho ^ { \text{inv} } L _ { + j } ^ { * } Y _ { i } ) \right ) \\ & \left ( \text{Tr} ( L _ { - i } \rho ^ { \text{inv} } L _ { - i } ^ { * } Y _ { j } ) + \text{Tr} ( L _ { - j } \rho ^ { \text{inv} } L _ { - j } ^ { * } Y _ { i } ) \right ) \\ & - \left ( m _ { i } \text{Tr} ( \rho ^ { \text{inv} } Y _ { j } ) + m _ { j } \text{Tr} ( \rho ^ { \text{inv} } Y _ { i } ) \right ) - m _ { i } m _ { j }. \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots.$$ ## Proof of Theorem 5.13: Let us first consider the case where L is irreducible and aperiodic. Equation (5.1) implies $$\mathbb { E } ( \exp \langle u, X _ { p } - X _ { 0 } \rangle ) = \sum _ { i _ { 0 } \in V } \text{Tr} ( \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) ).$$ Now, considering the Jordan form of L shows that, if $$\delta \stackrel { \text{def} } { = } \sup \{ | \lambda |, \lambda \in \text{Sp} \mathfrak { L } \, \sum \{ 1 \} \},$$ then δ &lt; 1 and for u in a real neighbourhood of 0 and p in N , $$\mathfrak { L } _ { u } ^ { p } = \lambda _ { u } ^ { p } \left ( \varphi _ { u } ( \cdot ) \, \rho _ { u } + O ( ( \delta + \varepsilon ) ^ { p } ) \right )$$ for some ε such that δ + ε &lt; 1, where ϕ u is a linear form on I 1 ( h ), analytic in u and such that ϕ 0 = Tr and the O (( δ + ) ) is in terms of the operator norm ε p on I 1 ( h ). This implies $$\frac { 1 } { p } \log \sum _ { i _ { 0 } \in V } \text{Tr} ( \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) ) = \log \lambda _ { u } + \frac { 1 } { p } \log \sum _ { i _ { 0 } \in V } \varphi _ { u } ( \rho ( i _ { 0 } ) ) + O ( ( \delta + \varepsilon ) ^ { p } ) \quad ( 5. 1 0 )$$ for u in the above real neighbourhood of the origin. This and Lemma 5.3 implies that the identity $$\lim _ { p \to \infty } \frac { 1 } { p } \log \mathbb { E } ( \exp \langle u, X _ { p } - X _ { 0 } \rangle ) = \log \lambda _ { u }$$ holds for u in a neighbourhood of the origin. In addition, by equation (5.10) and Corollary 5.10, $$\lim _ { p \to \infty } \frac { 1 } { p } ( \nabla \log \mathbb { E } ( \exp \langle u, X _ { p } - X _ { 0 } \rangle ) - p m ) = 0 \quad \lim _ { p \to \infty } \frac { 1 } { p } \nabla ^ { 2 } \log \mathbb { E } ( \exp \langle u, X _ { p } - X _ { 0 } \rangle ) = C.$$ By an application of the multivariate version of Bryc's theorem (see Appendix A.4 in [14]), we deduce that $$\frac { X _ { p } - X _ { 0 } - p \, m } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, C )$$ and this proves our statement in the case where L is irreducible aperiodic. Wenow consider the case where L is irreducible with period d . Let p , . . . , p 0 d -1 be a cyclic partition of identity; then, writing p = qd + r we have for any i 0 ∈ V $$\dots \ r \dots \dots \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \\ \text{Tr} ( \mathfrak { L } _ { u } ^ { p } ( \rho ( i _ { 0 } ) ) ) \quad & = \quad \sum _ { j = 0 } ^ { d - 1 } \text{Tr} ( p _ { j } \, \mathfrak { L } _ { u } ^ { q d + r } ( \rho ( i _ { 0 } ) ) \, p _ { j } ) \\ & = \quad \sum _ { j = 0 } ^ { d - 1 } \text{Tr} ( \mathfrak { L } _ { u } ^ { q d } ( p _ { j } \, \mathfrak { L } _ { u } ^ { r } ( \rho ( i _ { 0 } ) ) \, p _ { j } ) )$$ by a straightforward extension of (4.2) to L u . By Proposition 3.10, for any j , r and the previous discussion, one has $$\lim _ { q \to \infty } \frac { 1 } { q d } \log \text{Tr} \left ( \mathfrak { L } _ { u } ^ { q d } ( p _ { j } \, \mathfrak { L } _ { u } ^ { r } ( \rho ( i _ { 0 } ) ) \, p _ { j } ) \right ) = \log \lambda _ { u }$$ and one can extend all terms in this identity so that it holds in a complex neighbourhood of the origin. This finishes the proof of our statement. glyph[square] Remark 5.16 . The reader might wonder why we need to go through the trouble of considering relations (5.9) and (5.10) to derive the extension of (5.11) to complex u . This is because there is no determination of the complex logarithm that allows to consider log E (exp 〈 u, X p -X 0 〉 ) for complex u and arbitrarily large p . This forces us to start by transforming 1 p log E (exp 〈 u, X p -X 0 〉 ). Generalizations of Theorems 5.4 and 5.13 We finish with a discussion of possible generalizations of Theorems 5.4 and 5.13 beyond the case of irreducible L . To this aim, we introduce the following subspaces of h : $$\mathcal { D } = \left \{ \phi \in \mathfrak { h } \, | \, \langle \phi, \mathfrak { L } ^ { p } ( \rho ) \, \phi \rangle \underset { p \to \infty } { \longrightarrow } 0 \text{ for any state } \rho \right \} \text{ and } \mathcal { R } = \mathcal { D } ^ { \perp }. \quad ( 5. 1 2 )$$ Alternatively, R can be defined as the supremum of the supports of L -invariant states, and D as R ⊥ . Note in particular that dim R ≥ 1 and R is invariant by all operators L s , s ∈ S . These subspaces are the Baumgartner-Narnhofer decomposition of h associated with L (see [4] or [5]). Note that, in [5], we only considered the spaces D M and R M associated with M instead of L . Here the decomposition for M plays no role and R M is equal to { 0 } . The following result will replace the Perron-Frobenius theorem when L is not irreducible. The proof can be easily adapted from Proposition 3.5 and Lemma 5.3. ## Proposition 5.17. The following properties are equivalent: - 1. the auxiliary map L has a unique invariant state ρ inv , - 2. the restriction L |I 1 ( R ) of L to R is irreducible, - 3. the value 1 is an eigenvalue of L with algebraic multiplicity one. If, in addition, L |I 1 ( R ) is aperiodic, then 1 is the only eigenvalue of modulus one, and for any state ρ , one has L p ( ρ ) -→ p →∞ ρ inv . This leads to an extension of Theorem 5.13 to the cases - · where L |I 1 ( R ) is irreducible (even if R glyph[negationslash] = h ); by Proposition 5.17, this is equivalent to L having a unique invariant state; - · when R = h . With these two extensions, our central limit theorem has the same generality as the one given in [1]: the first case is Theorem 5.2 of that reference, the second case is treated in Section 7 in [1]. These extensions are proven observing that: - · by Proposition 5.17, the proof of Theorem 5.13 can immediately be extended to the situation where L |I 1 ( R ) is irreducible aperiodic, and from there to the situation where L |I 1 ( R ) is irreducible periodic; - · when R = h , it admits a decomposition R = ⊕ R k k (see [5]), each I 1 ( R k ) is stable by L , the restrictions L |I 1 ( R k ) are irreducible, and the non-diagonal blocks do not appear in a probability like (2.6). We have seen in [5] that one can always decompose h into h = D ⊕ ⊕ k ∈ K R k with each R k as discussed above. However, in the general case, we do not have a clear statement of Theorems 5.4 and 5.13 because if D is non-trivial and card K ≥ 2, it is difficult to control how the mass of ρ 0 will flow from D into the different components R k . Last, remark that the proof of Theorem 5.4 relies on the fact that L u is irreducible. This holds if L is irreducible; the converse, however, is not true, and R L may be different from R L u . The proof of Theorem 5.4 can be extended to derive a lower large deviation bound in the case when R = h using the idea described above, but when L is not irreducible, the quantity λ u may not be analytic, in which case we a priori obtain only the upper large deviation bound, see Example 7.7. ## 6 Open quantum random walks with lattice Z d and internal space C 2 The goal of this section is to illustrate our various concepts, and give explicit formulas in the case where V = Z d and h = C 2 . We start with a study of the operators L and M , and a characterization of their (ir)reducibility and of the associated decompositions of the state space in this specific situation. We begin in Proposition 6.1 with a classification of the possible situations depending on the dimension of R (as defined in (5.12)) and its possible decompositions. Then, in Lemma 6.3 we characterize those situations in terms of the form of the operators L s . Later on, we also consider the period. To avoid discussing trivial cases, we will make a second assumption: Assumption H2: the operators L s are not all proportional to the identity. glyph[negationslash] This is equivalent to saying that we assume L = Id. We start by discussing the possible forms of R and D : Proposition 6.1. Consider the operators L s , s ∈ S , defining the open quantum random walk M , and suppose that assumptions H1 and H2 hold. Then we are in one of the following three situations. - 1. If the L s have no eigenvector in common, then L is irreducible, there exists a unique L -invariant state which is faithful, and one has $$\mathcal { R } = \mathfrak { h } \quad \mathcal { D } = \{ 0 \}.$$ - 2. If the L s have only one (up to multiplication) eigenvector e 1 in common, then L is not irreducible, the state | e 1 〉〈 e 1 | (if ‖ e 1 ‖ = 1 ) is the unique L -invariant state, and for any nonzero vector e 2 ⊥ e 1 , one has $$\mathcal { R } = \mathbb { C } \, e _ { 1 } \quad \mathcal { D } = \mathbb { C } \, e _ { 2 }.$$ - 3. If the L s have two linearly independent eigenvectors e 1 and e 2 in common, any invariant state is of the form ρ inv = t | e 1 〉〈 e 1 | + (1 -t ) | e 2 〉〈 e 2 | for t ∈ [0 , 1] , and one has $$\mathcal { R } = \mathfrak { h } = \mathbb { C } \, e _ { 1 } \oplus \mathbb { C } \, e _ { 2 } \quad \mathcal { D } = \{ 0 \}.$$ ## Proof: We recall that, by the fourth equivalent statement in Definition 3.1, the map L is irreducible if and only if the L s do not have a common, nontrivial, invariant subspace. If h = C 2 then this is equivalent to saying that the L s do not have a common eigenvector. Now assume that L is not irreducible, so that the L s have a common norm one eigenvector e 1 , with L e s 1 = α e s 1 for all s . Then | e 1 〉〈 e 1 | is an invariant state. Complete ( e 1 ) into an orthonormal basis ( e , e 1 2 ). Then, if ρ is an invariant state, ρ = ∑ i,j =1 2 , ρ i,j | e i 〉〈 e j | , and $$\mathfrak { L } ( \rho ) = \sum _ { i, j = 1, 2 } \sum _ { s \in S } \rho _ { i, j } \, | L _ { s } e _ { i } \rangle \langle L _ { s } e _ { j } |.$$ Then $$\rho _ { 2, 2 } = \langle e _ { 2 }, \rho \, e _ { 2 } \rangle = \sum _ { s \in S } \rho _ { 2, 2 } \left | \langle e _ { 2 }, L _ { s } e _ { 2 } \rangle \right | ^ { 2 }$$ so that either ρ 2 2 , = 0 or ∑ s ∈ S |〈 e , L 2 s e 2 〉| 2 = 1; but, since ∑ s ∈ S ‖ L e s 2 ‖ 2 = 1, this is possible only if e 2 is an eigenvector of all L s , s ∈ S . glyph[negationslash] Therefore, in situation 2, | e 1 〉〈 e 1 | is the only invariant state. In situation 3, observe that if there existed an invariant state with ρ 1 2 , = ρ 2 1 , = 0, then any state would be invariant and L would be the identity operator, a case we excluded. glyph[square] glyph[negationslash] Remark 6.2 . In situations 2 and 3 we recover the fact, proven in [5] (and originally in [4]) that, if | e 1 〉〈 e 1 | is an invariant state and e 2 = 0 is in e ⊥ 1 ∩ R then | e 2 〉〈 e 2 | is an invariant state. The above proposition gives an explicit Baumgartner-Narnhofer decomposition of h (see [4] or sections 6 and 7 of [5]). In the case where h = C 2 , it turns out that R can always be written in a unique way as R = ⊕ R k with L |I 1 ( R k ) irreducible (except for the trivial case when L is the identity map). This is not true in general and is a peculiarity related to the low dimension of h . Next we study the explicit form of the operators L s in each of the situations described by Proposition 6.1. We will use the standard notation that, for two families of scalars ( α s ) s ∈ S and ( β s ) s ∈ S , ‖ α ‖ 2 is ∑ s ∈ S | α s | 2 and 〈 α, β 〉 is ∑ s ∈ S α β s s . Lemma 6.3. With the assumptions and notations of Proposition 6.1: - · We are in situation 2 if and only if there exists an orthonormal basis of h = C 2 in which $$L _ { s } = \begin{pmatrix} \alpha _ { s } & \gamma _ { s } \\ 0 & \beta _ { s } \end{pmatrix}$$ for every s with $$\| \alpha \| ^ { 2 } = \| \beta \| ^ { 2 } + \| \gamma \| ^ { 2 } = 1, \quad \langle \alpha, \gamma \rangle = 0,$$ $$\sup _ { s \in S } | \beta _ { s } | > 0, \quad \sup _ { s \in S } | \gamma _ { s } | > 0,$$ glyph[negationslash] there exist s = s ′ in S such that ( α s -β s ) γ s ′ = ( α s ′ -β s ′ ) γ . s glyph[negationslash] - · We are in situation 3 if and only if there exists an orthonormal basis of h = C 2 in which $$L _ { s } = \begin{pmatrix} \alpha _ { s } & 0 \\ 0 & \beta _ { s } \end{pmatrix}$$ for every s , with $$\| \alpha \| ^ { 2 } = \| \beta \| ^ { 2 } = 1,$$ glyph[negationslash] there exists s in S such that α s = β . s ## Proof: This is immediate by examination. glyph[square] Remark 6.4 . In situation 2, let ρ be any state. One has $$\langle e _ { 2 }, \mathfrak { L } ^ { p } ( \rho ) \, e _ { 2 } \rangle = \text{Tr} \left ( \rho \, \mathfrak { L } ^ { * \, p } ( | e _ { 2 } \rangle \langle e _ { 2 } | ) \right ) = \| \beta \| ^ { 2 p } \, \langle e _ { 2 }, \rho \, e _ { 2 } \rangle \underset { p \to \infty } { \longrightarrow } 0$$ by the observation that ‖ β ‖ 2 &lt; 1. We recover the fact that D = C e 2 . We now turn to the study of periodicity for the operator L . We start with a simple remark: Remark 6.5 . Whenever the operators L s have a common eigenvector e , then the restriction of L to I 1 ( C e ) is aperiodic. In particular, if L is not irreducible but has a unique invariant state, then by necessity R is one-dimensional so that L |R must be aperiodic. In more generality, because dim h = 2, by Remark 4.8, any irreducible L has period either one or two. The following lemma characterizes those L s defining an operator L with period 2: glyph[negationslash] glyph[negationslash] 2 Lemma 6.6. The map L is irreducible periodic if and only if there exists a basis of h for which every operator L s is of the form ( 0 γ s ν s 0 ) . In that case, for any s = s ′ , one has γ s ν s ′ = γ s ′ ν s and ‖ γ ‖ 2 = ‖ ν ‖ 2 = 1 , and the unique invariant state of L is 1 Id . ## Proof: If the period of L is two, then the cyclic partition of identity must be of the form | e 1 〉〈 e 1 | , | e 2 〉〈 e 2 | and the cyclicity imposes the relations $$L _ { s } e _ { 1 } \in \mathbb { C } \, e _ { 2 }, \ \ L _ { s } e _ { 2 } \in \mathbb { C } \, e _ { 1 } \ \text{ for any } s \in S.$$ This gives the form of the L s . The condition ∑ s | γ s | 2 = ∑ s | ν s | 2 = 1 simply follows by the trace preservation property. Now observe that the eigenvalues of L s are solutions of λ 2 s = γ ν s s . Fix one solution λ s , the other being -λ s . Then ( ) x y is an eigenvector if and only if γ y s = ± λ s x . Therefore, two operators L s and L s ′ have an eigenvector in common if and only if ν s λ s ′ = ± ν s ′ λ s . This is easily seen to be equivalent to γ s ν s ′ = γ s ′ ν s . Last, one easily sees that the equation $$\sum _ { s \in S } L _ { s } \begin{pmatrix} a & b \\ c & d \end{pmatrix} L _ { s } ^ { * } = \begin{pmatrix} a & b \\ c & d \end{pmatrix}$$ is equivalent to a = d , b = 〈 ν, γ 〉 c and c = 〈 γ, ν 〉 b . Moreover, |〈 γ, ν 〉| = 1 would imply that the vectors ( γ s ) s ∈ S and ( ν s ) s ∈ S are proportional, which is forbidden by irreducibility. Therefore a = d and b = c = 0. glyph[square] The following theorem is a central limit theorem for all open quantum random walks satisfying H1 and H2. It gives more explicit expressions for the parameters of the limiting Gaussian, except when L is irreducible aperiodic, in which case the parameters of the Gaussian are given in Theorem 5.13. Theorem 6.7. Assume an open quantum random walk with V = Z d and h = C 2 satisfies assumptions H1 , H2 . Then there exist m ∈ C d and C a d × d positive semi-definite matrix such that we have the convergence in law $$\frac { X _ { p } - p \, m } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, C ).$$ Following the notation of Lemmas 6.3 and 6.6 we have: - · In situation 1, if L is periodic, consider two random variables A and B with P ( A = ) = s | ν s | 2 and P ( B = ) = s | γ s | 2 . Then we have $$m = \frac { 1 } { 2 } ( \mathbb { E } ( A ) + \mathbb { E } ( B ) ) \quad C = \frac { 1 } { 2 } ( \text{var} ( A ) + \text{var} ( B ) ).$$ - · In situation 2, consider a classical random variable A with P ( A = ) = s | α s | 2 . Then we have $$m = \mathbb { E } ( A ) \quad C = \text{var} ( A ).$$ - · In situation 3, consider two classical random variables A and B with P ( A = ) = s | α s | 2 and P ( B = ) = s | β s | 2 , and denote p = ∑ i ∈ V 〈 e , ρ 1 ( ) i e 1 〉 , where ρ is the initial state. Then we have $$m = p \, \mathbb { E } ( A ) + ( 1 - p ) \, \mathbb { E } ( B ) \quad C = p \, \text{var} ( A ) + ( 1 - p ) \, \text{var} ( B ).$$ ## Proof: $$\text{if $\mathfrak{L}$ is irreducible periodic, for any $\sigma=\begin{pmatrix} \sigma_{1l} & \sigma_{12} \\ \sigma_{21} & \sigma_{22} \end{pmatrix}, we have$$ $$L _ { s } \sigma L _ { s } ^ { * } = \begin{pmatrix} \sigma _ { 2 2 } | \gamma _ { s } | ^ { 2 } & \sigma _ { 2 1 } \gamma _ { s } \bar { \nu } _ { s } \\ \sigma _ { 1 2 } \bar { \gamma } _ { s } \nu _ { s } & \sigma _ { 1 1 } | \nu _ { s } | ^ { 2 } \end{pmatrix}.$$ By direct examination of the equation L u ( σ ) = λ u σ we obtain $$\lambda _ { u } = \sqrt { \mathbb { E } ( \exp \langle u, A \rangle ) } \, \sqrt { \mathbb { E } ( \exp \langle u, B \rangle ) } \,.$$ We immediately deduce $$\lambda _ { u } ^ { \prime } = \langle u, \frac { 1 } { 2 } ( \mathbb { E } ( A ) + \mathbb { E } ( B ) ) \rangle \quad \lambda _ { u } ^ { \prime \prime } - \lambda _ { u } ^ { \prime \, 2 } = \langle u, \frac { 1 } { 2 } ( \text{var} \, A + \text{var} \, B ) \, u \rangle.$$ In situation 2, we can use the extension discussed at the end of section 5 with P R = | e 1 〉〈 e 1 | , and apply the formulas of Theorem 5.13 with L replaced by L I 1 ( C e 1 ) . We see easily that the largest eigenvalue of L u is $$\lambda _ { u } = \max ( \sum _ { s \in S } e ^ { \langle u, s \rangle } | \alpha _ { s } | ^ { 2 }, \sum _ { s \in S } e ^ { \langle u, s \rangle } | \beta _ { s } | ^ { 2 } )$$ and in a neighbourhood of zero, the first term is the largest, so that $$\lambda _ { u } ^ { \prime } = \sum _ { s \in S } \langle u, s \rangle \, | \alpha _ { s } | ^ { 2 } \text{ \ and \ } \lambda _ { u } ^ { \prime \prime } = \sum _ { s \in S } \langle u, s \rangle ^ { 2 } \, | \alpha _ { s } | ^ { 2 }.$$ In situation 3, we again use the extension discussed at the end of section 5 with R 1 = C e 1 and R 2 = C e 2 . The limit parameters for each corresponding restriction are computed in the previous point and correspond to those for the random variables A and B . Since for any initial state ρ , a probability P ( X 0 = i 0 , . . . , X n = i n ) equals $$\langle e _ { 1 }, \rho ( i _ { 0 } ) \, e _ { 1 } \rangle \, \prod _ { k = 1 } ^ { n } | \alpha _ { i _ { k } - i _ { k - 1 } } | ^ { 2 } + \langle e _ { 2 }, \rho ( i _ { 0 } ) \, e _ { 2 } \rangle \, \prod _ { k = 1 } ^ { n } | \beta _ { i _ { k } - i _ { k - 1 } } | ^ { 2 }$$ and we recover the parameters given in the statement above. glyph[square] Remark 6.8 . The irreducible periodic case described above can be understood in terms of a classical random walk, in a similar way to situation 3. Indeed, call a site i in V odd or even depending on the parity of its distance to the origin. Then exchanging the order of the basis vectors e 1 and e 2 at odd sites only is equivalent to considering a non-homogeneous OQRW with $$L _ { i, i + s } = \begin{pmatrix} \nu _ { s } & 0 \\ 0 & \gamma _ { s } \end{pmatrix} \quad \text{if $i$ is even,} \quad L _ { i, i + s } = \begin{pmatrix} \gamma _ { s } & 0 \\ 0 & \nu _ { s } \end{pmatrix} \quad \text{if $i$ is odd}$$ (strictly speaking, such OQRWs do not enter into the framework of this article, but in the general case studied in [5]). Then, we define ( A p ) p ∈ N and ( B p ) p ∈ N to be two i.i.d. sequences with same law as A B , respectively, and, if for example X 0 = 0 is even, we define a random variable π to take the values 1 and 2 with probabilities p = 〈 e , ρ 1 ( i 0 ) e 1 〉 , 1 -p respectively. Then, conditioned on π = 1, the variable X p -X 0 has the same law as A 1 + B 2 + A 3 + . . . (where the sum stops at step p ). This explains the formulas given in Theorem 6.7 for situation 1, with L periodic, as well as the next proposition. For the case of irreducible, periodic L we also have a simpler explicit formula for the rate function of large deviations: Lemma 6.9. Assume an open quantum random walk with V = Z d and h = C 2 satisfies assumptions H1 , H2 and is irreducible periodic. Then, with the same notation as in Theorem 6.7, the position process ( X p -X 0 ) p satisfies a full large deviation principle, with rate function $$c ( u ) = \frac { 1 } { 2 } ( \log \mathbb { E } ( \exp \langle u, A \rangle ) ) + \log \mathbb { E } ( \exp \langle u, B \rangle ) ) ).$$ ## Proof: This follows immediately from Theorem 5.4 and equation (6.1) giving λ u . glyph[square] Remark 6.10 . In situation 2 of Lemma 6.3, one sees that the largest eigenvalue λ u is given by (6.2). For u in a neighbourhood of zero, one has ‖ α u ‖ &gt; ‖ β u ‖ , but, if there exists u such that ‖ α u ‖ = ‖ β u ‖ , then λ u may not be differentiable and the large deviations principle may break down: see Example 7.7. A similar phenomenon can also appear in situation 3. ## 7 Examples Example 7.1. We consider the case d = 1, h = C 2 , S = {-1 +1 . , } In this case we can characterize irreducibility and period of the open quantum random walk M through the transition matrices L , s s = ± 1. In this example, we denote L -= L -1 , L + = L +1 . We state the next two propositions without proofs, as these are lengthy. The extension of these statements to finite homogeneous open quantum random walks, as well as the proofs, will be given in a future note. Proposition 7.2. Irreducibility. Define $$W \stackrel { \text{def} } { = } \{ \text{common eigenvectors of } L _ { + } L _ { - } \text{ and } L _ { - } L _ { + } \}.$$ The homogeneous OQRW on Z is reducible if and only if one of the following facts holds - · W contains an eigenvector of L -or L + - · W = C e 0 ∪ C e 1 \ { 0 } , for some linearly independent vectors e 0 and e 1 satisfying L e ,L -0 + 0 e ∈ C e 1 and L e ,L -1 + 1 e ∈ C e 0 . Proposition 7.3. Period. Suppose that the open quantum random walk M is irreducible. Its period can only be 2 or 4 . It is 4 if and only if there exists an orthonormal basis of C 2 such that the representation of the transition matrices in that basis is $$L _ { \varepsilon } = \begin{pmatrix} a & 0 \\ 0 & b \end{pmatrix}, \quad L _ { - \varepsilon } = \begin{pmatrix} 0 & c \\ d & 0 \end{pmatrix}$$ for some ε ∈ { + , -} , where a, b, c, d ∈ C \ { 0 } are such that | a | 2 + | d | 2 = | b | 2 + | c | 2 = 1 . Example 7.4. We consider the standard example from [2], which is treated in section 5.3 of [1]. This open quantum random walk is defined by V = Z , h = C 2 , and transition operators given in the canonical basis e 1 , e 2 of C 2 by $$L _ { + } = \frac { 1 } { \sqrt { 3 } } \begin{pmatrix} 1 & 1 \\ 0 & 1 \end{pmatrix} \quad L _ { - } = \frac { 1 } { \sqrt { 3 } } \begin{pmatrix} 1 & 0 \\ - 1 & 1 \end{pmatrix}.$$ The only eigenvector of L + is e 1 , the only eigenvector of L -is e 2 , so that we are in situation 1 of Proposition 6.1 and L is irreducible. Again L 2 + and L 2 -have no eigenvector in common, so by Lemma 6.6, we conclude that L is aperiodic (and therefore regular, by Lemma 4.11). We observe that ρ inv = 1 2 Id is the invariant state of L . We compute the quantities m and C ∈ R + from Theorem 5.13: $$m = \text{Tr} ( L _ { + } L _ { + } ^ { * } ) - \text{Tr} ( L _ { - } L _ { - } ^ { * } ) = 0.$$ To compute C we need to find the solution η of $$( \text{Id} - \mathfrak { L } ) ( \eta ) = \frac { 1 } { 6 } \begin{pmatrix} 1 & 2 \\ 2 & - 1 \end{pmatrix}$$ satisfying Tr η = 0. We find η = 1 12 ( 5 2 2 -5 ) , and we have $$C = \text{Tr} ( L _ { + } \rho ^ { \text{inv} } L _ { + } ^ { * } + L _ { - } \rho ^ { \text{inv} } L _ { - } ^ { * } ) + 2 \text{Tr} ( L _ { + } \eta L _ { + } ^ { * } - L _ { - } \eta L _ { - } ^ { * } ) = \frac { 8 } { 9 }.$$ By Theorem 5.13, we have the convergence in law $$\frac { X _ { p } - X _ { 0 } } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, \frac { 8 } { 9 } ).$$ To verify the validity of this statement, in Figure 1 we display the empirical cumulative distribution function of a 1000-sample of X p √ 8 p/ 9 conditioned on X 0 = 0 for p = 10 100 1000, and compare it to the cumulative distribution function of , , a standard normal variable. Remark 7.5 . In this and the following simulations, the initial state is assumed to be of the form ρ (0) ⊗| 〉〈 | 0 0 and ρ (0) is chosen randomly as XX ′ Tr( XX ′ ) where X has independent entries with uniform law on [0 1]. , Figure 1: C.D.F. of a 1000-sample of ( X p √ 8 p/ 9 ) p with X 0 = 0, in Example 7.4. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-7dfd6624-b3ab-4959-ad02-68ea164fd42c.jpg) ↦ By Theorem 5.4, the process ( X p -X 0 p ) p satisfies a large deviation property with good rate function equal to the Legendre transform I of u → log λ u , where λ u is the largest eigenvalue of L u . This map L u , written in the canonical basis of the set of two by two matrices, has basis $$\frac { 1 } { 3 } \begin{pmatrix} e ^ { u } + e ^ { - u } & e ^ { u } & e ^ { u } \\ - e ^ { - u } & e ^ { u } + e ^ { - u } & 0 & e ^ { u } \\ - e ^ { - u } & 0 & e ^ { u } + e ^ { - u } & e ^ { u } \\ e ^ { - u } & - e ^ { - u } & - e ^ { - u } & e ^ { u } + e ^ { - u } \end{pmatrix}$$ and by a tedious computation, one shows that λ u equals $$\frac { 1 } { 3 } ( e ^ { u } + e ^ { - u } + ( e ^ { u } + e ^ { - u } + \sqrt { e ^ { 2 u } + e ^ { - 2 u } + 3 } ) ^ { 1 / 3 } - ( e ^ { u } + e ^ { - u } + \sqrt { e ^ { 2 u } + e ^ { - 2 u } + 3 } ) ^ { - 1 / 3 } ).$$ As expected from Lemma 5.3, this is a smooth and strictly convex function. Numerical computations prove that the rate function I has the form displayed in Figure 2. Figure 2: Rate function for ( X p -X 0 p ) p in Example 7.4 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-c11d86c9-110f-435a-951e-44abbd8b233b.jpg) Example 7.6. We consider the open quantum random walk defined by V = Z , h = C 2 , and transition operators given in the canonical basis e 1 , e 2 of C 2 by $$L _ { + } = \begin{pmatrix} \mu & \mu \\ 0 & \sqrt { 3 } / 2 \\ 1 / \sqrt { 2 } & 0 \end{pmatrix} \quad L _ { - } = \begin{pmatrix} 0 & 1 / 2 \\ 1 / \sqrt { 2 } & 0 \end{pmatrix}.$$ From Lemma 6.6, the map L is irreducible and 2-periodic. Then according to Theorem 6.7, defining A and B to be random variables with values in S satisfying $$\mathbb { P } ( A = + 1 ) & = 1 / 2, \quad \mathbb { P } ( A = - 1 ) = 1 / 2, \\ \mathbb { P } ( B = + 1 ) & = 3 / 4, \quad \mathbb { P } ( B = - 1 ) = 1 / 4,$$ with mean, variance, and cumulant generating function $$m _ { A } = 0, \ \ C _ { A } = 1, \ \ c _ { A } ( u ) = \log ( e ^ { u } + e ^ { - u } ) - \log 2$$ $$m _ { B } = 1 / 2, \ C _ { B } = 3 / 4, \ c _ { B } ( u ) = \log ( 3 e ^ { u } + e ^ { - u } ) - 2 \log 2$$ $$\log ( e ^ { u } + e ^ { - u } ) - \log 2 \\ \log ( 3 e ^ { u } + e ^ { - u } ) - 2 \log 2$$ then with the notation of Theorem 6.7 $$m = ( m _ { A } + m _ { B } ) / 2 = 1 / 4 \quad C = ( C _ { A } + C _ { B } ) / 2 = 7 / 8$$ and one has the convergence in law $$\frac { X _ { p } - p / 4 } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, \frac { 7 } { 8 } ).$$ Figure 3: C.D.F. of a 1000-sample of X p -p/ 4 √ 7 p/ 8 with X 0 = 0, in Example 7.6. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-34ccd6d0-0c4d-4d95-8d5f-d20bd5fe9564.jpg) Figure 3 below displays the cumulative distribution function of a 1000-sample of X p -p/ 4 √ 7 p/ 8 , conditioned on X 0 = 0, and the cumulative distribution function of a standard normal variable for p = 10 100 1000. , , In addition, the process ( X p -X 0 p ) p ∈ N satisfies a large deviation property with a good rate function I obtained as the Legendre transform of $$c ( u ) = \frac { 1 } { 2 } ( c _ { A } ( u ) + c _ { B } ( u ) ) = \frac { 1 } { 2 } \left ( \log ( e ^ { u } + e ^ { - u } ) + \log ( 3 e ^ { u } + e ^ { - u } ) \right ) - \frac { 3 } { 2 } \log 2.$$ glyph[negationslash] Explicitly, one finds that I ( ) = + t ∞ for t ∈ -] 1 1[ and for , t ∈ -] 1 +1[: , $$I ( t ) = t \, u _ { t } + \frac { 3 } { 2 } \log 2 - \frac { 1 } { 2 } \left ( \log ( e ^ { u _ { t } } + e ^ { - u _ { t } } ) + \log ( 3 e ^ { u _ { t } } + e ^ { - u _ { t } } ) \right )$$ √ where u t = 1 2 log 2 + t t 2 +3 3(1 -t ) . This rate function has the profile displayed in Figure 4. Example 7.7. Consider the open quantum random walk defined by V = Z , h = C 2 , and transition operators given in the canonical basis e 1 , e 2 of C 2 by $$L _ { + } = \begin{pmatrix} \frac { 1 } { \sqrt { 2 } } & \frac { 1 } { 2 \sqrt { 2 } } \\ 0 & \frac { \sqrt { 3 } } { 2 } \end{pmatrix} \quad L _ { - } = \begin{pmatrix} \frac { 1 } { \sqrt { 2 } } & - \frac { 1 } { 2 \sqrt { 2 } } \\ 0 & 0 \end{pmatrix}.$$ First observe that the map L is not irreducible in this case, as we are in situation 2 of Proposition 6.1. A straightforward computation shows that the largest eigenvalue of L u is $$\lambda _ { u } = \sup ( \frac { e ^ { u } + e ^ { - u } } { 2 }, \frac { 3 e ^ { u } } { 4 } ).$$ For u close to zero λ u is e u +e -u 2 so that λ ′ u = 0 and λ ′′ u = 1 for u = 0. We must therefore have $$\frac { X _ { p } - X _ { 0 } } { \sqrt { p } } \underset { p \rightarrow \infty } { \longrightarrow } \mathcal { N } ( 0, 1 ).$$ Figure 4: Rate function for ( X p -X 0 p ) p in Example 7.6 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-a76e7ec1-cd13-4f32-8a02-ccec933ad03c.jpg) Figure 5 below displays the cumulative distribution function of a 1000-sample of X p √ p , conditioned on X 0 = 0, and the cumulative distribution function of a standard normal variable for p = 10 100 1000. , , Figure 5: C.D.F. of a 1000-sample of ( X p -X 0 √ p ) p with X 0 = 0, in Example 7.7. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-0b6c08e0-6319-43d3-9378-df407d67de5c.jpg) Due to the generalizations discussed at the end of Section 5, we have R = C e 1 , D = C e 2 and the central limit theorem holds: the behavior of the process ( X p ) p , associated with L , is the same as the one of the process ( ˜ X p ) p associated with the restriction L |R . As we commented previously, giving a large deviations result in this case is harder and we cannot use the general results we proved. A G¨rtner-Ellis theorem a could be applied by direct computation of the moment generating functions. In general, however, the rate function for the process ( X p ) p will not coincide with the one for ( ˜ X p ) p , since it will essentially depend on how much time the evolution spends in D . More precisely, for the transition matrices introduced above and taking the initial state ρ = | e 2 〉〈 e 2 | ⊗ | 0 〉〈 0 , we have, by relation (2.6), | $$P ( X _ { n } = n ) = \text{Tr} ( | L _ { + } ^ { n } e _ { 2 } \rangle \langle L _ { + } ^ { n } e _ { 2 } | ) = \left ( \frac { 3 } { 4 } \right ) ^ { n } + \left ( \frac { 1 } { 8 } \right ) 2 ^ { 1 - n } \frac { \sqrt { 3 ^ { n } } - \sqrt { 2 ^ { n } } } { \sqrt { 3 } - \sqrt { 2 } }$$ and consequently $$\lim _ { n } \frac { 1 } { n } \log \mathbb { E } [ e ^ { u X _ { n } } ] \geq \log \left ( \frac { 3 } { 4 } e ^ { u } \right ) \quad \text{for all } u,$$ while lim n n 1 log E [ e uX ˜ n ] = log ( e u + e -u 2 ) , which for u &gt; log 2 is smaller than the bound log ( 3 4 e u ) . This clarifies the fact that the large deviations will not depend only on L |R . Moreover, a second problem arises in this example, which is the lack of regularity of λ u . Indeed, λ u is the supremum of two quantities which coincide for u 0 = 1 2 log 2, and log λ u is not differentiable at u 0 : the left derivative is equal to √ 2 4 and the right derivative to 3 √ 2 4 . The Legendre transform of log λ u is displayed in Figure 6, and we observe that it is not strictly convex. Figure 6: Rate function for ( X p -X 0 p ) p in Example 7.7 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1113v2-figure-e795fa67-3f9f-4f57-8af8-6c6e557a3f4a.jpg) ## References - [1] S. Attal, N. Guillotin, and C. Sabot. Central limit theorems for open quantum random walks and quantum measurement records. Ann. Henri Poincar´ e , 2014. - [2] S. Attal, F. Petruccione, C. Sabot, and I. Sinayskiy. Open quantum random walks. J. Stat. Phys. , 147(4):832-852, 2012. - [3] M. Bauer, D. Bernard, and A. Tilloy. Open quantum random walks: Bistability on pure states and ballistically induced diffusion. Physical Review A -Atomic, Molecular, and Optical Physics , 88(6), 2013. | [4] | B. Baumgartner and H. Narnhofer. The structures of state space concern- ing quantum dynamical semigroups. Rev. Math. Phys. , 24(2):1250001, 30, 2012. | |-------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [5] | R. Carbone and Y. Pautrat. Open Quantum Random Walks: reducibility, period, ergodic properties. ArXiv e-prints , May 2014. | | [6] | E. B. Davies. Quantum stochastic processes. II. Comm. Math. Phys. , 19:83-105, 1970. | | [7] | A. Dembo and O. Zeitouni. Large deviations techniques and applications , volume 38 of Stochastic Modelling and Applied Probability . Springer-Verlag, Berlin, 2010. Corrected reprint of the second (1998) edition. | | [8] | R. S. Ellis. Entropy, large deviations, and statistical mechanics . Classics in Mathematics. Springer-Verlag, Berlin, 2006. Reprint of the 1985 original. | | [9] | D. E. Evans and R. Høegh-Krohn. Spectral properties of positive maps on C ∗ -algebras. J. London Math. Soc. (2) , 17(2):345-355, 1978. | | [10] | F. Fagnola and R. Pellicer. Irreducible and periodic positive maps. Com- mun. Stoch. Anal. , 3(3):407-418, 2009. | | [11] | U. Groh. The peripheral point spectrum of Schwarz operators on C ∗ - algebras. Math. Z. , 176(3):311-318, 1981. | | [12] | S. Gudder. Quantum Markov chains. J. Math. Phys. , 49(7):072105, 14, 2008. | | [13] | F. Hiai, M. Mosonyi, and T. Ogawa. Large deviations and Chernoff bound for certain correlated states on a spin chain. Journal of Mathematical Physics , 48(12):123301, Dec. 2007. | | [14] | V. Jakˇi´, s c Y. Ogata, Y. Pautrat, and C.-A. Pillet. Entropic fluctuations in quantum statistical mechanics. an introduction. Quantum Theory from Small to Large Scales, Lecture Notes of the Les Houches Summer School , Volume 95(978-0-19-965249-5):pp.213-410, 2012. | | [15] | T. Kato. Perturbation theory for linear operators . Classics in Mathematics. Springer-Verlag, Berlin, 1995. Reprint of the 1980 edition. | | [16] | Y. Kifer. Large deviations in dynamical systems and stochastic processes. Trans. Amer. Math. Soc. , 321(2):505-524, 1990. | | [17] | N. Konno and H. Yoo. Limit theorems for open quantum random walks. Journal of Statistical Physics , 150(2):299-319, 2013. | | [18] | K. Kraus. States, effects, and operations , volume 190 of Lecture Notes in Physics . Springer-Verlag, Berlin, 1983. Fundamental notions of quantum theory, Lecture notes edited by A. B¨hm, o J. D. Dollard and W. H. Wootters. | | [19] | B. K¨mmerer u and H. Maassen. A pathwise ergodic theorem for quantum trajectories. J. Phys. A , 37(49):11889-11896, 2004. | | [20] | C. F. Lardizabal and R. R. Souza. On a class of quantum channels, open random walks and recurrence. ArXiv e-prints , Feb. 2014. | | [21] | M. A. Nielsen and I. L. Chuang. Quantum computation and quantum in- formation . Cambridge University Press, Cambridge, 2000. | |--------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [22] | B. Russo and H. A. Dye. A note on unitary operators in C ∗ -algebras. Duke Math. J. , 33:413-416, 1966. | | [23] | R. Schrader. Perron-Frobenius theory for positive maps on trace ideals. In Mathematical physics in mathematics and physics (Siena, 2000) , volume 30 of Fields Inst. Commun. , pages 361-378. Amer. Math. Soc., Providence, RI, 2001. | | [24] | I. Sinayskiy and F. Petruccione. Properties of open quantum walks on Z . Physica Scripta , (T151), 2012. | | [25] | M. van Horssen and M. Guta. A Sanov theorem for output statistics of quantum Markov chainss. ArXiv e-prints , 2014. | | [26] | S. Xiong and W.-S. Yang. Open quantum random walks with decoher- ence on coins with n degrees of freedom. Journal of Statistical Physics , 152(3):473-492, 2013. |
10.1007/s10955-015-1261-6
[ "Raffaella Carbone", "Yan Pautrat" ]
2014-08-05T21:06:37+00:00
2014-10-21T08:44:59+00:00
[ "math.PR", "math.OA" ]
Homogeneous Open Quantum Random Walks on a lattice
We study Open Quantum Random Walks for which the underlying graph is a lattice, and the generators of the walk are translation-invariant. We consider the quantum trajectory associated with the OQRW, which is described by a position process and a state process. We obtain a central limit theorem and a large deviation principle for the position process, and an ergodic result for the state process. We study in detail the case of homogeneous OQRWs on a lattice, with internal space $h={\mathbb C}^2$.
1408.1114v1
![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-8c0353b6-a69e-47c3-bffb-69c078ea3345.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-a1bb2295-6a1e-4967-b666-d8a2c6c1cdf4.jpg) SMU-HEP-14-03 ## Update on nCTEQ PDFs: nuclear PDF uncertainties and LHC applications A. Kusina ∗ a , K. Kovaˇ rík b , T. Ježo , D. B. Clark , F. I. Olness , I. Schienbein c a a d , J. Y. Yu a - a Southern Methodist University, Dallas, TX 75275, USA - b Institut für Theoretische Physik, Westfälische Wilhelms-Universität Münster, Wilhelm-Klemm-Straße 9, D-48149 Münster, Germany - c Department of Physics, University of Durham, Durham DH1 3LE, UK Department of Mathematical Sciences, University of Liverpool, Liverpool L69 3BX, UK - d Laboratoire de Physique Subatomique et de Cosmologie, Université Grenoble-Alpes, CNRS/IN2P3, 53 avenue des Martyrs, 38026 Grenoble, France E-mail: [email protected] [email protected] , , [email protected] [email protected] [email protected] , , , [email protected] [email protected] , We present updated nCTEQ nuclear parton distribution functions with errors including pion production data from RHIC. We compare them with the results of other groups and present selected LHC applications. XXII. International Workshop on Deep-Inelastic Scattering and Related Subjects, 28 April - 2 May 2014 Warsaw, Poland ∗ Speaker. http://pos.sissa.it/ ## 1. Introduction Nuclear parton distribution functions (PDFs) are an important ingredient required for the description of heavy ion collisions done at the LHC and RHIC. They are also important for the precise determination of the free-proton PDFs, as some of the data used in the free-proton fits are obtained using nuclear targets, e.g. neutrino DIS experiments. In this contribution we report on the updated analysis of the nCTEQ nuclear parton distributions and mention some of its application to LHC physics. In the global analysis presented below we are using the same framework (parametrization, etc.) as in the previous nCTEQ fits [1, 2, 3, 4] with the addition of an error analysis. The free-proton baseline PDFs [5] are based on the CTEQ6.1 proton fit [6]. For the error estimate we use the Hessian method that was introduced in refs. [7, 8]. This framework was already briefly discussed in the DIS2013 proceedings [9] and we refer the reader to that text and to refs. [2, 3] for more details about it. The new ingredient presented in the current paper is the addition of the single pion production data from RHIC [10, 11]. The results shown below are still preliminary; the official release of the nCTEQ PDFs will be available later this year. ## 2. Global analysis The bulk of the data used in the current analysis is DIS and DY data on different nuclear targets, 1 which after kinematical cuts gives 708 data points. Additionally we include 32 data points of p 0 production at RHIC [10, 11]. 2 All of these data are included with weight of one in the global c 2 function. We present here two fits: (i) excluding the pion data, and (ii) including the pion data. For both of them we used 16 free fitting parameters, and in both cases it allowed us to obtain very good fits with c 2 / dof respectively equal to 0.87 (without pion) and 0.85 (with pion). In figure 1 we compare the two fits. We show there nuclear correction factors (left panel) and PDFs themselves (right panel) in case of lead at a scale of Q = 10 GeV. We can see that, as expected, the biggest impact of the pion data is seen in case of the gluon PDF where there is a shape change. Additionally, if we compare gluon PDF of the above fits with the gluon from the EPS09 fit [12] (where pion data [10] was included with weight of 20) we will see that the gluon of the fit with pion data is closer to the EPS09 one. In figure 2 we compare the nCTEQ fit including pion data with fits from other groups providing nuclear PDFs [12, 13, 14]. We can see a good agreement between the nCTEQ and both EPS09 [12] and DSSZ [13] PDFs in case of gluon and sea quarks. However there is a big difference in case of the valence distributions, especially for d -valence. This difference is well understood, and it is related to the assumptions for the parametrization used during the fit. In both the EPS09 and DSSZ approaches the nuclear correction for u -valence and d -valence PDFs is universal which means that 1 For details on which data sets are used see Tables I, II and III in ref. [2]. Note also that we do not include here any of the neutrino DIS data. 2 We used the following kinematical cuts: for DIS and DY data Q &gt; 2 GeV and W &gt; . 3 5 GeV, and for the single pion production pT ∈ ( 1 7 15 5 . , . ) GeV. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-521f997b-f847-4e36-9c06-d2abb2fd9350.jpg) x x ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-b0fc7c5f-bbe4-4483-9a06-1436185275c2.jpg) x x Figure 1: Comparison of nCTEQ fits with (violet) and without (gray) pion data. On the left we show nuclear modification factors defined as ratios of proton PDFs bound in lead to the corresponding free proton PDFs, and on the right we show the actual bound proton PDFs for lead. In both cases scale is equal to Q = 10 GeV. the two are tied together, whereas in the nCTEQ framework we treat them as independent (having separate fitting parameters). If we look at the valence distributions obtained by the HKN [14] group, where u -valence and d -valence are also treated as independent, we can see that the nCTEQ distributions lie in between those of HKN and EPS09 or DSSZ. This behavior clearly illustrates the fact that there is not enough data to properly constrain the nuclear PDFs, and shows that error PDFs obtained by each of the groups do not fully quantify the actual uncertainties related with the nuclear PDFs. Errors obtained in our analysis are bigger than in PDFs from other groups, which can be seen as a more conservative representation of the uncertainties. However, for a most realistic estimate of the actual PDF-related uncertainties we should combine errors obtained by different groups. ## 3. Comparison with data and some LHC predictions Here we show how well our fit describes the fitted data. As an example, in figure 3a, we show data for the ratio of F 2 structure functions [15, 16, 17] for iron and deuteron overlaid with our predictions (violet band) and with central predictions of EPS09 and HKN07 fits. We can see that ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-740f568a-57d5-4870-9ea0-462168e2b059.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-b2a86b55-b05a-4cc1-a353-e1fa5ce6a1e5.jpg) x x Figure 2: Comparison of nCTEQ 'pion fit' (violet) with results from other groups: EPS09 [12] (green), DSSZ [13] (orange), HKN07 [14] (blue). The left panel shows nuclear modification factors for lead and the right panel the actual PDFs of a proton bound in lead, both at scale of 10 GeV. our PDFs provide a very good description of the data, also the error bands quite precisely reflect the errors of the data. In figure 3b we look at the pion data that was used during our analysis. In this figure we show the nuclear modification of the pion yield: $$R _ { d \text{Au} } ^ { \pi } = \frac { \frac { 1 } { 2 A } d ^ { 2 } \sigma _ { \pi } ^ { d \text{Au} } / d p _ { T } d y } { d ^ { 2 } \sigma _ { \pi } ^ { \text{pp} } / d p _ { T } d y }$$ measured in RHIC and compare it with predictions computed using our fit and using the EPS09 fit (which also used some of these data). We can see that the experimental errors are very large, especially in case of the STAR data, and this is reflected in our error band (violet). Comparing with EPS09 we can see that our central values are close but EPS09 features much smaller uncertainties. This is caused by the fact that in EPS09 analysis only the PHENIX data was used (with much lower experimental errors) and because the PHENIX data was included with weight of 20, magnifying its impact, whereas we used a weight of 1. As a last thing we present predictions for W + production in lead collisions at the LHC calculated at NLO using our new fit. 3 In a recent ATLAS analysis [19] the rapidity distributions of 3 For calculating NLO distributions for W + and m + the FEWZ code [18] was used. 1 Figure 3: (a) Ratio of F 2 structure functions for iron and deuteron calculated with nCTEQ 'pion fit' overlaid with fitted data and results from EPS09 and HKN07; (b) R p dAu computed with nCTEQ and EPS09 [12] PDFs overlaid with PHENIX [10] and STAR [11] data. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-d7b56f2b-148f-4fe7-b65e-83d8b4141503.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-a9e49518-7bd0-4c96-823e-427f36a6ec15.jpg) Figure 4: Comparison of NLO W + (left) and m + (right) rapidity distributions in case of proton (red) and lead (blue) collisions with √ s = 2 76 TeV. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-44f3aba1-afa2-461a-b206-4ac7b26b9ec8.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1114v1-figure-27f7197f-3c69-4af3-a637-d2314603e0ff.jpg) the muon originating from the decay of W + boson was measured. In this analysis free-proton PDFs were used to estimate a theoretical prediction for this distribution, which was advocated to be sufficient due to the substantial experimental errors and limited knowledge of the nuclear PDFs. However, as can be seen in figure 4 distributions obtained with the free-proton PDFs (red) and with the nuclear PDFs (blue) are very different (even for m + ), and we should become sensitive to these differences with more data. ## 4. Conclusion We have presented a preliminary analysis of nCTEQ nuclear PDFs introducing an error analysis to our framework, and including pion production data that we have not used before. We performed a comparison with the results of other groups [12, 13, 14] and found our PDFs to be in reasonably good agreement with them. Also the discrepancies occurring in the valence distributions are well understood. The estimates of errors provided by our fit are larger than those of other groups. The possible reason for this is related to the number of free parameters used in the fit and with the flexibility of the parametrization itself. The presented results are still preliminary. The official nCTEQ release (providing PDF grids) will appear later this year. ## Acknowledgments This work was partially supported by the U.S. Department of Energy under grant DE-FG0213ER41996, and the Lighter Sams Foundation. ## References - [1] I. Schienbein, et al. , Phys.Rev. D77 (2008) 054013, 0710.4897 . - [2] I. Schienbein, et al. , Phys.Rev. D80 (2009) 094004, 0907.2357 . - [3] K. Kovarik, et al. , Phys.Rev.Lett. 106 (2011) 122301, 1012.0286 . - [4] T. Stavreva, et al. , JHEP 1101 (2011) 152, 1012.1178 . - [5] J. Owens, et al. , Phys.Rev. D75 (2007) 054030, hep-ph/0702159 . - [6] D. Stump, et al. , JHEP 0310 (2003) 046, hep-ph/0303013 . - [7] J. Pumplin, D. Stump, and W. Tung, Phys.Rev. D65 (2001) 014011, hep-ph/0008191 . - [8] J. Pumplin, et al. , Phys.Rev. D65 (2001) 014013, hep-ph/0101032 . - [9] K. Kovarik, et al. , PoS DIS2013 (2013) 274, 1307.3454 . - [10] PHENIX Collaboration Collaboration, S. Adler et al. , Phys.Rev.Lett. 98 (2007) 172302, nucl-ex/0610036 . - [11] STAR Collaboration Collaboration, B. Abelev et al. , Phys.Rev. C81 (2010) 064904, 0912.3838 . - [12] K. Eskola, H. Paukkunen, and C. Salgado, JHEP 0904 (2009) 065, 0902.4154 . - [13] D. de Florian, R. Sassot, P. Zurita, and M. Stratmann, Phys.Rev. D85 (2012) 074028, 1112.6324 . - [14] M. Hirai, S. Kumano, and T.-H. Nagai, Phys.Rev. C76 (2007) 065207, 0709.3038 . - [15] A. Bodek et al. , Phys. Rev. Lett. 50 (1983) 1431. - [16] J. Gomez et al. , Phys. Rev. D49 (1994) 4348-4372. - [17] S. Dasu et al. , Phys. Rev. D49 (1994) 5641-5670. - [18] R. Gavin, Y. Li, F. Petriello, and S. Quackenbush, Comput.Phys.Commun. 182 (2011) 2388-2403, 1011.3540 . - [19] 'Measurement of the W → mn charge asymmetry and centrality dependence in Pb+Pb collisions at √ sNN = 2 76 TeV with the ATLAS detector', preprint ATLAS-CONF-2013-106 CERN, Geneva . (Nov, 2013).
null
[ "A. Kusina", "K. Kovarik", "T. Jezo", "D. B. Clark", "F. I. Olness", "I. Schienbein", "J. Y. Yu" ]
2014-08-05T21:09:41+00:00
2014-08-05T21:09:41+00:00
[ "hep-ph" ]
Update on nCTEQ PDFs: nuclear PDF uncertainties and LHC applications
We present updated nCTEQ nuclear parton distribution functions with errors including pion production data from RHIC. We compare them with the results of other groups and present selected LHC applications.
1408.1116v3
## THE VLASOV-POISSON EQUATION, THE M ¨ BIUS O GEOMETRY AND THE n -BODY PROBLEM IN A NEGATIVE SPACE FORM ## PEDRO PABLO ORTEGA PALENCIA Departamento de Matem´ aticas Universidad de Cartagena Cartagena de Indias, ## COLOMBIA [email protected] ## J. GUADALUPE REYES VICTORIA Departamento de Matem´ aticas UAM-Iztapalapa M´ exico, D.F. MEXICO [email protected] December 30, 2014 Abstract. By using, the Vlasov-Poisson equation defined in either a Riemannian or a semi-Riemannian space R k g , and a Dirac distribution function, we re-obtain the well known and classical equations of motion of a mechanical system with a pairwise acting potential function. We apply this result to the study of an n -body problem in a two dimensional negative space form with the hyperbolic cotangent potential. Following the Klein's geometric Erlangen program, with methods of M¨bius geo ometry and using the Iwasawa decomposition of the M¨bius isometric o group SL (2 , R ) via its representation in one Clifford Algebra, we complete the study of the whole set of M¨bius solutions (relative equilibria) o of the problem begun by Diacu et al. in [5]. ## 1. Introduction The relevance of modern mathematics to physical problems, which require several branches of mathematics for their solution, is ever increasing nowadays. Among those physical problems, is the problem of generalizing the Newton gravitational equations for spaces with non-zero Gaussian curvature as Lobachevsky and Boljai tried in the 19th century (see [4]). In recent years, the problem has been revived and a series of papers have been published using suitable potentials that generalize the Newtonian one. In these, various interesting solutions from the geometric point of view have been obtained. Even though the methods for obtaining the equations of motion in each curved n -body problem has been worked out usging particular methos for each case, and only for constant Gaussian curvature (see [4], [5], and [16]), all the equations of motion obtained converge, in suitable systems of intrinsic coordinates, to the classical and well known equations (12) (see [1] and [9] ), which allow to compare the geometry of the space (geodesic curves) with the dynamics of the physical problem (gradient, in the metric, of the potential). In this paper, by using, the classical Vlasov-Poisson equation defined in a space R k G (Riemannian or semi-Riemannian) and a Dirac distribution function defined on positions and velocities, we re-obtain the equations of motion of the n -body problem, where the particles are moving under the action of a pairwise acting potential. The aim of doing this is to emphasize the hierarchical position of this partial differential equation (see [8]), and to develop in the future suitable methods for studying questions related to the n -body problem on an arbitrary manifold for a large number of interacting mass-particles. We apply this result for studying the motion of n -point masses in a negative space form (space of constant Gaussian curvature; see [6]) moving under the influence of a gravitational potential that naturally extends Newton's law as Kozlov did in [15], and Diacu et al in [4] and [3]. This work completes the earlier study of this problem done by Florin Diacu, Ernesto P´ erez-Chavela and J. Guadalupe Reyes Victoria in [5]. To do this complementation with the help of algebraic methods we formally define the Killing vector fields in H 2 R associated to the true conic motions, through the representation of its isometric group SL (2 , R ) into a suitable Clifford Algebra. For an interesting history of this n -body problem, the reader is referred to the seminal papers of Florin Diacu, et al [2], [3] and [4]. The paper is organized as follows. In section 2, we recall the Vlasov-Poisson equation (VP) in a general non-euclidian space and obtain from it the equations of motion for a general mechanical system with a general pairwise acting potential. We apply this result to directly obtain the equation of motion for the n -body problem in H 2 R with a hyperbolic cotangent potential. In section 3, following the Klein's Erlangen program (see [13]), we work out the representation of the M¨bius group of isometries o SL (2 , R ) of H 2 R into a four dimensional Clifford algebra. This allows us to factorize such group, via the Iwasawa decomposition Theorem, by one-dimensional subgroups, in three different suitable ways, which define three different geometries: the elliptic, the parabolic and the hyperbolic (see [13]). Next, we obtain from the Lie algebra sl (2 , R ), when we project it via the exponential map onto the Lie group SL (2 , R ), the possible five Killing vector fields associated to all one-parameter subgroups, which are the factors of such decomposition. These vector fields define the M¨bius solutions (also called o relative equilibria in the dynamic literature) of the problem. In section 4, by using the same decomposition, we proceed to find the M¨ obius solutions to the problem in H 2 R , by the method of matching the gravitational field with each one of the Killing vector fields obtained in section 3 as it was done before in [5], [16] and [17]. In subsections 4.1, 4.2 and 4.3 we obtain functional algebraic conditions for the existence of the hyperbolic normal M¨ obius solutions, the parabolic nilpotent M¨ obius solutions and the elliptic cyclic M¨bius solutions respectively. o We do the same for the parabolic cyclic M¨bius solutions in subsection 4.4, and for the o hyperbolic cyclic M¨bius solutions in subsection 4.5, and we prove here that, o in this problem, there are no solutions to any of these two types. We note that the non-existence of the aforementioned types of true conic orbits (parabolic cyclic and hyperbolic cyclic) for a two-dimensional negative space form is not a surprise, given the fact in the parabolic euclidian geometry some geometrical features are richer (see [13]). ## 2. Vlasov-Poisson equation and equations of motion for the n -body problem In an euclidian space R k with coordinates x = ( x , x 1 2 , · · · , x k ), the VlasovPoisson equation or equation of self-consistent field has the form (see [8]), $$\frac { \partial F } { \partial t } + \left \langle v, \frac { \partial F } { \partial x } \right \rangle + \left \langle f ( F ), \frac { \partial F } { \partial v } \right \rangle = 0,$$ where f is a functional of the distribution function F of particles moving along the space R k with velocities v = ( v , v 1 2 , · · · , v k ). A simple kind of force f for the Vlasov-Poisson equation (1) is given by $$f ( x, t ) = - \nabla \left ( \int U ( x, y ) \, F ( y, v, t ) \, d v d y \right ),$$ where U = U x,y ( ) defines an interactive pairwise potential. For the non-euclidean space R k g endowed with the Riemannian or Semiriemannian metric g = ( g ij ), which we will call from now on simply metric, we consider the corresponding Vlasov-Poisson equation (see [8]), $$\frac { \partial F } { \partial t } + \left \langle v, \frac { \partial F } { \partial x } \right \rangle _ { g } + \left \langle f ( F ), \frac { \partial F } { \partial v } \right \rangle _ { g } = 0,$$ where &lt;, &gt; g denotes the scalar product in the given metric. We denote by ∇ g z the gradient with respect to the variable z in the metric, and by D dt the corresponding covariant derivative. For one system of n -particles moving along the positions X t i ( ) and velocities V i ( ) in the t k -dimensional space R 3 g endowed with the metric g = ( g ij ) we obtain the equations of motion for the system associated to the VlasovPoisson equation (3). Theorem 1. The solutions of one system of n point particles with weights (masses) m ,m ,m , 1 2 3 · · · , m n moving under the influence of the pairwise acting potential U = U x,y ( ) , along the positions X t i ( ) and velocities V i ( ) t in the space R k g , satisfy the system of n second order differential equations, $$\frac { D V ^ { i } } { d t } = - \sum _ { j = 1 } ^ { n } m _ { j } \nabla _ { x } ^ { g } U ( X ^ { i }, X ^ { j } ).$$ for i = 1 , . . . , n . Proof. We consider, for the force function (2), the particular case when the distribution function of particles moving under the influence of the potential U = U x,y ( ) is, $$F ( t, v, x ) = \sum _ { i = 1 } ^ { n } m _ { i } \delta ( v - V ^ { i } ( t ) ) \, \delta ( x - X ^ { i } ( t ) ),$$ where δ = δ x ( ) is the ordinary Dirac-function, and X t i ( ), V i ( ) t are time dependent vector functions which locate the position and velocity of the i -th particle. The following chain of results hold. For a fixed i = 1 2 3 , , , · · · we have, by using the properties of the Dirac function in the force, $$\text{function in the force}, \\ f ( t, x ) \ & = \ - \$$ where we have used x = X t i ( ), v = V i ( ) t and the corresponding integral has value 1. By a straight forward computation we obtain, $$\begin{array} {$$ where we have used again that x = X t i ( ), v = V i ( ). t On the other hand, $$\left \langle v, \frac { \partial F } { \partial x } \right \$$ for the case when v = V i ( ). t Finally, we have that, $$\text{Finally, we have that,} \\ & \quad \left \langle f ( F$$ for the case when x = X t i ( ). Therefore, when we substitute equations (7), (8) and (9) and factorize n ∑ i =1 m i in equation (3), a sufficient condition for this equation to hold is that $$\begin{array} { l l l } \text{that} \\ 0 & = & \left$$ for all i = 1 2 , , · · · , n . Compare the first and last terms in the right hand side of equation (10) and the second and third ones. If we put v = ˙ X i as above then, for such a number to vanish, it is necessary that $$n$$ $$& ( 1 1 ) & \frac { D V ^ { * } } { d t } = - \sum _ { j = 1 } ^ { \dots } m _ { j } \nabla _ { x } ^ { g } U ( X ^ { i }, X ^ { j } ), \\ & \text{which ends the proof.} & & \Box$$ $$\frac { D V ^ { i } } { d t } = - \sum _ { j = 1 } ^ { n } m _ { j } \nabla _ { x } ^ { g } U ( X ^ { i }, X ^ { j } ),$$ which ends the proof. If x = ( x , x 1 2 , · · · , x k ) is the system of coordinates for R k g , and { Γ l ij } is the Levi-Civita connection compatible with the metric then, for any pair of vectors X and V = ˙ X in R k g , the equalities $$\left ( \frac { D V } { d t } \right ) ^ { i } = \left ( \frac { D \dot { X } } { d t } \right ) ^ { i } = \ddot { x } ^ { i } + \Gamma ^ { i } _ { l j } \dot { x } ^ { l } \dot { x } ^ { j },$$ and $$\sum _ { j = 1 } ^ { n } m _ { j } \nabla _ { x } ^ { g } U ( X ^ { i }, X ^ { j } ) = m _ { j } g ^ { i j } \frac { \partial U } { \partial x ^ { j } }$$ hold, where g -1 = ( g ik ) is the inverse matrix for the metric g and, using the Einstein notation, the summation runs over the upper and lower equal indices. Thus, for this coordinate system, equations (4) can be written, without loss of generality, as $$\ddot { x } ^ { i } + \Gamma ^ { i } _ { l j } \dot { x } ^ { l } \dot { x } ^ { j } = - m _ { k } g ^ { i k } \frac { \partial U } { \partial x ^ { k } }.$$ Remark 1. We observe that the vanishing of the right hand side of equation (12) defines the equations of geodesic curves associated to the metric ( g ij ), whereas the right hand side corresponds to the curved (via the metric) gradient of the potential U . In other words, we are comparing geometry versus dynamics, as in the classical way (see [1] and [9]). Remark 2. We observe that if g ij = δ ij is the euclidian metric, then Γ i lj ≡ 0 and we obtain the classical Newtonian n -body problem. Definition 1. A two dimensional negative space form is a smooth connected surface with negative constant Gaussian curvature. Since the Minding's Theorem (see [6]) states that all surfaces with the same constant Gaussian curvature K are locally isometric, we apply the equations (12) to obtain the equations of motion of the n -body problem in the upper half complex plane $$\mathbb { H } _ { R } ^ { 2 } = \{ w \in \mathbb { C } \, | \, \text{Im} \left ( w \right ) > 0 \}$$ endowed with the conformal Riemannian metric $$- \, d s ^ { 2 } = \frac { 4 R ^ { 2 } } { ( w - \bar { w } ) ^ { 2 } } d w d \bar { w },$$ with conformal factor $$\mu ( w, \bar { w } ) = \frac { 4 R ^ { 2 } } { ( w - \bar { w } ) ^ { 2 } },$$ and with Gaussian constant curvature K = -1 R . The equations of the geodesic curves are given by (see [6]) $$\ddot { w } - \frac { 2 \dot { w } ^ { 2 } } { w - \bar { w } } = 0,$$ $$- \frac { 2 \omega } { w - \bar { w } } = 0,$$ and they are either half circles orthogonal to the real axis ( y = 0) or half lines perpendicular to it. The space H 2 R endowed with the metric (13) is called the Klein upper half plane model for the hyperbolic geometry. (Here we denote by d kj the hyperbolic distance between the points w k and w j in H 2 R .) Following [15], [4] and [5], for the n -body problem on H 2 R of a system of n -particles with respective masses m ,m , 1 2 · · · , m n and positions w 1 ( ) t , w 2 ( ) t , · · · , w n ( ), we use the acting hyperbolic cotangent potential in t the coordinates ( w,w ¯), given by $$V _ { R } ( w, \bar { w } ) = \frac { 1 } { R } \sum _ { 1 \leq k < j \leq n } ^ { n } m _ { k } m _ { j } \coth _ { R } \left ( \frac { d _ { k j } } { R } \right ).$$ A straightforward computation shows that $$( 1 7 ) \stackrel { \rangle } { V } _ { R } ( w, \bar { w } ) = \frac { 1 } { R } \sum _ { 1 \leq k < j \leq n } ^ { n } m _ { k } m _ { j } \frac { ( \bar { w } _ { k } + w _ { k } ) ( \bar { w } _ { j } + w _ { j } ) - 2 ( | w _ { k } | ^ { 2 } + | w _ { j } | ^ { 2 } ) } { [ \Theta _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 1 / 2 } },$$ where (18) Θ ( k,j ) ( w,w ¯) = [( ¯ w k + w k )( ¯ w j + w j ) -2( | w k | 2 + | w j | 2 )] 2 -( ¯ w k -w k ) 2 ( ¯ w j -w j ) 2 defines the singular set of the problem. A direct substitution of equations (15) and (17) together with the conformal factor of the metric (13) in equation (12) shows that the solutions of the system defining the n -body problem in the negative space form H 2 R with acting hyperbolic potential (17), satisfy the system of n second order differential equations, k = 1 , . . . , n , $$\text{incremental equations, } k = 1, \dots, n, \\ \ddot { w } _ { k } - \frac { 2 \dot { w } _ { k } ^ { 2 } } { w _ { k } - \bar { w } _ { k } } \ = \ \frac { 2 } { \mu ( w _ { k }, \bar { w } _ { k } ) } \, \frac { \partial V _ { R } } { \partial \bar { w } _ { k } } = - \frac { ( w _ { k } - \bar { w } _ { k } ) ^ { 2 } } { 2 R ^ { 2 } } \, \frac { \partial V _ { R } } { \partial \bar { w } _ { k } } \\ \ = \ - \frac { 2 ( w _ { k } - \bar { w } _ { k } ) ^ { 3 } } { R } \sum _ { \substack { j = 1 \\ j \neq k } } ^ { n } \frac { m _ { j } ( \bar { w } _ { j } - w _ { j } ) ^ { 2 } ( w _ { k } - w _ { j } ) ( \bar { w } _ { j } - w _ { k } ) } { [ \Theta _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 3 / 2 } }.$$ $$\cdot$$ glyph[negationslash] (19) As we have pointed in Remark 1, the left hand side of equation (19) defines the equations of geodesic curves in H 2 R , whereas the right hand side corresponds to the gradient (in the metric (13)) of the potential V R . ## 3. Invariants of the M¨bius Geometry o In this section we show the geometric invariants (conic curves) of the M¨ obius geometry of H 2 R according to the Klein's Erlangen Program and with the methodology of representing the isometry M¨ obius group into a four dimensional Clifford algebra as in [13]. These invariants will define five Killing vector fields on the hyperbolic half plane. Let $$\text{SL} ( 2, \mathbb { R } ) = \{ A \in \text{GL} ( 2, \mathbb { R } ) \, | \, \det A = 1 \},$$ be the special linear real 2-dimensional group , which is a 3-dimensional simply connected, smooth real manifold. It is well known (see [7]) that the group of proper isometries of H 2 R is the projective quotient group SL(2 , R ) / {± } I . Every class $$A = \left ( \begin{array} { c c } a & b \\ c & d \end{array} \right ) \in \text{SL} ( 2, \mathbb { R } ) / \{ \pm I \}$$ also has an associated unique M¨bius transformation o f A : H 2 R → H 2 R , where $$f _ { A } ( z ) = \frac { a z + b } { c z + d },$$ which satisfies f -A ( z ) = f A ( z ). We now give the representations of the SL(2 , R ) group in a Clifford algebra with two generators, knowing that there are three different Clifford algebras Cglyph[lscript] ( e ), Cglyph[lscript] ( p ), Cglyph[lscript] ( h ), corresponding to the elliptic, parabolic and hyperbolic cases. A Clifford algebra Cglyph[lscript] ( σ ) is a four dimensional linear real space spanned by { 1 , e 0 , e 1 , e 0 e 1 } with the non-commutative product defined by, (see [13] for more details) $$\begin{smallmatrix} 2 \\ \end{smallmatrix}$$ $$e _ { 0 } e _ { 1 } \ = \ - e _ { 1 } e _ { 0 }.$$ $$\lambda _ { 0 } ^ { \prime } \quad & e _ { 0 } ^ { 2$$ For the space R 2 = { ue 0 + ve 1 | u, v ∈ R } , we denote by R e , R p or R h the corresponding Clifford algebra R σ . Therefore, an isomorphic representation of the group SL(2 , R ) with the same product is obtained if we replace the matrix ( a b c d ) by ( a be 0 -ce 0 d ) , which has the advantage of defining the M¨ obius transformation R σ → R σ , given by (see [13] for more details) $$\left ( \begin{array} { c c } a & b e _ { 0 } \\ -$$ In this representation, by the Iwasawa decomposition Theorem (see [11], [12], [13]), we can factorize SL(2 , R ) = ANK so that each matrix factorizes as $$( 2 1 ) \quad \left ( \begin{array} { c c } a & b _$$ with $$\begin{array} {$$ The one dimensional Abelian subgroup A is the normalizer of the nilpotent one dimensional subgroup N , and K is a maximal compact subgroup of SL(2 , R ). In the Lie algebra sl (2 , R ) of SL(2 , R ) we consider the following suitable set of Killing vector fields, $$\left \{ X _ { 1 } = \frac { 1 } { 2 } \left ( \$$ If we consider also the exponential map of matrices, $$\exp \colon s l ( 2, \mathbb { R } ) \to \text{SL} ( 2, \mathbb { R } ),$$ applied to the one-parameter additive subgroups (straight lines) { tX 1 } , { tX 2 } , and { tX 3 } , we obtain the following one-dimensional factor subgroups of the Lie group SL(2 , R ). ## 1. The isometric normal (homothetic) subgroup, $$A = \left \{ \exp ( t X _ { 1 } ) = \left ( \begin{array} { c c } e ^ { t / 2 } & 0 \\ 0 & e ^ { - t / 2 } \end{array} \right ) \right \}$$ which defines the one-parameter family of acting M¨bius transforo mations $$f _ { 1 } ( w, t ) = e ^ { t } w,$$ and associated to the differential equation $$\dot { w } & = w.$$ The flow of the corresponding vector field is a set of straight lines emanating from the origin, as shown in Figure 1. Figure 1. The vector field ˙ w = w . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1116v3-figure-f831e6c5-167c-4c41-8808-1bf7cadcfd56.jpg) ## 2. The isometric nilpotent shift subgroup, $$N = \left \{ \exp ( t X _ { 2 } ) = \left ( \begin{array} { c c } 1 & t \\ 0 & 1 \end{array} \right ) \right \}$$ which defines the one-parameter family of acting M¨bius transforo mations $$f _ { 2 } ( w, t ) = w + t,$$ and associated to the differential equation $$\dot { w } & = 1.$$ The flow of the corresponding vector field is a set of horizontal parallel straight lines, as shown in Figure 2. - 3. The isometric rotation subgroup, $$K = \left \{ \exp ( t X _ { 3 } ) = \left ( \begin{array} { c c } \cos t & e _ { 0 } \sin t \\ e _ { 0 } \sin t & \cos t \end{array} \right ) \right \}$$ Figure 2. The vector field ˙ w = 1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1116v3-figure-f7c725df-e669-43ae-9a1e-935edbbc77e1.jpg) which defines the one-parameter family of acting M¨bius transforo mations $$f _ { 3 } ( w, t ) = \frac { ( \cos t ) \, w + e _ { 0 } \sin t } { ( e _ { 0 } \sin t ) \, w + \cos t },$$ and is associated to the differential equation $$\dot { w } & = e _ { 0 } ( 1 - w ^ { 2 } ).$$ The three different Killing vector fields associated to R e , R p or R h for each corresponding Clifford algebra are as follows. - a. The flow of the corresponding vector field in R e is a set of coaxal circles with focus (in the sense of M¨bius geometry, see [13]) at o the point w = , as shown in Figure 3. i - b. The flow of the corresponding vector field in R p is a set of vertical parabolas with horizontal directrices, as shown in Figure 4. Figure 3. The elliptic vector field ˙ w = e 0 (1 -w 2 ) for e 2 1 = -1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1116v3-figure-3db31726-4119-48a5-9e27-f8b0c20ef1b0.jpg) Figure 4. The parabolic vector field ˙ w = e 0 (1 -w 2 ) for e 2 1 = 0. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1116v3-figure-b43cc823-ddb9-4ecd-a627-3f8f17f06331.jpg) - c. The flow of the corresponding vector field in R h is a set of vertical hyperbolas with asymptotes parallel to the diagonal, as shown in Figure 5. Figure 5. The hyperbolic vector field ˙ w = e 0 (1 -w 2 ) for e 2 1 = 1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1116v3-figure-f30d9d9f-aa35-425c-b7e6-896c1fb2b203.jpg) Via the exponential map, even though every matrix in the Lie Algebra sl (2 , R ) defines a one-parametric subgroup of SL (2 , R ), there are only three classes of one-parametric subgroups in SL (2 , R ) under the conjugation B → MBM -1 (see Kisil [14]). Lemma 1. Any continuous one-parametric subgroup of SL (2 , R ) is conjugated to A N , or K . - 4. M¨ obius solutions of the n -body problem in H 2 R In this section we obtain the whole set of the so called M¨ obius solutions or relative equilibria solutions of the mechanical system (19). For this, we will use the method of matching the gravitational hyperbolic cotangent field with each one of the Killing vector fields associated to the above one-dimensional subgroups as in [5] and [17]. Definition 2. A M¨ obius solution or relative equilibrium for the n -body problem in H 2 R , is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under some one-dimensional subgroup B t ( ) of the group SL (2 , R ) . In other words, the function obtained by the action denoted by z t ( ) = B t w t ( ) ( ) is also a solution of (19). Since, from Lemma 1, the basic one-dimensional parametric subgroups (23), (25) and (27) define, up to conjugation, the whole set of one-dimensional parametric subgroups in SL (2 , R ), we will show in the following subsections the corresponding M¨bius motions associated to such subgroups. From now o on, and for short, we will understand that the whole set of solutions under study are of type M¨bius. o - 4.1. Hyperbolic normal M¨ obius solutions. In this subsection we state conditions for the existence of normal hyperbolic solutions (also called homothetic relative equilibria) for the problem in H 2 R . These conditions were obtained in Diacu et al. [5]. Definition 3. A normal hyperbolic solution for the n -body problem in H 2 R is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under the subgroup A associated to the vector field given by (23). A straightforward substitution of equations (23) in equations (19) shows that a necessary and sufficient condition for the function w = ( w , . . . , w 1 n ) to be a solution of system (19) and, at the same time, a normal hyperbolic solution is that, for every k = 1 , . . . , n, the coordinates satisfy the algebraic functional system glyph[negationslash] $$\frac { \L ^ { \lambda } } { 8 ( w _ { k } - \bar { w } _ { k } ) ^ { 4 } } = \sum _ { \substack { j = 1 \\ j \neq k } } ^ { n } \frac { m _ { j } ( w _ { j } - \bar { w } _ { j } ) ^ { 2 } ( w _ { k } - w _ { j } ) ( \bar { w } _ { j } - w _ { k } ) } { [ \Theta _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 3 / 2 } }.$$ Therefore, we can also call these solutions hyperbolic normal solutions . In [5] it is proved the existence of such motions for 2 and 3 interacting particles in H 2 R . - 4.2. Parabolic nilpotent M¨bius solutions. o In this subsection we show the M¨ obius solutions associated to the subgroup generated by the Killing vector field X 2 which defines the one-parametric family of acting M¨bius o transformations (25) in the upper half plane H 2 R . Definition 4. A Parabolic nilpotent M¨bius solution for the o n -body problem in H 2 R is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under the subgroup N associated to the vector field of equation (25). Again as before, a simple substitution of equations (25) in the system (19) shows that a necessary and sufficient condition for the function w = ( w , . . . , w 1 n ) solution of system (19) to be a Parabolic nilpotent solution, is that the coordinate functions satisfy the algebraic functional system of equations glyph[negationslash] $$( 2 9 ) \sum _ { \substack { - \frac { R } { 4 ( w _ { k } - \bar { w } _ { k } ) ^ { 4 } } } } = & \sum _ { \substack { j = 1 \\ j \neq k } } ^ { n } \frac { m _ { j } ( \bar { w } _ { j } - w _ { j } ) ^ { 2 } ( w _ { k } - w _ { j } ) ( \bar { w } _ { j } - w _ { k } ) } { [ \tilde { \Theta } _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 3 / 2 } }. \\ - & \quad. \quad. \quad. \quad. \quad. \quad.$$ For this reason, we also call these solutions parabolic nilpotent solutions . In [5] it is proved that in this n -body problem there are no parabolic nilpotent solutions. 4.3. Elliptic cyclic M¨ obius solutions. We now discuss the M¨ obius solutions of (19) corresponding to the action of the Killing vector field X 3 associated to the differential equation (27) for the case when e 2 1 = -1. It is not hard to see (Kisil [13]) that in this case such equation becomes $$\dot { w } = 1 + w ^ { 2 }.$$ Definition 5. An elliptic cyclic solution for the n -body problem in H 2 R is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under the subgroup K associated to the vector field given by (30). It is easy to see that a necessary and sufficient condition for a solution of system (19) w = ( w , . . . , w 1 n ) to be an elliptic cyclic solution is that for all k = 1 , . . . , n, the following system of algebraic equations be satisfied glyph[negationslash] $$( 3 1 ) \quad \frac { \varphi _ { 0 } ^ { 2 } \cdots \chi _ { 0 } \cdots \chi _ { 0 } } { ( w _ { k } - \bar { w } _ { k } ) ^ { 4 } } = \sum _ { \substack { j = 1 \\ j \neq k } } ^ { n } \frac { m _ { j } ( \bar { w } _ { j } - w _ { j } ) ^ { 2 } ( w _ { k } - w _ { j } ) ( \bar { w } _ { j } - w _ { k } ) } { [ \Theta _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 3 / 2 } }. \\ \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \ \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \end{$$ We also call these solutions elliptic cyclic solutions . In [5] it is proved the existence of this type of solutions for the n -body problem in the Poincar´ disk e D 2 R of radius R in the complex plane, endowed with the conformal metric $$d s ^ { 2 } = \frac { 4 R ^ { 4 } } { ( R ^ { 2 } - | z | ^ { 2 } ) ^ { 2 } } d z \, d \bar { z },$$ for 2 and 3 bodies, when the isometric acting group is SU (1 1). , Such results can be carried to our space via the M¨bius linear fractional transformation o z : H 2 R → D 2 R $$z = z ( w ) = \frac { - R w + i R ^ { 2 } } { w + i R }.$$ For example, if we know that the circle of the elliptic foliation passing through the points i α and i α (with 1 &lt; α ) is centred at the point i 2 ( α + 1 α ) and has radius r = α 2 +1 , which has equation (see [13]) 2 α $$2 | w | ^ { 2 } + i ( w - \bar { w } ) \, \left ( \alpha + \frac { 1 } { \alpha } \right ) + 2 = 0,$$ then, by applying the transformation (32), we can re obtain the following result for two bodies. Corollary 1. ( Two bodies ) Consider 2 point particles of masses m ,m 1 2 &gt; 0 moving with positions w 1 = w 1 ( ) t and w 2 = w 2 ( ) t respectively in H 2 R , and along circles (33) whose centres are on the imaginary axis. Then the function w = ( w , w 1 2 ) is an elliptic cyclic solution of system (19) with n = 2 , if and only if, for the circle centred at i 2 ( α + 1 α ) of radius = α 2 +1 2 α along which m 1 moves, there is a unique circle centred at i 2 ( β + 1 β ) of radius β 2 +1 2 β , along which m 2 moves, such that, at every time instant, m 1 and m 2 are sited on the same geodesic arc of H 2 R but in opposite sides of the aforementioned isometric circles. Moreover, - (1) if m &gt; m 2 1 &gt; 0 and α are given, then β &lt; α ; - (2) if m 1 = m &gt; 2 0 and α are given, then β = α ; - (3) if m &gt; m 1 2 &gt; 0 and α are given, then β &gt; α . 4.4. Parabolic cyclic M¨bius solutions. o In this subsection we study the M¨ obius solutions of (19) corresponding to the action of the Killing vector field X 3 associated to the differential equation (27) for the case when e 2 1 = 0. It is not hard to see that in this case such that equation becomes into the one (see [13]), $$\dot { w } & = 1 + w ^ { 2 } - \frac { ( w - \bar { w } ) ^ { 2 } } { 4 }.$$ Definition 6. A parabolic cyclic solution for the n -body problem in H 2 R , is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under the subgroup K associated to the vector field of equation (34). We obtain the condition for a solution of equation (19) to be invariant under the Killing vector field (34). Lemma 2. Consider n point particles with masses m ,.. . , m 1 n &gt; 0 , n ≥ 2 , moving in H 2 R with positions w k = w k ( ) t for k = 1 , . . . , n respectively. A necessary and sufficient condition for the function w = ( w , . . . , w 1 n ) to be a parabolic cyclic solution of system (19) , is that for all k = 1 , . . . , n, the following algebraic functional equations glyph[negationslash] $$\text{$jouwny uyeo r w e $junucio nou e q u a v o n s } \\ & - \ \frac { R [ ( w _ { k } - \bar { w } _ { k } ) ^ { 2 } ( 8 - w _ { k } ^ { 2 } + 6 | w _ { k } | ^ { 2 } + 3 \bar { w } _ { k } ^ { 2 } ) - 1 6 ( 1 + w _ { k } ^ { 2 } ) ( 1 + | w _ { k } | ^ { 2 } ) ] } { 1 6 ( w _ { k } - \bar { w } _ { k } ) ^ { 4 } } \\ & = \ \sum _ { \substack { j = 1 \\ j \neq k } } ^ { n } \frac { m _ { j } ( \bar { w } _ { j } - w _ { j } ) ^ { 2 } ( w _ { k } - w _ { j } ) ( \bar { w } _ { j } - w _ { k } ) } { [ \Theta _ { ( k, j ) } ( w, \bar { w } ) ] ^ { 3 / 2 } }$$ $$( 3 5 )$$ are satisfied. 2 Proof. Result follows when we differentiate the equations ˙ w k = 1 + w k -( w k -¯ ) w k 2 4 , for k = 1 , . . . , n , and substitute in the equations of motion (19). This completes the proof. glyph[square] We call also parabolic cyclic solutions to these solutions of system (19) satisfying the conditions (35). We observe that equation (35) is so hard of solve, and instead of trying this, we find explicitly the parabolic cyclic flow of (34) and we propose these type of solutions as in [3]. If we use real coordinates ( u, v ) for w = u + i v , the complex differential equation (34) can be written (see [13]) as the system of real differential equations $$\dot { u } \ & = \ 1 + u ^ { 2 }, \\ \dot { v } \ & = \ 2 u v,$$ $$( 3 6 )$$ which when is integrated for the initial conditions ( u (0) = α, v (0) = β ) has the isometric parametrization $$\alpha + \tan t$$ $$u ( t ) \ = \ \frac { \alpha \, \top \, \upsilon \alpha \, \upsilon } { 1 - \alpha \tan t },$$ $$v ( t ) \ = \ \frac { \beta \, \sec ^ { 2 } t } { ( 1 - \alpha \tan t ) ^ { 2 } }.$$ $$( 3 7 )$$ In this way, the isometric parametrization of the solution of equation (34) with initial condition w (0) = α + iβ is $$w ( t ) = \frac { \alpha + \tan t } { 1 - \alpha \tan t } + i \, \frac { \beta \sec ^ { 2 } t } { ( 1 - \alpha \tan t ) ^ { 2 } }.$$ Let s = tan t be an isometric new variable. Then sec 2 t = 1 + s 2 , and the parametrization (38) becomes $$w ( s ) & = \frac { \alpha + s } { 1 - \alpha s } + i \, \frac { \beta \, ( 1 + s ^ { 2 } ) } { ( 1 - \alpha s ) ^ { 2 } }.$$ Since $$\frac { d s } { d t } \ & = \ 1 + s ^ { 2 }, \\ \frac { d ^ { 2 } s } { d t ^ { 2 } } \ & = \ 2 ( 1 + s ^ { 2 } ) s,$$ $$\frac { a \ast s } { d t ^ { 2 } } \ = \ 2 ( 1 + s ^ { 2 } ) s,$$ $$\text{and} \, w ^ { \prime } & = \frac { d w } { d s }, \, \text{then} \\ & \dot { w } \ = \ \frac { d w } { d s } \frac { d s } { d t } = ( 1 + s ^ { 2 } ) w ^ { \prime }, \\ & \ddot { w } \ = \ \ w ^ { \prime \prime } \, \left ( \frac { d w } { d s } \right ) ^ { 2 } + w ^ { \prime } \, \frac { d ^ { 2 } s } { d t ^ { 2 } } = w ^ { \prime \prime } ( 1 + s ^ { 2 } ) ^ { 2 } + 2 s ( 1 + s ^ { 2 } ) w ^ { \prime }. \\ \text{If we substitute equations} \, ( \mathfrak { U } ) \, \text{$(\mathcal{M}}$} \, \text{and} \, ( \mathfrak { U } ) \, \text{in equations} \, ( \mathfrak { U } ) \, \text{ for all}$$ If we substitute equations (39), (40) and (41) in equations (35) for all k, j = 1 , . . . , n, the respective real parts become glyph[negationslash] $$\Psi, _ { J } - \epsilon, & \dots, \epsilon, \max \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \sin \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \tan \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \ sin \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \ cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \osigma \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \cos \, \exp \, \, \cos \, \cos \, \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \sin \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \exp \, \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \sin \sin \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \cos \sin \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \in \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \ln \| } \, \end{ \cdot } \, \begin{matrix}, _ { r }, _ { l }, _ { r }, & \dots, _ { r }, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dts, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dtd, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dcd, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \delta, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dists, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dcl, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ { r }, & \dots, _ {$$ whereas the imaginary parts are glyph[negationslash] $$& \text{whereas the imaginary parts are} \\ & - \ \frac { R ( 1 + \alpha _ { k } ^ { 2 } ) [ ( 1 + \alpha _ { k } ^ { 2 } ) ( 1 - \alpha _ { k } \, s ) ^ { 2 } + 2 ] ( 1 - \alpha _ { k } \, s ) ^ { 2 } } { 6 4 \beta _ { k } ^ { 2 } ( 1 + s ^ { 2 } ) ^ { 4 } } \\ & = \ \sum _ { j \neq k } \frac { m _ { j } \beta _ { j } ^ { 2 } } { [ \Theta _ { ( k, j ) } ( \alpha, \beta ) ] ^ { 3 / 2 } ( 1 - \alpha _ { j } \, s ) ^ { 4 } } \times \\ & \times \ \left [ \left ( \frac { \alpha _ { j } + s } { 1 - \alpha _ { j } \, s } - \frac { \alpha _ { k } + s } { 1 - \alpha _ { k } \, s } \right ) ^ { 2 } - ( 1 + s ^ { 2 } ) \left ( \frac { \beta _ { j } ^ { 2 } } { ( 1 - \alpha _ { j } s ) ^ { 4 } } - \frac { \beta _ { k } ^ { 2 } } { ( 1 - \alpha _ { k } s ) ^ { 4 } } \right ) \right ] \\ & \text{where}$$ where $$\begin{array} { r c l } \text{where} \\ \Theta _ { ( k, j ) } ( \alpha, \beta ) & = & \left [ 4 \left ( \frac { \alpha _ { j } + s } { 1 - \alpha _ { j } s } \right ) \left ( \frac { \alpha _ { k } + s } { 1 - \alpha _ { k } s } \right ) - 2 \Xi _ { ( k, j ) } ( \alpha, \beta, s ) \right ] ^ { 2 } \\ & - & \frac { 1 6 \beta _ { k } ^ { 2 } \beta _ { j } ^ { 2 } ( 1 + s ^ { 2 } ) ^ { 4 } } { ( 1 - \alpha _ { k } s ) ^ { 4 } ( 1 - \alpha _ { j } s ) ^ { 4 } } \\ \end{array}$$ is the corresponding evaluation of the singular part (18) in the 2 n -dimensional parametric vector ( α, β ) and $$\Xi _ { ( k, j ) } ( \alpha, \beta, s ) = \left ( \frac { \alpha _ { j } + s } { 1 - \alpha _ { j } s } \right ) ^ { 2 } + \left ( \frac { \alpha _ { k } + s } { 1 - \alpha _ { k } s } \right ) ^ { 2 } + \frac { \beta _ { j } ^ { 2 } ( 1 + s ^ { 2 } ) ^ { 2 } } { ( 1 - \alpha _ { j } s ) ^ { 4 } } + \frac { \beta _ { k } ^ { 2 } ( 1 + s ^ { 2 } ) ^ { 2 } } { ( 1 - \alpha _ { k } s ) ^ { 4 } }.$$ We obtain the following result. Theorem 2. There are not parabolic cyclic solutions for the n -body problem in H 2 R . Proof. Consider n point particles with masses m ,.. . , m 1 n &gt; 0, n ≥ 2, moving in H 2 R under the influence of the hyperbolic cotangent potential with positions w k = w k ( ) for t k = 1 , . . . , n respectively, and satisfying the equations (42) and (43). Since the cyclic parabolic flow (34) carries the whole set of solutions to the right positive half plane as t goes to infinity, without loss of generality we can suppose that the k -th particle is one of the last reaching the imaginary axis. If we take these configuration as initial conditions, then α k = 0 and α j ≥ 0 for s = 0. Therefore, for these initial conditions equation (42) becomes glyph[negationslash] $$0 = \sum _ { j \neq k } \frac { m _ { j } \beta _ { j } ^ { 2 } } { [ \Theta _ { ( k, j ) } ( \alpha, \beta ) ] ^ { 3 / 2 } } \alpha _ { j },$$ which implies necesarilly that α j = 0 for all j = 1 2 , , · · · , n . This is, if one particle reaches the imaginary axis for some time, then the whole set of particles are sited also on the imaginary axis at the same time. This implies that we can suppose, in the early, that all the particles are sited along the imaginary axis, and the isometric parametrizations are w j = s + (1 + i s 2 ) β j and w k = s + (1 + i s 2 ) β k respectively. If this is the case, then, for s = 0 and α j = 0 in the imaginary parts (43), we have that glyph[negationslash] $$\frac { R } { 6 4 \beta _ { k } ^ { 2 } } = - \sum _ { j \neq k } \frac { m _ { j } \beta _ { j } ^ { 2 } } { 4 [ \beta _ { j } ^ { 2 } - \beta _ { k } ^ { 2 } ] ^ { 2 } }.$$ The left hand side of equation (46) is positive whereas the right hand side is negative. This contradiction proves the claim and ends the proof. glyph[square] 4.5. Hyperbolic cyclic M¨bius solutions. o In this subsection we study the M¨ obius solutions of (19) corresponding to the action of the Killing vector field X 3 associated to the differential equation (27) for the case when e 2 1 = 1. It is not hard to see that in this case such that equation becomes into the one (see [13]), $$\dot { w } & = 1 + w ^ { 2 } - \frac { ( w - \bar { w } ) ^ { 2 } } { 2 }.$$ Definition 7. An hyperbolic cyclic solution for the n -body problem in H 2 R , is a solution w t ( ) = ( w 1 ( ) t , w 2 ( ) t , · · · , w n ( )) t of the equations of motion (19) which is invariant under the subgroup K associated to the vector field of equation (47). We obtain the condition for a solution of equation (19) to be invariant under the Killing vector field (47). Lemma 3. Consider n point particles with masses m ,.. . , m 1 n &gt; 0 , n ≥ 2 , moving in H 2 R with positions w k = w k ( ) t for k = 1 , . . . , n respectively. A necessary and sufficient condition for the function w = ( w , . . . , w 1 n ) to be an hyperbolic cyclic solution of system (19) , is that for all k = 1 , . . . , n, the following algebraic functional equations glyph[negationslash] $$\ v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v b v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v k v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v t v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v w v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v h v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v V v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v vv v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v u v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v var v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v a v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v y v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v p v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v m v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v \vdash \\ \, \, \,$$ are satisfied. Proof. Result follows when we differentiate the equations ˙ w k = 1 + w 2 k -( w k -¯ ) w k 2 2 , for k = 1 , . . . , n , and substitute in the equations of motion (19). This completes the proof. glyph[square] Once again, we call hyperbolic cyclic solutions to these solutions of system (19) satisfying the system (48). As in the cyclic parabolic case, we observe that equation (48) is also hard of solving, and again as there, instead of trying this, we will find explicitly the solutions of the cyclic hyperbolic flow (47) and we will propose these type of solutions. In this case, for the real coordinates ( u, v ) in w = u + i v , the complex differential equation (47) can be written (see [13]) as the system of real differential equations $$\dot { u } \ & = \ 1 + u ^ { 2 } + v ^ { 2 }, \\ \dot { v } \ & = \ 2 u v,$$ which when is integrated for the initial conditions $$u ( 0 ) + v ( 0 ) \ & = \ \alpha, \\ u ( 0 ) - v ( 0 ) \ & = \ \beta,$$ has the isometric parametrization $$u ( t ) & \ = \ \frac { 1 } { 2 } \left [ \frac { \tan t + \alpha } { 1 - \alpha \tan t } + \frac { \tan t + \beta } { 1 - \beta \tan t } \right ], \\ v ( t ) & \ = \ \frac { 1 } { 2 } \left [ \frac { \tan t + \alpha } { 1 - \alpha \tan t } - \frac { \tan t + \beta } { 1 - \beta \tan t } \right ]. \\ \cdots \cdots \quad. & \quad. \quad. \quad. \quad. \quad. \quad. \quad. \.$$ In this way, by using equations (50), the isometric parametrization of the solution of equation (47) with initial condition w (0) = u (0) + iv (0) is $$( 5 2 ) \ w ( t ) = \frac { 1 } { 2 } \left [ \frac { \tan t + \alpha } { 1 - \alpha \tan t } + \frac { \tan t + \beta } { 1 - \beta \tan t } \right ] + \frac { i } { 2 } \left [ \frac { \tan t + \alpha } { 1 - \alpha \tan t } - \frac { \tan t + \beta } { 1 - \beta \tan t } \right ].$$ Let s = tan t be again the isometric new variable as before. Then the parametrization (52) becomes $$w ( s ) = \frac { 1 } { 2 } \left [ \frac { s + \alpha } { 1 - \alpha s } + \frac { s + \beta } { 1 - \beta s } + i \left ( \frac { s + \alpha } { 1 - \alpha s } - \frac { s + \beta } { 1 - \beta s } \right ) \right ].$$ For the arbitrary index l = 1 2 , , · · · , n , we define the equalities, $$\ A _ { l } \ = \ A _ { l } ( s ) = \frac { 1 } { 2 } \frac { \alpha _ { l } + s } { 1 - \alpha n s }$$ $$A _ { l } \ & = \ \ A _ { l } ( s ) = \frac { 1 } { 2 } \frac { \alpha _ { l } + s } { 1 - \alpha _ { l } s } \\ B _ { l } \ & = \ \ B _ { l } ( s ) = \frac { 1 } { 2 } \frac { \beta _ { l } + s } { 1 - \beta _ { l } s } \\ C _ { l } \ & = \ \ C _ { l } ( s ) = A _ { l } + B _ { l } \\ D _ { l } \$$ (54) and if we substitute equations (53), (40) and (41) together with the equations (54) in equations (48), for all k, j = 1 , . . . , n, the respective real parts for l = k become glyph[negationslash] $$( 5 4 ) & \text{ in equations } ( 4 8 ), \text{ for all } k, j = 1, \dots, n, \text{ the respective real parts for} l = k \text{ become} \\ & \quad ( 1 + s ^ { 2 } ) ^ { 2 } \left ( \frac { \alpha _ { k } ( 1 + \alpha _ { k } ^ { 2 } ) } { ( 1 - \alpha _ { k } s ) ^ { 3 } } + \frac { \beta _ { k } ( 1 + \beta _ { k } ^ { 2 } ) } { ($$ On the other hand, the corresponding imaginary parts are glyph[negationslash] $$& \text{On the other hand, the corresponding imaginary parts are} \\ & \quad ( 1 + s ^ { 2 } ) ^ { 2 } \left ( \frac { \alpha _ { k } ( 1 + \alpha _ { k } ^ { 2 } ) } { ( 1 - \alpha _ { k } s ) ^ { 3 } } - \frac { \beta _ { k } ( 1 + \beta _ { k } ^ { 2 } ) } { ( 1 - \beta _ { k } s ) ^ { 3 } } \right ) \\ & + \quad s ( 1 + s ^ { 2 } ) \left ($$ Here, Θ ( k,j ) ( α, β ) is again the corresponding evaluation of the singular function (18) in the 2 n -parametric vector ( α, β ). We obtain the following result. Theorem 3. There are not hyperbolic cyclic solutions for the n -body problem in H 2 R . Proof. The proof follows the same method as for Theorem 2. Regardless we give it here. Consider again n point particles with masses m ,.. . , m 1 n &gt; 0, n ≥ 2, moving in H 2 R under the influence of the hyperbolic cotangent potential and satisfying the equations (55) and (56). Since the cyclic hyperbolic flow also carries all these solutions to the right positive half plane as t goes to infinity, without loss of generality we can suppose that the k -th particle is one of the last reaching the imaginary axis, this is, u k (0) = 0. If we take these configuration as initial conditions, then for s = 0 we have the values $$\sim \underset { \begin{array} { c c c c } \sim \\ \sim \\ \end{array} } \sim \underset { \begin{array} { c c c c c } \sim \\ \end{array} } \sim \underset { \begin{array} { c c c c c } \sim \\ \end{array} } \sim \underset { \begin{array} { c c c c c c } \sim \\ \end{array} } \sim \underset { \begin{array} {$$ glyph[negationslash] which implies that 0 = C k ≤ C j (0) = A j (0) + B j (0) for all j = k . Therefore, for these initial conditions the real equation (55) becomes glyph[negationslash] $$0 = \sum _ { j \neq k } \left ( \frac { \alpha _ { j } + s } { 1 - \alpha _ { j } s } - \frac { \beta _ { j } + s } { 1 - \beta _ { j } s } \right ) ^ { 2 } \, \frac { m _ { j } } { [ \Theta _ { ( k, j ) } ( \alpha, \beta ) ] ^ { 3 / 2 } } ( - \beta _ { k } ) C _ { j },$$ glyph[negationslash] which implies that C j (0) = A j (0) + B j (0) = u j (0) = 0 for all j = k , and therefore, if the k -particle reaches the imaginary axis for some time, the whole set of particles also must reach the imaginary axis for this same time. This also implies that α j = -β j &gt; 0 for all j = 1 2 , , · · · , n . On the other hand, if we consider again for s = 0 the initial conditions w k (0) = iβ k , w j (0) = iβ j , such that β j ≤ β k , then C j = C k = 0 and D j ≤ D k . If we substitute in the imaginary parts (56), then it follows that $$D _ { j } \leq D _ { k }. \text{ If we substitute in the imaginary parts (\theta ), then it follows th} \\ ( \alpha _ { k } - \beta _ { k } ) ( 1 + \beta _ { k } ^ { 2 } ) + \frac { 8 ( 1 + \alpha _ { k } ^ { 2 } ) ( 1 + \beta _ { k } ^ { 2 } ) } { ( \alpha _ { k } - \beta _ { k } ) } \\ = \ - \frac { 2 ( \alpha _ { k } - \beta _ { k } ) ^ { 3 } } { R } \sum _ { j \neq k } ( \alpha _ { j } - \beta _ { j } ) ^ { 2 } \frac { m _ { j } [ D _ { k } ^ { 2 } - D _ { j } ^ { 2 } ] } { [ \Theta _ { ( k, j ) } ( \alpha, \beta ) ] ^ { 3 / 2 } }, \\ \text{which is a contradiction because again the left hand side of this last one}$$ $$\dots$$ glyph[negationslash] which is a contradiction, because again, the left hand side of this last equation is positive whereas that the right hand side is negative. This contradiction proves the claim and ends the proof. glyph[square] 4.6. Conclusions. Summarizing the results of this section, we obtain that the unique M¨bius solutions for the o n -body problem in H 2 R are either elliptic cyclic, normal hyperbolic or the compositions of these (loxodromic). This shows that for the whole study of the M¨bius solutions, it should be sufficient o considering the Cartan-Haussdorf decomposition SL (2 , R ) = KAK , which uses only the subgroups A and K. Such last decomposition is connected with the geometry of the complex unit disk (see [10]). In words of the classical mechanics (see [3]) by Minding's Theorem, this can be paraphrased as: Theorem 4. The unique relative equilibria for the curved n -body problem in a two dimensional space of negative constant Gaussian curvature are: the elliptic, homothetic or loxodromic solutions. Acknowledgments. The authors acknowledge to professors, Alexander (Sasha) Sinitsyn from Universidad Nacional de Colombia for his helpful comments throughout the preparation of this work, and Antonio Hern´ndez a from UAM-Iztapalapa, M´ exico, for his help in correcting the literary part of this paper. On the other hand, the second author J. Guadalupe Reyes Victoria acknowledges also the total support received from the UNICARTAGENA, Colombia, for the realization of this paper. ## References - [1] Abraham, R., Marsden, J., Foundation of Mechanics, 2nd edition, Benjamin/Cummings Pub. Co. Inc., Ad. Book Program, Reading, Mass., (1978). - [2] F. Diacu, Polygonal homographic orbits of the curved n -body problem, Trans. Amer. Math. Soc. 364 (2012), 2783-2802. - [3] F. Diacu and E. P´rez-Chavela, Homographic solutions of the curved 3-body problem, e J. Differential Equations 250 (2011), 340-366. - [4] F. Diacu, E. P´ erez-Chavela and M. Santoprete, The n-body problem in spaces of constant curvature, arXiv:0807.1747, 54 pages. - [5] Diacu, F., P´rez-Chavela, E., Reyes, J.G., An intrinsic approach in the curved e n -body problem. The negative case. Journal of Differential Equations , 252 , 4529-4562, (2012). - [6] M. Do Carmo, Riemannian Geometry , Birkhauser 1992. - [7] B. Dubrovin, A. Fomenko, and P. Novikov, Modern Geometry, Methods and Applications , Vol. I, Springer-Verlag, New York, 1984. - [8] E. Dulov, A. Sinitsyn, V. Vedenyapin, Kinetic Boltzmann, Vlasov and related equations, Elsevier, USA, 2011 . - [9] Einstein, A., Rosen, N., The particle problem in the general theory of relativity, Physical Review, 48, (1935) - [10] Fulton, W., Harris, J., Representation Theory, A first course, Graduate Texts in Mathematics. Readings in Mathematics, Springer-Verlag, v. 129, New York, (1991). - [11] Husemoller, D., Joachim, M., Jurco, B., Schottenloher, M., Gram-Schmidt Process, Iwasawa Decomposition, and Reduction of Structure in Principal Bundles, Basic Bundle Theory and K-Cohomology Invariants, Lecture Notes in Physics Volume 726, pp 189-201, 2008. - [12] Iwasawa, K., On some types of topological groups, Ann. of Math., 50, pp. 507-558, 1949. - [13] V. Kisil, Erlangen Program at Large-1: Geometry of invariants, SIGMA 6, 2010. - [14] V. Kisil, The Geometry of M¨bius Transformations, Elliptic, Parabolic and Hypero bolic Actions of SL (2 , R ), Imperial College Press, UK, (2012). - [15] Kozlov, V., O-Harin, A., Kepler's Problem in constant curvature spaces, Cel. Mech. Dynam. Astronom., 54 (1992), 393-399. - [16] P´ erez-Chavela, E., Reyes-Victoria, J.G., An intrinsic approach in the curved n -body problem. The positive curvature case. Transactions of the American Math Society , 364 , 3805-3827, (2012). - [17] E. Perez-Chavela and J. Guadalupe Reyes-Victoria, M¨bius solutions of the curved o n -body problem for positive curvature, arXiv:1207.0737, 2012.
null
[ "Pedro Pablo Ortega Palencia", "J. Guadalupe Reyes Victoria" ]
2014-08-05T21:12:22+00:00
2014-12-26T17:33:54+00:00
[ "math.DS" ]
The Vlasov-Poisson equation, the Moebius Geometry and then-body problem in a negative space form
By using, the Vlasov-Poisson equation defined in either a Riemannian or a semi-Riemannian space $\mathbb{R}^k_g$, and a Dirac distribution function, we re-obtain the well known and classical equations of motion of a mechanical system with a pairwise acting potential function. We apply this result to the study of an $n$--body problem in a two dimensional negative space form with the hyperbolic cotangent potential. Following the Klein's geometric Erlangen program, with methods of M\"{o}bius geometry and using the Iwasawa decomposition of the M\"{o}bius isometric group $SL(2,\mathbb{R})$ via its representation in one Clifford Algebra, we complete the study of the whole set of M\"{o}bius solutions (relative equilibria) of the problem begun by Diacu {\it et al.} in \cite{Diacu8}.
1408.1117v1
## Lebesgue and Hardy Spaces for Symmetric Norms II: A Vector-Valued Beurling Theorem Yanni Chen, Don Hadwin, and Ye Zhang Abstract. Suppose α is a rotationally symmetric norm on L ∞ ( T ) and β is a 'nice' norm on L ∞ (Ω , µ ) where µ is a σ -finite measure on Ω. We prove a version of Beurling's invariant subspace theorem for the space L β ( µ, H α ) . Our proof uses the version of Beurling's theorem on H α ( T ) in [ 4 ] and measurable cross-section techniques. Our result significantly extends a result of H. Rezaei, S. Talebzadeh, and D. Y. Shin [ 8 ]. ## 1. Introduction Among the classical results that exemplify strong links between complex analysis and operator theory, one of the most prominent places is occupied by the description of all shift-invariant subspaces in the Hardy spaces and its numerous generalizations (see [ 1 ], [ 7 ], [ 9 ] and [ 11 ]). The original statement concerning the space H 2 of functions on the unit disk D was proved by A. Beurling [ 2 ], [ 6 ], and was later extended to H p classes by T. P. Srinivasan [ 10 ]. Further generalizations covering the vector-valued Hardy spaces (attributed to P. Lax, H. Helson, D. Lowdenslager, P. R. Halmos, J. Rovnyak and L. de Branges, but usually referred to as the Halmos-Beurling-Lax Theorem) were used to obtain a functional model for a class of subnormal operators. In [ 4 ], the first author extended the H p result by replacing the p -norms with continuous rotationally symmetric norms α on L ∞ ( m ), where m is Haar measure on the unit circle T , and defining H α to be the α -completion of the set of polynomials. Recently, H. Rezaei, S. Talebzadeh, D. Y. Shin [ 8 ] described certain shift-invariant subspaces of H 2 ( D , H ) where H is a separable Hilbert space and D is the open unit disk in the complex plane C . In this paper, we prove a very general version of Beurling's theorem that includes the results in [ 8 ] and [ 4 , Theorem 7.8] as very special cases. A key ingredient is the theory of measurable cross-sections [ 2 ]. 2000 Mathematics Subject Classification. Primary 47A15, 30H10; Secondary 46E15. Key words and phrases. Hardy space, rotationally symmetric norm, Beurling's theorem, invariant subspace, measurable cross-section. This work supported in part by a UNH Dissertation Fellowship, the Eric Nordgren Research Fellowship, and a grant from the Simons Foundation. ## 2. Preliminaries For 1 ≤ p &lt; ∞ , the Hardy space H p := H p ( D ) is the space of all holomorphic functions f : D → C for which $$\| f \| _ { H ^ { p } } & \coloneqq \lim _ { r \to 1 } ( \frac { 1 } { 2 \pi } \int _ { 0 } ^ { 2 \pi } | f ( r e ^ { i \theta } ) | ^ { p } d \theta ) ^ { \frac { 1 } { p } } < \infty. \\ \intertext { n c t i o n } \phi & \in H ^ { 2 } \text{ is a bounded analytic function on $\mathbb{D}$ with no}$$ An inner function φ ∈ H 2 is a bounded analytic function on D with non-tangential boundary values of modulus 1 a.e. m , where m is normalized arc-length measure on the unit circle T . Suppose (Ω , µ ) is a σ -finite measure space such that L 1 ( µ ) is separable. Let L ∞ 0 ( µ ) denote the set of (equivalence classes of) bounded measurable functions f : Ω → C such that µ ( f -1 ( C \ { 0 ) } ) &lt; ∞ , and let β be a norm on L ∞ 0 ( µ ) such that - (1) β ( f ) = β ( | f | ) , - (2) lim µ E ( ) → 0 β ( χ E ) = 0, - (3) β ( f n ) → 0 implies χ E n f → 0 in measure for each E with µ E ( ) &lt; ∞ . Examples of such norms are the norms ‖·‖ p when 1 ≤ p &lt; ∞ . We define L β ( µ ) to be the completion of L ∞ 0 ( µ ) with respect to β . At this point we do not know that the elements of L β ( µ ) can be represented as measurable functions. This follows from part (5) of the following lemma, which also includes some basic facts about such norms β . Lemma 1 . The following statements are true for (Ω , µ ) and β as above. - (1) If | f | ≤ | g | , then β ( f ) ≤ β ( g ) whenever f, g ∈ L ∞ 0 ( µ ) ; - (3) The multiplication wf = fw can be extended from part (2) to the case where f ∈ L β ( µ ) and w ∈ L ∞ ( µ ) , so that β ( wf ) ≤ ‖ w ‖ ∞ β ( f ) still holds, i.e., L β ( µ ) is an L ∞ ( µ ) -bimodule ; - (2) β ( wf ) ≤ ‖ w ‖ ∞ β ( f ) whenever f ∈ L ∞ 0 ( µ ) and w ∈ L ∞ ( µ ) ; - (4) If { E n } is a sequence of measurable sets such that µ E ( n ∩ F ) → 0 for every F with µ F ( ) &lt; ∞ , then β ( χ E n f ) → 0 for every f ∈ L β ( µ ) ; - (5) If { f n } is a β -Cauchy sequence in L ∞ 0 ( µ ) and χ E n f → 0 in measure for each E with µ E ( ) &lt; ∞ , then β ( f n ) → 0; - (6) If | f | ≤ | g | and g ∈ L β ( µ ) , then f ∈ L β ( µ ) and β ( f ) ≤ β ( g ) ; - (7) If h ∈ L β ( µ , ) { f n } is a sequence, | f n | ≤ h for n ≥ 1 and χ E | f n -f | → 0 in measure for every E ⊂ Ω with µ E ( ) &lt; ∞ , then f ∈ L β ( µ ) and β ( f n -f ) → 0; - (8) L β ( µ ) is a separable Banach space. Proof. (1) . If | f | ≤ | g | , then there are two measurable functions u, v with | u | = | v | = 1 and f = g ( u + ) v / 2, which implies β ( f ) ≤ [ β ( | ug | ) + β ( | vg | )] / 2 = β ( | g | ) = β ( g ) . - (2). Since | wf | ≤ ‖ w ‖ | f | , it follows from part (1) that - ∞ β ( wf ) ≤ β ( ‖ w ‖ ∞ | f | ) = ‖ w ‖ ∞ β ( f ) . - (3). The mapping M w : L ∞ 0 ( µ ) → L ∞ 0 ( µ ) defined by M f w = wf = fw is bounded on L ∞ 0 ( µ ) equipped with the norm β, so it has a unique bounded linear extension to the completion L β ( µ . ) - (4) . Suppose { E n } is a sequence of measurable sets such that µ E ( n ∩ F ) → 0 for every F with µ F ( ) &lt; ∞ . Define T n : L β ( µ ) → L β ( µ ) by T f n = χ E n f . The set E = { f ∈ L β ( µ ) : β ( T f n ) → 0 } is a closed linear subspace. If f ∈ L ∞ 0 ( µ ), then there is a set F with µ F ( ) &lt; ∞ such that f = χ F f, so $$\beta \left ( T _ { n } f \right ) \leq \left \| f \right \| _ { \infty } \beta \left ( \chi _ { E _ { n } \cap F } \right ) \rightarrow 0$$ since µ E ( n ∩ F ) → 0. Hence $$L ^ { \beta } \left ( \mu \right ) \subset L _ { 0 } ^ { \infty } \left ( \mu \right ) ^ { - \beta } \subset \mathcal { E }.$$ - (5). By definition there is an f ∈ L β ( µ ) such that β ( f n -f ) → 0 . Choose M so that sup n ≥ 1 β ( f n ) &lt; M &lt; ∞ . At this point we do not know that f is a measurable function. Suppose µ F ( ) &lt; ∞ and ε &gt; 0. It easily follows from part (4) that there is a δ &gt; 0 such that when E ⊂ F and µ E ( ) &lt; δ , we have β ( χ E f ) &lt; ε/ 4. There is an N ∈ N such that n ≥ N = ⇒ β ( f n -f ) &lt; ε/ 4. Thus n ≥ N and E ⊂ F and µ E ( ) &lt; δ implies $$\beta \left ( \chi _ { E } f _ { n } \right ) \leq \beta \left ( \chi _ { E } \left ( f _ { n } - f \right ) \right ) + \beta \left ( \chi _ { E } f \right ) < \varepsilon / 4 + \varepsilon / 4 = \varepsilon / 2.$$ Since f n χ F → 0 in measure, there is an N 1 &gt; N such that if n ≥ N 1 and if F n = { x ∈ F : | f n ( x ) | ≥ ε/ 4 β ( χ F ) } , then µ F ( n ) &lt; δ . Thus n ≥ N 1 implies $$\beta \left ( \chi _ { F } f _ { n } \right ) \leq \beta \left ( \chi _ { F _ { n } } f _ { n } \right ) + \left ( \varepsilon / 4 \beta \left ( \chi _ { F } \right ) \right ) \beta \left ( \chi _ { F } \right ) < \varepsilon.$$ So χ F f = 0 for every F ⊂ Ω with µ F ( ) &lt; ∞ . It follows from part (4) and the fact that µ is σ -finite that β ( f ) = lim β ( f n ) = 0 . - (6). Suppose | f | ≤ | g | and g ∈ L β ( µ ). We know from part (5) that g is a measurable function so there is a w ∈ L ∞ ( µ ) such that f = wg ∈ L β ( µ ) (by part (2)). - (7). Assume the hypothesis of part (7) holds and suppose ε &gt; 0 . Since µ is σ -finite, it follows that there is a subsequence { f n k } that converges to f a.e. ( µ ). Hence | f | ≤ h a.e. ( µ ). Then, by part (4), there is a δ such that E ⊂ Ω and µ E ( ) &lt; δ implies β ( χ E h ) &lt; ε/ 5. By part (6) it follows that if µ E ( ) &lt; δ, then β ( χ E f ) , β ( χ E n f ) ≤ β ( χ E h ) &lt; ε/ 5 for every n ≥ 1. We also know from part (4) that there is a set F with µ F ( ) &lt; ∞ such that β ((1 -χ F ) h ) &lt; ε/ 5, which implies β ((1 -χ F ) f ) , β ((1 -χ F ) f n ) &lt; ε/ 5 for every n ≥ 1. But f n χ F → fχ F in measure, so that if E n = { ω ∈ F : | f n ( ω ) -f ( ω ) | ≥ ε/ 5 β ( χ F ) } , then µ E ( n ) → 0 . Thus there is an N ∈ N such that, n ≥ N implies µ E ( n ) &lt; δ , which implies $$\beta \left ( f _ { n } - f \right ) \leq$$ β ( f n χ E n )+ β ( fχ E n )+ β ((1 -χ F ) f )+ β ((1 -χ F ) f n )+ β ( χ F \ E n [ ε/ 5 β ( χ F )] ) &lt; ε. (8) . It is clear that L β ( µ ) is a Banach space. Write Ω = ∪ n ≥ 1 Ω n where { Ω n } is an increasing sequence of sets with µ (Ω ) n &lt; ∞ for n ≥ 1. Since L 1 ( µ ) is separable, we can find a countable subset W n that is a ‖·‖ 1 -dense subset of χ Ω n { f ∈ L ∞ ( µ ) : | f | ≤ n } . It follows from part (7) that W -β n contains χ Ω n L ∞ 0 ( µ , ) and if we let W = ∪ n ≥ 1 W n , it follows from W -β contains L ∞ 0 ( µ ) -β = L β ( µ ). Hence L β ( µ ) is separable. /square Suppose X is a separable Banach space and define $$L ^ { \beta } \left ( \mu, X \right ) = \left \{ f | f \colon \Omega \rightarrow X \text{ is measurable and } \| \cdot \| \circ f \in L ^ { \beta } \left ( \mu \right ) \right \}. \\ \text{If } f \colon \Omega \rightarrow X, \text{ define } | f | \colon \Omega \rightarrow [ 0, \infty ) \text{ by }$$ { If f : Ω → X, define | f | : Ω → [0 , ∞ ) by $$\left | f \right | \left ( \omega \right ) = \left \| f \left ( \omega \right ) \right \|,$$ i.e., | f | = ‖·‖ ◦ f . It is clear that if we define β ( f ) = β ( ‖·‖ ◦ f ), then L β ( µ, X ) is a Banach space. Moreover, L β ( µ, X ) is an L ∞ ( µ )-module if we define ϕf with ϕ ∈ L ∞ ( µ ) and f ∈ L β ( µ, X ) by $$\left ( \varphi f \right ) \left ( \omega \right ) = \varphi \left ( \omega \right ) f \left ( \omega \right ) \in X.$$ It is clear from part (1) of Lemma 1 that $$\beta \left ( \varphi f \right ) \leq \left \| \varphi \right \| _ { \infty } \beta \left ( f \right ).$$ Since $$| \chi _ { E } f | = \chi _ { E } \, | f |$$ for every f ∈ L β ( µ, X ), it easily follows that parts (2) , (4) , (6) and (7) in Lemma 1 remain true if f ∈ L β ( µ, X ). Lemma 2 . If X is separable, then L β ( µ, X ) is separable. Proof. It is well known [ 5 ] that L 1 ( µ, X ) is separable. We can imitate the proof of part (8) of Lemma 1 to get the desired conclusion. /square Recall that α is a rotationally symmetric norm on L ∞ ( T ) if - (1) α (1) = 1, - (2) α f ( ) = α ( | f | ) , (3) If g ( z ) = f ( e iθ z ) ( θ ∈ R ), then α f ( ) = α g ( ). We say that a rotationally symmetric norm α is continuous if $$\lim _ { m ( E ) \rightarrow 0 } \alpha \left ( \chi _ { E } \right ) = 0.$$ /negationslash If α is a continuous rotationally symmetric norm on L ∞ ( T ) , the space H α is defined in the first part to be the α -closure of the linear span of { 1 , z, z 2 , . . . } . It is clear that H α is separable and H ∞ ⊂ H α . We also obtained a new version of Beurling's theorem in the first part, namely, that if M = { } 0 is a closed linear subspace of H α and zM ⊂ M , then M = ϕH α for some inner function ϕ ∈ H ∞ . It follows from Lemma 2 that L β ( µ, H α ) is separable. We define L ∞ ( µ, H ∞ ) to be the set of (equivalence classes) of bounded functions Φ : Ω → H ∞ that are weak*-measurable, and we define ‖ Φ ‖ ∞ to be the essential supremum of ‖·‖ ∞ ◦ Φ. It is clear that L ∞ ( µ, H ∞ ) is a Banach algebra, and, since H α is an H ∞ -module, we can make L β ( µ, H α ) an L ∞ ( µ, H ∞ )-module by $$\left ( \Phi f \right ) \left ( \omega \right ) = \Phi \left ( \omega \right ) f \left ( \omega \right ).$$ It is also clear $$\beta \left ( \Phi f \right ) \leq \left \| \Phi \right \| _ { \infty } \beta \left ( f \right ).$$ We can also define the shift operator S on L β ( µ, H α ) by $$\left ( \left ( S f \right ) \left ( \omega \right ) \right ) \left ( z \right ) = z \left ( f \left ( \omega \right ) \right ) \left ( z \right ).$$ It is clear that S is an isometry on L β ( µ, H α ) and that S is an L ∞ ( µ, H ∞ )-module homomorphism, i.e., $$S \left ( \Phi f \right ) = \Phi \left ( S f \right )$$ whenever f ∈ L β ( µ, H α ) and Φ ∈ L ∞ ( µ, H ∞ ). ## 3. The Main Result Our main result (Theorem 1) is a generalization of the classical Beurling theorem for H p [ 10 ] and its extension to H α [ 4 , Theorem 7.8]. A key tool is a result on measurable cross-sections taken from [ 2 ]. A subset A of a separable metric space Y is absolutely measurable if A is µ -measurable for every σ -finite Borel measure µ on Y . A function with domain Y is absolutely measurable if the inverse image of every Borel set is absolutely measurable. Lemma 3 . Suppose E is a Borel subset of a complete separable metric space and Y is a separable metric space and π : E → Y is continuous. Then π ( E ) is an absolutely measurable subset of Y and there is an absolutely measurable function ρ : π ( E ) → E such that ( π ◦ ρ ) ( y ) = y for every y ∈ E . Theorem 1 . A closed linear subspace M of L β ( µ, H α ) is an L ∞ ( µ ) -submodule with S ( M ) ⊂ M if and only if there is a Φ ∈ L ∞ ( µ, H ∞ ) such that - (1) For every ω ∈ Ω , we have Φ( ω ) = 0 or Φ( ω ) is an inner function, - (2) M = Φ L β ( µ, H α ) . /negationslash Proof. Suppose (1) , (2) are true. It is clear that Φ L β ( µ, H α ) is a shiftinvariant L ∞ ( µ )-submodule. Let E = { ω ∈ Ω : Φ ( ω ) = 0 } . Then χ E L β ( µ, H α ) is clearly closed and multiplication by Φ is an isometry on χ E L β ( µ, H α ). Hence Φ L β ( µ, H α ) is closed. Conversely, suppose M is a shift invariant L ∞ ( µ )-submodule of L β ( µ, H α ). Since L β ( µ, H α ) is separable, M must be separable. We can choose a countable subset F of M such that F is dense in M, S ( F ) ⊂ F , and F is a vector space over the field Q + i Q of complex-rational numbers. The elements of F are equivalence classes, but we can choose actual functions to represent F . Then, for each ω ∈ Ω, define M ω to be the H α -closure of { f ( ω ) : f ∈ F} . Claim: M = { h ∈ L β ( µ, H α ) : h ω ( ) ∈ M ω a.e. ( µ ) } . Proof of Claim : Suppose h ∈ M . Then there is a sequence { f n } in F such that β ( f n -h ) = β ( α ◦ ( f n -h )) → 0 . We know µ is σ -finite, so there is an increasing sequence { Ω k } of sets of finite measure whose union is Ω . Since { α ◦ ( f n -h ) } is a sequence in L β ( µ ), it follows from part (3) in the definition of β and the fact that µ is σ -finite, that χ Ω k α ◦ ( f n -h ) → 0 in measure for each k ≥ 1, which, via the Cantor diagonalization argument, implies that there is a subsequence { α ◦ ( f n k -h ) } that converges to 0 a.e. ( µ ). Thus, for almost every ω ∈ Ω we have , α f ( n k ( ω ) -h ω ( )) → 0 . Hence h ω ( ) ∈ M ω a.e. ( µ ). Conversely, suppose h ∈ L β ( µ, H α ) and h ω ( ) ∈ M ω a.e. ( µ ). By redefining h ω ( ) = 0 on a set of measure 0, we can assume that h ω ( ) ∈ M ω for every ω ∈ Ω. Let the homeomorphism with R ). Then X is a complete separable metric space and the set E of elements ( g, g 1 , g 2 , . . . , ε, n ) such that α g ( -g n ) ≤ ε is closed in X. Hence ∞ X = H α × ∞ ∏ n =1 H α × (0 , 1) × N with the product topology (giving (0 , 1) the metric from E is a complete separable metric space. Define π : E → Y = H α × ∏ n =1 H α × (0 , 1) by π ( g, g 1 , g 2 , . . . , ε, n ) = ( g, g 1 , g 2 , . . . , ε ) . It follows from Lemma 3 that $$\pi \left ( E \right ) = \left \{ \left ( g, g _ { 1 }, g _ { 2 }, \dots, \varepsilon \right ) \colon \exists n \in \mathbb { N } \text{ with } \alpha \left ( g - g _ { n } \right ) \leq \varepsilon \right \}$$ is absolutely measurable and that there is an absolutely measurable cross-section ρ : π ( E ) → E such that π ( ρ ( y )) = y for every y ∈ π ( E ). Suppose ε &gt; 0. Since µ is σ -finite there is a function u : Ω → R such that 0 &lt; u &lt; 1 and β ( u ) ≤ ε, i.e., if Ω is a disjoint union of sets { E n } with finite measure, we can let $$\lambda \times \lambda _ { n } \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \lambda \times \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \} \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \lambda _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \lambda _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \alpha _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \beta _ { n } \, \phi _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \alpha _ { n } \, \phi _ { n } \$$ We can write F = { f , f 1 2 , . . . } and define Γ : Ω → Y by $$\Gamma \left ( \omega \right ) = \left ( h \left ( \omega \right ), f _ { 1 } \left ( \omega \right ), f _ { 2 } \left ( w \right ), \dots, u \left ( \omega \right ) \right ).$$ Since h ω ( ) ∈ M ω = { f 1 ( ω , f ) 2 ( ω , . . . ) } -α , it follows that Γ (Ω) ⊂ π ( E ). Since ρ is absolutely measurable, ρ ◦ Γ is measurable, and if we write $$\left ( \rho \circ \Gamma \right ) \left ( \omega \right ) = \left ( \Gamma \left ( \omega \right ), n \left ( \omega \right ) \right ),$$ we see that n : Ω → N is measurable and α f ( n ω ( ) -h ω ( ) ) ≤ u ω ( ) for every w ∈ Ω Let . G k = { ω ∈ Ω : n ω ( ) = k } . Then { G k : k ∈ N } is a measurable partition of Ω and f = ∑ ∞ k =1 χ G k f k defines a measurable function from Ω to H α . Moreover, if ω ∈ G , k then $$\begin{array} {$$ Thus f = ( f -h ) + h ∈ L β ( µ, H α ) . Moreover, since M is an L ∞ ( µ )-module, we have ∑ N k =1 χ G k f k ∈ M for each N ∈ N and f -∑ N k =1 χ G k f k = χ W N f , where W N = ∪ k&gt;N G k . But $$\alpha \left ( \left ( \chi _ { W _ { N } } f \right )$$ Since α ◦ f ∈ L β ( µ ) and χ W N ( ω α f ) ( ( ω )) → 0 pointwise, it follows from the general dominated convergence theorem, part (7) of Lemma 1 that $$\beta \left ( f - \sum _ { k = 1 } ^ { N } \chi _$$ Hence f ∈ M . But M is closed, ε &gt; 0 was arbitrary and β ( f -h ) ≤ ε, so h ∈ M . This proves the claim. We next show that zM ω ⊂ M ω for every ω ∈ Ω. Indeed, recalling that F = { f , f 1 2 , . . . } and S ( F ) ⊂ F , we see from the fact that multiplication by z is an isometry on H α that $$\mathfrak { n } \, H ^ { \alpha } \, \text{ that}$$ It follows from our version of Beurling's theorem [ 4 , Theorem 7.8] that either each M ω = 0 or M ω = ϕH α for some inner function ϕ ∈ H ∞ . Let I be the set of inner functions in H ∞ . The algebra H ∞ can be viewed as an algebra of (multiplication) operators on H 2 , where the weak*-topology corresponds to the weak operator topology. The set of inner functions is not weak operator closed, but it is closed in the strong operator topology on H 2 , since the set of inner functions corresponds exactly to the operators in H ∞ that are isometries. Although the weak and strong operator topologies do not coincide, they generate the same Borel sets. Hence, the set I with the strong operator topology is a complete separable metric space and the Borel sets are the same as the ones from the weak*-topology. strong operator topology. Let E be the set of ( g , g 1 2 , . . . , h 1 , h 2 , . . . , ϕ, n 1 , n 2 , . . . ) in X such that g k = ϕh k and α ϕ ( -g n k ) &lt; 1 /k for 1 ≤ k &lt; ∞ . Then E is a closed $$\begin{array} { c } \text{the weak} ^ { \text{-topology$$ subset of the complete separable metric space X . Define π : X → Y = ∞ ∏ n =1 H α by π ( g , g 1 2 , . . . , h 1 , h 2 , . . . , ϕ, n 1 , n 2 , . . . ) = ( g , g 1 2 , . . . ). Then π ( E ) is the set of all ( g , g 1 2 , . . . ) ∈ Y for which there is an inner function ϕ ∈ { g , g 1 2 , . . . } -α such that { g , g 1 2 , . . . } ⊂ ϕH α . It follows from Lemma 3 that π ( E ) is absolutely measurable and that there is an absolutely measurable cross-section ρ : π ( E ) → E such that π ( ρ ( y )) = y for every y ∈ π ( E ). We know that M ω = 0 if and only if f n ( ω ) = 0 for n ≥ 1. Hence A = { ω ∈ Ω : M ω = 0 } = ∩ ∞ n =1 f -1 n ( { 0 ) is measurable. } Let B = Ω \ A. If ω ∈ B, then there is an inner function ϕ such that M ω = ϕH α . Thus if we define Γ : B →Y by Γ( ω ) = ( f 1 ( ω , f ) 2 ( ω , . . . ) ), then Γ ( B ) ⊂ π ( E ) . Thus ρ ◦ Γ : Ω →X is measurable, and if we write $$\left ( \rho \circ \Gamma \right ) \left ( \omega \right ) = \left ( g _ { 1 \omega }, g _ { 2 \omega }, \dots, h _ { 1 \omega }, h _ { 2 \omega }, \dots, \varphi _ { \omega }, n _ { 1 \omega }, n _ { 2 \omega }, \dots \right ),$$ we see that Φ ( ω ) = ϕ ω when ω ∈ B and Φ( ω ) = 0 when ω ∈ A defines the desired function in L ∞ ( µ, H ∞ ). /square In [ 8 ] their version of Beurling's theorem was given for the space H 2 ( T , /lscript 2 ( N ) ) , which is easily seen to be isomorphic to /lscript 2 ( N , H 2 ( T ) ) , and the latter is covered by our main theorem. This raises the question of whether L β ( µ, H α ) is isometrically isomorphic to H α ( T , L β ( µ ) ) . If α = β = ( ‖·‖ 2 + ‖·‖ 4 ) / 2 or if α = ‖·‖ 2 and β = ‖·‖ 4 , then these spaces are not isometrically isomorphic, i.e., consider $$f \left ( x, z \right ) = \begin{cases} \ 1 - z & x \in E \\ 1 - 2 z & x \in \mathbb { T } \langle E \end{cases},$$ where µ = m and Ω = T . Thus when α = β is not a p -norm or when α and β are different p -norms, the answer is negative. However, the theorem below shows that when α = β = ‖·‖ p for 1 ≤ p &lt; ∞ , then the two spaces are the same. Proposition 1 . Suppose 1 ≤ p &lt; ∞ and α = β = ‖·‖ p . Then L β ( µ, H α ( T )) and H α ( T , L β ( µ ) ) are isometrically isometric. Proof. Suppose f = a 0 + a z 1 + · · · + a n z n with a , . . . , a 0 n ∈ L α ( µ ). We first view f ∈ H α ( T , X ). Then we take | f | ( z ) = α f ( ( z )) . We define β ( f ) = β ( | f | ). We now consider f ∈ L β ( µ, H α ( T )) . Then f ( ω ) ( z ) = a 0 ( ω )+ a 1 ( ω z ) + · · · + a n ( ω z ) n . We then define ν : Ω → [0 , ∞ ) by ν ( ω ) = α f ( ( ω )) . Then β ( f ) = β ( ν ) , and $$\text{We then define } \nu \, \colon \Omega \rightarrow [ 0, \infty ) \, \text{by } \nu \, ( \omega ) = \alpha \, ( f \, ( \omega ) ) \,. \, \text{Then } \beta \, ( f ) = \beta \, ( \nu ) \,, \, \text{and} \\ \alpha \, ( f ) ^ { p } = \alpha \, ( \beta \, ( f \, ( z ) ) ) ^ { p } = \int _ { \mathbb { T } } \beta \, ( f \, ( z ) ) ^ { p } \, d m \, ( z ) \\ = \int _ { \mathbb { T } } \left [ \int _ { \Omega } | a _ { 0 } \, ( \omega ) + a _ { 1 } \, ( \omega ) \, z + \dots + a _ { n } \, ( \omega ) \, z ^ { n } | ^ { p } \, d \mu \, ( \omega ) \right ] d m \, ( z ) \\ = \int _ { \Omega } \left [ \int _ { \mathbb { T } } | a _ { 0 } \, ( \omega ) + a _ { 1 } \, ( \omega ) \, z + \dots + a _ { n } \, ( \omega ) \, z ^ { n } | ^ { p } \, d m \, ( z ) \right ] \, d \mu \, ( \omega ) \\ = \int _ { \Omega } \nu \, ( \omega ) ^ { p } \, d \mu \, ( \omega ) = \beta \, ( f ) ^ { p } \,. \\ \text{The functions of the form } f \, \text{ above are dense in both } L ^ { \beta } \, ( \mu, H ^ { \alpha } \, ( \mathbb { T } ) ) \, \text{ and } H ^ { \alpha } \, ( \mathbb { T }, L ^ { \beta } \, ( \mathbb { T } ) \, \text{see, } e. g., \, \text{Proposition } 6. 6 \text{ in } [ 4 ] ) ; \text{ hence, } \text{ these } \text{ spaces are isometrically } \text{isomor}.$$ The functions of the form f above are dense in both L β ( µ, H α ( T )) and H α ( T , L β ( µ ) ) (see, e.g., Proposition 6.6 in [ 4 ]); hence, these spaces are isometrically isomorphic. /square ## References - [1] A. Aleman, S. Richter, C. Sundberg, Beurling's theorem for the Bergman space, Acta Math. 177 (1996), 275-310. - [2] W. B. Arveson, An invitation to C*-algebras, Graduate Texts in Mathematics, No. 39. Springer-Verlag, New York-Heidelberg, 1976. - [3] A. Beurling, On two problems concerning linear transformations in Hilbert space, Acta Math. 81 (1949), 239-255. - [4] Y. Chen, Lebesgue and Hardy spaces for symmetric norms I, arXiv: 1407.7920 [math. OA] (2014). - [5] J. Diestel and J. J. Uhl, Vector measures, Mathematical Surveys, No. 15. American Mathematical Society, Providence, R.I., 1977 - [6] H. Helson, Lectures on invariant subspaces. Academic Press, New York-London 1964. - [7] P. R. Halmos, Shifts on Hilbert spaces, J. Reine Angew. Math. 208 (1961), 102-112. - [8] H. Rezaei, S. Talebzadeh, D. Y. Shin, Beurling's theorem for vector-valued Hardy spaces, Int. J. Math. Anal. 6 (2012), 701-707. - [9] K. S. Saito, Invariant subspaces for finite maximal subdiagonal algebras, Pac. J. Math. 93 (1981), 431-434. - [10] T. P. Srinivasan, Simply invariant subspaces, Bull. Amer. Math. Soc. 69 (1963), 706-709. - [11] B. Yousefi, E. Hesameddini, Extension of the Beurling's theorem, Proc. Japan Acad. 84 (2008), 167-169. Department of Mathematics, University of New Hampshire, Durham, NH 03824, U.S.A. E-mail address : [email protected] Current address : Department of Mathematics, University of New Hampshire, Durham, NH 03824, U.S.A. E-mail address : [email protected] URL : http://euclid.unh.edu/~don Department of Mathematics, University of New Hampshire, Durham, NH 03824, U.S.A. E-mail address : [email protected]
null
[ "Yanni Chen", "Don Hadwin", "Ye Zhang" ]
2014-08-05T21:13:19+00:00
2014-08-05T21:13:19+00:00
[ "math.FA", "math.OA" ]
Lebesgue and Hardy Spaces for Symmetric Norms II: A Vector-Valued Beurling Theorem
Suppose $\alpha$ is a rotationally symmetric norm on $L^{\infty}\left(\mathbb{T}\right) $ and $\beta$ is a "nice" norm on $L^{\infty}\left(\Omega,\mu \right) $ where $\mu$ is a $\sigma$-finite measure on $\Omega$. We prove a version of Beurling's invariant subspace theorem for the space $L^{\beta}\left(\mu,H^{\alpha}\right) .$ Our proof uses the recent version of Beurling's theorem on $H^{\alpha}\left(\mathbb{T}\right) $ proved by the first author and measurable cross-section techniques. Our result significantly extends a result of H. Rezaei, S. Talebzadeh, and D. Y. Shin.
1408.1118v3
## Spoke-Darts for High-Dimensional Blue-Noise Sampling SCOTT A. MITCHELL, Sandia National Laboratories MOHAMED S. EBEIDA, Sandia National Laboratories MUHAMMAD A. AWAD, University of California at Davis CHONHYON PARK, UNC Chapel Hill ANJUL PATNEY, NVIDIA Research AHMAD A. RUSHDI, University of California at Davis and Sandia National Laboratories LAURA P. SWILER, Sandia National Laboratories DINESH MANOCHA, UNC Chapel Hill LI-YI WEI, University of Hong Kong and Adobe Research ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-6edd6d5d-8ec6-465f-8660-16eeccff827f.jpg) (a) 8D Delaunay graph ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-9f6798e1-6817-48c8-b752-c705a79a9776.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-1397bc6f-a3c4-4f62-a16d-6543b0c4e8e4.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-42535d89-9a3d-43af-9620-c3fd1512e95b.jpg) (b) 100D global optimization (c) 8D rendering (d) 23D motion planning Fig. 1. Spoke-dart sampling for high-dimensional applications: Delaunay graph construction, optimization, rendering, and motion planning. Blue noise sampling has proved useful for many graphics applications, but remains under-explored in high-dimensional spaces due to the difficulty of generating distributions and proving properties about them. We present a blue noise sampling method with good quality and performance across different dimensions. The method, spoke-dart sampling, shoots rays from prior samples and selects samples from these rays. It combines the advantages of two major high-dimensional sampling methods: the locality of advancing front with the dimensionality-reduction of hyperplanes, specifically line sampling. We prove that the output sampling is saturated with high probability, with bounds on distances between pairs of samples, and between any domain point and its nearest sample. We demonstrate spoke-dart applications for approximate Delaunay graph construction, global optimization, and robotic motion planning. Both the blue-noise quality of the output distribution, and the adaptability of the intermediate processes of our method, are useful in these applications. CCS Concepts: · Computing methodologies → Antialiasing ; Additional Key Words and Phrases: line sampling, high dimension, blue noise, Delaunay graph, global optimization, motion planning ## ACMReference format: Scott A. Mitchell, Mohamed S. Ebeida, Muhammad A. Awad, Chonhyon Park, Anjul Patney, Ahmad A. Rushdi, Laura P. Swiler, Dinesh Manocha, and Li-Yi Wei. 2018. Spoke-Darts for High-Dimensional Blue-Noise Sampling. ACM Trans. Graph. 37, 2, Article 22 (May 2018), 20 pages. ©2018Copyright held by the owner/author(s). Publication rights licensed to Association for Computing Machinery. Author email: [email protected] . This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Graphics , https://doi.org/10.1145/3194657. https://doi.org/10.1145/3194657 ## 1 INTRODUCTION Sampling is a core technique for various scientific and engineering applications. Sampling allows us to approximate continuous quantities in tractable space and time via discrete samples. The samples should be well-spaced for efficiency, and yet random enough to avoid structural aliasing. Low-discrepancy sequences [Keller et al. 2012; Niederreiter 1992] are known for generating well-spaced samples, but their inherently deterministic nature is prone to produce regular patterns, which can cause aliasing. Blue noise sampling [Ebeida et al. 2012; Lagae and Dutré 2008; Mitchell 1987; Ulichney 1988] can synthesize samples that are simultaneously random and well-spaced, but it is computationally more expensive, especially as the dimension increases. Hyperplane sampling [Ebeida et al. 2014] is a random approach that scales to any dimension, but the output distribution is not guaranteed to be well-spaced. Thus, high-dimensional (e.g. ≥ 6D) blue-noise sampling remains elusive, even though high-dimensional spaces are common in geometry, optimization, rendering, robotics and other applications. Advancing front techniques [Bridson 2007; Dunbar and Humphreys 2006; Li et al. 2000; Liu 1991; Liu et al. 2008] are able to efficiently sample from irregular domains; in contrast many other methods are tailored to domains that are hyperrectangles. The ability to handle irregular domains is an advantage in some contexts, but the complexity of computing and storing the geometry of fronts grows exponentially with dimension. We present a new algorithm that has the advantages of both advancing front and hyperplane sampling. It scales to high dimensions by avoiding computing the front geometry. It uses line sampling, selecting the next sample from a line segment through a prior sample. Its output has guaranteed blue noise properties. We provide bounds on the spatial properties of our output, including saturation, that apply to any dimension. We show algorithmic time and space complexities that avoid the curse of dimensionality. We provide experiments that confirm these theoretical bounds and trends, and compare to related methods. Traditional blue noise does well at avoiding low frequency artifacts. To avoid artifacts in high frequency areas, the community has developed an interest in step blue noise [Heck et al. 2013], where the frequency spectrum resembles a step function without oscillations. Until now, the only way to create these distributions was an expensive post-processing optimization of an initial distribution. Variations of our algorithm can create soft blue noise , potentially avoiding high and low frequency artifacts. Beyond blue noise, the adaptability and efficiency of our methods facilitate diverse applications, as shown in Figure 1. For approximate Delaunay graph construction and global optimization , the advancingfront and radial exploration provide advantages when sampling from the irregular shape of the local domains, even when the global domain is a hyper-rectangle. Moreover, global optimization benefits from the intermediate process of our sampling method, not just the final output sample sets. For robotic motion planning , the ability to do advancing front over irregular domains may prove useful for adaptively exploring narrow regions of the configuration space. The contributions of this paper include: - · The idea of spoke-dart sampling, which combines the advantages of the locality of advancing-front with the dimensionmitigation of hyperplane sampling, specifically line-sampling; - · Direct algorithms for blue noise in high dimensions; - · Proven and demonstrated time, memory, and saturation bounds that scale well; - · Applications using spokes for high dimensional Delaunay graphs, global optimization, and motion planning; - · Open source software [Awad et al. 2016]. Toourknowledge, we provide the first method for probabilisticallyguaranteed locally-saturated blue noise in high dimensions, and the first direct method for soft blue noise in d &gt; 2. By 'direct' we mean that samples are placed once, when they are generated, and never moved. We demonstrate blue noise in dimensions 2-30, and applications in dimensions up to 100. ## 2 RELATED WORK ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-5ddbd0ef-f32e-41b9-a851-8f40b6840c31.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-a3934e26-4def-4232-9152-fe179d8899ed.jpg) (a) Point set (b) Periodogram Fig. 2. Randomness metrics from PSA [Schlömer and Deussen 2011]. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-1c338d4d-6409-40cf-bf17-3ffaa9822fa0.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-e25d9914-da0a-4408-adab-244c143c4252.jpg) ACM Transactions on Graphics, Vol. 37, No. 2, Article 22. Publication date: May 2018. Blue noise has many graphics applications [Chen et al. 2013] in rendering [Cook 1986; Sun et al. 2013], texturing [Lagae and Dutré 2005], stippling [Balzer et al. 2009; de Goes et al. 2012; Fattal 2011], geometry processing [Alliez et al. 2003; Öztireli et al. 2010], animation [Schechter and Bridson 2012], visualization [Li et al. 2010], and numerical computation [Ebeida et al. 2014]. Blue noise sampling can be achieved by various methods, such as dart throwing (also known as Poisson-disk sampling) [Cook 1986] and relaxation [Lloyd 1983]. Two main spatial properties are used to characterize blue noise distributions: (1) randomness and (2) well-spaced-ness. Randomness avoids aliasing while well-spaced-ness reduces noise and improves efficiency. Randomness is typically characterized by the frequency spectrum of the sample distribution [Ulichney 1988], a feature of the output of some process rather than the randomness of the process itself. The spectral properties can be measured by the radial power (RP) [Lagae and Dutré 2008] in the frequency domain, or equivalently in the primary domain such as differential vectors (differential domain analysis) [Wei and Wang 2011] and radial distance function (RDF) [Öztireli and Gross 2012]. See Figure 2 for an example of these measures. Many traditional algorithms for blue noise produce a steplike RDF, but a RP spectrum with oscillations, and these can produce visible artifacts in high frequency areas [Heck et al. 2013]. Step blue noise has a RP resembling a step function, without oscillations. Stair blue noise [Kailkhura et al. 2016] provides additional degrees of freedom over step blue noise for tuning spectral characteristics. By 'soft blue noise' we loosely mean that both the RP and RDF are steep but smooth ramps without oscillations. This can be preferred because of lower aliasing, as demonstrated by recent results of using this type of noise for the classical zone-plate pattern [Heck et al. 2013; Kopf et al. 2006; Subr and Kautz 2013]. Our prior two-radii sampling directly produced soft blue noise in 2D, without postprocessing [Mitchell et al. 2012]. Well-spaced samples, on the other hand, mean that samples are not too close to one another, yet no domain point is too far from a sample. One way to measure well-spaced-ness is discrepancy [Keller et al. 2012; Shirley 1991]. Another measure is saturation , which depends on two radii: coverage radius r c for maximum domain to sample distance, and conflict radius r f for minimum inter-sample distance [Ebeida et al. 2014; Mitchell et al. 2012]. Saturation is then quantified using their ratio β = r c / r f ; the lower the β , the higher and better the saturation. Saturation is desired in many contexts, as described in the extensive literature on maximal Poisson-disk sampling (MPS) [Cline et al. 2009; Ebeida et al. 2011, 2012; Gamito and Maddock 2009; Jones 2006; Yan and Wonka 2013] and low discrepancy sampling [Ahmed et al. 2016]. For some applications, it is unclear how important saturation is as the dimension increases. Despite the potential applications for high dimensional sampling, most sample-generation algorithms are low dimensional, in part because of the curse of dimensionality - many blue noise algorithms do not scale well to high dimensions (e.g. tiling [Ahmed et al. 2017, 2016; Kopf et al. 2006; Wang and Suda 2017]), especially when seeking high saturation. The sampling methods that scale well with dimension do not provide a guarantee of local saturation, while those providing local saturation have exponential complexity. The algorithms closest to obtaining both of these goals are based on advancing-front [Bridson 2007; Liu 1991] or k -d darts [Ebeida et al. 2014], as detailed below. ## 2.1 Advancing front Advancing front methods were initially proposed for meshing [Li et al. 2000; Liu 1991; Liu et al. 2008] and later adopted for sampling in graphics [Bridson 2007; Dunbar and Humphreys 2006; Jones 2006]. The basic idea is to draw new samples from regions around existing samples (the front) and expand towards the rest of the domain. Most methods build some form of the front boundaries explicitly, and some construct the union of spheres [Li et al. 2000; Liu et al. 2008]. These methods are intractable in high dimensions because the number of intermediate-dimensional faces grows factorially with dimension. In practice, implementing the geometric primitives for the constructions would be challenging as well. In Point-Annulus [Bridson 2007], a key innovation is to represent the front boundary implicitly, by a list of sample disks touching the front. Point-Annulus does rejection sampling around a prior sample, selecting a point uniformly by volume from the [ r f , r c ] annulus around it. The sample is removed from the front after a fixed number (30) of consecutive rejections. Its advantage is locality, mitigating the effects of domain size. This enables tractable runtime in high dimensions. 1 The single page sketch in Bridson [2007] does not analyze saturation by dimension. We postulate that the method guarantees that a large fraction of the annulus volume is saturated, but does not bound the uncovered volume outside all annuli. More significantly, we have discovered that its output has an undesirable artifact, a sharp discontinuity in the density of points at the outer boundary of annuli, as further demonstrated in Section 4. ## 2.2 Hyperplane sampling k -d darts [Ebeida et al. 2014] uses hyperplanes for Poisson-disk sampling: select a random axis-aligned hyperplane, find its uncovered subset, and select a point from this subset. A rejection occurs only when the entire hyperplane is covered. Its advantage is that hyperplanes mitigate the effects of high dimensions. Its disadvantage is that it does not guarantee local saturation, because hyperplanes are selected globally from the entire domain. (Global dart throwing [Cook 1986; Dippé and Wold 1985] has similar issues.) In principle, using hyperplanes of any dimension is possible, up to the dimension of the domain. However, the difficulty is actually performing and representing the necessary geometric primitives over this object. In k -d darts, only 1D lines and 2D planes were demonstrated. In the present work, we merely use lines, 1D hyperplanes. The method in Sun et al. [2013] samples lines and line-segments for rendering applications, including 3D motion blur, 4D lens blur, and 5D temporal light fields. For determining sample positions it relies on subroutines that do not scale well to high dimensions. 1 As published, step 0 constructs a background grid. Replacing it with a k -d tree improves runtime from 2 O d ( ) O n ( ) to O dn ( 2 ) , the same complexity as our spoke-dart sampling. ## 2.3 Combining advancing front with line search Our key idea is to combine the advantages of advancing front and hyperplane sampling. Specifically, spoke-darts replaces the pointsampling of Bridson [2007] with line-sampling. A spoke is a line segment passing through a point, at a random orientation; see Figure 3. We employ a constant number (12) of consecutive rejections before advancing the front, retaining good run-time scalability across dimensions. However, 12 consecutive rejections provides a local saturation guarantee that is the same in all dimensions . We can generate different blue noise profiles. In particular, we can avoid the spike in the distribution at the sampling radius by non-uniform sampling from a spoke segment and by generating a second spoke through a point on the first spoke. These two spokes mimic the two radii in Mitchell et al. [2012], and produce a similar soft blue noise profile. Fig. 3. Line-spokes in 2D. (a) A (green) spoke is a randomly-oriented line segment through a prior sample s . (b) It is trimmed by sample disks, keeping the (solid) subsegment containing anchor point a . (c) The next sample s ′ is chosen from the trimmed segment. (d) Because of the anchor point, the next sample will be in the subset of the annulus that is light-red, not the dark-red regions on the far side of other disks. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-e8e17f0a-787a-430e-9d82-400a05ea1696.jpg) ## 3 SPOKE-DART BLUE NOISE SAMPLING Spoke-dart sampling generates new samples from the current sample set boundary and gradually expands towards the rest of the domain. The key features distinguishing our algorithm from prior methods are (1) how the front is described and advanced, and (2) how new samples are drawn. The front is described by the boundary of the union of disks around samples, but its geometry is not explicitly constructed. New samples are selected by generating a random spoke (radial line) through an existing sample, trimming it by existing sample disks, and selecting an uncovered point from the remaining sub-spoke. Algorithm summary. Our top level algorithm follows. We initialize the output set with one sample and put it into the active pool of front points. When this pool becomes empty our algorithm terminates. We remove a sample s from the pool and try to generate new samples s ′ from random spokes ℓ through s . Accepted samples are added to the pool. We keep throwing spokes from the same sample until m = 12 consecutive spokes failed to generate an acceptable sample. Radius r is the minimum allowed distance between any two samples. Our method is summarized in Algorithm 1. ``` 22:4 * Mitchell, Ebeida, Awad, Park, Patney, Rus Input: sample domain Q Output: output sample set S 1: s <- RandomSample(Q) 2: S <- {s} // all samples 3: P <- {s} // active pool, FIF0 queue 4: while P not empty do 5: s <- PopFront(P) 6: N <- CollectNeighbors(s, S) 7: reject <- 0 8: while reject < m (=12) do 9: l, a <- RandomSpoke(s, l) 10: l <- TrimSpoke(l, a, N) 11: if l is empty then 12: reject <- reject + 1 13: else 14: s' <- RandomSample(l) 15: if TwoSpokes then 16: s' <- SecondSpoke(s', N) 17: add s' to N, S, and the end of P 18: reject <- 0 19: return S Algorithm 1. Spoke-darts for blue noise samp 3.1 Spokes The line of a spoke passes through a sample s. and t ``` Algorithm 1. Spoke-darts for blue noise sampling. ## 3.1 Spokes The line of a spoke passes through a sample s , and the spoke is the interval I of distances from s . A spoke has a distinguished anchor point a ∈ I used to select which segment to retain during trimming; see Figure 3. For line-spokes, I = [ r , 2 r ] and the anchor lies at r , because, as in Point-Annulus, the uncovered region starts at r and the extent of the local front we wish to consider is 2 r . ## 3.2 CollectNeighbors For a sample on the front, for each spoke we trim it by iterating over the nearby samples. For spoke-darts with spoke extent 2 r , a sample is a neighbor if its center distance is less than 3 r , because that is the farthest away a sample can lie and still have its disk overlap the spoke. A key efficiency is to gather all neighbors once before any trimming operations. In our implementation, a k -d tree saves time over exhaustive search for small d and large n . Figures 9a and 18a show a speedup for d &lt; 7 and n ≥ 200 0000. We maintain a , k -d tree of the entire point set. We collect the subtree of neighbors, and update the tree and subtree as we successfully add new samples. ## 3.3 RandomSpoke A line-spoke is generated by selecting a line with random orientation, by choosing a point p from the surface of the disk around s , uniformly by area. To pick p we use the classical method of Muller [1959], as follows. Generate each of the vector's d coordinates independently from a normal (Gaussian) distribution. Then linearly scale the vector of coordinates to the disk radius. The reason this works is because the level sets of a d -dimensional Gaussian distribution are d -spheres. Fig. 4. (a)-(c) Two-spokes starts much the same as line-spokes, only using a longer spoke and trimming by 2 r -disks. (d)-(f) A second spoke is trimmed by r -disks, and the new sample s ′′ is chosen from it. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-391735d3-1319-41d0-b9f3-2dc3783a64a3.jpg) ## 3.4 TrimSpoke Trimming subtracts out the portion of a segment that is covered by a neighbor disk, leaving just its uncovered subset. For efficiency, we just keep the one subsegment that contains a distinguished anchor point ; this is considerably faster than finding all uncovered segments. Further, we do a prepass and discard the entire spoke if the anchor is covered. These primitives are efficient, linear in dimension, and the prepass avoids square roots. In Figure 3, these shortcuts mean that the next sample will be chosen from the light red part of the annulus only, and not the dark red portions. This potentially affects the output distribution characteristics, but the saturation proof takes it into account. ## 3.5 RandomSample For blue noise, it is sufficient to pick a sample uniformly by length from an uncovered spoke segment. One might assume that picking a point uniformly by the swept volume, dependent on the dimension, would generate better quality blue noise. However, we found this detrimental for our algorithms, and also for the prior work of Point-Annulus [Bridson 2007]. It generates worse blue noise than traditional MPS algorithms; see Section 5.1. Exploring more sophisticated selection criteria led us to our two-spokes algorithm. ## 3.6 Two-spokes Two-spokes is an algorithm variation that further randomizes the placement of samples; see Figure 4. Its output distribution avoids the traditional spike at the sampling radius, and mitigates other artifacts. We make the first spoke longer, and shoot a second spoke from an uncovered point on the first spoke. The first spoke has I = [ 2 r , 4 r ] with anchor at 2 r and is trimmed by radius-2 r sample disks. The second spoke has I = [-2 r , 2 r ] with anchor at s ′ and is trimmed by radiusr sample disks. RandomSample is approximately uniform by swept volume from the nearer spoke end. Two-spokes shares the following properties with two-radii Poissondisk sampling [Mitchell et al. 2012]. Their spectra are similar, and the distance between samples is at least r . A new sample's large 2 -disk covers r s ′ , and no other large disk covers it so far, ensuring progress and algorithm termination. There is a simple parameterization of the two spoke lengths that starts at line-spokes, then trades away saturation to gain randomness; see Appendix A. ## 4 ANALYSIS AND GUARANTEES ## 4.1 Probability of achieved saturation Our measure of saturation is β = r c / r f , where r c is the maximum distance from a domain point to its nearest sample, and r f is the minimum guaranteed distance between a sample and its nearest sample, the Poisson-disk radius. Also, β ∗ is the desired upper limit on β . Besides spoke length, the main control parameter is m , the number of successively-failed spokes before removing a sample from the front. The higher the m , the more spokes we generate and the longer the run-time, but the more saturated the output. Note ( 1 -/uni03F5 ) quantifies the probability that β ∗ is achieved. The structure of our guarantee is that, for a given m , with high probability ( 1 -/uni03F5 ) the achieved β at a sample is less than β ∗ . Equation (1) quantifies the relationship between m /uni03F5 , , β ∗ , and d for line-spokes. $$m = \left \lceil ( - \ln \epsilon ) ( \beta ^ { * } - 1 ) ^ { 1 - d } \right \rceil \Leftrightarrow \beta ^ { * } = 1 + \left ( \frac { - \ln \epsilon } { m } \right ) ^ { 1 / ( d - 1 ) } \quad ( 1 ) \quad \text{also}$$ Our main result is that if m = 12, then with probability 1 -10 -5 we will get local β &lt; 2 = β ∗ in any dimension, avoiding the curse of dimensionality. In general, one can pick any three of { m /uni03F5 , , β ∗ , d } and the fourth is determined. For example, one can pick m and β ∗ and bound the probability /uni03F5 that β ∗ was exceeded: /uni03F5 &lt; exp (-m β ( ∗ -1 ) d -1 ) , where β ∗ &gt; 1 , and -ln /uni03F5 &gt; 0 , and m ≥ 1 . - · Line-spokes produces β &lt; 2 with high probability. - · Two-spokes produces β &lt; - 4 with high probability. (The price of a more uniform spectrum is lower saturation.) We provide some intuition for Equation (1) here; the derivations are in Section 4.2. Let us suppose that the algorithm has terminated and a sample has a far Voronoi vertex. Consider the empty ball centered at this vertex and tangent to the sample's disk; it lies outside all other samples' disks. We may expand this ball into a 'void,' a larger connected region bounded by sample disks. We have thrown at least m spokes from each of the void's bounding disks. Each of these spokes must have missed this void; otherwise we would have inserted a sample into the void, a contradiction. Since the void was not hit, if we add up its surface area across all bounding disks, its surface area is probabilistically-guaranteed to be small compared to the surface area of a single bounding disk. Thus the surface area of the Voronoi-vertex ball inside the void is also small, which bounds its radius. The exponential-in-( d -1 ) dependence on β ∗ in Equation (1) is precisely the dependence of the surface area of a d -ball on its radius. Selecting β ∗ = 2 says we only care about voids with at least the surface area of a single sample disk. The exponential dependencies on surface areas cancel, and we are left with a Voronoi ball radius at most our sampling radius, meaning β ≤ 2 . In practice, we achieve a much better saturation than the guarantee, β ≪ β ∗ for all m . This is expected because the proof is not tight: e.g., the void surface area might be much larger than that of an empty ball inside it, and we ignored chains of misses less than m . While the bound on the probability of achieving β &lt; 2 is dimension independent, the probability of achieving other β does depend on the dimension. Re-arranging Equation (1), we see ( β ∗ -1 ) d -1 = (a) shared area of a void and a disk (b) a ball with less surface area than its enclosing void ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-2c03eb02-13fe-4452-a36a-1d78d4831961.jpg) Fig. 5. Hitting a void from a neighboring disk. (-ln /uni03F5 )/ m . For example, the probability of achieving β &lt; 1 5 . decreases rapidly with dimension, and the probability of achieving β &lt; 2 5 . increases with dimension. Thus, as d increases, we should expect the distribution of local betas to narrow and converge towards 2, or perhaps to some lesser constant due to the slack in the proof. This is what we observe in practice; see Figure 6 in Section 5.1, and also Figure 15 in Appendix B. ## 4.2 Bound proofs Here we prove the bounds on m β , , and /uni03F5 in terms of d from Equation (1). A void is an uncovered region. It is bounded by some disks. The chance of hitting a void will depend on its surface area Area void , the ( ) d -1 dimensional volume of its boundary. It will also depend on the surface area of any disk on its boundary, Area ( D ) . Chance of missing the void from one disk. Let us quantify the chance p 1 ( miss ) that a line-spoke from disk D 1 missed a void. See Figure 5a. Let R 1 = Area void ( ∩ D 1 )/ Area ( D 1 ) . Since line-spokes are chosen uniformly from the surface area of the disk, p 1 ( hit ) = R 1 , and p 1 ( miss ) = 1 -R 1 . The chance of missing m times consecutively is then p m 1 ( miss ) = ˛ m j = 1 ( 1 -R 1 ) = ( 1 -R 1 ) m . Using the well-known inequality e -x = exp (-x ) &gt; 1 -x , we have p m 1 ( miss ) &lt; exp (-mR 1 ) . Chance of missing the void from all disks. The chance of missing m times consecutively from all N bounding disks is then p m all ( miss ) = ˛ N i = 1 p m i ( miss ) &lt; exp GLYPH&lt;16&gt; -m ˝ N i = 1 R i GLYPH&lt;17&gt; = exp (-mR ) , where all sample disks have the same radius so we can drop their subscripts and R = Area void ( )/ Area ( D ) . If we wish this miss chance to be less than /uni03F5 , then it is sufficient to have exp (-mR ) &lt; /uni03F5 , meaning mR &gt; -ln ( /uni03F5 ) &gt; 0 . Bound in terms of β . Now we bound R in terms of β . Suppose there is a domain point v in the void at distance r c from all samples. Then a ball at v of radius r void = r c -r f is strictly inside the void, and Area void ( ) &gt; Area ( D r ( void )) ; see Figure 5b. Since we are in d dimensions and β = r c / r f , $$R = \frac { A r e a ( \text{void} ) } { A r e a ( D ) } > \frac { r _ { \text{void} } ^ { d - 1 } } { r _ { f } ^ { d - 1 } } = ( \beta - 1 ) ^ { d - 1 }$$ Hence a sufficient condition is m β ( -1 ) d -1 &gt; -ln /uni03F5 , or $$m = \left \lceil ( - \ln \epsilon ) ( \beta - 1 ) ^ { 1 - d } \right \rceil \Leftrightarrow \beta = 1 + \left ( \frac { - \ln \epsilon } { m } \right ) ^ { 1 / ( d - 1 ) }$$ Two-spokes. If the first spoke finds an uncovered point, the second spoke always places a sample, so we need only consider the chance of the first spoke missing the void. The first spoke extends from 2 r to 4 r . If we consider the subset of a void that is at least 2 r from any disk, then propagating these values through the prior analysis shows β &lt; 4 within that subset. The uncovered regions between r and 2 r have local β &lt; 2 and are subsumed, so the bound holds for the entire void. Hence m = 12 gives β &lt; 4 with probability 1 -10 -5 . Subtleties. The reader may have noticed that we made no mention of the domain boundary. For bounded domains, we assumed that the void was bounded by disks only. For periodic domains, several analysis steps are only guaranteed to hold when the Voronoi-vertex ball spans less than the domain period. These issues may be finessed, e.g. by initializing with a few well-spaced samples. There is another statistical subtly concerning the order of spokes. The consecutive misses from one bounding disk are not guaranteed to be consecutive with the misses from another disk. But this does not matter, because the misses for each disk is independent of whether the void was hit and reduced by some spokes from a later front disk. The important thing is that no spoke ever hit the boundary of the void that remains after the algorithm terminated. ## 5 EXPERIMENTAL RESULTS ## 5.1 Distribution comparisons We compare the distributions of our methods and Point-Annulus experimentally. We provide open source software on the github repository SpokeDartsPublic [Awad et al. 2016], which may be used to verify the results. The original version of Point-Annulus [Bridson 2007] does not support periodic domains, so we re-implemented it as Point-Annulus*p for periodic domains in our framework. Figure 7 shows the spectra, radial distance function (RDF), and radial power (RP) for Point-Annulus*p, line-spokes, and two-spokes, over 2-10 dimensional periodic domains. We conducted experiments in dimensions up to 30, but the figures for higher dimensions reveal no new structure or trends. Anisotropy is negligible because the algorithms do not depend on the choice of axes, e.g. all spoke directions are random, and sample neighborhoods are spheres. The only possible contribution to anisotropy is the fact that the domain's periodicity is axis aligned. Many blue noise methods produce an RDF spike at r . However, for Point-Annulus, we were surprised to discover a discontinuity in the RDF at the outer annulus radius, 2 r , regardless of periodicity or implementation. For our methods, we notice a slight rise in RDF at 2 r for line-spokes and some non-constantness even for two-spokes. These artifacts tend to decrease with dimension. By design, the RDF and spectra of line- and two-spokes differ significantly. However, they have similar β distributions, after scaling by β two ≈ 2 β l i ne , as described in Section 4. Figure 6 shows the median β by method and dimension. - · Line-spokes has median β ≈ 0.9-1.2 as d = 2-5. - · Two-spokes has median β ≈ 1.8-2.4 as d = 2-5. The median β rises with dimension in part because of the increase in the number of Voronoi vertices around each sample, so the probability of at least one being far increases. However, recall from Section 4.1 that the distribution of achieved β narrows as the dimension increases, and should stay below a fixed value ( &lt; 2) as d →∞ . Additional data presented in Figure 15 in Appendix B bear this out. Fig. 6. Trends in β in practice. Top, line-spokes gives about the same saturation as Point-Annulus*p in one dimension lower. Two-spokes has about twice the β of Line-spokes by design. Bottom, the distribution of β (Voronoivertex to nearest-sample distances) narrows by dimension, and converges around a fixed value. We only show dimensions 2-5 because the available tools for computing Voronoi vertices, e.g. Qhull, run out of time and memory in higher dimensions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-be44ce77-0449-4af2-8151-9a210a494ae8.jpg) ## 5.2 Output size We describe the relationship between the output number of samples n and the sampling radius r to allow the user to select the necessary r to achieve the desired n , for example. A sample point inhibits the introduction of nearby samples in a neighborhood related to distance r , so the volume of this neighborhood is roughly proportional to r d . $$n \approx k ( d ) / r ^ { d }$$ As d varies, the constant of proportionality k will vary, depending on the inherent packing density of the dimension [Weisstein 1999], and also because of our achieved β . Experimentally, for line-spokes, $$k ( d ) = ( 0. 4 6 d + 1. 8 ) 1. 0 4 ^ { d } V _ { d },$$ where V is the volume of a unit d -sphere. d For two-spokes, the neighborhood around a point is roughly twice as large as line-spokes for the same r , so we expect n to be a factor of about 1 / 2 d smaller. In practice, k two ( d ) = ( 0 45 . d + 2 5 . )( 1 04 . / ) 2 d V d . See Appendix B.1 for additional details. ## 5.3 Runtime scaling We have three main observations: - · Runtime is linear in d for high dimensions, using exhaustive neighbor search. Albeit runtime is quadratic in n : O( dn 2 ) . - · Runtime is ≈ O( n log n ) for fixed d , using k -d trees. - · The crossover is about d = 7 for n = 200 000, meaning , k -d trees are faster than exhaustive search for d &lt; 7. The crossover dimension increases as n increases. Fig. 7. Spectra, RDF, and RP for dimensions 2-10. Spectra for d = 11-30 are similar to d = 10 . To keep the memory requirements tractable, spectral slices are computed directly in 2D using the Project-Slice Theorem (see, e.g. [Mersereau and Oppenheim 1974]). All plots use n ≈ 32,000, except d = 2 uses more for smoother figures. RDF and RP were produced using the TargetRDF software [Heck et al. 2013]. For RP the DC component was filtered. Both RP and RDF were selectively smoothed and scaled. In RDF, '1' is scaled to r , the minimum distance between samples, and plots are truncated at absolute distance 0.5, to avoid the complication of the domain periodicity. For Point-Annulus and especially line-spokes, the RDF spike at r is sharp, and the plotted heights depend on the width and alignment of histogram bins, so exercise caution in drawing conclusions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-66f4ebd1-376c-4f27-a9d1-21fa98fa09c1.jpg) ACM Transactions on Graphics, Vol. 37, No. 2, Article 22. Publication date: May 2018. Complexity analysis. The runtime is T = O( nF + dmNn ) , where n is the number of samples generated, and F is the time to find the N neighbors of a single sample. The dmNn term represents the time to throw and trim spokes, including those that miss the void. Short sequences ( &lt; m ) of miss spokes are charged to the next spoke that hits, just as in Bridson [2007]. For large d , we have N ≤ n and exhaustive search has F = O( dn ) ; thus T = O( dn 2 ) . For small fixed d , with n ≫ 2 d and n ≫ N , using k -d trees F ≈ O( log n + N ) and N = O( ) 1 ; thus T ≈ O( n log n ) . Experiments. We verified these complexities experimentally. Figure 8 shows the predicted O( n 2 ) and O( n log n ) runtimes. Figure 9 demonstrates linear runtime in d using exhaustive search. Experimentally, the line-spokes runtime T using exhaustive search (array) over aperiodic domains is about 2 0 . × 10 -9 ( 1 + 0 81 . d n ) 2 + 5 5 . × 10 -8 ( 1 + 0 05 . d Nn ) + 2 4 . × 10 -4 ( 1 + 0 05 . d n ) . Experimentally, the runtime for k -d tree search over periodic domains is about 7 8 . × 10 -7 dn ( 0 12 log 10 . n + N ) . See Appendix B.3 for additional analysis and experiments, including higher dimensions, periodic vs. aperiodic domains, and the number of neighbors by d . Fig. 8. Line-spokes scaling by n for an aperiodic domain. Each trendline is labeled by the fixed dimension of the domain in that study. Left, straight trendlines illustrate O( n 2 ) runtime for fixed d using exhaustive 'array' search. Right, straight trendlines would illustrate perfect O( n log n ) scaling for k -d trees. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-bfd3f32b-09d7-4442-a732-673ff465fb3f.jpg) Fig. 9. Fixedn scaling by d . Left shows that k -d trees save time in moderate dimensions. Right illustrates that runtime is linear in d for exhaustive array search. The right graphs are not smooth because we used only a few trials, and perhaps because of dimensional-dependent memory layout and machine issues, e.g. d = 8 appears particularly efficient. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-d1f4b8b4-fcb8-417e-b232-10d43adc4397.jpg) ## 6 APPLICATIONS Wedemonstrate the versatility of the spoke-dart sampling approach, and the utility of its blue noise output. We briefly summarize each application below; additional details are in the Appendices. Delaunay graphs span d = 6-14, optimization d = 6-100, rendering d = 4-8, and motion planning d = 6-23. The advancing-front spoke-dart sampling process provides new algorithms for approximate Delaunay graphs and global optimization. Our algorithm for approximate Delaunay graphs is significant because it avoids the curse of dimensionality and is dynamic. (By dynamic, we mean it can be updated quickly when inserting points, in contrast to some other known fast algorithms [Dwyer 1989].) We propose Opt-darts, a modification of the DIRECT global optimization algorithm [Jones et al. 1993; Shubert 1972]. Opt-darts uses the dynamic approximate Delaunay graph, and produces a well-spaced random output distribution of samples. For two standard test functions, we show that Opt-darts needs fewer function evaluations, and this speedup increases as the dimension increases. Rendering and motion planning use our high-dimensional blue noise output directly as input. We show that high-dimensional rendering is possible, but using blue noise provides no apparent improvement over standard inputs. Being able to produce highdimensional blue noise makes it feasible to run motion planning in high dimensions. ## 6.1 Approximate Delaunay graph ADelaunay graph is just the edges in the Delaunay complex of a set of vertices (samples). These edges are dual to the ( d - ) 1 -dimensional facets of the Voronoi diagram. We find some of these facets, along with a point inside the facet. We shoot a spoke from a vertex, and trim it by each hyperplane separating the vertex from another vertex, retaining the hyperplane that trimmed it the most. The final spoke endpoint is a point inside a Voronoi facet, a witness to the fact that the facet exists in the Voronoi diagram. We tend to find the facets that subtend a large solid angle at the vertex, but miss some small facets. See Appendix C.1 for details. ## 6.2 Global optimization The global-optimization algorithm DIRECT [Jones et al. 1993; Shubert 1972] is a classical and still-used method for optimizing expensive black-box functions, such as finite element simulation runs. It evaluates the objective function at each sample, and partitions the domain into hyperrectangles around each sample. A rectangle is recursively chosen for refinement if it is possible for the global minimum to lie inside it, assuming a fixed but unknown Lipschitz constant. Our variant, Opt-darts, partitions by Voronoi cells around each sample, instead of rectangles; these cells are implicit and only approximations are constructed. Opt-darts refines by adding new samples and updating nearby cell approximations. The new samples are chosen from among the spoke endpoints produced during the approximate Delaunay graph construction. Thus opt-darts uses both an approximate Delaunay graph, and generates an adaptive advancing-front random sampling. In our tests, Opt-darts more accurately represents sample neighborhoods, and new samples are more well-spaced, so fewer of them are needed. This advantage becomes more pronounced as the dimension increases. The disadvantage of Opt-darts is the higher computational cost in managing cells, but in the applications of interest the cost of the function evaluation at each sample dominates. In Table 1, we evaluate our method using community-standard high-dimensional test functions [Jamil and Yang 2013]. These were designed to be challenging for global optimization by having many local minima or a small gradient over most of the domain. Most difficult global optimization problems have some combination of these two features. For the Easom test function, in 6-10D speedups are 4-25 × . For the Bohachevsky test function, in 20-100D speedups are 5-27 × . See Appendix D for details. Table 1. Speedup of Opt-darts over DIRECT, measured by the number of function evaluations needed to find an approximation f ∗ close to the true global minimum ˆ f . That is: | f ∗ -ˆ f | &lt; 10 -4 where f ∈ [ 0 , 20 ] . Since Opt-darts is random, results are averages over 20 runs. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-43926617-98ad-4039-ba71-a9cc1bc5abf5.jpg) | Benchmark f | dimension | DIRECT | Opt-darts | Speedup | |---------------|-------------|----------|-------------|-----------| | Easom | 6 | 5657 | 1320 | 4.3 × | | | 7 | 20987 | 3276 | 6.4 × | | | 8 | 71677 | 4814 | 14.9 × | | | 9 | 257539 | 14258 | 18.1 × | | | 10 | 837203 | 33852 | 24.7 × | | | 20 | 5689 | 1269 | 4.5 × | | Bohachevsky | 40 | 25807 | 2633 | 9.8 × | | | 60 | 63765 | 4345 | 14.7 × | | | 80 | 122503 | 6246 | 19.6 × | | | 100 | 208185 | 7802 | 26.7 × | ## 6.3 Rendering Weintegrated spoke-dart sampling into the Mitsuba renderer [Jakob 2010]. The torus-in-glass image (Figure 1c) demonstrates a bidirectional path tracer using 8D samples corresponding to 2D for the sky emitter, 2D for the camera screen, and 2D for each bounce along each camera and light path. Spoke-dart sampling, stratified sampling, and low-discrepancy sequences all produced images of similar quality. See Appendix E for details. ## 6.4 Motion planning Motion planning explores the high-dimensional configuration space of robots to find collision-free paths between the given starting and desired ending configurations. In the 'parallel RRT' algorithm [Park et al. 2016], this space is pre-sampled by blue noise, and multiple threads explore connect-the-dots paths. Sometimes, because the configuration space has narrow regions and fine features, the pre-sampling is too coarse to determine if the path between two nearby points is collision-free. In that case, fine blue-noise samples are adaptively added. We did motion planning for a challenging 23D problem (Figure 1d), and a well-known suite of 6D benchmark scenarios [Şucan et al. 2012]. See Appendix F for details. ## 7 CONCLUSIONS AND FUTURE WORK Wepresent spoke-dart sampling as a new framework for high dimensional sampling. The method combines the advantages of state-ofthe-art methods: the locality of advancing-front and the dimensionmitigation of k -d darts, specifically line-samples. We provide spokedart sampling as open-source software [Awad et al. 2016]. To our knowledge, we provide the first algorithm for high dimensional • blue noise with provable guarantees of local saturation. Line-spokes uses the same advancing front approach as Point-Annulus, but, by using line samples, it produces a median saturation about the same as Point-Annulus in one dimension lower. We also produce blue noise with less significant artifacts. We have the option to avoid the traditional distribution spike at the disk radius and corresponding oscillations in the spectra. We demonstrate spoke-dart sampling's generality by adapting it for a variety of applications, including generating high-dimensional adaptive blue noise for global optimization. Our algorithm uses linear memory, and is computationally efficient in high dimensions, up to the efficiency of finding nearby neighbors. We speculate that approximate nearest neighbors may improve scalability in moderate dimensions, but not high dimensions. A potential future work is a universal algorithm that can automatically tune for a continuum of properties, analogous to Jiang et al. [2015]. It may be possible to produce a closer approximation to the true Delaunay graph by searching in a blue noise set of spoke directions. This could be generated by point-sampling the surface of a unit sphere, using spokes that are great-circle arcs. We speculate that approximate Delaunay graphs may be better than k -nearest neighbors for some computational topology and manifold learning problems, especially when data are non-uniformly spaced. High-dimensional global optimization is challenging, and Opt-darts demonstrates an improvement over DIRECT for two wellknown test problems. Future research directions include cell selection criteria and parallelization. We briefly touched on using high-dimensional blue noise for rendering; there is the potential for future work in Monte Carlo integration [Pilleboue et al. 2015] and low discrepancy sequences [Keller et al. 2012]. In our current implementation for motion planning we precompute all samples. We are investigating the possibility of adaptive sampling by exploiting the similarity between our method and tree growth. ## ACKNOWLEDGEMENTS We thank the authors of Point-Annulus [Bridson 2007], TargetRDF [Heck et al. 2013], and PSA [Schlömer and Deussen 2011] for making their software available, and the reviewers for their helpful feedback and suggestions. This material is based upon work supported by the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research (ASCR), Applied Mathematics Program. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525. This paper describes objective technical results and analysis. Any subjective views or opinions that might be expressed in the paper do not necessarily represent the views of the U.S. Department of Energy or the United States Government. ## REFERENCES Ahmed, A. G. M., Niese, T., Huang, H., and Deussen, O. 2017. An adaptive point sampler on a regular lattice. ACM Trans. Graph. 36, 4 (July), 138:1-138:13. - Ahmed, A. G. M., Perrier, H., Coeurjolly, D., Ostromoukhov, V., Guo, J., Yan, D.-M., Huang, H., and Deussen, O. 2016. Low-discrepancy blue noise sampling. ACM Trans. Graph. 35, 6 (Nov.), 247:1-247:13. - Alliez, P., Cohen-Steiner, D., Devillers, O., Lévy, B., and Desbrun, M. 2003. Anisotropic polygonal remeshing. ACM Trans. Graph. 22, 3 (July), 485-493. - Awad, M. A., Ebeida, M. S., Mitchell, S. A., Patney, A., Rushdi, A. A., and Swiler, L. P. 2016. SpokeDartsPublic open-source software. v. 1.0, https://github.com/ samitch/SpokeDartsPublic. Balzer, M., Schlömer, T., and Deussen, O. 2009. Capacity-constrained point distributions: A variant of Lloyd's method. ACM Trans. Graph. 28, 3 (July), 86:1-86:8. - Barber, C. B., Dobkin, D. P., and Huhdanpaa, H. 1996. The quickhull algorithm for convex hulls. ACM Trans. Math. Softw. 22, 4 (Dec.), 469-483. Bossek, J. 2017. smoof: Single- and multi-objective optimization test functions. The R Journal . - Bridson, R. 2007. Fast Poisson disk sampling in arbitrary dimensions. In SIGGRAPH '07: ACM SIGGRAPH 2007 Sketches &amp; Applications . 5. - Burkardt, J. 2011. TEST OPT: Optimization of a scalar function test problems. - Chen, J., Ge, X., Wei, L.-Y., Wang, B., Wang, Y., Wang, H., Fei, Y., Qian, K.-L., Yong, J.-H., and Wang, W. 2013. Bilateral blue noise sampling. ACM Trans. Graph. 32, 6 (Nov.), 216:1-216:11. - Cline, D., Jeschke, S., Razdan, A., White, K., and Wonka, P. 2009. Dart throwing on surfaces. In EGSR '09 . 1217-1226. - Cook, R. L. 1986. Stochastic sampling in computer graphics. ACM Trans. Graph. 5, 1, 51-72. - Şucan, I. A., Moll, M., and Kavraki, L. E. 2012. The open motion planning library. IEEE Robotics &amp; Automation Magazine 19, 4, 72-82. http://ompl.kavrakilab.org. - de Goes, F., Breeden, K., Ostromoukhov, V., and Desbrun, M. 2012. Blue noise through optimal transport. ACM Trans. Graph. 31, 6 (Nov.), 171:1-171:11. - Dippé, M. A. Z. and Wold, E. H. 1985. Antialiasing through stochastic sampling. In SIGGRAPH '85 . 69-78. Dunbar, D. and Humphreys, G. 2006. A spatial data structure for fast Poisson-disk sample generation. ACM Trans. Graph. 25, 3 (July), 503-508. Dwyer, R. A. 1989. Higher-dimensional Voronoi diagrams in linear expected time. In Proceedings of the fifth annual Symposium on Computational Geometry . SCG '89. ACM, New York, NY, USA, 326-333. Ebeida, M. S., Awad, M. A., Ge, X., Mahmoud, A. H., Mitchell, S. A., Knupp, P. M., and Wei, L.-Y. 2014. Improving spatial coverage while preserving blue noise of point sets. Computer-Aided Design 46 , 25-36. Ebeida, M. S., Davidson, A. A., Patney, A., Knupp, P. M., Mitchell, S. A., and Owens, J. D. 2011. Efficient maximal Poisson-disk sampling. ACM Trans. Graph. 30, 4 (July), 49:1-49:12. Ebeida, M. S., Mitchell, S. A., Patney, A., Davidson, A. A., and Owens, J. D. 2012. A simple algorithm for maximal Poisson-disk sampling in high dimensions. Comp. Graph. Forum 31, 2pt4, 785-794. Ebeida, M. S., Patney, A., Mitchell, S. A., Dalbey, K. R., Davidson, A. A., and Owens, J. D. 2014. k -d darts: Sampling by k -dimensional flat searches. ACM Trans. Graph. 33, 1 (Feb.), 3:1-3:16. Fattal, R. 2011. Blue-noise point sampling using kernel density model. ACM Trans. Graph. 30, 4 (July), 48:1-48:12. - Gamito, M. N. and Maddock, S. C. 2009. Accurate multidimensional Poisson-disk sampling. ACM Trans. Graph. 29, 1, 1-19. Gerber, S., Bremer, P., Pascucci, V., and Whitaker, R. 2010. Visual exploration of high dimensional scalar functions. Visualization and Computer Graphics, IEEE Transactions on 16, 6, 1271-1280. Heck, D., Schlömer, T., and Deussen, O. 2013. Blue noise sampling with controlled aliasing. ACM Trans. Graph. 32, 3 (July), 25:1-25:12. - Horst, R., Pardalos, P. M., and Romeijn, H. E. 2002. Handbook of Global Optimization . Vol. 2. Springer. - Jakob, W. 2010. Mitsuba renderer. http://www.mitsuba-renderer.org. - Jamil, M. and Yang, X.-S. 2013. A literature survey of benchmark functions for global optimization problems. Intl. Journal of Mathematical Modelling and Numerical Optimization 4, 2, 150-194. - Jiang, M., Zhou, Y., Wang, R., Southern, R., and Zhang, J. J. 2015. Blue noise sampling using an SPH-based method. ACM Trans. Graph. 34, 6 (Oct.), 211:1-211:11. - Jones, D. R., Perttunen, C. D., and Stuckman, B. E. 1993. Lipschitzian optimization without the Lipschitz constant. Journal of Optimization Theory and Applications 79, 1, 157-181. - Jones, T. R. 2006. Efficient generation of Poisson-disk sampling patterns. Journal of graphics tools 11, 2, 27-36. Kailkhura, B., Thiagarajan, J. J., Bremer, P.-T., and Varshney, P. K. 2016. Stair blue noise sampling. ACM Trans. Graph. 35, 6 (Nov.), 248:1-248:10. Keller, A., Premoze, S., and Raab, M. 2012. Advanced (quasi) Monte Carlo methods for image synthesis. In ACM SIGGRAPH 2012 Courses . SIGGRAPH '12. 21:1-21:46. Kollig, T. and Keller, A. 2003. Efficient illumination by high dynamic range images. In EGRW '03 . 45-50. Kopf, J., Cohen-Or, D., Deussen, O., and Lischinski, D. 2006. Recursive Wang tiles for real-time blue noise. ACM Trans. Graph. 25, 3 (July), 509-518. - Kuffner, J. J. and Lavalle, S. M. 2000. RRT-Connect: An efficient approach to singlequery path planning. In Proc. IEEE Conf. on Robotics and Automation . 995-1001. - Lagae, A. and Dutré, P. 2005. A procedural object distribution function. ACM Trans. Graph. 24, 4, 1442-1461. - Lagae, A. and Dutré, P. 2008. A comparison of methods for generating Poisson disk distributions. Computer Graphics Forum 21, 1, 114-129. ACM Transactions on Graphics, Vol. 37, No. 2, Article 22. Publication date: May 2018. LaValle, S. and Kuffner, J. 2001. Randomized kinodynamic planning. International Journal of Robotics Research 20, 5, 378-400. - Leong, K. Y. 2016. Test functions for optimization. - Li, H., Wei, L.-Y., Sander, P. V., and Fu, C.-W. 2010. Anisotropic blue noise sampling. ACM Trans. Graph. 29, 6 (Dec.), 167:1-167:12. - Li, X.-Y., Teng, S.-H., and Üngör, A. 2000. Biting: advancing front meets sphere packing. International Journal for Numerical Methods in Engineering 49, 1-2, 61-81. Liu, J. 1991. Automatic triangulation of N-dimensional Euclidean domains. In Proceedings of CAD/Graphics '91 . 238-241. - Liu, J., Li, S., and Chen, Y. 2008. A fast and practical method to pack spheres for mesh generation. Acta Mechanica Sinica 24, 4, 439-447. - Lloyd, S. 1983. An optimization approach to relaxation labeling algorithms. Image and Vision Computing 1, 2. Mersereau, R. M. and Oppenheim, A. V. 1974. Digital reconstruction of multidimensional signals from their projections. Proceedings of the IEEE 62, 10 (Oct), 1319-1338. Miller, G. L. and Sheehy, D. R. 2013. A new approach to output-sensitive voronoi diagrams and delaunay triangulations. In SoCG '13 . 281-288. - Miller, G. L., Sheehy, D. R., and Velingker, A. 2013. A fast algorithm for well-spaced points and approximate delaunay graphs. In SoCG '13 . 289-298. - Mitchell, D. P. 1987. Generating antialiased images at low sampling densities. In SIGGRAPH '87 . 65-72. - Mitchell, S. A., Rand, A., Ebeida, M. S., and Bajaj, C. 2012. Variable radii Poissondisk sampling, extended version. In Proceedings of the 24th Canadian Conference on Computational Geometry . 1-9. - Muja, M. and Lowe, D. G. 2009. Fast approximate nearest neighbors with automatic algorithm configuration. In VISAPP (1) . 331-340. - Muller, M. E. 1959. A note on a method for generating points uniformly on ndimensional spheres. Communications of the ACM 2, 4 (Apr.), 19-20. - Niederreiter, H. 1992. Random number generation and quasi-Monte Carlo methods . SIAM. - Overmars, M. H. 2005. Path planning for games. In Proc. 3rd Int. Game Design and Technology Workshop . 29-33. - Öztireli, A. C., Alexa, M., and Gross, M. 2010. Spectral sampling of manifolds. ACM Trans. Graph. 29, 6 (Dec.), 168:1-168:8. - Öztireli, A. C. and Gross, M. 2012. Analysis and synthesis of point distributions based on pair correlation. ACM Trans. Graph. 31, 6 (Nov.), 170:1-170:10. - Pan, J., Zhang, L., Lin, M. C., and Manocha, D. 2010. A hybrid approach for simulating human motion in constrained environments. Computer Animation and Virtual Worlds 21, 3-4, 137-149. Park, C., Pan, J., and Manocha, D. 2016. Parallel motion planning using Poisson-disk sampling. IEEE Transactions on Robotics . Pilleboue, A., Singh, G., Coeurjolly, D., Kazhdan, M., and Ostromoukhov, V. 2015. Variance analysis for Monte Carlo integration. ACM Trans. Graph. 34, 4 (July), 124:1-124:14. - Reinert, B., Ritschel, T., Seidel, H.-P., and Georgiev, I. 2016. Projective blue-noise sampling. Computer Graphics Forum 35, 1, 285-295. - Schechter, H. and Bridson, R. 2012. Ghost SPH for animating water. ACM Trans. Graph. 31, 4, 61:1-61:8. - Schlömer, T. and Deussen, O. 2011. Accurate spectral analysis of two-dimensional point sets. Journal of Graphics, GPU, and Game Tools 15, 3, 152-160. Shirley, P. 1991. Discrepancy as a quality measure for sample distributions. In Eurographics '91 . 183-194. - Shubert, B. O. 1972. A sequential method seeking the global maximum of a function. SIAM Journal on Numerical Analysis 9, 3, 379-388. - Subr, K. and Kautz, J. 2013. Fourier analysis of stochastic sampling strategies for assessing bias and variance in integration. ACM Trans. Graph. 32, 4 (July), 128:1128:12. - Sun, X., Zhou, K., Guo, J., Xie, G., Pan, J., Wang, W., and Guo, B. 2013. Line segment sampling with blue-noise properties. ACM Trans. Graph. 32, 4 (July), 127:1-127:14. Ulichney, R. A. 1988. Dithering with blue noise. Proceedings of the IEEE 76, 1, 56-79. Wang, T. and Suda, R. 2017. Fast maximal poisson-disk sampling by randomized tiling. In . 16:1-16:10. - HPG '17 - Wei, L.-Y. and Wang, R. 2011. Differential domain analysis for non-uniform sampling. ACM Trans. Graph. 30, 4 (July), 50:1-50:10. Weisstein, E. W. 1999. Hypersphere packing. http://mathworld.wolfram.com/ HyperspherePacking.html. - Witteveen, J. A. and Iaccarino, G. 2012. Simplex stochastic collocation with random sampling and extrapolation for nonhypercube probability spaces. SIAM Journal on Scientific Computing 34, 2, A814-A838. Yamane, K., Kuffner, J. J., and Hodgins, J. K. 2004. Synthesizing animations of human manipulation tasks. ACM Trans. Graph. 23, 3, 532-539. - Yan, D.-M. and Wonka, P. 2013. Gap processing for adaptive maximal Poisson-disk sampling. ACM Trans. Graph. 32, 5 (Oct.), 148:1-148:15. - Yang, X.-S. 2010. Appendix A: Test Problems in Optimization . John Wiley and Sons, Inc., 261-266. ## A SOFT BLUE NOISE We seek a better blue noise spectrum than line-spokes or PointAnnulus produces, where 'better' is defined in the following sense. The main drawbacks of those distributions is a large spike in the inter-sample distances near r , and corresponding oscillations in the radial power. To remove this, we first consider changing the distribution for choosing a random sample from a spoke to be more uniform by volume. This, by itself, proved insufficient to remove the spike. We experimented with additional rules such as skipping short spokes; see favored-spokes Appendix A.1. Although this algorithm has a unique advantage of a median saturation that is invariant by dimension, it should mostly be considered a stepping-stone towards two-spokes in Appendix A.2. We found that taking a second spoke was simpler and more intuitive than the skip rules, and generally produced a distribution with a flatter spectrum. ## A.1 Favored-Spokes To generate step blue noise, we use the same top level algorithm: Algorithm 1. However, we seek to avoid the spike in the RDF distribution at r . We use different rules to accept and sample from spokes: - · place samples on short trimmed spokes less often, - · place samples nearer the center of uncovered intervals. This reduces the number of disks nearlyr apart, but does not eliminate them because a spoke might be close to a disk without intersecting it. We must avoid any sharp cut-off values in the rules, because these would create new discontinuities in the RDF. We arrived at the following ranges experimentally. Skip short spokes. We use spoke interval I = [ 1 3 8 , . ] r . We never place a sample point farther than 3 4 . r , but the spoke extends to 3 8 . r so we can detect if a sample point would be near an extant disk. s We have two skip rules. The first rule is if a spoke is trimmed by any disk, then we discard it and treat it as a miss. We do this until we have 6 successive misses. After this we reset the miss count to zero and apply the second rule until we again get 6 successive misses. See the open and closed sectors in Figure 10. 0 The second rule is spokes are discarded if they are short . Spokes are discarded if their extent is less than 3 2 . r (length &lt; 2 2 . r ), and randomly discarded with decreasing probability if their extent is in [ 3 2 . , 3 5 . ] r ; i.e. always discarded if within the dark blue ring, and sometimes discarded if in the light ring, in Figure 10. The discard probability is zero at 3.5 and grows cubically to 1 at 3.2. Experimentally, a cubic rate produced better output than a linear or dimensional-dependent rate. Algorithm 2 describes TrimSpoke with these rules in place. Randomize spoke endpoints. We shorten the ends of a spoke by a random amount in [ 0 3 . , 0 8 . ] r to avoid sharp cutoff values. RandomSample for favored-spokes and two-spokes. A spoke actually trimmed by a neighbor is closed ; one with no disk intersections is open . For closed intervals, we place the sample point approximately uniformly by volume by the distance to the nearer spoke end . This underweights the volume near the front sphere. For open segments, we place the sample approximately uniform by volume Input: line spoke ℓ 1 anchored at a for sample s Output: uncovered segment of trimmed spoke ℓ ′ 1 - 1: if TrimAnchor( ) = empty a then - 2: return empty - 3: ℓ ′ 1 ← TrimInterval( ℓ 1 ) // n ot empty - 4: if SkipTrimmedSpoke and WasTrimmed( ℓ ′ 1 ) then - 5: if reject = 6 then - 6: SkipTrimmedSpoke ← false - 7: reject ← 0 - 8: return empty - 9: if IsShort( ℓ ′ 1 ) then - 10: return empty - 11: return ℓ ′ 1 Algorithm 2. TrimFavoredSpoke, for step blue noise. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-55bf2811-8659-4ec7-bf38-c619d72bb3f1.jpg) Fig. 10. Favored-spokes ranges. Spokes in the 'O' sector are open and 'C' are closed; 'S' are short, and 'S?' are considered short with some probability. The following are the outer ring radii as a factor of r : white = 1, magenta = 1.3, red = 2.8, blue = 3.2, light blue = 3.5, brown = 3.8. by distance to the end near the anchor, then flatten off and ramp down; see Figure 11. Fig. 11. Non-uniform sampling for favored-spokes and two-spokes. The sample is chosen uniformly by volume under the red curves. In 2d, from z the curve is linear with slope 1 until m . In general, y = ( x -z ) d -1 . (b) For closed spokes, the midpoint m is 0.6 of the way from z to z 2 . (a) For open spokes, m 1 = 0 54 . and m 2 = 0 7 . . For two-spokes the z and top are the spoke endpoints. For favored-spokes the z are chosen uniformly to be distance [ 0 3 . , 0 8 . ] r from the end of the spoke, on the green segments, and the top at distance 3 4 . r rather than 3 8 . r . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-c240ba99-4178-4a5f-b51c-bea89d7643da.jpg) ## A.2 Two-Spokes for soft blue noise Two-spokes also uses the same top level algorithm: Algorithm 1. We generate an uncovered point as with line-spokes, without the skip rules of favored-spokes. We pick the final sample by taking a second spoke through this uncovered point; see Figure 4. This mimics our prior Two Radii [Mitchell et al. 2012] sampling: the first spoke mimics finding a point uncovered by prior 2 r disks, and the second spoke mimics the larger admissible region for centers of disks that can cover it. • First spoke. The first spoke extends from 2 r to 4 r , with anchor at 2 r , and is trimmed by 2 r disks. We select the uncovered point s ′ from it using the RandomSample of favored-spokes. Second spoke. The second spoke is centered on, and anchored by, s ′ from the first spoke, with I = [-2 2 , ] r . After it is trimmed by 1 r disks, we split it by s ′ into two sides. We pick one side uniformly by length, and select the final sample from that side's segment using RandomSample from favored-spokes. See Algorithm 3. Input: uncovered point s ′ Output: output nearby uncovered point s ′′ 1: ℓ ← RandomSpoke ( s ′ , I = [-2 2 , ] r ) 2: ℓ ← TrimSpoke ( ℓ, a = s ′ , N s ( ′ )) // never empty 3: return s ′′ ← RandomSample ( ℓ ) Algorithm 3. SecondSpoke, generating a random uncovered point near the input uncovered point. Generalization. Two-spokes may be generalized to give the option to soften the step in the RDF distribution by different amounts, by parameterizing by α ∈ [ 0 inf , ) and γ ∈ [ 0 1 . Line-spokes corre-, ] sponds to α = 0 and γ = 0, and two-spokes as previously described corresponds to α = 1 and γ = 1 . The first spoke has I = ( 1 + α r ) [ 1 2 , ] and a = ( 1 + α r ) and is trimmed by radius ( 1 + α r ) sample disks. The second spoke has I = γ ( 1 + α r ) [-1 1 , ] and a = 0 and is trimmed by radius r sample disks. This will ensure that the first spoke finds an uncovered point, at least ( 1 + α r ) away from all prior samples, and the chosen sample will cover it by its ( 1 + α r ) disk. The chosen sample will be at least r f ≥ r away from any other sample. For small γ , the intersample distance will be even larger, by the triangle inequality: r f ≥ ( 1 -γ )( 1 + α ) . Thus r f ≥ max ( r , ( 1 -γ )( 1 + α )) . The form of the β ∗ guarantee is that r c is likely at most twice the anchor distance of the first spoke: r c ≤ 2 1 ( + α r ) . Thus for m = 12, with probability 1 -10 -5 we have $$\beta < \beta ^ { * } = 2 \min \left ( ( 1 + \alpha ), \frac { 1 } { 1 - \gamma } \right ) \quad \quad ( 2 ) \quad \text{ sa} \quad \text{ } d \, \colon$$ ## B ADDITIONAL EXPERIMENTAL RESULTS In this appendix, we show further comparisons between PointAnnulus, line-spokes, favored-spokes, and two-spokes. ## B.1 Output size data Section 5.2 gave approximate formulas for the number of output samples n by radius r and dimension d for line-spokes and twospokes for periodic domains. Recall n ≈ k d ( )/ r d with a different k d ( ) for each algorithm. For line-spokes over periodic domains of dimensions 2-22, we have k l,p ( d ) = ( 0 46 . d + 1 8 1 04 . ) . d V d , where V d is the volume of a unit d -sphere. For two-spokes we have k two ( d ) = ( 0 45 . d + 2 5 . )( 1 04 . / 2 ) d V . d For bounded domains, part of a sample's neighborhood falls outside the domain, so we expect the same r to produce a larger n . In practice, for line-spokes over dimensions 2-30, we observe k l,b ( d ) ≈ ( 0 0004 . d 4 -0 027 . d 3 + 0 52 . d 2 -2 5 . d + 6 2 . ) V d . The output size trends for favored-spokes are similar to linespokes, but with the constant of proportionality k d ( ) having less dimensional dependence. Experimentally, we observe $$k _ { \text{fav} } ( d ) = ( 0. 0 3 5 d + 1. 1 5 ) 1. 0 4 ^ { d } V _ { d },$$ See Figure 12 for a summary. In addition, Figure 18d shows how the radius varies across dimensions for fixed n for our algorithm variants. Fig. 12. Output size constants of proportionality. Number of samples n ≈ k d ( )/ r d where k d ( ) is plotted vs. d . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-0c5f859e-99fb-401a-8788-39f4b4909993.jpg) ## B.2 Distribution Figure 13 shows how increasing m affects the output saturation. As the dimension increases the distributions tend to resemble a Gaussian and become more sharply peaked. While the theory guarantees are invariant in dimension, in practice line-spokes and two-spokes produce slightly larger β in higher dimensions. Figure 14 shows how the median beta varies by dimension, for m = 12 and all methods. Figure 15 provides distribution details beyond the median. Specifically, it shows the distribution of the distance from each sample to its farthest Voronoi vertex and the distribution of distances from each Voronoi vertex to its nearest samples, using our algorithm's variations as well as Bridson's for d = 2 3 4 5. , , , For aperiodic domains the boundary significantly affects the distribution characteristics, especially for coarse samplings, so these results are mostly omitted. The exception is Figure 16, which shows the spectra for Bridson's implementation run over aperiodic domains. Besides supporting periodic domains and k -d tree search, the implementations differ in the order in which the front is advanced. In our implementation samples become the active front disk in the order in which they were created. We continue to sample around the active disk until 30 consecutive misses, then remove the disk from the front. In contrast, Point-Annulus visits front disks in random order: remove a random point from the queue as the active front disk, throw exactly 30 darts, then reinsert the front disk into the queue if any new sample was accepted. In our comparisons, this algorithmic difference does not affect the output distribution significantly. Although we can create blue noise distributions in higher dimensions, our ability to analyze their β is limited by the challenge of computing Voronoi vertices. We use QHull, and for large d and reasonable n , QHull runs out of memory (and time). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-f73d4ae0-f92f-4ae1-8d6d-297e62383348.jpg) (a) Total inserted points by m . Fig. 13. Local saturation for line-spokes in theory and practice by m . Here β дuaranteed = β ∗ , the probabilistically-guaranteed saturation upperbound in theory. And β achieved is the β observed in experiments. In practice β is about 7 × closer to 1 than the theory guarantee: e.g. β ≈ 1 15 . for m = 12 . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-3ff3be3e-4ef2-4a9b-b597-07fda48b44b8.jpg) ## Median  max  Beta  per  Sample Fig. 14. Trends in median β for m = 12 by d . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-cfe0651d-2530-42cd-bb32-19c8e595023c.jpg) ## B.3 Runtime scaling details Complexity analysis details. The runtime complexity is O( nF + dmNn ) , where n is the number of samples generated, and F is the time to find N neighbors. All primitives such as computing distances and trimming spokes are linear in d . Note N has dimensional dependence, but this is bounded by observing N &lt; n . Also F has additional dimensional dependence if one uses k -d trees or other techniques, but this is bounded by brute force searching F = O( dn ) . Hence runtime is O( dmn 2 ) . The O( dmNn ) term arises from generating spokes and trimming. For each sample we have one chain of m consecutive 'miss' spokes that do not generate a new sample, plus some shorter miss chains that end with a spoke that generates a sample. To bound the overall run-time, we must account for these small chains. We assign the cost of a small chain to the sample disk insertion following it, not the front disk generating the chain. Thus each sample accounts for the ( &lt; m -1) misses preceding it, the spoke that created it, plus its own m final successive misses, for a total of at most 2 m spokes. Thus in the entire algorithm we throw at most 2 mn spokes, each of which takes O( dN ) to trim. Experiments set up. We verified this complexity experimentally. Calculations were performed on a mid-2010 Mac, with 3.33 GHz 6-Core Intel Xeon processor, and 16 GB RAM. Experiments by output size. Figure 17 shows the scaling of linespokes by n . Experimentally, the line-spokes runtime using exhaustive search (array) over aperiodic domains is about 2 0 . × 10 -9 ( 1 + 0 81 . d n ) 2 + 5 5 . × 10 -8 ( 1 + 0 05 . d Nn ) + 2 4 . × 10 -4 ( 1 + 0 05 . d n ) . Experimentally, the runtime for k -d tree search over periodic domains is about 7 8 . × 10 -7 dn ( 0 12 log 10 . n + N ) . Experiments across search type. Figure 18a compares the runtime of all the line-spoke variations in small dimensions. Dimension 3 is close to as fast as dimension 2, because in all cases neighbor searching is a small fraction of the total time. The advantages of a tree vs. exhaustive search disappear at dimension 6 or 7 for n = 200 000. For smaller , n , the advantages disappear sooner. Neighbors and periodicity. Figure 18b shows the exponential increase in the number of neighbors by dimension for periodic domains. It also shows the effect this has on the runtime of the favoredand two-spoke k -d tree variants, mainly due to their longer spokes. For aperiodic domains, the boundary strongly effects N as n varies, and is not illuminating. Neighbor searching with exhaustive search is not much more expensive for periodic domains than aperiodic domains, but for k -d tree search periodic domains are increasingly expensive as the dimension increases. For k -d tree search, in the worst case one must do a tree search for each periodic translation of the query point, multiplying the query time by 2 d . This happens more frequently for small n (large r ). However, with larger n , there is additional expense in rebalancing the tree. For exhaustive search and small radius, the only extra step is to find the periodic translation of each coordinate of the test point that is closest to the query point, only adding a small O d ( ) term. For large radius, a spoke may cross more than one periodic copy of a sphere. To trim a spoke, we march numerically along the spoke from the anchor, ensuring that we are trimming by the closest periodic copy of each sphere at each step. This increases the runtime by a factor of about 50; this is large, but still a constant across d and n . Experiments by dimension. Figure 18c shows linear scaling in d for fixed n using exhaustive search. ## C APPLICATION: APPROXIMATE DELAUNAY GRAPHS ## C.1 Motivation Many applications rely on knowing the nearby neighbors of points. Often it is not enough to know just the nearest point or those within some threshold. A Delaunay graph describes both nearness and directionality; intuitively it provides all points that are nearest in some general direction. The size of the full Delaunay tessellation (including faces of all dimension) is inherently exponential in dimension, and computing it becomes intractable [Barber et al. 1996]. However, the number of edges is at most O n ( 2 ) . For some types of random input, the number of edges is expected to be linear, E ( n ) , and these can be found in E ( n ) time for static input [Dwyer 1989]. For meshing and other algorithms, the input is not static and as points are adaptively added the Delaunay graph must be dynamically updated. Some recent theoretical papers [Miller and Sheehy 2013; Miller et al. 2013] have considered dynamic approximate graphs and the challenges of high dimensions from the standpoint of complexity analysis, although no implementations or experimental results for these algorithms are available, and they require an over-approximation rather than an under-approximation as we provide. Fig. 15. β distribution histograms: (top) sample to farthest Voronoi vertex distance, and (bottom) Voronoi vertex to nearest sample distance, for d = 2-5. The bottom-half rightmost-column illustrates that, in practices, β narrows and converges to a fixed constant as d increases, as theory predicts. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-677c0631-7d9f-4ed5-aab5-f53635b338ec.jpg) ACM Transactions on Graphics, Vol. 37, No. 2, Article 22. Publication date: May 2018. Fig. 16. Point-Annulus output across dimensions 2-6 for aperiodic domains. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-5858cab5-6b03-4d7c-9ebb-64ad18350db2.jpg) To our knowledge, we present the first practical implementation for dynamic approximate Delaunay graphs in high dimensions. Graph D ∗ contains with high probability those edges whose dual Voronoi faces subtend a large solid angle with respect to the site vertex. We call these edges significant Delaunay edges , and the corresponding D ∗ a significant Delaunay graph . As a further benefit, our method produces a witness for each edge, a domain point on its true Voronoi face, which can be used to estimate the radial extent of the Voronoi cell. This is used in our global optimization application, Appendix D. The significant edges are a subset of the true Delaunay edges, and the Voronoi cell defined by the significant neighbors geometrically contains the true Voronoi cell. Many high-dimensional applications can accept approximate Delaunay graphs; the effect of the missing edges is application dependent. For global optimization, Appendix D, the approximation affects efficiency and not correctness. The neighborhood sizes around sample points determine the order in which new samples are generated. Prior approaches use rectangles which usually grossly overestimate the neighborhood sizes. The significant Delaunay graph provides a more accurate estimate of neighborhood sizes. The true Voronoi vertices of a true Delaunay graph would give the most accurate sizes, but there are an exponential number of them. Such compromises are commonly necessary for high-dimensional problems. For example, the state-of-the-art highdimensional nearest neighbor (and k -nearest) query [Muja and Lowe 2009] often returns the wrong nearest point, but its distance is probably not much greater than the distance to the true nearest neighbor. As algorithms for high-dimensional graphs have improved, their use has increased in fields such as uncertainty quantification [Witteveen and Iaccarino 2012] and computational topology [Gerber et al. 2010]. ## C.2 Algorithm Our basic idea is to throw random line-spokes to tease out the significant Delaunay edges from a set of spatial neighbors. This is a very simple method that scales well across different dimensions. It is summarized in Algorithm 4 with details as follows. We construct the graph D ∗ for each vertex s in turn. We initialize its edge pool with all vertices that are close enough to possibly share a Delaunay edge with s . We next identify vertices from this pool who are actual Delaunay neighbors of s with the following probabilistic method. Using spoke-darts, we throw m line-spokes. We trim each spoke ℓ using the separating hyperplane between s and each vertex s ′ in the pool. There is one pool vertex s ∗ whose hyperplane trims ℓ the most. (In degenerate cases where multiple vertices trim the spoke the most and equally, we can pick an arbitrary one for s ∗ .) The far end of the trimmed spoke ω is equidistant from s and s ∗ , and no ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-0fa2bcfc-efc0-4179-b150-4abe56fcca3d.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-ae914e62-9585-4519-bd7f-0ac4ee7ea8c9.jpg) 5 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-f181e5bf-4b3d-425a-8d7b-c468732d27a9.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-5dfdf0ea-8e47-49fe-8489-8f1dad7c626d.jpg) 10 Fig. 17. Line-spokes scaling by output sample number n . Top: exhaustive array neighbor search. Bottom: k -d tree search. Each trendline is labeled by the dimension of the domain in that study. In the top, the trendlines being straight illustrate that using exhaustive search runtime is O( n 2 ) for large but fixed d . In the bottom, straight trendlines would illustrate perfect O( n log n ) scaling. 8 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-2364d7a2-cf31-4313-af7d-692f9640487c.jpg) (a) Runtime cross-over ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-59a8cf39-435c-458b-9328-fad53b221265.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-d26d317a-978b-4efb-b492-e01e39fc88ff.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-a8e49e32-d8ba-493f-9a75-8c047bd25335.jpg) r 22 Fig. 18. Fixedn scaling by dimension. In (a), 'pt' is periodic domain with tree search, and 'na' is non-periodic with exhaustive array search, etc. The straight lines in 18c demonstrate linear runtime in d for array search. other vertex is closer. Hence ω is the witness that s and s ∗ share a Voronoi-face (Delaunay-edge), and ss ∗ is added to D ∗ . The reason we tend to find the significant neighbors with high probability is obvious from the above algorithm description. Spokes sample the solid angle around each vertex s uniformly, so the probability that a given spoke hits a given Voronoi face is proportional to the solid angle the face subtends at s . As the number of spokes m increases we are more likely to also find less significant neighbors, and D ∗ →D . Input: s , graph D ∗ , NeighborCandidates M , RecursionFlag R Output: D ∗ with s added 1: // R = true for a new vertex s 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: N = ( δ s ) for ∅ = // approx. Delaunay 0 i = ℓ ← // approx. neighbors cell radius 1 to m do RandomSpoke for each sample ( s , 0 , ′ s of of s | Ω |) ∈ M do ( ′ π s , s ) ← hyperplane between trim ′ ℓ with π s ( , if ℓ ) got shorter ∗ s ← ′ D ∗ ←D ∗ N ← N - s - n ss { ( δ s ) = max R = s } ( δ s ( true then // update edges for each sample M← ∗ s then o // without duplication length ( ℓ )) of neighbors, ′ s ∈ N Neighbors D ∗ ←D ∗ \ do ( ′ s ) Edges Recurse ( ′ s , D ∗ ( , M ′ s , { - s ) // false ) } remove all edges // restore some return D ∗ Algorithm 4. Add a vertex to the approximate Delaunay graph. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-ce5fad0c-2d4c-4877-a55b-88e9c84d2650.jpg) Fig. 19. Comparison of speed (a) and memory (b) between Qhull and spokedart sampling for an approximate Delaunay graph. Qhull becomes infeasible beyond d = 10 whereas our method scales well. Fig. 20. Effects of m on the approximate Delaunay graph. As m increases, fewer Delaunay edges are missed (a) but run-time increases (b). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-93e5678a-a924-4328-a1de-7d9f8c53ea1b.jpg) ## C.3 Experiments We demonstrate the efficiency of our approach against Qhull [Barber et al. 1996]. It is a commonly-used code for full convex hulls and removing some ) , ∗ s ′ s if s and Delaunay triangulations, and hence suffers from the curse of dimensionality. We know of no tools for approximate Delaunay graphs to compare against. As test input, we used Poisson-disk point sets over the unit-box domain in various dimensions. For each case, we used Qhull to generate the exact solution D and our method for the approximate solution D ∗ . As Figure 19 shows, the memory and time requirements of Qhull grows significantly as d increases. Qhull required memory that might not be practical for d ≥ 11. On the other hand, our method shows a linear growth for time and memory with d . We see that our method became competitive for d ≥ 9. Figure 20 shows the effect of m on the time and number of missed edges. ## D RETHINKING GLOBAL OPTIMIZATION USING VORONOI DECOMPOSITIONS A variety of disciplines, - science, engineering or even economics, - seek the 'best' answer for a question under study. This usually requires solving a global optimization problem, where we have to explore the parameter space of a function f in order to find the optimum point ˆ f of some objective function, possibly under a set of feasibility constraints. For many problems, local optimality is not sufficient and a global optimal point is desired. For simple analytical functions, some algorithms are guaranteed to find the global minimum. However, no method is guaranteed to find the global minimum for all functions, or even come close in finite time. For example, no method is guaranteed to find the minimum of a function resembling white noise. In practice, heuristic stochastic techniques are usually the best, and sometimes the only option [Horst et al. 2002]. Lipschitzian optimization is an important category of global optimization methods. Shubert [1972] explores the parameter space and provides convergence based on the Lipschitz constant K of the objective function, where a function f is Lipschitz continuous with constant K &gt; 0 if $$| f ( x _ { i } ) - f ( x _ { j } ) | \leq K | x _ { i } - x _ { j } | \quad \quad \quad ( 3 ) \quad \ \text{se}$$ for all x i , x j in the domain of f . The DIRECT algorithm [Jones et al. 1993] extends Shubert's work to higher dimensions and does not require knowledge of K , decomposing a domain into nested hyperrectangle partitions. In this section, we demonstrate how spoke-dart sampling can further generalize DIRECT by sampling points in random directions, not necessarily aligned with grid lines and replacing the nested hyperrectangle partitions with random approximations to Voronoi cells. Using classical test functions, we briefly illustrate how spoke-dart sampling has a significantly improved optimization performance. We believe this opens the door to new solutions of optimization problems. Below, we outline our optimization approach, called 'Optdarts' and provide a careful comparison between Opt-darts and DIRECT. To our knowledge, our method is the first stochastic Lipschitzian optimization technique. Our use of the phrase 'stochastic' refers to the randomness in the Voronoi cell seed locations within our algorithm; we are not referring to optimization of a stochastic objective function. Computing and refining random Voronoi cells has been intractable in high dimensions due to the exponential growth of Voronoi vertices as the dimension increases, and this is probably • why this direction has not been explored before. Our spoke darts algorithm enables the size estimation of the Voronoi Cells without explicitly calculating and storing these Voronoi vertices. This allows tractable cell refinement needed in solving global optimization problems. ## D.1 DIRECT algorithm The DIRECT (DIviding RECTangles) algorithm [Jones et al. 1993] was developed for optimization of 'black-box' functions (often expensive engineering simulations) which may be nonlinear, nonconvex, and multi-modal. DIRECT is a global optimization approach that combines global exploration of the space with local search around the best solution and does not require gradient information. DIRECT partitions the domain into hyperrectangles. It refines those rectangles, typically by trisecting each rectangle along one of its long sides. The refinement process creates nested hyperrectangles that could contain a point whose function value is smaller than the smallest f ∗ found so far. This refinement recurses until reaching the maximum number of iterations, or the remaining possible improvement is small. An important aspect of DIRECT is that it does not just pick one hyperrectangle for refinement. Instead, several hyperrectangles are selected based on relative weightings of local versus global search. Each rectangle i is associated with two quantities: 1) a function evaluation f i at its center and 2) a size estimate h i given by the distance from the rectangle center c i to any of its corners. The lower convex hull H of the 2D data points { h i , f i } lists the cells to be refined next. This convex hull is a Pareto curve that represents the tradeoff between local search (search around the best values of f i ) and global search (search around points with large h i because they have not been refined much yet). To avoid overrefining the cell with the current best solution f ∗ , an artificial data point is added with { h 0 = 0 , f 0 = f ∗ -/uni03F5 | f ∗ |} , where /uni03F5 (typically set to 10 -4 ) is a parameter to balance global and local searches. A cell is refined by choosing an axis-aligned direction, and splitting the cell into three equal-sized cells in that direction. H is updated every time its cells are refined. This refinement recurses until the sample budget is exhausted. Note that limiting the cell refinement to those in H explores the most probable locations for a new best solution without any assumptions about the Lipschitz constant K of the underlying function. ## D.2 Opt-darts algorithm: our method In this section, we first highlight limitations of DIRECT and how they are addressed in Opt-Darts. We then present the details of how Opt-darts chooses the first sample, estimates a cell size, and refines a cell. We then summarize the algorithm in a pseudocode. Motivation. DIRECT had a number of algorithmic limitations: 1) a cell can only be a hyperrectangle, 2) nested refinement, where a new cell can not extend beyond the boundaries of the refined cell, and 3) new sample points can only be on an axis-aligned direction with the refined cell's center. To mitigate these limitations, our algorithm (Opt-darts) uses Voronoi cells rather than hyperrectangles. From a Lipschitzian perspective, the cell size h i should be the distance from its sample point c i (cell seed) and its furthest Voronoi vertex v i . This offers a much more accurate neighborhood representation. On the other hand, nested refinement may result in false convergence (a phenomenon often reported by DIRECT users). This happens when DIRECT persistently refines a cell that is close to ˆ but does not actuf ally contain it; see Figure 21 for an illustration. Voronoi cells do not follow the nested refinement approach; each new sample includes the domain points closest to it, with no boundary constraints. In DIRECT, axis-aligned sampling results in a stair-pattern marching towards the global solution. Alleviating this constraint increases the possibility of sampling points closer to ˆ . f Moreover, while DIRECT adds new samples in the interior of the refined cell, Opt-dart has the flexibility of adding points on the refined cell's boundaries. This is more efficient for space filling. Algorithm. TheOpt-darts algorithm is summarized in Algorithm 5. Sampling first point. We pick the first point uniformly randomly from the middle 1/3 of the domain. Cell size estimation. Starting at a cell seed c i , we throw two sets of spokes: d spokes in axis-aligned directions (mimicking DIRECT), and 2 d more spokes along random directions, for a total of 3 d spokes. (One may use more spokes to more accurately estimate the cell size, at the price of higher computational cost.) Each spoke starts infinite, with anchor point c i , and we trim each end by separating hyperplanes until its end points are on the cell's boundary. If an end point is too close to the domain boundary, we reduce its length so its distance to the nearest boundary plane is at least 1/3 the distance from the center to that plane. We label the end points p r and p l . We say the length of the spoke is min (∥ c p i l )∥ 2 , ∥ c p i r ∥ 2 ) . We approximate the cell size by the longest such length, with spoke with end points l i and r i . Cell refinement. When cell i is chosen for refinement, l i and r i are added as new samples, implicitly creating two new Voronoi cells and modifying nearby cells. Input: sample budget N , function to optimize f Output: global optimum estimate f ∗ ≈ ˆ f - 1: Sample first point x 1 , evaluate f 1 = f ( x 1 ) - 2: Estimate cell size h 1 - 3: n ← 1 - 4: while n ≤ N do - 5: Construct 2D lower convex hull H of { h i , f i } - 6: for each c i ∈ H do - 7: Refine cell c i , evaluate f at new points - 8: Update cell sizes of new and refined cells - 9: n ← n + 2 - 10: if n ≥ N then end 11: return f ∗ = min { f } i // best solution found Algorithm 5. Opt-darts ## D.3 Analytical experiments In this section, we used two standard test functions, Easom and Bohachevsky [Jamil and Yang 2013], over a variable number of dimensions to illustrate the difference between Opt-darts and DIRECT. Two of the test suites which list these functions [Jamil and Yang 2013; Yang 2010] have been collectively cited more than 350 times. They are also available in many online tools and from test function libraries in Matlab [Burkardt 2011; Leong 2016], and R [Bossek 2017]. We chose these two functions to represent two extreme behaviors in the neighborhood of the global minimum ˆ . f The Easom function approaches the global minimum via very high gradient. It is almost flat everywhere and has a deep 'pinhole' region where the optimum lies. In contrast, the Bohachevsky function approaches ˆ f via an almost flat region that looks like a shallow bowl. Both functions are noisy, and have many local minima. The global minimum ˆ f = 0 for both functions, and is located at the origin, ∀ d . Note that finding ˆ f for the class of functions like Easom gets significantly harder as dimension increases. This problem is not as significant for the class of functions like Bohachevsky . Figure 21 illustrates an informative comparison of DIRECT and Opt-darts in terms of point placement using evaluations of the Easom function. In Table 1 in Section 6.2, we compare the number of function evaluations needed to be within 10 -4 of the true global minimum ˆ . f As shown in the table, opt-darts was able to achieve orders of speedup over DIRECT. Fig. 21. Contrasting sample placements, over the 2D Easom test function. The global minimum ˆ f is located at the lower left corner of the domain. Opt-darts approached it much faster than DIRECT. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-42a0cf22-b805-4566-82b5-2457ab4eeb37.jpg) ## E APPLICATION: RENDERING For a traditional rendering demonstration, we have integrated spokedarts into the Mitsuba physically-based renderer [Jakob 2010]. Most rendering algorithms in Mitsuba use point samplers to generate multidimensional point sets, providing a good base for applying and comparing different sampling methods. Scenes. Wehave chosen two scenes for this rendering experiment: Babylon and torus-in-glass, as shown in Figure 22. The Babylon case uses 4d samples corresponding to the 2D camera screen space + the 2D lens space to generate defocus blur. The torus-in-glass cases demonstrates a bidirectional path tracer using 8d samples corresponding to 2D for the sky emitter, 2D for the camera screen, and 2D for each bounce along each camera and light path. Results. In Figure 22, we compare the rendering quality of our method against the high-quality samplers within Mitsuba: multidimensional stratified sampling, and low-discrepancy sampling based on [Kollig and Keller 2003]. These samplers all seem to be well-spaced only along pairs of dimensions, such as the x-y camera samples and the u-v lens samples, but not the joint domains in 4D, 16-spp Low-discrepancy ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-6e65a361-305a-4446-bfcb-2b3ef6ebaebc.jpg) Spoke-darts ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-01ed9e9f-da66-40c5-a85d-68a2f81a219f.jpg) Stratified ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-5ce75294-5d4f-4515-b78c-e6cdcecd7184.jpg) 8D, 256-spp Fig. 22. Rendering by Mitsuba using two of the default Mitsuba samplers and Spoke-darts. The Babylon scene (top) renders antialiased depth-of-field using 16 samples-per-pixel (spp) in 4 dimensions, and the torus-in-glass scene (bottom) renders antialiased using 256-spp in 8D. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-36777719-e5e8-4ff6-b52f-47fe0444601e.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-0796e363-a871-46be-9a4c-4a0faec2af07.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1118v3-figure-d6777f45-4572-43b7-b4a4-6d79f9e9b05e.jpg) higher dimensions such as the 4D camera + lens domain. In contrast, spoke-darts samples are well-spaced along the joint domains. In Figure 22, the rendering quality using spoke-darts is comparable to that of using Mitsuba's samplers. As analyzed in [Reinert et al. 2016], the rendering quality depends on the projected sample distributions, which might explain the comparable quality of Mitsuba samplers and our method. Nevertheless, our method guarantees good sample distributions in any dimensions and performs at least as well in projected dimensions, even without explicit consideration of projected distributions as in [Reinert et al. 2016]. ## F APPLICATION: MOTION PLANNING Motion planning algorithms are frequently used in robotics, gaming, CAD/CAM, and animation [Overmars 2005; Pan et al. 2010; Yamane et al. 2004]. The main goal is to compute a collision-free path for real or virtual robots among obstacles. Furthermore, the resulting path may need to satisfy additional constraints, such as path smoothness, dynamics constraints, and plausible motions. This problem has been extensively studied for more than three decades. Two main challenges are: Speed. The computation needs to be fast enough for interactive applications and dynamic environments. High dimensionality. High Degrees-Of-Freedom (DOF) robots are very common. For example, the simplest models for humans (or humanoid robots) have tens of DOF, capable of motions like walking, sitting, bending, or picking objects. Some of the most popular algorithms for high-DOF robots use sample-based planning [LaValle and Kuffner 2001]. The main idea is to generate random collision-free sample points in the highdimensional configuration space, and join the nearby points using local collision-free paths. Connected paths provide a roadmap or tree for path computation or navigation. In particular, RRT (Rapidlyexploring Random Tree) [Kuffner and Lavalle 2000] incrementally builds a tree from the initial point towards the goal configuration. Table 2. Comparison of the performances of our GPU-based Poisson-RRT planning algorithms and a reference single-core CPU algorithm. We compared the planning time for different benchmarks using 100 trials. | Benchmark | DOF | RRT (1 CPU core) | GPU Poisson-RRT | Speed-up | |-------------|-------|--------------------|-------------------|------------| | Easy | 6 | 0.34 | 0.03 | 12.14 × | | AlphaPuzzle | 6 | 32.76 | 1.31 | 24.93 × | | Apartment | 6 | 191.79 | 11.88 | 16.15 × | | HRP-4 | 23 | 6.17 | 0.32 | 19.28 × | RRT is relatively simple to implement and widely used in many applications. However, prior RRT methods generate samples via white noise (a.k.a. Poisson process). These samples are not uniformly spaced in the configuration space, leading to suboptimal computation. Park et al. [2016] demonstrated that using Poisson-disk sampling instead can lead to more efficient exploration of the configuration space. We summarize [Park et al. 2016] in Algorithm 6. However, the algorithm described in [Park et al. 2016] assumes availability of precomputed Poisson-disk samples that can guide the selection of new points which are not too close to prior points. It starts with uniform sampling in the high dimensional space, and generates more adaptive samples in tight space or narrow passages. Furthermore, the Poisson-disk sampling can be used to design a parallel version of RRT algorithm that can map well to current commodity processors, including multi-core CPUs and many-core GPUs. Using a precomputed sampling that is shared by all threads allows efficient detection when a tree branch reaches an area that is already explored, and avoids redundant exploration. Input: configurations x init and x дoal in domain Ω Input: Poisson-disk sample set P precomputed via Algorithm 1 Output: RRT Tree T - 1: T . add ( x init ) - 2: P . add ( x дoal ) - 3: for i = 1 to m do in parallel // multiple threads - 4: while x дoal &lt; T do - 5: y ← RandomSample ( Ω ) - 6: T ← Extend ( T y P , , ) - 7: end for - 8: return T Algorithm 6. Parallel Poisson-RRT with precomputed samples. We use the novel spoke-darts algorithm to precompute the highdimension sample set via spoke-dart sampling and also adaptively refine this set to compute collision-free paths through narrow passages. This high-dimensional set is used by the resulting Poisson-RRT based motion planning algorithm [Park et al. 2016]. Furthermore, it is used to design a practical parallel RRT in high-dimensional configurations space, e.g., for a 23 DOF robot. We highlight the performance of this novel parallel Poisson RRT planner on three well-known motion planning benchmark scenarios from OMPL [Şucan et al. 2012]. These scenarios all have 6 DOF, and vary in their level of difficulty. We also compute the motion of the HRP-4 robot with 23 DOF; see Figure 1d. The total times taken by the planner are shown in Table 2.
10.1145/3194657
[ "Scott A. Mitchell", "Mohamed S. Ebeida", "Muhammad A. Awad", "Chonhyon Park", "Anjul Patney", "Ahmad A. Rushdi", "Laura P. Swiler", "Dinesh Manocha", "Li-Yi Wei" ]
2014-08-05T21:15:56+00:00
2018-06-13T23:27:21+00:00
[ "cs.GR" ]
Spoke-Darts for High-Dimensional Blue-Noise Sampling
Blue noise sampling has proved useful for many graphics applications, but remains underexplored in high-dimensional spaces due to the difficulty of generating distributions and proving properties about them. We present a blue noise sampling method with good quality and performance across different dimensions. The method, spoke-dart sampling, shoots rays from prior samples and selects samples from these rays. It combines the advantages of two major high-dimensional sampling methods: the locality of advancing front with the dimensionality-reduction of hyperplanes, specifically line sampling. We prove that the output sampling is saturated with high probability, with bounds on distances between pairs of samples and between any domain point and its nearest sample. We demonstrate spoke-dart applications for approximate Delaunay graph construction, global optimization, and robotic motion planning. Both the blue-noise quality of the output distribution and the adaptability of the intermediate processes of our method are useful in these applications.
1408.1119v3
## Second-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets Jonathan Scarlett Vincent Y. F. Tan Laboratory for Information and Inference Systems ´ Ecole Polytechnique F´ ed´ erale de Lausanne Email: [email protected] Dept. of Elec. and Comp. Eng. and Dept. of Mathematics, National University of Singapore Email: [email protected] Abstract -This paper studies the second-order asymptotics of the discrete memoryless multiple-access channel with degraded message sets. For a fixed average error probability ε ∈ (0 1) , and an arbitrary point on the boundary of the capacity region, we characterize the speed of convergence of rate pairs that converge to that point for codes that have asymptotic error probability no larger than ε , thus complementing an analogous result given previously for the Gaussian setting. ## I. INTRODUCTION In recent years, there has been great interest in characterizing the fixed-error asymptotics (e.g. dispersion, the Gaussian approximation) of source coding and channel coding problems, and the behavior is well-understood for a variety of single-user settings [1]-[3]. On the other hand, analogous studies of multiuser problems have generally had significantly less success, with the main exceptions being Slepian-Wolf coding [4], [5], the Gaussian interference channel with strictly very strong interference [6], and the Gaussian multiple-access channel (MAC) with degraded message sets [7]. In this paper, we complement our work on the latter problem by considering its discrete counterpart. By obtaining matching achievability and converse results, we provide the first complete characterization of the second-order asymptotics for a discrete channel-type network information theory problem. ## A. System Setup We consider the two-user discrete memoryless MAC (DMMAC) with degraded message sets [8, Ex. 5.18], with input alphabets X 1 and X 2 and output alphabet Y . As usual, there are two messages m 1 and m 2 , equiprobable on the sets { 1 , . . . , M 1 } and { 1 , . . . , M 2 } respectively. The first user knows both messages, whereas the second user only knows m 2 . Given these messages, the users transmit the codewords x 1 ( m ,m 1 2 ) and x 2 ( m 2 ) from their respective codebooks, and the decoder receives a noisy output sequence which is generated according to the memoryless transition law W n ( y x | 1 , x 2 ) = ∏ n i =1 W y x ( i | 1 ,i , x 2 ,i ) . An estimate ( ˆ m ,m 1 ˆ 2 ) is formed, and an error is said to have occurred if ( ˆ m ,m 1 ˆ 2 ) = ( m ,m 1 2 ) . The capacity region C is given by the set of rate pairs ( R , R 1 2 ) satisfying [8, Ex. 5.18] /negationslash $$R _ { 1 } & \leq I ( X _ { 1 } ; Y | X _ { 2 } ) \quad \quad ( 1 ) \quad \text{is d} \\ R _ { 1 } \, \perp \, R _ { 2 } & < I / Y _ { 3 } \, \ V _ { 4 } \cdot V \, \bigwedge \quad \ \text{$\mathfrak { M }$} \quad.$$ $$R _ { 1 } + R _ { 2 } \leq I ( X _ { 1 }, X _ { 2 } ; Y ) \quad \quad ( 2 ) \quad _ { ^ { 1 } \text{Fo} }$$ for some input joint distribution P X X 1 2 , where the mutual information quantities are with respect to P X X 1 2 ( x , x 1 2 ) W y x ,x ( | 1 2 ) . The achievability part is proved using superposition coding. We formulate the second-order asymptotics according to the following definition [5]. Definition 1 (Second-Order Coding Rates) . Fix ε ∈ (0 , 1) , and let ( R , R ∗ 1 ∗ 2 ) be a pair of rates on the boundary of C . A pair ( L , L 1 2 ) is ( ε, R ∗ 1 , R ∗ 2 ) -achievable if there exists a sequence of codes with length n , number of codewords for message j = 1 2 , equal to M j,n , and average error probability ε n , such that $$\liminf _ { n \to \infty } \frac { 1 } { \sqrt { n } } ( \log M _ { j, n } - n R _ { j } ^ { * } ) \geq L _ { j }, \ \ j = 1, 2, \quad ( 3 ) \\ \vdots \dots \dots \ \sim \ \ < \, \varepsilon \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ $$\lim \sup _ { n \to \infty } \varepsilon _ { n } \leq \varepsilon. \quad \quad ( 4 ) \\. \quad. \quad. \quad. \quad. \quad. \quad.$$ The ( ε, R ∗ 1 , R ∗ 2 ) -optimal second-order coding rate region L ( ε R , R ; ∗ 1 ∗ 2 ) ⊂ R 2 is defined to be the closure of the set of all ( ε, R ∗ 1 , R ∗ 2 ) -achievable rate pairs ( L , L 1 2 ) . Throughout the paper, we write non-asymptotic rates as R 1 ,n := 1 n log M 1 ,n and R 2 ,n := 1 n log M 2 ,n . Roughly speaking, the preceding definition is concerned with ε -reliable codes such that R j,n ≥ R ∗ j + 1 √ n L j + o ( 1 √ n ) for j = 1 2 , . We will also use the following standard definition: A rate pair ( R , R 1 2 ) is ( n, ε ) -achievable if there exists a lengthn code having an average error probability no higher than ε , and whose rate is at least R j for message j = 1 2 , . ## B. Notation Except where stated otherwise, 1 the i -th entry of a vector (e.g. y ) is denoted using a subscript (e.g. y i ). For two vectors of the same length a b , ∈ R d , the notation a ≤ b means that a j ≤ b j for all j . The notation N ( u ; µ , Λ ) denotes the multivariate Gaussian probability density function (pdf) with mean µ and covariance Λ . We use the standard asymptotic notations O ( ) · , o ( ) · , Θ( ) · , and ω ( ) · . All logarithms have base e , and all rates have units of nats. The closure operation is denoted by cl( ) · . The set of all probability distributions on an alphabet X is denoted by P X ( ) , and the set of all types [9, Ch. 2] is 1 For example, the vectors in (5)-(6), do not adhere to this convention. denoted by P n ( X ) . For a given type Q X ∈ P n ( X ) , we define the type class T n ( Q X ) to be the set of sequences having type Q X . Similarly, given a conditional type Q Y X | and a sequence x ∈ T n ( Q X ) , we define T n x ( Q Y X | ) to be the set of sequences y such that ( x y , ) ∈ T n ( Q X × Q Y X | ) . ## II. MAIN RESULT ## A. Preliminary Definitions Given the rate pairs ( R 1 ,n , R 2 ,n ) and ( R , R ∗ 1 ∗ 2 ) , we define $$\mathbf R _ { n } \coloneqq \begin{bmatrix} R _ { 1, n } \\ R _ { 1, n } + R _ { 2, n } \end{bmatrix}, \ \mathbf R ^ { * } \coloneqq \begin{bmatrix} R _ { 1 } ^ { * } \\ R _ { 1 } ^ { * } + R _ { 2 } ^ { * } \end{bmatrix} \quad ( 5 ) \quad \end{bmatrix}$$ Similarly, given the second-order rate pair ( L , L 1 2 ) , we write $$\mathbf L \coloneqq \begin{bmatrix} L _ { 1 } \\ L _ { 1 } + L _ { 2 } \end{bmatrix} \quad & \quad ( 6 ) \quad \text{fig. 1}$$ Given a joint input distribution P X X 1 2 ∈ P X ( 1 × X 2 ) , we define P X X Y 1 2 := P X X 1 2 × W , and denote the induced marginals by P Y X | 1 , P Y , etc. We define the following information density vector , which implicitly depends on P X X 1 2 : $$\mathfrak { j } ( x _ { 1 }, x _ { 2 }, y ) & \coloneqq \left [ j _ { 1 } ( x _ { 1 }, x _ { 2 }, y ) \quad j _ { 1 2 } ( x _ { 1 }, x _ { 2 }, y ) \right ] ^ { T } ( 7 ) \quad \text{bundar} \\ & = \left [ \log \frac { W ( y | x _ { 1 }, x _ { 2 } ) } { P _ { Y | X _ { 2 } } ( y | x _ { 2 } ) } \quad \log \frac { W ( y | x _ { 1 }, x _ { 2 } ) } { P _ { Y } ( y ) } \right ] ^ { T }. \ ( 8 ) \quad \text{in previ} \\ \text{The mean and conditional covariance matrix are given by} \quad \text{and not} \,.$$ The mean and conditional covariance matrix are given by X ,X I ( P X X 1 2 ) = E [ j ( X ,X ,Y 1 2 ) ] , (9) V ( P X X 1 2 ) = E [ Cov ( j ( X ,X ,Y 1 2 ) ∣ ∣ )] Observe that the entries of I ( P X X 1 2 ) are the mutual informations appearing in (1)-(2). We write the entries of I and V using subscripts as follows: 1 2 . (10) $$\mathbf I ( P _ { X _ { 1 } X _ { 2 } } ) = \underset { \mu } { \left [ \underset { \mu } { I _ { 1 2 } ( P _ { X _ { 1 } X _ { 2 } } ) } \right ] }, \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{$I_{1}(P_{X_{1}X_{2}})$} \right ], \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \text{$I(1)} \quad \text{$\text{$\text{$\text{$\text{$\text{$i}$} } } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$\text{\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\tilde{$\text{$\text{$\text{$\text{$i}$} } } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}" } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{($\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$i}$} \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} } \text{$\text{$i}$} }$$ $$\mathbf V ( P _ { X _ { 1 } X _ { 2 } } ) = \stackrel { \lambda } { \begin{bmatrix} V _ { 1 } ( P _ { X _ { 1 } X _ { 2 } } ^ { \mu } ) \\ V _ { 1, 1 2 } ( P _ { X _ { 1 } X _ { 2 } } ) & V _ { 1 2 } ( P _ { X _ { 1 } X _ { 2 } } ) \end{bmatrix} }, \quad ( 1 2 ) \text{ \quad \text{and str} } \\ \text{The 1}$$ For a given point ( z , z 1 2 ) ∈ R 2 and a positive semi-definite matrix V , we define the multivariate Gaussian cumulative distribution function (CDF) $$\Phi ( z _ { 1 }, z _ { 2 } ; \mathbf V ) & \coloneqq \int _ { - \infty } ^ { z _ { 2 } } \int _ { - \infty } ^ { z _ { 1 } } \mathcal { N } ( \mathbf u ; 0, \mathbf V ) \, \mathbf d \mathbf u, \quad ( 1 3 ) \quad \, \infty \, \left ( 1 3 \right ) \quad \, \right ) \, \\ \text{and for $\alpha$ aivan $e\leq\(\mathbf 0\,1\,\mathbf \colon$ was a dafina that coronation} \right )$$ and for a given ε ∈ (0 , 1) , we define the corresponding 'inverse' set $$\Psi ^ { - 1 } ( \mathbf V, \varepsilon ) \coloneqq \left \{ ( z _ { 1 }, z _ { 2 } ) \in \mathbb { R } ^ { 2 } \, \colon \Psi ( - z _ { 1 }, - z _ { 2 } ; \mathbf V ) \geq 1 - \varepsilon \right \}. \quad \text{Due to } t \\ ( 1 4 ) \quad \text{Due to } t \\ \text{and } \mathbf T _ { + }$$ Similarly, we let Φ( ) · denote the standard Gaussian CDF, and we denote its functional inverse by Φ -1 ( ) · . Moreover, we let be the set of input distributions achieving a given point ( R , R ∗ 1 ∗ 2 ) of the boundary of C . Note that in contrast with the single-user setting [1]-[3], this definition uses an inequality rather than an equality, as one of the mutual information $$\Pi ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) \coloneqq \left \{ P _ { X _ { 1 } X _ { 2 } } \, \colon \, I ( P _ { X _ { 1 } X _ { 2 } } ) \geq \mathbf R ^ { * } \right \} \quad ( 1 5 ) \quad P _ { X _ { 1 } X _ { 2 } } ^ { \text{For} } \\ \text{be the set of input distributions achieving a given point } \text{separal}$$ Fig. 1. Unit tangent vectors ˆ T -and ˆ T + for two boundary points ( R ,R ∗ 1 ∗ 2 ) of two hypothetical capacity regions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1119v3-figure-db055322-c976-4049-bc85-9b6d0991db7f.jpg) quantities may be strictly larger than the corresponding entry of R ∗ and yet be first-order optimal. For example, assuming that the capacity region on the left of Figure 1 is achieved by a single input distribution, all points ( R , R ∗ 1 ∗ 2 ) on the vertical boundary satisfy I 12 ( P X X 1 2 ) &gt; R ∗ 1 + R ∗ 2 . The preceding definitions are analogous to those appearing in previous works such as [4], while the remaining definitions are somewhat less standard. Given the boundary point ( R , R ∗ 1 ∗ 2 ) , we let ˆ T -:= ˆ T -( R , R ∗ 1 ∗ 2 ) and ˆ T + := ˆ T + ( R , R ∗ 1 ∗ 2 ) denote the left and right unit tangent vectors along the boundary of C in ( R , R 1 2 ) space; see Figure 1 for an illustration. Furthermore, we define $$\underset { \substack { \text{$\Lambda$} \\ \text{$\Lambda$} } } { \text{$\Lambda$} } \quad \text{$\mathbf T_{-} \colon = \begin{bmatrix} \hat { T } _ { -, 1 } \\ \hat { T } _ { -, 1 } + \hat { T } _ { -, 2 } \end{bmatrix}, \quad \mathbf T _ { + } \colon = \begin{bmatrix} \hat { T } _ { +, 1 } \\ \hat { T } _ { +, 1 } + \hat { T } _ { +, 2 } \end{bmatrix}. \quad ( 1 6 )$$ /negationslash It is understood that ˆ T -and T -(respectively, ˆ T + and T + ) are undefined when R ∗ 1 = 0 (respectively, R ∗ 2 = 0 ). As is observed in Figure 1, we have ˆ T -= -ˆ T + on the curved and straight-line parts of C , and ˆ T -= -ˆ T + when there is a sudden change in slope (e.g. at a corner point). The following set of vectors can be thought of as those that point strictly inside C when placed at ( R , R ∗ 1 ∗ 2 ) : $$\text{lative} \quad & \hat { \mathcal { V } } ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) \coloneqq \\ & \left \{ \mathbf v \in \mathbb { R } ^ { 2 } \ \colon \ ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) + \alpha \mathbf v \in \mathcal { C } \text{ for some } \alpha > 0 \right \}. \ \ ( 1 7 ) \\ ( 1 3 ) & \text{Using this definition, we set}$$ Using this definition, we set $$\ n d i n g _ { \begin{array} { c } \mathcal { V } ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) \coloneqq c l \left ( \bigcup _ { ( v _ { 1 }, v _ { 2 } ) \in \hat { \mathcal { V } } ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) } \right ) } \left \{ ( v _ { 1 }, v _ { 1 } + v _ { 2 } ) \right \} \right ). \ \ ( 1 8 ) \\ \varepsilon \right \}. \quad \mathbb { m } { \dots } \, \ e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e f e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e c l e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e g e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e s t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d i n t e d e d e d i n t e d e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n s t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i s t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d i n t e d e d i n t e d e d i n t e d e d i n t e d e d i n t e d e d i n t e d e d e d i n t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d s t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e s t s t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e e d i n t e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d e d \end{array}$$ Due to the closure operation, it is readily verified that T -∈ V and T + ∈ V . ## B. Statement of Main Result For a given boundary point ( R , R ∗ 1 ∗ 2 ) and input distribution P X X 1 2 ∈ Π( R , R ∗ 1 ∗ 2 ) , we define the set L 0 ( ε R , R , P ; ∗ 1 ∗ 2 X X 1 2 ) separately for the following three cases: $$\Phi ^ { \text{comm} } _ { \text{h the} } \quad \text{$\ell$} _ { 1 } ( P _ { X _ { 1 } X _ { 2 } } ) \stackrel { \lambda } { \text{and} } R _ { 1 } ^ { * } + R _ { 2 } ^ { * } < I _ { 1 2 } ( P _ { X _ { 1 } X _ { 2 } } ), \text{ then}$$ $$\text{ity} _ { \text{on} } \quad \mathcal { L } _ { 0 } = \left \{ ( L _ { 1 }, L _ { 2 } ) \, \colon \, L _ { 1 } \leq \sqrt { V _ { 1 } ( P _ { X _ { 1 } X _ { 2 } } ) } \Phi ^ { - 1 } ( \varepsilon ) \right \} \quad ( 1 9 )$$ $$( i i ) \, \text{If } R _ { 1 } ^ { * } < I _ { 1 } ( P _ { X _ { 1 } X _ { 2 } } ) \text{ and } R _ { 1 } ^ { * } + R _ { 2 } ^ { * } = I _ { 1 2 } ( P _ { X _ { 1 } X _ { 2 } } ), \text{ then}$$ $$\mathcal { L } _ { 0 } = \left \{ ( L _ { 1 }, L _ { 2 } ) \, \colon \, L _ { 1 } + L _ { 2 } \leq \sqrt { V _ { 1 2 } ( P _ { X _ { 1 } } X _ { 2 } ) } \Phi ^ { - 1 } ( \varepsilon ) \right \} \, ( 2 0 ) \, \text{ \quad proof $e$} \\ \left ( \frac { \dots } { \dots } \, \text{if $R^{*}=1,(P_{\nu}\nu\cap$ and $R^{*}+R^{*}=1,\delta(P_{\nu}\nu\cap$ then} } \, \text{ with } [ 7 ]$$ (iii) If R ∗ 1 = I 1 ( P X X 1 2 ) and R ∗ 1 + R ∗ 2 = I 12 ( P X X 1 2 ) , then $$\mathcal { L } _ { 0 } & = \left \{ ( L _ { 1 }, L _ { 2 } ) \ \colon \mathbf L \in \bigcup _ { \beta \geq 0 } \left \{ \beta \mathbf T _ { - } + \Psi ^ { - 1 } ( \mathbf V ( P _ { X _ { 1 } X _ { 2 } } ), \varepsilon ) \right \} \right \} \quad \text{A. A. } \text{The} \\ \dots \ ( \not \, \tau \ \tau \ \cdots \ \mathbf T \ - 1 1 \not \, \cap \mathbf N \ \cdots \ \mathbf x _ { - 1 } / \mathbf x _ { \prime } / \mathbf n \quad \cdots \ \mathbf x _ { \prime } } \right \} \quad \text{similar}$$ (21) $$\cup \left \{ ( L _ { 1 }, L _ { 2 } ) \, \colon \mathbf L \in \bigcup _ { \beta \geq 0 } ^ { e - 1 } \left \{ \beta \mathbf T _ { + } + \Psi ^ { - 1 } ( \mathbf V ( P _ { X _ { 1 } X _ { 2 } } ), \varepsilon ) \right \} \right \}, \quad \text{similar} \\ ( 2 1 ) \quad \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text$$\text$$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text \text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\tt$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$ \end{cases}$$ where the first (respectively, second) set in the union is understood to be empty when R ∗ 1 = 0 (respectively, R ∗ 2 = 0 ). We are now in a position to state our main result. Theorem 1. For any point ( R , R ∗ 1 ∗ 2 ) on the boundary of the capacity region, and any ε ∈ (0 , 1) , we have $$\mathcal { L } ( \varepsilon ; R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) = \bigcup _ { P _ { X _ { 1 } X _ { 2 } } \in \Pi ( R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) } \mathcal { L } _ { 0 } ( \varepsilon ; R _ { 1 } ^ { * }, R _ { 2 } ^ { * }, P _ { X _ { 1 } X _ { 2 } } ). \ ( 2 2 ) \ \text{distribut} \\ \quad \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \ \sim \$$ ## Proof: $$f \colon \text{See Section III}.$$ Suppose that X 1 = ∅ and ( R , R ∗ 1 ∗ 2 ) = (0 , C ) , where C := max P X 2 I ( P X 2 , W ) and W : X 2 → Y . Clearly L 1 plays no role, and Theorem 1 states that the achievable values of L 2 are precisely those in the set $$\mathcal { L } _ { 2 } ( \varepsilon ) \coloneqq \bigcup _ { P _ { X _ { 2 } } \in \Pi } \left \{ L _ { 2 } \colon L _ { 2 } \leq \sqrt { V ( P _ { X _ { 2 } } ) } \Phi ^ { - 1 } ( \varepsilon ) \right \}, \quad ( 2 3 ) \quad \text{a different} \\. \quad - \quad \frac { 1 } { 2 } \left ( \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right ) \pi \right.$$ where Π := { P X 2 : I ( P X 2 , W ) = C } , and V ( ) · := V 12 ( ) · is the conditional information variance [3]. Letting L ∗ := sup L 2 ( ε ) be the second-order coding rate [2] of the discrete memoryless channel (DMC) W : X 2 →Y , we readily obtain Thus, our main result reduces to the classical result of Strassen [1, Thm. 3.1] for the single-user setting (see also [2], [3]). This illustrates the necessity of the set Π( R , R ∗ 1 ∗ 2 ) in the characterization of L ( ε R , R ; ∗ 1 ∗ 2 ) in Theorem 1. Such a set is not needed in the Gaussian setting [7], as every boundary point is achieved uniquely by a single multivariate Gaussian distribution. Another notable difference in Theorem 1 compared to [7] is the use of left and right tangent vectors instead of a single derivative vector. $$L ^ { * } = \begin{cases} \sqrt { \min _ { P _ { X _ { 2 } } \in \Pi } V ( P _ { X _ { 2 } } ) } \Phi ^ { - 1 } ( \varepsilon ) & \varepsilon < \frac { 1 } { 2 } \\ \sqrt { \max _ { P _ { X _ { 2 } } \in \Pi } V ( P _ { X _ { 2 } } ) } \Phi ^ { - 1 } ( \varepsilon ) & \varepsilon \geq \frac { 1 } { 2 }. \end{cases} \quad ( 2 4 ) \quad \text{are $(n,1)$} \\ \text{$\varepsilon,\ $or\ $main$ result reduces to the classical result of} \quad \text{matrice} \\ \text{$twocease $1$ from $2$} 1 $ from $c_{inola\nzero$ contains $1$cease$} \quad \text{$1$cease $1$}. \end{cases}$$ Both of the preceding differences were also recently observed in an achievability result for the standard MAC [10]. However, no converse results were given in [10], and the main novelty of the present paper is in the converse proof. It is not difficult to show that L equals a half-space whenever ˆ T -= -ˆ T + , as was observed in [7], [10]. A less obvious fact is that the unions over β in (21) can be replaced by β = 0 whenever the corresponding input distribution P X X 1 2 achieves all of the boundary points in a neighborhood of ( R , R ∗ 1 ∗ 2 ) . We refer the reader to [7], [10] for further discussions and illustrative numerical examples. ## III. PROOF OF THEOREM 1 Due to space constraints, we do not attempt to make the proof self-contained. We avoid repeating the parts in common with [7], [10], and we focus on the most novel aspects. ## A. Achievability The achievability part of Theorem 1 is proved using a similar (yet simpler) argument to that of the standard MAC given in [10], so we only provide a brief outline. We use constant-composition superposition coding with coded time sharing [8, Sec. 4.5.3]. We set U := { 1 2 , } , fix a joint distribution Q UX X 1 2 (to be specified shortly), and let Q UX X ,n 1 2 be the closest corresponding joint type. We write the marginal distributions in the usual way (e.g. Q X U,n 1 | ). We let u be a deterministic time-sharing sequence with nQ U,n (1) ones and nQ U,n (2) twos. We first generate the M 2 ,n codewords of user 2 independently according to the uniform distribution on T n u ( Q X U,n 1 | ) . For each m 2 , we generate M 1 ,n codewords for user 1 conditionally independently according to the uniform distribution on T n ux 2 ( Q X X U,n 1 | 2 ) , where x 2 is the codeword for user 2 corresponding to m 2 . We fix β ≥ 0 and choose Q UX X 1 2 such that Q U (1) = 1 -β √ n and Q U (2) = β √ n , let Q X X 1 2 | U =1 be an input distribution P X X 1 2 achieving the boundary point of interest, and let Q X X 1 2 | U =2 be an input distribution P ′ X X 1 2 achieving a different boundary point. We define the shorthands I := I ( P X X 1 2 ) , V := V ( P X X 1 2 ) and I ′ := I ( P ′ X X 1 2 ) . Using the generalized Feinstein bound given in [7] along with the multivariate Berry-Esseen theorem, we can use the arguments of [10] to conclude that all rate pairs ( R 1 ,n , R 2 ,n ) satisfying $$\text{ret} \frac { 1 } { \sqrt { n } } \left ( \beta ( \mathbf I ^ { \prime } - \mathbf I ) + \Psi ^ { - 1 } ( \mathbf V, \varepsilon ) \right ) + g ( n ) \mathbf 1 \quad ( 2 5 )$$ are ( n, ε ) -achievable for some g n ( ) = O n ( 1 / 4 ) depending on ε , β , P X X 1 2 and P ′ X X 1 2 . Note that this argument may require a reduction to a lower dimension for singular dispersion matrices; an analogous reduction will be given in the converse proof below. The achievability part of Theorem 1 now follows as in [10]. In the cases corresponding to (19)-(20), we eliminate one of the two element-wise inequalities from (25) to obtain the desired result. For the remaining case corresponding to (21), we obtain the first (respectively, second) term in the union by letting P ′ X X 1 2 achieve a boundary point approaching ( R , R ∗ 1 ∗ 2 ) from the left (respectively, right). ## B. Converse The converse proof builds on that for the Gaussian case [7], but contains more new ideas compared to the achievability part. We thus provide a more detailed treatment. 1) A Reduction from Average Error to Maximal Error: Using an identical argument to the Gaussian case [7] (which itself builds on [9, Cor. 16.2]), we can show that L ( ε R , R ; ∗ 1 ∗ 2 ) is identical when the average error probability is replaced by the maximal error probability in Def. 1. We may thus proceed by considering the maximal error probability. Note that neither this step nor the following step are possible for the standard MAC; the assumption of degraded message sets is crucial. 2) A Reduction to Constant-Composition Codes: Using the previous step and the fact that the number of joint types on X 1 × X 2 is polynomial in n , we can again follow an identical argument to the Gaussian case [7] to show that L ( ε R , R ; ∗ 1 ∗ 2 ) is unchanged when the codebook is restricted to contain codeword pairs ( x 1 , x 2 ) sharing a common joint type. We thus limit our attention to such codebooks; we denote the corresponding sequence of joint types by { P X X ,n 1 2 } n ≥ 1 . 3) Passage to a Convergent Subsequence: Since P X ( 1 × X 2 ) is compact, the sequence { P X X ,n 1 2 } n ≥ 1 must have a convergent subsequence, say indexed by a sequence { n k } k ≥ 1 of block lengths. We henceforth limit our attention to values of n on this subsequence. To avoid cumbersome notation, we continue writing n instead of n k . However, it should be understood that asymptotic notations such as O ( ) · and ( ) · n → · ( ) are taken with respect to this subsequence. The idea is that it suffices to prove the converse result only for values of n on an arbitrary subsequence of (1 , 2 3 , , . . . ) , since we used the lim inf in (3) and the lim sup in (4). 4) A Verd´ u-Han-Type Converse Bound: We make use of the following non-asymptotic converse bound from [7]: $$\stackrel { \dots } { \varepsilon } \stackrel { \dots } { 1 } - \Pr \left ( \frac { 1 } { n } \sum _ { i = 1 } ^ { n } j ( X _ { 1, i }, X _ { 2, i }, Y _ { i } ) \geq \mathbf R _ { n } - \gamma _ { 1 } \right ) - 2 e ^ { - n \gamma }, \quad \leq \Pr \\ ( 2 6 ) \quad \text{where } t \, \mathbf R _ { \text{$1$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$ } \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \.$$ where γ is an arbitrary constant, ( X 1 , X 2 ) is the random pair induced by the codebook, and Y is the resulting output. The output distributions defining j are those induced by the fixed input joint type P X X ,n 1 2 . By the above constant-composition reduction and a simple symmetry argument, we may replace ( X 1 , X 2 ) by a fixed pair ( x 1 , x 2 ) ∈ T n ( P X X ,n 1 2 ) . 5) Handling Singular Dispersion Matrices: Directly applying the multivariate Berry-Esseen theorem (e.g. see [4, Sec. VI]) to (26) is problematic, since the dispersion matrix V ( P X X ,n 1 2 ) may be singular or asymptotically singular. We therefore proceed by handling such matrices, and reducing the problem to a lower dimension as necessary. We henceforth use the shorthands I n := I ( P X X ,n 1 2 ) and V n := V ( P X X ,n 1 2 ) . An eigenvalue decomposition yields $$V _ { n } = U _ { n } \mathbf D _ { n } U _ { n } ^ { T }, \quad \quad ( 2 7 ) \quad \Psi ^ { - }$$ where U n is unitary (i.e. U U n T n is the identity matrix) and D n is diagonal. Since we passed to a convergent subsequence in Step 3 and the eigenvalue decomposition map V n → ( U n , D n ) is continuous, we conclude that both U n and D n converge, say to U ∞ and D ∞ . When rank( D ∞ ) = 2 (i.e. D ∞ has full rank), we directly use the multivariate Berry-Esseen theorem. We proceed by discussing lower rank matrices. Since V n is the covariance matrix of A n := 1 √ n ( ∑ n i =1 j ( x 1 ,i , x 2 ,i , Y i ) -n I n ) (with Y i ∼ W ( ·| x 1 ,i , x 2 ,i ) ), we see that D n is the covariance matrix of ˜ A n := U A T n n . In the case that rank( D ∞ ) = 1 , we may write $$\tilde { \mathbf A } _ { n } \coloneqq \left [ \tilde { A } _ { n, 1 } \ \tilde { A } _ { n, 2 } \right ] ^ { T }, \quad \quad ( 2 8 ) \quad \text{$\text{$\text{$in pl}$}$$ where Var [ ˜ A n, 1 ] is bounded away from zero, and Var [ ˜ A n, 2 ] → 0 . Since U n is unitary, we have $$\mathbf A _ { n } = \mathbf U _ { n } \tilde { \mathbf A } _ { n } = \mathbf U _ { n, 1 } \tilde { A } _ { n, 1 } + \Delta _ { n }, \quad \ \ ( 2 9 )$$ where U n,i denotes the i -th column of U n , and ∆ n := U n, 2 ˜ A n, 2 . Since A n has mean zero by construction, the same is true of ˜ A n and hence ∆ n . Moreover, since ˜ A n, 1 has vanishing variance, the same is true of each entry of ∆ n . Thus, Chebyshev's inequality implies that, for any δ n &gt; 0 , $$\Pr \left ( \| \Delta _ { n } \| _ { \infty } & \geq \delta _ { n } \right ) \leq \frac { \psi _ { n } } { \delta _ { n } ^ { 2 } }, \quad \quad ( 3 0 ) \\ \vdots & - \max. \ \sim \mathcal { W } \vec { \ } r \left ( \Lambda \quad. 1 \rightharpoonup \theta$$ We can now bound the probability in (26) as follows: where ψ n := max i =1 2 , Var [∆ n,i ] → 0 . $$\text{es} \quad \text{--\bullet\, count, even, even, even, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \ \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even} \quad \text{--\bullet\, count, even$$ $$\text{$^ { \prime }$ for} \quad \stackrel { \cdot \cdot - \cdot u \cdot \cdot \cdot \cdot } { = } & \Pr \left ( \mathbf U _ { n, 1 } \tilde { A } _ { n, 1 } + \Delta _ { n } \geq \sqrt { n } ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma 1 ) \right ) \quad \stackrel { \cdot \cdot } { ( 3 2 ) } \\ \cdot \cdot \cdot \cdot \cdot & \quad < \Pr \left ( \mathbf U _ { n + 1 } \tilde { A } _ { n + 1 } > \sqrt { n } ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma 1 ) - \delta _ { n } 1 \right )$$ $$& = \Pr \left ( \begin{matrix} \dot { \mathbf A } _ { n } \geq \sqrt { n } \left ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma \mathbf 1 \right ) \right ) \\ & = \Pr \left ( \mathbf U _ { n } \, \mathbf T _ { n } \, \mathbf A _ { n } \, \mathbf T + \Delta _ { n } > \sqrt { n } \left ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma \mathbf 1 \right ) \right ) \end{matrix} \right )$$ $$\infty \quad & \quad \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \\ \text{of} \quad & \quad \leq \Pr \left ( \mathbf U _ { n, 1 } \tilde { A } _ { n, 1 } \geq \sqrt { n } & ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma 1 ) - \delta _ { n } 1 \right ) \\ & \quad \quad \quad$$ $$- n \gamma, \quad \leq & \Pr \left ( \mathbf U _ { n, 1 } \tilde { A } _ { n, 1 } \geq \sqrt { n } \left ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma 1 \right ) - \delta _ { n } 1 \right ) + \frac { \psi _ { n } } { \delta _ { n } ^ { 2 } }, \ \left ( 3 4 \right ) \\ \intertext { 6 \wedge } \text{ where the last three stens respectively follow from } \mathbb { m } { 0 } \right ) \, \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{$$ $$+ \Pr \left ( \| \Delta _ { n } \| _ { \infty } \geq \delta _ { n } \right ) \quad ( 3 3 ) \\ \Re - \tilde { I } _ { \infty } - \varkappa \tilde { I } _ { \infty } \rangle - \delta _ { \infty } \tilde { I } _ { \infty } + \frac { \psi _ { n } } { \infty }. \ ( 3 4 )$$ where the last three steps respectively follow from (29), [4, Lemma 9], and (30). We now choose δ n = ψ 1 / 3 n , so that both δ n and ψ n δ 2 n are vanishing. Equation (34) permits an application of the univariate Berry-Esseen theorem, since the variance of ˜ A n, 1 is bounded away from zero. The case rank( D ∞ ) = 0 is handled similarly using Chebyshev's inequality, and we thus omit the details and merely state that (34) is replaced by $$\cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \lambda \cdot \\ \quad 1 \left ( \sqrt { n } ( \mathbf R _ { n } - \mathbf I _ { n } - \gamma \mathbf 1 ) \leq \delta _ { n } \mathbf 1 \right ) + \delta _ { n } ^ { \prime } \quad \quad ( 3 5 ) \\ \text{ere } \delta _ { n } \to 0 \text{ and } \delta _ { n } ^ { \prime } \to 0.$$ 6) Application of the Berry-Esseen Theorem: Let I ∞ and V ∞ denote the limiting values (on the convergent subsequence of block lengths) of I n and V n . In this step, we will use the fact that Ψ -1 ( · , ε ) is continuous in the following sense: where δ n → 0 and δ ′ n → 0 . $$( 2 7 ) \quad \Psi ^ { - 1 } ( \mathbf V _ { n }, \varepsilon ) - \delta 1 \subset \Psi ^ { - 1 } ( \mathbf V _ { \infty }, \varepsilon ) \subset \Psi ^ { - 1 } ( \mathbf V _ { n }, \varepsilon ) + \delta 1 \ ( 3 6 ) \\ \bullet \quad \bullet \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal{ e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal { e } \quad \mathcal$$ for any δ &gt; 0 and sufficiently large n . This is proved using a Taylor expansion when V ∞ has full rank, and is proved similarly to [7, Lemma 6] when V ∞ is singular. We claim that the preceding two steps, along with the choice γ := log n n , imply that the rate pair ( R 1 ,n , R 2 ,n ) satisfies $$\mathbf R _ { n } \in \mathbf I _ { n } + \frac { 1 } { \sqrt { n } } \Psi ^ { - 1 } ( \mathbf V _ { \infty }, \varepsilon ) + g ( n ) 1 \quad \quad ( 3 7 )$$ for some g n ( ) = o ( 1 √ n ) depending on P X ,X ,n 1 2 and ε . In the case rank( D ∞ ) = 2 (see the preceding step), this follows by applying the multivariate Berry-Esseen theorem with a positive definite covariance matrix, re-arranging to obtain (37) with V n in place of V ∞ , and then using (36). In the case rank( V ∞ ) = 1 , we obtain (37) by applying the univariate Berry-Esseen theorem to (34) and similarly applying rearrangements and (36). The resulting expression can be written in the multivariate form in (37) by a similar argument to [4, p. 894]. When rank( V ∞ ) = 0 , we have V ∞ = 0 , and Ψ -1 ( V ∞ , ε ) is simply the quadrant { z : z ≤ 0 } . We thus obtain (37) by noting that the indicator function in (35) is zero for sufficiently large n whenever either entry of R n exceeds the corresponding entry of I n by Θ ( 1 √ n ) . 7) Establishing the Convergence to Π( R , R ∗ 1 ∗ 2 ) : We use a proof by contradiction to show that the limiting value P X X , 1 2 ∞ of P X X ,n 1 2 (on the convergent subsequence of block lengths) must lie within Π( R , R ∗ 1 ∗ 2 ) . Assuming the contrary, we observe from (15) that at least one of the strict inequalities I 1 ( P X X , 1 2 ∞ ) &lt; R ∗ 1 and I 12 ( P X X , 1 2 ∞ ) &lt; R ∗ 1 + R ∗ 2 must hold. It thus follows from (37) and the continuity of I ( P X X 1 2 ) that there exists δ &gt; 0 such that either R 1 ,n ≤ R ∗ 1 -δ or R 1 ,n + R 2 ,n ≤ R ∗ 1 + R ∗ 2 -δ for sufficiently large n , in contradiction with the convergence of ( R 1 ,n , R 2 ,n ) to ( R , R ∗ 1 ∗ 2 ) implied by (3). 8) Completion of the Proof for Cases (i) and (ii): Here we handle distributions P X X , 1 2 ∞ corresponding to the cases in (19)-(20). We focus on case (ii), since case (i) is handled similarly. It is easily verified from (14) that each point z in Ψ -1 ( V , ε ) satisfies z 1 + z 2 ≤ √ V 12 Φ -1 ( ε ) . We can thus weaken (37) to $$R _ { 1, n } + R _ { 2, n } \leq I _ { 1 2 } ( P _ { X _ { 1 } X _ { 2 }, n } ) + \sqrt { \frac { V _ { \infty, 1 2 } } { n } } \Phi ^ { - 1 } ( \varepsilon ) + g ( n ). \begin{array} { c } \infty \, \max \, \binom { c } { \text{or} } \Delta _ { n, 2 } \\ \text{hand sic} \\ ( 3 8 ) \quad \text{(where} \, } \end{array}.$$ We will complete the proof by showing that I 12 ( P X X ,n 1 2 ) ≤ R ∗ 1 + R ∗ 2 for all n . Since ⋃ P X X 1 2 { I 12 ( P X X 1 2 ) } is the set of all achievable (first-order) sum rates, it suffices to show that any boundary point corresponding to (20) is one maximizing the sum rate. We proceed by establishing that this is true. The conditions stated before (20) state that ( R , R ∗ 1 ∗ 2 ) lies on the diagonal part of the achievable trapezium corresponding to P X X 1 2 , and away from the corner point. It follows that p 1 := ( R ∗ 1 -δ, R ∗ 2 + δ ) and p 2 := ( R ∗ 1 + δ, R ∗ 2 -δ ) are achievable for sufficiently small δ . If another point p 0 with a strictly higher sum rate were achievable, then all points within the triangle with corners defined by p 0 , p 1 and p 2 would also be achievable. This would imply the achievability of ( R ∗ 1 + δ , R ′ ∗ 2 + δ ′ ) for sufficiently small δ ′ &gt; 0 , which contradicts the assumption that ( R , R ∗ 1 ∗ 2 ) is a boundary point. - 9) Completion of the Proof for Case (iii)): We now turn to the remaining case in (21), corresponding to I ∞ = R ∗ . Again using the fact that I ( P X X 1 2 ) is continuous in P X X 1 2 , we have $$\mathbf I _ { n } = \mathbf R ^ { * } + \Delta ( P _ { X _ { 1 } X _ { 2 }, n } ), \quad \quad ( 3 9 ) \quad _ { [ 9 ] \ 1 } ^ { 1 }$$ where ‖ ∆ ( P X X ,n 1 2 ) ‖ ∞ → 0 . We claim that ∆ ( P X X ,n 1 2 ) ∈ V ( R , R ∗ 1 ∗ 2 ) (see (18)). Indeed, if this were not the case, then (39) would imply that the pair ( I n, 1 , I n, 12 -I n, 1 ) lies outside the capacity region, in contradiction with the fact that rates satisfying (1)-(2) are (first-order) achievable for all P X X 1 2 . Assuming for the time being that ‖ ∆ ( P X X ,n 1 2 ) ‖ ∞ = O ( 1 √ n ) , we immediately obtain the outer bound $$\in \bigcup _ { P _ { X _ { 1 } X _ { 2 } } \in \Pi, \mathbf T \in \nu } \left \{ \Psi ^ { - 1 } ( \mathbf V ( P _ { X _ { 1 } X _ { 2 } } ), \varepsilon ) + \mathbf T } \right \} \right \}. \quad ( 4 0 ) \\ \cdot \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon$$ $$\Phi _ { \Psi } ^ { ( \varepsilon, R _ { 1 } ^ { * }, R _ { 2 } ^ { * } ) } \subseteq \left \{ ( L _ { 1 }, L _ { 2 } ) \ \colon \\ \Phi _ { \Psi } ^ { ( \varepsilon, R _ { 1 } X _ { 2 } \in \Pi, \mathbf T \in \nu } } \left \{ \Psi ^ { - 1 } ( \mathbf V ( P _ { X _ { 1 } X _ { 2 } } ), \varepsilon ) + \mathbf T } \right \} \right \}. \quad ( 4 0 ) \\ \Phi _ { \Psi } ^ { ( \varepsilon, R _ { 1 } X _ { 2 } \in \Pi, \mathbf T \in \nu } } \cdots$$ The set in (40) clearly includes L 0 in (21). We proceed by showing that the reverse inclusion holds, and hence the two sets are identical. Since ˆ T -and ˆ T + are tangent vectors, any vector T ∈ V can have one or more of its components increased to yield a vector T ′ whose direction coincides with either T -or T + . The fact that the magnitude of T ′ may be arbitrary is captured by the unions over β ≥ 0 in (21). It remains to handle the case that ‖ ∆ ( P X X ,n 1 2 ) ‖ ∞ is not O ( 1 √ n ) . By performing another pass to a subsequence of block lengths if necessary, we can assume that ‖ ∆ ( P X X ,n 1 2 ) ‖ ∞ = ω ( 1 √ n ) . Such scalings can be shown to play no role in characterizing L , similarly to [7]; we provide only an outline here. Let ∆ n, 1 and ∆ n, 12 denote the entries of ∆ ( P X X ,n 1 2 ) , and let ∆ n, 2 := ∆ n, 12 -∆ n, 1 . If either ∆ n, 1 or ∆ n, 2 is negative and decays with a rate ω ( 1 √ n ) , then no value of the corresponding L j ( j ∈ { 1 2 , } ) can satisfy the condition in (3), so the converse is trivial. On the other hand, if either ∆ n, 1 or ∆ n, 2 is positive and ω ( 1 √ n ) , we simply recover the righthand side of (40) in the limiting case that either T 1 or T 12 -T 1 (where T := [ T 1 T 12 ] T ) grows unbounded. Thus, the required converse statement for this case is already captured by (40). Acknowledgments: The second author is supported by NUS startup grants WBS R-263-000-A98-750/133. ## REFERENCES - [1] V. Strassen. Asymptotische Absch¨ atzungen in Shannons Informationstheorie. In Trans. Third Prague Conf. Inf. Theory , pages 689-723, Prague, 1962. - [2] M. Hayashi. Information spectrum approach to second-order coding rate in channel coding. IEEE Trans. Inf. Th. , 55(10):4947-66, 2009. - [3] Y. Polyanskiy, H. V. Poor, and S. Verd´ u. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Th. , 56(5):2307-59, 2010. - [4] V. Y. F. Tan and O. Kosut. On the dispersions of three network information theory problems. IEEE Trans. Inf. Th. , 60(2):881-903, 2014. - [5] R. Nomura and T. S. Han. Second-order Slepian-Wolf coding theorems for non-mixed and mixed sources. IEEE Trans. Inf. Th. , 60(9):55535572, 2014. - [6] S.-Q. Le, V. Y. F. Tan, and M. Motani. Second-order asymptotics for the Gaussian interference channel with strictly very strong interference. In Int. Symp. Inf. Th. , Honolulu, HI, July 2014. - [7] J. Scarlett and V. Y. F. Tan. Second-order asymptotics for the Gaussian MAC with degraded message sets. arXiv:1310.1197 [cs.IT] . - [8] A. El Gamal and Y.-H. Kim. Network Information Theory . Cambridge University Press, Cambridge, U.K., 2012. - [9] I. Csisz´ ar and J. K¨ orner. Information Theory: Coding Theorems for Discrete Memoryless Systems . Cambridge University Press, 2011. - [10] J. Scarlett, A. Martinez, and A. Guill´ en i F` abregas. Second-order rate region of constant-composition codes for the multiple-access channel. IEEE Trans. Inf. Th. , 61(1):157-172, Jan. 2015.
null
[ "Jonathan Scarlett", "Vincent Y. F. Tan" ]
2014-08-05T21:28:02+00:00
2015-04-14T03:11:13+00:00
[ "cs.IT", "math.IT" ]
Second-Order Asymptotics for the Discrete Memoryless MAC with Degraded Message Sets
This paper studies the second-order asymptotics of the discrete memoryless multiple-access channel with degraded message sets. For a fixed average error probability $\epsilon\in(0,1)$ and an arbitrary point on the boundary of the capacity region, we characterize the speed of convergence of rate pairs that converge to that point for codes that have asymptotic error probability no larger than $\epsilon$, thus complementing an analogous result given previously for the Gaussian setting.
1408.1120v1
## Discovery Prospects for NMSSM Higgs Bosons at the High-Energy Large Hadron Collider S. F. King 1 ∗ , M. M¨ uhlleitner 2 † , R. Nevzorov 3 ‡ , K. Walz 2 § 1 School of Physics and Astronomy, University of Southampton, Southampton, SO17 1BJ, U.K. 2 Institute for Theoretical Physics, Karlsruhe Institute of Technology, 76128 Karlsruhe, Germany. 3 School of Chemistry and Physics, University of Adelaide, SA 5005 Australia. ## Abstract We investigate the discovery prospects for NMSSM Higgs bosons during the 13 TeV run of the LHC. While one of the neutral Higgs bosons is demanded to have a mass around 125 GeV and Standard Model (SM)-like properties, there can be substantially lighter, nearby or heavier Higgs bosons, that have not been excluded yet by LEP, Tevatron or the 8 TeV run of the LHC. The challenge consists in discovering the whole NMSSM Higgs mass spectrum. We present the rates for production and subsequent decay of the neutral NMSSM Higgs bosons in the most promising final states and discuss their possible discovery. The prospects for pinning down the Higgs sector of the Natural NMSSM will be analysed taking into account alternative search channels. We give a series of benchmark scenarios compatible with the experimental constraints, that feature Higgs-to-Higgs decays and entail (exotic) signatures with multi-fermion and/or multi-photon final states. These decay chains furthermore give access to the trilinear Higgs self-couplings. We briefly discuss the possibility of exploiting coupling sum rules in case not all the NMSSM Higgs bosons are discovered. ∗ E-mail: [email protected] † E-mail: [email protected] ‡ E-mail: [email protected] § E-mail: [email protected] ## 1 Introduction The discovery of a new particle with mass around 125 GeV by the Large Hadron Collider Experiments ATLAS and CMS [1,2] has immediately triggered investigations of its properties such as spin and CP quantum numbers and couplings to other SM particles. These analyses conclude so far that the discovered particle is a Higgs boson which behaves rather SM-like. Additionally no new resonances have been discovered which could point to extensions beyond the SM (BSM). This renders the detailed investigation of the Higgs properties at highest possible accuracy accompanied by the search for new particles even more important. The Higgs sector of supersymmetric extensions of the SM introduces an enlarged Higgs spectrum due to the requirement of at least two complex Higgs doublets to ensure supersymmetry [3]. These lead in the Minimal Supersymmetric Extension of the SM (MSSM) [4] to five Higgs bosons. The Nextto-Minimal Supersymmetric Extension of the SM (NMSSM) [5] is extended by an additional complex superfield ˆ and allows for a dynamical solution of the S µ problem [6] when the singlet field acquires a non-vanishing vacuum expectation value. After electroweak symmetry breaking (EWSB) the NMSSM Higgs sector features seven Higgs bosons, which are in the CP-conserving case given by three neutral CP-even, two neutral CP-odd and two charged Higgs bosons. A nice consequence of the singlet superfield, which couples to the Higgs doublet superfields ˆ H u and ˆ H d , are new contributions to the quartic coupling proportional to the singlet-doublet coupling λ so that the tree-level mass value of the lighter MSSM-like Higgs boson is increased. Therefore less important radiative corrections are required to shift the mass value to 125 GeV and in turn smaller stop masses and/or mixing, allowing for less fine-tuning [7,8]. The singlet admixture in the Higgs mass eigenstates entails reduced couplings to the SM particles. Together with the enlarged Higgs sector this leads to a plethora of interesting phenomenological scenarios and signatures. Thus very light Higgs bosons are not yet excluded by the LEP searches [9] if their SM couplings are small enough. In turn heavier Higgs bosons can decay into a pair of lighter Higgs bosons subsequently decaying into SM particles which leads to interesting final state signatures [10-12]. Furthermore, branching ratios into LHC standard search channels such as γγ or vector boson final states can be enhanced or suppressed [8,13]. An enhanced photonic rate of the 125 GeV Higgs boson can also be due to two almost degenerate Higgs bosons with masses near 125 GeV [8,14]. The investigation of double ratios of signal rates at the high-energy option of the LHC would allow for the resolution of the double peak [15]. It is obvious that on the theoretical side the reliable interpretation of such BSM signatures and the disentanglement of different SUSY scenarios as well as their distinction from the SM situation requires precise predictions of the SUSY parameters such as masses and Higgs couplings to other Higgs bosons including higher order corrections. For the CP-conserving NMSSM the mass corrections are available at one-loop accuracy [16-20], and two loop results of O ( α α t s + α α b s ) in the approximation of zero external momentum have been given in Ref. [18]. In the complex case the Higgs mass corrections have been calculated at one-loop accuracy [21-24] with the logarithmically enhanced two-loop effects given in [25]. Higher-order corrections to the trilinear Higgs self-coupling of the neutral NMSSM Higgs bosons have been provided in [10]. But also constraints that arise from Dark Matter, the low-energy observables, the direct Higgs boson searches at LEP, Tevatron and the LHC as well as restrictions on the SUSY parameter space due to the exclusion bounds on SUSY particle masses have to be included when investigating viable NMSSM scenarios. By performing a scan over wide ranges of the NMSSM parameter space, incorporating in our analysis higher order corrections to the NMSSM Higgs parameters and their production and decay rates [26-28] and taking into account experimental constraints, we investigate the features of the NMSSM Higgs spectrum, the Higgs mass values and mixings. 1 We present signal rates for the various SM final states and discuss the prospect of discovering the NMSSM Higgs bosons during the next run of the LHC at a center-of-mass (c.m.) energy of 13 TeV. Subsequently, we restrict ourselves to a subspace of the NMSSM with a slightly broken Peccei-Quinn symmetry, that is characterized by a rather light Higgs spectrum with masses below about 530 GeV. This subspace, which we call Natural NMSSM, turns out to allow for the discovery of all Higgs bosons for a large fraction of its scenarios. It can therefore be tested or ruled out at the next LHC run. Besides their direct production, the Higgs bosons can also be produced in the decays of heavier Higgs bosons into lighter Higgs pairs or into a Higgs and gauge boson pair. The Higgs-to-Higgs decay processes give access to the trilinear Higgs self-couplings, which are a necessary ingredient for the reconstruction and test of the Higgs potential. We present benchmark scenarios that cover various aspects of Higgs-to-Higgs decays. We find that they lead to, in part unique, in part exotic, multi-photon and/or multi-lepton final states. These scenarios can therefore be viewed as benchmark scenarios and should be considered in the experimental searches to make sure that no BSM states will be missed. We also briefly discuss what can be learned from the couplings of the discovered Higgs bosons in case not all of the NMSSM Higgs bosons are accessible. The layout of the remainder of this paper is as follows. In section 2 we briefly introduce the NMSSM Lagrangian. In section 3 the details of the scan in the NMSSM parameter space are given. Our results are shown in section 4. After presenting the parameter and mass distributions in subsections 4.1 and 4.2, the NMSSM Higgs signal rates in various final states will be discussed in subsection 4.3. Section 5 is devoted to the analysis of the natural NMSSM. In Section 6 we present several benchmark scenarios that feature Higgs-to-Higgs decays. Section 7 summarises and concludes the paper. ## 2 The NMSSM Lagrangian The NMSSM differs from the MSSM in the superpotential and the soft SUSY breaking Lagrangian. In terms of the (hatted) superfields and including only the third generation fermions, the scale invariant NMSSM superpotential reads $$\mathcal { W } = \lambda \widehat { S } \widehat { H } _ { u } \widehat { H } _ { d } + \frac { \kappa } { 3 } \widehat { S } ^ { 3 } + h _ { t } \widehat { Q } _ { 3 } \widehat { H } _ { u } \widehat { t } _ { R } ^ { c } - h _ { b } \widehat { Q } _ { 3 } \widehat { H } _ { d } \widehat { b } _ { R } ^ { c } - h _ { \tau } \widehat { L } _ { 3 } \widehat { H } _ { d } \widehat { \tau } _ { R } ^ { c } \,.$$ The first term replaces the µ -term µH H ˆ u ˆ d of the MSSM superpotential. The second term, which is cubic in the singlet superfield, breaks the Peccei-Quinn symmetry [43], so that no massless axion can appear. The last three terms are the Yukawa interactions. The soft SUSY breaking Lagrangian receives contributions from the scalar mass parameters for the Higgs and sfermion fields, which in terms of the fields corresponding to the complex scalar components of the superfields read $$- \mathcal { L } _ { \text{mass} } & \ = \ m _ { H _ { u } } ^ { 2 } | H _ { u } | ^ { 2 } + m _ { H _ { d } } ^ { 2 } | H _ { d } | ^ { 2 } + m _ { S } ^ { 2 } | S | ^ { 2 } \\ & + \ m _ { \tilde { Q } _ { 3 } } ^ { 2 } | \tilde { Q } _ { 3 } ^ { 2 } | + m _ { \tilde { t } _ { R } } ^ { 2 } | \tilde { t } _ { R } ^ { 2 } | + m _ { \tilde { b } _ { R } } ^ { 2 } | \tilde { b } _ { R } ^ { 2 } | + m _ { \tilde { L } _ { 3 } } ^ { 2 } | \tilde { L } _ { 3 } ^ { 2 } | + m _ { \tilde { \tau } _ { R } } ^ { 2 } | \tilde { \tau } _ { R } ^ { 2 } | } \. \\ \dashrightarrow \ \ - \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \ \. \.$$ The Lagrangian including the trilinear soft SUSY breaking interactions between the sfermions and Higgs fields is given by $$\frac { - \, \mathcal { L } _ { \text{trial} } = \lambda A _ { \lambda } H _ { u } H _ { d } S + \frac { 1 } { 3 } \kappa A _ { \kappa } S ^ { 3 } + h _ { t } A _ { t } \tilde { Q } _ { 3 } H _ { u } \tilde { t } ^ { c } _ { R } - h _ { b } A _ { b } \tilde { Q } _ { 3 } H _ { d } \tilde { b } ^ { c } _ { R } - h _ { \tau } A _ { \tau } \tilde { L } _ { 3 } H _ { d } \tilde { \tilde { r } } ^ { c } _ { R } + \text{h.c.} \, \ ( 2. 3 )$$ 1 For recent studies on the NMSSM phenomenology, see [29-42]. The soft SUSY breaking Lagrangian with the gaugino mass parameters finally reads $$- \mathcal { L } _ { \text{gauginos} } = \frac { 1 } { 2 } \left [ M _ { 1 } \tilde { B } \tilde { B } + M _ { 2 } \sum _ { a = 1 } ^ { 3 } \tilde { W } ^ { a } \tilde { W } _ { a } + M _ { 3 } \sum _ { a = 1 } ^ { 8 } \tilde { G } ^ { a } \tilde { G } _ { a } \ + \ h. c. \right ].$$ We will work in the unconstrained NMSSM with non-universal soft terms at the GUT scale. After EWSB the Higgs doublet and singlet fields acquire non-vanishing vacuum expectation values (VEVs). The SUSY breaking masses squared for H u , H d and S in L mass are traded for their tadpole parameters by exploiting the three minimisation conditions of the scalar potential. The NMSSM Higgs potential is obtained from the superpotential, the soft SUSY breaking terms and the D -term contributions. Expanding the Higgs fields about their VEVs v u , v d and v s , which we choose to be real and positive, $$H _ { d } = \left ( \begin{array} { c } ( v _ { d } + h _ { d } + i a _ { d } ) / \sqrt { 2 } \\ h _ { d } ^ { - } \end{array} \right ) \, \quad H _ { u } = \left ( \begin{array} { c } h _ { u } ^ { + } \\ ( v _ { u } + h _ { u } + i a _ { u } ) / \sqrt { 2 } \end{array} \right ) \, \quad S = \frac { v _ { s } + h _ { s } + i a _ { s } } { \sqrt { 2 } } \, ( 2. 5 )$$ the Higgs mass matrices for the three scalar, two pseudoscalar and the charged Higgs bosons are derived from the tree-level scalar potential. The squared 3 × 3 mass matrix M 2 S for the CP-even Higgs fields is diagonalised through a rotation matrix R S yielding the CP-even mass eigenstates H i ( i = 1 2 3), , , $$( H _ { 1 }, H _ { 2 }, H _ { 3 } ) ^ { T } = \mathcal { R } ^ { S } ( h _ { d }, h _ { u }, h _ { s } ) ^ { T }$$ with the H i ordered by ascending mass, M H 1 ≤ M H 2 ≤ M H 3 . The CP-odd mass eigenstates A 1 , A 2 and the massless Goldstone boson G are obtained by consecutively applying a rotation R G to separate G , followed by a rotation R P to obtain the mass eigenstates $$( A _ { 1 }, A _ { 2 }, G ) ^ { T } = \mathcal { R } ^ { P } \mathcal { R } ^ { G } ( a _ { d }, a _ { u }, a _ { s } ) ^ { T }$$ which are ordered such that M A 1 ≤ M A 2 . At tree-level the NMSSM Higgs sector can be parameterised by the six parameters $$\lambda \, \ \kappa \, \ A _ { \lambda } \, \ A _ { \kappa }, \ \tan \beta = \langle H _ { u } ^ { 0 } \rangle / \langle H _ { d } ^ { 0 } \rangle \quad \text{and} \quad \mu _ { \text{eff} } = \lambda \langle S \rangle \.$$ The brackets around the fields denote the corresponding VEVs of the neutral components of the Higgs fields. The sign conventions for λ and tan β are chosen such that they are positive, while κ , A λ , A κ and µ eff can have both signs. Including the important higher order corrections, also the soft SUSY breaking mass terms for the scalars and the gauginos as well as the trilinear soft SUSY breaking couplings have to be taken into account. ## 3 The NMSSM Parameter Scan We perform a scan in the NMSSM parameter space with the aim of finding scenarios that are compatible with the LHC Higgs search results and which lead to Higgs spectra that can be tested at the LHC with high c.m. energy, √ s = 13 TeV. We demand them to contain at least one scalar Higgs boson with mass value around 125 GeV and rates that are compatible with those reported by the LHC experiments ATLAS and CMS. We used the program package NMSSMTools [26, 27] for the calculation of the SUSY particle and NMSSM Higgs boson spectrum and branching ratios. The higher order corrections to the NMSSM Higgs boson masses [16-20] have been incorporated in NMSSMTools up to O ( α α t s + α α b s ) for vanishing external momentum. The Higgs decays widths and branching ratios are obtained from NMHDECAY [26], an NMSSM extension of the Fortran code HDECAY [44, 45]. The SUSY particle branching ratios are obtained from the Fortran code NMSDECAY [46] which is a generalisation of the Fortran code SDECAY [45,47] to the NMSSM particle spectrum. The NMSSM particle spectrum, mixing angles, decay widths and branching ratios are given out in the SUSY Les Houches Accord (SLHA) format [48]. For various parameter sets we have cross-checked the NMSSM Higgs branching ratios against the ones obtained with the recently released Fortran package NMSSMCALC [28]. Differences arise in the treatment of the radiative corrections to the Higgs boson masses and in the more sophisticated and up-to-date inclusion of the dominant higher order corrections to the decay widths as well as the consideration of off-shell effects in NMSSMCALC . The overall picture, however, remains unchanged. We have performed the scan over a large fraction of the NMSSM parameter space in order to get a general view of the NMSSM Higgs boson phenomenology. For the mixing angle tan β and the NMSSM couplings λ and κ the following ranges have been considered, $$1 \leq \tan \beta \leq 3 0 \, \quad 0 \leq \lambda \leq 0. 7 \, \quad - 0. 7 \leq \kappa \leq 0. 7 \.$$ We have taken care of not violating perturbativity by applying the rough constraint $$\sqrt { \lambda ^ { 2 } + \kappa ^ { 2 } } \leq 0. 7 \.$$ The soft SUSY breaking trilinear NMSSM couplings A λ and A κ and the effective µ eff parameter have been varied in the ranges $$- \, 2 \, \text{TeV} \leq A _ { \lambda } \leq 2 \, \text{TeV} \,, \, - 2 \, \text{TeV} \leq A _ { \kappa } \leq 2 \, \text{TeV} \,, \, - 1 \, \text{TeV} \leq \mu _ { \text{eff} } \leq 1 \, \text{TeV} \,. \quad ( 3. 1 1 )$$ Note, that too large positive values for A κ for negative κ lead to non self-consistent solutions, which have been discarded. The parameter A λ is related to the charged Higgs boson mass. The compatibility with the lower bound on the charged Higgs mass has been checked for [49]. In the choice of the remaining soft SUSY breaking trilinear couplings and masses care has been taken to respect the exclusion limits on the SUSY particle masses [50-52]. The trilinear soft SUSY breaking couplings of the up- and down-type quarks and the charged leptons, A ,A U D and A L with U ≡ u, c, t, D ≡ d, s, b and L ≡ e, µ, τ , are varied independently in the range $$- \, 2 \, \text{TeV} \leq A _ { U }, A _ { D }, A _ { L } \leq 2 \, \text{TeV} \,.$$ The soft SUSY breaking right- and left-handed masses of the third generation are $$6 0 0 \, \text{GeV} \leq M _ { \tilde { t } _ { R } } = M _ { \tilde { Q } _ { 3 } } \leq 3 \, \text{TeV} \,, \, 6 0 0 \, \text{GeV} \leq M _ { \tilde { \tau } _ { R } } = M _ { \tilde { L } _ { 3 } } \leq 3 \, \text{TeV} \,, \, M _ { \tilde { b } _ { R } } = 3 \, \text{TeV} \,. \, ( 3. 1 3 )$$ And for the first two generations we chose $$M _ { \tilde { u } _ { R }, \tilde { c } _ { R } } = M _ { \tilde { d } _ { R }, \tilde { s } _ { R } } = M _ { \tilde { Q } _ { 1, 2 } } = M _ { \tilde { e } _ { R }, \tilde { \mu } _ { R } } = M _ { \tilde { L } _ { 1, 2 } } = 3 \text{ TeV} \,.$$ The gaugino soft SUSY breaking masses finally are varied in the ranges $$1 0 0 \, \text{GeV} \leq M _ { 1 } \leq 1 \, \text{TeV} \,, \, 2 0 0 \, \text{GeV} \leq M _ { 2 } \leq 1 \, \text{TeV} \,, \, 1. 3 \, \text{TeV} \leq M _ { 3 } \leq 3 \, \text{TeV} \,. \quad ( 3. 1 5 )$$ Note, that in NMSSMTools the NMSSM-specific input parameters λ, κ, A λ and A κ as well as all other soft SUSY breaking masses and trilinear couplings, according to the SLHA format, are understood as DR parameters taken at the SUSY scale ˜ M = 1 TeV, while tan β is taken at the mass of the Z boson, M Z . The program package NMSSMTools is interfaced with micrOMEGAS [53] so that the compatibility of the relic abundance of the lightest neutralino as the NMSSM Dark Matter candidate with the latest PLANCK results [54] can be checked for. The package furthermore tests for the constraints from low-energy observables as well as from Tevatron and LEP. Details can be found on the webpage of the program [27]. 2 In addition we have included in NMSSMTools the latest LHC Higgs exclusion limits, given in Refs. [55-61]. Among the parameter points, that survive the constraints incorporated in NMSSMTools , only those are kept that feature an NMSSM Higgs spectrum with at least one CP-even Higgs boson in the range of 124 GeV to 127 GeV, which is fulfilled by either H 1 or H 2 , and which will be denoted by h in the following. In some cases H 1 and H 2 are almost degenerate with a mass value near 125 GeV. In this case the signal rates observed at the LHC are built up by two Higgs bosons. Applying the narrow width approximation, the reduced signal rate µ XX into a final state particle pair XX is given by the production cross section σ prod of the NMSSM Higgs boson H i times its branching ratio BR into the final state XX , normalised to the corresponding SM values for a SM Higgs boson H SM , i.e. $$\mu _ { X X } ( H _ { i } ) = \frac { \sigma _ { \text{prod} } ( H _ { i } ) B R ( H _ { i } \to X X ) } { \sigma _ { \text{prod} } ( H ^ { \text{SM} } ) B R ( H ^ { \text{SM} } \to X X ) } \equiv R _ { \sigma _ { \text{prod} } } ( H _ { i } ) \, R _ { X X } ^ { B R } ( H _ { i } )$$ with $$M _ { H ^ { \text{SM} } } = M _ { H _ { i } } \equiv M _ { h } = 1 2 4 - 1 2 7 \text{ GeV} \.$$ In Eq. (3.16) we have introduced the ratio of production cross sections $$R _ { \sigma _ { \text{prod} } } ( H _ { i } ) \equiv \frac { \sigma _ { \text{prod} } ( H _ { i } ) } { \sigma _ { \text{prod} } ( H ^ { \text{SM} } ) }$$ and the ratio of branching ratios $$R _ { X X } ^ { B R } ( H _ { i } ) \equiv \frac { B R ( H _ { i } \to X X ) } { B R ( H ^ { \text{SM} } \to X X ) } \.$$ If not stated otherwise we approximate the inclusive cross section by the dominant gluon fusion production cross section. In the SM the loop induced process is mediated by top and bottom quark loops and known at next-to-leading order (NLO) QCD including the full mass dependence [62]. The next-to-next-to-leading order (NNLO) QCD corrections have been calculated in the heavy top mass approximation [63]. The latter is valid to better than 1% for Higgs masses below 300 GeV [64]. The soft gluon resummation [65,66] and partial, respectively approximate, next-to-next-to-next-to-leading order (N LO) results have been presented in [66, 67]. 3 In the NMSSM, gluon fusion production additionally contains stop and sbottom quark loops, with the squark loops becoming particularly important for squark masses below ∼ 400 GeV [68]. The cross section can be adapted from the corresponding result in the MSSM [62,69], by replacing the respective MSSM Higgs-quark-quark and Higgs-squark-squark couplings with the NMSSM 2 Note that in our analysis we do not take into account the constraint from g -2, as it is non-trivial to find parameter combinations which can explain the 2 σ deviation from the SM value. couplings. As we use in our scan the program package NMSSMTools , which provides the ratio of the NMSSM Higgs boson decay width into a gluon pair at NLO QCD with respect to the NLO QCD decay width into gg of a SM Higgs boson with same mass, we approximate the gluon fusion production cross section for a CP-even NMSSM Higgs boson H i by $$\sigma _ { g g \to H _ { i } } ^ { N M S S M } = \frac { \Gamma _ { N L O } ^ { N M S S M } ( H _ { i } \to g g ) } { \Gamma _ { N L O } ^ { S M } ( H ^ { S M } \to g g ) } \times \sigma _ { g g \to H ^ { S M } } ^ { S M } \,, \quad \text{with } \, M _ { H _ { i } } = M _ { H ^ { S M } } \,.$$ The SM gluon fusion cross section has been calculated at NNLO QCD for M H SM = 126 GeV with the Fortran program HIGLU [70]. 3 The cross section changes by less than 5% in the range 124 GeV &lt; M ∼ H SM &lt; ∼ 127 GeV. In NMSSMTools the gluon decay width does not include mass effects at NLO QCD. The higher order electroweak (EW) corrections [71] are of O (5%) in the SM. As they are not available for the NMSSM and cannot be obtained by simple coupling modifications, we consistently neglect them. In case the signal is built up by the superposition of the rates from the 125 GeV h boson and another Higgs boson Φ = H , A i j , which is almost degenerate, we define the reduced signal strength as glyph[negationslash] $$\mu _ { X X } ( h ) \equiv R _ { \sigma _ { \text{prod} } } ( h ) \, R _ { X X } ^ { B R } ( h ) \ + \sum _ { \substack { \Phi \neq h \\ | M _ { \Phi } - M _ { h } | \leq \delta } } R _ { \sigma _ { \text{prod} } } ( \Phi ) \, R _ { X X } ^ { B R } ( \Phi ) \, F ( M _ { h }, M _ { \Phi }, d _ { X X } ) \.$$ Here δ denotes the mass resolution in the XX final state and F M ,M ,d ( h Φ XX ) the Gaussian weighting function as implemented in NMSSMTools . The experimental resolution d XX of the channel XX influences the width of the weighting function. In the following only those parameter values are retained that lead to reduced rates according to Eq. (3.21) into the bb, ττ, γγ, W W and ZZ final states, that are within 2 times the 1 σ interval around the respective best fit value, as reported by ATLAS and CMS. Here we have combined the signal rates and errors, given in Refs. [72] and [73], of the two experiments according to Eq. (5) in [74]. The combined signal rates and errors are given in Table 1. 4 Note, that in the following we will use the shorthand notation 2 × 1 σ to indicate the interval around the measured rate, that we allow for. In summary, in Table 1: The ATLAS and CMS combined signal rates and errors for the bb, ττ, γγ, W W and ZZ final states. Apart from the bb final state, where Higgs-strahlung V H ( V = W,Z ) is the production channel, they are based on the inclusive production cross section. Details can be found in Refs. [72] and [73]. | channel | best fit value | 2 × 1 σ error | |------------|------------------|-----------------| | V H → V bb | 0.97 | ± 1 . 06 | | H → ττ | 1.02 | ± 0 . 7 | | H → γγ | 1.14 | ± 0 . 4 | | H → WW | 0.78 | ± 0 . 34 | | H → ZZ | 1.11 | ± 0 . 46 | 3 For comparison we also calculated for some parameter points the NMSSM Higgs production cross sections at NNLO with HIGLU . For the SM-like Higgs boson the approximation Eq. (3.20) works better than 1%. For the heavy MSSM-like Higgs bosons there can be deviations of up to O (10%), and for the light singlet-like Higgs bosons they can reach the level of O (20%) for some scenarios. For our purposes the approximation is good enough. 4 In order to check the compatibility in the bb ¯ final state we have replaced gluon fusion production with production in association with W,Z . addition to the implemented restrictions in NMSSMTools , the conditions on our parameter scan are ## Conditions on the parameter scan: $$\text{At least one CP-even Higgs boson } H _ { i } \equiv h \text{ with: } \quad 1 2 4 \text{ GeV } \, \lesssim \, M _ { h } \lesssim 1 2 7 \text{ GeV} \\ \text{Compatibility with } \mu _ { X X } ^ { \exp } \, ( X = b, \tau, \gamma, W, Z ) \colon \quad \, \quad \, \quad | \mu _ { X X } ^ { \text{scan} } ( h ) - \mu _ { X X } ^ { \exp } | \leq 2 \times 1 \sigma$$ In our case we have H i = H 1 or H 2 , and µ exp XX and 2 × 1 σ as given in Table 1. For all scenarios we require that they lead to relic densities Ω c h 2 that are not larger than the result given by PLANCK [54], $$\Omega _ { c } h ^ { 2 } = 0. 1 1 8 7 \pm 0. 0 0 1 7 \.$$ While this can be achieved for a large fraction of parameter points, there are only a few points that reproduce the relic density within the given errors. This is to be expected, however, in view of the remarkably small error on the relic density reported by PLANCK. ## 4 Results In this section we first present the general features of the scenarios as the outcome of our scan that survive all imposed constraints. Subsequently the parameter sets shall be investigated in more detail with respect to their prospects of discovering NMSSM Higgs bosons or testing the coupling structure of the Higgs sector. ## 4.1 NMSSM and Stop Sector Parameter Distributions Figure 1 (left) shows the distribution of the λ and κ values for the scenarios resulting from our scan. The right figure shows the viable values in the tan β -λ plane. The particular shape of the κ -λ distribution is the result of the requirement Eq. (3.10). As can be inferred from the figures, in the scenarios passing the constraints either the lightest Higgs boson H 1 (red points) or the second lightest H 2 (blue points) is the SM-like Higgs boson h with mass around 125 GeV. While the λ and κ values cover the whole allowed region, most scenarios are found for either low ( &lt; ∼ 0 1) or high ( . &gt; ∼ 0 55) . λ values. In the lowλ region in particular κ values close to 0 lead to the H 2 being the SM-like Higgs boson, higher κ values imply the lightest scalar boson to have SM properties. For small λ values and κ non-zero the singlet-like Higgs boson is at tree-level already comparatively heavy, so that it corresponds to the second lightest Higgs boson and H 1 is SM-like. If, however, κ is also small the singlet mass becomes smaller than 125 GeV so that H 2 can be SM-like. Large λ values allow independently of κ for either H 1 or H 2 being SM-like. Note, however, that in this region, κ values close to zero are precluded 5 . 5 In the limit when κ goes to zero the mass of the lightest neutralino m ˜ χ 0 1 , which is predominantly singlino, becomes much smaller than M Z and the couplings of this state to the SM particles and their superpartners tend to be negligibly small leading to rather small annihilation cross section for ˜ χ χ 0 1 ˜ 0 1 → SM particles. Since the dark matter density is inversely proportional to the annihilation cross section at the freeze-out temperature such a light neutralino state gives rise to a relic density that is typically substantially larger than its measured value. As a result κ values close to zero are basically ruled out, unless there also exists a very light CP-even or CP-odd Higgs state with mass ≈ 2 m ˜ χ 0 1 that can facilitate lightest neutralino annihilation (for a recent discussion see [41]). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-5eba0ef5-8f75-4a00-b64d-47ab8a756fa0.jpg) Figure 1: Parameter distributions in the κ -λ plane (left) and in the tan β -λ plane (right). The SM-like Higgs boson h corresponds to either H 1 (red points) or H 2 (blue points). Green points correspond to h ≡ H 1 and H 2 mass values above 1 TeV. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-e22a17cd-08be-4576-98f7-78abe79fd295.jpg) Figure 1 (right) shows the well known fact that in the NMSSM large λ values ( ∼ 0 5 . -0 7) . in conjunction with small tan β values below ∼ 5 allow for the lightest or next-to-lightest scalar Higgs to be SM-like around 125 GeV. The other parameter combination leading to scenarios compatible with the Higgs data, though less in number, is the combination of λ &lt; ∼ 0 1 . and tan β &gt; ∼ 10. This is in accordance with the behaviour of the upper mass bound on the MSSMlike light Higgs boson given by $$m _ { h } ^ { 2 } \approx M _ { Z } ^ { 2 } \cos ^ { 2 } 2 \beta + \frac { \lambda ^ { 2 } v ^ { 2 } } { 2 } \sin ^ { 2 } 2 \beta + \Delta m _ { h } ^ { 2 }$$ with v ≈ 246 GeV, and which is to be identified with the SM-like Higgs h at 125 GeV after the inclusion of the radiative corrections ∆ m 2 h . Also for intermediate λ values viable scenarios can be found, although, being away from the maximum of the function Eq. (4.24), only for h ≡ H 2 . For the lightest CP-even Higgs in this case the tree-level mass bound is too low to be Figure 2: Distribution of tan β (left) and µ eff (right). Normalised to the total number of parameter points of ∼ 8000. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-cd61179b-b343-4e36-a274-001af0cd9b57.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-fe8808e3-4188-477f-a519-2b7476674032.jpg) shifted through radiative corrections to large enough mass values compatible with all constraints imposed. Note that in scenarios, where M H 1 &lt; 125 GeV, this Higgs boson is mostly singlet-like thus escaping the constraints from LEP, Tevatron and LHC searches in this mass region. The strategies to search for H 1 in this case shall be discussed in the next section. We also found scenarios where the mass of the second lightest scalar H 2 is larger than 1 TeV and can indeed become very large. This large increase is caused by either small λ values or large values for A λ or µ eff . As these scenarios are extremely fine-tuned we will discard them in the following investigations from Fig. 5 on. Figure 2 shows the tan β and µ eff distributions. Note that for the tan β distribution we use a logarithmic scale. Most tan β values are clustered around tan β ≈ 2. The range of the effective µ eff values is 100 GeV &lt; µ ∼ | eff | &lt; ∼ 1 TeV. Absolute µ eff values of less than ∼ 100 GeV are excluded due to the lower bounds on the chargino masses. Figure 3: Upper: Distribution of λ (left) and κ values (right). Lower: Distribution of A λ (left) and A κ values (right). Normalised to the total number of parameter points of ∼ 8000. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-3ed659be-c2d3-47e0-a7ca-52f8d34220da.jpg) The distributions of the NMSSM parameters λ κ A , , λ and A κ normalised to the total number of parameter points of about 8000 are shown in Fig. 3. The λ values cluster close to 0 and around 0.65, the preferred κ values are close to -0 25 and +0 25. The preferred values of . . A κ around 0 can be understood by the fact that this is the range of A κ allowing for the lightest scalar and Figure 4: Distribution of A t (left) and m ˜ t 1 (right), normalised to the total number of parameter points of ∼ 8000. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-947123ac-1a49-4819-9f77-6c8af79c0826.jpg) pseudoscalar masses squared to be positive. 6 For A λ larger values are preferred, as these lead to sufficiently heavy Higgs bosons [75], that are not excluded by the experiment and entail a heavy enough SM-like Higgs boson. All these considerations of course apply modulo the higher order corrections which are indispensable to shift the SM-like Higgs boson mass to 125 GeV. These corrections are dominated by the (s)top loop contributions. The distributions of the trilinear soft SUSY breaking stop-sector coupling A t and of the lightest stop mass m ˜ t 1 are shown in Fig. 4. Due to the additional contribution proportional to λ to the tree-level mass, cf. Eq. (4.24), less important radiative corrections ∆ m 2 h are necessary to shift m h to 125 GeV. Contrary to the MSSM, therefore zero mixing in the stop sector leads to allowed scenarios in the NMSSM. For the same reason, the lightest stop mass can still be rather light, down to about 270 GeV. The upper bound is limited by our scan range. Experiments set a low mass bound in searches for stop quarks decaying into a charm quark and the lightest neutralino, ˜ χ 0 1 [51,76-79]. 7 This is the dominating decay for mass differences m ˜ t 1 -m ˜ χ 0 1 &lt; M W , where M W denotes the charged W boson mass, [83, 84]. The latest results by ATLAS [51] exclude top squark masses up to about 240 GeV at 95% C.L. for arbitrary neutralino masses, within the kinematic boundaries. The distribution for A t peaks at large values of ∼ ± 2 TeV. Large A t values entail large radiative corrections to the SM-like Higgs boson mass, so that the tree-level mass value can be shifted to the required 125 GeV. At the same time this results in a large splitting of the stop mass values, so that the lightest stop mass m ˜ t 1 distribution reaches its maximum around 500 GeV. Another accumulation is at the upper m ˜ t 1 range as a result of large radiative mass corrections induced by heavy stop masses. ## 4.2 Mass Distributions In Fig. 5 we show the mass distribution for the non-SM-like H i , which is either H 1 or H 2 , versus the lightest pseudoscalar mass values M A 1 . For mass values below about 115 GeV the non-SM-like Higgs boson is H 1 , while for M H i &gt; ∼ 170 GeV it is H 2 . There is a gap for 6 This range has been derived in [75] applying approximate tree-level mass formulae. 7 Investigating the stop four-body decays into a neutralino, bottom quark and fermion pair [80, 81], similar bounds can be derived in the searches for monojets [51,82]. Figure 5: Mass values of the non-SM-like CP-even Higgs boson H i ( i = 1 or 2) and the lightest pseudoscalar A 1 for all points passing our constraints. Blue (pink) points are for scenarios with tan β &lt; ( &gt; )5. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-05f03294-7adf-41a4-98b6-cb3c15412a1e.jpg) 115 GeV &lt; M ∼ H i &lt; ∼ 170 GeV and another one for 115 GeV &lt; M ∼ A 1 &lt; ∼ 130 GeV. Both are due to the LHC exclusion limits. There are only a few points for M H i , M A 1 &lt; ∼ 62 GeV. Here the decay of the SM-like 125 GeV Higgs boson into very light scalars or pseudoscalars would be kinematically possible, inducing reduced branching ratios in the SM decays and hence reduced signal rates not compatible with the experiment any more. The blue (pink) points denote scenarios with tan β &lt; ( &gt; ) 5. Both low and high tan β values yield scenarios with H 2 ≡ h (here M H i ≡ M H 1 &lt; ∼ 115 GeV). Scenarios with the lightest scalar being SM-like arise mostly for low tan β values, since then the tree-level mass of the lightest MSSM-like Higgs boson is maximized. As can be inferred from the plot, for large tan β values and mass values above ∼ 400 GeV, the mass values of H i ( ≡ H 2 ) are (almost) equal to those of A 1 . Here, both H i and A 1 are MSSM-like with almost the same mass [75]. Figures 6 show the amount of singlet component of H i , | S H ,h i s | 2 (upper left), and A 1 , | P A ,a 1 s | 2 (upper right), as a function of M H i and M A 1 , respectively. 8 Values of 1 (0) correspond to pure singlet-like (MSSM-like) states. For mass values above 400 GeV and tan β &gt; 5, H i and A 1 can be MSSM-like. In general the mass values of H 1 are 35 GeV &lt; M ∼ H 1 &lt; ∼ 115 GeV, the lowest possible mass values for A 1 are M A 1 &gt; ∼ 30 GeV, ranging up to O (TeV), and for the next-to-lightest scalar we have 170 GeV &lt; M ∼ H 2 &lt; ∼ O (TeV). The masses of the heavier Higgs bosons H 3 and A 2 lie between about 300 GeV up to O (TeV). Their singlet components | S H ,h 3 s | 2 and | P A a 2 s | 2 are shown in Fig. 6 (lower left) and (lower right), respectively. The singlet-/doublet-composition of the various Higgs bosons determines their production and decay rates, which depend on the Higgs coupling strengths to the SM-particles, and hence their discovery prospects. Inspection of the singlet components for the two tan β ranges below and above 5 and the scenarios with either H 1 or H 2 being SM-like reveals the approximate pattern for the compositions of the NMSSM Higgs bosons, given in Table 2. Note that for an 8 The matrix S corresponds to the rotation matrix R S Eq. (2.6), however taking into account loop corrections to the scalar Higgs mass eigenstates. Accordingly P corresponds to the matrix ( R R P G ) Eq. (2.7), performing the rotation from the interaction to the loop corrected pseudoscalar mass eigenstates. Figure 6: The singlet component | S H ,h i s | 2 of the non-SM-like CP-even Higgs boson H i (upper left), | P A ,a 1 s | 2 of the lightest pseudoscalar A 1 (upper right), | S H ,h 3 s | 2 of the heavy CP-even Higgs boson H 3 (lower left) and | P A ,a 2 s | 2 of the heavy pseudoscalar A 2 (lower right). Blue (pink) points refer to scenarios with tan β &lt; ( &gt; )5. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-ef634425-9bf7-4b8a-9773-4c7bc0fdfa54.jpg) SM-like H 2 the lightest H i =1 can become doublet-like in the regions with strong singlet-doublet mixing, i.e. in mass regions close to 125 GeV. The unitarity of the mixing matrix does not allow for all Higgs bosons being simultaneously doublet-like, so that alternative search techniques for the Higgs bosons with significant singlet component, like Higgs-to-Higgs decays or SUSY particle decays into Higgs bosons, have to be exploited. Another class of scenarios are those with Higgs bosons that mix strongly and that are not exclusively singlet- or doublet-like. They may challenge the Higgs searches by too small cross sections and/or Higgs signals built up by more than one Higgs boson. 9 ## 4.3 Signal Rates In order to investigate the discovery prospects of the non-SM-like NMSSM Higgs bosons, we analyse in the following their signal rates in various SM particle final states. Signal rates for the non-SM-like H i ( i = 1 2): Figure 7 shows the production rates in pb at , a c.m. energy of √ s = 13 TeV for the non-SM-like CP-even Higgs boson H i ( i = 1 2) in the , γγ , bb ¯ , ZZ and tt ¯ final states. The inclusive production cross section has been approximated by 9 The resolution of degenerate Higgs signals will require particularly high luminosity accumulated at the end of the LHC operation [15,85], and this discussion is not subject of this paper. glyph[negationslash] glyph[negationslash] Table 2: The approximate singlet-/doublet-composition of the NMSSM Higgs bosons for small and large tan β values and scenarios with either H 1 (left) or H 2 (right) SM-like. | tan β < 5 | H i =1 SM-like | H i =2 SM-like | |---------------|-------------------------------------|---------------------------------------| | H j =1 , 2= i | singlet | singlet- up to almost doublet | | H 3 | doublet | doublet | | A 1 | mostly singlet (few doublet) | mostly singlet (few doublet) | | A 2 | mostly doublet (few singlet) | mostly doublet (few singlet) | | tan β ≥ 5 | H i =1 SM-like | H i =2 SM-like | | H j =1 , 2= i | mostly doublet | singlet- up to almost doublet | | H 3 | singlet (few doublet) | doublet | | A 1 | doublet or singlet (for small M A 1 | doublet or singlet (for small M A 1 ) | | A 2 | singlet or doublet | singlet or doublet | the dominant gluon fusion production mechanism. The production rates of H i , σ XX ( H i ), have been calculated in the narrow width approximation by multiplying the production cross section in gluon fusion at 13 TeV 10 with the branching ratios into the various SM particle final states, $$\sigma _ { X X } ( H _ { i } ) \equiv \sigma _ { g g H _ { i } } ^ { 1 3 \, T e V } B R _ { H _ { i } \to X X } \, \ \ X = \gamma, b, \tau, W ^ { \pm }, Z, t \.$$ The NMSSM gluon fusion production cross section has been obtained according to Eq. (3.20), and the branching ratios have been taken from NMSSMTools in order to be consistent with the NMSSM mass values, which we have obtained at 2-loop order from NMSSMTools . The black line corresponds to the SM Higgs boson production rate with the same mass as H i . Again the points with mass values below ∼ 115 GeV correspond to H i = H 1 and hence H 2 being SM-like, while for mass values &gt; ∼ 170 GeV we have H 1 taking the SM role and H i = H 2 . For large values of tan β , the dominant production channel is associated production of the Higgs bosons with a bb ¯ pair. We have computed these cross sections by multiplying the SM cross section, computed at NNLO with the code SusHi [86] at the same mass value as the NMSSM Higgs boson, with the NMSSM Higgs coupling squared to the b -quark pair in terms of the SM coupling. With the exception of small mass values, for large tan β values the cross sections are roughly a factor 10 larger than the gluon fusion result. If not stated otherwise, we do not show separate plots for this case, but assume implicitly that for tan β &gt; 5 larger rates are possible through associated production, thus ameliorating the discovery prospects. a) Signal rates for H i =1 : For small Higgs masses H 1 is singlet-like, but can be more doubletlike in the mass regions close to 125 GeV. The photonic final state rate can then even exceed the corresponding SM result, cf. Fig. 7 (upper left). For the photonic final state in inclusive SM Higgs boson production at leading order, ATLAS studies [87] have been performed for Higgs masses between 80 and 150 GeV at √ s = 14 TeV and 100 fb -1 integrated luminosity. From these it may be concluded, that taking into account higher order corrections to the production cross section [88], which increase the cross section by about a factor 2, a SM Higgs boson could be discovered down to about 80 GeV if both ATLAS and CMS accumulate 300 fb -1 each. A light scalar NMSSM Higgs boson may hence be discovered in the photonic final state for scenarios where its rates are of the order of the SM ones. 10 Gluon fusion production increases by ∼ 12% for a Higgs mass of 90 GeV up to ∼ 19% for a Higgs mass of 300 GeV when increasing the c.m. energy from 13 to 14 TeV. Figure 7: Production rates in pb for the non-SM-like CP-even Higgs boson H i ( i = 1 2) into the , γγ (upper left), the bb ¯ (upper right), the ZZ (lower left) and tt ¯ (lower right) final states for tan β &lt; 5 (blue) and tan β &gt; 5 (pink), as a function of M H i at a c.m. energy √ s = 13 TeV. The full black line shows the production rate for a SM Higgs boson with same mass. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-12bc0435-3d16-4b4c-9eb4-a5cfa6291cbd.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-1f1f6569-0775-4462-8465-5f56a88f85ee.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-27870a40-8ad1-4b83-878d-a2ca8db0b1be.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-f8187ea9-d1ee-43e6-95df-d5500c472b37.jpg) Further possible discovery modes might be the bb ¯ and/or ττ final states in the regions, where the rates are compatible with the ones of a SM Higgs boson, i.e. for M H i close to 115 GeV. The ττ final states are not shown in Fig. 7, but exhibit the same pattern as the bb ¯ final state with an additional suppression factor of 10. The Z and W ± boson final states reach maximum signal rates of about 0.1 pb for the former and 1 pb for the latter. Again the W ± final states, not depicted in Fig. 7, show the same behaviour as the Z boson final states. They are enhanced by a factor 10 compared to these, however with missing energy in the final state, so that only transverse Higgs masses can be reconstructed. b) Signal rates for H i =2 : We now turn to possible discovery channels for H 2 being the nonSM-like Higgs boson, hence investigate the mass regions above 170 GeV in Fig. 7. The nextto-lightest Higgs boson H 2 with H 1 ≡ h is mostly singlet-like for small tan β values and mostly doublet-like for tan β ≥ 5. The SM-like Higgs H 1 needs to be doublet-like with a large H u component, in order to have a substantial coupling to top quarks and hence a gluon fusion cross section large enough to lead to signal rates compatible with the LHC data. Due to the unitarity of the mixing matrix R S rotating the current to the mass eigenstates, H 2 is hence doubletlike but with a large H d component, so that its couplings to down-type fermions are enhanced compared to the SM. The coupling G H V V i to massive vector bosons V = Z, W ± on the other hand is suppressed. This can be understood by looking at the coupling, which normalised to the SM coupling is given by $$\frac { G _ { H _ { i } V V } } { g _ { H ^ { \text{SMV} } V } } \equiv g _ { H _ { i } V V } = \left ( \mathcal { R } _ { i 1 } ^ { S } \cos \beta + \mathcal { R } _ { i 2 } ^ { S } \sin \beta \right ) \,,$$ where R S i 1 ( R S i 2 ) quantifies the H d ( H u ) component of H i . The H d component can be substantial for large tan β but its contribution in the coupling is suppressed by the factor cos β . The up-type part of the coupling comes with sin β and also for small tan β values would be small, as the H u component is taken by H 1 ≡ h . As can be inferred from the plot, for Higgs mass values above ∼ 400 GeV the rates into bb ¯ are enhanced for large tan β . This is due to an enhanced branching ratio into bottom pairs. The total decay width in this mass range is dominated by the decay into V = W,Z , and the H 2 branching ratio into bb ¯ can be approximated by $$\text{BR} _ { H _ { 2 } \to b \bar { b } } ^ { \text{NMSSM} } \ & = \ \frac { g _ { H _ { 2 } d \bar { d } } ^ { 2 } \Gamma _ { H ^ { \text{SM} } \to b \bar { b } } } { g _ { H _ { 2 } V V } ^ { 2 } \Gamma _ { H ^ { \text{SM} } \to W W } ^ { 2 } + g _ { H _ { 2 } V V } ^ { 2 } \Gamma _ { H ^ { \text{SM} } \to Z Z } ^ { 2 } + \cdots } \\ & \quad \approx \ \frac { g _ { H _ { 2 } d \bar { d } } ^ { 2 } } { g _ { H _ { 2 } V V } ^ { 2 } } \text{BR} _ { H ^ { \text{SM} } \to b \bar { b } } ^ { \text{SM} } \,, \\.. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad.$$ with M H 2 = M H SM and where g H dd 2 ¯ denotes the H 2 coupling to down-type fermions in terms of the SM coupling. The enhanced coupling to down-type quarks and the suppressed coupling to massive gauge bosons explain the observed behaviour. For large values of tan β and mass values above 400 GeV, the heavier H 2 may therefore be discovered in its bb ¯ and ττ final state, which exhibits the same behaviour as the bb ¯ final state, the latter suffering from large backgrounds though, so that the τ production rate, suppressed by roughly a factor 10 compared to the former, may be more promising for discovery. In particular, the production in association with a b -quark pair (not shown here) increases the signal rates by another factor ∼ 10 compared to production in gluon fusion. The gauge boson and top quark final states are more challenging on the other hand, even in associated production, due to the (above discussed) suppression of the couplings to gauge bosons and top quarks. For tan β &lt; ∼ 5 the H 2 searches have to rely on a combined search in the ττ final states (most interesting for H 2 masses up to ∼ 250 GeV) and the vector-boson and top-pair channels. The associated production with b -quarks is not effective for these tan β values. Production rates of A 1 : Figure 8 displays the signal rates for the lightest CP-odd Higgs boson A 1 produced in association with a b -quark pair in the bb ¯ final state (left) and in gluon fusion in the top quark decay (right). The rates into ττ and µµ final states show the same pattern as the ones into bb ¯ but are suppressed by a factor of 10 and ∼ 10 4 each. Massive gauge boson final states are forbidden due to the CP-odd nature of A 1 . The decay rates into photons both in associated and in inclusive production are below 10 -4 already in the low mass range. In this mass range A 1 may be discovered in its decays into τ 's, as the b -quark final states are notoriously difficult due to large backgrounds. This discovery channel is also interesting for large M A 1 at tan β &gt; 5. For M A 1 &gt; ∼ 400 GeV the pseudoscalar, which in most scenarios is singlet-like, can also be MSSM-like with a large a d component, in particular for tan β &gt; 5, cf. Fig. 6. Associated production with a b -quark pair here leads to cross sections of up to 4 pb. Otherwise the top quark final state has to be exploited for heavy A 1 production, though challenging with cross sections of at most a few pb and a complicated final state. We note, that for small tan β values, there is a step in Fig. 8 in the areas covered by the scatter points around M A 1 = 350 GeV. This Figure 8: Production rates in pb for the lightest CP-odd Higgs boson A 1 in associated production with bb ¯ in the bb ¯ final state (left) and in inclusive production with subsequent decay into tt ¯ final states (right) tan β &lt; 5 (blue) and tan β &gt; 5 (pink), as a function of M A 1 , at √ s = 13 TeV. The full black line is the production rate for a SM Higgs boson with same mass. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-f92f9de8-78f7-4284-9968-a4778ad2cec4.jpg) is due to the opening of the decays into the top pair final state, which steeply increase at the top pair threshold and therefore cause a rapid fall in the branching ratios into the other final states. For large tan β the decay into top quarks does not play a role, so that there is no such behaviour for the scatter points at large tan β values. Heavy H 3 production: Apart from large tan β values with a SM-like H 1 boson, the H 3 is mostly doublet-like, however with a large H d component so that the couplings to gauge bosons are suppressed, as discussed previously, likewise the couplings to top quarks. The branching ratios into bottom and top quark pairs, however, can be enhanced due to the small coupling to gauge bosons, as the total width in this heavy mass region is dominated by the decays into the latter. Figure 9 (upper) shows the production rates for the heaviest CP-even, H 3 , into the bb ¯ and the tt ¯ final states. In the bb ¯ final state the rates are at most 0.5 pb in the lower mass region, where the SM-like Higgs boson is mostly H 1 and below 0.01 pb above about 400 GeV, where the SM-like resonance can also be H 2 . In τ pair final states they are a factor 10 lower. For large tan β values the rates can be enhanced by about roughly a factor 10 in bbH ¯ 3 production. In the top quark pair final states the cross sections are somewhat larger ranging from ∼ 5 pb at the threshold to O (0 01) pb for tan . β &lt; 5. For large tan β the tt ¯ production rates are below 0.05 pb. The rates into WW range for tan β &lt; 5 maximally between 1 pb and 10 -4 pb in 250 GeV &lt; M ∼ H 3 &lt; ∼ 1 TeV, cf. Fig.9 (lower left). For the ZZ final state they are somewhat smaller. For large tan β values these final states are not interesting. The photonic final state rates, finally, are below 10 -4 pb. Heavy A 2 production: The heavy pseudoscalar A 2 production rates in the bb ¯ and tt ¯ final states, as well as the photonic mode show almost the same pattern as the ones for H 3 with the same absolute values, and the same conclusions as for the H 3 searches apply. The pseudoscalar cannot decay into gauge bosons, so that these final states cannot be exploited here. The above results show that the discovery of all NMSSM Higgs bosons is not straightforward and additional alternative discovery modes need to be exploited, which shall be discussed in the following sections. Before doing so, let us briefly review what the current experimental status is. So far, dedicated searches in the NMSSM have been performed by CMS for a very light pseudoscalar with mass between 5.5 and 14 GeV, decaying into a µ pair, for which exclusion Figure 9: Production rates in pb for the heaviest CP-even Higgs boson H 3 into the bb ¯ (upper left), the tt ¯ (upper right), the WW (lower left) and ZZ (lower right) final states for tan β &lt; 5 (blue) and tan β &gt; 5 (pink), as a function of M H 3 , at √ s = 13 TeV. The full black line is the production rate for a SM Higgs boson with same mass. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-2f7c75da-5e6b-4450-89af-56b28b551060.jpg) limits have been derived [89]. The ATLAS experiment has investigated the decay chain for a heavy CP-even Higgs boson into a light pseudoscalar Higgs pair, that subsequently decays into photons, H → aa → γγ + γγ [90]. The signal has been studied using simulated samples over a range of Higgs boson masses between 110 and 150 GeV and for three a boson masses, M a = 100 200 and 400 MeV. For a c.m. energy of 7 TeV and 4.9 fb , -1 integrated luminosity, the derived 95% confidence level (CL) exclusion limits on the cross section times branching ratio are 0.1 pb in the Higgs boson mass range between 115 and 140 GeV and ∼ 0 2 pb in the . region outside. Recently CMS has published results on the search for the resonant production of Higgs pairs in the decay channel X → HH → γγ + ¯ using 19.7 fb bb -1 integrated luminosity collected at √ s = 8 TeV [91]. For the investigated mass range between m X = 260 and 1100 GeV upper limits at 95% CL on the cross section have been extracted between about 4 and 0.4 fb. The ATLAS experiment has performed searches for resonant and non-resonant Higgs boson pair production in the hh → γγbb ¯ final state at a c.m. energy of 8 TeV and an integrated luminosity of 20.3 fb -1 [92]. Assuming SM branching ratios a 95% CL upper limit of 2.2 pb is extracted on the cross section times branching ratio of the non-resonant production. The corresponding limit observed for a narrow resonance lies between 0.8 and 3.5 pb depending on its mass. Extrapolating these results to the high-energy LHC with up to 300 fb -1 integrated luminosity per experiment, decay cross sections for Higgs-to-Higgs decays with subsequent Higgs decays into the ( γγ )( bb ¯ ) final states down to O (fb) should be large enough for detection. ## 5 Discovering Natural NMSSM at the LHC In the previous section we have discussed the signal rates that can be expected in the NMSSM parameter space that is left over after applying all constraints set by the Higgs search results from experiment and by the relic density. In this section now we investigate that subspace of the NMSSM, that we found to give the best discovery prospects at the high-energy LHC for all of the neutral NMSSM Higgs bosons and that can hence strongly be constrained at the next run of the LHC. Such part of the NMSSM parameter space is given by what we call the Natural NMSSM. It is characterized by an approximate Peccei-Quinn symmetry 11 , hence small κ values, by rather small | µ eff | values and by small tan β . In particular we choose the following part of the NMSSM parameter space $$0. 6 \leq \lambda \leq 0. 7 \,, \, - 0. 3 \leq \kappa \leq 0. 3 \,, \, 1. 5 \leq \tan \beta \leq 2. 5 \,, \, 1 0 0 \, \text{GeV} \leq | \mu _ { \text{eff} } | \leq 1 8 5 \, \text{GeV} \,. \quad ( 5. 2 8 )$$ In this parameter region the second lightest Higgs boson H 2 is SM-like. 12 The heavier CP-even and CP-odd Higgs bosons, H 3 and A 2 , are predominantly a superposition of the components of the Higgs doublets (MSSM-like states). The lightest scalar and pseudoscalar Higgs states, H 1 and A 1 , are singlet dominated. In the following we will use the convenient notation: - · As before, h denotes the SM-like Higgs boson, and here H 2 ≡ h . - · The doublet-like heavy Higgs bosons will be denoted as H 3 ≡ H and A 2 ≡ A . - · The singlet dominated lightest CP-even and CP-odd Higgs bosons are called H 1 ≡ H s and A 1 ≡ A s , respectively. At tree-level the NMSSM with approximate Peccei-Quinn symmetry leads to a hierarchical structure of the Higgs spectrum which consists of the heaviest CP-even, the heaviest CP-odd and the charged Higgs bosons being almost degenerate. Their mass scale is set by µ eff tan β [93], hence $$M _ { H } \approx M _ { A } \approx M _ { H ^ { \pm } } \approx \mu _ { \text{eff} } \tan \beta \,.$$ Since | κ &lt; λ | , the masses of the singlet dominated CP-even and CP-odd Higgs states are smaller than µ eff tan β , with the upper bound given by $$M _ { A _ { s } } ^ { 2 } + 3 M _ { H _ { s } } ^ { 2 } \approx 1 2 \left ( \frac { \kappa } { \lambda } \mu _ { \text{eff} } \right ) ^ { 2 } + \Delta \.$$ The additional contribution ∆ will be quantified later. We now turn to the discussion of the discovery prospects for the Higgs spectrum in this set-up. In the part of the NMSSM parameter space that we are considering the almost degenerate heavy CP-even, CP-odd and charged Higgs bosons have masses below about 530 GeV, so that they should still be light enough to be observed at the 13 TeV LHC. Due to the substantial mixing, because of the large value of λ , 11 This part of the NMSSM parameter space is favoured by low fine-tuning considerations for λ &gt; 0 55. . For a recent analysis see [8]. 12 In order to have H 1 ≡ h , higher µ eff values than the ones chosen here would be required. between the SM-like Higgs state and the singlet dominated CP-even state the production cross sections of the lightest and second lightest CP-even Higgs states are in general large enough to produce these particles. In case the non-SM-like CP-even Higgs boson is almost a singlet it may still be produced via the decays of the heavier Higgs states, because of the large λ value. The same holds for the singlet-dominated lightest CP-odd Higgs state. We list in the Appendix the Higgs couplings involved in the Higgs-to-Higgs decays for the approximations made here. Their inspection gives information on the possible decays to be expected. In summary, all Higgs bosons of the Natural NMSSM should in general be accessible, so that this scenario may be constrained at the next round of the LHC run. We confront these approximate considerations with the results from our parameter scan in the subspace given by the natural NMSSM. The approximate µ eff tan β mass value of the heavy Higgs states is slightly modified by loop corrections and they range between about 230 GeV and 530 GeV. Taking into account higher order mass corrections the mass relation for the singlet states, Eq. (5.30), approximately holds if we choose ∆ = 18690 (GeV) . Furthermore, 2 H and A are indeed dominantly doublet-like, while the lightest CP-even and CP-odd states H s and A s are singlet-like. The CP-even singlet mass ranges between 27 GeV and 117 GeV. The upper bound is given by the LHC exclusion limits on the one hand and the fact, that the 125 GeV Higgs boson must be SM-like, on the other hand. The CP-odd singlet mass lies between 29 GeV and 300 GeV. Note that for H s there are only a few points below 62 GeV and for A s even less. The reason is that the SM-like h could decay into these final states and this would drive its reduced signal rates away from the measured values. Thus the Natural NMSSM scenario implies the existence of a CP-even Higgs state H s that tends to have a mass of 62 GeV &lt; M ∼ H s &lt; ∼ 117 GeV, and of a CP-odd state A s with 62 GeV &lt; M ∼ A s &lt; ∼ 300 GeV. We find that the H and A gluon fusion production cross sections range between ∼ 7 5 pb . ( H ), respectively, ∼ 4 5 pb ( . A ) at the low mass end and 0.6-0.8 pb at the high mass end, as shown in Fig. 10. As H has a small up-type component admixture, the cross section cannot be as large as in the SM for a Higgs boson of same mass. Still, in the Natural NMSSM, the size of the cross sections in most cases is large enough to discover these particles in the standard final states like bb ¯ (modulo the challenge due to large backgrounds), ττ or even tt ¯ . For H the massive gauge boson final states add to the search channels. As can be inferred from Figs. 9 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-5452376e-f9e9-4f35-9378-0709c5c925da.jpg) Figure 10: The gluon fusion production cross section at √ s = 13 TeV for H (left) and A (right) as a function of their mass. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-73df1a03-5962-4000-9718-4119ae4d3717.jpg) of the enlarged scan, in the mass and tan β range we consider here, for most of the cases the production rates in the various final states are above 1 fb, depending on the final state even well above 1 fb. Figure 11: The gluon fusion production cross section at √ s = 13 TeV for H s (left) and A s (right) as a function of their mass. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-7c552036-8f33-4ee6-bc6e-f6c0be198579.jpg) Figure 11 shows the gluon fusion production cross sections for H s (left) and A s (right) at a c.m. energy of √ s = 13 TeV. For small H s masses the cross sections are rather large with several 10's of pb. Above ∼ 90 GeV the maximum values are below 10 pb and can go down to O (0 1 pb). . With the exception of cross sections around 100 pb for very small A s masses, the pseudoscalar production cross sections reach at most 6 pb in the lower mass range. However, already for masses around 150 GeV, the cross sections can be as small as 0.1 pb. If the light Higgs bosons are very singlet-like their production rates may become very small, in particular in the pseudoscalar case, as can be inferred from Figs. 12, which show the production in the photon and τ -pair final states. 13 In this case and/or if the production rates also for the heavy Higgs bosons are small, further alternative production channels should be exploited to increase the discovery potential of the entire Higgs spectrum. This is subject to the following two subsections, that discuss Higgs-to-Higgs and Higgs-to-gauge-Higgs decays in the Natural NMSSM. ## 5.1 Singlet-like Higgs Production from Higgs-to-Higgs Decays In case not all neutral Higgs bosons can be discovered in direct production with subsequent decay, alternative search channels might be given by production from SUSY states decaying into Higgs bosons, or they may be searched for in Higgs decays into a Higgs and gauge boson pair as well as in Higgs-to-Higgs decays, i.e. $$\sigma ( g g \to \phi _ { i } ) \times B R ( \phi _ { i } \to \phi _ { j } \phi _ { k } ) \times B R ( \phi _ { j } \to X X ) \times B R ( \phi _ { k } \to Y Y )$$ where φ i,j,k generically denotes one of the five neutral Higgs bosons 14 and with M φ i &gt; M φ j + M φ k . 13 For the b -quark pair final state, the cross sections, not shown here, are always above 1 fb and can reach values of up to O (10 pb), for very light H s even several tens of pb. 14 Of course in Eq. (5.31) only these Higgs-to-Higgs decays are considered that are allowed by the quantum numbers. Figure 12: Production rates for H s (upper) and A s (lower) production in gluon fusion with subsequent decay into the ττ (left) and γγ (right) final states as a function of the involved singlet mass, at √ s = 13 TeV. Red (green) points mark cross sections above (below) 1 fb. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-806fdf4b-a6c5-4f2f-a5e7-7c8aec089033.jpg) The production rates for singlet Higgs pairs H H s s and a singlet plus SM-like Higgs, H h s , from the heavy CP-even Higgs boson H are shown in Figs. 13, including their subsequent decay into SM particles. Red (green) points refer to cross sections above (below) 1 fb. The figures show, that in the (2 τ )(2 b ) final state the cross sections are above 1 fb, with the exception of a few points in the H H s s production. They can even reach values of several hundred fb. The 4 τ final state is suppressed by a factor 10 compared to the former, but still a good fraction of scenarios, in particular for hH s production, reaches cross sections larger than 1 fb. As expected, the (2 γ )(2 b ) final state rates are smaller, but also here we have scenarios with rates exceeding the fb level. In principle H could also decay into a pair of pseudoscalar singlets. However, in this case all the decay rates turned out to be tiny so that we do not display them here. Singlet Higgs bosons can also be produced from heavy pseudoscalar decays into H A s s or hA s . The production rates into the (2 τ )(2 b ), 4 τ and (2 γ )(2 b ) final states are shown in Figs. 14. Again we have a non-negligible fraction of scenarios that lead to rates exceeding 1 fb in the pure fermionic final states. In the (2 γ )(2 b ) final states the majority of points is below 1 fb. Finally note, that we have shown here only the simplest final state combinations. As will be evident from the benchmark discussion, however, there can also be more complicated and more exotic final states arising from two Higgs-to-Higgs decays in one decay chain. Figure 13: Cross sections for H H s s production (upper two rows) and hH s production (lower two rows) from H decay, in the (2 τ )(2 b ) (upper/lower left), 4 τ (upper/lower right) and (2 γ )(2 b ) (middle) final states at √ s = 13 TeV as a function of the singlet mass M H s . Red (green) points mark cross sections above (below) 1 fb. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-dad4a11b-957a-4d0c-ade5-2f08d97263a7.jpg) ## 5.2 Singlet-like Higgs Production from Higgs-to-Gauge-Higgs Decays Singlet Higgs boson production is also possible via heavy Higgs decays into a singlet Higgs and a massive gauge boson. While these cross sections do not involve trilinear Higgs couplings, they lead to interesting decay rates. The cross sections for the H → ZA s and A → ZH s decays in the Z +2 b and Z +2 τ final states are shown in Fig. 15. The rates will go down by another factor 30 due to the Z boson decay into fermions. Still, almost all parameter points have cross sections Figure 14: Cross sections for A H s s production (upper two rows) and hA s production (lower two rows) from A decay, in the (2 τ )(2 b ) (upper/lower left), 4 τ (upper/lower right) and (2 γ )(2 b ) (middle) final states at √ s = 13 TeV as a function of the singlet mass M A s . Red (green) points mark cross sections above (below) 1 fb. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-2a48041a-af97-4642-9961-228e41568a7f.jpg) above 1 fb up to pb in the Z +2 b final state, reduced by a factor 10 in the Z +2 τ final state, and with the exception of some points in the chain via the ZA s final state for pseudoscalar singlet masses above ∼ 150 GeV. These decay chains can hence be used as additional and complementary production channels for singlet Higgs bosons. In summary, in general the complete Higgs spectrum of the Natural NMSSM should be accessible at the high-energy LHC by exploiting the entity of Higgs production channels through Figure 15: Cross sections for ZA s production from H decay (upper) and for ZH s production from A decay (lower) in the Z +2 b (left) and Z +2 τ (right) final state, respectively, as a function of the involved singlet mass, at √ s = 13 TeV. Red (green) points mark cross sections above (below) 1 fb. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1120v1-figure-b833d686-6f2a-430d-a88d-ddc787b5cf20.jpg) direct production in gluon fusion 15 with subsequent decay into SM particles and the production from heavy Higgs boson decays into lighter Higgs pairs and/or Higgs plus gauge boson final states. Decays of heavy SUSY particles into lighter Higgs bosons, not discussed here, may possibly add to the discovery contours. This part of the NMSSM parameter space will therefore either strongly be constrained at the next LHC run to come, or lead to the discovery of beyond the SM physics revealed by the Higgs sector. ## 6 Benchmarks for Higgs-to-Higgs Decays Higgs decays, as given in Eq. (5.31), into Higgs pairs that subsequently decay into SM particles are interesting for the discovery of the heavier Higgs boson φ i provided its production cross section is large enough and the branching ratio into the lighter Higgs pair dominates over its branching ratios into the SM final states. For the lighter Higgs bosons φ , φ j k this production mechanism becomes interesting in case their direct production is strongly suppressed due to them being very singlet-like. Furthermore, Higgs-to-Higgs decays are interesting in themselves 15 We remind the reader that for simplification we only took into account the dominant gluon fusion production. In addition to this also the other LHC production mechanisms will contribute and even ameliorate the discovery prospects. as they give access to the trilinear Higgs self-couplings, which can then be used to reconstruct the Higgs potential as the last step in the experimental verification of the Higgs mechanism [94]. In this section, we concentrate on Higgs-to-Higgs decays and present exemplary scenarios that are compatible with all constraints discussed above and that arise from our scan of the parameter space defined in Eqs. (3.9)-(3.15), i.e. not restricted to the Natural NMSSM. The presented scenarios not only lead to sufficiently large cross sections for double Higgs production from heavier Higgs decays but some of them also entail exotic multi-photon and/or multi-fermion final states. The possibility of such final states should be taken into consideration by the experiments in order not to miss possible Higgs signatures, that can appear in multi-Higgs models like the NMSSM without particular fine-tuning of the parameters. We also include scenarios featuring a light CP-even Higgs boson with a mass below 10 GeV. The presented scenarios highlight specific features of NMSSM Higgs decay chains and can be viewed as benchmark scenarios for future LHC searches. In the following we will again use the convenient notation introduced in section 5. Note, however, that the SM-like Higgs boson h can now be H 1 or H 2 . The more doublet-like scalar H can be given by H 2 or H 3 , depending on the scenario. The pseudoscalar doublet state A , as before, is given by A 2 , and the singlet like CP-odd A s by A 1 . The singlet-like scalar H s , however, can be H 1 , H 2 or even H 3 . The benchmark scenarios that we present can be classified as follows: ## A) H 2 = h , H 1 = H s , tan β small, light spectrum &lt; ∼ 350 GeV: - The scenarios A are characterized by the second lightest Higgs being SM-like, the lightest Higgs boson singlet-like and small tan β . The overall spectrum is rather light with maximal Higgs mass values of M H = 341 GeV and M A = 347 GeV. - A.1: The CP-odd singlet is close in mass to the SM-like Higgs with M A s = 119 GeV. The heavy Higgs bosons have masses around 341 and 347 GeV. - A.2: The CP-odd singlet is light with M A s = 79 GeV, the heavy Higgs bosons with masses around 326 GeV are somewhat lighter than in scenario A.1. ## B) H 1 = h , H 2 = H s , tan β small: - The scenarios B are characterized by the lightest Higgs being SM-like, the second lightest Higgs boson singlet-like and small tan β . - B.1: The CP-odd singlet is light with M A s = 73 GeV and the overall spectrum as well with the heavy H mass of 323 GeV and M A = 312 GeV. - B.2: The pseudoscalar singlet with M A s = 107 GeV is still lighter than the SM-like Higgs, but the overall spectrum is heavier with M H = 556 GeV and M A = 578 GeV. - B.3: The singlet mass M A s = 133 GeV is now heavier than M h . The maximum mass is given by M H = 463 GeV, closely followed by M A = 457 GeV. ## C) tan β &gt; 5: Here we explicitly chose a scenario where tan β = 17 is large. The lightest Higgs boson is SM-like H 1 = h . The spectrum is peculiar in the sense that the heavy scalar with a mass of ∼ 3 5 TeV is very heavy. . Additionally, H 3 is singlet-like. The heavy pseudoscalar and second lightest scalar are doublet-like with masses of O (600 GeV). The pseudoscalar singlet is much heavier than h , M A s = 312 GeV. - D) The SM-like h , given by H , - 2 can decay into Higgs pairs: - The scenarios D allow for decays of the SM-like Higgs h into lighter singlet Higgs pairs. - D.1: The CP-even singlet is very light, M H s &lt; 10 GeV, and h decays into CP-even singlet pairs are non-negligible. The pseudoscalar singlet is heavier than 125 GeV, and heavy Higgs bosons have masses up to 793 GeV. The tan β value is small and below 5. - D.2: Here the CP-odd singlet is the lightest Higgs, and the SM-like Higgs h decays into A s pairs. The scalar singlet H s with 112 GeV is now closer in mass to h . The heavy Higgs masses are very large and of O (1 3 TeV). We have a medium tan . β = 6 4. . In all scenarios the lightest pseudoscalar is singlet-like. In the subsequent subsections the details on these benchmark scenarios will be given. The discovery prospects of the various Higgs bosons shall be highlighted with particular focus on the Higgs-to-Higgs decays and the related signatures. ## 6.1 Scenarios A H 2 ≡ h and small tan β The NMSSM-specific and soft SUSY breaking parameters defining scenarios A.1 and A.2 are given in Table 3 and 4, respectively. The relevant NMSSM Higgs signal rates are summarised in Table 5 for A.1 and Table 6 for A.2. They feature a SM-like Higgs boson given by the next-to-lightest CP-even Higgs. In both scenarios the couplings of the singlets H s and A s to gluons amount to O (10 -20%) of the corresponding SM Higgs coupling of same mass leading to gluon fusion production cross sections of 1 -2 4 pb. . As the bb ¯ final state is difficult to detect, they could be searched for in ττ or even γγ final states. The heavy Higgs bosons H and A are produced with O (4 pb) cross sections and have sizeable decay rates into Higgs pairs involving A s and H s , and also into Z and a Higgs singlet, so that alternative search channels are given by Higgs cascade decays. In scenario A.1 the H branching ratios both into H H s s and hH s are larger than 10% and into ZA s even 25%. This leads to interesting final states with b -quark and τ -pairs, 4 τ 's or even ( bb ¯ )( γγ ). The 4 b final state may be difficult to exploit due to the large background. The pseudoscalar A decays with a branching ratio of 0.14 into hA s and less frequently into H A s s Table 3: The parameters defining scenario A.1, together with the Higgs boson masses, singlet components and reduced signal rates of h . | A.1 (Point ID 3877) | Scenario | Scenario | Scenario | |-------------------------------------------|------------|-------------|------------| | M H 1 , M H 2 , M H 3 = M H s , M h , M H | 90.3 GeV | 126.8 GeV | 341.3 GeV | | M A 1 , M A 2 = M A s , M A | 118.5 GeV | 346.7 GeV | 346.7 GeV | | | S H 1 h s | 2 , | P A 1 a s | 2 | 0.97 | 0.94 | 0.94 | | µ ττ , µ bb | 1.09 | 1.08 | 1.08 | | µ ZZ , µ WW , µ γγ | 0.85 | 0.85 | 0.88 | | tan β , λ , κ | 1.66 | 0.64 | 0.11 | | A λ , A κ , µ eff | 338.0 GeV | -71.2 GeV | 162.8 GeV | | A t , A b , A τ | 181.1 GeV | -1530.0 GeV | 87.2 GeV | | M 1 , M 2 , M 3 | 440.0 GeV | 813.7 GeV | 1710.2 GeV | | M Q 3 = M t R , M b R | 1827.5 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 1663.7 GeV | 3 TeV | 3 TeV | Table 4: The parameters defining scenario A.2, together with the Higgs boson masses, singlet components and reduced signal rates of h . | A.2 (Point ID 2212) | Scenario | Scenario | Scenario | |-----------------------------------|------------|------------|------------| | M H s , M h , M H | 98.6 GeV | 125.6 GeV | 325.9 GeV | | M A s , M A | 78.6 GeV | 325.5 GeV | | | | S H 1 h s | 2 , | P A 1 a s | 2 | 0.89 | 0.96 | | | µ ττ , µ bb | 1.05 | 0.93 | | | µ ZZ , µ WW , µ γγ | 0.86 | 0.87 | 0.90 | | tan β , λ , κ | 1.69 | 0.56 | 0.12 | | A λ , A κ , µ eff | -259.2 GeV | -22.8 GeV | -147.4 GeV | | A t , A b , A τ | 1927.4 GeV | -948.9 GeV | 1621.4 GeV | | M 1 , M 2 , M 3 | 755.9 GeV | 646.7 GeV | 2424.9 GeV | | M Q 3 = M t R , M b R | 2468.3 GeV | 3 TeV | | | M L 3 = M τ R , M SUSY | 1623.0 GeV | 3 TeV | | and ZH s (BR( A → H A s s ) = 0 085, BR( . A → ZH s ) = 0 047). . Still the rates are large enough to provide discovery channels for the singlets. All these cascade decays of course also add to the discovery channels of the heavy H and A themselves. In contrast to scenario A.1, in A.2 the decay of the heavy H into H H s s is not interesting, instead the branching ratio into hH s is almost doubled compared to A.1, and also the one into ZA s is somewhat enhanced. As for the A decays into hA s and ZH s , they are a factor 2.6 larger and the one into H A s s only half as large compared to A.1. Correspondingly the final state rates are changed. These two scenarios are examples of an NMSSM Higgs spectrum which is rather light and where all Higgs bosons can be discovered, both directly or in Higgs-to-Higgs or Higgs-to-gaugeHiggs decays. They also show the importance of looking into photon final states at mass values below 125 GeV. Furthermore, the Higgs cascade decays give access to the trilinear Higgs selfcouplings λ HH H s s , λ HH h s , λ AA h s and λ AA H s s . Finally, the heavy scalar and pseudoscalar also have sizeable rates into a pair of two lightest neutralinos. Though this final state leads to missing energy signatures and does not allow for the mass reconstruction it adds to possible search channels. ## 6.2 Scenarios B H 1 ≡ h and small tan β In the scenarios B it is the lightest Higgs boson that is SM-like. B.1) Singlet-like A 1 production from heavy Higgs decays: The definition of scenario B.1 is given in Table 7 and the signal rates in Table 8. The scenario is very special as it not only involves a very singlet-like lightest pseudoscalar A 1 ≡ A s , but this also has a large branching ratio into photons, BR( A s → γγ ) = 0 84. . Together with large Higgs-to-Higgs branching ratios for H s and H , BR( H s → A A s s ) = 0 97 and BR( . H → hH s ) = 0 51, this leads to spectacular signatures . with multi-photon and/or multib as well multiτ final states. In detail, due to the singlet nature of A s its gluon fusion production cross section is extremely small with only 0.08 fb, so that alternative production mechanisms must be exploited. The H s coupling to gluons is large enough to lead to a sizeable cross section of 282 fb. (It is smaller by almost a factor 10 compared to the scenarios A because H s here is the second lightest Higgs Table 5: The signal rates for A.1. | A.1 (Point ID 3877) | Signal Rates | |---------------------------------------------------------------------|--------------------| | σ ( ggH s ) | 2.37 pb | | σ ( ggH s )BR( H s → bb ¯ ) | 2.04 pb | | σ ( ggH s )BR( H s → ττ ) | 204.82 fb | | σ ( ggH s )BR( H s → γγ ) | 2.74 fb | | σ ( ggH ) | 4.29 pb | | σ ( ggH )BR( H → bb ¯ ) | 40.88 fb | | σ ( ggH )BR( H → ττ ) | 5.10 fb | | σ ( ggH )BR( H → WW ) | 49.13 fb | | σ ( ggH )BR( H → ZZ ) | 22.41 fb | | σ ( ggH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 1.27 pb | | σ ( ggH )BR( H → H s H s ) | 458.74 fb | | σ ( ggH )BR( H → H s H s → bb + bb ) | 341.12 fb | | σ ( ggH )BR( H → H s H s → bb + ττ ) | 68.34 fb | | σ ( ggH )BR( H → H s H s → ττ + ττ ) | 3.42 fb | | σ ( ggH )BR( H → H s H s → bb + γγ ) | 0.92 fb | | σ ( ggH )BR( H → hH s ) | 505.60 fb | | σ ( ggH )BR( H → hH s → bb + bb ) | 274.92 fb | | σ ( ggH )BR( H → hH s → bb + ττ ) | 56.46 fb | | σ ( ggH )BR( H → hH s → ττ + ττ ) | 2.90 fb | | σ ( ggH )BR( H → ZA s ) | 1.07 pb | | σ ( ggH )BR( H → ZA s → ll + bb ) | 31.67 fb | | σ ( ggH )BR( H → ZA s → ττ + bb ) ) | 46.59 fb | | σ ( ggH )BR( H → ZA s → ττ + ττ | 3.32 fb | | σ ( ggA s ) | 914.07 fb | | σ ( ggA s )BR( A s → bb ¯ ) | 804.77 fb | | σ ( ggA s )BR( A s → ττ ) | 84.15 fb | | σ ( ggA s )BR( A s → γγ ) | 0.36 fb | | σ ( ggA ) | 3.36 pb | | σ ( ggA )BR( A → tt ¯ ) σ ( ggA )BR( A → ˜ χ 0 ˜ χ 0 ) | 1.43 pb 686.00 fb | | 1 1 σ ( ggA )BR( A → hA s ) | 472.37 fb | | σ ( ggA )BR( A → hA s → bb + bb ) σ ( ggA )BR( A → hA s → ττ + bb | 262.24 fb 55.00 fb | | ) σ ( ggA )BR( A → hA s → ττ + ττ ) ) | | | σ ( ggA )BR( A → hA s → WW + bb | 2.88 fb 85.39 fb | | σ ( ggA )BR( A → hA s → γγ + bb ) | 1.04 fb | | σ ( ggA )BR( A → H s A s ) | 285.76 fb | | σ ( ggA )BR( A → H s A s → bb + bb ) | 216.95 fb | | σ ( ggA )BR( A → H s A s → ττ + bb ) | 44.42 fb | | σ ( ggA )BR( A → H s A s → ττ + ττ ) | 2.27 fb | | σ ( ggA )BR( A → H s A s → γγ + bb ) | 0.39 fb | | σ ( ggA )BR( A → ZH s ) | 158.13 fb | | ¯ | 4.59 fb | | σ ( ggA )BR( A → ZH s → ll + bb ) σ ( ggA )BR( A → ZH → ττ + bb ¯ ) | 6.66 fb | | s σ ( ggA )BR( A → ZH s → ττ + | 0.46 fb | | ττ ) | | Table 6: The signal rates for A.2. | A.2 (Point ID 2212) | Signal Rates | |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------| | σ ( ggH s ) | 2.36 pb | | σ ( ggH s )BR( H s → bb ¯ ) | 2.12 pb | | σ ( ggH s )BR( H s → ττ ) | 214 fb | | σ ( ggH s )BR( H s → γγ ) | 0.4 fb | | σ ( ggH ) | 4.34 pb | | σ ( ggH )BR( H → bb ) | 66.98 fb | | σ ( ggH )BR( H → ττ ) | 8.29 fb | | σ ( ggH )BR( H → WW ) | 151.38 fb | | σ ( ggH )BR( H → ZZ ) | 68.47 fb | | σ ( ggH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 854.09 fb | | σ ( ggH )BR( H → hH s ) | 899.34 fb | | σ ( ggH )BR( H → hH s → bb + bb ) | 506.58 fb | | σ ( ggH )BR( H → hH s → bb + ττ | ) 104.25 fb | | σ ( ggH )BR( H → hH s → ττ + ττ ) | 5.36 fb | | σ ( ggH )BR( H → hH s → bb + γγ ) ¯ | 2.02 fb | | σ ( ggH )BR( H → hH s → WW + | bb ) 161.89 fb | | σ ( ggH )BR( H → ZA s ) σ ( ggH )BR( H → ZA s → ll + bb ¯ ) σ ( ggH )BR( H → ZA s → ττ + bb ¯ ) σ ( ggH )BR( H → ZA s → ττ + ττ ) | 1.43 pb 43.41 fb 62.10 fb 4.15 fb | | σ ( ggA s ) ¯ | 1.36 pb | | σ ( ggA s )BR( A s → bb ) | 1.22 pb | | σ ( ggA s )BR( A s → ττ ) | 116.8 fb | | σ ( ggA s )BR( A s → γγ ) | 0.3 fb | | σ ( ggA ) | 3.04 pb | | σ ( ggA )BR( A → ˜ χ 0 1 ˜ χ 0 1 ) | 1.16 pb | | σ ( ggA )BR( A → hA s ) | 1.13 pb | | σ ( ggA )BR( A → hA s → bb + bb ) σ ( ggA )BR( A → hA s → bb + ττ ) σ ( ggA )BR( A → hA s → ττ + ττ ) σ ( ggA )BR( A → hA s → bb + WW ) σ ( ggA )BR( A → hA s → bb + γγ ) σ ( ggA )BR( A → H s A s ) | 640.74 fb 128.37 fb 6.42 fb 203.85 fb 2.60 fb 131.49 fb | | σ ( ggA )BR( A → H s A s → bb + bb σ ( ggA )BR( A → H A → bb + | | | ) s s ττ ) σ ( ggA )BR( A → H s A s → ττ + ττ ) | 106.17 fb 20.87 fb 1.02 fb | | σ ( ggA )BR( A → ZH s ) | 378.42 fb | | σ ( ggA )BR( A → ZH s → ττ + ττ | 16.63 fb | | | 1.16 fb | | s σ ( ggA )BR( A → ZH s → ττ + bb ¯ ) | | | σ ( ggA )BR( A → ZH → ll + bb ) | | | | 11.43 fb | | ¯ | | | | ) | Table 7: The parameters defining scenario B.1, together with the Higgs boson masses, singlet components and reduced signal rates of h . | B.1 (Point ID Poi2a) | Scenario | Scenario | Scenario | |-----------------------------------|------------|------------|------------| | M h , M H s , M H | 124.6 GeV | 181.7 GeV | 322.6 GeV | | M A s , M A | 72.5 GeV | 311.7 GeV | 311.7 GeV | | | S H 2 h s | 2 , | P A 1 a s | 2 | 0.90 | 1 | 1 | | µ ττ , µ bb | 1.54 | 1.01 | 1.01 | | µ ZZ , µ WW , µ γγ | 0.93 | 0.93 | 1.01 | | tan β, λ, κ | 1.9 | 0.628 | 0.354 | | A λ , A κ , µ eff | 251.2 GeV | 53.8 GeV | 158.9 GeV | | M 1 , M 2 , M 3 | 890 GeV | 576 GeV | 1219 GeV | | A t , A b , A τ | 1555 GeV | -1005 GeV | -840 GeV | | M Q 3 = M t R , M b R | 1075 GeV | 1 TeV | 1 TeV | | M L 3 = M τ R , M SUSY | 530 GeV | 2.5 TeV | 2.5 TeV | and hence the available phase space is smaller.) As H s has a large branching ratio into A s pairs and A s itself into photon pairs, the thus produced four photon final state rate amounts to almost 200 fb. The heavy doublet Higgs H is produced in gluon fusion with 3.2 pb and its branching ratio into hH s is 0.51. With the large H s decay rate into A A s s this leads to very peculiar signatures with up to 6 photons in the final state. The largest rate is given by the (4 γ )( bb ¯ ) signature with 712 fb. Additionally, we have A production in gluon fusion at 2.5 pb, which leads via the decay into H A s s (BR( A → H A s s )=0.21) again to multiphoton final states with or without additional b -quark or τ -pairs. Here the 6 γ final state even amounts to 302 fb. With a branching ratio BR( A → ZH s ) = 0 22 also this decay leads to interesting final states . with e.g. (4 γ )( bb ¯ ) production at 58 fb. Finally, also the decay into hA s may be exploited in its ( γγ )( bb ¯ ) final state with a cross section of 16 fb. These and more possible combinations and final states are summarised in Table 8. It shows that in this scenario with a rather light overall spectrum, all Higgs bosons can be discovered, and that there are spectacular signatures possible that can be helpful for the discovery. Additionally, in the cascade decays the trilinear couplings λ H A A s s s , λ HH h s , λ HA A s s , λ AA H s s and λ AA h s are accessible. Note finally, that the multiphoton (plus fermion) final states discussed here cannot occur in the MSSM and are unique to an extension beyond, as the NMSSM. B.2) Heavy Higgs spectrum: Scenario B.2, defined in Table 9 is an example for a spectrum where it is challenging to find all NMSSM Higgs states. This is because of the heavier H and A with masses around 560 GeV, a not so light A s as e.g. in scenario A.2 and a very singlet-like H s . The latter has a gluon fusion production cross section of 19 fb, leading to a ττ final state at only 0.3 fb, cf. Table 10. The only alternative production via Higgs-to-Higgs decays is given by the H → hH s decay leading to small 0.5 fb in the ( ττ )( bb ¯ ) final state. The pseudoscalar singlet A s on the other hand has a larger gluon fusion production cross section now than in B.1 and can be searched for in standard final states. Additionally the decay of A into hA s can be used to produce A s in the ( ττ )( bb ¯ ) final state e.g. at 21 fb. Also the H → ZA s → ( ττ )( bb ¯ ) production leading to 14 fb, may be used. Both H and A are heavy enough to decay into top pairs and may be discovered in these decay channels with rates into tt ¯ between 550 fb for A and 623 fb for H . In this scenario only the trilinear couplings λ HH h s and λ AA h s are accessible. B.3) Heavy Higgs spectrum, B.2 reversed: The scenario B.3, cf. Table 11, is reversed compared to B.2 in the sense that now H 2 ≡ H s is somewhat less singlet-like and A 1 ≡ A s is very singlet- Table 8: The signal rates for B.1. | B.1 (Point ID Poi2a) | Decay Rates | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------| | σ ( ggH s ) | 282.37 fb | | σ ( ggH s )BR( H s → WW ) | 5.09 fb | | σ ( ggH s )BR( H s → A s A s ) | 274.75 fb | | σ ( ggH s )BR( H s → A s A s → bb ¯ + bb ¯ ) σ ( ggH s )BR( H s → A s A s → γγ + bb ¯ ) σ ( ggH s )BR( H s → A s A s → γγ + γγ ) | 5.87 fb 67.33 fb 193.22 fb | | σ ( ggH ) | 3.17 pb | | σ ( ggH )BR( H → WW ) | 264.73 fb | | σ ( ggH )BR( H → ZZ ) | 119.52 fb | | σ ( ggH )BR( H → bb ¯ ) | 297.37 fb | | σ ( ggH )BR( H → ττ ) | 37.65 fb | | σ ( ggH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 383.33 fb | | σ ( ggH )BR( H → ˜ χ + 1 ˜ χ - 1 ) | 403.14 fb | | σ ( ggH )BR( H → hH s ) | 1.609 pb | | σ ( ggH )BR( H → hH s → bb + ττ ) | 1.44 fb | | σ ( ggH )BR( H → hH s → h + A s A s → bb +4 γ ) σ ( ggH )BR( H → hH s → h + A s A s → γγ +4 b ) σ ( ggH )BR( H → hH s → h + A s A s → ττ +4 γ ) σ ( ggH )BR( H → hH s → h + A s A s → γγ +4 τ ) σ ( ggH )BR( H → hH s → h + A s A s → 6 γ ) σ ( ggH )BR( H → hH s → h + A s A s → ττ + γγ + bb ¯ ) ) | 712.47 fb 248.02 fb 74.60 fb 2.47 fb 2.69 fb 49.55 fb | | σ ( ggH )BR( H → A s A s | 5.59 fb | | σ ( ggH )BR( H → A s A s → 4 γ ) | 3.93 fb | | σ ( ggA s ) | 0.08 fb | | σ ( ggA ) | 2.51 pb | | σ ( ggA )BR( A → ττ ) | 14.42 fb | | σ ( ggA )BR( A → ˜ χ 0 1 ˜ χ 0 1 ) | 963.87 fb | | σ ( ggA )BR( A → ˜ χ + 1 ˜ χ - 1 ) | 273.57 fb | | σ ( ggA )BR( A → H s A s ) | 525.56 fb | | σ ( ggA )BR( A → H s A s → A s A s + A s → 6 γ ) σ ( ggA )BR( A → H s A s → A s A s + A s → bb +4 γ ) σ ( ggA )BR( A → H s A s → A s A s + A s → 4 b + γγ ) σ ( ggA )BR( A → H s A s → A s A s + A s → ττ +4 γ ) σ ( ggA )BR( A → H s A s → A s A s + A s → ττ + bb + γγ σ ( ggA )BR( A → H s A s → A s A s + A s → 4 τ + γγ ) σ ( ggA )BR( A → hA s ) σ ( ggA )BR( A → hA s → γγ + bb ¯ ) σ ( ggA )BR( A → hA s → γγ + ττ ) σ ( ggA )BR( A → hA s → bb ¯ + bb ¯ ) | 301.58 fb 157.64 fb 27.47 fb 14.99 fb 5.22 fb 0.25 fb 29.96 fb | | | 16.25 fb 1.70 fb | | | 2.83 fb | | σ ( ggA )BR( A → ZH ) | 554.38 fb | | s σ ( ggA )BR( A → ZH s → bb + A s A s → bb +4 γ ) | 57.36 fb | Table 9: The parameters defining scenario B.2, together with the Higgs boson masses, singlet components and reduced signal rates of h . | B.2 (Point ID 1142) | Scenario | Scenario | Scenario | |-----------------------------------|------------|-------------|------------| | M h , M H s , M H | 126.8 GeV | 176.2 GeV | 556.3 GeV | | M A s , M A | 106.6 GeV | 577.8 GeV | 577.8 GeV | | | S H 2 h s | 2 , | P A 1 a s | 2 | 0.99 | 0.92 | 0.92 | | µ ττ , µ bb | 1.03 | 1.21 | 1.21 | | µ ZZ , µ WW , µ γγ | 0.93 | 0.93 | 0.89 | | tan β , λ , κ | 1.61 | 0.62 | -0.22 | | A λ , A κ , µ eff | -709.2 GeV | -169.3 GeV | -236.5 GeV | | A t , A b , A τ | -899.8 GeV | -1436.3 GeV | 857.5 GeV | | M 1 , M 2 , M 3 | 651.4 GeV | 307.0 GeV | 1340.6 GeV | | M Q 3 = M t R , M b R | 2578.9 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 1863.7 GeV | 3 TeV | 3 TeV | Table 10: The signal rates for B.2. | B.2 (Point ID 1142) | Signal Rates | |-----------------------------------------------------------------------------------------------------------------------------------------|------------------------------------| | σ ( ggH s ) | 19.03 fb | | σ ( ggH s )BR( H s → WW ) | 15.46 fb | | σ ( ggH s )BR( H s → bb ¯ ) | 2.68 fb | | σ ( ggH s )BR( H s → ττ ) | 0.30 fb | | σ ( ggH ) | 1.15 pb | | σ ( ggH )BR( H → tt ¯ ) | 623.39 fb | | σ ( ggH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 10.84 fb | | σ ( ggH )BR( H → ZA s ) | 322.93 fb | | σ ( ggH )BR( H → ZA s → ll + bb ¯ ) σ ( ggH )BR( H → ZA s → ττ + bb ¯ ) | 9.61 fb 14.03 fb | | σ ( ggH )BR( H → hH s ) | 26.62 fb | | σ ( ggH )BR( H → hH s → ττ + bb ¯ ) σ ( ggH )BR( H → hH s → WW + bb ¯ → ( lν )( lν ) bb ¯ ) | 0.50 fb 0.16 fb | | σ ( ggA s ) | 1.56 pb | | σ ( ggA s )BR( A s → bb ¯ ) | 1.38 pb | | σ ( ggA s )BR( A s → ττ ) | 140 fb | | σ ( ggA ) | 824.23 fb | | σ ( ggA )BR( A → tt ¯ ) | 551.88 fb | | σ ( ggA )BR( A → hA s ) | 184.87 fb | | σ ( ggA )BR( A → hA s → bb + bb ) σ ( ggA )BR( A → hA s → bb + ττ ) σ ( ggA )BR( A → hA s → ττ + ττ ) σ ( ggA )BR( A → hA s → bb + γγ ) | 100.05 fb 20.72 fb 1.07 fb 0.36 fb | like, so that here A s production will be challenging. Its gluon fusion production cross section amounts only to 32 fb leading to a ττ rate of 3 fb as can be inferred from Table 12. It can also be produced in heavy A cascade decays via hA s and H A s s . The former leads to 3.9 fb in the ( ττ )( bb ¯ ) final state, the latter to 1.7 fb. The singlet H s now can be looked for in standard final states as e.g. ττ with 18 fb or with larger rates in gauge boson final states. It can also be produced from A → ZH s decays. The heavy H and A again can decay into top pairs, at rates around 680 fb. The pseudoscalar doublet A additionally decays into a lightest neutralino pair at sizeable rate. The trilinear couplings accessible in this scenario are λ HH h s , λ AA h s and λ AA H s s . Table 11: The parameters defining scenario B.3, together with the Higgs boson masses, singlet components and reduced signal rates of h . | B.3 (Point ID 210) | Scenario | Scenario | Scenario | |-----------------------------------|-------------|------------|------------| | M h , M H s , M H | 124.1 GeV | 184.3 GeV | 463.1 GeV | | M A s , M A | 133.4 GeV | 457.2 GeV | 457.2 GeV | | | S H 2 h s | 2 , | P A 1 a s | 2 | 0.96 | 0.99 | 0.99 | | µ ττ , µ bb | 1.44 | 1.99 | 1.99 | | µ ZZ , µ WW , µ γγ | 0.90 | 0.90 | 0.97 | | tan β , λ , κ | 2.22 | 0.60 | 0.30 | | A λ , A κ , µ eff | 348.7 GeV | 4.5 GeV | 191.8 GeV | | A t , A b , A τ | -1130.2 GeV | -6.5 GeV | 1951.6 GeV | | M 1 , M 2 , M 3 | 136.4 GeV | 273.4 GeV | 1789.0 GeV | | M Q 3 = M t R , M b R | 2838.3 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 1659.3 GeV | 3 TeV | 3 TeV | ## 6.3 Scenario C H 1 ≡ h and large tan β Scenario C in Table 13 explicitly features a large value of tan β , i.e. tan β = 17. Along with this comes a very heavy, additionally practically 100% singlet-like, Higgs boson of 3.5 TeV. This makes it very difficult if not impossible to discover the complete NMSSM Higgs spectrum. Due to the large value of tan β gluon fusion is not effective as production mechanism. Instead the signal rates for Higgs production in association with bb ¯ are given in Table 14 for the doublet-like Higgs bosons H and A , both with masses around 600 GeV, and the singlet-like pseudoscalar A s , that is also rather heavy with a mass around 312 GeV. For comparison we also give the corresponding cross section for the SM-like Higgs boson. The production cross sections are large enough to produce the NMSSM Higgs bosons, apart from the heavy H s , at sufficient rates for discovery in the standard channels. In addition, the pseudoscalar singlet A s can be searched for in the cascade decay via A → hA s or H → ZA s . All other Higgs-to-Higgs or Higgs-to-gaugeHiggs decays for H or A are kinematically closed. Therefore in this scenario the only trilinear Higgs coupling that may be measurable is λ AA h s . ## 6.4 Scenarios D The scenarios D are characterized by a SM-like Higgs given by H 2 , H 2 ≡ h , that can decay into lighter singlet pairs. D.1) SM-like Higgs decays into light CP-even singlet-like Higgs pairs: The scenario D.1, Table 15, leads to a very light CP-even singlet Higgs H s with a mass of 9.6 GeV. The branching ratio of the SM-like h , that is copiously produced with a cross section of 44 pb, into H H s s makes up 10%. The singlet H s is so light that it cannot decay into bottom pairs and instead decays at 90% into Table 12: The signal rates for B.3. | B.3 (Point ID 210) | Signal Rates | |-----------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------| | σ ( ggH s ) σ ( ggH s )BR( H s → bb ¯ ) | 390.38 fb 160.37 fb | | σ ( ggH s )BR( H s → ττ ) | 18.46 fb | | σ ( ggH s )BR( H s → WW ) | 176.63 fb | | σ ( ggH s )BR( H s → ZZ ) | 29.00 fb | | σ ( ggH ) | 1.326 pb | | σ ( ggH )BR( H → tt ¯ ) | 684.96 fb | | σ ( ggH )BR( H → hH | 184.85 fb | | s ) σ ( ggH )BR( H → hH s → bb + bb ) σ ( ggH )BR( H → hH s → bb + ττ ) σ ( ggH )BR( H → hH s → ττ + ττ ) σ ( ggH )BR( H → hH s → bb + γγ ) | 50.46 fb 11.08 fb 0.61 fb 0.24 fb | | σ ( ggH )BR( H → ZA s ) | 36.41 fb | | σ ( ggH )BR( H → ZA s → ll + bb ¯ ) σ ( ggH )BR( H → ZA s → ττ + bb ¯ ) | 1.09 fb 1.62 fb | | σ ( ggA s ) | 31.49 fb | | σ ( ggA s )BR( A s → bb ¯ ) | 28.03 fb | | σ ( ggA s )BR( A s → ττ ) | 3.01 fb | | σ ( ggA s )BR( A s → γγ ) σ ( ggA ) | 0.13 fb 1.26 pb | | ¯ | 680.53 fb | | σ ( ggA )BR( A → tt ) σ ( ggA )BR( A → ˜ χ 0 ˜ χ 0 ) | 109.32 fb | | 1 1 | | | σ ( ggA )BR( A → hA s ) | 31.19 fb | | σ ( ggA )BR( A → hA s → bb ¯ + bb ¯ ) σ ( ggA )BR( A → hA s → ττ + bb ¯ ) σ ( ggA )BR( A → hA s → ττ + ττ ) σ ( ggA )BR( A → hA s → γγ + bb ) | 18.41 fb 3.91 fb 0.21 fb 0.15 fb | | σ ( ggA )BR( A → H s A s ) σ ( ggA )BR( A → H s A s → bb ¯ + bb ¯ ) | 20.94 fb 7.67 fb | | σ ( ggA )BR( A → H s A s → ττ + bb ¯ ) | 1.71 fb | | σ ( ggA )BR( A → ZH ) | 90.21 fb | | s | | | σ ( ggA )BR( A → ZH s → ll + bb ) | 1.25 fb | | σ ( ggA )BR( A → ZH s → ττ + bb | 1.90 | | ) | fb | τ pairs. This leads then to cascade decay rates of 3.6 pb in the decay chain h → H H s s → 4 τ , cf. Table 16. And even the ( ττ )( µµ ) final state reaches 32 fb. This channel should therefore not only allow for H s discovery, but also for the measurement of the triple Higgs coupling λ hH H s s . Better discovery prospects for H s are obtained in direct gluon fusion production with subsequent decay into e.g. τ pairs. As H s is so light and not 100% singlet-like its gluon fusion cross section is large with 440 pb. The ττ final state rate is then given by enormous 405 pb. And also the rare decays into charm quarks amount to 5.2 pb, allowing for a measurement of the H cc s ¯ coupling. The 2 γ final state finally reaches 8 fb. The masses of the doublets H and A are around 790 GeV, so that their gluon fusion production cross sections only reach O (40 fb). Their masses are large enough so that they decay into top quark pairs, also the lightest neutralino pair final state rates can reach ∼ 6 fb. Furthermore, the branching ratio BR( H → hH s ) = 0 21 so . Table 13: The parameters defining scenario C, together with the Higgs boson masses, singlet components and reduced signal rates of h . | C (Point ID 2296) | Scenario | Scenario | Scenario | |-----------------------------------|-------------|-------------|-------------| | M h , M H , M H s | 124.1 GeV | 597.7 GeV | 3528.3 GeV | | M A s , M A | 311.8 GeV | 614.5 GeV | 614.5 GeV | | | S H 3 h s | 2 , | P A 1 a s | 2 | 1 | 0.93 | 0.93 | | µ ττ , µ bb | 0.97 | 1.06 | 1.06 | | µ ZZ , µ WW , µ γγ | 0.78 | 0.78 | 0.80 | | tan β , λ , κ | 17.06 | 0.08 | -0.63 | | A λ , A κ , µ eff | -1766.2 GeV | -24.2 GeV | -217.1 GeV | | A t , A b , A τ | 1961.8 GeV | -1535.3 GeV | -1211.9 GeV | | M 1 , M 2 , M 3 | 478.3 GeV | 369.2 GeV | 2847.8 GeV | | M Q 3 = M t R , M b R | 977.0 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 2797.1 GeV | 3 TeV | 3 TeV | Table 14: The signal rates for C. | C (Point ID 2296) | Higgs Decays | |-----------------------------------------------------------------------------------------------------|------------------| | σ ( bbH ) | 346.97 fb | | σ ( bbH )BR( H → bb ¯ ) | 190.72 fb | | σ ( bbH )BR( H → ττ ) | 23.32 fb | | σ ( bbH )BR( H → tt ¯ ) | 5.37 fb | | σ ( bbH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 7.00 fb | | σ ( bbH )BR( H → ˜ χ + 1 ˜ χ - 1 ) | 16.21 fb | | σ ( bbH )BR( H → ZA s ) | 101.84 fb | | σ ( bbH )BR( H → ZA s → ll + bb ¯ ) σ ( bbH )BR( H → ZA s → ττ + bb ¯ ) | 3.08 fb 4.61 fb | | σ ( bbA s ) | 404.91 fb | | σ ( bbA s )BR( A s → bb ¯ ) | 364.21 fb | | σ ( bbA s )BR( A s → ττ ) | 40.17 fb | | σ ( bbh ) | 643.60 fb | | σ ( bbA ) | 282.80 fb | | σ ( bbA )BR( A → bb ¯ ) | 151.41 fb | | σ ( bbA )BR( A → ττ ) | 18.60 fb | | σ ( bbA )BR( A → tt ¯ ) | 5.08 fb | | σ ( bbA )BR( A → ˜ χ 0 1 ˜ χ 0 1 ) | 6.85 fb | | σ ( bbA )BR( A → hA s ) | 76.27 fb | | σ ( bbA )BR( A → hA s → bb + bb ) σ ( bbA )BR( A → hA s → bb + ττ ) σ ( bbA )BR( A → hA → ττ + ττ ) | 46.65 fb 9.98 fb | | s | 0.53 fb | that the Higgs-to-Higgs cascade into the ( ττ )( bb ¯ ) final state reaches 4.3 fb and can add to the H s search channel or alternatively to the measurement of the λ HH h s coupling. The pseudoscalar can decay via hA s . However, the ( ττ )( bb ¯ ) rate is small with 0.3 fb. The extraction of the triple coupling λ AA h s will be difficult here. But it can add to the A s discovery, in particular as the gluon fusion cross section for the very singlet-like A s is small. Finally, A can decay into the | D.1 (Point ID 5416) | Scenario | Scenario | Scenario | |-----------------------------------|-------------|-------------|------------| | M H s , M h , M H | 9.6 GeV | 124.2 GeV | 793.4 GeV | | M A s , M A | 273.2 GeV | 792.2 GeV | 792.2 GeV | | | S H 1 h s | 2 , | P A 1 A s | 2 | 0.98 | 0.99 | 0.99 | | µ ττ , µ bb | 0.90 | 0.89 | 0.89 | | µ ZZ , µ WW , µ γγ | 0.92 | 0.92 | 0.92 | | tan β , λ , κ | 3.37 | 0.64 | 0.20 | | A λ , A κ , µ eff | -709.0 GeV | 297.3 GeV | -222.4 GeV | | A t , A b , A τ | -1075.3 GeV | -1973.1 GeV | -143.7 GeV | | M 1 , M 2 , M 3 | 307.7 GeV | 789.8 GeV | 2933.1 GeV | | M Q 3 = M t R , M b R | 2931.3 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 2930.8 GeV | 3 TeV | 3 TeV | Table 15: The parameters defining scenario D.1, together with the Higgs boson masses, singlet components and reduced signal rates of h . | D.1 (Point ID 5416) | Signal Rates | |---------------------------------------------------------------------------|-----------------| | σ ( ggh ) | 44.28 pb | | σ ( ggh )BR( h → H s H s ) | 4.22 pb | | σ ( ggh )BR( h → H s H s → ττ + ττ ) ) | 3.58 pb | | σ ( ggh )BR( h → H s H s → ττ + µµ | 31.64 fb | | σ ( ggH s ) | 439.80 pb | | σ ( ggH s )BR( H s → µµ ) | 1.79 pb | | σ ( ggH s )BR( H s → ττ ) | 405.09 pb | | σ ( ggH s )BR( H s → cc ¯) | 5.17 pb | | σ ( ggH s )BR( H s → ss ¯) | 7.24 pb | | σ ( ggH s )BR( H s → γγ ) | 7.95 fb | | σ ( ggH ) | 38.72 fb | | σ ( ggH )BR( H → tt ¯ ) | 9.80 fb | | σ ( ggH )BR( H → ˜ χ 0 1 ˜ χ 0 1 ) | 5.73 fb | | σ ( ggH )BR( H → hH s ) | 8.08 fb | | σ ( ggH )BR( H → hH s → bb ¯ + ττ ) | 4.26 fb | | σ ( ggH )BR( H → hH s → ττ + ττ ) | 0.45 fb | | σ ( ggA s ) | 9.31 fb | | σ ( ggA s )BR( A s → bb ¯ ) | 3.78 fb | | σ ( ggA s )BR( A s → ττ ) | 0.46 fb | | σ ( ggA ) | 41.26 fb | | σ ( ggA )BR( A → tt ¯ ) | 11.24 fb | | σ ( ggA )BR( A → ˜ χ 0 1 ˜ χ 0 1 ) | 5.94 fb | | σ ( ggA )BR( A → hA s ) | 4.95 fb | | σ ( ggA )BR( A → hA s → bb ¯ + bb ¯ ) σ ( ggA )BR( A → hA s → bb ¯ + ττ ) | 1.15 fb 0.26 fb | | σ ( ggA )BR( A → ZH s ) | 7.78 fb | | σ ( ggA )BR( A → ZH s → bb ¯ + ττ ) | 1.08 fb | Table 16: The signal rates for D.1. gauge-Higgs final state ZH s leading to 1 fb in the ( ττ )( bb ¯ ) final state. D.2) SM-like Higgs decays into light CP-odd singlet-like Higgs pairs: In the scenario D.2, defined in Table 17, the SM-like Higgs can decay into a pair of pseudoscalar singlets A s . The latter is very light with a mass around 62 GeV. The lightest scalar H s with a mass of 112 GeV is close in mass to h , and both mix strongly, so that the gluon fusion production cross section for h only amounts to 27 pb, while the H s production is rather large for a singlet-like boson and reaches 17 pb, as given in Table 18. The h reduced rates are still compatible with the LHC data, although the final state rates for ττ and bb ¯ are somewhat on the lower side. The h cascade decay via an A s pair reaches in the ( ττ )( bb ¯ ) final state a large cross section of 276 fb. This should make a measurement of the triple Higgs couplings λ hA A s s possible. Also the 4 τ final state is sizeable with 12 fb. The light A s can be directly produced, too, and then searched for in the ττ final state with a rate of 92 fb. The copiously produced H s can be searched for in the standard decay channels. Difficult, however, if not impossible is the production of the doublet-like H and A , as they have masses of 1.3 TeV. Since they are both rather down-component doublet-like, one might consider associated production with a b -quark pair, in view of the not so small tan β = 6 4. . But also these cross sections remain below 1 fb. Picking up the idea presented in [95], sum rules for the Higgs couplings can be exploited to give a hint to the missing states, in case the heavy Higgs bosons cannot be discovered. This allows then to disentangle an NMSSM Higgs sector from a supersymmetric Higgs sector with minimal particle content, if e.g. only three Higgs bosons are discovered and not all of them are scalar. From Eq. (4.26) and the unitarity of the R S matrix, it can be derived that the NMSSM CP-even Higgs couplings to vector bosons with respect to the SM coupling obey the sum rule $$\sum _ { i = 1 } ^ { 3 } g _ { H _ { i } V V } ^ { 2 } = 1 \,.$$ Table 17: The parameters defining scenario D.2, together with the Higgs boson masses, singlet components and reduced signal rates of h . | D.2 (Point ID 110) | Scenario | Scenario | Scenario | |-----------------------------------|-------------|-------------|------------| | M H s , M h , M H | 112.0 GeV | 126.3 GeV | 1288.2 GeV | | M A s , M A | 61.5 GeV | 1287.4 GeV | 1287.4 GeV | | | S H 1 h s | 2 , | P A 1 a s | 2 | 0.63 | 1 | 1 | | µ ττ , µ bb | 0.73 | 0.62 | 0.62 | | µ ZZ , µ WW , µ γγ | 0.90 | 1.03 | 1.06 | | tan β , λ , κ | 6.36 | 0.47 | 0.14 | | A λ , A κ , µ eff | 1217.1 GeV | 19.6 GeV | 195.3 GeV | | A t , A b , A τ | -1804.6 GeV | -1196.8 GeV | 1704.8 GeV | | M 1 , M 2 , M 3 | 417.2 GeV | 237.5 GeV | 2362.2 GeV | | M Q 3 = M t R , M b R | 967.8 GeV | 3 TeV | 3 TeV | | M L 3 = M τ R , M SUSY | 2491.6 GeV | 3 TeV | 3 TeV | Table 18: The signal rates for D.2. | D.2 (Point ID 110) | Signal Rates | |-----------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------| | σ ( ggh ) | 27.37 pb | | σ ( ggh )BR( h → A s A s ) | 1.85 pb | | σ ( ggh )BR( h → A s A s → bb + bb ) σ ( ggh )BR( h → A s A s → bb + ττ ) σ ( ggh )BR( h → A s A s → ττ + ττ ) σ ( ggh )BR( h → A s A s → bb + γγ ) | 1.55 pb 276.30 fb 12.36 fb 0.34 fb | | σ ( ggH s ) | 17.25 pb | | σ ( ggH s )BR( H s → bb ¯ ) | 14.64 pb | | σ ( ggH s )BR( H s → ττ ) | 1.50 pb | | σ ( ggH s )BR( H s → γγ ) | 13.93 fb | | σ ( ggH s )BR( H s → ZZ ) | 23.90 fb | | σ ( ggH s )BR( H s → WW ) | 401.21 fb | | σ ( ggH s )BR( H s → µµ ) | 5.33 fb | | σ ( ggH s )BR( H s → Zγ ) | 4.15 fb | | σ ( ggA s ) | 1.13 pb | | σ ( ggA s )BR( A s → bb ¯ ) | 1.03 pb | | σ ( ggA s )BR( A s → ττ ) | 92.46 fb | | σ ( ggH ) | 0.46 fb | | σ ( bbH ) | 0.82 fb | | σ ( ggA ) | 0.72 fb | | σ ( bbA ) | 0.82 fb | The H i couplings G H tt/bb i to top and bottom quarks (normalised to the SM) are given by $$\frac { G _ { H _ { i } t t } } { g _ { H ^ { S M } t t } } \ \equiv \ g _ { H _ { i } t t } = \frac { \mathcal { R } _ { i 2 } ^ { S } } { \sin \beta } _ { - c }$$ $$\frac { \ddots \, \stackrel { \vdots } { G } _ { H _ { i } b b } } { g _ { H ^ { S M } b b } } \ \equiv \ g _ { H _ { i } b b } = \frac { \mathcal { R } _ { i 1 } ^ { S } } { \cos \beta } \.$$ Exploiting the unitarity of R S leads to the sum rule $$\frac { 1 } { \sum _ { i = 1 } ^ { 3 } g _ { H _ { i } t t } ^ { 2 } } + \frac { 1 } { \sum _ { i = 1 } ^ { 3 } g _ { H _ { i } b b } ^ { 2 } } = 1 \,.$$ If three neutral Higgs bosons are discovered, but not all of them are CP-even, then these rules are violated, while in the MSSM with only three neutral Higgs bosons in total the sum rules would be fulfilled. Applying this to our scenario, in case among the CP-even Higgs bosons we only find h and H s but not the heavy H , the sums Eqs. (6.32) and (6.35) result in $$\sum _ { i = 1 } ^ { 2 } g _ { H _ { i } V V } ^ { 2 } \approx 1$$ for the gauge couplings and $$\frac { 1 } { \sum _ { i = 1 } ^ { 2 } g _ { H _ { i } t t } ^ { 2 } } + \frac { 1 } { \sum _ { i = 1 } ^ { 2 } g _ { H _ { i } b b } ^ { 2 } } = 1. 8 5$$ for the Yukawa couplings. As the heavy doublet H is dominated by the H d component R S 31 and the coupling to down-type quarks is additionally enhanced for large tan β values, cf. Eq. (6.34), the missing H 3 coupling to down-type quarks has a large effect on the Yukawa coupling sum rule. For the same reason the effect on the vector coupling sum rule is negligible, cf. Eq.(4.26). At a future high-energy LHC the couplings to fermions will be measurable at O (10 -20%) level accuracy [96]. This is largely sufficient to test for the deviation in the Yukawa coupling sum rule in this scenario. ## 7 Conclusions After the discovery of the Higgs boson at the LHC no direct sign of new particles beyond the SM has shown up yet. Also the discovered Higgs boson itself looks very SM-like. Still it could be the SM-like resonance of an extended Higgs sector as it emerges in supersymmetric theories. In particular, the NMSSM with five neutral Higgs bosons gives rise to a very interesting phenomenology and a plethora of new signatures. We have investigated in a large scan over the NMSSM parameter range, what the prospects of pinning down the NMSSM Higgs sector at the 13 TeV run of the LHC are. Hereby we have taken into account the constraints that arise from the LEP, Tevatron and LHC Higgs boson searches, from Dark Matter measurements and lowenergy observables and from exclusion bounds on SUSY particles. We find, that in the NMSSM both the lightest or next-to-lightest Higgs boson can be the SM-like Higgs boson. The LHC Higgs signal can also be built up by two Higgs resonances that are almost degenerate and have masses close to 125 GeV. Furthermore, viable scenarios can be found for low and high tan β values. We have investigated the production rates of the neutral Higgs bosons in the SM final states. A lot of scenarios should be accessible at the LHC, some, however, will be challenging and possibly not allow for the discovery of all NMSSM Higgs bosons. We therefore subsequently focused on the subspace of the NMSSM, that we call the Natural NMSSM, and which features heavy Higgs bosons with masses below about 530 GeV and besides a light CP-odd singlet state a light CP-even singlet-like Higgs boson with a mass between about 62 and 117 GeV. The study of the signal rates in the SM final states reveals that the Natural NMSSM should give access to all neutral NMSSM Higgs bosons in most of the scenarios. Where the discovery in direct production is difficult, it can be complemented by searches in Higgs-to-Higgs or Higgs-to-gauge boson-Higgs decays. It should therefore be possible to discover the Natural NMSSM Higgs bosons at the next run of the LHC or to strongly constrain this scenario. Higgs decays into Higgs pairs offer an interesting alternative to the discovery of Higgs states that may be difficult to be accessed in direct production. At the same time they give access to the trilinear Higgs self-coupling involved in the Higgs-to-Higgs decays. Taking the results of our large parameter scan we have extracted benchmark scenarios that highlight different properties of Higgs-to-Higgs-decays. In analysing the various decay signatures, we found multi-photon and multi-fermion signatures that not only lead to very promising signal rates (far above the ones to be expected in SM Higgs pair production), but some of them are also unique to the NMSSM and lead to spectacular final states with up to six photons. Another interesting outcome is the possibility of CP-even singlet states that are below the bottom pair threshold, so that the decays into other light fermions are dominant and give access to the measurement of Higgs couplings to taus, muons and even light quarks. Finally, we show in one example, how coupling measurements could help to point to an additional CP-even Higgs boson, in case not all CP-even states should have been discovered. In summary, our results show that the search for Higgs bosons needs to be continued not only in the high- but also in the low-mass regions below 125 GeV. Furthermore, we have to be prepared for new exotic signatures that cannot appear in minimal supersymmetric extensions of the SM, but are possible in the NMSSM due to significant signal rates arising from Higgs pair production in Higgs decays. ## Acknowledgments We thank Alexander Nikitenko and Markus Schumacher for fruitful discussions and advise. RN also thanks Peter Athron, Anthony Thomas and Anthony Williams for useful discussions. MM acknowledges discussions with Conny Beskidt, Ramona Gr¨ber, Rui Santos and Michael o Spira. MM is supported by the DFG SFB/TR9 'Computational Particle Physics'. The work by RN was supported by the Australian Research Council through the ARC Center of Excellence in Particle Physics at the Terascale. SFK is supported by the STFC Consolidated grant ST/J000396/1 and EU ITN grant INVISIBLES 289442 . KW gratefully acknowledges support of the Graduiertenkolleg GRK1694 'Elementarteilchen bei h¨chster Energie und h¨chster o o Pr¨ azision'. ## Appendix ## A Higgs Couplings in the Natural NMSSM In the following approximations for the Higgs couplings in the parameter range of the Natural NMSSM will be given. First of all, the 125 GeV Higgs boson has to be produced with SM-like rates. This means that it must have large enough couplings to top quarks and hence a large H u component. At the same time, it is advantageous not to have a too large H d component, as then the coupling to b quarks is suppressed, leading to enhanced branching ratios that account for a possible slight suppression in the production. Due to the unitarity of the mixing matrix rotating the interaction to the Higgs mass eigenstates, this means, that the other doublet-like heavier Higgs boson must be H d -like. The light CP-even and CP-odd Higgs bosons, H s and A s respectively, must be singlet-like in order to avoid the exclusion bounds. In summary, for the natural NMSSM the approximate compositions of the CP-even Higgs mass eigenstates expressed in terms of the mixing matrix R ij ( i = H , h, H s , j = h , h d u , h s ), in the notation of Section 5, are given by $$( H _ { s }, h, H ) ^ { T } = \mathcal { R } ^ { S } ( h _ { d }, h _ { u }, h _ { s } ) ^ { T } = \left ( \begin{array} { c c c } 0 & 0 & 1 \\ 0 & 1 & 0 \\ 1 & 0 & 0 \end{array} \right ) ( h _ { d }, h _ { u }, h _ { s } ) ^ { T } \,.$$ For the composition of the pseudoscalars we have, $$( A _ { s }, A ) ^ { T } = \mathcal { R } ^ { P } ( a, a _ { s } ) ^ { T } = \left ( \begin{array} { c c } 0 & 1 \\ 1 & 0 \end{array} \right ) ( a, a _ { s } ) ^ { T } \,,$$ with a = sin βa d +cos βa u . Comparing this with the actual composition as result of our scan, the actual composition is approximated rather well, with at most 30% deviations. With these assumptions we get for the trilinear Higgs couplings involved in the Higgs-to-Higgs decays, in units of the SM coupling, $$g _ { H h h } \ = \ \frac { \cos \beta } { M _ { Z } ^ { 2 } } ( \lambda ^ { 2 } v ^ { 2 } - M _ { Z } ^ { 2 } )$$ $$g _ { H h H _ { s } } \ = \ \frac { \stackrel { \nu } { - v } } { \sqrt { 2 } M _ { Z } ^ { 2 } } ( \lambda A _ { \lambda } + 2 \kappa \mu ) & & \text{(A.4)}$$ $$g _ { H H _ { s } H _ { s } } \ = \ \frac { \lambda v ^ { 2 } } { M _ { Z } ^ { 2 } } ( \lambda \cos \beta - \kappa \sin \beta )$$ $$g _ { h H _ { s } H _ { s } } \ = \ \frac { \lambda \tilde { v } ^ { 2 } } { M _ { Z } ^ { 2 } } ( \lambda \sin \beta - \kappa \cos \beta )$$ $$g _ { h A A _ { s } } \ = \ \frac { \lambda v \sin \beta } { 2 M _ { Z } ^ { 2 } } ( \sqrt { 2 } A _ { \lambda } - 2 \kappa v _ { s } ) \quad & \text{(A.7)}$$ $$g _ { h A _ { s } A _ { s } } \ = \ \frac { \lambda v ^ { 2 } } { M _ { Z } ^ { 2 } } ( \kappa \cos \beta + \lambda \sin \beta )$$ $$g _ { H _ { s } A A _ { s } } \ = \ \frac { \stackrel { \lambda } { \stackrel { - \lambda } { M _ { Z } ^ { 2 } } } } { M _ { Z } ^ { 2 } } \, \intertext { (A.9)}$$ $$g _ { H A _ { s } A _ { s } } \ = \ \frac { \lambda v ^ { 2 } } { M _ { Z } ^ { 2 } } ( \kappa \sin \beta + \lambda \cos \beta ) \.$$ ## References - [1] G. Aad et al. [ATLAS Collaboration], Phys. Lett. B 716 (2012) 1 [arXiv:1207.7214 [hepex]]; G. Aad et al. [ATLAS Collaboration], ATLAS-CONF-2012-162. - [2] S. Chatrchyan et al. [CMS Collaboration], Phys. Lett. B 716 (2012) 30 [arXiv:1207.7235 [hep-ex]]; S. Chatrchyan et al. [CMS Collaboration], CMS-PAS-HIG-12-045. - [3] D.V. Volkov and V.P. Alkulov, Phys. Lett. B46 (1973) 109; J. Wess and B. Zumino, Nucl. Phys. B70 (1974) 39; P. Fayet, Phys. Lett. B64 (1976) 159, Phys. Lett. B69 (1977) 489, Phys. Lett. B84 (1979) 416; G.F. Farrar and P. Fayet, Phys. Lett. B76 (1978) 575; S. Dimopoulos and H. Georgi, Nucl. Phys. B193 (1981) 150; N. Sakai, Z. Phys. C11 (1981) 153; E. Witten, Nucl. Phys. B188 (1981) 513; H.P. Nilles, Phys. Rep. 110 (1984) 1; H.E. Haber and G.L. Kane, Phys. Rep. 117 (1985) 75; M.F. Sohnius, Phys. Rep. 128 (1985) 39; J.F. Gunion and H.E. Haber, Nucl. Phys. B272 (1986) 1 [Erratum-ibid. B402 (1993) 567], Nucl. Phys. B278 (1986) 449; A.B. Lahanas and D.V. Nanopoulos, Phys. Rep. 145 (1987) 1. - [4] For reviews and further references, see: J.F. Gunion, H.E. Haber, G. Kane and S. Dawson, 'The Higgs Hunter's Guide' , Addison-Wesley, 1990; S.P. Martin, [hep-ph/9709356]; S. Dawson, [hep-ph/9712464]; M. Gomez-Bock, M. Mondragon, M. M¨hlleitner, R. Noriegau Papaqui, I. Pedraza, M. Spira and P. M. Zerwas, J. Phys. Conf. Ser. 18 (2005) 74 [arXiv:hepph/0509077]; M. Gomez-Bock, M. Mondragon, M. M¨hlleitner, M. Spira and u P. M. Zerwas, [arXiv:0712.2419 [hep-ph]]; A. Djouadi, Phys. Rept. 459 (2008) 1 [hepph/0503173]. - [5] P. Fayet, Nucl. Phys. B90 (1975) 104; R. Barbieri, S. Ferrara, C. A. Savoy, Phys. Lett. B119 (1982) 343; M. Dine, W. Fischler, M. Srednicki, Phys. Lett. B104 (1981) 199; H. P. Nilles, M. Srednicki, D. Wyler, Phys. Lett. B120 (1983) 346; J. M. Frere, D. R. T. Jones, S. Raby, Nucl. Phys. B222 (1983) 11; J. P. Derendinger, C. A. Savoy, Nucl. Phys. B237 (1984) 307; J. R. Ellis, J. F. Gunion, H. E. Haber, L. Roszkowski, F. Zwirner, Phys. Rev. D39 (1989) 844; M. Drees, Int. J. Mod. Phys. A4 (1989) 3635; U. Ellwanger, M. Rausch de Traubenberg, C. A. Savoy, Phys. Lett. B315 (1993) 331 [hep-ph/9307322], Z. Phys. C67 (1995) 665 [hep-ph/9502206], Nucl. Phys. B492 (1997) 21 [hep-ph/9611251]; T. Elliott, S. F. King, P. L. White, Phys. Lett. B351 (1995) 213 [hep-ph/9406303]; S. F. King, P. L. White, Phys. Rev. D52 (1995) 4183 [hep-ph/9505326]; F. Franke, H. Fraas, Int. J. Mod. Phys. A12 (1997) 479 [hep-ph/9512366]; M. Maniatis, Int. J. Mod. Phys. A25 (2010) 3505 [arXiv:0906.0777 [hep-ph]]; U. Ellwanger, C. Hugonie, A. M. Teixeira, Phys. Rept. 496 (2010) 1 [arXiv:0910.1785 [hep-ph]]. - [6] J.E. Kim and H.P. Nilles, Phys. Lett. B138 (1984) 150. - [7] M. Bastero-Gil, C. Hugonie, S. F. King, D. P. Roy and S. Vempati, Phys. Lett. B 489 , 359 (2000) [hep-ph/0006198]; A. Delgado, C. Kolda, J. P. Olson and A. de la Puente, Phys. Rev. Lett. 105 , 091802 (2010) [arXiv:1005.1282 [hep-ph]]; U. Ellwanger, G. EspitalierNoel and C. Hugonie, JHEP 1109 (2011) 105 [arXiv:1107.2472 [hep-ph]]; G. G. Ross and K. Schmidt-Hoberg, arXiv:1108.1284 [hep-ph]; L. J. Hall, D. Pinner and J. T. Ruderman, JHEP 1204 (2012) 131 [arXiv:1112.2703 [hep-ph]]; Z. Kang, J. Li and T. Li, JHEP 1211 (2012) 024 [arXiv:1201.5305 [hep-ph]]; J. -J. Cao, Z. -X. Heng, J. M. Yang, Y. -M. Zhang and J. -Y. Zhu, JHEP 1203 (2012) 086 [arXiv:1202.5821 [hep-ph]]; J. Cao, Z. Heng, J. M. Yang and J. Zhu, JHEP 1210 (2012) 079 [arXiv:1207.3698 [hep-ph]]; J. R. Espinosa, C. Grojean, V. Sanz and M. Trott, JHEP 1212 (2012) 077 [arXiv:1207.7355 [hep-ph]]; M. Perelstein and B. Shakya, Phys. Rev. D 88 (2013) 075003 [arXiv:1208.0833 [hep-ph]]; K. Agashe, Y. Cui and R. Franceschini, JHEP 1302 (2013) 031 [arXiv:1209.2115 [hep-ph]]. - [8] S. F. King, M. Muhlleitner and R. Nevzorov, Nucl. Phys. B 860 (2012) 207 [arXiv:1201.2671 [hep-ph]]; S. F. King, M. Muhlleitner, R. Nevzorov and K. Walz, Nucl. Phys. B 870 (2013) 323 [arXiv:1211.5074 [hep-ph]]. - [9] S. Schael et al. [ALEPH, DELPHI, L3 and OPAL Collaborations], Eur. Phys. J. C 47 (2006) 547. - [10] D. T. Nhung, M. Muhlleitner, J. Streicher and K. Walz, JHEP 1311 (2013) 181 [arXiv:1306.3926 [hep-ph]]. - [11] U. Ellwanger, JHEP 1308 (2013) 077 [arXiv:1306.5541 [hep-ph]]. - [12] S. Munir, Phys. Rev. D 89 (2014) 095013 [arXiv:1310.8129 [hep-ph]]. - [13] U. Ellwanger, Phys. Lett. B 698 (2011) 293 [arXiv:1012.1201 [hep-ph]]; U. Ellwanger, JHEP 1203 (2012) 044 [arXiv:1112.3548 [hep-ph]]; A. Arvanitaki and G. Villadoro, JHEP 1202 (2012) 144 [arXiv:1112.4835 [hep-ph]]. - [14] J. F. Gunion, Y. Jiang and S. Kraml, Phys. Rev. D 86 (2012) 071702 [arXiv:1207.1545 [hep-ph]]. - [15] J. F. Gunion, Y. Jiang and S. Kraml, Phys. Rev. Lett. 110 (2013) 051801 [arXiv:1208.1817 [hep-ph]]. - [16] U. Ellwanger, Phys. Lett. B303 (1993) 271 [hep-ph/9302224]; T. Elliott, S. F. King, P. L. White, Phys. Lett. B305 (1993) 71 [hep-ph/9302202], Phys. Lett. B314 (1993) 56 [hep-ph/9305282], Phys. Rev. D49 (1994) 2435 [hep-ph/9308309]; P. N. Pandita, Z. Phys. C59 (1993) 575, Phys. Lett. B318 (1993) 338. - [17] U. Ellwanger, C. Hugonie, Phys. Lett. B623 (2005) 93 [hep-ph/0504269]. - [18] G. Degrassi and P. Slavich, Nucl. Phys. B 825 (2010) 119 [arXiv:0907.4682 [hep-ph]]. - [19] F. Staub, W. Porod, B. Herrmann, JHEP 1010 (2010) 040 [arXiv:1007.4049 [hep-ph]]. - [20] K. Ender, T. Graf, M. M¨ uhlleitner and H. Rzehak, Phys. Rev. D 85 (2012) 075024 [arXiv:1111.4952 [hep-ph]]. - [21] S. W. Ham, J. Kim, S. K. Oh and D. Son, Phys. Rev. D 64 (2001) 035007 [hepph/0104144]; S. W. Ham, S. H. Kim, S. K. OH and D. Son, Phys. Rev. D 76 (2007) 115013 [arXiv:0708.2755 [hep-ph]]. - [22] S. W. Ham, S. K. Oh and D. Son, Phys. Rev. D 65 (2002) 075004 [hep-ph/0110052]; S. W. Ham, Y. S. Jeong and S. K. Oh, hep-ph/0308264. - [23] K. Funakubo and S. Tao, Prog. Theor. Phys. 113 (2005) 821 [hep-ph/0409294]. - [24] T. Graf, R. Grober, M. Muhlleitner, H. Rzehak and K. Walz, JHEP 1210 (2012) 122 [arXiv:1206.6806 [hep-ph]]. - [25] K. Cheung, T. -J. Hou, J. S. Lee and E. Senaha, Phys. Rev. D 82 (2010) 075007 [arXiv:1006.1458 [hep-ph]]. - [26] U. Ellwanger, J.F. Gunion and C. Hugonie, JHEP 0502 (2005) 066; U. Ellwanger and C. Hugonie, Comput. Phys. Commun. 175 (2006) 290. - [27] U. Ellwanger and C. Hugonie, Comput. Phys. Commun. 177 (2007) 399 ( http://www.th.u-psud.fr/NMHDECAY/nmssmtools.html ); see also, G. Chalons and F. Domingo, Phys. Rev. D 86 (2012) 115024 [arXiv:1209.6235 [hep-ph]]. - [28] J. Baglio, R. Grober, M. Muhlleitner, D. T. Nhung, H. Rzehak, M. Spira, J. Streicher and K. Walz, arXiv:1312.4788 [hep-ph]. - [29] M. Badziak, M. Olechowski and S. Pokorski, JHEP 1306 (2013) 043 [arXiv:1304.5437 [hep-ph]]. - [30] S. Munir, L. Roszkowski and S. Trojanowski, Phys. Rev. D 88 (2013) 5, 055017 [arXiv:1305.0591 [hep-ph]]. - [31] D. G. Cerdeo, P. Ghosh, C. B. Park and M. Peir, JHEP 1402 (2014) 048 [arXiv:1307.7601 [hep-ph], arXiv:1307.7601]. - [32] C. Beskidt, W. de Boer and D. I. Kazakov, Phys. Lett. B 726 (2013) 758 [arXiv:1308.1333 [hep-ph]]. - [33] K. Choi, S. H. Im, K. S. Jeong and M. -S. Seo, JHEP 1401 (2014) 072 [arXiv:1308.4447 [hep-ph]]. - [34] J. Kozaczuk and S. Profumo, Phys. Rev. D 89 (2014) 095012 [arXiv:1308.5705 [hep-ph]]. - [35] J. Cao, F. Ding, C. Han, J. M. Yang and J. Zhu, JHEP 1311 (2013) 018 [arXiv:1309.4939 [hep-ph]]. - [36] J.-W. Fan, J.-Q. Tao, Y.-Q. Shen, G.-M. Chen, H.-S. Chen, S. Gascon-Shotkin, M. Lethuillier and L. Sgandurra et al. , Chin. Phys. C 38 (2014) 073101 [arXiv:1309.6394 [hep-ph]]. - [37] J. Huang, T. Liu, L. -T. Wang and F. Yu, Phys. Rev. Lett. 112 (2014) 221803 [arXiv:1309.6633 [hep-ph]]. - [38] G. Belanger, V. Bizouard and G. Chalons, Phys. Rev. D 89 (2014) 095023 [arXiv:1402.3522 [hep-ph]]. - [39] C. Beskidt, W. de Boer and D. I. Kazakov, arXiv:1402.4650 [hep-ph]. - [40] D. Buttazzo, arXiv:1405.3321 [hep-ph]. - [41] U. Ellwanger and C. Hugonie, arXiv:1405.6647 [hep-ph]. - [42] U. Ellwanger and A. M. Teixeira, arXiv:1406.7221 [hep-ph]. - [43] R. D. Peccei and H. R. Quinn, Phys. Rev. Lett. 38 (1977) 1440; Phys. Rev. D 16 (1977) 1791. - [44] A. Djouadi, M. Spira and P.M. Zerwas, Phys. Lett. B 264 (1991) 440 and Z. Phys. C 70 (1996) 427; M. Spira et al. , Nucl. Phys. B 453 (1995) 17; A. Djouadi, J. Kalinowski and M. Spira, Comput. Phys. Commun. 108 (1998) 56; J. M. Butterworth, A. Arbey, L. Basso, S. Belov, A. Bharucha, F. Braam, A. Buckley and M. Campanelli et al. , arXiv:1003.1643 [hep-ph]. - [45] A. Djouadi, M. M. Muhlleitner and M. Spira, Acta Phys. Polon. B38 (2007) 635 [hepph/0609292]. - [46] D. Das, U. Ellwanger and A. M. Teixeira, arXiv:1106.5633 [hep-ph]. - [47] M. Muhlleitner, A. Djouadi and Y. Mambrini, Comput. Phys. Commun. 168 (2005) 46 [hep-ph/0311167]; M. Muhlleitner, Acta Phys. Polon. B35 (2004) 2753 [hep-ph/0409200]. - [48] P. Z. Skands et al., JHEP 0407 (2004) 036 [hep-ph/0311123]; B. C. Allanach et al., Comput. Phys. Commun. 180 (2009) 8 [arXiv:0801.0045 [hep-ph]]. - [49] ATLAS Collaboration, ATLAS-CONF-2013-090; CMS Collaboration, CMS-PAS-HIG-12052. - [50] G. Aad et al. [ATLAS Collaboration], arXiv:1405.7875 [hep-ex]; Eur. Phys. J. C 72 (2012) 2237 [arXiv:1208.4305 [hep-ex]]; Phys. Lett. B 720 (2013) 13 [arXiv:1209.2102 [hep-ex]]; JHEP 1406 (2014) 124 [arXiv:1403.4853 [hep-ex]]; JHEP 1310 (2013) 189 [arXiv:1308.2631 [hep-ex]]; arXiv:1407.0583 [hep-ex]; arXiv:1406.1122 [hep-ex]. - [51] G. Aad et al. [ATLAS Collaboration], arXiv:1407.0608 [hep-ex]. | [52] | CMS Collaboration [CMS Collaboration], CMS-PAS-SUS-13-019; CMS-PAS-SUS-13-024; CMS-PAS-SUS-14-011; CMS-PAS-SUS-13-011; CMS-PAS-SUS-13-004; CMS-PAS-SUS- 13-014; CMS-PAS-SUS-13-018; CMS-PAS-SUS-13-008; CMS-PAS-SUS-13-013. | |--------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [53] | G. Belanger, F. Boudjema, A. Pukhov and A. Semenov, Comput. Phys. Commun. 149 (2002) 103 [hep-ph/0112278], Comput. Phys. Commun. 174 (2006) 577 [hep-ph/0405253] and Comput. Phys. Commun. 180 (2009) 747 [arXiv:0803.2360 [hep-ph]]; G. Belanger et al., Comput. Phys. Commun. 182 (2011) 842 [arXiv:1004.1092 [hep-ph]]. | | [54] | P. A. R. Ade et al. [Planck Collaboration], arXiv:1303.5076 [astro-ph.CO]. | | [55] | ATLAS Collaboration, ATLAS-CONF-2012-168; CMS Collaboration CMS-PAS-HIG-13- 001. | | [56] | ATLAS Collaboration, ATLAS-CONF-2013-013; CMS Collaboration CMS-PAS-HIG-13- 002. | | [57] | ATLAS Collaboration, ATLAS-CONF-2013-030; CMS Collaboration CMS-PAS-HIG-13- 003. | | [58] | ATLAS Collaboration, ATLAS-CONF-2012-161; CMS Collaboration CMS-PAS-HIG-12- 044. | | [59] | ATLAS Collaboration, ATLAS-CONF-2012-160; CMS Collaboration CMS-PAS-HIG-13- 004. | | [60] | ATLAS Collaboration, ATLAS-CONF-2013-009; CMS Collaboration CMS-PAS-HIG-13- 006. | | [61] | ATLAS Collaboration, ATLAS-CONF-2013-010. | | [62] | D. Graudenz, M. Spira and P. M. Zerwas, Phys. Rev. Lett. 70 (1993) 1372; M. Spira, A. Djouadi, D. Graudenz and P. M. Zerwas, Phys. Lett. B 318 (1993) 347; M. Spira, A. Djouadi, D. Graudenz and P. M. Zerwas, Nucl. Phys. B 453 (1995) 17 [hep-ph/9504378]. | | [63] | R. V. Harlander and W. B. Kilgore, Phys. Rev. Lett. 88 (2002) 201801 [hep-ph/0201206]; C. Anastasiou and K. Melnikov, Nucl. Phys. B 646 (2002) 220 [hep-ph/0207004]; V. Ravin- dran, J. Smith and W. L. van Neerven, Nucl. Phys. B 665 (2003) 325 [hep-ph/0302135]. | | [64] | S. Marzani, R. D. Ball, V. Del Duca, S. Forte and A. Vicini, Nucl. Phys. Proc. Suppl. 186 (2009) 98 [arXiv:0809.4934 [hep-ph]]; R. V. Harlander and K. J. Ozeren, JHEP 0911 (2009) 088 [arXiv:0909.3420 [hep-ph]]; A. Pak, M. Rogal and M. Steinhauser, JHEP 1002 (2010) 025 [arXiv:0911.4662 [hep-ph]]; R. V. Harlander, H. Mantler, S. Marzani and K. J. Ozeren, Eur. Phys. J. C 66 (2010) 359 [arXiv:0912.2104 [hep-ph]]; A. Pak, M. Rogal and M. Steinhauser, JHEP 1109 (2011) 088 [arXiv:1107.3391 [hep-ph]]. | | [65] | S. Catani, D. de Florian, M. Grazzini and P. Nason, JHEP 0307 (2003) 028 [hep- ph/0306211]. | | [66] | V. Ravindran, Nucl. Phys. B 746 (2006) 58 [hep-ph/0512249] and Nucl. Phys. B 752 (2006) 173 [hep-ph/0603041]. | - [67] S. Moch and A. Vogt, Phys. Lett. B 631 (2005) 48 [hep-ph/0508265]; R. D. Ball, M. Bonvini, S. Forte, S. Marzani and G. Ridolfi, Nucl. Phys. B 874 (2013) 746 [arXiv:1303.3590 [hep-ph]]. - [68] G. L. Kane, G. D. Kribs, S. P. Martin and J. D. Wells, Phys. Rev. D 53 (1996) 213 [hep-ph/9508265]; S. Dawson, A. Djouadi and M. Spira, Phys. Rev. Lett. 77 (1996) 16 [hep-ph/9603423]; A. Djouadi, Phys. Lett. B 435 (1998) 101 [hep-ph/9806315]; C. Anastasiou, S. Beerli, S. Bucherer, A. Daleo and Z. Kunszt, JHEP 0701 (2007) 082 [hepph/0611236]; U. Aglietti, R. Bonciani, G. Degrassi and A. Vicini, JHEP 0701 (2007) 021 [hep-ph/0611266]; M. Muhlleitner and M. Spira, Nucl. Phys. B 790 (2008) 1 [hepph/0612254]; A. Arvanitaki and G. Villadoro, JHEP 1202 (2012) 144 [arXiv:1112.4835 [hep-ph]]. - [69] M. Spira, Fortsch. Phys. 46 (1998) 203 [hep-ph/9705337] - [70] M. Spira, hep-ph/9510347 and Nucl. Instrum. Meth. A 389 (1997) 357. - [71] A. Djouadi and P. Gambino, Phys. Rev. Lett. 73 (1994) 2528 [hep-ph/9406432]; U. Aglietti, R. Bonciani, G. Degrassi and A. Vicini, Phys. Lett. B 595 (2004) 432 [hepph/0404071]; G. Degrassi and F. Maltoni, Phys. Lett. B 600 (2004) 255 [hep-ph/0407249]; S. Actis, G. Passarino, C. Sturm and S. Uccirati, Phys. Lett. B 670 (2008) 12 [arXiv:0809.1301 [hep-ph]]; C. Anastasiou, R. Boughezal and F. Petriello, JHEP 0904 (2009) 003 [arXiv:0811.3458 [hep-ph]]. - [72] The ATLAS Collaboration, ATLAS-CONF-2013-034. - [73] The CMS Collaboration, CMS-PAS-HIG-13-005. - [74] J. R. Espinosa, M. Muhlleitner, C. Grojean and M. Trott, JHEP 1209 (2012) 126 [arXiv:1205.6790 [hep-ph]]. - [75] D. J. Miller, R. Nevzorov and P. M. Zerwas, Nucl. Phys. B 681 (2004) 3 [hep-ph/0304049]. - [76] The ATLAS Collaboration, ATLAS-CONF-2013-068. - [77] The CMS Collaboration, CMS-PAS-SUS-13-009. - [78] V. M. Abazov et al. [D0 Collaboration], Phys. Lett. B 665 (2008) 1 [arXiv:0803.2263 [hepex]]; T. Aaltonen et al. [CDF Collaboration], JHEP 1210 (2012) 158 [arXiv:1203.4171 [hep-ex]]. - [79] G. Abbiendi et al. [OPAL Collaboration], Phys. Lett. B 456 (1999) 95 [hep-ex/9903070]; G. Abbiendi et al. [OPAL Collaboration], Phys. Lett. B 545 (2002) 272 [Erratum-ibid. B 548 (2002) 258] [hep-ex/0209026]. - [80] C. Boehm, A. Djouadi, Y. Mambrini, Phys. Rev. D61 (2000) 095006 [hep-ph/9907428]. - [81] A. Delgado, G. F. Giudice, G. Isidori, M. Pierini and A. Strumia, Eur. Phys. J. C 73 (2013) 2370 [arXiv:1212.6847 [hep-ph]]. - [82] G. Aad et al. [ATLAS Collaboration], arXiv:1407.0583 [hep-ex]. - [83] K. I. Hikasa and M. Kobayashi, Phys. Rev. D 36 (1987) 724. - [84] M. Muhlleitner and E. Popenda, JHEP 1104 (2011) 095 [arXiv:1102.5712 [hep-ph]]. - [85] Y. Grossman, Z. 'e. Surujon and J. Zupan, JHEP 1303 (2013) 176 [arXiv:1301.0328 [hepph]]. - [86] R. V. Harlander, S. Liebler and H. Mantler, Computer Physics Communications 184 (2013) 1605 [arXiv:1212.3249 [hep-ph]]. - [87] The ATLAS Collaboration, ATLAS-TDR-15 and CERN-LHCC-99-015. - [88] S. Dittmaier et al. [LHC Higgs Cross Section Working Group Collaboration], arXiv:1101.0593 [hep-ph]. - [89] S. Chatrchyan et al. [CMS Collaboration], Phys. Rev. Lett. 109 (2012) 121801 [arXiv:1206.6326 [hep-ex]]. - [90] The ATLAS Collaboration, ATLAS-CONF-2012-079. - [91] The CMS Collaboration, CMS-PAS-HIG-13-032. - [92] G. Aad et al. [ATLAS Collaboration], arXiv:1406.5053 [hep-ex]. - [93] R. Nevzorov and D. J. Miller, hep-ph/0411275. - [94] A. Djouadi, W. Kilian, M. Muhlleitner and P. M. Zerwas, Eur. Phys. J. C 10 (1999) 27 [hep-ph/9903229]; A. Djouadi, W. Kilian, M. Muhlleitner and P. M. Zerwas, Eur. Phys. J. C 10 (1999) 45 [hep-ph/9904287]; M. M. Muhlleitner, hep-ph/0008127. - [95] C. Englert, A. Freitas, M. Muhlleitner, T. Plehn, M. Rauch, M. Spira and K. Walz, arXiv:1403.7191 [hep-ph]. - [96] CMS Collaboration, arXiv:1307.7135; ATLAS Collaboration, arXiv:1307.7292 [hep-ex]; S. Dawson, A. Gritsan, H. Logan, J. Qian, C. Tully, R. Van Kooten, A. Ajaib and A. Anastassov et al. , arXiv:1310.8361 [hep-ex].
10.1103/PhysRevD.90.095014
[ "S. F. King", "M. Muhlleitner", "R. Nevzorov", "K. Walz" ]
2014-08-05T21:30:50+00:00
2014-08-05T21:30:50+00:00
[ "hep-ph" ]
Discovery Prospects for NMSSM Higgs Bosons at the High-Energy Large Hadron Collider
We investigate the discovery prospects for NMSSM Higgs bosons during the 13~TeV run of the LHC. While one of the neutral Higgs bosons is demanded to have a mass around 125~GeV and Standard Model (SM)-like properties, there can be substantially lighter, nearby or heavier Higgs bosons, that have not been excluded yet by LEP, Tevatron or the 8~TeV run of the LHC. The challenge consists in discovering the whole NMSSM Higgs mass spectrum. We present the rates for production and subsequent decay of the neutral NMSSM Higgs bosons in the most promising final states and discuss their possible discovery. The prospects for pinning down the Higgs sector of the Natural NMSSM will be analysed taking into account alternative search channels. We give a series of benchmark scenarios compatible with the experimental constraints, that feature Higgs-to-Higgs decays and entail (exotic) signatures with multi-fermion and/or multi-photon final states. These decay chains furthermore give access to the trilinear Higgs self-couplings. We briefly discuss the possibility of exploiting coupling sum rules in case not all the NMSSM Higgs bosons are discovered.
1408.1121v1
## Dialectics of Counting and the Mathematics of Vagueness A. Mani Department of Pure Mathematics University of Calcutta 9/1B, Jatin Bagchi Road Kolkata(Calcutta)-700029, India a.mani.cms @ gmail.com http://www.logicamani.in Homepage: Abstract. New concepts of rough natural number systems are introduced in this research paper from both formal and less formal perspectives. These are used to improve most rough set-theoretical measures in general Rough Set theory ( RST ) and to represent rough semantics. The foundations of the theory also rely upon the axiomatic approach to granularity for all types of general RST recently developed by the present author. The latter theory is expanded upon in this paper. It is also shown that algebraic semantics of classical RST can be obtained from the developed dialectical counting procedures. Fuzzy set theory is also shown to be representable in purely granule-theoretic terms in the general perspective of solving the contamination problem that pervades this research paper. All this constitutes a radically different approach to the mathematics of vague phenomena and suggests new directions for a more realistic extension of the foundations of mathematics of vagueness from both foundational and application points of view. Algebras corresponding to a concept of rough naturals are also studied and variants are characterised in the penultimate section. keywords : Mathematics of Vagueness, Rough Natural Number Systems, Axiomatic Theory of Granules, Granulation, Granular Rough Semantics, Algebraic Semantics, Rough Y-Systems, Cover Based Rough Set Theories, Rough Inclusion Functions, Measures of Knowledge, Contamination Problem. ## 1 Introduction Rough and Fuzzy set theories have been the dominant approaches to vagueness and approximate reasoning from a mathematical perspective. Some related references are [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16] . In rough set theory ( RST ),vague and imprecise information are dealt with through binary relations (for some form of indiscernibility) on a set or covers of a set or through more abstract operators. In classical RST [17], starting from an approximation space consisting of a pair of a set and an equivalence relation over it, approximations of subsets of the set are constructed out of equivalence partitions of the space (these are crisp or definite) that are also regarded as granules in many senses. Most of the developments in RST have been within the ZFC or ZF set-theoretic framework of mathematics. In such frame works, rough sets can be seen as pairs of sets of the form ( A, B ), with A ⊆ B or more generally as in the approaches of the present author as collections of 'some sense definite elements' of the form $$\{ a _ { 1 }, a _ { 2 }, \dots a _ { n }, \, b _ { 1 }, b _ { 2 }, \dots b _ { r } \}$$ subject to a i s being 'part of' of some of the b j s (in a Rough Y -system) [18]. Relative RST , fuzzy set theory may be regarded as a complementary approach or as a special case of RST from the membership function perspective [19]. Hybrid rough-fuzzy and fuzzy-rough variants have also been studied. In these a partitioning of the meta levels can be associated for the different types of phenomena, though it can be argued that these are essentially of a rough set theoretic nature. All of these approaches have been confined to ZFC or ZF or the setting of classical mathematics. Exceptions to this trend include the Lesniewskimereology based approach [20]. Though Rough Y -systems have been introduced by the present author in ZF compatible settings [18], they can be generalised to semi-sets and variants in a natural way. This semi-set theoretical variant is work in progress. Note that the term 'theory' in RST is being used in the loose sense of the literature on the subject. It matters because the paper has strong connections with logical systems and philosophy. The granular computing paradigm can be traced to the mid nineties and has been used in different fields including fuzzy and rough set theories. An overview is considered in [21]. The dominant interpretation of the paradigm within RST has been that granularity is a context-dependent notion that gets actualized in a quasi inductive way (see [22] for example). A few axiomatic approaches for specific rough set theories are known in the literature [23], while in some others like [24] different types of granules have been used in tolerance approximation spaces. The axiomatic theory [18] developed by the present author is the most general one in the context of general RST s. [25] considers 'ontology driven formal theory of granules' for application to biological information systems, related specifications and logic programming. The motivations and content are mostly orthogonal to the concerns of the present research paper. As classical RST is generalised to more general relations and covers, the process of construction and definition of approximations becomes more open ended and draws in different amounts of arbitrariness or hidden principles. The relevant concept of 'granules', the things that generate approximations, may also become opaque in these settings. To address these issues and for semantic compulsions, a new axiomatic theory of granules has been developed over a RYS in [18] and other recent papers by the present author. This theory has been used to formalise different principles, including the local clear discernibility principle in the same paper. In this research, it is extended to various types of general RST and is used to define the concepts of discernibility used in counting procedures, generalised measures and the problems of representation of semantics. Many types of contexts involving vagueness cannot be handled in elegant way through standard mathematical techniques. Much of RST and FST are not known to be particularly elegant in handling different measures like the degree of membership or inclusion. For example, these measures do not determine the semantics in clear terms or the semantics do not determine the measures in a unique way. But given assumptions about the measures, compatible semantics [26] in different forms are well known. This situation is due to the absence of methods of counting collections of objects including relatively indiscernible ones and methods for performing arithmetical operations on them. However in the various algebraic semantics of classical RST some boundaries on possible operations may be observed. The process of counting a set of objects, given the restriction that some of these may be indiscernible within themselves, may appear to be a very contextual matter and on deeper analysis may appear to bear no easy relationship with any fine structure concerning the vagueness of a collection of such elements or the rough semantics (algebraic or frame). This is reflected in the absence of related developments on the relationship between the two in the literature and is more due to the lack of developments in the former. It should be noted that the convenience of choice between concepts of formal logics (in axiomatic or sequent calculus form) preceding algebraic semantics or the converse depend on the context. For many classes of logics, the absence of real distinction is well-known [27,28]. Any intention to deal with models automatically comes with an ontological commitment to the proof-theoretical approach and vice versa. The literature on rough sets shows that the converse works better - for example the rough algebra semantics [29], the double stone algebra semantics [30] and super rough semantics [31] were developed from a 'semantic viewpoint'. The modal perspective originated from both a semantic viewpoint and an axiomatic viewpoint (not proof-theoretic). The more important thing to be noted is that full application contexts of rough sets come with many more kinds of problems (like the reduct problem) that are not represented in rough logics or semantics, since the focus is on reasoning. This means fragments of the full process are abstracted for the formulation of rough logics in proof-theoretical or model-theoretical terms. When I speak of semantics of RST , I mean such an abstraction necessarily. More clarifications are provided in the section on semantic domains and the contamination problem. In this research, theories of vague numbers or rather procedures for counting collections of objects including indiscernible ones have been introduced by the present author and have been applied to extend various measures of RST . The extended measures have better information content and also supplement the mereological theory from a quantitative perspective. Proper extension of these to form a basis of RST within ZF/ZFC is also considered in this research paper. Here, by a 'basis of RST ', I mean a theory analogous to the theory of numbers from which all mathematics of exact phenomena can be represented. Throughout this paper, the theory may be seen to be restricted to ZF/ZFC set theoretical setting, though a naive or a second order reading will not be problematic. Relax- ation of the ZF axioms given the dialectical interpretation of semantic domain will be taken up in subsequent papers, but the philosophical motivations for such a paradigm shift will be considered in later sections. From a purely vagueness perspective, the goal is also to enlarge the scope of mathematical perspective of vagueness. Notation and terminology are fixed in the second section. In the third section, the basic orientation of object and meta levels used, and the relation with concepts is elucidated. The concept of contamination of information across metalevels is introduced and described in the next section. In the fifth section, the reason for using a fragment of mereology as opposed to the Polkowski-Skowron mereology is explained. Some non-standard (with respect to the literature on RST ) examples motivating key aspects of the axiomatic approach to granules are presented in the sixth section. In the next section, the entire structure of the proposed program and aspects of the measures used in RST are discussed. In the following section, aspects of counting in domains of vague reasoning are explained in a novel perspective. In the ninth section, the axiomatic theory of granules over rough Y -systems is extended. In the following two sections this is applied to relation-based and cover-based rough set theories. The ninth, tenth and eleventh sections may also be found in a forthcoming paper by the present author and have been included for completeness. Dialectical counting processes are introduced next. These are used to generalise rough inclusion functions, degrees of knowledge dependency and other measures in the following section. In the fourteenth section, possible representation of different types of counts is developed. An application to rough semantics and integration of granularity with a method of counting is considered in the fifteenth section. In the following section, I show how fuzzy set theory can be viewed as a particular form of granularity in the perspective of the contamination problem. The relation with earlier approaches is also indicated. Subsequently I consider the problem of improving the representation of counts in a low-level perspective and develop the algebra of rough naturals in detail. Further directions are mentioned in the eighteenth section. ## 2 Some Background, Terminology A Tolerance Approximation Space TAS [32] is a pair S = 〈 S, T 〉 , with S being a set and T a tolerance relation over it. They are also known as similarity and as tolerance approximation spaces (conflicting the terminology introduced in [33]). For each x ∈ S , the associated set of T -related elements is given by [ x ] T = { y ; ( x, y ) ∈ T } . Some references for extension of classical RST to TAS are [33], [34], [35] and [36]. In [24] specific granulations are considered separately in TAS , but many types of duality and connections with logics are not considered. The actual body of work in the field is huge and no attempt to mention all possibly relevant references will be made. An approach [34] has been to define a new equivalence θ 0 on S via ( x, y ) ∈ θ 0 if and only if dom T ( x ) = dom T ( y ) with dom T ( z ) = ∩{ [ x ] T : z ∈ [ x ] T } . This is an unduly cautious 'clear perspective' approach. A generalization of the approximation space semantics using T -related sets (or tolerance sets) can be described from the point of view of generalised covers (see [37]). This includes the approach to defining the lower and upper approximation of a set A as $$A ^ { l } = \bigcup \{ [ x ] _ { T } \, ; \, [ x ] _ { T } \, \subseteq \, A \},$$ and glyph[negationslash] $$A ^ { u } = \bigcup \{ [ x ] _ { T } \, ; \, [ x ] _ { T } \, \cap \, A \, \neq \, \emptyset, \, x \, \in \, A \}.$$ A bited modification proposed in [38], valid for many definable concepts of granules, consists in defining a bited upper approximation . Algebraic semantics of the same has been considered by the present author in [39]. It is also shown that a full representation theorem is not always possible for the semantics. The approximations $$A ^ { l * } = \{ x \, ; \, ( \exists y ) \, ( x, \, y ) \, \in \, T, \, [ y ] _ { T } \, \subseteq \, A \},$$ and glyph[negationslash] $$A ^ { u * } = \{ x \, ; \, ( \forall y ) \, ( ( x, y ) \, \in \, T \, \longrightarrow \, [ y ] _ { T } \cap \, A \neq \emptyset ) \} = ( A ^ { c } ) ^ { l * c }$$ were considered in [40,35]. It can be shown that, for any subset A , $$A ^ { l } \subseteq \, A ^ { l * } \subseteq \, A \subseteq \, A ^ { u * } \subseteq \, A ^ { u }.$$ In the BZ and Quasi-BZ algebraic semantics [41], the lower and upper rough operators are generated by a preclusivity operator and the complementation relation on the power set of the approximation space, or on a collection of sets under suitable constraints in a more abstract setting. Semantically, the BZalgebra and variants do not capture all the possible ways of arriving at concepts of discernibility over similarity spaces. Let S be a set and S = { K i } n 1 : n &lt; ∞ be a collection of subsets of it. We will abbreviate subsets of natural numbers of the form { 1 2 , , . . . , n } by N ( n ). For convenience, we will assume that K 0 = ∅ , K n +1 = S . 〈 S, S〉 will also be referred to as a Cover Approximation System (CAS). Cover-based RST can be traced to [42], where the approximations A l and A u are defined over the cover { [ x ] T ; x ∈ S } . A 1-neighbourhood [43] n x ( ) of an element x ∈ S is simply a subset of S . The collection of all 1-neighbourhoods N of S will form a cover if and only if ( ∀ x )( ∃ y x ) ∈ n y ( ) (anti-seriality). So in particular a reflexive relation on S is sufficient to generate a cover on it. Of course, the converse association does not necessarily happen in a unique way. If S is a cover of the set S , then the Neighbourhood [44] of x ∈ S is defined via, $$\ n b d ( x ) = \bigcap \{ K \, \colon \, x \in K \, \in \, \mathcal { S } \}.$$ The sixth type of lower and upper approximations [45,43] of a set X are then defined by $$X _ { \S } \, = \, \{ x \, \colon \, n b d ( x ) \, \subseteq \, X \},$$ and glyph[negationslash] $$X ^ { \S } \, = \, \{ x \, \colon \, n b d ( x ) \cap \, X \neq \emptyset \}.$$ The minimal description of an element x ∈ S is defined to be the collection $$\text{Md} ( x ) \, = \, \{ A \, \colon x \in A \in \mathcal { S }, \, \forall B ( x \in B \to \sim ( A \subset B ) ) \}.$$ The Indiscernibility (or friends) of an element x ∈ S is defined to be $$F r ( x ) = \bigcup \{ K \colon x \in K \in \mathcal { S } \}.$$ The definition was used first in [40], but has been redefined again by many others (see [46]). An element K ∈ S will be said to be Reducible if and only if glyph[negationslash] $$( \forall x \in K ) K \neq \text{Md} ( x ).$$ The collection { nbd x ( ) : x ∈ S } will be denoted by N . The cover obtained by the removal of all reducible elements is called a covering reduct. The terminology is closest to [45] and many variants can be found in the literature (see [46]). If X ⊆ S , then let - (i) X l 1 = ⋃ { K i : K i ⊆ X, i ∈ { 0 , 1 , ..., n }} . - (ii) X l 2 = ⋃ {∩ i ∈ I ( S \ K i ) : ∩ i ∈ I ( S \ K i ) ⊆ X, I ⊆ N ( n +1) ; the union is } over the I 's. - (iii) X u 1 = ⋂ {∪ i ∈ I K i : X ⊆ ∪ i ∈ I K , i I ⊆ N ( n +1) ; the intersection is over } the I 's. - (iv) X u 2 = ⋂ { S \ K i : X ⊆ S \ K , i i ∈ { 0 , ..., n }} . The pair ( X , X l 1 u 1 ) is called an AU -rough set by union, while ( X , X l 2 u 2 ) an AI -rough set by intersection (in the present author's notation [47]). In the notation of [37], these are ( F ∪ ∗ ( X , ) F ∗ ∪ ( X )) and ( F ∩ ∗ ( X , ) F ∗ ∩ ( X )), respectively. I will also refer to the pair 〈 S, K〉 as an AUAI -approximation system . Theorem 1. The following hold in AUAI approximation systems: glyph[negationslash] - (i) X l 1 ⊆ X ⊆ X u 1 ; X l 2 ⊆ X ⊆ X u 2 ; ∅ l 1 = ∅ l 2 = ∅ , (ii) ( ∪K = S -→ S u 1 = S u 2 = S ) ; ( ∪K = S -→ ∅ u 2 = ∅ , S l 1 = S ) , (iii) ( ∩K = ∅ -→ ∅ u 1 = ∅ , S l 2 = S ) , (iv) ( X ∩ Y ) l 1 ⊆ X l 1 ∩ Y l 1 ; ( X ∩ Y ) l 2 = X l 2 ∩ Y l 2 , (v) ( X ∪ Y ) u 1 = X u 1 ∪ Y u 1 ; X u 2 ∪ Y u 2 ⊆ ( X ∪ Y ) u 2 , (vi) ( X ⊆ Y -→ X l 1 ⊆ Y l 1 , X l 2 ⊆ Y l 2 , X u 1 ⊆ Y u 1 , X u 2 ⊆ Y u 2 ) , (vii) If ( ∀ i = ) j K i ∩ K j = ∅ then ( X ∩ Y ) l 1 = X l 1 ∩ Y l 1 , ( X ∪ Y ) u 2 = X u 2 ∪ Y u 2 , (viii) X l 1 ∪ Y l 1 ⊆ ( X ∪ Y ) l 1 ; X l 2 ∪ Y l 2 ⊆ ( X ∪ Y ) l 2 , (ix) ( X ∩ Y ) u 1 ⊆ X u 1 ∩ Y u 1 ; ( X ∩ Y ) u 2 ⊆ X u 2 ∩ Y u 2 , (x) ( S \ X ) l 1 = S \ X u 2 ; ( S \ X ) l 2 = S \ X u 1 , (xi) ( S \ X ) u 1 = S \ X l 2 ; ( S \ X ) u 2 = S \ X l 1 , (xii) ( X l 1 ) l 1 = X l 1 ; ( X l 2 ) l 2 = X l 2 ; ( X u 1 ) u 1 = X u 1 , (xiii) ( X u 2 ) u 2 = X u 2 ; ( X l 1 ) u 1 = X l 1 ; ( X u 2 ) l 2 = X u 2 , (xiv) X l 2 ⊆ ( X l 2 ) u 2 , ( X u 1 ) l 1 ⊆ X u 1 , (xv) ( K ∩ j ( X )) u 2 = K ∩ j ( X ) , j = 1 , 2 , ..., t 1 ; ( K ∪ j ( X )) l 1 = K ∪ j ( X ) , j = 1 , 2 , ..., t 2 . In this, ( K ∪ j ( X )) is the minimal union of sets of the form K i that include X (for j being in the indicated range) and ( K ∩ j ( X )) is the maximal intersection of sets of the form K c i that are included in X . All of the above concepts can be extended to covers with an arbitrary number of elements. The concepts of indiscernibility, neighbourhood and minimum description can be extended to subsets of S . The concept of a Neighbourhood Operator has been used in the literature in many different senses. These can be relevant in the context of the sixth type ( 6+ l , u 6+) (see the sixth section) approximations for dealing with covers generated by partially reflexive relations [47]. A large number of approximations in the cover-based approximation context have been studied in the literature using a far larger set of notations. An improved nomenclature is also proposed in the eleventh section. Cover-based RST is more general than relation-based RST and the question of when covers over a set correspond to relations over the set is resolved through duality results. It is well known that partitions correspond to equivalences and normal covers to tolerances. The approach based on neighbourhoods [43] provides many one way results. A more effective way of reducing cover-based RST to relation-based RST is in [48]. ## 3 Semantic Domains, Meta and Object Levels This section is intended to help with the understanding of the section on the contamination problem, the definition of RYS and clarify the terminology about meta and object levels among other things. In classical RST (see [17]), an approximation space is a pair of the form 〈 S, R 〉 , with R being an equivalence on the set S . On the power set ℘ S ( ), lower and upper approximation operators, apart from the usual Boolean operations, are definable. The resulting structure constitutes a semantics for RST (though not satisfactory) from a classical perspective. This continues to be true even when R is some other type of binary relation. More generally (see fourth section) it is possible to replace ℘ S ( ) by some set with a parthood relation and some approximation operators defined on it. The associated semantic domain in the sense of a collection of restrictions on possible objects, predicates, constants, functions and low level operations on those will be referred to as the classical semantic domain for general RST. In contrast, the semantics associated with sets of roughly equivalent or relatively indiscernible objects with respect to this domain will be called the rough semantic domain. Actually many other semantic domains, including hybrid semantic domains, can be generated (see [49], [39] [31]) for different types of rough semantics, but these two broad domains will always be - though not necessarily with a nice correspondence between the two. In one of the semantics developed in [39], the reasoning is within the power set of the set of possible order-compatible partitions of the set of roughly equivalent elements. The concept of semantic domain is therefore similar to the sense in which it is used in general abstract model theory [50] (though one can object to formalisation on different philosophical grounds). Formal versions of these types of semantic domains will be useful for clarifying the relation with categorical approaches to fragments of granular computing [51]. But even without a formal definition, it can be seen that the two approaches are not equivalent. Since the categorical approach requires complete description of fixed type of granulations, it is difficult to apply and especially when granules evolve relative particular semantics or semantic domains. The entire category ROUGH of rough sets in [51], assumes a uniform semantic domain as evidenced by the notion of objects and morphisms used therein. A unifying semantic domain may not also be definable for many sets of semantic domains in our approach. This means the categorical approach needs to be extended to provide a possibly comparable setting. The term object level will mean a description that can be used to directly interface with fragments (sufficient for the theories or observations under consideration) of the concrete real world. Meta levels concern fragments of theories that address aspects of dynamics at lower meta levels or the object level. Importantly, we permit meta level aspects to filter down to object levels relative different object levels of specification. So it is always possible to construct more meta levels and expressions carry intentions. Despite all this, two particular meta levels namely Meta-C (or Meta Classical), Meta-R (or Meta Rough) and an object level will be used for comparing key notions introduced with the more common approaches in the literature. Meta-R is the meta level corresponding to the observer or agent experiencing the vagueness or reasoning in vague terms (but without rough inclusion functions and degrees of inclusion), while Meta-C will be the more usual higher order classical meta level at which the semantics is formulated. It should be noted that rough membership functions and similar measures are defined at Meta-C, but they do not exist at Meta-R. A number of meta levels placed between Meta-R and Meta-C can possibly be defined and some of these will be implicit in the section on rough naturals. Many logics have been developed with the intent of formalising 'rough sets' as 'well-formed formulae' in a fixed language. They do not have a uniform domain of discourse and even ones with category theoretically equivalent models do not necessarily see the domain in the same way (though most meanings can be mapped in a bijective sense). For example, the regular double stone algebra semantics and complete rough algebra semantics correspond to different logical systems of classical RST (see [52,53]). The super rough algebra semantics in [31] actually adds more to the rough algebra semantics of [29]. It is possible to express the ability of objects to approximate in the former, while this is not possible in the latter. This is the result of a higher order construction used for generating the former. The relation of some rough semantics and topology mentioned in the previous section is again a statement about the orientation of the semantic domains in the respective subjects formulated in more crude mathematical terms. ## 3.1 Granules and Concepts In [54] for example, concepts of human knowledge are taken to consist of an intensional part and an extensional part. The intension of a concept is the collection of properties or attributes that hold for the set of objects to which the concept applies. The extension is to consist of actual examples of the object. Yao writes, 'This formulation enables us to study concepts in a logic setting in terms of intensions and also in a set-theoretic setting in terms of extensions'. The description of granules characterise concepts from the intensional point of view, while granules themselves characterise concepts from the extensional point of view. Granulations are collections of granules that contain every object of the universe in question. In a seemingly similar context, in [55] (or [3]) the authors speak of extensional granules and intensional granules that are respectively related to objects and properties. In my opinion the semantic domains in use are different and these are not conflicting notions, though it is equally well to call the latter a more strong platonic standpoint. Yao does not take sides on the debate in what a concept is and most of it is certainly nonclassical and non empiricist from a philosophical point of view. In modern western philosophy, intentions and extensions are taken to be possessed by linguistic expressions and not by concepts. Thus, for example, from Frege's point of view, the intension is the concept expressed by the expression, and the extension is the collection of items to which the expression applies. In this perspective, the concept applies to the same collection of items. It also follows that concepts, in this perspective, must be tied to linguistic expressions as well. Concepts are constituents of thinking containing the meaning of words or intended action or response. As such a linguistic expression for such concepts may not be supplied by the reasoner. Apparently the Fregean point of view speaks of concepts with associated linguistic expression alone. Even if we use a broad-sense notion of 'linguistic expression', this may fall short of the concept mentioned in the former viewpoint. Another key difference is that the former version of concepts are bound to be more independent of interpreters (or agents) than the latter. The concept of granules actually evolves across the temporal space of the theory and may be essentially a priori or a posteriori (relative to the theory or semantics) in nature. Because of these reasons, I will not try to map the two concepts into each other in this paper at least. In the present paper, a priori granules will be required in an essential way. It is only natural that possible concepts of granules are dependent on the choice of semantic domain in the contexts of RST . But a priori granules may even be identified at some stage after the identification of approximations. ## 4 Contamination Problem Suppose the problem at hand is to model vague reasoning in a particular context and relative to the agents involved in the context. It is natural for the model to become contaminated with additional inputs from a classical perspective imposed on the context by the person doing the modelling. In other words, meta level aspects can contaminate the perception of object level features. From an algebraic perspective, if the model concerns objects of specific types like 'roughly equivalent objects in some sense', then the situation is relatively better than a model that involves all types of objects. But the operations used in the algebra or algebraic system can still be viewed with suspicion. By the contamination problem, I mean the problem of minimising or eliminating the influences of the classicist perspective imposed on the context. In other words, the problem is to minimize the contamination of models of meta-R fragments by meta-C aspects. One aspect of the problem is solved partially in [56] by the present author. In the paper, a more realistic conception of rough membership functions and other measures of RST have been advanced from a minimalist perspective avoiding the real-valued or rational-valued rough measures that dominate the rough literature. Most of the rough measures based on cardinalities are of course known to lack mathematical rigour and have the potential to distort the analysis. In the mathematics of exact phenomena, the natural numbers arise in the way they do precisely because it is assumed that things being counted are welldefined and have exact existence. When a concrete collection of identical balls on a table are being counted, then it is their relative position on the table that helps in the process. But there are situations in real life, where - · such identification may not be feasible, - · the number assigned to one may be forgotten while counting subsequent objects, - · the concept of identification by way of attributes may not be stable, - · the entire process of counting may be 'lazy' in some sense, - · the mereology necessary for counting may be insufficient. Apart from examples in [56], the most glaring examples for avoiding the measures comes from attempts to apply rough sets to modelling the development of human concepts. The 'same' concept X may depend on ten other concepts in one perspective and nine other concepts in another perspective and concepts of knowing the concept X and gradation does not admit a linear measure in general. Using one in fields like education or education research would only encourage scepticism. The quality of measures like 'impact factor' of journals [57] provide a supportive example. The underlying assumptions behind rough measures are much less than in a corresponding statistical approach (subject to being possible in the first place in the application context in question) and do not make presumptions of the form -'relative errors should have some regularity'. Still the contamination problem is relevant in other domains of application of RST and more so when the context is developed enough to permit an evaluation of semantic levels. There may be differences in the semantic approach of proceeding from algebraic models to logics in sequent calculus form in comparison to the approach of directly forming the logic as a sequent calculus, or the approach of forming the logic in Kripke-like or Frame-related terminology, but one can expect one to feed the other. It should also be noted that this has nothing to do with supervaluationary perspectives [58], where the goal is to reduce vagueness by improving the language. Moreover the primary concerns in the contamination problem are not truth-values or gaps in them. The contamination problem is analogous to the problem of intuitionist philosophers to find a perfect logic free from problematic classicist assumptions. A difficult approach to the latter problem can be found in [59]. The important thing to note in [59] is the suggestion that it is better to reason within a natural deduction system to generate 'pure logic'. In case of the contamination problem, general understanding stems from model theoretic interpretations and so should be more appropriate. If a model-theoretic perspective is better, then it should be expected to provide justification for the problem. The problems happen most explicitly in attempts to model human reasoning, in conceptual modelling especially (in learning contexts), in attempts to model counting processes in the presence of vagueness and others. In applications to machine intelligence, an expression of contamination would be 'are you blaming machines without reason?' ## 5 Formalism Compatibility and Mereology In the literature various types of mereologies or theories of part-whole relationships [60,61] are known. For the axiomatic theory, I used a minimal fragment derived from set-theory compatible mereology in [62]. This fragment may also be argued to be compatible with even Lesniewskian mereology - but such arguments must be founded on scant regard of Lesniewski's nominalism and the distortions of his ideas by later authors. Such distortion is used as the base for generalization in all of 'Lesniewski ontology-based rough mereology'. This is evident for example, from section-2.1 of [63]. Even the perspective of Gregoryck [64] is accepted 'theorems of ontology are those that are true in every model for atomic Boolean algebras without a null element'. Other papers by the same author, confirm the pragmatic excesses as classical rough set theory is shown to be embedded in the rough mereological generalisation as well [65]. New problems/conflicts of a logical/philosophical nature are bound to crop up if the theory is applied to model reasoning and attempts are made to link it to Lesniewski's approach. In my opinion, it would be better to term the Polkowski-Skowron approach a 'Lesniewski-inspired' mereology rather than a 'Lesniewski-ontology-based' one. The reader can find a reasonable re-evaluation of formal aspects of the mereology of Lesniewski from a 'platonized perspective' in [66]. Importantly, it highlights difficulties in making the formalism compatible with the more common languages of modern first order or second order logic. The correct translation of expression in the language of ontology to a common language of set theory (modulo simplifying assumptions) requires many axiom schemas and the converse translation (modulo simplifying assumptions) is doubtful (see pp 184-194,[66]). I am stressing this because it also suggests that the foundational aspects of [20] should be investigated in greater detail in relation to: - · the apparent stability of the theory in related application contexts, and - · the exact role of the rough parthood relation and role of degrees of membership and t-norms in diluting logical categories. I will not go into detailed discussion of the philosophical aspects of the points made above since it would be too much of a deviation for the present paper. One of the eventual goals of the present approach is also to extend general RST to semi-set theoretical contexts [67,68] (or modifications thereof). Semiset theory has been in development since the 1960s and its original goals have been to capture vagueness and uncertainty, to be clear about what exactly is available for reasoning, to understand the infinite as 'something non-transparent', to impose a more sensible constraint on the relation between objects and properties and to require that any grouping or association is actualized (i.e. available at our disposal). It can be formalised as a conservative extension of ZFC, but irrespective of this aspect, the philosophical framework can be exploited in other directions. However, it is obviously incompatible with the Lesniewski ontology and nominalism. This is another reason for using a fragment of set-theoretically compatible mereology in the definition of a general rough Y-system. In this paper, I will continue to do the theory over ZFC-compatible settings, since most of the present paper will be relevant for all types of rough theorists. In summary, the differences with the Polkowski-Skowron style mereological approach are: - (i) The mereology is obviously distinct. The present approach is compatible with Godel-Bernays classes. - (ii) No assumptions are made about the degree of inclusion or of ' x being an ingredient of y to a degree r '. - (iii) Concepts of degree are expected to arise from properties of granules and 'natural ways' of counting collections of discernible and indiscernible objects. ## 6 Motivating Examples for RYS Motivating examples for the general concept of RYS introduced in [18] are provided in this section. These examples do not explicitly use information or decision tables though all of the information or decision table examples used in various RSTs would be naturally relevant for the general theory developed. Other general approaches like that of rough orders [69] and abstract approximation spaces [70] are not intended for directly intercepting approximations as envisaged in possible applications. They would also be restrictive and problematic from the point of view of the contamination problem. Here the focus is on demonstrating the need for many approximation operators, choice among granules and conflict resolution. ## Example-1: Consider the following statements associable with the description of an apple in a plate on a table: - (i) Object is apple-shaped; Object has maroon colour, - (ii) Object has vitreous skin; Object has shiny skin, - (iii) Object has vitreous, smooth and shiny skin, - (iv) Green apples are not sweet to taste, - (v) Object does not have coarse skin as some apples do, - (vi) Apple is of variety A; Apple is of variety X. Some of the individual statements like those about shape, colour and nature of skin may be 'atomic' in the sense that a more subtle characterization may not be available. It is also obvious that only some subsets of these statements may consistently apply to the apple on the table. This leads to the question of selecting some atomic statements over others. But this operation is determined by consistency of all the choices made. Therefore, from a RST perspective, the atomic statements may be seen as granules and then it would also seem that choice among sets of granules is natural. More generally 'consistency' may be replaced by more involved criteria that are determined by the goals. A nice way to see this would be to look at the problem of discerning the object in different contexts - discernibility of apples on trees require different kind of subsets of granules. ## Example-2: In the literature on educational research [71] it is known that even pre-school going children have access to powerful mathematical ideas in a form. A clear description of such ideas is however not known and researchers tend to approximate them through subjective considerations. For example, consider the following example from [71]: Four-year-old Jessica is standing at the bottom of a small rise in the preschool yard when she is asked by another four-year-old on the top of the rise to come up to her. - · No, you climb down here. Its much shorter for you. The authors claim that 'Jessica has adopted a developing concept of comparison of length to solve at least for her - the physical dilemma of having to walk up the rise'. But a number of other concepts like 'awareness of the effects of gravitational field', 'climbing up is hard', 'climbing up is harder than climbing down', 'climbing down is easier', 'climbing up is harder', 'others will find distances shorter', 'make others do the hard work' may or may not be supplemented by linguistic hedges like developing or developed and assigned to Jessica. The well known concept of concept maps cannot be used to visualise these considerations, because the concept under consideration is not well defined. Of these concepts some will be assuming more and some less than the actual concept used and some will be closer than others to the actual concept used. Some of the proposals may be conflicting, and that can be a problem with most approaches of RST and fuzzy variants. The question of one concept being closer than another may also be dependent on external observers. For example, how do 'climbing up is harder' and 'climbing up is harder than climbing down' compare? The point is that it makes sense to: - (i) accommodate multiple concepts of approximation, - (ii) assume that subsets of granules may be associated with each of these approximations, - (iii) assume that disputes on 'admissible approximations' can be resolved by admitting more approximations. It is these considerations and the actual reality of different RST that motivates the definition of Rough Y -systems. ## 7 Objectivity of Measures and General RST In RST , different types of rough membership and inclusion functions are defined using cardinality of associated sets. When fuzzy aspects are involved then these types of functions become more controversial as they tend to depend on the judgement of the user in quantifying linguistic hedges and other aspects. These types of functions are also dependent on the way in which the evolution of semantics is viewed. But even without regard to this evolution, the computation of rough inclusion functions invariably requires one to look at things from a higher meta level -from where all objects appear exact. In other words an estimate of a perfect granular world is also necessary for such computations and reasoning. Eventually, this leads to mix up (contamination) of information obtained from perceiving things at different levels of granularity. I find all this objectionable from the point of view of rigour and specific applications too. To be fair such a mix up seems to work fine without much problems in many applications. But that is due to the scope of the applications and the fact that oversimplifications through the use of cardinality permits a second level of 'intuitive approximation'. In applications of RST that start from information or decision tables including information about values associated with attributes (and possibly decisions) for different objects, the evolution of the theory adheres to the following dependency schemas: Type-1: Dependencies in Evolution of Components ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1121v1-figure-914ac07a-091c-4a20-b75c-08a52210abcc.jpg) Type-2: Dependencies in Evolution of Components ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1121v1-figure-0c75a90e-1b28-425c-a161-31868eb737eb.jpg) In the above two figures, 'rough semantics' can be understood to be in algebraic or in proof-theoretic sense. The intended reading is - 'components at arrow heads depend on those at the tail' and multiple directed paths suggest that 'components in alternate paths may be seen in weaker forms relatively'. These figures do not show the modified information system that invariably results due to the computation of reducts of different kinds, as the entire picture merely gets refreshed to the refined scenario. The Lesniewski-style ontology-based mereological approach of [20,26] fits into type-1 schemas. Rule discovery approaches would fall within type-2 schemas. The approach of the present paper is aimed at using measures that are more natural in the rough setting and to use fewer assumptions about their evolution at the meta level. Eventually this is likely to result in changes on methods of reduct computation in many cases. The theory is also aimed at tackling the so-called inverse problems of [31] and later papers, which is essentially 'Given a collection of definite objects and objects of relatively less definite objects with some concepts of approximations (that is result of vague and possibly biased considerations), find a description of the context from a general rough perspective'. From a semantic perspective these may reduce to abstract representation problems. The following dependency schema shows how the different parts fit in. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1121v1-figure-4e133ba8-fd6e-4093-8d24-059289541085.jpg) The link between 'Rough Semantics' and 'Rough Measures' should be read as 'possibly related'. ## 8 Numbers and their Generalization The problems with using natural numbers for counting collections of objects including indiscernibles have been mentioned in the fourth section. It was pointed out that there are situations in real life, where - (i) the discernibility required for normal counting may not be feasible, - (ii) the number assigned to one may be forgotten while counting subsequent objects, - (iii) the concept of identification by way of attributes may not be stable, - (iv) the entire process of counting may be 'lazy' in some sense, - (v) the mereology necessary for counting may be insufficient. Some specific examples of such contexts are: - 1. Direct counting of fishes in a lake is difficult and the sampling techniques used to estimate the population of fishes do not go beyond counting samples and pre-sampling procedures. For example some fishes may be caught, marked and then put back into the lake. Random samples may be drawn from the mixed population to estimate the whole population using proportion related statistics. The whole procedure however does not involve any actual counting of the population. - 2. In crowd management procedures, it is not necessary to have exact information about the actual counts of the people in crowds. - 3. In many counting procedures, the outcome of the last count (that is the total number of things) may alone be of interest. This way of counting is known to be sufficient for many apparently exact mathematical applications. - 4. Suppose large baskets containing many varieties of a fruit are mixed together and suppose an observer with less-than-sufficient skills in classifying the fruits tries to count the number of fruits of a variety. The problem of the observer can be interpreted in mereological terms. - 5. Partial algebras are very natural in a wide variety of mathematics. For example, in semigroup theory the set of idempotents can be endowed with a powerful partial algebraic structure. Many partial operations may be seen to originate from failure of standard counting procedures in specific contexts. Various generalizations of the concept of natural numbers, integers and real numbers are known in mathematics. These generalizations are known to arise from algebraic, topological or mixed considerations. For example, a vast amount of ring and semigroup theory arises from properties of the integers. These include Euclidean Rings, UFD, Integral Domains, Positively totally ordered Semigroups [72], and Totally Ordered Commutative Semigroups. Partial Well Orders and Variants thereof [73] and Difference orders can also be seen in a similar perspective. In all these cases none of the above mentioned aspects can be captured in any obvious way and neither have they been the motivation for their evolution. Their actual motivations can be traced to concrete examples of subsets of real numbers and higher order structures derived from real numbers having properties defining the structures. Further structures like these often possess properties quite atypical of integers. In counting collections of objects including relatively exact and indiscernible objects, the situation is far more complex - the first thing to be modified would be the relative orientation of the object and different meta levels as counting in any sense would be from a higher meta level. Subsequently the concept of counting (as something to be realised through injective maps into N ) can be modified in a suitable way. The eventual goal of such procedures should be the attainment of order-independent representations. Though not usually presented in the form, studies of group actions, finite and infinite permutation groups and related automorphisms and endomorphisms can throw light on lower level counting. In the mathematics of exact phenomena, these aspects would seem superfluous because cardinality is not dependent on the order of counting. But in the context of the present generalization somewhat related procedures are seen to be usable for improving representation. A more direct algebra of Meta-R counts is also developed in the penultimate section. They can be regarded as a natural generalization of the ordered integral domain associated with integers and was not considered in [56] by the present author. The former approach does have feasibility issues associated. For one thing a string of relatively discernible and indiscernible things may not be countable in all possible ways in actual practice. The latter approach takes a more holistic view and so the two approaches can be expected to complement each other. ## 9 Granules: An Axiomatic Approach Different formal definitions of granules have been used in the literature on rough sets and in granular computing. An improved version of the axiomatic theory of granules introduced in [18] is presented here. The axiomatic theory is capable of handling most contexts and is intended to permit relaxation of set-theoretic axioms at a later stage. The axioms are considered in the framework of Rough YSystems mentioned earlier. RYS maybe seen as a generalised form of rough orders [69], abstract approximation spaces [70] and approximation framework [74]. It includes relation-based RST, cover-based RST and more. These structures are provided with enough structure so that a classical semantic domain and at least one rough semantic domain of roughly equivalent objects along with admissible operations and predicates are associable. Within the domain of naive set theory or ZFC or second order ZFC, the approximation framework of [74] is not general enough because: - (i) It assumes too much of order structure. - (ii) Assumes the existence of a De Morgan negation. - (iii) It may not be compatible with the formulations aimed at inverse problems. That holds even if a flexible notion of equality is provided in the language. An application to the context of example-2 in the previous section will clearly show that there is no direct way of getting to a lattice structure or the negation from information of the type in conjunction with knowledge base about concepts represented in suitable way unless the context is very special. As opposed to a lattice order in a rough order , I use a parthood relation that is reflexive and antisymmetric. It may be non transitive. The justification for using such a relation can be traced to various situations in which restrictive criteria operating on inclusion of attributes happen. In many cases, these may be dealt with using fuzzy methodologies. Contexts using the so-called roughfuzzy-rough approximations and extensions thereof [75] can be dealt with in a purely rough way through such relations. The unary operations used in the definitions of the structures are intended as approximation operators. More than two approximation operators are common in cover-based RST [45], dynamic spaces [76], Esoteric RST [47], multiple approximation spaces [77], in dialectical rough set theory [39] and elsewhere. The requirement of equal number of upper and lower approximation operators is actually a triviality and studies with non matching number of operators can be traced to considerations on rough bottom and top equalities [78]. Concrete examples are provided after definitions. The intended concept of a rough set in a rough Y -system is as a collection of some sense definite elements of the form { a , a 1 2 , . . . a n , b 1 , b 2 , . . . b r } subject to a i s being 'part of' of some of the b j s. Both RYS+ and RYS can be seen as the generalization of the algebra formed on the power set of the approximation space in classical RST . P xy can be read as 'x is a part of y' and is intended to generalise inclusion in the classical case. The elements in S may be seen as the collection of approximable and exact objects this interpretation is compatible with S being a set. The description operator of FOPL ι is used in the sense: ι ( x Φ x ) ( ) means 'the x such that Φ x ( )'. It helps in improving expression and given this the metalogical ′ , ′ can be understood as ∧ (which is part of the language). The description operator actually extends FOPL by including more of the metalanguage and from the meaning point of view is different, though most logicians will see nothing different. For details, the reader may refer to [79]. For those understanding ' ' as being part of the metalanguage, statements of , the form a + b = ( ) ι x Φ x ( ) can be safely read as a + b = z if and only if Φ z ( ). It is of course admissible to read ' ' as being in the metalanguage with , ι being part of the language - the resulting expression would be more readable. Definition 1. A Rough Y System ( RYS+ ) will be a tuple of the form $$\langle S, W, \mathbf P, \, ( l _ { i } ) _ { 1 } ^ { n }, \, ( u _ { i } ) _ { 1 } ^ { n }, +, \, \cdot, \sim, 1 \rangle$$ satisfying all of the following ( P is intended as a binary relation on S and W ⊂ S , n being a finite positive integer. ι is the description operator of FOPL: ι ( x Φ x ) ( ) means 'the x such that Φ x ( ) '. W is actually superfluous and can be omitted): - 1. ( ∀ x ) P xx ; ( ∀ x, y )( P xy, P yx -→ x = y ) , ↦ - 2. For each i, j , l i , u j are surjective functions : S -→ W , - 3. For each i , ( ∀ x, y )( P xy -→ P ( l i x )( l i y , ) P ( u x i )( u y i )) , - 4. For each i , ( ∀ x ) P ( l i x x, ) P ( x )( u x i )) , - 5. For each i , ( ∀ x )( P ( u x i )( l i x ) -→ x = l i x = u x i ) . The operations + , · and the derived operations O , P , U , X O , will be assumed to be defined uniquely as follows: Overlap: O xy iff ( ∃ z ) P zx ∧ P zy , Underlap: U xy iff ( ∃ z ) P xz ∧ P yz , Proper Part: P xy iff P xy ∧ ¬ P yx , Overcross: X xy iff O xy ∧ ¬ P xy , Proper Overlap: O xy iff X xy ∧ X yx , Sum: x + y = ιz ( ∀ w )( O wz ↔ ( O wx ∨ O wy )) , Product: x · y = ιz ( ∀ w )( P wz ↔ ( P wx ∧ P wy )) , Difference: x - y = ιz ( ∀ w )( P wz ↔ ( P wx ∧ ¬ O wy )) , Associativity: It will be assumed that + , · are associative operations and so the corresponding operations on finite sets will be denoted by ⊕ glyph[circledot] , respectively. ## Remark: W can be dropped from the above definition and it can be required that the range of the operations u , l i j are all equal for all values of i, j . Definition 2. In the above definition, if we relax the surjectivity of l i , u i , require partiality of the operations + and · , weak associativity instead of associativity and weak commutativity instead of commutativity, then the structure will be called a General Rough Y-System ( RYS ). In formal terms, Sum1: x + y = ιz ( ∀ w )( O wz ↔ ( O wx ∨ O wy )) if defined Product1: x · y = ιz ( ∀ w )( P wz ↔ ( P wx ∧ P wy )) if defined wAssociativity x ⊕ ( y ⊕ z ) ω ∗ = ( x ⊕ y ) ⊕ z and similarly for product. ' ω ∗ = ' essentially means if either side is defined, then the other is and the two terms are equal. wCommutativity x ⊕ y ω ∗ = y ⊕ x ; x · y ω ∗ = y · x Both RYS and a RYS+ are intended to capture a minimal common fragment of different RSTs. The former is more efficient due to its generality. Note that the parthood relation P , taken as a general form of rough inclusion (in a suitable semantic domain), is not necessarily transitive. Transitivity of P is a sign of fair choice of attributes (at that level of classification), but non transitivity may result by the addition of attributes and so the property by itself says little about the quality of classification. The meaning of the equality symbol in the definition of RYS depends on the application domain. It may become necessary to add additional stronger equalities to the language or as a predicate in some situations. In this way, cases where any of conditions 1 3 4 5 , , , appear to be violated can be accommodated. All weaker equalities are expected to be definable in terms of other equalities . For example, using the variable precision RST procedures [80,81], it is possible to produce lower approximations that are not included in a given set and upper approximations of a set that may not include the set. In [47], methods for transforming the VPRS case are demonstrated. But nothing really needs to be done for accommodating the VPRS case - the axioms can be assumed. The predicate P would become complicated as a consequence, though we can have ( ∀ x, y )( x ⊆ y -→ P xy ). A stronger equality should be added to the language if required. Vague predicates may be involved in the generation of RYS and RYS+ . Suppose crowds assembling at different places are to be comparatively studied in relation to a database of information on 'relevant' people and others through audiovisual information collected by surveillance cameras. Typically automatic surveillance equipment will not be able to identify much, but information about various subsets of particular crowds and even 'specific people' can be collected through surveillance cameras. Processing information (so called off-line processing) using the whole database with classical rough methods will not work because of scalability issues and may be just irrelevant. Suppose that data about different gatherings have been collected at different times. The collection of the observed subsets of these crowds can be taken as S . The operations l i , u i can originate on the basis of the capabilities of the surveillance equipment like cameras. If one camera can see better in infra-red light, another may see better in daylight, cameras do not have uniform abilities to move and finally placement of the individual camera in question will affect its sight. Definite abstract collections of people may be also taken as approximations of subsets of the crowds based on information from the database and the set of these may form the W of RYS+ or this may be a RYS . These can be used to define predicates like 'vaguely similar' between subsets of the crowd. Because of difficulties in scalability of the computation process of identification, the collections S of possible subsets of the crowd should be considered with a non-transitive parthood relation-based on a criteria derived from inclusion of 'relevant' people and others (possibly number of people with some gross characteristics), instead of set inclusion. The latter would naturally lead to aggravation of errors and so should not be used. As of now automated surveillance is imperfect at best and so the example is very real. RYS+ can also be used to model classical rough set theory and some others close to it, but not esoteric RST [47] as approximations of 'definite objects' may not necessarily be the same 'definite objects'. RYS on the other hand can handle almost all types of RST . In the above two definitions, the parthood relation is assumed to be reflexive and antisymmetric, while the approximation operators are required to preserve parthood. Further any of the lower approximations of an object is required to be part of it and the object is required to be part of any of its upper approximations. The fifth condition is a very weak form of transitivity. The Venn diagram way of picturing things will not work with respect to the mereology, but some intuitive representations may be constructed by modification. Two objects overlap if there is a third object that is part of both the objects. Two objects underlap if both are part of a third object. In general such an object may not exist, while in ZF all sets taken in pairs will underlap. However if the considerations are restricted to a collection of sets not closed under union, then underlap will fail to hold for at least one pair of sets. Overcross is basically the idea of a third object being part of two objects, with the first being not a part of the second. In the above example a set of 'relevant people' may be part of two subsets of the crowd (at different times), but the first crowd may contain other people with blue coloured hair. So the first crowd is not part of the second. If the second crowd contains other people with their hair adorned with roses while such people are not to be located in the first crowd then the two crowds have proper overlap . From the purely mereological point of view a RYS+ is a very complicated object. The sum, product and difference operations are assumed to be defined. They do not follow in general from the conditions on P in the above. But do so with the assumptions of closed extensional mereology or in other words of the first five of the following axioms. They can also follow from the sixth (Top) and part of the other axioms. Transitivity ( P xy, P yz -→ P xz ), Supplementation ( ¬ P xy -→ ∃ z ( P zx ∧ ¬ O zy )), ``` \begin{array} { l } P 5 \ U x y \to ( \exists z ) ( \forall w ) ( \mathbf O w z \leftrightarrow ( \mathbf O w z \lor \mathbf O w y ) ), \\ P 6 \ O x y \to ( \exists z ) ( \forall w ) ( \mathbf P w z \leftrightarrow ( \mathbf P w z \land \mathbf P w y ) ), \\ P 7 \ ( \exists z ) ( \mathbf P z x \land \neg \mathbf O z y ) \to ( \exists z ) ( \forall w ) ( \mathbf P w z \leftrightarrow ( \mathbf P w x \land \neg \mathbf O w y ) ), \\ \text{Top} \ ( \exists z ) ( \forall x ) \mathbf P x z. \end{array} ``` )), In classical RST, 'supplementation' does not hold, while the weaker version ( ¬ P xy -→ ∃ z ( P zx ∧ ¬ O zy )) is trivially satisfied due to the existence of the empty object ( ∅ ). Proper selection of semantic domains is essential for avoiding possible problems of ontological innocence [82], wherein the 'sum' operation may result in non existent objects relative the domain. A similar operation results in 'plural reference' in [65,26], and related papers. The Lesniewski ontology inspired approach originating in [20] assumes the availability of measures beforehand for the definition of the parthood predicate and is not always compatible with and distinct from the present approach. ## Examples of Non-Transitivity : ## Example-1 : In the classical handle-door-house example, parthood is understood in terms of attributes and a level of being part of. The latter being understood in terms of attributes again. The example remains very suggestive in the context of applications of RST and specifically in the context of a RYS . The basic structure of the example has the form: - · Handle is part of a Door, - · Door is part of a House, - · If 'part of' is understood in the sense of 'substantial part of' (defined in terms of attributes), then the handle may not be part of the house. From the application point of view all the concepts of 'Handle', 'Door' and 'House' can be expected to be defined by sets of relatively atomic sensor (for machines) or sense data. Additionally a large set of approximation related data (based on not necessarily known heuristics) can also be expected. But if we are dealing with sensor data, then it can be reasonable to assume that the data is the result of some rough evolution. Finding one is an inverse problem. ## Example-2 : - · Let Information Set-A be the processed data from a grey scale version of a colour image. - · Let 'Information-B' be the processed data about distribution of similar colours (at some level). - · In this situation, when 'Information set A' is processed in the light of 'Information set B', then transitivity of the parthood relations about colour related attributes can be expected to be violated. This example is based on the main context of [75], but is being viewed from a pure rough perspective. glyph[square] ## Example-3 : In processing information from videos in off-line or real time mode, it can be sensible to vary the partitions on the colour space (used in analytics) across key frames. glyph[square] Definition 3. In the above, two approximation operators u i and l i will be said to be S5-dual to each other if and only if $$\left ( \forall A \subset S \right ) A ^ { u _ { i } l _ { i } } = A ^ { u _ { i } } \, ; \, A ^ { l _ { i } u _ { i } } = A ^ { l _ { i } }.$$ Throughout this paper it will not be assumed that the operators u i are S5dual or dual to the operators l i in the classical sense in general. It is violated in the study of the lower, upper and bitten upper approximation operators in a tolerance space [39] as RYS . There it will also be required to take the identity operator or repeat the lower approximation operator as a lower approximation operator (as the number of lower and upper approximation are required to match - a trivial requirement). In almost all applications, the collection of all granules G forms a subset of the RYS S . But a more general setting can be of some interest especially in a semi-set theoretical setting. This aspect will be considered separately. Definition 4. When elements of G are all elements of S , it makes sense to identify these elements with the help of a unary predicate γ defined via, γx if and only if x ∈ G . A RYS or a RYS+ enhanced with such a unary predicate will be referred to as a Inner RYS (or γ RYS for short) or a Inner RYS+ ( γ RYS+ for short) respectively. γ RYS will be written as ordered pairs of the form ( S, γ ) to make the connection with γ clearer. ( S, γ ) should be treated as an abbreviation for the algebraic system (partial or total) $$\langle S, \mathbf P, \, \gamma, \, ( l _ { i } ) _ { 1 } ^ { n }, \, ( u _ { i } ) _ { 1 } ^ { n }, \, +, \, \cdot, \, \sim, \, 1 \rangle \,.$$ Some important classes of properties possibly satisfiable by granules fall under the broad categories of representability , crispness , stability , mereological atomicity and underlap . If the actual representations are taken into account then the most involved axioms will fall under the category of representability. Otherwise the possible defining properties of a set of granules in a RYS include the following ( t , i s i are term functions formed with + , · , ∼ , while p, r are finite positive integers. ∀ i , ∃ i are meta level abbreviations.) Not all of these properties have been considered in [18]: Representability, RA ∀ i , ( ∀ x )( ∃ y , . . . y 1 r ∈ G ) y 1 + y 2 + . . . + y r = x l i and ( ∀ x )( ∃ y , . . . 1 y p ∈ G ) y 1 + y 2 + . . . + y p = x u i , Weak RA, WRA ∀ i , ( ∀ x y , . . . y ∃ 1 r ∈ G ) t i ( y , y 1 2 , . . . y r ) = x l i and ( ∀ x )( ∃ y , . . . 1 y r ∈ G ) t i ( y , y 1 2 , . . . y p ) = x u i , Sub RA ∃ i , ( ∀ x )( ∃ y , . . . y 1 r ∈ G ) y 1 + y 2 + . . . + y r = x l i and ( ∀ x )( ∃ y , . . . 1 y p ∈ G ) y 1 + y 2 + . . . + y p = x u i , Sub TRA, STRA ∀ i , ( ∀ x y , . . . y ∃ 1 r ∈ G ) t i ( y , y 1 2 , . . . y r ) = x l i and ( ∀ x )( ∃ y , . . . 1 y r ∈ G ) t i ( y , y 1 2 , . . . y p ) = x u i , Lower RA, LRA ∀ i , ( ∀ x )( ∃ y , . . . y 1 r ∈ G ) y 1 + y 2 + . . . + y r = x l i , Upper RA, URA ∀ i , ( ∀ x )( ∃ y , . . . 1 y p ∈ G ) y 1 + y 2 + . . . + y p = x u i , Lower SRA, LSRA ∃ i , ( ∀ x )( ∃ y , . . . y 1 r ∈ G ) y 1 + y 2 + . . . + y r = x l i , Upper SRA, USRA ∃ i , ( ∀ x )( ∃ y , . . . 1 y p ∈ G ) y 1 + y 2 + . . . + y p = x u i , Absolute Crispness, ACG For each i , ( ∀ y ∈ G ) y l i = y u i = y , l u Sub Crispness, SCG ∃ i , ( ∀ y ∈ G ) y i = y i = y (In [18], this was termed 'weak crispness'), Crispness Variants LACG, UACG, LSCG, USCG will be defined as for representability, Mereological Atomicity,MER ∀ i , ( ∀ y ∈ G )( ∀ x ∈ S )( P xy, x l i = x u i = x -→ x = y ), Sub MER,SMER ∃ i , ( ∀ y ∈ G )( ∀ x ∈ S )( P xy, x l i = x u i = x -→ x = y ) (In [18], this was termed 'weak MER'), ## Inward MER, IMER $$( \forall y \in \mathcal { G } ) ( \forall x \in S ) ( \mathbf P x y, \bigwedge _ { i } ( x ^ { l _ { i } } = x ^ { u _ { i } } = x ) \longrightarrow x = y ),$$ Lower MER, LMER ∀ i , ( ∀ y ∈ G )( ∀ x ∈ S )( P xy, x l i = x -→ x = y ), Inward LMER, ILMER ( ∀ y ∈ G )( ∀ x ∈ S )( P xy, ∧ i ( x l i = x ) -→ x = y ), MER Variants UMER, LSMER, USMER, IUMER will be defined as for representability, Lower Stability, LS ∀ i , ( ∀ y ∈ G )( ∀ x ∈ S ) ( P yx -→ P ( y )( x l i )), Upper Stability, US ∀ i , ( ∀ y ∈ G )( ∀ x ∈ S ) ( O yx -→ P ( y )( x u i )), Stability, ST Shall be the same as the satisfaction of LS and US, Sub LS, LSS ∃ i , ( ∀ y ∈ G )( ∀ x ∈ S ) ( P yx -→ P ( y )( x l i )) (In [18], this was termed 'LS'), Sub US, USS ∃ i , ( ∀ y ∈ G )( ∀ x ∈ S ) ( O yx -→ P ( y )( x u i )) (In [18], this was termed 'US'), Sub ST, SST Shall be the same as the satisfaction of LSS and USS, No Overlap, NO ( ∀ x, y ∈ G ¬ ) O xy , Full Underlap, FU ∀ i , ( ∀ x, y ∈ G )( ∃ z ∈ S ) P xz, P yz, z l i = z u i = z , Lower FU, LFU ∀ i , ( ∀ x, y ∈ G )( ∃ z ∈ S ) P xz, P yz, z l i = z , Sub FU, SFU ∃ i , ( ∀ x, y ∈ G )( ∃ z ∈ S ) P xz, P yz, z l i = z u i = z , Sub LFU, LSFU ∃ i , ( ∀ x, y ∈ G )( ∃ z ∈ S ) P xz, P yz, z l i = z , Unique Underlap, UU For at least one i , ( ∀ x, y ∈ G )( P xz, P yz, z l i = z u i = z, P xb, P yb, b l i = b u i = b -→ z = ), b Pre-similarity, PS ( ∀ x, y ∈ G )( ∃ z ∈ G ) P ( x · y )( z ), Lower Idempotence, LI ∀ i , ( ∀ x ∈ G ) x l i = x l i l i , Upper Idempotence, UI ∀ i , ( ∀ x ∈ G ) x u i = x u u i i , Idempotence, I ∀ i , ( ∀ x ∈ G ) x u i = x u u i i , x l i = x l i l i . All of the above axioms can be written without any quantification over G in an inner RYS or an inner RYS+ . The letter 'I' for 'Inner' will be appended to the axiom abbreviation in this situation. For example, I will rewrite LS as LSI : $$\text{LSI} \, \colon \, \exists \text{i,} ( \forall x, y \in S ) \, ( \gamma x, \text{P} y x \longrightarrow \text{P} ( y ) ( x ^ { l _ { i } } ) ).$$ Further, statements of the form ( S, γ ) | = RAI → ( S, γ ) | = WRAI (= being the | model satisfaction relation in FOPL) will be abbreviated by ' RAI glyph[dblarrowheadright] WRAI '. ## Proposition 1. The following holds: - 1. RAI glyph[dblarrowheadright] WRAI , - 2. ACGI glyph[dblarrowheadright] SCGI , - 3. MERI glyph[dblarrowheadright] SMERI , - 4. MERI glyph[dblarrowheadright] IMERI , - 5. FUI glyph[dblarrowheadright] LUI . The axioms RA, WRA are actually very inadequate for capturing representability in the present author's opinion. Ideally the predicate relating the set in question to the granules should be representable in a nice way. A hierarchy of axioms have been developed for a good classification by the present author and will appear separately in a more complete study. But I will not digress to this issue in the present paper. In any RST , at least some of these axioms can be expected to hold for a given choice of granules. In the following sections various theorems are proved on the state of affairs. ## 9.1 Concepts Of Discernibility In 1-neighbourhood systems, cover-based RST , relation-based RST and more generally in a RYS various types of indiscernibility relations can be defined. In most cases, indiscernibility relations that are definable by way of conditions using term functions involving approximation operators are of interest. Some examples of such conditions, in a RYS of the form specified in the third section, are: - (i) x ≈ i y if and only if x l i = y l i and x u i = y u i for a specific i , - (ii) x ≈ a y if and only if x l i = y l i and x u i = y u i for any i , - (iii) x ≈ b y if and only if x l i = y l i and x u i = y u i for all i , - (iv) a ≈ c y if and only if ( ∀ g ∈ G )( P gx α ↔ P gy α ) with α ∈ { l i , u i } for a specific i , - (v) a ≈ e y if and only if ( ∀ g ∈ G )( P gx α ↔ P gy α ) with α ∈ { l i , u i } for a specific i , - (vi) a ≈ f y if and only if ( ∀ g ∈ G )( P gx α ↔ P gy α ) with α ∈ { l i , u i } for any i , - (vii) a ≈ h y if and only if ( ∀ g ∈ G )( P gx α ↔ P gy α ) with α ∈ { l i , u i } for all specific i . Note that the subscript of ≈ has been chosen arbitrarily and is used to distinguish between the different generalised equalities. Weaker varieties of such indiscernibility relations can also be of interest. ## 9.2 Relative- and Multi-Granulation Concepts of relativised granulation have been studied in a few recent papers [83,84], under the name 'Multi-Granulation'. These are actually granulations in one application context considered relative the granulation of another application context. For example if two equivalences are used to generate approximations using their usual respective granulations, then 'multi-granulations' have been used according to authors. The relative part is not mentioned explicitly but that is the intended meaning. In our perspective all these are seen as granulations. Multiple approximation spaces, for example use 'multi-granulations'. The relation between the two contexts has not been transparently formulated in the mentioned papers, but it can be seen that there is a way of transforming the present application context into multiple instances of the other context in at least one perspective. In general it does not happen that approximations in one perspective are representable in terms of the approximation in another perspective (see [85]) and is certainly not a requirement in the definition of multi-granulation. Such results would be relevant for the representation problem of granules mentioned earlier. ## 10 Relation-Based Rough Set Theory Theorem 2. In classical RST , if G is the set of partitions, then all of RA, ACG, MER, AS, FU, NO, PS hold. UU does not hold in general Proof. The granules are equivalence classes and RA, NO, ACG, PS follow from the definitions of the approximations and properties of G . MER holds because both approximations are unions of classes and no crisp element can be properly included in a single class. If a class overlaps with another subset of the universe, then the upper approximation of the subset will certainly contain the class by the definition of the latter. In esoteric RST [47], partial equivalence relations (symmetric, transitive and partially reflexive relations) are used to generate approximations instead of equivalence relations. In the simplest case, the upper and lower approximations of a subset A of a partial approximation space 〈 S, R 〉 are defined via ([ x ] = { y ; ( x, y ) ∈ R } being the pseudo-class generated by x ) glyph[negationslash] $$A ^ { l } = \bigcup \{ [ x ] ; \, [ x ] \subseteq A \} ; \, A ^ { u } = \bigcup \{ [ x ] ; \, [ x ] \cap A \neq \emptyset \}.$$ Theorem 3. In case of esoteric RST [47], with the collection of all pseudoclasses being the granules, all of RA, MER, NO, UU, US hold, but ACG may not. Proof. RA, NO follow from the definition. It is possible that [ x ] ⊂ [ x ] u , so ACG may not hold. US holds as if a granule overlaps another subset, then the upper approximation of the set would surely include the granule. If we consider a reflexive relation R on a set S and define, [ x ] = { y : ( x, y ) ∈ R } -the set of x-relateds and define the lower and upper approximation of a subset A ⊆ S via $$A ^ { l } \, = \, \cup \{ [ x ] \, \colon \, [ x ] \subseteq A, \, x \in A \} \text{ and }$$ glyph[negationslash] $$A ^ { u } \, = \, \cup \{ [ x ] \, \colon \, [ x ] \cap A \, \neq \, \emptyset \, x \in A \},$$ ( A l ⊆ A ⊆ A u for a binary relation R is equivalent to its reflexivity [43,86]) then we can obtain the following about granulations of the form { [ x ] : x ∈ S } : Theorem 4. RA, LFU holds, but none of MER, ACG, LI, UI, NO, FU holds in general. Proof. RA holds by definition, LFU holds as the lower approximation of the union of two granules is the same as the union. It is easy to define an artificial counter example to support the rest of the statement. Let 〈 S, ( R i ) i ∈ K 〉 be a multiple approximation space [77], then the strong lower, weak lower, strong upper and weak upper approximations of a set X ⊆ S shall be defined as follows (modified terminology): - 1. X ls = ⋂ i X li , - 2. X us = ⋃ i X ui , - 3. X lw = ⋃ i X li , - 4. X uw = ⋂ i X ui . Theorem 5. In a multiple approximation of the above form, taking the set of granules to be the collection of all equivalence classes of the R i s, LSRA, USRA, LSS, USS holds, but all variants of rest do not hold always. Proof. X lw , X us are obviously unions of equivalence classes. The LSS, USS part for these two approximations respectively can also be checked directly. Counterexamples can be found in [77]. But it is possible to check these by building on actual possibilities. If there are only two distinct equivalences, then at least two classes of the first must differ from two classes of the second. The ls approximation of these classes will strictly be a subset of the corresponding classes, so CG will certainly fail for the ( ls, us ) pair. Continuing the argument, it will follow that SCG, ACG cannot hold in general. The argument can be extended to other situations. Since multiple approximations spaces are essentially equivalent to special types of tolerance spaces equipped with the largest equivalence contained in the tolerance, the above could as well have been included in the following subsection. ## 10.1 Tolerance Spaces In TAS of the form 〈 S, T 〉 , all of the following types of granules with corresponding approximations have been used in the literature: - 1. The collection of all subsets of the form [ x ] = { y : ( x, y ) ∈ T } will be denoted by T . - 2. The collection of all blocks, the maximal subsets of S contained in T , will be denoted by B . Blocks have been used as granules in [35,31,87,24] and others. - 3. The collection of all finite intersections of blocks will be denoted by A . - 4. The collection of all intersections of blocks will be denoted by A σ [24]. - 5. Arbitrary collections of granules with choice functions operating on them [18]. - 6. The collection of all sets formed by intersection of sets in T will be denoted by T I . For convenience H 0 = ∅ , H n +1 = S will be assumed whenever the collection of granules G is finite and G = { H , . . . H 1 n } . In a TAS 〈 S, T 〉 , for a given collection of granules G definable approximations of a set A ⊆ S include: - (i) A l G = ⋃ { H : H ⊆ A, H ∈ G} , glyph[negationslash] - (ii) A u G = ⋃ { H : H ∩ A = ∅ , H ∈ G} , - (iii) A l 2 G = ⋃ {∩ i ∈ I H c i : ∩ i ∈ I H c i ⊆ A, H ∈ G I ⊆ N ( n +1) , } - (v) A u 2 G = ⋂ { H i c : A ⊆ H , I c i ∈ { 0 1 , , . . . , n }} . - (iv) A u 1 G = ⋂ {∪ i ∈ I H i : A ⊆ ∪ i ∈ I H , I i ⊆ N ( n +1) , } But not all approximations fit it into these schemas in an obvious way. These include: - (i) A l + = { y : ∃ x x, y ( ) ∈ T, [ x ] ⊆ A } [35], glyph[negationslash] - (ii) A u + = { x ; ( ∀ y ) (( x, y ) ∈ T -→ [ y ] T ∩ A = ∅ } ) , - (iii) Generalised bitten upper approximation : A ubg = A ug \ A clg - this is a direct generalisation of the bitten approximation in [39,38]. Theorem 6. In the TAS context, with T being the set of granules and restricting to the approximations l T , u T , all of RA, MER, ST and weakenings thereof hold, but others do not hold in general. glyph[negationslash] glyph[negationslash] Proof. RA follows from definition. For MER , if A ⊆ [ x ] and A l T = A u T = A , then as [ x ] ∩ A = ∅ , so [ x ] ⊆ A u T = A . So A = [ x ]. Crispness fails because it is possible that [ x ] ∩ [ y ] = ∅ for distinct x, y . Theorem 7. If 〈 S, T 〉 is a tolerance approximation space with granules T and the approximations l T , l + , u T , u + , then RA, NO, ACG do not hold, but SRA, SMER, SST, IMER, MER, US holds Proof. RA does not hold due to l + , u +, ACG fails by the previous theorem. 'Sub' properties have been verified in the previous theorem, while the rest can be checked directly. Theorem 8. In Bitten RST [39,38], (taking G to be the set of T-relateds and restricting ourselves to the lower, upper and bitten upper approximations alone), SRA does not hold for the bitten upper approximation if ' + , · ' are interpreted as set union and intersection respectively. MER, NO do not hold in general, but IMER, SCG, LS, LU, SRA hold. Proof. The proof can be found in [39]. If unions and intersections alone are used to construct terms operations, then the bited upper approximation of a set of the form [ x ] T ( x being an element of the tolerance approximation space) may not be representable as it is the difference of the upper approximation and the lower approximation of the complement of [ x ] T . But if ∼ , for set complements is also permitted, then there are no problems with the representability in the WRA sense. In [24], a semantics of tolerance approximation spaces for the following theorem context are considered, but the properties of granules are not mentioned. Theorem 9. Taking G to be A σ and restricting ourselves to lower and bitten upper approximations alone RA, ACG, NO do not hold while LRA, MER, LACG, LMER, UMER, ST do hold. Proof. If H is a granule, then it is an intersection of blocks. It can be deduced that the lower approximation of H coincides with itself, while the bitten upper approximation is the union of all blocks including H . LRA is obvious, but URA need not hold due to the bitten operation. If a definite set is included in a granule, then it has to be a block that intersects no other block and so the granule should coincide with it. So MER holds. ## 11 Cover-Based Rough Set Theory The notation for approximations in cover-based RST , is not particularly minimalistic. This is rectified for easy comprehension below. I follow superscript notation strictly. ' l, u ' stand for lower and upper approximations and anything else following those signify a type. If X ⊆ S , then let glyph[negationslash] glyph[negationslash] glyph[negationslash] (i) X u 1+ = X l 1 ∪ ⋃ { Md( ) : x x ∈ X } , (ii) X u 2+ = ⋃ { K : K ∈ S , K ∩ X = ∅} , (iii) X u 3+ = ⋃ { Md( ) : x x ∈ X } , (iv) X u 4+ = X l 1 ∪ { K : K ∩ ( X \ X l 1 ) = ∅} , (v) X u 5+ = X l 1 ∪ ⋃ { nbd x ( ) : x ∈ X \ X l 1 } , (vi) X u 6+ = { x : nbd x ( ) ∩ X = ∅} , (vii) X l 6+ = { x : nbd x ( ) ⊆ X } . The approximation operators u 1+ , . . . , u 5+ (corresponding to first, ..., fifth approximation operators used in [45] and references therein) are considered with the lower approximation operator l 1 in general. Some references for cover-based RST include [42,40,46,88,43,45,89,37,48]. The relation between cover-based RST and relation-based RST are considered in [48,45]. For a cover to correspond to a tolerance, it is necessary and sufficient that the cover be normal - a more general version of this result can be found in [90]. When such reductions are possible, then good semantics in Meta-R perspective are possible. The main results of [48] provide a more complicated correspondence between covers and sets equipped with multiple relations or a relation with additional operations. The full scope of the results are still under investigation. So, in general, cover-based RST is more general than relation-based RST . From the point of view of expression, equivalent statements formulated in the former would be simpler than in the latter. It can be shown that: ## Proposition 2. In the above context, - · Md( ) x is invariant under removal of reducible elements, - · ( nbd x ( )) l 6+ = nbd x ( ) , - · nbd x ( ) ⊆ ( nbd x ( )) 6+ . The following pairs of approximation operators have also been considered in the literature (the notation of [46] has been streamlined; lp 1 , lm 1 corresponds to P , C 1 1 respectively and so on). - (i) X lp 1 = { x : Fr x ( ) ⊆ X } , glyph[negationslash] - (ii) X up 1 = ⋃ { K : K ∈ K , K ∩ X = ∅} , - (iii) X lp 2 = ⋃ { Fr x ( ); Fr x ( ) ⊆ X } , glyph[negationslash] - (iv) X up 2 = { z : ( ∀ y )( z ∈ Fr y ( ) → Fr y ( ) ∩ X = ) , ∅ } - (v) X lp 3 = X l 1 , glyph[negationslash] - (vi) X up 3 = { y : ∀ K ∈ K ( y ∈ K → K ∩ X = ) , ∅ } - (vii) X lp 4 , X up 4 are the same as the classical approximations with respect to π ( K ) - the partition generated by the cover K . - (viii) X lm 1 = X l 1 = X lp 3 , - (ix) X um 1 = X u 2 , - (x) X lm 2 = X l 6+ , - (xi) X um 2 = X u 6+ , - (xii) X lm 3 = { x ; ( ∃ u u ) ∈ nbd x , nbd u ( ) ( ) ⊆ X } , glyph[negationslash] - (xiii) X um 3 = { x ; ( ∀ u )( u ∈ nbd x ( ) → nbd u ( ) ∩ X = ) , ∅ } - (xiv) X lm 4 = { x ; ( ∀ x )( x ∈ nbd u ( ) → nbd u ( ) ⊆ X ) } , - (xv) X um 4 = X u 6+ = X um 2 , - (xvi) X lm 5 = { x ; ( ∀ u )( x ∈ nbd u ( ) → u ∈ X ) } , - (xvii) X um 5 = ⋃ { nbd x ( ); x ∈ X } . ## Example-1 : $$\text{Let } S \, = \, \{ a, b, c, e, f, g, h, i, j \},$$ $$\mathcal { K } \, = \, \{ K _ { 1 }, \, K _ { 2 }, \, K _ { 3 }, \, K _ { 4 }, \, K _ { 5 }, \, K _ { 6 }, K _ { 7 }, \, K _ { 8 }, \, K _ { 9 } \},$$ $$&, i, j \}, \\ & K _ { 2 }, \, K _ { 3 }, \, K _ { 4 }, \, K _ { 5 }, \, K _ { 6 }, K _ { 7 }, \, K _ { 8 }, \, K _ { 9 } \},$$ $$K _ { 1 } = \{ a, b \}, \, K _ { 2 } = \{ a, \, c, \, e \}, \, K _ { 3 } = \{ b, \, f \}, \, K _ { 4 } = \{ j \}, \, K _ { 5 } = \{ f, \, g, \, h \}, \\ K _ { 6 } = \{ i \}, \, K _ { 7 } = \{ f, \, g, \, j, \, a \}, \, K _ { 8 } = \{ f, \, g \}, \, K _ { 9 } = \{ a, \, j \}.$$ The following table lists some of the other popular granules: | Element: x | Fr ( x ) | Md ( x ) | nbd ( x ) | |--------------|-------------------|---------------------|-------------| | a | S \ { h, i } | { K 1 , K 2 , K 3 } | { a } | | b | { a, b, f } | { K 3 } | { b } | | c | { a, c, e } | { K 2 } | { a, c, e } | | e | { a, c, e } | { K 2 } | { a, c, e } | | f | S \ { c, e, i } | { K 3 , K 8 } | { f } | | g | { a, f, g, h, j } | { K 8 } | { f, g } | | h | { f, g, h } | { K 5 } | { f, g, h } | | i | { i } | { K 6 } | { i } | | j | { a, f, g, j } | { K 4 } | { j } | The best approach to granulation in these types of approximations is to associate an initial set of granules and then refine them subsequently. Usually a refinement can be expected to be generable from the initial set through relatively simple set theoretic operations. In more abstract situations, the main problem would be of representation and the results in these situations would be the basis of possible abstract representation theorems. The theorems proved below throw light on the fine structure of granularity in the cover-based situations: Theorem 10. In AUAI RST [37,47], with the collection of granules being K and the approximation operators being ( l 1 , l 2 , u 1 and u 2 ), WRA, LS, SCG, LU, IMER holds, but ACG, RA, SRA, MER do not hold in general. Proof. WRA holds if the complement, union and intersection operations are used in the construction of terms in the WRA condition. ACG does not hold as the elements of K need not be crisp with respect to l 2. Crispness holds with respect to l 1 , u 1, so SCG holds. MER need not hold as it is violated when a granule is properly included in another. IMER holds as the pathology negates the premise. It can also be checked by a direct argument. From the definition of the approximations in AUAI and context, it should be clear that all pairings of lower and upper approximations are sensible generalisations of the classical context. In the following two of the four are considered. These pairs do not behave well with respect to duality, but are more similar with respect to representation in terms of granularity. Theorem 11. In AUAI RST , with the collection of granules being K and the approximation operators being ( l 1 , u 1 ) , WRA, ACG, ST, LU holds, but MER, NO, FU, RA do not hold in general. Theorem 12. In AUAI RST , with the collection of granules being K and the two approximation operators being ( l 2 , u 2 ) , WRA, ST holds, but ACG, MER, RA, NO do not hold in general. Proof. If K ∈ K , K ⊆ X X ( being any subset of S ) and y ∈ K l 2 , then y must be in at least one intersection of the sets of the form S \ K i (for i ∈ I 0 , say) and so it should be in each of these S \ K i ⊆ K ⊆ X . This will ensure y ∈ X l 2 . So lower stability holds. Upper stability can be checked in a similar way. Theorem 13. When the approximations are ( lp 1 , up 1) and with the collection of granules being { Fr x ( ) } , all of MER, URA, UMER hold, but ACG, NO, LS do not hold necessarily Proof. For an arbitrary subset X X , ⊆ Fr x ( ) for some x ∈ S and X lp 1 = X up 1 = X would mean that Fr x ( ) = X as Fr x ( ) ⊆ X up 1 would be essential. So UMER and the weaker condition MER holds. URA is obvious from the definitions. Theorem 14. When the approximations are ( lp 2 , up 2) and with the collection of granules being { Fr x ( ) } , all of MER, LMER, RA, LCG hold, but ACG, NO, LS do not hold necessarily Proof. From the definition, it is clear that RA, LCG hold. If for an arbitrary subset X X , ⊆ Fr x ( ) for some x ∈ S and X lp 2 = X = X up 2 , then X is a union of some granules of the form Fr y ( ). If x ∈ X , then it is obvious that X = Fr x ( ). If x ∈ Fr x ( ) \ X and F x ( ) is an element of the underlying cover S , then again it would follow that X = Fr x ( ). Finally if x ∈ Fr x ( ) \ X and Fr x ( ) is a union of elements of the cover intersecting X , then we would have a contradiction. So MER follows. If for an arbitrary subset X X , ⊆ Fr x ( ) for some x ∈ S and X lp 2 = X and x ∈ Fr x ( ) \ X , then we will have a contradiction. So LMER holds. Theorem 15. When the approximations are ( lp 3 , up 3) and with the collection of granules being K , all of MER, RA, ST, LCG, LU hold, but ACG, NO do not hold necessarily. Proof. Both the lower and upper approximations of any subset of S is eventually a union of elements K , so RA holds. Other properties follow from the definitions. Counter examples are easy. Theorem 16. When the approximations are ( lp 4 , up 4) and with the collection of granules being π ( K ) , all of RA, ACG, MER, AS, FU, NO, PS hold. Proof. With the given choice of granules, this is like the classical case. Theorem 17. When the approximations are ( lp 4 , up 4) and with the collection of granules being K , all of WRA, ACG, AS hold, while the rest may not. Proof. WRA holds because elements of π ( K ) can be represented set theoretically in terms of elements of K . Lower and upper approximations of elements of K are simply unions of partitions of the elements induced by π ( K ). Theorem 18. When the approximations are ( lm , um 1 1) and with the collection of granules being K , all of WRA, LS, LCG hold, but RA, ST, LMER do not hold necessarily. For WRA , complementation is necessary. Proof. If K has an element properly included in another, then LMER will fail. If complementation is also permitted, then WRA will hold. Obviously RA does not hold. Note the contrast with the pair ( lp 3 , up 3) with the same granulation. Theorem 19. When the approximations are ( lm , um 2 2) and with the collection of granules being N , all of LCG, LRA, ST, MER holds, but RA, ACG, LMER, NO do not hold necessarily. Proof. If y ∈ nbd x ( ) for any two x, y ∈ S , then nbd y ( ) ⊆ nbd x ( ) and it is possible that x / nbd y ∈ ( ), but it is necessary that x ∈ nbd x ( ). So ( nbd x ( )) lm 2 = nbd x ( ), but ( nbd x ( )) um 2 need not equal nbd x ( ). LRA will hold as the lower approximation will be a union of neighbourhoods, but this need happen in case of the upper approximation. NO is obviously false. The upper approximation of a neighbourhood can be a larger neighbourhood of a different point. So ACG will not hold in general. MER can be easily checked. Theorem 20. When the approximations are ( 6+ l , u 6+) and with the collection of granules being N , all of LCG, LRA, ST, MER holds, but RA, ACG, LMER, NO do not hold necessarily. Proof. Same as above. Theorem 21. When the approximations are ( 1 l , u 1+) and with the collection of granules being K , all of ACG, RA, FU, LS holds, but MER, LMER, NO do not hold necessarily. glyph[negationslash] Proof. RA holds as all approximations are unions of granules. For any granule K K , l 1 = K and so K u 1+ = K l = K . So ACG holds. If for two granules A,B , A ⊂ B , then A l 1 = A u 1+ = A , but A = B . So MER LMER , cannot hold in general. Theorem 22. When the approximations are ( 1 l , u 2+) and with the collection of granules being K , all of ACG, RA, FU, ST holds, but MER, LMER, NO do not hold necessarily. glyph[negationslash] Proof. RA holds as all approximations are unions of granules. For any granule K K , l 1 = K and so K u 1+ = K l = K . So ACG holds. If for two granules A,B , A ⊂ B , then A l 1 = A u 1+ = A , but A = B . So MER, LMER cannot hold in general. If a granule K is included in a subset X of S , then it will be included in the latter's lower approximation. If K intersects another subset, then the upper approximation of the set will include K . So ST holds. Theorem 23. When the approximations are ( 1 l , u 3+) and with the collection of granules being K , all of ACG, RA, FU, LS holds, but MER, LMER, NO do not hold necessarily. glyph[negationslash] Proof. RA holds as all approximations are unions of granules. For any granule K K , l 1 = K and so K u 1+ = K l = K . So ACG holds. If for two granules A,B , A ⊂ B , then A l 1 = A u 3+ = A , but A = B . So MER, LMER cannot hold in general. The union of any two granules is a definite element, so FU holds. Theorem 24. When the approximations are ( 1 l , u 4+) and with the collection of granules being K , all of ACG, RA, FU, LS holds, but MER, LMER, NO do not hold necessarily glyph[negationslash] Proof. RA holds as all approximations are unions of granules. For any granule K K , l 1 = K and so K u 1+ = K l = K . So ACG holds. If for two granules A,B , A ⊂ B , then A l 1 = A u 3+ = A , but A = B . So MER, LMER cannot hold in general. The union of any two granules is a definite element, so FU holds. Theorem 25. When the approximations are ( 1 l , u 5+) and with the collection of granules being K , all of ACG, RA, FU, LS holds, but MER, LMER, NO do not hold necessarily. glyph[negationslash] Proof. RA holds as all approximations are unions of granules. For any granule K K , l 1 = K and so K u 1+ = K l = K . So ACG holds. If for two granules A,B , A ⊂ B , then A l 1 = A u 3+ = A , but A = B . So MER, LMER cannot hold in general. The union of any two granules is a definite element, so FU holds. Apparently the three axioms WRA, LS, LU hold in most of the known theories and with most choices of granules. This was the main motivation for the following definition of admissibility of a set to be regarded as a set of granules. Definition 5. A subset G of S in a RYS will be said to be an admissible set of granules provided the properties WRA LS , and LU are satisfied by it. In cover-based RST s, different approximations are defined with the help of a determinate collection of subsets. These subsets satisfy the properties WRA LS , and FU and are therefore admissible granules. But they do not in general have many of the nicer properties of granules in relation to the approximations. However, at a later stage it may be possible to refine these and construct a better set of granules (see [48], for example) for the same approximations. Similar process of refinement can be used in other types of RSTs as well. For these reasons, the former will be referred to as initial granules and the latter as relatively refined granules . It may happen that more closely related approximations may as well be formed by such process. ## 11.1 Classification of Rough Set Theory From the point of view of logic or rough reasoning associated, RST can be classified according to: - 1. General context and definition of approximations. - 2. Modal logic perspective from Meta-C (see [52]). - 3. Frechet Space perspective from Meta-C [88]. - 4. Global properties of approximations viewed as operators at Meta-C (see for example [43]). - 5. Rough equality based semantic perspective at Meta-R (see for example [47]). - 6. Granularity Based Perspective (this paper). - 7. Algebraic perspectives at Meta-C. - 8. Algebraic perspectives at Meta-R. - 9. Others. In general the meta-C classification is not coherent with meta-R features. The problems are most severe in handling quotients induced by rough equalities. In the algebraic perspective, the operations at meta-C level are not usually preserved by quotients. For algebraic approaches at Meta-C, the classification goes exactly as far as duality (for formulation of logic ) permits. Modal approaches can mostly be accommodated within the algebraic. But the gross classification into relationbased, cover-based and more abstract forms of RST remains coherent with desired duality. Of course, the easier cases that fit into the scheme of [88] can be explored in more ways from the Meta-C perspective. The common algebraic approaches to modal logics further justifies such a classification as: - · The representation problem of algebraic semantics corresponds most naturally to the corresponding problems in duality theory of partially or latticeordered algebras or partial algebras. Some of the basic duality results for relation-based RST are considered in [91]. [92] is a brief survey of applications of topology free duality. For studies proceeding from a sequent calculus or modal axiomatic system point of view, the classification also corresponds to the difficulty of the algebraization problem in any of the senses [3,52,93,94]. - · The duality mentioned in the first point often needs additional topology in explicit terms. The actual connection of the operator approach in RST with point set topology is : Start from a collection with topological or pretopological operators on it, form possibly incompatible quotients and study a collection of some of these types of objects with respect to a new topology (or generalisations thereof) on it. This again supports the importance of the classification or the mathematical uniqueness of the structures being studied. The present axiomatic approach to granules does provide a level of classification at Meta-C. But the way in which approximations are generated by granules across the different cases is not uniform and so comparisons will lack the depth to classify Meta-R dynamics, though the situation is definitely better than in the other mentioned approaches. One way out can be through the representation problem. It is precisely for this reason that the classification based on the present axiomatic approach is not stressed. For those who do not see the point of the contamination problem, the axiomatic theory developed provides a supportive classification for general RST . ## 12 Dialectical Counting, Measures To count a collection of objects in the usual sense it is necessary that they be distinct and well defined. So a collection of well defined distinct objects and indiscernible objects can be counted in the usual sense from a higher meta level of perception. Relative this meta level, the collection must appear as a set. In the counting procedures developed, the use of this meta level is minimal and certainly far lesser than in other approaches. It is dialectical as two different interpretations are used simultaneously to complete the process. These two interpretations cannot be merged as they have contradictory information about relative discernibility. Though the classical interpretation is at a relatively higher meta level, it is still being used in the counting process and the formulated counting is not completely independent of the classical interpretation. A strictly formal approach to these aspects will be part of a forthcoming paper. Counting of a set of objects of an approximation space and that of its power set are very different as they have very different kinds of indiscernibility inherent in them. The latter possess a complete evolution for all of the indiscernibility present in it while the former does not. Counting of elements of a RYS is essentially a generalisation of the latter. In general any lower level structure like an approximation space corresponding to a 1-neighbourhood system [43] or a cover need not exist in any unique sense. The axiomatic theory of granules developed in the previous sections provides a formal exactification of these aspects. Let S be a RYS , with R being a derived binary relation (interpreted as a weak indiscernibility relation) on it. As the other structure on S will not be explicitly used in the following, it suffices to take S to be an at most countable set of elements in ZF, so that it can be written as a sequence of the form: { x , x 1 2 , . . . , x , . . . , k } . Taking ( a, b ) ∈ R to mean ' a is weakly indiscernible from b ' concepts of primitive counting regulated by different types of meta level assumptions are defined below. The adjective primitive is intended to express the minimal use of granularity and related axioms. ## Indiscernible Predecessor Based Primitive Counting (IPC) In this form of 'counting', the relation with the immediate preceding step of counting matters crucially. - 1. Assign f ( x 1 ) = 1 1 = s 0 (1 1 ). - 2. If f ( x i ) = s r (1 ) and ( j x , x i i +1 ) ∈ R , then assign f ( x i +1 ) = 1 j +1 . - 3. If f ( x i ) = s r (1 ) and ( j x , x i i +1 ) / R ∈ , then assign f ( x i +1 ) = s r +1 (1 ). j The 2-type of the expression s r +1 (1 ) will be j j . Successors will be denoted by the natural numbers indexed by 2-types. ## History Based Primitive Counting (HPC) In HPC, the relation with all preceding steps of counting will be taken into account. - 1. Assign f ( x 1 ) = 1 1 = s 0 (1 1 ). - 2. If f ( x i ) = s r (1 ) and ( j x , x i i +1 ) ∈ R , then assign f ( x i +1 ) = 1 j +1 . - 3. If f ( x i ) = s r (1 ) and j ∧ k&lt;i +1 ( x , x k i +1 ) / R ∈ , then assign f ( x i +1 ) = s r +1 (1 ). j In any form of counting in this section, if f ( x ) = α , then τ ( α ) will denote the least element that is related to x , while glyph[epsilon1] ( α ) will be the greatest element preceding α , which is related to α . ## History Based Perceptive Partial Counting (HPPC) In HPPC, the valuation set shall be N ∪ {∗} = N ∗ with ∗ being an abbreviation for 'undefined'. - 1. Assign f ( x 1 ) = 1 = s 0 (1). - 2. If ( x , x i i +1 ) ∈ R , then assign f ( x i +1 ) = ∗ . - 3. If Max k&lt;i f ( x k ) = s r (1) and ∧ k&lt;i ( x , x k i ) / R ∈ , then assign f ( x i ) = s r +1 (1). Clearly, HPPC depends on the order in which the elements are counted. ## Indiscernible Predecessor Based Partial Counting (IPPC) This form of counting is similar to HPPC, but differs in using the IPC methodology. - 1. Assign f ( x 1 ) = 1 = s 0 (1). - 2. If ( x , x i i +1 ) ∈ R , then assign f ( x i +1 ) = ∗ . - 3. If Max k&lt;i f ( x k ) = s r (1) and ( x i -1 , x i ) / R ∈ , then assign f ( x i ) = s r +1 (1). Definition 6. A generalised approximation space 〈 S, R 〉 will be said to be IPP Countable (resp HPP Countable) if and only if there exists a total order on S , under which all the elements can be assigned a unique natural number under the IPPC (resp HPPC) procedure . The ratio of number of such orders to the total number of total orders will be said to be the IPPC Index (resp HPPC Index). These types of countability are related to measures, applicability of variable precision rough methods and combinatorial properties. The counting procedures as such are strongly influenced by the meaning of associated contexts and are not easy to compare. In classical RST , HPC can be used to effectively formulate a semantics, while the IPC method yields a weaker version of the semantics in general. This is virtually proved below: Theorem 26. In the HPC procedure applied to classical RST , a set of the form { l p , 1 q , . . . 1 t } is a granule if and only if it is the greatest set of the form with every element being related to every other and for any element α in it τ ( α ) = f glyph[turnstileright] ( l p ) and glyph[epsilon1] ( α ) = f glyph[turnstileright] (1 ) t (for at least two element sets). Singleton granules should be of the form { l p } with this element being unrelated to all other elements in S . Theorem 27. All of the following are decidable in a finite number of steps in a finite AS by the application of the HPC counting method : - 1. Whether a given subset A is a granule or otherwise. - 2. Whether a given subset A is the lower approximation of a set B . - 3. Whether a given subset A is the upper approximation of a set B . Proof. Granules in the classical RST context are equivalence classes and elements of such classes relate to other elements within the class alone. Theorem 28. The above two theorems do not hold in the IPC context. The criteria of the first theorem defines a new type of granules in totally ordered approximation spaces and relative this the second theorem may not hold. Proof. By the IPC way of counting, equivalence classes can be split up into many parts and the numeric value may be quite deceptive. Looking at the variation of the 2-types, the criteria of the first theorem above will define parts of granules, that will yield lower and upper approximations distinct from the classical ones respectively. Extension of these counting processes to TAS for the abstract extraction of information about granules, becomes too involved even for the simplest kind of granules. However if the IPC way of counting is combined with specific parthood orders, then identification of granules can be quite easy. The other way is to consider entire collections of countings according to the IPC scheme. Theorem 29. Among the collection of all IPC counts of a RYS S , any one with maximum number of 1 i s occurring in succession determines all granules. If S is the power set of an approximation space, then all the definite elements can also be identified from the distribution of sequences of successive 1 i s. Proof. · Form the collection I ( S ) of all IPC counts of S . - · For α, β ∈ I ( S ), let α glyph[precedesequal] β if and only if β has longer strings of 1 i s towards the left and more number of strings of 1 s of length greater than 1, than i α . - · The maximal elements in this order suffice for this theorem. ## Example Let S = { f, b, c, a, k, i, n, h, e, l, g, m } and let R, Q be the reflexive and transitive closure of the relation $$\{ ( a, b ), \, ( b, c ), \, ( e, f ), \, ( i, k ), ( l, m ), \, ( m, n ), \, ( g, h ) \}$$ and $$\{ ( a, b ), \, ( e, f ), \, ( i, k ), \, ( l, m ), \, ( m, n ) \}$$ respectively. Then 〈 S, R 〉 and 〈 S, Q 〉 are approximation spaces. This set can be counted (relative R ) in the presented order as follows: IPC { 1 1 , 2 1 , 1 2 , 1 3 , 2 3 , 1 4 , 2 4 , 3 4 , 1 5 , 2 5 , 1 6 , 2 6 } HPC { 1 1 , 2 1 , 1 2 , 1 3 , 2 3 , 1 4 , 1 5 , 2 5 , 1 6 , 1 7 , 1 8 , 1 9 } HPPC { 1 , 2 , ∗ ∗ , , 3 , ∗ , 4 , 5 , ∗ ∗ ∗ ∗} , , , , , 1 1 1 1 1 , HPC Relative Q : { 1 1 , 2 1 , 3 1 , 1 2 , 2 2 , 1 3 , 2 3 , 3 3 , 1 4 , 1 5 , 2 5 , 1 6 } . Now S Q | = {{ a, b } { } { , c , e, f } { , i, k } { , l, m, n } { , g } { , h }} and the positive region of Q relative R is $$P O S _ { R } ( Q ) = \bigcup _ { X \in S | Q } X ^ { l } = \{ e, f, l, m, n \} = \{ f, n, e, l, m \}.$$ The induced HPC counts of this set are respectively { 1 1 , 2 5 , 1 6 , 1 7 , 1 9 } and { 1 1 , 2 3 , 1 4 , 1 5 , 1 6 } . ## 13 Generalized Measures According to Pawlak's approach [17] to theories of knowledge from a classical rough perspective, if S is a set of attributes and R an indiscernibility relation on it, then sets of the form A l and A u represent clear and definite concepts. If Q is another stronger equivalence ( Q ⊆ R ) on S , then the state of the knowledge encoded by 〈 S, Q 〉 is a refinement of that of S = 〈 S, R 〉 . The R -positive region of Q is defined to be $$P O S _ { R } ( Q ) \, = \, \bigcup _ { X \in S | Q } X ^ { l _ { R } } \, ; \, \ X ^ { l _ { R } } \, = \, \bigcup \{ [ y ] _ { R } ; \, [ y ] _ { R } \subseteq X \}.$$ The degree of dependence of knowledge Q on R δ Q,R ( is defined by $$\delta ( Q, R ) = \frac { C a r d ( P O S _ { R } ( Q ) ) } { C a r d ( S ) }.$$ Definition 7. The granular dependence degree of knowledge Q on R gk Q,R , ( ) will be the tuple ( k , . . . , k 1 r ) , with the k i 's being the ratio of the number of granules of type i included in POS R ( Q ) to card S ( ) . Note that the order on S , induces a natural order on the granules (classes) generated by R, Q respectively. This vector cannot be extracted from a single HPC count in general (the example in the last section should be suggestive). However if the granulation is taken into account, then much more information (apart from the measure) can be extracted. $$\text{Proposition } 3. \ I f \ g k ( Q, R ) = ( k _ { 1 }, k _ { 2 }, \dots, k _ { r } ), \ t h e n \ \delta ( Q, R ) = \sum k _ { i }.$$ The concepts of consistency degrees of multiple models of knowledge introduced in [95] can also be improved by a similar strategy: If δ Q, R ( ) = a and δ R, Q ( ) = b , then the consistency degree of Q and R, Cons Q,R ( ) is defined by $$C o n s ( Q, R ) = \frac { a + b + n a b } { n + 2 },$$ where n is the consistency constant. With larger values of n , the value of the consistency degree becomes smaller. Definition 8. If gk Q, R ( ) = ( k , k 1 2 , . . . , k r ) and gk R, Q ( ) = ( l 1 , l 2 , . . . , l p ) then the granular consistency degree gCons Q,R ( ) of the knowledge represented by Q,R , will be $$\ g C o n s ( Q, R ) = ( k _ { 1 } ^ { * }, \dots, k _ { r } ^ { * }, l _ { 1 } ^ { * }, \dots, l _ { p } ^ { * }, n k _ { 1 } ^ { * } l _ { 1 }, \dots n k _ { r } ^ { * } l _ { p } ),$$ $$\text{where} \, k _ { i } ^ { * } = \frac { k _ { i } } { n + 2 } \text{ for } i = 1, \dots, r \text{ and } l _ { j } ^ { * } = \frac { l _ { j } } { n + 2 } \text{ for } j = 1, \dots, p.$$ The knowledge interpretation can be extended in a natural way to other general RST (including TAS ) and also to choice inclusive rough semantics [18]. Construction of similar measures is however work in progress. With respect to the counting procedures defined, these two general measures are relatively constructive provided granules can be extracted. This is possible in many of the cases and not always. They can be replaced by a technique of defining atomic sub-measures based on counts and subsequently combining them. Algebraic semantics for these and related measures have been developed in [6] by the present author (after the writing of this paper). The reader is referred to the same for a fuller treatment of this section. ## 13.1 Rough Inclusion Functions Various rough inclusion and membership functions with related concepts of degrees are known in the literature (see [96] and references therein). If these are not representable in terms of granules through term operations formed from the basic ones [18], then they are not truly functions/degrees of the rough domain. To emphasize this aspect, I will refer to such measures as being non-compliant for the rough context . I seek to replace such non-compliant measures by tuples satisfying the criteria. Based on this heuristic, I would replace the rough inclusion function glyph[negationslash] $$k ( X, Y ) = \begin{cases} \frac { \# ( X \cap Y ) } { \# ( X ) }, \text{ if } X \neq \emptyset, \\ 1, \text{ else}, \end{cases}$$ with glyph[negationslash] $$k ^ { * } ( X, Y ) = \begin{cases} \left ( y _ { 1 }, y _ { 2 }, \dots, y _ { r } \right ) \text{if } X ^ { l } \neq \emptyset, \\ \left ( \frac { 1 } { r }, \dots, \frac { 1 } { r } \right ), & \text{else} \end{cases}$$ where $$\frac { \# ( G _ { i } ) \cdot \chi _ { i } ( X \cap Y ) } { \# ( X ^ { l } ) = y _ { i } }, \ i = 1, 2, \dots r.$$ Here it is assumed that { G , . . . , G 1 r } = G (the collection of granules) and that the function χ i is being defined via, $$\chi _ { i } ( X ) = \begin{cases} 1, \, \text{if} \, G _ { i } \subseteq X, \\ 0, \, \text{else}, \end{cases}$$ Similarly, $$k _ { 1 } ( X, Y ) = \begin{cases} \frac { \# ( Y ) } { \# ( X \cup Y ) }, \text{ if } X \cup Y \neq \emptyset, \\ 1, \text{ else}, \end{cases}$$ glyph[negationslash] can be replaced by glyph[negationslash] $$\frac { \# ( G _ { i } ) \cdot \chi _ { i } ( Y ) } { \# ( ( X \cup Y ) ^ { l } ) } = h _ { i } \, ; i = 1, 2, \dots, r,$$ and can be replaced by $$k _ { 2 } ^ { * } ( X, Y ) = ( q _ { 1 }, q _ { 2 }, \dots, q _ { r } ) \,,$$ where $$\frac { \# ( G _ { 1 } ) \cdot \chi _ { 1 } ( X ^ { c } \cup Y ) } { \# ( S ) } = q _ { i }, \ i = 1, 2, \dots, r.$$ This strategy can be extended to every other non-compliant inclusion function. Addition, multiplication and their partial inverses for natural numbers can be properly generalised to the new types of numbers with special regard to meaning of the operations on elements of dissimilar type. This paves the way for the representation of these general measures in the new number systems (given the granulation). ## 14 On Representation of Counts In this section, ways of extending the representation of the different types of counts considered in the previous section are touched upon. The basic aim is to endow these with more algebraic structure through higher order constructions. The generalised counts introduced have been given a representation that depend on the order of arrangement of relatively discernible and indiscernible things from a Meta-C perspective. A representation that accommodates all possible arrangements is of natural interest from both concrete and abstract perspectives. The global structure that corresponds to Z or N is not this and may be said to correspond to rather superfluous implicit interpretations of counting exact objects by natural numbers. From a different perspective a distinction is made between the names of objects and the 'generalised numbers' associated in all this. Consider the following set of statements: $$k _ { 1 } ^ { * } ( X, Y ) = \begin{cases} \left ( h _ { 1 }, h _ { 2 }, \dots, h _ { r } \right ) \text{ if } X ^ { l } \neq \emptyset, \\ \left ( \frac { 1 } { r }, \dots, \frac { 1 } { r } \right ), & \text{else} \end{cases}$$ where $$k _ { 2 } ( X, Y ) = \frac { \# ( X ^ { c } \cup Y ) } { \# ( S ) },$$ - A Set S has finite cardinality n . - B Set S can be counted in n ! ways. - C The set of counts C ( S ) of the set S has cardinality n !. - E The set of counts C ( S ) of the set S bijectively corresponds to the permutation group S n . - F The set of counts C ( S ) can be endowed with a group operation so that it becomes isomorphic to S n . Statements C, E and F are rarely explicitly stated or used in mathematical practice in the stated form. To prove 'F', it suffices to fix an initial count. From the point of view of information content it is obvious that A ⊂ B ⊂ C ⊂ E ⊂ F . It is also possible to replace 'set' in the above statements by 'collection' and then from the axiomatic point of statements C, E, and F will require stronger axioms (This aspect will not be taken up in the present paper). I will show that partial algebraic variants of statement F correspond to IPC. An important aspect that will not carry over under the generalisation is: Proposition 4. Case F is fully determined by any of the two element generating sets (for finite n ). ## 14.1 Representation Of IPC The group S n can be associated with all the usual counting of a collection of n elements. The composition operation can be understood as the action of one counting on another. This group can be associated with the RYS being counted and 'similarly counted pairs' in the latter can be used to generate a partial algebra. Formally, the structure will be deduced using knowledge of S n and then abstracted: - · Form the group S n with operation ∗ based on the interpretation of the collection as a finite set of n elements at a higher meta level, - · Using the information about similar pairs, associate a second interpretation s x ( ) based on the IPC procedure with each element x ∈ S n , - · Define ( x, y ) ∈ ρ if and only if s x ( ) = s y ( ). On the quotient S n | ρ , let $$a \circ b \, = \, \begin{cases} c \text{ if } \{ z \, \colon \, x * y = z, \, x \in a, \, y \in b \} | \rho \in S _ { n } | \rho, \\ \infty \, \text{else.} \end{cases}$$ The following proposition follows from the form of the definition. Proposition 5. The partial operation ◦ is well defined. Definition 9. A partial algebra of the form 〈 S n | ρ, ◦〉 defined above will be called a Concrete IPC-partial Algebra (CIPCA) A partially ordered set 〈 F, ≤〉 is a lower semi-linearly ordered set if and only if: - · For each x , x ↓ is linearly ordered, - · ( ∀ x, y )( ∃ z z ) ≤ x ∧ z ≤ y . It is easy to see that IPC counts form lower semi-linearly ordered sets. Structures of these types and properties of their automorphisms are all of interest and will be considered in a separate paper. ## 15 Semantics from Dialectical Counting An algorithmic method for deducing the algebraic semantics of classical RST using the IPC method of counting is demonstrated in this section. Derivation of semantics for other types of RST will be taken up in a separate paper. Let S = 〈 S, R 〉 be an approximation space, then 〈 ℘ S , ( ) ∪ ∩ , , l , u c , , 0 , 1 〉 can be regarded as a RYS . 0 , 1, corresponding to the empty set and S , can be regarded as distinguished elements or defined through additional axioms. The parthood operation corresponds to set inclusion and is definable using ∩ ∪ , . Indiscernibility of any x, y ∈ ℘ S ( ) will be assumed to be defined by the rough equality; $$x \approx y \text{ iff } x ^ { l } = y ^ { l } \wedge x ^ { u } = y ^ { u }.$$ If I ( ℘ S ( )) is the set of all IPC counts of the RYS , then by the last theorem of section on dialectical counting it is clear that the granules and definite elements can be identified. It remains to define the other operations on the identified objects along the lines of [29]. The corresponding logics in modal perspective can be found in [97]. So, Theorem 30. The rough algebra semantics of classical RST can be deduced from any one of the maximal elements of I ( ℘ S ( )) in the glyph[precedesequal] order. ## 15.1 Rough Entanglement: Granular HPC By the term Entangled , I mean to grasp the sharp increase in semantic content that happens when counting processes are made to take aspects of the distribution of granules into account. For the following version of counting, it is assumed that the set S is associated with a RYS S , generated by it according to some process and that a collection of granules G is included in the RYS S . It is also assumed that a total order on S is available relative the lower level classical semantic domain. These assumptions can be relaxed. The following definitions will also be used: - · For a, b ∈ S and G ∈ G , ind G ( a, b ) if and only if a, b ∈ G . - · For a, b ∈ S disc a, b ( ) if and only if ( ∃ G , G 1 2 ∈ G ) a ∈ G , b 1 ∈ G , a 2 / ∈ G , b / G 2 ∈ 1 (or the pair guarantees disc a, b ( )). - · For a, b ∈ S pdisc a, b ( ) if and only if ( ∃ G , G 1 2 ∈ G ) a, b ∈ G , b 1 ∈ G , a / G 2 ∈ 2 . The granular part of the granular extension of HPC can be done as follows: - 1. Assume a total order on G and form G 2 \ ∆ , - 2. Form words with elements (alphabets) from G 2 \ ∆ and order them lexicographically, - 3. A word that includes all instances of pairs that guarantee disc a, b ( ) will be said to be complete for ( a, b ), - 4. A word will be said to be reduced with respect to a pair ( a, b ) if and only if no letter x in the word guarantees pdisc a, b ( ). - 5. The existence of unique complete least reduced words (least with respect to the lexicographic order, provided G is finite) for pairs of elements in S permits simple valuation as a tuple and adds another dimension to HPC. - 6. It suffices to adjoin the tuple corresponding to the encoded word between the element and its predecessor in the counting procedure of HPC. Theorem 31. Any two distinct elements a, b ∈ S generate a least unique complete reduced word from G . Proof. I will need to use transfinite induction in the absence of the finiteness assumption. Otherwise, forming the set of complete words, and then extracting the reduced words and finally ordering the rest by the lexicographic graphic will yield the least element. A contradiction argument can be used to check the uniqueness. ## 16 Connections Between Fuzzy and Rough Sets In this section, I will use granularity-related features to establish a new transformation between fuzzy sets and classical rough sets. The transformation can be the basis for translations or transformations between different types of logics associated with the corresponding semantics. In the literature of the different attempts at connections between fuzzy and rough sets, the non granular approach via the Brouwer Zadeh MV algebras in [41] is somewhat related. The exact connections with the present derivations, however, requires further investigation especially when rough membership functions in the classical sense are not permitted into the discourse. The relation of this result to the connections based on membership functions as developed in [98] and earlier papers are mentioned at the end of this section. The result is very important in the light of the contamination problem and the generalised number systems of [56]. It shows that both concepts of rough measures and 'fuzzy sets as maps' are not needed to speak of rough sets, fuzzy sets and possible connections between them. A non-controversial definition of fuzzy sets, with the purpose of removing the problems with the 'membership function formalism', was proposed in [99]. I show that the definition can be used to establish interesting links between fuzzy set theory and rough sets. The connection is essentially of a mathematical nature. In my view, the results should be read as in a certain perspective, the granularity of particular rough contexts originate from fuzzy contexts and vice versa . The existence of any such perspective and its possible simplicity provides another classification of general rough set theories. Definition 10. A fuzzy subset (or fuzzy set ) A of a set S is a collection of subsets { A i } i ∈ [0 1] , satisfying the following conditions: - · A 0 = S , - · (0 ≤ a &lt; b ≤ 1 → A b ⊆ A a ) , - · A b = ⋂ 0 ≤ a&lt;b A a . ↦ A fuzzy membership function µ A : X → [0 , 1] is defined via µ A ( x ) = Sup { a : a ∈ [0 , 1] , x ∈ A a } for each x . The core of A is defined by Core( A ) = { x ∈ S : µ A ( x ) = 1 . } A is normalized if and only if it has non-empty core. The support of A is defined as the closure of { x ∈ S ; µ A ( x ) &gt; 0 } . The height of A is H ( A ) = Sup { µ A ( x ); x ∈ S } . The upper level set is defined via U µ,a ( ) = { x ∈ S : µ A ( x ) ≥ a } . The class of all fuzzy subsets of S will be denoted by F ( S ). The standard practice is to refer to 'fuzzy subsets of a set' as simply a 'fuzzy set'. Proposition 6. Every fuzzy subset A of a set S is a granulation for S which is a descending chain with respect to inclusion and with its first element being S . The cardinality of the indexing set and the second condition in the definition of fuzzy sets is not a problem for use as granulations in RST , but almost all types of upper approximations of any set will end up as S . From the results proved in the previous sections it should also be clear that many of the nice properties of granulations will not be satisfied modulo any kind of approximations. I will show that simple set theoretic transformations can result in better granulations. Granulations of the type described in the proposition will be called phi-granulations . ## Construction-1 : - 1. Let P = { 0 , p 1 , . . . p n -1 , 1 } be a finite set of rationals in the interval [0,1] in increasing order. - 2. From A extract the collection B corresponding to the index P . - 3. Let B 0 \ B p 1 = C 1 , B p 1 \ B p 2 = C 2 and so on. - 4. Let C = { C , C , . . . , 1 2 C n } . - 5. This construction can be extended to countable and uncountably infinite P in a natural way. Theorem 32. The collection C formed in the fourth step of the above construction is a partition of S . The reverse transform is possible, provided P has been selected in an appropriate way. It has been shown that fuzzy sets can be corresponded to classical rough sets in at least one way and conversely by way of stipulating granules and selecting a suitable transform. But a full semantic comprehension of these transforms cannot be done without imposing a proper set of restrictions on admissibility of transformation and is context dependent. The developed axiomatic theory makes these connections clearer. The result also means that rough membership functions are not necessary to establish a semantics of fuzzy sets within the rough semantic domain as considered in [98]. Further as noted in [98], the semantics of fuzzy sets within rough sets is quite restricted and form a special class. The core and support of a fuzzy set is realized as lower and upper approximations. Here this need not happen, but it has been shown that any fuzzy set defined as in the above is essentially equivalent to a granulation that can be transformed into different granulations for RST . A more detailed analysis of the connections will appear separately. ## 17 Operations on Low-Level Rough Naturals The operations that should be defined are those that have meaning and correspond to semantic actions. An important aspect of the meaning relates to strings associated with counts. In case of natural numbers, the number 2 may be associated with two distinct objects, but an IPC count will have a Meta-C sequence of objects which may be Meta-R distinct or indiscernible from their predecessors and different kinds of operations can be performed on these. Addition for example needs to be defined over strings and then corresponded to new IPC counts. As mentioned earlier, two different types of structures relative the classical meta level can be associated with possible concepts of 'rough naturals'. With respect to IPC for example, the raw IPC count may be seen as a rough natural or the set of IPC counts of a collection of things may be seen as a rough natural. I will refer to the former as the low-level concept of rough natural and the latter as a high-level concept. Operations on the former can be expected to influence the structure of the latter. In this section operations on collections of low-level rough naturals will be considered. of representing other possible operations in a easy way): If x is an IPC count, then the string of relatively discernible and indiscernible objects (abstract) associated with the count will be denoted by x . When I speak of 'the string corresponding to x ', it can be understood as - · Any of the strings that have the same kind of distribution of discernible and indiscernible objects with respect to their immediate predecessors, or - · the abstract classes associated, or - · a representative 'arbitrary' object (I am not going into the philosophical viewpoints on the issue in this paper). Obviously this makes the appropriate concept of x for a method of counting to depend on the method. Specifically, the IPC concept of x is not suitable for getting nice structure in HPC contexts. The rough equality (indiscernibility or similarity or whatever) relation will be denoted by ≈ . The basic string operations will then be defined as follows: If I k ( x ) is the Meta-R count of the Meta-C string formed by interchanging x k and x k +1 in x . $$\iota _ { k } ( x ) = \begin{cases} x, \text{ if } ( \overline { x } _ { k }, \overline { x } _ { k + 1 } ) \in \approx, \\ I _ { k } ( x ) \text{ otherwise.} \end{cases}$$ glyph[negationslash] If y is the Meta-R count of the result of the Meta-C removal of x k from x , ( x = 0) $$\varrho _ { k } ( x ) = \begin{cases} y, \, \text{if $\neg(\overline{x}_{k},\overline{x}_{k+1}) \in \approx$ or $\neg(\overline{x}_{k-1},\overline{x}_{k}) \in \approx$}, \\ x \text{ otherwise}. \end{cases}$$ If z is the IPC count of the result of insertion of the string y between x k and x k +1 , then for non-zero x , y , $$\eta _ { k } ( x, y ) = \begin{cases} z, \text{if $(\overline{x}_{k},\overline{x}_{k+1})\in\approx$}, \\ x \text{ otherwise}. \end{cases}$$ Definition 11. For any of the rough counts x , ν x ( ) will represent the length of (cardinal associated with) x in Meta-C. Note that η k ( x, y ) does not include ⊕ , but is very similar. In fact the two operations are not distinct from the point of view of interpretation at Meta-C. Definition 12. Basic arithmetical operations can be generalised to rough naturals as follows: - (i) x ⊕ y : The count (at meta-R) of the 'object level string' (relative meta-C) defined as the x items followed by the y items. - (ii) x glyph[circledot] y : The count (at meta-R) of the 'object level string' defined as ν y ( ) copies of x placed at each of the atomic y places. - (iii) µ x, y ( ) : Form ν y ( ) copies of x at meta-C. - (iv) x c : Meta-R Count of x in reverse order. - (v) x ⊗ y : The meta-R count of the string formed by the conditional substitution of x at each of the y places subject to the rules: - (a) Replace y 1 with x . - (b) Replace y k +1 with x if ( y k , y k +1 ) / ∈≈ . - (c) If ( y k , y k +1 ) ∈≈ , then y k +1 should be dropped. - (vi) x glyph[circleminus] y : The meta-R count of the string formed by the deletion of y from x from the right if defined. This definition can always be improved through the glyph[rho1] k operation. Other more interesting definitions of subtraction can be obtained by imposing conditions relating to discernibility on the target x and/or source y . - (i) The condition 'a sub-string will be removable from the target from the right if and only if each letter in the sub-string is discernible from its successor or predecessor' will be corresponded to x glyph[circleminus] 1 ∨ 2 y . - (ii) The condition 'a sub-string will be removable from the target from the right if and only if each letter in the sub-string is discernible from its successor and predecessor' will be corresponded to x glyph[circleminus] 12 y . - (iii) The condition 'a sub-string will be removable from the target from the right if and only if each letter in the sub-string is discernible from its successor' will be corresponded to x glyph[circleminus] 1 y . - (iv) The condition 'a sub-string will be removable from the target from the right if and only if each letter in the sub-string is discernible from its predecessor' will be corresponded to x glyph[circleminus] 2 y . Definition 13. For any x, y , x glyph[precedesequal] y if and only if x is obtainable from y in Meta-R by a finite number of recursive applications of glyph[rho1] k and ι k operations for different values of k . Definition 14. For any x, y , $$x \leq _ { \oplus } y \text{ iff } ( \exists z ) \, ( x \oplus z = y ) \, \vee \, ( z \oplus x = y ).$$ Definition 15. For any x, y , $$x \leq _ { \odot } y \text{ iff } ( \exists z ) \, ( x \odot z = y ).$$ Definition 16. For any x, y , $$x \leq _ { \otimes } y \text{ iff } ( \exists z ) \, ( x \otimes z = y ).$$ Definition 17. For any x, y , x ≤ p y in Meta-R if and only if ζ ( x , ζ ) ( y ) and ν x ( ) ≤ ν y ( ) in Meta-C ( ≤ being the usual total order on integers). Definition 18. For any x, y , x glyph[triangleleftequal] y if and only if ν x ( ) ≤ ν y ( ) in Meta-C ( ≤ being the usual total order on integers). Definition 19. For any x, y , x glyph[subsetsqequal] y in Meta-R if and only if x is obtainable from y in Meta-R by a finite number of recursive applications of glyph[rho1] k for different values of k . Using some of the different operations, many new partial algebras modelling the essence of rough naturals at meta-R and meta-C are defined next. It should be noted that the operations are well defined because IPC counts have an injective correspondence with distributions of relatively discernible and indiscernible objects. Definition 20. By a Rough IPC-Natural Algebra (RIPCNA) will be meant a partial algebraic system of the form $$S \, = \, \langle \underline { S }, \zeta, \oplus, \odot, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 0, 0 ) \rangle \,,$$ with the set S being the set of rough naturals formed according to the IPC schema and with the above defined operations according to the IPC schema. 1 can be treated as an abbreviation of 1 1 , numbers of the form 1 2 1 1 ...k 1 can also be abbreviated by k . 0 will be understood as the IPC count of the empty string. ζ is a one place predicate for indicating the usual integers: $$\zeta ( x ) \text{ iff } ( \exists k ) \, x = 1 _ { 1 } 2 _ { 1 } \dots k _ { 1 }.$$ Theorem 33. In a RIPCNA of the form S = 〈 S, ⊕ glyph[circledot] , , glyph[circleminus] 1 ∨ 2 , 0 1 , 〉 of type (2 2 2 0 0) , , , , all of the following hold: - 1. ( x ⊕ y ) ⊕ z = x ⊕ ( y ⊕ z ) , - 2. x ⊕ 0 = x = 0 ⊕ x , - 3. x ⊕ x = x glyph[circledot] 2 , - 4. ( ∀ x, y, z )( x ⊕ y = x ⊕ z -→ y = z ) , - 5. ( ∀ x, y, z )( x ⊕ z = y ⊕ z -→ x = y ) , - 6. x glyph[circledot] ( y glyph[circledot] z ) = ( x glyph[circledot] y ) glyph[circledot] z , - 7. ( ∀ x, y, z )( x glyph[circledot] y = z glyph[circledot] y -→ x = z ) , - 8. x glyph[circledot] 1 = x ; x glyph[circleminus] x = 0 , - 9. x glyph[circledot] ( y ⊕ z ) = ( x glyph[circledot] y ) ⊕ ( x glyph[circledot] z ) , - 10. ( x glyph[circledot] x = x -→ ( x = 0) ∨ ( x = 1)) , - 11. ( ∀ x, y, z )( x = y -→ x glyph[circledot] z = x glyph[circledot] z ) , - 12. ( ∀ x, y, z )( x ⊕ y = z -→ z glyph[circleminus] y = x ) , - 13. ( ∀ x, y )( ζx, ζy -→ x ⊕ y = y ⊕ x, x glyph[circledot] y = y glyph[circledot] x ) , - 14. ( ∀ x, y, z )( ζx, ζy, ζz -→ ( x ⊕ y ) glyph[circledot] z = ( x glyph[circledot] z ) ⊕ ( y glyph[circledot] z ) , - 15. ( ∀ x, y, z )( ζx, ζy -→ ( x ⊕ y ) glyph[circledot] z = ( x glyph[circledot] z ) ⊕ ( y glyph[circledot] z )) . - Proof. 1. ( x ⊕ y ) ⊕ z = x ⊕ ( y ⊕ z ) holds because either side is the IPC count of the string formed by placing x , y and z in succession. - 2. 0 by definition is the count of the empty string, so x ⊕ 0 = x = 0 ⊕ x . - 3. 2 is the same as 1 1 2 1 and x glyph[circledot] 2 would be the IPC count of the string formed by placing two copies of x in 2 places. So x ⊕ x = x glyph[circledot] 2 glyph[negationslash] - 4. If x ⊕ y = x ⊕ z holds then either side will be the IPC count of x ⊕ y and the count of the initial string x will be common to both. If y = z , then x ⊕ y cannot be equal to x ⊕ z , so ( ∀ x, y, z )( x ⊕ y = x ⊕ z -→ y = z ) - 5. Proof of ( ∀ x, y, z )( x ⊕ z = y ⊕ z -→ x = y ) is similar to the above. - 6. The length of the string y glyph[circledot] z will be the same as the length of y multiplied by the length of z . So x will be equally replicated during the IPC counting operation corresponding to either side of x glyph[circledot] ( y glyph[circledot] z ) = ( x glyph[circledot] y ) glyph[circledot] z . - 7. ( ∀ x, y, z )( x glyph[circledot] y = z glyph[circledot] y -→ x = z ) can be verified from the strings associated and a contradiction argument. - 8. x glyph[circledot] 1 = x is obvious. If x is removed from x , then the result would be an empty string. So x glyph[circleminus] x = 0 - 9. The length of y ⊕ z is the same as the length of y plus that of z . So x glyph[circledot] ( y ⊕ z ) = ( x glyph[circledot] y ) ⊕ ( x glyph[circledot] z ). - 10. ( x glyph[circledot] x = x ↔ ( x = 0) ∨ ( x = 1)) is easy to verify. - 11. ( ∀ x, y, z )( x = y -→ x glyph[circledot] z = x glyph[circledot] z ) is easy to prove, but note that x ⊕ z = y ⊕ z need not follow from x = y in general. - 12. ( ∀ x, y, z )( x ⊕ y = z -→ z glyph[circleminus] y = x ) follows from the definition of glyph[circleminus] . - 13. ( ∀ x, y )( ζx, ζy -→ x ⊕ y = y ⊕ x, x glyph[circledot] y = y glyph[circledot] x ) follows from the properties of integers. - 14. ( ∀ x, y, z )( ζx, ζy, ζz -→ ( x ⊕ y ) glyph[circledot] z = ( x glyph[circledot] z ) ⊕ ( y glyph[circledot] z ) follows from the properties of integers. - 15. ( ∀ x, y, z )( ζx, ζy -→ ( x ⊕ y ) glyph[circledot] z = ( x glyph[circledot] z ) ⊕ ( y glyph[circledot] z )) is again a statement about integers. Theorem 34. { x : ζ ( x , x ) ∈ S } with the operations ⊕ glyph[circledot] , , glyph[circleminus] is an integral domain of characteristic 0 that is also a unique factorization domain. In fact it is isomorphic to Z . Proof. { x : ζ ( x , x ) ∈ S } is in bijective correspondence with Z by definition. The restrictions of the operations ⊕ glyph[circledot] , , glyph[circleminus] to the domain coincide with usual arithmetic operations on Z . As glyph[circledot] uses a certain level of knowledge of the natural numbers that is correctly at Meta-C, the question of admissibility of such in some contexts can be a matter of dispute. Relative this understanding ⊗ would be a better suited operation that is at the same time a proper generalisation of usual multiplication and glyph[circledot] . Definition 21. By a Rough IPC Algebra (RIPCA) will be meant a partial algebraic system of the form $$S \, = \, \langle \underline { S }, \zeta, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 0, 0 ) \rangle \,,$$ with the set S being the set of rough naturals formed according to the IPC schema and with the above defined operations according to the IPC schema. 1 can be treated as an abbreviation of 1 1 , numbers of the form 1 2 1 1 ...k 1 will also be abbreviated by k . 0 will be understood as the IPC count of the empty string. ζ is a one place predicate for indicating the usual integers: $$\zeta ( x ) \text{ iff } ( \exists k ) \, x = 1 _ { 1 } 2 _ { 1 } \dots k _ { 1 }.$$ Of the orders glyph[subsetsqequal] , glyph[precedesequal] , ≤ glyph[circledot] , ≤ ⊗ , ≤ ⊕ and glyph[triangleleftequal] , the last is basically a Meta-C order corresponding to the usual order on integers. Among the other five, glyph[precedesequal] is the strongest with respect to inclusion, but not much can be said about comparisons of their naturality in Meta-R. So it seems best to define ordered versions of the partial algebras as follows: Definition 22. By a R-Ordered Rough IPC Algebra (RORIPCA) will be meant a partial algebraic system of the form $$S = \langle \underline { S }, \zeta, \Sigma, \preceq, \leq _ { \otimes }, \leq _ { \oplus }, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 2, 2, 2, 0, 0 ) \rangle \,,$$ with the set S being the set of rough naturals formed according to the IPC schema and with $$S \, = \, \langle \underline { S }, \zeta, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 0, 0 ) \rangle \,,$$ being a RIPCA. Definition 23. By a C-Ordered Rough IPC Algebra (CORIPCA) will be meant a partial algebraic system of the form $$S = \langle \underline { S }, \zeta, \unlhd, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 2, 0, 0 ) \rangle \,,$$ with the set S being the set of rough naturals formed according to the IPC schema and with $$S \, = \, \langle \underline { S }, \zeta, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 0, 0 ) \rangle \,,$$ being a RIPCA. Definition 24. By a Full Ordered Rough IPC Algebra (FORIPCA) will be meant a partial algebraic system of the form $$S \, = \, \langle \underline { S }, \zeta, \underline { \leq }, \underline { \Sigma }, \preceq, \leq _ { \otimes }, \leq _ { \odot } \leq _ { \oplus }, \leq _ { p }, \oplus, \otimes, \odot, \ominus _ { 1 \vee 2 }, \ominus, 0, 1 \rangle \,,$$ of type (1 2 2 2 2 2 2 2 2 2 2 2 2 0 0) , , , , , , , , , , , , , , with the set S being the set of rough naturals formed according to the IPC schema and with $$S \, = \, \langle \underline { S }, \zeta, \oplus, \otimes, \ominus _ { 1 \vee 2 }, 0, 1, ( 1, 2, 2, 2, 0, 0 ) \rangle \,,$$ being a RIPCA. Analogously, the concepts of FORIPCNA, CORIPCNA and RORIPCNA can be defined. Proposition 7. In a FORIPCA S , glyph[triangleleftequal] is a quasi order that satisfies $$\unlhd \, \cap \, \zeta ^ { 2 } \, = \, \leq \,.$$ Proof. It is easy to find elements x, y that violate possible antisymmetry of glyph[triangleleftequal] . The restriction to ζ 2 is the same as the intersection with Z 2 . So on Z , the usual order ≤ coincides with glyph[triangleleftequal] . Strictly speaking this is a category theoretic result involving S and Z . glyph[negationslash] glyph[negationslash] Proposition 8. In a FORIPCA S , glyph[precedesequal] is a quasi order. The class of any element in { x ; ζ ( x x ) = 0 } with respect to the equivalence induced by glyph[precedesequal] includes { x ; ζ ( x x ) = 0 } . Proof. Transitivity holds as if x is obtainable from y by the glyph[rho1] k , eta k operations for different k and y is obtainable from z similarly, then x would be obtainable from z . glyph[negationslash] If ζ ( x , ζ ) ( y ), then x and y would be strings of discernibles and so x, y would be transformable into each other by the glyph[rho1] k , eta k operations. Defining x ∼ y if and only if x glyph[precedesequal] y and y glyph[precedesequal] x , it can be seen that ∼ is an equivalence and through this all of the elements of { x ; ζ ( x x ) = 0 } can be identified. Theorem 35. In a FORIPCA S , the following implications between the different orders hold: - 1. ( ∀ x, y )( x ≤ glyph[circledot] y -→ x ≤ ⊕ y ) , - 2. ( ∀ x, y )( x ≤ ⊕ y -→ x glyph[subsetsqequal] y ) , - 3. ( ∀ x, y )( ζx, ζy -→ x glyph[triangleleftequal] y ∨ y glyph[triangleleftequal] x ∨ x = y ) , - 4. ( ∀ x, y )( x ≤ p y -→ x glyph[triangleleftequal] y ) , - 5. ( ∀ x, y )( x ⊗ y ↔ x glyph[circledot] y ) , - 6. For any x, y , x ≤ ⊕ y does not not imply that x glyph[precedesequal] y and neither does the converse implication hold. Proof. Most of the statements can be proved from the corresponding definitions. ≤ p is a partial order that is coincides with the usual order when restricted to Z . Statement 5 is ensured by the existence of elements corresponding to all possible relative discernibility-indiscernibility patterns. If z is a string of elements, some of which are indiscernible from x and y = x ⊕ z , then x may not be obtainable from y . Concrete patterns can be constructed at different levels of complexity. The easiest case corresponds to all elements of z being indiscernible from those of x . A useful visual representation of the computing process for a ⊗ b is illustrated below through a specific example. In the first line blank spaces are drawn for the alphabets in b . The curved arrows are used to indicate discernibility. The second figure represents a gross view of the strings in a ⊗ b . $$\frac { \bar { a } } { \bigcirc } \frac { \bar { a } } { \bigcirc } \frac { \bar { a } } { \bigcirc }.$$ From the above, it can be deduced that a ⊗ b is equivalent to the count of $$\begin{matrix} \bar { a } & \bar { a } & \bar { a } \\ - - -. \end{matrix}$$ Key properties of the relatively difficult operation ⊗ are considered in the following theorems: Theorem 36. In a FORIPCA S , all of the following hold: - 1. ( ∀ a, b, c )( a ⊗ b ) ⊗ c glyph[triangleleftequal] a ⊗ ( b ⊗ c ) , - 2. ( ∀ a, b, c )( ζ ( b ) -→ ( a ⊗ b ) ⊗ c = a ⊗ ( b ⊗ c )) , glyph[negationslash] - 3. ( ∀ a, b )( a = 0 , a ⊗ b = a glyph[circledot] b ↔ b glyph[circleminus] 12 b = 0) . Proof. 1. The length of a ⊗ b is determined by the distribution of indiscernible pairs in b . The proof can be done by considering the different cases of the ⊗ multiplication in the left and right side of the inequality corresponding to the relation of the first and last element of the strings corresponding to a, b and a ⊗ b . - 2. If ζ ( b ), then the string corresponding to it will have mutually discernible elements of the length of b . In ( a ⊗ b ) ⊗ c , a ⊗ b will be repeated the same number of times as b in b ⊗ c . So the equality will hold. - 3. If a ⊗ b = a glyph[circledot] b , then as a is not 0, it is necessary that each object in b be discernible from its immediate predecessor (that is for every admissible k , ( b k , b k +1 ) / ∈≈ ). So b glyph[circleminus] 12 b = 0 must hold (irrespective of the length of b ). Note that for an arbitrary element x , it need not happen that x glyph[circleminus] 12 x = 0 in general. For the converse, note that if b glyph[circleminus] 12 b = 0, then it will be necessary that for every admissible k , ( b k , b k +1 ) / ∈≈ . Both the multiplications of a with such a b will be equal. In the next theorem, the compatibility of the different orders defined are considered: ## Theorem 37. In a FORIPCA S , the following hold: - 1. ( ∀ a, b, c, e )( a glyph[triangleleftequal] b, c glyph[triangleleftequal] e -→ ( c ⊕ a ) glyph[triangleleftequal] ( e ⊕ b , ) ( a glyph[circledot] c ) glyph[triangleleftequal] ( b glyph[circledot] e )) , - 2. ( ∀ a, b, c, e )( a ≤ ⊕ b, c ≤ ⊕ e -→ a ⊕ c glyph[triangleleftequal] b ⊕ e ) , - 3. ( ∀ a, b, c )( a ≤ ⊕ b -→ c ⊕ a ≤ ⊕ c ⊕ b, or a ⊕ c ≤ ⊕ b ⊕ c ) , - 4. ( ∀ a, b )( a ≤ ⊕ b, a glyph[subsetsqequal] b -→ b glyph[circleminus] 1 ∨ 2 a glyph[subsetsqequal] b ) , - 5. ( ∀ a, b, c, e )( a ≤ glyph[circledot] b, c ≤ glyph[circledot] e -→ a glyph[circledot] c glyph[triangleleftequal] b glyph[circledot] e, a glyph[circledot] c glyph[subsetsqequal] b glyph[circledot] e ) , - 6. ( ∀ a, b, c, e )( a glyph[subsetsqequal] b, c ⊆ e -→ a ⊕ c glyph[subsetsqequal] b ⊕ e, a glyph[circledot] c glyph[subsetsqequal] b glyph[circledot] e, ) . - Proof. 1. glyph[triangleleftequal] corresponds to the meta-C interpretation by the length of associated. So the glyph[circledot] and ⊕ part of the implication should be obvious. However as c glyph[triangleleftequal] e does not imply that the number of objects in c that are discernible from their predecessor are less than the corresponding number in e . So ⊗ will not preserve glyph[triangleleftequal] . - 2. In general if a ≤ ⊕ b, c ≤ ⊕ e , then it need not happen that a ⊕ c ≤ ⊕ b ⊕ e , because of the different possible relations between the objects at the terminal and initial position of ⊕ . But the gross length of a ⊕ c will be ν a ( ) + ν c ( ). So the implication holds. - 3. Follows from the definition of ≤ ⊕ . - 4. If a ≤ ⊕ b , then there exists a c such that a ⊕ c = b or c ⊕ a = . In either b case, if a is obtainable from b by a finite number of recursive applications of ρ k , then it is necessary that these operations must have been applied at one end of b . This causes b glyph[circleminus] 1 ∨ 2 a glyph[subsetsqequal] b . - 5. In a glyph[circledot] c and b glyph[circledot] e , a is repeated ν c ( ) times and b is repeated νe times. So the length of a glyph[circledot] c will be less than that of b glyph[circledot] e . Further as a ≤ glyph[circledot] b and c ≤ glyph[circledot] e , it will be possible to obtain a glyph[circledot] c from b glyph[circledot] e through a finite number of applications of ρ k for different values of k . So the result holds. - 6. This follows from definition. Interestingly it is not possible to define a unary negation operator from any of the subtraction-like glyph[circleminus] operations and ⊕ in a consistent way. So the concept of negative elements does not generalise well to the present contexts. The extent to which a consistent definition is possible will be of natural interest. ## 18 Further Directions: Conclusion The broad classes of problems that will be part of future work fall under: - (i) Improvement of the representation of different classes of counts. One class of questions also relate to using morphisms or automorphisms in a more streamlined way. - (ii) Extension of the algebraic approach (and the concept of rough natural numbers) of the last section to non IPC cases. - (iii) The contamination problem. - (iv) Description of other semantics of general RST in terms of counts. This is the basic program of representing all types of general rough semantics in terms of counts. - (v) Can the division operation be eliminated in the general measures proposed? In other words, a more natural extensions of fractions (rough rationals) would be of much interest. Obviously this is part of the representation problem for counts. - (vi) How do algorithms for reduct computation get affected by the generalised measures? Apart from these a wide variety of combinatorial questions would be of natural interest. In this research paper, the axiomatic theory of granules and granulation developed by the present author has been extended to cover most types of general RST and new methods of counting collections of well defined and indiscernible objects have been integrated with it. These new methods of counting have been shown to be applicable to the extension of fundamental measures of RST , rough inclusion measures and consistency degrees of knowledge. The redefined measures possess more information than the original measures and have more realistic orientation with respect to counting. The connections with semantic domains, that are often never explicitly formulated, has been brought into sharp focus through the approach. The concept of rough naturals in the IPC perspective has also been developed in this paper. The new program centred around the contamination problem proposed in this paper can also be found in another forthcoming paper by the present author on axiomatic theory of granules for RST . Here the direction is made far more clearer through the integration with rough naturals. By the mathematics of vagueness, I do not mean a blind transfer of the results of the mathematics of exact contexts to inexact contexts. It is intended to incorporate vagueness in more natural and amenable ways in the light of the contamination problem. An essential part of this is achieved in this research paper. ## Acknowledgement I would like to extend my thanks to the referee(s) for useful comments and pointing lapses in the use of the English language. ## References - 1. Skowron, A., Peters, J.: Rough-granular computing. In Pedrycz, W., Skowron, A., Kreinovich, V., eds.: Granular Computing. John Wiley &amp; Sons, Ltd., Chichester, UK (2008) 225-328 - 2. Pawlak, Z.: An inquiry into vagueness and uncertainty. PAS Institute of Computer Science 29/94 (1994) - 3. Pagliani, P., Chakraborty, M.: A Geometry of Approximation: Rough Set Theory: Logic, Algebra and Topology of Conceptual Patterns. Springer, Berlin (2008) - 4. Bazan, J., Skowron, A., Swiniarski, R.: Rough sets and vague concept approximation: From sample approximation to adaptive learning. Trans. on Rough Sets V, LNCS 4100 (2006) 39-62 - 5. Skowron, A.: Rough sets and vague concepts. Fund. Inform. 64 (2005) 417-431 - 6. Mani, A.: Towards logics of some rough perspectives of knowledge. In Suraj, Z., Skowron, A., eds.: Intelligent Systems Reference Library dedicated to the memory of Prof. Pawlak,. In Press (2011) 25pp - 7. Banerjee, M., Chakraborty, M.K.: Foundations of vagueness: A categorytheoretic approach. Electronic Notes in Theoretical Computer Science 82 (2003) 10-19 - 8. Weiner, J.: Science and semantics: The case of vagueness and supervaluation. Pacific Philosophical Quarterly 88 (2007) 355-374 - 9. Shapiro, S.: Vagueness in Context. Oxford University Press, Oxford, UK (2006) - 10. Keefe, R.: Theories of Vagueness. Cambridge University Press, Cambridge, UK (2000) - 11. Keefe, R., Smith, P.: Vagueness: A Reader. MIT Press, Cambridge, MA (1999) - 12. Russell, B.: Vagueness. The Australasian Journal of Psychology and Philosophy 1 (1923) 84-92 - 13. Pawlak, Z.: Vagueness - a rough set view. In Mycielski, J., Rozenberg, G., Salomaa, A., eds.: Structures in Logic and Computer Science, LNCS 1261. Springer, Berlin (1997) 106-117 - 14. Bonikowski, Z., Wybraniec-Skardowska, U.: Vagueness and roughness. Trans. on Rough Sets IX, LNCS 5390 (2008) 1-13 - 15. Dubois, D., Prade, H.: Fuzzy Sets and Systems. Academic Press, New York (1980) - 16. Polkowski, L.: Rough Sets: Mathematical Foundations. Physica-Verlag, Heidelberg (2002) - 17. Pawlak, Z.: Rough Sets: Theoretical Aspects of Reasoning About Data. Kluwer Academic Publishers, Dodrecht (1991) - 18. Mani, A.: Choice inclusive general rough semantics. Information Sciences 181 (2011) 1097-1115 - 19. Pawlak, Z.: Some issues in rough sets. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets- I. Volume 3100. Springer Verlag (2004) 1-58 - 20. Polkowski, L., Skowron, A.: Rough mereology: A new paradigm for approximate reasoning. Internat. J. Appr. Reasoning 15 (1996) 333-365 - 21. Lin, T.Y.: Granular computing -1: The concept of granulation and its formal model. Int. J. Granular Computing, Rough Sets and Int Systems 1 (2009) 21-42 - 22. Yao, Y.: The art of granular computing. In Kryszkiewicz, M., et al., eds.: RSEISP'2007, LNAI 4585, Springer Verlag (2007) 101-112 - 23. Zhang, M.W.X., Wu, W.Z., Li, T.J.: Granulation. In An, A., Yao, J.T., et al., eds.: RSFDGrC 2007, LNAI 4481. Springer-Verlag (2007) 93-100 - 24. Wasilewski, P., Slezak, D.: Foundations of rough sets from vagueness perspective. In Hassanien, A., et al., eds.: Rough Computing: Theories, Technologies and Applications. Information Science Reference. IGI, Global (2008) 1-37 - 25. Keet, C.M.: A Formal Theory of Granules - Phd Thesis. PhD thesis, Fac of Comp.Sci., Free University of Bozen (2008) - 26. Polkowski, L.: Rough mereology as a link between rough and fuzzy set theories. In Peters, J.F., Skowron, A., eds.: Transactions on Rough Sets. Volume LNCS 3135. Springer Verlag (2004) 253-277 - 27. Takeuti, G.: Proof Theory. 2nd edn. North Holland, Amsterdam (1987) - 28. Font, J.M., Jansana, R.: A General Algebraic Semantics for Sentential Logics. Volume 7. Association of Symbolic Logic (2009) - 29. Banerjee, M., Chakraborty, M.K.: Rough sets through algebraic logic. Fundamenta Informaticae 28 (1996) 211-221 - 30. Duntsch, I.: Rough sets and algebras of relations. In Orlowska, E., ed.: Incomplete Information and Rough Set Analysis, Physica, Heidelberg (1998) 109-119 - 31. Mani, A.: Super rough semantics. Fundamenta Informaticae 65 (2005) 249-261 - 32. Pawlak, Z.: Rough sets. Internat. J. of Computing and Information Sciences 18 (1982) 341-356 - 33. Skowron, A., Stepaniuk, O.: Tolerance approximation spaces. Fundamenta Informaticae 27 (1996) 245-253 - 34. Komorowski, J., Pawlak, Z., Polkowski, L., Skowron, A.: Rough sets - a tutorial. In Pal, S.K., Skowron, A., eds.: Rough Fuzzy Hybridization. Springer Verlag (1999) 3-98 - 35. Cattaneo, G.: Abstract approximation spaces for rough set theory. In Polkowski, L., Skowron, A., eds.: Rough Sets in Knowledge Discovery 2. Physica Heidelberg (1998) 59-98 - 36. Konikowska, B.: A logic for reasoning with similarity. In Orlowska, E., ed.: Incomplete Information and Rough Set Analysis, Physica Verlag, Heidelberg (1998) 461-490 - 37. Inuiguchi, M.: Generalisation of rough sets and rule extraction. In Peters, J.F., Skowron, A., eds.: Transactions on Rough Sets-1. Volume LNCS-3100. Springer Verlag (2004) 96-116 - 38. Slezak, D., Wasilewski, P.: Granular sets - foundations and case study of tolerance spaces. In An, A., Stefanowski, J., Ramanna, S., Butz, C.J., Pedrycz, W., Wang, G., eds.: RSFDGrC 2007, LNCS. Volume 4482. Springer (2007) 435-442 - 39. Mani, A.: Algebraic semantics of similarity-based bitten rough set theory. Fundamenta Informaticae 97 (2009) 177-197 - 40. Pomykala, J.A.: Approximation, similarity and rough constructions. Technical Report CT-93-07, ILLC, Univ of Amsterdam (1993) - 41. Cattaneo, G., Ciucci, D.: Algebras for rough sets and fuzzy logics. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets II. Volume 2. Springer Verlag (2004) 208-252 - 42. Zakowski, W.: Approximation in the space ( u, π ). Demonstration Math XVI (1983) 761-769 - 43. Yao, Y.: Relational interpretation of neighbourhood operators and rough set approximation operators. Information Sciences (1998) 239-259 - 44. Li, T.J.: Rough approximation operators in covering approximation spaces. In Greco, S., et al., eds.: RSCTC 2006. LNCS (LNAI) 4259, Springer Verlag (2006) 174-182 - 45. Zhu, W.: Relationship between general rough set based on binary relation and covering. Information Sciences 179 (2009) 210-225 - 46. Samanta, P., Chakraborty, M.K.: Covering based approaches to rough sets and implication lattices. In Sakai, H., et al., eds.: RSFDGrC '2009, LNAI 5908, Springer (2009) 127-134 - 47. Mani, A.: Esoteric rough set theory-algebraic semantics of a generalized vprs and vprfs. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets VIII. Volume LNCS 5084. Springer Verlag (2008) 182-231 - 48. Mani, A.: Towards an algebraic approach for cover based rough semantics and combinations of approximation spaces. In Sakai, H., et al., eds.: RSFDGrC 2009. Volume LNAI 5908., Springer-Verlag (2009) 77-84 - 49. Mani, A.: Integrated dialectical logics for relativised general rough set theory. In: Internat. Conf. on Rough Sets, Fuzzy Sets and Soft Computing, Agartala, India, http://arxiv.org/abs/0909.4876 (2009) 6pp (Refereed) - 50. Mundici, D.: Generalization of abstract model theory. Fundamenta Math 124 (1984) 1-25 - 51. Banerjee, M., Yao, Y.: Categorical basis for granular computing. In Stefanowski, J., Ramanna, S., Butz, C.J., Pedrycz, W., Wang, G., eds.: RSFDGrC 2007, LNAI. Springer (2007) 427-434 - 52. Banerjee, M., Khan, M.A.: Propositional logics for rough set theory. In: Transactions on Rough Sets VI, LNCS 4374, Springer Verlag (2007) 1-25 - 53. Banerjee, M., Chakraborty, M.K.: Algebras from rough sets - an overview. In Pal, S.K., et. al, eds.: Rough-Neural Computing. Springer Verlag (2004) 157-184 - 54. Yao, Y.: A partition model for granular computing. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets-1, LNCS 3100. Springer (2004) 232-253 - 55. Pagliani, P., Chakraborty, M.K.: Formal topology and information systems. In: Transactions on Rough Sets VI, Springer (2007) 253-297 - 56. Mani, A.: Dialectics of counting and measures of rough set theory. In: IEEE Proceedings of NCESCT'2011, Pune, Feb-1-3, Arxiv:1102.2558 (2011) 17pp - 57. Arnold, D., Fowler, K.: Nefarious numbers. Notices Amer. Math. Soc. 58 (2011) - 58. Fine, K.: Vagueness, truth and logic. Synthese 30 (1975) 265-300 - 59. Dummet, M.: The Logical Basis of Metaphysics. Harvard University Press (1991) - 60. Simon, P.: Parts - A Study in Ontology. Oxford Univ. Press (1987) - 61. Lewis, D.K.: Parts of Classes. Oxford; Basil Blackwell (1991) - 62. Varzi, A.: Parts, wholes and part-whole relations: The prospects of mereotopology. Data and Knowledge Engineering 20 (1996) 259-286 - 63. Polkowski, L. In: Rough Neural Computation Model Based on Rough Mereology. Springer Verlag (2004) 85-108 - 64. Grzegorczyk, A.: The systems of lesniewski in relation to contemporary logical research. Studia Logica 3 (1955) 77-95 - 65. Polkowski, L., Polkowska, S.M.: Reasoning about concepts by rough mereological logics. In Wang, G., et al., eds.: RSKT 2008, LNAI 5009, Springer (2008) 197-204 - 66. Urbaniak, R.: Lesniewski's Systems of Logic and Mereology;History and Reevaluation. PhD thesis, Department of Philosophy, Univ of Calgary (2008) - 67. Vopenka, P.: Mathematics in the Alternative Set Theory. Teubner-Verlag (1979) - 68. Vopenka, P., Hajek, P.: The Theory of Semisets. Academia, Prague (1972) - 69. Iwinski, T.B.: Rough orders and rough concepts. Bull. Pol. Acad. Sci (Math) (3-4) (1988) 187-192 - 70. Cattaneo, G., Ciucci, D.: Lattices with interior and closure operators and abstract approximation spaces. In Peters, J.F., et al., eds.: Transactions on Rough Sets X, LNCS 5656. Springer (2009) 67-116 - 71. Perry, B., Dockett, S.: Young children's access to powerful mathematical ideas. In English, L., et al., eds.: Handbook of International Research in Mathematics Education. LEA (2002) 81-112 - 72. Satyanarayana, M.: Positively Ordered Semigroups. Volume 42 of Lecture Notes in Pure and Applied Mathematics. Marcel Dekker Inc. (1979) - 73. Mani, A.: V-perspectives, pseudo-natural number systems and partial orders. Glasnik Math. 37 (2002) 245-257 - 74. Ciucci, D.: Approximation algebra and framework. Fundamenta Informaticae 94 (2009) 147-161 - 75. Sen, D., Pal, S.K.: Generalized rough sets, entropy and image ambiguity measures. IEEE Trans. -PartB: Cybernetics 39 (2008) 117-128 - 76. Pagliani, P.: Pretopologies and dynamic spaces. Fundamenta Informaticae 59 (2004) 221-239 - 77. Khan, M.A., Banerjee, M.: Formal reasoning with rough sets in multiple-source approximation spaces. Internat. J. Approximate Reasoning 49 (2008) 466-477 - 78. Novotny, M., Pawlak, Z.: Characterization of rough top and bottom equalities. Bull. Pol. Acad. Sci (Math) 33 (1985) 91-97 - 79. Hodges, W.: Elementary predicate logic. In Gabbay, D., Guenthner, F., eds.: Handbook of Philosophical Logic. Academic, Kluwer (2004) 1-130 - 80. Ziarko, W.: Variable precision rough set model. J. of Computer and System Sciences 46 (1993) 39-59 - 81. Rolka, A.M., Rolka, L.: Variable precision fuzzy rough sets. In Peters, J.F., Skowron, A., eds.: Transactions in Rough Sets-1. Volume LNCS 3100. Springer Verlag (2004) 144-160 - 82. Carrara, M., Martino, E.: On the ontological commitment of mereology. Rev. Symb. Logic 2 (2009) 164-174 - 83. Qian, Y.H., Liang, J.Y.: Rough set method based on multi- granulations. In: Proc. 5th IEEE Conf. Cognitive Informatics. Volume 1. (2006) 297-304 - 84. Qian, Y., Liang, J.Y., Yao, Y.Y., Dang, C.Y.: Mgrs: A multi granulation rough set. Information Science 180 (2010) 949-970 - 85. Qian, Y.H., Liang, J.Y., Dang, C.Y.: Incomplete mutigranulation rough set. IEEE Transactions on Systems, Man and Cybernetics, Part A 20 (2010) 420-430 - 86. Slowinski, R., Vanderpooten, D.: A generalized definition of rough approximations based on similarity. IEEE Trans on Knowledge and Data Engg. 12 (2000) 331-336 - 87. Mani, A.: Meaning, choice and similarity based rough set theory. Internat. Conf. Logic and Appl., Jan'2009 Chennai;(Refereed), http://arxiv.org/abs/0905.1352 (2009) 1-12 - 88. Lin, T.Y.: Neighbourhood systems- applications to qualitative fuzzy and rough sets. In Wang, P.P., et al., eds.: Advances in Machine Intelligence and Soft Computing' Duke University, Durham'1997. (1997) 132-155 - 89. Zhu, W.: Topological approaches to covering rough sets. Information Sciences 177 (2007) 1499-1508 - 90. Chajda, I., Niederle, J., Zelinka, B.: On existence conditions for compatible tolerances. Czech. Math. J 26 (1976) 304-311 - 91. Jarvinen, J.: Lattice theory for rough sets. In Peters, J.F., et al., eds.: Transactions on Rough Sets VI. Volume LNCS 4374. Springer Verlag (2007) 400-498 - 92. Orlowska, E., Rewitz, I.: Discrete duality and its application to reasoning with incomplete information. In Kryszkiewicz, M., et al., eds.: RSEISP'2007, LNAI 4585, Springer Verlag (2007) 51-56 - 93. Orlowska, E.: Kripke semantics for knowledge representation logics. Studia Logica XLIX (1990) 255-272 - 94. Hartonas, C.: Duality for lattice ordered algebras and for normal algebraizable logics. Studia Logica 58 (1997) 403-450 - 95. Chakraborty, M.K., Samanta, P.: Consistency degree between knowledges. In Kryszkiewicz, M., et al., eds.: RSEISP'2007. Volume LNAI 4583., Springer Verlag (2007) 133-141 - 96. Gomolinska, A.: On certain rough inclusion functions. In Peters, J.F., et al., eds.: Transactions on Rough Sets IX, LNCS 5390. Springer Verlag (2008) 35-55 - 97. Banerjee, M., Chakraborty, M.K., Bunder, M.: Some rough consequence logics and their interrelations. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets VIII. Volume LNCS 5084., Springer Verlag (2008) 1-20 - 98. Yao, Y.: Semantics of fuzzy sets in rough set theory. In Skowron, A., Peters, J.F., eds.: Transactions on Rough Sets II. Number LNCS 3135. Springer Verlag (2005) 297-318 - 99. Ramik, J., Vlach, M.: A non-controversial definition of fuzzy sets. In Skowron, A., Peters, J.F., et al., eds.: Transactions on Rough Sets II. Volume II., Springer (2004) 201-207
null
[ "A. Mani" ]
2014-08-05T21:33:51+00:00
2014-08-05T21:33:51+00:00
[ "math.LO" ]
Dialectics of Counting and the Mathematics of Vagueness
New concepts of rough natural number systems are introduced in this research paper from both formal and less formal perspectives. These are used to improve most rough set-theoretical measures in general Rough Set theory (\textsf{RST}) and to represent rough semantics. The foundations of the theory also rely upon the axiomatic approach to granularity for all types of general \textsf{RST} recently developed by the present author. The latter theory is expanded upon in this paper. It is also shown that algebraic semantics of classical \textsf{RST} can be obtained from the developed dialectical counting procedures. Fuzzy set theory is also shown to be representable in purely granule-theoretic terms in the general perspective of solving the contamination problem that pervades this research paper. All this constitutes a radically different approach to the mathematics of vague phenomena and suggests new directions for a more realistic extension of the foundations of mathematics of vagueness from both foundational and application points of view. Algebras corresponding to a concept of \emph{rough naturals} are also studied and variants are characterised in the penultimate section.
1408.1122v1
## Tuning spin orbit interaction in high quality gate-defined InAs one-dimensional channels J. Shabani , Younghyun Kim , A. P. McFadden , R. M. Lutchyn , C. Nayak 1 2 3 4 2 4 , , and C. J. Palmstrøm 1 3 5 , , 1 California NanoSystems Institute, University of California, Santa Barbara, CA 93106, USA 2 Department of Physics, University of California, Santa Barbara, CA 93106, USA 3 Department of Electrical Engineering, University of California, Santa Barbara, CA 93106, USA 4 Microsoft Research, Station Q, University of California, Santa Barbara, CA 93106, USA 5 Materials Department, University of California, Santa Barbara, CA 93106, USA (Dated: August 7, 2014) Spin-orbit coupling in solids describes an interaction between an electron's spin, an internal quantum-mechanical degree of freedom, with its linear momentum, an external property. Spinorbit interaction, due to its relativistic nature, is typically small in solids, and is often taken into account perturbatively. It has been recently realized, however, that materials with strong spinorbit coupling can lead to novel states of matter such as topological insulators and superconductors [1-4]. This exciting development might lead to a number of useful applications ranging from spintronics to quantum computing [5-8]. In particular, theory [9-12] predicts that narrow band gap semiconductors with strong spin-obit coupling are a suitable platform for the realization of Majorana zero-energy modes, predicted to obey exotic non-Abelian braiding statistics [13]. The pursuit for realizing Majorana modes in condensed matter systems and investigating their exotic properties has been a subject of intensive experimental research recently [14-19]. Here, we demonstrate the first realization of gate-defined wires where one-dimensional confinement is created using electrostatic potentials, on large area InAs two dimensional electron systems (2DESs). The electronic properties of the parent 2DES are fully characterized in the region that wires are formed. The strength of the spin-orbit interaction has been measured and tuned while the high mobility of the 2DES is maintained in the wire. We show that this scheme could provide new prospective solutions for scalable and complex wire networks. One-dimensional (1D) semiconducting quantum wires with strong spin-orbit interaction represent a unique platform for realizing Majorana zero-modes [11, 12]. Epitaxial growth of two-dimensional heterostructures containing InAs layers is hypothesized to be a suitable system since InAs has strong spin-orbit coupling and large gfactor. In addition, Fermi level pinning in the conduction band at the surface of InAs could be used to control the transparency of InAs-superconductor interfaces, which is a necessary condition for Majorana devices. Recent experiments on MOCVD grown self-assembled nanowires have shown great progress in revealing signatures of zero-energy Majorana bound states [14-19]. However, the next step in controlled assembly of nanowire networks [20] using a bottom-up approach for scaling and building complex architectures poses a challenge for selfassembled nanowires. Molecular beam epitaxy (MBE) growth of large area two-dimensional systems (2DESs) combined with semiconductor processing techniques in a top-down approach could provide a new avenue toward complex architectures. Fabrication of gate-defined devices on these systems is highly desirable as it offers the possibility of tuning confinement potential, carrier density, and spin-orbit coupling. The spin-orbit interaction in 1D has been studied in self-assembled InAs nanowires [21] and etched quantum wires [22]. Large spin-orbit values have been measured through weak antilocalization (WAL). However, the latter effect is suppressed in narrower wires because the associated suppression of the diffusion constant causes WAL to evolve into weak localization (WL) [21-25]. The strength of spin-orbit coupling is crucially important for the stability of an emergent topological phase in semiconductor-superconductor heterostructures since the energy gap is proportional to the spin-orbit coupling strength [26]. Furthermore, the detrimental effect of disorder on the topological phase must be minimized. Indeed, it has been shown [27-30] that impurity scattering, which is particularly important in onedimensional structures, drives a quantum phase transition from the Majorana-carrying superconducting phase to a trivial phase with no Majorana zero-modes in the nanowire. Hence it is important to have both large spinorbit coupling and high mobility in the semiconductor nanowires. It has been estimated theoretically that in order to observe Majorana zero modes, wire mobilities should be larger than 10 5 cm /Vs [30, 31]. Thus, growth 2 of a high-mobility 2DES on different crystal orientations and quantum well asymmetries would allow for both engineering of spin-orbit coupling strength and preserving high electron mobilities in gate-defined wires. Gate-defined one-dimensional wires have been realized in GaAs 2D quantum wells and have led to major developments, such as sensitive spin qubits [32] and exotic interferometry devices [33, 34]. Unlike in GaAs, reliable gating has proven difficult in InAs due to gate leakage and hysteretic behavior. In addition, charge traps and Fermi level pinning could screen the applied electric field and significantly reduce the gate efficiencies. These difficulties are surmounted in the present work, in which we grow high-mobility InAs heterostructures using MBE and demonstrate the fabrication of clean wires using surface gates. ## Experimental approach High mobility InAs quantum wells have typically been grown on closely lattice matched antimonide barriers (GaSb, AlSb) [35]. These structures typically have high carrier densities which are difficult to deplete using surface gates. An alternate approach to growing InAs quantum wells on lattice matched antimonide barriers is the pseudomorphic growth of a thin strained layer of InAs on arsenide barriers (InGaAs, InAlAs). Relatively low electron densities could be achieved using this approach due to the different line-up of the impurity levels in InAlAs (compared to AlSb) barriers [36]. In this work we focus our effort on this latter approach. The 2DES is realized in an unintentially doped structure, grown on a semiinsulating InP (100) substrate using a modified V80H molecular beam epitaxy system. We start with growing a superlattice of In 0 53 . Ga 0 47 . As and In 0 52 . Al 0 48 . As at T sub = 480 o C on InP substrate. Then the substrate temperature is lowered to T sub =360 o C and In x Al 1 -x As buffer is step-graded from x = 0.52 to 0.8 and then stepped down to x =0.75. The electrons are confined to a 4 nm strained InAs layer inside an In 0 75 . Ga 0 25 . As quantum well [37]. The quantum well and top barriers are grown at a substrate temperature of T sub = 420 o C [38]. The As flux has been adjusted to achieve a (2 × 3) surface reconstruction during the step-graded buffer layer growth and a (2 × 4) for the In 0 75 . Al 0 25 . As and the channel. For samples with optimized low-temperature buffer layers, we have achieved mobilities over 3 × 10 5 cm /Vs. 2 Figure 1 shows the schematic layout of the structure and the corresponding band-edge diagram calculated using a selfconsistent Schrodinger-Poisson solver. In order to avoid gate-leakage and increase gate-tunability, the structure is not capped with In 0 75 . Ga 0 25 . As where signatures of parallel conduction (and artifically higher mobility values) have been observed. Instead, the sample is capped with SiO . x The measured mobility as a function of density at 2 K is shown in Fig. 1(c). This dependence is well-fitted by µ ∼ n α , with α = 0 8 . at high density range ( n &gt; 2 × 10 11 cm -2 ). A value of α ∼ 0 8 . signifies that the mobility is limited by scattering from nearby background charged impurities [39]. This is consistent with the low value of the critical density n c ∼ 3 × 10 10 cm -2 we find for the metal-insulator transition. The density dependence of the conductivity ( σ ∼ ( n -n c ) δ ) exhibits an exponent of δ = 1.79 ( δ ∼ 1+ α ), and indicates that the localization is caused simply by carrier trapping at defects [39]. Figure 1(d) shows normalized magnetoresistance ( R B /R ( ) B =0 ) measurements performed as the density is varied in a gated-Hall bar at 2.5 K. The gate stability of the device allows us to probe the evolution of integer quantum Hall states as a function of density and map the Landau fan diagram. ## Gate-defined wires One-dimensional channels could be fabricated using surface split-gates where each gate creates lateral depletion and a 1D channel forms. Quantized plateaus observed in point contact geometries are hallmarks of ballistic transport in a 1D system [40, 41]. The quantum point contact (QPC) structure is also an essential building block for many other types of structures in mesoscopic physics, such as rings and quantum dots. Since the first observation of conductance quantization in QPCs on GaAs based structures [40, 41], the quantization has been reported in electron systems in several other materials such as SiGe [42], GaN [43], and AlAs [44]. For a long time, there has also been interest in ballistic 1D transport in systems such as InAs with strong spin-orbit interaction and the resulting spin-splitting of the energy bands at finite wavevectors [45]. The realization of highquality and stable QPCs in these systems, however, has been challenging. Earlier experiments on InAs showed quantization of conductance, however, a background conductance had to be substracted [46]. We use a split-gate design to fabricate point contacts and wires. Applying a negative DC voltage bias, V sg , to the side gates depletes the electrons under the gates. Once all electrons are depleted, a quasi-one-dimensional channel forms with a sudden drop of conductance (an example is shown in Fig. 2). Full depletion is achieved in our devices at V sg = -3.3 V and less than 10 pA of leakage current is measured at V sg = - 3.5 V. In the supplement, we show devices with point contact geometry where transport is ballistic and conductance exhibits a quantized plateau at (2e 2 /h) and a feature near 0.7(2 e /h 2 ) typically observed only in high quality GaAs quantum point contacts [47, 48]. We focus here only on the longer wires where transport is diffusive. In our device, we could characterize the 2DES properties in the same region where the wire is formed, which is a unique feature of the gate-defined wires. Figure 2b shows magneto-transport measurements at V sg = 0 V. Near zero magnetic field (Fig. 2a), we observe a weakantilocalization peak in the magneto-conductance due to the presence of spin-orbit coupling in our 2DES. The WAL is most useful as a tool in extracting spin-orbit parameters in moderately-disordered systems. Empirically, the WAL signal weakens and disappears as the mobility of the 2DES increases. This is mainly due to the vanishing probability of return in the interference paths for high-mobility samples. Here, we present data on a moderately lower mobility sample with µ ∼ 6 5 . × 10 4 cm /Vs 2 at V sg = 0V. The data is analyzed using the theory developed by Iordanski, Lyanda-Geller, and Pikus (ILP) for 2DES [49]. A spin orbit length, l so , of ≈ 0 76 . µ m and coherence length, l φ , of ≈ 3 µ m are obtained. The fit obtained using the ILP model is plotted as a solid line in Fig. 2a. While the actual charge distribution of electrons in the quantum well is unknown during cool down, band diagram calculations indicate that the charge distribution is not highly-asymmetric. This suggests that the Rashba spinorbit coupling due to the electric field may be weak and spin-orbit terms due to biaxial strain (due to growth) and Dresselhaus contributions may be dominant [50]. The fit suggests that in 2D, the spin splitting contour is isotropic in k-space and only one of the Rashba and Dresselhaus linear terms is dominant [51]. At V sg &lt; -1 8 . V, when the wire is subjected to magnetic field, it exhibits negative magneto-resistance which ends with a pronounced kink at a characteristic field B K , marking the field at which the classical cyclotron diameter equals the channel width [52, 53]. Using B K one can then estimate the width of the channel: w = 2 glyph[planckover2pi1] k F /eB K , where k F is the Fermi wavevector. Figure 3d shows an example of magneto-resistance data measured at V sg = -2.1 V. From the high magnetic field regime where SdH oscillations are dominant we deduce the carrier density and hence k F . An effective width of w ∼ 190 nm is then determined from the kink position in Fig 2d. We repeat these measurements for several V sg and obtain the corresponding wire widths. Similar to 2D, we also study spin orbit parameters in our wire using the weak antilocalization signal in magnetotransport. An example of the weak antilocalization signal is shown in Fig. 2c. ## Analysis and discussion In order to compare the spin orbit strength in our gatedefined wire with more stongly confined etched wires, we have fabricated single etched wires on similar InAs heterostructures. The wires were defined by electron beam lithography and dry etching. Ohmic contacts were made and the magneto transport measured as shown in Fig. 3a. Similar to the gate-defined wires, we determined the carrier density of the structure from the high magnetic field regime and using the kink position in magneto-resistance we obtain the width of the wire to be w ∼ 350 nm. In Fig. 3b we observe geometrical resonances in magneto- resistance and a strong dip at zero magnetic field. The spin orbit parameters are extracted using our quasi-1D model for conductivity at nonzero magnetic field [54, 55]: $$\stackrel { \dots } { \dots } \nolimits _ { \Sigma } \quad \stackrel { \dots } { \dots } \nolimits _ { L } \nu, \, \times \nolimits _ { L } } { \text{van} } \, \text{s for} \, \quad \delta \sigma _ { 1 D } ( B ) = \frac { e ^ { 2 } } { h } & \left [ \left ( \frac { 1 } { l _ { \phi } ^ { 2 } } + \frac { 1 } { l _ { B } ^ { 2 } } \right ) ^ { - \frac { 1 } { 2 } } - \left ( \frac { 1 } { l _ { \phi } ^ { 2 } } + \frac { 1 } { l _ { B } ^ { 2 } } + \frac { 2 r } { l _ { s o } ^ { 2 } } \right ) ^ { - \frac { 1 } { 2 } } \\ \cdot \text{for} \, \quad \delta \sigma _ { 1 D } \quad \left ( \frac { 1 } { l _ { \phi } ^ { 2 } } + \frac { 1 } { l _ { B } ^ { 2 } } + \frac { r } { l _ { s o } ^ { 2 } } \right ) ^ { - \frac { 1 } { 2 } } \right ], \quad \left ( 1 \right ) \\ \cdot \text{for} \, \quad \delta \sigma _ { 1 D } \quad \left ( \frac { 1 } { l _ { \phi } ^ { 2 } } + \frac { 1 } { l _ { B } ^ { 2 } } + \frac { r } { l _ { s o } ^ { 2 } } \right ) ^ { - \frac { 1 } { 2 } } \right ],$$ where r is a width-dependent coefficient that characterizes the effective strength of the spin-orbit coupling, r = ( w/l so ) 2 / 12 and l B is magnetic length. We also include the flux cancellation effect [56]. The fits obtained using Eq. 1 are shown in Fig. 2c and Fig. 3c. We have summarized the extracted spin-orbit parameters, l so , l φ in Fig. 4(a,b). The soft boundaries created by the electric field in our gate-defined wires lead to large values of l φ ∼ 2 µ m. This is consistent with the fact that l φ has a weak dependance on the wire width. In our etched wire, where the edges are exposed and edge roughness is introduced due to nanofabrication, l φ drops to 60 % of the gate-defined wires. However, the spin-orbit length is smaller due to stronger confinement. Strong spin orbit interaction in our wires is reflected in small values of l so and is temperature indepedent. On the other hand, l φ is a temperature-dependent quantity, affected by electron-electron interactions and boundary scattering in 1D. For a fixed temperature, l φ is related to the diffusion constant, D , and dephasing time, τ φ , through l φ = √ Dτ φ . The diffusion constant depends on the amount of disorder present in the sample. In the quasi-1D limit, it is related to mean free path, l e , according to D = 1 2 v f l e . Hence a large value of l φ indicate less disorder and cleaner transport, for a fixed τ φ . In the context of topological phases, spin orbit interaction sets the upper bound for the energy gap of the topological phase in a clean system. In a system where disorder is present, this gap is reduced and vanishes in highly disordered wires. In self-assembled nanowires very small values of spin orbit length ( ∼ 100 nm) have been achieved due to the strong confinement. For typical InAs nanowires where surface is exposed, the mean free path has been also limited to ∼ 100 nm mainly due to surface scattering [57]. Core-shell growth of InAs wires with surface coverage of a protective layer could in principle reduce the surface scattering centers and are currently under investigation [58, 59]. Ideally large value of l φ and small value of l so is needed for these systems and hence it seems natural to define the ratio l φ /l so as a figure of merit. Figure 4c shows the ratio l φ /l so as a function wire width. We have also plotted data for InAs nanowires from Ref. [21] taken at T = 0.2 K for comparison. Although the data is taken at higher temperature compared to our data, l φ ∼ 250 nm shows a saturation for tempera- tures below 0.4 K. From the data in Fig. 4c it is clear that less exposure of surfaces for one-dimensional channels is the key to maintain the quality and limit the surface scattering. In the work reported here, we have demonstrated that gate-defined InAs nanowires are a viable alternative to self-assembled vapor-liquid-solid InAs nanowire systems. Utilizing gate-controlled confinement not only preserves the quality of the wires but also offers greater tunability. Most importantly, the electronic properties are characterized in 2D before and after the formation of the gateddefined wires. This allows us to quantitatively compare the effect of disorder in gate- and etched-defined wires. The high quality of the wires and strong spin-orbit interaction characterized here show great promise for fabricating more complicated structures. Nanofabrication of gate-defined structures on these materials offers endless possibilities for exploring new directions. Our findings are expected to spark interest in large-scale device applications in spintronics as well as the search for Majorana states. Our work was supported by the Microsoft Research. A portion of this work was performed at the National High Magnetic Field Laboratory, which is supported by NSF Cooperative Agreement No. DMR-1157490, the State of Florida, and the U.S. DOE. [1] Wilczek, F. Majorana returns. Nature Phys. , 5 , 614-618, (2009). [2] Stern, A. Majorana returns. Nature , 464 , 187-193, (2010). - [3] Franz, M. Race for majorana fermions. Physics , 3 , 24, (2010). - [4] Nayak, C. Majorana returns. Nature , 464 , 693-694, (2010). - [5] Hasan, M. Z. and Kane, C. L. Colloquium: Topological insulators. Rev. Mod. Phys. , 82 , 3045-3067, (2010). [6] Qi, X.-L. and Zhang, S.-C. Topological insulators and superconductors. Rev. Mod. Phys. , 83 , 1057-1110, (2011). - [7] Alicea, J. New directions in the pursuit of majorana fermions in solid state systems. Reports on Progress in Physics , 75 , 076501, (2012). - [8] Beenakker, C. W. J. Search for majorana fermions in superconductors. Annual Review of Condensed Matter Physics , 4 , 113-136, (2013). - [9] Sau, J. D., Lutchyn, R. M., Tewari S., and Das Sarma, S. Generic new platform for topological quantum computation using semiconductor heterostructures. Phys. Rev. Lett. , 104 , 040502, (2010). - [10] Alicea, J. Majorana fermions in a tunable semiconductor device. Phys. Rev. B , 81 , 125318, (2010). - [11] Lutchyn, R. M., Sau J. D., and Das Sarma, S. Majorana fermions and a topological phase transition in semiconductor-superconductor heterostructures. Phys. Rev. Lett. , 105 , 077001, (2010). - [12] Oreg, Y., Refael, G. and von Oppen, F. Helical liquids - and majorana bound states in quantum wires. Phys. Rev. Lett. , 105 , 177002, (2010). - [13] Nayak, C., Simon, S. H., Stern, A., Freedman, M. and Das Sarma, S.. Non-abelian anyons and topological quantum computation. Rev. Mod. Phys. , 80 , 1083, (2008). - [14] Mourik, V., et al. Signatures of Majorana Fermions in Hybrid Superconductor-Semiconductor Nanowire Devices. Science , 336 , 1003, (2012). - [15] Rokhinson, L. P., Liu, X. and Furdyna, J. K. Observation of the fractional ac josephson effect: the signature of majorana particles. Nature Phys. , 8 , 795, (2012). - [16] Das, A., et al. Zero-bias peaks and splitting in an AlInAs nanowire topological superconductor as a signature of Majorana fermions. Nature Phys. , 8 , 887, (2012). - [17] Deng, M. T., et al. Observation of Majorana Fermions in a Nb-InSb Nanowire-Nb Hybrid Quantum Device. Nano Lett. , 12 , 6414, (2012). - [18] Finck, A. D. K., et al. Anomalous modulation of a zero bias peak in a hybrid nanowire-superconductor device. Phys. Rev. Lett. , 110 , 126406, (2013). - [19] Churchill, H. O. H., et al. Superconductor-nanowire devices from tunneling to the multichannel regime: Zerobias oscillations and magnetoconductance crossover. Phys. Rev. B , 87 , 241401, (2013). - [20] Alicea, J., et al. Non-abelian statistics and topological quantum information processing in 1d wire networks. Nature Phys. , 7 412, (2011). - [21] Hansen, A. E., et al. Spin relaxation in inas nanowires studied by tunable weak antilocalization. Phys. Rev. B , 71 , 205328, (2005). - [22] Schäpers, T., et al. Suppression of weak antilocalization in Ga x In 1 -x As/InP narrow quantum wires. Phys. Rev. B , 74 , 081301, (2006). - [23] Kunihashi, Y., Kohada, M., and Nitta, J. Experimental demonstration of resonant spin-orbit interaction effect. Physics Procedia , 3 , 1255, (2010). - [24] Roulleau, P., et al. Suppression of weak antilocalization in InAs nanowires. Phys. Rev. B , 81 , 155449, (2010). - [25] Kallaher, R. L.,Heremans, J. J., van Roy, W., and Borghs, G.. Spin and phase coherence lengths in inas wires with diffusive boundary scattering. Phys. Rev. B , 88 , 205407, (2013). - [26] Sau, J. D., et al. Non-abelian quantum order in spinorbit-coupled semiconductors: Search for topological majorana particles in solid-state systems. Phys. Rev. B , 82 , 214509, (2010). - [27] Motrunich, O., Damle, K., and Huse, D. A. Griffiths effects and quantum critical points in dirty superconductors without spin-rotation invariance: One-dimensional examples. Phys. Rev. B , 63 , 224204, (2001). - [28] Gruzberg, I. A., Read, N., and Vishveshwara, S. Localization in disordered superconducting wires with broken spin-rotation symmetry. Phys. Rev. B , 71 , 245124, (2005). - [29] Brouwer, P. W., Duckheim, M., Romito, A., and von Oppen, F. Topological superconducting phases in disordered quantum wires with strong spin-orbit coupling. Phys. Rev. B , 84 , 144526, (2011). - [30] Lobos, A. M., Lutchyn, R. M. and Das Sarma, S. Interplay of disorder and interaction in majorana quantum wires. Phys. Rev. Lett. , 109 , 146403, (2012). - [31] Sau, J. D., Tewari, S., and Das Sarma, S. Experimental and materials considerations for the topological superconducting state in electronand hole-doped semicon- - ductors: Searching for non-abelian majorana modes in 1d nanowires and 2d heterostructures. Phys. Rev. B , 85 , 064512, (2012). - [32] Petta, J. R., et al. Coherent manipulation of coupled electron spins in semiconductor quantum dots. Science , 309 , 2180, (2005). - [33] Neder, I., et al. Interference between two indistinguishable electrons from independent sources. Nature , 448 , 333, (2007). - [34] Willett, R. L., Pfeiffer, L. N. and West, K. W. Measurement of filling factor 5/2 quasiparticle interference with observation of charge e/4 and e/2 period oscillations. PNAS , 106 , 8853, (2009). - [35] Kroemer, H. The 6.1Åfamily (InAs, GaSb, AlSb) and its heterostructures: a selective review. Physica E: Low-dimensional Systems and Nanostructures , 20 , 196, (2004). Proceedings of the 11th International Conference on Narrow Gap Semiconductors. - [36] Capotondi, F., et al. J. Vac. Sci Tech B , 22 , 702, (2004). - [37] Richter, A., et al. Transport properties of modulationdoped inas-inserted-channel inalas/ingaas structures grown on gaas substrates. Applied Physics Letters , 77 , 3227, (2000). - [38] Wallart, X., Lastennet, J., Vignaud, D., and Mollot, F.. Performances and limitations of InAs/InAlAs metamorphic heterostructures on inp for high mobility devices. Applied Physics Letters , 87 , 043504, (2005). - [39] Das Sarma, S. and Hwang, E. H. Universal density scaling of disorder-limited low-temperature conductivity in high-mobility two-dimensional systems. Phys. Rev. B , 88 , 035439, (2013). - [40] van Wees, B. J., et al. Quantized conductance of point contacts in a two-dimensional electron gas. Phys. Rev. Lett. , 60 , 848, (1988). - [41] Wharam, D. A., et al. J. Phys. C , 21 , L209, (1988). - [42] Wieser, U., Kunze, U., Ismail, K. and Chu, J. O. Quantum-ballistic transport in an etch-defined Si/SiGe quantum point contact. Applied Physics Letters , 81 , 1726, (2002). - [43] Chou, H. T., et al. High-quality quantum point contacts in GaN/AlGaN heterostructures. Applied Physics Letters , 86 , 073108, (2005). - [44] Gunawan, O., Habib, B., De Poortere, E. P., and Shayegan, M. Quantized conductance in an alas twodimensional electron system quantum point contact. Phys. Rev. B , 74 , 155436, (2006). - [45] Winkler, R. Spin-Orbit Coupling Effects in Two- - Dimensional Electron and Hole Systems . Springer Berlin, 2003. - [46] Koester, S. J., et al. Length dependence of quantized conductance in ballistic constrictions fabricated on InAs/AlSb quantum wells. Phys. Rev. B , 53 , 13063, (1996). - [47] Cronenwett, S. M, et al. Low-temperature fate of the 0.7 structure in a point contact: A kondo-like correlated state in an open system. Phys. Rev. Lett. , 88 , 226805, (2002). - [48] de Picciotto, R., Pfeiffer, L. N., Baldwin, K. W. and West, K. W. Temperature-dependent 0.7 structure in the conductance of cleaved-edge-overgrowth one-dimensional wires. Phys. Rev. B , 72 , 033319, (2005). - [49] Iordanskii, S. V. , Lyanda-Geller, Y. B. and Pikus, G. E. JETP Lett. , 60 , 206, (1994). - [50] Crooker, S. A. and Smith, D. L. Imaging spin flows in semiconductors subject to electric, magnetic, and strain fields. Phys. Rev. Lett. , 94 , 236601, (2005). - [51] Winkler, R. Spin orientation and spin precession in inversion-asymmetric quasi-two-dimensional electron systems. Phys. Rev. B , 69 , 045317, (2004). - [52] Shabani, J., Petta, J. R., and Shayegan, M. High-quality quantum point contact in two-dimensional GaAs (311)A hole system. Applied Physics Letters , 93 , 212101, (2008). - [53] van Houten, H., et al. Four-terminal magnetoresistance of a two-dimensional electron-gas constriction in the ballistic regime. Phys. Rev. B , 37 , 8534, (1988). - [54] Kettemann, S. Dimensional control of antilocalization and spin relaxation in quantum wires. Phys. Rev. Lett. , 98 , 176808, (2007). - [55] Kim, Y., Lutchyn, R. M., and Nayak, C. Origin and transport signatures of spin-orbit interactions in one- and two-dimensional SrTiO -based heterostructures. 3 Phys. Rev. B , 87 , 245121, (2013). - [56] Beenakker, C. W. J. and van Houten, H. Fluxcancellation effect on narrow-channel magnetoresistance fluctuations. Phys. Rev. B , 37 , 6544, (1988). - [57] Chuang, S., et al. Ballistic InAs nanowire transistors. Nano Letters , 13 , 555 (2013). - [58] Lauhon, L. J. , Gudiksen, M. S. , Wang, D., and Lieber, C. M. . Epitaxial core-shell and core-multishell nanowire heterostructures. Nature , , 420 , 57, (2002). - [59] Ziino, N. L. B., et al. Epitaxial aluminum contacts to InAs nanowires. arXiv: 1309.4569 , 2014. FIG. 1: (Color online) (a) Epitaxial structure of MBE grown InAs quantum well system capped with SiO x and top gate with corresponding band diagram and charge distribution of the active region shown in (b). (c) Mobility measured in a gated-Hall bar as a function of density. (d) 3D plot of normalized magneto-resistance traces ( R n = R(B)/R(B = 0)) as a function of gate voltage. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1122v1-figure-c4ff8a1d-b382-4af3-8069-d3786f13e0fe.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1122v1-figure-94ef4d70-511f-45b1-a229-cb645cd684f2.jpg) Vsg (V) FIG. 2: (Color online) (a) Weak antilocalization signal at V sg = 0 V in magneto-conductance near zero magnetic field. The fit obtained using the ILP model for 2DEG is shown in solid curve. (b) Shubnikov-de Haas oscillations at V sg = 0 V. Inset: SEM image of the split gate device. (c) same as (a) at V sg = -2.1 V. The fit obtained using Eq. 1 is shown in solid curve. (d) magneto-resistance through the constriction at V sg = -2.1 V. Shubnikov de Haas oscillations appear at B K . (e) Plot of conductance vs side gate bias with B = 0 T. The sharp drop in conductance indicates depletion of electrons under the side gates V sg ∼ -1.8 V. FIG. 3: (Color online) (a) Magneto-resistance data measured on a single etched wire. Inset shows an SEM image of the wire. The wire is 200 µ m long. (b) Low magnetic field region (indicated by red box in (a)) shows signature of geometrical resonances and a strong dip at zero magentic field. (c) The weak antilocalization signal in magneto-conductance is shown together with the fit (solid curve). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1122v1-figure-846fc992-98c2-4e26-babf-993d169498b2.jpg) FIG. 4: (Color online) (a) Spin orbit lengths and (b) coherent lengths extracted from weak antilocalization measurements for gate-defined and etched wires plotted as a function of wire width. The dashed lines shows the values extracted at V sg = 0 V (2D limit). (c) The ratio of l φ /l so is plotted from (a) and (b). For comparison we have plotted data taken in InAs self-assembled nanowires from Ref. [21]. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1122v1-figure-63198709-3377-473b-a41f-3885ba0f95fd.jpg)
null
[ "J. Shabani", "Younghyun Kim", "A. P. McFadden", "R. M. Lutchyn", "C. Nayak", "C. J. palmstrøm" ]
2014-08-05T21:34:57+00:00
2014-08-05T21:34:57+00:00
[ "cond-mat.mes-hall" ]
Tuning spin orbit interaction in high quality gate-defined InAs one-dimensional channels
Spin-orbit coupling in solids describes an interaction between an electron's spin, an internal quantum-mechanical degree of freedom, with its linear momentum, an external property. Spin-orbit interaction, due to its relativistic nature, is typically small in solids, and is often taken into account perturbatively. It has been recently realized, however, that materials with strong spin-orbit coupling can lead to novel states of matter such as topological insulators and superconductors. This exciting development might lead to a number of useful applications ranging from spintronics to quantum computing. In particular, theory predicts that narrow band gap semiconductors with strong spin-obit coupling are a suitable platform for the realization of Majorana zero-energy modes, predicted to obey exotic non-Abelian braiding statistics. The pursuit for realizing Majorana modes in condensed matter systems and investigating their exotic properties has been a subject of intensive experimental research recently. Here, we demonstrate the first realization of gate-defined wires where one-dimensional confinement is created using electrostatic potentials, on large area InAs two dimensional electron systems (2DESs). The electronic properties of the parent 2DES are fully characterized in the region that wires are formed. The strength of the spin-orbit interaction has been measured and tuned while the high mobility of the 2DES is maintained in the wire. We show that this scheme could provide new prospective solutions for scalable and complex wire networks.
1408.1123v2
## GORENSTEIN DIMENSIONS OVER SOME RINGS OF THE FORM R ⊕ C ## PYE PHYO AUNG Abstract. Given a semidualizing module C over a commutative noetherian ring, Holm and Jørgensen [14] investigate some connections between C -Gorenstein dimensions of an R -complex and Gorenstein dimensions of the same complex viewed as a complex over the 'trivial extension' R /multicloseleft C . We generalize some of their results to a certain type of retract diagram. We also investigate some examples of such retract diagrams, namely D'Anna and Fontana's amalgamated duplication [7] and Enescu's pseudocanonical cover [8]. ## 1. Introduction In this paper, R is a commutative noetherian ring with identity. As in the famous theorem of Auslander-Buchsbaum [2] and Serre [19] where projective dimension of R -modules is used to characterize regularity of R , Auslander and Bridger introduced Gorenstein dimension in [1] to characterize Gorenstein rings: a local ring R is Gorenstein if and only if every finitely generated R -module M has finite Gorenstein dimension, i.e., G-dim R M &lt; ∞ . To extend similar results to non-finitely generated R -modules, Enochs and Jenda introduced Gorenstein projective dimension [9]. In particular, a local ring is Gorenstein if and only if every (finitely generated) R -module M has finite Gorenstein projective dimension, i.e., Gpd R M &lt; ∞ ; see [4, 11]. Enochs and Jenda also studied the Gorenstein injective dimension Gid and, with Torrecillas [10], the Gorenstein flat dimension Gfd. Semidualizing R -modules, first introduced by Foxby in [12] and later studied by Vasconcelos [21] and Golod [13], arise naturally in the study of the connection between R and its modules: a finitely generated R -module C is semidualizing if R ∼ = Hom R ( C, C ) and Ext i R ( C, C ) = 0 for all i /greaterorequalslant 1. For example, Golod introduced the G C -dimension in [13] and proved a formula of the same type as the AuslanderBuchsbaum formula and the Auslander-Bridger formula. Holm and Jørgensen extended the G C -dimension in [14] by introducing three new homological dimensions called the C -Gorenstein projective, C -Gorenstein injective and C -Gorenstein flat dimensions, denoted as C -Gpd R ( M ), C -Gid R ( M ), and C -Gfd R ( M ), respectively, for an R -complex M . They also proved how these new dimensions coincide with Enochs, Jenda and Torrecillas' Gorenstein dimensions over the trivial extension R /multicloseleft C [14, Theorem 2.16]. This means that for an Date : March 17, 2015. 2010 Mathematics Subject Classification. 13D02, 13D05, 13D07. Key words and phrases. amalgamated duplication, Gorenstein homological dimensions, pseudocanonical cover, retract, semidulaizing modules, trivial extension. R -module M , one has C -Gpd R ( M ) = Gpd R /multicloseleft C ( M ) C -Gid R ( M ) = Gid R /multicloseleft C ( M ) $$C \text{-Gfd} _ { R } ( M ) = G f f d _ { R \times C } ( M ).$$ In this paper, we generalize the above result to a triple ( R,S,C ) in the setting of the following retract diagram /d47 /d47 /d31 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1123v2-figure-c827dbce-18b8-47f5-ad98-9f944be495c8.jpg) /d31 /d15 /d15 where R and S are commutative rings, C is an R -module, f and g are ring homomorphisms, and id R is the identity map on R , satisfying the following properties: - (i) C ∼ = Ker g , - (ii) Hom ( R S, C ) = ∼ S as S -modules, and - (iii) Ext i R ( S, C ) = 0 for all i /greaterorequalslant 1. It should be noted here that the triple ( R,R /multicloseleft C, C ) satisfies the above conditions if C is semidualizing over R . Therefore, the following result generalizes Holm and Jørgensen's Theorem 2.16 [14]; see Theorem 3.21. Theorem A. In the setting of the above retract diagram, if C is a semidualizing R -module, then for every homologically left-bounded R -complex M and every homologically right-bounded R -complex N one has C -Gid R ( M ) = Gid S ( M ) C -Gpd R ( N ) = Gpd S ( N ) $$C \text{-Gfd} _ { R } ( N ) = G f d _ { S } ( N ).$$ Along the way we also prove the following characterization of semidualizing modules; see Theorem 3.6. Theorem B. In the setting of the above retract diagram, if C is a finitely generated R -module, then the following are equivalent: - (a) C is semidualizing over R ; - (b) R is Gorenstein projective over S and Ann R ( C ) = 0 ; and - (c) C is Gorenstein projective over S and Ann R ( C ) = 0 . We show that S = R /multicloseleft C is not the only example of a ring satisfying our generalized settings set forth in the retract diagram above. See Theorems 4.4 and 4.9, along with their corollaries. Theorem C. The following examples satisfy the hypotheses of Theorem A, i.e. the triple ( R,S,C ) satisfies the conditions (i) through (iii) in the above retract diagram if we replace S with each of the following rings: - (a) D'Anna and Fontana's [7] amalgamated duplication S = R /triangleright /triangleleft C , and - (b) Enescu's [8] pseudocanonical cover S = S h ( ) , when h is a square in R . In particular, part (a) recovers the main result of Salimi, Tavasoli and Yassemi [17, Theorem 3.2], and part (b) regarding pseudocanonical covers is a new result. ## 2. Preliminaries We provide in this section some preliminary definitions and properties to be used later. We first extend a couple of results of Ishikawa [16] to our setting. Lemma 2.1. Let f : R → S be a ring homomorphism. Let S be finitely generated as an R -module, let M be an R -module, and let N be an injective R -module. Then the natural map $$\Theta _ { S, M, N } \colon S \otimes _ { R } \text{Hom} _ { R } ( M, N ) \to \text{Hom} _ { R } ( \text{Hom} _ { R } ( S, M ), N )$$ defined as (Θ S,M,N ( s ⊗ R ψ ))( φ ) = ψ φ s ( ( )) for each s ⊗ R ψ ∈ S ⊗ R Hom ( R M,N ) and each φ ∈ Hom ( R S, M ) , is an S -module isomorphism. Proof. By Ishikawa's Hom evaluation result [16, Lemma 1.6], Θ S,M,N is an R -module isomorphism. One readily checks that Θ S,M,N is also an S -module homomorphism, hence it is an S -module isomorphism. /square Lemma 2.2. Let f : R → S be a ring homomorphism. Let S be finitely generated as an R -module, let M be an R -module, and let N be a flat R -module. Then the natural map $$\Omega _ { S, M, N } \, \colon \text{Hom} _ { R } ( S, M ) \otimes _ { R } N \to \text{Hom} _ { R } ( S, M \otimes _ { R } N )$$ defined as Ω S,M,N ( ψ ⊗ R n )( s ) = ψ s ( ) ⊗ R n for each ψ ⊗ R n ∈ Hom ( R S, M ) ⊗ R N and each s ∈ S , is an S -module isomorphism. Proof. The proof is similar to that of Lemma 2.1, using Ishikawa's Tensor evaluation result instead. /square We collect here some properties of injectivity, projectivity and flatness associated with restriction of scalars. A version of this result for S = R /multicloseleft C is found in [15, Lemma 3.1]. Lemma 2.3. Let f : R → S be a ring homomorphism. - (a) Each injective S -module J is a direct summand of Hom ( R S, I ) for some injective R -module I . - (b) Each projective S -module Q is a direct summand of S ⊗ R P for some projective R -module P . Proof. (a) Since J is also an R -module via f , we have an exact sequence 0 → J → I of R -modules for some injective R -module I . Applying the left-exact Hom R ( S, -) to this exact sequence, noting that Hom S ( S, J ) is an S -submodule of Hom R ( S, J ), and using Hom cancellation, we obtain the following S -module iso/mono-morphisms. /d31 $$J \xrightarrow { \cong } \text{Hom} _ { S } ( S, J ) \xrightarrow { \cong } \text{Hom} _ { R } ( S, J ) \xrightarrow { \cong } \text{Hom} _ { R } ( S, I ).$$ /d127 /d47 /d47 /d31 /d127 /d47 /d47 Since J is injective over S , this composite monomorphism splits as desired. (b) This part is proved dually. /square We next define some useful classes of modules and resolutions. Definition 2.4. Let M be an R -module, and let A be a class of R -modules. Then an augmented A -resolution X + of M is an exact sequence of R -modules of the form $$\underline { X } ^ { + } = \cdots \xrightarrow { \partial _ { 2 } ^ { x } } X _ { 1 } \xrightarrow { \partial _ { 1 } ^ { x } } X _ { 0 } \to M \to 0$$ where X i ∈ A for each integer i /greaterorequalslant 0. The R -complex $$\underline { X } = \cdots \xrightarrow { \partial _ { 2 } ^ { X } } X _ { 1 } \xrightarrow { \partial _ { 1 } ^ { X } } X _ { 0 } \rightarrow 0$$ is the associated A -resolution of M . Definition 2.5. Let N be an R -module, and let B be a class of R -modules. Then an augmented B -coresolution + Y of N is an exact sequence of R -modules of the form $$^ { + } \underline { Y } = \ \ 0 \to N \to Y _ { 0 } \stackrel { \partial _ { 0 } ^ { Y } } { \longrightarrow } Y _ { - 1 } \stackrel { \partial _ { - 1 } ^ { Y } } { \longrightarrow } \cdots$$ where Y j ∈ B for each integer j /lessorequalslant 0. The R -complex $$\underline { Y } = \ \ 0 \to Y _ { 0 } \stackrel { \partial _ { 0 } ^ { Y } } { \longrightarrow } Y _ { - 1 } \stackrel { \partial _ { - 1 } ^ { Y } } { \longrightarrow } \cdots$$ is the associated B -coresolution of N . Notation 2.6. Let C be an R -module. - (a) Let I be the class of injective R -modules. - (b) Let P be the class of projective R -modules. - (c) Let F be the class of flat R -modules. - (d) Let I C be the class of R -modules isomorphic to Hom R ( C, I ) for some injective R -module I . - (e) Let P C be the class of R -modules isomorphic to C ⊗ R P for some projective R -module P . - (f) Let F C be the class of R -modules isomorphic to C ⊗ R F for some flat R -module F . The following two classes, known collectively as Foxby classes , are associated with a finitely generated R -module C . The definitions can be found in [3] and [5], and they are studied in conjunction with various homological dimensions, such as the G-dimension in [23], the C -projective dimension in [20] and the Gorenstein projective dimension in [22]. Definition 2.7. Let C be a finitely generated R -module. The Auslander class A C ( R ) is the class of all R -modules M such that - (a) the natural map γ C M : M → Hom ( R C, C ⊗ R M ), defined as γ C M ( m c )( ) := c ⊗ R m for all m ∈ M and c ∈ C , is an isomorphism; and - (b) Tor R i ( C, M ) = 0 = Ext i R ( C, C ⊗ R M ) for all i /greaterorequalslant 1. Definition 2.8. Let C be a finitely generated R -module. The Bass class B C ( R ) is the class of all R -modules M such that - (a) the evaluation map ξ C M : C ⊗ R Hom ( R C, M ) → M , defined as ξ C M ( c ⊗ R ψ ) := ψ c ( ) for all c ∈ C and ψ ∈ Hom ( R C, M ), is an isomorphism; and - (b) Ext i R ( C, M ) = 0 = Tor R i ( C, Hom ( R C, M )) for all i /greaterorequalslant 1. Definition 2.9. Let C be an R -module. - (a) A complete I C I -resolution X of R -modules is an exact sequence of R -modules of the form $$\underline { X } = \cdots \xrightarrow { \partial _ { 2 } ^ { X } } X _ { 1 } \xrightarrow { \partial _ { 1 } ^ { X } } X _ { 0 } \xrightarrow { \partial _ { 0 } ^ { X } } X _ { - 1 } \xrightarrow { \partial _ { - 1 } ^ { X } } \cdots$$ such that X i ∈ I C for each integer i /greaterorequalslant 1, X j ∈ I for each integer j /lessorequalslant 0, and Hom ( R A,X ) is exact for each A ∈ I C . - (b) A complete PP C -resolution X of R -modules is an exact sequence of R -modules of the form $$\underline { X } = \cdots \xrightarrow { \partial _ { 2 } ^ { X } } X _ { 1 } \xrightarrow { \partial _ { 1 } ^ { X } } X _ { 0 } \xrightarrow { \partial _ { 0 } ^ { X } } X _ { - 1 } \xrightarrow { \partial _ { - 1 } ^ { X } } \cdots$$ such that X i ∈ P for each integer i /greaterorequalslant 0, X j ∈ P C for each integer j /lessorequalslant -1, and Hom ( R X,A ) is exact for each A ∈ P C . - (c) A complete FF C -resolution X of R -modules is an exact sequence of R -modules of the form $$\underline { X } = \cdots \xrightarrow { \partial _ { 2 } ^ { X } } X _ { 1 } \xrightarrow { \partial _ { 1 } ^ { X } } X _ { 0 } \xrightarrow { \partial _ { 0 } ^ { X } } X _ { - 1 } \xrightarrow { \partial _ { - 1 } ^ { X } } \cdots$$ such that X i ∈ F for each integer i /greaterorequalslant 0, X j ∈ F C for each integer j /lessorequalslant -1, and A ⊗ R X is exact for each A ∈ I C . Using complete resolutions, we next define C -Gorenstein injectivity, C -Gorenstein projectivity and C -Gorenstein flatness. We also note that these definitions are equivalent to [14, Definition 2.7]. Definition 2.10. Let C be an R -module. An R -module M is - (a) C -Gorenstein injective if there is a complete I C I -resolution X , as in Definition 2.9(a), such that Ker ∂ X 0 ∼ = M . - (b) C -Gorenstein projective if there is a complete PP C -resolution X , as in Definition 2.9(b), such that Coker ∂ X 1 ∼ = M . - (c) C -Gorenstein flat if there is a complete FF C -resolution X , as in Definition 2.9(c), such that Coker ∂ X 1 ∼ = M . When C = R , Definition 2.10 reduces to the definitions of Gorenstein injectivity, Gorenstein projectivity and Gorenstein flatness of Enochs, Jenda, and Torrecillas [9, 10], with complete I C I -resolution, complete PP C -resolution and complete FF C -resolution becoming complete injective resolution, complete projective resolution and complete flat resolution, respectively. Lemma 2.11. Let C and M be R -modules. Then M is C -Gorenstein injective if and only if - (a) For each A ∈ I C , Ext i R ( A,M ) = 0 for all i /greaterorequalslant 1 . - (b) M admits an augmented I C -resolution Y + such that Hom ( R A,Y + ) is exact for each A ∈ I C . Lemma 2.12. Let C and M be R -modules. Then M is C -Gorenstein projective if and only if - (a) For each A ∈ P C , Ext i R ( M,A ) = 0 for all i /greaterorequalslant 1 . - (b) M admits an augmented P C -coresolution + Y such that Hom ( R + Y , A ) is exact for each A ∈ P C . Lemma 2.13. Let C and M be R -modules. Then M is C -Gorenstein flat if and only if - (a) For each A ∈ I C , Tor R i ( A,M ) = 0 for all i /greaterorequalslant 1 . - (b) M admits an augmented F C -coresolution + Y such that A ⊗ R ( + Y ) is exact for each A ∈ I C . Using the fact that Hom R ( C, I ) and I are C -Gorenstein injective over R , one can define a C -Gorenstein injective resolution for every homologically left-bounded R -complex M [14, Defintion 2.9]. One can then define the C -Gorenstein injective dimension of M : for a homologically left-bounded R -complex M , one has /negationslash ∣ In the case C = R , the C -Gorenstein injective dimension of M is the Gorenstein injective dimension of M , denoted Gid R M . In other words, one has R -Gid R M = Gid R M . The C -Gorenstein projective dimension , the Gorenstein projective dimension , the C -Gorenstein flat dimension , and the Gorenstein flat dimension of an R -module M , denoted respectively C -Gpd R M , Gpd R M C , -Gfd R M , and Gfd R M , are defined similarly. $$C \text{-} G i d _ { R } M & \coloneqq \inf \left \{ \sup \left \{ i \in \mathbb { Z } \, | \, X _ { - i } \neq 0 \right \} \left | X \text{ is a $C$-Gorentstein injective} \\ \text{in the case $C=R$, the $C$-Gorentstein injective dimension of $M$ is the Gorentstein} \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array} \right \}.$$ - 3. Semidualizing Modules and Gorenstein Dimensions The main point of this section is to prove Theorem A from the introduction. Property 3.1. Let R and S be rings, and let C be an R -module. Then the triple ( R,S,C ) satisfies Property 3.1 if there is a commutative diagram /d47 /d47 /d31 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1123v2-figure-da7724dc-70fb-45dd-83ed-bb6dcbdafa7b.jpg) /d31 /d15 /d15 of ring homomorphisms with the identity map id R on R such that Hom R ( S, C ) = ∼ S as S -modules and Ext i R ( S, C ) = 0 for all i /greaterorequalslant 1. Remark 3.2. We first note two immediate facts from the above retract diagram: R is a finitely generated S -module and the triple ( R,R /multicloseleft C, C ) satisfies Property 3.1. We also note that if a triple ( R,S,C ) satisfies Property 3.1, then R Hom ( R S, C ) /similarequal S in the derived category D ( S ). In other words, if I is an injective resolution of C over R , then Property 3.1 implies that Hom R ( S, I ) is an injective resolution of the S -module S . Property 3.3. Let R and S be rings, and let C be an R -module. Then the triple ( R,S,C ) satisfies Property 3.3 if it satisfies Property 3.1 and C ∼ = Ker g as R -modules. Remark 3.4. We here note that if ( R,S,C ) satisfies Property 3.3, it follows that S ∼ = R ⊕ C as R -modules because the short exact sequence 0 → Ker g → S g - → R → 0 splits. We next state and prove versions of several lemmas of Holm and Jørgensen [14, 15] in the general setting of Properties 3.1 and 3.3. Lemma 3.5. Let R and S be rings, and let C be an R -module. If ( R,S,C ) satisfies Property 3.1, then the following statements hold: - (a) For any R -module M , Ext i S ( M,S ) = Ext ∼ i R ( M,C ) as S -modules for all i /greaterorequalslant 0 . - (b) For all i /greaterorequalslant 1 , Ext i S ( R,S ) = 0 and Hom ( S R,S ) = ∼ C as S -modules. Proof. (a) Argue as in [15, Lemma 3.2 (ii)] with the ring S taking the place of the trivial extension R /multicloseleft C . The essential point is to use Hom-tensor adjointness with the injective resolution Hom R ( S, I ) of S , as described in Remark 3.2. - (b) This is the special case of part (a) where M = R . /square The following is Theorem B from the introduction. Theorem 3.6. Let R and S be rings, and let C be a finitely generated R -module such that ( R,S,C ) satisfies Property 3.1. Then the following are equivalent: - (a) C is semidualizing over R ; - (b) R is Gorenstein projective over S and Ann R ( C ) = 0 ; and - (c) C is Gorenstein projective over S and Ann R ( C ) = 0 . Proof. To prove that (a) implies (b), we assume that C is semidualizing over R . Using Lemma 3.5, we note that $$E x t _ { S } ^ { i } ( \text{Hom} _ { S } ( R, S ), S ) \cong E x t _ { S } ^ { i } ( C, S ) \cong E x t _ { R } ^ { i } ( C, C ).$$ This is equal to 0 for all i /greaterorequalslant 1 and isomorphic to R when i = 0 because C is semidualizing over R . Again, using the Ext-vanishing from Lemma 3.5(b), this means that R is Gorenstein projective over S by [4, Proposition 2.2.2]. We also note that Ann R ( C ) is the kernel of the homothety map χ R C : R → Hom ( R C, C ), which is 0 because C is semidualizing over R . To prove that (b) implies (c), we recall that Hom ( S -, S ) preserves the class of finitely generated Gorenstein projective S -modules by [4, Observation 1.1.7]. This proves the desired implication because C ∼ = Hom ( S R,S ) as S -modules by Lemma 3.5(b). To prove that (c) implies (a), we assume that C is Gorenstein projective over S and Ann R ( C ) = 0. Since C is finitely generated over R , it is also finitely generated over S . Therefore, by [4, Theorem 4.2.6], we have $$\text{Ext} ^ { i } _ { S } ( C, S ) = 0 = \text{Ext} ^ { i } _ { S } ( \text{Hom} _ { S } ( C, S ), S )$$ for all i /greaterorequalslant 1 and the biduality map $$\delta _ { C } ^ { S } \colon C \rightarrow \text{Hom} _ { S } ( \text{Hom} _ { S } ( C, S ), S )$$ is an S -module isomorphism. Using Lemma 3.5, we have $$E x t _ { R } ^ { i } ( C, C ) = 0 = E x t _ { R } ^ { i } ( \text{Hom} _ { R } ( C, C ), C )$$ for all i /greaterorequalslant 1 and the biduality map $$\delta _ { C } ^ { S } \colon C \to \text{Hom} _ { S } ( \text{Hom} _ { S } ( C, S ), S ) \cong \text{Hom} _ { R } ( \text{Hom} _ { R } ( C, C ), C )$$ is an R -module isomorphism. Since Ann R ( C ) = 0, it follows that C is semidualizing over R by [18, Fact 1.1]. /square Remark 3.7. The assumption Ann R ( C ) = 0 is essential in Theorem 3.6; see [18, Example 1.2]. Lemma 3.8. Let R and S be rings, let N be a finitely generated R -module, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.1, and if N is Gorenstein projective as an S -module, then the module Hom ( R N,I ) is Gorenstein injective over S for any injective R -module I . Proof. Since N is Gorenstein projective over S , the module N has a complete projective resolution P over S . Moreover, since N is finitely generated over R (hence over S as well) P can be chosen to consist of finitely generated S -modules by [4, Theorems 4.1.4 and 4.2.6]. As in the proof of [15, Lemma 3.3 (ii)], it is straightforward to show that Hom S ( P, Hom ( R S, I )) is a complete injective resolution of Hom ( R N,I ) over S . /square We here recover a version of [15, Lemma 3.3 (ii)] for our general setting. Proposition 3.9. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.1, then for any injective R -module I , the modules Hom ( R C, I ) and Hom ( R R,I ) = ∼ I are Gorenstein injective over S . Proof. The modules C and R are Gorenstein projective over S by Theorem 3.6. Thus, the duals Hom R ( C, I ) and Hom R ( R,I ) = ∼ I are Gorenstein injective over S by Lemma 3.8. /square Next we prove a version of [15, Lemma 3.4] in the general setting. Lemma 3.10. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.3, then for any injective R -module J , we have $$\text{Ext} ^ { i } _ { S } ( \text{Hom} _ { R } ( S, J ), - ) \cong \text{Ext} ^ { i } _ { R } ( \text{Hom} _ { R } ( C, J ), - )$$ for i /greaterorequalslant 0 as functors on S -modules. Proof. Argue as in the proof of [15, Lemma 3.4] that $$\text{Hom} _ { R } ( S, J ) \cong \text{Hom} _ { R } ( \text{Hom} _ { R } ( S, C ), J ) \cong S \otimes _ { R } \text{Hom} _ { R } ( C, J )$$ as S -modules using Lemma 2.1 and the fact that ( R,S,C ) satisfies Property 3.3 (hence Property 3.1). If P is a projective resolution over R of Hom ( R C, J ), one can argue that S ⊗ R P is a projective resolution over S of S ⊗ R Hom ( R C, J ) ∼ = Hom ( R S, J ). This uses the facts that S ∼ = R ⊕ C as R -modules and Hom R ( C, J ) belongs to A C ( R ) since J is an injective R -module. Using this projective resolution over S of Hom ( R S, J ) and Hom-tensor adjointness, one can obtain the desired isomorphism. /square As a consequence of the above lemma, we have the following proposition. Proposition 3.11. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.3 and M is an R -module, then for each i /greaterorequalslant 0 , we have Ext i R (Hom R ( C, J ) , M ) = 0 for every injective R -module J if and only if Ext i S ( U, M ) = 0 for every injective S -module U . Proof. As in [14, Corollary 2.3 (1)], this follows from Lemmas 2.3(a) and 3.10. /square Lemma 3.12. Let R and S be rings, and let C be a semidualizing R -module. If the triple ( R,S,C ) satisfies Property 3.3 and M is an R -module that is Gorenstein injective over S , then there exists a short exact sequence of R -modules $$0 \to M ^ { \prime } \to \text{Hom} _ { R } ( C, I ) \to M \to 0$$ for some injective R -module I such that - (1) M ′ is Gorenstein injective over S - (2) the above sequence is Hom (Hom ( R R C, J ) , -) -exact for any injective R -module J . Proof. The proof begins similarly to that of [15, Lemma 4.1]. Since M is Gorenstein injective over S , it has a complete injective resolution. From this, we can construct the following short exact sequence of S -modules $$0 \to N \to K \to M \to 0$$ where K is injective over S , N is Gorenstein injective over S and the sequence is Hom ( S L, -)-exact for each injective S -module L , particularly for L = Hom R ( S, J ) where J is any injective R -module. As in the proof of [15, Lemma 4.1], we can use Lemma 2.3(a) to assume without loss of generality that the above sequence is of the form $$0 \to N \xrightarrow { \epsilon } \text{Hom} _ { R } ( S, I ) \xrightarrow { \eta } M \to 0 \quad \quad \quad ( 3. 1 2. 1 )$$ for some injective R -module I . Note that we cannot make use of a specific ring structure of S as in the proof of [15, Lemma 4.1], so we use Lemma 2.1 instead. Since S ∼ = Hom ( R S, C ) as S -modules by Property 3.1, we have $$\text{Hom} _ { R } ( S, I ) \cong \text{Hom} _ { R } ( \text{Hom} _ { R } ( S, C ), I ) \cong S \otimes _ { R } \text{Hom} _ { R } ( C, I ) \quad \quad ( 3. 1 2. 2 )$$ as S -modules, where the second isomorphism is by Lemma 2.1. (We note that Lemma 2.1 is applicable here because I is injective over R , and S is finitely generated over R .) The isomorphisms in (3.12.2) enable us to replace Hom R ( S, I ) in (3.12.1) with S ⊗ R Hom ( R C, I ) to obtain the top row of the following diagram. /d47 /d47 /d47 /d47 /d47 /d47 /d47 /d47 /d15 /d15 /d15 /d15 /d47 $$0 \xrightarrow { \epsilon ^ { \prime } } N \xrightarrow { \epsilon ^ { \prime } } S \otimes _ { R } \text{Hom} _ { R } ( C, I ) \xrightarrow { \eta ^ { \prime } } M \xrightarrow { \epsilon } 0 \\ 0 \xrightarrow { \psi \circ \epsilon ^ { \prime } } M ^ { \prime } \coloneqq \text{Ker} \phi \xrightarrow { \psi } \text{Hom} _ { R } ( C, I ) \xrightarrow { \phi } M \xrightarrow { \epsilon } 0$$ /d47 /d31 /d127 /d47 /d47 /d47 /d47 /d47 /d47 The maps ψ and φ are defined as follows. For any s ⊗ R β ∈ S ⊗ R Hom ( R C, I ), set ψ s ( ⊗ R β ) := sβ , where the scalar multiplication is afforded by the S -module structure on the R -module Hom R ( C, I ). For any β in Hom ( R C, I ), set φ β ( ) := η ′ (1 S ⊗ R β ). It is routine to check that both ψ and φ are well-defined S -module homomorphisms and that the diagram (3.12.3) is commutative. As in [15, Lemma 4.1], we can show that the bottom row of the diagram (3.12.3) satisfies the desired properties. /square Lemma 3.13. Let R and S be rings, and let C be an R -module such that ( R,S,C ) satisfies Property 3.3. Let M be an R -module that is C -Gorenstein injective over R . Then there exists a short exact sequence of S -modules $$0 \to M ^ { \prime } \to U \to M \to 0$$ where U is injective over S , M ′ is C -Gorenstein injective over R and the above sequence is Hom ( S V, -) -exact for any V injective over S . Proof. The proof is similar to [14, Lemma 2.11], using Lemma 2.1 as in the previous result. /square Using the lemmas proved above in the general setting of the retract diagram, we can generalize some propositions and theorems as in [14] and [15]. Proposition 3.14. Let R and S be rings, and let C be a semidualizing R -module, such that the triple ( R,S,C ) satisfies Property 3.3. Then, for any R -module M M , is C -Gorenstein injective over R if and only if M is Gorenstein injective over S . Proof. $$\text{Proof. This is proved similarly as in [14, Proposition 2.13 (1)].$$ We need the dual versions of Lemma 3.10, Proposition 3.11, Lemma 3.12 and Lemma 3.13 to prove the projective and flat versions of Proposition 3.14. They are stated next for the sake of completeness. Lemma 3.15. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.3, then for any projective R -module Q , we have $$\text{Ext} ^ { i } _ { S } ( -, S \otimes _ { R } Q ) \cong \text{Ext} ^ { i } _ { R } ( -, C \otimes _ { R } Q )$$ for all i /greaterorequalslant 0 as functors on S -modules. Proof. This is the dual of Lemma 3.10 using Lemma 2.2 and Hom R ( S, I ) as the injective resolution over S of Hom R ( S, C ⊗ R Q ) where I is an injective resolution of C ⊗ R Q . /square Proposition 3.16. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.3 and M is an R -module, then for each i /greaterorequalslant 0 , we have Ext i R ( M,C ⊗ R P ) = 0 for every projective R -module P if and only if Ext i S ( M,V ) = 0 for every projective S -module V . Proof. This is the dual of Proposition 3.11. $$\Box$$ Lemma 3.17. Let R and S be rings, and C be a semidualizing R -module. If the triple ( R,S,C ) satisfies Property 3.3 and M is an R -module that is Gorenstein projective over S , then there exists a short exact sequence of R -modules $$0 \to M \to C \otimes _ { R } P \to M ^ { \prime } \to 0$$ for some projective R -module P such that - (1) M ′ is Gorenstein projective over S - (2) the above sequence is Hom ( R -, C ⊗ R Q ) -exact for any projective R -module Q . Proof. This is the dual of Lemma 3.12, using Lemma 2.2. $$\Box$$ Lemma 3.18. Let R and S be rings, and let C be an R -module such that ( R,S,C ) satisfies Property 3.3. Let M be an R -module that is C -Gorenstein projective over R . Then there exists a short exact sequence of S -modules $$0 \to M \to W \to M ^ { \prime } \to 0$$ where W is projective over S , M ′ is C -Gorenstein projective over R and the above sequence is Hom ( S -, Y ) -exact for any projective S -module Y . Proof. This is the dual of Lemma 3.13. /square Using the above results, one can prove the injective version of Proposition 3.14. Proposition 3.19. Let R and S be rings, and let C be a semidualizing R -module, such that the triple ( R,S,C ) satisfies Property 3.3. Then, an R -module M is C -Gorenstein projective if and only if M is Gorenstein projective over S . Proof. Argue similarly as in the proof of Proposition 3.14 using Lemmas 3.15, 3.17, 3.18 and Proposition 3.16 instead. /square The flat version of Proposition 3.14 can be proved by essentially the same techniques as in the proof of [14, Proposition 2.15]. Proposition 3.20. Let R and S be rings, and let C be a semidualizing R -module, such that the triple ( R,S,C ) satisfies Property 3.3. Then, for any R -module M , M is C -Gorenstein flat over R if and only if M is Gorenstein flat over S . Proof. Argue as in the beginning of the proof of [14, Proposition 2.15], using Homtensor adjointness, that for any faithfully injective R -module E , the module M is C -Gorenstein flat if and only if the module Hom R ( M,E ) is C -Gorenstein injective. Since Hom R ( S, E ) is faithfully injective over S for any faithfully injective R -module E , one has Gfd S M = Gid S (Hom ( S M, Hom ( R S, E ))) by [4, Theorem 6.4.2]. Moreover, since Hom S ( M, Hom ( R S, E )) = Hom ∼ R ( M,E ) by Hom-tensor adjointness and tensor cancellation, we have Gfd S M = Gid S (Hom R ( M,E )). The above two facts, combined with Proposition 3.14, give the desired result. /square The last result of this section is Theorem A. Theorem 3.21. Let R and S be rings, and let C be a semidualizing R -module. If ( R,S,C ) satisfies Property 3.3, then for any homologically left-bounded R -complex M and any homologically right-bounded R -complex N , one has C -Gid R M = Gid S M C -Gpd R N = Gpd S N C -Gfd R N = Gfd S N Proof. This follows from Propositions 3.14, 3.19 and 3.20 as in [14, Theorem 2.16]. We prove the equality C -Gid R M = Gid S M as follows. Since every C -Gorenstein injective R -module is Gorenstein injective over S by Proposition 3.14, we have C -Gid R M /greaterorequalslant Gid S M . For the opposite inequality, let n := Gid S M &lt; ∞ . Let I be a left-bounded complex of injective R -modules such that I /similarequal M in the derived category D ( R ). Each I i is injective over R , hence Gorenstein injective over S by Proposition 3.9. Let M ′ := Ker( I -n → I - -n 1 ). By [6, Theorem 3.3], M ′ is Gorenstein injective over S . By Proposition 3.14, M ′ is C -Gorenstein injective over R , and so are I 0 , . . . , I -n +1 . Let I ′ := · · · → I -n +1 → M ′ → 0. Since I ′ /similarequal I /similarequal M C , -Gid R M /lessorequalslant n . The projective and flat versions are proved similarly. /square ## 4. Examples It is routine to show that Nagata's trivial extension R /multicloseleft C satisfies Property 3.3, hence we can recover [14, Theorem 2.16] as a special case of Theorem 3.21. The rest of this section is devoted to two similar constructions, which can be recovered as special cases of our retract diagram in Property 3.1. In particular, we prove in this section Theorem C from the introduction. ## 4.1. Amalgamated Duplication of a Ring along an Ideal. The following construction is due to D'Anna and Fontana [7]. Definition/Notation 4.1. Let R be a ring, and let C be an ideal in R . Then define a multiplication structure on R ⊕ C as follows: for each ( r, c ) and ( r , c ′ ′ ) in R ⊕ C , we define ( r, c )( r , c ′ ′ ) = ( rr , rc ′ ′ + r c ′ + cc ′ ) . The group R ⊕ C with this multiplication structure is a ring with (1 R , 0) as the multiplicative identity [7] . We denote this ring as R /triangleright /triangleleft C , and call it the amalgamated duplication of R along C . It is routine to check that R /triangleright /triangleleft C fits into a retract diagram satisfying Property 3.1. We collect this information in the following lemma. Lemma 4.2. Let R be a ring, and let C be an ideal in R . Then the diagram /d47 /d47 /d35 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1123v2-figure-cbaa82a1-b6dd-4a54-a41a-31a4982c3f5e.jpg) /d35 /d15 /d15 where f ( r ) := ( r, 0) and g r, c ( ) := r for each r ∈ R and c ∈ C , is a commutative diagram of ring homomorphisms such that Ker g ∼ = C as R -modules. We prove next that the triple ( R,R /triangleright /triangleleft C, C ) satisfies Property 3.1. Lemma 4.3. Let R be a ring, and let C be an ideal in R . If C is a semidualizing R -module, then Hom ( R R /triangleright /triangleleft C, C ) ∼ = R /triangleright /triangleleft C as R /triangleright /triangleleft C -modules, and Ext i R ( R /triangleright /triangleleft C, C ) = 0 for all i /greaterorequalslant 1 . Proof. We first note that the R /triangleright /triangleleft C -module structure of Hom R ( R /triangleright /triangleleft C, C ) comes from R /triangleright /triangleleft C in the first slot. Specifically, for any ( r, c ) and ( s, d ) in R /triangleright /triangleleft C , and for any R -module homomorphism ϕ from R /triangleright /triangleleft C to C , we have (( r, c ) ϕ )( s, d ) = ϕ (( r, c )( s, d )) = ϕ rs, rd ( + sc + cd ). Since R /triangleright /triangleleft C ∼ = R ⊕ C as R -modules, we know that Hom R ( R /triangleright /triangleleft C, C ) = Hom ∼ R ( C, C ) ⊕ C as R -modules. ↦ Since C is assumed to be semidualizing over R , the natural homothety R → Hom ( R C, C ) is an R -module isomorphism, hence there is a natural R -module isomorphism Θ : R /triangleright /triangleleft C → Hom ( R R /triangleright /triangleleft C, C ). Tracing all the natural isomorphisms involved, we see that the natural R -module isomorphism Θ : R /triangleright /triangleleft C → Hom ( R R /triangleright /triangleleft C, C ) is defined by ( r, c ) → φ ( r,c ) , where φ ( r,c ) is defined for any ( r ′′ , c ′′ ) ∈ R /triangleright /triangleleft C as φ ( r,c ) ( r ′′ , c ′′ ) = rc ′′ + r ′′ c . However, unlike in the case of R /multicloseleft C , the natural R -module isomorphism Θ is not an R /triangleright /triangleleft C -module isomorphism. We therefore use Θ to construct a new map Φ from R /triangleright /triangleleft C to Hom R ( R /triangleright /triangleleft C, C ), and we prove that Φ is indeed an R /triangleright /triangleleft C -module isomorphism. Define Φ : R /triangleright /triangleleft C → Hom ( R R /triangleright /triangleleft C, C ) as Φ( r, c ) := Θ( r + c, c ) for any ( r, c ) in R /triangleright /triangleleft C . It is then immediate that Φ is bijective, and it is also routine to check that Φ is indeed an R /triangleright /triangleleft C -module homomorphism with respect to the module structures noted above. Finally, we note that we already have Ext i R ( R /triangleright /triangleleft C, C ) ∼ = Ext i R ( C, C ) as R -modules. Since C is semidualizing over R , we have Ext i R ( C, C ) = 0 for all ∼ i /greaterorequalslant 1, and Ext i R ( R /triangleright /triangleleft C, C ) = 0 as well. ∼ /square The next result is Theorem C(a) from the introduction. Theorem 4.4. Let R be a ring, let C be an ideal in R , and set S := R /triangleright /triangleleft C . If C is semidualizing as an R -module, then ( R,S,C ) satisfies Property 3.3. Proof. Lemma 4.2 combined with Lemma 4.3 yields the desired result. /square Since ( R,R /triangleright /triangleleft C, C ) satisfies Property 3.3, Theorem 3.21 can be applied to reover the following result of Salimi et. al. [17]. Corollary 4.5. Let R be a ring, and let C be an ideal in R such that C is semidualizing over R . Then, for any homologically left-bounded R -complex M and any homologically right-bounded R -complex N , one has C -Gid M = Gid M $$C \text{-Gpd} _ { R } N = G \text{pd} _ { R \triangleright \overline { C } } N$$ $$\text{id} _ { R } M & = \text{Gid} _ { R \bowtie C } \, M \\ \text{ipd} _ { R } \, N & = \text{Gpd} _ { R \bowtie C } \, N \\ \dots & = \dots$$ C -Gfd R N = Gfd R/triangleright /triangleleftC N ## 4.2. Pseudocanonical Cover. In this section, we apply Theorem 3.21 to pseudocanonical covers introduced by Enescu in [8]. Definition/Notation 4.6. Let R be a ring, let h ∈ R , and let C be an ideal in R . We define a ring structure on R ⊕ C by defining ( r, c )( r , c ′ ′ ) = ( rr ′ + cc h, rc ′ ′ + r c ′ ) for each ( r, c ) , ( r , c ′ ′ ) ∈ R ⊕ C . The group R ⊕ C with this multiplication structure, denoted as S h ( ), is indeed a ring with (1 R , 0) as its multiplicative identity [8], and is called the pseudocanonical cover of R via h . We construct a retract diagram similar to the one in Property 3.1 using S h ( ). Lemma 4.7. Let R be a ring, let C be an ideal and let h ∈ R such that h = r 2 0 for some r 0 ∈ R . Then the diagram /d47 /d47 /d33 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1123v2-figure-f6e9f983-d76f-4e32-a939-0d73227d1481.jpg) /d33 /d15 /d15 where f ( r ) := ( r, 0) and g r, c ( ) := r + cr 0 for each r ∈ R and c ∈ C , is a commutative diagram of ring homomorphisms such that Ker g ∼ = C as R -modules. Proof. By construction, f and g are well-defined functions making the diagram commute. It is routine to check that f is a ring homomorphism and that g respects addition. To check that g respects multiplication as well, let r, r ′ ∈ R and c, c ′ ∈ C . Then $$g \left ( ( r, c ) ( r ^ { \prime }, c ^ { \prime } ) \right ) & = g ( r r ^ { \prime } + c c ^ { \prime } h, r c ^ { \prime } + r ^ { \prime } c ) \\ & = r r ^ { \prime } + c c ^ { \prime } h + r c ^ { \prime } r _ { 0 } + r ^ { \prime } c r _ { 0 } \\ & = r ( r ^ { \prime } + c ^ { \prime } r _ { 0 } ) + c c ^ { \prime } r _ { 0 } ^ { 2 } + r ^ { \prime } c r _ { 0 } \\ & = r ( r ^ { \prime } + c ^ { \prime } r _ { 0 } ) + c r _ { 0 } ( c ^ { \prime } r _ { 0 } + r ^ { \prime } ) \\ & = ( r + c r _ { 0 } ) ( r ^ { \prime } + c ^ { \prime } r _ { 0 } ) \\ & = g ( r, c ) g ( r ^ { \prime }, c ^ { \prime } ) \\ \text{sed the fact that } h = r _ { 0 } ^ { 2 }.$$ where we used the fact that h = r 2 0 . We note that Ker g is the R -submodule of S h ( ) consisting of all elements of the form ( -cr , c 0 ) with c ∈ C . Therefore one can readily prove that the map from C to Ker g that sends c to ( -cr 0 , c ) is indeed an R -module isomorphism. /square Lemma 4.8. Let R be a ring, let C be an ideal in R , and let h ∈ R such that h = r 2 0 for some r 0 ∈ R . If C is semidualizing over R , then Hom ( R S h , C ( ) ) = ∼ S h ( ) as S h ( ) -modules, and Ext i R ( S h , C ( ) ) = 0 for all i /greaterorequalslant 1 . Proof. We first note that the S h ( )-module structure of Hom R ( S h , C ( ) ) comes from S h ( ) in the first slot. Since S h ( ) = ∼ R ⊕ C as R -modules, we know that $$\text{Hom} _ { R } ( S ( h ), C ) \cong \text{Hom} _ { R } ( C, C ) \oplus C$$ as R -modules. ↦ Finally, we have that Ext i R ( S h , C ( ) ) = Ext ∼ i R i ( C, C ) as R -modules for all i /greaterorequalslant 1. Since C is semidualizing over R , we have Ext R ( C, C ) = 0 for all i /greaterorequalslant 1, hence Ext i R ( S h , C ( ) ) = 0 as well. /square Since C is assumed to be semidualizing over R , we have Hom R ( C, C ) = ∼ R as R -modules, hence S h ( ) = Hom ∼ R ( S h , C ( ) ) as R -modules. Tracing the composition of all the natural R -module isomorphisms above, we have an R -module isomorphism Θ : S h ( ) → Hom ( R S h , C ( ) ) sending ( r, c ) → ϕ ( r,c ) , where ϕ ( r,c ) is defined for any ( r ′′ , c ′′ ) ∈ S h ( ) as ϕ ( r,c ) ( r ′′ , c ′′ ) = rc ′′ + r ′′ c . It is routine to check that Θ is also an S h ( )-module homomorphism. The next result is Theorem C(b) from the introduction. Theorem 4.9. Let R be a ring, let C be an ideal in R , let h ∈ R such that h = r 2 0 for some r 0 ∈ R , and let S h ( ) be the pseudocanonical cover of R via h . If C is semidualizing as an R -module, then ( R,S h , C ( ) ) satisfies Property 3.3. Proof. Lemma 4.7 combined with Lemma 4.8 yields the desired result. /square We can apply Theorem 3.21 to S h ( ). Corollary 4.10. Let R be a ring, let C be an ideal in R such that C is semidualizing over R , and let h ∈ R such that h = r 2 0 for some r 0 ∈ R . Then, for any homologically left-bounded R -complex M and any homologically right-bounded R -complex N , one has C -Gid R M = Gid S h ( ) M C -Gpd R N = Gpd S h ( ) N C -Gfd R N = Gfd S h ( ) N Proof. Since ( R,S h , C ( ) ) satisfies Property 3.3, this is a direct application of Theorem 3.21. /square ## 5. Final Remarks It is natural to ask if the general settings we discussed characterizes the situation where an R -module M is C -Gorenstein projective/injective/flat over R if and only if M is Gorenstein projective/injective/flat over S . For example, one can ask if Property 3.3 is a necessary condition for Theorem 3.19. This fails in general, and the following is a counterexample. Example 5.1. Let C be a semidualizing module, and set R 1 := R /multicloseleft C and S := R 1 /multicloseleft R 1 . Let g 1 and g 2 be appropriate canonical projections, making the following diagram commute, and let g := g 2 ◦ g 1 . /d47 /d47 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1123v2-figure-8106924b-59ce-442a-89ab-d476bfb296d8.jpg) /d15 /d15 /d23 /d23 /d15 /d15 /negationslash We note that M is C -Gorenstein projective over R if and only if it is Gorenstein projective over R 1 , if and only if Gorenstein projective over S by [14, Proposition 2.13]. However, the triple ( R,S,C ) does not satisfy Property 3.3 because Ker g ∼ = C ; noting that S ∼ = R ⊕ ( C ⊕ R ⊕ C ) as R -modules and g = g 2 ◦ g 1 , we have Ker g ∼ = R ⊕ C 2 , which is different from C . We finally note here that the R -module structure on S in the previous example is not by accident. If we assume that a retract diagram in our general setting exists, i.e., there exists a ring homomorphism f : R → S such that g ◦ f = id R , then g is a split surjection. This implies that S ∼ = R ⊕ Ker g as R -modules as in the above example. ## Acknowledgements We are grateful to the anonymous referee for his or her detailed comments. ## References - 1. Maurice Auslander and Mark Bridger, Stable module theory , Memoirs of the American Mathematical Society, No. 94, American Mathematical Society, Providence, R.I., 1969. MR 0269685 (42 #4580) - 2. Maurice Auslander and David A. Buchsbaum, Homological dimension in local rings , Trans. Amer. Math. Soc. 85 (1957), 390-405. MR 0086822 (19,249d) - 3. Luchezar L. Avramov and Hans-Bjørn Foxby, Ring homomorphisms and finite Gorenstein dimension , Proc. London Math. Soc. (3) 75 (1997), no. 2, 241-270. MR 1455856 (98d:13014) - 4. Lars Winther Christensen, Gorenstein dimensions , Lecture Notes in Mathematics, vol. 1747, Springer-Verlag, Berlin, 2000. MR 1799866 (2002e:13032) - 5. , Semi-dualizing complexes and their Auslander categories , Trans. Amer. Math. Soc. 353 (2001), no. 5, 1839-1883 (electronic). MR 1813596 (2002a:13017) - 6. Lars Winther Christensen, Anders Frankild, and Henrik Holm, On Gorenstein projective, injective and flat dimensions-a functorial description with applications , J. Algebra 302 (2006), no. 1, 231-279. MR 2236602 (2007h:13022) - 7. Marco D'Anna and Marco Fontana, An amalgamated duplication of a ring along an ideal: the basic properties , J. Algebra Appl. 6 (2007), no. 3, 443-459. MR 2337762 (2008i:13002) - 8. Florian Enescu, A finiteness condition on local cohomology in positive characteristic , J. Pure Appl. Algebra 216 (2012), no. 1, 115-118. MR 2826424 (2012h:13010) - 9. Edgar E. Enochs and Overtoun M. G. Jenda, Gorenstein injective and projective modules , Math. Z. 220 (1995), no. 4, 611-633. MR 1363858 (97c:16011) - 10. Edgar E. Enochs, Overtoun M. G. Jenda, and Blas Torrecillas, Gorenstein flat modules , Nanjing Daxue Xuebao Shuxue Bannian Kan 10 (1993), no. 1, 1-9. MR 1248299 (95a:16004) - 11. Edgar E. Enochs, Overtoun M. G. Jenda, and Jin Zhong Xu, Foxby duality and Gorenstein injective and projective modules , Trans. Amer. Math. Soc. 348 (1996), no. 8, 3223-3234. MR 1355071 (96k:13010) - 12. Hans-Bjørn Foxby, Gorenstein modules and related modules , Math. Scand. 31 (1972), 267-284 (1973). MR 0327752 (48 #6094) - 13. E. S. Golod, G -dimension and generalized perfect ideals , Trudy Mat. Inst. Steklov. 165 (1984), 62-66, Algebraic geometry and its applications. MR 752933 (85m:13011) - 14. Henrik Holm and Peter Jørgensen, Semi-dualizing modules and related Gorenstein homological dimensions , J. Pure Appl. Algebra 205 (2006), no. 2, 423-445. MR 2203625 (2007c:13021) - 15. , Cohen-Macaulay homological dimensions , Rend. Semin. Mat. Univ. Padova 117 (2007), 87-112. MR 2351787 (2008m:13022) - 16. Takeshi Ishikawa, On injective modules and flat modules , J. Math. Soc. Japan 17 (1965), 291-296. MR 0188272 (32 #5711) - 17. Maryam Salimi, Elham Tavasoli, and Siamak Yassemi, The amalgamated duplication of a ring along a semidualizing ideal , Rend. Semin. Mat. Univ. Padova 129 (2013), 115-127. MR 3090634 - 18. S. Sather-Wagstaff, Reflexivity and connectedness , Glasgow Mathematical Journal, to appear, arXiv:1212.0131v1 . - 19. Jean-Pierre Serre, Sur la dimension homologique des anneaux et des modules noeth´riens e , Proceedings of the international symposium on algebraic number theory, Tokyo &amp; Nikko, 1955 (Tokyo), Science Council of Japan, 1956, pp. 175-189. MR 0086071 (19,119a) - 20. Ryo Takahashi and Diana White, Homological aspects of semidualizing modules , Math. Scand. 106 (2010), no. 1, 5-22. MR 2603458 (2011a:16016) - 21. Wolmer V. Vasconcelos, Divisor theory in module categories , North-Holland Publishing Co., Amsterdam, 1974, North-Holland Mathematics Studies, No. 14, Notas de Matem´tica No. 53. a [Notes on Mathematics, No. 53]. MR 0498530 (58 #16637) - 22. Diana White, Gorenstein projective dimension with respect to a semidualizing module , J. Commut. Algebra 2 (2010), no. 1, 111-137. MR 2607104 (2011d:13013) - 23. Siamak Yassemi, G-dimension , Math. Scand. 77 (1995), no. 2, 161-174. MR 1379262 (97d:13017) Department of Mathematics, NDSU Dept # 2750, PO Box 6050, Fargo, ND 58108-6050 USA E-mail address : [email protected] URL : http://www.ndsu.edu/pubweb/~aung/
10.1142/S0219498816500432
[ "Pye Phyo Aung" ]
2014-08-05T21:40:52+00:00
2015-03-14T19:21:07+00:00
[ "math.AC", "13D02, 13D05, 13D07" ]
Gorenstein Dimensions over Some Rings of the Form $R \oplus C$
Given a semidualizing module $C$ over a commutative noetherian ring, Holm and J\o{}rgensen investigate some connections between $C$-Gorenstein dimensions of an $R$-complex and Gorenstein dimensions of the same complex viewed as a complex over the "trivial extension" $R \ltimes C$. We generalize some of their results to a certain type of retract diagram. We also investigate some examples of such retract diagrams, namely D'Anna and Fontana's amalgamated duplication and Enescu's pseudocanonical cover.
1408.1124v1
## Eight-fold signal amplification of a superconducting nanowire single-photon detector using a multiple-avalanche architecture Qingyuan Zhao, 1,2 Adam McCaughan, 2 Andrew Dane, Faraz Najafi, Francesco Bellei, 2 2 2 Domenico De Fazio, 2,3 Kristen Sunter, Yachin Ivry, Karl K. Berggren 2 2 2,* 1 Research Institute of Superconductor Electronics (RISE), School of Electronic Science and Engineering, Nanjing University, Nanjing 210093, China 2 Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139, USA 3 Department of Electronics and Telecommunications (DET), Polytechnic University of Turin, Corso Duca Degli Abruzzi 24, Torino 10129, Italy * [email protected] Abstract: Superconducting nanowire avalanche single-photon detectors (SNAPs) with n parallel nanowires are advantageous over single-nanowire detectors because their output signal amplitude scales linearly with n . However, the SNAP architecture has not been viably demonstrated for n &gt; 4. To increase n for larger signal amplification, we designed a multistage, successive-avalanche architecture which used nanowires, connected via choke inductors in a binary-tree layout. We demonstrated an avalanche detector with n = 8 parallel nanowires and achieved eight-fold signal amplification, with a timing jitter of 54 ps. ## 1. Introduction Sueprconducting nanowire single-photon detectors (SNSPDs) are of great interest in fields such as quantum information processing, linear-optics quantum computation [1], and quantum communication [2] due to their high efficiencies, low dark counts, fast recovery times, and low timing jitters [3]. However, one of the limiting factors in their application is the small amplitude of their output pulses, which are on the order of a millivolt. The presence of noise in the readout system can overwhelm these small pulses, and so amplification of the pulse is necessary for accurate readout. For a standard SNSPD architecture of a single nanowire, additional timing jitter [4,5] and dark counts typically result from electric noise if the signalto-noise ratio (SNR) of its output pulses is low. While external amplifiers can be used to achieve amplification, they ultimately add noise and reduce the SNR of the readout. Spatially multiplexing superconducting nanowire single-photon detectors can realize a single-photon array or a photon-number resolving (PNR) detector [6-8] . However, a scalable readout circuit has not yet realized. Recently, analogous readout architectures which integrated passive electronics with multiple SNSPDs were reported [8,9], using a basic idea of encoding information of photon position or photon number on pulse amplitude. But, scaling up the array or PNR detector was limited by the SNR of a single element which was a typical SNSPD. To increase the amplitude of the detector output pulses is a direct way to increase the SNR, therefore, superconducting nanowire avalanche photodetectors ( n -SNAPs, also named cascade-switching superconducting single-photon detectors) [10,11] were developed. The nSNAP is a variation of the SNSPD, with n individual detection nanowires in parallel instead of a single, longer, detection nanowire. The parallelized SNAP architecture increases the total amount of current that the detector carries, and as a result increases the amplitude of the output pulses. A typical n -SNAP implementation is shown in Fig.1(a). In an n -SNAP, a single photon absorbed in one detection nanowire creates a resistive hotspot, expelling current from that nanowire and redistributing it into to the n -1 neighboring detection nanowires. If the n -SNAP is biased with enough current, the redistributed current will cause an avalanche in the neighboring nanowires. During this avalanche, the current added to each neighboring nanowire causes it to exceed its critical current ( I CN), initiating an avalanche of resistive hotspots. Once all the detection nanowires are resistive, the current from all n nanowires is diverted into the output, and so an n -SNAP can generate output pulses n times larger than pulses of an SNSPD. Additionally, since this process occurs at the device level, the amplification mechanism does not add external noise and so the SNR scales proportionally with n as well. Unfortunately, the nSNAP design has not scaled well for n &gt;4 detection nanowires [11]. As n is increased, the portion of current that each of the n -1 neighboring nanowires receives from the redistributed current shrinks. For an n -SNAP biased at I B with a critical current of I C, the bias condition necessary to guarantee an avalanche of all the detection nanowires into a resistive state is . The minimal I B that initiates an avalanche is defined as the avalanche current ( I AV). As n increases, I AV rapidly approaches I C, which can cause problems such as afterpulsing, latching, and increased dark count rates [12]. ## 2. Design and fabrication Fig. 1 (a) Schematic diagram of an . n -SNAP in conventional avalanche architecture. Nanowires from D1 to D are paralleled directly. A choke inductor ( n L S ) is connected in series to block the current to leak to the load. (b) Equivalent circuit of a detection nanowire. L 0 is the kinetic inductance of the nanowire. R n is the time-varying resistance as the switch is open by a photon detection. (c) Schematic diagram of an 8- SNAP. D and * x i x represent the x th individual nanowire and the current passing through it, respectively. D 1 (leftmost detection nanowire) is triggered as the initial condition. The colored arrows represent the current diverted by the sequential avalanches A1 (red), A 2 (green) and A3 (blue). (d) SEM images of an 8- SNAP. The whole device is labeled * according to the corresponding circuit parts shown in (b). (e) A close-up of the photon-sensitive individual nanowires, consisting of eight 50 nm wide nanowires. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1124v1-figure-a12a5f7a-207e-4f59-85fa-727f909a3b77.jpg) Here, we introduce a modified n -SNAP design, which we refer to as n - SNAP. The * n - SNAP * uses multiple avalanche stages to increase the total number of nanowires beyond four while maintaining a low avalanche current. Using inductors arranged in a binary-tree layout, we can control the evolution of the avalanche such that the redistributed current from the initial triggered nanowire only needs to overbias one neighboring nanowire at first, but will still cause a resistive avalanche across the whole device. The idea of using multiple parallel SNSPDs was also reported in Ref. [13] as a way to increase the active area of a detector. However, in our design, the configuration of the nanowires and the inductor network is a binary-tree format used specifically to generate a controlled avalanche and increase n . The schematic diagram of the 8- SNAP is shown in Fig. 1(c) and the SEM pictures of the * fabricated device are shown in Fig. 1(d) and (e). In the 8- SNAP, the eight detection * nanowires were arranged to form four pairs, such as D and D . Each pair was connected 1 2 through a binary tree of choke inductors to form secondary and tertiary avalanches. The arrows in Fig. 1(a) illustrate the order in which the avalanches occur when the detection nanowire D1 is triggered. Current is diverted from D1 and flows into the adjacent nanowire D2, because the choke inductance L S1 acts as a high-impedance barrier to the other possible current paths at these short timescales. When i 2 , the current through D2 , exceeds I CN, D2 is triggered to resistive state. At this point, both D and D are resistive, and because we have designed 1 2 L S2 to be larger than L S1 , most of the current diverted from the D1/D2 2-SNAP is routed to the D3/D4 2-SNAP through the lowest-impedance path L S1 . As long as i 3 and i 4 exceed I CN, the second avalanche A2 follows. A similar process then cascades to the four remaining detection nanowires, creating the third avalanche A . When all the nanowires have switched to the 3 resistive state, the bias current is forced into the external load Z 0 , generating a voltage pulse for detection. We simulated the circuit using a electrothermal model and calculated the evolution of the current in each nanowire [14]. After D1 was triggered, the other nanowires were observed to go to resistive in the expected order. The current distribution in each nanowire, as shown in Fig. 2(a), depicts the sequence of the avalanches. Although the current in each nanowire varied during the avalanches, due to the electrothermal feedback in the nanowire [14,15], all of the currents eventually converged and evolved identically after the final avalanche A3 (~40 ps after D was triggered). 1 We designed, fabricated and characterized 8- SNAPs and also fabricated 2-SNAPs, 3-* SNAPs and SNSPDs for comparison. All detectors were made from ultrathin niobium nitride (NbN) film on a single MgO substrate. The critical temperature of the film was 11.4 K and the sheet resistance was 429 Ω/square. Detectors were measured in a probe station at a sample temperature of 2.4 K. The critical current, width, pitch and active area of these devices are: 8-* SNAP (65.0 µ A, 50nm, 150nm, 3.5 × 3.5 µ m ), 2-SNAP (15.5 µ A, 50nm, 150nm, 3.5 × 1.4 2 µm 2 ), 3-SNAP (24.0 µ A, 50nm, 150nm, 3.5 × 2.2 µ m ), and 50 nm wide SNSPD (7.2 µ A, 2 50nm, 150nm, 3.5 × 2.8 µ m ). A mode-locked laser at a wavelength of 1.5 µ m with sub2 picosecond pulse width and 77 MHz repetition rate was used as the light source in measuring detection efficiency and timing jitter. ## 3. Characterization As one important motivation of our successive-avalanche architecture, the avalanche current of n - SNAP was expected to be lower than the avalanche current of an * nSNAP, therefore, giving more bias margin for paralleling more nanowires to achieve higher signal amplification. As we have discussed, it is difficult to fabricate a well functional n -SNAP with n &gt; 4, but we were nevertheless able to compare the architectures by using idealized devices in an electrothermal simulation. We ran the simulation several times, varying the bias current in the detection nanowire ( I BN). Fig. 2(b) shows the output pulses from simulations of an 8- SNAP * with I BN set to 0.70 I CN, 0.75 I CN, and 0.80 I CN. The pulses had three levels, which corresponded to the cases where A1, A2 or A3 was the final avalanche. When I BN was at or below 0.65 I CN, even the pair of D1 and D2 was not triggered. By sweeping the current from 0.75 I CN to 0.80 I CN, we determined the lowest I BN which was able to trigger A3. This lowest I BN, multiplied by a factor of eight, was the minimum avalanche current for the 8- SNAP and had a value of * I AV\_S = 0.78 , where I C8 = 8 I CN was the total critical current of the eight nanowires. For simulating the avalanche current of the 8-SNAP ( I AV\_C) with the same critical current, the choke inductor was set to the same inductance as L S3 in Fig.1(c). Applying the same simulation method, we found . Comparing these simulation results, the normalized avalanche current of 8- SNAP was 13% lower than the normalized avalanche current of 8-SNAP, showing that * the successive-avalanche facilitated the avalanche to be happened at low bias current. To verify the fabricated 8- SNAP operating in a full avalanche regime, we experimentally * measured the avalanche current ( I AV\_E). We found this value by measuring the device detection efficiency ( DDE ) versus the bias current normalized to its critical current at different incident photon fluxes. At the inflection point of the DDE curves, we know that the device is operating in the single-photon regime, and thus we have reached the avalanche current-a full avalanche is occurring from a single detection nanowire firing. As shown in Fig. 2(c), this value was measured to be I AV\_E = 0.78 I C8 , in agreement with I AV\_S from our electrothermal simulation. Additionally, we corroborated this measurement by comparing the DDE of the 8- SNAP to a standard, single-nanowire, 50 nm wide SNSPD. Above the normalized bias * current of 0.78, the DDE curves of the 8- SNAP overlapped with the curve of the SNSPD as * expected from single photon detections in identical nanowires. Fig. 2 (a) Electrothermal simulation of the normalized currents through the eight nanowires in an 8-* SNAP. When the current passing through the nanowire exceeds I CN, the avalanche processes are triggered, denoted as A1, A2 and A3. (b) Electrothermal simulation of the output pulses at I BN of 0.80 I CN (red), 0.75 I CN (green), 0.70 I CN (blue) and 0.65 I CN (purple). The dashed lines show the levels of the output current corresponding to the cases that the last avalanche is A1, A2 and A3. (c) DDE vs normalized I B for the SNSPD (black) and the 8- SNAP illuminated at different incident photon * fluxes as shown in the legend. As the photon flux increases depicted by the arrow, the DDE curves of the 8- SNAP shift away from the * DDE curve of the SNSPD. The dashed arrow shows the inflection point of the DDE curves, which is 0.78 I C8 and is the experimental avalanche current of the 8- SNAP, * I AV-E . Curves measured under low incident photon fluxes are noisy when I B is close to the critical current, because the photon detection count rate is lower than the dark count rate, resulting in high background noise. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1124v1-figure-20f72f48-b062-4069-bba1-c60fe4df63f1.jpg) Ideally, the avalanche current of an 8- SNAP would be approximately equal to a 2-SNAP. * This equivalence should exist because at the first avalanche stage, such as at A1, the current expelled from a detection nanowire only needs to over-bias one neighbor, similar to the twoparallel-nanowire setup in a 2-SNAP. We measured the 2-SNAPs and 3-SNAPs, finding their experimental avalanche currents of I AV-2E = 0.72 I C2 and I AV-3E = 0.79 I C3 , where I C2 and I C3 are the critical currents for the 2-SNAPs and 3-SNAPs, respectively. According to these values, the normalized avalanche current I AV\_E/ I C8 of the 8-* SNAP was higher than I AV\_2E / I C2 of the 2-SNAP and closer to I AV\_3E / I C3 of the 3-SNAP, which is slightly different to an ideal equivalence because of the leakage currents in each avalanche stage. To demonstrate the eight-fold signal amplification of the 8- SNAP versus a standard * SNSPD with the same width of 50 nm, we measured single-shot pulse traces of the 8- SNAP * and the SNSPD. The results are shown in Fig. 3(a). The critical current of the 50 nm wide SNSPD was 7.2 µ A and the critical current of the 8- SNAP was 65 µ A. We biased both * devices at 83% of their critical currents. The peak values of the 8- SNAP and the SNSPD * pulse were 109.1 mV and 13.5 mV, respectively. This corresponded to an eight-fold enhancement of the signal, proportional to n = 8 as expected. This proportionality also shows that the pulse of the 8- SNAP was the result of a full avalanche sequence containing all the * current from all of the detection nanowires, and the successive avalanches worked. Considering the ~100 ns long duration of the 8- SNAP's output pulse, the system readout * noise (peak-to-peak value) was extracted in a 100 ns long time window from the acquired traces before the pulses arrive. The noise was 7.9 mV for the 8- SNAP and it was 7.3 mV for * the SNSPD, which were almost identical and were dominated by the amplifier noise. Therefore, the SNR of the 8- SNAP (109.1/7.9 = 13.8) was also increased by a factor of 8 over * the SNR of the SNSPD (13.5/7.3 = 1.8). The large SNR pulses were easily discriminated from the background noise even with a highly lossy RF cable for connecting. Therefore, the 8- SNAP could be used as a basic element in an array to increase the amount of pixels with * more connections. Fig. 3 (a) Traces of a single pulse from the 8- SNAP (red) and the SNSPD (blue). The signal is . * extracted from the peak value of the average pulses (not shown here) and the peak-to-peak noise in a time window of 100 ns is taken from the traces before the pulses arrive. The inset figure shows the noise floor of our 8- SNAP which is nearly identical to the noise floor of the SNSPD. (b) The * timing jitter versus normalized I B. The inset figure shows the jitter performance at 0.86 I C8 . The delay distribution is fitted to a Gaussian profile. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1124v1-figure-35ae4bc3-de4f-4f74-ab81-85c8c5574702.jpg) As shown by the pulse traces in Fig. 3(a), the falling edge of the 8- SNAP output signal * showed an overshoot as the pulse returns to zero. This overshoot indicates a large kinetic inductance of the device which is mainly due to the choke inductors. Reducing the choke inductance could reduce the reset time of the 8- SNAP, but it also prevented the avalanche * formation because the current from the triggered nanowire was more easily to leak to the load instead of injecting into the neighboring nanowires, resulting in an increase of the avalanche current. [12] In the measured circuit, the recovery time constants are set by L T / Z 0 , where L T ≈ L S1 is the total kinetic inductance of the device and Z 0 = 50 Ω is the load resistance that the output pulses apply on. Adding series resistor R S close to the device, can reduce the time constant to L T /( R S + Z 0 ) and thus can speed up the current recovery in the 8 -* SNAP [14]. In an optimized circuit, the 8- SNAP speed should only be limited by the hotspot cooldown time * just like an SNSPD, with a small speed reduction accounted for the delay caused by avalanche latency. There was no afterpulsing in the 8- SNAP as long as it was not biased very close to * the critical current. The bias condition with no afterpulsing existed because the avalanche current of 8- SNAP was low, showing another advantage of our successive-avalanche * architecture. Since the dynamic processes of the nanowires in an n -SNAP are more complex than a SNSPD with single nanowire, we measured the timing jitter of the 8- SNAP to show that the * successive-avalanche architecture does not add significant timing jitter. The timing jitter was extracted by analyzing the variance in time-delay between the synchronized pulses from a fast photodiode and the output pulses from the detectors. [16] The jitter was measured for several values of I B, and the results are shown in Fig. 3(b). Similar to the n -SNAPs in conventional architecture, the histogram of the jitter appeared to be asymmetric and showed multiple peaks below the avalanche current. [16] However, when the device was biased above the avalanche current, the histogram of the jitter has a roughly Gaussian profile as shown in the Fig. 3(c) inset. The value of the timing jitter was extracted from the full-width-at-half-maximum (FWHM) of the histogram. For the 8- SNAP, the jitter had a minimum plateau of ~54 ps, * showing negligible dependence on the bias current above 0.82 I C8 in the absence of additional timing jitter from voltage noise. [4,5] The jitter was 46 ps for the 2-SNAP biased at 13 µ A and it was 53 ps for the 3-SNAP biased at 22 µ A. Therefore, the timing jitter of the 8- SNAP * was similar to a 2-SNAP and a 3-SNAP, showing the successive-avalanche architecture didn't give additional timing jitter compared to the conventional design. ## 4. Conclusion In conclusion, we have demonstrated a parallel SNSPD architecture with successive avalanches. The architecture consisted of detection nanowires and choke inductors arranged in a binary-tree layout. For the demonstrated 8- SNAP, the output signal and the * SNR of the output pulse were measured to be eight times higher than the equivalent SNSPD of the same nanowire width. The normalized avalanche current was measured to be 0.78, which was 13% lower than the ideal normalized avalanche current of an equivalent 8-SNAP using conventional design. The detector had a minimum timing jitter of 54 ps, which was independent of the bias current above 0.82 I C8 , showing that the successive-avalanche architecture didn't deteriorate the timing performance. The binary-tree design can be easily iterated with more nanowires in parallel for greater amplification. The high SNR, low timing jitter, and monolithic integration suggest that this architecture is promising for applications that require larger pulse amplitudes, such as single-photon arrays, photon-number-resolving detectors, or feed-forward on-chip logic for integrated photonic quantum-information processing. ## Acknowledgement: The authors would like to thank James Daley and Mark Mondol for technical support. This material is based upon work supported as part of the Center for Excitonics, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001088. Qingyuan Zhao would like to thank his financial support (NO.2011619021) from the Chinese Scholarship Council when he was a visiting student in MIT, and the program B (NO.201301B006) for Outstanding PhD candidate of Nanjing University for support during the final stages of manuscript preparation. Adam McCaughan acknowledges support from the iQuISE NSF IGERT fellowship. ## References and links: - 1. E. Knill, R. Laflamme, and G. J. Milburn, "A scheme for efficient quantum computation with linear optics.," Nature 409, 46-52 (2001). - 2. N. Gisin and R. Thew, "Quantum communication," Nat. Photonics 1, 165-171 (2007). - 3. R. H. Hadfield, "Single-photon detectors for optical quantum information applications," Nat. Photonics 3, 696705 (2009). - 4. Q. Zhao, L. Zhang, T. Jia, L. Kang, W. Xu, C. Cao, J. Chen, and P. Wu, "Intrinsic timing jitter of superconducting nanowire single-photon detectors," Appl. Phys. B 104, 673-678 (2011). - 5. L. You, X. Yang, Y. He, W. Zhang, D. Liu, W. Zhang, L. Zhang, L. Zhang, X. Liu, S. Chen, Z. Wang, and X. Xie, "Jitter analysis of a superconducting nanowire single photon detector," AIP Adv. 3, 072135 (2013). - 6. A. Divochiy, F. Marsili, D. Bitauld, A. Gaggero, R. Leoni, F. Mattioli, A. Korneev, V. Seleznev, N. Kaurova, O. Minaeva, G. Gol'tsman, K. G. Lagoudakis, M. Benkhaoul, F. Lévy, A. Fiore, G. G. O. L. Tsman, and F. Le, "Superconducting nanowire photon-number-resolving detector at telecommunication wavelengths," Nat. Photonics 2, 302-306 (2008). - 7. S. Miki, T. Yamashita, Z. Wang, and H. Terai, "A 64-pixel NbTiN superconducting nanowire single-photon detector array for spatially resolved photon detection," Opt. Express 22, 7811 (2014). - 8. Z. Zhou, S. Jahanmirinejad, F. Mattioli, D. Sahin, G. Frucci, A. Gaggero, R. Leoni, and A. Fiore, "Superconducting series nanowire detector counting up to twelve photons," 214, 210-214 (2013). - 9. Q. Zhao, A. McCaughan, F. Bellei, F. Najafi, D. De Fazio, A. Dane, Y. Ivry, and K. K. Berggren, "Superconducting-nanowire single-photon-detector linear array," Appl. Phys. Lett. 103, 142602 (2013). - 10. M. Ejrnaes, R. Cristiano, O. Quaranta, S. Pagano, A. Gaggero, F. Mattioli, R. Leoni, B. Voronov, and G. Gol'tsman, "A cascade switching superconducting single photon detector," Appl. Phys. Lett. 91, 262509 (2007). - 11. F. Marsili, F. Najafi, E. A. Dauler, F. Bellei, X. Hu, M. C. Csete, R. J. Molnar, and K. K. Berggren, "Singlephoton detectors based on ultranarrow superconducting nanowires.," Nano Lett. 11, 2048-53 (2011). - 12. F. Marsili, F. Najafi, E. Dauler, R. J. Molnar, and K. K. Berggren, "Afterpulsing and instability in superconducting nanowire avalanche photodetectors," Appl. Phys. Lett. 100, 112601 (2012). - 13. R. Cristiano, M. Ejrnaes, A. Casaburi, S. Pagano, F. Mattioli, A. Gaggero, and R. Leoni, "Superconducting single photon detectors based on multiple cascade switches of parallel NbN nanowires," in Proc. SPIE 8072, Photon Counting Applications, Quantum Optics, and Quantum Information Transfer and Processing III,, I. Prochazka and J. Fiurá sek, eds. (2011), Vol. 8072, pp. 807205-807205-6. - 14. J. K. W. Yang, A. J. Kerman, E. A. Dauler, V. Anant, K. M. Rosfjord, and K. K. Berggren, "Modeling the Electrical and Thermal Response of Superconducting Nanowire Single-Photon Detectors," IEEE Trans. Appl. Supercond. 17, 581-585 (2007). - 15. A. J. Kerman, J. K. W. Yang, R. J. Molnar, E. A. Dauler, and K. K. Berggren, "Electrothermal feedback in superconducting nanowire single-photon detectors," Phys. Rev. B 79, 100509 (2009). - 16. F. Najafi, F. Marsili, E. A. Dauler, R. J. Molnar, and K. K. Berggren, "Timing performance of 30-nm-wide superconducting nanowire avalanche photodetectors," Appl. Phys. Lett. 100, 152602 (2012).
10.1364/OE.22.024574
[ "Qingyuan Zhao", "Adam McCaughan", "Andrew Dane", "Faraz Najafi", "Francesco Bellei", "Domenico De Fazio", "Kristen Sunter", "Yachin Ivry", "Karl K. Berggren" ]
2014-08-05T21:46:48+00:00
2014-08-05T21:46:48+00:00
[ "physics.ins-det", "physics.optics", "quant-ph" ]
Eight-fold signal amplification of a superconducting nanowire single-photon detector using a multiple-avalanche architecture
Superconducting nanowire avalanche single-photon detectors (SNAPs) with n parallel nanowires are advantageous over single-nanowire detectors because their output signal amplitude scales linearly with n. However, the SNAP architecture has not been viably demonstrated for n > 4. To increase n for larger signal amplification, we designed a multi-stage, successive-avalanche architecture which used nanowires, connected via choke inductors in a binary-tree layout. We demonstrated an avalanche detector with n = 8 parallel nanowires and achieved eight-fold signal amplification, with a timing jitter of 54 ps.
1408.1125v2
## Personas as a Powerful Methodology to Design Targeted Professional Development Resources Adrian Madsen, Sarah B. McKagan, American Association of Physics Teachers, College Park, MD 20740 Eleanor C. Sayre, Kansas State University, Manhattan, KS 66506 Mathew ÒSandyÓ Martinuk, Alexander Bell, Cognition Technology, Vancouver, BC V5N3Z2 Email: {amadsen, smckagan}@aapt.org, [email protected], {sandy, alex}@cognitiontec.com Abstract: Scaling and sustaining educational innovations is a common problem in the learning sciences. Professional development resources around educational innovations that are personalized to appeal to the needs and motivations of different types of faculty offer a possible solution. The method of developing ÒpersonasÓ to represent key types of users is commonly employed in user-interface design and can be used to produce personalized resources. Personas are fictional named archetypes of users encompassing generalizations of their key characteristics and goals that emerge from interviews. This method is especially powerful because personas succinctly package information into the form of a person, who is easily understood and reasoned about. Herein we describe the creation of a set of personas focusing on the needs and motivations of physics faculty around assessment and teaching. We present the personas, a discussion of how they inform our design and how the method can be used more broadly. ## Introduction A common issue in the learning sciences is the scaling and sustaining of educational innovations. Educators and researchers continually focus on creating new curricula and teaching methods, but many promising innovations are not as effective when implemented by different teachers in new settings (Penuel, Fishman, Haugan Cheng, &amp; Sabelli, 2011) so faculty stop using them (Henderson, Dancy, &amp; Niewiadomska-Bugaj, 2012). The primary strategy used in science professional development at the university level is to disseminate educational innovations as finished products (Henderson, Finkelstein, &amp; Beach, 2010). This strategy assumes that successful implementation does not depend on the details of the particular faculty members, students and institutions. It does not leave room for the faculty member to play a meaningful role in the improvements or take into account their unique environment (Henderson et al., 2010). This is problematic as faculty value the uniqueness of their personal styles, skills and preferences when choosing a teaching method (Henderson &amp; Dancy, 2008). It may be that there is too much focus on getting faculty to use the educational innovation Òas isÓ and not enough focus on the individuality of the faculty and their environments. One way to address scale and sustainability is through personalized professional development designed to take into account the diverse needs, motivations and environments of teachers and faculty who are potential or current users of educational innovations. We believe that personalized professional development resources will increase implementation and continuing use of these innovations because they target the things that faculty members actually care about. We are specifically designing a professional development website, the Physics Education Researcher (PER) UserÕs Guide (www.perusersguide.org), to support faculty use of curricular and assessment innovations in physics at the university level. Our aim is to understand the needs, motivations and environments of different types of faculty, prioritize which types of faculty our site will be designed for and design our website in a way that speaks to each and meets real needs. We propose that the method of creating ÒpersonasÓ is a powerful way to understand different types of faculty members who are potential or continuing implementers of educational innovations. This method is primarily used in the user-interface design process where designers create new technology products to match the needs of potential users (Cooper, 2004; Jacobs, Dreessen, &amp; Pierson, 2008). The creation and use of personas is a well-established research technique where rich sets of qualitative data about usersÕ goals and experiences are synthesized into user archetypes called Òpersonas.Ó These personas are generalizations of key characteristics and goals of potential users. Personas are described as Òfictional, detailed archetypical characters that represent grouping of behaviors, goals and motivations observed and identified during the research phaseÓ (Calde, Goodwin, &amp; Reimann, 2002). They are usually named and assigned a picture to help them feel like real people. Personas as a method has roots in ethnography (Blomberg &amp; Burrell, 2009) as well as human computer interaction (Sears &amp; Jacko, 2007). A common problem in the design process (we use the term ÒdesignÓ in the engineering sense) is having too vague an idea of who the users are. Without clarity, it is impossible to communicate about the specific needs and goals of the users and design a resource or experience to meet these. This is referred to as the problem of the Òelastic userÓ who stretches and changes as the needs and constraints of the project change (Cooper, 2004). To address this problem, one could design for a specific user, but this produces a product that is too narrowly focused (Jacobs et al., 2008). Instead one could compile information on many users in the form of a report on key demographics and characteristics of users. The detailed nature of these reports makes them cumbersome to use (Pruitt &amp; Adlin, 2010) and they are not naturally reasoned about by the human mind (Grudin, 2006). In order to help designers understand, communicate about and effectively design for a variety of users, personas are used. These clearly defined representations of people package a large amount of information into a succinct format that is easy to understand and gives the design team something concrete to refer to and discuss (Pruitt &amp; Adlin, 2010; Ystršm, Peterson, Von Sydow, &amp; Malmqvist, 2010). Personas help the designers become user-centered and avoid self-centered designs (Pruitt &amp; Adlin, 2010). Personas are an especially powerful communication tool because we as humans are innately equipped to generate and engage with representations of people, as opposed to statistical summaries, which are more difficult for us to engage with (Grudin, 2006). The personas do not represent individual users but contain key differentiating characteristics from an amalgamation of users. This allows designers to focus on important characteristics and not get sidetracked by superfluous details. The abstraction of personas away from the interviewees upon which they are based also ensures the anonymity of participants, which is especially important when focusing on sensitive issues that participants would not discuss unless anonymity were guaranteed. Further, there are cases where even though participants are not identified outright, their uniqueness creates an anonymity set too small to protect their identity. Creating personas for these kinds of participants ensures their protection. Finally, personas are referred back to throughout the entire project to ensure that the product does not depart from the needs of the actual users. There are several limitations of the method of personas. Because personas blend together characteristics of many users, it is hard to tell which and how many users each persona actually represents (Chapman &amp; Milham, 2006). There is a propensity for designers to base their understanding of users on stereotypes and not the actual users (Turner &amp; Turner, 2011). This can be mitigated by closely coupling data to the persona creation. Personas are difficult to validate, as they emerge from an interaction of the specific set of users interviewed, the questions discussed and decisions by the design team (Chapman &amp; Milham, 2006). The designers make conscious decisions about what aspects of the users to include in the personas based on which aspects they understand are important to the final product. It is likely that given a similar topic but different set of users and designers, different personas would emerge. That being said, validity can be established with expert review (Ystršm, Peterson, Sydow, &amp; Malmqvist, 2009). The effectiveness of the final product for the intended user base is an additional measure of validity. In this paper we detail our methodology, describe the personas that emerged from our interviews and discuss their usefulness in designing professional development resources around educational innovations. ## Methodology: Creation of Personas We used semi-structured interviews to learn about faculty membersÕ and department headsÕ current practices and needs around assessment in physics. We interviewed 13 physics faculty and 11 physics department heads in online interviews. Video was used in most. We recruited faculty members from a list of participants from a professional development workshop for new faculty held several years earlier. We sent faculty an email invitation to participate. We subsequently received recommendations from current participants and the project staff for other faculty who might be willing to participate and invited them. We recruited department heads from a list of participants from a different professional development workshop held the previous summer. A sufficient number of these department heads agreed to participate, so no additional invitations were needed. Our overall sample included eight participants from undergraduate serving public institutions, six from undergraduate serving private institutions and 10 from research institutions. As part of our interview protocol, we asked participants about their background, school and department, current teaching practices and use of assessment, needs around assessment and how our online resources might meet their needs. Our interview team included two user interface designers (one is a former physics education researcher) and a physics education researcher. During most of the interviews, one team member engaged with the interviewee while the others listened and took notes. The interviews were recorded and after each interview, the team members individually wrote down the key points they noticed, primarily attending to the userÕs motivations and goals, tasks that they commonly completed around assessment, attitudes and beliefs, needs, pain points and constraints. These items were often discussed amongst the team members before the next interview. After several interviews, the team identified a few characteristics that varied among the interviewees and strongly influenced their teaching and assessment practices. For example, the intervieweesÕ level of Òbuy-inÓ to educational innovations and knowledge of these resources varied significantly and had a strong impact on their use of research-based materials. We plotted the participants on these two axes and found groupings of participants, which helped in the initial development of the personas. As the interviews progressed, we continued to identify key differentiators and used a constant comparison protocol to determine if they were meaningful. As we reached saturation, we developed an initial profile for each persona and tested these to see if they fit the actual users we had interviewed. After we had completed all the interviews, one team member re-listened to most of the interviews and took additional notes on goals, motivations and needs, writing down key illustrative quotes. These quotes were used to create a document synthesizing the tasks, behaviors and attitudes of each persona. These quotes and synthesis were used to once again modify the personas. Finally, we discussed the current version of the personas as a team and made additional changes based on evidence presented in the discussion. Using the final versions of the personas, we ranked each on the variety of differentiating characteristics identified during the persona construction process, e.g., the degree to which faculty valued evidence or intuition to guide their teaching and assessment practices. These rankings helped fill out the important characteristics of the personas. With a rich understanding of the personas, we created task flows and outlined associated pain points. Task flows are detailed lists of steps describing common tasks users complete around the aim of the project, in our case, common tasks around teaching and assessment. Examples include finding a new researchbased assessment or teaching method or comparing the results of an assessment. Within each task flow, we identified Òpain pointsÓ discussed by users. Pain points are any inconvenience, confusion or frustration that users encounter when performing a specific task, for example, uncertainty on how to interpret the results of an assessment or difficulty finding appropriate data to compare oneÕs results to. Finally, the design team met with the larger group of project stakeholders to prioritize the personas with respect to the design of the website. They discussed their own goals for the website and the likelihood that a particular persona would benefit from the siteÕs offerings in order come to a consensus decision on which personas to design the site for. ## Results: The Personas Five personas emerged from our interviews (Table 1). In order to discuss these personas most naturally, they were given names and assigned pictures. We also chose key quotes from the interview transcripts to help us grasp who each persona represented and outlined their goals and motivations as related to assessment and teaching. Table 2 contains rankings of the personas on key characteristics that differentiate them from one another. Tables 1 and 2 are used together to get a full picture of what constitutes each persona. The demographics of the personas are not meant to be a meaningful characteristic. We recognize that these do not reflect the demographic distribution of US physics faculty. After creating the personas, we outlined the key task flows and pain points that each would have when interacting with our online resources. For example, a common task flow for Diane, the pragmatic satisficer, is to search for a research-based assessment, run the assessment, analyze and interpret the results and compare the results with others. Her pain points include a concern that students are not taking it seriously, too much time is required to analyze the results and it is difficult to find data from other institutions for comparison. Several other task flows and associated pain points emerged for Diane during the interviews. This information gives the team a rich sense of who Diane is and her wants and difficulties, which allows us to design our online resource to meet her stated needs as well as infer solutions to other needs that users like her may not have voiced. After review and discussion of the personas and our own goals for the site, the stakeholder team prioritized who the site will be designed for. We believe that we can have the most impact on scaling and sustaining educational innovations if we provide resources to faculty who are already motivated to improve student learning. We feel our impact would be lessened if we focused on convincing skeptical faculty to use these innovations. Further, faculty who are already successful at using innovations donÕt need our help as much as those with little experience. So we prioritized in order from most to least important, Raphael the motivated novice, Tim the seeker, Diane the pragmatic satisficer, Marge the proto-researcher and Paula the skeptic. ## Analysis and Discussion Understanding who we should design for, their task flows and pain points, and prioritizing these personas tells us a lot about how to design our online resources so they are targeted and personal. For example, different personas thrive with different levels and kinds of information about educational innovations. Raphael is brand new to using educational innovations and doesnÕt have a lot of time, so he needs simple practical information and ready-to-go teaching and assessment materials. He also needs resources on how to face obstacles he will encounter when using these new methods which will support him in persisting in his use of the innovations. On the other hand, Tim has experience using educational innovations and wants lots of details about the research-validation and theoretical underpinnings of the innovation. He would also like information on how this innovation compares to other innovations he is familiar with. This level of detail will help him intelligently choose the most appropriate innovation for his own environment. Paula has a low buy-in to the value of educational innovations but cares about student learning, so she needs resources to help her understand how educational innovations can improve learning before being interested in the details of a new innovation. There is rarely a professional development situation where only one persona is represented. Further, an individual faculty member may have characteristics from several personas. To address this, different aspects of the professional development resources should be designed to appeal to the personas based on the prioritization decided on by the stakeholder team. This is in contrast to the common practice of providing one type of professional development resource that might appeal to only one persona or contain so little or so much information that it benefits no one at all. We briefly discuss how we personalized our website based on the personas. The needs of Raphael were our top priority, so we designed a simple home page with very basic but enticing information and a jump bar with links to articles answering his commonly asked questions. From the home page, we provided links to more detailed pages so that Diane can, for example, compare her students to others using a database of assessment results to get the number she cares about. We also provided links from the home page for Tim leading him to detailed information about the research validation for each innovation and recommendations for new innovations to try. We believe design choices like these will help faculty who identify with a given persona easily find what they need to implement or continue using educational innovations. We believe the method of personas is useful whenever researchers seek to design a professional development resource or experience aimed at scaling or sustaining educational innovations. Personas encourage the design team to focus on the users and transform a large amount of detailed information about individuals into digestible outlines of fictional people who can be easily be understood and discussed. This method also provides a framework for how to design professional development targeted at different types of users and fills in the details of who the users are and what needs or motivations they have that the innovation can satisfy. With an increased focus on the users and not just the innovations themselves, we believe more educators will take up new innovations and continue to use them. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-acd450cc-3dec-437a-9f05-7ec4a8c50c02.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-52fac269-0d6f-4c8d-bb0e-be0b554e14be.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-03d56ede-cd51-40b3-a3a9-3c00bb8f2439.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-1ec08225-7856-442b-bc23-ca95d0767f00.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-f960e65d-860d-46f3-9c7e-1995948b04e7.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-333f1aca-2a68-4312-84a5-092e52190943.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-f8878745-1e2f-40e9-852e-46e21b1e0b0d.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-bf3a8551-3f52-404e-8fb0-622cb454faf5.jpg) Table 1: Descriptions of five personas emerged from interviews with physics department heads and faculty. These personas represent user archetypes, but no persona exactly represents any one user. (names and pictures are included to help communicate about the personas as if they were real people) | | Key Quote | Motivations and Goals | |--------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Paula the Skeptic | "The entire assessment movement seems to ignore that we are already assessing our students." | ∞ Unconvinced that research-based techniques offer anything more than traditional/current methods ∞ Assessment to reaffirm validity of current teaching methods ∞ External pressures for assessment | | Raphael the Motivated Novice | "... make it useful for the students. I mean at the end of the day, that's all I really care about." | ∞ Thoughtful teacher who cares about student learning ∞ Traditional background or new to teaching ∞ Acknowledges challenges with traditional methods ∞ Time-pressured | | Diane the Pragmatic Satisficer | "The ability for faculty to compare what they are doing with other faculty would be really useful and spur them on to improve their teaching." | ∞ Interested in the result of assessment: the number ∞ Gives assessment to compare results ∞ Wants to know what teaching methods ÒworkÓ ∞ Prefers summary information | | Tim the Seeker | "We're driven by data & cause & effect. If the data shows that the students are getting more out of the course, then that gives you reason to change." | ∞ Generally curious and interested in student learning improvement ∞ Asks questions which lead to change/ improvement ∞ Wants to find suitable existing tools ∞ Internally motivated | | Marge the Proto- researcher | "It's hard to argue that you don't want data about what your students are learning in your class." | ∞ Has questions or needs beyond those already answered by educational research ∞ Wants to assess new aspects of students understanding / development ∞ Needs to do more analysis of results | ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1125v2-figure-27d6c664-b89d-449a-9b4a-d7905fc7be5b.jpg) Table 2: Ranking of personas on characteristics that emerged in user interviews. P = Paula the Skeptic, R = Raphael the Motivated Novice, D = Diane the Pragmatic Satisficer, T = Tim the Seeker, M = Marge the Protoresearcher, PER = physics education research. | High PER knowledge | M | T | D | R P | Low PER knowledge | |-------------------------------------|-----|-----|-----|-------|-------------------------------------| | High PER buy-in | T M | D | R | P | Low PER buy-in | | Reformed teacher | M | T | D R | P | Traditional teacher | | Evidence-based | M | T | D R | P | Intuition-based | | Teacher responsibility for learning | | T M | D R | P | Student responsibility for learning | | Cares about meaning of results | M | T | R P | D | Cares about numerical result | | Seeks expert opinion | D M | T | | P | Confident in own opinion/skills | | High influence over teachers | M | T | D P | R | Low influence over teachers | ## References Blomberg, J., &amp; Burrell, M. (2009). An ethnographic approach to design. In A. Sears &amp; J. A. Jacko (Eds.), Human-Computer Interaction: Development Process (pp. 71Ð94). Boca Raton: CRC Press. Calde, S., Goodwin, K., &amp; Reimann, R. (2002). SHS Orcas : The first integrated information system for longterm healthcare facility management. In CHI Õ02 Case Studies of the CHI2002 | AIGA Experience Design Forum (pp. 2Ð16). New York: ACM. Chapman, C. N., &amp; Milham, R. P. (2006). The personasÕ new clothes: methodological and practical arguments against a popular method. Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting , 50 (5), 634Ð636. Cooper, A. (2004). The inmates are running the asylum: Why high-tech products drive us crazy and how to restore the sanity . Indianapolis: Sams - Pearson Education. Grudin, J. (2006). Why personas work: the psychological evidence. In J. Pruitt &amp; T. Adlin (Eds.), The persona lifecycle: Keeping people in mind throughout the product design (pp. 643Ð663). Burlington: Morgan Kaufmann. Henderson, C., &amp; Dancy, M. H. (2008). Physics faculty and educational researchers: Divergent expectations as barriers to the diffusion of innovations. American Journal of Physics , 76 (1), 79Ð91. Henderson, C., Dancy, M., &amp; Niewiadomska-Bugaj, M. (2012). Use of research-based instructional strategies in introductory physics: Where do faculty leave the innovation-decision process? Physical Review Special Topics - Physics Education Research , 8 (2), 020104. doi:10.1103/PhysRevSTPER.8.020104 Henderson, C., Finkelstein, N., &amp; Beach, A. (2010). Beyond dissemination in college science teaching: An introduction to four core change strategies. Journal of College Science Teaching , 39 (5), 18Ð25. Jacobs, A., Dreessen, K., &amp; Pierson, J. (2008). ÒThickÓ Personas Ð Using ethnographic methods for persona development as a tool for conveying the social science view in technological design. Observatorio Journal , 5 , 79Ð97. Penuel, W. R., Fishman, B. J., Haugan Cheng, B., &amp; Sabelli, N. (2011). Organizing research and development at the intersection of learning, implementation, and design. Educational Researcher , 40 (7), 331Ð337. Pruitt, John, &amp; Adlin, T. (2010). The Persona Lifecycle: Keeping People in Mind Throughout Product Design Burlington: Morgan Kaufmann. . Sears, A., &amp; Jacko, J. A. (Eds.). (2007). The human-computer interaction handbook: fundamentals, evolving technologies and emerging applications (2nd ed.). New York: Taylor and Francis. Turner, P., &amp; Turner, S. (2011). Is stereotyping inevitable when designing with personas? Design Studies , 32 (1), 30Ð44. Ystršm, A., Peterson, L., von Sydow, B., &amp; Malmqvist, J. (2009). Using personas as a mediating tool in the development of engineering programs. In Proceedings 2: a Utvecklingskonferensen fšr Sveriges ingenjšrsutbildningar. Ystršm, A., Peterson, L., Von Sydow, B., &amp; Malmqvist, J. (2010). Using Personas to Guide Education Needs Analysis and Program Design. In Proceedings of the 6th International CDIO Conference . MontrŽal.
null
[ "Adrian Madsen", "Sarah B. McKagan", "Eleanor C. Sayre", "Mathew \"Sandy\" Martinuk", "Alexander Bell" ]
2014-08-05T21:55:39+00:00
2017-02-23T23:00:57+00:00
[ "physics.ed-ph" ]
Personas as a Powerful Methodology to Design Targeted Professional Development Resources
Scaling and sustaining educational innovations is a common problem in the learning sciences. Professional development resources around educational innovations that are personalized to appeal to the needs and motivations of different types of faculty offer a possible solution. The method of developing personas to represent key types of users is commonly employed in user-interface design and can be used to produce personalized resources. Personas are fictional named archetypes of users encompassing generalizations of their key characteristics and goals that emerge from interviews. This method is especially powerful because personas succinctly package information into the form of a person, who is easily understood and reasoned about. Herein we describe the creation of a set of personas focusing on the needs and motivations of physics faculty around assessment and teaching. We present the personas, a discussion of how they inform our design and how the method can be used more broadly.
1408.1126v1
## The refractive index and electronic gap of water and ice increase with increasing pressure Ding Pan a, ∗ , Quan Wan a,b , and Giulia Galli b a Department of Chemistry, University of California, Davis, CA 95616, USA b The Institute for Molecular Engineering, University of Chicago, Chicago, IL 60637, USA ∗ [email protected] (Dated: April 14, 2014) ## Abstract Determining the electronic and dielectric properties of water at high pressure and temperature is an essential prerequisite to understand the physical and chemical properties of aqueous environments under supercritical conditions, e.g. in the Earth interior. However optical measurements of compressed ice and water remain challenging and it has been common practice to assume that their band gap is inversely correlated to the measured refractive index, consistent with observations reported for hundreds of materials. Here we report ab initio molecular dynamics and electronic structure calculations showing that both the refractive index and the electronic gap of water and ice increase with pressure, at least up to 30 GPa. Subtle electronic e /uniFB00 ects, related to the nature of interband transitions and band edge localization under pressure, are responsible for this apparently anomalous behavior. ## INTRODUCTION Water is arguably the most important material in the biosphere, as well as a key constituent of the Earth crust and mantle. Its properties have been extensively studied as a function of temperature (T) and pressure (P) for several decades [1, 2]. However, the electronic structure of water under pressure has remained elusive, due to experimental dif/uniFB01 culties in measuring absorption processes in wide band gap insulators in diamond anvil cells. The electronic properties of compressed water are key, for example, to understanding electron charge transfer rates in redox reactions [3, 4] occurring in supercritical water [1], and aqueous solutions in the Earth's interior [2]; such reactions, that depends on both the electronic and static dielectric constant of water, determine the oxidation states of minerals and rocks. Water was predicted to undergo an insulator-to-metal transition at rather large pressures, estimated between 100 GPa and 5 TPa [6-9], though no experimental con /uniFB01 rmation has yet been reported. Experimentally, it is di /uniFB03 cult to directly establish the variation of the liquid electronic gap as a function of P, which at ambient conditions is outside the optical window of diamond: the optical gap of diamond is 5.4 eV [10] with the absorption tail as low as ∼ 4 eV, and the quasi particle gap of water at ambient conditions is estimated to be 8.7 ± 0.5 eV [11, 12] with the optical absorption onset at ∼ 7 eV [13, 14]. Hence the band gap ( E g ) of high pressure ice VII (a disordered ice phase stable between 3 and ∼ 60 GPa [15, 16]) has been inferred from measurements of its refractive index, n , which can be obtained by using low energy photons without probing absorption processes [17]. In particular, it has been common practice to use a single-oscillator model, e.g., the Penn model [18], to relate n and E g , as in the case of other molecular crystals, notably hydrogen[19, 20]. According to the Penn model, the refractive index n and the electronic gap E g are inversely correlated: n 2 = 1 + (¯ h ω fp ) 2 E 2 g , where ω fp is the plasma frequency. This inverse correlation between n and E g holds for a broad class of materials [21, 22]. Zha et al. measured the refractive index of ice VII as a function of pressure up to 120 GPa and found that it increased with pressure , similar to the case of solid hydrogen. They found weak dispersion of the refractive index, and its pressure dependence, leading them to conclude that the band gap is preserved to very high pressure, ultimately closing only in the terapascal pressures and well beyond the stability /uniFB01 eld of ice VII. The refractive index of liquid water has been measured only up to 7 GPa, at T = 673 K [23], while no measurements have yet been reported of its electronic gap in such P-T regime. In order to investigate the electronic and dielectric properties of water under pressure, we carry out ab initio molecular dynamics (MD) simulations and compute, independently, the refractive index n and the electronic gap E g in the pressure range 0-30 GPa. We obtain values for the refractive index of ice and water in good agreement with experiments [17, 23]; however we /uniFB01 nd that both n and E g increase with pressure in the solid and liquid phases. Our results show that a simple single-oscillator model used to rationalize the electronic properties of many semiconductors and insulators, may not be employed to describe water under pressure. We /uniFB01 nd that due to subtle but important changes in the localization properties of the valence band of water and ice, the strength of inter band transitions is not a constant under pressure. As a consequence n and E g are not inversely correlated, but exhibit a more complex interdependence, not captured by widely used simple models. Our results are consistent with those of Hermann and Schwerdtfeger who reported an increase of the optical gap of ice under pressure [24], using calculations based on many body perturbation theory with a /uniFB01 tted dielectric constant. ## RESULTS ## Refractive index of water and ice For photon energies (¯ h ω ) much smaller than the band gap, absorption processes may be ignored and n 2 = /uni03F5 1 , where /uni03F5 1 is the real part of the electronic dielectric constant. For simple semiconductors, the Penn model [18] yields a reasonable approximation of /uni03F5 1 . The validity of such model may extend beyond simple semiconductors, as suggested by Wemple and DiDomenico who showed that [ /uni03F5 1 (0) -1] is approximately proportional to 1 /E g for more than 100 solids and liquids[21]. However, as discussed below, the description of the properties of water and ice requires a more sophisticated level of theory. Fig. 1 reports the calculated refractive index of water and ice, as a function of pressure, and shows that n increases with P along isotherms for both the solid and the liquid. We also show experimental results for ice VII [17] and water up to 7 GPa [23]. To the best of our knowledge our results represent the /uniFB01 rst data obtained for the refractive index of the supercritical liquid above 7 GPa. Indeed, the highly corrosive character of hot, compressed water makes experiments rather challenging at high P and T. We found good agreement with experiments, especially above 5 GPa, with the deviations present at low pressure ascribed to errors introduced by the use of the PBE functional [25]. Semi-local functionals have been shown to yield results for water and ice under pressure in better agreement with experiments than at ambient conditions [26], e.g., for the calculation of the equation of state [27] and the dielectric properties [16, 27]. Preliminary calculations of the electronic dielectric constant of water at ambient conditions using the PBE0 [28, 29] functional showed a much improved agreement with experiment, yielding /uni03F5 1 = 1.78 (to be compared with the experimental value of 1.77). The same improvement was also found for the static dielectric constant of ice Ih[30]. For ice VIII at 30 GPa, we found instead a minor di /uniFB00 erence of 4% between the electronic dielectric constants obtained by PBE and PBE0. ## Electronic gap of water and ice In Fig. 2, we show the electronic gap of water and ice, computed as the di /uniFB00 erence between the conduction band minimum (CBM) and the valence band maximum (VBM) as a function of pressure. We report values obtained with the PBE functional and, in the inset, with the hybrid functional, PBE0 [28, 29]. In spite of large statistical /uniFB02 uctuations at high T, the trend of an increasing gap with pressure is evident, irrespective of the level of theory used. As well known, the PBE functional underestimates the band gap of water [12, 31], but the gap variation under pressure is qualitatively the same and quantitatively similar within PBE and PBE0. We expect the rate at which the optical gap increases with pressure be larger than for the electronic gap. Indeed, based on our results for /uni03F5 1 , we estimated that the exciton binding energy, E b , of water will be decreased by about 60% in going from ambient pressure to ∼ 30 GPa, and that of ice VII/VIII by 40% (The E b of water at ambient conditions is about 2.4 eV [31]). Our estimate is based on the relation E b = m / m ∗ ( e /uni03F5 2 1 a 0 ), where m ∗ is the electronic e /uniFB00 ective mass, m e the electron mass and a 0 the Bohr radius [32], where we assumed a negligible variation of the electronic e /uniFB00 ective mass under pressure, as indicated by our band structure calculations (not shown). Our results for band gaps are consistent with those reported by Hermann and Schwerdtfeger for ice VIII, using many body perturbation theory [24]. These authors used the G W 0 0 approximation and the Bethe-Salpeter equation [24] to compute absorption spectra, with a model dielectric function to approximate the screened Coulomb interaction. In their model, the electronic dielectric constant was an input parameter. Our results are also consistent with those of Boero et al. who reported an increase of the band gap of supercritical water at 653 K, for densities larger than 0.5 g cm -3 , by using ab initio MD and the BLYP functional [33]. ## Relation between refractive index and band gap Our calculations showed that both the refractive index and the electronic gap of water and ice increase under pressure, up to at least 30 GPa. They also showed that n of ice is larger than that of the liquid, in spite of the latter having a smaller electronic gap. Thus, the simple inverse correlation between E g and n used to interpret experiments, and valid for a wide range of substances [21], does not hold for water and ice. We show in the following that two reasons are responsible for this apparent anomalous behavior: (i) an increase of the electronic density with pressure and hence of the plasma frequency ω 2 fp = 4 πρ e e 2 m e , where ρ e is the density of valence electrons and e the elementary charge; (ii) a change in the localization property of the valence band of the liquid and solid, as P is increased, which in turn is responsible for changes in the strength of interband transitions. Interestingly, while for ice the increase in ρ e (and ω fp ) counterbalances the increase of E g and hence [ /uni03F5 1 (0) -1] / ρ e decreases under pressure, the corresponding quantity for water shows an increase (see Fig. 3). Ice and water behave as several oxides [34] in exhibiting a positive derivative of the refractive index, with respect to ρ e . However for both water and ice the quantity [ /uni03F5 1 (0) -1] E / 2 g ρ e is not a constant, as it would be if the Penn model correctly described the relation between the dielectric constant and electronic gap, but it monotonically increases with pressure, at all T considered here. We therefore adopted a higher level of theory and derived the real part of the electronic dielectric constant in the random phase approximation (RPA): $$\epsilon _ { 1 } ( \omega ) = 1 + \frac { e ^ { 2 } } { \pi ^ { 2 } m _ { e } } \sum _ { v, c } \int _ { B Z } d \vec { k } \frac { f _ { c v } ^ { \mu } ( \vec { k } ) } { \omega _ { c v } ^ { 2 } ( \vec { k } ) - \omega ^ { 2 } }$$ where c and v are the conduction and valence band indices, respectively, and the integral is over the Brillouin Zone (BZ). In the integrand f µ cv ( ⃗ k ) is the oscillator strength in the polarization direction ⃗ e µ associated to the transition between the bands c and v , and ¯ h ω cv ( ⃗ k ) is the corresponding transition energy. In the case of water, only the Γ point was used in our electronic structure calculations; at zero frequency one has : $$\epsilon _ { 1 } ( 0 ) = 1 + \frac { 8 \pi e ^ { 2 } } { V m _ { e } } \sum _ { v, c } \frac { f _ { c v } ^ { \mu } } { \omega _ { c v } ^ { 2 } }$$ where V is the volume of the simulation cell. Note that in a single-oscillator model with ¯ h ω cv = E g , Eq. 2 reduces to the Penn model, due to the oscillator strength sum rule. The oscillator strength is given by $$f _ { c v } ^ { \mu } = \frac { 2 m _ { e } \omega _ { c v } } { \hbar } | \langle c | \vec { e } _ { \mu } \cdot \vec { r } | v \rangle | ^ { 2 } \in \epsilon _ { 2 } ( \omega _ { c v } ) V \omega _ { c v },$$ where ⟨ c | and | v ⟩ denote Kohn-Sham orbitals corresponding to valence( v ) and conduction( ) c states, and /uni03F5 2 is the imaginary part of the dielectric function. For v to c transitions right across the band gap, the oscillator strength is proportional to [ /uni03F5 2 ( ω cv ) V ω cv ]. In Fig. 4 we plotted /uni03F5 2 ( ω ) V of two water con /uniFB01 gurations at 1000 K, at ∼ 1 GPa and ∼ 10 GPa. These are representative of a set of 25-55 snapshots analyzed for each pressure, extracted from our MD trajectories at equally spaced simulation times; for each of them we found that at ¯ h ω = E g , /uni03F5 2 V is much larger at ∼ 10 GPa than at ∼ 1 GPa. The oscillator strength of the transitions just across the band gap, which yields largest contribution to /uni03F5 1 (0) according to Eq. 2, is thus substantially enhanced when the pressure increases from ∼ 1 GPa to ∼ 10 GPa, and the absorption edge is blue shifted, as expected from our electronic gap calculations. We conclude that it is because of the enhancement of f µ cv , which outweighs the increase of E g , that the refractive index of water increases under pressure. We note that local /uniFB01 eld e /uniFB00 ects are not included in Eq. 1 [35]; they are instead taken into account in our density functional perturbation theory (DFPT) calculation of the refractive index 1 [37]. We veri /uniFB01 ed that neglecting such e /uniFB00 ects amounts to a negligible error in the calculations of n . In Fig. 5, we compare /uni03F5 1 (0) of ice VIII, as well as that of high pressure water, obtained with and without local /uniFB01 eld corrections. The two sets of values are rigidly shifted by only 0.1 ∼ 0.2 with respect to each other, indicating that none of the trends as a function of pressure reported here is a /uniFB00 ected by local /uniFB01 eld e /uniFB00 ects. ## Localization properties of water and ice valence bands In order to understand the changes in the oscillator strength of water under high pressure, we computed the inverse participation ratios (IPRs) of the VBM and CBM orbitals; they are reported in Fig. 6. The IPR is de /uniFB01 ned as $$I P R _ { \alpha } = \frac { \frac { 1 } { N } \sum _ { i = 1 } ^ { N } | \psi _ { \alpha } ( i ) | ^ { 4 } } { [ \frac { 1 } { N } \sum _ { i = 1 } ^ { N } | \psi _ { \alpha } ( i ) | ^ { 2 } ] ^ { 2 } }, \\ \text{number of points used to perform integrals over a real space grid,}$$ where N is the total number of points used to perform integrals over a real space grid, and ψ α ( ) i is the wave function associated to the band α . The quantity IPR α yields the statistical variance for the distribution of | ψ α | 2 in the system. The larger the IPR, the more localized the wave function. An IPR α close to 1 indicates a delocalized electronic orbital. Fig. 6 shows that under pressure, as at ambient conditions, the CBM of water is much more delocalized than its VBM [38]. The interesting /uniFB01 nding is that with increasing pressure the 1 Denote the static dielectric matrix /uni03F5 GG ′ (0), where G and G ′ are reciprocal lattice vectors; /uni03F5 -1 1 (0) = [ /uni03F5 GG ′ (0)] -1 | G G = ′ =0 , implying that /uni03F5 -1 1 (0) is the /uniFB01 rst element of the inverse dielectric matrix [36]. However in Eq. 1, /uni03F5 1 (0) is simply /uni03F5 00 (0) and so called local /uniFB01 eld e /uniFB00 ects are neglected [35]. localization properties of the CBM are largely una /uniFB00 ected, while those of the VBM change substantially, with a tendency of the VBM to delocalize. The electronic states of ice VIII behave similarly except that the variation of the VBM localization as a function of P is smaller than that of water, as shown in Fig 6(c). As a result, under pressure the spatial overlap between the electron and hole wave functions is enhanced, and the matrix element ⟨ c e | ⃗ µ · ⃗ r v | ⟩ increases (see Eq. 3). The fact that the localization of the CBM does not change signi /uniFB01 cantly under pressure, while that of the VBM substantially changes, suggests that the opening of the gap in ice and water under pressure may be mostly due to a change in the position of the VBM. Experimentally Zha et al. [17] measured n as a function of ω and obtained two parameters, E d and E 0 from the equation n 2 -1 = E E / E d 0 ( 2 0 -¯ h 2 ω 2 ). The /uniFB01 t was then used to conclude that the gap of ice decreases under pressure. Note that in the experiment of Ref. [17] when the light wavelength is between 569 to 741 nm, n changes by less than 0.05; as a result, the e /uniFB00 ective band gap determined from the single-oscillator model changes little with pressure. It is presumably di /uniFB03 cult to estimate E d and E 0 . The values for E d and E 0 obtained from the /uniFB01 ts gave a predicted closing of the band gap only at ultrahigh pressures ( ∼ 4.5 TPa), well beyond the pressure range of the measurements. We have shown here that state-of-theart calculations of the electronic structure are essential to properly interpret complex and sophisticated optical experiments and obtain the correct band gap trend under pressure. ## DISCUSSION We reported the /uniFB01 rst data for the refractive index of supercritical water above 7 GPa and at high temperature. We showed that the refractive index, and the electronic and optical gaps of water and ice increase under pressure, and thus water properties di /uniFB00 er substantially from those of apolar molecular /uniFB02 uids and solids, e.g. hydrogen [39], methane [40, 41] and benzene [42, 43], whose electronic gaps decrease with pressure but refractive indexes increase. We showed that the unusual relationship between n and E g stems from an enhancement of the strength of interband transitions right across the band gap. This enhancement, in combination with a decrease of the volume, outweighs the increase in the band gap upon compression, and hence the refractive index of water increases with pressure. The behavior of the interband transition strength originates from the delocalization of the valence band edge, whose overlap with the conduction band minimum increases with pressure. Our results showed that the use of simple models, e.g. the Penn model [18], to relate measured refractive indexes to band gaps of molecular /uniFB02 uids and crystals should be revisited and in general complex electronic structure e /uniFB00 ects should be taken into account, when predicting values of band gaps. We emphasize that the type of electronic structure calculations reported here allows one to infer the band gap of water from high pressure measurements of the refractive index [17]. Measurements of the band gap of water by light absorption or emission are not yet feasible under pressure, in diamond anvil cells; therefore establishing the correlation between the band gap and the refractive index is a crucial step to infer band gaps from measured dielectric constants. In general, ab initio calculations play a key role in interpreting measurements of /uniFB02 uids under pressure, especially in unraveling their electronic structure. Finally we note that the results reported here for gaps and dielectric constants are expected to have an important impact in the broad /uniFB01 eld of water-related science. For example, factors determining the rate of electron transfer in aqueous environments (and hence several chemical reactions occurring in these media) include the refractive index and the static dielectric constant of the medium[3]. Hence knowledge of such quantities is key to predict reorganization energies and electron transfer rates in supercritical water and water under pressure, for example in the Earth's interior. In addition, the mobility of charges created in water by, e.g. photo-excitation, depends, among other factors, on the exciton binding energy ( E b ); our results indicate that E b decreases under pressure and hence charge mobility is expected to change substantially in supercritical water, with respect to water at ambient conditions, with implications for charge transport under bias, in supercritical conditions. ## METHODS ## Water We carried out ab initio molecular dynamics (MD) simulations of water under pressure as a function of temperature in the Born-Oppenheimer approximation with the Qbox code (version 1.54.2, http://eslab.ucdavis.edu/software/qbox/)[44]. We used 128-molecule unit cells with periodic boundary conditions, plane-wave basis sets and norm conserving pseudopotentials (Gygi, F. Pseudopotential Table, http://fpmd.ucdavis.edu/potentials/index.htm). Atomic trajectories were generated with a plane-wave kinetic energy cuto /uniFB00 of 85 Ry, which was then increased to 220 Ry for the calculation of pressure on selected snapshots [27]. ## Ice VIII Calculations for ice VIII were conducted by using a 8-molecule unit cell with a plane-wave energy cuto /uniFB00 of 220 Ry and 4 × × 4 3 k-point mesh, and a 96-molecule supercell with a cuto /uniFB00 of 85 Ry and Γ point only. ## Electronic structure calculations Trajectories were generated with the Perdew-Burke-Ernzerhof (PBE) exchange correlation functional [25], while electronic gaps and dielectric constants were computed with both the PBE and PBE0 [28, 29] functionals on snapshots extracted from PBE trajectories. At the PBE level, the electronic dielectric constant /uni03F5 1 was calculated using density functional perturbation theory (DFPT) [37], as recently implemented in the Qbox code for the calculation of Raman spectra [45]. At the PBE0 level of theory, we instead used an electronic enthalpy functional [46]. We calculated the strengths of inter band transitions with the Quantum-expresso package [47]. We used a Gaussian broadening parameter equal to 0.001 eV. ## REFERENCES - [1] Weing¨ artner, H. &amp; Franck, E. Supercritical water as a solvent. Angew. Chem. Int. Ed. 44 , 2672-2692 (2005). - [2] Liebscher, A. Aqueous /uniFB02 uids at elevated pressure and temperature. Geo /uniFB02 uids 10 , 3-19 (2010). - [3] Chandler, D. 'Electron transfer in water and other polar environments, how it happens' in Berne, B. J., Ciccotti, G. &amp; Coke, D. F. (eds.) Computer Simulation of Rare Events and Dynamics of Classical and Quantum Condensed-Phase Systems - Classical and Quantum Dynamics in Condensed Phase Simulations, 25-49 (World Scienti /uniFB01 c, Singapore, 1998). - [4] Marcus, R. A. On the theory of oxidation-reduction reactions involving electron transfer. I. J. Chem. Phys. 24 , 966-978 (1956). - [5] Adschiri, T., Lee, Y.-W., Goto, M. &amp; Takami, S. Green materials synthesis with supercritical water. Green Chem. 13 , 1380-1390 (2011). - [6] Hama, J., Shiomi, Y. &amp; Suito, K. Equation of state and metallization of ice under very high pressure. J. Phys.: Condens. Matter 2 , 8107 (1990). - [7] Cavazzoni, C. et al. Superionic and metallic states of water and ammonia at giant planet conditions. Science 283 , 44-46 (1999). - [8] Mattsson, T. R. &amp; Desjarlais, M. P. Phase diagram and electrical conductivity of high energydensity water from density functional theory. Phys. Rev. Lett. 97 , 017801 (2006). - [9] Hermann, A., Ashcroft, N. &amp; Ho /uniFB00 mann, R. High pressure ices. Proceedings of the National Academy of Sciences 109 , 745-750 (2012). - [10] Clark, C. D., Dean, P. J. &amp; Harris, P. V. Intrinsic edge absorption in diamond. Proc. R. Soc. London A 277 , 312-329 (1964). - [11] Bernas, A., Ferradini, C. &amp; Jay-Gerin, J.-P. On the electronic structure of liquid water: Facts and re /uniFB02 ections. Chem Phys 222 , 151-160 (1997). - [12] Pham, T. A., Zhang, C., Schwegler, E. &amp; Galli, G. Probing the electronic structure of liquid water with many-body perturbation theory. Phys. Rev. B 89 , 060202 (2014). - [13] Kerr, G. D., Hamm, R. N., Williams, M. W., Birkho /uniFB00 , R. D. &amp; Painter, L. R. Optical and dielectric properties of water in the vacuum ultraviolet. Phys. Rev. A 5 , 2523-2527 (1972). - [14] Hermann, A., Schmidt, W. G. &amp; Schwerdtfeger, P. Resolving the optical spectrum of water: Coordination and electrostatic e /uniFB00 ects. Phys. Rev. Lett. 100 , 207403 (2008). - [15] Pruzan, Ph., Chervin, J. C. &amp; Canny, B. Stability domain of the ice VIII proton-ordered phase at very high pressure and low temperature. J. Chem. Phys. 99 , 9842 (1993). - [16] Murray, E. D. &amp; Galli, G. Dispersion interactions and vibrational e /uniFB00 ects in ice as a function of pressure: A /uniFB01 rst principles study. Phys. Rev. Lett. 108 , 105502 (2012). - [17] Zha, C.-S., Hemley, R. J., Gramsch, S. A., Mao, H.-k. &amp; Bassett, W. A. Optical study of H O 2 ice to 120 GPa: Dielectric function, molecular polarizability, and equation of state. J. Chem. Phys. 126 , 074506 (2007). - [18] Penn, D. R. Wave-number-dependent dielectric function of semiconductors. Phys. Rev. 128 , 2093-2097 (1962). - [19] Hemley, R. J., Han /uniFB02 and, M. &amp; Mao, H. K. High-pressure dielectric measurements of solid hydrogen to 170 GPa. Nature 350 , 488 (1991). - [20] Loubeyre, P., Occelli, F. &amp; LeToullec, R. Optical studies of solid hydrogen to 320 GPa and evidence for black hydrogen. Nature 416 , 613-617 (2002). - [21] Wemple, S. H. &amp; DiDomenico Jr, M. Behavior of the electronic dielectric constant in covalent and ionic materials. Phys. Rev. B 3 , 1338 (1971). - [22] Kittel, C. Introduction to Solid State Physics (John Wiley &amp; Sons, Inc, 2005), 8th edn. - [23] Sanchez-Valle, C., Mantegazzi, D., Bass, J. D. &amp; Reusser, E. Equation of state, refractive index and polarizability of compressed water to 7 GPa and 673 K. J. Chem. Phys. 138 , 054505 (2013). - [24] Hermann, A. &amp; Schwerdtfeger, P. Blueshifting the onset of optical UV absorption for water under pressure. Phys. Rev. Lett. 106 , 187403 (2011). - [25] Perdew, J. P., Burke, K. &amp; Ernzerhof, M. Generalized gradient approximation made simple. Phys. Rev. Lett. 77 , 3865 (1996). - [26] Galli, G. &amp; Pan, D. A closer look at supercritical water. Proc. Natl. Acad. Sci. USA 110 , 6250-6251 (2013). - [27] Pan, D., Spanu, L., Harrison, B., Sverjensky, D. A. &amp; Galli, G. Dielectric properties of water under extreme conditions and transport of carbonates in the deep earth. Proc. Natl. Acad. Sci. USA 110 , 6646-6650 (2013). - [28] Adamo, C. &amp; Barone, V. Toward reliable density functional methods without adjustable parameters: The PBE0 model. J. Chem. Phys. 110 , 6158 (1999). - [29] Gygi, F. &amp; Duchemin, I. E /uniFB03 cient computation of Hartree-Fock exchange using recursive subspace bisection. J. Chem. Theory Comput. 9 , 582-587 (2012). - [30] Sch¨ onherr, M., Slater, B., Hutter, J. &amp; VandeVondele, J. Dielectric properties of water ice, the ice Ih/XI phase transition and an assessment of DFT. J. Phys. Chem. B 118 , 590-596 (2014). - [31] Garbuio, V., Cascella, M., Reining, L., Sole, R. D. &amp; Pulci, O. Ab initio calculation of optical spectra of liquids: Many-body e /uniFB00 ects in the electronic excitations of water. Phys. Rev. Lett. 97 , 137402 (2006). - [32] Dvorak, M., Wei, S.-H. &amp; Wu, Z. Origin of the variation of exciton binding energy in semiconductors. Phys. Rev. Lett. 110 , 016402 (2013). - [33] Boero, M., Terakura, K., Ikeshoji, T., Liew, C. C. &amp; Parrinello, M. Water at supercritical conditions: A /uniFB01 rst principles study. J. Chem. Phys. 115 , 2219 (2001). - [34] Waxler, R. M. &amp; Cleek, G. W. The e /uniFB00 ect of temperature and pressure on the refractive index of some oxide glasses. J. Res. Natl. Bur. Stand. Sect. A 77 , 755-763 (1973). - [35] Wiser, N. Dielectric constant with local /uniFB01 eld e /uniFB00 ects included. Phys. Rev. 129 , 62-69 (1963). - [36] Ping, Y., Rocca, D. &amp; Galli, G. Electronic excitations in light absorbers for photoelectrochemical energy conversion: /uniFB01 rst principles calculations based on many body perturbation theory. Chem. Soc. Rev. 42 , 2437-2469 (2013). - [37] Baroni, S., de Gironcoli, S., Dal Corso, A. &amp; Giannozzi, P. Phonons and related crystal properties from density-functional perturbation theory. Rev. Mod. Phys. 73 , 515-562 (2001). - [38] Laasonen, K., Sprik, M., Parrinello, M. &amp; Car, R. 'Ab initio' liquid water. J. Chem. Phys. 99 , 9080 (1993). - [39] Garc´a, A. ı et al. Dielectric properties of solid molecular hydrogen at high pressure. Phys. Rev. B 45 , 9709-9715 (1992). - [40] Lin, H., Li, Y.-l., Zeng, Z., Chen, X.-j. &amp; Lin, H. Structural, electronic, and dynamical properties of methane under high pressure. J. Chem. Phys. 134 , 064515 (2011). - [41] Hebert, P., Polian, A., Loubeyre, P. &amp; Le Toullec, R. Optical studies of methane under high pressure. Phys. Rev. B 36 , 9196-9201 (1987). - [42] Wen, X.-D., Ho /uniFB00 mann, R. &amp; Ashcroft, N. Benzene under high pressure: a story of molecular crystals transforming to saturated networks, with a possible intermediate metallic phase. J. Am. Chem. Soc. 133 , 9023-9035 (2011). - [43] Takagi, T. &amp; Teranishi, H. Refractive index of liquids under high pressure. J. Chem. Eng. Data 27 , 16-18 (1982). - [44] Gygi, F. Architecture of qbox: A scalable /uniFB01 rst-principles molecular dynamics code. IBM J. Res. Dev. 52 , 137-144 (2008). - [45] Wan, Q., Spanu, L., Galli, G. A. &amp; Gygi, F. Raman spectra of liquid water from ab initio molecular dynamics: vibrational signatures of charge /uniFB02 uctuations in the hydrogen bond network. J. Chem. Theory Comput. 9 , 4124-4130 (2013). - [46] Souza, I., ´ ˜iguez, J. &amp; Vanderbilt, D. First-principles approach to insulators in In /uniFB01 nite electric /uniFB01 elds. Phys. Rev. Lett. 89 , 117602 (2002). - [47] Giannozzi, P. et al. QUANTUM ESPRESSO: a modular and open-source software project for quantum simulations of materials. J Phys.: Condens. Matter 21 , 395502 (2009). ## ACKNOWLEDGMENTS We thank F. Gygi, M. Govoni and Y. Ping for many useful discussions and R. Hemley for a critical reading of the manuscript. This work was supported by Department of Energy (DOE), Computer Materials and Chemical Sciences Network, under Grant DE-SC0005180, and by the Sloan Foundation through the Deep Carbon Observatory. Part of this work was carried out using computational resources from the Extreme Science and Engineering Discovery Environment (XSEDE), provided by the National Institute for Computational Sciences (NICS) under Grant TG-MCA06N063, which is funded by the National Science Foundation; and resources at Lawrence Berkeley National Laboratory, NERSC, supported by DOE under Contract No. DE-FG02-06ER46262. ## CONTRIBUTIONS D. P. and G. G. designed the research. Most of the calculations were performed by D. P., with contributions from all authors. Q. W. implemented Density Functional Perturbation Theory (used for the calculation of the dielectric constants) into the Qbox code. All authors contributed to the analysis and discussion of the data and the writing of the manuscript. ## COMPETING FINANCIAL INTERESTS The authors declare no competing /uniFB01 nancial interests. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-5cbd2352-fed7-40b5-a053-20748a717170.jpg) FIG. 1. Refractive indexes. Pressure dependence of the refractive index, n , of water and ice. We computed n = √ /uni03F5 1 , where /uni03F5 1 is the real part of the electronic dielectric constant, obtained from ab initio simulations (see text). The experimental data for ice VII, obtained with light wavelength of 630 nm, are from Ref. [17]. The experimental values for water at 673 K are from Ref. [23]. We note that the statistical /uniFB02 uctuations in the value of n are rather small, indicating that /uni03F5 1 is largely insensitive to reorientations of the molecules in the /uniFB02 uid and to hydrogen bonding rearrangements, unlike the ionic dielectric constant [27]. When increasing the temperature from 1000 to 2000 K, n showed again moderate variations. The error bars show the standard derivations of the refractive indexes of water. Lines are drawn to guide the eyes only. Calculations were conducted for ice VIII instead of VII for computational simplicity, as ice VII is proton disordered. FIG. 2. Electronic gaps. Computed electronic gap of water and ice VIII as a function of pressure at 0, 1000 and 2000 K. The calculations were performed using the semilocal density functional, PBE, and in the inset, the hybrid functional PBE0. The error bars show the standard derivations of the band gaps of water. Lines are drawn to guide the eyes only. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-97ceaa5c-8fb0-4d76-818c-c8fe339d4975.jpg) GLYPH&lt;0&gt; FIG. 3. Volume e /uniFB00 ect on refractive indexes. This /uniFB01 gure shows G = ( /uni03F5 1 (0) -1) / ρ e as a function of pressure at 0, 1000 and 2000 K, where /uni03F5 1 (0) is the real part of the electronic dielectric constant at zero frequency and ρ e the valence electron density. The error bars show the standard derivations of the data for water. Lines are drawn to guide the eyes only. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-b560fe4d-9702-421e-be50-7a918b05635e.jpg) FIG. 4. Oscillator strength of interband transitions. The imaginary part of the electronic ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-d80af352-8cef-42fd-8dc7-412e086ce8a7.jpg) dielectric constant of water, /uni03F5 2 multiplied by the cell volume V as a function of frequency ω at ∼ 1 and ∼ 10 GPa and 1000 K. E g labels the frequencies corresponding to the band gaps of water at ∼ 1 and ∼ 10 GPa, respectively. FIG. 5. Local /uniFB01 eld e /uniFB00 ects on dielectric constants. The dashed lines show the real part of the electronic dielectric constants of water and ice VIII (0 K) at zero frequency, /uni03F5 1 (0), obtained from density functional perturbation theory (DFPT) without local /uniFB01 eld e /uniFB00 ects (NLF). As a comparison, the results obtained with DFPT and including local /uniFB01 eld e /uniFB00 ects (as done in Fig. 1), are shown by the solid lines. The error bars show the standard derivations of the electronic dielectric constants of water ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-ba2ed508-9f67-4289-a9cf-3f9b74b08df6.jpg) FIG. 6. Localization properties of water conduction and valence bands. The inverse participation ratios (IPR) of the valence band maximum (VBM, circles) and conduction band minimum (CBM, squares) of (a, b) water and (c, d) ice VIII as a function of pressure. Results of panels b and d were obtained with the hybrid functional PBE0, while those of panels a and c with the semi-local functional PBE. The error bars show the standard derivations of the IPRs of water. Lines are drawn to guide the eyes only. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1126v1-figure-a2e0214a-fb1e-4497-8c9d-da7c5600f669.jpg)
10.1038/ncomms4919
[ "Ding Pan", "Quan Wan", "Giulia Galli" ]
2014-08-05T21:56:53+00:00
2014-08-05T21:56:53+00:00
[ "cond-mat.mtrl-sci", "physics.chem-ph" ]
The refractive index and electronic gap of water and ice increase with increasing pressure
Determining the electronic and dielectric properties of water at high pressure and temperature is an essential prerequisite to understand the physical and chemical properties of aqueous environments under supercritical conditions, e.g. in the Earth interior. However optical measurements of compressed ice and water remain challenging and it has been common practice to assume that their band gap is inversely correlated to the measured refractive index, consistent with observations reported for hundreds of materials. Here we report ab initio molecular dynamics and electronic structure calculations showing that both the refractive index and the electronic gap of water and ice increase with pressure, at least up to 30 GPa. Subtle electronic effects, related to the nature of interband transitions and band edge localization under pressure, are responsible for this apparently anomalous behavior.
1408.1127v1
## SADDLE: A Modular Design Automation Framework for Cluster Supercomputers and Data Centres Konstantin S. Solnushkin Saint Petersburg State Polytechnic University, Saint Petersburg, Russia [email protected] http://ClusterDesign.org/saddle Abstract. In this paper we present SADDLE, a modular framework for automated design of cluster supercomputers and data centres. In contrast with commonly used approaches that operate on logic gate level (Verilog, VHDL) or board level (such as EDA tools), SADDLE works at a much higher level of abstraction: its building blocks are ready-made servers, network switches, power supply systems and so on. Modular approach provides the potential to include low-level tools as elements of SADDLE's design workflow, moving towards the goal of electronic system level (ESL) design automation. Designs produced by SADDLE include project documentation items such as bills of materials and wiring diagrams, providing a formal specification of a computer system and streamlining assembly operations. Keywords: Design; Automation; CAD; EDA; Cluster; Supercomputer; Data centre ## 1 Introduction and Motivation As of today, design automation in electronics mainly concerns using languages such as Verilog and VHDL to create devices from logic gates, or using electronic design automation (EDA) tools to create individual boards. Both approaches are well-developed, mostly because automation is indispensable in these fields. Given the current number of transistors on a chip or components on a board and the complex nature of interrelations between characteristics of systems under design, the use of computer-aided design (CAD) tools is a requirement, not a whim. Additionally, manufacture of modern electronics requires the use of industrial robots, which implies the necessity of having precise documentation that is best produced automatically with CAD tools. On the other hand, in the field of cluster supercomputer design and data centre design in general, automation has not yet found a widespread use. An often quoted reason is that most tasks can be easily handled by a human designer, hence corresponding CAD tools do not exist because they are not required. With the size of supercomputers and data centres continuously growing, manually generated designs may no longer be cost-optimal. Common tasks that designers need to solve are: choosing types and the number of components in a server, calculating the number of servers and switches based on performance requirements, placing equipment in racks, etc. The vast size of design space justifies the use of automation. Currently, both cluster supercomputers and warehouse-scale data centres tend to be created with identical building blocks. Deviations from established practice, if any, are infrequent and limited. We argue that this regrettable situation stems from the absence of appropriate CAD tools: when consequences of design choices are hard to predict, human designers tend to constrain the variety of their designs due to bias, personal preferences or lack of time, using familiar components in standard configurations. However, this may lead to under-exploration of the design space and thus to non-optimal designs. Design automation tools that operate at logic gate level are still called, through inertia, 'high-level synthesis' tools, but, compared to state-of-the-art needs, they turn out to be very low-level. The research community has called for an overarching electronic system level (ESL) design automation approach [1]. SADDLE is the response to this challenge. It operates on a very high level (its building blocks are servers and switches), serving as a system-level complement to existing low-level EDA tools. SADDLE is a modular CAD tool that allows a designer to quickly evaluate multiple design choices in terms of their technical and economic characteristics, conduct 'what-if' scenario analyses, and automatically obtain comprehensible design documentation to simplify assembly process. The acronym stands for 'Supercomputer and data centre design language'. ## 2 Related Work The problem of selecting an optimal configuration of a computer system has been addressed previously. One of the earliest works was R1 , an expert system created by John P. McDermott in late 1970s [2]. Its main task was to configure VAX-11/780 minicomputers made by Digital Equipment Corporation. The design space was large due to an assortment of available peripheral devices; there were also various mechanical and power constraints that were taken into account. R1 was a production rule expert system which operated on a set of 480 rules representing domain knowledge. It could produce detailed assembly documentation including floor plans and cable wiring tables, and therefore set the standard for future automated configurers of computers. In 1998, Pao-Ann Hsiung et al. [3] proposed ICOS , an Intelligent Concurrent Object-Oriented Synthesis methodology which focused on design of multiprocessor systems. According to the object-oriented approach, system components are modelled as classes with hierarchical relationships between them. Previously synthesised subsystems can be reused as building blocks of new designs; machine learning and fuzzy logic are used to determine feasibility of the reuse. In 2005, William R. Dieter and Henry G. Dietz published a technical report [4] detailing their methodology called Cluster Design Rules (CDR) , as well as patterns that emerged through the continuous use of the CDR tool. This methodology is perhaps the first attempt aimed specifically at designing cluster supercomputers. Designs were evaluated using a weighted linear combination of metrics. Although CDR did not turn into a comprehensive product, is was a successful project that pointed to new directions for research in its field. Among the most important observations in the practical use of the CDR tool was that the global optimality of a supercomputer design cannot be inferred from local optimality of any of its components: for example, using a CPU with the lowest price to performance ratio does not lead to a supercomputer design with the lowest price at a given performance. This justifies thorough automated inspection of the design space. Nagarajan Venkateswaran et al. [5] addressed the problem of automated design again in 2009. Their methodology, 'Modeling and integrated design automation of supercomputers (MIDAS)' , is aimed at Supercomputers-on-a-Chip (SCOC), but can be generalised to wider areas as well. With MIDAS , supercomputers-on-a-chip are built using dedicated IP cores implementing specific algorithms. The number of cores of each type to be placed on a chip is determined using performance modelling and simulation. Simulated annealing is then used to select optimal configurations. MIDAS does not address problems of building large multi-node cluster supercomputers, but serves as an important link for implementing Electronic System Level (ESL) design approach: from chips to servers to supercomputers. Design of large-scale computers was addressed once again by Barroso et al. in 2013 [6]. However, their work mostly considers platforms for generic data centre workloads rather than high-performance computing. SADDLE is different from the previous work in that it provides its users with a practical and useful tool for solving design problems. Its extensibility is guaranteed by modularity, allowing to interface with external design tools. Special emphasis is given to accurate estimation of economic characteristics, which is a requirement for producing cost-effective designs. Additionally, we note that the present paper expands upon ideas previously proposed in research posters [7] and [8]. ## 3 Design Flow Design of data centres is akin to that of cluster supercomputers, with the difference that data centres often have many smaller groups of servers, each suited for a particular task. In other respects, design for both types of installations is based on the same principles. In SADDLE, design flow is modelled after actions of human designers. Conceptually, there are four stages: (1) exploration of compute node configurations for selection of promising candidate solutions; (2) choice of appropriate number of compute nodes in selected configuration to satisfy performance constraints; (3) automated elaboration of design decisions for infrastructural systems (net- work, power supply system, etc.); (4) equipment placement, floor planning and documentation generation. From the point of view of SADDLE's user, the design procedure basically answers the question, 'What configuration of a computer has the lowest cost at a given performance?'. Configuration is defined by instances of components used to build the system and structure of their connections with each other. The detailed sequence of design steps is given below: - 1. Form a set of configurations of a compute node; - 2. Weed out unpromising configurations using constraints and heuristics; - 3. For each configuration in the pool of candidate solutions, repeat: - (a) Using inverse performance modelling, calculate the number of compute nodes required to satisfy performance constraints - (b) Design an interconnection network - (c) Design infrastructural systems (e.g., a power supply system) - (d) Place equipment into racks, locate racks on the floor, route cables - (e) Choose the best design automatically (using criterion functions) or manually - (f) Generate documentation Steps 1 and 2 can be repeated for as many models of servers as a designer wishes to consider, forming a bigger pool of candidate solutions for the next steps; e.g., blade servers and regular rack-mount servers can be inspected side by side, and results compared to choose the best alternative. On every stage, semi-complete designs can be checked against a set of constraints specified by the designer; these can be physical constraints stipulated by available machine room space, power, etc., or budgetary constraints imposed on capital or operating costs. Violating configurations can be immediately discarded; this way they don't participate in further design steps which would lengthen the total time to solution. SADDLE is modular; some of the modules are implemented as subroutine calls while others can be queried over the network. ## 4 Representation of Configurations Building blocks in SADDLE are compute nodes. Their configurations are represented with directed acyclic multipartite graphs: partitions correspond to functions, vertices denote components or, more generally, possible implementations of each function, while edges represent compatibility of components. Each path in the graph represents a valid configuration of a technical system, in this case, a compute node. While the use of graph theory for representing configurations is not new, a major advancement comes from assigning to vertices sets of expressions which are evaluated during graph traversal. Fig. 1. Graph representation of eight configurations of a dual-CPU compute node. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1127v1-figure-4223b8e1-338e-40da-9aad-83aa654cf887.jpg) For example, the graph in Figure 1 represents a dual-CPU compute node. Vertices from the database are instantiated in the graph as many times as necessary. Graph traversal yields eight paths, each corresponding to a valid configuration. Arrows on the edges are not shown to reduce clutter since traversal is performed in a natural start-to-end pattern. One of the paths is highlighted with dotted lines. It includes vertices 'M', 'B' and '32GB'; in other words, the corresponding configuration includes a motherboard, one 'Intel Xeon E5-2690 v2' CPU and 32 GBytes of memory. Every time a vertex is traversed, expressions prescribed to it are evaluated; for example, expression node\_cost="+2850" for vertex 'B' means to add a specified number to the existing value of this metric, or to zero if no current value exists. In this case, by the time the 'End' vertex is reached, metric node\_cost will receive a value of '7220'; that is the cost of this configuration of the compute node. Virtually any technical or economic metric can be calculated in a similar manner. For example, we calculate the number of CPU cores per node, peak floating-point performance, power consumption and weight of a node, amount of RAM per core and many other metrics. For brevity, we will omit details of expression grammar and graph transformations. We note, however, that directed acyclic graphs, when used for representing configurations, have a somewhat lower expressive power than undirected graphs with cycles, yet their visual comprehension is easier. Graphs representing configurations of currently produced servers with realworld complexity tend to generate from 50 to 250 configurations. Most of them will not lead to good designs of cluster supercomputers and therefore can be discarded. In SADDLE, there are two mechanisms to do this: constraints and heuristics. Constraints can be specified on any metrics of a configuration. For example, the user can request to discard configurations that have CPUs with too few or too many cores, or where the amount of memory per core is too small, or configurations that don't have a specific type of network adapter. Constraints allow to quickly reduce the size of design space, dramatically decreasing overall time to solution. However, the user should be careful not to prune too aggressively, because intuition cannot serve as a substitution for exhaustive search. For example, the user may be tempted to discard CPUs with the lower number of cores, only to find later that they actually had a larger amount of cache memory per core and would have delivered better performance for a customer's application. As also mentioned in section 3, constraints can be imposed at any stage of the design process; this way, even if suboptimal configurations were not discarded immediately after generation, they can still be weeded out at later stages. The second mechanism to deal with combinatorial explosion is heuristics. Already calculated metrics can be arbitrarily combined to form a simple objective function, and configurations can be discarded based on the value of this function. For example, we found that using the ratio of compute node's cost to its peak floating-point performance as a predictor of quality allows to safely discard 80% of configurations. ## 5 Performance Modelling The next design step involves calculation of the number of compute nodes required to reach a specified performance goal. In general, performance cannot be inferred from peak floating-point performance that is calculated when generating configurations; this is especially true for workloads that are not floating-point oriented. Instead, SADDLE calls design modules that implement performance models. A performance model generally accepts on its input a number of metrics of a single compute node as well as the number of nodes (or other 'computing blocks': cores, CPUs, accelerator boards, racks, etc.), and outputs projected performance of a cluster supercomputer. We call such models 'direct'. We also introduce the notion of inverse performance models; these accept metrics of a compute node and desired performance, and output the number of compute nodes required to achieve the specified performance level. Inverse performance modelling is a specific type of an inverse problem. We solve the problem in two stages: in a forward pass, we repetitively call a corresponding direct performance model with monotonically increasing the number of nodes (say, in powers of 2). When the specified performance goal has been overreached, we use bisection method to determine a more exact number of 'computing blocks'. For demonstration purposes, we implemented a simple analytical performance model of computational fluid dynamics (CFD) software 'ANSYS/Fluent'; it's fast although not very precise. It predicts performance based on CPU clock frequency, the number of CPU cores in a cluster and the type of interconnection network (InfiniBand or 10Gbit Ethernet). Inverse performance model is implemented in the same module and calls direct performance model according to the above algorithm. We found that only a few calls to the direct model are needed to identify with sufficient precision the number of CPU cores that a cluster computer is required to have. Generally, performance models are not limited to analytic, they can be of any nature, including simulators or FPGA prototypes, although these require more time and resources for direct and especially inverse performance modelling. This generality can be used to plug-in the results of low-level design workflow into SADDLE's high-level workflow. Indeed, suppose there is a new CPU under development, and there exists a simulation framework that can predict performance of a cluster computer based on this type of CPU on certain workloads. Several CPU parameters can be tweaked (number of cores, sizes of caches), and each valid combination represents a separate model of this future CPU. Existing EDA tools can be used to calculate performance and power consumption of each model, with tools such as CACTI [9] (for memory hierarchies) and Orion [10] (for networks-on-chip) comprising the end-to-end simulation framework. With more effort we can also estimate per-item cost of producing each CPU model when using mass production. This is enough to construct configuration graph from section 4. Then, a simple design module can be created that queries the aforementioned simulation framework, estimating performance and cost for each cluster configuration when varying CPU model used and the number of CPUs in a cluster. This will allow engineers to use SADDLE to perform directed search of best CPU configurations, and to further build cost-effective cluster configurations. It is important to note that it is not necessarily the cheapest or the fastest CPU that brings optimality to the cluster configuration as a whole, hence the possibility to perform automated directed search is very beneficial. Using end-to-end simulation will allow to perform comprehensive what-if analysis, answering questions such as 'How will adding more cache memory or more floating-point units to a CPU impact performance, power and cost of the whole supercomputer and its infrastructure?' Compare this to the approach used by Sandia's SST [11], which creates a loop of low-level, fine-grained simulators that feed results into higher-level modules. Our approach generalises that of SST by extending it to the data centre level and by more thoroughly dealing with costs, both capital and operating. Put another way, existing EDA tools search for a compromise between performance, power and area of an individual chip, while SADDLE searches for the same compromise for a data centre, also adding cost to the mix of metrics. ## 6 Design of Subsystems SADDLE can design interconnection networks and power supply systems by querying design modules. Modules are web applications that can also be used standalone through a web browser. Design of other infrastructure such as storage systems can be enabled by creating corresponding modules. SADDLE queries the network design module to design fat-tree and torus interconnection networks. Module's database contains monolithic and modular switches, using the same graph representation as detailed in section 4, with cost, power, size and weight figures for each switch configuration. As a result, all essential metrics of interconnection networks can be estimated and integrated into the overall cluster design. Input parameters for the network design module are the number of compute nodes to be interconnected and the desired topology. The module can use any objective function; different configurations of switches are tried in an attempt to minimise this function, which by default is equipment cost. Choosing an uninterruptable power supply (UPS) system is done by querying another design module that works very similarly to the above. In this case, input parameters are electric power that must be provided and an optional backup time when running on batteries. ## 7 Equipment Placement and Floor Planning Inverse performance model returns the number of servers in the future supercomputer, and individual design modules return the amount of infrastructural equipment such as network switches and uninterruptable power supplies. With this information, the next stage can begin: placing equipment into racks and locating racks on the floor. SADDLE already implements a simple algorithm for these tasks, and more elaborate algorithms can be added as necessary. Currently, SADDLE uses a set of rules to place equipment into racks. These rules are akin to heuristics proposed by Mudigonda et al. [12], but ours are more general as they allow to place equipment of different sizes. Placement occurs in the following order: - 1. Core switches; - 2. 'Compute blocks'; each block is an edge switch together with compute nodes connected to it - 3. UPS equipment Every of these equipment types can be placed according to one of three strategies: (a) consolidation: equipment items are placed into racks as densely as possible; (b) separation: each item is placed in its own rack; (c) spread: each subsequent item is placed in a rack that is N racks apart from the previous item; the latter allows to 'spread' equipment in a machine room. Core switches are by default placed using separation strategy. Compute blocks are placed using consolidation strategy: compute nodes from a block are added to the first rack that has enough free space, and then the accompanying edge switch is added to the same or a nearby rack. When the current rack cannot fit any more compute blocks, the next rack is used (or created, if necessary). While edge switches should preferably be placed in the same rack with their compute nodes, they do not have to be physically adjacent. We place edge switches to the top of the rack in an effort to minimise the length of interrack cables, while compute nodes are placed in the bottom of the rack to ensure mechanical stability. Therefore placement results in 'gaps' in the middle of the racks, rather than at the top or at the bottom. The next step is to locate racks on the floor. Yet another design module is used to determine optimal dimensions of the machine room, in terms of the number of rows and racks per row, taking into account rack dimensions and clearances and trying to produce a roughly square shape. Racks are laid out on the floor in a serpentine pattern; this is intended to ensure that a block of compute nodes in the end of a row is not located too far away from its edge switch (which is placed separately and can in principle be put in the next row). SADDLE calculates cable lengths using Manhattan distance, prints the list of required cables and the table detailing their connections, and draws front views of racks, with cables routed in overhead trays, in SVG (Scalable Vector Graphics) format. Cable length can be minimised by optimally locating switches in racks and racks on the floor. For example, Fujiwara et al. [13] formulate rack layout problem as a facility location problem, where the total inter-rack cable length is sought to be minimised, and solve it using simulated annealing, reducing total cable length by 29..40%. Similar algorithms can be added to SADDLE in the future. ## 8 Experimental Evaluation To evaluate SADDLE, we used it to design two cluster supercomputers, with peak floating-point performance of 100 TFLOPS and 1 PFLOPS, respectively. First, we prepared a database of compute nodes that defines the configuration graph. We used 'BL460c Gen8' blade servers made by Hewlett-Packard, with one or two CPUs and without accelerator boards such as GPGPUs. This graph generates 56 configurations of compute nodes. We imposed constraints to select configurations with InfiniBand adapters, and then used a heuristic, ranking configurations according to the ratio of the cost of individual compute node to its peak floating-point performance and choosing a configuration with the lowest value of this metric. This turned out to be a configuration with two ten-core Intel Xeon CPUs. We then used this configuration as a building block of our cluster supercomputers. The two designs are compared in Table 1. Operating costs were calculated with the following assumptions: system lifetime is 3 years, electricity price is $0.35 per kW hour, and price of stationing one rack in a data centre are $3,000 per · year. Note that prices are retail and therefore do not reflect possible discounts for such large-scale procurements. 'Tomato equivalent' mentioned in the last line of the table refers to the idea of reusing waste heat from the supercomputer for agricultural purposes, such as growing tomatoes in greenhouses. Calculations by Andrews and Pearce [14] indicate that tomato crops could reach roughly 400 kg per 1 MW of reused heat per day. SADDLE script to produce the designs is given in Figure 2. Seventeen lines of code are enough to make quick conclusions and facilitate more detailed search. The script also highlights possibilities of performing 'what-if' analyses: for example, settings such as electricity price, system lifetime, rack height or stationing price, etc. can all be quickly changed and the script re-run to estimate designwide changes. Table 1. Comparison of two cluster computer designs, with peak floating-point performance of 100 TFLOPS and 1 PFLOPS | | 100 TFLOPS | 1 PFLOPS | |---------------------------------------------------------------------------------------------------|--------------------------------------------------|--------------------------------------------------| | Compute node model CPU model CPU clock frequency, GHz Node peak performance, GFLOPS Node power, W | HP BL460c Gen8 Intel Xeon E5-2680 v2 2.8 448 651 | HP BL460c Gen8 Intel Xeon E5-2680 v2 2.8 448 651 | | Number of compute nodes | 224 | 2,233 | | Number of racks (incl. UPS) | 8 | 72 | | Floor space size, m 2 | 24 | 144 | | Cable length, m | 1,066 | 26,392 | | Power, kW | 159 | 1,600 | | Weight, tonnes | 3.3 | 31.6 | | Costs, millions US dollars: | | | | Capital expenditures | 3.1 | 31.9 | | Operating expenditures | 1.6 | 15.7 | | Total cost of ownership | 4.6 | 47.5 | | Tomato equivalent, kg per day | 63 | 630 | ## 8.1 Avalanche Changes SADDLE also makes it easy to explore the avalanche effect of seemingly small changes on the whole design. For example, if blade servers are replaced with - # Open the database of configurations from specified files open\_db(['db/hp.xml', 'db/intel-xeon-2600.xml', 'db/hp-blade-memory.xml', 'db/hp-network.xml', 'db/hp-bl460c\_gen8.xml']) # Only allow configurations with InfiniBand connectivity constraint("'InfiniBand' in network\_tech") # Use a heuristic to filter out unpromising configurations metric("node\_cost\_to\_peak\_performance = node\_cost / node\_peak\_performance") # Select the best configuration according to the heuristic select\_best("node\_cost\_to\_peak\_performance") # Delete inferior configurations delete() # Set the number of nodes for 1 PFLOPS of performance and update # metrics to calculate the number of cores automatically metric("nodes = ceil(1000000 / node\_peak\_performance)") update\_metrics() # Use peak performance instead of calling a model performance\_module['url']='peak' # Calculate performance for the said number of nodes performance() # Specify explicitly to use blade switches from Hewlett-Packard metric("network\_vendor='hp-blade'") # Design a network network() # Design a UPS system ups() # Save designed equipment in a group add\_group('compute') # Place equipment as densely as possible place(place\_params={'strategy': 'consolidate'}) # Route cables and calculate their length cables() # Print technical and economic metrics of the design print\_design() # Draw and save front view of rows - draw\_rows([], 'racks.svg') Fig. 2. SADDLE script to produce sample designs from Table 1 ordinary rack-mount servers (even with the same internal components), this immediately changes characteristics such as compute node size and cost. Different network switches then need to be used, and power consumption of the machine may also change, leading to a different configuration of the UPS system. To explore this scenario, we designed a 1 PFLOPS machine with rack-mount servers from a different manufacturer, keeping node parameters (CPU and RAM) the same. Such compute nodes are 32% cheaper; however, the complete machine built with them is only 18% less expensive in terms of the total cost of ownership, because network and UPS cost do not change significantly. At the same time, this machine, due to lesser density of computing equipment, occupies 100 racks instead of 72, eventually leading to a floor space that is 30% bigger (187 m 2 versus 144 m ). In other words, when space is not a hard constraint, ordinary 2 servers can be used to reduce the total cost of ownership. ## 9 Extending SADDLE SADDLE is implemented on top of the Python ver. 3 programming language; its statements are Python functions. It is intended to be modified and extended by its users, and its source code is heavily commented to facilitate this: about 40% of lines are comments. Instead of being a massive piece of software with many rarely used knobs, it allows its user to make quick ad-hoc fixes for unconventional usage scenarios. For example, operating costs are usually calculated on the assumption of continuously running hardware. If hardware only runs during part of the day, the corresponding line that calculates electricity costs can be found in the source code and edited for this particular run. Future work is planned to further extend SADDLE. Advancements can be made to improve core functionality, for example, to enable automated design of storage and cooling systems. Performance models, which are of great importance to SADDLE, can be created in cooperation with the authors of supercomputer software, to guarantee that SADDLE produces reliable performance estimates for various architectures, thereby allowing their fair comparison. Another important task is to ensure that databases contain current models and prices for all types of hardware: compute nodes, network switches and UPS systems. Open format makes it easy for vendors to compile and publish databases for their hardware as often as required. ## References - 1. Duranton, M., Yehia, S., De Sutter, B., De Bosschere, K., Cohen, A., Falsafi, B., Gaydadjiev, G., Katevenis, M., Maebe, J., Munk, H., Navarro, N., Ramirez, A., Temam, O., Valero, M.: The HiPEAC vision. http://www.hipeac.net/roadmap (2010) - 2. McDermott, J.: R1: A rule-based configurer of computer systems. Technical Report CMU-CS-80-119, Carnegie-Mellon University (April 1980) - 3. Hsiung, P.A., Chen, C.H., Lee, T.Y., Chen, S.J.: ICOS: An intelligent concurrent object-oriented synthesis methodology for multiprocessor systems. ACM Transactions on Design Automation of Electronic Systems (TODAES) 3 (2) (1998) 109-135 - 4. Dieter, W.R., Dietz, H.G.: Automatic exploration and characterization of the cluster design space. Technical Report TR-ECE-2005-04-25-01, University of Kentucky, Electrical and Computer Engineering Dept. (April 2005) http://www.engr. uky.edu/ ~ dieter/pub/TR-ECE-2005-04-25-01.pdf . - 5. Venkateswaran, N., Vasudevan, A., Subramaniam, B., Mukundrajan, R., Ramnath Sai Sagar, T., Manivannan, M., Murali, S., Krishnan Elangovan, V.: Towards modeling and integrated design automation of supercomputing clusters (MIDAS). Computer Science - Research and Development 24 (2009) 1-10 10.1007/s00450009-0085-5. - 6. Barroso, L.A., Clidaras, J., H¨lzle, U.: The datacenter as a computer: An introduco tion to the design of warehouse-scale machines. Synthesis Lectures on Computer Architecture 8 (3) (2013) 1-154 - 7. Solnushkin, K.S.: Combinatorial design of computer clusters. In: Proceedings of the International Supercomputing Conference. ISC'11 (June 2011) - 8. Solnushkin, K.S.: Computer cluster design automation using web services. In: Proceedings of the International Supercomputing Conference. ISC'12 (June 2012) - 9. Muralimanohar, N., Balasubramonian, R., Jouppi, N.: Optimizing NUCA organizations and wiring alternatives for large caches with CACTI 6.0. In: Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, IEEE Computer Society (2007) 3-14 - 10. Kahng, A.B., Li, B., Peh, L.S., Samadi, K.: Orion 2.0: A fast and accurate NoC power and area model for early-stage design space exploration. In: Proceedings of the conference on Design, Automation and Test in Europe, European Design and Automation Association (2009) 423-428 - 11. Hendry, G., Rodrigues, A.F.: SST: A simulator for exascale co-design. Technical Report SAND2012-1764C, Sandia National Laboratories (March 2012) - 12. Mudigonda, J., Yalagandula, P., Mogul, J.C.: Taming the flying cable monster: A topology design and optimization framework for data-center networks. In: Proceedings of USENIX Annual Technical Conference. ATC'11 (June 2011) - 13. Fujiwara, I., Koibuchi, M., Casanova, H.: Cabinet layout optimization of supercomputer topologies for shorter cable length. In: Proceedings of the 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE Computer Society (2012) 227-232 - 14. Andrews, R., Pearce, J.M.: Environmental and economic assessment of a greenhouse waste heat exchange. Journal of Cleaner Production 19 (13) (2011) 14461454
10.1007/978-3-319-07518-1_15
[ "Konstantin S. Solnushkin" ]
2014-08-05T21:59:26+00:00
2014-08-05T21:59:26+00:00
[ "cs.DC", "C.1.4; C.5.1; J.6; K.6.2" ]
SADDLE: A Modular Design Automation Framework for Cluster Supercomputers and Data Centres
In this paper we present SADDLE, a modular framework for automated design of cluster supercomputers and data centres. In contrast with commonly used approaches that operate on logic gate level (Verilog, VHDL) or board level (such as EDA tools), SADDLE works at a much higher level of abstraction: its building blocks are ready-made servers, network switches, power supply systems and so on. Modular approach provides the potential to include low-level tools as elements of SADDLE's design workflow, moving towards the goal of electronic system level (ESL) design automation. Designs produced by SADDLE include project documentation items such as bills of materials and wiring diagrams, providing a formal specification of a computer system and streamlining assembly operations.
1408.1128v1
## Photon-assisted tunneling with non-classical light J.-R. Souquet, 1, 2 M. J. Woolley, 3 J. Gabelli, 1 P. Simon, 1 and A. A. Clerk 2 1 Laboratoire de Physique des Solides, Universit´ Paris-Sud, e 91405 Orsay, France 2 Department of Physics, McGill University, Montr´ eal, QC, Canada 3 School of Engineering, University of New South Wales, ADFA, Canberra, ACT, 2600, Australia (Dated: July 23, 2014) Among the most exciting recent advances in the field of superconducting quantum circuits is the ability to coherently couple microwave photons in low-loss cavities to quantum electronic conductors (e.g. semiconductor quantum dots or carbon nanotubes). These hybrid quantum systems hold great promise for quantum information processing applications; even more strikingly, they enable exploration of completely new physical regimes. Here we study theoretically the new physics emerging when a quantum electronic conductor is exposed to non-classical microwaves (e.g. squeezed states, Fock states). We study this interplay in the experimentally-relevant situation where a superconducting microwave cavity is coupled to a conductor in the tunneling regime. We find the quantum conductor acts as a non-trivial probe of the microwave state; in particular, the emission and absorption of photons by the conductor is characterized by a non-positive definite quasi-probability distribution. This negativity has a direct influence on the conductance of the conductor. The physics of a tunnel junction illuminated by a purely classical microwave field has been understood since the 1960's with the classic work of Tien and Gordon [1]. This situation is equivalent to simply having an ac bias voltage across the conductor, and the resulting modification of the current is known as photon-assisted tunneling; it has been measured in countless experiments (e.g. Refs. [2-4]). Despite the word 'photon' in the effect's name, in this standard formulation there is nothing quantum in the treatment of the applied microwave field. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-31e85c34-ba0e-4071-b66a-6f67dff938a8.jpg) In this work, we now consider driving a junction with a quantum microwave field produced in a cavity. The cavity effectively acts as an ac voltage bias across the conductor (see Fig. 1); by maintaining the cavity in a non-classical state, the junction is exposed to a nontrivial microwave field. Our goal is to understand how such non-classical microwaves affect electronic transport. Such cavity-plus-conductor setups have been realized experimentally, both in experiments using metallic tunnel junctions [5-7], as well as more recent experiments with highQ microwave cavities coupled to either quantum dots [8, 9] or carbon nanotubes [10]. Note that the converse problem of how an electronic conductor can be used to produce non-classical squeezed microwaves was recently studied experimentally [11]. If the cavity is not driven (i.e. not coherently populated with photons), the cavity-plus-conductor setup realizes another well-studied quantum transport problem: dynamical Coulomb blockade (DCB) [12-15]. Here, the cavity acts as a structured electromagnetic environment for the junction, one that can absorb (and at non-zero temperature, emit) energy from tunneling electrons. The standard theory of this effect [1, 14, 15] is based on the function P E ( ), which gives the probability of the environment absorbing an energy E from a tunneling electron. DCB has been experimentally probed both for FIG. 1. Schematic showing a resonant mode of a halfwavelength coplanar waveguide resonator, with a quantum conductor (tunnel junction or quantum point contact (QPC)) which contacts the centre strip and lower ground plane at a voltage anti-node. A dc voltage is also applied to the junction via the centre strip at a voltage node, so as not to induce losses (see, e.g., Refs. 22-24). The state of the resonant mode provides a quantum ac voltage across the junction; we are interested in how this influences the dc junction current I , and what this current reveals about the quantum voltage. non-resonant environments [17-21] as well as for environments formed by resonators [5-7], with excellent theoretical agreement. In stark contrast to standard DCB, our focus will be on a non-equilibrium environment produced by preparing a cavity in a non-classical state. ModelAs shown in Fig. 1, we consider transport through a voltage-biased tunnel junction (dc bias voltage V ) which is coupled to the voltage anti-node of a microwave cavity, in such a way that the cavity voltage acts as an additional bias voltage across the junction. We calculate the average current to lowest non-vanishing order in the tunneling strength. If the resonator was in thermal equilibrium, we would recover the standard DCB expression [1]. We generalize this approach to now allow for an environment (i.e. the cavity) which is in an arbitrary non-equilibrium, non-stationary state. In general the average tunnel current is time-dependent, and can be written $$I ( t, V ) = e \sum _ { \sigma = \pm } \sigma \int d E \ \Gamma ( \sigma \cdot e V - E ) P _ { \text{tot} } ( E ; t, \sigma ). ( 1 ) \quad \text{discu} \\ \text{average}$$ The two terms here represent (respectively) left-toright and right-to-left tunneling, and Γ( E ) describes the energy-dependent tunneling rate of the uncoupled junction. For the usual case of metallic leads, one has Γ( E ) = ( e R 2 T ) -1 E/ (1 -exp( -E/k B T el )), where T el is the lead temperature and R T is the junction resistance (see, e.g., Ref. [25]). In this standard case, the current of the uncoupled junction is purely Ohmic, I 0 ( V ) = V/R T . The functions P tot ( E t, σ ; ) describe energy transfer to/from the electromagnetic environment. They are given by a causal environment correlation function, evaluated in the absence of tunneling (see SI for derivation): $$G _ { \text{env} } ( t, \tau ; \sigma ) = - ( i / \hbar { ) } \theta ( \tau ) \langle e ^ { i \sigma \hat { \varphi } ( t ) } e ^ { - i \sigma \hat { \varphi } ( t - \tau ) } \rangle, \quad ( 2 ) \quad \text{cwise}$$ $$P _ { t o t } ( E ; t, \sigma ) = - \frac { 1 } { \pi } \, \text{Im} \, \int _ { - \infty } ^ { \infty } \, d \tau \, e ^ { i E \tau / \hbar } G _ { \text{env} } ( t, \tau ; \sigma ). ( 3 ) \, \stackrel { \prime } { S } _ { I } [ \omega,$$ Here ˆ = ( ϕ e/ glyph[planckover2pi1] ) ∫ t -∞ ˆ ( U t ′ ) dt ′ is the phase operator, defined in terms of the (Heisenberg-picture) environment voltage operator ˆ ( U t ). As shown in the SI, Eqs. (1)-(3) reduce to standard DCB expressions in the usual case of a thermal environment; Eq. (3) yields a P tot ( E ) function which is positive definite and only depends on E . In our system, we treat the environment as a single resonant mode of a cavity, which can be represented as a quantum LC circuit with frequency Ω = 1 / √ LC . ˆ is ϕ thus given by one quadrature of the cavity mode annihilation operator ˆ [26], a $$\hat { \varphi } ( t ) = - i \sqrt { \rho } \left [ \hat { a } ( t ) - \hat { a } ^ { \dagger } ( t ) \right ], \quad \quad ( 4 ) \quad \text{$\text{$\text{$th$}$} }$$ with ρ = πZ cav /R K parameterizing the strength of zeropoint voltage fluctuations in the cavity ( Z cav = √ L/C , R K = h/e 2 the resistance quantum). Note that Ref. 27 recently achieved such a setup with ρ = 0 3; higher values . should be achievable in the near term. Closed cavityOur focus will be on situations where the cavity is maintained in some interesting non-vacuum state, either by continuous driving, or via reservoirengineering techniques [28] which have been used in several recent circuit QED experiments [29, 30]. In either case, this involves coupling the cavity to an external dissipative channel; this gives the cavity a finite damping rate κ . The simplest situation is where this coupling is strong enough to maintain the cavity in the desired state irrespective of the junction current, but still weak enough that it does not appreciably modify the cavity dynamics. We start by analyzing this situation, meaning that we can neglect the effects of κ in calculating P tot ( E t, σ ; ); non-zero κ will be addressed in the next section. Note that the backaction of the junction on the cavity is formally a higher-order-in-tunneling effect, and thus can be neglected for a sufficiently large tunnel resistance R T . As discussed in the SI, if ρ glyph[similarequal] 1, one needs R /R T K glyph[greaterorsimilar] Ω /κ . In general, one finds that P tot ( E t, σ ; ) and hence the average current oscillates as a function of t . We will focus on the dc current, and thus average over t . The resulting P tot ( E ) function is then only a function of E . In the κ → 0 limit, the energy of a cavity photon is precisely glyph[planckover2pi1] Ω, and hence P tot ( E ) has the form $$P _ { t o t } ( E ) = \sum _ { k = - \infty } ^ { + \infty } p _ { t o t } [ k ] \, \delta ( E - k \hbar { \Omega } ). \quad \ \ ( 5 )$$ For a simple Ohmic tunnel junction, the differential dc conductance dI/dV will then exhibit a series of steps as a function of dc voltage V , as different photonassisted processes become energetically allowed. As discussed in the Methods section, by measuring dI/dV and the (symmetrized) finite-frequency junction current noise ¯ [ S I ω, V ], one can directly extract the weights p tot [ k ]. Without dissipation, the cavity evolves freely, and we can calculate P tot ( E ) for an arbitrary cavity state ˆ ρ cav . It can be written as the convolution of two normalized distributions, $$P _ { \text{tot} } ( E ) = \, \int d E ^ { \prime } \, P _ { 0 } ( E - E ^ { \prime } ) P _ { \text{occ} } ( E ^ { \prime } ). \quad ( 6 )$$ P 0 ( E ) describes the absorption of energy by a groundstate cavity, and only has weight for E ≥ 0. In contrast, P occ ( E ) is a quasi-probability distribution which describes the additional emission and absorption processes possible when the cavity is occupied with photons. If the cavity were in its ground state, we would simply have P occ ( E ) = δ E ( ) and P tot ( E ) = P 0 ( E ). P 0 ( E ) is a Poisson distribution with mean ρ [1, 14]: $$\overline { L / C }, \\ \intertext { f. 2 7 } & \quad P _ { 0 } ( E ) = \sum _ { k = 0 } ^ { + \infty } e ^ { - \rho } \frac { \rho ^ { k } } { k! } \delta ( E - k \hbar { \Omega } ) \equiv \sum _ { k \geq 0 } p _ { 0 } [ k ] \, \delta ( E - k \hbar { \Omega } ). \\ \intertext { w h o r } & \quad \intertext { w.. \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \delta \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dots \ e \dRESULTS }$$ The function P occ ( E ) that we introduce captures the novel physics we are after. For an arbitrary cavity state ˆ ρ cav , it is directly related to the Glauber-Sudarshan P -function K ( α ) which represents ˆ ρ cav via a quasiprobability distribution in phase space. Recall that K ( α ) is defined via [31] $$\hat { \rho } _ { \text{cav} } = \int d ^ { 2 } \alpha \, \mathcal { K } ( \alpha ) | \alpha \rangle \langle \alpha |, \text{ \quad \ \ } ( 8 )$$ where | α 〉 denotes a cavity coherent state with complex amplitude α . K ( α ) expresses ˆ ρ cav as an incoherent mixture of coherent states. For κ → 0, we find that P occ ( E ) also reduces to a discrete distribution, $$P _ { \text{occ} } ( E ) = \sum _ { k = - \infty } ^ { + \infty } p _ { \text{occ} } [ k ] \, \delta ( E - k \hbar { \Omega } ), \quad \ ( 9 ) \quad \text{ulat} \quad \text{how} \quad \\ \text{ity i} \quad \text{large} \quad \text{$\quad$}$$ with weights directly determined by the GlauberSudarshan P function: $$p _ { o c c } [ k ] = \, \int d ^ { 2 } \alpha \, \mathcal { K } [ \alpha ] \, [ J _ { k } \, ( 2 \sqrt { \rho } | \alpha | ) ] ^ { 2 } \,. \quad ( 1 0 ) \, \stackrel { \text{stat} } { \text{T} }.$$ Here J k is a Bessel function. If P occ ( E ) is positive definite, Eq. (6) implies that we can interpret the energy E absorbed by the cavity in a tunnel event as the sum of two independent stochastic quantities: an amount associated with vacuum fluctuations (as described by P 0 ), and an amount associated with the population of the cavity (as described by P occ ). While P tot ( E ) must always be positive definite (see SI), this is not necessarily true of P occ ( E ): it can become negative for non-classical cavity states, i.e. states whose phase-space distribution K [ α ] either fails to be positive definite or is highly singular [31]. Negativity in P occ ( E ) will thus be a direct sign of non-classical light. For further intuition into Eq. (10), consider the simple case where the cavity is in a coherent state with amplitude 〈 ˆ(0) a 〉 = α 0 . In this case K [ α ] = δ (2) ( α -α 0 ), and $$p _ { o c c } [ k ] = J _ { k } ^ { 2 } \left ( 2 \sqrt { \rho } | \alpha _ { 0 } | \right ). \quad \ \ \ ( 1 1 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ p occ [ k ] is precisely the weight for an k -photon process in the standard Tien-Gordon theory for a purely classical ac voltage V ac ( ) t ∝ | α 0 | [1]. Thus, Eq. (10) demonstrates that for a general state, p occ [ k ] is a superposition of Tien-Gordon distributions for different amplitudes, with each term weighted by the Glauber-Sudarshan Pfunction K [ α ]. Returning to the coherent state case, we see from Eq. (6) that the full distribution P tot ( E ) involves convolving the Tien-Gordon distribution with the zerotemperature absorption processes of the cavity. This thus generalizes Tien-Gordon theory to include the contribution of cavity vacuum noise. Note that a purely classical ac voltage does not modify dc I V -characteristic of a conventional tunnel junction, due to the lack of any rectification (i.e. such a junction has a purely linear I V -characteristic). This is however no longer true when we include zero-point fluctuations of the field: now, the dc I V -characteristic of the junction is indeed modified by the presence of the ac voltage. This behaviour is demonstrated in Fig. 4. Fock stateConsider now the case where the cavity is stabilized in a Fock state | n 〉 ; this has been achieved recently via reservoir engineering protocols in circuit QED [32]. For the simple case n = 1, one finds p occ [ k ] = 0 unless k = 0 , ± 1, in which case: $$p _ { \text{occ} } [ 0 ] = 1 - 2 \rho, \ p _ { \text{occ} } [ \pm 1 ] = \rho. \quad \ \ ( 1 2 ) \quad \text{prol}$$ P occ ( E ) for this state describes the possibility to emit or absorb 0 or 1 photons due to the non-zero cavity population. The quasi-probability for the 0-photon process however becomes negative for ρ &gt; 1 / 2. Similar negativity is found for other Fock states (see SI and Fig. 2); the larger the value of n , the smaller the value of ρ needed to see negativity. As discussed, this negativity is a direct consequence of the non-classical nature of the cavity state. The negativity in P occ ( E ) leads to a distinct signature in the differential dc conductance of the junction (see Fig. 3). The conductance exhibits regular plateaus as a function of dc voltage. However, unlike the case of a cavity thermal state, the plateau heights associated with a cavity Fock state do not increase monotonically with voltage. These surprising decreases in conductance plateau height are inconsistent with P occ ( E ) being positive definite. As shown in the Methods section, if P occ ( E ) were positive, there is a bound on how small the second plateau in dI/dV can be compared to the first and third plateaus. This bound is generically violated by the dI/dV obtained with a Fock state in the cavity (e.g. that shown in Fig. 3). Thus, the differential conductance of the junction provides a direct probe of the non-classical nature of the of the cavity state. Further evidence of the negativity in the Fock state p occ [ k ] can be seen in the corresponding total emission/absorption probability p tot [ k ] (which includes the contribution from vacuum noise). For a cavity maintained in an n -photon Fock state, we find (see SI): $$\mathfrak { n } _ { \mathfrak { s }, } ^ { \mathfrak { n } - } p _ { \text{tot}, n } [ k ] = \begin{cases} \frac { e ^ { - \rho } \rho ^ { k } n! } { ( k + n )! } \left [ L _ { n } ^ { ( k ) } ( \rho ) \right ] ^ { 2 }, & \text{if $k\geq -n$,} \\ 0 & \text{otherwise.} \end{cases}$$ Here, L ( k ) n denotes a generalized Laguerre polynomial. As expected, if the cavity is maintained in a n -photon Fock state, then in a single tunnel event at most n photons can be absorbed. However, for an appropriately chosen ρ , p tot ,n [ -k ] can be zero for k ≤ n , while at the same time p tot ,n [ -( k +1)] is non-zero. Such a cancellation would be impossible if p occ [ k ] is positive definite: if the probability to absorb k + 1 photons from the junction is non-zero, then the probability to absorb k photons must also be non-zero. This is a simple consequence of p tot [ k ] being the convolution of p occ [ k ] with a Poisson distribution, p 0 [ k ]. As discussed in the Methods section, one can directly measure p tot [ m ] if one measures both the dc conductance of the junction and its finite-frequency current noise. Using such a measurement to detect the vanishing of p tot ,n [ -k ] for k ≤ n would thus also provide direct evidence for the non-classical nature of the cavity state. If one knows p tot [ m ], one can also undo the convolution in Eq. (6) and extract the (possibly negative) quasiprobability distribution p occ [ k ]. Writing things explicitly, we have: $$p _ { \text{occ} } [ k ] = e ^ { \rho } \sum _ { j = 0 } ^ { + \infty } \frac { ( - \rho ) ^ { j } } { j! } p _ { \text{tot} } [ k - j ] \quad \ \ ( 1 4 ) \quad \begin{pmatrix} & \text{the} \\ & \text{eq.} \\ & \text{bec} \\ & \text{e} \ \mathfrak { m } \end{pmatrix}$$ Cavity driving and dissipationWe now consider the case where the cavity is maintained in an interesting state via continuous driving through an input port, including the non-zero cavity dissipation associated with this port. Our approach extends easily to such situations if the driving field is Gaussian; this includes the interesting case of a squeezed vacuum state input. Letting κ denote the damping rate due to the coupling to the transmission line used to drive the cavity, one can use standard input-output theory [26] to derive a Heisenberg-Langevin equation for the cavity field (see Methods). For Gaussian states, this equation can be solved to obtain the phasephase correlator and hence P tot ( E ). We find that even for a driven, dissipative cavity, P tot ( E ) can still be written in the general form of Eq. (6). The distribution P 0 ( E ) describes photon absorption by the cavity when it is driven solely by vacuum noise: $$P _ { 0 } ( E ) = e ^ { - \rho } \left [ \delta ( E ) + \sum _ { n = 1 } ^ { + \infty } \frac { ( \rho ^ { n } / n! ) n \hbar { \kappa } } { ( E - n \hbar { \Omega } ) ^ { 2 } + ( \frac { n \hbar { \kappa } } { 2 } ) ^ { 2 } } \right ] ( 1 5 ) \quad \text{$\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-.\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{+\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{ -\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{.\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{ -\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac {-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{\-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac -\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac$-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac{-\frac':} } } } } } } } } } } } } } } } } }$$ In comparison to Eq. (7), the effects of dissipation are to simply broaden the peaks associated with absorbing n ≥ 1 photons. The distribution P occ ( E ) again describes additional absorption/emission processes possible when the cavity drive populates the cavity. For the coherent state case, we take the cavity to be driven at a frequency ω dr ; in this case the average cavity amplitude is 〈 ˆ a 〉 = α e 0 -iω dr t . We find that P occ ( E ) is again given by the closed-cavity expression Eq. (9)-(11), except that one replaces the cavity frequency Ω with the drive frequency ω dr . In contrast to the vacuum absorption peaks, these processes are not lifetime broadened, and correspond to a photon frequency set by the drive frequency ω dr , and not the cavity resonance frequency Ω. Both these features lead to interesting signatures in the differential conductance; in particular, one sees steps in the conductance corresponding to both relevant photon frequencies (the drive frequency, and the cavity resonance frequency). This behaviour is demonstrated in Fig. 4. Squeezed stateConsider next a cavity which is maintained in a squeezed state, where the variance of one quadrature is reduced below the zero-point value by a factor e -2 r ( r &gt; 0). While such a state is Gaussian, it yields a highly singular Glauber-Sudarshan P -function, and is thus considered to be non-classical [31]. A squeezed state could be maintained in a superconducting cavity using reservoir engineering techniques [33]. Alternatively, one could simply drive the cavity with squeezed vacuum noise (as produced by a parametric amplifier); this kind of intracavity squeezing has been recently realized in experiment [34]. We focus on this situation in what follows. Analytic expressions can be obtained for P occ ( E ) in the case of a cavity driven by squeezed microwaves, see Eq. (S29) in SI. One finds that P occ ( E ) for E glyph[similarequal] ± glyph[planckover2pi1] Ω can become negative when ρ glyph[similarequal] 1. As discussed in the caption of Fig. , this leads to a striking suppression of the peak in P tot ( E ) near E = -glyph[planckover2pi1] Ω, which describes the possibility to absorb a single photon. The weight of this process is suppressed more than would ever be possible if P occ ( E ) were positive definite. Thus, by measuring P tot ( E ), for a squeezed state, one could directly infer the negativity of P occ ( E ). As shown in Fig. , this negativity-induced suppression of P tot ( E ) yields a direct signature in the conductance: the height of the fourth conductance plateau is higher than would be possible with any positive definite P occ ( E ). In this figure, we also show results including finite cavity dissipation; for small levels of dissipation ( κ/ Ω ∼ 10 -3 ) the results are unchanged. P tot ( E ) could also be extracted directly if one measures both the differential conductance of the junction and the finite-frequency junction current noise (see Methods). Note that the finitefrequency current noise measurements for QPC's having R T &gt; R K (as we require here) have been performed previously [35]. ConclusionWe have studied the interplay of nonclassical light with electron transport through a tunnel junction, showing that this basic light-matter interaction is naturally characterized by negative quasi-probabilities for truly quantum states. This negativity leads to direct signatures in the differential conductance of the conductor, signatures that should be accessible in state-of-theart experiments. Our results can directly be generalized to describe biased Josephson junctions interacting with quantum light; such systems allow even larger values of ρ [1]. They also suggest the general potential of using quantum conductors as a powerful tool to characterize, and perhaps control, quantum microwave states in hybrid systems incorporating superconducting microwave cavities and semiconductor electronic devices. ## Methods Closed cavity P occ ( E ) -Using the definition of the Glaubner-Sudarshan P function K ( α ) in Eq. (8) and the fact that ˆ( ) a t = ˆ(0) a e -i Ω t for a closed cavity, one can explicitly calculate the RHS of Eq. (3). Averaging over the observation time t then yields Eq. (10). Alternatively, one can express P occ ( E ) as ( glyph[planckover2pi1] = 1) $$\begin{array} { c }. \\ \\ P _ { o c c } ( E ) = \int _ { - \infty } ^ { + \infty } d \tau e ^ { i E \tau } \int _ { 0 } ^ { 2 \pi / \Omega } \frac { d t } { 2 \pi / \Omega } \, \chi [ z ( t, \tau ) ], ( 1 6 \tt a ) \\ \\ z ( t, \tau ) = - 2 i \sqrt { \rho } e ^ { i \Omega t } \sin \Omega \tau / 2 \quad & ( 1 6 \tt b ) \end{array}$$ where the characteristic function χ λ [ ] is defined as $$\underset { \text{peri-} } { \overset { \text{snow} } { \text{of in-} } } \chi = \text{Tr} ( \hat { \rho } _ { \text{cav} } e ^ { \lambda \hat { a } ^ { \dagger } } e ^ { - \lambda ^ { * } \hat { a } } ), \ \mathcal { K } [ \alpha ] = \int d \lambda d \lambda ^ { * } \, \chi [ \lambda ] e ^ { \lambda ^ { * } \alpha - \lambda \alpha ^ { * } }. \\ \text{s. }$$ FIG. 2. (a) Probability distributions describing photon emission and absorption by a cavity initially prepared in the n = 2 Fock state, in the absence of cavity damping, and for a dimensionless cavity impedance ρ ≡ πZ cav /R K = 0 5. The quasi-probabilities . p occ [ k ] characterize the additional photon emission / absorption processes possible due to populating the cavity with photons, whereas the probabilities p tot [ k ] also include the absorption events associated with vacuum noise. While p tot [ k ] must always be positive definite, p occ [ k ] can fail to be positive for non-classical cavity states. Here, we see that the weight p occ [ k = 0] ≤ 0 . (b) Behaviour of the quasi-probabilities p occ [ k ] for a closed cavity in the n = 2 Fock state, as a function of ρ (which characterizes the strength of cavity zero-point voltage fluctuations seen by the conductor). Negativity requires sufficiently large ρ , though the minimum required ρ decreases with increasing n . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-bba92995-95cb-431a-a9b4-8d8336f5bbef.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-9952a20f-d0d2-4742-846c-a57eefea0401.jpg) FIG. 3. (a) Differential conductance dI/dV versus dc bias voltage V for a tunnel junction coupled to a cavity having dimensionless impedance ρ = 0 5. . We assume the cavity is initially prepared in some specific state, and neglect cavity dissipation for simplicity; we also take the limit of a negligible electron temperature, T el glyph[lessmuch] glyph[planckover2pi1] Ω /k B . The dashed curve is for a ground state cavity, the solid blue curve for a thermal state with an average photon number ¯ n th = 2, and the red curve for a coherent state with average photon number | α | 2 = 2. For a thermal cavity state, the conductance plateaus are always monotonically increasing in height with V . (b) Same as (a), but now the solid curve corresponds to a cavity prepared in the Fock state | n = 2 . The striking signature of a non-classical state here is the strongly non-monotonic dependence of the first few 〉 conductance plateaus on voltage; in particular, the height of the second plateau ( h 2 ) is smaller than the first ( h 1 ). This is in sharp contrast to the classical states shown in (a), states which all have an identical average cavity photon number. As discussed in the SI, if one assumes the distribution P occ ( E ) describing the cavity is positive-definite, then one can rigorously bound how small h 2 can be relative to the average height of the 1st and 3rd plateaus. This bound is shown as the green horizontal line in the figure. The conductance clearly violates this bound, and thus provides direct (and experimentally-accessible) evidence for the negativity in P occ ( E ). Similar violations are possible with other choices of Fock state; higher n Fock states allow violations at even smaller values of ρ (see SI). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-7d858e43-158f-439d-99d9-0cbda41ed57d.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-67ba93c1-6305-4f33-8763-9a7a7989637f.jpg) It follows that P occ ( E ) = P occ ( -E ), regardless of the cavity state (i.e. there is a perfect symmetry between absorption and emission processes, as one might expect for purely classical noise [26]). P occ ( E ) is determined by the normal-ordered expectations 〈 : ( ˆ ˆ a a † ) m : 〉 of the cavity state; the larger the value of ρ , the more sensitive one is to higher moments. Connecting transport to probabilitiesFor low electron temperatures T el glyph[lessmuch] glyph[planckover2pi1] Ω /k B , the differential conductance of the junction will exhibit sharp steps as a function of V , with transitions at eV = m glyph[planckover2pi1] Ω; these steps correspond to turning on and off photon-assisted processes. We define FIG. 4. (a) Differential conductance dI/dV versus dc bias voltage V for a tunnel junction coupled to a cavity which is continuously driven into a coherent state having amplitude | α | = 1. We have taken a drive frequency which is detuned from resonance: ω dr = 0 75Ω. Results for zero dissipation ( . κ → 0) and finite dissipation κ = 0 01Ω are shown; all curves correspond . to zero cavity and electron temperature (see SI for finite temperature effects). The steps in the conductance now occur at multiples of both the cavity and the drive frequency. Note that standard photon-assisted tunneling theory (Tien-Gordon theory [1]) predicts that dI/dV = 1 /R T independent of V and the ac voltage. Classically, this is due to the linear I V -characteristic of a tunnel junction and consequent lack of any rectification. The behaviour shown here is starkly different, due to the inclusion of zero-point fluctuations. (b) Integrated probability function P tot ( E ) for the same situation as panel (a). One again sees steps at multiples of the the cavity resonance frequency and at multiples of the drive frequency. The steps associated with the drive frequency remain sharp even in the presence of cavity dissipation. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-05b3038c-8e3f-4eca-be2c-20019e3bd44a.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-c2ab3a2c-9f5b-457a-9d67-f6c6e188abc4.jpg) FIG. 5. (a) Probability distributions p tot [ k ] and p occ [ k ] associated with a dissipation-free cavity in a squeezed state vacuum state, with ρ = 1 4. . We take the squeeze parameter to be r = 1, meaning that the variance of one cavity quadrature is reduced by a factor 1 /e 2 ∼ 0 14 below its value in the ground state (see inset of (b)). . p occ [ k ] describes the extra photon absorption and emission processes possible when the cavity is occupied with photons, whereas the distribution p tot [ k ] also includes the additional absoprtion processes associated from vacuum fluctuations. Similar to a Fock state, the squeezed state quasi-probabilities p occ [ k ] can exhibit negativity, which occurs here most strongly for k = ± 1. This in turn leads to a strong suppression in the value of the distribution p tot [ k ] at k = -1. If p tot [ k ] were positive, then p tot [ -1] has a minimum possible value p min [ -1] (dashed green line); this lower bound is based on the values of p tot [ k ] at k = -2 , -3. As clearly shown in the figure, the negativity in p occ [ ± 1] causes a large violation of this bound. (b) Differential conductance for the the same setup in (a); we now however also include the effects of non-zero cavity damping κ . By measuring the heights of the first three conductance plateaus ( h 1 -h 3 ), one can bound the maximum possible value of the fourth plateau ( h 4 ) possible with any positive definite p occ [ k ]. This value is h 4 max , , and is indicated with a horizontal line. We see that the conductance violates this bound, and thus provides direct evidence for the negativity of p occ [ k ]. One can also directly measure the p tot [ k ] shown in panel (a) by combining the conductance measurement shown here with a measurement of the excess current noise ∆ ¯ S I [ ω, V ] ≡ ¯ [ S I ω, V ] -¯ [ S I ω, 0] (see methods). All curves correspond to zero electron and cavity temperatures (see SI for finite temperature effects). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-68be29d7-0980-40d6-8223-195728efd945.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-3b1c800d-20da-450c-aede-1d578d7aa0a2.jpg) the normalized height of the m th step as $$h _ { m } = R _ { T } \ \frac { d I } { d V } \Big | _ { V = ( m + 1 / 2 ) \hbar { \Omega } / e }. \quad \quad ( 1 8 ) \quad \text{(18)} \quad \text{con}$$ Consider the simplest case where T el → 0 and κ → 0 (so that the energy of a cavity photon is precisely glyph[planckover2pi1] Ω). By combining Eqs. (1) and (5) the normalized first plateau The height of these plateaus is directly linked to P tot ( E ). height (i.e. zero-bias conductance) is $$h _ { 1 } = p _ { \text{tot} } [ 0 ] + 2 \sum _ { k = 1 } ^ { + \infty } p _ { \text{tot} } [ - k ], \quad \quad ( 1 9 ) \quad \begin{array} { c } \text{$\text{sau}$} \\ \min \\ p _ { \text{occ} } \end{array}$$ while the height of subsequent plateaus is $$h _ { n + 1 } = h _ { n } + p _ { t o t } [ + n ] - p _ { t o t } [ - n ]. \quad \ ( 2 0 )$$ The behaviour of dI/dV with V allows us to easily extract ( p tot [+ n ] -p tot [ -n ]), the probability difference between an n -photon absorption and emission process. To extract the sum of these probabilities (and hence reconstruct the full distribution p tot [ n ]), one also needs to measure the finite-frequency current noise of the junction. We define the (symmetrized) finite-frequency current noise of the junction as $$\bar { S } _ { I } [ \omega, V ] \equiv \frac { 1 } { 2 T } \int _ { - T / 2 } ^ { T / 2 } d \bar { t } \int d t e ^ { i \omega t } \left \langle \left \{ \hat { I } ( t + \bar { t } ), \hat { I } ( \bar { t } ) \right \} \right \rangle, \quad \text{$\quad$f_{occ}[k$} \\ \text{$\quad$f_{occ}[i$} \quad$\quad$\quad$\quad$f_{occ}[i$} \quad$\quad$\quad$f_{occ}[i$} \quad$\quad$\quad$f_{occ}[i$} \quad$\quad$\quad$f_{occ}[i$} \quad$\quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[i$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$,\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$}" \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$g$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{#}$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{($\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$ \quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$`} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[f$} \quad$\ \text{$\quad$f_{occ}[$$ where ˆ is I the junction current operator. The average over ¯ is to pick out the stationary part of the noise (with t the averaging time T glyph[greatermuch] 1 / Ω). This noise spectral density depends both on the drain-source voltage V and the cavity state. In the tunneling regime, and for eV &lt; glyph[planckover2pi1] Ω, one finds that the excess noise ∆ ¯ S I [ ω, V ] ≡ ¯ [ S I ω, V ] -¯ [ S I ω, 0] exhibits regular peaks as a function of ω , occurring at ω = m Ω [36]. These noise peaks again correspond to the turning on and off of photon-assisted transport processes. In the low-temperature, low-dissipation case, the heights of these peaks can be directly related to p tot [ n ] [36] $$\Delta \bar { S } _ { I } [ \omega = n \Omega, V ] = \frac { e V } { R _ { T } } \left ( p _ { t o t } [ + n ] + p _ { t o t } [ - n ] \right ). \quad ( 2 2 )$$ Thus, measuring both the steps in the differential conductance and the peaks in the frequency-dependent excess current noise allow one to directly extract the probabilities p tot [ n ]. As mentioned in the main text (c.f. Eq. (14)), once one has measured p tot [ m ] (as described above), one can explicitly extract the values of quasi-probabilities p occ [ m ]. Detecting negative quasi-probabilityThe distribution p tot [ k ] governing photon absorption / emission events is a convolution of p 0 [ k ] (absorption due to vacuum noise) and p occ [ k ] (absorption and emission due to the presence of photons in the cavity). p 0 [ k ] is a Poisson distribution, and is completely determined by the cavity frequency and dimensionless impedance ρ ; ρ could be extracted by, e.g., measuring dI/dV for a ground-state cavity. This then gives a route for detecting the negative values of p occ [ k ] associated with quantum states. By using the known behaviour of p 0 [ k ], one can derive general bounds on the differential conductance and excess noise that must be satisfied for any positive definite p occ [ k ]. A violation of such a bound provides direct evidence of negativity in p occ [ k ], and hence of the non-classical nature of the cavity state. √ For example, for values of ρ &lt; 3, one can derive a minimum possible value for h 2 consistent with a positive p occ (see SI): $$h _ { 2 } > \frac { 1 } { 2 } ( h _ { 1 } + h _ { 3 } ) - \frac { 1 } { 4 } \left ( p _ { 0 } [ 1 ] + 2 p _ { 0 } [ 4 ] \right ) \equiv h _ { 2, \min }. \quad ( 2 3 )$$ Heuristically, this bound tells us that for a positive p occ , the second conductance step cannot be arbitrarily lower than the average height of the first and third steps. As shown in Fig. 3, this inequality is violated if one prepares a ρ = 0 5 cavity in a . n = 2 Fock state. Thus, the differential conductance of the junction gives a direct signature of non-classical behaviour. In a similar fashion, one can derive bounds on the behaviour of p tot [ k ] that are true for any positive-definite p occ [ k ]; such bounds are in general even more easily violated by the presence of negativity in p occ [ k ]. For example, for ρ &lt; 2, one finds that any positive definite p occ [ k ] must yield (see SI): $$\overset { \infty } { \text{th} } _ { \text{ity} } \quad \ p _ { t o t } [ n ] & > \frac { p _ { 0 } [ 1 ] } { p _ { 0 } [ 0 ] } \left ( p _ { t o t } [ n - 1 ] - p _ { t o t } [ n - 2 ] \right ) \equiv p _ { \min } [ n ]. \\ \intertext { w - 1 } _ { \infty } \quad \pi \quad \pi \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \,. }$$ For n = 1, this bound is violated for a cavity with ρ = 1 4 prepared in a . r = 1 squeezed vacuum state [see Fig. (a)]. This violation can be detected experimentally, as p tot [ -1] can be extracted from the behaviour of dI/dV and ∆ S I [ ω, V ], c.f. Eqs. (20) and (22). Heisenberg-Langevin equationAdamped, driven cavity can be described using standard input-output theory [26], with the cavity equation of motion $$\dot { \hat { a } } = - i \Omega \hat { a } - \frac { \kappa } { 2 } \hat { a } - \sqrt { \kappa } \hat { a } _ { \text{in} } ( t ). \quad \quad ( 2 5 )$$ Here, ˆ a in ( ) t = α in ( ) + t ˆ ( ξ t ) describes the input field on the cavity: it has an average part α in ( ) which describes t the classical amplitude of the drive, and a noise part ˆ ( ξ t ) which describes both thermal and quantum noise incident on the cavity. As with standard input-output theory treatments, this noise is taken to be operator-valued Gaussian white noise. For a coherent state drive, ˆ deξ scribes vacuum noise, and the average cavity amplitude is 〈 ˆ a 〉 = α in e -iω L t . Squeezed input noise can be simply included in the formalism; it corresponds to anomalous correlators 〈 ˆ ( ξ t ξ ) ˆ ( t ′ ) 〉 being non-zero. As the input noise is Gaussian and the cavity has no nonlinearities, the cavity will also be in a Gaussian state. As a result, the phase-phase correlator in Eq.(3) is completely determined by two-point correlation functions, and is thus easily found from the solution of Eq. (25). ## Acknowledgements We thank F. Portier and F. Marquardt for helpful discussions. MJW acknowledges funding from an ECR Grant of UNSW Canberra.. JG and PS acknowledge partial support from 'Investissements d'Avenir' LabEx PALM (ANR-10-LABX-0039-PALM). AC acknowledges support from NSERC. - [1] P. K. Tien and J. P. Gordon, Phys. Rev. 129 , 647 (1963). - [2] J. R. Tucker and M. J. Feldman, Rev. Mod. Phys. 57 , 1055 (1985). - [3] L. P. Kouwenhoven, S. Jauhar, J. Orenstein, P. McEuen, Y. Nagamune, J. Motohisa, and H. Sakaki, Phys. Rev. Lett. 73 , 3443 (1994). - [4] J. Gabelli and B. Reulet, Phys. Rev. Lett. 100 , 026601 (2008). - [5] T. Holst, D. Esteve, C. Urbina, and M. H. Devoret, Phys. Rev. Lett. 73 , 3455 (1994). - [6] J. Basset, H. Bouchiat, and R. Deblock, Phys. Rev. Lett. 105 , 166801 (2010). - [7] M. Hofheinz, F. Portier, Q. Baudouin, P. Joyez, D. Vion, P. Bertet, P. Roche, and D. Esteve, Phys. Rev. Lett. 106 , 217005 (2011). - [8] T. Frey, P. Leek, M. Beck, A. Blais, T. Ihn, K. Ensslin, and A. Wallraff, Phys. Rev. Lett. 108 (2012). - [9] K. D. Petersson, L. W. McFaul, M. D. Schroer, M. Jung, J. M. Taylor, A. A. Houck, and J. R. Petta, Nature 490 , 380 (2012). - [10] M. Delbecq, V. Schmitt, F. Parmentier, N. Roch, J. Viennot, G. Feve, B. Huard, C. Mora, A. Cottet, and T. Kontos, Phys Rev Lett 107 , 256804 (2011). - [11] G. Gasse, C. Lupien, and B. Reulet, Phys. Rev. Lett. 111 , 136601 (2013). - [12] A. A. Odintsov, Sov. Phys. JETP 67 , 1265 (1988). - [13] Y. V. Nazarov, Sov. Phys. JETP 68 , 561 (1989). - [14] M. H. Devoret, D. Esteve, H. Grabert, G.-L. Ingold, H. Pothier, and C. Urbina, Phys. Rev. Lett. 64 , 1824 (1990). - [15] S. M. Girvin, L. I. Glazman, M. Johnson, D. R. Penn, and M. D. Stiles, Phys. Rev. Lett. 64 , 3183 (1990). - [1] G.-L. Ingold and Y. Nazarov, edited by H. Grabert and M.H. Devoret 7 , 935 (Plenum, 1992). - [17] P. Delsing, K. K. Likharev, L. S. Kuzmin, and T. Claeson, Phys. Rev. Lett. 63 , 1180 (1989). - [18] L. J. Geerligs, V. F. Anderegg, C. A. v. d. Jeugd, J. Romijn, and J. E. Mooij, Europhys. Lett. 10 , 79 (1989). [19] A. N. Cleland, J. M. Schmidt, and J. Clarke, Phys. Rev. Lett. 64 , 1565 (1990). - [20] C. Altimiras, U. Gennser, A. Cavanna, D. Mailly, and F. Pierre, Phys. Rev. Lett. 99 , 256805 (2007). - [21] F. Parmentier, A. Anthore, S. Jezouin, H. le Sueur, U. Gennser, A. Cavanna, D. Mailly, and F. Pierre, Nat Phys 7 , 935 (2011). - [22] F. Chen, A. J. Sirois, R. W. Simmonds, and A. J. Rimberg, App. Phys. Lett. 98 , 132509 (2011). - [23] A. Armour, M. Blencowe, E. Brahimi, and A. Rimberg, Phys. Rev. Lett. 111 , 247001 (2013). - [24] S.-X. Li and J. B. Kycia, App. Phys. Lett. 102 , 242601 (2013). - [25] Y. Nazarov and Y. Blanter, Quantum Transport: Introduction to Nanoscience (Cambridge, Cambridge, 2009). [26] A. A. Clerk, M. H. Devoret, S. M. Girvin, F. Marquardt, - and R. J. Schoelkopf, Rev. Mod. Phys. 82 , 1155 (2010). - [27] C. Altimiras, O. Parlavecchio, P. Joyez, D. Vion, - P. Roche, D. Esteve, and F. Portier, Phys. Rev. Lett. 112 , 236803 (2014). - [28] J. Poyatos, J. Cirac, and P. Zoller, Phys. Rev. Lett. 77 , 4728 (1996). - [29] K. Murch, U. Vool, D. Zhou, S. Weber, S. M. Girvin, and I. Siddiqi, Phys. Rev. Lett. 109 , 183602 (2012). - [30] S. Shankar, M. Hatridge, Z. Leghtas, K. M. Sliwa, A. Narla, U. Vool, S. M. Girvin, L. Frunzio, M. Mirrahimi, and M. Devoret, Nature 504 , 419 (2013). - [31] C. C. Gerry and P. L. Knight, Introductory quantum optics (Cambridge, 2005). - [32] E. Holland, B. Vlastakis, R. Heeres, U. Vool, Z. Leghtas, L. Frunzio, G. Kirchmair, M. Mirrahimi, and R. J. Schoelkopf, in March Meeting 2014 Abstract (Bulletin of the American Physical Society, 2014). - [33] N. Didier, F. Qassemi, and A. Blais, Phys. Rev. A 89 , 013820 (2014). - [34] K. W. Murch, S. J. Weber, K. M. Beck, E. Ginossar, and I. Siddiqi, Nature 499 , 62 (2013). - [35] E. Zakka-Bajjani, J. S´ egala, F. Portier, P. Roche, D. Glattli, A. Cavanna, and Y. Jin, Phys. Rev. Lett. 99 , 236803 (2007). - [36] J.-R. Souquet, I. Safi, and P. Simon, Phys. Rev. B 88 , 205419 (2013). ## SUPPLEMENTAL INFORMATION ## P E ( ) THEORY FOR A GENERAL NON-EQUILIBRIUM ENVIRONMENT ## General derivation In this section, we present the derivation of Eq. (1) in the main text, which generalizes the standard P E ( ) theory for tunnelling in the presence of an electromagnetic environment to cases where the environment is in an arbitrary time-dependent state. We consider a tunnel junction between left and right metallic reservoirs which is voltage biased both by a fixed dc voltage V and by a voltage created by a bosonic electromagnetic environment. The Hamiltonian is $$\hat { H } = \hat { H } _ { \text{el} } + \hat { H } _ { \text{env} } + \hat { H } _ { \text{tun} },$$ where ˆ H el and ˆ H env denote the Hamiltonians of the leads and of the cavity respectively, and ˆ H tun the tunneling between leads. Making the usual gauge transformation to include voltages directly in ˆ H tun , we have ( glyph[planckover2pi1] = 1) $$\hat { H } _ { \text{tun} } = w \sum _ { k, q } \hat { c } _ { R, k } ^ { \dagger } \hat { c } _ { L, q } e ^ { i e V t } e ^ { i \hat { \varphi } ( t ) } + h. c. \, \equiv \hat { W } e ^ { i e V t } e ^ { i \hat { \varphi } ( t ) } + h. c.,$$ where w is the tunnel matrix element, ˆ c α,k is the destruction operator for a single particle state k in lead α , and ϕ t ( ) is the phase operator associated with the environment votage (see Eq. (4) of the main text). The tunnel resistance R T of the junction is given by 1 /R T = ( e /h 2 )(2 π w ρ ) 2 2 0 , where ρ 0 is the lead density of states at the Fermi energy. As usual, the current operator is given by ˆ = I -i ( ˆ W -ˆ W † ) . Using standard quantum linear response theory (i.e. the Kubo formula), the current at time t to order w 2 is given by $$\langle \hat { I } ( t ) \rangle = e \left [ \Gamma _ { + } ( t ) - \Gamma _ { - } ( t ) \right ],$$ $$\Gamma _ { \sigma } ( t ) & = \text{Re } \int _ { - \infty } ^ { t - t _ { 0 } } d \tau \, G _ { \text{el} } ( \tau ) G _ { \text{env} } ( t, \tau ; \sigma ) e ^ { i \sigma e V \tau },$$ where the relevant electronic and environment Green functions are evaluated in the absence of tunnelling, and are given by $$G _ { \text{el} } ( \tau ) = - i \langle \hat { W } ( \tau ) \hat { W } ^ { \dagger } ( 0 ) \rangle,$$ $$G _ { \text{env} } ( t, \tau ; \sigma ) = - i \theta ( \tau ) \langle e ^ { i \sigma \hat { \varphi } ( t ) } e ^ { - i \sigma \hat { \varphi } ( t - \tau ) } \rangle,$$ We have used the fact that the uncoupled electronic system is time translationally invariant (while we have not assumed this about the bosonic environment). Here, t 0 corresponds to the time at which the tunnel Hamiltonian was switched on; we let t 0 →-∞ . Next, note that for free electrons: $$G _ { \text{el} } [ \omega ] = - i \Gamma [ \omega ] = - i \frac { 1 } { e ^ { 2 } R _ { T } } \frac { \omega } { 1 - \exp ( - \omega / k _ { B } T _ { \text{el} } ) },$$ Using the convolution theorem to evaluate Eq. (S4), we recover Eq. (1) of the main text. ## Time-independent environment For the standard case where the environment is in a time-independent state, environmental correlation functions are time-translation invariant, and hence G env ( t, τ ; σ ) (c.f. Eq. (2) of the main text) becomes independent of the time t . It is then easy to show that Eq. (3) of the main text reduces to $$P _ { \text{tot} } ( E ; \sigma ) = \int _ { - \infty } ^ { \infty } d \tau e ^ { i E \tau } \langle e ^ { i \sigma \hat { \varphi } ( \tau ) } e ^ { - i \sigma \hat { \varphi } ( 0 ) } \rangle.$$ Further, P E ( ) theory is usually applied to situations where the environment is invariant under ˆ ϕ → -ˆ. ϕ In this case, there is no dependence on σ = ± , and one recovers the standard formula for the P E ( ) function as the Fourier transform of the environmental phase-phase correlator. For a general time-dependent environment, the function P tot ( E t, σ ; ) will be explicitly time-dependent and could take on negative values. We now focus on the simple case where the environment is a closed cavity, prepared in some arbitrary state. The cavity Hamiltonian is time independent, and all dependence on t arises from preparing the system in a non-stationary state (i.e. the cavity density matrix ˆ ρ cav is not diagonal in the basis of energy eigenstates). In this case, we write P tot ( E t, σ ; ), using the convolution theorem, in the following form ( glyph[planckover2pi1] = 1): $$P _ { \text{tot} } ( \omega ; t, \sigma ) = \frac { - \text{Im} } { \pi } \int d \omega ^ { \prime } \left [ - i \pi \delta ( \omega - \omega ^ { \prime } ) + \frac { 1 } { \omega - \omega ^ { \prime } } \right ] \Lambda ( \omega ^ { \prime }, t ; \sigma ),$$ $$\Lambda ( \omega ; t, \sigma ) = \int _ { - \infty } ^ { \infty } d \tau \langle e ^ { i \sigma \hat { \varphi } ( t ) } e ^ { - i \sigma \hat { \varphi } ( t - \tau ) } \rangle e ^ { i \omega \tau }$$ $$= \sum _ { i, i ^ { \prime }, f = 0 } ^ { \ell } \langle i | e ^ { i \sigma \hat { \varphi } } | f \rangle \langle f | e ^ { - i \sigma \hat { \varphi } } | i ^ { \prime } \rangle \langle i ^ { \prime } | \hat { \rho } | i \rangle \delta ( E _ { f } - E _ { i ^ { \prime } } - \omega ) e ^ { - i ( E _ { i ^ { \prime } } - E _ { i } ) t }.$$ Here, | j 〉 labels energy eigenstates of the system with corresponding eigenvalues E j = glyph[planckover2pi1] Ω( j +1 2). / In general, P tot ( ω t, σ ; ) and 〈 ˆ ( I t ) 〉 will oscillate as a function of t with a period 2 π/ Ω. To obtain the dc current, we will average t over one period: $$P _ { t o t } ( E ) \equiv \frac { 1 } { t _ { \text{avg} } } \int _ { - t _ { \text{avg} } / 2 } ^ { t _ { \text{avg} } / 2 } d t ^ { \prime } P _ { t o t } ( E, t + t ^ { \prime } ; \sigma ),$$ where t avg = 2 π/ Ω. The time average kills all terms in Eq. (S11) except those where E i = E i ′ . As the cavity has no degeneracies in its spectrum, it immediately follows that the only terms in Λ( ω, t ; σ ) surviving the time average have i = i ′ , and are thus proportional to matrix elements of the form |〈 f e | -iσϕ ˆ | i 〉| 2 . It thus follows that all contributing terms to Λ are positive definite, and thus so is P tot ( E ). Further, such matrix elements are independent of whether σ = ± 1; hence, P tot is independent of σ . ## Positivity of time-averaged P tot ( E t ; ) : general case In the general case, where the total P E ( ) function is not periodic, we define the time-averaged P E ( ) function as ( glyph[planckover2pi1] = 1): $$\bar { P } _ { t o t } ( E ; \sigma ) \equiv \lim _ { T \to \infty } \frac { 1 } { T } \int _ { - T / 2 } ^ { T / 2 } d t \, P _ { t o t } ( E ; t, \sigma ),$$ where P tot ( E t, σ ; ) is defined in Eq. (3) of the main text. From Eq. (S9), we see that ¯ P tot ( E σ ; ) is necessarily positive definite if the quantity $$\bar { \Lambda } ( \omega, \sigma ) = \lim _ { T \to \infty } \frac { 1 } { T } \int _ { - T / 2 } ^ { T / 2 } d t \Lambda ( \omega ; t, \sigma ),$$ is positive definite, where Λ( ω t, σ ; ) is defined in Eq. (S10) above. To show this, we first define $$\hat { A } [ \omega ] \equiv \frac { 1 } { \sqrt { T } } \int _ { - T / 2 } ^ { T / 2 } d t ^ { \prime } \, \hat { A } ( t ^ { \prime } ) e ^ { i \omega t ^ { \prime } }$$ for some arbitrary Heisenberg-picture operator ˆ ( A t ). It immediately follows that: $$Q ( \omega, T ) \equiv \left \langle \hat { A } [ \omega ] \left ( \hat { A } [ \omega ] \right ) ^ { \dagger } \right \rangle \geq 0.$$ We can express Q ω,T ( ) as $$Q ( \omega, T ) = \frac { 1 } { T } \int _ { - T / 2 } ^ { T / 2 } d t \int _ { t - T / 2 } ^ { t + T / 2 } d \tau \langle \hat { A } ( t ) \hat { A } ^ { \dagger } ( t - \tau ) \rangle e ^ { i \omega \tau }.$$ Assuming that the correlation function in Eq. (S17) has a finite correlation time (i.e. it decays for sufficiently large | τ | ), when taking the limit T →∞ we can safely replace the bounds of the τ integration by ±∞ . Making the choice ˆ ( A t ) = e iσϕ t ˆ( ) , we then have $$\bar { \Lambda } ( \omega, \sigma ) \equiv \lim _ { T \to \infty } Q ( \omega, T ) \ \implies \bar { \Lambda } ( \omega, \sigma ) \geq 0.$$ This proves that ¯ P tot ( E σ ; ) must be positive definite. Finally, note that in the cases of interest in the main text, P tot ( E t, σ ; ) is a periodic function of t . In this case the infinite-time average over t in Eq. (S13) is equivalent to averaging t over a single period. ## Transport-induced cavity dissipation As discussed in the main text, the backaction of the junction on the cavity does not formally influence the current to lowest order in the tunnelling. Nonetheless, we can use our approach to estimate the typical size of such effects. Consider first an undamped cavity, and imagine we have calculated p tot [ k ] for some given cavity state. We now want to understand how photon-assisted transitions involving the junction lead to heating (or cooling) of the cavity. Using a Golden rule approach, the rate of change of the average cavity photon number due to such transitions will be given by: $$\frac { d } { d t } \langle \hat { a } ^ { \dagger } \hat { a } \rangle \Big | _ { \text{junc} } = \sum _ { k } \sum _ { \sigma = \pm } k \, p _ { \text{tot} } [ k ] \Gamma ( \sigma e V - k \Omega ) \equiv \mathcal { P } _ { \text{em} },$$ where P em denotes the power emitted by the junction to the cavity (in units of cavity quanta per unit time). Consider the case T el → 0 and eV &lt; glyph[planckover2pi1] Ω. In this case, one finds easily: $$\mathcal { P } _ { \text{em} } = - \frac { R _ { K } } { \pi R _ { T } } \Omega \sum _ { k = 1 } ^ { \infty } k ^ { 2 } p _ { t o t } [ - k ] \equiv - \mathcal { P } _ { 0 } \sum _ { k = 1 } ^ { \infty } k ^ { 2 } p _ { t o t } [ - k ].$$ We see that the scale for these heating/cooling effects is determined by the rate P 0 , which as expected becomes weaker the weaker the tunnelling. For the states and regimes discussed in the main paper, where average photon numbers are glyph[similarequal] 1 and typical voltages eV glyph[similarequal] glyph[planckover2pi1] Ω, the scale of the energy flux P em will be ∼ P 0 . In Figs. 6 and 7, we explicitly show this rate for a variety of different states, demonstrating that P 0 is indeed the relevant scale when the dimensionless cavity impedance ρ ∼ 1 (i.e. the regime of interest in the main text). For ρ glyph[lessmuch] 1, junction induced heating/cooling will be reduced below P 0 by a further factor of ρ . If we now include cavity damping at a rate κ , a simple rate equation tells us that the change in the cavity photon number due to junction-induced heating/cooling, ∆ n cav , will be approximately $$| \Delta n _ { \text{cav} } | \sim \frac { | \mathcal { P } _ { \text{in} } | } { \kappa } \sim \frac { \mathcal { P } _ { 0 } } { \kappa }$$ for ρ ∼ 1. Insisting that this change be much smaller than a single quantum thus results in the condition: $$\frac { R _ { K } } { R _ { T } } < \frac { \kappa } { \Omega }.$$ Thus, if we use a cavity with κ = 10 -2 Ω, the above estimate tells us that the junction resistance needs to be much larger than ∼ 10 2 R q . This could be achieved by using, e.g., a single channel quantum point contact deep in the tunnelling regime. ## P occ ( E ) FOR VARIOUS CLOSED-CAVITY STATES In what follows, it will be useful to introduce the inverse Fourier transform of P occ ( E ), P occ ( τ ), via $$P _ { \text{occ} } ( E ) = \int _ { - \infty } ^ { + \infty } d \tau e ^ { i E \tau } P _ { \text{occ} } ( \tau ).$$ For a closed cavity, the kernel P occ ( τ ) is directly related to the characteristic function χ of the Glauber-Sudarshan P function K ( α ), c.f. Eqs.(16)-(17) of the main text. Recall that K ( α ) allows one to represent a given cavity state in phase space, c.f. Eq. (8) of the main text. FIG. 6. (a) Power emitted by the junction P em to the cavity in units of P 0 (c.f. Eq. (S20)), as a function of the dc junction bias voltage V . Each curve corresponds to the cavity being in a coherent state with a given amplitude α . For small V , the junction acts like a low-temperature bath and acts to cool the cavity (it absorbs energy). For higher biases, the effective temperature of the junction increases, and there is a net energy flow from the junction to the cavity. For the range of voltage considered, the emitted power is of order of P 0 . All curves correspond to zero temperature and zero cavity damping. (b) Same quantity, now for a thermal state in the cavity, for different choices of the thermal photon number ¯ n th . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-4b5205af-4cfb-47d4-b28b-a48fdf6b8d36.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-ad22dd9e-7f1b-4a7e-9f81-f6311cbc98f0.jpg) FIG. 7. Similar to Fig. 6, but now we take the cavity to be in a non-classical state (as specified in the legend); all curves are for zero temperature and for zero cavity damping. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-becc449c-65a6-463f-8530-4a0242e317ba.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-69530333-0d5a-49e3-9cf8-c22670ee18f1.jpg) ## Thermal state Consider a closed cavity in a thermal state having an average photon occupancy ¯ n th = ( e glyph[planckover2pi1] Ω /k B T -1) -1 . Using Eqs. (16),(17) of the main text, one finds $$P _ { \text{occ} } ( \tau ) = \exp \left [ 2 \rho \bar { n } _ { \text{th} } ( \cos ( \Omega \tau ) - 1 ) \right ].$$ The quasiprobability distribution P occ ( E ) is then $$P _ { \text{occ} } ( E ) = e ^ { - 2 \rho \bar { n } _ { \text{th} } } \sum _ { n, m = 0 } ^ { + \infty } \frac { ( \rho \bar { n } _ { \text{th} } ) ^ { n + m } } { n! \, m! } \delta \, ( E - ( n - m ) h \Omega ) \equiv \sum _ { n = - \infty } ^ { + \infty } p _ { \text{occ}, \text{th} } [ n, \bar { n } _ { \text{th} } ] \delta ( E - n h \Omega ).$$ P occ ( E ) is just the convolution of two Poisson distributions: the first describes the Poisson absorption of photons at rate ρn ¯ th , the second the Poissonian emission of photons at ρn ¯ th . It thus has the form of a Skellam distribution. Convolving in the vacuum distribution P 0 ( E ) given in Eq. (7) of the main text, one obtains the final distribution P tot ( E ). This continues to have the form of a Skellam distribution, and recovers the expression for a thermal cavity which is well known from the standard theory of DCB [1]. ## Squeezed states Consider first the case where a cavity is prepared in a pure squeezed state which evolves without dissipation. The initial cavity state is parametrized as: $$| r, \theta \rangle = \exp \left ( r e ^ { i \theta } \hat { a } ^ { \dagger } \hat { a } ^ { \dagger } - h. c. \right ) | 0 \rangle,$$ where r is the squeeze parameter and the angle θ determines the orientation of the squeezed cavity quadrature. In the absence of dissipation, the P occ ( E ) function describing a cavity squeezed state can easily be calculated from characteristic function of this state. Before averaging over the observation time t , we have: $$P _ { o c c } ( \tau, t ) = \exp \left [ - 4 \rho \sinh ^ { 2 } ( r ) \sin ^ { 2 } \left ( \Omega \tau / 2 \right ) \right ] \exp \left [ 2 \rho \sinh ( 2 r ) \sin ^ { 2 } \left ( \Omega \tau / 2 \right ) \left ( \cos ( 2 \Omega t + \theta ) \right ) \right ].$$ P occ ( τ ) is obtained by averaging over t . Without loss of generality, we shift the zero of time to absorb the phase θ . It is useful to first Fourier transform in the relative time variable τ , but keep the dependence on observation time t . Note that each factor above (for fixed t ) has the same functional dependence on τ as the P occ ( τ ) for a thermal state (c.f. Eq. (S24)). One thus obtains a simple convolution of two thermal distributions: $$P _ { \text{occ} } ( E, t ) = \sum _ { n } p _ { \text{occ} } [ n, t ] \delta ( E - n \hbar { \Omega } ),$$ $$p _ { \text{occ} } [ n, t ] = \sum _ { m } p _ { \text{occ}, t h } [ n - m, \bar { n } _ { t h } = \sinh ^ { 2 } r ] \cdot p _ { \text{occ}, t h } [ m, \bar { n } _ { t h } = - ( \sinh 2 r / 2 ) \cos ( 2 \Omega t ) ],$$ where the weights p occ th , [ m,n ¯ th ] for a thermal distribution are defined in Eq. (S25). Note that the second thermal distribution in the convolution has an effective temperature which is time dependent and which can be negative (i.e. for times where cos(2Ω ) t &gt; 0). This leads to negativity in p occ [ n, t ], negativity which can persist even after averaging over the observation time t . It thus is the origin of negativity in P occ ( E ) for a squeezed state. Further, note that when we average over t , even and odd photon number processes generated by the second thermal distribution will be impacted differently (as for small ρ , p occ th , [ m,n ¯ th ] ∝ (¯ n th ) m ). Thus, the above form also suggests the origin of the even-odd asymmetry in P occ ( E ) for a cavity squeezed state. If we time average P occ ( τ, t ), we find: $$P _ { o c c } ( \tau ) = e ^ { - 4 \rho \sinh ^ { 2 } ( r ) \sin ^ { 2 } \left ( \frac { \Omega \tau } { 2 } \right ) } I _ { 0 } \left [ 2 \rho \sinh ( 2 r ) \sin ^ { 2 } \left ( \frac { \Omega \tau } { 2 } \right ) \right ].$$ Note that for a highly squeezed state, it is tempting to take the r →∞ limit, and make the approximations sinh 2 r ∼ e 2 r / 4 and sinh(2 r ) ∼ e 2 r / 2. In this case, we could introduce ρ eff = ρe 2 r / 2, and write: $$P _ { o c c } ( \tau ) \simeq e ^ { - \rho _ { \text{eff} } \sin ^ { 2 } \left ( \frac { \Omega \tau } { 2 } \right ) } I _ { 0 } \left [ \rho _ { \text{eff} } \sin ^ { 2 } \left ( \frac { \Omega \tau } { 2 } \right ) \right ].$$ One can confirm that in this limit, P occ ( E ) never exhibits any negativity. It follows that even for very large squeeze parameters r , the presence of negativity depends crucially on the magnitude of ρ and requires ρ ∼ 1. We can also calculate P occ ( E ) for an open (i.e. damped) cavity that is prepared in a squeezed state by continuous driving: squeezed input noise is continuously fed into the cavity. In this case, the cavity state is Gaussian, and P occ ( E ) is determined by the two-point phase phase correlator; this is easily calculated using standard Heisenberg-Langevin equations. One finds $$P _ { o c c } ( \tau, t ) = \exp \left [ \rho \left ( \Lambda _ { 1 } + e ^ { - \kappa | \tau | / 2 } \Lambda _ { 2 } \right ) \right ],$$ where: $$\Lambda _ { 1 } = - 2 \sinh ^ { 2 } ( r ) - \sinh ( 2 r ) \cos ( \Omega \tau ) \cos ( 2 \Omega t ),$$ $$\Lambda _ { 2 } = 2 \sinh ^ { 2 } ( r ) \cos ( \Omega \tau ) + \sinh ( 2 r ) \cos ( 2 \Omega t ).$$ Note that despite the non-zero dissipation, we have undamped oscillations as a function of τ , corresponding to processes where the photon energy is precisely Ω. ## Fock states We denote the P occ ( τ, t ) function for an n -photon Fock state as P occ ,n ( τ, t ). It is given by: $$P _ { \infty \csc, n } ( \tau, t ) = \langle n | e ^ { \lambda \hat { a } ^ { \dagger } } e ^ { - \tilde { \lambda } \hat { a } } | n \rangle = \sum _ { p = 0 } ^ { + \infty } \frac { 1 } { p! ^ { 2 } } \langle n | ( - | \lambda | ^ { 2 } \hat { a } ^ { \dagger } \hat { a } ) ^ { p } | n \rangle,$$ $$= \sum _ { p = 0 } ^ { + \infty } \frac { 1 } { p! } \binom { n } { p } \left ( e ^ { i \Omega \tau } - 1 + e ^ { - i \Omega \tau } - 1 \right ) ^ { p },$$ where we introduced λ τ, t ( ) = √ ρ e ( i Ω( + ) t τ -e i Ω( t -τ ) ). Note that the characteristic function does not depend on the observation time t , implying that there will be no average ac current across the tunnel junction. Physically, this is a consequence of the rotational invariance of the Fock state phase space distribution. Let us now discuss the above expression for a few specific choices of n . $$n = 1 \ F o c k \ s t a t e$$ For n = 1, Eq. (S36) becomes: $$P _ { o c c, 1 } ( \tau ) = 1 + \rho \left ( e ^ { i \Omega \tau } + e ^ { - i \Omega \tau } - 2 \right ).$$ The probability P occ ( E ) is just given by the Fourier transform of P occ ( τ ) and reads $$P _ { o c c, 1 } ( E ) = ( 1 - 2 \rho ) \delta ( E ) + \rho \left [ \delta ( E + \hbar { \Omega } ) + \delta ( E - \hbar { \Omega } ) \right ].$$ The total P E ( ) function including vacuum noise, P tot ( E ) is given by a simple convolution with P 0 ( E ). In the time domain, we obtain: $$P _ { t o t, 1 } ( \tau ) = e ^ { - \rho } \rho e ^ { i \Omega \tau } + e ^ { - \rho } \, ( \rho - 1 ) ^ { 2 } + \sum _ { k = 1 } ^ { + \infty } \frac { e ^ { - \rho } \rho ^ { k } } { ( k + 1 )! } \, ( \rho - ( k + 1 ) ) ^ { 2 } \, e ^ { - i k \Omega \tau } = \sum _ { k = - \infty } ^ { + \infty } \frac { e ^ { - \rho } \rho ^ { k } } { ( k + 1 )! } \left ( L _ { 1 } ^ { ( k ) } ( \rho ) \right ) ^ { 2 } e ^ { - i k \Omega \tau }, ( S 3 9 )$$ where the L ( k ) n ( ρ ) are the generalized Laguerre polynomials. Negative probabilities have disappeared in this expression, as expected. $$n = 2 \ F o c k \ s t a t e$$ For n = 2, Eq. (S36) becomes: $$P _ { o c c, 2 } ( \tau ) = 1 + 2 \rho \left ( e ^ { i \Omega \tau } + e ^ { - i \Omega \tau } - 2 \right ) + \frac { \rho ^ { 2 } } { 2 } \left ( 6 + e ^ { 2 i \Omega \tau } + e ^ { - 2 i \Omega \tau } - 4 \left ( e ^ { i \Omega \tau } + e ^ { - i \Omega \tau } \right ) \right )$$ $$= ( 1 - 4 \rho + 3 \rho ^ { 2 } ) + 2 \rho ( 1 - \rho ) \left ( e ^ { i \Omega \tau } + e ^ { - i \Omega \tau } \right ) + \frac { 1 } { 2 } \rho ^ { 2 } \left ( e ^ { 2 i \Omega \tau } + e ^ { - 2 i \Omega \tau } \right ).$$ Again, negative probabilities for both zero and one photon absorption and emission processes are possible. Convolving in the vacuum absorption distribution P 0 ( E ) and remaining in the time domain, the full P E ( ) function is given by: $$\mathbb { m } _ { \mathbb { m } \circ } \cdots \mathbb { m } _ { j } \cdot \\ P _ { \mathrm t o t, 2 } ( \tau ) & \quad = \frac { \varrho _ { 2 } ^ { 2 } e ^ { 2 i \Omega \tau } } { 2 } + \left [ \frac { \varrho _ { 2 } ^ { 3 } } { 2 } + 2 \rho ( 1 - \rho ) \right ] e ^ { i \Omega \tau } + \left [ \frac { \varrho _ { 4 } ^ { 4 } } { 4 } + 2 \rho ^ { 2 } ( 1 - \rho ) + ( 1 - 4 \rho + 3 \rho ^ { 2 } ) \right ] \\ & \quad + \left [ \frac { \rho _ { 5 } ^ { 5 } } { 2 i 3 l } + 2 \rho ( 1 - \rho ) \left ( \frac { \rho _ { 2 } ^ { 2 } } { 2 } + 1 \right ) + ( 1 - 4 \rho + 3 \rho ^ { 2 } ) \rho \right ] e ^ { - i \Omega \tau } \\ & \quad + \sum _ { k \geq 2 } \left [ \frac { \rho _ { 2 } ^ { 2 } } { 2 } \left ( \frac { \rho _ { k + 2 } ^ { k + 2 } } { ( k + 2 )! } + \frac { \rho _ { k - 2 } ^ { k - 2 } } { ( k - 2 )! } \right ) + 2 \rho ( 1 - \rho ) \left ( \frac { \rho _ { k + 1 } ^ { k + 1 } } { ( k + 1 )! } + \frac { \rho _ { k - 1 } ^ { k - 1 } } { ( k - 1 )! } \right ) + ( 1 - 4 \rho + 3 \rho ^ { 2 } ) \frac { k } { k! } \right ] e ^ { - k i \Omega \tau }. \\ \cdots \cdots & \quad. & \quad. & \quad. & \quad. & \quad. & \quad. & \quad. & \quad. & \quad. & \quad.$$ All these terms factorise nicely, and we obtain the simple closed expression for P occ ( τ ): $$P _ { t o t, 2 } ( \tau ) = e ^ { - \rho } \sum _ { k = - \infty } ^ { + \infty } \frac { 2 \rho ^ { k } } { ( k + 2 )! } \left [ L _ { 2 } ^ { ( k ) } ( \rho ) \right ] ^ { 2 } e ^ { - k i \Omega \tau }.$$ In order to obtain a closed expression for P tot ( τ ) for an arbitrary Fock state, we first make use of the following property of Laguerre polynomials: $$L _ { n + 1 } ( x ) = \frac { 1 } { n + 1 } \left ( ( 2 n + 1 - x ) L _ { n } ( x ) - n L _ { n - 1 } ( x ) \right ).$$ This allows us to write the following recurrence relation between the P tot ,n ( E ) function for different Fock states : $$P _ { t o t, n + 1 } ( \tau ) = \frac { 1 } { n + 1 } \left [ \left ( 2 ( n - \rho ) + 1 + \rho \left ( e ^ { i \Omega \tau } + e ^ { - i \Omega \tau } \right ) \right ) P _ { t o t, n } ( \tau ) - n P _ { t o t, n - 1 } ( \tau ) \right ].$$ We can expand P tot ,n ( τ ) in the usual manner in terms of weights for k -photon absorption/emission processes, using the fact that the maximum number of photons that can be emitted is n : $$P _ { t o t, n } ( \tau ) = \sum _ { k = - n } ^ { + \infty } p _ { t o t, n } [ k ] e ^ { - i k \Omega \tau }.$$ Inserting this form into Eq. (S45), we now have the following recurrence relations: $$p _ { t o t, n + 1 } [ - n - 1 ] = \frac { \rho } { \underset { \kappa } { n + 1 } } p _ { t o t, n } [ - n ],$$ $$p _ { t o t, n + 1 } [ - n ] \ = \frac { 1 } { \underset { \cdot } { n + 1 } } \left ( \rho p _ { t o t, n } [ - n + 1 ] + \left ( 2 ( n - \rho ) + 1 \right ) p _ { t o t, n } [ - n ] \right ),$$ $$p _ { t o t, n + 1 } [ k > - n ] = \frac { 1 } { n + 1 } \left ( \rho ( p _ { t o t, n } [ k + 1 ] + p _ { t o t, n } [ k - 1 ] ) + ( 2 ( n - \rho ) + 1 ) p _ { t o t, n } [ k ] - n p _ { t o t, n - 1 } [ k ] ) \,.$$ Motivated by the case n = 1 and n = 2, one finds by inspection that the following compact expression $$p _ { t o t, n } [ k ] = \frac { e ^ { - \rho } \rho ^ { k } n! } { ( k + n )! } \left [ L _ { n } ^ { ( k ) } ( \rho ) \right ] ^ { 2 },$$ safisfies the above recursion relations. This is Eq. (13) in the main text. As one can explicitly verify that this solution is correct for n = 1 and n = 2, it is thus necessarily unique. The proof is straightforward provided we use appropriate relations between the Laguerre polynomials such as: $$L _ { n } ^ { ( p ) } ( \rho ) \ = L _ { n } ^ { ( p + 1 ) } ( \rho ) - L _ { n - 1 } ^ { ( p + 1 ) } ( \rho )$$ $$n L _ { n } ^ { ( p ) } ( \rho ) \, = ( n + p ) L _ { n - 1 } ^ { ( p ) } ( \rho ) - \rho L _ { n - 1 } ^ { ( p + 1 ) } ( \rho ),$$ $$n L _ { n } ^ { ( p + 1 ) } ( \rho ) = ( n - \rho ) L _ { n - 1 } ^ { ( p + 1 ) } ( \rho ) + ( n + p ) L _ { n - 1 } ^ { ( p ) } ( \rho )$$ $$\rho L _ { n } ^ { ( p + 1 ) } ( \rho ) = ( n + p ) L _ { n - 1 } ^ { ( p ) } ( \rho ) - ( n - \rho ) L _ { n } ^ { ( p ) } ( \rho )$$ $$L _ { n } ^ { ( p ) } ( \rho ) \ = \frac { p + 1 - \rho } { n } L _ { n - 1 } ^ { ( p + 1 ) } ( \rho ) - \frac { \rho } { n } L _ { n - 2 } ^ { ( p + 2 ) } ( \rho ).$$ Eq. (13) shows explicitly that the total probability (i.e. including the contribution of vacuum fluctuations) to absorb or emit any given number of photons remain positive, regardless of the Fock state; this matches our general result. Nonetheless, it remains possible that the weight p tot ,n [ k ] can be exactly zero for k &gt; -n ; this requires in general a careful tuning of the parameter ρ . Such a cancellation would be impossible if p occ ,n [ j ] were all positive. Hence, it serves as direct proof that we have a quantum state in the cavity. In particular, consider p tot ,n [0], the probability that an electron tunnels without any energy exchange with the cavity. This quantity is directly given by the excess current noise at zero frequency, see Eq. (22) in the main text. From the above expressions, we see that p tot ,n [0] can be made zero if ρ is tuned to be a root of the n th Laguerre polynomial. The smallest root of the n th Laguerre polynomial goes as √ 2 /n , suggesting that the bigger the photon number of the cavity Fock state, the lower the minimum value of ρ needed to see evidence of negativity. ## EFFECTS OF FINITE TEMPERATURE In the main text, we focused primarily on the regime of zero temperature for both the cavity and the electronic conductor. We now consider the effects of non-zero temperature (both for the cavity state, and for the electrons in the tunnel junction leads). We consider the realistic case of a microwave cavity with frequency Ω / 2 π in the range from 5 -10 GHz and we assume its temperature is maintained between 15 and 30 mK; this implies β glyph[planckover2pi1] Ω ∈ [15 , 30]. For such low temperatures, we find the modification of P tot ( E ) compared to the zero temperature case is negligible; the main effect of temperature is thus through the tunnelling rates Γ( E ), namely the smearing of the sharp Fermi distribution in the metallic leads. The net result is that the heights of the various plateaus in the differential conductance are not affected by temperature but the transitions between them are rounded off, as shown in Fig.3. This is seen in Fig. (8). FIG. 8. (a) Effects of the temperature on the differential conductance of a tunnel junction coupled to a ground-state cavity (dashed lines) and to a cavity in a coherent state of amplitude ∣ ∣ α = √ 1 5 . 〉 The heights of the plateaus are not affected by the temperature, but the smearing of transitions decreases their effective width. (b) As for part (a), but for a cavity prepared in a squeezed state with (solide line) and without damping (dashed line). For these parameters, the smearing of transitions between conductance plateaus is more affected by the non-zero cavity damping κ than by temperature. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-0d5292be-222f-4f28-b5f2-f06339b9c94f.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1128v1-figure-eceb9f57-1f51-492e-bff1-b2a10aac642d.jpg) ## USING POSITIVITY OF P occ ( E ) TO BOUND TRANSPORT MEASUREMENTS As discussed in the main text and in the methods section, using the fact that p 0 [ k ] is a known distribution (Poissonian with mean ρ ) one can obtain inequalities for both the heights of the differential conductance plateaus and for the weights p tot [ k ] that must be satisfied for any cavity state where the quasi-probability distribution p occ [ k ] is positive definite. As discussed, this will fail to be true when the cavity is prepared in a truly non-classical state, and hence these bounds may be violated by such states. Three such bounds are used in the main text and two of these are given explicitly in the methods section. Here, we derive them all. ## Bound on height of second conductance plateau We first obtain the bound on the height of the second conductance plateau h 2 given in Eq. (23) of the main text and used in Fig. 3. This bound is useful in inferring the non-classicality of the Fock state via a transport measurement. Using Eq. (20) from the main text, expressing p tot [ k ] as a convolution [c.f. Eqs. (5)-(9) of the main text], and then using the evenness of p occ [ k ], we have $$h _ { 2 } - h _ { 1 } = p _ { t o t } [ + 1 ] - p _ { t o t } [ - 1 ] = p _ { 0 } [ 1 ] p _ { o c c } [ 0 ] + p _ { 0 } [ 2 ] p _ { o c c } [ 1 ] - \sum _ { k = 2 } ^ { + \infty } ( p _ { 0 } [ k - 1 ] - p _ { 0 } [ k + 1 ] ) \, p _ { o c c } [ k ].$$ For k ≥ 2 and ρ 2 &lt; k k ( +1) we have p 0 [1] &gt; p 0 [ k -1] -p 0 [ k +1] &gt; 0. Therefore, for any p occ [ k ] distribution that is positive definite, we have $$h _ { 2 } - h _ { 1 } > p _ { 0 } [ 1 ] p _ { \text{occ} } [ 0 ] + p _ { 0 } [ 2 ] p _ { \text{occ} } [ 1 ] - p _ { 0 } [ 1 ] \sum _ { k = 2 } ^ { + \infty } p _ { \text{occ} } [ k ] = - \frac { 1 } { 2 } p _ { 0 } [ 1 ] + \frac { 3 } { 2 } p _ { 0 } [ 1 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] + p _ { 0 } [ 2 ] ) p _ { \text{occ} } [ 1 ].$$ The equality in Eq. (S57) follows from the normalisation of p occ [ k ], 2 ∑ + ∞ k =2 p occ [ k ] = 1 -p occ [0] -2 p occ [1]. The p occ [ k ] weights in Eq. (S57) are unknown, so we wish to bound them. Again using Eq. (20) from the main text, we find $$h _ { 3 } - h _ { 2 } - p _ { 0 } [ 4 ] p _ { \text{occ} } [ 2 ] = p _ { 0 } [ 2 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] + p _ { 0 } [ 3 ] ) \, p _ { \text{occ} } [ 1 ] - \sum _ { k = 2 } ^ { + \infty } \left ( p _ { 0 } [ k - 2 ] - p _ { 0 } [ k + 2 ] \right ) p _ { \text{occ} } [ k ]. \quad \text{(S58)}$$ For k ≥ 2 and ρ 4 &lt; k ( +2)( k +1) ( k k -1) and k min = 2 we have p 0 [ k -2] -p 0 [ k +2] &gt; 0 such that $$h _ { 3 } - h _ { 2 } - p _ { 0 } [ 4 ] p _ { \text{occ} } [ 2 ] < p _ { 0 } [ 2 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] + p _ { 0 } [ 3 ] ) \, p _ { \text{occ} } [ 1 ] < \frac { 3 } { 2 } p _ { 0 } [ 1 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] + p _ { 0 } [ 2 ] ) \, p _ { \text{occ} } [ 1 ], \quad ( S 5 9 )$$ where the second inequality holds for ρ 2 &lt; 3. Now using the transitive property of the inequality and the fact that p occ [ k ] ≤ 1, Eqs. (S57) and (S59) lead to Eq. (23) of the main text, a lower bound on h 2 for ρ 2 &lt; 3 with a positive definite p occ [ k ]. ## Bound on p tot [ n ] We next turn to the bound on p tot [ n ] stated in Eq. (24) of the main text, one that can be violated by a squeezed state in the cavity, as shown in Fig. (a) of the main text. Again, we bound the behaviour of p tot [ k ] assuming only that p occ [ k ] is positive definite. We start by using the fact that p tot [ n ] is a convolution between p 0 [ k ] and p occ [ k ], $$p _ { t o t } [ n ] = \sum _ { k = 0 } ^ { + \infty } p _ { 0 } [ k ] p _ { o c c } [ n - k ] = p _ { 0 } [ 0 ] p _ { o c c } [ n ] + \frac { p _ { 0 } [ 1 ] } { p _ { 0 } [ 0 ] } p _ { 0 } [ 0 ] p _ { o c c } [ n - 1 ] + \sum _ { k = 2 } ^ { + \infty } \frac { p _ { 0 } [ k ] } { p _ { 0 } [ 0 ] } p _ { 0 } [ 0 ] p _ { o c c } [ n - k ], \quad \text{(S60a)}$$ $$p _ { t o t } [ n - 1 ] - p _ { t o t } [ n - 2 ] = p _ { 0 } [ 0 ] p _ { o c c } [ n - 1 ] + \sum _ { k = 2 } ^ { + \infty } \left ( p _ { 0 } [ k - 1 ] - p _ { 0 } [ k - 2 ] \right ) p _ { o c c } [ n - k ].$$ Substituting Eq. (S60b) into Eq. (S60a) we find $$p _ { t o c } [ n ] = p _ { 0 } [ 0 ] p _ { o c c } [ n ] + \frac { p _ { 0 } [ 1 ] } { p _ { 0 } [ 0 ] } \left [ p _ { t o c } [ n - 1 ] - p _ { t o c } [ n - 2 ] + \sum _ { k = 2 } ^ { + \infty } \left ( \frac { p _ { 0 } [ 0 ] p _ { 0 } [ k ] } { p _ { 0 } [ 1 ] } - p _ { 0 } [ k - 1 ] + p _ { 0 } [ k - 2 ] \right ) p _ { o c c } [ n - k ] \right ]. \ ( S 6 1 )$$ Now the term in braces in Eq. (S61) is simply e -ρ k ρ ! k -2 ( k -ρ )( k -1) /k !, which is greater than zero for k ≥ 2 and ρ &lt; 2. With p occ [ k ] positive definite we then have Eq. (24) of the main text, a lower bound for p tot [ n ] for ρ &lt; 2. ## Bound on height of fourth conductance plateau Now we will derive a bound on the height of the fourth conductance plateau, a bound that is useful for inferring the non-classicality of a squeezed state directly from a transport measurement, as shown in Fig. (b) of the main text. The calculations described below follow from no more than Eqs. (19) and (20) of the main text, and the assumption of a positive definite p occ [ k ]. This assumption shall be made throughout the calculation, but henceforth, will not be explicitly stated when it is employed. ## Height differences of conductance plateaus We start by expressing the height differences of the conductance plateaus in terms of the weights of the P E ( ) functions. Using Eq. (20) of the main text we can express the difference between the heights of the second and third conductance plateaus, as in Eq. (S58), $$h _ { 3 } - h _ { 2 } = p _ { 0 } [ 2 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] + p _ { 0 } [ 3 ] ) p _ { \text{occ} } [ 1 ] + p _ { 0 } [ 4 ] p _ { \text{occ} } [ 2 ] + \sum _ { k = 3 } ^ { + \infty } \left ( p _ { 0 } [ k + 2 ] - p _ { 0 } [ k - 2 ] \right ) p _ { \text{occ} } [ k ].$$ Subtracting ρ (2 p 0 [2] + p 0 [4]) p occ [1] / 2 from both sides of Eq. (S62) leads to $$h _ { 3 } - h _ { 2 } - p _ { 0 } [ 2 ] p _$$ The right-hand-side is positive provided that ρ &lt; 1 525, and consequently we have that the left-hand-side is greater . than zero. Therefore, we can write $$\sum _ { k = 3 } ^ { + \infty } \left ( p _ { 0$$ Again using Eq. (20) of the main text, we can also write an expression for the height difference of the third and fourth conductance plateaus, $$\sum _ { k = 4 } ^ { + \infty } ( p _ { 0 } [$$ Now we have ρ ( p 0 [ k -3] -p 0 [ k +3]) / 2 &gt; p 0 [ k -2] -p 0 [ k +2] for ρ &lt; 3 742. . This allows us to rewrite Eq. (S65) as an inequality, and separating out the first term in the summation we have $$\sum _ { k = 3 } ^ { + \infty } \left ( p _ { 0$$ In Eqs. (S64) and (S66) we have obtained an upper and lower bound on the sum of p occ [ k ]. Applying the transitive property of the inequality between these equations allows us to eliminate this sum, leaving us with $$\begin{array} {$$ Eq. (S67) is now an inequality relating the second, third and fourth conductance plateaus. Applying Eq. (20) of the main text to the first and second conductance plateaus, as was done for Eq. (S56) yields $$p _ { 0 } [ 2 ] p _ { \text{occ} } [ 1 ] & = h _ { 2 } - h _ { 1 } - p _ { 0 } [ 1 ] p _ { \text{occ} } [ 0 ] + ( p _ { 0 } [ 1 ] - p _ { 0 } [ 3 ] ) p _ { \text{occ} } [ 2 ] + ( p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] ) p _ { \text{occ} } [ 3 ] \\ & \quad + \sum _ { k = 4 } ^ { + \infty } ( p _ { 0 } [ k - 1 ] - p _ { 0 } [ k + 1 ] ) \, p _ { \text{occ} } [ k ].$$ Dropping the summation in Eq. (S68), on the grounds that the coefficients of p occ [ k ] are positive for ρ &lt; 4 472, we . are left with an inequality. Subsequently multiplying both sides of the inequality by ρ/ 2 we find $$\frac { \rho } { 2 } p _ { 0 } [ 2 ] p _ { \text{occ} } [ 1 ] > \frac { \rho } { 2 } ( h _ { 2 } - h _ { 1 } ) - \frac { \rho } { 2 } p _ { 0 } [ 1 ] p _ { \text{occ} } [ 0 ] + \frac { \rho } { 2 } \left ( p _ { 0 } [ 1 ] - p _ { 0 } [ 3 ] \right ) p _ { \text{occ} } [ 2 ] + \frac { \rho } { 2 } \left ( p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] \right ) p _ { \text{occ} } [ 3 ].$$ Considering Eqs. (S67) and (S69), we see that we have an upper and a lower bound on p occ [1]. Using the transitive property of the inequality we find $$\mu _ { \ } ^ { \ }. \quad \mu _ { \ } ^ { \ } h _ { 3 } - h _ { 2 } - \frac { \rho } { 2 } ( h _ { 4 } - h _ { 3 } + h _ { 2 } - h _ { 1 } ) & > - \frac { \rho } { 2 } p _ { 0 } [ 3 ] p _ { \text{occ} } [ 0 ] + \left [ p _ { 0 } [ 4 ] - \frac { \rho } { 2 } ( p _ { 0 } [ 3 ] + p _ { 0 } [ 5 ] ) \right ] p _ { \text{occ} } [ 2 ] \\ & \quad + \left [ - p _ { 0 } [ 1 ] + p _ { 0 } [ 5 ] + \frac { \rho } { 2 } \left ( p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] - p _ { 0 } [ 6 ] \right ) \right ] p _ { \text{occ} } [ 3 ].$$ We have now obtained a lower bound on a linear combination of heights of the first four conductance plateaus. However, the bound still contains the (unknown) p occ [ k ] ( k = 0 2 3). Therefore, we now seek to bound these quantities , , in terms of the known p 0 [ k ] and the measurable h k ( k = 1 2 3 4). , , , Using Eq. (19) from the main text with the normalisation conditions 1 = ∑ + ∞ n = -∞ ∑ + ∞ m =0 p 0 [ mp ] occ [ n -m ] and 1 = ∑ + ∞ m =0 p 0 [ m ], we can show that $$1 - h _ { 1 } & = \sum _ { n = 1 } ^ { + \infty } \sum _ { m = 0 } ^ { + \infty } p _ { 0 } [ m ] \left ( p _ { o c c } [ n - m ] - p _ { o c c } [ n + m ] \right ) & & ( S 7 1 a )$$ $$= ( 1 - p _ { 0 } [ 0 ] ) p _ { o c c } [ 0 ] + 2 \sum _ { k = 1 } ^ { + \infty } \left ( 1 - \sum _ { m = 0 } ^ { k - 1 } p _ { 0 } [ m ] - p _ { 0 } [ k ] / 2 \right ) p _ { o c c } [ k ].$$ Truncating the summation on the right-hand-side of Eq. (S71b) at the p occ [3] term and rearranging leads to a bound on p occ [0], $$\cdots.. \\ p _ { o c c } [ 0 ] & < \frac { 1 - h _ { 1 } } { 1 - p _ { 0 } [ 0 ] } - 2 \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] / 2 } { 1 - p _ { 0 } [ 0 ] } p _ { o c c } [ 1 ] - 2 \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] / 2 } { 1 - p _ { 0 } [ 0 ] } p _ { o c c } [ 2 ] \\ & - 2 \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] - p _ { 0 } [ 3 ] / 2 } { 1 - p _ { 0 } [ 0 ] } p _ { o c c } [ 3 ]. \\ \cdots.. \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \end{$$ Using the bound of Eq. (S72) in Eq. (S70) leads to a coefficient on the p occ [2] term (on the smaller side of the inequality), ρp 0 [3](1 -p 0 [0] -p 0 [1] -p 0 [2] / 2) / (1 -p 0 [0]) + p 0 [4] -ρ ( p 0 [3] + p 0 [5]) / 2. This coefficient is positive for 1 011 . &lt; ρ &lt; 5 235 and so the . p occ [2] term may be removed from the inequality. This leaves us with $$1. 0 1 \smile \slash \rho \smile \circ \circ \text{and} \, \text{so} \, \text{are} \, p _ { \circ } \, \text{and} \, \text{may} \, \text{ve removed} \, \text{from} \, \text{me} \, \text{equiv} \, \text{may} \, \text{,} \, 1 \, \text{me} \, \text{reaves} \, \text{as} \, \text{with} \, \\ h _ { 3 } - h _ { 2 } - \frac { \rho } { 2 } \left ( h _ { 4 } - h _ { 3 } + h _ { 2 } - h _ { 1 } \right ) & > - \frac { \rho } { 2 } \left ( p _ { 0 } [ 3 ] \frac { 1 - h _ { 1 } } { 1 - p _ { 0 } [ 0 ] } + \rho _ { 0 } [ 3 ] \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] / 2 } { 1 - p _ { 0 } [ 0 ] } p _ { \circ } [ 1 ] \\ & + \rho _ { p _ { 0 } } [ 3 ] \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] - p _ { 0 } [ 3 ] / 2 } { 1 - p _ { 0 } [ 0 ] } p _ { \circ } [ 3 ] \\ & + \left [ \frac { \rho } { 2 } \left ( p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] - p _ { 0 } [ 6 ] \right ) - p _ { 0 } [ 1 ] + p _ { 0 } [ 5 ] \right ] p _ { \circ } [ 3 ]. \\ \text{Comparing} \, \text{Eq.\,} ( S 7 3 ) \, \text{to} \, \text{Eq.\,} ( S 7 0 ) \, \text{we have one fewer unknown} \, p _ { \circ } \, \text{d} k \, \text{ in the bound: we now seek to reduce this}$$ Comparing Eq. (S73) to Eq. (S70) we have one fewer unknown p occ [ k ] in the bound; we now seek to reduce this number further. ## Bounding p occ [3] Applying Eqs. (19) and (20) of the main text iteratively we find the expressions for the height of the fourth conductance plateau, $$h _ { 4 } = p _ { \text{ot} } [ 0 ] + \sum _ { k = 1 } ^ { 3 } \left ( p _ { \text{ot} } [ k ] + p _ { \text{ot} } [ - k ] \right ) + 2 \sum _ { k = 4 } ^ { + \infty } p _ { \text{ot} } [ - k ] \\.$$ $$= \sum _ { l = 0 } ^ { + \infty } p _ { 0 } [ l ] p _ { \infty \cceq } [ l ] + \sum _ { k = 1 } ^ { 3 } \sum _ { l = k } ^ { + \infty } p _ { 0 } [ l - k ] p _ { \infty \cceq } [ l ] + \sum _ { k = 1 } ^ { 3 } \sum _ { l = - k } ^ { + \infty } p _ { 0 } [ l + k ] p _ { \infty \cceq } [ l ] + 2 \sum _ { k = 4 } ^ { + \infty } \sum _ { l = k } ^ { + \infty } p _ { 0 } [ l - k ] p _ { \infty \cceq } [ l ]. \quad ( S 7 4 b )$$ The second line follows from expanding the total P E ( ) weights as convolutions of the vacuum and occupied P E ( ) weights. Next we can write an expression for 1 -h 4 using Eq. (S74b) and the normalisation condition 1 = ∑ + ∞ m =0 p 0 [ mp ] occ [0] + 2 ∑ + ∞ m =0 p 0 [ m ] ∑ + ∞ k =1 p occ [ k ]. Truncating the resulting expression at the p occ [4] and p 0 [4] terms leads us to the inequality $$1 - h _ { 4 } & > ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] - p _ { 0 } [ 3 ] ) \, p _ { \circledast c } [ 0 ] + ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] ) \, p _ { \circledast c } [ 1 ] \\ & \quad + ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] ) \, p _ { \circledast c } [ 2 ] + ( 1 - p _ { 0 } [ 0 ] ) \, p _ { \circledast c } [ 3 ] + ( 1 - p _ { 0 } [ 0 ] ) \, p _ { \circledast c } [ 4 ].$$ Writing Eq. (S65) as a lower bound for h 3 -h 4 by removing the summation, and adding the resulting inequality to that of Eq. (S75), we find $$1 + h _ { 3 } - 2 h _ { 4 } & > ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 6 ] ) p _ { \infty c c } [ 3 ] + ( 1 - p _ { 0 } [ 0 ] - 2 p _ { 0 } [ 1 ] - p _ { 0 } [ 5 ] ) p _ { \infty c c } [ 2 ] \\ & \quad + ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - 2 p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] ) p _ { \infty c c } [ 1 ] + ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] - 2 p _ { 0 } [ 3 ] ) p _ { \infty c c } [ 0 ].$$ The coefficient of p occ [2] is positive for ρ &gt; 1 274, and so we may remove it from this inequality. . Further, p occ [0] &lt; (1 -h 1 ) / (1 -p 0 [0]), which follows from truncating Eq. (S71b) at the first term. Using this bound, Eq. (S76) can be written as a bound on p occ [3], $$p _ { o c c } [ 3 ] ( 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 6 ] ) & < 1 + h _ { 3 } - 2 h _ { 4 } + ( p _ { 0 } [ 0 ] + p _ { 0 } [ 1 ] + p _ { 0 } [ 2 ] + 2 p _ { 0 } [ 3 ] - 1 ) \frac { 1 - h _ { 1 } } { 1 - p _ { 0 } [ 0 ] } \\ & + ( p _ { 0 } [ 0 ] + p _ { 0 } [ 1 ] + 2 p _ { 0 } [ 2 ] + p _ { 0 } [ 4 ] - 1 ) p _ { o c c } [ 1 ].$$ $$( S 7 7 )$$ ## Final bounds on fourth conductance plateau Before stating our final bounds on the conductance plateaus we introduce some short-hand notation for the complicated functions of ρ that arise: $$\mathcal { A } & = \frac { - \rho ( p _ { 0 } [ 2 ] - p _ { 0 } [ 4 ] + p _ { 0 } [ 6 ] ) / 2 + p _ { 0 } [ 1 ] - p _ { 0 } [ 5 ] } { \quad \. \. } - \rho \frac { p _ { 0 } [ 3 ] } { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 6 ] } - \rho \frac { p _ { 0 } [ 3 ] } { 1 - p _ { 0 } [ 0 ] } \frac { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 1 ] - p _ { 0 } [ 2 ] - p _ { 0 } [ 3 ] / 2 } { 1 - p _ { 0 } [ 0 ] - p _ { 0 } [ 6 ] }, \quad \. \.$$ B ≡ 1 / (1 - p 0 [0]) , (S78b) $$\mathcal { C } \equiv p _ { 0 } [ 0 ] + p _ { 0 } [ 1 ] + p _ { 0 } [ 2 ] + 2 p _ { 0 } [ 3 ] - 1.$$ Note that A &gt; 0 for ρ &lt; 1 859, . C &gt; 0 for ρ &lt; 2 318, and . B is unconditionally positive. Now using the bound of Eq. (S77) in Eq. (S73) we see that the coefficient of p occ [1] (appearing on the smaller side of the inequality), ρ B p 0 [3](1 -p 0 [0] -p 0 [1] / 2) + A (1 -p 0 [0] -p 0 [1] -2 p 0 [2] -p 0 [4]), is positive for 1 042 . &lt; ρ &lt; 5 212, . and therefore the p occ [1] term may be discarded. This leaves us with an inequality which may be expressed as an upper bound on the height of the fourth conductance plateau, $$h _ { 4 } ( 2 \mathcal { A } + \rho / 2 ) < \mathcal { A } ( 1 + \mathcal { B C } ) + \mathcal { B } \rho _ { 0 } [ 3 ] / 2 - [ \mathcal { A B C } - \rho ( 1 - \mathcal { B } _ { 0 } [ 3 ] ) / 2 ] \, h _ { 1 } - ( 1 + \rho / 2 ) h _ { 2 } + ( 1 + \rho / 2 + \mathcal { A } ) h _ { 3 }. \quad \text{(ST9)}$$ This bound is valid for 1 274 . &lt; ρ &lt; 1 525. . We stress that these bounds are expressed in terms of the known p 0 [ k ] and the measurable h k ( k = 1 2 3). , , The bounds apply for a classical distribution in the coupled electromagnetic mode, and may be violated in the presence of a non-classical field. - [1] In 'Single Charge Tunneling', edited by H. Grabert and M. H. Devoret, NATO ASI Series B, Vol. 294, (Plenum Press, New York, 1992). - [2] E. Zakka-Bajjani, J. Segala, F. Portier, P. Roche, D. C. Glattli, A. Cavanna, and Y. Jin, Phys. Rev. Lett. 99 , 236803 (2007). - [3] J. Gabelli and B. Reulet Phys. Rev. Lett. 100 , 026601 (2008). - [4] E. Zakka-Bajjani, J. Dufouleur, N. Coulombel, P. Roche, D. C. Glattli, and F. Portier, Phys. Rev. Lett. 104 , 206802 (2010). - [5] G. Gasse, L. Spietz, C. Lupien, and B. Reulet, Phys. Rev. B 88, 241402(R) (2013). - [6] J.-R. Souquet, I. Safi, and P. Simon, Phys. Rev. B 88 , 205419 (2013).
10.1038/ncomms6562
[ "J. -R. Souquet", "M. J. Woolley", "Julien Gabelli", "Pascal Simon", "Aashish A. Clerk" ]
2014-08-05T22:02:17+00:00
2014-08-05T22:02:17+00:00
[ "cond-mat.mes-hall", "quant-ph" ]
Photon-assisted tunneling with non-classical light
Among the most exciting recent advances in the field of superconducting quantum circuits is the ability to coherently couple microwave photons in low-loss cavities to quantum electronic conductors (e.g.~semiconductor quantum dots or carbon nanotubes). These hybrid quantum systems hold great promise for quantum information processing applications; even more strikingly, they enable exploration of completely new physical regimes. Here we study theoretically the new physics emerging when a quantum electronic conductor is exposed to non-classical microwaves (e.g.~squeezed states, Fock states). We study this interplay in the experimentally-relevant situation where a superconducting microwave cavity is coupled to a conductor in the tunneling regime. We find the quantum conductor acts as a non-trivial probe of the microwave state; in particular, the emission and absorption of photons by the conductor is characterized by a non-positive definite quasi-probability distribution. This negativity has a direct influence on the conductance of the conductor.
1408.1129v2
## THE EXPONENTIAL MAP IS CHAOTIC: AN INVITATION TO TRANSCENDENTAL DYNAMICS ## ZHAIMING SHEN AND LASSE REMPE-GILLEN Abstract. We present an elementary and conceptual proof that the complex exponential map is chaotic when considered as a dynamical system on the complex plane. (This was conjectured by Fatou in 1926 and first proved by Misiurewicz 55 years later.) The only background required is a first undergraduate course in complex analysis. ## 1. Introduction Let x 0 be any real number, and consider what happens when we repeatedly apply the function f ( x ) = e x : ↦ $$x _ { 0 } \mapsto e ^ { x _ { 0 } } \mapsto e ^ { e ^ { x _ { 0 } } } \mapsto e ^ { e ^ { x _ { 0 } } } \mapsto \dots.$$ ↦ ↦ ↦ Clearly this sequence, the orbit of z 0 under f , tends rapidly to infinity. Indeed, if x n = e x n -1 denotes the n -th term in the sequence, then x n &gt; 2 n -2 for n ≥ 2. So the process may not appear terribly interesting. This changes rather drastically upon replacing the real number x 0 by a complex value z 0 and considering the sequence $$z _ { n } \coloneqq e ^ { z _ { n - 1 } } \quad ( n \geq 1 ).$$ (See Section 2 for a reminder of the properties of the complex exponential function.) In contrast to the real case, not every complex orbit tends to infinity: for example, there is a point z 0 ≈ 0 318 + 1 337 . . i such that f ( z 0 ) = z 0 , and hence the sequence defined by (1.1) is constant for z 0 . In fact, things turn out to be extremely complicated: ## 1.1. Theorem (Orbits of the complex exponential map) . Each of the following sets is dense in the complex plane: - 1. the set of starting values z 0 whose orbit (defined by (1.1) ) diverges to ∞ ; - 2. the set of starting values z 0 whose orbit forms a dense subset of the plane; - 3. the set of periodic points ; i.e. starting values z 0 such that z n + k = z n for some k &gt; 0 and all n ≥ 0 . So, by performing arbitrarily small perturbations of any given starting point, we can always obtain an orbit that is finite, one that accumulates everywhere and one that eventually leaves every bounded set! In particular, the eventual behaviour of a point z 0 under iteration of the exponential map is usually impossible to predict numerically : when computing the value of f ( z 0 ), there will always be a (tiny) numerical error, and according to Theorem 1.1, this error can change the long-term behaviour of orbits drastically. 2000 Mathematics Subject Classification. Primary 37F10; Secondary 30D05, 37D45. This work was supported by an LMS-Nuffield Undergraduate Research Bursary. The second author is supported by a Philip Leverhulme Prize. This type of phenomenon is often referred to as chaos . It is a typical occurrence in all but the simplest 'dynamical systems' (mathematical systems that change over time according to some fixed rule), such as the movement of bodies in the solar system - governed by Newton's laws of gravity - or, indeed, seemingly simple discrete-time processes such as the one we are studying here. There are a number of (inequivalent) definitions of 'chaos'; the most widely used, and most appropriate for our purposes, was introduced by Devaney in 1989 [10]. This concept, formally introduced in Definition 2.1 below, captures precisely the topological properties usually associated with chaotic systems. The following result is then a consequence of Theorem 1.1. ## 1.2. Theorem (The exponential map is chaotic) . ↦ The exponential map f : C → C ; z → e z is chaotic in the sense of Devaney. Theorem 1.1 is (a reformulation of) a famous theorem of Misiurewicz from 1981 [23], which confirmed a conjecture stated by Fatou [16] in 1926. Misiurewicz's proof is entirely elementary, but not easy: it relies on a sequence of explicit estimates on the exponential map, its iterates and their derivatives. An alternative proof was later given independently in [4], [14] (see also [15]) and [18]. (According to Eremenko, their research was directly motivated by the desire to give a more conceptual proof of Misiurewicz's theorem.) A third argument can be found in [8]. In all these newer works, the result arises as part of a more general theorem, and requires a substantial amount of background knowledge in complex analysis and complex dynamics. The goal of this note is to give a proof of Theorems 1.1 and 1.2 that is both elementary and conceptual. It requires no background beyond a first undergraduate course in complex analysis, together with some facts from hyperbolic geometry that can be verified in an elementary manner. We shall explain the latter carefully in Section 3, after first reviewing the action of the exponential map on the complex plane in Section 2. Readers already familiar with this background material can dive in straight in with the proofs in Sections 4 to 6. In Section 7, we briefly mention further results and open questions; since mathematics is learned best by doing, we end with exercises for the reader in Section 8. We hope that our note will give readers some insights into the beautiful phenomena one encounters when studying the dynamics of transcendental functions of one complex variable, and serve as an invitation to learn more about this intriguing subject. Acknowledgements. Wethank Alexandre Eremenko, Rongbang Huang, Stephen Worsley and the referees for helpful comments. ## 2. Background material: Exponentials, logarithms and chaos Basic notation. If f : X → X is a self-map of some set X , then $$f ^ { n } \coloneqq \underbrace { f \circ f \circ \cdots \circ f } _ { n \text{ times} }$$ is called the n -th iterate of f (for n ≥ 0). In particular, f 0 ( x ) = x for all x ∈ X . The orbit of a point x 0 is the sequence ( x , f 0 ( x 0 ) , f 2 ( x 0 ) , . . . ). In the case where f ( z ) = e z is the complex exponential map, this coincides precisely with the definition in (1.1). A point x ∈ X is periodic if there is some n ≥ 1 such that f n ( x ) = x . Figure 1. The action of the complex exponential map, as illustrated in Figure [10] on p. 82 of [24]. The pattern on the right is the image of the checkerboard pattern on the left. (Image courtesy of Tristan Needham.) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-256b6f4b-01f5-45ff-861d-17d049c136c5.jpg) We use standard notation for complex numbers z ∈ C . In particular, Arg( z ) ∈ -( π, π ] denotes (the principal branch of) the argument of z , i.e. the angle that the line segment connecting 0 and z forms with the real axis. Note that Arg( z ) is undefined at z = 0 and continuous only for z / ∈ ( -∞ , 0). We write C ∗ . . = C \ { 0 } for the punctured plane , and D z δ ( 0 ) for the round disc of radius δ around a point z 0 ∈ C ; the unit disc is D . . = D 1 (0). The complex exponential function. Recall that the complex exponential function is the holomorphic function exp: C → C given by $$( 2. 1 ) \quad \ \ \exp ( z ) \coloneqq e ^ { z } = e ^ { x } \cdot e ^ { i y } = e ^ { x } \cdot ( \cos ( y ) + i \sin ( y ) ), \quad \ \text{where } z = x + i y.$$ The representation (2.1) provides the following geometric interpretation of the action of the exponential map (see Figure 1), which the reader should keep in mind: - · The function exp maps horizontal lines to radial rays starting at the origin, and wraps vertical lines infinitely often around concentric circles centered at the origin. The modulus | e z | is large precisely when Re z is large and positive. - · In particular, the right half-plane H . . = { z ∈ C : Re z &gt; 0 } is mapped (in an infinite-to one manner) to the outside of the closed unit disc, and the left halfplane is mapped to the punctured unit disc. - · The exponential map is strongly expanding when Re z is large and positive, and strongly contracting when Re z is very negative. Since the exponential map spreads the complex plane C over the punctured plane C ∗ in an infinite-to-one manner, it is not injective, and hence does not have a well-defined global inverse. Instead, we use branches of the logarithm: inverse functions to injective restrictions of exp (see [24, Section 2.VII]). It follows from (2.1) that such a branch exists wherever there is a continuous choice of the argument. For example, let ϑ ∈ R . Then glyph[negationslash] $$\exp \colon \left \{ \zeta \in \mathbb { C } \colon \vartheta - \pi < \text{Im} \, \zeta < \vartheta + \pi \right \} \rightarrow \left \{ \omega \in \mathbb { C } \colon \text{Arg} \, \omega \not \equiv - \vartheta \, \text{ (mod } 2 \pi ) \right \} = \colon U$$ is bijective, and hence has a holomorphic inverse L on U , given by $$L ( \omega ) \coloneqq \log | \omega | + i \cdot \left ( \vartheta + \text{Arg } \frac { \omega } { e ^ { i \vartheta } } \right ) \quad ( \omega \in U ).$$ (Here, and throughout, log: (0 , ∞ → ) R denotes the natural logarithm.) In particular, let ∆ ⊂ C be a disc that does not contain the origin, and let ζ 0 ∈ C with e ζ 0 ∈ ∆. Taking ϑ = Im ζ 0 , we see that there is a holomorphic map L : ∆ → C with L e ( ζ 0 ) = ζ 0 such that e L ω ( ) = ω and Im ζ 0 -π &lt; Im L ω ( ) &lt; Im ζ 0 + π for all ω ∈ D . Note that we could replace ∆ by any convex open set that omits the origin. More generally, branches of the logarithm exist on any simply-connected domain that does not contain the origin, but for us the above cases of discs and slit planes will be sufficient. Devaney's topological definition of chaos. We now introduce Devaney's definition of chaos [10, § 1.8] that was mentioned in the introduction. This is usually stated in the context of metric spaces (see below), but we shall restrict to the case of dynamical systems defined on subsets of the complex plane. Recall that, if A ⊂ X ⊂ C , then A is called dense in X if every open set U ⊂ C that intersects X also contains a point of A . ## 2.1. Definition (Devaney Chaos) . Let X ⊂ C be infinite, and let f : X → X be continuous. We say that f is chaotic (in the sense of Devaney) if the following two conditions are satisfied. - (a) The set of periodic points of f is dense in X . - (b) The function f is topologically transitive ; that is, for all open sets U, V ⊂ C that intersect X , there is a point z ∈ U ∩ X and n ≥ 0 such that f n ( z ) ∈ V . Topological transitivity means precisely that we can move from any part of the space X to any other by applying the function f sufficiently often. This property clearly follows from the existence of a dense orbit (see Exercise 8.1). In particular, Theorem 1.2 is a consequence of Theorem 1.1. (However, in Section 5, we in fact argue in the converse direction - we first prove topological transitivity of the exponential map directly, and then deduce the existence of dense orbits.) Sensitive dependence and spherical distances. Devaney's original definition of chaos included a third condition: sensitive dependence on initial conditions . It is shown in [5] that this property is a consequence of topological transitivity and density of periodic points, which is why we were able to omit it in Definition 2.1. It is nonetheless worthwhile to discuss sensitive dependence on initial conditions, since it encapsulates precisely the idea of 'chaos' discussed in the introduction: Two points that are close together may end up a definitive distance apart after sufficiently many applications of the function f . (This phenomenon has become known in popular culture as the 'butterfly effect'.) Moreover, in the case of the exponential map, we shall be able to establish sensitive dependence before proving either of the remaining two conditions. To give the formal definition, we shall use the notion of a distance function (or metric ) d on a set X , as introduced e.g. in [9, Chapter 2] or [28, Chapter 2]. Readers unfamiliar with this definition need not despair: On the one hand, it is only used in this subsection; on the other, it will be sufficient to think of such a function informally as a formula that defines some notion of distance between two points of X . The simplest example of a distance function on C is the usual one, namely Euclidean distance d z, w ( ) := | z -w | . ## 2.2. Definition (Sensitive dependence on initial conditions) . Let X ⊂ C , let f : X → X be continuous, and let d be a distance function on X . We say that f exhibits sensitive dependence on initial conditions (with respect to d ) if there exists a constant δ &gt; 0 with the following property: For every non-empty open set U ⊂ X , there are points x, y ∈ U and some n ≥ 0 such that d f ( n ( x , f ) n ( y )) ≥ δ . If we intend to use this definition, we ought to clarify which distance function we intend to use on the complex plane, and it is tempting to choose Euclidean distance. This turns out to be a poor choice: even the 'uninteresting' real exponential map discussed at the very beginning of this paper has sensitive dependence with respect to this distance (Exercise 8.2). The trouble is that, when orbits tend uniformly to infinity for a whole neighbourhood of our starting value, we would consider the corresponding behaviour to be 'stable', but orbits may end up extremely far apart in terms of Euclidean distance. This issue is resolved by instead using the so-called spherical distance , which is obtained by adjoining a single point at ∞ to the complex plane - so a point z is close to ∞ whenever | z | is large - and thinking of the resulting space C ∪ {∞} as forming a sphere in 3-space. For this reason, the space C ∪ {∞} is called the Riemann sphere . Instead of introducing spherical distance formally, let us use the informal picture above to decide what sensitive dependence with respect to the sphere should mean. If ζ, ω ∈ C are close to each other on the sphere, then there are only two possibilities: either both points are close to infinity, or they are also close in the Euclidean sense. Using this observation, we define sensitive dependence on the sphere directly and axiomatically: ## 2.3. Definition (Sensitive dependence with respect to spherical distance) . Let f : C → C be a continuous function. We say that f has sensitive dependence with respect to spherical distance if there exist δ &gt; 0 and R &gt; 0 with the following property. For every non-empty open set U ⊂ C , there are z, w ∈ U and n ≥ 0 such that | f n ( z ) | ≤ R and | f n ( z ) -f n ( w ) | ≥ δ . It turns out (see Exercise 8.3) that Definition 2.3 implies sensitive dependence in the sense of Definition 2.2 - no matter which distance function we use on the complex plane. ## 3. A brief introduction to hyperbolic geometry Hyperbolic geometry is a beautiful and powerful tool in one-dimensional complex analysis (as well as in higher-dimensional geometry). When discussing spherical distance in the previous section, we briefly encountered the idea of using a different notion of distance to the 'standard' one; hyperbolic geometry is another example of this. If U is any open subset of the complex plane that omits more than one point, then there is a natural notion of distance on U , called the hyperbolic metric . (For those who know differential geometry, this is the unique complete conformal metric of constant curvature -1 on U .) We only need a few elementary facts, all of which can be proved using elementary complex analysis. We shall first motivate these statements and then collect them in Theorem 3.3 and Proposition 3.4. For a more detailed introduction to the hyperbolic metric, we refer to the book [2] or the article [6]. Our starting point is the following classical consequence of the standard maximum modulus principle of complex analysis; see [17, Section 3.2] or [24, Section 7.VII]. ## 3.1. Lemma (Schwarz lemma) . Suppose that f : D → D is holomorphic and f (0) = 0 . Then either - (a) | f ( z ) | &lt; z | | for every non-zero z in D , and | f ′ (0) | &lt; 1 , or (b) there is a real constant ϑ such that f ( z ) = e iϑ z for all z , and | f ′ (0) | = | e iϑ | = 1 . This lemma can be very useful, but its generality is limited because of the requirement that f should fix 0, and because its conclusion concerns only the derivative at the origin. However, we can move any point a ∈ D to zero using a M¨ obius transformation ↦ $$M \colon \mathbb { D } \to \mathbb { D } ; \quad z \mapsto e ^ { i \vartheta } \frac { z - a } { 1 - \bar { a } z }$$ (where ϑ ∈ R is arbitrary). So, if f : D → D is any holomorphic function, we can pre- and post-compose f with suitable M¨bius transformations and apply the Schwarz o lemma. Using the chain rule to determine the derivative of the composition, we see that $$| f ^ { \prime } ( z ) | \cdot \frac { 1 - | z | ^ { 2 } } { 1 - | f ( z ) | ^ { 2 } } \leq 1 \quad \text{ for all } z \in \mathbb { D }.$$ We can interpret (3.2) as saying that the derivative of f is at most 1 when calculated with respect to a different notion of distance (in the difference quotient usually used to define | f ′ | ). More precisely, we call the expression $$\frac { 2 | d z | } { 1 - | z | ^ { 2 } }$$ the hyperbolic metric on D . The idea is that if we have an 'infinitesimal change' at the point z , then its corresponding size in the hyperbolic metric is obtained by multiplying its Euclidean length by the quantity $$\rho _ { \mathbb { D } } ( z ) \coloneqq \frac { 2 } { 1 - | z | ^ { 2 } },$$ called the density of the hyperbolic metric. 1 This can be made precise using the notions of differential geometry (formally, the metric is a way to measure the length of tangent vectors), but we can treat (3.3) simply as a formal expression. Remark. Although this expression is called a 'metric', it is not a 'distance function' in the sense of the preceding section. However, it naturally gives rise to such a distance via the notion of arc-length ; see [2, Chapter 3]. We note that the spherical metric can be similarly introduced via a conformal metric; that is, a metric that is a scalar multiple of the Euclidean metric at any point, where the scaling factor may depend on the point. With our new notation, formula (3.2) states, in beautiful simplicity, that a holomorphic function f : D → D has hyperbolic derivative at most 1 at every point, with equality if and only if f is a M¨bius transformation. What is even better is that we can transfer o the metric to other domains. 1 The factor 2 in (3.4) is simply a normalization that ensures that this metric has curvature -1, rather than some other negative constant. It could just as easily be omitted for our purposes, in which case all subsequent densities will also lose a factor of 2. ## 3.2. Definition (Simply-connected domains) . An open connected set U glyph[subsetnoteql] C is called simply-connected if there is a conformal isomorphism (i.e., bijective holomorphic function) ϕ : U → D . Remark. Usually, U is called simply-connected if C \ U has no bounded components; i.e., U has no holes. The Riemann mapping theorem [1, Chapter 6] states that the two notions are equivalent. Our definition allows us to avoid using the Riemann mapping theorem, which is often not treated in a first course on complex analysis. We can now state the following result, which collects the key properties of the hyperbolic metric. Its proof is elementary, using only the Schwarz lemma and the fact that the conformal automorphisms of D are precisely the M¨bius transformations from (3.1); see o Exercise 8.4. We leave it to the reader to fill in the details, or to consult [6, Theorem 6.4]. ## 3.3. Theorem (Pick's theorem) . For every simply-connected domain U ⊂ C , there exists a unique conformal metric ρ U ( z ) d | z | on U , called the hyperbolic metric , such that the following hold. - (a) ρ D ( z ) = 2 1 -| | z 2 for all z ∈ D ; - (b) if f : U → V is holomorphic, then f does not increase the hyperbolic metric. I.e., $$\| D f ( z ) \| _ { U } ^ { V } \coloneqq | f ^ { \prime } ( z ) | \cdot \frac { \rho _ { V } ( f ( z ) ) } { \rho _ { U } ( z ) } \leq 1 ;$$ - (c) for any z ∈ U and any f as above, we have ‖ D ( ) f z ‖ V U = 1 if and only if f is a conformal isomorphism between U and V ; - (d) if U glyph[subsetnoteql] V , then ρ U ( z ) &gt; ρ V ( z ) for all z ∈ U . A key property of the hyperbolic metric on a simply-connected domain is that the density ρ U ( z ) is inversely proportional to the distance of z to the boundary of U . In other words, suppose that a figure of constant hyperbolic size moves towards the boundary of U . Then its Euclidean size decreases proportionally with the distance to the boundary. (See Figure 2.) This is a general theorem - see [6, Formula (8.4)] - but in the domains that we shall be using, it can be checked explicitly from the following formulae. ## 3.4. Proposition (Examples of the hyperbolic metric) . - (a) For the right half plane H = { z ∈ C : Re z &gt; 0 } , ρ H ( z ) = 1 Re z . - (b) For a strip of height 2 π : ρ { z ∈ C : | Im z &lt;π | } ( z ) = 1 2 cos(Im( z / ) 2) . - (c) For the positively/negatively slit plane : $$\rho _ { \mathbb { C } } \langle [ 0, \infty ) ( z ) = \frac { 1 } { 2 | z | \sin ( \arg ( z ) / 2 ) } ; \quad \rho _ { \mathbb { C } \langle ( - \infty, 0 ] } ( z ) = \frac { 1 } { 2 | z | \cos ( \arg ( z ) / 2 ) }.$$ (In the first case, the branch of the argument should be taken to range between 0 and 2 π .) (a) The unit disc D ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-c9355c5e-1a5d-42a5-b9db-c39ed2417b8a.jpg) (c) The right half-plane H ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-60eb3769-3b24-4767-a560-893181dd2ebd.jpg) (d) The strip {| Im z | &lt; π } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-1600d2bf-5d3d-4573-8dfe-d4497d039628.jpg) (b) The slit plane C \ ( -∞ , 0] Figure 2. The hyperbolic metric in the unit disc and the simplyconnected domains from Proposition 3.4. Red rings all have the same hyperbolic size; their Euclidean sizes shrink proportionally with the distance to the boundary. The images were kindly provided by Vladimir Bulatov ( www.bulatov.org ). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-96addd15-8986-4e94-9cf8-5bd9995f3a21.jpg) Proof. This can easily be verified by explicit computation using Theorem 3.3 (c), using the following conformal isomorphisms: ↦ $$1 - z \,.$$ ↦ ↦ $$\varphi _ { 1 } \colon \mathbb { H } & \to \mathbb { D } ; \quad z \mapsto \frac { 1 - z } { 1 + z } ; \quad & \varphi _ { 2 } \colon S \to \mathbb { H } ; \quad z \mapsto e ^ { \frac { z } { 2 } } ; \\ \varphi _ { 3 } \colon \mathbb { H } & \to \mathbb { C } \, \sum [ 0, \infty ) ; \quad z \mapsto - z ^ { 2 } ; \quad & \varphi _ { 4 } \colon \mathbb { C } \, \sum [ 0, \infty ) \to \mathbb { C } \, \sum ( - \infty, 0 ] ; \quad z \mapsto - z,$$ ↦ where S = { z ∈ C : | Im z | &lt; π } . As an example, we consider the case of ϕ 2 , and leave the remaining calculations to the reader. We have $$\rho _ { S } ( z ) = \rho _ { \mathbb { H } } ( \varphi _ { 2 } ( z ) ) \cdot | \varphi _ { 2 } ^ { \prime } ( z ) | = \frac { | \varphi _ { 2 } ( z ) | } { 2 \, \text{Re} \, \varphi _ { 2 } ( z ) } = \frac { 1 } { 2 \cos ( \arg ( \varphi _ { 2 } ( z ) ) ) } = \frac { 1 } { 2 \cos ( \text{Im} ( z ) / 2 ) }. \quad \text{Me}$$ ## 4. Escaping points and sensitive dependence For the remainder of the article (unless stated otherwise), f will always denote the exponential map ↦ $$f \colon \mathbb { C } \rightarrow \mathbb { C } ; z \mapsto e ^ { z }.$$ We shall now prove the first part of Theorem 1.1, namely that the escaping set $$I ( f ) \coloneqq \{ z \in \mathbb { C } \colon f ^ { n } ( z ) \to \infty \}$$ is dense in the complex plane. The proof that we present here was briefly outlined in a paper of Mihaljevi´-Brandt and the second author [22, Remark on pp. 1583-1584]. c ## 4.1. Theorem (Density of the escaping set) . The set I ( f ) , consisting of those points z 0 whose f -orbits converge to infinity, is a dense subset of the complex plane C . The idea of the proof can be outlined as follows. Let D ⊂ C be any small round disc. Since R ⊂ I ( f ), and any preimage of an escaping point is also escaping, there is nothing to prove if U contains a point z whose orbit contains a point on the real axis. n Otherwise, D f D , ( ) and all forward images f ( D ) are contained in the slit plane $$U \coloneqq \mathbb { C } \, \sum [ 0, \infty ).$$ Note that this set U is backward invariant under f ; i.e., f -1 ( U ) ⊆ U . It follows that every branch L of the logarithm on U is a holomorphic map L : U → U , and hence locally contracts the hyperbolic metric of U , as discussed in the previous section. Moreover, if D ∩ I ( f ) = ∅ , then the sequence of domains f n ( D ) necessarily has at least one finite accumulation point. Using the geometry of U , we shall see that this implies that the map f expands the hyperbolic metric by a definite factor infinitely often along the orbit of D . On the other hand, the hyperbolic derivative of f n with respect to U remains bounded as n →∞ by Pick's theorem. This yields the desired contradiction. From this summary of the proof, it is clear that understanding the expansion of the hyperbolic metric of U by f plays a key role in the argument. In the following lemma, we investigate where this expansion takes place. ## 4.2. Lemma (The exponential map expands the hyperbolic metric) . The complex exponential map f locally expands the hyperbolic metric on the domain U . . = C \ [0 , ∞ ) . That is, ‖ D ( ) f ζ ‖ U U &gt; 1 for all ζ ∈ f -1 ( U ) . Moreover, suppose that ζ n ∈ f -1 ( U ) is a sequence with ‖ D ( f ζ n ) ‖ U U → 1 as n → ∞ . Then min ( | ζ n | , Arg( ζ n ) ) → 0 as n →∞ . Proof. We shall give two justifications of this result. One is more conceptual and uses facts about the hyperbolic metric that were discussed, though not necessarily explicitly proved, in the previous section. The second is a completely elementary calculation; however, it hides some of the intuition. To give the first argument, let S be a connected component of the set $$V \coloneqq f ^ { - 1 } ( U ) = \{ a + i b \colon \frac { b } { 2 \pi } \notin \mathbb { Z } \} \subset U.$$ Then S is a strip of height 2 π , and f : S → U is a conformal isomorphism. Let ζ ∈ S and set ω . . = f ( ζ ) ∈ U . By Pick's theorem, f | S is a hyperbolic isometry between S and U , and hence $$\| D f ( \zeta ) \| _ { U } ^ { U } = \| D f ( \zeta ) \| _ { S } ^ { U } \cdot \frac { \rho _ { S } ( \zeta ) } { \rho _ { U } ( \zeta ) } = \frac { \rho _ { S } ( \zeta ) } { \rho _ { U } ( \zeta ) } > 1.$$ Recall that the density at z of the hyperbolic metric in a simply connected domain G is comparable to 1 / dist( z, ∂G ). (For U and S , this can be verified explicitly, using Proposition 3.4.) We apply this fact twice: Notice first that every point in the strip S has distance at most π from the boundary, and hence ρ S is bounded from below by a positive constant. So if ζ n is a sequence as in the claim, then, using the same fact for ρ U , the distance dist( ζ n , [0 , ∞ )) = dist( ζ n , ∂U ) ≤ const /ρ U ( ζ n ) remains bounded as n →∞ . Also, by (4.1), ζ n does not accumulate at any point of U . A sequence of points converging to ∞ while remaining within a bounded distance from the positive real axis must have arguments tending to 0, and a point that is close to a finite point of ∂U either has argument close to 0 or is close to 0 itself. So min ( | ζ n | , Arg( ζ n ) ) → 0, as claimed. On the other hand, the claims can be verified directly from the formulae. Indeed, let us write ζ = re iϑ with ϑ ∈ (0 , 2 π ); then $$\omega = f ( \zeta ) = e ^ { r e ^ { i \vartheta } } = e ^ { r ( \cos \vartheta + i \sin \vartheta ) }.$$ Now we compute the hyperbolic derivative directly, using Proposition 3.4: $$\| D f ( \zeta ) \| _ { U } ^ { U } = | f ^ { \prime } ( \zeta ) | \cdot \frac { 2 | \zeta | \cdot \sin ( \frac { 1 } { 2 } \arg ( \zeta ) ) } { 2 | e ^ { \zeta } | \cdot \sin ( \frac { 1 } { 2 } \arg ( e ^ { \zeta } ) ) } = \frac { r \cdot \sin ( \vartheta / 2 ) } { \sin ( \frac { 1 } { 2 } \arg ( e ^ { \zeta } ) ) },$$ where arg( ζ ) and arg( e ζ ) are chosen in the range (0 2 , π ). To further simplify this expression, observe that arg( e ζ ) ≡ r · sin( ϑ ) (mod 2 π ). Since | sin | is π -periodic, we hence see that | sin(arg( e ζ ) / 2) | = sin( r sin( ϑ / ) 2). Furthermore, | sin( x ) | ≤ | x | for all x ∈ R , so $$\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \\ ( 4. 2 ) & \quad \| D f ( \zeta ) \| _ { U } ^ { U } & = \frac { r \cdot \sin ( \vartheta / 2 ) } { | \sin ( \frac { r } { 2 } \cdot \sin \vartheta ) | } \geq \frac { r \cdot \sin ( \vartheta / 2 ) } { \frac { r } { 2 } \cdot | \sin \vartheta | } \\ & = \frac { 2 \cdot \sin ( \vartheta / 2 ) } { | \sin \vartheta | } = \frac { 1 } { | \cos ( \vartheta / 2 ) | } > 1. \\ / \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cdot \pi \cd�$$ (In the final equality, we used the trigonometric formula sin(2 x ) = 2 sin( x ) cos( x ).) If ζ n is such that ‖ D ( f ζ n ) ‖ U U → 1, then (4.2) implies | cos( ϑ / n 2) | → 1, where ϑ = arg( ζ n ), and hence Arg( ζ n ) → 0 . glyph[squaresolid] Remark. Observe that the second argument yields the stronger conclusion Arg( ζ n ) → 0. In fact, a slightly more careful look at the estimates shows that ‖ D ( f ζ n ) ‖ U U → 1 if and only if Arg( ζ n ) → 0 and Im ζ n → 0 (see Exercise 8.5). However, this will not be required in the proofs that follow. glyph[negationslash] Proof of Theorem 4.1. Let w 0 ∈ C be arbitrary, and consider its orbit ( w n n ) ≥ 0 , i.e. w n = f n ( w 0 ). Let D be a arbitrary disc around w 0 ; it is enough to show that f n ( D ) ∩ I ( f ) = ∅ for some n . So assume, by contradiction, that f n ( D ) ∩ I ( f ) = ∅ for all n . Since [0 , ∞ ⊂ ) I ( f ), we then have $$D _ { n } \coloneqq f ^ { n } ( D ) \subset U = \mathbb { C } \, \sum [ 0, \infty ) \quad \text{for all } n \geq 0.$$ By Pick's theorem 3.3, the hyperbolic derivative of f n , as a map from D to U , satisfies $$\delta _ { n } \coloneqq \| { \mathrm D } f ^ { n } ( w _ { 0 } ) \| _ { D } ^ { U } = | ( f ^ { n } ) ^ { \prime } ( w _ { 0 } ) | \cdot \frac { \rho _ { U } ( w _ { n } ) } { \rho _ { D } ( w _ { 0 } ) } \leq 1.$$ Set η n . . = ‖ D ( f w n ) ‖ U U ; then δ n +1 = δ n · η n for all n ≥ 0. By Lemma 4.2, we know that η n &gt; 1. Hence, for the sequence δ n to remain bounded, we must necessarily have η n → 1. Indeed, ( δ n n ) ≥ 1 is an increasing and bounded, and hence convergent, sequence. Thus $$\lim _ { n \to \infty } \eta _ { n } = \lim _ { n \to \infty } \frac { \delta _ { n + 1 } } { \delta _ { n } } = \frac { \lim _ { n \to \infty } \delta _ { n + 1 } } { \lim _ { n \to \infty } \delta _ { n } } = 1.$$ By Lemma 4.2, we see that $$\min \left ( | w _ { n } |, \text{Arg} ( w _ { n } ) \right ) \to 0,$$ and hence all finite accumulation points of ( w n ) must lie in the interval [0 , ∞ ). Since w 0 is not in the escaping set, the set of such finite accumulation points is nonempty. As this set is closed, we can let z 0 ∈ [0 , ∞ ) be the smallest finite accumulation point of the sequence ( w n ); say w n k → z 0 . Notice that Re w n k -1 = log | w n k | → log z 0 &lt; z 0 . By choice of z 0 , the sequence w n k -1 cannot have a finite accumulation point, and hence | Im w n k -1 | →∞ . This contradicts (4.3), and we are done. glyph[squaresolid] The proof leaves open the possibility that the escaping set has nonempty interior (or even, a priori, that I ( f ) = C ). We shall now exclude this possibility, which then allows us to establish sensitive dependence on initial conditions. ## 4.3. Theorem (Preimages of the negative real axis) . glyph[negationslash] Let W ⊂ C be open and nonempty. Then there are infinitely many numbers n ≥ 0 such that f n ( W ) ∩ -∞ ( , 0] = ∅ . Remark. This will also follow from the (stronger) results in the next section, but the proof we give here relies on the same ideas as that of Theorem 4.1, which gives the argument a nice symmetry. Proof. Let D ⊂ W be an open disc. We shall first prove that there is at least one n such that f n ( D ) intersects the negative real axis. So assume, by contradiction, that $$f ^ { n } ( D ) \subset \tilde { U } \coloneqq \mathbb { C } \, \sum \left ( - \infty, 0 \right ]$$ for all n ≥ 0. By Theorem 4.1, there is a point w 0 ∈ D ∩ I ( f ). We proceed similarly as in the proof of Theorem 4.1, but now use the the hyperbolic metric of ˜ . U The set ˜ U . . = C \ ( -∞ , 0] is not backward invariant, hence f is not locally expanding at every point of ˜ . U However, there is expansion - even strong expansion at points with sufficiently large real parts: $$C l a i m. \text{ If } \zeta \in f ^ { - 1 } ( \tilde { U } ) \text{ and } \text{Re} \, \zeta \geq 2, \text{ then}$$ $$\Phi _ { \quad } ^ { \prime } \| D f ( \zeta ) \| _ { \tilde { U } } ^ { \tilde { U } } \geq \sqrt { 2 }.$$ Proof. This follows by a similar calculation as in the proof of Lemma 4.2: if we write ζ = re iϑ with ϑ ∈ -( π/ , π/ 2 2), then f ( ζ ) = e re iϑ = e r (cos ϑ + sin i ϑ ) , and $$\| D f ( \zeta ) \| _ { \tilde { U } } ^ { \tilde { U } } = | f ^ { \prime } ( \zeta ) | \cdot \frac { 2 | \zeta | \cdot | \cos \left ( \frac { 1 } { 2 } \, \text{Arg} ( \zeta ) \right ) | } { 2 | e ^ { \zeta } | \cdot | \cos \left ( \frac { 1 } { 2 } \, \text{Arg} ( e ^ { \zeta } ) \right ) | }$$ $$= \frac { r \cdot \cos ( \vartheta / 2 ) } { | \cos ( \frac { 1 } { 2 } \, \text{Arg} ( e ^ { \varsigma } ) ) | } \geq r \cdot \cos ( \vartheta / 2 ) \geq r \cdot \frac { \sqrt { 2 } } { 2 } \geq \sqrt { 2 }.$$ $$\| D f ( \zeta ) \| _ { \tilde { U } } ^ { \tilde { U } } & = | f ^ { \prime } ( \zeta ) | \cdot \frac { 2 | \zeta | \cdot | \cos \left ( \frac { 1 } { 2 } \, \arg \left ( \zeta \right ) \right ) | } { 2 | e ^ { \zeta } | \cdot | \cos \left ( \frac { 1 } { 2 } \, \arg ( e ^ { \zeta } ) \right ) | } \\ & \quad r \cdot \cos ( \frac { 9 } { 2 } / 2 )$$ Now the proof proceeds along the same lines as before. Set w n . . = f n ( w 0 ) and D n . . = f n ( D ) for n ≥ 0. Since f n : D → ˜ U is a holomorphic map, we again have $$\delta _ { n } \coloneqq \| D f ^ { n } ( w _ { 0 } ) \| _ { D } ^ { \tilde { U } } \leq 1$$ for all n by Pick's Theorem. The numbers η n . . = ‖ D ( f w n ) ‖ ˜ U ˜ U = δ n +1 δ n need not be bounded below by 1. However, since w 0 ∈ I ( f ), there is n 0 such that Re w n ≥ 2 for n ≥ n 0 , and hence $$\delta _ { n } = \delta _ { n _ { 0 } } \cdot \| D f ^ { n - n _ { 0 } } ( w _ { n _ { 0 } } ) \| _ { \tilde { U } } ^ { \tilde { U } } \geq \delta _ { n _ { 0 } } \cdot 2 ^ { ( n - n _ { 0 } ) / 2 } \to \infty.$$ This is a contradiction. glyph[negationslash] So f n ( W ) ∩ -∞ ( , 0] = ∅ for some n . To see that there are infinitely many such n , set k 0 = n , and apply the result to f k 0 +1 ( W ) to find some k 1 &gt; k 0 with f k 1 ( W ) ∩ -∞ ( , 0] = ∅ . Proceeding inductively, we find an infinite sequence ( k j ) with the desired property. glyph[squaresolid] glyph[negationslash] ## 4.4. Corollary (Sensitive dependence) . The exponential map f : C → C has sensitive dependence on initial conditions with respect to spherical distance. Proof. We shall prove that f satisfies Definition 2.3 with R = 1 and δ = 1. Indeed, let U ⊂ C be open. Then, by Theorem 4.1, U contains an escaping point w , and there is some n 0 such that | f n ( w ) | ≥ 2 for all n ≥ n 0 . By Theorem 4.3, there is n 1 &gt; n 0 and some point z ∈ D such that f n 1 ( z ) ∈ ( -∞ , 0]. Hence, for n . . = n 1 + 1, we have | f n ( z ) | ≤ 1 = R and | f n ( w ) -f n ( z ) | ≥ | f n ( w ) | - | f n ( z ) | ≥ 1 = δ , as desired. glyph[squaresolid] ## 5. Transitivity and dense orbits Recall that topological transitivity , one of the properties required in the definition of chaos, means that we can move between any two nonempty open subsets of the complex plane by means of the iterates of f . The goal of this section is to establish transitivity, and deduce that there are also points with dense orbits. ## 5.1. Theorem (Topological transitivity) . glyph[negationslash] If U , V are nonempty and open, then there exists n ≥ 0 such that f n ( U ) ⋂ V = ∅ . We shall use the fact, established in the previous section, that the escaping set is dense in the plane. The key point is that f is strongly expanding along the orbit of any escaping point z 0 . Hence, for sufficiently large n f , n maps a small disc around z 0 to a set that contains a disc of radius 2 π centred at f n ( z 0 ). By elementary mapping properties of the exponential map, the latter disc is spread, after two more applications of f , over a large part of the complex plane. This establishes topological transitivity. We now provide the details of this argument. Let us begin with a simple observation. ## 5.2. Observation (Expansion along escaping orbits) . Let z 0 ∈ I ( f ) , and set z n . . = f n ( z 0 ) for n ≥ 1 . Then Re z n →∞ and | ( f n ) ( ′ z 0 ) | →∞ as n →∞ . Proof. Since z n +1 = e z n for all n ≥ 0, we have $$\text{Re} \, z _ { n } = \log | z _ { n + 1 } | \to \infty$$ by definition of I ( f ). Furthermore, | f ′ ( z n ) | = | f ( z n ) | = | z n +1 | → ∞ , and hence there is N ∈ N such that | f ′ ( z n ) | ≥ 2 for all n ≥ N . For m &gt; N , we can use the chain rule to compute the derivative of f m = f ◦ f ◦ · · · ◦ f ◦ f N : $$| ( f ^ { m } ) ^ { \prime } ( z _ { 0 } ) | = \left | \left ( f ^ { N } \right ) ^ { \prime } ( z _ { 0 } ) \right | \cdot \prod _ { n = N } ^ { m - 1 } | f ^ { \prime } ( z _ { n } ) | \geq 2 ^ { m - N } \cdot \left | \left ( f ^ { N } \right ) ^ { \prime } ( z _ { 0 } ) \right | \to \infty$$ glyph[negationslash] as m →∞ . Here we used the fact that | ( f N ) ( ′ z 0 ) | = 0, since f ′ ( z ) = 0 for all z ∈ C . glyph[squaresolid] glyph[negationslash] We next prove the above-mentioned fact concerning the iterated images of small discs around escaping points. ## 5.3. Proposition (Small discs blow up) . Let z 0 ∈ I ( f ) . For n ≥ 1 , set z n . . = f n ( z 0 ) and consider the disc D n of radius 2 π centred at z n ; i.e. D n . . = D 2 π ( z n ) . Then there are n 0 ∈ N and a sequence ( ϕ n n ) ≥ n 0 of holomorphic maps ϕ n : D n → C with the following properties: - (a) ϕ n ( z n ) = z 0 , - (b) f n ( ϕ n ( z )) = z for all z ∈ D n , - (c) sup z ∈ D n | ϕ ′ n ( z ) | → 0 as n →∞ , and - (d) diam( ϕ D ( n )) → 0 as n →∞ . (That is, for large n there is a branch ϕ n of f -n that takes z n back to z 0 and is uniformly strongly contracting.) Proof. Observe that (c) implies (d). Indeed, for z ∈ D n , $$| \varphi _ { n } ( z ) - \varphi _ { n } ( z _ { n } ) | \leq | z - z _ { 0 } | \cdot \sup _ { \zeta \in D _ { n } } | \varphi _ { n } ^ { \prime } ( \zeta ) | \leq 2 \pi \sup _ { \zeta \in D _ { n } } | \varphi _ { n } ^ { \prime } ( \zeta ) |$$ by the mean value inequality. Hence by (c), $$\text{diam} ( \varphi ( D _ { n } ) ) \leq 4 \pi \sup _ { \zeta \in D _ { n } } | \varphi ^ { \prime } _ { n } ( \zeta ) | \to 0 \quad \text{ as } n \to \infty.$$ To prove the proposition, first assume additionally that | z n | ≥ 2 π +2 for all n ≥ 1. In this case, none of the discs D n contain the origin. For each n ≥ 1, let L n : D n → C be the branch of the logarithm with L n ( z n ) = L n ( e z n -1 ) = z n -1 . What can we say about the range of this map L n ? Since | z n | ≥ 2 π + 2 for all n ≥ 1, we have | z | ≥ 2 for all z ∈ D n , and hence $$| L _ { n } ^ { \prime } ( z ) | = 1 / | z | \leq 1 / 2.$$ Again using the mean value inequality, we see that $$| L _ { n } ( z ) - z _ { n - 1 } | = | L _ { n } ( z ) - L ( z _ { n } ) | \leq \sup _ { \zeta \in D _ { n } } | L ^ { \prime } ( \zeta ) | \cdot \pi$$ for each n and all z ∈ D n . In particular, and importantly, L n ( D n ) ⊂ D n -1 . It follows by induction that the composition ϕ n . . = L 1 ◦ L 2 ◦ · · · ◦ L n is defined on D n , with | ϕ ′ n ( z ) | ≤ 2 -n for z ∈ D n . Hence ϕ n satisfies (c), and (a) and (b) hold by construction. This completes the proof when | z n | ≥ 2 π +2 for all n ≥ 1. If this is not the case, then - since z 0 is an escaping point - there still exists n 1 such that | z n | ≥ 2 π +2 for all n &gt; n 1 . We can thus apply the preceding case to the point z N . This means that, for every n &gt; n 1 , there is a holomorphic map ψ n : D n → D n 1 such that - (a) ψ n ( z n ) = z m , - (b) f n -n 1 ( ψ n ( z )) = z for all z ∈ D n , - (c) sup z ∈ D n | ( ψ n ) ( ′ z ) | → 0 as n →∞ , and - (d) diam( ψ n ( D n )) → 0 as n →∞ . glyph[negationslash] By the inverse function theorem, there exists a neighbourhood U of z n 1 and a branch π : U → C of f -n 1 mapping z n 1 to z 0 . (This also follows from repeated applications of suitable branches of the logarithm. Observe that z n = f ( z n -1 ) = 0 for n ≥ 1.) Now let K be a small closed disc around z n 1 with K ⊂ U . By (d), we have ψ n ( D n ) ⊂ K for sufficiently large n - say, for n ≥ n 0 . Hence we can define $$\varphi _ { n } \colon D _ { n } \to \mathbb { C } ; \ \ \varphi _ { n } ( z ) \coloneqq \pi ( \psi _ { n } ( z ) ).$$ This map satisfies (a) and (b) by definition, and $$\sup _ { z \in D _ { n } } | \varphi _ { n } ^ { \prime } ( z ) | = \sup _ { z \in D _ { n } } \left ( | \psi _ { n } ^ { \prime } ( z ) | \cdot | \pi ^ { \prime } ( \psi _ { n } ( z ) ) | \right ) \leq \max _ { z \in D _ { n } } | \psi _ { n } ^ { \prime } ( z ) | \cdot \sup _ { w \in K } | \pi ^ { \prime } ( w ) | \to 0$$ by property (c)) of ψ n . (Since K is compact, the continuous function | π ′ | assumes its maximum on K , which is independent of n .) glyph[squaresolid] As mentioned above, after two additional iterates the discs in the preceding Proposition will cover a large portion of the plane, as long they lie far enough to the right: ## 5.4. Observation (Images of large discs) . Let K be any nonempty compact subset of the punctured plane C \ { 0 } . Then there is ρ &gt; 0 with the following property. Suppose that D is a disc of radius 2 π , centred at a point having real part at least ρ . Then K ⊂ f 2 ( D ) . Proof. The disc D contains a closed square of side-length 2 π , also centred at ζ . Let a = Re ζ -π be the real part of the left vertical edge of S , then a +2 π = Re ζ + π is the real part of the right vertical edge of S . What is the image of S under f ? Looking back at Figure 1, we see that it is precisely a closed round annulus A around the origin, with inner radius r -= e a and outer radius r + = e a +2 π . If a is sufficiently large, then A is a rather thick annulus with large inner radius. It follows that A contains a long rectangular strip of height 2 π , and the image of this strip will cover most of the complex plane, including the compact set K . More precisely, suppose that a ≥ 0; then r + -r -≥ e 2 π &gt; 2 π . Hence we can fit a maximal rectangle R of height 2 π into A , symmetrically with respect to the imaginary axis and tangential to the inner boundary circle of A . (See Figure 3.) Figure 3. In the proof of Observation 5.4, the square S is mapped to a large annulus A . The rectangle R shown in A maps to an annulus of huge outer radius and tiny inner radius, containing the compact set K . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-2408ff3a-9ba2-49c8-8d64-8b6c01653d42.jpg) Let glyph[lscript] be the maximal real part of R (i.e., glyph[lscript] is half the horizontal side-length of R ). We can compute glyph[lscript] using the Pythagorean Theorem: $$\ell ^ { 2 } = r _ { + } ^ { 2 } - ( r _ { - } + 2 \pi ) ^ { 2 } > r _ { + } ^ { 2 } - 4 r _ { - } ^ { 2 } = ( e ^ { 4 \pi } - 4 ) \cdot e ^ { 2 a } > e ^ { 2 a },$$ provided that r -≥ 2 π . Hence we see that glyph[lscript] &gt; e a , and the image of R includes all points of modulus between e -glyph[lscript] and e glyph[lscript] . In particular, we can set $$\rho \coloneqq 3 \pi + \max _ { z \in K } \left | \log | z | \right |.$$ If Re ζ ≥ ρ , then we have a ≥ 2 π , and glyph[lscript] &gt; e &gt; a &gt; log | z | . a ∣ ∣ ∣ ∣ The claim follows. glyph[squaresolid] As a consequence, we obtain the following stronger version of Theorem 5.1. 5.5. Corollary (Open sets spread everywhere) . Let K ⊂ C \ { 0 } be compact, and let U ⊂ C be open and nonempty. Then there is some N ∈ N such that K ⊂ f n ( U ) for all n ≥ N . Remark. To deduce the original statement of Theorem 5.1, simply choose K to consist of a single point in V . Proof. Since the escaping set is dense in the plane, there exists some z 0 ∈ I ( f ) ∩ U . Set z n . . = f n ( z 0 ) for n ≥ 1, and let D n . . = D 2 π ( z n ), n 0 and ϕ n be as in Proposition 5.3. Also let ρ be the number from Observation 5.4 (for the same set K ). Since z 0 is an escaping point, and by part ((d)) of Proposition 5.3, we can choose N 1 ≥ n 0 such that Re z n ≥ ρ and ϕ n ( D n ) ⊂ U for all n ≥ N 1 . Let n ≥ N 1 . Then $$f ^ { n + 2 } ( U ) \supset f ^ { n + 2 } ( \varphi _ { n } ( D _ { n } ) ) = f ^ { 2 } ( f ^ { n } ( \varphi _ { n } ( D _ { n } ) ) ) = f ^ { 2 } ( D _ { n } ) \supset K$$ by Observation 5.4. Hence the claim holds with N . . = N 1 +2. glyph[squaresolid] The existence of dense orbits is closely related, and often equivalent, to that of topological transitivity. Indeed, we can deduce the former from Theorem 5.1, by using the Baire category theorem [28, Exercise 16 in Chapter 2]. This theorem implies that any countable intersections of open and dense subsets of the complex plane is itself dense and uncountable. ## 5.6. Corollary (Dense orbits) . The set T of all points z 0 ∈ C with dense orbits under the exponential map is uncountable and dense in C . Proof. Let D ⊂ C be any non-empty open set. By Theorem 5.1, the inverse orbit $$\mathcal { O } ^ { - } ( D ) \coloneqq \bigcup _ { n \geq 0 } f ^ { - n } ( D )$$ is a dense subset of C . Note that O -( D ) is also open, as a union of open subsets. Now consider the countable collection $$\mathcal { D } \coloneqq \{ D _ { r } ( z ) \colon \text{Re} \, z, \text{Im} \, z, r \in \mathbb { Q } \}$$ of open discs with rational centres and radii. Clearly z 0 ∈ T if and only if the orbit of z 0 enters every element of D at least once, i.e. $$\mathcal { T } = \bigcap _ { D \in \mathcal { D } } \mathcal { O } ^ { - } ( D ).$$ Hence T is indeed uncountable and dense, as a countable intersection of open and dense subsets of C . glyph[squaresolid] ## 6. Density of periodic points glyph[negationslash] We are now ready to complete the proof that the exponential map is chaotic, by proving density of the set of periodic points. In fact, we shall prove slightly more, namely that repelling periodic points of f are dense in the plane. Here a periodic point p , with f n ( p ) = p , is called repelling if | ( f n ) ( ′ p ) | &gt; 1. This ensures that any point z = p close to p is (initially) 'repelled' away from the orbit of p - density of such points gives another indication that the dynamics of the exponential map is highly unstable! (It is, however, not difficult to show directly that all periodic points of f are repelling; see Exercise 8.8.) ## 6.1. Theorem (Density of repelling periodic points) . Let U ⊂ C be open and nonempty. Then there exists a repelling periodic point p ∈ U . The idea of the proof is, again, to begin with an escaping point z 0 . Our goal is to find an inverse branch of an iterate of f that maps a neighbourhood of z 0 back into itself, with strong contraction. Then the existence of a periodic point follows from the contraction mapping theorem [9, Theorem 3.6] (also known as the Banach fixed point theorem ). We noticed already in the last section that the disc D n of radius 2 π around the n -th orbit point z n can be pulled back along the orbit in one-to-one fashion (Proposition 5.3). We need to be able to 'close the loop', by pulling back a small disc around z 0 into D n . In other words, we are looking for a more precise version of Observation 5.4, as follows. ## 6.2. Lemma (Inverse branches of f 2 ) . Let z 0 ∈ C \ { 0 } . Then there are a disc ∆ centered at z 0 and a number ρ ≥ 0 with the following property: For any disc D of radius 2 π centred at a point with real part at least ρ , there is ϕ : ∆ → D such that f 2 ( ϕ z ( )) = z and | ϕ z ′ ( ) | ≤ 1 for all z ∈ ∆ . Figure 4. This is an illustration of the proof of Lemma 6.2. Shown are the first and second preimage component of the disc ∆ = D 3 2 (3). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1129v2-figure-bdb9df23-385f-460e-9ed2-883ef3026cb7.jpg) Remark. In other words, there exists a disc ∆ around z 0 that is not only covered by f 2 ( D ) (as we know it must be from Observation 5.4), but on which we can even define a branch of f -2 that takes it back into D . It is not difficult to extend the result, with a similar proof, to see that this is true for any disc ∆ - and indeed any simply-connected domain - whose closure is bounded away from 0 and ∞ . glyph[negationslash] Proof. Set ε . . = | z 0 | 2 and ∆ . . = D z ε ( 0 ). For any n ∈ Z , there is a branch L n of the logarithm on ∆ whose values have imaginary parts between Arg z 0 + (2 n -1) π and Arg z 0 +(2 n +1) π ). Each L n is continuous on ∆ and satisfies f ( L n ( z )) = z for all z ∈ ∆. Consider the sets V n . . = L n (∆), with n ∈ Z ; then V n = V 0 + 2 πin . So the V n form a linear sequence of domains of uniformly bounded diameter, tending to infinity in the direction of the positive and negative imaginary axes. Consider all preimage components of some V n under f , for n = 0 (since V 0 might contain the origin). On each of these, we can define a branch of f -2 taking values in ∆ - hence we should show that any disc D of radius 2 π contains at least one such component, provided that its centre lies sufficiently far to the right. This should be clear from the mapping behaviour of the exponential map (Figure 1). Indeed, for every odd multiple of π/ 2, there is a sequence of sets in question whose imaginary parts tend to this value, and having real parts closer and closer together (see Figure 4). More formally, consider the points w n . . = L n ( z 0 ) ∈ V n . Set ρ 1 . . = | w 0 | +3 and let D be a disc of radius 2 π centred at a point ζ with Re ζ ≥ ρ 1 . Since w n = w 0 +2 πin , we can find n 0 ≥ 1 such that $$| e ^ { \zeta } | - \pi \leq | w _ { n _ { 0 } } | \leq | e ^ { \zeta } | + \pi.$$ Furthermore, choose m such that | Im ζ -(4 m +1) π/ 2 | ≤ π , and let ψ be the branch of the logarithm mapping the upper half-plane to the strip { z ∈ C : 2 mπ &lt; Im z &lt; (2 m +1) π } . Let w ∈ V n 0 . Then | Im ψ w ( ) -Im ζ | ≤ 3 π/ 2 by choice of ψ . Furthermore, by definition of ∆ and L n , we have $$| \text{Re} \, w - \text{Re} \, w _ { n _ { 0 } } | = \left | \log \frac { | w | } { | w _ { n _ { 0 } } | } \right | \leq \log 2.$$ By (6.1), we conclude that $$| e ^ { \zeta } | - 2 \pi - \log 2 \leq | w | \leq | e ^ { \zeta } | + 2 \pi + \log 2.$$ Dividing by | e ζ | , and recalling that Re ζ ≥ ρ 1 &gt; 3 &gt; log 5 π , we see that $$\frac { 1 } { 2 } < 1 - \frac { 2 \pi + \log 2 } { | e ^ { \zeta } | } < \frac { | w | } { | e ^ { \zeta } | } < 1 + \frac { 2 \pi + \log 2 } { | e ^ { \zeta } | } < 2.$$ Hence Thus $$| w - \zeta | < 3 \pi / 2 + \log 2 < 2 \pi,$$ and hence ψ V ( n ) ⊂ D . Hence the branch ϕ . . = ψ ◦ ϕ n indeed maps ∆ into D . Moreover, $$\varphi _ { n } ^ { \prime } ( z ) = \frac { 1 } { | z | } \leq \frac { 2 } { | z _ { 0 } | }$$ for all z ∈ ∆, while $$| \psi ^ { \prime } ( z ) | = \frac { 1 } { | z | } \leq \frac { 2 } { e ^ { \zeta } }$$ on V n . Hence, if we choose ρ . . = max( ρ , 1 log 4 -log | z 0 | ), then | ϕ z ′ ( ) | ≤ 1 for all z ∈ ∆, as required. glyph[squaresolid] Proof of Theorem 6.1. Let U ⊂ C be open and nonempty. By Theorem 4.1, there is an escaping point z 0 ∈ U \ { 0 } . Choose a disc ∆ around z 0 and ρ &gt; 0 and as in Lemma 6.2. By shrinking ∆, if necessary, we may suppose that ∆ ⊂ U . Let ∆ 1 be a smaller disc also centred at z 0 . so that ∆ 1 ⊂ ∆. As in Section 5, set z n . . = f n ( z 0 ) and D n . . = D 2 π ( z n ). Let ( ϕ n n ) ≥ n 0 be the inverse branches from Proposition 5.3. By conclusions (d) and (c) of that Proposition, we may assume that n 0 is large enough to ensure that ϕ n ( z ) ∈ ∆ and 1 | ϕ ′ n ( z ) | ≤ 1 / 2 for all z ∈ D n . Since z 0 is an escaping point, there is N ≥ n 0 such that Re z n ≥ ρ for all n ≥ N . By Lemma 6.2, there is thus a branch ψ n of f -2 that maps ∆ into D n , with | ψ ′ n ( z ) | ≤ 1 for all z ∈ ∆. It follows that ϕ n ( ψ n (∆ )) 1 ⊂ ϕ n ( D n ) ⊂ ∆ , and that 1 ϕ n ◦ ψ n : ∆ 1 → ∆ is a contrac1 tion map. As ∆ 1 is compact, and hence complete, this function has a fixed point p ∈ ∆ by the contraction mapping theorem. By construction, $$\dots \, \smile \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, \\ f ^ { n + 2 } ( p ) & = f ^ { 2 } ( f ^ { n } ( \varphi _ { n } ( \psi _ { n } ( p ) ) ) ) = f ^ { 2 } ( \psi _ { n } ( p ) ) = p \quad \text{ and } \\ | ( f ^ { n + 2 } ) ^ { \prime } ( p ) | & = \frac { 1 } { | \psi _ { n } ^ { \prime } ( p ) | \cdot | \varphi _ { n } ^ { \prime } ( \psi _ { n } ( p ) ) | } \geq 2. \\ \cdot \, \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \cdot \, & \end{cases}$$ Hence p is indeed a repelling periodic point of f , as required. glyph[squaresolid] $$| \, \text{Re} \, \psi ( w ) - \text{Re} \, \zeta | = | \log | w | - \text{Re} \, \zeta | = \left | \log \frac { | w | } { | e ^ { \zeta } | } \right | < \log 2.$$ ## 7. Further results and open problems The realization that the exponential map f acts chaotically on the complex plane is not the end of the story. Rather, it leads to further questions about the qualitative behaviour of f , and much research has been done since Misiurewicz's work. The picture is still far from complete, and several interesting questions remain open. Here, we restrict to a small selection of results and ideas, referring to the literature for further information. The escaping set of the exponential. The escaping set I ( f ) of the exponential map played an important role in our proof of Theorems 1.1 and 1.2. We saw in Theorem 4.1 that this set is dense in the plane, and hence it is plausible that a thorough study of its fine structure will yield information also about the non-escaping part of the dynamics. We already saw that I ( f ) contains the real axis together with all of its preimages under iterates of f - but there are many other escaping points! Indeed, Devaney and Krych [13] observed the existence of uncountably many different curves to infinity in I ( f ), most of which do not reach the real axis under iteration. Later, Schleicher and Zimmer [29] were able to show that every point of I ( f ) can be connected to infinity by a curve in I ( f ). Maximal curves in the escaping set are referred to as 'rays' or 'hairs', and they provide a structure that can be exploited in the study of the wider dynamics of f . However, the way in which these rays fit together to form the entire escaping set is rather non-trivial. For example, while each path-connected component of I ( f ) is such a curve, and is relatively closed in I ( f ) (i.e., rays do not accumulate on points that belong to other rays) the escaping set nonetheless turns out to be a connected subset of the plane [27]. Furthermore, while many rays end at a unique point in the complex plane, some have been shown to accumulate everywhere upon themselves [12, 26], resulting in a very complicated topological picture. For which rays this can occur, and whether other types of accumulation behaviour are possible, requires further research. Taken together, these results provide some indication that the escaping set is a rather complicated object. In fact, even iterated preimages of the negative real axis (all of which are simple curves tending to infinity in both directions) result in highly nontrivial phenomena and open questions. In 1993, Devaney [11] showed that the closure of a certain natural sequence of such preimages has some 'pathological' topological properties. He also formulated a conjecture concerning the structure of this set and its stability under certain perturbations of the map f , which remains open to this day. Measurable dynamics of the exponential. Corollary 5.6 (and its proof) means that, topologically, 'most' points have a dense orbit. It is natural to ask also about the behaviour of 'most' points with respect to area: If we pick a point z ∈ C at random will its orbit be dense? Lyubich [20] and Rees [25] independently gave an answer in the 1980s: For a random point z ∈ C , the orbit of z is not dense; rather, its set of limit points coincides precisely with the orbit of 0. In other words, after a certain number of steps, the orbit will come very close to 0, and then follow the orbit { 0 1 , , e, e e , . . . } for a finite number of steps. Our point might then spend some additional time close to ∞ , until it maps into the left half-plane. In the next step, it ends up even closer to 0, and so on. We can furthermore also ask about the relative 'sizes' of the sets of points with various other types of behaviour (for example, with respect to fractal dimension ). It again turns out that there is a rich structure from this point of view; see e.g. [21, 30, 19]. Transcendental dynamics. To place the material in this paper in its proper context, let us finally discuss iterating a holomorphic self-map f : C → C of the complex plane in general. To obtain interesting behaviour, we assume that f is non-constant and nonlinear. As before, a key question is how the behaviour of orbits varies under perturbations of the starting point z 0 . To this end, one divides the starting values into two sets: The closed set of points near which there is sensitive dependence on initial conditions is called the Julia set J f ( ), while its complement - where the behaviour is stable - is the Fatou set F f ( ) = C \ J f ( ). (See [7] for formal definitions and further background.) By the magic of complex analysis, the - rather mild - notion of instability used to define the Julia set always leads to globally chaotic dynamics: ## 7.1. Theorem (Chaos on the Julia set) . The Julia set J f ( ) is always uncountably infinite, and f -1 ( J f ( )) = J f ( ) . Furthermore, the function f : J f ( ) → J f ( ) is chaotic in the sense of Devaney. The key part of this theorem is the density of periodic points in the Julia set. That J f ( ) is uncountable and that f is topologically transitive was known already (albeit in different terminology) to Pierre Fatou and (in the case of polynomials) Gaston Julia, who independently founded the area of holomorphic dynamics in the early twentieth century. For polynomials - and indeed for rational functions - the density of periodic points in the Julia set was also established by Fatou and Julia, but it took about half a century until Baker [3] completed the proof for general entire functions. With this general terminology, Misiurewicz's theorem says precisely that F (exp) = ∅ . (We emphasize that there are many entire functions with nonempty Fatou set. As an example, consider f ( z ) . . = ( e z -1) / 4. Then f n ( z ) → 0 for | z | &lt; 1, and hence the entire unit disc is in the Fatou set.) It can be shown that there are only a few possible types of behaviour for points in the Fatou set of an entire function [7, § 4.2]. Using classical methods, most of these can be excluded fairly easily in the case of the exponential map; the difficult part is to show that there can be no wandering domain , i.e. a connected component U of the Fatou set such that f n ( U ) ∩ U = ∅ for all n &gt; 0. Misiurewicz used the specific properties of the exponential function, but more general tools for ruling out the existence of wandering domains have since been developed. The most famous is due to Sullivan, who showed that rational functions never have wandering domains, answering a question left open by Fatou. Sullivan's argument, which uses deep results from complex analysis, can be extended to classes of entire functions containing the exponential map [4, 15, 18]. As mentioned in the introduction, this provides an alternative (though highly non-elementary) method of establishing Misiurewicz's theorem. The study of wandering domains, and when they can occur, continues to be an active topic of research in transcendental dynamics; we refer to [22] for a discussion and references. ## 8. Exercises ## 8.1. Exercise (Topological transitivity and dense orbits) . Let X ⊂ C , and let f : X → X be a continuous function. We say that x 0 ∈ X has a dense orbit if the set of accumulation points of the orbit of x 0 is dense in X . (Note that this differs subtly from the requirement that the orbit of x 0 is dense when thought of as a subset of X . However, the two conditions are equivalent if X has no isolated points.) Prove: if there is a point with a dense orbit under f , then f is topologically transitive. ## 8.2. Exercise (Problems with using Euclidean distance in sensitive dependence) . ↦ Show that the real exponential map f : R → R ; x → e x , exhibits sensitive dependence on initial conditions with respect to Euclidean distance d x, y ( ) = | x - | y . ## 8.3. Exercise (Sensitive dependence for distance functions) . Let f : C → C be continuous and have sensitive dependence with respect to spherical distance. Prove: If d : C × C → [0 , ∞ ) is any distance function that is topologically equivalent to Euclidean distance (i.e., a round open disc around a point z 0 contains some disc around z 0 in the sense of the distance d , and vice versa), then f has sensitive dependence with respect to d . (So sensitive dependence with respect to spherical distance is the strongest such condition we can impose.) Hint. Observe that the possible pairs ( f n ( z , f ) n ( w )) in Definition 2.3 all belong to a closed and bounded subset of C 2 , which depends only on δ and R . Then use the fact that d is continuous as a function of two complex variables (with respect to Euclidean distance). ## 8.4. Exercise (Automorphisms of the disc) . Suppose that f : D → D is a conformal automorphism (i.e. holomorphic and bijective) with f (0) = 0. Conclude, using the Schwarz lemma, that f is a rotation around the origin. Deduce that any conformal automorphism f : D → D is of the form (3.1). ## 8.5. Exercise (Expansion of the exponential map) . Strengthen Lemma 4.2 by showing that ‖ D ( f ζ n ) ‖ U U → 1 if and only if Arg( ζ n ) → 0 and Im ζ n → 0. ( Hint. Use the fact that | sin( x ) | / x | | → 1 if and only if | x | → 0.) ## 8.6. Exercise (Strong hyperbolic expansion for large real parts) . For the domain ˜ U in the proof of Theorem 4.3, show that even ‖ D ( ) f ζ ‖ ˜ U ˜ U →∞ as Re ζ →∞ . (Either use a direct calculation as in the proof of the Claim, or a more conceptual explanation as in the first part of the proof of Lemma 4.2.) ## 8.7. Exercise (Extremely sensitive dependence) . Strengthen Corollary 4.4 by showing that the exponential map satisfies Definition 2.3 for any choice of R,δ &gt; 0. ## 8.8. Exercise (No nonrepelling orbits) . Use Lemma 4.2 to show that all periodic points of the exponential map are repelling. ( Hint. Observe that, at a periodic point of period n , the hyperbolic derivative of f n agrees precisely with the usual (Euclidean) derivative.) ## References - [1] L. V. Ahlfors, Complex analysis , third ed., McGraw-Hill Book Co., New York, 1978, International Series in Pure and Applied Mathematics. - [2] J. W. Anderson, Hyperbolic geometry , second ed., Springer Undergraduate Mathematics Series, Springer-Verlag London, Ltd., London, 2005. - [3] I. N. Baker, Repulsive fixpoints of entire functions , Math. Z. 104 (1968), 252-256. - [4] I. N. Baker and P. J. Rippon, Iteration of exponential functions , Ann. Acad. Sci. Fenn. Ser. A I Math. 9 (1984), 49-77. - [5] J. Banks, J. Brooks, G. Cairns, G. Davis, and P. Stacey, On Devaney's definition of chaos , Amer. Math. Monthly 99 (1992), no. 4, 332-334. - [6] A.F. Beardon and D. Minda, The hyperbolic metric and geometric function theory , Quasiconformal Mappings and Their Applications (2007), 10-56. - [7] W. Bergweiler, Iteration of meromorphic functions , Bull. Amer. Math. Soc. (N.S.) 29 (1993), no. 2, 151-188. - [8] W. Bergweiler, M. Haruta, H. Kriete, H.-G. Meier, and N. Terglane, On the limit functions of iterates in wandering domains , Ann. Acad. Sci. Fenn. Ser. A I Math. 18 (1993), no. 2, 369-375. - [9] J. C. Burkill and H. Burkill, A second course in mathematical analysis , Cambridge University Press, Cambridge-New York, 1980. - [10] R. L. Devaney, An introduction to chaotic dynamical systems , 2nd ed., Addison-Wesley Publishing Company, Inc., 1989. - [11] , Knaster-like continua and complex dynamics , Ergodic Theory Dynam. Systems 13 (1993), no. 4, 627-634. - [12] R. L. Devaney and X. Jarque, Indecomposable continua in exponential dynamics , Conform. Geom. Dyn. 6 (2002), 1-12 (electronic). - [13] R. L. Devaney and M. Krych, Dynamics of exp( z ), Ergodic Theory Dynam. Systems 4 (1984), no. 1, 35-52. - [14] A. E. Eremenko and M. Y. Lyubich, Iterates of entire functions , Preprint 6-84 of the Institute of Low Temperature Physica and Engineering, Kharkov, 1984, (Russian). - [15] , Dynamical properties of some classes of entire functions , Ann. Inst. Fourier (Grenoble) 42 (1992), no. 4, 989-1020. - [16] P. Fatou, Sur l'it´ration des fonctions transcendantes enti`res. e e , Acta Math. 47 (1926), 337-370. - [17] S. D. Fisher, Complex variables , Dover Publications, Inc., Mineola, NY, 1999, Corrected reprint of the second (1990) edition. - [18] Lisa R. Goldberg and Linda Keen, A finiteness theorem for a dynamical class of entire functions , Ergodic Theory Dynam. Systems 6 (1986), no. 2, 183-192. - [19] B. Karpi´ska and M. Urba´ski, n n How points escape to infinity under exponential maps , J. London Math. Soc. (2) 73 (2006), no. 1, 141-156. - [20] M. Y. Lyubich, On the typical behaviour of trajectories of the exponent , Russian Math. Surveys 41 (1986), no. 2, 207-208. - [21] C. T. McMullen, Area and Hausdorff dimension of Julia sets of entire functions , Trans. Amer. Math. Soc. 300 (1987), no. 1, 329-342. - [22] H. Mihaljevi´-Brandt and L. Rempe-Gillen, c Absence of wandering domains for some real entire functions with bounded singular sets , Math. Ann. 357 (2013), no. 4, 1577-1604. - [23] M. Misiurewicz, On iterates of e z , Ergodic Theory Dynamical Systems 1 (1981), no. 1, 103-106. - [24] T. Needham, Visual complex analysis , The Clarendon Press, Oxford University Press, New York, 1997. - [25] M. Rees, The exponential map is not recurrent , Math. Z. 191 (1986), no. 4, 593-598. - [26] L. Rempe, On nonlanding dynamic rays of exponential maps , Ann. Acad. Sci. Fenn. Math. 32 (2007), no. 2, 353-369. - [27] , The escaping set of the exponential , Ergodic Theory Dynam. Systems 30 (2010), no. 2, 595-599. - [28] W. Rudin, Principles of mathematical analysis , third ed., McGraw-Hill Book Co., New YorkAuckland-D¨sseldorf, 1976, International Series in Pure and Applied Mathematics. u - [29] D. Schleicher and J. Zimmer, Escaping points of exponential maps , J. London Math. Soc. (2) 67 (2003), no. 2, 380-400. - [30] M. Urba´ nski and A. Zdunik, Geometry and ergodic theory of non-hyperbolic exponential maps , Trans. Amer. Math. Soc. 359 (2007), no. 8, 3973-3997.
10.4169/amer.math.monthly.122.10.919
[ "Zhaiming Shen", "Lasse Rempe-Gillen" ]
2014-08-05T22:08:45+00:00
2015-05-15T08:58:51+00:00
[ "math.DS", "math.CV", "37F10, 30D05" ]
The exponential map is chaotic: An invitation to transcendental dynamics
We present an elementary and conceptual proof that the complex exponential map is "chaotic" when considered as a dynamical system on the complex plane. (This result was conjectured by Fatou in 1926 and first proved by Misiurewicz 55 years later.) The only background required is a first undergraduate course in complex analysis.
1408.1130v1
## The Spitzer Local Volume Legacy (LVL) Global Optical Photometry 1 1 2 3 - 1 Department of Physics &amp; Astronomy, University of Wyoming, Laramie, WY 82071, USA; dcook12 @ uwyo.edu David O. Cook, Daniel A. Dale Benjamin D. Johnson Liese Van Zee Janice C. Lee 4 Robert C. Kennicutt 5 6 , Daniela Calzetti 7 Shawn M. Staudaher 1 Charles W. Engelbracht 8 - 2 UPMC-CNRS, UMR7095, Institut d'Astrophysique de Paris, F-75014, Paris, France - 3 Department of Astronomy, Indiana University, Bloomington, IN 47405, USA - 4 Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218, USA - 5 Institute of Astronomy, University of Cambridge, Cambridge CB3 0HA, UK - 6 Steward Observatory, University of Arizona, Tucson, AZ 85721, USA - 7 Department of Astronomy, University of Massachusetts, Amherst, MA 01003, USA - 8 Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756, USA; Deceased 7 August 2014 ## ABSTRACT We present the global optical photometry of 246 galaxies in the Local Volume Legacy (LVL) survey. The full volume-limited sample consists of 258 nearby ( D &lt; 11 Mpc) galaxies whose absolute B -band magnitude span a range of -9 6 . &lt; M B &lt; -20 7 . mag. A composite optical ( UBVR ) data set is constructed from observed UBVR and SDSS ugriz imaging, where the ugriz magnitudes are transformed into UBVR . We present photometry within three galaxy apertures defined at UV, optical, and IR wavelengths. Flux comparisons between these apertures reveal that the traditional optical R25 galaxy apertures do not fully encompass extended sources. Using the larger IR apertures we find color-color relationships where later-type spiral and irregular galaxies tend to be bluer than earlier-type galaxies. These data provide the missing optical emission from which future LVL studies can construct the full panchromatic (UV-optical-IR) spectral energy distributions. Key words: Local Group - galaxies: photometry - galaxies: dwarf - galaxies: irregular - galaxies: spiral ## 1 INTRODUCTION The Local Volume Legacy (LVL) survey has provided large data sets which include ultraviolet (UV; Lee et al. 2011) non-ionizing stellar continuum, H α nebular emission (Kennicutt et al. 2008), and infrared (IR; Dale et al. 2009) dust emission of hundreds of local galaxies. Due to the volume-limited nature of LVL, the galaxy sample consists of large spirals and a few elliptical galaxies, but mostly lowmass dwarf and irregular galaxies where 52% of the sample has a stellar mass less than 10 9 M /circledot (Dale et al. 2009). These data have produced insights into the extreme environments of low-mass galaxies. low IR/UV flux ratios compared to star burst galaxies. These results indicate that the reprocessing of UV photons by dust in low-mass galaxies is different than in normal or starbursting galaxies. LVL IR studies have established and characterized monochromatic IR star formation rate indicators which break down for low luminosity galaxies due to decreased amount of dust Calzetti et al. (2010). Furthermore, Dale et al. (2009) observed large scatter in the mid-to-total IR flux ratios for low-mass galaxies and that they exhibit The study of (Lee et al. 2009) utilized the LVL H α and UV catalogs to compare these two star formation rate tracers and found a discrepancy in lower mass systems (see also, Meurer et al. 2009). The underprediction of the H α star formation rate in low-mass galaxies has consequences on a wide range of fundamental galaxy properties (e.g., IMF, stellar models, etc.) and has given rise to a new paradigm of research investigations (i.e. stochastic star formation; Barnes, van Zee &amp; Skillman 2011; Fumagalli et al. 2011; Fumagalli, da Silva &amp; Krumholz 2011; Cook et al. 2012; da Silva, Fumagalli &amp; Krumholz 2012; Eldridge 2012; Koda et al. 2012; Weisz et al. 2012; Andrews et al. 2013; Hermanowicz, Kennicutt &amp; Eldridge 2013; Barnes, van Zee &amp; Dowell 2013; Bauer et al. 2013; da Silva, Fumagalli &amp; Krumholz 2014). These previous LVL studies have provided information on the star formation and interstellar dust properties of local galaxies, but the full spectral energy distribution (SED) is incomplete. The optical light significantly contributes to the overall emission of a galaxy, and therefore provides invaluable constraints for modeling a galaxy's full SED. In addition, due to the fewer technical obstacles involved in ground-based optical observations, examining relationships between optical properties and properties derived from either UV or IR is a practical and useful endeavor. This paper presents the global photometry of the LVL optical observations. The full panchromatic (UV-optical-IR) SEDs are constructed and comparisons between optical and physical properties are explored in a follow-up study (Cook et al. 2014c; submitted). ## 2 SAMPLE The LVL sample consists of 258 of our nearest galaxy neighbors reflecting a statistically complete, representative sample of the local universe. The sample selection and description are detailed in Dale et al. (2009), but we provide a brief overview here. The LVL sample was built upon the samples of two previous nearby galaxy surveys: ACS Nearby Galaxy Survey Treasury (ANGST; Dalcanton et al. 2009) and 11 Mpc H α and Ultraviolet Galaxy Survy (11 HUGS; Kennicutt et al. 2008; Lee et al. 2011). The final LVL sample consists of galaxies that appear outside the Galactic plane ( | b | &gt; 20 ), ◦ have a distance less than 11 Mpc ( D ≤ 11 Mpc), span an absolute B -band magnitude of -9 6 . &lt; M B &lt; -20 7, and . span an RC3 catalog galaxy type range of -5 &lt; T &lt; 10. Although the galaxy morphology composition is diverse, the LVL sample is dominated by dwarf galaxies due to its volume-limited nature. The full LVL sample and basic properties are listed in Table 1. ## 3 DATA In this section we describe the optical observations presented in this study. Furthermore, we describe procedures for removal of contaminating sources, define three elliptical apertures used for photometry, and present the subsequent optical photometry within these apertures. ## 3.1 UBVR Data We have obtained UBVR ground-based data from 12 meter class telescopes located at Cerro Tololo InterAmerican Observatory (CTIO), Kitt Peak National Observatory (KPNO), Vatican Advanced Technology Telescope (VATT), and the Wyoming Infra-Red Observatory (WIRO). Although each telescope has its own characteristics, the collection of optical images has a median pixel scale of 0 . ′′ 5 per pix with a standard deviation of 0 1 . ′′ per pix and a median seeing of 1 . ′′ 4 with a standard deviation of 0 . ′′ 4. In addition, the median exposure times for the UBVR filters are 2700, 1800, 1260, and 840 seconds, respectively. All data reduction was performed with standard IRAF tasks. Each image was bias- and dark- subtracted, and flatfielded. Dome flats were used only when skyflats were not available. Calibration stars were taken several times a night and were used to correct fluxes to zero airmass, calculate photometric zero points, and calculate first-order color corrections. The 5 σ limiting magnitude for a point source using the measured seeing as the aperture (2 × FWHM of the PSF) was calculated via the standard deviation of sky values within several sky regions selected to avoid bright stars. The median 5 σ limiting magnitudes for all images are 22.8, 23.6, 23.1, and 22.6 mag with a standard deviation of 0.77, 0.79, 0.71, 0.78 mag for UBVR , respectively. ## 3.2 SDSS Data We have also downloaded SDSS ugriz imaging taken from SDSS DR7 (Sloan Digital Sky Survey; Abazajian et al. 2009). For each galaxy, mosaic images were constructed using the utility SWARP (Bertin et al. 2002), sky-subtracted, and photometrically calibrated to the AB magnitude system; note that the SDSS magnitudes are corrected for AB magnitude offsets as prescribed by the DR7 data release website. 1 The 5 σ limiting magnitudes of the SDSS mosaics were calculated in an identical manner to that of our UBVR data resulting in point source detection limits of 21.6, 22.8, 22.4, 21.9, 20.4 mag with a standard deviation of 0.23, 0.20, 0.17, 0.17, 0.21 mag for ugriz , respectively. These limiting magnitudes are in good agreement with the 95% completeness limits quoted in the SDSS DR7 documentation. ## 3.3 Removal of Contaminating Sources To prepare the optical data for photometry, contaminating sources (e.g., background galaxies and foreground stars) were identified and masked within the galaxy apertures studied here (see § 3.4). We utilize the contaminant regions identified by Dale et al. (2009) as an initial catalog. These regions were identified based on Spitzer Space Telescope IR colors and high resolution HST images when archival HST images were available (i.e., not available for all LVL galaxies.). These contaminant regions were overlaid onto each optical image, visually inspected, and the contaminant region sizes were adjusted to account for the relative apparent brightness of each source. Although the work of Dale et al. (2009) compared the LVL IR images to high resolution HST images, contaminating optical sources are not always detectable at IR wavelengths and hence may not have been recorded as contaminating sources. Furthermore, new HST observations since the publication date of Dale et al. (2009) are available to identify additional contaminating sources. For these reasons, we have compared our optical data to all available HST single-band images and multi-band color images General Galaxy Properties | Galaxy Name (1) | RA (J2000.0) (2) | DEC (J2000.0) (3) | D (Mpc) (4) | T (5) | E ( B - V ) (mag) (6) | M B (AB mag) (7) | |-------------------|--------------------|---------------------|---------------|---------|-------------------------|--------------------| | WLM | 00:01:58.16 | - 15:27:39.3 | 0.92 | 10 | 0.04 | -13.56 | | NGC0024 | 00:09:56.54 | - 24:57:47.3 | 8.13 | 5 | 0.02 | -17.46 | | NGC0045 | 00:14:03.99 | - 23:10:55.5 | 7.07 | 8 | 0.02 | -18.19 | | NGC0055 † | 00:14:53.60 | - 39:11:47.9 | 2.17 | 9 | 0.01 | . . . | | NGC0059 | 00:15:25.13 | - 21:26:39.8 | 5.3 | - 3 | 0.02 | -15.62 | | ESO410-G005 | 00:15:31.56 | - 32:10:47.8 | 1.9 | - 1 | 0.01 | -11.34 | | SCULPTOR-DE1 | 00:23:51.70 | - 24:42:18.0 | 4.2 | 10 | 0.02 | -11.00 | | ESO294-G010 | 00:26:33.37 | - 41:51:19.1 | 1.9 | - 3 | 0.01 | -11.09 | | IC1574 | 00:43:03.82 | - 22:14:48.8 | 4.92 | 10 | 0.02 | -14.05 | | NGC0247 | 00:47:08.55 | - 20:45:37.4 | 3.65 | 7 | 0.02 | -18.31 | Table 1. Column 1: Galaxy name; galaxies where the photometry has been removed is denoted with a † symbol. Column 2 and 3: J2000 right ascension and declination used for centering the R25 apertures of Table 2 which are based on the RC3 catalog values. Column 4: distance in Mpc from Kennicutt et al. (2008). Column 5: RC3 Morphological T-type from Kennicutt et al. (2008). Column 6: Milky Way foreground extinction from Schlegel, Finkbeiner &amp; Davis (1998). Column 7: absolute B -band magnitude derived from the apparent magnitude of this study using the distance of column 4; these magnitudes have been corrected for Milky Way foreground extinction using column 6 and the reddening curve of Draine (2003). The full table is available online. Figure 1. Inverted images for the LVL spiral galaxy NGC2403 in 4 filters: FUV, B, 3.6 µm , and 24 µm , for panels a, b, c, and d, respectively. We perform photometry in the 3 apertures overlaid in each panel: optical R25 (green-solid line), IR (red-dashed line; Dale et al. 2009), and UV (cyan-dashed line; Lee et al. 2011). To make direct comparisons across UV-IR we present optical fluxes within the IR apertures. The IR apertures have been visually checked to ensure that they are adequately large to encompass all of the optical and typically all of the UV and IR emission. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1130v1-figure-6b885c6e-d981-4f01-bbc4-c9b8299bff60.jpg) Figure 2. Inverted images of the LVL dwarf galaxy UGC05666 where the panels and ellipses are the same as Figure 1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1130v1-figure-13459595-5e70-45cd-a3fe-f7b462acc196.jpg) via the Hubble Legacy Archive . 2 HST images were visually checked for sources with spiral structure, extended profiles, and optical colors indicating a background galaxy, and sources with diffraction spikes indicating a foreground star. The new contaminant regions were tailored to each optical image and added to the modified contamination source catalog of Dale et al. (2009). With an updated contaminating source catalog, each contaminant was removed through an interpolation of the surrounding local sky using the IRAF task IMEDIT. The region files which define these contaminating sources are available online or by request. were chosen to provide direct flux comparisons with two previous LVL studies which have defined separate elliptical apertures. ## 3.4 Galaxy Apertures We perform global photometry on the LVL optical images within three apertures defined at UV, optical, and IR wavelengths. The optical apertures are taken from the RC3 catalog (de Vaucouleurs et al. 1991) as tabulated by the VizieR catalog, 3 and are defined as isophotal ellipses with a surface brightness of 25 mag/arcsec 2 in the B -band filter. The optical apertures are listed in Table 2. The other two apertures 2 http://hla.stsci.edu/hlaview.html 3 http://vizier.u-strasbg.fr/ The Spitzer Space Telescope IR elliptical apertures of Dale et al. (2009) were chosen to encompass the majority of the emission seen at GALEX UV (1500˚-2300˚) and A A Spitzer IR (3.6 µ m-160 µ m) wavelengths. In practice, these apertures were usually determined by the extent of the 3.6 µ m emission given the superior sensitivity of the 3.6 µ m array coupled with the relatively bright emission from older stellar populations at this wavelength. However, in several instances the emission between 1500 ˚ -2300 ˚ or at 160 A A µ m wavelengths were spatially more extended, and thus these wavelengths were used to determine the IR apertures. The resulting median ratio of IR-to-optical semi-major axes is 1.5 (see Figures 1 and 2); the IR apertures are listed in Table 3. The GALEX UV elliptical apertures of Lee et al. (2011) were defined as an isophotal ellipse outside of which the photometric error was greater than 0.8 mag or the intensity fell below the sky level. The resulting median ratio of UV-to-optical semi-major axes is 2.3 (see Figures 1 and 2). The UV apertures are listed in Table 4. Figures 1 and 2 show all three apertures overlaid onto UV, optical, and IR images for a spiral and dwarf galaxy, Photometry Within R25 Apertures | Galaxy (1) | a ( ′′ ) (2) | b ( ′′ ) (3) | P.A. (deg) (4) | U (AB mag) (5) | B (AB mag) (6) | V (AB mag) (7) | R (AB mag) (8) | u (AB mag) (9) | g (AB mag) (10) | r (AB mag) (11) | i (AB mag) (12) | z (AB mag) (13) | |--------------|----------------|----------------|------------------|------------------|------------------|------------------|------------------|------------------|-------------------|-------------------|-------------------|-------------------| | WLM | 344.4 | 119.4 | 4.0 | . . . | 11.50 ± 0.03 | 11.10 ± 0.03 | 10.93 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0024 | 172.6 | 40.5 | 46.0 | . . . | 12.20 ± 0.03 | 11.58 ± 0.03 | 11.46 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0045 | 255.3 | 176.7 | 142.0 | 11.92 ± 0.03 | 11.21 ± 0.03 | 10.73 ± 0.03 | 10.58 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0055 † | 970.8 | 168.7 | 108.0 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | | NGC0059 | 78.9 | 39.5 | 127.0 | 14.01 ± 0.03 | 13.21 ± 0.03 | 12.59 ± 0.03 | 12.31 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | ESO410-G005 | 39.5 | 31.4 | 54.0 | . . . | 15.32 ± 0.03 | . . . | 14.58 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | SCULPTOR-DE1 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | | ESO294-G010 | 32.9 | 21.2 | 6.0 | . . . | 15.76 ± 0.03 | . . . | 14.97 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | IC1574 | 64.1 | 23.3 | 175.0 | 15.25 ± 0.03 | 14.73 ± 0.03 | 14.35 ± 0.03 | 14.24 ± 0.03 | 15.29 ± 0.03 | 14.52 ± 0.03 | 14.20 ± 0.03 | 14.04 ± 0.03 | 14.11 ± 0.03 | | NGC0247 | 641.4 | 207.5 | 174.0 | 10.11 ± 0.03 | 9.61 ± 0.03 | 9.10 ± 0.03 | 8.87 ± 0.03 | . . . | . . . | . . . | . . . | . . . | Table 2: The LVL global photometry within the optical-R25 apertures. Column 1: The galaxy name; galaxies where the photometry has been removed is denoted with a † symbol. Columns 2 and 3: The semi-major and semi-minor axis of the the R25 apertures in units of arcseconds. Column 4: The position angle of the R25 apertures in units of degrees measured east of north. Columns 5, 6, 7, and 8: The UBVR magnitudes of each galaxy with errors. Columns 9, 10, 11, 12, and 13: The ugriz magnitudes of each galaxy with errors. The full table is available online. Photometry Within the IR Apertures of Dale et al. (2009) | Galaxy | a ( ′′ ) | b ( ′′ ) (3) | P.A. (deg) (4) | U (AB mag) (5) | B (AB mag) (6) | V (AB mag) (7) | R (AB mag) (8) | u (AB mag) (9) | g (AB mag) (10) | r (AB mag) (11) | i (AB mag) (12) | z (AB mag) (13) | |--------------|------------|----------------|------------------|------------------|------------------|------------------|------------------|------------------|-------------------|-------------------|-------------------|-------------------| | (1) WLM | (2) 336.0 | 169.5 | 0 | . . . | 11.40 ± 0.03 | 10.99 ± 0.03 | 10.80 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0024 | 150.5 | 108 | 225 | . . . | 12.16 ± 0.03 | 11.54 ± 0.03 | 11.43 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0045 | 288.5 | 228 | 336 | 11.88 ± 0.03 | 11.13 ± 0.03 | 10.65 ± 0.03 | 10.51 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | NGC0055 † | 1125.5 | 357 | 106 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | | NGC0059 | 127.5 | 89.5 | 301 | 13.98 ± 0.03 | 13.08 ± 0.03 | 12.45 ± 0.03 | 12.17 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | ESO410-G005 | 60.5 | 45 | 307 | . . . | 15.11 ± 0.03 | . . . | 14.34 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | SCULPTOR-DE1 | 80.0 | 51.5 | 0 | . . . | 17.01 ± 0.04 | . . . | 16.26 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | ESO294-G010 | 82.0 | 50.5 | 0 | . . . | 15.33 ± 0.03 | . . . | 14.51 ± 0.03 | . . . | . . . | . . . | . . . | . . . | | IC1574 | 101.0 | 61.5 | 0 | 14.96 ± 0.03 | 14.47 ± 0.03 | 14.03 ± 0.03 | 13.95 ± 0.03 | 14.77 ± 0.04 | 14.28 ± 0.03 | 13.89 ± 0.03 | 13.66 ± 0.03 | 13.84 ± 0.04 | | NGC0247 | 738.0 | 290.5 | 352 | 10.07 ± 0.03 | 9.56 ± 0.03 | 9.05 ± 0.03 | 8.81 ± 0.03 | . . . | . . . | . . . | . . . | . . . | Table 3: The LVL global photometry within the IR apertures defined by Dale et al. (2009). Column 1: The galaxy name; galaxies where the photometry has been removed is denoted with a † symbol. Columns 2 and 3: The semi-major and semi-minor axis of the the IR apertures in units of arcseconds. Column 4: The position angle of the IR apertures in units of degrees measured east of north. Columns 5, 6, 7, and 8: The UBVR magnitudes of each galaxy with errors. Columns 9, 10, 11, 12, and 13: The ugriz magnitudes of each galaxy with errors. The full table is available online. Table 4: The LVL global photometry within the UV apertures defined by Lee et al. (2011). Column 1: The galaxy name; galaxies where the photometry has been removed is denoted with a † symbol. Columns 2 and 3: The semi-major and semi-minor axis of the the UV apertures in units of arcseconds. Column 4: The position angle of the UV apertures in units of degrees measured east of north. Columns 5, 6, 7, and 8: The UBVR magnitudes of each galaxy with errors. Columns 9, 10, 11, 12, and 13: The ugriz magnitudes of each galaxy with errors. The full table is available online. | NGC0247 | IC1574 | ESO294-G010 | SCULPTOR-DE1 | ESO410-G005 | NGC0059 | NGC0055 † | NGC0045 | NGC0024 | WLM | (1) | Galaxy | |--------------|--------------|---------------|----------------|---------------|--------------|-------------|--------------|--------------|--------------|---------------|----------| | 954.0 | 120.0 | 72.0 | 102.0 | 108.0 | 150.0 | 1452.0 | 378.0 | 258.0 | 516.0 | ( ′′ ) (2) | a | | 307.0 | 46.0 | 46.0 | 79.0 | 83.0 | 75.0 | 251.0 | 262.0 | 58.0 | 180.0 | ( ′′ ) (3) | b | | -6.0 | -5.0 | 6.0 | -10.0 | 54.0 | -53.0 | -72.0 | -38.0 | 46.0 | 4.0 | (deg) (4) | P.A. | | 10.05 ± 0.03 | 14.97 ± 0.03 | . . . | . . . | . . . | 13.98 ± 0.03 | . . . | 11.84 ± 0.03 | . . . | . . . | (AB mag) (5) | U | | 9.55 ± 0.03 | 14.47 ± 0.03 | 15.35 ± 0.03 | 16.75 ± 0.04 | 14.88 ± 0.03 | 13.08 ± 0.03 | . . . | 11.07 ± 0.03 | 12.12 ± 0.03 | 11.30 ± 0.03 | (AB mag) (6) | B | | 9.03 ± 0.03 | 14.04 ± 0.03 | . . . | . . . | . . . | 12.45 ± 0.03 | . . . | 10.60 ± 0.03 | 11.50 ± 0.03 | 10.87 ± 0.03 | (AB mag) (7) | V | | 8.80 ± 0.03 | 13.94 ± 0.03 | 14.53 ± 0.03 | 15.97 ± 0.03 | 14.08 ± 0.03 | 12.16 ± 0.03 | . . . | 10.44 ± 0.03 | 11.39 ± 0.03 | 10.66 ± 0.03 | (AB mag) (8) | R | | . . . | 14.80 ± 0.04 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | (AB mag) (9) | u | | . . . | 14.26 ± 0.03 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | (AB mag) (10) | g | | . . . | 13.89 ± 0.03 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | (AB mag) (11) | r | | . . . | 13.69 ± 0.03 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | (AB mag) (12) | i | | . . . | 13.82 ± 0.04 | . . . | . . . | . . . | . . . | . . . | . . . | . . . | . . . | (AB mag) (13) | z | Photometry Within the UV Apertures of Lee et al. (2011) respectively. The dashed-cyan, solid-green, and dashed-red ellipses represent the UV, optical, and IR apertures, respectively. The IR and UV apertures are generally larger and encompass more extended features compared to the optical apertures which is most notable in panels (a) and (b) of Figure 2. There are at least three features in panel (b) of Figure 2 which extend past the R25 aperture (more clearly seen in the UV image of panel a) but not past the UV or IR apertures. The later part of the next section shows that the global fluxes measured within the R25 apertures tend to be lower compared to the relatively similar global fluxes measured within both the UV and IR apertures. ## 3.5 Photometry There are six galaxies (BK06N, DDO078, IC5152, IKN, NGC0404, and UGC07242) which are removed from this analysis due to contaminating light from bright nearby stars. These bright stars are either inside or in such proximity to all three galaxy apertures that the contaminating light could not be cleanly edited or a large fraction of the galaxy's light needed to be masked in order to remove the star. The photometry of these galaxies were deemed uncertain and were subsequently removed from this analysis. Furthermore, there are five galaxies (SMC, LMC, NGC0055, NGC0300, &amp; NGC0598) whose optical data were not obtained due to their large angular size. In addition, no optical observations were obtained for the galaxy MCG-05-13-004. There are no fluxes listed for these 12 galaxies in Table 2, 3, or 4. The remaining 246 galaxies have been observed in at least two optical filters and constitute the LVL optical sample. Photometry was carried out via the IRAF task IMCNTS where sky apertures far from the galaxy were visually selected in each image to avoid any sources. A 3 σ clipping routine was used to calculate the final sky values. The photometric uncertainties were calculated in a manner similar to the IRAF task PHOT: $$\sigma = \sqrt { f ( \lambda ) + A ( a p ) * s k y ^ { 2 } + \frac { A ( a p ) ^ { 2 } * s k y ^ { 2 } } { A ( s k y ) } }, \quad ( 1 )$$ where f ( λ ) is the galaxy's flux in units of counts, A ap ( ) is the area of the galaxy's aperture in units of pixels squared, sky is the standard deviation of the sky values per pixel, and A sky ( ) is the area of the sky apertures in units of pixels squared. The first term in Equation 1 is the Poisson error, the second term is the scatter in the sky values within the galaxy's aperture, and the third term is the uncertainty in the mean sky brightness. The UBVR data were originally calibrated to the Vega magnitude system, but were transformed to the AB magnitude system via the prescription of Blanton &amp; Roweis (2007). The original Vega system calibration applied a firstorder color correction. We have characterized the calibration errors (e.g., zeropoint and color term errors) of all UBVR photometry at ∼ 2 -3% and have added a conservative 3% in quadrature to the instrumental errors of Equation 1. The SDSS data are calibrated to the AB magnitude system where the SDSS DR7 documentation has characterized the calibration accuracy to be 3% 4 . Consequently, we 4 http://www.sdss.org/dr7/algorithms/fluxcal.html have added a 3% calibration error to the instrumental errors of Equation 1. The photometry for UBVR and ugriz within the optical, IR, and UV apertures are listed in Tables 2, 3, and 4, respectively. These data have not been corrected for Galactic foreground extinction and are presented in the AB magnitude system. There is a single non-detection for all optical images in the SDSS u -band for UGCA133. The magnitude for this data point is set as the upper limit for a point source defined in § 3.1. The u -band photometry listed for this galaxy in Tables 2, 3, and 4 has no error listed and the limiting magnitude is preceded by a ' &gt; ' symbol indicating an upper limit. Wealso examine how the global flux of a galaxy changes when measured within different apertures (i.e., UV, optical R25, or IR). To make comparisons between the three apertures used in this study, we take the difference of the magnitudes listed in Tables 2, 3, and 4 and plot the resultant as histograms in Figure 3. However, we present only the V -band photometric differences since all other bandpass histograms exhibit similar overall structure. These histograms graphically present comparisons between the fluxes measured within the IR and R25 apertures (IR -R25; unshaded), the UV and R25 apertures (UV -R25; shaded with diagonal lines), and the UV and IR apertures (UV -IR; shaded gray). The peak of the IR -R25 and UV -R25 histograms are offset from a zero magnitude difference to brighter IR and UV fluxes by similar amounts (0 1 . -0 3 mag). This offset in-. dicates that both the IR and UV apertures encompass more flux compared to the optical R25 apertures. For example, a visual inspection of panel (b) in Figure 2 shows at least three features outside of the R25 aperture (also seen in the UV image of panel a) which are contained within both the UV and IR apertures. Furthermore, the UV -IR histogram is peaked around a magnitude difference of zero indicating that both the UV and IR apertures encompass roughly the same amount of optical flux. This suggests that the R25 apertures, which are traditionally used to define a galaxy's spatial extent, do not fully encompass a galaxy's extended features. ## 3.6 UBVR + SDSS Composite Sample This study aims to compile a complete UBVR data set for all galaxies; however, not all galaxies have been observed in all UBVR filters. The galaxies with missing UBVR observations can be supplemented with SDSS ugriz observations. Table 5 lists the number of galaxies with UBVR observations in Column 2 and the number of galaxies without UBVR observations but with available ugriz observations in Column 3. The supplemental SDSS will require a transformation into UBVR magnitudes. We transform ugriz magnitudes into UBVR magnitudes instead of UBVR into ugriz since there are more observed UBVR data. In the final composite UBVR optical data set, all observed UBVR data were retained and only the missing UBVR data were supplemented with transformed ugriz data. For example, if a galaxy has been observed in the B and R filters, the available ugriz magnitudes were transformed into only the U and V magnitudes resulting in an observed BR and a transformed UV data set. Column 4 in Figure 3. The V -band global magnitude differences measured within the IR and optical R25 apertures (IR -R25; unshaded), the UV and R25 apertures (UV -R25; shaded with diagonal lines), and the UV and IR apertures (UV -IR; shaded gray). The peak of both the UV -R25 and IR -R25 magnitude differences show that the UV and IR apertures encompass more flux compared to the optical R25 apertures by 0 1 . -0 3 magnitudes. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1130v1-figure-ae544b41-9bbe-4c5b-9dfc-d268c2f6dfbe.jpg) LVL Composite Sample | Filter (1) | # Observed (2) | # SDSS (3) | # Total (4) | |--------------|------------------|--------------|---------------| | U | 132 | 96 | 228 | | B | 185 | 60 | 245 | | V | 129 | 106 | 235 | | R | 188 | 57 | 245 | Table 5. Explanation of galaxy sample statistics used in this study-Column2: the number of observed galaxies for each UBVR filter listed in column 1; Column 3: the number of galaxies without observed data but with SDSS data available in each filter; Column 4: the total number of galaxies in the combined observed UBVR and transformed ugriz data set (i.e., the sum of columns 2 and 3). Table 5 presents the total number of galaxies in the composite (observed UBVR plus transformed ugriz ) LVL sample. Transformations were carried out via the prescription of Cook et al. (2014b; submitted). These transformation equations were derived using LVL galaxies with both ugriz and UBVR observations. Previous SDSS transformations derived from Landolt+Stetson calibration stars (e.g., Lupton et al. 2004; Jester et al. 2005) and galaxy templates (Blanton &amp; Roweis 2007) yield increased scatter around transformation relationships and and significant offsets ( &gt; 0.1 dex) in UBVR observed-only color-color LVL trends. However, the study of Cook et al. (2014b; submitted) derives transformation relationships with significantly less scatter and no apparent offset in UBVR observed-only color-color LVL trends. For a full description of the ugriz to UBVR transformations using galaxy-wide integrated colors see Cook et al. (2014b; submitted). Figure 4. A color-color plot for the LVL composite UBVR data, where the absolute magnitudes of each bandpass has been corrected for Milky Way foreground extinction. The error bars above the legend represent the median errors of all data plotted. There is a positive relationship with significant overlap between different galaxy types. However, earlier-type galaxies tend to be redder in color. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1130v1-figure-f11993fc-5808-4fdd-b7e0-2a44c689beec.jpg) Figure 5. A color-color plot similar to that of Figure 4, where the absolute magnitudes of each bandpass has been corrected for Milky Way foreground extinction. There is a positive relationship with significant overlap between different galaxy types. However, earlier-type galaxies tend to be redder in color. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1130v1-figure-0bc889f7-c6f7-4d1c-9db1-9ef776929fa5.jpg) ## 4 RESULTS In this section we present properties of the UBVR composite sample constructed from observed UBVR and transformed SDSS ugriz data. We find relationships between optical colors. To make direct photometric comparisons we have chosen to present figures based on the fluxes within one aperture: the IR apertures of Dale et al. (2009). These apertures are chosen for the following reasons: (1) the IR apertures yield similar global fluxes to those of the UV apertures, both of which exhibit greater fluxes compared to the fluxes measured within the R25 apertures (see § 3.5); (2) there are fewer galaxy apertures ( N = 234) defined in the UV catalog of Lee et al. (2011) compared to the number of IR apertures ( N = 255) published in Dale et al. (2009). The IR apertures have been visually checked to ensure that they are adequately large to encompass all of the optical emission. The figures in this section present absolute magnitudes. These magnitudes are corrected for Milky Way foreground extinction using the Schlegel, Finkbeiner &amp; Davis (1998) maps tabulated by the NASA/IPAC Extragalactic Database 5 assuming the Draine (2003) extinction curve and a reddening law of R V = 3 1. The . E B ( -V ) values from Schlegel, Finkbeiner &amp; Davis (1998) are listed in Table 1. Figures 4 and 5 show two optical color-color diagrams for the composite 'UBVR' LVL data set. These relationships show a general positive trend between different colors, where later-type spiral and irregular galaxies tend to be bluer than earlier-type galaxies. While this morphological trend exists in both color-color plots, there is significant overlap in the colors of different galaxy types. ## 5 SUMMARY This study has constructed a homogenized UBVR data set for 246 LVL galaxies from newly obtained UBVR imaging and compiled SDSS ugriz data. We transformed ugriz magnitudes into UBVR magnitudes when observed UBVR data were not available. Comparing the global optical fluxes between the UV apertures of Lee et al. (2011), the IR apertures of Dale et al. (2009), and the optical R25 apertures reveal that the traditionally defined R25 optical extent of a galaxy does not encompass the extended features of many LVL galaxies. The optical properties for the LVL sample measured within the IR apertures show relationships between different optical colors (Figures 4 and 5), where earlier-type galaxies tend to show redder colors. A follow-up publication (Cook et al. 2014c; submitted) utilizes these optical data to construct the full panchromatic (UV-optical-IR) LVL SEDs of the LVL sample. These SEDs facilitate an analysis of how physical properties (e.g., SFR, metallicity, dust, etc.) affect the observed properties of the LVL galaxy sample. ## REFERENCES Abazajian K. N. et al., 2009, ApJS, 182, 543 Barnes K. L., van Zee L., Dowell J. D., 2013, ApJ, 775, 40 Barnes K. L., van Zee L., Skillman E. D., 2011, ApJ, 743, Andrews J. E. et al., 2013, ApJ, 767, 51 137 Bauer A. E. et al., 2013, MNRAS, 434, 209 Bertin E., Mellier Y., Radovich M., Missonnier G., Didelon P., Morin B., 2002, in Astronomical Society of the Pacific Conference Series, Vol. 281, Astronomical Data Analysis Software and Systems XI, Bohlender D. A., Durand D., Handley T. H., eds., p. 228 Blanton M. R., Roweis S., 2007, AJ, 133, 734 Calzetti D. et al., 2010, ApJ, 714, 1256 Cook D. O. et al., 2012, ApJ, 751, 100 5 http://ned.ipac.caltech.edu/ da Silva R. L., Fumagalli M., Krumholz M., 2012, ApJ, 745, 145 da Silva R. L., Fumagalli M., Krumholz M. R., 2014, ArXiv e-prints Dalcanton J. J. et al., 2009, ApJS, 183, 67 Dale D. A. et al., 2009, ApJ, 703, 517 de Vaucouleurs G., de Vaucouleurs A., Corwin, Jr. H. G., Buta R. J., Paturel G., Fouqu´ P., 1991, Third Reference e Catalogue of Bright Galaxies. Volume I: Explanations and references. Volume II: Data for galaxies between 0 h and 12 h . Volume III: Data for galaxies between 12 h and 24 h . Draine B. T., 2003, ARA&amp;A, 41, 241 Eldridge J. J., 2012, MNRAS, 422, 794 Fumagalli M., da Silva R., Krumholz M., Bigiel F., 2011, in Astronomical Society of the Pacific Conference Series, Vol. 440, UP2010: Have Observations Revealed a Variable Upper End of the Initial Mass Function?, M. Treyer, T. Wyder, J. Neill, M. Seibert, &amp; J. Lee, ed., p. 155 Fumagalli M., da Silva R. L., Krumholz M. R., 2011, ApJ, 741, L26 Hermanowicz M. T., Kennicutt R. C., Eldridge J. J., 2013, MNRAS, 432, 3097 Jester S. et al., 2005, AJ, 130, 873 Kennicutt, Jr. R. C., Lee J. C., Funes, Jos´ G. S. J., Sakai e S., Akiyama S., 2008, ApJS, 178, 247 Koda J., Yagi M., Boissier S., Gil de Paz A., Imanishi M., Donovan Meyer J., Madore B. F., Thilker D. A., 2012, ApJ, 749, 20 Lee J. C. et al., 2011, ApJS, 192, 6 Lee J. C. et al., 2009, ApJ, 706, 599 Lupton R., Blanton M. R., Fekete G., Hogg D. W., O'Mullane W., Szalay A., Wherry N., 2004, PASP, 116, 133 Meurer G. R. et al., 2009, ApJ, 695, 765 Schlegel D. J., Finkbeiner D. P., Davis M., 1998, ApJ, 500, 525 Weisz D. R. et al., 2012, ApJ, 744, 44
10.1093/mnras/stu1580
[ "David O. Cook", "Daniel A. Dale", "Benjamin D. Johnson", "Liese Van Zee", "Janice C. Lee", "Robert C. Kennicutt", "Daniela Calzetti", "Shawn M. Staudaher", "Charles W. Engelbracht" ]
2014-08-05T22:09:32+00:00
2014-08-05T22:09:32+00:00
[ "astro-ph.GA" ]
The Spitzer Local Volume Legacy (LVL) Global Optical Photometry
We present the global optical photometry of 246 galaxies in the Local Volume Legacy (LVL) survey. The full volume-limited sample consists of 258 nearby (D < 11 Mpc) galaxies whose absolute B-band magnitude span a range of -9.6 < M_B < -20.7 mag. A composite optical (UBVR) data set is constructed from observed UBVR and SDSS ugriz imaging, where the ugriz magnitudes are transformed into UBVR. We present photometry within three galaxy apertures defined at UV, optical, and IR wavelengths. Flux comparisons between these apertures reveal that the traditional optical R25 galaxy apertures do not fully encompass extended sources. Using the larger IR apertures we find color-color relationships where later-type spiral and irregular galaxies tend to be bluer than earlier-type galaxies. These data provide the missing optical emission from which future LVL studies can construct the full panchromatic (UV-optical-IR) spectral energy distributions.
1408.1131v1
## Empirical ugri -UBVRc Transformations for Galaxies David O. Cook, 1 Daniel A. Dale 1 Benjamin D. Johnson 2 Liese Van Zee 3 Janice C. Lee 4 Robert C. Kennicutt 5 6 , Daniela Calzetti 7 Shawn M. Staudaher 1 8 - 1 Department of Physics &amp; Astronomy, University of Wyoming, Laramie, WY 82071, USA; dcook12 @ uwyo.edu Charles W. Engelbracht - 2 UPMC-CNRS, UMR7095, Institut d'Astrophysique de Paris, F-75014, Paris, France - 3 Department of Astronomy, Indiana University, Bloomington, IN 47405, USA - 4 Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218, USA - 5 Institute of Astronomy, University of Cambridge, Cambridge CB3 0HA, UK - 6 Steward Observatory, University of Arizona, Tucson, AZ 85721, USA - 7 Department of Astronomy, University of Massachusetts, Amherst, MA 01003, USA - 8 Raytheon Company, 1151 East Hermans Road, Tucson, AZ 85756, USA; Deceased 7 August 2014 ## ABSTRACT We present empirical color transformations between Sloan Digital Sky Survey ugri and Johnson-Cousins UBVR c photometry for nearby galaxies ( D &lt; 11 Mpc). We use the Local Volume Legacy (LVL) galaxy sample where there are 90 galaxies with overlapping observational coverage for these two filter sets. The LVL galaxy sample consists of normal, non-starbursting galaxies. We also examine how well the LVL galaxy colors are described by previous transformations derived from standard calibration stars and model-based galaxy templates. We find significant galaxy color scatter around most of the previous transformation relationships. In addition, the previous transformations show systematic offsets between transformed and observed galaxy colors which are visible in observed color-color trends. The LVL-based galaxy transformations show no systematic color offsets and reproduce the observed colorcolor galaxy trends. Key words: Local Group - galaxies: photometry - galaxies: dwarf - galaxies: irregular - galaxies: spiral ## 1 INTRODUCTION The Sloan Digital Sky Survey (SDSS) is a large-area optical survey which covers more than one quarter of the sky (York et al. 2000). The five filters ( ugriz ) developed for this survey are based on a modified Thuan-Gunn (Thuan &amp; Gunn 1976) system which provide wide optical wavelength coverage and little overlap between each filter bandpass. Due to the wide acceptance of this filter system, an increasing number of ground-based surveys utilize SDSS filters. Thus there is a large amount of optical data for stars, galaxies, and quasars based on ugriz photometry in addition to traditional UBVR I c c photometry (Johnson &amp; Morgan 1953; Cousins 1976). All previous SDSS data releases have empirically characterized SDSS-Johnson-Cousins transformations for quasars (e.g., Jester et al. 2005) and stars (Pop I and II, metal-poor, dwarfs, and main sequence; Smith et al. 2002; West, Walkowicz &amp; Hawley 2005; Karaali, Bilir &amp; Tun¸ cel 2005; Jester et al. 2005; Rodgers et al. 2006; Jordi, Grebel &amp; Ammon 2006). How- ever, no study to date has explicitly investigated empirical transformations for a population of galaxies. It is reasonable to assume that some stellar transformations would describe galaxy transformations with relative accuracy since the majority of a galaxy's optical light emanates from stars. However, previous studies have found different transformations for stars with different metallicities (Karaali, Bilir &amp; Tun¸el c 2005; Jordi, Grebel &amp; Ammon 2006) and different colors (Smith et al. 2002; Jester et al. 2005; West, Walkowicz &amp; Hawley 2005; Jordi, Grebel &amp; Ammon 2006). In addition, nebular emission and absorption are likely to significantly affect galaxy optical fluxes. It is not obvious if the transformations of stars with similar properties (i.e., metallicity and optical color) would accurately describe a transformation of an amalgamation of stars with a wide range of properties (i.e., a galaxy) and account for nebular emission and absorption. Although no previous study has investigated empirical galaxy transformations, the study of Blanton &amp; Roweis (2007) has characterized transformations derived from model-based galaxy templates. These templates are a linear combination between observed galaxy spectral energy distributions (SEDs) from large galaxy surveys (GALEX, SDSS, 2MASS, GOODS, DEEP2) and the stellar models of Bruzual &amp; Charlot (2003). Although these transformations were derived for galaxies, they are dependent upon stellar models which introduce uncertainty based upon model assumptions (e.g., age, metallicity, IMF, stellar mass-to-light ratios) in addition to assumptions of a galaxy's star formation history. It is not clear if transformations derived from model-based galaxy templates will accurately describe transformations for observed galaxy colors. This study utilizes the Local Volume Legacy (LVL Dale et al. 2009) survey galaxy sample to derive empirical SDSS-Johnson-Cousin transformations explicitly for galaxies. The LVL sample contains 90 galaxies with overlapping UBVR c and ugriz observational coverage. This data set is ideal to characterize these transformations since the LVL sample consists of galaxies with a wide range of properties (e.g., morphology, metallicity, optical luminosity and color, star formation rate, etc.). Furthermore, the sample is dominated by low-mass galaxies with low internal extinction (Dale et al. 2009, Cook et al. 2014c). These data in combination with previous stellar transformation relationships will facilitate an examination of how well stellar transformations describe galaxy transformations. In addition, we compare the LVL galaxy transformations to the Blanton &amp; Roweis (2007) transformations derived from model-based galaxy templates. ## 2 SAMPLE The LVL sample consists of 258 of our nearest galaxy neighbors reflecting a statistically complete, representative sample of the local universe. The sample selection and description are detailed in Dale et al. (2009), but we provide an overview here. The LVL sample was built upon the samples of two previous nearby galaxy surveys: ACS Nearby Galaxy Survey Treasury (ANGST; Dalcanton et al. 2009) and 11 Mpc H α and Ultraviolet Galaxy Survey (11 HUGS; Kennicutt et al. 2008; Lee et al. 2011). The final LVL sample consists of galaxies that appear outside the Galactic plane ( | b | &gt; 20 ), ◦ have a distance less than 11 Mpc ( D ≤ 11 Mpc), span an absolute B -band magnitude of -9 6 . &lt; M B &lt; -20 7 mag, . and span an RC3 catalog galaxy type range of -5 &lt; T &lt; 10. Consequently, the LVL sample contains low-mass dwarf and irregular galaxies, large spirals, and a few elliptical galaxies. There is significant UBVR c and ugriz observational overlap. A total of 49, 85, 39, and 88 galaxies with UBVR c observations, respectively, also have ugriz imaging available. Figure 1 presents histograms of the full LVL sample (unshaded) and a sub-sample with overlapping ugriz observational coverage (shaded). Both samples show relatively similar distributions of morphology, absolute B -band magnitude, star formation rate (SFR), and B -R optical color. The absolute B -band magnitudes and B -R optical colors are taken from Cook et al. (2014a; submitted). The SFRs are derived from the GALEX far-ultraviolet (FUV) magnitudes of Lee et al. (2011) and are transformed into SFRs via the prescription of Murphy et al. (2011). ## 3 DATA We utilize the UBVR c and ugri fluxes from the LVL global optical photometry study of Cook et al. (2014a; submitted). We do not use the z -band fluxes for our transformations since there are no corresponding I c -band fluxes. These data are fully described in Cook et al. (2014a), but we provide a brief overview here. The UBVR c ground-based data were taken from 1-2 meter class telescopes. The images were reduced via standard IRAF tasks and the resulting photometry was calibrated to the Johnson-Cousins magnitude system via Landolt standard star observations taken several times a night. Since the fluxes of Cook et al. (2014a) are published in the AB magnitude system, we have recovered the Vega magnitudes via the prescription of Blanton &amp; Roweis (2007). The SDSS data were downloaded from SDSS DR7 (Abazajian et al. 2009). For each galaxy, mosaic images were constructed using the utility SWARP (Bertin et al. 2002), sky-subtracted, and photometrically calibrated to the AB magnitude system; note that the SDSS magnitudes are corrected for AB magnitude offsets as prescribed by the DR7 data release website. 1 To ensure accurate photometric comparisons across different optical bandpasses, Cook et al. (2014a; submitted) removed contaminating foreground stars and background galaxies from the optical images. Contaminant regions were overlaid onto each optical image, visually inspected, and the contaminant region sizes were adjusted to account for the relative apparent brightness of each source. Each contaminant was removed through an interpolation of the surrounding local sky using the IRAF task IMEDIT. Global photometry is performed on both UBVR c and ugri images within identical apertures defined by Dale et al. (2009). These apertures were chosen to encompass the majority of the emission seen at GALEX UV (1500 ˚ -2300 ˚ ) A A and Spitzer IR (3.6 µ m-160 µ m) wavelengths, but we have visually checked to ensure that they are adequately large to encompass all of the optical emission of each galaxy. These apertures have a median semi-major axis ratio of 1.5 compared to R25 apertures (de Vaucouleurs et al. 1991). ## 4 RESULTS In this section we derive empirical color transformations for galaxies using a sub-sample of LVL with overlapping UBVR c and ugri imaging. We derive both ugri -toUBVR c and UBVR c -tougri transformations and quantify the accuracy of all possible color-color combinations via the RMS scatter and the resulting transformed minus observed magnitude for each color transformation. We compare these results to previous transformations and examine how well all transformations reproduce observed color-color trends. The LVL galaxy transformations show better agreement with observed magnitudes and colors compared to previous transformations. Figure 1. Distributions of RC3 morphology type taken from Kennicutt et al. (2008) (top left), absolute B -band magnitude (top right), star formation rate (bottom left), and ( B -V ) optical color (bottom right). The unshaded histograms show the entire sample of 258 galaxies, whereas the shaded portions indicate a sub-sample of galaxies with overlapping UBV R c and ugri observations. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-17fd4885-5785-46ee-b37b-e6cfa578fda2.jpg) ## 4.1 SDSS to Johnson-Cousins SDSS Transformations In this section we describe the methods used to derive the ugri -toUBVR c galaxy transformations. We quantify the accuracy of each transformation and compare them to previous transformations. In addition, we perform a second accuracy check by comparing transformed colors to observed color-color trends. ## 4.1.1 LVL Transformations for Galaxies To determine color transformations between the SDSS and Johnson-Cousins magnitude systems we examine all possible combinations of the difference in Johnson-Cousins and SDSS magnitudes versus SDSS colors (e.g., U -r versus g -r ). A least χ 2 fit is performed on each combination and the RMS scatter about the best-fit line is calculated. In addition, we calculate the median absolute difference between the transformed and observed magnitude (∆ M med ) for each color transformation. The combination of RMS scatter and ∆ M med values together quantify the accuracy of each color transformation. A low RMS scatter implies a well-behaved transformation (i.e., most galaxies show agreement with the best fit transformation). The ∆ M med values quantify how accurately the transformation (i.e. the best-fit line to the data) reproduces the typical observed magnitudes for the sample. The top panel of Figure 2 shows ∆ M med versus the RMS scatter of each LVL color transformation. Above an RMS value of ∼ 0 12 magnitudes, there exists a lower en-. Table 1. The ugri -toUBVR c transformation equations and coefficients for galaxies derived from a sub-sample of LVL where there exists an overlap between UBV R c and ugri imaging. The last column lists the RMS scatter of the LVL galaxy colors around the least χ 2 fit for each transformation. | Color | Color Transformation | RMS (mag) | |---------|-----------------------------------------------------|-------------| | U - i = | ( 1 . 93 ± 0 . 06)( g - i ) +( - 0 . 48 ± 0 . 04) | 0 . 09 | | B - i = | ( 1 . 27 ± 0 . 03)( g - i ) +( 0 . 16 ± 0 . 01) | 0 . 04 | | V - u = | ( - 0 . 82 ± 0 . 03)( u - r ) +( - 0 . 02 ± 0 . 04) | 0 . 03 | | R - u = | ( - 1 . 06 ± 0 . 02)( u - r ) +( - 0 . 11 ± 0 . 03) | 0 . 08 | velope in ∆ M med where the transformed magnitudes are increasingly inconsistent with the observed magnitude (i.e., higher ∆ M med ). This trend suggests that transformations with low RMS scatter should result in good agreement between transformed and observed magnitudes. However, there are a number of color transformations with low RMS scatter ( &lt; 0 12 . mag) but relatively high ∆ M med values ( &gt; 0.05 mag). Thus a combination of low RMS scatter and low ∆ M med would provide the best available transformation for each filter. If we treat the RMS scatter and ∆ M med values as a measure of each transformation's uncertainty, we can add these quantities in quadrature, identify the lowest value as the transformation with the lowest uncertainty, and thus identify the best available transformation. Figure 2. The median absolute difference between the transformed and observed magnitudes (∆ M med ) versus the RMS scatter of each color transformation. Top panel: all possible colorcolor transformation combinations of the LVL sub-sample with overlapping UBVR c and ugri imaging. Bottom panel: transformations of previous studies derived from standard calibration stars overplotted onto the data of the top panel which are now presented as 'plus' signs. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-3503c194-fb8f-42a3-8403-bc8697e04ecd.jpg) There are several B -and V -band transformations where both the RMS scatter and ∆ M med values fall below 0.05 magnitudes. Also, the R c -band transformations show low ∆ M med values (∆ M med &lt; . 0 05) but slightly higher RMS scatter (0 05 . &lt; RMS &lt; 0 12). For these three band-. passes ( BVR c ), we choose the transformation with the lowest RMS and ∆ M med values added in quadrature. There are several U -band transformations which show low RMS scatter ( &lt; 0 12 mag) but all show relatively high . ∆ M med values ( ≥ 0.1 mag) compared to other bandpasses. The transformation with the lowest RMS and ∆ M med value added in quadrature falls on Figure 2 at an RMS of ∼ 0 09 . and ∆ M med value of ∼ 0 1 . magnitudes, respectively. The equations and best fit parameters of the ugri -toUBVR c LVL galaxy transformations are shown in Table 1. The individual LVL color transformation relationships are graphically presented in Figure 3. ## 4.1.2 Previous Transformations We also test how well the LVL galaxy colors are described by previous SDSS transformations. The studies of Jester et al. (2005), Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007) derived ugriz -toUBVR I c c transformations while R. Lupton's (2005, hereafter L05) 2 transformations derived ugriz -toBVR I c c transformations; there Figure 3. The color-color relationships used to define the LVL galaxy transformations. The solid black line is the least χ 2 fit to the galaxy colors and represent the LVL galaxy transformations. The fit parameters are listed in the caption as well as in Table 1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-70cc03d3-b3dc-412e-95d2-cfc64ddf4804.jpg) are no U -band transformations for L05. The studies of L05, Jester et al. (2005), and Jordi, Grebel &amp; Ammon (2006) utilized either Landolt standard stars (Landolt 1992) or an extension of Landolt's standard stars (Stetson 2000) to derive stellar transformations, while Blanton &amp; Roweis (2007) utilized model-based galaxy templates to derive galaxy transformations. Figure 4 graphically presents the color transformation relationships of these previous studies with the LVL galaxy colors overplotted. Any previous transformation which utilizes I -band photometry has been omitted since the study of Cook et al. (2014a; submitted) did not publish such measurements. The LVL galaxy colors show a significant amount of scatter around most of these relationships and/or there exists an offset between the LVL derived best-fit and those derived from standard stars and model-based galaxy templates. We calculate the RMS scatter of the LVL galaxy colors around the previously published best fit lines and the ∆ M med values to quantify the accuracy of the previous transformations on galaxy colors. The results are graphically show in the bottom panel of Figure 2. The previous transformations show a similar trend across UBVR c filters to those of LVL where the transformations of both the B -and V -band show low RMS scatter and ∆ M med values, the R c -band show higher RMS scatter but low ∆ M med values, and the U -band show relatively high RMS scatter and ∆ M med values. Although some of the B -, V -, and R c -band transformations of previous studies provide reasonably low ∆ M med values, most of the corresponding color-color relationships 2 https://www.sdss3.org/dr10/algorithms/sdssUBVRITransform.php show poor fits to observed galaxy colors. In addition, Fig- ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-e143554a-bd43-4726-9619-3800d7c069cf.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-41b26bd7-1c14-4032-b591-870db2301514.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-00109878-0bf1-43f4-9a10-e9dbb0c25e74.jpg) Figure 4. The color-color relationships used to derive the previous transformations of Jester et al. (2005), L05, Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007). The open diamonds represent the observed LVL galaxy colors and the black solid line represents the best-fit line to the data. The dashed, long-dashed, dashed-dot, and dashed-dot-dot lines represent the best-fit lines published by the studies of Jester et al. (2005), L05, Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007), respectively. Most panels show significant galaxy scatter or an offset between the LVL and stellar transformation best-fit line. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-b14db94b-d653-44a1-8bf4-a15d161de17f.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-afb30608-dc9a-4f49-b78f-c6bd480f8185.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-2422ed34-743c-4c9b-9a41-853bc7d4f66c.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-d61ec0f9-04e4-4477-8ca0-ebdfede4b1df.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-a3a2665e-67ed-4103-9645-374e6f828a68.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-9a2b7410-3f7d-4d5a-a482-c717796ce646.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-9884443d-0b75-4577-b36d-196a393ae2c5.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-383328ea-e085-4fb8-9cf2-d52ec11efc79.jpg) ure 2 shows that for every transformation derived in previous studies there exists an LVL transformation with a lower RMS scatter and ∆ M med value in every bandpass. Furthermore, the U -band transformations provide the highest contrast between the accuracies of the LVL and previous transformations. There are many LVL U -band transformations which are significantly lower in both RMS scatter and ∆ M med values compared to the best U -band transformation derived from previous studies. ## 4.1.3 Observed Color-Color Trends The RMS scatter and ∆ M med values provide one way to quantify the accuracy of each transformation. Another means to test the accuracy of color transformations is to propagate the transformed magnitudes into colors and examine how well these transformed colors reproduce observed color-color trends. In general, galaxies show correlations between different optical colors with varying amounts of scatter (e.g., Blanton et al. 2003, Cook et al. 2014a; submitted). This scatter is reduced when the flux within each bandpass is corrected for internal extinction due to dust (Cook et al. 2014c; submitted). To test how well the LVL and previous transformations reproduce observed color-color relationships we correct both the transformed and observed LVL galaxy fluxes for extinction due to dust. The extinction corrections in each optical bandpass are carried out by Cook et al. (2014c; submitted) and are fully described there. Note that correcting for internal dust extinction does not change the difference between transformed and observed colors, but visually highlights any differences in color-color trends which are consequently tighter due to dust corrections. Quantities in this study which have been corrected for internal extinction due to dust are denoted with a subscript '0' and represent an intrinsic measurement. Figures 5 and 6 show two color-color relationships where the observed UBVR c colors show relatively tight correlations with each other. The panels of Figures 5 and 6 present the observed-only color-color trend for a visual reference and subsequent comparison panels between observed and transformed colors. These comparison panels show colors transformed via the prescriptions of L05, Jester et al. (2005), Jordi, Grebel &amp; Ammon (2006), Blanton &amp; Roweis (2007), and the LVL galaxy prescriptions presented in Table 1. When multiple previous transformations exist for a given bandpass, we choose the one which yielded the lowest ∆ M med value in the bottom panel of Figure 2. Figure 5 shows the ( B -V ) 0 versus ( B -R ) 0 relationship where panel (a) is the observed trend with no transformed colors overplotted, panel (b) has the transformed colors via the prescription of L05 overplotted, panel (c) has the transformed colors via the prescription of Jester et al. (2005) overplotted, panel (d) has the transformed colors via the prescription of Jordi, Grebel &amp; Ammon (2006) overplotted, panel (e) has the transformed colors via the prescription of Blanton &amp; Roweis (2007) overplotted, and panel (f) has the LVL transformed colors overplotted. Visual inspection of Figure 5 shows significant disagreement between the observed color-color trend and the transformed colors of L05 in both slope and color offset. The transformed colors of Jester et al. (2005), Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007) show similar slopes to that of the observed trend, but the Jordi, Grebel &amp; Ammon (2006) transformations show a noticeable offset. Although the transformed colors of Jester et al. (2005) show a similar slope to that of the observed colors there is an offset which is less obvious at first glance. Table 2 shows the median color difference between the transformed and observed colors for the LVL and previous transformations. The median ∆( B -R ) 0 and ∆( B -V ) 0 color differences for Jester et al. (2005) show that both colors are redder by 0.16 and 0.1 magnitudes, respectively. The ratio of ∆( B -R ) 0 -to-∆( B -V ) 0 represents the slope at which the Jester et al. (2005) colors are shifted and is similar to the slope of the ob- Figure 5. The color-color relationship between ( B -R ) 0 and ( B -V ) 0 where the flux of each bandpass in both colors have been corrected for internal extinction due to dust and Milky Way foreground extinction. Panel (a) is the observed trend with no transformed colors overplotted, panel (b) has the transformed colors via the prescription of L05 overplotted, panel (c) has the transformed colors via the prescription of Jester et al. (2005) overplotted, panel (d) has the transformed colors via the prescription of Jordi, Grebel &amp; Ammon (2006) overplotted, panel (e) has the transformed colors via the prescription of Blanton &amp; Roweis (2007) overplotted, and panel (f) has the LVL transformed colors overplotted. Each of the stellar transformed colors show color offsets in both axes. These offsets are quantified in Table 2. The LVL transformed colors show good agreement with the observed color trend. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-bb87d504-0d3a-4392-847f-6499ce18596a.jpg) Table 2. The median color differences between the ugri -toUBV R c transformed and observed colors for the LVL galaxy transformations and those derived in previous transformations. The flux of each bandpass for all colors have been corrected for internal extinction due to dust. | Color | Study | ∆ color (mag) | |----------------------------------|--------------------------|-----------------| | ( U - B ) 0 .................... | Jester et al. (2005): | 0 . 15 | | ( U - B ) 0 .................... | Jordi et al. (2006): | 0 . 11 | | ( U - B ) 0 .................... | Blanton & Roweis (2007): | 0 . 13 | | ( U - B ) 0 .................... | LVL: | 0 . 04 | | ( U - V ) 0 .................... | Jester et al. (2005): | 0 . 29 | | ( U - V ) 0 .................... | Jordi et al. (2006): | 0 . 23 | | ( U - V ) 0 .................... | Blanton & Roweis (2007): | 0 . 14 | | ( U - V ) 0 .................... | LVL: | 0 . 06 | | ( U - R ) 0 .................... | Jester et al. (2005): | 0 . 24 | | ( U - R ) 0 .................... | Jordi et al. (2006): | 0 . 02 | | ( U - R ) 0 .................... | Blanton & Roweis (2007): | 0 . 06 | | ( U - R ) 0 .................... | LVL: | - 0 . 01 | | ( B - V ) 0 .................... | Jester et al. (2005): | 0 . 10 | | ( B - V ) 0 .................... | Lupton (2005): | 0 . 13 | | ( B - V ) 0 .................... | Jordi et al. (2006): | 0 . 08 | | ( B - V ) 0 .................... | Blanton & Roweis (2007): | - 0 . 03 | | ( B - V ) 0 .................... | LVL: | 0 . 01 | | ( B - R ) 0 .................... | Jester et al. (2005): | 0 . 16 | | ( B - R ) 0 .................... | Lupton (2005): | 0 . 50 | | ( B - R ) 0 .................... | Jordi et al. (2006): | - 0 . 01 | | ( B - R ) 0 .................... | Blanton & Roweis (2007): | 0 . 01 | | ( B - R ) 0 .................... | LVL: | 0 . 01 | | ( V - R ) 0 .................... | Jester et al. (2005): | 0 . 05 | | ( V - R ) 0 .................... | Lupton (2005): | 0 . 31 | | ( V - R ) 0 .................... | Jordi et al. (2006): | - 0 . 10 | | ( V - R ) 0 .................... | Blanton & Roweis (2007): | 0 . 03 | | ( V - R ) 0 .................... | LVL: | - 0 . 01 | served color-color trend (ratio of ∆ y -to-∆ x ∼ 1.5). Thus, the Jester et al. (2005) transformations show a similar ( B -R ) 0 and ( B -V ) 0 slope to that of the observed colors, but exhibit a systematic offset along the observed color-color relationship to redder colors (up and to the right in Figure 5). Both the LVL and Blanton &amp; Roweis (2007) transformations show similar agreement between the transformed and observed color slopes in Figure 5, and show small color offsets in Table 2. However, the LVL transformed colors consistently exhibit the lowest, or similar to the lowest, median color differences in all colors; especially those which involve U -band transformations. Figure 6 shows another observed color-color trend where there exists a correlation between ( U -R ) 0 and ( B -V ) 0 . Note that there is no L05 panel in Figure 6 since there are no L05 U -band transformations. Figure 6 shows that the Jester et al. (2005), Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007) transformations show a similar slope compared to the observed trend, but the transformed colors of both SDSS Transformations | Color | Color Transformation | Color Transformation | RMS (mag) | |---------|------------------------|---------------------------------------------------|-------------| | u - V | = | ( 2 . 05 ± 0 . 12)( B - V ) +( 0 . 10 ± 0 . 06) | 0 . 06 | | g - V | = | ( 0 . 70 ± 0 . 06)( B - V ) +( - 0 . 17 ± 0 . 03) | 0 . 05 | | r - B | = | ( - 1 . 42 ± 0 . 08)( B - V ) +( 0 . 01 ± 0 . 04) | 0 . 06 | | i - V | = | ( - 2 . 29 ± 0 . 23)( V - R ) +( 0 . 48 ± 0 . 09) | 0 . 06 | Table 3. The UBVR c -tougri transformation equations and coefficients for galaxies. The last column lists the RMS scatter of the LVL galaxy colors around the least χ 2 fit for each transformation. Jordi, Grebel &amp; Ammon (2006) and Blanton &amp; Roweis (2007) show a noticeable offset. Inspection of Table 2 reveals that the Jester et al. (2005) transformations have redder median colors in both ( U -R ) 0 and ( B -V ) 0 similar to the observed color-color slope indicating a systematic offset along the observed color-color relationship. Furthermore, Table 2 shows that all previous transformations exhibit greater median color differences compared to the LVL transformations. The LVL transformations show good agreement with the color-color trend in Figure 6 and no systematic offset in the median color differences in Table 2. In addition, only the LVL transformations show small median color differences in colors which involve U -band transformations. Although, some of the previous transformations show good agreement with some observed color trends, only the LVL transformations show consistent agreement across all colors. ## 4.2 Johnson-Cousins to SDSS In this section we derive the UBVR c -tougri galaxy transformations with identical methods to those described in § 4.1. We verify the accuracy of these transformations and compare them to previous transformations via observed ugri color-color trends. However, we only present these results in tabular format since we observe similar trends to those found in § 4.1. ## 4.2.1 LVL Transformations for Galaxies We examine all possible combinations of SDSS minus Johnson-Cousins magnitudes versus Johnson-Cousins colors to derive the LVL galaxy transformations. The RMS scatter and ∆ M med values are calculated for each transformation. The ∆ M med versus RMS scatter plot for these transformations (not shown for brevity) has a similar overall structure to that of Figure 2. There are multiple ugri -band transformations with low RMS scatter and ∆ M med values ( &lt; 0.1 mag). For these bandpasses ( ugri ), we choose the transformations with the lowest RMS and ∆ M med added in quadrature (see § 4.1.1). There are no z -band transformations derived in this study due a lack of corresponding I c -band fluxes. The UBVR c -tougri galaxy transformation equations and best-fit parameters are presented in Table 3 Figure 6. The color-color relationship between ( U -R ) 0 and ( B -V ) 0 . Panel (a) is the observed trend with no transformed colors overplotted, panel (b) has the transformed colors via the prescription of Jester et al. (2005) overplotted, panel (c) has the transformed colors via the prescription of Jordi, Grebel &amp; Ammon (2006) overplotted, panel (d) has the transformed colors via the prescription of Blanton &amp; Roweis (2007) overplotted, and panel (e) has the LVL transformed colors overplotted. Each of the stellar transformed colors show color offsets in both axes. These offsets are quantified in Table 2. The LVL transformed colors show good agreement with the observed color trend. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1131v1-figure-5a0d1b8e-54fd-47bf-9744-da654ce77cbd.jpg) ## 4.2.2 Previous Transformations We also compare the LVL UBVR c -tougri galaxy transformations to those of previous studies. However, the study of L05 does not provide Johnson-Cousins-to-SDSS transformations, thus there are no comparisons with the L05 study. Furthermore, no i -band transformation comparisons can be made with any previous study since these transformations require I c -band photometry which are not available for the LVL sample of galaxies. Visual inspection of the previous transformation relationships with LVL galaxy colors overplotted (not shown for brevity) reveals similar results to those seen in Figure 4. The LVL galaxy colors show large scatter around the previous transformation relationships and/or there exists significant deviations between the LVL best fits and those derived in previous studies. To quantify the accuracy of previous transformations on galaxy colors we calculate the RMS scatter of the LVL galaxy colors around the previously published best fit line and ∆ M med values. The results are not graphically shown for brevity but yield similar results to the bottom panel of Figure 2. All of the g -band and only one of the r -band transformations derived from previous studies yield low RMS scatter and ∆ M med values ( &lt; 0.1 mag). However, all of the u -and most of the r -band transformations show relatively high RMS scatter (0 1 . &lt; RMS &lt; 0 2) and ∆ . M med values (0 1 . &lt; ∆ M med &lt; 0 3). . For every transformation of previous studies there exists an LVL transformation with a lower RMS scatter and ∆ M med value in every available bandpass. ## 4.2.3 Observed Color-Color Trends Due to the availability of only three transformed ugri filters, we examine only one observed color-color trend which is not shown for brevity: ( g -r ) 0 versus ( u -r ) 0 . We find similar results to those seen in Figure 6 where the Jester et al. (2005), Jordi, Grebel &amp; Ammon (2006), and Blanton &amp; Roweis (2007) transformations show similar slopes to the observed color-color trends, but the transformed colors of both Jordi, Grebel &amp; Ammon (2006) and Blanton &amp; Roweis (2007) show a noticeable offset. Furthermore, the transformed colors of Jester et al. (2005) show an offset in both colors which are similar to the observed colorcolor relationship slope which indicates a systematic color offset. Although we do not show this color-color figure, we have provided the median color differences in Table 4. The LVL galaxy transformations show good agreement with the observed color-color trends and show no systematic color differences in Table 4. In addition, the LVL transformations consistently show smaller color differences when compared to previous transformations. These results suggest that the LVL galaxy transformations more accurately describe the SDSS-Johnson-Cousins color relationships for galaxies. ## 4.3 Summary We have derived empirical color transformations for galaxies between the SDSS ugri and Johnson-Cousins UBVR c photometric systems. We utilize the LVL nearby galaxy sample which consists of normal, non-starbursting galaxies. The data are taken from the LVL global optical photometry study of Cook et al. (2014a; submitted) where the fluxes were measured within identical apertures across all optical bandpasses to ensure consistent photometric comparisons. The LVL galaxy transformations are derived via an analysis of all possible color transformation combinations. The accuracy of each transformation is quantified via the RMSscatter around the least χ 2 fit and the median absolute difference between the resulting transformed and observed magnitudes (∆ M med ). We also compared our results to those of previous SDSS transformations derived from standard calibration stars (L05; Jester et al. 2005; Jordi, Grebel &amp; Ammon 2006) and Median Color Differences | Color | Study | ∆ color (mag) | |----------------------------------|--------------------------|-----------------| | ( u - g ) 0 .................... | Jester et al. (2005): | - 0 . 22 | | | Jordi et al. (2006): | - 0 . 08 | | | Blanton & Roweis (2007): | - 0 . 12 | | | LVL: | 0 . 01 | | ( u - r ) 0 .................... | Jester et al. (2005): | - 0 . 34 | | | Jordi et al. (2006): | - 0 . 04 | | | Blanton & Roweis (2007): | 0 . 07 | | | LVL: | - 0 . 01 | | ( u - i ) 0 .................... | LVL: | 0 . 09 | | ( g - r ) 0 .................... | Jester et al. (2005): | - 0 . 10 | | | Jordi et al. (2006): | 0 . 01 | | | Blanton & Roweis (2007): | 0 . 15 | | | LVL: | 0 . 01 | | ( g - i ) 0 .................... | LVL: | 0 . 03 | | ( r - i ) 0 .................... | LVL: | 0 . 04 | Table 4. The median color differences between the UBVR c -tougri transformed and observed colors for the LVL galaxy transformations and those derived in previous transformations. model-based galaxy templates (Blanton &amp; Roweis 2007). The RMS scatter of LVL galaxy colors around each of the previously published transformations was calculated in addition to the resulting ∆ M med value. The observed galaxy colors show large scatter and/or significant offsets for most of the previous color-color relationships. Although some of the previous transformations yielded reasonable RMS scatter and ∆ M med values in some filters, there are other filters (i.e., U -and u -band) where no previous transformation showed reasonable RMS scatter and ∆ M med values ( &lt; 0.15 mag). In addition, for each filter there exists multiple LVL transformations with lower RMS scatter and ∆ M med values compared to the best stellar and model-based galaxy transformations. A secondary check on the accuracy of both the LVL and previous transformations was performed by propagating the transformed magnitudes into colors and comparing them to observed color-color trends. We found that all previous transformations showed significant color offsets ( &gt; 0.1 mag) in more than one color. In general, the model-based galaxy transformations of Blanton &amp; Roweis (2007) showed smaller median color differences compared to the stellar transformations, but the LVL transformations consistently showed either the smallest, or similar to the smallest, median color difference in all colors. These results suggest that neither the stellar nor the model-based galaxy transformations can accurately describe all color transformations for observed galaxies when compared to the empirically derived LVL-based galaxy transformations. ## REFERENCES Abazajian K. N. et al., 2009, ApJS, 182, 543 Bertin E., Mellier Y., Radovich M., Missonnier G., Didelon P., Morin B., 2002, in Astronomical Society of the Pacific Conference Series, Vol. 281, Astronomical Data Analysis Software and Systems XI, Bohlender D. A., Durand D., Handley T. H., eds., p. 228 Blanton M. R. et al., 2003, ApJ, 594, 186 Blanton M. R., Roweis S., 2007, AJ, 133, 734 Bruzual G., Charlot S., 2003, MNRAS, 344, 1000 Cousins A. W. J., 1976, Monthly Notes of the Astronomical Society of South Africa, 35, 70 Dalcanton J. J. et al., 2009, ApJS, 183, 67 Dale D. A. et al., 2009, ApJ, 703, 517 de Vaucouleurs G., de Vaucouleurs A., Corwin, Jr. H. G., Buta R. J., Paturel G., Fouqu´ P., 1991, Third Reference e Catalogue of Bright Galaxies. Volume I: Explanations and references. Volume II: Data for galaxies between 0 h and 12 h . Volume III: Data for galaxies between 12 h and 24 h . Jester S. et al., 2005, AJ, 130, 873 Johnson H. L., Morgan W. W., 1953, ApJ, 117, 313 Jordi K., Grebel E. K., Ammon K., 2006, A&amp;A, 460, 339 Karaali S., Bilir S., Tun¸el S., 2005, PASA, 22, 24 c Kennicutt, Jr. R. C., Lee J. C., Funes, Jos´ G. S. J., Sakai e S., Akiyama S., 2008, ApJS, 178, 247 Landolt A. U., 1992, AJ, 104, 340 Lee J. C. et al., 2011, ApJS, 192, 6 Murphy E. J. et al., 2011, ApJ, 737, 67 Rodgers C. T., Canterna R., Smith J. A., Pierce M. J., Tucker D. L., 2006, AJ, 132, 989 Smith J. A. et al., 2002, AJ, 123, 2121 Stetson P. B., 2000, PASP, 112, 925 Thuan T. X., Gunn J. E., 1976, PASP, 88, 543 West A. A., Walkowicz L. M., Hawley S. L., 2005, PASP, 117, 706 York D. G. et al., 2000, AJ, 120, 1579
10.1093/mnras/stu1581
[ "David O. Cook", "Daniel A. Dale", "Benjamin D. Johnson", "Liese Van Zee", "Janice C. Lee", "Robert C. Kennicutt", "Daniela Calzetti", "Shawn M. Staudaher", "Charles W. Engelbracht" ]
2014-08-05T22:09:35+00:00
2014-08-05T22:09:35+00:00
[ "astro-ph.GA" ]
Empirical ugri-UBVRc Transformations for Galaxies
We present empirical color transformations between Sloan Digital Sky Survey ugri and Johnson-Cousins UBVRc photometry for nearby galaxies (D < 11 Mpc). We use the Local Volume Legacy (LVL) galaxy sample where there are 90 galaxies with overlapping observational coverage for these two filter sets. The LVL galaxy sample consists of normal, non-starbursting galaxies. We also examine how well the LVL galaxy colors are described by previous transformations derived from standard calibration stars and model-based galaxy templates. We find significant galaxy color scatter around most of the previous transformation relationships. In addition, the previous transformations show systematic offsets between transformed and observed galaxy colors which are visible in observed color-color trends. The LVL-based $galaxy$ transformations show no systematic color offsets and reproduce the observed color-color galaxy trends.
1408.1132v1
## Status of the KM3NeT project ## A. Margiotta a on behalf of the KM3NeT Collaboration a viale C. Berti-Pichat, 6/2, 40127 - Bologna, Italy E-mail: [email protected] INFN Sezione di Bologna and Dipartimento di Fisica e Astronomia - Università di Bologna, ABSTRACT: KM3NeT is a deep-sea research infrastructure being constructed in the Mediterranean Sea. It will be installed at three sites: KM3NeT-Fr, offshore Toulon, France, KM3NeT-It, offshore Portopalo di Capo Passero, Sicily (Italy) and KM3NeT-Gr, offshore Pylos, Peloponnese, Greece. It will host the next generation Cherenkov neutrino telescope and nodes for a deep sea multidisciplinary observatory, providing oceanographers, marine biologists, and geophysicists with real time measurements. The neutrino telescope will search for Galactic and extra-Galactic sources of neutrinos, complementing IceCube in its field of view. The detector will have a modular structure and consists of six building blocks, each including about one hundred Detection Units (DUs). Each DU will be equipped with 18 multi-PMT digital optical modules. The first phase of construction has started and shore and deep-sea infrastructures hosting the future KM3NeT detector are being prepared in France near Toulon and in Italy, near Capo Passero in Sicily. The technological solutions for KM3NeT and the expected performance of the detector are presented and discussed. KEYWORDS: High-energy neutrinos; Neutrino telescopes; Photomultipliers; KM3NeT. ## Contents | 1. | Introduction | Introduction | 1 | |------|-------------------------------|-------------------------------|-----| | 2. | Neutrino telescopes | Neutrino telescopes | 1 | | 3. | The physics case | The physics case | 3 | | 4. | Sites and technology | Sites and technology | 5 | | | 4.1 | Sites | 5 | | | 4.2 | Technology | 6 | | 5. | Present status of the project | Present status of the project | 8 | | 6. | Conclusions | Conclusions | 9 | ## 1. Introduction The characteristics of the neutrino make it the perfect astronomical probe, able to cross extremely large distances and to transport information directly from the core of its production sites. Until recently this idea was shown to be successful in two major occasions: when detectors on Earth intercepted neutrinos coming from the Sun [1] and neutrinos produced during a SuperNova explosion in the Large Magellanic Cloud [2]. In the first case the evidence of a tiny neutrino mass and of flavor oscillations was settled. The second measurement confirmed the basic nuclear processes of stellar collapses. Recently, the first evidence of a high energy neutrino flux was announced by the IceCube Collaboration [3]. A bunch of neutrinos, whose energy ranges from 60 TeV to more than 1 PeV, from unresolved sources has been detected. This claim can be considered the opening of a new era for the exploration of the Universe, the age of neutrinos. The same features making neutrinos so useful in the exploration of the far Universe and of dense astrophysical objects put severe constraints on the construction of an appropriate neutrino detector, requiring the instrumentation of huge amount of matter. ## 2. Neutrino telescopes In the 60s Markov suggested the use of ocean or lake water as target and active medium for neutrino detectors [4]. This idea is at the basis of the neutrino telescope concept. The neutrino telescope detection principle relies on the measurement of the Cherenkov light emitted in a natural transparent medium, like water or ice, along the path of charged particles produced in neutrino interactions in the vicinity of a three dimensional array of photon detectors. Figure 1. Flux of i ) atmospheric muons (computed according to [5]) at two different depths and of ii ) atmospheric neutrino induced muons (from [6]), for two different muon energy thresholds. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-9604c213-835f-44c4-9768-5cd0bf71510b.jpg) Due to the long muon path length, the effective size of the detector is much larger for charged current muon neutrino interactions than for other channels. Starting from time, position and amplitude of the photon signals, dedicated algorithms can reconstruct the trajectory of the muons, inferring the neutrino direction. The neutrino and the muon directions are almost collinear at high energy, and this allows the identification of a possible source with high resolution. Measuring the total amount of light released in the detector, also the energy of the event can be evaluated within a factor 2-3. Neutrino telescopes are located under large layers of matter, buried in the Antarctic ice or submersed under kilometers of sea water, to stop the bulk of cosmic radiations. Indeed, the flux of high energy atmospheric muons, produced in the interactions of primary cosmic rays with atmospheric nuclei, exceeds that of atmospheric neutrinos by several orders of magnitude, even at very large depth, see Fig. 1. An efficient method to select neutrino-induced muons relies on the geometrical selection of reconstructed tracks, which rejects downward going muons due to atmospheric showers. A source of background that cannot be eliminated with simple geometrical criteria is represented by atmospheric neutrinos. A cosmic neutrino flux can be identified either by looking for an excess of events over the atmospheric neutrino background, or searching for a deformation of the atmospheric neutrino energy spectrum, typically due to an excess of events above a certain energy. A search for coincident events with other astrophysical messengers provides a further possibility to reduce the background, looking for neutrino candidates at a specific time and from known directions. This approach can be applied to transient sources like gamma ray bursts or micro quasars. At present, an under-ice neutrino telescope, with an instrumented volume of about 1 km , is oper3 ated at South Pole, IceCube [7]. Underwater detectors have been built in the lake Baikal, in Russia, and in the Mediterranean Sea. Currently, the Baikal neutrino telescope is not taking data, due to an upgrade that will extend its volume to 1 Gton [8]. In the Mediterranean Sea, three collaborations, ANTARES [9], NEMO [10] and NESTOR [11], have been active since a couple of decades. The ANTARES collaboration built a 0.1 km 3 neutrino telescope close to the Provencal coast, in France. It is taking data in its full configuration since 2008. The ANTARES, NEMO and NESTOR groups joined their efforts in long term R&amp;D activities creating the KM3NeT consortium, funded by the EU in the framework of FP6 and FP7 in the period 2006-2012 1 . In this context, new technological solutions have been developed and deep sea sites were accurately characterized. At the beginning of 2013, the consortium has been transformed into a collaboration and started the construction of a KM3NeT Mediterranean neutrino telescope. The KM3NeT Collaboration gathers more than two hundred scientists and engineers from ten European countries. Its main objective is the construction of a multidisciplinary observatory in the Mediterranean Sea, which will host a km 3 -size neutrino telescope, complementary to the IceCube detector in its field of view. In particular it will look directly to the Galactic centre. The KM3NeT infrastructure will include also a number of sea and Earth science devices that will provide biologists, geophysicists, marine scientists with data collected at very large depth and will monitor the environmental conditions around the telescope. ## 3. The physics case More than one century after their discovery [12], the origin and the acceleration mechanism of cosmic rays impinging on the Earth atmosphere have not been completely clarified yet. Primary cosmic rays are fully ionized atomic nuclei, mainly free protons. Their energy spectrum spans over several decades from some MeV up to 10 20 eV and falls steeply, showing some typical features connected to the specific production sites of the particles. The slope of the energy spectrum shown in Fig. 2 changes near 10 6 GeV, the knee , and around 10 10 GeV, the ankle . Galactic Supernova remnants are generally considered as potential sites of production and acceleration of galactic CRs, below the knee energy. More energetic CR cannot be explained with a Galactic origin.The same astrophysical accelerators, Galactic and extra-Galactic, could be the responsible for production of TeV gamma rays detected by several ground based instruments [14] and for other extremely energetic phenomena like gamma ray bursts. In the framework of a beam dump scenario, neutrinos can be produced in association with high energy gamma rays as the result of pion decay (hadronic model) when the accelerated hadrons, present in the core of massive objects, interact with ambient matter or photon fields: $$p / A + A / \gamma \longrightarrow \begin{array} { c c c } \pi ^ { 0 } & + \pi ^ { \pm } & + N + \dots \\ \downarrow & \downarrow & \downarrow \\ \gamma + \gamma & \mu ^ { \pm } + \nu _ { \mu } \left ( \overline { \nu } _ { \mu } \right ) \\ \downarrow & \downarrow \\ e ^ { \pm } + \nu _ { e } \left ( \overline { \nu } _ { e } \right ) + \overline { \nu } _ { \mu } \left ( \nu _ { \mu } \right ) \end{array}$$ 1 FP6 Design Study; Project Acronym: KM3NET; Project Reference: 011937. FP7 Preparatory Phase; Project Acronym: KM3NET-PP; Project Reference: 212525 Figure 2. Cosmic ray spectrum as measured on Earth. The contributions of protons, electrons, positrons and antiprotons at low energy, when measurements are available, are also reported. References to the experiments can be found in [13]. The figure is due to Tom Gaisser. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-88e370fe-3ed3-48b9-b9ee-0dac99d0a7fc.jpg) Differently from what happens to other astrophysical messengers, they can deliver direct information on their production sites, because they are not deflected by magnetic fields, are stable and have a small interaction cross section. Starting from the hypothesis of a common origin of neutrinos and gamma rays, benchmark fluxes have been evaluated and published in literature, which set the size of an astrophysical neutrino detector to the kilometre cube scale [15] [16]. The main goal of the KM3NeT telescope is the discovery of high-energy neutrino Galactic sources. Its location is optimal to look directly at the Galactic centre, which hosts several TeV gamma-ray sources that, in a hadronic scenario, could emit measurable neutrino fluxes. The excellent optical properties of water (scattering and absorption lengths) allow the reconstruction of muon tracks with an angular resolution better than one degree in the energy range where a signal is expected (a few TeV to a few 10 TeV). This makes the charged current interactions of muon neutrinos in the vicinity of the detector the golden channel for source identification. Nevertheless, other channels, like neutral current interactions, will be explored as well. In the case of shower-like events, the angular resolution is expected to be around 10-15 degrees. An intense work of simulation has been carried out in order to optimize the detector design to Galactic sources discovery. In particular, the supernova remnant RXJ1713.7-3946 and the pulsar wind nebula Vela X have been studied, because gamma rays in the TeV region, which can be explained with the hypothesis of hadronic mechanisms acting inside these objects, have been measured coming from their directions. Assuming an exponential cut-off power law for the neutrino energy spectrum and simulating different solutions for the detector design, the conclusion is that, with the detector arrangement described in section 4.2, KM3NeT can claim a discovery after about 5 years of data taking, and the observation at a significance level of 3 s with 50%CL after 2 years, for RXJ1713.7-3946. A shorter data collection time (about 3 years for the discovery and slightly Figure 3. Location of the three proposed sites for the construction of the KM3NeT neutrino telescope in the Mediterranean Sea. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-11d21b73-16b8-4380-a31e-08d755a68e26.jpg) more than 1 year for the observation) would be necessary in the case of Vela X [17]. Data from the Fermi Large Area Telescope showed evidence of the emission of high energy gamma rays from two large areas, in the region above and below the Galactic Center, the so-called "Fermi bubbles" [18]. Assuming a hadronic mechanism for the gamma ray production from the Fermi bubbles, a high energy neutrino flux is also expected. If the gamma production is completely due to hadronic processes, the results of Monte Carlo simulations [19] indicate that a discovery is possible in about one year of KM3NeT operation. ## 4. Sites and technology ## 4.1 Sites Three sites have been identified as good locations for the KM3NeT, see Fig. 3: - · KM3NeT-Fr: this site is close to the ANTARES detector site, at a depth of about 2500 m, 20 km from the coast, south of Toulon; - · KM3NeT-It: this is the site chosen by the NEMO Collaboration for the deployment of a prototype tower, which has been acquiring data since March 2013 [20]. It is at 3500 m under sea level at about 100 km from Capo Passero, in Sicily. - · KM3NeT-Gr: this is the deepest site of the three proposed locations, at 4500/5000 m under sea level, at about 30 km southwest of Pylos, in Greece. Accurate simulations show that the global sensitivity to neutrino sources is not reduced if a distributed research infrastructure is built, provided each installation is large enough, at least half km 3 . Such a distributed concept would also maximize the possibility of getting regional funding [21]. ## 4.2 Technology The design of the detector is based on the concept of the Building Block. Each building block is made of 115 Detection Units (DU), at a distance of ∼ 90 m. Each DU consists of a flexible string, 700 m long, anchored at the sea bottom and kept taut by a system of buoys, carrying 18 storeys that will host one Digital Optical Module (DOM) each, with a vertical spacing of 36 m. The first storey will be at 100 m from the sea bottom. The mechanical structure is based on two Dyneema R © ropes, Fig. 4. A Vertical Electro-Optical Cable (VEOC), an oil-filled pressure-balanced hose equipped with 18 optical fibers and two copper conductors, connects all DOMs to the DU base for power, readout and data transmission. A major innovation concerns the design of the active part of a neutrino telescope, the optical module. The digital optical module used in KM3NeT is a 17-inch glass sphere, resistant to the high pressure present at the sea bottom, housing 31 3-inch photomultiplier tubes (PMT) and the active bases for power. The bases can be controlled individually from the shore in order to set the correct values of HV and threshold for each tube. A foam structure works as a support for the PMTs, with optical gel filling the cavity, to assure optical contact. A metallic structure glued on the sphere supports the electronic boards for their cooling, Fig. 5. The maximum expected power consumption of a DOM is 10 W. A multiPMT DOM has several advantages if compared to the traditional, large cathode singlePMT optical module used in ANTARES, Baikal and IceCube detectors, like, for example, a larger (three to four times) total photocathode area and a better discrimination of single vs multi photoelectron. A light collection ring further increases the effective photocathode area by 20-40%. Three companies, ETEL, Hamamatsu and HZC, have developed new PMT types, according to the main characteristics required for the KM3NeT detector, see Table 1. Some PMTs have been delivered for tests and evaluation, which are still in progress. Each DOM acts independently as an IP node. All DOMs are synchronized to the subnanosecond Figure 4. Schematic view of a detection unit of KM3NeT. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-df57952a-6a99-469f-837a-9a31d57c48b1.jpg) Figure 5. Internal structure of a KM3NeTDOM. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-d8782fe5-7547-4210-a724-b624dd920564.jpg) Table 1. Main characteristics required for the 3-inch PMT | Photocathode's diameter | > 72 mm | |----------------------------------------|------------------| | Dynodes | 10 | | Nominal Voltage for Gain 3 · 10 6 | 900 1300 V | | Gain slope | 6.5 min -8.0 max | | QE at 404 nm | > 23 % | | QE at 470 nm | > 18 % | | Collection efficiency | > 87% | | Uniformity of QE and Coll. eff. | within 20% | | TTS (FWHM) | < 5 ns | | Dark count rate (0.3 s.p.e. threshold) | < 2 kHz | | Pre-pulses | < 1 % | | Delayed pulses | < 3.5 % | | Early afterpulses | < 2 % | | Late afterpulses | < 10 % | level using a clock signal broadcast from shore. Monitoring and real-time correction for the propagation delays between the shore station and each single DOM will be performed using a White Rabbit application [22]. Also calibration sensors are included inside the optical modules: light beacons to illuminate groups of DOMs at known time, to monitor individual time offsets, piezo sensors for acoustic positioning, a tilt meter, a compass and sensors for temperature and humid- Figure 6. Photo of the prototype multiPMT DOM, presently in data taking on the ANTARES detector. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-a198fd17-4fb4-4c00-9039-1645984fd07f.jpg) ity measurements inside the sphere. The readout electronic boards (Central Logic Board, CLB) controls the data acquisition and communications with the shore station and are also hosted in the DOM. The signal from a PMT consists of the arrival time and the width of the pulse, measured as the time-over-threshold (ToT), typically set at 0.3 p.e., digitized and sent via a network of optical fibers to shore. Long range transmissions exploit DWDM techniques at 50 GHz spacing. The "all-data-to-shore" concept is applied to the readout of the detector, following the experience of the ANTARES detector. On shore, the physics events are filtered from the background using a dedicated software and stored on disk. The DAQ bandwidth is 200 Mb/s from each DOM and considers the possibility of persistent bursting activity due to bioluminescent organisms. The corresponding rate can vary depending on the site. More details are in [20]. A fully equipped multiPMT-DOM has been installed on the ANTARES detector Fig. 6 and has been taking data according to the expectations since spring 2013. Fig. 7 shows a preliminary comparison between collected data and MC expectations. Simply requiring a coincidence among 6-7 PMTs the bulk of hits due to the decay of 40 K dissolved in the sea water can be rejected. Measurements are still on going. The deployment of such a large number of DU requires a special technique [23]. A recoverable launching vehicle has been designed and successfully tested during several cruises. Before deployment, each string is wound on a spherical aluminum launching vehicle, the LOM, Fig. 8. From the vessel, the LOM is lowered to the seabed, an acoustic release allows the launcher to freely float to the surface, where it can be easily recovered, while unrolling the string, Fig. 9. A Remotely Operated Vehicle (ROV) will connect each DU cable to a junction box linked to a sea floor infrastructure, receiving and delivering signal and power from/to the shore. Several qualification campaigns have been performed to validate the deployment concept. ## 5. Present status of the project The first phase of the project (Phase-1) is funded mainly by Italian, Dutch and French contributions and foresees the construction and the deployment of 31 DUs, 24 DUs at the KM3NeT-It site and the remaining at the KM3NeT-Fr site. First strings will be deployed by early 2015. The KM3NeTIt site will host also a set of 8 detection units constructed according to a previous design (NEMO tower, see [20]), which will be operated independently. The final complete configuration (Phase-2) Figure 7. Comparison between the measured and expected rate on the PPM-DOM hosted by the ANTARES detector as a function of the number of coincident hits. The red histogram represents the contribution due to the decay of 40 K dissolved in the sea water. Measurements are still ongoing and the plot must be considered as preliminary. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-82d332c8-f522-4e1e-b348-e88a63e6e118.jpg) Figure 8. Photo of the launcher vehicle for optical modules (LOM) . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-56548371-0f3b-4adc-8105-3b0e1fea0b10.jpg) foresees six building blocks corresponding to an instrumented volume of about 3 km 3 , with each site hosting at least one building block. Although KM3NeT Phase-1 and Phase-2 detectors have been optimised to the search for neutrinos sources, the recent results of the IceCube experiment [3] have prompted the KM3NeT Collaboration to consider also an intermediate KM3NeT Phase 1.5, whose main goal is to measure a diffuse flux neutrino signal, using different methodology, with complementary field of view and with a better angular resolution. The Phase1.5 infrastructure will comprise 2 building blocks to be realized at the KM3NeT-Fr and KM3NeT-It sites through an update of the existing installation. The additional estimated cost is about 50-60 MAC. Sensitivity studies are in progress. ## 6. Conclusions The KM3NeT collaboration has just started to build a cubic kilometer size neutrino telescope in the Mediterranean sea. It will complement the IceCube neutrino telescope, located at the South Pole, Figure 9. Unfurling a DU of KM3NeT. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1132v1-figure-0fb74b3a-0182-4a53-b656-5caa1b69526e.jpg) in its field of view. In particular, it will observe directly the Galactic Centre. The first phase of the project has started with the aim of deploying the first detection units by early 2015 at the Italian and French sites. In the second phase of the project also the Greek site will be included. Two major technological innovations will be used: the multiPMT digital optical module, which improves the rejection capability of the 40 K background and increases the sensitive photocathode area, and the White Rabbit protocol, which will simplify the subnanosecond level of synchronization among DOMs. An intense program of simulations has started to define the optimal geometry and size for an early measurement of a diffuse flux of neutrinos and evaluate the KM3NeT sensitivity to the high-energy events recently published by IceCube. ## References - [1] Y. Fukuda et al., Solar neutrino data covering solar cycle 22 , Phys. Rev. Lett. 77 (1996)1683; S. Fukuda et al., Solar 8B and hep neutrino measurements from 1258 days of Super-Kamiokande data . - [2] K.S. Hirata et al., Observation in the Kamiokande-II detector of the neutrino burst from supernova SN87A , Phys. Rev. D 38 (1988) 448. - [3] M. G. Aartsen et al., Evidence for High-Energy Extraterrestrial Neutrinos at the IceCube Detector , Science 342 (2013) 1282856. - [4] M. A. Markov, On high energy neutrino physics , Proc. 1960 Annual Int. Conf. on High Energy Physics (1960) 578. - [5] Y. Becherini, A. Margiotta, M. Sioli and M. Spurio. A parameterisation of single and multiple muons in the deep water or ice , Astrop. Phys. 25 (2006) 1. - [6] V. Agrawal, T.K. Gaisser, P. Lipari, T. Stanev. Atmospheric neutrino flux above 1 GeV , Phys. Rev. D 53 (1996) 1314. - [7] F. Halzen and S. R. Klein, IceCube: An Instrument for Neutrino Astronomy , Review of Scientific Instruments 81 (2010) 081101. - [8] A. V. Avrorin et al., An Experimental String of the NT1000 Baikal Neutrino Telescope , Instruments and Experimental Techniques 54 (2011) 649. - [9] M. Ageron et al., ANTARES: The first undersea neutrino telescope , Nucl. Instrum. and Meth. Phys. Res. A 656 (2011) 11. - [10] M. Taiuti et al., The NEMO project: a status report , Nucl. Instrum.and Meth. Phys. Res. A 626-627 (2011) s25. - [11] L.K. Resvanis, Recent results from NESTOR , Neutrino Oscillations in Venice, M.Baldo Ceolin Editor (2006) 461. - [12] V. F. Hess. Über Beobachtungen der durchdringenden Strahlung bei sieben Freiballonfahrten , Physikalische Zeitschrift 13 (1912) 1084. - [13] A. M. Hillas, Cosmic rays: recent progress and some current questions , astro-ph/0607109 . - [14] F. Aharonian et al. High energy astrophysics with ground-based gamma ray detectors , Rep. Prog. Phys. 71 (2008) 096901. - [15] F. Vissani and F. Aharonian, Galactic Sources of High-Energy Neutrinos: Highlights , Nucl. Instr. and Methods A 692 (2012) 5. - [16] E. Waxman and J. Bahcall, High energy neutrinos from astrophysical sources: An upper bound , Phys. Rev. D 59 (1998) 023002-1. - [17] A. Trovato et al., Sensitivity of the KM3NeT detector to neutrino fluxes from Galactic point-like sources , In press in AIP Conf. Proc., Proc. VLV n T 2013, 5-7 August 2013, Stockholm, Sweden. - [18] M. Su, T. Slatyer, D. Finkbeiner, Giant gamma-ray bubbles from Fermi-LAT: AGN activity or bipolar galactic wind? , Astrophys. J. 724 (2010)1044. - [19] S. Adrian-Martinez et al., A search for neutrino emission from the Fermi bubbles with the ANTARES telescope , Europ. Phys. J. C 74 (2014) 2701;S. Adrian-Martinez et al., Detection potential of the KM3NeT detector for high-energy neutrinos from the Fermi bubbles , Astropart. Phys. 42 (2013) 7 - [20] T. Chiarusi, Status and first results of the NEMO Phase-2 tower , This workshop. - [21] KM3NeT. Comparison of Physical Performance between a single or multi-site KM3NeT Research Infrastructure. s.l. : EU document, grant agreement 212525, 2012. - [22] P.P.M. Jansweijera, H.Z. Peeka, E. de Wolf, White Rabbit: Sub-nanosecond timing over Ethernet , Nucl. Instrum. and Meth. Phys. Res. A 725 (2013)187. - [23] E. de Wolf et al., A launching vehicle for optical modules of a deep-sea neutrino telescope , Nucl. Instrum. and Meth. Phys. Res. A 725 (2013) 241.
10.1088/1748-0221/9/04/C04020
[ "A. Margiotta" ]
2014-08-05T22:15:38+00:00
2014-08-05T22:15:38+00:00
[ "astro-ph.IM", "astro-ph.HE", "physics.ins-det" ]
Status of the KM3NeT project
KM3NeT is a deep-sea research infrastructure being constructed in the Mediterranean Sea. It will be installed at three sites: KM3NeT-Fr, offshore Toulon, France, KM3NeT-It, offshore Portopalo di Capo Passero, Sicily (Italy) and KM3NeT-Gr, offshore Pylos, Peloponnese, Greece. It will host the next generation Cherenkov neutrino telescope and nodes for a deep sea multidisciplinary observatory, providing oceanographers, marine biologists, and geophysicists with real time measurements. The neutrino telescope will search for Galactic and extra-Galactic sources of neutrinos, complementing IceCube in its field of view. The detector will have a modular structure and consists of six building blocks, each including about one hundred Detection Units (DUs). Each DU will be equipped with 18 multi-PMT digital optical modules. The first phase of construction has started and shore and deep-sea infrastructures hosting the future KM3NeT detector are being prepared in France near Toulon and in Italy, near Capo Passero in Sicily. The technological solutions for KM3NeT and the expected performance of the detector are presented and discussed.
1408.1133v1
6 ## THE ˆ INFRARED SEARCH FOR EXTRATERRESTRIAL CIVILIZATIONS WITH LARGE ENERGY G SUPPLIES. I. BACKGROUND AND JUSTIFICATION J. T. Wright 1,2 , B. Mullan 1,3,4 , S. Sigur /suppress D sson 1,2 , and M. S. Povich 5 Accepted for publication in The Astrophysical Journal on 23 June 2014. ## ABSTRACT We motivate the G infrared search for extraterrestrial civilizations with large energy supplies. ˆ We discuss some philosophical difficulties of SETI, and how communication SETI circumvents them. We review 'Dysonian SETI', the search for artifacts of alien civilizations, and find that it is highly complementary to traditional communication SETI; the two together might succeed where either one, alone, has not. We discuss the argument of Hart (1975) that spacefaring life in the Milky Way should be either galaxy-spanning or non-existent, and examine a portion of his argument that we dub the 'monocultural fallacy'. We discuss some rebuttals to Hart that invoke sustainability and predict long Galaxy colonization timescales. We find that the maximum Galaxy colonization timescale is actually much shorter than previous work has found ( &lt; 10 9 yr), and that many 'sustainability' counterarguments to Hart's thesis suffer from the monocultural fallacy. We extend Hart's argument to alien energy supplies, and argue that detectably large energy supplies can plausibly be expected to exist because life has potential for exponential growth until checked by resource or other limitations, and intelligence implies the ability to overcome such limitations. As such, if Hart's thesis is correct then searches for large alien civilizations in other galaxies may be fruitful; if it is incorrect, then searches for civilizations within the Milky Way are more likely to succeed than Hart argued. We review some past Dysonian SETI efforts, and discuss the promise of new mid-infrared surveys, such as that of WISE . Subject headings: extraterrestrial intelligence - infrared: galaxies - infrared:stars ## 1. INTRODUCTION ## 1.1. The Question The fact that we have not been contacted by any extraterrestrial intelligence (ETI) is most famously encapsulated by Enrico Fermi's question 'Where is everyone?'(see Jones 1985 for a historical account). Similar observations are 'Fact A' of Hart (1975) ('There are no intelligent beings from outer space on Earth now.') and the apparent lack of any evidence of their communication (the 'Great Silence' of Brin (1983)). If one assumes that interstellar communication and travel are not so difficult as to be practically impossible, and one holds the Copernican 6 position that intelligent life is not unique to Earth, then one is led to an apparent contradiction. Given the number of potential sites for intelligent life to emerge in the galaxy (of order 10 11 stars) and the amount of time it has had to arise (of order a Hubble time, 10 10 years), then one is led to the so-called Fermi-Hart Paradox or Problem that ETIs should be prevalent throughout the Milky Way, and yet we see no evidence of them. Resolutions of this problem involve contradicting its various assumptions. The most pessimistic resolution to the paradox is that of Hart (1975): we are alone in the Galaxy, or at least ETIs are sufficiently rare that none has has been inclined to engage in widespread interstellar travel. As searches for ETIs become increasingly more sensitive, this resolution becomes increasingly favored. More optimistically, it could be that ETIs are common, but never sufficiently spacefaring to be widespread throughout the Galaxy; or it could be that spacefaring ETIs are common, but we have not yet noticed them for some reason. In this work we will review and reinforce Hart's basic thesis, which powerfully argues that once spacefaring ETIs arise, they should populate their galaxy on a timescale short compared to the Hubble time. The waste heat approach is complementary to other SETI efforts, especially communication SETI, because it makes different assumptions and can help focus them to likely targets, but might not, by itself rule out purely naturalistic phenomena. Among the advantages to a waste heat approach is its small number of assumptions about ETI behavior and technology. Assuming only conservation of energy, the laws of thermodynamics, and that much-faster-than-light travel is impossible, we can test for the existence of ETIs with very large energy supplies in other galaxies, out to great distances. This work provides background and motivates our search for alien waste heat, which we dub G, the ˆ Glimpsing Heat from Alien Technologies survey (or G-HAT), and which we describe in Paper II of this series. - 1 Department of Astronomy &amp; Astrophysics, 525 Davey Lab, The Pennsylvania State University, University Park, PA, 16802 - 3 Blue Marble Space Institution of Science, PO Box 85561, Seattle, WA 98145-1561 - 2 Center for Exoplanets and Habitable Worlds, 525 Davey Lab, The Pennsylvania State University, University Park, PA 16802 - 4 Carnegie Science Center, 1 Allegheny Ave., Pittsburgh 15212 - 5 Department of Physics and Astronomy, 3801 West Temple Ave, California State Polytechnic University, Pomona, CA 91768 Copernican in the figurative sense that Earth is not special or unique beyond it happening to be our home. ## 1.2. Plan We first discuss why civilizations with large energy supplies are plausible and worth searching for. Because SETI is not a common topic in the astrophysical literature or curriculum, this paper is primarily a discussion of previous work most germane to G. ˆ In Section 2 we discuss the two primary forms of SETI, communication SETI and 'artifact' SETI, and some philosophical difficulties in searching for something whose form is uncertain. To illustrate that galaxy-spanning civilizations are plausible, in Section 3 we review Hart's argument that spacefaring life should rapidly spread throughout the Galaxy. In section 4 we extend this argument to the growth of an ETI's total energy supply, and show that it implies that very old, large ETI's in other galaxies should be detectable with today's mid-infrared (MIR) surveys, such as that just conducted by the WISE satellite, following the waste heat approach of Dyson (1960) and Slysh (1985). We also provide a description of the classes of intelligent spacefaring civilizations a waste heat approach would detect (which we dub a 'physicist's definition' of intelligent life). Ultimately, this approach will allow humanity to extend our search for ETI's (and, perhaps, Hart's 'Fact A') beyond the lack of evidence of ETIs in the Solar System to well beyond the Local Universe. In Section 5 we show that previous work on the maximum time it takes such a species to populate its galaxy is in error. In fact, this is actually quite short compared to the age of the Milky Way, which reiterates and amplifies this part of Hart's argument. In Section 6 we apply our reasoning to some classes of rebuttals to Hart's thesis, in particular those that invoke 'sustainability' to explain how the Milky Way could be inhabited with many spacefaring civilizations but not be saturated with them. In Section 7.1 we discuss the physical plausibility and detectability of Dyson spheres, and in Section 7.2 we discuss past searches for them. In Section 8 we discuss the consequences of a positive and a null detection of large alien energy supplies, and in Section 9 we give our conclusions to this, first, paper in the G series. ˆ ## 2. PHILOSOPHIES OF SETI ## 2.1. Communication SETI Much work in the Search for Extraterrestrial Intelligence (SETI, see Tarter (2001) for a review) focuses not on finding evidence of ETI travel to the Solar System, but on detecting ETI communication (either deliberate messaging or 'leaking' of deliberate signals not intended for us). This approach is in principle sensitive to any ETI that has achieved a level of technology similar to ours, and does not require that ETIs participate in interstellar travel; however it does require that ETIs produce signals detectable by today's technology. It thus essentially ignores Hart's argument that ETI's would have populated the galaxy by now (neither denying nor accepting it) and seeks unambiguously engineered signals that could only be the product of an ETI. Directed programs in this Search for Extraterrestrial Intelligence have helped to carve out particular niches in the parameter space of ETI behaviors we can imagine. The most popular strategies or proposals for SETI have historically centered on broadcasts by an ETI within particular bands of the electromagnetic spectrum we would consider obvious or desirable (see Sagan &amp; Drake 1975 for examples of recommendations). However, no ostensible signatures of ETI transmissions have been detected in wide radio bands (Latham &amp; Soderblom 1993), nor in narrow bandwidths centered on the hyperfine transition of H i (Horowitz &amp; Sagan 1993; Lazio et al. 2002), nor convenient multiples of this frequency (Blair et al. 1992; Lazio et al. 2002). The same is true for different atomic and molecular transitions of other substances (e.g., H O and OH: Cohen et al. 1980; 2 CO and CN: Davidge 1990; positronium: Mauersberger et al. 1996). Siemion et al. (2013) searched for narrow-band radio emission from Kepler -surveyed stellar systems with known exoplanets and extrapolated that the number of radio-loud civilizations in the Galaxy is /lessorsimilar 10 -6 M /circledot -1 . Alternatively, Keenan et al. (1999) contended that optical SETI strategies - e.g., hunting for nanosecond pulses from MJ-scale optical lasers - are superior. These campaigns have been thus far unsuccessful, however (e.g. Howard et al. 2004). More exotic strategies have been proposed (e.g., Korpela &amp; Howard 2008); these include hunting for signs of artificial modification of planetary albedo, searching for intentionally generated gravity waves, and researching the utility of quantum entanglement as a communication pipeline. Others employ analyzing the CMB as a potential signal carrier (Kardashev 1979), or hunting for collimated transmissions at mm wavelengths (Kardashev 1985 and references therein). These remain achievable in principle, but as of yet unrealized in practice. However, the total parameter space searched for alien signals remains very small (see, for instance, Papagiannis 1985), so the failure of communication SETI to date rules out only current communications of certain sorts, of certain powers, at certain duty cycles, in certain places. Thus, today it provides very weak evidence for the non-existence in the Milky Way of electromagnetically telecommunicating civilizations (to use the term of Blair et al. (1992).) ## 2.2. Artifact SETI and 'Interstellar Archaeology' An alternative strategy is to identify artifacts or 'archaeological' signatures (e.g., Carrigan 2012) of ETIs (somtimes called a 'Dysonian' approach, e.g. Bradbury et al. 2011; Vidal 2011). The most famous example of circumstellar mega-engineering is that of a 'Dyson sphere' (Dyson 1960), a structure or suite of structures that block a star's light (as an energy source or a living surface) and reradiate it in the thermal infrared. We find these to be of particular interest: a civilization of sufficient technological sophistication has an obvious source of abundant free energy over ∼ Gyr timescales in its host star. A typical sunlike star provides ≈ 4 × 10 26 W throughout the course of its ∼ 10 Gyr lifetime (c.f. our current energy generation of order 10 13 W). By building an array of light-gathering structures around the star, the ETI could harness this free stellar power for its own purposes. Such Dyson spheres need not be single, rigid, structures 7 ; the actual covering fraction of a swarm of steerable energy collectors constituting the practical 'sphere' might vary, and therefore the resulting SED we receive may contain time-variable contributions from the unobscured starlight. 'Complete' Dyson spheres would certainly be more easily recognizable, however. Sagan &amp; Walker (1966) and Kardashev (1979) showed that the IR emission of opaque Dyson spheres (with peak wavelengths 15 µ m-2 mm) was detectable to ∼ several 100 pc by the technology of the time. Another approach would be to observe the effects of alien industry on its environment. Freitas (1985) proposed that particularly rapacious civilizations could strip solar systems of hydrogen fuel for fusion, creating circumstellar effusion clouds that are detectable in the H i and tritium hyperfine transitions. Other ambitious engineering projects are theoretically detectable (Carrigan 2012), including artificially increasing stellar lifetimes by manipulating stellar rotation, internal pressures, and/or depositing hydrogen fuel (possibly producing blue straggler stars), terraforming planets or otherwise altering a planet's atmospheric composition with known byproducts of industrial and otherwise intelligent activity. Forgan &amp; Elvis (2011) explored how ETI asteroid tampering could be observable in the SEDs of debris discs, and showed how such engineering projects in progress could be identifiable by anomalous chemical abundances of a mined debris disc, the thermal signature produced by waste dust, or the debris distribution itself as a dynamical signature of ETI intervention. Another approach is to observe products of alien mega-engineering themselves. For instance, Arnold (2005) postulated that ETIs might construct long-lived beacons in the form of planet-sized shields or louvred structures in short-period orbits around stars. 8 Such objects would consume little power (and, at any rate, have an abundant supply of energy nearby) but would effectively transmit simple signals across the galaxy in the form of manifestly non-natural transit light curves (i.e. they would have obviously non-circular aspects). Such structures would thus also be a form of communication SETI. ## 2.3. A Philosophical Challenge of SETI Efforts to identify known phenomena that have no natural explanation and postulate why ETIs might be the most natural cause have a major difficulty that follows from Clarke's so-called 'Third Law' (Clarke 1962), which states 'Any sufficiently advanced technology is indistinguishable from magic.' Science, by definition, assumes that the Universe is governed by Natural Law, and seeks to interpret all observations as consequences of these laws. 'Magic', in Clarke's sense, means the apparent suspension of Natural Law, and so any investigation that assumes that an observation is due to a sufficiently advanced technology risks being inherently unscientific. In particular, invoking ETIs to explain any (or all!) unexplained phenomena leads to an 'aliens of the gaps' approach which is philosophically problematic. Such ETI hypotheses may be difficult or impossible to disprove, and have little or no justification beyond the facts that an observation remains unexplained by natural causes, and that ETIs may exist. Of course, the other extreme - assuming that all observations must be the result of purely natural phenomena are not due to advanced technology - is itself patently logically invalid because it assumes that ETIs have no detectable effect on the Universe. SETI must thread this philosophical needle if it is to resolve Fermi and Hart's problem in a scientific manner. Artifact SETI can thus proceed by seeking phenomena that appear outside the range that one would expect natural mechanisms to produce. Such phenomena are inherently scientifically interesting, and worthy of further study by virtue of their extreme nature. The path from the detection of a strange object to the certain discovery of alien life is then one of exclusion of all possible naturalistic origins. While such a path might be quite long, and potentially never-ending, it may be the best we can do. Communication SETI, on the other hand, shortcuts this path to discovery by seeking signals of such obviously engineered and intelligent origin that no naturalistic explanation could be valid. Together, artifact and communication SETI thus provide us with complementary tools: the most suspicious targets revealed by artifact SETI provide the likeliest targets for communication SETI programs that otherwise must cast an impossibly wide net, and communication SETI might provide the conclusive evidence that an extreme but still potentially naturalistic source is in fact the product of extraterrestrial intelligence. (Bradbury et al. 2011) 7 If such structures were to exist despite their apparent mechanical and gravitational unfeasibility, then presumably they would provide a surface upon which an alien civilization could exist, akin to the surface of a planet. It is interesting to note that Earth-like conditions could be simulated around a very-low-mass star ( ∼ 0.1 M /circledot ) with a static sphere ∼ 1 5 R . /circledot in radius. Such a structure would have a surface gravity of ∼ 1 g , and an effective temperature of ∼ 250K. It would also have a surface area ∼ 200 times larger than the Earth and collect ∼ 100 times the free energy from starlight; this starlight would also be available for hundreds or thousands of times as long as sunlight, thanks to the longer hydrogen-burning lifetime of very low mass stars. At this distance, the star's magnetic field and even photon pressure might provide mechanical assistance in stabilizing the sphere's shape and position around the star. 8 It is interesting that one of Arnold's speculations was apparently validated shortly after it was published. Arnold specifically described the Kepler mission as a prime vehicle for searches for such beacons, and gave an example of an apparent transiting planet whose depths varied by a factor of 5, with a short repetition cycle and a timing pattern indicative of a non-natural origin. Indeed, Kepler discovered such a phenomenon in 2012 with the target star KIC 12557548 Rappaport et al. (2012). This star shows transit depth variations of at least a factor of 6. The discoverers interpreted this as evidence of an 'evaporating' Mercury-sized planet, and indeed the apparently random pattern of depth variations (and lack of timing variations) distinguish the object from the sort specifically described in Arnold's proposal. Arnold's model might be truly validated in this case if the sequence of transit depths could be shown to have some underlying pattern of unambiguously intelligent design. ## 3. HART'S ARGUMENTS FOR RAPID GALACTIC COLONIZATION, AND REBUTTALS Hart (1975) essentially restated the Fermi paradox, arguing that colonization of the Galaxy by an intelligent, spacefaring species should be fast compared to the age of the Galaxy. Hart's conclusion is that since we have not encountered ETIs, or signs of them, we must be the first intelligent spacefaring species in the Milky Way. Hart divided objections to his argument (which are also resolutions of the Fermi-Hart paradox) into four categories: - 1. Physical: interstellar travel is infeasible, at any level of achievable technological development - 2. Sociological: extraterrestrials lack interest, motivation, or organization to visit or contact Earth. This category includes some of what Cirkovi´ c (2009) dubs 'solipsist' resolutions, ´ in which our observations are being deliberately manipulated or confused by ETIs so as to frustrate SETI efforts. - 3. Temporal: extraterrestrials have not had time to arise and reach or contact Earth yet. - 4. That extraterrestrial intelligence has visited or does visit Earth, but that we have not noticed it. Hart dismissed solutions in each of these four categories, and concluded that the resolution to the Fermi-Hart Paradox is that ETIs do not exist in the Milky Way. Indeed, an anthropic approach might hold that, while advanced alien life may be common in the Universe, the fact of our existence (unmolested after 10 Gyr of the Milky Way's existence and 4.5 Gyr of the Earth's) is only possible in an 'empty' galaxy in which we are the first intelligent, spacefaring species to evolve. This solution is consistent with both Hart's conclusion and with the premise that ETIs are common in the Universe, and could be tested if ETI's could be detected in most other galaxies. Here, we will restate and reinforce Hart's objections to these resolutions in light of the nearly 40 years of astrophysical progress since his work. This restatement amounts to a plausibility argument that galaxy-spanning ETIs should exist if any spacefaring ETIs exist. ## 3.1. Physical Arguments While Hart had to argue that interstellar probes were well within the realm of technical feasibility, barred by neither time nor energy consumption limitations, we can do better today. Voyager 2 and both Pioneer probes have traveled beyond the orbit of Neptune, and once they and New Horizons join Voyager 2 in crossing the heliopause they will all properly be called interstellar (Kerr 2013). At their current speeds and distances from the Sun, they will require of order 10 5 years to reach distances comparable to the nearest stars (although they are not traveling towards any of them). Although this time is long, it demonstrates that interstellar travel by human-built probes is certainly possible. These probes would certainly no longer have functioning power supplies by the time they might arrive at an alien planetary system, but this is a function only of their engineering. Hart points out, correctly, that nuclear energy could easily provide not just sufficient operational energy, but indeed thrust for deceleration for more advanced probes. The velocities of our existing interplanetary probes are large (of order 10 -4 c ), but there is no engineering or physical reason why they could not be at least an order of magnitude larger. Given the possibility of centuries, millennia, millions of years, or hundreds of millions of years of future human technological advancement, it is clear that these spacecraft represent an extreme lower limit to the speed and utility of interstellar probes. A more ambitious approach would be to send colony ships to other star systems; this additional complication adds considerable engineering difficulty but, again, no fundamental physical obstacle, and indeed advances in biology and medicine in the last 40 years have made such approaches more plausible. Whether the ships would, for the long cruise times of their journeys, contain conscious colonists; humans in some sort of 'suspended animation'; or merely the machinery for gestating and raising humans from embryos, gametes, or even just genetic material; varies only the degree of complexity of the problem. The fact that we can today imagine and even design ships that could do this implies that the barriers to their construction are a matter of will and achievable technological development, not fundamental limits of physics or engineering. ## 3.2. 'Sociological' Resolutions ## 3.2.1. The 'Monocultural Fallacy' In light of the many of the proffered resolutions to the Fermi-Hart Paradox in the past 40 years, Hart's most underappreciated argument must be the one involving the so-called sociological explanations, and so it bears repeating. Such explanations invoke a typical behavior pattern of alien species (e.g. perhaps they: do not wish to travel / do not wish to communicate / destroy their climate / destroy themselves with nuclear weapons / do not allow 'immature' species to 'join the interstellar club' / achieve transcendence / become immersed in computer simulations, etc.). Hart rightly argues that these must fail because they necessarily must apply to every alien species in the galaxy, and must apply for the entire history of their existence . Or, put more elegantly by Hart, any such solution ...might be a perfectly adequate explanation of why, in the year 600,000 bc , the inhabitants of Vega III chose not to visit the Earth. However, as we know, civilizations and cultures change. The Vegans of 599,000 bc could well be... more interested in space travel. A similar possibility would exist in 598,000 bc , and so forth. Even if we assume that the Vegans' social and political structure is so rigid that no changes occur even over hundreds of thousands of years, or that their basic psychological makeup is such that they always remain uninterested in space travel, there is still a problem... [Such a solution] still would not explain why the civilizations which developed on Procyon IV, Sirius II, and Altair IV have also failed to come here. [Such a solution] is not sufficient to explain [the apparent absence of aliens] unless we assume that it will hold for every race of extraterrestrials - regardless of its biological, psychological, social, or political structure - and at every stage in their history after they achieve the ability to engage in space travel. That assumption is not plausible, however, so [such solutions] must be rejected as insufficient. Hart (1975) We dub this the 'monocultural fallacy', that considers a solution that could plausibly apply to a single culture of a single alien species, and attempts to apply it to every culture of every alien species across the breadth and history of the galaxy, without exception. Saving a sociological explanation by asserting that spacefaring alien species have only arisen a few times (and so the explanation need be only applied a small number of times, making it more plausible) is tantamount to asserting that intelligent alien life is rare, consistent with Hart's conclusions. ## 3.2.2. Sustainability One version of a 'sociological' solution that may seem to evade part of Hart's critique involves inevitable selfdestruction; that is, that the technologies and coordination that allow spacefaring also allow fantastically destructive technologies and the possibility of catastrophic cultural collapse, either or both of which inevitably lead to a species' extinction (see, e.g. von Hoerner 1975, for one sober account). This is most famously encapsulated in the final term 'L' in many versions of the Drake Equation (Drake 1980; Shostak 2011), although that term is most appropriately interpreted as specifying the average communication timespan of a civilization. It thus includes the possibility not only of the complete destruction of a civilization but some sort of technological transcendence that renders them effectively mute or invisible to our detection Examples of the argument that exponential growth inevitably triggers the collapse of civilization include the 'light cage limit' of McInnes (2002) and the 'Sustainability Solution' of Haqq-Misra &amp; Baum (2009)). We refer to the class of solutions that begin with the assertion that 'exponential growth is unsustainable' before the galaxy is colonized as adopting the 'sustainability hypothesis.' The Light Cage Limit comes from the mathematical impossibility of exponentially increasing resource use with short timescales. McInnes (2002) imagines that sustained resource growth would require an expanding sphere within which to gather resources, and this sphere must eventually expand faster than light to sustain exponential growth. Hitting this 'Light Cage Limit' then triggers one of two extreme results: catastrophic social collapse, causing the civilization to go extinct, or else a coordinated, voluntary check on growth that slows population growth to permanently sustainable levels. In either case, the consequence (it is presumed) is cessation of galactic colonization, thus explaining Fact A. The Sustainability Solution similarly, but less specifically, asserts that since exponential growth is unsustainable, there can only be two sorts of civilizations: slow- or non-growing, (potentially) long-lived ones, and fast-growing, necessarily short-lived ones. Both are incapable of sustained exponential colonization because they are, by definition, non-exponential and unsustained, respectively. We discuss our rebuttal to the sustainability hypothesis in Section 6.3. ## 3.3. Temporal Arguments Given the vastness of the distance between the stars, and the apparent technological implausibility of sending a probe to even the nearest star within the span of even a long-lived human, it may seem absurd to consider a galaxy-spanning supercivilization plausible, but the timescales for galactic colonization are actually quite short compared to the age of the Galaxy, even for civilizations with 'slow' travel capabilities. Indeed, optimistic assumptions lead to very short minimum colonization times: for instance, ´ irkovi´ (2009) C c and Tipler (1980) calculated that galactic colonization should only take O (10 ) years, and Armstrong &amp; Sandberg (2013) argue that entire galaxy groups can be populated 6 in much less than a Hubble time. There are two primary timescales to consider: that for the first civilizations to arise in a galaxy, and then for colonization of the galaxy. ## 3.3.1. Timescale To the Rise of Civilization On the first of these, it is possible that spacefaring civilizations have only recently arisen, and so have not had time to colonize the Galaxy, implying that we are among the first spacefaring civilizations in the Milky Way. Evidence now indicates that terrestrial planets could have formed very close to the formation of the Galaxy itself (Buchhave et al. 2012). With some insight into stellar chemical evolution, the timescales needed to develop biological complexity, and the time-dependent rate of lethal supernovae events, Lineweaver et al. (2004) placed the oldest possible extrasolar habitats forming ≈ 8 Gyr ago, in the circumgalactic region known as the Galactic Habitable Zone (Gonzalez et al. (2001), but see Prantzos (2008)). Livio &amp; Kopelman (1990) and Livio (1999) inferred that there must exist a monotonic, positive relationship between the timescales of stellar lifetimes and noogenesis. Had these two timescales been independent, it would be statistically more likely that ETI is very rare. Instead, ETI could have emerged when pertinent elements for organic life were in sufficient quantity, which the authors similarly traced to ≈ 10 Gyr ago. On the other hand, Cirkovi´ c &amp; Vukoti´ (2008) and Annis (1999a) have argued that a phase-transition model of ´ c galactic habitability that would explain the 'Great Silence' in light of the extreme age of the Galaxy. For instance, GRBs tend to occur on timescales similar to the ∼ 10 8 yr colonization time of the Galaxy, and might sterilize large swaths of the Galaxy too often for widespread colonization can occur. Such effects could conspire to keep the development of life or intelligence stalled, preventing the development of any civilizations much more advanced than ours. Because GRBs proceed from the production (and destruction) of high-mass stars, and these require high star formation rates, GRBs should have been more common when the Galaxy was young and its star formation rate was higher. This implies that the GRB rate should decline as the Galaxy's star formation rate declines (at least for 'long' GRBs). Therefore, we might expect to be in an astrobiological phase transition as the rate of externally triggered catastrophe declines and the universe becomes less hostile to spacefaring civilizations. Such a transition might occur at a common time for all galaxies in the universe. But absent such a phase transition, we should expect that if life is common, it arose many billions of years ago. ## 3.3.2. Timescale for Galactic Colonization According to models of galactic colonization employing percolation theory (Hair &amp; Hedman 2013; Landis 1998), expanding colonies can be hemmed in by stationary ones, allowing kpc-scale voids of space empty of ETI activity that allow the unfettered development of more primitive civilizations like ours. Similar work with probabilistic cellular automata (Vukoti´ c &amp; Cirkovi´ 2012) shows strong clustering of advanced civilizations and their colonies, with large ´ c portions of the Galactic Habitable Zone unoccupied (Lineweaver et al. 2004). These groups raise the interesting possibility that the engineering efforts of ETI exist, but have yet to be unambiguously identified from our position in a more auspiciously rural stellar neighborhood. Newman &amp; Sagan (1981), modeling galactic colonization and the population pressure that encourages it as an interstellar diffusion problem, concluded that the commonly accepted Hart colonization timescale of ∼ 10 8 years is accurate only for long-lived civilizations experiencing considerable and consistent population growth. If the civilization experiences zero population growth, the colonization time can stretch to ∼ 10 10 years (see also Forgan et al. 2012 for a zero-population growth perspective on interstellar flights using stellar slingshot mechanics). Carrigan (2012) suggested that localized 'Fermi bubbles' of expanding ETI fronts could be seen, perhaps as optical voids or strongly radiating features in infrared. However, as Carrigan noted, bubble structures are fairly common phenomenology in extragalactic astronomy (e.g., in flocculent spirals), and Galactic astronomy (e.g., IR bubbles Churchwell et al. 2006; Simpson et al. 2012) so any artificial varieties could be difficult to spot. Galaxy arm widths tend to be on the order of ∼ kpc, so it is difficult to identify structures below this size scale. Annis (cited in Carrigan 2012) recommended searching for these Fermi bubbles in elliptical galaxies to avoid confusion with natural spiral structures. We discuss problems with these calculations in Sections 5.2 &amp; 5.3. ## 3.4. They Exist and We Have Not Noticed Them Hart's original argument centered on his 'Fact A,' that we have no evidence of ETI's here in the Solar System today . That is, that the Solar System has not yet been colonized. His fourth class of resolutions to the Paradox, 'Perhaps They Have Come', is that they have colonized the Solar System (or, at least, visited it) but we have not noticed. Hart assumed that it is unlikely that the Solar System has been visited but not colonized: in the history of the Galaxy it would only take one passing colony ship to permanently inhabit the Solar System (or, at least, permanently scar it with its civilization), and given the timescales involved we should have been visited many times over in the history of the Solar System. Indeed, it is hard to imagine how we might miss evidence of ETI colonization of the Solar System, even if they happened to go extinct before present day (but see, for instance Haqq-Misra &amp; Kopparapu 2012). ## 4. THE PLAUSIBILITY OF VERY LARGE ENERGY SUPPLIES Hart's conclusions are that we are alone in the Milky Way and that, provided we survive as a species long enough to begin space colonization, we will 'probably occupy most of the habitable planets in our Galaxy'. That is, galaxyspanning supercivilizations are inevitable if intelligent spacefaring life is. Much of Hart's reasoning extends beyond just travel across a galaxy into energy supply 9 growth as well. In this section we argue that, not only are galaxy-spanning civilizations plausible, but so is our ultimate detection of their waste heat. Because they reproduce, species of life are, in principle, capable of exponential growth until something checks them. Mold spreads to the edge of its petri dish; vegetation grows and thickens until no sunlight reaches the forest floor; rabbits' numbers grow until they enter a chaotic dynamic with their predators. Certain classes of intelligent, spacefaring life can achieve the sustained growth required to consume a significant fraction of the starlight in a galaxy because some classes of intelligence (those satisfying our 'physicist's definition') implies the ability to overcome the Malthusian limitations that constrain non-intelligent life. In what follows we are deliberately outlining only the likely physical limitations to the growth of intelligent life and its energy supply, and downplaying biological limitations exhibited by Earth life. We do this not because we are unaware of the biological limitations of terrestrial life, but because we seek to establish the maximum possible size of an energy supply (or lack thereof), and because by our 'physicist's definition' of intelligence ETI's can, in principle, transcend those limitations and approach physical ones. 9 Energy supply is jargon that refers to the total energy generated or collected in a unit time (usually per annum); it thus represents a power , not the total quantity of energy available for all time. It is distinguished from energy use , which does not include losses such as those associated with conversion to or transmission of, for instance, electricity. For considerations of waste heat, it is appropriate to consider the supply, even if the actual energy use of a civilization is significantly smaller. These definitions are not intended to 'define away' ETIs that do not have large waste heat signatures as 'unintelligent', but rather to define the sorts of ETIs that a waste heat search is sensitive to. ## 4.1. A 'Physicist's Definition' of Life and Intelligence Waste heat searches may be sensitive to what we dub to be a 'physicist's definition' of life: matter that processes resources and energy to produce more of itself. We acknowledge that this definition is so broad as to potentially include abiological self-replicating phenomena such as crystals, but it needs to be broad so that we do not exclude exotic forms of life that might exist in the universe that we merely have not yet considered. Despite this, even this definition may not be broad enough to encompass all forms of life in the universe. Our 'physicist's definition' of intelligent life is life that can overcome local resource limitations through the application of energy. This roughly tracks with our intuitive understanding of intelligence. A barnacle on a whale has no volition or ability to acquire food; it can only instinctively collect food that comes to it. A whale, on the other hand, can expend energy to hunt for additional food. Octopuses can apply torque to a lid of a jar to extract the food within; birds can drop shells to break them and acquire the food inside; humans can desalinate sea water and fertilize crops to create new sources of fresh water and food. Taken literally and applied over long timescales, this definition of intelligence might be so rough as to encompass non-intelligent behavior, especially if applied to a group of organisms as a whole (such as ant colonies, or even a grove of trees that spreads to cover a hillside, thus gathering additional solar flux), and it can be unclear to what degree instinctive behavior in an individual can be properly called intelligence. But of course, intelligence is not a binary proposition: humanity's capacity for overcoming local resource limitations far exceeds that of cetaceans, and certainly dwarfs that of trees. So despite their lack of rigor, these definitions are useful from the perspective of the search for intelligent life in the universe. If an intelligent species is spacefaring, then it will by definition consume resources with the possibility of exponential growth, and it can overcome a local lack of resources by acquiring additional energy by leaving its home planet (or other place of origin). We argue that if a species is spacefaring, then its level of intelligence is such that there is no practical resource limitation that it cannot overcome, except that of energy. On Earth, apparent limitations of arable land, freshwater, and energy have been consistently pushed back as technology has advanced. Desalinization and hydroponics illustrate how, in principle, our food supply is limited only by our energy supply and our will to apply it. While it is true that the Earth's population may stabilize in the near- or medium-term future for sociological reasons, this does not necessarily have any implications for the long-term future of the species as it expands into space. For brevity and specificity, we will use these definitions of 'intelligence' and 'life' for the rest of this paper, but we acknowledge that there may be other forms of intelligence in the Universe not captured by our 'physicist's definition.' Naturally, a waste heat approach will not be sensitive to such life. ## 4.2. Free-Energy Limited Species In the limit that a species or civilization uses its entire local energy supply, we can refer to it as a free-energy limited species. 'Free energy' here refers to the amount of work that can be extracted from an energy source, when that work is performed at a given operating or ambient temperature. Since energy must be conserved, all energy used to do this work must be expelled, usually as waste heat, with a higher entropy than it had before it performed the work, unless it is stored. 10 There are many definitions of free energy, reflecting the complication that the precise amount of work that can be done with a given energy source will depend on the nature of the mechanism doing the work, and how it changes its environment. Because we are making order-of-magnitude argument, and to avoid committing ourselves to particular models of alien technology, we will use the concept generally. The term 'energy limited life' is usually applied to parts Earth's biosphere with barely enough free energy to sustain any terrestrial life at all, and so what life there is has its metabolic rate limited by free energy, not some other resource. Intelligent life, being able to apply energy to overcome every other resource limitation, has the potential to become free-energy limited on a much larger scale. Such a species could still grow its energy use (by increasing its efficiency), and it may be able to expand to acquire additional free energy (from other stars, for instance), but we do not expect to be able to detect much low entropy energy from it (because it is using as much as it can), and we should expect to detect nearly its entire energy supply as it is reradiated as waste heat. It is perhaps likely that no species can ever become truly free-energy limited, but any species that approaches this limit (say, consuming more than a few percent of the available free-energy) will have a marked and detectable effect on the MIR luminosity of its host planet, star, or galaxy. As we will see, a truly free-energy limited species would have a profound and easily-detected effect on its host star(s), and a thorough waste-heat search with currently available data can rule out certain classes of free-energy limited species out to intergalactic distances. ## 4.3. Terrestrial Limitations on Biological Energy Use Life on Earth has spread nearly everywhere. A majority of its surface has life, so a test for metabolic processes would succeed on most randomly selected samples of Earth's soil or water (in some cases even the ice, air, and deep Earth would pass such a test). The sunlight that lands on Earth is used directly by vegetation across the globe (and 10 Waste heat, by definition, cannot be used to do work in an environment at or warmer than the heat's temperature. As we will see, this will set a practical lower limit to the temperature of waste heat of ETIs. indirectly by organisms higher on the food chain), and even more of this energy is used passively by life because it warms the environment and drives the wind, weather, and climate upon which many species rely. Obviously, exponential growth is limited in individual species by a variety of factors, but the biosphere considered as a whole has managed to expand the amount of solar energy captured for metabolism to around 5% (Paper II), limited by the nonuniform presence of key nutrients across the Earth's surface - primarily fresh water, phosphorus, and nitrogen. Life on Earth is not free-energy-limited because, up until recently, it has not had the intelligence and mega-engineering to distribute Earth's resources to all of the places solar energy happens to fall, and so it is, in most places, nutrient-limited (see, for example discussions in Reich et al. 2006; Pe˜uelas et al. 2011). n An intelligent species, by our 'physicist's definition', could apply some of the unused solar energy to redistribute these limiting resources, and so expand life's footprint beyond what 4 billion years of evolution has managed. Indeed, artificial fertilization and irrigation are exactly this redistribution, and we rightfully identify the development of these methods as a turning point in human history and a hallmark of civilization. Today, humanity has made photosynthetic activity common in many nominally inhospitable parts of the American Southwest and Middle East, for instance. If we consider our own energy generation as part of the biosphere's metabolism, then photovoltaic arrays, wind farms, and other forms of solar power stations represent further extensions of this trend. Non-intelligent life on a planetary scale is not directly detectable from its waste heat, because the ground beneath it would absorb and reradiate thermal energy even in the absence of life. But spacefaring intelligent civilizations, by our definition of them, are able to extend beyond the spatial limits where planets naturally re-radiate starlight to their circumstellar and pan-galactic environments, and so are susceptible to searches for their waste heat. ## 4.4. Humanity as Case Study Humanity's ever-increasing energy demands drive the exploitation of more and more sources of energy with higher and higher degrees of difficulty. Even if one country, today, cannot increase its energy supply, or simply declines to increase it, this does not mean that humanity as a species will forever cease to increase it. Indeed, a major difficulty today is not how humanity might continue to increase its energy supply, but how to manage sufficient international cooperation even to limit its fossil-fuel consumption in the face of ecological catastrophe. It is instructive to note along these lines that humanity's energy supply has doubled in the past 30 years. Left unchecked, such a doubling rate would imply an energy supply equal to the total incident solar flux on the Earth in ∼ 400 years, at which point direct heating of the Earth would create a significant increase in temperature. If this energy generation were accomplished entirely from non-Solar sources then the equilibrium temperature of the Earth would increase by ∼ 50 K, rendering it essentially uninhabitable. If accomplished from solar sources, the interception of such a large fraction of sunlight would have dramatic consequences for climate and the biosphere. From this we can conclude that if no other limits or global cooperation intervene, humanity's energy supply on Earth must maximize at some point in the next few centuries, having effectively saturated the planet's capacity for waste heat. But it would be incorrect to conclude that this somehow invalidates the conclusion that energy supply growth may be inevitable. On the contrary, this calculation illustrates how rapidly, on a cosmic timescale, humanity's energy needs can approach fundamental limits (see, e.g. (von Hoerner 1975)). As humanity expands into space, these limits will expand dramatically, and as humanity's technology level increases its ability to approach them will only improve. ## 5. REINFORCING HART'S TEMPORAL ARGUMENT Having established Hart's argument for colonization, and extended his reasoning to energy use, we now consider some rebuttals to Hart's argument, and add our own observations. ## 5.1. Maximum Timescale for Galactic Colonization As we have discussed, percolation and automata theory has been a popular approach for estimating the timescale for Galactic colonization (Hair &amp; Hedman 2013; Landis 1998; Vukoti´ c &amp; Cirkovi´ 2012). ´ c In these approaches, one typically considers a static network of stars, and so many of these models do not account for Galactic shear and the physics of halo orbits in their calculations. In particular, Newman &amp; Sagan (1981) found that colonization times could reach ∼ 10 10 years for slowly growing civilizations because they were limited to expand along their frontiers, and that they eventually 'outgrow' their colonization phase (the latter is also an example of the monocultural fallacy). The static model of stars, in which a supercivilization can be said to occupy a compact and contiguous region of space, is a reasonable approximation for short times ( /lessorsimilar 10 5 years) and in the case of fast ships (with velocities in significant excess of the typical thermal or orbital velocities of the stars, so ∼ 10 -2 c ). In such cases, the stars essentially sit still while the ships move at a significant fraction of c and populate a small region of the galaxy in some small multiple of the region's light-crossing time. But for longer times or slower ships, the model fails badly because the stars in the galaxy are not static, even in a rotating Galactic frame. ## 5.2. A Model for the Inevitably Fast Colonization of the Galaxy with Slow Spacecraft Let us consider conservative timescales involved for a 'slow' civilization in the Milky Way. In the interest of calculating a maximum galaxy colonization time, we will assume a single spacefaring civilization arises, and that it is confined to launching colony ships traveling at 10 -4 c (i.e. comparable to the orbital speeds of the planets in the Solar System, and to that of our interplanetary probes). To be further conservative will assume zero technological development for the homeworld and the diaspora after the launch of the first ship. Finally, we will further conservatively assume that such ships are launched at a very slow rate, every 10 4 years, and have a maximum range of 10 pc. Travel time to the nearest stars is then of order 10 -4 c/ 1pc ∼ 10 5 years, in which time ∼ 10 ships will be launched. Since this travel speed is also comparable to the velocity dispersion of stars in the Galactic midplane, this timescale also describes the time it takes for stars to mix locally, bringing new stars into range of the colony ships. To first order, the stellar system can thus continue to populate the 10 nearest stars every 10 5 years, without immediately saturating its neighborhood with colonies or the need to launch faster or longer-lived colony ships to continue its expansion. Further, arrival of the colony ships at the nearby stars should not be modeled as a pause in the expansion of the civilization. Rather, the colonies themselves will continue to travel at these speeds with respect to the home stellar system, and themselves encounter fresh stars for colonization every 10 5 years, during which time they can also launch 10 colony ships. Since the time to launch a new colony ship in our model is shorter than the cruise times, the expansion rate of the supercivilization is set by the velocity dispersion of the stars, not the speed of the ships or the time it takes a colony to generate a new ship. Halo stars further shorten galactic colonization timescales because of their high relative velocities to the disk (of order 10 -3 c ). Halo stars, being significantly more metal poor than the disk, may have too few planets or other resources to make effective colonization destinations, but they can still be used to provide gravity assists to colony ships, giving them speeds relative to the local standard of rest of 10 -3 c . Thus, the travel time to any point in the galaxy for a ship is the travel time to the nearest suitable halo star (10 5 years in our example), plus the length of a cruise phase at ∼ 10 -3 c , plus the time required for deceleration (also 10 5 years, if another halo star near the destination is used). This scheme would allow the ships in our example to extend their range to 100 pc. If we drop the assumption of a maximum range for our colony ships, halo stars provide a capability to travel 1 kpc in 3 Myr, dominated by the long cruise time. Since the typical velocity of halo stars with respect to a disk star is simply the orbital speed of stars at a given galactocentric radius, use of halo stars for gravitational assists allows a ship to cross the galaxy on a rotational timescale, by definition. The slow expansion of an ETI should thus be modeled not as an expanding circle or sphere, subject to saturation and 'fronts' of slower-expanding components of the supercivilization. A better model is as the mixing of a gas, as every colonizing world populates the stars that come near it, and those stars disperse into the galaxy in random directions, further 'contaminating' every star they come near. If halo stars are themselves colonizable, then those that counter-rotate and remain near the plane will provide even faster means of colonization, since they will encounter ∼ 10 times as many stars per unit time as disk stars. Non-circular orbits also provide significant radial mixing, and Galactic shear provides an additional source of mixing that is comparable to that of the velocity dispersion of the disk stars once the colonies have spread to v rot /σ v ∼ 1 / 10 of galaxy's size, or ∼ 1 kpc from the home stellar system. We conclude that once a civilization develops and employs the technology to colonize the nearest stars, it will populate the entire galaxy in no more than ∼ 10 -10 8 9 years, given our deliberately conservative assumptions of colony ship launch rate (10 2 Myr -1 ), cruising speeds (30 km s -1 ), and technological advancement rate (zero). More 'realistic' values for these parameters will only decrease the galatic colonization timescale. ## 5.3. Implications For Extragalactic SETI Thus, we see that galactic colonization timescales are likely to be at least one orders of magnitude shorter than the ages of galaxies, and rotational shear and the thermal motions will disperse and 'mix' any Fermi bubbles on a rotational timescale. Indeed, we find that the maximum timescale for Galactic colonization for a spacefaring civilization is on the order of a Galactic rotation ( 10 8 years), even for present-day probe speeds . It is therefore only for a brief period of a galaxy's history that an ETI would have populated only single contiguous part of a galaxy, and we should expect only a brief transition period between the rise of the first spacefaring civilization(s) and a galaxy-spanning supercivilization. To first order, one would expect the fraction of galaxies that have been only partially populated to be the ratio of the colonization timescale to the galaxy's age, or roughly 10 8 / 10 10 ∼ 1%. Until we have discovered 100 galaxy-spanning supercivilizations, we should not expect to find any Fermi bubbles (Papagiannis 1980). There are important implications for extragalactic waste heat SETI, as well. Because stars in a galaxy will thoroughly 'mix' a civilization with their random motions, especially in an elliptical galaxy where there are fewer strongly correlated velocities, the waste heat of an alien supercivilization should be smoothly distributed across the galaxy. This is in contrast to interstellar dust, which, being self-gravitating and dissipative, will tend to clump and collect into a disk. Morphology could thus be a powerful discriminant between midinfrared emission from dust and ETI's (Chandler 2013). ## 6. REINFORCING HART'S SOCIOLOGICAL ARGUMENT Our fast maximum colonization timescale for the Galaxy allows us to reconsider some rebuttals to Hart's sociological argument. ## 6.1. Rebutting Extinction Arguments In the case of the possibility of extinction, Hart's temporal reasoning appears at first to work against him: while the Earthlings of the 20th century may have avoided global thermonuclear war, this does not mean that the Earthlings of the 21st century will avoid extinction by a manufactured supervirus plague, or that those of the 22nd century will avoid catastrophic climate change from runaway greenhouse warming, or that those of the 23rd century will avoid becoming fodder for runaway, exponentially self-replicating nanobots. 11 In other words, even for a fixed extinction probability per unit time, extinction is inevitable, and it is reasonable to suppose that extinction probability per unit time would grow (or at least not decrease) with technological development. This argument has merit, but it only applies during the narrow time frame during which a civilization has the capability and propensity to destroy itself and all of its colonies . This certainly applies to Earth today, but once a self-sufficient lunar or Martian colony exists, the colony can act as a 'lifeboat' that can repopulate the Earth after the effects of any disaster. Once nearby star systems are colonized, humanity's expansion into the Galaxy can proceed even without the Earth, even if colonies occasionally extinguish themselves. As long as the periods between extinction are typically longer than the periods between the launch of successful colony ships, the expansion of life into the galaxy can proceed apace. Thus, the existential threats to any spacefaring species, including both externally and internally induced extinction or cultural collapse, decrease with its size. When confined to a single planet, many dangers exist, but a single selfsufficient colony will immunize the species from intra-planetary war, climate change, and even asteroid or comet impact. Spreading to a nearby star eliminates extinction from interplanetary warfare or a catastrophe with its host star. Once the civilization grows across a significant fraction of the Galaxy, either from fast colony ships or because the host stars have spread apart naturally, supernovae and gamma-ray bursts (GRBs) will also fail to be effective sterilizers. This defense is quite robust: even turning the same mechanisms that make the spread and persistence of spacefaring life robust against life does not defeat this line of reasoning. For instance, a fleet of self-replicating machines ('von Neumann' machines, Freitas 1980; Neumann 1966) that attempted to exploit the powers of exponential growth could rapidly colonize the Galaxy to perform some task. But even if this task were to scour the galaxy of life ('berserkers', e.g. Saberhagen 1967) they would eventually become ineffective, since the technology of colonies on the far side of the galaxy will have advanced by millions of years by the time the berserkers arrive. Even if one invokes berserkers that can grow and adapt to such advancement and succeed in their task, the berserkers themselves would constitute an intelligent, spacefaring, galaxy-spanning supercivilization by our definition of it, which defeats the purpose of the argument. ## 6.2. Stellar Distances Preclude Interstellar Coordination The monocultural fallacy includes treating a single species as a single culture. Even if a civilization is not generally inclined to colonize or communicate, this does not mean that it will not happen. To use a human analogy, it was certainly true that 'European culture' before the 15th century had little or no inclination to cross the Atlantic and colonize the New World, but this did not prevent a sub-culture within Europe from accomplishing the task (twice!). Indeed, the number of distinct civilizations within a species will increase as the size of the civilization grows. This is because 'culture' is a phenomenon born of coordination and collective action, which become more difficult when communication becomes slow, or the possibility of coercion becomes remote because of the distances involved. To continue the European analogy, long communication times and very slow exchange of population meant the colonies of the European powers had distinct cultures, which in some cases were kept in line only through the great expense of extending military force over long distances. While radio communication can, in this sense, make a planet more culturally integrated, and so potentially more uniform, interplanetary and interstellar distances make even this solution inadequate. Once colonies are separated by light travel times that are a substantial fraction of a lifetime or significantly longer than the timescales over which cultures evolve, the coordination and collective action that characterizes a single culture become impossible. An interstellar Napoleon could not hope to bring under his sway colonies beyond a radius of one light-lifetime. We should then anticipate that extraterrestrial civilizations that span more than one planetary system should not be characterized by a single set of cultural characteristics, but as a supercivilization. We use the term 'supercivilization' to be the set of a large number of widely separated civilizations with distinct cultures, whose shared features result from their common origin, not any social coordination (which would be impossible due to the large light travel time involved). Supercivilizations are thus resistent to many sociological resolutions to the Fermi-Hart Paradox. Since supercivilizations are the consequence of large light travel time, faster-than-light communication (or travel) would make it possible to avoid cultural diversity. Indeed, if travel and communication time can be made arbitrarily short (a convenience adopted, for instance, in much science fiction), then a highly organized species might be able to impose a single culture across a large region of space; one could rule the Galaxy (or the universe!) from the White House. The spatial portion of the monocultural fallacy, then, is subject to the (reasonable) assumption that the speed of light is an inviolable maximum. The temporal aspect, similarly, is subject to the assumption that (backwards) time travel is not possible. Thus, we should not expect spacefaring civilizations to go extinct (even from external causes!) once they form supercivilizations so large that the timescale for communication across the supercivilization is larger than the timescale for technological advancement and cultural evolution. 11 'Grey goo' (see 'Some Limits to Global Ecophagy by Biovorous Nanoreplicators, with Public Policy Recommendations' Freitas (2000): http://www.foresight.org/nano/Ecophagy.html). ## 6.3. Rebutting Sustainability Arguments 6.3.1. Lack of Universal Mechanism In the case of the sustainability hypothesis (Section 3.2.2), it is certainly reasonable to suggest that individual long-lived civilizations must inevitably stabilize their population (and, implicitly, their energy use). This certainly seems to be true of humanity in the short-run future, as standards of living improve globally and birth rates decline. Alternatively, such a stabilization might come about because of a limitation of resources, such as land or some element key to that civilizations' technology, or negative feedback from catastrophic climate change induced by greenhouse warming or direct heating. Nonetheless, any proffered solution to the Fermi Paradox based upon the sustainability hypothesis must address three issues. First, it should specify at least one plausible mechanism by which rapidly growing civilizations inevitably collapse (since, for instance, the collapse of innumerable civilizations on earth has not yet permanently checked our species' exponential population and energy growth). Secondly, it should explain why these mechanisms prevent not just exponential population growth within the civilization, but galactic colonization by that civilization (e.g. why it precludes a galactic super-civilization composed of sustainable civilizations). Finally, it should explain why such a mechanism would be universal not just across species, but within species across both space and time (i.e. why it is not an example of the 'monocultural fallacy'). We find that the Sustainability Solution, and the Light Cage Limit specifically, do not adequately address these three issues. We certainly agree with the general assertion that exponential growth at even modest rates will quickly reach even the highest physical limits. But it is unclear why reaching such a limit would inevitably lead to a catastrophic, permanent cultural collapse, rather than slowing of growth. Further, it is unclear why even such a collapse would preclude the launching of additional colony ships for periods long on a cosmic timescale (as opposed to merely being long on a human timescale). Finally, and perhaps because the mechanism is unclear, it is unclear why this mechanism would be universal to all colonies of all species, for all time. The Light Cage Limit hypothesis expressly assumes that a young, rapidly expanding civilization colonizing nearby stars will experience a civilization-wide collapse, via a shared economy. The Sustainability Solution makes this assumption implicitly by modeling the entire supercivilization as a single unit. But as we have argued, civilizations spanning multiple stars should be expected to behave more or less independently. Examples from our own history can provide counterexamples to these sustainability arguments. Consider, for instance, the first hominid migrations out of Africa, which has many similarities in many ways to stellar colonization. The independent tribes could interact, but any communication was limited to word-of-mouth (or hand), so there could be no unifying culture and they together formed a loose 'super-tribe', analogous to our 'supercivilization'. Hominid tribes at the time had only pedestrian locomotion, and so the super-tribe was effectively more than one 'foot-lifetime' across. Because land was an effectively unlimited resource, the hominid population could grow through the expansion of the number of tribes, regardless of the degree of sustainability of the individual tribes. Only once all of the most habitable areas accessible by foot had been colonized could resource depletion check global population, even if locally tribes were forced to compete for scarce resources before then. Analogously, in galactic colonization the relevant resource is other stars . So until a galaxy-wide supercivilization is established, there is no resource saturation that would check the growth of the number of civilizations, even if many individual civilizations are unsustainable. Put another way, sustainability solutions conflate the issue of the speed of population growth within single civilization, with the speed of the spread of a supercivilization across a galaxy. Such solutions only solve the Fermi Paradox if all civilizations are so universally unsustainable that none ever manages even a single colony ship; or if long-lived, sustainable alien civilizations for some reason inevitably and eternally decline to launch colony ships (which seems to us a hypothesis disconnected from that of 'sustainability'). ## 6.3.2. Colonization Need Not Be Driven by Overcrowding or Resource Depletion A possible objection to this observation is that without resource depletion or population pressure, there is no motivation to launch colony ships. In this view, civilizations that are locally slow- or non-growing are also inevitably slow- or non-colonizing. Indeed, models such as those of Haqq-Misra &amp; Baum (2009) and Newman &amp; Sagan (1981) often implicitly and sometimes explicitly assume that interstellar colonization is driven by population growth or resource depletion. This seems to us an unmotivated and dubious assumption. It seems unlikely that colony ships could transport a sufficient number of souls that they could relieve population pressure, and so colonizing for this purpose makes little sense (von Hoerner 1975). While it is true that such pressures might provide special inducement for small sections of a population to leave for the purposes of avoiding crowding, the very long cruise times to other stars mean that they would typically be leaving to finish their lives on the colony ships. Given a large population, advanced technology, nearby unpopulated planets, and enough time, colony ships might be launched for any number of other reasons. As another earth-based counterexample, consider Europeans' spread across the Earth: the initial discovery and colonizations of the Americas or Australia were not undertaken primarily because European population or food scarcity had reached some threshold that inspired mass exploration and emigration. Rather, they were undertaken by small numbers of people (small relative to their native lands' population) for a variety of social and political reasons. Further, the primary trigger of the establishment of European colonies was not overcrowding or resource depletion in Europe, but the widespread availability of the technology to cross the oceans and develop self-sustaining colonies on distant shores. Analogously, the short maximum galactic colonization time we described in Section 5.2 applies even in cases where resource use is proceeding sustainably and population (and energy use) growth on individual, mature colonies is zero, since it only requires a single colony ship to be launched at least every 10,000 years from every colony, for any reason. Indeed, sustainability dramatically decreases the colonization time of the galaxy because it allows for the existence of long-lived civilizations on many stars, each of which can continue colonizing the galaxy for their duration. Thus, neither catastrophic social collapse (which should be impossible across a supercivilization anyway) nor slow or zero population growth of mature colonies is inconsistent with Galactic colonization, and so even if the sustainability hypothesis is correct, it should not prevent the colonization of the Galaxy. Finally, we reiterate that faster-than-light communication and travel provides another way for the sustainability hypothesis to solve the Fermi Paradox, because it allows evasion of the monocultural fallacy. Such capability allows there to truly be one single galaxy-spanning civilization, capable of coordinating its own sustainability, or its own demise through universal, unsustainable practices. ## 6.3.3. Implications for Waste-Heat SETI All that said, if the sustainability hypothesis is valid and inevitable, then the average ETI energy supply across a galaxy may be quite low since long-lived civilizations will all have low resource consumption (i.e. energy use). A waste heat search may then need to be extremely sensitive to successfully detect alien waste heat. In some sense then, even a null waste-heat search will put lower limits on the sustainability of the (undetected) civilizations around the stars and in the galaxy it searches. The more sensitive the waste heat search is, the lower these limits will be, and the more valid the sustainability hypothesis will appear. Indeed, the sustainability hypothesis has fascinating implications for this average energy supply. Consider one extreme of the sustainability hypothesis: the short-lived, fast growing civilizations. Since the technology required to send ships to another star (a technology threshold we have nearly reached) is significantly simpler than that of capturing all of a star's energy (we currently short by a factor of ∼ 10 14 ) one can imagine a scenario where a galactic supercivilization is born, and then some of its component colonies become voracious, developing unsustainable technologies. They might commonly seek energy supplies larger than their stars can naturally provide, and rather than sustaining themselves for billions of years on starlight, 'burn' their stars at a higher luminosity (for instance by feeding them to a black hole). Such civilizations would have very high power supplies (rivaling giant stars, or higher), but be necessarily short-lived (either for ecological reasons or simply because they run out of energy). Indeed, taken to the extreme, this 'live fast, die young' scenario results in a galactic supercivilization of short-lived 'energy hogs,' Haqq-Misra &amp; Baum (the 'graveyard civilization' of 2009). These civilizations with short lifetimes, while rare, would also have approximately correspondingly higher wasteheat output, and so still be significant contributors to the galactic heat budget. A waste-heat search in the integrated starlight of such a galaxy might still succeed: it would be sensitive to a phase average of the civilizations orbiting some significant fraction of the ∼ 10 11 stars in the galaxy, and the 'energy hogs' might make the average significantly higher than it would otherwise be. ## 6.4. They Exist and We Have Not Noticed Them If there is a large hole in Hart's argument it is in his assumption that at least one visitor to the Solar System would have stayed. Arguing that the Galaxy is filled with ETIs and that none of them colonize nearby stars is an example of the monocultural fallacy; it is much less fallacious to argue that none of the ETIs that has happened to visit the Solar System has decided to colonize it. Alternatively, an anthropic argument can be made that our very existence here, pondering this question, is predicated on the Solar System having remained unmolested up to the present day, despite being in a galaxy teeming with ETIs. In either case the other stars in the Milky Way would host inhabited worlds, and we have simply not yet noticed. To use an earthly analogy, most individual animals on Earth have probably never seen a human, despite our ability (in principle) to colonize every corner of it. So would we necessarily have noticed that the Galaxy is filled with ETIs? Given that the age of the Galaxy is consistent with ETIs being billions of years more advanced that we are, we must anticipate that we might not recognize many ETIs if we were to encounter them, any more than an ant colony might recognize humans as a fellow organized species (von Hoerner 1975). This concern must also be applied to any attempts they might make to engineer deliberate signals for us to detect. Sagan (1973) considered the probable timescales involved for the development (and destruction) of ETIs and argued that, even if our Galaxy is saturated with intelligent life, much of it has most likely survived catastrophe, evolved beyond this communication horizon, and is thus invisible to communication SETI. One way in which alien civilizations would be very recognizable at any level of technological development would be in their use of energy. By searching for evidence of energy use, we would free ourselves of the guesswork of communication with unknown intelligence and the assumptions of what form alien life or advanced technology would take, and root ourselves in fundamental science. ## 6.5. The Optimism of Hart's Conclusions Harts thesis combines the short colonization timescales with the other aspects of his argument to claim that the Milky Way should contain either zero space-faring civilizations, or be filled with them. Since the latter option appears not to be the case, he concluded that we are alone in the Milky Way. However, Harts arguments apply equally well (or better) to other galaxies: every other galaxy represents an essentially independent realization of Harts thought experiment. We would therefore expect that all galaxies are either uninhabited by spacefaring civilizations or host (at least one) galaxy-spanning supercivilization. Indeed, if such galaxy-spanning civilizations could be detected, the relative numbers of inhabited and sterile galaxies would then provide a rough guide to the frequency of advanced ETI on a cosmic scale. Thus, Harts pessimism towards the utility of a search for ETIs in the Milky Way actually translates into an optimism for the existence of galaxy-spanning civilizations in other galaxies. But if a thorough search for such civilizations in galaxies across the local universe reveals nothing, then one of the following is true: - · Galaxy-spanning ETIs are universally undetectable (perhaps simply because their energy supplies are universally below our detection threshold) - · Harts thesis is fundamentally flawed, or - · Spacefaring life in the universe is so vanishingly rare that it is effectively unique to Earth. If the first of these is the case, then SETI efforts can proceed by improving our detection thresholds. If the second of these is the case (perhaps because faster-than-light communication is possible, or interstellar colonization is fundamentally difficult in some way not considered here), a search for within the Milky Way is much more likely to succeed than Hart asserted, and so should be pursued more vigorously. ## 7. PAST EFFORTS AND THE PROMISE OF WISE ## 7.1. The Plausibility and Detectability of Dyson Spheres We will argue in Paper II that starlight contains most of the useful free energy in a planetary system, so we expect that any long-lived ETIs with large energy supplies will primarily be driven by stars' energy. There are two obvious ways to convert a star's mass to useful energy: by collecting the starlight naturally generated by stellar fusion, and by attempting to extract mass-energy at a faster rate (and perhaps higher efficiency) through something like the Penrose mechanism using a black hole (Penrose 1969). Both methods require that the extracted or collected energy be ultimately reradiated as waste heat. At first glance, it may seem plausible that the complete collection of stellar photons could pose insurmountable engineering problems, but in fact the minimum physical requirements of such an endeavor are not so severe as to be physically impossible. A Dyson sphere need not be considered as a solid object, and the collection, operating, and radiation surfaces need not be coincident. Perhaps the simplest model would consist of a swarm of collectors (a 'Dyson swarm') orbiting very close to a star, converting stellar photons into useful energy (and thus reducing the amount of starlight that escapes). This energy could then be transmitted (for instance with lasers) to the locations where the alien civilization does its work. Without specifying their exact nature, we might call these locations 'factories', or imagine that they are parts of a 'stellar engine' (Badescu &amp; Cathcart 2000). These factories would radiate the waste heat from the work they do. Basic energy balance reveals that these factories would require an outward surface area equal to a sphere 1 AU in radius to radiate a solar luminosity of 255 K waste heat. Such a structure or series of structures would certainly require mega-engineering of almost inconceivable complexity, but the amount of available mass in a stellar system does not necessarily prohibit such a structure: even beyond the mass available in the star itself, a single giant planet contains enough material for such a radiating surface (the volume of Jupiter is equivalent to a solid shell 1 AU in radius and over 5 meters in thickness). The construction of such surfaces, then, requires 'just' engineering, the desire for more energy use, time, and the application of sufficient energy. Indeed, a Dyson swarm may not even require central planning, but might arise naturally from many independent subcultures' ever-increasing energy demands. We can only imagine (probably unsuccessfully) what kind of projects an ETI could complete with such an energy resource. But regardless of their intentions, thermodynamics dictates that a significant fraction of that energy must be expelled as waste heat corresponding to the operating temperature of their technological efforts. If an ETI prefers terrestrial conditions like ours, this operating temperature would likely then be measured in hundreds of Kelvins, which implies strong radiation in the MIR. Therefore, one promising SETI approach would be to look for the spectral signatures of this process. If the star were perfectly encased by such a shell of structures orbiting at about 1 AU, the resulting spectrum would then appear to be a good, few-hundred-Kelvin blackbody, with a temperature depending on the thermodynamic efficiency (Badescu 1995; Slysh 1985). ## 7.2. Past Searches for Dyson Spheres Very wide-field infrared surveys are clearly needed to systematically search for these structures. The Infrared All-Sky Survey ( IRAS ; Neugebauer et al. 1984) provided a hallmark survey for homogeneously investigating infrared sources and identifying Dyson sphere candidates; Slysh (1985) reasoned that the survey could detect (mostly complete) Dyson spheres out to ∼ 1 kpc. The survey immediately showed several potential Dyson sphere candidates, but the infrared colors and low resolution spectra of candidate objects can be confused with stars of many ages obscured by reddened and dusty objects such as stars behind large amounts of extinction, protostars, Mira variables, stars in the AGB phase of evolution and beyond, and planetary nebulæ. Nonetheless, Jugaku et al. performed a series of follow-up searches on catalogs of IRAS sources, concentrating on those with excess flux around 12 µ (Jugaku &amp; Nishimura 1991; Jugaku et al. 1995; Jugaku &amp; Nishimura 1997, 2000). These studies hunted for objects with anomalously red ( K -12 µ ) colors, using both archival and new K -band photometry. These studies combined determined that there are unlikely any partial to full Dyson spheres around the 365 solar-type stars analyzed within 25 pc. Further results using 2MASS photometry indicated the same with an additional sample of 180 stars within the same distance (Jugaku &amp; Nishimura 2004). Later work (Carrigan 2009a; Carrigan 2009b) examined sources observed with the IRAS low resolution spectrometer (LRS) to determine whether their SEDs could be fit by the blackbody spectra of full or partial Dyson spheres (T = 100-600K). Very few of the 11,000 sources investigated with the LRS were weak Dyson sphere candidates; the spectra of these typically had characteristics of carbon stars with 11.3 mm SiC emission features. The most promising candidate, IRAS 20369+5131, had the most accurate blackbody fit to its spectrum (T = 376K), but is more likely a distant red giant star with no visible 11.3 mm emission peak. Carrigan (2012) noted that no obvious H i emission of an artificial and intentional origin was detected from this or other Dyson sphere candidates, again underlining the importance of this archeological SETI. These source lists do not overlap with another study of Planck spectrum fits to IRAS data, specifically broadband measurements (Timofeev et al. 2000). Carrigan (2009b) argued that fitting LRS data is fundamentally superior to fitting the sparser broadband data, discriminating against filter measurements that only approximately follow a Planck distribution, but have distinct discrepancies in their SEDs. But in any case, an observed deficit of OH and SiO emission for the more promising (however unlikely) sources from any of these programs would be needed to more concretely identify proper Dyson sphere candidates (Slysh 1985) and rule out more customary astrophysical phenomena. ## 7.3. Past searches for Galaxy-Spanning Supercivilizations Unlike the equivalent searches for these effects on individual stars, few SETI programs to hunt for their accumulated effects of collections of stars have been completed. Annis (1999b) looked for outliers of the Tully-Fischer relation for a sample of 57 spiral galaxies, and found that the scatter intrinsic to the plots can be attributed to natural causes (e.g., dust extinction) and would only correspond to brightness discrepancies of ≈ 50% or less. He considered magnitude differences of 1.5 mag or more - stellar optical obscuration by 75% or more - as possible candidates for homes of expansive supercivilizations. The same was true for his sample of 106 elliptical galaxies on the fundamental plane. He found no inexplicable outliers on that diagram, either. Assuming that the emergence of galaxy-wide supercivilizations can be modeled with Poisson statistics, Annis (1999b) inferred that, without evidence of these supercivilizations in the Milky Way, M31, or M33, the timescale of this evolution could be about 7 billion years, and could rise to hundreds of billions of years if the other galaxies of his sample are considered. This is an important first attempt to evaluate our isolation in the universe based on observable characteristics of nearby galaxies, constraining the number of supercivilizations there may well be in the low-redshift Universe. Of course the assumption that their development is a random process and independent of time is highly uncertain, and seems to contradict, e.g., the time-dependent phase transition arguments of Cirkovi´ &amp; Vukoti´ (2008). ´ c c This type of statistical analysis of galaxy properties, while elegant, has its disadvantages. It is limited to galaxies already discovered and classified in optical catalogs, and so would necessarily miss galaxies with little to no optical emission (i.e., completely obscured by Dyson spheres). H i surveys are starting to uncover H i consolidations like VirgoH i 21(Minchin et al. 2005) that would lie well off either the Tully-Fischer relation or the Fundamental Plane and almost certainly have astrophysical explanations. VirgoH i 21 in particular has ≈ 10 8 M /circledot of H i spread across 16 kpc, and given its velocity dispersion, has a dynamical mass-to-light ratio of ≈ 500 M /circledot /L /circledot . There is no presently observed optical component, placing it 12 magnitudes off the Tully-Fischer relation and a clear initial candidate for that methodology. However, VirgoH i 21 is likely a dark halo devoid of a central bright galaxy (Minchin et al. 2005) and not a fully inhabited galaxy. Many unusual galaxies off the traditional relations may well be surrounded by different masses of halos or simply be very dusty. To help eliminate these cases, additional observations and a larger sample size of homogeneously surveyed galaxies (preferably in the infrared) are needed. ## 7.4. The promise of WISE An effective search for ETI's with large energy supplies would image a large sample of stars and galaxies in midand far-infrared wavelengths, and look for anomalous colors or SEDs that would indicate the presence of an advanced civilization. Such a search for ETI's has been performed by Timofeev et al. (2000), Jugaku &amp; Nishimura (1991), Jugaku et al. (1995), Jugaku &amp; Nishimura (1997), and Carrigan (2009b). A search for galaxy-spanning civilizations would operate on similar principles, but on the integrated starlight of entire galaxes. The Infrared Astronomical Satellite ( IRAS , Neugebauer et al. 1984) performed photometry at 12, 25, 60, and 100 µ and low resolution spectroscopy from 7.5 to 23 µ . IRAS offered sensitivity of around 0.2 Jy (1 Jy at 100 µ ) (Moshir &amp; et al. 1990), and angular resolution of 30 ′′ at 12 µ , and 2 ′ at 100 µ . This has been the primary dataset used in previous searches for alien waste heat. High hopes for the sensitivity of IRAS to Dyson spheres were dashed by the unexpected discovery of the infrared cirrus (Weiland et al. 1986). The high backgrounds made the point source sensitivity of the relatively large IRAS beam significantly lower than anticipated at 60 and 100 µ , as did the corresponding PAH emission in the shorter-wavelength bands. The High Frequency Instrument of the Planck mission (Planck Collaboration et al. 2011) detected galaxies at 350 µ as compact sources with 4 5 resolution and a sensitivity of 3 Jy, and might be used for the (non-)detection of far-infrared . ′ (FIR) thermal emission from dust from bright sources (to rule out extraterrestrial origin of the MIR emission). In 2009, the Wide-field Infrared Survey Explorer ( WISE , Wright et al. 2010) launched and began its all-sky survey. WISE provides photometry at 3.4, 4.62 12 and 22 µ (the W W W 1, 2, 3, and W 4 bands), with angular resolution of 6 1, 6 . ′′ . ′′ 4, 6 . ′′ 5, and 12 ′′ , and sensitivities of 0.07, 0.1, 0.9, and 5.4 mJy, respectively (with ∼ 3% photometric accuracy) (Cutri et al. 2012; Jarrett et al. 2011) WISE thus provides 5 times better angular resolution and 1000 times better sensitivity than IRAS . WISE thus affords us a deeper and more accurate glimpse into our own Galaxy for finding evidence of Dyson spheres, and a significantly improved ability to accurately detect, resolve, and image approximately 10 5 galaxies across the sky in four infrared photometric bands and hunt for galaxy-spanning civilizations among them. Additional surveys, such as the SWIRE stare, GLIMPSE, and MIPSGAL of the Spitzer Space Telescope, provide superior sensitivity and resolution to WISE , albeit with more limited spatial coverage. Together, these surveys provide a new and unprecedented glimpse into the universe of reprocessed starlight, including, potentially, the starlight that has been repurposed by ETI's. ## 8. RESULTS OF A THOROUGH WASTE-HEAT SEARCH ## 8.1. The possibility and consequence of a dispositive null detection The primary advantage to a waste-heat search for alien civilizations is that it makes no assumptions about how or whether an alien civilization would attempt communication. Further, since it can be extended to searches for supercivilizations in other galaxies, it can address resolutions to the Fermi-Hart paradox that allow for the ubiquity of spacefaring ETI's in the universe but excuse our lack of detection (for instance, many 'sociological' explanations for their unwillingness to contact us). This is in contrast to contact SETI, where the number of frequencies, duty cycles, and transmission methods of ETIs is large, and potentially inexhaustible. A null result in contact SETI is thus a failure to detect a certain class of ETI communication, while a thorough search for waste heat that comes up empty has the potential to be a successful demonstration of the absence of large ETI energy supplies with few hundred Kelvin waste heat temperatures. If the number of ETIs per galaxy is as high as optimistic solutions to the Drake equation suggest (Drake 1980; Papagiannis 1980), then it is plausible that some fraction of galaxies will show evidence of large scale civilizations. A null detection of galaxy-spanning ETI's with waste heat luminosities above some upper limit in a large sample of galaxies would thus correspond to an upper limit on alien energy supplies in general, and individual upper limits on every galaxy in the sample. For elliptical galaxies, this upper limit might be similar to current limits for nearby stars (of order a few percent). This would itself be an interesting result; to wit, at least one of the following must be true about galaxy-spanning alien civilizations in the search volume: - · They do not exist, or are sufficiently rare that they are not in our search volume - · They exist, but their total energy supplies are universally below the search's detection threshold - · ETI's with large energy supplies universally expel waste heat at low temperatures (i.e. wavelengths longer than the capabilities of the search), perhaps because their energy supply is not starlight (see Paper II) - · Spacefaring ETI's inevitably discover and universally employ physics that makes their civilizations effectively invisible in the MIR despite having large energy supplies (for example, expelling their waste heat as neutrinos, efficiently using their energy supply to emit low-entropy radiation, employing energy-to-mass conversion on a massive scale, or by violating conservation of energy). Indeed, since MIR-bright ETI's with energy supplies in excess of their host galaxy's luminosity would be all but trivial for a survey such as WISE to detect and distinguish out to great distances (it would resolve them out to z ∼ 0 1), the absence of any such galaxies would effectively rule out the possibility that physics allows for an easily . tapped source of 'free' energy (e.g. zero-point energy) at high effective temperatures, if galaxy-spanning ETI's exist (and such a possibility would make it significantly easier for them to exist in the first place). The absence of such civilizations would thus rule out an entire class of either exotic physics or ETI's. We quantify these statements in Paper II. The last two or three options on our list have little overlap with the resolutions to the 'contact' version of the Fermi paradox, demonstrating the complementary nature of waste-heat SETI with communication SETI. To wit, our uniqueness as an intelligent, spacefaring civilization would explain the null detections in both contact SETI and artifact SETI, but most of the other options on this list would not. The most parsimonious explanation for a null result from both methods, then, would simply be that we are alone in the Universe. Other explanations would need to invoke multiple reasons for our failure to detect ETI's. Another perspective is that a null detection of galaxy-spanning ETI's in the Local Universe is in conflict with Hart's thesis that spacefaring civilizations will quickly colonize their galaxy. Unless humanity is alone in the Universe , such a null detection would lend evidence to the hypothesis that spacefaring life rarely spreads far beyond its home star system, in which case searches within the Milky Way are much more likely to succeed than Hart argued. ## 8.2. Relation to the Rare Earth hypothesis The Rare Earth hypothesis of Ward &amp; Brownlee (2000) states that 'primitive' life is common in the universe but that animal life is unique to Earth. While null detections of waste-heat from ETIs would be consistent with this hypothesis, we stress that, unlike Ward &amp; Brownlee, we have not assumed that ETIs need be animal. Any spacefaring agent that satisfies our 'physicist's' definition of intelligent life should generate detectable waste heat. So, while a null detection of artifact SETI supports the conclusion of the Rare Earth hypothesis, it does not necessarily support the reasoning and evidence presented by Ward &amp; Brownlee in support of it. ## 8.3. The possibility and consequence of a positive detection A positive detection of waste heat from an alien civilization would have several consequences. Beyond demonstrating that alien life exists, it would also allow us to essentially 'peek ahead' at the nature of engineering of a vastly more advanced species, and perhaps allow us to test our current theories of fundamental physics. Such a detection would: - · Demonstrate that there are no insurmountable obstacles to energy supplies comparable to the luminosities of stars or galaxies - · Demonstrate that conservation of energy and the laws of thermodynamics, as we understand them, are not circumvented on a large scale by at least some very advanced civilizations, and so may be absolute. This might imply that attempting to overcome them at our level of technology would be fruitless. - · Allow analysis of the extent of the alien supercivilization, and so a measure of characteristic travel speed, potentially revealing the practicalities of travel near the speed of light. In short, it would validate the assumptions that underlie the search for alien waste heat. The fraction and extent of obscuration and reradiation by artificial constructions would certainly highlight important constraints on the unknown engineering of individual Dyson spheres, e.g., the fraction of stellar coverage and operating temperatures. They would also point to the colonization habits of ETI that have been thus far so difficult to anticipate, e.g., the extent, patterns, and timescales of their conquests. ## 9. CONCLUSIONS Artifact SETI complements communication SETI because it can help narrow and focus searches for communication on targets with unusually high MIR emission, and because artifact SETI alone will be hard pressed to prove that an unusual source is artificial. Together, the two methods may achieve what either one alone has not. Hart's conclusion was that if his thesis was correct, '( ) an extensive search for radio messages from other civilizations i is probably a waste of time and money; and ( ii ) in the long run, cultures descended from ours will probably occupy most of the habitable planets in our Galaxy.' We do not entirely agree. Regarding our long-run future if the Milk Way is 'empty', Hart's argument that destiny of humanity is that of a ubiquitous Galactic diaspora appears to be robust, provided we can establish self-sufficient colonies over a sufficiently large volume that our species' extinction becomes effectively impossible. Until then homo sapiens is vulnerable to global catastrophe (including self-induced annihilation) and this destiny is uncertain. It has been noted many times before that humankind is the first species capable of deliberately averting its own destruction (and, too, causing it); this underscores Sagan's assertion that Earth, our 'Pale Blue Dot', 'is where we make our stand' (Sagan &amp; Druyan 1994). Our species thus appears to be at the tipping point between eventual extinction and immortality, which only heightens the stakes of stewardship of our species and our biosphere. That said, we find that this observation does little to help 'solve' the Fermi Paradox. We find that solutions that invoke sustainability suffer from variations on what we dub the 'monocultural fallacy' (i.e., the attribution of certain traits or tendencies across all species, across all civilizations within a species, and across the entire duration of a civilization). We also find that some such solutions conflate the growth of populations within a civilization with the growth in the number of civilizations in a widely separated 'supercivilization' (by which we mean civilizations of common origin but separated by light travel times long compared to the timescales of cultural evolution). We also find that these solutions are weakened by our observation that the maximum time to colonize the Galaxy for a spacefaring civilization is likely to be quite short - on the order of a few galactic rotations. Hart's conclusion that we are alone in the Milky Way is certainly the simplest and perhaps most obvious explanation for the 'Great Silence,' but speculation about the nature of extraterrestrial life, especially life-as-we-do-not-know-it, is inherently so fraught with 'unknown unknowns' that declaring any well-considered SETI effort 'a waste' is to commit a failure of imagination. 12 To justify SETI it is sufficient to argue that the odds are uncertain, the payoff for success high, and the cost of searching low. But Hart's apparently pessimistic conclusion actually quite optimistic and allows for a superior justification: it implies that unless humanity is alone in the local universe , there should exist civilizations spanning many of the galaxies we see. If Hart's conclusions are correct, then even though any search for ETI's within the Milky Way should fail, unless spacefaring life is unique to Earth, an extragalactic search for has a sufficiently good chance of ultimate success that searches are worthwhile and should be developed . Contrariwise, if Hart's thesis is incorrect, then a search 12 To borrow a phrase from Clarke (1962). for galaxy-spanning civilizations in other galaxies might be futile (because they may not exist), but a search for circumstellar civilizations within the Milky Way is more likely to bear fruit than Hart asserted. Searching for both types of civilizations, with both artifact and communication SETI, is thus a compelling path forward for SETI efforts. We have provided a 'physicist's definition' of life and intelligence, and combined this with Hart's argument to argue that energy supply and waste heat are useful diagnostic of large alien energy supplies. Past efforts to search for waste heat have been hampered by the lack of a sensitive, wide-field mid-infrared survey. Today, WISE and Spitzer allow us to search for Galactic and extragalactic alien civilizations with large energy supplies, and to put some of Hart's conclusions to an empirical test. A successful detection of a distant alien civilization will give us a 'peek' into the limitations and possibilities of advanced ETIs. A null detection would implicate either the violation by alien technology of physical laws we consider fundamental, or the non-existence of ETI's with large energy supplies and mid-infrared waste heat in our search volume. This research is supported entirely by the John Templeton Foundation through its New Frontiers in Astronomy and Cosmology, administered by Don York of the University of Chicago. We are grateful for the opportunity provided by this grant to do this research. The Center for Exoplanets and Habitable Worlds is supported by the Pennsylvania State University, the Eberly College of Science, and the Pennsylvania Space Grant Consortium. This publication makes use of NASA's Astrophysics Data System. The literature on the spread, likelihood, and form of extraterrestrial intelligence in the universe is sprawling. This paper is not intended to be a comprehensive review of the problem of extraterrestrial civilizations. While we have tried in this and the later papers of this series to make it clear which contributions to the discussion are purely ours in the text, and while we have strived to provide appropriate citations to unoriginal ideas, it can be difficult to provide, or even recognize, proper citations for many important ideas pertaining to ETIs. In many cases, we may not even be aware of our influences. Many important ideas and seminal contributions appearing outside of peer-reviewed journals, for instance in conferences, reports, white papers, and even science fiction books, teleplays, and film, making them tricky to track down and cite. To give just three examples: The analogy of ants as an inferior species incapable of even comprehending humanity for our incomprehension of ETIs could cite 'The Search' by Randall Munroe 13 , but an earlier citation to 'Mind War' by J. Michael Straczynski (1994 Babylon 5 , Season 1, Episode 6, Act 5) is at least as appropriate; just before publication we discovered an early instance in von Hoerner (1975), but even earlier attestations may exist. The 'grey goo' scenario apparently originates with Eric Drexler's novel Engines of Creation , but the full implications were fleshed out later, most notably in an essay by Robert A. Freitas Jr. for which we provide a URL in footnote 11. We have cited von Hoerner (1975) for the SETI implications of the ultimate Malthusian limit of waste heat, but the online discussion surrounding Tom Murphy's blog posts 14 on 'Galactic-Scale Energy' deserves citation, as well. Even restricting oneself to the refereed literature, it can be difficult or impossible to find the origins of ideas that may have crept into popular culture, or to be sure an idea has not been thoroughly discussed somewhere. For instance, the term 'supercivilization' appears in Kardashev (1985) but likely has earlier attestations. In short, we apologize that the references included in this series of papers are not comprehensive, and we acknowledge that many ideas not original to us likely appear without citation. We thank Jill Tarter, Freeman Dyson, Franck Marchis, Bill Cochran, Marshall Perrin, and Geoff Marcy for helpful contributions and discussions, and Roger Griffith for his work with us on the WISE data set. We thank our referees for appropriately challenging our conclusions and sharpening our reasoning. S.S. thanks David Brin for many interesting discussions over the years. J.T.W. thanks Jill Tarter, Dan Wertheimer, and most especially Geoff Marcy for teaching him, by outstanding example, and that searches for ETI's can and should be a scientifically respectable endeavor. ## REFERENCES Annis, J. 1999a, Journal of the British Interplanetary Society, 52, Buchhave, L. A., Latham, D. W., Johansen, A., et al. 2012, 19 -. 1999b, Journal of the British Interplanetary Society, 52, 33 Armstrong, S., &amp; Sandberg, A. 2013, Acta Astronautica, 89, 1 Arnold, L. F. A. 2005, ApJ, 627, 534 Badescu, V. 1995, Acta Astronautica, 36, 135 Badescu, V., &amp; Cathcart, R. B. 2000, Journal of the British Interplanetary Society, 53, 297 Blair, D. G., Norris, R. P., Troup, E. R., et al. 1992, MNRAS, 257, 105 Bradbury, R. J., Cirkovic, M. M., &amp; Dvorsky, G. 2011, Journal of the British Interplanetary Society, 64, 156 Brin, G. D. 1983, QJRAS, 24, 283 - 13 http://xkcd.com/638/ Nature, 486, 375 Carrigan, Jr., R. A. 2009a, ApJ, 698, 2075 Carrigan, Jr., R. A. 2009b, in Astronomical Society of the Pacific Conference Series, Vol. 420, Bioastronomy 2007: Molecules, Microbes and Extraterrestrial Life, ed. K. J. Meech, J. V. Keane, M. J. Mumma, J. L. Siefert, &amp; D. J. Werthimer, 415 -. 2012, Acta Astronautica, 78, 121 Chandler, D. L. 2013, Astronomy Magazine, 23 Churchwell, E., Povich, M. S., Allen, D., et al. 2006, ApJ, 649, 759 ´ irkovi´, M. M. 2009, Serbian Astronomical Journal, 178, 1 C c ´ irkovi´, M. M., &amp; Vukoti´, B. 2008, Origins of Life and C c c Evolution of the Biosphere, 38, 535 Clarke, A. C. 1962, in Profiles of the Future: An Enquiry into the Limits of the Possible (Gollancz) Cohen, N. L., Malkan, M. A., &amp; Dickey, J. M. 1980, Icarus, 41, - 14 http://physics.ucsd.edu/do-the-math/2011/07/galactic-scale-energy/ 198 - Cutri, R. M., Wright, E. L., Conrow, T., et al. 2012, Explanatory Supplement to the WISE All-Sky Data Release Products, Tech. rep. Davidge, T. J. 1990, ApJ, 351, L37 - Drake, F. 1980, in Strategies for the search for life in the universe : a joint session of Commissions 16, 40, and 44, held in Montreal, Canada, during the IAU General Assembly, 15 and 16 August, 1979, ed. M. D. Papagiannis (Dordrecht, Holland ; Boston : D. Reidel Pub. Co. : sold and distributed in the U.S.A. and Canada by Kluwer Boston, c1980.) Dyson, F. J. 1960, Science, 131, 1667 - Forgan, D. H., &amp; Elvis, M. 2011, International Journal of Astrobiology, 10, 307 - Forgan, D. H., Papadogiannakis, S., &amp; Kitching, T. 2012, ArXiv e-prints, arXiv:1212.2371:1212.2371 - Freitas, Jr., R. A. 1980, Journal of the British Interplanetary Society, 33, 251 - -. 1985, Journal of the British Interplanetary Society, 38, 106 Gonzalez, G., Brownlee, D., &amp; Ward, P. 2001, Icarus, 152, 185 Hair, T. W., &amp; Hedman, A. D. 2013, International Journal of Astrobiology, 12, 45 - Haqq-Misra, J., &amp; Kopparapu, R. K. 2012, Acta Astronautica, 72, 15 - Haqq-Misra, J. D., &amp; Baum, S. D. 2009, Journal of the British Interplanetary Society, 62, 47 - Hart, M. H. 1975, QJRAS, 16, 128 - Horowitz, P., &amp; Sagan, C. 1993, ApJ, 415, 218 - Howard, A. W., Horowitz, P., Wilkinson, D. T., et al. 2004, ApJ, 613, 1270 - Jarrett, T. H., Cohen, M., Masci, F., et al. 2011, ApJ, 735, 112 Jones, E. M. 1985, NASA STI/Recon Technical Report N, 85, 30988 - Jugaku, J., &amp; Nishimura, S. 1991, in Lecture Notes in Physics, Berlin Springer Verlag, Vol. 390, Bioastronomy: The Search for Extraterrestial Life - The Exploration Broadens, ed. J. Heidmann &amp; M. J. Klein, 295-298 - Jugaku, J., &amp; Nishimura, S. 1997, in IAU Colloq. 161: Astronomical and Biochemical Origins and the Search for Life in the Universe, ed. C. Batalli Cosmovici, S. Bowyer, &amp; D. Werthimer, 707 - Jugaku, J., &amp; Nishimura, S. 2000, in Astronomical Society of the Pacific Conference Series, Vol. 213, Bioastronomy 99, ed. G. Lemarchand &amp; K. Meech, 581 - Jugaku, J., &amp; Nishimura, S. 2004, in IAU Symposium, Vol. 213, Bioastronomy 2002: Life Among the Stars, ed. R. Norris &amp; F. Stootman, 437 - Jugaku, J., Noguchi, K., &amp; Nishimura, S. 1995, in Astronomical Society of the Pacific Conference Series, Vol. 74, Progress in the Search for Extraterrestrial Life., ed. G. S. Shostak, 381 Kardashev, N. S. 1979, Acta Astronautica, 6, 33 - Kardashev, N. S. 1985, in IAU Symposium, Vol. 112, The Search for Extraterrestrial Life: Recent Developments, ed. M. D. Papagiannis, 497-504 - Keenan, F. P., Phillips, M. E., Rose, S. J., &amp; Burgess, D. D. 1999, Irish Astronomical Journal, 26, 87 Kerr, R. A. 2013, Science, 341, 1158 - Korpela, E., &amp; Howard, A. 2008, Astrobiology, 8, 384 Landis, G. A. 1998, Journal of the British Interplanetary Society, 51, 163 - Latham, D. W., &amp; Soderblom, D. R. 1993, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 1867, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, ed. S. A. Kingsley, 20-27 Lazio, T. J. W., Tarter, J., &amp; Backus, P. R. 2002, AJ, 124, 560 - Lineweaver, C. H., Fenner, Y., &amp; Gibson, B. K. 2004, Science, 303, 59 Livio, M. 1999, ApJ, 511, 429 Livio, M., &amp; Kopelman, A. 1990, Nature, 343, 25 Mauersberger, R., Wilson, T. L., Rood, R. T., et al. 1996, A&amp;A, 306, 141 McInnes, C. 2002, JBIS, Journal of the British Interplanetary Society, 55, 279 Minchin, R., Davies, J., Disney, M., et al. 2005, ApJ, 622, L21 Moshir, M., &amp; et al. 1990, in IRAS Faint Source Catalogue, version 2.0 (1990), 0 Neugebauer, G., Habing, H. J., van Duinen, R., et al. 1984, ApJ, 278, L1 Neumann, J. V. 1966, Theory of Self-Reproducing Automata (Champaign, IL, USA: University of Illinois Press) Newman, W. I., &amp; Sagan, C. 1981, Icarus, 46, 293 Papagiannis, M. D. 1980, in Strategies for the search for life in the universe : a joint session of Commissions 16, 40, and 44, held in Montreal, Canada, during the IAU General Assembly, 15 and 16 August, 1979, ed. M. D. Papagiannis (Dordrecht, Holland ; Boston : D. Reidel Pub. Co. : sold and distributed in the U.S.A. and Canada by Kluwer Boston, c1980.) -. 1985, Nature, 318, 135 Pe˜ nuelas, J., Sardans, J., Rivas-ubach, A., &amp; A., J. I. 2011, Global Change Biology, 18, 3 Penrose, R. 1969, Nuovo Cimento Rivista Serie, 1, 252 Planck Collaboration, Ade, P. A. R., Aghanim, N., et al. 2011, A&amp;A, 536, A1 Prantzos, N. 2008, Space Sci. Rev., 135, 313 Rappaport, S., Levine, A., Chiang, E., et al. 2012, ApJ, 752, 1 Reich, P. B., Hungate, B. A., &amp; Luo, Y. Q. 2006, Annual Review of Ecology Evolution and Systematics, 37, 611 Saberhagen, F. 1967, Berserker (New York, NY, USA: Ballantine) Sagan, C. 1973, The cosmic connection. an extraterrestrial perspective (Garden City, N.Y.: Anchor Press, Doubleday, 1973) Sagan, C., &amp; Drake, F. 1975, Scientific American, 232, 80 Sagan, C., &amp; Druyan, A. 1994, Pale Blue Dot: A Vision of the Human Future in Space (Random House Publishing Group) Sagan, C., &amp; Walker, R. G. 1966, ApJ, 144, 1216 Shostak, S. 2011, in Searching for Extraterrestrial Intelligence, ed. H. P. Shuch, 451 Siemion, A. P. V., Demorest, P., Korpela, E., et al. 2013, ApJ, 767, 94 Simpson, R. J., Povich, M. S., Kendrew, S., et al. 2012, MNRAS, 424, 2442 Slysh, V. I. 1985, in IAU Symposium, Vol. 112, The Search for Extraterrestrial Life: Recent Developments, ed. M. D. Papagiannis, 315-319 Tarter, J. 2001, ARA&amp;A, 39, 511 Timofeev, M. Y., Kardashev, N. S., &amp; Promyslov, V. G. 2000, Acta Astronautica, 46, 655 Tipler, F. J. 1980, QJRAS, 21, 267 Vidal, C. 2011, arXiv:1104.4362, arXiv:1104.4362 von Hoerner, S. 1975, Journal of the British Interplanetary Society, 28, 691 Vukoti´ c, B., &amp; Cirkovi´, M. M. 2012, Origins of Life and ´ c Evolution of the Biosphere, 42, 347 Ward, P., &amp; Brownlee, D. 2000, Rare earth : why complex life is uncommon in the universe (New York : Copernicus, c2000.) Weiland, J. L., Blitz, L., Dwek, E., et al. 1986, ApJ, 306, L101 Wright, E. L., Eisenhardt, P. R. M., Mainzer, A. K., et al. 2010, AJ, 140, 1868
10.1088/0004-637X/792/1/26
[ "J. T. Wright", "B. Mullan", "S. Sigurðsson", "M. S. Povich" ]
2014-08-05T22:20:32+00:00
2014-08-05T22:20:32+00:00
[ "physics.pop-ph", "astro-ph.GA" ]
The Ĝ Infrared Search for Extraterrestrial Civilizations with Large Energy Supplies. I. Background and Justification
We motivate the \^G infrared search for extraterrestrial civilizations with large energy supplies. We discuss some philosophical difficulties of SETI, and how communication SETI circumvents them. We review "Dysonian SETI", the search for artifacts of alien civilizations, and find that it is highly complementary to traditional communication SETI; the two together might succeed where either one, alone, has not. We discuss the argument of Hart (1975) that spacefaring life in the Milky Way should be either galaxy-spanning or non-existent, and examine a portion of his argument that we dub the "monocultural fallacy". We discuss some rebuttals to Hart that invoke sustainability and predict long Galaxy colonization timescales. We find that the maximum Galaxy colonization timescale is actually much shorter than previous work has found ($< 10^9$ yr), and that many "sustainability" counter-arguments to Hart's thesis suffer from the monocultural fallacy. We extend Hart's argument to alien energy supplies, and argue that detectably large energy supplies can plausibly be expected to exist because life has potential for exponential growth until checked by resource or other limitations, and intelligence implies the ability to overcome such limitations. As such, if Hart's thesis is correct then searches for large alien civilizations in other galaxies may be fruitful; if it is incorrect, then searches for civilizations within the Milky Way are more likely to succeed than Hart argued. We review some past Dysonian SETI efforts, and discuss the promise of new mid-infrared surveys, such as that of WISE.
1408.1134v1
## THE ˆ INFRARED SEARCH FOR EXTRATERRESTRIAL CIVILIZATIONS WITH LARGE ENERGY G SUPPLIES. II. FRAMEWORK, STRATEGY, AND FIRST RESULT J. T. Wright 1,2 , R. Griffith 1,2 , S. Sigur /suppress D sson 1,2 , M. S. Povich 3 , and B. Mullan 4,5 Accepted for publication in The Astrophysical Journal on 23 June 2014. ## ABSTRACT We describe the framework and strategy of the G infrared search for extraterrestrial civilizations ˆ with large energy supplies, which will use the wide-field infrared surveys of WISE and Spitzer to search for these civilizations' waste heat. We develop a formalism for translating mid-infrared photometry into quantitative upper limits on extraterrestrial energy supplies. We discuss the likely sources of false positives, how dust can and will contaminate our search, and prospects for distinguishing dust from alien waste heat. We argue that galaxy-spanning civilizations may be easier to distinguish from natural sources than circumstellar civilizations (i.e., Dyson spheres), although GAIA will significantly improve our capability to identify the latter. We present a zeroth order null result of our search based on the WISE all-sky catalog: we show, for the first time, that Kardashev Type iii civilizations (as Kardashev originally defined them) are very rare in the local universe. More sophisticated searches can extend our methodology to smaller waste heat luminosities, and potentially entirely rule out (or detect) both Kardashev Type iii civilizations and new physics that allows for unlimited 'free' energy generation. Subject headings: extraterrestrial intelligence - infrared: galaxies - infrared:stars ## 1. INTRODUCTION AND OUTLINE This is the second paper in a series describing G, the ˆ Glimpsing Heat from Alien Technologies survey (or G-HAT). In Paper I of this series, we discussed the background and justification for G. Briefly, if spacefaring extraterrestrial ˆ intelligences (ETI's) capable of colonizing other stars in its galaxy exist in the Milky Way or in another galaxy, we find, in agreement with Hart (1975), that its galaxy can be fully colonized on the timescale of a galactic rotation (i.e. significantly less than the age of the galaxy). Since the power generation and collection (the energy supply ) of intelligent life has the potential to expand exponentially, and since intelligence implies the ability to overcome negative feedback and approach physical limits, these energy supplies could, in principle, be quite large. An ETI's energy collection and generation must be balanced by energy disposal in steady-state. This disposal most naturally occurs in mid-infrared wavelengths, potentially rendering large alien civilizations easily detectable and distinguishable from natural sources with new mid-infrared surveys such as that recently conducted by WISE (Wright et al. 2010). In order to specify and quantify the classes of ETIs that would be detectable with a waste heat search, in Section 2 we develop a formalism for parameterizing the energy budget of a civilization and use it to construct models of such a civilization's spectral energy distribution (SED). We also consider what values for the parameters we have chosen one might expect for alien civilizations, and what values are permitted by the laws of physics. Section 3 describes, in broad outlines, the first aspect of our search using WISE to identify stars and galaxies with anomalously high amounts of mid-infrared emission. Here we also discuss the likely sources of false positives we will encounter and how to distinguish them from true positives. We also present the 'zeroth order' result of our search in this section. We present our conclusions in Section 4. In subsequent papers in this series we will discuss the details of our efforts, including our quantitative results. ## 2. PARAMETERIZING ALIEN CIVILIZATIONS In this section, we develop a formalism for describing alien civilizations with large energy supplies by comparing the magnitude of their power generation and waste heat disposal to the energy available to them in starlight. This allows us to model their SED's and associate quantitative upper limits with a null detection of waste heat. ## 2.1. The Kardashev Scale Kardashev (1964) formulated a system to classify civilizations on their technological sophistication based on the scale of their energy supply (which could be used for intentional or unintentional radio communication). He defined Type i civilizations to be those with energy supplies comparable to humanity's supply today. Type ii civilizations had - 1 Department of Astronomy &amp; Astrophysics, 525 Davey Lab, The Pennsylvania State University, University Park, PA, 16802, USA 3 - 2 Center for Exoplanets and Habitable Worlds, 525 Davey Lab, The Pennsylvania State University, University Park, PA 16802, USA California State Polytechnic University, Pomona, Department of Physics and Astronomy, 3801 West Temple Ave, Pomona, CA 91768, USA - 5 Carnegie Science Center, 1 Allegheny Way Pittsburgh, PA 15212, USA - 4 Blue Marble Space Institution of Science, PO Box 85561, Seattle, WA 98145-1561, USA J. T. Wright et al. Table 1: Definition of parameters in the AGENT formalism, and values for humanity | Parameter | Meaning (Powers as fractions of avail- able starlight) | Value for Humanity | Notes | |-------------|------------------------------------------------------------------------------------------------------------------------------|----------------------|---------------------------------------------------------------------------------------------------------------| | α | Power of intercepted starlight | ∼ 10 - 7 | Counting only photovoltaic generation (ignoring passive heating, agriculture, etc.) | | /epsilon1 | Power of non-starlight energy supply (e.g. fossil fuel use, zero-point energy, nuclear energy) | ∼ 10 - 4 | Mostly fossil fuel, some nuclear | | γ | Power of waste heat in the form of ther- mal radiation of photons | ∼ 10 - 4 | ∼ /epsilon1 | | ν | Power of other waste disposal (e.g. neu- trino radiation, non-thermal emission, kinetic energy, energy-to-mass conver- sion) | negligible | Radio transmission and radar, neutrino losses in nuclear reactors, kinetic and potential energy in spacecraft | | T waste | Characteristic color temperature of thermal waste photons | ∼ 285 K | Typical operating / ambient tempera- ture | at their disposal all of the power radiated by their host star ( ∼ 4 × 10 26 W), and a Type iii supercivilization could tap all of the starlight of its home galaxy ( ∼ 4 × 10 37 W). This categorization spans an enormous range of energy supplies and conveniently divides plausible spatial extents of civilizations: planetary, stellar system, and galactic. $$K = \log _ { 1 0 } \left ( \frac { P } { 1 0 \text{MW} } \right ) / 1 0 \\ \text{common main is set to } K = 0 \, 7 \, \text{initialization and all life on each $K=0\in\partial$}$$ Sagan (1973) noted that the gaps between Kardashev's types spanned approximately factors of 10 10 , and extended the definition to nonintegers by defining it in terms of the civilization's total energy supply P , measured in units of 10 MW: On this scale humanity's current energy supply makes it a K = 0 7 civilization, and all life on Earth has . K = 0 89 . (Kleidon 2010). In this work, we follow Zubrin (2000) and apply Kardashev's types more loosely, defining a Type i civilization (which we will distinguish from Kardashev's definition with the notation K1 ) as one that 'has achieved full mastery of all its planet's resources'. That is, we do not tie it specifically to an absolute energy supply (since other planets may have different capacities of power) but rather to the extent and approximate technological achievement of the civilization. By Zubrin's definition, humanity is nearly a K1 civilization. Analogously, a K 2 civilization is a circumstellar civilization, tapping a significant fraction of its host star's light and having the capacity for resource acquisition and use that far exceeds that of a planet-bound civilization. Finally, K 3 refers to a supercivilization that is galaxy-spanning, composed of so many K2's that it has mastered a significant fraction of the galaxy's luminosity and resources. ## 2.2. The AGENT Formalism We describe here a general formalism for parameterizing the effects of alien waste heat on the spectrum of a star or galaxy. This formalism is general in the sense that it attempts to parameterize an alien civilization's energy budget without making any assumptions about the nature of alien civilizations or their engineering. We divide energy supply (that is, generation and collection) into two components: starlight collection and other sources, which we specify with the symbols α (which is meant, for mnemonic purposes, to remind the reader of an absorption coefficient) and /epsilon1 (meant to remind the reader of the energy generation per unit volume in stellar structure equations). We likewise divide energy emission or disposal into two categories: waste heat in the form of radiation (denoted γ , meant to evoke a common symbol for the photon) and all other forms (denoted ν , meant to suggest neutrino radiation, an example of a source of non-thermal or non-photon energy losses, as in, for example, supernovae). Finally, where appropriate, we assume that thermal waste heat has some characteristic temperature T waste , which may be a function of the portion of the electromagnetic spectrum observed. While these parameters could be expressed in physical units, we find it more convenient to normalize them by the energy available to a civilization in starlight. Thus, we normalize by the incident starlight on a planet for a K1, by a stellar luminosity for a K2, and by a galactic luminosity for a K3. This restricts α to lie between zero and one, but the other parameters can take any positive value. We will refer to this as the AGENT parameterization, after the parameters αγ/epsilon1ν T waste , and present the parameters in Table 1. Conservation of energy and steady-state together require that the energy a civilization collects or generates must equal the energy it emits or disposes of, most naturally as waste heat. This yields: $$\alpha + \epsilon = \gamma + \nu$$ The assumption of negligible non-thermal losses ( ν ∼ 0) and the further assumption that all sources of power other than starlight are negligible ( /epsilon1 ∼ 0) yields the useful simplification of α = γ . To illustrate the AGENT parameters, consider that humanity has an energy supply of approximately 1 4 . × 10 5 TWh per year, or approximately 1 7 . × 10 7 MW, mostly from fossil fuels (Kleidon 2010). Since the total amount of sunlight incident on the Earth is 1 7 . × 10 11 MW, we parameterize humanity as having values given in Table 1. We have made several simplifying assumptions for this calculation. We have ignored sunlight used for passive heating, agriculture, and the many other ways it makes Earth inhabitable for us, because we are here isolating our civilization's contribution to the global energy budget. We have also assumed steady state, and so ignored forms of energy storage such as the potential energy in architecture, the chemical energy in stored food and batteries, and similar considerations. Fossil fuels are stored solar energy, but the time over which this storage took place is so long that their use does not badly violate our steady-state assumption. Put this way, we see that humanity warms the Earth with its energy generation by 0.01% above the effects of sunlight alone, and this effect has elevated the Earth's MIR heat signature by that amount (0.1 millimagnitude) above its preindustrial levels. This effect (direct heating) is currently small compared to greenhouse warming (which insulates the Earth's surface but does not change the global energy balance) and albedo effects (such as loss of reflective sea ice or changes in cloud cover). The energy budget of life on Earth is surprisingly poorly known, but on average photosynthetic life on Earth generates ∼ 2 × 10 8 MW from sunlight with approximately 2% efficiency (Kleidon 2010), implying that it ultimately intercepts ∼ 5% of sunlight that strikes the top of the atmosphere. Since photosynthetic energy production dominates Earth's biological work budget, we would write that for all life on Earth α = 0 05 and, since all of this energy eventually . cascades into waste heat, γ = 0 05. . ## 2.3. Illustrative Examples We now illustrate our formalism by translating some speculative forms of advanced civilizations from the scientific and popular literature into the AGENT parameterization. First, we consider civilizations with energy supplies comparable to their star's total luminosity. A 'classical' Dyson sphere that generated power solely from its completely enfolded solar-luminosity star and with a radius of 1 AU would have α = γ = 1; T waste ∼ 250 K; and ν = /epsilon1 = 0. A civilization using a rotating black hole to convert one Jupiter mass of material to energy with 40% efficiency evenly over the course of 5 Gyr via the Penrose mechanism would have a energy supply of approximately 1 solar luminosity, so /epsilon1 = 1, but might have α = 0 if it employed no mega-engineering to block significant amounts of starlight. A 'ring world' (Niven 1970) with radius r = 1 AU and with a width of w = 1 6 . × 10 6 km would intercept 1 2 w/r of its star's light, and so have α = 5 × 10 -4 . For K3's, α would represent the luminosity-averaged covering fraction of stars in the galaxy, so α = 1 corresponds to the limiting case of every star being enshrouded by a complete Dyson sphere, and α = 0 5 could represent partial . coverage of every star or total coverage of stars contributing one half of the galaxy's total luminosity. We can also translate some past SETI work into the AGENT parameters. Radio or optical communication SETI can be thought of as searches for the deliberate or leaked power we parameterize by ν . In Kardashev's original formulation of types of civilizations, he made an order of magnitude estimate of the power available for (non-thermal) radio emission from civilizations given that it must be some fraction of the energy supply. In our parameterization Kardashev estimated ν /lessorsimilar ( α + ) /epsilon1 ≈ 1. A variation on this theme is the idea of Loeb &amp; Turner (2012) to search for leaked high brightness-temperature light from alien civilizations on Kuiper Belt Objects. One can approximate a civilization's place on Sagan's version of the Kardashev scale ( § 2.1) for galaxies similar to the Milky Way and stars similar to the Sun as $$K = [ K ] + \log _ { 1 0 } ( \alpha + \epsilon ) / 1 0$$ where [ K ] is the ordinal Kardashev type on Zubrin's scale. Thus, a civilization that is intercepting 5% of its Sun-like host star's light and producing another 0.05 L /circledot from other sources around its planetary system would be a K2 (it is circumstellar) with approximately K = 2 + log 10 (0 05 + 0 05) . . / 10 = 1 9 (the proper value in Sagan's formulation is . K = log 10 (0 1 . × 4 × 10 20 ) / 10 = 1 96). . The K3 search of Annis (1999) sought evidence of stellar obscuration on the basis of optically faint galaxies that appeared to be outliers to the Tully-Fischer relation, and was sensitive to galaxies with greater than 75% obscuration. In AGENT parameters, Annis sought galaxies with 0 75 . &lt; α &lt; 1 (although his sensitivity near 1 was necessarily limited by the fact that the galaxies were required to have a measured optical rotation curve to be included in his sample, creating a selection bias against the highestα galaxies). We can contrast this with the MIR search originally proposed by Dyson, which is focused on highγ objects. This describes the searches already performed by researchers such as Jugaku and Carrigan, and such as we will describe later. Indeed, much of the work of Jugaku put rather tight limits on the values of γ for nearby stars with IRAS , as low as γ &lt; 0 01. . The artifacts postulated by Arnold (2005) (see § 2.2 of Paper I) would correspond in AGENT parameters to structures with γ = α ∼ 10 -2 -10 -4 , with the twist that the detection and communication would be made through the time variations in α . Viewed this way, the principal advantage to searches for electromagnetically telecommunicating civilizations (i.e, searches for highν civilizations, Blair et al. 1992) is that the power emitted might be in a narrow bandwidth (and so have high flux density), might be obviously of alien origin, and might thus be easily distinguished from background or natural sources of radiation. The principal disadvantage is that we must guess at the form of ν and/or hope it is large enough for us to detect with our technology and from our vantage. In contrast, the principal advantage of searches for waste heat is that we expect γ /greatermuch ν , and we expect the waste heat to have a characteristic (thermal) spectrum; their principal disadvantages are that they are only sensitive to large values of γ , and that there are many confounding sources (mostly involving stochastically heated dust) that will mimic this signature. Thus, the two forms of SETI are most sensitive to different kinds of activities of alien civilizations and face different challenges. ## 2.4. Spectral Implications We can use the AGENT parameters to roughly calculate the MIR spectrum we would expect for large civilizations. Consider a simple model in which a galaxy or star at distance d has a stellar luminosity L host and a flux density received at Earth F λ . We describe the SED of the host galaxy, f host , normalized to unity area, i.e. $$\lambda F _ { \lambda } = f _ { \text{host} } \frac { L _ { \text{host} } } { 4 \pi d ^ { 2 } }$$ This galaxy hosts a civilization with typical waste heat temperature T waste blocking a fraction α of the stellar luminosity and generating non-thermal emission with normalized SED f nt . The presence of the civilization will, to first order, alter the spectrum received at Earth to be: $$\lambda F _ { \lambda } = & \left [ ( 1 - \alpha ) f _ { \text{host} } + \gamma \frac { \lambda \pi B _ { \lambda } ( T _ { \text{waste} } ) } { \sigma T _ { \text{waste} } ^ { 4 } } + \nu f _ { \text{nt} } \right ] \frac { L _ { \text{host} } } { 4 \pi d ^ { 2 } } \\ \intertext { a b o m e d i f i t e n t i t e n t i t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t o n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e s t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t i t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e s t e n t o n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t o n t e n e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t o n t e s t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n e n t e s t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e s t e n t t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n e n t e e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t o n t e e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e s t e s t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t o n t o n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n e n t o n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e s t e n s t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n e t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e n t e$$ where B λ ( T waste ) is the specific intensity of the Planck function at T = T waste . Note that this expression ignores any feedback on the host stars from the presence of a large solid angle of collectors (e.g. Badescu &amp; Cathcart 2000), and any non-stellar sources of radiation, such as the emission from dust or a galaxy's central engine. We have also assumed in this equation that all non-thermal energy disposal (represented by ν ) is electromagnetic (i.e. it can be represented by f nt ). For K2's, the starlight may not be blocked uniformly at all angles (that is, modeling the stellar energy collectors as a translucent screen may be inappropriate). If we assume that the stellar disk is completely unocculted at most times, then we can ignore the (1 -α ) factor. For K3's, the number of stars in the galaxy makes it appropriate to take a phase average over them and retain the (1 -α ) term. ## 2.5. Simple Blackbody Model If we crudely approximate a stellar or galactic spectrum as a blackbody with temperature T ∗ and ignore ν , then we can rewrite the expected SED as $$F _ { \lambda } \approx \left [ ( 1 - \alpha ) B _ { \lambda } ( T _ { * } ) + \gamma B _ { \lambda } ( T _ { w a s t e } ) \left ( \frac { T _ { * } } { T _ { w a s t e } } \right ) ^ { 4 } \right ] \frac { \pi } { \sigma T _ { * } ^ { 4 } } \frac { L _ { \text{host} } } { 4 \pi d ^ { 2 } } \\.. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \.$$ If, more realistically, we restrict this last approximation to the Rayleigh-Jeans limit, we have $$\text{saug, we reduce max as app} \text{in} \, \omega \, \text{in} \, \text{average} \, \text{coas} \, \text{min} \, \omega \, \text{in} \, \text{new} \, \\ F _ { \lambda } ( \lambda \gg h c / ( k T _ { * } ) ) & \approx \left [ 1 - \alpha + \gamma \left ( \frac { T _ { * } } { T _ { w a t e } } \right ) ^ { 3 } \right ] \frac { c k } { 2 \lambda ^ { 4 } \sigma T _ { * } ^ { 3 } } \frac { L _ { \text{host} } } { d ^ { 2 } } \\ & \approx \left [ 1 - \alpha + \gamma \left ( \frac { T _ { * } } { T _ { w a t e } } \right ) ^ { 3 } \right ] F _ { \lambda } ( \alpha = \gamma = 0 ) \\ \text{reals the well-established power of working in the MIR when searching for high-\gamma cilizations. We see}$$ This form reveals the well-established power of working in the MIR when searching for highγ civilizations. We see that the MIR flux of highγ civilizations will be strongly enhanced by the large ( T /T ∗ waste ) 3 term, which will be on the order of 10 3 even for modest values of γ . Indeed, for γ = 0 15, . T ∗ = 4000 K, and T waste = 255 K, this amounts to an increase in MIR flux of nearly 7 mag . Further, the MIR color temperature would be dominated by the 255 K waste heat, meaning that it will be distinguished from most astrophysical sources in both luminosity and color. By contrast, the dimming in the NIR/optical is linear in α , and so is a much smaller effect, only observationally distinguishable for values of α near 1. The lesson here is that to have detectable waste heat, a civilization need not completely obfuscate its star(s) nor must it employ starlight as the primary source of its energy. The MIR excess scales, to first order, as γ T /T ( ∗ waste ) 3 , which is large enough that the primary obstacle to detecting waste heat from highγ civilizations will not be their brightness, but confusion with other astrophysical sources with similar broadband colors or spectra. ## 2.6. Plausible Values for the AGENT Parameters 2.6.1. Starlight Absorbed: α In the solar system, the available free energy is dominated by the Sun's luminosity, which provides ∼ 10 33 erg s -1 for ∼ 10 10 yr, or ∼ 10 51 erg over its lifetime, having converted 10 -3 of its rest mass into energy. The planets collectively contain ∼ 10 -3 M , meaning that even perfectly efficient mass-to-energy conversion would provide no more energy /circledot than the Sun provides 'for free' if performed over the lifetime of a star. The gravitational potential and kinetic energy of the planets are both dominated by Jupiter, and are ∼ G M /circledot M / /jupiter (5AU) ∼ 10 42 erg. Coincidentally, this is similar to the rough order of magnitude of the chemical potential energy of the planets ( ∼ M /m /jupiter p eV ∼ 10 43 erg; i.e. the energy available for 'burning' them). We see, then, that the Sun dominates the energy budget of the solar system both in terms of readily available energy and in mass available for both construction and mass-to-energy conversion. Of course, a civilization might use the mass of planets as an energy source for timescales much less than 10 Gyr, in which case its energy supply might temporarily exceed that available from its host star. Such a energy supply would necessarily be short-lived, however, and so the chances of its detection would be quite small (given the age of the Galaxy and the duty cycle this implies). Long-lived civilizations with large energy supplies might therefore be expected to rely almost entirely upon starlight for their energy needs. Thus, for civilizations relying primarily on starlight for their power, collected starlight equals power disposal ( α = γ + ), so power disposal will be some fraction of total stellar luminosity (0 ν &lt; γ ( + ν ) &lt; 1), and other power sources are negligible ( /epsilon1 /lessmuch 1). ## 2.6.2. Other Energy Sources: /epsilon1 An arbitrarily advanced civilization may, of course, be able to tap additional sources of energy. Speculation into the nature of such technology is perilous, but we can explore the limitations imposed on it by our current understanding of the laws of physics. The conversion of mass to energy through fusion or fission is generally inefficient (and, at any rate, stars already do this 'for free'), but in theory the use of a rotating black hole (through the Penrose mechanism) can provide very high efficiencies (Bhat et al. 1985). The star itself might provide the fuel for such an engine. If such a process operated at 40% efficiency and consumed the entire star over its natural lifetime, it would effectively increase the luminosity of a star system by a factor of (0 4 . / 0 001) = 4 . × 10 4 (if the higher luminosity were to be sustained over 10 Gyr). K3's would also have two additional resources at their disposal: interstellar gas and the central supermassive black hole. The former should be of little utility: the gas in a galaxy typically composes only 10% of its baryonic mass, and is inconveniently distributed compared with the mass in stars (in the sense that it is not dense, and so must be collected across large volumes to be of much use). The central black hole might provide the core of an engine for converting, for instance, stellar mass into free energy (Inoue &amp; Yokoo 2011); indeed such an engine might bear a striking similarity to active galactic nuclei (AGNs). 6 Since dark matter dominates the mass-energy budget of a galaxy (composing, e.g., 90% of the Milky Way's mass), it is in some sense the most obvious and abundant energy source, and bears consideration as a source of energy. The most widely accepted model of cosmology holds that ∼ 85% of the mass-energy of the universe (not counting the 'dark energy' responsible for cosmic acceleration) is in the form of dark matter. This matter is cold (in the sense that the kinetic energy per particle kT /lessmuch mc 2 ) and, so far, is detected only by its gravity. The most popular candidate for the dark matter is an as-yet undiscovered, relic, weakly interacting, massive particle. The dark matter is known to be self-gravitating and bound down to at least the scales of galaxies, and galaxy clusters host high concentrations of dark matter, especially at their centers. The details of the temperature and nature of the dark matter are still poorly constrained observationally, but this outline is sufficient to consider its applicability to the problem of alien energy supplies. If we very roughly take a large galactic dark matter halo to be M ∼ 10 12 solar masses (10 45 g) with typical size R ∼ 10 23 cm ( ∼ 30 kpc), then the average mass-energy density is ∼ 10 -24 g/cm 3 ∼ 10 -4 J/m -3 ∼ 0 6GeV/c /cm . . 2 3 The typical velocity of the dark matter particle or clump will be ∼ √ ( GM/R ) ∼ 300 km/s, so the average mass-energy flux would be of the order of 10 2 W/m . This is roughly one-tenth of the solar constant of 1400 W/m 2 2 (comparable to the output of a modern photovoltaic solar cell) and so would warm a surface to ∼ 200K. So in principle, especially in dark-matter halos with deep gravitational wells and large particle fluxes, dark matter may be a useful source of energy over gigayear timescale, if it could be tapped with high efficiency. The major obstacle to dark matter energy extraction is that most dark matter candidate particles have nearly negligible cross sections to baryonic matter and electrons, and so cannot be captured or otherwise used as a source of energy with high efficiency. If the dark matter particles have cross sections to baryonic interaction similar to that of the neutrino, then it would require neutron-star-like densities to achieve optical depths approaching unity on scales of 1 m (but, since neutron matter is degenerate at reasonable temperatures, the particles still could not interact with the target through elastic scattering because all of the possible post-interaction states for the target particle would be filled). Alternatively, gravitational focusing might be employed to create especially high densities of dark matter, which might self-annihilate if it is composed of both particles and their antiparticles, and might decay into a form useful for energy extraction. 7 Indeed, Hooper &amp; Steffen (2012) suggested dark matter as a potential source of internal heating for planets that might make them habitable (i.e. capable of supporting liquid surface water). Regardless of the form overcoming this obstacle might take, it would imply that a K3 could generate a modest amount of energy anywhere within a dark matter halo (although it is not clear what benefit this would provide over a small nuclear reactor other than the potential for saving the necessary reactants over billions of years). 6 The idea that all or most AGN are, in fact, alien engines that we have misinterpreted as natural phenomena has a certain ironic appeal, and might explain away any theoretical difficulties in perfectly modeling them (i.e. what appears to be missing physics is in reality deliberate engineering on the part of alien civilizations). Besides being an 'aliens of the gaps' argument, though, this explanation fails to explain the abundance of AGN with cosmic time (i.e. why AGN are most abundant at redshift and relatively rare in the local universe), since one would na¨ ıvely expect their abundance to increase with time as K3's arise and reach their central engines. That is, it is unclear why alien civilizations would almost invariably shut off their engines after a few gigayears. This explanation would also require that K3's arise very quickly after the Big Bang (even at z &gt; 5) which seems quite unlikely. 7 An interesting consequence of such an energy source is that since the gravity of dark matter holds galaxies together, its conversion into thermal photons would slowly unbind galaxies and galaxy clusters. The environmental consequences of depleting this energy source would be quite dramatic. Even more exotically, alien civilizations might be able to tap zero-point energy or cosmic dark energy for their needs. It is unclear to us to what degree this is allowed or prohibited by the laws of physics. Regardless of the form of non-starlight energy an ETI might take, it must be ubiquitous across a supercivilization for it to contribute significantly to a galactic energy budget, and so this alternative energy source must be 'obvious' or easily replicable. If such energy sources are available, then they might supersede starlight as the dominant energy source in the galaxy. In this case, we might expect /epsilon1 /greatermuch α , and even /epsilon1 /greatermuch 1. If this energy were to be emitted as thermal waste heat (i.e. if /epsilon1 ∼ γ ) at high waste heat temperatures, then such a civilization might be quite easily detected in the MIR, but hardly noticeable at all by way of obscured starlight. Indeed, such a K3 would be so noticeable that even a cursory examination of the WISE survey catalog shows that they must not be common in the local universe. ## 2.6.3. Power Disposal: γ and ν The emergent spectrum of an alien civilization will depend on the sort of work it does with its energy supply. On Earth, most of the work we do eventually results in little to no energy storage: transportation, metabolism, energy distribution, and computation all accomplish useful tasks, but essentially all of the energy involved is ultimately dissipated as waste heat. We might then expect that alien civilizations will do the same, but we must also account for other possibilities. The most obvious sources of non-thermal disposal of energy are radio emission and other electromagnetic radiation. On Earth, small amounts of our energy supply is lost to space in these forms as radar, high brightness temperature outdoor lighting, laser, and other decidedly non-thermal radiation. Searches for alien analogs to this emission compose significant parts of optical and radio communication SETI. Other possibilities for non-thermal energy use are energyto-matter conversion, or the generation of non-E-M forms of radiation (gravity waves, neutrinos, etc.). These all represent low-entropy forms of energy, and the second law of thermodynamics requires that the balance of entropy be carried away by waste heat. Slysh (1985) noted that the maximum possible thermodynamic efficiency of a civilization is the Carnot efficiency $$\eta = 1 - T _ { \text{waste} } / T$$ where T = T ∗ for collected starlight and is characteristic temperature at which energy is generated otherwise. We can use this observation to calculate an upper limit on ν . If a civilization operates at maximum thermodynamic efficiency, then the fraction of energy ν that does not ultimately end up radiated away as waste heat (i.e. remains at low entropy) is given by $$\frac { \nu } { \alpha + \epsilon } \leq \eta$$ For a fiducial Dyson sphere at 1AU around a Sun-like star, we have η ≈ 1 -290K 5800K = 0 95, so in this case / . γ/α ≥ 0 05, . ν/α ≤ 0 95, and . ν/γ ≤ 19. More exotically, it is conceivable that ETI's might employ machinery that is based on the weak force, and thus radiate significant waste heat as thermal neutrinos, or other particles that do not quickly decay into thermal photons, in which case they might be able to have ν /greatermuch γ . If such physics is obvious and pervasive enough to be employed by all ETI's, we would not expect to be able to detect them from their waste heat in photons. If a civilization's waste heat from stellar energy is typically photonic then γ/α ≥ T waste /T ∗ and, by conservation of energy, ν = α + /epsilon1 -γ . If, like humanity, ETI's do most of their work in a manner that eventually generates waste heat ( γ ∼ α + ) then waste heat will dominate the civilization's radiation ( /epsilon1 ν /lessmuch γ ). If, further, starlight dominates a civilization's energy supply, then we have (0 /lessorsimilar γ /lessorsimilar 1). ## 2.6.4. Waste Heat Temperature: T waste We expect T waste to have values near 300 K, but not solely for anthropocentric reasons. Of course, since Earth demonstrates that intelligent, spacefaring life can emerge and thrive at these temperatures, it follows that we should expect at least some alien civilizations to favor this temperature. However, the waste heat temperature does not need correspond to either preferred ambient temperature of alien organisms or to the effective temperature of the collectors of stellar power; it represents the temperature of the outermost radiating surface of a stellar system. Nonetheless, there are thermodynamic reasons that we do not expect waste heat to be disposed of at temperatures far from 300 K for civilizations using starlight. The waste heat from the outermost radiating surfaces of a civilization could itself be used to do work at a yet lower temperature. Thermodynamically, this corresponds to an improvement in the maximum possible efficiency, η from starlight at a given temperature. Naively, it would seem then that ETIs with large energy supplies would construct highly efficient Dyson spheres, potentially rendering waste heat so cool that it would not radiate in the MIR. However, the marginal free energy yield from employing ever lower waste heat temperature decreases with T waste even as the difficulty of the engineering rapidly increases. Energy balance for a Dyson sphere with /epsilon1 = ν = 0 requires that $$L _ { * } \alpha & = \gamma \sigma T _ { \text{waste} } ^ { 4 } A$$ where A is the surface area of the radiators. Thus, for α = γ , the radiating surface A must increase as (1 /T waste ) 4 . For instance, improving the maximum thermodynamic efficiency η of a K2 from 95% (for instance, a 1 AU sphere radiating 290 K waste heat reprocessed from 5800 K starlight) to 99.5% (the same, but radiating at 29 K) would require an increase in surface area of $$\left ( \frac { 1 - 0. 9 5 } { 1 - 0. 9 9 5 } \right ) ^ { - 4 } = \left ( \frac { 2 9 K } { 2 9 0 K } \right ) ^ { - 4 } = 1 0 ^ { 4 } \\ \text{AT in radine in our avammal} \right )$$ (representing a sphere 100 AU in radius in our example). This strong inverse dependence implies that there will be an optimal waste heat temperature beyond which it would be impractical to extract more free energy from starlight. This optimal operating temperature would then characterize Dyson spheres, and this temperature will likely be significantly above the minimum possible (i.e. that of the cosmic microwave background at 2.7 K). Indeed, the T waste -4 dependence is so strong, one might expect that civilizations will operate at the highest temperature consistent with the work they wish to do. Of course, different civilizations might optimize this problem in different ways, but there are reasons to expect a value near 300 K. At this temperature around Sun-like stars, η = 95%, a point at which there is an order of magnitude less free energy available in the waste heat as there is in the starlight itself. Further improvements in maximum thermodynamic efficiency at this point are small compared to the potential value of improving the energy efficiency of the 'factories' themselves. This temperature is also low enough that complex molecules can form and most rocks and metals are solid, allowing for the construction of mega-engineering projects. Temperatures between 150 and 600 K are thus 'reasonable' values for the optimization of this problem (spanning a factor of 250 in radiating surface to be engineered). As long as this optimal T waste value is measured in this range, then the Wien peak of a civilization's waste heat and thus the bulk of its luminosity - should be in the MIR, and we should expect searches there to be effective. This is in contrast to natural astrophysical sources of radiation with significant amounts of dust, which can have much lower effective temperatures (because dust clouds are large, having very large effective radiating area, their typical T waste values are 15-50 K). The highest thermodynamic efficiencies for K2's will result in waste heat having an SED very close to thermal (i.e. that of a blackbody). Heat radiating from a surface of a given area with a given flux has the highest entropy when the spectrum is thermal, so a non-thermal spectrum for that energy would imply that free energy remains to be tapped from the energy at constant surface area. A K2 optimizing its operating temperature to balance engineering difficulty with thermodynamic efficiency would thus aim for its waste heat to have an SED as close to that of a blackbody as possible. Thus, while an alien civilization using starlight might emit waste heat over a range of temperatures, we should not expect it to be so cold or to have such a strongly non-thermal spectrum that as to be easily missed in the MIR. ## 2.6.5. Other Assumptions: Steady State, and Conservation of Energy More advanced civilizations might do significant work that efficiently stores energy as kinetic or potential energy, rearranging the mass of their stellar system or galaxy in both position and velocity space, and violating our steadystate assumption. Such a process would be inherently limited, however, as eventually they must either 'evaporate' their stellar system or galaxy, or else heat it until it radiates thermal waste heat. More exotically, if the 'dark sector' (dark energy and dark matter) contains energy that can be tapped (as a source for /epsilon1 ), then it might also serve as a sink for waste heat, implying that both energy generation and disposal might be performed 'for free' and have no detectable effects. If such physics and engineering is 'obvious' in the sense that advanced civilizations inevitably discover and use it, then waste heat might be only a trace component of most advanced civilizations' energy budgets. If such engineering is so 'obvious' and practical as to be nearly universally employed by ETI's, then a waste heat search would fail. ## 3. THE ˆ SEARCH FOR EXTRATERRESTRIAL CIVILIZATIONS WITH LARGE ENERGY SUPPLIES G We have begun the G-HAT search for alien waste heat, which we denote G. We will give detailed descriptions of ˆ our search methodology in later papers, but here we will give a general outline. We also discuss some of the most promising ways one could remove false positives by identifying dust as the source of infrared radiation identified in a broadband MIR survey. We also show give a 'zeroth' order result of our search from our preliminary analysis of the WISE all-sky survey. ## 3.1. Predicted Magnitudes and Colors in WISE Bands The simple blackbody model of Section 2.5 is obviously an insufficient description of the actual characteristics of a galactic SED, in that both the stellar population and the dust responsible for the MIR emission cannot really be characterized by a single pair of temperatures. The assumption of a single temperature for the stellar photosphere is more appropriate for searches of incomplete Dyson spheres, but in this case the value derived for α is likely to be incorrect, both because backwarming will make the MIR color temperature of the star inconsistent with its effective temperature, and because of the incorrect assumption in the (1 -α ) term that we can effectively model the absorption of starlight as a translucent screen (see § 2.4). For galaxies, we can do better by employing galaxy templates 8 generated by Mari Polletta using the GRASIL code of Silva et al. (1998), to provide a more realistic functional form for f host . Inspection of the elliptical and spiral galaxy 8 We obtained these templates from the SWIRE template library at http://www.iasf-milano.inaf.it/ ∼ polletta/templates/swire templates.html, compiled and hosted by Mari Polletta templates reveals an appropriate value for T ∗ in the toy model would be T ∗ = 4000K, consistent with most of the starlight in a typical galaxy, especially in the red optical, coming from K giants. To transform the predictions of the AGENT formalism and the Silva SEDs into predictions of colors in the WISE bands, we followed the prescription in the WISE Explanatory Supplement 9 and references therein (Cutri et al. 2012; Wright et al. 2010; Jarrett et al. 2011). Using the filter response curves and zero points described in Cutri et al. (2012), we constructed a procedure that calculates the received flux in the four bandpasses of WISE for a blackbody emitter at temperature T waste with fiducial luminosity 1 L /circledot at a distance of 10 pc. Rather than compute the response to a blackbody anew every time we need them, we fit the resulting fluxes in each of the four bandpasses as a function of temperature with the function ∑ 3 i =0 = a i log T waste i -1 . Use of this simple expression in T significantly speeds computation time. Our procedure then scales these predicted fluxes by the luminosity and distance of a given hypothetical source. To validate our calculations, we used this procedure to calculate WISE magnitudes of the star Vega (since WISE uses Vega magnitudes). This procedure was complicated by the fact that Vega is not a blackbody, but in the RayleighJeans limit in the MIR this is a reasonable approximation. We consulted Cohen et al. (1992, Fig. 2) to determine the appropriate value of T ∗ to use, and found that at 5 µ , a continuum temperature of 13,000 K produced the best match to the spectra in that work. Our procedure predicts ( W 2 -W 1), ( W 3 -W 1), and ( W 4 -W 1) colors of ( -0 0011 . , -0 0002 0 020) for blackbodies at this temperature. . , . These values suggest that our approximation of Vega as a blackbody induces errors of &lt; 1% in the first two colors, and of order 2% in ( W 4 -W 1); this serves as a reality check on our interpretation of the WISE response curves and zero points. We apply this computation to the K3 hunt by using this procedure to calculate the sensitivity of WISE to objects with the spectra described in Eq. 5 with α = γ and ν = 0. Specifically, our procedure calculates WISE fluxes for the old elliptical Ell13 Silva template and blackbodies of temperature T waste and scales them by (1 -α ) and γ , respectively. It then sums these two fluxes in each of the four WISE bands, and scales them appropriately by ( L host / (4 πd 2 )) to produce the predicted WISE magnitudes for a a given set of α, γ, T waste , ( L host / (4 πd 2 )). ## 3.2. Interpreting WISE SEDs with AGENT Parameters We now give a few illustrative examples in the context of our AGENT parameterization from Eq. 5 and sources in the WISE Source Catalog. To interpret the observed WISE magnitudes of sources in terms of our formalism, we inverted our modeling process assuming α = γ (thus the model has three free parameters: γ, T waste , and ( L host / (4 πd 2 ))). In cases where WISE provides only an upper flux limit in two bands, the model can be underconstrained. We found that our fitter (based on the Levenburg-Marquardt algorithm in MPFIT (Markwardt 2009; Mor´ e 1977)) converged in the vast majority of cases, and that the typical failure modes were in cases where the observed magnitudes were strongly inconsistent with any positive parameter values in our model. In Figure 1 we show the SED and model fit spiral galaxy to illustrate how our toy model characterizes the stars and dust there. If we were to interpret this as an old elliptical galaxy full of civilizations, we would say that γ = 20%, meaning that 20% of the starlight has been reprocessed to a low waste heat temperature, T waste = 200 K. Naturally, the true interpretation of this galaxy's SED involves both dust and stellar photospheres with a range of temperatures. A more secure value of γ (interpreted more naturalistically as the amount of starlight reprocessed by dust) would require comparing the luminosity of the dust emission (primarily in the FIR) to that from unobscured starlight. A more rigorous approach to the problem would be to use the dust models of Draine &amp; Li (2007) to fit available photometry and in terms of the physically motivated parameters in that model: q PAH , γ Draine , M dust and U min , representing the fraction of dust in polycyclic aromatic hydrocarbons (PAHs), the fraction of dust illuminated by starlight with intensity U &gt; U min , and the total dust mass in the galaxy. Interpreted with these parameters, even broadband photometry of a K3, given enough bands, might result in unusually large or even unphysical values of q PAH (since the excess 12 µ emission from the waste heat would be interpreted in this model as excess emission from PAH's). The example in Figure 1 is at the high end of the range of γ values we derive for typical galaxies, and very few sources are consistent with γ &gt; 0 4. . This means that efficient, broadband searches for waste heat from K3's will necessarily be restricted to γ values significantly higher than this, where few astrophysical sources are to be found. Figure 2 illustrates a lenticular galaxy, which, having less gas than a typical spiral, yields a correspondingly lower value of γ = 0 07. . This case also illustrates how the fitter can handle upper limits properly. Still, it is clear that, despite (or because of) the non-detection in W 4 for this galaxy, high γ values are inconsistent with the data, and we can put an upper limit on the size of the energy supply of any K3 civilization in it of 7% of its starlight. The assumption that α = γ means that our interpretation of γ may be incorrect if, in fact, the civilization primarily uses non-stellar sources for its energy supply (see Section 2.6.1). If, in fact, α ∼ 0, then the correct value of γ will be related our inferred value, γ ′ by γ = γ / ′ (1 -γ ′ ). Thus, if we measure γ ′ = 0 9 assuming . α = γ , then the corresponding value in the α = 0 case is γ = 0 9 . / 0 1 = 9, meaning that the civilization has an energy supply that is nine times larger . than the stellar luminosity available to it. Put another way, our fitting procedure would measure a K3 with /epsilon1 = γ &gt; 1 (more than a galactic luminosity of non-stellar energy supply) to have γ ′ &gt; . 0 5 (because we improperly assumed α = γ ). This is above the value we derive for most galaxies, so WISE is capable of effectively ruling out the existence of any galaxies with /epsilon1 &gt; 1. 9 http://wise2.ipac.caltech.edu/docs/release/allsky/expsup/index.html Fig. 1.Model and observed MIR SED of spiral galaxy acs-gc 90043805 (Griffith et al. 2012). Black points represent observed WISE magnitudes and the corresponding horizontal line corresponds to the approximate span of the waveband. The orange line is the best-fit model SED of our toy model from Eq. 5 with AGENT parameters α = γ = 0.20, and T waste =200 K. The red points with dashed lines correspond to the model magnitudes in the WISE bands of the model SED (which are coincident with the black points and lines in this case because the fit is essentially perfect). This typical example of a spiral galaxy illustrates why a search for waste heat from K3's with broad band photometry will necessarily be limited to civilizations with values of γ significantly higher than this because of confusion with ordinary galaxies. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1134v1-figure-195705f9-52a1-431f-971c-cbbce50ee9ed.jpg) Fig. 2.Model SED and observed MIR SED of lenticular galaxy acs-gc 90025517 (Griffith et al. 2012). Black points represent observed WISE magnitudes and the corresponding horizontal line corresponds to the approximate span of the waveband, including a non-detection (upper limit) in W 4. The orange line is the best-fit model SED of our toy model from Eq. 5 with AGENT parameters α = γ = 0.07, T waste =142 K. The red points with dashed lines correspond to the model magnitudes in the WISE bands of the model SED. This example illustrates how the model fitter properly handles upper limits and how galaxies with less dust than typical spirals yield small γ values. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1134v1-figure-61bf1ece-1967-4a4a-b1e7-d2b64edd38ad.jpg) Fig. 3.Color-color space of some natural and artificial sources in the WISE bands. We recreated the underlying figures from Lake et al. (2012) and Jarrett et al. (2011) Left: The colors of K3 civilizations with AGENT parameters α = γ , /epsilon1 = ν = 0 and two values of T waste . Values for γ increase from zero (lower left) to 1.0 in increments of 0.05. Civilizations with high values of γ are distinct from regions populated by most known classes of sources. Right: Distribution of sources listed in both the WISE Source Catalog and the 2MASS Extended Source Catalog with good point source photometry in WISE (so the vast majority of these are galaxies with good colors). In regions of high source density, we have used a logarithmic greyscale. The region of color space for K3's with γ &gt; 0 4 is largely free of contamination, illustrating . how WISE provides good discriminatory power between artificial sources and most natural extragalactic sources, with only ULIRGs and similarly dusty galaxies providing confusion. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1134v1-figure-6db19846-1dca-4726-8aef-1af6fbcd8de9.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1134v1-figure-139bd4d3-5013-4f93-bfda-5be88c90a597.jpg) ## 3.3. Contamination From Natural Sources The process of identifying alien civilizations will necessarily be one of exclusion of natural sources, at least until an unambiguously alien signal is identified ( § 2.3 of Paper I). The characteristics of waste heat of high luminosity are that it will be bright and have a low color temperature. This is also a characteristic of astrophysical dust, which will be a major source of false positives in any waste heat SETI work. This is because dust performs essentially the same task as alien civilizations would: intercepting starlight and reradiating it in the MIR (although in the case of dust, the radiation is often a non-thermal process producing characteristic emission from polycyclic aromatic hydrocarbons). A broadband search cannot distinguish the spectral features of dust from that of other sources of MIR radiation. This means that without additional information (such as spectra or contextual information like an object's location in a star forming region) civilizations with low levels of waste heat will not be distinguishable from ordinary astrophysical sources. The most populous class of natural sources with the highest MIR to near-infrared flux ratios will set a lower limit to the energy supply of extraterrestrial civilizations we are sensitive to, and we can identify galaxies and stars with MIR fluxes much higher than this limit for follow-up. Figure 3 shows the distribution of extragalactic sources in the WISE Source Catalog. We generated this sample by cross-matching the WISE Source Catalog with the 2MASS Extended Source Catalog to remove stars. To ensure that the photometry is robust for this figure, we excluded sources resolved by WISE (using the filter EXT\_FLG == 0 ) and used the profile-fitted photometry (our full search will include resolved sources, whose nature will be easier to diagnose than point sources). While some of these sources may be Galactic, the vast majority of WISE sources are extragalactic (Cutri et al. 2012). We recreated the underlying figure from the works of Lake et al. (2012) and Jarrett et al. (2011), who have helpfully identified regions in this color space where many classes of natural extragalactic objects reside. Figure 3 shows that artificial sources with γ &gt; 0 4 occupy a region of color space beyond most classes of natural, . extended sources, and indeed that nearly all of the sources detected by WISE are consistent with γ &lt; 0 3. . This illustrates that the dominant source of confusion in a K3 search with WISE will be LIRGs, ULIRGs, and hyperluminous infrared galaxies, and that the MIR colors of K3 host galaxies with even modest values of γ will be easily distinguished from those of normal galaxies. ## 3.4. Distinguishing Waste Heat in K3's (Galaxy-Spanning Civilizations) from Other Sources K3's would have an additional characteristic making them easily distinguished from most forms of contamination: they would be extended sources, even to a mission such as WISE , out to great distances. This eliminates most forms of false positives above the Galactic plane. Even galaxies that appear unresolved to WISE will be identifiable as such if their values of α are sufficiently low (and their optical/NIR luminosities sufficiently high) that they appear in shorter-wavelength surveys of sufficient resolution and sensitivity (for instance, in the 2MASS Extended Source Catalog, Jarrett et al. 2000). Fig. 4.SEDs of typical galaxies containing dust and Kardashev civilizations, with the four WISE bands, the IRAS 60 and 100 µ bands, and the Planck 857 GHz (350 µ ) bandpasses highlighted. The Galaxy template SEDs are from Silva et al. (1998) and are normalized at 0.55 µ . Black: the 'old elliptical' template Ell13 . Green: the Sd template, representing a typical late spiral, and Arp220 , representing a ULIRG/starburst galaxy. Dashed lines represent blackbodies of the listed temperatures, scaled with respect to the old elliptical template according to the AGENT parameterization with γ = α and the value of γ indicated on the plot. Solid orange and blue lines represent the model spectra of an galaxy composed solely of stars characteristic of an old elliptical and a K3 civilization with the AGENT parameters listed in the labels of the dashed curves of corresponding color. The values of T waste and γ were chosen so that the resulting SEDs would roughly match the MIR flux observed by WISE for the spiral and starburst templates, to illustrate the degeneracy between PAH emission from dust and waste heat from ETIs. This figure also shows how MIR spectra and FIR or sub-mm photometry might break this degeneracy. Since even extremely dusty galaxies as Arp 220 yield derived γ values ∼ 0 35, K3 civilizations with even higher values of . γ would stand out as having W 2W 3 colors even more extreme than these superlative objects. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1134v1-figure-cc1a194a-4449-4494-a2b1-f11bd8a472cf.jpg) The dominant contaminants for a search of K3's will be diffuse emission from warm dust and gas in the interstellar medium (perhaps warmed by embedded objects, such as protostars), planetary nebulae and their precursors, dusty resolved galaxies (starbursts and ULIRGs), and blue compact dwarf galaxies (e.g. Griffith et al. 2011). Many of these MIR-bright sources have been cataloged already, or are only expected in regions of known star formation or dust. Planetary nebulae are particularly easily distinguished by their characteristic optical emission and morphology. The dominant source of contamination from extragalactic sources will thus be from ULIRGs, and perhaps galaxies with active nuclei for systems not well resolved by WISE . Figure 4 illustrates the effects of dust on a galaxy SED, with some relevant all-sky survey bandpasses highlighted. We have chosen three template spectra from Silva et al. (1998) to span the extremes of dust content in galaxies: the 'Ell13' 'old elliptical' template, having almost no dust, the 'Sd' template having dust typical of a late spiral, and a template for Arp 220, the prototypical ULIRG / starbust galaxy. While even a small ( ∼ 1%) midinfrared excess from a K3 civilization would be detectable by WISE , it would not necessarily be distinguishable from a small amount of dust. Indeed, a typical Sd spiral has MIR luminosities comparable to a γ = α ∼ 0 1 K3 civilization in an otherwise . dust-free galaxy, and values of γ as high as 0.4 might be consistent with ULIRGs. However higher values of γ would be consistent only with extraordinary levels of dust and star formation (which are astrophysically interesting in their own right). A search for extended sources with very red W 2W 3 colors would be a search for highγ objects in a region of parameter space relatively clear of naturally red objects. There are several ways to distinguish dust from artificially generated waste heat in a galaxy, and Figure 4 illustrates two of them. - · Empirically, PAH emission is well correlated with [C II ] emission (Helou et al. 2001), so an anomalously low [C II ]/MIR flux ratio might indicate a non-PAH origin of a galaxy's MIR luminosity. - · MIR spectroscopy will detect the characteristic PAH emission and silicate absorption features from dust, while one would not expect those features to be present if the origin of the bulk of the MIR radiation were thermal waste heat. Depending on the brightness of the source, CANARICAM on the Gran Telescopio Canarias, SOFIA , or the James Webb Space Telescope might be best suited to perform this followup. - · If PAH emission is ruled out, a rarer potential confounding source of MIR radiation is continuum emission from warm dust from high star formation rates in low-metallicty galaxies, for instance, from blue compact dwarfs (Sajina et al. 2007; Galliano et al. 2003; Griffith et al. 2011). In these cases, other tracers of star formation must be sought out, for instance, the MIR emission from ionic species such as [S II ], [Ne II ], or [O IV ], which may be diagnostic of both the hot gas that accompanies the star formation and the metallicity of the galaxy. - · Dust radiates primarily in the FIR, while artificial waste heat should radiate primarily in the MIR owing to its higher effective temperature (Section 2.6.4). The FIR luminosities of the two scenarios should thus differ by around two orders of magnitude for a given MIR luminosity, in principle making L FIR /L MIR or L sub -mm /L MIR a useful discriminant. Instruments such as SCUBA-2 on the James Clerk Maxwell Telescope might be used for such a purpose. - · Since the presence of dust implies molecules, the total mass of CO should be commensurate with dust emission, and thus diagnostic of the PAH origin of MIR emission. Empirically, Pope et al. (2013) find a slightly sub-linear relation between the 6.2 µ MIR luminosity L PAH and the line luminosity L ′ CO(1 -0) for ULIRGS in both the local universe and at redshift. From a theoretical angle, the models of Draine &amp; Li (2007) would provide a prediction of the range of expected total CO mass for a given MIR SED. In any case, an extremely high ratios of the form L MIR /L ′ CO are inconsistent with a dusty galaxy and therefore diagnostic of artificial waste heat. Thus, K3's may be ultimately easier to diagnose and distinguish from natural sources than K2's, because the number of classes of potentially confounding sources is smaller than for point sources, because these sources in these classes are rarer, and because there are clear diagnostics that distinguish them. Indeed, explorations of the dust properties of MIR-bright galaxies for the purposes of studying the relationship between dust, metallicity, and star formation, might inadvertently identify good K3 candidates as those appearing to show anomalously high PAH mass fractions (e.g. Galametz et al. 2009). ## 3.5. Debris Disks An even more pernicious contaminant than dust will be stellar debris disks. The SED's of debris disks are generally characterized as ordinary stars with some fraction of their light reprocessed by dust and larger objects, which reradiate as a roughly thermal spectrum with characteristic temperatures of tens to hundreds of Kelvins (Wyatt 2008). Indeed, the parameters often used to describe debris disk SED's, f and T , map very will to the AGENT parameters, with f = L IR /L ∗ being equivalent to our γ , and T = T waste . Debris disks are, in fact, defined by f (= γ ) &lt; 10 -2 , making them a primary confounder for sensitive searches to Dyson spheres. Indeed, a broadband (or even spectral) search for waste heat from K2's is functionally equivalent to a search for debris disks. Distinguishing Dyson spheres from debris disks might involve high-resolution imaging to show that the waste heat is not confined to a disk, or studies of the star itself to show that it is old (since debris disks are generally associated with younger ( &lt; 1 Gyr) stars). Put another way, studies of and searches for debris disks are effectively searches for Dyson spheres, as well. Of course, as scientists, we must always reach first for the naturalistic explanation for observations (see Section 2.3 of Paper I), and there is, at present, no reason to believe that stars known to have debris disks are, in fact, K2's. Nonetheless, it would be reasonable for communication SETI efforts to make a higher priority of stars known (or rather, believed) to host debris disks, since if K2's with large energy supplies do exist in the Milky Way they would naturally appear on lists of such stars. ## 3.6. Distinguishing Waste Heat in K2's (Dyson Spheres) from Other Sources K2's will appear as point sources, and so potential sources of confusion come from dusty stars, heavily extinguished stars, and potentially from unresolved dusty galaxies, dusty galactic nuclei, merging galaxies, or redshifted cosmological sources. The primary exclusion of embedded sources and other heavily extinguished sources would come from our knowledge of the distribution of dust and star formation in the Galaxy, which allows us to mask out regions where such sources are expected. Young stars with disks will show MIR excess even outside of dusty lines of sight and will put a lower limit on the values of γ one can search for without additional follow-up observations to determine if the star is sufficiently young to host an MIR-bright disk. After disks, asymptotic giant stars and cosmological sources would be the other dominant contaminant in regions of the sky free from dust for high γ candidates. For instance, 'Hyper-luminous infrared galaxies' (Eisenhardt et al. 2012), dusty obscured galaxies ('DOGs' Dey et al. 2008), and similar galaxies will show very red W 2W 3 colors, and may even be W 2 dropouts. While a number of follow-up observations could be done to identify these sources, an efficient and definitive exclusion criterion for them would be the measurement of parallax to determine their luminosity. In particular, candidate objects with sufficient optical brightness will have their parallaxes measured with the upcoming GAIA mission (Perryman et al. 2001). This would allow for candidate point sources to be segregated into three classes based on their luminosity. - · Sources with no detectable parallax . These sources would be either Galactic but beyond the parallax precision of GAIA , or galaxies. Follow-up observations at high angular resolution will distinguish these cases. Extragalactic sources can then follow the vetting procedure described in Section 3.4, while Galactic sources would then have lower limits set on their luminosity that would make them consistent with high luminosity (presumably giant) stars. - · High luminosity Galactic sources . These would most likely be AGB stars, although in principle a K2 civilization might temporarily increase the luminosity of its host star and civilization through high values of /epsilon1 . Given that a naturalistic explanation exists for these, follow up of these objects might be of low priority, but could proceed with MIR spectroscopy following the procedure of Carrigan (2009). - · Low ( ∼ solar) luminosity Galactic sources . A high MIR-NIR flux ratio for an object with apparently near solar luminosity would indicate significant circumstellar dust around a dwarf star. This could be diagnosed by identifying signs of stellar youth (for instance with X rays, or the star's presence in a star forming region). Objects that survive this vetting will be excellent candidate K2's. The precise parallax survey of GAIA will thus be a powerful tool for identifying K2 candidates from the many bright point sources in an MIR survey. ## 3.7. A Zeroth Order Result for K3's, and Prospects for Tighter Limits Figure 3 gives the zeroth-order result of the WISE search for K3's: there are very few, if any, galaxies detected by WISE hosting K3's with γ &gt; 0 4. . We will scrutinize the few catalog entries consistent with such civilizations to determine if they are real and have reliable photometry. Those that are will be good candidates for follow-up to determine if they are some class of known dusty galaxy, a new class of astrophysical object, or good candidates for being a K3. We note that for the galaxies less luminous than the Milky Way, this upper limit corresponds to γ /lessorsimilar 4 × 10 10 L /circledot , which is less than Kardashev's original energy supply threshold for a Type iii civilization. Except in the cases of galaxies significantly more luminous than the Milky Way (where the starlight might overwhelm the K3 civilization), our zeroth-order result is that Kardashev Type iii civilizations are very rare, and most galaxies do not host them. 10 A thorough analysis of the few sources with colors consistent with such civilizations will allow us to rule them out entirely out to a significant distance, or identify the best candidates. In addition to finding that 'classical' Type iii civilizations are very rare or non-existent, this result also implies that that physics may not allow for an easily tapped source of 'free' energy (e.g. zero-point energy) at high effective temperatures (see Paper I). If such physics existed and was 'obvious', then alien civilizations would have unlimited free energy, and would not be bound by any resource limitation (since, as we argued in Paper I, all such limitations can be overcome through application of energy). Such a civilization could easily span its galaxy and achieve γ /greatermuch 1 (which, since our methodology assumes α = γ , we would measure as γ /greatermuch 0 5, see Section 3.2). . However, our zero-th order result shows that this has never happened in our search volume. This would seem to make the likelihood that such physics exists smaller than it was before our survey. Objects with apparent values of γ &gt; 0 25 are more numerous, but depending on their natures, they may be easily . found to be inconsistent with a K3. This may be because they are morphologically inconsistent (the MIR emission being obviously confined to dusty lanes or the nucleus of the galaxy; see Section 5.3 of Paper I) or because the object is obviously not a galaxy (e.g., a planetary nebula, reflection nebula, or other Galactic source). In the first (resolved ˆ K3) phase of G we will use these methods to establish an upper limit on γ for the galaxies in our sample. This pilot program could be extended to tighter upper limits on γ in several ways. A detailed morphological study of galaxies extended in WISE would allow one to calculate an uppler limit for γ from sources other than interstellar dust, especially in ellipticals. This is because interstellar dust is generally not smoothly distributed, but the stars are (and, especially in ellipticals, they are also generally well-mixed). Since the spatial distribution of the component civilizations of a K3 should be the same as that of the stars, any line of sight should be adequate for measuring γ due to stars alone. Thus, the line of sight with the minimum measured γ value would set an upper limit for the entire galaxy that may be significantly tighter than that from the integrated flux. Use of Spitzer imaging would both tighten limits on nearby galaxies and extend the method to galaxies unresolved by WISE . An elliptical galaxy with an unusually high and uniform MIR surface brightness would be an especially enticing target for followup. MIR spectra or FIR fluxes would allow one to use the properties of dust we outline in Section 3.4 to predict the integrated MIR fluxes, and search for MIR excesses above expectations due to dust. This method would push limits for γ below what can be done with MIR photometry alone, and may allow values of γ &lt; 0 01 to be probed in dust-free . ellipticals. ## 4. CONCLUSIONS Before the launch of WISE the upper limits on energy supplies of galaxy-spanning civilizations in other galaxies were very weak (and, to our knowledge, had never been computed). A zeroth order analysis of WISE data allows us to establish here, for the first time, that alien MIR waste heat luminosities of the order of order 10 11 L /circledot (Kardashev's original definition of a Type iii civilization) are very rare in the local universe, and implies that no level of technological advancement will allow any easy or obvious access to 'free' energy (since apparently no alien supercivilizations are using such energy to outshine their host galaxies). We have developed a formalism, which we refer to as the AGENT parameterization, for describing the energy budget of ETI's, and described past searches for and descriptions of ETI's in terms of it. We have also used it to show how a large area MIR survey will enable a search for them both in our own Galaxy, and spanning other galaxies. Such a search is feasible now with the release of the WISE survey and we have begun to perform it. The Galactic phase of our search will focus on finding point sources that are unusually red for a given line of sight (i.e. outside of known star forming regions). GAIA will provide a powerful way to distinguish amongst cosmological sources (which might be red because of both redshift and dust), dusty giant stars, and abnormally cool sources with dwarf-star luminosities, characteristic of Dyson spheres. Stars with debris disks will be a major confounder for the most sensitive searches for circumstellar ETI waste heat, and communication SETI efforts should consider enriching their target lists with stars thought to host debris disks, especially any such stars that show no signs of youth. The extragalactic phase of our search will allow us to identify candidate alien civilizations with large energy supplies among ∼ 10 5 galaxies using broadband photometry alone. We find that, because they can be resolved, galaxy-spanning civilizations may be easier to diagnose and distinguish from natural sources than circumstellar civilizations. A thorough analysis of the extended sources in the WISE catalogs will allow us establish an upper limit for the total waste heat of galaxy-spanning civilizations near γ ∼ 0 25 (i.e. . total MIR waste heat luminosity of one-fourth of the galaxy's stellar luminosity). This limit will be significantly lower than the only previous search for galaxy-spanning civilizations, that of Annis (1999), who found no evidence of galaxies with α /greaterorsimilar 0 75 (i.e. obscuration of three-fourth . of the galaxy's stellar luminosity). Morphological, spectral, and FIR or radio data can push this limit down further, to the point where it may begin to significantly sharpen the Fermi Paradox. Useful follow-up observations would include high-resolution imaging to determine source morphology, radio detection of molecules such as CO, mid-infrared spectra to detect PAH features, and far-infrared or submillimeter photometry to detect thermal dust emission. Such observations will allow for detection of galaxy-spanning alien energy supplies below ∼ 25% of stellar luminosity. We hope this first effort inspires more detailed surveys to do just that, and that positive detections of anomalous objects will inspire new astrophysics and provide candidates for communication SETI and other investigation. This research is supported entirely by the John Templeton Foundation through its New Frontiers in Astronomy and Cosmology, administered by Don York of the University of Chicago. We are grateful for the opportunity provided by this grant to perform this research. The Center for Exoplanets and Habitable Worlds is supported by the Pennsylvania State University, the Eberly College of Science, and the Pennsylvania Space Grant Consortium. This publication makes use of data products from the Wide-field Infrared Survey Explorer, the NASA/IPAC Infrared Science Archive and the NASA/IPAC Extragalactic Database (NED), all of which are operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with or with funding from the National Aeronautics and Space Administration. This research has also made use of NASA's Astrophysics Data System and the SIMBAD database, operated at CDS, Strasbourg, France. We thank Erik Rosolowsky for making the binplot.pro and disp.pro routines available for our use in making Figure 3. We acknowledge that many ideas not original to us are incompletely cited (often because we are not aware the earliest or most appropriate references); we apologize that the references included in this series of papers are not comprehensive. For instance, Zubrin's loose use of the term 'Type iii civilization' appears in Kardashev (1985) but likely has earlier attestations; our use of the shorthand K 1, K 2, and K 3 is at least as old as Webb (2002), but may have earlier origins. We are grateful for the assistance of IPAC and members of the WISE team, especially Davey Kirkpatrick, Tom Jarrett, and Michael Cushing. We thank Arjun Dey, Eugene Chiang, and Marc Kuchner for helpful contributions and discussions. We thank Adam Kraus for the insight that GAIA will provide a powerful discriminant for K2's. We thank our referees for appropriately challenging our conclusions and sharpening our reasoning. ## REFERENCES Annis, J. 1999, Journal of the British Interplanetary Society, 52, - 33 Arnold, L. F. A. 2005, ApJ, 627, 534 Badescu, V., &amp; Cathcart, R. B. 2000, Journal of the British Interplanetary Society, 53, 297 Bhat, M., Dhurandhar, S., &amp; Dadhich, N. 1985, Journal of Astrophysics and Astronomy, 6, 85 Blair, D. G., Norris, R. P., Troup, E. R., et al. 1992, MNRAS, 257, 105 Carrigan, Jr., R. A. 2009, ApJ, 698, 2075 Cohen, M., Walker, R. G., Barlow, M. J., &amp; Deacon, J. R. 1992, AJ, 104, 1650 Cutri, R. M., Wright, E. L., Conrow, T., et al. 2012, Explanatory Supplement to the WISE All-Sky Data Release Products, Tech. rep. Dey, A., Soifer, B. T., Desai, V., et al. 2008, ApJ, 677, 943 Draine, B. T., &amp; Li, A. 2007, ApJ, 657, 810 Eisenhardt, P. R. M., Wu, J., Tsai, C.-W., et al. 2012, ApJ, 755, 173 Galametz, M., Madden, S., Galliano, F., et al. 2009, A&amp;A, 508, 645 Galliano, F., Madden, S. C., Jones, A. P., et al. 2003, A&amp;A, 407, 159 Griffith, R. L., Tsai, C.-W., Stern, D., et al. 2011, ApJ, 736, L22 Griffith, R. L., Cooper, M. C., Newman, J. A., et al. 2012, ApJS, 200, 9 Hart, M. H. 1975, QJRAS, 16, 128 Helou, G., Malhotra, S., Hollenbach, D. J., Dale, D. A., &amp; Contursi, A. 2001, ApJ, 548, L73 Hooper, D., &amp; Steffen, J. H. 2012, Journal of Cosmology and Astroparticle Physics, 7, 46 Inoue, M., &amp; Yokoo, H. 2011, Journal of the British Interplanetary Society, 64, 58-62 Jarrett, T. H., Chester, T., Cutri, R., et al. 2000, AJ, 119, 2498 Jarrett, T. H., Cohen, M., Masci, F., et al. 2011, ApJ, 735, 112 Kardashev, N. S. 1964, Soviet Ast., 8, 217 Kardashev, N. S. 1985, in IAU Symposium, Vol. 112, The Search for Extraterrestrial Life: Recent Developments, ed. M. D. Papagiannis, 497-504 Kleidon, A. 2010, Physics of Life Reviews, 7, 424 Lake, S. E., Wright, E. L., Petty, S., et al. 2012, AJ, 143, 7 Loeb, A., &amp; Turner, E. L. 2012, Astrobiology, 12, 290 Markwardt, C. B. 2009, in Astronomical Society of the Pacific Conference Series, Vol. 411, Astronomical Data Analysis Software and Systems XVIII, ed. D. A. Bohlender, D. Durand, &amp; P. Dowler, 251-+ Mor´ e, J. J. 1977, in Numerical Analysis, ed. G. A. Watson (Berlin: Springer), 105-116 Niven, L. 1970, Ringworld (New York, NY, USA: Ballantine) Perryman, M. A. C., de Boer, K. S., Gilmore, G., et al. 2001, A&amp;A, 369, 339 Pope, A., Wagg, J., Frayer, D., et al. 2013, ApJ, 772, 92 Sagan, C. 1973, Icarus, 19, 350 Sajina, A., Yan, L., Armus, L., et al. 2007, ApJ, 664, 713 Silva, L., Granato, G. L., Bressan, A., &amp; Danese, L. 1998, ApJ, 509, 103 Slysh, V. I. 1985, in IAU Symposium, Vol. 112, The Search for Extraterrestrial Life: Recent Developments, ed. M. D. Papagiannis, 315-319 Webb, S. 2002, If the Universe Is Teeming with Aliens ... WHERE IS EVERYBODY?: Fifty Solutions to the Fermi Paradox and the Problem of Extraterrestrial Life, Copernicus Series (Springer) Wright, E. L., Eisenhardt, P. R. M., Mainzer, A. K., et al. 2010, AJ, 140, 1868 Wyatt, M. C. 2008, ARA&amp;A, 46, 339 Zubrin, R. 2000, Entering Space: Creating a Spacefaring Civilization (New York, USA: Jeremy P. Tarcher/Putnam)
10.1088/0004-637X/792/1/27
[ "J. T. Wright", "R. Griffith", "S. Sigurðsson", "M. S. Povich", "B. Mullan" ]
2014-08-05T22:20:39+00:00
2014-08-05T22:20:39+00:00
[ "physics.pop-ph", "astro-ph.GA" ]
The Ĝ Infrared Search for Extraterrestrial Civilizations with Large Energy Supplies. II. Framework, Strategy, and First Result
We describe the framework and strategy of the \^G infrared search for extraterrestrial civilizations with large energy supplies, which will use the wide-field infrared surveys of WISE and Spitzer to search for these civilizations' waste heat. We develop a formalism for translating mid-infrared photometry into quantitative upper limits on extraterrestrial energy supplies. We discuss the likely sources of false positives, how dust can and will contaminate our search, and prospects for distinguishing dust from alien waste heat. We argue that galaxy-spanning civilizations may be easier to distinguish from natural sources than circumstellar civilizations (i.e., Dyson spheres), although Gaia will significantly improve our capability to identify the latter. We present a "zeroth order" null result of our search based on the WISE all-sky catalog: we show, for the first time, that Kardashev Type III civilizations (as Kardashev originally defined them) are very rare in the local universe. More sophisticated searches can extend our methodology to smaller waste heat luminosities, and potentially entirely rule out (or detect) both Kardashev Type III civilizations and new physics that allows for unlimited "free" energy generation.
1408.1135v1
## It is hard to see a needle in a haystack: Modeling contrast masking effect in a numerical observer Ali R. N. Avanaki , Kathryn S. Espig , Albert Xthona , Tom R. L. Kimpe , 1 1 1 2 Predrag R. Bakic , Andrew D. A. Maidment 3 3 1 2 Barco Healthcare, Beaverton, OR, USA BARCO N.V., Healthcare Division, Kortrijk, Belgium 3 University of Pennsylvania, Department of Radiology, Philadelphia, PA, USA Abstract. Within the framework of a virtual clinical trial for breast imaging, we aim to develop numerical observers that follow the same detection performance trends as those of a typical human observer. In our prior work, we showed that by including spatio-temporal contrast sensitivity function (stCSF) of human visual system (HVS) in a multi-slice channelized Hotelling observer (msCHO), we can correctly predict trends of a typical human observer performance with the viewing parameters of browsing speed, viewing distance and contrast. In this work we further improve our numerical observer by modeling contrast masking. After stCSF, contrast masking is the second most prominent property of HVS and it refers to the fact that the presence of one signal affects the visibility threshold for another signal. Our results indicate that the improved numerical observer better predicts changes in detection performance with background complexity. Keywords: contrast masking effect, spatio-temporal contrast sensitivity function, channelized Hotelling observer, human visual system, virtual clinical trial, and psychometric function. ## 1 Purpose Commonly used numerical observers cannot necessarily predict the behavior of a typical human observer in all observation scenarios. This is due to the fact that they are modeled after ideal observers (i.e., maximizing some detection performance metric) with some concessions for tractability (e.g., channelization). For example, a multi-slice channelized Hotelling observer (msCHO), without correct application of spatio-temporal contrast sensitivity function (stCSF), is unable to predict the fundamental effect of display contrast on detection of lesions in digital breast tomosynthesis (DBT) [1, 2]. Our goal is to enhance a numerical observer by making it perform more similarly to a human observer. Our approach towards this goal is to integrate important properties of the human visual system (HVS) as a pre-processing step to a commonly used numerical observer (msCHO). In other words, as the result of HVS modeling, 'per- ceived' 3D image stacks are fed to msCHO. Previously we have reported on the benefits of integrating the HVS property of stCSF with msCHO [1, 2, 3]. In this work, we study the effect of modeling the contrast masking property of HVS in our numerical observer. Contrast masking refers to the phenomenon that the presence of a signal ('masker') makes detection of another signal ('maskee') more difficult. ## 1.1 Prior work Zhang et al channelized the input image in orientation and (spatial) frequency [4]. In the most sophisticated model used, an inhibitory component (denominator of Eq. 13 therein) is used to factor in the contrast masking effect. Early channelization of the data in [4] is undesirable in our methodology. By postponing channelization to CHO (i.e., HVS simulation followed by a traditional numerical observer at the backend), one can replace msCHO by a more sophisticated observer to upgrade the pipeline. In other words, early channelization discards data that may be useful to the detection task to be performed at the backend. Also, the perception model in [4] is parametric and is unusable without a calibration to (psychophysical) experimental results. Krupinski et al developed a perceptual numerical observer as follows [5]. Using a perceptual image quality metric, JNDmetrix, a lesion image (signal + background) is compared to the corresponding healthy image (background only). Lesion detectability is assumed to be correlated to the metric value which is an indication of the perceived difference between the two images. Contrast masking is one of the effects considered in the derivation of perceptual difference. The perceptual observer proposed in [5] is double-ended. Our current pipeline is single-ended. This is an advantage in our application since unlike a double-ended observer, a single-ended observer does not require having both a version with and without lesion for every image stack. Our current pipeline is designed for DBT (three dimensional, 2D space and 1D time; may be used for other 3D modalities, though not tested) and is able, for example, to show a peak in detection performance with slice browsing speed [2]. Numerical observers in above mentioned papers are spatial-only (2D). ## 2 Methods ## 2.1 Simulation platforms and preparation of datasets In this work, synthetic breast images were generated using the breast anatomy and imaging simulation pipeline developed at the University of Pennsylvania (UPenn). Normal breast anatomy is simulated by a recursive partitioning algorithm using oc- trees [10]. Phantom deformation due to clinical breast positioning and compression is simulated using a finite element model [11]. DBT image acquisition is simulated by ray tracing projections through the phantoms, assuming a polyenergetic x-ray beam without scatter, and an ideal detector model. Reconstructed breast images are obtained using the Real-Time Tomography image reconstruction and processing method [12]. Fig. 1. Block diagram of the display and virtual observer simulation. The methods proposed in this paper are used in the dotted block. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-356244bc-4660-4753-98ef-fa370859f2f9.jpg) The display and virtual observer simulation (Fig. 1) is implemented in MEVIC (Medical Virtual Imaging Chain) [13], an extensible C++ platform developed for medical image processing and visualization at Barco. DBT stack datasets (volumes of interest) with and without simulated lesions, generated using the UPenn pipeline, are input to the display and virtual observer simulation pipeline. For the experiments with numerical observer that are reported here, the 'simple background' dataset (see next paragraph for details) consists of 3296 reconstructed 64x64x32 DBT image stacks, half with lesions and half without. Each stack is first decomposed into its spatiotemporal frequency components using a 3D fast Fourier transform (FFT). The stCSF [1, 2], contrast masking (Section 2.2), and psychometric function [1, 2] are modeled in the dotted block in Fig. 1 to determine the perceived amplitude of each frequency component. Then, an inverse 3D FFT is applied to the perceived amplitudes to transform the perceived stack into the space-time domain. Finally, the results are fed to a multislice channelized Hotelling observer (msCHO) developed by Platiša et al [14]. For further details of the simulation see [2]. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-96e3fb59-be82-47fc-8842-1543372ad132.jpg) Fig. 2. From left to right: Slices #16 from the same image stack in datasets with background complexity level of 0 (simple background), 1, 2, 3, and 4. The insertion contrast for these images is increased to make the lesion (the bright spot in the center of each slice) visible for the purposes of publication. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-150226cc-638d-41ed-b258-4a5abba48281.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-38200eed-fd13-4ec8-b3de-437c5ed1a13a.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-88ba51b4-f6a7-4ce5-a003-b6658be704ba.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-a8e0e74a-9ee4-4ca9-81ba-28a00991a8ec.jpg) To create datasets with varying background complexity, spatiotemporal low-pass Gaussian noise with four different levels of energy was added to the dataset from UPenn phantom. Slices #16 from a sample image stack in five datasets are shown in Fig. 2. ## 2.2 Experiments with numerical observers The following section describes how we modeled HVS contrast masking property in the numerical observer. According to Winkler, we can disregard temporal contrast masking effect since there is no abrupt change in average luminance (Section 9.2 of [6]). This does assume a continuous browsing in viewing DBT stacks. To account for spatial contrast masking, we use Barten's model (Chapter 6 of [7]), with the following considerations. Barten addressed the masking of a single spatial tone (single-frequency signal) by a band-pass noise. We assume each frequency component as masker for all other frequency components in a neighborhood determined by masker-maskee difference in frequency and orientation. This is done for every slice in the image stack and the result is used to adjust the CSF-only visibility threshold calculated for each spatio-temporal component of the image stack as follows (Eq. 2.50 in [7]): $$m _ { t } ^ { \prime } & = \sqrt { m _ { t } ^ { 2 } + k ^ { 2 } m _ { n } ^ { 2 } },$$ where is the visibility threshold with masking, is the CSF-only visibility threshold, is the masker power, and k is Crozier coefficient. The rest of processing is the same as the CSF-only pipeline with psychometric non-linearity described in our prior work [1, 2]. To find , the masker power for a component with spatial frequency ( u v , ), we first approximate S , the spatial spectrum of the image stack, as follows. $$S ( u, v ) = \sum _ { \tilde { \forall } w } | I ( u, v, w ) | ^ { 2 }$$ I is 3D DFT of the image stack. w denotes the temporal frequency. By generalizing Eq. 6.2 of [7] for 2D spatial frequencies, we derive the following formula for the masker power. $$\iota ( u, \nu ) = \frac { \sum _ { \forall ( u ^ { \prime }, v ^ { \prime } ) } w ( u, v, u ^ { \prime }, v ^ { \prime } ) S ( u ^ { \prime }, v ^ { \prime } ) } { S ( 0, 0 ) \sum _ { \forall ( u ^ { \prime }, v ^ { \prime } ) } w ( u, v, u ^ { \prime }, v ^ { \prime } ) }, \ u \neq 0 \text{ or } v \neq 0, \quad \quad ( 3 )$$ . The function allows a higher weight for nearby components in (spatial) frequency and orientation and is given by ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-354e8a5d-a5f3-4813-962f-6e3c80b984b3.jpg) where is the angle between and . This weighting function above is derived by generalizing Eq. 6.4 of [7] for 2D spatial frequencies, and considering the fact that only excitations close in orientation mask one another (Eq. 5.18 in [8]). Simulation parameters are the same as those used for human observer experiments (Section 2.3). For calculation of stCSF and the perceived amplitudes, see [2]. ## 2.3 Experiments with human observers The following section describes how we have established human observer detection performance in three levels of background complexity. From the same datasets used for experiments with numerical observer, 35 image stacks are randomly chosen for each of the six conditions. The set of conditions is the Cartesian product of {lesion, healthy} (i.e., lesion present or absent) and {0, 2, 4} level of background complexity (see Fig. 2), simulated by the image stacks without addition of noise, and the image stacks with medium and high energy noise added (the noise spectrum remained the same) respectively. The total of 210 image stacks were presented to the human observer in a random order on a DICOM-calibrated BARCO MDMG-5221 medical display which is optimized and cleared by FDA for reading of DBT images and is equipped with RapidFrame temporal response compensation technology. Each image stack was displayed in cine mode at a constant browsing speed of 10 slice/sec twice. The recommended viewing distance from the display was about 40 cm (translates to a spatial sample rate of 18 pixel/degree) but was not strictly enforced for the observer's comfort. The maximum luminance of display (Lmax) was set to 850 cd/m . In our viewing environment, 2 the black point luminance of the display (i.e., the level of luminance associated with drive level of zero) was measured at L min = 1.75 cd/m , using a Minolta CS-100A. 2 Therefore, the effective contrast given by L max /Lmin , was 486. The observer could repeat the presentation of an image stack (as described above) as many times as desired, or score the presence of a lesion in the spatiotemporal center of the stack. No temporal or spatial clue was provided for the location of lesion. That was because, given our presentation scenario, we found such clues unnecessary and even distracting from the lesion detection task in our pilot experiments. Scoring an image stack consisted of entering one number from the set {0, 1, 2, 3} meaning {certainly no lesion, probably no lesion, probably lesion, certainly lesion} respectively. When an image stack was scored, the process above was repeated for the next image stack. We considered the detection performance as the percentage of correctly identified (i.e., scored 2 or 3) lesion image stacks. To have more stable results, the same set of image stacks that were randomly chosen for the first human observer was used for the experiments with other human observers as well. The observers were required to have normal vision and pass a 10-minute training session to become familiar with the experiment and their task. The observers were not radiologist. This is justified considering the fact that the location of the lesion, if present, is always known (and constant), hence the detection task is simply reduced to recognizing a bright spot in a background with various levels of complexity. ## 3 Results and discussion The results of experiments with two human observers are given in Table 1. As expected, the detection performance for human observers falls with increasing background complexity. It is conceivable that with more experience, human observers who are aware of lesion prevalence rate (50% in our experiments) reach the chance performance (0.5) even in high background complexity. Table 1. Percentage of correctly identified lesion stacks (of total) in three background complexity levels. | Background Complexity | Low | Medium | High | |-------------------------|---------|----------|---------| | Observer A | 0. 9714 | 0. 7714 | 0. 2571 | | Observer B | 0. 8000 | 0. 7143 | 0. 3429 | Simulation results from modeling HVS with stCSF only, and stCSF plus contrast masking are compared in Fig. 3. In each case, three methods of calculating the perceived amplitudes using the visibility threshold are simulated: Monte Carlo (MC), probability map (PM), and linear filtering (LF). While both methods PM &amp; MC use a nonlinear psychometric function, PM is deterministic and MC is not. For more information on calculation of the perceived amplitudes, see [2]. The inclusion of contrast masking makes the numerical observer more closely resemble the human observer performance, in the sense that it removes some of the over performance of numerical observer. Among the six graphs in Fig. 3, the one showing the results of modeling HVS with stCSF plus contrast masking using the PM method for perceived amplitude calculation demonstrates the most significant drop in detection performance with increasing background complexity. Even this graph, however, cannot match the fast drop of detection performance of human observers as listed in Table 1. Fig. 3. Detection performance (in AUC) for datasets at various background complexity levels (Section 2.1). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1135v1-figure-d680d19e-e796-4b22-891a-7a87707d7bb4.jpg) ## 4 Conclusion Our results indicate that by modeling the HVS contrast masking property, lesion detection becomes more difficult in a busier background, as expected from a typical human observer. This is a work in progress. We plan to continue our work on this project in the following avenues. (i) Experiments are conducted with more human observers and the scores will be aggregated with one-shot multi-reader multi-case ROC analysis [9]. (ii) A more realistic model of background complexity including anatomical and quantum noise using our software phantom will be used to prepare the datasets. (iii) We will explore the extent of our claims for a variety of lesion sizes and types. ## Acknowledgement This work is supported by the US National Institutes of Health (grant 1R01CA154444). Ali Avanaki would like to thank Drs. Kyle Myers, Cédric Marchessoux, and Miguel Eckstein. Dr. Maidment is on the scientific advisory board of Real-Time Tomography, LLC. ## References - [1] A.N. Avanaki, K.S. Espig, C. Marchessoux, E.A. Krupinski, P.R. Bakic, T.R.L. Kimpe, A.D.A. Maidment, 'On modeling the effects of display contrast and luminance in a spatiotemporal numerical observer,' MIPS presentation, Washington DC, 2013. - [2] A.N. Avanaki, K.S. Espig, A.D.A. Maidment, C. Marchessoux, P.R. Bakic, T.R.L. Kimpe, 'Development and evaluation of a 3D model observer with nonlinear spatiotemporal contrast sensitivity,' to appear in Proc. of SPIE Medical Imaging, 2014. - [3] A.N. Avanaki, K.S. Espig, C. Marchessoux, E.A. Krupinski, P.R. Bakic, T.R.L. Kimpe, A.D.A. Maidment, 'Integration of spatio-temporal contrast sensitivity with a multi-slice channelized Hotelling observer,' Proc. SPIE Medical Imaging , 2013. - [4] Y. Zhang, B.T. Pham, M.P. Eckstein, 'The Effect of Nonlinear Human Visual System Components on Performance of a Channelized Hotelling Observer Model in Structured Backgrounds,' IEEE Trans. on Medical Imaging , vol. 25, pp. 1348-1362, 2006. - [5] E. A. Krupinski, J. Lubin, H. Roehrig, J. Johnson, J. Nafziger 'Using a human visual system model to optimize soft-copy mammography display: influence of veiling glare,' Acad Radiol. , vol. 13, pp. 289-295, 2006. - [6] S. Winkler, 'Issues in vision modeling for perceptual video quality assessment,' Signal Processing , vol. 78, pp. 231-252, 1999. - [7] P.G.J. Barten, Contrast sensitivity of the human eye and its effects on image quality , SPIE Optical Engineering Press, Bellingham, WA, 1999. - [8] M. Barni, F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , CRC Press, 2004. - [9] B.D. Gallas, 'One-shot estimate of MRMC variance: AUC,' Acad Radiol. , vol. 13, pp. 353362, 2006. - [10] D. Pokrajac, A.D.A. Maidment, P.R. Bakic, 'Optimized Generation of High Resolution Breast Anthropomorphic Software Phantoms,' Medical Physics , vol. 39, pp. 2290-2302, April 2012. - [11] M.A. Lago, A.D.A. Maidment, P.R. Bakic, 'Modelling of mammographic compression of anthropomorphic software breast phantom using FEBio,' Proc. Int'l Symposium on Computer Methods in Biomechanics and Biomedical Engineering (CMBBE) Salt Lake City, UT, 2013. [12] J. Kuo, P. Ringer, S.G. Fallows, S. Ng, P.R. Bakic, A.D.A. Maidment, 'Dynamic reconstruction and rendering of 3D tomosynthesis images' Proc. of SPIE, Medical Imaging 2011. [13] C. Marchessoux, T. R. L. Kimpe, and T. Bert, 'A virtual image chain for perceived and [14] L. Platiša, B. Goossens, E. Vansteenkiste, S. Park, B. Gallas, A. Badano and W. Philips, J. of - clinical image quality of medical display,' J. of Display Technology , vol. 4, pp. 356-368, 2008. 'Channelized hotelling observers for the assessment of volumetric imaging data sets,' Optical Society of America A , vol. 28, pp. 1145 - 1163, 2011.
10.1007/978-3-319-07887-8_100
[ "Ali R. N. Avanaki", "Kathryn S. Espig", "Albert Xthona", "Tom R. L. Kimpe", "Predrag R. Bakic", "Andrew D. A. Maidment" ]
2014-08-05T22:23:40+00:00
2014-08-05T22:23:40+00:00
[ "cs.CV" ]
It is hard to see a needle in a haystack: Modeling contrast masking effect in a numerical observer
Within the framework of a virtual clinical trial for breast imaging, we aim to develop numerical observers that follow the same detection performance trends as those of a typical human observer. In our prior work, we showed that by including spatiotemporal contrast sensitivity function (stCSF) of human visual system (HVS) in a multi-slice channelized Hotelling observer (msCHO), we can correctly predict trends of a typical human observer performance with the viewing parameters of browsing speed, viewing distance and contrast. In this work we further improve our numerical observer by modeling contrast masking. After stCSF, contrast masking is the second most prominent property of HVS and it refers to the fact that the presence of one signal affects the visibility threshold for another signal. Our results indicate that the improved numerical observer better predicts changes in detection performance with background complexity.
1408.1136v2
![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1136v2-figure-97f3efd4-3528-478e-875d-07a111a3b1e9.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1136v2-figure-e464ed8d-e642-4e1a-96c3-26bbd7637939.jpg) Joseph Gardiner Marco Cova Shishir Nagaraja February 2014 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1136v2-figure-fddbec0c-676c-4216-b9bb-a64d2afd1c75.jpg) ## Abstract One of the leading problems in cyber security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools, sometimes referred to as Advanced Persistent Threats (APTs). These attacks target specific organisations or individuals and aim at establishing a continuous and undetected presence in the targeted infrastructure. The goal of these attacks is often espionage: stealing valuable intellectual property and confidential documents. As trends and anecdotal evidence show, providing effective defences against targeted attacks is a challenging task. In this report, we restrict our attention to a specific part of this problem: specifically, we look at the Command and Control (C2) channel establishment, which, as we will see, is an essential step of current attacks. Our goals are to understand C2 establishment techniques, and to review approaches for the detection and disruption of C2 channels. More precisely, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. This knowledge is foundational to understand C2 techniques and to design effective countermeasures. We then investigate the 'mechanics' of C2 establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. Finally, we switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1136v2-figure-ad4167ca-b28d-4f95-bf34-39cca3ea499a.jpg) We would like to acknowledge the help and support of CPNI in researching this topic and producing the accompanying products. U F ## Executive Summary Formation and use of a Command and Control (C&amp;C) system is an essential part of remotely-conducted cyber attacks. C&amp;C is used to instruct compromised machines to perform malicious activity C&amp;C can also be used as a channel over which data can be exfiltrated. Statistics show that cyber attacks are widespread across all sectors and that preventing intrusion is difficult. A promising alternative consists of detecting and disrupting the C&amp;C channels used by attackers: this effectively limits the damage suffered as a consequence of a successful attack (e.g., preventing sensitive data to being leaked). ## C&amp;C communication and traffic Attackers experiment with alternative strategies to build reliable and robust C&amp;C infrastructures and to devise stealthy communication methods. As a consequence, different C&amp;C architectures and communication techniques have emerged. For example, attackers have used centralised architectures, based on the standard IRC and HTTP protocols. More recently, they have introduced decentralised architectures based on P2P protocols, which are more difficult to take down. Similarly, direct forms of communication have been substituted by encrypted channels, where attacker's commands and stolen information cannot be readily accessed. To make channel detection and blocking more difficult, attackers also use covert communication mechanisms that mimic regular traffic patterns. For example C&amp;C traffic can occur through pages and images on Online Social Networks (OSNs), covert DNS traffic, and networks for anonymous communication, such as Tor. ## C&amp;C detection and disruption A variety of techniques for the detection and disruption of C&amp;C channels have been proposed. They typically rely on the automated monitoring and analysis of network traffic to identify indicators of compromise, malicious traffic, or anomalous communication patterns. The importance of human involvement in this activity cannot be overstated. As attackers constantly adapt their U strategies, it is critical to gain a thorough understanding of the traffic flow patterns followed by manual tuning of monitoring, detection, and response infrastructure at periodic intervals. The following is a checklist of measures that help detecting and denying C&amp;C in your organisation. ## Detect known-bad network activity Collect and analyse network traffic to identify activity that is known to be caused by an active C2 channel. - · Monitor DNS traffic to identify internal devices that attempt to contact domains that are known to be involved in C2 activity. This measure involves collection of DNS traffic information (either through a passive DNS collector or via the nameservers logs) and matching of requests against one or more blacklists of malicious domain names. - · Monitor IP traffic to identify internal devices that attempt to connect to end points that are known to be involved in C2 activity. This measure involves collection of IP traffic information (for example, enabling NetFlow and sFlow collection in routers) and matching of communications against one or more blacklists of malicious IP addresses. - · Monitor traffic content to identify content that matches known C2 traffic (e.g., specific network request/responses signatures). This measure involves collection of full traffic content (for example, enabling a network sniffer) and matching of the collected data against traffic signatures. These measures enable the detection of C2 channels that are set up by known malware families, leverage known infrastructure, or employ known communication techniques. ## Detect anomalous network activity Collect and analyse network traffic to identify activity that deviates from the expected, normal traffic profile of the monitored network. F - · Establish traffic baselines to determine the 'normal' profile of the network (normal communication patterns, data exchange volumes, etc.). This measure can be implemented by determining baselines for different time windows (e.g., hour, day), internal devices, and network services. - · Evaluate current network activity against the established baselines to identify deviations that may be indicative of C2 activity. Pay particular attention to anomalies such as periodic beaconing, surge in the amount of exchanged traffic, suspicious network behaviours. - · F or example, C2 activity that relies on fast-flux techniques can be detected by searching DNS data for patterns of fast-changing associations between domain names and IP addresses; DGAbased C2 activity is revealed in DNS data by use-and-discard patterns of domain names; data exfiltration may be detected in Net-Flow data by unusually large volumes of data exchanges. These measures enable the detection of C2 channels that are set up by neverseen-before malware families and that do not re-use any known malicious infrastructure. ## Deny C2 activity Architect and operate the network in such a way that C2 activity is effectively denied or greatly impaired. - · Segment the network to separate devices with different trust and risk values (e.g., front-facing, publicly servers vs. internal hosts storing sensitive documents). - · Introduce rate-limit policies to slow down traffic directed to disreputable or un- trusted endpoints. - · Block unwanted or unused communications mechanisms that may be used to piggy back C2 activity (e.g., anonymisation networks, P2P overlays, social networks). ## Executive Summary ## Practicalities Start small, measure, and scale up: security controls can be applied itertively, covering first high-risks groups, idetifying mechanisms that are effective, and then expanding their applications to larger portions of the organisation. ## Introduction We are currently in the middle of a computer security crisis: the number of attacks, their sophistication and potential impact have grown substantially in the last few years. In particular, targeted attacks , sometimes also called advanced persistent threats (APTs), have emerged as today's most challenging security threat. Targeted attacks target specific individuals or organisations with the typical intent of obtaining confidential data, such as contracts, business plans, and manufacturing designs. They typically employ extensive reconnaissance and information gathering to identify weaknesses in the target's defences, and rely on sophisticated malware to perform the intended actions (e.g., locate and steal sensitive documents within the target's network). Because of their nature, targeted attacks are particularly difficult to prevent. To in- trude and take control of the target's systems, they may use 0-day exploits [11] or other malicious code that is known to evade the specific defence mechanisms used by the target. They may also rely on carefully-crafted social engineering techniques to 'exploit the human', that is to convince unsuspecting users within the targeted organisation to perform unwanted activities, such as installing and running malware. An additional line of defence against targeted attacks is the detection and disruption of individual steps that are essential for the successful progression of an attacks. This is the so-called kill chain approach [19]. Of particular interest for a defender is identifying the U step in which a compromised system establishes a Command &amp; Control channel (C2), i.e., a communication channel with the attackers through which it can receive further commands or can send any stolen data. Blocking an intrusion in the C2 step has several advantages. If no sensitive data is ever exfiltrated, the targeted organisation limits its damage significantly: while the integrity of the organisation's systems has been compromised, its most valuable assets (e.g., intellectual property and R&amp;D plans) are still intact. Even in the event of successful data stealing, an understanding of the C2 structure could prove essential to determine what has been stolen and where it ended to. In addition, the analysis of the C2 channel may provide indications useful to attribute the attack to specific groups of people, which may facilitate legal actions against them. The overarching goal of our study is to understand the techniques of Command and Control in order to improve our defensive approaches. We will examine C2 activity both from the attacker's perspective (how are C2 channels set up and maintained?) and from the defender's perspective (how are C2 channels detected and disrupted?) . Having an understanding of both sides of the problem (attacks and defences) is key to understand what attackers are currently capable of doing (or might do in the future) and what defences may be effective against them. Our approach to the problem of understanding and combating C2 is F based on a com- prehensive review, systematization, and contextualization of the substantive work in this area, done by both the academic and commercial community. For the academic work, we focus our attention on publications appearing in top conferences and journals, such as USENIX Security, ACM CCS, IEEE Security &amp; Privacy, and NDSS. For the indus- try work, we review publications at conferences such as RSA and BlackHat, technical reports, and blog postings authored by the main security vendors. Whenever possible, we emphasise practical considerations extracted from these works, with the hope that they may lead to better defence mechanisms to be deployed. The rest of the report is organised as follows: we start by covering some background material on Command &amp; Control (section C). We then review in detail the techniques that attackers use (or may use) to create and maintain C2 channels (section D). We review approaches that have been proposed to detect C2 channels and disrupt them (section E). Finally, we revisit security controls that are commonly adopted by organisations to spotlight those that are more likely to successfully identify and disrupt C2 activity, and to identify any gaps in the current best practices (section F). ## The Command and Control Problem Command and Control identifies the step of an attack where the compromised system contacts back the attackers to obtain addition attack instructions and to send them any relevant information that has been collected up to that point. To really understand C2 activity, we need to review a number of aspects that, taken together, characterise today's attacks. In particular, we will examine the factors that shape the current attack landscape (why targeted attacks have become such a threat?) . We also review the actual way in which the attacks attacks are carried out ( how does a targeted attack work?) and the reasons why C2 activity is a critical step in these attacks. Then we look at the available data on targeted attacks to quantify them and to learn some lessons specifically on C2 activity, before reviewing notable cases of targeted attacks. ## C.1 Attack Landscape The security field is co-dependent with an adversary. As the adversary's motivations, drivers, or technical means change, so does the entire security landscape. We posit that changes in cyber attacks that have occurred lately (and that affect our ability to defend against them) are largely the result of several significant changes in the techniques and behaviours of attackers. We focus here on three main thrusts: changes in attackers' motivations, the increased targeting of attacks, and their use of evasive techniques. ## Motivations The motivations of attackers have changed substantially, transforming their activity from a reputation economy to a cash economy [37]. Long gone are the days when attacks were performed predominantly by individuals with the intent to display their technical skills and to gain 'street credibility'. The last ten years have seen instead the rise of criminal groups that use Internetbased attacks to make a financial profit. Criminal groups can be well-organised and technically sophisticated. They can often rely on specialised 'contractors' for different parts of the attack: for example, they may include a computer programmer for the development of actual attack code and a 'cashier' for the monetization of stolen data. Less advanced groups can rely on the wide availability of commoditised attack tools, such as pre-packaged exploit kits [41] or phishing kits [24], which simplify considerably the steps required to launch relatively sophisticated attacks. Notably, the activity of these groups is sufficiently well-established to give rise to active underground markets, where malicious code, stolen goods, tips and tricks are exchanged or sold [35]. An overview of cyber crime evidence for the UK has been recently published [76]. Traditionally, criminal groups have focused on getting access to financial data, such as credit card numbers and online banking account credentials, which can be easily monetized. This activity has been referred to as 'cyber crime', since it replicates traditional criminal activities (such as money stealing and fraud) in the online domain. However, more recently attackers have increasingly targeted sensitive data different than financial, focusing primarily on acquiring intellectual property, such as manufacturing designs, legal contracts, etc. These attacks can often be classified as examples of industrial and commercial espionage. A significant evolution in this line of changes to attackers' motivation is the rise of State-sponsored attacks. With this term are denoted attacks that, for their scope, objectives, and cost, are likely to be mandated and funded by State-level entities. State-level attacks encompass two typical goals: the systematic and comprehensive espionage of other nations' entire economic sectors with the objective of gaining strategic advantage [13], and the sabotage of critical national infrastructure, such as power plants and transportation control systems. The impact and consequences of these attacks have led some commentators to discuss the possibility of cyber wars [18]. The most well-known example of a State-level attack is Stuxnet, a worm believed to be created by the United States and Israel to sabotage a nuclear facility in Iran [69, 106]. ## Targeted Attacks A second significant change that is relevant to our study of Command and U F Control is the increasingly targeted nature of attacks. Cyber crime activity is typically opportunistic: attackers cast a wide net and are happy with any target they can capture. More sophisticated attacks, on the contrary, take aim at very specific organisations or individuals and expend significant resources to compromise them. This change in the mode of attacks has several important consequences. Attackers do not simply move from one potential victim to another, in search of the system that, being least defended, offers the easiest way in. Instead, attackers focus relentlessly on their selected target. Second, the methodology of attacks change. In particular, the attack life-cycle includes a reconnaissance phase in which the target's security posture and the defensive tools it uses are carefully examined and analysed to identify possible weaknesses [73]. In addition, a targeted compromise attempts to establish its presence on the victim's systems for as long as possible, so as to reap the benefits of the intrusion over time. Consequently, the life cycle commonly includes phases in which the intruder moves 'laterally', i.e., gains access to additional systems, and introduces techniques to main- tain the attackers' presence in the intruded system. Actual attack artefacts, for example, malware samples or network-based attacks, tend to become unique: they are tailored to a specific target and, thus, are less likely to be reused in other attacks. This is problematic for security tools, which sometimes use the observation of the same suspicious artefact in multiple locations as an indication of maliciousness, and for security companies, which may prioritise the investigation of novel attacks and artefacts based on their prevalence. Security researchers are also less likely to develop signatures to match these rarely-seen artefacts. ## The Command and Control Problem ## Evasions The last aspect of modern attacks that we want to discuss in detail is their increasing use of evasive techniques. Attackers want to stay under the radar for as long as possible, to avoid being detected or raising alerts. To achieve this, they adopt a number of measures that, as we will see, have a significant, negative impact on the effectiveness of a number of traditional defence mechanisms. ## Evading signatures Traditional defence systems (such as traditional anti-virus and intrusion detection systems) often rely on signatures to detect attacks or malicious code. A signature characterises a known attack by defining its characteristics. For example, in the context of malware, a signature could be a regular expression that matches the bytes found in a specific malicious file. Unfortunately, a number of obfuscation techniques have been proposed (and are used extensively) to counter signature-based detection. For example, polymorphism is a technique that enables an attacker to mutate an existing malicious binary and create a completely new version from it, which retains its original functionality but is undetected by current signatures [52]. The anti-virus vendor Kaspersky recently reported detecting more than 2 unique malicious samples per second, likely the result of extensive application of polymorphic techniques [64]. ## Evading dynamic analysis systems suppresses the execution of malicious functionality or simply terminates [8]. The way in which the checks are implemented depends on the type of malware analysis system that is targeted. One class of checks inspects the runtime environment to determine whether an analysis tool is present. Often, such checks look for files, registry keys, or processes that are specific to individual analysis tools. A second class of checks exploits characteristics of the execution environment that are different between a real host and a virtualised environment [2, 33, 34, 105] or an emulated system [74, 88, 98] (which are frequently used to implement the analysis sandbox). For these checks, small variations in the semantics of CPU instructions or timing properties are leveraged to determine whether a malware process is run in an emulator or a virtual machine (VM). As another evasive technique, malware may execute its malicious payload or spe- cific parts of its code only when some 'trigger' fires, i.e., only when some specific precondition is satisfied [78]. For example, a malware program may check that certain files or directories exist on a machine and only run parts of its code when they do. Other triggers require that a connection to the Internet be established or that a specific mutex object not exist. Other malware becomes active only in a specific date range, when run by a user with a hardcoded username, or if the system has been assigned a precise IP address. Furthermore, some malware listens for certain commands that must be sent over a control channel before an activity is started. To overcome the limitations of signaturebased analysis of malicious code, researchers use dynamic analysis tools, also called sandboxes [31]. These tools execute a binary in an instrumented environment and classify it as either benign or malicious depending on the observed behaviour. To thwart automated dynamic analysis, malware authors have developed a number of checks (so-called 'red pills') to detect the presence of malware analysis tools and popular sandbox environments. When the malware detects indications that a malware analysis system is present, it typically In the next step of the arms race, malware authors have started to introduce stalling code into their malicious programs [66]. Stalling code is executed before any malicious behaviour, regardless of the execution environment. The purpose of such evasive code is to delay the execution of malicious activity long enough so that the automated analysis system stops the analysis having observed benign activity only, thus incorrectly concluding that the program is non-functional or does not execute any action of interest. Of course, on a regular system, the malware would perform all of its malicious behaviour, right after the delay. Stalling affects all U F analysis systems (virtualised, emulated, or physical machines), even those that are fully transparent. This technique simply leverages the fact that, to analyse a large volume of programs, an analysis system must bound the time it spends executing a single sample to a limited time (in the order of few minutes). To make things worse, malware authors can often craft their programs so that their execution in a monitoring environment is much slower than in a regular system (by a factor of 100 or even more). ## Evading reputation systems Another defensive approach that has gained traction in the last few years is the use of reputation information for network entities (servers or domain names). The idea is that if a client attempts to contact a domain or server with poor reputation it should be stopped, since that will stop also its exposure to potential malicious activity. Reputation data is often compiled into blacklists, i.e., list of domains and IPs that should be avoided, and distributed to devices that enforce the blocking of elements on the blacklist. For example, devices that may use reputation data include firewalls, proxies, and URL filteres. Malware authors have a crude but effective attack against such reputation blacklists: they can use a certain server or domain for malicious purposes only for a very limited amount of time. After its IP or domain name is 'tainted', that is, has entered one or more blacklists, it is simply abandoned and no longer used. This strategy imposes additional effort and expenses on the attackers (they need to register new domain names or manage new servers with high frequency), but it is effective. Recent data from researchers at Google shows that this strategy is in fact already well in use: they studied domains hosting exploit kits used in drive-by-downloads and found that their median lifetime is only 2.5 hours [41]. Clearly, an effective blacklist should be able to detect the malicious domain and distribute this knowledge to all the enforcement devices before the domain has been abandoned. ## The Command and Control Problem ## C.2 Command and Control Activity ## Reconnaissance We have seen that today's attacks are targeted, evasive, and aim at obtaining and exfiltrating sensitive data. How are these attacks carried out in practice? While the specific attack steps and their naming may vary across publications [19, 55, 73], the literature agrees on the general structure of targeted attacks, which is commonly represented as a sequence of steps similar to those of Figure 1. This is where the attacker learns more about its target and identifies the weaknesses that will be exploited during the actual attack. The reconnaissance activity encompasses both computer systems and individuals. Attackers examine their target's networks and systems by using traditional methodologies, such as port scanning and service enumeration, in search of vulnerabilities and misconfiguration that could provide an entry point in the organisation. Attackers also collect information about key people in the targeted organisation, for example by combing through data available on social media websites: this information will be used to facilitate later stages of the attack. ## Figure 1: Targeted attack life cycle ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1136v2-figure-41550795-3d57-444f-a3c9-c40bcf423fde.jpg) ## Initial compromise This stage represents the actual intrusion, in which attackers manage to penetrate the target's network. Most frequently, the method of compromise is spear phishing. A spear phishing message may contain a malicious attachment or a link to a malicious web site [125]. Often times, the content of the spear phishing message are tailored based on the information acquired during the reconnaissance stage, so that they appear credible and legitimate. A second common method of intrusion is the strategic compromise of websites of interest to the victim (or 'watering hole' attack). In these attacks, attackers place mali- cious code on sites that are likely to be visited by the intended target: when the target visits the compromised website, she will be exposed to one or more exploits. Watering hole attacks represent an evolution of the traditional, opportunistic drive-by-download attacks [95, 97], in which victims are attracted, by different means, to a malicious web page. The web page contains code, typically written in the JavaScript U language, that exploits vulnerabilities in the user's browser or in the browser's plugins. If successful, the exploit downloads malware on the victim's machine, which as a consequence, becomes fully under the control of the attacker [92, 96]. collect, and encrypt information stolen from the victim's environment. The information is then sent to the attackers, commonly through the same C2 channel that was established earlier. ## Command &amp; Control The Command &amp; Control phase of the attack is the stage where adversaries leverage the compromise of a system. More precisely, compromised systems are forced to establish a communication channel back to the adversary through which they can be directly controlled. The C2 channel enables an attacker to establish a 'hands-on-keyboard' presence on the infected system (via so-called remote access tools), to install additional specialised malware modules, and to perform additional malicious actions (e.g., spread to other machines or start a denial of service attack). ## Exfiltration In this stage, the attackers extract, Of course, the exfiltration of data has been a key step in opportunistic attacks as well and it has been well documented in the literature. For example, studies of the data stolen (or 'dropped') by the key loggers components employed in banking trojans have reported on the amount of data being transferred, its estimated value, and the modus operandi of their operators [50]. Furthermore, researchers have sinkholed or hijacked entire botnets with the goal of gaining an inside view of the data stolen from infected machines and the operations of botmasters [114]. With respect to the exfiltration techniques seen in these traditional attacks, we expect targeted malware to expand more effort into disguising its exfiltration activity and its infrastructure. F ## The Command and Control Problem ## Differences with other models In this exposition, we have simplified the attack models discussed in the literature, to avoid distracting the attention from the main purpose of this study: the Command &amp; Control phase. More detailed descriptions of other phases may be useful for readers focusing on other steps of the attack chain, such as the initial compromise. security vendors have often been scrutinised for issues of over-reporting, which increases the perception of the risk involved with security threats and potentially favours the sales of a vendor's product. To further complicate the matter, conclusions from different sources have sometimes been found to be significantly different, if not contrasting. In particular, Hutchins et al. [55] emphasise the steps required to perform the initial intrusion by introducing specific phases named Weaponization, Delivery, Exploitation, and Installation. Since we focus on the C2 stage, we group all these phases under the generic Initial Intrusion label. Mandiant's report [73] emphasises instead the steps performed by attackers after the initial compromise and leading to a persistent presence inside a target's network. After a stage named Establish Foothold, the authors present a cycle of steps (Escalate Privileges, Internal Recon, Move Laterally, and Maintain Presence) that enable attackers to establish an expanded foothold inside the target's network. The authors point out that these steps are optional and may not occur in all attacks. We consider these activities to be part of the compromise phase. ## C.3 Statistics It is notoriously hard to obtain adequate statistics on information security in general, and to measure the volume and impact of cyber attacks in particular. As a high-profile example of the difficulties of this task, a recent review has found significant flaws in a report [27] commissioned by the UK Cabinet Office from Detica, which provided high estimates for cybercrime's annual cost to the UK [4]. The sources of data on cyber attacks have traditionally been surveys and telemetry collected by security vendors across their installation base. Both sources have their own issues [5]. For example, surveys often introduce bias by collecting most of their responses from large companies, which have the resources to collect the data requested by surveyors. In turn, statistics from Recent legal developments may help the collection of meaningful security metrics: in the last few years, disclosure laws have been introduced requiring businesses to report security incidents involving the theft of personal data [15]. Such regulation may increase the collection of attack metrics available, but at the moment they only cover specific incident types and geographic areas. Collecting sound statistics for targeted attacks seems especially challenging: this activity shares some of the same problems found with quantifying cyber attacks in general and it adds a few issues that are specific of this particular domain: - · The victims of targeted attacks are likely not willing to disclose the information that they have been attacked or, worse, breached. This knowledge may be embarrassing with customers and regulatory agencies, and the disclosure details may provide useful information to competitors (e.g., information about new product lines). Even more problematically, as we will see, targets may not know for a long time that they have been attacked. - · Targeted attacks span vast sectors of the economy, therefor, it may be difficult for any single entity (security vendor or governmental agency) to have a sufficiantly broad visibility of the problem. - · Different reporters may have different definitions for what counts as a targeted attack and for the reporting methodology. It is not unusual to encounter descriptions of targeted attacks from one vendor that other vendors classify as traditional attacks. Even with these caveats in mind, we present here a number of statistics from different sources. We consider reports that provide (aggregated) data about U F targeted attacks. We do not, instead, include in our review reports that only describe the attacks in general. For the reasons we have discussed, the statistics reported here should be approached with a healthy dose of caution, in particular with regard to their ability to support general inference about targeted attacks; but they still provide a snapshot, an initial quantitative look into targeted attacks, offering some light on questions such as their pervasiveness and their usual targets. We hope that in the future more and better data on targeted attacks will be available, enabling more robust quantitative analysis of this phenomenon. ## Mandiant Report Mandiant is a security vendor providing incident management products and services to large institutions. Due to their business focus, Mandiant has built a reputation of dealing with targeted attacks. They publish a yearly report with findings from their engagements; the latest available report covers data from 2012 [72]. Mandiant's report suffers from some of the general problems we have discussed earlier. In particular, the sample size (the number of incidents) used as the basis of the report is not specified. Similarly, it is not clear if the incidents analysed in the report (those affecting Mandiant's customers) are a sample set representative of the general population. Nonetheless, the report contains a number of statistics that are worth discussing, as they offer an initial characterisation of targeted attacks. First, it discloses that only 37% of the intrusions were discovered by the victim itself: in the remaining cases, the victim was notified by some external party (e.g., law enforcement, customers, security vendor). The median time during which attackers are able to maintain a presence in the intruded network is reported to 243 days, well over 8 months. They also report that in 38% of the cases, attacks are repeated, supporting the notion that attackers are persistent once they have identified an intended target. The list of targeted sectors include: aerospace and defence (17% of the cases), energy, oil, and gas (14%), finance (11%), computer software ## The Command and Control Problem and hardware (8%), legal (7%), media (7%), telecommunications (6%), pharmaceutical (4%), other (25%). The report does not elaborate on how the business classification was drawn. 2011 compared with 27% of 2012): it is not clear if these changes are an artefact of the data collection and analysis process or correspond to actual changes in the tactics of attackers. ## Symantec Symantec is a large computer security company, focusing on virus protection. They publish a yearly report on the status of Internet security; the latest available data covers the year 2012 [120]. The report investigates targeted attacks on the basis of the targeted malicious emails identified by Symantec's products. In total, the analysed dataset comprises about 55,000 attacks. The methodology used to discriminate whether a malicious email is targeted or opportunistic is intuitively presented, but there is no detailed description of the algorithm used to make this determination. Out of this dataset, Symantec reports observing a number of targeted attacks per day ranging from 50 to about 225. The report warns that one large attack campaign in April against a single target would have significantly skewed results and, thus, has been removed from the presented results: while a reasonable course of action, this observation questions the sample size and generalizability of reported data. Also in this case, the report lists the targeted sectors: manufacturing (24% of the cases), finance insurance and real estate (19%), other services (17%), government (12%), energy/utilities (10%), services professional (8%), aerospace (2%), retail (2%), wholesale (2%), and transportation (1%). The report also comments on the size of the targets: 50% of the attacks targeted large organisations (those with 2,501 employees or more), 31% small and medium business up to 250 employees. The analysis of the malicious email dataset also provides some insight into the targets of the initial compromise: R&amp;D personnel (27% of the attacks), sales (24%), C-level executives (17%), and shared inboxes (13%). Interestingly, the report points out a handful of significant changes from previous year data (for example, R&amp;D personnel used to be targeted only 9% of the cases in U ## Verizon The telecommunication company Verizon publishes a yearly report on data breaches. The last available report at the times of writing covers 2012 and contains data compiled from 19 organisations for a total of of more than 47,000 security incidents [127]. The report has a more general scope than those discussed so far (it covers data breaches in general), but it does provide some useful insights on targeted attacks. The report is characterised by a careful methodology, which is explained in detail. The main findings relevant to our analysis is that 25% of the breaches they report on are targeted. The report confirms the elusive nature of attacks (targeted or not): 69% of breaches were spotted by an external party (9% customers), and 66% of the breaches took months or even years to discover. Another interesting observation is that, in most cases, the initial compromise does not require sophisticated techniques; in 68% of the cases it is rated as 'low difficulty' and less than 1% as 'high'. More worryingly, subsequent actions may be more sophisticated: 21% are high and 71% are low. Unfortunately, the report does not break down these statistics between targeted and opportunistic attacks. ## Discussion As we have anticipated, the available data is unfortunately somewhat limited and the reporting methodology used to analyse it is not always sufficiently described. This limits our ability to make generalizations on the basis of the data sources that we have briefly listed here. However, there are several points that are worth discussing, keeping in mind our objective of designing and deploying better defences against targeted attacks. F ## Ability to detect There seems to be support to the notion that attacks in general, and especially targeted ones, remain unnoticed for a long time. This indicates that organisations do not have appropriate controls, tools, and processes to identify the presence of intruders in their network. Unfortunately, we do not possess enough data to conclusively point to the precise reasons for why this occurs: in particular, it may be result of factors ranging from cultural ones, such as the lack of appropriate awareness to this specific risk (the 'I'm not a target' mentality), to technological reasons, such as the unavailability (real or perceived) of effective defensive tools. The failure to detect intrusions for months, if not years, also implies that attackers have a long time to carry out their attacks, compounding the damage inflicted on the target organisation. At the same time, from a defensive point of view, it shows an imbalance between two common defensive strategies targeting different steps in the attack kill chain: defending by preventing the intrusion and defending by detecting an intruder. More precisely, detecting the initial compromise requires to catch and identify the individual event that leads to the intrusion (e.g., the receipt of a specific spear phishing email or the visit of a specific malicious web site). This is an event that occurs in a specific point of time, and, lacking forensics capabilities, its detection requires that at that specific time some defensive tool (e.g., intrusion detection system or anti-virus tool) is capable of performing the detection. Intuitively, detecting the presence of an intruder may instead happen at any time after the intruder has established a presence in the target's network, during which time defensive tools may be updated or improved. This situation flips the imbalance between attack and defence: while detecting the initial compromise requires that defence tools work effectively at all times (a single missed detection may lead to the compromise), to detect the intruder's presence it is sufficient that the attacker makes a single mistake, revealing its presence. ## The Command and Control Problem ## Targets Different sources provide different lists of targeted sectors. This could certainly be a result of the selection biases inherent in each source. However, what we can conclude by looking at the target lists provided, for example, by Mandiant and Symantec, is that any significant sector of the economy may be the target of attacks. Also relevant is the observation that an organisation size is not a predictor for being attacked or not: organisations of any size, from small businesses to large corporations, have been attacked in the past. In our context, this observation has important consequences. From an organisation point a view, the results and recommendations that we provide in this report should be generally applicable. From a vendor perspective, this points to the need of providing tools and mechanisms that are amenable to widely different organisations, with large ranges of technical skills, human resources, and budget numbers. ## Sophistication Third, the Verizon report contains some preliminary data about the technical sophistication of attacks and, more precisely, it finds that a majority of the initial compromises are carried out with low difficulty techniques. While it is not clear if the same results hold when considering only targeted attacks (rather than looking at all kinds of attacks including opportunistic ones), this observation does match anecdotal experience from individual attacks, which often do not show particular sophistication, such as 0-day exploits or stolen digital certificates. The lesson learned from this data point could be that, while defending against sophisticated attacks is becoming increasingly necessary, one cannot discard traditional attack techniques. ## C.4 Case Studies In this section, we review a number of cases of targeted attacks. There exist many more accounts of attacks than we can report here; we decided to focus on those cases that show particular attack techniques and objectives, or that highlight the importance of C2 detection. More precisely, we include a set of cases that have been publicly disclosed: these attacks affected highprofile organisations and had egregious impact. We also include a set of cases that were provided by Lastline, a security company providing solutions to defend against advanced attacks. These cases, opportunely anonymised to protect the identity of the targeted organisations, are based on Lastline experience 'in the trenches', working with its customers, and draw attention to specific aspects of attacks or to problems with existing security approaches. ## Political espionage In January 2013, the New York Times publicly denounced that it had been subjected to targeted attacks for a period of four months. The attacks had been traced to Chinese hackers and were linked to an ongoing investigation at the journal that was highly critical of the Chinese political elite [91]. Further investigation of the attack methods and objectives linked the attack to a larger attack campaign targeting news and media companies, including Bloomberg News, which was compromised the previous year. An investigation of the incident found that the attack activity showed some of the traits typical of targeted attacks originating from China: attackers hopped through com- promised accounts at US Universities, as a way to hide their identity and make investigation more complex, and they were suspected of using spear phishing to gain the initial access to the Times' network. The following steps of the attack fully reveal the targeted nature of the incident: the attackers obtained the passwords for every Times employees and used them to gain access to the personal computers of 53 of them. Then, they deployed code to search for and steal documents kept by reporters on the current investigation on Chinese politicians. The Times article contains two pieces of information that are useful to illustrate the limitations of traditional security approaches that are based on the detection of the initial intrusion activity. The article comments that the spear phishing attack completely bypassed U F existing defences at the perimeter: 'Attackers no longer go after our firewall. They go after individuals.'. The Times also reported that of the 45 malware samples used in the course of the intrusion, only one was identified by the journal's anti-virus tool, whose vendor later issued a statement reading 'We encourage customers to be very aggressive in deploying solutions that offer a combined approach to security. Anti-virus software alone is not enough.' [122]. ## Military espionage In May 2013, the confidential version of a report prepared by the Defence Science Board for the Pentagon was leaked to the Washington Post [83]. The report claimed that the designs for many of the US advanced weapons systems had been compromised by Chinese hackers. The report claimed that the extensive theft had targeted the documentation for several missile systems, combat aircraft, and ships. While there are at the moment few details regarding how the intrusion actually occurred, it appears likely that the attacks targeted in particular large military contractors, which are involved in the design and production of the military systems. This case study is a cogent example of attacks aiming at obtaining valuable intellectual property: sources from the Washington Post claimed the stolen designs were the result of 15 years worth of research and development. ## Supply chain attacks In February 2013, the security vendor Bit9 reported that it had been compromised [67]. Bit9 produces a whitelisting product, which specifies the list of software that should be allowed to run in a network; anything else is considered to be dangerous. As a consequence of the intrusion, the attackers managed to steal the secret certificate that Bit9 uses to sign its software releases. The company also revealed that some if its customers had received malware that was digitally signed with the stolen certificate. Also in this case, the specific details ## The Command and Control Problem of the intrusion are not entirely clear. There are, however, several interesting aspects in this attack. First, attackers compromised Bit9 with the primary intent of acquiring the capability required to successfully attack upstream targets protected by the company's products. These are often called 'supply chain attacks' because they target one link of a chain that eventually leads to the organisation that is actually being targeted. to respond. However, a day later, connections to the same domain were observed: this time, the server was responding and was actually distributing the configuration file of a widespread financial malware. ## Manufacturing espionage Military secrets are hardly the only ones to be sought after by attackers. In early 2013, Lastline started monitoring the network of a manufacturer active in the field of fashion. During this monitoring, it determined that an internal server was infected: further investigation revealed an unexpected remote connection to that server originating from China. Among other data, the server contained all the designs of the manufacturer's new collection, which had not yet been officially presented. This episode shows that the data targeted by sophisticated attackers is not limited to highly confidential documents. Industrial espionage, in certain cases conducted with semi-official governmental blessing, has targeted a large spectrum of economic sectors [73]. ## Malicious infrastructure agility In mid 2013, a Lastline product was installed at a professional services firm. Lastline detected a successful drive-bydownload attack against one of the firm's employees. The drive-by had started when the employee visited a legitimate web site that had been compromised; the web site collects information relevant to the firm's business. Additional driveby-download attacks were detected short thereafter, originating again from web sites belonging to companies and organisations in the same business field as the firm. After one of the successful drive-bydownload attacks, connection attempts to a malicious domain were observed: the connections did not succeed because the destination server failed These events suggest that attackers run campaigns targeting specific business sectors (these could be considered less targeted versions of the watering hole attacks). Furthermore, the sudden activation of malicious domains shows that the malicious infrastructure used by attackers (exploit sites and C2 domains) can vary quite rapidly, thus requiring its constant and up-to-date monitoring. ## Built-in polymorphism This case study was collected after the installation of Lastline product in a University environment. Here, an administrative user received a malicious email and clicked on link contained therein twice in a short span of time. The link caused the download of a malware program. Interestingly, the binaries downloaded as a consequence of the user's actions were different: they not only had different hashes, but they also received different scores on VirusTotal, an online service that scans submitted binaries with over 40 anti-virus tools. This episode shows that the use of evasion techniques, polymorphism in this case, is a built-in component in many attacks: all the binaries downloaded in the course of the attack are (superficially) different. In addition, this case illustrates the importance of user security education: users are all too often a weak link in the security of an organisation. ## C.5 A New Focus There are several lessons that we can learn from the statistics on today's attacks and the case studies that we have presented. One is that preventing compromises may be difficult. We have seen that intrusions happen, even at security conscious organisations which possess considerable domain knowledge, expertise, and budget for security. We have also seen that there does not really appear to be a sector that is immune U F from attacks: modern businesses and organisations handle on a regular basis confidential data of various nature (personal, financial, R&amp;D) that is valuable to attackers. It should also be noted that the compromise may initiate outside of an organisation's perimeter (and away from the defences that the organisation has put in place), and then spread inside it as the infected device re-enters the perimeter. For example, with bringyour-own-device (BYOD) policies, organisations explicitly allow employees to bring on the workplace personallyowned and managed mobile devices, such as smartphones, and to use these devices to store privileged data and to interact with internal systems. As a consequence, it is clear that detecting that a compromise has occurred is critical . Ideally, the detection is performed as early as possible in the life cycle of the attack, to limit the damage that is suffered (for example, before confidential data is actually stolen). Unfortunately, we have seen, in particular with the Verizon data on breaches, that a significant number of infections go completely unnoticed for a long amount of time. C2 detection and disruption seems to offer a solution to this problem: by focusing on the C2 phase of an attack, one accepts that a device may become under control of attackers, may enter organisation's network, and may even acquire confidential data. However, the successful detection of C2 activity will preclude the attackers from performing the actual malicious, damaging activity of their actions, such as stealing confidential data. Of course, C2 detection should be seen as a complementary approach to the prevention of compromise, rather than a substitution for it: completely blocking an attacker, whenever possible, is preferable than having to deal with it after the fact. With this approach in mind, we review in the next sections the techniques that attackers use to set up C2 channels, and then the approaches that have been proposed to detect and disrupt such channels. ## C&amp;C Techniques As we have already discussed there is a constant battle between the attackers (malware writers) and the defenders (security professionals), wherein the defenders find a new way to detect and block attackers, and in response the attackers come up with new, often novel ways of performing their C&amp;C communication to evade the defenders. In this section we will discuss various techniques used by the attackers, including some in-depth case studies of actual malware that use them, and describe the general trends that the malware is exhibiting. The command and control system for most modern malware has three components. These are controller discovery, bot-controller communication protocol and the C&amp;C topology . In the controller discovery phase, the malware attempts to identify the location of the control system. The topology of the system may take many forms, falling into the broad categories of centralised and de-centralised. Finally, there is the actual method of communication from the malware to the controller. These three steps are often completely separated, and it is a common occurrence for malware to update one of these components while keeping the other components constant. This section is structured as follows: first, we will give a brief insight into the trends in malware command and control over the years. We will then describe the various techniques used by malware to perform the three actions as described above. ## D.1 Overview Over the years, the architecture of the C2 channel has evolved substantially, driven by an arms race with detection-response mechanisms. The network structure (or topology) of the C2 channel has an intimate relationship with its resilience to attack and error, as well as scalability to larger numbers. C2 designers desire scalability, robustness to take-down efforts, and stealth - anonymity against detection. ## C2 communication structure Early C2 designs followed a centralised U architecture such as using an IRC channel. In this design, administration and management tasks are simple and the architecture tolerates random losses of C2 nodes with little impact on efficiency. However, such a topology is fragile against targeted attacks - if the defenders can identify the channel and attack or take down the server, they effectively disable the C2 channel. Such fragile architectures were accompanied by poor software engineering practices. For instance, the address of this server was often hard-coded in to the malware and static in nature. However, the growing size of botnets, as well as the development of mechanisms that detect centralised commandand-control servers [10,12,40,4345,63,71,117,135], has motivated the design of decentralised peer-to-peer botnets. Several recently discovered botnets, such as Storm, Peacomm, and Conficker, have adopted the use of structured overlay networks [93,94,116]. These networks are a product of research into efficient communication structures and offer a number of benefits. Their lack of centralization means a botnet herder can join and control at any place, simplifying ability to evade discovery. The topologies themselves provide low delay any-toany communication and low control overhead to maintain the structure. Further, structured overlay mechanisms are designed to remain robust in the face of churn [47, 70], an important concern for botnets, where individual machines may be frequently disinfected or simply turned off for the night. Finally, structured overlay networks also have protection mechanisms against active attacks [16]. Fully decentralised topologies offer systematic resilience guarantees against targeted attacks on the C2 channel, yielding new forms of robustness. The vast power of peer-to-peer botnets from the use of resilient topologies comes at the cost of stealth; the unique structure can be also be used as a point of detection [82]. ## C2 communication traffic Relationship between traffic and structure. C2 evolution has also been driven by largescale defence efforts to F isolate C2 traffic based on its unique traffic characteristics. Defence efforts to block unused ports and application protocols simply encouraged C2 designers to tunnel their traffic through legitimate services, paving the way for the return of centralised architectures C2 channels has been observed in the wild using comments in HTML pages or even actual blog posts on public forums to communicate. Since traffic is routed through legitimate services, defenders are effectively denied the option of disabling the service, as doing so would hurt legitimate interests. Communication traffic-pattern anonymity. Other drivers of C2 techniques have been defence efforts arising from the application of statistical traffic analysis techniques. These range from simple anomaly detection techniques to sophisticated machine learning based detection. In response, C2 designers have adopted evasion techniques [87, 107] to hide traffic patterns from detectors. Such techniques mask the statistical characteristics of C2 traffic by embedding it within synthetic, encrypted, cover traffic. The adoption of such schemes only require minimal alterations to pre-existing architectures and can be adopted on a strap-on basis by other C2 operators. We can expect these techniques to mature quite well in the near future. Communication end-point anonymity. An interesting development is that C2 designers have adopted anonymous communication techniques within their architectures. Initial designs used simple anonymous proxies or stepping stones to route the traffic through a number of proxies to anonymise C2 traffic endpoints. More recently, C2 designers have started abusing systems designed for Internet privacy such as Tor, JAP , and anonymiser [30, 59]. End-point anonymity prevents defenders from isolating (and filtering) C2 hosts even if they can successfully detect traffic patterns. Communication unobservability. C2 techniques in the form of practical unobservable communications have also been developed. These are especially powerful as they offer full unobservability; the strongest possible anonymity guarantee, subsuming both ## C&amp;C Techniques end-point anonymity as well as trafficflow anonymity. Currently adopted techniques are based on the use of covert communication techniques. For instance, the application of probablistic information-hiding techniques such as image sharing behaviour on social networks [81]. Emerging trends include, the use of uncompromised DNS servers as transient stores of C2 payloads. Techniques to evade responses. The primary response mechanism against C2 channel is to isolate domain names and IP addresses related to C2 activity. In response, C2 architects have developed techniques inspired by fault-tolerance literature. This is characterised by the evolution of domain generation algorithms (DGAs), and fast-flux networks which can allow large numbers of IP addresses to be linked to a single domain. ## D.2 Communication structure ## Centralised architectures Early C2 designs were based on a centralised architecture where one or more servers are exclusively used to coordinate C2 communication. The classic design for command and control in malware is to make use of an Internet Relay Chat (IRC) server. IRC was developed in 1988, and is a protocol used for text chat over the internet. Its primary function is to provide 'channels', which are chat rooms allowing for group conversations (private user-to-user chat is also available but less common). Channels are hosted on servers, which in turn are part of IRC networks. While most channels are publicly accessible, it is possible to require authorisation to join a channel. User within a channel have varying levels of access (modes), which can define what that user can do within a channel. The channel itself has modes which define what each user mode can do, such as changing the channel topic, and other options regarding the channel (such as access authentication). All of this makes it a simple platform for malware communication. It provides a simple function for the attacker to deliver commands to the malware, and it's equally simple for the malware to transmit information, such as collected U data, back to the human controller. Centralised architectures are simple and easy to manage, and robust to the failure of large numbers of malware-infected computers. In 2000, researchers [3] famously showed that while centralised architectures are robust to random failure, they are fragile against strategic attacks; removing the high-centrality components of the communication structure disables the C2. Further, centralised C2 networks are not scalable. Supporting a large C2 network consisting of hundreds of thousands to millions of malware instances requires careful coordination amongst a large number of control servers, each servicing a few thousand or so malware instances. ## Decentralised architectures To counter the structural weaknesses and scalability limits of centralised architectures, many C2 designers are moving to decentralised or peer-topeer (P2P) architectures for command and control. The main design goals of these architectures are: scalability (nodes maintain a limited state and communication costs grow slower than the number of nodes), fault tolerance (requests can be routed around failed/ takedown nodes) and P2P nature (distributed architecture with no single point of failure and strong availability guarantees). In a P2P network, there is no central control server; instead every member of the network acts (or can act) as a server, thus providing a load balancing property. Further, decentralisation ensures large amounts of redundancy against targeted attacks, consequently in comparison to centralised C2, any takedown effort will need to attack a significantly larger percentage of the nodes to completely disable the C2 network. The use of decentralised C2 networks has heavily borrowed from P2P file sharing networks (used for both legal and illegal means). In a P2P network, each member communicates to a nonuniform number of other members or 'neighbours'. Nodes only communicate with their neighbours in the network, with different variants of P2P networks providing different methods for the routing of data around the network. P2P networks can either be unstructured F overlay networks ( Bittorrent, Gnutella, or Kazaa). Or, structured overlay networks such as CAN, Chord, Pastry, deBruijnbased options (Koorde, ODRI, Broose, D2B), Kautz, Accordion, Tapestry, Bamboo, and Kademilia. We have named a few but there are many other options, which indicates the substantive depth of the design possibilities. We will now take look at the typical operation of the Bittorrent network. To access a file on the network, the user downloads a tracker file, which contains a list of peers that hold some or all 'pieces' of the file. The user then directly connects to these peers, and downloads the pieces they have. Eventually, you will have the entire file. The more users who are involved in the 'seeding' (hosting) of file pieces, the faster the download speed. Obviously, currently the most common use for this technology is in the sharing of (often copyright) media files. The network can, though, provide an easy method for propagating information among a large number of users without the use of a central server. The typical situation for malware is that the malware will have a list of peers to which they are connected, and they will repeatedly check with these peers for new commands. The bot controller simply has to 'upload' the commands to a single (or group of) nodes (which can be anywhere in the network), and the command will eventually reach all nodes through a flooding mechanism. This has the additional advantage that there is no need for a link between the data and the uploader, as is the case with a centralised system. ## Case Study: Storm Storm is an good example of a botnet that uses a p2p network for its command and control. The Storm botnet, at its peak in 2007, comprised of anywhere between 1 and 50 million infected hosts. Storm propagates solely through the use of spam emails, which contain links to either websites which take advantage of browser exploits, or prompt the download of malicious software. One of the first actions the malware performs is to make sure that the system clock is correct. This is vital for communication. Storm makes use of OVER- NET, which is a Kademlia based distributed hast ## C&amp;C Techniques table (DHT) based p2p network. Each bot has an 128 bit DHT id, which is randomly generated. Routing is performed by computing the XOR distances of the IDs to the destination, node a which has a message for node d will forward to the peer (neighbour) with the closes id to d. Storm, like many p2p networks, uses a publish/subscribe style of communication. A node publishes information using an identifier generated from the contents of the information. Consumers can then subscribe to the information using the identifier. The bots compute identifiers to subscribe to using the day and a random number between 0 and 31. The controller can precompute these identifiers and publish information using them. The information published consists of a filename of the form ' *.mpg;size=* ', where represents * a 16 bit number. The malware converts this to an IP address and port number, at which point the malware performs a direct connection to talk to the controller directly. ## Social Networks Social networks now play a huge part in many peoples lives. The benefits that they bring to both businesses and end users are hard to ignore. In fact, Facebook, the largest social network, now has over 1.1 billion users, and is currently the second most visited website (www.alexa.com) in the world. The sheer volume of social network traffic, plus the ability to easily host information within a social network page for little to no cost, has made them a very attractive tool to malware creators. In this case, C2 channels are built as an overlay network over a social network, again both centralised and decentralised configurations are possible. Although social networks are largely based around a small number of highly well-connected central servers, it's not possible to simply block the OSN due to their immense popularity with legitimate users. Further, online social network (OSN) providers have invested significantly in computing infrastructure. OSNs feature worldwide availability and load balancing, thus mitigating the traditional scalability limits of centralised C2 channels. They host a rich variety of content enabling the U use of steganographic communication techniques, which we will discuss this in future sections of the report. There have already been numerous examples in the wild of malware that uses social networks (or similar sites) as part or all of the command and control system. One (possible) botnet that has been found is an unnamed piece of malware that receives its commands through tweets posted to a particular Twitter account [132]. It is unclear however if in this case this was a researcher testing a new toolkit for Twitter command and control rather than an actual botnet. An example found by Arbor Networks [85] also demonstrates a botnet using Twitter as part of it's C2 channel; in this case the twitter account posts base64 encoded URLs, which represent secondary C2 servers. The same behaviour is also found on identically named Jaiku and Tumblr profiles. They also found a botnet that uses a malicious application on the Google App Engine cloud hosting platform which also returns URLs to which the malware will then proceed to connect to [84]. A confirmed piece of highly targeted malware that is using a social network as part of its command and control is Taidoor. Taidoor attacks organisations that have links to Taiwan (hence the name), and security firm FireEye have found that the malware has been modified to host the actual malware binaries in a Yahoo blog post [129]. The malware is initially delivered by email end performs an exploit against Microsoft Office, and a downloader is installed. This downloader connects to a Yahoo blog post, which contains seemingly random data. The data is in fact the actual malware binary, contained between two markers and encrypted using the RC4 stream cipher, with the resulting cipher-text being base64 encoded. When decrypted, the data is a dll file containing the malware. The malware then connects directly to two C&amp;C servers. ## D.3 C2 communication traffic Communication pattern analysis. A key F feature of C2 channels that distinguishes them from other malicious activity is the fact that the individual malwareinfested hosts communicate with each other. This lets them carry out sophisticated coordinated activities, but it can also be used as a point of detection. Traffic analysis techniques can be used to detect communication patterns among bots, and how such patterns can be used for more effective botnet countermeasures, and tradeoffs between botnet performance, resilience, and stealth. Traffic analysis is an old field hence many of the techniques are applicable. We will review these in Section E. Consequently, C2 designers have adopted techniques to hide communication patterns. Traffic analysis resistance, is a much desired property by C2 designers. Anonymous communications technologies study the design of communication channels that are resistant to traffic analysis. For C2 designers, the ultimate goal is unobservable communications. The property of unobservability - the strongest form of communication anonymity - refers to the communication capability that a third party cannot distinguish between a communicating and non-communicating entity. For instance, by appearing indistinguishable from legitimate traffic, C2 activity will be effectively undetectable. There's a substantial amount of knowledge in the public domain on the topic on which C2 designers can build upon. We now briefly review the current state of adoption of anonymous communications technology by C2 designers. ## Tor Tor (originally TOR:The Onion Router) is a service used to provide anonymity over the internet. It is used by governments and the public alike (for example it is extremely popular with whistle-blowers), and even receives a large proportion of its funding from the US Department of Defence. The basic system works by relaying internet traffic through a number of nodes, and applies multiple levels of encryption/decryption to mutate the traffic after each hop. It is extremely difficult to identify the original sender and receiver of packets sent over the network. This security has also made it ## C&amp;C Techniques a target for malware coders, and there have been cases of malware that use the Tor network (and some of its extra features) to aid in command and control. To become a part of the Tor network, one simply has to install a simple piece of software. The machine can then act as a replay node for others, and make use of the Tor network. One of the more advanced features of Tor is the ability to set up Hidden Services. These allow a server to hide behind a proxy, keeping the actual identity of the server hidden from those who access it. Hidden services work by setting up 'Rendezvous' points. A rendezvous point is a node on the Tor network, whicis used as the entry point for the server. Traffic between the rendezvous point and the server is routed in the normal Tor fashion, providing anonymity. A rendezvous point is access using an '.onion' link. While few examples of actual bots have been identified that use Tor as part of their C&amp;C channel, there is growing evidence that this is occurring on a large scale. In late August/early September 2013 the Tor network experienced a large increase in the number of users [29]. The actual amount of traffic on exit nodes, however, only showed a minimal increase. This was eventually identified to be down to the SDC botnet [134]. The SDC botnet hosts its command and control server behind a Tor hidden service. The botnet, however, shows little activity, and is believed to simply be used for installing other malware. ## Case Study: Skynet Skynet is a moderately-sized ( ̃12000 machines) botnet based upon the Zeus family of malware. The interesting thing (apart from the usage of Tor) about Skynet is that its operator hosted an IAmA (Q&amp;A) session on Reddit 1. When a team of researchers [46] discovered an instance of the malware, they were able to use the information provided by the Reddit post, plus a small amount of reverse engineering, to provide an almost complete profile on the operation of the botnet. The malware is spread primarily through the Usenet file sharing network, and is primarily used for DDoS attacks, data U mining and Bitcoin mining. When the malware is installed onto a machine, the Tor client for Windows is also installed, and a Tor hidden service is set up for the machine itself. All C&amp;C communication is performed over a Tor SOCKS proxy running locally on the machine. The hidden service is opened on port 55080. The primary method of C&amp;C is an IRC server hosted behind a Tor hidden service. The server runs at 'uy5t7cus7dptkchs.onion' on port 16667. The controller issues com- mands to the malware through the IRC channel. These actions can include performing attacks and returning info on the host machines. The malware also includes a version of the Zeus malware family. Zeus is a very common banking trojan, with a primary goal of stealing personal financial details (for example credit card numbers and online banking passwords). Zeus provides a web- based C&amp;C server, which the controller has hidden behind a second Tor hidden service. By accessing the control server, the researchers were able to recover a XML file con- taining the current target websites. The final component of the malware performs Bitcoin mining. The malware includes the open source 'CGMiner' software used for Bitcoin mining, which connects to a number of Bitcoin mining proxy servers. Interestingly, seven IP addresses for proxy servers were found, of which two were active, but none were hidden by Tor. Due to the use of Tor, it is almost impossible to identify the actual location (and owner) of the command and control servers. Through responses on the Reddit post, plus the botnets concentration in central Europe (in particular the Netherlands and Germany) there is a strong chance that the operator is based in Germany. ## Unobservable C2 Communications Whereas systems such as Tor aim to provide anonymity through unlinkability (i.e. disguising who is talking to whom), unobservable communication methods aim to hide the fact that anyone is communicating altogether. Tor, and similar systems, are designed to provide F low-latency communications but this is often difficult to achieve when using unobservable communication methods, which often provide a higher-latency for of communication. While this is often deemed unacceptable for the user-base of Tor like systems where usability is a factor, it is not an issue for malware coders. The most common form of providing unobservable communications is through the use of steganography. 1 http://www.reddit.com/r/IAmA/ comments/sq7cy/iama\_a\_malware\_ coder\_ and\_botnet\_operator\_ama/ Steganography (Greek: 'concealed writing') is the art of writing messages in such a way that nobody, apart from the sender and receiver, suspects the existence of the message. Steganography is an art that has been used for thousands of years, and has been reinvigorated in the digital age. The main purpose of using steganography is that it can make the communication unobservable . There are two ways in which steganography can be used by malware to hide the command and control communications. The first is that the malware can make its communication protocol appear as another, and secondly it can embed itself within otherwise legitimate content online, such as images. Today most media types, including text, images and video, are capable of contain- ing hidden data in a number of ways. In the simplest cases, this can be achieved by adding extra metadata to files to store the required information, although this is easily discovered. The alternative, and more advanced, method is to change the actual file contents itself. For example, in a image file the least significant bit of each pixel in the image can store the data. This will allow a relatively large amount of data to be stored (directly corresponding to the size of the image), and to the untrained eye the image will appear to be unchanged. ## Unobservable C2 Communications In a audio file, the data can be hidden ## C&amp;C Techniques by introducing an echo, with the amount of delay indicating the data (the delay will be in the 10s of milliseconds so unobservable to the untrained ear). There are numerous algorithms for steganography, providing differing levels of unobservability and modification resistance (the classic way to remove image steganography, for example, is to resize or slightly distort the image). Currently, there are very few examples of steganography being used by malware in the wild. It is expected, however, that the amount of malware making use of steganography will increase as command and control detection methods become more advanced and difficult to circumvent using traditional means. Therefore, this section will mainly deal with proposed designs for steganography-based malware command and control. One example of real world malware using a form of steganography is the Trojan.Downbot Trojan [137]. Trojan. Downbotspreads through targeted emails, and the first thing it does is to access an attacker-controlled website, for which the address is hardcoded into the malware itself. The website is made to look like a code tutorial site, and to anyone who happens to access them legitimately the website will appear completely harmless. If the page source is analysed, however, it can be found that the source contains specially formatted and encoded comments in HTML files, or extra bytes in image files. These comments and images contain the command and control commands for the malware, including a command for the malware to contact a specific IP/port combination (to upload collected data). This technique is effective as all the command and control communication is performed over HTTP and would appear in logs to be normal web browsing behaviour, and to block all HTTP traffic would cause usability issues for legitimate users. ## Case Study: Stegobot Stegobot is a proposed design for a decentralised botnet with an unobservable C2 protocol based upon steganography. The system utilises the existing user behaviour of the uploading of digital images to a social network, and the U subsequent broadcast of these images to all of the users connections. The social network that is the focus of this paper is Facebook. The typical activity of Facebook is that a user uploads an image through the web interface, and while they are browsing the 'news feed', the recently uploaded images of their connections are downloaded to a temporary folder on the local machine. The malware operates as a proxy - when an image is uploaded data is inserted into it before it is uploaded. The malware also attempts to extract data from the temporarily downloaded images, storing any recovered information. The malware is designed for information collection, in particular bank details and passwords. Commands are issued by the controller at some point in the network (note: this can be from any of the bots with with equal probability), and the command is then propagated through the use of flooding. Collected data is returned to the controller in the same way. The system uses a steganography algorithm that is hard to detect automatically (YASS), so provides reliable unobservability. The C2 system creates no extra web traffic as it uses exclusively the normal browsing habits of the affected users. When simulated on a social network of 7200 nodes, the bot controller can receive up to 86.13MB of data per month, which may seem like a small amount, but can represent many thousands of bank details and passwords. ## D.4 Evasion ## DNS The Domain Name Service (DNS) is a naming system for computers on the Internet. It's a basic piece of infrastructure that translates humanrelatable computer resource names to IP addresses which can be used to route information. Attackers extensively use it to build and operate the C2 channel. ## DNS Fast Flux One of the major positive points for malware coders is that the IP addresses F returned by an DNS request do not need to be static. This property is used by legitimate services through the use of Content Delivery Networks (CDNs). CDNs are used by large-scale web services (such as Amazon and primary purpose being to enable the use It is also useful to aid in load balancing will contain multiple IP addresses, all of which are valid. The user will then connect to one of these. The returned IP addresses will typically have a TTL measured in hours or days. This is so that the effects of DNS caching can be felt; if the TTL is too short effective caching of results cannot be performed. Repeat request for the same domain from the same location will in general return the same set of IP addresses, possibly with some differences if the Facebook) for a number of purposes, the of multiple servers around the world, so a user can access content closest to them. and provides extra redundancy in case of failure. In a CDN, a typical DNS response CDN needs to load balance. An variation on a CDN is a Fast-Flux Service Network (FFSN) [51], in which the command and control server is hidden behind a wall of compromised machines, which are often part of a botnet. Each of these compromised hosts acts as a sort of 'proxy' to the C&amp;C server; each time they receive a request for the server they will forward it, and will return replies to the original requester. Each of these hosts will have a unique IP address, which can be used to access the server. For example, an FFSN comprising of 10,000 compromised machines provides up to 10,000 IP addresses that can all point to a single server. The FFSN operates as follows. The domain of the server is public. A host wishing to contact the server makes a DNS request for the domain, and is returned a set of IP addresses, and then connects to one of them. This sounds familiar doesn't it? This part of a FFSN is almost identical to a CDN except for a few small differences. First, the returned IP addresses returned will not be for the actual controller(s), rather they will point to compromised machines within the flux network. Second, the returned IP addresses will have a very short TTL, measured in minutes (rather than the days as is the case in a CDN). A second request will in most cases return a ## C&amp;C Techniques completely different set of IP addresses. This is the fast-flux behaviour; the malware controller has no control over which of his compromised hosts are online so the returned IP addresses needs to change frequently to increase the risk that a hot is available. ## DNS as a Medium It is also possible to use the DNS system as a communication channel rather than just as a way to set up the channel. One example of this being used in the wild is Feederbot [28]. Feederbot makes use of the fact that the RDATA field in a DNS response can be of multiple types, not just an IP address. One of these is TXT, which as the name suggests means actual text can be transmitted. Feederbot uses TXT replies to transmit data. The commands are encrypted and the encoded into base64 (which resembles random text). The remainder of the DNS response packet uses valid syntax, making detection difficult. While Feederbot is optimised for oneway command and control, in most cases the malware will need to transmit information back to its controller. Seth Bromberger, working for the US Department of Energy, proposed a system for exfiltrating data from organisations by making use of DNS requests. In this case, the domain name that is being queried contains the data to be transmitted. The attack works as follows. The attacker sets up a domain name (evil.com) and makes sure that he has control of its authoritative nameserver (nameserver.evil.com) . Say, for example, an infected hosts wishes to transmit the data 'Super Secret Stuff' back to its controller. It will simply make a DNS request for evil.com, pre-pending the data to the domain (so the request will be for super.secret.stuff.evil.com . The data can be encrypted before pre-pending to prevent the contents of the data being identified. When the request reaches the attacker controlled nameserver (nameserver.evil.com), the attacker can simply read off the data. The attacker can also send commands back to the malware in the response, either by using the method of Feederbot, or by, for example, using specific IP responses to indicate a particular task to be performed. A similar approach U is proposed by Xu et al [133], who extend this idea to also include traffic patterns for the communication to avoid detection, for example by only creating DNS queries when the host machine is making them. A second example of malware that makes use of the TXT record is the W32.Morto worm [79]. In this case, DNS requests to harcoded domains return encrypted binary signatures and IP addresses in TXT responses. The malware then downloads a binary from the included IP address. It is also rather peculiar in that there are no A records for the domains, only TXT records, indicating that the domains are used for the sole purpose of controlling the worm. ## Domain Generation Algorithms (DGA) One method of providing resilience to both detection and reverse engineering is the use of Domain Generation Algorithms (DGAs). The function of a DGA is to allow the malware to programmatically generate domains for which it attempts to access a command and control server. It is then up to the attacker to ensure he controls the domains that will be generated. A DGA will often be reliant on factors such as the current time or date, and the result should be consistent across multiple hosts. The malware will repeatedly run the algorithm to generate a domain and attempt to connect. The attacker can also run the algorithm, in advance, and register the domains when they are required to use as a temporary command and control server. The main benefit to an attacker of a DGA is that they allow for a large amount of redundancy in the command and control server. The controller, at any one time, is short lived and so if one is taken down, a new one will be available in little time. For example, the Conficker malware will generate 250 domain names every three hours, based upon the current UTC date [94], The same domains are generated every three hours (8 times per day). The malware will do an lookup on every generated domain, and will attempt to contact every domain that has an assigned IP address to download binaries. F ## Case Study: Torpig Torpig is a botnet that is designed to steal personal information. In 2009, a team of researchers were able to take control of the botnet for a period of ten days, in which time they were able to document the operations of the botnet in its entirety [114, 115]. One of the key points of the Torpig botnet is that it makes use of a domain generation algorithm. Each bot independently uses a DGA to generate a set of domains based upon the current time. They then attempt to connect to each of these in turn, until one succeeds (i.e., the domain resolves to an IP address and the server replies with a valid response). The botmaster also computes the domains and registers them, usually with less than honest domain registrars, before they are generated, with the goal of getting at least one online. (The researchers were able to take control by beating the botmaster to it and registering the domains, effectively sinkholing the botnet). ## Future: Protocol Mimicking One area of research that has grown recently is the area of protocol mimicking. The idea is to hide certain, noticeable communications by making them seem like they belong to a different protocol. The main area of focus on this so far is in obfuscating Tor traffic. In many cases it can be dangerous to use Tor, and it exhibits very noticeable communication patterns. There are a number of systems that attempt to make Tor traffic appear as Skype traffic. As Skype is a widely used, low-latency and high bandwidth system, it is ideal to emulate. SkypeMorph [77], for example, attempts to make Tor traffic appear as a Skype video call. Both the client and the bridge node run the Skype client on a high numbered UDP port, and the client sends a Skype text message to the bridge containing its IP , UDP port and public key. The bridge replies with the same information. The client then starts a video call to the bridge, which it does not answer. Instead, the call is dropped and instead the encrypted data is sent ## C&amp;C Techniques over UDP between the ports opened for Skype. Once data communication starts, Skype is exited on both the client and bridge. A slightly different approach is taken by StegoTorus [131]. In this system, Skype is not actually used, instead entirely new traffic is created that follows the traffic pattern from a previously collected Skype network trace. Packets contain simulated headers that match realistic Skype headers. The system also uses a similar approach with HTTP by generating fake HTTP requests from clients, and fake HTTP responses from the server to transmit data (which appear as normal HTTP browsing). The HTTP requests are replays based upon previously collected traces, with header information replaced with the data to be transmitted. The same approach is used for the responses from the server, except the data is hidden within the returned content (such as PDF and JavaScript files). A third, completely different system is CensorSpoofer [130]. This system, designed for obfuscated web browsing, decouples the upstream and downstream channels. HTTP requests are sent to the server over a low capacity channel such as email or instant messaging. The server responds to the client by mimicking UDP-based VoIP traffic, by mimicking the traffic from a dummy P2P host, more specifically SIPbased VoIP . All three of these approaches were deemed broken by Houmansadr et al. [53], who proved that all three systems are detectable due to their lack of complete protocol emulation. All three systems do not fully emulate all aspects (for example, error handling) of the protocol that they are attempting to hide as, allowing for detection by comparing the system traffic to legitimate traffic. While this has debunked these three systems, there is ongoing work to make systems like these less detectable. Even though this approach has not been seen in malware yet, it is fully expected that malware will start to take this approach in the near future. At the simplest level, malware that makes use of social U networks is starting to adopt this behaviour by mimicking HTTP traffic. A 2013 report from Symantec [121] details an targeted attack against a major internet hosting provider in which malware was installed on linux servers which opened a backdoor. The backdoor operated as a network monitor which scanned all traffic entering the system over SSH (and other protocols). The monitor looked for a certain sequence of characters, namely ':!;'. If this flag was seen, the malware extracted encrypted and encoded data which followed. The data could be embedded in any incoming traffic, making it very difficult to detect. ## Future: Namecoin Another further development that is beginning to appear in the wild is the use of the Namecoin service. Namecoin is related to Bitcoin, and provides a decentralised method to register and control domain names. Domains that belong to the Namecoin service use the '.bit' top-level domain. The advantage to a malicious user is that is provides the means to anonymously purchase a domain outside the control of any international body. McCardle et al [75] have found malware that is using this service in the wild, and it is expected that ti will become more widespread. ## Future: Esoteric C&amp;C Channels It is also expected that attacker will make use of further unusual channels for command and control in order to evade controls. A common control is to provide an 'air gap' around a machine - i.e. the machine is physically disconnected from any other machine, including the internet. In the perfect situation, this would be a laptop disconnected from the power supply (data can be transmitted through power cabling, a method that is used in the consumer 'Powerline' network adapters). Recently, however, Hanspach and Goetz [49] have proposed a design for malware that can operate even in the face of an air gap. The proposed channel F is to make use of the microphones and speakers found in most laptops in order to transmit data between machines using inaudible frequencies. Using this channel, a data rate of approximately 20bit/s up to a range of 19.7m can be achieved. By extending the system into a mesh network, multi-hop communication can be achieved. While 20bits/s seems low at first, it is more than enough to transmit small amounts of data such as passwords, banking details or memory dumps. ## D.5 Future Trends As malware writers attempt to make their malware more resilient to take-down attempts and detection, there are a number of trends that we can expect in the near future. First, the use of decentralised malware will increase. This will be both down to the additional redundancy provided by a decentralised network, and also the scalability provided by such systems, as it is also expected that botnets will continue to increase in size. We expect that the malware designers will start to use resilient network designs offered by scientific literature. Second, the use of anonymity services will also increase. As it is harder to avoid detection, and it is getting easier for authorities to locate malware operators, the operators will increasingly want to minimise the risk that they are identified. Services such as Tor will therefore become more widespread. Finally, although in the wild it is currently extremely rare to find examples, there is a high probability that techniques involving steganography will become more widespread. This will allow the malware to use legitimate services to transmit information, i.e. by hiding in plain sight. This will vastly reduce the effectiveness of most current detection methods. ## C&amp;C Detection Given the range of C2 design techniques, there is much interest in the design of techniques to localise C2 communication traffic by exploiting its special nature. Detection techniques can be used to carry out such analysis effectively on large scale networks to engage with malicious network activity. In recent years, a number of new techniques have been proposed to mine complex traffic data in order to support correlation and fusion using innovations from the fields of machine learning, semantic analysis, information theory, and traffic analysis. C&amp;C detection falls broadly into two categories: signature-based and nonsignature based. In signature-based detection, the detection algorithms are designed to look for known patterns of behaviour collected from malware samples (or 'signatures'). These algorithms are often good at detecting the C&amp;C of particular malware, but not so good at detecting new malware. Host-based anti virus systems usually fall into this category. Non-signature based algorithms instead look for anomalies compared to the norm. They are often much more adaptable to new variants of malware, but may not perform as well against known malware. Further to this, there are three different targets for detection, each requiring differing approaches for detection. These are infected hosts, command servers and the communication protocol. There are two primary measures of the success of a C&amp;C detection, true positive rate(TP) and false positive rate (FP). The true positive rate measures the percentage of malicious samples that are labelled correctly as malware, while the false positive rate measures the number of legitimate samples that are incorrectly labelled as malware. ## E.1 Measurement and Data Collection When detecting malware C&amp;C, the selection of which data to collect and analyse is extremely important. For example, varying detection methods require different levels of detail in the data. As networks scale, it will get increasingly harder to store all traffic - a requirement of most enterprise C2 detection techniques. Thus, if C2 traffic U traces go unrecorded, then detection systems cannot work. Current measurement techniques have addressed scalability limitations of data collection by developing measurement architectures for aggregation and sampling. However they do so without addressing evasion resilience requirements. Also, little attention has been paid to measurement control mechanisms - tuning measurement in response to C2 evasion. ## E.2 Scalable measurement Traffic monitoring is performed by routers, commonly using Netflow [17] feature or the sFlow feature. Alternatively, standalone measurement devices [25] observing traffic via network mirroring devices or splitters (optical or electrical) are more flexible than in-router methods. In both cases, traffic traces are exported to collectors which store the traces. Enterprise networks carrying a few tens of terabytes a day, resulting in tens of giga- bytes of flow records are currently manageable as all records can be collected. However, the growth in network speeds might change this in the future. Additionally, C2 designers can attack the measurement system to evade detection. For instance, by flooding the finite-storage data collectors. Network defenders would thus be forced to switch to sampling network traffic as storage of complete traffic flow records could be impossible under conditions of flooding or network congestion. In the case of ISPs, the volume of traffic flow records is immense. A tier-1 ISP carries several tens petabytes of user traffic per day [1], resulting in hundreds of terabytes of flow records. Even with low storage and transmission costs, storing entire traffic traces beyond a few days is not feasible for ISP traffic while storing the entire traffic including packet data is outright impossible. The volume of traffic on ISP networks presents a challenge which requires collectors to summarise trace data. This can be done either via summarisation techniques or via sampling techniques. Unlike high-level summaries produced by summarisation techniques, sampling techniques produce fine-grained traces that are representative of complete network traffic data. Sampling F techniques can support the creation of arbitrary sub-aggregates to support detection techniques that need not be specified at the time that sampling takes place. The challenge is to achieve the following requirements: 1. Fairness: yield accurate estimates about traffic based on the samples 2. Confirm to the sampling budget - the maximum number of samples to be gathered from data arriving within a specified time period. 3. Timeliness: provide samples in a timely manner to detection mechanisms. Fairness is an important criteria. If the fairness guarantees are weak or non-existent, then the adversary can exploit weaknesses in the sampling algorithm. This can result in the C2 traffic evading the monitoring system, as a consequence detection would fail. In the rest of this section section, we will briefly outline the main methods of data collection that are used by the detection methods discussed later. ## NetFlow NetFlow is a network protocol for collecting IP traffic information. Developed by Cisco, NetFlow is used to collect and monitor network traffic flows at the router level. It is the current industry standard for traffic monitoring due to its low overhead but high level of detail. NetFlow data represents 'flows' of traffic. A flow is defined by Cisco to represent a unidirectional sequence of packets between a single sourcedestination pair. As an example, NetFlow data could consist of the following: - · Source IP - · Destination IP - · Source Port - · Destination Port - · Protocol (e.g. TCP , UDP) There are numerous other traffic flow features that can also be stored, including timestamps, byte count, and headers. One of the key points, however, is that the actual payload data is not stored. This is due to the fact that the storage requirements would increase dramatically if all data is stored as well (if you imagine a 1Gbps router logging for just 1 day would create 7.2Tb of data to ## C&amp;C Detection (E) store and process!). ## Honeynets/Malware Traps Honeynets and malware traps are essentially bait and traps for malware in the wild. A honeynet is typically made up of a number of honeypot nodes, which are machines that run vulnerable (un-patched) software with a goal of becoming infected with malware. The infected machines can then be used to profile malware through wither automatic or human means. This data is one if the primary sources of signatures for signature-based detection methods. Honeynet nodes do not have to be a single machine. It is possible, through the use of virtual machines, to run large volumes of honeynet nodes on a relatively small amount of hardware. It is important to note that often the malware will be prevented from performing illegal activities (DDoS attacks etc) while under the researchers control. Honeypot techniques have been widely used by researchers. Cooke et al. [22] conducted several studies of botnet propagation and dynamics using Honeypots; Barford and Yegneswaran [9] collected bot samples and carried out a detailed study on the source code of several families; finally, Freiling et al. [38] and Rajab et al. [99] carried out measurement studies using Honeypots. Collins et al. [21] present a novel botnet detection approach based on the tendency of unclean networks to contain compromised hosts for extended periods of time and hence acting as a natural Honeypot for various botnets. However Honeypot-based approaches are limited by their ability to attract botnets that depend on human action for an infection to take place, an increasingly popular aspect of the attack vector [80]. ## Sandboxes A slight variant on a honeynet is a malware sandbox. In this instance, malware is directly installed on a machine and the activities analysed. The main difference with a honeynet, however, is that the owner will also interact with the malware (for example, by mimicking command and control servers). This allows the researcher U to gain a much bigger picture of the malware's operation under different situations. ## Reverse Engineering Perhaps the most labour intensive, reverse engineering is probably the most useful tool in learning about the command and control systems of malware. Many of the examples of command and control systems discussed in the previous section were discovered through reverse engineering. To reverse engineer malware, the researcher will analyse the actual malware binary, and attempt to recover the source code. This can give valuable insights into the operation of the malware, and can even give vital information such as hardcoded C&amp;C server addresses and encryption keys. The main issue is that it can take a very long time to completely reverse engineer a piece of malware (and in some cases it may not be possible at all), and it is a process that is extremely difficult to automate. ## E.3 Signature Based Methods In signature-based detection methods, malware C&amp;C is detected by looking for known patterns of behaviour, or 'Signatures'. Signatures are generated for known malware samples, and then new traffic is compared to these signatures. If the new traffic matches a signature, then the traffic is classed as C2 traffic. Signatures are generated by analysing confirmed C2 traffic collected from various sources. The main sources are honeynets and sandboxes. Malware is run in controlled conditions, and its activity logged. What is logged depends on the detection algorithm being used, but almost every aspect of the malware's behaviour can be included in a signature. Some systems, for example, solely base signatures upon the payload data of packets, while others can cover entire flows and the timings of packets. It is also not the case that one piece of malware will be represented by a single signature, and vice versa. It is often the case that a single malware sample F will generate multiple signatures as the conditions on a host machine can vary, which will affect the command and control activity. Conversely, a signature may represent multiple pieces of malware that exhibit very similar behaviour. ## Communication Detection As we have seen, many malware variants have very particular protocols when it comes to communication. These are often noticeably different to legitimate traffic, both in packet contents and in the behaviour of the communications. This makes signature based detection methods very good for detecting known variants of malware. Many different pieces of malware may also be based upon a common component, meaning that a single signature can be used to detect multiple pieces of similar malware. One possibility for this kind of detection is to produce signatures based upon the contents of packets. It is often the case that packets of data involved in the C&amp;C of malware will be almost identical across multiple hosts. Even though some malware familes use encryption in their communications, that encryption is usually a simple, lightweight algorithm (as the encryption is often for obscurity rather than security), so their are similarities among different ciphertexts. For example, in the work of Rieck et al [103], in which n-gram based signatures are generated for the payloads of malware that is run under controlled conditions in a sandbox. Signatures are also generated for legitimate traffic, and with this method the system can achieve detection rates of close to 95%, with a false positive rate of close to zero when running on a network gateway. Encryption can make the detection of malware traffic much more difficult, especially if the system uses widespread protocols such as HTTP . One approach is then to attempt to decrypt all packets and then perform signature detection on the decrypted contents, as is done by Rossow et al [104]. They take advantage of the fact that in many cases the encryption used is very simple, and often the key for encryption is hardcoded into the malware binary. They keys are fetched by reverse engineering, and then the payloads can be decrypted, ## C&amp;C Detection ans signature-based detection applied. The obvious down- side to this method is that it requires the labour intensive reverse engineeing step. Further to this, Rafique et al. [102] proposed a system for large-scale automatic signature generation. The system uses network traces collected from sandboxes and produces signatures for groups of similar malware, covering numerous protocols. This system is able to identify numerous malware example with a high rate, and experiences a low false positive rate due to the specificness of the signatures generated. The signatures are designed to be exported to intrusion detection systems such as Snort for on-line detection. ## Spam Detection There have also been attempts at performing spam detection based upon the method that the spam email was sent, which is quite often through malware. The work of Stringhini et al [118] utilises the fact that many different mail clients, including malware, introduce slight variations into the standard SMTP protocol. They use this to produce 'dialects', which are signatures for each mail client that can represent these variations. Dialects are collected for known sources of spam, including malware, and also for legitimate mail services. It is then a simple case of matching incoming emails to a dialect to make the decision of if the email is spam. In a further piece of work from the same authors [119], they propose a different approach ion BotMagnifier. This system first clusters spam messages according to their content, and then measures the source and destination IP addresses to match clusters to known botnets. This allows for both the enumeration of known botnets, and the discovery of new ones. It is of course the case that many spam campaigns could originate from the same botnet, so clusters that share source IPs are liked to the same botnet. It also is observed that a particular botnet will often target a particular set of destinations, such as one particular country, which is used to add precision. U ## Server Detection Nelms et al. [86] propose ExecScent, a system for identifying malicious domains within network traffic. The system works by creating network traces from known malware samples to create signatures, that can then be compared with network traffic. The sig- natures are not just based upon the domain names, but also the full HTTP requests associated with them. How this system is unique, however, is that the signatures are tailored to the network that they will be used on based upon the background network traffic. This step is extremely useful at reducing the level of false positives by exploiting the fact that different networks will exhibit different browsing behaviour (for example a car manufacturer is unlikely to visit the same websites as a hospital). ## E.4 Non-Signature Based Methods The main disadvantage of using a signature based detection method is that these detection systems are usually not very effective at detecting new, or updated, malware. Every time a new piece of malware is discovered, or an exiting piece updates itself, the signatures have to be recreated. If the new variant is not discovered, then it is unlikely to be detected by these systems. This is where non-signature based detection comes in. In these systems, the algorithms look for behaviour that is not expected, rather than looking for particular known behaviour, or looking for a specific type of behaviour without the use of signatures. ## Server Detection: DNS There has been a large amount of work that attempts to provide a detection mechanism that can identify domains associated with malware at the DNS level. As we have seen, DNS is used by a large amount of malware that makes use of a centralised command and control structure. One proposed detection method is to make use of the reputation of domain names to decide if they are F related to malicious activities [6]. In this system (Notos), domains are clustered in two ways. First, they are clustered according to the IP addresses associated with them. Secondly, they are clustered according to similarities in the syntactic structure of the domain names themselves. These clusters are then classified as malicious or not based upon a collection of whitelists and blacklists: domains in a cluster that contains blacklist domains are likely to be malicious themselves. This system is run on local DNS servers and can achieve a true positive rate of 96% and an low false positive rate. In a further piece of work from the same authors as Notos, the idea is vastly expanded to use the global view of the upper DNS hierarchy. In this new system (Kopis) [7], a classifier is built that, instead of looking at the domains' IP and name, looks at the hosts that make the DNS requests. They leverage the fact that malwarerelated domains are likely to have an inconsistent, varied pool of requesting hosts, compared to a legitimate domain which will be much more consistent. They also look at the locations of the requesters: requesters inside large networks are given higher weighting as a large network is more likely to contain infected machines. When tested, this system was actually able to identify a new botnet based in China, which was later removed from the internet. DNS is also used in another way by malware controllers that we have not yet mentioned. One feature of DNS is DNS blacklists (DNSBL). These are used by spam filters to block emails from known malicious IPS. The malware controllers will often query these blacklists for IPs under their control to test their own networks [101]. The behaviour of a botmaster performing DNS lookups for his own hosts will differ from legitimate use of DNSBLs. For example, a malicious host performing DNS lookups on behalf of the controller will perform lots of queries, but will not be queried itself, while a legitimate service will receive incoming queries. This behaviour is relatively easy to detect by simply looking for queries that exhibit this behaviour. Paxson et al [89] attempt to provide a detection mechanism that leverages the amount of information transmitted ## C&amp;C Detection over a DNS channel in order to detect suspicious flows. The system allows for a upper bound to be set, any DNS flow that exceeds this barrier is flagged for inspection. The upper bound can be circumvented by limiting flows, but this has an impact the amount of data exfiltration/command issuing that can occur. The system looks primarily at data included within domain names, but also looks at interquery timings and DNS packet field values, both of which can provide low capacity channels.Several other works seek to exploit DNS usage patterns. Dagon et al. [26] studied the propagation rates of malware released at different times by redirecting DNS traffic for bot domain names. Their use of DNS sinkholes is useful in measuring new deployments of a known botnet. However, this approach requires a priori knowledge of botnet domain names and negotiations with DNS operators and hence does not target scaling to networks where a botnet can simply change domain names, have a large pool of C&amp;C IP addresses and change the domain name generation algorithm by remotely patching the bot. DNS blacklists and phishing blacklists [110], while initially effective have are becoming increasingly ineffective [100] owing to the agility of the attackers. Much more recently, Villamar et al. [128] applied Bayesian methods to isolate centralised botnets that use fast-flux to counter DNS blacklists, based on the similarity of their DNS traffic with a given corpus of known DNS botnet traces. ## Fast Flux As we recall, in a fast flux network the command and control server is hidden behind a proxy of numerous compromised hosts. Performing DNS queries on the domain of the server will return a large, and constantly changing, set of IP addresses. As you may expect, this type of behaviour is relatively easy to detect. As we discussed, there are some differences between fast-flux service networks (FFSNs) and content delivery networks (CDNs) [51]. To detect a FFSN is a simple process, due to the two characteristics of an FFSN: short TTL values in DNS responses and nonoverlapping DNS responses. If DNS U traffic is monitored, then by simply looking for DNS responses for domains that meet this criteria will indicate a possible FFSN. This can also be done manually for individual suspect domains by generating multiple DNS queries. This will give two pieces of information. The main result is that domains can be identified as being behind FFSNs and therefore added to blacklists. Secondly, the returned IP addresses will be those of likely compromised machines, which are quite possibly part of a botnet. This list can be compared with internal networks to identify and mitigate compromised machines, and also enumerate the botnet. It is also possible to automatically detect which domains belong to the same FFSN. The work or Perdisci et al [90] applies clustering to domains so they are grouped according to overlap in the returned IP addresses. By then comparing the clusters to previously as flux or non-flux, revealing domains labelled data, they can then be classified that make use of the same network. ## Host Detection An interesting system for host detection is BotHunter [44]. BotHunter is a system for identifying compromised hosts based upon the actions they perform, more specifically the pattern of infection and initial connection to a command and control server. There are 5 steps to this patter: inbound scan, inbound exploit, binary download, outbound C&amp;C communication and outbound infection scanning (for propagation). These steps are identified as being an good generalisation of the typical infection model for a botnet (although some botnets will obviously leave out or add extra steps). The system works by correlating IDS alerts and the payloads of request packets. These are used to identify hosts performing the 5 steps, and if a host is found to perform certain combinations of these within a time period, they are identified as a possible bot. The timer is used as legitimate services may give the appearance of performing one of these steps. There are two conditions for a host to be labelled as compromised. The first is that it has been the victim of an inbound exploit, and has at least one occurrence F of outward C&amp;C communication or propagation. The second is that it has at least two distinct signs of outward bot coordination or attack propagation. This system can achieve 95% detection rates, and low false positive rates. The downside, however, is that as it is heavily reliant on detecting the behaviour of existing botnets it can be evaded by slowing down the infection process to fall outside the time limits. BotHunter is available as an open source product. The BotHunter authors produced a further system, BotMiner [43], that detects infected hosts without previous knowledge of botnets. In this system, bots are identified by clustering hosts that exhibit similar communication and (possible) malicious activities. The clustering allows hosts to be groups according to the botnet that they belong to as hosts within the same botnet will have similar communication patterns, and will usually perfrom the same activities at the same time (such as a DDoS attack). Finally, there are also schemes that combine network and host-based approaches. The work of Stinson et al. [112] attempts to discriminate between locally-initiated versus remotelyinitiated actions by tracking data arriving over the network being used as system call arguments using taint tracking methods. Following a similar approach, Gummadi et al. [48] whitelist application traffic by identifying and attesting humangenerated traffic from a host which allows an application server to selectively respond to service requests. Finally, John et al. [61] present a technique to defend against spam botnets by automating the generation of spam feeds by directing an incoming spam feed into a Honeynet, then downloading bots spreading through those messages and then using the outbound spam generated to create a better feed. ## Graph-based approaches Several works [20, 56, 57, 60, 138] have previously applied graph analysis to detect botnets. The technique of Collins and Reiter [20] detects anomalies induced in a graph of protocol specific flows by a botnet control traffic. They suggest that a botnet can be detected ## C&amp;C Detection based on the observation that an attacker will increase the number of connected graph components due to a sudden growth of edges between unlikely neighbouring nodes. While it depends on being able to accurately model valid network growth, this is a powerful approach because it avoids depending on protocol semantics or packet statistics. However this work only makes minimal use of spatial relationship information. Additionally, the need for historical record keeping makes it challenging in scenarios where the victim network is already infected when it seeks help and hasn't stored past traffic data, while our scheme can be used to detect pre-existing botnets as well. Illiofotou et al. [56,57] also exploit dynamicity of traffic graphs to classify network flows in order to detect P2P networks. It uses static (spatial) and dynamic (temporal) metrics centred on node and edge level metrics in addition to the largestconnected-component-size as a graph level metric. Our scheme however starts from first principles (searching for expanders) and uses the full extent of spatial relationships to discover P2P graphs including the joint degree distribution and the joint-joint degree distribution and so on. Of the many botnet detection and mitigation techniques mentioned above, most are rather ad hoc and only apply to specific scenarios of centralised botnets such as IRC/HTTP/FTP botnets, although studies [42] indicate that the centralised model is giving way to the P2P model. Of the techniques that do address P2P botnets, detection is again dependent on specifics regarding control traffic ports, network behaviour of certain types of botnets, reverse engineering botnet protocols and so on, which limits the applicability of these techniques. Generic schemes such as U BotMiner [43] and TAMD [135] using behaviour based clustering are better off but need access to extensive flow information which can have legal and privacy implications. It is also important to think about possible defences that botmasters can apply, the cost of these defences and how they might affect the efficiency of detection. Shear and Nicol [87, 107] describe schemes to mask the statistical characteristics of real traffic by embedding it in synthetic, encrypted, cover traffic. The adoption of such schemes will only require minimal alterations to existing botnet architectures but can effectively defend against detection schemes that depend on packet level statistics including BotMiner and TAMD. ## E.5 Host Detection An initial defence against botnets is to prevent systems from being infected in the first place. Anti-virus software, firewalls, filesystem intrusion detection systems, and vulnerability patches help, but completely preventing infection is very difficult task. Malware authors use encryption [136] and polymorphism [123] among other obfuscation techniques [123] to thwart static analysis based approaches used by anti-virus software. In response, dynamic analysis (see Vasudevan et al. [126] and references therein) overcomes obfuscations that prevent static analysis. Malware authors have countered this by employing trigger based behaviour such as bot command inputs and logic bombs which exploit analyzer limitations of only observing a single execution path. These limitations are overcome by analyzing multiple execution paths [14, 78], but bots may in turn counter this using schemes relying on the principles of secure triggers [39, 109]. In order to remain invisible to F detection, bots can also use a variety of VM (Virtual Machine) based techniques for extra stealth, such as installing virtual machines underneath the existing operating system [65] to prevent access from software running on the target system and being able to identify a virtual analysis environment including VMs and Honeypots [36]. Graph analysis techniques have also been used in host-based approaches. BLINC [62] is a traffic-classification method that uses 'Graphlets' to model flow characteristics of a host and touches on the benefit of analyzing the 'IP social-network' of a machine. Graph analysis has also been applied to automated malware classification based on function call graphs [54]. One of the areas that is most important to organisations is to identify hosts that are infected malware so appropriate actions can be taken. It is important to note here that we are only interested in host detection through the command and control actions of the malware, NOT the actual infection of the malware itself through binary detection (as is covered by anti-virus software). ## Controls for C&amp;C Over the years, a number of security standards, recommendations, and best practices have been proposed to address security risks. In particular, the Council on CyberSecurity (CCS) publishes and manages the 'Critical Controls for Effective Cyber Defence v4.1' [23], a list of key actions that organisations should take to detect, block, or mitigate attacks. The controls are informed from experience with actual attacks, as provided by a broad range of contributors to the list, and are designed so that they can be implemented, enforced and monitored largely in an automated fashion. These controls are recommended by UK Government for improving cyber defences in all organisations. Hereinafter, we will review the Controls in the context of detecting and disrupting C2 activity. We will base our review on version 4.1 of the Controls, the latest available at the time of writing. More precisely, we will highlight the controls that appear suited at defending against C2: we will reflect on their effectiveness and on their practical applicability on the basis of the C2 techniques that we have discussed so far. ## F.1 Controls for C2 Detection ## Critical Control 5: Malware Defences Control 5 is a very broad control that encompasses processes and tools for detecting, preventing, or correcting the installation and execution of malicious software on all devices of an organisation. Some of the actions it recommends are related to the prevention of infections (e.g., keeping systems and defence tools up to date, disabling auto-run mechanisms and preforming automatic scans of removable media, emails, and web pages, deploying anti-exploitation techniques). Several actions can instead be used to specifically detect and disrupt C2 activity: - · Monitoring all inbound and outbound traffic on a continuous basis. The control specifically suggests to watch large transfers of data or unauthorised traffic, which may happen during the exfiltration phase of an attack. U - · Detecting anomalies in network flows. The control recommends to look for anomalies in the network traffic which may be indicative of malware activity (such as C2 communications) or of compromised machines. - · Logging DNS queries and applying reputation checks. The control suggests to monitor DNS requests for attempts to resolve known malicious domains or attempts to contact domains with poor reputation. ## Critical Control 13: Boundary Defence Control 13 is concerned with detecting and preventing information flows at an organisation boundaries that may violate the organisation's security policies. More specifically, it can be used to identify signs of attacks and evidence of compromise. The practical actions that this control recommends include: - · Using blacklists to deny communication from internal machines toward known malicious hosts. - · Storing network traffic and alerts in logs analytics systems for further analysis and inspection. - · Deploying NIDS to monitor the network traffic looking for signs of infection. - · Capturing and analysing netflow data to identify anomalous activity. - · Configuring the network so that all outgoing traffic passes through a 'choke point' and so that it can be segmented to prevent and contain infections. ## Critical Control 17: Data Loss Prevention The goal of control 17 is to track, control, prevent, and correct data transmissions and storage that violate an organisation's security policy. Since stealing sensitive data is the final objective of most targeted attacks, the recommendations of this control are clearly relevant in the context of C2 activity. A number of actions described as part of this control can be effectively used to detect and mitigate C2 channels: F - · Deploying data loss prevention (DLP) tools at the perimeter, to identify sensitive data leaving the organisation premises. These tools often search the traffic for keywords or data formats that are associated with sensitive data. - · Detecting the unauthorised use of encryption in network traffic. The rationale here is that malware may use encryption to exfiltrate sensitive data bypassing tools (such as DLPs) that rely on the inspection of traffic content. - · Blocking access to known file transfer and email exfiltration sites. - · Searching for anomalies in traffic patterns. ## F.2 Controls for C2 Disruption ## Critical Control 19: Secure Network Engineering Control 19 prescribes a set of actions to broadly create an infrastructure that can withstand attacks. In particular, the following actions are relevant to the task of disrupting C2 activity: - · Segmenting the network according to trust zones. This activity can be particular beneficial if it possible to clearly separate highrisk components of the network (e.g., parts that are particularly exposed to attacks) from high-value components (e.g., those that store sensitive data). - · Designing an infrastructure that allows the rapid deployment of new access controls, rules, signatures, etc. This is especially important to reap the benefits of other controls we have discussed: for example, to deploy new blacklists that have been available or to update the signatures of indicators of compromise used in network-based monitors. - · Ensure that clients query internal DNS servers, which can be monitored and whose replies can be manipulated to, for example, prevent access to known malicious or unauthorised domains. ## Controls for C&amp;C ## F.3 Other Controls The Critical Control list includes a few other controls that are not immediately related to the detection or disruption of C2 activity, but that are often associated to the defence against targeted attacks. More precisely, Control 9 (Security Skills Assessment and Appropriate Training to Fill Gaps) recommends training employees and organisation members to be aware of attacks. Intuitively better awareness can help avoiding human mistakes. However, the effectiveness of security training in general is debated [108], and the characteristics of targeted attacks may make training even less effective (e.g., attacks are more likely to resemble normal activity). Some case studies describing training programs specifically designed with targeted attacks in mind have been described in the literature [111]. Critical Control 18 (Incident Response and Management) indicates a list of actions for responding to incidents. Clearly, having a well defined plan to deal with the detection of C2 activity is necessary to avoid or minimise the damages of an attack or ongoing infection. Finally, Critical Control 20 (Penetration Tests and Red Team Exercises) should also be taken in account in the context of C2 activity as a way to test the effectiveness of the techniques and tools used within an organisation. In particular, such security exercises should test whether attempts to set up C2 channels, using both known and new techniques or variations on existing techniques, would be detected by the other controls employed by the organisation. ## F.4 Discussion ## Limitations Our review of the Critical Controls shows that while they do include sensible advice on defending against C2 activity, they also have some limitations that may hinder their effective adoption. For the most part, these limitations seem a consequence of the general nature of the 20 Critical Controls, which are not tailored to C2 activity specifically. First, controls are often extremely U broad, encompassing a wide variety of technologies and approaches. For example, the activities listed in Control 5 encompass whole sectors of the information security industry, ranging from anti-virus technologies, intrusion detection systems, reputation systems, and anomaly detection. This is not a problem per se: the use of orthogonal mechanisms ('defence in depth') has long been considered good practice. However, extracting techniques that are specific for C2 detection and disruption among the full list of controls may become daunting. Similarly, activities that are relevant for C2 detection are scattered through several controls, which makes it more difficult for someone focusing on C2 to ensure that all relevant controls have been implemented or considered. Finally, the Controls document provides little discussion of the limitations inherent in the controls it proposes. While the metric and test sections in each control provide a discussion of how to measure and test the effectiveness of a control, it may be easy for a reader to focus on the defensive mechanisms rather than on the results that they provide. ## Generalization of controls for C2 detection and disruption From our discussion of C2 techniques and defences, it is evident that most approaches to the detection of C2 activity rely on monitoring network traffic and applying some form of detection algorithm on it. The Security Controls do include activities that lead organisations toward this approach to security; here, we will generalise and comment on these recommendations: - · Monitor all inbound and outbound traffic. More precisely, it is important to inspect inbound traffic for signs of attacks that may lead to an infection, for ex- ample, drive-by-download or spear phishing attacks. Outbound traffic should be analysed looking for indications that a C2 channel has been established (data ex- filtration, Command &amp; Control check-in, etc.) - · Monitor network activity to identify connection attempts to knownbad end points, i.e., IPs and domains that are known to be F used in attacks. The rationale is that access to these endpoints can be prevented, assuming that appropriate mechanisms are in place (e.g., firewalls). The key aspect here is of course that of creating and maintaining up-to-date lists of malicious endpoints. Different approaches to create and evaluate such lists have been proposed both in the academia and in the commercial sector [32, 58, 68, 95, 113, 124]. - · Identify and inspect anomalies in the network traffic. The rationale is that targeted attacks rely on infrastructure that is less likely to be included in generally- available lists of malicious endpoints or to use C2 techniques (e.g., protocols) that are used also by general malware. Then, focusing on detecting anomalous traffic would enable defenders to catch these novel threats. There are two assumptions underlying this recommendation: targeted attacks result in anomalous traffic and anomalous traffic is an indication of compromise. Both assumptions may need to be re-evaluated from time to time: we have seen that attackers are devising new methods to 'blend in' with the normal traffic; the characteristics of traffic on a network may change as new services and devices are introduced. - · Collect specific subsets of network traffic, in particular DNS queries and netflow data. A motivation for this recommendation is that it may be easier to collect such data, rather than setting up a full network monitoring system. As we have seen from our literature review, several approaches have been devised to identify C2 traffic based on these inputs. - · Architect the network in such a way that simplifies traffic monitoring and the activation of responses to attacks. For example, by having a single choke point where all traffic passes through, an organisation can simplify the full collection of traffic and its inspection. As another example, network segmentation can help keeping separated networks of different trust values (e.g., networks hosting front- facing ## Controls for C&amp;C servers vs. those hosting internal services). In addition, the use of rate limiting techniques may slow down attackers as they try to exfiltrate data and increase the window of time in which a detection can occur. ## Risks There are several factors that may limit the effectiveness of a control. Attackers are always looking for ways to 'remain under the radar' and avoid detection. For example, to limit the effectiveness of content analysis techniques, they may use encrypted communication protocols, or they may adapt their C2 traffic so that it resembles regular traffic seen on a network. To thwart controls that call for matching traffic (e.g., connection endpoints, DNS queries) against lists of known malicious entities, attackers refrain from re-using artefacts (such as actual attack vectors, servers, and U domain names) in multiple attacks. To work around anomaly detection approaches, attackers may make their activities, in particular their C2 traffic, similar to benign traffic. ## Practical matters We will conclude our review of security controls with a discussion of some non technical issues that may face an adopter of the controls. For example, an organisation may not have sufficient resources (staff, time, or money) to apply a control in its entirety. In addition, implementing a control may require changes to or collaboration from a multitude of departments or groups inside organisation. For example, monitoring DNS queries may require that the security group interacts with the networking group. It would be helpful to have some guidance on addressing such issues, perhaps in the form of case F ## studies. An approach that we have seen applied successfully to the introduction of new controls for C2 activity could be summarised as 'start small, measure, and scale up'. An organisation does not need to apply a control throughout its entire infrastructure ( start small ): for example, it could choose to initially protect a subset of users, such as a high-risk group, or a group that is tolerant to initial experimentation with potentially higher than normal false positive rates. Similarly, an organisation could choose to focus on a specific type of traffic (e.g., DNS) that has smaller performance requirements and still a good potential of leading to the detection of C2 channel activity. After the initial, limited implementation of a control, its effectiveness should be assessed ( measure ). If successful, the control could be extended to larger portions of the organisation ( scale up ). U ## Bibliography - [1] At&amp;t global networking facts. http:www.corp.att.com/gov/about\_ ags/fact\_sheet. - [2] K.Adams,T.Garfinkel,A.Warfield,andJ.Franklin. CompatibilityisNotTrans- parency: VMM Detection Myths and Realities. In Proc. of the USENIX Work- shop on Hot Topics in Operating Systems (HotOS), 2007. - [3] R. Albert and A. Baraba ́si. Statistical mechanics of complex networks. Reviews of Modern Physics , 74(1):47-97, 2002. - [4] R. Anderson, C. Barton, R. Bo ̈hme, R. Clayton, M. J. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the Cost of Cybercrime. In Proc. of the Workshop on the Economics of Information Security (WEIS) , 2012. - [5] R. Anderson, R. Bo ̈hme, R. Clayton, and T. Moore. Security Economics and the Internal Market. Technical report, ENISA, 2008. - [6] M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a dynamic reputation system for dns. In Proc. of the USENIX Security Symposium , 2010. - [7] M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon. Detecting Malware Domains at the Upper DNS Hierarchy. In Proc. of the USENIX Security Symposium , 2011. - [8] D. Balzarotti, M. Cova, C. Karlberger, C. Kruegel, E. Kirda, and G. Vigna. Effi- cient Detection of Split Personalities in Malware. In Proc. of the Symposium on Network and Distributed System Security (NDSS) , 2010. - [9] P . Barford and V. Yegneswaran. An Inside Look at Botnets , volume 27 of Ad- vanced in Information Security. Springer, 2006. - [10] A. Barsamian. Network characterization for botnet detection using statistical- behavioral methods. Masters thesis, Thayer School of Engineering, Dartmouth College, USA, June 2009. - [11] L. Bilge and T. Dumitras. Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World. In Proc. of the ACM Conference on Computer and Communications Security (CCS), 2012. [12] J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In SRUTI'06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet , pages 7-7, Berkeley, CA, USA, 2006. F U ## Bibliography USENIX Associa- tion. [13] J. Brenner. America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare . The Penguin Press HC, 2011. [14] D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. X. Song, and H. Yin. Au- tomatically identifying trigger-based behavior in malware. In Botnet Detection , pages 65-88. 2008. [15] California State Senate. Assembly Bill 700. http://www.leginfo. ca.gov/pub/01-02/bill/asm/ab\_0651-0700/ab\_700\_bill\_ 20020929\_ chaptered.pdf. [16] M. Castro, P . Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation , dec 2002. [17] Cisco Systems Inc. Cisco IOS Netflow. http://www.cisco.com/ web/ go/netflow. [18] R. Clarke. Cyber War: The Next Threat to National Security and What to Do About It. Ecco, 2010. [19] M. Cloppert. Security Intelligence: Attacking the Cyber Kill Chain. http://computer-forensics.sans.org/blog/2009/10/14/ securityintelligence-attacking-the-kill-chain , 2009. [20] M. P . Collins and M. K. Reiter. Hit-list worm detection and bot identification in large networks using protocol graphs. In RAID , 2007. [21] M. P . Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver, M. De Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses. In IMC , pages 93-104, New York, NY, USA, 2007. ACM. [22] E. Cooke and F . Jahanian. The zombie roundup: Understanding, detecting, and disrupting botnets. In Steps to Reducing Unwanted Traffic on the Internet Workshop , 2005. [23] Council on CyberSecurity. Critical Controls for Effective Cyber Defense - Version 4.1. Technical report, Council on CyberSecurity, 2013. [24] M. Cova, C. Kruegel, and G. Vigna. There Is No Free Phish: An Analysis of 'Free' and Live Phishing Kits. In Proc. of the USENIX Workshop on Offensive Technologies (WOOT) , 2008. F U ## Bibliography [25] C. Cranor, T. Johnson, O. Spataschek, and V. Shkapenyuk. Gigascope: a stream database for network applications. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data , SIGMOD '03, pages 647-651, New York, NY, USA, 2003. ACM. (CCS), 2012. [26] D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In Network and Distributed Systems Security Symposium , 2006. [27] Detica and the Office of Cyber Security and Information Assurance in the Cabi- net Office. The cost of cyber crime. http:// www.cabinetoffice.gov. uk/resource-library/cost-of-cyber-crime , 2011. [28] C. J. Dietrich. Feederbot - a bot using DNS as carrier for its C&amp;C. http://blog.cj2s.de/archives/28-Feederbot-a-bot- using-DNS-ascarrier-for-its-CC.html , 2011. [29] R. Dingledine. Many more Tor users in the past week? https: // lists.torproject.org/pipermail/tor-talk/2013- August/029582.html , 2013. [30] R. Dingledine, N. Mathewson, and P . Syverson. Tor: The secondgeneration onion router. In Proceedings of the 13th USENIX Security Symposium , Aug. 2004. [31] M.Egele,T.Scholte,E.Kirda,andC.Kruegel.ASurveyon Automated Dynamic Malware Analysis Techniques and Tools. ACM Computing Surveys , 44(2), 2012. [32] M.Felegyhazi,C.Kreibich,andV.Paxson. OnthePotentialofProactiveDomain Blacklisting. 2010. [33] P . Ferrie. Attacks on More Virtual Machine Emulators. Technical report, Syman- tec, 2007. [34] P . Ferrie. Attacks on Virtual Machines. In Proceedings of the Association of Anti-Virus Asia Researchers Conference , 2007. [35] M. Fossi, E. Johnson, D. Turner, T. Mack, J. Blackbird, D. McKinney, M. K. Low, T. Adams, M. P . Laucht, and J. Gough. Symantec Report on the Underground Economy. Technical report, Symantec, Inc., 2008. F U ## Bibliography [36] J. Franklin, M. Luk, J. M. McCune, A. Seshadri, A. Perrig, and L. van Doorn. Towards sound detection of virtual machines. In Botnet Detection . 2008. [37] J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In Proc. of the ACM Conference on Computer and Communications Security (CCS), 2007. [38] F . C. Freiling, T. Hoz, and G. Wichereski. Botnet tracking: Exploring a root- cause methodology to prevent distributed denial-ofservice attacks. In European Symposium on Research in Computer Security , 2005. [39] A. Futoransky, E. Kargieman, C. Sarraute, and A. Waissbein. Foundations and applications for secure triggers. ACM Trans. Inf. Syst. Secur., 9(1):94-112, 2006. [40] J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In Hot Topics in Understanding Botnets , Apr. 2007. [41] C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P . Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Z. Raque, M. A. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker. Manufacturing Cpromise: The Emergence of Exploit-as-a-Service . In Proc. of the ACM Conference on Computer and Communications Security (CCS), 2012. [42] J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In Hot Topics in Understanding Botnets , Apr. 2007. [43] G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In Proc. of the USENIX Security Symposium , 2008. [44] G. Gu, P . Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detect- ing Malware Infection Through IDS-Driven Dialog Correlation. In Proc. of the USENIX Security Symposium , 2007. [45] G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008. [46] C. Guarnieri. Skynet, a Tor-powered Botnet Straight from Reddit. F U ## Bibliography https://community.rapid7.com/community/infosec/blog/ 2012/12/06/skynet-a-tor-powered-botnet-straight- from-reddit , 2012. [47] K. P . Gummadi, R. Gummadi, S. D. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In Proceedings of ACM SIGCOMM 2003 , Aug. 2003. [48] R.Gummadi,H.Balakrishnan,P .Maniatis,andS.Ratnasamy.Not-aBot(NAB): Improving Service Availability in the Face of Botnet Attacks. In NSDI 2009 , Boston, MA, April 2009. [49] M. Hanspach and M. Goetz. On covert acoustical mesh networks in air. Journal of Communications , 8:758-767, 2013. [50] T. Holz, M. Engelberth, and F . Freiling. Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. In Proc. of the European Symposium on Research in Computer Security (ESORICS) , 2009. [51] T. Holz, C. Gorecki, K. Rieck, and F . Freiling. Measuring and Detecting FastFlux Service Networks. In Proc. of the Symposium on Network and Distributed System Security (NDSS ), 2008. [52] C. Hosmer. Polymorphic &amp; Metamorphic Malware. In Proceedings of the Black Hat Conference , 2008. [53] A. Houmansadr, C. Brubaker, and V. Shmatikov. The parrot is dead: Observ- ing unobservable network communications. In Proceedings of the 2013 IEEE Symposium on Security and Privacy , 2013. [54] X. Hu, T. cker Chiueh, and K. G. Shin. Large-scale malware indexing using function-call graphs. In Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009. [55] E. M. Hutchins, M. J. Clopperty, and R. M. Amin. IntelligenceDriven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Technical report, Lockheed Martin Corporation, 2010. [56] M. Iliofotou, M. Faloutsos, and M. Mitzenmacher. Exploiting dynamicity in graph-based traffic analysis: Techniques and applications. In ACM CoNext, 2009. [57] M. Iliofotou, P . Pappu, M. Faloutsos, M. Mitzenmacher, G. F U ## Bibliography Varghese, and H. Kim. Graption: Automated detection of P2P applications using traffic disper- sion graphs (TDGs). In UC Riverside Technical Report , CS-2008-06080, 2008. [58] L. Invernizzi, S. Benvenuti, M. Cova, P . M. Comparetti, C. Kruegel, and G. Vi- gna. EvilSeed: A Guided Approach to Finding Malicious Web Pages. In Proc. of the IEEE Symposium on Security and Privacy , 2012. [59] JAP . Jap anon proxy. http://anon.inf.tu-dresden.de/ publications/index\_en.html . [60] M. Jelasity and V. Bilicki. Towards automated detection of peer-topeer botnets: On the limits of local approaches. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009. [61] J. P . John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spam- ming botnets using botlab. In NSDI'09: Proceedings of the 6th USENIX sympo- sium on Networked systems design and implementation , pages 291-306, Berke- ley, CA, USA, 2009. USENIX Association. [62] T. Karagiannis, K. Papagiannaki, and M. Faloutsos. BLINC: multilevel traffic classification in the dark. In ACM SIGCOMM , 2005. [63] A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In Hot Topics in Understanding Botnets , Apr. 2007. [64] Kaspersky. Ask An Expert: The Brainstorming. http://blog. kaspersky.com/ask-an-expert-the-brainstorming/ , 2013. [65] S. T. King, P . M. Chen, Y .-M. Wang, C. Verbowski, H. J. Wang, and J. R. Lorch. Subvirt: Implementing malware with virtual machines. Security and Privacy, IEEE Symposium on , 0:314-327, 2006. [66] C. Kolbitsch, E. Kirda, and C. Kruegel. The Power of Procrastination: Detec- tion and Mitigation of Execution-Stalling Malicious Code. In Proc. of the ACM Conference on Computer and Communications Security (CCS), 2011. [67] B. Krebs. Security Firm Bit9 Hacked, Used to Spread Malware. Krebs on Secuity , February 13 2013. [68] M. Ku ̈hrer and T. Holz. An Empirical Analysis of Malware Blacklists. Praxis der Informationsverarbeitung und Kommunikation , 35(1), 2012. F U ## Bibliography [69] R. Langner. To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Cre- ators Tried to Achieve. Technical report, Langner Group, Nov. 2013. [70] D. Loguinov, A. Kumar, V. Rai, and S. Ganesh. Graph-theoretic analysis of structured peer-to-peer systems: Routing distances and fault resilience. In Proceedings of ACM SIGCOMM , Aug. 2003. [71] W. Lu, M. Tavallaee, and A. A. Ghorbani. Automatic discovery of botnet communities on large-scale communication networks. In ASIACCS , pages 1-10, New York, NY, USA, 2009. ACM. [72] Mandiant. 2013 Threat Report. https://www.mandiant.com/ resources/m-trends , 2013. [73] Mandiant. APT1: Exposing One of Chinas Cyber Espionage Units. Technical report, 2013. [74] L. Martignoni, R. Paleari, G. F . Roglia, and D. Bruschi. Testing CPU Emulators. In Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), 2009. [75] R. McCardle. A .bit odd. http://blog.trendmicro.com/ trendlabssecurity-intelligence/a-bit-odd/ , 2013. [76] M. McGuire and S. Dowling. Cyber crime: A review of the evidence. Research Report 75, Home Office, 2013. [77] H. Mohajeri Moghaddam, B. Li, M. Derakhshani, and I. Goldberg. Skypemorph: protocol obfuscation for tor bridges. In Proceedings of the 2012 ACM conference on Computer and communications security , 2012. [78] A. Moser, C. Kruegel, and E. Kirda. Exploring Multiple Execution Paths for Malware Analysis. In Proc. of the IEEE Symposium on Security and Privacy , 2007. [79] C. Mullaney. Morto worm sets a (DNS) record. http://www. symantec. com/connect/blogs/morto-worm-sets-dns-record , 2011. [80] S.NagarajaandR.Anderson.Thesnoopingdragon:socialmalwaresurveillance of the tibetan movement. Technical Report UCAM-CL-TR-746, University of Cambridge, March 2009. [81] S. Nagaraja, A. Houmansadr, P . Piyawongwisal, V. Singh, P . F U ## Bibliography Agarwal, and N. Borisov. Stegobot: a covert social network botnet. In Information Hiding Conference , Lecture Notes in Computer Science, pages 112-125. Springer, 2011. [82] S. Nagaraja, P . Mittal, C.-Y . Hong, M. Caesar, and N. Borisov. BotGrep: Finding P2P bots with structured graph analysis. In USENIX Security Symposium , pages 95-110, 2010. [83] E. Nakashima. Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies. The Washington Post , May 27 2013. [84] J. Nazario. Malicious Google AppEngine Used as a CnC. http: //www.arbornetworks.com/asert/2009/11/malicious- googleappengine-used-as-a-cnc/ , 2009. [85] J. Nazario. Twitter-based Botnet Command Channel. http: // www.arbornetworks.com/asert/2009/08/twitter-based- botnetcommand-channel/ , 2009. [86] T. Nelms, R. Perdisci, and M. Ahamad. ExecScent: Mining for New C&amp;C Do- mains in Live Networks with Adaptive Control Protocol Templates. In Proc. of the USENIX Security Symposium , 2013. [87] D. M. Nicol and N. Schear. Models of privacy preserving traffic tunneling. Sim- ulation, 85(9):589-607, 2009. [88] R. Paleari, L. Martignoni, G. F . Roglia, and D. Bruschi. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators. In Proc. of the USENIX Workshop on Offensive Technologies (WOOT), 2009. [89] V. Paxson, M. Christodorescu, M. Javed, J. Rao, R. Sailer, D. Schales, M. P . Stoecklin, K. Thomas, W. Venema, and N. Weaver. Practical comprehensive bounds on surreptitious communication over dns. In Proceedings of the 22Nd USENIX Conference on Security , 2013. [90] R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. In Proc. of the USENIX Symposium on Networked Systems Design &amp; Implementation , 2010. [91] N. Perlroth. Hackers in China Attacked The Times for Last 4 Months. The New York Times , January 30 2013. [92] M. Polychronakis, P . Mavrommatis, and N. Provos. Ghost Turns Zombie: Ex- ploring the Life Cycle of Web-Based Malware. In Proc. of F U ## Bibliography the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) , 2008. [93] P . Porras, H. Saidi, and V. Yegneswaran. A multi-perspective analysis of the Storm (Peacomm) worm. In SRI Technical Report 1001, 2007. [94] P . Porras, H. Saidi, and V. Yegneswaran. A Foray into Conficker's Logic and Rendezvous Points. In Proc. of the USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009. [95] N. Provos, P . Mavrommatis, M. A. Rajab, and F . Monrose. All Your iFrames Point to Us. In Proc. of the USENIX Security Symposium , 2008. [96] N. Provos, D. McNamee, P . Mavrommatis, K. Wang, and N. Modadugu. The Ghost in the Browser: Analysis of Web-based Malware. In Proc. of the USENIX Workshop on Hot Topics in Understanding Botnet , 2007. [97] N. Provos, M. A. Rajab, and P . Mavrommatis. Cybercrime 2.0: When the Cloud Turns Dark. Communications of the ACM , 52(4), 2009. [98] T. Raffetseder, C. Kruegel, and E. Kirda. Detecting System Emulators. In Proceedings of the Information Security Conference , 2007. [99] M. Rajab, J. Zarfoss, F . Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Internet Measurement Conference , 2006. [100] A. Ramachandran, D. Dagon, and N. Feamster. Can DNS-based blacklists keep up with bots? In CEAS , 2006. [101] A. Ramachandran, N. Feamster, and D. Dagon. Revealing Botnet Membership Using DNSBL Counter-Intelligence. In Proc. of the USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2006. [102] M. Z. Raque and J. Caballero. FIRMA: Malware Clustering and Network Signa- ture Generation with Mixed Network Behaviors. In Proc. of the Symposium on Recent Advances in Intrusion Detection (RAID), 2013. [103] K. Rieck, G. Schwenk, T. Limmer, T. Holz, and P . Laskov. Botzilla: Detecting the 'Phoning Home' of Malicious Software. In Proc. of the F U ## Bibliography ACM Symposium on Applied Computing (SAC) , 2010. [104] C. Rossow and C. J. Dietrich. ProVex: Detecting Botnets with Encrypted Com- mand and Control Channels. In Proc. of the Conference on Detection of Intrusions and Malware &amp; Vulnerability Assessment (DIMVA) , 2013. [105] J. Rutkowska. Red Pill... or how to detect VMM using (almost) one CPU in- struction. http://www.invisiblethings.org/papers/ redpill. html , 2004. [106] D. Sanger. Obama Order Sped Up Wave of Cyberattacks Against Iran. The New York Times , 1 June 2012. [107] N. Schear and D. M. Nicol. Performance analysis of real traffic carried with encrypted cover flows. In PADS, pages 80-87, Washington, DC, USA, 2008. IEEE Computer Society. [108] B. Schneier. Security Awareness Training. https://www. schneier.com/ blog/archives/2013/03/security\_awaren\_1.html , 2013. [109] M. I. Sharif, A. Lanzi, J. T. Giffin, and W. Lee. Impeding malware analysis using conditional code obfuscation. In NDSS. The Internet Society , 2008. [110] S. Sheng, B. Wardman, G. Warner, L. F . Cranor, J. Hong, and C. Zhang. An empirical analysis of phishing blacklists. In CEAS , 2009. [111] A. M. Smith and N. Y. Toppel. Case Study: Using Security Awareness to Com- bat the Advanced Persistent Threat. In Proc. of the Colloquium for Information Systems Security Education , 2009. [112] E. Stinson and J. C. Mitchell. Characterizing bots' remote control behavior. In Botnet Detection . 2008. [113] J. Stokes, R. Andersen, C. Seifert, and K. Chellapilla. WebCop: Locating Neighborhoods of Malware on the Web. 2010. [114] B.Stone-Gross,M.Cova,L.Cavallaro,B.Gilbert,M.Szydlowski,R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is my Botnet: Analysis of a Botnet Takeover. In Proc. of the ACM Conference on Computer and Communications Security (CCS) , 2009. [115] B. Stone-Gross, M. Cova, C. Kruegel, and G. Vigna. Peering Through the iFrame. In Proc. of the IEEE Conference on Computer Communications (IN- FOCOM) Mini-Conference , 2011. F U ## Bibliography [116] S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache trojans: P2P is here. ;login, 32(6), Dec. 2007. [117] W. T. Strayer, D. E. Lapsley, R. Walsh, and C. Livadas. Botnet detection based on network behavior. In Advances in Information Security . 2008. [118] G. Stringhini, M. Egele, A. Zarras, T. Holz, C. Kruegel, , and G. Vigna. B@bel: Leveraging Email Delivery for Spam Mitigation. In Proc. of the USENIX Security Symposium , 2012. [119] G.Stringhini,T.Holz,B.Stone-Gross,C.Kruegel,,andG.Vigna. BotMagnifier: Locating Spambots on the Internet. In Proc. of the USENIX Security Symposium , 2011. [120] Symantec. Internet Security Threat Report 2013 - Volume 18. Technical report, Symantec, Inc., 2013. [121] Symantec. Linux back door uses covert communication protocol. http://www.symantec.com/connect/blogs/linux-back- door-usescovert-communication-protocol , 2013. [122] Symantec Corp. Symantec Statement Regarding New York Times Cyber Attack. http://www.symantec.com/connect/blogs/ symantec- statement-regarding-new-york-times-cyber-attack , 2013. [123] P . Szor. The Art of Computer Virus Research and Defense . Addison-Wesley Professional, 2005. [124] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and Evaluation of a Real-Time URL Spam Filtering Service. In Proc. of the IEEE Symposium on Security and Privacy , 2011. [125] TrendLabs APT Research Team. Spear-Phishing Email: Most Favored APT Attack Bait. Technical report, Trend Micro Incorporated, 2012. [126] A. Vasudevan and R. Yerraballi. Cobra: Fine-grained malware analysis using stealth localized-executions. In Proceedings of 2006 IEEE Symposium on Security and Privacy (Oakland.06, 2006. [127] Verizon RISK Team. 2013 Data Breach Investigations Report. Technical report, Verizon, 2013. F U ## Bibliography [128] R. Villamar ́ın-Salomo ́n and J. C. Brustoloni. Bayesian bot detection based on dns traffic similarity. In SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing , pages 2035-2041, New York, NY, USA, 2009. ACM. [129] N. Villeneuve, N. Moran, and T. Haq. Evasive Tactics: Taidoor. http: //www.fireeye.com/blog/technical/2013/09/evasive- tacticstaidoor-3.html , 2013. [130] Q. Wang, X. Gong, G. T. Nguyen, A. Houmansadr, and N. Borisov. Censorspoofer: asymmetric communication using ip spoofing for censorship-resistant web browsing. In Proceedings of the 2012 ACM conference on Computer and communications security , 2012. [131] Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh. Stegotorus: a camouflage proxy for the tor anonymity system. In Proceedings of the 2012 ACM conference on Computer and communications security, 2012. [132] C. Wisniewski. Twitter botnet command and control captured. http://nakedsecurity.sophos.com/2010/05/18/twitter- botnetcommand-control-captured/ , 2010. [133] K. Xu, P . Butler, S. Saha, and D. Yao. DNS for Massive-Scale Command and Control. IEEE Transactions on Dependable and Secure Computing , 10(3), 2013. [134] ydklijnsma. Large botnet cause of recent Tor network overload. http://blog.fox-it.com/2013/09/05/large-botnet-cause- of-recenttor-network-overload/ , 2013. [135] T.-F . Yen and M. K. Reiter. Traffic aggregation for malware detection. In DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pages 207-227, Berlin, Heidelberg, 2008. SpringerVerlag. [136] A. Young and M. Yung. Cryptovirology: Extortion-based security threats and countermeasures. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy , page 129, Washington, DC, USA, 1996. IEEE Computer Society. [137] E. Young and E. Ward. Trojan.Downbot. http://www.symantec. com/ security\_response/writeup.jsp?docid=2011-052413-124899 , 2011. [138] Y. Zhao, Y. Xie, F . Yu, Q. Ke, Y . Yu, Y . Chen, and E. Gillum. Botgraph: Large scale spamming botnet detection. In NSDI , 2009. F
null
[ "Joseph Gardiner", "Marco Cova", "Shishir Nagaraja" ]
2014-08-05T22:36:46+00:00
2015-06-22T13:17:35+00:00
[ "cs.CR" ]
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.
1408.1137v2
## EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH (CERN) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-16bc4a6c-d279-4f42-8fc0-0679e2d70f42.jpg) CERN-PH-EP-2014-193 LHCb-PAPER-2014-030 5 August 2014 ## First observations of the rare decays B + → K π π + + -µ + µ -and B + → φK µ µ + + - The LHCb collaboration † ## Abstract First observations of the rare decays B + → K π π + + -µ + µ -and B + → φK µ µ + + -are presented using data corresponding to an integrated luminosity of 3 0 fb . -1 , collected by the LHCb experiment at centre-of-mass energies of 7 and 8 TeV. The branching fractions of the decays are $$\mathcal { B } ( B ^ { + } \rightarrow K ^ { + } \pi ^ { + } \pi ^ { - } \mu ^ { + } \mu ^ { - } ) & = \left ( 4. 3 6 \, _ { - 0. 2 7 } ^ { + 0. 2 9 } \left ( \text{stat} \right ) \pm 0. 2 1 \left ( \text{syst} \right ) \pm 0. 1 8 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 }, \\ \mathcal { B } ( B ^ { + } \rightarrow \phi K ^ { + } \mu ^ { + } \mu ^ { - } ) & = \left ( 0. 8 2 \, _ { - 0. 1 7 } ^ { + 0. 1 9 } \left ( \text{stat} \right ) \, _ { - 0. 0 4 } ^ { + 0. 1 0 } \left ( \text{syst} \right ) \pm 0. 2 7 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 },$$ where the uncertainties are statistical, systematic, and due to the uncertainty on the branching fractions of the normalisation modes. A measurement of the differential branching fraction in bins of the invariant mass squared of the dimuon system is also presented for the decay B + → K π π + + -µ + µ -. Published in JHEP 10 (2014) 064 c © CERN on behalf of the LHCb collaboration, license CC-BY-4.0. † Authors are listed at the end of this paper. ## 1 Introduction The B + → K π π µ µ + + -+ -and B + → φK µ µ + + -decays proceed via b → s flavour changing neutral currents (FCNC). 1 In the Standard Model (SM), FCNC decays are forbidden at the tree level and are only allowed as higher-order electroweak loop processes. In extensions of the SM, new particles can significantly change the branching fractions and angular distributions of the observed final-state particles. Due to their sensitivity to effects beyond the SM, semileptonic B decays involving FCNC transitions are currently under intense study at the LHCb experiment [1-4]. The K π π + + -system in the final state of the B + → K π π µ µ + + -+ -decay can result from the decay of several strange resonances. Its composition was studied by the Belle collaboration for the tree-level decay B + → J/ψ ( → µ + µ -) K π π + + -[5], where the K 1 (1270) + meson was found to have a prominent contribution. The K 1 (1270) + and the K 1 (1400) + mesons are the mass eigenstates that result from mixing of the P -wave axial vector mesons 3 P 1 ( K 1 A ) and 1 P 1 ( K 1 B ) with the mixing angle θ K 1 [6]. The value of θ K 1 is either about -33 ◦ or -57 ◦ [6-11] with most recent determinations favouring the former [8-11]. The decay B + → J/ψφK + was first observed by the CLEO collaboration [12] and recently investigated in the search for the X (4140) [13-16]. The branching fraction of the rare decay B + → K 1 (1270) + µ + µ -, which is expected to contribute significantly to the K π π µ µ + + -+ -final-state, is predicted to be B ( B + → K 1 (1270) + µ + µ -) = (2 3 . +1 3 +0 0 . -1 0 . . -0 2 . ) × 10 -6 [17]. Here, the first uncertainty originates from the form-factor calculations, while the second is from the uncertainty on the mixing angle θ K 1 . However, due to the unknown resonance structure of the final-state hadrons, there are no inclusive theoretical predictions available for the branching fractions of the decays B + → K π π µ µ + + -+ -and B + → φK µ µ + + -. This paper presents the first observations of the decays B + → K π π µ µ + + -+ -and B + → φ (1020) K µ µ + + -, using a data sample collected by the LHCb experiment, corresponding to an integrated luminosity of 3 0 fb . -1 . The data were recorded in the years 2011 and 2012 at centre-of-mass energies of 7 and 8 TeV, respectively. In addition, a measurement of the differential branching fraction d B ( B + → K π π µ µ + + -+ -) / d q 2 , where q 2 is the invariant mass squared of the dimuon system, is presented. ## 2 The LHCb detector The LHCb detector [18] is a single-arm forward spectrometer covering the pseudorapidity range 2 &lt; η &lt; 5, designed for the study of particles containing b or c quarks. The detector includes a high-precision tracking system consisting of a silicon-strip vertex detector surrounding the pp interaction region, a large-area silicon-strip detector located upstream of a dipole magnet with a bending power of about 4 Tm, and three stations of silicon-strip detectors and straw drift tubes placed downstream. The tracking system provides a measurement of momentum, p , with a relative uncertainty that varies from 0.4% at low 1 Charge conjugation is implied throughout this paper. momentum to 0.6% at 100GeV /c . The minimum distance of a track to a primary pp interaction vertex (PV), the impact parameter (IP), is measured with a resolution of (15 + 29 /p T ) µ m, where p T is the the component of p transverse to the beam, in GeV /c . Charged hadrons are identified using two ring-imaging Cherenkov detectors (RICH) [19]. Photon, electron and hadron candidates are identified by a calorimeter system consisting of scintillating-pad and preshower detectors, an electromagnetic calorimeter and a hadronic calorimeter. Muons are identified by a system composed of alternating layers of iron and multiwire proportional chambers [20]. The trigger [21] consists of a hardware stage, based on information from the calorimeter and muon systems, followed by a software stage, which applies a full event reconstruction. Simulated events are used to determine trigger, reconstruction and selection efficiencies. In addition, simulated samples are used to estimate possible backgrounds from B meson decays that can mimic the final states of the signal decays. Simulated events are generated using Pythia [22] with a specific LHCb configuration [23]. Decays of hadronic particles are described by EvtGen [24], in which final-state radiation is generated using Photos [25]. The interaction of the generated particles with the detector and its response are implemented using the Geant4 toolkit [26] as described in Ref. [27]. ## 3 Selection of signal candidates The B + → K π π µ µ + + -+ -and B + → φK µ µ + + -signal candidates are first required to pass the hardware trigger stage, which selects muons with p T &gt; 1 76 GeV . /c . In the subsequent software trigger stage, at least one of the final-state hadrons (muons) is required to have both p T &gt; 1 6 GeV . /c (1 0 GeV . /c ) and IP larger than 100 µ m with respect to any PV in the event. A multivariate algorithm [28] is used to identify secondary vertices that are consistent with the decay of a b hadron with muons in the final state. Signal candidates are formed by combining two muons of opposite charge with three charged hadrons. Reconstructed signal candidate tracks must have significant displacement from any PV in the event. The signal candidate tracks are required to form a secondary vertex of good fit quality which is significantly displaced from the PV. Particle identification information from the RICH detectors (PID) is used to identify the final-state hadrons. For B + → K π π µ µ + + -+ -decays, the invariant mass of the K π π + + -system is required to be below 2400 MeV /c 2 . For B + → φK µ µ + + -decays with φ → K K + -, the invariant mass of the K K + -system is required to be within 12 MeV /c 2 of the known φ meson mass [29]. This mass region contains almost entirely φ → K K + -meson decays with negligible background. The final states of the signal decays can be mimicked by other B decays, which represent potential sources of background. Resonant decays, where the muon pair originates from either J/ψ or ψ (2 S ) meson decays, are removed by rejecting events where the invariant mass of the dimuon system is in the veto regions 2946 &lt; m µ µ ( + -) &lt; 3176 MeV /c 2 or 3586 &lt; m µ µ ( + -) &lt; 3766 MeV /c 2 . The radiative tails of the J/ψ ( ψ (2 S )) decays are suppressed by extending the lower edge of these veto regions down by 250 MeV /c 2 (100 MeV /c 2 ) if the reconstructed B + mass is smaller than 5230 MeV /c 2 . In the mass region 5330 &lt; m B ( + ) &lt; 5450 MeV /c 2 the upper edge of the vetoes is extended up by 40 MeV /c 2 to reject a small fraction of misreconstructed J/ψ and ψ (2 S ) meson decays. The resonant decays can also be misreconstructed as signal if a muon from the charmonium decay is misidentified as a hadron and vice versa. To remove this potential background the invariant mass of the µ + π -or µ + K -system is calculated assigning the muon mass to the hadron. If the mass falls within 50 MeV /c 2 of the known J/ψ or ψ (2 S ) masses [29], the candidate is rejected. Potential background from the electroweak-penguin decay B 0 → K µ µ ∗ 0 + -, where the K ∗ 0 → K π + -decay is combined with a random π + meson, is studied and found to be negligible. Backgrounds from semileptonic b → c ( → sµ + ν µ ) µ -¯ ν µ cascade decays, as well as fully hadronic B decays such as B + → D 0 ( → K π π π + + --) π + where two hadrons are misidentified as muons, are also negligible. Combinatorial background is suppressed with a boosted decision tree (BDT) [30, 31]. The BDT training uses sWeighted [32] candidates from the control channel B + → J/ψK + π + π -as a signal proxy and the high B + mass sideband (5529 &lt; m K π π µ µ ( + + -+ -) &lt; 5780 MeV /c 2 ) of B + → K π π µ µ + + -+ -candidates as a background proxy. The BDT uses geometric and kinematic variables in the training, including the p T of the final state tracks and their displacement from the PV. Additionally, the p T of the reconstructed B + candidate, as well as information on the quality of the decay vertex and its displacement are used. Requirements on the BDT response and the PID criteria, which discriminate between kaons and pions for the reconstructed final-state hadrons, are optimised simultaneously using the metric S/ √ S + B . Here, S and B denote the expected signal and background yields. The value of S is calculated using an estimate for the branching fraction of the decay B + → K 1 (1270) + µ + µ -. This branching fraction is determined by scaling that of the rare decay B 0 → K µ µ ∗ 0 + -[1] by the branching fraction ratio of the radiative decays B + → K 1 (1270) + γ and B 0 → K γ ∗ 0 [29]. To determine the branching fractions of the signal decays, the normalisation modes B + → ψ (2 S K ) + , with the subsequent decay ψ (2 S ) → J/ψ ( → µ + µ -) π + π -, and B + → J/ψφK + are used. The branching fraction of the decay B + → ψ (2 S K ) + is (6 27 . ± 0 24) . × 10 -4 [29], and the branching fraction of the decay B + → J/ψφK + is (5 2 . ± 1 7) . × 10 -5 [29]. The final states of the normalisation modes are identical to those of the signal decays, which is beneficial since many systematic effects are expected to cancel. Both normalisation modes are selected in analogy to the signal decays except for additional mass requirements. For the ψ (2 S ) decay, the reconstructed π + π -µ + µ -mass is required to be within 60 MeV /c 2 of the known ψ (2 S ) mass. The reconstructed invariant mass of the dimuon system originating from the J/ψ meson decay is required to be within 50 MeV /c 2 of the known J/ψ mass. ## 4 Differential branching fraction of the decay B + → K π π µ µ + + -+ - The determination of the differential branching fraction d B ( B + → K π π µ µ + + -+ -) / d q 2 is performed in bins of q 2 , as given in Table 1. Figure 1 shows the invariant mass distribution of B + → K π π µ µ + + -+ -candidates in each q 2 bin studied. Signal yields are determined using extended maximum likelihood fits to the unbinned K π π µ µ + + -+ -mass spectra. The m K π π µ µ ( + + -+ -) distribution of the signal component is modelled using the sum of two Gaussian functions, each with a power-law tail on the low-mass side. The background component is modelled with an exponential function, where the reductions in efficiency due to the vetoes of the radiative tails of the charmonium decays are accounted for by using scale factors. The signal yield integrated over the full q 2 range is N Kππµµ = 367 +24 -23 . The statistical significance of the signal is in excess of 20 standard deviations, according to Wilks' theorem [33]. Figure 2a shows the fit to the mass distribution of the control channel B + → J/ψK + π + π -that is used to determine the parameters describing the mass distribution of the B + → K π π µ µ + + -+ -signal decay. To account for partially reconstructed decays at low masses, a Gaussian function is used in addition to the exponential to describe the background component. The yield of the control channel is 59 335 ± 343. Figure 2b shows the fit for the normalisation channel B + → ψ (2 S K ) + . To describe the mass shape, the same components are used as for the fit of the control decay and all mass shape parameters are allowed to vary in the fit. The yield of the normalisation channel is 5128 ± 67. The differential branching fraction d B ( B + → K π π µ µ + + -+ -) / d q 2 in a q 2 bin of width ∆ q 2 is $$\frac { \text{d} \mathcal { B } ( B ^ { + } \rightarrow K ^ { + } \pi ^ { + } \pi ^ { - } \mu ^ { + } \mu ^ { - } ) } { \text{d} q ^ { 2 } } & = \frac { 1 } { \Delta q ^ { 2 } } \cdot \frac { N _ { \text{sig} } } { N _ { \text{norm} } } \cdot \frac { \epsilon _ { \text{norm} } } { \epsilon _ { \text{sig} } } \cdot \mathcal { B } \left ( B ^ { + } \rightarrow \psi ( 2 S ) K ^ { + } \right ) \\ & \quad \cdot \mathcal { B } \left ( \psi ( 2 S ) \rightarrow J / \psi \left ( \rightarrow \mu ^ { + } \mu ^ { - } \right ) \pi ^ { + } \pi ^ { - } \right ).$$ Here, N sig is the yield of the signal channel in the given q 2 bin and N norm the yield of the normalisation channel. The efficiencies for the reconstruction and selection of the signal and normalisation channels are denoted by glyph[epsilon1] sig and glyph[epsilon1] norm , respectively. The efficiency for the signal decay is determined using simulated B + → K 1 (1270) + µ + µ -events generated according to Ref. [17]; a separate efficiency ratio is calculated for each q 2 bin. The branching fraction for the ψ (2 S ) meson to decay to the final state π + π -µ + µ -is B ( ψ (2 S ) → J/ψ ( → µ + µ -) π + π -) = (2 016 . ± 0 031) . × 10 -2 [29]. The resulting differential branching fractions for the decay B + → K π π µ µ + + -+ -are shown in Fig. 3 with numerical values given in Table 1. Summation over all q 2 bins yields an integrated branching fraction of ( 3 43 . +0 23 . -0 21 . (stat) ± 0 15 (syst) . ± 0 14 (norm) . ) × 10 -7 , where the uncertainties are statistical, systematic, and due to the uncertainty on the normalisation channel. The fraction of signal events removed by the vetoes of the charmonium regions is determined from simulated B + → K 1 (1270) + µ + µ -events to be (21 3 . ± 1 5)%. . The uncertainty on this number is determined from a variation of the angle θ K 1 and the Figure 1: Invariant mass of B + → K π π + + -µ + µ -candidates in bins of q 2 with fit projections overlaid. The signal component (shaded light blue) is modelled by the sum of two Gaussian functions, each with a power-law tail at low mass. The background component (shaded dark blue) is modelled by an exponential function. In the q 2 ranges 4 30 . &lt; q 2 &lt; 8 68 GeV . 2 /c 4 , 10 09 . &lt; q 2 &lt; 12 86 GeV . 2 /c 4 , and 14 18 . &lt; q 2 &lt; 19 00 GeV . 2 /c 4 , scaling factors are applied to account for the vetoes of the radiative tails of the charmonium resonances, resulting in steps in the background mass shape. The lower right plot shows a separate fit to the signal decay integrated over all q 2 bins. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-f590736c-7cc3-425b-9f21-b078bfacd3a1.jpg) form-factor parameters within their uncertainties. Correcting for the charmonium vetoes Figure 2: Invariant mass distribution of (a) the control decay B + → J/ψK + π + π -and (b) the normalisation mode B + → ψ (2 S K ) + with fit projections overlaid. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-60619716-3a41-4360-a5a5-25e7022fae9f.jpg) Table 1: Signal yields for the decay B + → K π π + + -µ + µ -and resulting differential branching fractions in bins of q 2 . The first contribution to the uncertainty is statistical, the second systematic, where the uncertainty due to the branching fraction of the normalisation channel is included. The q 2 binning used corresponds to the binning used in previous analyses of b → sµ + µ -decays [1-3]. Results are also presented for the q 2 range from 1 to 6 GeV 2 /c 4 , where theory predictions are expected to be most reliable. | q 2 | bin [ GeV 2 /c 4 ] | N sig | d B d q 2 [ × 10 - 8 GeV - 2 c 4 ] | |---------------------|--------------------------|-----------------------------|--------------------------------------| | [ 0 . 10 , 2 . 00] | 134 . 1 +12 . 9 - 12 . 3 | 7 . 01 +0 . 69 - 0 . 65 ± | 0 . 47 | | [ 2 . 00 , 4 . 30] | 56 . 5 + 9 . 7 - 9 . 1 | 2 . 34 +0 . 41 - 0 . 38 | ± 0 . 15 | | [ 4 . 30 , 8 . 68] | 119 . 9 +14 . 6 - 13 . 7 | 2 . 30 +0 . 28 - 0 . 26 | ± 0 . 20 | | [10 . 09 , 12 . 86] | 54 . 0 +10 . 1 - 9 . 4 | 1 . 83 +0 . 34 - 0 . 32 | ± 0 . 17 | | [14 . 18 , 19 . 00] | 3 . 3 + 2 . - 2 . | 8 1 0 . 10 +0 . 08 - 0 . 06 | ± 0 . 01 | | [ 1 . 00 , 6 . 00] | 144 . 8 +14 . 9 - 14 . 3 | 2 . 75 +0 . 29 - 0 . 28 | ± 0 . 16 | yields a total branching fraction of $$\mathcal { B } ( B ^ { + } \rightarrow K ^ { + } \pi ^ { + } \pi ^ { - } \mu ^ { + } \mu ^ { - } ) = \left ( 4. 3 6 ^ { + 0. 2 9 } _ { - 0. 2 7 } ( \text{stat} ) \pm 0. 2 1 \left ( \text{syst} \right ) \pm 0. 1 8 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 }.$$ Since the systematic uncertainty due to the normalisation channel is significant, we also report the branching ratio of the signal channel with respect to its normalisation mode, which is determined to be $$\frac { \mathcal { B } ( B ^ { + } \to K ^ { + } \pi ^ { + } \pi ^ { - } \mu ^ { + } \mu ^ { - } ) } { \mathcal { B } ( B ^ { + } \to \psi ( 2 S ) K ^ { + } ) } = \left ( 6. 9 5 ^ { + 0. 4 6 } _ { - 0. 4 3 } \left ( \text{stat} \right ) \pm 0. 3 4 \left ( \text{syst} \right ) \right ) \times 1 0 ^ { - 4 }.$$ Due to the low signal yield, no attempt is made to resolve the different contributions to the K π π + + -system in the K π π µ µ + + -+ -final state. However, it is possible to obtain the LHCb ] Figure 3: Differential branching fraction d B ( B + → K π π + + -µ + µ -) / d q 2 . Errors shown include both statistical and systematic uncertainties. Shaded regions indicate the vetoed charmonium resonances. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-23c9f47d-4054-4de1-af5f-72f278322efb.jpg) Figure 4: Background-subtracted m K ( + π + π -) distributions for (a) the signal decay B + → K π π + + -µ + µ -and (b) the control channel B + → J/ψK + π + π -. The vertical lines indicate the masses of the K 1 (1270) + and K 1 (1400) + resonances. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-e5eb0f65-d0e2-4483-8dec-56a3cc6aeffd.jpg) m K π π ( + + -) distribution using the sPlot [32] technique. Figure 4 shows this distribution for the signal decay in the full q 2 region, as well as for the control decay B + → J/ψK + π + π -. For the signal decay B + → K π π µ µ + + -+ -the data are consistent with the presence of several broad and overlapping resonances. ## 4.1 Systematic uncertainties The dominant systematic uncertainty comes from the branching fraction of the normalisation mode B + → ψ (2 S K ) + , which is known to a precision of 6%. This uncertainty is fully correlated between the q 2 bins and is quoted separately. The systematic uncertainty introduced by the choice of signal mass model is estimated by re-evaluating the signal yield using a single Gaussian function with a power-law tail. To estimate the uncertainty of the background mass model, a linear mass shape is used instead of the nominal exponential function. The total systematic uncertainty assigned due to the modelling of the mass distribution is approximately 2%. The majority of systematic effects bias the efficiency ratio glyph[epsilon1] norm /glyph[epsilon1] sig , which is determined using simulation. To account for differences between data and simulation, corrections based on data are applied to simulated events. The efficiency to identify kaons is corrected by using large D ∗ + → D 0 ( → K π -+ ) π + control samples. Muon identification performance and tracking efficiency are corrected using J/ψ → µ + µ -decays. In addition, track multiplicity and vertex fit quality are weighted according to the control channel B + → J/ψK + π + π -. The systematic uncertainties associated with these corrections are evaluated by determining the branching fraction without the correction and taking the full observed deviation as a systematic uncertainty. In total, they constitute a systematic uncertainty of around 1%. The software trigger is observed to be well described in simulation, but slight discrepancies are observed for the hardware stage. These are corrected by weighting the simulated samples according to the maximum muon p T . The branching fraction is recalculated without these weights, and the observed difference of 1% is assigned as the systematic uncertainty from the trigger simulation. Additional systematic uncertainties stem from the fact that simulated B + → K 1 (1270) + µ + µ -events, modelled according to Ref. [17], are used to determine the efficiency ratio glyph[epsilon1] norm /glyph[epsilon1] sig . To account for contributions other than the K 1 (1270) + to the K π π + + -system, events are weighted according to the m K π π ( + + -) distribution shown in Fig. 4. This results in a systematic uncertainty of 1-2%, depending on the q 2 range considered. The effect of a potentially different q 2 distribution of the signal decay is evaluated by defining the efficiency ratio using B + → K 1 (1270) + µ + µ -events generated according to a phase-space model. The observed deviation results in a systematic uncertainty of 1-2%. ## 5 Branching fraction of the decay B + → φK µ µ + + - The signal decay B + → φK µ µ + + -is expected to be rarer than the decay B + → K π π µ µ + + -+ -as an ss ¯ quark pair must be created from the vacuum. Therefore, only the total branching fraction of this decay mode is determined. Figure 5a shows the B + → φK µ µ + + -signal candidates after the full selection. The signal yield is determined to be N sig = 25 2 . +6 0 . -5 3 . using an extended maximum likelihood fit to the unbinned φK µ µ + + -mass distribution. The statistical significance of the signal, calculated using Wilks' theorem, is 6 6 . σ . The signal component is modelled using the sum of two Gaussian functions with a tail described by a power law on the low-mass side. The background mass shape is modelled using a second-order Chebychev polynomial. The parameters describing the signal mass shape are fixed to those determined using the normalisation mode B + → J/ψφK + , as shown in Fig. 5b. The yield of the normalisation mode is Figure 5: Invariant m φK ( + µ + µ -) distributions for (a) B + → φK µ µ + + -and (b) B + → J/ψφK + decays with fit projections overlaid. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1137v2-figure-2ce421b2-a711-4dcb-8bcb-f5c1e9ce8203.jpg) ## N norm = 1908 ± 63. To determine the total branching fraction of the decay B + → φK µ µ + + -, the formula $$\mathcal { B } ( B ^ { + } \rightarrow \phi K ^ { + } \mu ^ { + } \mu ^ { - } ) = \frac { N ^ { \prime } _ { s i g } } { N _ { n o r m } } \cdot \mathcal { B } ( B ^ { + } \rightarrow J / \psi \phi K ^ { + } ) \cdot \mathcal { B } ( J / \psi \rightarrow \mu ^ { + } \mu ^ { - } )$$ is used. Here, N ′ sig denotes the signal yield determined in a fit where signal candidates are weighted by the relative efficiency glyph[epsilon1] norm /glyph[epsilon1] sig ( q 2 ), according to their q 2 value. This is necessary since the efficiency ratio varies significantly over the full q 2 range. The weights are determined in bins of q 2 , with the same choice of q 2 bins as in Table 1. Using the branching fraction of the normalisation channel, the integrated branching fraction is determined to be ( 0 81 . +0 18 . -0 16 . (stat) ± 0 03 (syst) . ± 0 27 (norm) . ) × 10 -7 . The fraction of signal events rejected by the charmonium vetoes is (2 +10 -2 )%. This is calculated using simulated B + → φK µ µ + + -events generated according to a phase-space model. The uncertainty is estimated by comparison with the model given in Ref. [17] for the decay B + → K 1 (1270) + µ + µ -and weighting to correct for the large mass of the φK + system. Accounting for the charmonium vetoes results in a total branching fraction of $$\mathcal { B } ( B ^ { + } \rightarrow \phi K ^ { + } \mu ^ { + } \mu ^ { - } ) = \left ( 0. 8 2 ^ { + 0. 1 9 } _ { - 0. 1 7 } ( \text{stat} ) ^ { + 0. 1 0 } _ { - 0. 0 4 } ( \text{syst} ) \pm 0. 2 7 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 }.$$ The branching fraction of the signal channel with respect to its normalisation mode is determined to be $$\frac { \mathcal { B } ( B ^ { + } \to \phi K ^ { + } \mu ^ { + } \mu ^ { - } ) } { \mathcal { B } ( B ^ { + } \to J / \psi \phi K ^ { + } ) } = \left ( 1. 5 8 ^ { + 0. 3 6 } _ { - 0. 3 2 } ( \text{stat} ) ^ { + 0. 1 9 } _ { - 0. 0 7 } ( \text{syst} ) \right ) \times 1 0 ^ { - 3 }.$$ ## 5.1 Systematic uncertainties The main systematic uncertainty arises from the measurement of the branching fraction of the normalisation channel, which is known to 33% [29]. The systematic uncertainty due to the choice of signal mass model is determined by using a single Gaussian function with power-law tail on the low-mass side to determine the signal yield. For the background mass model, a first-order polynomial, instead of the nominal second-order polynomial, is used. The total systematic uncertainty from the model used to describe the m φK ( + µ + µ -) distribution is 3%. The majority of the systematic uncertainties affect the efficiency ratio glyph[epsilon1] norm /glyph[epsilon1] sig ( q 2 ) and arise from the corrections based on data that are applied to simulation, as described in Sec. 4.1. The systematic uncertainties caused by these corrections are determined to be 1% in total. The limited size of the simulated samples available to calculate the efficiency ratio introduces an uncertainty of 1 5%. . Imperfect modelling of the hardware trigger is corrected for in the same way as for the measurement of B ( B + → K π π µ µ + + -+ -) in Sec. 4 and results in a systematic uncertainty of 1 5%. . The efficiency ratio glyph[epsilon1] norm /glyph[epsilon1] sig ( q 2 ) is determined using simulated B + → φK µ µ + + -events generated according to a phase-space model. The uncertainty due to the q 2 distribution in the bins is evaluated by weighting simulated events to reproduce the q 2 distribution of B + → K 1 (1270) + µ + µ -decays. This leads to a systematic uncertainty of 1 5%. . ## 6 Conclusions First observations of the rare b → s FCNC decays B + → K π π µ µ + + -+ -and B + → φK µ µ + + -are presented. Their branching fractions are measured to be $$\mathcal { B } ( B ^ { + } \to K ^ { + } \pi ^ { + } \pi ^ { - } \mu ^ { + } \mu ^ { - } ) & = \left ( 4. 3 6 \, _ { - 0. 2 7 } ^ { + 0. 2 9 } \left ( \text{stat} \right ) \pm 0. 2 1 \left ( \text{syst} \right ) \pm 0. 1 8 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 }, \\ \mathcal { B } ( B ^ { + } \to \phi K ^ { + } \mu ^ { + } \mu ^ { - } ) & = \left ( 0. 8 2 \, _ { - 0. 1 7 } ^ { + 0. 1 9 } \left ( \text{stat} \right ) \, _ { - 0. 0 4 } ^ { + 0. 1 0 } \left ( \text{syst} \right ) \pm 0. 2 7 \left ( \text{norm} \right ) \right ) \times 1 0 ^ { - 7 },$$ where the first uncertainties are statistical, the second systematic and the third due to the uncertainties on the normalisation channels. Accounting for the branching fraction B ( K 1 (1270) + → K π π + + -) = (35 7 . ± 3 7)% [29], . the measured branching fraction for the decay B + → K π π µ µ + + -+ -is lower than, but compatible with, the SM prediction of B ( B + → K 1 (1270) + µ + µ -) = (2 3 . +1 3 +0 0 . -1 0 . . -0 2 . ) × 10 -6 [17]. For the decay B + → K π π µ µ + + -+ -, the differential branching fraction d B ( B + → K π π µ µ + + -+ -) / d q 2 is also determined. ## Acknowledgements We express our gratitude to our colleagues in the CERN accelerator departments for the excellent performance of the LHC. We thank the technical and administrative staff at the LHCb institutes. We acknowledge support from CERN and from the national agencies: CAPES, CNPq, FAPERJ and FINEP (Brazil); NSFC (China); CNRS/IN2P3 (France); BMBF, DFG, HGF and MPG (Germany); SFI (Ireland); INFN (Italy); FOM and NWO (The Netherlands); MNiSW and NCN (Poland); MEN/IFA (Romania); MinES and FANO (Russia); MinECo (Spain); SNSF and SER (Switzerland); NASU (Ukraine); STFC (United Kingdom); NSF (USA). The Tier1 computing centres are supported by IN2P3 (France), KIT and BMBF (Germany), INFN (Italy), NWO and SURF (The Netherlands), PIC (Spain), GridPP (United Kingdom). We are indebted to the communities behind the multiple open source software packages on which we depend. We are also thankful for the computing resources and the access to software R&amp;D tools provided by Yandex LLC (Russia). Individual groups or members have received support from EPLANET, Marie Skglyph[suppress]odowska-Curie l Actions and ERC (European Union), Conseil g´ en´ral de Haute-Savoie, e Labex ENIGMASS and OCEVU, R´ egion Auvergne (France), RFBR (Russia), XuntaGal and GENCAT (Spain), Royal Society and Royal Commission for the Exhibition of 1851 (United Kingdom). ## References - [1] LHCb collaboration, R. Aaij et al. , Differential branching fraction and angular analysis of the decay B 0 → K µ µ ∗ 0 + -, JHEP 08 (2013) 131, arXiv:1304.6325 . - [2] LHCb collaboration, R. Aaij et al. , Measurement of form factor independent observables in the decay B 0 → K µ µ ∗ 0 + -, Phys. Rev. Lett. 111 (2013) 191801, arXiv:1308.1707 . - [3] LHCb collaboration, R. Aaij et al. , Differential branching fraction and angular analysis of the decay B 0 s → φµ + µ -, JHEP 07 (2013) 084, arXiv:1305.2168 . - [4] LHCb collaboration, R. Aaij et al. , Differential branching fractions and isospin asymmetry of B → K ( ∗ ) µ + µ + decays , JHEP 06 (2014) 133, arXiv:1403.8044 . - [5] Belle collaboration, H. Guler et al. , Study of the K π π + + -final state in B + → J/ψK + π + π -and B + → ψ K ′ + π + π -, Phys. Rev. D83 (2011) 032005, arXiv:1009.5256 . - [6] M. Suzuki, Strange axial-vector mesons , Phys. Rev. D47 (1993) 1252. - [7] A. Tayduganov, E. Kou, and A. Le Yaouanc, The strong decays of K 1 resonances , Phys. Rev. D85 (2012) 074011, arXiv:1111.6307 . - [8] H. Hatanaka and K.-C. Yang, B → K (1) γ decays in the light-cone QCD sum rules , Phys. Rev. D77 (2008) 094023, arXiv:0804.3198 . - [9] H.-Y. Cheng, Revisiting axial-vector meson mixing , Phys. Lett. B707 (2012) 116, arXiv:1110.2249 . - [10] F. Divotgey, L. Olbrich, and F. Giacosa, Phenomenology of axial-vector and pseudovector mesons: decays and mixing in the kaonic sector , Eur. Phys. J. A49 (2013) 135, arXiv:1306.1193 . - [11] H.-Y. Cheng, Mixing angle of K 1 axial vector mesons , arXiv:1311.2370 . | [12] | CLEO collaboration, C. Jessop et al. , First observation of the decay B → J/ψφK , Phys. Rev. Lett. 84 (2000) 1393, arXiv:hep-ex/9908014 . | |--------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [13] | CDF collaboration, T. Aaltonen et al. , Evidence for a narrow near-threshold structure in the J/ψφ mass spectrum in B + → J/ψφK + decays , Phys. Rev. Lett. 102 (2009) 242002, arXiv:0903.2229 . | | [14] | LHCb collaboration, R. Aaij et al. , Search for the X (4140) state in B + → J/ψφK + decays , Phys. Rev. D85 (2012) 091103, arXiv:1202.5087 . | | [15] | D0 collaboration, V. M. Abazov et al. , Search for the X (4140) state in B + → J/ψφK + decays with the D0 detector , Phys. Rev. D89 (2014) 012004, arXiv:1309.6580 . | | [16] | CMS collaboration, S. Chatrchyan et al. , Observation of a peaking structure in the J/ψφ mass spectrum from B ± → J/ψφK ± decays , Phys. Lett. B734 (2014) 261, arXiv:1309.6920 . | | [17] | H. Hatanaka and K.-C. Yang, K 1 (1270) - K 1 (1400) mixing angle and new-physics effects in B → K 1 glyph[lscript] + glyph[lscript] - decays , Phys. Rev. D78 (2008) 074007, arXiv:0808.3731 . | | [18] | LHCb collaboration, A. A. Alves Jr. et al. , The LHCb detector at the LHC , JINST 3 (2008) S08005. | | [19] | M. Adinolfi et al. , Performance of the LHCb RICH detector at the LHC , Eur. Phys. J. C73 (2013) 2431, arXiv:1211.6759 . | | [20] | A. A. Alves Jr. et al. , Performance of the LHCb muon system , JINST 8 (2013) P02022, arXiv:1211.1346 . | | [21] | R. Aaij et al. , The LHCb trigger and its performance in 2011 , JINST 8 (2013) P04022, arXiv:1211.3055 . | | [22] | T. Sj¨strand, o S. Mrenna, and P. Skands, PYTHIA 6.4 physics and manual , JHEP 05 (2006) 026, arXiv:hep-ph/0603175 ; T. Sj¨strand, o S. Mrenna, and P. Skands, A brief introduction to PYTHIA 8.1 , Comput. Phys. Commun. 178 (2008) 852, arXiv:0710.3820 . | | [23] | I. Belyaev et al. , Handling of the generation of primary events in Gauss , the LHCb simulation framework , Nuclear Science Symposium Conference Record (NSS/MIC) IEEE (2010) 1155. | | [24] | D. J. Lange, The EvtGen particle decay simulation package , Nucl. Instrum. Meth. A462 (2001) 152. | | [25] | P. Golonka and Z. Was, PHOTOS Monte Carlo: A precision tool for QED corrections in Z and W decays , Eur. Phys. J. C45 (2006) 97, arXiv:hep-ph/0506026 . | | [26] | Geant4 collaboration, J. Allison et al. , Geant4 developments and applications , IEEE Trans. Nucl. Sci. 53 (2006) 270; Geant4 collaboration, S. Agostinelli et al. , Geant4: A simulation toolkit , Nucl. Instrum. Meth. A506 (2003) 250. | |--------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [27] | M. Clemencic et al. , The LHCb simulation application, Gauss : Design, evolution and experience , J. Phys. Conf. Ser. 331 (2011) 032023. | | [28] | V. V. Gligorov and M. Williams, Efficient, reliable and fast high-level triggering using a bonsai boosted decision tree , JINST 8 (2013) P02013, arXiv:1210.6861 . | | [29] | Particle Data Group, J. Beringer et al. , Review of particle physics , Phys. Rev. D86 (2012) 010001, and 2013 partial update for the 2014 edition. | | [30] | L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and regression trees , Wadsworth international group, Belmont, California, USA, 1984. | | [31] | R. E. Schapire and Y. Freund, A decision-theoretic generalization of on-line learning and an application to boosting , Jour. Comp. and Syst. Sc. 55 (1997) 119. | | [32] | M. Pivk and F. R. Le Diberder, sPlot: A statistical tool to unfold data distributions , Nucl. Instrum. Meth. A555 (2005) 356, arXiv:physics/0402083 . | | [33] | S. S. Wilks, The large-sample distribution of the likelihood ratio for testing composite hypotheses , Ann. Math. Statist. 9 (1938) 60. | ## LHCb collaboration | R. Aaij 41 , B. Adeva 37 , M. Adinolfi 46 , A. Affolder 52 , Z. Ajaltouni 5 , S. Akar 6 , J. Albrecht 9 , F. Alessio 38 , M. Alexander 51 , S. Ali 41 , G. Alkhazov 30 , P. Alvarez Cartelle 37 , A.A. Alves Jr 25 , 38 , S. Amato 2 , S. Amerio 22 , Y. Amhis 7 , L. An 3 , L. Anderlini 17 ,g , J. Anderson 40 , R. Andreassen 57 , M. Andreotti 16 ,f , J.E. Andrews 58 , R.B. Appleby 54 , O. Aquines Gutierrez 10 , F. Archilli 38 , A. Artamonov 35 , M. Artuso 59 , E. Aslanides 6 , G. Auriemma 25 ,n , M. Baalouch 5 , S. Bachmann 11 , J.J. Back 48 , A. Badalov 36 , W. Baldini 16 , R.J. Barlow 54 , C. Barschel 38 , S. Barsuk 7 , W. Barter 47 , V. Batozskaya 28 , V. Battista 39 , A. Bay 39 , L. Beaucourt 4 , J. Beddow 51 , F. Bedeschi 23 , I. Bediaga 1 , S. Belogurov 31 , K. Belous 35 , I. Belyaev 31 , E. Ben-Haim 8 , G. Bencivenni 18 , S. Benson 38 , J. Benton 46 , A. Berezhnoy 32 , R. Bernet 40 , M.-O. Bettler 47 , M. van Beuzekom 41 , A. Bien 11 , S. Bifani 45 , T. Bird 54 , A. Bizzeti 17 ,i , P.M. Bjørnstad 54 , T. Blake 48 , F. Blanc 39 , J. Blouw 10 , S. Blusk 59 , V. Bocci 25 , A. Bondar 34 , N. Bondar 30 , 38 , W. Bonivento 15 , 38 , S. Borghi 54 A. Borgia 59 , M. Borsato 7 , T.J.V. Bowcock 52 , E. Bowen 40 , C. Bozzi 16 , T. Brambach 9 , J. van den Brand 42 , J. Bressieux 39 , D. Brett 54 , M. Britsch 10 , T. Britton 59 , J. Brodzicka 54 , N.H. Brook 46 , H. Brown 52 , A. Bursche 40 , G. Busetto 22 ,r , J. Buytaert 38 , S. Cadeddu 15 , | |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | , R. Calabrese 16 ,f , M. Calvi 20 ,k , M. Calvo Gomez 36 ,p , P. Campana 18 , 38 , D. Campora Perez 38 , A. Carbone 14 ,d , G. Carboni 24 ,l , R. Cardinale 19 , 38 ,j , A. Cardini 15 , L. Carson 50 , K. Carvalho Akiba 2 , G. Casse 52 , L. Cassina 20 , L. Castillo Garcia 38 , M. Cattaneo 38 , Ch. Cauet 9 , R. Cenci 58 , M. Charles 8 , Ph. Charpentier 38 , S. Chen 54 , S.-F. Cheung 55 , N. Chiapolini 40 , M. Chrzaszcz 40 , 26 , K. Ciba 38 , X. Cid Vidal 38 , G. Ciezarek 53 , P.E.L. Clarke 50 , M. Clemencic 38 , H.V. Cliff 47 , J. Closier 38 , V. Coco 38 , J. Cogan 6 , E. Cogneras 5 , P. Collins 38 , A. Comerma-Montells 11 , A. Contu 15 , A. Cook 46 , M. Coombes 46 , S. Coquereau 8 , G. Corti 38 , M. Corvo 16 ,f , I. Counts 56 , B. Couturier 38 , G.A. Cowan 50 , D.C. Craik 48 , M. Cruz Torres 60 , S. Cunliffe 53 , R. Currie 50 , C. D'Ambrosio 38 , J. Dalseno 46 , P. David 8 , P.N.Y. David 41 , A. Davis 57 , K. De Bruyn 41 , S. De Capua 54 , M. De Cian 11 , J.M. De Miranda 1 , L. De Paula 2 , W. De Silva 57 , P. De Simone 18 , D. Decamp 4 , M. Deckenhoff 9 , L. Del Buono 8 , N. D´l´age e e 4 , D. Derkach 55 , O. Deschamps 5 , F. Dettori 38 , A. Di Canto 38 , H. Dijkstra 38 , S. Donleavy 52 , F. Dordei 11 , | D.M. Saunders 46 , M. Savrie 16 ,f , D. Savrina 31 32 , , M. Schiller 42 , H. Schindler 38 , M. Schlupp , 9 M. Schmelling 10 , B. Schmidt 38 , O. Schneider 39 , A. Schopper 38 , M.-H. Schune , R. Schwemmer 7 38 , B. Sciascia 18 , A. Sciubba 25 , M. Seco 37 , A. Semennikov 31 , I. Sepp 53 , N. Serra 40 , J. Serrano , 6 L. Sestini 22 , P. Seyfert 11 , M. Shapkin 35 , I. Shapoval 16 43 , ,f , Y. Shcheglov 30 , T. Shears 52 , L. Shekhtman 34 , V. Shevchenko 63 , A. Shires , R. Silva Coutinho 9 48 , G. Simi 22 , M. Sirendi 47 , N. Skidmore 46 , T. Skwarnicki 59 , N.A. Smith 52 , E. Smith 55 49 , , E. Smith 53 , J. Smith 47 , M. Smith 54 , H. Snoek 41 , M.D. Sokoloff 57 , F.J.P. Soler 51 , F. Soomro 39 , D. Souza 46 , B. Souza De Paula , B. Spaan , A. Sparkes 2 9 50 , P. Spradlin 51 , S. Sridharan 38 , F. Stagni 38 , M. Stahl 11 , S. Stahl 11 , O. Steinkamp 40 , O. Stenyakin 35 , S. Stevenson 55 , S. Stoica 29 , S. Stone 59 , B. Storaci 40 , S. Stracka 23 38 , , M. Straticiuc 29 , U. Straumann 40 , R. Stroili 22 , V.K. Subbiah 38 , L. Sun 57 , W. Sutcliffe 53 , K. Swientek 27 , S. Swientek , V. Syropoulos 9 42 , M. Szczekowski 28 , P. Szczypka 39 38 , , D. Szilard , T. Szumlak 2 27 , S. T'Jampens , M. Teklishyn , G. Tellarini 4 7 16 ,f , F. Teubert 38 , C. Thomas 55 , E. Thomas 38 , J. van Tilburg 41 , V. Tisserand , M. Tobin 4 39 , S. Tolk 42 , L. Tomassetti 16 ,f , D. Tonelli 38 , S. Topp-Joergensen 55 , N. Torr 55 , E. Tournefier , 4 S. Tourneur 39 , M.T. Tran 39 , M. Tresch 40 , A. Tsaregorodtsev , P. Tsopelas 6 41 , N. Tuning 41 , M. Ubeda Garcia 38 , A. Ukleja 28 , A. Ustyuzhanin 63 , U. Uwer 11 , V. Vagnoni 14 , G. Valenti 14 , A. Vallier 7 , R. Vazquez Gomez 18 , P. Vazquez Regueiro 37 , C. V´ azquez Sierra 37 , S. Vecchi 16 , J.J. Velthuis 46 , M. Veltri 17 ,h , G. Veneziano 39 , M. Vesterinen 11 , B. Viaud , D. Vieira , 7 2 M. Vieites Diaz 37 , X. Vilasis-Cardona 36 ,p , A. Vollhardt 40 , D. Volyanskyy 10 , D. Voong 46 , A. Vorobyev 30 , V. Vorobyev 34 , C. Voß 62 , H. Voss 10 , J.A. de Vries 41 , R. Waldi 62 , C. Wallace 48 , R. Wallace 12 , J. Walsh 23 , S. Wandernoth 11 , J. Wang 59 , D.R. Ward 47 , N.K. Watson 45 , D. Websdale 53 , M. Whitehead 48 , J. Wicht 38 , D. Wiedner 11 , G. Wilkinson 55 , M.P. Williams 45 , M. Williams 56 , F.F. Wilson 49 , J. Wimberley 58 , J. Wishahi , W. Wislicki 9 28 , M. Witek 26 , G. Wormser , S.A. Wotton 7 47 , S. Wright 47 , S. Wu , K. Wyllie 3 38 , Y. Xie 61 , Z. Xing 59 , Z. Xu 39 , Z. Yang , X. Yuan , O. Yushchenko 3 3 35 , M. Zangoli 14 , M. Zavertyaev 10 ,b , L. Zhang 59 , W.C. Zhang 12 , Y. Zhang , A. Zhelezov 3 11 , A. Zhokhov 31 , L. Zhong , A. Zvyagin 3 38 . 1 Centro Brasileiro de Pesquisas F´ ısicas (CBPF), Rio de Janeiro, Brazil 2 Universidade Federal do Rio de Janeiro (UFRJ), Rio de Janeiro, Brazil 3 Center for High Energy Physics, Tsinghua University, Beijing, China 4 LAPP, Universit´ e de Savoie, CNRS/IN2P3, Annecy-Le-Vieux, France 5 Clermont Universit´, Universit´ Blaise Pascal, CNRS/IN2P3, LPC, Clermont-Ferrand, France e e 6 CPPM, Aix-Marseille Universit´, CNRS/IN2P3, Marseille, France e 7 LAL, Universit´ Paris-Sud, CNRS/IN2P3, Orsay, France e - 8 LPNHE, Universit´ e Pierre et Marie Curie, Universit´ Paris Diderot, CNRS/IN2P3, Paris, France e 9 Fakult¨t Physik, Technische Universit¨t Dortmund, Dortmund, Germany a a 10 Max-Planck-Institut f¨r Kernphysik (MPIK), Heidelberg, Germany u - 11 Physikalisches Institut, Ruprecht-Karls-Universit¨t Heidelberg, Heidelberg, Germany a - 12 School of Physics, University College Dublin, Dublin, Ireland 13 Sezione INFN di Bari, Bari, Italy 14 Sezione INFN di Bologna, Bologna, Italy - 15 Sezione INFN di Cagliari, Cagliari, Italy - 16 Sezione INFN di Ferrara, Ferrara, Italy - 17 Sezione INFN di Firenze, Firenze, Italy - 18 Laboratori Nazionali dell'INFN di Frascati, Frascati, Italy - 19 Sezione INFN di Genova, Genova, Italy - 20 Sezione INFN di Milano Bicocca, Milano, Italy 21 Sezione INFN di Milano, Milano, Italy 22 Sezione INFN di Padova, Padova, Italy - 23 Sezione INFN di Pisa, Pisa, Italy - 24 Sezione INFN di Roma Tor Vergata, Roma, Italy - 25 Sezione INFN di Roma La Sapienza, Roma, Italy - 26 Henryk Niewodniczanski Institute of Nuclear Physics Polish Academy of Sciences, Krak´w, Poland o - 27 AGH - University of Science and Technology, Faculty of Physics and Applied Computer Science, Krak´ ow, Poland - 28 National Center for Nuclear Research (NCBJ), Warsaw, Poland - 29 Horia Hulubei National Institute of Physics and Nuclear Engineering, Bucharest-Magurele, Romania - 30 - Petersburg Nuclear Physics Institute (PNPI), Gatchina, Russia - 31 Institute of Theoretical and Experimental Physics (ITEP), Moscow, Russia - 32 Institute of Nuclear Physics, Moscow State University (SINP MSU), Moscow, Russia - 33 Institute for Nuclear Research of the Russian Academy of Sciences (INR RAN), Moscow, Russia - 34 Budker Institute of Nuclear Physics (SB RAS) and Novosibirsk State University, Novosibirsk, Russia - 35 Institute for High Energy Physics (IHEP), Protvino, Russia - 36 Universitat de Barcelona, Barcelona, Spain - 37 Universidad de Santiago de Compostela, Santiago de Compostela, Spain - 38 European Organization for Nuclear Research (CERN), Geneva, Switzerland - 39 Ecole Polytechnique F´d´rale de Lausanne (EPFL), Lausanne, Switzerland e e - 40 Physik-Institut, Universit¨t Z¨rich, Z¨rich, Switzerland a u u - 41 Nikhef National Institute for Subatomic Physics, Amsterdam, The Netherlands - 42 Nikhef National Institute for Subatomic Physics and VU University Amsterdam, Amsterdam, The Netherlands - 43 NSC Kharkiv Institute of Physics and Technology (NSC KIPT), Kharkiv, Ukraine - 44 Institute for Nuclear Research of the National Academy of Sciences (KINR), Kyiv, Ukraine - 45 University of Birmingham, Birmingham, United Kingdom - 46 H.H. Wills Physics Laboratory, University of Bristol, Bristol, United Kingdom - 47 Cavendish Laboratory, University of Cambridge, Cambridge, United Kingdom - 48 Department of Physics, University of Warwick, Coventry, United Kingdom - 49 STFC Rutherford Appleton Laboratory, Didcot, United Kingdom - 50 School of Physics and Astronomy, University of Edinburgh, Edinburgh, United Kingdom - 51 School of Physics and Astronomy, University of Glasgow, Glasgow, United Kingdom - 52 Oliver Lodge Laboratory, University of Liverpool, Liverpool, United Kingdom - 53 Imperial College London, London, United Kingdom - 54 School of Physics and Astronomy, University of Manchester, Manchester, United Kingdom - 55 Department of Physics, University of Oxford, Oxford, United Kingdom - 56 Massachusetts Institute of Technology, Cambridge, MA, United States - 57 University of Cincinnati, Cincinnati, OH, United States - 58 University of Maryland, College Park, MD, United States - 59 Syracuse University, Syracuse, NY, United States - 60 Pontif´ ıcia Universidade Cat´lica do Rio de Janeiro (PUC-Rio), Rio de Janeiro, Brazil, associated to o 2 - 61 Institute of Particle Physics, Central China Normal University, Wuhan, Hubei, China, associated to 3 - 62 Institut f¨r Physik, Universit¨t Rostock, Rostock, Germany, associated to u a 11 - 63 National Research Centre Kurchatov Institute, Moscow, Russia, associated to 31 - 64 Instituto de Fisica Corpuscular (IFIC), Universitat de Valencia-CSIC, Valencia, Spain, associated to 36 - 65 KVI - University of Groningen, Groningen, The Netherlands, associated to 41 - 66 Celal Bayar University, Manisa, Turkey, associated to 38 a Universidade Federal do Triˆngulo Mineiro (UFTM), Uberaba-MG, Brazil a - b P.N. Lebedev Physical Institute, Russian Academy of Science (LPI RAS), Moscow, Russia c Universit` di Bari, Bari, Italy a d Universit` di Bologna, Bologna, Italy a e Universit` di Cagliari, Cagliari, Italy a - f Universit` di Ferrara, Ferrara, Italy a - g Universit` di Firenze, Firenze, Italy a - h Universit` di Urbino, Urbino, Italy a - i Universit` di Modena e Reggio Emilia, Modena, Italy a - j Universit` di Genova, Genova, Italy a - k Universit` di Milano Bicocca, Milano, Italy a - l Universit` di Roma Tor Vergata, Roma, Italy a - m Universit` di Roma La Sapienza, Roma, Italy a - n Universit` della Basilicata, Potenza, Italy a - o AGH - University of Science and Technology, Faculty of Computer Science, Electronics and Telecommunications, Krak´w, Poland o - p LIFAELS, La Salle, Universitat Ramon Llull, Barcelona, Spain - q Hanoi University of Science, Hanoi, Viet Nam - r Universit` di Padova, Padova, Italy a - s Universit` di Pisa, Pisa, Italy a - t Scuola Normale Superiore, Pisa, Italy u Universit` degli Studi di Milano, Milano, Italy a
10.1007/JHEP10(2014)064
[ "LHCb collaboration", "R. Aaij", "B. Adeva", "M. Adinolfi", "A. Affolder", "Z. Ajaltouni", "S. Akar", "J. Albrecht", "F. Alessio", "M. Alexander", "S. Ali", "G. Alkhazov", "P. Alvarez Cartelle", "A. A. Alves Jr", "S. Amato", "S. Amerio", "Y. Amhis", "L. An", "L. Anderlini", "J. Anderson", "R. Andreassen", "M. Andreotti", "J. E. Andrews", "R. B. Appleby", "O. Aquines Gutierrez", "F. Archilli", "A. Artamonov", "M. Artuso", "E. Aslanides", "G. Auriemma", "M. Baalouch", "S. Bachmann", "J. J. Back", "A. Badalov", "W. Baldini", "R. J. Barlow", "C. Barschel", "S. Barsuk", "W. Barter", "V. Batozskaya", "V. Battista", "A. Bay", "L. Beaucourt", "J. Beddow", "F. Bedeschi", "I. Bediaga", "S. Belogurov", "K. Belous", "I. Belyaev", "E. Ben-Haim", "G. Bencivenni", "S. Benson", "J. Benton", "A. Berezhnoy", "R. Bernet", "M. -O. Bettler", "M. van Beuzekom", "A. Bien", "S. Bifani", "T. Bird", "A. Bizzeti", "P. M. Bjørnstad", "T. Blake", "F. Blanc", "J. Blouw", "S. Blusk", "V. Bocci", "A. Bondar", "N. Bondar", "W. Bonivento", "S. Borghi", "A. Borgia", "M. Borsato", "T. J. V. Bowcock", "E. Bowen", "C. Bozzi", "T. Brambach", "J. van den Brand", "J. Bressieux", "D. Brett", "M. Britsch", "T. Britton", "J. Brodzicka", "N. H. Brook", "H. Brown", "A. Bursche", "G. Busetto", "J. Buytaert", "S. Cadeddu", "R. Calabrese", "M. Calvi", "M. Calvo Gomez", "P. Campana", "D. Campora Perez", "A. Carbone", "G. Carboni", "R. Cardinale", "A. Cardini", "L. Carson", "K. Carvalho Akiba", "G. Casse", "L. Cassina", "L. Castillo Garcia", "M. Cattaneo", "Ch. Cauet", "R. Cenci", "M. Charles", "Ph. Charpentier", "S. Chen", "S. -F. Cheung", "N. Chiapolini", "M. Chrzaszcz", "K. Ciba", "X. Cid Vidal", "G. Ciezarek", "P. E. L. Clarke", "M. Clemencic", "H. V. Cliff", "J. Closier", "V. Coco", "J. Cogan", "E. Cogneras", "P. Collins", "A. Comerma-Montells", "A. Contu", "A. Cook", "M. Coombes", "S. Coquereau", "G. Corti", "M. Corvo", "I. Counts", "B. Couturier", "G. A. Cowan", "D. C. Craik", "M. Cruz Torres", "S. Cunliffe", "R. Currie", "C. D'Ambrosio", "J. Dalseno", "P. David", "P. N. Y. David", "A. Davis", "K. De Bruyn", "S. De Capua", "M. De Cian", "J. M. De Miranda", "L. De Paula", "W. De Silva", "P. De Simone", "D. Decamp", "M. Deckenhoff", "L. Del Buono", "N. Déléage", "D. Derkach", "O. Deschamps", "F. Dettori", "A. Di Canto", "H. Dijkstra", "S. Donleavy", "F. Dordei", "M. Dorigo", "A. Dosil Suárez", "D. Dossett", "A. Dovbnya", "K. Dreimanis", "G. Dujany", "F. Dupertuis", "P. Durante", "R. Dzhelyadin", "A. Dziurda", "A. Dzyuba", "S. Easo", "U. Egede", "V. Egorychev", "S. Eidelman", "S. Eisenhardt", "U. Eitschberger", "R. Ekelhof", "L. Eklund", "I. El Rifai", "Ch. Elsasser", "S. Ely", "S. Esen", "H. -M. Evans", "T. Evans", "A. Falabella", "C. Färber", "C. Farinelli", "N. Farley", "S. Farry", "RF Fay", "D. Ferguson", "V. Fernandez Albor", "F. Ferreira Rodrigues", "M. Ferro-Luzzi", "S. Filippov", "M. Fiore", "M. Fiorini", "M. Firlej", "C. Fitzpatrick", "T. Fiutowski", "M. Fontana", "F. Fontanelli", "R. Forty", "O. Francisco", "M. Frank", "C. Frei", "M. Frosini", "J. Fu", "E. Furfaro", "A. Gallas Torreira", "D. Galli", "S. Gallorini", "S. Gambetta", "M. Gandelman", "P. Gandini", "Y. Gao", "J. García Pardiñas", "J. Garofoli", "J. Garra Tico", "L. Garrido", "C. Gaspar", "R. Gauld", "L. Gavardi", "G. Gavrilov", "E. Gersabeck", "M. Gersabeck", "T. Gershon", "Ph. Ghez", "A. Gianelle", "S. Giani'", "V. Gibson", "L. Giubega", "V. V. Gligorov", "C. Göbel", "D. Golubkov", "A. Golutvin", "A. Gomes", "C. Gotti", "M. Grabalosa Gándara", "R. Graciani Diaz", "L. A. Granado Cardoso", "E. Graugés", "G. Graziani", "A. Grecu", "E. Greening", "S. Gregson", "P. Griffith", "L. Grillo", "O. Grünberg", "B. Gui", "E. Gushchin", "Yu. Guz", "T. Gys", "C. Hadjivasiliou", "G. Haefeli", "C. Haen", "S. C. Haines", "S. Hall", "B. Hamilton", "T. Hampson", "X. Han", "S. Hansmann-Menzemer", "N. Harnew", "S. T. Harnew", "J. Harrison", "J. He", "T. Head", "V. Heijne", "K. Hennessy", "P. Henrard", "L. Henry", "J. A. Hernando Morata", "E. van Herwijnen", "M. Heß", "A. Hicheur", "D. Hill", "M. Hoballah", "C. Hombach", "W. Hulsbergen", "P. Hunt", "N. Hussain", "D. Hutchcroft", "D. Hynds", "M. Idzik", "P. Ilten", "R. Jacobsson", "A. Jaeger", "J. Jalocha", "E. Jans", "P. Jaton", "A. Jawahery", "F. Jing", "M. John", "D. Johnson", "C. R. Jones", "C. Joram", "B. Jost", "N. Jurik", "M. Kaballo", "S. Kandybei", "W. Kanso", "M. Karacson", "T. M. Karbach", "S. Karodia", "M. Kelsey", "I. R. Kenyon", "T. Ketel", "B. Khanji", "C. Khurewathanakul", "S. Klaver", "K. Klimaszewski", "O. Kochebina", "M. Kolpin", "I. Komarov", "R. F. Koopman", "P. Koppenburg", "M. Korolev", "A. Kozlinskiy", "L. Kravchuk", "K. Kreplin", "M. Kreps", "G. Krocker", "P. Krokovny", "F. Kruse", "W. Kucewicz", "M. Kucharczyk", "V. Kudryavtsev", "K. Kurek", "T. Kvaratskheliya", "V. N. La Thi", "D. Lacarrere", "G. Lafferty", "A. Lai", "D. Lambert", "R. W. Lambert", "G. Lanfranchi", "C. Langenbruch", "B. Langhans", "T. Latham", "C. Lazzeroni", "R. Le Gac", "J. van Leerdam", "J. -P. Lees", "R. Lefèvre", "A. Leflat", "J. Lefrançois", "S. Leo", "O. Leroy", "T. Lesiak", "B. Leverington", "Y. Li", "T. Likhomanenko", "M. Liles", "R. Lindner", "C. Linn", "F. Lionetto", "B. Liu", "S. Lohn", "I. Longstaff", "J. H. Lopes", "N. Lopez-March", "P. Lowdon", "H. Lu", "D. Lucchesi", "H. Luo", "A. Lupato", "E. Luppi", "O. Lupton", "F. Machefert", "I. V. Machikhiliyan", "F. Maciuc", "O. Maev", "S. Malde", "A. Malinin", "G. Manca", "G. Mancinelli", "J. Maratas", "J. F. Marchand", "U. Marconi", "C. Marin Benito", "P. Marino", "R. Märki", "J. Marks", "G. Martellotti", "A. Martens", "A. Martín Sánchez", "M. Martinelli", "D. Martinez Santos", "F. Martinez Vidal", "D. Martins Tostes", "A. Massafferri", "R. Matev", "Z. Mathe", "C. Matteuzzi", "A. Mazurov", "M. McCann", "J. McCarthy", "A. McNab", "R. McNulty", "B. McSkelly", "B. Meadows", "F. Meier", "M. Meissner", "M. Merk", "D. A. Milanes", "M. -N. Minard", "N. Moggi", "J. Molina Rodriguez", "S. Monteil", "M. Morandin", "P. Morawski", "A. Mordà", "M. J. Morello", "J. Moron", "A. -B. Morris", "R. Mountain", "F. Muheim", "K. Müller", "M. Mussini", "B. Muster", "P. Naik", "T. Nakada", "R. Nandakumar", "I. Nasteva", "M. Needham", "N. Neri", "S. Neubert", "N. Neufeld", "M. Neuner", "A. D. Nguyen", "T. D. Nguyen", "C. Nguyen-Mau", "M. Nicol", "V. Niess", "R. Niet", "N. Nikitin", "T. Nikodem", "A. Novoselov", "D. P. O'Hanlon", "A. Oblakowska-Mucha", "V. Obraztsov", "S. Oggero", "S. Ogilvy", "O. Okhrimenko", "R. Oldeman", "G. Onderwater", "M. Orlandea", "J. M. Otalora Goicochea", "P. Owen", "A. Oyanguren", "B. K. Pal", "A. Palano", "F. Palombo", "M. Palutan", "J. Panman", "A. Papanestis", "M. Pappagallo", "L. L. Pappalardo", "C. Parkes", "C. J. Parkinson", "G. Passaleva", "G. D. Patel", "M. Patel", "C. Patrignani", "A. Pazos Alvarez", "A. Pearce", "A. Pellegrino", "M. Pepe Altarelli", "S. Perazzini", "E. Perez Trigo", "P. Perret", "M. Perrin-Terrin", "L. Pescatore", "E. Pesen", "K. Petridis", "A. Petrolini", "E. Picatoste Olloqui", "B. Pietrzyk", "T. Pilař", "D. Pinci", "A. Pistone", "S. Playfer", "M. Plo Casasus", "F. Polci", "A. Poluektov", "E. Polycarpo", "A. Popov", "D. Popov", "B. Popovici", "C. Potterat", "E. Price", "J. Prisciandaro", "A. Pritchard", "C. Prouve", "V. Pugatch", "A. Puig Navarro", "G. Punzi", "W. Qian", "B. Rachwal", "J. H. Rademacker", "B. Rakotomiaramanana", "M. Rama", "M. S. Rangel", "I. Raniuk", "N. Rauschmayr", "G. Raven", "S. Reichert", "M. M. Reid", "A. C. dos Reis", "S. Ricciardi", "S. Richards", "M. Rihl", "K. Rinnert", "V. Rives Molina", "D. A. Roa Romero", "P. Robbe", "A. B. Rodrigues", "E. Rodrigues", "P. Rodriguez Perez", "S. Roiser", "V. Romanovsky", "A. Romero Vidal", "M. Rotondo", "J. Rouvinet", "T. Ruf", "F. Ruffini", "H. Ruiz", "P. Ruiz Valls", "J. J. Saborido Silva", "N. Sagidova", "P. Sail", "B. Saitta", "V. Salustino Guimaraes", "C. Sanchez Mayordomo", "B. Sanmartin Sedes", "R. Santacesaria", "C. Santamarina Rios", "E. Santovetti", "A. Sarti", "C. Satriano", "A. Satta", "D. M. Saunders", "M. Savrie", "D. Savrina", "M. Schiller", "H. Schindler", "M. Schlupp", "M. Schmelling", "B. Schmidt", "O. Schneider", "A. Schopper", "M. -H. Schune", "R. Schwemmer", "B. Sciascia", "A. Sciubba", "M. Seco", "A. Semennikov", "I. Sepp", "N. Serra", "J. Serrano", "L. Sestini", "P. Seyfert", "M. Shapkin", "I. Shapoval", "Y. Shcheglov", "T. Shears", "L. Shekhtman", "V. Shevchenko", "A. Shires", "R. Silva Coutinho", "G. Simi", "M. Sirendi", "N. Skidmore", "T. Skwarnicki", "N. A. Smith", "E. Smith", "E. Smith", "J. Smith", "M. Smith", "H. Snoek", "M. D. Sokoloff", "F. J. P. Soler", "F. Soomro", "D. Souza", "B. Souza De Paula", "B. Spaan", "A. Sparkes", "P. Spradlin", "S. Sridharan", "F. Stagni", "M. Stahl", "S. Stahl", "O. Steinkamp", "O. Stenyakin", "S. Stevenson", "S. Stoica", "S. Stone", "B. Storaci", "S. Stracka", "M. Straticiuc", "U. Straumann", "R. Stroili", "V. K. Subbiah", "L. Sun", "W. Sutcliffe", "K. Swientek", "S. Swientek", "V. Syropoulos", "M. Szczekowski", "P. Szczypka", "D. Szilard", "T. Szumlak", "S. T'Jampens", "M. Teklishyn", "G. Tellarini", "F. Teubert", "C. Thomas", "E. Thomas", "J. van Tilburg", "V. Tisserand", "M. Tobin", "S. Tolk", "L. Tomassetti", "D. Tonelli", "S. Topp-Joergensen", "N. Torr", "E. Tournefier", "S. Tourneur", "M. T. Tran", "M. Tresch", "A. Tsaregorodtsev", "P. Tsopelas", "N. Tuning", "M. Ubeda Garcia", "A. Ukleja", "A. Ustyuzhanin", "U. Uwer", "V. Vagnoni", "G. Valenti", "A. Vallier", "R. Vazquez Gomez", "P. Vazquez Regueiro", "C. Vázquez Sierra", "S. Vecchi", "J. J. Velthuis", "M. Veltri", "G. Veneziano", "M. Vesterinen", "B. Viaud", "D. Vieira", "M. Vieites Diaz", "X. Vilasis-Cardona", "A. Vollhardt", "D. Volyanskyy", "D. Voong", "A. Vorobyev", "V. Vorobyev", "C. Voß", "H. Voss", "J. A. de Vries", "R. Waldi", "C. Wallace", "R. Wallace", "J. Walsh", "S. Wandernoth", "J. Wang", "D. R. Ward", "N. K. Watson", "D. Websdale", "M. Whitehead", "J. Wicht", "D. Wiedner", "G. Wilkinson", "M. P. Williams", "M. Williams", "F. F. Wilson", "J. Wimberley", "J. Wishahi", "W. Wislicki", "M. Witek", "G. Wormser", "S. A. Wotton", "S. Wright", "S. Wu", "K. Wyllie", "Y. Xie", "Z. Xing", "Z. Xu", "Z. Yang", "X. Yuan", "O. Yushchenko", "M. Zangoli", "M. Zavertyaev", "L. Zhang", "W. C. Zhang", "Y. Zhang", "A. Zhelezov", "A. Zhokhov", "L. Zhong", "A. Zvyagin" ]
2014-08-05T22:37:26+00:00
2014-10-15T12:10:46+00:00
[ "hep-ex" ]
First observations of the rare decays $B^+-> K^+π^+π^-μ^+μ^-$ and $B^+->φK^+μ^+μ^-$
First observations of the rare decays $B^+\rightarrow K^+\pi^+\pi^-\mu^+\mu^-$ and $B^+\rightarrow \phi K^+\mu^+\mu^-$ are presented using data corresponding to an integrated luminosity of $3.0\,{fb}^{-1}$, collected by the LHCb experiment at centre-of-mass energies of $7$ and $8\mathrm{\,TeV}$. The branching fractions of the decays are \begin{eqnarray*} \mathcal{B}(B^+\rightarrow K^+\pi^+\pi^-\mu^+\mu^-) &=& (4.36\,^{+0.29}_{-0.27}\,\mathrm{(stat)}\pm 0.21\,\mathrm{(syst)}\pm0.18\,\mathrm{(norm)})\times10^{-7},\\ \mathcal{B}(B^+\rightarrow\phi K^+\mu^+\mu^-) &=& (0.82 \,^{+0.19}_{-0.17}\,\mathrm{(stat)}\,^{+0.10}_{-0.04}\,\mathrm{(syst)}\pm0.27\,\mathrm{(norm)}) \times10^{-7},\end{eqnarray*} where the uncertainties are statistical, systematic, and due to the uncertainty on the branching fractions of the normalisation modes. A measurement of the differential branching fraction in bins of the invariant mass squared of the dimuon system is also presented for the decay $B^+\rightarrow K^+\pi^+\pi^-\mu^{+}\mu^{-}$.
1408.1140v1
## SYNCHRONIZATION PROPERTIES OF RANDOM PIECEWISE ISOMETRIES ## VICTOR KLEPTSYN AND ANTON GORODETSKI Abstract. We study the synchronization properties of the random double rotations on tori. We give a criterion that show when synchronization is present in the case of random double rotations on the circle and prove that it is always absent in dimensions two and higher. ## 1. Introduction The observation of a synchronization effect goes back at least to 17th century, when Huygens [Hu] discovered the synchronization of two linked pendulums. Since then, synchronization phenomena have been observed in numerous systems and settings, see [PRK] for a comprehensive survey of the subject. In the theory of dynamical systems, synchronization usually refers to random dynamical system trajectories of different initial points converging to each other under the application of a sequence of random transformations. A first such result is the famous Furstenberg's Theorem [Fur1], stating that under some very mild assumptions, the angle (mod π ) between the images of any two vectors under a long product of random matrices (exponentially) tends to zero. Projectivizing the dynamics, it is easy to see that this theorem in fact states that random trajectories of the quotient system on the projective space (exponentially) approach each other. For random dynamical systems on the circle, several results are known. Surely, in random projective dynamics there is a synchronization due to the simplest possible case of Furstenberg's Theorem. In 1984, this result was generalized to the setting of homeomorphisms (with some very mild and natural assumptions of minimality of the action and the presence of a North-South map) in the work of a physicist V. A. Antonov [A], motivated by questions from celestial mechanics. Unfortunately, this work stayed unnoticed by the mathematical community for a long time. Antonov's theorem was later re-discovered in [KN] (see also the exposition in [GGKV]). It was further generalized for a non-minimal dynamics in [DKN1]. The local behavior of (random) orbits of a smooth system is governed by (random) Lyapunov exponents, and their negativity implies at least local synchronization. A theorem of P. Baxendale [Bax] states that for a C 1 -random dynamical system on a compact manifold without a common invariant measure, there exists an ergodic stationary measure with negative volume Lyapunov exponent. In the onedimensional case, as there is only one Lyapunov exponent, this implies local contraction, also establishing the exponential speed of contraction in Antonov's Theorem Date : August 7, 2014. V.K. was supported in part by RFBR project 13-01-00969-a and RFBR/CNRS joint project 10-01-93115-CNRS a. A. G. was supported in part by NSF grants DMS-1301515 and IIS-1018433. under the additional C 1 -smoothness assumption. Related results were also obtained in [H1]. These statements have analogues for Riemannian transversely-conformal foliations of compact manifolds, when the random long composition is replaced by the holonomy map along a long random leafwise Brownian path, see [DK]. Similar phenomena appear in partially hyperbolic dynamics. Namely, in many cases, points on a generic central leaf tend to each other under the dynamics of the map. This leads to appearance of non-absolutely continuous central foliations. Initially this phenomenon was found by Ruelle, Shub, and Wilkinson [SW, RW] for a perturbation of the product of an Anosov map by an identity map on the circle (see also [H2]), and later was observed in many other partially hyperbolic systems [BB, HP, PT, PTV, SX, V]. The major mechanism that explains 'synchronization' along the central leaves in partially hyperbolic dynamics is non-vanishing Lyapunov exponents along central leaves (see [GT] for a recent survey of this area). In some examples the synchronization effect takes place in a slightly different form: a generic pair of points spend most of the time near each other, but sometimes they diverge sufficiently far apart (so that one cannot avoid time-averaging in the description of the synchronization). Such a behavior takes place even in non-random dynamical systems; in particular, it was obtained for some non-strictly expanding interval or circle maps [I], for the Cherry flow [SV, K2], and for the modified Bowen example [K1]. Theorem 1 in this paper provides another example of the behavior of this type. In this paper, we study the synchronization properties of the random piecewise isometries. Dynamical properties of piecewise isometries have been attracting attention lately. They form a surprisingly nontrivial class of dynamical systems even in dimension one, see [BK, B, BT, SIA, Vo, Zh] for the case of one-dimensional piecewise isometries, and [AG, AF, AKMPST, ANST, CGQ, G, GP, LV, TA] for the higher-dimensional case. These maps appear naturally in some applications [ADF, D, SAO, W], are related to dynamics of polygonal billiards [BK, S], serve as model problems for some non-linear systems [As], and also appear as a limit of some renormalization processes introduced to understand complicated non-linear systems [DS]. We will consider the specific case of random double rotations on the circle and higher dimensional analogs. The double rotation of the circle is a map which acts as a rotation on a subset of the circle, and as a different rotation on the complement of the subset. Even in the case when the subset of the circle is an interval the dynamics of a double rotation can be quite non-trivial, see [SIA, BC]. A detailed survey on double rotations can be found in [C]. Notice that in the case when synchronization is established via negative Lyapunov exponents, smoothness of the systems under consideration is crucial. The proof of Antonov's Theorem uses essentially the fact that homeomorphisms preserve the order of points of the circle. Thus, neither of these techniques is applicable to the case of double rotations. However, we show that under certain reasonable assumptions the effect of the synchronization is present in the random double rotations on the circle. The mechanism ensuring its presence is thus different (see discussion after Conjecture 1). Additionally, we show that synchronization seems to be essentially related to onedimensionality of the phase space. Indeed, Theorem 5 claims that in higherdimensional analogous setting synchronization is absent. ## 2. Main Results - 2.1. General setting. Our results are devoted to the particular case of the dynamics on the k -torus, piecewise formed by the translation maps. Namely, take a set A ⊂ T k and a pair of vectors v , v 1 2 ∈ T k , and consider on the k -torus T k the map $$& \text{map} \\ & ( 1 ) & \quad \quad f ( x ) = \begin{cases} x + v _ { 1 }, & x \in A, \\ x + v _ { 2 }, & x \notin A. \end{cases} \\ & \quad \text{--} \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots$$ We consider iterations of f , between which the torus is shifted by a random vector, these vectors being chosen w.r.t. the Lebesgue measure and independently on different steps. Formally speaking, we set Ω = ( T k ) N to be the set of sequences of elements of T k , equipped with the probability measure P = Leb N , and associate to a sequence w = ( w i ) i ∈ N ∈ Ω the sequence of random iterations $$F _ { w } ^ { n } = f _ { w _ { n } } \circ \cdots \circ f _ { w _ { 1 } },$$ where f u ( x ) = T u ◦ f ( x ), and T u ( x ) = x + u is the translation by u ∈ T k . We describe the behavior of such dynamics, that (quite unexpectedly!) turns out to be different in the cases k = 1 and k &gt; 1. It is clear that if we compose some fixed translation T u 0 with all the random maps f w i , we will get the same random dynamical system (since the Lebesgue measure is a stationary measure which is invariant under the translation T u 0 ). In particular, if we apply T -v 2 and set v = v 1 -v 2 , we can turn the system (1) into the system where $$f ( x ) = \begin{cases} x + v, & x \in A, \\ x, & x \notin A. \end{cases}$$ $$\begin{smallmatrix} \\ \\ \\ \end{smallmatrix}$$ In what follows we will always consider the system (3) with the following standing assumption : components of the vector v together with 1 form a linearly independent k +1 -tuple over Q (or, equivalently, the translation T v : T k → T k is minimal). An important ingredient of our studies is the following function that we associate to the set A : Definition 1. Let A ⊂ T k be a Borel subset. Its displacement function ϕ A : T k → R is defined as $$\varphi _ { A } ( \varepsilon ) \coloneqq \text{Leb} ( A \, \Delta \, T _ { \varepsilon } ( A ) ).$$ We say that A has no translational symmetries , if $$\varphi _ { A } ( \varepsilon ) = 0 \ \Leftrightarrow \ \varepsilon = 0.$$ Note that standard measure theory arguments easily imply that ϕ A is a continuous function of ε (to show that it does not have discontinuities with oscillation &gt; δ it suffices to approximate A up to δ 2 -measure set by a finite union of rectangles). 2.2. One-dimensional case, synchronization. We start with the results on onedimensional case, i.e. for random double rotations on the circle. It turns out that the integrability of 1 ϕ A ( ε ) distinguishes between two possible behaviors, described in Theorem 1 and Theorem 4 below. We start with the non-integrable case; in particular, this is the case if A is a union of l ≥ 1 intervals: in this case, ϕ A ( ε ) ∼ lε as ε → 0 and the system manifests (one of the forms of) synchronization: Theorem 1. Let A ⊂ S 1 be a Borel set that has no translational symmetries, and assume that Then for any x, y ∈ S 1 for almost any sequence w ∈ Ω of iterations one has $$& \ a s s u m e \, \text{that} \\ & ( 4 ) & \int _ { S ^ { 1 } } \frac { 1 } { \varphi _ { A } ( \varepsilon ) } \, d \varepsilon = + \infty. \\ & \text{Then for an} u \, x. \, u \in S ^ { 1 } \text{ for almost an} u \text{ sequence } w \in \Omega \text{ of its}$$ $$( 5 ) \quad \forall \delta > 0 \quad \frac { 1 } { N } \# \{ n \in \{ 1, \dots, N \} \ | \ \text{dist} ( F _ { w } ^ { n } ( x ), F _ { w } ^ { n } ( y ) ) < \delta \} \to 1 \quad \text{as } N \to \infty.$$ Remark 1. Notice that (5) is equivalent to $$\frac { 1 } { N } \sum _ { n = 1 } ^ { N } \text{dist} ( F _ { w } ^ { n } ( x ), F _ { w } ^ { n } ( y ) ) \to 0 \text{ as } N \to \infty. \text{ement also has interesting consequences for iterations of tl}$$ This statement also has interesting consequences for iterations of the Lebesgue measure. To state it, we will need a way (which is one of many equivalent ways) to measure non-Diracness of a measure on the circle. Definition 2. For any measure m on the circle let Then, we have the following $$& \text{or any measure $m$ on the circle let} \\ & \quad D ( m ) \coloneqq \iint \text{dist} ( x, y ) \, d m ( x ) \, d m ( y ). \\ & \text{the following}$$ Theorem 2. Under the assumptions of Theorem 1, $$\forall \delta > 0 \ \mathbb { P } ( D ( ( F _ { w } ^ { n } ) _ { * } \text{ Leb} ) > \delta ) \to 0 \ \ a s \ n \to \infty.$$ Note that this conclusion is stronger than the one that can be obtained as an immediate corollary of Theorem 1 by averaging on x and y . Indeed, in the latter case we would have a convergence to zero only of Chesaro averages of the probabilities in (6), and the theorem states convergence for the probabilities themselves. In the theory of random dynamical systems, often together with the usual order of composition are considered the reversed-order compositions, with the next map being applied first: Definition 3. For w ∈ Ω, let $$F _ { w, r e v } ^ { n } \coloneqq f _ { w _ { 1 } } \circ \dots \circ f _ { w _ { n } }.$$ This order of composition has an advantage that in this case it is more likely that an individual sequence of images of a given measure converges. And indeed, this is what happens in our case. Theorem 3. Under the assumptions of Theorem 1, there exists a measurable map L : Ω → S 1 , such that almost surely $$( 7 ) & & ( F _ { w, r e v } ^ { n } ) _ { * } \text{ Leb} \to \delta _ { L ( w ) } \quad a s \ n \to \infty.$$ Let us now consider the particular case of A being an interval. Note that for the reversed-order composition we can define the (random) 'topological attractor'. Namely, for any w ∈ Ω the sequence F n w,rev ( S 1 ) is a nested sequence of nonempty closed sets, and thus has a non-empty intersection: Definition 4. The topological attractor is a random set X = X w ( ), defined as $$\S g a c a l & \ a t t r a c t o r \text{ is a random set} \\ X ( w ) & = \bigcap _ { n \in \mathbb { N } } \overline { F _ { w, r e v } ^ { n } ( S ^ { 1 } ) }$$ However, even though on every finite step, assuming that A is an interval or a finite union of intervals, one has F n w,rev ( S 1 ) = supp( F n w,rev ) ∗ Leb, passing to the limit is not immediate. Namely, a conclusion $$\text{supp} \lim _ { n \to \infty } ( F _ { w, r e v } ^ { n } ) _ { * } \text{Leb} \subset X ( w )$$ is immediate, but equality is not at all guaranteed. The absence of such equality would mean that, even though most of the initial Lebesgue measure after a large number of iterations is most probably concentrated near one point, there will be (once again, most probably) some parts of its image that are far away from this point. And quite interestingly, it seems that indeed such an effect takes place: in this random system there is a difference between the 'topological' and 'measurable' limit behaviors. Namely, numerical simulations, as well as some very rough heuristic arguments, predict the following Conjecture 1. If A is an interval, the topological attractor X w ( ) is almost surely a Cantor set. We would like to conclude the statement of results for this case by pointing out an interesting, and quite instructive, parallel of the synchronization observed here to some effects already known in the ordinary (non-random) dynamical systems. Namely: note that even though Theorem 1 states that any two points spend most of the time close to each other, the distance between them never (except for a case of two points on the same orbit of T v ) converges to zero. Indeed, the difference x -y between the two points can be changed after one iteration only either by adding or by subtracting the fixed vector v . ↦ This is exactly the type of a situation that happens, for instance, in the Cherry flow (see [SV], [K2]), as well as for the separatrix loop or modified Bowen's example (see [K1]): the proportion of time spent by any individual point near the saddle becomes closer and closer to 1, even if from time to time the point of the orbit leaves the neighborhood of the saddle (only to get 'stuck' there for a longer time after it comes back even closer). Perhaps even more instructive analogy is the example of a non-strictly expanding circle diffeomorphism with one neutral fixed point. Then, everything depends on the speed of repulsion at this point: as it follows from Inoue's results [I], if the expanding map at this point behaves as x → x (1 + | x | d ) with d &gt; 1, the exit-time is Lebesgue-non-integrable, and only SRB measure is concentrated at the fixed point (see also [DKN2]). On the other hand, if d &lt; 1, the exit time is Lebesgue-integrable, and the iterations of the Lebesgue measure tend to an absolutely continuous invariant measure; this is in exact parallel with Theorems 4 and 5 below. 2.3. One-dimensional case, no synchronization. The non-integrability (4) turns out not only to be a sufficient, but also a necessary condition for the synchronization: Theorem 4. Let A ⊂ S 1 be a Borel set that has no translational symmetries, and assume that $$\int _ { S ^ { 1 } } \frac { 1 } { \varphi _ { A } ( \varepsilon ) } \, d \varepsilon < + \infty.$$ Then for Lebesgue-almost any x, y ∈ S 1 and for almost any sequence w ∈ Ω of iterations one has a weak convergence of measures $$\frac { 1 } { N } \sum _ { n = 1 } ^ { N } \delta _ { F _ { w } ^ { n } ( x ) - F _ { w } ^ { n } ( y ) } & \to \overline { \mu }, \\ \i s u r e \, \overline { \pi } = \frac { 1 } { } \cdot \frac { d x } { } \quad Z = \, \int \,. \, \frac { d x } { }$$ In particular, as the measure µ does not charge 0, it is immediate to say that there is no synchronization in any system satisfying the assumptions of Theorem 4. The following example shows that such a behavior is possible even for not-so-bad set A . where the probability measure µ = 1 Z · dx ϕ A ( x ) , Z = ∫ S 1 dx ϕ A ( x ) does not depend on w . Example 1. Let A ⊂ [0 , 1] be the Cantor set of positive measure, constructed [0 , 1] in the following way. Take M 0 = [0 1] and construct for each , n ∈ N the set M n by removing 2 n -1 intervals of length 4 -n from M n -1 , centered at the middle of intervals of M n -1 . Set A = ∩ n M n . Then, for any sufficiently small ε we have ϕ A ( ε ) /greaterorsimilar ε 2 / 3 ; in particular, the function 1 ϕ A ( ε ) is integrable. Indeed, let 8 -n &lt; ε &lt; 8 -( n -1) , where n ≥ 2. Then $$\text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{ \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{:} \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{, } \text{.}$$ On the other hand, $$\frac { 1 } { 2 } \varphi _ { A } ( \varepsilon ) = \text{Leb} ( A \, \L T _ { \varepsilon } ( A ) ) \geq \text{Leb} ( M _ { n } \, \L T _ { \varepsilon } ( M _ { n } ) ) - \text{Leb} ( M _ { n } \, \L A ).$$ Now, it is easy to see that Leb( M n \ T ε ( M n )) ≥ 2 n -1 · 8 -n = 1 2 4 -n , as at least all the intervals, removed on the n th step of construction, contribute to this difference. Thus, $$\frac { 1 } { 2 } \varphi _ { A } ( \varepsilon ) \geq \frac { 1 } { 2 } 4 ^ { - n } - \frac { 1 } { 6 } 4 ^ { - n } = \frac { 1 } { 3 } 4 ^ { - n } \geq \text{const} \, \varepsilon ^ { 2 / 3 }.$$ Remark 2. Slightly modifying the construction, one can find Cantor set A with ϕ A ( ε ) &gt; const ε α for an arbitrary small α &gt; 0. 2.4. Higher-dimension case: no synchronization ever. It turns out that in the higher-dimensional case the synchronization never takes place: Theorem 5. Let A ⊂ T k be a Borel subset that has no translational symmetries, and assume that k &gt; 1 . Then for Lebesgue-almost any x, y ∈ T k and for almost any sequence w ∈ Ω one has a weak convergence of measures $$\frac { 1 } { N } \sum _ { n = 1 } ^ { N } \delta _ { F _ { w } ^ { n } ( x ) - F _ { w } ^ { n } ( y ) } \to \overline { \mu }, \\ \i s u r e \, \overline { \mu } \, \text{ does not depend on } w. \ M o$$ $$& \i t l y \ b y \\ & ( 8 ) & & \overline { \mu } = \frac { 1 } { Z } \cdot \frac { d x } { \varphi _ { A } ( x ) }, \, Z = \int _ { T ^ { k } } \frac { d x } { \varphi _ { A } ( x ) }. \\ & \quad \text{Tho conversion } ( 8 \wr i e will \text{of} \, \text{and} \, \text{or} \, \text{in} \, \text{the second} }$$ where the probability measure µ does not depend on w . Moreover, µ is given explicitly by The expression (8) is well defined (as we will see later in the proof of Theorem 5) since in the higher-dimensional situation the integral of 1 ϕ A ( ε ) always converges. ## 3. Proofs Let us start with the proof of Theorem 1: Proof of Theorem 1. Fix the points x, y ∈ S 1 . For a given sequence w = ( w n ) ∈ Ω and the associated random images x n = F n w ( x ), y n = F n w ( y ), consider corresponding sequence $$z _ { n } = F _ { w } ^ { n + 1 } ( x ) - F _ { w } ^ { n + 1 } ( y ) = f ( F _ { w } ^ { n } ( x ) ) - f ( F _ { w } ^ { n } ( y ) ).$$ of differences between these random images (the last equality is due to the fact that the rotation by w n +1 does not change the difference). A key remark is that the process ( z n n ) ∞ =1 is a stationary Markov process, and is governed by the following transitional probabilities: Indeed, for known w , . . . , w 1 n (and thus z n ), the conditional distribution of x n +1 = F n +1 w ( x ) is independent of them and is given by the Lebesgue measure: x n +1 = T w n +1 ( f ( F n w ( x ))), and w n +1 is distributed w.r.t. the Lebesgue measure. Now, notice that the application of f changes the difference vector between the two points in the following way: $$\text{transitional probabilities} & \quad \\ ( 9 ) & \quad z _ { n + 1 } = \begin{cases} z _ { n } + v, & \text{with probability } \frac { 1 } { 2 } \varphi _ { A } ( z _ { n } ), \\ z _ { n } - v, & \text{with probability } \frac { 1 } { 2 } \varphi _ { A } ( z _ { n } ), \\ z _ { n }, & \text{with probability } 1 - \varphi _ { A } ( z _ { n } ). \end{cases} \\ & \text{Indeed, for known } w _ { 1 }, \dots, w _ { n } \text{ (and thus } z _ { n } ), \text{ the conditional distributi} \\ & x _ { n + 1 } = F _ { w } ^ { n + 1 } ( x ) \text{ is independent of them and is given by the Lebesgue me} \\ & \quad \stackrel { \prime \prime } { \sim } \end{cases} \quad \cdot \quad \cdot \quad \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ In particular, $$\ e \text{ following way} \colon & \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ f ( a ) - f ( b ) = \begin{cases} ( a - b ) + v, & a \in A, \, b \notin A, \\ ( a - b ) - v, & a \notin A, \, b \in A, \\ ( a - b ), & \quad \text{otherwise}. \end{cases} \\ r, & \quad \left ( z _ { n } + v. & \quad \text{if $x_{n+1} \in A \, \overline{ }(T_{z_{n}}(.)$} \end{cases} \right ).$$ The conditions on x n +1 here come from the fact that y n +1 = x n +1 + z n , hence y n +1 ∈ A if and only if x n +1 ∈ T -z n ( A ). Finally, we notice that Leb( A ) = Leb( T -z n ( A )) and hence $$& \text{In particular,} \\ & ( 1 0 ) \quad z _ { n + 1 } = f ( x _ { n + 1 } ) - f ( y _ { n + 1 } ) = \begin{cases} z _ { n } + v, & \text{if $x_{n+1} \in A \, \left ( T _ { - z _ { n } } ( A ) \right ) \\ z _ { n } - v, & \text{if $x_{n+1} \in ( T _ { - z _ { n } } ( A ) ) \, \right \, A \\ z _ { n } & \text{otherwise.} \end{cases} \\ & \text{The conditions on $x_{n+1}$ here come from the fact that $y_{n+1} = x_{n+1} + z_{n}$, hence} \\ & y _ { n + 1 } \in A \text{ if and only if $x_{n+1} \, \in T_{-z_{n}(A)$. } \end{cases}$$ $$\text{Leb} ( A \, \langle T _ { - z _ { n } } ( A ) ) ) = \text{Leb} ( ( T _ { - z _ { n } } ( A ) ) \, \langle \, A ) = \frac { \text{Leb} ( A \, \Delta \, T _ { z _ { n } } ( A ) ) } { 2 } = \frac { 1 } { 2 } \varphi _ { A } ( z _ { n } ).$$ This concludes the proof of (9). Now, let us change the point of view on the Markov process (9). Given z 0 = x -y , we first consider a simple random walk ( c j ) on Z , taking $$\text{onsier a simple random walk } ( c _ { j } ) & \text{on } \mathbb { Z }, \text{taking} \\ c _ { 0 } & = 0, \quad c _ { j + 1 } = \begin{cases} c _ { j } + 1 & \text{with probability 1/2}, \\ c _ { j } - 1 & \text{with probability 1/2}. \end{cases}$$ Consider an auxiliary process ˜ z j = z 0 + c v j . We claim that the Markov process (9) can be seen as a 'slowing down' of the process ˜ z . Namely, take any its trajectory ( ˜ z j ), and consider independent random variables t j that are distributed geometrically with the mean 1 ϕ A ( ˜ z j ) , that is, $$( 1 1 ) \quad \mathbb { P } ( t _ { j } = i ) = ( 1 - q ) \cdot q ^ { i - 1 }, \ \ q = 1 - \varphi _ { A } ( \widetilde { z } _ { j } ), \ \ i = 1, 2, \dots$$ Then, the 'slowed down' process $$& ( 1 2 ) & & Z _ { n } = \widetilde { z } _ { J ( n ) }, \ \ J ( n ) \coloneqq \max \{ j \, | \, t _ { 1 } + t _ { 2 } + \dots t _ { j } \leq n \}, \\ & \text{is a Markov process that has the same law as $z_{n}$}. \\ & \text{ Notice now that the trajectory of the process $\widetilde{ z }_{j}$ is almost surely asymptotic} \\ & \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \, \ e \sim \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{$$ Notice now that the trajectory of the process ˜ z j is almost surely asymptotically distributed w.r.t. the Lebesgue measure. Indeed, the trajectory of ˜ z j is a trajectory of a random dynamical system, generated by the translation T v and its inverse, each applied with the probability 1 / 2, and starting at the point z 0 . The Lebesgue measure is an ergodic stationary measure of this system. Thus, Kakutani's random ergodic theorem (see [F, Theorem 3.1], [Kak]) implies that for almost any initial point z almost surely its random trajectory is asymptotically distributed w.r.t. the Lebesgue measure. Now, if for a random sequence of iterations the trajectory of one point z is asymptotically distributed w.r.t. the Lebesgue measure, then the same holds for any other point z ′ (in particular, for z ′ = z 0 ): these two trajectories differ by a translation T z ′ -z . At the same time, due to our assumptions the only zero of the function ϕ A ( z ) is z = 0, and for the integral of the expectation we have This motivates the following $$\text{if the expectation we have} \\ \int _ { S ^ { 1 } } \frac { 1 } { \varphi _ { A } ( z ) } d z = + \infty. \\ \int _ { S ^ { 1 } }$$ Lemma 6. Under the assumptions of Theorem 1, conditionally to any trajectory { ˜ z j } that is asymptotically distributed w.r.t. the Lebesgue measure (that is, 1 j ∑ j i =1 δ ˜ z j weakly converges to Leb ), almost surely the number of iterations of the slowed down process grows superlinearily, $$\frac { t _ { 1 } + t _ { 2 } + \cdots + t _ { j } } { j } \to + \infty \ a s \ j \to \infty.$$ while at the same time the number of iterations spent outside of any δ -neighborhood of z = 0 grows linearly: (14) where I B detotes the indicator function of the set B . $$& \forall \delta > 0 \quad \frac { 1 } { j } \sum _ { i = 1 } ^ { j } t _ { j } \cdot \mathbf I _ { S ^ { 1 } \langle U _ { \delta } ( 0 ) } ( z _ { j } ) \to \int _ { S ^ { 1 } \langle U _ { \delta } ( 0 ) } \frac { 1 } { \varphi _ { A } ( z ) } \, d z < + \infty \quad a. s. \ a s \, j \to \infty, \\ & \text{where} \, \mathbf I _ { B } \text{ detotes the indicator function of the set $B$}.$$ Notice that Lemma 6 will immediately imply the statement of Theorem 1. Indeed, as we mentioned already, for any initial points x, y (and hence for any ˜ z 0 = z 0 = x -y ) the trajectory ˜ z j is almost surely distributed w.r.t. the Lebesgue measure (here we assume that x, y are not on the same trajectory of T v , otherwise the claim of Theorem 1 trivially holds). Lemma 6 then states that the convergences (13) and (14) hold, and dividing the latter by the former, we see that almost surely $$& \text{ surely} \\ & ( 1 5 ) & \quad \frac { \sum _ { i = 1 } ^ { j } t _ { j } \cdot \mathbf I _ { z _ { j } \notin U _ { \varepsilon } ( 0 ) } } { \sum _ { i = 1 } ^ { j } t _ { j } } = \frac { \frac { 1 } { j } \sum _ { i = 1 } ^ { j } t _ { j } \cdot \mathbf I _ { z _ { j } \notin U _ { \varepsilon } ( 0 ) } } { \frac { 1 } { j } \sum _ { i = 1 } ^ { j } t _ { j } } \to 0 \quad \text{as} \ j \to \infty. \\ & \text{In other words, the proportion of time spent by the slowed down process $Z_{n}$ outside} \\ & \text{of any} \ U _ { \delta } ( 0 )$ tends to zero as $n \to \infty. \text{ Formally speaking, (15) is such a convergence}$$ In other words, the proportion of time spent by the slowed down process Z n outside of any U δ (0) tends to zero as n →∞ . Formally speaking, (15) is such a convergence for a subsequence of times n that are of the form n = t 1 + · · · + t j , but as Z does not change between such moments of time, it suffices to state the full convergence. (This is the same type of the argument that was used in [I], [K1], [SV]) In fact, proving both convergences for Lebesgue-almost any initial z 0 (and hence for almost any pair x, y of initial points) would be a bit easier, as both (13) and (14) would follow from the Birkhoff ergodic theorem (see an analogous estimate in the proof of Theorem 4 below). However, as we want to prove the almost sure synchronization for any pair of initial points x, y , we will have to make some more technical estimates. Proof of Lemma 6. Let us start with (14). Note that for any δ &gt; 0 all random variables t j · I ˜ z j /U ∈ δ (0) have uniformly bounded dispersion: indeed, they are either identically zero, or geometric with a uniformly bounded expectation (the function ϕ A ( z ) is continuous and z = 0 is its only zero). Hence, the difference $$\text{ious and } z = 0 & \text{is its only zero}. \text{ hence, use inference} \\ \frac { 1 } { j } \left ( \sum _ { i = 1 } ^ { j } t _ { i } \mathbf I _ { \widetilde { z } _ { j } \not \in U _ { \delta } ( 0 ) } - \sum _ { i = 1 } ^ { j } \mathbb { E } ( t _ { i } \mathbf I _ { \widetilde { z } _ { j } \not \in U _ { \delta } ( 0 ) } ) \right ) \\ \text{ends to zero (see e.g. [SS. Theorem 2.3.10]}). Now, we}$$ almost surely tends to zero (see e.g. [SS, Theorem 2.3.10]). Now, we have $$\begin{array} {$$ $$& \cdots, \, \cdots \, \cdots \, \cdots$$ ˜ where the convergence in the right hand side follows from the asymptotic distribution of the trajectory ˜ z j . This concludes the proof of (14). Now, for any δ we have As δ &gt; 0 can be chosen arbitrarily small, the integral in the right hand side of (16) can be made arbitrarily large (as the integral ∫ S 1 1 ϕ A ( z ) dz diverges due to the assumptions of the theorem). Thus, the limit in the left hand side of (13) is infinite. This concludes the proof of Lemma 6, and hence of Theorem 1. /square /square Proof of Theorem 4. First, notice that the random walk ˜ z j can be modeled by a map (17) G 0 : S 1 ×{ +1 , - } 1 N → S 1 ×{ +1 , - } 1 N , G 0 ( ˜ z, ( c j )) = ( ˜ z + vc , 1 ( c j +1 )) with an ergodic measure ν which is a product of Lebesgue measure on S 1 and the Bernoulli measure on { +1 , - } 1 N (i.e. on the space of sequences { ( c j ) j ∈ N } ). Though, to slow down the random walk ˜ z j , we need the associated geometric distributions. To model these inside a skew product, we will use a standard argument: any distribution can be realized on ([0 , 1] , Leb). Define ψ : [0 , 1] × [0 , 1] → N as $$\psi ( q, s ) = k \text{ \ if } s \in [ 1 -$$ then, for any q ∈ (0 , 1) the random variable ψ q, ( · ) : ([0 , 1] , Leb) → N has a geometric distribution with the expectation 1 1 -q . Take the product G of the system (17) with the Bernoulli shift on the space [0 , 1] N . It has a natural invariant measure ν = ν × Leb N . Consider the function Then, (18) T ◦ G j = ψ (1 -ϕ A ( ˜ z j ) , s j +1 ) , where ˜ z j = ˜ z + ( v c 1 + · · · + c j ). Note, that conditionally to any base point ( ˜ z, ( c j )) -or, what is the same, to the associated random walk trajectory ( ˜ z j ),- the functions T , T ◦ G , . . . , T ◦ G n ,. . . are independent as random variables (they depend on different [0 , 1]-coordinates s , s 1 2 , . . . , respectively), and have exactly the required distribution of times t 1 , t 2 ,. . . . $$& T \colon ( S ^ { 1 } \times \{ + 1, - 1 \}$$ The system G is a product of an ergodic G 0 with a mixing Bernoulli shift, and hence is also ergodic. Thus, the application of the Birkhoff ergodic theorem to the function T immediately implies almost surely for almost every ˜ z 0 . Now, for any interval J ⊂ S 1 in the same way one has almost surely $$& \text{function $T$ immediately implies} \\ & ( 1 9 ) & \frac { 1$$ $$& \text{Now, for any interval $J\subset S^{\ast}$ in the same way one has almost surely} \\ ( 2 0 ) & \quad \frac { 1 } { j } \left ( \sum _ { i = 1 } ^ { j } t _ { i } \mathbf I _ { \tilde { z } _ { i } \in J } \right ) \to \int T \mathbf I _ { \tilde { z } _ { 1 } \in J } d \overline { \nu } = \int _ { J } \frac { 1 } { \varphi _ { A } ( z ) } d z. \\ & \text{Thus, for the slowed down process for the subsequence of moments $N_{j} \coloneqq$}$$ Thus, for the slowed down process for the subsequence of moments N j := t 1 + · · · + t j we have $$( 2 1 ) \quad \frac { 1 } { N _ { j } } \# \{ n \leq N _ { j } \ | \ z _ { n } \in J \} = \frac { 1 } { N _ { j } } \sum _ { i = 1 } ^ { j } ( t _ { i } \dot { I } _ { z _ { i } \in J } ) = \frac { 1 } { N _ { j } / j } \cdot \frac { 1 } { j } \sum _ { i = 1 } ^ { j } ( t _ { i } \dot { I } _ { z _ { i } \in J } ) \to \\ \to \frac { 1 } { Z } \cdot \int _ { J } \frac { 1 } { \varphi _ { A } ( z ) } d z, \\ \text{where the limit for the first factor comes from (19), and for the second factor}$$ $$& \{ Z 1 ) \, \text{from the subsequence } \, \text{$\int_{j}$ to all the natural numbers:} \\ & \frac { 1 } { N } \# \{ n \leq N \, | \, z _ { n } \in J \} \to \frac { 1 } { Z } \cdot \int _ { J } \frac { 1 } { \varphi _ { A } ( z ) } d z \quad \text{as } N \to \infty. \\ \cdot \lim \text{line that } \, \tilde { \ } \, \text{are uncomtotically distributed with $r$} \, t \quad \text{the macro } \, \frac { 1 } { \ }. \, \end{cases}$$ where the limit for the first factor comes from (19), and for the second factor from (20). Now, (19) implies that almost surely t j = o j ( ), thus allowing to extend (21) from the subsequence N j to all the natural numbers: This implies that z n are asymptotically distributed w.r.t. the measure 1 Z · dz ϕ A ( z ) , thus concluding the proof of Theorem 4. /square Proof of Theorem 5. The argument in higher dimension repeats verbatim the proof of Theorem 4. The only difficulty is that we do not anymore assume that the integral converges, thus we have to prove it. This is done by the following Lemma 7. Let A ⊂ T k be a Borel subset that admits no translational symmetries. Then, there exists α &gt; 0 such that $$\forall u \in \mathbb { T } ^ { k } \ \varphi _ { A } ( u ) \geq \alpha \, \text{dist} ( u, 0 ).$$ Proof of Lemma 7. Notice first that the function ϕ A is subadditive: $$\varphi _ { A } ( u + u ^ { \prime } ) = \text{Leb} ( A \, \Delta \, T _ { u + u ^ { \prime } } ( A ) ) \leq \text{Leb} ( A \, \Delta \, T _ { u } ( A ) ) + \text{Leb} ( T _ { u } ( A ) \, \Delta \, T _ { u + u ^ { \prime } } ( A ) ) = \\ = \text{Leb} ( A \, \Delta \, T _ { u } ( A ) ) + \text{Leb} ( T _ { u } ( A \, \Delta \, T _ { u ^ { \prime } } ( A ) ) ) = \varphi _ { A } ( u ) + \varphi _ { A } ( u ^ { \prime } ).$$ Now, assume that Lemma 7 does not hold. Then, there exists a family of vectors u n such that ϕ A ( u n ) &lt; 1 n dist( u , n 0). The absence of the translational symmetries implies that ϕ A is bounded away from zero outside any neighborhood of 0, and hence one should have u n → 0. Now, consider the sequence of vectors V n = N n · u n , where N n = [ 1 2 dist( u n , 0) ]. We have $$( 2 2 ) \quad \varphi _ { A } ( V _ { n } ) \leq N _ { n } \varphi _ { A } ( u _ { n } ) \leq \frac { 1 } { 2 \, \text{dist} ( u _ { n }, 0 ) } \cdot \frac { 1 } { n } \, \text{dist} ( u _ { n }, 0 ) \to 0 \quad \text{as } n \to \infty.$$ On the other hand, dist( V , n 0) → 1 2 . Extracting any convergent subsequence V n i → V , we find a vector V , for which dist( V, 0) = 1 2 and ϕ A ( V ) = 0 due to (22). This contradicts the assumption of the absence of the translational symmetries, and this contradiction concludes the proof. /square The lower bound from Lemma 7 implies that the singularity at 0 of the integral ∫ T k 1 ϕ A ( z ) dz is at most of order 1 dist( z, 0) , and hence the integral converges. The arguments of the proof of Theorem 4 are then applicable verbatim. /square Remark 3. Notice that the same arguments as in the proof of Lemma 7 show that for any set A either the conclusion of Lemma 7 holds in a neighborhood of 0, or A admits a one-parametric group of translational symmetries. Proof of Theorem 3. First, note that the Lebesgue measure is the unique stationary (i.e., equal to the average of its random images) measure of the considered system. Indeed, for any measure m , one has $$\ a n y \ e n s u r e \, m, \, \text{one as} \\ \int _ { S ^ { 1 } } ( T _ { u } f ) _ { * } m \, d \, \text{Leb} ( u ) = ( f _ { * } m ) * \text{Leb} = \text{Leb}, \\ \text{at every for the convolution of monocurrency} \, m. \, \text{and} \, m.$$ where µ 1 ∗ µ 2 stays for the convolution of measures µ 1 and µ 2 . Next, a famous argument in the study of random dynamical systems, going back to Furstenberg (see [Fur2, Corollary to Lemma 3.1 &amp; Proposition 3.4, p. 20]), is that the sequence of iterations with reversed order of a stationary measure forms a martingale (with values in the space of measures), and hence converges almost surely. Hence, there exists a measurable map L from Ω to the space of probability measures on S 1 , such that almost surely $$( F _ { w, r e v } ^ { n } ) _ { * } \text{Leb} \to \mathcal { L } ( w ) \text{ \ as } n \to \infty.$$ On the other hand, Theorem 1 implies that for any two x, y ∈ S 1 almost surely $$\forall \delta > 0 \ \frac { 1 } { N } \# \{ n \in \{ 1, \dots, N \} \ | \text{ dist} ( F _ { w } ^ { n } ( x ), F _ { w } ^ { n } ( y ) ) < \delta \} \to 1 \quad \text{as } N \to \infty,$$ which can be rewritten as $$\frac { 1 } { N } \sum _ { n = 1 } ^ { N } \text{dist} ( F _ { w } ^ { n } ( x ), F _ { w } ^ { n } ( y ) ) \to 0 \quad \text{as } N \to \infty.$$ Integrating over x and over y , we get $$& \lambda \lambda _ { N } \sum _ { n = 1 } ^ { N } D ( ( F _ { w } ^ { n } ) _ { * } \text{ Leb} ) = \frac { 1 } { N } \sum _ { n = 1 } ^ { N } \iint \text{dist} ( F _ { w } ^ { n } ( x ), F _ { w } ^ { n } ( y ) ) \, d x \, d y \to 0 \quad \text{as } N \to \infty. \\ & \text{Now. take the execution: we set.}$$ Now, take the expectation: we get $$\frac { 1 } { N } \sum _ { n = 1 } ^ { N } \int D ( ( F _ { w } ^ { n } ) _ { * } \text{ Leb} ) \, d \mathbb { P } ( w ) \to 0 \quad \text{as } N \to \infty. \\ \text{fixed $n$. the laws of random comositions $F^{n}$ and $F^{n}$} \dots \text{ coinc}.$$ For any fixed n , the laws of random compositions F n w and F n w,rev coincide: both are the compositions of n independently chosen maps (the difference comes when we consider the sequence of iterations). Hence, $$\text{succ} \, \text{enqueue} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{in} \, \text{hms}$$ and thus But we know that almost surely ( F n w,rev ) ∗ Leb → L ( w ), what implies D F (( n w,rev ) ∗ Leb) → D ( L ( w )) and hence $$& \text{us} \\ & \frac { 1 } { N } \sum _ { n = 1 } ^ { N } \int D ( ( F _ { w, r e v } ^ { n } ) _ { * } \text{Leb} ) \, d \mathbb { P } ( w ) \to 0 \quad \text{as } N \to \infty. \\ & ; \text{ we know that almost surely } ( F _ { w, r e v } ^ { n } ) _ { * } \text{Leb} \quad \to \quad \mathcal { L } ( w ), \quad \text{what is}$$ $$\cdots \, \frac { 1 } { N } \sum _ { n = 1 } ^ { N } \int D ( ( F _ { w, r e v } ^ { n } ) _ { * } \, \text{Leb} ) \, d \mathbb { P } ( w ) \to \int D ( \mathcal { L } ( w ) ) \, d \mathbb { P } ( w ) \quad \text{as } N \to \infty. \\ \intertext { T h e n t o n r a l f $ D ( \mathcal { L } ( w ) \, d \mathbb { P } ( w ) $ v a n i c h e s $ and h o n o $ \mathcal { L } ( w ) $ i a m o t $ a l v $ }$$ $$\mathcal { L } ( w ) = \delta _ { L ( w ) }.$$ Thus, the integral ∫ D ( L ( w )) d P ( w ) vanishes, and hence L ( w ) is almost surely a Dirac measure: This concludes the proof of Theorem 3. /square Proof of Theorem 2. From Theorem 3 we have almost surely $$( F _ { w, r e v } ^ { n } ) _ { * } \text{ Leb} \to \delta _ { L ( w ) } \quad \text{as } n \to \infty,$$ and hence almost surely $$D ( ( F _ { w, r e v } ^ { n } ) _ { * } \, \text{Leb} ) \to 0 \quad \text{as } n \to \infty.$$ In particular, for any ε &gt; 0 $$\mathbb { P } ( D ( ( F _ { w, r e v } ^ { n } ) _ { * } \, \text{Leb} ) > \varepsilon ) \to 0 \quad \text{as } n \to \infty.$$ However (as we have already seen in the proof of Theorem 3), for any n the laws of random compositions F n w and F n w,rev coincide. Hence, $$\mathbb { P } ( D ( ( F _ { w, r e v } ^ { n } ) _ { * } \, \text{Leb} ) > \varepsilon ) = \mathbb { P } ( D ( ( F _ { w } ^ { n } ) _ { * } \, \text{Leb} ) > \varepsilon ),$$ and thus $$\mathbb { P } ( D ( ( F _ { w } ^ { n } ) _ { * } \text{ Leb} ) > \varepsilon ) \to 0 \quad \text{as } n \to \infty.$$ ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1140v1-figure-61e66b68-b785-43d5-9b21-4f8890bea29e.jpg) ## References | [AKMPST] | R.L. Adler, B. Kitchens, M.Martens, C.Pugh, M.Shub, C.Tresser, Convex dynamics | |------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [ANST] | R.L. Adler, T.Nowicki, G. Swirszcz, C.Tresser, Convex dynamics with constant input, Ergodic Theory Dynam. Systems , 30 (2010), no. 4, pp. 957-972. | | [A] | V.A.Antonov, Modeling of processes of cyclic evolution type. Synchronization by a random signal. Vestnik Leningrad. Univ. Mat. Mekh. Astronom. 1984, no. 2, pp. 67-76. | | [As] | P. Ashwin, Elliptic behaviour in the sawtooth standard map, Phys. Lett. A , 232 (1997), no. 6, pp. 409-416. | | [ADF] | P. Ashwin, J. Deane, X.-C.Fu, Dynamics of a Bandpass Sigma-Delta Modulator as a Piecewise Isometry, Proc. - IEEE Int. Symp. on Circuits and Sys. , 3 (2001), pp. 811-814. | | [AF] | P. Ashwin, X.-C.Fu, On the geometry of orientation-preserving planar piecewise isometries, J. Nonlinear Sci. , 12 (2002), no. 3, pp. 207-240. | | [AG] | P. Ashwin, A.Goetz, Invariant curves and explosion of periodic islands in systems of piecewise rotations, SIAM J. Appl. Dyn. Syst. , 4 (2005), no. 2, p. 437-458. | | [AVW] | A.Avila, M.Viana, A.Wilkinson, Absolute continuity, Lyapunov exponents and rigid- ity I: geodesic flows, preprint, arXiv:1110.2365 . | | [BB] | A.Baraviera, Ch. Bonatti, Removing zero Lyapunov exponents, Ergodic Theory Dy- nam. Systems , 23 (2003), no. 6, pp. 1655-1670. | | [Bax] | P. Baxendale, Lyapunov exponents and relative entropy for a stochastic flow of dif- feomorphisms, Probab. Theory Related Fields 81 (1989), no. 4, pp. 521-554. | | [BG] | M.Boshernitzan, A. Goetz, A dichotomy for a two-parameter piecewise rotation, Er- godic Theory Dynam. Systems , 23 (2003), no. 3, pp. 759-770. | | [BK] | M.Boshernitzan, I. Kornfeld, Interval translation mappings, Ergodic Theory Dynam. Systems , 15 (1995), no. 5, pp. 821-832. | | [B] | H.Bruin, Renormalization in a class of interval translation maps of d branches, Dyn. Syst. , 22 (2007), no. 1, pp. 11-24. | | [BC] | H.Bruin, G.Clack, Inducing and Unique Ergodicity of Double Rotations, Discrete Contin. Dyn. Sys. , 32 (2012), pp. 4133-4147. | | [BT] | H.Bruin, S. Troubetzkoy, The Gauss map on a class of interval translation mappings, Israel J. Math. , 137 (2003), pp. 125-148. | | [CGQ] | Y.Cheung, A.Goetz, A.Quas, Piecewise isometries, uniform distribution and 3 log 2 - π 2 / 8, Ergodic Theory Dynam. Systems , 32 (2012), no. 6, pp. 1862-1888. | | [C] | G.Clack, Double rotations, PhD thesis (2013), University of Surrey. | | [D] | J. Deane, Piecewise Isometries: Applications in Engineering, Meccanica , 41 (2006), pp. 241-252. | | [DK] | B. Deroin, V. Kleptsyn, Random conformal dynamical systems, Geom. Funct. Anal. 17 (2007), no. 4, pp. 1043-1105. | | [DKN1] | B. Deroin, V. Kleptsyn, A. Navas, Sur la dynamique unidimensionnelle en r´gularit´ e e interm´diaire, e Acta Math. vol. 199 (2007), no. 2, pp. 199-262. | | [DKN2] | B. Deroin, V. Kleptsyn, A. Navas, On the question of ergodicity for minimal group actions on the circle, Moscow Mathematical Journal , 9 (2009), pp. 263-303. | | [DS] | D.Dolgopyat, J.de Simoi, Dynamics of some piecewise smooth Fermi-Ulam Models , Chaos , 22 , 026124 (2012). | | [F] | A. Furman. Random walks on groups and random transformations. Handbook of dynamical systems, Vol. 1A, pp. 931-1014, North-Holland, Amsterdam, 2002. | | [Fur1] | H. Furstenberg, Noncommuting random products, Trans. Amer. Math. Soc. , 108 (1963), pp. 377-428. | | [Fur2] | H. Furstenberg, Random walks and discrete subgroups of Lie groups, 1971 Advances in Probability and Related Topics , Vol. 1, pp. 1-63, Dekker, New York . | | [GP] | A.Goetz, G. Poggiaspalla, Rotations by π/ 7, Nonlinearity , 17 (2004), no. 5, pp. 1787- 1802. | | [G] | A.Goetz, Dynamics of piecewise isometries, Illinois J. Math. , 44 (2000), no. 3, pp. 465-478. | | [GT] | A.Gogolev, A. Tahzibi, Center Lyapunov exponents in partially hyperbolic dynamics, preprint, arXiv:1310.1985 . | |--------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [GGKV] | T. Golenishcheva-Kutuzova, A. Gorodetski, V. Kleptsyn, D. Volk, Translation num- bers define generators of F + k → Homeo + ( S 1 ), to appear in Moscow Mathematical Journal . | | [HP] | M. Hirayama,Ya. Pesin, Non-absolutely continuous foliations, Israel J. Math. 160 (2007), pp. 173-187. | | [H1] | A.J. Homburg, Synchronization in iterated function systems, preprint . | | [H2] | A.J. Homburg, Atomic disintegrations for partially hyperbolic diffeomorphisms, preprint . | | [H3] | A.J. Homburg, Circle diffeomorphisms forced by expanding circle maps, Ergodic the- ory and dynamical systems , 32 (6), pp. 2011-2024. | | [Hu] | C. H. Hugenii (Huygens), Horologium Oscillatorium. Apud F. Muguet, Parisiis, France, 1673. | | [I] | T.Inoue, Sojourn times in small neighborhoods of indifferent fixed points of one- dimensional dynamical systems, Ergodic Theory Dynam. Systems , 20 (2000), pp. 241-257. | | [Kak] | S. Kakutani Random ergodic theorems and Markov processes with a stable distribu- tion. Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, 1950, University of California Press, Berkeley and Los Angeles (1951), pp. 247-261. | | [K1] | V. Kleptsyn, An example of non-coincidence of minimal and statistical attractors, Ergodic Theory Dynam. Systems , 26 (2006), no. 3, pp. 759-768. | | [K2] | V. Kleptsyn, PhD Thesis, ´ Ecole Normale Sup´rieure e de Lyon, 2005. | | [KN] | V. Kleptsyn, M. Nalskii, Convergence of orbits in random dynamical systems on a circle, Funct. Anal. Appl. vol. 38 (2004), no. 4, pp. 267-282. | | [LV] | J.H. Lowenstein, F. Vivaldi, Approach to a rational rotation number in a piecewise isometric system, Nonlinearity , 23 (2010), no. 10, pp. 2677-2721. | | [PRK] | A. Pikovsky, M. Rosenblum, J. Kurths, Synchronization. A Universal Concept in Nonlinear Sciences , Cambridge: Cambridge University Press, 2001. | | [PT] | G.Ponce, A.Tahzibi, Central Lyapunov exponent of partially hyperbolic diffeomor- phisms of T 3 , to appear in Proceedings of AMS . | | [PTV] | G.Ponce, A.Tahzibi, R.Varao, Mono-atomic disintegration and Lyapunov exponents for derived from Anosov diffeomorphisms, preprint, arXiv:1305.1588 . | | [RW] | D. Ruelle, A. Wilkinson, Absolutely singular dynamical foliations, Comm. Math. Phys. , 219 (2001), pp. 481-487. | | [SV] | R.Saghin, E. Vargas, Invariant measures for Cherry flows, Comm. Math. Phys. , 317 (2013), no. 1, pp. 55-67. | | [SX] | R.Saghin, Zh. Xia, Geometric expansion, Lyapunov exponents and foliations, Ann. Inst. H. Poincar Anal. Non Linaire , 26 (2009), no. 2, pp. 689-704. | | [S] | R.E.Schwartz, Unbounded orbits for outer billiards, J. Modern Dynam. , 3 (2007), p. 371-424. | | [SW] | M. Shub, A. Wilkinson, Pathological foliations and removable zero exponents, Invent. | | [SAO] | Math. , (2000), pp. 495-508. H.Suzuki, K.Aihara, T.Okamoto, Complex behaviour of a simple partial discharge model, Europhys. Lett. , 66 (2004), pp. 28-34. | | [SS] | P. K. Sen; J. M. Singer. Large sample methods in statistics , Chapman & Hall, New York, 1993. xii+382 pp. | | [SIA] | H.Suzuki, S. Ito, K.Aihara, Double rotations, Discrete Contin. Dyn. Syst. , 13 (2005), pp. 515-532. | | [TA] | M.Trovati, P. Ashwin, Tangency properties of a pentagonal tiling generated by a piecewise isometry, Chaos , 17 (2007), 043129. | | [V] | R.Varao, Center foliation: absolute continuity, disintegration and rigidity, preprint, arXiv:1302.1637 . | | [Vo] | D.Volk, Almost every interval translation map of three intervals is finite type, Discrete Contin. Dyn. Syst. , 34 (2014), no. 5, pp. 2307-2314. | | [W] | M.Welling, Herding Dynamical Weights to Learn, ICML '09 Proceedings of the 26th Annual International Conference on Machine Learning , (2009), pp. 1121-1128. | - [Zh] V.G.Zhuravlev, One-dimensional Fibonacci tilings and induced two-color rotations of the circle, Izv. Math. , 74 (2010), no. 2, pp. 281-323 - CNRS, Institute of Mathematical Research of Rennes, IRMAR, UMR 6625 du CNRS E-mail address : [email protected] Department of Mathematics, University of California, Irvine CA 92697, USA E-mail address : [email protected]
null
[ "Anton Gorodetski", "Victor Kleptsyn" ]
2014-08-05T23:01:56+00:00
2014-08-05T23:01:56+00:00
[ "math.DS", "37E10, 37H99, 34D06" ]
Synchronization properties of random piecewise isometries
We study the synchronization properties of the random double rotations on tori. We give a criterion that show when synchronization is present in the case of random double rotations on the circle and prove that it is always absent in dimensions two and higher.
1408.1142v2
## A class of unambiguous state discrimination problems achievable by separable measurements but impossible by local operations and classical communication Scott M. Cohen ∗ Department of Physics, Portland State University, Portland OR 97201 (Dated: December 4, 2014) We consider an infinite class of unambiguous quantum state discrimination problems on multipartite systems, described by Hilbert space H , of any number of parties. Restricting consideration to measurements that act only on H , we find the optimal global measurement for each element of this class, achieving the maximum possible success probability of 1 / 2 in all cases. This measurement turns out to be both separable and unique, and by our recently discovered necessary condition for local quantum operations and classical communication (LOCC), it is easily shown to be impossible by any finite-round LOCC protocol. We also show that, quite generally, if the input state is restricted to lie in H , then any LOCC measurement on an enlarged Hilbert space is effectively identical to an LOCC measurement on H . Therefore, our necessary condition for LOCC demonstrates directly that a higher success probability is attainable for each of these problems using general separable measurements as compared to that which is possible with any finite-round LOCC protocol. PACS numbers: 03.65.Ta, 03.67.Ac ## I. INTRODUCTION In a recent paper [1], we proved a necessary condition (reproduced as Theorem 1, below) that a multi-party quantum measurement can be implemented by local operations and classical communication (LOCC) in any finite number of rounds of communication. It is easily seen that such measurements must be separablethat is, the measurement operators must all be tensor products-and our Theorem 1 provides a strong, and quite general, constraint on the set of product operators representing any measurement implemented by finite-round LOCC. We also showed that the condition of Theorem 1 is extensively violated by separable measurements, a violation limited only by the size of the system, as measured by the number of parties involved. Despite the generality of Theorem 1, we were unable, at the time of writing, to provide examples of separable measurements having obvious practical interest, and which violate the conditions of that theorem. A reasonable criticism, then, was that the theorem was 'primarily of mathematical value with physical implications wanting' [2]. Here, we remedy this deficiency by providing an infinite class of physically motivated examples where the theorem can be directly used to demonstrate the LOCC-impossibility of these specific operational tasks, each of which can, nonetheless, be implemented by separable measurements. Our examples involve the optimal unambiguous discrimination of quantum states, a subject pioneered by Ivanovic [3], Dieks [4], and Peres [5]. This is one method of extracting information from non-orthogonal states, wherein due to this non-orthogonality, the information cannot be obtained perfectly. There are numerous scenarios that involve the extraction of information under such conditions, including quantum cryptography and quantum key distribution [6]. It is therefore a subject of considerable significance in quantum information processing, with implications for both theory and experiment, and its study remains robust to this day [7-10]. In the scenario of unambiguous state discrimination, a quantum system is prepared in one of a given set of states, and the aim is to perform measurements on that system in order to determine in which state it was prepared. It is required that the error probability is zero-one can never guess one state when it happens to be another-which means that when the states are not mutually orthogonal, there must be an inconclusive outcome, one for which the given state remains unknown. Chefles [11] has shown that the states in the given set can be unambiguously discriminated if and only if they are linearly independent, and then the measurement involves the reciprocal set of states, see be- ∗ Electronic address: [email protected] low. When the states form a symmetric set and the a priori probabilities are all equal, then an optimal measurement-one achieving the maximum possible success probability-was obtained in [12]. Later, Eldar [13] showed that the problem of finding an optimal measurement for an arbitrary set of linearly independent pure states can be formulated as a semidefinite programming problem. We will assume that the quantum system under consideration is made up of P spatially separated parts, and that the separate parties utilize LOCC in order to discriminate the states. Chefles [14] found a condition, valid for both separable measurements and for LOCC, which is necessary and sufficient that a set of states can be unambiguously discriminated. The equivalence of LOCC and the full set of separable measurements for this question is not obvious, even though every LOCC is also separable [15]. The reason is the existence of separable measurements that cannot be implemented by LOCC, a discovery first made in [16]. Of course, this result of [14] does not say that for unambiguous state discrimination, use of the full set of separable measurements is equivalent to using only LOCC, because there is still the question of finding an optimal measurement. Along these lines, it was shown in [17] that the success probability with general separable measurements can exceed that for LOCC for a pair of two-qubit states, one pure and the other mixed. As far as we are aware, this is the only known example of a separation between separable measurements and LOCC for unambiguous state discrimination. Here, we provide an infinite set of new examples showing such a separation, all of which only involve pure states, including one case involving two qubits. For these examples, we use Theorem 1 to show that LOCC cannot achieve as high a success probability as is possible with separable measurements. This then accomplishes a main goal of this paper, which is to demonstrate the utility of Theorem 1. Consider a multipartite system of P parts, described by Hilbert space H = H ⊗ ··· ⊗ H 1 P of overall dimension D , and a separable measurement on H consisting of N measurement operators K j = K (1) j ⊗··· ⊗ K ( P ) j satisfying K ≥ j 0 and ∑ j K j = I , with I the identity on H . Following the ideas in [1], we consider the convex cones generated by the set of local operators {K ( α ) j } , for each α . As the number of operators is finite, these are polyhedral cones, having a finite number of extreme rays. 1 Let us count the distinct extreme rays in the convex cone generated by the set of local operators {K ( α ) j } , for each party α , and define this number to be e α . Then, the following theorem was proved in [1]. Theorem 1. For any finite-round LOCC protocol of P parties implementing a separable measurement corresponding to the N distinct positive product operators {K j = K (1) j ⊗ . . . ⊗K ( P ) j } N j =1 , it must be that $$\sum _ { \alpha = 1 } ^ { P } e _ { \alpha } & \leq 2 ( N - 1 ), \quad \quad \quad ( 1 ) \\ & \quad \quad \quad \, \quad \, \cdots \, \quad \,..$$ where e α is the number of distinct extreme rays in the convex cone generated by operators {K ( α ) j } N j =1 , and the sum includes only those parties for which at least one of these local operators is not proportional to the identity. In [1], we presented separable measurements consisting of a set of product operators { Ψ k } N k =1 for every D and prime N &gt; D , for which the upper bound in this theorem is violated maximally, satisfying ∑ e α = PN , thus demonstrating a very strong difference between separable measurements and LOCC. In Section II, we use these same operators to construct sets of states for which the optimal global measurement for unambiguous state discrimination is separable and (for present purposes, effectively) unique, see Theorem 4, and which cannot be implemented by finite-round LOCC, a result that follows immediately from Theorem 1. Theorem 4 states further that the optimal probability of success, which is achievable by a separable measurement, cannot be achieved using finite-round LOCC, even when applied to an enlarged Hilbert space. In Section III, we give a proof of Theorem 4, and then we offer our conclusions in Section IV. 1 A ray is a half-line of the form { λ ˆ K ( α ) j | λ ≥ } 0 . An extreme ray of a convex cone is a ray that lies in the cone but cannot be written as a positive linear combination of other rays in that cone. ## II. SEPARABLE MEASUREMENTS THAT ARE STRICTLY BETTER THAN LOCC Consider any prime number N ≥ 5 and a multipartite system having overall dimension D = N -1. The number of parties P can be chosen in any way consistent with the prime factorization of D -this choice is generally not unique, but it is unimportant for our present purposes. Let H α be the Hilbert space describing party α 's subsystem, and the overall Hilbert space is then H = H ⊗H ⊗ 1 2 . . . H P . Define states $$| \Psi _ { j } \rangle = | \psi _ { j } ^ { ( 1 ) } \rangle \otimes \dots \otimes | \psi _ { j } ^ { ( P ) } \rangle, \ j = 1, \dots, N,$$ with $$| \psi _ { j } ^ { ( \alpha ) } \rangle & = \frac { 1 } { \sqrt { d _ { \alpha } } } \sum _ { m _ { \alpha } = 0 } ^ { d _ { \alpha } - 1 } e ^ { 2 \pi i j p _ { \alpha } m _ { \alpha } / N } | m _ { \alpha } \rangle, \\ \text{sion of } \mathcal { H } _ { \mu } \text{ with parties ordered such that } d, < d _ { \sigma } < \dots < d _ { \sigma } \text{ and overall dimension}$$ where d α is the dimension of H α , with parties ordered such that d 1 ≤ d 2 ≤ · · · ≤ d P , and overall dimension D = d d 1 2 · · · d P . Here, p 1 = 1 and for α ≥ 2, p α = d d 1 2 · · · d α -1 , and | m α 〉 is the standard basis for party α . It was shown in [1] that $$I = \frac { D } { N } \sum _ { j = 1 } ^ { N } \Psi _ { j },$$ where Ψ j = Ψ | j 〉〈 Ψ . j | We will choose D of the | Ψ j 〉 and then show they are a basis of the full space. First note that diagonal unitary $$U ^ { ( \alpha ) } = \sum _ { m _ { \alpha } = 0 } ^ { d _ { \alpha } - 1 } e ^ { 2 \pi i p _ { \alpha } m _ { \alpha } / N } | m _ { \alpha } \rangle \langle m _ { \alpha } | \\. \cdots. \tau ( \alpha ) \vdots \tau ( \alpha ) \cdots. \cdots.$$ permutes the states | ψ ( α ) j 〉 . That is, U ( α ) | ψ ( α ) j 〉 = | ψ ( α ) j +1 〉 , and we have set | ψ ( α ) N +1 〉 = | ψ ( α ) 1 〉 . Therefore, U = U (1) ⊗ · · · ⊗ U ( P ) permutes the | Ψ j 〉 , showing that the latter N states are a symmetric set. (Note, however, that the chosen D = N -1 states are not a symmetric set.) As a consequence, it does not matter which of the N states we omit in choosing a basis of the full D -dimensional space-any conclusions reached by omitting one could equally well have been reached by omitting any other-so without loss of generality, we will choose to omit | Ψ 1 〉 . Let us then define two sets of states, $$\mathcal { S } _ { \Psi } & = \{ | \Psi _ { j } \} _ { j = 2 } ^ { N },$$ and $$\mathcal { S } _ { \Phi } = \{ | \Phi _ { j } \rangle \} _ { j = 2 } ^ { N }, \quad \$$ each set reciprocal to the other. [Given (2) and (3), this reciprocity is how the | Φ j 〉 are to be determined, see (8) below.] Our aim is to unambiguously discriminate S Φ . Existence of a reciprocal set of states requires that the original set is linearly independent, so we must demonstrate that the D states of S Ψ possess this property. Actually, the following lemma is more general than what we need. Lemma 2. Given a prime number N and any D ≤ N , any subset I ⊆ [1 , . . . , N ] of D or fewer of the states | Ψ j 〉 , defined in (2) , constitutes a linearly independent set. Proof. Consider $$\text{onsider} \\ & 0 = \sum _ { j \in \mathcal { I } } c _ { j } | \Psi _ { j } \rangle \\ &$$ By an argument similar to that following Eq. (6) of [1], one sees that ∑ α p α m α takes on each value ranging from 0 to D -1, and each of these values corresponds to a unique set of the indices, m α . Choosing any |I| values of k = k ( { m α } ) = ∑ α p α m α from (7), we can represent these |I| constraints as M/vector c = 0, where the j th component of /vector c is c j , and |I| × |I| matrix M has components M kj = e 2 π jk/N i . It is clear that M is a sub-matrix of the N × N matrix Ω = ( ω jk ) N -1 j,k =0 , with ω = e 2 π /N i a primitive root of unity. Then, by Chebotar¨ ev's theorem on roots of unity [18], M is invertible. This implies that c j = 0 ∀ j ∈ I and that the set {| Ψ j 〉} j ∈I is linearly independent, which completes the proof. /squaresolid Given states | Ψ j 〉 , the reciprocal states | Φ j 〉 are defined by the relations $$\langle \Psi _ { k } | \Phi _ { j } \rangle = \delta _ { j k } \langle \Psi _ { j } | \$$ The set of states S Φ , given with a priori probabilities η j , can be unambiguously discriminated [11] by the measurement M { ( w j } ) consisting of operators { w j Ψ j } N j =2 and one additional 'failure' operator, $$\Pi _ { f } = I - \sum _ { j = 2 } ^ { N } w _ { j } \Psi _ { j }. \quad \quad \quad$$ To find an optimal measurement, the weights w j are chosen so as to minimize the probability of failure, $$P r ( f ) = \sum _ { j = 2 } ^ { N } \eta _ { j } \text{Tr} \left ( \Pi _ { f } \Phi _ { j } \right ),$$ with Φ j = Φ | j 〉〈 Φ . j | /negationslash Note that since the D chosen | Ψ j 〉 are linearly independent and a basis of the full Hilbert space H , their reciprocal states | Φ j 〉 are also linearly independent and a basis of H . Therefore, since 〈 Ψ Φ k | j 〉 = 0 ∀ j = k , if for some k we replace | Φ k 〉 by | Ψ k 〉 in the basis formed by the states in S Φ , we will still have a basis of H . This means that if we exclude | Φ k 〉 from the set S Φ , the only positive operator that annihilates all of the remaining states is Ψ k , up to multiplicative factors. Hence, we have the following corollary to Lemma 2. Corollary 3. The only positive operators acting on H that will unambiguously identify | Φ k 〉 are those proportional to Ψ k defined in (2) . This implies that the only such measurements unambiguously discriminating the set S Φ are those of the form M { ( w j } ) defined above (9) , and the only freedom available for optimizing these measurements lies in the choice of the w j . In the next section, we will prove the following theorem. Theorem 4. If a priori probabilities η j = 1 /D ∀ j , then the optimal global measurement, M opt , for unambiguous discrimination of the set of states that is reciprocal to any D = N -1 of the states defined in (2) is - (i) separable; - (ii) unique, when restricting to measurements that act only on H ; - (iii) consists of measurement operators D Ψ j /N,j = 1 , . . . , N ; and - (iv) achieves Pr f ( ) = 0 5 . ; In addition, Pr f ( ) &gt; 0 5 . for this task when using any finite-round LOCC protocol. The last statement in this theorem requires the following lemma, which is proved in the appendix. Lemma 5. Given a multipartite system of P parties described by Hilbert space H , consider any enlargement of H to H ′ . Then, for any LOCC protocol L implementing a measurement on H ′ that involves input states that are supported only on H , there exists an effectively identical LOCC measurement on H which accomplishes precisely what is accomplished by L . Before moving on to the proof of Theorem 4, let us give an explicit example, providing expressions for the states, | Φ j 〉 , in the case of two qubits with N = 5. These four states are $$\text{--} \cots \cots \cots \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \ rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \rightharpoonup \righthopop} \\ \text{states,} | \Phi _ { 3 } \rangle = \frac { 1 } { \sqrt { 5 + \sqrt { 5 } } } \left ( - e ^ { - 2 \pi i / 5 } | 0 0 \rangle + ( 1 + e ^ { - 2 \pi i / 5 } ) | 0 1 \rangle - ( 1 + e ^ { 2 \pi i / 5 } ) | 1 0 \rangle + e ^ { 2 \pi i / 5 } | 1 1 \rangle \right ), \\ | \Phi _ { 3 } \rangle = \frac { 1 } { \sqrt { 5 + \sqrt { 5 } } } \left ( \frac { e ^ { 2 \pi i / 5 } } { 2 \cos ( 2 \pi / 5 ) } | 0 0 \rangle - | 0 1 \rangle - e ^ { \pi i / 5 } | 1 0 \rangle + ( 1 + e ^ { - 2 \pi i / 5 } ) | 1 1 \rangle \right ), \\ | \Phi _ { 4 } \rangle = \frac { 1 } { \sqrt { 5 + \sqrt { 5 } } } \left ( ( 1 + e ^ { 2 \pi i / 5 } ) | 0 0 \rangle - e ^ { \pi i / 5 } | 0 1 \rangle + e ^ { \pi i / 5 } | 1 0 \rangle - ( 1 + e ^ { 2 \pi i / 5 } ) | 1 1 \rangle \right ), \\ | \Phi _ { 5 } \rangle = \frac { 1 } { \sqrt { 5 + \sqrt { 5 } } } \left ( | 0 0 \rangle + \frac { e ^ { 2 \pi i / 5 } } { 2 \cos ( 2 \pi / 5 ) } | 0 1 \rangle + ( 1 + e ^ { 2 \pi i / 5 } ) | 1 0 \rangle - e ^ { - 2 \pi i / 5 } | 1 1 \rangle \right ). \\ \text{We note that these states are all entangled, their reduced density matrices having Von Neumann entropy} \\ \text{approximately equal to 0.3, the same for all four states. The optimal measurement to unambiguously} \\ \text{discriminate this set of states is given by operators } D \Psi _ { i } / N, \ j = 1, 2, 3, 4, 5, with$$ We note that these states are all entangled, their reduced density matrices having Von Neumann entropy approximately equal to 0 3, . the same for all four states. The optimal measurement to unambiguously discriminate this set of states is given by operators D Ψ j /N, j = 1 2 3 4 5, with , , , , $$\text{te this set of states is given by operators } D \Psi _ { j } / N, \, j = 1, \, j, 2, 3, 4, 5, \, \text{with} \\ | \Psi _ { 1 } \rangle & = \frac { 1 } { 2 } \left ( | 0 0 \rangle + e ^ { 4 \pi i / 5 } | 0 1 \rangle + e ^ { 2 \pi i / 5 } | 1 0 \rangle + e ^ { - 4 \pi i / 5 } | 1 1 \rangle \right ), \\ | \Psi _ { 2 } \rangle & = \frac { 1 } { 2 } \left ( | 0 0 \rangle + e ^ { - 2 \pi i / 5 } | 0 1 \rangle + e ^ { 4 \pi i / 5 } | 1 0 \rangle + e ^ { 2 \pi i / 5 } | 1 1 \rangle \right ), \\ | \Psi _ { 3 } \rangle & = \frac { 1 } { 2 } \left ( | 0 0 \rangle + e ^ { 2 \pi i / 5 } | 0 1 \rangle + e ^ { - 4 \pi i / 5 } | 1 0 \rangle + e ^ { - 2 \pi i / 5 } | 1 1 \rangle \right ), \\ | \Psi _ { 4 } \rangle & = \frac { 1 } { 2 } \left ( | 0 0 \rangle + e ^ { - 4 \pi i / 5 } | 0 1 \rangle + e ^ { - 2 \pi i / 5 } | 1 0 \rangle + e ^ { 4 \pi i / 5 } | 1 1 \rangle \right ), \\ | \Psi _ { 5 } \rangle & = \frac { 1 } { 2 } \left ( | 0 0 \rangle + | 0 1 \rangle + | 1 0 \rangle + | 1 1 \rangle \right ).$$ The failure operator in this case is Π f = D Ψ 1 /N . We now proceed to the proof of Theorem 4. ## III. PROOF OF THEOREM 4 We begin by noting that Lemma 5 applies to any number of parties, including when there is only one. Therefore, if we find an optimal global measurement under the restriction that it acts only on H , then this measurement is also optimal without such a restriction. Then, according to Corollary 3, we can find an optimal measurement by considering M { ( w j } ), defined by (9) and the sentence which precedes it, and then minimizing the probability of failure over all choices of the weights, w j . Inserting (4) into (9), we have $$\varphi \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array} \varphi \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cd.$$ /negationslash For each l = 1, define a dual basis for the D states obtained by omitting | Ψ l 〉 from the full set {| Ψ j 〉} N j =1 . Denote these bases-one basis for each l -as | ξ ( ) l k 〉 , which satisfy $$\langle \xi _ { k } ^ { ( l ) } | \Psi _ { j } \rangle = \delta _ { j k } \ \forall j, k \neq l.$$ /negationslash Let us first show that ∣ ∣ ∣ 〈 ξ ( ) l k | Ψ l 〉 ∣ ∣ ∣ = 1. Recalling the comment in the sentence following (7), we have $$0 = \sum _ { j = 1 } ^ { N } e ^ { 2 \pi i j / N } | \Psi _ { j } \rangle.$$ /negationslash and the desired result follows immediately. Recalling that Π f ≥ 0, we now have from (13) that $$\text{Since} \left | \xi _ { k } ^ { ( l ) } \right \rangle \text{ is orthogonal to} \left | \Psi _ { j } \right \rangle \forall j \neq k, l, \text{ then multiplying} \left ( 15 \right ) \text{ from the left by} \left ( \xi _ { k } ^ { ( l ) } \right | \text{ yields} \\ 0 & = e ^ { 2 \pi i k / N } + e ^ { 2 \pi i / N } \left \langle \xi _ { k } ^ { ( l ) } \right | \Psi _ { l } \right \rangle, \\ \text{and the desired result follows immediately. Recalling that} \, \Pi _ { r } > 0. \text{ we now have from} \left ( 1 3 \right ) \text{ that}$$ 0 ≤ 〈 ξ | Π D ( ) l ( ) l D ( ) l 2 k f | ξ k 〉 = N - w k +( N - w l ) 〈 ξ k | Ψ l 〉 , (17) ∣ ∣ $$w _ { k } + w _ { l } \leq \frac { 2 D } { N }, \, \forall k, l \neq 1,$$ a result we will use below. We now turn to the failure probability, $$\text{the failure probability}, & P r ( f ) & = \frac { 1 } { D } \sum _ { j = 2 } ^ { N } \text{Tr} \left ( \Pi _ { f } \Phi _ { j } \right ), \\ & = \frac { 1 } { D } \sum _ { j = 2 } ^ { N } \text{Tr} \left ( \left [ I - \sum _ { k = 2 } ^ { N } w _ { k } \Psi _ { k } \right ] \Phi _ { j } \right ), \\ & = 1 - \frac { 1 } { D } \sum _ { j = 2 } ^ { N } q _ { j } w _ { j }, \\ \mathfrak { 1 } \left ( 9 \right ) \text{ followed by } ( 8 ), \text{ and defined } q _ { j } = | \left \langle \Phi _ { j } | \Psi _ { j } \right \rangle | ^ { 2 }. \text{ The } q _ { j } \text{ can be found by taking the}. \, \text{$\mathfrak{ }w$ with } ( 1 5 \right \rangle $ \text{ obtsin} \sigma$}$$ where we have used (9) followed by (8), and defined q j = |〈 Φ Ψ j | j 〉| 2 . The q j can be found by taking the inner product of | Φ k 〉 with (15), obtaining which gives $$0 = e ^ { 2 \pi i / N } \langle \Phi _ { k } | \Psi _ { 1 } \rangle + e ^ { 2 \pi i k / N } \langle \Phi _ { k } | \Psi _ { k } \rangle,$$ $$q _ { k } = | \langle \Phi _ { k } | \Psi _ { 1 } \rangle | ^ { 2 } \,. \quad \quad & & ( 2 1 ) \\ \vee \iota \dots \pi \, \dots \pi \, \dots \pi \, \dots \pi \, \dots \pi \, \dots \pi \, \dots \pi \, \dots \pi$$ On the other hand, multiplying (4) by Φ k and taking the trace, we have $$\cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \\ \frac { N } { D } & = | \langle \Phi _ { k } | \Psi _ { 1 } \rangle | ^ { 2 } + | \langle \Phi _ { k } | \Psi _ { k } \rangle | ^ { 2 } \,, \\ & = 2 q _ { k },$$ having used (21) to obtain the last line. Hence, $$q _ { k } = \frac { N } { 2 D } \ \forall k = 2, \dots, N.$$ Inserting this into (19), we have $$P r ( f ) & = 1 - \frac { N } { 2 D ^ { 2 } } \sum _ { j = 2 } ^ { N } w _ { j }. \\ \text{ms if } \exists k ( u n. \ > D / N \ ) \ \text{Then}$$ Let us now see what happens if ∃ k w ( k &gt; D/N ). Then, /negationslash /negationslash $$\text{at happens if $\existsk(w_{k}>D/N).\ Then,} \\ \sum _ { j = 2 } ^ { N } w _ { j } & = \sum _ { 2 = j \neq k } ^ { N } w _ { j } + w _ { k } \\ & \leq \sum _ { 2 = j \neq k } ^ { N } ( \frac { 2 D } { N } - w _ { k } ) + w _ { k } \\ & = ( N - 2 ) \frac { 2 D } { N } - ( N - 3 ) w _ { k } \\ & < ( D - 1 ) \frac { 2 D } { N } - ( D - 2 ) \frac { D } { N } = \frac { D ^ { 2 } } { N },$$ /negationslash ∣ ∣ ∣ ∣ or where we used (18) to obtain the second line, and the fact that D = N -1 to get the last inequality. Therefore, the maximum of this sum has w j = D/N ∀ j = 2 , . . . , N , because in this case $$\sum _ { j = 2 } ^ { N } w _ { j } = \frac { D ^ { 2 } } { N }. \quad \quad \quad$$ Maximizing this sum minimizes Pr f ( ), see (24), and since by (4) the latter choice of w j is a valid complete measurement-having measurement operators { D Ψ j /N } N j =1 , with Π f = D Ψ 1 /N -this is therefore our optimal global measurement. From (24), we see that this measurement achieves $$P r ( f ) = 0. 5,$$ which is thus our optimal probability of failure. As each Ψ j is a product operator, this measurement is clearly separable. By Corollary 3 along with the fact, just demonstrated, that there is one and only one set of { w j } that minimizes Pr f ( ), it is also the unique optimal measurement whose action is restricted to H . Since every operator in this measurement is a tensor product of positive, rank-1 operators on P parties, and noting that rank-1 positive operators are extreme rays in the convex cone of all positive operators and therefore must be extreme in the convex cone generated by any set of positive operators, each local part ψ ( α ) j of each Ψ j is extreme in the collection of all ψ ( α ) j , for each party α . We thus see that e α = N ∀ α , and the sum of extreme rays yields ∑ α e α = PN &gt; 2( N -1), an extensive violation of Theorem 1. Therefore, it is not possible to implement this measurement by finite-round LOCC acting on H . By Lemma 5 we see that for these input states and any LOCC measurement on an enlarged Hilbert space, there is an effectively identical LOCC measurement on H . The phrase 'effectively identical' means that the two measurements have the same set of outcomes (excluding those outcomes that can never occur, see the appendix), where each outcome in the measurement on the enlarged space has the same probability (and output state) as the corresponding outcome in the other measurement, which is a measurement that acts only on H . Therefore, if there is a finite-round LOCC measurement on the enlarged Hilbert space that achieves the optimal probability of success, then its 'effectively identical' counterpart, which achieves the same probabilities, is a finite-round LOCC measurement on H that also achieves that optimal probability of success. This is a contradiction, since we've just seen that no such measurement on H exists, implying there is no such LOCC measurement on the enlarged Hilbert space, either. 2 We therefore see that no finite-round LOCC protocol can be optimal, including those that act on an enlarged Hilbert space, and this completes the proof of Theorem 4. ## IV. CONCLUSIONS We have presented a class of problems involving the unambiguous discrimination of quantum states, and have shown in Theorem 4 that for each element in this class, there exists an optimal, separable measurement, achieving the minimum possible failure probability of 0 5, which is the unique such measurement that acts . only on the space H spanned by the set of states to be discriminated. We then demonstrated the utility of Theorem 1 of [1], a recently discovered necessary condition that a separable measurement can be implemented by finite-round LOCC, by using the latter theorem to (easily) prove that this separable measurement cannot be implemented by LOCC in any finite number of rounds. Finally, we showed that any LOCC measurement on an enlarged Hilbert space must also be strictly less than optimal. We note that this class of problems is infinitely large, having at least one element for each prime number N . (Generally it will, in fact, have more than one element for any given N , as long as D = N -1 is not the product of two primes.) Therefore, we have solved an infinite set of unambiguous discrimination problems, each of which has an optimal measurement that is separable, but for which there is no finite-round LOCC measurement that is optimal. Due to a result of [19], this class of problems includes an infinite number of examples for each number of parties, P , and we have included an explicit example here for the simplest system of two qubits, see (11). 2 Note that since Theorem 1 only provides a necessary condition for LOCC, it may well be the case that the measurement on H ′ satisfies the bound in that theorem, even when that measurement cannot be implemented by LOCC. If the parties are given multiple copies of the chosen state, $$| \Phi _ { j } ^ { \otimes n } \rangle = & | \widetilde { \Phi _ { j } } \rangle \ot$$ then one can use the same arguments used above for a single copy to also show that there exists an optimal global measurement that is separable and that achieves the minimum possible Pr f ( ) = 2 -n . This optimal measurement consists of the N n measurement operators { ( D/N ) n Ψ j 1 ⊗ Ψ j 2 ⊗···⊗ Ψ j n , j k = 1 , . . . , N ∀ } k , and one can easily show that this measurement cannot be implemented by finite-round LOCC, again by using Theorem 1. However, there are now an infinite number of other measurements that act only on the original Hilbert space and also achieve this same Pr f ( ), and we do not at present know whether any of these are separable, let alone if they are LOCC. It is thus an open question whether or not LOCC is as good as separable measurements for these states in the multiple-copy scenario. For the single-copy case considered in this paper, we conjecture that the set of states S Φ cannot be optimally unambiguously discriminated by LOCC even with an infinite number of rounds of communication. We have discussed why we believe this is so in the conclusions of [1]. As an early step toward proving this conjecture, we have recently managed to prove a result which implies the following conclusion about the optimal measurement for this task, M opt of Theorem 4: if there exists an LOCC protocol implementing M opt , then every branch of this protocol must continue for an infinite number of rounds. That is, in any such protocol, no outcome of any intermediate measurement can be terminal-the parties must continue measuring forever no matter what outcomes have been obtained in earlier rounds. While this result does not in itself prove the conjecture, it does strengthen our belief that M opt cannot be implemented by LOCC even with an infinite number of rounds, and we hope to find a full proof of this result in the not-too-distant future. Acknowledgments -The author would like to thank Li Yu for helpful comments, and an anonymous referee for asking about the possibility of measurements on an enlarged Hilbert space, a question which led directly to Lemma 5. This work has been supported in part by the National Science Foundation through Grant No. 1205931. ## Appendix: Proof of Lemma 5 Consider any measurement on the enlarged Hilbert space H ′ and suppose the Kraus operators for that measurement are the set { K j } . Define Π = Π 1 ⊗ Π 2 ⊗ . . . to be the projector (from H ′ ) onto the original system H . Then, the set of Kraus operators, { K j Π , I ′ -Π , is a complete measurement on } H ′ , where I ′ is the identity operator on H ′ . There is no guarantee that I ′ -Π is a product operator, but one can write $$I ^ { \prime } - \Pi = ( I ^ { \prime } _ { 1 } - \Pi _ { 1 } ) \otimes I ^ { \prime } _$$ which as we will see in a moment is a sum of product operators that, along with Π, can be implemented by LOCC. Now suppose the measurement under consideration, which acts on the larger space, can be implemented by LOCC using, say, protocol L . Then, consider the LOCC protocol consisting of protocol L preceded by a series of measurements as follows: Party 1 starts out by doing a two-outcome measurement { Π 1 , I ′ 1 -Π 1 } . If she gets the second outcome, they terminate the protocol, but otherwise party 2 measures { Π 2 , I ′ 2 -Π 2 } . If he gets the second outcome, they terminate, but otherwise party 3 measures { Π 3 , I ′ 3 -Π 3 } , and so on until all parties have done this, after which they proceed with protocol L . Now, since we consider only input states supported on H , I ′ 1 -Π 1 has zero probability of occurrence, as do the other outcomes I ′ α -Π α for each party α . Under these circumstances, the modification of protocol L becomes an LOCC measurement acting on the original space H alone, which has the exact same probabilities as does protocol L , and in fact, the output state for each branch of the protocol is also identical in the two cases. Or perhaps it is more precise to put it this way: Since outcomes I ′ α -Π α have zero probability of success, nothing changes if we simply begin at the point where Π has been implemented (after all P parties have performed their two-outcome measurements { Π α , I ′ α -Π α } ). From a purely technical perspective, we can't really do this on the enlarged space, because then the POVM elements don't represent a complete measurement, but we can certainly do this on the original space instead of the enlarged one. Then this is an LOCC measurement on H , which achieves the exact same result as does protocol L . Indeed in a matrix representation, we can write Π = diag ( I H , 0 H ⊥ ) and $$K _ { j } \Pi & = \left ( \tilde { K } _ { j } \ \tilde { 0 } \right ), & ( \text{A$$ where I H is the identity operator on H , ˜ K j is an operator that acts only on H , and 0 H ⊥ and ˜ are zero 0 operators that act only on H ⊥ , which we define to be the orthogonal complement of H in H ′ . Note that whereas 0 H ⊥ is a square matrix, ˜ K j and ˜ need not be square; they may map to a space larger or smaller 0 than that on which they act, but both map to the same output space, say H out , which is also the output space for the operator on H ′ that we started with, K j . Then the matrix ˜ K j represents an operator that acts on H (and whose output is H out ), and the collection of these operators constitutes a measurement { ˜ K j } acting only on H , which is effectively identical to the measurement { K j } when the latter acts only on inputs that are confined to H . That is, measurement { ˜ K j } , which is a measurement that acts only on H , achieves exactly what is achieved when { K j } acts on inputs that are confined to H . This completes the proof. /squaresolid - [1] S. M. Cohen, Phys. Rev. A 90 , 012336 (2014). - [2] Much thanks go to an anonymous referee who voiced this criticism and provided the impetus for the present work. - [3] I. Ivanovic, Physics Letters A 123 , 257 (1987). - [4] D. Dieks, Physics Letters A 126 , 303 (1988). - [5] A. Peres, Physics Letters A 128 , 19 (1988). - [6] M. Dusˇ ek, M. Jahma, and N. L¨tkenhaus, Phys. Rev. A u 62 , 022306 (2000). - [7] L. Roa, C. Hermann-Avigliano, R. Salazar, and A. B. Klimov, Phys. Rev. A 84 , 014302 (2011). - [8] J. A. Bergou, U. Futschik, and E. Feldman, Phys. Rev. Lett. 108 , 250502 (2012). - [9] E. Chitambar, R. Duan, and M.-H. Hsieh, IEEE Trans. Inf. Theory 60 , 1549 (2014). - [10] G. Waldherr, A. C. Dada, P. Neumann, F. Jelezko, E. Andersson, , and J. Wrachtrup, Phys. Rev. Lett. 109 , 180501 (2012). - [11] A. Chefles, Physics Letters A 69 , 339 (1998). - [12] A. Chefles and S. M. Barnett, Physics Letters A 250 , 223 (1998). - [13] Y. C. Eldar, IEEE Trans. Inf. Theory 49 , 446 (2003). - [14] A. Chefles, Phys. Rev. A 69 , 050307 (2004). - [15] E. M. Rains, Phys. Rev. A 60 , 173 (1999). - [16] C. H. Bennett, D. P. DiVincenzo, C. A. Fuchs, T. Mor, E. Rains, P. W. Shor, J. A. Smolin, , and W. K. Wootters, Phys. Rev. A 59 , 1070 (1999). - [17] M. Koashi, F. Takenaga, T. Yamamoto, and N. Imoto, arXiv:0709.3196 [quant-ph] (2007). - [18] R. J. Evans and I. M. Isaacs, Proc. Amer. Math. Soc. 58 , 51 (1976). - [19] P. Erd¨s and A. M. Odlyzko, J. Number Theory o 11 , 257 (1979).
10.1103/PhysRevA.91.012321
[ "Scott M. Cohen" ]
2014-08-05T23:32:33+00:00
2014-12-03T15:38:48+00:00
[ "quant-ph" ]
A class of unambiguous state discrimination problems achievable by separable measurements but impossible by local operations and classical communication
We consider an infinite class of unambiguous quantum state discrimination problems on multipartite systems, described by Hilbert space $\cal{H}$, of any number of parties. Restricting consideration to measurements that act only on $\cal{H}$, we find the optimal global measurement for each element of this class, achieving the maximum possible success probability of $1/2$ in all cases. This measurement turns out to be both separable and unique, and by our recently discovered necessary condition for local quantum operations and classical communication (LOCC), it is easily shown to be impossible by any finite-round LOCC protocol. We also show that, quite generally, if the input state is restricted to lie in $\cal{H}$, then any LOCC measurement on an enlarged Hilbert space is effectively identical to an LOCC measurement on $\cal{H}$. Therefore, our necessary condition for LOCC demonstrates directly that a higher success probability is attainable for each of these problems using general separable measurements as compared to that which is possible with any finite-round LOCC protocol.
1408.1143v2
## Machine learning for many-Body physics: The case of the Anderson impurity model Louis-Fran¸ cois Arsenault 1 , Alejandro Lopez-Bezanilla , O. Anatole von Lilienfeld 2 3 4 , , and Andrew J. Millis 1 1 Department of Physics, Columbia University, New York, New York 10027, USA - 2 Materials Science Division, Argonne National Laboratory, 9700 S. Cass Avenue, Lemont, IL 60439, USA 3 Institute of Physical Chemistry, Department of Chemistry, University of Basel, Klingelbergstrasse 80, CH-4056 Basel, Switzerland 4 Argonne Leadership Computing Facility, Argonne National Laboratory, 9700 S. Cass Avenue, Lemont, IL 60439, USA (Dated: November 4, 2014) Machine learning methods are applied to finding the Green's function of the Anderson impurity model, a basic model system of quantum many-body condensed-matter physics. Different methods of parametrizing the Green's function are investigated; a representation in terms of Legendre polynomials is found to be superior due to its limited number of coefficients and its applicability to state of the art methods of solution. The dependence of the errors on the size of the training set is determined. The results indicate that a machine learning approach to dynamical mean-field theory may be feasible. PACS numbers: 71.10.-w,71.27.+a,89.20.Ff ## I. INTRODUCTION The fermionic quantum many-body problem is believed to be in the class of problems whose full solution is exponentially hard . 1 Approximate methods have been developed, but many of these are also extremely computationally demanding. There is, therefore, an ongoing search for efficient approximate methods, useful, for example, in computational surveys of wide classes of materials, or to provide a first look at a complicated situation. The predominant approach has been to use simplifying approximations, for example, truncated perturbationtheory series expansions, variants of mean-field theory, quasiclassical approximations, or analytical interpolation functions. The development of machine learning (ML) techniques in computer science motivates us to explore a complementary approach. ML provides an estimate of the result of a calculation based on interpolation from a statistical analysis of datasets of solved problems . 2 ML is widely used in many big-data applications, and has recently been proposed as a method for obtaining approximate solutions of the equations of density functional theory (DFT) , 3 of the molecular electronic Schr¨dinger equation o 4,5 , and of transmission coefficients for electron quantum transport . 6 ML is also used to construct force-fields from molecular dynamics 7-11 . In this paper we investigate ML techniques to infer solutions to the quantum many-body problem arising in applications of the dynamical mean-field theory (DMFT) method. 12-14 DMFT has become widely used in condensed-matter physics and materials science for obtaining nonperturbative information about materials with strong local correlations. While DMFT is an approximation to the full many-body problem, it does require the solution of a fully interacting quantum impurity model (a quantum field theory defined in zero space but one time dimension), and accurate solutions require substantial numerical effort which is time consuming even with modern algorithms and hardware 15-17 . A sufficiently accurate ML model of DMFT could provide an inexpensive solver , useful for rapid preliminary screening of wide ranges of materials and as a method for identifying promising starting points for further refinement using more expensive and sophisticated methods or experiments. In its conventional formulation, DMFT maps one function of frequency into another. The input is the bare hybridization function , which encapsulates relevant information about the crystal structure and quantum chemistry of a material via a representation of what the local density of electronic excitations would be if many-body correlations were neglected. A small number of additional parameters, such as the on-site interaction strength, must also be specified. The output is the electron Green's function (or equivalently self-energy), which provides an approximation to the exact density of states (DOS) obtained by including local effects of many-body correlations. Implementing a ML approach to DMFT thus entails constructing a training set of physically reasonable hybridization functions, determining the spectral functions corresponding to the training examples, and constructing a model that provides the needed interpolation formula. Such a ML procedure goes beyond previous applications of ML to electronic structure because we are mapping a function to a function whereas the ML approaches to DFT or the Schr¨edinger equation o provide only a small number of scalar outputs, such as the total energy of atomization, ionization potential, or excitation energy 5,18 . A key issue is thus to devise an efficient representation of the functions of interest in terms of a reasonably sized set of parameters. The first application we foresee for real systems is a material science computation tool to optimize a desired property. In this paper we address this key issue for the Anderson impurity model (AIM), the archetypical quantum impurity model. For this model the input hybridization function is known a priori , and can be specified by few parameters. The focus therefore lies on the prediction of the output, namely, the electron Green's function. In future work we will discuss ML applications to the full DMFT problem of determining the self-consistent relation between the Green's function and hybridization function, starting from an arbitrary hybridization function. This paper is organized as follows: in Sec. II, we summarize the supervised learning approach. In Sec. II A we discuss how to represent a function for ML and in Sec. II B we discuss the kernel ridge regression that we use in this paper, while in Sec. II C we show how the ML procedure is tested. In Sec. III the one site AIM and its solution by exact diagonalization are presented. In Sec. IV we present the machine learning solution. Section IV A discusses the methodology of the calculation. Section IV B presents in detail the four types of representation for the Green's functions we study: in Sec. IV B 1 the continued fraction, in Sec. IV B 2 the Matsubara frequency, in Sec. IV B 3 imaginary time, and in Sec. IVB4 Legendre polynomials. The results for these different representations are shown in Secs. V A, VB, VC and VD. In Secs. V E and V F we show how the size of the learning set affects the predictions of the DOS and the mass enhancement. Finally, in Sec. VG we look at how we can define an absolute minimal learning set for our problem. Section VI is the summary and conclusion. Appendix A gives details on the kernel ridge regression, Appendix B gives details of the exact diagonalization method, Appendix C gives details of the representation of the Green's function using Legendre polynomials, and Appendix D presents the derivation of the effective α matrix for the Legendre polynomials approach. ## II. SUPERVISED LEARNING FOR A FUNCTION ## A. Representation of the function We wish to learn a function of one complex variable, f ( z ), with f representing the Green's function or selfenergy. The model whose solution gives f ( z ) is specified by a descriptor, D , the set of input parameters needed to describe the model. Where appropriate we denote the dependence of f on the input parameters as f ( D ; z ). The ML approach is to infer f ( D ; z ) from a given set of N L results f ( D l =1 ...N L ; z ). The functions of physical interest have a spectral representation $$f ( z ) = \int \frac { d x } { \pi } \frac { f ^ { \prime \prime } ( x ) } { z - x }, \quad \ ( 1 ) \\ \text{salt number} \quad \text{The spectral function } f ^ { \prime \prime } ( x ) \text{ is}$$ with x a real number. The spectral function f ′′ ( x ) is non-negative, integrable, and typically nonzero only over a finite range of x . While f is fully specified by f ′′ , for technical reasons one often has data only for, or is only interested in, f on the Matsubara frequencies z = iω n = i (2 n +1) πT where T is the temperature, i = √ -1 and n is an integer. f is sometimes also studied on the imaginary time ( τ ) axis in the interval 0 &lt; τ &lt; β = 1 /T . The τ -dependent function is related to the Matsubara frequency values by $$\underset { \text{ision} } { \text{N} } \quad \begin{array} { c } \cdot \\ \text{$f(\tau) = T \sum_{\omega_{n}}f(i\omega_{n})e^{-i\omega_{n}\tau}=-\int\frac{\dots\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\ddot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot \cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdots\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot\cdot \end{array} } \end{array}$$ It is worth noting that the definition of the Matsubara frequencies along with Eq. (2) implies three important results that will be used later: $$\text{resuts main we use near:} \\ f ( \tau - \beta ) & = - f ( \tau ) \\ f ( \beta ^ { - } ) + 1 & = - f ( 0 ^ { + } ) \\ \frac { d f ( \tau ) } { d \tau } \Big | _ { \tau = \beta ^ { - } } & = \int \frac { d x } { \pi } x f ^ { \prime \prime } ( x ) - \frac { d f ( \tau ) } { d \tau } \Big | _ { \tau = 0 ^ { + } }, \\ \text{where } \int \frac { d x } { \pi } x f ^ { \prime \prime } ( x ) \text{ is the first moment of the spectral} \\ \text{function which depends upon the particular Hamiltonian.}$$ ∣ ∣ where ∫ dx π xf ′′ ( x ) is the first moment of the spectral function which depends upon the particular Hamiltonian. Equation (1) implies that the values of f ( z ) at different z values are correlated. This presents a challenge since the machine learning algorithms we will use treat the different components of f (or the coefficients of its expansion) as independent. Therefore, by independently adding numerical errors on each point the machine may not fully respect the needed correlations and constraints. Put differently, the f predicted by our machine learning algorithm could arise from a spectral function with negative regions. This issue is not unique to ML and is related to the well-known analytical continuation problem of inverting Eq. (1) to determine f ′′ ( x ) from the full set of values of f ( iω n ). While general theorems from complex variable theory imply that the inversion is possible in principle, the kernel 1 / z ( -x ) of Eq. (1) has many very small eigenvalues so the inversion problem is ill conditioned. However, in all the cases we have considered, these issues seem not to pose any difficulties in practice, so we proceed straightforwardly, with the assumptions justified a posteriori . In any numerical approach to problems involving continuous functions, a choice of discretization must be made. Any discretization expresses the continuous function f ( z ) in terms of a set of N numbers f m =1 ...N which we assemble into an N -dimensional vector f : $$\text{al} \quad f ( \mathbf D ; z ) \to f ( \mathbf D ) = \{ f _ { 1 } ( \mathbf D ), f _ { 2 } ( \mathbf D ), \dots, f _ { N } ( \mathbf D ) \}. \quad ( 4 )$$ One must note that the f m 's need not be direct points of the function but can also be coefficients that define the function. We have considered four discretizations of f ( z ): (1) a continued fraction representation; (2) values on the Matsubara axis f ( iω n ) up to some cutoff frequency | ω n | &lt; Ω ; (3) discrete values on the imaginary time axis, c f j = f ( j ∆ τ/T ); and (4) an expansion of f ( τ ) in terms of orthogonal (Legendre) polynomials. Both the continued fraction and Legendre polynomials representation lead to a correctly normalized and non-negative spectral function, but as will be seen the continued fraction representation is for other reasons not optimal. The other representations do not necessarily lead to a f ( z ) which has a spectral representation with a non-negative spectral function for small and random sets of N L results, but, as will be seen, they seem to work well in practice. ## B. Machine learning: kernel approach In this paper we apply the kernel approach 19 , which involves two ingredients: a distance kernel K m ( D D l , ), a symmetric and positive definite function, fixed a priori , and a coefficient matrix α lm which is to be determined. In terms of these, one generates an approximation g to the desired f given by the so-called kernel ridge regression (KRR), an expansion in an abstract kernel space. In terms of the expansion defined in Eq. (4)) we approximate the components f m of f in terms of approximate components g m given by $$\dots _ { r } r \dots \dots \dots _ { r } \alpha \cdots \dots _ { r } \alpha \\ f _ { m } ( \mathbf D ) \approx g _ { m } ( \mathbf D ) = \sum _ { l } \alpha _ { l m } K _ { m } ( \mathbf D _ { l }, \mathbf D ). \quad ( 5 ) \quad \text{ for} \\ \text{ Here we use the subscript $m$ to label the entries in $f$ (i.e.,} \quad \text{$(\overline{K}$)},$$ Here we use the subscript m to label the entries in f (i.e., the different components in the discrete representation of the function: direct points or appropriate coefficients) and l to label the training examples. The coefficients α lm are calculated by minimizing a cost function defined in terms of the difference between the approximations g m ( D l ) and the exactly known f m ( D l ), with the addition of a set of Lagrange multipliers introduced to regularize the problem. In our approach we assume that each component m of f is learned separately and independently, so we define a cost function separately for each m as $$\text{ost function separately for each $m$ as} \\ C _ { m } \ = \ \sum _ { l } \left ( g _ { m } ( \mathbf D _ { l } ) - f _ { m } ( \mathbf D _ { l } ) \right ) ^ { 2 } & \quad ( 6 ) \quad \text{then} \\ & \quad + \lambda _ { m } \sum _ { l, p } \alpha _ { l m } K _ { m } ( \mathbf D _ { l }, \mathbf D _ { p } ) \alpha _ { p m }. \quad \text{pred} \\ \text{limination then gives at fixed $m$ (see Appendix A for} } \quad \text{As} \ \ \text{.}$$ Minimization then gives at fixed m (see Appendix A for details) $$\alpha _ { m } = \left ( \overline { \overline { K } } _ { m } + \lambda _ { m } \overline { I } \right ) ^ { - 1 } f _ { m }. \quad \quad \left ( 7 \right ) \quad \text{obv}$$ In Eq. (7), α m is a column vector of length N L containing the different α for m fixed and f m is also a column vector of length N L but containing the different values of f m ( m fixed) on the training set ( D l =1 ...N L ). It is important to note that this vector f m is not the same as the vector f in Eq. (4) which is a vector of length N containing the values of f m =1 ...N for one specific D . Finally, K m and I are the Kernel and identity matrices of size N L × N L . In our actual calculations we assume that the kernel K and the Lagrange multiplier λ are independent of m , i.e., the same for all components of the function to be learned. We may then assemble all of the examples f m into a N L × N matrix f in which each column is for a different m and combine Eq. (7) into a unique matrix equation $$\overline { \overline { \alpha } } & = \left ( \overline { \overline { K } } + \lambda \overline { \overline { I } } \right ) ^ { - 1 } \overline { \overline { f } }. \quad \text{(8)} \\ \text{$\text{the process of learning a function very of}$}.$$ This makes the process of learning a function very efficient since even if f is a very large matrix, the solution needs to be obtained only once. For K , we use the weighted exponential kernel $$K ( { \mathbf D } _ { i }, { \mathbf D } ) = e ^ { - \frac { | d _ { i } | } { \sigma } },$$ where | d l | = D | l 1 -D 1 | + D | l 2 -D 2 | + . . . is the Manhattan distance between the two parameter sets and σ gives the radius of effect that a particular point of the data set D l will have in the prediction process 18 . For numerical calculation, direct matrix inversion should be avoided and Eq. (8) is solved in the form ( K + λ I ) α = f . Since K is a square, real, symmetric, and positive definite matrix, a standard Cholesky solver can be used. The process is very fast; for example, on a desktop computer with a Intel Core I7-4770 quad core at 3.40 GHz, using a dataset of 5000 points, it takes about 4 s to learn 2400 parameters defining G in its continued fraction representation plus the ground-state energy. The way we train our machine is to choose N L results from a database of solutions. This subset of solutions is called the training set and we keep the remaining solutions in the database apart and consider a subset of them as the test set. The training set is then used to construct K and Eq. (8) can be solved. We then use the test set to check if the predictions from the ML give accurate results and thus can be used to predict solutions not contained in the database. More details on the training process we use are given in Sec. IV A. As shown in this section, we can see that ML is an interpolation approach, never an extrapolation. The obvious question of how small the shift in parameters of a desired prediction D from the D ′ i s must be (i) depends on the training set density (the N L examples that will be used to obtain the α lm ), (ii) depends on it's distribution, and (iii) still has to be investigated in more rigorous ways than is done either this paper or in the literature in general. ## C. Quality of machine learning In most ML studies, the quality of the machine is assessed in terms of the mean absolute error (MAE) of the predicted quantities 4,5 . Because we are interested in predicting a function we introduce a different metric, the average relative difference (ARD), defined as $$A R D = 1 0 0 \left \langle \frac { | f _ { p r e d i c } ( z ) - f _ { e x a c t } ( z ) | } { | f _ { e x a c t } ( z ) | } \right \rangle _ { z }, \quad ( 1 0 ) \quad \text{apprc} \\ \text{who to how to } 1 0 0 \text{ in to down and } \cos \text{that } \cos \text{that } \theta \text{ } \theta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \text{ } \Delta \end{$$ where the factor 100 is introduced so that the ARD is given in percentage and 〈〉 z denotes the average over a suitably defined set of function arguments { z i } . In practice we take the set of arguments z i to be the first few Matsubara frequencies corresponding to energies up to the typical scales of the problem; the values at higher ω n are typically controlled by sum rules and are small, with very small errors. The Matsubara frequencies are an appropriate measure because (i) they contain the relevant physical information, (ii) there is a natural discretization, and (iii) the use of a common estimator permits straightforward comparison of different approaches. Note that three of the four representations (the continued fraction, the Matsubara frequency, and Legendre polynomials) give G iω ( n ) in a direct way. We only compare Im { G iω ( n ) } . However, the ARD or any measure that give an error representation for the entire function as a single number can be misleading, because it can mask narrow but important regions of the function which might be badly predicted. Therefore, as a further test of the quality of the machine, we examine in detail, for two specific cases the predictions of the ML for (a) Im { G iω ( n ) } (b) the density of states obtained by using Pad´ analytical e continuation, and (c) the low-frequency renormalization $$Z = \frac { \text{Im} \left \{ \Sigma ( i \omega _ { n } ) \right \} } { \omega _ { n } } \Big | _ { \omega _ { n } \rightarrow 0 }. \quad ( \text{11} ) \\ \text{ormalization factor is a unique number char} _ { - \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots$$ factor Z = ( 1 -∂ Re Σ { } ∂ω ∣ ∣ ∣ ω → 0 ) -1 estimated as the extrapolation ∣ This renormalization factor is a unique number characterizing an important low-frequency property of the model. ## III. QUANTUM IMPURITY MODEL In this paper we apply machine learning techniques to the single impurity Anderson impurity model. The Figure 1: (Color online) Representation of the Anderson impurity model (AIM): (a) An impurity with zero, one or two localized electrons hybridizes with a partially filled bath of non interacting electrons (b) With fixed bath DOS and constant hybridization V , the AIM can be uniquely described by three parameters [ ε d ( Wn ,U,V d ) ] and be used in a ML approach to predict correlation functions and other physical properties. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-5dee8557-e10b-4944-9c9a-44b41c8efb32.jpg) Hamiltonian is $$\mathfrak { r } \quad \text{maximum } \infty \\ \mathfrak { t } \quad & = \sum _ { \sigma } \varepsilon _ { d } d _ { \sigma } ^ { \dagger } d _ { \sigma } + U d _ { \uparrow } ^ { \dagger } d _ { \uparrow } d _ { \downarrow } ^ { \dagger } d _ { \downarrow } + \sum _ { k, \sigma } \varepsilon _ { k } c _ { k \sigma } ^ { \dagger } c _ { k \sigma } \\ \mathfrak { r } \quad & + \sum _ { k, \sigma } V _ { k } \left ( d _ { \sigma } ^ { \dagger } c _ { k \sigma } + c _ { k \sigma } ^ { \dagger } d _ { \sigma } \right ). \\ \mathfrak { e } \quad & \quad \text{As shown in Fio $1(\nu)$ this represents one localized level}$$ As shown in Fig 1(a), this represents one localized level (with two-fold spin degeneracy), embedded in a bath of noninteracting electrons. The localized electronic states are represented by the creation (annihilation) operators d † σ ( d σ ) ( σ the spin) while the continuous bath states are represented by the operators c † kσ ( c kσ ). The on-site energy of the impurity is ε d and the interaction term which penalizes double occupancy if positive, is U . The bath dispersion is ε k and the hybridization between the bath and the impurity is V k , where k is a wave number. The relevant features of the bath and hybridization are encoded by the hybridization function ∆ which for this model is $$\Delta ( z ) & = \sum _ { k } \frac { | V _ { k } | ^ { 2 } } { z - \varepsilon _ { k } } \quad \quad ( 1 3 ) \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \Dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots$$ We choose the bath to have a semicircular density of states and to define the energy unit to be the half width W = 1, so $$N _ { 0 } ( \varepsilon ) = \frac { 2 } { \pi } \Theta ( 1 - | \varepsilon | ) \sqrt { 1 - \varepsilon ^ { 2 } }. \quad \ ( 1 4 ) \\ \text{rther choose the hybridization to be a constant, } V$$ We further choose the hybridization to be a constant, V and set the chemical potential to be equal to the energy at the center of the bath density of states µ = 0 in the notations of Eq. (14). The parameters of the model are then U, V , and ε d . We find it more convenient to replace the on-site energy ε d by the occupation n d = 〈 d d † ↑ ↑ + d d † ↓ ↓ 〉 , which is a single-valued function of ε d for nonzero V and which we multiply by the half bandwidth W so it has the same dimension as the other parameters. The descriptor will be a vector of three values $$\mathbf D = [ U, V, W n _ { d } ]. \quad \quad \quad ( 1 5 ) \quad \.$$ The machine learning task is then to predict the Green's function of the model, G σ ( τ ) = -〈 Tr d τ σ ( τ ) d † σ (0) , 〉 in terms of ( U, V, n d ). This ML representation of the AIM, as well as what the prediction leads to, is shown in Fig 1(b). The Anderson impurity model is a full many-body problem, and while an exact Bethe-ansatz solution exists for particular choices of parameters 20 , there is no known exact analytic solution for the general case. While many different methods are available for solving the problem including approximate ones (such as the renormalized strong-coupling expansion proposed by Krivenko et al. [21] and diagrammatic resummation methods such as the non-Crossing Approximation (NCA) and one-crossing approximation (OCA) as in [22]) and numerically exact ones (quantum Monte Carlo (QMC) [15,17,23,24] and numerical renormalization group (NRG) [25]), we will use the exact diagonalization (ED) method [26,27], in which the hybridization function is represented as a sum of small number ( N b ) poles and weights in the form $$\Delta ( z ) \approx \Delta _ { N _ { b } } = \sum _ { l = 1 } ^ { N _ { b } } \frac { V _ { l } ^ { 2 } } { z - \varepsilon _ { l } }. \quad \quad ( 1 6 ) \quad \text{$\text{$fc$o$} \\ \text{$test$} \\ M$$ One is then left with a finite-size Hamiltonian (size N s = N b +1) which can be diagonalized exactly, allowing computation of the many-body ground-state wave function and energy. The Green's function is obtained as a continued fraction: $$& \text{conuse transaction} \quad \sigma = 1 \\ & G _ { \sigma } ( z ) = & \frac { \langle G S | d _ { \sigma } d _ { \sigma } ^ { t } | G S \rangle } { z + E _ { G S } - a _ { 0 } ^ { > } - \frac { b _ { 2 } ^ { > 2 } } { z + E _ { G S } - a _ { 1 } ^ { > } - \frac { b _ { 2 } ^ { > 2 } } { z + E _ { G S } - a _ { 2 } ^ { > } - \ddots } } } \\ & \quad + \frac { \langle G S | d _ { \sigma } ^ { t } d _ { \sigma } | G S \rangle } { z - E _ { G S } - a _ { 0 } ^ { > } - \frac { b _ { 1 } ^ { < 2 } } { z - E _ { G S } - a _ { 1 } ^ { > } - \frac { b _ { 2 } ^ { < 2 } } { z - E _ { G S } - a _ { 2 } ^ { > } - \ddots } { ( 1 7 ) } } }. \quad \text{We the Gi} \\ & \quad \text{the Gi} \\ \cdots \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cdot \ \cd.$$ We define the exact Green's function as Eq. (17) truncated at 600 continued fraction coefficients but note that the results for our model are not materially different if only the first 100 coefficients are retained. We use Eq. (17) to compute G on the real axis, on the Matsubara axis (with a fictitious temperature β = 1 /T = 200), or as a function of imaginary time by Fourier transform. Appendix B gives more details about ED. ## IV. MACHINE LEARNING FOR THE AIM ## A. Methodology of the calculations We created a database of examples as input to the machine learning process by solving the Anderson impurity model for 5000 combinations of U V , , and n d . The interaction U was varied from a small value to twice the bandwidth 0.16 to 4 in 25 equal intervals. The hybridization V is varied from a small value to the order of half the bandwidth 0.1 to 0.75 in 20 equal intervals. Finally, the filling of the impurity n d is varied from 0.6 to 1.4 (0-40% doping in both sides) in intervals of 0.1 and we also included n d = 0 95. For ED, we have used . N b = 7 and as already mentioned a fictitious temperature of β = 1 /T = 200. For the AIM with a bath with finite bandwidth, in the low-temperature limit, the Kondo temperature is given by 28 $$T _ { K } & \approx 0. 2 \sqrt { 2 \Gamma U } \mathrm e ^ { \frac { \pi \varepsilon _ { d } ( \varepsilon _ { d } + U ) } { 2 \Gamma U } }, \quad \quad ( 1 8 ) \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ where Γ ≡ ∆(0) = 2 V 2 . The validity of Eq. (18) is limited for ε d ( ε d + U ) &lt; 0. This leads for our parameters to a T K in the range from about 6x10 -36 to a maximum of about 0.48. This maximal T K is obtained for maximum U , V , and doping, i.e., U = 4, V = 0 75, and . n d = 0 6 . or 1 4. . From the database of 5000 solutions we randomly choose N ML results to serve as the learning and the test sets. These N ML results are then divided into M subsets. One is the testing set and the remaining M -1 form the learning set. For example, to calculate the ARD, we always use test sets of 100 such that we will choose M = N ML / 100. We use a null Lagrange multiplier ( λ = 0) and σ is most of the time equal to σ = 10 W except for one case where we considered σ = 1 W . ## B. Representations of the Green's function We have investigated four different representations of the Green's function: (i) the continued fraction representation, Eq. (17); (ii) the Green's function in Matsubara frequency; (iii) the Green's function in imaginary time; and finally, (iv) a representation of the imaginary time Green's function as a sum of Legendre polynomials. ## 1. Continued fraction representation Here we proceed directly from Eq. (17). We must learn some number N c of coefficients a and b for the particle and hole Green's function, along with the ground-state energy, thus 4 N c +1 coefficients. Hence f (Eq. (4)) is a vector with 2401 elements (401 if we only learn the first 100) and f is $$\overline { f } = \begin{pmatrix} ( a _ { 0 } ^ { \dag } ) _ { 1 } & \cdots & \begin{pmatrix} a _ { N _ { c } } ^ { \dag } \end{pmatrix} & ( b _ { 0 } ^ { \dag } ) _ { 1 } & \cdots & \begin{pmatrix} b _ { N _ { c } } ^ { \dag } \end{pmatrix} & ( a _ { 0 } ^ { \dag } ) _ { 1 } & \cdots & \begin{pmatrix} ( a _ { S _ { c } } ^ { \dag } ) _ { 1 } & ( b _ { 0 } ^ { \dag } ) _ { 1 } & \cdots & \begin{pmatrix} ( a _ { S _ { c } } ^ { \dag } ) _ { 1 } & ( E _ { G S ) _ { 1 } } ^ { \dag } \\ ( a _ { 0 } ^ { \dag } ) _ { 2 } & \cdots & \begin{pmatrix} a _ { N _ { c } } ^ { \dag } \end{pmatrix} & ( b _ { 0 } ^ { \dag } ) _ { 2 } & \cdots & \begin{pmatrix} ( b _ { N _ { c } } ^ { \dag } ) _ { 2 } & ( a _ { 0 } ^ { \dag } ) _ { 2 } & \cdots & \begin{pmatrix} ( a _ { N _ { c } } ^ { \dag } ) _ { 2 } & ( b _ { 0 } ^ { \dag } ) _ { 2 } & \cdots & \begin{pmatrix} ( b _ { N _ { c } } ^ { \dag } ) _ { 2 } & ( E _ { G S ) _ { 1 } } ^ { \dag } \\ \vdots & \ddots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots \\ \vdots & \ddots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots \\ \vdots & \ddots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots & \vdots \\ ( a _ { 0 } ^ { \dag } ) _ { N _ { L } } & \cdots & \begin{pmatrix} a _ { N _ { c } } ^ { \dag } \end{pmatrix} & ( b _ { 0 } ^ { \dag } ) _ { N _ { L } } & \cdots & \begin{pmatrix} ( b _ { N _ { c } } ^ { \dag } ) _ { N _ { L } } & ( a _ { 0 } ^ { \dag } ) _ { N _ { L } } & \cdots & \begin{pmatrix} ( a _ { N _ { c } } ^ { \dag } ) _ { N _ { L } } & ( b _ { 0 } ^ { \dag } ) _ { N _ { L } } & \cdots & \begin{pmatrix} ( b _ { N _ { c } } ^ { \dag } ) _ { N _ { L } } & ( E _ { G S ) _ { N _ { L } } ^ { \dag } \end{pmatrix} \end{pmatrix} }.$$ It is important to note that although the continued fraction representation is a formal way to write any function with a spectral representation, in practice, an accurate numerical process for obtaining the coefficients is available only in the context of ED calculations. ## 3. Imaginary time representation ## 2. Matsubara frequency representation We may evaluate the calculated G on the Matsubara points ω n = (2 n +1) πT (many QMC codes also give G evaluated on these points). Then $$\overline { \overline { f } } = \begin{pmatrix} \begin{pmatrix} ( G ( i \omega _ { 0 } ) ) _ { 1 } & ( G ( i \omega _ { 1 } ) ) _ { 1 } & \dots & ( G ( i \omega _ { N _ { c } } ) ) _ { 1 } \\ ( G ( i \omega _ { 0 } ) ) _ { 2 } & ( G ( i \omega _ { 1 } ) ) _ { 2 } & \dots & ( G ( i \omega _ { N _ { c } } ) ) _ { 2 } \\ \vdots & \vdots & \ddots & \vdots \\ ( G ( i \omega _ { 0 } ) ) _ { N _ { L } } & ( G ( i \omega _ { 1 } ) ) _ { N _ { L } } & \dots & ( G ( i \omega _ { N _ { c } } ) ) _ { N _ { L } } \end{pmatrix}. & \begin{pmatrix} \text{ be ot} \\ N _ { c } + \\ \text{$N_{c}+$} \\ \text{we w} \end{pmatrix}.$$ By evaluating Eq. (17) on the Matsubara points and then Fourier transforming we obtain the Green's function in imaginary time (this is also a standard output of QMC calculations). G τ ( ) is real and smooth. We then approximate the continuous G τ ( ) by its values on the N c discrete points τ j = βj/N c with j = 0 , . . . , N c -1. The value at τ = β -does not have to be learned since it can be obtained from Eq. (3)). It is also useful to learn a N c + 1 th point, namely, the first derivative at τ = 0 + . Knowledge of this value helps in evaluation of the reverse Fourier transform 29 . In this work we use N c = 2 11 and we write $$\overline { f } = \begin{pmatrix} \left ( G ( \tau = 0 ^ { + } ) \right ) _ { 1 } & \dots & \left ( G ( \tau = \beta / 2 ) \right ) _ { 1 } & \dots & \left ( G ( \tau = \beta ( 1 - 1 / N _ { \tau } ) \right ) ) _ { 1 } & \left ( G ^ { \prime } ( \tau = 0 ^ { + } ) \right ) _ { 1 } \\ \left ( G ( \tau = 0 ^ { + } ) \right ) _ { 2 } & \dots & \left ( G ( \tau = \beta / 2 ) \right ) _ { 2 } & \dots & \left ( G ( \tau = \beta ( 1 - 1 / N _ { \tau } ) \right ) ) _ { 2 } & \left ( G ^ { \prime } ( \tau = 0 ^ { + } ) \right ) _ { 2 } \\ \vdots & \ddots & \vdots & \ddots & \vdots \\ \vdots & \ddots & \vdots & \ddots & \vdots \\ \left ( G ( \tau = 0 ^ { + } ) \right ) _ { N _ { L } } & \dots & \left ( G ( \tau = \beta / 2 ) \right ) _ { N _ { L } } & \dots & \left ( G ( \tau = \beta ( 1 - 1 / N _ { \tau } ) \right ) ) _ { N _ { L } } & \left ( G ^ { \prime } ( \tau = 0 ^ { + } ) \right ) _ { N _ { L } } \end{pmatrix}. \quad \left ( 2 1 \right )$$ ## 4. Legendre orthogonal polynomial representation of the Green's function Recently, Boehnke et al . 30 proposed to represent the imaginary time Green's function as a sum of Legendre polynomials and measure the coefficients in a QMC calculation. Legendre polynomials are chosen instead of other sets of orthogonal polynomials because of the simplicity they offer for transformation to the Matsubara axis. Such an expansion acts as a physically motivated low-pass filter that eliminates the large statistical noise at high frequency coming from the direct calculation of G in Matsubara frequency well known in continuous time QMC (CTQMC). The standard Legendre polynomials P l ( x ) are defined on an interval x /epsilon1 [ -1 1]. , In the case of the Green's function in positive imaginary time, the time interval is 0 &lt; τ &lt; β so that we may define the variable x = 2 τ β -1. Thus (see Appendix C) $$G ( \tau ) = \sum _ { l = 0 } ^ { \infty } \frac { \sqrt { 2 l + 1 } } { \beta } G _ { l } P _ { l } ( x ( \tau ) ), \quad \quad ( 2 2 )$$ where the coefficients are formally given by $$G _ { l } & = \sqrt { 2 l + 1 } \int _ { 0 } ^ { \beta } d \tau P _ { l } ( x ( \tau ) ) G ( \tau ). \quad \ \ ( 2 3 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \sum \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \tau \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ The Fourier transform to ω n is given by [30] as $$G ( i \omega _ { n } ) = \sum _ { l = 0 } ^ { \infty } T _ { n l } G _ { l }, \quad \quad ( 2 4 )$$ where $$T _ { n l } & = ( - 1 ) ^ { n } i ^ { l + 1 } \sqrt { 2 l + 1 } j _ { l } \left ( \frac { ( 2 n + 1 ) \pi } { 2 } \right ), \quad ( 2 5 ) \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array}$$ and j l ( z ) are the spherical Bessel functions. G l may be directly measured in a CTQMC calculation 30 and the maximum order l max is defined as the largest l where G l is greater than the statistical noise. In the present case we must calculate the G l and devise an alternative prescription for l max . We use a recently introduced algorithm based on a fast Chebyshev-Legendre transform 31 that exploits the idea that smooth functions can be represented by polynomial interpolation in Chebyshev points, i.e., by expansions in Chebyshev polynomials using fast fourier transform. This algorithm is implemented in a free Matlab toolbox called CHEBFUN 32 . We still have to define l max . The l max is chosen by looking at the odd Legendre coefficients. For every example we have investigated, we find that G l for l odd decreases rapidly as l increases. At some l , G l changes sign and starts oscillating around zero. We set l max by finding the l at which G l changes sign. For each example (a particular set of parameters U , V , and Wn d ), the value of l for which the sign change happens is different. However, for the 5000 examples in the database, we found that the first sign change happens for l at most around 111. For security, we use as our definition of the expansion the first 121 ( l = 0 . . . 120) terms. For each example, for l ≤ l max for the odd l we use the values we have while we have to decide what values to use for l &gt; l max (for l even we do not change anything). Two easily implemented options are to replace the odd coefficients by zero for l &gt; l max or to replace them by the last value before the first sign change of G l so that either G l = 0 for l odd &gt; l max or G l = cst . We verified that both solutions work very well to reconstruct G τ ( ) from Eq. (22). However, for machine learning there is a difference. Indeed, in ML, having pure zeros in the learning set makes the learning process much more difficult. We thus use the second solution where G l for l odd &gt; l max is a very small constant. The great advantage of the Legendre polynomial representation is that either by obtaining G l from CTQMC or directly from G τ ( ), the number of coefficients is very limited, making the learning process much smaller, and, if after learning all coefficients at once, we see that some fine tuning is needed, the maximum number of new machines that will be necessary is limited and manageable. Also, as we do not directly learn the function G τ ( )( G iω ( n )) but reconstruct it from Eq. (22) (or Eq. (24)) it helps smooth things out. Therefore what is directly learned is the vector of coefficients. $$\overline { \overline { f } } = \begin{pmatrix} \begin{smallmatrix} ( G _ { 0 } ) _ { 1 } & ( G _ { 1 } ) _ { 1 } & \dots & ( G _ { 1 2 0 } ) _ { 1 } \\ ( G _ { 0 } ) _ { 2 } & ( G _ { 1 } ) _ { 2 } & \dots & ( G _ { 1 2 0 } ) _ { 2 } \\ \vdots & \vdots & \ddots & \vdots \\ ( G _ { 0 } ) _ { N _ { L } } & ( G _ { 1 } ) _ { N _ { L } } & \dots & ( G _ { 1 2 0 } ) _ { N _ { L } } \end{smallmatrix} \end{pmatrix}. \quad \ ( 2 6 )$$ ## V. RESULTS In this section we present the results both of computation of the full G and, for two particular examples, of the renormalization factor Z . For the two examples we will use parameters similar to those used in [21] and [22]. In one case [21] U = 3, V = 0 5, and . /epsilon1 d = -U/ 2. In the second case [22], an infinite U AIM is considered with a flat conduction-band DOS with V = √ 0 1 . and /epsilon1 d = -0 81. . In the case of infinite U [22], this gives an occupation n d ≈ 0 94. . We will use the two examples in our database that are the closest to these parameters. For the first case, we have U = 3 04, . V = 0 5105, and . n d = 1. For the second case, as infinite U , we will use U = 4, V = 0 3053, and . n d = 0 95. . We present the results both in ω n and ω . For real frequencies, we need to choose a small imaginary part η for the frequency. Since our ED fitting procedure relies on choosing a fictitious temperature to fit on the Matsubara axis defined by this temperature, we take the minimum-energy unit to be twice the difference between two ω n (= 2 π β ). For small dataset length, we generated many random combinations for the learning set, predicted the results for every combination and averaged out. ## A. Continued fraction representation We first use ML to learn the coefficients of the continued fraction representation of the Green's function (Eq. (17)). We learned the first hundred of each type since, as we mentioned in Sec. III, the remaining coefficients do not contribute to G within our accuracy. Using test sets of length 100 and generating learning and test sets multiple times, from the reconstructed G we calculate the ARD, and we show the results as a function of training set size in Fig. 2 as dots. We see that the ARD decreases from about 6.5% for a random learning set of 500 examples to about 0.016% for a learning set of 4900. For the comparison with the two specific examples, the results are presented in Fig. 3. Only the first 50 Matsubara frequencies are shown for Im { G iω ( n ) } . Figure 2: Average relative difference (ARD) for the predicted imaginary part of the Green's function on the Matsubara axis as a function of training set size. Dots (.) denote the predictions of the continued fraction coefficients, x's (x) denote the predictions of G iω ( n ), squares ( /square ) denote the predictions of G τ ( ), and diamonds ( ♦ ) denote the Legendre polynomial expansion. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-eca5e3ff-97ca-4c51-9a38-cec2ea96289d.jpg) For the half-filled case, Fig. 3-(a) and (b), we see that the prediction for randomly chosen learning sets of 500 in ω n is not very good. In terms of real frequency, we see that, however, even with the size 500 random learning set, the high-frequency regions are well predicted. However, around the Fermi level, the prediction is wrong. For example, the prediction is not particle-hole symmetric even though the model is. However, at the largest learning set size (4999) the prediction is correct. The doped case is similar. From Fig. 3(c) we see that for this particular example, the value at the lowest Matsubara frequency is well predicted for a small random learning set but the values at the next three frequencies are not good. Turning now to real frequencies we see that the high-frequency regions and the region around the Fermi level are qualitatively fairly predicted. For a large learning set, the doped case is also well represented. Thus, if the Green's function is learned from its continued fraction coefficients, a small and random learning set is able to capture the high-frequency physics for the half-filled case, but it is not reliable for the low ω which carry most of the interesting physical information at T = 0. ## B. Matsubara frequency representation The ARDs are denoted by x's in Fig. 2. The values are systematically smaller than the equivalent from the continued fraction coefficients, but still the same order of magnitude. The real frequency result at half filling of Fig. 4(b) shows that this time, around the Fermi level, the ML predicted DOS has the correct qualitative behavior of particle-hole symmetry. If we compare the Matsubara frequency results of Fig. 4(a) and (c) with those of Fig. 3(a) and (c) we see that for these two examples, learning directly G iω ( n ) is better. However, the analytically continued results for the learning set of length 500 are of poor quality, essentially because analytical continuation is sensitive to small errors in G iω ( n ). This is thus hard to assess if the prediction really contains noncausality (Fig. 4(b)) ( -1 5 . &lt; ω &lt; -1), gives such shape at high frequency (Fig. 4(b) and (d)) and give spurious states where the DOS should be zero (Fig. 4(d) at about ω = -2 1). . Once again, for a large learning set, the predicted results are very good. It is important to note that since we need numerical analytical continuation to obtain the real frequency results, 100% perfect matching is impossible. ## C. Imaginary time representation The ARDs for imaginary time representation are denoted by squares in Fig. 2. The values are systematically smaller than the corresponding ARDs from the continued fraction coefficients but still of the same order of magnitude and similar to those from the representation in Matsubara frequency. Most comments made regarding Fig. 4 can also be made for Fig. 5. Based on the ARD and the results in ω n we can conclude that directly learning G τ ( ) is a good procedure and of general applicability. ## D. Legendre orthogonal polynomial representation of the Green's function The ARDs of the Legendre orthogonal polynomials representation are denoted by diamonds in Fig. 2. The values are very similar to those from G τ ( ) and G iω ( n ). The results for the two examples in Matsubara and real frequency presented in Fig. 6 are comparable to what is obtained from learning directly G τ ( ), but this time the Pad´ e continuation is less problematic because the coefficients are learned and then the Green's function is reconstructed, giving a G iω ( n ) with less independent error on each ω n . Moreover, in Sec. IV B 3, we had to learn 2048 slices of G τ ( ) plus G τ ′ ( = 0 + ) while here we only needed to learn 121 coefficients. We may therefore conclude that the representation by an expansion in terms of Legendre polynomials is the most efficient way to learn many-body Green's functions using machine learning. Figure 3: (Color online) Machine learning prediction for Im { G iω ( n ) } and the density of states using the continued fraction coefficients: (a) and (b) for U = 3 04, . V = 0 5105, and . n d = 1 and (c) and (d) for U = 4, V = 0 3053, and 0 95. . . In (a) and (c), dots (.) denote the exact result, circle (O) denote the result for a learning set of length 500, and squares ( /square ) denote the result for a learning set of length 4999. In (b) and (d), dots (.) denote the exact result, red dashed lines (- -) denote the result for a learning set of length 500, and green lines (-) denote the result for a learning set of length 4999. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-8bfda2ea-6004-4526-a272-fe2c3ef401c5.jpg) ## E. Prediction as a function of learning set length convergence to the correct prediction is attained before the learning set is maximum (4999). It is important to show how our prediction of the DOS evolves with increasing learning set length. Fig. 2 displays the learning set length dependence of the ARD . Now we look at the DOS around the Fermi level for the half-filled case. The conclusions we show for the DOS around the Fermi level are generally applicable to the high-frequency results also. One exception is the continued fraction representation where much smaller learning sets can predict the high-frequency behavior (see Fig. 3). In Fig. 7, we show the DOS around ω = 0 for different random learning set lengths and for the four representations: in Fig. 7(a) the continued fraction, in Fig. 7(b) the Matsubara frequency, in Fig. 7(c) imaginary time, and in Fig. 7(d) Legendre polynomials. The dots (.) denote the exact result, the red dashed lines (- -) denote the result for a learning set of length 500, the blue dot-dashed lines (-.) denote the result for a learning set of length 1000, the cyan circles (o) denote the result for a learning set of length 2000, and the magenta solid lines (-) denote the result for a learning set of length 3000. We can see that ## F. Prediction of the mass enhancement We now consider how well machine learning predicts the renormalization factor Z , equivalent in this model to the mass enhancement. In addition to being an important physical property for Fermi liquids, Z also acts here as a unique number that can be used to estimate the quality of the ML prediction of low-frequency properties. The results are shown in Fig. 8. Overall, the Z predicted from ML learned continued fraction coefficients never completely converges (the black line is the exact result) and is quite inaccurate for learning set of 500 and 1000 when n d = 1. Even if it never perfectly converges, the relative difference at the larger learning set is small, consistent with the reasonable visual appearance of the DOS (Fig 3). For n d = 0 95 there is a peculiar concor-. dance where the prediction is better for 500 than 1000 and 2000. This is clearly accidental and the overall shape Figure 4: (Color online) machine learning prediction for Im { G iω ( n ) } and the density of states using G iω ( n ) directly: (a) and (b) for U = 3 04, . V = 0 5105, and . n d = 1, and (c) and (d) for U = 4, V = 0 3053, and 0 95. . . In (a) and (c), dots (.) denote the exact result, circles (O) denote the result for a learning set of length 500, and squares ( /square ) denote the result for a learning set of length 4999. In (b) and (d), dots (.) denotes the exact result, red dashed lines (- -) denote the result for a learning set of length 500, and green lines (-) denote the result for a learning set of length 4999. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-12cfdac4-ca6c-4997-9625-fca4901355a9.jpg) of the DOS around ω = 0 is better for 1000 and 2000. It is also important to note that for Fig. 8-(b) the exact Z is small and thus we predict very small numbers. For the other three representations, they all systematically converged to the correct answer, around a learning set of 2000 for Fig. 8(a), which also can be seen from Fig. (7), and around a learning set of 3000 for Fig. 8-(b). Again, these minimal converging lengths are for totally random sets of examples as learning sets. and, at most, the new parameters can be between two values of the database, this would give us a maximally localized learning set of minimal size 8 or less. Let us once again choose two examples for which we will do the predictions. The first example is U = 3 5, . V = 0 25, and . n d = 0 85. The second example is . U = 2 9, . V = 0 5, and . n d = 1. ## G. Prediction from a minimal learning set In this section we study how to introduce a selection bias into the learning set such that a new system is predicted as accurately as possible with the smallest learning set possible. Because our database is very homogenous (dense coverage of U , V , and n d ) we can ask how good the learning would be if we find the members of the dataset that are closest to the U new , V new , and n d,new and form the learning set as combinations thereof. Since the descriptor has three components For the first case, none of the results in the 5000 database share any of these parameters so that none of the components of the difference between the descriptor of the example and any descriptors of the database is ever zero. This means that the learning set will be of length 8. In the second example, since we look at half-filling and the database contains half-filled results, the learning set size is 4. This means that we are really looking at how our ML scheme can predict new results. We show the results in Fig. 9 using the Legendre polynomial representation and we see that with a very small learning set we can predict quite precisely new results. Figure 5: (Color online) machine learning prediction for Im { G iω ( n ) } and the density of states using G τ ( ): (a) and (b) for U = 3 04, . V = 0 5105, and . n d = 1 and (c) and (d) for U = 4, V = 0 3053, and 0 95. . . In (a) and (c), dots (.) denote the exact result, circles (O) denote the result for a learning set of length 500, and squares ( /square ) denote the result for a learning set of length 4999. In (b) and (d), dots (.) denote the exact result, red dashed lines (- -) denote the result for a learning set of length 500, and green lines (-) denote the result for a learning set of length 4999. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-98364750-ce92-4ec7-a22e-dd78a9261124.jpg) This possibility of prediction with very small learning enables us to look closely at how the machine itself behaves. Indeed, what we call the machine is given by the α parameters of Eq. (5). Only in the cases of the representations in terms of Matsubara frequencies and imaginary time does the α really represent the Green's function we are trying to predict itself. However, within the Legendre polynomial representation, using our approximation that the Kernel functions have fixed parameters, we can define an effective α -like parameter for the reconstructed Green's function in Matsubara frequency from the predicted Legendre polynomials coefficients. We show the derivation in Appendix D, and we obtain $$G ( i \omega _ { n }, \mathbf D ) = \sum _ { i } \Gamma _ { i n } K ( \mathbf D _ { i }, \mathbf D ), \quad \ \ ( 2 7 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad \quad \quad \quad$$ where the effective α , called Γ, is given by $$\Gamma _ { i n } = \left \{ \sum _ { l = 0 } ^ { l _ { m a x } } T _ { n l } \alpha _ { i l } \right \}. \quad \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ The results are shown in Fig. 10. The case of U = 3 5, . V = 0 25, and . n d = 0 85 is presented in Figs. 10(a) and . (b) while the case U = 2 9, . V = 0 5, and . n d = 1 is presented in Fig. 10(c). For the half-filled example, only the imaginary part of Γ is shown, as the real part of G iω ( n ) is zero for the particle-hole symmetric case. Despite the discrete nature of functions of Matsubara frequency, we present the curves as continuous here. It is also interesting to note (not shown) that the curves for α obtained from the Matsubara frequency representation correspond exactly to the curves of Γ in Fig. 10 as expected. One very important result is that Γ is, from quite a low frequency, a smooth function of ω n . This opens up the possibility of using interpolation from Γ curves as a another way to perform very efficient ML. For completeness, the other representation that directly learns G is the imaginary time one and thus α τ ( ) is really a representation of G τ ( ) in the ML space. We thus show the α τ ( ) curve for both examples in Fig. 11. Once again the curves are smooth and in this case fundamentally continuous. Figure 6: (Color online) machine learning prediction for Im { G iω ( n ) } and the density of states using the Legendre polynomial representation: (a) and (b) for U = 3 04, . V = 0 5105, and . n d = 1 and (c) and (d) for U = 4, V = 0 3053, and 0 95. . . In (a) and (c), dots (.) denote the exact result, circles (O) denote the result for a learning set of length 500, and squares ( /square ) denote the the result for a learning set of length 4999. In (b) and (d), dots (.) denote the exact result, red dashed lines (- -) denote the result for a learning set of length 500, and green lines (-) denote the result for a learning set of length 4999. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-ef0f7a07-0677-43f4-ab28-18d38d917785.jpg) ## VI. SUMMARY AND CONCLUSION We have proposed a machine learning scheme to learn the electron Green's function. Our method should apply to any other correlation function of interest. We have reduced the problem of learning a function of a single variable into one of learning a relatively small set of independents numbers, either direct slices of the function or coefficients used to define it. For the Green's function of the single-site Anderson impurity model, we have tested four different representations of G : the continued fraction, the Matsubara frequency, imaginary time and Legendre polynomial expansion. Directly learning the function in imaginary time is a well-defined operation as long as the learning set is not too small and random. However, replacing the direct function in imaginary time τ by its Legendre polynomial expansion is clearly superior because the need to learn only a small number of coefficients improves the accuracy. This way is even more promising for the context of learning correlation functions for real materials as new powerful CTQMC algorithms directly measure these coefficients 30 . We also observe that the Matsubara frequency representation may be problematic for more general DMFT calculations. In the AIM studied here, the system is always a metal and thus the dataset of solved problems in ω n is very homogeneous. In the general case of the DMFT, where the AIM serves as an intermediate problem, there is an interaction driven metal to insulator transition. In Matsubara frequency, the Green's function at lower frequencies changes qualitatively from the metallic to the insulating phase. This creates a dataset much less homogeneous at low ω n . This is why, even if this representation yields accurate predictions in the present study, we do not think that it can be efficiently used in general for ML+DMFT. Contrary to G iω ( n ), G τ ( ) changes much less drastically from a metal to an insulator. Therefore, this representation should perform much better for ML. Finally, as we already discussed, the continued fraction representation can only be really used when the AIM is solved via ED and thus is a very limited representation. Before handling real materials, learning DMFT for Figure 7: (Color online) machine learning prediction for the DOS around ω = 0 for the different representations of the Green's function and length of the learning set. (a) Continued fraction. (b) Matsubara frequency. (c) Imaginary time. (d) Legendre polynomials. The length of the learning sets are as follows: red dashed lines (- -) denote the result for a learning set of length 500, blue dot-dashed lines (- .) denote the result for a learning set of length 1000, cyan circles (o) denote the result for a learning set of length 2000, and magenta solid line (-) denote the result for a learning set of length 3000. Dots denote the exact result. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-0736384d-3b5d-41ff-bb45-4abcf28f33bd.jpg) model Hamiltonians is the next logical step. Concomitant to this, the next logical step for ML of a function itself is to look for a scheme where learned numbers are not considered to be totally independent. This is highly nontrivial and perhaps could be achieved by adding appropriating new constraints to the minimization problem inherent in Kernel ridge regression of Eq. (6). For example, constraints concerning moments could perhaps be integrated in the ML scheme for learning functions that have a spectral representation. ## Acknowledgments This research was supported by the Office of Science of the U.S. Department of Energy under Subcontract No. 3F-3138. L-F.A. thanks Ara Go for numerous discussions on implementing an exact diagonalization code for the Anderson impurity model. We thank Peter B. Littlewood for discussions and critical reading of the manuscript. This research used resources of the Argonne Leadership Computing Facility at Argonne National Laboratory, which is supported by the Office of Science of the U.S. DOE under Contract No.DE-AC02-06CH11357. O.A.v.L acknowledges funding from the Swiss National Science Foundation Grant No. PPOOP2 138932. ## Appendix A: Kernel ridge regression In kernel ridge regression, the coefficients of the expansion in the kernel space of Eq. (5) are found by minimization with respect to α of the cost function (Eq. (6)) $$C _ { m } \, = \, & \sum _ { l } \left ( g _ { m } ( \mathbf D _ { l } ) - f _ { m } ( \mathbf D _ { l } ) \right ) ^ { 2 } \quad \, ( A 1 ) \\ & + \lambda _ { m } \sum _ { l, p } \alpha _ { l m } K _ { m } ( \mathbf D _ { l }, \mathbf D _ { p } ) \alpha _ { p m }. \\ \intertext { the } \alpha. \quad \text{ are determined as the solution of the set of comma}.$$ The α lm are determined as the solution of the set of equations δC m δα qm = 0. By using the definition of g m ( D ) given by Eq. (5) and also the fact that the kernel is a symmetric Figure 8: Quasi-particle weight Z as a function of training set size (a) U = 3 04, . n d = 1, and V = 0 5105 and (b) . U = 4, n d = 0 95, and . V = 0 3053. . Lines denote the exact results, dots (.) denote the predictions of the continued fraction coefficients, x's (x) denote the predictions of G iω ( n ), squares ( /square ) denote the predictions of G τ ( ), and diamonds ( ♦ ) denote the Legendre polynomial expansion. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-365d6703-262d-4cb2-8500-833e0b026ee3.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-f01ca5d0-c4ee-4157-90e5-498bb34415e6.jpg) function, we obtain $$\sum _ { l } \left [ \left ( \sum _ { p } \alpha _ { p m } K _ { m } ( \mathbf D _ { p }, \mathbf D _ { l } ) \right ) - f _ { m } ( \mathbf D _ { l } ) + \lambda _ { m } \alpha _ { l m } \right ] \quad \begin{array} { c c } \ln \, 1 \\ \text{again} \\ \text{Hami} \\ \text{to a} \end{array} \right ] \\ A \text{ sufficient condition for Ea. (A2) to hold is that the } \text{ on } \right ]$$ A sufficient condition for Eq. (A2) to hold is that the quantity in the square brackets vanishes, i.e. $$\begin{array} {$$ In Eq. (A3), m is a dummy index. For fixed m , we can represent α and f as vectors α m and f m of length given by the number of examples N L and the kernel as a N L × N L matrix K m so that $$\alpha _ { m } = \left ( \overline { \overline { K } } _$$ with I the identity matrix. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-b1344fd4-56dd-45b3-ac94-6302d4b3e239.jpg) ω Figure 9: (Color online) machine learning prediction for the density of states using the Legendre polynomial representation: (a) U = 3 5, . V = 0 25, and . n d = 0 85 and (b) . U = 2 9, . V = 0 5, and . n d = 1. Dots (.) denote the exact result, and green lines (-) denote the result for a learning set of length ((a)) 8 and ((b)) 4. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-76cf028b-c596-49ac-8f41-c1d6530d6622.jpg) ## Appendix B: Exact Diagonalization In this appendix we describe what is meant by exact diagonalization (ED) in the case of the Anderson impurity Hamiltonian. Here, Eq. (12) is the target Hamiltonian H target . To solve the problem by ED, we map H target to a new Hamiltonian where the effect of the continuous bath is approximated by a few poles and weights. This gives a Hamiltonian with a finite number of site N s = 1 + N b given by $$\begin{array} {$$ where the V l and ε l are chosen to reproduce as much as possible the effect of Eq. (13). We have now a finite size Hamiltonian with a Hilbert space of size 4 N s that can be solved using matrices diagonalization techniques. We Figure 10: (Color online) Effective ML coefficient parameters Γ for the Legendre polynomial representation as a function of ω n for the (a) real and (b) imaginary parts U = 3 5, . V = 0 25, and . n d = 0 85 and for the (c) imaginary part . U = 2 9, . V = 0 5, and . n d = 1. The curves correspond to the different examples in the learning set. For (a) and (b), red solid lines denote U = 3 36, . V = 0 24, . and n d = 0 80; . blue solid lines denote U = 3 36, . V = 0 24, . and n d = 0 90; . black solid lines denote U = 3 36, . V = 0 27, and . n d = 0 80; cyan solid lines denote . U = 3 36, . V = 0 27, and . n d = 0 9; magenta solid lines denote . U = 3 52, . V = 0 24, and . n d = 0 80; . green solid lines denote U = 3 52, . V = 0 24, and . n d = 0 90; . red dashed lines denote U = 3 52, . V = 0 27, and . n d = 0 80; and blue dashed lines denote . U = 3 52, . V = 0 27, and . n d = 0 90. . For (c), red solid lines denote U = 2 88, . V = 0 48, and . n d = 1; blue solid lines denote U = 2 88, . V = 0 51, and . n d = 1; black solid lines denote U = 3 04, . V = 0 48, and . n d = 1; and cyan solid lines denote U = 3 04, . V = 0 51, and . n d = 1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-9ac63b9c-0036-479d-a39b-f208a2e3578b.jpg) use the usual Lanczos approach 27 . Of course, by using a finite bath, it is impossible to reproduce the continuous case to perfect match. Only in the case where the number of bath sites N b was equal to infinity could one recover the continuous case exactly. Therefore, the idea proposed by Caffarel and Krauth 33 is to define a distance function d from the Matsubara axis representation. Note that the Matsubara axis representation of a T = 0 problem requires the use of a fictitious temperature, which we choose as β = 1 /T = 200. Here, we use the inverse of the noninteracting Green's function to define the distance function half bandwidth of 1, max ε ( | l | ) ≤ 1. At β = 200 such an energy corresponds to approximately n = 31 and thus N max = 400 is large enough. Finally, G -1 ,Ns 0 ( iω n ) is the inverse of the noninteracting Green's function of the Hamiltonian of Eq. (B1) and is written as $$d = \frac { 1 } { N _ { m a x } + 1 } \sum _ {$$ $$G _ { 0 } ^ { - 1, N s } ( z ) = z - \vare$$ We specify the set of parameters { V , ε l l } as those that minimize d . This is a problem of unconstrained optimization in several variables. N max is the maximum number of frequencies used to define d . It is important that ω N max /greatermuch max ε ( l ). We typically use N max = 400. Since the bath is fixed with a α ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-0c6bab44-b0da-4d50-aa57-ef41821be0c2.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1143v2-figure-c7d4d248-0c8f-4c49-82f4-213b15de26f6.jpg) α Figure 11: (Color online) Effective ML coefficients parameters Γ for the Legendre polynomial representation as a function of τ for (a) U = 3 5, . V = 0 25, and . n d = 0 85 and (b) . U = 2 9, . V = 0 5, and . n d = 1. The curves correspond to the different examples in the learning set. For (a), red solid lines denote U = 3 36, . V = 0 24, . and n d = 0 80; . blue solid lines denote U = 3 36, . V = 0 24, . and n d = 0 90; . black solid lines denote U = 3 36, . V = 0 27, . and n d = 0 80; . cyan solid lines denote U = 3 36, . V = 0 27, and . n d = 0 9; magenta solid lines denote . U = 3 52, . V = 0 24, and . n d = 0 80; green solid lines denote . U = 3 52, . V = 0 24, and . n d = 0 90; red dashed lines denote . U = 3 52, . V = 0 27, and . n d = 0 80; and blue dashed lines denote . U = 3 52, . V = 0 27, and . n d = 0 90. . For (c), red solid lines denote U = 2 88, . V = 0 48, and . nd = 1; blue solid lines denote U = 2 88, . V = 0 51, and . n d = 1; black solid lines denote U = 3 04, . V = 0 48, and . n d = 1; and cyan solid lines denote U = 3 04, . V = 0 51, and . n d = 1. ## 1. Representation of the Green's function - · We construct a starting vector | f 0 〉 = d † σ | GS 〉 For our H target (Eq. (B1)) with hybridization fixed, the ground state is nondegenerate and always in the sector where N = N s and S z = 0. Once the energy E GS and many-body wave function | GS 〉 are obtained, the Green's function can be calculated from the electron and hole part. $$P ^ { \text{suv} } _ { \sigma } G _ { \sigma } ( z ) = & \langle G S | d _ { \sigma } \frac { 1 } { z + E _ { G S } - H } d _ { \sigma } ^ { \dagger } | G S \rangle \\ & + \langle G S | d _ { \sigma } ^ { \dagger } \frac { 1 } { z - E _ { G S } - H } d _ { \sigma } | G S \rangle. \\ \text{It is most convenient to represent $G$ as a continued frac-}$$ It is most convenient to represent G as a continued fraction $$\tau & = \max \cos \text{convenience} \, \omega \, \text{preprocessor} \, \sigma \, \alpha \, \text{a common} \, \omega \, \\ G _ { \sigma } ( z ) = & \frac { \langle G S | d _ { \sigma } d _ { \sigma } ^ { t } | G S \rangle } { z + E _ { G S } - a _ { 0 } ^ { > } - \frac { b _ { 2 } ^ { > 2 } } { z + E _ { G S } - a _ { 1 } ^ { > } - \frac { b _ { 2 } ^ { > 2 } } { z + E _ { G S } - a _ { 2 } ^ { > } - \ddots } } } \\ & \quad + \frac { \langle G S | d _ { \sigma } ^ { t } d _ { \sigma } | G S \rangle } { z - E _ { G S } - a _ { 0 } ^ { < } - \frac { b _ { 1 } ^ { < 2 } } { z - E _ { G S } - a _ { 1 } ^ { > } - \frac { b _ { 2 } ^ { < 2 } } { z - E _ { G S } - a _ { 2 } ^ { > } - \ddots } { z - E _ { G S } - a _ { 2 } ^ { > } - \ddots } } }. \quad \text{The e} \, \text{are or} \, \text{dub} \, \text{relatic} \, \text{ortho} \, \text{onalt} \, \text{matte}$$ A second Lanczos procedure can be used to obtained the coefficients. The algorithm to calculate these coefficients from the ground state is as follows 27 : - · We construct the so-called Lanczos space with the recursion relation of orthogonal vectors $$| f _ { n + 1 } \rangle = H | f _ { n } \rangle - a _ { n } ^ { > } | f _ { n } \rangle - b _ { n } ^ { > 2 } | f _ { n - 1 } \rangle. \quad ( \mathbb { B } 6 )$$ - · It is easy to obtain the coefficients as $$a _ { n } ^ { > } = \frac { \langle f _ { n } | H | f _ { n } \rangle } { \langle f _ { n } | f _ { n } \rangle } \quad \quad ( B 7 )$$ and $$b _ { n } ^ { > 2 } = \frac { \langle f _ { n } | f _ { n } \rangle } { \langle f _ { n - 1 } | f _ { n - 1 } \rangle }, \text{ \quad \quad } ( B 8 )$$ $$\text{with $b_{0}^{>2}=0$.}$$ The equivalent can be done for the a &lt; n and b &lt; 2 n . The | f n 〉 are orthogonal by construction if evaluated exactly. With double precision floating point arithmetic and a recursion relation (Eq. (B6)) that only forces three vectors to be orthogonal, at some point (typically after 50) the orthogonality will be lost. For the Green's function, it does not matter much. If necessary, there are slightly more complicated algorithms that do partial orthogonalization to keep a good orthogonality of our set of vectors 34 . Note that for proper numerical calculation Eqs. (B6),(B7) and (B8) must be modified so that the states in Eq. (B6) are normalized. ## Appendix C: Legendre polynomial expansion The Legendre polynomials P k ( x ) are defined on an interval x /epsilon1 [ -1 1] and thus an arbritrary function , f ( x ) in - ≤ 1 x ≤ 1 can be written as $$f ( x ) = \sum _ { k = 0 } ^ { \infty } a _ { k } P _ { k } ( x ). \quad \text{(C1)} \quad \text{Th} \\ \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots$$ The coefficients a k are found by multiplying both sides of Eq. (C1) by P l ( x ) and then integrating over x . The orthogonality relation for the Legendre polynomials is used, ∫ 1 -1 dxP l ( x P ) k ( x ) = 2 2 +1 l δ lk . $$& \int _ { - 1 } ^ { 1 } d x P _ { l } ( x ) f ( x ) = \sum _ { k = 0 } ^ { \infty } a _ { k } \int _ { - 1 } ^ { 1 } d x P _ { l } ( x ) P _ { k } ( x ) = a _ { l } \frac { 2 } { 2 l + 1 } \\ & \text{(C2)} \quad \text{In $th$} \quad \text{How\quad}.$$ Hence, $$a _ { n } & = \frac { 2 l + 1 } { 2 } \int _ { - 1 } ^ { 1 } d x P _ { l } ( x ) f ( x ). \quad \quad ( \text{C3} ) \quad \text{$\text{$\text{$of$ l$}$}$} \\ & \quad \text{$\text{fact}$}$$ We define a l ≡ √ 2 +1 l β G l to be consistent with Ref.[30]. Finally, we can also change the integration variable and therefore get the result of Eq. (23) and the expansion of Eq. (22). ## Appendix D: Effective α in the Machine Learning of the Legendre polynomial expansion In the Legendre polynomial expansion, the Green's function on the Matsubara axis is given by Eq. (24) $$G ( i \omega _ { n } ) = \sum _ { l = 0 } ^ { \infty } T _ { n l } G _ { l }. \quad \text{(D1)} \quad \text{fra}$$ - 1 Matthias Troyer and Uwe-Jens Wiese, Phys. Rev. Lett. 94 , 170201 (2005) - 2 B. Sch¨lkopf and A. J. Smola, o Learning with Kernels (MIT Press, 2002). - 3 J. C. Snyder, M. Rupp, K. Hansen, K-R. M¨ller and K. u Burke, Phys. Rev. Lett. 108 , 253002 (2012) - 4 M. Rupp, A. Tkatchenko, K.-R. M¨ uller and O. A. von Lilienfeld, Phys. Rev. Lett. 108 , 058301 (2012) - 5 G. Montavon, M. Rupp, V. Gobre, A. Vazquez-Mayagoitia, K. Hansen, A. Tkatchenko, K.-R. M¨ller and O. A. von u Lilienfeld, New Journal of Physics 15 , 095003 (2013) - 6 A. Lopez-Bezanilla and O. A. von Lilienfeld, Phys. Rev. B 89 , 235411 (2014) - 7 Bobby G. Sumpter and Donald W. Noid, Chem. Phys. Lett. 192 , 455 (1992). - 8 S. Lorenz, A. Gross and M. Scheffler, Chem. Phys. Lett. 395 , 210 (2004). - 9 S. Manzhos and T. Carrington, Jr., J. Chem. Phys. 125 , 084109 (2006) In this approach, the ML procedure is for the coefficients G l and not G iω ( n ) itself. Therefore, using Eq (5) we may write $$G _ { l } = \sum _ { i } \alpha _ { i l } K _ { l } ( { \mathbf D } _ { i }, { \mathbf D } ). \quad \quad ( { \mathbf D } 2 )$$ Therefore, putting Eq. (D2) in Eq. (D1) we obtain $$G ( i \omega _ { n }, \mathbf D ) & = \sum _ { l = 0 } ^ { l _ { \max } } T _ { n l } \sum _ { i } \alpha _ { i l } K _ { l } ( \mathbf D _ { i }, \mathbf D ) \\ & = \sum _ { i } ^ { l _ { \max } } \sum _ { l = 0 } ^ { l _ { \max } } T _ { n l } \alpha _ { i l } K _ { l } ( \mathbf D _ { i }, \mathbf D ). \\ \\ \tau _ { - } \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \end{$$ In the most general case, this is as far as we can go. However, in our approach, we have chosen to consider that the parameters of K are such that K is independent of l , i.e., K l ( D D i , ) → K ( D D i , ). This enables us to factor out K in Eq.(D3) and thus obtain $$G ( i \omega _ { n }, \mathbf D ) & = \sum _ { i } \left \{ \sum _ { l = 0 } ^ { l _ { \max } } T _ { n l } \alpha _ { i l } \right \} K ( \mathbf D _ { i }, \mathbf D ) \\ & \equiv \sum _ { i } \Gamma _ { i n } K ( \mathbf D _ { i }, \mathbf D ). \\ \mathbf V \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdots$$ We therefore obtain in this approximation a renormalized α parameter in the ML expansion. This can be compared with the α obtained from the ML directly on G iω ( n ). This is not possible for the other two representations since the reconstruction of G iω ( n ) is done using highly nonlinear relations (Fourier transform and the continued fraction). - 10 J. Behler and M. Parrinello, Phys. Rev. Lett. 98 , 146401 (2007) - 11 Albert P. Bart´k, Mike C. Payne, Risi Kondor and G´bor o a Cs´ anyi, Phys. Rev. Lett. 104 , 136403 (2010) - 12 W. Metzner and D. Vollhardt, Phys. Rev. Letts. 62 , 324 (1989). - 13 A. Georges and G. Kotliar, Phys. Rev. B 45 , 6479 (1992) - 14 M. Jarrell, Phys. Rev. Lett. 69 , 168 (1992) - 15 P. Werner, A. Comanac, L. de Medici, M. Troyer, and A. J. Millis, Phys. Rev. Lett. 97 , 076405 (2006). - 16 K. Haule, Phys. Rev. B 75 , 155113 (2007). - 17 E. Gull, A. J. Millis, A. I. Lichtenstein, A. N. Rubtsov, M. Troyer, and P. Werner, Rev. Mod. Phys. 83 , 349 (2011). - 18 K. Hansen, G. Montavon, F. Biegler, S. Fazli, M. Rupp, M. Scheffler, O. Anatole von Lilienfeld, A. Tkatchenko and K.-R. M¨ller, J. of Chem. Theo. and Comp. u 9 , 3404 (2013). - 19 T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning. Data Mining, Inference, and Prediction (Springer, New York, 2009), 2nd ed. - 20 P.B. Wiegmann, Phys. Lett. A 80 , 163 (1980) - 21 I.S. Krivenko, A.N. Rubtsov, M.I. Katsnelson and A.I. Lichtenstein, JETP Letters 91 , 319 (2010). - 22 S. Kirchner, J. Kroha, and P. W¨lfle, Phys. Rev. o B 70 , 165102 (2004) - 23 J. E. Hirsch and R. M. Fye, Phys. Rev. Lett. 56 , 2521 (1986) - 24 X. Wang, C. D. Spataru, M. S. Hybertsen, and A. J. Millis, Phys. Rev. B 77 , 045119 (2008) - 25 Ralf Bulla, Theo A. Costi, and Thomas Pruschke, Rev. Mod. Phys. 80 , 395 (2008) - 26 A. Georges, G. Kotliar, W. Krauth, and M. J. Rozenberg Rev. Mod. Phys. 68 , 13 (1996). - 27 E. Dagotto, Rev. Mod. Phys. 66 , 763 (1994). - 28 F. D. M. Haldane, J. Phys. C 11 , 5015 (1978). - 29 L.-F. Arsenault, P. Semon, and A.-M. S. Tremblay, Phys. - Rev. B 86 , 085133 (2012). - 30 L. Boehnke, H. Hafermann, M. Ferrero, F. Lechermann, and O. Parcollet, Phys. Rev. B 84 , 075145 (2011). - 31 N. Hale and A. Townsend, SIAM J. Sci. Comput. 36 , A148 (2014). - 32 T. A. Driscoll, N. Hale, and L. N. Trefethen, editors, Chebfun Guide, Pafnuty Publications, Oxford, 2014 http://www.chebfun.org/. - 33 M. Caffarel and W. Krauth, Phys. Rev. Lett. 72 , 1545 (1994) - 34 S. Qiao, G. Liu and W. Xu, Advanced Signal Processing Algorithms, Architectures, and Implementations XV, edited by Franklin T. Luk, Proc. of SPIE 5910 , 591010 (2005)
10.1103/PhysRevB.90.155136
[ "Louis-François Arsenault", "Alejandro Lopez-Bezanilla", "O. Anatole von Lilienfeld", "Andrew J. Millis" ]
2014-08-05T23:34:30+00:00
2014-11-02T23:51:36+00:00
[ "cond-mat.str-el", "stat.ML" ]
Machine learning for many-body physics: The case of the Anderson impurity model
Machine learning methods are applied to finding the Green's function of the Anderson impurity model, a basic model system of quantum many-body condensed-matter physics. Different methods of parametrizing the Green's function are investigated; a representation in terms of Legendre polynomials is found to be superior due to its limited number of coefficients and its applicability to state of the art methods of solution. The dependence of the errors on the size of the training set is determined. The results indicate that a machine learning approach to dynamical mean-field theory may be feasible.
1408.1144v1
## Signatures of Secondary Collisionless Magnetic Reconnection Driven by Kink Instability of a Flux Rope ## S. Markidis , G. Lapenta , G.L. Delzanno , P. Henri 1 2 3 4 , M.V. Goldman , D.L. Newman , T. Intrator , E. Laure 5 5 3 1 - 1 High Performance Computing and Visualization (HPCViz) Department, KTH Royal Institute of Technology, Stockholm, Sweden - 2 Center for mathematical Plasma Astrophysics (CmPA), KULeuven, Leuven, Belgium - 3 Los Alamos National Laboratory, Los Alamos, NM USA - 4 LPC2E, CNRS, Orl´ eans, France - 5 Department of Physics and CIPS, University of Colorado, Boulder, CO USA E-mail: [email protected] Abstract. The kinetic features of secondary magnetic reconnection in a single flux rope undergoing internal kink instability are studied by means of three-dimensional Particle-in-Cell simulations. Several signatures of secondary magnetic reconnection are identified in the plane perpendicular to the flux rope: a quadrupolar electron and ion density structure and a bipolar Hall magnetic field develop in proximity of the reconnection region. The most intense electric fields form perpendicularly to the local magnetic field, and a reconnection electric field is identified in the plane perpendicular to the flux rope. An electron current develops along the reconnection line in the opposite direction of the electron current supporting the flux rope magnetic field structure. Along the reconnection line, several bipolar structures of the electric field parallel to the magnetic field occur making the magnetic reconnection region turbulent. The reported signatures of secondary magnetic reconnection can help to localize magnetic reconnection events in space, astrophysical and fusion plasmas. ## 1. Introduction Flux ropes are bundles of magnetic field lines wrapped around an axis. They are ubiquitous structures in space, astrophysical and fusion device plasmas. The presence of flux ropes has been observed in planetary magnetotail [1], dayside magnetopause [2], and in solar corona [3]. Astrophysical jets can be treated as flux ropes [4, 5, 6]. Flux ropes can also reproduce to a first approximation the magnetic field geometry of fusion devices such as Z-pinch or Tokamak fusion reactors [7]. The kink instability is one of the most studied instabilities of flux ropes [8]. This instability is particularly important in fusion devices, where it can disrupt the flux rope limiting the confinement of plasma [9]. Because of this, many analytical and numerical studies have been devoted to the understanding of its dynamics. The kink instability has been extensively studied using MHD modeling. It has been examined with Particle-in-Cell methods [10, 11, 12] only recently to enlighten possible kinetic effects during the evolution of the kink instability. This paper presents a simulation study of secondary magnetic reconnection triggered by the internal kink instability of a single flux rope in a periodic domain along the axis direction. Secondary magnetic reconnection occurs when magnetic reconnection is driven by a primary instability that forces the magnetic field lines from different disconnected magnetic regions to be in contact and reconnect. Therefore, secondary magnetic reconnection develops over a dynamic time scale imposed by the primary instability that acts as a driver. For instance, secondary magnetic reconnection might be triggered by Kelvin-Helmholtz (KH) instability [13]. The vortices created by the KH instability force the magnetic field lines from different magnetic domains to reconnect. An additional example is the magnetic reconnection driven by interchange instability affecting the reconnection fronts in magnetotail magnetic reconnection [14, 15]. Secondary magnetic reconnection has an important role in the overall dynamics of the primary instability: it converts magnetic field energy to kinetic energy of the plasma allowing for a local reconfiguration of the magnetic field topology. Several signatures of magnetic reconnection have been identified in simplified configurations using computer simulations. The most famous example of such configurations is the Harris current-sheet model [16]. The vast majority of simulations starts from the Harris equilibrium. In this configuration, the most famous signature of magnetic reconnection is the quadrupolar structure of the Hall magnetic field developing on the reconnection plane [17, 18]. The quadrupolar structure of the Hall magnetic field originates because of the decoupling of electron and ion dynamics in a small region in proximity of the reconnection line. Additional signatures of magnetic reconnection are the presence of regions of space with depleted density (density cavities) [19], of bipolar electric field structures and electron holes in the phase space [20, 21], of whistler and kinetic Alfv´n waves [22, 23]. e In this paper, we focus on signatures of magnetic reconnection in a more complicated initial configuration, such as the single flux rope setup. In this configuration, we found signatures that are similar to the ones of magnetic reconnection in the Harris sheet [18] and some new features characteristic of magnetic reconnection during the kink instability. The main new contribution of this paper is to identify the features of magnetic reconnection driven by internal kink instability. These features can be used by scientists to determine reconnection sites developing during the kink instability of a single flux rope and to increase the understanding of the complex phenomena involved in the kink instability of a flux rope. The paper is organized as follows. The simulation model, the initial configuration of the flux rope and the parameters in use are presented in Section 2. The main features and the signatures of secondary magnetic reconnection are presented in Section 3. Section 4 discusses the results, summarizes the results and finally outlines possible future extension of this work. ## 2. Simulation Model We present three-dimensional Particle-in-Cell (PIC) simulations of a flux rope instability. By using a PIC model, we describe correctly the kinetic behavior of the flux rope plasma. The internal kink instability develops over time scale of hundred of ion gyro-periods. These time scales are much larger than the typical time scales that can be covered by standard PIC methods. In order to cover such a large period of time, we use an implicit PIC approach [24] to avoid numerical instability when using large simulation time steps. The single flux rope is modeled with a simple screw-pinch configuration [7] as in previous works [6, 11]. In this configuration, the initial magnetic field in cylindrical coordinates is: $$\text{volume is}. \begin{cases} \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { z } = B _ { 0 } \\ \ B _ { r } = 0 \\. \end{cases} \quad \begin{cases} 1 \\ \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { r } = 0 \\. \end{cases} \quad \begin{cases} 1 \\ \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { r } = 0 \\. \end{cases} \quad \begin{cases} 1 \\ \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { r } = 0 \\. \end{cases} \quad \begin{cases} 1 \\ \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { r } = 0 \\. \end{cases} \quad \begin{cases} 1 \\ \ B } \ B _ { \theta } = \frac { B _ { 0 } r } { r ^ { 2 } + w ^ { 2 } } \\ \ B _ { r } = 0 \\. \end{cases}$$ The magnetic field lines are helical with a pitch determined by the amplitude B 0 = 0 1 . m cω i pi /e , where m i is the ion mass, c is the speed of light in the vacuum, ω pi is the ion plasma frequency and c the elementary charge. The parameter w is chosen to be 1 0 . d i ( d i = c/ω pi is the ion skin depth). The density n 0 = 1 is initially uniform. The initial current is computed numerically by solving the Ampere's law with the given magnetic screw-pinch configuration. In our set-up, only electrons carry out the initial current. The electron drift velocity of the computational particles is calculated from the electron current as V e0 = J e0 / en ( 0 ). Ions do not have an initial drift velocity. The pressure is calculated by imposing a force balance in the domain. The thermal velocity of the computational particles is computed from the local value of the pressure. In this configuration, the plasma beta, the ratio of plasma pressure to the magnetic pressure, is β ≈ 0 2. . The electron beta is β e ≈ 0 02. . The simulation box is L x × L y × L z = 4 π d i × 4 π d i × 8 π d i long and discretized in a Cartesian domain with n x × n y × n z = 128 × 128 × 256 points. An artificial ion to electron mass ratio equal to 25 is chosen to reduce the simulation execution time. The grid spacing results ∆ x = ∆ y = ∆ z = 0 098 . d i = 0 78 . d e , where d e is the electron skin depth. Because the electron skin depth is not fully resolved by the grid spacing, the proposed simulation does not model the dissipative kink mode (the collisionless analogous of the resistive kink mode) but the kink mode under study is an ion-kinetic modification of the ideal kink mode [25]. Perfect conductor boundary conditions for the electromagnetic field and reflecting for particles are used in the x and y directions. The system is periodic in the z direction, and therefore it can be considered infinite in that direction. The simulation time step is ∆ t = 0 3 . ω -1 pi . In this configuration, ∆ = 0 3 t . ω -1 pi = 2 4 . ω -1 p , where ω p is the plasma frequency. The time step in use is larger than the maximum time step (2 ω -1 p ) allowed in standard explicit PIC methods. A total of 226 million particles are used. Simulations are carried out with the parallel fully kinetic and fully electromagnetic PIC code iPIC3D [26] on 512 cores of the Lindgren supercomputer at KTH Royal Institute of Technology. In our simulations, we use the core magnetic field B 0 to define the ion cyclo-frequency Ω ci = B e/m 0 e , and Alfv´ en velocity V A = B / 0 √ 4 πen 0 . In this configuration, c/V A = ω pi / Ω ci is 10. The ion and electron gyro-radii are respectively 0 4 . d i and 0 03 . d i . In this set-up, the time step and grid the spacing resolve all the time and space scales relevant to the study of magnetic reconnection. A relatively high number of computational particles (if compared with standard PIC simulations) has been chosen to decrease the numerical noise arising from the particle description of plasma. It is therefore reasonable to expect that severe numerical artifacts do not affect the simulation of magnetic reconnection. This initial configuration is unstable against the kink instability. In fact, the safety factor q = 2 πrB /B L z θ z is smaller than one in a region of space in the computational domain, and therefore the system results unstable against kink instability [27]. The surface q = 1 is called 'resonant surface' and magnetic reconnection will develop along the resonant surface when the kink instability reaches the non linear stage [27]. The resonant surface r s is located at r ≈ 1 7 . d i in our simulation set-up. ## 3. Results The evolution of the kink instability and of the secondary magnetic reconnection in a three-dimensional PIC simulation is presented. Figure 1 shows an isocontour of the axial component of the electron current at four successive times t = 0 60 Ω , -1 ci , 75 Ω -1 ci , 90 Ω -1 ci . The electron current is represented as a vertical tube in the plot of axial component ( z direction) of the electron current J ez . The electron current tube starts bending approximately at time t = 75 Ω -1 ci , and the kink instability eventually fully develops at time t = 90 Ω -1 ci . Figure 2 shows the magnetic field lines as grey tubes at times t = 0 84 Ω , -1 ci , 105 Ω -1 ci , 120 Ω -1 ci . The magnetic field lines progressively untwist as effect of magnetic reconnection [27]. We focus on the secondary magnetic reconnection signatures in the plane ( x, y ) perpendicular to the axis of the flux rope. A convenient quantity to identify magnetic Figure 1. Isocontour of the axial component of the electron current J ez = 0 005 . en c 0 at times t = 0 60 Ω , -1 ci , 75 Ω -1 ci , 90 Ω -1 ci . A kink of the electron channel develops approximately after t = 075 Ω -1 ci . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-44d1a98d-6469-42c6-a565-f40a2cf8e79c.jpg) Figure 2. Magnetic field lines at times t = 0 84 Ω , -1 ci , 105 Ω -1 ci , 120 Ω -1 ci . The magnetic field lines untwist as macroscopic effect of magnetic reconnection. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-88febb7d-198b-40c9-a9ae-06c79d0b26e5.jpg) reconnection is the auxiliary magnetic field B ∗ , defined as B ∗ = B θ -(2 r/L x ) B z . Figure 3 shows B ∗ at t = 0 81 87 Ω , , -1 ci in the plane z = L / , r &lt; z 2 3 5 . d i . Initially, the quiver plot shows two disconnected B ∗ regions. In these two regions, B ∗ points at opposite directions. B ∗ vanishes at r = r s represented as red dashed line in Figure 3. As the simulation progresses, the internal B ∗ region moves outward and crosses the resonant surface as effect of the kink instability of the flux rope. This is clear by inspecting B ∗ configuration at time t = 81 Ω -1 ci in Figure 3. As the internal B ∗ region crosses the resonant surface, magnetic reconnection occurs, forming two new B ∗ regions. We have found that B ∗ is almost independent on z . For this reason, we focus on studying secondary magnetic reconnection in the plane z = L / z 2. Almost identical features can be found on different z planes. Figure 3. Quiver plot of B ∗ at time t = 0, t = 81 Ω -1 ci and t = 87 Ω -1 ci in the plane z = L / , r z 2 &lt; 3 5 . d i . Initially, the quiver plot shows two disconnected B ∗ regions ( B ∗ pointing at different directions). At time t = 81 Ω -1 ci , the B ∗ internal region moves outward as effect of the kink instability. At time t = 87 Ω -1 ci , the two initially disconnected B ∗ regions reconnect. The resonant surface is shown with dashed red line. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-6e995015-de50-475b-8c9e-8a7f7d305d2d.jpg) The plasma density is initially uniform. However, density inhomogeneities develop under the effect of secondary magnetic reconnection. Figure 4 shows the contour plot of the electron (panel a) and ion (panel b) densities in the plane z = L / , r &lt; z 2 3 5 . d i at time t = 84 Ω -1 ci . The densities are normalized to the initial density n 0 . The formation of density cavities is a characteristic of magnetic reconnection. They are localized along the separatrices and they are crossed by intense electron jets. It is found that the regions with enhanced and depleted densities form a quadrupolar structure, as outlined with dashed lines in Figure 4 panel b). The maximum and minimum densities are 50 % peak initial density. Density cavities are approximately 4 d i long and 1 d i thick. Magnetic reconnection occurs in a region of space with density n ≈ n / 0 2. Previous two-dimensional simulations [28] show that grid resolution in the proposed simulation allows to capture all the relevant dynamics for studying magnetic reconnection. Initially in the simulation, the current is primarily along the flux rope axis ( z direction) and carried out by electrons while ions have only an initial thermal velocity and no drift velocity. Panel a) of Figure 5 shows a contour plot of the z component of the electron bulk velocity V e = J e /ρ e , where velocities are normalized to the Alfv´n e velocity V A . At the center of the contour plot, the initial electron current is directed Figure 4. Isocontour plots of the electron (panel a) and ion (panel b) densities in the plane z = L / , r &lt; z 2 3 5 . d i at time t = 84 Ω -1 ci . The densities are normalized to n 0 . The densities plot shows region of enhanced and depleted densities (organized as quadrupolar structure) in proximity of the reconnection region. The dashed lines shows the quadrupolar structure in panel b). The white line represent B ∗ contour-lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-5dd0e2d8-598f-44b5-ac73-0455a168fd1d.jpg) in negative z direction and it can be still seen in blue color. In the proximity of the reconnection site, a thin layer of electrons flowing in the opposite direction of the initial electron current can be observed in the red color. This current is localized in the region characterized by a relatively low electron density (Figure 4). The electron peak bulk velocity is approximately 1 5 . V A at center of the flux rope, while an opposite flow at -1 5 . V A develops in the low density region of the flux rope. Panel b) of Figure 5 shows a contour plot of the z component of the electron bulk velocity V i = J i /ρ i . This shows a quadrupolar structure, similar to high and low density structures in Figure 4. The ion peak bulk velocity is approximately 0 2 . V A , approximately eight times smaller than the electron peak bulk velocity. The panel a) of Figure 6 shows an isocontour plot of the electric field intensity with a superimposed quiver in the plane z = L / , r &lt; z 2 3 5 . d i at time t = 84 Ω -1 ci . The electric field is normalized to B V 0 A /c . The electric field has the strongest components in the plane ( x, y ) and is localized in proximity of the density cavity regions. A weaker component of the electric field in the z direction is observed also. A contour plot of the z component of the electric field in the plane z = L / , r &lt; z 2 3 5 . d i at time t = 84 Ω -1 ci is shown in panel b) of Figure 6. Its peak value is 0 1 . B V 0 A /c . Figure 7 presents an isocontour plot of the magnetic field intensity and a quiver plot of magnetic field at time t = 84 Ω -1 ci in panel a). The magnetic field values are normalized to B 0 . The magnetic field is dominated by the core magnetic field in the z direction and Figure 5. Isocontour plot of the z component of the electron and ion bulk velocities V ez , V iz in the plane z = L / , r &lt; z 2 3 5 . d i in panels a) and b). Velocities are normalized to Alfv´n velocity e V A . The white lines represent B ∗ contour-lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-08c5ec5d-b51c-4102-8718-0a0edb9cd671.jpg) Figure 6. Isocontour plot of the electric field intensity with a superimposed E quiver plot in the plane z = L / , r z 2 &lt; 3 5 . d i at time t = 84 Ω -1 ci is shown in panel a). Isocontour plot of the z component of the electric field is shown in panel b). The electric field is normalized to B V 0 A /c . The white lines represent B ∗ contour-lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-273fa157-6de5-41f6-8f16-b2bccee78892.jpg) its value is close to B 0 in the region r &lt; 3 5 . d i . Panel b) shows the z component of the magnetic field. A bipolar structure of the B z component has been found in proximity of the reconnection region. The peak value of the B z -B 0 is approximately 0 2 . B 0 . Figure 7. Isocontour plot of the magnetic field intensity with a superimposed quiver plot in the plane z = L / , r z 2 &lt; 3 5 . d i at time t = 84 Ω -1 ci is shown in panel a). Isocontour plot of the z component of the magnetic field is shown in panel b). The magnetic field values are normalized to core magnetic field B 0 . The white lines represent B ∗ contour-lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-f91efde5-223a-4e27-8366-047f8a59bc44.jpg) As seen in Figure 5, two electron currents develop in opposite directions during secondary magnetic reconnection. Figure 8 shows a three dimensional contour plot for axial component of the electron current J ez = 0 005 . en c 0 (red color) and J ez = -0 005 . en c 0 . Initially the electron current component in the z direction is only positive, while later on an electron current develops in the negative z direction. At time t = 90 Ω -1 ci , the electron current is perturbed. This might suggest that an electronscale streaming instability could occur at the interface of the two opposite currents. Figure 9 presents an isosurface of the electric field component parallel to local magnetic field. The red and blue isosurfaces are for E // = ± 0 04 . B V 0 A /c and an isosurface of the axial component of the electron current is superimposed to visualize the flux rope. Several bipolar parallel electric field structures develop along the reconnection line in proximity to the interface between the electron currents flowing in the opposite directions. Figure 8. Isocontour of the axial component of the electron current J ez = 0 005 . en c 0 (red color) and J ez = -0 005 . en c 0 (blue color) at times t = 75 Ω -1 ci , 84 Ω -1 ci , 90 Ω -1 ci . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-0c22605b-d7b8-43a6-a0fa-14f84b9a3276.jpg) ## 4. Discussion and Conclusions In this study, the signatures of secondary collisionless magnetic reconnection triggered by the kink of an infinite flux rope have been identified. The kink instability of the flux rope has been simulated with a fully kinetic and fully electromagnetic PIC method, allowing us to retain the kinetic effects during magnetic reconnection. This is important when modeling magnetic reconnection, because fluid models can not provide a full description of collisionless phenomena. As a first step of our study, the reconnection regions have been identified using the auxiliary magnetic field B ∗ . Several signatures of secondary magnetic reconnection have been found on a plane perpendicular to the flux rope axis. Regions of enhanced and depleted density (with peak density 50 % the background density) form a quadrupole structure in proximity of the reconnection region. The regions with depleted density are called 'density cavities' in the literature and electron currents flow along them. The ion flow develops in large part on the ( x, y ) plane. The decoupling of electron and ion dynamics on the ( x, y ) plane generates an Hall magnetic field. On this plane, the Hall magnetic field has a bipolar structure in the plane. The peak value of the Hall magnetic field is 20 % the axial magnetic field B 0 . The most intense electric fields develop perpendicularly to local magnetic field and mainly on the ( x, y ) plane. In proximity of the reconnection region, an electric field in the z direction forms as effect of magnetic reconnection. Its value is 0 1 . B V 0 A /c (panel b of Figure 6). This is the so-called t=90 Qci-1 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-0fafcc8e-6f56-467b-a3dc-174cb4a25e5c.jpg) Figure 9. Isosurface of the parallel electric field for E // = ± 0 04 . B V 0 A /c with superimposed isosurface of the axial component of the electron current J ez = 0 005 . en c 0 at times t = 87 Ω -1 ci , 90 Ω -1 ci . Several bipolar electric field structures develop in proximity of the reconnection region. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1144v1-figure-7faf1497-fca4-43bb-940c-3401402f1f9d.jpg) 'reconnection' inductive electric field. During the secondary magnetic reconnection, an electron current develops in the opposite direction of the initial electron current of the flux rope. The intensity of this current is approximately of the same intensity of the initial electron current of the flux rope. The bulk electron velocity is approximately 1 5 . V A . We believe that the reverse current would render the kink more stable. The presence of opposite currents has been observed in the Reconnection Scaling eXperiment (RSX) device [29, 30]. The interface separating the two opposite electron currents is characterized by the presence of bipolar electric field structures. It is likely that these structures are caused by electron streaming instabilities along the reconnection line [31, 32]. Because of the presence of several bipolar electric fields and electron-scale instabilities, the reconnection region is in a turbulent state. The turbulence of the reconnection region might affect the reconnection rate by introducing an anomalous resistivity [33]. This paper is an example of study of magnetic reconnection in a non trivial initial configuration. We found that the results are generally in a good agreement with the results obtained starting from simple initial configuration, such as the Harris configuration with a uniform background guide field B 0 [18]. In the flux rope configuration, the Hall magnetic field shows a bipolar structure differently from the famous quadrupolar structure developing in the Harris sheet configuration [34]. However, the peak value of the Hall magnetic field B z -B 0 is approximately 20 % the core magnetic field B 0 as in simulations starting from Harris sheet configuration [21, 35]. The reconnection electric field is 0 1 . B V 0 A /c in both configuration also [34]. As in simulations of Harris with a guide field, intense electron flows develop along the cavity channel. However, these electron flows are approximately 1 5 . V A in the flux rope configuration, while they are 6 -7 V A in the Harris configuration with a B 0 guide field [19]. Bipolar parallel electric fields develop in both configurations with typical electric field peak values 0 05 . -0 1 . B V 0 A /c and 0 3 . B V 0 A /c for flux rope and Harris configurations respectively [19, 32]. In the case of Harris sheet configuration, the bipolar parallel electric field structure originate along the magnetic reconnection separatrices, while they originate along the reconnection line in the flux rope configuration. In summary, the results of a three-dimensional PIC simulation, modeling magnetic reconnection during the kink instability of a flux rope, have been presented. The main signatures of secondary magnetic reconnection can be found on a plane perpendicular to the flux rope axis. A quadrupolar structure of enhanced and depleted density, a bipolar structure of the Hall field and a reconnection electric field develop in proximity of the reconnection region. The reconnection line is characterized by the presence of several parallel bipolar electric field structures. These results can be used to identify magnetic reconnection during the internal kink instability. This study focused on the analysis of signature of magnetic reconnection during kink instability of a single infinite flux rope. Future extension of this work will be the study of magnetic reconnection signatures with multiple flux ropes. In this case, magnetic reconnection is triggered by combined kink and coalescence instabilities [36, 31] making the analysis of the signatures more challenging. In addition, it would be important to study reconnection in flux ropes with an anchored end instead of using periodic boundary condition in the z direction. This would allow to model more realistically laboratory experiments [30] and several space and astrophysical events. ## Acknowledgments The present work is supported by NASA MMS Grant NNX08AO84G. Additional support for the KTH team is provided by the European Commissions Seventh Framework Programme under the grant agreement no. 287703 (CRESTA, cresta- project.eu). Additional support for the KULeuven team is provided by the Onderzoekfonds KU Leuven (Research Fund KU Leuven) and by the European Commissions Seventh Framework Programme (FP7/2007-2013) under the grant agreement no. 263340 (SWIFF project, www.swiff.eu). ## References - [1] J.P. Eastwood, D.G. Sibeck, J.A. Slavin, M.L. Goldstein, B. Lavraud, M. Sitnov, S. Imber, A. Balogh, E.A. Lucek, and I. Dandouras. Observations of multiple x-line structure in the earth's magnetotail current sheet: A cluster case study. Geophysical research letters , 32(11):L11105, 2005. - [2] G. Paschmann, I. Papamastorakis, N. Sckopke, G. Haerendel, B. Sonnerup, S.J. Bame, J.R. Asbridge, J.T. Gosling, C.T. Russel, and R.C. Elphic. Plasma acceleration at the earth's magnetopause- evidence for reconnection. Nature , 282(5736):243-246, 1979. - [3] J. T. Gosling. Coronal mass ejections and magnetic flux ropes in interplanetary space. Physics of Magnetic Flux Ropes , pages 343-364, 1990. - [4] R.V.E. Lovelace. Dynamo model of double radio sources. Nature , 262(5570):649, 1976. - [5] H. Li, G. Lapenta, J. M Finn, S. Li, and S. A. Colgate. Modeling the large-scale structures of astrophysical jets in the magnetically dominated limit. The Astrophysical Journal , 643(1):92, 2006. - [6] G. Lapenta, I. Furno, T. Intrator, and G.L. Delzanno. Kink instability of flux ropes anchored at one end and free at the other. Journal of geophysical research , 111(A12):A12S06, 2006. - [7] J.P. Freidberg. MHD - macroscopic equilibrium. In Plasma physics and fusion energy . Cambridge University Press, 2007. - [8] G. Ara, B. Basu, B. Coppi, G. Laval, M.N. Rosenbluth, and B.V. Waddell. Magnetic reconnection and m= 1 oscillations in current carrying plasmas. Annals of Physics , 112(2):443-476, 1978. - [9] S. Von Goeler, W. Stodiek, and N. Sauthoff. Studies of internal disruptions and m= 1 oscillations in tokamak discharges with soft-x-ray tecniques. Physical Review Letters , 33:1201-1203, 1974. - [10] S. Markidis, P. Henri, and G. Lapenta. Kinetic simulations of kink instability in an infinite flux rope. European Physical Meeting 2011 , 2011. - [11] A. L. Restante, S. Markidis, G. Lapenta, and T. Intrator. Geometrical investigation of the kinetic evolution of the magnetic field in a periodic flux rope. Physics of Plasmas , 20(8):082501, 2013. - [12] A. Mishchenko and A. Zocco. Global gyrokinetic particle-in-cell simulations of internal kink instabilities. Physics of Plasmas , 19(12):122104, 2012. - [13] P. Henri, S. S. Cerri, F. Califano, F. Pegoraro, C. Rossi, M. Faganello, O. Sebek, P. M. Travnicek, P. Hellinger, J. T. Frederiksen, A. Nordlund, S. Markidis, R. Keppens, and G. Lapenta. Nonlinear evolution of the magnetized Kelvin-Helmholtz instability: From fluid to kinetic modeling. Physics of Plasmas (1994-present) , 20(10):-, 2013. - [14] A.E. Vapirev, G. Lapenta, A. Divin, S. Markidis, P. Henri, M. Goldman, and D. Newman. Formation of a transient front structure near reconnection point in 3-D pic simulations. Journal of Geophysical Research: Space Physics , 2013. - [15] G. Lapenta, M.V.Goldman, D.L. Newman, and S.Markidis. Secondary reconnection in pileup fronts downstream of reconnection sites. in preparation , 2013. - [16] E. G. Harris. On a plasma sheath separating regions of oppositely directed magnetic field. Il Nuovo Cimento Series 10 , 23(1):115-121, 1962. - [17] B. Sonnerup, G. Paschmann, I. Papamastorakis, N. Sckopke, G. Haerendel, S.J. Bame, J.R. Asbridge, J.T. Gosling, and C.T. Russell. Evidence for magnetic field reconnection at the earth's magnetopause. Journal of Geophysical Research: Space Physics (1978-2012) , 86(A12):1004910067, 1981. - [18] B.N. Rogers, R.E. Denton, and J.F. Drake. Signatures of collisionless magnetic reconnection. Journal of Geophysical Research: Space Physics (1978-2012) , 108(A3), 2003. - [19] S. Markidis, G. Lapenta, Andrey Divin, M. Goldman, D. Newman, and L. Andersson. Three dimensional density cavities in guide field collisionless magnetic reconnection. Physics of Plasmas , 19:032119, 2012. - [20] G. Lapenta, S. Markidis, A. Divin, M. V. Goldman, and D. L. Newman. Bipolar electric field signatures of reconnection separatrices for a hydrogen plasma at realistic guide fields. Geophys. Res. Lett. , 38, 2011. - [21] G. Lapenta, S. Markidis, A. Divin, M. Goldman, and D. Newman. Scales of guide field reconnection at the hydrogen mass ratio. Physics of Plasmas , 17(8):082106-+, August 2010. - [22] M. Goldman, D.L. Newman, G.Lapenta, L. Andersson, J.T. Gosling, S.Eriksson, S.Markidis, and J. Eastwood. Cerenkov emission of whistlers by fast electron phase-space holes during magnetic reconnection. Submitted to Physical Review Letters , 2013. [23] G. Lapenta, M. Goldman, D. Newman, and S. Markidis. Propagation speed of rotation signals for field lines undergoing magnetic reconnection. Physics of Plasmas (1994-present) , 20(10):-, 2013. - [24] G. Lapenta, J. U. Brackbill, and P. Ricci. Kinetic approach to microscopic-macroscopic coupling in space and laboratory plasmas. Physics of Plasmas , 13(5):055904-+, May 2006. - [25] F. Pegoraro, F. Porcelli, and T. J. Schep. Internal kink modes in the ion-kinetic regime. Physics of Fluids B: Plasma Physics (1989-1993) , 1(2):364-374, 1989. - [26] S. Markidis, G. Lapenta, and Rizwan-uddin. Multi-scale simulations of plasma with iPIC3D. Mathematics and Computers in Simulation , 80(7):1509 - 1519, 2010. - [27] B.B. Kadomtsev. Plasma physics and the problem of controlled thermonuclear reactions (fizika plazmy i problemy upravlyayemykh termoyadernykh reaktsiy), 4. Izdatel'stvo AN SSSR, Moscow , 364, 1958. - [28] S. Markidis, G. Lapenta, L. Bettarini, M. Goldman, D. Newman, and L. Andersson. Kinetic simulations of magnetic reconnection in presence of a background O+ population. Journal of Geophysical Research , 116(A1):A00K16, 2011. - [29] I. Furno, T. Intrator, E. Torbert, C. Carey, M.D. Cash, J.K. Campbell, W.J. Fienup, C.A. Werley, G.A. Wurden, and G. Fiksel. Reconnection scaling experiment: A new device for threedimensional magnetic reconnection studies. Review of scientific instruments , 74(4):2324-2331, 2003. - [30] T. P. Intrator, X. Sun, G. Lapenta, L. Dorf, and I. Furno. Experimental onset threshold and magnetic pressure pile-up for 3D reconnection. Nature Physics , 5:521-526, July 2009. - [31] S. Markidis, P. Henri, G. Lapenta, A. Divin, M. Goldman, D. Newman, and E. Laure. Kinetic simulations of plasmoid chain dynamics. Physics of Plasmas , 20(8):082105, 2013. - [32] G. Lapenta, S. Markidis, A. Divin, M.V. Goldman, and D.L. Newman. Bipolar electric field signatures of reconnection separatrices for a hydrogen plasma at realistic guide fields. Geophysical Research Letters , 38(17):L17104, 2011. - [33] D. Biskamp. Magnetic reconnection via current sheets. Physics of Fluids , 29:1520, 1986. - [34] J.F. Drake and M.A. Shay. The fundamentals of collisionless reconnection. Reconnection of Magnetic Fields: Magnetohydrodynamic and Collisionless Theory and Observations , pages 8799, 2007. - [35] S. Markidis, G. Lapenta, L. Bettarini, M. V. Goldman, D. Newman, and L. Andersson. Kinetic simulations of magnetic reconnection in presence of a background O+ population. Journal of Geophysical Research (Space Physics) , 116, May 2011. - [36] S. Markidis, P. Henri, G. Lapenta, A. Divin, M. V. Goldman, D. Newman, and S. Eriksson. Collisionless magnetic reconnection in a plasmoid chain. Nonlinear Processes in Geophysics , 19:145-153, February 2012.
10.1088/0741-3335/56/6/064010
[ "S. Markidis", "G. Lapenta", "G. L. Delzanno", "P. Henri", "M. V. Goldman", "D. L. Newman", "T. Intrator", "E. Laure" ]
2014-08-05T23:38:57+00:00
2014-08-05T23:38:57+00:00
[ "physics.plasm-ph", "astro-ph.EP", "astro-ph.SR", "physics.space-ph" ]
Signatures of Secondary Collisionless Magnetic Reconnection Driven by Kink Instability of a Flux Rope
The kinetic features of secondary magnetic reconnection in a single flux rope undergoing internal kink instability are studied by means of three-dimensional Particle-in-Cell simulations. Several signatures of secondary magnetic reconnection are identified in the plane perpendicular to the flux rope: a quadrupolar electron and ion density structure and a bipolar Hall magnetic field develop in proximity of the reconnection region. The most intense electric fields form perpendicularly to the local magnetic field, and a reconnection electric field is identified in the plane perpendicular to the flux rope. An electron current develops along the reconnection line in the opposite direction of the electron current supporting the flux rope magnetic field structure. Along the reconnection line, several bipolar structures of the electric field parallel to the magnetic field occur making the magnetic reconnection region turbulent. The reported signatures of secondary magnetic reconnection can help to localize magnetic reconnection events in space, astrophysical and fusion plasmas.
1408.1145v1
## TRIDIAGONAL MATRICES AND BOUNDARY CONDITIONS J.J.P. VEERMAN ∗ AND DAVID K. HAMMOND † Abstract. We describe the spectra of certain tridiagonal matrices arising from differential equations commonly used for modeling flocking behavior. In particular we consider systems resulting from allowing an arbitrary boundary condition for the end of a one dimensional flock. We apply our results to demonstrate how asymptotic stability for consensus and flocking systems depends on the imposed boundary condition. ## 1. Introduction. The n +1 by n +1 tridiagonal matrix $$A _ { n + 1 } = \left ( \begin{array} { c c c c } b & 0 & 0 & \\ a & 0 & c & 0 & \\ 0 & a & 0 & c & \\ & \ddots & \ddots & \ddots & \\ & & a & 0 & c \\ & & a + e & d \end{array} \right ), \\ \text{any (high-dimensional) problems with local interactions}$$ is of special interest in many (high-dimensional) problems with local interactions and internal translation symmetry but with no clear preferred rule for the boundary condition. We are interested in the spectrum and associated eigenvectors of this matrix. In particular in Section 4 we study how the spectrum depends on choices for the boundary conditions implied by d and e . We will pay special attention to the following important subclass of these systems. Definition 1.1. If b = a + c and c = e + , the matrix d A is called decentralized. One of the main applications of these matrices arises in the analysis of first and second order systems of ordinary differential equations in R n +1 such as ¨ = $$\dot { x } = - L ( x - h ), \quad \text{and} \quad & & ( 1. 1 ) \\ \ddot { x } = - \sim & \sim T ( \tilde { \tau } - h \cdot h \cdot \tilde { \tau } ) & & ( 1 - 9 \cdot )$$ x - αL x ( - h ) - βLx. ˙ (1.2) Here L is the so-called directed graph Laplacian (e.g. [6]), given by L = D -A , where D is a diagonal matrix with i th entry given by the i th row sum of L . In the decentralized case D = ( a + ) , and c I L is given simply by $$L = b I - A = ( a + c ) I - A$$ In (1.2) α and β are real numbers, and h is a constant vector with components h k . Upon substitution of z ≡ x -h , the fixed points of Equations 1.1 and 1.2 are moved to the origin. It is easy to prove that the systems in Equations 1.1 and 1.2 admit the solutions $$x _ { k } = x _ { 0 } + h _ { k } \text{ \ and \ } x _ { k } = v _ { 0 } t + x _ { 0 } + h _ { k }$$ (for the first order system and the second order system, respectively) for arbitrary reals x 0 and v 0 if and only if the system is decentralized. The first order system given above is a simple model used to study 'consensus', while the second system models a simple instance of 'flocking' behavior. The latter is also used to study models for automated traffic on a single lane road. The interpretation d and e as specifying boundary conditions for these models can be understood as follows. Following the transformation z ≡ x -h , we may consider z k ( ), for 0 t ≤ k ≤ n , as the transformed positions of the n +1 members of a 'flock'. Here z 0 ( ) denotes the t transformed position of the leader , the model 1.1 then specifies that ˙ z 0 = 0, ˙ z k = a z ( k -1 -z k ) -c z ( k -z k +1 ) for 1 ≤ k &lt; n , and that ˙ z n = ( a + ) e z n -1 + dz n . The terms a z ( k -1 -z k ) and -c z ( k -z k +1 ) may be interpreted as control signals that are proportional to the displacement of z k from its predecessor z k -1 , and from its successor z k +1 . The equation giving ˙ z n is different as z n has no successor, selection of the boundary condition consists of deciding what the behavior governing z n should be. In the decentralized ∗ Maseeh Department of Mathematics &amp; Statistics, Portland State University, Portland, OR 97201, USA † Oregon Institute of Technology, Wilsonville, OR 97070 case, eliminating d shows that ˙ z n = ( a + )( e z n -1 -z n ), so that ˙ z n is proportional to the difference from its predecessor, and e may be interpreted as the additional amount of the proportionality constant due to boundary effects. Interpretation of d and e for the second order system in 1.2 is similar. These problems are important examples of a more general class of problems where oscillators are coupled according to some large communication graph, and one wants to find out whether and how fast the system synchronizes. The asymptotic stability of both systems is discussed in Section 6. One of the main motivations for this work came from earlier work ([1]) that led to the insight that in some important cases changes of boundary conditions did not give rise to appreciable changes in the dynamics of these systems (if the dimension was sufficiently high). This somewhat surprising discovery motivated the current investigation into how eigenvalues change as a function of the boundary condition. Indeed Corollaries 6.1 and 6.2 corroborate that at least the asymptotic stability of consensus systems and flock-formation systems is unchanged for a large range of boundary conditions. The method presented here relies on the observation that the eigenvalue equation for A can be rewritten as a two-dimensional recursive system with appropriate boundary conditions. This procedure was first worked out in [2]. Here we give a considerably refined version of that argument, that allows us to draw more general conclusions. These conclusions are presented in Theorems 4.2, 4.3, and 4.4. The spectrum of tridiagonal matrices has also been considered by Yueh [9] who relies heavily on [3]. In that work however the parameter e is zero, and the emphasis is on analyzing certain isolated cases, while we attempt to give a comprehensive theory. The inclusion of the parameter e is necessary for our main application: decentralized systems. Related work has also been published by Willms [8], who considered tridiagonal matrices where the product of sub and super diagonal elements is constant, and Kouachi [4], who considered a similar condition where the product of sub and super diagonal elements alternates between two values. Both of these conditions exclude the case when e = 0 in the current work. /negationslash /negationslash We assume a , b , c , d , e to be real. The cases where a = 0 or c = 0 are very degenerate. There are only 1 or 2 non-zero eigenvalues of A . We will not further discuss these cases. That leaves a &gt; 0 and c = 0 as the general case to be studied. We will consider a &gt; 0 and c &gt; 0 and will assume this unless otherwise mentioned. In Section 2 we derive a polynomial whose roots will eventually yield the eigenvalues. In the next Section we find the value of those roots. Then in Section 4 we use those results to characterize the spectrum of A . In Section 5 we apply this to the matrices associated with decentralized systems. In Section 6 we discuss the consequences for the asymptotic stability of decentralized systems of ordinary differential equations. - 2. Preliminary Calculations. We start by noting that A n +1 is block lower triangular. One block has dimension 1 and eigenvalue b . The other has dimension n . We begin by analyzing the eigenvector associated to this eigenvalue. /negationslash $$v _ { k } = x _ { + } ^ { k } + c _ { - } x _ { - } ^ { k }$$ Proposition 2.1. i) If b 2 -4 ac = 0 , then the eigenvector of A associated to the eigenvalue b is ( v , 0 · · · v n ) where and $$x _ { \pm } & = \frac { 1 } { 2 c } \left ( b \pm \sqrt { b ^ { 2 } - 4 a c } \right ) \quad a n d \ \ c _ { - } = - \left ( \frac { c } { a } \right ) ^ { n } x _ { + } ^ { 2 n - 1 } \, \frac { ( a + e ) + ( d - b ) x _ { + } } { ( c + e / a ) x _ { + } + ( d - b ) } \quad \quad ( 2. 2 ) \\ \text{ii\ } This associated einenvector is the constant vector if and onlu A is deentRIxied$$ ii) This associated eigenvector is the constant vector if and only A is decentralized. iii) If b 2 -4 ac = 0 the eigenvalues of A can be found as limits of the eigenvalues of case i. Proof . We first prove i. The equation Av = bv can be rewritten as $$\forall \, j = 1, \dots, n - 1 \ \colon \ \left ( \begin{array} { c } v _ { j } \\ v _ { j + 1 } \end{array} \right ) = C ^ { j } \left ( \begin{array} { c } v _ { 0 } \\ v _ { 1 } \end{array} \right ) \ \text{ and } \ ( a + e ) v _ { n - 1 } + ( d - b ) v _ { n } = 0 \quad \ \ ( 2. 3 )$$ Here the matrix C is defined by $$C = \left ( \begin{array} { c c } 0 & 1 \\ - \frac { a } { c } & \frac { b } { c } \end{array} \right ) \,, \\ \intertext { t h e s t a t e m e n t o f t h e $Pr o }$$ The eigenvalues of C are given by x ± in the statement of the Proposition and its associated eigenvectors are ( 1 x + ) and ( 1 x -) 1 . Assuming that the eigenvalues x ± are distinct, we can write v k = c + x k + + 1 A simple calculation shows that ( 0 1 ) cannot be an eigenvector of C c - -x k . Of course c + can be chosen to be 1 without loss of generality. Now c -is determined by substituting the expression for v k in the boundary condition in Equation 2.3. We now prove ii. Substituting v j = 1 in Equation 2.3, we immediately get that -a + b = c from the matrix equation and a + e + d -b = 0, which imply the result. Part iii follows from the fact that eigenvalues are continuous functions of the parameters. To facilitate calculations we set τ 2 ≡ a/c , shave off the first row and column of A n +1 and thus define the reduced n × n matrix Q n : $$Q _ { n } = \begin{pmatrix} 0 & a / \tau ^ { 2 } & 0 \\ a & 0 & a / \tau ^ { 2 } & \\ & \ddots & \ddots & \ddots \\ & & a & 0 & a / \tau ^ { 2 } \\ & & a + e & d \end{pmatrix}, \\ \text{m of } \mathcal { O } \text{, we look for a number $r$ and $a$ $n$-vector $n$ formin}$$ To find the spectrum of Q , we look for a number r and a n -vector v forming an eigenpair ( r, v ) as follows $$\frac { a } { \tau ^ { 2 } } v _ { 2 } \quad & = \ r v _ { 1 } \\ k \in \{ 2, \cdots, n - 1 \} \quad a v _ { k - 1 } + \frac { a } { \tau ^ { 2 } } v _ { k + 1 } \quad & = \ r v _ { k } \\ ( a + e ) v _ { n - 1 } + d v _ { n } \quad & = \ r v _ { n }$$ We first collect a number of basic observations that allow us to deduce the main results of this section. Lemma 2.2. Let ( r, v ) an eigenpair for the matrix Q . Then $$r = \sqrt { a c } ( y + y ^ { - 1 } ) \quad a n d \ \ v _ { k } = ( \tau y ) ^ { k } - \left ( \frac { \tau } { y } \right ) ^ { k }$$ where $$a ( y ^ { n + 1 } - y ^ { - ( n + 1 ) } ) - d \tau ( y ^ { n } - y ^ { - n } ) - e ( y ^ { n - 1 } - y ^ { - ( n - 1 ) } ) = 0 \\ o r \quad & ( a y ^ { 2 } - d \tau y - e ) y ^ { n - 1 } + ( e y ^ { 2 } + d \tau y - a ) y ^ { - ( n + 1 ) } = 0 \\ \dots$$ Furthermore, if we set y = e iφ then $$( e + a ) \cos n \phi \sin \phi = ( d \tau + ( e - a ) \cos \phi ) \sin n \phi$$ If we assume that sin nφ = 0 then dividing by it gives /negationslash $$\cot n \phi \sin \phi = \frac { d \tau } { e + a } + \frac { e - a } { e + a } \cos \phi$$ Proof . We proceed as in Proposition 2.1. The equation Qv = rv can be rewritten as $$\forall \, k \in \{ 1, \dots, n \} \,, \binom { v _ { k } } { v _ { k + 1 } } = C ^ { k } \binom { v _ { 0 } } { v _ { 1 } } \\ \text{and} \quad v _ { 0 } = 0 \quad \text{and} \quad \frac { a } { \tau ^ { 2 } } v _ { n + 1 } - d v _ { n } - e v _ { n - 1 } = 0$$ Here the matrix C is defined by $$C = \left ( \begin{array} { c c } 0 & 1 \\ - \tau ^ { 2 } & \frac { r \tau ^ { 2 } } { a } \end{array} \right ) \,,$$ The eigenvalues of C are given by x ± and their sum equals the trace of C , or: $$\frac { r \tau ^ { 2 } } { a } = x _ { + } + x _ { - }$$ As before, if we assume that x + and x -are distinct, we have v k = x k + + c - -x k but now c -is determined by the boundary condition v 0 = 0 in Equation 2.3. This implies that c -= -1. Now set x ± ≡ τy ± . The product x -x + equals the determinant of C , or τ 2 , and therefore $$y _ { - } & = y _ { + } ^ { - 1 } & ( 2. 1 1 )$$ If we denote y + by y we obtain Equation 2.5. The values of y ± are now determined by substituting v k into the last boundary condition of Equation 2.9. We immediately get Equation 2.6. Finally if we use $$2 ( y ^ { n + a } - y ^ { - ( n + a ) } ) = ( y ^ { n } - y ^ { - n } ) ( y ^ { a } + y ^ { - a } ) + ( y ^ { n } + y ^ { - n } ) ( y ^ { a } - y ^ { - a } ) \\ \dots$$ and then substitute y = e iφ in Equation 2.6 we easily find Equations 2.7 and 2.8. ii) The set of eigenvalues is invariant under the transformations inv : y → y -1 and conj : y → ¯ y (the complex conjugate). Lemma 2.3. i) If 1 is a simple root of Equation 2.6, then 2 √ ac is not an eigenvalue. The same holds for -1 and -2 √ ac . Proof . i: The procedure followed in the proof of Lemma 2.2 does not work if x + = x -. This happens if the discriminant of the characteristic polynomial of the matrix C is zero. This is only true if r , the eigenvalue of Q , equals ± 2 √ ac , which is equivalent to y = ± 1. On the other hand, if these roots are simple then Equation 2.6 has 2 n other roots, which by Equation 2.11 form n pairs y and 1 /y (counting multiplicity). By Equation 2.5 each pair yields an eigenvector. ii: Both transformations leave Equation 2.6 invariant. These two lemmas allow us in specific cases, namely when the polynomial in Equation 2.6 factors, to obtain a simple explicit representation of the eigenvalues. Indeed in Yueh's paper [9] the emphasis is on these special cases. We give a number of examples that are commonly used in the literature. The remainder of the paper will then be devoted to obtain more general results. We note that all three examples are special cases of Theorem 4.2 part 2. The first example is c = a and e = d = 0. The polynomial equation 2.6 factors as: y 2 n +2 -1 = 0. Thus after applying Lemmas 2.2 and 2.3 we see that the eigenvalues for Q are given by 2 a cos( πk n +1 ) for k ∈ { 1 , · · · n } . Our other two examples are of decentralized systems which are discussed in more detail in the Section 5. The first of these is c = a and e = 0 and d = a . The polynomial equation now reduces to: ( y -1)( y 2 n +1 + 1) = 0. The roots at ± 1 must again be ignored and the eigenvalues of Q are 2 a cos( π (2 k -1) 2 n +1 ) for k ∈ { 1 , · · · n } . Finally we consider the case c = a and e = a and d = 0. The polynomial equation becomes: ( y 2 -1)( y 2 n +1) = 0. Eliminating ± 1 again, we get the eigenvalues 2 a cos( π (2 k -1) 2 n ) for k ∈ { 1 , · · · n } . ## 3. The Roots of the Polynomial in Equation 2.6. Proposition 3.1. If a + e = 0 then $$y _ { \ell } = e ^ { \frac { \pi i \ell } { n } } \text{ for } \ell \in \{ 1, \cdots n - 1 \} \,, \quad y _ { n } = \frac { 1 } { 2 a } \left ( d \tau \pm \sqrt { d ^ { 2 } \tau ^ { 2 } - 4 a ^ { 2 } } \right )$$ Furthermore $$\begin{smallmatrix} 1. & 2 a < d \tau & \text{then} & y _ { n } > 1 \\ 2. & - 2 a \leq d \tau \leq 2 a & \text{then} & | y _ { n } | = 1 \\ 3. & d \tau < - 2 a & \text{then} & y _ { n } < - 1 \end{smallmatrix}$$ $$3. \quad d \tau < - 2 a \quad \text{then} \quad \vec { y } _ { n } < - 1$$ Proof . Equation 2.6 factors to become: $$( y ^ { 2 } - \frac { d \tau } { a } y + 1 ) ( y ^ { n - 1 } - y ^ { - ( n + 1 ) } ) = 0$$ The roots at ± 1 can be discarded because of Lemma 2.3The remaining roots are as stated in the Proposition. Definition 3.2. The symbol φ /lscript means a solution of Equation 2.8 in the interval ( ( /lscript -1) π n , /lscriptπ n ) . The notation y /lscript ≈ L is reserved for: there is κ &gt; 1 such that y /lscript -L = O κ ( -n ) as n tends to ∞ . We will furthermore denote the roots of ay 2 -dτy -e as follows: $$y _ { \pm } \equiv \frac { 1 } { 2 a } \left ( d \tau \pm \sqrt { d ^ { 2 } \tau ^ { 2 } + 4 a e } \right ) = \frac { 1 } { 2 \sqrt { a c } } \left ( d \pm \sqrt { d ^ { 2 } + 4 c e } \right )$$ (We will choose the branch-cut for the root as the positive imaginary axis. So √ x will always have a non-negative real part.) Proposition 3.3. Let -a &lt; e ≤ a and a , c , d , e fixed. Then (not counting simple roots at ± 1 ) for n large enough we have the following solutions of Equation 2.6: $$1. \quad \ a - e < d \tau \quad \colon \ y _ { \ell } & = e ^ { i \phi _ { \ell } } \text{ for } \ell \in \{ 2, \cdots n \} \text{ and } y _ { 1 } \approx y _ { + } > 1 \\ 2. \quad - ( a - e ) \leq d \tau \leq a - e \quad \colon \ y _ { \ell } & = e ^ { i \phi _ { \ell } } \text{ for } \ell \in \{ 1, \cdots n \} \\ 3. \quad \ \ d \tau < - ( a - e ) \quad \ \colon \ y _ { \ell } & = e ^ { i \phi _ { \ell } } \text{ for } \ell \in \{ 1, \cdots n - 1 \} \text{ and } y _ { n } \approx y _ { - } < - 1 \\.$$ /negationslash Proof . In this case sin nφ = 0 and sin φ = 0 in Equation 2.7 does not give any solutions. We are thus allowed to divide by sin nφ = 0 to obtain Equation 2.8. The right hand of that equation consists of n smooth decreasing branches (see Appendix 1) on $$\bigcup _ { \ell = 1 } ^ { n } I _ { \ell } \equ$$ whose ranges are ( -∞ , 1 n ] on I 1 , [ -1 n , ∞ ) on I n , and ( -∞ ∞ , ) in all other cases. The left hand is non-decreasing on [0 , π ]. Thus every interval I /lscript has a root, except possibly the first and the last. In each of the three cases we first solve Equation 2.8 (see Figure 3.1). Then we find any remaining roots by other means. If dτ &gt; a -e (ie in case 1 of the Proposition) then the right hand at φ = 0 of that equation is positive. This means that for n large enough there is no root in the interval I 1 of Equation 2.8. All other intervals I /lscript (ie: /lscript ∈ { 2 , · · · n } contain a root y /lscript = e iφ /lscript . If ay 2 -dτy -e has a root has a root y + with absolute value greater than 1, then by Lemma 8.1 part ii we know that for large n Equation 2.6 has a root exponentially close (as n tends to infinity) to y + (of Definition 3.2). By substituting dτ &gt; a -e in y + one sees that the root is real and greater than 1. (Observe that by Lemma 2.3 this also yields a root exponentially close to the reciprocal of y + and which is not equal to y -.) We thus obtain n roots y /lscript and y + . The other n roots are given by their reciprocals. These combine (by Equation 2.5) to give n eigenvalues. The (simple) roots at ± 1 are discarded by Lemma 2.3. In case 3 we have roots in all I /lscript except in I n . An almost identical argument to the one above now shows that there is a root exponentially close to y -which is real and smaller than -1. In case 2 we have that dτ ≤ a -e and so I 1 contains a root of Equation 2.8, and we have that dτ ≥ -( a -e ) and so the interval I n also contains a root. Thus all non-trivial roots have the form e iφ /lscript . Fig. 3.1 . The three cases of Proposition 3.3: The fast varying (green) plot is the right hand of Equation 2.8, and the slow varying (red) curves represent its right hand side in case 1, 2 , and 3 (from top to bottom). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1145v1-figure-1e1ce1d7-6175-406f-ae7e-859dfb64f389.jpg) Proposition 3.4. Let e &gt; a and a , c , d , e fixed. Then (not counting simple roots at ± 1 ) for n large we have the following solutions of Equation 2.6: $$\cdots \cdots \cdots \cdots \cdots \cdots \\ \cdots$$ Proof . The proof is similar to that of the previous Proposition. There are again three cases (see Figure 3.2). Note that 0 ≤ e -a e + a ≤ 1, so that the slopes of both right hand and left hand of Equation 2.8 are negative. Corollary 7.1 insures that on each branch I /lscript ∈ [0 , π ] $$\cot ( n \phi ) \sin ( \phi ) - \frac { e - a } {$$ So it can only have one zero in each branch. With this proviso, cases 1 and 3 can be resolved as in Proposition 3.3. For example, if the left hand of Equation 2.8 at φ = π is greater than or equal to zero then there for all n is a root in the interval I n but (for n large enough) none in I 1 . This happens if -( a -e ) ≤ dτ , which gives case 1. Case 3 is similar. It remains to analyze case 2. Denote f ( y ) ≡ ay 2 -dτy -e . Since f ( -1), f (0), and f (1) are negative f must have one root greater than 1, and one less than -1. By Lemma 8.1 each of these roots is approximated exponentially well by a root of Equation 2.6. Since furthermore f ( -e a ) and f ( e a ) are greater than 0, the loci of these roots are (for large enough n ), one in (1 , e a ) and one in ( -e a , -1). Fig. 3.2 . The three cases of Proposition 3.4 (1, 2, 3 from top to bottom). See caption of Figure 3.1. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1145v1-figure-25b96455-9713-4187-b004-548d17ef039e.jpg) Proposition 3.5. Let e &lt; -a and a , c , d , e fixed. Then (not counting simple roots at ± 1 ) for n large we have the following solutions of Equation 2.6: $$1. \quad d \tau \leq - ( a - e ) \quad \text{$$ Case 2 can be further subdivided as follows: $$\begin{array} {$$ Proof . Dividing by e + a (which is negative) we see that the three cases in the statement of the Proposition are equivalent to: $$1. \quad & \frac { e - a } { e + a } \leq \frac { d \tau } { e + a } \\ 2. \quad & - \frac { e - a } { e + a } < \frac { d \tau } { e + a } < \frac { e - a } { e + a } \\ 3. \quad & \frac { d \tau } { e + a } \leq \frac { e - a } { e + a } \\ \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon$$ As in the proof of Proposition 3.4, these three cases correspond to Equation 2.8 not having a solution in I 1 (case 1), not having having solutions in both I 1 and I n (case 2), and not having a solution in I n (in case 3). Thus in case 1 we need to determine a solution y 1 of Equation 2.6 that is not on the unit circle. We need a similar solution y n in case 3. In case 2, we need to determine two extra solutions y 1 , y n . Setting f ( y ) ≡ ay 2 -dτy -e it is straightforward to verify the following table of values of f for the three cases mentioned above. e - e ≥ | | dτ ( a e ) | y = a | y = - 1 | y = 0 | y = 1 | | y = a | |-----------|---------------------------------|---------|-----------|---------|---------|------------------|---------| | 1 . | ≤ - - | ≤ 0 | ≤ 0 | > 0 | > 0 | | > 0 > 0 | | 2 a. 2 b. | - ( a - e ) < dτ < - 2 √ | ae | | > 0 | > 0 | > 0 | > 0 | | | | | - 2 √ | ae | < dτ ≤ 2 √ | ae | | > 0 | > 0 | > 0 | > 0 | | > 0 | | 2 c. | 2 √ | ae | ≤ dτ < ( a - e ) | > 0 | > 0 | > 0 | > 0 | f ( dτ 2 a ) ≤ 0 | > 0 | | 3 . | dτ ( a e ) | > 0 | > 0 | > 0 | 0 | | 0 | - ≤ ≤ From this table it is clear that in case 1 f has one real root less than or equal to e a . Similar in case 3 where there is root greater than or equal to -e a . In cases 2a and 2c there are two real valued solutions with absolute value greater than 1. Finally in case 2b the roots of f are complex conjugates with product -e/a . By hypothesis this is greater than 1. So also here f has two roots with absolute value greater than 1. By Lemma 8.1 each of the larger than unity roots of f is approximated exponentially well (in n ) by a root of Equation 2.6. This gives the final result. It perhaps worth pointing out that in the last case it is now not true that Equation 2.8 has at most one solution in each interval I /lscript . See for instance Figure 3.3 where one can see 3 solutions in I 2 . However, for large n , as the above argument shows, it is true that these solutions are unique. A more direct proof of this fact appears complicated. Fig. 3.3 . Detail of case 2b of Proposition 3.5: a = 1, e = -1 05, and . dτ = -1 9. . Here n = 12. The multiple roots in the second branch disappear for large n (while holding other parameters fixed). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1145v1-figure-5bb30c5b-db1d-461a-baf7-a0a0d916d270.jpg) 4. The Spectra. In this section we apply Equation 2.5 of Lemma 2.2 to the propositions of the previous section to obtain the spectrum of the n +1 by n +1 matrix A of Section 1. This gives us our main results. About the associated eigenvectors we remark here that those can be obtained using the same lemma. Note that wherever there is a double root in the polynomial equation equation 2.6 we obtain only one eigenvector. A generalized eigenvector (associated with a Jordan normal block of dimension 2 or higher) can be derived (see Yueh [9] for some examples). Since we are mainly interested in the spectrum we will not pursue this here. Definition 4.1. In this section we will denote, for e = 0, /negationslash $$r _ { \pm } \equiv \frac { 1 } { 2 } \left [ \left ( 1 - \frac { a } { e } \right ) d \pm \left ( 1 + \frac { a } { e } \right ) \sqrt { d ^ { 2 } + 4 c e } \right ].$$ When e = 0, by taking limits as e → 0 we define 2 $$r _ { - } & = d + \frac { a c } { d } \quad \text{if $d<0$} \\ r _ { + } & = d + \frac { a c } { d } \quad \text{if $d>0$}.$$ In this section the symbol ψ /lscript means a solution of Equation 2.8 in the interval [ ( /lscript -1) π n , /lscriptπ n ) (cf Definition 3.2). Theorem 4.2. Let -a ≤ e ≤ a and a , c , d , e fixed. Then for n large enough the n +1 eigenvalues { r i } n i =0 of the matrix A are the following. First, r 0 = b . The other n eigenvalues are: π π $$\{ r _ { i } \} _ { i = 0 } & \text{$0$} \text{ $the matrix $A$ are $the$} \text{$lowowng}. \ r r s t, r _ { 0 } = 0. \ 1 $neq \text{$other$} n $ eigenvalues are $:$} \\ & 1. \quad \quad ( a - e ) \sqrt { \frac { \epsilon } { a } } < d \quad \colon \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \, \ \ell \in \{ 2, \cdots n \}, \ r _ { 1 } \approx r _ { + } > 2 \sqrt { a c } \\ & 2. \ - ( a - e ) \sqrt { \frac { \epsilon } { a } } \leq d \leq ( a - e ) \sqrt { \frac { \epsilon } { a } } \quad \colon \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \, \ \ell \in \{ 1, \cdots n \} \\ & 3. \quad \quad d < - ( a - e ) \sqrt { \frac { \epsilon } { a } } \quad \colon \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \, \ \ell \in \{ 1, \cdots n - 1 \}, \ r _ { n } \approx r _ { - } < - 2 \sqrt { a c } \\ & \text{When} \ a = - e \text{ then} \ \psi _ { \ell } = ( \ell - 1 ) \pi / n, \text{ otherwise $\psi _ { \ell } \in ( ( \ell - 1 ) \frac { \epsilon } { n }, \ell \frac { \epsilon } { n } ) \text{ ( except possibly for $\ell = 1$ and $\ell = n ) }.$$ When a = -e then ψ /lscript = ( /lscript -1) π/n , otherwise ψ /lscript ∈ (( /lscript -1) n , /lscript n ) (except possibly for /lscript = 1 and /lscript = n ). Proof . This follows from applying Proposition 2.2 to Propositions 3.1 and 3.3. We have substituted a/c for τ 2 . r + and r -are obtained by simplifying the expressions for √ ac y ( + + y -1 + ) and √ ac y ( -+ y -1 -), respectively. The next two results follow in the same manner from Propositions 3.4 and 3.5. We omit the proofs since they are easy. Theorem 4.3. Let e &gt; a and a , c , d , e fixed. Then for n large enough the n +1 eigenvalues { r i } n i =0 of the matrix A are the following. First, r 0 = b . The other n eigenvalues are: $$\text{of the matrix A are the Jollowwng. $Prst, $r_{0}=0$. $Line other $n$ eigenvalues are:} \\ 1. \quad - ( a - e ) \sqrt { \frac { c } { a } } \leq d \quad \colon \ r _ { \ell } = 2 \sqrt { a } \cos \psi _ { \ell } \,, \, \ell \in \{ 2, \cdots n \}, \, r _ { 1 } \approx r _ { + } \\ 2. \quad ( a - e ) \sqrt { \frac { c } { a } } < d < - ( a - e ) \sqrt { \frac { c } { a } } \quad \colon \ r _ { \ell } = 2 \sqrt { a } \cos \psi _ { \ell } \,, \, \ell \in \{ 2, \cdots n - 1 \}, \, r _ { 1 } \approx r _ { + }, r _ { n } \approx r _ { - } \\ 3. \quad \ \ \ d \leq ( a - e ) \sqrt { \frac { c } { a } } \quad \colon \ r _ { \ell } = 2 \sqrt { a } \cos \psi _ { \ell } \,, \, \ell \in \{ 1, \cdots n - 1 \}, \, r _ { n } \approx r _ { - } \\ \text{Furthermore we also have that in these cases:}$$ Furthermore we also have that in these cases: $$\text{ermore we aso have that in these cases} \colon \\ & 1. \ \ & r _ { + } \geq \sqrt { a c } \left ( \frac { e } { a } + \frac { a } { e } \right ) \\ & 2. \ \ & r _ { - } \in \left ( - \sqrt { a c } \left ( \frac { e } { a } + \frac { a } { e } \right ), - 2 \sqrt { a c } \right ] \text{ and } r _ { + } \in \left [ 2 \sqrt { a c }, \sqrt { a c } \left ( \frac { e } { a } + \frac { a } { e } \right ) \right ) \\ & 3. \ \ & r _ { - } \leq - \sqrt { a c } \left ( \frac { e } { a } + \frac { a } { e } \right ) \\. \ \ &. \ \ & r _ { - } \. \quad \ \. \quad \. \quad \. \. \. \. \. \.$$ Theorem 4.4. Let e &lt; -a and a , c , d , e fixed. Then for n large enough the n + 1 eigenvalues { r i } n i =0 of the matrix A are the following. First, r 0 = b . The other n eigenvalues are: Furthermore we also have that in these cases: $$\{ r _ { i } \} _ { i = 0 } ^ { \ } o j \, \text{ use matrix A are use to nowowing.} \ r v s l, \, r _ { 0 } = 0. \, \text{ } \text{ } \text{$1neq$ one or $n$ ege n v auses are} \colon \\ 1. \quad \ \ \ d \leq - ( a - e ) \sqrt { \frac { \epsilon } { a } } \quad \colon \, \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \,, \, \ell \in \{ 2, \cdots n \}, \, r _ { 1 } \approx r _ { - } \\ 2. \quad - ( a - e ) \sqrt { \frac { \epsilon } { a } } < d < ( a - e ) \sqrt { \frac { \epsilon } { a } } \quad \colon \, \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \,, \, \ell \in \{ 2, \cdots n - 1 \}, \, r _ { 1 } \approx r _ { + }, r _ { n } \approx r _ { - } \\ 3. \quad \ \ ( a - e ) \sqrt { \frac { \epsilon } { a } } \leq d \quad \colon \, \ r _ { \ell } = 2 \sqrt { a c } \cos \psi _ { \ell } \,, \, \ell \in \{ 1, \cdots n - 1 \}, \, r _ { n } \approx r _ { + } \\ \text{ Furthermore we also have that in these cases} \colon$$ $$r t h e r m o r e \ w e \ a l o s \ \text{have that in these cases} \colon \\ 1. \quad \ \ \ \ \ d \leq - ( a - e ) \sqrt { \frac { \xi } { a } } \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad 2 a. \quad - ( a - e ) \sqrt { \frac { \xi } { a } } < d \leq - 2 \sqrt { | c c | } \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad \quad 2 b. \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \quad \overline { 2 \pi \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \} } \, \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \overline { \overline { \sum _ { i = 1 } } } \, \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \overline { 2 \pi \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \col. \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \colon \, \col. \, \colon \} } \, \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ } \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ } \ \end{array}$$ 2 Note that r + (respectively r -) is not defined if e = 0 and d &lt; 0 (respectively d &gt; 0); careful examination of the cases corresponding to these parameter values shows that the undefined symbols are not used. As an illustration of these ideas we plot the solutions of Equation 2.6 and the spectrum of A in the case where a = c = 1, e = -9 / 4. We take d ∈ { 2 95 . , 3 05 . , 3 3 . } so that (since τ = 1) we are in case 2b, 2c, and 3 respectively of Proposition 3.5 and Theorem 4.4. The results can be found in Figure 4.1. These results are numerical: the first three figures were obtained with the MAPLE 'fsolve' routine, the last three were obtained from the former by applying Equation 2.5 to the roots to get the eigenvalues. We took n = 100. The eigenvalue b of the matrix A is not displayed. Fig. 4.1 . Numerical illustration of the roots of the polynomial (2.6) (top) and the eigenvalues (bottom), for three different parameter values (given in text) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1145v1-figure-14b776fe-f66a-40f4-81f6-93c89501153f.jpg) ## 5. The Decentralized Case. We look at the decentralized case defined in Definition 1.1. Lemma 5.1. In the decentralized case the eigenvalues r ± of Definition 4.1 become $$\underline { a c }$$ $$= - \left ( \frac { a c } { e } + e \right )$$ $$r _ { + } & = a + c \quad \text{and} \quad r _ { - } = - \left ( \frac { a c } { e } + e \right ), \quad \text{if} \ c + e > 0 \\ r _ { + } & = - \left ( \frac { a c } { e } + e \right ) \quad \text{and} \quad r _ { - } = a + c, \quad \text{if} \ c + e < 0$$ Proof. Substituting d = c -e into (4.1) gives r ± = 1 2 [ (1 -a c )( c -e ) ± (1 + a e ) √ ( c + ) e 2 ] , using √ ( c + ) e 2 = | c + e | and simplifying gives the result. Theorem 5.2. Let a , c , d , e fixed so that A is decentralized. Then for n large enough the n + 1 eigenvalues { r i } n i =0 of the matrix A are the following. First, r 0 = a + c . n -2 eigenvalues are r /lscript = 2 √ ac cos ψ /lscript for /lscript ∈ { 2 , · · · n - } 1 where the ψ /lscript are solutions of Equation 2.8. The remaining two eigenvalues ( /lscript = 1 and /lscript = n ) either also satisfy that formula or else are exponentially close (in n ) to the ones given in the table below. In the table we list the domain of e left of the colon, and the appropriate special eigenvalues (if any) right of the colon. | --- | 0 < c < a | c = a | a < c | |-----------|------------------------------------------------------------------------------------|----------------------------------------|--------------------------------------------------------------------| | e < - a | ( -∞ , - a ) : - ( ac e + e ) | ( -∞ , - a ) : - a ( a e + e a ) | ( -∞ , - √ ac ) : { a + c, - ( ac e + e )} [ - √ ac, - a ) : a + c | | | e | ≤ a | [ - a, - √ ac ) : - ( ac e + e ) [ - √ ac, √ ac ] : ∅ ( √ ac, a ] : - ( ac e + e ) | [ - a, a ] : ∅ | [ - a, a ] : a + c | | a < e | ( a, ∞ ) : - ( ac e + e ) | ( a, ∞ ) : { - a ( a e + e a ) , 2 a } | ( a, √ ac ] : a + c ( √ ac, ) : { ( ac e + e ) , a + c } | ∞ - Proof . We need to check in each case of the above table, which case of the appropriate Theorem in Section 4 applies. The result of that process is given in the table below. Each entry is a list of domains for e to the left of the colon together with the subcases of the relevant Theorem (to the right of the colon). Once we know which case applies, we list the appropriate special eigenvalues (if any) specified by those Theorems and Lemma 5.1 and that gives the table in the Theorem. | --- | 0 < c < a | c = a | a < c | |---------------------------|----------------------------------------------------------------------|----------------------|--------------------------------------------------| | e < - a ; Theorem 4 . 4 | ( -∞ , - a ) : 4.4-3 | ( -∞ , - a ) : 4.4-3 | ( -∞ , - √ ac ) : 4.4-2c [ - √ ac, - a ) : 4.4-3 | | | e | ≤ a ; Theorem 4 . 2 | [ - a, - √ ac ) : 4.2-1 [ - √ ac, √ ac ] : 4.2-2 ( √ ac, a ] : 4.2-3 | [ - a, a ] : 4.2-2 | [ - a, a ] : 4.2-1 | | a < e ; Theorem 4 . 3 | ( a, ∞ ) : 4.3-3 | ( a, ∞ ) : 4.3-2 | [ a, √ ac ] : 4.3-1 ( √ ac, ) : 4.3-2 | ∞ The verification of the table in this proof is a tedious process. We will outline how to do that when e &lt; -a . For other values of e the process is very similar. Since A is decentralized we have (Definition 1.1) d = c -e . Recall that a and c are positive. So: $$a > 0, \ \ c > 0, \ \ e < - a < 0, \ \ d = c - e$$ Expanding 0 ≤ ( c + ) e 2 and subtracting 4 ce gives -4 ce ≤ c 2 -2 ce + c 2 = ( c -e ) 2 . As e is negative, taking square roots implies 2 √ c e | | ≤ c -e = d . This implies that conditions for Theorem 4.4 cases 4.4-2c or 4.4-3 must hold. Case 4.4-3 applies if ( a -e ) √ c a ≤ c -e , using c = √ ac √ c a and a √ c a = √ ac , this condition is equivalent to $$- \sqrt { a c } \left ( \sqrt { \frac { c } { a } } - 1 \right ) \leq e \left ( \sqrt { \frac { c } { a } } - 1 \right ).$$ If c &lt; a (corresponding to the first column of the above tables), √ c a -1 &lt; 0 so (5.1) holds if - √ ac ≥ e , so case 4.4-3 holds for all e ≤ -√ ac . However, the appropriate set for e is actually smaller as we already have restricted e to e &lt; -a , and -a &lt; - √ ac (as c &lt; a ). So case 4.4-3 holds for e ∈ -∞ -( , a ). If c &gt; a (corresponding to the third column of the above tables), √ c a -1 &gt; 0 so (5.1) holds if - √ ac ≤ e . This implies that case 4.4-3 holds for e ∈ ( - √ ac, -a ), (which is not vacuous as √ ac &lt; a for a &lt; c ), otherwise case 4.4-2c holds for e ∈ -∞ -( , √ ac ). If c = a (corresponding to the second column of the above tables), (5.1) reduces to 0 ≤ 0 which is true, implying that case 4.4-3 holds for all e ∈ -∞ -( , a ). When translating from the table of conditions to the results for the 'special eigenvalues', note that the case 4.4-3 produces the eigenvalue r + , whose expression depends on the sign of c + . It is straightforward e to show that c + e must be negative if e &lt; -a and c ≤ a (accounting for the first two columns of the above tables), and that c + e is positive if a &lt; c but e ∈ -[ √ ac, -a ) (accounting for the second case in the third column of the tables above). Note that the sign of c + e is not determined for e ∈ ( -∞ - √ , ac ), but this does not affect the eigenvalues in this case as case 4.4-2c produces both r + and r -as special eigenvalues. This finishes the classification of the decentralized spectra when e &lt; -a . The strategy when e ≥ -a is the same. A special case of this result, namely ρ ∈ (0 , 1) and a = 1 -ρ , c = ρ , e = ρ and d = 0, a was proved in [2]. - 6. Applications to Decentralized Systems of Differential Equations. In this section we will take up the asymptotic stability of the consensus (first order) and flocking (second order) given in Equations 1.1 and 1.2. In particular we prove that for both of these systems asymptotic stability does not depend on boundary conditions if these are 'reasonable' (in this case | e | &lt; a ). The first order system has an eigenvalue 0, and the second order system has an eigenvalue 0 of multiplicity at least 2. These eigenvalues are associated with the solutions given in Equation 1.4. The systems are called asymptotically stable if those eigenvalues have multiplicities exactly 1 and 2, respectively, and if all other eigenvalues have negative real part. Corollary 6.1. Let a , c , d , e fixed, and so that A is decentralized. Then for n large enough the system in Equation 1.1 is asymptotically stable if a + e &gt; 0 , and asymptotically unstable if a + e &lt; 0 and c + e = 0 . Proof . The n + 1 eigenvalues of L associated with this systems are obtained by subtracting a + c from those given by Theorem 5.2. One eigenvalue equals 0. Most other eigenvalues are given by /negationslash 2 √ ac cos ψ /lscript -( a + ) c &lt; 0. There are at most 2 eigenvalues left and they are exponentially close to 0 or to -ac e -e -a -c = -( a + )( + ) e c e e . When a + e &lt; 0 and c + e = 0 then we must have e &lt; -a , and so are among the cases in the top row of the table in Theorem 5.2. If c + e &lt; 0, then the (approximate) eigenvalue -( a + )( + ) e c e e (which always appears in these cases) is greater than 0, implying asymptotic instability. If c + e &gt; 0, then the parameters satisfy a &lt; | e | &lt; c , so we are in the cases (top right of table in theorem 5.2) where a + c is an approximate eigenvalue of A . Then as a + e &lt; 0, Corollary 8.3 implies that the actual eigenvalue of A that a + c approximates is greater than a + , implying that there is a positive eigenvalue for c L . /negationslash When a + e &gt; 0 the approximate eigenvalue -( a + )( + ) e c e e (if it occurs) is less than zero. This can be seen by noting that -( a + )( + ) e c e e &gt; 0 only if c + e and e have opposite signs, i.e. if e &lt; 0 and | e | &lt; c . Looking at the table in Theorem 5.2, this is only possible for cases in the middle row. The only such case where -( a + )( + ) e c e e is implied as an eigenvalue of L is when e ∈ -[ a, - √ ac ] and c &lt; a , but we cannot have e ∈ -[ a, - √ ac ] as | e | &lt; c &lt; √ ac . The only other potential cause of instability is the eigenvalue of L that is asymptotically equal to 0, however if a + e &gt; 0 Corollary 8.3 implies that the this eigenvalue is actually slightly less than 0. A special case of the following result was first proved in [5] Corollary 6.2. Let a , c , d , e fixed, and so that A is decentralized. In order for the second order system of Equation 1.2 to be asymptotically stable, α and β must be negative. If α and β are positive then for n large enough the system is asymptotically stable if a + e &gt; 0 and asymptotically unstable if a + e &lt; 0 and c + e = 0 . If α or β are positive, the system is unstable. Proof . The eigenvalue equation for second order system can be written as follows: /negationslash $$\left ( \begin{array} { c } \dot { z } \\ \ddot { z } \end{array} \right ) = \left ( \begin{array} { c c } 0 & I \\ - \alpha L & - \beta L \end{array} \right ) \left ( \begin{array} { c } z \\ \dot { z } \end{array} \right ) = \left ( \begin{array} { c } \nu z \\ \nu \dot { z } \end{array} \right )$$ The second equality yields 2 equations. The first of these is that ˙ z = νz . Suppose λ is an eigenvalue of -L . Each eigenvalue λ gives rise to two eigenvalues ν ± , because if we substitute it and ˙ z = νz into the second of the above equations, we see that $$( \nu ^ { 2 } - \beta \lambda \nu - \alpha ) z = 0 \ \Rightarrow \ \nu _ { \pm } = \frac { 1 } { 2 } \left ( \beta \lambda \pm \sqrt { \beta ^ { 2 } \lambda ^ { 2 } + 4 \alpha \lambda } \right )$$ Corollary 6.1 says that in all cases there are negative λ . Thus both α and β must be positive if the system is stable. Assuming that α and β are positive, we have stability precisely in those cases where Corollary 6.1 insures stability for the first order system. /negationslash A few observations are in order here. Asymptotic stability is not the whole story. In fact as n becomes large, even for asymptotically stable systems the transients in Equations 1.1 and 1.2 may grow exponentially in n . This is due to the fact the eigenvectors are not normal and a dramatic example of this was given in [7]. Here we can see it expressed in the form of the eigenvectors given by Equation 2.5 of Lemma 2.2: if τ = 1 the eigenvectors have an exponential behavior. When τ is small a long time will pass before a change in the velocity of the leader is felt at the back of the flock, and so coherence will be lost. On the other hand when τ is large a change will immediately amplify exponentially towards the back of the flock. These observations have been proved for e = 1 2 and / d = 0 by [5]. But to address that problem in more generality, different concepts are needed. In [1], assuming some conjectures, we show that this phenomenon indeed appears to be independent of the boundary conditions ( e and d ). In that paper we also show that the behavior of the system 1.2 can be substantially improved if the position Laplacian and the velocity Laplacian are allowed to be different. ## 7. Appendix 1. We note that for all positive integers n : $$n \left | \text{Im} ( e ^ { i \phi } ) \right | \geq \left | \text{Im} ( e ^ { i n \phi } ) \right | \\ ( \phi ) = 0. \text{ This immediately implic}.$$ and equality holds if and only if sin( φ ) = 0. This immediately implies that $$\forall \, \phi \in ( 0, \pi ) n \sin \phi > & \sin n \phi \\ \forall \, \lambda \, \varepsilon \, l _ { - \pi } \, \partial \nolimits _ { n } \sin \lambda > & \sin n \lambda$$ $$\forall \, \phi \in ( - \pi, 0 ) n \sin \phi < \sin n \phi$$ Corollary 7.1. For all B ( , 1] and all positive integers n we have that The following stronger result is also a consequence of this: ∈ -∞ $$\forall \, \phi \in ( 0, \pi ) \frac { \partial } { \partial \phi } \left ( \cot n \phi \sin \phi - B \cos \phi \right ) > 0$$ $$\forall \, \phi \in ( - \pi, 0 ) \frac { \stackrel { \cdot } { \partial } } { \partial \phi } \left ( \cot n \phi \sin \phi - B \cos \phi \right ) < 0$$ Proof . It is sufficient to prove the first case. So let φ ∈ (0 , π ). $$\text{$P$root}. \text{ It is sufficient to prove the $nr$st case. $So let $\phi \in (U,\pi$} ) \\ \frac { \partial } { \partial \phi } \left ( \cot n \phi \sin \phi - B \cos \phi \right ) & = \frac { \cos \phi \cos n \phi \sin n \phi - n \sin \phi + B \sin \phi \sin n \phi \sin n \phi } { ( \sin n \phi ) ^ { 2 } } \\ & \leq \frac { ( \cos \phi \cos n \phi + \sin \phi \sin n \phi ) \sin n \phi - n \sin \phi } { ( \sin n \phi ) ^ { 2 } } \\ & = \frac { \cos ( n - 1 ) \phi \sin \phi } { ( \sin n \phi ) ^ { 2 } } \\ & \leq \frac { \sin n \phi - n \sin \phi } { ( \sin n \phi ) ^ { 2 } } < 0 \\ \text{The inequalities hold wherever $n\phi \neq 0$}. \, \text{$\Delta$}$$ The inequalities hold wherever sin nφ = 0. It follows that the function cot nφ sin φ is decreasing on (0 , π ) (wherever it is defined) and each branch intersects the function A + B cos φ at most once as long as B ∈ ( -∞ , 1]. In fact Proposition 3.5 shows that the same is true for every given B as long as n is large enough . But a direct proof seems hard. /negationslash - 8. Appendix 2. The results in this paper are based on the roots of the polynomial ( ay 2 -dτy -e y ) 2 n + ( ey 2 + dτy -a ), from equation (2.6). The following results show how at least one root is asymptotically close to a root of ay 2 -dτy -e = 0. /negationslash Below, let F t ( z ) = p z z ( ) m + tq ( z ) where p , and q are polynomials of degree 2 such that p has a simple root at z 0 with | z 0 | = r &gt; 1 and q z ( 0 ) = 0. Proof . For K &gt; 0 to be determined later, let Lemma 8.1. For m large enough there is a root z 1 of F 1 given above and a positive constant K such that | z 1 -z 0 | ≤ Kr -m . $$B _ { m } \equiv \left \{ z \, | \, | z - z _ { 0 } | \leq K r ^ { - m } \right \}$$ There are positive constants A B C D , , , , and /epsilon1 such that for all z ∈ B m we have that for m large enough $$| q ^ { \prime } ( z ) | \leq A \text{ and } | p ^ { \prime } ( z ) | \geq B + \epsilon \text{ and } | p ( z ) | \leq C r ^ { - m } \text{ and } | q ( z ) | \leq D.$$ Note that z 0 is a root of F 0 . As ∂F t ( z ) ∂z = p ′ ( z z ) m + ( ) p z mz m -1 + tq ′ ( z ), we have $$\left | \frac { \partial F _ { t } ( z ) } { \partial z } \right | \geq | z | ^ { m } ( B + \epsilon ) - | z | ^ { m - 1 } m C r ^ { - m } - A \\ \left | \leq K r ^ { - m } + r, \text{ which holds for } z \in B _ { m }, \text{ shows}$$ Using r -Kr -m ≤ | z | ≤ Kr -m + , which holds for r z ∈ B m , shows $$\left | \frac { \partial F _ { t } ( z ) } { \partial z } \right | \geq ( r - K r ^ { - m } ) ^ { m } ( B + \epsilon ) - \frac { 1 } { r } ( 1 + K r ^ { - m - 1 } ) ^ { m - 1 } m C - A \\, \, & \text{this shows that } \left | \frac { \partial F _ { t } ( z ) } { A _ { x } } \right | > ( r - K r ^ { - m } ) ^ { m } B \text{ for sufficiently large } m, \, \text{provided } z \in B _ { m }.$$ ∣ ∣ In particular, ( ∂F t ( z ) ∂z ) -1 exists, so the implicit function theorem implies that there is a root z t of F t with z t =0 = z 0 and that satisfies: As r &gt; 1, this shows that ∣ ∣ ∂F t ( z ) ∂z ∣ ∣ &gt; r ( -Kr -m m ) B for sufficiently large m , provided z ∈ B m . $$\frac { \partial z _ { t } } { \partial t } = - \frac { \frac { \partial F _ { t } ( z ) } { \partial t } } { \frac { \partial F _ { t } ( z ) } { \partial z } } = \frac { - q } { \frac { \partial F _ { t } ( z ) } { \partial z } }$$ As long as z t in B m we have, using the bounds on q and ∂F t ( z ) ∂z , $$\left | \frac { \partial z _ { t } } { \partial t } \right | & \leq \frac { D } { B } \, \left ( r - K r ^ { - m } \right ) ^ { - m } \leq \frac { 2 D } { B } \, r ^ { - m }, \\ \cdot \quad \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cd� \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdclots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \ddots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \quad \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \ \cdot \quad \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots\, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots\, \cd: \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \. \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \colon \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cd: \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdot \quad \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \ddots \, \cd: \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots\, \cdots \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots\, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdot\quad \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \cdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd$$ Corollary 8.2. In the above Lemma, let p z ( ) = az 2 -dτz -e and suppose p has two real roots µ and ν such that ν = z 0 satisfies | ν | &gt; 1 , and ν &gt; µ . Suppose furthermore that q z ( ) = -z 2 p z ( -1 ) . For m large enough there is a root z 1 of F 1 given above and a positive constant K such that | z 1 -z 0 | ≤ Kr -m . Moreover provided a + e = 0 we have ∣ ∣ where the second inequality will hold for sufficiently large m . Thus | z t -z 0 | is bounded by ∣ ∣ ∫ ∣ t 0 ∂z t ∂t dt ∣ ∣ ∣ ≤ ∫ t 0 ∣ ∣ ∂z t ∂t ∣ ∣ dt ≤ t 2 D r B -m . If K is taken equal to 2 D B , this ensures that z t ∈ B m , letting t equal 1 then gives the desired result. /negationslash $$\text{sgn} ( z _ { 1 } - z _ { 0 } ) = - \text{sgn} ( a + e )$$ /negationslash Proof . Note that a + e = 0 implies that p z ( -1 0 ) = 0. The first part of the corollary now of course follows from Lemma 8.1. So it suffices to determine /negationslash $$\text{sgn} ( z _ { 1 } - z _ { 0 } ) = \text{sgn} \left ( \frac { \partial z _ { t } } { \partial t } \right )$$ where z 0 = ν . According to the proof of the last lemma, for m is big enough, we may take into account only the leading term, and so since ν &gt; 1 we get: $$\text{sgn} ( z _ { 1 } - z _ { 0 } ) = \text{sgn} \left ( \frac { - q } { ( z p ^ { \prime } + m p ) z ^ { m - 1 } + t q ^ { \prime } } \right ) = \text{sgn} \left ( \frac { \nu ^ { 2 } p ( \nu ^ { - 1 } ) } { p ^ { \prime } ( \nu ) \nu ^ { m } } \right ) = \text{sgn} \left ( \frac { p ( \nu ^ { - 1 } ) } { p ^ { \prime } ( \nu ) } \right )$$ Finally $$\ s g n \left ( \frac { p ( \nu ^ { - 1 } ) } { p ^ { \prime } ( \nu ) } \right ) = \ s g n \left ( \frac { ( \nu ^ { - 1 } - \nu ) ( 1 - \nu \mu ) } { \nu - \mu } \right ) = \ s g n \left ( \frac { ( 1 - \nu ^ { 2 } ) ( 1 + \frac { e } { a } ) } { \nu - \mu } \right ) = - \ s g n ( a + e ) \\ \dots \quad. \quad. \quad. \quad.$$ which proves the result. Corollary 8.3. Under the conditions of Corollary 8.2, the eigenvalue expressions r 0 = √ ac z ( 0 + z -1 0 ) and r 1 = √ ac z ( 1 + z -1 1 ) satisfy $$\text{sgn} ( r _ { 1 } - r _ { 0 } ) = - \text{sgn} ( a + e )$$ Proof . This follows immediately as the function f ( x ) = √ ac x ( + x -1 ) is increasing for | x | &gt; 1, and because | z 0 | &gt; 1. ## REFERENCES - [1] C. E. Cantos and J. J. P. Veerman , Transients in the synchronization of oscillator arrays , Submitted. - [2] C. M. da Fonseca and J. J. P. Veerman , On the spectra of certain directed paths , Applied Mathematics Letters, 22 (2009), pp. 1351-1355. - [3] J. F. Elliott , The characteristic roots of certain real symmetric matrices , master's thesis, University of Tennessee, 1953. - [4] Said Kouachi , Eigenvalues and eigenvectors of tridiagonal matrices , Electronic Journal of Linear Algebra, 15 (2006), pp. 155-133. - [5] F. M. Tangerman, J. J. P. Veerman, and B. D. Stosic , Asymmetric decentralized flocks , Trans Autom Contr, 57 (2012), pp. 2844-2854. - [6] J.J.P. Veerman, J.S. Caughman, G. Lafferriere, and A. Williams , Flocks and formation , J. Stat. Phys., 121 (2005), pp. 901-936. - [7] J. J. P. Veerman , Symmetry and stability of homogeneous flocks (a position paper) , in Proc 1st Int'l Conf on Pervasive and Embedded Computing and Communication Systems, Algarve, 2010. - [8] Allan R. Willms , Eigenvalues of certain tridiagonal matrices , SIAM Journal on Matrix Analysis and Applications, 30 (2008), pp. 639-656. - [9] W.-C. Yueh , Eigenvalues of several tridiagonal matrices , Applied Mathematics E-Notes, 5 (2005), pp. 66-74.
null
[ "J. J. P. Veerman", "David K. Hammond" ]
2014-08-05T23:45:20+00:00
2014-08-05T23:45:20+00:00
[ "math.CA", "15A18" ]
Tridiagonal Matrices and Boundary Conditions
We describe the spectra of certain tridiagonal matrices arising from differential equations commonly used for modeling flocking behavior. In particular we consider systems resulting from allowing an arbitrary boundary condition for the end of a one dimensional flock. We apply our results to demonstrate how asymptotic stability for consensus and flocking systems depends on the imposed boundary condition.
1408.1146v1
## Review and Recent Advances in PIC Modeling of Relativistic Beams and Plasmas Brendan B. Godfrey 1, 2, a) 1 University of Maryland, College Park, MD 20742, USA 2 Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA a) Corresponding author: [email protected] Abstract. Particle-in-Cell (PIC) simulation codes have wide applicability to first-principles modeling of multidimensional nonlinear plasma phenomena, including wake-field accelerators. This review addresses both finite difference and pseudo-spectral PIC algorithms, including numerical instability suppression and generalizations of the spectral field solver. ## INTRODUCTION AND SUMMARY Particle-in-Cell (PIC) simulation codes solve the Vlasov equation by following hundreds of thousands of particles and their associated electromagnetic fields as they evolve in time: Particles are advanced a time-step based on the fields, and then the fields are advanced a time-step based on the currents generated by the particles. This simple process is repeated thousands to millions of times to simulate complex, nonlinear, multidimensional plasma phenomena. Fields are evaluated either on a spatial mesh (FDTD - finite difference time domain) or as a set of spatial Fourier modes (PSTD - pseudo-spectral time domain). Particles, on the other hand, are distributed at arbitrary positions across the mesh, requiring interpolation between fields and particles. PIC codes with explicit temporal algorithms are inherently numerically unstable, and successfully employing them requires increasing numerical instability growth times until they are much longer that the relevant time scales of the physical phenomena simulated. Explicit vacuum field solvers themselves impose Courant limits, ∆𝑡𝑡 &lt; 𝛼𝛼 ∆𝑥𝑥 , with ∆𝑥𝑥 the characteristic dimension of a mesh cell and 𝛼𝛼 a numerical factor typically somewhat less than one. PIC methods are discussed in detail in the textbook by Birdsall and Langdon. 1 Even with the Courant limit satisfied, explicit PIC codes are unstable due to field-particle interpolation coupled with disparities between the Eulerian field solver and Lagrangian particle pusher. Dispersion relations for numerical instabilities can be derived much as they are for physical instabilities and now exist for multi-dimension relativistic beam (or stationary plasma simulated in a relativistically translating frame) simulations. Solutions of numerical dispersion relations indicate that the numerical Cherenkov instability is particularly serious for relativistic beams or plasmas but also suggest various ways to ameliorate it. Several mitigation techniques that involve short wavelength digital filtering combined with minor modifications to the interpolation process have been demonstrated to work well in practice, effectively controlling numerical instabilities in most instances. This year, generalizations of the PSTD algorithm have been developed that provide variable Courant limits and other flexibilities. The utility of these generalizations currently is being investigated. Some of the techniques developed to ameliorate the numerical Cherenkov instability for the usual PSTD algorithm also work well for these generalized algorithms. ## BRIEF INTRODUCTION TO PIC SIMULATONS The particle equations of motion in a PIC code can be represented as $$\frac { d x } { d t } = \nu, \quad \frac { d \gamma v } { d t } = \sum _ { n, l } ( E _ { l } ^ { n } + \nu \times B _ { l } ^ { n } ) W ( x - x _ { l } ) \, \delta ( t - n \Delta t )$$ The electric and magnetic fields, E and B , are defined on a spatial grid {𝒙𝒙 } 𝑙𝑙 and interpolated to the particle position x by means of interpolation functions W , typically products of splines. W need not be, and often is not, the same for each field component. v is the particle velocity, and 𝛾𝛾 = 1/√1 - 𝑣𝑣 2 ; n is the time step index. Eq. (1) can, of course, be integrated immediately to yield the standard leap-frog recurrence relation for x at integer times and v at half-integer times. However, as written, Eq. (1) emphasizes the similarity between real particles and numerical particles, and also leads naturally to the numerical dispersion relation illustrated in the next section. Currents, needed to advance the fields, can be expressed as grid quantities, $$J _ { l } ^ { n + \S _ { l } } = \sum _ { p } \nu \, V ( x - x _ { l } ) \, | _ { t = ( n + \S _ { l } ) \Delta t }$$ summed over particles. V is another interpolation function. Eq. (2) does not conserve charge without correction, which involves solving Poisson's equation on the grid. The modestly more complicated current algorithm 1 developed by Esirkepov avoids this issue. 2 Typically, fields are defined on Yee's FDTD mesh, 3 shown in Fig. 1. Magnetic fields, offset one-half time-step, are averaged in time to obtain values at integer times for Eq. (1). The difference equations are lengthy but straightforward. For instance, in 1D the transverse field equations take the form, $$E _ { l } ^ { n + 1 } = E _ { l } ^ { n } - \left ( B _ { l + \Sigma _ { 2 } } ^ { n + \Sigma _ { 2 } } - B _ { l - \Sigma _ { 2 } } ^ { n + \Sigma _ { 2 } } \right ) \frac { \Delta t } { \Delta x } - J _ { l } ^ { n + \Sigma _ { 2 } } \Delta t \quad ( 3 )$$ $$B _ { l + \psi _ { 2 } } ^ { n + \psi _ { 2 } } = B _ { l + \psi _ { 2 } } ^ { n - \psi _ { 2 } } - ( E _ { l + 1 } ^ { n } - E _ { l } ^ { n } ) \frac { \Delta t } { \Delta x } \quad \quad ( 4 )$$ Staggered in space and time, the Yee field algorithm is second-order accurate in both. More complex expressions for Eq. (4) can reduce numerical dispersion. 4, 5, 6, 7 Alternatively, fields can be evaluated as a set of modes in Fourier space, an algorithm known as PSTD. Difference 8 equations for the mode amplitudes are given by $$E ^ { n + 1 } = E ^ { n } - i k \times B ^ { n + \forall _ { 2 } } \Delta t - J _ { k } ^ { n + \forall _ { 2 } } \Delta t \quad \ \ ( 5 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ $$B ^ { n + 1 / 2 } = B ^ { n - 1 / 2 } + i k \times E ^ { n } \Delta t$$ Eq. (1) and (2) require fields and produce currents in real, not Fourier, space. Consequently, Fourier transforms of both fields and currents are required at each time step, which can be expensive. The fields and currents in real space typically are located at mesh corners, with B and J offset a half time Figure 1. Yee's staggered mesh. Magnetic fields and currents are offset one-half time step. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-1a1463c4-4aef-452f-a60b-d02b5d7da311.jpg) step from E . Fields are exact in space (for the Fourier modes computed) and second-order accurate in time. A variant on PSTD, the Pseudo-Spectral Analytical Time Domain (PSATD) algorithm, was developed by Haber, et. al. some four decades ago. 9, 10 It can be derived by analytically integrating Maxwell's equations over a time step with the current held constant. Thus, it is exact for constant current. The resulting difference equations are $$E ^ { n + 1 } = E ^ { n } - 2 i S _ { h } k \times \frac { B ^ { n + \tilde { \Sigma } _ { 2 } } } { k } - \frac { 2 S _ { h } C _ { h } J ^ { n + \tilde { \Sigma } _ { 2 } } } { k } + \frac { 2 S _ { h } C _ { h } } { k } k k \cdot \frac { J ^ { n + \tilde { \Sigma } _ { 2 } } } { k ^ { 2 } } - k k \cdot \frac { J ^ { n + \tilde { \Sigma } _ { 2 } } \partial \tau } { k ^ { 2 } }$$ $$B ^ { n + \Sigma } = B ^ { n - \Sigma } + 2 i S _ { h } k \times E ^ { n } \Delta t$$ with 𝑆𝑆 ℎ = sin 𝑘𝑘𝛥𝛥𝑑𝑑 2 , 𝐶𝐶 ℎ = cos 𝑘𝑘𝛥𝛥𝑑𝑑 2 , and 𝑩𝑩 𝑛𝑛 = (𝑩𝑩 𝑛𝑛+½ +𝑩𝑩 𝑛𝑛-½ )/2𝐶𝐶ℎ . 11 It has many desirable properties but, like PSTD, requires Fourier transforms of the fields and currents at every time step. Advancing the fields multiple times per particle time step ( i.e.,  𝑡𝑡 𝑓𝑓𝑓𝑓𝑓𝑓𝑙𝑙𝑑𝑑 =  𝑡𝑡 𝑝𝑝𝑝𝑝𝑝𝑝𝑑𝑑 /𝑁𝑁 ) sometimes is advantageous. Sub-cycling the fields is numerically straightforward, of course. Sub-cycling can be treated analytically by casting the 𝑁𝑁 = 1 difference equations for any algorithm into the form, 𝐹𝐹 𝑛𝑛+1 = 𝑀𝑀: 𝐹𝐹 𝑛𝑛 +𝑆𝑆 𝑛𝑛+½ , where F is a vector of fields, S a vector involving source terms, and M a matrix of difference terms. The corresponding expression for any N easily is shown to be 𝐹𝐹 𝑛𝑛+1 = 𝑀𝑀 𝑁𝑁 : 𝐹𝐹 𝑛𝑛 +∑ 𝑁𝑁-1 𝑀𝑀 𝑓𝑓 𝑓𝑓=0 : 𝑆𝑆 . The sum can be performed explicitly to yield the convenient $$F ^ { n + 1 } = M ^ { N } \colon F ^ { n } + ( M - I ) ^ { - 1 } \colon ( M ^ { N } - I ) \colon S$$ This analysis has been carried out for PSTD, 12 although the result is too lengthy to be presented here. The vacuum dispersion relation is, however, both short and interesting. $$\sin ^ { 2 } \left ( \frac { \omega \, \Delta t } { 2 } \right ) - \sin ^ { 2 } \left ( \frac { \theta \, \Delta t } { 2 } \right ) = 0 \quad \quad ( 1 0 ) \quad \omega \, \Delta t / 1 \\ \quad \ \ 1 \, \theta \, \L.$$ with sin � 𝜃𝜃 Δt 2 𝑁𝑁 � = 𝑘𝑘 Δt 2 𝑁𝑁 . (From here onward, Δt represents the particle time step.) Eq. (10) solutions for 𝑁𝑁 = 1, 2, 3, 4, 6, ∞ are shown in Fig. 2. Of the many solution branches, only those observed by the particles, |𝜔𝜔| &lt; 𝜋𝜋/Δt , are plotted. The red 𝑁𝑁 = 1 curve corresponds to PSTD, and the black 𝑁𝑁 = ∞ curve to PSATD. 10 Indeed, the complete PSATD dispersion relation can be obtained from that of PSTD in the 𝑁𝑁 → ∞ limit. 12 Eq. (10) has no real solutions for  (𝑘𝑘) when 𝑘𝑘 Δt 2 𝑁𝑁 &gt; 1 . More generally, electromagnetic numerical dispersion relations take the form ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-f9b864b6-4f61-4dab-ab5d-6885b76afb97.jpg) $$\sin \frac { \omega \Delta t } { 2 N } = f ( \Delta x _ { i } ) \, \frac { \Delta t } { 2 N } \, \quad \quad \ \ ( 1 1 ) \quad \text{Figu}$$ Figure 2. EM vacuum dispersion for N = 1 -4, 6, ∞ . with the function of the cell dimensions depending on the details of the field solver. Because the left side of Eq. f (11) cannot exceed unity for real  , 𝛥𝛥 t is constrained to be less than 2𝑁𝑁/𝑓𝑓 𝑚𝑚𝑝𝑝𝑥𝑥 , with f max the maximum value of on f the grid. ( almost always assumes its maximum value on the grid boundary.) Samples of this constraint, known as f the Courant limit, are for 1 𝛥𝛥𝑥𝑥 𝑓𝑓 equal and grid dimension d , - · PSATD | • PSTD | 𝛥𝛥𝑡𝑡 𝑚𝑚𝑝𝑝𝑥𝑥 /∆𝑥𝑥 = 2𝑁𝑁/𝜋𝜋√𝑑𝑑 | {0.63, 0.45, 0.36}N for {d=1, 2, 3} | |--------------|--------------------------------|---------------------------------------| | • FDTD (Yee) | 𝛥𝛥𝑡𝑡 𝑚𝑚𝑝𝑝𝑥𝑥 /∆𝑥𝑥 = 𝑁𝑁/√𝑑𝑑 | {1.00, 0.70, 0.57}N for {d=1, 2, 3} | | • FDTD (C-K) | 𝛥𝛥𝑡𝑡 𝑚𝑚𝑝𝑝𝑥𝑥 /∆𝑥𝑥 = 𝑁𝑁 | {1.00, 1.00, 1.00}N for {d=1, 2, 3} | no limit However, as apparent from Fig. 2, electromagnetic dispersion as seen by the particles becomes distorted for 𝛥𝛥 /∆𝑥𝑥 &gt; 1/√𝑑𝑑 t (more or less). It is prudent to introduce a degree of digital filtering for 𝛥𝛥 /∆𝑥𝑥 t significantly larger than this. The various numerical approximations inherent in PIC codes introduce a degree of inaccuracy. For instance, the much smaller number of particles per cell in a simulation as compared to a real plasma can introduce significant numerical noise. Moreover, simulations are only second order accurate in time and, for FDTD at least, in space too. This translates to errors of order (𝜔𝜔𝛥𝛥 ) t 2 and (𝑘𝑘𝛥𝛥x) 2 , with 𝜔𝜔 and k the frequencies and wavenumbers of physical interest. Particles support more wavenumbers than fields do, because particles are distributed across the computational grid, whereas fields are evaluated at discrete points on the grid. This leads to numerical coupling among aliases, 𝑘𝑘 𝑃𝑃 = (𝑘𝑘 𝐹𝐹 +2𝜋𝜋𝜋𝜋/∆𝑥𝑥) for integer m . A second mismatch between particles and fields is this: The particle pusher is Lagrangian, and the field solver is Eulerian. This, too, can lead to spurious modes and aliases. Both drive numerical instabilities. ## BRIEF INTRODUCTION TO PIC NUMERICAL STABILITY ANALYSIS Derivation of the linear dispersion relation for a simulation plasma parallels the derivation for a real plasma, although the calculation and resulting expression usually are more complicated. 13 First, the Vlasov equation based on Eq. (1) is linearized to obtain $$\frac { \partial f } { \partial t } + v \cdot \frac { \partial f } { \partial x } = - \frac { \partial f ^ { \theta } } { \partial p } \cdot \sum _ { n, l } ( E _ { l } ^ { n } + v \times B _ { l } ^ { n } ) W ( x - x _ { l } ) \, \delta ( t - n \Delta t )$$ Then, the linearized Vlasov equation is Fourier transformed in space and time, $$f & = i \frac { \partial f ^ { 0 } } { \partial p } \cdot \frac { ( E _ { k } ^ { \omega } + v \times B _ { k } ^ { \omega } ) W _ { - k } ^ { \prime } } { \omega ^ { \prime } - k ^ { \prime } \cdot v }$$ where 𝜔𝜔 ′ = 𝜔𝜔 + 𝑛𝑛 2𝜋𝜋 ∆𝑑𝑑 and 𝒌𝒌 ′ = 𝒌𝒌 + 𝒎𝒎 2𝜋𝜋 ∆𝒙𝒙 are particle aliases of the field modes, as explained at the end of the previous section. Similarly, Eq. (2) is Fourier transformed to obtain $$J _ { k } ^ { \omega } & = i \int d ^ { 3 } v \, v \, \frac { \partial f ^ { 0 } } { \partial p } \cdot \sum _ { n, m } ( - 1 ) ^ { n } \frac { V _ { k ^ { \prime } } ( E _ { k } ^ { \omega } + v \times B _ { k } ^ { \omega } ) W _ { - k ^ { \prime } } } { \omega ^ { \prime } - k ^ { \prime } \psi }$$ The factor (-1) 𝑛𝑛 occurs, because currents are defined at half-integer time steps. 13 The charge density, defined at integer time steps, does not contain this factor. $$\rho _ { k } ^ { \omega } = i \int d ^ { 3 } \nu \, \frac { \partial f ^ { 0 } } { \partial p } \cdot \sum _ { n, m } \frac { V _ { k ^ { \prime } } \left ( E _ { k } ^ { \omega } + \nu \times B _ { k } ^ { \omega } \right ) W _ { - k ^ { \prime } } } { \omega ^ { \prime } - k ^ { \prime } \cdot \nu }$$ As mentioned earlier, J as defined in Eq (2) does not conserve charge and, therefore, must be corrected in order that Gauss' law remain satisfied. The process, which requires  , is described in Ref. 1, 11, and elsewhere. The more complicated Esirkepov algorithm 2 is to be preferred, because it obviates the need for computing  , and correcting the current at each time step. Also, numerical instability growth rates typically are modestly smaller for the Esirkepov algorithm. 14 (See Eq. (7) and associated text in Ref. 14 for the term replacing ' v ' in Eq. (14) of this article.) Finally, the current is substituted into the Fourier-transformed finite difference field equations described in the previous section to obtain a dispersion matrix. Its determinant is the desired dispersion relation. A cursory examination of Eq. (14) reveals several potential sources of numerical instability. The denominator contains an infinite family of nonphysical resonances, 𝜔𝜔 ′ -𝑘𝑘 ′ ∙ 𝒗𝒗 ( 𝒎𝒎 ≠ 0 ) that can couple unstably with physical resonances and, depending on the form of 𝑓𝑓 0 , with one another. Moreover, the coefficient of the resonance, 𝑉𝑉 𝒌𝒌 ′ 𝑊𝑊 -𝒌𝒌 ′ , may have the wrong sign, triggering 'Landau growth' instead of damping (for instance), again depending on the form of 𝑓𝑓 0 . Although perhaps not immediately obvious from Eq. (14), the numerator, 𝑬𝑬 𝑘𝑘 𝜔𝜔 +𝒗𝒗 × 𝑩𝑩 𝒌𝒌  , contains a term qualitatively of the form, sin(𝜔𝜔∆𝑑𝑑/2) ∆𝑑𝑑/2 -sin(𝑘𝑘∆𝑥𝑥/2) ∆𝑥𝑥/2 𝑣𝑣 , which should cancel with the 𝑛𝑛 = 𝒎𝒎 = 0 resonance in the denominator, 𝜔𝜔 - 𝑘𝑘 ∙ 𝒗𝒗 , but does so only in the limit of vanishing time step and cell size. This spurious, predominantly transverse mode (and its aliases) should not be confused with the physical, predominantly longitudinal mode (and its aliases). For a relativistic beam, the former scales as 𝜔𝜔 𝑝𝑝 , while the latter scales as 𝜔𝜔 𝑝𝑝 /𝛾𝛾 . (Here, the beam plasma frequency, 𝜔𝜔 𝑝𝑝 , is defined to contain a factor of 𝛾𝛾 -½ .) It, too, can couple unstably with physical resonances. Finally, violating the Courant limit causes strong instability. Note that finite plasma density makes the Courant limit slightly more restrictive and sometimes even causes weak, narrow band instabilities near 𝜔𝜔 = ±2𝜋𝜋/∆𝑡𝑡 ; see Fig. 2. 1, 11 Several methods are employed to minimize PIC numerical instabilities. Because numerical instabilities usually occur at wavelengths of two to four cells, they can be suppressed by digitally filtering those wavelengths. This is easy for PSTD: Just set the highk current modes to zero. More or less equivalently, set to zero the highk field modes when interpolating them to the particles. The corresponding approach for FDTD, repeatedly smoothing short wavelength current and field fluctuation by means of a (¼,½,¼) stencil, does not produce a sharp cutoff but still is useful. 15 Employing higher order interpolation functions also is helpful. Except at small 𝑘𝑘′ , 𝑉𝑉 𝑘𝑘 ′ 𝑊𝑊-𝑘𝑘 ′ varies as 𝑘𝑘′ -4 for linear interpolation and as 𝑘𝑘′ -8 for cubic interpolation. Thus, cubic interpolation is quite effective at suppressing higher order aliases, although much less so for 𝜋𝜋 = 0, -1 . Sometimes, simply choosing simulation parameters wisely works. For instance, FDTD beam simulations are substantially more stable at certain 'magic time steps'. 14 In many instances, modifying the algorithm itself is warranted. Implicit algorithms usually introduce a degree of damping, especially at short wavelengths, that reduces numerical instability growth rates. 15 Alternative, less drastic, modifications are discussed in the next section. ## SUPPRESSING THE NUMERICAL CHERENKOV INSTABILITY The most serious numerical instability in multidimensional PIC simulations of relativistic beams (in high-current accelerators, astrophysical shocks, etc.) is the numerical Cherenkov instability, so named because it results from the interaction of spurious beam modes with numerically distorted electromagnetic modes. 13, 16 Its peak growth rate can be a large fraction of �𝜔𝜔 𝑝𝑝 2 𝑘𝑘 ⊥ 2 ∆𝑧𝑧� 1 � 3 , where ∆𝑧𝑧 is the cell dimension in the direction of beam propagation. For highly relativistic beams, its dispersion relation is $$C _ { 0 } + \omega _ { p } ^ { \ 2 } \sum _ { m } C _ { 1 } \csc \left [ ( \omega - k _ { z } ^ { \prime } v ) \frac { \partial t } { 2 } \right ] + \omega _ { p } ^ { \ 2 } \sum _ { m } C _ { 2 x } \csc ^ { 2 } \left [ ( \omega - k _ { z } ^ { \prime } v ) \frac { \partial t } { 2 } \right ] = 0$$ and 𝐶𝐶 2𝑥𝑥 are functions of  , k , and the simulation parameters, and 𝐶𝐶 0 is the vacuum numerical dispersion relation. 𝐶𝐶 1 Details depend on the algorithm chosen; e.g. , FDTD, 14 PSTD, 12 or PSATD. 11 To understand the instability, it is helpful to visualize the locations of the modes involved, and where they intersect. The left chart in Fig. 3 shows normal modes for 2D PSATD with 𝑣𝑣𝛥𝛥𝑡𝑡 𝛥𝛥𝑧𝑧 = 1.2, 𝑣𝑣 ≈ 1, ∆𝑧𝑧 = ∆𝑥𝑥 = 0.3868 . This particular slice through phase space is for 𝑘𝑘 𝑥𝑥 = 1 , or about one-eighth the maximum value of 𝑘𝑘 𝑥𝑥 on the grid. Note that the electromagnetic modes (dashed lines) turn over at large k , as described in the previous section. For somewhat smaller 𝑣𝑣𝛥𝛥𝑑𝑑 𝛥𝛥𝑧𝑧 , the electromagnetic modes no longer intersect the 𝜋𝜋 = 0 beam mode. 11 Nonetheless, they still intersect aliases in various places. The locations in k -space of these intersections for 𝜋𝜋 = -1, 0, +1 are shown as black curves in the chart on the right. Superimposed are instability growth rates for 𝜔𝜔 𝑝𝑝 = 1 and linear interpolation. Figure 3. Normal Modes (left) and Growth Rates &amp; Resonances (right) for PSATD with 𝑣𝑣𝛥𝛥𝑑𝑑 𝛥𝛥𝑧𝑧 = 1.2, 𝑣𝑣 ≈ 1 . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-d90b55c7-c2eb-4a68-99f0-b09b28d523f2.jpg) Normal mode diagrams for PSTD and FDTD are qualitatively similar but differ from the left side of Fig. 3 as follows. PSTD electromagnetic modes travel faster than the speed of light (unity for the normalization used in this paper) and bend upward relative to the PSATD curves. This also is apparent in Fig. 2. FDTD electromagnetic modes, on the other hand, travel slower than the speed of light at large k , 14 bending downward relative to the PSATD curves. Hence, FDTD electromagnetic modes almost always intersect the 𝜋𝜋 = 0 beam mode. Lehe's variant of FDTD is an exception. Nonetheless, in all these algorithms electromagnetic modes interact with spurious 7 beam modes. The right side of Fig. 3 displays two noticeable features, multiple resonant numerical instabilities in narrow bands at large k , and a slower growing nonresonant instability in a wide band over smaller k . As stated earlier, higher order resonances can be weakened substantially by using cubic interpolation. (Employing still higher order interpolation functions offers little advantage, however.) Suppressing the 𝜋𝜋 = 0, -1 resonant instabilities typically requires digital filtering of short wavelengths, and there are several ways to accomplish this. 11, 14, 17, 18, 19, 20, 21 The nonresonant instability, on the other hand, extends into regions of k -space where physical phenomena of interest may occur, so digital filtering is not practical. Instead, the nonresonant instability can be suppressed by making minor corrections to the fields as interpolated to the particles, or sometimes by making minor corrections to the currents. Interpolated-field corrections that minimize 𝐶𝐶 2𝑥𝑥 in Eq. (16) for 𝜔𝜔 ≈ 𝒌𝒌 ∙ 𝑣𝑣 are considered below. Essentially, the corrections cancel some numerical errors introduced by finite cell size and time step and, therefore, would not be expected to distort physical phenomena. (Recall that 𝐶𝐶 2𝑥𝑥 vanishes in the limit of small cell size and time step.) Correction factors differ from unity by of order 𝑘𝑘 2 for small k . Because the interpolated-field correction factors, defined as 𝛹𝛹 𝐸𝐸 and 𝛹𝛹 𝐵𝐵 , enter linearly into 𝐶𝐶 2𝑥𝑥 , only their ratio is determined. Several FDTD interpolation schemes exist, and each has its own ratio, 𝛹𝛹 𝐸𝐸 /𝛹𝛹𝐵𝐵 . 18 For instance, the Galerkin 'energy-conserving' scheme has as a ratio, $$\Psi _ { E } / \Psi _ { B } = \sin \left ( k _ { z } \frac { \Delta t } { 2 } \right ) \cos \left ( k _ { z } \frac { \Delta t } { 2 } \right ) \cot \left ( k _ { z } \frac { \Delta z } { 2 } \right ) \frac { \Delta z } { \Delta t } \quad ( 1 7 ) \ \Big | \quad.$$ This and corresponding expressions for other interpolation schemes can be satisfied exactly in k -space, but the Fourier transforms at every time step incur unnecessary cost. Instead, Eq. (17) can be approximated to an accuracy of about 10 -6 by the ratio of two fourth-order polynomials in sin 2 �𝑘𝑘 𝑧𝑧 ∆𝑧𝑧 2 � . 𝛹𝛹 𝐸𝐸 and 𝛹𝛹 𝐵𝐵 then can be set to the numerator and denominator, respectively; sin 2 �𝑘𝑘 𝑧𝑧 ∆𝑧𝑧 2 � is computed by applying the (-¼, ½, -¼) stencil to a copy of the fields before interpolating them to the particles. Sample results are provided in Fig. 4, based on cubic interpolation, Cole-Karkkainen FDTD field solver, and two-pass bilinear filtering. 18 Other parameters are as in Fig. 3. WARP 22 simulation results are provided for comparison. Instability growth rates are less than 0.01 𝜔𝜔 𝑝𝑝 Figure 4 . Maximum growth rates from FDTD numerical dispersion relation, compared with simulation results. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-773ed889-9d3e-433b-9f40-d2c99101c6e0.jpg) throughout most of the plot, more than an order of magnitude smaller than without the field correction procedure. WARP LPA simulations using field corrections are devoid of visible numerical issues and produce physical results as expected. 18 The Sub-Cycled PSTD 𝛹𝛹 𝐸𝐸 /𝛹𝛹𝐵𝐵 ratio is somewhat more complicated. 12 $$\Psi _ { E } / \Psi _ { B } = \frac { \sin ( k _ { z } v \frac { \Delta t } { 2 } ) \cos ( k _ { z } v \frac { \Delta t } { 2 } ) \sin ^ { 2 } ( \theta \frac { \Delta t } { 2 } ) } { ( k _ { z } v \frac { \Delta t } { 2 } ) [ \sin ^ { 2 } ( \theta \frac { \Delta t } { 2 } ) - \sin ^ { 2 } ( k _ { z } v \frac { \Delta t } { 2 } ) ( 1 - \frac { \sin ( \theta \, \Delta t ) } { N } \csc ( \frac { \theta \, \Delta t } { N } ) ) ] }$$ The right side of Eq. (18) can be split arbitrarily between 𝛹𝛹 𝐸𝐸 and 𝛹𝛹 𝐵𝐵 , provided that each differs from unity by of order 𝑘𝑘 2 or less for small k . In the discussion that follows, 𝛹𝛹 𝐵𝐵 is set to unity. Setting 𝛹𝛹 𝐸𝐸 to unity instead typically gives very similar results away from the singularity in Eq. (18). It is advisable to use a sharp cutoff digital filter to avoid the effects of the singularity as well as to eliminate most of the residual 𝜋𝜋 = -1 instability. 17 Specifically, 𝛹𝛹 𝐸𝐸 and 𝛹𝛹 𝐵𝐵 are set to zero for 𝑘𝑘 &gt; 𝛼𝛼 min � 𝜋𝜋 ∆𝑧𝑧 , 𝜋𝜋 𝑣𝑣∆𝑑𝑑 � , with 𝛼𝛼 &lt; 1 . The left chart in Fig. 5 depicts maximum growth rates for various N as functions of ∆𝑡𝑡 for 𝛹𝛹 𝐸𝐸 and 𝛹𝛹 𝐵𝐵 as just defined, 𝛼𝛼 = 0.6 , and a single pass bilinear filter applied the fields and currents. (Similar results are obtained for α as large as 0.75.) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-fb2beabc-ae22-4136-8731-a6a63db92dad.jpg) Figure 5. Maximum growth rates from PSTD numerical dispersion relation for 𝐶𝐶 2𝑥𝑥 and 𝐶𝐶 3𝑥𝑥 correction factors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-e024ebdf-bd45-415c-b4a8-4e36e0068884.jpg) Growth rates are larger in Fig. 5 than in Fig. 4 primarily due to a weak, narrow band instability, 11, 20 which is associated primarily with the 𝐶𝐶 1 term in Eq. (16). It typically occurs in PSTD at 𝑘𝑘 𝑧𝑧 about half the Nyqyist wavenumber and small 𝑘𝑘 𝑥𝑥 (Ref. 17 mistakenly associated it with 𝐶𝐶 2𝑥𝑥 .) Yu, et. al. suggest that this residual instability be eliminated by a combination of small ∆𝑡𝑡 and digital filtering. 21 An alternative to Eq. (18), here designated 𝐶𝐶 3𝑥𝑥 , is $$\Psi _ { E } = \left ( k _ { z } \frac { \Delta t } { 2 } \right ) \cot \left ( k _ { z } \frac { \Delta t } { 2 } \right ), \quad \Psi _ { B } = \left ( k \frac { \Delta t } { 2 } \right ) \cot \left ( \theta \frac { \Delta t } { 2 } \right ) \sec \left ( \frac { \theta \, \Delta t } { 2 \, N } \right )$$ The PSATD limit was used successfully in Ref. 18, where it is referred to as method 'b2'. The right chart in Fig. 5 shows that Eq. (19) gives slightly better results than does Eq. (18), at least for the parameters chosen. As proposed by Vay, et. al. , PSTD can be generalized further by replacing the components of k in the field and Esirkepov current algorithms by the Fourier transforms of various order finite difference approximations to spatial derivatives on the grid. 24 (In this context the components of k itself can be viewed as infinite order approximations.) Dubbed the Pseudo Spectral Arbitrary Order Time Domain (PSAOTD) algorithm, it is intended to provide more localized particle representations than does standard PSTD. 25 This research is in a preliminary state. Figure 6 provides PSTD peak growth rates with 𝐶𝐶 2𝑥𝑥 correction factors for 𝑁𝑁 = 1, 2, 4, 8 and orders 2, 4, 6, 8, 10, and infinity. 𝐶𝐶 2𝑥𝑥 remains as defined in Eq. (18) but with the definition of 𝜃𝜃 modified to $$\sin \left ( \frac { \theta \, \Delta t } { 2 \, N } \right ) = \frac { \sqrt { \left [ k _ { x } \right ] ^ { 2 } + \left [ k _ { y } \right ] ^ { 2 } + \left [ k _ { z } \right ] ^ { 2 } } \, \Delta t } { 2 \, N }$$ with [𝑘𝑘 𝑓𝑓 ] the appropriate finite difference approximation to 𝑘𝑘 𝑓𝑓 . Digital filtering is as in Fig. 5. Not surprisingly, the dispersion relation for 𝑁𝑁 = 1 , order 2 PSTD is essentially the same as that for uniform interpolation FDTD. Hence, peak growth rates for these two algorithms, shown in Fig. 4 and the upper left chart of Fig. 6, have similar values over the range 𝑣𝑣 ∆𝑑𝑑 ∆𝑧𝑧 &lt; 1 √2 . (Incorporating the equivalent of the Cole-Karkkainen field solver into PSAOTD to permit comparing the two figures throughout the range 𝑣𝑣 ∆𝑑𝑑 ∆𝑧𝑧 &lt; 1 would not be difficult. Agreement might not be as good at large ∆𝑡𝑡 , however, because the rational approximation leading to Fig. 4 is less accurate there.) As in Fig. 5, here too the larger than desired residual growth rates are due to the weak, narrow band PSTD instability. This instability is weaker for large N . Evidently, it also does not occur for order 2 at any N . In contrast to the results of the right side of Fig. 5, 𝐶𝐶 3𝑥𝑥 field correction does not work well except in narrow windows unless N or order is large. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-71d667a9-8c3c-4c71-8973-c0564f89f11e.jpg) Figure 6. Maximum growth rates from PSTD numerical dispersion relation with 𝑁𝑁 = 1, 2, 4, 8 and various orders for 𝐶𝐶 2𝑥𝑥 correction factors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-11ee921d-1f87-4e18-9723-4c7536722b2e.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-74e0e572-63ee-4825-833e-9d944ddd4d1d.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1146v1-figure-93353d05-fd30-4228-be0c-c2ea5039b0a0.jpg) Some of the software used to produce the results in this section, along with a number of related presentations, is available at http://hifweb.lbl.gov/public/BLAST/Godfrey/, and more is to be added. ## ACKNOWLEDGMENTS Many of the concepts discussed in this paper first were proposed by Jean-Luc Vay. He also performed WARP simulations validating much of the analytical modeling here. Although not discussed in the paper, the simulations were vital to progress. This work was supported in part by US-DOE Contract DE-AC02-05CH11231. ## REFERENCES - 1. C. K. Birdsall and A. B. Langdon, Plasma Physics via Computer Simulation (Taylor &amp; Francis, New York, 2005). - 2. T. Z. Esirkepov, Comp. Phys. Comm. 135 , 144-153 (2001). - 3. K. S. Yee, IEEE Trans. Ant. Prop. 14 , 302-307 (1966). - 4. J. B. Cole, IEEE Trans. Ant. Prop. 50 , 1185-1191 (2002). - 5. M. Karkkainen, E. Gjonaj, T. Lau, and T. Weiland, Proc. Int. Comp. Accel. Phys. Conf, (France, 2006) pp. 35-40. - 6. A. Greenwood, K. Cartwright, J. Luginsland, and E. Baca, J. Comp. Phys. 201, 665-684 (2004). - 7. R. Lehe, A. Lifschitz, C. Thaury, V. Malka, and X. Davoine, Phys. Rev Accel. &amp; Beams 16, 021301 (2013). - 8. Q. Liu, Microwave Opt. Tech. Let. 15 , 158-165 (1997). - 9. I. Haber, R. Lee, H. H. Klein, and J. P. Boris, Proc. Sixth Conf. Num. Sim. Plas. (USA, 1973), pp. 46-48. - 10. J.-L. Vay, I. Haber, and B. B. Godfrey, J. Comp. Phys. 243 , 260-268 (2013). - 11. B. B. Godfrey, J.-L. Vay, I. Haber, J. Comp. Phys. 258 , 689-704 (2014). - 12. B. B. Godfrey and L.-L. Vay, in preparation. - 13. B. B. Godfrey, J. Comp. Phys. 19 , 58-76 (1975). - 14. B. B. Godfrey and J.-L. Vay, J. Comp. Phys. 248 , 33-46 (2013). - 15. J.-L. Vay, C. G. Geddes, E. Cormier-Michel, and D. P. Grote, J. Comp. Phys. 230 , 5908-5929 (2011). - 16. B. B. Godfrey, J. Comp. Phys. 15 , 504-521 (1974). - 17. B. B. Godfrey, J.-L. Vay, and I. Haber, IEEE Trans. Plas. Sci. 42 , 1339-1344 (2014). - 18. B. B. Godfrey and J.-L. Vay, J. Comp. Phys. 267 , 1-6 (2014). - 19. X. Xu, P. Yu, S. F. Martin, F. S. Tsung, V. K. Decyk, J. Vieira, R. A. Fonseca, W. Lu, L. O. Silva, and W. B. Mori, Comp. Phys. Comm. 184 , 2503-2514 (2013). - 20. P. Yu, X. Xu, V. K. Decyk, W. An, J. Vieira, R. A. Fonseca, W. Lu, L. O. Silva, and W. B. Mori, J. Comp. Phys. 266 , 124-138 (2014). - 21. P. Yu, X. Xu, V. K. Decyk, F. Fiuza, J. Vieira, F. S. Tsung, R. A. Fonseca, W. Lu, L. O. Silva, and W. B. Mori, arXiv:1407.0272 (2014). - 22. D. Grote, A. Friedman, J.-L. Vay, and I. Haber, AIP Conf. Proc. 749 , 55-58 (2005). - 23. J.-L. Vay, B. B. Godfrey, I. Haber, T. Drummond, and A. Koniges, Proc. 2014 Adv. Accel. Work. (USA, 2014). - 24. S. K. Lele, J. Comp. Phys. 103 , 16-42 (1992).
null
[ "Brendan B. Godfrey" ]
2014-08-05T23:47:15+00:00
2014-08-05T23:47:15+00:00
[ "physics.plasm-ph", "physics.acc-ph" ]
Review and Recent Advances in PIC Modeling of Relativistic Beams and Plasmas
Particle-in-Cell (PIC) simulation codes have wide applicability to first-principles modeling of multidimensional nonlinear plasma phenomena, including wake-field accelerators. This review addresses both finite difference and pseudo-spectral PIC algorithms, including numerical instability suppression and generalizations of the spectral field solver.
1408.1147v2
## Classification of the Z Z 2 4 -Linear Hadamard Codes and Their Automorphism Groups Denis S. Krotov and Merc` e Villanueva glyph[negationslash] glyph[negationslash] Abstract -A Z Z 2 4 -linear Hadamard code of length α +2 β = 2 t is a binary Hadamard code which is the Gray map image of a Z Z 2 4 -additive code with α binary coordinates and β quaternary coordinates. It is known that there are exactly glyph[floorleft] t -1 2 glyph[floorright] and glyph[floorleft] t 2 glyph[floorright] nonequivalent Z Z 2 4 -linear Hadamard codes of length 2 t , with α = 0 and α = 0 , respectively, for all t ≥ 3 . In this paper, it is shown that each Z Z 2 4 -linear Hadamard code with α = 0 is equivalent to a Z Z 2 4 -linear Hadamard code with α = 0 , so there are only glyph[floorleft] t 2 glyph[floorright] nonequivalent Z Z 2 4 -linear Hadamard codes of length 2 t . Moreover, the order of the monomial automorphism group for the Z Z 2 4 -additive Hadamard codes and the permutation automorphism group of the corresponding Z Z 2 4 -linear Hadamard codes are given. Index Terms -Hadamard codes, Z Z 2 4 -linear codes, additive codes, automorphism group Additive codes were first defined by Delsarte in 1973 as subgroups of the underlying Abelian group in a translation association scheme [7], [8]. In the special case of a binary Hamming scheme, that is, when the underlying Abelian group is of order 2 n , the additive codes coincide with the codes that are subgroups of Z α 2 × Z β 4 . In order to distinguish them from additive codes over finite fields [3], they are called Z Z 2 4 -additive codes [4]. Since Z Z 2 4 -additive codes are subgroups of Z α 2 × Z β 4 , they can be seen as a generalization of binary (when β = 0 ) and quaternary (when α = 0 ) linear codes. As for quaternary linear codes, Z Z 2 4 -additive codes can also be seen as binary codes by considering the extension of the usual Gray map: Φ : Z α 2 × Z β 4 -→ Z n 2 , where n = α +2 β , given by ## I. INTRODUCTION Let Z 2 and Z 4 be the rings of integers modulo 2 and modulo 4, respectively. Let Z n 2 be the set of all binary vectors of length n and let Z n 4 be the set of all quaternary vectors of length n . For a vector x = ( x , . . . , x 1 n ) ∈ Z n 2 and a set I ⊆ { 1 , . . . , n } , we denote by x | I the vector x restricted to the coordinates in I . Any nonempty subset C of Z n 2 is a binary code and a subgroup of Z n 2 is called a binary linear code . Similarly, any nonempty subset C of Z n 4 is a quaternary code and a subgroup of Z n 4 is called a quaternary linear code . Let C be a quaternary linear code. Since C is a subgroup of Z n 4 , it is isomorphic to an Abelian group Z γ 2 × Z δ 4 , for some γ and δ , and we say that C is of type 2 γ 4 δ as a group. Quaternary codes can be seen as binary codes under the usual Gray map defined as ϕ (0) = (0 0) , , ϕ (1) = (0 1) , , ϕ (2) = (1 1) , , ϕ (3) = (1 0) , in each coordinate. If C is a quaternary linear code, then the binary code C = ϕ ( C ) is called a Z 4 -linear code . The work of the first author has been partially supported by the Russian Foundation for Basic Research under Grant 13-01-00463-a. The work of the second author has been partially supported by the Spanish MICINN under Grants TIN2010-17358 and TIN2013-40524-P and by the Catalan AGAUR under Grant 2014SGR-691. The material in this paper was presented in part at the 4th International Castle Meeting on Coding Theory and Applications, Palmela, Portugal, 2014 [18]. - D. Krotov is with the Sobolev Institute of Mathematics, Novosibirsk 630090, Russia, and also with the Novosibirsk State University, Novosibirsk 630090, Russia (e-mail: [email protected]). - M. Villanueva is with the Department of Information and Communications Engineering, Universitat Aut` onoma de Barcelona, 08193-Bellaterra, Spain (e-mail: [email protected]). This is the peer reviewed version of the paper published in the IEEE Transactions on Information Theory, vol. 61, no. 2, pp. 887-894, 2015, DOI 10.1109/TIT.2014.2379644. c © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. $$\Phi ( x, y ) = ( x, \varphi ( y _ { 1 } ), & \dots, \varphi ( y _ { \beta } ) ) \\ & \forall x \in \mathbb { Z } _ { 2 } ^ { \alpha }, \ \forall y = ( y _ { 1 }, \dots, y _ { \beta } ) \in \mathbb { Z } _ { 4 } ^ { \beta }.$$ If C is a Z Z 2 4 -additive code, C = Φ( C ) is called a Z Z 2 4 -linear code . Moreover, a Z Z 2 4 -additive code C is also isomorphic to an Abelian group Z γ 2 × Z δ 4 , and we say that C (or equivalently the corresponding Z Z 2 4 -linear code C = Φ( C ) ) is of type ( α, β ; γ, δ ) . Let S n be the symmetric group of permutations on the set { 1 , . . . , n } , and let id ∈ S n be the identity permutation. The group operation in S n is the function composition. The composition σ σ 1 2 maps any element x to σ 1 ( σ 2 ( x )) . A σ ∈ S n acts linearly on words of Z n 2 or Z n 4 by permuting the coordinates, σ (( c 1 , . . . , c n )) = ( c σ -1 (1) , . . . , c σ -1 ( n ) ) . Let C be a Z Z 2 4 -additive code of type ( α, β ; γ, δ ) . We can assign a permutation π x ∈ S n to each codeword x = ( x , . . . , x ′ 1 ′ α , x 1 , . . . , x 2 β ) ∈ C = Φ( ) C , such that π x = π 12 π 34 · · · π 2 β -1 2 β , where $$\pi _ { i j } = \begin{cases} \text{id} & \text{if $(x_{i},x_{j})=(0,0)$ or $(1,1)$} \\ ( i, j ) & \text{otherwise.} \end{cases}$$ Given two codewords of C , x = ( x , x ′ 1 , . . . , x 2 β ) and y = ( y , y ′ 1 , . . . , y 2 β ) , define x glyph[star] y = x + π x ( y ) . Then, we have that ( C, glyph[star] ) is an Abelian group [25], which is isomorphic to ( C , +) , since $$\sl _ { \text{osibirsk} } ^ { \text{osibirsk} } & \quad x * y = \left ( x ^ { \prime } + y ^ { \prime }, \, \varphi ( \varphi ^ { - 1 } ( x _ { 1 }, x _ { 2 } ) + \varphi ^ { - 1 } ( y _ { 1 }, y _ { 2 } ) ), \\ \text{iications} & \quad \dots, \, \varphi ( \varphi ^ { - 1 } ( x _ { 2 \beta - 1 }, x _ { 2 \beta } ) + \varphi ^ { - 1 } ( y _ { 2 \beta - 1 }, y _ { 2 \beta } ) ) \right ) \\ \text{a, } \text{Spain} & \quad = \Phi ( \Phi ^ { - 1 } ( x ) + \Phi ^ { - 1 } ( y ) ).$$ There are Z Z 2 4 -linear codes in several important classes of binary codes. For example, Z Z 2 4 -linear perfect single errorcorrecting codes (or 1-perfect codes) are found in [25] and glyph[negationslash] fully characterized in [6]. Also, in subsequent papers [15], [5], [16], [22], [23], Z Z 2 4 -linear extended perfect and Hadamard codes are studied and classified independently for α = 0 and α = 0 . Finally, in [24], [26], [20], Z Z 2 4 -linear ReedMuller codes are also studied. Note that Z Z 2 4 -linear codes have allowed to classify more binary nonlinear codes, giving them a structure as Z Z 2 4 -additive codes. glyph[negationslash] glyph[negationslash] A (binary) Hadamard code of length n is a binary code with 2 n codewords and minimum distance n/ 2 [19]. The Z Z 2 4 -additive codes that, under the Gray map, give a Hadamard code are called Z Z 2 4 -additive Hadamard codes and the corresponding Z Z 2 4 -linear codes are called Z Z 2 4 -linear Hadamard codes , or just Z 4 -linear Hadamard codes when α = 0 . The classification of Z Z 2 4 -linear Hadamard codes is given by the following results. For any integer t ≥ 3 and each δ ∈ { 1 , . . . , glyph[floorleft] ( t +1) 2 / glyph[floorright]} , there is a unique (up to equivalence) Z 4 -linear Hadamard code of type (0 2 , t -1 ; t +1 -2 δ, δ ) , and all these codes are pairwise nonequivalent, except for δ = 1 and δ = 2 , where the codes are equivalent to the linear Hadamard code, that is, the dual of the extended Hamming code [16]. Therefore, the number of nonequivalent Z 4 -linear Hadamard codes of length 2 t is glyph[floorleft] t -1 2 glyph[floorright] for all t ≥ 3 . On the other hand, for any integer t ≥ 3 and each δ ∈ { 0 , . . . , glyph[floorleft] t/ 2 glyph[floorright]} , there is a unique (up to equivalence) Z Z 2 4 -linear Hadamard code of type (2 t -δ , 2 t -1 -2 t - -δ 1 ; t +1 -2 δ, δ ) . All these codes are pairwise nonequivalent, except for δ = 0 and δ = 1 , where the codes are equivalent to the linear Hadamard code [5]. Therefore, the number of nonequivalent Z Z 2 4 -linear Hadamard codes of length 2 t with α = 0 is glyph[floorleft] t/ 2 glyph[floorright] for all t ≥ 3 . In this paper, we show that any Z 4 -linear Hadamard code is equivalent to a Z Z 2 4 -linear Hadamard code with α = 0 . Two structural properties of binary codes are the rank and the dimension of the kernel. The rank of a code C is simply the dimension of the linear span, 〈 C 〉 , of C . The kernel of a code C is defined as Ker( C ) = { x ∈ Z n 2 | x + C = C } [2]. If the all-zero vector belongs to C , Ker( C ) is a linear subcode of C . In general, C can be written as the union of cosets of Ker( C ) , and Ker( C ) is the largest linear code for which this is true [2]. The Z Z 2 4 -linear Hadamard codes can also be classified using either the rank or the dimension of the kernel, as it is proven in [16], [23], where these parameters are computed. Two Z Z 2 4 -additive codes C 1 and C 2 both of type ( α, β ; γ, δ ) are said to be monomially equivalent , if one can be obtained from the other by permuting the coordinates and (if necessary) changing the signs of certain Z 4 coordinates. Two Z Z 2 4 -additive or Z Z 2 4 -linear codes are said to be permutation equivalent if they differ only by a permutation of coordinates. The monomial automorphism group of a Z Z 2 4 -additive code C , denoted by MAut( ) C , is the group generated by all permutations and sign-changes of the Z 4 coordinates that preserve the set of codewords of C , while the permutation automorphism group of C or C = Φ( C ) , denoted by PAut( C ) or Aut( C ) , respectively, is the group generated by all permutations that preserve the set of codewords [14]. The permutation automorphism group of a binary code is also an invariant, so it can help in the classification of some families of binary codes. Moreover, the automorphism group can also be used in decoding algorithms and to describe some other properties like the weight distribution [19, Ch. 8, § 5 and Ch. 16, § 9]. The permutation automorphism group of Z Z 2 4 -linear (extended) 1 -perfect codes has been studied in [22], [17]. The permutation automorphism group of (nonlinear) binary 1-perfect codes has also been studied before, obtaining some partial results [13], [12], [1], [9]. For Z Z 2 4 -additive Hadamard codes with α = 0 , the permutation automorphism group was characterized in [21], while the monomial automorphism group as well as the permutation automorphism group of the corresponding Z Z 2 4 -linear codes had not been studied yet. In this paper, we completely solve this problem giving the structure and order of these two automorphism groups for any α . glyph[negationslash] glyph[negationslash] glyph[negationslash] The structure of the current paper is as follows. In Section II, we suggest a new representation for the Z Z 2 4 -linear Hadamard codes, separately for the cases α = 0 and α = 0 , and prove that the Z Z 2 4 -linear Hadamard codes of types (0 , n/ 2; γ, δ ) and ( α, ( n -α / ) 2; γ + 2 , δ -1) with α = n/ 2 δ -1 = 0 are permutation equivalent. In Sections III and IV, we establish the structure and the order of the monomial automorphism group of the Z Z 2 4 -additive Hadamard codes, for α = 0 and α = 0 , respectively. In Sections V and VI, we establish the structure and the order of the permutation automorphism group of the Z Z 2 4 -linear Hadamard codes. The main results of the paper are Theorem 1 on the equivalence, Theorems 2 and 3 on the monomial automorphism group of the Z Z 2 4 -additive Hadamard codes, Theorems 4 and 5 on the permutation automorphism group of the corresponding binary codes, and a representation of Z Z 2 4 -linear Hadamard codes in Section II. ## II. CLASSIFICATION OF Z Z 2 4 -LINEAR HADAMARD CODES glyph[negationslash] glyph[negationslash] In [16] and [5], Z Z 2 4 -linear Hadamard codes are classified independently for α = 0 and α = 0 . In this section, we show that each Z Z 2 4 -linear Hadamard code with α = 0 is equivalent to a Z Z 2 4 -linear Hadamard code with α = 0 , so there are only glyph[floorleft] t 2 glyph[floorright] nonequivalent Z Z 2 4 -linear Hadamard codes of length 2 t . We say that a function f from Z i 2 × Z j 4 to Z s 2 × Z t 4 is affine if f (0) -f ( x ) -f ( y )+ f ( x + ) = 0 y for every x and y from Z i 2 × Z j 4 (here and in what follows, 0 denotes the all-zero vector). Equivalently, f ( ) · -f (0) is a linear function, i.e., a group homomorphism. Let B = B γ,δ . be the set of all affine functions from Z γ 2 × Z . δ 4 to Z 4 . These Z 4 -valued functions on Z γ 2 × Z . δ 4 can be considered as words of length 2 γ +2 . δ over Z 4 . Denote B γ,δ . = { x : Z γ 2 × Z . δ 4 → Z 2 2 | x ( ) = · ϕ f ( ( )) · for some f ∈ B} . Lemma 1: B γ,δ . is a Z 4 -linear Hadamard code of length γ +2 +1 . δ . Proof: There are 4 2 · γ · 4 δ = 2 n affine functions in B . The set B is closed under the addition over Z 4 ; so after applying the Gray map, B γ,δ . is a Z 4 -linear code of length 2 γ · 4 . δ · 2 = n . Clearly, the minimum Hamming distance is n/ 2 . n = 2 and type (0 , n/ . 2; γ, δ ) , where δ = δ +1 . Define the function ϕ + : Z 4 → { 0 1 , } by ϕ + (0) = ϕ + (3) = 0 , ϕ + (1) = ϕ . + (2) = 1 . Again, the Z 2 -valued or Z 4 -valued functions on Z γ 2 × Z δ 4 can be considered as words of length 2 . γ +2 δ over Z 2 or Z 4 , respectively. Let A be the set of all affine functions f from Z . γ 2 × Z δ 4 to Z 4 that map the all-zero vector to 0 or 2 : f (0) ∈ { 0 2 , } . Denote C . γ,δ = { h : Z . γ 2 × Z δ 4 → Z 2 | h ( ) = · ϕ + ( f ( )) · for some f ∈ A} . Proof: There are 2 · 2 γ · 4 δ = 2 n affine functions in A . The set A is closed under the addition over Z 4 ; so the Gray map image A . = Φ( A ) can also be considered as a Z Z 2 4 -linear code with 2 γ + +1 δ coordinates over Z 2 , which correspond to the elements of order at most 2 of Z . γ 2 × Z δ 4 . Lemma 2: C . γ,δ is a Z Z 2 4 -linear Hadamard code of length n = 2 . γ +2 δ and type ( α, β ; γ, δ ) , where γ = . γ +1 , α . = 2 . γ + δ corresponding to the elements of order at most 2 of Z γ 2 × Z δ 4 , and β = 2 . γ + δ -1 (2 δ -1) corresponding to the pairs of opposite elements of order 4 . . Now, we will see that the code A can be obtained from C . γ,δ by repeating twice every coordinate. That is, strictly speaking, A is permutation equivalent to { ( h, h ) | h ∈ C . γ,δ } . Indeed, given v ∈ Z . γ 2 × Z δ 4 of order 4 and an affine function f ∈ A , the values ϕ + ( f ( v )) and ϕ + ( f ( -v )) of the corresponding codeword of C . γ,δ each occurs both in ϕ f v ( ( )) and ϕ f ( ( -v )) . If the order of v ∈ Z . γ 2 × Z δ 4 is 2 or less, then ϕ + ( f ( v )) is duplicated in ϕ f v ( ( )) . Finally, it is easy to check that the minimum Lee distance for the set of affine functions A is n = 2 . γ +2 δ ; so the minimum Hamming distance of C . γ,δ is the half of this value, n/ 2 . Lemma 3: Let f : Z 2 × Z 4 → Z 4 be an affine Then h ( ) = · ϕ + ( f ( )) · belongs to C . γ,δ . . γ δ function. Proof: In the case that f (0) ∈ { 0 2 , } , C . γ,δ contains h by definition. On the other hand, if f (0) ∈ { 1 3 , } , we will use that ϕ + ( ) = l ϕ + (3 -l ) for l ∈ Z 4 . Then, h ( ) = · ϕ + ( f ( )) = · ϕ + (3 -f ( )) · . Since 3 -f ( ) · is an affine function and 3 -f (0) ∈ { 0 2 , } , we obtain that h ∈ C . γ,δ . glyph[negationslash] Theorem 1: The Z 4 -linear Hadamard code B γ,δ . of length n and type (0 , n/ 2; γ, δ ) is permutation equivalent to the Z Z 2 4 -linear Hadamard code C γ +1 ,δ . of type ( α, ( n -α / ) 2; γ +2 , δ -1) with α = n/ 2 δ -1 = 0 . Proof: Consider a function f in B and the related function g v, e ( ) = f ( v ) + 2 ef (0) , where v ∈ Z γ 2 × Z . δ 4 and e ∈ Z 2 . We can see that $$\varphi ( f ( v ) ) & = \left ( \varphi ^ { + } ( g ( - v, 1 ) ), \varphi ^ { + } ( g ( v, 0 ) ) \right ), \\ \varphi ( f ( - v ) ) & = \left ( \varphi ^ { + } ( g ( v, 1 ) ), \varphi ^ { + } ( g ( - v, 0 ) ) \right ).$$ In order to check these equalities, it is convenient to represent f ( v ) as f 0 ( v ) + f (0) , where f 0 : Z γ 2 × Z . δ 4 → Z 4 is a group homomorphism (in particular, f 0 ( -v ) = -f 0 ( v ) ). . Since g is an affine function from v ∈ Z γ +1 2 × Z δ 4 to Z 4 , we can deduce from Lemma 3 that there is a fixed coordinate permutation that sends every codeword of B γ,δ . to a codeword of C γ +1 ,δ . . Corollary 1: There are exactly glyph[floorleft] t 2 glyph[floorright] nonequivalent Z Z 2 4 -linear Hadamard codes of length 2 t . ## III. THE MONOMIAL AUTOMORPHISM GROUP OF THE Z Z 2 4 -ADDITIVE HADAMARD CODES, α = 0 In this and next sections, we establish the structure and the order of the monomial automorphism group for the Z Z 2 4 -additive Hadamard codes. We start with the Z Z 2 4 -additive Hadamard codes with α = 0 . Recall that the Z Z 2 4 -additive Hadamard code of type (0 2 , γ +2 . δ ; γ, δ . + 1) can be considered as the set B = B γ,δ . of all affine functions from Z γ 2 × Z . δ 4 to Z 4 . As the elements of Z γ 2 × Z . δ 4 play the role of coordinates, the coordinate permutations are the permutations of Z γ 2 × Z . δ 4 , and the action of such permutation σ on a function f on Z γ 2 × Z . δ 4 can be expressed as σf v ( ) = f ( σ -1 ( v )) . The action of a sign change τ can be expressed as τf v ( ) = f . v r v ( ) ( ) , where r is the corresponding function from Z γ 2 × Z δ 4 to { 1 3 , } . . Assume we have an affine function r from Z γ 2 × Z δ 4 to { 1 3 , } ⊂ Z 4 ; note that r v ( ) = r ( -v ) for all v . Let supp( ) r be the set of elements of Z γ 2 × Z . δ 4 whose image by r is 3. By τ r , we denote the transformation that changes the sign of the value of a function f ∈ B γ,δ . at the coordinates given by the elements of supp( ) r : τ r f ( v . ) = f ( v r v ) ( ) . By ρ r , we denote the permutation of Z γ 2 × Z δ 4 that changes the sign of the elements of supp( ) r : ρ f r ( v ) = f ( r v v ( ) ) . Theorem 2: The monomial automorphism group MAut( B γ,δ . ) of the Z Z 2 4 -additive Hadamard code B γ,δ . of type (0 2 , γ +2 . δ ; γ, δ . + 1) consists of all transformations τ r ρ σ r where σ is an affine permutation of Z γ 2 × Z . δ 4 and r is an affine function from Z γ 2 × Z . δ 4 to { 1 3 , } ( τ r and ρ r are the sign change and the permutation of Z γ 2 × Z . δ 4 assigned to r as above). The cardinality of this group satisfies | MAut( B γ,δ . ) | $$| \i A u ( \mathcal { O } _ { \gamma, \dot { \delta } } ) | \\ = 2 ^ { \frac { 1 } { 2 } \gamma ^ { 2 } + \frac { 3 } { 2 } \gamma + 2 \gamma \dot { \delta } + \frac { 3 } { 2 } \delta ^ { 2 } + \frac { 5 } { 2 } \delta + 1 } \prod _ { i = 1 } ^ { \gamma } ( 2 ^ { i } - 1 ) \prod _ { j = 1 } ^ { \dot { \delta } } ( 2 ^ { j } - 1 ).$$ Proof: The statement of the theorem is straightforward from the following three claims. (i) Every transformation from the statement of the theorem belongs to MAut( B ) . Obviously, σ sends B to B , as the composition of an affine permutation and an affine function is an affine function, too. It remains to check that τ r ρ r ∈ MAut( B ) . Consider an affine function g ( ) · = ( ) + l · c ( ) · , where l is a linear function and c is a constant function, c ( ) · ≡ a . Since l ( -v ) = -l ( v ) and r v ( ) = r ( -v ) , we have τ r ( ρ r ( )) l = l . Further, ρ c r ( ) · = c ( ) · and τ r c ( ) · = ar ( ) · . Therefore, we see that τ r ρ r ( g ) is an affine function and claim (i) is proved. . (ii) If τψ ∈ MAut( B ) , where ψ is a permutation of Z γ 2 × Z δ 4 and τ is a sign change, then τ = τ r for some affine function r . Indeed, consider the constant function g ≡ 1 , which obviously belongs to B . Then ψ g ( ) = g . Denote r ( ) · = τg ( ) · . Since τ ( g ) = τ ( ψ g ( )) is affine, we find that r is also affine. It is straightforward that τ = τ r . (iii) Every permutation σ of Z γ 2 × Z . δ 4 from MAut( B ) is affine . Let σ ′ 1 , . . . , σ ′ γ : Z γ 2 × Z . δ 4 → Z 2 and σ ′′ 1 , . . . , σ. ′′ δ : Z γ 2 × Z . δ 4 → Z 4 be the components of the vector-function σ -1 . That is, $$\sigma ^ { - 1 } ( v ) = \left ( \sigma ^ { \prime } _ { 1 } ( v ), \dots, \sigma ^ { \prime } _ { \gamma } ( v ), \sigma ^ { \prime \prime } _ { 1 } ( v ), \dots, \sigma ^ { \prime \prime } _ { \dot { \delta } } ( v ) \right ).$$ Now, consider the function f i : Z γ 2 × Z . δ 4 → Z 4 defined as f i ( x , . . . , x 1 γ , y 1 , . . . , y . δ ) = 2 x i , i ∈ { 1 , . . . , γ } . This function is affine and, as σ ∈ MAut( B ) , the function σf i is also affine. We have σf i ( v ) = f i ( σ -1 ( v )) = 2 σ ′ i ( v ) , which means that σ ′ i ( v ) is an affine Z 2 -valued function. Similarly, considering g j ( x , . . . , x 1 γ , y 1 , . . . , y . δ ) = y j , we see that σ ′′ j ( v ) is affine, j ∈ { 1 , . . . , δ . } . Since all the components are affine, we conclude that σ -1 and σ are affine. Now, assume we have a transformation ξ = τψ from MAut( B ) , where ψ is a permutation of Z γ 2 × Z . δ 4 and τ is a sign change. By claim (ii), we have τ = τ r for some affine { 1 3 , } -valued function r . By claim (i), the permutation σ = ρ -1 r ψ = ρ -1 r τ -1 r ξ belongs to MAut( B ) , and by claim (iii) it is affine. Then, ξ = τ r ρ σ r . Let us calculate the cardinality of the group. An affine permutation is uniquely represented as the composition of a linear permutation and a translation. There are T = | Z γ 2 × Z . δ 4 | = 2 γ +2 . δ different translations. To choose a linear permutation of Z γ 2 × Z . δ 4 , one should choose the images y 1 , . . . , y . δ , x 1 , . . . , x γ of the elements (10 ... 0) , (010 ... 0) , . . . , (0 ... 01) , respectively, i.e., . δ elements of order 4 and γ elements of order 2 , spanning Z γ 2 × Z . δ 4 . The first element y 1 can be chosen in 2 γ 4 . δ -2 γ 2 . δ ways. To choose y j , one can choose an element of order 4 in the factor-group Z γ 2 × Z . δ 4 / y , . . . , y 〈 1 j -1 〉 (in 2 γ 4 . δ -j +1 -2 γ 2 . δ -j +1 ways) and a representative in the chosen coset of 〈 y , . . . , y 1 j -1 〉 (in 4 j -1 ways). Totally, there are $$\langle y _ { 1 }, \dots, y _ { j - 1 } \rangle \, ( \text{in $4^{j-1}$ ways). Totally, there} \\ Y & = \prod _ { j = 1 } ^ { \delta } \left ( 4 ^ { \dot { \delta } } 2 ^ { \gamma } - 2 ^ { \dot { \delta } } 2 ^ { \gamma } 2 ^ { j - 1 } \right ) \\ & = 2 ^ { \dot { \delta } ^ { 2 } + \gamma \dot { \delta } + \frac { 1 } { 2 } \dot { \delta } ( \dot { \delta } - 1 ) } \prod _ { j = 1 } ^ { \dot { \delta } } ( 2 ^ { j } - 1 ) \\ \text{choose $\sigma$ $\sigma$} \, \sigma \, \text{ after choose $\sigma$} \, \sigma \, \text{.}$$ ways to choose y 1 , . . . , y . δ . After choosing y 1 , . . . , y . δ , x 1 , . . . , x i -1 , the element x i can be chosen arbitrarily from the elements of order 2 of Z γ 2 × Z . δ 4 \ 〈 y , . . . , y . , x 1 δ 1 , . . . , x i -1 〉 , in 2 2 . δ γ -2 2 . δ i -1 ways. Totally, there are $$\nu = \quad \ v a y o. \ v a y, \, \text{use as} \\ X & = \prod _ { i = 1 } ^ { \gamma } \left ( 2 ^ { \dot { \delta } } 2 ^ { \gamma } - 2 ^ { \dot { \delta } } 2 ^ { i - 1 } \right ) \\ & = 2 ^ { \dot { \delta } \gamma + \frac { 1 } { 2 } \gamma ( \gamma - 1 ) } \prod _ { i = 1 } ^ { \gamma } ( 2 ^ { i } - 1 ) \\ \text{known as} \sim \quad \nu \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { u } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \nu } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho } \quad \widetilde { \rho }$$ ways to choose x 1 , . . . , x γ after y 1 , . . . , y . δ . An affine function r is the sum of the coordinates with coefficients from { 0 2 , } and a constant from { 1 3 , } ; so there are F = 2 γ + +1 . δ such functions. Finally, | MAut( B | ) = TY XF . glyph[negationslash] ## IV. THE MONOMIAL AUTOMORPHISM GROUP OF THE Z Z 2 4 -ADDITIVE HADAMARD CODES, α = 0 Recall that the Z Z 2 4 -linear Hadamard code C . γ,δ of type (2 . γ + δ , β ; . γ + 1 , δ ) can be considered as the set of functions ϕ + ( f ( )) · where f belongs to the set A of affine functions from Z . γ 2 × Z δ 4 to Z 4 that map the all-zero vector to 0 or 2 . Equivalently, $$\text{:lined} \quad \ell \quad \ell \\ \text{This} \quad \mathcal { A } = \{ f \colon \mathbb { Z } _ { 2 } ^ { \dot { \gamma } } \times \mathbb { Z } _ { 4 } ^ { \delta } \to \mathbb { Z } _ { 4 } \ \Big | \ f \text{ is affine and} \\ \mathfrak { r } _ { i } ^ { \prime } ( v ).$$ A pair of opposite elements of Z . γ 2 × Z δ 4 , considered as a pair of coordinates of the code C . γ,δ , corresponds to one Z 4 coordinate of the corresponding Z Z 2 4 -additive Hadamard code C . γ,δ = Φ -1 ( C . γ,δ ) . A self-opposite element (i.e., an element of order 1 or 2 ) of Z . γ 2 × Z δ 4 corresponds to a Z 2 coordinate of C . γ,δ . Hence, every monomial automorphism of C . γ,δ corresponds to a permutation automorphism σ of C . γ,δ that preserves the negation, i.e., σ ( -x ) = -σ x ( ) . Denote the set of all such automorphisms by Aut -( C . γ,δ ) ; so, Aut -( C . γ,δ ) glyph[similarequal] MAut( C . γ,δ ) . We start from considering the automorphisms of A . Lemma 4: PAut( A ) is the set of all affine permutations of Z . γ 2 × Z δ 4 that preserve the negation. . Proof: By (1), any affine permutation σ of Z γ 2 × Z δ 4 that satisfies σ ( -x ) = -σ x ( ) is an automorphism of A . Following the arguments of claim (iii) in the proof of Theorem 2, we can see that any component of σ from PAut( A ) is affine and, moreover, preserves the negation. Hence, it is true for the whole σ . Lemma 5: It holds Aut -( C . γ,δ ) = PAut( A ) . Proof: It is straightforward from the definition of C . γ,δ that PAut( A ) ⊆ Aut( C . γ,δ ) . Since by Lemma 4 the permutations from PAut( A ) preserve the negation, we have PAut( A ⊆ ) Aut -( C . γ,δ ) . Given a Z 2 -valued function x from C . γ,δ , we can reconstruct the corresponding Z 4 -valued function f x from A by the rule f x ( v ) = ϕ -1 ( x v , x ( ) ( -v )) . Since an automorphism σ from Aut -( C . γ,δ ) preserves the negation, we have $$\sigma f _ { x } ( v ) & = f _ { x } ( \sigma ^ { - 1 } ( v ) ) = \varphi ^ { - 1 } ( x ( \sigma ^ { - 1 } ( v ) ), x ( - \sigma ^ { - 1 } ( v ) ) ) \\ & = \varphi ^ { - 1 } \left ( x ( \sigma ^ { - 1 } ( v ) ), x ( \sigma ^ { - 1 } ( - v ) ) \right ) \\ \text{the}$$ Consequently, such σ sends functions from A to functions from A , which means Aut -( C . ) ⊆ PAut( A ) . γ,δ The above lemmas and direct calculations, similar to that in Section III, give the following result. Theorem 3: The monomial automorphism group MAut( C . γ,δ ) of the Z Z 2 4 -additive Hadamard code C . γ,δ of type (2 . γ + δ , β ; . γ +1 , δ ) is isomorphic to the group of affine permutations of Z . γ 2 × Z δ 4 that preserve the negation. The cardinality of this group satisfies $$\mathfrak { n } \{ 0, 2 \} \\ + 1 \text{ such } \Lambda ^ { \frac { 1 } { 2 } \dot { \gamma } ^ { 2 } + \frac { 1 } { 2 } \dot { \gamma } + 2 \dot { \gamma } \delta + \frac { 3 } { 2 } \delta ^ { 2 } + \frac { 1 } { 2 } \delta } \prod _ { i = 1 } ^ { \dot { \gamma } } ( 2 ^ { i } - 1 ) \prod _ { j = 1 } ^ { \delta } ( 2 ^ { j } - 1 ).$$ ## V. AN UPPER BOUND ON THE ORDER OF THE PERMUTATION AUTOMORPHISM GROUP In this and next sections, we establish the structure and the order of the permutation automorphism group for the Z Z 2 4 -linear Hadamard codes. In the rest of the paper, we consider Z Z 2 4 -linear codes, which are binary codes, and in the examples, we will use 0 , 1 , 2 , and 3 as short notations for 00 , 01 , 11 , and 10 , respectively, placed in the coordinates α +2 i -1 , α +2 i , i ∈ { 1 , . . . , β } . glyph[negationslash] Let C = C . γ,δ be a Z Z 2 4 -linear Hadamard code of length n and type ( α, β ; . γ +1 , δ ) with α = 0 , where n = 2 . γ +2 δ . The code C is generated by γ = . γ +1 words y , u , . . . , u . 1 γ of order 2 and δ words v , . . . , v 1 δ of order 4 , where y is the all-one word of length n . Let G = G. γ,δ be the matrix formed by the rows y , u , . . . , u . 1 γ , v , . . . , v 1 δ . Let G be the matrix where the columns are all 2 . γ + δ binary columns from { 1 } × { 0 1 , } δ + . γ and half of 2 . γ +2 δ -2 . γ + δ quaternary columns of order 4 from { 2 } × { 0 1 2 3 , , , } δ × { 0 2 , } . γ , each pair of opposite column vectors being represented by only one column, see e.g. [23]. Then, G can be seen as the matrix G where the quaternary columns are written as pairs of binary columns under the Gray map. We assume that δ ≥ 2 , since for δ = 0 and δ = 1 , C is the binary linear Hadamard code of length n = 2 t , so its permutation automorphism group is the general affine group GA( t, 2) , which has order 2 (2 t t -1)(2 t -2) · · · (2 t -2 t -1 ) [19]. The kernel of the code C , Ker( C ) , is generated by the 1+ + δ . γ words y , w , . . . , w 1 δ , u , . . . , u . 1 γ , where w j = v j glyph[star] v j , of order 2 [23]. Let K = K. γ,δ be the matrix formed by these rows y , w , . . . , w 1 δ , u , . . . , u . 1 γ . We assume w.l.o.g. that the columns of K are ordered lexicographically. Lemma 6 ([23]): The matrix K is a generator matrix for Ker( C ) . In particular, Ker( C ) consists of all the elements of the group ( C, glyph[star] ) of order 2 or less (without 1 s and 3 s). Example 1: Let C 1 2 , be the Z Z 2 4 -linear Hadamard of length n = 32 and type (8 , 12; 2 , 2) , that is, generated by γ = . γ +1 = 2 words of order 2 and δ = 2 words of order 4. Then, $$G _ { 1, 2 } = \begin{pmatrix} \frac { 1 1 1 1 \, 1 1 1 1 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 2 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 3 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 1 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ 2 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ Z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ x 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ y 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \, \ z 2 \} \end{pmatrix}$$ and $$K _ { 1, 2 } = \begin{pmatrix} \frac { 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0. \end{pmatrix}$$ $$= \begin{pmatrix} 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0. \end{pmatrix} S _ { 0, 3 } =$$ . Example 2: Let C 0 3 , be the Z Z 2 4 -linear Hadamard code of length n = 64 and type (8 , 28; 1 , 3) , that is, generated by γ = . γ +1 = 1 word of order 2 and δ = 3 words of order 4 . Then, G 0 3 , and K 0 3 , are, respectively, ##  11111111 2222 2222 2222 2222 2222 2222 2222   00001111 0022 0022 0022 1111 1111 1111 1111      , .  00110011 0202 1111 1111 0022 0022 1133 1133    01010101 1111 0202 1313 0202 1313 0202 1313 11111111 2222 2222 2222 2222 2222 2222 2222 00000000 0000 0000 0000 2222 2222 2222 2222 00000000 0000 2222 2222 0000 0000 2222 2222 00000000 2222 0000 2222 0000 2222 0000 2222     All coordinates are naturally divided into 2 . γ + δ groups of size 2 δ , which will be referred to as blocks , such that the columns of K in a block coincide. Similarly, by the values in the rows of K given by w , . . . , w 1 δ , the coordinates are divided into 2 δ groups of size α = 2 . γ + δ , which will be referred to as macroblocks . As representatives of the kernel cosets that partition the code C , we can choose the combinations v s ( ) = s v 1 1 glyph[star] · · · glyph[star] s v δ δ , where s = ( s , . . . , s 1 δ ) ∈ { 0 1 , } δ , that is, C = ⋃ s ∈{ 0 1 , } δ (Ker( C ) + v s ( )) [10]. Let S = S . γ,δ be the matrix consisting from the vectors v s ( ) , s ∈ { 0 1 , } δ , as rows. Lemma 7: For any s , . . . , s 1 δ ∈ { 0 1 , } , we have $$\text{by the} _ { v _ { j } * v _ { j } } \quad v ( s ) = s _ { 1 } v _ { 1 } * \cdots * s _ { \delta } v _ { \delta } = \sum _ { j = 1 } ^ { \delta } s _ { j } v _ { j } + \sum _ { 1 \leq j < j ^ { \prime } \leq \delta } s _ { j } s _ { j ^ { \prime } } w _ { j } \bullet w _ { j ^ { \prime } }, \ ( 2 )$$ where · is the component-wise product of two vectors. Proof: Straightforward using that v glyph[star]v i j = v i + v j + w i · w j [11], [10]. Example 3: Considering the Z Z 2 4 -linear Hadamard code C 1 2 , from Example 1, S 1 2 , is $$\underset { \ell \, \searrow \, \searrow \, \searrow \$$  0000 0000 00 00 00 00 00 00 00 00 00 00 00 00  =    0011 0011 0101 0101 00 11 00 11 01 01 01 01 01 01 01 01 00 11 00 11 01 01 01 01 01 10 01 10    0110 0110 01 10 01 10 01 10 01 10 11 00 11 00 Similarly, considering the Z Z 2 4 -linear Hadamard code C 0 3 , from Example 2, $$\frac { 1 1 } { 1 1 } \cdot \frac { S _ { 0, 3$$ . . Lemma 8: Any automorphism of C stabilizes the partitions of the coordinates into blocks and macroblocks. Proof: Since any automorphism of the code C is an automorphism of its kernel Ker( C ) [22], the image of any block is obviously a block. In order to find an invariant for the macroblocks, we use the structure of the linear span of C . As was shown in [23], the linear span is generated by the words $$\begin{array} {$$ It is straightforward to see the following fact: (i) The matrix formed from w 1 , . . . , w δ , v 1 , . . . , v δ , u 1 , . . . , u . γ as rows consists of all different binary columns of height . γ +2 δ . Then, we observe the next two facts: (ii) Every word of the linear span whose weight is different from n/ 2 has the same value in the coordinates of a fixed macroblock. Indeed, if a linear combination x of the basis words (3) has different values in the same macroblock, then either some u i or some v j is involved to generate x . Assume z , which is u i or v j , is involved. As follows from claim (i), for every coordinate, there is another one such that the values of z are different in these two coordinates, while the values of any other basis word from (3) coincide. Hence, x has different values in each such pair of coordinates, which means that its weight is n/ 2 . (iii) For every two different macroblocks I and I ′ , the linear span contains a word of weight n/ 4 that has different values in the coordinates from these two macroblocks. Indeed, by the definition of the macroblocks, there is w j that has different values in the coordinates of I and I ′ . Then, for any other w j ′ (recall that δ ≥ 2 ), we have w j = w j · w j ′ + w j · ( w j ′ + ) y . Hence, at least one of two words w j · w j ′ and w j · ( w j ′ + ) y of weight n/ 4 differs in the coordinates of I and I ′ . glyph[negationslash] As follows from claims (ii) and (iii), there is an invariant that indicates whether two coordinates belong to the same macroblock or not: coordinates k and k ′ are in different macroblocks if and only if the liner span of C contains a word x = ( x , . . . , x 1 n ) of weight less than n/ 2 such that x k = x k ′ . As an automorphism of a code is obviously an automorphism of its linear span, the partition of the coordinates into macroblocks is stabilized. Lemma 9: Let ψ be an automorphism of C . Then - (i) For every j from 1 to δ , ψ w ( j ) is a linear combination of y , w 1 , . . . , w δ . - (ii) For every i from 1 to . γ , ψ u ( i ) is a linear combination of y , w 1 , . . . , w δ , u 1 , . . . , u . γ . - (iii) For every s ∈ { 0 1 , } δ , $$\psi ( v ( s ) ) & = v ( \sigma ( s ) ) + a$$ where σ is a permutation of the set { 0 1 , } δ , a = a s ( ) ∈ { 0 1 , } , c j = c j ( s ) ∈ { 0 1 , } , b i = b i ( s ) ∈ { 0 1 , } . - (iv) The permutation σ is linear. - (v) If ψ u ( i ) = u i and ψ w ( j ) = w j for all i ∈ { 1 , . . . , γ . } and j ∈ { 1 , . . . , δ } , then the functions a = a s ( ) , c j = c j ( s ) , b i = b i ( s ) are linear. Proof: Since ψ is an automorphism of Ker( C ) [22], the permuted matrix ψ K ( ) remains a generator matrix for Ker( C ) . So, (ii) is obvious. Taking into account Lemma 8, we see that (i) holds as well. (iii) For every s ∈ { 0 1 , } δ , since ψ v s ( ( )) belongs to C = ⋃ s ∈{ 0 1 , } δ (Ker( C ) + v s ( )) , it can be represented as v σ s ( ( )) + ay + ∑ δ j =1 c w j j + ∑ . γ i =1 b u i i ∈ v σ s ( ( )) + Ker( C ) for some σ s ( ) ∈ { 0 1 , } δ , a, c 1 , ..., c δ , b 1 , ..., b . γ ∈ { 0 1 , } . As ψ is a bijective mapping and ψ is an automorphism of Ker( C ) , the mapping σ : { 0 1 , } δ →{ 0 1 , } δ is bijective too. (iv) By Lemmas 7 and 6, we have that v s ( )+ ( v s ′ )+ ( v s ′′ ) ∈ Ker( C ) if and only if s + s ′ + s ′′ = 0 . From (4), we see that ψ v s ( ( )) + ψ v s ( ( ′ )) + ψ v s ( ( ′′ )) ∈ Ker( C ) if and only if σ s ( )+ σ s ( ′ )+ σ s ( ′′ ) = 0 . The condition v s ( )+ ( v s ′ )+ ( v s ′′ ) ∈ Ker( C ) is readily the same as ψ v s ( ( ))+ ψ v s ( ( ′ ))+ ψ v s ( ( ′′ )) ∈ Ker( C ) since ψ ∈ Aut(Ker( C )) . Thus, s + s ′ + s ′′ = 0 is equivalent to σ s ( ) + σ s ( ′ ) + σ s ( ′′ ) = 0 , which means that σ is linear. ↦ ↦ (v) The hypothesis of statement (v) implies that ψ does not permute the blocks. By Lemma 7, for every block I such that all but one w 1 , . . . , w δ vanish on I , the mapping s → v s ( ) | I is linear. Moreover, permuting the coordinates within the block does not change this property, i.e., the mapping s → ψ v s ( ( )) | I is linear too. We first consider the first such block I = { 1 , . . . , 2 δ } . Since w , . . . , w 1 δ and u , . . . , u . 1 γ vanish on I , equation (4) turns to ψ v s ( ( )) | I = v σ s ( ( )) | I + a s y ( ) | I . We see that the mapping s → a s ( ) must be linear. Similarly, considering the block I such that all w 1 , . . . , w δ and u 1 , . . . , u . γ except u i (or w j ) vanish on I , we obtain the linearity of the mapping s → b i ( s ) for i = 1 , . . . , γ . ( s → c j ( s ) for j = 1 , . . . , δ , respectively). ↦ ↦ ↦ Lemma 10: Let ψ be an automorphism of C such that ψ u ( i ) = u i and ψ w ( j ) = w j for all i ∈ { 1 , . . . , γ . } and j ∈ { 1 , . . . , δ } . If δ ≥ 3 , then σ defined in Lemma 9 is the identity permutation. Proof: The hypothesis of the lemma implies that ψ stabilizes every block of coordinates. The idea of the proof is to show that any nonidentical permutation σ breaks the linear relations between the vectors v s ( ) in a fixed block I of coordinates. glyph[negationslash] We already know that σ : { 0 1 , } δ →{ 0 1 , } δ is a nonsingular linear transformation. It remains to show that σ fixes every basis vector e j that has 1 in the j th position and 0 otherwise. We will prove this for e 1 , as the other cases are similar. First, let us prove for example that σ e ( 1 ) = t for every t = ( t 1 , . . . , t δ ) such that t 2 = 1 . Consider a block I such that all w 1 , . . . , w δ vanish on I except vectors w 2 and w 3 , for which w 2 | I = w 3 | I = 1 (where 1 is the all-one word of length 2 δ ). Note that w 3 exists because δ ≥ 3 . Then, by Lemma 7, $$v ( s ) | _ { I } = \sum _ { j = 1 } ^ { \d$$ glyph[negationslash] glyph[negationslash] It is straightforward to see that the mapping v I ( s ) = v s ( ) | I : { 0 1 , } δ → { 0 1 , } 2 δ is linear in the direction e 1 , since v I ( s ) + v I ( s + e 1 ) = v 1 | I is constant; and it is nonlinear in the direction t , as v I ( s ) + v I ( s + ) = t x +( s t 2 3 + s 3 )1 is not constant, where x is a constant vector. However, we see from (4) that v I ( σ s ( )) is also linear in the direction e 1 , that is, v I ( s ) is linear in the direction σ e ( 1 ) . We see that σ e ( 1 ) = t . Similarly, this holds for every t such that t k = 1 for some k = 1 ; so, the only remaining possibility is σ e ( 1 ) = e 1 . Similarly, σ e ( j ) = e j for every j ; hence, the linear map σ is just the identity. glyph[negationslash] Example 4: In the matrix S 0 3 , of Example 3, we can see that v I ( s ) + v I ( s + ) = t v 1 | I , so it does not depend on s for the forth block I = 25 { , . . . , 32 } and for t = (1 0 0) , , . This is not true for t = (0 0 0) (1 0 0) , , , , , . Proposition 1: If δ ≥ 2 , then the order of the automorphism group of C satisfies $$& \ g r v a p \, \upsilon _ { j } \, \succeq s u a n y e s & & i t \\ & | \text{Aut} ( C ) | \leq p \cdot 2 ^ { \frac { 1 } { 2 } } \dot { \gamma } ( \dot { \gamma } + 1 ) + 2 \dot { \gamma } \delta + \frac { 3 } { 2 } \delta ( \delta + 1 ) } \prod _ { i = 1 } ^ { \dot { \gamma } } ( 2 ^ { i } - 1 ) \prod _ { j = 1 } ^ { \delta } ( 2 ^ { j } - 1 ), \quad \text{Pre} \\ & \quad \text{result is}$$ where p = 6 if δ = 2 and p = 1 if δ ≥ 3 . Proof: Let ψ ∈ Aut( C ) . We evaluate the number of possibilities for the matrices ψ K ( ) and ψ S ( ) . Clearly, ψ y ( ) = y . By Lemma 9, for every j from 1 to δ , ψ w ( j ) is a linear combination of y , w 1 , . . . , w δ . However, as ψ w ( j ) must be linearly independent on y , ψ w ( 1 ) , . . . , ψ w ( j -1 ) , there are at most 2 δ +1 -2 j possibilities for ψ w ( j ) , for each choice of y , ψ w ( 1 ) , . . . , ψ w . ( j -1 ) . Similarly, for every i from 1 to . γ , there are at most 2 δ + +1 γ -2 δ + i possibilities for ψ u ( i ) . In total, ψ K ( ) is one of the $$\psi ( K ) & \text{ is one of the} \\ \prod _ { j = 1 } ^ { \delta } ( 2 ^ { \delta + 1 } - 2 ^ { j } ) \prod _ { i = 1 } ^ { \dot { \gamma } } ( 2 ^ { \delta + \dot { \gamma } + 1 } - 2 ^ { \delta + i } ) \\ & = 2 ^ { \frac { 1 } { 2 } \dot { \gamma } ( \dot { \gamma } + 1 ) + \dot { \gamma } \delta + \frac { 1 } { 2 } \delta ( \delta + 1 ) } \prod _ { i = 1 } ^ { \dot { \gamma } } ( 2 ^ { i } - 1 ) \prod _ { j = 1 } ^ { \delta } ( 2 ^ { j } - 1 ) \quad ( 5 ) \quad \text{For } \dot { \gamma } \ \colon \\ \text{matrix each obtained from } K \text{ by non-similar transformation are} \ \text{a} \quad \text{$\ \ } \ \text{$\ \ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \text{$\ } \ \end{$$ matrices obtained from K by nonsingular transformations as above. Now suppose that we know ψ K ( ) and count the possibilities for ψ S ( ) . W.l.o.g., ψ K ( ) = K . First, consider the case δ ≥ 3 . By Lemmas 9(iii), 9(v) and 10, all ψ v s ( ( )) are uniquely defined by 1+ δ + . γ linear functions a , c 1 , . . . , c δ , b 1 , . . . , b . γ : { 0 1 , } δ → { 0 1 , } . Note that, in the current corollary, we do not state yet that every possibility is realizable by some ψ . We totally have at most (2 ) δ 1+ + . γ δ choices for ψ S ( ) , given ψ K ( ) . Multiplying this last value by (5), we obtain the required bound. Finally, if δ = 2 , then the same arguments work with the only exception that there are additional possibilities to choose a nonsingular linear mapping σ : { 0 1 , } 2 → { 0 1 , } 2 , accordingly to Lemma 9(iii) and 9(iv), which gives the factor p = 6 = (2 2 -1)(2 2 -2) . ## VI. THE PERMUTATION AUTOMORPHISM GROUP OF A Z Z 2 4 -LINEAR HADAMARD CODE By Lemma 3, any nonsingular affine transformation of Z . γ 2 × Z δ 4 belongs to Aut( C ) . Therefore, since for δ ≥ 3 , the number of nonsingular affine transformations coincides with the upper bound given in Proposition 1, we obtain the following result: Theorem 4: The permutation automorphism group of the Z Z 2 4 -linear Hadamard code C of type ( α, β ; . γ +1 , δ ) , with δ . ≥ 3 , is the group of nonsingular affine transformations of Z γ 2 × Z δ 4 . Therefore, its order is $$& \text{that is, } \quad \omega _ { 2 } \wedge \partial _ { 4 } \cdot \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \, \text{and,} \end{cases}$$ It remains to consider the case δ = 2 . Lemma 11: Let C be the Z Z 2 4 -linear Hadamard code of type ( α, β ; . γ +1 2) , . - (i) Any nonsingular linear mapping σ : { 0 1 , } 2 →{ 0 1 , } 2 , as defined in Lemma 9(iii), corresponds to an automorphism ψ of C that stabilizes every block. - (ii) Moreover, if this automorphism ψ is not identical, then it is not an affine transformation of Z . γ 2 × Z 2 4 . Proof: (i) There are exactly p = 6 = (2 2 -1)(2 2 -2) such permutations. For . γ = 0 , it is easy to check that the result is true. The coordinate permutations ψ corresponding to two permutations σ are shown on the following diagram; the other three nonidentity variants for σ can be expressed from these two using composition. $$\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \ delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta\delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \dta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \Delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \digma \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \ Delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \geq 1, \, the \, 4 \, \text{rows} \, v ( s ) \, \text{ of } \, S _ { \gamma, 2 }, \, s \, \in \, \{ 0, 1 \} ^ { 2 }, \, c }$$ For . γ ≥ 1 , the 4 rows v s ( ) of S . γ, 2 , s ∈ { 0 1 , } 2 , contain in each one of their 4 macroblocks of size 2 . γ +2 , the same coordinates corresponding to the same macroblock in the row v s ( ) of S 0 2 , repeated 2 . γ times. Therefore, the result follows. glyph[negationslash] (ii) We first note that, as follows from the first part of the proof, the considered automorphisms fix a coordinate from every block. Now, let us consider an arbitrary affine permutation ψ that fixes a coordinate from every block and show that it is the identity permutation id . Assume, seeking a contradiction, that ψ = id . Consider the map ξ = ψ -id . It is an affine map from Z . γ 2 × Z 2 4 to Z . γ 2 × Z 2 4 . It possesses the zero value in a point from every block and a nonzero value in at least one point. Consider a nonconstant linear mapping λ from the image of ξ onto { 0 2 , } . Then, the map λξ from Z . γ 2 × Z 2 4 to { 0 2 , } is affine and is not constantly zero. By Lemma 6, λξ belongs to the kernel of C . However, as λξ is zero in a point from every block, by the definition of the blocks, it is constantly zero. We get a contradiction. Theorem 5: The automorphism group of the Z Z 2 4 -linear Hadamard code C of type ( α, β ; . γ + 1 2) , consists of all permutations expressed as ψα , where α is a nonsingular affine transformation of Z . γ 2 × Z 2 4 and ψ is one of the six permutations defined in Lemma 11. The order of this automorphism group is . $$| \text{Aut} ( C ) | = 6 \cdot 2 ^ { \frac { 1 } { 2 } \dot { \gamma } ( \dot { \gamma } + 1 ) + 4 \dot { \gamma } + 9 } \cdot 3 \prod _ { i = 1 } ^ { \dot { \gamma } } ( 2 ^ { i } - 1 ).$$ Proof: By Lemma 11(i), all the permutations are automorphisms of C . By Lemma 11(ii), they are mutually different. We can see that the lower bound given by counting all such permutations coincides with the upper bound from Proposition 1. ## REFERENCES - [1] S. V. Avgustinovich, F. I. Solov'eva, and O. Heden, 'On the structure of symmetry groups of Vasil'ev codes,' Probl. Inf. Transm. , vol. 41, no. 2, pp. 105-112, 2005, DOI: 10.1007/s11122-005-0015-5 - [2] H. Bauer, B. Ganter, and F. Hergert, 'Algebraic techniques for nonlinear codes,' Combinatorica , vol. 3, no. 1, pp. 21-33, 1983, DOI: 10.1007/BF02579339 - [3] J. Bierbrauer, Introduction to Coding Theory , ser. Discrete and Combinatorial Mathematics Series. Chapman &amp; Hall/CRC, 2005. - [4] J. Borges, C. Fern´ andez-C´rdoba, J. Pujol, J. Rif` a, and M. Villanueva, o ' Z Z 2 4 -linear codes: Generator matrices and duality,' Des. Codes Cryptography , vol. 54, no. 2, pp. 167-179, 2010, DOI: 10.1007/s10623009-9316-9 arXiv:0710.1149 - [5] J. Borges, K. T. Phelps, and J. Rif` a, 'The rank and kernel of extended 1 -perfect Z 4 -linear and additive nonZ 4 -linear codes,' IEEE Trans. Inf. Theory , vol. 49, no. 8, pp. 2028-2034, 2003, DOI: 10.1109/TIT.2003.814490 - [6] J. Borges and J. Rif` a, 'A characterization of 1 -perfect additive codes,' IEEE Trans. Inf. Theory , vol. 45, no. 5, pp. 1688-1697, 1999, DOI: 10.1109/18.771247 - [7] P. Delsarte, An Algebraic Approach to Association Schemes of Coding Theory , ser. Philips Res. Rep., Supplement, 1973, vol. 10. - [8] P. Delsarte and V. I. Levenshtein, 'Association schemes and coding theory,' IEEE Trans. Inf. Theory , vol. 44, no. 6, pp. 2477-2504, 1998, DOI: 10.1109/18.720545 - [9] C. Fern´ andez-C´rdoba, o K. T. Phelps, and M. Villanueva, 'Involutions in binary perfect codes,' IEEE Trans. Inf. Theory , vol. 57, no. 9, pp. 5926-5932, 2011, DOI: 10.1109/TIT.2011.2162185 - [10] C. Fern´ andez-C´rdoba, J. Pujol, and M. Villanueva, ' o Z Z 2 4 -linear codes: Rank and kernel,' Des. Codes Cryptography , vol. 56, no. 1, pp. 43-59, 2010, DOI: 10.1007/s10623-009-9340-9 arXiv:0807.4247 - [11] A. R. Hammons, Jr, P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Sol´ e, 'The Z 4 -linearity of Kerdock, Preparata, Goethals, and related codes,' IEEE Trans. Inf. Theory , vol. 40, no. 2, pp. 301-319, 1994, DOI: 10.1109/18.312154 - [12] O. Heden, 'On the symmetry group of perfect 1 -error correcting binary codes,' J. Comb. Math. Comb. Comput. , vol. 52, pp. 109-115, 2005. - [13] O. Heden, F. Pasticci, and T. Westerb¨ ack, 'On the existence of extended perfect binary codes with trivial symmetry group,' Adv. Math. Commun. , vol. 3, no. 3, pp. 295-309, 2009, DOI: 10.3934/amc.2009.3.295 - [14] W. C. Huffman and V. Pless, Fundamentals of Error-Correcting Codes . Cambridge Univ. Press, 2003, DOI: 10.1017/CBO9780511807077 - [15] D. S. Krotov, ' Z 4 -linear perfect codes,' Diskretn. Anal. Issled. Oper., Ser.1 , vol. 7, no. 4, pp. 78-90, 2000, in Russian. Translated at arXiv:0710.0198 - [16] D. S. Krotov, ' Z 4 -linear Hadamard and extended perfect codes,' in WCC2001, International Workshop on Coding and Cryptography , ser. Electron. Notes Discrete Math., D. Augot and C. Carlet, Eds. Elsevier B.V., 2001, vol. 6, pp. 107-112, DOI: 10.1016/S15710653(04)00161-1 - [17] D. S. Krotov, 'On the automorphism groups of the additive 1 -perfect binary codes,' in 3rd International Castle Meeting on Coding Theory and Application , J. Borges and M. Villanueva, Eds. Bellaterra, Spain: Universitat Aut` onoma de Barcelona. Servei de Publicacions, 2011, pp. 171-176. See arXiv:1602.00036 - [18] D. S. Krotov and M. Villanueva, 'On the automorphism groups of the z 2 z 4 -linear Hadamard codes and their classification,' in Coding Theory and Applications: 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 , ser. CIM Series in Mathematical Sciences, R. Pinto, P. Rocha Malonek, and P. Vettori, Eds. Springer, 2015, vol. 3, pp. 237-243, DOI: 10.1007/978-3-319-17296-5 25 - [19] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes . Amsterdam, Netherlands: North Holland, 1977. - [20] J. Pernas, J. Pujol, and M. Villanueva, 'Classification of some families of quaternary Reed-Muller codes,' IEEE Trans. Inf. Theory , vol. 57, no. 9, pp. 6043-6051, 2011, DOI: 10.1109/TIT.2011.2119465 - [21] J. Pernas, J. Pujol, and M. Villanueva, 'Characterization of the automorphism group of quaternary linear Hadamard codes,' Des. Codes Cryptography , vol. 70, no. 1-2, pp. 105-115, 2014, DOI: 10.1007/s10623012-9678-2 - [22] K. T. Phelps and J. Rif` a, 'On binary 1 -perfect additive codes: Some structural properties,' IEEE Trans. Inf. Theory , vol. 48, no. 9, pp. 25872592, 2002, DOI: 10.1109/TIT.2002.801474 - [23] K. T. Phelps, J. Rif` a, and M. Villanueva, 'On the additive ( Z 4 -linear and nonZ 4 -linear) Hadamard codes: Rank and kernel,' IEEE Trans. Inf. Theory , vol. 52, no. 1, pp. 316-319, 2006, DOI: 10.1109/TIT.2005.860464 - [24] J. Pujol, J. Rif`, and F. I. Solov'eva, 'Construction of a Z 4 -linear ReedMuller codes,' IEEE Trans. Inf. Theory , vol. 55, no. 1, pp. 99-104, 2009, DOI: 10.1109/TIT.2008.2008143 arXiv:0801.3024 - [25] J. Rif` a and J. Pujol, 'Translation-invariant propelinear codes,' IEEE Trans. Inf. Theory , vol. 43, no. 2, pp. 590-598, 1997, DOI: 10.1109/18.556115 - [26] F. I. Solov'eva, 'On Z 4 -linear codes with the parameters of Reed-Muller codes,' Probl. Inf. Transm. , vol. 43, no. 1, pp. 26-32, 2007, DOI: 10.1134/S0032946007010048 translated from Probl. Peredachi Inf., vol. 43, no. 1, pp. 32-38, 2007.
10.1109/TIT.2014.2379644
[ "Denis Krotov", "Mercè Villanueva" ]
2014-08-05T23:51:20+00:00
2019-01-09T06:05:06+00:00
[ "cs.IT", "math.CO", "math.IT", "94B05, 94B25" ]
Classification of the Z2Z4-linear Hadamard codes and their automorphism groups
A $Z_2Z_4$-linear Hadamard code of length $\alpha+2\beta=2^t$ is a binary Hadamard code which is the Gray map image of a $Z_2Z_4$-additive code with $\alpha$ binary coordinates and $\beta$ quaternary coordinates. It is known that there are exactly $[(t-1)/2]$ and $[t/2]$ nonequivalent $Z_2Z_4$-linear Hadamard codes of length $2^t$, with $\alpha=0$ and $\alpha\not=0$, respectively, for all $t\geq 3$. In this paper, it is shown that each $Z_2Z_4$-linear Hadamard code with $\alpha=0$ is equivalent to a $Z_2Z_4$-linear Hadamard code with $\alpha\not=0$; so there are only $[t/2]$ nonequivalent $Z_2Z_4$-linear Hadamard codes of length $2^t$. Moreover, the order of the monomial automorphism group for the $Z_2Z_4$-additive Hadamard codes and the permutation automorphism group of the corresponding $Z_2Z_4$-linear Hadamard codes are given.
1408.1148v2
## Cubic Rashba spin-orbit interaction of two-dimensional hole gas in strainedGe/SiGe quantum well Rai Moriya 1,a) , Kentarou Sawano , Yusuke Hoshi 2 1,2,*) , Satoru Masubuchi 1,3 , Yasuhiro Shiraki , 2 Andreas Wild 4,5 , Christian Neumann 5 , Gerhard Abstreiter 4,6 , Dominique Bougeard , Takaaki Koga , and Tomoki Machida 5 7 1,3,b) 1 Institute of Industrial Science, University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan 2 Advanced Research Laboratories, Tokyo City University, 8-15-1 Todoroki, Setagaya-ku, Tokyo 158-0082, Japan 3 Institute for Nano Quantum Information Electronics, University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan 4 Walter Schottky Institut and Physics Department, Technische Universität München, Am Coulombwall 4, 85748 Garching, Germany 5 Institut für Experimentelle und Angewandte Physik, Universität Regensburg, Universitätsstraße 31, 93040 Regensburg, Germany 6 Institute for Advanced Study, Technische Universität München, Lichtenbergstraße 2a, 85748 Garching, Germany 7 Division of Electronics for Informatics, Graduate School of Information Science and Technology, Hokkaido University, Hokkaido 060-0814, Japan The spin-orbit interaction (SOI) of the two-dimensional hole gas in the inversion symmetric semiconductor Ge is studied in a strained-Ge/SiGe quantum well structure. We observed weak anti-localization (WAL) in the magnetoconductivity measurement, revealing that the WAL feature can be fully described by the k -cubic Rashba SOI theory. Furthermore, we demonstrated electric field control of the Rashba SOI. Our findings reveal that the heavy hole (HH) in strained-Ge is a purely cubic-Rashba-system, which is consistent with the spin angular momentum mj = ±3/2 nature of the HH wave function. a) E-mail: [email protected] b) E-mail: [email protected] *) Present address: Graduate School of Engineering, Nagoya University, Nagoya 4648603, Japan The spin-orbit interaction (SOI) in a two-dimensional system is a subject of considerable interest because the SOI induces spin splitting at zero magnetic field, which is important in both fundamental research and electronic device applications [1]. Recent developments of SOI-induced phenomena in solid state demonstrate many possibilities utilizing spin current and the emergence of new physics such as the spin interferometer [2,3], persistent spin helix [4,5], spin Hall effect [6,7,8], and quantum spin Hall effect [9,10]. Up to now, there have been two well-known SOIs existing in solids: the Dresselhaus SOI [11] due to bulk inversion asymmetry (BIA) in the crystal structure and the Rashba SOI [12,13] due to spatial inversion asymmetry (SIA). In low-dimensional systems, the Rashba SOI becomes more important because it is stronger at the heterointerface and can be controlled by an external electric field. Many of the pioneering studies on SOI-induced phenomena mentioned above were performed in two-dimensional electron systems, where the Rashba SOI is described by the k -linear Rashba term. In the Hamiltonian, the k -linear Rashba term can be written as ( ) R1 1 z H E i k k α σ + σ --+ = -, where ( ) 1 2 x y i σ ± σ σ = ± denote combinations of Pauli spin matrices, x y k k ik ± = ± , and kx , ky are the components of the in-plane wave vector || k . The effective magnetic field ( ) 1 || Ω k acting on the transport carrier due to the k -linear Rashba term is illustrated in Fig. 1(a). Recently, a higher-order contribution of the Rashba SOI, the so-called k 3 ( k -cubic) Rashba SOI, has received more attention [14,15]. The Hamiltonian for the k -cubic Rashba SOI is expressed as ( ) 3 3 R3 3 z H E i k k α σ + σ --+ = -[16], and the effective magnetic field ( ) 3 || Ω k in k -space is illustrated in Fig. 1(b) [15]. There is a significant difference in the effective field symmetry between the k -linear and the k -cubic Rashba SOI with one and three rotations in k -space, respectively. The k 3 symmetry of SOI is an interesting subject because it influences all of the SOI-induced phenomena instead of k -linear Rashba term. For example, in case of the spin Hall effect, the k -cubic Rashba term is predicted to give rise to a larger spin Hall conductivity [17,18,19]. Recently, the cubic-Rashba SOI has been reported on a two-dimensional hole gas (2DHG) in inversion asymmetric semiconductors InGaAs and GaAs [20,21], and a twodimensional electron gas formed at a surface of inversion symmetric oxide SrTiO3 [15]. However in the former case, the InGaAs and GaAs possess both BIA and SIA, thus they are always influenced by both Dresselhaus and Rashba SOI contributions [22]. Because the Dresselhaus SOI also has k -cubic dependence, the cubic-Rashba SOI is difficult to observe independently. In the latter case, a complex electric structure of the SrTiO3 makes it difficult to compare with existing Rashba theory and theoretical development on the spin orbit interaction in perobskite-oxide is still in progress. Consequently, material systems with a simple band structure and pure cubic-Rashba SOI are in high demand. Here, we propose a purely cubic-Rashba SOI system: the single element semiconductor Ge. Because Ge does not have a BIA, the Dresselhaus SOI is essentially absent. Thus, the SOI in Ge is described only with Rashba term. The valence band structure of Ge around the Γ point is schematically illustrated in Fig. 1(c). The valence band hole has a p -orbital wave function with orbital angular moment l = 1; therefore, it has total angular momentum j = 3/2 and j = 1/2. The j = 3/2 and j = 1/2 hole states are separated from each other due to the atomic SOI. While the separated = j 1/2 state is called the split-off (SO) state as indicated in the Fig 1(c). The j = 3/2 state further splits into the mj = ± 3/2 heavy hole (HH) and mj = ± 1/2 light hole (LH) states. Among the hole states, the wave function described by mj = ± 1/2 possesses k -linear Rashba SOI. The k -linear Rashba SOI is also dominant in most studied conduction band electron cases since conduction band is fully described by mj = ± 1/2 wave function. On the other hand, for mj = ± 3/2, Rashba SOI exhibits k -cubic dependence. Further, in the strained-Ge/SiGe quantum well (QW) structure, owing to compressive strain in the Ge well, the degeneracy of the HH and LH band at k = 0 can be lifted. The separation between HH and LH band can be as large as ~100 meV with increasing amounts of strain. Thus, the top of the valence band can be tuned to HH state. Recent advances in the Ge and SiGe epitaxial growth technology revealed that it is possible to fabricate high crystal quality strained-Ge/SiGe QW on Si substrates [23,24]. Thus, strained Ge/SiGe provides a good platform to study the cubic-Rashba SOI in simple single element semiconductors and will offer an interesting comparison with existing SOI theory. In this Letter, we experimentally reveal cubic-Rashba SOI in 2DHG in Ge/SiGe QW. Comparing the weak localization (WL) and weak anti-localization (WAL) measurements with the analysis of the linear- and cubic-Rashba SOI terms, we found that spin transport in the 2DHG can be fully explained by the cubic-Rashba SOI. The SOI magnitude can be controlled with the gate voltage. These findings are all consistent with the mj = ±3/2 characteristics of the HH band in strained-Ge QW, which obeys the cubic-Rashba Hamiltonian. A strained-Ge/SiGe single QW is grown by using solid source molecular beam epitaxy. First, a fully relaxed Si0.5Ge0.5 buffer layer is grown on Si(001) substrate. On top of this layer, the following QW structure is grown: 10 p -Si0.5 Ge0.5/10 Si0.5Ge0.5/20 Ge/30 Si0.5 Ge0.5/3 Si (units in nm). Due to lattice mismatch (~2.1%) between the Ge and Si0.5 Ge0.5 layer, the Ge QW layer is compressively strained. After patterning the wafer in the Hall bar structure, an Al2O3 dielectric layer with 75-nm thickness is deposited using atomic layer deposition, and then a Pd/Au gate electrode is deposited. The application of gate voltage enables us to tune the hole density of the 2DHG in the QW. The magnetotransport is measured in a variable temperature cryostat at the temperature range of 1.6 - 10 K. A magnetic field is applied perpendicular to the sample plane using a superconducting magnet. First, the change in the sheet resistance R sheet and hole concentration n hole at various back gate voltage V G is shown in Fig. 2(a). When V G is decreased from +1.2 V to -0.4 V, R sheet ( n hole ) monotonically decreases (increases). This change accompanies the variation of hole mobility from 2000 to 5200 cm /Vs. The change in the hole effective mass 2 m hole with respect to V G is shown in Fig. 2(b). The effective mass of the holes are determined from the temperature dependence of the Shubnikov-de Haas oscillation. The effective mass increases with the hole concentration and this is due to the non-parabolicity of the valence band [25,26]. Next, we show the magnetoconductivity ∆σ(Β) = σ ( B )-σ ( B =0) measured at various V G in Fig. 2(c). Under a gate sweep of V G = +1.0 V to -0.4 V, ∆σ(Β) is significantly modulated. In the high-field region, the conductivity monotonically increases with the external magnetic field, which we attribute to the WL. Together with the WL feature, in the high hole density region ( V G &lt; +0.2 V) a conductance peak appears when the magnetic field is near zero. This conductance peak is due to the WAL. The cross-over points of ∆σ(Β) , which are indicated by arrows in Fig. 2(c), shift position from low magnetic field to high magnetic field with decreasing the V G. The cross-over points are roughly proportional to the magnetic field for SOI, B SO; the larger B SO produces a larger cross-over point field. Thus, our results suggest that the SOI can be tuned with gate voltage. Observed WL and WAL data have been analyzed by using Iordanskii, Lyanda-Geller, Pikus (ILP) theory for magnetoconductivity which took into account both linear- and cubic-Rashba SOI [15,20,27]. The general formula of ILP theory is provided in the Supplemental Material [28]. We limited our fitting within diffusive transport regime where the magnetic field B is within the range 2 tr m / 2 B B el &lt; = /planckover2pi , where B tr denotes the transport field characterizing the elastic scattering time of the hole, the Planck's constant, e the electron charge, and l m the mean free path of the hole. In the ILP theory, we only consider the Rashba SOI since there is no structural inversion asymmetry in the Ge. Both k -linear Ω 1 and k -cubic Ω 3 effective magnetic fields in frequency units are incorporated [15]. Under these conditions, the fitting parameters to analyze experimental data are characteristic magnetic fields for the phase coherence 4 B eD φ φ τ = /planckover2pi , for the k - linear spin-orbit coupling 2 SO1 1 tr 2 4 B eD τ = Ω /planckover2pi , and for the k -cubic spin-orbit coupling 2 SO3 3 tr 2 4 B eD τ = Ω /planckover2pi , where D denotes the diffusion constant, τφ the phase coherent time of the carrier, and τ tr the elastic scattering time. By setting either B SO3 = 0 or B SO1 = 0 in the ILP model, the formulas with only the k -linear term or the k -cubic term are obtained [28]. In Fig. 3, we present the experimental data (open circles) and fitting results with only the k -linear term (blue dashed line) or only the k -cubic term (red solid line). We found that fitting with only the cubic-Rashba term revealed good agreement with the experimental results regardless of the V G value. Whereas, the linear-Rashba term is insufficient for explaining the larger field region of the WAL data. The low magnetic field region can be fitted with both the linear- and cubic- models because this region is determined by the B φ term rather than B SO. However, we observed significantly different behavior between the linear- and cubic-Rashba terms in the larger magnetic field region. The cubic-Rashba model explains the experimental data more precisely, thus we believe the cubic-Rashba model is relevant for the HH band in Ge. Fig. 4(a) shows B SO3 and B φ obtained by the fitting with cubic-Rashba model. Both B SO3 and B φ systematically change with V G. When B SO3 &gt; B φ , WAL is observed, and WL is observed when B SO3 &lt; B φ . The change of B SO3 provides a direct evidence of electric field control of the cubic-Rashba SOI. Note that the change of B φ with respect to the V G is due to the change of hole mobility, and this gives rise to a longer phase coherence time τφ with increasing hole concentration. If k -dependent spin splitting due to SOI exists, the spin relaxation is described by the Dyakonov-Perel mechanism with 2 SO tr 1 τ τ ∝ ∆ [29], where ∆ is the spin splitting energy and τ SO denotes spin relaxation time. On the other hand, if spin-flip scattering is the dominant spin relaxation mechanism, the Elliot-Yafet mechanism with ( ∆ ) 2 SO tr g τ τ ∝ ( ∆ g is the shift of electron g factor from that of free electrons) is relevant for describing our results. Therefore, the comparison between τ SO and τ tr provides additional evidence for Rashba-type SOI. The τ SO and τ tr terms can be calculated using the relations SO3 SO 4 B eD τ = /planckover2pi , 2 F tr 2 , D v τ = F F hole v k m = /planckover2pi , and k F = 2 π n hole , where v F is the Fermi velocity and k F is the Fermi wave vector. We plotted τ SO and τ tr with respect to the hole concentration as shown in Fig. 4(b). We found that τ tr increases with increasing carrier concentration, whereas τ SO decreases. This is consistent with the Dyakonov-Perel spin relaxation mechanism. Therefore, it provides further evidence that the Rashba SOI is a dominant spin-orbit contribution in the 2DHG. The agreement between the experimental data and the k -cubic term only condition of the ILP theory reveals the existence of purely cubic-Rashba SOI in the 2DHG. We now evaluate the spin splitting energy from the relationship 3 ∆ = Ω /planckover2pi . The change of ∆ with respect to hole concentration is shown in Fig. 4(c). We obtained ∆ of 0.3 -0.4 meV; we find larger spin splitting with increasing hole concentration. This spin splitting provides direct experimental evidence of the cubic-Rashba SOI induced splitting in strained-Ge. To analyze the splitting in more detail, we calculated the coefficient α 3 Ez for the cubicRashba SOI using the relation ∆ = 3 3 3 z E k α = Ω /planckover2pi , as shown in Fig. 4(d). The coefficient α 3 E z decreases with increasing hole concentration. We believe that this is due to the change of gate-induced electric field Ez in the QW rather than change of α 3 . Here, the Rashba coefficient α 3 for the first HH sub band is expressed as follows: $$\alpha _ { 3 } = \frac { - 3 e \hbar { ^ { 4 } } \gamma _ { 3 } ^ { 2 } } { 2 m _ { 0 } ^ { 2 } \left ( E _ { _ { \text{HH} } } - E _ { _ { \text{LH} } } \right ) ^ { 2 } }$$ where γ 3 denotes the Luttinger parameter, E HH and E LH are the energies of the lowest HH and LH sub-band, respectively. Eq. (1) is derived from the Luttinger Hamiltonian using the partitioning method presented by Ohkawa and Uemura [13]. Eq. (1) suggests that α 3 is inversely proportional to the square of the separation between the HH and LH energy. Qualitatively similar expression with eq. (1) is also reported by other groups [14,20]. In a single heterostructure, the HH-LH separation changes with the external electric field, thus demonstrating gate-control of α 3 [30]. However, in the QW, the change in HH and LH separation with external electric field should be small. Furthermore, because the HH-LH separation in the Ge/Si0.5Ge0.5 QW is initially large due to strain, the gate-induced change of HH-LH separation is one order smaller than its total HH-LH separation energy; therefore, we think α 3 is almost constant over the studied hole concentration range. For these reasons, we believe that the results shown in Fig. 4(d) reflect the change of effective electric field in the QW under the application of gate voltage. Because the gateinduced electric field in the QW opposes the initial electric field due to modulation doping on the bottom side of the QW, the increase of the hole concentration in the QW decreases its internal electric field. Thus, α 3 E z decreases with increasing hole concentration. Eq. (1) suggests another interesting aspect of the cubic-Rashba coefficient. The Rashba coefficient can be strongly tuned with the HH-LH separation. We estimated α 3 using Eq. (1) with γ 3 = 5.69 for Ge [1]. The HH-LH splitting for compressively strainedGe/Si0.5Ge0.5 is ~110 meV [31]. We obtained α 3 = 2.26 × 10 eÅ 5 4 . The coefficient α 3 is about one order smaller than the 2DHG in the GaAs/AlGaAs single heterostructure [21], which is a nearly lattice matched system. The smaller α 3 value is due to the large HH-LH separation in Ge/Si0.5Ge0.5 compared to that of the GaAs/AlGaAs structure; large HH-LH separation decreases the coefficient α 3 . In the strained-Ge/SiGe QW, the HH-LH separation can be tuned by the strain due to the SiGe layer; in other words, the composition x of Si1x Ge buffer layer enables a wide range of tuning options for cubicx Rashba SOI. Note that Ge has larger γ 3 value than Si ( γ 3 = 1.45) [1]; thus we expect larger SOI for 2DHG in Ge than that of Si. Therefore 2DHG in strained-Ge is promising material for utilizing cubic-Rashba SOI in low dimensional system. ## Acknowledgements We appreciate the valuable discussions with H. Nakamura. This work was partly supported by Grants-in-Aid for Scientific Research (Grant Numbers 24684024, 24340065, 25600079, and 26286044) from the Japan Society for the Promotion of Science (JSPS); the Project for Developing Innovation Systems of the Ministry of Education, Culture, Sports and Technology; the Deutsche Forschungsgemeinschaft via SFB 631; Deutsche Forschungsgemeinschaft via SFB 631; the Nanosystems Initiative Munich; and the Hitachi Metals·Materials Science Foundation. ## Figure captions ## Fig. 1 (Color online) (a,b) The effective magnetic field direction with respect to the in-plane wave vector k for (a) the linear-Rashba term, 1 Ω and (b) the cubic-Rashba term, 3 Ω . (c) Schematic illustration of the valence band structure for Ge. The HH-, LH-, and SO-band are indicated. ## Fig. 2 (Color online) (a,b) The V G dependence of (a) sheet resistance R sheet and hole concentration n hole and (b) the hole effective mass m hole . (c) The change of magnetoconductance ∆σ (B) measured at 1.6 K at various V G. ## Fig. 3 (Color online) The V G dependence of magnetoconductance ∆σ (B) shown with the fitting results from the ILP model. Black open circles indicate experimental data, and the red solid line and blue dashed lines show calculations using the ILP model for the cubicand linear-Rashba terms, respectively. ## Fig. 4 (Color online) (a) The V G dependence of the characteristic magnetic fields for the k -cubic spin-orbit coupling B SO3 and the phase coherence B φ . (b) Hole concentration dependence of the spin relaxation time τ SO and momentum scattering time τ tr . (c) Spin- splitting energy ∆ versus the hole concentration. (d) The change of Rashba spin-orbit coefficient α 3 E z with respect to the hole concentration. ## Reference - [1] R. Winkler, Spin-orbit Coupling Effects in Two-Dimensional Electron and Hole Systems . (Springer Berlin Heidelberg, 2003). - [2] T. Koga, J. Nitta, and M. van Veenhuizen, Phys. Rev. B 70 , 161302 (2004). - [3] T. Koga, Y. Sekine, and J. Nitta, Phys. Rev. B 74 , 041302 (2006). - [4] B. A. Bernevig, J. Orenstein, and S.-C. Zhang, Phys. Rev. Lett. 97 , 236601 (2006). - [5] J. D. Koralek, C. P. Weber, J. Orenstein, B. A. Bernevig, S.-C. Zhang, S. Mack, and D. D. Awschalom, Nature 458 , 610 (2009). - [6] J. E. Hirsch, Physical Review Letters 83 , 1834 (1999). - [7] S. Murakami, N. Nagaosa, and S.-C. Zhang, Science 301 , 1348 (2003). - [8] Y. K. Kato, R. C. Myers, A. C. Gossard, and D. D. Awschalom, Science 306 , 1910 (2004). - [9] C. L. Kane and E. J. Mele, Phys. Rev. Lett. 95 , 146802 (2005). - [10] B. A. Bernevig and S.-C. Zhang, Phys. Rev. Lett. 96 , 106802 (2006). - [11] G. Dresselhaus, Phys. Rev. 100 , 580 (1955). - [12] E. I. Rashba, Sov. Phys. Solid. State 2 , 1109 (1960). - [13] F. J. Ohkawa and Y. Uemura, J. Phys. Soc. Jpn. 37 , 1325 (1974). - [14] R. Winkler, D. Culcer, S. J. Papadakis, B. Habib, and M. Shayegan, Semicond. Sci. Technol. 23 , 114017 (2008). - [15] H. Nakamura, T. Koga, and T. Kimura, Phys. Rev. Lett. 108 , 206601 (2012). - [16] L. G. Gerchikov and A. V. Subashiev, Sov. Phys. Semicond. 26 , 73 (1992). - [17] J. Schliemann and D. Loss, Phys. Rev. B 71 , 085308 (2005). - [18] O. Bleibaum and S. Wachsmuth, Phys. Rev. B 74 , 195330 (2006). - [19] T. Ma and Q. Liu, Phys. Rev. B 73 , 245315 (2006). - [20] G. M. Minkov, A. A. Sherstobitov, A. V. Germanenko, O. E. Rut, V. A. Larionova, and B. N. Zvonkov, Phys. Rev. B 71 , 165312 (2005). - [21] R. Winkler, H. Noh, E. Tutuc, and M. Shayegan, Phys. Rev. B 65 , 155303 (2002). - [22] J. P. Lu, J. B. Yau, S. P. Shukla, M. Shayegan, L. Wissinger, U. Rössler, and R. Winkler, Phys. Rev. Lett. 81 , 1282 (1998). - [23] A. Dobbie, M. Myronov, R. J. H. Morris, A. H. A. Hassan, M. J. Prest, V. A. Shah, E. H. C. Parker, T. E. Whall, and D. R. Leadley, Appl. Phys. Lett. 101 (2012). - [24] K. Sawano, K. Toyama, R. Masutomi, T. Okamoto, N. Usami, K. Arimoto, K. Nakagawa, and Y. Shiraki, Appl. Phys. Lett. 95 (2009). - [25] T. Irisawa, M. Myronov, O. A. Mironov, E. H. C. Parker, K. Nakagawa, M. Murata, S. Koh, and Y. Shiraki, Appl. Phys. Lett. 82 , 1425 (2003). - [26] B. Rößner, G. Isella, and H. v. Känel, Appl. Phys. Lett. 82 , 754 (2003). - [27] S. V. Iordanskii, Y. B. Lyanda-Geller, and G. E. Pikus, JETP Lett. 60 , 206 (1994). - [28] See Supplemental Material at [URL will be inserted by publisher] for the detail of ILP theory used for fitting. . - [29] I. Žuti ć , J. Fabian, and S. Das Sarma, Rev. Mod. Phys. 76 , 323 (2004). - [30] B. Habib, E. Tutuc, S. Melinte, M. Shayegan, D. Wasserman, S. A. Lyon, and R. Winkler, Appl. Phys. Lett. 85 , 3151 (2004). - [31] M. V. Fischetti and S. E. Laux, J. Appl. Phys. 80 , 2234 (1996). Figure 1 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1148v2-figure-8286fecc-c878-4a9f-984a-d03289494364.jpg) Figure 2 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1148v2-figure-58e21d38-91e6-49e3-8dfa-a8fa7d8339ab.jpg) Figure 3 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1148v2-figure-076c5270-62ae-48ff-84b0-fe9f13725124.jpg) Figure 4 15 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1148v2-figure-3e3603e6-e051-45dd-9281-b9c005eb5dc3.jpg)
10.1103/PhysRevLett.113.086601
[ "Rai Moriya", "Kentarou Sawano", "Yusuke Hoshi", "Satoru Masubuchi", "Yasuhiro Shiraki", "Andreas Wild", "Christian Neumann", "Gerhard Abstreiter", "Dominique Bougeard", "Takaaki Koga", "Tomoki Machida" ]
2014-08-05T23:55:25+00:00
2014-08-08T02:30:46+00:00
[ "cond-mat.mes-hall" ]
Cubic Rashba spin-orbit interaction of two-dimensional hole gas in strained-Ge/SiGe quantum well
The spin-orbit interaction (SOI) of the two-dimensional hole gas in the inversion symmetric semiconductor Ge is studied in a strained-Ge/SiGe quantum well structure. We observed weak anti-localization (WAL) in the magnetoconductivity measurement, revealing that the WAL feature can be fully described by the k-cubic Rashba SOI theory. Furthermore, we demonstrated electric field control of the Rashba SOI. Our findings reveal that the heavy hole (HH) in strained-Ge is a purely cubic-Rashba-system, which is consistent with the spin angular momentum mj = +-3/2 nature of the HH wave function.
1408.1149v1
## Estimating Clonality ## Yi Liu 1 3 , , Andrew Z. Fire 2 3 , , Scott Boyd 3 and Richard A. Olshen 4 ∗ 1 Bioinformatics Training Program, Stanford University; 2 Department of Genetics, Stanford University School of Medicine 3 Department of Pathology, Stanford University School of Medicine ∗ 4 Division of Biostatistics, Stanford University School of Medicine email ∗ : [email protected] SUMMARY: Challenges of assessing complexity and clonality in populations of mixed species arise in diverse areas of modern biology, including estimating diversity and clonality in microbiome populations, measuring patterns of T and B cell clonality, and determining the underlying tumor cell population structure in cancer. Here we address the problem of quantifying populations, with our analysis directed toward systems for which previously defined algorithms allow the sequence-based identification of clonal subpopulations. Data come from replicate sequencing libraries generated from a sample, potentially with very different depths. While certain properties of the underlying clonal distribution (most notably the total number of clones) are difficult to estimate accurately from data representing a small fraction of the total population, the population-level 'clonality' metric that is the sum of squared probabilities of the respective species can be calculated. (This is the sum of squared entries of a high-dimensional vector p of relative frequencies.) The clonality score is the probability of a clonal relationship between two randomly chosen members of the population of interest. A principal takeaway message is that knowing a functional of p well may not depend on knowing p itself very well. Our work has led to software, which we call lymphclon ; it has been deposited in the CRAN library. KEY WORDS: clonality, replicate libraries, empirical Bayes, covariance matrices ## 1 Introduction Understanding the population structures of biological entities is an important goal in many areas of medical research. The goals of defining the repertoires of lymphocytes that mediate healthy immune responses and immunological diseases are many. They include characterizing the microbial populations inhabiting various tissue sites in the human body in normal and aberrant physiology and detecting the sub-populations of genetically distinct tumor cells in a cancer that may respond differently to treatment. All efforts have benefited from recent advances in DNA sequencing technology. This paper is our contribution to estimating a particular functional, clonality , of the relative frequencies of species within any mixed biological population in which common genetic or clonal origins can be determined pairwise for individuals in the population. The metric that we study is the Gini-Simpson index of the vector of those relative frequencies (see, for example, Breiman et al., 1984), which amounts to the probability that two independently chosen rearrangements belong to the same clone. Our methodology involves empirical Bayes estimation (see Efron, 2010, and references therein), and jackknifing (see Miller, 1974) at two key points. Although the jackknifing we do does not yield unbiased estimators of clonality, the estimators are close enough to being unbiased that we can employ a formula we give for best linear unbiased estimation with arbitrary positive definite covariance. The formula involves the inverse of that positive definite matrix. Regularization implicit in our jackknifing entails something counterintuitive, namely that simultaneously we can estimate the set of eigenvalues of certain covariances and their inverses well enough. In what follows, we include the model and estimation of clonality that devolves from it followed by some results of simulations. In these simulations we found that the mean squared error of estimated clonality can be reduced by more than 98% that of another recent estimator, perhaps the best currently available in immunology (Parawesmaran et al., 2013). A computer package for implementation of our ideas in termed lymphclon . It has been deposited in the CRAN library. Because clonality is a quadratic function of the cited relative frequencies, its mean squared error involves fourth moments of those frequencies (see also two recent papers by Jiao, Venkat, and Weissman (2014)). These fourth moments are computed for a model that enables estimation. The model has tricky consequences; one very special case of the problem we cite is that of estimating the squared length of a Euclidean multinomial vector from its frequencies. Our problem has arisen in many contexts, including but not limited to ecology. The reader is encouraged to read the works of Chao (see her 1989 paper and its references), that deal with estimating what amounts to the vector of relative frequencies p itself. Our work shows that one can estimate such functionals of p as clonality well without knowing p itself very well. To provide a concrete example, we choose one application for the purposes of discussion and for refining estimates of clonality. B cells of the adaptive immune system are large populations of cells with characteristic and highly diverse genomic rearrangements of gene segments at loci encoding antigen receptor proteins, called antibodies (or immunoglobulins). In response to antigens associated with pathogens and other environmental exposures, B cells with receptors recognizing the antigens undergo extensive clonal expansions, giving rise to many progeny. We assume, albeit implicitly, that there is a correspondence between DNA sequence incidence for individual clonal subpopulations in an underlying population relative frequencies with which the corresponding and characteristic DNA sequences are represented in the pool of a series of replicate amplifications. These replicates are subsamples of a sample of blood taken from an individual. The antigen receptor rearrangements are amplified by the polymerase chain reaction (PCR) and sequenced. ## 2 The Model, Assumptions and Implications ## 2.1 Basic assumptions We fix a cell type, say, B cells, which can each possess one of many different antibody gene rearrangements. We focus on an individual person from whom B cells are sampled, with his or her random probability vector being designated by p . Write p = ( p (1) , p (2) , ... ). Because we study functionals of p that are invariant to permutations its coordinates, without loss we could assume that p (1) ≥ p (2) ≥ ... Readers will see in a later section that motivation for an empirical Bayes argument we employ makes this string of inequalities implausible. For all j = 1 2 , , ..., p ( j ) ≥ 0. The cardinality of { j : p ( j ) &gt; 0 } is denoted by C . For technical reasons that do not merit discussion here, we require that C ≥ 3. In practice C ≥ 10 . 6 C denotes richness , but that parameter is not studied explicitly here. In any case, p ∈ R C ; that is, p belongs to the Euclidean space R C . Write p i for the i th replicate; i = 1 2 , , ..., n . We assume that E ( p p i | , C ) = p . In an obvious notation, { j : p i ( j ) &gt; 0 } is defined to be C i . Always C &lt; C i ; in practice, C i /lessmuch C . It is helpful to employ inner product notation. Thus, if 1 ∈ R C , and 1( j ) = 1 for j = 1 , ...C , then ( p , 1 ) = 1. Clonality is ( p p , ), which we define to be θ ; θ = || p || 2 2 . Write p i = p + ε i . The C -dimensional vector ε i is the 'error' in the i th replicate. In biological parlance, the number of reads in p i is C i Σ C k =1 p i ( k ). We will place conditional and unconditional moment constraints on { ε i } , but they are not sufficient to determine exact distributions of { ε i } . If they were, then in view of sufficiency, without loss we could take n = 1. Because E ( p i ) = p , one obvious estimate of θ is n -1 Σ n i =1 || p i || 2 2 . However, the real-valued function x → x 2 is convex. So, Jensen's inequality implies that the cited average is a biased, typically extremely biased, estimator of θ . Were the coordinates of p independent, N θ , ( i 1), say, then θ would be a non-centrality parameter. We know, for example from (Perlman and Rasmussen, 1975), how difficult estimating θ would be in that case. Because p takes values in a unit simplex, a compact subset of R C , one might think that the problem we study here is easier than that of estimating a non-centrality parameter. Perhaps unfortunately, this seems not to be the case. ## 2.2 Assumptions regarding errors Assumptions on { ε i } are tricky, but they are what allow inference on θ . It pays to recall the definition of { ε } . A sample of blood is taken from an individual. It is divided into disjoint subsets. Separately, they are implied by the polymerase chain reaction (PCR). Subsequently, what has been amplified is sequenced by the latest technology. It is assumed that there is a 1-1 correspondence between sequences and rearrangements. In particular, we assume that $$E ( \varepsilon _ { j } ( l ) | \mathbf p, \{ C _ { i } \} ) = 0 \text{ for all } ( j, l ) ;$$ $$P ( \varepsilon _ { j } ( k ) = 0 | \boldsymbol p ( j ) = 0 ) = 1 \text{ for all } ( j, k ) ;$$ $$\{ \varepsilon _ { j } \} \, \text{are conditionally independent given $p$ and $\{C_{i}$} \} ; \text{also just given $p$}.$$ for distinct ( j, k, l ) , ε j and ε k are conditionally independent given { p , { C i } , ε l } (4) Note that (1) and p (1) &gt; 0 imply that, for all i, ε i (1) and p (1) are negatively correlated. This is different from assumptions that apply in the usual empirical Bayes argument for the James-Stein estimator of a Guassian mean (cf. Chapter 1 of Efron, 2010). Our assumption (2) implies that if a rearrangement is not in the circulation that defines p , then it is measured without error. Thus, its relative frequency is 0. This assumption may not apply to some technologies or some experiments. However, we believe that it is the job of both the experimentalist and any first stage of analysis to minimize 'fake' clones derived from sequencing errors. Further, we believe that this assumption does not invalidate any conclusions drawn from analyses of our data. For distinct replicates l and m , we define $$\theta _ { ( l, m ) } = \sum _ { j = 1 } ^ { c } \, p _ { l } ( j ) \, p _ { m } ( j )$$ One sees that E θ ( ( l,m ) | p ) = θ . Likewise, if /negationslash $$\hat { \theta } ^ { * } = \sum _ { l \neq m } \, C _ { l } C _ { m } \theta _ { ( l, m ) } / \sum _ { l \neq m } C _ { l } C _ { m },$$ /negationslash then E θ ( ˆ ∗ | p , { C i } ) = θ . See (Parameswaran et al., 2013). Extending ˆ θ ∗ to include summation over the diagonal terms l = m does introduce some bias in estimating θ . One computes that $$E ( ( p _ { i } ( j ) ) ^ { 2 } | p, \{ C _ { i } \} ) = ( p ( j ) ) ^ { 2 } + \text{Var} \ ( p _ { i } ( j ) | p, \{ C _ { i } \} )$$ But typically ∑ j Var ( p i ( j ) | p j , { C i } ) is small. Thus, bias is not the problem in extending the summation in (6) to all ( l, m ) that concerns us. Instead, it is the (conditional) variance of the sum. Estimators for which (conditional) bias is little problem but (conditional) variance is reduced are enabled by studying pairs of { θ ( k,l ) } . But, before studying the covariances of such pairs, we require another comment and another assumption. The definition of ε i and simple algebra entail that || ε i || 2 ≤ || p || 2 2 + 2 || p || 2 || p i || 2 + || p i || 2 2 . Because 0 &lt; || p || 2 2 = ∑ C j =1 ( p ( j )) 2 ≤ ∑ C j =1 p ( j ) = 1, and likewise || p i || 2 2 ≤ 1, it follows that E ( || ε i || 2 2 | p , { C i } ≤ 4. Indeed, ε has positive l p moments of all orders. Our assumption is $$& \text{the conditional distribution of } \| \varepsilon _ { i } \| ^ { 2 } \cos ^ { 2 } ( \psi _ { i } ) \\ & \text{ given } p \text{ and } \{ C _ { i } \} \, \text{ does not depend on } i.$$ Here ψ i is the cosine of the angle between ε i and p . ## 3 Covariances of Pairs of { θ ( k,l ) } It is easy to see that if ( k, l ) and ( k , l ′ ′ ) are pairs of indices for which all four subscripts are distinct, then Cov(( θ k,l , θ k ,l ′ ′ ) | p , { C i } ) = 0. Our next step is to study the covariance in case three indices are distinct, but the fourth is common. To that end, we compute $$\text{Cov} ( ( \theta _ { k, l }, \theta _ { k ^ { \prime }, l ^ { \prime } } ) \ | \ p, \{ C _ { i } \} ) \ & = \ E ( \theta _ { ( k, l ) } \theta _ { ( l, l ^ { \prime } ) } \ | \ p, \{ C _ { i } \} ) - E ( \theta _ { ( k, l ) } \ | \ p, \{ C _ { i } \} ) \ E ( \theta _ { ( l, l ^ { \prime } ) } \ | \ p, \{ C _ { i } \} ) \\ & = \ E ( \theta _ { ( k, l ) } \theta _ { ( l, l ^ { \prime } ) } \ | \ p, \{ C _ { i } \} ) - ( | | \ p | | _ { 2 } ^ { 2 } ) ^ { 2 } \\ & = \ E ( p + \varepsilon _ { k }, p + \varepsilon _ { l } ) ( p + \varepsilon _ { l }, p + \varepsilon _ { l ^ { \prime } } ) \ | \ p, \{ C _ { i } \} ) - | | \ p | | _ { 2 } ^ { 4 } \\ & = \ I - I I$$ I is the expectation of the product of two inner products, each inner product having four terms. Thus, there are 16 terms to I . Simple calculations imply that only two of the 16 terms is not 0. In particular, $$I - I I \ & = \ \| p \| _ { 2 } ^ { 4 } + \| p \| _ { 2 } ^ { 2 } \, E ( \cos ^ { 2 } ( \psi _ { l } ) \, \| \varepsilon _ { l } \| _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} ) - \| p \| _ { 2 } ^ { 4 } \\ & = \ \| p \| _ { 2 } ^ { 2 } \, E ( \cos ^ { 2 } ( \psi _ { l } ) \, \| \varepsilon _ { l } \| _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} ).$$ For each l = 1 2 , , ...n there are ( n -1 2 ) choices of distinct indices ( k, l ′ ). Because we are interested in sums over all sets of pairs ( k, l ) and ( l, l ′ ) as described, we are interested in $$\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \\ & \quad ( \begin{matrix} n - 1 \\ 2 \end{matrix} ) \, | | p | | _ { 2 } ^ { 2 } \, \sum _ { l = 1 } ^ { n } \, E ( \cos ^ { 2 } ( \psi _ { l } ) \, | | \varepsilon _ { l } | | _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} ) \\ = \, \ [ n ( \begin{matrix} n - 1 \\ 2 \end{matrix} ) \, | | p | | _ { 2 } ^ { 2 } ] \, [ n ^ { - 1 } \, \sum _ { l = 1 } ^ { n } \, E ( \cos ^ { 2 } ( \psi _ { l } ) \, | | \varepsilon _ { l } | | _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} ) ]$$ In view of (3) and (8) and comments just prior to (8), the random variables that appear in the second product in (11) are law of large numbers averages of independent, identically distributed random variables to which large deviation results (display (4.16) of Hoeffding, 1963 and Section 2 of Varadhan, 2008) apply. Exact details depend on calculation of KullbackLeibler information for the distribution in (8). However, whatever the exact calculation, there are positive numbers A and B for which, for any δ &gt; 0 $$& P ( | n ^ { - 1 } \sum _ { l = 1 } ^ { n } \, E ( \cos ^ { 2 } \, ( \psi _ { l } ) \, \| \, \varepsilon _ { l } \| _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} ) \\ - \quad & E ( E ( \cos ^ { 2 } ( \psi _ { 1 } ) \, \| \varepsilon _ { 1 } \| _ { 2 } ^ { 2 } \, | \, p, \{ C _ { i } \} | > \delta ) < A \exp \{ - B n \delta \}.$$ The term subtracted in (12) is constant. The first term in (11) is irrelevant in view of the last term of (12). It follows that there are positive constants A ′ and B ′ for which the product (11) is within δ of E E ( (cos ( 2 ψ 1 ) || ε 1 || 2 2 | p , { C i } ) with probability at least 1 -δ . Denote the latter conditional expectation by ¯ . ψ Because there are n replicates, in view of Bonferroni's inequality, there are positive constants A ′′ and B ′′ for which for any δ &gt; 0 and n large enough, the probability that for some replicate the probability (11) is larger than δ from ¯ is less than ψ A ′′ exp {-nB δ ′′ } . Because a constant is independent of any random variable, in (10) and (11) we can replace cos ( 2 ψ l ) by ¯ (provided we sum over replicates in (10) and (11) and thus but for a set of exponentially ψ small probability we can move the constant ¯ outside the expectation. ψ For our last consideration of this section we study the case ( k, l ) = ( k , l ′ ′ ). Thus, we study $$& V a r ( \theta _ { ( k, l ) } | p, \{ C _ { i } \} ) = \\ & E ( ( p + \varepsilon _ { k }, p + \varepsilon _ { l } ) \ ( p + \varepsilon _ { k }, p + \varepsilon _ { l } ) \ | \ p, \{ C _ { i } \} ) - E ^ { 2 } ( ( p + \varepsilon _ { k }, p + \varepsilon _ { l } ) \ | \ p, \{ C _ { i } \} ).$$ $$\ast$$ Obviously, there are ( ) n 2 such terms. Considerations like those we applied to (10), (11), (12), and the discussion following (12) entail that there are positive A ′′ and B ′′ for which for any δ &gt; 0 and n big enough, the probability is less than A ′′ exp {-nB δ ′′ } that for any pair ( k, l ), Var( θ ( k,l ) | p , { C i } ) departs from || p || 2 2 ψ E ( || ε k || 2 2 + || ε l || 2 2 | p , { C i } ) more than δ . ## 4 Empirical Bayes Estimation and Jackknifing. According to computations in the last section, for pairs of replicates ( k, l ) , ( k , l ′ ′ ), given p and { C i } the conditional covariance of pairs of replicates is $$0 & & = \text{ if } k, l, k ^ { \prime }, l ^ { \prime } \text{ distinct} \\ | | p | | _ { 2 } ^ { 2 } \bar { \psi } \ E ( | | \varepsilon _ { k } | | _ { 2 } ^ { 2 } \ | \ p, \{ C _ { i } \} ) & & = \text{ if } ( k, l ) \cap ( k ^ { \prime }, l ^ { \prime } ) = \{ k \} \\ | | p | | _ { 2 } ^ { 2 } \bar { \psi } \ E ( | | \varepsilon _ { k } | | _ { 2 } ^ { 2 } + | | \varepsilon _ { l } | | _ { 2 } ^ { 2 } \ | \ p, \{ C _ { i } \} ) & & = \text{ if } ( k, l ) = ( k ^ { \prime }, l ^ { \prime } )$$ with probability at least 1 -A ′′ exp {-nB δ ′′ } , for any δ &gt; 0 and integer n large enough and fixed constants A ′′ and B ′′ . In the spirit of ordinary empirical Bayes (see Robbins, 1956 and Efron, 2010) we could set an ( ) n 2 by ( ) n 2 covariance matrix Σ of pairs of replicates equal to expressions (13) and solve these over-determined, non-linear equations for the n +2 constants: || p || 2 2 , ψ, ¯ and E ( || ε k || 2 2 | p , { C i } ) : k = 1 , ...n . Obviously, one of the terms in each product of (13) is θ itself. It is part of the multiplier, θψ ¯ . The path we take has many virtues. For one, it allows us to ignore these multipliers. For another, it leads to estimators of θ that close to being unbiased (given p and { C i } ). For yet another, these estimators have far smaller variance than does (6) (see Parameswaron et al., 2013). This path involves jackknifing estimates of θ that devolve from estimating a covariance matrix of fixed coordinates of the n replicates. Obviously, given p there are C coordinates in all. We employ loose empirical Bayes arguments for estimating each of the n terms in the jackknifing. In passing, we are able to estimate E ( || ε k || 2 2 | p , { C i } ) , k = 1 , ..., n. To begin, suppose that we had m estimators of θ E , ..., E 1 m , each nearly unbiased. Further, suppose that we had an estimator ˜ of θ θ based on all the data. Suppose further that E θ ( ˜ | p , { C i } ) = θ + (1 /n a ) 1 + (1 /n ) 2 a 2 + ... for some constants a , a 1 2 , ... Then we might combine E , ..., E 1 m in a best linear 'unbiased' way by computing $$\hat { \theta } = ( x, R 1 ) / | | R ^ { - 1 } 1 | | _ { 2 } ^ { 2 }.$$ Here R is the m × m covariance matrix of E , ...E 1 m ; 1 is the m-vector with all entries 1, x is the vector with j th entry E , j j = 1 , ..., m . Note that (14) is invariant to constant multiples of R . Thus, we can apply (14) if we know R only up to constant multiple. This is an important observation because it allows us to remove the multiplier θγ ¯ in (13). We could eliminate the (1 /n ) term in the bias of ˜ by computing a jackknife θ estimator (see Miller, 1974). It is toward that jackknife goal that for empirical Bayes purposes we construct a C × n matrix X . The n columns of X are p 1 , ..., p n . These are, obviously, observed quantities. /negationslash Write X i for the i th row of X , and X -i to denote { X l : l = i } . (In an ecological context, the j th entry of X i is the measured number of the specie indexed by i in the j th study.) Because jackknifing matters here, we need to know the covariance matrix, V ar ( X X i | -i , p , { C l } ) . The conditional variance formula (that is, Pythagorean considerations) entail that we write the latter conditional variance as $$V a r ( X _ { i } | X _ { - i }, p, \{ C _ { l } \} ) + V a r ( E ( X _ { i } \ | \ p, \{ C _ { l } \} | X _ { - i } ).$$ Straightforward algebra shows that the sum can be written V ar ( X p i | , { C l } )(1 + L ), where L = V ar ( p X | -i , { C l } ) / E V ar ( ( X p i | , { C l } ). We could argue - details omitted here - that with probability 1 minus a quantity exponentially small, L is 0(1 /n ), with uniformly bounded constant. Up to the constant of proportionality θψ ¯ , (13) would apply to each of the n terms that figure in jackknifing, if only we had estimators of E ( || ε k || 2 2 | p , { C i } ) , k = 1 , ..., n . Not only are these available in view of (1), but also, we can estimate each term in the ( ) n 2 × ( ) n 2 matrix entailed by (13), even with the norming constants. directly, Rather than estimate the conditional covariance matrix of X i given X -i , p , { C l } we begin the next phase of our arguments by assuming that V ar ( X X i | -i , p , { C l } ) = E V ar ( ( X i | p , { C l } ), even though the equality is only approximate. It follows that the conditional covariance matrix can be estimated directly from our data. In view of (1), a simplified (14), and (4), we can estimate E ( || ε k || 2 | p , { C l } ) for every k . We can compute (5) and therefore (6) from data. Formulas (13) enable us to estimate V ar θ ( ˆ ∗ ) directly. Though we have no mathematical proof, plausibility arguments imply that if we improve estimation by improving the condition number of any estimator of V ar ( X X i | -i , p , { C l } ), then we should improve the subsequent estimation of θ . Remember that our basic model is p i = p + ε i ; each of { p i } , all that we observe, estimates p , albeit poorly. We can imagine estimating p by its least squares estimator computed for predictors { p i : i = 1 , ...n } . That least squares estimator has (conditional) covariance matrix ( XX ′ ) -1 , where the superscripted prime denotes transpose. If, rather implausibly, the probability distribution of { ε l : l = 1 , ...n } is exchangeable, that is, the joint distribution is invariant under permutations, then that exchangeability is inherited by each coordinate. This exchangeability would imply that the { C C l l ′ } weighted off diagonal elements of X X ′ (as in (6)) should be about the same. It would follow that XX ′ would be approximately ˆ θ ∗ J , where J is the n × n matrix with every entry 1. This equality would hold for every i . The resulting estimator, common to i , might for conventional arguments of unbiasedness (that barely matter here) be ( ˆ θ ∗ -C -2 ) J . Because J has rank only 1 for every n , and typically n /greatermuch 1, we are motivated to improve J ′ s disastrous condition number. All three approaches we have tried are available with the R command 'corpcor.' (See Sh¨fer and Strimmer, 2005 and Opgen-Rhein and Strimmer, a 2007.) One regularization involves a certain 'hard thresholding.' Another involves 'soft thresholding.' We can estimate C by the methodology of Chao (1987). Denote her estimator by ˆ . C Then, given our list of approximations, the 'hard thresholding' estimator of the common conditional covariance matrix of { X i } is $$[ \hat { \theta } ^ { * } - ( \hat { C } ^ { - 2 } ) ] \mathbf J + [ \text{diag} \ ( X ^ { \prime } X ) - ( \hat { \theta } ^ { * } - ( \hat { C } ^ { - 2 } ) \mathbf I ] _ { + },$$ where I is the n × n identity matrix. For a square matrix A , diag ( A ) is the matrix with diagonal entries those of A , but with entries 0 elsewhere; for a real number x , max(0 , x ) = x + . The 'soft thresholding' estimator of the common conditional covariance is $$[ \hat { \theta } ^ { * } - ( \hat { C } ^ { - 2 } ) ] \mathbf J + \, | \text{diag} \, ( X ^ { \prime } X ) - ( \hat { \theta } ^ { * } - ( \hat { C } ^ { - 2 } ) \mathbf I |.$$ We denote by vertical bars the matrix with absolute values of each entry for each entry. In what follows, where we have done hard thresholding we use the term 'positive expectation.' The soft thresholding is denoted by 'spherical shells.' We have also tried another estimator available with 'corpcor.' That is, cor.shrink; for details see the documentation for 'corp.cor'. ## 5 Combining Estimators Readers please note that from our basic model that connects the unknown p and our observations { p i } , assumptions that elaborate on the model, and computations regarding derived quantities that owe, typically, to jackknifing or empirical Bayes estimation, we are able to estimate all quantities we require from { p i } . In this section we combine five estimators to yield our final estimates of clonality. We denote the first of the five by ˆ θ (0) . It is the estimator of clonality that devolves from not regularizing the estimator (13). We denote this 'unregularized' estimator of covariance by ˆ Σ (0) . The estimator of θ is not exactly unbiased. However, it is close and is one of five estimators we combine. Another estimator of θ is exactly unbiased; that is ˆ . θ ∗ To define what we term ˆ θ (1) , θ ˆ (2) , and ˆ θ (3) requires further definitions. Remember that for every k , an estimator of E ( || ε k || 2 2 | p , { C i } ) can be computed from p i . Write ¯ = ε n -1 ∑ n m =1 E ( || ε m || 2 2 | p , { C l } ), and write ε ∗ for the minimum summand. Now define $$T ^ { ( 1 ) } \ = \ \theta \ \bar { \psi } \ \bar { \varepsilon } \ \mathbf I$$ $$= \ \theta \ \bar { \psi } \ \varepsilon _ { * } \ \text{else}$$ $$T ^ { ( 1 ) } \ & = \ \theta \ \bar { \psi } \ \bar { \varepsilon } \ I \quad & & ( 1 5 ) \\ T ^ { ( 2 ) } \ & = \ \text{diag} \ ( \Sigma ^ { ( 0 ) } ) & & ( 1 6 ) \\ T ^ { ( 3 ) } _ { ( k, l ), ( k ^ { \prime }, l ^ { \prime } ) } & = \ l ^ { \prime } & & \text{if $k,l,k^{\prime},l^{\prime}$distinct} \\ & = \ \theta \ \bar { \psi } \ E ( | | \epsilon _ { k } | | _ { 2 } ^ { 2 } + | | \epsilon _ { l } | | _ { 2 } ^ { 2 } \ | \ p, \{ C _ { i } \} ) \ \text{if $(k,l)=(k^{\prime},0^{\prime})$} \\ & = \ \theta \ \bar { \psi } \ \varepsilon _ { * } \ \text{else}$$ We compute clonality now for the three estimators that devolve from (1 / 2)( ˆ Σ (0) + T (1) ), (1 / 2)( ˆ Σ (0) + T (2) ) , and (1 / 2)( ˆ Σ (0) + T (3) ). Along with the first two estimators of θ we have cited, we have now five estimators in all. They have a 5 × 5 covariance matrix, which we can estimate via jackknifing, again with replicates the sampling units. Then, using the estimated 5 × 5 covariance matrix and (14), we combine our five estimators of θ into final estimators. There is one final estimator for each regularization of ( ˆ θ ∗ -C ( -2 ) J in the previous section. The final estimator is computed and returned by the 'inter.clonality' function of our lymphclon package. That 'inter.clonality' function is part of the 'mixture.clonality' component of the return value. ## 6 Simulations We realize that readers who have read thus far may consider our 'final' estimator(s) of clonality, θ , extremely complex. We caution them that with ˆ , θ ∗ the bar is extremely high. (See Parameswaran et al., 2013); we believe that with accuracy measured by mean squared error, at present ˆ θ ∗ is the best known to immunologists. Because at a particular point in the previous sections we were unable to fill in mathematical details, there and subsequently we relied on heuristic arguments. That being the case, the only path we see to convincing any who read our works that our complex estimator(s) are 'good' is to perform simulations. While many details will be given in another paper, we give the results of some simulations here. To begin, we require definitions. The random variable Z has a Zipf distribution with parameter 0 ≤ r ≤ 1, if for nonnegative integers j, P ( Z = j ) ∝ j -r . Write Z ∼ Zipf( r ). With our choices of r, ∑ ∞ j =0 P Z ( = j ) is infinite, so we limit the upper limit of j , that limit here being C . The number of replicates, n , is specified by the user. In what we report here, n = 8. We somewhat arbitrarily take C = 200 000, though in , lymphclon that number can be changed. In lymphclon , each { C i } is chosen according to Zipf( r ) for various values of r . In what we report here, the number of cells in six of the eight replicates was 1,000; in the other two it was 10,000. Once { C i } are determined, then the number of cells assigned to particular rearrangements is simulated via a 'Pareto-Poisson machine.' By this we mean that for each replicate we pick a Pareto random number with location and shape parameters 1. Denote them by P , ...P 1 n . We then simulate the assignments of cells to rearrangements according to Poisson distributions, with respective mean values P , ...P 1 n . Unconditionally, the cells by replicates have identical distributions. So, the statistical notion of sufficiency entails that we might as well take n = 1. However, what matters to practice is that conditional on { C i } and the assignments of cells to rearrangements, they do not. The wisdom of our admittedly complex configurations is our attempt to circumvent bias associated with amplification preferences and 'PCR jackpots' (see Boyd et al., 2009). The algorithm to which our complex estimator(s) of clonality are compared is that implied by (6) alone. (See Parameswaram et al, 2013.) We do not model 'read errors' or any bias in the PCR amplification. The one simulation we report here demonstrates remarkable results for our 'final' estimators of clonality. Readers can draw such conclusions as they wish regarding the different regularizations of our Section 5 . ## 7 Summary The goal of this paper is to demonstrate that from data on frequencies p of V(D)J rearrangements, our new approaches can be combined with existing methodologies to estimate functionals of p accurately. We quantify accuracy by mean squared error. A takeaway message is that if the functional is quadratic in the entries of p , as is clonality , then pairs of quadratic functions of the data can be employed successfully. Bias is removed by application of the jackknife when necessary. Variance is reduced by empirical Bayes arguments, which enable estimation of key parameters. These empirical Bayes arguments bring to mind but are more complex than empirical Bayes arguments for the James-Stein estimator (see Efron, 2010, and Efron and Morris, 1973). These V(D)J rearrangements are identified by sequencing of replicates, each of which owes to PCR amplification of an initial sample. It is in the nature of problems we study that within replicates, some rearrangements are seen only once, and these rare rearrangements vary by replicate. On the other hand, some rearrangements are seen many times, perhaps too many times. The beauty of our approach is that it does well, no matter the distribution of frequencies. ## Acknowledgments We thank Professor Daphne Koller for helpful discussions and for teaching Y.L. Funding was supported in part by grant 5U19AI090019 from the National Institute of Allergy and Infectious Diseases, and also by grant 4R37EB002784 from the National Institute of Biomedical Imaging and Bioengineering. ## References Boyd, S.D., Marshall, E.L., Merker, J.D., Maniar, J.M., Zhang, L.N., Sahaf, B., Jones, C.D., Simen, B.B., Hanczaruk, B., Nguyen, K.D., Nadeau, K.C., Egholm, M., Miklos, D.B., Zehnder, J.L., and Fire, A.Z. 'Measurement and clinical monitoring of human lymphocyte clonality by massively parallel V-D-J pyrosequencing,' Science Translational Medicine 1 12a23 (2009). Breiman, L., Friedman, J.H., Olshen, R.A., and Stone, C.J. (1984) Classification and Regression Trees . Belmont, CA: Wadsworth International Group. Chao, A. 'Estimating the population size for capture-recapture data with unequal catchability,' Biometrics 43 (4) (1987), 783-791. Chao, A. 'Estimating population size for sparse data in capture-recapture experiments,' Biometrics 45 (1989), 427-438. Efron, B. (2010) Large Scale Inference Empirical Bayes Methods for Estimation, Testing, and Prediction. Cambridge: Cambridge University Press. Efron, B. and Morris, C. 'Stein's estimation rule and its competitorsAn empirical Bayes approach,' Journal of the American Statistical Association 68 (1973), 117-130. Efron, B. and Thisted, R. 'Estimating the number of unseen species: How many words did Shakespeare know?' Biometrika 63 (3) (1976), 435-447. Hoeffding, W. 'Probability inequalities for sums of bounded random variables,' Journal of the American Statistical Association 58 (1963), 13-30. Jiao, J., Venkat, K. and Weissman, T. 'Order-optimal estimation of functionals of discrete distributions,' (2014) arXiv:1406.6956v2. Jiao, J. Venkat, K. and Weissman, T. 'Maximum likelihood estimation of functionals of discrete distributions,' (2014) arXiv:1406.6959v1. Miller, R.G. 'The jackknifeA review,' Biometrika 61 (1) (1974), 1-15. Opgen-Rhein, R. and Strimmer, K. 'Accurate ranking of differentially expressed genes by a distribution-free shrinkage approach,' Statistical Applications in Genetics and Molecular Biology 6 (1) (2007), 1-18. Parameswaran, P., Liu, Y., Roskin, K.M., Jackson, K.K., Dixit, V.F., Lee, J.Y., Artiles, K.S., Zompi, S., Vargas, M.J., Simen, B.B., Hanczaruk, B., McGowan, K.R., Tariq, M.A., Pourmand, N., Koller, D., Balmaseda, A., Boyd, S.D., Harris, E., and Fire, A.Z. 'Convergent antibody signatures in human dengue,' Cell Host &amp; Microbe 13 (6) (2013), 691-700. Perlman, M.D. and Rasmussen, U. 'Some remarks on estimating a noncentrality parameter,' Communications in Statistics 4 (1975), 455-468. Qi, Q., Liu, Y., Cheng, Y., Glanville, J., Zhang, D., Lee, J-Y., Olshen, R.A., Weyand, C.M., Boyd, S., and Goronzy, J.J. 'Diversity and clonal selection in human T cell repertoire,' (2014), submitted for publication. Robbins, H. 'An Empirical Bayes Approach to Statistics.' Proc. Third Berkeley Symp. on Math. Statist. and Prob. 1 (Univ. of Calif. Press, 1956), 157-163. Robbins, H.E. 'Estimating the total probability of the unobserved outcomes of an experiment,' The Annals of Mathematical Statistics ' 39 (1) (1968), 256-257. Sch¨fer, J. and Strimmer, K. 'A shrinkage approach to large-scale covariance matrix estia mation and implications for functional genomics.' Statistical Applications in Genetics and Molecular Biology 4 (1) (2005), 1-30. Schatz, D.G. and Swanson, P.C. 'V(D)J recombination: Mechanisms of initiation,' Annual Review of Genetics 45 (2011), 167-202. Varadhan, S.R.S., 'Large deviations,' The Annals of Probability 36 (2) (2008), 397-419.
null
[ "Yi Liu", "Andrew Z. Fire", "Scott Boyd", "Richard A. Olshen" ]
2014-08-06T00:14:20+00:00
2014-08-06T00:14:20+00:00
[ "stat.ME", "q-bio.PE" ]
Estimating Clonality
Challenges of assessing complexity and clonality in populations of mixed species arise in diverse areas of modern biology, including estimating diversity and clonality in microbiome populations, measuring patterns of T and B cell clonality, and determining the underlying tumor cell population structure in cancer. Here we address the problem of quantifying populations, with our analysis directed toward systems for which previously defined algorithms allow the sequence-based identification of clonal subpopulations. Data come from replicate sequencing libraries generated from a sample, potentially with very different depths. While certain properties of the underlying clonal distribution (most notably the total number of clones) are difficult to estimate accurately from data representing a small fraction of the total population, the population-level "clonality" metric that is the sum of squared probabilities of the respective species can be calculated. (This is the sum of squared entries of a high-dimensional vector $p$ of relative frequencies.) The clonality score is the probability of a clonal relationship between two randomly chosen members of the population of interest. A principal takeaway message is that knowing a functional of $p$ well may not depend on knowing $p$ itself very well. Our work has led to software, which we call {\it lymphclon}; it has been deposited in the CRAN library.
1408.1150v1
## Early Development of UVM based Verification Environment of Image Signal Processing Designs using TLM Reference Model of RTL ## Abhishek Jain Dr. Hima Gupta 1 Imaging Group and Jaypee Business School 2 1 STMicroelectronics and Jaypee Institute of Information 2 Technology Greater Noida, India Sandeep Jana SDS Group STMicroelectronics Greater Noida, India Abstract -With semiconductor industry trend of 'smaller the better', from an idea to a final product, more innovation on product portfolio and yet remaining competitive and profitable are few criteria which are culminating into pressure and need for more and more innovation for CAD flow, process management and project execution cycle. Project schedules are very tight and to achieve first silicon success is key for projects. This necessitates quicker verification with better coverage matrix. Quicker Verification requires early development of the verification environment with wider test vectors without waiting for RTL to be available. In this paper, we are presenting a novel approach of early development of reusable multi-language verification flow, by addressing four major activities of verification - - 1. Early creation of Executable Specification - 2. Early creation of Verification Environment - 3. Early development of test vectors and - 4. Better and increased Re-use of blocks Although this paper focuses on early development of UVM based Verification Environment of Image Signal Processing designs using TLM Reference Model of RTL, same concept can be extended for non-image signal processing designs . Keywords-SystemVerilog; SystemC; Transaction Level Modeling; Universal Verification Methodology (UVM); Processor model; Universal Verification Component (UVC); Reference Model ## I. INTRODUCTION Image signal processors (ISP) address different markets, including high-end smartphones, security/surveillance, gaming, automotive and medical applications. The use of industry standard interfaces and rich set of APIs makes the integration Jaypee Business School Jaypee Institute of Information Technology Noida, India Krishna Kumar SDS Group STMicroelectronics Greater Noida, India Fig. 1. Verification Environment of Image Signal Processing Design ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-8ae6199a-170a-439b-b31a-0bd3223b41c8.jpg) of image processors a straightforward process and helps to reduce end-product time to market. Image signal processing algorithms are developed and evaluated using C/Python models before RTL implementation. Once the algorithm is finalized, C/Python models are used as a golden reference model for the IP development. To maximize re-use of design effort, the common bus protocols are defined for internal register and data transfers. A combination of such configurable image signal processing IP modules are integrated together to satisfy a wide range of complex image signal processing SoCs [1]. In Verification Environment of Image Signal Processing design as shown in figure 1, Host interface path is used to do programming of configurable blocks using SystemVerilog UVM based test cases. UVM\_REG register and memory model [20] is used to model registers and memories of DUT. DUT registers are written/read via control bus (AXI3 Bus here) UVC. RTL control bus interface acts as target and control bus UVC acts as initiator. The target control interface of the ISP RTL is driven by control bus UVC (configured as initiator).After register programming is done, image data(random/user-defined) is driven to the data bus interface by the data bus UVC and the same data is also driven to the reference model. Output of the ISP RTL is received by the receiver/monitor of the data bus UVC. Scoreboard compares the output of RTL and reference model and gives the status saying whether the both output matches or not. 'C' test cases are used for programming of RTL registers/memories via CPU interface. C test cases control the SystemVerilog Data Bus UVC using Virtual Register Interface (VRI) [15], [18]. VRI layer is a virtual layer over verification components to make it controllable from embedded software. It gives flexibility to Verification Environment users to use the Verification IPs without knowing SystemVerilog. Generally, development of Verification Environment for verification of designs is started after availability of the RTL. Thus, significant time is spent for setup and debugging of verification environment after release of RTL which results in delay in start and completion of verification of the designs. It is required to find ways to start developing the Verification Environment much before the arrival of the RTL so that when RTL is available, Verification Environment can be easily plug and play and verification of the designs can be started quickly. Use of TLM reference model of RTL for development of Verification Environment much before arrival of RTL proves to be good solution for the above mentioned problem. This paper is focusing on early development of UVM based Verification Environment of Image Signal Processing designs using TLM Reference Model of RTL before availability of the RTL. Early development of Verification Environment of Image Signal Processing designs is described in detail in Section II. ## II. EARLY DEVELOPMENT OF UVM BASED VERIFICATION ENVIRONMENT ## A. Modeling of ISP designs A loosely timed high level model of the ISP block is generated at algorithmic functional level using C/C++/SystemC and with TLM-2 interface. The SCML - SystemC Modeling Library, an open source SystemC library from Synopsys Inc. [26] is being used here. The purpose of this model generation is to use this as a reference model. We may say it as a 'Golden Reference Model' or 'Executable Functional Specification' of the ISP designs. From functional and structural perspective this model can be divided in two major spaces. First space the algorithmic computational part, is mainly responsible for image processing using various algorithms involved for image manipulation from the incoming image stream data. The second space - a TLM interface, is responsible for all kinds of communication to external IPs and other system blocks. Register interface of this model is generated using IPXACT tools. And algorithmic part is manually implemented. ## B. Testing of Executable Spec only To test the TLM ISP model, an environment is developed using Python (an open source scripting language) and Synopsys Pa-Virtualizer Tool Chain. The test environment has following major components: -  Test bench in Python -  Configuration file reader in Python -  Raw Data Reader -  ISP model -  Input data injector in Python -  Output data receiver in Python -  Output data checker in Python -  Synopsys Pa-Virtualizer Tools Chain for GUI, debugging, and simulation XML file format is used for test bench configuration and passing other parameter to the testing environment. Fig. 2. ISP Model Testing Environment ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-609dfdc6-162f-43ce-8595-bca297d6ac24.jpg) ## C. Use of TLM ISP Model for early development of RTL Verification Environment After the ISP model is proved to be functionally correct, the same model is used for early development of RTL functional verification environment. A suitable TLM sub-system is designed. This TLM subsystem consists of various models namely; ISP functional model, AXI BFM, configurable clock generators model, configurable reset generator model, memory model, configurable interconnect etc. All these are pure SystemC models. AXI BFM is provided to interact with other part of the world. ISP RTL block needs exhaustive verification, which is possible only when the RTL is ready. But, development of RTL design takes time, which means verification of RTL design can't be possible before it becomes available. To shorten this sequential activity, functional model of ISP is used to prepare the early verification environment. A SystemVerilog test bench wrapper is created over SystemC/TLM ISP sub-system. This SystemVerilog test bench interface with the RTL verification environment. ## D. Virtual Platform Sub-system When all components of platform are in TLM/C, means C/C++ are used as modeling language; we call it a Pure Virtual platform. In typical verification environment, generally all verification components are not only TLM based but also of different verification languages thus making it a Multilanguage heterogeneous simulation environment. For developing early verification environment, TLM based subsystem is developed which consists of every block in TLM/C. This TLM based Sub-system is model of RTL. In the above mentioned RTL verification environment, a processor model is used which enables us to early develop 'C' test cases for programming of RTL registers/memories via CPU interface. The challenge is to keep the verification environment independent of 'C' test cases. We don't wish to compile every time whenever there is change in application code. To be able to achieve this, a sub-system is designed which consists of models of bus interfaces, like AXI BFM, a 'generic' processor model, model of memory, etc. an independent 'C' program/test case is written to do all the programming and configuration, which in turn runs on processor model of this sub-system. This sub-system is active element in programming phase, but becomes passive once the programming is complete. Virtual platform sub-system can be represented in following block diagram. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-d2c4182f-1e13-4fad-85cb-ed9f504afb01.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-c37a8bed-a492-49a8-bd6d-caaf4e1252a3.jpg) t Fig. 3. Virtual Platform Sub-system o ## E. Virtual Register Interface (VRI) Today, most of the embedded test infrastructure uses some adhoc mechanism like 'shared memory' or synchronization mechanism for controlling simple Bus functional models (BFMs) from embedded software. T L M In order to provide full controllability to the 'C' test developer over these verification components, a virtual register interface layer is created over these verification environments which provides the access to the sequences of these verification environment to the embedded software enabling configuration and control of these verification environments to provide the same exhaustive verification at SoC Level. This approach addresses the following aspects of verification at SoC Level: -  Configuration and control of verification components from embedded software. -  Reusability of verification environments from IP to SoC. -  Enables reusability of testcases from IP to SoC. -  Providing integration testcases to SoC team which is developed by IP verification teams. It has been achieved by using Virtual Register Interface (VRI) layer over Verification components [18]. VRI layer over verification components is - -  A virtual layer over verification environment to make it controllable from embedded software -  Provides high level C APIs hiding low level implementation Fig. 4. Virtual Register Interface (VRI) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-880c1480-b4fc-4835-b530-a431f201e4cb.jpg) An example of C test case using VRI interface is as follows - vr\_enet\_packet pkt; vr\_enet\_packet rx\_pkt; rx\_pkt.data = new vri\_uint8\_t[2000]; //create buffer for receiving data pkt.packet\_kind = ETHERNET\_802\_3; pkt.data\_length = 0; //RANDOM DATA pkt.dest\_addr\_high = 0x11ff; pkt.src\_addr\_high = 0x2288; pkt.tag\_kind = UNTAGGED; pkt.tag\_prefix = 0x1234; pkt.s\_vlan\_tag\_prefix = 0x5678; pkt.err\_code = 0; for (int i=0;i&lt;100;i++) { pkt.dest\_addr\_low = i; pkt.src\_addr\_low = i+1; enet\_send\_pkt(0,&amp;pkt); //send packet to ENET UVC instance0 (MAC) enet\_recv\_pkt(1,&amp;rx\_pkt); //receive packet from ENET UVC instance1 (PHY) compare\_pkt(pkt,rx\_pkt); }; F. Flow used for Design Verification Much before arrival of RTL, C/Python model of image signal processor designs is developed for algorithm evaluation. Then, TLM/SystemC model of the design is created from C/Python model. After proper exhaustive validation of the model with required test vectors, the model qualifies as an Executable Golden Model or Executable Specification means a 'living' benchmark for design specification. Enabling the use of TLM Model as DUT expedites development and better proofing of the verification environment with wider test vectors without waiting for RTL to be available. Standard 'interfaces' are used to enable the reuse of verification components. In addition to standard method of bus-interface or signals level connectivity, UVM MultiLanguage Open Architecture is used to connect System Verilog TLM port directly to SystemC TLM port which gives advantage of better simulation speed and better development/debug cycle in addition of clean, better and easy connectivity/integration of blocks. Presence of TLM components gives us flexibility to make backdoor direct access to the DUT registers and memories. Fig. 5. Early development of Verification Environment using TLM Model ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-ec380f1a-2739-48f6-9c1c-90fbff9c12ed.jpg) A processor model is used which enables us to early develop 'C' test cases for programming of RTL registers/memories via CPU interface. Same 'C' test cases are used for controlling the SystemVerilog UVC's using Virtual Register interface (VRI) layer. In our verification environment, alternative Host interface path is used to do programming of configurable blocks using SystemVerilog UVM based test cases. In both above cases, control/data flows across both TLM and bus interface boundaries. This method enhances the chances of re-using different already existing blocks in flow. IP-XACT based tools are also used for automatically configuring the environment for various designs. By the time RTL arrives, complete verification environment and test-vectors are ready with sufficient sanctity, thus eliminating the number of verification environment issues which may arise when actual RTL verification is started. When RTL arrives, the TLM/SystemC model is simply replaced with RTL block with reuse of maximum of other verification components. This enhances the rapid/regress testing of design immediately. Also same C test cases can be run on actual core. Fig. 6. : Reuse of early developed Verification Environment ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-e032fba0-bbff-4a20-83b7-aacc2d1cecc7.jpg) ## III. RESULTS Using TLM reference model of the RTL, UVM based Environment for verification of design is developed without waiting for RTL to be available. Significant reduction in overall verification time of the design is achieved. ## IV. CONCLUSIONS TLM/SystemC reference model of the design is the key component to enable the early development of Verification Environment without waiting for RTL to be available. UVM based early verification Environment is developed using TLM/SystemC reference model of the design. Verification Environment is developed both with Host interface and Core using Virtual Register Interface (VRI) approach. IP-XACT based tools are used for automatically configuring the Verification Environment. Testing of features of Verification Environment at TLM abstraction level runs faster and thus, it overall speeds up functional verification. Same environment can be reused from IP level to SOC level or from one SOC to another SOC with no/minimal change. Verification Environment is reusable both vertically and across projects thus saving further time across projects. ## ACKNOWLEDGMENT The authors would like to specially thank to their management Giuseppe Bonanno (CAD Manager, Imaging Division, and STMicroelectronics) and Antoine Perrin (Manager, SDS Team, STMicroelectronics) for their guidance and support. We would also like to thank management and team members of Imaging Division, STMicroelectronics; Faculty members and peer scholars of JBS, Jaypee Institute of Information Technology University and also Cadence team for their support and guidance. ## REFERENCES - [1] Abhishek Jain, Giuseppe Bonanno, Dr. Hima Gupta and Ajay Goyal, 'Generic System Verilog Universal Verification Methodology Based Reusable Verification Environment for Efficient Verification of Image Signal Processing IPs/SOCs', International Journal of VLSI Design &amp; Communication Systems, 2012. - [2] Abhishek Jain, Piyush Kumar Gupta, Dr. Hima Gupta and Sachish Dhar, 'Accelerating System Verilog UVM Based VIP to Improve Methodology for Verification of Image Signal Processing Designs Using HW Emulator', International Journal of VLSI Design &amp; Communication Systems, 2013. - [3] Abhishek Jain, Mahesh Chandra, Arnaud Deleule and Saurin Patel, 'Generic and Automatic Specman-based Verification Environment for Image Signal Processing IPs', Design &amp; Reuse, 2009. - [4] Mark Glasser, 'Open Verification Methodology Cookbook', Springer, 2009. - [5] Iman, S., 'Step-by-Step Functional Verification with SystemVerilog and OVM', Hansen Brown Publishing, ISBN: 978-0-9816562-1-2, 2008. - [6] Rosenberg, S. and Meade, K., 'A Practical Guide to Adopting the Universal Verification Methodology (UVM)', Cadence Design Systems, ISBN 978-0-578-05995-6, 2010. - [7] Stuart Swan, 'An Introduction to System Level Modeling in SystemC 2.0', Cadence Design Systems, Inc. May 2001. - [8] Adam Rose, Stuart Swan, John Pierce, Jean-Michel Fernandez, 'Transaction Level Modeling in SystemC', Cadence Design Systems, Inc., 2005. - [9] Frank Ghenassia, 'Transaction Level Modeling with SystemC - TLM Concepts and Applications for Embedded Systems', ISBN: 978-0-38726232-1, 2010. - [10] Daniel D. Gajski,'System-Level Design Methodology', www. cecs.uci.edu /~gajski, 2003. - [11] Lukai Cai and Daniel Gajski, 'Transaction Level Modeling: An Overview', {lcai, gajski}@cecs.uci.edu, 2003. - [12] Farooq Khalid Chughtai, 'Accurate Performance Exploration of System- on-Chip using TLM', 2012. - [13] Thorsten, 'System Design with SystemC', Kulwar Academic Publishers Group, 2002. - [14] Sandeep Jana, Geetika Agarwal and Kishore Sur, 'Unique Approach for System Level Verification Using Scalable and Reusable Verification IP with TLM Infrastructure'. CDNLive 2010. - [15] Sandeep Jana, Krishna Kumar, Sonik Sachdeva, Swami Venkatasen and Debjoyoti Mukherjee, 'TLM Based software control of UVCs for Vertical Verification Reuse:, CDNLive 2012 - [16] Accellera Organization, Inc. Universal Verification Methodology (UVM) May 2012. - [17] IEEE Computer Society. IEEE Standard for System VerilogUnified Hardware Design, Specification, and Verification Language IEEE 1800-2009. 2009. - [18] Virtual Register Interface Layer over VIPs from Cadence Design System. - [19] Spirit information, http://www.spiritconsortium.org. - [20] Accellera VIP TSC, UVM Register Modelling Requirements, www.accellera.org /activities/vip/ - [21] www.ovmworld.org - [22] www.SystemVerilog.org - [23] www.uvmworld.org - [24] http://www.accellera.org/community/uvm/ - [25] www.systemc.org - [26] www.synopsys.com AUTHOR'S PROFILE ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-37a241c1-cbf9-498d-8d07-83a3f88907f9.jpg) Abhishek Jain, Technical Manager, STMicroelectronics Pvt. Ltd. Research Scholar, JBS, Jaypee Institute of Information Technology, Noida, India. Email: ajain\[email protected]; [email protected] Abhishek Jain has more than 11 years of experience in Industry. He is driving key activities on Functional Verification Flow in Imaging Division of STMicroelectronics. He has done PGDBA in Operations Management from Symbiosis, M.Tech in Computer Science from IETE and M.Sc. (Electronics) from University of Delhi. His main area of Interest is Project Management, Advanced Functional Verification Technologies and System Design and Verification especially UVM based Verification, Emulation/Acceleration and Virtual System Platform. Currently, he is doing Research in Advanced Verification Methods for Efficient Verification Management in Semiconductor Sector. Abhishek Jain is a member of IETE (MIETE). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-e0fd4baf-9887-46d0-b4b8-cbb28b9880c3.jpg) Dr. Hima Gupta, Associate Professor, Jaypee Business School (A constituent of Jaypee Institute of Information Technology University), A - 10, Sector62, Noida, 201 307 India. ## Email: hima\[email protected] Dr. Hima has worked with LNJ Bhilwara Group &amp; Bakshi Group of Companies for 5 yrs. and has been teaching for last 11 years as Faculty in reputed Business Schools. She also worked as Project Officer with NITRA and ATIRA at Ahmedabad for 5 years. She has published several research papers in National &amp; International journals. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-a28b4711-18a2-4ad7-8ae9-a9bc5b7cc30b.jpg) ## Sandeep Jana, Staff Engineer, STMicroelectronics Pvt. Ltd. ## Email: [email protected] Sandeep Jana is Staff Engineer at STMicroelectronics managing the TLM based Verification activities at Greater Noida. He has an expertise of over seven years in various aspects of ESL domain such as TLM modeling, Architectural exploration, Platform Integration, Mixed language Platforms, Advanced Verification Methodologies etc. He has been with ST since last 6 years and was previously working in VLSI group of HCL Technologies in their ESL domain. He has a B.Tech degree in Electronics Engineering from MDU Rohtak. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1150v1-figure-08d5aa66-ec01-42db-8d59-5834b4c3e726.jpg) ## Krishna Kumar, STMicroelectronics Pvt. Ltd. Email: [email protected] Krishna Kumar with almost 12 years at STMicroelectronics has experience in ESL and Placement and Routing of FPGA software tool chain. He holds B.Tech degree in Computer Engineering from Aligarh Muslim University, India.
null
[ "Abhishek Jain", "Dr. Hima Gupta", "Sandeep Jana", "Krishna Kumar" ]
2014-08-06T00:20:34+00:00
2014-08-06T00:20:34+00:00
[ "cs.SE" ]
Early Development of UVM based Verification Environment of Image Signal Processing Designs using TLM Reference Model of RTL
With semiconductor industry trend of smaller the better, from an idea to a final product, more innovation on product portfolio and yet remaining competitive and profitable are few criteria which are culminating into pressure and need for more and more innovation for CAD flow, process management and project execution cycle. Project schedules are very tight and to achieve first silicon success is key for projects. This necessitates quicker verification with better coverage matrix. Quicker Verification requires early development of the verification environment with wider test vectors without waiting for RTL to be available. In this paper, we are presenting a novel approach of early development of reusable multi-language verification flow, by addressing four major activities of verification like Early creation of Executable Specification, Early creation of Verification Environment, Early development of test vectors and Better and increased Re-use of blocks. Although this paper focuses on early development of UVM based Verification Environment of Image Signal Processing designs using TLM Reference Model of RTL, same concept can be extended for non-image signal processing designs. Main Keywords are SystemVerilog, SystemC, Transaction Level Modeling, Universal Verification Methodology (UVM), Processor model, Universal Verification Component (UVC), Reference Model.
1408.1153v1
## Continuous-variable dense coding via a general Gaussian state: Monogamy relation Jaehak Lee, Se-Wan Ji, Jiyong Park, and Hyunchul Nha Department of Physics, Texas A &amp; M University at Qatar, P.O. Box 23874, Doha, Qatar We study a continuous variable (CV) dense-coding protocol, originally proposed to employ a two-mode squeezed state, using a general two-mode Gaussian state as a quantum channel. We particularly obtain conditions to manifest quantum advantage by beating two well-known single-mode schemes, namely, the squeezed-state scheme (best Gaussian scheme) and the number-state scheme (optimal scheme achieving the Holevo bound). We then extend our study to a multipartite Gaussian state and investigate the monogamy of operational entanglement measured by the communication capacity under the dense-coding protocol. We show that this operational entanglement represents a strict monogamy relation, by means of Heisenberg's uncertainty principle among different parties, i.e., the quantum advantage for communication can be possible for only one pair of two-mode systems among many parties. ## I. INTRODUCTION Quantum correlation, especially entanglement [1], is a key resource for quantum information processing, e.g., quantum teleportation [2, 3] and quantum dense coding [4, 5]. Performance in such protocols, quantified by the output fidelity of teleportation and the communication capacity of dense coding, respectively, can be used as an operational measure of entanglement. When entanglement is shared by more than two parties, we may look into the multipartite entanglement structure and its usefulness by selecting a few parties among all and investigating their performance in quantum protocols for all such selected subsystems. dense coding with a general Gaussian state. The CV dense coding protocol was first proposed by Braunstein and Kimble [5] in which a pure two-mode squeezed vacuum (TMSV) state is employed as a quantum resource. A controlled dense coding was later developed [14], similar to the network quantum teleportation [15], in which a three-mode entangled state is prepared and information is transferred between two parties with the help of classical communication provided by a third party. Numerous studies have so far demonstrated that a monogamy relation is one of the fundamental properties of multipartite entanglement, that is, entanglement between some subsystems puts limitation on their correlation with the other parties. For instance, if two quantum systems are maximally entangled, they cannot be correlated with a third party at all, even classically [6]. The monogamy relation has been formulated quantitatively with a proper measure of entanglement for discrete variables [6, 7], which was also extended to Gaussian CV systems [8, 9]. On the other hand, only a few studies have attempted to find such monogamy relations in view of useful entanglement for quantum communication protocols. In Ref. [10], it was shown that teleportation fidelity satisfies a monogamy relation for three-qutrit pure states and for N -qubit pure states, but not in general. Recently, it was proved that a strict monogamy relation exists in dense coding for discrete variables [11], i.e., if a sender has some quantum advantage in dense coding with one receiver, (s)he can not have quantum advantage with any other receivers. In this paper, we study a CV dense coding protocol and show a strict monogamy relation in this regime. Ever since quantum dense coding was first developed in qubit systems [4], the dense coding capacity has been derived for arbitrary finite-dimensional systems [12] with arbitrary number of parties [13] for discrete-variable systems. On the other hand, there have been few studies on CV We here study the dense coding protocol employing an arbitrary two-mode Gaussian state. We then compare this two-mode scheme with two single-mode schemes, namely, the squeezed-state scheme known to be best among Gaussian schemes and the number-state scheme known to be the ultimate optimal scheme achieving the Holevo bound. We derive conditions to beat those two schemes, i.e. to detect two-mode Gaussian states that can manifest quantum advantage in CV dense coding. These conditions can be expressed in terms of the variances of two correlated quadratures as $$V _ { x _ { - } } V _ { p _ { + } } < B _ { c }, \text{ \quad \ \ } ( 1 )$$ where V x -and V p + are the variances of x 1 -x 2 and p 1 + p 2 , respectively. The bound B c turns out to be (1 / 4) 2 and (1 / 2 ) e 2 to beat the squeezed-state scheme and the number-state scheme, respectively. These are more stringent than the sufficient condition to verify entanglement [16], where the bound is 1 / 4. We also extend our study to the case of multipartite Gaussian states. We particularly show that, by means of Heisenberg's uncertainty principle, the criterion (1) can be satisfied for only one pair of two-modes among all. Accordingly, we have a strict monogamy relation for CV dense coding, that is, a sender can have quantum advantage with one receiver only. ## II. GAUSSIAN STATE DESCRIPTION We start with a brief description of Gaussian states and their transformations under Gaussian operations. N-mode Gaussian States -To describe an N -mode CV system, we introduce a 2 N -dimensional vector whose components are canonical variables of each mode, given by $$\xi = ( x _ { 1 }, p _ { 1 }, x _ { 2 }, p _ { 2 }, \cdots, x _ { N }, p _ { N } ) ^ { T }, \quad \ ( 2 )$$ with their corresponding operators $$\hat { \xi } = ( \hat { x } _ { 1 }, \hat { p } _ { 1 }, \hat { x } _ { 2 }, \hat { p } _ { 2 }, \cdots, \hat { x } _ { N }, \hat { p } _ { N } ) ^ { T }. \quad \ ( 3 ) \quad \text{III}$$ A Gaussian state is fully characterized by the first-order moments and the second-order moments of the position and the momentum operators. Its phase-space distribution (Wigner function) takes a form of Gaussian function $$W = \frac { 1 } { ( 2 \pi ) ^ { N } \sqrt { \det \sigma } } \, \exp \left [ - \frac { 1 } { 2 } ( \xi - \bar { \xi } ) ^ { T } \sigma ^ { - 1 } ( \xi - \bar { \xi } ) \right ], \ ( 4 ) \quad \text{$\text{and ini}$}$$ where ¯ = ξ i 〈 ˆ ξ i 〉 are the first-order moments and σ is the covariance matrix (CM) whose elements are the secondorder moments, $$\sigma _ { i j } = \frac { 1 } { 2 } \langle \hat { \xi } _ { i } \hat { \xi } _ { j } + \hat { \xi } _ { j } \hat { \xi } _ { i } \rangle - \bar { \xi } _ { i } \bar { \xi } _ { j }, \quad \ \ ( 5 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \emph { s m o } \,,$$ ( i, j = 1 , · · · , 2 N ). Due to the uncertainty relation arising from [ˆ x , p j ˆ ] = k iδ jk , every CM must satisfy $$\sigma + \frac { i } { 2 } \Omega _ { N } \geq 0, \text{ where } \Omega _ { N } = \bigoplus _ { N } ^ { N } \left ( \begin{array} { c c } 0 & 1 \\ - 1 & 0 \end{array} \right ). \quad ( 6 ) \quad \text{Then} \\ \mathcal { C } _ { \text{accumion} } \, \partial \text{matrix} \, \partial \text{in without} \, C \text{occision} \, \text{in} \, \text{out} \, t$$ Gaussian Operations -An arbitrary Gaussian unitary operation is a linear transformation of canonical operators that can be represented as ˆ ξ → Sξ ˆ + λ . Here λ is a 2 N -dimensional real vector displacing the first-order moments by ¯ ξ → ¯ + ξ λ and S is a symplectic transformation satisfying S Ω N S T = Ω N [17]. Under a symplectic transformation, CM evolves as σ → S σ S T . Standard form -Every two-mode Gaussian state, pure and mixed, can be transformed into a standard form via a set of local symplectic transformations, which can be written as $$\sigma _ { A B } ^ { ( 8 ) } = \begin{pmatrix} a _ { 1 } & 0 & c _ { 1 2 } & 0 \\ 0 & a _ { 1 } & 0 & d _ { 1 2 } \\ c _ { 1 2 } & 0 & a _ { 2 } & 0 \\ 0 & d _ { 1 2 } & 0 & a _ { 2 } \end{pmatrix}. \quad \begin{pmatrix} U _ { \text{BS} } \\ \text{and} \\ \rho _ { A E } \\ \text{qua} \\ \text{sets} \end{pmatrix} \\ \text{he case of three-mode svstems. a pure three-mode}$$ For the case of three-mode systems, a pure three-mode Gaussian state can be transformed to a standard form [9] $$\sigma _ { A B C } ^ { ( s ) } = \left ( \begin{array} { c c c c c } a _ { 1 } & 0 & e _ { 1 2 } ^ { + } & 0 & e _ { 1 3 } ^ { + } & 0 \\ 0 & a _ { 1 } & 0 & e _ { 1 2 } ^ { - } & 0 & e _ { 1 3 } ^ { - } \\ e _ { 1 2 } ^ { + } & 0 & a _ { 2 } & 0 & e _ { 2 3 } ^ { + } & 0 \\ 0 & e _ { 1 2 } ^ { - } & 0 & a _ { 2 } & 0 & e _ { 2 3 } ^ { - } \\ e _ { 1 3 } ^ { + } & 0 & e _ { 2 3 } ^ { + } & 0 & a _ { 3 } & 0 \\ 0 & e _ { 1 3 } ^ { - } & 0 & e _ { 2 3 } ^ { - } & 0 & a _ { 3 } \end{array} \right ). \quad ( 8 )$$ Each off-diagonal element e ± ij is shown in Appendix A. The coefficient a i 's must satisfy the following triangular inequality due to the uncertainty principle: $$| c _ { 2 } - c _ { 3 } | \leq 1 \leq c _ { 2 } + c _ { 3 }, \text{ where } c _ { j } = \frac { a _ { j } - \frac { 1 } { 2 } } { a _ { 1 } - \frac { 1 } { 2 } } \text{ for } j = 2, 3.$$ ## III. CV DENSE CODING AND SINGLE-MODE COMMUNICATION ## A. CV dense coding In the CV dense-coding scheme originally proposed by Braunstein and Kimble [5], Alice and Bob make use of an initially shared TMSV with squeezing parameter s , of which Wigner function is $$\text{the} _ { \text{md-} } \quad W _ { \rho _ { A B } } = \frac { 1 } { \pi ^ { 2 } } \exp \left [ - e ^ { 2 s } \left ( x _ { - } ^ { 2 } + p _ { + } ^ { 2 } \right ) - e ^ { - 2 s } \left ( x _ { + } ^ { 2 } + p _ { - } ^ { 2 } \right ) \right ], \\ \text{where} \, x _ { + } = ( x _ { 1 } \pm x _ { \vartheta } ) / \sqrt { 2 } \text{ and } n _ { + } = ( n _ { 1 } \pm n _ { \vartheta } ) / \sqrt { 2 }. \text{ Alice}$$ where x ± = ( x 1 ± x 2 ) / √ 2 and p ± = ( p 1 ± p 2 ) / √ 2. Alice encodes two classical variables { α x , α p } by displacing her mode in phase space with the amplitude α = α x + iα p . The probability distribution of the encoded amplitude can be taken as $$P ( \alpha ) = \frac { 1 } { \pi \sigma ^ { 2 } } \exp ( - \frac { | \alpha | ^ { 2 } } { \sigma ^ { 2 } } ). \quad \quad ( 1 1 )$$ Then, Alice sends her mode to Bob, who combines it with his mode at a 50/50 beam splitter. Finally, Bob carries out two quadrature measurements, x and p , on each of the output modes, respectively. The measurement outcomes are related to the quadrature amplitudes before the beam splitter as x -and p + . Denoting Bob's measured outcomes as { β , β x p } , the probability distribution P β α ( | ) conditioned on the input α is given by $$P ( \beta | \alpha ) = \int d y _ { 1 } d x _ { 2 } W _ { \rho ^ { \prime } _ { A B } } \left ( \beta _ { x }, y _ { 1 } ; x _ { 2 }, \beta _ { p } \right ), \quad ( 1 2 ) \\ \dashrightarrow \dots \quad \mathfrak { m r } \quad / \dots \dots \quad \cdots \quad \vdots \quad \mathfrak { m r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r rr r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r l r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r r$$ where W ρ ′ AB ( x , y 1 1 ; x , y 2 2 ) is the Wigner function of the output state at Bob's station, ρ ′ AB = U BS D 1 ( α ρ ) AB D † 1 ( α U ) † BS with the beam-splitting U BS and the displacement D 1 ( α ) acting on the input state ρ AB . The achievable information in this scheme can be quantified by the mutual information between the two sets of variables, { α x , α p } and { β , β x p } , $$H ( A \colon B ) = H ( \beta ) - H ( \beta | \alpha ). \text{ \quad \ \ } ( 1 3 )$$ Here, H denotes the Shannon entropy as $$\dots, \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta \, \dots \, \delta$$ which can be obtained using Eqs. (11) and (12) with P β ( ) = d αP α P β α 2 ( ) ( | ). ∫ For a TMSV input, the mutual information turns out to be $$H ( A \, \colon B ) = \ln ( 1 + \sigma ^ { 2 } e ^ { 2 s } ). \quad \ \ ( 1 5 ) \quad \ \ n u r$$ It increases with the squeezing parameter s , for Bob can read information more accurately due to the decreased variances of the correlated quadrature 〈 (∆ x -) 2 〉 = 〈 (∆ p + ) 2 〉 = exp( -2 ) s / 2. Another point to mention is that the mutual information becomes infinite with σ → ∞ , where σ is the variance of encoded variable α in Eq. (11). It is true regardless of squeezing s , which is simply the result of communicating infinitely large amount of information. However, it would require an infinite energy for encoding, thus, the constraint of finite-energy ¯ is typically introduced for a fair comparn ison between different schemes. When the average number of photons passing through the channel (Alice mode's energy plus the noise added by displacement) is restricted to ¯, one may adjust n σ in order to maximize the mutual information in Eq. (15) for a given s . With ¯ = n σ 2 + sinh 2 s for a TMSV, the optimal value occurs at the choice of σ 2 = cosh s sinh s and the CV dense coding capacity, i.e. optimized mutual information, is given by $$C _ { \text{dense} } = \ln ( 1 + \bar { n } + \bar { n } ^ { 2 } ). \quad \quad ( 1 6 ) \quad \underset { \text{ome} } { \text{be} }$$ ## B. single-mode schemes On the other hand, there are three well-known singlemode schemes under the energy constraint ¯. n The first one makes use of a coherent state, which is displaced by α (encoding) and then measured via heterodyne detection, i.e. simultaneous measurements of two quadratures (decoding). This coherent-state scheme yields the capacity [18] $$C _ { \text{coh} } = \ln ( 1 + \bar { n } ). \quad \quad \ ( 1 7 ) \quad \text{st} \varepsilon$$ We note that the CV dense-coding scheme using a TMSV always beats the coherent-state scheme regardless of ¯ n &gt; 0 [Cf. Eqs. (16) and (17)]. The second scheme employs a squeezed state, which is displaced by the amount x along the squeezed axis (encoding) and measured via homodyne detection (decoding). This Gaussian scheme, which can be a best strategy under the restriction of Gaussian states and Gaussian operations [18], yields the capacity $$C _ { \text{sq} } = \ln ( 1 + 2 \bar { n } ). \text{ \quad \ \ } ( 1 8 )$$ Compared with Eq. (16), this bound for single-mode Gaussian communication can be beaten by the CV dense coding for ¯ n &gt; 1 and it was demonstrated experimentally in Ref. [19]. The ultimate capacity of single-mode communication, when non-Gaussian operations are also available, is given by the maximum possible entropy of single-mode state under ¯ constraint. n This bound, known as the Holevo bound, is achieved when Alice encodes information in number states according to a thermal distribution and Bob decodes the information by photon number counting [20], although this scheme requires highly demanding experimental tasks. In this case, the capacity is given by $$C _ { \text{Fock} } = ( 1 + \bar { n } ) \ln ( 1 + \bar { n } ) - \bar { n } \ln \bar { n }. \quad \ ( 1 9 )$$ The CV dense coding can also beat this bound with a sufficiently large photon number, i.e., ¯ n &gt; 1 8835. . ## IV. CV DENSE CODING WITH ARBITRARY TWO-MODE GAUSSIAN STATES ## A. Mutual information Now we study the CV dense coding protocol using an arbitrary two-mode Gaussian state as a quantum channel beyond TMSVs. In the latter case, the conditions to beat the single-mode schemes are given only in terms of energy ¯, just because there exists a monotonic relation n between the degree of squeezing (entanglement) and ¯, n which is generally not the case. We here intend to derive general conditions to beat the squeezed-state scheme and the photon-number scheme, respectively, for an arbitrary two-mode Gaussian state. We first assume that Alice and Bob share a two-mode state having correlations between x 1 and x 2 and between p 1 and p 2 , respectively, with the condition 〈 ∆ x -∆ p + 〉 = 0. In the next section, we show that the scheme becomes optimal under the condition 〈 ∆ x -∆ p + 〉 = 0, which can always be met via certain local phase-rotations for a given state. For the case of TMSV, Alice encodes the same amount of information on both quadratures, which is reasonable because two correlated quadratures x -and p + have the same variances. In general, however, the communication capacity can be enhanced by encoding a different amount of information on each quadrature as $$P ( \alpha ) = \frac { 1 } { \pi \sigma _ { x } \sigma _ { p } } \exp \left ( - \frac { \alpha _ { x } ^ { 2 } } { \sigma _ { x } ^ { 2 } } - \frac { \alpha _ { p } ^ { 2 } } { \sigma _ { p } ^ { 2 } } \right ), \quad ( 2 0 )$$ as will be shown below. After Alice sends her mode to Bob, Bob measures two correlated quadratures x -and p + . The conditional probability distribution of Bob reading β when Alice encodes α is necessarily a Gaussian distribution that has variances V x -≡ 〈 (∆ x -) 2 〉 and V p + ≡ 〈 (∆ p + ) 2 〉 centered at α/ √ 2, that is, The factor √ 2 dividing α emerges from the output signal reduced by the beam splitter interaction. Using Eqs. (20) and (21), we obtain the mutual information as $$V _ { p _ { + } } \equiv \langle ( \Delta p _ { + } ) ^ { * } \rangle & \text{ centered at } \alpha / \sqrt { 2 }, \text{ that is, } \quad \text{On} \\ P ( \beta | \alpha ) & = \frac { 1 } { \pi \sqrt { V _ { x _ { - } } V _ { p _ { + } } } } \times \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \\ \end{array} \end{array} \end{cases} & \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{cases} \\ & \quad \exp \left [ - \frac { \left ( \beta _ { x } - \frac { \alpha _ { x } } { \sqrt { 2 } } \right ) } { V _ { x _ { - } } } - \frac { \left ( \beta _ { p } - \frac { \alpha _ { p } } { \sqrt { 2 } } \right ) } { V _ { p _ { + } } } \right ]. \ ( 2 1 ) & \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{cases} \\ \text{The factor $\sqrt { 2 }$ dividing $\alpha$ emerges from the output signal} \\ \text{reduced how the beam sniffer interaction $1\, \text{isin} $Eas $(20)} \end{array}$$ $$H ( A \colon B ) & = \frac { 1 } { 2 } \ln \left [ \left ( 1 + \frac { \sigma _ { x } ^ { 2 } } { 2 V _ { x _ { - } } } \right ) \left ( 1 + \frac { \sigma _ { p } ^ { 2 } } { 2 V _ { p _ { + } } } \right ) \right ]. \quad ( 2 2 ) \quad \text{$we$fi} \\ \text{--} \. \quad.$$ Under the energy constraint ¯ n = n 0 + n s , where n 0 is the mean photon number of Alice's mode before encoding and n s = ( σ 2 x + σ 2 p ) / 2 is the average number of photons added through displacement, we may adjust the amount of information encoded on each quadrature. If we assume n s to be large enough, n s &gt; V | x --V p + | , we find that the optimal encoding is achieved for the choices σ 2 x = n s + ( V p + -V x -) and σ 2 p = n s + ( V x --V p + ). It implies, e.g., that we need to encode more information on the p -quadrature ( σ p &gt; σ x ) if the state is more strongly correlated with respect to p -quadratures ( V x -&gt; V p + ). The optimized mutual information can be written as $$H ( A \colon B ) \leq H _ { \max } = \ln \frac { \bar { n } - n _ { 0 } + \left ( V _ { x _ { - } } + V _ { p _ { + } } \right ) } { 2 \sqrt { V _ { x _ { - } } V _ { p _ { + } } } }. \quad ( 2 3 ) \quad \stackrel { \text{the si} } { V _ { x _ { - } } } \\ \text{under} \\ \text{$One the other hand, if $n_{s}$ is small, $n_{s}\leq |V_{x _ { - } } - V_{p _ { + } } |, the $ \text{prove} \\ \sinote-quad \text{adrature encodino on the quadrature nossess} \sin \sigma \quad \colon \dots \dots$}$$ On the other hand, if n s is small, n s ≤ | V x --V p + | , the single-quadrature encoding on the quadrature possessing a smaller variance is optimal, which is not the case of our interest. ## B. Criteria to beat single-mode communications Now we examine when our CV dense coding protocol can beat the single-mode Gaussian communication by solving $$\text{onym} _ { \text{$f\equiv$} } & \text{$exp\left(H_{\max} \right) - \exp\left(C_{\text{sq} } \right ) & \text{$Dit} \\ & \equiv \frac { \bar { n } - n _ { 0 } + \left ( V _ { x _ { - } } + V _ { p _ { + } } \right ) } { 2 u } - \left ( 1 + 2 \bar { n } \right ) > 0, & \text{$n_{0} =$} \\ & \text{where $u \equiv \sqrt{V_{x _ { - } } V _ { p _ { + } } }. & \text{$(24)} \quad \text{To n} \\ & \text{allow} \\ \text{In Appendix B, we prove that, if $u < 1/4, one can always $prop$} \\ \text{find a ranso of $\bar{n}$ satisfies $f > 0$ otherwise $f$ can never}$$ In Appendix B, we prove that, if u &lt; 1 / 4, one can always find a range of ¯ satisfying n f &gt; 0, otherwise f can never be positive. Therefore, a two-mode Gaussian state can be useful beyond the squeezed-state scheme under the condition $$V _ { x _ { - } } V _ { p _ { + } } < \left ( \frac { 1 } { 4 } \right ) ^ { 2 }. \quad ( 2 5 ) \quad \text{by} \\ \text{is criterion is more stringent than the en- no}$$ Note that this criterion is more stringent than the entanglement detection criterion in which the product of correlated variances is bounded by 1 / 4 [16]. On the other hand, for the CV dense coding scheme to be truly dense coding, it must beat the ultimate singlemode communication with the capacity C Fock involving non-Gaussian operations. In a large ¯ n regime, C Fock in Eq. (19) asymptotically behaves as C Fock ∼ ln( en ¯). Thus, looking into $$& \exp \left ( H _ { \max } \right ) - \exp \left ( C _ { \text{Fock} } \right ) \\ & \approx \left ( \frac { 1 } { 2 u } - e \right ) \bar { n } + \frac { \left ( V _ { x _ { - } } + V _ { p _ { + } } \right ) - n _ { 0 } } { 2 u } > 0 \quad ( 2 6 ) \\ \wedge \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ we find that the CV dense coding protocol beats any single-mode communications under the condition $$V _ { x _ { - } } V _ { p _ { + } } < \left ( \frac { 1 } { 2 e } \right ) ^ { 2 } \text{ \quad \ \ } \text{(2)}$$ in a large ¯ regime, which is stricter than the condition n in Eq. (25). ## C. Improving the mutual information via local unitary operations We have previously identified the conditions to beat the single-mode schemes in terms of the product u ≡ √ V x -V p + . This product u is, however, not invariant under local sympletic operations, which makes it possible that the communication capacity can be further improved by local operations for a given state. We here investigate how local operations affect the performance of CV dense coding scheme and how one can enhance the mutual information, applying local Gaussian unitary operations, i.e., displacement, phase rotation, and local squeezing. ## 1. Displacement Displacement operation does not affect the second moments but only change the first moments ¯ . ξ The only parameter changed by displacement in Eq. (23) is n 0 = 〈 x 1 〉 2 + 〈 p 1 〉 2 + (∆ 〈 x 1 ) 2 〉 + (∆ 〈 p 1 ) 2 〉 of Alice mode. To maximize the mutual information, Alice should thus adjust the first moments to zero, 〈 x 1 〉 = 〈 p 1 〉 = 0 by a proper displacement, to have a minimum n 0 . ## 2. Phase rotation We have derived the mutual information in Eq. (23) by assuming the condition 〈 ∆ x -∆ p + 〉 = 0, which can now be relaxed. For an arbitrary two-mode state, using Eqs. (12) and (20), we obtain the mutual information achieved by the CV dense coding as $$H ( A \colon B ) = \frac { 1 } { 2 } \ln \left [ 1 + \frac { \left < ( \Delta p _ { + } ) ^ { 2 } \right > \sigma _ { x } ^ { 2 } + \left < ( \Delta x _ { - } ) ^ { 2 } \right > \sigma _ { p } ^ { 2 } + \frac { 1 } { 2 } \sigma _ { x } ^ { 2 } \sigma _ { p } ^ { 2 } } { 2 \left ( \left < ( \Delta x _ { - } ) ^ { 2 } \right > \left < ( \Delta p _ { + } ) ^ { 2 } \right > - \left < \Delta x _ { - } \Delta p _ { + } \right > ^ { 2 } \right ) } \right ]. \\ \text{ximated with the optimal encoding} \, \sigma _ { x } ^ { 2 } = n _ { s } + \left ( \left < ( \Delta x _ { - } ) ^ { 2 } \right > - \left < ( \Delta p _ { + } ) ^ { 2 } \right > \right ) \, \text{and} \, \sigma _ { n } ^ { 2 } = n _ { s } + \left ( \left < ( \Delta p _ { + } ) ^ { 2 } \right > - \left < ( \Delta x _ { - } ) ^ { 2 } \right > \right ),$$ This is maximized with the optimal encoding σ 2 x = n s + ( 〈 (∆ x -) 2 〉 - 〈 (∆ p + ) 2 〉 ) and σ 2 p = n s + ( 〈 (∆ p + ) 2 〉 - 〈 (∆ x -) 2 〉 ) , which gives $$H ( A \, \colon B ) \leq H _ { \max } = \frac { 1 } { 2 } \ln \left [ 1 + \frac { n _ { s } ^ { 2 } + 2 n _ { s } ( V _ { x _ { - } } + V _ { p _ { + } } ) + ( V _ { x _ { - } } - V _ { p _ { + } } ) ^ { 2 } } { 4 ( V _ { x _ { - } } V _ { p _ { + } } - V _ { x _ { p } } ^ { 2 } ) } \right ],$$ where V xp ≡ 〈 ∆ x -∆ p + 〉 . ## 3. Local squeezing Now let Alice and Bob perform a phase rotation on their modes so that $$\hat { x } _ { i } ^ { \prime } & = \hat { x } _ { i } \cos \theta _ { i } + \hat { p } _ { i } \sin \theta _ { i }, \quad \quad \text{opt} \\ \hat { p } _ { i } ^ { \prime } & = \hat { p } _ { i } \cos \theta _ { i } - \hat { x } _ { i } \sin \theta _ { i }, \quad \quad \text{(3)} \quad \text{for}! \\ \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array}$$ ( i = 1 2), with , θ 1 = θ and θ 2 = -θ . The second moments associated with ˆ x ′ -and ˆ p ′ + becomes $$\left \langle ( \Delta x _ { - } ^ { \prime } ) ^ { 2 } \right \rangle & = V _ { x _ { - } } \cos ^ { 2 } \theta + V _ { p _ { + } } \sin ^ { 2 } \theta + \sin 2 \theta V _ { x p }, \\ \left \langle ( \Delta p _ { + } ^ { \prime } ) ^ { 2 } \right \rangle & = V _ { p _ { + } } \cos ^ { 2 } \theta + V _ { x _ { - } } \sin ^ { 2 } \theta - \sin 2 \theta V _ { x p }, \\ \left \langle \Delta x _ { - } ^ { \prime } \Delta p _ { + } ^ { \prime } \right \rangle & = V _ { x p } \cos 2 \theta + \frac { 1 } { 2 } \left ( V _ { p _ { + } } - V _ { x _ { - } } \right ) \sin 2 \theta. \ ( 3 1 ) \\ \intertext {We readly see that the two quantities $V_{x_{-}} + V_{p_{+}}$ and $F_{v}$ and $F_{v}$} } _ { \nu = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{vv} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_v = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v} = V_{v})$$ We readily see that the two quantities V x -+ V p + and V x -V p + -V 2 xp are invariant under the rotation in Eq. (30). Furthermore, the optimized H max over the angle θ occurs at tan 2 θ = V x --V p + 2 V xp , which leads to V ′ xp = ∆ 〈 x ′ -∆ p ′ + 〉 = 0. Therefore, by a phase rotation, the correlation V ′ xp can be made zero and an optimal communication capacity arises with the value $$H _ { \max } = \ln \frac { \bar { n } - n _ { 0 } + \left ( V _ { x _ { - } } + V _ { p _ { + } } \right ) } { 2 \sqrt { V _ { x _ { - } } V _ { p _ { + } } - V _ { x p } ^ { 2 } } }. \quad \ ( 3 2 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ n p a r i n g \, E q. \ ( 3 2 ) \text{ with } E q. \ ( 2 3 ), \, \, \text{ we now see that a } \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ Comparing Eq. (32) with Eq. (23), we now see that a general condition to beat the squeezed-state scheme is given by $$V _ { x _ { - } } V _ { p _ { + } } - V _ { x p } ^ { 2 } < \left ( \frac { 1 } { 4 } \right ) ^ { 2 } \quad \ \ \ \ \ ( 3 3 ) \quad \ V _ { a }$$ That is, if a given state satisfies Eq. (33), one readily sees that H max of Eq. (29) can be larger than C sq of Eq. (18) in a large ¯ region. n On the other hand, if the given state has the correlation as V x -V p + -V 2 xp &gt; (1 / 4) , the 2 product V ′ x -V ′ p + &gt; (1 / 4) 2 is also obtained in a frame of V ′ xp = 0, using the invariance V x -V p + -V 2 xp under our rotation described above, where an optimized capacity arises. However, we have already shown in Appendix B that for a case of V ′ xp = 0, the state with the condition V ′ x -V ′ p + &gt; (1 / 4) 2 cannot beat the squeezed-state scheme, nor does the given state before rotation. In the previous subsections, we have shown that an optimal CV dense coding arises under the conditions of zero mean amplitudes and 〈 ∆ x -∆ p + 〉 = 0. Henceforth, we consider a two-mode CM in standard form (7) with only local squeezing operations applied to a given state. A symplectic transformation corresponding to a local squeezing is represented by S i = diag( e r i , e -r i ) for each mode i . The CM after local squeezings is written as $$\begin{pmatrix} \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \end{pmatrix} \\ \left ( \begin{smallmatrix} a _ { 1 } e ^ { 2 r _ { 1 } } & 0 & c _ { 1 2 } e ^ { r _ { 1 } + r _ { 2 } } & 0 \\ 0 & a _ { 1 } e ^ { - 2 r _ { 1 } } & 0 & d _ { 1 2 } e ^ { - r _ { 1 } - r _ { 2 } } \\ c _ { 1 2 } e ^ { r _ { 1 } + r _ { 2 } } & 0 & a _ { 2 } e ^ { 2 r _ { 2 } } & 0 \\ 0 & d _ { 1 2 } e ^ { - r _ { 1 } - r _ { 2 } } & 0 & a _ { 2 } e ^ { - 2 r _ { 2 } } \end{pmatrix}. \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \end{pmatrix}.$$ First let us take an example of two-mode states, which is a two-mode reduced state out of a pure three-mode state in (8), with a 1 = 1 2 . , a 2 = 1 4 . , a 3 = 0 9. . In Fig. 1(a), we plot the mutual information against squeezing parameters r 1 and r 2 . A maximum value (red dot) is found at r 1 ≈ -0 054 and . r 2 ≈ -0 095, . which means that the standard form before the squeezing operations is not optimal for CV dense coding. In general, it is a nontrivial task to find optimal squeezing parameters r 1 and r 2 that maximize the mutual information Eq. (23), because the quantities n 0 , V x -, and V p + are not invariant under local squeezing. Instead we here optimize V x -V p + which is a key quantity in the criterion of Eq. (1), which can be written as $$V _ { x _ { - } } V _ { p _ { + } } & = \left ( \frac { a _ { 1 } t + a _ { 2 } t ^ { - 1 } } { 2 } - e _ { 1 2 } ^ { + } \right ) \left ( \frac { a _ { 1 } t ^ { - 1 } + a _ { 2 } t } { 2 } - e _ { 1 2 } ^ { - } \right ), \\ \dots & \quad \text{with $t=even(\nolimits,\, -\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nulimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\ncolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nocolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nclimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\nolimits\ncorner}$$ with t ≡ exp( r 1 -r 2 ). Note that V x -V p + is independent of the sum r 1 + r 2 . By solving d dt ( V x -V p + ) = 0, we can find an explicit expression of t opt that minimizes V x -V p + , although the expression is lengthy. In Fig. 1(b), we plot V x -V p + against squeezing parameters for the case we considered above. We see that V x -V p + has the same value along the line r 1 -r 2 = (const). The minimum is achieved when r 1 -r 2 ≈ -0 034, which is not the case of . a standard form. In Fig. 2(a), we plot the optimal r 1 -r 2 for the twomode reduced state of a pure three-mode state in standard form (8) with a fixed a 1 (= 1 5) . and varying a 2 FIG. 1. (a) Plot illustrating the mutual information H against local squeezing parameters r 1 and r 2 . A red dot represents the maximum point and the green dashed curve represents the points of the mutual information equal to the capacity of squeezed-state communication C sq under the same energy constraint. (b) Plot illustrating V x -V p + against squeezing parameters r 1 and r 2 . Red thick line represents the minimum where r 1 -r 2 = ln t opt (See main text). The criterion in Eq. 1 is satisfied in the region between two green dashed lines. In both (a) and (b), we use the parameters a 1 = 1 2 . , a 2 = 1 4 . , a 3 = 0 9 and energy constraint ¯ = 10. . n ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1153v1-figure-a474c09b-3b31-4720-bee4-9fff81ee1790.jpg) and a 3 (scaled in terms of c 2 and c 3 ). For a symmetric state with a 1 = a 2 ( c 2 = 1), V x -V p + is minimized when r 1 -r 2 = 0 so that the standard form is optimal. Otherwise, a nonzero local squeezing is required for optimization. By minimizing V x -V p + , we can modify a state which does not initially satisfy the criterion of Eq. (1) to a form satisfying it via local squeezing. In Fig. 2(b), we plot the region where the criterion (1) is satisfied with(without) local squeezing with a fixed a 1 (= 1 5) . and varying a 2 and a 3 . We find the region between the solid curve and the dashed curve, where V x -V p + &lt; 1 / 16 is satisfied with optimization but not in the standard FIG. 2. (a) Plot of optimal r 1 -r 2 (b) Plot illustrating the region where the criterion (1) is satisfied with(without) local squeezing. We use the parameter a 1 = 1 5 and . a 2(3) is rescaled in terms of c 2(3) . Thick lines represent the boundary of pure quantum states, given by Eq. (9). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1153v1-figure-20764aba-515d-470d-996d-be8ab4dc9ef7.jpg) form. ## V. CV DENSE CODING WITH MULTI-MODE GAUSSIAN STATES In this section, we extend our study of CV dense coding to the case of multipartite Gaussian states, specifically employing different pairs of two modes out of multiparties. Let us first assume that a pure three-mode Gaussian state ρ 0 is distributed to three parties, Alice, Bob, and Charlie in the standard form of Eq. (8). Alice here plays as an information sender and either Bob or Charlie is a receiver. First we consider the case without optimization and obtain the mutual information H A ( : B ) and H A ( : C ), respectively, for a given three-mode state. In Fig. 3, we plot the region where the mutual information attained by FIG. 3. Plot illustrating the regions where the mutual information surpasses the capacity of (a) coherent-state communication and of (b) squeezed-state communication. We use the parameter a 1 = 1 5, and . a 2 and a 3 are rescaled in terms of c 2 and c 3 . Energy constraint is given by ¯ = 10. n Thick lines represent the boundary of pure quantum states, given by Eq. (9). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1153v1-figure-aa1a4262-c92d-4001-ab94-a6cf2aeef4ad.jpg) CV dense coding protocol between Alice and Bob (Charlie), H A ( : B C ( )), surpasses the capacity of Gaussian single-mode schemes. We see that the CV dense coding protocol beats the coherent-state communication in a broad region and that both H A ( : B ) and H A ( : C ) can surpass the capacity of coherent-state communication simultaneously in a certain region. However, we do not find the region where both H A ( : B ) and H A ( : C ) surpass the capacity of squeezed-state communication simultaneously. It means that Alice can not make a useful CV dense coding to beat the squeezed-state communication with both receivers simultaneously. We now show that even if they attempt to optimize the mutual information by applying local unitary operations for the two pairs { A,B } and { A,C , respectively, } it is impossible to beat the squeezed-state communica- FIG. 4. Plot illustrating region where the criterion (1) is satisfied for ρ ′ AB (red) and ρ ′′ AC (blue) with optimal local squeezings. We use the parameter a 1 = 1 5, . and a 2 and a 3 are rescaled in terms of c 2 and c 3 . Thick lines represent the boundary of pure quantum states, given by Eq. (9). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1153v1-figure-4464beac-10d0-4bb5-8dbb-86244b126c92.jpg) tion with both receivers simultaneously. Alice and Bob (Charlie) now perform optimal local squeezing operations on their modes and have the optimized state ρ ′ AB ( ρ ′′ AC ). We prove that the criterion to beat squeezed-state communication, Eq. (1), cannot be satisfied for both ρ ′ AB and ρ ′′ AC because the product of variances is bounded, regardless of local squeezing parameters, as $$\begin{array} { c } \dashv \circ \dashv \dashv \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdelta \quad \end{array} \quad \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \begin{array} { c } \end{array} \end{array} \begin{array} \end{array} \end{array} \begin{array} \end{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} { c } \begin{array} { c } \end{array} { c } \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array} \begin{array}} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array> \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array}" \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{array} \end{$$ ∣ ∣ The main idea of proof is to apply Heisenberg's uncertainty principle for non-commuting operators ˆ x 1 -ˆ x 2 and ˆ +ˆ p 1 p 3 and also for ˆ x 1 -ˆ x 3 and ˆ +ˆ p 1 p 2 (see Appendix C for details). Therefore, we find a strict monogamy relation for CV dense coding: if Alice has quantum advantage in CV dense coding with Bob, she can never have quantum advantage with Charlie. In Fig. 4, we plot the region where V x -V p + &lt; 1 / 16 is satisfied for ρ ′ AB and ρ ′′ AC . We see that there is no overlap between two regions so that a strict monogamy relation is satisfied. As the condition to beat the Holevo bound (number-state scheme) is even stricter as V x -V p + &lt; 1 / 4 e 2 , we also conclude that a true dense-coding is possible only for a single pair of two modes. A general mixed three-mode state may not be written in the standard form (8). However, if the three-mode state has the condition 〈 ∆ x -∆ p + 〉 = 0 for both pairs of { A,B } and { A,C , the proof in Appendix C is still } valid, which in fact applies to any two pairs of two modes selected out of many parties beyond three-mode cases. For a symmetric, mixed, N -mode state which is invariant under the permutation of modes, we generally obtain a strict monogamy relation without resort to the condition 〈 ∆ x -∆ p + 〉 = 0. In Sec. IV C 2, we have derived a general conditon to beat the squeezed-state scheme, V x -V p + -V 2 xp &lt; (1 / 4) 2 in Eq. (33). As shown before, it is equivalent to V ′ x -V ′ p + &lt; (1 / 4) 2 eliminating V xp by a rotation { θ, - } θ of each mode, respectively. Let { θ, - } θ and { θ , ′ - } θ ′ denote those angles of rotation for each pair of two modes { A,B } and { A,C , respectively. } For a symmetric state, we have θ = θ ′ and prove that V ′ x -V ′ p + &lt; (1 / 4) 2 is possible for only one pair in Appendix C. ## VI. CONCLUSION In this paper, we have studied the CV dense-coding protocol employing an arbitrary two-mode Gaussian state. We have particularly derived criteria, Eq. (1) or its generalized form Eq. (33), to detect two-mode states that can be more useful for communication than singlemode schemes, namely the squeezed-state scheme (best among Gaussian schemes) and the number-state scheme (the optimal scheme achieving the Holevo bound). We have also shown how to enhance the performance of CV dense coding for a given two-mode state via local operations. We have also extended our study to a multipartite Gaussian state and proved that there exists a strict monogamy relation among different parties in view of the - [1] R. Horodecki, P. Horodecki, M. Horodecki, and K. Horodecki, Rev. Mod. Phys. 81 , 865 (2009). - [2] C. H. Bennett, G. Brassard, C. Cr´ epeau, R. Jozsa, A. Peres, and W. K. Wootters, Phys. Rev. Lett. 70 , 1895 (1993). - [3] S. L. Braunstein and H. J. Kimble, Phys. Rev. Lett. 80 , 869 (1998). - [4] C. H. Bennett and S. J. Wiesner, Phys. Rev. Lett. 69 , 2881 (1992). - [5] S. L. Braunstein and H. J. Kimble, Phys. Rev. A 61 , 042302 (2000). - [6] V. Coffman, J. Kundu, and W. K. Wootters, Phys. Rev. A 61 , 052306 (2000); M. Koashi, and A. Winter, Phys. Rev. A 69 , 022309 (2004). - [7] T. J. Osborne and F. Verstraete, Phys. Rev. Lett. 96, 220503 (2006). - [8] G. Adesso and F. Illuminati, New J. Phys. 8, 15 (2006); T. Hiroshima, G. Adesso, and F. Illuminati, Phys. Rev. Lett. 98 , 050503 (2007). - [9] G. Adesso, A. Serafini, F. Illuminati, Phys. Rev. A 73 , 032345 (2006). - [10] S. Lee and J. Park, Phys. Rev. A 79 , 054309 (2009); J. Kim, J. Joo, and S. Lee, Eur. Phys. J. D 65 , 593 (2011). - [11] R. Prabhu, A. K. Pati, A. Sen(De), and U. Sen, Phys. Rev. A 87 , 052319 (2013). - [12] M. Horodecki, P. Horodecki, R. Horodecki, D. Leung, and B. Terhal, Quantum Inf. Comput. 1 , 70 (2001). operational entanglement, i.e., communication capacity via dense-coding protocol. That is, a sender (Alice) can have quantum advantage over the single-mode schemes strictly with one receiver only, which was proved for the case of symmetric N -mode systems unconditionally and for the case of general multimode systems possessing { x , x i j } - and { p , p i j } -correlations only. For a future work, it will be interesting to study the CV dense-coding and its monogamy relation beyond Gaussian regime. It has been known that some nonGaussian operations can enhance performance of quantum information tasks, e.g. teleportation [21]. Thus, it is of fundamental and practical interest whether the nonGaussian regime can manifest a different feature from the monogamy relation identified here. In addition, the study of monogamy relation can be further extended to other operational measures like the output fidelity of CV teleportation. These studies may contribute to our understanding of multipartite entanglement structure in CV systems providing an insight into quantum network communication using multimode CV systems. ## ACKNOWLEDGEMENT This work is supported by the NPRP grant 4-554-1-084 from Qatar National Research Fund. - [13] D. Bruß, G. M. D'Ariano, M. Lewenstein, C. Macchiavello, A. Sen(De), and U. Sen, Phys. Rev. Lett. 93 , 210501 (2004); D. Bruß, M. Lewenstein, A. Sen(De), U. Sen, G. M. D'Ariano, and C. Macchiavello, Int. J. Quantum Inf. 4, 415 (2006). - [14] J. Zhang, C. Xie, and K. Peng, Phys. Rev. A 66 , 032318 (2002); J. Jing, J. Zhang, Y. Yan, F. Zhao, C. Xie, and K. Peng, Phys. Rev. Lett. 90 , 167903 (2003). - [15] P. van Loock and Samuel L. Braunstein, Phys. Rev. Lett. 84 , 3482 (2000). - [16] S. M. Tan, Phys. Rev. A 60 , 2752 (1999); V. Giovannetti, S. Mancini, D. Vitali, and P. Tombesi, Phys. Rev. A 67 , 022320 (2003). - [17] Arvind, B. Dutta, N. Mukunda, and R. Simon, Pramana, J. Phys. 45, 471 (1995). - [18] Y. Yamamoto and H.A. Haus, Rev. Mod. Phys. 58, 1001 (1986). - [19] J. Mizuno, K. Wakui, A. Furusawa, and M. Sasaki, Phys. Rev. A 71 , 012304 (2005). - [20] H.P. Yuen and M. Ozawa, Phys. Rev. Lett. 70, 363 (1993); C.M. Caves and P.D. Drummond, Rev. Mod. Phys. 66, 481 (1994). - [21] T. Opatrn´, G. Kurizki, and D.-G. Welsch, Phys. Rev. A y 61, 032302 (2000); P. T. Cochrane, T. C. Ralph, and G. J. Milburn, Phys. Rev. A 65, 062306 (2002); S. Olivares, M. G. A. Paris, and R. Bonifacio, Phys. Rev. A 67, 032314 (2003); S.-Y. Lee, S.-W. Ji, H.-J. Kim, and H. Nha, Phys. Rev. A 84, 012302 (2011). ## Appendix A: Standard form CM of pure three-mode Gaussian states A pure three-mode Gaussian state satisfies $$\text{Det} \sigma _ { A B C } = \left ( \frac { 1 } { 2 } \right ) ^ { 3 }, \text{ Det} \sigma _ { i j } = \left ( \frac { 1 } { 2 } \right ) ^ { 2 } \text{ Det} \sigma _ { k },$$ where σ ij ( σ k ) is the reduced two-mode (single-mode) CM of σ ABC with i, j, k = 1 2 3 different from each other. , , From these conditions, after some algebra, one finds the expression of off-digonal elements of CM in Eq. (8) as $$e _ { i j } ^ { + } \equiv \frac { \sqrt { [ ( a _ { i } - a _ { j } ) ^ { 2 } - ( a _ { k } - \frac { 1 } { 2 } ) ^ { 2 } ] [ ( a _ { i } - a _ { j } ) ^ { 2 } - ( a _ { k } + \frac { 1 } { 2 } ) ^ { 2 } ] } \pm \sqrt { [ ( a _ { i } + a _ { j } ) ^ { 2 } - ( a _ { k } - \frac { 1 } { 2 } ) ^ { 2 } ] [ ( a _ { i } + a _ { j } ) ^ { 2 } - ( a _ { k } + \frac { 1 } { 2 } ) ^ { 2 } ] } } { 4 \sqrt { a _ { i } a _ { j } } }. \quad ( A 2 )$$ ## Appendix B: Proof for the criterion of Equation (1) Arranging f in Eq. (24), we have $$f = \frac { 1 - 4 u } { 2 u } n _ { s } + \frac { V _ { x _ { - } } + V _ { p _ { + } } } { 2 u } - ( 1 + 2 n _ { 0 } ).$$ ## · Case I: u &lt; 1 / 4 For a given state, the last two terms in the right-hand side of Eq. (B1) are finite. Thus, we can always find f &gt; 0 with a sufficiently large n s . ## · Case II: u ≥ 1 / 4 Above all, we derive the bound for V x -. Without loss of generality, let us assume V x -≤ V p + . A lower bound arises from Heisenberg's uncertainty principle as $$\langle \Delta ^ { 2 } \hat { x } _ { - } \rangle \langle \Delta ^ { 2 } \hat { p } _ { 1 } \rangle & \geq \frac { 1 } { 4 } \left | \left \langle \left [ \frac { \hat { x } _ { 1 } - \hat { x } _ { 2 } } { \sqrt { 2 } }, \hat { p } _ { 1 } \right ] \right \rangle \right | ^ { 2 } = \frac { 1 } { 8 } \left | ( [ \hat { x } _ { 1 }, \hat { p } _ { 1 } ] ) \right | ^ { 2 } = \frac { 1 } { 8 }, \\ \text{or } \ V _ { x _ { - } } & \geq \frac { 1 } { 8 \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle }. \\ \sum \text{and set to } \ V _ { x _ { - } } & \quad \text{and set to } \ V _ { x _ { - } } & \quad \text{and set to } \ V _ { x _ { - } }$$ Taking partial derivative of H max with respect to V p + , we find $$\frac { \partial H _ { \max } } { \partial V _ { p _ { + } } } = - \frac { n _ { s } + V _ { x _ { - } } - V _ { p _ { + } } } { V _ { p _ { + } } ( n _ { s } + V _ { x _ { - } } + V _ { p _ { + } } ) },$$ which is negative under the two-quadrature encoding condition n s &gt; V ∣ ∣ x --V p + ∣ ∣ . Therefore H max becomes maximum when V p + is minimum, i.e. V p + = V x -, which is given by $$H _ { \max } \leq \ln \frac { n _ { s } + 2 V _ { x _ { - } } } { 2 V _ { x _ { - } } }.$$ In order to beat squeezed-state communication, V x -must be smaller than n s 4¯ n . On the other hand, we can find the upper bound of f under the encoding condition n s &gt; V ∣ x --V p + ∣ : $$\text{to beat squeeze} \text{-state communication, } v _ { x _ { - } } \text{ must be smaller than} \frac { \lambda } { 4 \theta }. \\ \text{other hand, we can find the upper bound of } f \text{ under the encoding condition } n _ { s } > \left | V _ { x _ { - } } - V _ { p _ { + } } \right | \colon \\ f < \frac { 1 - 4 u } { 2 u } \left ( V _ { p _ { + } } - V _ { x _ { - } } \right ) + \frac { V _ { x _ { - } } + V _ { p _ { + } } } { 2 u } - ( 1 + 2 n _ { 0 } ) \\ = - 2 \left ( \sqrt { V _ { p _ { + } } } - \frac { 1 } { 4 \sqrt { V _ { x _ { - } } } } \right ) ^ { 2 } + \frac { 1 } { 8 V _ { x _ { - } } } + 2 V _ { x _ { - } } - ( 1 + 2 n _ { 0 } ) \\ \leq g ( V _ { x _ { - } } ) - ( 1 + 2 n _ { 0 } ), \quad \text{ where } \ g ( x ) \equiv \frac { 1 } { 8 x } + 2 x.$$ Since g x ( ) is a decreasing function in the range 0 &lt; x &lt; 1 / 4, we find the range of g V ( x -) as The upper bound satisfies $$g \left ( \frac { n _ { s } } { 4 \bar { n } } \right ) < g \left ( V _ { x _ { - } } \right ) \leq g \left ( \frac { 1 } { 8 \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle } \right ) \\ \text{isfiles}$$ $$g \left ( \frac { 1 } { 8 \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle } \right ) = \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle + \frac { 1 } { 4 \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle } \leq \left \langle \Delta ^ { 2 } \hat { p } _ { 1 } \right \rangle + \left \langle \Delta ^ { 2 } \hat { x } _ { 1 } \right \rangle = 1 + 2 n _ { 0 }. \\ \text{ere the Heisenberg-uncertaintv inequality is used. By putting the upper bound of } a ( V _ { x } ) \text{ into Ea. (B5). we}$$ where the Heisenberg-uncertainty inequality is used. By putting the upper bound of g V ( x -) into Eq. (B5), we obtain f &lt; 0. ## Appendix C: Lower bound for the product of correlated variances With operators ˆ x i and ˆ p i for the initial three-mode state ρ 0 , we can write, in the Heisenberg picture, operators for the optimal state ρ ′ AB as ˆ x ′ 1 = e -r ′ 1 ˆ x , p 1 ˆ ′ 1 = e r ′ 1 ˆ p , x 1 ˆ ′ 2 = e -r ′ 2 ˆ x , p 2 ˆ ′ 2 = e r ′ 2 ˆ , p 1 and similarly, ˆ x ′′ 1 = e -r ′′ 1 ˆ x , p 1 ˆ ′′ 1 = e r ′′ 1 ˆ p , x 1 ˆ ′′ 3 = e -r ′′ 3 ˆ x , p 3 ˆ ′′ 3 = e r ′′ 3 ˆ p 3 for ρ ′′ AC . Then we find $$\text{for the opumai state } \rho _ { A B } \text{ as } x _ { 1 } = e \colon \tilde { x } _ { 1 }, p _ { 1 } = e \colon p _ { 1 }, x _ { 2 } = e \colon \tilde { x } _ { 2 }, p _ { 2 } = e \tilde { x } _ { 1 }, \text{and} \text{summary}, \tilde { x } _ { 1 } = e \colon \tilde { x } _ { 1 }, p _ { 1 } \\ e ^ { \prime \prime } \hat { p } _ { 1 } \hat { z } ^ { \prime } _ { 3 } = e ^ { - r ^ { \prime \prime } } \tilde { x } _ { 3 } \hat { p } _ { 1 } ^ { \prime } s = e ^ { r ^ { \prime \prime } } \hat { p } _ { 3 } \text{ for } \rho _ { A C } ^ { \prime \prime }. \text{ Then we find} \\ & \left \langle ( \Delta x _ { - } ) ^ { 2 } \right \rangle _ { \rho ^ { \prime } _ { A B } } \left \langle ( \Delta p _ { + } ) ^ { 2 } \right \rangle _ { \rho ^ { \prime } _ { A B } } \left \langle ( \Delta x _ { - } ) ^ { 2 } \right \rangle _ { \rho ^ { \prime } _ { A C } } \left \langle ( \Delta p _ { + } ) ^ { 2 } \right \rangle _ { \rho ^ { \prime \prime } _ { A C } } \\ & = \left \langle \Delta ^ { 2 } \left ( \frac { \tilde { x } _ { 1 } - \hat { z } ^ { \prime } _ { 2 } } { \sqrt { 2 } } \right ) \right \rangle _ { \rho _ { 0 } } \left \langle \Delta ^ { 2 } \left ( \frac { \tilde { p } _ { 1 } + \hat { p } _ { 2 } } { \sqrt { 2 } } \right \rangle \right \rangle _ { \rho _ { 0 } } \left \langle \Delta ^ { 2 } \left ( \frac { \tilde { x } _ { 1 } ^ { \prime } - \hat { x } _ { 1 } ^ { \prime } } { \sqrt { 2 } } \right ) \right \rangle _ { \rho _ { 0 } } \left \langle \Delta ^ { 2 } \left ( \frac { \tilde { p } _ { 1 } ^ { \prime } + \hat { p } _ { 1 } ^ { \prime } } { \sqrt { 2 } } \right ) \right \rangle _ { \rho _ { 0 } } \\ & \geq \left ( \frac { 1 } { 4 } \right ) ^ { 2 } \left | \left \langle \left \langle \left [ \frac { \tilde { x } _ { 1 } ^ { \prime } - \hat { x } _ { 2 } ^ { \prime } } { \sqrt { 2 } }, \frac { \tilde { p } _ { 1 } ^ { \prime \prime } + \hat { p } _ { 2 } ^ { \prime \prime } } { \sqrt { 2 } } \right ] \right \rangle _ { \rho _ { 0 } } \right | ^ { 2 } \times \left | \left \langle \left [ \frac { \tilde { p } _ { 1 } + \hat { p } _ { 2 } } { \sqrt { 2 } }, \frac { \tilde { p } _ { 1 } ^ { \prime } - \hat { x } _ { 3 } ^ { \prime \prime } } { \sqrt { 2 } } \right ] \right \rangle _ { \rho _ { 0 } } \right | ^ { 2 } \\ & = \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \left | \left \langle \left [ e ^ { - r ^ { \prime } } \hat { p } _ { 1 }, e ^ { r ^ { \prime \prime } } \hat { p } _ { 1 } \right ] \right \rangle _ { \rho _ { 0 } } \right | ^ { 2 } \times \left | \left \langle \left [ e ^ { r ^ { \prime } } \hat { p } _ { 1 }, e ^ { - r ^ { \prime \prime } } \tilde { x } _ { 1 } \right ] \right \rangle _ { \rho _ { 0 } } \right | ^ { 2 } \\ & = \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \left | \left \langle [ \hat { x } _ { 1 }, \hat { p } _ { 1 } ] \right \rangle _ { \rho _ { 0 } } \right | ^ { 4 } \geq \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 }. \\ \text{ In the case of applying local phase rotations, we have } \tilde { x } _ { i } ^ { \prime } = \tilde { x } _ { i } \cos \theta _ { i } + \hat { p } _ { i } \sin \theta _ { i } \text{ and } \hat { p } _ { i } ^ { \prime } = \hat { p } _ { i } \cos \theta _ { i } - \hat { x } _ { i } \sin \theta _ { i }. \text{ Let us} \\ \text{take the angles of rotation } \{ \theta _ { 1 }, - \theta _ { 1 } \} \text{ and } \{ \theta _ { 2 }, - \theta _ { 2 } } \} \text{ for each pair of two modes } \{ A, B \} \text{ and } \{ A, C \}. \text{ Then, the } 4th line of the above derivation is changed to$$ ∣ ∣ In the case of applying local phase rotations, we have ˆ x ′ i = ˆ cos x i θ i + ˆ sin p i θ i and ˆ p ′ i = ˆ cos p i θ i -ˆ x i sin θ i . Let us take the angles of rotation { θ , 1 -θ 1 } and { θ , 2 -θ 2 } for each pair of two modes { A,B } and { A,C . Then, the 4th line } of the above derivation is changed to $$& = \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \left | \left \langle \left [ \hat { x } _ { 1 } \cos \theta _ { 1 } + \hat { p } _ { 1 } \sin \theta _ { 1 }, \hat { p } _ { 1 } \cos \theta _ { 2 } - \hat { x } _ { 1 } \sin \theta _ { 2 } \right ) _ { \rho _ { 0 } } \right | ^ { 2 } \times \left | \left \langle \left [ \hat { p } _ { 1 } \cos \theta _ { 1 } - \hat { x } _ { 1 } \sin \theta _ { 1 }, \hat { x } _ { 1 } \cos \theta _ { 2 } + \hat { p } _ { 1 } \sin \theta _ { 2 } \right ] _ { \rho _ { 0 } } \right | ^ { 2 } \\ & = \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \cos ^ { 4 } ( \theta _ { 1 } - \theta _ { 2 } ) \left | \left \langle \left [ \hat { x } _ { 1 }, \hat { p } _ { 1 } \right ] _ { \rho _ { 0 } } \right | ^ { 4 } \geq \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \cos ^ { 4 } ( \theta _ { 1 } - \theta _ { 2 } ). \\ & \text{The bound again becomes } \left ( \frac { 1 } { 1 6 } \right ) ^ { 2 } \text{ for } \theta _ { 1 } = \theta _ { 2 }.$$ ∣ ∣ The bound again becomes ( 1 16 ) 2 for θ 1 = θ 2 .
10.1103/PhysRevA.90.022301
[ "Jaehak Lee", "Se-Wan Ji", "Jiyong Park", "Hyunchul Nha" ]
2014-08-06T00:32:57+00:00
2014-08-06T00:32:57+00:00
[ "quant-ph" ]
Continuous-variable dense coding via a general Gaussian state: Monogamy relation
We study a continuous variable (CV) dense-coding protocol, originally proposed to employ a two-mode squeezed state, using a general two-mode Gaussian state as a quantum channel. We particularly obtain conditions to manifest quantum advantage by beating two well-known single-mode schemes, namely, the squeezed-state scheme (best Gaussian scheme) and the number-state scheme (optimal scheme achieving the Holevo bound). We then extend our study to a multipartite Gaussian state and investigate the monogamy of operational entanglement measured by the communication capacity under the dense-coding protocol. We show that this operational entanglement represents a strict monogamy relation, by means of Heisenberg's uncertainty principle among different parties, i.e., the quantum advantage for communication can be possible for only one pair of two-mode systems among many parties.
1408.1154v1
## Application of an averaging principle on foliated diffusions: topology of the leaves. ## Paulo R. Ruffino 1 Departamento de Matem´ atica, Universidade Estadual de Campinas, 13.083-859- Campinas - SP, Brazil. ## Abstract We consider an /epsilon1K transversal perturbing vector field in a foliated Brownian motion defined in a foliated tubular neighbourhood of an embedded compact submanifold in R 3 . We study the effective behaviour of the system under this /epsilon1 perturbation. If the perturbing vector field K is proportional to the Gaussian curvature at the corresponding leaf, we have that the transversal component, after rescaling the time by t//epsilon1 , approaches a linear increasing behaviour proportional to the Euler characteristic of M , as /epsilon1 goes to zero. An estimate of the rate of convergence is presented. Key words: Averaging principle, foliated stochastic flow, Brownian motion on manifolds. MSC2010 subject classification: 60H10, 58J65, 58J37. ## 1 The set up The purpose of these notes is to explore a topological application of an averaging principle for foliated stochastic flows, as established in Gargate and Ruffino [3]. Our geometrical setting is a foliation of a tubular neighbourhood of an embedded compact boundaryless submanifold M of R 3 consisting on diffeomorphic copies of M . Precisely, consider a tubular neighbourhood U of M and a diffeomorphism φ : U → M × -( a, a ) such that each s ∈ -( a, a ) ∈ R generates a leaf φ -1 ( M ×{ } s ) which is diffeomorphic to M = φ -1 ( M ×{ } 0 ). The diffeomorphism φ is taken such that transversal component ∂φ -1 ∂s is orthogonal to the leaves, pointing outwards. The main idea of this application is to consider an unperturbed system whose trajectories stay, each one, in a unique leaf and are Brownian motions on its corresponding leaf. This structure consisting of simultaneous Brownian motions on each leaf is called a foliated Brownian motion , see e.g. the seminal article by L. Garnett [4] or more recently Catuogno, Ledesma and Ruffino [1], [2]. We destroy this foliated behaviour of trajectories introducing a perturbing vector field orthogonal to the leaves such that at each point, this vector field is given by the Gaussian curvature of the corresponding leaf, pointing outwards for positive curvature. Putting together the results on the averaging principle, [3], for this particular foliated system and the 1 e-mail: [email protected]. Partially supported by FAPESP nr. 12/18780-0, 11/50151-0 and CNPq nr. 477861/2013-0. classical Gauss-Bonnet theorem, we have that, in the average, the transversal behaviour of the perturbed system, with time rescaled by t /epsilon1 , approaches a deterministic ODE with constant coefficient proportional to the Euler characteristic of the original submanifold M , as /epsilon1 goes to zero. An estimate of the rate of convergence can be obtained. In the next paragraphs we recall some of the results we are going to use on averaging stochastic flows in foliated spaces. ## Previous results on averaging in foliated spaces We recall the main results in [3] which are relevant here. Let N be a smooth Riemannian manifold with an n -dimensional smooth foliation, i.e. N is endowed with an integrable regular distribution of dimension n , hence N is decomposed in a disjoint union of immersed submanifolds. For a precise definition and further properties of foliated spaces in more general settings see e.g. the initial chapters of Tondeur [9], Walcak [10], among others. We denote by L x the leaf of the foliation passing through a point x ∈ N . We assume that the leaves are compact and that given an initial condition x 0 , the leaf L x 0 has a tubular neighbourhood U ⊂ N such that there exists a diffeomorphism ϕ : U → L x 0 × V , where V ⊂ R d is a connected open set containing the origin. For simplicity, the second (vertical) coordinate of a point x ∈ U is called the vertical projection p x ( ) ∈ V , i.e. ϕ x ( ) = ( u, π ( x )) for some u ∈ L x . Hence for any fixed v ∈ V , the inverse image p -1 ( v ) is a compact leaf L x , where x is any point in U such that the vertical projection p x ( ) = v . In coordinates, we denote ## for any x ∈ U . $$p ( x ) = \left ( p _ { 1 } ( x ), \dots, p _ { d } ( x ) \right ) \in V \subset \mathbf R ^ { d }$$ Consider an SDE in M whose associated stochastic flow preserves the foliation, i.e. we consider a Stratonovich equation $$d x _ { t } = X _ { 0 } ( x _ { t } ) d t + \sum _ { k = 1 } ^ { r } X _ { k } ( x _ { t } ) \circ d B _ { t } ^ { k } \quad \quad \quad ( 1 ) \\. \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ where the smooth vector fields X k are foliated in the sense that X k ( x ) ∈ T L x x , for k = 0 1 , , . . . , r . Here B t = ( B ,. . . , B 1 t r t ) is a standard Brownian motion in R r with respect to a filtered probability space (Ω , F t , F , P ). For an initial condition x 0 , the trajectories of the solution x t in this case lay on the leaf L x 0 a.s.. Moreover, there exists a (local) stochastic flow of diffeomorphisms F t : N → N which restricted to the initial leaf is a flow in the compact submanifold L x 0 . We introduce a perturbing smooth vector field K in the system such that this vector field destroys the foliated structure of the trajectories. We denote the perturbed system by x ε t which satisfies the SDE $$d x _ { t } ^ { \varepsilon } = X _ { 0 } ( x _ { t } ^ { \varepsilon } ) d t + \sum _ { k = 1 } ^ { r } X _ { k } ( x _ { t } ^ { \varepsilon } ) \circ d B _ { t } ^ { k } + \varepsilon K ( x _ { t } ^ { \varepsilon } ) \, d t,$$ with the same initial condition x ε 0 = x 0 . For each vertical coordinate i = 1 , . . . , d , we denote by Q v i ( ) the ergodic average of the i -th component of the perturbing vector field K in the corresponding leaf p -1 ( v ). Hence, by the ergodic theorem $$Q ^ { i } ( v ) \coloneqq \int _ { p ^ { - 1 } ( v ) } D p _ { i } ( K ) ( x ) \ d \mu _ { v } ( x ) = \lim _ { t \to \infty } \frac { 1 } { t } \int _ { 0 } ^ { t } D p _ { i } ( K ) ( F _ { s } ( x ) ) \ d s$$ for µ v -almost every point x in the leaf p -1 ( v ); here D p x i is the derivative of p i at the point x and µ v denotes an invariant measure on p -1 ( v ) which we assume uniquely ergodic. Denote by η t ( ) an estimate of the rate of convergence of the ergodic limit in L p for the functions Q v i ( ). Hence η t ( ) tends to zero when t goes to infinity. In general, there is no optimal rate of convergence, see e.g. Kakutani-Petersen [6], Krengel [7] and an explicit example of continuous system in the averaging context in [3]. We assume that the averaging functions of the perturbing vector field Q i : V → R are Lipschitz continuous for i = 1 , . . . , d . This hypothesis holds naturally if the invariant measures µ v for the unperturbed foliated system has a sort of weakly continuity on v . For example, for nondegenerate systems on the leaves, this condition is naturally satisfied. Consider the following ODE on the vertical space V : $$\frac { \mathrm d v ( t ) } { \mathrm d t } = \left ( Q ^ { 1 } ( v ( t ) ), \dots, Q ^ { d } ( v ( t ) ) \right ),$$ with initial condition p x ( 0 ) = 0. Let T 0 be the time that the solution v t ( ) hits the boundary ∂V . Let τ /epsilon1 be the stopping time given by the exit time of the perturbed system x ε t from the coordinate neighbourhood U ⊂ M . An averaging principle in this context is established by the theorem below which says that the transversal behaviour of x ε t /epsilon1 can be approximated in the average by an ordinary differential equation in the transversal space whose coefficients are given by the average of the transversal component of the perturbation K with respect to the invariant measure on the leaves for the original dynamics of equation (1), when /epsilon1 decreases to zero. The rate of converge is given below: Theorem 1.1 Assuming Lipschitz continuity of the averaging functions Q i : V → R for i = 1 , . . . , d we have: (1) For any 0 &lt; t &lt; T 0 , /epsilon1 &gt; 0 , β ∈ (0 1 , / 2) , α ∈ (0 1) , and 2 ≤ q &lt; ∞ , there exist functions C 1 = C 1 ( ) t and C 2 = C 2 ( ) t such that $$\left [ \mathbb { E } \left ( \sup _ { s \leq t } \left | p \left ( x _ { \left ( \frac { s } { \varepsilon } \right ) \wedge \tau ^ { \varepsilon } } ^ { \varepsilon } \right ) - v ( s ) \right | ^ { q } \right ) \right ] ^ { \frac { 1 } { q } } \leq C _ { 1 } \, \epsilon ^ { \alpha } + C _ { 2 } \, \eta \left ( t | \ln \epsilon | ^ { \frac { 2 \beta } { q } } \right ), \\ \text{where } \eta ( t ) \text{ is the rate of convergence in } L ^ { q } \text{ of the argodic averages of the un-}$$ where η t ( ) is the rate of convergence in L q of the ergodic averages of the unperturbed trajectories on the leaves. $$( 2 ) \ F o r \, \gamma > 0, \, l e t$$ $$T _ { \gamma } = \inf \, \{ t > 0 \ | \ \text{dist} ( v ( t ), \partial V ) \leq \gamma \}. \\ \therefore \,. \ \,. \ \,. \ \,. \ \,. \ \,. \ \,. \ \,. \ \,.$$ The exit times of the two systems satisfy the estimates $$\mathbb { P } ( \epsilon \tau ^ { \epsilon } < T _ { \gamma } ) \leq \gamma ^ { - q } \left [ C _ { 1 } ( T _ { \gamma } ) \, \epsilon ^ { \alpha } + C _ { 2 } ( T _ { \gamma } ) \, \eta \left ( T _ { \gamma } | \ln \epsilon | ^ { \frac { 2 \beta } { q } } \right ) \right ] ^ { q }.$$ Item (b) of the theorem above guarantees robustness of the result. For the proof of the theorem above see [3]; further extension to L´vy processes has been done in e [5]. ## 2 Exploring the topology of the leaves We consider an unperturbed foliated dynamics in U (degenerate) which is a foliated Brownian motion. That is, for each initial condition x 0 ∈ U , the solution is a Brownian motion on the corresponding leaf L x 0 . For more details and construction of this processes, see [1]. In our particular case of embedded manifold we can consider the dynamics generated by gradient vector fields tangent to the leaves. Precisely, at each x ∈ U , let X x i ( ) be the orthogonal projection of e i , the i -th element of the canonical basis onto the tangent space T L x x of the leaf passing through x , for each i = 1 2 3. , , The vector fields X ,X 1 2 and X 3 determine the following Stratonovich stochastic equation in U : $$d x _ { t } = \sum _ { i = 1 } ^ { 3 } X ^ { i } ( x _ { t } ) \circ d B _ { t } ^ { i }.$$ The corresponding stochastic flow of this equation generates a foliated Brownian motion in U , i.e. given initial conditions, the solution are simultaneous Brownian motions on each leaf of the foliation, see [2]. We investigate the effective behaviour of a small transversal perturbation of order /epsilon1 : $$d x _ { t } ^ { \epsilon } = \sum _ { i = 1 } ^ { 3 } X ^ { i } ( x _ { t } ^ { \epsilon } ) \circ d B _ { t } ^ { i } + \epsilon K ( x _ { t } ^ { \epsilon } ),$$ where the transversal vector field K x ( ) is orthogonal to the leaves, proportional to the Gaussian curvature of the leaf L x at the point x ∈ U . We assume that at a point with positive curvature, the corresponding vector field K points outwards. In some sense this equation models an average inertial or centrifugal forces acting on particles moving randomly on the leaves. We have the following averaging result which does not depend on the geometry of the manifold M : Theorem 2.1 The transversal dynamics of orthogonal perturbation, given by /epsilon1 times the Gaussian curvature of foliated Brownian motion, behaves according to v t ( ) = 2 πχ M ( ) t , as /epsilon1 goes to zero. Here χ M ( ) is the Euler characteristic of the leaves. Precisely, up to a stopping time, for q ≥ 2 , β ∈ (0 1 , / 2) , /epsilon1 &gt; 0 , for each t ≥ 0 , there exists a constant C &gt; 0 such that $$\left [ \mathbb { E } \left ( \sup _ { s \leq t } \left | p \left ( x ^ { \epsilon } _ { \left ( \frac { s } { \epsilon } \right ) } \right ) - v ( s ) \right | ^ { q } \right ) \right ] ^ { \frac { 1 } { q } } < C | \ln \epsilon | ^ { - \frac { \beta } { q } }. \\ \text{Most of the proof is straightforward: one just has to put the properties to} -$$ Proof: Most of the proof is straightforward: one just has to put the properties together and apply the classical Gauss-Bonnet theorem. In fact, the invariant measures on the leaves are the normalized Riemannian volume. According to our coordinate systems, the one dimensional transversal component is given by the Gaussian curvature K x ( ). The average (in the transversal direction) of the perturbing vector field K on each leaf is given by $$\int _ { L _ { x } } K ( x ) \ d \mu ( x ) = 2 \pi \chi ( M ).$$ Hence this average depends only on the topology of the leaf. The proof finishes as a direct application of Theorem 1.1 with codimension d = 1. The rate of ergodic convergence on the leaves η t ( ), in this case, has order 1 / √ t since the system is uniformly elliptic, as in X.-M.-Li [8]. The estimate on the rate of convergence (inequality (3)) follows directly . /square As a simple example, consider an orthogonal perturbation, according to the curvature, of a Brownian motion on any manifold diffeomorphic to the torus. This system presents no transversal behaviour on the average. Indeed, a flat torus illustrates trivially this fact since K ≡ 0. On manifolds diffeomorphic to the sphere, the orthogonal behaviour is a linear expansion. For an n -fold torus with genus n &gt; 1, the effect is a linear contraction with coefficients proportional to 2 -2 n . ## References - [1] P. Catuogno, D. Ledesma and P. Ruffino - Foliated stochastic calculus: harmonic measures. (ArXiv 1012.4450) To appear in Transactions of AMS , 2014. - [2] P. Catuogno, D. Ledesma and P. Ruffino - Harmonic measures in embedded foliated manifolds. (ArXiv 1208.0629) Submitted. - [3] Ivan I. Gargate-Gonzales and P. Ruffino - An averaging principle for diffusions in foliated spaces. (Arxiv 1212.1587v4) Submitted. - [4] L. Garnett, Foliation, the ergodic theorem and Brownian motion . Journal of Functional Analysis 51, (1983)pp. 285-311. - [5] M. H¨ ogele and P. Ruffino - Averaging along foliated L´vy diffusions. (Arxiv e 1405.6305) Submitted. - [6] S. Kakutani and K. Petersen - The speed of convergence in the ergodic theorem. Monat. Mathematik 91, 11-18 (1981). - [7] U. Krengel - On the speed of convergence of the ergodic theorem. Monat. Mathematik 86, 3-6 (1978). - [8] Xue-Mei Li -An averaging principle for a completely integrable stochastic Hamiltonian systems. Nonlinearity , 21 (2008) 803-822. - [9] P. Tondeur. Foliations on Riemannian manifolds . Universitext, Springer Verlag, Berlin-Heidelberg-New York, 1988. - [10] P. Walcak Dynamics of foliations, groups and pseudogroups . Birkh¨user Verlag a 2004.
null
[ "Paulo R. Ruffino" ]
2014-08-06T00:55:19+00:00
2014-08-06T00:55:19+00:00
[ "math.PR", "60H10, 58J65, 58J37" ]
Application of an averaging principle on foliated diffusions: topology of the leaves
We consider an $\epsilon K$ transversal perturbing vector field in a foliated Brownian motion defined in a foliated tubular neighbourhood of an embedded compact submanifold in $\R^3$. We study the effective behaviour of the system under this $\epsilon$ perturbation. If the perturbing vector field $K$ is proportional to the Gaussian curvature at the corresponding leaf, we have that the transversal component, after rescaling the time by $t/\epsilon$, approaches a linear increasing behaviour proportional to the Euler characteristic of $M$, as $\epsilon$ goes to zero. An estimate of the rate of convergence is presented.
1408.1155v1
## Interval minors of complete bipartite graphs Bojan Mohar ∗† Department of Mathematics Simon Fraser University Burnaby, BC, Canada [email protected] Arash Rafiey Department of Mathematics Simon Fraser University Burnaby, BC, Canada [email protected] Behruz Tayfeh-Rezaie School of Mathematics Institute for Research in Fundamental Sciences (IPM) P.O. Box 19395-5746, Tehran, Iran [email protected] ## Hehui Wu Department of Mathematics Simon Fraser University Burnaby, BC, Canada [email protected] ## Abstract Interval minors of bipartite graphs were recently introduced by Jacob Fox in the study of Stanley-Wilf limits. We investigate the maximum number of edges in K r,s -interval minor free bipartite graphs. We determine exact values when r = 2 and describe the extremal graphs. For r = 3, lower and upper bounds are given and the structure of K 3 ,s -interval minor free graphs is studied. Keywords: interval minor, complete bipartite graph, forbidden configuration, forbidden pattern. Mathematics Subject Classification (2010): 05C35, 05C83, 05B20. ∗ Supported in part by an NSERC Discovery Grant (Canada), by the Canada Research Chair program, and by the Research Grant P1-0297 of ARRS (Slovenia). † On leave from: IMFM &amp; FMF, Department of Mathematics, University of Ljubljana, Ljubljana, Slovenia. ## 1 Introduction All graphs in this paper are simple, i.e. multiple edges and loops are not allowed. By an ordered bipartite graph ( G A,B ; ), we mean a bipartite graph G with independent sets A and B which partition the vertex set of G and each of A and B has a linear ordering on its elements. We call two vertices u and v consecutive in the linear order &lt; on A or B if u &lt; v and there is no vertex w such that u &lt; w &lt; v . By identifying two consecutive vertices u and v to a single vertex w , we obtain a new ordered bipartite graph such that the neighbourhood of w is the union of the neighbourhoods of u and v in G . All bipartite graphs in this paper are ordered and so, for simplicity, we usually say bipartite graph G instead of ordered bipartite graph ( G A,B ; ). Two ordered bipartite graphs G and G ′ are isomorphic if there is a graph isomorphism G → G ′ preserving both parts, possibly exchanging them, and preserving both linear orders. They are equivalent if G ′ can be obtained from G by reversing the orders in one or both parts of G and possibly exchange the two parts. If G and H are ordered bipartite graphs, then H is called an interval minor of G if a graph isomorphic to H can be obtained from G by repeatedly applying the following operations: - (i) deleting an edge; - (ii) identifying two consecutive vertices. If H is not an interval minor of G , we say that G avoids H as an interval minor or that G is H -interval minor free . Let ex p, q, H ( ) denote the maximum number of edges in a bipartite graph with parts of sizes p and q avoiding H as an interval minor. In classical Tur´n extremal graph theory, one asks about the maximum a number of edges of a graph of order n which has no subgraph isomorphic to a given graph. Originated from problems in computational and combinatorial geometry, the authors in [2, 6, 7] considered Tur´n type problems for maa trices which can be seen as ordered bipartite graphs. In the ordered version of Tur´n theory, the question is: a what is the maximum number edges of an ordered bipartite graph with parts of size p and q with no subgraph isomorphic to a given ordered bipartite graph? More results on this problem and its variations are given in [1, 3, 4, 8, 9]. As another variation, interval minors were recently introduced by Fox in [5] in the study of Stanley-Wilf limits. He gave exponential upper and lower bounds for ex n, n, K ( glyph[lscript],glyph[lscript] ). In this paper, we are interested in the case when H is a complete bipartite graph. We determine the value of ex p, q, K ( 2 ,glyph[lscript] ) and find bounds on ex p, q, K ( 3 ,glyph[lscript] ). We note that our definition of interval minors for ordered bipartite graphs is slightly different from Fox's definition for matrices, since we allow exchanging parts of the bipartition, so for us a matrix and its transpose are the same. Of course, when the matrix of H is symmetric, the two definitions coincide. ## 2 K 2 ,glyph[lscript] as interval minor For simplicity, we denote ex p, q, K ( 2 ,glyph[lscript] ) by m p,q, glyph[lscript] ( ). In this section we find the exact value of this quantity. Let ( G A,B ; ) be an ordered bipartite graph where A has ordering a 1 &lt; a 2 &lt; · · · &lt; a p and B has ordering b 1 &lt; b 2 &lt; · · · &lt; b q . The vertices a 1 and b 1 are called bottom vertices whereas a p and b q are said to be top vertices. The degree of a vertex v is denoted by d v ( ). Lemma 2.1. For any positive integers p and q , we have $$m ( p, q, \ell ) \leqslant ( \ell - 1 ) ( p - 1 ) + q.$$ Proof. Let ( G A,B ; ) be a bipartite graph. Suppose that A has ordering a 1 &lt; a 2 &lt; · · · &lt; a p and B has ordering b 1 &lt; b 2 &lt; · · · &lt; b q . For 1 glyph[lessorequalslant] i glyph[lessorequalslant] p -1, let $$A _ { i } = \{ b _ { j } \ | \ \exists \ i _ { 1 } \leqslant i < i _ { 2 } \text{ such that } a _ { i _ { 1 } } b _ { j }, a _ { i _ { 2 } } b _ { j } \in E ( G ) \}.$$ Since G is K 2 ,glyph[lscript] -interval minor free, | A i | glyph[lessorequalslant] glyph[lscript] -1. Each b j ∈ B appears in at least d b ( j ) -1 of sets A i , 1 glyph[lessorequalslant] i glyph[lessorequalslant] p -1. It follows that $$\sum _ { i = 1 } ^ { q } ( d ( b _ { j } ) - 1 ) & \leqslant \sum _ { i = 1 } ^ { p - 1 } | A _ { i } | \leq ( \ell - 1 ) ( p - 1 ). \\ \sum _ { i = 1 } ^ { q } \left ( \Gamma \sqrt { 2 } \right ) \left ( \Gamma \sqrt { 2 } \right ) \left ( \Gamma \sqrt { 2 } \right ) \left ( \Gamma \sqrt { 2 } \right ).$$ This proves that | E G ( ) | glyph[lessorequalslant] ( glyph[lscript] -1)( p -1) + q . If ( G A,B ; ) and ( G A ,B ′ ; ′ ′ ) are disjoint ordered bipartite graphs and the bottom vertices x, y of G are adjacent and the top vertices x , y ′ ′ of G ′ are adjacent, then we denote by G ⊕ G ′ the ordered bipartite graph obtained from ( G ∪ G A ′ ; ∪ A , B ′ ∪ B ′ ) by identifying x with x ′ and y with y ′ , where the linear orders of A ∪ A ′ and B ∪ B ′ are such that the vertices of G ′ precede those of G . The graph G ⊕ G ′ is called the concatenation of G and G ′ . In the description of K 2 ,glyph[lscript] -interval minor free graphs below, we shall use the following simple observation, whose proof is left to the reader. Let G and G ′ be vertex disjoint K r,s -interval minor free bipartite graphs with r ≥ 2 and s ≥ 2 such that the bottom vertices in G are adjacent and the top vertices in G ′ are adjacent. Then G ⊕ G ′ is K r,s -interval minor free. Example 2.2. We introduce a family of K 2 ,glyph[lscript] -interval minor free bipartite graphs which would turn out to be extremal. Let glyph[lscript] glyph[greaterorequalslant] 3 and let p and q be positive integers and let r = glyph[floorleft] ( p -1) / glyph[lscript] ( -2) glyph[floorright] and s = glyph[floorleft] ( q -1) / glyph[lscript] ( -2) glyph[floorright] . We can write p = ( glyph[lscript] -2) r + e and q = ( glyph[lscript] -2) s + f , where 1 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2, 1 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2. Suppose now that r &lt; s . Let H 0 be K e,glyph[lscript] -1 and let H i be a copy of K glyph[lscript] -1 ,glyph[lscript] -1 for 1 glyph[lessorequalslant] i glyph[lessorequalslant] r . The concatenation H = H 0 ⊕ H 1 ⊕··· ⊕ H r is K 2 ,glyph[lscript] -interval minor free by the above observation. It has parts of sizes p and q ′ = ( glyph[lscript] -2)( r +1)+1. It also has rglyph[lscript] ( glyph[lscript] -2) + e glyph[lscript] ( -1) edges. Finally, let H + = K 1 ,q -q ′ +1 . The graph H p,q ( glyph[lscript] ) = H + ⊕ H has parts of sizes p, q and has ( glyph[lscript] -1)( p -1) + q edges. An example is depicted in Figure 1(b), where the identified top and bottom vertices used in concatenations are shown as square vertices. Figure 1: (a) G 9 10 , (5), (b) H 5 11 , (5), (c) K 1 4 , ⊕ K 2 4 , ⊕ K 1 2 , ⊕ K 4 4 , ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1155v1-figure-47fcc9d7-d999-4665-a4d1-e06be88ffb15.jpg) By Lemma 2.1 and Example 2.2, the following is obvious. Theorem 2.3. Let glyph[lscript] glyph[greaterorequalslant] 3 , p = ( glyph[lscript] -2) r + e and q = ( glyph[lscript] -2) s + f , where 1 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2 , 1 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2 . If r &lt; s , then $$m ( p, q, \ell ) = ( \ell - 1 ) ( p - 1 ) + q.$$ Extremal graphs for excluded K 2 ,glyph[lscript] given in Example 2.2 are of the form of a concatenation of r copies of K glyph[lscript] -1 ,glyph[lscript] -1 together with K e,glyph[lscript] -1 and K 1 ,t where t = q -( glyph[lscript] -2)( r +1). Note that the latter graph itself is a concatenation of copies of K 1 2 , and that the constituents concatenated in another order than given in the example, are also extremal graphs. For an example, consider the graph in Figure 1(c), which is also extremal for ( p, q, glyph[lscript] ) = (5 , 11 5). , Rearranging the order of concatenations is not the only way to obtain examples of extremal graphs. What one can do is also using the following operation. Delete a vertex in B of degree 1, replace it by a degree-1 vertex x adjacent to any vertex a i ∈ A which is adjacent to two consecutive vertices b j and b j +1 , and put x between b j and b j +1 in the linear order of B . This gives other extremal examples that cannot always be written as concatenations of complete bipartite graphs. And there is another operation that gives somewhat different extremal examples. Suppose that G is an extremal graph for ( p, q, glyph[lscript] ) with r &lt; s as above. If A contains a vertex a i of degree glyph[lscript] -1 (by Theorem 2.3, degree cannot be smaller since the deletion of that vertex would contradict the theorem), then we can delete a i and obtain an extremal graph for ( p -1 , q, glyph[lscript] ). The deletion of vertices of degrees glyph[lscript] -1 can be repeated. Or we can delete any set of k vertices from A if they are incident to precisely k glyph[lscript] ( -1) edges. We now proceed with the much more difficult case, in which we have glyph[floorleft] ( p -1) / glyph[lscript] ( -2) glyph[floorright] = ( glyph[floorleft] q -1) / glyph[lscript] ( -2) , i.e. glyph[floorright] r = . s Example 2.4. Let glyph[lscript] glyph[greaterorequalslant] 3, p = ( glyph[lscript] -2) r + e and q = ( glyph[lscript] -2) r + f , where 1 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2 and 1 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2. Similarly as in Example 2.2, let G 0 be K e,f and let G i be a copy of K glyph[lscript] -1 ,glyph[lscript] -1 for 1 glyph[lessorequalslant] i glyph[lessorequalslant] r . Let G p,q ( glyph[lscript] ) be the concatenation G 0 ⊕ G 1 ⊕···⊕ G r . This graph is K 2 ,glyph[lscript] -interval minor free. It has parts of sizes p, q and has rglyph[lscript] ( glyph[lscript] -2)+ ef edges. An example is illustrated in Figure 1(a). Theorem 2.5. Let glyph[lscript] glyph[greaterorequalslant] 3 , p = ( glyph[lscript] -2) r + e and q = ( glyph[lscript] -2) r + f , where 1 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2 and 1 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2 . Then $$m ( p, q, \ell ) = r \ell ( \ell - 2 ) + e f.$$ Proof. Since the graphs in Example 2.4 attain the stated bound, it suffices to establish the upper bound, m p,q, glyph[lscript] ( ) glyph[lessorequalslant] rglyph[lscript] ( glyph[lscript] -2) + ef . Let ( G A,B ; ) be a bipartite graph with parts of sizes p, q and with m p,q, glyph[lscript] ( ) edges. Let A have ordering a 1 &lt; a 2 &lt; · · · &lt; a p and B have ordering b 1 &lt; b 2 &lt; · · · &lt; b q . Note that any two consecutive vertices of G have at least one common neighbour. Otherwise, by identifying two consecutive vertices with no common neighbour lying say in A , we obtain a graph with parts of sizes p -1 , q and with m p,q, glyph[lscript] ( ) edges. This is a contradiction since clearly m p,q, glyph[lscript] ( ) &gt; m p ( -1 , q, glyph[lscript] ). For 1 glyph[lessorequalslant] i glyph[lessorequalslant] p -1, let A i = { b j | ∃ i 1 glyph[lessorequalslant] i &lt; i 2 such that a i 1 b , a j i 2 b j ∈ E G ( ) } . Also let A ′ i = A i \ { b h } , where h is the smallest index for which b h ∈ A i . Since G is K 2 ,glyph[lscript] -interval minor free, | A ′ i | glyph[lessorequalslant] glyph[lscript] -2. For each vertex b j ∈ B , define D b ( j ) = { a i | j is the smallest index such that a i is adjacent to b j } , and let d ′ ( b j ) = | D b ( j ) . | Every vertex in N b ( j ) \ D b ( j ) is adjacent to b j also to some vertex b h ∈ B with h &lt; j and hence and $$d ( b _ { j } ) - d ^ { \prime } ( b _ { j } ) \leqslant \ell - 1$$ since G is K 2 ,glyph[lscript] -interval minor free. Let h and h ′ be the smallest and largest indices such that a , a h h ′ ∈ N b ( j ) \ D b ( j ), respectively. Observe that h ′ -h glyph[greaterorequalslant] d b ( j ) -d ′ ( b j ) -1. We claim that b j appears in sets A ,A ′ h ′ h +1 , . . . , A ′ h ′ -1 . Let h glyph[lessorequalslant] i &lt; h ′ . Since b j is adjacent to a h and to a h ′ , we have b j ∈ A i . We know that a h is adjacent to some vertex b j 1 with j 1 &lt; j . Also a h ′ is adjacent to some vertex b j 2 with j 2 &lt; j . Suppose that j 1 glyph[lessorequalslant] j 2 . Now we use the property that every two consecutive vertices of G have at least one common neighbour for consecutive pairs of vertices b , b t t +1 ( t = j 1 , . . . , j 2 -1). It follows that there is j 1 glyph[lessorequalslant] j 0 glyph[lessorequalslant] j 2 such that b j 0 is in A i . If j 2 &lt; j 1 , the same property used for t = j 2 , . . . , j 1 -1 shows that there exists j 0 , j 2 glyph[lessorequalslant] j 0 glyph[lessorequalslant] j 1 , such that b j 0 ∈ A i . Since j 0 &lt; j , from the definition of A ′ i , we conclude that b j ∈ A ′ i . So we have proved the claim. We conclude that b j appears in sets A ,A ′ h ′ h +1 , . . . , A ′ h + t -1 for some 1 glyph[lessorequalslant] h glyph[lessorequalslant] p -1 and t = d b ( j ) -d ′ ( b j ) -1. Let S = { i | 1 glyph[lessorequalslant] i glyph[lessorequalslant] p -1 , i ≡ 1 , . . . , e -1 (mod glyph[lscript] -2) } . We have | S | = r glyph[lscript] ( -1 -e ). By the conclusion in the last paragraph, each b j ∈ B appears in at least d b ( j ) -d ′ ( b j ) -1 consecutive sets A ′ i . Combined with (1), we conclude that b j appears in at least d b ( j ) -d ′ ( b j ) -1 -( e -1) of sets A ′ i , where i ∈ S . Note that this number is negative for j = 1 since d b ( 1 ) = d ′ ( b 1 ). Now it follows that glyph[negationslash] $$\sum _ { i = 2 } ^ { q } ( d ( b _ { j } ) - d ^ { \prime } ( b _ { j } ) - e ) & \leqslant \sum _ { i \in S } | A ^ { \prime } _ { i } |. & ( 2 ) \\ d ( h. \vee & = d ^ { \prime } ( h. \vee \text{ to the left side of } ( 9 \vee \text{ and not in} \sigma \text{ that } \Sigma \text{ } d ( h. \vee -$$ By adding d b ( 1 ) -d ′ ( b 1 ) to the left side of (2) and noting that ∑ j d b ( j ) = | E G ( ) | and ∑ j d ′ ( b j ) = p , we obtain therefrom that | E G ( ) | -p -eq + e glyph[lessorequalslant] r glyph[lscript] ( -1 -e )( glyph[lscript] -2) . This in turn yields that | E G ( ) | glyph[lessorequalslant] rglyph[lscript] ( glyph[lscript] -2)+ ef , which we were to prove. Example 2.4 describes extremal graphs for Theorem 2.5. They are concatenations of complete bipartite graphs, all of which but at most one are copies of K glyph[lscript] -1 ,glyph[lscript] -1 . If e = 1 and f &gt; 1, vertices of degree 1 can be inserted anywhere between two consecutive neighbors of their neighbor in A . But in all other cases, we believe that all extremal graphs are as in Example 2.4, except that the order of concatenations can be different. ## 3 K 2 2 , as interval minor In this section we determine the structure of K 2 2 , -interval minor free bipartite graphs. We first define two families of K 2 2 , -interval minor free graphs. For every positive integer n glyph[greaterorequalslant] 3, let A = { x, a 1 , . . . , a n -1 , z } and B = { b 1 , y, b ′ 2 , b 2 , . . . , b n -1 , b ′ n -1 , t, b n } with ordering x &lt; a 1 &lt; · · · &lt; a n -1 &lt; z and b 1 &lt; y &lt; b ′ 2 &lt; b 2 &lt; · · · &lt; b ′ n -1 &lt; t &lt; b n , respectively. Let R n be the bipartite graph with parts A,B and edge set $$E ( G ) = \{ a _ { i } b _ { i }, a _ { i } b _ { i + 1 } \ | \ 1 \leqslant i \leqslant n - 1 \} \cup \{ x y, a _ { 1 } b _ { 2 } ^ { \prime }, a _ { n - 1 } b _ { n - 1 } ^ { \prime }, z t \}.$$ Similarly we define a graph S n for every integer n glyph[greaterorequalslant] 2. Let A = { x, a 1 , . . . , a n -1 , a ′ n -1 , z, a n } and B = { b 1 , y, b ′ 2 , b 2 , . . . , b n , t } with ordering x &lt; a 1 &lt; · · · &lt; a ′ n -1 &lt; z &lt; a n and b 1 &lt; y &lt; b ′ 2 &lt; b 2 &lt; · · · &lt; b n &lt; t , respectively. Let S n be the bipartite graph with parts A,B and edge set $$E ( G ) = \{ a _ { i } b _ { i }, a _ { i } b _ { i + 1 } \ | \ 1 \leqslant i \leqslant n - 1 \} \cup \{ x y, a _ { 1 } b _ { 2 } ^ { \prime }, a _ { n - 1 } ^ { \prime } b _ { n }, z t, a _ { n } b _ { n } \}.$$ For instance, R 5 and S 4 are shown in Figure 2. Lemma 3.1. For every positive integers p and q , we have m p,q, ( 2) = p + q -1 . Proof. By Lemma 2.1, m p,q, ( 2) glyph[lessorequalslant] p + q -1. We construct K 2 2 , -interval minor free bipartite graphs with parts of sizes p, q and with p + q -1 edges. This is easy if p glyph[lessorequalslant] 4. So let 5 glyph[lessorequalslant] p glyph[lessorequalslant] q . Consider S p -3 and add edges a y, zb 1 p -3 . Also add q -p vertices into the set B , all of them ordered between y and b ′ 2 , and join each of them to a 1 . The resulting graph has parts of size p, q and has p + q -1 edges. In what follows we assume that ( G A,B ; ) is a bipartite graph without K 2 2 , as an interval minor. Let A and B have the ordering a 1 &lt; a 2 &lt; · · · &lt; a p and b 1 &lt; b 2 &lt; · · · &lt; b q , respectively. A vertex in G of degree 0 is said to be reducible . If d a ( i ) = 1 and the neighbor b j of a i is adjacent to a i -1 if Figure 2: The graphs R 5 and S 4 . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1155v1-figure-092f8609-027a-432e-97df-29875e442efe.jpg) i &gt; 1 and is adjacent to a i +1 if i &lt; p , then a i is also said to be reducible . Similarly we define when a vertex b j ∈ B is reducible. Clearly, if a i (or b j ) is reducible, then G has a K 2 2 , -interval minor if and only if G -a i ( G -b j ) has one. Therefore, we may assume that we remove all reducible vertices from G . When G has no reducible vertices, we say that G is reduced , which we assume henceforth. Let X = { a , a 1 2 } if d a ( 1 ) = 1 and X = { a 1 } , otherwise. Similarly, let Y = { a p -1 , a p } if d a ( p ) = 1 and Y = { a p } , otherwise; Z = { b 1 , b 2 } if d b ( 1 ) = 1 and Z = { b 1 } , otherwise; T = { b q -1 , b q } if d b ( q ) = 1 and T = { b q } , otherwise. We may assume that all these sets are mutually disjoint. Otherwise G has a simple structure - it is equivalent to a subgraph of a graph shown in Figure 3 and any such graph has no K 2 2 , as interval minor. Note that each such subgraph becomes equivalent to a subgraph of R 2 after removing reducible vertices. Figure 3: X and Y intersect only in special situations. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1155v1-figure-536f3413-f2a8-44f1-895f-c4fd45bf69aa.jpg) Claim 3.2. There is an edge from X to b 1 or b q . glyph[negationslash] Proof. Suppose that there is no edge from X to { b 1 , b q } . Since G is reduced, there are two distinct vertices b i and b j (1 &lt; i &lt; j &lt; q ) connected to X . Assume that b 1 and b q are adjacent to a k and a l , respectively. Note that a , a k l ∈ X . Consider the sets X A , \ X, { b 1 , . . . , b i } and { b i +1 , . . . , b q } and identify them to single vertices to get K 2 2 , as an interval minor, a contradiction. Note that Claim 3.2 also applies to Y, Z and T . Hence, considering an equivalent graph of G instead of G if necessary, we may assume that there is an edge from X to Z . If there is no edge from Y to T , then there are edges from Y to Z and from T to X . By reversing the order of B , we obtain an equivalent graph that has edges from X to Z and from Y to T . Thus we may assume henceforth that the following claim holds: ## Claim 3.3. The graph G has edges from X to Z and from Y to T . Claim 3.4. Every vertex of G has degree at most 2 , except possibly one of a , b 2 2 and/or one of a p -1 , b q -1 , which may be of degree 3 . If d a ( 2 ) = 3 , then it has neighbors b 1 , b 3 , b 4 , we have d a ( 1 ) = d b ( 1 ) = d b ( 2 ) = 1 and a b 1 2 ∈ E G ( ) . Similar situations occur when b 2 , a p -1 , or b q -1 are of degree 3 . Proof. Suppose that d a ( i ) ≥ 3. We claim that a i has at most one neighbour in Z . Otherwise, | Z | ≥ 2 and hence d b ( 1 ) = 1 and a b i 1 , a b i 2 ∈ E G ( ). This is a contradiction since G is reduced. Similarly we see that a i has at most one neighbour in T . glyph[negationslash] Suppose now that a middle neighbor b j of a i is in B \ ( Z ∪ T ). Let b j 1 and b j 2 be neighbors of a i with j 1 &lt; j &lt; j 2 . If d b ( j ) &gt; 1, then an edge a b k j ( k = ), the edges joining i X and Z and joining Y and T , and the edge a b i j 1 (if k &lt; i ) or a b i j 2 (if k &gt; i ) can be used to obtain a K 2 2 , -interval minor. Thus, d b ( j ) = 1. Let us now consider b j -1 . Suppose that b j -1 is not adjacent to a i . Then j 1 &lt; j -1. If b j -1 is adjacent to a vertex a k , where k &lt; i , then the edges a b i j 1 , a k b j -1 and the edges joining X with Z and Y with T give rise to a K 2 2 , -interval minor in G (which is excluded), unless the following situation occurs: the edge a b k j -1 is equal to the edge joining X and Z . This is only possible if j 1 = 1, j = 3 and | Z | = 2, i.e., d b ( 1 ) = 1. If a 1 is adjacent to b 1 or to some other b t with t &gt; 2, we obtain a K 2 2 , -interval minor again. So, it turns out that k = 1 and d a ( 1 ) = 1. If i &gt; 2, then we consider a neighbor of a 2 . It cannot be b 2 since then a 1 would be reducible. It can neither be b 1 or b t with t &gt; 2 since this would yield a K 2 2 , -interval minor. Thus i = 2. Similarly, a contradiction is obtained when k &gt; i . (Here we do not have the possibility of an exception as in the case when k = 1.) Thus, we conclude that b j -1 is adjacent to a i or we have the situation that i = 2, j = 3, etc. as described above. Similarly we conclude that b j +1 is adjacent to a i unless we have i = p -1, j = q -2, etc. Note that we cannot have the exceptional situations in both cases at the same time since then we would have i = 2 = p -1 and X ∩ Y would be nonempty. If a b i j -1 and a b i j +1 are both edges, then b j would be reducible, a contradiction. Thus, the only possibility for a vertex of degree more than 2 is the one described in the claim. Claim 3.5. We have a 1 adjacent to b 1 or we have a 1 adjacent only to b 2 and b 1 adjacent only to a 2 . Proof. Suppose that a b 1 1 / E G ∈ ( ). By Claim 3.3, X is adjacent to Z and Y to T . If X is adjacent to a vertex b j / Z ∈ and Z is adjacent to a vertex a i / X ∈ , then we have a K 2 2 , -interval minor in G . Thus, we may assume that X has no neighbors outside Z . Since a b 1 1 / E G ∈ ( ), we have that a b 1 2 ∈ E G ( ). In particular, d a ( 1 ) = 1 and d b ( 1 ) = 1. Then a 2 ∈ X and b 2 ∈ Z . Since G is reduced, a b 2 2 / E G ∈ ( ). Since all neighbors of X are in Z , we conclude that a 2 is adjacent to b 1 . This yields the claim. The same argument applies to the bottom vertices. We can now describe the structure of K 2 2 , -interval minor free graphs. In fact, we have proved the following theorem. Theorem 3.6. Every reduced bipartite graph with no K 2 2 , as an interval minor is equivalent to a subgraph of R n or S n for some positive integer n . A matching of size n is a 1-regular bipartite graph on 2 n vertices. The following should be clear from Theorem 3.6. Corollary 3.7. For every integer n ≥ 4 , there are exactly eight K 2 2 , -interval minor free matchings of size n . They form three different equivalence classes. ## 4 K 3 ,glyph[lscript] as interval minor For K 3 ,glyph[lscript] -interval minors in bipartite graphs, we start in a similar manner as when excluding K 2 ,glyph[lscript] . We first establish a simple upper bound, which will later turn out to be optimal in the case when the sizes of the two parts are not very balanced. Lemma 4.1. For any integers glyph[lscript] ≥ 1 and p, q ≥ 2 , we have $$e x ( p, q, K _ { 3, \ell } ) \leqslant ( \ell - 1 ) ( p - 2 ) + 2 q.$$ Proof. Let ( G A,B ; ) be a bipartite graph with parts of sizes p and q . Suppose that A has ordering a 1 &lt; a 2 &lt; · · · &lt; a p and B has ordering b 1 &lt; b 2 &lt; · · · &lt; b q . For 2 glyph[lessorequalslant] i glyph[lessorequalslant] p -1, let A i = { b j | a b i j ∈ E G , ( ) ∃ i 1 &lt; i &lt; i 2 such that a i 1 b , a j i 2 b j ∈ E G ( ) } . If G is K 3 ,glyph[lscript] -interval minor free, we have | A i | glyph[lessorequalslant] glyph[lscript] -1. Each b j ∈ B of degree at least 2 appears in precisely d b ( j ) -2 of the sets A i , 2 glyph[lessorequalslant] i glyph[lessorequalslant] p -1. It follows that $$\sum _ { j = 1 } ^ { q } ( d ( b _ { j } ) - 2 ) & \leqslant \sum _ { i = 2 } ^ { p - 1 } | A _ { i } |. \\ ( \ell - 1 ) ( n - 2 ) + 2 a. \text{ as desired}.$$ This gives | E G ( ) | glyph[lessorequalslant] ( glyph[lscript] -1)( p -2) + 2 q , as desired. Let ( G A,B ; ) and ( G A ,B ′ ; ′ ′ ) be disjoint ordered bipartite graphs. Let a p -1 , a p be the last two vertices in the linear order in A and let b q -1 , b q be the last two vertices in B . Denote by a , a ′ 1 ′ 2 and b ′ 1 , b ′ 2 the first two vertices in A ′ and B ′ , respectively. Let us denote by G ⊕ 2 G ′ the ordered bipartite graph obtained from G and G ′ by identifying a p -1 with a ′ 1 , a p with a ′ 2 , b q -1 with b ′ 1 , and b q with b ′ 2 . The resulting ordered bipartite graph G ⊕ 2 G ′ is called the 2 -concatenation of G and G ′ . We have a similar observation as used earlier for K 2 ,glyph[lscript] -free graphs. If a p -1 , a p and b q -1 , b q form K 2 2 , in G and a , a ′ 1 ′ 2 and b ′ 1 , b ′ 2 form K 2 2 , in G ′ , and r ≥ 3 and s ≥ 3, then G ⊕ 2 G ′ is K r,s -interval minor free if and only if G and G ′ are both K r,s -interval minor free. Example 4.2. Let glyph[lscript] glyph[greaterorequalslant] 4, p = ( glyph[lscript] -3) r + e and q = ( glyph[lscript] -3) s + f where 2 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2, 2 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2 and r &lt; s . Let K p,q ( glyph[lscript] ) be the 2-concatenation of K e,glyph[lscript] -1 , r copies of K glyph[lscript] -1 ,glyph[lscript] -1 and K 2 ,q -( glyph[lscript] -3)( r +1) . This graph has parts of sizes p and q and has ( glyph[lscript] -1)( p -2) + 2 q edges. By Lemma 4.1 and Example 4.2, the following is clear. Theorem 4.3. Let glyph[lscript] glyph[greaterorequalslant] 4 , p = ( glyph[lscript] -3) r + e and q = ( glyph[lscript] -3) s + f where 2 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2 , 2 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2 and r &lt; s . Then $$e x ( p, q, K _ { 3, \ell } ) = ( \ell - 1 ) ( p - 2 ) + 2 q.$$ We now consider the remaining cases, where both parts are 'almost balanced', i.e., glyph[floorleft] ( p -2) / glyph[lscript] ( -3) glyph[floorright] = ( glyph[floorleft] q -2) / glyph[lscript] ( -3) glyph[floorright] . Example 4.4. Let glyph[lscript] glyph[greaterorequalslant] 4, p = ( glyph[lscript] -3) r + e and q = ( glyph[lscript] -3) r + f where 2 glyph[lessorequalslant] e glyph[lessorequalslant] glyph[lscript] -2 and 2 glyph[lessorequalslant] f glyph[lessorequalslant] glyph[lscript] -2. Let K p,q ( glyph[lscript] ) be the 2-concatenation of K e,f and r copies of K glyph[lscript] -1 ,glyph[lscript] -1 . This graph is K 3 ,glyph[lscript] -interval minor free, has parts of sizes p and q , and has r glyph[lscript] ( -3)( glyph[lscript] +1) + ef edges. It follows that $$e x ( p, q, K _ { 3, \ell } ) \geqslant r ( \ell - 3 ) ( \ell + 1 ) + e f.$$ We conjecture that this is in fact the exact value for ex p, q, K ( 3 ,glyph[lscript] ). Unfortunately, we have not been able to adopt the proof of Theorem 2.5 for this case. ## References - [1] M.H. Alberta, M. Elderb, A. Rechnitzerc, P. Westcottd, and M.Zabrockie, On the StanleyWilf limit of 4231-avoiding permutations and a conjecture of Arratia, Advances in Applied Mathematics 36 (2), (2006), 960-105. - [2] D. Bienstock and E. Gy¨ri, An extremal problem on sparse 0-1 matrices, o SIAM J. Discrete Math. 4 (1991), 17-27. - [3] P. Brass, G. Karolyi and P. Valtr, A Tur´ an-type extremal theory for convex geometric graphs, in: Discrete and Computational Geometry. The Goodman-Pollack Festschrift , Algorithms Combinatorics 25, Springer, Berlin, 2003, pp. 275-300. - [4] A. Claessona, V. Jelnekb, and E. Steingrmssona, Upper bounds for the Stanley-Wilf limit of 1324 and other layered patterns, J. Combin. Theory Ser. A 119 (8) (2012), 1680-1691. - [5] J. Fox, Stanley-Wilf limits are typically exponential, arXiv:1310.8378. - [6] Z. F¨redi, The maximum number of unit distances in a convex u n -gon, J. Combin. Theory Ser. A 55 (1990), 316-320. - [7] Z. F¨redi and P. Hajnal, Davenport-Schinzel theory of matrices, Disu crete Math. 103 (1992), 233-251. - [8] M. Klazar, Extremal problems for ordered (hyper) graphs: applications of Davenport-Schinzel sequences, European J. Combin. 25 (2004), 125140. - [9] J. Pach and G. Tardos, Forbidden paths and cycles in ordered graphs and matrices, Israel J. Math. 155 (2006), 359-380.
null
[ "Bojan Mohar", "Arash Rafiey", "Behruz Tayfeh-Rezaie", "Hehui Wu" ]
2014-08-06T01:17:05+00:00
2014-08-06T01:17:05+00:00
[ "math.CO", "cs.DM" ]
Interval minors of complete bipartite graphs
Interval minors of bipartite graphs were recently introduced by Jacob Fox in the study of Stanley-Wilf limits. We investigate the maximum number of edges in $K_{r,s}$-interval minor free bipartite graphs. We determine exact values when $r=2$ and describe the extremal graphs. For $r=3$, lower and upper bounds are given and the structure of $K_{3,s}$-interval minor free graphs is studied.
1408.1157v1
## Early inflation induced gravity waves can restrict Astro-Particle physics ## Shmuel Nussinov Raymond and Beverly Sackler School of Physics and Astronomy, Tel Aviv University, Tel Aviv, Israel. (Dated: August 7, 2014) In this paper, we discuss limits on various astro-particle scenarios if the scale and the reheat temperature of the last relevant inflation were very high. While the observed 'B' like pattern of polarizations of the CMB suggest a very high ( ≥ 10 16 GeV ) scale of a primordial (which motivated this work initially) and may reflect effects of dust, we believe that addressing these issues is nonetheless very useful. We recall the potential difficulties with various topological defects - monopoles, strings and domain walls generated at the SSB (spontaneous symmetry breaking) of various gauge symmetries. The main part of the paper is devoted to discussing difficulties with long-lived heavy particles, which could be dark matter but cannot efficiently annihilate to the required residual density because of basic S-Matrix unitarity/analyticity limits. We indicate in simple terms yet in some detail how the WIMP miracle occurs at M X ( ) ∼ TeV and how the axiomatic upper bound presently updated to M X ( ) ≤ 110 TeV was originally derived by Greist and Kamionokowski. We also argue that generically we expect the stronger M X ( ) ≤ 20 GeV bound to hold. We then elaborate on the pure particle physics approaches aiming to enhance the annihilation and evade the bounds. We find that the only and in fact very satisfactory way of doing this requires endowing the particles with gauge interactions with a confinement scale lower than M X ( ). We also comment on models with light O KeV ( ) dark matter, which was supposed to be frozen in via out-of equilibrium processes so as to have the right relic densities pointing out that in many such cases very low reheat temperatures are indeed required and speculate on the large desert scenario of particle physics. Most of what we discuss is not new but was not presented in a coherent fashion. ## I. INTRODUCTION The early universe serves as a unique, hot laboratory for particle physics [1, 2]. The correctly predicted abundance of light elements suggested three light neutrino flavors before the direct confirmation by Z width measurements. Structure evolution and CMB (cosmic microwave background) observations further limited the sum of the neutrino masses to be smaller than ∼ eV and the precise Planckian spectrum of the CMB excludes late decay/annihilation of heavy particles which may distort the spectrum. A most relevant question is 'How hot a laboratory was it' or phrased in the context of Inflation 'What are the energy scale Λ and the reheat temperature T R of the last relevant inflation'. A relevant inflation is operationally defined as one with many e- fold expansion sufficient to significantly dilute the number densities of particles or topological structures inherited from previous epochs. Recent observation by the BICEP collaboration if not due to dust, suggest 'B-like' patterns in the CMB polarization. [3]. To generate it one needs gravity waves emitted early on and with sufficient intensity to be able to imprint at recombination this polarization pattern. The ratio r of tensor to scalar fluctuations r Bicep ( ) = 0 2 suggested a high mass scale for the primordial inflation: . Λ( ) = I V 1 4 / ≈ 210 16 GeV , only two orders of magnitude below the Planck mass and consistent with the scales of GUT (grand unified theories). Even smaller r = 0 05 . -0 1 values along with . WMAP and PLANCK measurement of a density fluctuation index n s close to unity suggest large Λ( ) I ≥ 10 15 GeV . The simplest interpretation of these results involves an inflanton of mass M inlaton ∼ Λ( ) with I initial Planckian offset away from zero of the inflaton field driving the inflation. We choose a high inflanton mass in order to avoid extreme super-planckian deviations ∆( φ ) which would be required in order to have V ( φ ) ∼ m φ 2 2 ∼ Λ . While one can have the desired sixty e-fold horizon expansion 4 and n s close to unity in many scenarios this would be among the simpler ones. Unless the decaying inflanton prefers certain sectors of particle theory this suggests that all forms of matter have been early on in thermal equilibrium at a reheat temperature T R ( ) which is not much smaller than m(Inflaton) or Λ( ). I A universal couplings are natural if the inflaton is an alias for quantum gravity [4]. We can choose a very small m Inflaton /M Planck ( ) ( ) - or small fine-tuned quartic dimensionless couplings λ . While we will then need very large, superplanckian ∆( φ ) to achieve the energy density required, the reheat temperature can be much smaller than Λ. Still in the following we would like to discuss what would happen if : - (i) the scale Λ of the last relevant inflation is high? or - (ii) The reheat temperature T R ( ) after this inflation is high? The second assumption is much stronger as lower reheat temperatures can be achieved if the coupling of the inflaton to all other forms of matter is very small. While much of the material below is not new, it is useful to emphasize the limitations on many particle physics models which the above assumptions imply. In Sec II we show how the high inflation scale can constrain models of symmetry breaking leading to topological defects. In the main sec III, we recall difficulties of generic CDM (cold dark matter) models with high masses M X ( ). The bounds originally emphasized by Greist and Kamionokowski (G.K) [5] stem from the small annihilation cross-sections and the resulting excessive residual densities. We review this seminal work focusing on the particle physics entering the cross-section bounds. We argue that the bounds on annihilation cross-sections are in general stronger and for a more restrictive upper bound than the original M X ( ) ≤ 340 TeV of GK. In Sec IV we discuss how these bounds dramatically relax if the X's participate in a confining non-abelian gauge interaction with a scale Λ ′ much smaller than M X ( ) and trace this to the fact that S matrix framework cannot address confinement. In sec V we consider models of light m x ( ) ∼ KeV very weakly interacting particles which are assumed to have never been in equilibrium with the rest of matter/ radiation. In such models one can 'freeze-in' a desired relic density of these particles which may be 'warm' dark matter. However in even modest re-heat temperatures far lower than the very high values considered here these particles which do not decay or annihilate are thermally produced with over-closure densities. Finally in the concluding section VI, we comment on a possible connection with the 'large desert' particle physics scenario. Note that the panacea of diluting the density of defects or of heavy relics by either subsequent inflation or by the late decays of some heavy, long lived particles, such as 'Moduli'- massive scalars which couple only with gravitational strength appearing in many string inspired scenarios - may fail. In later inflations the gravity waves emitted in the primordial high scale inflation get diluted. The same dilution operates also on the CMB photons or more generally the 'radiation' which later converts into photons. However at he end of the later inflation we expect some reheat and consequent generation of many more photons, but no more gravitational waves. Likewise the late decays of massive particles will enhance the photons but not the gravitons or gravitational waves This imbalance -and ensuing relative weakening of the gravity wave amplitude- may prevent them from imprinting the B pattern on the photons which BICEP may have seen. In the following, we do not address these fixes of the problems which arise in many scenarios and focus on possible solution within the particle physics proper. ## II. CONSEQUENCE OF A HIGH SCALE OF THE LAST INFLATION FOR MODELS WITH TOPOLOGICAL DEFECTS. Inflation can dilute excessive amount of topological defects. Indeed modern inflation was motivated by an attempt to dilute the density of supper-heavy GUT magnetic monopoles generated at the first stage of GUT breaking in which a U (1) subgroup splits off: G GUT → GXU ′ (1) [6]. Production of monopoles even at energies bigger than their masses is dynamically suppressed by exp ( -1 /α ) type factors [7]. The fact that M monopole ( ) = M GUT /α ( ) implies that even if the monopoles were thermally produced at the highest temperatures possible T = T Reheat ( ) ≈ M GUT ( ) there would still be an exp ( -1 /α ) Boltzmann suppression. However such monopoles may be produced at the phase transition corresponding to the spontaneous breaking of GUTs via the Kibble mechanism [8] at zeros of the GUT breaking Higgs condensate. These points are the junctures of domains where the Higgs VeV points in different directions of the gauge group. without subsequent inflations the primordial inflation at a scale of M GUT ( ) = 10 16 GeV may not achieve the dilution of n Monopoles /nγ = 10 -25 required to ensure a relic density of the monopoles less than that of the allowed dark matter. Demanding that the monopoles will not dissipate the galactic magnetic field Yields the much stronger Parker bound on the density of magnetic monopoles. The capture of m -¯ m pairs into 'Monopolium' states with ensuing annihilation cannot achieve such a small monopole number density. We discuss related issues in Sec IV. Next in a natural hierarchy are the one dimensional cosmic strings arising in spontaneosly broken U (1) symmetries. We expect that approximately one closed string per horizon of length ct = l ( horizon ) = l ( h ) forms at the time of the SSB (spontaneous symmetry breaking). The string tension or energy per unit string length is ∼ µ 2 , where µ ∼ T ∗ are the SSB scale and the temperature T ∗ of the corresponding phase transition. The energy density due to these strings at the time of SBB is: $$\rho ( s t r i n g ) \approx \mu ^ { 2 } l _ { h } / l _ { h } ^ { 3 } = \mu ^ { 2 } / l _ { h } ^ { 2 }.$$ If the closed strings behave as CDM ( cold dark matter) particles then their mass density ρ string ( ) scales as T 3 and ρ string ( ) ≤ ρ CDM ( ) should hold at any temperature T .The CDM density is: ∼ 5 ρ Baryon ( ) = 5 η B n γ 1 GeV with η B ( ) ∼ 5 × 10 -10 the baryon asymmetry. Thus $$n _ { \gamma } = N ( d o f ) \zeta ( 3 ) / \pi ^ { 2 } T ^ { 3 } \approx 0. 1 2 N ( d o f ) T ^ { 3 }$$ with N dof ( ) the number of degrees of freedom of relativistic particles at the temperature T. For T ≥ TeV we take N dof ( ) T = N dof ( standardmodel ) ∼ 60 and the comoving dark matter density is : $$\rho ( C D M ) = 2. 5 \times 1 0 ^ { - 9 }. 6 0 T ^ { 3 }. G e V = 1. 5 \times 1 0 ^ { - 7 } T ^ { 3 } G e V$$ To estimate ρ string at the time of the SSB we need the horizon size l h ( SSB ) at SSB. In the radiation dominated era between the SSB and nucleosynthesis at time t = t 0 ∼ 1 sec and temperature T ∼ 1 MeV , the horizon grows as 1 /T 2 . Thus we have : l h ( SSB ) = l ( T = MeV .MeV ) 2 /T SSB ( ) 2 = l ( T = MeV )10 -6 /µ 2 with l = ct 0 ∼ 3 × 10 10 cm and T SSB ( ) ∼ µ the temperature or the scale of the SSB in GeV. Thus we find ρ string ∼ µ 6 10 12 . Demanding that the strings will not saturate the CDM at T = T SSB ( ) ∼ µ then yields the bound: $$\mu \leq 1 0 ^ { 7 } G e V$$ If the individual strings extending over the horizon stretch with the horizon growth the constraint obtained is much stronger. Much tighter bounds also follow from more careful considerations of the CMB fluctuations and unisotropy due the the strings - and when applicable also from em signatures. The last and most extended type of topological defects are domain walls which result from spontaneous breaking of discrete symmetries. A pertinent example is the left right symmetry. At high energies an exact SU (2) L XSU (2) R with mass-less W ,W L R gauge bosons with equal gauge couplings g L = g R = g W and a symmetric coupling to the Higgs sector is assumed. [9, 10]. Constraints from weak decays imply that the mass: W R ∼ g W .µ is bound from bellow by 2 -3 TeV and therefore the symmetry breaking scale should be µ &gt; 10 TeV . The initial Z (2) symmetry of the lagrangian implies that we are equally likely to have regions where m W ( L ) ≤ M W ( R ) where the important weak interactions al low energies are left handed and domains with the opposite, m W ( R ) ≤ M W ( L ), pattern. The energy per unit area of the domain walls separating these region is ∼ µ 3 . The energy W = µ R 3 2 Hubble of just one such domain stretching across the present horizon vastly exceeds by 10 32 the total DM mass. In order to avoid the difficulty one might add a tiny potential breaking Z(2), V = /epsilon1µ 4 to push the domain wall away. This will introduce however a cosmological constant of order /epsilon1 (10 TeV ) 4 , exceeding the 'observed' value of [10 -2 e.V ] 4 implying that /epsilon1 ≤ 10 -60 . This fine-tuning problem replicates the fine tuning of the ordinary cosmological constant .The possibility that these two difficulties will cancel curing each other seems remote - but should be looked into. Because of frustration at junctures of more than two domain walls this remedy is not available for the case of SSB of Z N , N ≥ 2 ## III. IMPLICATIONS OF HIGH REHEAT TEMPERATURE FOR MASSIVE STABLE PARTICLES. Many particle physics models have new massive particles X with lifetimes τ ( X ) ≥ 1 . s This is clearly the case for massive particles which are CDM candidates as they should live much longer than Hubble time. Indeed new physics at higher energy scales is often associated with new gauge interactions and/or new symmetries, suggesting that the lightest particle carrying the new Quantum number(s) be stable. A well known example is the LSP ( lightest Super-symmetric partner), stabilized by R parity making it a good dark matter candidate - provided it leaves the correct relic density. Other frameworks aiming to dynamically generate the E.W (electroweak) SSB via a fermionic condensate in a new confining gauge theory at a ∼ TeV scale also have massive long lived particles, e.g. the lightest baryons made of the new fermions. A repeatedly encountered problem is that the annihilation rate of such massive particles is too small and may not reduce their relic density ρ X ( ) freeze -out to (or bellow) the required ρ CDM ( ). Matter -antimatter asymmetry, analog to our baryon asymmetry, can only increase the residual ρ X ( ). This difficulty is often evaded by assuming reheat temperatures lower than M X ( ) or by having an additional massive particle tuned to decay at the right time so as to dilute the X/γ ratio. The underlying assumption of this paper excludes these options. Future deeper insight into the origins of inflation may eventually justify it or point to specific cosmological scenarios where these remedies do naturally arise and are not introduced ad-hock in order to make certain pet models viable. We next estimate of the freeze-out density recalling the 'WIMP miracle' that if M X ( ) ∼ TeV , then the right relic freeze-out density obtains for charge symmetric CDM annihilating into the lighter SM (standard model) particles with weak interaction cross-sections: $$\sigma _ { a n } \sim 1 / v ( \alpha ( W ) / M ( X ) ) ^ { 2 }$$ In the above equation α Weak ( ) = g 2 W / π 4 = 1 30 is the coupling strength of weak interaction and / v = v X ( ) -v X ( ¯ ) = 2 ( v X ) = 2 k/ M X ( ( ) is the relative velocity of the ¯ X and X in their center mass frame where k is the common magnitude of the momenta. Since the scale of SUSY (supersymmetry) breaking and therefor the mass of the LSP's ( lightest SUSY partners) identified with X, were supposed be lighter than a TeV to 'naturally' explain the mass scale of weak interaction, this gave further impetus to direct and indirect WIMP searches in underground detectors, in satellites, in ICE-CUBE and for their production along with all the other SUSY partners at the LHC (large hadron collider). The lack of positive evidence kept pushing up the masses of the WIMPS, the miracle stopped operating and over closure difficulties were encountered. The number density n X ( ) = n X ( ¯ ) = n of X and ¯ X particles which are in thermal equilibrium with the rest of radiation at temperatures T ≥ M X ( ), is exponentially suppressed once T falls below M X ( ): n ∼ (exp -M X /T ( ) ). At a temperature T f.o. = M X /f ( ) the annihilation rate: $$\Gamma ( a n ) = n v \sigma _ { a n } \sim n \alpha ^ { 2 } ( W e a k ) / M ( X ) ) ^ { 2 }$$ falls bellow the Hubble volume expansion rate: $$\frac { \dot { v } } { v } = 3 H = 3 ( 8 \pi / 3 \rho ( T ) ) ^ { 1 / 2 } / M _ { P l a n c k }.$$ The X particles then cease to be in chemical equilibrium and their co-moving density freezes out. The density ρ T ( ) is that appropriate for radiation dominated era at temperature T namely: ρ T ( ) = N dof π T ( ) 2 4 / 15. With N dof ( ) the effective number of degrees of freedom at this temperature which we again take as N dof ( ) ∼ 60 Using this in Γ( ann ) = 3 H with T = T f.o = M X /f ( ) yields n X ( ) f.o = 2 π/ 5 1 2 / m X ( ) 4 /m Pl f 2 α 2 . Demanding that the relic X density together with the equal density of ¯ : X ρ X ( + ¯ ) = 2 X n X M X ( ) ( ) does not exceed the total allowed density of cold dark matter ρ CDM ( ) in Sec II above, yields an upper bound on M X ( ): $$M ( X ) \leq 1 0 0 T e V \alpha ( 1 / f ) ^ { - 1 / 2 } N ( d. o. f. ) ^ { 1 / 2 } ( 4 0 \zeta ( 3 ) / 6 \pi ^ { 3 }. ( 8 \pi / 3 ) ^ { 1 / 2 } ) ^ { 1 / 2 }$$ Detailed calculations by many authors yielded f values in the 20 -30 range. Taking N d.o.f to be 60 and α ∼ 1 30 , we find that unless / M X ( ) ≤ TeV we have excessive relic X density. In general the bound on the mass scales as ( σ ann v ( ) Ω( X h ) 2 ) -1 2 / . The maximal annihilation rate used by GK v.σ = π/k 2 with k 2 ∼ 2 TM X ( ) = 2 M X ( ) 2 /f is bigger than the 'Weak value' featuring in the Wimp miracle above by πf 1 /α 2 explaining their higher 'axiomatic' bound M X ( ) &lt; 340 TeV . In the following we argue that the maximal reasonable rate vσ is fact proportional to 1 /M X ( ) 2 rather than to 1 /k 2 and thus their bound is tightened not only by the obvious 1 / 10 1 2 / ∼ 1 3 due to Ω / and h 2 decreasing since the time when the original GK paper was written by 5 and 2 respectively, but also by another factor of f -1 2 / = 1 (5 5) so that the likely bound is: / . M X ( ) ≤ 20 TeV . Absent precise statements for the non-diagonal annihilation amplitudes GK used rigorous bounds on the elastic ¯ XX elastic amplitudes which the optical theorem relates to total crosssection. However the qualitative difference between the t channel exchanges in elastic and anni- hilation processes ,which GK mentioned, suggests tighter upper bounds on the annihilation crosssections lowering the upper bounds on M X ( ) . We will also show how when the S matrix approach underlying the bounds breaks down, as it necessarily does for non-abelian gauge interactions with long range confining force, the limits are largely relaxed. ## A. When can large annihilation cross-sections arise? This can be viewed from the s and t channels points of view. ## (i) s channel prospective Enhanced cross-sections arise when the center mass energy W XX ( ¯ ) is close to M R ( ) the mass of the particle R which in turn is near the threshold: M R ( ) = 2 M X ( ) + m with m/M ≤≤ 1. For negative m the particle R manifests as a pole in the ¯ XX → ii ¯ amplitudes A X,i ( ) = r X,i / W ( -M R ( )). For positive m it is complex pole at W = M R ( ) + i Γ 2 with Γ the total width of the / corresponding resonance. This width is the sum of the elastic ¯ XX width and the widths Γ i for R to decay into the final ( ¯ ) states. ii $$\Gamma = \Gamma ( e l ) + \sum _ { i } \Gamma _ { i }. \text{ Total width is sum of partial widths}$$ The residue of the pole in the annihilation amplitude: r X,i = g XX R .g ii R ( ¯ ; ) ( ¯ ; ) factorizes into the product of the couplings of R to the initial and final particles. (For simplicity we assumed final states with two particles. These particles could be unstable and decay later.) (see Fig 1a) The pole or the resonance contribute to a particular partial wave with J = J R , the angular momentum of the particle R. At freeze-out the temperature T is T f.o = M /f R ∼ M R / ( ) 30. The ¯ XX system of interest is then non-relativistic and J = L + S with S the total spin of ¯ XX and L the orbital angular momentum in the Lorentz frame of the their center of mass. The partial wave expansion for the ¯ XX elastic scattering amplitude f ( θ ) in its familiar non-relativistic form is: $$f ( \theta, W ) = \sum _ { l } ( 2 l + 1 ) a _ { l } ( W ) / i k P _ { [ \cos ( \theta ) ] ; l } = 0, 1, \dots \infty \text{ with } \left ( d ( \sigma ) / d ( \Omega \sim f ^ { 2 } ( \theta ) \right ) \quad ( 1 0 )$$ where P cos θ l [ ( )] are the Legendre polynomials and k = ( W 2 -4 M X ( ) 2 ) 1 2 / / 2 is the momentum of X or ¯ in their center mass frame. X In writing the above expansion we implicitly assumes spin-less particles so the J=L and we do not have to separately expand the 5 helicity amplitudes for say 1 2 + 1 / / 2 → 1 2 + 1 / / 2 or 1 + 1 process where spin half X's annihilate into electron positron or W W + -pairs. The arguments do however carry over with minimal changes to these cases as well. Unitarity limits the magnitude of each partial wave amplitude by a l ( W ) ≤ 1 . Thus the maximal contribution of any partial wave to the total cross-section is (2 L + 1) π/k 2 = σ max ( ) L . This maximal value is achieved only at W = W R = M R ( ) , the peak of the the Breit Wigner distribution corresponding to the resonance R : $$\sigma ( \bar { X } X \rightarrow \bar { i } i ) = ( 2 J _ { L } + 1 ) \pi / k ^ { 2 } \Gamma ( e l ) \Gamma ( i ) / [ ( W - M ( R ) ) ^ { 2 } + \Gamma ^ { 2 } ]$$ The annihilation cross-section into any ¯ ii channel is proportional to the product of the decay widths Γ( X ) = γ R ( → ( ¯ XX ) and Γ( ) = i γ R ( → ( ¯ ii )). Since Γ( X ) ∼ g XX R ( ¯ ; ) 2 and Γ( ) i ∼ g ii ( ¯ ; R ) 2 the residue at the complex poles factorizes. Thus three factors jointly generate a large annihilation cross-section. To saturate the KM bounds over an extended energy range all three factors should be maximal. The first is the 2 π/k 2 = π/M X K X ( ) ( ) factor with k /M X 2 ( ) = K X ( ) -the kinetic energy in the center-mass system of the X particles. This kinetic energy cannot be arbitrarily small. The temperature during the relevant period of freeze-out is: T f. 0 = M X /f ( ) and since the X particles are in thermal equilibrium K X ( ) ∼ T ∼ M X /f ( ) . Thus this first factor can enhance the annihilation cross-section by 1 /f ∼ 3 relative to 2 π/M X ( ) 2 . The second factor is the full width Γ. The rate of annihilation is : $$\int d k ( 1 ) d k ( 2 ) n ( X ) [ k ( 1 ) ] n ( \bar { X } ) [ k ( 2 ) ] \sigma _ { a n n } ( W ( 1, 2 ) ) v ( 1, 2 ) & & ( 1 2 )$$ with n X ( ) and n X ( ¯ ) the number densities of the X and ¯ X particles with momenta k (1) and k (2) and W(1,2), v(1,2) the total energy and relative velocity in their center mass frame. In the thermal environment W (1 2) , is spread over ∆( W ) = T . For the annihilation cross-section σ ann ( W (1 2)) to be large over the full energy range the resonance R has to be sufficiently broad: , Γ ∼ ∆( W ) ∼ ( T ). Using T = T f.o = M X /f ( ) the condition becomes: Γ &gt; M X /f ( ) . Broad resonances naturally arise if ¯ X and X strongly interact with each other though a near threshold bound state pole or resonance requires tuning. The total width is the sum of the width to decay back to the original ¯ XX and the decay widths into the annihilation channels R → ¯ . ii The first width γ R ( ) → ¯ XX = g R, XX ( ¯ ) 2 k/ π 8 is suppressed by k/M X ( ) = v X ( ) = f -1 2 / ∼ 1 5. / The third ingredient needed to ensure large annihilation cross-section are large decay widths Γ( ) i = g 2 ( R ii M X ; ¯ ) ( ). These decay widths are not suppressed by kinematics and jointly can contribute half the the total width maximizing annihilation cross-section. However we claim that in most natural scenarios these are strongly suppressed dynamically a feature best seen from the t channel prospective (ii). - (ii) t channel induced large cross-section and their limitation in the case of annihilation. Exchanging mass-less particles in the t channel generates infinite elastic scattering. This follows from the infinite range of the corresponding potential and the Rutherford scattering via photon exchange is a prime example. Indeed while unitarity limits the cross-section contributed by each individual partial wave the sum over the partial waves: A s, t ( ) = A s ( ; cos( θ ) = ∑ (2 L + 1) a L ( s P ) L (cos( θ )) with θ the center of mass scattering angle could diverge. The invariants made up of squares of the sums of four-momenta entering in the different channels : s = ( p X ( + ( ¯ )) p X 2 = W ,t 2 = ( p X ( ) -p i ( )) 2 and u = (( p X ( ) -p i ( ¯ )) 2 are often used in discussing 2 → 2 amplitudes. For finite mass µ of the exchanged particle the elastic amplitude A s cos θ ( ; ( )) is analytic in the 'Lehman Martin' ellipse in the cos θ ( ) plane with foci at +1 , -1 and a semi-major axis 1 + t 0 / k 2 2 with t 0 = µ 2 the nearest t channel singularity and the sum converges therein. A detailed analysis yields an exponential decrease of the higher partial waves a j ( s ) ≈ ( k/µ ) 2 l [26]. The extra velocity factor suppression of the p annihilation due to the p wave required for Majorana relics is well known. Still the elastic cross-section ∼ µ -2 are large for small µ . However, the ¯ XX → ¯ ii annihilation cross-sections of interest have no t channel enhancement. This follows from both kinematics and dynamics. We are interested in annihilation near threshold where W = s 1 2 / ∼ 2 M X ( ). At this point k ≈ 0 and t ≈ u . Recalling that s + t + u = 2 M X ( ) 2 + 2 m i ( ) 2 ∼ 2 M X ( ) 2 and s ≈ 4 M X ( ) 2 , we find that t ≈ -M X ( ) 2 . Thus, the annihilation amplitude is suppressed by 1 /t min ( ) + µ 2 ≤ 1 /M X ( ) 2 . The annihilation cross-section is in fact smaller by another factor 4. The reason is that the lightest particle that can be exchanged has a mass µ ≈ M X ( ) (see Fig. 1b) as otherwise the X quickly decays into the final i and the exchanged µ particles and would not be long-lived contrary to our assumption. Note that the annihilation: ¯ XX → ¯ X X ′ ′ where X ′ is just slightly lighter than X and with a light µ exchanged in the t channel and a large cross-section: σ ∼ 1 / ( µ 2 +( M X ( ) -M X ( ′ ) 2 ) ) is also excluded. In this case the heavy X ′ is the lighter particle in the new sector and therefore would be stable. Another X' will have then to be invoked to have the X ′ annihilate quickly etc. More importantly all non zero l terms in the partial wave expansion of the annihilation cross-section are - because of the short range t channel induced interactions r 0 ≈ 1 /M X ( )-drastically suppressed at threshold by the factor of ( k/M X ( )) 2 l . This makes the contribution of all none-zero l states negligible leaving us only with J P ( R ) = 1 -or 0 -for spin 1 / , X 2 particles or with J P ( R ) = 0 + for spin zero X ′ s and we cannot use t channel exchanges to enhance the rate of annihilation. All of this just elaborates on and accords with KM. There are however several new points which we expound next. (1) The t channel exchanges can provide a potential in the ¯ XX channel tuned to produce a near threshold ¯ XX resonance/ bound state, in the l=0 partial wave. However we still cannot saturate the upper bound σ ann = π/k 2 in this partial wave and annihilation cross-section enhanced by ( M X /k ( ) ) 2 = f relative to the nominal 1 /M X ( ) 2 are not obtained. We argued above that annihilation requires that a particle of mass ∼ M X ( ) be exchanged in the t channel and the range of the 'annihilation potential' r 0 = 1 /M X ( ), which is definitely smaller than the effective wavelength size 1 /k of the resonance (See Fig 3). This suggests a geometric reduction of the cross-section by k /M X 2 ( ) 2 = 1 /f which certainly would hold at high energies, It is however also the case at low near threshold energies as the following argument indicates. During the lifetime τ ( R ) = 1 / Γ = f/M X ( ) of the resonance R , the ¯ , X say, travels a distance of d = vτ relative to X which we assume to be fixed at the origin. Using v = k/M X ( ) = f -1 2 / we find that d = f 1 2 / /M X ( ) and the effective annihilation volume swept by the ¯ X is V ol ( ann ) = πr d 2 0 = πf 1 2 / /M X ( ) 3 . The full volume of the resonance (or the corresponding bound state obtained by k → ik ) is V ol ( tot ) = 1 /k 3 = f 3 2 / M X ( ) -3 namely f times larger. The probability of actual annihilation rather than scattering back into the initial ¯ XX state is then the ratio of these volumes namely 1 /f . Thus we are back to the original σ ann ( ) ∼ 1 /M X ( ) 2 estimate and upper bounds on M(X) larger by f 1 2 / ∼ 5 ensue. It is important to note that the large annihilation cross-section of anti-proton and proton near threshold does not contradict the above arguments for suppression of ¯ X -X annihilation. There are several important differences between the two cases. Indeed p -¯ 'annihilation' is a misnomer. p Unlike in the genuine e + e -→ 2 γ annihilation where the electron and positron disappear no quarks and anti-quarks need to be annihilated in ¯ pp annihilation. Rather the initial q 3 +¯ state rearranges q 3 into a three meson (¯ ) qq 3 configuration. As the slow p and ¯ approach each other near threshold, p the levels of these two configurations cross and there is an almost complete adiabatic transition of ¯ p -p into the three mesons. Since no heavy t channel exchanges are involved the only suppression of this process comes from the finite nucleon size. This issue will be important for our subsequent discussion of the relic abundance of heavy X particles which carry the charges of a confining gauge theory and generate stable or long lived baryons. There is however a clear distinction between this and what is rigorously excluded in the ordinary S matrix formalism -namely the cases in which the GK bound is violated. Disregarding any t channel dynamics we can postulate a new heavy gauge particle or a scalar of a mass M(R) tuned to be within a factor of 1 / (2 f ) near the 2 M X ( ) threshold. We then arbitrarily prescribe that it's coupling to both the XX ¯ initial particles and the final ii ¯ particles so as to saturate the GK bound. (see Fig. 2) At this point we depart from the purely formal approach which does allows particles as heavy as ≈ 100 TeV and go beyond the original discussion of GK. Utilizing the many experimental bounds on WIMPS which have accumulated in the meantime and also some general comments on the underlying theory we discuss the potential difficulties entailed if new particles of the type described above are allowed . The light particles into which the R decays can be new 'dark sector' x particles. Since the lightest particle in this sector is stable, potential over-closure still looms and one needs detailed scenarios where the new x particles are sufficiently light to meet CDM or even WDM or HDM ( warm dark matter and hot dark matter) requirements. The other alternative- that the R decays into SM particles is more interesting but more restricted phenomenologically. If the possible ii ¯ final states include the u and d quarks then the maximal couplings of R to the ¯ XX dark matter particles and to quarks/nuclei can generate excessive Xnuclear cross-sections. With target nucleus mass M(A,Z) these cross-sections are σ X ( -( A,Z )) ∼ 1 ( / M X ( ) 4 ) .M X .M A,Z ( ) ( ) = 4 10 . -35 cm . M X /TeV 2 ( ( ) ) -3 A/ 100 and may exceed the extremely tight bounds on nuclear cross-sections inferred from direct searches. On the more theoretical side introducing a new strong gauge interaction common to the SM and the dark sectors which would be implied if R is a vector particle seems to be a nontrivial undertaking, even if it is only a U (1) interaction. This is also the case if R is a scalar. Having a multi-TeV elementary scalar field couple to the electron or muon say with O(1) couplings when the only scalar couplings of the latter to the Higgs particle are of order 10 -6 -10 -4 seems awkward. The new scalar or vector interactions may also modify precisely tested flavor physics in rare decays of standard model particles. An interesting possibility is that the new dark sector has it's own rather light photon which we denote by A ′ corresponding to some new U ′ (1). In this case one could have the annihilation ¯ X -X → A A ′ ′ . Since an X exchange is involved, the cross-section then has the generic α ′ 2 /M X ( ) 2 form. The same argument applies for annihilation via either t channel or s channel exchange to standard model particles. Specifically in the s channel the R resonance needs to mix with some standard model neutral particle. These are much lighter and will be off-shell by the large amount of ∼ ( M R ( )) 2 . [27] ## IV. IV. CAN THE UPPER BOUND ON σ annihilation ( ¯ X -X ) AND RESULTING BOUNDS ON M(X) BE RELAXED. The lengthy discussion above suggested that the only way to enhance the annihilation crosssection beyond the bench-mark of α /M X 2 ( ) 2 is to tune parameters so as to have a near threshold ¯ XX resonance or a near zero energy S wave bound state. Even then because the temperatures involved are T freezout = M X /f ( ) ≈ (0 03) . M X ( ) the effective cross-section determining the relic freeze-out density n X ( ) f.o is only π/k 2 = π/M.T ∼ π/MT f.o . We have further argued that even the resulting f = M X ( ) 2 /k 2 enhancement relative to σ ann ( ) = 1 /M X ( ) 2 is absent if the process proceeds via t channel exchange of particles as heavy as M X ( ) . This along with 10 -1 decrease of the allowed relic density tightened the upper bound by (10 /f ) -1 2 / ∼ 1 17 / ≤ TeV from M X ( ) ≤ 340 TeV to M X ( ) ≤ 20 TeV . There are many beyond standard models with stable or long lived X particles more massive than this limit. [11-13][28]. If we exclude cosmological scenarios with a reheat temperature lower than M(X) or with a late inflation or late decays of other heavy particle dilutes the X density we need to modify the X dynamics in order to enhance the annihilation rates. We next discuss the possibility that new long range interactions not included in the standard S matrix framework can strongly enhance the annihilation cross-sections and relax the upper bounds on M X ( ). It is well known that the Coulomb like interaction due to the exchange of a relatively light new 'dark photon' A ′ of a new U ′ (1) of coupling to α ′ and mass m A ( ′ ) ≤ M X α ( ) ′ pulls the ¯ X and X closer together enhancing the wave function at zero | R X ( ) -R X ( ¯ | separation and the ensuing annihilation rate via some short range exchange in the t channel. In this case ( but not for non-abelian interactions), a kinetic mixing /epsilon1F.F ′ with the ordinary photon is possible (providing the dark photon is not mass-less). The resulting richer scenarios allow also X +( A,Z ) → X +( A,Z ) scattering in direct detection searches for D.M and A ′ production and subsequent ,say A ′ → e + e -, decays. These scenarios were extensively studied [14, 15], and the role of the Sommerfeld enhancement (SE) of the ¯ X -X present annihilation rates was emphasized.The resulting Sommerfeld enhancement of the annihilation rate is by α /v X ′ ( ) = SE. [16] The S.E enhancement occurs at temperatures T smaller then the Coulomb binding BE = ( α ′ ) 2 M X / ( ) 4. However even if T/BE is ≈ 1 100 and / v ≈ 1 10 we find even for / α ′ ≈ 1 that S.E. = α /v ′ = 10. The upper bound on M X ( ) is then further relaxed only by S.E 1 2 / ∼ 3 1. . Does the above moderate S.E. fully exhaust the effect on the ¯ X -X annihilation of the light A ′ . In principle ¯ X -X bound states can form via the : ¯ X -X → ( ¯ X -X ) n + γ ′ analog of ordinary recombination e -+ p → H n + γ . The subscript refers to the n'th excited state with binding E n = Ry /n ′ 2 and size r n = r ′ Bohr .n 2 , where Ry ′ = M x .α ( ) ′ 2 / 4 and r ′ Bohr = 2 /M X α ( ) ′ . Once in the ground state the local effective density becomes n X ( ) effective ≈ ar -3 Bohr ′ which can be as much as 10 27 bigger than the low cosmological density and annihilation will proceed immediately. The recombination cross-section for capture into the n'th state is [16, 17] σ n = C.n/α M X ′ ( ) 2 with C a constant of order unity. However, capture into the high n states cannot enhance the overall ¯ XX annihilation since it occurs only at temperatures T n ≤ M X α /n ( ) ′ 2 2 where the X number density n X ( ) ∼ T 3 ≤ n -6 becomes too small for the rate of recombination to keep up with that of the Hubble expansion which scales as T 2 . Also, unlike ordinary recombination where n proton /n γ ( ) ( ) = n e /n γ ( ) ( ) is a constant value fixed by the baryon asymmetry, the ratio of n X /n γ ( ) ( ) keeps decreasing so as to become smaller than n Baryon /n γ ( ) ( )5 m p ( ) M X ( ) where the factor 5 is the ratio Ω( DM / ) Ω( baryon ). Much stronger enhancements of the annihilation cross-section arise if the X particles have nonabelian confining interactions at relatively low scales. In the simplest such scenario the heavy X particles carry ordinary SU (3) c color as was the case for the gluino ˜ in split SUSY [16, 17]. g At the QCD phase transition with temperature T = T c ≈ Λ( QCD ) ≈ 200 MeV the g s may pair into color singlet and annihilate but are more likely to bind to the abundant ordinary gluons to form ˜ g -g color singlet glue-ballinos. The size of this state is fixed now by the QCD scale to be ∼ 0 3 . fm and the cross-section for collisions of these particles is far bigger than that of the direct ˜˜ annihilation. gg Further, in a substantial fraction of the collisions the glue-ballinos rearrange into a deeply bound ˜ g -˜ gluino ball and a light g gg glue-ball with the subsequent quick annihilation of the gluino-ball. The net effect is to revive the ¯ X -X annihilation later than and over and above the early annihilation which froze out and a much higher T ≈ M X / ( ) 30. Various estimates suggest that this indeed allows for relatively stable gluinos at masses higher than the above bounds. If the gluino was the lightest among all the SUSY partners and therefore stable (which in most models it is not) and further the above annihilation left just the right amount of relic gg ˜ particles to be dark matter these could indeed be the dark matter particles. However just the residual gluon exchange interactions between the R particles and ordinary hadrons would cause them to bind to nuclei forming ultra heavy isotopes. The extremely strong bounds on such isotopes then exclude this and many other SIMP scenarios. These last difficulties are evaded if the X particles carry another color' and be the 'quarks', Q ′ of another say SU ′ ( N ) non-abelian gauge interactions. The confinement scale associated with the new group has to satisfy : M Q ( ′ ) ≥ Λ . ′ Otherwise the Q's could confine into Q ′ N ′ color' singlet baryons of a large mass ∼ N ′ Λ . ′ These stable baryons will have a small size R Q ( ′ ) ∼ 1 Λ / ′ and correspondingly small annihilation cross-sections ∼ Λ ′-2 and the difficulty encountered with the original X = Q ′ will repeat all over again. The model leads to two different scenarios depending on if q's of mass m q ( ′ ) ≤ Λ transforming as the fundamental N' representation of ′ SU N ( ′ ) exist or do not exist. The first case is analog to QCD with light ud quarks. At the T = Λ ′ mesons M = Qq ′ ¯ ′ and ¯ M form. MM ¯ collide with large ( ∼ Λ ′-2 ) cross-sections and in ∼ 1 2 the cases rearrange into / ¯ QQ ′ ′ + ¯ q q ′ ′ and the QQ ′ ¯ ′ inside the heavy quarkonia will then shortly annihilate. Note however that the heavy Q's might the just like the t, b and c quarks in QCD mix with and decay into the lighter q's and the longevity of the Q's will then be compromised. These difficulties are avoided if the Q's are the lightest particles carrying the SU'(N) quantum numbers rendering them completely stable. The confining phase transition at T ∗ = Λ ′ leads to complete ¯ Q ′ -Q ′ annihilation by long string like chromo-electric flux tubes connecting the residual barQ Q ′ ′ remaining after the earlier freeze-out of the perturbative annihilation at a temperature T f.o ≥≥ T ∗ . These strings then relax to their small ground state and the Q ′ -¯ Q ′ annihilate. We need however to address the question of Q ′ N baryons. We note that the formation of baryon- antibaryon pairs is suppressed relative to the dominant ¯ Q -Q formation by an essentially combinatorial factor of ∼ exp -N due to the need to separate the N Quarks and the N anti-quarks forming the baryon and the anti-baryon respectively. This is very much analog to the exp -1 /α factor suppression of monopole pair production. The latter is also suggested by the fact that large N baryons can be viewed as topological skyrmions with the large baryon charge being topological like the ≈ 1 /α magnetic charge of the monopole. [18]. It seems unlikely that the annihilation of large N baryons will be suppressed by a similar exponential factor. The baryons do not really annihilate but only rearrange into N ¯ Q -Q pairs. For low enough velocity and overall attractive interaction the process is adiabatic (with many level crossings) and annihilation is virtually ensured once the baryons are within 1 / Λ range. Also that decays of the X baryons into light say SM particles might also proceed via some GUT like exchanges. These will be faster than the proton decay in 10 3 8 Sec by ( M X /m N ( ) ( )) 5 factors which for M X ( ) ≥ 10 8 GeV may yield acceptably short lifetimes. The resulting avoidance of the rigorous S matrix upper bounds on the masses of relic stable particles is not surprising. The confining linear potentials between the Q ′ and ¯ Q ′ have no S matrix counterpart where all potentials are superposition of Yukawa potentials with different ranges: V ( r ) = ∫ d µ ( 2 ) ρ µ ( 2 ) exp( -µr /r ) . The spectral function ρ µ ( 2 ) corresponds to various exchanges in the t channel. In particular a mass-less exchanged photon generate to 1 /r potential the longest range potential possible and a linear potential cannot be achieved [29]. At the QCD phase transition all relevant length scales - the average separations of quarks or of gluons and the sizes of the forming ¯ q -q and gg states happen to be the same: of order 1 /T ≈ 1 Λ, / and all ¯ q -q pairs which are spatially close readily transform into the confined meson states. Here, however, the density at T = T ′ c ≈ Λ of the heavy ′ Q ′ which survived earlier annihilation is smaller by about at least 15 orders of magnitude than that of the the g's ( the SU(3)' gluons) n g ( ′ ) ∼ T ′ 3 ≈ T 3 and the confinement of the ¯ QQ ′ pairs seems rather puzzling. Thus | R Q ( ′ i ) -R Q ( ¯ ′ j ) , the separation between near by pairs exceed the natural 1 | / Λ scale by 10 ′ 4 or more. Prior to confinement in a Coulomb like phase the chromo-electric fields the flux/field lines connect any given ¯ Q i anti-particle to several Q j particles. At the phase transition this radically changes. The Q i Q ′ ( ) ¯ ′ ( j ) relation becomes 'monogamous' with each ¯ Q ′ is paired with the nearest Q ′ and all the flux lines emanating from it to other Qs ′ disengage , jump over and collapse to the long string connecting to this specific neighbor. This could not happen abruptly. Indeed if the phase transition is of first order that can be the time during which the system loses latent heat and the predominantly B 2 condensate gradually builds up starting with small bubbles which keep multiplying and expanding and in the process keep via the inverse Meisner effect pushing on the E flux line all the way until they form the final relatively thin and elongated strings and in particular assume the configuration where the total energy of the system: ∼ Σ | R Q ( ′ i ) -R Q ( ¯ ′ j | is minimal.[30] Other heavy colored particles suggested by Luty are the Quirks which carry both ordinary and a new color . The arbitrary yet fascinating aspect of the theory is that while the Quirks are much heavier than the ordinary quarks - the scale of the new confining gauge theory is assumed to be (much) lower than that of ordinary QCD.: Λ ′ ≤ Λ( QCD ), a feature that leads to new signatures in LHC.[19, 20] and to a very interesting cosmology. We [21, 22] have argued that the various late stages of annihilation at and after the color and color' phase transitions reduces the relic density of Quirks to be bellow that of CDM without invoking a reheat temperature lower than M(Quirk). Also an appropriate σ ′ tension of the new color' strings, can suppress generation of super-heavy isotopes made of Q's bound to heavy nuclei by the Quirks produced over earths lifetime by energetic cosmic rays in earths atmosphere. We still need to ensure that the residual density of g g ′ ′ glueballs which form at the time of the color' confinement phase transition at temperature T = T ′ c ≈ Λ would not leads to unacceptable residual ′ density. This issue is discussed among oth8er cases of over-closure due to weakly coupled light particles in the next section. ## V. SEC VI BOUNDS ON LIGHT STABLE (POSSIBLY DARK MATTER) PARTICLES. If we do not allow low reheat temperatures then also many scenarios with light x particles with masses m x ( ) in the 0.1 KeV to MeV range, are excluded. Such light, weakly coupled particles have very long lifetimes against decay and or annihilation into standard model particles . Unless an appropriate decay/or annihilations into as yet lighter hidden sector particles is provided then these particles - which as we argue bellow have been in thermal equilibrium at some early epoch would have an excessive relic density and over-close the universe. The models harboring these particles will then be excluded simply because they cannot be assumed to be too weakly interacting so as to be produced only in out of equilibrium processes. The Quirk model mentioned above, supplies the first example. We need to ensure that the residual density of g g ′ ′ glueballs which form at the time of the color' confinement phase transition at temperature T = T ′ c ≈ Lambda ′ would not lead to unacceptable residual density. The decay of g g ′ ′ → 2 γ can occur in the Quirk models with light (Λ ′ ≤≤ Λ( QCD ) only via a Q ′ box followed by q box diagrams. Because of gauge invariance these box diagrams generate HeisenbergEuler type effective lagrangians color' involving the QCD and e.m field strengths F 2 µ,ν g 2 µ,ν . The resulting decay rate Γ ∼ α em ( ) 2 α QCD ( ) 4 α ′ 2 M Q ( ′ ) -8 λ QCD ( ) -8 .m g b ( ′ ) 17 is way too small. Simple thermodynamics and conserved entropy imply that processes 3 gb → 2 gb first noted in [23] cannot, contrary to our earlier expectation , reduce n g g ( ′ ′ ) /n γ ( ). In the quenched approximation for N ′ = 3, lattice calculations done for QCD and which are fully justified here with no light Quirks, suggest that m g g ( ′ ′ ) ∼ 7 -10Λ QCD during the prolonged first order phase transition at the temperature of T ′ = Λ ′ where a lot of latent heat is emitted still into the gluonic gas we can expect some significant reduction by a factor of ∼ exp -m g g ( ′ ′ ) /T ′ ≤ exp -7 ∼ 10 -3 . The number reducing process we considered has been recently revived in [24] where a new paradigm for O(40 MeV ) dark matter has been introduced and where the extra entropy emitted by the dark matter particle reducing interactions, is dumped into the normal SM sector which for a long while is in thermal equilibrium with the dark sector. Generically the interactions producing the x particles are suppressed by some heavy new physics scales Λ new and proceed with rates proportional to T n +1 / (Λ new ) n with n = 3 4 or 5. , Still for temperatures T which are comparable or even some-what smaller than this new scale the x particles would have been in thermal equilibrium. A well known example is provided by the the ordinary lefthanded neutrinos which are coupled to all the remaining SM species and are in thermal chemical equilibrium so long as the temperature exceeds O( MeV). This is because the relevant rate scales as G 2 Fermi T 5 ∼ T /v 5 4 with v ∼ 0 2 . TeV the scale of ordinary weak interaction falls bellow the Hubble expansion rate T /M Planck 2 ( ) only at this low temperature. At the (at least!) ∼ 10 10 times higher reheat temperature envisioned any other even supper-weakly coupled species such as sterile neutrinos or ALPS ( axion like particles) would have to be thermally produced. This in turn may exclude a very broad range of scenarios where long lived x particles more massive than say 100 eV are required. In particular it would negate the possibility that sterile neutrinos of mass ∼ 7 KeV and lifetimes of ≈ 10 27 seconds generate the recently observed 3 5 . KeV X ray line [25]. We should emphasize that this reasoning does not apply to all forms of light long lived particles. An example is provided by the dark photon mentioned above. If there is no dark sector and the lightest particles carrying the new U'(1) are extremely almost Planck scale heavy than its may have never been in thermal equilibrium. Its only coupling is via the mixing /epsilon1 with the ordinary photon which for masses m A ( ′ ) ≤ MeV decay only via an electron box diagram into three photons and with lifetimes which are far longer than Hubble time. This is so because for such light dark photon considerations related to the cooling of supernovae by photon' emission strongly bind the strength of its mixing with the ordinary photon ∼ /epsilon1 2 ∼ 10 -20 . The cross-section for producing this dark photon e.g. σγ + e → γ ′ + e ∼ /epsilon1 2 α /T 2 2 yields then in the relevant radiation dominated era where n e ( ) ∼ T 3 a rate of production Γ ∼ σn e ( ) ∼ T . unlike the cases considered above Γ increases more slowly with temperature than the Hubble expansion ∼ T /M Planck 2 ( ) and hence can be out of equilibrium even at the highest possible temperatures. Hence we do not encounter the over-closure difficulties and could have the dark photon be warm dark matter. ## VI. SECTION V. SUMMARY AND CONCLUSION This paper was inspired by the possibility that the BICEP data suggest a very high scale of the primordial inflation. If we could infer from this that the reheat temperature is also rather high and if there were no very significant later inflations, then many physics scenarios could be excluded and at least strongly constrained. Specifcally these are scenarios with topological defects and/ or heavy ( M X ( ) ≥ TeV stable or long lived particles particles or even relatively light m x ( ) ∼ KeV particles. It appears now that the early Bicep claims of a strong tensor part in the CMB and the need for a strong early emission of Gravitational waves may not survive. It is still worthwhile to describe the many implications of assuming a high reheat temperatures and of absence of subsequent appreciable inflations. While most of the material presented is not new and was discussed in various specific cases we believe presenting them jointly and the few improvements we have made are of interest. The main part the paper dealt with the difficulties in scenarios with of heavy long lived particles. Under the above assumption these particles were at an early stage when the temperature T ≥ M X ( ) in thermal equilibrium. The rather strong upper bounds on their annihilation cross-sections derived in standard S matrix approach translate into lower bounds on the residual freezeout density of these X particles. Unless they are lighter than ≈ 20 TeV the residual density will exceed that of the allowed CDM. There are several ways - beyond giving up our assumed cosmological inputs of large reheat temperatures and no diluting late inflation -to avoid these bounds we could use the late decay of some other long lived massive particle to increases the entropy and dilute the number ( and energy) density of the relic X's . alternatively we have to ensure that the X particles decay fast enough an option which does not exist in the interesting case where the new particles constitute the dark matter. We have noted that new physics and new physics scales are often associated with long lived particles. This can be due to new quantum numbers associated with the new physics which are conserved to a good accuracy or due to some accidental scales mismatch. A celebrated example is our own proton which does make ∼ 20% of all the cold matter. Its longevity ( τ ( proton ) ≥ 10 38 seconds), is naturally explained GUT - grand unified theory. It reflects the large ratio M Gut /m proton /sim ( ) ( ) 10 16 in the lifetime predicted; τ ( p ) ∼ 1 /m p ( )( M Gut /m p ( ) ( )) 4 . There are however many cases of well motivated BSM scenarios with no new long lived particles. A well known case involves a heavy right handed Majorana neutrino which is an SU (2) L × U (1) singlet. It naturally explains the lightness of the ordinary left handed neutrinos via the see saw mechanism where : m light ν ( ) ≈ m /M 2 D R . With m light ν ( ) ≈ 0 003 , -1 eV and a Dirac mass m D ≈ fewMeV -100 GeV , the right handed neutrino mass M R can range from 10 6 GeV to 10 14 GeV . A stable ν R would definitely exceed all the S matrix inspired bounds. However the Yukawa coupling of the Higgs to ν R and ν L , Y ν ¯ R Hν light ( ) which through the vev 〈 H 〉 = 250 GeV supplies Dirac mass m D = Y 〈 H 〉 , automatically generates a fast ν R → H + ν left decay. Also no heavy particle stable arises at the P.Q. ( Peccei Qhinn ) scale of ≈ 10 10 GeV , where the broken PQ symmetry generates the putative axion or in left right symmetric schemes where a new right handed scale M W ( R ) ≥≥ M W ( L ) nor in a many composite dynamical models. The option that we discussed at length is to drastically enhance the annihilation rate by endowing the X particles with new interactions. While new 'dark photon' generated forces only slightly relax the bounds non abelian confining interactions drastically improve the situation. At the confining phase transitions the X particles form ¯ X -X pairs connected with analogs of the chromoelectrix fluxon/string in QCD and a late efficient annihilation stage then results. The simple 'SIMP' type approach of having the X carry ordinary color has to face he difficulty of forming super heavy isotopes. The ∼ 0 3 . GeV mass scale of QCD and the ≈ 0 3 . TeV scale of E.W symmetry breaking are well known. On the high end new physics regularizing gravity is expected at or before the Planck mass and GUT theories unifying the SU (3) XSU (2) XU (1) gauge groups and the quarks and leptons of the SM at a high scale of ≈ 10 16 GeV are very attractive. A fundamental question is wether between these two ends we have a huge gap or 'desert' or many intermediate scales associated with new physics in between. Without a breakthrough in accelerator technology we will not be able to directly explore this experimentally. The LHC discovery of a 'light' 125 GeV Higgs with no indication of an associated supper-symmetry or new dynamics makes the desert scenario (at least for the next decades of energy) more credible. What our above discussion suggests is that while an extended desert is not mandatory it may be quite natural. ## Acknowledgments I would like to acknowledge N. Arkani-Hamed, K. Blum, Z. Chacko, P. Saraswat, G. Stermann and M. Zaldarriaga for helpful discussions. - [1] A.D. Dolgov and Ya.B. Zeldovich Rev. Mod. Phys 53, 1 (1981). - [2] E. WW. Kolb and M. S. Turner The early universe Addison-Wesley, Redwood city, 1989 - [3] P.A.R. Ade et al. (BICEP2 Collaboration) Detection of B-mode polarization at degree angular scales by BICEP2, Phys. Rev. Lett. 112 (241101-23) 2014. - [4] R. Brout, F. Englert, J. M. Frere, E. Gunzig, P. Nardone, C. Truffin and P. Spindel, Nucl. Phys. B 170 , 228 (1980). - [5] K. Greist and M. Kamionokowski Phys. Rev. Lett 64 , 615 (1990). - [6] A. H. Guth and S. H. H. Tye, Phys. Rev. Lett. 44 , 631 (1980). [Erratum-ibid. 44 , 963 (1980)]. - [7] A. K. Drukier and S. Nussinov, Phys. Rev. Lett. 49 , 102 (1982). - [8] T. W. B. Kibble, J. Phys. A 9 , 1387 (1976). - [9] R. N. Mohapatra and J. C. Pati, Phys. Rev. D 11 , 566 (1975) - [10] G. Senjanovic and R. N. Mohapatra, Phys. Rev. D 12 , 1502 (1975). - [11] A. Esmaili and P. D. Serpico, JCAP 1311 , 054 (2013) [arXiv:1308.1105 [hep-ph]]. - [12] A. Bhattacharya, M. H. Reno and I. Sarcevic, JHEP 1406 , 110 (2014) [arXiv:1403.1862 [hep-ph]]. - [13] G. Bella et-al in preparation. Refs. [11, 12, 13] try to attribute the PeV neutrinos in the ICECUBE experiment to the decay of a heavy D.M. M X ( ) ≈ 5 PeV particle. - [14] N. Arkani-Hamed, D. P. Finkbeiner, T. R. Slatyer and N. Weiner, Phys. Rev. D 79 , 015014 (2009) [arXiv:0810.0713 [hep-ph]] - [15] J. D. Bjorken, R. Essig, P. Schuster and N. Toro, Phys. Rev. D 80 , 075018 (2009) [arXiv:0906.05] - [16] N. Arkani-Hamed, S. Dimopoulos, G. F. Giudice and A. Romanino, Nucl. Phys. B 709 , 3 (2005) [hep-ph/0409232]. - [17] H.Bethe and E.Salpeter the quantum theory of 0ne and two electron atoms Springer -Verlag (1960) - [18] E. Witten, Nucl. Phys. B 160 , 57 (1979). - [19] J. Kang, M. A. Luty and S. Nasri, JHEP 0809 , 086 (2008) [hep-ph/0611322]. - [20] J. Kang and M. A. Luty, JHEP 0911 , 065 (2009) [arXiv:0805.4642 [hep-ph]]. - [21] C. Jacoby and S. Nussinov, arXiv:0712.2681 [hep-ph]. - [22] S. Nussinov and C. Jacoby, arXiv:0907.4932 [hep-ph]. - [23] E.D. Carlson, M.E. Machacek and L.J. Hall, Astrophys. J. 398, 43 (1992). - [24] Y. Hochberg, E. Kuflik, T. Volansky and J. G. Wacker, arXiv:1402.5143 [hep-ph]. - [25] K. N. Abazajian, Phys. Rev. Lett. 112 , 161303 (2014) [arXiv:1403.0954 [astro-ph.CO]]. - [26] For completeness we briefly sketch the proof of this. A t-channel exchange of a particle with mass µ contributes to the scattering amplitude f ( k, x ) a term 1 / µ ( 2 + ) = 1 ( t / µ 2 +2 k 2 (1 -x )) = µ -2 × 1 / (2 k 2 (1 -x /µ ) 2 +1) with x = cos( θ ) and ∫ 1 -1 P l ( x µ ) -2 × 1 / (2( k 2 (1 -x / µ ) ( 2 ) + 1) is the corresponding l th partial wave. For k 2 /lessmuch µ 2 , we expand the integrand in a convergent geometric series: ∑ n ( -1) n (2 k 2 (1 -x /µ ) ) 2 n . The completeness and orthogonality properties of the P l ( x ) imply that the n = l term is the first making a non-vanishing contribution to a l ( k ), which is actually: (2 k / µ 2 ( 2 ) l × I ( ) l with I ( ) = 2 l ∫ 1 0 P l ( x x ) l . Substituting the Rodrigez formula: P l ( x ) = 1 / l ( !2 ) l d n / (( dx ) n )( x 2 -1) l and integrating l times by part and canceling the l ! we find that I ( ) = 2 l -l ∫ 1 -1 ( x +1) (1 l -x ) l ≤ 2 -l . Finally, we have a l ( k ) ≤ ( k / µ 2 ( 2 ) l and σ l ( k ) ≤ ( k /µ 2 2 ) 2 l . - [27] An example from hadron physics is the ρ resonance at 760 MeV (playing the role of R) in the ππ channel, the analogs of the ¯ XX particles here. While the 160 MeV broad resonance dominates ππ scattering for W = 600 -900 MeV the annihilation into the light e + e -pair has a branching of ∼ 10 -5 due to the weak em coupling and the need to exchange a virtual photon in the s channel which is off shell by m ρ ( ) 2 . - [28] one example among many is an X particle with M X ( ) ∼ 5 PeV and lifetime of 10 28 s the decays of which generate the Ice-Cube PeV neutrinos. [11-13] - [29] The conflict between confinement and S matrix has been particularly emphasized by the late G. Preparata - [30] This intuitive picture was pointed out to me by G. Stermann FIG. 1: (a) A resonance of a bound state in the s-channel (b) Heavy particle exchange in the t-channel ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1157v1-figure-562b1b49-8d36-41d4-8637-fe5a09ac1fcb.jpg) FIG. 2: An 'elementary' vector boson exchange in the s-channel ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1157v1-figure-69dfc660-7e8a-4c93-9b11-398efc31529c.jpg) FIG. 3: The range for scattering and the smaller range for annihilation ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1157v1-figure-0d95cf1b-74bb-40d0-b4e3-73de4f14ffe5.jpg) FIG. 4: The highly suppressed decay of the g g ′ ′ glueball into two photons via double box diagram ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1157v1-figure-50613253-7b06-4ce9-a40c-6f17591558f0.jpg)
null
[ "Shmuel Nussinov" ]
2014-08-06T01:31:46+00:00
2014-08-06T01:31:46+00:00
[ "hep-ph", "astro-ph.HE" ]
Early inflation induced gravity waves can restrict Astro-Particle physics
In this paper, we discuss limits on various astro-particle scenarios if the scale \textit{and} the reheat temperature of the last relevant inflation were very high. While the observed "B" like pattern of polarizations of the CMB suggest a very high ($\ge 10^{16}\ GeV$) scale of a primordial (which motivated this work initially) and may reflect effects of dust, we believe that addressing these issues is nonetheless very useful. We recall the potential difficulties with various topological defects - monopoles, strings and domain walls generated at the SSB (spontaneous symmetry breaking) of various gauge symmetries. The main part of the paper is devoted to discussing difficulties with long-lived heavy particles, which could be dark matter but cannot efficiently annihilate to the required residual density because of basic S-Matrix unitarity/analyticity limits. We indicate in simple terms yet in some detail how the WIMP miracle occurs at $M(X)\sim{TeV}$ and how the axiomatic upper bound presently updated to $M(X) \le{110 TeV}$ was originally derived by Greist and Kamionokowski. We also argue that generically we expect the stronger $M(X)\le{20\ GeV}$ bound to hold. We then elaborate on the pure particle physics approaches aiming to enhance the annihilation and evade the bounds. We find that the only and in fact very satisfactory way of doing this requires endowing the particles with gauge interactions with a confinement scale lower than $M(X)$. We also comment on models with light $O(KeV)$ dark matter, which was supposed to be frozen in via out-of equilibrium processes so as to have the right relic densities pointing out that in many such cases \textit{very} low reheat temperatures are indeed required and speculate on the large desert scenario of particle physics. Most of what we discuss is not new but was not presented in a coherent fashion.
1408.1158v4
## A Possible Solution to the B → ππ Puzzle Using the Principle of Maximum Conformality Cong-Feng Qiao ∗ and Rui-Lin Zhu † School of Physics, University of Chinese Academy of Sciences, Beijing 100049, P.R. China and CAS Center for Excellence in Particle Physics, Institute of High Energy Physics, Chinese Academy of Sciences, Beijing 100049, P.R. China ## Xing-Gang Wu ‡ Department of Physics, Chongqing University, Chongqing 401331, P.R. China ## Stanley J. Brodsky § SLAC National Accelerator Laboratory, Stanford University, Stanford, CA 94309, USA (Dated: July 21, 2015) The measured B d → π π 0 0 branching fraction deviates significantly from conventional QCD predictions, a puzzle which has persisted for more than 10 years. This may be a hint of new physics beyond the Standard Model; however, as we shall show in this paper, the pQCD prediction is highly sensitive to the choice of the renormalization scales which enter the decay amplitude. In the present paper, we show that the renormalization scale uncertainties for B → ππ can be greatly reduced by applying the Principle of Maximum Conformality (PMC), and more precise predictions for CPaveraged branching ratios B ( B → ππ ) can be achieved. Combining the errors in quadrature, we obtain B ( B d → π π 0 0 ) | PMC = ( 0 98 . +0 44 . -0 31 . ) × 10 -6 by using the light-front holographic low-energy model for the running coupling. All of the CP-averaged B → ππ branching fractions predicted by the PMC are consistent with the Particle Data Group average values and the recent Belle data. Thus, the PMC provides a possible solution for the B d → π π 0 0 puzzle. PACS numbers: 13.25.Hw, 12.38.Bx, 12.38.Cy B -meson hadronic two-body decays contain a wealth of information on the physics underlying charge-parity (CP) violation. Measurements of the B -meson two-body branching ratios and their CP asymmetries provide key information on the Cabibbo-Kobayashi-Maskawa (CKM) matrix elements. One challenge which has puzzled the theoretical physics community for more than 10 years is that the measured branching ratio [1-3] for the decay of the B meson to neutral pion pairs B d → π π 0 0 is significantly larger than the theoretical predictions based on the QCD factorization approach [4, 5], a perturbative QCD approach [6], and an Isospin analysis [7]. Beneke et al. (BBNS) [8] have developed a systematic QCD analysis of B → ππ based on the factorization of long-distance and short distance dynamics. The BBNS predictions for the branching ratios of B d → π + π -and B ± → π ± π 0 are consistent with CLEO, BaBar, and Belle data. However, the BBNS prediction for the B d → π π 0 0 branching ratio deviates significantly from measurements [3]. There have been suggestions on how to resolve this puzzle and to obtain a consistent explanation of all B → ππ channels within the same framework. In particular, Beneke et al. [9] have noted that the one-loop QCD corrections to the color-suppressed hard-spectator scattering amplitude α 2 ( ππ ) could be important, as seen from their calculation of the vertex corrections up to two-loop QCD corrections [4]. However, even after including those higher-order QCD corrections, the discrepancy has remained. The large K factor, K = B NLO / B LO , with B LO NLO / corresponding to the LO/NLO-terms in the branching ratio B , implied by the higher-order corrections to the branching ratio of B d → π π 0 0 , as well as the large renormalization scale uncertainties, have called into question the reliability of pQCD calculations. In the conventional treatment, the renormalization scale is usually fixed to be the typical momentum flow of the process, or one that eliminates large logarithms in order to make the prediction stable under scale changes. This is simply a 'guess', and the scale ambiguities and scheme-dependence persist at any fixed order. Thus, if one uses conventional scale setting for an α n s -order pQCD prediction, the scale ambiguity is not a α n +1 s -order effect, it exists for any known perturbative terms [10]. According to renormalization group invariance , a valid prediction for a physical observable should be independent of theoretical conventions, such as the choices of the renormalization scheme and the renormalization scale. This important principle is satisfied by the Principle of Maximum Conformality (PMC) [11-13]. The running behavior of the coupling constant is controlled via the renormalization group equation. Conversely, the knowledge of the { β i } -terms in the perturbative series can be used to determine the optimal scale of a particular process; this is the main goal of the PMC. The PMC is a generalization of the well-known Brodsky-Lepage- FIG. 1: Typical Feynman diagrams for the B → ππ decays, which are sizable and correspond to α 1 , α 2 , α 4 (or α 6 ), respectively. µ r,V , µ r,H and µ r,P are renormalization scales for these diagrams; they are different in general. Other Feynman diagrams can be obtained by shifting one of the gluon endpoints to different quark lines. The vertex ' ⊗⊗ ' denotes the insertion of a 4-fermion operator Q i . And the big dot stands for the renormalized gluon propagator whose light-quark loop determines the β 0 -terms and hence the optimal scale for the running behavior of the QCD coupling constant. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1158v4-figure-df5ba860-d364-4991-9c83-d1753655650e.jpg) Mackenzie (BLM) procedure to all orders [14] 1 . If one fixes the renormalization scale of the pQCD series using the PMC, all non-conformal { β i } -terms in the perturbative expansion series are resummed into the running coupling, and one obtains a unique, scale-fixed, schemeindependent prediction at any finite order. renormalization scale ambiguity and achieving an accurate pQCD prediction which is independent of theoretical conventions. In fact, as we shall show, the PMC can provide a solution to the B → ππ puzzle. The effective weak Hamiltonian [15] $$\underset { \infty } { \text{cays,\,} } \text{$\mathcal{H}_{eff}=\frac{G_{F}$} \sum_{p=u,c} \lambda_{p} \left[ C_{1}Q_{1}^{p}+C_{2}Q_{2}^{p}+\sum_{i=3\dots6}C_{i}Q_{i} \right] \,,\, (1)$}$$ where λ p = V ∗ pd V pb , Q µ ,µ i ( f r ) are local four-fermion interaction operators and the C i ( µ , µ f r ) are the corresponding short-distance Wilson coefficients at the renormalization scale µ r and the factorization scale µ f ∼ m b . Applying the QCD factorization, the amplitude for B → ππ decay, assuming the dominance of valence Fock states for both the B meson and the final-state pions, can be expressed as $$\langle \pi \pi | \mathcal { H } _ { \text{eff} } | \bar { B } \rangle = \frac { G _ { F } } { \sqrt { 2 } } \sum _ { p = u, c } \lambda _ { p } \langle \pi \pi | \mathcal { T } _ { p } | \bar { B } \rangle \, \quad ( 2 )$$ In the following, we will apply the PMC procedure to the BBNS analysis with the goal of eliminating the 1 The BLM approach of using the n f -terms as a guide to resum the series through the renormalization group equation of α s cannot where the right-hand operator that creates the weak transition in the Standard Model is be unambiguously extended to high orders. $$\mathcal { T } _ { p } \ = \ \alpha _ { 1 } ^ { p } ( \pi \pi ) ( \bar { u } b ) _ { V - A } \otimes ( \bar { d } u ) _ { V - A } + \alpha _ { 2 } ^ { p } ( \pi \pi ) ( \bar { d } b ) _ { V - A } \otimes ( \bar { u } u ) _ { V - A } + \alpha _ { 3 } ( \pi \pi ) ( \bar { d } b ) _ { V - A } \otimes ( \bar { q } q ) _ { V - A } + \\ \alpha _ { 4 } ^ { p } ( \pi \pi ) ( \bar { q } b ) _ { V - A } \otimes ( \bar { d } q ) _ { V - A } + \alpha _ { 5 } ( \pi \pi ) ( \bar { d } b ) _ { V - A } \otimes ( \bar { q } q ) _ { V + A } + \alpha _ { 6 } ^ { p } ( \pi \pi ) ( - 2 ) ( \bar { q } b ) _ { S - P } \otimes ( \bar { d } q ) _ { S + P } \,.$$ A summation over q = u, d is implied in this equation, and the required currents are (¯ qq ′ ) V ± A = ¯ qγ µ (1 ± γ 5 ) q ′ and (¯ qq ′ ) S ± P = ¯(1 q ± γ 5 ) q ′ . The relations among the Wilson coefficients C i and α ( p ) j can be found in Ref. [16]. The branching ratio for B → ππ is given by B ( ¯ B → ππ ) = τ B |A ( ¯ B → ππ ) | 2 S/ (16 πm B ), where the symmetry parameter S = 1 2! for / π π 0 0 , and S = 1 for π + π -or π ± π 0 , respectively. Typical Feynman diagrams which provide non-zero contributions to the B → ππ decays and correspond to α 1 , α 2 , α 4 and α 6 , respectively, are illustrated in Fig.(1). The resulting amplitudes under the MS-scheme for B → ππ can be written as [8] $$\mathcal { A } ( \bar { B } _ { 0 } \to \pi ^ { + } \pi ^ { - } ) & = i \frac { G _ { F } } { \sqrt { 2 } } m _ { B } ^ { 2 } f _ { + } ^ { B \to \pi } ( 0 ) f _ { \pi } | \lambda _ { c } | \{ R _ { b } e ^ { - i \gamma } [ \alpha _ { 1 } ^ { u } + \alpha _ { 4 } ^ { u } + \alpha _ { 6 } ^ { u } r _ { \chi } ] - [ \alpha _ { 4 } ^ { c } + \alpha _ { 6 } ^ { c } r _ { \chi } ] \} \,, \\ \mathcal { A } ( \bar { B } _ { 0 } \to \pi ^ { 0 } \pi ^ { ) } & = i \frac { G _ { F } } { \sqrt { 2 } } m _ { B } ^ { 2 } f _ { + } ^ { B \to \pi } ( 0 ) f _ { \pi } | \lambda _ { c } | \{ R _ { b } e ^ { - i \gamma } [ - \alpha _ { 2 } ^ { u } + \alpha _ { 4 } ^ { u } + \alpha _ { 6 } ^ { u } r _ { \chi } ] - [ \alpha _ { 4 } ^ { c } + \alpha _ { 6 } ^ { c } r _ { \chi } ] \} \,, \\ \mathcal { A } ( B ^ { - } \to \pi ^ { - } \pi ^ { ) } & = i \frac { G _ { F } } { \sqrt { 2 } } m _ { B } ^ { 2 } f _ { + } ^ { B \to \pi } ( 0 ) f _ { \pi } | \lambda _ { c } | ( R _ { b } / \sqrt { 2 } ) e ^ { - i \gamma } [ \alpha _ { 1 } ^ { u } + \alpha _ { 2 } ^ { u } ] \,,$$ where R b = | V ub V ∗ ud | / V | cb V ∗ cd | , and γ is the V ∗ ub phase. The coefficient r χ ( µ r ) = 2 m / m 2 π [ ¯ b ( µ r )( ¯ m u ( µ r ) + ¯ m µ d ( r ))], which equals to 1 18 . when setting the scale µ r = m b [8]. Here f π ( f B ) is the pion ( B -meson) decay constant, and f B → π + (0) is the B → π transition form factor at the zero momentum transfer. The CP conjugate amplitudes are obtained from the above by replacing e -iγ to e + iγ . The topological tree amplitude α 1 expresses the contribution when the final (¯ ud )-pair (produced from the virtual W -) forms the pion directly. The tree amplitude α 2 expresses the contribution obtained when the final (¯ ud )-pair from W -separates and one of them forms a pion by coalescing with the spectator quark. The amplitudes α i (i=3 to 6) are topological penguin amplitudes. Note that when the spectator quark combines with one of the quarks from W -to form a pion, a color-suppressed factor ∼ 1 /N c emerges. Thus, the amplitude α 1 provides the dominant contributions relative to the colorsuppressed α 2 4 6 , , . However this color suppression can effectively disappear when one includes higher-order gluonic interactions to α 2 4 6 , , ; their contributions thus can be sizable. At present, consistent pQCD calculations of the tree amplitudes α 1 2 , and their vertex corrections have been evaluated with two-loop QCD corrections. The oneloop QCD correction to the hard spectator scattering interaction has been done by Ref.[4]. All of them are up to O ( α 2 s ) level. We rewrite the contributions in the following convenient form: $$\alpha _ { 1 } ^ { p } & \, = \, C _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { 1 } { N _ { c } } \left [ C _ { F } C _ { 2 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) \left \{ \frac { 1 } { C _ { F } } + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } \right ) ^ { 2 } V _ { 2 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { 4 C _ { F } C _ { 2 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) \pi ^ { 2 } } { N _ { c } } \left \{ \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init} } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) + \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init} } ) } { 4 \pi } \right ) ^ { 2 } \beta _ { 0 } \tilde { V } _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) \right \} \\ & \, + \left ( \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init} } ) } { 4 \pi } \right ) ^ { 2 } H _ { 2 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) \right ], \\ & \,.. \ 1 \ [ \ \.. \ \left ( \ 1 \ \ \alpha _ { s } ( \mu _ { r, H } ^ { \text{init} } ) \ \.. \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ $$& + \left [ \overbrace { 4 \pi } \right ] \int _ { 2 \langle \mu _ { f }, \mu _ { r, H } \rangle } ^ { N _ { 2 } \langle \mu _ { f }, \mu _ { r, H } \rangle } \right ], \\ \alpha _ { 2 } ^ { 2 } & = \, C _ { 2 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle + \frac { 1 } { N _ { c } } \left [ C _ { F } C _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle } \left \{ \frac { 1 } { C _ { F } } + \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} \rangle } ) } { 4 \pi } V _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle + \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} \rangle } ) } { 4 \pi } \right ) ^ { 2 } \beta _ { 0 } \tilde { V } _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle } \right \} \\ & \quad + \left ( \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} \rangle } ) } { 4 \pi } \right ) ^ { 2 } V _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle + \frac { 4 C _ { F } C _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} \rangle } ) ^ { 2 } } { N _ { c } } \left \{ \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} ) } { 4 \pi } H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} ) + \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} ) } } { 4 \pi } \right ) ^ { 2 } \beta _ { 0 } \tilde { H } _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} ) } \right \} \\ & \quad + \left ( \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init}} ) } { 4 \pi } \right ) ^ { 2 } H _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init}} ) \right ].$$ $$<_JavaScript_> )} (5) )} (6)$$ The penguin diagrams provide small contributions to the amplitudes, which are $$\mu _ { 4 } ^ { p } \, = \, & C _ { 4 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { C _ { 3 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) } { N _ { c } } \left [ 1 + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } C _ { F } V _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } \frac { C _ { F } } { N _ { c } } P _ { \pi, 2 } ^ { p } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) \right ] \\ & + \frac { 4 C _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) C _ { F } \pi ^ { 2 } } { N _ { c } ^ { 2 } } \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \text{init} } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ), \\ & \varepsilon \, \iota \,.. \,., \iint \, \Upsilon \quad \varepsilon \, \iota \,., \iint \, \varsigma \, +$$ $$\alpha _ { 6 } ^ { p } \, = \, C _ { 6 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { \lambda } { N _ { c } } \left [ 1 + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } C _ { F } ( - 6 ) \, + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } \frac { C _ { F } } { N _ { c } } P _ { \pi, 3 } ^ { p } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) \right ].$$ $$& + \frac { 4 C _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { \min } ) C _ { F } \pi ^ { c } } { N _ { c } ^ { 2 } } \frac { \alpha _ { s } ( \mu _ { r, H } ^ { \min } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ), \\ = & \ C _ { 6 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { C _ { 5 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) } { N _ { c } } \left [ 1 + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } C _ { F } ( - 6 ) + \frac { \alpha _ { s } ( \mu _ { r, V } ^ { \text{init} } ) } { 4 \pi } \frac { C _ { F } } { N _ { c } } P _ { \pi, 3 } ^ { p } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) \right ].$$ In these equations, the factorization scale dependence and the renormalization scale dependence are explicitly written in the Wilson coefficients and the functions V 1 , ˜ , V 1 V 2 , V 3 , H 1 , ˜ H 1 , H 2 , H 3 , P p π, 2 and P p π, 3 , where µ init r,H and µ init r,V stand for the initial choice of renormalization scales. The corresponding expressions for the functions with explicit renormalization and factorization scale dependence can be found in Eqs. (16), (19), (26), and (30) of Ref. [5]. Here β 0 = (11 N c -2 n f ) / 3, V i ( ˜ V i ) denotes the vertex corrections, and H i ( ˜ H i ) denotes the hard spectator scattering contributions. The β 0 -independent term V 2(3) and H 2(3) can be obtained in Eqs. (42-47) of Ref. [4] by Beneke, Huber and Li. The Wilson coefficients are contained implicitly in the terms V 2(3) and H 2(3) . The initial scales are set to µ init r,P = µ init r,V . The quantity P p π,n refers to the contribution from the pion twistn light-cone distribution amplitude, the expressions of which can be found in Eqs. (49) and (54) of Ref. [16]. In the calculation both twist-2 and twist-3 terms are taken into consideration. Note that the Wilson coefficients C 1 and C 2 are different from the definition of Ref. [15], where the labels 1 and 2 are interchanged. amplitudes into β 0 -dependent nonconformal and β 0 -independent conformal parts, respectively. There are two typical momentum flows for the process; thus, we have assigned two arbitrary initial scales µ init r,V and µ init r,H for the vertex contributions and hard spectator scattering contributions. In the case of conventional scale setting, the scales are fixed to be their typical momentum transfers, i.e. µ r,V ≡ µ init r,V ∼ m b and µ r,H ≡ µ init r,H ∼ √ Λ QCD m b . In order to apply the PMC, we have divided the After applying the standard PMC procedures, all nonconformal β 0 -terms are resummed into the strong running coupling, and the amplitudes become $$\alpha _ { 1 } ^ { p, P M C } & \, = \, C _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { 1 } { N _ { c } } \left [ C _ { 2 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + C _ { 2 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) C _ { F } \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } \, V _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \left ( \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } \right ) ^ { 2 } V _ { 2 } ^ { \text{f} } ( \mu _ { f }, \mu _ { r, V } ^ { \text{f} } ) \\ & \, + \frac { 4 C _ { 2 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) C _ { F } \pi ^ { 2 } } { N _ { c } } \frac { \alpha _ { s } ( Q _ { 1 } ^ { H } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) + \left ( \frac { \alpha _ { s } ( Q _ { 1 } ^ { H } ) } { 4 \pi } \right ) ^ { 2 } H _ { 2 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) \right ],$$ $$\alpha _ { 2 } ^ { p, P M C } & \, = \, C _ { 2 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \frac { 1 } { N _ { c } } \left [ C _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + C _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) C _ { F } \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } \, V _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) + \left ( \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } \right ) ^ { 2 } V _ { 3 } ^ { \text{prime} } ( \mu _ { f }, \mu _ { r, V } ^ { \text{prime} } ) \\ & \, + \frac { 4 C _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) C _ { F } \pi ^ { 2 } } { N _ { c } } \frac { \alpha _ { s } ( Q _ { 1 } ^ { H } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) + \left ( \frac { \alpha _ { s } ( Q _ { 1 } ^ { H } ) } { 4 \pi } \right ) ^ { 2 } H _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) \right ],$$ $$\alpha _ { 4 } ^ { p, P M C } \, & = \, C _ { 4 } ( \mu _ { f }, \mu _ { r, V } ^ { i n t } ) + \frac { C _ { 3 } ( \mu _ { f }, \mu _ { r, V } ^ { i n t } ) } { N _ { c } } \left [ 1 + \frac { \alpha _ { s } ( Q ^ { V } _ { 1 } ) } { 4 \pi } C _ { F } V _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { i n t } ) + \frac { \alpha _ { s } ( Q ^ { Y } _ { 1 } ) } { 4 \pi } \frac { C _ { F } } { N _ { c } } P _ { \pi, 2 } ^ { p } ( \mu _ { f }, \mu _ { r, V } ^ { i n t } ) \right ] \\ & \quad + \frac { 4 C _ { 3 } ( \mu _ { f }, \mu _ { r, H } ^ { i n t } ) C _ { F } \pi ^ { 2 } } { N _ { c } ^ { 2 } } \frac { \alpha _ { s } ( Q ^ { H } _ { 1 } ) } { 4 \pi } \, H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { i n t } ), \\ _ { \dots \, - \, - \, } \, & \quad C _ { \cdot \, ( n \cdot \, n ^ { i n t } ) \, \lceil \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, \bigoplus \, C _ { \cdot \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \, - \}$$ $$\alpha _ { 6 } ^ { p, P M C } \, = \, C _ { 6 } ( \mu _ { f }, \mu _ { r, V } ^ { i n i t } ) + \frac { C _ { 5 } ( \mu _ { f }, \mu _ { r, V } ^ { i n i t } ) } { N _ { c } } \left [ 1 + \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } C _ { F } ( - 6 ) + \frac { \alpha _ { s } ( Q _ { 1 } ^ { V } ) } { 4 \pi } \frac { C _ { F } } { N _ { c } } P _ { \pi, 3 } ^ { p } ( \mu _ { f }, \mu _ { r, V } ^ { i n i t } ) \right ],$$ $$Q _ { 1 } ^ { V } \ = \ \mu _ { r, V } ^ { \text{init} } \exp \left [ - \frac { \tilde { V } _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) } { 2 V _ { 1 } ( \mu _ { f }, \mu _ { r, V } ^ { \text{init} } ) } \right ], \quad ( 1 3 ) \quad \text{pres} \\ \quad \mu _ { \infty } ^ { \text{me} }$$ $$Q _ { 1 } ^ { H } \ = \ \mu _ { r, H } ^ { \text{init} } \exp \tilde { \left [ } - \frac { \tilde { H } _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) } { 2 H _ { 1 } ( \mu _ { f }, \mu _ { r, H } ^ { \text{init} } ) } \right ] \quad ( 1 4 ) \quad V _ { 3 } ( \mu \\ \quad \text{ uses}$$ denote the separate PMC scales for the vertex contribution and the hard spectator scattering contribution, respectively. For the penguin amplitude, there is no β -terms to determine its PMC scale, we take it as Q V 1 , the same as the scale of the vertex amplitude, since both types of diagrams have similar space-like momentum transfers. There is a residual scale dependence due to unknown higher-order { β i } -terms, which however is highly suppressed [11, 12]. Both V 1 and ˜ V 1 have an imaginary part. We use the real part to set the PMC scale Q V 1 . Thus the function V ′ 2(3) has the same expression of V 2(3) except for a non-resummed β 0 -related imaginary part, namely V ′ 3 ( µ , µ f init r,V ) = V 2 ( µ , µ f init r,V ) + C C F 2 ( µ , µ f init r,V ) β 0 Im ˜ ( V 1 µ , µ f init r,V ) and V ′ 2 ( µ , µ f init r,V ) = V 3 ( µ , µ f init r,V )+ C C F 1 ( µ , µ f init r,V ) β 0 Im ˜ ( V 1 µ , µ f init r,V ). The values of the resulting PMC scales are Q V 1 glyph[similarequal] 1 59 . GeV and Q H 1 glyph[similarequal] 0 75 . GeV; they are nearly independent of the initial scales µ init r,V and µ init r,H . One should note that the largest uncertainty of Q H 1 comes from the chiral enhancement parameter r χ , which is implicit in H 1 and ˜ H 1 . If the value of r χ goes up to 1 42 [5], the PMC scale . Q H 1 increases to 0 90 GeV. . A major problem for the present process is that the PMC scale Q H 1 is close to Λ QCD in the MS scheme. To avoid this low-scale problem, we have utilized commen- where surate scale relations (CSR) [17, 18] to transform the MS running coupling to an effective charge defined from a measured physical process. In particular the coupling α g1 s ( Q ) defined from the Bjorken sum rule is very well measured. To be consistent with the present treatment of B → ππ , we have adopted the leading-order CSR, which gives α MS s (0 75GeV) = . α g1 s (2 04GeV) . 2 . Furthermore, we have adopted the light-front holography model proposed in Ref. [20] to obtain an estimate of α g1 s ( Q ). A recent comparison of the light-front holographic prediction for α g1 s ( Q ) with JLAB data can be found in Ref.[21]. This nonperturbative approach is based on the lightfront holographic mapping of classical gravity in anti-de Sitter space, modified by a positive-sign dilaton background. It leads to a reasonable nonperturbative effective coupling. The confinement potential and light-front Schr¨dinger equation derived from this approach also aco counts well for the spectroscopy and dynamics of lightquark hadrons. Other input parameters are chosen as [1]: the B -meson lifetime τ B + = 1 641ps and . τ B d = 1 519ps; . f B = 0 194 GeV and . f π = 0 130 GeV; for the CKM pa-. rameters, we use γ = 68 6 , . 0 | V cb | = 0 041, . | V ∗ cd | = 0 230 . and | V ub | = 4 15 . × 10 -3 . The b -quark pole mass m b = 4 8 . GeV, and the c -quark pole mass m c = 1 5 GeV. The . n -th moment of the B meson's light-front distribution amplitude is adopted as λ B = 0 20 . +0 04 . -0 02 . , λ 1 = -2 2 . and λ 2 = 11 [4]. The second Gegenbauer moment of the pion leading-twist distribution amplitude is taken as a π 2 = 0 2 . ± 0 1 and the . B → π form factor at zero momentum transfer is taken as f B → π + (0) = 0 25 . +0 03 . -0 03 . [22], which is estimated by a next-to-leading order light-cone sum rules calculation. By varying a π 2 , both the form factor f B → π + (0) and the branching ratios shall be altered simultaneously, and the form factor f B → π + (0) dominant the errors to the branching ratios; so, for convenience, we treat the errors caused by a π 2 and f B → π + (0) as a whole and simply call it the B → π form factor error. As usual, we fix the factorization scale µ f = µ init r,H or µ f = µ init r,V , and vary the initial renormalization scale µ init r,V ∈ [1 / 2 m , b 2 m b ] and µ init r,H ∈ [1GeV 2GeV] for ana-, lyzing the renormalization scale uncertainty. In general, the factorization and the renormalization scales are different, thus one has to determine the full factorization and renormalization scale dependent expressions for all of the amplitudes; such full-scale dependence can be derived by using Eqs.(9,10,11,12) via a general scale translation [10]. We present our predictions for the CP-averaged B → ππ in Tables I and II. The CP-conjugate branching ratios are obtained from the CP-conjugate amplitudes following the same procedures. In Table I, we list two main 2 It is noted that by using the known next-to-leading order CSR, the final branching ratios are altered by less than ± 5%. errors from the non-perturbative B → π form factor and the B -meson moment; whereas in Table II, the errors are the squared averages of those from the B → π form factor, the B -meson moment, the chiral enhancement parameter r χ and the factorization scale, respectively. An increased branching ratio is observed after PMC scale setting. This indicates that the resummation of the nonconformal series is important. Ref. [23] utilizes a similar resummation based on the large β 0 -approximation 3 ; the resulting predictions for the ( B ± → π ± π 0 ) branching ratio, although not exactly scheme-independent, are found to be numerically consistent with the PMC predictions within errors. If one assumes conventional scale setting, there are large renormalization-scale uncertainties, especially for the color-suppressed topologically-dominated progresses. In contrast, the ambiguity from the choice of the initial renormalization scale is greatly suppressed by using the PMC. As shown by Table I, after applying PMC scale setting, the renormalization scale uncertainty is greatly suppressed as required. The application of the PMC thus removes one of the most important uncertainties in the analysis of B decays, and it provides a sound basis for analyzing higher-twist effects and other possible physics corrections. Table II shows that all the CP-averaged branching ratios of B → ππ are consistent with the data after PMC scale-setting. By adding the mentioned errors in quadrature, we obtain B ( B d → π π 0 0 ) | Conv . = ( 0 39 . +0 09 . -0 09 . ) × 10 -6 and B ( B d → π π 0 0 ) | PMC = ( 0 98 . +0 44 . -0 31 . ) × 10 -6 , where 'Conv.' means calculated using conventional scale setting. After PMC scale-setting, the central value for B ( B d → π π 0 0 ) is increased by ∼ 100% in comparison with the conventional result (0 47 . +0 09 . -0 16 . ) × 10 -6 . If we had more accurate non-perturbative parameters such as the B → π form factor etc., we could achieve a more precise pQCD prediction. One can define the ratio R π ( π -π 0 ) = Γ( B -→ π -π 0 ) / d ( Γ( B d → π + glyph[lscript] -¯ ) ν glyph[lscript] /dq 2 | q 2 =0 ) to cut off the uncertainty from the B → π form factors. In the QCD factorization framework, we have R π ( π -π 0 ) = 3 π f 2 2 π | V ud | 2 | α 1 + α 2 | 2 , which leads to R π ( π -π 0 ) | PMC = 0 87 . +0 08 . -0 10 . . This is consistent with the heavy flavor averaging group prediction 0 81 . ± 0 14 [2] within errors. . In summary, we have shown how to use the PMC to eliminate the renormalization scale ambiguity for the QCD running coupling, solving a major problem underlying predictions for B -meson decays. The PMC provides a systematic and unambiguous way to set the renormalization scale for QCD processes. The PMC predictions are scheme-independent, as required by renormalization group invariance, and the resulting conformal se- 3 A detailed comparison of the predictions using the large β 0 -approximation and the PMC can be found in Ref.[24]. TABLE I: Dependence on the renormalization scale of the CP-averaged branching ratio B ( B → ππ ) (in unit 10 -6 ) assuming conventional scale setting and PMC scale setting, where three typical (initial) scales are adopted. The first errors are from the B → π form factor and the second errors are from the B -meson moment. | | Conventional | Conventional | Conventional | PMC | PMC | PMC | |-------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------------------------------| | µ init r,V ; µ init r,H | m b / 2; 1 GeV | m b ; 1 . 5 GeV | 2 m b ; 2 GeV | m b / 2; 1 GeV | m b ; 1 . 5 GeV | 2 m b ; 2 GeV | | B - → π - π 0 B d → π + π - B d → π 0 π 0 | 5 . 32 +1 . 12+0 . 21 - 1 . 00 - 0 . 29 6 . 10 +1 . 72+0 . 20 - 1 . 50 - 0 . 13 0 . 47 +0 . 07+0 . 07 - 0 . 05 - 0 . 10 | 5 . 26 +1 . 11+0 . 19 - 1 . 00 - 0 . 28 5 . 93 +1 . 65+0 . 18 - 1 . 46 - 0 . 13 0 . 39 +0 . 04+0 . 07 - 0 . 03 - 0 . 08 | 5 . 25 +1 . 12+0 . 18 - 1 . 01 - 0 . 27 5 . 82 +1 . 62+0 . 17 - 1 . 41 - 0 . 11 0 . 36 +0 . 03+0 . 06 - 0 . 03 - 0 . 08 | 5 . 89 +1 . 84+0 . 34 - 1 . 65 - 0 . 50 5 . 60 +0 . 99+0 . 50 - 1 . 57 - 0 . 33 0 . 98 +0 . 40+0 . 18 - 0 . 03 - 0 . 23 | 5 . 89 +1 . 84+0 . 34 - 1 . 65 - 0 . 50 5 . 60 +0 . 99+0 . 50 - 1 . 57 - 0 . 33 0 . 98 +0 . 40+0 . 18 - 0 . 03 - 0 . 23 | 5 . 89 +1 . 84+0 . 34 - 1 . 65 - 0 . 50 5 . 60 +0 . 99+0 . 50 - 1 . 57 - 0 . 33 0 . 98 +0 . 40+0 . 18 - 0 . 03 - 0 . 23 | TABLE II: The CP-averaged B ( B → ππ ) (in units of 10 -6 ). The predicted errors are squared averages of those from the B → π form factor, the B -meson moment, the chiral enhancement parameter r χ , and the factorization scale. For the factorization scale error, we take µ f,H = 4 8 . ± 0 8 GeV and . µ f,V = 1 5 . ± 0 3 GeV. The PDG and Belle data are presented . as a comparison. and it is possible that such contributions could yield significant corrections to our present PMC predictions. The uncertainties arising from higher-twist operators is an important theoretical issue which has not been solved. | B r (10 - 6 ) | Data | Conv. | PMC | |-----------------|-------------------------------|-------------------------|-------------------------| | B - → π - π 0 | 5 . 5 ± 0 . 4 [1] | 5 . 26 +1 . 13 - 1 . 04 | 5 . 89 +1 . 25 - 1 . 23 | | B d → π + π - | 5 . 12 ± 0 . 19 [1] | 5 . 93 +1 . 67 - 1 . 47 | 5 . 60 +1 . 19 - 1 . 68 | | B d → π 0 π 0 | 0 . 90 ± 0 . 12 ± 0 . 10 [29] | 0 . 39 +0 . 09 - 0 . 09 | 0 . 98 +0 . 44 - 0 . 31 | ries avoids the divergent renormalon series. Thus the PMC greatly improves the precision of tests of the Standard Model. We have applied the PMC with the goal of solving the B d → π π 0 0 puzzle. After applying the PMC, the non-conformal β 0 -dependent terms are resummed into the running coupling, and we obtain the optimal scales Q V 1 glyph[similarequal] 1 59 GeV and . Q H 1 glyph[similarequal] 0 75 . -0 90 GeV for those . channels. It is found that the uncertainty of Q H 1 come primarily from the chiral enhancement parameter r χ , which accounts for part of the Λ QCD /m b corrections. The analysis of Λ QCD /m b corrections has been performed in Refs.[25, 26], in which some model-dependent parameters have been introduced with large uncertainties. It has been noted that there are potentially non-perturbative resonance effects that lead to highly suppressed contributions to charm-penguin amplitudes, which however do not invalidate the standard picture of QCD factorization [27]. As a rough estimate of such uncertainties, we have set r χ = 1 42 [5], which leads to . Q H 1 = 0 90 GeV. In . comparison with the PMC predictions with Q H 1 = 0 75 . GeV listed in Table II, such a choice of r χ decreases the branching ratio of B d → π π 0 0 ( B -→ π -π 0 ) by about 10% (2%) and increases the branching ratio of B d → π + π -by about 6%. This treatment may not exhibit all of the potentially important power-law effects 4 , 4 For example, higher Fock states in the B wave function containing charm quark pairs can mediate the decay via a CKM-favored b → scc ¯ tree-level transition. Such intrinsic charm contributions can also be phenomenologically significant [28]. The PMC results for B -→ π -π 0 and B d → π + π -are not very different in comparison with traditional predictions, which are already consistent with the data: for B -→ π -π 0 , the difference is about 10%; for B d → π + π -, the difference is less than 10%. However, the situation is quite different for B d → π π 0 0 ,which is dominated by the color-suppressed vertex and powersuppressed penguin diagrams. The difference between the PMC prediction and the traditional prediction is ∼ 100%. However, the PMC prediction agrees with the recent preliminary Belle result B ( B d → π π 0 0 ) = (0 90 . ± 0 12 . ± 0 10) . × 10 -6 (6 7 . σ ) [29]. The PMC prediction will become more precise when the nonconformal terms are determined to higher order in the strong coupling α s . Thus, the PMC provides a possible solution for the B d → π π 0 0 puzzle. As a final remark, we have found that the factorization scale uncertainty brings an additional 5% -10% uncertainty into the pQCD prediction. The factorization scale uncertainty occurs even for a conformal theory; thus the problem of setting the factorization scale reliably at a finite order is unsolved, leading to an additional systematic uncertainty. Recently, it has been found that by setting the renormalization scale using the PMC, one substantially suppresses the factorization scale dependence [30]. This again shows the importance of proper renormalization scale-setting. Acknowledgements: We thank Guido Bell, JianMing Shen, Alexandre Deur, Guy de Teramond and Susan Gardner for helpful discussions. This work was supported in part by the Ministry of Science and Technology of the People's Republic of China under the Grant No.2015CB856703 and by the National Natural Science Foundation of China under the Grant No.11275280, No.11175249 and No.11375200, the Fundamental Research Funds for the Central Universities under the Grant No.CDJZR305513, and the Department of Energy Contract No.DE-AC02-76SF00515. SLAC-PUB-16047. - ∗ Electronic address: [email protected] - † Electronic address: [email protected] - ‡ Electronic address: [email protected] - § Electronic address: [email protected] - [1] J. Beringer et al. [Particle Data Group Collaboration], Phys. Rev. D 86 , 010001 (2012) and 2013 partial update for the 2014 edition. - [2] Y. Amhis et al. [Heavy Flavor Averaging Group Collaboration], arXiv:1207.1158 [hep-ex]. - [3] B. Aubert et al. [BaBar Collaboration], Phys. Rev. Lett. 91 , 241801 (2003); Phys. Rev. Lett. 94 , 181802 (2005); K. Abe et al. [Belle Collaboration], Phys. Rev. Lett. 94 , 181803 (2005). - [4] M. Beneke, T. Huber and X. Q. Li, Nucl. Phys. B 832 , 109 (2010); G. Bell, Nucl. Phys. B 822 , 172 (2009); V. Pilipp, Nucl. Phys. B 794 , 154 (2008); G. Bell, Nucl. Phys. B 795 , 1 (2008); M. Beneke and M. Neubert, Nucl. Phys. B 675 , 333 (2003). - [5] C. N. Burrell and A. R. Williamson, Phys. Rev. D 73 , 114004 (2006). - [6] H. N. Li and S. Mishima, Phys. Rev. D 83 , 034023 (2011); C. D. Lu, K. Ukai and M. Z. Yang, Phys. Rev. D 63 , 074009 (2001); Y. L. Zhang, X. Y. Liu, Y. Y. Fan, S. Cheng and Z. J. Xiao, Phys. Rev D 90 , 014029 (2014). - [7] M. Gronau and D. London, Phys. Rev. Lett. 65 , 3381 (1990); S. Gardner, Phys. Rev. D 72 , 034015 (2005). - [8] M. Beneke, G. Buchalla, M. Neubert and C. T. Sachrajda, Phys. Rev. Lett. 83 , 1914 (1999). - [9] M. Beneke and S. Jager, Nucl. Phys. B 751 , 160 (2006); N. Kivel, JHEP 0705 , 019 (2007); Nucl. Phys. B 768 , 51 (2007). - [10] X. G. Wu, S. J. Brodsky and M. Mojaza, Prog. Part. Nucl. Phys. 72 , 44 (2013). - [11] S. J. Brodsky and X. G. Wu, Phys. Rev. D 85 , 034038 (2012); S. J. Brodsky and X. G. Wu, Phys. Rev. Lett. 109 , 042002 (2012); X. G. Wu, Y. Ma, S. Q. Wang, H. B. Fu, H. H. Ma, S. J. Brodsky and M. Mojaza, - arXiv:1405.3196. - [12] M. Mojaza, S. J. Brodsky and X. G. Wu, Phys. Rev. Lett. 110 , 192001 (2013); S. J. Brodsky, M. Mojaza and X. G. Wu, Phys. Rev. D 89 , 014027 (2014). - [13] S. J. Brodsky and X. G. Wu, Phys. Rev. D 86 , 054018 (2012). - [14] S. J. Brodsky, G. P. Lepage and P. B. Mackenzie, Phys. Rev. D 28 , 228 (1983). - [15] G. Buchalla, A. J. Burasand M. E. Lautenbacher, Rev. Mod. Phys, 68 , 1125 (1996). - [16] M. Beneke, G. Buchalla, M. Neubert and C. T. Sachrajda, Nucl. Phys. B 606 , 245 (2001). - [17] S. J. Brodsky and H. J. Lu, Phys. Rev. D 51 , 3652 (1995). - [18] S. J. Brodsky, G. T. Gabadadze, A. L. Kataev and H. J. Lu, Phys. Lett. B 372 , 133 (1996). - [19] J. D. Bjorken, Phys. Rev. 148 , 1467 (1966); Phys. Rev. D 1 , 1376 (1970). - [20] S. J. Brodsky, Guy F. de Teramond, and A. Deur, Phys. Rev. D 81 , 096010 (2010). - [21] A. Deur, S. J. Brodsky, Guy F. de Teramond, arXiv:1409.5488. - [22] P. Ball and R. Zwicky, Phys. Rev. D 71 , 014015 (2005); X. G. Wu and T. Huang, Phys. Rev. D 79 , 034013 (2009). - [23] M. Neubert and B. D. Pecjak, JHEP 0202 , 028 (2002). - [24] H. H. Ma, X. G. Wu, Y. Ma, S. J. Brodsky and M. Mojaza, Phys. Rev. D 91 , 094028 (2015). - [25] M. Ciuchini, E. Franco, G. Martinelli, M. Pierini and L. Silvestrini, Phys. Lett. B 515 , 33 (2001). - [26] M. Ciuchini, E. Franco, G. Martinelli and L. Silvestrini, Nucl. Phys. B 501 , 271 (1997). - [27] M. Beneke, G. Buchalla, M. Neubert and C. T. Sachrajda, Eur. Phys. J. C 61 , 439 (2009). - [28] S. J. Brodsky and S. Gardner, Phys. Rev. D 65 , 054016 (2002). - [29] M. Petric, on behalf of Belle Collaboration, talk given at 37th International Conference on High Energy Physics (ICHEP), 2014. - [30] S. Q. Wang, X. G. Wu, Z. G. Si and S. J. Brodsky, Phys. Rev. D 90 , 114034 (2014).
10.1016/j.physletb.2015.07.044
[ "Cong-Feng Qiao", "Rui-Lin Zhu", "Xing-Gang Wu", "Stanley J. Brodsky" ]
2014-08-06T01:36:20+00:00
2015-07-20T08:26:47+00:00
[ "hep-ph", "hep-ex" ]
A Possible Solution to the $B\to ππ$ Puzzle Using the Principle of Maximum Conformality
The measured $B_d \to \pi^0\pi^0$ branching fraction deviates significantly from conventional QCD predictions, a puzzle which has persisted for more than 10 years. This may be a hint of new physics beyond the Standard Model; however, as we shall show in this paper, the pQCD prediction is highly sensitive to the choice of the renormalization scales which enter the decay amplitude. In the present paper, we show that the renormalization scale uncertainties for $B\to \pi\pi$ can be greatly reduced by applying the Principle of Maximum Conformality (PMC), and more precise predictions for CP-averaged branching ratios ${\cal B}(B\to\pi\pi)$ can be achieved. Combining the errors in quadrature, we obtain ${\cal B}(B_{d}\to \pi^0\pi^0)|_{\rm PMC} = \left(0.98^{+0.44}_{-0.31}\right) \times10^{-6}$ by using the light-front holographic low-energy model for the running coupling. All of the CP-averaged $B\to\pi\pi$ branching fractions predicted by the PMC are consistent with the Particle Data Group average values and the recent Belle data. Thus, the PMC provides a possible solution for the $B_d \to \pi^0\pi^0$ puzzle.
1408.1159v2
## DETERMINING OPTIMAL TRADING RULES WITHOUT BACKTESTING Mathematics Department - Courant Institute of Mathematical Sciences Peter P. Carr Global Head of Market Modeling - Morgan Stanley [email protected] www.math.nyu.edu/research/carrp Marcos López de Prado Senior Managing Director - Guggenheim Partners Research Affiliate - Lawrence Berkeley National Laboratory [email protected] www.QuantResearch.info First version: October 2013 This version: August 2014 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-3d988792-ba82-402b-8f41-b0e4fd2c2574.jpg) ## DETERMINING OPTIMAL TRADING RULES WITHOUT BACKTESTING ## ABSTRACT Calibrating a trading rule using a historical simulation (also called backtest) contributes to backtest overfitting, which in turn leads to underperformance. In this paper we propose a procedure for determining the optimal trading rule (OTR) without running alternative model configurations through a backtest engine. We present empirical evidence of the existence of such optimal solutions for the case of prices following a discrete OrnsteinUhlenbeck process, and show how they can be computed numerically. Although we do not derive a closed-form solution for the calculation of OTRs, we conjecture its existence on the basis of the empirical evidence presented. Keywords: Trading rule, backtest overfitting, profit-taking, stop-loss. JEL Classification: G0, G1, G2, G15, G24, E44. AMS Classification: 91G10, 91G60, 91G70, 62C, 60E. ## 1.- INTRODUCTION Investment strategies can be defined as logical arguments that postulate the existence of a market inefficiency. Some strategies use econometric arguments to forecast financial variables such as GDP or inflation; other strategies use fundamental and accounting information to price securities; or search for arbitrage-like opportunities in the pricing of derivatives products, etc. For instance, suppose that banking corporations tend to sell offthe-run bonds two days before U.S. Treasury auctions, in order to reserve balance sheet for the new 'paper'. One could monetize on that knowledge by selling off-the-run bonds three days before auctions. But how? Each investment strategy requires an implementation tactic, often referred to as trading rules . There are dozens of hedge fund styles, each running dozens of unique investment strategies. While strategies can be very heterogeneous in nature, tactics are relatively homogeneous. Trading rules provide the algorithm that must be followed to enter and exit a position. For example, a position will be entered when the strategy's signal reaches a certain value. Conditions for exiting a position are often defined through thresholds for profit-taking and stop-losses. These entry and exit rules rely on parameters that are usually calibrated via historical simulations. This practice leads to the problem of backtest overfitting , because these parameters target specific observations in-sample, to the point that the investment strategy is so attached to the past that becomes unfit for the future. An important clarification is that we are interested in the exit corridor conditions that maximize performance. In other words, the position already exists and the question is how to exit it optimally. This is the dilemma often faced by execution traders, and it should not be mistaken with the determination of entry and exit thresholds for some underlying instrument. For a study of that alternative question, see Bertram [2009]. Bailey et al. [2013, 2014] discuss the problem of backtest overfitting, and provide methods to determine to what extent a simulated performance may be inflated due the overfitting. While assessing the probability of backtest overfitting is a useful tool to discard superfluous investment strategies, it would be better to avoid the risk of overfitting, at least in the context of calibrating a trading rule. In theory this could be accomplished by estimating the optimal parameters for the trading rule directly from the data, rather than engaging in historical simulations. This is the approach we take in this paper. Using the entire historical sample, we will characterize the stochastic process that generates the observed stream of returns, and derive the optimal values for the trading rule's parameters without requiring a historical simulation. The rest of the study is organized as follows: Section 2 defines a trading rule, sets its characterization and introduces the problem of overfitting in the context of a trading rule's calibration. Section 3 describes our framework for calibrating a trading rule. Section 4 illustrates how to determine optimal trading rules (OTRs) numerically. Section 5 summarizes our conclusions. The appendices present an implementation in Python of our experiments. ## 2.- THE PROBLEM Suppose an investment strategy S that invests in opportunities or bets. At each opportunity i , S takes a position of units of security X , where ( ) . The transaction that entered such opportunity was priced at a value , where is the average price per unit at which the securities were transacted. As other market participants transact security X , we can mark-to-market (MtM) the value of that opportunity i after t observed transactions as . This represents the value of opportunity if it were liquidated at the price observed in the market after transactions. i t Accordingly, we can compute the MtM profit/loss of opportunity after transactions as i t ( ) . A standard trading rule provides the logic for exiting opportunity at i . This occurs when one of two conditions is verified: -  , where is the profit-taking threshold for opportunity . i -  , where is the stop-loss threshold for opportunity . i Because , only one of the two exit conditions can trigger the exit from opportunity . Assuming that opportunity can be exited at i i , its final profit/loss is . At the onset of each opportunity, the goal is to realize an expected profit [ ] ( [ ] ) , where [ ] is the forecasted price and is the entry level of opportunity . i DEFINITION 1 (Trading Rule): A trading rule for strategy S is defined by the set of parameters {( )} . One way to calibrate the trading rule is to: - 1. Define a set of alternative values of R , { } . - 2. Simulate historically (also called backtest) the performance of S under alternative values of . - 3. Select the optimal . More formally: $$\begin{smallmatrix} \cdot & - \cdots & \cdots & \cdots & \cdots & \cdots & \cdots & \\ & S R _ { R } = \frac { E \left [ \pi _ { i, T _ { i } } | R \right ] } { \sigma \left [ \pi _ { i, T _ { i } } | R \right ] } & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \cdots & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \\ & \cdots & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & - & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & - & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \\ & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & && & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & &. & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & } & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \\ & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & &$$ where [ ] and [ ] are respectively the expected value and standard deviation of , conditional on trading rule R , over . In other words, Eq. (1) is maximizing the Sharpe ratio of S on I opportunities over the space of alternative trading rules R (see Bailey and López de Prado [2012] for a definition and analysis of the Sharpe ratio). Because we count with variables to maximize over a sample of size , it is easy to I overfit R . A trivial overfit occurs when each pair ( ) targets the specific opportunity i . Bailey et al. [2013] provide a rigorous definition of backtest overfitting, which can be applied to our study of trading rules as follows. $$\frac { D E F I N I T I O N \quad 2 \quad ( O v e r f i t \quad T r a d i n g \quad R u l e ) \colon \quad R ^ { * } \quad i s \quad o v e r f i t \quad i f$$ Intuitively, an optimal in-sample (IS) trading rule is overfit when it is expected to underperform the median of alternative trading rules out-of-sample (OOS). Bailey et al. [2014] argue that it is hard not to overfit a backtest, particularly when there are free variables able to target specific observations IS, or the number of elements in is large. A trading rule introduces such free variables, because can be determined independently from S . The outcome is that the backtest profits from random noise IS, making unfit for OOS opportunities. Those same authors show that overfitting leads to negative performance OOS when exhibits serial dependence. While those authors provide a useful method to evaluate to what extent a backtest has been overfit, it would be convenient to avoid this problem in the first place. To that aim we dedicate the 1 following section. ## 3.- OUR FRAMEWORK Until now we have not characterized the stochastic process from which observations are drawn. We are interested in providing an OTR for those scenarios where overfitting would be most damaging, such as when exhibits serial correlation. In particular, suppose a discrete Ornstein-Uhlenbeck (O-U) process on prices $$P _ { i, t } = ( 1 - \varphi ) E _ { 0 } \left [ P _ { i, T _ { i } } \right ] + \varphi P _ { i, t - 1 } + \sigma \varepsilon _ { i, t }$$ such that the random shocks are IID distributed ( ) . The seed value for this process is , the level targeted by opportunity is i [ ] , and determines the speed at which converges towards [ ] . Because ( ) , Eq. (2) implies that the performance of opportunity is characterized by the process i $$\frac { 1 } { m _ { i } } \pi _ { i, t } = ( 1 - \varphi ) E _ { 0 } \left [ P _ { i, T _ { i } } \right ] - P _ { i, 0 } + \varphi P _ { i, t - 1 } + \sigma \varepsilon _ { i, t }$$ From the proof to Proposition 4 in Bailey and López de Prado [2013], it can be shown that the distribution of the process specified in Eq. (2) has a closed-form in 1 The strategy may still be the result of backtest overfitting, but at least the trading rule would not have contributed to that problem. $$\pi _ { i, t } \sim N \left ( \ m _ { i } \left ( \, ( 1 - \varphi ) E _ { 0 } [ P _ { i, T _ { i } } ] \tilde { \sum } \varphi ^ { j } - P _ { i, 0 } \, \right ), m _ { i } ^ { 2 } \sigma ^ { 2 } \tilde { \sum } \tilde { \varphi } ^ { 2 j } \, \right )$$ and a necessary and sufficient condition for its stationarity is that ( ) . Given a set of input parameters { } and initial conditions { [ ]} associated with opportunity , is there an OTR i ( ) ? Similarly, should strategy S predict a profit target , can we compute the optimal stop-loss given the input values { } ? If the answer to these questions is affirmative, no backtest would be needed in order to determine , thus avoiding the problem of overfitting the trading rule. In the next section we will show how to answer these questions experimentally. ## 4.- NUMERICAL DETERMINATION OF OTRs In the previous section we used an O-U specification to characterize the stochastic process generating the returns of strategy S . In this section we will present a procedure to derive numerically the OTR for any specification in general, and the O-U specification in particular. STEP 1: We estimate the input parameters { } , by linearizing Eq. (2) as: $$P _ { i, t } = E _ { 0 } [ P _ { i, T _ { i } } ] + \varphi ( P _ { i, t - 1 } - E _ { 0 } [ P _ { i, T _ { i } } ] ) + \xi _ { t }$$ We can then form vectors X and Y by sequencing opportunities: $$X = \begin{bmatrix} P _ { 0, 0 } - E _ { 0 } \begin{bmatrix} P _ { 0, T _ { 0 } } \end{bmatrix} \\ P _ { 0, 1 } - E _ { 0 } \begin{bmatrix} P _ { 0, T _ { 0 } } \end{bmatrix} \\ P _ { 0, T - 1 } - E _ { 0 } \begin{bmatrix} P _ { 0, T _ { 0 } } \end{bmatrix} \\ P _ { 1, 0 } - E _ { 0 } \begin{bmatrix} P _ { 1, T _ { 1 } } \end{bmatrix} ; Y = \begin{bmatrix} P _ { 0, 1 } \\ P _ { 0, 2 } \\ P _ { 0, T } \\ P _ { 1, 1 } \\ P _ { 1, T } \end{bmatrix} ; Z = \begin{bmatrix} E _ { 0 } \begin{bmatrix} P _ { 0, T _ { 0 } } \end{bmatrix} \\ E _ { 0 } \begin{bmatrix} P _ { 0, T _ { 0 } } \end{bmatrix} \\ E _ { 0 } \begin{bmatrix} P _ { 1, T _ { 1 } } \end{bmatrix} \\ E _ { 0 } \begin{bmatrix} P _ { 1, T _ { 1 } } \end{bmatrix} \\ E _ { 0 } \begin{bmatrix} P _ { 1, T _ { 1 } } \end{bmatrix} \end{bmatrix} \\ \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \end{bmatrix} \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \left \| \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \nu \, \begin{bmatrix} \varphi \, \nu \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varp \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \, \varphi \varphi \, \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \, \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varpulumi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \ varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi\varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulum \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpuluti \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulm \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulimi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpulumi \varphi \varpul.:$$ Applying OLS on Eq. (5), we can estimate the original O-U parameters as, $$\hat { \varphi } = \frac { c o v [ Y, X ] } { c o v [ X, X ] } \\ \hat { \xi } _ { t } = Y - Z - \hat { \varphi } X \\ \hat { \sigma } = \sqrt { c o v ( \hat { \xi } _ { t }, \hat { \xi } _ { t } ) }$$ STEP 2: We construct a mesh of stop-loss and profit-taking pairs, ( ) . For example, a Cartesian product of { } and { } give us 21x21 nodes, each constituting an alternative trading rule . STEP 3: We generate a large number of paths (e.g., 100,000) for applying our estimates { ̂ } ̂ . As seed values, we use the observed initial conditions { [ ]} associated with an opportunity i . Because a position cannot be held for an unlimited period of time, we can impose a maximum holding period (e.g., 100 observations) at which point the position is exited even though . STEP 4: We apply the 100,000 paths generated in Step 3 on each node of the 21x21 mesh ( ) generated in Step 2. For each node, we apply the stop-loss and profit-taking logic, giving us 100,000 values of . Likewise, for each node we compute the Sharpe ratio associated with that trading rule as described in Eq. (1) (see Bailey and López de Prado [2012] for a study of the confidence bands of the Sharpe ratio estimator). This result can be used in two different ways (Steps 5a, Step 5b and 5c): STEP 5a: We determine the pair ( ) within the mesh of trading rules that is optimal, given the input parameters { ̂ } ̂ and the observed initial conditions { [ ]} . STEP 5b: If strategy S provides a profit target for a particular opportunity i , we can use that information in conjunction with the results in Step 4 to determine the optimal stop-loss, . STEP 5c: If the trader has a maximum stop-loss imposed by the fund's management, we can use that information in conjunction with the results in Step 4 to determine the optimal profit taking within the range of stop-losses [ ] . Bailey et al. [2013a] proof that the half-life of the process in Eq. (2) is [ ] [ ] , which implies the additional constraint ( ) . From that result, we can determine the value of associated with a certain half-life as / . Appendix 1 implements this procedure. Table 1 lists the combinations analyzed in this study. OTR ( ) is computed per unit held ( ), since other values of would simply re-scale performance. Although different values for these input parameters would render different numerical results, the combinations applied allow us to analyze the most general cases. [TABLE 1 HERE] In the following figures, we have plotted the non-annualized Sharpe ratios that result from various combinations of profit-taking and stop-loss. We have omitted the negative sign in the y-axis (stop-losses) for simplicity. Sharpe ratios are represented with different scales of colors (green indicating better performance and red worse performance), in a format known as a 'heat-map'. ## 4.1.- CASES WITH ZERO LONG-RUN EQUILIBRIUM These cases are consistent with the business of market makers, who provide liquidity under the assumption that prices follow a martingale. The smaller , the smaller is the autoregressive coefficient ( / ). A small autoregressive coefficient in conjunction with a zero expected profit has the effect that most of the pairs ( ) deliver a zero performance. Figure 1 shows the heat-map for the parameter combination { } { } . The halflife is so small that performance is maximized in a narrow range of combinations of small profit-taking with large stop-losses. In other words, the optimal trading rule is to hold an inventory long enough until a small profit arises, even at the expense of experiencing 5 or 7-fold losses. Sharpe ratios are high, reaching levels of around 3.2. This is in fact what many market-makers do in practice, and is consistent with the 'asymmetric payoff dilemma' described in Easley et al. [2011]. The worst possible trading rule in this setting would be to combine a short stop-loss with large profit-taking threshold, a situation that market-makers avoid in practice. Performance is closest to neutral in the diagonal of the mesh, where profit-taking and stop-losses are symmetric. ## [FIGURE 1 HERE] Figure 2 shows that, if we increase from 5 to 10, the areas of highest and lowest performance spread over the mesh of pairs ( ) , while the Sharpe ratios decrease. This is because, as the half-life increases, so that the magnitude of the autoregressive coefficient (recall that / ), thus approaching the process to a random walk. ## [FIGURE 2 HERE] In Figure 3, , which again spreads the areas of highest and lowest performance while reducing the Sharpe ratio. Figures 4 ( ) and 5 ( ) continue that progression. Eventually, as , there are no recognizable areas where performance can be maximized. [FIGURE 3 HERE] [FIGURE 4 HERE] [FIGURE 5 HERE] Calibrating a trading rule on a random walk through historical simulations would lead to backtest overfitting, because a random combination of profit-taking and stop-loss that happened to maximize Sharpe ratio would be selected. Our procedure prevents overfitting by recognizing that performance exhibits no consistent pattern, indicating that there is no optimal trading rule. ## 4.2.- CASES WITH POSITIVE LONG-RUN EQUILIBRIUM These cases are consistent with the business of a position-taker, such as a hedge fund or asset manager. Figure 6 shows the results for the parameter combination { } { } . Because positions tend to make money, the optimal profit-taking is higher than in the previous cases, centered around 6, with stop-losses that range between 4 and 10. The region of the optimal trading rule takes a characteristic rectangular shape, as a result of combining a wide stop-loss range with a narrower profit-taking range. Performance is highest across all experiments, with Sharpe ratios of around 12. ## [FIGURE 6 HERE] In Figure 7, we have increased the half-life from to . Now the optimal performance is achieved at a profit-taking centered around 5, with stop-losses that range between 7 and 10. The range of optimal profit-taking is wider, while the range of optimal stop-losses narrows, shaping the former rectangular area closer to a square. Again, a larger half-life brings the process closer to a random walk, and therefore performance is now relatively lower than before, with Sharpe ratios of around 9. ## [FIGURE 7 HERE] In Figure 8, we have made . The optimal profit-taking is now centered around 3, while the optimal stop-losses range between 9 and 10. The previous square area of optimal performance has given way to a semi-circle of small profit-taking with large stop-loss thresholds. Again we see a deterioration of performance, with Sharpe ratios of 2.7. ## [FIGURE 8 HERE] In Figure 9, half-life raises to . As a result, the region of optimal performance spreads, while Sharpe ratios continue to fall to 0.8. This is the same effect we observed in the case of zero long-run equilibrium (Section 4.1), with the difference that because now there is no symmetric area of worst performance. ## [FIGURE 9 HERE] In Figure 10, we appreciate that leads to the natural conclusion of the trend described above. The process is now so close to a random walk that the Maximum Sharpe ratio now is a mere 0.32. ## [FIGURE 10 HERE] We can observe a similar pattern in Figures 11 to 15, where and is progressively increased from 5 to 10, 25, 50 and 100. ## 4.3.- CASES WITH NEGATIVE LONG-RUN EQUILIBRIUM A rational market participant would not initiate a position under the assumption that a loss is the expected outcome. However, if a trader recognizes that losses are the expected outcome of a pre-existing position, she still needs a strategy to trade it away while minimizing such losses. We have obtained Figure 16 as a result of applying parameters { } { } . If we compare Figure 16 with Figure 6, it appears as if one is a rotated complementary of the other. Figure 6 resembles a rotated photographic negative of Figure 16. The reason is, that the profit in Figure 6 is translated into a loss in Figure 16, and the loss in Figure 6 is translated into a profit in Figure 16. One case is an image of the other, just as a gambler's loss is the house's gain. As expected, Sharpe ratios are negative, with a worst performance region centered around the stop-loss of 6, and profit-taking threshold that range between 4 and 10. Now the rectangular shape does not correspond to region of best performance, but to a region of worst performance, with Sharpe ratios of around -12. ## [FIGURE 16 HERE] In Figure 17, , and now the proximity to a random walk plays in our favor. The region of worst performance spreads out, and the rectangular area becomes a square. Performance becomes less negative, with Sharpe ratios of about -9. ## [FIGURE 17 HERE] This familiar progression can be appreciated in Figures 18-20, as is raised to 25, 50 and 100. Again, as the process approaches a random walk, performance levels and optimizing becomes a backtest-overfitting exercise. [FIGURE 18 HERE] [FIGURE 19 HERE] [FIGURE 20 HERE] Figures 21 to 25 repeat the same process for and that is progressively increased from 5 to 10, 25, 50 and 100. The same pattern arises, i.e. a rotated complementary to the case of positive long-run equilibrium. ## 5.- CONCLUSIONS In this paper we have shown how to determine experimentally the optimal trading strategy associated with prices following a discrete Ornstein-Uhlenbeck process. Because the derivation of such trading strategy is not the result of a historical simulation, our procedure avoids the risks associated with backtest overfitting. Depending on factors such as the frequency at which trading takes place, the holding period, etc., the time it takes to run our numerical procedure may be too lengthy. For that reason alone, it would be beneficial to count with a closed-form solution that computes the Sharpe ratio of every combination ( ) , which we could then optimize analytically to determine the optimal . In addition, although we can make sense of the experimental results presented in this paper, a closed-form representation of the solution would give us greater insight into what makes a particular solution optimal. While in this paper we do not derive the closed-form solution to the optimal trading strategies problem, our experimental results seem to support the following OTR conjecture: 'Given a financial instrument's price characterized by a discrete O-U process, there is a unique optimal trading rule in terms of a combination of profit-taking and stop-loss that maximizes the rule's Sharpe ratio.' We believe that solving this conjecture would have substantial economic value in a trading world where a few milliseconds separate winners from losers. ## APPENDICES ## A.1.- PYTHON IMPLEMENTATION OF OUR EXPERIMENTS Snippet 1 provides an implementation in Python of the experiments conducted in this paper. Snippet 1 - Python code for the determination of OTRs ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-b2ae2b5f-695d-470f-b085-80968ad763a0.jpg) The subroutine batch(*arg) estimates the Sharpe ratios for each node of the mesh ( ) given some input parameters { ̂ } ̂ and initial conditions { [ ]} . batch(*arg) is called by main() , which passes alternative values of ̂ and [ ] . A path is discontinued after 100 steps, thus values of ̂ are explored such that { } . As forecasted prices, we have tried [ ] { } . We have fixed , since it is the distance ( [ ]) that drives the convergence, not particular absolute price levels. Also without loss of generality, in all simulations we have used ̂ . TABLES | ID | TableName | Forecast | HL | Sigma | maxHP | |------|-------------|------------|------|---------|---------| | 1 | Table_1 | 0 | 5 | 1 | 100 | | 2 | Table_2 | 0 | 10 | 1 | 100 | | 3 | Table_3 | 0 | 25 | 1 | 100 | | 4 | Table_4 | 0 | 50 | 1 | 100 | | 5 | Table_5 | 0 | 100 | 1 | 100 | | 6 | Table_6 | 5 | 5 | 1 | 100 | | 7 | Table_7 | 5 | 10 | 1 | 100 | | 8 | Table_8 | 5 | 25 | 1 | 100 | | 9 | Table_9 | 5 | 50 | 1 | 100 | | 10 | Table_10 | 5 | 100 | 1 | 100 | | 11 | Table_11 | 10 | 5 | 1 | 100 | | 12 | Table_12 | 10 | 10 | 1 | 100 | | 13 | Table_13 | 10 | 25 | 1 | 100 | | 14 | Table_14 | 10 | 50 | 1 | 100 | | 15 | Table_15 | 10 | 100 | 1 | 100 | | 16 | Table_16 | -5 | 5 | 1 | 100 | | 17 | Table_17 | -5 | 10 | 1 | 100 | | 18 | Table_18 | -5 | 25 | 1 | 100 | | 19 | Table_19 | -5 | 50 | 1 | 100 | | 20 | Table_20 | -5 | 100 | 1 | 100 | | 21 | Table_21 | -10 | 5 | 1 | 100 | | 22 | Table_22 | -10 | 10 | 1 | 100 | | 23 | Table_23 | -10 | 25 | 1 | 100 | | 24 | Table_24 | -10 | 50 | 1 | 100 | | 25 | Table_25 | -10 | 100 | 1 | 100 | Table 1 - Input parameter combinations used in the simulations ## FIGURES Figure 1 - Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-e2c6932c-e1bd-4908-98fc-3702fc190ca0.jpg) Figure 2 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-5971427f-75aa-44b6-8cd7-576a6b63ade1.jpg) Figure 3 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-13bbe791-35aa-441c-aa4e-efb6c542f3cd.jpg) Figure 4 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-bc009b1d-2893-4085-8d2e-3ef07d1d1261.jpg) Figure 5 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-8e6826bd-95d7-404a-b3a0-1d2cb8beb6cc.jpg) Figure 6 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-d54ebf5c-142a-4f19-95a4-4b93671eddd7.jpg) Figure 7 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-b7fe9cae-f3b9-4a6b-8955-055070209f7b.jpg) Figure 8 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-a8cbf545-de70-4081-9c15-b3d3c895ae39.jpg) Figure 9 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-10c9c300-7468-4712-9adb-dbd6c071aea1.jpg) Figure 10 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-e61df708-03df-4329-b76d-f24c2ec74d07.jpg) Figure 11 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-ae008498-a8a0-4fa6-a0be-82a9ca8a97b3.jpg) Figure 12 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-87aeef19-ea8e-4338-898d-8c3fffd2290e.jpg) Figure 13 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-3baa8361-8d0a-4c13-b18a-a5869c778933.jpg) Figure 14 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-dd788b93-4475-4647-8f4e-e4e63d822bbb.jpg) Figure 15 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-83a5f3c9-3c61-4ddd-a05c-213d01a90522.jpg) Figure 16 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-8e503817-964b-465a-83b6-34a4001885da.jpg) Figure 17 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-305b0052-3cd6-4f21-b36a-40c44e094453.jpg) Figure 18 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-615fddeb-eb8c-4d93-8a16-9e0d5536b5fa.jpg) Figure 19 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-b3b29d00-b8a6-438a-8f16-a4092a9eb9fb.jpg) Figure 20 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-be1302ef-71c7-4b84-adee-c383190815fc.jpg) Figure 21 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-f38ebfeb-ddb1-4ed2-8add-dfe48181b69f.jpg) Figure 22 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-2c7f89d2-ae47-4f34-bba1-6165c7d53721.jpg) Figure 23 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-445a9324-f36e-4339-a3e0-26909959e880.jpg) Figure 24 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-7f1b7326-e93a-4841-b89c-1b247bf3cd4c.jpg) Figure 25 Heat-map for { } { } ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1159v2-figure-3e5934fa-beee-4288-a225-386a5860e03a.jpg) ## REFERENCES -  Bailey, D. and M. López de Prado (2012): 'The Sharpe Ratio Efficient Frontier,' Journal of Risk , 15(2), pp. 3-44. Available at http://ssrn.com/abstract=1821643. -  Bailey, D. and M. López de Prado (2013): 'Drawdown-based Stop-Outs and the Triple Penance Rule,' Working paper. Available at http://ssrn.com/abstract=2201302 -  Bailey, D., J. Borwein, M. López de Prado and J. Zhu (2014): 'Pseudo-Mathematics and Financial Charlatanism: The Effects of Backtest Overfitting on Out-Of-Sample Performance,' Notices of the American Mathematical Society, 61(5), pp. 458-471. Available at http://ssrn.com/abstract=2308659 -  Bailey, D., J. Borwein, M. López de Prado and J. Zhu (2013): 'The Probability of Backtest Overfitting.' Working paper. Available at http://ssrn.com/abstract=2326253. -  Bertram, W. (2009): 'Analytic Solutions for Optimal Statistical Arbitrage Trading.' Working paper. Available at http://ssrn.com/abstract=1505073 -  Easley, D., M. Lopez de Prado and M. O'Hara (2011): 'The Exchange of FlowToxicity.' Journal of Trading, Vol. 6(2), pp. 8-13, Spring. Available at http://ssrn.com/abstract=1748633.
null
[ "Peter P. Carr", "Marcos Lopez de Prado" ]
2014-08-06T01:37:28+00:00
2014-09-28T22:57:23+00:00
[ "q-fin.PM", "q-fin.MF", "91G10, 91G60, 91G70, 62C, 60E" ]
Determining Optimal Trading Rules without Backtesting
Calibrating a trading rule using a historical simulation (also called backtest) contributes to backtest overfitting, which in turn leads to underperformance. In this paper we propose a procedure for determining the optimal trading rule (OTR) without running alternative model configurations through a backtest engine. We present empirical evidence of the existence of such optimal solutions for the case of prices following a discrete Ornstein-Uhlenbeck process, and show how they can be computed numerically. Although we do not derive a closed-form solution for the calculation of OTRs, we conjecture its existence on the basis of the empirical evidence presented.
1408.1160v1
## Mixed-Variate Restricted Boltzmann Machines ∗ Truyen Tran †‡ , Dinh Phung , Svetha Venkatesh † † † Pattern Recognition and Data Analytics, Deakin University, Australia ‡ Department of Computing, Curtin University, Australia { truyen.tran,dinh.phung,svetha.venkatesh } @deakin.edu.au ## Abstract Modern datasets are becoming heterogeneous. To this end, we present in this paper Mixed-Variate Restricted Boltzmann Machines for simultaneously modelling variables of multiple types and modalities, including binary and continuous responses, categorical options, multicategorical choices, ordinal assessment and category-ranked preferences. Dependency among variables is modeled using latent binary variables, each of which can be interpreted as a particular hidden aspect of the data. The proposed model, similar to the standard RBMs, allows fast evaluation of the posterior for the latent variables. Hence, it is naturally suitable for many common tasks including, but not limited to, (a) as a preprocessing step to convert complex input data into a more convenient vectorial representation through the latent posteriors, thereby offering a dimensionality reduction capacity, (b) as a classifier supporting binary, multiclass, multilabel, and label-ranking outputs, or a regression tool for continuous outputs and (c) as a data completion tool for multimodal and heterogeneous data. We evaluate the proposed model on a large-scale dataset using the world opinion survey results on three tasks: feature extraction and visualization, data completion and prediction. ## 1 Introduction Restricted Boltzmann Machines (RBM) [9, 5] have recently attracted an increasing attention for their rich capacity in a variety of learning tasks, including multivariate distribution modelling, feature extraction, classification, and construction of deep architectures [8, 19]. An RBM is a two-layer Markov random field in which the visible layer represents observed variables and the hidden layer represents latent aspects of the data. Pairwise interactions are only permitted for units between layers. As a result, the posterior distribution over the hidden variables and the probability of the data generative model are easy to evaluate, allowing fast feature extraction and efficient sampling-based inference [7]. Nonetheless, most existing work in RBMs implicitly assumes that the visible layer contains variables of the same modality. By far the most popular input types are binary [5] and Gaussian [8]. Recent extension includes categorical [21], ordinal [25], Poisson [6] and Beta [13] data. To the best of our knowledge, none has been considered for multicategorical and category-ranking data, nor for a mixed combination of these data types. In this paper, we investigate a generalisation of the RBM for variables of multiple modalities and types. Take, for example, data from a typical survey, where a person is asked a variety ∗ Work done when authors were with Curtin University, Australia. Table 1: Notations used in this paper. | v i | Single visible variable | G i ( v i ), H ik ( v i ) | Functions of an input variable | |-------------------------------------------------------------|----------------------------|-----------------------------|----------------------------------| | v | A set of visible variables | U i , U im , U id | Input bias parameters | | h k | Single hidden variable | V ik , V imk , V idk | Input-hidden parameters | | h | A set of hidden variables | w k | Hidden bias parameter | | Z ( · ) | Normalising function | a im | Activation indicator | | glyph[follows] , glyph[followsequal] , glyph[triangleright] | Ordinal relations | S i | Set of categories | | glyph[similarequal] | Indifference | M i | The number of categories | | N | Number of visible units | c im | Category member of set S i | | K | Number of hidden units | δ m [ v i ], I [ · ] | Indicator functions | | P ( · ) | Probability distribution | C | Index of a subset of variables | | E ( · ) | Energy function | L | Data log-likelihood | of questions in many styles ranging from yes / no to multiple choices and preference statements. Typically, there are six question/answer types: (1) binary responses (e.g., satisfied vs. unsatisfied ), (2) categorical options (e.g., one of employed , unemployed or retired ), (iii) multicategorical choices (e.g., any of family , education or income ), (iv) continuous information (e.g. age ), (v) ordinal assessment (e.g., one of good , neural or bad ), and (vi) category-ranked preferences (e.g., in the decreasing order of importance: children , security , food and money ). As the answers in a response come from the same person, they are inherently correlated. For instance, a young American is likely to own a computer, whilst a typical Chinese adult may concern more about their children's education. However, modelling the direct correlation among multiple types is difficult. We show, on the other hand, a two-layer RBM is well-suited for this problem. First, its undirected graphical structure allows a great flexibility to encode all six data types into the same probability distribution. Second, the binary hidden layer pools information from visible units and redistributes to all others, thereby introducing dependencies among variables. We term our model the Mixed-Variate Restricted Boltzmann Machines (MV RBM). . The MV RBM has the capacity of supporting a variety of machine learning tasks. . Its posteriors can be used as a vectorial representation of the data hiding away the obscured nature of the observed data. As the result, we can use MV RBM for data pre-processing, visualisation, . and dimensionality reduction. Given the hidden layer, the original and missing observables can also be reconstructed through the generative data model. By splitting the observed data into an input and output sets, predictive models can be learnt to perform classification, ranking or regression. These capacities are demonstrated in this paper on a large-scale international opinion survey across 44 nations involving more than 38 thousand people. ## 2 Mixed-Variate Restricted Boltzmann Machines In this section we present Mixed-Variate Restricted Boltzmann Machines (MV RBM) for jointly . modelling variables of multiple modalities and types. For ease of following the text, we include a notation description in Table 1. ## 2.1 Model Definition Denote by v = ( v , v 1 2 , ..., v N ) the set of mixed-variate visible variables where each v i can be one of the following types: binary , categorical , multicategorical , continuous , ordinal or categoryranked . Let v disc be the joint set of discrete elements and v cont be the continuous set, and thus v = ( v disc , v cont ). Denoting by h = ( h , h 1 2 , ..., h K ) ∈ { 0 1 , } K the hidden variables, the model distribution of MV RBM is defined as . $$P ( v, h ) = \frac { 1 } { Z } \exp \{ - E ( v, h ) \},$$ where E ( v h , ) is the model energy, Z is the normalisation constant. The model energy is further decomposed into a sum of singleton and pairwise energies: $$E ( v, h ) = \sum _ { i = 1 } ^ { N } E _ { i } ( v _ { i } ) + \sum _ { k = 1 } ^ { K } E _ { k } ( h _ { k } ) + \sum _ { i = 1 } ^ { N } \sum _ { k = 1 } ^ { K } E _ { i k } ( v _ { i }, h _ { k } ),$$ where E v i ( i ) depends only on the i -th visible unit, E k ( h k ) on the k -th hidden unit, and E ik ( v , h i k ) on the interaction between the i -th visible and k -hidden units. The MV RBM is . thus a 2-layer mixed-variate Markov random field with pairwise connectivity across layers. For the distribution in Eq. (1) to be properly specified, we need to keep the normalisation constant finite. In other words, the following integration $$Z = \int _ { v _ { c o n t } } \left ( \sum _ { v _ { d i s c } } \sum _ { h } \exp \{ - E ( v _ { d i s c }, v _ { c o n t }, h ) \} \right ) d ( v _ { c o n t } )$$ must be bounded from above. One way is to choose appropriate continuous variable types with bounded moments, e.g., Gaussian. Another way is to explicitly bound the continuous variables to some finite ball, i.e., ‖ v cont ‖ ≤ R . In our MV RBM, we further assume that the energies have the following form: . $$E _ { i } ( v _ { i } ) = - G _ { i } ( v _ { i } ) ; \quad \quad E _ { k } ( h _ { k } ) = - w _ { k } h _ { k } ; \quad \quad E _ { i k } ( v _ { i }, h _ { k } ) = - H _ { i k } ( v _ { i } ) h _ { k }, \quad ( 2 )$$ where w k is the bias parameter for the k -th hidden unit, and G v i ( i ) and H ik ( v i ) are functions to be specified for each data type. An important consequence of this energy decomposition is the factorisation of the posterior : $$P ( h \, | \, v ) \ = \ \prod _ { k } P ( h _ { k } \, | \, v ) ; \quad \ \ P ( h _ { k } ^ { 1 } \, | \, v ) = \frac { 1 } { 1 + \exp \{ - w _ { k } - \sum _ { i } H _ { i k } ( v _ { i } ) \} }, \quad ( 3 )$$ where h 1 k denotes the assignment h k = 1. This posterior is efficient to evaluate, and thus the vector ( P h ( 1 k | v ) , P ( h 2 k | v ) , ..., P ( h K k | v ) ) can be used as extracted features for mixed-variate input v . Similarly, the data model P ( v h | ) has the following factorisation $$P ( v \, | \, h ) = \prod _ { i } P _ { i } ( v _ { i } \, | \, h ) ; \quad \ \ P _ { i } ( v _ { i } \, | \, h ) = \frac { 1 } { Z ( h ) } \exp \{ G _ { i } ( v _ { i } ) + \sum _ { k } H _ { i k } ( v _ { i } ) h _ { k } \}, \quad ( 4 )$$ where Z ( h ) = ∑ v i exp { G v i ( i ) + ∑ k H ik ( v i ) h k } if v i is discrete and Z ( h ) = ∫ v i exp { G v i ( i ) + ∑ k H ik ( v i ) h k } d v ( i ) if v i is continuous, assuming that the integration exists. Note that we deliberately use the subscript index i in P i ( · | h ) to emphasize the heterogeneous nature of the input variables. ## 2.2 Type-specific Data Models We now specify P i ( v i | h ) in Eq. (4), or equivalently, the functionals G v i ( i ) and H ik ( v i ). Denote by S i = ( c i 1 , c i 2 , ..., c iM i ) the set of categories in the case of discrete variables. In this section, for continuous types, we limit to Gaussian variables as they are the by far the most common. Interested readers are referred to [13] for Beta variables in the context of image modelling. The data model and related functionals for binary, Gaussian and categorical data types are well-known, and thus we provide a summary here: | | G i ( v i ) | H ik ( v i ) | P i ( v i | h ) | |--------------|-----------------------------|-------------------------|----------------------------------------------------------------------------------------| | -Binary | U i v i | V ik v i | exp { U i v i + ∑ k V ik h k v i } 1+exp { U i + ∑ k V ik h k } | | -Gaussian | - v 2 i / 2 σ 2 i + U i v i | V ik v i | N ( σ 2 i ( U i + ∑ k V ik h k ) ; σ i ) | | -Categorical | ∑ m U im δ m [ v i ] | ∑ m,k V imk δ m [ v i ] | exp { ∑ m U im δ m [ v i ]+ ∑ m,k V imk δ m [ v i ] h k } ∑ exp { U il + ∑ V ilk h k } | l k where m = 1 2 , , ..., M i ; U , V i ik , U im , V imk are model parameters; and δ m [ v i ] = 1 if v i = c im and 0 otherwise. The cases of multicategorical, ordinal and category-ranking variables are, however, much more involved, and thus some further simplification may be necessary. In what follows, we describe the specification details for these three cases. ## 2.2.1 Multicategorical Variables An assignment to a multicategorical variable has the form of a subset from a set of categories. For example, a person may be interested in games and music from a set of offers: games , sports , music , and photography . More formally, let S i be the set of categories for the i -th variable, and P i = 2 S i be the power set of S i (the set of all possible subsets of S i ). Each variable assignment consists of a non-empty element of P i , i.e. v i ∈ {P \∅} i . Since there are 2 M i -1 possible ways to select a non-empty subset, directly enumerating P i ( v i | h ) proves to be highly difficult even for moderate sets. To handle this state explosion, we first assign each category c im with a binary indicator a im ∈ { 0 1 , } to indicate whether the m -th category is active, that is v i = ( a i 1 , a i 2 , ..., a iM i ). We then assume the following factorisation: $$P _ { i } ( v _ { i } | h ) = \prod _ { m = 1 } ^ { M _ { i } } P _ { i } ( a _ { i m } | h ).$$ Note that this does not says that binary indicators are independent in their own right but given the knowledge of the hidden variables h . Since they hidden variables are never observed, binary indicators are therefore interdependent. Now, the probability for activating a binary indicator is defined as $$P _ { i } ( a _ { i m } = 1 | h ) = \frac { 1 } { 1 + \exp ( - U _ { i m } - \sum _ { k } V _ { i m k } h _ { k } ) }.$$ Note that this specification is equivalent to the following decomposition of the functionals G v i ( i ) and H ik ( v i ) in Eq. (2): $$G _ { i } ( v _ { i } ) = \sum _ { m = 1 } ^ { M _ { i } } U _ { i m } a _ { i m } ; \quad \ \ H _ { i k } ( v _ { i } ) = \sum _ { m = 1 } ^ { M _ { i } } V _ { i m k } a _ { i m }.$$ ## 2.2.2 Ordinal Variables An ordinal variable receives individual values from an ordinal set S i = { c i 1 ≺ c i 2 ≺ ..., ≺ c iM i } where ≺ denotes the order in some sense. For example, c im can be a numerical rating from a review, or it can be sentimental expression such as love , neutral and hate . There are two straightforward ways to treat an ordinal variable: (i) one is simply ignoring the order, and considering it as a multinomial variable, and (ii) another way is to convert the ordinal expression into some numerical scale, for example, {-1 0 +1 , , } for the triple { love neutral hate , , } and then proceed as if it is a continuous variable. However, in the first treatment, substantial ordinal information is lost, and in the second treatment, there is no satisfying interpretation using numbers. In this paper, we adapt the Stereotype Ordered Regression Model (SORM) by [1]. More specifically, the SORM defines the conditional distribution as follows $$P ( v _ { i } = m \, | \, \boldsymbol h ) = \frac { \exp \{ U _ { i m } + \sum _ { d = 1 } ^ { D } \sum _ { k = 1 } ^ { K } V _ { i d k } \phi _ { i d } ( m ) h _ { k } \} } { \sum _ { l } \exp \{ U _ { i l } + \sum _ { d = 1 } ^ { D } \sum _ { k = 1 } ^ { K } V _ { i d k } \phi _ { i d } ( l ) h _ { k } \} }$$ where U im , V idk are free parameters, D ≤ M i is the dimensionality of the ordinal variable 1 v i , and φ id ( m ) is the monotonically increasing function of m : $$\phi _ { i d } ( 1 ) < \phi _ { i d } ( 2 ) <$$ A shortcoming of this setting is that when h = 0 , the model reduces to the standard multiclass logistic, effectively removing the ordinal property. To deal with this, we propose to make the input bias parameters order dependent: $$P ( v _ { i } = m \, | \, \hbar { ) } \in$$ where U id is the newly introduced parameter. Here we choose D = M i , and φ id ( m ) = ( m d -) / ( M i -1) . ## 2.2.3 Category-ranking Variables In category ranking, a variable assignment has the form of a ranked list of a set of categories. For example, from a set of offers namely games , sports , music , and photography , a person may express their preferences in a particular decreasing order: sports glyph[follows] music glyph[follows] games glyph[follows] photography . 1 This should not be confused with the dimensionality of the whole data v . Sometimes, they may like sports and music equally, creating a situation known as ties in ranking, or indifference in preference. When there are no ties, we can say that the rank is complete . More formally, from a set of categories S i = { c i 1 , c i 2 , ..., c iM i } , a variable assignment without ties is then a permutation of elements of S i . Thus, there are M i ! possible complete rank assignments. When we allow ties to occur, however, the number of possible assignments is extremely large. To see how, let us group categories of the same rank into a partition. Orders within a partition are not important, but orders between partitions are. Thus, the problem of rank assignment turns out to be choosing from a set of all possible schemes for partitioning and ordering a set. The number of such schemes is known in combinatorics as the Fubini's number [16, pp. 396-397], which is extremely large even for small sets. For example, Fubini (1) = 1, Fubini (3) = 13, Fubini (5) = 541 and Fubini (10) = 102 247 563. , , Directly modelling ranking with ties proves to be intractable. We thus resort to approximate methods. One way is to model just pairwise comparisons: we treat each pair of categories separately when conditioned on the hidden layer . More formally, denote by c il glyph[follows] c im the preference of category c il over c im , and by c il glyph[similarequal] c im the indifference. We replace the data model P i ( v i | h ) with a product of pairwise comparisons ∏ ∏ l m&gt;l P i ( c il glyph[triangleright] c im | h ), where glyph[triangleright] denotes preference relations (i.e., glyph[follows] , ≺ or glyph[similarequal] ). This effectively translates the original problem with Fubini's number complexity to M M i ( i -1) / 2 pairwise sub-problems, each of which has only three preference choices. The drawback is that this relaxation loses the guarantee of transitivity (i.e., c il glyph[followsequal] c im and c im glyph[followsequal] c in would entail c il glyph[followsequal] c in , where glyph[followsequal] means better or equal-to ). The hope is that the hidden layer is rich enough to absorb this property, that is, the probability of preserving the transitivity is sufficiently high. Now it remains to specify P i ( c il glyph[triangleright] c im | h ) in details. In particular, we adapt the Davidson's model [2] of pairwise comparison: $$\begin{array} {$$ where Z ilm ( h ) = ϕ c ( il , h ) + ϕ c ( im , h ) + γ √ ϕ c ( il , h ) ϕ c ( im , h ), γ &gt; 0 is the tie parameter, and $$\varphi ( c _ { i m }, h ) = \exp \{ \frac { 1$$ The term 1 / M i normalises the occurrence frequency of a category in the model energy, leading to better numerical stability. ## 3 Learning and Inference In this paper, we consider two applications of the MV RBM: . estimating data distribution and learning predictive model s. Estimating data distribution is to learn a generative model that generates the visible data. This can be useful in many other applications including dimensionality reduction, feature extraction, and data completion. On the other hand, a predictive model is a classification (or regression) tool that predicts an output given the input co-variates. ## 3.1 Parameter Learning We now present parameter estimation for { w , U , U k i im , V ik , V imk } , which clearly depend on the specific applications. ## 3.1.1 Estimating Data Distribution The problem of estimating a distribution from data is typically performed by maximising the data likelihood L 1 = ∑ v ˜ ( P v ) log P ( v ), where ˜ ( P v ) denotes the empirical distribution of the visible variables, and P ( v ) = ∑ h P ( v h , ) is the model distribution. Since the MV RBM belongs . to the exponential family, the gradient of L 1 with respect to parameters takes the form of difference of expectations. For example, in the case of binary variables, the gradient reads $$\frac { \partial \mathcal { L } _ { 1 } } { \partial V _ {$$ where ˜ ( P h , v k i ) = P h ( k | v ) ˜ ( P v i ) is the empirical distribution, and P h , v ( k i ) = P h ( k | v ) P v ( i ) the model distribution. Due to space constraint, we omit the derivation details here. The empirical expectation 〈 v h i k 〉 ˜ ( P v ,h i k ) is easy to estimate due to the factorisation in Eq. (3). However, the model expectation 〈 v h i k 〉 P v ,h ( i k ) is intractable to evaluate exactly, and thus we must resort to approximate methods. Due to the factorisations in Eqs. (3,4), Markov Chain Monte Carlo samplers are efficient to run. More specifically, the sampler is alternating between { ̂ h k ∼ P h ( k | v ) } K k =1 and { ̂ v i ∼ P v ( i | h ) } N i =1 . Note that in the case of multicategorical variables, make use of the factorisation in Eq. (5) and sample { a im } M i m =1 simultaneously. On the other hand, in the case of category-ranked variables, we do not sample directly from P v ( i | h ) but from its relaxation { P i ( c il glyph[triangleright] c im | h ) } l,m&gt;l -which have the form of multinomial distributions. To speed up, we follow the method of Contrastive Divergence (CD) [7], in which the MCMC is restarted from the observed data v and stopped after just a few steps for every parameter update. This has been known to introduce bias to the model estimate, but it is often fast and effective for many applications. For the data completion application, in the data we observed only some variables and others are missing. There are two ways to handle a missing variable during training time: one is to treat it as hidden, and the other is to ignore it. In this paper, we follows the latter for simplicity and efficiency, especially when the data is highly sparse 2 . ## 3.1.2 Learning Predictive Models In our MV RBM, a predictive task can be represented by an output variable conditioned on . input variables. Denote by v i the i -th output variable, and v ¬ i the set of input variables, that is, v = ( v , i v ¬ i ). The learning problem is translated into estimating the conditional distribution P v ( i | v ¬ i ). There are three general ways to learn a predictive model. The generative method first learns the joint distribution P v , ( i v ¬ i ) as in the problem of estimating data distribution. The discriminative method, on the other hand, effectively ignores P ( v ¬ i ) and concentrates only on P v ( i | v ¬ i ). In the latter, we typically maximise the conditional likelihood L 2 = ∑ ∑ v i v ¬ i ˜ ( P v , i v ¬ i ) log P ( v i | 2 Ignoring missing data may be inadequate if the missing patterns are not at random. However, treating missing data as zero observations (e.g., in the case of binary variables) may not be accurate either since it may introduce bias to the data marginals. v ¬ i ). This problem is inherently easier than the former because we do not have to make inference about v ¬ i . The learning strategy is almost identical to that of the generative counterpart, except that we clamp the input variables v ¬ i to their observed values. For tasks whose size of the output space is small (e.g., standard binary, ordinal, categorical variables) we can perform exact evaluations and use any non-linear optimisation methods for parameter estimation. The conditional distribution P v ( i | v ¬ i ) can be computed as in Eq. (11). We omit the likelihood gradient here for space limitation. It is often argued that the discriminative method is more preferable since there is no waste of effort in learning P ( v ¬ i ), which we do not need at test time. In our setting, however, learning P ( v ¬ i ) may yield a more faithful representation 3 of the data through the posterior P ( h | v ¬ i ). This suggests a third, hybrid method: combining the generative and discriminative objectives. One way is to optimise a hybrid likelihood: $$\mathcal { L } _ { 3 } = \lambda \sum _ { v _ { \to i } } \tilde { P } ( v _ { \to i } ) \log P ( v _ { \to i } ) + ( 1 - \lambda ) \sum _ { v _ { i } } \sum _ { v _ { \to i } } \tilde { P } ( v _ { i }, v _ { \to i } ) \log P ( v _ { i } \, | \, v _ { \to i } ),$$ where λ ∈ (0 1) is the hyper-parameter controlling the relative contribution of generative and , discriminative components. Another way is to use a 2-stage procedure: first we pre-train the model P ( v ¬ i ) in an unsupervised manner, and then fine-tune the predictive model 4 P ( v i | v ¬ i ). ## 3.2 Prediction Once the model has been learnt, we are ready to perform prediction. We study two predictive applications: completing missing data, and output labels in predictive modelling. The former leads to the inference of P ( v C | v ¬ C ), where v ¬ C is the set of observed variables, and v C is the set of unseen variables to be predicted. Ideally, we should predict all unseen variables simultaneously but the inference is likely to be difficult. Thus, we resort to estimating P v ( i | v ¬ C ), for i ∈ C . The prediction application requires the estimation of P v ( i | v ¬ i ), which is clearly a special case of P v ( i | v ¬ C ), i.e., when C = { } i . The output is predicted as follows $$\hat { v } _ { i } = \arg \max _ { v _ { i } } P ( v _ { i } | v _ { - C } ) = \arg \max _ { v _ { i } } \sum _ { h } P ( v _ { i }, h | v _ { - C } ) ; \quad \text{where} \quad \quad \quad ( 9 )$$ $$P ( v _ { i }, h | v _ { \neg C } ) = \frac { 1 } { Z ( v _ { \neg C }, h ) } \exp \left \{ G _ { i } ( v _ { i } ) + \sum _ { k } \stackrel { \text{-} } { w _ { k } h _ { k } } + \sum _ { j \in \{ \neg C, i \} } \sum _ { k } H _ { j k } ( v _ { j } ) h _ { k } \right \}, \quad ( 1 0 )$$ where Z ( v ¬ C ) is the normalising constant. Noting that h k ∈ { 0 1 , } , the computation of P v ( i | v ¬ C ) can be simplified as $$P ( v _ { i } | v _ { \neg C } ) = \frac { 1 } { Z ( v _ { \neg C } ) } \exp \{ G _ { i } ( v _ { i } ) \} \prod _ { k } \left [ 1 + \frac { \exp \{ H _ { i k } ( v _ { i } ) \} } { 1 / P ( h _ { k } ^ { 1 } | v _ { \neg C } ) - 1 } \right ] \quad ( 1 1 )$$ where P h ( 1 k | v ¬ C ) is computed using Eq. (3) as $$P ( h _ { k } ^ { 1 } | v _ { \neg C } ) = \frac { 1 } { 1 + \exp \{ - w _ { k } - \sum _ { j \in \neg C } H _ { j k } ( v _ { j } ) \} }.$$ 3 As we do not need labels to learn P ( v ¬ i ), this is actually a form of semi-supervised learning . 4 We can also avoid tuning parameters associated with v ¬ i by using the posteriors as features and learn ( v i | ˆ h ) , where ˆ h k = P ( h 1 k | v ¬ i ) . P For the cases of binary, categorical and ordinal outputs, the estimation in Eq. (9) is straightforward using Eq. (11). However, for other output types, suitable simplification must be made: - · For multicategorical and category-ranking variables, we do not enumerate over all possible assignments of v i , but rather in an indirect manner: - -For multiple categories (Section 2.2.1), we first estimate { P i ( a im = 1 | v ¬ i ) } M i m =1 and then output a im = 1 if P i ( a im = 1 | v ¬ i ) ≥ ν for some threshold 5 ν ∈ (0 , 1). glyph[negationslash] - -For category-ranking (Section 2.2.3), we first estimate { P i ( c il glyph[follows] c im | v ¬ i ) } l,m&gt;l . The complete ranking over the set { c i 1 , c i 2 , ..., c iM i } can be obtained by aggregating over probability pairwise relations. For example, the score for c im can be estimated as s c ( im ) = ∑ l = m P i ( c im glyph[follows] c il | v ¬ i ), which can be used for sorting categories 6 . - · For continuous variables, the problem leads to a non-trivial nonlinear optimisation: even for the case of Gaussian variables, P v ( i | v ¬ C ) in Eq. (11) is no longer Gaussian. For efficiency and simplicity, we can take a mean-field approximation by substituting ˆ h k = P h ( 1 k | v ¬ C ) for h k . For example, in the case of Gaussian outputs, we then obtain a simplified expression for P v ( i | v ¬ C ): $$P ( v _ { i } | v _ { \neg C } ) \in \exp \left \{ - \frac { v _ { i } ^ { 2 } } { 2 \sigma _ { i } ^ { 2 } } + U _ { i } v _ { i } + \sum _ { k } V _ { i k } v _ { i } \hat { h } _ { k } \right \},$$ which is also a Gaussian. Thus the optimal value is the mean itself: ˆ v i = σ 2 i ( U i + ∑ k V ik ˆ h k ) . Details of the mean-field approximation is presented in Appendix A.2. ## 4 A Case Study: World Attitudes ## 4.1 Setting In this experiment, we run the MV RBM on a large-scale survey of the general world opinion, . which was published by the Pew Global Attitudes Project 7 in the summer of 2002. The survey was based on interviewing with people in 44 countries in the period of 2001-2002. Some sample questions are listed in Appendix A.1. After some pre-processing, we obtain a dataset of 38 , 263 people, each of whom provides answers to a subset of 189 questions over multiple topics ranging from globalization, democracy to terrorism. Many answers are deliberately left empty because it may be inappropriate to ask certain type of questions in a certain area or ethnic group. Of all answers, 43 are binary, 12 are categorical, 3 are multicategorical, 125 are ordinal, 2 are category-ranking, and 3 are continuous. To suppress the scale difference in continuous responses, we normalise them to zeros means and unit variances 8 . We evaluate each data type separately. In particular, let u be the user index, ˆ v i be the predicted value of the i -th variable, and N t is the number of variables of type t in the test data, we compute the prediction errors as follows: 5 Raising the threshold typically leads to better precision at the expense of recall. Typically we choose ν = 0 5 . when there is no preference over recall nor precision. 6 Note that we do not estimate the event of ties during prediction. 7 http://pewglobal.org/datasets/ 8 It may be desirable to learn the variance structure, but we keep it simple by fixing to unit variance. For more sophisticated variance learning, we refer to a recent paper [13] for more details. | | Baseline | K = 20 | K = 50 | K = 100 | K = 200 | K = 500 | |------------------|------------|----------|----------|-----------|-----------|-----------| | Binary | 32.9 | 23.6 | 20.1 | 16.3 | 13.2 | 9.8 | | Categorical | 52.3 | 29.8 | 22 | 17 | 13.2 | 7.1 | | Multicategorical | 49.6 | 46.6 | 42.2 | 36.9 | 29.2 | 23.8 | | Continuous(*) | 100 | 89.3 | 84.1 | 78.4 | 69.5 | 65.5 | | Ordinal | 25.2 | 19.5 | 16.2 | 13.5 | 10.9 | 7.7 | | Category ranking | 19.3 | 11.7 | 6 | 5 | 3.2 | 2.3 | Table 2: Error rates (%) when reconstructing data from posteriors. The baseline is essentially the MV RBM without hidden layer (i.e., assuming variables are independent). . (*) The continuous variables have been normalised to account for different scales between items, thus the baseline error will be 1 (i.e., the unit variance). $$- \text{Binary} \quad \ \colon \, \frac { 1 } { N _ { k } }$$ $$\colon \, \frac { 1 } { N _ { b i n } } \sum _ { u } \sum _ { i } \mathbb { I } \left [ v _ { i } ^ { ( u ) } \neq \hat { v } _ { i } ^ { ( u ) } \right ],$$ glyph[negationslash] glyph[negationslash] $$- \text{Categorical} \quad \ \colon \, \frac { 1 } { N _ { c c } } \sum _ { u } \sum _ { i } \mathbb { I } \left | v _ { i } ^ { ( u ) } \neq \hat { v } _ { i } ^ { ( u ) } \right |,$$ $$\colon \, \frac { 1 } { N _ { c a t } } \sum _ { u } \sum _ { i } \mathbb { I } \left [ v _ { i } ^ { ( u ) } \neq \hat { v } _ { i } ^ { ( u ) } \right ],$$ $$\begin{array} { c c c c c c c } & & \dots & \cdots & \cdots \\ - \text{Multicategorical} & & \colon & 1 - 2 R P / ( R + P ), \\ & & \\ - \text{Continuous} & & & \colon & \sqrt { \frac { 1 } { D _ { c o n t } } \sum _ { u } \sum _ { i } \left ( v _ { i } ^ { ( u ) } - \hat { v } _ { i } ^ { ( u ) } \right ) ^ { 2 } }, \\ & & \\ - \text{Ordinal} & & & \colon & \frac { 1 } { N _ { o r d } } \sum _ { u } \sum _ { i } \frac { 1 } { M _ { i } - 1 } \left | v _ { i } ^ { ( u ) } - \hat { v } _ { i } ^ { ( u ) } \right |, \\ & & & \cdot & \hat { \wedge } & \hat { \wedge } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gam { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \vec { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \hat { \Gamma } & \acute { \dots } \end{array}$$ $$- \text{Category-ranking } \ \colon \ \frac { 1 } { D _ { r a n k } } \sum _ { u } \sum _ { i } \frac { 2 } { M _ { i } ( M _ { i } - 1 ) } \sum _ { l, m > l } \mathbb { I } \left [ ( \pi _ { i l } ^ { ( u ) } - \pi _ { i m } ^ { ( u ) } ) ( \hat { \pi } _ { i l } ^ { ( u ) } - \hat { \pi } _ { i m } ^ { ( u ) } ) < 0 \right ],$$ where I [ ] · is the identity function, π im ∈ { 1 2 , , ..., M i } is the rank of the m -th category of the i -th variable, R is the recall rate and P is the precision. The recall and precision are defined as: $$R = \frac { \sum _ { u } \sum _ { i } \frac { 1 } { M _ { i } } \sum _ { m = 1 } ^ { M _ { i } } \mathbb { I } \left [ a _ { i m } ^ { ( u ) } = \hat { a } _ { i m } ^ { ( u ) } \right ] } { \sum _ { u } \sum _ { i } \frac { 1 } { M _ { i } } \sum _ { m = 1 } ^ { M _ { i } } a _ { i m } ^ { ( u ) } } ; \quad \ \ \ P = \frac { \sum _ { u } \sum _ { i } \frac { 1 } { M _ { i } } \sum _ { m = 1 } ^ { M _ { i } } \mathbb { I } \left [ a _ { i m } ^ { ( u ) } = \hat { a } _ { i m } ^ { ( u ) } \right ] } { \sum _ { u } \sum _ { i } \frac { 1 } { M _ { i } } \sum _ { m = 1 } ^ { M _ { i } } \hat { a } _ { i m } ^ { ( u ) } },$$ where a im ∈ { 0 1 , } is the m -th component of the i -th multicategorical variable. Note that the summation over i for each type only consists of relevant variables. To create baselines, we use the MV RBM without the hidden layer, i.e., by assuming that . variables are independent 9 . ## 4.2 Results ## 4.2.1 Feature Extraction and Visualisation Recall that our MV RBM can be used as a feature extraction tool through the posterior pro-. jection. The projection converts a multimodal input into a real-valued vector of the form 9 To the best of our knowledge, there has been no totally comparable work addressing the issues we study in this paper. Existing survey analysis methods are suitable for individual tasks such as measuring pairwise correlation among variables, or building individual regression models where complex co-variates are coded into binary variables. Figure 1: t-SNE projection of posteriors ( K = 50) with country information removed. Each point is a person from one of the 10 countries: Angola, Argentina, Bangladesh, Bolivia, Brazil, Bulgaria, Canada, China, Czech Republic, and Egypt. Each colour represents a country. Best viewed in colour. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1160v1-figure-833cff06-1e32-4bf4-b092-0435caa7699e.jpg) ˆ = h ( ˆ h , h 1 ˆ 2 , ..., h ˆ K ) , where ˆ h k = P ( h k = 1 | v ). Clearly, numerical vectors are much easier to process further than the original data, and in fact the vectorial form is required for the majority of modern data handling tools (e.g., for transformation, clustering, comparison and visualisation). To evaluate the faithfulness of the new representation, we reconstruct the original data using ˆ v i = arg max v i P ( v i | ˆ h ) , that is, in Eq. (4), the binary vector h is replaced by ˆ . h The use of P ( v i | ˆ h ) can be reasoned through the mean-field approximation framework presented in Appendix A.2. Table 2 presents the reconstruction results. The trends are not surprising: with more hidden units, the model becomes more flexible and accurate in capturing the data content. For visualisation, we first learn our MV RBM (with . K = 50 hidden units) using randomly chosen 3 830 users, , with the country information removed. Then we use the t-SNE [27] to project the posteriors further into 2D. Figure 1 shows the distribution of people's opinions in 10 countries (Angola, Argentina, Bangladesh, Bolivia, Brazil, Bulgaria, Canada, China, Czech Republic, and Egypt). It is interesting to see how opinions cluster geographically and culturally: Europe &amp; North America (Bulgaria, Canada &amp; Czech Republic), South America (Argentina, Bolivia, Brazil), East Asia (China), South Asia (Bangladesh), North Africa (Egypt) and South Africa (Angola). ## 4.2.2 Data Completion In this task, we need to fill missing answers for each survey response. Missing answers are common in real survey data because the respondents may forget to answer or simply ignore the Table 3: Completion error rates (%) ρ = 0 2 answers missing at random. (*) See Table 2. . | | Baseline | K = 20 | K = 50 | K = 100 | K = 200 | K = 500 | |------------------|------------|----------|----------|-----------|-----------|-----------| | Binary | 32.7 | 26 | 24.2 | 23.3 | 22.7 | 22.3 | | Categorical | 52.1 | 34.3 | 30 | 28.2 | 27.5 | 27.1 | | Multicategorical | 49.5 | 48.3 | 45.7 | 43.6 | 42.4 | 42 | | Continuous(*) | 101.6 | 93.5 | 89.9 | 87.9 | 87.3 | 87.9 | | Ordinal | 25.1 | 20.7 | 19.3 | 18.6 | 18.2 | 17.9 | | Category ranking | 19.3 | 15.4 | 14.7 | 14.2 | 14.1 | 13.9 | Table 4: Predictive error rates (%) with 80 / 20 train/test split. (*) See Table 2. | | Baseline | K = 3 | K = 5 | K = 10 | K = 15 | K = 20 | K = 50 | |-----------------------|------------|---------|---------|----------|----------|----------|----------| | Satisfaction ( bin .) | 26.3 | 18 | 17.7 | 17.7 | 17.8 | 18 | 18 | | Country ( cat .) | 92 | 70.2 | 61 | 21.6 | 11 | 9.9 | 5.9 | | Probs. ( multicat .) | 49.6 | 47.6 | 41.9 | 39.2 | 38.8 | 39.1 | 39.2 | | Age ( cont .*) | 99.8 | 67.3 | 67.6 | 66.3 | 66.4 | 65.8 | 66.3 | | Life ladder ( ord .) | 16.9 | 12.2 | 12.2 | 11.9 | 11.9 | 12.2 | 11.8 | | Dangers ( cat.-rank ) | 31.2 | 27.1 | 24.6 | 24 | 23.2 | 23 | 22.5 | questions. We create an evaluation test by randomly removing a portion ρ ∈ (0 , 1) of answers for each person. The MV RBM is then trained on the remaining answers in a generative fashion . (Section 3.1.1). Missing answers are then predicted as in Section 3.2. The idea here is that missing answers of a person can be interpolated from available answers by other persons. This is essentially a multimodal generalisation of the so-called collaborative filtering problem. Table 3 reports the completion results for a subset of the data. ## 4.2.3 Learning Predictive Models We study six predictive problems, each of which is representative for a data type. This means six corresponding variables are reserved as outputs and the rest as input co-variates. The predictive problems are: (i) satisfaction with the country ( binary ), (ii) country of origin ( categorical , of size 44), (iii) problems facing the country ( multicategorical , of size 11), (iv) age of the person ( continuou s), (v) ladder of life ( ordinal , of size 11), and (vi) rank of dangers of the world ( category-ranking , of size 5). All models are trained discriminatively (see Section 3.1.2). We randomly split the users into a training subset and a testing subset. The predictive results are presented in Table 4. It can be seen that learning predictive models requires far less number of hidden units than the tasks of reconstruction and completion. This is because in discriminative training, the hidden layer acts as an information filter that allows relevant amount of bits passing from the input to the output. Since there is only one output per prediction task, the number of required bits, therefore number of hidden units, is relatively small. In reconstruction and completion, on the other hand, we need many bits to represent all the available information. ## 5 Related Work The most popular use of RBMs is in modelling of individual types, for example, binary variables [5], Gaussian variables [8, 18], categorical variables [21], rectifier linear units [17], Poisson variables [6], counts [20] and Beta variables [13]. When RBMs are used for classification [12], categorical variables might be employed for labeling in additional to the features. Other than that, there has been a model called Dual-Wing RBM for modelling both continuous and binary variables [28]. However, there have been no attempts to address all six data types in a single model as we do in the present paper. The literature on ordinal variables is sufficiently rich in statistics, especially after the seminal work of [14]. In machine learning, on the other hand, the literature is quite sparse and recent (e.g. see [23, 29]) and it is often limitted to single ordinal output (given numerical input covariates). An RBM-based modelling of ordinal variables addressed in [25] is similar to ours, except that our treatment is more general and principled. Mixed-variate modelling has been previously studied in statistics, under a variety of names such as mixed outcomes , mixed data , or mixed responses [22, 4, 24, 15]. Most papers focus on the mix of ordinal, Gaussian and binary variables under the latent variable framework. More specifically, each observed variable is assumed to be generated from one or more underlying continuous latent variables. Inference becomes complicated since we need to integrate out these correlated latent variables, making it difficult to handle hundreds of variables and large-scale datasets. In machine learning, the problem of predicting a single multicategorical variable is also known as multilabel learning (e.g., see [26]). Previous ideas that we have adapted into our context including the shared structure among labels [11]. In our model, the sharing is captured by the hidden layer in a probabilistic manner and we consider many multicategorical variables at the same time. Finally, the problem of predicting a single category-ranked variable is also known as label-ranking (e.g., see [3, 10]). The idea we adopt is the pairwise comparison between categories. However, the previous work neither considered the hidden correlation between those pairs nor attempted multiple category-ranked variables. ## 6 Conclusion We have introduced Mixed-Variate Restricted Boltzmann Machines (MV RBM) as a general-. isation of the RBMs for modelling correlated variables of multiple modalities and types. Six types considered were: binary, categorical, multicategorical, continuous information, ordinal, and category-ranking. We shown that the MV RBM is capable of handling a variety of machine . learning tasks including feature exaction, dimensionality reduction, data completion, and label prediction. We demonstrated the capacity of the model on a large-scale world-wide survey. We plan to further the present work in several directions. First, the model has the capacity to handle multiple related predictive models simultaneously by learning a shared representation through hidden posteriors, thereby applicable to the setting of multitask learning. Second, there may exist strong interactions between variables which the RBM architecture may not be able to capture. The theoretical question is then how to model inter-type dependencies directly without going through an intermediate hidden layer. Finally, we plan to enrich the range of applications of the proposed model. Acknowledgment: We thank anonymous reviewers for insightful comments. ## A Additional Materials ## A.1 Sample Questions - · Q1 ( Ordinal ): How would you describe your day today-has it been a typical day, a particularly good day, or a particularly bad day? - · Q7 ( Binary ): Now thinking about our country, overall, are you satisfied or dissatisfied with the way things are going in our country today? - · Q5 ( Multicategorical ): What do you think is the most important problem facing you and your family today? { Economic problems / Housing / Health / Children and education/Work/Social relations / Transportation / Problems with government / Crime / Terrorism and war / No problems / Other / Don't know / Refused } - · Q10,11 ( Category-ranking ): In your opinion, which one of these poses the greatest/second greatest threat to the world: { the spread of nuclear weapons / religious and ethnic hatred/AIDS and other infectious diseases / pollution and other environmental problems / or the growing gap between the rich and poor } ? - · Q74 ( Continuous ): How old were you at your last birthday? - · Q91 ( Categorical ): Are you currently married or living with a partner, widowed, divorced, separated, or have you never been married? ## A.2 Mean-field Approximation We present here a simplification of P ( v i | v ¬ C ) in Eq. (11) using the mean-field approximation. Recall that P ( v i | v ¬ C ) = ∑ h P ( v , i h | v ¬ C ), where P ( v , i h | v ¬ C ) is defined in Eq. (10). We approximate P ( v , i h | v ¬ C ) by a fully factorised distribution $$Q \left ( v _ { i }, h \, \left | \, v _ { \neg C } \right ) = Q \left ( v _ { i } \, \right | \, v _ { \neg C } \right ) \prod _ { k } Q \left ( h _ { k } \, \right | \, v _ { \neg C } \right ).$$ The approximate distribution Q v , ( i h | v ¬ C ) is obtained by minimising the Kullback-Leibler divergence $$\mathcal { D } _ { K L } \left ( Q \left ( v _ { i }, h \, | \, v _ { \neg C } \right ) \| \, P \left ( v _ { i }, h \, | \, v _ { \neg C } \right ) \right ) = \sum _ { v _ { i } } \sum _ { h } Q \left ( v _ { i }, h \, | \, v _ { \neg C } \right ) \log \frac { Q \left ( v _ { i }, h \, | \, v _ { \neg C } \right ) } { P \left ( v _ { i }, h \, | \, v _ { \neg C } \right ) }$$ with respect to Q v ( i | v ¬ C ) and { Q h ( k | v ¬ C ) } K k =1 . This results in the following recursive relations: $$Q \left ( v _ { i } \, | \, v _ { - C } \right ) \ & \in \ \exp \left \{ G _ { i } ( v _ { i } ) + \sum _ { k } H _ { i k } ( v _ { i } ) Q \left ( h _ { k } \, | \, v _ { - C } \right ) \right \}, \\ Q \left ( h _ { k } \, | \, v _ { - C } \right ) \ & = \ \frac { 1 } { 1 + \exp \{ - w _ { k } - \sum _ { v _ { i } } H _ { i k } ( v _ { i } ) Q \left ( v _ { i } \, | \, v _ { - C } \right ) - \sum _ { j \in \mathcal { C } } H _ { i k } ( v _ { j } ) \} }.$$ Now we make a further assumption that ∣∑ ∣ v i H ik ( v i ) Q v ( i | v ¬ C ) ∣ ∣ glyph[lessmuch] ∣ ∣ ∑ ∣ j ∈¬ C H ik ( v j ) , e.g., ∣ ∣ ∣ when the set ¬ C is sufficiently large. This results in Q h ( k | v ¬ C ) ≈ P ( h k | v ¬ C ) and $$Q \left ( v _ { i } \, | \, v _ { \neg C } \right ) \in \exp \left \{ G _ { i } ( v _ { i } ) + \sum _ { k } H _ { i k } ( v _ { i } ) P \left ( h _ { k } ^ { 1 } \, | \, v _ { \neg C } \right ) \right \},$$ which is essentially the data model P ( v i | h ) in Eq. (4) with h k being replaced by P ( h 1 k | v ¬ C ) . The overall complexity of computing Q v ( i | v ¬ C ) is the same as that of evaluating P ( v i | v ¬ C ) in Eq. (11). However, the approximation is often numerically faster, and in the case of continuous variables, it has the simpler functional form. ## References - [1] J.A. Anderson. Regression and ordered categorical variables. Journal of the Royal Statistical Society. Series B (Methodological) , pages 1-30, 1984. - [2] R.R. Davidson. On extending the Bradley-Terry model to accommodate ties in paired comparison experiments. Journal of the American Statistical Association , 65(329):317-328, 1970. - [3] O. Dekel, C. Manning, and Y. Singer. Log-linear models for label ranking. Advances in Neural Information Processing Systems , 16, 2003. - [4] D.B. Dunson. Bayesian latent variable models for clustered mixed outcomes. Journal of the Royal Statistical Society. Series B, Statistical Methodology , pages 355-366, 2000. - [5] Y. Freund and D. Haussler. Unsupervised learning of distributions on binary vectors using two layer networks. Advances in Neural Information Processing Systems , pages 912-919, 1993. - [6] P.V. Gehler, A.D. Holub, and M. Welling. The rate adapting Poisson model for information retrieval and object recognition. In Proceedings of the 23rd international conference on Machine learning , pages 337-344. ACM New York, NY, USA, 2006. - [7] G.E. Hinton. Training products of experts by minimizing contrastive divergence. Neural Computation , 14:1771-1800, 2002. - [8] G.E. Hinton and R.R. Salakhutdinov. Reducing the dimensionality of data with neural networks. Science , 313(5786):504-507, 2006. - [9] G.E. Hinton and T.J. Sejnowski. Learning and relearning in Boltzmann machines. Parallel distributed processing: Explorations in the microstructure of cognition , 1:282-317, 1986. - [10] E. H¨llermeier, J. F¨rnkranz, W. Cheng, and K. Brinker. Label ranking by learning pairwise u u preferences. Artificial Intelligence , 2008. - [11] S. Ji, L. Tang, S. Yu, and J. Ye. Extracting shared subspace for multi-label classification. In KDD . ACM New York, NY, USA, 2008. - [28] E. Xing, R. Yan, and A.G. Hauptmann. Mining associated text and images with dual-wing harmoniums. In Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence (UAI-2005) . Citeseer, 2005. - [29] S. Yu, K. Yu, V. Tresp, and H.P. Kriegel. Collaborative ordinal regression. In Proceedings of the 23rd international conference on Machine learning , page 1096. ACM, 2006. | [12] | H. Larochelle and Y. Bengio. Classification using discriminative restricted Boltzmann ma- chines. In Proceedings of the 25th international conference on Machine learning , pages 536-543. ACM, 2008. | |--------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [13] | N. Le Roux, N. Heess, J. Shotton, and J. Winn. Learning a generative model of images by factoring appearance and shape. Neural Computation , 23(3):593-650, 2011. | | [14] | P. McCullagh. Regression models for ordinal data. Journal of the Royal Statistical Society. Series B (Methodological) , pages 109-142, 1980. | | [15] | C. McCulloch. Joint modelling of mixed outcome types using latent variables. Statistical Methods in Medical Research , 17(1):53, 2008. | | [16] | M. Mure¸an. s A concrete approach to classical analysis . Springer Verlag, 2008. | | [17] | V. Nair and G.E. Hinton. Rectified linear units improve restricted Boltzmann machines. In Proc. 27th International Conference on Machine Learning , 2010. | | [18] | M.A. Ranzato and G.E. Hinton. Modeling pixel means and covariances using factorized third-order Boltzmann machines. In Proc. of IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pages 2551-2558. IEEE, 2010. | | [19] | R. Salakhutdinov and G. Hinton. Deep Boltzmann machines. In Proceedings of The Twelfth International Conference on Artificial Intelligence and Statistics (AISTATS'09 , volume 5, pages 448-455, 2009. | | [20] | R. Salakhutdinov and G. Hinton. Replicated softmax: an undirected topic model. Advances in Neural Information Processing Systems , 22, 2009. | | [21] | R. Salakhutdinov, A. Mnih, and G. Hinton. Restricted Boltzmann machines for collabo- rative filtering. In Proceedings of the 24th International Conference on Machine Learning (ICML) , pages 791-798, 2007. | | [22] | M.D. Sammel, L.M. Ryan, and J.M. Legler. Latent variable models for mixed discrete and continuous outcomes. Journal of the Royal Statistical Society: Series B (Statistical Methodology) , 59(3):667-678, 1997. | | [23] | A. Shashua and A. Levin. Ranking with large margin principle: Two approaches. Advances in Neural Information Processing Systems , 15, 2002. | | [24] | J.Q. Shi and S.Y. Lee. Latent variable models with mixed continuous and polytomous data. Journal of the Royal Statistical Society: Series B (Statistical Methodology) , 62(1):77- 87, 2000. | | [25] | T.T. Truyen, D.Q. Phung, and S. Venkatesh. Ordinal Boltzmann machines for collaborative filtering. In Twenty-Fifth Conference on Uncertainty in Artificial Intelligence , Montreal, Canada, June 2009. | | [26] | G. Tsoumakas and I. Katakis. Multi-label classification: An overview. International Journal of Data Warehousing and Mining , 3(3):1-13, 2007. | | [27] | L. van der Maaten and G. Hinton. Visualizing data using t-SNE. Journal of Machine Learning Research , 9(2579-2605):85, 2008. |
null
[ "Truyen Tran", "Dinh Phung", "Svetha Venkatesh" ]
2014-08-06T01:43:05+00:00
2014-08-06T01:43:05+00:00
[ "stat.ML", "cs.LG", "stat.ME" ]
Mixed-Variate Restricted Boltzmann Machines
Modern datasets are becoming heterogeneous. To this end, we present in this paper Mixed-Variate Restricted Boltzmann Machines for simultaneously modelling variables of multiple types and modalities, including binary and continuous responses, categorical options, multicategorical choices, ordinal assessment and category-ranked preferences. Dependency among variables is modeled using latent binary variables, each of which can be interpreted as a particular hidden aspect of the data. The proposed model, similar to the standard RBMs, allows fast evaluation of the posterior for the latent variables. Hence, it is naturally suitable for many common tasks including, but not limited to, (a) as a pre-processing step to convert complex input data into a more convenient vectorial representation through the latent posteriors, thereby offering a dimensionality reduction capacity, (b) as a classifier supporting binary, multiclass, multilabel, and label-ranking outputs, or a regression tool for continuous outputs and (c) as a data completion tool for multimodal and heterogeneous data. We evaluate the proposed model on a large-scale dataset using the world opinion survey results on three tasks: feature extraction and visualization, data completion and prediction.
1408.1161v2
## A Simple Alternative to Jet-Clustering Algorithms Howard Georgi 1 Center for the Fundamental Laws of Nature Jefferson Physical Laboratory Harvard University, Cambridge, MA 02138 ## Abstract I describe a class of iterative jet algorithms that are based on maximizing a fixed function of the total 4-momentum rather than clustering of pairs of jets. I describe some of the properties of the simplest examples of this class, appropriate for jets at an e + e -machine. These examples are sufficiently simple that many features of the jets that they define can be determined analytically with ease. The jets constructed in this way have some potentially useful properties, including a strong form of infrared safety. Iterative jet clustering algorithms have become an important tool in the analysis of high-energy scattering experiments (see for example [1], and references therein). In this note, I describe a class of iterative jet algorithms that are based on maximizing a fixed function of the total 4-momentum rather than clustering of pairs of jets. I describe some of the properties of the simplest examples of this class. These examples are sufficiently simple that many features of the jets they define can be determined analytically with ease. The jets constructed in this way have some potentially useful properties, including a strong form of infrared safety. The idea can be stated very simply. Suppose that we have a collection of 4-momenta p µ j that we want to organize into jets. In practice, we will typically be interested in masses √ p p µ j jµ that are small compared to their energies and can be ignored in leading order. This is not necessary for the construction, but it leads to considerable simplification, and we will assume that we can set all the particle masses to zero. The jets will then be particular sets of momenta, α with total jet momenta $$P _ { \alpha } ^ { \mu } & = \sum _ { j \in \alpha } p _ { j } ^ { \mu } & ( 1 ) \\ \dim \lim \lim \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \eta \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \nu \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \nolimits \Delta \Delta \Delta \Delta }$$ The underlying assumption is that we want to combine a collection of lines into a single jet, hence increasing the jet energy, if doing so does not increase 1 [email protected] the jet mass to much. So we choose a 'jet function' J P ( α ) of the total 4momentum of the ensemble that depends only on the total energy, P 0 α and the total mass squared divided by energy: $$J ( P ) = f ( P ^ { 0 }, P ^ { \mu } P _ { \mu } / P ^ { 0 } )$$ We require J P ( ) to have the property that it increases with increasing energy and decreases with increasing m /E 2 . We then find the set α with the maximum value of J . This gives us our highest J jet (note that it is not necessarily the highest energy jet). Then, as usual in an iterative jet construction, the lines in α are removed and the process is repeated until no lines are left. What makes this different from any pair-wise clustering algorithm that I know of is that we maximize over all possible clusters all at once, rather than building up the jet by clustering pairs. One might worry that this will make the procedure unwieldy for events with many particles. But we will see that at least for one very simple form of the jet function, the clustering is local so that the algorithm can be implemented efficiently. Furthermore the boundaries between the jets have very simple properties that I believe will lead to important simplifications in perturbative calculations (and perhaps beyond).[2] I should emphasize that in this note, with a jet function like (2) that depends on energy and mass, rather than transverse mass, I am illustrating the idea for jets at an e + e -machine, ignoring (for simplicity and because I am not sure how to handle it) the additional complication of hadron beams. I will discuss what I believe is the simplest example of this scheme, in which the function has the form $$J _ { \beta } ( P ) = P ^ { 0 } - \beta P ^ { \mu } P _ { \mu } / P ^ { 0 } \text{ for } \beta > 1 \text{ \quad \ \ } \text{ \quad \ } ( 3 ) \\ \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ This is monotonically increasing in E and decreasing in m 2 2 . As we will see, this produces jets with no fixed 'cone size', but as β increases, there is more of a penalty for large jet mass, and so the jets become more collimated and effectively there is a cone size that decreases as β increases. Obviously, for β = 0, everything gets included in one 'jet', so this is not particularly interesting. But β &gt; 1 is interesting and we will be able to understand why analytically. Let us first consider some general properties of the jet with the largest J β . Iterating this will give us interesting information about all the jets. 2 This is also true for 0 &lt; β ≤ 1, but we need β &gt; 1 for the analysis below. So we suppose that $$P _ { \alpha } ^ { \mu } & \equiv \sum _ { j \in \alpha } p _ { j } \\ \text{ons that}$$ maximizes J β . It is obvious that $$\beta \, P _ { \alpha } ^ { 2 } < P _ { \alpha } ^ { 0 ^ { 2 } }$$ We must have J β ( P ) &gt; 0, because there are always positive J β s (for example single particles) and (5) follows immediately. Then we can write $$( \beta - 1 ) P _ { \alpha } ^ { 0 ^ { 2 } } < \beta \, P _ { \alpha } ^ { 2 }$$ where P α = | /vector P α | . Hence $$P _ { \alpha } > \sqrt { \frac { \beta - 1 } { \beta } } \, P _ { \alpha } ^ { 0 }$$ This shows that for large β , the jets are necessarily nearly light-like. If there is only one line in the jet, (7) is automatically satisfied for any β &gt; 1. Suppose that there is more than one line in α and consider a line with 4-momentum p µ j for any j ∈ α . Because both p µ j and the rest of the 4-momentum of the jet, P µ α -p µ j have lower J β than P µ α by assumption, we can write $$J _ { \beta } ( P _ { \alpha } ) > \max \left ( J _ { \beta } ( P _ { \alpha } - p _ { j } ) \,, \, J _ { \beta } ( p _ { j } ) \right ) \, \quad \, \quad \, \quad \, ( 8 ) \, \\. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \,.$$ Let z be the cosine of the angle between /vector p j and the jet direction /vector P α . It is also convenient to define a 'jet velocity' $$v _ { \alpha } \equiv P _ { \alpha } / P _ { \alpha } ^ { 0 }$$ and the fraction of the jet energy carried by line j $$r _ { j } \equiv E _ { j } / P _ { \alpha } ^ { 0 }$$ From (7), we know $$\sqrt { \frac { \beta - 1 } { \beta } } < v _ { \alpha } < 1$$ and of course from energy conservation, $$0 < r _ { j } < 1$$ In terms of v α and r j , (8) becomes $$1 - \beta \left ( 1 - v _ { \alpha } ^ { 2 } \right ) & > \max \left ( 1 - r _ { j } - \beta \frac { 1 - v _ { \alpha } ^ { 2 } - 2 r _ { j } ( 1 - z \, v _ { \alpha } ) } { 1 - r _ { j } }, r _ { j } \right ) \quad \ \ ( 1 3 ) \\ \intertext { r m \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \dots \colon = \colon \delta \end{array}$$ This immediately implies a stronger bound on v α that (7): $$P _ { \alpha } / P _ { \alpha } ^ { 0 } = v _ { \alpha } > \sqrt { 1 - \frac { 1 - r _ { j } } { \beta } } \\ \dots \quad \tau \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \ddots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots\cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cdot \dots \cd. \end{array}$$ This is not a surprise. It is obvious that if the jet contains a massless particle carrying most of the energy, it is nearly light-like. It is also clear that as r j → 1, z → 1, just by 4-momentum conservation. This means that the bound on jet 'size' in the sense of the largest possible angle of a particle in the jet from the jet direction is determined by the soft particles in the jet. (13) also gives $$z > \frac { \beta ( 1 + v _ { \alpha } ^ { 2 } ) - ( 1 - r _ { j } ) } { 2 \beta v _ { \alpha } }$$ or in terms of the angle θ between /vector p j and the jet direction $$2 \sin \frac { \theta } { 2 } < \sqrt { \frac { 1 - r _ { j } - \beta ( 1 - v _ { \alpha } ) ^ { 2 } } { \beta v _ { \alpha } } }$$ So the maximum angular size of the jet is obtained for soft lines, r j → 0, and also depends on the jet velocity. The maximum angular size of the jet is given by and it goes to $$2 \arcsin \left ( \frac { 1 } { 2 \sqrt { \beta } } \right ) \text{ as } v _ { \alpha } \rightarrow 1$$ $$2 \arcsin \left ( 1 - \sqrt { 1 - 1 / \beta } \right ) & \text{as } v _ { \alpha } \rightarrow \sqrt { 1 - 1 / \beta } \text{ \quad \ \ } ( 1 8 ) \\ \text{mmarizing the most important result so far, we have found that all the}$$ Summarizing the most important result so far, we have found that all the lines in the highest J β jet are inside a cone of angle $$\Theta ( \beta, v _ { \alpha } ) \equiv 2 \arcsin \left ( \sqrt { \frac { 1 - \beta ( 1 - v _ { \alpha } ) ^ { 2 } } { 4 \beta v _ { \alpha } } } \right ) \quad \ \ ( 1 9 )$$ $$\leq 2 \arcsin \left ( 1 - \sqrt { 1 - 1 / \beta } \right ) \right ) \right ) ^ { \prime } \,, \quad \, \quad \, ( 2 0 ) \\.$$ around the jet direction. We now go on to discuss the particles that are NOT in the highest J β jet. For a particle with p µ j for j ∈ α , the relations look very similar to (8, 13). /negationslash $$J _ { \beta } ( P _ { \alpha } ) > \max \left ( J _ { \beta } ( P _ { \alpha } + p _ { j } ) \,, \, J _ { \beta } ( p _ { j } ) \right )$$ or $$1 - \beta \left ( 1 - v _ { \alpha } ^ { 2 } \right ) & > \max \left ( 1 + r _ { j } - \beta \frac { 1 - v _ { \alpha } ^ { 2 } + 2 r _ { j } ( 1 - z \, v _ { \alpha } ) } { 1 + r _ { j } }, r _ { j } \right ) \\ \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{body}$$ Note that in this case, while energy conservation does not require r j &lt; 1, (22) does. (13) also gives $$\lambda _ { 2 } & z < \frac { \beta ( 1 + v _ { \alpha } ^ { 2 } ) - ( 1 + r _ { j } ) } { 2 \beta v _ { \alpha } }$$ or in terms of the angle θ between /vector p j and the jet direction $$2 \sin \frac { \theta } { 2 } > \sqrt { \frac { 1 + r _ { j } - \beta ( 1 - v _ { \alpha } ) ^ { 2 } } { \beta v _ { \alpha } } } > 2 \sin \frac { \Theta ( \beta, v _ { \alpha } ) } { 2 }$$ This immediately implies that all other particle lines are outside the cone of angular size Θ( β, v α ) around the highest β jet. Furthermore, the particles not in the jet can only approach the jet boundary as r j → 0 - that is only for infinitely soft particles. Thus even though we did not impose a cone size, the jet function J β did so for us, at least for the highest J β jet. Particles in the jet are inside the cone. Particles not in the jet are outside the cone. The cone size Θ( β, v α ) varies slightly over the allowed range of v α , but for large β goes to 1 / √ β . Because of this clean separation between the jet defined by J β and all the other particles, iterating the procedure is absolutely no problem. The jets produced by the procedure are all non-overlapping and bounded by cones of size less than Θ( β, v α ) (each with its own v α of course). This also insures the IR safety of this procedure. All particles in a particular direction must obviously be in the same jet. In fact, the procedure is VERY IR safe, because particles near the boundary of the cone must get arbitrarily soft. The relation (18) means that the jets are localized for large β , so one does not have to calculate J β for all subsets. Instead, the 4 π solid angle can be divided into fiducial regions in any convenient way, and the jets in each fiducial region can be found by looking only at the fiducial region plus the border region within an angle 2 arcsin ( 1 -√ 1 -1 /β ) of the boundary. This procedure will also give fake jets with direction outside the fiducial region, which should simply be ignored. But for large β , this should enable an enormous improvement in jet-finding efficiency. I hope I have convinced the reader that the new jet algorithm I am proposing is simple and interesting. It remains to be seen whether it is useful. In closing it is worth emphasizing again that since we have considered a jet function that depends on energy and mass, we are focusing here on a situation like that at an e + e -machine where all the jets are on the same footing. Hadron beams and their associated jets introduce an additional complication. It is important to try and generalize this method to hadron colliders because, at least for the moment, that is where all the action is. ## Acknowledgements I am very grateful to Matthew Schwartz and Ilye Feige for many informative conversations about jets, to Steve Ellis for a reality check and to Jakub Scholtz for catching a minor misstatement in the first version, and to Jesse Thaler for helpful comments. I am also extremely grateful to the Invisibles , including Belen Gavela and Pilar Hernandez whose invitation to the Invisibles Summer School and Workshop was an important motivation for this work. This work grew initially out of a three-year-long effort with Greg Kestin and Aqil Sajjad to construct an effective field theory on the light shell. I am grateful for their help during this ongoing process. This research has been supported in part by the National Science Foundation under grants PHY1067976 and PHY-1418114. ## References - [1] M. Dasgupta, A. Fregoso, S. Marzani, and G. P. Salam, 'Towards an understanding of jet substructure,' JHEP 1309 (2013) 029, arXiv:1307.0007 [hep-ph] . - [2] R. Kelley, J. R. Walsh, and S. Zuberi, 'Disentangling Clustering Effects in Jet Algorithms,' arXiv:1203.2923 [hep-ph] .
null
[ "Howard Georgi" ]
2014-08-06T01:51:46+00:00
2014-08-31T10:32:34+00:00
[ "hep-ph" ]
A Simple Alternative to Jet-Clustering Algorithms
I describe a class of iterative jet algorithms that are based on maximizing a fixed function of the total 4-momentum rather than clustering of pairs of jets. I describe some of the properties of the simplest examples of this class, appropriate for jets at an $e^+e^-$ machine. These examples are sufficiently simple that many features of the jets that they define can be determined analytically with ease. The jets constructed in this way have some potentially useful properties, including a strong form of infrared safety.
1408.1162v1
## MCMC for Hierarchical Semi-Markov Conditional Random Fields Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh Department of Computing, Curtin University of Technology, Australia { t.tran2,d.phung,s.venkatesh @curtin.edu.au } Hung H. Bui Artificial Intelligence Center, SRI International, USA [email protected] ## Abstract Deep architecture such as hierarchical semi-Markov models is an important class of models for nested sequential data. Current exact inference schemes either cost cubic time in sequence length, or exponential time in model depth. These costs are prohibitive for large-scale problems with arbitrary length and depth. In this contribution, we propose a new approximation technique that may have the potential to achieve sub-cubic time complexity in length and linear time depth, at the cost of some loss of quality. The idea is based on two well-known methods: Gibbs sampling and Rao-Blackwellisation. We provide some simulation-based evaluation of the quality of the RGBS with respect to run time and sequence length. ## 1 Introduction Hierarchical Semi-Markov models such as HHMM [6] and HSCRF [17] are deep generalisations of the HMM [12] and the linear-chain CRF [10], respectively. These models are suitable for data that follows nested Markovian processes, in that a state in a subMarkov chain is also a Markov chain at the child level. Thus, in theory, we can model arbitrary depth of semantics for sequential data. The models are essentially members of the Probabilistic Context-Free Grammar family with bounded depth. However, the main drawback of these formulations is that the inference complexity, as inherited from the Inside-Outside algorithm of the Context-Free Grammars, is cubic in sequence length. As a result, this technique is only appropriate for short data sequences, e.g. in NLP we often need to limit the sentence length to, says, 30. There exists a linearisation technique proposed in [11], in that the HHMM is represented as a Dynamic Bayesian Network (DBN). By collapsing all states within each time slice of the DBN, we are able achieve linear complexity in sequence length, but exponential complexity in depth. Thus, this technique cannot handle deep architectures. In this contribution, we introduce an approximation technique using Gibbs samplers that have a potential of achieving sub-cubic time complexity in sequence length and linear time in model depth. The idea is that, although the models are complex, the nested property allows only one state transition at a time across all levels. Secondly, if all the state transitions are known, then the model can be collapsed into a Markov tree, which is efficient to evaluate. Thus the trick is to sample only the Markov transition at each time step and integrating over the state variables. This trick is known as RaoBlackwellisation, which has previously been applied for DBNs [5]. Thus, we call this method Rao-Blackwellisation Gibbs Sampling (RBGS). Of course, as a MCMC method, the price we have to pay is some degradation in inference quality. ## 2 Background ## 2.1 Hierarchical Semi-Markov Conditional Random Fields Recall that in the linear-chain CRFs [10], we are given a sequence of observations o = ( o , o 1 2 , ..., o T ) and a corresponding sequence of state variables x = ( x , x 1 2 , ..., x T ). The model distribution is then defined as $$P ( { \mathbf x } | { \mathbf o } ) = \frac { 1 } { Z ( { \mathbf o } ) } \prod _ { t = 1 } ^ { T - 1 } \phi _ { t } ( x _ { t }, x _ { t + 1 }, { \mathbf o } )$$ where φ t ( x , x t t +1 , o ) &gt; 0 are potential functions that capture the association between o and { x , x t t +1 } as well as the transition between state x t to state x t +1 , and Z ( o ) is the normalisation constant. Thus, given the observation o , the model admits the Markovian property in that P x ( t | x ¬ t ) = P x ( t | x t -1 , x t +1 ), where x ¬ t is a shorthand for x \ x t . This is clearly a simplified assumption but it allows fast inference in O ( T ) time, and more importantly, it has been widely proved useful in practice. On the other hand, in some applications where the state transitions are not strictly Markovian, i.e. the states tend to be persistent for an extended time. A better way is to assume only the transition between parent-states s = ( x , x t t +1 , ..., x t + l ), whose elements are not necessarily Markovian. This is the idea behind the semi-Markov model, which has been introduced in [14] in the context of CRFs. The inference complexity of the semi-Markov models is generally O ( T 2 ) since we have to account for all possible segment lengths. The Hierarchical Semi-Markov Conditional Random Field (HSCRF) is the generalisation of the semi-Markov model in the way that the parent-state is also an element of the grandparent-state at the higher level. In effect, we have a fractal sequential architecture, in that there are multiple levels of detail, and if we examine one level, it looks exactly like a Markov chain, but each state in the chain is a sub-Markov chain at the lower level. This may capture some real-world phenomena, for example, in NLP we have multiple levels such as character, unigram, word, phrase, clause, sentence, paragraph, section, chapter and book. The price we pay for these expressiveness is the increase in inference complexity to O ( T 3 ). One of the most important properties that we will exploit in this contribution is the nestedness , in that a parent can only transits to a new parent if its child chain has terminated. Conversely, when a child chain is still active, the parent state must stay the same. For example, in text when a noun-phrase is said to transit to a verb-phrase, the subsequence of words within the noun-phase must terminate, and at the same time, the noun-phrase and the verb-phrase must belong to the same clause. The parent-child relations in the HSCRF can be described using a state hierarchical topology. Figure 1 depicts a three-level topology, where the top, middle and bottom levels have two, four, and three states respectively. Each child has multiple parents and each parent may share the same subset of children. Note that, this is already a generalisation over the topology proposed in the original HHMM [6], where each child has exactly one parent. Figure 1: State topological structure in HSCRFs. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-4e20da9a-8bd0-4362-bace-3095de24f97f.jpg) ## 2.2 MCMC Methods In this subsection, we briefly review the two ideas that would lead to our proposed approximation method: the Gibbs sampling (e.g. see [7]) and Rao-Blackwellisation (e.g. see [3]). The main idea behind Gibbs sampling is that, given a set of variables x = ( x , x 1 2 , ..., x T ) we can cyclically sample one variable at a time given the rest of variables, i.e. $$\tilde { x } _ { t } \ \sim \ P ( x _ { t } | \mathbf x _ { \neg t } )$$ and this will eventually converge to the true distribution P ( x ). This method is effective if the conditional distribution P x ( t | x ¬ t ) is easy to compute and sample from. The main drawback is that it can take a long time to converge. Rao-Blackwellisation is a technique that can improve the quality of sampling methods by only sampling some variables and integrating over the rest. Clearly, Rao-Blackwellisation is only possibly if the integration is easy to perform analytically. Specifically, supposed that we have the decomposition x = ( v h , ) and the marginalisation P ( v ) = ∑ h P ( v h , ) can be evaluated efficiently for each v , then according to the Rao-Blackwell theorem, sampling v from P ( v ) would yield smaller variance than sampling both ( v h , ) from P ( v h , ). ## 3 Rao-Blackwellised Gibbs Sampling In the HSCRFs, we only specify the general topological structure of the states, as well as the model depth D and length T . The dynamics of the models are then automatically realised by multiple events : (i) the the parent starts its life by emitting a child, (ii) the child, after finishing its role, transits to a new child, and (iii) when the child Markov chain terminates , it returns control to the parent. At the beginning of the sequence, the emission is activated from the top down to the bottom. At the end of the sequence, the termination first occurs at the bottom level and then continues to the top. The main complication is that since the dynamics is not known beforehand, we have to account for every possible event when doing inference. Fortunately, the nested property discussed in Section 2.1 has two important implications that would help to avoid explicitly enumerating these exponentially many events. Firstly, for any model of depth D , there is exactly one transition occurring at a specific time t . This is because, suppose the transition occurs at level d then all the states at d ′ above it (i.e. d ′ &lt; d ) must stay the same, and all the states at level d ′′ below it (i.e. d ′′ &gt; d ) must have already ended. Secondly, suppose that all the transitions at any time 1 ≤ t ≤ T are known then the whole model can be collapsed into a Markov tree, which is efficient to evaluate. These implications have more or less been exploited in a family of algorithms known as InsideOutside , which has the complexity of O ( T 3 ). In this section, we consider the case that the sequence length T is sufficiently large, e.g. T ≥ 50, then the cubic complexity is too expensive for practical problems. Let us denote by e = ( e , e 1 2 , .., e T ) the set of transitions, i.e. e t = d for some 1 ≤ d ≤ D . These transition variables, together with the state variables x and the observational o completely specify the variable configuration of the model, which has the probability of $$P ( { \mathbf x }, { \mathbf e } | { \mathbf o } ) = \frac { 1 } { Z ( { \mathbf o } ) } \Phi ( { \mathbf x }, { \mathbf e }, { \mathbf o } )$$ where Φ( x e o , , ) is the joint potential function. The idea of Rao-Blackwellised Gibbs Sampling is that, if we can efficiently estimate the transition levels { e t } at any time t , then the model evaluation using P ( x e o | , ) is feasible since the model is now essentially a Markov tree. Thus, what remains is the estimation of { e t } from P ( e o | ) = ∑ x P ( x e o , | ). It turns out that although we cannot enumerate P ( e o | ) for all e ∈ { 1 2 , , ..., D } T directly, the following quantities can be inexpensive to compute $$P ( e _ { t } | e _ { \neg t }, \mathbf o ) \in \sum _ { x } P ( e _ { t }, \mathbf x | e _ { \neg t }, \mathbf o )$$ This suggests that we can use the Gibbs sampler to obtain samples of e . This is RaoBlackwellisation because of the integration over x , that is, we sample e without the need for sampling x . It should be stressed that the straightforward implementation may be expensive if we sum over x for every e t for 1 ≤ t ≤ T . Fortunately, there is a better way, in that we proceed from left-to-right using an idea known as walking-chain [2], which is essentially a generalisation of the forward-backward procedure. For space limitations, we omit the derivation and interested readers may consult [16, Ch. 9] for more detail. The overall result is that we can obtain a full sample of { e t } for all t in DT time. We note in passing that the walking-chain was originally introduced in the context of the Abstract Hidden Markov Model (AHMM), which does not model the duration of the state persistence while the HSCRF does. Secondly, as the HSCRF is undirected, its factorisation of potentials does not have any probabilistic interpretation as in the AHMM. ## 4 Evaluation Using the HHMM simulator previously developed in [1] we generate data according to some fixed parameters and topology (Figure 2). Specifically, the model has the depth Figure 2: Topology used in experiments ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-58bad0c7-3df5-48b5-b602-5edd88ddc5d5.jpg) of D = 4 and sequence length of T = 30, state size of { 1 2 4 7 , , , } for the four semantic levels, respectively. At the bottom level, 3 observation symbols that are outputted in a generative manner. We generate 50 training sequences for learning and 50 for testing. First, we learn the HSCRF parameters from the training data. Note that the HSCRF is discriminative, the learned model may not correspond to the original HHMM that generates the data. Given the learned HSCRF, we perform various inference tasks with the testing data. We compare the results of Rao-Blackwellised Gibbs sampling introduced in this paper against the exact inference using the Inside-Outside algorithm described in [17]. For sampling, first we run the sampler for a 'burn-in' period of time, and then discard those samples. The purpose of this practice is to let the sampler 'forget' about the starting point to eliminate some possible bias. The burn-in time is set to about 10% of the total iterations. We want to examine the accuracy of the proposed approximation against the exact methods, along the three dimensions: (i) the state marginals P x ( d t | o ) at time t and depth level d , (ii) the probability P e ( t | o ) that a transition occurs at time t , and (iii) the decoding accuracy using ˆ x d t = arg max x d t P x ( d t | o ). For the first two estimations, two accuracy measures are used: a) the average Kullback-Leibler divergence between state marginals and b) the average absolute difference in state marginals. For decoding evaluation, we use the percentage of matching between the maximal states. Convergence behaviours for a fixed sequence length: Figures 3 and 4 show the three measures using the one-long-run strategy (up to 5000 iterations). It appears that both the KL-divergence and absolute difference continue to decrease, although it occurs at an extremely slow rate after 500 iterations. The maximal state measure is interesting: it quickly reaches the high accuracy after just 10 iterations. In other words, the mode of the state marginal P x ( d t | o ) is quickly located although the marginal has yet to converge. Convergence as a function of sequence length: To test how the RBGS scales, three experiments with different run times are performed: - · The number of iterations is fixed at 100 for all sequence lengths. This gives us a linear run time in term of T . - · The number of iterations scales linearly with T , and thus the total cost is O ( T 2 ). - · The number of iterations scales quadratically with T . This costs O ( T 3 ), which means no saving compared to the exact inference. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-7e2bc0f8-3896-4909-9269-faff1d5c6a25.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-e74063a7-8014-4a41-80a5-f21b53a64d1f.jpg) Figure 3: Divergence between the Gibbs estimation and the true marginals: (a) KLdivergence, and (b) l 1 -norm difference. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-d76e45ec-a4f5-4ccd-ba32-dcd8bc6f9ee4.jpg) iteration Figure 4: Accuracy in term of maximal marginal states. The long data is obtained by simply concatenating the original sequences many times. The sequence lengths are { 20; 40; 60; 80; 100 } . Figure 5(a,b) show the performance of the RBGS in linear run-time with respect to sequence length. Figure 5a depicts the actual run-time for the exact and RBGS inference. Figure 5b plots the KL-divergences between marginals obtained by the exact method and by the RBGS. Performance of the RBGS for quadratic and cubic run-times is shown in Figure 6(a,b) and Figure 7(a,b), respectively. ## 5 Relations with Other Deep Architectures Deep neural architectures (DNA) such as Deep Belief Networks [9] and Deep Boltzmann Machines [13] have recently re-emerged as a powerful modelling framework which can potentially discover high-level semantics of the data. The HSCRF shares some similarity with the DNA in the way that they both use stacking of simpler building blocks. The Figure 5: Performance of RBGS in linear run-time w.r.t. sequence length. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-5c398fdf-6939-496e-817c-77522354403e.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-6a6cc04b-83a3-4889-a7bb-8a814b4769b0.jpg) Figure 6: Performance of RBGS in quadratic run-time w.r.t. sequence length. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-ea58ed69-66c9-4ac5-8976-ff8063e1c486.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-8a7a7f32-66c2-4cac-a988-464be5af7a77.jpg) purpose is to capture long-range dependencies or higher-order correlations which are not directly evident in the raw data. The building blocks in the HSCRF are the chain-like Conditional Random Fields, while they are the Restricted Boltzmann Machines in the DNA. These building blocks are different, and as a result, the HSCRF is inherently sequential and localised in state representation, while the DNA was initially defined for non-sequential data and distributed representation. In general, the distributed representation is richer as it carries more bits of information given a number of hidden units. The drawback is that probabilistic inference of RBM and its stacking is intractable, and thus approximation techniques such as MCMC and mean-field are often used. Inference in the HSCRF, on the other hand, is polynomial. For approximation, the MCMC technique proposed for the HSCRF in this paper exploits the efficiency in localised state representation so that the Rao-Blackwellisation can be used. Perhaps the biggest difference between the HSCRF and DNA is the modelling purpose. More specifically, the HSCRF is mainly designed for discriminative mapping between the sequential input and the nested states, usually in a fully supervised fashion. The states often have specific meaning (e.g. noun-phrase, verb-phrase in sentence modelling). On the Figure 7: Performance of RBGS in cubic run-time w.r.t. sequence length. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-43be43bb-39f1-42ed-a0f3-59855949f34b.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1162v1-figure-7adfc08d-5e1b-4ef6-841c-244f7376c6f9.jpg) other hand, DNA is for discovering hidden features, whose meanings are often unknown in advance. Thus, it is generative and unsupervised in nature. Finally, despite this initial difference, the HSCRF can be readily modified to become a generative and unsupervised version, such as the one described in [16, Ch. 9]. Training in HSCRFs can be done simultaneously across all levels, while for the DNA it is usually carried out in a layer-wise fashion. The drawback of the layer-wise training is that errors made by the lower layers often propagate to the higher. Consequently, an extra global fine tuning step is often employed to correct them. There have been extensions of the Deep Networks to sequential patterns such as Temporal Restricted Boltzmann Machines (TRBM) [15] and some other variants. The TRBM is built by stacking RBMs both in depth and time. Another way to build deep sequential model is to feed the top layer of the Deep Networks into the chain-like CRF, as in [4]. ## 6 Conclusion Wehave introduced a novel technique known as Rao-Blackwellised Gibbs Sampling (RBGS) for approximate inference in the Hierarchical Semi-Markov Conditional Random Fields. The goal is to avoid both the cubic-time complexity in the standard Inside-Outside algorithms and the exponential states in the DBN representation of the HSCRFs. We provide some simulation-based evaluation of the quality of the RGBS with respect to run time and sequence length. This work, however, is still at an early stage and there are promising directions to follow. First, there are techniques to speed up the mixing rate of the MCMC sampler. Second, the RBGS can be equipped with the Contrastive Divergence [8] for stochastic gradient learning. And finally, the ideas need to be tested on real, large-scale applications with arbitrary length and depth. ## References - [1] H. H. Bui, D. Q. Phung, and S. Venkatesh. Hierarchical hidden Markov models with general state hierarchy. In D. L. McGuinness and G. Ferguson, editors, Proceedings of the 19th National Conference on Artificial Intelligence (AAAI) , pages 324-329, San Jose, CA, Jul 2004. - [2] H. H. Bui, S. Venkatesh, and G. West. Policy recognition in the abstract hidden Markov model. Journal of Artificial Intelligence Research , 17:451-499, 2002. - [3] G. Casella and C.P. Robert. Rao-Blackwellisation of sampling schemes. Biometrika , 83(1):81, 1996. - [4] Trinh-Minh-Tri Do and Thierry Artieres. Neural conditional random fields. In NIPS Workshop on Deep Learning for Speech Recognition and Related Applications , 2009. - [5] A. Doucet, N. de Freitas, K. Murphy, and S. Russell. Rao-Blackwellised particle filtering for dynamic Bayesian networks. In Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence , pages 176-183. Citeseer, 2000. - [6] Shai Fine, Yoram Singer, and Naftali Tishby. The hierarchical hidden Markov model: Analysis and applications. Machine Learning , 32(1):41-62, 1998. - [7] S. Geman and D. Geman. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI) , 6(6):721-742, 1984. - [8] G.E. Hinton. Training products of experts by minimizing contrastive divergence. Neural Computation , 14:1771-1800, 2002. - [9] G.E. Hinton and R.R. Salakhutdinov. Reducing the dimensionality of data with neural networks. Science , 313(5786):504-507, 2006. - [10] J. Lafferty, A. McCallum, and F. Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In Proceedings of the International Conference on Machine learning (ICML) , pages 282-289, 2001. - [11] K. Murphy and M. Paskin. Linear time inference in hierarchical HMMs. In Advances in Neural Information Processing Systems (NIPS) , volume 2, pages 833-840. MIT Press, 2002. - [12] Lawrence R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE , 77(2):257-286, 1989. - [13] R. Salakhutdinov and G. Hinton. Deep Boltzmann Machines. In Proceedings of 20th AISTATS , volume 5, pages 448-455, 2009. - [14] Sunita Sarawagi and William W. Cohen. Semi-Markov conditional random fields for information extraction. In Bottou L Saul LK, Weiss Y, editor, Advances in Neural Information Processing Systems 17 , pages 1185-1192. MIT Press, Cambridge, Massachusetts, 2004. - [15] I. Sutskever and G.E. Hinton. Learning multilevel distributed representations for high-dimensional sequences. In Proceeding of the Eleventh International Conference on Artificial Intelligence and Statistics , pages 544-551, 2007. - [16] Tran The Truyen. On Conditional Random Fields: Applications, Feature Selection, Parameter Estimation and Hierarchical Modelling . PhD thesis, Curtin University of Technology, 2008. - [17] T.T. Truyen, D.Q. Phung, H.H. Bui, and S. Venkatesh. Hierarchical Semi-Markov Conditional Random Fields for recursive sequential data. In Twenty-Second Annual Conference on Neural Information Processing Systems (NIPS) , Vancouver, Canada, Dec 2008.
null
[ "Truyen Tran", "Dinh Phung", "Svetha Venkatesh", "Hung H. Bui" ]
2014-08-06T02:04:43+00:00
2014-08-06T02:04:43+00:00
[ "stat.ML", "cs.LG", "stat.ME" ]
MCMC for Hierarchical Semi-Markov Conditional Random Fields
Deep architecture such as hierarchical semi-Markov models is an important class of models for nested sequential data. Current exact inference schemes either cost cubic time in sequence length, or exponential time in model depth. These costs are prohibitive for large-scale problems with arbitrary length and depth. In this contribution, we propose a new approximation technique that may have the potential to achieve sub-cubic time complexity in length and linear time depth, at the cost of some loss of quality. The idea is based on two well-known methods: Gibbs sampling and Rao-Blackwellisation. We provide some simulation-based evaluation of the quality of the RGBS with respect to run time and sequence length.
1408.1163v3
2 ## Fate of the false vacuum: towards realization with ultra-cold atoms O. Fialko , 1 B. Opanchuk , A. I. Sidorov , P. D. Drummond , J. Brand 2 2 2 3 1 Institute of Natural and Mathematical Sciences and Centre for Theoretical Chemistry and Physics, Massey University, Auckland, New Zealand Centre for Quantum and Optical Science, Swinburne University of Technology, Melbourne 3122, Australia and 3 Dodd-Walls Centre for Photonic and Quantum Technologies, New Zealand Institute for Advanced Study, and Centre for Theoretical Chemistry and Physics, Massey University, Auckland, New Zealand Quantum decay of a relativistic scalar field from a false vacuum is a fundamental idea in quantum field theory. It is relevant to models of the early Universe, where the nucleation of bubbles gives rise to an inflationary universe and the creation of matter. Here we propose a laboratory test using an experimental model of an ultra-cold spinor Bose gas. A false vacuum for the relative phase of two spin components, serving as the unstable scalar field, is generated by means of a modulated radiofrequency coupling of the spin components. Numerical simulations demonstrate the spontaneous formation of true vacuum bubbles with realistic parameters and time-scales. As proposed by Coleman in a seminal paper [1], the false vacuum is a metastable state of the relativistic scalar field that can decay by quantum tunneling, locally forming bubbles of true vacuum that expand at the speed of light. It has a close analogy with the ubiquitous phenomenon of bubble nucleation during a first order phase transition in condensed matter [2], e.g. the spontaneous creation of vapor bubbles in superheated water [3]. Applied to a quantum field such as the inflaton or Higgs field, bubble nucleation is an event of cosmological significance in some early universe models. Indeed, the Coleman decay scenario of the inflaton field features prominently in the theory of eternal inflation [4, 5], where bubbles continuously nucleating from a false vacuum grow into separate universes, each subsequently undergoing exponential growth of space [6]. This scenario, which could potentially explain the value of the cosmological constant by the anthropic principle, is currently being tested against observational evidence in astrophysical experiments [7, 8]. For an observer inside the bubble, the tunneling event - occurring in the observer's past - appears like a cosmological 'big-bang', prior to inflation. From a theoretical point of view, quantum tunneling from a false vacuum is a problem that can only be solved approximately [1, 9] (except for simplified models [10]) due to the exponential complexity of quantum field dynamics. This motivates the search for an analog quantum system that is accessible to experimental scrutiny, to test these models. The utility of such experiments, which complement astrophysical investigations, is that they would provide data that allow verification of widely used approximations inherent in current theories [11]. Here we demonstrate how to use an ultra-cold atomic two-component Bose-Einstein condensate (BEC) as a quantum simulator that generates a decaying, relativistic false vacuum. Quantum field dynamics occurs for the relative phase of two spin components that are linearly coupled by a radio-frequency field. In this proposal the speed of sound in the condensate models the speed of light, and the 'universe' is less than a millimeter across. Domains of true vacuum are observable using interferometric techniques [12] over millisecond time-scales with realistic parameters. Modulating the radio-frequency coupling in time allows one to create a metastable vacuum from an otherwise unstable one [13] following Kapitza's famous idea for stabilizing the unstable point of a pendulum by rocking the pivot point [14]. Our proposal requires repulsive intra-component interactions to dominate over intercomponent interactions. To achieve this, we have identified a Feshbach resonance of 41 K with a zero crossing for the inter-component s -wave scattering. Similar couplings in lower dimensions can also be achieved with a transverse double-well potential [15-17]. Previous work on ultra-cold atom analog models of the early universe has focused on the expansion of spacetime [18, 19] and the formation of oscillons [20, 21]. While interesting cosmological analogs have been explored in liquid He [22, 23], its use as a quantum simulator is hampered by the limited tuneablility of physical parameters and the phenomenological nature of available theoretical models. False vacuum decay models have been successfully applied to the quantum nucleation of phase transitions of liquid He [24, 25] in a non-relativisitc context, but the nucleation and decay from a relativistic false vacuum has not yet been realized in a laboratory experiment. In this Letter we propose an implementation of Coleman's model of quantum decay from a relativistic false vacuum with tuneable microscopic parameters. We simulate the quantum dynamics of the coupled Bose fields in the truncated Wigner approximation (TWA) [26, 27] and demonstrate how the resulting evolution can be imaged in one, two or three space dimensions using optical trapping. This shows the feasibility of a table-top experiment, and illustrates how the expected bubble nucleation dynamics depends on the dimensionality of space. The dynamics of the scalar field φ in Coleman's model [1] is given by the equation $$\partial _ { t } ^ { 2 } \phi - c ^ { 2 } \nabla ^ { 2 } \phi = - \partial _ { \phi } V ( \phi ),$$ where c is the speed of light, and the potential V ( φ ) has a metastable local minimum separated from a true vacuum by a barrier. We emulate this equation with a pseudo spin-1 / 2 BEC, where the speed of light is replaced by the speed of sound in the BEC, the relative phase between two spin components assumes the role of the scalar field φ , and the shape of the potential V ( φ ) is tunable. In addition there is an adjustable coupling to phonon degrees of freedom in our system, which serves to damp the dynamics. Our numerical simulations confirm the expected features of quantum tunneling dynamics with dissipation [28]. By addressing a radio-frequency transition between the spin components, the false vacuum initial state can be prepared and the final state read out by interferometry. We consider a two-component BEC of atoms with mass m and a linear coupling ν realized by a radio-frequency field. Atoms with the same spin interact via a point-like potential with strength g . The Hamiltonian reads $$\hat { H } & = \int d { \mathbf r } \hat { \psi } _ { \sigma } ^ { \dagger } ( { \mathbf r } ) \left [ - \frac { \hslash ^ { 2 } \nabla ^ { 2 } } { 2 m } - \mu \right ] \hat { \psi } _ { \sigma } ( { \mathbf r } ) - \nu \int d { \mathbf r } \hat { \psi } _ { \sigma } ^ { \dagger } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ( { \mathbf r } ), & \text{$\text{$\text{$t$ is}$} \cos$} \\ & + \frac { g } { 2 } \int d { \mathbf r } \hat { \psi } _ { \sigma } ^ { \dagger } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ^ { \dagger } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ( { \mathbf r } ) \hat { \psi } _ { \sigma } ( { \mathbf r } ), & ( 2 ) & \text{$\text{$\text{$in}$} \cos$} \\ & \text{$occur} \cdot \\ & & \text{$monlv}$$ where summation over spin indices σ ∈ {-, + is implied. } The Bose fields satisfy the usual commutation relations [ ˆ ψ σ ( r ) , ψ ˆ † ¯ σ ( r ′ ) ] = iδ σσ ¯ δ ( r -r ′ ). We introduce the quantum partition function Z = ∫ D ( ψ , ψ ∗ )e -S[ ψ ,ψ ∗ ] [29], where S ψ , ψ [ ∗ ] = ∫ d s [ ψ ∂ ψ ∗ σ τ σ + H ψ ,ψ ( ∗ )]. Here, s = ( τ, r ) is a d + 1 vector, τ = it/ glyph[planckover2pi1] ∈ [0 , β ] is imaginary time, ψ σ ( τ, r ) is a complex field subject to the periodic boundary condition ψ σ ( β, r ) = ψ σ (0 , r ). We look first for a static solution to identify vacua. This amounts to replacing ψ σ = ψ 0 = const in the saddle-point approximation δS/δψ σ = 0. For ν &gt; 0 we obtain the stable | ψ 0 | 2 = ( µ + ν /g ) and unstable | ψ 0 | 2 = ( µ -ν /g ) vacua with the two Bose gases being in phase and out-ofphase respectively. Let us introduce new field variables by ψ σ ( s ) = ρ 1 / 2 σ ( s ) e iφ σ ( s ) , where ρ σ ( s ) = ρ 0 + δρ σ ( s ) and ρ 0 = | ψ 0 | 2 . The variables δρ σ and φ σ parametrize the deviation of the Bose fields from a vacuum. Substituting this parametrization into the action, we obtain $$S ( \rho, \phi ) & \approx \int d s \left [ i \delta \rho _ { \sigma } \partial _ { \tau } \phi _ { \sigma } + \frac { h ^ { 2 } \rho _ { 0 } } { 2 m } ( \nabla \phi _ { \sigma } ) ^ { 2 } & \text{space} \\ & + \frac { ( 2 g \rho _ { 0 } + \nu ) \delta \rho _ { \sigma } ^ { 2 } } { 4 \rho _ { 0 } } + \frac { h ^ { 2 } ( \nabla \delta \rho _ { \sigma } ) ^ { 2 } } { 8 m \rho _ { 0 } } - \frac { \nu } { 2 \rho _ { 0 } } \delta \rho _ { 1 } \delta \rho _ { 2 } & \text{spino} \\ & - \, 2 \nu \rho _ { 0 } \cos ( \phi _ { a } ) - \nu \cos ( \phi _ { a } ) \delta \rho _ { \sigma } ] \,. & ( 3 ) & \text{simul}.$$ Here φ a = φ + -φ -is the relative phase. Through elimination of slowly varying density fluctuations following the standard technique [29], an effective field theory for the phase difference relevant for energies below glyph[planckover2pi1] ξc ( ξ = glyph[planckover2pi1] / √ 2 mgρ 0 is the BEC healing length) is found $$\widetilde { \dots } \widetilde { \text{ced} } \text{$\mathbb{e-}$} \\ \text{alar} \\ \text{ble.} \\ \text{de-} \\ \text{de-} } \quad & S ( \phi _ { a } ) = \frac { 1 } { 4 g } \int d \mathbf s [ ( \partial _ { \tau } \phi _ { a } ) ^ { 2 } + \hbar { ^ { 2 } } c ^ { 2 } ( \nabla \phi _ { a } ) ^ { 2 } + 2 \hbar { ^ { 2 } } V ( \phi _ { a } ) ] \\ & + \frac { 4 \nu ^ { 2 } } { g } \int d \mathbf s \int d \mathbf s ^ { \prime } \cos \phi _ { a } ( \mathbf s ) \cos \phi _ { a } ( \mathbf s ^ { \prime } ) \mathcal { G } ( \mathbf s - \mathbf s ^ { \prime } ) ( 4 ) \\ \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ where the field potential V ( φ a ) = -4 νgρ 0 cos φ a (1 + ν cos φ / gρ a 4 0 ) / glyph[planckover2pi1] 2 and c = √ gρ /m 0 is the speed of sound. The non-local kernel G ( τ, r ) = ( βV ) -1 ∑ ω &gt; n 0 ∑ k &gt; 0 e -i ( ω τ n + kr ) ω / ω 2 n [ 2 n + ( c glyph[planckover2pi1] ) 2 k 2 ] is expressed through summation over Fourier momentum k and Matsubara frequencies ω n = 2 πn/β . The new action is similar to the one studied in Ref. [28], where the effect of dissipation on quantum dynamics was explored. Following Ref. [28] we obtain the following equation of motion for the relative phase: $$\partial _ { t } ^ { 2 } \phi _ { a } - c ^ { 2 } \nabla ^ { 2 } \phi _ { a } + \frac { 4 \nu ^ { 2 } \xi } { \hbar { ^ { 2 } } c } \partial _ { t } \phi _ { a } = - \partial _ { \phi _ { a } } V ( \phi _ { a } ). \quad ( 5 )$$ It is similar to Eq. (1) with a new friction-like third term, due to coupling with density fluctuations. We note that in cosmological models such friction-like behavior may occur due to a homogeneous expansion of space, as commonly described by the Hubble constant [30]. By varying the tunnel coupling ν periodically in time, it is possible to alter the effective potential so that φ a = π becomes a local minimum, which corresponds to a false vacuum in the sense of Coleman. We consider rapid oscillations of the tunnel coupling ν t = ν + δ glyph[planckover2pi1] ω cos( ωt ), where the frequency of oscillations is ω glyph[greatermuch] ω 0 ≡ 2 √ νgρ / 0 glyph[planckover2pi1] . Following Kapitza [14] the field φ a may be viewed now as a superposition of a slow component φ 0 and rapid oscillations. Averaging rapid oscillations in time yields an equation of the form (5) with φ a → φ 0 and V ( φ a ) → V eff ( φ 0 ) = -ω 2 0 [ cos φ 0 -0 5 . λ 2 sin 2 φ 0 ] . This potential, shown in Fig. 1b, develops a local minimum at φ 0 = π if λ = δ glyph[planckover2pi1] ω / 0 √ 2 ν &gt; 1, which corresponds to a false vacuum. Multiple equivalent true vacua occur at the global minima with φ 0 = 0 2 , π, 4 π, . . . We perform stochastic numerical simulations on the full BEC model (1) to investigate the bubble nucleation numerically and compare the results with the predictions of the effective theory developed above. The TWA, where a quantum state is represented by a stochastic phase space distribution of trajectories following the GrossPitaevskii equation [26, 27], enables one to simulate the entire experimental model of a three-dimensional coupled spinor BEC, in the limit of large occupation numbers per mode. This method is already known to accurately simulate BEC interferometric experiments down to the quantum noise level [12]. Our initial state construction then proceeds by assuming each mode is initially in a coherent state. The corresponding Wigner distribution is a Gaussian in phase FIG. 1. Decay of the false vacuum in 1D. A single-trajectory simulation of the false vacuum decay in 1D with N grid = 256 and dimensionless parameters λ = 1 2, . ˜ ω = 50, ˜ = 0 01, ν . ˜ ρ 0 = 200, a 11 = 59 5, . a 22 = 60 5, . a 12 = 0 (corresponding to a two-component 41 K condensate in a ring trap with N = 4 × 10 , trap circumference 4 L = 254 µ m, transverse frequency ω ⊥ = 2 π × 1913 Hz, observation time T = 24 9 ms, oscillator . amplitude Ω = 2 π × 9 56 Hz, . frequency ω = 2 π × 9 56 kHz . and modulation δ = 0 085). . a , Example of bubble formation: the spinor Bose field is initially in a false vacuum ( ˜ = 0 9, t . blue solid); quantum fluctuations cause the field to tunnel out ( ˜ = 4 5, green dash-dotted); three bubbles are formed in t . true vacua ( ˜ = 9, yellow dashed); they grow until one bubble t meets another bubble in the second minimum, creating a domain wall ( ˜ = 15, pink dotted). t b , Effective field potential (dotted lines mark the potential maxima). c , Time evolution of the relative number density difference p z after a π/ 2 rotation, which converts the relative phase into a population difference. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1163v3-figure-f1522faf-2a44-4669-8718-8f329f9d92ce.jpg) space. The primary physical effect of the noise is to allow spontaneous tunneling and scattering processes that are disallowed in pure Gross-Pitaevskii theory. Quantum noise is added to the classical false vacuum state as ψ ( r ) = ψ 0 ( r )+ ∑ M j =1 α j exp( i k r j ) / √ V . Here α j are complex Gaussian variables with α α ∗ j i = δ ij / 2, thus sampling fluctuations of the false vacuum. Quantum tunneling for a shallow potential well is equivalent to an activation process caused by the vacuum fluctuations of the quantum field, represented by the initial fluctuations of the Wigner phase-space representation. The TWA is a truncation of the expansion in the powers of M/N up to and including the terms of order 1 [27]. Therefore, the number of modes M is chosen to represent the physical system, while being much smaller than the number of atoms N . For the 1D and the 3D simulations, M/N ≡ N d grid / ( ˜ L ρ d ˜ 0 ) ≈ 10 -2 , and for the 2D simulation M/N ≈ 3 × 10 -2 , where N grid is the number of grid points in one dimension. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1163v3-figure-b5b7e923-570b-4ab1-a051-acdcf4b1ad62.jpg) × FIG. 2. Bubble nucleation probability. a, Single trajectories of the relative phase at different ˜, ν where 〈 cos φ a 〉 = 1 L ∫ L 0 dx cos φ a ( x ). Initially the field is trapped in a false vacuum. A bubble appears via quantum tunneling at tω 0 = 5 (blue line), tω 0 = 26 (green line). The tunneling time is longer for larger couplings ν , consistent with dissipative slowing down of tunneling [28]. The bubble grows at the speed of sound (1 in our units). b (inset), Probability of bubble nucleation for ˜ = 8 ν × 10 -3 and its exponential fit. b, Dependence of the tunneling rate Γ on the coupling ˜ for ν λ = 1 3. . This is extracted from the survival probability of the bubble nucleation, which behaves as F = exp( -Γ ). t For this relatively shallow effective potential, we extract that ∆ B ∝ ˜ ν 0 541 . . We propagate this state in real time by solving the time-dependent coupled equations $$\mathbf n \, \text{pro} ^ { \quad } _ { \quad \text{int} \quad } i \hbar { \partial } _ { t } \psi _ { j } = \left [ - \frac { \hbar { ^ { 2 } } } { 2 m } \nabla ^ { 2 } - \mu + g \left ( | \psi _ { j } | ^ { 2 } - \frac { M } { V } \right ) \right ] \psi _ { j } - \nu _ { t } \psi _ { 3 - j }, \\ \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \cdots \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \, \mathbf n \} }$$ where index j = 1 2, and with the coupling , ν t modulated in time. The results of the simulations are shown in Fig. 1. The single trajectory dynamics shown here features the creation of three bubbles. Collisions of bubbles result either in the creation of localized long-lived oscillating structures known as oscillons [21, 31, 32], or domain walls if the colliding bubbles belong to topologically distinct vacua. To quantify the tunneling process, we calculate the FIG. 3. Bubble formation in 2D. Snapshots representing the number density difference ( a ) and the phase difference ( b ) with N grid = 128 and dimensionless parameters λ = 1 1, . ˜ ω = 50, ˜ ν = 0 005, . ˜ ρ 0 = 200, a 11 = 59 5, . a 22 = 60 5, . a 12 = 0. Bubbles are seeded through quantum tunnelling and grow ( ˜ = 9) forming domain walls between bubbles with t two distinct phases of 0 and 2 π ( ˜ = 12). t ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1163v3-figure-79d8602c-27aa-4060-9ed6-e531bc321202.jpg) probability that the system has not yet decayed at time t . At long time scales it should behave as F = exp( -Γ ) [33], t where Γ is the decay rate from the false vacuum. From the probability of bubble creation over time P ( ), t the 'survival' probability can be calculated as F = 1 -∫ t 0 P ( t ′ ) dt ′ and the decay rate can be extracted. In the weak tunneling limit it can be written in the form Γ = A exp( -B/ glyph[planckover2pi1] ) and the coefficients A and B were calculated in Refs. [1, 9] in limiting cases. Our numerical simulations are far from that to allow an experiment on reasonable time-scale. In the following we focus on the damping term, the third term in Eq. (5), which suppresses tunneling leading to a correction to B , ∆ B ∝ ˜ ν 3 / 2 [28] in the weak tunneling regime. Our TWA approach is expected to yield accurate predictions for the relatively shallow effective potentials necessary for tunneling over laboratory time-scales [10]. In Fig. 2 we present the scaling of the tunneling rate of bubbles for λ = 1 3. . We find that the corresponding ∆ B ∝ ˜ ν 0 5 . . We checked numerically that by increasing λ the exponent also increases. However, our approach is not valid for larger values of λ , and this is also less accessible experimentally. The observed behavior provides strong evidence of a quantum tunneling process. For implementing an analog quantum simulation of the false vacuum we propose to use a spinor condensate with a suppressed inter-state scattering length a 12 . As FIG. 4. Bubble formation in 3D. Simulation of a single threedimensional random trajectory with N grid = 128 and dimensionless parameters λ = 1 01, . ˜ = 50, ˜ = 0 05, ω ν . ˜ ρ 0 = 100, a 11 = 59 5, . a 22 = 60 5, . a 12 = 0. This corresponds to a two-component 41 K condensate with realistic parameters in a uniform box trap [34] with N = 1 72 . × 10 , 8 trap size L = 95 8 . µ m, observation time T = 7 4ms, oscillator . amplitude Ω = 2 π × 96 9 Hz, frequency . ω = 2 π × 43 3 kHz and . modulation δ = 0 16. . a, c, The 3D outline of relative phases of 0.2 (yellow) and 0.8 (blue) converted into a relative number density difference p z . b, d, The phase difference in a 2D slice to show the internal phase variation near the bubble walls (location is marked with gray on the corresponding 3D plots). Dimensionless time is ˜ = 27 for t a, b , and ˜ = 30 for t c, d . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1163v3-figure-b86ebe0b-bf33-420e-8506-d50dcbcd9c98.jpg) an example of this, a two-component condensate [12] of 41 K atoms prepared in two Zeeman states | 1 〉 = | F = 1 , m F = 1 〉 and | 2 〉 = | F = 1 , m F = 0 〉 is predicted to have an inter-state Feshbach resonance with a 12 ≈ 0 at 675 3 G . [35]. States | 1 〉 and | 2 〉 are separated by 61 93 MHz at this magnetic field and are coupled via a . magnetic dipole transition. The two intra-state scattering lengths are a 11 = 59 5 . a 0 and a 22 = 60 5 . a 0 , where a 0 is the Bohr radius. The stretched state | 1 〉 will be condensed in the optical dipole trap. The s-wave scattering length a 11 has a favourable value for the fast thermalization process and is not too large to introduce inelastic losses. A pulsed radiofrequency field of 51 63 MHz will . generate the 50:50 superposition of two states | 1 〉 and 2 . | 〉 Atoroidal or flat linear atom trap with tight transverse confinement ( ∼ 10 kHz) will provide the 1D system with the desired initial uniform distribution of the atom density along the axial coordinate. Simulation data shown in Fig. 1 and Fig. 2 corresponds to a 1D toroidal trap. A similar experiment is also feasible in 2D or 3D, using experimentally realized 2D [36] and uniform 3D [34] trapping potentials. The results of the corresponding simulations with realistic experimental parameters are shown in Figs. 3 and 4. The 2D simulations of Fig. 3 show the nucleation of near spherical bubbles and demonstrate both the formation of domain walls and 2D oscillons, i.e. longlived localized non-topological structures. The 3D simulations reveal even more complex dynamics with multiple nested bubbles having novel topological structure seen in Fig. 4a. More detailed simulations and results from prospective experiments may further elucidate the nature of complex bubble structures and questions like the prevalence of asymmetry in bubble creation. Demonstrating the false vacuum decay by quantum tunneling will pave the way to analog quantum simulations of a cosmological process that is currently not accessible to exact computer simulation. Combined with accurate observational data of the correlations in the cosmic microwave background, this may eventually help us to refine cosmological models and answer the question 'Where do we come from?' Acknowledgments: We are indebted to Jeremy Mould and Richard Easther for a critical reading of the manuscript and to Grigory Volovik for pointing out Ref. [25]. This work has been supported by the Marsden Fund of New Zealand (contract Nos. MAU1205 and UOO1320), the Australian Research Council, the National Science Foundation under Grant No. PHYS1066293 and the hospitality of the Aspen Center for Physics. - [1] S. Coleman, Phys. Rev. D 15 , 2929 (1977). - [2] J. Langer, Ann. Phys. (N. Y). 41 , 108 (1967). - [3] J. W. P. Schmelzer, ed., Nucleation Theory and Applications (Wiley-VCH Verlag GmbH &amp; Co. KGaA, Weinheim, FRG, 2005). - [4] A. Vilenkin, Phys. Rev. D 27 , 2848 (1983). - [5] A. H. Guth, J. Phys. A: Math. Theor. 40 , 6811 (2007). - [6] S. Coleman and F. De Luccia, Phys. Rev. D 21 , 3305 (1980). - [7] S. M. Feeney, M. C. Johnson, D. J. Mortlock, and H. V. Peiris, Phys. Rev. Lett. 107 , 071301 (2011). - [8] R. Bousso, D. Harlow, and L. Senatore, 'Inflation after False Vacuum Decay: Observational Prospects after Planck,' arXiv:1309.4060 (2013). - [9] C. G. Callan and S. Coleman, Phys. Rev. D 16 , 1762 (1977). - [10] P. D. Drummond and P. Kinsler, Phys. Rev. A 40 , 4813 (1989). - [11] I. M. Georgescu, S. Ashhab, and F. Nori, Rev. Mod. Phys. 86 , 153 (2014). - [12] M. Egorov et al. , Phys. Rev. A 84 , 021605(R) (2011). - [13] B. Opanchuk, R. Polkinghorne, O. Fialko, J. Brand, and P. D. Drummond, Ann. Phys. 525 , 866 (2013). - [14] P. L. Kapitza, Sov. Phys. JETP 21 , 588 (1951), for previous applications of the idea to BECs see H. Saito and M. - Ueda, Phys. Rev. Lett. 90 , 040403 (2003) and H. Saito, R. G. Hulet, and M. Ueda, Phys. Rev. A 76 , 053619 (2007). - [15] V. M. Kaurov and A. B. Kuklov, Phys. Rev. A 71 , 011601 (2005). - [16] V. Gritsev, A. Polkovnikov, and E. Demler, Phys. Rev. B 75 , 174511 (2007). - [17] J. Brand, T. J. Haigh, and U. Z¨licke, Phys. Rev. A u 80 , 011602 (2009). - [18] U. R. Fischer and R. Sch¨tzhold, u Phys. Rev. A 70 , 063615 (2004). - [19] N. C. Menicucci, S. J. Olson, and G. J. Milburn, New J. Phys. 12 , 095019 (2010). - [20] C. Neuenhahn, A. Polkovnikov, and F. Marquardt, Phys. Rev. Lett. 109 , 085304 (2012). - [21] M. A. Amin, R. Easther, H. Finkel, R. Flauger, and M. P. Hertzberg, Phys. Rev. Lett. 108 , 241302 (2012). - [22] C. B¨uerle, Y. M. Bunkov, S. N. Fisher, H. Godfrin, a and G. R. Pickett, Nature 382 , 332 (1996). - [23] G. E. Volovik, The Universe in a Helium Droplet (OUP Oxford, 2009) p. 511. - [24] T. Satoh, M. Morishita, M. Ogata, and S. Katoh, Phys. Rev. Lett. 69 , 335 (1992). - [25] S.-H. H. Tye and D. Wohns, Phys. Rev. B 84 , 184518 (2011). - [26] M. Steel et al. , Phys. Rev. A 58 , 4824 (1998). - [27] A. Sinatra, C. Lobo, and Y. Castin, J. Phys. B 35 , 3599 (2002). - [28] A. O. Caldeira and A. J. Leggett, Phys. Rev. Lett. 46 , 211 (1981). - [29] A. Atland and B. Simons, Condensed Matter Field Theory (Cambridge University Press, 2010) p. 783. - [30] A. R. Liddle and D. H. Lyth, Cosmological Inflation and Large-Scale Structure (Cambridge University Press, 2000) p. 400. - [31] T. Vachaspati, Kinks and Domain Walls: An Introduction to Classical and Quantum Solitons (Cambridge University Press, 2006). - [32] S.-W. Su, S.-C. Gou, I.-K. Liu, A. S. Bradley, O. Fialko, and J. Brand, 'Oscillons in coupled Bose-Einstein condensates,' (2014), in preparation. - [33] S. Takagi, Macroscopic Quantum Tunneling (Cambridge University Press, 2006) p. 224. - [34] A. L. Gaunt, T. F. Schmidutz, I. Gotlibovych, R. P. Smith, and Z. Hadzibabic, Phys. Rev. Lett. 110 , 200406 (2013). - [35] M. Lysebo and L. Veseth, Phys. Rev. A 81 , 032702 (2010). - [36] Z. Hadzibabic, P. Kr¨ger, M. Cheneau, S. P. Rath, u and J. Dalibard, New J. Phys. 10 , 045006 (2008).
10.1209/0295-5075/110/56001
[ "O. Fialko", "B. Opanchuk", "A. I. Sidorov", "P. D. Drummond", "J. Brand" ]
2014-08-06T02:06:27+00:00
2014-11-05T05:04:38+00:00
[ "cond-mat.quant-gas" ]
Fate of the false vacuum: towards realization with ultra-cold atoms
Quantum decay of a relativistic scalar field from a false vacuum is a fundamental idea in quantum field theory. It is relevant to models of the early Universe, where the nucleation of bubbles gives rise to an inflationary universe and the creation of matter. Here we propose a laboratory test using an experimental model of an ultra-cold spinor Bose gas. A false vacuum for the relative phase of two spin components, serving as the unstable scalar field, is generated by means of a modulated radio-frequency coupling of the spin components. Numerical simulations demonstrate the spontaneous formation of true vacuum bubbles with realistic parameters and time-scales.
1408.1166v2
## Local models of almost-toric integrable systems: theory and applications Christophe Wacheux 1 ## 1. Introduction Given a symplectic manifold ( M ,ω 2 n ) , we define an intergrable Hamiltonian system (or IHS) as a function F = ( f , . . . , f 1 n ) : M → R n such that its components commute for the Poisson { ., . } bracket induced by ω , and the set of points for which dF is of maximal rank is an open dense subset (such points are said regular points, and critical otherwise; in particular, p ∈ M is a fixed point if dF p ( ) = 0 ). For the associated foliation F of F given by the connected components of its fibers, we set π F : M →B , and B the base space. The description of IHS is a great and very difficult task, and a classification of IHS would be an important step in that direction. For a subclass of IHS and its associated equivalence relation, a classification describes the structure of the moduli space and a basis of simple and universal objects for the qualitative and quantitative analysis of a given system. As IHS take their origins in mechanical systems, it is natural to consider classifications that involve, for instance, periodic motions, particular trajectories (e.g. fixed points), and the behaviour of the system near these trajectories. We will consider here a subclass of IHS defined by the periodicity of the flow of the components of F , and on the nature of its critical points. ## 1.1. Almost-toric, semi-toric and toric systems We first remind the theory of non-degenerate critical points for IHS. Given an IHS ( M,ω,F ) , at a fixed point p , the set of the Hessians of the f i 's at p denoted H [ f i ] p form a vector space 〈H [ F ] p 〉 . The Poisson bracket { ., . } induces a Poisson bracket { ., . } p on 〈H [ F ] p 〉 , turning it into a Lie subalgebra of sp (2 n ) . The fixed point p is called non-degenerate if 〈H [ F ] p 〉 is a Cartan subalgebra of sp (2 n ) , that is, if it is abelian and self-centralizing. 1 Assistant professor at EPFL, [email protected] Now, let us assume that p is a general critical point and U p a neighborhood of p , one can take the symplectic quotient ( ˜ U p = U p / / T k x , ω ˜ ) p of U p by the k x -torus action induced by regular components F x of F . The restriction ˜ F p of F is an IHS for ( ˜ U p = U p / / T k x , ω ˜ ) p , and the projection ˜ p of p on ˜ U p is a fixed point for ˜ F p . The critical point p is called nondegenerate if ˜ p is a nondegenerate fixed point for ˜ F p . The classification of Cartan subalgebra of sp (2 n ) due to Williamson [Wil36] give the following result concerning the quadratic part of a nondegenerate critical point p . Through all the paper, we use the bold notations x l = ( x , . . . , x 1 l ) , omitting the l when the context makes it obvious. For instance, we shall note here the Darboux coordinates of M by ( x , ξ ) = ( x , . . . , x 1 n , ξ 1 , . . . , ξ n ) . Theorem 1.1 (Williamson, 1936) . Let p ∈ M a nondegenerate critical point of F an IHS. Then there exists a quadruplet k = ( k , k , k e f h , k x ) ∈ N 4 , an open set U p ⊇ p and a symplectomorphism ϕ : ( U p , ω, p ) → ( R 2 n , ω 0 = ∑ n i =1 dξ i ∧ dx , i 0) such that $$\varphi ^ { * } F = Q _ { k } + o ( 2 ), \ w i t h \, Q _ { k } = ( \mathbf e _ { k _ { e } }, \mathbf h _ { k _ { h } }, \mathbf f _ { k _ { l } }, \xi _ { n - k _ { x } + 1 }, \dots, \xi _ { n } ) \ a n d$$ - · e i = x 2 i + ξ 2 i - elliptic (or E ) components, - · h i = x y i i - hyperbolic (or H ) components, $$\bullet \ f _ { i } = ( f _ { i } ^ { 1 }, f _ { i } ^ { 2 } ), \begin{cases} f _ { i } ^ { 1 } = x _ { i } ^ { 1 } \xi _ { i } ^ { 1 } + x _ { i } ^ { 2 } \xi _ { i } ^ { 2 } \\ f _ { i } ^ { 2 } = x _ { i } ^ { 1 } \xi _ { i } ^ { 2 } - x _ { i } ^ { 2 } \xi _ { i } ^ { 1 } \end{cases} \quad - f o c u s { - f o c u s \left ( o r \ F F \right ) \text{ components.}$$ The quadruplet k is called the Williamson type of p and it is a symplectic invariant. Note that Theorem 1.1 can also apply to regular points with k = (0 0 0 , , , n ) . The four coefficients are linked by the equation $$k _ { \text{e} } + 2 k _ { \text{f} } + k _ { \text{h} } + k _ { \text{x} } = n$$ Definition 1.2. We define W ( F ) as the set of different Williamson types that occurs for a given IHS F . When equipped with the following relation $$\mathbb { k } \prec \mathbb { k } ^ { \prime } \ i f \colon k _ { e } \geqslant k _ { e } ^ { \prime }, k _ { f } \geqslant k _ { f } ^ { \prime } \ a n d \ k _ { h } \geqslant k _ { h } ^ { \prime },$$ it is a (partially) ordered set (the term poset also appears in the litterature). Let us show that ( W ( F , ) glyph[precedesorcurly] ) is an ordered set. Let k k , ′ , k ′′ ∈ W ( F ) . - · reflexivity: we always have k e glyph[greaterorequalslant] k , k e f glyph[greaterorequalslant] k f , and k h glyph[greaterorequalslant] k h , thus k glyph[precedesorcurly] k , - · antisymetry: if k glyph[precedesorcurly] k ′ and k ′ glyph[precedesorcurly] k , then k e glyph[greaterorequalslant] k ′ e , k f glyph[greaterorequalslant] k ′ f , k h glyph[greaterorequalslant] k ′ h and k e glyph[lessorequalslant] k ′ e , k f glyph[lessorequalslant] k ′ f , k h glyph[lessorequalslant] k ′ h , so k e = k ′ e , k f = k ′ f , k h = k ′ h and hence, by equation 1 we have k x = k ′ x , so k = k ′ , - · transitivity: if k glyph[precedesorcurly] k ′ and k ′ glyph[precedesorcurly] k ′′ then k e glyph[greaterorequalslant] k ′ e glyph[greaterorequalslant] k , k ′′ e f glyph[greaterorequalslant] k ′ f glyph[greaterorequalslant] k , k ′′ f h glyph[greaterorequalslant] k ′ h glyph[greaterorequalslant] k ′′ h , hence k glyph[precedesorcurly] k ′′ . We introduce the following notations Notations 1.3. · P k ( U -) The locus of critical points of Williamson type k on the open set U ⊆ M . - · L k ( U -) The locus of critical leaves { Λ b | b ∈ U} of Williamson type k , with U an open set of M . - · V k ( U ) := F P ( k ( U )) -The locus of critical values of Williamson type k on the open set U ⊆ M . We can now define the almost-toric systems. We introduce a criterium called complexity . This notion find its origins in the works of Karshon and Tolman [KT01][KT03][KT11], Symington and Leung [Sym01], [LS10], and of San V˜ Ngo . c in [VN07]. u Definition 1.4. Let F = ( f , . . . , f 1 n ) : ( M ,ω 2 n ) → R n be an integrable Hamiltonian system. It is said to be almost-toric of complexity c glyph[lessorequalslant] n if it verifies these conditions: - · all critical points are non-degenerate, - · there are no singularities of hyperbolic type: k h = 0 , - · the flow generated by each of the last ( n -c ) components of F function is 2 π -periodic so that ˇ F c := ( f c +1 , . . . , f n ) generates a Hamiltonian T n -c -action. If c = 0 , the system is called toric , and semi-toric if c = 1 . For semi-toric systems, we set f 1 as the function that may fail to yield an S 1 -action, and define ˇ := ( F f , . . . , f 2 n ) as the function that generates the T n -1 -action. For toric systems, a very simple and powerful classification has been achieved. For these systems, we have the two following results Theorem 1.5. · Atiyah - Guillemin &amp; Sternberg theorem: If ( M,ω,F ) is equipped with a Hamiltonian T r -action, then the fibers of its associated moment map are connected and its image is a rational convex polytope of dimension r ([Ati82], [GS82], [GS84]). - · Delzant's classification theorem: In the integrable case r = n , if the action is effective, F M ( ) characterizes the IHS up to a symplectomorphism equivariant with respect to the T n action generated by F ([Del88], [Del90]). There are several possible directions for a classification 'à la Delzant' that extends the toric case: replace T n by any (non-abelian) compact Lie group, have F non-necessarily proper etc. The almost-toric extension is of a different nature. In toric systems, there are n globally Hamiltonian S 1 -actions, and (hence) only elliptic critical points occurs. In almost-toric systems, we require fewer S 1 -actions, and we authorize critical points with elliptic and focus-focus components. Hence, to our consideration, semi-toric systems are the closest from toric systems. The ransom of this generalization is the loss of the rigidity on which we relied for toric systems: almost-toric systems cover more physical situations (see [PRVN11] and references therein), but the image is not a moment polytope anymore, and Delzant theorem do not apply anymore. Nevertheless, the image of the moment map still contains a lot of information. In [VN03], [PVN09] and [PVN11], Pelayo and San V˜ Ngo . c retrieved a u classification 'à la Delzant' for semi-toric systems of dimension 2 n = 4 . This classification requires a description of the image of the moment map and of the V k ( M ) . The aim of this article is to provide results for this description in any dimension, when k f = 1 . ## 1.2. Localization of semi-toric critical values This subsection is devoted to the formulation and explanation of our main result. Let glyph[vector] e 1 be the first vector of the basis induced by F -glyph[vector] e 1 is the direction of f 1 . Theorem 1.6. Let F be a semi-toric integrable system on a compact symplectic manifold M 2 n , k ∈ W ( F ) with k f = 1 . Then V k ( M ) is a finite union of connected embedded submanifolds Γ i of dimension k x called nodal submanifolds such that: - 1. For each Γ i , there exists an affine plane P (Γ ) i ⊆ R n of the form P (Γ ) = i P + R · glyph[vector] e 1 + R · glyph[vector] v 1 + . . . + R · glyph[vector] v k x with P ∈ F M ( ) and glyph[vector] v , . . . , glyph[vector] 1 v k x a free family with integer coefficients, such that Γ i ⊆ P (Γ ) i ∩ F M ( ) . - 2. In P (Γ ) i , the nodal surface is the graph of a smooth function h from an open affine domain D ⊆ R k x to R : $$\Gamma _ { i } = \{ P + h ( \mathfrak { t } ) \cdot \vec { e } _ { 1 } + t _ { 1 } \cdot \vec { v } _ { 1 } + \cdots + t _ { k _ { x } } \cdot \vec { v } _ { k _ { x } } \, \ \mathfrak { t } \in D \}.$$ Figure 1: A nodal path of FF -X critical values ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1166v2-figure-d62471e9-f563-460d-8972-51b2fde5fe9e.jpg) - 3. If we assume that the fibers are connected, then the nodal surfaces are isolated: there exists a open neighborhood V i of Γ i such that V k ( V i ) = Γ i . In particular, this theorem answers negatively to a question asked to me by Colin de Verdière in 2010: 'Can we have a 'loop' of focus-focus-transverse singular values in dimension 2 n = 6 ?'. We must thank him deeply for this simple question that acted both as a compass and as an incentive in my research during the years 2010-2011. We developped the techniques of local models in particular to answer to this question. In the theorem above, note that we speak of the image of critical points, and not of critical value, as the Williamson type of a fiber may not be well defined. As a result, a value can belong to different V k ( M ) 's. Yet, we chose to give a result describing the image of the moment map rather than the base space of the foliation, because our 'local model' results describe the former. Description of the latter requires the introduction of new structures and a study on its own. This is what we actually work on in a paper with N.T. Zung that is to be published in the following months, hopefully. Another reason is that the image of the moment map is the space that physicists directly have access to by experimentation, especially when dealing with their quantum countepart. Organization of this paper is the following: first we set up background and remind existing results concerning the existence of normal forms for the foliation, and thus for 'local models' for the image of moment map. Then we give precisions for the image of a semi-toric critical point, and we finish with the proof of the global result Theorem 1.6 using the results about local models proved in section 3. ## 2. Normal forms for points, orbits and leaves In this section, we remind the existing results of normal forms near critical points. By normal form theorem, we mean a decomposition of a function into 'simple' elements with respect to a fixed equivalence relation. We start with Eliasson normal form and its orbital extension with Miranda-Zung's theorem. We finish with Zung's leaf-wise theorem, the 'Arnold-Liouville theorem with singularities'. In this paper, we will use the following notations Notations 2.1. We set the convention, given row vectors x and y of the same size and z a single coordinate: $$d \mathbf x \wedge d \mathbf y = \sum _ { j = 1 } ^ { r } d x _ { j } \wedge d y _ { j } \quad a n d \quad d \mathbf x \wedge d z = \sum _ { j = 1 } ^ { r } d x _ { j } \wedge d z \quad \quad ( 2 )$$ Lastly, for A, B ∈ M p,q ( R ) , A · B = ( a ij b ij ) i,j =1 ..n . ## 2.1. Eliasson normal form In 1984, Eliasson proved the following theorems although he only published the first one. We state the theorem and give to the reader the necessary references for a full proof: Theorem 2.2 (Eliasson Normal Form - Semi-toric case) . Let ( M ,ω,F 2 n ) a semi-toric integrable system with n glyph[greaterorequalslant] 2 , and m a critical point of Williamson type k = FF -E k e -X k x . Then there exists a triplet ( U m , ϕ, G k ) with U m an open neighborhood of m in M ϕ , k a symplectomorphism of U m to a neighborhood of (0 ∈ R 2 n , ω 0 ) and G k a local diffeomorphism of 0 ∈ R n to itself such that: $$\varphi _ { \mathbf k } ^ { * } F = G _ { \mathbf k } \circ Q _ { \mathbf k }$$ It was the contribution of many people that allowed eventually the statement of the theorems above. The first works to be cited here are those of Birkhoff, Vey [Vey78], Colin de Verdià ´ re and Vey [dVV79], and of l course Eliasson in [Eli84] and [Eli90]. More recently, Chaperon in [Cha86] and [Cha12], Zung in [Zun97] and [Zun02], and San V˜ Ngo . c &amp; Wacheux u in [VNW13] provided new proofs and filled the technical gaps that remained in the original proof. ## 2.2. Semi-local normal form Eliasson normal form is the first of many results generalizing the symplectic linearization of integrable systems. glyph[negationslash] Let F : ( M ,ω 2 n ) → R n be a proper integrable semi-toric system. The orbit O m of a critical point m ∈ M by the local Poisson R n -action is a submanifold of dimension equal to the rank k x of the action at the point m . For this section, we can assume without loss of generality that df 1 ∧ . . . ∧ df k x = 0 , that is, they are the transverse components of the critical point. Definition 2.3. The orbit O m is called non-degenerate if, when we take the symplectic quotient of a neighborhood of O m by the Poisson action of R k x generated by F X := ( f , . . . , f 1 k x ) , the image of m is a non-degenerate fixed point. A non-degenerate orbit has only non-degenerate critical points of the same Williamson index. Thus it makes sense to talk of an orbit of a given Williamson index. The linear model of a non-degenerate orbit shall be for us the linear model of any point of this orbit. Of course, a non-degenerate Hamiltonian system has only non-degenerate orbits and non-degenerate leaves. Theorem 2.4 (Miranda &amp; Zung, [MZ04]) . Let m be a critical point of Williamson type k of a semi-toric system ( M,ω,F ) . Then there exists a neighborhood ˜ U m saturated with respect to the action of F X the transverse components of F and a symplectomorphism: $$\varphi \colon ( \tilde { \mathcal { U } } _ { m }, \omega ) \to \varphi ( \tilde { \mathcal { U } } _ { m } ) \subset L _ { \mathfrak k }$$ such that: - · ϕ F glyph[star] = Q k , - · The transverse orbit O F X ( m ) is sent to the zero-torus $$\mathcal { T } = \{ \mathbf x ^ { e, f } = \mathbf \xi ^ { e, f } = 0 \, \ \mathbf I = 0 \}$$ of dimension k x . Moreover, if there exists a symplectic action of a compact group G glyph[clockwise] M that preserves the moment map F , the action can be linearized equivariantly with respect to that group action. This theorem is an extension of Eliasson normal form: it means that we can linearize the singular Lagrangian foliation of an integrable semi-toric system symplectically on an orbital neighborhood of a non-degenerate critical point. The normal form is valid in a neighborhood that is larger than a 'pointwise' ε -ball of a critical point: the neighborhood is saturated with respect to the transverse action of the system. ## 2.3. Arnold-Liouville with singularities We designate by F := { connected components of F -1 ( c ) | c ∈ Im F ( ) } the foliation associated to F , and B its base space. A leaf hence is a connected component of a fiber. We have the diagram / / ' ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1166v2-figure-31ec9ec5-b07c-4ef0-984b-cdf262cc185a.jpg) ' GLYPH&lt;15&gt; GLYPH&lt;15&gt; Definition 2.5. Acritical leaf of F is a leaf in F that contains a critical point for F . A singularity of F is defined as (a germ of) a tubular neighborhood of a critical leaf. ## 2.3.1. Stratification by the orbits One of the consequence of the existence of focus-focus and hyperbolic critical points is that there is a distinction between the leaf containing a point and the joint orbit through that point. The following proposition describes precisely how non-degenerate critical leaves are stratified by orbits of different Williamson types: Proposition 2.6. Let m ∈ M be a point of Williamson type k of a proper, non-degenerate integrable Hamiltonian system F . Then: - 1. O F ( m ) is diffeomorphic to a direct product T c × R o (and c + o = k x ). - 2. For any point m ′ in the closure of O F ( m ) , k e ( m ′ ) = k e , k h ( m ′ ) glyph[greaterorequalslant] k h and k f ( m ′ ) glyph[greaterorequalslant] k f . - 3. The quantities k e , k f + c and k f + o are invariants of the leaf . - 4. For a non-degenerate proper semi-toric system, a leaf Λ contains a finite number of F -orbits with a minimal k for glyph[precedesorcurly] , and the Williamson type for these F -orbits is the same. All these assertions are proven by Zung in [Zun96]. The last statement asserts that, in a non-degenerate critical leaf, a point with minimal Williamson type is not unique in general, but the minimal Williamson type is. This allows us to give the following definition: Definition 2.7. For a non-degenerate semi-toric system ( M,ω,F ) , the Williamson type of a leaf Λ is defined as $$\mathbb { k } ( \Lambda ) \coloneqq \min _ { \prec } \{ \mathbb { k } ( m ) \ | \ m \in \Lambda \} \.$$ That quantity is well defined because the only critical leaves that difers from those of toric systems, are the ones that contains singularities with focusfocus components. Since leaves are closed, points with minimal Williamson type must contain one FF component and the maximal number of E components. That ensures us the unicity of the Williamson type of the leaf. Let us mention here that while we have defined the Williamson type of non-degenerate orbits and leaves, there is no relevant notion of a Williamson type of a fiber. Definition 2.8. A non-degenerate critical leaf Λ is called topologically stable if there exists a saturated neighborhood V (Λ) and a U ⊂ V (Λ) a small neighborhood of a point m of minimal rank in Λ such that $$\forall \mathbb { k } \in \mathcal { W } _ { 0 } ^ { n } \, \ F ( P _ { \mathbb { k } } ( \mathcal { V } ( \Lambda ) ) ) = F ( P _ { \mathbb { k } } ( \mathcal { U } ) ) \.$$ An integrable system will be called topologically stable if all its critical points are non-degenerate and topologically stable. The assumption of topological stability rules out some pathological behaviours that can occur for general foliations. Note however that for all known examples, the non-degenerate critical leaves are all topologically stable, and it is conjectured that it is also the case for all analytic systems. Since the papers [Zun96] and [Zun03] of Zung, the terminology concerning the assumption of topological stability has evolved. One speaks now of the transversality assumption , or the non-splitting condition . This terminology was proposed first by Bolsinov and Fomenko in [BF04]. We set in the next definition both the equivalence relation and the basis of simple 'basis' for a leaf-wise normal form: Definition 2.9. We say that two singularities are isomorphic if they are leaf-wise homeomorphic. We name the following singularities isomorphism classes 'simple': - · A singularity is called of (simple) elliptic type if it is isomorphic to L e : a plane R 2 foliated by q e . - · A singularity is called of (simple) focus-focus type if it is isomorphic to L f , where L f is given by R 4 locally foliated by q 1 and q 2 . One can show (see Proposition 6 2 . in [VN00]) that the focus-focus critical leaf must be homeomorphic to a pinched torus ˇ T 2 : a 2-sphere with two points identified. The regular leaves around are regular tori. Properties of elliptic and focus-focus singularities are discussed in details in [Zun96]. In particular, the fact that we can extend the Hamiltonian S 1 -action that exists near a focus-focus point to a tubular neighborhood of the focus-focus singularity guarantees that the simple focus-focus singularity is indeed a pinched torus. Assumption 2.10. From now on, we will assume that all the systems we consider are simple and topologically stable . In particular, simplicity implies that for the semi-toric systems we consider, focus-focus leaves will only have one vanishing cycle. ## 2.3.2. Statement of singular Arnold-Liouville theorem Now we can formulate an extension of Liouville-Arnold-Mineur theorem to singular leaves. We call the next theorem a 'leaf-wise' result, as we obtain a normal form for a leaf of the system. While assertion 2 . of the theorem extends Eliasson normal form, item 3 . gives te ransom of such generalisation: here the normal form of the leaf doesn't preserve the symplectic structure. Theorem 2.11 (Arnold-Liouville with semi-toric singularities, [Zun96]) . Let F be a proper semi-toric system, Λ be a leaf of Williamson type k and V (Λ) a saturated neighborhood of Λ with respect to F . Then the following statements are true: - 1. There exists an effective Hamiltonian action of T k e + k f + k x on V (Λ) . There is a locally free T k x -subaction. The number k e + k f + k x is the maximal possible for an effective Hamiltonian action. - 2. If Λ is topologically stable, ( V (Λ) , F ) is leaf-wise homeomorphic (and even diffeomorphic) to an almost-direct product of elliptic and focusfocus simple singularities: ( V (Λ) , F ) glyph[similarequal] $$( \mathcal { U } ( \mathbb { T } ^ { k _ { \times } } ), \mathcal { F } _ { r } ) \times \mathcal { L } _ { 1 } ^ { e } \times \dots \times \mathcal { L } _ { k _ { e } } ^ { e } \times \mathcal { L } _ { 1 } ^ { f } \times \dots \times \mathcal { L } _ { k _ { t } } ^ { f }$$ where ( U ( T k x ) , F r ) is a regular foliation by tori of a saturated neighborhood of T k x . - 3. There exists partial action-angle coordinates on V (Λ) : there exists a diffeomorphism ϕ such that $$\varphi ^ { * } \omega = \sum _ { i = 1 } ^ { k _ { \text{x} } } d \theta _ { i } \wedge d I _ { i } + P ^ { * } \omega _ { 1 }$$ where ( θ , I ) are the action-angle coordinates on T ∗ T , where T is the zero torus in Miranda-Zung equivariant Normal form theorem stated in [MZ04] and ω 1 is a symplectic form on R 2( n -k x ) glyph[similarequal] R 2( k e +2 k f ) . Theorem 2.11 says that in particular for semi-toric systems, under this mild assumption that is topological stability on the leaves, a critical leaf Λ is diffeomorphic to a product of the 'simplest' regular, elliptic and focus-focus leaves one can find. ## Remark 2.12. Assertion 3 . of Theorem 2.11 explains that we do not have a symplectomorphism in the assertion 2 . Also, one should notice that in Theorem 2.11, it is only because we made the Assumption 2.10 that the singularity is leaf-wise diffeomorphic to an almost-direct product of simple sigularities. For instance, were there more than one pinch on the singuarity, one could only guarantee the existence of an homeomorphism between the two. This theorem is the last generalisation of Eliasson's point-wise normal form. As of now, we shall speak of Eliasson-Miranda-Zung normal form and precise if necessary what type of normal form we are working on. ## 2.4. Stratification by Williamson index The stratification of M by the rank of the moment map is an important feature in the study of toric system in the theorem of Atiyah - Guillemin &amp; Steinberg. The following results are consequences of Theorem 2.11, and of its proof in [Zun96]. By stratification, we mean here the following Definition 2.13. A stratified manifold is a triplet ( M, S I , ) with M n topological manifold is a finite partition S = ( S i ) i ∈I of M n indexed by an ordered set ( I glyph[precedesequal] , ) such that - · Decomposition: for i ∈ I the S i 's are smooth manifolds and for i, j ∈ I , i glyph[precedesequal] j if and only if S i ⊆ S j . - · Splitting condition: by induction over the dimension of the stratified manifold n . If x ∈ S i , for a neighborhood U x of x in R n , there exists a disk D i ⊂ R dim( S i ) and a cone C ( J ) = over a ( n dim S i 1) -dimensional stratified smooth manifold J (and ( n -dim S i -1) ≤ n -1 ) such that: U x and D i ×C ( J ) are isomorphic as stratified manifolds. The definition above is consistent, since strafications of manifolds of dimension 0 and 1 are obvious. Usually, one defines stratifications over larger classes of objects that are not regular enough for the given topology, while the strata are. The example to remember is the cone, or the manifolds with corners: they won't be smooth manifold but their strata will be. Theorem 2.14. Let ( M ,ω,F 2 n ) be a semi-toric integrable Hamiltonian system. Then we have the following results: - · For any k ∈ W ( F ) , each connected component of P k ( M ) is a smooth open symplectic manifold diffeomorphic to T ∗ T k x . The symplectic form is given by the partial Action-Angle coordinates on it. - · The triplet ( P k ( M ,ω ,F ) k k ) , with F k := F | P k ( M ) is an integrable Hamiltonian system with no critical points. - · The triplet ( M,P k ( M , ) W ( F )) is a stratified manifold. Proof. Concerning points 1 . and 2 . , if we take a critical point p ∈ M of Williamson index k , with items 2 . and 3 . of Theorem 2.11 we have a tubular neighborhood V of the leaf containing p such that V is leaf-wise diffeomorphic to $$( \mathcal { U } ( \mathbb { T } ^ { k _ { \times } } ), \mathcal { F } _ { r } ) \times \mathcal { L } _ { 1 } ^ { e } \times \dots \times \mathcal { L } _ { k _ { e } } ^ { e } \times \mathcal { L } _ { 1 } ^ { f } \times \dots \times \mathcal { L } _ { k _ { f } } ^ { f },$$ and a diffeomorphism ϕ such that ϕ ω ∗ = ∑ k x i =1 dθ i ∧ dI i + P ω ∗ 1 . The subset P k ( V ) is diffeomorphic in these local coordinates to { q 1 = q 2 = 0 , x e 1 = y e 1 = . . . = x e k e = y e k e = 0 } , that is, to an open subset of T ∗ T k x of the form T k x × ˚ D k x . On it, the 2-form ω 1 in Zung's theorem vanishes so P k ( V ) is described by the partial action-angle coordinates given by Miranda and Zung in Theorem 2.4. This proves item 1 . . Next, we have that F k ∈ C ∞ ( P k ( M ) → R k x ) , it is clearly integrable as an Hamiltonian system of P k ( M ) . Moreover, a critical point for F k is a critical point for F with a smaller Williamson index, which is impossible on P k ( M ) by definition. Hence F k has no critical point on P k ( M ) . This proves point 2 . . To conclude with point 3 . , we first have to prove the decomposition condition. it is clear that { P k ( M ) } k ∈W ( F ) is a partition of M by smooth manifolds. The indexing set is the poset W ( F ) . Remebering Proposition 2.6, for k k , ′ in W ( F ) , if P k ( M ) ⊆ P k ′ ( M ) , then k glyph[precedesorcurly] k ′ . To prove the converse statement, one can notice with the local models that for a critical point m of Williamson index k , m can always be attained by a sequence of points that have the same Williamson index k ′ , provided that k ′ glyph[followsorcurly] k . In particular, m is in P k ′ ( M ) . For the splitting condition, with Item 2 . of Theorem 2.11 we see that we only need to treat the simple elliptic and focus-focus cases with local models. In the elliptic case P E R 2 is just a point: a neighborhood of the critical point is a disk, it is homeomorphic to the critical point times a cone over a small circle. For the focus-focus case, it is not more complicated: P FF ( R 4 ) is again a point, and we need to show there exists a 3 -dimensional stradispace L such that a neighborhood of the focus-focus point is homeomorphic to this point times the cone over L . We can just take the 3 -sphere S 3 and take the cone over it: it is homeomorphic to the 4 -ball, and hence is a neighborhood of a focus-focus point. There is a natural way to refine the stratification, by distinguishing the connected components of the P k ( M ) . Wecan note P l k ( M ) , with l = 1 ..L ( k ) an integer labelling the l -th connected components of P k ( M ) . The new ordering set is thus obtained from W ( F ) by 'splitting' each k : we consider the couples ( k , l ) , and write ( k , l ) glyph[precedesorcurly] ( k ′ , l ′ ) if and only if k glyph[precedesorcurly] k ′ and P l k ⊆ P l k ( M ) . The proof of the stratification is exactly the same since the spliting condition is a local condition. Now, if k f = 1 , we can take the skeleton of a strata, P l k ( M ) . Here, the skeleton is obtained by patching smoothly pieces of dimension glyph[lessorequalslant] k x -2 , so we can extend ω k and F k such that ( P l glyph[precedesorcurly] k , ω glyph[precedesorcurly] k , F glyph[precedesorcurly] k ) is an integrable Hamiltonian system on a closed manifold. This system is toric: the singularities are non-degenerate and without hyperbolic component (such component would have to come from the total system) or focus-focus component (because k f = 1 , such point would be a critical point with k f glyph[greaterorequalslant] 2 on ( M,ω,F ) , which is impossible). Lastly, since the Williamson type is invariant by the Hamiltonian flow, F k yields a T k x -action on P glyph[precedesorcurly] k ( M ) . ## 3. Local models for semi-toric values Eliasson normal form theorem 2.2 and Miranda-Zung theorem 2.4 give us a general understanding of the commutant of a semi-toric system: we have a local model of the image of the moment map near a critical value, that can be precised in the semi-toric case. To do so, we remind first these two lemmas. Two Lagrangian foliations F and F ′ are said to be equivalent if there exists a symplectomorphism such that for each L ∈ F , ϕ L ( ) = L ′ ∈ F ′ . Lemma 3.1. Let F be a singular Liouville foliation given by a momentum map F : M → R k . Let F ′ be a singular Liouville foliation given by a momentum map F ′ : N → R k . If the level sets are locally connected, then for every smooth symplectomorphism ϕ : U ⊂ M →V ⊂ N where U is an open neighborhood of p ∈ M , V a neighborhood of p ′ = ϕ p ( ) ∈ N , and such that $$\varphi ^ { * } \mathcal { F } = \mathcal { F } ^ { \prime },$$ there exists a unique local diffeomorphism G : ( R k , F ( p )) → ( R k , F ′ ( p ′ )) such that ## F ◦ ϕ = G ◦ F . ′ Lemma 3.2. Let ( M,ω,F ) be a proper almost-toric system. Then its fibers has a finite number of connected components. Proof. of Lemma 3.2 Let c be a value of F , and L be a connected component of F -1 ( c ) . On each point of L we can apply Eliasson normal form. The leaf L is compact and there is only a finite number of local models that can occur on L (actually, there can be only only two different local models on a same leaf), this gives us the existence of an open neighborhood V ( L ) of L in which there is no other connected components of F -1 ( c ) : the leaves are separated in F -1 ( c ) . Another way to look at it is to take the saturated neighborhood of the leaf in Zung's leaf-wise model of singularities. Now, we have that ⋃ L ⊆ F -1 ( c ) V ( L ) is an open covering of F -1 ( c ) , which is compact by the properness of F . We can thus extract a finite sub-covering of it. It implies that there is only a finite number of connected components. ## 3.1. Symplectomorphisms preserving a semi-toric foliation Eliasson-Miranda-Zung normal form gave us the existence of G a local diffeomorphism of the linear model associated to any integrable system. The theorem presented here gives precisions about the form of G in the semi-toric case Theorem 3.3. Let F be a semi-toric integrable system, and m be a critical point of Williamson type k , with k f = 1 . Let U m be a neighborhood of m , ϕ : ( U m , ω ) → ( ϕ ( U m ) ⊆ L , ω k k ) a symplectomorphism sending the transverse orbit of m on the zero-torus and such that the foliations ϕ ∗ F and Q k are equivalent on U m . Then the diffeomorphism G : U → G U ( ) ⊆ F M ( ) given by EliassonMiranda-Zung normal form and lemma 3.1 is such that: - 1. F ◦ ϕ -1 = G ◦ Q k , - 2. ˇ = F A Q · ˇ k + ˇ ( ) F c , with A ∈ GL n -1 ( Z ) . In the future, we shall dinstinguish different parts of A , so we shall write the Jacobian matrix of G as: $$\begin{pmatrix} \partial _ { q _ { 1 } } G _ { 1 } & \partial _ { q _ { 2 } } G _ { 1 } & \partial _ { q _ { ( 1 ) } } G _ { 1 } & \dots & \partial _ { q _ { ( k _ { e } ) } } G _ { 1 } & \partial _ { I _ { 1 } } G _ { 1 } & \dots & \partial _ { I _ { k _ { x } } } G _ { 1 } \\ 0 & F ^ { f } _ { 1 } & F ^ { e } _ { 1 } & \dots & F ^ { e } _ { k _ { e } } & F ^ { x } _ { 1 } & \dots & F ^ { x } _ { k _ { x } } \\ 0 & E ^ { f } _ { 1 } & \Gamma & \Gamma & \Gamma & \Gamma & \Gamma \\ \vdots & \vdots & & E ^ { e } _ { k _ { e } } & & & E ^ { x } _ { k } \\ \vdots & E ^ { f } _ { k _ { e } } & \cdots & \Gamma & \Gamma & \cdots & \Gamma \\ \vdots & X ^ { f } _ { 1 } & \Gamma & \Gamma & \Gamma & \Gamma \\ \vdots & \vdots & & X ^ { e } _ { k } & & & X ^ { x } _ { k } \\ 0 & X ^ { f } _ { k _ { x } } & \cdots & \Gamma & \cdots & \Gamma \end{pmatrix} ( \Theta ).$$ Put in another way, $$A = \begin{pmatrix} F ^ { \text{f} } & F ^ { \text{e} } & F ^ { \text{x} } \\ E ^ { \text{f} } & E ^ { \text{e} } & E ^ { \text{x} } \\ X ^ { \text{f} } & X ^ { \text{e} } & X ^ { \text{x} } \end{pmatrix},$$ with: - · F f ∈ Z , F e ∈ Z 1 × k e , F x ∈ Z 1 × k x , - · E f ∈ Z k e × 1 , E e ∈ Z k e × k e , E x ∈ Z k e × k x , - · X f ∈ M k x × 1 ( Z ) , X e ∈ M k e ( Z ) , X x ∈ M k x ( Z ) . Note that this theorem includes the particular case where F = Q k , that is, when we consider symplectomorphisms that start and end with Q k . ## Proof of Theorem. 3.3 Since ϕ is a symplectomorphism, it preserves the dynamics induced by the Hamiltonian vector fields of ˇ F . The open set is alwas connected. We have assumed that the components of ˇ F have 2 π -periodic flows. So, once pushed forward by ϕ , the vector fields must remain 2 π -periodic. We have the expression $$\chi _ { f _ { i } \circ \varphi ^ { - 1 } } = \partial _ { q _ { 1 } } G _ { i } \cdot \chi _ { q _ { 1 } } + \partial _ { q _ { 2 } } G _ { i } \cdot \chi _ { q _ { 2 } } + \sum _ { j = 1 } ^ { k _ { \text{e} } } \partial _ { q _ { ( j ) } ^ { \circ } } G _ { i } \cdot \chi _ { q _ { ( j ) } ^ { \circ } } + \sum _ { j = 1 } ^ { k _ { \text{x} } } \partial _ { I _ { j } } G _ { i } \cdot \chi _ { I _ { j } }$$ The partial derivatives of G are constant under the action by the Hamiltonian flow of Q k . The classical complex variables of singular flows are the following | Type | Elliptic | Focus-Focus | |-------------|--------------------------------|-----------------------------------------------------------------------------------------------------------------------------| | Coordinates | z e := x e + iξ e | { z f 1 := x f 1 + ix f 2 , z f 2 := ξ f 1 + iξ f 2 q f := ¯ z f 1 z f 2 := q f 1 + iq f 2 | | Formula | φ t q e ( z e ) = e iq e t z e | { φ t f 1 ( z 1 , z 2 ) := ( e - q f 1 t z 1 , e q f 2 t z 2 ) φ t f 2 ( z 1 , z 2 ) := ( e iq f 2 t z 1 , e iq f 2 t z 2 ) | From this we deduce the expression of the flow on a neighborhood U : $$& \phi _ { f _ { i } \circ \varphi ^ { - 1 } } ^ { t } \left ( z _ { 1 }, z _ { 2 }, z ^ { e }, \theta, \mathbf I \right ) = \\ & \left ( e ^ { \left ( \partial _ { q _ { 1 } } G _ { i } + i \partial _ { q _ { 2 } } G _ { i } \right ) t } z _ { 1 }, e ^ { \left ( - \partial _ { q _ { 1 } } G _ { i } + i \partial _ { q _ { 2 } } G _ { i } \right ) t } z _ { 2 }, e ^ { i \partial _ { q ^ { e } } G _ { i }. t } \bullet z ^ { e }, \theta + \partial _ { \mathbf I } G _ { i }. t,, \mathbf I \right ).$$ So necessarily, for i = 2 , . . . , n and j = 1 , . . . , n , we have ∂ q 1 G i = 0 and $$\partial _ { q _ { 2 } } G _ { i }, \partial _ { q _ { j } ^ { e } } G _ { i } \in \mathbb { Z } \text{ and } \partial _ { I _ { k _ { x } } } G _ { i } \in \mathbb { Z }.$$ If a coefficient of the Jacobian is integer on ϕ ( U ) , it must be constant on it. This shows that ˇ = F A ◦ ˇ Q with A ∈ M n -1 ( Z ) . Now, A is invertible because G is a local diffeomorphism, and since the components of ˇ F are all 2 π -periodic, we have that necessarily A -1 ∈ M n -1 ( Z ) . Note that this result here only uses the 2 π -periodicity of the flow, and no other assumption about the dynamics of F . In the next theorem, we have the same foliation before and after composing with ϕ . This stronger statement will get us precisions about the form of Jac G ( ) , in particular the unicity of its infinite jet on the set of critical values. ## 3.2. Transition functions between the semi-toric local models In this section, we need to precise our notion of flat function. To this end, let's introduce the following set: Definition 3.4. Let S = { ( p, v ) | v ∈ T M p } a subset of the tangent bundle TM π -→ M and U an open subset of M . We define the set F glyph[lscript] ∞ S ( U ) as the set of real-valued smooth functions on U , such that for each point p ∈ π S ( ) its infinite jet in the direction v is null (i.e. the jet at any order is null). This definition is voluntary general, as we shall consider smooth function that are possibly flat in some directions at one point, in different direction at other points etc. ## 3.2.1. Symplectomorphisms preserving a linear semi-toric foliation We prove here a kind of uniqueness theorem of the G introduced in Theorem 3.3. Here, we write the diffeomorphism B , as the constraints of G in that case is an information about the possible changes of the Basis in the 'variables' Q k that can occur. Theorem 3.5. Let ( L , ω , Q k k k ) be a singularity in Zung's theory with k f = 1 . Let ψ be a symplectomorphism of U ⊂ L which preserves the foliation Q . k k Then the diffeomorphism B : U → B U ( ) introduced in 3.3 is such that there exists glyph[epsilon1] f 1 , glyph[epsilon1] f 2 ∈ {-1 +1 , } , a matrix glyph[epsilon1] e ∈ Diag k e ( {-1 +1 ) , } and a function u ∈ F glyph[lscript] ∞ S ( U ) , where S := TM | V k ( U ) , so that we have: - 1. Jac B ( ) 1 ( Q k ) = ( glyph[epsilon1] f 1 q 1 + ∂ q 1 u, ∂ q 2 u, 0 , . . . , 0) , - 2. E f = 0 , E e = glyph[epsilon1] e and E x = 0 , - 3. F f = glyph[epsilon1] f 2 , F e = 0 and F x = 0 . - 4. X f ∈ M k , x 1 ( Z ) , X e ∈ M k e ( Z ) , X x ∈ GL k x ( Z ) , That is, for ˜ = x x ◦ ψ -1 : $$\begin{array} { l l l } a. & \tilde { q } _ { 1 } = \epsilon _ { 1 } ^ { \text{f} } q _ { 1 } + u \, \ \tilde { q } _ { 2 } = \epsilon _ { 2 } ^ { \text{f} } q _ { 2 } \\ b. & \tilde { q } _ { e } ^ { ( i ) } = \epsilon _ { i } ^ { \text{e} } q _ { e } ^ { ( i ) } \\ c. & ( \tilde { I } _ { 1 }, \dots, \tilde { I } _ { k _ { x } } ) = \check { Q } _ { \text{k} } \end{array}$$ For the Jacobian, it means that $$J a c ( B ) = \begin{pmatrix} \epsilon _ { 1 } ^ { f } + \partial _ { q _ { 1 } } u & \partial _ { q _ { 2 } } u & \dots & \dots & \dots & \dots & \partial _ { e _ { n } } u \\ 0 & \epsilon _ { 2 } ^ { f } & 0 & \dots & 0 & 0 & \dots & 0 \\ 0 & 0 & \epsilon _ { 1 } ^ { e } & \ddots & \vdots & 0 & \dots & 0 \\ \vdots & \vdots & \ddots & \ddots & 0 & \vdots & \dots & \vdots \\ 0 & 0 & \dots & 0 & \epsilon _ { k _ { e } } ^ { e } & 0 & \dots & 0 \\ \vdots & X _ { 1 } ^ { f } & \rightharpoonup & & \neg & \neg & \neg \\ \vdots & \vdots & X ^ { e } & & X ^ { x } & \\ 0 & X _ { k _ { x } } ^ { f } & \rightharpoonup & & \neg & \neg & \neg \end{pmatrix} ( \tilde { \lambda } )$$ with the u i 's being in F glyph[lscript] ∞ S ( U ) (the u i 's are the derivates of u in all the variables). For practical uses, we are not interested in the precise form of u , but just by the fact that it is flat on S as defined above. The theorem was proved in the focus-focus case for 2 n = 4 by San V˜ u Ngo . c in [VN03]. We follow the same ideas to give here a proof in the general case. ## Proof of Theorem. 3.5 As a particular case of theorem 3.3, we already know that Jac B ( ) is of the form ( ♠ ) . The point here is to exploit the fact that the linear model Q k has specific dynamical features conserved by a canonical transformation. Note also that the fibers of Q k are connected. ## Points (2), (3) and (4): glyph[negationslash] A point fixed by the flow of a Hamiltonian H is preserved by a symplectomorphism: its image will be a fixed point for the precomposition of H by a symplectomorphism. Theorem 2.4 tells us how critical loci of a given Williamson type come as 'intersections' of other critical loci. In particular, we know that for each i = 1 , . . . , k e , there exists a c i ∈ U such that for all p ∈ ( Q k ) -1 ( c i ) ∩U , χ q e i ( p ) = 0 , χ q e j ( P ) = 0 for j = i and χ q 2 ( p ) = 0 ( the χ I 's never cancel). Now, we have the following formula glyph[negationslash] glyph[negationslash] glyph[negationslash] $$\chi _ { q _ { i } ^ { \circ \psi ^ { - 1 } } } ( p ) = E _ { i } ^ { t } \chi _ { q _ { 2 } } ( p ) + \sum _ { j = 1, j \neq i } ^ { k _ { \mathrm e } } E _ { i j } ^ { \mathrm e } \chi _ { q _ { j } ^ { \mathrm e } } ( p ) + \sum _ { j = 1 } ^ { k _ { l } } E _ { i j } ^ { \mathrm x } \chi _ { I _ { j } } ( p ) = 0.$$ ## The family $$( \chi _ { q _ { 2 } } ( p ), \chi _ { q _ { e } ^ { ( 1 ) } } ( p ), \dots, \chi _ { q _ { e } ^ { ( i - 1 ) } } ( p ), \chi _ { q _ { e } ^ { ( i + 1 ) } } ( p ), \dots, \chi _ { q _ { e } ^ { ( k _ { e } ) } } ( p ), \chi _ { I _ { 1 } }, \dots, \chi _ { I _ { k _ { x } } } )$$ glyph[negationslash] is a free family ( Q k is an integrable system), so we have for j = i that E e ij = 0 , and E x ij = 0 for all j = 1 , . . . , k x . This is true for all i = 1 , . . . , k e . If we take a c in { q 1 = q 2 = 0 } , we get by a similar reasoning that F e = 0 and F x = 0 . ## Point (1), part 1: Now, we need to deal with the flow of q 1 , that is, the 'pseudo-hyperbolic' component of the focus-focus singularity. On an open set U , we have the explicit expression for the field of q 1 ◦ ψ -1 $$\chi _ { q _ { 1 } \circ \psi ^ { - 1 } } = \partial _ { q _ { 1 } } B _ { 1 } \cdot \chi _ { q _ { 1 } } + \partial _ { q _ { 2 } } B _ { 1 } \cdot \chi _ { q _ { 2 } } + \sum _ { j = 1 } ^ { k _ { e } } \partial _ { q _ { e } ^ { ( j ) } } B _ { 1 } \cdot \chi _ { q _ { e } ^ { ( j ) } } + \sum _ { j = 1 } ^ { k _ { x } } \partial _ { I _ { j } } B _ { 1 } \cdot \chi _ { I _ { j } }.$$ When evaluated on p ∈ P Q k k ( U ) , comes $$0 = \partial _ { q _ { 2 } } B _ { 1 } \cdot \chi _ { q _ { 2 } } ( p ) + \sum _ { j = 1 } ^ { k _ { e } } \partial _ { q _ { j } ^ { * } } B _ { 1 } \cdot \chi _ { q _ { j } ^ { * } } ( p ) + \sum _ { j = 1 } ^ { k _ { x } } \partial _ { I _ { j } } B _ { 1 } \cdot \chi _ { I _ { j } } ( p ).$$ First, since the χ I i 's have no fixed point, we necessarily have that $$\forall c \in V _ { \mathbf k } ^ { Q _ { \mathbf k } } ( \mathcal { U } ) \text{ and } \forall j = 1, \dots, k _ { x } \, \ \partial _ { I _ { j } } B _ { 1 } ( c ) = 0.$$ The result is true for all k with k f = 1 . If k e glyph[greaterorequalslant] 1 , we can apply the same reasoning to V k ′ ( U ) , where k ′ = (0 , k , f 0 , k x + k e ) glyph[followsorcurly] k and get equation 3 for this set. Since V Q k k ( U ) ⊆ V Q k k ( U ) , we have $$\forall c \in V _ { \mathbf k } ^ { Q _ { \mathbf k } } ( U ) \text{ and } \forall j = 1, \dots, k _ { \mathbf e } \, \ \partial _ { \alpha _ { j } ^ { \mathbf e } } B _ { 1 } ( c ) = 0.$$ Now that we know there is no transverse nor elliptic component in the flow of q 1 ◦ ψ -1 for critical leaves with focus-focus component, let's focus on the q 2 -component. A leaf Λ ′ of Q k of Wiliamson type k ′ glyph[precedesorcurly] k is stable by the flow of q 1 . On it, the flow is radial: for a point m ′ ∈ Λ of Williamson type k ′ = (0 1 , , k x ) , there exists a unique point m on the zero-torus of the leaf Λ such that the segment [ m,m ′ [ is a trajectory for q 1 . Depending on whether m ′ is on the stable (+) or the unstable (-) manifold, we have that [ m,m ′ [= { φ ± t q 1 ( m ′ ) | t ∈ [0 , ∞} [ . Remembering that m is a fixed point for q 1 , we have that ψ ([ m,m ′ [) is be a trajectory of q 1 ◦ ψ -1 = B 1 ◦ Q k . The image trajectory ψ ([ m,m ′ [) is contained in a 2-dimensional plane (the stable or unstable manifold). Since ψ is smooth at m ψ m,m ′ , ([ ′ [) is even contained in a sector of this plane that also contains m ′ . Remembering that ψ ([ m,m ′ [) is a trajectory for an infinite time , the only linear combinations of χ q 1 , χ q 2 which yields trajectories confined in a fixed sector are multiples of χ q 1 only. So we have that $$\partial _ { q _ { 2 } } B _ { 1 } ( c ) = 0.$$ This shows that B 1 is constant in the variables ( q e , I ) on V k ( U ) , but does not tell us more information. ## Point (1), part 2: To show that B 1 -q 1 is flat on V k ( U ) in the variables q f 1 and q f 2 , we can now treat the variables ( q e , I ) as parameters. We can always suppose that ψ preserves the stable and unstable manifolds of q 1 : this amounts to fix the sign of ∂ B 1 1 to be positive on U . As a result we'll have glyph[epsilon1] f 1 = 1 . And again, we can assume that k e = 0 , as flatness is a closed property: here, it is stable when taking the limit q e → 0 . With the explicit expression of the flow of q 1 and q 2 , if we set ¯ z z 1 2 = c and z 2 = ¯ δ , we have for the joint flow of q 1 and q 2 at respective times s = ln ∣ ∣ δ c ∣ ∣ and t = arg( δ ) -arg( ) c $$\underbrace { \phi _ { q _ { 1 } } ^ { s } \circ \phi _ { q _ { 2 } } ^ { t } } _ { = \colon T } ( c, \bar { \delta }, \theta, \mathbf I ) = ( \delta, \bar { c }, \theta, \mathbf I )$$ One can then state the fact that Υ is a smooth and single-valued function in a neighborhood W containing { (0 , δ, ¯ θ , I ) , θ ∈ T k x , I ∈ B k x (0 , η ) } . Now, we know that ψ -1 (0 , δ, ¯ θ , I ) is of the form (0 , a, θ ′ , I ) and ψ -1 ( δ, 0 , θ , I ) is of the form ( b, 0 , θ ′′ , I ) , since ψ preserve the level sets and the stable and unstable manifolds. Hence, for ψ -1 ◦ Υ ◦ ψ ↦ $$( 0, a, \theta ^ { \prime }, \mathbf I ) \stackrel { \psi } { \mapsto } ( 0, \bar { \delta }, \theta, \mathbf I ) \stackrel { \Upsilon } { \mapsto } ( \delta, 0, \theta, \mathbf I ) \stackrel { \psi ^ { - 1 } } { \mapsto } ( b, 0, \theta ^ { \prime \prime }, \mathbf I ).$$ ↦ ↦ With the expression of Υ in (6), we know that in the complementary set of { z 1 = 0 } , ψ -1 ◦ Υ ◦ ψ is equal to the joint flow of B q , q , ( 1 2 I ) at the multi-time ( ln ∣ ∣ δ c ∣ ∣ , arg ( δ ) -arg c , ( ) 0 , . . . , 0) . With what we already know about the flow of q 2 ◦ ψ -1 , when we write the joint flow in terms of the flows of the components of Q k we get: $$\phi _ { B ( q _ { 1 }, q _ { 2 }, \mathbf I ) } ^ { ( l n | \frac { \delta } { c } |, a r g ( \delta ) - a r g ( c ) ) } & = \phi _ { \partial _ { 1 } B _ { 1 } \cdot q _ { 1 } + \partial _ { 2 } B _ { 1 } \cdot q _ { 2 } + \sum _ { j } \partial _ { I _ { j } } B _ { 1 } \cdot I _ { j } } \circ \phi _ { q _ { 2 } } ^ { a r g ( \delta ) - a r g ( c ) } \\ & = \phi _ { q _ { 1 } } ^ { \partial _ { 1 } B _ { 1 } \cdot l n | \frac { \delta } { c } | } \circ \phi _ { q _ { 2 } } ^ { \partial _ { 2 } B _ { 1 } \cdot l n | \frac { \delta } { c } | + a r g ( \delta ) - a r g ( c ) } \\ & \circ \underbrace { \phi _ { I _ { 1 } } ^ { - \partial _ { I _ { 1 } } B _ { 1 } \cdot l n | \frac { \delta } { c } | } } _ { = i d \, ( c. f. \, \text{Point 4} ( 1 ) ) } ^ { - \partial _ { I _ { k _ { x } } } B _ { 1 } \cdot l n | \frac { \delta } { c } | } } _ { = i d \, ( c. f. \, \text{Point 4} ( 1 ) ) } ^ {. } \\ \sim \, \quad \cdot \quad \cdot \, 1 \, \sim \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \,.$$ Since ψ -1 ◦ Υ ◦ ψ is smooth at the origin, it's also smooth in a neighborhood of the origin; for c small enough, we can look at the first component of the flow on ( c, a, θ , I ) : here c shall be the variable while a , θ and I are parameters. We have the application ↦ $$c & \mapsto e ^ { \partial _ { 1 } B _ { 1 } \cdot l n \Big | \frac { \delta } { c } \Big | + i ( \partial _ { 2 } B _ { 1 }. l n \Big | \frac { \delta } { c } \Big | + a r g ( \delta ) - a r g ( c ) ) } c \\ & = \Big [ e ^ { \partial _ { 1 } B _ { 1 } l n | \delta | + i ( \partial _ { 2 } B _ { 1 } l n | \delta | + a r g ( \delta ) ) } \Big ] e ^ { ( 1 - \partial _ { 1 } B _ { 1 } ) \cdot l n | c | + i ( - \partial _ { 2 } B _ { 1 } l n | c | - a r g ( c ) ) }.$$ The terms in brackets are obviously a smooth function of c , and so the last exponential term is also smooth as a function of c on 0. Hence, the real part and the imaginary part are both smooth functions of ( c , c 1 2 ) in (0 , 0 , I ) . We then have the following lemma: ↦ Lemma 3.6. Let f ∈ C ∞ ( R k → R ) be a smooth function such that: x → f ( x ) ln ‖ x ‖ is also a smooth function. Then f is necessarily flat in 0 in the k variables ( x , . . . , x 1 k ) . glyph[negationslash] With this elementary lemma, we have that (1 -∂ B 1 1 ) ◦ α and ∂ B 2 1 ◦ α are flat for all (0 , 0 , I ) , where α c , c ( 1 2 , I ) = ( c δ 1 1 + c δ , c 2 2 1 δ 2 -c δ , 2 1 I ) . The function α is a linear function, and it is invertible since δ = 0 . This gives us the flatness of 1 -∂ B 1 1 and ∂ B 2 1 , as functions of c 1 and c 2 for all the (0 , 0 , I ) , and thus, as functions of all the n variables for all the (0 , 0 , I ) . We have thus u ∈ F glyph[lscript] ∞ S ( U ) with S = { (0 , 0 , I ) | I ∈ R k x } . Supposing that ψ exchanges stable and unstable manifolds yields the same demonstration mutatis mutandis , that is, in the last part of the proof, we look at the first component of the flow on (¯ c, a, θ ξ , ) with a , θ and ξ understood as parameters. In Theorem 3.3, we associate to a symplectomorphism that preserves a semi-toric foliation a unique G of the form ( ♠ ) . It would be interesting to have more knowledge about the restrictions on such symplectomorphism, but here we want to describe the moment map. We'd like to know for instance to what extent G is unique in Theorem 3.3. Theorem 3.5 can be applied to answer this question. If we think of the G 's as 'local models' or 'charts' of the image of the moment map, then Theorem 3.5 describes the 'transition functions' B . Indeed, if we have two local models given by Theorem 3.3, on U ⊆ M , a neighborhood of a point m of Williamson type k , one has: $$\begin{cases} F \circ \varphi = G \circ Q _ { \mathrm k }, \\ F \circ \varphi ^ { \prime } = G ^ { \prime } \circ Q _ { \mathrm k }. \end{cases}$$ Then we get: $$Q _ { \mathbf k } \circ \underbrace { ( \varphi ^ { - 1 } \circ \varphi ^ { \prime } ) } _ { = \psi } = \underbrace { ( G ^ { - 1 } \circ G ^ { \prime } ) } _ { = B } \circ Q _ { \mathbf k }.$$ We can apply Theorem 3.5 to the pair ( ψ = ϕ -1 ◦ ϕ , B ′ = G -1 ◦ G ′ ) and then get the relation: $$G ^ { \prime } = \left ( \epsilon _ { 1 } ^ { f } G _ { 1 } + u, \epsilon _ { 2 } ^ { f } G _ { 2 }, \epsilon _ { 1 } ^ { e } G _ { 3 }, \dots, \epsilon _ { k _ { e } } ^ { e } G _ { k _ { e } + 2 }, ( X ^ { f } | X ^ { e } | X ^ { x } ) \circ \check { G } \right ), \ u \in \mathcal { F } _ { S } ^ { \infty } ( U ).$$ ## 3.2.2. Symplectic invariants for the transition functions We have given some restrictions on the transition functions B between two local models of a semi-toric system. If we now authorize ourselves to change the symplectomorphism in the local models, we can have a 'nicer' G . This amounts to determine what in B is a semi-local symplectic invariant of the system. Let us set $$E _ { 1 } = \frac { 1 } { 2 } \begin{pmatrix} 1 + \epsilon _ { 1 } ^ { f } & 1 - \epsilon _ { 1 } ^ { f } & 0 & 0 \\ - 1 + \epsilon _ { 1 } ^ { f } & 1 + \epsilon _ { 1 } ^ { f } & 0 & 0 \\ 0 & 0 & 1 + \epsilon _ { 1 } ^ { f } & 1 - \epsilon _ { 1 } ^ { f } \\ 0 & 0 & - 1 + \epsilon _ { 1 } ^ { f } & 1 + \epsilon _ { 1 } ^ { f } \end{pmatrix} \\ E _ { 2 } = \frac { 1 } { 2 } \begin{pmatrix} 1 + \epsilon _ { 2 } ^ { f } & 0 & 1 - \epsilon _ { 2 } ^ { f } & 0 \\ 0 & 1 + \epsilon _ { 1 } ^ { f } & 0 & 1 - \epsilon _ { 1 } ^ { f } \\ 1 - \epsilon _ { 2 } ^ { f } & 0 & 1 + \epsilon _ { 2 } ^ { f } & 0 \\ 0 & 1 - \epsilon _ { 2 } ^ { f } & 0 & 1 + \epsilon _ { 2 } ^ { f } \end{pmatrix}. \\ \intertext { m 3. 7. \ L e t \, \psi } \, b e a \, s y m p l e c t o m o r p h i s m \, o f \, L _ { k } \, p r e s e r v i n g \, Q _ { k } \, a n$$ Theorem 3.7. Let ψ be a symplectomorphism of L k preserving Q k and B one of the possible associated diffeomorphisms of R n introduced in Theorem 3.5, of the form ( glyph[star] ) . Consider the diffeomorphisms $$& \zeta _ { B } ( z _ { 1 }, z _ { 2 }, x ^ { e }, \xi ^ { e }, \theta, \mathbf I ) = \\ & ( e ^ { - i \langle \theta, X ^ { f } \rangle } z _ { 1 }, e ^ { - i \langle \theta, X ^ { f } \rangle } z _ { 2 }, e ^ { - i \theta \cdot ( X ^ { e } ) ^ { t } } \bullet z ^ { e }, \theta, \mathbf I + Q _ { \mathbf k } ^ { e } \cdot ( X ^ { e } ) ^ { t } + q _ { 2 } \cdot ( X ^ { f } ) ^ { t } )$$ and $$\eta _ { B } ( x _ { 1 }, \xi _ { 1 }, x _ { 2 }, \xi _ { 2 }, \boldsymbol x ^ { e }, \boldsymbol \xi ^ { e }, \boldsymbol \theta, \boldsymbol I ) = ( ( x _ { 1 }, \xi _ { 1 }, x _ { 2 }, \xi _ { 2 } ) E _ { B } ^ { t }, \boldsymbol z ^ { e }, \boldsymbol \theta \cdot ( X ^ { \boldsymbol x } ) ^ { - 1 }, \boldsymbol I \cdot ( X ^ { \boldsymbol x } ) ^ { t } )$$ where E B = E E 1 2 . Then we have that ζ B and η B are symplectomorphisms of L k which preserve the foliation Q k and $$B \circ Q _ { k } = ( \psi \circ \zeta _ { B } \circ \eta _ { B } ) ^ { * } \left ( ( 1, 1, \epsilon _ { 1 } ^ { e }, \dots, \epsilon _ { k _ { e } } ^ { e }, 1, \dots, 1 ) \bullet Q _ { k } + ( u \circ Q _ { k }, 0, \dots, 0 ) \right ) \\.. \. \. \. \. \. \. \..$$ with u as introduced in Theorem 3.5. The symplectomorphisms ζ B and η B are admissible modifications of semi-toric local models. If we have two local models ( ϕ, G ) and ( ϕ , G ′ ′ ) , Theorem 3.7 tells us we can always modify the symplectomorphism of one of them, for instance ϕ ′ , to get another local model ( ˜ ϕ , G ′ ˜ ) ′ such that: $$( \tilde { G ^ { \prime } } ^ { - 1 } \circ G ) \circ Q _ { k } = \left ( ( 1, 1, \epsilon _ { 1 } ^ { e }, \dots, \epsilon _ { k _ { e } } ^ { e }, 1, \dots, 1 ) \bullet Q _ { k } + ( u \circ Q _ { k }, 0, \dots, 0 ) \right ).$$ Proof. of Theorem 3.7 First let's prove equation 8. $$\zeta _ { B } ^ { * } ( q _ { 1 } + i q _ { 2 } ) = \zeta _ { B } ^ { * } ( \bar { z } _ { 1 } z _ { 2 } ) = e ^ { i \theta \cdot X ^ { t } } \bar { z } _ { 1 } e ^ { - i \theta \cdot X ^ { t } } z _ { 2 } = \bar { z } _ { 1 } z _ { 2 } = q _ { 1 } + i q _ { 2 }$$ so q , q 1 2 are preserved. $$\zeta _ { B } ^ { * } Q _ { k } ^ { e } = ( | e ^ { - i \theta \cdot ( X _ { 1, } ^ { e } ) ^ { t } } \cdot z _ { 1 } ^ { e } | ^ { 2 }, \dots, | e ^ { - i \theta \cdot ( X _ { k _ { e }, } ^ { e } ) ^ { t } } \cdot z _ { k _ { e } } ^ { e } | ^ { 2 } ) = ( | z _ { 1 } ^ { e } | ^ { 2 }, \dots, | z _ { k _ { e } } ^ { e } | ^ { 2 } ) = Q _ { k } ^ { e }$$ $$\zeta _ { B } ^ { * } \mathbf I = q _ { 2 } \cdot X ^ { \text{f} } + Q _ { \mathbf k } ^ { \text{e} } \cdot ( X ^ { \text{e} } ) ^ { t } + \mathbf I.$$ For η , we have: η Q ∗ k = ( E E 1 2 ) ∗ Q f k + ( X x ) ∗ Q x k , so we can treat each action separately. We can also treat E 1 and E 2 separately, as the two matrices commutes, and treat only the case when glyph[epsilon1] f 1 (respectively glyph[epsilon1] f 2 ) is equal to -1 , for when glyph[epsilon1] f i = +1 , E i = id . - · glyph[epsilon1] f 1 = -1 : $$E _ { 1 } = \begin{pmatrix} 0 & 1 & 0 & 0 \\ - 1 & 0 & 0 & 0 \\ 0 & 0 & 0 & 1 \\ 0 & 0 & - 1 & 0 \end{pmatrix} \text{ so } E _ { 1 } \cdot \begin{pmatrix} x _ { 1 } \\ \xi _ { 1 } \\ x _ { 2 } \\ \xi _ { 2 } \end{pmatrix} = \begin{pmatrix} \xi _ { 1 } \\ - x _ { 1 } \\ \xi _ { 2 } \\ - x _ { 2 } \end{pmatrix} = \begin{pmatrix} \hat { x } _ { 1 } \\ \hat { \xi } _ { 1 } \\ \hat { x } _ { 2 } \\ \hat { \xi } _ { 2 } \end{pmatrix}$$ E q ∗ 1 1 = ˆ x ξ 1 ˆ 1 + ˆ x ξ 2 ˆ 2 = -ξ x 1 1 -ξ x 2 2 = -q 1 = glyph[epsilon1] f 1 q , 1 E q ∗ 1 2 = ˆ x ξ 1 ˆ 2 -ˆ x ξ 2 ˆ 1 = ξ 1 ( -x 2 ) -ξ 2 ( -x 1 ) = q . 2 - · glyph[epsilon1] f 2 = -1 : $$E _ { 2 } = \begin{pmatrix} 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \\ 1 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \end{pmatrix}$$ $$E _ { 2 } ^ { * } q _ { 1 } = \tilde { x } _ { 1 } \tilde { \xi } _ { 1 } + \tilde { x } _ { 2 } \tilde { \xi } _ { 2 } = x _ { 2 } \xi _ { 2 } + x _ { 1 } \xi _ { 1 } = q _ { 1 } \\ E _ { 2 } ^ { * } q _ { 2 } = \tilde { x } _ { 1 } \tilde { \xi } _ { 2 } - \tilde { x } _ { 2 } \tilde { \xi } _ { 1 } = x _ { 2 } \xi _ { 1 } - x _ { 1 } \xi _ { 2 } = - q _ { 2 } = \epsilon _ { 2 } ^ { \text{f} } q _ { 2 }.$$ And ( X x ) ∗ Q x k = I · ( X x ) t . What is left is to prove the preservation of ω . For ζ we have: $$\zeta _ { X ^ { f }, X ^ { e } } ^ { * } ( \omega ) = \zeta ^ { * } \omega _ { \mathfrak { k } } ^ { f } + \zeta ^ { * } \omega _ { \mathfrak { k } } ^ { e } + \zeta ^ { * } \omega _ { \mathfrak { k } } ^ { x }.$$ $$\zeta ^ { * } \omega _ { \mathbf k } ^ { \mathbf f } & = \mathfrak { R e } \left [ ( e ^ { - i \theta \cdot X ^ { \mathbf f } } d z _ { 1 } - i z _ { 1 } d \theta \cdot X ^ { \mathbf f } e ^ { - i \theta \cdot X ^ { \mathbf f } } ) \wedge ( e ^ { i \theta \cdot X ^ { \mathbf f } } d \tilde { z } _ { 2 } + i \tilde { z } _ { 2 } d \theta \cdot X ^ { \mathbf f } e ^ { i \theta \cdot X ^ { \mathbf f } } ) \right ] \\ & = \mathfrak { R e } \left [ d z _ { 1 } \wedge d \bar { z } _ { 2 } - d \theta \cdot X ^ { \mathbf f } \wedge i ( z _ { 1 } d \bar { z } _ { 2 } + z _ { 2 } d \bar { z } _ { 1 } ) \right ] \\ & = \omega _ { \mathbf k } ^ { \mathbf f } - d \left [ \, \theta \cdot X ^ { \mathbf f } \, \right ] \wedge d q _ { 2 }$$ $$\zeta$$ $$\zeta ^ { * } \omega _ { k } ^ { e } & = \sum _ { j = 1 } ^ { k _ { e } } \Im \left [ ( e ^ { - i \theta \cdot ( X _ { j } ^ { p } ) ^ { t } } d z _ { j } ^ { e } - i e ^ { - i \theta \cdot ( X _ { j } ^ { p } ) ^ { t } } z _ { j } ^ { e } d \theta \cdot ( X _ { j } ^ { e } ) ^ { t } ) \\ & \wedge ( e ^ { i \theta \cdot ( X _ { j } ^ { p } ) ^ { t } } d \bar { z } _ { j } ^ { e } + i e ^ { i \theta \cdot ( X _ { j } ^ { p } ) ^ { t } } \bar { z } _ { j } ^ { e } d \theta \cdot ( X _ { j } ^ { e } ) ^ { t } ) \right ] \\ & = \sum _ { j = 1 } ^ { k _ { e } } \Im \left [ d z _ { j } ^ { e } \wedge d \bar { z } _ { j } ^ { e } - d \theta \cdot ( X _ { j } ^ { e } ) ^ { t } \wedge i ( z _ { j } ^ { e } d \bar { z } _ { j } ^ { e } + \bar { z } _ { j } ^ { e } d z _ { j } ^ { e } ) \right ] \\ & = \omega _ { k } ^ { e } - \sum _ { j = 1 } ^ { k _ { e } } d \theta \cdot ( X _ { j } ^ { e } ) ^ { t } \wedge d q _ { j } ^ { e } \\ \\ & \zeta ^ { * } \omega _ { k } ^ { x } = d \theta \wedge d ( \mathbf I + Q _ { k } ^ { e } \cdot ( X ^ { e } ) ^ { t } + q _ { 2 } ( X ^ { f } ) ^ { t } ) \\ ( \text{ with formula } 2 ) \ = \omega _ { k } ^ { x } + d [ \theta \cdot X ^ { f } ] \wedge d q _ { 2 } + \sum _ { j = 1 } ^ { k _ { e } } d \theta \cdot ( X _ { j } ^ { e } ) ^ { t } \wedge d q _ { j } ^ { e } \\ \text{So when we sum } \zeta ^ { * } \omega _ { k } ^ { f }, \zeta ^ { * } \omega _ { k } ^ { e } \text{ and } \zeta ^ { * } \omega _ { k } ^ { f }, \text{ we get that } \zeta ^ { * } \omega = \omega.$$ So when we sum ζ ∗ ω f k , ζ ∗ ω e k and ζ ∗ ω x k , we get that ζ ∗ ω = ω . Now for η B , we can again treat separately the action on the different types E i 's, and just treat the case when the glyph[epsilon1] 's are = -1 . We have that E ∗ 1 2 , ω k = E ∗ 1 2 , ω f k + ω e k + ω x k and: $$\Phi _ { 1 } ^ { * } \omega _ { k } ^ { f } = d \hat { x } _ { 1 } \wedge d \hat { \xi } _ { 1 } + d \hat { x } _ { 2 } \wedge d \hat { \xi } _ { 2 } + d \hat { \theta } _ { 3 } \wedge d \hat { \xi } _ { 3 } \\ = d \xi _ { 1 } \wedge d ( - x _ { 1 } ) + d \xi _ { 2 } \wedge d ( - x _ { 2 } ) + d \theta _ { 3 } \wedge d \xi _ { 3 } = \omega _ { k } ^ { f } \\ E _ { 2 } ^ { * } \omega _ { k } ^ { f } = d \tilde { x } _ { 1 } \wedge d \tilde { \xi } _ { 1 } + d \tilde { x } _ { 2 } \wedge d \tilde { \xi } _ { 2 } + d \tilde { \theta } _ { 3 } \wedge d \tilde { \xi } _ { 3 } \\ = d x _ { 2 } \wedge d \xi _ { 2 } + d x _ { 1 } \wedge d \xi _ { 1 } + d \theta _ { 3 } \wedge d \xi _ { 3 } = \omega _ { k } ^ { f }. \\ \Gamma _ { 2 } \sim \Phi _ { 1 } \Phi _ { 2 } \Phi _ { 2 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 } \Phi _ { 3 }$$ ↦ Lastly, the transformation ( θ , I ) → ( θ · ( X x ) -1 , I · ( X x ) ) t is a linear symplectomorphism with respect to the symplectic form ω x k = ∑ k x j =1 dθ j ∧ dI j = d θ ∧ d I . This theorem means that the only symplectic invariants of the local model of a semi-toric critical value are the orientations of the half-spaces given by its elliptic components and its jet in q , q 1 2 . Conservation of plans orientations is only natural: symplectic structure is exactly the algebraic area on specific plans. Conservation of the jet of the focus-focus value, is a specificity of semi-toric systems. It is related to the Taylor expansion of action coordinates near a semi-toric critical value (see [Wac15]). ## 4. Image of moment map for a semi-toric integrable system Now that we have gathered enough results concerning local models, we can prove the principal result of this paper by exhibitng a local-to-global principle. ## Proof. of Theorem 1.6 ## Local proof of 1. , 2. and 3.: Let p be a critical point of Williamson type k with k f = 1 of a semi-toric integrable system ( M,ω,F ) . Applying Theorem 3.3, with the correct system of local coordinates ϕ in a neighborhood U of p , we have a smooth function G and a matrix A ∈ GL n -1 ( Z ) such that F ◦ ϕ = ( G 1 ( Q k ) , A ◦ ˇ ) Q k . So, the surface Γ U := V k ( U ) is parametrized as follows: let t be here the values of I . With Theorem 2.14, we know that t ∈ ˜ D ⊆ R k x . We define now h C ∞ ( ˜ D → R ) as ˜ ( h t ) := G 1 (0 , 0 0 , , . . . , 0 , t ) . With notations of Theorem 3.3, we set ︸ ︷︷ ︸ e k $$\Gamma _ { \mathcal { U } } \coloneqq V _ { \mathbf k } ( \mathcal { U } ) = \left \{ \tilde { H } ( \mathbf t ) = ( \tilde { h } ( \mathbf t ), \underbrace { F ^ { x } \circ \mathbf t, E ^ { x } \circ \mathbf t, X ^ { x } \circ \mathbf t } _ { = \colon S } ) | \mathbf t \in D \right \}.$$ On P k ( U ) , F is of rank k x by definition, and in Theorem 3.3, first column of Jac G ( ) is ( ∂ q 1 G , 1 0 , .., 0) T , so there exists a linear map S of R n such that S ◦ ˜ ( t t ) = ( S 1 ◦ ˜ ( h t ) , 0 , .., 0 , t )) . ︸ ︷︷ ︸ e k +1 glyph[negationslash] This proves points 1 . , 2 . and 3 . locally: P (Γ U ) is the affine space generated by Im h ( ) and Im T ( ) , and with h := S 1 ◦ ˜ h on U , we have that Γ U is the graph of h on D . Note that since ∂ q 1 G 1 (0 , .., 0 , t ) = 0 , Im h ( ) is not in Im T ( ) . ## Global proof of 1. , 2. and 3.: If we call U p the open set given for a point p ∈ M by Theorem 2.11, the family {U } p p ∈ M is an open covering of M , so we can extract a finite one of it. If we now fix k , each open set U k i gives a surface Γ i , in V k ( M ) there is at most a finite number m k of surfaces: V k ( M ) = ⋃ m k i =1 V k ( U k i ) = ⋃ m k i =1 Γ i . We want to show that the covering { U k i } i =1 ..m k of P k ( M ) can be optimized in the sense that we can take a U k i containing a connected component of P k ( M ) . A consequence is that m k is then minimal. Two open sets U i and U j may intersectect. In this case, with Theorems 3.5 and 3.7 we can always modify one of the two local models so that we have a local model on the union U ∪ U i j that is a natural extension of each local model. We will see that it extends also results of Theorem 1.6. On each open set we can apply the results proved before, and get a h i and P (Γ ) i for each Γ i . Since the change of local model between U i and U j is the identity on P k ( U ∩ U i j ) , we have first that P (Γ ) = i P (Γ ) j . We can also set a function h on the union as following $$h _ { \mathcal { U } _ { i } \cup \mathcal { U } _ { j } } \coloneqq \begin{cases} h _ { i } \text{ on } \mathcal { U } _ { i } &. \\ h _ { j } \text{ on } \mathcal { U } _ { j } &. \end{cases}$$ . It is consistent because of Theorems 3.5 and 3.7. From this, we can extend step by step Theorem 1.6 from a U k i containing a p to the reunion of all U k j path connected to p . It is an open set, the finite union of U k i that contains the connected component of P k ( M ) containing p . This family of open sets is finite and disjoint. Thus, P k ( M ) has a finite number of connected components which are strongly separated. This proves 1 . , 2 . and 3 . globally. ## Proof of Item 4.: If we suppose that the fibers are connected, then for a critical value v , it now makes sense to talk of its Williamson index k . Taking p ∈ F -1 ( v ) , there is a unique connected component of P k ( M ) that contains p , and hence a unique Γ i in V k ( M ) that contains v . The connected components of P k ( M ) being strongly isolated, we have that Γ i is strongly isolated as well. ## 5. Conclusion In this article, we have presented local techniques for the investigation of semi-toric and almost-toric systems. In the description of the image of the moment maps, one shall think about the Q k as 'singular local coordinates' for the image of the moment map. We have showed how these singular local coordinates can be used to describe 'singular manifolds', by analogy with local coordinates and manifolds. In the case 2 n = 6 , Theorem 1.6 is very visual: FF -X critical values are a union of nodal paths; each nodal path is contained in a plane. All these planes share a common direction, and a nodal path is the embedding of the graph of a smooth function from R to R . As calculus in local coordinates for regular manifolds, the calculus in local singular coordinates is a very efficient techniques to provide results even in unfriendly settings. For instance, although we don't know the precise form it may take, there must be an extension of Theorem 1.6 to almost-toric systems of any complexity, or to non-compact manifolds. Local models are one technique, it is not the only one. In upcoming articles, we shall give another approach for the description of the V k , using more general arguments like Atiyah - Guillemin &amp; Steinberg theorem. We shall rely on it to prove that the fibers of semi-toric systems are connected. ## Bibliography ## References | [Ati82] | M. F. Atiyah. Convexity and commuting hamiltonians. Bulletin of the London Mathematical Society , 14(1):1-15, 1982. | |-----------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [BF04] | A. V. Bolsinov and A. T. Fomenko. Integrable Hamiltonian systems; Geometry, topology, classification . Chapman & Hall, 2004. Translated from the 1999 Russian original. | | [Cha86] | M. Chaperon. Géométrie différentielle et singularités de systèmes dynamiques . Number 138-139. 1986. | | [Cha12] | M. Chaperon. Normalisation of the smooth focus-focus: a sim- ple proof. with an appendix by jiang kai. Acta Mathematica Vietnamica , page 8, 2012. | | [Del88] | T. Delzant. Hamiltoniens périodiques et images convexes de l'application moment. Bull. Soc. Math. Fr. , 116(3):315-339, 1988. | | [Del90] | T. Delzant. Classification des actions hamiltoniennes compléte- ment intégrables de rang deux. Annals of Global Analysis and Geometry , 8:87-112, 1990. 10.1007/BF00055020. | | [dVV79] | Y. Colin de Verdiere and J. Vey. Le lemme de morse isochore. Topology , 18(4):283 - 293, 1979. | | [Eli84] | L. H. Eliasson. Hamiltonian systems with Poisson commuting integrals . PhD thesis, Stockholm, 1984. | | [Eli90] | L. H. Eliasson. Normal forms for Hamiltonian systems with Poisson commuting integrals - elliptic case. Commentarii Mathe- matici Helvetici , 65:4-35, 1990. | | [GS82] | V. Guillemin and S. Sternberg. Convexity properties of the moment mapping. Inventiones Mathematicae , 67:491-513, 1982. 10.1007/BF01398933. | | [GS84] | V. Guillemin and S. Sternberg. Convexity properties of the moment mapping. ii. Inventiones Mathematicae , 77:533-546, 1984. 10.1007/BF01388837. | | [KT01] | Y. Karshon and S. Tolman. Centered complexity one Hamiltonian torus actions. 353(12):4831-4861 (electronic), 2001. | | [KT03] | Y. Karshon and S. Tolman. Complete invariants for Hamiltonian torus actions with two dimensional quotients. J. Symplectic Geom. , 2(1):25-82, 2003. | |----------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [KT11] | Y. Karshon and S. Tolman. Classification of Hamiltonian torus ac- tions with two dimensional quotients. ArXiv e-prints , September 2011. | | [LS10] | N. C. Leung and M. Symington. Almost toric symplectic four- manifolds. J. Symplectic Geom. , 8(2):143-187, 2010. | | [MZ04] | E. Miranda and Nguyen Tien Zung. Equivariant normal form for nondegenerate singular orbits of integrable hamiltonian systems. Annales Scientifiques de l'École Normale Supérieure , 37(6):819 - 839, 2004. | | [PRVN11] | A. Pelayo, T. S. Ratiu, and S. V. V˜ u Ngoc. . Symplectic bifurcation theory for integrable systems. ArXiv e-prints , August 2011. | | [PVN09] | A. Pelayo and S. V˜ u Ngoc. . Semitoric integrable systems on symplectic 4-manifolds. Inventiones Mathematicae , 177:571-597, 2009. 10.1007/s00222-009-0190-x. | | [PVN11] | A. Pelayo and S. V˜ u Ngoc. . Constructing integrable systems of semitoric type. Acta Mathematica , 206:93-125, 2011. | | [Sym01] | M. Symington. Four dimensions from two in symplectic topol- ogy. Proc. Sympos. Pure Math., 71, Amer. Math. Soc., Provi- dence, RI. , Topology and geometry of manifolds (Athens, GA, 2001)(71):153-208, 2001. | | [Vey78] | J. Vey. Sur certains systemes dynamiques separables. American Journal of Mathematics , 100(3):pp. 591-614, 1978. | | [VN00] | S. V˜ u Ngoc. . Bohr-Sommerfeld conditions for integrable systems with critical manifolds of focus-focus type. Comm. Pure Appl. Math. , 53(2):143-217, 2000. | | [VN03] | S. V˜ u Ngoc. . On semi-global invariants for focus-focus singularities. Topology , 42(2):365-380, 2003. | | [VN07] | S. V˜ u Ngoc. . Moment polytopes for symplectic manifolds with monodromy. Advances in Mathematics , 208(2):909 - 934, 2007. | | [VNW13] | S. V˜ u Ngoc . and C. Wacheux. Smooth normal forms for inte- grable hamiltonian systems near a focus-focus singularity. Acta Mathematica Vietnamica , 38(1):107-122, 2013. | |-----------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [Wac15] | C. Wacheux. Asymptotics of action variables near semi- toric singularities. Journal of Geometry and Physics , 2015. http://dx.doi.org/10.1016/j.geomphys.2015.07.023. | | [Wil36] | J. Williamson. On the algebraic problem concerning the normal form of linear dynamical systems. American Journal of Mathe- matics , 58(1):141-163, 1936. | | [Zun96] | Nguyen Tien Zung. Symplectic topology of integrable hamiltonian systems. i : Arnold-liouville with singularities. Compos. Math. , 101(2):179-215, 1996. | | [Zun97] | Nguyen Tien Zung. A note on focus-focus singularities. Differen- tial Geometry and its Applications , 7(2):123 - 130, 1997. | | [Zun02] | Nguyen Tien Zung. Another note on focus-focus singularities. Letter in Mathematical Physics , 60(1):87-99, 2002. | | [Zun03] | Nguyen Tien Zung. Symplectic topology of integrable hamiltonian systems, ii: Topological classification. Compositio Mathematica , 138(02):125-156, 2003. |
null
[ "Christophe Wacheux" ]
2014-08-06T02:23:39+00:00
2015-10-05T21:09:05+00:00
[ "math.SG", "53D20, 37J05, 37K10" ]
Local model of semi-toric integrable systems: theory and applications
In this article we show how one can use the local models of integrable Hamiltonian systems near critical points to prove a localization theorem for certain singular loci of integrables semi-toric systems for dimension greater than 4.
1408.1167v1
## Boosted Markov Networks for Activity Recognition - # Tran The Truyen 1 , Hung Hai Bui 2 , Svetha Venkatesh 3 Department of Computing, Curtin University of Technology GPO Box U 1987, Perth, WA, Australia. 1 3 , { trantt2,svetha } @cs.curtin.edu.au, 2 [email protected] ## Abstract We explore a framework called boosted Markov networks to combine the learning capacity of boosting and the rich modeling semantics of Markov networks and applying the framework for video-based activity recognition. Importantly, we extend the framework to incorporate hidden variables. We show how the framework can be applied for both model learning and feature selection. We demonstrate that boosted Markov networks with hidden variables perform comparably with the standard maximum likelihood estimation. However, our framework is able to learn sparse models, and therefore can provide computational savings when the learned models are used for classification. ## 1 Introduction Recognising human activities using sensors is currently a major challenge in research. Typically, the information extracted directly from sensors is either not discriminative enough or is too noisy to infer activities occurring in the scene. Human activities are complex and evolve dynamically over time. Temporal probabilistic models such as hidden Markov models (HMMs) and dynamic Bayesian networks (DBNs) have been the dominant models used to solve the problem [1, 4, 19]. However, these models make a strong assumption in the generative process by which the data is generated in the model. This makes the representation of complex sensor data very difficult, and possibly results in large models. Markov networks (MNs) (also known as Markov random fields) offer an alternative approach, especially in form of conditional random fields (CRFs) [10]. In CRFs, the observation is not modelled, and so we have the freedom to incorporate overlapping features, multiple sensor fusion, and long-range dependencies into the model. The discriminative nature and the underlying graphical structure of the MNs make it especially suitable to the problem of human activity recognition. Boosting is a general framework to gradually improve the performance of the weak learner (which can be just slightly better than a random guess). A popular version called AdaBoost [6, 14, 15] forces the weak learner to focus more on hard-to-learn examples from the examples seen so far. The final strong learner is the weighted sum of all weak learners added to this ensemble in each iteration. Most of the work so far with boosting involves only unstructured output, except for a few occasions, such as the work in [2, 5, 18]. We are motivated to use boosting for parameter estimation of Markov networks (which we call boosted Markov networks (BMNs)), as recent results have shown the close relationship between boosting and the maximum likelihood estimation (MLE) [8, 11]. Furthermore, we use the inherent capacity of boosting for feature selection integrated with learning. We are motivated by studies that the typical log-linear models imposed on Markov networks can easily be overfitted with little data and many irrelevant features, but can be overcome by the use of explicit feature selection, either independently or integrated with learning (e.g. see [13]). Previous work [2, 5, 18] have explored the BMNs showing promising results. The BMNs integrate the discriminative learning power of boosting and the rich semantics of the graphical model of Markov networks. In this paper, we further explore alternative methods for this approach. To handle hidden variables as in the standard MLE, we extend the work by Altun et al. [2]. This is a variant of the multiclass boosting algorithm called AdaBoost.MR [6, 15]. We also suggest an approximation procedure for the case of intractable output structures. The proposed framework is demonstrated through our experiments in which boosting can provide a comparable performance to MLE. However, since our framework uses sparse features it has the potential to provide computational savings during recognition. The novelty of the paper is two-fold: a) We present the first work in applying boosting for activity recognition, and b) we derive a boosting procedure for structured models with missing variables and use a parameter update based on quadratic approximation instead of loose upper bounds as in [2] to speed up the learning. The organisation of the paper is as follows. The next section reviews related work. Section 3 presents the concept of boosted Markov networks (BMNs) detailing how boosting is employed to learn parameters of Markov networks. Section 4 goes into the details of efficient computation for tree-structured and general networks. We then describe our experiments and results in applying the model to video-based human activity recognition in an indoor environment. The last section discusses any remaining issues. ## 2 Related work Our work is closely related to that in [5], where boosting is applied to learn parameters of the CRFs using gradient trees [7]. The objective function is the log-likelihood in the standard MLE setting, but the training is based on fitting regression trees in a stage-wise fashion. The final decision function is in the form of a linear combination of regression trees. [5] employs functional gradients for the log-loss in a manner similar to LogitBoost [8], whilst we use the original gradients of the exponential loss of AdaBoost [6, 14, 15]. Thus [5] learns the model by maximising the likelihood of the data, while we are motivated by minimising the errors in the data directly. Moreover, [5] indirectly solves the structured model learning problem of MLE by converting the problem to a standard unstructured learning problem with regression trees. In contrast, we solve the original structured learning problem directly without the structured-unstructured conversion. In addition, the paper in [5] does not incorporate hidden variables as our work does. Another work, [18], integrates the message passing algorithm of belief propagation (BP) with a variant of LogitBoost [8]. Instead of using the per-network loss as in [5], the authors of [18] employ the per-label loss (e.g. see [3] for details of the two losses), that is they use the marginal probabilities. Similar to [5], [18] also converts the structured learning problem into a more conventional unstructured learning problem. The algorithm thus alternates between a message passing round to update the local per-label log-losses, and a boosting round to update the parameters. However, as the BP is integrated in the algorithm, it is not made clear on how to apply different inference techniques when the BP fails to converge in general networks. It is also unclear on how to extend the method to deal with hidden variables. There have been a number of attempts to exploit the learning power of boosting applied to structured models other than Markov networks, such as dynamic Bayesian networks (DBNs) [9], Bayesian network classifier [21], and HMMs [20]. ## 3 Boosted Markov networks ## 3.1 Markov networks We are interested in learning a structured model in which inference procedures can be performed. A typical inference task is decoding, e.g. to find the most probable label set (configuration) y ∗ for the network given an observation x y ∗ = arg max y p y x ( | ). For a single node network, this is often called the classification problem. For a network of N nodes, the number of configurations is exponentially large. We assume the conditional exponential distribution (a.k.a. log-linear model) $$p ( y | x ) = \frac { 1 } { Z ( x ) } \exp ( F ( x, y ) )$$ where Z x ( ) = ∑ y exp( F x, y ( )) is the normalisation factor, and F x, y ( ) = ∑ k λ f k k ( x, y ). { f k } are features or weak hypotheses in boosting literature. This conditional model is known as the conditional random fields (CRFs) [10]. The decoding reduces to y ∗ = arg max y F x, y ( ). Often, in Markov networks the following decomposition is used $$f _ { k } ( x, y ) = \sum _ { c } f _ { k } ( x, y _ { c } )$$ where c is the index of the clique defined by the structure of the network. This decomposition is essential to obtain a factorised distribution, which is vital for efficient inference in tree-like structures using dynamic programming. Denote by y = ( v, h ) the visible and hidden variables (which are represented by nodes in the network). Given n i.i.d observations { x i } n i =1 , maximum likelihood learning in MNs minimises the log-loss $$L _ { l o g } = - \sum _ { i } \log p ( v ^ { i } | x ^ { i } ) = \sum _ { i } \log \frac { 1 } { p ( v ^ { i } | x ^ { i } ) }$$ ## 3.2 Exponential loss for incomplete data We view the activity labeling and segmentation problems as classification where the number of distinct classes is exponentially large, i.e. | Y | N , where | Y | is the size of label set, and N is the number of nodes in the Markov network. Following the development by Altun et al. [2], we define a new expected ranking loss [15] to incorporate hidden variables as follows glyph[negationslash] $$L _ { r a n k } = \sum _ { i } \sum _ { h } p ( h | v ^ { i }, x ^ { i } ) \sum _ { v \neq v ^ { i } } \delta [ \Delta F ( x ^ { i }, v, h ) > 0 ]$$ glyph[negationslash] where ∆ F x , v, h ( i ) = F x , v, h ( i ) -F x , v , h ( i i ), and δ z [ ] is the indicator function of whether the predicate z is true. This rank loss captures the expectation of moments in which the classification is wrong because if it is true, then max v F x , v, h ( i ) = F x , v , h ( i i ) implying F x , v, h ( i ) &lt; F x , v , h ( i i ) ∀ v = v i . However, it is much more convenient to deal with a smooth convex loss and thus we formulate an upper bound of the rank loss, e.g. the exponential loss $$L _ { e x p } = \sum _ { i } \sum _ { h } p ( h | v ^ { i }, x ^ { i } ) \sum _ { v } \exp ( \Delta F ( x ^ { i }, v, h ) )$$ It is straightforward to check that (5) is indeed an upper bound of (4). It can be seen that (4) includes the loss proposed in [2] as a special case when all variables are observed, i.e. y = v . It is essentially an adapted version of AdaBoost.MR proposed in [15]. A difficulty with this formulation is that we do not know the true conditional distribution p h v , x ( | i i ). First, we approximate it by the learned distribution at the previous iteration. Thus, the conditional distribution is updated along the way, starting from some guessed distribution, for example, a uniform distribution. Second, we assume the log-linear model as in (1), leading to $$\sum _ { v } \exp ( \Delta F ( x ^ { i }, v, h ) ) = \frac { \sum _ { v } \exp ( F ( x ^ { i }, v, h ) ) } { \exp ( F ( x ^ { i }, v ^ { i }, h ) ) } = \frac { 1 } { p ( v ^ { i } | h, x ^ { i } ) }$$ which can be fed into (5) to obtain $$L _ { e x p } = \sum _ { i } \sum _ { h } \frac { p ( h | v ^ { i }, x ^ { i } ) } { p ( v ^ { i } | h, x ^ { i } ) } = \sum _ { i } \frac { 1 } { p ( v ^ { i } | x ^ { i } ) }$$ We can notice the similarity between the exponential loss in (6) and the log-loss in (3) as log(.) is a monotonically increasing function. The difference is the exponential scale used in (6) with respect to features { f k } compared to the linear scale in (3). ## 3.3 Boosting-based learning The typical boosting process has many rounds, each of which selects the best weak hypothesis and finds the weight for this hypothesis to minimise the loss. Translated in our context, the boosting-based learning searches for the best feature f j and its coefficient to add to the ensemble F t +1 = F t + α f t j so that the loss in (5) is minimised. $$( \alpha ^ { t }, j ) \ & = \ \arg \min _ { \alpha, k } L _ { e x p } ( t, \alpha, k ), \ \text{where} \\ L _ { e x p } ( t, \alpha, k ) \ & = \ \sum _ { i } E _ { h | v ^ { i }, x ^ { i }, t } [ \sum _ { v } \exp ( \Delta F ^ { i, t } + \alpha \Delta f ^ { i } _ { k } ) ]$$ where E h v ,x ,t | i i [ z h ( )] = ∑ h p h v , x , t ( | i i ) z h ( ); F i,t and f i k are shorthands for F t ( x , v, h i ) and f k ( x , v, h i ), respectively. Note that this is just an approximation to (5) because we fix the conditional distribution p h v , x , t ( | i i ) obtained from the previous iteration. However, this still makes sense since the learning is incremental, and thus the estimated distribution will get closer to the true distribution along the way. Indeed, this captures the essence of boosting: during each round, the weak learner selects the weak hypothesis that best minimises the following loss over the weighted data distribution (see [15]) $$( \alpha ^ { t }, j ) = \arg \min _ { \alpha, k } \sum _ { i } \sum _ { v, h } D ( i, v, h, t ) \exp ( \alpha \Delta f _ { k } ^ { i } )$$ where the weighted data distribution D i, v, h, t ( ) = p h v , x , t ( | i i ) exp(∆ F i,t ) /Z i, t ( ) with Z i, t ( ) being the normalising constant. Since the data distribution does not contain α , (8) is identical to (7) up to a constant. ## 3.4 Beam search It should be noted that boosting is a very generic framework to boost the performance of the weak learner. Thus we can build more complex and stronger weak learners by using some ensemble of features and then later fit them into the boosting framework. However, here we stick to simple weak learners, which are features, to make the algorithm compatible with the MLE. We can select a number of top features and associated coefficients that minimise the loss in (8) instead of just one feature. This is essentially a beam search with specified beam size S . ## 3.5 Regularisation We employ the l 2 regularisation term to make it consistent with the popular Gaussian prior used in conjunction with the MLE of Markov networks. It also maintains the convexity of the original loss. The regularised loss becomes $$L _ { r e g } = L _ { n o n - r e g } + \sum _ { k } \frac { \lambda _ { k } ^ { 2 } } { 2 \sigma _ { k } ^ { 2 } }$$ where L non -reg is either L log for MLE in (3) or L exp for boosting in (5). Note that the regularisation term for boosting does not have the Bayesian interpretation as in the MLE setting but is simply a constraint to prevent the parameters from growing too large, i.e. the model fits the training data too well, which is clearly sub-optimal for noisy and unrepresentative data. The effect of regularisation can be numerically very different for the two losses, so we cannot expect the same σ for both MLE and boosting. ## 4 Efficient computation Straightforward implementation of the optimisation in (7) or (8) by sequentially and iteratively searching for the best features and parameters can be impractical if the number of features is large. This is partly because the objective function, although it can be tractable to compute using dynamic programming in tree-like structures, is still expensive. We propose an efficient approximation which requires only a few vectors and an one-step evaluation. The idea is to exploit the convexity of the loss function by approximating it with a convex quadratic function using second-order Taylor's expansion. The change due to the update is approximated as $$\Delta J ( \alpha, k ) \approx \frac { d J ( \alpha, k ) } { d \alpha } \Big | _ { \alpha = 0 } \alpha + \frac { 1 } { 2 } \frac { d ^ { 2 } J ( \alpha, k ) } { d \alpha ^ { 2 } } \Big | _ { \alpha = 0 } \alpha ^ { 2 }$$ where J α, k ( ) is a shorthand for L t, α, k ( ). The selection procedure becomes ( α , j t ) = arg min α,k J α, k ( ) = arg min α,k ∆ ( J α, k ). The optimisation over α has an analytical solution α t = -J /J ′ ′′ . Once the feature has been selected, the algorithm can proceed by applying an additional line search step to find the best coefficient as α t = arg min α L t, α, j ( ). One way to do is to repeatedly apply the update based on (10) until convergence. Up to now, we have made an implicit assumption that all computation can be carried out efficiently. However, this is not the case for general Markov networks because most quantities of interest involve summation over an exponentially large number of network configurations. Similar to [2], we show that dynamic programming exists for tree-structured networks. However, for general structures, approximate inference must be used. There are three quantities we need to compute: the distribution p v ( i | x i ) in (6), the first and second derivative of J in (10). For the distribution, we have p v ( i | x i ) = ∑ h p v , h x ( i | i ) = Z v , i /Z ( i ) ( ) i where Z v , i ( i ) = ∑ h exp( ∑ c F x , v , h ( i i c c )) and Z i ( ) = ∑ y exp( ∑ c F x , y ( i c )). Both of these partition functions are in the form of sum-product, thus, they can be computed efficiently using a single pass through the tree-like structure. The first and second derivatives of J are then $$J ^ { \prime } | _ { \alpha = 0 } \ = \ \sum _ { i } E _ { h | v ^ { i }, x ^ { i }, t } [ \sum _ { v } \exp ( \Delta F ^ { i, t } ) \Delta f _ { k } ^ { i } ]$$ $$J ^ { \prime \prime } | _ { \alpha = 0 } \ = \ \sum _ { i } E _ { h | v ^ { i }, x ^ { i }, t } [ \sum _ { v } \exp ( \Delta F ^ { i, t } ) ( \Delta f _ { k } ^ { i } ) ^ { 2 } ]$$ Expanding (11) yields $$J ^ { \prime } | _ { \alpha = 0 } = \sum _ { i } \frac { 1 } { p ( v ^ { i } | x ^ { i }, t ) } \sum _ { v, h } p ( v, h | x ^ { i }, t ) \Delta f _ { k } ^ { i }$$ Note that f i k has the additive form as in (2) so ∆ f k ( x , y i ) = ∑ c ∆ f k ( x , y i c ). Thus (13) reduces to $$J ^ { \prime } | _ { \alpha = 0 } = \sum _ { i } \frac { 1 } { p ( v ^ { i } | x ^ { i }, t ) } \sum _ { c } \sum _ { y _ { c } } p ( y _ { c } | x ^ { i }, t ) \Delta f _ { k } ( x ^ { i }, y _ { c } )$$ which now contains clique marginals and can be estimated efficiently for tree-like structure using a downward and upward sweep. For general structures, loopy belief propagation can provide approximate estimates. Details of the procedure are omitted here due to space constraints. However, the computation of (12) does not enjoy the same efficiency because the square function is not decomposable. To make it decomposable, we employ Cauchy's inequality to yield the upper bound of the change in (10) $$( \Delta f _ { k } ( x ^ { i }, y ) ) ^ { 2 } = ( \sum _ { c } \Delta f _ { k } ( x ^ { i }, y _ { c } ) ) ^ { 2 } \leq | C | \sum _ { c } \Delta f _ { k } ( x ^ { i }, y _ { c } ) ^ { 2 }$$ where | C | is the number of cliques in the network. The update using α = -J /J ′ ˜ , where ′′ ˜ J ′′ is the upper bound of the second derivative J ′′ , is rather conservative, so it is clear that a further line search is needed. Moreover, it should be noted that the change in (10), due to the Newton update, is ∆ ˜ ( J α, k ) = -0 5( . J ′ ) 2 /J ˜ , where ∆ ˜ is the upper bound of the change ∆ ′′ J J due to Cauchy's inequality, so the weak learner selection using the optimal change does not depend on the scale of the second derivative bound of ˜ . J ′′ Thus the term | C | in Cauchy's inequality above can be replaced by any convenient constant. The complexity of our boosting algorithm is the same as that in the MLE of the Markov networks. This can be verified easily by taking the derivative of the log-loss in (3) and comparing it with the quantities required in our algorithm. ## 5 Experimental results We restrict our attention to the linear-chain structure for efficient computation because it is sufficient to learn from the video data we capture. For all the experiments reported here, we train the model using the MLE along with the limited memory quasi-Newton method (L-BFGS) and we use the proposed boosting scheme with the help of a line search, satisfying Amijo's conditions. For regularisation, the same σ is used for all features for simplicity and is empirically selected. In the training data, only 50% of labels are randomly given for each data slice in the sequence. For the performance measure, we report the per-label error and the average F 1-score over all distinct labels. ## 5.1 Data and feature extraction In this paper, we evaluate our boosting framework on video sensor data. However, the framework is applicable to different type of sensors and is able to fuse different sensor information. The observational environment is a kitchen and dining room with two cameras mounted to two opposite ceiling corners (Figure 1). The observations are sequences of noisy coordinates of a person walking in the scene extracted from video using a background subtraction algorithm. The data was collected in our recent work [12], consisting of 90 video sequences spanning three scenarios: SHORT MEAL, HAVE SNACK and NORMAL MEAL. We pick a slightly smaller number of sequences, of which we select 42 sequences for training and another 44 sequences for testing. Unlike [12], we only build flat models, thus separate models for each scenario are learned and tested. The labels are sequences of the 'activities' the person is performing, for example 'going-fromdoor-to-fridge' . For training, only partial label sets are given, leaving a portion of the label missing. For testing, the labels are not provided, and the labels obtained from the decoding task are compared against the ground-truth. It turns out that informative features are critical to the success of the models. At the same time, the features should be as simple and intuitive as possible to reduce manual Figure 1: The environment and scene viewed from the two cameras. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1167v1-figure-82b47033-51fd-4702-a57d-7f456b7a81bd.jpg) labour. At each time slice τ , we extract a vector of 5 elements from the observation sequence g x, τ ( ) = ( X,Y,u X , u Y , s = √ u 2 X + u 2 Y ), which correspond to the ( X,Y ) coordinates, the X &amp; Y velocities, and the speed, respectively. These observation features are approximately normalised so that they are of comparable scale. ## 5.2 Effect of feature selection Following previous boosting applications (e.g.[16]), we employ very simple decision rules: a weak hypothesis (feature function) returns a real value if certain conditions on the training data points are met, and 0 otherwise. We design three feature sets. The first set, called the activity-persistence , captures the fact that activities are in general persistent. The set is divided into data-association features $$f _ { l, m } ( x, y _ { \tau } ) = \delta [ y _ { \tau } = l ] g _ { m } ( x, \tau )$$ where m = 1 , .., 5, and label-label features $$f _ { l, m } ( x, y _ { \tau - 1 }, y _ { \tau } ) = \delta [ y _ { \tau - 1 } = y _ { \tau } ] \delta [ y _ { \tau } = l ]$$ Thus the set has K = 5 | Y | + | Y | features, where | Y | is the size of the label set. The second feature set consists of transition-features that are intended to encode the activity transition nature as follows $$f _ { l 1, l 2, m } ( x, y _ { \tau - 1 }, y _ { \tau } ) = \delta [ y _ { \tau - 1 } = l 1 ] \delta [ y _ { \tau } = l 2 ] g _ { m } ( x, \tau )$$ $$( 1 7 )$$ Thus the size of the feature set is K = 5 | Y | 2 . The third set, called the context set , is a generalisation of the second set. Observationfeatures now incorporate neighbouring observation points within a sliding window of width W $$g _ { m } ( x, \tau, \epsilon ) = g _ { m } ( x, \tau + \epsilon )$$ Table 1: Performance on three data sets, activity-persistence features. SM = SHORT MEAL, HS = HAVE SNACK , NM = NORMAL MEAL, Agthm = algorithm, itrs = number of iterations, ftrs = number of selected features, % ftrs = portion of selected features. | Data | SM | SM | HS | HS | NM | NM | |----------|------|-------|------|-------|------|-------| | Agthm | MLE | Boost | MLE | Boost | MLE | Boost | | σ | ∞ | ∞ | ∞ | ∞ | ∞ | ∞ | | error(%) | 10.3 | 16.6 | 12.4 | 14.5 | 9.7 | 17.2 | | F1(%) | 86.0 | 80.2 | 84.8 | 82.1 | 87.9 | 77.4 | | itrs | 100 | 500 | 100 | 200 | 100 | 200 | | # ftrs | 30 | 30 | 30 | 30 | 42 | 35 | | % ftrs | 100 | 100 | 100 | 100 | 100 | 83.3 | where glyph[epsilon1] = -W,.. , ..W l 0 u with W l + W u + 1 = W . This is intended to capture the correlation of the current activity with the past and the future, or the temporal context of the observations. The second feature set is a special case with W = 1. The number of features is a multiple of that of the second set, which is K = 5 W Y | | 2 . The boosting studied in this section has the beam size S = 1, i.e. each round picks only one feature to update its weight. Tables 1, 2, 3 show the performance of the training algorithms on test data of all three scenarios (SHORT MEAL, HAVE SNACK and NORMAL MEAL) for the three feature sets, respectively. Note that the infinite regularisation factor σ means that there is no regularisation. In general, sequential boosting appears to be slower than the MLE because it updates only one parameter at a time. For the activity persistence features (Table 1), the feature set is very compact but informative enough so that the MLE attains a reasonably high performance. Due to this compactness, the feature selection capacity is almost eliminated, leading to poorer results as compared with the MLE. However, the situation changes radically for the activity transition feature set (Table 2) and for the context feature set (Table 3). When the observation context is small, i.e. W = 1, boosting consistently outperforms the MLE whilst maintaining only a partial subset of features ( &lt; 50% of the original feature set). The feature selection capacity is demonstrated more clearly with the context-based feature set ( W = 11), where less than 9% of features are selected by boosting for the SHORT MEAL scenario, and less than 3% for the NORMAL MEAL scenario. The boosting performance is still reasonable despite the fact that a very compact feature set is used. There is therefore a clear computational advantage when the learned model is used for classification. ## 5.3 Learning the activity-transition model We demonstrate in this section that the activity transition model can be learned by both the MLE and boosting. The transition feature sets studied previously do not separate the transitions from data, so the transition model may not be correctly learned. We design another feature set, which is the bridge between the activity-persistence and the transition feature set. Similar to the activity persistence set, the new set is divided into Table 2: Performance on activity transition features | Data | SM | SM | HS | HS | NM | NM | |----------|------|-------|------|-------|------|-------| | Agthm | MLE | Boost | MLE | Boost | MLE | Boost | | σ | ∞ | ∞ | ∞ | ∞ | ∞ | ∞ | | error(%) | 18.6 | 10.1 | 13.0 | 10.8 | 15.0 | 16.5 | | F1(%) | 75.8 | 89.3 | 86.8 | 85.7 | 81.4 | 80.9 | | itrs | 59 | 200 | 74 | 100 | 53 | 100 | | # ftrs | 125 | 57 | 125 | 44 | 245 | 60 | | % ftrs | 100 | 45.6 | 100 | 35.2 | 100 | 24.5 | Table 3: Performance on context features with window size W = 11 | Data | SM | SM | HS | HS | NM | NM | |----------|------|-------|------|-------|------|-------| | Agthm | MLE | Boost | MLE | Boost | MLE | Boost | | σ | 2 | 2 | ∞ | ∞ | ∞ | ∞ | | error(%) | 15.3 | 9.6 | 9.4 | 11.2 | 9.3 | 16.6 | | F1(%) | 81.6 | 87.7 | 89.3 | 86.6 | 87.7 | 78.1 | | itrs | 51 | 200 | 22 | 100 | 21 | 100 | | # ftrs | 1375 | 115 | 1375 | 84 | 2695 | 80 | | % ftrs | 100 | 8.36 | 100 | 6.1 | 100 | 3.0 | data-association features, as in (15), and label-label features $$f _ { l 1, l 2 } ( y _ { \tau - 1 }, y _ { \tau } ) = \delta [ y _ { \tau - 1 } = l 1 ] \delta [ y _ { \tau } = l 2 ]$$ Thus the set has K = 5 | Y | + | Y | 2 features. Given the SHORT MEAL data set, and the activity transition matrix in Table 4, the parameters corresponding to the label-label features are given in Tables 5 and 6, as learned by boosting and MLE, respectively. At first sight, it may be tempting to select non-zero parameters and their associated transition features, and hence the corresponding transition model. However, as transition features are non-negative (indicator functions), the model actually penalises the probabilities of any configurations that activate negative parameters exponentially, since p y x ( | ) ∝ exp( λ f k k ( y τ -1 , y τ )). Therefore, huge negative parameters practically correspond to improbable configurations. If we replace all non-negative parameters in Table 5 and 6 by 1, and the rest by 0, we actually obtain the transition matrix in Table 4. The Table 4: Activity transition matrix of SHORT MEAL data set | Activity | 1 | 2 | 3 | 4 | 11 | |------------|-----|-----|-----|-----|------| | 1 | 1 | 1 | 0 | 0 | 0 | | 2 | 0 | 1 | 1 | 0 | 1 | | 3 | 0 | 0 | 1 | 1 | 0 | | 4 | 0 | 0 | 0 | 1 | 0 | | 11 | 0 | 0 | 0 | 0 | 1 | Table 5: Parameter matrix of SHORT MEAL data set learned by boosting | Activity | 1 | 2 | 3 | 4 | 11 | |------------|---------|---------|-----------|---------|-----------| | 1 | 1.8 | 0 | -5904.9 | -5904.9 | 0 | | 2 | -5904.9 | 3.6 | 0 | -5904.9 | 0 | | 3 | -5904.9 | -5904.9 | 2.425 | 0 | -5904.9 | | 4 | -5904.9 | -5904.9 | -5904.9 | 2.4 | -5904.9 | | 11 | -5904.9 | -5904.9 | -5904.9 | -5904.9 | 2.175 | Table 6: Parameter matrix of SHORT MEAL data set learned by MLE | Activity | 1 | 2 | 3 | 4 | 11 | |------------|---------|----------|---------|---------|----------| | 1 | 10.81 | 4.311 | -5.7457 | -5.3469 | -1.8398 | | 2 | -2.2007 | 15.056 | 3.6388 | -5.6644 | 0.41921 | | 3 | -5.3565 | -2.3131 | 9.3656 | 1.6575 | -2.3736 | | 4 | -5.4103 | -4.556 | -4.1142 | 7.1332 | -5.2976 | | 11 | -3.17 | -0.09001 | -2.9518 | -4.8741 | 8.9128 | difference between boosting and MLE is that boosting penalises the improbable transitions much more severely, thus leading to much sharper decisions with high confidence. Note that for this data set, boosting learns a much more correct model than the MLE, with an error rate of 3.8% ( F 1 = 93.7%), in constrast to 15.6% ( F 1 = 79.5%) by the MLE without regularisation, and 11.8% ( F 1 = 85.0%) by the MLE with σ = 5. ## 5.4 Effect of beam size Recall that the beam search described in Section 3.4 allows the weak hypothesis to be an ensemble of S features. When S = K , all the parameters are updated in parallel, so it is essentially similar to the MLE, and thus no feature selection is performed. We run a few experiments with different beam sizes S , starting from 1, which is the main focus of this paper, to the full parameter set K . As S increases, the number of selected features also increases. However, we are quite inconclusive about the final performance. It seems that when S is large, the update is quite poor, leading to slow convergence. This is probably because the diagonal matrix resulting from the algorithm is not a good approximation to the true Hessian used in Newton's updates. It suggests that there exists a good, but rather moderate, beam size that performs best in terms of both the convergence rate and the final performance. An alternative is just to minimise the exponential loss in (5) directly by using any generic optimisation method (e.g. see [2, 3]). However, this approach, although may be fast to converge, loses the main idea behind boosting, which is to re-weigh the data distribution on each round to focus more on hard-to-classify examples as in (8). These issues are left for future investigation. ## 6 Conclusions and Further work We have presented a scheme to exploit the discriminative learning power of the boosting methodology and the semantically rich structured model of Markov networks and integrated them into a boosted Markov network framework which can handle missing variables. We have demonstrated the performance of the newly proposed algorithm over the standard maximum-likelihood framework on video-based activity recognition tasks. Our preliminary results on structure learning using boosting indicates promise. Moreover, the built-in capacity of feature selection by boosting suggests an interesting application area in small footprint devices with limited processing power and batteries. We plan to investigate how to select the optimal feature set online by hand-held devices given the processor, memory and battery status. Although empirically shown to be successful in our experiments, the performance guarantee of the framework is yet to be proven, possibly following the large margin approach as in [14, 17], or the asymptotic consistency in the statistics literature as with the MLE. In the application to sensor networks, we intend to explore methods to incorporate richer sensory information into the weak learners, and to build more expressive structures to model multi-level and hierarchical activities. ## Acknowledgments The Matlab code of the limited memory quasi-Newton method (L-BFGS) to optimise the log-likelihood of the CRFs is adapted from S. Ulbrich. ## References - [1] J. K. Aggarwal, Q. Cai, 'Human motion analysis: A review', Computer Vision and Image Understanding , Vol. 73, No. 3, 1999, pp. 428-440. - [2] Y. Altun, T. Hofmann, M. Johnson, 'Discriminative Learning for Label Sequences via Boosting', Advances in Neural Information Processing Systems 15 , 2003, pp. 977-984. - [3] Y. Altun, M. Johnson, T. Hofmann, 'Investigating Loss Functions and Optimization Methods for Discriminative Learning of Label Sequences', In: Proceedings of the 2003 Conference on Empirical Methods in NLP , 2003. - [4] H.H. Bui, S. Venkatesh, G. West, 'Policy recognition in the abstract hidden Markov model', Journal of Articial Intelligence Research , Vol. 17, 2002, pp. 451-499. - [5] T.G. Dietterich, A, Ashenfelter, Y. Bulatov, 'Training Conditional Random Fields via Gradient Tree Boosting', In: Proc. 21 st International Conference on Machine Learning, 2004, Banff, Canada. - [6] Y. Freund,R.E. Schapire, 'A decision-theoretic generalization of on-line learning and an application to boosting', Journal of Computer and System Sciences , Vol. 55, No. 1, 1997, pp. 119-139. - [7] J. H. Friedman, 'Greedy function approximation: a gradient boosting machine', Ann. Statist , Vol. 29, No. 5, 2001, pp. 1189-1232. - [8] J. Friedman, T. Hastie, R. Tibshirani, 'Additive logistic regression: a statistical view of boosting', The Annals of Statistics , Vol. 28, No. 2, 2000, pp. 337-374. - [9] A. Garg, V. Pavlovic, J. Rehg, 'Boosted Learning in Dynamic Bayesian Networks for Multimodal Speaker Detection', In: Proc. the IEEE , 2003. - [10] J. Lafferty, A. McCallum, F. Pereira, 'Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data', In: Proc. 18th International Conf. on Machine Learning , 2001, pp. 282-289. - [11] G. Lebanon, J. Lafferty, 'Boosting and Maximum Likelihood for Exponential Models', Advances in Neural Information Processing Systems 14 , 2002, pp. 447-454. - [12] N. Nguyen, D. Phung, S. Venkatesh, H. H. Bui 'Learning and detecting activities from movement trajectories using the hierarchical hidden Markov models'. In: Proc. CVPR , San Diego, CA, June 2005. - [13] S. D. Pietra, V. D. Pietra, J. Lafferty, 'Inducing Features of Random Field', IEEE Transactions on Pattern Analysis and Machine Intelligence , Vol. 19, No. 4, 1997, pp. 380-393. - [14] R.E. Schapire, Y. Freund, P. Bartlett, W.S. Lee, 'Boosting the Margin: A New Explanation for the Effectiveness of Voting Methods', The Annals of Statistics , Vol. 26, No. 5, 1998, pp. 1651-1686. - [15] R.E. Schapire, Y. Singer, 'Improved Boosting Using Confidence-rated Predictions', Machine Learning , Vol. 37, No. 3, 1999, pp. 297-336. - [16] R.E. Schapire, Y. Singer, 'BoosTexter: A Boosting-based System for Text Categorization', Machine Learning , Vol. 39, No. 2/3, 2000, pp. 135-168. - [17] B. Taskar, C. Guestrin, D. Koller, 'Max-Margin Markov Networks', Advances in Neural Information Processing Systems 16 , 2004. - [18] A. Torralba, K.P. Murphy, W,T. Freeman, 'Contextual Models for Object Detection Using Boosted Random Fields', Advances in Neural Information Processing Systems 17 , 2005, pp. 1401-1408. - [19] J. Yamato, J. Ohya, K. Ishii, 'Recognizing human action in time-sequential images using hidden Markov models', In: CVPR , 1992, pp. 379-385. - [20] P. Yin, I. Essa, J.M. Rehg, 'Asymmetrically Boosted HMM for Speech Reading', In: Proc. CVPR , Vol. 2, No. 2, 2004, pp. 755-761. - [21] Y. Jing, V. Pavlovic, J.M. Rehg, 'Efficient discriminative learning of Bayesian network classifiers via boosted augmented naive Bayes', In: Proc. ICML , 2005.
null
[ "Truyen Tran", "Hung Bui", "Svetha Venkatesh" ]
2014-08-06T02:45:51+00:00
2014-08-06T02:45:51+00:00
[ "cs.LG", "cs.CV", "stat.ML" ]
Boosted Markov Networks for Activity Recognition
We explore a framework called boosted Markov networks to combine the learning capacity of boosting and the rich modeling semantics of Markov networks and applying the framework for video-based activity recognition. Importantly, we extend the framework to incorporate hidden variables. We show how the framework can be applied for both model learning and feature selection. We demonstrate that boosted Markov networks with hidden variables perform comparably with the standard maximum likelihood estimation. However, our framework is able to learn sparse models, and therefore can provide computational savings when the learned models are used for classification.
1408.1169v1
## Constraining Extended Gravity Models by S2 star orbits around the Galactic Centre S. Capozziello, 1, 2, 3, ∗ D. Borka, 4 P. Jovanovi´ c, 5 and V. Borka Jovanovi´ c 4 1 Dipartimento di Fisica, Universit` a di Napoli 'Federico II', Compl. Univ. di Monte S. Angelo, Edificio G, Via Cinthia, I-80126, Napoli, Italy, 2 Istituto Nazionale di Fisica Nucleare (INFN) Sez. di Napoli, Compl. Univ. di Monte S. Angelo, Edificio G, Via Cinthia, I-80126, Napoli, Italy, 3 Gran Sasso Science Institute (INFN), Viale F. Crispi, 7, I-67100, L'Aquila, Italy. 4 Atomic Physics Laboratory (040), Vinˇ ca Institute of Nuclear Sciences, University of Belgrade, P.O. Box 522, 11001 Belgrade, Serbia. 5 Astronomical Observatory, Volgina 7, 11060 Belgrade, Serbia. (Dated: August 7, 2014) We investigate the possibility to explain theoretically the observed deviations of S2 star orbit around the Galactic Centre using gravitational potentials derived from modified gravity models in absence of dark matter. To this aim, an analytic fourth-order theory of gravity, non-minimally coupled with a massive scalar field is considered. Specifically, the interaction term is given by analytic functions f ( R ) and f ( R,φ ) where R is the Ricci scalar and φ is a scalar field whose meaning can be related to further gravitational degrees of freedom. We simulate the orbit of S2 star around the Galactic Centre in f ( R ) (Yukawa-like) and f ( R,φ ) (Sanders-like) gravity potentials and compare it with NTT/VLT observations. Our simulations result in strong constraints on the range of gravity interaction. In the case of analytic functions f ( R ), we are not able to obtain reliable constraints on the derivative constants f 1 and f 2 , because the current observations of S2 star indicated that they may be highly mutually correlated. In the case of analytic functions f ( R,φ ), we are able to obtain reliable constraints on the derivative constants f 0 , f R , f RR , f φ , f φφ and f φR . The approach we are proposing seems to be sufficiently reliable to constrain the modified gravity models from stellar orbits around Galactic Centre. PACS numbers: 04.50.Kd, 04.25.Nx, 04.40.Nr ## I. INTRODUCTION Extended Theories of Gravity [1] are alternative theories of gravitational interaction developed from the exact starting points investigated first by Einstein and Hilbert and aimed from one side to extend the positive results of General Relativity and, on the other hand, to cure its shortcomings. Besides other fundamental issues, like dark energy and quantum gravity, these theories have been proposed like alternative approaches to Newtonian gravity in order to explain galactic and extragalactic dynamics without introducing dark matter [2, 3]. In particular, the search for non-Newtonian gravity is part of the quest for non-Einsteinian physics which consists of searching for deviations from Special and General Relativity [4-6]. They are aimed to address conceptual and experimental problems recently emerged in astrophysics and cosmology from the observations of the Solar system, binary pulsars, spiral galaxies, clusters of galaxies and the large-scale structure of the Universe [7-11]. In general, these theories describe gravity as a metric theory with a linear connection but there are also affine, or metric-affine formulations of Extended Theories of Gravity [1]. Essentially, they are based on straightforward generalizations of the Einstein theory where the gravitational action (the Hilbert-Einstein action) is assumed to ∗ Corresponding author:[email protected] be linear in the Ricci curvature scalar R . f ( R ) gravity is a type of modified gravity which generalizes Einstein's General Relativity and it was first proposed in 1970 by Buchdahl [12]. It is actually a family of models, each one defined by a different function of the Ricci scalar. The simplest case is just the General Relativity. In the case of f ( R ) gravity, one assumes a generic function f of the Ricci scalar R (in particular, analytic functions) and searches for a theory of gravity having suitable behavior at small and large scale lengths. As a consequence of introducing an arbitrary function, there may be freedom to explain the accelerated expansion and structure formation of the Universe without adding unknown forms of dark energy or dark matter. One type of the Extended Theories of Gravity is characterized by power-law Lagrangians [13, 14]. Alternative approaches to Newtonian gravity in the framework of the weak field limit of fourth order gravity theory have been proposed and constraints on these theories have been discussed [15-22]. Yukawa-like corrections have been obtained in the framework of f ( R ) gravity as a general feature of these theories [23-26]. It is important to stress that they emerge as exact solutions in the context of Extended Gravity and are not just put by hand as phenomenological terms. The physical meaning of such corrections needs to be confirmed at different scales: for short distances, Solar system, spiral galaxies and galaxy clusters. A compilation of experimental, geophysical and astronomical constraints on Yukawa violations of the gravitational inverse square law are given in Figs. 9 and 10 from [27] for different ranges. These results show that the Yukawa term is relatively well constrained for the short ranges. For longer distances Yukawa corrections have been successfully applied to clusters of galaxies [23, 28, 29]. Lucchesi and Peron [30] analyzed pericenter general relativistic precession and gave constraints on exponential potential to Solar System measurements. However, further tests are needed in order to set robust constraints on Yukawa corrections. Galactic stellar dynamics could be of great aid in this program. S-stars are mainly young early-type stars that closely orbit the massive compact object at the center of Milky Way, named Sgr A ∗ [31-36]. These stars, together with recently discovered dense gas cloud falling towards the Galactic Centre [37], indicate that the massive central object is a black hole. In our simulation we will treat central object like 'massive compact object' since our goal was only to study orbits of stars around Galactic Centre, no matter what is the nature of the object (black hole or not). For at least one of them, called S2, there are some observational indications that its orbit maybe deviates from the Keplerian case due to relativistic precession [33, 38]. However, we have to point out that the present astrometric limit is still not sufficient to definitely confirm such a claim. On the other hand, the astrometric accuracy is constantly improving from around 10 mas during the first part of the observational period, currently reaching less than 1 mas (0.3 mas) see [39]. Furthermore, some recent studies provide more and more evidence that the orbit of S2 star is not closing (see e.g. Fig. 2 in [38]). Here, we fitted the NTT/VLT astrometric observations of S2 star, which contain a possible indication for orbital precession around the massive compact object at Galactic Centre, in order to constrain the parameters of Sanderslike gravity potential, since this kind of potential has not been tested at these scales yet. We obtained much larger orbital precession of S2 star in Sanders-like gravity than the corresponding value predicted by General Relativity. In the paper [33] page 1092, Fig. 13, authors presented the Keplerian orbit but they have to move the position of central point mass to explain orbital precession. In our orbit, calculated by Sanders-like potential for best fitting parameters, we also obtained precession, but with a fixed position of the central point mass. In other words, we do not need to move central point mass in order to get the fit. As a general remark, the orbit of S2 will give astronomers the opportunity to test for various effects predicted by General Relativity. The orbital precession can occur due to relativistic effects, resulting in a prograde pericentre shift or due to a possible extended mass distribution, producing a retrograde shift [40]. Both prograde relativistic and retrograde Newtonian pericentre shifts will result in rosette shaped orbits [41]. We have to stress that the current astrometric limit is not sufficient to unambiguously confirm such a claim. Weinberg et al. [42] discussed physical experiments achievable via the monitoring of stellar dynamics near the Galactic Centre with a diffraction-limited, next-generation, extremely large telescope (ELT). The aim of this paper is to give the astronomical constraints on Extended Theories of Gravity by using the peculiar dynamics of S2 star. In particular, we want to fix the ranges of Yukawa-like correction parameters adopting the NTT/VLT observations. The paper is organized as follows. Sec. II is devoted to a short summary of Extended Gravity in view of the Newtonian limit where Yukawa-like corrections emerge. The simulated orbits of S2 star in modified potential are considered in Sec. III. In particular, we set the problem of how to constrain the Yukawa-potential parameters. Sec. IV is devoted to the results of the simulation. Conclusions are drawn in Sec. V. ## II. EXTENDED THEORIES OF GRAVITY Examples of Extended Theories of Gravity are higherorder, scalar-tensor gravities, see, for example [1, 3, 10, 43-49]. These theories can be characterized by two main features: i ) the geometry can non-minimally couple to some scalar field; ii ) higher-order curvature invariants can appear into the action. In the first case, we are dealing with scalar-tensor gravity, and in the second case we have higher-order gravity. Combinations of non-minimally coupled and higher order terms can also emerge in effective Lagrangian, producing mixed higher order/scalar-tensor gravity. A general class of higherorder-scalar-tensor theories in four dimensions is given by the effective action [1, 50]: $$\mathcal { S } _ { \mathfrak { t } } ^ { - } \mathfrak { s } _ { \mathfrak { t } } ^ { - } \mathfrak { s } _ { \mathfrak { t } } ^ { - } \left [ f ( R, \Box R, \Box ^ { 2 } R, \dots, \Box ^ { k } R, \phi ) + \\ \mathfrak { e r } _ { \mathfrak { n } } ^ { - } \mathfrak { s } _ { \mathfrak { n } } ^ { - } \left ( \phi ) \phi _ { ; \alpha } \phi ^ { ; \alpha } + \mathcal { X } \mathcal { L } _ { m } \right ], \quad \left ( 1 \right ) \\ \mathfrak { v } _ { \mathfrak { m } } ^ { - } \mathfrak { w o n d f i o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d f o n d \cdots$$ where f is an unspecified function of curvature invariants and scalar field φ and X = 8 πG . Here we use the convention c = 1. The simplest extension of General Relativity is achieved assuming: $$R \to f ( R ) \,, \quad \omega ( \phi ) \, = \, 0 \, \text{ \quad \ \ } ( 2 )$$ where the action (1) becomes [50]: $$\mathcal { S } = \int d ^ { 4 } x \sqrt { - g } \left [ f ( R ) + \mathcal { X } \mathcal { L } _ { m } \right ] \,. \quad \quad ( 3 ) \\ \mathcal { S } = \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \ddots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots\cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cd< \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \csrf \,. \,.$$ A general gravitational potential, with a Yukawa correction, can be obtained in the Newtonian limit of any analytic f ( R )-gravity model. From a phenomenological point of view, this correction allows to consider as viable this kind of models even at small distances, provided that the Yukawa correction turns out to be not relevant in this approximation as in the so called 'Chameleon Mechanism' [49]. For the sake of simplicity, one can assume, however, analytic Taylor expandable f ( R ) functions with respect to the value R = 0 that is the Minkowskian background [50]: $$f ( R ) \, = \, \sum _ { n \, = \, 0 } ^ { \infty } \frac { f ^ { ( n ) } ( 0 ) } { n! } \, R ^ { n } \, = \, f _ { 0 } + f _ { 1 } R + \frac { f _ { 2 } } { 2 } R ^ { 2 } + \dots \, \ ( 4 ) \quad \text{funct} \\ \intertext { I t i e w o r t h n o t i e i n o t h o t o t o d o r d o r } \mathcal { M } / \partial \, \ t h o t o f i d$$ It is worth noticing that, at the order O (0), the field equations give the condition f 0 = 0 and then the solutions at further orders do not depend on this parameter. On the other hand, considering the first term in R f , 0 has the meaning of a cosmological constant. A further step is to analyze the Newtonian limit starting from the action (1) and considering a generic function of Ricci scalar and scalar field. Then the action becomes [50] $$\mathcal { A } = \int d ^ { 4 } x \sqrt { - g } \left [ f ( R, \phi ) + \omega ( \phi ) \, \phi _ { ; \alpha } \, \phi ^ { ; \alpha } + \mathcal { X } \mathcal { L } _ { m } \right ] \, \left ( 5 \right ) \, \begin{array} { c } \Re c a \\ \text{featu} \\ \text{cessfu} \end{array} \, \text{less} \, \text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text$\, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \,$\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\Text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{ $\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re`} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$} \, $\text{$\Re$}$$ The scalar field φ can be approximated as the Ricci scalar. In particular we get φ = φ (0) + φ (1) + φ (2) + . . . and the function f ( R,φ ) with its partial derivatives ( f R , f RR , f φ , f φφ and f φR ) and ω φ ( ) can be substituted by their corresponding Taylor series. In the case of f ( R,φ ), we have [50]: $$f ( R, \phi ) & \sim f ( 0, \phi ^ { ( 0 ) } ) + f _ { R } ( 0, \phi ^ { ( 0 ) } ) R ^ { ( 1 ) } + f _ { \phi } ( 0, \phi ^ { ( 0 ) } ) \phi ^ { ( 1 ) }.. ( 6 ) \quad \text{ics. } \text{Eq} \quad \text{in a un}$$ and analogous relations for the derivatives are obtained. From the lowest order of field equations we have [50] $$f ( 0, \phi ^ { ( 0 ) } ) \, = \, 0 \,, \quad f _ { \phi } ( 0, \phi ^ { ( 0 ) } ) \, = \, 0 \, \quad \ \ ( 7 ) \quad \text{in}$$ and also in this modified fourth order gravity a missing cosmological component in the action (1) implies that the space-time is asymptotically Minkowskian (the same outcome as above). Moreover the ground value of scalar field φ must be a stationary point of the potential. An important remark is due at this point. As discussed in details in [50], a theory like f ( R,φ ) is dynamically equivalent to f ( R, /square R ) and then also the meaning of the scalar field results clearer being related to the further gravitational degrees of freedom that come out in Extended Gravity [51, 52]. ## III. SIMULATED ORBITS OF S2 STAR AND THE YUKAWA-LIKE CORRECTIONS In order to constrain the parameters of f ( R ) and f ( R,φ ) models, we simulate orbits of S2 star in Yukawalike gravity potentials and fit them to the astrometric observations obtained by New Technology Telescope/Very Large Telescope (NTT/VLT) (see Fig. 1 in [33]), which are publicly available as the supplementary on-line data to the electronic version of the paper [33] at [53], and which are aimed to estimate the distance from the Galactic Centre and to map the inner region of our Galaxy. As discussed, in f ( R )-gravity, the scalar curvature R of the Hilbert - Einstein action, is replaced by a generic function f ( R ). As a result, in the weak field limit [54], the gravitational potential is found to be Yukawa-like [10, 55]: $$\Phi \left ( r \right ) = - \frac { G M } { ( 1 + \delta ) r } \left [ 1 + \delta e ^ { - \left ( \frac { r } { \Lambda } \right ) } \right ], \quad \ \left ( 8 \right )$$ where Λ 2 = -f /f 1 2 is an arbitrary parameter (usually referred to as the range of interaction), depending on the typical scale of the system under consideration and δ = f 1 -1 is a universal constant. It is worth noticing that δ and Λ depend on the parameters of the given f ( R ) gravity model. It is important to stress that a Yukawalike correction has been invoked several times in the past [58]. Such corrections have been obtained, as a general feature, in the framework of f ( R ) gravity [25] and successfully applied to clusters of galaxies setting [29]. In general, one can relate the length-scale Λ to the mass of the effective scalar field introduced by the Extended Theory of Gravity and then to the mass and characteristic size of the self-gravitating system [1]. The larger the mass, the smaller will be Λ and the faster will be the exponential decay of the correction, i.e. the larger the mass, the quicker the recovery of the Newtonian dynamics. Eq.(8) then gives us the opportunity to investigate in a unified way the impact of a large class of modified gravity theories, included in which are the Extended Theories, since other details do not have any impact on the galactic scales we are interested in. In the f ( R,φ )-gravity the gravitational potential is found by setting the gravitational constant as $$G \, = \, \left ( \frac { 2 \, \omega ( \phi ^ { ( 0 ) } ) \, \phi ^ { ( 0 ) } - 4 } { 2 \, \omega ( \phi ^ { ( 0 ) } ) \, \phi ^ { ( 0 ) } - 3 } \right ) \frac { G _ { \infty } } { \phi ^ { ( 0 ) } } \, \quad \quad ( 9 ) \\ \omega \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdots$$ where G ∞ is the gravitational constant as measured at infinity and by imposing α -1 = 3 -2 ω φ ( (0) ) φ (0) , the gravity potential is [50]: $$\Phi _ { S T } ( \mathbf x ) \, = \, - \frac { G _ { \infty } M } { | \mathbf x | } \Big \{ 1 + \alpha \, e ^ { - \sqrt { 1 - 3 \alpha } \, m _ { \phi } | \mathbf x | } \Big \} \quad ( 1 0 ) \\ \dots \, \bigotimes \, \bigotimes \, \dots \, \dots \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \, \dots \, \ e \end{array}$$ and then a Sanders-like potential is fully recovered [58]. Such a potential has been often used to obtain the rotation curves of spiral galaxies [56]. However, it is worth stressing that the only Sanders potential is unable to reproduce the rotation curves of spirals without dark matter as pointed out in an accurate study in [59]. However, the paradigm remains valid and modifications of Newtonian potential can be investigated in view of addressing the dark matter problem. FIG. 1: (color online) The maps of reduced χ 2 over the { f 1 -f 2 } parameter space of f ( R ) gravity in case of NTT/VLT observations of S2 star which give at least the same ( χ 2 = 1 89) or better fits ( . χ 2 &lt; 1 89) than the Keplerian orbits. . The left panel corresponds to f 1 in [ -25 0], and the right panel to , f 1 in [0 , 25]. With decreasing value of χ 2 (better fit) colors in grey scale are darker. A few contours are presented for specific values of reduced χ 2 given in figure's legend. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-e2c9357a-be9c-4a28-bb97-24bc4c2b05f2.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-4780abc0-75ce-4b52-9d3d-eb2f2e65f4cb.jpg) FIG. 2: (color online) The maps of reduced χ 2 over the { α -m φ } parameter space of f ( R,φ ) gravity in case of NTT/VLT observations of S2 star which give at least the same ( χ 2 = 1 89) or better fits ( . χ 2 &lt; 1 89) . than the Keplerian orbits. The left panel corresponds to m φ in [0 , 0 06] and . α in [0 , 0 33], . and the right panel to the zoomed range of m φ in [0 , 0 03] and . α in [0 , 0 05]. . With decreasing value of χ 2 (better fit) colors in grey scale are darker. A few contours are presented for specific values of reduced χ 2 given in figure's legend. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-49c3bd97-76c2-45af-bdfc-3ce766f07793.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-eec977ef-70d1-496f-8502-62b0d32f3e00.jpg) We can set the value of the derivatives of the Taylor expansion as f Rφ = 1 , f RR = 0 , f R = φ without losing generality. existing extended structures composed by visible or dark matter [16]. The simulated orbits of S2 star in these two potentials can be obtained by numerical integration of the corresponding differential equations of motion, that is: $$\dot { r } = \mathbf v, \quad \mu \ddot { r } = - \bigtriangledown \Phi \left ( \mathbf r \right ), \quad \quad \left ( 1 1 \right ) \quad \text{con}$$ where µ is the reduced mass in the two-body problem. We assume the following mass and distance for Sgr A ∗ central massive compact object around which S2 star is orbiting: M = 4 3 . × 10 6 M /circledot and d /star = 8.3 kpc, respectivelly [33]. Due to simplicity reasons, we perform two-body simulations and neglect perturbations from other members of the S-star cluster, as well as from some possibly We simulate orbits of S2 star and fit them to the NTT/VLT astrometric observations for different combinations of a priori given values of f 1 and f 2 in f ( R ), and α and m φ in f ( R,φ ) gravity potentials (below denoted as parameter 1 and parameter 2, respectively). Each simulated orbit is defined by the following four initial conditions: two components of initial position and two components of initial velocity in orbital plane at the epoch of the first observation. For each combination of parameter 1 and parameter 2, we obtain the best fit initial conditions corresponding to a simulated orbit with the lowest discrepancy in respect to the observed one. The fitting itself is performed using LMDIF1 routine from MINPACK-1 Fortran 77 library which solves the nonlinear least squares problems by a modification of FIG. 3: (color online) The same as in Fig. 2, but for a narrow region in the { α -m φ } parameter space around the absolute minimum of the reduced χ 2 . With decreasing value of χ 2 (better fit) colors in grey scale are darker. A few contours are presented for specific values of reduced χ 2 given in figure's legend. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-15a92ed3-e62c-48c2-8a6e-e60aa6ad5cb0.jpg) /s32 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-8e98d96c-f323-4ea2-a475-c0163556ba47.jpg) /s32 FIG. 4: (color online) Comparison between the orbit of S2 star in Newtonian potential (red dashed line) and Sanders-like potential for the best fit parameters (the absolute minimum of reduced χ 2 = 1 5011) . α = 0.00018 and m φ = -0.0026 during 10 orbital periods (blue solid line). Marquardt-Levenberg algorithm [57], according to the following procedure: - 1. In the first iteration we use a guess of initial position ( x , y 0 0 ) and velocity ( ˙ x , y 0 ˙ 0 ) of S2 star in orbital plane (true orbit) at the epoch of the first observation; - 2. the true positions ( x , y i i ) and velocities ( ˙ x , y i ˙ i ) at all successive observed epochs are then calculated by numerical integration of equations of motion (11), and projected to the corresponding positions ( x , y c i c i ) in the observed plane (apparent orbit); - 3. discrepancy between the simulated and observed FIG. 5: (color online) Numerically calculated angle of precession per orbital period as a function of parameters α in the range [0 0001 . , 0 0003] and . m φ in the range [ -0 003 . , -0 002] in . case of Sanders-like potential. With decreasing value of angle of precession colors are darker. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-9340cdd9-e2f2-4722-8ff7-233b58be27c7.jpg) FIG. 6: (color online) The same as in Fig. 5, but for α in the range [ -0 0005 . , 0 0005] . and m φ in the range [ -0 003 . , -0 0025]. . The pericenter advance (like in GR) is obtained for positive α , and retrograde precession for negative α . With decreasing value of angle of precession colors are darker. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1169v1-figure-ec8e5692-e79e-4804-9cf9-b234482a2e0a.jpg) apparent orbit is estimated by the reduced χ 2 : $$\chi ^ { 2 } & = \frac { 1 } { 2 N - \nu } \sum _ { i = 1 } ^ { N } \left [ \left ( \frac { x _ { i } ^ { o } - x _ { i } ^ { c } } { \sigma _ { x i } } \right ) ^ { 2 } + \left ( \frac { y _ { i } ^ { o } - y _ { i } ^ { c } } { \sigma _ { y i } } \right ) ^ { 2 } \right ], \ \ ( 1 2 ) \quad \text{$34$ a} \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c \c$$ where ( x , y o i o i ) and ( x , y c i c i ) are the corresponding observed and calculated apparent positions, N is the number of observations, ν is number of initial conditions (in our case ν = 4), σ xi and σ yi are uncertainties of observed positions; - 4. the new initial conditions are estimated by the fitting routine and the steps 2-3 are repeated until the fit is converging, i.e. until the minimum of reduced χ 2 is achieved. Finally, we kept the values of parameter 1 and parameter 2 for which the smallest value of minimized reduced χ 2 is obtained, in other words, which results with the best fit simulated orbit of S2 star with the lowest discrepancy with respect to the observed one. ## IV. RESULTS AND DISCUSSION Our point is that the Yukawa-like correction, coming from f ( R ) gravity, can be used in order to fix the coefficients in the expansion (4). For the expansion up to the second order, we have 2 parameters to fix. Orbits of S2 star around the Galactic Centre are, in principle, a very straightforward tool in order to test any theory of gravity. In [2], there is an overview of self-gravitating structures, at different scales, whose dynamics could be described without asking for dark matter. According to [2], the relations between f 1 , f 2 and δ and Λ parameters are f 1 = 1 + δ , f 2 = -(1 + δ / ) (Λ ). 2 Specifically, we have to find the minimal values of the reduced χ 2 in order to determine f 1 and f 2 assuming f 0 = 0. This allows to reconstruct f ( R ) models up to the second order. Fig. 1 presents the maps of the reduced χ 2 over the { f 1 -f 2 } parameter space for all simulated orbits of S2 star which give at least the same or better fits to the NTT/VLT observations of S2 star than the Keplerian orbits ( χ 2 = 1 89). . The upper panel corresponds to f 1 in the range [ -25 0], and the lower panel to the range , [0 , 25], respectively. We can see that, in a large region of the parameter space, χ 2 of the orbits in modified potential is less than the value in Newtonian potential. However, it seems that we cannot constrain both f 1 and f 2 using only the observed S2 orbits because these two parameters are strongly correlated. We can constrain only their ratio f /f 1 2 . According to [2], the effective mass is m 2 = -f / 1 (3 f 2 ). The solutions are valid if m &gt; 2 0 i.e. f 1 and f 2 are assumed to have different signs. This is a degeneracy problem that have to be removed in order to obtain reliable results. Such a problem is also found in fitting the flat rotation curve of spiral galaxies. As discussed in details in [50], the f /f 1 2 degeneracy can be removed by using potentials coming from f ( R,φ ) gravity. In this model, two potentials, Ψ( x ) and Φ( x ), result as entries of the metric in the Newtonian limit. The combination of both potentials gives rise to the effective potential (10) that affects the particle (in our case the S2 star). The potential includes the gravitation constant measured at infinity G ∞ . The relation between G ∞ and G , the gravitational constant measured in the laboratory, is given by the above formula (9). If we take ω φ ( 0 ) = 1 2 and use the relation 1 / /α = 3 -2 ω φ ( 0 ) φ 0 , we get φ 0 = 3 -1 /α . Combining these relations, we get: G ∞ = G/ (1 + α ). For f ( R,φ ) gravity, one can define a further effective mass [50], that is m 2 φ = -f φφ / (2 ω φ ( 0 )) and if we take ω φ ( 0 ) = 1 / 2, we get immediately f φφ = -m 2 φ . Our aim is to determine f 0 , f R , f RR , f φ , f φφ and f φR . For the lowest order of the field, as we said, one can set f 0 = 0 and f φ =0. We use also the further constrains given in [50] at lowest order, that is f φR = 1, f RR = 0, and f R = φ 0 . This last relation gives f R = φ 0 = 3 -1 /α . Finally we can assume the following set of parameters f 0 = 0, f R = 3 -1 /α , f φ = 0, f RR = 0, f φR = 1 and f φφ = -m 2 φ . These choices are physically reliable and mean that we can assume an asymptotic Minkowski background, i.e. f 0 = 0, that the General Relativity is recovered for f φ = 0, f RR = 0, f φR = 1, and effective massive modes (and then effective lengths) are related to f R = 3 -1 /α , and f φφ = -m 2 φ . In particular, f 0 = 0 means that cosmological constant can be discarded at local scales. Figs. 2 and 3 are the maps of the reduced χ 2 over the { α -m φ } parameter space in f ( R,φ ) gravity for all simulated orbits of S2 star which give at least the same or better fits than the Keplerian orbits ( χ 2 = 1 89). . The upper panel in Fig. 2 corresponds to m φ in [0 , 0 06] . and α in [0 , 0 33], . and the lower panel to the zoomed range of m φ in [0 , 0 03] and . α in [0 , 0 05], . respectively. For α &lt; 0, there is no region in the parameter space where χ 2 &lt; 1 89 . (Keplerian case). For 0 &lt; α &lt; 1 / 3 there are two regions where χ 2 &lt; 1 89 (for . m &lt; φ 0 and m φ &gt; 0), but the absolute minimum is for m φ &lt; 0. We obtained absolute minimum of the reduced χ 2 for α in the interval [0 0001 . , 0 0004], and . m φ in the interval [ -0 0029 . , -0 0023] (see Fig. . 3). The absolute minimum of the reduced χ 2 ( χ 2 = 1 5011) is . obtained for α = 0.00018 and m φ = -0.0026, respectively. The simulated orbits of S2 star around the Galactic Centre in Sanders gravity potential (blue solid line) and in Newtonian gravity potential (red dashed line) for α = 0.00018 and m φ = -0.0026 during 10 periods, are presented in Fig. 4. We can notice that the precession of S2 star orbit has the same direction as in General Relativity. The precession of S2 star orbit in the same direction can be also obtained for some ranges of parameter δ in general Yukawa potential (for more details see paper [21]). As it can be read from Fig. 4, the best fit orbit in Sanders gravity potential precesses for about 3 ◦ . 1 per orbital pe- riod. In case of Sanders potential, analytical calculation of orbital precession is very complicated to obtain, so we calculated it numerically and presented in Figs. 5 and 6 as a function of α and m φ . Assuming that a potential does not differ significantly from Newtonian potential, we derive perturbing potential from: $$V ( r ) = \Phi \left ( r \right ) - \Phi _ { N } \left ( r \right ) \ ; \ \Phi _ { N } \left ( r \right ) = - \frac { G M } { r } \. \quad \left ( 1 3 \right ) \quad \text{$\text{less}$} \quad \\ \text{In}$$ Obtained perturbing potential is of the form: $$V ( r ) = - \frac { G M \alpha } { r ( 1 + \alpha ) } \left ( e ^ { - \sqrt { 1 - 3 \alpha } \cdot m _ { \phi } \cdot r } - 1 \right ), \quad ( 1 4 ) \quad \text{char} \\ \text{and it on how mod how to maintain the two observation and} \quad \text{$\quad $}.$$ and it can be used for calculating the precession angle according to the equation (30) from paper [41]: $$\Delta \theta = \frac { - 2 L } { G M e ^ { 2 } } \underset { - 1 } { \overset { 1 } { \int } } \frac { z \cdot d z } { \sqrt { 1 - z ^ { 2 } } } \frac { d V \left ( z \right ) } { d z }, \quad \ \ ( 1 5 ) \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \quad \quad \quad$$ where r is related to z via: r = L 1 + ez . By differentiating the perturbing potential V ( z ) and substituting its derivative and expression for the semilatus rectum of the orbital ellipse ( L = a ( 1 -e 2 ) ) in above equation (15), and taking same values for orbital elements of S2 star like in paper [19] we obtained numerically for α =0.00018 and m φ = -0.0026 that precession per orbital period is 3 ◦ . 053. Graphical presentation of precession per orbital period for α in the range [0 0001 . , 0 0003] . and m φ in [ -0 003 . , -0 002] is . given in Fig. 5, and the case for α in [ -0 0005 0 0005] and . , . m φ in [ -0 003 . , -0 0025] is pre-. sented in Fig. 6. As one can see pericenter advance (like in GR) is obtained for positive α , and retrograde precession for negative α . However, it should be taken into account that fits better than Keplerian are obtained only for positive α and hence for the precession in the same direction as in GR. General Relativity predicts that pericenter of S2 star should advance by 0 ◦ . 08 per orbital revolution [34] which is much smaller than the value of precession per orbital period in Sanders gravity potential, but the direction of the precession is the same. ## V. CONCLUSIONS In this paper, we compared the observed and simulated S2 star orbits around the Galactic Centre, in order to con- strain the parameters of gravitational potentials derived from modified gravity models. The obtained results are quite comfortable for the effective gravitational potential derived from f ( R,φ ) gravity that, essentially, reproduce Sanders-like potentials [56, 58] phenomenologically adopted to explain the rotation curves of spiral galaxies. Also if such kind of potentials are not sufficient in addressing completely the problem of dark matter in galaxies [59], they give indications that alternative theories of gravity could be viable in describing galactic dynamics. In other words, orbital solutions derived from such a potential are in good agreement with the reduced χ 2 deduced for Keplerian orbits. This fact allows to fix the range of variation for α and m φ , the two parameters characterizing the potential (10). The precession of S2 star orbit obtained for the best fit parameter values ( α = 0.00018 and m φ = -0.0026) has the positive direction, as in General Relativity. In particular, we fitted the NTT/VLT astrometric observations of S2 star, which contain a possible indication for orbital precession around massive compact object at Galactic centre, in order to constrain the parameters of Sanders-like gravity potential, since this theory has not been tested at these scales yet. We obtained much larger orbital precession of S2 star in Sanders-like gravity than the corresponding value predicted by General Relativity. In the paper [34], the authors presented Newtonian orbit but with moved position of central point mass in different way. In that way they explained observed precession. In our calculated orbit by Sanders like potential for best fitting parameters, we also obtained precession but with fixed position of central point mass, since we have not to move it. However, one should keep in mind that we considered an idealized model ignoring many uncertainty factors, such as extended mass distributions, perturbations from non-symmetric mass distribution, etc. Therefore, future observations with advanced facilities, such as GRAVITY which will enable extremely accurate measurements of the positions of stars of ∼ 10 µ as [60], or E-ELT with expected accuracy of ∼ 50-100 µ as [61], are needed in order to verify the claims in this paper. As final remark, we believe that the surveys aimed to give details on the dynamics around the Galactic Centre could be a powerful tool to test theories of gravity. ## Acknowledgments S.C. acknowledges the support of INFN ( iniziativa specifica TEONGRAV). D.B., P.J. and V.B.J. wish to acknowledge the support by the Ministry of Education, Science and Technological Development of the Republic of Serbia through the project 176003. - 9-10, 545 (2012). - [3] S. Nojiri and S. D. Odintsov, Physics Reports 505 , 59 (2011). - [4] S. Kopeikin and I. Vlasov, Physics Reports 400 , 209 (2004). - [5] T. Clifton, P. G. Ferreira, A. Padilla, and C. Skordis, Physics Reports 513 , 1 (2012). - [6] E. Fischbach and C. L. Talmadge, The Search for Non-Newtonian Gravity , 305p., Heidelberg -New York, Springer (1999). - [7] S. Capozziello, Int. J. Mod. Phys. D 11 , 483 (2002). - [8] S. Capozziello, V.F. Cardone, S. Carloni, and A. Troisi, Int. J. Mod. Phys. D 12 , 1969 (2003). - [9] S. M. Carroll, V. Duvvuri, M. Trodden, and M.S. Turner, Phys. Rev. D 70 , 043528 (2004). - [10] S. Capozziello, V. Faraoni, Beyond Einstein gravity: A Survey of gravitational theories for cosmology and astrophysics , Fundamental Theories of Physics, Vol. 170, Springer, New York (2010). - [11] G. Leon and E. N. Saridakis, Class. Quantum Grav. 28 , 065008 (2011). - [12] H. A. Buchdahl, Mon. Not. R. Astron. Soc. 150 , 1 (1970). - [13] S. Capozziello, V. F. Cardone, and A. Troisi, Phys. Rev. D 73 , 104019 (2006). - [14] S. Capozziello, V. F. Cardone, and A. Troisi, Mon. Not. R. Astron. Soc. 375 , 1423 (2007). - [15] A. F. Zakharov, A. A. Nucita, F. De Paolis, and G. Ingrosso, Phys. Rev. D 74 , 107101 (2006). - [16] A. F. Zakharov, A. A. Nucita, F. De Paolis, and G. Ingrosso, Phys. Rev. D 76 , 062001 (2007). - [17] A. A. Nucita, F. De Paolis, G. Ingrosso, A. Qadir, and A.F. Zakharov, Publ. Astron. Soc. Pac. 119 , 349 (2007). - [18] C. Frigerio Martins and P. Salucci, Mon. Not. R. Astron. Soc. 381 , 1103 (2007). - [19] D. Borka, P. Jovanovi´, V. Borka Jovanovi´, and A. F. c c Zakharov, Phys. Rev. D 85 , 124004 (2012). - [20] A. F. Zakharov, D. Borka, V. Borka Jovanovi´ c, and P. Jovanovi´ c, J. Adv. Space Res. (2014), http://dx.doi.org/10.1016/j.asr.2014.05.027. - [21] D. Borka, P. Jovanovi´, V. Borka Jovanovi´, and A. F. c c Zakharov, JCAP 11 050 (2013). - [22] B. Li and J. D. Barrow, Phys. Rev. D 75 , 084010 (2007). - [23] V. F. Cardone and S. Capozziello, Mon. Not. R. Astron. Soc. 414 , 1301 (2011). - [24] K. S. Stelle, Gen. Rel. Grav. 9 , 353 (1978). - [25] S. Capozziello, A. Stabile, and A. Troisi, Mod. Phys. Lett. A 24 , 659 (2009). - [26] L. Iorio, Mon. Not. R. Astron. Soc. 401 , 2012 (2010). - [27] E. G. Adelberger, J. H. Gundlach, B. R. Heckel, S. Hoedl, and S. Schlamminger, Progress in Particle and Nuclear Physics 62 , 102 (2009). - [28] S. Capozziello, A. Stabile, and A. Troisi, Phys. Rev. D 76 , 104019 (2007). - [29] S. Capozziello, E. de Filippis, and V. Salzano, Mon. Not. R. Astron. Soc. 394 , 947 (2009). - [30] D. M. Lucchesi and R. Peron, Phys. Rev. D 89 , 082002 (2014). - [31] A. M. Ghez, M. Morris, E. E. Becklin, A. Tanner, and T. Kremenek, Nature 407 , 349 (2000). - [32] A. M. Ghez, S. Salim, N. N. Weinberg, J. R. Lu, T. Do, J. K. Dunn, K. Matthews, M. R. Morris, S. Yelda, E. E. - Becklin, T. Kremenek, M. Milosavljevi´, and J. Naiman, c Astrophys. J. 689 , 1044 (2008). - [33] S. Gillessen, F. Eisenhauer, T. K. Fritz, H. Bartko, K. Dodds-Eden, O. Pfuhl, T. Ott, and R. Genzel, Astrophys. J. 707 , L114 (2009). - [34] S. Gillessen, F. Eisenhauer, S. Trippe, T. Alexander, R. Genzel, F. Martins, and T. Ott, Astrophys. J. 692 , 1075 (2009). - [35] R. Sch¨del, T. Ott, R. Genzel, et al., Nature o 419 , 694 (2002). - [36] R. Genzel, F. Eisenhauer, and S. Gillessen, Rev. Mod. Phys. 82 , 3121 (2010). - [37] S. Gillessen, R. Genzel, T. K. Fritz et al., Nature 481 , 51 (2012). - [38] L. Meyer, A. M. Ghez, R. Sch¨del, et al., Science o 338 , 84 (2012). - [39] T. Fritz et al., Mon. Not. R. Astron. Soc. 401 , 1177 (2010). - [40] G. F. Rubilar and A. Eckart, Astron. Astrophys. 374 , 95 (2001). - [41] G. S. Adkins and J. McDonnell, Phys. Rev. D 75 , 082001 (2007). - [42] N. N. Weinberg, M. Milosavljevi´, and A. M. Ghez, Asc trophys. J. 622 , 878 (2005). - [43] S. Nojiri and S. D. Odintsov, Int. J. Geom. Meth. Mod. Phys. 4 , 115 (2007). - [44] J. W. Moffat, JCAP 05 , 22 (2005). - [45] J. W. Moffat, JCAP 03 , 004 (2006). - [46] T. Biswas, E. Gerwick, T. Koivisto, and A. Mazumdar, Phys. Rev. Lett. 108 , 031101 (2012). - [47] S. Capozziello and M. Francaviglia, Gen. Rel. Grav. 40 , 357 (2008). - [48] S. Capozziello, M. De Laurentis, and V. Faraoni, The Open Astr. Jour. 2 1874, (2009). - [49] S. Capozziello and S. Tsujikawa, Phys. Rev. D 77 , 107501 (2008). - [50] A. Stabile and S. Capozziello, Phys. Rev. D 87 , 064002 (2013). - [51] S. Gottl¨ber, o H.-J. Schmidt, and A.A. Starobinsky, Class. Quantum Grav. 7 , 893 (1990). - [52] L. Amendola, A. Battaglia-Mayer, S. Capozziello, S. Gottl¨ber, V. M¨ller, F. Occhionero and H.-J. Schmidt, o u Class. Quantum Grav. 10 , L43 (1993). - [53] http://vizier.u-strasbg.fr/viz-bin/VizieR?-source=J/ApJ/70 - [54] T. Clifton and J. D. Barrow, Phys. Rev. D 72 , 103005 (2005). - [55] N. R. Napolitano, S. Capozziello, A. J. Romanowsky, M. Capaccioli, and C. Tortora, Astrophys. J. 748 , 87 (2012). - [56] R. H. Sanders, Ann. Rev. Astron. Astrophys. 2 , 1 (1990). - [57] J. J. Mor´ e, B. S. Garbow, and K. E. Hillstrom, User Guide for MINPACK-1, Argonne National Laboratory Report ANL-80-74, Argonne, Ill. (1980). - [58] R. H. Sanders, Astron. Astrophys. 136 , L21 (1984). - [59] F. Duval et al. Astron. Astrophys. 227 , 33 (1990). - [60] S. Gillessen, F. Eisenhauer, G. Perrin, et al., Proc. of SPIE, 77342 (2010). - [61] An Expanded View of the Universe: Science with the European Extremely Large Telescope: http://www.eso.org/public/products/brochures/e-eltsciencec
10.1103/PhysRevD.90.044052
[ "S. Capozziello", "D. Borka", "P. Jovanović", "V. Borka Jovanović" ]
2014-08-06T03:05:04+00:00
2014-08-06T03:05:04+00:00
[ "astro-ph.GA", "gr-qc", "hep-th" ]
Constraining Extended Gravity Models by S2 star orbits around the Galactic Centre
We investigate the possibility to explain theoretically the observed deviations of S2 star orbit around the Galactic Centre using gravitational potentials derived from modified gravity models in absence of dark matter. To this aim, an analytic fourth-order theory of gravity, non-minimally coupled with a massive scalar field is considered. Specifically, the interaction term is given by analytic functions $f(R)$ and $f(R,\phi)$ where $R$ is the Ricci scalar and $\phi$ is a scalar field whose meaning can be related to further gravitational degrees of freedom. We simulate the orbit of S2 star around the Galactic Centre in $f(R)$ (Yukawa-like) and $f(R,\phi)$ (Sanders-like) gravity potentials and compare it with NTT/VLT observations. Our simulations result in strong constraints on the range of gravity interaction. In the case of analytic functions $f(R)$, we are not able to obtain reliable constraints on the derivative constants $f_1$ and $f_2$, because the current observations of S2 star indicated that they may be highly mutually correlated. In the case of analytic functions $f(R,\phi)$, we are able to obtain reliable constraints on the derivative constants $f_0$, $f_R$, $f_{RR}$, $f_{\phi}$, $f_{\phi\phi}$ and $f_{\phi R}$. The approach we are proposing seems to be sufficiently reliable to constrain the modified gravity models from stellar orbits around Galactic Centre.
1408.1170v1
## FROM TOPOLOGY TO NONCOMMUTATIVE GEOMETRY: K -THEORY ## NADISH DE SILVA Abstract. We associate to each unital C ∗ -algebra A a geometric object-a diagram of topological spaces representing quotient spaces of the noncommutative space underlying A -meant to serve the role of a generalized Gel'fand spectrum. After showing that any functor F from compact Hausdorff spaces to a suitable target category C can be applied directly to these geometric objects to automatically yield an extension ˜ which acts on all unital F C ∗ -algebras, we compare a novel formulation of the operator K 0 functor to the extension ˜ K of the topological K -functor. ## 1. Introduction Gel'fand duality provides a link between geometry and algebra by asserting that every unital, commutative C ∗ -algebra is isomorphic to C X ( ), the algebra of continuous, complex-valued functions on a compact Hausdorff topological space X . Indeed, the duality provides an equivalence between these categories. This in turn yields a method of importing concepts of topology into the study of C ∗ -algebras: topological concepts are translated into the language of commutative algebra and generalized to not-necessarily-commutative algebras [1]. As a simple example, the open sets of a space X are in ordered bijection with the closed, two-sided ideals of C X ( ) and so, such ideals can be considered the noncommutative analogue of open sets for not-necessarilycommutative algebras. A more sophisticated example comes from vector bundles over a space X which can be identified with the finite, projective modules over C X ( ) [2]. Pursuing this allows one to define a generalization of topological K -theory, which is formulated in terms of vector bundles [3], to all C ∗ -algebras and obtain operator K -theory, an extremely potent invariant [4, 5]. Gel'fand duality justifies considering C ∗ -algebras to be generalizations of topological spaces; this is the starting point of the program of noncommutative operator geometry [6]. The motivating metaphor of noncommutative geometry is to view a C ∗ -algebra as being the algebra of functions on a topological space. Although, in the case of commutative C ∗ -algebras, this space is explicitly given by the Gel'fand spectrum, in the noncommutative case, the existence of such an underlying space is understood to be merely a convenient fiction which justifies the algebraic generalization of geometric concepts. In this note, we present a geometric construction meant to serve as a generalization of the Gel'fand spectrum to noncommutative C ∗ -algebras. We outline an automatic method for the generalization of topological concepts to the setting of C ∗ -algebras which is distinct from the one described above. The method requires essentially two steps. First, we contravariantly associate to each unital C ∗ -algebra A the geometric object G ( A ) which is meant to play the role of the hypothetical space X on which A is the algebra of continuous, complex-valued functions. Next, we apply directly to G ( A ) the topological functor which we aim to extend. Thus, we begin with any functor F from the category of compact Hausdorff spaces to a suitable target category C and we construct a functor ˜ F from the category of unital C ∗ -algebras to C such that ˜ , F restricted to commutative algebras, is naturally isomorphic to F composed with the Gel'fand spectrum functor. The results of this method of extending topological concepts can be compared with the constructions achieved via the canonical translation process. Agreement of these two methods would justify regarding G ( A ) as the underlying space of a noncommutative algebra. Akemann and Pedersen [7] proposed to replace the translation process by working directly with Giles-Kummer's [8] and Akemann's [9] noncommutative generalizations of the basic topological notions of open and closed sets. In contrast, we do not employ algebraic generalizations of basic topological notions, but rather, we work with objects which slightly generalize the notion of topological space and come readily equipped with an alternative to the translation process. In addition to the work of Akemann-Pedersen and Giles-Kummer on noncommutative generalizations of Gel'fand duality, there have been a number of alternative approaches by authors including Alfsen [10], Bichteler et al. [11], Dauns-Hofmann [12], Fell [13], Kadison [14], Kruml et al. [15], Krusy´ski-Woronowicz [16], Resende [17], Schultz [18], n and Takesaki [19]. An excellent discussion of many of these works is contained in a paper by Fujimoto [20]. We begin by constructing the geometric object G ( A ) we associate to a unital C ∗ -algebra A , and giving a motivation for it as a means of keeping track of all the quotient spaces of the noncommutative space underlying A which happen to be genuine topological spaces. After showing how this association of geometric objects to algebras allows us to automatically extend topological functors, we then relate the resulting extension of topological K -theory to a novel formulation of the operator K 0 functor. We then report on progress on how the basic topological notion of lattice of closed sets might be extended to the notion of lattice of closed, two-sided ideals, thereby establishing a conjectured relationship between the topologies of the geometric object G ( A ) and Prim( A ), the primitive ideal space of A . (The primitive ideal space of A is the set of ideals which are kernels of irreducible ∗ -representations of A equipped with the hull-kernel topology; in the commutative case, the primitive ideal space coincides with the Gel'fand spectrum.) Establishing this conjecture would allow considering G to be an enrichment of Prim, a C ∗ -algebraic variant of the ring-theoretic spectrum functor Spec which is the basis of the sheaf-theoretic study of rings. This might open up the possibility of investigating the use of sheaf-theoretic methods in noncommutative geometry. ## 2. Spatial diagrams To each unital C ∗ -algebra A , we will associate a diagram of topological spaces G ( A ) which is expressed formally as a contravariant functor with, as its codomain, the category of compact Hausdorff spaces. Not only will these spaces vary with A but the shape of the diagram (the domain of the functor) will as well. This necessitates introducing the following constructions: Definition 2.1. For any category C , Diag( - → C ) , the covariant category of all diagrams in C , has as objects all the functors D from any small category S to C . Morphisms from D 1 : S 1 → C to D 2 : S 2 → C are given by pairs ( f, η ) where f is a functor from S 1 → S 2 and η is a natural transformation from D 1 to D 2 ◦ f . The contravariant category of all diagrams Diag( ←-C ) has all contravariant functors to C as objects; the morphisms from D 1 to D 2 are pairs ( f, η ) where f is a functor from S 2 → S 1 and η is a natural transformation from D 1 ◦ f to D 2 . The composition ( g, µ ) ◦ ( f, η ) of two Diag( - → C )-morphisms is given by ( gf, ( µf η ) ) where ( µf ) a is µ f ( a ) and the composition of natural transformations is componentwise. Note that if F is a functor from C to C ′ , F naturally induces a functor from Diag( - → C ) to Diag( - → C ′ ) which we will also denote by F . Explicitly, if D : A → C , then F D ( ) is simply F ◦ D . For a Diag( - → C )-morphism ( f, η ), F sends ( f, η ) to the Diag( - → C ′ )-morphism ( f, F η ) where ( Fη ) a is F η ( a ). The functor F also induces, in a similar fashion, a functor from Diag( ←-C ) to Diag( ←-C ′ ). If F is contravariant, then it induces a contravariant functor from Diag( - → C ) to Diag( ←-C ′ ) and one from Diag( ←-C ) to Diag( - → C ′ ). 2.1. The spatial diagram of an algebra. We can now construct the spatial diagram G ( A ) associated to a unital C ∗ -algebra A . First, we associate to A a subcategory S ( A ) of unital, commutative C ∗ -algebras with unital ∗ -homomorphisms. The objects of S ( A ) are the unital, commutative subC ∗ -algebras of A . For every inner automorphism α of A , that is, one acting by conjugation by a unitary u ∈ A , object U ⊂ A , and any object V ⊂ A containing α U ( ), there is a restriction α | U from U to V ; these are the morphisms of S ( A ). Denote by g ( A ) the inclusion functor from S ( A ) to uComC ∗ . The diagram G ( A ), an object of Diag( ←-KHaus ), is the Gel'fand spectrum functor Σ composed with g ( A ). The association of spatial diagrams to algebras is contravariantly functorial. To a unital *-morphism φ : A → B , we define g φ ( ) as the Diag( - → uComC ∗ )-morphism ( f, η ). The functor f maps a commutative subalgebra U ⊂ A to φ U ( ) ⊂ B ; the action of f on the restriction of an automorphism described by a unitary u is to send it to the restriction of an automorphism described by φ u ( ). The component of η associated to U ⊂ A is φ | U . Finally, the Diag( ←-KHaus )-morphism G φ ( ) is Σ( g φ ( )). The topological spaces in the diagram G ( A ) should be thought of as being those which arise as quotient spaces of the hypothetical noncommutative space underlying A . To see this, note that a subC ∗ -algebra of C X ( ) yields an inclusion i : C Y ( ) → C X ( ) which corresponds to a continuous surjection Σ i : X → Y ; this surjection is a quotient map since both X and Y are compact and Hausdorff. Thus, in accordance with the central tenet of noncommutative geometry, unital subC ∗ -algebras of a unital noncommutative algebra A are to be understood as having an underlying noncommutative space which is a quotient space of the noncommutative space underlying A . By considering only the commutative subalgebras, we are restricting our attention to the tractable quotient spaces: those which are genuine topological spaces. The morphisms of the diagram-particularly, the images under the Gel'fand spectrum functor of inclusions-serve to track how these spaces fit together inside the noncommutative space underlying A . ## 3. Extensions For a unital C ∗ -algebra A , we have constructed the diagram of topological spaces G ( A ). Any functor F : KHaus → C , from the category of compact Hausdorff spaces to C , can be applied directly to G ( A ) to yield F ◦ G ( A ), a diagram in C . When F is contravariant (resp. covariant) and C is cocomplete (resp. complete), we can take the colimit (resp. limit) of this diagram to yield a single object of C . Combining all these steps gives us a new functor ˜ F which acts on all unital C ∗ -algebras. Since, when A is commutative, A is a terminal object in the category S ( A ), it can be shown that ˜ , F restricted to commutative algebras, is naturally isomorphic to F composed with the Gel'fand spectrum functor. Intuitively, one should think of the extension process as decomposing a noncommutative space into its quotient spaces, retaining those which are genuine topological spaces, applying the topological functor to each one, and pasting together the result. Definition 3.1. For a contravariant functor F : KHaus →C with C cocomplete, ˜ : F uC ∗ →C the extension of F is lim - → FG . This definition requires the generalized colimit functor lim : Diag( - → - → C ) →C . It assigns to a functor F : A → C the same object of C which is assigned to F by the canonical colimit functor lim : - → C A →C . If η is a natural transformation between F and G : A → C then lim as-- → signs to the Diag( - → C )-morphism between F and G given by ( id A , η ) the same C -morphism assigned to η by the colimit functor of C A . What is novel is the ability to assign C -morphisms between colimits of diagrams of different shapes. A generalized limit functor lim : Diag( ← -←-C ) →C also exists and allows defining the extension of a covariant functor F as lim ← -FG . In the sequel of this section, we begin by explicitly describing how the generalized lim and lim functors act on arbitrary morphisms and - → ← -demonstrating the functoriality of these generalized notions of universal constructions. We then give an explicit description of the lim functor - → on the category of all diagrams of abelian groups which we will require in our formulation of operator K -theory. We conclude the section by showing that, given a functor F : KHaus →C , its extension ˜ , F once restricted to commutative algebras, is naturally isomorphic to F composed with the Gel'fand spectrum functor Σ. - 3.1. The generalized limit and colimit functors. Recall that the colimit of a functor F from A to a cocomplete category C can be expressed as a coequalizer of two coproducts [21, p355]: /d47 $$\coprod _ { u \colon i \to j } F ( \text{dom} u ) \xrightarrow { \theta } \coprod _ { \tau } F ( i )$$ /d47 /d47 /d47 The first coproduct is over all arrows u : i → j of A and the second is over all objects of A . We denote the canonical injections for these coproducts by $$\lambda _ { u } \, \colon F ( \text{dom} u ) & \to \coprod _ { u \colon i \to j } F ( \text{dom} u ) \\ \kappa _ { i } \, \colon F ( i ) & \to \coprod _ { i } F ( i ) \. \\ \text{is $\theta$ and $\tau$ can be defined $hv$ sncifvino$ their}$$ The morphisms θ and τ can be defined by specifying their compositions with the λ u : $$\theta \lambda _ { u } = \kappa _ { \text{dom} u } \quad \ \tau \lambda _ { u } = \kappa _ { \text{cod} u } F ( u )$$ $$\AA \AA$$ The advantage of this coequalizer presentation of the colimit of is that we may determine a C -morphism between the colimits of two functors F and G by specifying a natural transformation between their coequalizer diagrams. That is, by giving its components; C -morphisms N and M such that the following diagrams commute: /d47 /d47 /d15 /d15 /d47 $$\begin{array} { c } \sim & \sim \\ \coprod _ { u \colon i \to j } F ( \text{dom} u ) & \overset { \theta } { \longrightarrow } \coprod _ { i } F ( i ) \\ \downarrow ^ { N } & \downarrow ^ { N } G ( \text{dom} u ^ { \prime } ) & \overset { \theta ^ { \prime } } { \longrightarrow } \coprod _ { i ^ { \prime } } G ( i ^ { \prime } ) \end{array}$$ /d15 /d15 /d47 /d47 /d47 /d15 /d15 /d15 /d15 $$\coprod _ { u \colon i \to j } F ( \text{dom} u ) \underset { \tau ^ { \prime } \colon i ^ { \prime } \to j ^ { \prime } } { \longrightarrow } \coprod _ { i } F ( i ) \\ \downarrow N \, \Big \downarrow M \\ \coprod _ { u ^ { \prime } \colon i ^ { \prime } \to j ^ { \prime } } G ( \text{dom} u ^ { \prime } ) \underset { \tau ^ { \prime } } { \longrightarrow } \coprod _ { i ^ { \prime } } G ( i ^ { \prime } )$$ /d47 /d47 We denote the canonical injections into the coproducts for G by λ ′ u and κ ′ i . Given a Diag( - → C )-morphism ( f, η ) between F and G we define N and M by giving their compositions with the canonical injections: $$N \lambda _ { u } = \lambda ^ { \prime } _ { f ( u ) } \eta _ { \text{dom} u } \quad \ \ M \kappa _ { i } = \kappa ^ { \prime } _ { f ( i ) } \eta _ { i }$$ It is straightforward to verify that θ N ′ = Mθ and that τ N ′ = Mτ by computing the composition of these maps with the λ u . The C -morphism assigned by lim to ( - → f, η ) is then defined to be that morphism which is induced by the natural transformation between the coequalizer diagrams for the colimits of F and G whose components are N and M . Functoriality of lim is then straightforwardly verified - → by computing the compositions of the components of the natural transformations induced by ( f, η ) and ( g, µ ) and seeing that the resulting natural transformation is the same as the one induced by ( gf, ( µf η ) ). A dual construction exists in the case where C is complete, in which case we have a generalized limit functor lim : Diag( ← -←-C ) →C . The generalized colimit construction is best illustrated by the example of abelian groups. Let F : A → Ab and G : B → Ab be two diagrams in Diag( - → Ab ) and ( f, η ) be a morphism from F to G . First, we describe the colimit of F in Ab (and thus in Diag( - → Ab )). Let d be the direct sum of the groups F a ( ) over all objects a in A . If g is an element of the F a ( ), we use the notation ( g ) a to indicate the element of d which is g in the a th component and 0 in all others. The colimit of F is d modulo an equivalence relation: for any arrow u : a 1 → a 2 of A , ( g ) a 1 is identified with ( F u ( )( g )) a 2 . To define how the functor lim : - → Diag ( Ab ) → Ab acts on ( f, η ), it is enough to say how the group homomorphism lim(( - → f, η )) acts on elements of the colimit of F of the form [( g ) a ]. The image of such an element under lim(( - → f, η )) is [( η a ( g )) f ( a ) ]. This is well defined for if u : a 1 → a 2 identifies ( g ) a 1 with ( F u ( )( g )) a 2 , then G ◦ f ( u ) identifies ( η a 1 ( g )) f ( a 1 ) with ( η a 2 ( F u ( )( g ))) f ( a 2 ) . 3.2. Extensions and the commutative case. When A is commutative, A is terminal in the category S ( A ) as there is an inclusion morphism from every unital, commutative subalgebra of A into A . As a consequence, the diagram F G ( ( A )) has F (Σ( A )) as a terminal object when F is contravariant. Since, for any diagram whose domain has a terminal object, the canonical injection from the terminal object to the colimit is an isomorphism, we have that ˜ ( F A /similarequal ) F ◦ Σ( A ). For a unital ∗ -homomorphism φ : A → B between commutative algebras, ˜ ( F φ ), the isomorphisms , and F ◦ Σ( φ ) together form a commutative square. Thus, these isomorphisms define a natural equivalence between ˜ F | ComC ∗ and F ◦ Σ. A dual argument holds in the case where F is covariant. ## 4. K -theory, Topological to C ∗ -algebraic Given a compact Hausdorff space X , the isomorphism classes of vector bundles over X form an abelian monoid V ( X ) under direct sum. The universal abelian group of V ( X ) is the K -group of X and is denoted by K X ( ). The topological K -functor is the basis of the extraordinary cohomology theory K -theory which is of considerable importance in geometry. It is generalized to arbitrary C ∗ -algebras using the canonical translation process. As vector bundles over X are, by the Serre-Swan theorem, in correspondence with finite, projective C X ( )-modules, we define V ( A ) to be the monoid of isomorphism classes of finite, projective A -modules with direct sum and find that it, too, is abelian. Again using the universal group construction yields the operator K 0 functor. We aim to define operator K 0 directly in terms of the topological K -theory of spatial diagrams. The first step in computing the K 0 -group of a C ∗ -algebra is to take its stabilization. The stabilization functor K : C Alg ∗ → C Alg ∗ acts on an algebra A by taking it to A ⊗ K , its tensor product with the C ∗ -algebra K of compact operators on a separable Hilbert space, and sends *-morphisms φ to φ ⊗ id K . This operation is idempotent: K ◦ K /similarequal K . The K -theory of a C ∗ -algebra A is the same as its stabilization K ( A ); in fact, K 0 ◦ K /similarequal K 0 . Although it remains open whether K 0 /similarequal ˜ we find that our aim can K be achieved by applying K not to the diagrams G but to subdiagrams G f after stabilizing. Theorem 4.1. K 0 ◦ K /similarequal K 0 /similarequal ˜ K f ◦ K as functors from unital C ∗ -algebras to abelian groups. Here, ˜ K f is defined for unital C ∗ -algebras in a manner most similar to how ˜ K is: as lim - → K ◦ G f . The only difference in the definitions of G and G f is that the subC ∗ -algebras of A which are the objects in the full subcategory S f ( A ) of S ( A ) are, in addition to being unital and commutative, finite dimensional. As all C ∗ -algebras isomorphic to A⊗ K lack a unit, we must extend ˜ K f to all C ∗ -algebras and we do so using the same method used for K 0 : if π : A + → C is the projection from the unitalization of A to the subalgebra of scalar multiples of the unit, then ˜ K f ( A ) is defined as the kernel of ˜ K f ( π ) [22]. For a unital C *-algebra A , the K 0 -group can be expressed in a rather simple fashion [23]. First, we define an equivalence relation on projections in A ⊗ K : P ∼ Q if and only if there is a unitary u ∈ A⊗ ( K ) + such that P = uQu ∗ . If P and P ′ are two projections in A ⊗ K , there exist projections Q and Q ′ such that P ∼ Q , P ′ ∼ Q ′ , and Q is orthogonal to Q ′ . The abelian addition operation on projections is defined by [ P ] + [ P ′ ] = [ Q + Q ′ ]. We have thus defined the abelian monoid V ( A ). Then K 0 ( A ) is simply the collection of formal differences [ P ] -[ Q ] of elements of V ( A ) with [ P ] -[ Q ] = [ P ′ ] -[ Q ′ ] precisely when there exists [ R ] such that [ P ] + [ Q ′ ] + [ R ] = [ P ′ ] + [ Q ] + [ R ]. A morphism φ : A → B between unital C *-algebras naturally induces a morphism K ( φ ) between their stabilizations. When restricted to projections, this map is is well-defined and additive on the equivalence classes, yielding a morphism of abelian monoids V ( φ ) : V ( A → ) V ( B ). By composing with the universal abelian group functor, we turn this abelian monoid homomorphism into an abelian group homomorphism between the K 0 groups of A and B . Proof. For unital A , we will compute ˜ K f ◦ K ( A ) = lim - → K ◦ G f ( A⊗ K ) in stages and present it in such a form which makes it clear that it is isomorphic in a natural way to K 0 ( A ). We begin by describing how the functor ˜ K f acts on unital algebras before generalizing to the non-unital case. The objects of S f ( A ) are the finite-dimensional, unital, commutative subC ∗ -algebras of A . The morphisms are given by the restrictions of inner automorphisms. These morphisms are all of the form i ◦ r where i is an inclusion and r is an isomorphism between subalgebras which are related by unitary rotation. Under the Gel'fand spectrum functor, the image of such an object is a finite, discrete space whose points are in correspondence with the atomic projections of the subalgebra. The images of the inclusions i : U → V are functions Σ( ) : Σ( i V ) → Σ( U ) with the property that whenever a point p ∈ Σ( U ) corresponds to a projection P atomic in U , then P is the sum of the atomic projections in V which correspond to the points of [Σ( )] i -1 ( p ). The isomorphisms are sent by the spectrum functor to bijections which connect points corresponding to unitarily equivalent projections. Under the topological K -functor, each object yields a direct sum of copies of Z : one for each point (a trivial vector bundle of each dimension and formal inverses). Taking the colimit of the diagram then yields, as described in the previous section, a direct sum of the groups indexed by the objects of S f ( A ) modulo the relations generated by the morphisms of the diagram. In our case, this is a quotient of the direct sum of a copy of Z for each pair ( U, P ) where U is a finite-dimensional, unital, commutative subC ∗ -algebra of A and P is an atomic projection in U . The image under K ◦ Σ of the inclusions result in the identifications of a generator of a copy of Z associated to a pair ( U, P ) with the sums of generators associated to pairs ( V, P i ) whenever U ⊂ V and P i sums to P . Every projection P ∈ A is an atomic projection in the subalgebra C P + C (1 -P ) which is included in every subalgebra which contains P as a member. As the generators associated to the same projection P atomic in different subalgebras are all identified in the colimit, we see that we may speak of the element of the colimit group [( P )] associated to P without reference to which subalgebra it appears in. Thus, the abelian group ˜ K f ( A ) can be viewed as a quotient of the free abelian group generated by the elements [( P )]. The first class of identifications consists of those between elements [( P )] with the sum of elements [( P i )] whenever P i are mutually orthogonal and sum to P . The isomorphisms in the diagram provide the second class; they ensure that the elements associated to unitarily equivalent projections are also identified. For non-unital algebras such as A⊗ K , we need to determine the kernel of ˜ K f ( π ) with π the canonical projection from ( A⊗ K ) + to C . This is not so difficult, however, as all projections in ( A⊗ K ) + are of the form P or 1 -P for P ∈ A ⊗ K . As [(1 -P )] = [(1)] -[( P )] we see that all elements of the colimit group can be expressed using only elements associated either to the identity projection or to projections in A⊗ K . It is precisely those elements of ˜ K f (( A⊗ K ) + ) which can be expressed using only elements associated to projections in A ⊗ K which are in the kernel. We are ready to define the natural transformation η : K 0 → ˜ K f ◦ K . The component of the natural isomorphism η A sends [ P ] -[ Q ] in K 0 ( A ) to [( P )] -[( Q )]. This is easily seen to be well defined, for if [ P ] + [ Q ′ ] + [ R ] = [ P ′ ] + [ Q ] + [ R ] then we may find mutually orthogonal representatives of all these projections and demonstrate that [( P )] -[( Q )] = [( P ′ )] -[( Q ′ )]. Preservation of addition follows by a similar argument. We define an inverse map to demonstrate bijectivity. The element [( P )] ∈ ˜ ( K f A⊗ K ) is sent by η -1 A to [ P ]. Since the equivalences induced by the morphisms of the diagram are respected at the level of K -theory, this map is well-defined. To demonstrate the naturality of these isomorphisms, let φ : A → B be a unital *-morphism. We will require the naturally induced *-morphism K φ : A⊗ K →B⊗ K which is defined explicitly by φ ⊗ id K . /d47 /d47 /d15 /d15 /d15 /d15 /d47 $$\stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stack | \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } \stackrel { \sim } { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel | \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stack { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim } \stackrel { \sim }$$ /d47 An element [ P ] -[ Q ] in K 0 ( A ) is mapped to [( P )] -[( Q )] by η A . This is then mapped to [( K φ P ( ))] -[( K φ Q ( ))] by lim - → ˜ K f ◦ K ( φ ). Alternatively, [ P ] -[ Q ] in K 0 ( A ) is mapped to [ K φ P ( )] -[ K φ Q ( )] in K 0 ( B ) which is in turn mapped to [( K φ P ( ))] -[( K φ Q ( ))] by η B . /square ## 5. Conclusions and Future Work As we have seen, operator K 0 theory arises as the finite-dimensional fragment of the extension ˜ K of topological K -theory. Although this applies only to the stabilizations of unital C ∗ -algebras, this is no great loss; any algebra is stabilized before its K 0 group is computed. It is also possible that the relationship between K and ˜ is even closer than K what we have proven: perhaps K 0 /similarequal ˜ . K In order to justify thinking of G : uC ∗ → ←-Diag( KHaus ) as a noncommutative Gel'fand spectrum functor, we wish to find more examples of topological concepts which can be automatically translated to their noncommutative version via the extension method based on G . We have considered the example of the notion of closed sets. Let T : KHaus → CMSLat be the functor which assigns to a compact Hausdorff topological space its lattice of closed sets with containment and, to a continuous function, the homomorphism of complete meetsemilattices which sends a closed set to its image under the continuous function. We conjecture that: Conjecture 5.1. The extension of the lattice of closed sets functor, ˜ T : uC ∗ → CMSLat , assigns to a unital C ∗ -algebra its lattice of closed two-sided ideals. Equivalently, the hull-kernel topology on the C ∗ -algebra's primary ideal space can be recovered as the limit of the topologies of G . The functor Prim is the C ∗ -algebraic variant of the spectrum functor Spec which assigns to a commutative ring a space whose hull-kernel topology provides the basis for sheaf-theoretic ring theory. For the purposes of proving the conjecture, we find it useful to rephrase the problem. Definition 5.2. A partial ideal [24] of a unital C ∗ -algebra A is a choice of closed ideal I V from each unital, commutative subC ∗ -algebra V ⊂ A such that whenever V ⊂ V ′ , the ideal I V can be recovered from I V ′ as I V = I V ′ ∩ V . Every closed, two-sided ideal of A , which we will call a total ideal , gives rise to a partial ideal in a natural way by choosing I V to be I ∩ V . Elements of the lattice ˜ ( T A ) correspond to a special kind of partial ideal: one which is fixed by every unitary rotation in the sense that I uV u ∗ = uI V u ∗ . Thus Conjecture 5.1 follows from: Conjecture 5.3. A partial ideal of a unital C ∗ -algebra arises from a total ideal if and only if it is fixed by every unitary rotation. In forthcoming work with Rui Soares Barbosa, we establish the von Neumann algebraic analogue of this conjecture. One may define a partial ideal for a unital von Neumann algebra by replacing 'unital, commutative subC ∗ -algebra'with 'unital, commutative sub-vonNeumann-algebra' and 'closed ideal' with 'ultraweakly closed ideal'. In this case, a total ideal is an ultraweakly closed, two-sided ideal. Theorem 5.4. A partial ideal of a unital von Neumann algebra arises from a total ideal if and only if it is fixed by every unitary rotation. This theorem provides some measure of evidence for the original conjecture's verity and its proof may be adapted to show that the original conjecture holds for a large class of-or perhaps allC ∗ -algebras. ## 6. Acknowledgements It is a pleasure to thank my supervisors, Samson Abramsky and Bob Coecke, as well as Chris Heunen, Andreas D¨ring, and Jamie Vicary o for their guidance and encouragement during this project. I also wish to thank Kobi Kremnitzer, George Elliott, Rui Soares Barbosa, and Brent Pym for many crucial and constructive discussions. I would like to acknowledge the support of Merton College, the Oxford University Computing Laboratory, the Clarendon Fund, and NSERC. ## References - [1] M. Khalkhali Very basic noncommutative geometry 2004: http://arxiv.org/abs/math/0408416. - [2] R. Swan Vector Bundles and Projective Modules 1962: Transactions of the American Mathematical Society. - [3] M. Atiyah K-theory 1989: Advanced Book Classics. - [4] G. Elliott The classification problem for amenable C ∗ -algebras 1995: Proceedings of the International Congress of Mathematicians. - [5] M. Rordam Classification of nuclear C ∗ -algebras 2002: Encyclopaedia of Mathematical Sciences. - [6] A. Connes Noncommutative geometry 1994: Academic Press. - [7] G. Pedersen SAW ∗ -algebras and corona C ∗ -algebras, contributions to noncommutative topology 1986: Journal of Operator Theory. - [8] R. Giles, H. Kummer A non-commutative generalization of topology 1971: Indiana University Mathematics Journal. - [9] C. Akemann Left ideal structure of C ∗ -algebras 1970: Journal of Functional Analysis. - [10] E. Alfsen One the Dirichlet problem of the Choquet boundary 1968: Acta Mathematica. - [11] K. Bichteler A generalization to the non-separable case of Takesaki's duality theorem for C ∗ -algebras 1969: Inventiones Mathematicae. - [12] J. Dauns, K. Hofmann Representation of rings by sections 1968: Memoirs of the American Mathematical Society. - [13] J. Fell The structure of algebras of operator fields 1961: Acta Mathematica. - [14] R. Kadison A representation theory for commutative topological algebra 1951: Memoirs of the American Mathematical Society. - [15] D. Kruml, J. Pelletier, P. Resende, J. Rosicky On quantales and spectra of C*-algebras 2003: Applied Categorical Structures. - [16] P. Kruszy´ski, S. Woronowicz n A noncommutative Gelfand-Naimark theorem 1982: Journal of Operator Theory. - [17] P. Resende Etale groupoids and their quantales 2007: Advances in Mathematics. - [18] F. Schultz Pure states as a dual object for C ∗ -algebras 1981: Communications in Mathematical Physics. - [19] M. Takesaki A duality in the representation theory of C ∗ -algebras 1967: Annals of Mathematics. - [20] I. Fujimoto A Gel'fand-Naimark theorem for C ∗ -algebras 1998: Pacific Journal of Mathematics. - [21] S. Mac Lane, I. Moerdijk Sheaves in geometry and logic 1992: Springer-Verlag. - [22] P. Fillmore A user's guide to operator algebras 1996: Wiley-Interscience. - [23] M. Rordam, F. Larsen, N. Lausten An introduction to K -theory for C ∗ -algebras 2000: Cambridge University Press. - [24] M. Reyes Obstructing extensions of the functor Spec to noncommutative rings 2012: Israel Journal of Mathematics. Quantum Group, Department of Computer Science, University of Oxford, Wolfson Building, Parks Road, Oxford OX1 3QD, UK. E-mail address : [email protected]
null
[ "Nadish de Silva" ]
2014-08-06T03:07:26+00:00
2014-08-06T03:07:26+00:00
[ "math.OA", "math.CT", "math.KT", "46L80 (Primary) 46L85, 58B34" ]
From Topology to Noncommutative Geometry: $K$-theory
We associate to each unital $C^*$-algebra $A$ a geometric object---a diagram of topological spaces representing quotient spaces of the noncommutative space underlying $A$---meant to serve the role of a generalized Gel'fand spectrum. After showing that any functor $F$ from compact Hausdorff spaces to a suitable target category can be applied directly to these geometric objects to automatically yield an extension $\tilde{F}$ which acts on all unital $C^*$-algebras, we compare a novel formulation of the operator $K_0$ functor to the extension $\tilde K$ of the topological $K$-functor.
1408.1172v1
## PARTIAL AND TOTAL IDEALS OF VON NEUMANN ALGEBRAS NADISH DE SILVA RUI SOARES BARBOSA Abstract. A notion of partial ideal for an operator algebra is a weakening the notion of ideal where the defining algebraic conditions are enforced only in the commutative subalgebras. We show that, in a von Neumann algebra, the ultraweakly closed two-sided ideals, which we call total ideals , correspond to the unitarily invariant partial ideals. The result also admits an equivalent formulation in terms of central projections. We place this result in the context of an investigation into notions of spectrum of noncommutative C ∗ -algebras. ## 1. Introduction The principal theorem proved in this paper concerns the von Neumann algebraic analogue of a conjecture made for C ∗ -algebras. We describe the original question concerning C ∗ -algebras, state the von Neumann algebraic version, and outline the more general investigation into noncommutative topology in the context of which the original question first arose. In the next sections, we prove the principal theorem after establishing some technical preliminaries. We conclude by indicating some ideas about how to tackle the C ∗ -algebraic case. - 1.1. Partial and total ideals of C ∗ -algebras. All algebras and subalgebras considered throughout this paper are assumed to be unital. By a total ideal of a C ∗ -algebra A , we mean a norm closed, two-sided ideal of A . Definition 1.1. A partial ideal of a C ∗ -algebra A is a map π that assigns to each commutative subC ∗ -algebra V of A a closed ideal of V such that π V ( ) = π V ( ′ ) ∩ V whenever V ⊂ V ′ . Remark. Suppose I is the contravariant functor from the category of C ∗ -algebras to the category of complete meet-semilattices which sends an algebra to its lattice of total ideals and a ∗ -homomorphism φ : A -→ B to the homomorphism of complete meet-semilattices I ( φ ) : I B ( ) -→ I A ( ) taking an ideal I ⊂ B to the ideal φ -1 ( I ) of A . Then a partial ideal is precisely a choice of π V ( ) ∈ I ( V ) for each commutative subC ∗ -algebra V of A such that whenever there is an inclusion morphism ι : V ↪ -→ V ′ , then $$\pi ( V ) = \mathcal { I } ( \iota ) ( \pi ( V ^ { \prime } ) ) = \pi ( V ^ { \prime } ) \cap V \ ;$$ i.e. the following diagram commutes. /d79 /d47 /d47 /d79 /d31 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1172v1-figure-cccc6fca-e251-4c60-98e6-66cc40d1283b.jpg) /d33 /d33 /d15 /d15 /d63 Remark. The concept of partial ideal was introduced by Reyes [9] in the more general context of partial C ∗ -algebras. His definition differs slightly but is equivalent in our case: a subset P of normal elements of A such that P ∩ V is a closed ideal of V for all commutative subC ∗ -algebras V of A . Partial ideals exist in abundance: every closed, left (or right) ideal I of A gives rise to a partial ideal π I in a natural way by choosing π I ( V ) to be I ∩ V . For example, in a matrix algebra M n ( C ), the right ideal pM n ( C ), for p ∈ M n ( C ) a nontrivial projection, yields a nontrivial partial ideal of M n ( C ) in this way. As matrix algebras are simple, it cannot be the case that these nontrivial partial ideals also arise as π I from a total ideal I . This raises a natural question: Question 1.2. Which partial ideals of C ∗ -algebras arise from total ideals? Some partial ideals do not even arise from left or right ideals: for example, choosing arbitrary nontrivial ideals from every nontrivial commutative subC ∗ -algebra of M 2 ( C ) yields, in nearly all cases, nontrivial partial ideals of M 2 ( C ). However, a hint towards identifying those partial ideals which arise from total ideals is given by a simple observation. If Ad u : A -→ A is an inner automorphism of A -that is, one given by conjugation by a unitary u of A -then Ad ( ) = u I I for any total ideal I ⊂ A . This imposes a special condition on the partial ideal π I ( V ) = I ∩ V which arises from I . Definition 1.3. An invariant partial ideal π of a C ∗ -algebra A is a partial ideal of A such that, for each commutative subC ∗ -algebra V ⊂ A and any unitary u ∈ A , the rotation by u of the ideal associated to V is the ideal associated to the rotation by u of V . That is, $$\text{Ad} _ { u } ( \pi ( V ) ) = \pi ( \text{Ad} _ { u } ( V ) ) \.$$ Remark. Imposing the invariance condition on partial ideals is equivalent to extending the requirement on maps π of Diagram (1) from inclusion maps to all ∗ -homomorphisms Ad u V | V ′ : V -→ V ′ arising as a restriction of the domain and codomain of an inner automorphism. An invariant partial ideal is precisely a choice of π V ( ) ∈ I ( V ) for each commutative subC ∗ -algebra V of A such that whenever there is a morphism Ad u V | V ′ : V -→ V ′ as above, then $$\pi ( V ) = \mathcal { I } ( \text{Ad} _ { u } | _ { V } ^ { V ^ { \prime } } ) ( \pi ( V ^ { \prime } ) ) = \text{Ad} _ { u ^ { * } } ( \pi ( V ^ { \prime } ) ) \cap V \ ;$$ i.e. the following diagram commutes. /d79 /d47 /d47 /d79 /d33 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1172v1-figure-a32ce8ea-1a28-4960-bc7f-5782ae214e22.jpg) /d33 /d15 /d15 Thus, we arrive at the simplest possible conjecture: ↦ Conjecture 1.4. A partial ideal of a C ∗ -algebra arises from a total ideal if and only if it is an invariant partial ideal. Consequently, the map I -→ π I is a bijective correspondence between total ideals and invariant partial ideals. ↦ Note that the first part of the statement says that the map I -→ π I is surjective onto the invariant partial ideals. The second part of the statement follows easily from this, since injectivity of this map is obvious: the left inverse is given by mapping an invariant partial ideal of the form π I to the linear span of ⋃ V π V ( ), which is equal to I itself. 1.2. Partial and total ideals of von Neumann algebras. One may define partial ideal (resp. invariant partial ideal ) for a von Neumann ↦ algebra by replacing in Definition 1.1 (resp. Definition 1.3) the occurrences of 'commutative subC ∗ -algebra'with 'commutative sub-vonNeumann-algebra' and 'closed ideal' with 'ultraweakly closed ideal'. A total ideal of a von Neumann algebra is an ultraweakly closed, twosided ideal. As before, a total ideal I determines an invariant partial ideal π I in the same way, and the map I -→ π I is injective. Establishing the analogue of Conjecture 1.4 for von Neumann algebras provides some measure of evidence for the original conjecture's verity, and its proof may be adapted to show that the original conjecture holds for a large class of-or perhaps allC ∗ -algebras. ↦ Theorem 1.5 (Principal theorem) . A partial ideal of a von Neumann algebra arises from a total ideal if and only if it is an invariant partial ideal. Consequently, the map I -→ π I is a bijective correspondence between total ideals and invariant partial ideals. Total ideals of a von Neumann algebra A are in bijective correspondence with central projections z of A : every total ideal I is of the form z A for a unique z [2]. This allows us to rephrase the theorem in terms of projections which are vastly more convenient to work with. Definition 1.6. A consistent family of projections of a von Neumann algebra A is a map Φ that assigns to each commutative subvon-Neumann-algebra V of A a projection in V such that: - (1) for any V and V ′ such that V ⊂ V ′ , Φ( V ) is the largest projection in V which is less than or equal to Φ( V ′ ) , i.e. Φ( V ) = sup { q is a projection in V | q ≤ Φ( V ′ ) } . An invariant family of projections is such a map which further satisfies - (2) for any unitary element u ∈ A , Φ( uV u ∗ ) = u Φ( V ) u ∗ . The correspondence between total ideals and central projections yields correspondences between partial ideals (resp. invariant partial ideals) and consistent (resp. invariant) families of projections. We therefore establish Theorem 1.5 in the third section by proving an equivalent statement. Just as was the case for ideals, any projection p determines a consistent family of projections Φ p defined by choosing Φ ( p V ) to be the largest projection p in V which is less than or equal to p . For a central projection z , Φ z turns out to be an invariant family. In the opposite direction, any consistent family of projections Φ gives a central projection Φ( Z A ( )) where Z A ( ) is the centre of A . ↦ Theorem 1.7 (Principal theorem, reformulated) . A consistent family of projections of a von Neumann algebra arises from a central projection if and only if it is an invariant family of projections. Consequently, the maps z -→ Φ z and Φ -→ Φ( Z A ( )) define a bijective correspondence between central projections and invariant families of projections. ↦ ## 1.3. Motivation. In this subsection, we motivate the characterization of total ideals as invariant partial ideals. Previous work by the first author [3], inspired by ideas from the Isham-Butterfield approach to the Kochen-Specker theorem [7] and the phenomenon of contextuality in quantum mechanics [6], introduced a contravariantly functorial association of geometric objects G ( A ) to C ∗ -algebras A which was meant to serve as a generalization of the notion of spectrum from the commutative to the noncommutative case. It was shown that any functor F : KHaus -→ C (from the category of compact Hausdorff spaces to a suitable target category C ) can be applied directly to the geometric objects given by G to yield a functor ˜ : F uC ∗ -→ C (from the category of unital C ∗ -algebras to C ). The functor ˜ F is an extension of F in the sense that, when restricted to the full subcategory of unital commutative C ∗ -algebras, ˜ F | uComC ∗ is naturally isomorphic to F composed with the Gel'fand spectrum functor. The results of this method of extending topological concepts to C ∗ -algebraic ones can be compared with the constructions achieved via the canonical translation process of noncommutative geometry. Agreement of the two methods could justify regarding G ( A ) as the geometric manifestation of the noncommutative space underlying A . It was demonstrated how the operator K 0 functor could be given a novel formulation in terms of ˜ , K the extension of topological K -theory [4]. This raised the question of which other topological concepts can be automatically extended to their noncommutative generalization by being applied directly to G . It was conjectured that taking the extension of the notion of open subset of a space (or equivalently, closed subset) would lead to the notion of closed, two-sided (i.e. total) ideal of a C ∗ -algebra. To formalize this idea, let T : KHaus -→ CMSLat be the functor which assigns to a compact Hausdorff topological space its complete lattice of closed sets (with C 1 ≤ C 2 if and only if C 1 ⊃ C 2 ) and assigns to a continuous function the complete meet-semilattice homomorphism mapping a closed set to its image under the continuous function, let ˜ be its extension, and let T I be defined as in the remark following Definition 1.1. Conjecture 1.8. The functors ˜ T and I are naturally isomorphic. Formally, G ( A ) is a contravariant functor with, as its codomain, the category of compact Hausdorff spaces. Consider the category S ( A ) whose objects are commutative subC ∗ -algebras of A and whose morphisms are those which arise by restricting the domain and codomain of an inner automorphism of A to such subalgebras. Then G ( A ) is the inclusion functor into KHaus of the image of S ( A ) under the Gel'fand spectrum functor. The topological spaces in the diagram G ( A ) should be thought of as being those which arise as quotient spaces of the hypothetical noncommutative space underlying A . The morphisms of the diagram serve to track how these spaces fit together inside the noncommutative space underlying A . The extension of a covariant functor F : KHaus -→ C is defined as ˜ F = limFG ←-. Intuitively, one should think of the extension process as decomposing a noncommutative space into its quotient spaces, retaining those which are genuine topological spaces, applying the topological functor to each one, and pasting together the result. Conjecture 1.8 essentially follows from Conjecture 1.4. To see this, note that the limit lattice ˜ ( T A ) = lim ←-T G ( A ) is a cone over the diagram T G ( A ). /d15 /d15 ↦ ↦ /d8 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1172v1-figure-8427a0a7-3e43-47a2-9762-1d829226d72a.jpg) /d8 /d22 /d22 /d125 /d125 /d34 /d34 /d47 /d47 That is, the elements of ˜ ( T A ) are precisely choices of elements from each I ( V ) subject to the condition of the remark following Definition 1.3. Proving Conjecture 1.8 would establish a strong relationship between the topologies of the geometric object G ( A ) and Prim( A ), the primitive ideal space of A : we would be able to recover the lattice of the hull-kernel topology on Prim( A ), as the limit of the topological lattices of the object G ( A ). (The primitive ideal space of A is the set of ideals which are kernels of irreducible ∗ -representations of A ; in the commutative case, the primitive ideal space coincides with the Gel'fand spectrum. It is a C ∗ -algebraic variant of the ring-theoretic spectrum functor Spec which assigns to a commutative ring a space whose hull-kernel topology provides the basis for sheaf-theoretic ring theory.) Establishing this conjecture would allow considering G to be an enrichment of Prim. This would open up the possibility of investigating the use of sheaf-theoretic methods in noncommutative geometry. ## 2. Technical Preliminaries - 2.1. Little lemmata. In proving our main result, we shall make use of some simple properties of consistent families of projections which we record here as lemmata for clarity. Lemma 2.1. Let A be a von Neumann algebra, and Φ be a consistent family of projections. Suppose V ⊂ V ′ are commutative sub-vonNeumann-algebras of A . Then: - (1) Φ( V ) ≤ Φ( V ′ ) ; - (2) if p ∈ V and p ≤ Φ( V ′ ) , then p ≤ Φ( V ) ; - (3) in particular, if Φ( V ′ ) ∈ V , then Φ( V ′ ) = Φ( V ) . Proof. Properties (1) and (2) are simply a rephrasing of the requirement in the definition of consistent family of projections that Φ( V ) is the largest projection in V smaller than Φ( V ′ ). Property (3) is a particular case of (2). /square Given a commutative subset X of A , denote by V X the commutative sub-von-Neumann-algebra of A generated by X and the centre Z A ( ), i.e. V X = ( X ∪ Z A ( )) ′′ . Given a finite commutative set of projections { p , . . . , p 1 n } , we write V p ,...,p 1 n for V { p 1 ,...,p n } . Lemma 2.2. Let A be a von Neumann algebra; Φ a consistent family of projections; M a commutative set of projections in A such that Φ( V m ) ≥ m for all m ∈ M ; and s the supremum of the projections in M . Then Φ( V s ) ≥ s . Proof. For all m ∈ M , since V m ⊆ V M , we have $$\Phi ( V _ { M } ) \geq \Phi ( V _ { m } ) \geq m$$ by Lemma 2.1-(1) and the assumption that Φ( V m ) ≥ m . Hence, Φ( V M ) is at least the supremum of the projections in M , i.e. Φ( V M ) ≥ s . Now, from V s ⊂ V M and s ∈ V s , we conclude by Lemma 2.1-(2) that s ≤ Φ( V s ). /square ## 2.2. Partial orthogonality. Definition 2.3. Two projections p and q are partially orthogonal whenever there exists a central projection z such that zp and zq are orthogonal while z ⊥ p and z ⊥ q are equal. Note that partially orthogonal projections necessarily commute and that if p 1 and p 2 are partially orthogonal, so is the pair zp 1 and zp 2 for any central projection z . A set of projections is partially orthogonal whenever any pair of projections in the set is partially orthogonal. We will require in the sequel the following simple lemma: Lemma 2.4. Let p 1 and p 2 be projections and z be a central projection such that zp 1 and zp 2 are partially orthogonal and z ⊥ p 1 and z ⊥ p 2 are partially orthogonal. Then p 1 and p 2 are partially orthogonal. Proof. As zp 1 and zp 2 are partially orthogonal, there exists a central projections y such that $$\ y z p _ { 1 } = y z p _ { 2 } \ \text{ and } \ y ^ { \perp } z p _ { 1 } \perp y ^ { \perp } z p _ { 2 } \.$$ Similarly, as z ⊥ p 1 and z ⊥ p 2 are partially orthogonal, there exists a central projections x such that $$\ x z ^ { \perp } p _ { 1 } = x z ^ { \perp } p _ { 2 } \text{ \ and \ } x ^ { \perp } z ^ { \perp } p _ { 1 } \perp x ^ { \perp } z ^ { \perp } p _ { 2 } \text{.}$$ Summing both statements above, we conclude that $$( y z + x z ^ { \perp } ) p _ { 1 } = ( y z + x z ^ { \perp } ) p _ { 2 } \ \text{ and } \ ( y ^ { \perp } z + x ^ { \perp } z ^ { \perp } ) p _ { 1 } \perp ( y ^ { \perp } z + x ^ { \perp } z ^ { \perp } ) p _ { 2 }$$ where yz + xz ⊥ is a central projection and ( yz + xz ⊥ ⊥ ) = y ⊥ z + x ⊥ ⊥ z . So, p 1 and p 2 are partially orthogonal. /square 2.3. Main lemma. When comparing projections, we write ≤ to denote the usual order on projections, /precedesorcurly M for the order up to Murray-von Neumann equivalence, and /precedesequal u for the order up to unitary equivalence. The following lemma is one of the main steps of the proof. The idea is to start with a projection q in a von Neumann algebra and to cover, as much as possible, its central carrier C q ( ) by a commutative subset of the unitary orbit of q . The lemma states that, in order to cover C q ( ) with projections from the unitary orbit of q , it suffices to take a commutative subset, M , and (at most) one other projection, uqu ∗ , which is strictly larger than the remainder C q ( ) -sup M . That is, the remainder from what can be covered by a commutative set is strictly smaller than q up to unitary equivalence. Lemma 2.5. Let q be a projection in a von Neumann algebra A . Then there exists a set M of projections such that: - (1) q ∈ M ; - (2) M is a subset of the unitary orbit of q ; - (3) M is a commutative set; - (4) the supremum s of M satisfies $$s ^ { R } \prec _ { \mathfrak { u } } q$$ $$\ w h e r e \ s ^ { R } = C ( q ) - s.$$ Proof. Let O be the unitary orbit of q . The partially orthogonal subsets of O which contain q form a poset under inclusion. Given a chain in this poset, its union is partially orthogonal: any two projections in the union must appear together somewhere in one subset in the chain and are thus partially orthogonal. Hence, by Zorn's lemma, we can construct a maximal partially orthogonal subset M of the unitary orbit of q such that q ∈ M . Clearly, M satisfies conditions (1)-(3). Denote by s the supremum of the projections in M . Its central carrier C s ( ) is equal to the central carrier C q ( ) of q . This is because C ( -) is constant on unitary orbits and C (sup m M ∈ m ) = sup m M ∈ C m ( ). We now need to show that s R ≺ u q . By the comparison lemma for projections in a von Neumann algebra, there is a central projection z such that $$\ z s ^ { R } \asymp _ { \mathbb { M } } \ z q \ \text{ and } \ z ^ { \perp } s ^ { R } \prec _ { \mathbb { M } } \ z ^ { \perp } q \.$$ We can assume without loss of generality that z ≤ C q ( ) since $$C ( q ) ^ { \perp } q = C ( q ) ^ { \perp } s ^ { R } = 0 \.$$ Moreover, as s and s R are orthogonal, there is a unitary which witnesses these order relationships. That is, there is a unitary u such that $$\ z s ^ { R } \geq z ( u q u ^ { * } ) \ \text{ and } \ z ^ { \perp } s ^ { R } < z ^ { \perp } ( u q u ^ { * } ) \.$$ We will show that z vanishes and thus conclude that s R &lt; uqu ∗ as required. Define v to be the unitary zu + z ⊥ 1 which acts as u within the range of z and as the identity on range of z ⊥ . We first establish that vqv ∗ and m are partially orthogonal for every m ∈ M . Let m ∈ M . As M was defined to be a partially orthogonal set of projections and q ∈ M , we know that q and m are partially orthogonal, and thus that z ⊥ q and z ⊥ m are partially orthogonal. However, as z ⊥ v = z ⊥ , we may express this as: z ⊥ ( vqv ∗ ) and z ⊥ m are partially orthogonal. Now, on the range of z , we have that $$z ( v q v ^ { * } ) = z ( u q u ^ { * } ) \leq z s ^ { R } \text{ \ and \ } z m \leq z s$$ implying that z vqv ( ∗ ) and zm are orthogonal, hence partially orthogonal. Putting both parts together, we have that z ⊥ vqv ∗ and z ⊥ m are partially orthogonal and that z vqv ( ∗ ) and zm are partially orthogonal. We may thus apply Lemma 2.4 and conclude that vqv ∗ and m are partially orthogonal as desired. Having established that vqv ∗ is partially orthogonal to all the projections in M , it follows by maximality of M that vqv ∗ ∈ M . Hence, $$\ z v q v ^ { * } \leq v q v ^ { * } \leq \sup M = s \.$$ Yet, by construction, $$\ z v q { v ^ { * } } = z u q { u ^ { * } } \leq z s ^ { R } \leq s ^ { R }$$ and so zvqv ∗ must be orthogonal to s . Being both contained within and orthogonal to s , zvqv ∗ must vanish. Therefore, the unitarily equivalent projection zq must also vanish. Now, z ≤ C q ( ) and zq = 0 forces z to be zero, for otherwise C q ( ) -z would be both a central projection covering q and also strictly smaller than the central carrier of q . We may finally conclude that s R &lt; uqu ∗ . /square ## 3. Main theorem Theorem 1.7, and thus our principal result, Theorem 1.5, will follow as an immediate corollary of: Theorem 3.1. In a von Neumann algebra A , any invariant family of projections Φ arises from a central projection, i.e. Φ is equal to Φ z for the central projection z = Φ( Z A ( )) . Proof. Let Φ be an invariant family of projections. Suppose W is a commutative sub-von-Neumann-algebra of A which contains the centre Z A ( ), and let q be the projection Φ( W ). We claim that q is, in fact, equal to its own central carrier C q ( ) and thus central. As q ≤ C q ( ) is true by definition, we must show that q ≥ C q ( ). We start by applying Lemma 2.5 to q . Let M denote the resulting commuting set of projections in the unitary orbit of q , s denote the supremum of the projections in M , and s R denote C q ( ) -s = C s ( ) -s . From the lemma, we know that s R ≺ u q , i.e. there exists a unitary u such that s R &lt; uqu ∗ . First note that, since V q ⊂ W and q ∈ V q , by Lemma 2.1-(3), we have that Φ( V q ) = q . Then, by unitary invariance of the family of projections, for every m ∈ M we have that Φ( V m ) = m . Hence, we can apply Lemma 2.2 to conclude that Φ( V s ) ≥ s . We also conclude, again by unitary invariance of Φ, that Φ( V uqu ∗ ) = uqu ∗ ≥ s R . Now, note that uqu ∗ and s R commute and that V s = V s R . So there is a commutative sub-von-Neumann-algebra V s,uqu ∗ ⊇ V , V s uqu ∗ . By Lemma 2.1-(1) and the two conclusions of the preceding paragraph, we then have $$\Phi ( V _ { s, u q u ^ { * } } ) \geq \Phi ( V _ { s } ) \vee \Phi ( V _ { u q u ^ { * } } ) \geq s \vee s ^ { R } = C ( q ) \.$$ But, since C q ( ) ∈ V uqu ∗ by virtue of being contained in the centre, we can apply Lemma 2.1-(2) to find that Φ( V uqu ∗ ) ≥ C q ( ). Finally, by unitary invariance, $$q = \Phi ( V _ { q } ) \geq u ^ { * } C ( q ) u = C ( q )$$ concluding the proof that q is central. We have shown that the projection Φ( W ) is central for every commutative sub-von-Neumann-algebra W containing the centre Z A ( ). By Lemma 2.1-(3), this means that Φ( W ) is equal to Φ( Z A ( )), the projection chosen at the centre, for all such W . In turn, this determines the image of Φ on all commutative sub-von-Neumann-algebras W ′ as Φ( W ′ ) = sup { p is a projection in W ′ | p ≤ Φ( V W ′ ∪Z A ( ) ) = Φ( Z A ( )) } , and we find that Φ must be equal to Φ Φ( Z A ( )) . /square ## 4. Conclusions Akemann and Pedersen [8] proposed to replace the translation process of noncommutative geometry by working directly with Giles and Kummer's [5] and Akemann's [1] noncommutative generalizations of the basic topological notions of open and closed sets: open and closed projections in an enveloping von Neumann algebra. In contrast, the framework proposed by the first author does not employ algebraic generalizations of basic topological notions, but rather, works with objects which generalize the notion of topological space and come readily equipped with an alternative to the translation process. Conjecture 1.4 is essentially the guess that the translation of the notion of closed set by this method matches up with the algebraic concept one would expect: closed, two-sided ideal. It would also recover the hull-kernel topology on the primitive ideal space of a C ∗ -algebra A as a limit of the topologies; topologies of quotient spaces of the noncommutative space underlying A . We have established the von Neumman algebraic analogue of Conjecture 1.4. As a consequence, the original C ∗ -algebraic conjecture holds for all finite-dimensional C ∗ -algebras. The question of whether it holds for all C ∗ -algebras remains open. We conclude by indicating some ideas for future work that may lead to progress on this question. One possible tack would be to enlarge the class of C ∗ -algebras for which the conjecture holds. An immediate suggestion would be the class of AF -algebras which arise as limits of finite-dimensional C ∗ -algebras; it would follow immediately from a proof that ˜ T preserves limits. Another possibility would be to prove the whole conjecture directly by using the proof of the von Neumann algebraic version as a guide. Indeed, one might still be able to reduce the question to one about projections by working in the enveloping von Neumann algebra A ∗∗ of a C ∗ -algebra A . In this setting, the total ideals of a C ∗ -algebra A correspond to certain total ideals of the enveloping algebra A ∗∗ [2]: those which correspond to open central projections. In essence, one would have to prove the appropriate analogue of Theorem 1.7 in order to find a correspondence between central open projections of A ∗∗ and certain families of open projections which obey a restricted form of unitary invariance. ## Acknowledgements It is our pleasure to thank Samson Abramsky, Bob Coecke, Andreas D¨ oring, George Elliott, Chris Heunen, Kobi Kremnitzer, Manny Reyes, and participants of the Operator Algebras Seminar at the Fields Institute for their guidance, encouragement, and mathematical insights. NDS gratefully acknowledges support from Merton College, the Oxford University Computing Laboratory, the Clarendon Fund, and the Natural Sciences and Engineering Research Council of Canada. RSB gratefully acknowledges support from the Marie Curie Initial Training Network MALOA - From MAthematical LOgic to Applications, PITN-GA-2009-238381, and from FCT - Funda¸ c˜o para a a Ciˆ encia e Tecnologia (the Portuguese Foundation for Science and Technology), PhD grant SFRH/BD/94945/2013. ## References - 1. Charles A. Akemann, Left ideal structure of C ∗ -algebras , Journal of Functional Analysis 6 (1970), no. 2, 305-317. - 2. Erik M. Alfsen and Frederic W. Shultz, State spaces of operator algebras: Basic theory, orientations, and C ∗ -products , Mathematics: theory &amp; applications, Birkh¨user, 2001. a - 3. Nadish de Silva, DPhil thesis, University of Oxford, 2014, Forthcoming. - 4. , From topology to noncommutative geometry: K -theory , 2014, Forthcoming. - 5. Robin Giles and Hans Kummer, A non-commutative generalization of topology , Indiana University Mathematics Journal 21 (1972), no. 1, 91-102. - 6. John Hamilton, Chris J. Isham, and Jeremy Butterfield, A topos perspective on the Kochen-Specker theorem: III. Von Neumann algebras as the base category , International Journal of Theoretical Physics 39 (2000), no. 6, 1413-1436, Eprint available at arXiv:quant-ph/9911020. - 7. Simon Kochen and Ernst P. Specker, The problem of hidden variables in quantum mechanics , Journal of Mathematics and Mechanics 17 (1967), no. 1, 59-87. - 8. Gert K. Pedersen, SAW ∗ -algebras and corona C ∗ -algebras, contributions to noncommutative topology , Journal of Operator Theory 15 (1986), 15-32. - 9. Manuel L. Reyes, Obstructing extensions of the functor Spec to noncommutative rings , Israel Journal of Mathematics 192 (2012), no. 2, 667-698, Eprint available at arXiv:1101.2239 [math.RA]. Quantum Group, Department of Computer Science, University of Oxford, Wolfson Building, Parks Road, Oxford OX1 3QD, UK. E-mail address : [email protected] E-mail address : [email protected]
null
[ "Nadish de Silva", "Rui Soares Barbosa" ]
2014-08-06T03:14:41+00:00
2014-08-06T03:14:41+00:00
[ "math.OA", "math.FA", "46L85 (Primary), 46L10, 46M40 (Secondary)" ]
Partial and Total Ideals of Von Neumann Algebras
A notion of partial ideal for an operator algebra is a weakening the notion of ideal where the defining algebraic conditions are enforced only in the commutative subalgebras. We show that, in a von Neumann algebra, the ultraweakly closed two-sided ideals, which we call total ideals, correspond to the unitarily invariant partial ideals. The result also admits an equivalent formulation in terms of central projections. We place this result in the context of an investigation into notions of spectrum of noncommutative $C^*$-algebras.
1408.1173v1
## A Review Paper on Oculus Rift-A Virtual Reality Headset Parth Rajesh Desai 1 , Pooja Nikhil Desai 1 , Komal Deepak Ajmera 1 , Khushbu Mehta , 1 1. U.G. student, Electronics and Telecommunication Department, DJSCOE, Vile-Parle (W), Mumbai - 400056,India. Abstract: Oculus rift: Virtual reality (VR) is a burgeoning field that has the inherent potential of manipulating peoples mind with a superlative 3D experience. Oculus rift is one such application that assists in achieving the same. With the fleeting enhancements in VR it now seems very feasible to provide the user with experiences that were earlier thought to be merely a dream or a nightmare. Keywords: gyroscope, virtual reality, panorama, visual immersion, sense of fusion. ## I. INTRODUCTION Virtual Reality is a computer simulated environment that gives the user the experience of being present in that environment. It is a 3-Dimensional computer generated environment. VR provides the effects of a concrete existence without actually having a concrete existence. VR not only provides immersions of vision but also of sound and tactile feedback. Basically, VR is a theory based on the human desire to escape the real world boundaries and this is done by embracing the cyber world. It is a new form of human machine interaction that is beyond keyboard, mouse or even touch screen for that matter. It is a means by which one can interact with full visual immersion. Immersion is based on two main components: depth of information and breadth of information. Depth of information includes resolution, quality and effectiveness of audio visuals etc. Breadth of information is the number of sensory present at a time. VR is implemented by using interactive devices like gloves headsets or helmets. Oculus Rift is a VR Ski-Masked Shaped Goggle device that works along with computers or mobiles. Other VR headsets have problem of motion sickness to the user post its usage. But here is a new technology which claims to have solved this problem of motion sickness and dizziness post the usage. This new technology is oculus rift. Fig. 1 The oculus rift headset ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-40155753-bfc8-440b-a84d-51cf9a3d88e3.jpg) ## II. DESCRIPTION The Oculus Rift is a light weight headset that allows a user to step into the game and look in any direction. The Oculus Rift is currently present in developer kits versions. Two developer kit versions have been released namely Developer Kit version 1 (DK1) and developer kit version 2 (DK2). The DK2 is a more advanced version of the oculus rift as compared to DK1. ## A. Oculus Rift DK1 Specs -  Oculus Rift Price: $300 (INR 18000) -  Display Resolution: 640 x 800 (1.25:1) [1280 x 800 split between each eye] -  Display Technology: LED -  Display Size (diagonal): 4.08 ″ -  Field of View (degrees): H: 90° -  Pixels Per Inch (PPI): 251 -  Total Pixels (per eye): 512,000 -  Weight (headset): 380g -  Stereoscopic 3D capable: Yes -  Audio: Bring Your Own Audio -  Inputs: DVI, USB (power) -  Head Tracking: Yes -  Positional Tracking: No - B. Oculus Rift DK2 Specs -  Oculus Rift DK2 Price: $350 (INR 21000) -  Display Resolution: 960 x 1080 (1.13:1) [1920x 1080 split between each eye] -  Display Technology: OLED -  Field of View (degrees): H: 90° -  Pixels Per Inch (PPI): 441 -  Total Pixels (per eye): 1,036,800 -  Weight (headset): 440g -  Stereoscopic 3D capable: Yes -  Audio: Bring Your Own Audio -  Inputs: HDMI 1.4b, USB, IR Camera Sync Jack -  Head Tracking: Yes -  Positional Tracking: Yes -  Refresh Rate: 75 Hz, 72 Hz, 60 Hz -  Persistence: 2 ms, 3 ms, full -  Viewing Optics: 100º Field of View (nominal) -  Cable: 10' (detachable) -  Input: HDMI 1.4b -  USB device: USB 2.0 -  USB host: USB 2.0 (requires DC Power Adapter) -  Camera USB: USB 2.0 -  Sensors: Gyroscope ,Accelerometer, Magnetometer -  Update Rate: 1000 Hz -  Sensor: Near Infrared CMOS Sensor -  Update Rate: 60 Hz Fig. 2 Difference of quality of display between DK1 and DK2, Left side image is of DK1 and right side image of DK2. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-5f0a2cc3-561a-4593-9105-d1721c468540.jpg) ## III. INSIDE VIEW The inside view of the oculus rift goggles is as shown in the figure. Fig. 3 The internal structure of oculus rift headset ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-5614c9d8-99fe-4ae5-8e4f-f14ec1b7eeed.jpg) The oculus rift kits come with three sets of lenses-A, B and C. lens pair A is to be used by people who have excellent long sighted eyesight as the rift is focused at infinity. The pairs B and C are to be used by people having problems with near sightedness, though cannot be used by all, especially people with major vision complications. Also precise care should be taken while changing the lenses. A tiny dust particle if gets settled on the lens creates a dead pixel view in the VR. To worsen it further one can expect dust particles in both the lenses at different locations. Furthermore glasses can also be worn along with the oculus rift goggles, provided that the glasses are not huge. ## IV. WORKING ## A. Head tracking The oculus rift head tracking lets the user look around the virtual world just in the manner they would in the real world. The Oculus Rift head tracker constantly analyzes the player's head movement and uses it to control the view, instead of relying on a mouse or analogue stick to turn your view in the game. This makes for a completely natural way to observe the world, which is a major factor in immersion. The headset consists of a Oculus Tracker v2 board consisting of chips controlling the head tracking device. The chips are STM microelectronics 32F103C8 ARM CortexM3 Micro-controller with 72MHz CPU. Invensense .MPU6000 six-axis motion tracking controller .Honeywell HMC5983 three axis digital compasses used in conjunction with the accelerometer to correct for gyroscope drift. The Oculus VR sensor, support sampling rates up to 1000 Hz, which minimizes the time between the player's head movement and the game engine receiving the sensor data to roughly 2 milliseconds. The increased sampling rates also reduce orientation error by providing a denser dataset to integrate over, making the player's real-world movements more in-sync with the game. The Oculus VR sensor includes a gyroscope, accelerometer, and magnetometer. When the data from these devices is fused, helps in determining the orientation of the player's head in the real world and synchronize the player's virtual perspective in real-time. The Rift's orientation is reported as a set of rotations in a righthanded coordinate system as given in figure(3) the gyroscope, which reports the rate of rotation (angular velocity) around X, Y and Z axes in radians/second, provides the most valuable data for head orientation tracking. By constantly accumulating angular velocity samples over time, the Oculus SDK(system development kit) can determine the direction of the Rift relative to where it began. Although the gyroscope provides orientation relative to the starting point, it creates two difficulties it cannot provide the original orientation of the headset and it's subject to a small amount of drift over time (imagine reorienting your head back to perfect center but in-game you're now looking slightly left or right).These issues affect the VR game with a fixed reference point (a game with a cockpit, where the players head's orientation does not affect the position of car/plane being piloted) .The accelerometer is leveraged to estimate the 'down' vector and the magnetometer measures the strength and direction of the magnetic field. Combined, these allow for correction of drift in all three axes. Fig.4 Head tracking sensor ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-e56341e6-7f84-4acb-8bd5-d34e00889ce8.jpg) Fig5 An illustration of the three axes. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-f8058d39-6ce8-4437-b09a-b302540dd492.jpg) ## B. Position tracking Oculus rift DK2 involves position tracking which allows the user to lean in for a closer look at an in-game objectg or panel, or peek around a wall by moving their head and upper body, and seeing their physical actions translated into the virtual world. The added positional tracking helps with reducing the dizziness, the brain doesn't get confused by the missing degree of motion. ## C. Control box Oculus Rift comes with its own power supply of standard USB voltage of 5 V DC a. The power supply circuit is within the control box. The control box is the interface between headset and the computer. The basic control is done by control box. There are five control buttons on it indicating contrast, brightness and power. It has various ports such as Digital Video Interactive (DVI), High Definition Multi-media Interface (HDMI), mini-USB and DC power connection ports . ## V. INTERFACING The Oculus SDK currently supports MacOS, Windows (Vista, 7, 8) and Linux. There are no speci fic computer hardware requirements for the Oculus SDK; however, a computer with a modern graphics card is recommended. A good benchmark is to try running Unreal Engine 3 and Unity at 60 frames per second(FPS)with vertical sync and stereo 3D enabled. The following components are provided as a guideline: -  MacOS: 10.6+ -  Linux: Ubuntu 12.04 LTS -  2.0+ GHz processor -  2 GB system RAM -  Direct3D10 or OpenGL 3 compatible video card -  Windows: Vista, 7, or 8 Although many lower end and mobile video cards, such as the Intel HD 4000, have the graphics capabilities to run minimal Rift demos, their rendering throughout may be inadequate for full-scene 60 FPS. The System Development Kit also supports gaming controllers which include Xbox 360 wired controllers for Xbox and the Sony play station. DUAL shock3 controller for MacOS. To use the headset the control box is connected with the computer via the USB port using HDMI or DVI. The Oculus SDK is publicly available and it is an Open source ## VI. SCREEN DOOR EFFECT AND GHOSTING Screen door effect can be described as a black grid over the original image. This occurs because of empty spaces in between the pixels. The display has a characteristic known as the Pixel Fill Factor that is responsible for this effect. On any LCD display every pixel is made of three sub pixels, namely red green and blue. Human perception of different colors on the display is a result of the varying intensities of these sub pixels. The distance between these sub pixels is called as the pixel pitch which ultimately decides the pixel fill factor. Higher the pixel pitch higher is the pixel fill factor. The oculus rift has a fair pixel fill factor however since it is worn close to the eyes it gives rise to the screen door effect. Ghosting is the appearance of faded trails behind any moving object. In oculus rift, the slow pixel switching time causes ghosting i.e. the pixels take a fair amount of time to change intensities as compared to the motion of the head. Faster the movements greater the ghosting, since the pixel switching lags behind. Thus ghosting persists until the head stops moving. This causes blurring of the scene. Ghosting can be avoided with a higher switching rate for the pixels. ## LOW PIXEL FILL FACTOR Fig.6 Pixel fill factor ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-bbf5a92b-258c-4544-a206-917f4a4e0378.jpg) Fig.7 A block diagram illustrating the basic working of the oculus rift ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1173v1-figure-ac1ee49e-4d15-4c3d-84a3-85d472b25790.jpg) ## VII. RESULTS Oculus Rift has an wide field of view, high resolution display. The Rift provides a truly immersive experience that allows you to step inside your favorite game. ## VIII. CONCLUSION Since few years computer animation seems to be more based on dynamic simulation methods and physics. With the advent of VR, it feels like we are in 3-D computer generated environment. In future, real time complex animation system will be developed taking advantage using VR-devices like oculus rift and various simulation techniques. Oculus Rift is a virtual reality (VR) headset designed specifically for video games that will change the way you think about gaming forever. ## IX. FUTURE SCOPE Virtual reality is being used by pilots in the training process to help them overcome the fear of heights. With the help of VR is it also possible for scientists to comprehend the chemical reactions in a much better way and help them gather the minute details of any reaction. Architects can make an optimum use of VR by visualizing a building that is yet not into existence and to experience a virtual tour of the structure. Virtual reality also offers great deal of amusement with the museums and galleries. It is possible to view and experience a walk around in a museum with the help of oculus rift headsets and VR. For this purpose the museums should be recreated online which can then be accessed by the user for a real life experience. These could also be used by surgeons while in a surgery. Virtual reality glasses such as the Oculus Rift will probably become cost efficient in the years to follow. Thus having them at the disposal of human benefit. ## X. ACKNOWLEDGEMENT We would like to thank the respected principal Dr. Hari Vasudevan of D. J. Sanghvi College of Engineering and Head of Department of Electronics and Telecommunication, Dr. Amit Deshmukh for giving us facilities and providing a propitious environment for working in the college. We would also like to thank S.V .K.M. for encouraging us in such co-curricular activities. ## REFRENCES - [1] Oculus VR. EVE: Valkyrie, Open Source Hardware, and the Best Practices Guide. Feb. 5, 2014. (Feb. 11, 2014) http://www.oculusvr.com/blog/eve-valkyrie-open-source-hardwareand-the-best-practices-guide/ - [2] Oculus VR. Oculus Rift . (Feb. 9, 2014) http://www.oculusvr.com/rift/ - [3] Oculus VR. Oculus Rift Development Kit Version 1.1. (Feb. 9, 2014) http://static.oculusvr.com/sdk- - downloads/documents/Oculus\_Rift\_Development\_Kit\_Instruction\_Man ual.pdf - [4] Antonov, Michael, Nate Mitchell, Andrew Reisse, Lee Cooper, Steve LaValle, and Max Katsev. Oculus VR - SDK Overview - SDK Version 0.2.5. Oculus VR. Oct. 9, 2013. (Feb. 9, 2014) http://static.oculusvr.com/sdk- downloads/documents/Oculus\_SDK\_Overview.pdf
null
[ "Parth Rajesh Desai", "Pooja Nikhil Desai", "Komal Deepak Ajmera", "Khushbu Mehta" ]
2014-08-06T03:16:21+00:00
2014-08-06T03:16:21+00:00
[ "cs.HC" ]
A Review Paper on Oculus Rift-A Virtual Reality Headset
Oculus rift: Virtual reality (VR) is a burgeoning field that has the inherent potential of manipulating peoples mind with a superlative 3D experience. Oculus rift is one such application that assists in achieving the same. With the fleeting enhancements in VR it now seems very feasible to provide the user with experiences that were earlier thought to be merely a dream or a nightmare.
1408.1174v1
## Endowing the Standard Model with a new r -symmetry Ngee-Pong Chang 1 Physics Department City College of CUNY, New York, NY 10031 2 and Institute of Advanced Studies 3 Nanyang Technological Univesity, Singapore ## Abstract In the Standard Model, there is the single Higgs field, φ , which gives rise to constituent quark and lepton masses. The Yukawa coupling is a highly complex set of 3 × 3 matrices, resulting in many textures of quark and lepton masses. In this talk, we propose to transfer the complexity of the Yukawa coupling matrices to a family of Higgs fields, so that the Yukawa coupling itself becomes a simple interaction. In the context of an Enriched Standard Model, we introduce a new r -symmetry in the extended SU (2) L × U (1) Y × U (1) R model and show how a particularly simple scenario results in a near degeneracy of masses in the 126 -GeV region, with a hierarchy of heavier masses suggested by the quark and lepton texture mass matrices. Keywords: Enriched Standard Model, r-symmetry, Yukawa coupling, family of Higgs fields PACS: 12.15.-y, 12.60.Fr, 14.80.Bn, 14.80.Ec, 14.80.Fd 1 email: [email protected] 2 Permanent Address 3 Visiting Professor ## 1 Introduction In the Standard Model, the quarks acquire mass through the vacuum expectation value of a single SU (2) Higgs doublet, φ α . The complexity of the texture of quark mass matrices[3] is attributed to the Yukawa coupling matrix 4 $$\mathcal { L } _ { Y } \ = \ - Y _ { i j } ^ { u } \ \overline { u } _ { R } ^ { i } \ q _ { L } ^ { j \alpha } \ \epsilon _ { \alpha \beta } \ \phi ^ { \beta } + h. c. \\ \quad \ \ - Y _ { i j } ^ { d } \ \overline { d } _ { R } ^ { i } \ q _ { L } ^ { j \alpha } \ \phi _ { \alpha } + h. c. \\ \cdot \. \ \, \ \, \ e \ \, \ \. \quad.$$ where we have introduced for later convenience the convention $$\phi _ { \alpha } \ \equiv \ ( \phi ^ { \alpha } ) ^ { \dagger }$$ Much of the Standard Model phenomenology is dedicated to the determination of the magnitudes and phases of the CKM matrix that can be derived from the u , d Yukawa coupling matrices. In particular, there are many unexplained hierarchies in the quark masses, and the Wolfenstein hierarchies in the associated CKM matrices. In this talk, we propose to transfer the complexity of the Yukawa coupling to the SU (3) family of Higgs fields, so that the Yukawa interaction is now $$S U ( 3 ) \, \text{family of Higgs fields, so that the Yukawa interaction is now} \\ \mathcal { L } _ { Y } \ = \ - h _ { u } \ \frac { - i } { u _ { R } } ^ { j \alpha } \ \, q _ { L } ^ { j \alpha } \ \epsilon _ { \alpha \beta } \, \phi _ { i j } ^ { \beta } + h. c. \ \Big \} \\ - h _ { d } \ \frac { - i } { d _ { R } } ^ { j \alpha } \ \, q _ { L } ^ { j \alpha } \ \, \widehat { \phi } _ { i j \alpha } + h. c. \ \Big \} \\ \text{at in so doing we have also added the distinction between the Higgs} \\ \widehat { \phi } _ { i j \alpha }, \, \text{coupled to the down-quark family versus the original } \phi _ { i j } ^ { \alpha } \ \, \text{as}$$ Note that in so doing we have also added the distinction between the Higgs fields, ̂ φ ij α , coupled to the down-quark family versus the original φ α ij associated with the up-quark family. From a certain point of view, it looks counter-intuitive to double down on the number of Higgs fields when phenomenologically there was such a great difficulty in even finding one Higgs. The pay-off comes when you realize there is a greater symmetry that results from so doing. 4 Here i, j range over the values 1 , 2 3. We have also suppressed, throughout this paper, , the SU (3) c indices on the quarks. The Higgs fields are as usual taken to be color neutral. ## 2 r-Symmetry To make the model more attractive, we make the simple requirement $$\ h _ { u } \ = \ h _ { d }$$ so that This requirement may look odd, as everyone knows that the down quark in each family is much lighter than the up quark. But, for this Enriched Standard Model, with the two families of Higgs fields, φ α , and ̂ φ α , the difference in the physical up and down quark masses may be attributed to the difference in vacuum expectation values of the corresponding Higgs fields. $$\mathcal { L } _ { Y } \ = \ - h _ { q } \left ( \overline { u } _ { R } ^ { i } \ q _ { L } ^ { j \alpha } \, \phi _ { i j } ^ { \beta } \, \epsilon _ { \alpha \beta } + \overline { d } _ { R } ^ { i } \ q _ { L } ^ { j \alpha } \, \widehat { \phi } _ { i j \alpha } \ \right ) \ + \ h. c. \quad \ ( 5 ) \\ \text{This requirement may look odd, as everyone knows that the down quark in} \\ \text{each family is much lighter than the up quark. But, for this Enriched Stan-}$$ To implement this requirement we extend the enriched Standard Model to the gauge group SU (2) L × U (1) Y × U (1) R and impose a new r -symmetry on the full Lagrangian. | | Y R | Y ′ | ( I 3 ) L | | Y R | Y ′ | ( I 3 ) L | |-----------------------------|--------|-------|-------------|-------|--------|--------|-------------| | φ + ij φ o ij φ + ij φ o ij | +1 / 2 | | +1 / 2 | u j L | | +1 / 6 | +1 / 2 | | | +1 / 2 | | - 1 / 2 | d j L | | +1 / 6 | - 1 / 2 | | | +1 / 2 | | +1 / 2 | u Ri | +1 / 2 | +1 / 6 | | | | +1 / 2 | | 1 / 2 | d Ri | 1 / 2 | +1 / 6 | | ̂ ̂ The covariant derivatives for the quark &amp; Higgs fields now read as 5 - - $$\Phi _ { \mu } \, q _ { L } ^ { j \alpha } \$$ $$\mathcal { V } _ { \mu } \, \gamma _ { R i } \$$ $$\begin{array} {$$ $$\begin{array} {$$ 5 Here a, b = 1 2 refer , to the flavor of the right-handed quark families q a R i , while α = 1 2 refer as usual to the flavor of the left-handed , q j L quark families, and i, j = 1 2 3 , , refer to the families. The full Lagrangian is invariant under the r -symmetry and for the gauge fields $$\begin{array} {$$ $$\begin{array} { c c c c } \text{fields} \\ B _ { R \, \mu } & \rightarrow & - B _ { R \, \mu } \\ \vec { W } _ { \mu } & \rightarrow & + \vec { W } _ { \mu } \ \rightarrow & ( 1 1 ) \\ B _ { \mu } ^ { ^ { \prime } } & \rightarrow & + B _ { \mu } ^ { ^ { \prime } } \ \end{array} \rightarrow \\ \text{the Standard Model parallels the $SU(2)_{L} \times SU(2)_{R} \times U(1)_{Y}$} \\ \text{enjanovic} [ 1 ]. \text{ Instead of the full set of $SU(2)_{R}$ gauge bosons.}$$ This extension of the Standard Model parallels the SU (2) L × SU (2) R × U (1) Y of Mohapatra &amp; Senjanovic[1]. Instead of the full set of SU (2) R gauge bosons, however, we have only the neutral B R gauge boson. To have the correct neutrino phenomenology, we introduce a set of very heavy Higgs fields, ∆ R,ij ab . ## 3 Include Leptons To include leptons, we introduce the compact notation for the Higgs fields using the convention that $$\begin{matrix} \text{pons, we introduce the compact notation for the images in two} \\ \\ \phi _ { a, i j } ^ { \beta } & = & \left ( \begin{array} { c c } \widehat { \phi } _ { ( o ) } & \phi _ { i j } ^ { ( + ) } \\ - \widehat { \phi } _ { ( - ) } i j & \phi _ { i j } ^ { ( o ) } \end{array} \right ) _ { a } ^ { \beta } \\ \text{nvention that} \\ \end{matrix} \right ) _ { a } ^ { \beta }$$ $$\begin{array} { c c c } \text{ion that} \\ \phi _ { \alpha } ^ { i j } & \equiv & \left ( \phi _ { i j } ^ { \alpha } \right ) ^ { \dagger } \\ \widehat { \phi } ^ { \alpha i j } & \equiv & \left ( \widehat { \phi } _ { \alpha i j } \right ) ^ { \dagger } \end{array} \right \} & \quad ( 1 3 ) \\ \text{to the Dirac mass terms for the leptons, we introduce the} \\ \text{arms for the leptons. The complete fermion Yukawa La-}$$ Here in addition to the Dirac mass terms for the leptons, we introduce the Majorana mass terms for the leptons. The complete fermion Yukawa Lagrangian now reads $$\text{ngian now reads} \\ \mathcal { L } _ { Y } \ = \ & - h _ { q } \ \overline { q } _ { R a } \, ^ { i } \ q _ { L } ^ { j \alpha } \, \epsilon _ { \alpha \beta } \, \phi _ { b i j } ^ { \beta } \, \epsilon ^ { a b } \, + \, h. c. \\ & - h _ { \ell } \ \overline { \ell } _ { R a } \, ^ { i } \, \ell _ { L } ^ { j \alpha } \, \epsilon _ { \alpha \beta } \, \phi _ { b i j } ^ { \beta } \, \epsilon ^ { a b } \, + \, h. c. \\ & + \frac { 1 } { 2 } \, \widetilde { \ell } _ { R i } ^ { a } \, \mathcal { C } \, \ell _ { R j } ^ { b } \, \Delta _ { a b } ^ { R, i j } \, + \, h. c.$$ Under r -symmetry, the fermion fields transform as ( ( iσ 2 ) a b = /epsilon1 ab ) while the Higgs fields transform as $$\text{ry, the fermion fields transform as } & ( \, ( i \sigma _ { 2 } ) _ { b } ^ { a } \, = \, \epsilon _ { a b } \, ) \\ & q _ { R i } ^ { a } \, \rightarrow \, \left ( i \sigma _ { 2 } \right ) _ { b } ^ { a } \, q _ { R i } ^ { b } \\ & q _ { L } ^ { j \alpha } \, \rightarrow \, q _ { L } ^ { j \alpha } \\ & \ell _ { R i } ^ { a } \, \rightarrow \, \left ( i \sigma _ { 2 } \right ) _ { b } ^ { a } \, \ell _ { R i } ^ { b } \\ & \ell _ { L } ^ { j \alpha } \, \rightarrow \, \ell _ { L } ^ { j \alpha } \\ & \text{fields transform as } \\ & \mathcal { A } ^ { \beta } \quad \rightharpoonup \, \left ( \, - i \sigma _ { \mu } \, \right ) ^ { c } \, \mathcal { A } ^ { \beta } \quad \right )$$ $$\begin{array} {$$ or, specifically for the new ∆ R,ij ab fields under r -symmetry $$\lambda \, \infty \, \infty = \, _ { a b }$$ The covariant derivatives of the Higgs fields now read in totality $$\begin{array} { l l l } \text{The covariant derivatives of the Higgs fields$$ Following Mohapatra &amp; Senjanovic[1], we implement the symmetry breaking pattern such that the vacuum expectation values of the different Higgs fields $$\text{and use your experience} \, \text{$\text{$\text{$$$ possess the hierarchy $$\begin{array} { c c c c c c } & \ n w & \bigcup &$$ where we have used the simplified notation $$\begin{array} {$$ $$v _ { R } \, > > \, v \, > > \, \widehat {$$ ## 4 Gauge Bosons Acquire Mass From the covariant derivatives in eq.(18), we arrive at the physical gauge bosons ( υ 2 t ≡ υ 2 + υ 2 ) with the masses given by $$m _ { W } ^ { 2 } \ = \ \frac { 1 } { 2 }$$ $$\begin{array} { l l l l } \text{From the covariant derivatives in eq.}$$ $$m _ { Z } ^ { 2 } \ = \ \frac { \ell } { \cos ^$$ $$& \begin{array} { c c c } \begin{array} { c } \begin{$$ $$\begin{array} {$$ where or $$\frac { 1 } { g _ { s } ^ { \prime 2 } } \ = \ \$$ $$g ^ { \prime } _ { \, s } \ = \ \frac { g _ { _$$ From eq.(26) we see that the g ′ s is actually the U (1) Y coupling of the Standard Model, and eq.(29) gives its relationship with the couplings of the extended SU (2) L × U (1) Y × U (1) R model. These relationships are a manifestation of the decoupling theorem of GeorgiWeinberg[2]. In eq.(23) we see how in the limit of υ /υ t R → 0, where B Y µ is the U (1) Y gauge field of the usual SU (2) L × U (1) Y group. $$\mu _ { V } \, \stackrel { - } { - } \, \cdots$$ ## 5 A Simple Higgs Potential As noted already by Mohapatra and Senjanovic[1], neutrino phenomenology requires that the Higgs fields ∆ ij Rab be associated with a mass scale that is much higher than the Higgs φ β aij . For our purposes, the Georgi-Weinberg decoupling theorem[2] enables us to focus on the low energy phenomenology associated with the φ β aij . Rather than work with a most general for the Higgs potential, We turn to a particularly simple form for the Higgs potential. We consider the potential $$V \ = \ V _ { \phi } + V _ { \Delta }$$ where V φ involves the lighter φ α ij and ̂ φ αk/lscript fields, while V ∆ involves the heavy ∆ ij Rab fields. For the general non-degenerate case, we introduce the three coupling constants, λ , λ , λ 1 2 3 in the maximally symmetric potential $$\text{coupling constants, } \Lambda _ { 1 }, \Lambda _ { 2 }, \Lambda _ { 3 } \emph { \emph {int the maximum type number of the } } \text{$\phi$} _ { \alpha$} _ { \alpha, i j } \phi _ { \beta, k \ell } ^ { \alpha } \Big ) \Big ( \epsilon ^ { \alpha ^ { \prime } \beta ^ { \prime } } \phi _ { \alpha ^ { \prime } } ^ { \alpha, i j } \phi _ { \beta ^ { \prime } } ^ { \beta, k \ell } \Big ) \\ + \frac { \lambda _ { 2 } } { 2 } \Big ( \phi _ { \alpha, i j } ^ { \alpha } \phi _ { \alpha } ^ { \beta, k \ell } \Big ) \Big ( \phi _ { \beta, k \ell } ^ { \beta } \phi _ { \beta } ^ { \alpha, i j } \Big ) - \frac { \lambda _ { 3 } } { 4 } \Big ( \phi _ { \alpha, i j } ^ { \alpha } \phi _ { \alpha } ^ { \alpha, i j } \Big ) ^ { 2 } \quad ( 3 2 ) \\ \text{The symmetry is broken through the vacuum expectation values of the } \phi _ { \alpha, i j } ^ { \beta }$$ The symmetry is broken through the vacuum expectation values of the φ β a, ij fields, as given in eq.(22) above. The Higgs potential V φ around the new vacuum takes the form $$\begin{array} { l l l } \text{e Higgs potential} \, V _ { \phi } & \, = & \, + \frac { \lambda _ { 1 } } { 2 } \left ( \epsilon _ { \alpha \beta } \left [ \, \phi ^ { \, \alpha } _ { \, a, i j } \, \phi ^ { \, \beta } _ { \, b, k \ell } - \, v ^ { \, \alpha } _ { \, a, i j } \, v ^ { \, \beta } _ { \, b, k \ell } \right ] \right ) \times \\ & & \, \left ( \epsilon ^ { \alpha ^ { \prime } \beta ^ { \prime } } \left [ \, \phi ^ { \, \alpha, i j } _ { \, \alpha ^ { \prime } } \, \phi ^ { \, \beta, k \ell } _ { \, \beta ^ { \prime } } - \, v ^ { \, \alpha, i j } _ { \, \alpha } \, v ^ { \, \beta, k \ell } \right ] \right ) \\ & & \, + \frac { \lambda _ { 2 } } { 2 } \left ( \left [ \phi ^ { \, \alpha } _ { \, a, i j } \, \phi ^ { \, \beta, k \ell } _ { \, \alpha } - \, v ^ { \, \alpha } _ { \, a, i j } \, v ^ { \, \beta, k \ell } \right ] \right ) \times \\ & & \, \left ( \left [ \phi ^ { \, \beta } _ { \, b, k \ell } \, \phi ^ { \, \alpha, i j } _ { \, \beta } - \, v ^ { \, \beta } _ { \, b, k \ell } \, v ^ { \, \alpha, i j } _ { \, \beta } \right ] \right ) \\ & & \, - \frac { \lambda _ { 3 } } { 4 } \left ( \phi ^ { \, \alpha } _ { \, a, i j } \, \phi ^ { \, \alpha, i j } _ { \, \alpha } - \, v ^ { 2 } - \widehat { v } ^ { 2 } \right ) ^ { 2 } \\ & & \, \\ & & \, 7 \end{array}$$ Likewise, the Higgs potential involving the heavy fields takes the form $$\text{Lewise, the Higgs potential involving the heavy fields takes the form} \\ V _ { \Delta } \ = \ & \ + \lambda _ { 4 } \ \left ( \Delta _ { R a b } ^ { i j } \Delta _ { i j } ^ { R a b } \ - \ v _ { R } ^ { 2 } \right ) ^ { 2 } \\ & + \lambda _ { 5 } \ \left ( \Delta _ { R a b } ^ { i j } \Delta _ { R c d } ^ { k \ell } \epsilon ^ { a c } \epsilon ^ { b d } \right ) \left ( \Delta _ { i j } ^ { R a ^ { \prime } \beta } \Delta _ { k \ell } ^ { R c ^ { \prime } d ^ { \prime } } \epsilon _ { a ^ { \prime } c ^ { \prime } } \epsilon _ { b ^ { \prime } d ^ { \prime } } \right ) \\ & + \lambda _ { 6 } \ v _ { R } ^ { 2 } \left [ \Delta _ { R a b } ^ { i j } \left ( \sigma _ { 1 } \right ) _ { a ^ { \prime } } ^ { a } \Delta _ { i j } ^ { R a ^ { \prime } \beta ^ { \prime } } \left ( \sigma _ { 1 } \right ) _ { b ^ { \prime } } ^ { b } \quad \right \} \quad \text{(34)} \\ & - \Delta _ { R a b } ^ { i j } \left ( i \sigma _ { 2 } \right ) _ { a ^ { \prime } } ^ { a } \Delta _ { i j } ^ { R a ^ { \prime } b ^ { \prime } } \left ( i \sigma _ { 2 } \right ) _ { b ^ { \prime } } ^ { b } \right ] \\ \text{By construction, this Higgs potential is stable about the broken vacuum with} \\ v _ { i j } \text{ and } \widehat { v } _ { k \ell }.$$ ## 6 Leading Hierarchy By construction, this Higgs potential is stable about the broken vacuum with υ ij and ̂ υ k/lscript . The Higgs potential in eq.(33) gives rise to a rich mass spectrum. It involves the full complexity of the texture of the vacuum expectation values, and poses a daunting task for the timid explorer. Fortunately, the observed hierarchy in the quark masses, with m &gt;&gt; m &gt;&gt; m &gt;&gt; m t b c s &gt;&gt; m u , enables us to explore the spectrum in the leading hierarchy 6 , where we simply set υ 33 = υ, υ 33 = υ , and let all the other vacuum expectation values be zero. ̂ ̂ We express the resulting spectrum in terms of the hermitian fields, h and z , defined by $$\phi _ { 3 3 } ^ { o } \ = \ \frac { h _ { 3 } - i \ z _ { 3 } } { \sqrt { 2 } } \quad \ \quad \ \ ( 3 5 )$$ and for ( ij ) = (33) /negationslash $$\widehat { \phi } ^ { o 3 3 } \ = \ \frac { \begin{array} { c } \nu \, \bar { a } \\ \widehat { h } _ { \, 3 } - i \, \widehat { z } _ { \, 3 } \end{array} } { \sqrt { 2 } }$$ $$\phi _ { i j } ^ { o } \ = \ \frac { h _ { i j } - i \ z _ { i j } } { \sqrt { 2 } } \quad \ \ \ \$$ $$\widehat { \phi } ^ { o \, i j } \ = \ \frac { \widehat { h } _ { \, i j } - i \, \widehat { z } _ { \, i j } } { \sqrt { 2 } } \quad & ( 3 8 ) \\ \overline { \text{ie, this hierarchy in the vacuum expectation values is manifest only} } \text{agonal basis. As the Higgs notential is manifestlv invariant in the}$$ 6 On a technical note, this hierarchy in the vacuum expectation values is manifest only in the fermion mass diagonal basis. As the Higgs potential is manifestly invariant in the family indices i, j , we will carry through the subsequent discussion of the Higgs mass hierarchy in this basis. ## 7 Goldstone Bosons The total Higgs potential, eq.(31), leaves as massless the usual Goldstone bosons of the SU (2) L × U (1) Y × U (1) R gauge theory In the 't Hooft gauge, they acquire mass through the gauge-fixing terms for the massive gauge bosons, W ± µ , Z µ and Z Rµ , so that $$\text{tal Higgs potential, eq.(31), leaves as massless the usual Goldstone} \text{ of the } S U ( 2 ) _ { L } \times U ( 1 ) _ { Y } \times U ( 1 ) _ { R } \, \text{ gauge theory} \\ h _ { A } ^ { + } \ \equiv \ \frac { v \, \phi _ { 3 3 } ^ { ( + ) } + \widehat { v } \, \widehat { \phi } ^ { ( + ) } 3 3 } { \sqrt { v ^ { 2 } + \widehat { v } ^ { 2 } } } } \\ z _ { A } \ \equiv \ \frac { i } { \sqrt { 2 } } \left ( \frac { v \, \phi _ { 3 3 } ^ { \circ } + \widehat { v } \, \widehat { \phi } ^ { \circ } 3 3 } { \sqrt { v ^ { 2 } + \widehat { v } ^ { 2 } } } \ - \ h. c. \right ) } { \sqrt { v ^ { 2 } } } \\ z _ { R } \ \equiv \ \frac { i } { \sqrt { 2 } } \left ( \Delta _ { 3 3 } ^ { R 1 1 } \, - \ h. c. \right ) } \\ \text{'t Hooft gauge, they acquire mass through the gauge-fixing terms for} \\ \text{assive gauge bosons, } W _ { \mu } ^ { \pm }, Z _ { \mu } \text{ and } Z _ { R \mu }, \text{ so that} \\ \alpha ^ { 2 } \quad \, \int \quad. \quad \, \cos ^ { 2 } \, \Delta _ { \varepsilon } \quad \, \, \,$$ $$\Pi \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \rho \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \nu \, \ r \, \rho \, \nu \, \nu \, \nu \, \nu \, \$$ $$\text{Corsstone} & \text{con} \text{suses} \text{$$ with the normalization $$\tilde { \nu } _ { A } & \quad \cdot \cdot$$ where $$\begin{array} { c c c } \i a u z a v { 0 m }$$ and we have the masses $$\begin{array} {$$ $$\cos \theta _ { R } \ = \ \frac { g _ { R } } {$$ ## 8 Leading Hierarchy Mass Spectrum The scale υ R is super heavy compared with the lighter Higgs scale υ, υ ̂ . In what follows, we focus on the physical mass spectrum that arise in the Higgs potential, V φ , in eq.(33) . | M 2 | Higgs | |-------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | ( λ 1 + λ 2 - λ 3 ) υ 2 t λ 2 υ 2 t λ 1 υ 2 + λ 2 υ 2 λ 1 υ 2 + λ 2 υ 2 | h A = ( υ h 3 + ̂ υ ̂ h 3 ) /υ t    h B = ( ̂ υ h 3 - υ ̂ h 3 ) /υ t z B = ( ̂ υ z 3 - υ ̂ z 3 ) /υ t φ + B = ( ̂ υ φ + 33 - υ ̂ φ +33 ) /υ t h ij , z ij , φ + ij for ij = 33 h ij , z ij , φ + ij for ij = 33 | ̂ ̂ /negationslash /negationslash ## 9 Toy Model ̂ ̂ ̂ While a full analysis of the phenomenology of an Enriched Standard Model should allow for the possibility of a range of values for the coupling constants λ , λ , λ 1 2 3 , we will consider in this talk the rather intriguing possibility that the three coupling constants are equal. $$\lambda _ { 1 } \ = \ \lambda _ { 2 } \ = \ \lambda _ {$$ With this choice of a common coupling constant, the resulting spectrum of the Higgs family of physical states are all degenerate in the leading hierarchy ! In a full calculation of the mass spectrum, the texture of the υ ij and ̂ υ ij matrices will lead to predictable splittings of the degeneracy. ## 10 Phenomenological Implications There has been a lot of excitement in the world of particle physics ever since the announcement of the discovery of Higgs boson on July 4, 2012. Now that we contemplate an Enriched Standard Model, a natural question that arises would be which of the family of Higgs is the one reported at 125 9 . ± 0 4 . GeV ? The answer becomes clear when we take into account the production and decay channels involved. /negationslash Among the family of Higgs, h A plays a special role. It behaves like the single Higgs field of the Standard Model, with the same trilinear coupling to the gauge bosons as the standard Higgs. It is produced via associative production with W or Vector Boson fusion. Its production cross-section is identical to that of the Standard Model. For at high energies, the leading production processes predominantly involve top quark loops. Therefore, the production of the family Higgs, h ij , z ij , φ + ij , ̂ φ + ij , with ( ij ) = (33), are suppressed. In contrast, the orthogonal Higgs bosons, h B and z B , do not have trilinear couplings to the gauge bosons. They are produced through coupling to the top and bottom quarks, see eq.(46) below. While their mass is degenerate with the h A boson, they have different decay widths into bb ¯ channel. ## 11 Higgs couplings to fermions For completeness, we list here the couplings of the neutral Higgs mesons to the fermions $$& \text{the fermions} \\ & \mathcal { L } _ { Y } \$$ where z A are the Goldstone bosons in the 't Hooft gauge with mass M Z . Note that here h A and h B are scalar fields, while z B is a pseudoscalar field. ## 12 Parameters We focus only on the j = 3 family, and use as input the observed values From the observed quark and charged vector boson masses $$\text{ly on the } j = 3 \, \text{family, and use as input the$$ we find the parameters $$\begin{array} { r c l } \text{neters} \\ \upsilon & =$$ $$\begin{array} {$$ with the Higgs masses set at 125 9 . ± 0 4 . GeV . Based on these parameters, we arrive at the zeroth-order decay widths $$\begin{array} { r c l } \text{ parameters, we arrive at the zeroth-order decay widths} \\ \Gamma _ { h _ { A } \to b \bar { b } } & = & 0. 0 0 4 \, G e V \\ \Gamma _ { h _ { B } \to b \bar { b } } & = & 7. 3 8 9 \, G e V \\ \Gamma _ { z _ { B } \to b \bar { b } } & = & 7. 4 2 2 \, G e V \end{array} \rightarrow \quad ( 5 0 ) \\ \text{ widths are in the leading hierarchy approximation, and do not} \\ \text{genezy lifting effects arising from the texture of the quark}$$ Note that these widths are in the leading hierarchy approximation, and do not include the degeneracy lifting effects arising from the texture of the quark matrices. But they do hint at a rich structure in the decay width into bb ¯ mode. ## 13 Conclusion The discovery of Higgs at LHC is truly a tribute to the perseverance and dedication of decades of experimental effort at confirming the Standard Model. Having found this 125 9 . ± 0 40 . GeV peak, it is tempting to immediately identify it with the lone Higgs field, φ , in the Standard Model (SM). Out of curiosity, we can ask if there are degenerate masses hidden in the peak, and, if so, how many. Rather than as an idle question, what I have tried to describe in this talk, is a framework where interesting scenarios do arise. I have proposed endowing the SM with a family of Higgs fields φ ij , ̂ φ ij , so that the Yukawa coupling is simplified. To bring some order to the resulting Higgs potential, we have also introduced a new r -symmetry. The resulting hierarchy of masses among the Higgs family is remarkable. This enriched Standard Model gives rise to a scenario where the 125 9 . ± 0 40 . GeV peak[4] may be resolved into a triplet of two scalar and one pseudoscalar Higgs mesons. In a leading hierarchy approximation, all of the family Higgs are degenerate. When the texture of the quark masses are taken into account, the degeneracy is lifted into a rich spectrum. In this scenario where we have set in the leading hierarchy approximation, in the diagonal quark mass basis , υ 22 , υ 11 = 0, and ̂ υ 22 , ̂ υ 11 = 0, we have a rich spectrum of Higgs once the texture of quark masses are taken into account. In this scenario, there are also a family of very high masses. There is much work that remains to be done to explore the consequences of this proposal. I presented the preliminary version of this at the conference in honor of Freeman Dyson on the occasion of his 90th birthday in the spirit of exploration and discovery[5]. ## 14 Acknowledgments I wish to thank IAS and Nanyang Technological University for the warm hospitality over the consecutive summers where this work was done. I also wish to thank and acknowledge Zhi-Zhong Xing, Markos Maniatis, and Manmohan Gupta for the many stimulating discussions at IAS on quark texture matrices, and Higgs phenomenology. ## References - [1] R. Mohapatra, G. Senjanovic, Phys Rev D23, 165 (1981). - [2] H. Georgi, S. Weinberg, Phys Rev D17, 275 (1978). - [3] H. Fritzsch, Z.Z. Xing, Phys. Lett B, 555, 63, 2003; H. Fritzsch, Z.Z. Xing, Prog Part &amp; Nucl Phys, 45, no. 1, 2000; M. Gupta, G. Ahuja, IJMPA, 27, 1230033 (2012). - [4] For the ATLAS and CMS data, see their talks at EPS HEP 2013 conference, http://eps-hep2013.eu/program.html. - [5] N.P. Chang, What if the Higgs has Brothers? Proceedings of the Conference in Honour of the 90th Birthday of Freeman Dyson, World Scientific, 2014.
10.1142/S0217751X14440084
[ "Ngee-Pong Chang" ]
2014-08-06T03:33:03+00:00
2014-08-06T03:33:03+00:00
[ "hep-ph" ]
Endowing the Standard Model with new r-symmetry
In the Standard Model, there is the single Higgs field, $\phi$, which gives rise to constituent quark and lepton masses. The Yukawa coupling is a highly complex set of $3 \times 3$ matrices, resulting in many textures of quark and lepton masses. In this talk, we propose to transfer the complexity of the Yukawa coupling matrices to a family of Higgs fields, so that the Yukawa coupling itself becomes a simple interaction. In the context of an Enriched Standard Model, we introduce a new $r$-symmetry in the extended $SU(2)_L \times U(1)_Y \times U(1)_R$ model and show how a particularly simple scenario results in a near degeneracy of masses in the $126-GeV$ region, with a hierarchy of heavier masses suggested by the quark and lepton texture mass matrices.
1408.1175v2
## K -theory and Homotopies of 2-cocycles on Group Bundles Elizabeth Gillaspy October 28, 2014 ## Abstract This paper continues the author's program to investigate the question of when a homotopy of 2-cocycles Ω = { ω t } t ∈ [0 1] , on a locally compact Hausdorff groupoid G induces an isomorphism of the K -theory groups of the twisted groupoid C ∗ -algebras: $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 1 } ) ).$$ Building on our earlier work in [5, 4], we show that if π : G → M is a locally trivial bundle of amenable groups over a locally compact Hausdorff space M , a homotopy Ω = { ω t } t ∈ [0 1] , of 2-cocycles on G gives rise to an isomorphism $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 1 } ) ).$$ Keywords: Twisted groupoid C ∗ -algebra, K -theory, group bundle, 2cocycle. MSC (2010): 46L80, 46L55 ## 1 Introduction Let π : V → M be a real or complex vector bundle over a manifold M . A bilinear 2-form σ : V (2) → R induces a homotopy of 2-cocycles { ω t } t ∈ [0 1] , on V : If π v ( ) = π w ( ), define $$\omega _ { t } ( v, w ) \coloneqq e ^ { 2 \pi i t \sigma ( v, w ) }.$$ Plymen proved in Theorem 1 of [11] that when V is an even-dimensional real vector bundle and σ is a symplectic 2-form on V , the twisted C ∗ -algebra of the vector bundle C ∗ ( V, ω 1 ) is a continuous-trace C ∗ -algebra over M , with trivial Dixmier-Douady class, and hence is Morita equivalent to C 0 ( M ). Furthermore, applying a fiberwise Fourier transform to V , one sees immediately that $$C ^ { * } ( V, \omega _ { 0 } ) = C ^ { * } ( V ) \cong C _ { 0 } ( V ^ { * } ),$$ where V ∗ is the dual bundle to V . Since V is even-dimensional, the Thom isomorphism in K -theory tells us that $$K _ { * } ( C _ { 0 } ( V ^ { * } ) ) \cong K _ { * } ( C _ { 0 } ( M ) ) ;$$ consequently, Plymen's result implies that the homotopy of 2-cocycles { ω t } t ∈ [0 1] , associated to a symplectic form σ induces an isomorphism $$K _ { * } ( C ^ { * } ( V, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( V, \omega _ { 1 } ) ).$$ In this article, we present a substantial generalization of this result: Corollary 3.4. Let { ω t } t ∈ [0 1] , be a homotopy of 2-cocycles on a second countable, locally trivial, locally compact Hausdorff group bundle π : G → M , such that the fiber group G = π -1 ( m ) is amenable. Then the homotopy induces an isomorphism $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 1 } ) )$$ of the K -theory groups of the twisted C ∗ -algebras. While the motivation (and main applications) of this result arise from considering vector bundles over manifolds, the proofs are no simpler in this special case. Consequently, we present the results here in their full generality. Group bundles are examples of groupoids; the results of this article thus continue the author's research program, begun in [5, 4], to investigate the question of when a homotopy { ω t } t ∈ [0 1] , of 2-cocycles on a groupoid G induces an isomorphism $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 1 } ) )$$ of the K -theory groups of the twisted groupoid C ∗ -algebras. This question was inspired by the realization that Bott periodicity and the noncommutative tori can both be viewed as examples of a K -theoretic isomorphism arising from a homotopy of 2-cocycles. We hope that our investigation of the question of when a homotopy { ω t } t ∈ [0 1] , of 2-cocycles on a groupoid G induces the K -theoretic isomorphism (1) will increase our understanding of the structure of (twisted) groupoid C ∗ -algebras, as well as shedding light on questions in C ∗ -algebraic classification and string theory. The study of the full and reduced C ∗ -algebras C ∗ ( G ) , C ∗ r ( G ) associated to a locally compact groupoid G was initiated by Jean Renault in [13], and has since been pursued actively by many researchers. Although Renault also defined the twisted groupoid C ∗ -algebras C ∗ ( G , ω ) , C ∗ r ( G , ω ) for a 2-cocycle ω ∈ Z 2 ( G , T ) in [13], these objects have received relatively little attention until recently. However, it has now become clear that twisted groupoid C ∗ -algebras can help answer many questions about the structure of untwisted groupoid C ∗ -algebras (cf. [10, 9, 3, 7, 2]), as well as classifying those C ∗ -algebras which admit diagonal subalgebras (also known as Cartan subalgebras) - cf. [8]. In another direction, [15] shows how the K -theory of twisted groupoid C ∗ -algebras classifies D -brane charges in many flavors of string theory. ## 1.1 Outline In addition to its philosophical links with [5, 4], an attentive reader will notice similarities between the proofs presented in this article and several main results from [5, 4]. To be precise, we begin this article by following the outline of the proof of Theorem 3.5 from [4] to calculate the C 0 ( M )-algebra structure associated to a locally trivial bundle of groups π : G → M . Then we use the results of this calculation, together with Theorem 5.1 from [5] and a MayerVietoris argument, to establish our main result in Theorem 3.3; Corollary 3.4 follows immediately. Acknowledgments: The author would like to thank Nigel Higson for helpful suggestions. I am also indebted to my advisor, Erik van Erp, for his support during the writing of this article and throughout my graduate career. ## 2 C 0 ( M ) -algebra structure In this section, we describe the natural C 0 ( M )-algebra structure on C ∗ ( G , ω ), where π : G → M is a locally trivial bundle of groups over a locally compact Hausdorff space M , and ω is a 2-cocycle on G . In order to state our result more precisely, we begin with some definitions. We note that the following definition is non-standard in its requirement of local triviality; however, this hypothesis is necessary for the proofs of our later results, and is satisfied by our motivating example of a vector bundle. Definition 2.1. An (amenable) group bundle is a locally compact Hausdorff space G together with a continuous, open surjection π : G → M onto a locally compact Hausdorff space M such that G m := π -1 ( m ) is isomorphic to a fixed (amenable) group G for every m ∈ M , and such that G is locally trivial: for every point m ∈ M, there exists an open neighborhood U of m such that π -1 ( U ) is homeomorphic to U × G . Given a group bundle π : G → M , write $$\mathcal { G } ^ { ( 2 ) } = \{ ( x, y ) \in \mathcal { G } \times \mathcal { G } \, \colon \pi ( x ) = \pi ( y ) \}.$$ Note that G (2) ⊆ G × G is a closed subspace; we equip it with the subspace topology. ↦ ↦ Thanks to the isomorphism φ m : G m → G , if ( x, y ) ∈ G (2) , then there is a unique element z in G m such that φ m ( z ) = φ m ( x φ ) m ( y ). We will usually write xy for this element. Similarly, for each x ∈ G m there is a unique element x -1 ∈ G m such that xx -1 = x -1 x = φ -1 m ( e ). Moreover, the local triviality of G implies, in particular, that φ m : G m → G is a homeomorphism for all m ∈ M . As a consequence, the map ( x, y ) → xy is continuous as a map G (2) →G , and x → x -1 is a continuous map from G to itself. Let C c ( G ) denote the collection of those continuous complex-valued functions f on the total space G of the group bundle such that supp f is compact, and let λ be a fixed Haar measure on the fiber group G ∼ G = m of the group bundle. The local triviality of G then implies the following proposition: Proposition 2.2. Let f ∈ C c ( G ) . Then the function ↦ $$m \mapsto \int _ { \mathcal { G } _ { m } } f ( x ) \, d \lambda ( x )$$ lies in C 0 ( M ) . Proof. We begin by observing that since Haar measure is, in particular, a Radon measure, and supp f is compact, we know that L m := λ ( G m ∩ supp f ) is finite for each m ∈ M . Fix m ∈ M , and let U be a neighborhood of m such that G| U ∼ = U × G . Thanks to this isomorphism, we will write f ( n, g ) rather than f ( x ) for x ∈ G| U . Since supp f is compact, π 2 (supp f ∩ ( U × G )) ⊆ G is also compact; consequently, for any /epsilon1 &gt; 0, we can find a smaller neighborhood U /epsilon1 ⊆ U of m such that if n ∈ U /epsilon1 , | f ( n, g ) -f ( m,g ) | &lt; /epsilon1/L m for all g ∈ G . It follows that if n ∈ U /epsilon1 , $$& \left | \int _ { \mathcal { G } _ { n } } f ( n, g ) d \lambda ( g ) - \int _ { \mathcal { G } _ { m } } f ( m, g ) d \lambda ( g ) \right | \leq \int _ { G } | f ( n, g ) - f ( m, g ) | \, d \lambda ( g ) < \epsilon. \\ & \text{In other words}, & & r$$ ∣ In other words, ↦ $$m \mapsto \int _ { \mathcal { G } _ { m } } f ( x ) d \lambda ( x ) \in C _ { 0 } ( M )$$ as claimed. Definition 2.3. A 2-cocycle on G is a continuous circle-valued function ω : G (2) → T such that whenever ( x, y ) , ( y, z ) ∈ G (2) , the cocycle condition holds: $$\omega ( x y, z ) \omega ( x, y ) = \omega ( x, y z ) \omega ( y, z ).$$ Example 2.4 . 1. For any group bundle G , the function ω : G (2) → T given by ω x, y ( ) = 1 ∀ ( x, y ) ∈ G (2) is a 2-cocycle on G , called the trivial 2-cocycle. - 2. As discussed in the Introduction, if π : V → M is a vector bundle and σ : V (2) → R is a 2-form on V , then ω v, w ( ) := e 2 πiσ v,w ( ) defines a 2cocycle on V . A 2-cocycle on G allows us to define a twisted convolution multiplication on G , which in turn will allow us to build the associated twisted C ∗ -algebra C ∗ ( G , ω ). This is a particular case of the construction of a twisted groupoid C ∗ -algebra, as described in Chapter II of [13]. Given a 2-cocycle ω on G and f, g ∈ C c ( G ), we define the twisted convolution product of f and g by $$f * g ( x ) \coloneqq \int _ { \mathcal { G } _ { \pi ( x ) } } f ( x y ) g ( y ^ { - 1 } ) \omega ( x y, y ^ { - 1 } ) d \lambda ( y ).$$ We also define an involution on C c ( G ) that incorporates the 2-cocycle: $$f ^ { * } ( x ) \coloneqq \overline { f ( x ^ { - 1 } ) \omega ( x, x ^ { - 1 } ) }.$$ Renault checks in [13] Proposition II.1.1 that the multiplication is well defined (that is, that f ∗ g ∈ C c ( G ) as claimed) and associative, and that ( f ∗ ) ∗ = f so that the involution is involutive. (The proof of associativity relies on the cocycle condition (2).) Thus, we have a ∗ -algebra structure on C c ( G ). To indicate the importance of the 2-cocycle in this structure, we will often write C c ( G , ω ) for this ∗ -algebra. To avoid confusion between the use of ∗ to indicate the multiplication and the involution, we will usually denote the multiplication in C c ( G , ω ) by juxtaposition: fg := f ∗ g . The twisted C ∗ -algebra C ∗ ( G , ω ) is the completion of C c ( G , ω ) with respect to the full or universal C ∗ -norm (3). In order to give the precise definition of the universal norm, we require some preliminary definitions. Definition 2.5. Let H be a Hilbert space. We say that a ∗ -homomorphism π : C c ( G , ω ) → B ( H ) is a representation of C c ( G , ω ) if it is nondegenerate in the sense that $$\overline { \text{span} } \{ \pi ( f ) \xi \, \colon f \in C _ { c } ( \mathcal { G }, \omega ), \xi \in \mathcal { H } \} = \mathcal { H }.$$ Definition 2.6. The I -norm on C c ( G ) is given by $$\| f \| _ { I } = \max \left \{ \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | f ( x ) | \, d \lambda ( x ), \, \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | f ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \}.$$ We say that a representation φ of C c ( G ) is I -norm-bounded if ‖ φ f ( ) ‖ ≤ ‖ f ‖ I for any f ∈ C c ( G ). Then, Proposition II.1.11 of [13] combines with the comments following Definition II.1.5 in [13] to tell us that ‖ f ‖ := sup {‖ φ f ( ) ‖ : φ is an I -norm-bounded representation of C c ( G , ω ) } (3) ∗ is a C -norm. Definition 2.7 (cf. [13] Definition II.1.12) . The (universal) twisted C ∗ -algebra of G , denoted C ∗ ( G , ω ), is the completion of C c ( G , ω ) with respect to the norm (3). The goal of this section is Proposition 2.9, in which we prove that, despite this intricate definition of the norm on C ∗ ( G , ω ), this C ∗ -algebra admits a C 0 ( M )-algebra structure which makes it much more tractable. Definition 2.8. Let A be a C ∗ -algebra and M a locally compact Hausdorff space. We say that A is a C 0 ( M ) -algebra if there exists a ∗ -homomorphism $$\Phi \colon C _ { 0 } ( M ) \to Z M ( A ).$$ Given f ∈ C 0 ( M ,a ) ∈ A , we will usually write f · a for Φ( f ) a . A C 0 ( M )-algebra fibers over M in a natural way. If m ∈ M , let $$I _ { m } \coloneqq \overline { C _ { 0 } ( M \langle m \rangle ) \cdot A } ;$$ then I m is an ideal, and the quotient A m := A/I m gives the fiber of A at m . Indeed, Theorem C.26 of [17] tells us that there is a unique topology on the bundle A := ∐ m M ∈ A m such that A = Γ ( 0 A ) is the continuous sections of A that vanish at infinity. In an analogous manner to the construction of A m , for any C 0 ( M )-algebra A and any closed subset F ⊆ M , we have a quotient A F of A : $$A _ { F } \coloneqq A / I _ { F } \text{ where } I _ { F } \coloneqq \overline { C _ { 0 } ( M \mathbb { V } ) \cdot A }.$$ Proposition 2.9 below describes the C 0 ( M )-algebra structure carried by the twisted C ∗ -algebra of a group bundle π : G → M . A similar result is obtained by Goehle for crossed products by a group bundle in Proposition 1.2 and Lemma 1.4 of [6], and the proof of Proposition 2.9 below proceeds along similar lines to Goehle's proof, and also to the proof of Theorem 3.5 from [4]. Proposition 2.9. Let π : G → M be a group bundle and let ω be a 2-cocycle on G . Then C ∗ ( G , ω ) is a C 0 ( M ) -algebra, with C ∗ ( G , ω ) F ∼ = C ∗ ( G| F , ω ) for any closed F ⊆ M . Proof. The action of C 0 ( M ) on C ∗ ( G , ω ) is defined as one might expect: for φ ∈ C 0 ( M , f ) ∈ C c ( G , ω ), define φ · f ∈ C c ( G , ω ) by $$\phi \cdot f ( x ) = \phi ( \pi ( x ) ) f ( x ).$$ It's immediate that the action is linear and multiplicative; because π x ( ) = π y ( ) whenever x, y are in the same fiber of the group bundle, and in particular we have π x ( ) = π x ( -1 ), we also have $$f * ( \phi \cdot g ) = ( \phi \cdot f ) * g = \phi \cdot ( f * g )$$ for any f, g ∈ C c ( G , ω ) and any φ ∈ C 0 ( M ). In other words, C 0 ( M ) acts centrally on C c ( G , ω ). Moreover, a straightforward check shows that ( φ · f ) ∗ = φ ∗ · f ∗ , so the centrality of the action implies that it is also ∗ -preserving. Thus, to see that this action gives rise to a ∗ -homomorphism Φ : C 0 ( M ) → ZM C ( ∗ ( G , ω )), we merely need to check that the action is bounded. That is, we will show that ‖ φ · f ‖ ≤ ‖ φ ‖ ∞ ‖ f ‖ for any f ∈ C c ( G , ω ) and any φ ∈ C 0 ( M ). Fix φ ∈ C 0 ( M ,f ) ∈ C c ( G , ω ). Letting K f = supp f , choose φ f ∈ C 0 ( M ) to be 1 on π K ( f ). Then the function $$\xi ( m ) \coloneqq ( \| \phi \| _ { \infty } ^ { 2 } - | \phi ( m ) | ^ { 2 } ) | \phi _ { f } ( m ) | ^ { 2 }$$ is in C 0 ( M ). Moreover, ξ is positive, and hence has a positive square root, k . The positivity of k , combined with our earlier observations that the action is multiplicative, ∗ -preserving, and central, means that $$( \xi \cdot f ) ^ { * } f = k ^ { 2 } \cdot ( f ^ { * } f ) = ( k \cdot f ) ^ { * } ( k \cdot f ).$$ Therefore, ( ξ · f ) ∗ f ≥ 0 in C ∗ ( G , ω ). Since ξ ∗ = , this inequality tells us that ξ $$0 \leq ( \xi \cdot f ) ^ { * } f = \xi \cdot ( f ^ { * } f ) = ( \| \phi \| _ { \infty } ^ { 2 } | \phi _ { f } | ^ { 2 } ) \cdot ( f ^ { * } f ) - ( | \phi \cdot \phi _ { f } | ^ { 2 } ) \cdot ( f ^ { * } f ).$$ Since positivity preserves norms, it follows that $$\| ( | \phi \cdot \phi _ { f } | ^ { 2 } ) \cdot ( f ^ { * } f ) \| \leq \| ( \| \phi \| _ { \infty } ^ { 2 } | \phi _ { f } | ^ { 2 } ) \cdot ( f ^ { * } f ) \|.$$ Observe that, since φ f = 1 on supp f , the function ‖ φ ‖ 2 ∞ | φ f | 2 acts on f as multiplication by the constant ‖ φ ‖ 2 ∞ . Moreover, $$( | \phi \cdot \phi _ { f } | ^ { 2 } ) \cdot f ^ { * } f = ( ( \phi \cdot \phi _ { f } ) \cdot f ) ^ { * } \left ( ( \phi \cdot \phi _ { f } ) \cdot f \right ) = ( \phi \cdot f ) ^ { * } ( \phi \cdot f )$$ because the action is multiplicative, central, and ∗ -preserving. Thus, Equation (5) becomes $$\| ( \phi \cdot f ) ^ { * } ( \phi \cdot f ) \| \leq \| \phi \| _ { \infty } ^ { 2 } \| f ^ { * } f \|,$$ so by the C ∗ -identity we have $$\| \phi \cdot f \| \leq \| \phi \| _ { \infty } \| f \|$$ as claimed. We have thus shown that the action is bounded, so it extends to a ∗ -homomorphism Φ : C 0 ( M ) → M C ( ∗ ( G , ω )). In fact, ImΦ ⊆ ZM C ( ∗ ( G , ω )) because ImΦ acts centrally on the dense ∗ -subalgebra C c ( G , ω ). Moreover, Φ( φ f ) f = f for any f ∈ C c ( G , ω ), so Φ( C 0 ( M )) · C ∗ ( G , ω ) contains the dense subalgebra C c ( G , ω ). Consequently, Φ( C 0 ( M )) · C ∗ ( G , ω ) = C ∗ ( G , ω ). In other words, Φ makes C ∗ ( G , ω ) into a C 0 ( M )-algebra as claimed. We will use this action of C 0 ( M ) on C ∗ ( G , ω ) throughout the rest of this proof, usually denoting it by φ · f as above rather than by Φ. Checking that C ∗ ( G , ω ) F ∼ = C ∗ ( G| F , ω ) for any closed subset F ⊆ M as claimed will require rather more work. Recall that C ∗ ( G , ω ) F is given by the quotient C ∗ ( G , ω ) /I F , where $$I _ { F } \coloneqq \overline { \text{span} } \{ \phi \cdot f \, \colon \phi \in C _ { 0 } ( M \vee F ), f \in C ^ { * } ( \mathcal { G }, \omega ) \}.$$ Thus, in order to prove the Proposition, we must show that $$C ^ { * } ( \mathcal { G } | _ { F }, \omega ) \cong C ^ { * } ( \mathcal { G }, \omega ) / I _ { F }.$$ We will begin by showing that we can indeed exhibit C ∗ ( G| F , ω ) as a quotient of C ∗ ( G , ω ) whenever F ⊆ M is closed. Fix a closed subset F ⊆ M and let q F : C c ( G , ω ) → C c ( G| F , ω ) be the restriction map. By the definition of the I -norm given in Definition 2.6, q F is I -norm-bounded; since the operations in the ∗ -algebra C c ( G , ω ) respect the way G fibers over M q , F is also a ∗ -homomorphism. Consequently, for any I -norm-bounded representation ψ of C c ( G| F , ω ), the composition ψ ◦ q F is an I -norm-bounded representation of C c ( G , ω ). Thus, for any f ∈ C c ( G , ω ), $$\| q _ { F } ( f ) \| & = \sup \{ \| \psi \circ q _ { F } ( f ) \| \colon \\ & \quad \psi \text{ an } I \text{-norm-bounded representation of } C _ { c } ( \mathcal { G } _ { F }, \omega ) \} \\ & \leq \sup \{ \| \Psi ( f ) \| \colon \Psi \text{ an } I \text{-norm-bounded representation of } C _ { c } ( \mathcal { G }, \omega ) \} \\ & = \| f \|.$$ Hence, q F extends to a ∗ -homomorphism, also denoted q F , from C ∗ ( G , ω ) to C ∗ ( G| F , ω ). Note that any function f ∈ C c ( G| F ) can be extended to f ∈ C c ( G ) by the Tietze Extension Theorem, so that q F ( f ) = f . Since C c ( G| F ) ⊆ C ∗ ( G| F , ω ) is dense, this implies that q F : C ∗ ( G , ω ) → C ∗ ( G| F , ω ) is surjective. In other words, $$C ^ { * } ( \mathcal { G } | _ { F }, \omega ) \cong C ^ { * } ( \mathcal { G }, \omega ) / \ker q _ { F }.$$ Thus, to see that C ∗ ( G| F , ω ) = C ∗ ( G , ω ) F , it suffices to show that ker q F = I F . A standard approximation argument will show that ker q F ⊇ I F : the tricky part is showing that ker q F ⊆ I F . To show that ker q F ⊆ I F , we will show that any representation L of C c ( G , ω ) such that L I ( F ) = 0 must factor through q F , so that we can write L = L ′ ◦ q F for some I -norm-bounded representation L ′ of C C ( G| F , ω ). This will imply that ker q F ⊆ ker L for all such representations L , and consequently that ker q F ⊆ I F as desired. Given an I -norm-bounded representation L : C c ( G , ω ) → B ( H ) such that L I ( F ) = 0, define L ′ : C c ( G| F , ω ) → B ( H ) by $$L ^ { \prime } ( q _ { F } ( f ) ) \coloneqq L ( f ).$$ We would like to show that L ′ is a representation of C c ( G| F , ω ). Note that L ′ preserves the ∗ -algebra structure on C c ( G| F , ω ) because L and q F do so, being ∗ -homomorphisms. Moreover, L ′ is nondegenerate because L is and because q F : C c ( G , ω ) → C c ( G| F , ω ) is surjective. Thus, we only need to check that L ′ is well-defined and bounded. To see that L ′ is well defined, we need to show that L f ( ) = L g ( ) whenever q F ( f ) = q F ( g ). Lemma 2.10. If f, g ∈ C c ( G , ω ) satisfy q F ( f ) = q F ( g ) , then the function $$h = f - g \in C _ { c } ( \mathcal { G }, \omega )$$ lies in I F . Consequently, L f ( ) = L g ( ) and L ′ is well defined on C c ( G| F , ω ) . Proof. Let { f K,U } K,U be an approximate unit for C 0 ( M F , \ ) indexed by pairs ( K,U ) where K ⊆ M is compact and U ⊇ F is open, such that U ∪ K = M f ; K,U is 1 on K U \ and 0 on F ; and 0 ≤ f K,U ( m ) ≤ 1 for all m ∈ M . (We can always construct such functions by using Urysohn's Lemma.) We will show that the I -norm ‖ h -f K,U · h ‖ I → 0, where we take the limit over increasing K and decreasing U . Since the norm in C ∗ ( G , ω ) is dominated by the I -norm, it will follow that $$h = \lim _ { K, U } f _ { K, U } \cdot h$$ in C ∗ ( G , ω ), and consequently h ∈ I F . ↦ We first observe that the function m → λ ( G m ∩ supp h ) is bounded, where λ denotes our chosen Haar measure on the fiber group G m ∼ = G (recall that G m ∼ G = n ∼ = G for all m,n ∈ M ). To see that this function is bounded, let W be an open neighborhood of supp h , and use Urysohn's Lemma to construct k W ∈ C c ( G ) such that k W | supp h = 1 and supp k W ⊆ W . Then for any m ∈ M , $$\int _ { \mathcal { G } _ { m } } k _ { W } ( x ) d \lambda ( x ) \geq \lambda ( \mathcal { G } _ { m } \cap \text{supp} \, h ).$$ Moreover, we know from Proposition 2.2 that ↦ $$m \mapsto \int _ { \mathcal { G } _ { m } } k _ { W } ( x ) d \lambda ( x ) \in C _ { 0 } ( M ),$$ ↦ ↦ ↦ Let /epsilon1 &gt; 0 be given, and let U = π h ( -1 ( B /epsilon1/ 2 /lscript (0))). Then U ⊆ M is open and contains F . Let K = π (supp h ) ⊆ M ; we will show that for any ( K , U ′ ′ ) ≥ ( K,U ) we have ‖ h -f K ,U ′ ′ · h ‖ I &lt; /epsilon1 . because k W ∈ C c ( G ). Since this function is an upper bound for the function m → λ ( G m ∩ supp h ), it follows that m → λ ( G m ∩ supp h ) is bounded on M , as claimed. Let /lscript be the maximum value of the function m → λ ( G m ∩ supp h ). Recall that $$| |$$ $$\| h - f _ { K ^ { \prime }, U ^ { \prime } } \cdot h \| _ { I } = \max \left \{ \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | h ( x ) - f _ { K ^ { \prime }, U ^ { \prime } } ( m ) h ( x ) | \, d \lambda ( x ), \\ \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | h ( x ^ { - 1 } ) - f _ { K ^ { \prime }, U ^ { \prime } } ( m ) h ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \}.$$ If m ∈ K ′ \ U ′ , then f K ,U ′ ′ ( m ) = 1 and the above integrals are zero. If m ∈ U ′ , then since ( K , U ′ ′ ) ≥ ( K,U ) we also have m ∈ U , so $$| h ( x ) | < \epsilon / 2 \ell \, \forall \, x \in \mathcal { G } _ { m }.$$ Moreover, the fact that 0 ≤ f K ,U ′ ′ ( m ) ≤ 1 ∀ m ∈ M implies that for any x ∈ G , $$| h ( x ) - f _ { K ^ { \prime }, U ^ { \prime } } ( \pi ( x ) ) h ( x ) | \leq 2 | h ( x ) |.$$ ## It follows that $$\text{It follows that} \\ \| h - f _ { K ^ { \prime }, U ^ { \prime } } \cdot h \| _ { I } & \leq \max \left \{ \sup _ { m \in U ^ { \prime } } \int _ { G _ { m } } | h ( x ) - f _ { K ^ { \prime }, U ^ { \prime } } ( m ) h ( x ) | \, d \lambda ( x ), \\ & \sup _ { m \in U ^ { \prime } } \int _ { G _ { m } } | h ( x ^ { - 1 } ) - f _ { K ^ { \prime }, U ^ { \prime } } ( m ) h ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \} \\ & \leq \max \left \{ \sup _ { m \in U ^ { \prime } } \int _ { G _ { m } } 2 | h ( x ) | \, d \lambda ( x ), \ \sup _ { m \in U ^ { \prime } } \int _ { G _ { m } } 2 | h ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \} \\ & \leq 2 \sup _ { \substack { m \in U ^ { \prime } } \, x \in \mathcal { G } _ { m } \\ \ m \in U ^ { \prime } \, x \in \mathcal { G } _ { m } } \, | h ( x ) | \lambda ( \mathcal { G } _ { m } \cap \text{supp} \, h ) \\ & < \epsilon. \\ \text{Consequently,} \lim _ { K, U } \| h - f _ { K, U } \cdot h \| _ { I } = 0. \text{ It follows that} \, h \in I _ { F } \text{ as claimed,}$$ Consequently, lim K,U ‖ h -f K,U · h ‖ I = 0. It follows that h ∈ I F as claimed, and so L h ( ) = 0. This proves that L ′ is well defined. ↦ Having seen that L ′ is well defined, we proceed to show that ‖ L f ′ ( ) ‖ ≤ ‖ f ‖ I for any f ∈ C c ( G| F , ω ). First, we note that Proposition 2.2 and the definition of the I -norm imply that the function m → ‖ q { m } ( f ) ‖ I is continuous for each f ∈ C c ( G ). Consequently, if we fix f ∈ C c ( G , ω ) , /epsilon1 &gt; 0, the set $$W _ { \epsilon } = \{ m \in M \, \colon \| q _ { \{ m \} } ( f ) \| _ { I } < \| q _ { F } ( f ) \| _ { I } + \epsilon \}$$ is open; note that F ⊆ W /epsilon1 . Thus, we can choose ψ f,/epsilon1 ∈ C 0 ( M ) such that 0 ≤ ψ f,/epsilon1 ( m ) ≤ 1 ∀ m ∈ M ψ ; f,/epsilon1 = 1 on F ; and ψ f,/epsilon1 = 0 off W /epsilon1 . Since ψ f,/epsilon1 = 1 on F , we have $$L ( f ) = L ^ { \prime } ( q _ { F } ( f ) ) = L ^ { \prime } ( q _ { F } ( \psi _ { f, \epsilon } \cdot f ) ) = L ( \psi _ { f, \epsilon } \cdot f ).$$ Consequently, $$\text{Consequently}, \\ \| L ^ { \prime } ( q _ { F } ( f ) ) \| & = \| L ( \psi _ { f, \epsilon } \cdot f ) \| \leq \| \psi _ { f, \epsilon } \cdot f \| _ { I } \\ & = \max \left \{ \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | \psi _ { f, \epsilon } ( m ) f ( x ) | \, d \lambda ( x ), \, \sup _ { m \in M } \int _ { \mathcal { G } _ { m } } | \psi _ { f, \epsilon } ( m ) f ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \} \\ & \leq \max \left \{ \sup _ { m \in W _ { \epsilon } } \int _ { \mathcal { G } _ { m } } | f ( x ) | \, d \lambda ( x ), \, \sup _ { m \in W _ { \epsilon } } \int _ { \mathcal { G } _ { m } } | f ( x ^ { - 1 } ) | \, d \lambda ( x ) \right \} \\ & = \sup _ { m \in W _ { \epsilon } } \| q \{ m \} ( f ) \| _ { I } \\ & < \| q _ { F } ( f ) \| _ { I } + \epsilon. \\ \text{Since we can choose such a $\psi_{f}_{\epsilon}$ for any $\epsilon > 0$. it follows that}$$ Since we can choose such a ψ f,/epsilon1 for any /epsilon1 &gt; 0, it follows that $$\| L ^ { \prime } ( q _ { F } ( f ) ) \| \leq \| q _ { F } ( f ) \| _ { I }.$$ The fact that q F : C c ( G , ω ) → C c ( G| F , ω ) is onto now implies that L ′ is an I -norm-bounded representation of C c ( G| F , ω ). In other words, every representation of C c ( G , ω ) which kills I F also factors through q F , so ker q F = I F as claimed. That is, $$C ^ { * } ( \mathcal { G } | _ { F }, \omega ) \cong C ^ { * } ( \mathcal { G }, \omega ) _ { F }$$ $$\text{for any $F\subseteq M\, \closed.\, This finishes the proof of Proposition 2.9.}$$ Knowing that C ∗ ( G , ω ) F = C ∗ ( G| F , ω ) will be crucial for the arguments in the next section. However, we will also need a result (Proposition 2.12) about the way ideals in C 0 ( M )-algebras relate. Although this result is undoubtedly well-known to experts, we include a proof for completeness. We begin with an observation about approximate units in C 0 ( M ). Since M is locally compact Hausdorff, for any closed set F ⊆ M we can write M F \ as an increasing union M F \ = ∪ i ∈ I K i of compact sets, and then Urysohn's Lemma tells us that we can find an approximate unit { φ F i } i ∈ I for C 0 ( M F \ ) such that φ F i is 1 on K i . It follows that for any m ∈ M F \ , there exists J ∈ I such that i ≥ J implies φ F i ( m ) = 1. Lemma 2.11. Let A be a C 0 ( M ) -algebra for a second countable locally compact Hausdorff space M , and let F , F 1 2 ⊆ M be closed. For any a ∈ I F 1 ∩ F 2 , we can find g ∈ I F 1 , h ∈ I F 2 such that a -g -h ∈ I F 1 ∪ F 2 . Proof. Let { φ 12 i } i ∈ I denote the approximate unit for C 0 ( M \ ( F 1 ∩ F 2 )) described above. Then, given /epsilon1 &gt; 0 and a ∈ I F 1 ∩ F 2 , there exists J such that ‖ a -φ 12 J · a ‖ &lt; /epsilon1 . Let { φ 1 λ } λ ∈ Λ , { φ 2 µ } µ ∈ S be the analogous approximate units for C 0 ( M F \ 1 ) and C 0 ( M F \ 2 ), respectively. Then $$g _ { \epsilon } \coloneqq ( \lim _ { \lambda } \phi _ { \lambda } ^ { 1 } \phi _ { J } ^ { 1 2 } ) \cdot a \in I _ { F _ { 1 } }, \ \ h _ { \epsilon } \coloneqq ( \lim _ { \mu } \phi _ { \mu } ^ { 2 } \phi _ { J } ) \cdot a \in I _ { F _ { 2 } }.$$ Moreover, φ 12 J · a -g /epsilon1 -h /epsilon1 ∈ I F 1 ∪ F 2 . To see this, fix m ∈ F 1 ∪ F 2 . If m ∈ F 1 \ F 2 , we can choose L large enough that µ ≥ L implies φ 2 µ ( m ) = 1; consequently, $$\phi _ { J } ^ { 1 2 } ( m ) - \phi _ { \lambda } ^ { 1 } ( m ) \phi _ { J } ^ { 1 2 } ( m ) - \phi _ { \mu } ^ { 2 } ( m ) \phi _ { J } ^ { 1 2 } ( m ) = 0$$ since φ 1 λ ( m ) = 0 for any λ when m ∈ F 1 . Similarly, if m ∈ F 2 \ F 1 , we can choose K such that λ ≥ K implies φ 1 λ ( m ) = 1, and so (6) also holds; and if m ∈ F 1 ∩ F 2 then φ 12 J ( m ) = 0 and (6) still holds. Thus, if λ, µ are large enough then Equation (6) holds for all m ∈ F 1 ∪ F 2 , so taking the limit over λ, µ reveals that $$\phi _ { J } ^ { 1 2 } \cdot a - g _ { \epsilon } - h _ { \epsilon } = ( \phi _ { J } ^ { 1 2 } - \lim _ { \lambda } \phi _ { \lambda } ^ { 1 } \phi _ { J } ^ { 1 2 } - \lim _ { \mu } \phi _ { \mu } ^ { 2 } \phi _ { J } ^ { 1 2 } ) \cdot a \in I _ { F _ { 1 } \cup F _ { 2 } },$$ as claimed. Therefore, denoting the norm in the quotient A F by ‖ · ‖ F , we see that $$\cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \\ \| a - g _ { \epsilon } - h _ { \epsilon } \| _ { F _ { 1 } \cup F _ { 2 } } & \leq \| a - \phi _ { J } ^ { 1 2 } \cdot a \| _ { F _ { 1 } \cup F _ { 2 } } + \| \phi _ { J } ^ { 1 2 } \cdot a - g _ { \epsilon } - h _ { \epsilon } \| _ { F _ { 1 } \cup F _ { 2 } } \\ & = \| a - \phi _ { J } ^ { 1 2 } \cdot a \| _ { F _ { 1 } \cup F _ { 2 } } \\ & \leq \| a - \phi _ { J } ^ { 1 2 } \cdot a \| \\ & < \epsilon.$$ Furthermore, since 0 ≤ φ 1 λ ( m ) ≤ 1 for all m ∈ M , $$\| g _ { \epsilon } - g _ { \epsilon ^ { \prime } } \| & = \| \lim _ { \lambda } \phi _ { \lambda } ^ { 1 } ( \phi _ { J } ^ { 1 2 } - \phi _ { J ^ { \prime } } ^ { 1 2 } ) \cdot a \| \\ & \leq \| ( \phi _ { J } ^ { 1 2 } - \phi _ { J ^ { \prime } } ^ { 1 2 } ) \cdot a \| \\ & < \epsilon + \epsilon ^ { \prime },$$ so the net { g /epsilon1 } /epsilon1&gt; 0 converges in A . The same argument will show that { h /epsilon1 } /epsilon1&gt; 0 also converges. Setting g := lim /epsilon1 g /epsilon1 and h := lim /epsilon1 h /epsilon1 , we have g ∈ I F 1 since g /epsilon1 ∈ I F 1 ∀ /epsilon1 ; similarly, h ∈ I F 2 . We claim that a -g -h ∈ I F 1 ∪ F 2 . To see this, let δ &gt; 0 be given and suppose /epsilon1 is small enough that ‖ g -g /epsilon1 ‖ ‖ , h -h /epsilon1 ‖ &lt; δ . Without loss of generality, suppose /epsilon1 &lt; δ . Then $$\| a - g - h \| _ { F _ { 1 } \cup F _ { 2 } } & \leq \| a - g _ { \epsilon } - h _ { \epsilon } \| _ { F _ { 1 } \cup F _ { 2 } } + \| g _ { \epsilon } - g \| _ { F _ { 1 } \cup F _ { 2 } } + \| h _ { \epsilon } - h \| _ { F _ { 1 } \cup F _ { 2 } } \\ & < \epsilon + 2 \delta \\ & < 3 \delta.$$ $$\text{at } a - g - h \in I _ { F _ { 1 } \cup F _ { 2 } } \text{ as claimed.}$$ It follows that a g h I F 1 ∪ F 2 Proposition 2.12. Let A be a C 0 ( X ) -algebra for a locally compact Hausdorff space X , and let F , F 1 2 ⊆ M be closed. Then we have a short exact sequence of C ∗ -algebras $$0 \to A _ { F _ { 1 } \cup F _ { 2 } } \to A _ { F _ { 1 } } \oplus A _ { F _ { 2 } } \to A _ { F _ { 1 } \cap F _ { 2 } } \to 0.$$ Proof. We begin by showing that I F 1 ∪ F 2 := C 0 ( M \ ( F 1 ∪ F 2 )) · A = I F 1 ∩ I F 2 . The containment I F 1 ∪ F 2 ⊆ I F 1 ∩ I F 2 follows immediately from the definitions; we will prove the other containment. To that end, suppose a ∈ I F 1 ∩ I F 2 . Let { φ 1 λ } λ , { φ 2 µ } µ be the approximate units for C 0 ( M F \ 1 ) , C 0 ( M F \ 2 ) respectively that were used in Lemma 2.11, and fix /epsilon1 &gt; 0. Then there exist λ, µ such that ‖ a -φ 1 λ · a ‖ &lt; /epsilon1 and ‖ a -φ 2 µ · a ‖ &lt; /epsilon1 ; consequently, ‖ φ 1 λ · a -φ 2 µ · a ‖ &lt; /epsilon1 2 . The open set U = { m ∈ M : | φ 2 µ ( m ) | &lt; δ } contains F 2 ; let χ ∈ C 0 ( M ) be a bump function that is 1 on F 2 and 0 off U . Then φ /epsilon1 := φ 1 λ -χφ 1 λ ∈ C 0 ( M \ ( F 1 ∪ F 2 )). Moreover, Let δ = /epsilon1/ ‖ a ‖ . We will now construct φ /epsilon1 ∈ C 0 ( M \ ( F 1 ∪ F 2 )) such that ‖ a -φ /epsilon1 · a ‖ &lt; 4 , thus showing that /epsilon1 a ∈ I F 1 ∪ F 2 as claimed. $$\Lambda _ { 0 } & \Lambda _ { 0 } \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \\ \| a - ( \phi _ { \lambda } ^ { 1 } - \chi \phi _ { \lambda } ^ { 1 } ) \cdot a \| & \leq \| a - ( \phi _ { \lambda } ^ { 1 } - \chi \phi _ { \lambda } ^ { 1 } ) \cdot a - ( \chi \phi _ { \mu } ^ { 2 } ) \cdot a \| + \| ( \chi \phi _ { \mu } ^ { 2 } ) \cdot a \| \\ & \leq \| a - \phi _ { \lambda } ^ { 1 } \cdot a \| + \| \chi \cdot ( \phi _ { \lambda } ^ { 1 } \cdot a - \phi _ { \mu } ^ { 2 } \cdot a ) \| + \| ( \chi \phi _ { \mu } ^ { 2 } ) \cdot a \| \\ & \quad < \epsilon + 2 \epsilon + \delta \| a \| \\ & \quad = 4 \epsilon,$$ since χφ 2 µ is only nonzero on U F \ 2 , where its maximum modulus is at most δ = /epsilon1/ ‖ a ‖ . Since /epsilon1 &gt; 0 was arbitrary, I F 1 ∩ I F 2 = I F 1 ∪ F 2 as claimed. Thus, the map φ : A F 1 ∪ F 2 → A F 1 ⊕ A F 2 given by $$\phi ( [ a ] _ { F _ { 1 } \cup F _ { 2 } } ) = [ a ] _ { F _ { 1 } } \oplus [ a ] _ { F _ { 2 } }$$ is a well-defined, injective ∗ -homomorphism. Similarly, the map ψ : A F 1 ⊕ A F 2 → A F 1 ∩ F 2 given by $$\psi ( [ a ] _ { F _ { 1 } } \oplus [ b ] _ { F _ { 2 } } ) = [ a - b ] _ { F _ { 1 } \cap F _ { 2 } }$$ is well-defined and onto, since I F i ⊆ I F 1 ∩ F 2 for i = 1 2. , Since Im φ ⊆ ker ψ by definition, in order to see that the sequence (7) is exact, we merely need to check that Im φ ⊇ ker ψ . The proof of this inclusion relies on Lemma 2.11. Suppose [ ] c F 1 ⊕ [ d ] F 2 ∈ ker ψ . Then c -d ∈ I F 1 ∩ F 2 , so by Lemma 2.11, there exist g ∈ I F 1 , h ∈ I F 2 such that ( c -d ) -g -h ∈ I F 1 ∪ F 2 . In other words, $$[ c - g ] _ { F _ { 1 } \cup F _ { 2 } } = [ h + d ] _ { F _ { 1 } \cup F _ { 2 } } = \colon [ b ] _ { F _ { 1 } \cup F _ { 2 } }.$$ Since g ∈ I F 1 , h ∈ I F 2 , we know [ c -g ] F 1 = [ ] c F 1 and [ h + ] d F 2 = [ d ] F 2 . To sum up, if ψ ([ c ] F 1 ⊕ [ d ] F 2 ) = 0, then [ c ] F 1 ⊕ [ d ] F 2 = [ c -g ] F 1 ⊕ [ d + h ] F 2 = [ ] b F 1 ⊕ [ b ] F 2 = φ ([ b ] F 1 ∪ F 2 ) , and ker ψ ⊆ Im φ as claimed. In other words, the sequence (7) is exact. ## 3 Mayer-Vietoris In this section, we will translate the results about C 0 ( M )-algebras obtained in the previous section into statements about the K -theory groups K ∗ ( C ∗ ( G , ω )) of the C ∗ -algebras of twisted group bundles. K -theory (cf. [16, 12, 1]) is a covariant, Z 2 -graded homotopy-invariant functor from the category of C ∗ -algebras to the category of abelian groups. In plain language, this means that K -theory associates to each C ∗ -algebra A a pair of abelian groups, K A 0 ( ) and K A 1 ( ). The K -theory groups are constructed from equivalence classes of projections in certain C ∗ -algebras associated to A , and ∗ -homomorphisms A → B of C ∗ -algebras induce homomorphisms K A ∗ ( ) → K ∗ ( B ) in such a way that homotopic ∗ -homomorphisms induce the same map on K -theory. Among the many useful properties of K -theory is the so-called 'continuity of K -theory' (cf. [16] Proposition 6.2.9), which implies that $$K _ { * } ( \oplus _ { n \in \mathbb { N } } A _ { n } ) = \oplus _ { n \in \mathbb { N } } K _ { * } ( A _ { n } ).$$ Also relevant to our discussion in this article is the 6-term exact sequence in K -theory (cf. [1] Theorem 9.3.1, [12] Theorem 12.1.2): any short exact sequence of C ∗ -algebras $$0 \to J \to A \to B \to 0$$ induces a 6-term exact sequence of the K -groups ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1175v2-figure-8fc9cb7a-e432-43cd-8492-67c851535f02.jpg) Thus, the short exact sequence (7) gives rise to the following 6-term exact sequence in K -theory: $$K _ { 0 } ( A _ { F _ { 1 } \cup F _ { 2 } } ) & \xrightarrow { \longrightarrow } K _ { 0 } ( A _ { F _ { 1 } } ) \oplus K _ { 0 } ( A _ { F _ { 2 } } ) \xrightarrow { \longrightarrow } K _ { 0 } ( A _ { F _ { 1 } \cap F _ { 2 } } ) \\ & \Big \downarrow \\ K _ { 1 } ( A _ { F _ { 1 } \cap F _ { 2 } } ) & \xrightarrow { \longrightarrow } K _ { 1 } ( A _ { F _ { 1 } } ) \oplus K _ { 1 } ( A _ { F _ { 2 } } ) \xrightarrow { \longrightarrow } K _ { 1 } ( A _ { F _ { 1 } \cup F _ { 2 } } ) \\ \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \cdots \quad \end{$$ Since C ∗ ( G , ω ) is a C 0 ( M )-algebra whenever π : G → M is a group bundle, we propose to use this diagram to study the K -theory groups associated to a homotopy of 2-cocycles on G . The following definition is a special case of [5] Definition 2.11. Given a group bundle π : G → M , we can construct the associated group bundle ˜ : π G × [0 , 1] → M × [0 , 1], which has total space G × [0 , 1], and fiber π -1 ( m ) over ( m,t ) ∈ M × [0 , 1] for any t ∈ [0 , 1]. Definition 3.1. A homotopy of 2-cocycles on a group bundle π : G → M is a 2-cocycle Ω on the group bundle ˜ : π G × [0 , 1] → M × [0 , 1]. Observe that a homotopy Ω of 2-cocycles gives rise to a family { ω t } t ∈ [0 1] , of 2-cocycles on the original group bundle G → M , which varies continuously in t thanks to the continuity of Ω. Example 3.2 . Suppose that π : V → M is a vector bundle and that σ : V (2) → R is a 2-form on V . The function Ω : V (2) × [0 , 1] → T given by $$\Omega ( ( v, w, t ) ) = \exp ^ { 2 \pi i t \sigma ( v, w ) }$$ is a homotopy of 2-cocycles on V , with $$\omega _ { 0 } ( v, w ) = 1 ; \quad \omega _ { 1 } ( v, w ) = \exp ^ { 2 \pi i \sigma ( v, w ) }.$$ If Ω = { ω t } t ∈ [0 1] , is a homotopy of 2-cocycles on G , we have a natural ∗ -homomorphism $$Q _ { t } \, \colon C ^ { * } ( \mathcal { G } \times [ 0, 1 ], \Omega ) \to C ^ { * } ( \mathcal { G }, \omega _ { t } )$$ for any t ∈ [0 , 1], which is given on the dense subalgebra C c ( G × [0 , 1]) by evaluation at t . Observe that if F ⊆ M is closed, then $$Q _ { t } \circ q _ { F \times [ 0, 1 ] } = q _ { F } \circ Q _ { t },$$ since this equality evidently holds on the dense subalgebra C c ( G × [0 , 1]), and hence holds in general. Consequently, the diagrams (9) for the algebras $$A = C ^ { * } ( \mathcal { G } \times [ 0, 1 ], \Omega ), A ^ { t } = C ^ { * } ( \mathcal { G }, \omega _ { t } )$$ can be connected into a larger commutative diagram: ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1175v2-figure-342ddb4f-45de-470f-accb-9b1d130347e2.jpg) where all of the arrows connecting the inner and outer diagrams arise from the map Q t . Theorem 3.3. Let G → M be a second countable, locally trivial, amenable group bundle, with Ω = { ω t } t ∈ [0 1] , a homotopy of 2-cocycles on G . Then $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { t } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G } \times [ 0, 1 ], \Omega ) )$$ for any t ∈ [0 , 1] . Proof. We begin by considering the case when M is compact. For each m ∈ M , let V m be a compact neighborhood of m such that G trivializes over V m . Then G also trivializes over V m ∩ V n . In other words, G| V m and G| V m ∩ V n are transformation groups over compact spaces (with the trivial action of the group G m ∼ = G on the spaces V m , V n , V m ∩ V n ⊆ M ). By hypothesis, G| V m is a bundle of amenable groups, and so Theorem 3.5 of [14] tells us that G| V m is an amenable groupoid; in other words, $$A _ { V _ { m } } = C ^ { * } ( \mathcal { G } | _ { V _ { m } } \times [ 0, 1 ], \Omega ) \cong C _ { r } ^ { * } ( \mathcal { G } | _ { V _ { m } } \times [ 0, 1 ], \Omega ).$$ Theorem 5.1 of [5] states that a homotopy Ω = { ω t } t ∈ [0 1] , of 2-cocycles on a second countable locally compact transformation group G /multicloseleft X induces an isomorphism $$( Q _ { t } ) _ { * } \colon K _ { * } ( C _ { r } ^ { * } ( G \ltimes X \times [ 0, 1 ], \Omega ) ) \to K _ { * } ( C _ { r } ^ { * } ( G \ltimes X, \omega _ { t } ) )$$ for any t ∈ [0 , 1], as long as G satisfies the Baum-Connes conjecture with coefficients. Applying this result to the case G = G m and X = V m , since amenable groups satisfy the Baum-Connes conjecture with coefficients, we see that Q t : A V m → A t V m induces an isomorphism on K -theory, and that the same is true for Q t : A V n → A t V n and Q t : A V m ∩ V n → A t V m ∩ V n . The Five Lemma now implies that Q t : A V m ∪ V n → A t V m ∪ V n induces a K -theoretic equivalence. Iterating this procedure, since the compactness of M implies the existence of a finite cover of M consisting of the sets V m , we see that Q t induces an isomorphism $$( Q _ { t } ) _ { * } \colon K _ { * } ( C ^ { * } ( \mathcal { G } \times [ 0, 1 ], \Omega ) ) \to K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { t } ) ),$$ as claimed. For the general case, when M is not compact, write M = ∪ ∞ i =1 U i , where U i ⊆ U i +1 and U i is compact for all i . (We are indebted to Nigel Higson for suggesting this argument.) Then M = F 1 ∪ F 2 , where $$F _ { 1 } = \cup _ { i = 0 } ^ { \infty } \overline { U _ { 2 i + 1 } } \, \langle U _ { 2 i } ; \quad F _ { 2 } = \cup _ { i = 1 } ^ { \infty } \overline { U _ { 2 i } } \, \langle U _ { 2 i - 1 }.$$ Without loss of generality, we may assume that ∂U i ∩ ∂U i +1 = ∅ ∀ i ; then F , F 1 2 , and F 1 ∩ F 2 = ∪ ∞ i =1 ∂U i are each closed sets, consisting of countably many disjoint compact sets. Consequently, for F = F , F 1 2 , F 1 ∩ F 2 , we see that C ∗ ( G| F × [0 , 1] , Ω) and C ∗ ( G| F , ω t ) both break up as a countable direct sum $$C ^ { * } ( \mathcal { G } | _ { F } \times [ 0, 1 ], \Omega ) \cong \bigoplus _ { n = 0 } ^ { \infty } C ^ { * } ( \mathcal { G } | _ { F ^ { n } } \times [ 0, 1 ], \Omega ) ; \quad C ^ { * } ( \mathcal { G } | _ { F }, \omega _ { t } ) \cong \bigoplus _ { n = 0 } ^ { \infty } C ^ { * } ( \mathcal { G } | _ { F ^ { n } }, \omega _ { t } )$$ where F n is compact for all n . Since we established above that for a compact set F n , $$^ { \prime } ( Q _ { t } ) _ { * } \, \colon K _ { * } ( C ^ { * } ( \mathcal { G } | _ { F ^ { n } } \times [ 0, 1 ], \Omega ) ) \to K _ { * } ( C ^ { * } ( \mathcal { G } | _ { F ^ { n } }, \omega _ { t } ) )$$ is an isomorphism for all t ∈ [0 , 1], it follows from (8) that $$( Q _ { t } ) _ { * } \, \colon K _ { * } ( C ^ { * } ( \mathcal { G } | _ { F } \times [ 0, 1 ], \Omega ) ) \to K _ { * } ( C ^ { * } ( \mathcal { G } | _ { F }, \omega _ { t } ) )$$ is also an isomorphism for F = F , F 1 2 , F 1 ∩ F 2 . Since M = F 1 ∪ F 2 , the short exact sequence of (7) combines with the Five Lemma (following the same argument given above in the case M is compact) to tell us that $$( Q _ { t } ) _ { * } \, \colon K _ { * } ( C ^ { * } ( \mathcal { G } \times [ 0, 1 ], \Omega ) ) \to K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { t } ) )$$ is also an isomorphism. This finishes the proof of Theorem 3.3. Our main result now follows immediately: Corollary 3.4. Any homotopy Ω = { ω t } t ∈ [0 1] , of 2-cocycles on a second countable, locally trivial amenable group bundle G → M induces an isomorphism $$K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 0 } ) ) \cong K _ { * } ( C ^ { * } ( \mathcal { G }, \omega _ { 1 } ) ).$$ When we consider the particular case when V → M is a vector bundle, we obtain the following generalization of Theorem 1 from [11]: Corollary 3.5. Let V → M be a vector bundle, and let σ : V (2) → R be a bilinear 2-form on V . Setting ω v, w ( ) = e 2 πiσ v,w ( ) , we have $$K _ { * } ( C ^ { * } ( V, \omega ) ) \cong K _ { * } ( C ^ { * } ( V ) ) = K _ { * } ( C _ { 0 } ( V ^ { * } ) ).$$ In particular, if V is even dimensional, then $$K _ { * } ( C ^ { * } ( V, \omega ) ) \cong K _ { * } ( C _ { 0 } ( M ) ).$$ ## References - [1] B. Blackadar, K -theory for operator algebras , Cambridge University Press, 1998. - [2] J.H. Brown and A. an Huef, Decomposing the C ∗ -algebras of groupoid extensions , Proceedings of the American Mathematical Society 142 (2014), 1261-1274. - [3] L.O. Clark and A. an Huef, The representation theory of C ∗ -algebras associated to groupoids , Mathematical Proceedings of the Cambridge Philosophical Society 153 (2012), 167-191. - [4] E. Gillaspy, K -theory and homotopies of 2-cocycles on higher-rank graphs , arXiv:1403.3799 (2014). - [5] , K -theory and homotopies of 2-cocycles on transformation groups , Journal of Operator Theory (to appear). - [6] G. Goehle, The Mackey machine for crossed products by regular groupoids. II , Rocky Mountain Journal of Mathematics 42 (2012), 873-900. - [7] A. an Huef, A. Kumjian, and A. Sims, A Dixmier-Douady theorem for Fell algebras , Journal of Functional Analysis 260 (2011), 1543-1581. - [8] A. Kumjian, On C ∗ -diagonals , Canadian Journal of Mathematics 38 (1986), 969-1008. - [9] P.S. Muhly, J.N. Renault, and D.P. Williams, Continuous-trace groupoid C ∗ -algebras. III , Transactions of the American Mathematical Society 348 (1996), 3621-3641. - [10] P.S. Muhly and D.P. Williams, Continuous trace groupoid C ∗ -algebras II , Mathematica Scandinavica 70 (1992), 127-145. - [11] R.J. Plymen, The Weyl bundle , Journal of Functional Analysis 49 (1982), 186-197. - [12] M. Rørdam, F. Larsen, and N.J. Laustsen, An introduction to K -theory for C ∗ -algebras , London Mathematical Society Student Texts, no. 49, Cambridge University Press, 2000. - [13] J. Renault, A groupoid approach to C ∗ -algebras , Lecture Notes in Mathematics, vol. 793, Springer-Verlag, 1980. - [14] , Topological amenability is a Borel property , arXiv:1302:0636 (2013). - [15] J.-L. Tu, P. Xu, and C. Laurent-Gengoux, Twisted K -theory of differentiable stacks , Annales Scientifiques de l' ´ cole E Normale Sup´ erieure 37 (2004), 841-910. - [16] N.E. Wegge-Olsen, K -theory and C ∗ -algebras: A friendly approach , Oxford University Press, 1993. - [17] D.P. Williams, Crossed products of C ∗ -algebras , Mathematical Surveys &amp; Monographs, vol. 134, AMS, 2007.
null
[ "Elizabeth Gillaspy" ]
2014-08-06T03:40:20+00:00
2014-10-27T16:44:56+00:00
[ "math.OA", "math.KT", "46L80, 46L55" ]
$K$-theory and homotopies of 2-cocycles on group bundles
This paper continues the author's program to investigate the question of when a homotopy of 2-cocycles $\Omega = \{\omega_t\}_{t \in [0,1]}$ on a locally compact Hausdorff groupoid $\mathcal{G}$ induces an isomorphism of the $K$-theory groups of the twisted groupoid $C^*$-algebras: $K_*(C^*(\mathcal{G}, \omega_0)) \cong K_*(C^*(\mathcal{G}, \omega_1)).$ Building on our earlier work, we show that if $\pi: \mathcal{G} \to M$ is a locally trivial bundle of amenable groups over a locally compact Hausdorff space $M$, a homotopy $\Omega = \{\omega_t\}_{t \in [0,1]}$ of 2-cocycles on $\mathcal{G} $ gives rise to an isomorphism $K_*(C^*(\mathcal{G}, \omega_0)) \cong K_*(C^*(\mathcal{G}, \omega_1)).$
1408.1176v2
## Q -ball dark matter and baryogenesis in high-scale inflation Shinta Kasuya a and Masahiro Kawasaki b,c a Department of Mathematics and Physics, Kanagawa University, Kanagawa 259-1293, Japan b Institute for Cosmic Ray Research, the University of Tokyo, Chiba 277-8582, Japan c Kavli Institute for the Physics and Mathematics of the Universe (WPI), Todai Institutes for Advanced Study, the University of Tokyo, Chiba 277-8582, Japan (Dated: August 6, 2014) We investigate the scenario that one flat direction creates baryon asymmetry of the universe, while Q balls from another direction can be the dark matter in the gauge-mediated supersymmetry breaking for high-scale inflation. Isocurvature fluctuations are suppressed by the fact that the Affleck-Dine field stays at around the Planck scale during inflation. We find that the dark matter Q balls can be detected in IceCube-like experiments in the future. ## I. INTRODUCTION The Affleck-Dine baryogenesis [1] is one of the promising mechanisms for creating the baryon asymmetry of the universe. It utilizes the scalar field which carries the baryon number. In the minimal supersymmetric standard model (MSSM), there are a lot of such scalar fields called flat directions which consist of squarks (and sleptons). The scalar potential of the flat directions vanishes in the supersymmetry (SUSY) limit, and is lifted by SUSY breaking effects and higher order operators. It is well known that the Q balls form during the course of the Affleck-Dine baryogenesis [2-4]. In particular, Q balls with large enough charge Q are stable against the decay into baryons (nucleons) in the gauge-mediated SUSY breaking. 1 In this case, Q balls would be dark matter of the universe, and could be detectable. The baryon asymmetry of the universe is explained by the baryon numbers that are not remained inside the Q balls. It has been considered that the single flat direction transforms into dark matter Q balls, and the baryon numbers are emitted through the Q -ball surface in the thermal bath of the universe [2, 9, 10]. Unfortunately, this simple scenario is observationally excluded [11]. However it is natural to consider more than one direction which take part in the Affleck-Dine mechanism. There are at most 29 complex degrees of freedom for D -flat and renormalizable F -flat directions which do not involve Higgs field [12]. Most of the directions are lifted by n = 4 nonrenormalizable superpotential of the form W = φ n , which applies to the even n case, where φ is the field of a flat direction. For the odd n case, the potential is lifted by W = H φ i n -1 superpotential, where H i is the Higgs field H u or H d . In Ref. [11], we considered n = 5 and n = 6 directions, where the former direction is responsible for the baryon asymmetry of the universe while the latter forms dark matter Q balls. Recently, the BICEP2 team reported the detection of the primordial B-mode polarization of the cosmic microwave background [13]. It could be originated from gravitational waves produced during inflation, which leads to the large tensor-to-scalar ratio r glyph[similarequal] 0 2 and the large Hubble parameter during inflation . H inf glyph[similarequal] 10 14 GeV. In such high-scale inflation, in general, large baryonic isocurvature fluctuations will be induced in the Affleck-Dine mechanism [1417]. In order to suppress isocurvature fluctuations sufficiently, the amplitude of the flat direction must be as large as the Planck scale, M P = 2 4 . × 10 18 GeV, for H inf glyph[similarequal] 10 14 GeV, which can be achieved if the coupling in the nonrenormalizable superpotential is small enough [18]. In the present Letter, we investigate the possibility that one flat direction creates baryon asymmetry of the universe, while Q balls from another direction can be the dark matter in the gauge-mediated SUSY breaking for high-scale inflation. 2 It is realized for two n = 4 directions with different sizes of the couplings. The direction with larger coupling disintegrates into the gauge-mediation type Q balls, which decay into baryons before the big bang nucleosynthesis (BBN). The direction with smaller coupling transforms into the new-type Q balls, which are stable against the decay into baryons and become the dark matter of the universe. 3 These dark matter Q balls could be detected by the IceCube-like experiment in the future. 1 If the charge of the Q ball is small enough, the lightest SUSY particles, such as the gravitino [5-7] or the axino[8], decayed from the Q ball, may be the dark matter, while the baryons are produced by the Q -ball decay as well. 2 The Affleck-Dine baryogenesis and the lightest SUSY particle (LSP) dark matter production after high-scale inflation was considered in Ref. [18], where all the Q balls, if they form, decay into baryons and LSPs in both the gravity and gauge mediation. 3 The dark matter new-type Q ball has a good feature that avoids astrophysical constraints by the neutron star destruction [11]. The structure of the Letter is as follows. In the next section, we review how the Affleck-Dine mechanism works in the SUSY setup. Isocurvature fluctuations are considered in Sec.III. In Sec.IV, we show the properties of the Q balls in the gauge mediation. We estimate the baryon number and the dark matter of the universe in Sec.V, and seek for successful scenarios to explain both the baryon asymmetry and the dark matter Q balls in Sec.VI. Sec.VII is devoted to our conclusions. ## II. AFFLECK-DINE MECHANISM The flat direction is a scalar field Φ which consists of squarks (and sleptons) in MSSM. The potential of the flat directions is flat in SUSY limit, and lifted by SUSY breaking effects and nonrenormalizable superpotential of the form $$W _ { N R } & = \frac { \lambda \Phi ^ { n } } { n M _ { P } ^ { n - 3 } },$$ where λ is a coupling constant which will be determined later. In the gauge-mediated SUSY breaking, the potential is lifted as $$V = V _ { \text{SweY} } + V _ { \text{NR} } = V _ { \text{gauge} } + V _ { \text{grav} } + V _ { \text{NR} },$$ where [2, 3, 19] $$V _ { \text{gauge} } = \begin{cases} \frac { 1 } { 2 } m _ { \phi } ^ { 2 } \phi ^ { 2 } & ( \phi \ll M _ { \text{m} } ), \\ M _ { F } ^ { 4 } \left ( \log \frac { \phi ^ { 2 } } { 2 M _ { \text{m} } ^ { 2 } } \right ) ^ { 2 } & ( \phi \gg M _ { \text{m} } ), \\ 1 & / & \lambda ^ { 2 } \ \end{cases} \ \end{cases}$$ $$V _ { \text{grav} } = \frac { 1 } { 2 } m _ { 3 / 2 } ^ { 2 } \phi ^ { 2 } \left ( 1 + K \log \frac { \dots } { 2 M _ { * } ^ { 2 } } \right ),$$ $$V _ { N R } = \frac { \lambda ^ { 2 } \phi ^ { 2 ( n - 1 ) } } { 2 ^ { n - 1 } M _ { P } ^ { 2 ( n - 3 ) } }.$$ Here, Φ = 1 √ 2 φe iθ , m φ ∼ O (TeV) is a soft breaking mass, M m is the messenger mass, m 3 / 2 is the gravitino mass, K &lt; ( 0) is a coefficient of one-loop corrections, and M ∗ is the renormalization scale. M F ranges as $$4 \times 1 0 ^ { 4 } \text{ GeV} \lesssim M _ { F } \lesssim \frac { g ^ { 1 / 2 } } { 4 \pi } \sqrt { m _ { 3 / 2 } M _ { \text{P} } }.$$ Here the lower bound comes from the fact that the 125 GeV Higgs boson leads to the SUSY breaking parameter Λ ∼ 5 × 10 5 GeV [20, 21], where sparticle masses are estimated as ∼ g 2 Λ (4 / π ) 2 . Since the gravitino mass is much smaller than TeV scale, the potential is dominated by V gauge for φ &lt; φ eq , while V grav overcomes V gauge for φ &lt; φ eq , where $$\phi _ { \text{eq} } & = \sqrt { 2 } \frac { M _ { F } ^ { 2 } } { m _ { 3 / 2 } },$$ derived from V gauge ( φ eq ) = V grav ( φ eq ). In the Affleck-Dine mechanism, the flat direction has large VEV during inflation. This is usually realized by the so-called negative Hubble-induced mass term [1] $$V _ { H } = - c H ^ { 2 } | \Phi | ^ { 2 } = - \frac { 1 } { 2 } c H ^ { 2 } \phi ^ { 2 },$$ which stems from the SUSY breaking effect by the finite inflaton energy density. Here H is the Hubble parameter, and c is a constant of O (1). During inflation the flat direction stays at the minimum determined by the balance of V H and V NR : $$\phi _ { \min } = \sqrt { 2 } \left ( \frac { c ^ { 1 / 2 } H _ { \inf } M _ { P } ^ { n - 3 } } { \lambda } \right ) ^ { 1 / ( n - 2 ) }.$$ Well after inflation when the Hubble parameter decreases as large as m φ, eff glyph[similarequal] √ V ′′ ( φ osc ), the field begins oscillations. The field actually rotates due to the usual soft A terms, and the baryon number of the universe is created. If the field starts to oscillate at the amplitude smaller than φ eq , the potential is dominated by V gauge so that the gauge-mediation type Q balls eventually form. On the other hand, the new-type Q balls are created for φ osc &gt; φ eq where V grav is larger than V gauge . It is determined by the size of λ whether the field starts its oscillation smaller or larger than φ eq . The gauge-mediation type Q balls form for the flat direction with larger λ , while the new-type Q balls are created for that with smaller λ . See Fig.1. We will consider the situation that the gauge-mediation type Q balls decay to produce the baryon asymmetry of the universe, while the new-type Q balls are stable and become the dark matter of the universe. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1176v2-figure-894e81a6-a8d1-400e-8e51-d0f72e83453e.jpg) glyph&lt;c=1,font=/DOTJLP+MS-PGothic&gt; FIG. 1: Potential of the flat direction. One direction is lifted by the nonrenormalizable term V NR with λ G (orange), while another direction is lifted by that with λ N (brown). ## III. AVOIDING TOO LARGE ISOCURVATURE FLUCTUATIONS During high-scale inflation the flat direction acquires quantum fluctuations along the phase direction if there is no sizable A terms, and it may lead to too large baryonic and CDM isocurvature fluctuations in this case. Actually, the Hubble-induced A terms do not appear for most inflation models in supergravity [17]. The amplitude of the baryonic isocurvature fluctuations can be estimated as $$S _ { b } = \frac { \delta \rho _ { b } } { \rho _ { b } } \simeq \frac { \delta n _ { b } } { n _ { b } } \simeq \frac { \delta n _ { \phi } } { n _ { \phi } } \simeq \delta \theta \simeq \frac { H _ { \inf } } { 2 \pi \phi _ { \inf } }.$$ On the other hand, observational upper bound is calculated as $$S _ { b } ^ { ( \text{obs} ) } \simeq \frac { \Omega _ { \text{CDM} } } { \Omega _ { b } } ( \beta _ { \text{iso} } A _ { s } ) ^ { 1 / 2 } = 5. 0 \times 1 0 ^ { - 5 },$$ where β iso = 0 039 and ln(10 . 10 A s ) = 3 098 are respectively the primordial isocurvature fraction and the amplitude of . the curvature power spectrum obtained in the Planck results [22]. It should be S b &lt; S (obs) b , which results in 4 $$\phi _ { \inf } > \frac { H _ { \inf } } { 2 \pi S _ { b } ^ { ( \text{obs} ) } } = 3. 5 \times 1 0 ^ { 1 7 } \, \text{GeV} \left ( \frac { H _ { \inf } } { 1. 1 \times 1 0 ^ { 1 4 } \, \text{GeV} } \right ) \left ( \frac { S _ { b } ^ { ( \text{obs} ) } } { 5. 0 \times 1 0 ^ { - 5 } } \right ) ^ { - 1 }.$$ 4 The lower limit of the amplitude of the flat direction, which is responsible for the dark matter Q balls, is highly model-dependent. It might be at most Ω CDM / Ω b times larger than Eq.(12) for ε = 1. Thus the field should stay at around M P during inflation in order to have small enough isocurvature fluctuations. This can be achieved for small enough λ : $$\lambda \lesssim 2 ^ { n / 2 - 1 } c ^ { 1 / 2 } \frac { H _ { \inf } } { M _ { \text{P} } } = 9. 3 \times 1 0 ^ { - 5 } c ^ { 1 / 2 } \left ( \frac { H _ { \inf } } { 1. 1 \times 1 0 ^ { 1 4 } \text{ GeV} } \right ).$$ Here and hereafter, = ( n =4) means that we evaluate values for n = 4. Moreover, if the amplitude of the flat direction is as large as M P during inflation, the terms such as $$V _ { H A } = a _ { H } \frac { H ^ { 2 } \Phi ^ { m } } { M _ { P } ^ { m - 2 } } + \text{h.c.},$$ would come from a nonminimal K¨ ahler potential of the form K = I † I Φ m /M m P (the F term of the I field is responsible for inflation) and results in the mass scale of O H ( ) for the phase direction [18], which further suppresses the isocurvature fluctuations. Therefore, we adopt λ &lt; ∼ 10 -4 , and investigate the scenario that the gauge-mediation type Q balls from one flat direction decay into baryons, while another direction forms new-type Q balls to be dark matter of the universe in this situation. ## IV. Q BALLS IN THE GAUGE MEDIATION The Q -ball solution exists in those potential that are flatter than φ 2 , which is the case for SUSY. In the gaugemediated SUSY breaking there exist two types of the Q ball. One is the gauge-mediation type [2, 9], and the other is the new type [27]. The former forms when the potential is dominated by V gauge when the field starts oscillations and fragments into lumps. The charge of the formed Q ball is estimated as [9] $$Q _ { G } = \beta _ { G } \left ( \frac { \phi _ { \text{osc} } } { M _ { F } } \right ) ^ { 4 },$$ where φ osc is the amplitude of the field at the onset of the oscillation (rotation). β G glyph[similarequal] 6 × 10 -4 for a circular orbit ( ε = 1), while β G glyph[similarequal] 6 × 10 -5 for an oblate case ( ε &lt; ∼ 0 1). . Here ε is the ellipticity of the field orbit. The features of this type are represented as $$M _ { Q } \simeq \frac { 4 \sqrt { 2 } \pi } { 3 } \zeta M _ { F } Q _ { G } ^ { 3 / 4 },$$ $$R _ { Q } \simeq \frac { \lambda } { \sqrt { 2 } } \zeta ^ { - 1 } M _ { F } ^ { - 1 } Q _ { G } ^ { 1 / 4 },$$ $$\omega _ { Q } \simeq \bigwedge _ { \delta } ^ { \vee 2 } \zeta M _ { F } Q _ { G } ^ { - 1 / 4 },$$ $$\phi _ { Q } \simeq \frac { 1 } { \sqrt { 2 } } \zeta M _ { F } Q _ { G } ^ { 1 / 4 },$$ where M Q and R Q are the mass and the size of the Q ball, respectively, and ω Q and φ Q are respectively the rotation speed and the amplitude of the field inside the Q ball, and ζ is the O (1) parameter [23, 24]. On the other hand, the new type of the Q ball forms when the potential is dominated by V grav at the onset of the oscillation. The charge of the new-type Q ball is given by [27, 28] $$Q _ { N } & = \beta _ { N } \left ( \frac { \phi _ { r o t } } { m _ { 3 / 2 } } \right ) ^ { 2 },$$ where β N glyph[similarequal] 0 02 [25]. . The properties of the new-type Q ball are as follows: $$M _ { Q } \simeq m _ { 3 / 2 } Q _ { N },$$ $$R _ { Q } \simeq | K | ^ { - 1 / 2 } m _ { 3 / 2 } ^ { - 1 },$$ $$\omega _ { Q } \simeq m _ { 3 / 2 },$$ $$\phi _ { Q } \simeq m _ { 3 / 2 } Q _ { N } ^ { 1 / 2 }.$$ The charge Q is in fact the Φ-number, and relates to the baryon number of the Q ball as $$B = b Q,$$ where b is the baryon number of Φ-particle. For example, b = 1 3 for the / udd direction. The Q ball is stable against the decay into nucleons for large field amplitude when the charge is very large. Since ω Q corresponds to the effective mass of the field inside the Q ball, the stability condition is given by ω Q &lt; m D , where m D is the mass of the decay particles. The new-type Q ball is generally stable against the decay into nucleons, except for the gravitino mass larger than that of nucleons. On the other hand, the gauge-mediation type Q ball is stable for Q G &gt; Q D , where $$Q _ { \text{D} } \equiv 4 \pi ^ { 4 } \zeta ^ { 4 } \left ( \frac { M _ { F } } { b m _ { N } } \right ) ^ { 4 } \simeq 1. 2 \times 1 0 ^ { 3 0 } \left ( \frac { \zeta } { 2. 5 } \right ) ^ { 4 } \left ( \frac { b } { 1 / 3 } \right ) ^ { - 4 } \left ( \frac { M _ { F } } { 1 0 ^ { 6 } \text{ GeV} } \right ) ^ { 4 },$$ with m N being the nucleon mass. Since we need unstable Q ball to produce the baryon number of the universe, we consider the gauge-mediation type Q ball with the charge smaller than Q D . The unstable gauge-mediation type Q ball decays into baryons through its surface [26]. 5 The decay rate is reestimated in Refs.[6, 23] as $$\Gamma _ { Q } \simeq N _ { q } \frac { 1 } { Q _ { G } } \frac { \omega _ { Q } ^ { 3 } } { 1 2 \pi ^ { 2 } } 4 \pi R _ { Q } ^ { 2 },$$ where N q is the number of the decay quarks. Then the temperature at the decay is obtained as $$T _ { D } = \left ( \frac { 9 0 } { 4 \pi ^ { 2 } N _ { D } } \right ) ^ { 1 / 4 } \sqrt { \Gamma _ { Q } ^ { ( 9 ) } M _ { P } } \simeq 1 6 \, \text{MeV} \left ( \frac { \zeta } { 2. 5 } \right ) ^ { 1 / 2 } \left ( \frac { N _ { q } } { 1 8 } \right ) ^ { 1 / 2 } \left ( \frac { N _ { D } } { 1 0. 7 5 } \right ) ^ { - 1 / 4 } \left ( \frac { M _ { F } } { 1 0 ^ { 6 } \, \text{GeV} } \right ) ^ { 1 / 2 } \left ( \frac { Q _ { G } } { 1 0 ^ { 2 4 } } \right ) ^ { - 5 / 8 }, \quad ( 2 8 )$$ where N D is the relativistic degrees of freedom at the decay time. Since the decay must take place before the BBN, the charge of the gauge-mediation type Q ball has the upper limit. ## V. BARYON ASYMMETRY AND THE Q BALL DARK MATTER We consider two n = 4 flat directions with different values of λ . The direction with smaller λ forms the new-type Q balls to be the dark matter of the universe, while that with larger λ becomes the unstable gauge-mediation type Q balls to produce baryon asymmetry in the universe. The fields starts their oscillations when the Hubble-induced mass term V H becomes smaller than V ✘✘ ✘ SUSY . The amplitudes at the onset of oscillations are thus calculated as $$\phi _ { G, o s c } = \sqrt { 2 } \lambda _ { G } ^ { - \frac { 1 } { n - 1 } } \left ( M _ { F } ^ { 2 } M _ { P } ^ { n - 3 } \right ) ^ { \frac { 1 } { n - 1 } } \underset { ( n = 4 ) } { = } \sqrt { 2 } \lambda _ { G } ^ { - \frac { 1 } { 3 } } \left ( M _ { F } ^ { 2 } M _ { P } \right ) ^ { \frac { 1 } { 3 } },$$ $$\phi _ { N, o s c } = \sqrt { 2 } \lambda _ { N } ^ { - \frac { 1 } { n - 2 } } \left ( m _ { 3 / 2 } M _ { P } ^ { n - 3 } \right ) ^ { \frac { 1 } { n - 2 } } \underset { \left ( n = 4 \right ) } { = } \sqrt { 2 } \lambda _ { N } ^ { - \frac { 1 } { 2 } } \left ( m _ { 3 / 2 } M _ { P } \right ) ^ { \frac { 1 } { 2 } },$$ for the gauge-mediation type and the new type, respectively. Therefore, the charges of both types of the Q balls are obtained as $$Q _ { G } = \beta _ { G } \left ( \frac { \phi _ { G, o s c } } { M _ { F } } \right ) ^ { 4 } = \frac { 4 \beta _ { G } } { \lambda _ { G } ^ { \frac { 4 } { n - 1 } } } \left ( \frac { M _ { P } } { M _ { F } } \right ) ^ { \frac { 4 ( n - 3 ) } { n - 1 } } _ { \substack { ( n = 4 ) \\ \lambda _ { G } ^ { \frac { 4 } { n - 1 } } } } = \frac { 4 \beta _ { G } } { \lambda _ { G } ^ { \frac { 4 } { n - 1 } } } \left ( \frac { M _ { P } } { M _ { F } } \right ) ^ { \frac { 4 } { n } } \quad ( \text{gauge-mediation type} ), \quad \quad ( 3 1 )$$ $$Q _ { N } = \beta _ { N } \left ( \frac { \phi _ { N, \text{osc} } } { m _ { 3 / 2 } } \right ) ^ { 2 } = \frac { \lambda } { \lambda _ { N } ^ { \frac { 2 } { n - 2 } } } \left ( \frac { M _ { P } } { m _ { 3 / 2 } } \right ) ^ { \frac { 2 ( n - 3 ) } { n - 2 } } = \frac { 2 \beta _ { N } } { \lambda _ { N } } \left ( \frac { M _ { P } } { m _ { 3 / 2 } } \right ) \quad ( \text{new type} ).$$ 5 The abundance of next-to-LSPs produced by the Q -ball decay is many orders of magnitude smaller than the BBN bound in our successful scenario. Since all the charges (the baryon numbers) are released by the decay of the gauge-mediation type Q balls, the baryon number is given by $$Y _ { b } = \frac { 9 } { 8 \sqrt { 2 } } b \frac { T _ { \text{RH} } \phi _ { \text{G,osc} } ^ { 3 } } { M _ { F } ^ { 2 } M _ { P } ^ { 2 } } = \frac { 9 } { 4 } b \lambda _ { G } ^ { - \frac { 3 } { n - 1 } } T _ { \text{RH} } M _ { F } ^ { - \frac { 2 ( n - 4 ) } { n - 1 } } M _ { P } ^ { \frac { n - 7 } { n - 1 } } \stackrel { n - 7 } { = } \frac { 9 } { 4 } b \lambda _ { G } ^ { - 1 } T _ { \text{RH} } M _ { P } ^ { - 1 },$$ where T RH is the reheating temperature after inflation. In this n = 4 case, T RH is independent of M F and solely determined by λ G as $$T _ { \text{RH} } = \frac { 4 } { 9 } b ^ { - 1 } \lambda _ { \text{G} } Y _ { b } M _ { \text{P} } = 3. 2 \times 1 0 ^ { 4 } \text{ GeV} \left ( \frac { b } { 1 / 3 } \right ) ^ { - 1 } \left ( \frac { \lambda _ { \text{G} } } { 1 0 ^ { - 4 } } \right ) \left ( \frac { Y _ { b } } { 1 0 ^ { - 1 0 } } \right ).$$ At the same time, the dark matter is composed by stable new-type Q balls. Their abundance is estimated as $$\frac { \rho _ { Q } } { s } = \frac { 9 } { 8 } T _ { \text{RH} } \left ( \frac { \phi _ { N, \text{osc} } } { M _ { \text{P} } } \right ) ^ { 2 } = \frac { 9 } { 4 } \lambda _ { N } ^ { - \frac { 2 } { n - 2 } } T _ { \text{RH} } \left ( \frac { m _ { 3 / 2 } } { M _ { \text{P} } } \right ) ^ { \frac { 2 } { n - 2 } } = \frac { 9 } { 4 } \lambda _ { N } ^ { - 1 } T _ { \text{RH} } \left ( \frac { m _ { 3 / 2 } } { M _ { \text{P} } } \right ),$$ which is rewritten as $$m _ { 3 / 2 } = \left ( \frac { 2 } { 3 } \right ) ^ { n - 2 } \lambda _ { N } \left ( \frac { \rho _ { Q } } { s } \right ) ^ { \frac { n - 2 } { 2 } } T _ { R H } ^ { - \frac { n - 2 } { 2 } } M _ { \mathrm P } \underset { ( n = 4 ) } { = } \left ( \frac { 2 } { 3 } \right ) ^ { 2 } \lambda _ { N } \left ( \frac { \rho _ { Q } } { s } \right ) \frac { M _ { \mathrm P } } { T _ { R H } }.$$ We must have $$\frac { \rho _ { Q } } { s } = 5. 4 m _ { N } Y _ { b } = 5. 4 \times 1 0 ^ { - 1 0 } \text{ GeV} \left ( \frac { Y _ { b } } { 1 0 ^ { - 1 0 } } \right ),$$ in order to have right amount of the dark matter. For explaining both the baryon asymmetry and the dark matter of the universe, we have $$m _ { 3 / 2 } = 1. 8 \, \text{MeV} \left ( \frac { b } { 1 / 3 } \right ) \left ( \frac { \lambda _ { N } } { 1 0 ^ { - 7 } } \right ) \left ( \frac { \lambda _ { G } } { 1 0 ^ { - 4 } } \right ) ^ { - 1 },$$ where we insert Eqs.(34) and (37) with n = 4 into Eq.(36). We call this the B-DM relation in the following. ## VI. CONSTRAINTS ON MODEL PARAMETERS AND DETECTION OF DARK MATTER Q BALLS Let us now investigate how the B-DM relation (38) is satisfied. We consider two flat directions with different values of λ . Since isocurvature fluctuations should be suppressed, it is necessary to have λ N &lt; λ G &lt; ∼ 10 -4 . There are several conditions to be hold for successful scenario. (a) The flat direction with λ G disintegrates into the gauge-mediation type Q balls, so that φ G osc , &lt; φ eq , while (b) the new-type Q balls form from the direction with λ N for φ N osc , &gt; φ eq . From Eqs.(7) and (29), the condition (a) results in $$m _ { 3 / 2 } < \lambda _ { G } ^ { \frac { 1 } { n - 1 } } \left ( \frac { M _ { F } ^ { 2 ( n - 2 ) } } { M _ { P } ^ { n - 3 } } \right ) ^ { \frac { 1 } { n - 1 } } \underset { ( n = 4 ) } { = } 3. 4 7 \, G e V \left ( \frac { M _ { F } } { 1 0 ^ { 6 } \, G e V } \right ) ^ { 4 / 3 } \left ( \frac { \lambda _ { G } } { 1 0 ^ { - 4 } } \right ) ^ { 1 / 3 },$$ while the condition (b) leads to $$m _ { 3 / 2 } > \lambda _ { N } ^ { \frac { 1 } { n - 1 } } \left ( \frac { M _ { F } ^ { 2 ( n - 2 ) } } { M _ { P } ^ { n - 3 } } \right ) ^ { \frac { 1 } { n - 1 } } = \underset { ( n = 4 ) } { 0. 3 4 7 } \, \text{GeV} \left ( \frac { M _ { F } } { 1 0 ^ { 6 } \, \text{GeV} } \right ) ^ { 4 / 3 } \left ( \frac { \lambda _ { N } } { 1 0 ^ { - 7 } } \right ) ^ { 1 / 3 }.$$ The gauge-mediation type Q ball (c) should be unstable and (d) decays before the BBN. The former condition is expressed, from Eqs.(15) and (18), as $$M _ { F } > \left ( \frac { b \beta _ { G } ^ { 1 / 4 } } { \pi \zeta } \right ) ^ { \frac { n - 1 } { 2 ( n - 2 ) } } \lambda _ { G } ^ { - \frac { 1 } { 2 ( n - 2 ) } } \left ( m _ { N } ^ { n - 1 } M _ { P } ^ { n - 3 } \right ) ^ { \frac { 1 } { 2 ( n - 2 ) } } \underset { ( n = 4 ) } { = } 9. 1 6 \times 1 0 ^ { 3 } \, \text{GeV} \left ( \frac { \lambda _ { G } } { 1 0 ^ { - 4 } } \right ) ^ { - 1 / 4 } \left ( \frac { b } { 1 / 3 } \right ) ^ { 3 / 4 }, \quad ( 4 1 )$$ with β G = 6 × 10 -4 and ζ = 2 5 being used. The latter condition comes from . T D &gt; 1 MeV, which leads to $$M _ { F } > 7. 1 9 \times 1 0 ^ { 2 } \, \text{GeV} \left ( \frac { \lambda _ { G } } { 1 0 ^ { - 4 } } \right ) ^ { - 5 / 8 },$$ for n = 4, from Eqs.(28) and (15). Since Eqs.(41) and (42) have different dependences on λ G , the latter gives more stringent constraint for λ G &lt; . 1 13 × 10 -7 ( b 1 / 3 ) -2 . In addition, (e) the new-type Q ball must be stable to be the dark matter of the universe. From Eq.(23), ω Q &lt; m D = bm N is nothing but the upper bound on the gravitino mass: $$m _ { 3 / 2 } < 0. 3 3 3 \text{ GeV} \left ( \frac { b } { 1 / 3 } \right ).$$ There is also the condition (6). The upper bound is not restrictive, but the lower bound limits the smaller m 3 / 2 for λ G &lt; ∼ 10 -7 , as seen in Fig. 2. In Fig. 2, we display the B-DM relation (38) in the cyan line with λ G /λ N = 10 . Also shown are the conditions (a) 3 in red lines, (b) in blue lines, (c) in green lines, (d) in orange lines, and (e) in a brown line. Solid, dotted, and dashed lines correspond for λ G = 10 -4 , 10 -7 , and 10 -9 , respectively. Varying the value of λ N , we obtain the allowed range for B-DM relation in red, green, and blue hatched regions for λ G = 10 -4 , 10 -7 , and 10 -9 , respectively. Notice that the condition (40) depends on λ N so that the allowed range of M F for the B-DM relation (38) becomes narrower as λ N grows larger. This is shown by black lines in the figure. The allowed region becomes smaller as λ G gets smaller, and disappears for λ G &lt; 1 46 . × 10 -11 . One can see that the allowed region appears only for 0.404 MeV &lt; m 3 / 2 &lt; 0.33 GeV, and typically for 4 × 10 4 GeV &lt; M ∼ F &lt; ∼ 10 7 GeV. FIG. 2: B-DM relation (38) is displayed in a cyan line for λ G /λ N = 10 . There are the conditions (a) Eq.(39) in red lines, (b) 3 Eq.(40) in blue lines, (c) Eq.(41) in green lines, (d) Eq.(42) in orange lines, and (e) Eq.(43) in a brown line. Also shown is the constraint (6) in magenta lines. We obtain red, green, and blue hatched regions respectively for λ G = 10 -4 , 10 -7 , and 10 -9 with varying λ N . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1176v2-figure-77eef9ce-f953-4054-acf5-73c9822aaf04.jpg) Now we estimate how large the new-type Q ball will be for our successful scenario. The charge of the new-type Q ball is calculated as $$Q _ { N } \simeq 1. 0 6 \times 1 0 ^ { 2 8 } \left ( \frac { b } { 1 / 3 } \right ) \left ( \frac { \lambda _ { G } } { 1 0 ^ { - 4 } } \right ) ^ { - 1 } \left ( \frac { m _ { 3 / 2 } } { 0. 4 0 4 \, \text{MeV} } \right ) ^ { - 2 },$$ from Eqs.(32) and (38). We plot the expected region of the charge of the dark matter Q ball for 10 -4 &lt; λ ∼ G &lt; ∼ 10 -11 in Fig. 3. We display the observationally excluded region by Baksan in green lines (lower-left region is excluded) [27, 29]. The recent IceCube experiment reported the limits on subrelativistic magnetic monopoles [30], which can be applied to the Q -ball search. Since we do not know the detection efficiency η , we show the constraints for η = 1 (0.1) in blue solid (dashed) lines. We can see that the observation has just stepped into the theoretically expected region, and we can imagine that the dark matter Q balls could be detected directly in the future, which will be a smoking gun for the Affleck-Dine mechanism. FIG. 3: Theoretically expected region for the new-type Q ball as dark matter. Isoλ G contours are shown in red lines. Observationally excluded region by the Baksan experiment is shown in green lines, while that by the IceCube is shown in blue lines. (Updated from the published version: Flux limit is extended to larger cross section for the IceCube data.) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1176v2-figure-abce6eb4-3b3b-43de-9d22-c288c4c87283.jpg) ## VII. CONCLUSION We have investigated the variant of the Affleck-Dine mechanism in high-scale inflation. The scenario is that one flat direction is responsible for the baryon asymmetry of the universe, while another explains the dark matter in the gauge-mediated SUSY breaking in high-scale inflation. The former disintegrates into the gauge-mediation type Q balls, which are unstable and decay into baryons. The latter forms the new-type Q balls to become dark matter of the universe. Large isocurvature fluctuations are usually produced in high-scale inflation. In order to suppress them, the flat directions must have amplitudes as large as M P during inflation. This is achieved by small coupling constants λ in nonrenormalizable superpotential (1) such that λ &lt; ∼ 10 -4 . We have found that the scenario actually works for two n = 4 directions with different sizes of λ . It is necessary for successful scenario to have 10 -11 &lt; λ ∼ G &lt; ∼ 10 -4 . In this case, 4 × 10 4 GeV &lt; M ∼ F &lt; ∼ 10 7 GeV, MeV &lt; m ∼ 3 / 2 &lt; ∼ GeV, and 10 23 &lt; Q ∼ N &lt; ∼ 10 31 . Smallest Q N region may already be excluded, but the dark matter Q ball with Q &gt; ∼ 10 24 could be detected in the future by the IceCube-like detector. ## Acknowledgments We thank Masahiro Ibe and Tsutomu Yanagida for useful discussion. The work is supported by Grant-in-Aid for Scientific Research 23740206 (S.K.) and 25400248 (M.K.) from the Ministry of Education, Culture, Sports, Science, and Technology in Japan, and also by World Premier International Research Center Initiative (WPI Initiative), MEXT, Japan. - [1] I. Affleck and M. Dine, Nucl. Phys. B 249 , 361 (1985); M. Dine, L. Randall and S. D. Thomas, Nucl. Phys. B 458 , 291 (1996). - [2] A. Kusenko and M. E. Shaposhnikov, Phys. Lett. B 418 , 46 (1998). - [3] K. Enqvist and J. McDonald, Phys. Lett. B 425 , 309 (1998); Nucl. Phys. B 538 , 321 (1999). - [4] S. Kasuya and M. Kawasaki, Phys. Rev. D 61 , 041301(R) (2000). - [5] S. Kasuya and M. Kawasaki, Phys. Rev. D 84 , 123528 (2011); - [6] S. Kasuya, M. Kawasaki and M. Yamada, Phys. Lett. B 726 , 1 (2013). - [7] I. M. Shoemaker and A. Kusenko, Phys. Rev. D 80 , 075021 (2009); - F. Doddato and J. McDonald, JCAP 1106 , 008 (2011); JCAP 1206 , 031 (2012); JCAP 1307 , 004 (2013). - [8] S. Kasuya, E. Kawakami and M. Kawasaki, arXiv:1202.4067 [hep-ph]. - [9] S. Kasuya and M. Kawasaki, Phys. Rev. D 64 , 123515 (2001). - [10] M. Laine and M. E. Shaposhnikov, Nucl. Phys. B 532 , 376 (1998). - [11] S. Kasuya and M. Kawasaki, Phys. Rev. D 89 , 103534 (2014). - [12] T. Gherghetta, C. F. Kolda and S. P. Martin, Nucl. Phys. B 468 , 37 (1996). - [13] P. A. R. Ade et al. [BICEP2 Collaboration], Phys. Rev. Lett. 112 , 241101 (2014). - [14] J. Yokoyama, Astropart. Phys. 2 , 291 (1994). - [15] K. Enqvist and J. McDonald, Phys. Rev. Lett. 83 , 2510 (1999); Phys. Rev. D 62 , 043502 (2000). - [16] M. Kawasaki and F. Takahashi, Phys. Lett. B 516 , 388 (2001). - [17] S. Kasuya, M. Kawasaki and F. Takahashi, JCAP 0810 , 017 (2008). - [18] K. Harigaya, A. Kamada, M. Kawasaki, K. Mukaida and M. Yamada, Phys. Rev. D 90 , 043510 (2014). - [19] A. de Gouvea, T. Moroi and H. Murayama, Phys. Rev. D 56 , 1281 (1997). - [20] K. Hamaguchi, M. Ibe, T. T. Yanagida and N. Yokozaki, Phys. Rev. D 90 , no. 1, 015027 (2014). - [21] J. L. Feng, Z. Surujon and H. B. Yu, Phys. Rev. D 86 , 035003 (2012); N. Okada, arXiv:1205.5826 [hep-ph]. - [22] P. A. R. Ade et al. [Planck Collaboration], Astron. Astrophys. 571 , A16 (2014); Astron. Astrophys. 571 , A22 (2014). - [23] M. Kawasaki and M. Yamada, Phys. Rev ˙ D 87 , 023517 (2013). - [24] J. Hisano, M. M. Nojiri and N. Okada, Phys. Rev. D 64 , 023511 (2001). - [25] T. Hiramatsu, M. Kawasaki and F. Takahashi, JCAP 1006 , 008 (2010). - [26] A. G. Cohen, S. R. Coleman, H. Georgi and A. Manohar, Nucl. Phys. B 272 , 301 (1986). - [27] S. Kasuya and M. Kawasaki, Phys. Rev. Lett. 85 , 2677 (2000). - [28] S. Kasuya and M. Kawasaki, Phys. Rev. D 62 , 023512 (2000). - [29] J. Arafune, T. Yoshida, S. Nakamura and K. Ogure, Phys. Rev. D 62 , 105013 (2000); - A. Kusenko, V. Kuzmin, M. E. Shaposhnikov and P. G. Tinyakov, Phys. Rev. Lett. 80 , 3185 (1998). - [30] M. G. Aartsen et al. [IceCube Collaboration], arXiv:1309.7007 [astro-ph.HE]; Eur. Phys. J. C 74 , 2938 (2014).
10.1016/j.physletb.2014.10.059
[ "Shinta Kasuya", "Masahiro Kawasaki" ]
2014-08-06T03:42:21+00:00
2015-02-23T01:56:01+00:00
[ "hep-ph", "astro-ph.CO" ]
Q-ball dark matter and baryogenesis in high-scale inflation
We investigate the scenario that one flat direction creates baryon asymmetry of the unverse, while Q balls from another direction can be the dark matter in the gauge-mediated supersymmetry breaking for high-scale inflation. Isocurvature fluctuations are suppressed by the fact that the Affleck-Dine field stays at around the Planck scale during inflation. We find that the dark matter Q balls can be detected in IceCube-like experiments in the future.
1408.1177v1
## Complex-based analysis of dysregulated cellular processes in cancer Sriganesh Srihari ∗ 1 , Piyush B. Madhamshettiwar , Sarah Song , Chao Liu , Peter T. Simpson , 1 1 1 2 Kum Kum Khanna , and Mark A. Ragan 3 ∗ 1 1 Institute for Molecular Bioscience, The University of Queensland, St. Lucia, Queensland 4072, Australia. 2 The University of Queensland Centre for Clinical Research, Brisbane, Queensland 4006, Australia. 3 QIMR-Berghofer Institute of Medical Research, Brisbane, Queensland 4006, Australia. Email: SS1 - [email protected]; PBM - [email protected]; SS2 - [email protected]; CL -∗ [email protected]; PTS - [email protected]; KKK - [email protected]; MAR ∗ - [email protected]; ∗ Corresponding author ## Abstract Background: Differential expression analysis of (individual) genes is often used to study their roles in diseases. However, diseases such as cancer are a result of the combined effect of multiple genes. Gene products such as proteins seldom act in isolation, but instead constitute stable multi-protein complexes performing dedicated functions. Therefore, complexes aggregate the effect of individual genes (proteins) and can be used to gain a better understanding of cancer mechanisms. Here, we observe that complexes show considerable changes in their expression, in turn directed by the concerted action of transcription factors (TFs), across cancer conditions. We seek to gain novel insights into cancer mechanisms through a systematic analysis of complexes and their transcriptional regulation. Results: We integrated large-scale protein-interaction (PPI) and gene-expression datasets to identify complexes that exhibit significant changes in their expression across different conditions in cancer. We devised a log-linear model to relate these changes to the differential regulation of complexes by TFs. The application of our model on two case studies involving pancreatic and familial breast tumour conditions revealed: (i) complexes in core cellular processes, especially those responsible for maintaining genome stability and cell proliferation ( e.g. DNA damage repair and cell cycle) show considerable changes in expression; (ii) these changes include decrease and countering increase for different sets of complexes indicative of compensatory mechanisms coming into play in tumours; and (iii) TFs work in cooperative and counteractive ways to regulate these mechanisms. Such aberrant complexes and their regulating TFs play vital roles in the initiation and progression of cancer. Conclusions: Complexes in core cellular processes display considerable decreases and countering increases in expression, strongly reflective of compensatory mechanisms in cancer. These changes are directed by the concerted action of cooperative and counteractive TFs. Our study highlights the roles of these complexes and TFs and presents several case studies of compensatory processes, thus providing novel insights into cancer mechanisms. Availability: http://www.bioinformatics.org.au/tools-data - CONTOUR 2 v ## Background Transcriptional regulation is a fundamental mechanism by which all cellular systems mediate the activation or repression of genes, thereby setting up striking patterns of gene expression across diverse cellular conditions -e.g. across cell-cycle phases [1-3], normal vs cancer states [3] or stress conditions [4]. Such regulation of gene expression is executed by the concerted action of transcription factors (TFs) that bind to specific regulatory DNA sequences associated with target genes [5,6]. Deciphering the roles of TFs is a significant challenge and has been the focus of numerous studies, with great interest being recently shown in cancer [3, 4,7-9]. For example, Bar-Joseph et al. [3] identified periodically expressed cell-cycle genes in human foreskin fibroblasts to understand their differential regulation between normal and cancer conditions. Nebert [7] surveyed TF activities in cancer, emphasizing the roles of TFs as proto-oncogenes (gain-of-function) that serve as accelerators to activate the cell cycle, and as tumour suppressors (loss-of-function) that serve as brakes to slow the growth of cancer cells. Darnell [8] classified TFs having cancerous or oncogenic potential into three main kinds - steroid receptors ( e.g. oestrogen receptors in breast cancer and androgen receptors in prostate cancer), resident nuclear proteins activated by serine kinase cascades ( e.g. JUN and FOS), and latent cytoplasmic factors normally activated by receptor-ligand interaction at the cell surface ( e.g. STATs and NF B). Darnell [8] also discussed the signalling pathways of these TFs (including Wntκ β -catenin, Notch and Hedgehog signalling) as potential drug targets in cancer. Karamouzis and Papavassiliou [9] discussed rewiring of transcriptional regulatory networks in breast tumours focusing on subnetworks of estrogen receptor (ERs) and epidermal growth factor receptor (EGFRs) family members. Most studies focus on transcriptional regulation of individual target genes. However, diseases such as cancer are a result of the combined effect of multiple genes. Gene products such as proteins seldom act in isolation, but instead physically interact to constitute complexes that perform specialized functions. Studying protein complexes therefore provides an aggregative or 'systems level' view of gene function and regulation than studying individual proteins (genes). Here we integrate large-scale protein-interaction (PPI) and gene-expression datasets to examine the differential regulation of complexes across cancer conditions. ## An initial analysis We compiled a list of protein complexes by clustering a network of human PPIs. Co-functional (interacting) proteins are encoded by genes showing high mRNA co-expression [12, 13]. Therefore, we quantified the 'functional activity' for each of these complexes by aggregating pairwise co-expression values between their constituent proteins. Analysis for two pancreatic-tissue conditions viz normal and ductal adenocarcinoma (PDAC) tumour revealed significant changes in co-expression for these complexes between the two conditions. For example (Figure 1), CHUK-ERC1-IKBKB-IKBKG showed a change in co-expression, interestingly coinciding with changes in its transcriptional regulation by the NF κ B-family of TFs. This complex constitutes the serine/threonine kinase family, while the TFs play essential roles in NF κ B signalling pathway (www.genecards.org) [14], which are implicated in PDAC [15,16]. Based on these observations, here we seek to understand differential co-expression of complexes and its relationship with differential regulation by TFs between cancer conditions. Therefore we: - · devise a computational model to identify complexes showing significant differential co-expression and the TFs regulating these complexes; and - · apply the model on two case studies - normal vs PDAC tumour and BRCA1 vs BRCA2 familial breast tumour conditions - to decipher their roles in these tumours. In summary (see Methods for details) we compute co-expression values for each of the complexes under different cancer conditions. We then introduce a log-linear model to relate changes in co-expression of complexes to changes in their regulation by TFs between these conditions. We apply the model to identify influential TFs and complexes and validate their roles in cancer. ## Results ## Experimental datasets PPI data: We gathered Homo sapiens PPIs identified from multiple low- and high-throughput experiments deposited in Biogrid (v3.1.93) [23] and HPRD (2009 update) [24]. To minimize false positives in these PPI datasets, we employed as scoring scheme Iterative-CD [64] (with 40 iterations) to assign a reliability score (between 0 and 1) to every interaction, and then discarded all low-scoring interactions ( &lt; 0 20) to build a . dense high-quality PPI network of 29600 interactions among 5824 proteins (average node degree 10.16). Gene expression data: We have performed one of the largest gene expression profiling of familial breast tumours ( n = 74) and stratified them based on BRCA mutation status as BRCA1-, BRCA2- and nonBRCA1/2 tumours [21]. Among these, BRCA1 and BRCA2 tumours are phenotypically most different [22] and we consider these two for our analysis here; our dataset contains 19 BRCA1 and 30 BRCA2 expression samples (GEO accession GSE19177). In addition, we also gathered expression samples from pancreatic tumours - normal and PDAC matched (39 in each) - from the Badea et al. study [25] (GSE15471). Sporadic breast tumours constitute 93-95% of all breast tumours and most studies classify these into the four molecular subtypes, luminal-A, luminal-B, basal-like and HER2-enriched [18-20]. Broadly, basal-like tumours do not express the ER, PR and HER2 receptors, and exhibit high aggressiveness and poor survival attributed to distant metastasis, compared to luminal tumours. However, much less is known about familial tumours (the remaining 5-7%), although studies [20-22] have noted that BRCA1 tumours are predominantly basal-like while BRCA2 tumours are more hetergeneous and may be HER2-enriched or luminal-like. Pancreatic tumours, on the other hand, are more uniform with PDAC accounting for most (95%) pancreatic tumours and is predominantly characterized by dysfunctioning (by mutation) of the KRAS oncogene and of the CDKN2A, SMAD4 and TP53 tumour-suppressor genes [16]. Transcription factors: We gathered 1391 TFs from Vaquerizas et al . [26], manually curated from a combined assessment of DNA-binding capabilities, evolutionary conservation and integration of multiple sources. Benchmark complexes: For independent validation, we used manually curated human complexes from CORUM [27], a total of 1843 complexes of which we used 722 having size at least 4. Benchmark genes and TFs in cancer: For validation we used known (mutation-driver) genes (total 118) from COSMIC [28] and known TFs (total 82) in cancer from [29]. ## Analysis of PPI networks highlights considerable rewiring between tumour conditions By integrating PPI and gene expression datasets (see Methods) we obtained two pairs of conditional PPI networks normal-PDAC for pancreatic and BRCA1-BRCA2 for breast tumours. Figure 2 shows the co-expression-wise distribution for protein pairs in these networks. Normal vs PDAC displayed striking differences in these distributions (KS test: D NP = 23 11 . &gt; K α =0 05 . = 1 36), reflecting considerable rewiring . of PPIs. PDAC showed significant loss in co-expression for both positively co-expressed as well as negatively co-expressed interactions compared to normal, indicative of both disruption as well as emergence of interactions in the tumour. Such rewiring has also been noted in earlier studies [30,31]. Strikingly enough BRCA1 vs BRCA2 tumours also showed significant differences in PPI distributions (Figure 2) (KS test: D B 12 = 22 85 . &gt; K α =0 05 . = 1 36), reflecting considerable differences in . PPI wiring between the two breast tumours. BRCA1 tumours displayed higher co-expression compared to BRCA2 tumours, ∼ 15700 PPIs with higher correlations. DAVID-based [32] functional analysis of these rewired interactions (∆ ≥ 0 50) showed significant ( . p ≤ 0 001) enrichment for the . Biological Process (BP) terms - Cell cycle, Chromatin organisation, DNA repair and RNA splicing, indicating considerable rewiring in core cellular processes responsible for genome stability. Among these were interactions involving the tumour suppressors TP53 and SMAD4 in PDAC, which are known genes mutated in the tumour, and the DNA double-strand break (DSB) repair proteins BRE and BRCC3 along with BRCA1, BRCA2 and TP53, in breast tumours. ## Analysis of complexes highlights disruption to core cellular mechanisms in tumours Matching of complexes using t J = 0 67 and . δ = 0 10 (Methods) resulted in a total of 256 and 277 matched . complexes ( M ) for normal-PDAC and BRCA1-BRCA2 conditions, respectively (Table 1). The co-expressionwise distributions (Figure 3) revealed significant differences for both normal vs PDAC as well as BRCA1 vs BRCA2conditions (KS test: D NP = 1 69 . &gt; K α =0 05 . = 1 36 in pancreatic and . D B 12 = 5 48 . &gt; K α =0 05 . = 1 36 . in breast), indicating that rewiring in PPI networks had considerable impact on these complexes. Overall, we noticed considerable drop in co-expression for PDAC vis-a-vis normal, whereas BRCA1 tumours showed higher co-expression vis-a-vis BRCA2 tumours (Figures 3 and 4). These differences were larger towards the higher co-expression ranges which correspond better to active complexes (Figure 3), indicating that cellular functions were considerably impacted in these tumours. These observations were reproducible using an independent set of complexes from CORUM (Figures 3 and 4) and were significantly ( p &lt; 0 001) greater . than expected by random (using 500 random complexes generated 1000 times). DAVID-based analysis for complexes displaying changes ≥ 0 4 indicated significant ( . p &lt; 0 001) enrich-. ment for core cellular pathways involved in genome stability including Cell cycle and DNA repair (Table 2). The complexes in PDAC were enriched for TGFβ , Wnt and NF κ B signalling, all of which are implicated in pancreatic cancer [16, 36-38]. The complexes in breast tumours reflected aberration in Homologous recombination (HR), a key DSB-repair pathway which includes the breast cancer susceptibility genes BRCA1 and BRCA2. ## Analysis of complexes reveal compensatory mechanisms activated in tumours We next divided the set of matched complexes M into two subsets: - · M ′ - those with higher co-expression in normal vis-a-vis PDAC, or higher co-expression in BRCA1 tumours vis-a-vis BRCA2 tumours; and - · M ′′ - those with lower co-expression in normal vis-a-vis PDAC, or lower co-expression in BRCA1 tumours vis-a-vis BRCA2 tumours. Table 3 shows changes in co-expression (∆ C ) observed for M ′ and M ′′ . While most complexes showed a decrease in co-expression from normal to PDAC (159 out of 256) and from BRCA1 to BRCA2 tumours (225 out of 277), interestingly a considerable number of complexes showed an increase (96 and 52). But, the decrease was steeper compared to the increase (max: 0.969 vs 0.421 and 0.761 vs 0.543; avg: 0.336 vs 0.192 and 0.281 vs 0.197). Similar trends were observed using CORUM complexes and were significantly ( p &lt; 0 001) greater than expected by random. We suspect these observations are indicative of . compensatory mechanisms coming into play in these tumours, as explained below. In the classical work on 'hallmarks of cancer', Hanahan and Weinberg [33] describe seven to ten key distinguishing hallmarks of tumour cells, among which are limitless replicative potential and self-sufficiency in growth signals. Cellular mechanisms including cell cycle and DDR are considerably weakened in tumour cells, but these cells survive on last-standing mechanisms (weak links) to continue proliferation. This is due to the activation of compensatory or back-up mechanisms. Although these compensatory mechanisms cannot completely substitute for the weakened or disrupted ones, these are sufficient to enhance the survival of tumour cells [33,34]. Our analysis reflect such compensatory trends - a fraction of complexes showed increase in co-expression, but the increase was not as steep as the decrease for the remaining faction. However, a straightforward Gene Ontology analysis is too general to delineate the roles of the two factions because both originate from the same or similar processes. We therefore investigated a few specific cases (below). ## Examples of compensatory mechanisms and validation for roles in cancer Normal vs PDAC tumour (Figure 5a): DSB-repair functionality is severely impacted in PDAC [43,44], with inactivating mutations in RAD50 and NBS1 attributed to loss of DSB-repair functionality increasing the risk of pancreatic cancer [43]. DSBs are detected by the MRE11-RAD50-NBS1 (MRN) and Ku70/Ku80 (XRCC6/XRCC5) complexes in the HR and non-homologous end-joining (NHEJ) pathways, respectively. In HR, the repair process involves recruitment of the BRCA1-A complex (BRCA1-BARD1-FAM175A-UIMC1BRE-BRCC3-MERIT40) to sites of DSBs. We observed a decrease in co-expression for all the three complexes, indicating considerable weakening of the DSB machinery. On the other hand, we noticed an increase in co-expression for the single-strand break (SSB) and mismatch (MMR) repair complexes XRCC1-POLBPNKP-LIG3 and MSH6-MLH1-MLH2-PSM2-PCNA, respectively. The XRCC1 complex is responsible for SSB repair through sister chromatid exchange following DNA damage by ionizing radiation, while the MSH6 complex is involved in the recognition and repair of mispairs. Together these observations suggest the activation of SSB and MMR machinery compensating for the loss in DSB-repair machinery; such a functional relationship has been observed previously between DSB and SSB repair pathways [35]. The NF κ B signalling pathway has been strongly implicated in KRAS signalling and pancreatic tumorigenesis [39, 40]. Consistent with this, we noticed considerable changes in co-expression for several NF κ B complexes including the NF κ B1/REL family, which plays important roles in programmed cell death and proliferation control and is critical in tumour initiation and progression [40]. The calcium-binding proteins S100A2, S100A8 and S100A9 are known to modulate P53 activity [41] and their over-expression has been associated with metastatic phenotype of pancreatic cancer [36]. The inactivation of the RAS-associated RASSF1A and RASSF5 complexes, which act as tumour suppressors [42, 45], is frequent in pancreatic cancer [42]. The complex DDX20-GEMIN4-PPP4C-PPP4R2 associated with the SMN (survival of motor neuron), and SNAP23-STX4-VAMP3-VAMP8 associated with vesicular transport, docking and/or fusion of synaptic vesicles with the presynaptic membrane (www.genecards.org) [14], support tumorigenic invasion of neural cells in pancreatic cancer [38]. BRCA1 vs BRCA2 tumours (Figure 5b): We observed a lower co-expression for the MMR complex MLH1MSH6-MSH2-PMS2-PCNA in BRCA1 tumours compared to BRCA2 tumours; we think this is due to the parallel roles of BRCA1. BRCA1 has a key role in DSB repair, and BRCA1-deficient cells have defects in the two DSB repair pathways HR and NHEJ [46]. BRCA1 associates with PCNA and the mismatch repair proteins MSH2, MSH6 and MLH1 to form the BASC complex, a genome-surveillance complex required to sense and repair DNA damages [47], thereby also playing a role in the MMR pathway. On the other hand, BRCA2 has been associated with functions only in HR [49-52]. Therefore, we suspect that although MMR pathway is compensatorily activated in response to DSB-repair deficiency, BRCA1 tumours exhibit a weaker MMR pathway compared to BRCA2 tumours because of the direct involvement of BRCA1 in the MMR pathway. The DSS1 complex consisting of BRCA2, DSS1 and the integrator subunits mediates the 3'-end processing of small nuclear RNAs [48], and BRCA2 deficiency could result in a reduced stability of this complex. The expression of replication factor C complex (RFC2, RFC3 and RFC4) is indicative of proliferative potential (high cell division rates) of BRCA1 tumours. We noticed over-expression of this complex in BRCA1 compared to BRCA2 tumours. Finally, a considerable number of cancer genes from COSMIC Classic were represented in complexes showing changes ∆ C ≥ 0 10 (Figure 6), suggesting that differential co-expression of complexes is a strong . indicator of tumorigenic processes. ## Relating changes in co-expression complexes to their transcriptional regulation We computed Pearson and Spearman rank coefficients between changes in co-expression of complexes and their transcriptional regulation as follows. For each complex-pair { S , T s t } ∈ M S T ( , ), we measured its change in correlation ∆ C S , T ( s t ), and the total change in its regulation by TFs F f , ∑ ∆ R = ∑ k f =1 ∆ (( R S , T s t ) , F f ) (see Methods). This resulted in 226 complex-TF pairs in pancreatic and 241 in breast with non-zero ∆ C and ∆ R . Note that we lose at most 13% of complexes (pancreatic: 256 down to 226, breast: 277 down to 241) as a result of our requirement that TFs interact with at least one complexed protein (Methods). We observed positive Pearson and Spearman coefficients which were supported by CORUM complexes (Table 4). The Spearman coefficients were higher than Pearson in both cases, indicating a non-linear relationship; this supports our use of a log-linear model (Methods). ## Analysing influential TFs in pancreatic and breast tumours Table 5 lists the TFs with non-zero overall influence identified using our model (see Methods). Extrapolating from the simplified example (see Methods), the + and -signs can be interpreted as cooperative and counteractive action of TFs in regulating complexes. As these are overall influence values (that is, across all complexes and TFs), it is difficult to interpret this straightaway. Therefore, we restrict our focus to only STAT1 and STAT3. These two TFs are directly involved in pancreatic tumorigenesis and proliferation, and are thought to play opposite roles - while STAT1 promotes apoptosis, STAT3 is essential for the proliferation and survival of tumour cells [53]. Solving Equation 5 for STAT1 and STAT3 using only the subset of complexes they share (#90), we obtained γ (STAT1) = 1 714 and . γ (STAT3) = -1 582, . i.e. these are counteractive TFs (Methods). Their shared complexes were enriched for Cell cycle, Apoptosis and RAS signalling, consistent with the counteractive roles for STAT1 and STAT3 [53]. Differential expression analysis using limma [54] for normal vs PDACindicated that most of the influential TFs were significantly upor down-regulated (Table 5). But, a few influential TFs did not show such differential expression, for example heat shock factor-1 (HSF1). Investigation into the complexes regulated by HSF1 revealed considerable changes in co-expression for the cysteine-aspartic acid protease (caspase) family including CASP10-CASP8-FADD-FAS (from 1 28 to . -0 019), . documented in CORUM [27] under the functional category '40.10.02: Apoptosis'. Caspases are involved in signal transduction pathways of apoptosis, necrosis and inflammation (www.genecards.org) [14], and the role of HSF1 in regulating caspases thereby contributing to the pathogenesis of pancreatic cancer has been investigated [55]. In the case of BRCA1 vs BRCA2 tumours, only four of the influential TFs (GATA3, ESR1, FOXA1 and XBP1) were identified as differentially expressed. These four TFs are ER targets. BRCA1 tumours being predominantly basal-like, do not express ER and therefore show lower expression of ER targets compared to BRCA2 tumours, which are predominantly luminal-like and express ER [22]. Additionally, Joshi et al. [56], using a pathway-based analysis, have noted over-representation of ESR1, GATA3, MYC, XBP1, FOXA1 and MSX2 in luminal tumours, and NF κ B1, C/EBP β , FOXO3, JUN, POU2F3 and FOXO1 in basal-like tumours. We also found higher expression of the NF κ B-signalling TFs in BRCA1 tumours - the complex NF B1-NF B2-REL-RELA-RELB composed entirely of NF κ κ κ B TFs, showed a higher correlation in BRCA1 tumours than BRCA2 tumours. This is consistent with earlier findings [56, 57] that ER-negative tumours (BRCA1 tumours) display aberrant expression of NF κ B which makes these tumours highly aggressive. These observations also suggest that differential expression is not sensitive enough to identify all the genes (here, TFs) involved in tumours. Many of the TFs may not be differentially expressed themselves, but are differentially co-expressed with their target genes. One such possible situation occurs when the TFs themselves are not mutated or (epigenetically) silenced, but their target genes are. Finally, 12 of 37 TFs in pancreatic, and 14 of 40 TFs in breast tumours were among the 82 cancer TFs listed in [29]. DAVID-based functional analysis of TFs showed significant enrichment for several pathways in cancer ( p &lt; 1.1E-05, 23.1% genes), in particular the JAK-STAT pathway ( p &lt; 1.9E-02, 10.3% genes), a known driver pathway in cancer [53]. ## Discussion We had observed considerable PPI rewiring via differential co-expression analysis (Figure 2). In Figure 7, we now show the PPI network for normal vs PDAC with interactions weighted by the differential co-expression values. Figure 7a highlights the largest component (558 proteins and 519 interactions), which shows an overall decrease in co-expression. A considerable number of genes in this component are targets of ubiquitination (UBC) and sumoylation (SUMO1 and SUMO2) (Figure 7b) possibly causing their inactivation. However, there are several pockets showing increase in co-expression. Interestingly some of the genes topologically central to these pockets are known drug targets in PDAC (Figure 7c), e.g. PLK1 [58] and ANAX2 [59]. Similarly PELP1 which interacts directly with STAT3 and is responsible for cell proliferation and survival in several tumours [53], is likewise an identified drug target in PDAC [60]. A similar analysis in BRCA1 vs BRCA2 tumours highlighted increase in PPI co-expression around the mitotic regulators CDK1, CDC20 and CKS1B and the histone deacetylases HDAC1 and HDAC6; these are known drug targets for which inhibitors have been developed [61,62]. We clustered this normal vs PDAC network using MCL (inflation 2.3) both with and without the weights as input, and we observed that most clusters predominantly constitute only one kind of interactions, either those showing increase or decrease in co-expression - of the 30 clusters of sizes ≥ 4, 17 had at least two-third interactions showing decrease, 9 had at least two-third interactions showing increase. Among these, PLK1 belonged to a cluster in which all interactions showed an increase (Figure 7d). Similarly, in the BRCA1 vs BRCA2 network, CDK1 and CKS1B belonged to a cluster that showed an increase for all its interactions. These observations suggest that identifying clusters (complexes) that show increase in co-expression could identify new therapeutic targets in cancer. ## Conclusion Proteins seldom act in isolation, but instead interact to constitute specialized complexes driving key processes. We integrated PPI and gene-expression datasets to perform a large-scale unbaised evaluation of complexes in PDAC and familial breast tumours. These complexes showed considerable changes in expression, in particular decreases and countering increases, reflecting compensatory processes coming into play in the tumours. These complexes enable us to explain the possible underlying mechanisms, which is otherwise difficult only by analysing individual genes. These complexes are driven by the concerted action of influential TFs, which themselves work in cooperative and counteractive ways. Network-based analysis shows that complexes could have therapeutic potential in cancer. ## Methods The workflow for our computational approach is depicted in Figure 8, building on our earlier work [63]. From earlier work [63] (upper portion of Figure 8): We first assemble a high-confidence network of human PPIs to identify human protein complexes. These PPIs are largely devoid of contextual (conditional) information, and therefore we overlay mRNA expression data of the coding genes, assigning a confidence score to each protein pair under normal and tumour conditions. These scores reflect the presence or absence of interactions under these conditions. Complexes are extracted from these conditional PPI networks by network clustering; for a detailed background on PPI networks and the complex-extraction procedure, see [64-67]. In this work (lower portion of Figure 8): The contribution of this work is to relate changes in co-expression of complexes to changes in their transcriptional regulation by TFs between cancer conditions by introducing a log-linear model . This enables us to identify influential TFs and to validate their roles in cancer. This procedure is described in the following subsections. ## Measuring changes in co-expression of complexes between conditions Let H = ( V, E ) be the human PPI network, where V is the set of proteins and E is the set of interactions among these proteins, and S = { S , S 1 2 , .., S n } and T = { T , T 1 2 , ..., T m } be the sets of protein complexes extracted from H under any two conditions, say normal and tumour. For each complex S s ∈ S , we calculate its co-expression as $$C ( S _ { s } ) & = \frac { \sum _ { p, q \in S _ { s } } \rho ( p, q ) } { \binom { | S _ { s } | } { 2 } }, \\ \text{relation for the rrotain nair} ( n \, a ) \, \text{ The values are Fisher-transformed} \text{ given}$$ where ρ p, q ( ) is the Pearson correlation for the protein pair ( p, q ). The ρ -values are Fisher-transformed, given by z = 1 2 ln( 1+ ρ 1 -ρ ), which emphasizes the extreme ρ -values; for example, if ρ = +/-0 10 then . z = +/-0 043, . but if ρ = +/-0 99 then . z = +/-1 149. The co-expression values for . T are calculated similarly. To identify complexes that have changed co-expression between the conditions, we construct the set MS T ( , ) of matching complex pairs such that every pair ( S , T s t ) ∈ M S T ( , ) satisfies (a) a differential co-expression ∆ ( C S , T s t ) &gt; 0, and (b) a minimum Jaccard similarity in protein composition J S , T ( s t ) = | S s ∩ T t | | S s ∪ T t | ≥ t J , where $$\Delta C ( S _ { s }, T _ { t } ) = | C ( S _ { s } ) - C ( T _ { t } ) | \geq \delta > 0.$$ We expect complexes disrupted between the two conditions to have changed their co-expression (including complete dissolution or new formation) or have gained or lost a few proteins (rewiring within complexes) and therefore we use a δ &gt; 0 and a high t J . ## Relating changes in co-expression to changes in transcriptional regulation Let F = { F , F 1 2 , ..., F k } be the set of TFs. The regulation by a TF F f ∈ F of a complex S s is measured as $$R ( S _ { s }, F _ { f } ) = \frac { \sum _ { \{ p ; p \in S _ { s }, ( p, F _ { f } ) \in E \} } \rho ( p, F _ { f } ) } { | \{ p \colon p \in S _ { s }, ( p, F _ { f } ) \in E \} | }, \quad | \{ p \colon p \in S _ { s }, ( p, F _ { f } ) \in E \} | > 0,$$ where { p : p ∈ S , s ( p, F f ) ∈ E } is the set of proteins of S s with which F f physically interacts in the network H . The regulation by F f of the complexes T is measured similarly. Here we consider a TF to regulate a complex only if the TF physically interacts (in the PPI network) with at least one protein in the complex. From the classical view of transcriptional regulation, this assumption means that we consider a TF to regulate a set of genes encoding a complex only if the TF physically interacts with at least one protein from that complex. Although this assumption may be valid for only a subset of TFs or complexes, we employ it here to simplify our model. Indeed (see Results) we only lose at most 13% TF-complex pairs due to this assumption. We then relate changes in regulation by TFs to changes in co-expression of complexes for ( S , T s t ) ∈ MS T ( , ) between the two conditions using a log-linear model $$\Delta C ( S _ { s }, T _ { t } ) = \prod _ { f = 1 } ^ { k } \left ( \Delta R ( S _ { s }, T _ { t }, F _ { f } ) \right ) ^ { \gamma _ { f } },$$ where ∆ R S , T , F ( s t f ) = | R S , F ( s f ) -R T , F ( t f ) | is the differential regulation of the complex-pair ( S , T s t ) by F f , and γ f is the influence coefficient of F f in regulating the change ∆ C S , T ( s t ). Log-linear models are widely used to approximate non-linear systems because they inherit the benefits of linear models yet allow a restricted non-linear relationship between inputs and outputs [68]. Equation 4 can be written in matrix form after taking the logarithm as $$\log [ \Delta C ( \mathcal { S }, \mathcal { T } ) ] = [ \Gamma ] \cdot \log [ \Delta R ( \mathcal { S }, \mathcal { T }, \mathcal { F } ) ],$$ where log[∆ C ( S T , )] is a |M S T ( , ) | × 1 matrix of (log) differential co-expression of complexes, log[∆ R ( S T , , F )] is a |M S T ( , ) | × k matrix of (log) differential regulation by the TFs (here, |M S T ( , ) | &gt; k ), and [Γ] is a k × 1 matrix of influence coefficients for the TFs. Given this combinatorial regulation model, our purpose is to compute the influence coefficients γ f (1 ≤ f ≤ k ) by solving Equation 5, and for this we employ singular-value decomposition (SVD) arriving at a least-squares solution [69]. The TF displaying the highest (absolute) coefficient | γ | has the highest overall influence in regulating changes in co-expression of complexes. ## A simplified example to demonstrate our model Solving the equation can give positive as well as negative γ values. The absolute value | γ | indicates the magnitude of the influence, while the sign indicates the direction: TFs of the same sign regulating a set of complexes work cooperatively , while those of opposite signs work counteractively with each other. To understand this consider the following simplified example in which two TFs with influences γ 1 and γ 2 regulate two complexes A and B as per the following set of equations: $$0. 5 0 & = ( 5 ) ^ { \gamma _ { 1 } } \cdot ( 1 0 ) ^ { \gamma _ { 2 } } - - - - A \\ 0. 6 0 & = ( 6 ) ^ { \gamma _ { 1 } } \cdot ( 2 0 ) ^ { \gamma _ { 2 } } - - - - B,$$ which after taking log 10 becomes, $$- 0. 3 0 1 = \gamma _ { 1 } \cdot ( 0. 6 9 9 ) + \gamma _ { 2 } \cdot ( 1 ) - - - - A \\ - 0. 2 2 1 = \gamma _ { 1 } \cdot ( 0. 7 7 8 ) + \gamma _ { 2 } \cdot ( 1. 3 0 1 ) - - - - B.$$ Here we see that the second TF performs at least twice the regulation than the first TF on the two complexes (5 and 6 vs 10 and 20), the regulation by the second TF is doubled (from 10 to 20) as against a smaller increase for the first TF (from 5 to 6) between A and B , and yet A and B show roughly the same change in co-expression (0.50 vs 0.60). This intuitively means that the first TF has a greater influence than the second TF, and that counteracts the second TF to maintain the co-expression of complexes similar. Indeed upon solving the equations we get γ 1 = -1 293 and . γ 2 = 0 603, which is interpreted as the first TF being . about twice as influential as the second, with the two TFs working counteractively in regulating A and B . It is easy to realize a similar example for the cooperative action of TFs. ## Availability of supporting data The datasets used in this study are available at: http://www.bioinformatics.org.au/tools-data under CONTOUR 2 v ## Authors' contributions SS1 designed the study, performed the experiments and analysis, and wrote and revised the manuscript. KK helped in reviewing the analysis and providing biological interpretation for the results. PBM, SS2, CL and PTS helped in data collection and analysis. MAR and KK supervised the project. All authors have read and approved the manuscript. ## Acknowledgements Funding : Australian National Health and Medical Research Council (NHMRC) project grant 1028742 to PTS and MAR. PTS is supported by a fellowship from the National Breast Cancer Foundation Australia. ## References - 1. Elkon R, Linhart C, Sharan R, Shamir R, Shiloh Y: Genome-wide in silico identification of transcriptional regulators controlling the cell cycle in human cells . Genome Research 2003, 13 :773-780. - 2. Srihari S, Leong HW: Temporal dynamics of protein complexes in PPI networks: a case study using yeast cell cycle dynamics . BMC Bioinformatics 2012, 13(Suppl 17) :S16. - 3. Bar-Joseph Z, Siegfried Z, Brandeis M et al. : Genome-wide transcriptional analysis of the human cell cycle identifies genes differentially regulated in normal and cancer cells . Proceedings of the National Academy of Sciences USA 2007, 105(3) :955-960. - 4. Spriggs KA, Bushell M, Willis AE: Translational regulation of gene expression during conditions of cell stress . Molecular Cell 2010, 40(2) :228-237. - 5. Luscombe NM, Babu MM, Yu H, Snyder M, Teichmann SA, Gerstein M: Genomic analysis of regulatory network dynamics reveals large topological changes . Nature 2004, 431 :308-312. - 6. Balaji S, Babu MD, Lakshminarayan MI, Luscombe NM, Aravind L: Comprehensive analysis of combinatorial regulation using the transcriptional regulatory network of yeast . Journal of Molecular Biology 2006, 360 :213-227. - 7. Nebert DW: Transcription factors and cancer: an overview . Toxicology 2002, 181/182 :131-141. - 8. Darnell JE: Transcription factors as targets for cancer therapy . Nature Reviews Cancer 2002, 2 :740-749. - 9. Karamouzis MV, Papavassiliou AG: Transcription factor networks as targets for therapeutic intervention of cancer: the breast cancer paradigm . Molecular Medicine 2011, 17(11-12) :1133-1136. - 10. Vanunu O, Magger P, Ruppin E, Shlomi T, Sharan R: Associating genes and protein complexes with disease via network propagation . PLoS Computational Biology 2009, 6(1) ; e1000641. - 11. Zhao J, Lee SH, Huss M, Holme P: The network organization of cancer-associated protein complexes in human tissues . Scientific Reports 2013, 3 :1583. - 12. Jansen R., Greenbaum D., Gernstein M.: Relating whole-genome expression data with protein-protein interactions . Genome Research 2002, 12 :37-46. - 13. Grigoriev A.: Arelationship between gene expression and protein interactions on the proteome scale: analysis of the bacteriophage T7 and the yeast Saccharomyces cerevisiae . Nucleic Acids Research 2001, 29 :3513-3519. - 14. Safran M, Solomon I, Shmueli O, Lapidot M et al. : GeneCards 2002: towards a complete, object-oriented, human gene compendium . Bioinformatics 2002, 18(11) :1542-1543. - 15. Fujioka S, Sclabas GM, Schmidt C, Frederick WA et al. : Function of nuclear factor kappaB in pancreatic cancer metastasis . Clinical Cancer Research 2003, 9(1) :346-354. - 16. Jones S, Zhang X, Parsons WD et al. : Core signalling pathways in human pancreatic cancers revealed by global genomic analysis . Science 2008, 321(5897) :1801-1806. - 17. Wei D, Le X, Zheng L, Wang L et al. : Stat3 activation regulates the expression of vascular endothelial growth factor and human pancreatic cancer angiogenesis and metastasis . Oncogene 2003, 22 :319-329. - 18. Perou CM, Sorlie T, Eisen MB, van de Rijn M, Jeffrey SS et al. : Molecular portraits of human breast tumours . Nature 2000, 406(6797) :747. - 19. Sorlie T, Perou CM, Tibshirani R, Aas T et al. : Gene expression patterns of breast carcinomas distinguish tumor subclasses with clinical implications . Proceedings of the National Academy of Sciences USA 2001, 98(19) :10869. - 20. Taherian-Fard A, Srihari S, Ragan MA: Breast cancer classification: linking molecular mechanisms to disease prognosis . Briefings in Bioinformatics 2014, doi: 10.1093/bib/bbu020 . - 21. Waddell N, Arnold J, Cocciardi S, da Silva L et al. : Subtypes of familial breast tumours revealed by expression and copy number profiling . Breast Cancer Research and Treatment 2010, 123 :661-677. - 22. Lakhani SR, Jacquemier J, Sloane JP, Gusterson BA, Anderson TJ et al. : Multifactorial analysis of differences between sporadic breast cancers and cancers involving BRCA1 and BRCA2 mutations . Journal of the National Cancer Institute 1998, 90(15) :1138-1145. - 23. Stark C, Breitkreutz B, Chatr-aryamontri A et al. : The BioGRID Interaction Database: 2011 update . Nucleic Acids Research 2011, 39 :D698-D704. - 24. Keshava Prasad TS, Goel R, Kandasamy K, Keerthikumar S et al. Human Protein Reference Database2009 update . Nucleic Acids Research 2009, 37 :D767-D772. - 25. Badea L, Herlea V, Dima SO et al. : Combined gene expression analysis of whole-tissue and microdissected pancreatic ductal adenocarcinoma identifies gene specifically overexpressed in tumor epithelia . Hepato-Gastroenterology 2008, 55 :2015-2026. - 26. Vaquerizas JM, Kummerfeld SK, Teichmann SA, Luscombe NM: A census of human transcription factors: function, expression and evolution Nature Reviews Genetics 2009, 10(4):252-63. - 27. Ruepp A, Waegele B, Lechner M et al. : CORUM: the comprehensive resource of mammalian protein complexes . Nucleic Acids Research 2009, 38 :D497-D501. - 28. Bamford S, Dawson E, Forbes S, Clements J et al. : The COSMIC (Catalogue of Somatic Mutations in Cancer) database and website . British Journal of Cancer 2004, 91 :355-358. - 29. Patel MN, Halling-Brown MD, Tym JE, Workman P, Al-Lazikani B: Objective assessment of cancer genes for drug discovery . Nature Reviews Drug Discovery 2013, 12 :35-50. - 30. Chu L-H, Chen B-S: Construction of a cancer-perturbed protein-protein interaction network for discovery of apoptosis drug targets . BMC Systems Biology 2008, 2 :56. - 31. Srihari S, Raman V, Leong HW, Ragan MA: Evolution and controllability of cancer networks: a Boolean perspective . IEEE/ACM Transactions on Computational Biology and Bioinformatics 2014, 11(1) :83-94. - 32. Dennis G., Sherman BT., Hosack DA. et al. .: DAVID: Database for Annotation, Visualization, and Integrated Discovery . Genome Biology 2003, 4 :R60. - 33. Hanahan D, Weinberg RA.: The Hallmarks of Cancer . Cell 2000, 100(1) :57-70. - 34. Logue JS, Morrison DK.: Complexity in the signaling network: insights from the use of targeted inhibitors in cancer therapy . Genes and Development 2012, 26 :641-650. - 35. Gottipati P, Vischioni B, Schultz N, Solomons J, Bryant, HE et al. : Poly(ADP-Ribose) Polymerase is hyperactivated in Homologous recombination-defective cells Cancer Research 2010, 70 :5389. - 36. Biankin AV, Kench JG, Colvin EK, Segara D et al. : Expression of S100A2 calcium-binding protein predicts response to pancreatectomy for pancreatic cancer . Gastroenterology 2009, 137 :558-568. - 37. Zeng G, Germinaro M, Micsenyi A et al. : Aberrant Wnt/ β -Catenin signaling in pancreatic adenocarcinoma . Neoplasia 2006, 8(4) :279-289. - 38. Biankin AV, Waddell N, Kassahan KS, Gingras MC, Muthuswamy LB et al. : Pancreatic cancer genomes reveal aberrations in axon guidance pathway genes . Nature 2012, 491(7424) :399-405. - 39. Campbell SL, Khosravi-Far R, Rossman KL, Clark GJ, Der CJ: Increasing complexity of Ras signaling . Oncogene 1998, 17 :1395-1413. - 40. Koorstra JBM, Hustinx SR, Offerhaus JA, Maitra A: Pancreatic carcinogenesis . Pancreatology 2008, 8(2) :110-125. - 41. Mueller A, Schafer BW, Ferrar S, Weibel M et al. : The calcium-binding protein S100A2 interacts with p53 and modulates its transcriptional activity . Journal of Biological Chemistry 2005, 280 :29186-29193. - 42. Dammann R, Schagdarsurengin U, Liu L, Otto N, Gimm O, Dralle H, O Boehm B, Pfeifer P, Hoang-Vu C: Frequent RASSF1A promoter hypermethylation and K-ras mutations in pancreatic carcinoma . Oncogene 2003, 22 :3806-3812. - 43. Wang X, Szabo C, Qian C, Amadio PG, Thibodeau SN et al. : Mutational analysis of thirty-two doublestrand dna break repair genes in breast and pancreatic cancers . Cancer Research 2008, 68 :971. - 44. Li D, Liu H, Jiao L, Chang DZ et al. : significant impact of homologous recombination dna repair gene polymorphisms on pancreatic cancer survival . Cancer Research 2006, 66(6):3323-3330. - 45. Park J, Kang SI, Lee SY, Zhang XF, Kim MS et al. : Tumor suppressor RAS association domain family 5 (RASSF5/NORE1) mediates death receptor ligand-induced apoptosis . Journal of Biological Chemistry 2010, 285(45) :35029-35038. - 46. Liu C, Srihari S, Lˆ Cao KA, Chenevix-Trench G, Simpson PT, Ragan MA, Khanna KK: e Afine-scale dissection of the DNA double-strand break repair machinery and its implications for breast cancer therapy . Nucleic Acids Research 2014, 42(10) :6106-6127. - 47. Wang Y, Cortez D, Yazdi P, Neff N, Elledge SJ, Qin J: BASC, a super complex of BRCA1-associated proteins involved in the recognition and repair of aberrant DNA structures . Genes and Development 2000, 14 :927-939. - 48. Baillat D, Hakimi M-A, Naar AM, Shilatifard A, Cooch N, Sheikhattar R: Integrator, a multiprotein mediator of small nuclear RNA processing, associates with the C-terminal repeat of RNA polymerase II . Cell 2005, 123(2) :265-276. - 49. Khanna KK, Jackson SP: DNA double-strand breaks: signaling, repair and the cancer connection . Nature Genetics 2001, 27 :247-254. - 50. Zhuang J, Zhang J, Willers H, Wang H et al. : Checkpoint kinase 2-mediated phosphorylation of brca1 regulates the fidelity of nonhomologous end-joining . Cancer Research 2006, 66 :1401. - 51. Thompson EG, Fares H, Dixon K: BRCA1 requirement for the fidelity of plasmid DNA double-strand break repair in cultured breast epithelial cells . Environ and Mol Mutagenesis 2012, 53(1) :32-43. - 52. Jiang G, Plo I, Wang T, Rahman M, Cho JH, Yang E, Lopez BS, Xia F: BRCA1-Ku80 protein interaction enhances end-joining fidelity of chromosomal double-strand breaks in the G1 phase of the cell cycle . Journal of Biological Chemistry 2013, 288 :8966-8976. - 53. Pensa S, Regis G, Boselli D, Novelli F, Poli V: STAT1 and STAT3 in tumorigenesis: two sides of the same coin? . JAK-STAT Pathway in Disease 2009, Chapter 8, Landes Bioscience (Ed. Anastasis Stephanou), 2009. - 54. Symth GK: Linear models and empirical Bayes methods for assessing differential expression in microarray experiments . Statistical Applications in Genetics and Molecular Biology 2004, 3(1) :3. - 55. Dudeja V, Chugh RK, Sangwan V, Skube SJ et al. : Prosurvival role of heat shock factor 1 in the pathogenesis of pancreatobiliary tumors . American Journal of Physiology Gastrointestinal and Liver Physiology 2011, 300(6) :G949-G955. - 56. Joshi H, Nord SH, Frigessi A, Borresen-Dale A-L, Kristensen VN: Overrepresentation of transcription factor families in the genesets underlying breast cancer subtypes . BMC Genomics 2012, 13 :199. - 57. Biswas DK, Shi Q, Baily S, Strickland I et al. : NF-kappa B activation in human breast cancer specimens and its role in cell proliferation and apoptosis . Proceedings of the National Academy of Sciences USA 2004, 101(27) :10137-10142. - 58. Zhang C, Sun X, Ren Y, Lou Y, Zhou J, Liu M, Li D: Validation of Polo-like kinase 1 as a therapeutic target in pancreatic cancer cells . Cancer Biology and Therapy 2012, 13(12) :1214-1220. - 59. Zheng L, Jaffee EM: Annexin A2 is a new antigenic target for pancreatic cancer immunotherapy . Oncoimmunology 2012, 1(1) :112-114. - 60. Kashiwaya K, Nakagawa H, Hosokawa M et al. : Involvement of the tubulin tyrosine ligase-like family member 4 polyglutamylase in PELP1 polyglutamylation and chromatin remodeling in pancreatic cancer cells . Cancer Research 2010, 70(10) :4024-4033. - 61. Sutherland RL, Musgrove EA: CDK inhibitors as potential breast cancer therapeutics: new evidence for enhanced efficacy in ER+ disease . Breast Cancer Research 2009, 11(6) :112. - 62. Marks PA, Richon VM, Rifkind RA: Histone deacetylase inhibitors: inducers of differentiation or apoptosis of transformed cells . Journal of the National Cancer Institute 2000, 92(15):1210-16. - 63. Srihari S, Ragan MA: Systematic tracking of dysregulated modules identifies novel genes in cancer . Bioinformatics 2013, 29(12) :1553-1561. - 64. Liu G, Wong L, Chua HN: Complex discovery from weighted PPI networks. Bioinformatics 2009, 25(15) :1891-1897. - 65. Srihari S, Ning K, Leong HW: MCL-CAw: a refinement of MCL for detecting yeast complexes from weighted PPI networks by incorporating core-attachment structure . BMC Bioinformatics 2010, 11 :504. - 66. Srihari S, Leong HW: Asurvey of computational methods for protein complex prediction from protein interaction networks . Journal of Bioinformatics and Computational Biology 2013, 11(2) :1230002. - 67. Ning K, Ng HK, Srihari S, Leong HW, Nesvizhskii AI: Examination of the relationship between essential genes in PPI network and hub proteins in reverse nearest neighbor topology . BMC Bioinformatics 2010, 11(1) :505. - 68. Liao JC, Boscolo R, Yang YL, Tran LM, Sabatti C, Roychowdhury VP: Network component analysis: reconstruction of regulatory signals in biological systems . Proceedings of the National Academy of Sciences USA 2003, 100(26) :15522-15527. - 69. Yeung MKS, Tegner J, Collins JJ: Reverse engineering gene networks using singular value decomposition and robust regression . Proceedings of the National Academy of Sciences USA 2002, 99(9) :6163-6168. ## Figures ## Figure 1 - Changes in complex co-expression and its transcriptional regulation in pancreatic tumour The complex CHUK-ECR1-IKBKB-IKBKG showed considerable change in its co-expression between normal and pancreatic tumour conditions. Its regulation by the NFKB family of TFs also exhibited similar changes. Both the complex and the TF family have been implicated in pancreatic tumours [15,16]. ## Figure 2 - Co-expression-wise distribution of PPIs in normal-PDAC and BRCA1-BRCA2 tumours PPIs from both normal vs PDAC and BRCA1 vs BRCA2 conditions showed significant differences in their distributions of co-expression values. ## Figure 3 - Co-expression-wise distribution of complexes in normal-PDAC and BRCA1-BRCA2 tumours Complexes from both normal vs PDAC and BRCA1 vs BRCA2 conditions showed significant differences in their co-expression distributions. Note: a complex with negative co-expression for a condition possibly means that the complex does not exist under that condition. ## Figure 4 - Comparison of co-expression of complexes in normal-PDAC and BRCA1-BRCA2 tumours Complexes from the two conditions were matched using t J = 0 67 and . δ = 0 10 (see Methods) and differences . between the maximum, average and minimum co-expression values were computed. The co-expression values are Fisher-transformed. A complex with negative co-expression for a condition possibly means non-existance of the complex under that condition. ## Figure 5 - Examples of dysfunctional complexes in pancreatic and breast tumours Complexes showing changes in co-expression for (a) normal vs PDAC, and (b) BRCA1 vs BRCA2 tumours. ## Figure 6 - Fraction of known cancer genes constituting complexes - · Total COSMIC genes: 118 (present in the PPI network). - · 66.1% of known cancer genes in PDAC were covered in complexes (#256) showing ∆ C ≥ 0 10 between . normal to PDAC tumour. - · 53.4% of cancer genes in breast cancer were covered in complexes (#277) showing ∆ ≥ 0 10 between . BRCA1 tumours and BRCA2 tumours. ## Figure 7 - Differential PPI network constructed for normal vs PDAC (a) Largest component of the network composed of 519 interactions among 558 proteins, out of which 439 (or 84.5%) interactions showed a decrease in co-expression from normal to PDAC (red interactions indicate increase from normal to PDAC while green indicate decrease); (b) several genes are silenced by ubiquitination and sumoylation in PDAC; (c) several known drug targets are centered around interactions showing increase in co-expression. ## Figure 8 - Workflow of our approach A log-linear model (lower portion of the workflow) is devised to relate changes in the co-expression of complexes with changes in their transcriptional regulation by TFs. Tables ## Table 1 - Complexes generated under pancreatic (normal-PDAC) and breast (BRCA1-BRCA2) conditions The matched complexes M are generated by matching complexes between conditions using t J = 0 67(= 2 . / 3) and δ = 0 10 (see Methods). . | Pancreatic | Pancreatic | Pancreatic | Pancreatic | Breast | Breast | Breast | Breast | |--------------|--------------|--------------|--------------|-----------|-----------|-----------|-----------| | | Complexes | Complexes | Complexes | | Complexes | Complexes | Complexes | | Condition | # | |M| | Avg size | Condition | # | |M| | Avg size | | Normal | 582 | 256 | 8.20 | BRCA1 | 547 | 277 | 7.87 | | PDAC | 581 | | | BRCA2 | 557 | | | Table 2 Top enriched terms in KEGG pathways and Biological Process in disrupted complexes in pancreatic (normal vs PDAC) and breast (BRCA1 vs BRCA2) tumours (using DAVID [32]) | | Pancreatic | Pancreatic | Pancreatic | Breast | Breast | Breast | |---------------|-----------------------------------------------------------------------------------------------------------------------------------|--------------|------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------|--------------------------------------------------------------------------------------------------------| | Category | | Enrichment | Enrichment | | Enrichment | Enrichment | | | Annotation | Genes (%) | p -value | Annotation | Genes(%) | p -value | | KEGG pathways | Cell cycle Pathways in cancer RIG-I-like receptor signalling Neurotrophin signalling Nucleotide excision repair Pancreatic cancer | 4.6 1.0 | 3.5x10 - 13 5.8x10 - 7 1.1x10 - 5 1.7x10 - 5 1.9x10 - 5 5.7x10 - 5 9.7x10 - 5 3.4x10 - 4 | Cell cycle Pathways in cancer Nucleotide excision repair DNA replication Adipocytokine signalling Apoptosis Neurotrophin signaling Homologous Insulin signaling | 3.2 5.8 1.6 1.4 1.8 2.1 2.3 1.0 2.2 | 2.7x10 - 7 2.9x10 - 7 1.5x10 - 5 6.4x10 - 5 7.5x10 - 7 1.2x10 - 4 9.5x10 - 4 1.6x10 - 3 6.0x10 - 3 - 3 | | KEGG pathways | | 6.2 | | | | | | KEGG pathways | | 2.2 | | | | | | KEGG pathways | | 3.0 | | | | | | KEGG pathways | | 1.7 | | | | | | KEGG pathways | | 2.1 | | | | | | KEGG pathways | Adipocytokine signalling | 2.0 | | | | | | KEGG pathways | Regulation of autophagy | 1.3 | | recombination | | | | KEGG pathways | Mismatch repair | | 5.2x10 - 4 | | | | | KEGG pathways | Wnt signalling | 2.8 | 2.2x10 - 3 | Mismatch repair | 0.9 | 2.8x10 | | | Cell cycle | 17.3 | 1.6x10 - 35 | Chromosome organization | 14.3 | 1.5x10 - 43 | | Biological | Chromosome organization | 13.0 | 6.2x10 - 33 | Chromatin organization | 12.2 | 1.3x10 - 40 | | Biological | RNA splicing | 9.2 | 2.5x10 - 28 | Cell cycle | 14.5 | 7.0x10 - 25 | | Biological | Chromatin modification | 8.9 | 1.0x10 - 27 | Regulation of transcription | 31.6 | 1.1x10 - 24 | - ∼ 700 genes tested in pancreatic and ∼ 550 genes tested in breast Table 3 - Changes in co-expression of complexes in pancreatic (normal-PDAC) and breast (BRCA1BRCA2) conditions (The co-expression values are Fisher-transformed) - · ∆ C represents the (absolute) change in co-expression of complexes between conditions, that is, increase or decrease in co-expression of complexes from normal to PDAC or BRCA1 to BRCA2 tumours. - · M ′ - complexes with co-expression for normal &gt; PDAC tumour or BRCA1 &gt; BRCA2 tumour M ′′ - complexes with co-expression for PDAC tumour &gt; normal or BRCA2 &gt; BRCA1 tumour. Table 4 - Relationship between changes in co-expression of complexes ( ∆ C ) and changes in transcriptional regulation by TFs ( ∑ ∆ R ) | | | Pancreatic | Pancreatic | Pancreatic | Breast | Breast | Breast | |---------|--------|--------------|--------------|--------------|----------|----------|----------| | Complex | | Size of | ∆ C | ∆ C | Size of | ∆ C | ∆ C | | type | Subset | subset | Max | Avg | subset | Max | Avg | | | M ′ | 159 | 0.969 | 0.336 | 225 | 0.761 | 0.281 | | Our | M ′′ | 96 | 0.421 | 0.192 | 52 | 0.543 | 0.197 | | | M ′ | 138 | 0.602 | 0.219 | 386 | 0.642 | 0.178 | | CORUM | M ′′ | 51 | 0.512 | 0.209 | 55 | 0.347 | 0.212 | All coefficient values are positive, and Spearman coefficients were higher than Pearson, indicating a non-linear relationship between ∆ C and ∑ ∆ . R | | Pancreatic | Pancreatic | Pancreatic | Breast | Breast | Breast | |--------------|-------------------|--------------|--------------|-------------------|----------|----------| | Complex type | #Complex-TF pairs | Pearson | Spearman | #Complex-TF pairs | Pearson | Spearman | | Our | 226 | 0.273 | 0.436 | 241 | 0.206 | 0.413 | | CORUM | 71 | 0.298 | 0.434 | 32 | 0.212 | 0.393 | Table 5 - Influential TFs identified in pancreatic (normal vs PDAC) and breast (BRCA1 vs BRCA2) tumours TFs are ranked based on their overall influence ( | γ | ) for normal vs PDAC and BRCA1 vs BRCA2 tumours. The normalizedγ values are obtained by dividing the γ values by the maximum | γ | . The significance ( p value) was computed against 10000 background influence values, each generated from 10000 random shuffles of gene symbols in the expression dataset. The adjusted p -values for differential expression (DE) analysis whether up- ( ↑ ) or down- ( ↓ ) regulated from normal to PDAC and from BRCA1 to BRCA2 tumours - were computed using limma [54]. | Pancreatic | Pancreatic | Pancreatic | Pancreatic | | | | | | | | | |--------------|--------------|--------------|----------------------|--------|--------------|-----------|--------------|--------------|----------------------|-------------|--------------| | TF | γ | Norm- γ | #Complexes regulated | p -val | DE ( p -val) | TF | γ | Norm- γ | #Complexes regulated | p -val | DE ( p -val) | | STAT5B | 2.911 | 1.000 | 188 | 0.001 | 0.021 ↓ | TBP | -5.153 | -1.000 | 199 | 0.001 | NS | | RREB1 | -2.606 | -0.895 | 190 | 0.004 | NS | BACH1 | 4.221 | 0.819 | 199 | 0.003 | NS | | BACH1 | -1.592 | -0.547 | 188 | 0.001 | 5.48E-05 ↑ | POU3F2 | -3.902 | -0.757 | 199 | 0.007 | NS | | SRF | 1.522 | 0.523 | 40 | 0.004 | 3.06E-05 ↓ | RREB1 | 2.654 | 0.515 | 200 | 0.002 | NS | | IRF2 | -1.462 | -0.502 | 37 | 0.014 | 1.24E-06 ↓ | ATF6 | -1.185 | -0.230 | 201 | 0.002 | NS | | AHR | 1.359 | 0.467 | 190 | 0.003 | 1.93E-11 ↑ | SRF | 1.079 | 0.209 | 40 | 0.007 | NS | | TBP | -0.944 | -0.324 | 188 | 0.002 | 0.001 ↑ | STAT5B | 1.022 | 0.198 | 199 | 0.007 | NS | | POU3F2 | -0.731 | -0.251 | 188 | 0.002 | 6.64E-07 ↓ | SIN3A | 0.980 | 0.190 | 205 | 0.007 | NS | | IRF7 | -0.654 | -0.225 | 188 | 0.002 | 2.50E-06 ↑ | TCF4 | 0.601 | 0.117 | 40 | 0.007 | NS | | HSF1 | -0.621 | -0.213 | 190 | 0.001 | NS | TAL1 | 0.599 | 0.116 | 14 | 0.007 | NS | | YY1 | 0.619 | 0.213 | 195 | 0.001 | 3.80E-05 ↑ | CEBP β | -0.537 | -0.104 | 201 | 0.002 | NS | | STAT1 | 0.568 | 0.195 | 190 | 0.005 | 4.79E-06 ↑ | SOX9 | 0.447 | 0.087 | 204 | 0.008 | NS | | TP53 | 0.543 | 0.187 | 190 | 0.004 | 6.34E-06 ↑ | GATA3 | 0.422 | 0.082 | 90 | 0.001 | 0.012 ↑ | | XBP1 | -0.549 | -0.189 | 190 | 0.004 | 0.002 ↓ | STAT1 | 0.411 | 0.080 | 202 | 0.001 | NS | | SOX9 | 0.504 | 0.173 | 193 | 0.004 | 2.43E-05 ↑ | STAT5A | 0.407 | 0.079 | 200 | 0.004 | NS | | CEBP β | 0.427 | 0.147 | 191 | 0.005 | 1.71E-08 ↑ | NF κ B1 | 0.390 | 0.076 | 202 | 0.001 | NS | | ATF6 | -0.419 | -0.144 | 191 | 0.008 | NS | IRF2 | -0.389 | -0.075 | 42 | 0.006 | NS | | STAT5A | 0.385 | 0.132 | 188 | 0.001 | 0.004 ↑ | GATA2 | -0.323 | -0.063 | 40 | 0.001 | NS | | MSX1 | 0.366 | 0.126 | 188 | 0.002 | 0.008 ↑ | FOXO1 | 0.305 | 0.059 | 30 | 0.001 | NS | | GATA2 | 0.328 | 0.113 | 40 | 0.001 | 9.96E-03 ↓ | ESR1 | 0.282 | 0.055 | 24 | 0.001 | 0.008 ↑ | | TAL1 | 0.319 | 0.110 | 12 | 0.003 | 1.09E-07 ↓ | PPAR γ | 0.279 | 0.054 | 60 | 0.001 | NS | | FOXO1 | -0.306 | -0.105 | 30 | 0.003 | 0.001 ↑ | TP53 | 0.273 | 0.053 | 206 | NS | NS | | ESR1 | 0.254 | 0.087 | 27 | 0.004 | 3.43E-04 ↑ | YY1 | 0.274 | 0.053 | 206 | 0.009 | NS | | JUNB | 0.219 | 0.075 | 198 | 0.004 | 2.44E-07 ↑ | STAT3 | -0.222 | -0.043 | 200 | 0.004 | NS | | CEBP α | 0.187 | 0.064 | 194 | 0.001 | NS | MYB | -0.213 | -0.041 | 60 | 0.003 | NS | | STAT3 | 0.169 | 0.058 | 190 | 0.004 | 2.34E-06 ↑ | GATA1 | 0.204 | 0.040 | 40 | 0.001 | NS | | SP1 | 0.159 | 0.055 | 10 | 0.001 | 0.003 ↑ | FOXA1 | 0.173 | 0.034 | 207 | 0.001 | 0.006 ↑ | | TCF3 | 0.155 | 0.053 | 40 | 0.001 | NS | MSX1 | 0.170 | 0.033 | 199 | NS | NS | | BRCA1 | 0.146 | 0.050 | 200 | 0.003 | 0.003 ↑ | HSF2 | -0.165 | -0.032 | 201 | NS | NS | | SIN3A | 0.138 | 0.047 | 193 | 0.001 | 2.05E-4 ↑ | FOXO3 | 0.147 | 0.029 | 50 | 0.009 | NS | | PPAR γ | 0.124 | 0.043 | 13 | 0.001 | NS | PPAR α | 0.133 | 0.026 | 40 | NS | NS | | HSF2 | 0.120 | 0.041 | 191 | 0.001 | 0.004 ↑ | FOS | 0.121 | 0.023 | 44 | 0.005 | NS | | MAX | 0.113 | 0.039 | 80 | NS | N S | SP1 | 0.098 | 0.019 | 18 | 0.003 | NS | | NF κ B1 | 0.106 | 0.036 | 192 | 0.002 | NS | TCF3 | -0.096 | -0.019 | 90 | 0.009 | NS | | FOS | 0.044 | 0.015 | 42 | 0.001 | NS | CEBP α | 0.094 | 0.018 | 202 | 0.009 | NS | | MYB | -0.023 | -0.008 | 40 | 0.002 | NS | NF κ B2 | -0.091 | -0.018 | 202 | 0.003 | NS | | NF κ B2 | 0.018 | 0.006 | 193 | 0.002 | NS | JUN | 0.080 | 0.016 | 205 | 0.003 | NS | | | -0.001 | | | | | | | | | NS | NS | | FOXO3 - | - | 0.000 | 90 | 0.004 | NS | AHR | 0.076 | 0.015 | 200 | | 0.017 ↑ | | - | - | | - - | | | XBP1 HSF1 | 0.059 -0.056 | 0.011 -0.011 | 201 200 | 0.002 0.001 | NS | | - | - | | - | | | IRF7 | -0.033 | -0.006 | 199 | 0.009 | NS | NS: Not significant at p &lt; 0 05. . #Genes tested in each case: ∼ 20700.
null
[ "Sriganesh Srihari", "Piyush B. Madhamshettiwar", "Sarah Song", "Chao Liu", "Peter T. Simpson", "Kum Kum Khanna", "Mark A. Ragan" ]
2014-08-06T04:00:19+00:00
2014-08-06T04:00:19+00:00
[ "q-bio.MN", "92Bxx" ]
Complex-based analysis of dysregulated cellular processes in cancer
Background: Differential expression analysis of (individual) genes is often used to study their roles in diseases. However, diseases such as cancer are a result of the combined effect of multiple genes. Gene products such as proteins seldom act in isolation, but instead constitute stable multi-protein complexes performing dedicated functions. Therefore, complexes aggregate the effect of individual genes (proteins) and can be used to gain a better understanding of cancer mechanisms. Here, we observe that complexes show considerable changes in their expression, in turn directed by the concerted action of transcription factors (TFs), across cancer conditions. We seek to gain novel insights into cancer mechanisms through a systematic analysis of complexes and their transcriptional regulation. Results: We integrated large-scale protein-interaction (PPI) and gene-expression datasets to identify complexes that exhibit significant changes in their expression across different conditions in cancer. We devised a log-linear model to relate these changes to the differential regulation of complexes by TFs. The application of our model on two case studies involving pancreatic and familial breast tumour conditions revealed: (i) complexes in core cellular processes, especially those responsible for maintaining genome stability and cell proliferation (e.g. DNA damage repair and cell cycle) show considerable changes in expression; (ii) these changes include decrease and countering increase for different sets of complexes indicative of compensatory mechanisms coming into play in tumours; and (iii) TFs work in cooperative and counteractive ways to regulate these mechanisms. Such aberrant complexes and their regulating TFs play vital roles in the initiation and progression of cancer.
1408.1178v1
## Classification of sub-Cuntz states ## Katsunori Kawamura ∗ College of Science and Engineering, Ritsumeikan University, 1-1-1 Noji Higashi, Kusatsu, Shiga 525-8577, Japan ## Abstract Let O n denote the Cuntz algebra for 2 ≤ n &lt; ∞ . With respect to a homogeneous embedding of O n m into O n , an extension of a Cuntz state on O n m to O n is called a sub-Cuntz state, which was introduced by Bratteli and Jorgensen. We show (i) a necessary and sufficient condition of the uniqueness of the extension, (ii) the complete classification of pure sub-Cuntz states up to unitary equivalence of their GNS representations, and (iii) the decomposition formula of a mixing sub-Cuntz state into a convex hull of pure sub-Cuntz states. Invariants of GNS representations of pure sub-Cuntz states are realized as conjugacy classes of nonperiodic homogeneous unit vectors in a tensor-power vector space. It is shown that this state parameterization satisfies both the U n ( )-covariance and the compatibility with a certain tensor product. For proofs of main theorems, matricizations of state parameters and properties of free semigroups are used. ## Mathematics Subject Classifications (2010). 46K10. Key words. extension of state, sub-Cuntz state, tensor product formula, matricization, free semigroup. ## 1 Introduction For a unital C ∗ -algebra A and a unital C -subalgebra ∗ B of A , any state ω on B has an extension ˜ on ω A , that is, ˜ is a state on ω A which satisfies ˜ ω | B = ω ([15], 2.10.1), but it is not unique in general. In this paper, we completely classify extensions of a certain class of pure states on Cuntz algebras. In consequence, a new class of pure states on Cuntz algebras and the complete set of their invariants are given. In this section, we show our motivation, definitions and main theorems. Proofs will be given after § 3. ∗ e-mail: [email protected] ## 1.1 Motivation In this subsection, we make it clear that our aim of this study against a background of well-known representation theory, and give a short survey. ## 1.1.1 Toward a representation theory of C -algebras ∗ According to Kobayashi [41], central problems of representation theory (except interactions with other branches of mathematics) are listed as follows: Problem 1 Understanding irreducible representations. Find and classify 'smallest' objects. There are the following subproblems: - · Construction of irreducible representations. - · Finding a complete set of invariants of representations, so that they can separate different irreducible representations from one another. - · Understanding these invariants. Problem 2 Decompose a given representation into irreducible ones. How is a given representation built from 'smallest' objects? Problem 2-A Given an irreducible representation τ of a subgroup G ′ , decompose the induced representation Ind G G ′ τ into irreducibles of G . Problem 2-B Given an irreducible representation π of G , decompose the restriction π | G ′ into irreducibles of a subgroup G ′ . The formula of the irreducible decomposition in this problem is called a branching law (e.g., the decomposition of tensor product representation). Each problem is more closely explained in the original text. Here a 'representation' means a representation of a group G . We wish to generalize Kobayashi's problems to the class of algebras which includes group algebras. In general, representations of C -algebras do not have unique decom-∗ position (up to unitary equivalence) into sums or integrals of irreducibles [22]. This is a difficulty to consider Problem 2 in the representation theory of C -algebras. ∗ However, it does not mean that every irreducible decomposition of a representation of a C ∗ -algebra makes no sense. If one chooses a good class of representations, then Problem 2 can be treated satisfactorily. For example, it is known that Cuntz algebras have such good classes of representations. ## 1.1.2 States on Cuntz algebras By Gel'fand-Naimark-Segal (=GNS) construction, the state theory of a C -∗ algebra A can be interpreted as the (cyclic) representation theory of A almost all. Hence, we mainly consider (pure) states instead of (irreducible) representations in this paper. For Cuntz algebras, representations and states have been studied by many authors [3, 4, 6, 7, 8, 9, 10, 19, 20, 21, 26, 27, 28, 42, 46, 48] (see a specific survey in § 1 and § 2 of [17]), but their classifications have not been finished yet. The known most general approach was given in [8]. The set of all states on a Cuntz algebra is divided into two subsets, the set of finitely correlated states and otherwise (= the set of infinitely correlated states) (see § 2.1). A finitely correlated state is characterized by the existence of a finite-dimensional non-trivial s ∗ i -invariant subspace of the GNS representation space [8, 17]. For example, any Cuntz state (see § 1.2) is finitely correlated. There exist both finitely and infinitely correlated vector states of permutative representations [7] (see § 4.2 and Example 4.8). We illustrate a rough classification of states on O n (2 ≤ n &lt; ∞ ) as follows: Figure 1.1 O ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1178v1-figure-cb0042ea-efde-43fd-a8a7-5380f33aabe5.jpg) About grounds in Figure 1.1, see the proof of Fact 1.3, Lemma 2.4(i) and Example 4.9. Remark that Figure 1.1 is not true for the case of O ∞ (see Proposition C.2). Cuntz states are completely classified pure states with explicit complete invariants, and are used to construct multiplicative isometries ([37], § 3) and R -matrices ([38], § 3.2) (see also [30, 36]). In this study, we select sub-Cuntz states as a target of complete classification because they are natural generalizations of Cuntz states. As well as Cuntz states, it is expected that sub-Cuntz states have many applications. Cuntz states and sub-Cuntz states will be explained explicitly in § 1.2. Examples will be shown in § 4. ## 1.1.3 Branching laws of representations of Cuntz algebras We have mainly studied branching laws of representations of Cuntz algebras according to Kobayashi's Problem 2-B. In [31, 32, 34], branching laws of permutative representations of Cuntz algebras arising from endomorphisms were computed (see also [45]). In [1, 2, 29], representations of fermions were considered as restrictions of representations of O 2 by a certain embedding of the CAR algebra into O 2 . By using a certain set of embeddings between Cuntz algebras, we defined a non-symmetric tensor product of representations [33] (see § 1.3.2). We showed the decomposition formula of this tensor product of permutative representations [33, 39]. The set of all unitary equivalence classes of irreducible permutative representations of O ∞ is one-to-one correspondence in the set of all equivalence classes of irrational numbers by modular transformations [40]. In this case, finitely and infinitely correlated vector states associated with irreducible components are corresponded to quadratic irrationals and otherwise, respectively. Their common foundation is the representation theory of Cuntz algebras. Hence its development will be directly reflected in these subjects. ## 1.2 Definition and main theorems In this subsection, we review the definition of sub-Cuntz state by BratteliJorgensen [7], and show our main theorems for O n (2 ≤ n &lt; ∞ ). For the case of O ∞ , see Appendix C. Fix 2 ≤ n &lt; ∞ . Let O n denote the Cuntz algebra with Cuntz generators s , . . . , s 1 n , that is, O n is a C -algebra ∗ which is universally generated by s , . . . , s 1 n which satisfy s s ∗ i j = δ ij I for i, j = 1 , . . . , n and n i =1 s s i ∗ i = I [12]. ∑ We review Cuntz state before sub-Cuntz state. For any complex unit vector z = ( z , . . . , z 1 n ) ∈ C n , a state ω z on O n which satisfies $$\omega _ { z } ( s _ { j } ) = \overline { z _ { j } } \text{ \ for all } j = 1, \dots, n,$$ exists uniquely and is pure where z i denotes the complex conjugate of z i . The state ω z is called the Cuntz state by z [6, 7, 10]. GNS representations by ω z and ω y are unitarily equivalent if and only if z = y (see Appendix B). About equivalent definitions, see the case of m = 1 in Theorem 2.3. For m ≥ 1, let V n,m denote the Hilbert space with an orthonormal basis { e J : J ∈ { 1 , . . . , n } m } , that is, V n,m = /lscript 2 ( { 1 , . . . , n } m ). Let ( V n,m ) 1 := { z ∈ V n,m : ‖ z ‖ = 1 . } Definition 1.2 For z = ∑ z J e J ∈ ( V n,m ) 1 , ω is a sub-Cuntz state on O n by z if ω is a state on O n which satisfies the following equations: $$\omega ( s _ { J } ) = \overline { z _ { J } } \ \text{ for all } J \in \{ 1, \dots, n \} ^ { m }$$ where s J := s j 1 · · · s j m when J = ( j 1 , . . . , j m ) , and z J denotes the complex conjugate of z J . In this case, ω is called a sub-Cuntz state of order m . This definition is equivalent to the original in [7] (see Theorem 2.3). Fact 1.3 (Existence) For any z ∈ V ( n,m ) 1 , a sub-Cuntz state by z exists. Proof. Fix a bijection f : { 1 , . . . , n m } ∼ { = 1 , . . . , n } m . Let t 1 , . . . , t n m denote the Cuntz generators of O n m . Define the embedding ˆ of f O n m into O n by ˆ ( f t i ) := s j 1 · · · s j m for i ∈ { 1 , . . . , n m } when f ( ) = ( i j 1 , . . . , j m ). We identify O n m with ˆ ( f O n m ) here. By definition, ω is a sub-Cuntz state by z if and only if ω is an extension of the Cuntz state ω ˆ z on O n m to O n where ˆ := ( z z f ( ) i ) n m i =1 ∈ ( C n m ) 1 . Since an extension of ω ˆ z always exists, the statement holds. ↦ From the proof of Fact 1.3, a sub-Cuntz state is regarded as an extension of a Cuntz state. Such an extension always exists but it is not always unique. We show a necessary and sufficient condition of its uniqueness as follows. Here we identify V n,m with ( V n, 1 ) ⊗ m by the correspondence between bases e J → e j 1 ⊗ · · · ⊗ e j m for J = ( j 1 , . . . , j m ) ∈ { 1 , . . . , n } m . From this identification, we obtain V n,m ⊗ V n,l = V n,m + l for any m,l ≥ 1. Then the following hold. Theorem 1.4 Let ω be a sub-Cuntz state on O n by z ∈ V ( n,m ) 1 . - (i) (Uniqueness) ω is unique if and only if z is nonperiodic (or primitive [47]), that is, z = x ⊗ p for some x implies p = 1 . In this case, we write ˜ ω z as ω . - (ii) If z is nonperiodic, then ˜ ω z is pure. (iii) If z is nonperiodic, then /negationslash for J, K ∈ ⋃ a ≥ 1 { 1 , . . . , n } a ∪ {∅} where | J | denotes the word length of J , JK denotes the concatenation of J and K , s ∅ := I , z ∅ := 1 and z J := z J (1) · · · z J ( ) l when J = J (1) · · · J ( ) l and | J ( ) i | = m for i = 1 , . . . , l . In the case of 'otherwise' in (1.3), J and K satisfy J = J J 1 2 and K = K K 1 2 such that | J 1 | , | K 1 | ∈ m Z ≥ 0 and 1 ≤ | J 2 | = | K 2 | ≤ m -1 . $$\stackrel { \dots } { \omega } _ { z } ( s _ { J } s _ { K } ^ { * } ) & = \begin{cases} \overline { z _ { J } } \, z _ { K } & \text{when $l[J]$, $l[K] \in m\mathbb{Z}$} _ { \geq 0}, \\ 0 & \text{when $l[J]$} - | K | \notin m\mathbb{Z}$}, \\ \overline { z _ { J _ { 1 } } } \, z _ { K _ { 1 } } \sum _ { | L | = m - | J _ { 2 } | } \overline { z _ { J _ { 2 } L } } \, z _ { K _ { 2 } L } & \text{otherwise} \\ \text{for $J, K \in \bigcup _ { a \geq 1 } \{ 1, \dots, n \}^{a} \cup \{ \emptyset \}$ where $|J|$ denotes the word length} \\ \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \text{$r$} \, \end{cases}$$ From Theorem 1.4(i), if z is periodic (= not nonperiodic), then ω is not unique. In this case, all possibilities of sub-Cuntz states by z are explicitly given as follows. Theorem 1.5 (Decomposition) Let p ≥ 2 and z := x ⊗ p for a nonperiodic element x ∈ V ( n,m ′ ) 1 . If ω is a sub-Cuntz state on O n by z , then there exists a = ( a , . . . , a 1 p ) in ∆ p -1 := { ( b 1 , . . . , b p ) ∈ R p : ∑ b j = 1 , b i ≥ 0 for all i } such that ω has the following form: $$\omega = \sum _ { j = 1 } ^ { p } a _ { j } \omega _ { j }$$ where ω j denotes the pure sub-Cuntz state by e 2 πj √ -1 /p x . In (1.4), ( a , . . . , a 1 p ) is unique. From Theorem 1.5, we see that a sub-Cuntz state by z may be pure even if z is periodic. By combining Theorem 1.4(ii) and Theorem 1.5, we obtain the following necessary and sufficient condition of the purity of sub-Cuntz state. Corollary 1.6 (Purity) For a sub-Cuntz state ω by z ∈ ( V n,m ) 1 , ω is pure if and only if ω = ˜ ω x for some nonperiodic element x ∈ ( V n,m ′ ) 1 . In this case, z = x ⊗ p for some p ≥ 1 . Proof. ( ⇒ ) Assume that ω is pure. If z is nonperiodic, then let x := z . If z = v ⊗ p for some nonperiodic element v and p ≥ 2, then ω = ∑ p j =1 a ω j j /negationslash from Theorem 1.5 where ω j denotes the pure sub-Cuntz state by e 2 πj √ -1 /p v . Since ω is pure and ω i = ω j when i = , there must exist j j such that a j = 1 and ω = ω j . Let x := e 2 πj √ -1 /p v . Then the statement holds. /negationslash - ( ⇐ ) From Theorem 1.4(ii), the statement holds. From the above proofs, we see that z = x ⊗ p for p ≥ 1. Next, we consider an equivalence of sub-Cuntz states. Theorem 1.7 (Equivalence) For z, y ∈ ⋃ m ≥ 1 ( V n,m ) 1 , assume that both z and y are nonperiodic. Then the following are equivalent: - (i) GNS representations by ˜ ω z and ˜ ω y are unitarily equivalent. In this case, we write ˜ ω z ∼ ˜ ω y . - (ii) (a) z = y , or (b) z = x 1 ⊗ x 2 and y = x 2 ⊗ x 1 for some x , x 1 2 ∈ ⋃ m ≥ 1 ( V n,m ) 1 . In these cases, § z and y are said to be conjugate ([47], 1.3), and we write z ∼ y . /negationslash Assume that both z ∈ ( V n,m ) 1 and y ∈ ( V n,l ) 1 are nonperiodic. If m = , l then z ∼ y . Hence ˜ ω z ∼ ˜ ω y from Theorem 1.7. From Theorem 1.5, two sub-Cuntz states of different orders may be equivalent. /negationslash /negationslash - Remark 1.8 (i) By definition, ω is a sub-Cuntz state of order 1 if and only if ω is a Cuntz state. From Theorem 1.7, any Cuntz state is not equivalent to any sub-Cuntz state by a nonperiodic parameter z ∈ V ( n,m ) 1 for m ≥ 2. - (ii) The restriction of any sub-Cuntz state on O n by z on the UHF subalgebra UHF n := C ∗ { s J s ∗ K ∈ O n : | J | = | K |} of O n is always uniquely defined by z from Theorem 1.4(iii) (see also [7], Proposition 5.1). - (iii) For ω in (1.4), we have the unique irreducible decomposition of the GNS representation π by ω as follows: $$\pi = \bigoplus _ { j = 1 } ^ { p } \hat { a } _ { j } \pi _ { j }, \quad \hat { a } _ { j } \coloneqq \begin{cases} \ 1 \quad ( a _ { j } > 0 ), \\ 0 \quad ( a _ { j } = 0 ) \end{cases} \\ \ell \, \pi _ { j } \, \text{ denotes the (irreducible)} \, GNS \, \text{ representation by } \omega _ { j }, \, \text{and } \hat { a } _ { j }$$ /negationslash /negationslash /negationslash /negationslash where π j denotes the (irreducible) GNS representation by ω j , and ˆ a j means the multiplicity coefficient of π j in π . By Theorem 1.7, π i ∼ π j when i = j because e 2 πi √ -1 /p x ∼ e 2 πj √ -1 /p x when i = j . Hence π is multiplicity free. In consequence, the GNS representation by any sub-Cuntz state is multiplicity free, and the class of GNS representations by sub-Cuntz states is closed with respect to the irreducible decomposition. - (iv) We can verify that ∼ in Theorem 1.7(ii) is an equivalence relation. Let ≈ denote the equivalence relation on V n,m = ( C n ) ⊗ m by the action of the cyclic group Z /m Z with respect to permutations of tensor components. Then ∼ does not coincide with ≈ . For example, define three vectors in ( V n, 3 ) 1 , n ≥ 3 by Then z (1) ≈ z (2) ≈ z (3) , but z (1) ∼ z (2) ∼ z (3) . $$\text{rs in } ( \mathcal { V } _ { n, 3 } ) _ { 1 }, \, n \geq 3 \, \text{by} \\ \begin{cases} \ z ^ { ( 1 ) } \coloneqq & e _ { 1 } \otimes \frac { e _ { 1 } \otimes e _ { 2 } + e _ { 2 } \otimes e _ { 3 } } { \sqrt { 2 } }, \\ \\ \ z ^ { ( 2 ) } \coloneqq & \frac { e _ { 1 } \otimes e _ { 2 } + e _ { 2 } \otimes e _ { 3 } } { \sqrt { 2 } } \otimes e _ { 1 }, \\ \\ \ z ^ { ( 3 ) } \coloneqq & \frac { e _ { 2 } \otimes e _ { 1 } \otimes e _ { 1 } + e _ { 3 } \otimes e _ { 1 } \otimes e _ { 2 } } { \sqrt { 2 } }. \end{cases} \\ \i z ^ { ( 1 ) } \approx z ^ { ( 2 ) } \approx z ^ { ( 3 ) }, \, \text{but } z ^ { ( 1 ) } \sim z ^ { ( 2 ) } \not \, z ^ { ( 3 ) }. \end{cases}$$ /negationslash ## 1.3 Naturalities of state parameterization In Theorem 1.4, we introduced a parametrization of pure sub-Cuntz states: $$z & \longmapsto \tilde { \omega } _ { z }. \\. &. &. &. &. &. &. &. &.$$ ↦ In this subsection, we show how natural this parameterization is. ## 1.3.1 U n ( ) -covariance For convenience, we introduce some symbols as follows. Corollary 1.9 Define $$\mathfrak { N } _ { n } \coloneqq \ \{ z \in \bigcup _ { m \geq 1 } ( \mathcal { V } _ { n, m } ) _ { 1 } \, \colon z \ i s \ n o n p e r i o d i c \}, \\ \ \sim \quad \tau \quad - \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ $$\mathfrak { I } _ { n } \coloneqq \ \{ z \in \bigcup _ { m \geq 1 } ( \mathcal { V } _ { n, m } ) _ { 1 } \, \colon z \text{ is indecomposable} \}, \\ \omega \quad. \quad. \quad. \quad. \quad. \quad \omega$$ $$\mathcal { P } _ { n } \, \colon \, \text{ the set of all pure states on } \mathcal { O } _ { n },$$ P n,sub $$\mathcal { P } _ { n, s u b } \colon \text{ the set of all pure sub-Cunntz states on } \mathcal { O } _ { n },$$ Spec O n : the set of all unitary equivalence classes of irreducible representations of O n where z is said to be indecomposable if z can not be written as z 1 ⊗ z 2 for any z , z 1 2 . Then the following hold: - (i) The map q : N n →P n,sub ; q z ( ) := ˜ ω z , is bijective. - (ii) The map r : I n → Spec O n ; r z ( ) := [ π z ] , is injective where [ π z ] denotes the unitary equivalence class of the GNS representation π z by ˜ ω z . Proof. (i) From Corollary 1.6, the statement holds. (ii) From Theorem 1.7, if both z and y are indecomposable, then ˜ ω z ∼ ˜ ω y if and only if z = y . From this, the statement holds. From Theorem 1.7, N n / ∼ ∼ P = n,sub / ∼ and I n / ∼ = I n . The parameter set I n can be regarded as the set of non-commutative homogeneous irreducible polynomials in n -variables with the norm 1 [43]. We show a naturality of the parameterization in Corollary 1.9 with respect to the standard unitary group action α on O n , which is defined as $$\alpha _ { g } ( s _ { i } ) \coloneqq \sum _ { j = 1 } ^ { n } g _ { j i } s _ { j } \ \ ( i = 1, \dots, n, \, g = ( g _ { i j } ) \in U ( n ) ). \quad \ ( 1. 8 )$$ Define the dual action α ∗ of α on the dual O ∗ n of O n by α ∗ g ( f ) := f ◦ α g ∗ for f ∈ O ∗ n and g ∈ U n ( ). Especially, α ∗ g ( P n ) = P n for all g . $$\gamma _ { g } e _ { i } \coloneqq \sum _ { j = 1 } ^ { n } g _ { j i } e _ { j } \quad ( i = 1, \dots, n, \, g \in U ( n ) ).$$ Let γ denote the standard action of U n ( ) on V n, 1 = C n , that is, Since γ ⊗ m g := ( γ g ) ⊗ m is a unitary, γ ⊗ m g (( V n,m ) 1 ) = ( V n,m ) 1 for all g ∈ U n ( ). Define the action Γ of U n ( ) on ⋃ m ≥ 1 ( V n,m ) 1 by Γ g z := γ ⊗ m g z when z ∈ ( V n,m ) 1 . Remark that if z is nonperiodic ( resp. indecomposable), then Γ g z is also nonperiodic ( resp. indecomposable) for any g ∈ U n ( ). Proposition 1.10 ( U n ( ) -covariance) Let N n be as in Corollary 1.9. For any g ∈ U n ( ) and z ∈ N n , $$\alpha _ { g } ^ { * } ( \tilde { \omega } _ { z } ) = \tilde { \omega } _ { \Gamma _ { g } z }.$$ That is, the parameterization z → ˜ ω z is U n ( ) -covariant. ↦ Proof. Assume z ∈ V ( n,m ) 1 ∩ N n . By definition, we can verify α ∗ g (˜ ω z )( s J ) = ( γ ⊗ m g z ) J = (Γ g z ) J for all J ∈ { 1 , . . . , n } m and g ∈ U n ( ). Since Γ g z is nonperiodic, α ∗ g (˜ ) coincides with ˜ ω z ω Γ g z from Theorem 1.4(i). In other words, q in Corollary 1.9(i) is an isomorphism between two dynamical systems ( N n , Γ , U ( n )) and ( P n,sub , α ∗ , U ( n )). ## 1.3.2 Compatibility with ϕ -tensor product In [33], we introduced a non-symmetric tensor product of states on Cuntz algebras. In this subsection, we show tensor product formulas of sub-Cuntz states. We review definitions in [33]. Let s ( n ) 1 , . . . , s ( n ) n denote Cuntz generators of O n . For 2 ≤ n, n ′ &lt; ∞ , define the unital ∗ -embedding ϕ n,n ′ of O nn ′ into O ⊗O n n ′ by ϕ n,n ′ ( s ( nn ′ ) n ′ ( i -1)+ j ) := s ( n ) i ⊗ s ( n ′ ) j for i = 1 , . . . , n, j = 1 , . . . , n ′ . Let S n denote the set of all states on O n . For ( ω , ω 1 2 ) ∈ S n × S n ′ , the ϕ -tensor product ω 1 ⊗ ϕ ω 2 ∈ S nn ′ is defined by $$\omega _ { 1 } & \otimes _ { \varphi } \omega _ { 2 } \coloneqq ( \omega _ { 1 } \otimes \omega _ { 2 } ) \circ \varphi _ { n, n ^ { \prime } }. & \quad \quad ( 1. 1 1 ) \\. &. &. &. &. &. &. &. &.$$ Then ⊗ ϕ is associative. Hence the set ⋃ n ≥ 2 S n is a semigroup with the product ⊗ ϕ . Furthermore, the following holds. Proposition 1.11 The ϕ -tensor product of any two sub-Cuntz states is also a sub-Cuntz state, that is, the set of all sub-Cuntz states is closed with respect to ⊗ ϕ . For J = ( j 1 , . . . , j m ) ∈ { 1 , . . . , n } m and K = ( k , . . . , k 1 m ) ∈ { 1 , . . . , n ′ } m , define J /squaremultiply K = ( l 1 , . . . , l m ) ∈ { 1 , . . . , nn ′ } m by l t := n ′ ( j t -1) + k t for t = 1 , . . . , m . For z = ∑ z J e J ∈ V n,m and y = ∑ y K K e ∈ V n ,m ′ , define z /squaremultiply y ∈ V nn ,m ′ by $$z \not \in \sum _ { L \in \{ 1, \dots, n n ^ { \prime } \} ^ { m } } ( z \not \in y ) _ { L } e _ { L }, \ \ ( z \not \in y ) _ { L } \coloneqq z _ { J } y _ { K } \quad \quad ( 1. 1 2 ) \\. \quad \ast \ \omega \quad \ m \quad \cdots \ \omega \quad \omega \quad \omega \quad \cdots \ \omega \quad \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots. \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdclots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cd: \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cd.. \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cd> \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cd< \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cd>< \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots\ \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdts \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdocks \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdjs \ \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \ddots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \dd> \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \cdots \ \dd></ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ } \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ where J ∈ { 1 , . . . , n } m and K ∈ { 1 , . . . , n ′ } m are uniquely defined as J /squaremultiply K = L . By definition, ‖ z /squaremultiply y ‖ = ‖ z ‖ · ‖ y ‖ . If ‖ z ‖ = ‖ y ‖ = 1, then ‖ z /squaremultiply y ‖ = 1. Remark that for any z, y ∈ V n,m , z ⊗ y ∈ V n, 2 m and z /squaremultiply y ∈ V n ,m 2 . Clearly, V n, 2 m ∼ V = n ,m 2 , but we distinguish ⊗ from /squaremultiply here. $$z * y \coloneqq z ^ { \otimes \alpha } \not \in y ^ { \otimes \beta } \in \mathcal { V } _ { n n ^ { \prime }, d } \quad \quad \quad ( 1. 1 3 ) \\. \quad \cdot \quad. \quad. \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ In addition to /squaremultiply , we define a new operation. For z = ∑ z J e J ∈ V n,m and y = ∑ y K K e ∈ V n ,l ′ , define where d, α, β ≥ 1 are uniquely chosen such that d := αm = βl is the least common multiple of m and l . Especially, if m = , then l α = β = 1, d = m and z ∗ y = z /squaremultiply y . If ‖ z ‖ = ‖ y ‖ = 1, then ‖ z ∗ y ‖ = 1. About examples of these operations, see [33]. Proposition 1.12 Assume that both z ∈ ( V n,m ) 1 and y ∈ ( V n ,l ′ ) 1 are nonperiodic. Then the following hold: - (i) z ∗ y is nonperiodic. - (ii) (Tensor product formula) ˜ ω z ⊗ ϕ ˜ ω y = ˜ ω z ∗ y . Especially, if m = l , then ˜ ω z ⊗ ϕ ˜ ω y = ˜ ω z /squaremultiply y . Let ω z denote the Cuntz state on O n by z ∈ ( C n ) 1 . As special cases of Proposition 1.10 and Proposition 1.12(ii), the following hold: $$\alpha _ { g } ^ { * } ( \omega _ { z } ) = \omega _ { g z }, \quad \omega _ { z } \otimes _ { \varphi } \omega _ { y } = \omega _ { z \otimes y }$$ for any z ∈ ( C n ) 1 , y ∈ ( C n ′ ) 1 and g ∈ U n ( ) where gz = γ z g . From Proposition 1.12(ii), the operation ∗ is associative because ⊗ ϕ is associative. Proposition 1.12(i) means that N ∗ := ⋃ n ≥ 2 N n is a semigroup with the product ∗ . Furthermore, the following holds from Corollary 1.6. Corollary 1.13 For q and P n,sub in Corollary 1.9, the set P ∗ ,sub := ⋃ n ≥ 2 P n,sub is a semigroup with the product ⊗ ϕ , and q can be extended to an isomorphism between ( N ∗ , ∗ ) onto ( P ∗ ,sub , ⊗ ϕ ) . Corollary 1.13 means the second naturality of the state parametrization q . The paper is organized as follows: In § 2, we will review known results and prepare tools to prove main theorems. In § 2.2, a matricization of state parameter will be introduced. In § 3, we will prove main theorems. In § 4, we will show examples. In § 4.1, we will show sub-Cuntz states of order 2. In § 4.2, sub-Cuntz states associated with permutative representations will be explained. In § 4.3, examples of non-sub-Cuntz states will be shown. ## 2 Preparations ## 2.1 Finitely correlated states on O n We start from general properties of extensions of states. Proposition 2.1 ([15], 2.10.1) Let A be a C -algebra with unit ∗ I , and B a C -subalgebra of ∗ A such that I ∈ B . Then the following hold: - (i) Every state on B can be extended to a state on A . - (ii) Every pure state on B can be extended to a pure state on A . Especially, if its extension is unique, then it is pure. The existence of sub-Cuntz state is assured by Proposition 2.1(i). If it is unique, then its purity is assured by Proposition 2.1(ii). Definition 2.2 ([6, 8]) A state ω on O n ( 2 ≤ n ≤ ∞ ) is said to be finitely correlated if dim K &lt; ∞ where K := Lin 〈{ π s ( J ) ∗ Ω ∈ H : J }〉 and ( H , π, Ω) denotes the GNS representation by ω . If not, ω is said to be infinitely correlated. Next, we show equivalent definitions of sub-Cuntz state as follows. Theorem 2.3 Fix m ≥ 1 . Let ω be a state on O n with the GNS representation ( H , π, Ω) . For z = ∑ z J e J ∈ ( V n,m ) 1 , the following conditions are equivalent: - (i) ω is a sub-Cuntz state by z . - (ii) Ω = π s z ( ( ))Ω where s z ( ) := ∑ z J s J . - (iii) π s ( J ) ∗ Ω = z J Ω for all J ∈ { 1 , . . . , n } m . Proof. From Proposition 5.1 of [7], (ii) and (iii) are equivalent. By the definition of ( H , π, Ω), (iii) implies (i). From (i), we have ∑ z J ω s ( J ) = 1. This implies ‖ Ω -∑ z J π s ( J ) ‖ = 0. Hence (ii) holds. In Definition 5.7 of [17], a cyclic representation of O n which satisfies equations in Theorem 2.3(iii) with m = 1 is called a generic representation . Lemma 2.4 (i) When n &lt; ∞ , any sub-Cuntz state on O n is finitely correlated. - (ii) If ω is a sub-Cuntz state with the GNS representation ( H , π, Ω) , then H = Lin 〈{ π s ( J )Ω : J }〉 . Proof. Assume that ω is a sub-Cuntz state on O n by z = ∑ z J e J ∈ V ( n,m ) 1 . (i) By Theorem 2.3(iii), dim Lin 〈{ π s ( ∗ J )Ω : J }〉 ≤ ∑ m -1 l =0 dimLin 〈{ π s ( ∗ J )Ω : | J | = l } ≤ m -1 l =0 n &lt; l ∞ . - ∑ (ii) Since O n is spanned by { s J s ∗ K : J, K } , H is spanned by { π s ( J s ∗ K )Ω : J, K } . From Theorem 2.3(ii), π s ( J s ∗ K )Ω = π ( s J s ∗ K ( s z ( )) l )Ω for any l ≥ 1. Therefore π s ( J s ∗ K )Ω ∈ Lin 〈{ π s ( J ′ )Ω : J ′ }〉 for any J, K . This implies the statement. Remark that Lemma 2.4(i) does not hold for O ∞ (see Proposition C.2). ## 2.2 Matricization of state parameter Assume m ≥ 2. In this subsection, we introduce operators associated with an element z ∈ V n,m . For x ∈ V n,a and y ∈ V n,b with a, b ≥ 1, define the operator x ⊗ y ∗ from V n,b to V n,a by ( x ⊗ y ∗ ) v := 〈 y v x | 〉 for v ∈ V n,b . We generalize this as follows. For z = ∑ z M M e ∈ V n,m and 1 ≤ a ≤ m -1, define the operator T a ( z ) from V m,a to V n,m -a by $$T _ { a } ( z ) e _ { K } \coloneqq \sum _ { | J | = m - a } z _ { J K } e _ { J } \ \ ( K \in \{ 1, \dots, n \} ^ { a } ). \quad \ \ ( 2. 1 )$$ In other words, T a ( z v ) = ∑ | J | = m a -〈 ¯ z | e J ⊗ v e 〉 J for v ∈ V n,a , or T a ( z ) = ∑ J,K z JK e J ⊗ e ∗ K where z := ∑ z M e M . The operator T a ( z ) is called the matricizing (matricization) [18], unfolding [44] or flattening [49] of a tensor z ∈ V n,m = ( C n ) ⊗ m . Especially, T a ( x ⊗ y ) = x ⊗ y ∗ for any x ∈ V n,m -a and y ∈ V n,a . In the case of m = 2, T 1 ( z ) is identified with the matrix representation ( z ij ) ∈ M n ( C ) of a 2-tensor z = ∑ n i,j =1 z ij e ij ∈ V n, 2 by definition. In general case, by the identification Hom C ( V n,a , V n,m -a ) with the set M n m a -,n a ( C ) of all n m a -× n a matrices, T a is regarded as the following mapping: $$( \mathbb { C } ^ { n } ) ^ { \otimes m } = \mathcal { V } _ { n, m } \ni z \longmapsto T _ { a } ( z ) \in M _ { n ^ { m - a }, n ^ { a } } ( \mathbb { C } ). \quad \quad ( 2. 2 )$$ ↦ /negationslash In order to show properties of T a ( z ), we review operator norms as follows. Let H and K be Hilbert spaces. For a bounded linear operator A from H to K , the uniform norm and the Hilbert-Schmidt norm of A are defined as ‖ A ‖ := sup x ∈H ‖ ‖ , x =1 ‖ Ax ‖ and ‖ A ‖ 2 := (tr A A ∗ ) 1 2 / , respectively [5, 16, 23]. Then ‖ A ‖ ≤ ‖ A ‖ 2 . Furthermore, ‖ A ‖ = ‖ A ‖ 2 = 0 if and only if there exist y ∈ H and x ∈ K such that x, y = 0 and A = x ⊗ y ∗ . /negationslash Fact 2.5 Let z ∈ V n,m . - (i) For 1 ≤ a ≤ m -1 , ‖ T a ( z ) ‖ ≤ ‖ z ‖ . /negationslash - (ii) If z = 0 , then ‖ T a ( z ) ‖ = ‖ z ‖ if and only if z = x ⊗ y for some x ∈ V n,m -a and y ∈ V n,a . Proof. (i) From the inequality of norms and (2.1), $$\| T _ { a } ( z ) \| \leq \| T _ { a } ( z ) \| _ { 2 } = \left \{ \sum _ { | K | = a } \sum _ { | J | = m - a } | z _ { J K } | ^ { 2 } \right \} ^ { 1 / 2 } = \left \{ \sum _ { | M | = m } | z _ { M } | ^ { 2 } \right \} ^ { 1 / 2 } = \| z \|.$$ (ii) Assume ‖ T a ( z ) ‖ = ‖ z ‖ . From the proof of (i), ‖ T a ( z ) ‖ = ‖ z ‖ = ‖ T a ( z ) ‖ 2 . Hence T a ( z ) = x ⊗ w ∗ for some x ∈ V n,m -a and w ∈ V n,a . This implies z JK = x w J K = ( x ⊗ w ) JK for J ∈ { 1 , . . . , n } m a -and K ∈ { 1 , . . . , n } a . By taking y := w z , = x ⊗ y . The inverse direction holds from (2.1). The following is one of key lemmas to prove main theorems. Lemma 2.6 Let m ≥ 2 . - (i) For X,Y ∈ V ( n,m ) 1 , if there exists a nonzero vector v ∈ V n,a for some 1 ≤ a ≤ m -1 which satisfies $$v = c T _ { m - a } ( \overline { X } ) T _ { a } ( Y ) v$$ for some c ∈ U (1) := { c ′ ∈ C : | c ′ | = 1 } , then there exist x 1 ∈ ( V n,a ) 1 and x 2 ∈ V ( n,m -a ) 1 such that X = x 1 ⊗ x 2 and Y = c x 2 ⊗ x 1 . - (ii) In addition to (i), if X = Y , then c = 1 and X is periodic. /negationslash Proof. (i) From Fact 2.5(i), ‖ T b ( z ) ‖ ≤ ‖ ‖ z = 1 for z = X,Y and b = a, m -a . Since v = 0, we obtain ‖ T a ( Y ) ‖ = ‖ T m a -( X ) ‖ = ‖ T m a -( X ) ‖ = 1 = ‖ X ‖ = ‖ Y ‖ from (2.4). From these and Fact 2.5(ii), $$X = x _ { 1 } \otimes x _ { 2 }, \ \ Y = x _ { 1 } ^ { \prime } \otimes x _ { 2 } ^ { \prime }$$ for some x , x 1 ′ 2 ∈ ( V n,a ) 1 and x , x 2 ′ 1 ∈ V ( n,m -a ) 1 . By substituting (2.5) into (2.4), $$v = c \overline { x _ { 1 } } \langle x _ { 2 } | x _ { 1 } ^ { \prime } \rangle \langle \overline { x _ { 2 } ^ { \prime } } | v \rangle. \quad \quad ( 2. 6 ) \\ \overline { v _ { 1 } } \longleftarrow \lambda \left ( \overline { v _ { 1 } } \left ( \overline { v _ { 1 } } \right ) \right ) \,.$$ /negationslash From (2.6), 〈 x ′ 2 | v 〉 = c x 〈 ′ 2 | x 1 〉 〈 x 2 | x ′ 1 〉〈 x ′ 2 | v 〉 . By v = 0 and (2.6), 〈 x ′ 2 | v 〉 /negationslash = 0. Hence 1 = c x 〈 ′ 2 | x 1 〉 〈 x 2 | x ′ 1 〉 = 〈 cx 2 ⊗ x 1 | x ′ 1 ⊗ x ′ 2 〉 . x ′ x ′ = cx 2 x 1 . From this and (2.5), the statement holds. From Lemma A.1, 1 ⊗ 2 ⊗ (ii) From (i), cx 2 ⊗ x 1 = Y = X = x 1 ⊗ x 2 . Applying Corollary A.6(i) to this, the statement holds. ## 2.3 Reduction of problems For a given sub-Cuntz state ω of order m ≥ 2, Definition 1.2 determines only special values { ω s ( J ) : | J | = m } , but not all values { ω s ( J s ∗ K ) : J, K } . From Theorem 2.3, we can reduce the uniqueness problem of ω to the problem to determine the smaller set { ω s ( J ) : 1 ≤ | J | ≤ m - } 1 . Lemma 2.7 For z ∈ ( V n,m ) 1 and y ∈ ( V n,l ) 1 , we introduce the following assumptions: Assumption E : ' O n acts on a Hilbert space H with two unit vectors Ω z and Ω y which satisfy $$s ( z ) \Omega _ { z } = \Omega _ { z }, \ \ s ( y ) \Omega _ { y } = \Omega _ { y }$$ where s z ( ) := ∑ z J s J ∈ O n for z = ∑ z J e J .' Assumption EC : Assumption E with the cyclicity of both Ω z and Ω y . Assume Assumption E for z and y . Define the linear functional ω z,y on O n by Then the following hold. $$\omega _ { z, y } \coloneqq \langle \Omega _ { z } | ( \cdot ) \Omega _ { y } \rangle.$$ - (i) For J, K ∈ ⋃ k ≥ 0 { 1 , . . . , n } k , assume that J = J J , K 1 2 = K K 1 2 , | J 1 | = ma , | K 1 | = lb for some a, b ≥ 0 , and | J 2 | = i, | K 2 | = i ′ , 0 ≤ i ≤ m -1 and 0 ≤ i ′ ≤ l -1 . - (a) If ( i, i ′ ) = (0 , 0) , then ω z,y ( s J s ∗ K ) = z J y K ω z,y ( I ) . - (b) If ( i, i ′ ) = (0 , 0) and αm -i = βl -i ′ for some α, β ≥ 1 , then /negationslash $$\omega _ { z, y } ( s _ { J } s _ { K } ^ { * } ) = \overline { z _ { J _ { 1 } } } y _ { K _ { 1 } } \omega _ { z, y } ( I ) \sum _ { | A | = \alpha m - i } \overline { ( z ^ { \otimes \alpha } ) _ { J _ { 2 } A } } ( y ^ { \otimes \beta } ) _ { K _ { 2 } A }. \ ( 2. 9 ) \\ \omega \times \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \omega \hat { \omega } }.$$ /negationslash - (c) If ( i, i ′ ) = (0 0) , and αm -i = βl -i ′ for any α, β ≥ 1 , then ω z,y ( s J s ∗ K ) ∈ W z,y := Lin 〈{ ω z,y ( s M ) , ω z,y ( s ∗ L ) : 1 ≤ | M | ≤ m -1 1 , ≤ | L | ≤ l - }〉 1 . /negationslash Here z ∅ = y ∅ := 1 , z J 1 := z J (1) 1 · · · z J ( a ) 1 and y K 1 := y K (1) 1 · · · y K ( b ) 1 when J 1 = J (1) 1 · · · J ( a ) 1 , K 1 = K (1) 1 · · · K ( b ) 1 , | J ( j ) 1 | = m and | K ( j ′ ) 1 | = l for j = 1 , . . . , a and j ′ = 1 , . . . , b . (ii) For W z,y in (i)(c), W z,y ⊂ X := Lin 〈{ ω z,y ( s M ) : 0 ≤ | M | ≤ m - }〉 1 . Proof. (i) From (2.7) and (2.8), ω z,y ( X ) = ω z,y ( s z ( ) ∗ Xs y ( )) for any X ∈ O n . From this, $$\mu _ { \nu } ^ { \nu }, \quad \omega _ { z, y } ( s _ { J } s _ { K } ^ { * } ) = \overline { z _ { J _ { 1 } } } \, y _ { K _ { 1 } } \omega _ { z, y } ( s _ { J _ { 2 } } s _ { K _ { 2 } } ^ { * } ).$$ /negationslash If ( i, i ′ ) = (0 0), then (a) holds from (2.10). , Assume ( i, i ′ ) = (0 0). , From (2.7) and (2.8), $$\omega _ { z, y } ( s _ { J _ { 2 } } s _ { K _ { 2 } } ^ { * } ) & = \ \omega _ { z, y } ( ( s ( z ) ^ { * } ) ^ { \alpha } \, s _ { J _ { 2 } } s _ { K _ { 2 } } ^ { * } \, s ( y ) ^ { \beta } ) \\ & = \ \sum \quad \sum \ \overline { ( z ^ { \otimes \alpha } ) _ { \, L _ { A } } } ( y ^ { \otimes \beta } ) _ { K _ { A } R } \, \omega _ { z, u } ( s _ { A } ^ { * } s _ { R } )$$ $$= \sum _ { | A | = \alpha m - i } \sum _ { | B | = \beta l - i ^ { \prime } } \overline { ( z ^ { \otimes \alpha } ) _ { J _ { 2 } A } } ( y ^ { \otimes \beta } ) _ { K _ { 2 } B } \, \omega _ { z, y } ( s _ { A } ^ { * } s _ { B } )$$ for any α, β ≥ 1. From this, if αm -i = βl -i ′ , then s ∗ A B s = δ AB I in (2.11). Hence (b) holds. If αm -i = βl -i ′ for any α, β ≥ 1, then /negationslash (2.12) If m -i &gt; l -i ′ , then 1 ≤ | J 2 | + | L | = i + l -i ′ &lt; m . If m -i &lt; l -i ′ , then 1 ≤ | K 2 | + | L | = i ′ + m -i &lt; l . From these and (2.10), (c) holds. (ii) Assume 1 ≤ | K | ≤ l -1. Then l -| K | = γm + j for some γ ≥ 0 and 0 ≤ j ≤ m -1. From (2.7), $$\omega _ { z, y } ( s _ { J _ { 2 } } s _ { K _ { 2 } } ^ { * } ) = \begin{cases} \sum _ { | L | = l - i ^ { \prime } } \psi _ { K _ { 2 } L } \omega _ { z, y } ( s _ { J _ { 2 } } s _ { L } ) \quad & \text{when $m-i>l-i^{\prime}$}, \\ \sum _ { | L | = m - i } \overline { z _ { J _ { 2 } L } } \omega _ { z, y } ( s _ { L } ^ { * } s _ { K _ { 2 } } ^ { * } ) \quad & \text{when $m-i<l-i^{\prime}$}. \end{cases}$$ $$\omega _ { z, y } ( s _ { K } ^ { * } ) = \omega _ { z, y } ( ( s ( z ) ^ { * } ) ^ { \gamma } \, s _ { K } ^ { * } \, s ( y ) ) = \sum _ { | J _ { 1 } | = \gamma m } \sum _ { | J _ { 2 } | = j } \overline { ( z ^ { \otimes \gamma } ) _ { J _ { 1 } } } \, y _ { K J _ { 1 } J _ { 2 } } \, \omega _ { z, y } ( s _ { J _ { 2 } } ). \\ \mathfrak { U } _ { \substack { \partial \partial \dots \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \, \partial \nu \colon$$ $$\text{Hence } \omega _ { z, y } ( s _ { K } ^ { * } ) \in \mathcal { X } \text{ and } \mathcal { W } _ { z, y } \subset \mathcal { X }.$$ Lemma 2.8 Assume Assumption E for z ∈ ( V n,m ) 1 and y ∈ ( V n,l ) 1 with ω z,y in (2.8). - (i) Assume that d, α, β ≥ 1 satisfy d = αm = βl and d ≥ 2 . If m&gt;l and z is nonperiodic, then ω z,y ( s J ) = 0 for any 1 ≤ | J | ≤ d -1 . - (ii) If m = l ≥ 2 and z ∼ y , then ω z,y ( s J ) = 0 for any 1 ≤ | J | ≤ m -1 . /negationslash - (iii) Let ω be a sub-Cuntz state by z and m ≥ 2 . If z is nonperiodic, then ω s ( J ) = 0 for any 1 ≤ | J | ≤ m -1 . Proof. Assume that d, α, β ≥ 1 satisfy d = αm = βl and d ≥ 2. For 1 ≤ a ≤ d -1, let J ∈ { 1 , . . . , n } a . From (2.7), $$\omega _ { z, y } ( s _ { J } ) = \omega _ { z, y } ( ( s ( z ) ^ { \alpha } ) ^ { * } \, s _ { J } \, s ( y ) ^ { \beta } ) = \sum _ { | K | = d - a } \sum _ { | L | = a } \overline { ( z ^ { \otimes \alpha } ) _ { J K } } \, ( y ^ { \otimes \beta } ) _ { K L } \omega _ { z, y } ( s _ { L } ).$$ (2.14) By rewriting this, $$\ddot { \mu }, \quad & u _ { a } = T _ { d - a } ( \overline { z ^ { \otimes \alpha } } ) T _ { a } ( y ^ { \otimes \beta } ) u _ { a } \quad & \quad & ( 2. 1 5 )$$ where T a ( z ) is as in (2.1) and u a := ∑ | J | = a ω z,y ( s J ) e J ∈ V n,a . /negationslash If ω z,y ( s J ) = 0 for some J ∈ { 1 , . . . , n } a and 1 ≤ a ≤ d -1, then u a = 0 in (2.15). Applying Lemma 2.6(i) to (2.15) with ( m,X,Y,c,v ) = ( d, z ⊗ α , y ⊗ β , 1 , u a ), we obtain /negationslash $$z ^ { \otimes \alpha } = z _ { 1 } \otimes z _ { 2$$ for some z 1 ∈ V ( n,a ) 1 and z 2 ∈ V ( n,d -a ) 1 . /negationslash /negationslash (i) If ω z,y ( s J ) = 0 for some J ∈ { 1 , . . . , n } a and 1 ≤ a ≤ d -1, we obtain (2.16). From Corollary A.6(iii) and m &gt; l , z is periodic. This contradicts with the assumption of z . Hence ω z,y ( s J ) = 0 for any 1 ≤ | J | ≤ d -1. - (ii) Assume m = . Then l α = β = 1 and d = m in (2.15). If ω z,y ( s J ) = 0 for some J ∈ { 1 , . . . , n } a and 1 ≤ a ≤ m -1, then z = z 1 ⊗ z 2 and y = z 2 ⊗ z 1 for some z 1 ∈ ( V n,a ) 1 and z 2 ∈ ( V n,m -a ) 1 from (2.16) with α = β = 1. Hence z ∼ y . This contradicts with the assumption of z and y . Hence ω z,y ( s J ) = 0 for any 1 ≤ | J | ≤ m -1. /negationslash (iii) Remark that Assumption EC holds for z and z . In this case, ω = ω z,z . Hence (2.15) holds for z = y , α = β = 1 and d = m . If ω s ( J ) = 0, then z 1 ⊗ z 2 = z = z 2 ⊗ z 1 for some z 1 ∈ ( V n,a ) 1 and z 2 ∈ ( V n,m -a ) 1 from (2.16) with y = z . From Corollary A.6(i) with c = 1, z is periodic. This contradicts with the assumption of z . Hence ω s ( J ) = 0 for any 1 ≤ | J | ≤ m -1. ## 3 Proofs of main theorems ## 3.1 Proof of Theorem 1.4 When m = 1, ω is a Cuntz state. Hence it suffices to show the case of m ≥ 2. For J, K ∈ a ≥ 0 { 1 , . . . , n } a , we compute the value ω s ( J s ∗ K ) as follows. /negationslash /negationslash $$\begin{array} {$$ ⋃ Assume | J | - | K | ∈ m Z . Then either | J , | | K | ∈ m Z ≥ 0 or | J , | | K | ∈ m Z ≥ 0 holds. If | J , | | K | ∈ m Z ≥ 0 , then ω s ( J s ∗ K ) = z J z K from Theorem 2.3(ii) where we use the notation in Theorem 1.4(iii). If | J , | | K | ∈ m Z ≥ 0 , then the condition for J, K in 'otherwise' of Theorem 1.4(iii) holds. In this case, /negationslash Assume | J | - | K | ∈ m Z . In Lemma 2.7, let l = m and y = z . Then the GNS representation ( H , π, Ω) by ω satisfies Assumption EC for Ω z = Ω y = Ω with ω = ω z,y . Applying Lemma 2.7(i)(c) to ω , $$\omega ( s _ { J } s _ { K } ^ { * } ) \in \$$ /negationslash Assume z = x ⊗ p for some p ≥ 2 and x ∈ V ( n,m ′ ) 1 . Let ζ := e 2 π √ -1 /p ∈ U (1). For 1 ≤ j ≤ p , assume that ω j is a sub-Cuntz state on O n by ζ j x . Then we see that ω j is a sub-Cuntz state by z for all j . On the other hand, if i = , then j ω i = ω j . Hence a sub-Cuntz state by z is not unique. - (i) Assume that z is nonperiodic. Then ω s ( J ) = 0 for all 1 ≤ | J | ≤ m -1 from Lemma 2.8(iii). From (3.2), ω s ( J s ∗ K ) = 0 for all J, K which satisfy | J | - | K | ∈ m Z . From this and the case of | J | - | K | ∈ m Z , ω s ( J s ∗ K ) is determined by only z for all J, K . Hence ω is unique. /negationslash /negationslash - (ii) From (i) and Proposition 2.1(ii), the statement holds. - (iii) From the proof of (i), the statement holds. ## 3.2 Proof of Theorem 1.5 Lemma 3.1 Let x = ∑ x e J J ∈ ( V n,m ) 1 and p ≥ 2 . Assume that O n acts on a Hilbert space H with a cyclic unit vector Ω which satisfies $$s ( x ) ^ { p } \, \Omega = \Omega$$ where s x ( ) := ∑ x s J J ∈ O n . Then the following hold: - (i) There exist a unit vector ( α i ) ∈ R p and an orthogonal set { Ω i } p i =1 ⊂ H such that $$\Omega & = \sum _ { i = 1 } ^ { p } \alpha _ { i$$ where ζ := e 2 π √ -1 /p . /negationslash - (ii) In (i), define ω i := 〈 Ω ( )Ω i | · i 〉 . If Ω = 0 i , then ω i ( s x ( ) k ) = ζ -ik for any k ≥ 1 . - (iii) Fix i, j ∈ { 1 , . . . , p } and define x ′ := ζ x i and x ′′ := ζ j x . Assume /negationslash $$m \geq 2. \ I J \, i \neq j, \, \text{ then for } J, K \, \in \bigcup _ { a = 1 } ^ { \mu - 1 } \{ 1, \dots, n \} ^ { \nu }, \\ \langle \Omega _ { i } | s _ { J } s _ { K } ^ { * } \Omega _ { j } \rangle = \begin{cases} \sum _ { | L | = m - | J | } \overline { x ^ { \prime } _ { J L } } \langle \Omega _ { i } | s _ { L } ^ { * } s _ { K } ^ { * } \Omega _ { j } \rangle \quad \text{ when } | J | > | K |, \\ 0 & \quad \text{ when } | J | = | K |, \\ \sum _ { | L | = m - | K | } x ^ { \prime \prime } _ { K L } \langle \Omega _ { i } | s _ { J } s _ { L } \Omega _ { j } \rangle \quad \text{ when } | J | < | K |. \\ \end{cases} \\ ( \text{iv} ) \, \text{ If } i \neq j, \, \text{ then } \langle \Omega _ { i } | s _ { J } s _ { K } ^ { * } \Omega _ { j } \rangle = 0 \text{ for any } J, K.$$ m ≥ 2 . If i = j , then for J, K ∈ ⋃ m -1 a =1 { 1 , . . . , n } a , (iv) If i = j , then 〈 Ω i | s J s ∗ K Ω j 〉 = 0 for any J, K . /negationslash /negationslash Proof. (i) Define K := { w ∈ H : s x ( ) p w = w } . Since Ω ∈ K , K is a non-zero closed subspace of H . Then R := s x ( ) | K satisfies R p = I K . From this, we obtain the spectral decomposition R = ∑ p j =1 ζ -j E j where { E j } is the orthogonal set of projections on K such that E 1 + · · · + E p = I K . For i = 1 , . . . , p , define α i := ‖ E i Ω , and Ω ‖ i := α -1 i E i Ω when α i = 0 and Ω := 0 otherwise. Then the statement holds. i (ii) From (3.4), the statement holds. (iii) From (3.4), $$\L ^ { \prime } \quad s ( x ^ { \prime } ) \Omega _ { i } = \Omega _ { i }, \ \ s ( x ^ { \prime \prime } ) \Omega _ { j } = \Omega _ { j }.$$ In Lemma 2.7, let l = m z , := x ′ and y := x ′′ . Assumption E holds for z and y with ω z,y = 〈 Ω ( )Ω i | · j 〉 . Assume | J | = | K | = a . From (i), ω z,y ( I ) = 〈 Ω Ω i | j 〉 = 0. From this, the statement holds. The rest is proved from Lemma 2.7(i). /negationslash /negationslash (iv) If m = 1, then 〈 Ω i | s J s ∗ K Ω j 〉 = x ′ J x ′′ K 〈 Ω Ω i | j 〉 = 0 for any J, K when i = . Hence we assume j m ≥ 2. From (iii) and Lemma 2.7(ii), it is sufficient to show 〈 Ω i | s J Ω j 〉 = 0 for all 1 ≤ | J | ≤ m -1. In Lemma 2.8(ii), let z := x ′ and y := x ′′ . Since z ∼ y , 〈 Ω i | s J Ω j 〉 = 0 for 1 ≤ | J | ≤ m -1 from Lemma 2.8(ii). /negationslash Proof of Theorem 1.5. Assume that ω is a sub-Cuntz state by z with the GNS representation ( H , π, Ω). For X ∈ O n , we write X as π X ( ) for the simplicity of description. Then the assumption in Lemma 3.1 is satisfied. For α i in Lemma 3.1(i), define a i := α 2 i for i = 1 , . . . , p . From Lemma 3.1(i) and (iv), ω = ∑ p i =1 | α i | 2 ω i = ∑ p i =1 a ω i i . If Ω j = 0, then we see that ω j is the sub-Cuntz state by ζ j x . If Ω j = 0, then ω j = 0 and a j = 0. In this case, we can replace ω j with the sub-Cuntz state by ζ j x with keeping ∑ p i =1 a ω i i . Therefore (1.4) holds as a convex-hull of states. We prove the uniqueness as follows. Assume ω = ∑ p j =1 b ω j j for some ( b 1 , . . . , b p ) ∈ ∆ p -1 . From Lemma 3.1(ii), $$0 = \sum _ { j = 1 } ^ { p } ( a _ { j } - b _ { j } ) \omega _ { j } ( s ( x ) ^ { k } ) = \sum _ { j = 1 } ^ { p } ( a _ { j } - b _ { j } ) \zeta ^ { - j k } \quad \text{for all $k\geq 1$.} \quad ( 3. 7 )$$ This implies a j -b j = 0 for all j . Hence ( a , . . . , a 1 p ) is unique. ## 3.3 Proof of Theorem 1.7 Let ∼ be as in Theorem 1.7. By Theorem 2.3, we can prove the following. Lemma 3.2 For two nonperiodic parameters z ∈ ( V n,m ) 1 and y ∈ ( V n,l ) 1 , the following are equivalent: - (i) ˜ ω z ∼ ˜ ω y . - (ii) Assumption EC in Lemma 2.7 holds for z and y . Lemma 3.3 Let z ∈ V ( n,m ) 1 and y ∈ V ( n,l ) 1 . - (i) Assume Assumption EC for z and y with ω z,y in (2.8). If both z and y are nonperiodic, then ω z,y ≡ 0 . /negationslash /negationslash - (ii) Assume Assumption E for z and y . If there exist integers α, β ≥ 1 such that αm = βl and z ⊗ α = y ⊗ β , then ω z,y ( I ) = 0 . Especially, if m = l and z = y , then ω z,y ( I ) = 0 . /negationslash Proof. (i) Let H be as in Assumption E. If ω z,y ≡ 0, then 0 = ω z,y ( s J ) = 〈 Ω z | s J Ω y 〉 for all J . Since 〈 Ω y | ( )Ω · y 〉 = ˜ ω y and H is generated by { s J Ω y : J } from Lemma 2.4(ii), Ω z = 0. This contradicts with ‖ Ω z ‖ = 1 in Assumption EC. Hence ω z,y ≡ 0. /negationslash - (ii) By (2.7) and (2.8), $$\omega _ { z, y } ( I ) = \omega _ { z, y } ( \underbrace { ( s ( z ) ^ { * } ) ^ { \alpha } } { s ( y ) ^ { \beta } } ) = \underbrace { \langle z ^ { \otimes \alpha } | y ^ { \otimes \beta } \rangle } _ { z, y } ( I ). \quad \ \ ( 3. 8 )$$ By Lemma A.1, z ⊗ α = y ⊗ β implies 〈 z ⊗ α | y ⊗ β 〉 /negationslash = 1. Hence ω z,y ( I ) = 0. /negationslash Lemma 3.4 Let z ∈ ( V n,m ) 1 and y ∈ ( V n,l ) 1 . If l = m and both z and y are nonperiodic, then the following are equivalent: - (i) ˜ ω z ∼ ˜ ω y . - (ii) z ∼ y . Proof. When m = 1, both ˜ ω z and ˜ ω y are Cuntz states. Hence it is sufficient to show the case of m ≥ 2. /negationslash /negationslash /negationslash - (i) ⇒ (ii) Assume ˜ ω z ∼ ˜ ω y . If z = y , then the statement holds. Assume z = y . From Lemma 3.2, Assumption EC for z and y holds. Let ω z,y be as in (2.8). Then ω z,y ( I ) = 0 from Lemma 3.3(ii). From Lemma 3.3(i) and Lemma 2.7(ii), there must exist 1 ≤ a ≤ m -1 such that ω z,y ( s J ) = 0 for some J ∈ { 1 , . . . , n } a . From Lemma 2.8(ii), z ∼ y . - (ii) ⇒ (i) Assume z ∼ y and z = y . Then there exist x , x 1 2 ∈ ⋃ a ≥ 1 ( V n,a ) 1 such that z = x 1 ⊗ x 2 and y = x 2 ⊗ x 1 . Let ( H , π, Ω) denote the GNS representation by ˜ . ω z From Theorem 2.3(ii), π s z ( ( ))Ω = Ω. Then Ω ′ := π s x ( ( 2 ))Ω ∈ H is also a cyclic unit vector because ˜ ω z is pure, and we can verify π s y ( ( ))Ω ′ = Ω . ′ Hence Assumption EC for z and y holds. From Lemma 3.2, ˜ ω z ∼ ˜ ω y . Proof of Theorem 1.7. (i) ⇒ (ii) Assume ˜ ω z ∼ ˜ ω y . From Lemma 3.2, Assumption EC for z and y holds. Let ω z,y be as in (2.8). /negationslash Assume m &gt; l . From Corollary A.6(ii), there exist no α, β such that z ⊗ α = y ⊗ β . From this and Lemma 3.3(ii), ω z,y ( I ) = 0. Since z is nonperiodic, ω z,y ( s J ) = 0 for any 1 ≤ | J | ≤ d -1 from Lemma 2.8(i). From Lemma 2.7(i) and (ii), ω z,y ≡ 0. From Lemma 3.3(i), Assumption EC does not hold. From Lemma 3.2, ˜ ω z ∼ ˜ ω y . Hence m &gt; l . As the same token, we obtain m&lt;l . Hence m = . From Lemma 3.4, l z ∼ y . /negationslash /negationslash - (ii) ⇒ (i) Assume z ∼ y . Then m = . From Lemma 3.4, ˜ l ω z ∼ ˜ ω y . ## 3.4 Proofs of Proposition 1.11 and Proposition 1.12 Proof of Proposition 1.11. Let ω and ω ′ be sub-Cuntz states by z ∈ V ( n,m ) 1 and y ∈ ( V n ,l ′ ) 1 , respectively. Then z ⊗ l ∈ ( V n,ml ) 1 and y ⊗ m ∈ ( V n ,ml ′ ) 1 . For any J ∈ { 1 , . . . , nn ′ } ml , we can verify ( ω ⊗ ϕ ω ′ )( s ( nn ′ ) J ) = ( z ⊗ l /squaremultiply y ⊗ m J ) where /squaremultiply is as in (1.12). Hence ω ⊗ ϕ ω ′ is a sub-Cuntz state by z ⊗ l /squaremultiply y ⊗ m ∈ ( V nn , ml ′ ) 1 . In this proof, there is no assumption of nonperiodicity for z and y . Hence ω, ω ′ and ω ⊗ ϕ ω ′ are not always unique. Lemma 3.5 (i) For x, x ′ ∈ V n,m and y, y ′ ∈ V n ,m ′ , 〈 x /squaremultiply y x | ′ /squaremultiply y ′ 〉 = 〈 x x | ′ 〉〈 y y | ′ 〉 . - (ii) Let x, x ′ ∈ V ( n,m ) 1 and y, z ∈ V ( n ,m ′ ) 1 . If x /squaremultiply y = x ′ /squaremultiply z or y /squaremultiply x = z /squaremultiply x ′ , then y = cz for some c ∈ U (1) . - (iii) If x ∈ ( V n,m ) 1 and y ∈ ( V n ,m ′ ) 1 satisfy x /squaremultiply y = w ⊗ p for some w ∈ ( V nn ,m ′ ′ ) 1 and p ≥ 2 , then there exist v 1 ∈ V ( n,m ′ ) 1 and v 2 ∈ V ( n ,m ′ ′ ) 1 such that x = v ⊗ p 1 and y = v ⊗ p 2 . Proof. (i) By definition, the statement holds. - (ii) Assume x /squaremultiply y = x ′ /squaremultiply z . By assumption and (i), 1 = 〈 x /squaremultiply y x | ′ /squaremultiply z 〉 = 〈 x x | ′ 〉〈 y z | 〉 . By applying Lemma A.1 to this, the statement holds. As the same token, the rest is proved. (iii) By assumption, mp ′ = m . For J ∈ { 1 , . . . , nn ′ } m ′ , ( x /squaremultiply y ) J p = ( w J ) p where J p = J · · · J ( p -times). Hence x J p 1 y J p 2 = ( w J 1 /squaremultiply J 2 ) p for all J 1 ∈ { 1 , . . . , n } m ′ and J 2 ∈ { 1 , . . . , n ′ } m ′ . Then there exist p -th roots A J 1 and B J 2 of x J p 1 and y J p 2 such that A J 1 B J 2 = w J 1 /squaremultiply J 2 . Define A := ∑ J 1 A J 1 e J 1 ∈ V n,m ′ and B := ∑ J 2 B J 2 e J 2 ∈ V n ,m ′ ′ . Then w = A /squaremultiply B . By normalizing A and B , we obtain two unit vectors w , w 1 2 such that w = w 1 /squaremultiply w 2 . From these, x /squaremultiply y = w ⊗ p = ( w 1 /squaremultiply w 2 ) ⊗ p = w ⊗ p 1 /squaremultiply w ⊗ p 2 . From (ii), x = cw ⊗ p 1 and y = cw ⊗ p 2 for some c ∈ U (1). From these, we can choose v 1 and v 2 as the statement. Proof of Proposition 1.12. Let α, β, d be as in (1.13). (i) Assume z ∗ y = w ⊗ p for some w ∈ V nn ,k ′ and p ≥ 2 where k := d/p . By definition, z ⊗ α /squaremultiply y ⊗ β = w ⊗ p . From Lemma 3.5(iii), we obtain v 1 ∈ ( V n,k ) 1 and v 2 ∈ V ( n ,k ′ ) 1 such that $$z ^ { \otimes \alpha } = v _ { 1 } ^ { \otimes p }, \ \ y ^ { \otimes \beta } = v _ { 2 } ^ { \otimes p }.$$ From Corollary A.6(ii), v 1 = c ′′ z ⊗ d 1 for some d 1 ≥ 1 and c ′′ ∈ U (1). From this and (3.9), z ⊗ α = v ⊗ p 1 = ( c ′′ z ⊗ d 1 ) ⊗ p = ( c ′′ ) p z ⊗ d p 1 . Hence α = pd 1 . As the same token, β = pd 2 for some d 2 ≥ 1. Therefore α and β have a common divisor p ≥ 2. This contradicts with the choice of α and β . Therefore z ∗ y is nonperiodic. - (ii) Remark that ˜ ω z ∗ y is uniquely defined by (i) and Theorem 1.4(i). We see that { ˜ ω z ⊗ ϕ ˜ ω y } ( s ( nn ′ ) J ) = ( z ∗ y ) J for all J ∈ { 1 , . . . , nn ′ } d . Hence ˜ ω z ⊗ ϕ ˜ ω y is a sub-Cuntz state by z ∗ y . Since a sub-Cuntz state by z ∗ y is unique, the statement holds. ## 4 Examples In this section, we show examples so that a reader can easily check main theorems. ## 4.1 Sub-Cuntz states of order 2 In this subsection, we show sub-Cuntz states on O n of order 2 as simplest, nontrivial and essentially new examples of main theorems. For convenience, we rewrite main theorems in § 1.2 for the case of m = 2 as follows. Theorem 4.1 Let (( C n ) ⊗ 2 ) 1 := { z ∈ C n ⊗ C n : ‖ z ‖ = 1 } . Fix z = ∑ ij z ij e i ⊗ e j ∈ (( C n ) ⊗ 2 ) 1 . Let ω be a sub-Cuntz state on O n by z , that is, ω is a state on O n which satisfies $$\omega ( s _ { i } s _ { j } ) = \overline { z _ { i j } } \ \text{ for all } i, j = 1, \dots, n.$$ Then such ω exists for any z and the following hold: /negationslash - (i) ω is unique if and only if z is nonperiodic, that is z ∈ { x ⊗ x : x ∈ C n } . In this case, we write ˜ ω z as ω . - (ii) If z is nonperiodic, then ˜ ω z is pure, and the following holds: $$\tilde { \omega } _ { z } ( s _ { J } s _ { K } ^ { * } ) = \begin{cases} \sqrt { z _ { J } } \, z _ { K } & \quad u \\ \sqrt { z _ { J _ { 1 } } } \, z _ { K _ { 1 } } \sum _ { d = 1 } ^ { n } \overline { z _ { j d } } \, z _ { k d } & \quad u \\ 0 & \quad u \end{cases}$$ for J, K ∈ ⋃ a ≥ 1 { 1 , . . . , n } a ∪ {∅} where z J := z J (1) · · · z J ( ) l when J = J (1) · · · J ( ) l and | J ( ) i | = 2 for i = 1 , . . . , l . $$z \ e v o n p r e r v a v a, \, v o n v \, \omega _ { z } \ e v o p r e, \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \, v o n v \}, \\ z ( s _ { J } s _ { K } ^ { * } ) = \begin{cases} \, \overline { z _ { J } } \, z _ { K } \, & \, \text{when both $|J|$ and $|K|$ are even,} \\ \, \overline { z _ { J _ { 1 } } } \, z _ { K _ { 1 } } \sum _ { d = 1 } ^ { n } \overline { z _ { j d } } \, z _ { k d } \, & \text{when $|J|$ and $|K_{1}|$ and $|K_{1}|$ are even,} \\ 0 \, & \text{when $|J|$} - | K | \text{ is odd} \, \\ r \, J, K \in \bigcup _ { \substack { a \geq 1 \\ r ( I \, \underbrace { 1 }, \dots, n \, \underbrace { 1 } ) ^ { a } \cup \{ \emptyset \} \, \text{where $z_{J} \, \colon=z_{J(1)} \cdots z_{J(1)} \, \text{when $J=1} \\ \, ^ { n } \, \underbrace { 1 }, \, \underbrace { 1 }, \, \underbrace { 1 }, \, \underbrace { 1 }, \, \underbrace { 1 }, \, \end{cases}$$ - (iii) If z = x ⊗ x for some x = ( x , . . . , x 1 n ) ∈ C n , then there exists a real number 0 ≤ a ≤ 1 such that ω has the following form $$\omega = a \omega _ { + } + ( 1 - a ) \omega _ { - }$$ where ω ± denotes the Cuntz state on O n by ± x , that is, ω ± satisfies ω ± ( s i ) = ± x i for all i . - (iv) Let z, y ∈ (( C n ) ⊗ 2 ) 1 . If both z and y are nonperiodic, then ˜ ω z ∼ ˜ ω y if and only if (a) z = y , or (b) z = x 1 ⊗ x 2 and y = x 2 ⊗ x 1 for some x , x 1 2 ∈ C n . Proof. The existence of ω holds from Fact 1.3. - (i) From Theorem 1.4(i), the statement holds. - (ii) From Theorem 1.4(ii) and (iii), statements hold. - (iii) From the case of ( p, m ′ ) = (2 1) in Theorem 1.5, the statement holds. , - (iv) From Theorem 1.7, the statement holds. We show a more convenient corollary as follows. Corollary 4.2 Assume the same assumption in Theorem 4.1 for z = ∑ ij z ij e i ⊗ e j . - (i) If A := ( z ij ) ∈ M n ( C ) satisfies ‖ A ‖ &lt; 1 , then ω is unique and pure. - (ii) If z ij = z ji for some i, j , then ω is unique and pure. /negationslash Proof. (i) Remark that A coincides with T 1 ( z ) in (2.1) as operators on C n . The assumption implies that z is indecomposable. Especially, z is nonperiodic. From Theorem 4.1(i) and (ii), the statement holds. (ii) In this case, z is nonperiodic. Hence the statement holds from Theorem 4.1(i) and (ii). Next, we show concrete examples. In stead of z = ∑ ij z ij e i ⊗ e j ∈ (( C n ) ⊗ 2 ) 1 , we use a matrix A = ( z ij ) ∈ M n ( C ) such that ‖ A ‖ 2 = 1 in order to apply Corollary 4.2. We assume that O n acts on a Hilbert space with a cyclic unit vector Ω. Define the vector state ω on O n with respect to Ω: $$\omega \coloneqq \langle \Omega | ( \cdot ) \Omega \rangle.$$ Example 4.3 Let ( c i ) ∈ C n be a unit vector. Assume that the following equation holds: $$\sum _ { i = 1 } ^ { n } c _ { i } s _ { i } ^ { 2 } \Omega = \Omega.$$ - (i) If | c i | &lt; 1 for all i , then A := diag( c 1 , . . . , c n ) ∈ M n ( C ) satisfies ‖ A ‖ &lt; 1. Hence ω is unique and pure from Corollary 4.2(i). - (ii) If there exists i such that | c i | = 1, then c s i 2 i Ω = Ω. Let q ∈ U (1) be a quadratic root of c i . From Theorem 4.1(iii), there exists 0 ≤ a ≤ 1 such that ω = aω + +(1 -a ω ) -where ω ± denotes the Cuntz state by ± qe i , that is, ω ± satisfies ω ± ( s i ) = ± q . In this case, ω is pure if and only if a = 0 or 1. Fix n = 2 from here. Let s ij := s s i j for i, j = 1 2. , Example 4.4 Assume that the following equation holds: $$\frac { 1 } { 2 } ( s _ { 1 1 } - s _ { 1 2 } + s _ { 2 1 } + s _ { 2 2 } ) \Omega = \Omega.$$ /negationslash Then ( z ij ) = 1 2 [ 1 -1 1 1 ] satisfies z 12 = z 21 . From Corollary 4.2(ii), ω is unique and pure. Example 4.5 Assume that the following equation holds: $$\frac { 1 } { \sqrt { 2 } } ( s _ { 1 2 } + s _ { 2 1 } ) \Omega = \Omega.$$ Then A = 1 √ 2 [ 0 1 1 0 ] satisfies ‖ A ‖ = 1 √ 2 &lt; 1. From Corollary 4.2(i), ω is unique and pure. ## 4.2 Sub-Cuntz states associated with permutative representations In this subsection, we show known results in § 5 of [7, 33] by using results of sub-Cuntz states. A representation ( H , π ) of O n is said to be permutative if there exists an orthonormal basis B = { v k : k ∈ Λ } of H such that π s ( i ) v k ∈ B for any i, k [7, 13, 14]. We explain sub-Cuntz states associated with permutative representations as follows. For z = ∑ z J e J ∈ ( V n,m ) 1 , assume z J = 1 for some J . In this case, z = e J and the following holds. Proposition 4.6 (i) For any J ∈ { 1 , . . . , n } m , there exists a state ω on O n which satisfies $$\omega ( s _ { J } ) = 1.$$ - (ii) If a state ω on O n satisfies (4.8), then ω is unique if and only if J is nonperiodic, that is, J = K p for some K implies p = 1 . In this case, ω is a pure sub-Cuntz state ˜ ω e J by e J , and we write φ J as ˜ ω e J for short. - (iii) If J is nonperiodic, then the GNS representation by φ J is permutative. - (iv) If J = K p for some nonperiodic word K and p ≥ 2 , then φ J = ∑ p j =1 a ω j j for some nonnegative numbers a , . . . , a 1 p such that a 1 + · · · + a p = 1 where ω j denotes the sub-Cuntz state by e 2 πj √ -1 /p e J . - (v) For two nonperiodic words J and K φ , J ∼ φ K if and only if J and K are conjugate, that is, J = K or J = L L 1 2 and K = L L 2 1 for some L , L 1 2 . - (vi) Let S n denote the symmetric group on the set { 1 , . . . , n } . Define the action of S n on C n as σe i := e σ i ( ) for i = 1 , . . . , n σ ∈ S n . With respect to this action, we identify S n with the subgroup of U n ( ) . Then for any nonperiodic word J , α ∗ σ ◦ φ J = φ σJ for any σ ∈ S n where α ∗ is as in § 1.3.1 and σJ := ( σ j ( 1 ) , . . . , σ ( j l )) when J = ( j 1 , . . . , j l ) . - (vii) Let ⊗ ϕ and /squaremultiply be as in § 1.3.2. For two nonperiodic words J and K , φ J ⊗ ϕ φ K = φ J ∗ K where J ∗ K := J α /squaremultiply K β such that α, β ≥ 1 and α J | | = β K | | is the least common multiple of | J | and | K | . Proof. (i) Let z := e J ∈ V ( n,m ) 1 when | J | = m . Then we see that ω satisfies ω s ( K ) = δ JK for all K ∈ { 1 , . . . , n } m . Hence ω is a sub-Cuntz state by z . From Fact 1.3, the statement holds. - (ii) Let z := e J ∈ V ( n,m ) 1 when | J | = m . By assumption, z is nonperiodic if and only if J is nonperiodic. From Theorem 1.4(i) and (ii), the statement holds. /negationslash - (iv) From Theorem 1.5, the statement holds. - (iii) Let ( H , π, Ω) denote the GNS representation by φ J . We prove that ( H , π ) is permutative as follows. Since π s ( J )Ω = Ω, φ J ( s K ) = 1 when K ∈ X := { J a : a ≥ 0 } and φ J ( s K ) = 0 when K ∈ X . Let v K := π s ( K )Ω. Since J is nonperiodic, 〈 v K | v L 〉 = 1 when K = LJ a or L = KJ a for some a ≥ 0 and 〈 v K | v L 〉 = 0 otherwise. From Lemma A.1, 〈 v K | v L 〉 = 1 if and only if v K = v L . Therefore { u ∈ H : there exists K such that u = v K } is an orthonormal basis of H from Lemma 2.4(ii). Hence ( H , π ) is permutative. - (v) From Theorem 1.7, the statement holds. - (vi) From Proposition 1.10, the statement holds. - (vii) From Proposition 1.12, the statement holds. When m = 1 in Proposition 4.6, there exists i ∈ { 1 , . . . , n } such that z = e i . In this case, z is nonperiodic and the following holds: $$\omega ( s _ { j } ) = \delta _ { i j } \quad \text{for all $j=1,\dots,n$.}$$ Any Cuntz state is given as a transformation of this by the dual action of the standard U n ( )-action on O n (see the proof of Theorem B.1(ii)). Fact 4.7 Assume that O n acts on the Hilbert space /lscript 2 (Λ) with an orthonormal basis B = { v λ : λ ∈ Λ } such that s v i λ ∈ B for any i and λ , and ω is the vector state on O n by v λ 0 for some λ 0 ∈ Λ . If ω is finitely correlated, then ω L := ω s ( L ( ) · s ∗ L ) is a sub-Cuntz state for some L ∈ { 1 , . . . , n } k . Especially, if ω is pure, then ω L is also pure and ω L ∼ ω . Proof. Let Ω := v λ 0 . By assumption, the action of O n on H is permutative. Hence s ∗ J Ω = 0 or s ∗ J Ω ∈ B for any J . Therefore { s ∗ J Ω : J } ⊂ B ∪ { 0 } and # { s ∗ J Ω : J } = #( { s ∗ J Ω : J } ∩ B ) + 1. By assumption, $$\infty & > \dim \lim \L i n \langle \{ s _ { J } ^ { * } \Omega \, \colon J \} \rangle = \dim \lim \L i n \langle \{ s _ { J } ^ { * } \Omega \in B \, \colon J \} \rangle = \# \{ s _ { J } ^ { * } \Omega \in B \, \colon J \}. \\ \quad \quad \quad$$ /negationslash Hence # { s ∗ J Ω : J } &lt; ∞ . For any λ ∈ Λ, there exists a unique i such that s v ∗ i λ ∈ B . Hence there exists a unique sequence { J ( ) l ∈ ⋃ a ≥ 1 { 1 , . . . , n } a : | J ( ) l | = l for all l } such that s ∗ J ( ) l Ω = 0 for any l . Since # { s ∗ J Ω : J } &lt; ∞ , there exist p ≥ 1 and l 0 ≥ 1 such that s ∗ J ( l 0 + p ) Ω = s ∗ J ( l 0 ) Ω. Let L := J ( l 0 ) and Ω ′ := s ∗ L Ω. Then s ∗ J ′ Ω = Ω ′ ′ for some J ′ . This implies that ω L is a sub-Cuntz state by z = e J ′ . If ω is pure, then the statement holds by the construction of ω L . ## 4.3 Infinitely correlated states as non-sub-Cuntz states From Lemma 2.4(i), any infinitely correlated state is not a sub-Cuntz state on O n when n &lt; ∞ . In this subsection, we show examples of infinitely correlated states. Example 4.8 (Infinitely correlated state associated with a permutative representation) Let N := { 1 2 , , . . . } and let { e k,m : ( k, m ) ∈ N × Z } denote the standard basis of /lscript 2 ( N × Z ). For 2 ≤ n &lt; ∞ , define a representation π of O n on /lscript 2 ( N × Z ) by $$\pi ( s _ { i } ) e _ { k, m } \coloneqq e _ { n ( k - 1 ) + i, m + 1 } \ \left ( ( k, m ) \in \mathbb { N } \times \mathbb { Z }, \, i = 1, \dots, n ). \quad ( 4. 1 1 )$$ By definition, ( /lscript 2 ( N × Z ) , π ) is permutative, and π s ( m 1 ) ∗ e 1 0 , = e 1 , -m for any m ≥ 1. Hence dimLin 〈{ π s ( J ) ∗ e 1 0 , : J }〉 = ∞ . Therefore the state ω := 〈 e 1 0 , | π ( ) · e 1 0 , 〉 is infinitely correlated. Example 4.9 (Quasi-free states) We show that any quasi-free state on O n is infinitely correlated. Let Λ n := { ( a , . . . , a 1 n ) ∈ R n : a i &gt; 0 for all i, a 1 + · · · + a n = 1 . For } a ∈ Λ , define the state n ρ a on O n by $$\rho _ { a } ( s _ { J } s _ { K } ^ { * } ) \coloneqq a _ { J } \delta _ { J K } \ \ ( J, K \in \mathcal { I } \coloneqq \bigcup _ { m \geq 0 } \{ 1, \dots, n \} ^ { m } ) \quad \ ( 4. 1 2 )$$ where a J := a j 1 · · · a j m for J = ( j 1 , . . . , j m ) and a ∅ := 1. The state ρ a is called the quasi-free state on O n by a [3, 19]. It is known that the GNS representation by ρ a is a type III factor representation; ρ a ∼ ρ b if and only if a = ; b ρ a ⊗ ϕ ρ b = ρ a /squaremultiply b [25, 36, 39]. Fix a ∈ Λ n and let ( H , π, Ω) denote the GNS representation by ρ a . For J ∈ I , define v J := a -1 2 / J π s ( J ) ∗ Ω ∈ H . From (4.12), we see that { v J : J ∈ I} is an orthonormal system in H . Therefore dim Lin 〈{ π s ( J ) ∗ Ω : J ∈ I}〉 = dimLin 〈{ v J : J ∈ I}〉 = # I = ∞ . Hence ρ a is infinitely correlated. ## Appendix ## A Combinatorics on words in tensor algebra In this section, we prove the freeness of some semigroup with uncountable rank associated with a tensor algebra. By using this fact and known results about free semigroups, we derive crucial lemmas for main theorems. ## A.1 Cancellation law and equidivisibility of tensor product We show the cancellation law ([24], 2.6.1) and equidivisibility ([24], § 7.1) of tensor product. Let U (1) := { c ∈ C : | c | = 1 . } The following is very elementary, but mistakes are often found in literature. Lemma A.1 If z and y are unit vectors in a Hilbert space, then 〈 z y | 〉 = 1 if and only if z = y . Proof. If 〈 z y | 〉 = 1, then 1 = |〈 z y | 〉| ≤ ‖ z ‖·‖ y ‖ = 1. Since |〈 z y | 〉| = ‖ z ‖·‖ y ‖ , z = cy for some c ∈ U (1). From this, 1 = 〈 z y | 〉 = 〈 cy y | 〉 = . Hence c z = y . The inverse direction is trivial. Lemma A.2 Let ( V n,m ) 1 be as in § 1.2. - (i) (Cancellation law) Assume that x, x ′ ∈ V ( n,m ) 1 and y, z ∈ ⋃ a ≥ 1 ( V n,a ) 1 satisfy x ⊗ y = x ′ ⊗ z or y ⊗ x = z ⊗ x ′ . Then x = cx ′ and y = cz for some c ∈ U (1) . In addition, if x = x ′ , then y = z . - (ii) (Equidivisibility) Assume x ∈ V ( n,m ) 1 , y ∈ V ( n,l ) 1 and m&gt;l . - (a) If x ⊗ w = y ⊗ z , then there exists x ′ ∈ ( V n,m -l ) 1 such that x = y ⊗ x ′ . - (b) If w ⊗ x = z ⊗ y , then there exists x ′′ ∈ ( V n,m -l ) 1 such that x = x ′′ ⊗ y . Proof. (i) By using Lemma A.1, the statement can be verified. (ii) When x = x e and y = y e , define $$x ^ { \prime } \coloneqq \sum _ { | J _ { 1 } | = l } \sum _ { | J _ { 2 } | = m - l } x _ { J _ { 1 } J _ { 2 } } \, \overline { y _ { J _ { 1 } } } \, e _ { J _ { 2 } } \in \mathcal { V } _ { n, m - l }.$$ ∑ J J ∑ K K Since x ′ = ∑ | K | = m l -〈 y ⊗ e K | z e 〉 K , $$\| x ^ { \prime } \| ^ { 2 } = \sum _ { K } | \langle y \otimes e _ { K } | z \rangle | ^ { 2 } \leq \sum _ { i } | \langle v _ { i } | z \rangle | ^ { 2 } = \| z \| ^ { 2 } = 1 \quad \text{(A.2)}$$ where { v i } is an orthonormal basis of V n,m such that { y ⊗ e K : | K | = m l - } ⊂ { v i } . Then we can verify 〈 x ⊗ w y | ⊗ 〉 z = 〈 x ′ ⊗ w z | 〉 . From this, $$\begin{array} { c c c c } 1 = & \langle x \otimes w | y \otimes z \rangle \\ & = & \langle x ^ { \prime } \otimes w | z \rangle \\ & = & \langle y \otimes x ^ { \prime } \otimes w | y \otimes z \rangle \\ & = & \langle y \otimes x ^ { \prime } \otimes w | x \otimes w \rangle \\ & = & \langle y \otimes x ^ { \prime } | x \rangle. \end{array}$$ From this and (A.2), 1 = 〈 y ⊗ x x ′ | 〉 ≤ ‖ y ⊗ x ′ ‖ · ‖ x ‖ ≤ 1. This implies y ⊗ x ′ = cx for some c ∈ C . By substituting this into (A.3), 1 = 〈 y ⊗ x x ′ | 〉 = 〈 cx x | 〉 = c . Hence y ⊗ x ′ = x and ‖ x ′ ‖ = 1. Hence (a) is proved. As the same token, (b) is verified. ## A.2 Projective homogeneous tensor semigroup is free Let V := V n, 1 and we identify V n,m with V ⊗ m for m ≥ 1, and let V ⊗ 0 := C . By forgetting the addition of the tensor algebra T V ( ) := ⊕ m ≥ 0 V ⊗ m over V , T V ( ) is regarded as a semigroup with respect to the tensor product ⊗ . Furthermore, its projective space PT V ( ) := ( T V ( ) \{ } 0 ) / C × is a semigroup with respect to the product [ x y ][ ] := [ x ⊗ y ] for x, y ∈ T V ( ) \ { 0 } where [ x ] := { cx : c ∈ C × } ∈ PT V ( ). For any subsemigroup S of T V ( ), PS := ( S \ { 0 ) } / C × is a subsemigroup of PT V ( ). Especially, we consider the following subsemigroup G of ( T V ( ) , ⊗ ) and its projective semigroup PG : $$G \coloneqq \bigcup _ { m \geq 1 } ( V ^ { \otimes m } ) _ { 1 }, \quad \text{(A.4)}$$ that is, G is the subsemigroup of all homogeneous unit vectors in T V ( ) except vectors in V ⊗ 0 . A semigroup S is said to be free if there exists a nonempty subset B of S such that B generates S , and for any semigroup S ′ and any map f from B to S ′ , there exists a homomorphism ˆ from f S to S ′ such that ˆ f | B = f [24]. In this case, S is called the free semigroup over B and # B is called the rank of S . A free semigroup is defined uniquely up to an isomorphism by the rank. Lemma A.3 ([11], Theorem 9.1) A semigroup S is free if and only if there exists a nonempty subset B of S such that every element of S has a unique expression as a product of elements of B . Proposition A.4 For G in (A.4), its projective semigroup PG is free. Proof. Let I n be as in Corollary 1.9. From Lemma A.3, it is sufficient to show that every element of PG can be expressed uniquely as a product of elements of B := P I n . /negationslash Let X ∈ PG . By definition, X ∈ P ( V n,m ) 1 for some m ≥ 1. Hence X = [ x ] for some x ∈ V ( n,m ) 1 . If x ∈ I n , then X ∈ B . Hence X is uniquely written as an element of B . Assume x ∈ I n . By definition, x = z 1 ⊗ z 2 for some z , z 1 2 ∈ ⋃ a ≥ 1 ( V n,a ) 1 . When y ∈ ( V n,m ) 1 , define | y | := m . Then 1 ≤ | z 1 | , | z 2 | &lt; m = | x | . By decomposing x repeatedly, we can obtain a finest decomposition x = x 1 ⊗ · · · ⊗ x l . Then x i ∈ I n for i = 1 , . . . , l and l ≤ m . Hence X = [ x ] always has a decomposition [ x 1 ] · · · [ x l ] for [ x i ] ∈ B for all i . Assume that X = X ′ 1 · · · X ′ k and X ′ j = [ x ′ j ] for x ′ j ∈ I n for all j . Then x 1 ⊗···⊗ x l = cx ′ 1 ⊗···⊗ x ′ k for some c ∈ U (1). From Lemma A.2(ii), | x 1 | = | x ′ 1 | because x , x 1 ′ 1 ∈ I n . From this and Lemma A.2(i), x 1 = c x 1 ′ 1 for some c 1 ∈ U (1). This implies X 1 = X ′ 1 . By the mathematical induction, we can verify that X i = X ′ i for all i and l = k . Therefore X has a unique expression as a product of elements of B . Remark that T V ( ) is the free C -algebra over the set { 1 , . . . , n } when dim V = n [43]. On the other hand, PG is the free semigroup over the uncountable set P I n , that is, the rank of PG is uncountable. Proposition A.5 Let B + denote the free semigroup over a set B . - (i) ([24], Proposition 7.1.5) Let # B ≥ 2 , and let u, v ∈ B + . Then uv = vu if and only if u and v are powers of the same element w ∈ B + . - (ii) ([24], Proposition 7.1.6) If u, v ∈ B + satisfy u m = v n for some m,n ≥ 1 , then u and v are powers of the same element w ∈ B + . - (iii) ([47], Proposition 1.3.3) Recall the definition of conjugacy in Theorem 1.7(ii). Let x, y ∈ B n := { b 1 · · · b n : b i ∈ B, i = 1 , . . . , n } and s, t be nonperiodic such that x = s p and y = t q . Then x and y are conjugate if and only if s and t are conjugate. ## Corollary A.6 Let x ∈ V ( n,m ) 1 and y ∈ V ( n,l ) 1 . - (i) Assume $$y \otimes x = c x \otimes y \\ \sum _ { \mu } \,. \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdots$$ for some c ∈ U (1) . Then there exists w ∈ V ( n,a ) 1 such that x = γ w 1 ⊗ f 1 and y = γ w 2 ⊗ f 2 for some f , f 1 2 ≥ 1 and γ , γ 1 2 ∈ U (1) . Especially, x ⊗ y is periodic and c = 1 . - (ii) Assume that there exist two integers α, β ≥ 1 such that $$x ^ { \otimes \alpha } = y ^ { \otimes \beta }.$$ Then there exists w such that x = γ w 1 ⊗ k 1 and y = γ w 2 ⊗ k 2 for some k , k 1 2 ≥ 1 and γ , γ 1 2 ∈ U (1) . Especially, if m &gt; l , then x is periodic. If x is nonperiodic, then y = cx ⊗ d for some d ≥ 1 and c ∈ U (1) . - (iii) Assume that m&gt;l and there exist z , z 1 2 such that $$z ^ { \otimes \alpha } = z _ { 1 } \otimes z _ { 2 }, \ \ y ^ { \otimes \beta } = z _ { 2 } \otimes z _ { 1 } \quad \text{(A.7)}$$ for some α, β . Then z is periodic. Proof. From Proposition A.4 and its proof, Proposition A.5 can be applied to the pair ( B ,B + ) = ( PG,P I n ). (i) From (A.5), [ y ][ x ] = [ x y ][ ] in PG . From Proposition A.5(i), [ x , ] [ y ] ∈ { W p : p ≥ } 1 for some W ∈ PG . Since W = [ w ] for some w ∈ G , we obtain the statement. - (ii) From (A.6), [ x ] α = [ y ] β in PG . From Proposition A.5(ii), the statement holds. - (iii) Assume that z = u ⊗ p and y = v ⊗ q for some nonperiodic elements u and v . From Proposition A.5(iii), [ u ] and [ v ] are conjugate in PG . This implies u, v ∈ ( V n,k ) 1 for some k ≥ 1. Hence z = u ⊗ p ∈ ( V n,kp ) 1 and y = v ⊗ q ∈ ( V n,kq ) 1 . Therefore m = kp and l = kq . Since m &gt; l , p &gt; q ≥ 1. Therefore z is periodic. ## B Proofs of properties of Cuntz states In this section, we prove well-known basic properties of Cuntz states on O n (2 ≤ n ≤ ∞ ) [7]. Since both Fact 1.3 and Theorem 1.4(ii) are proved by using properties of Cuntz states, we do not use results of sub-Cuntz states here. Let N := { 1 2 3 , , , . . . } and let s , s 1 2 , . . . denote the Cuntz generators of O n . Define I := ⋃ a ≥ 0 I a 1 where I 1 := { 1 , . . . , n } when n &lt; ∞ , and I 1 := N when n = ∞ . Define h := /lscript 2 ( I 1 ) and h 1 := { z ∈ h : ‖ z ‖ = 1 . } Here we identify h with the set of all complex sequences ( z i ) i ∈I 1 such that ∑ i | z i | 2 &lt; ∞ . ## Theorem B.1 Fix 2 ≤ n ≤ ∞ . - (i) There exists a unique state ω 1 on O n such that ω 1 ( s 1 ) = 1 . In this case, ω 1 is pure and ω 1 ( s i ) = 0 when i = 1 . /negationslash - (ii) For any z ∈ h 1 , a Cuntz state on O n by z exists uniquely and is pure. - (iii) For z ∈ h 1 , let ω z denote the Cuntz state by z . Then ω z ∼ ω y if and only if z = y . - (iv) For any J, K , ω z ( s J s ∗ K ) = z J z K . Proof. (i) Let ( H , π, Ω) denote the GNS representation by ω 1 . Then we see π s ( i ) ∗ Ω = δ i 1 Ω for all i . This implies that ω 1 ( s J s ∗ K ) = 1 when J, K ∈ W := {∅ , (1) , (11) (111) , , . . . } ⊂ I , and ω 1 ( s J s ∗ K ) = 0 otherwise. Therefore the uniqueness of ω 1 holds. We prove the existence and purity as follows. Let { e k : k ∈ N } denote the standard basis of /lscript 2 ( N ). Assume n &lt; ∞ . Define the action of O n on /lscript 2 ( N ) by $$s _ { i } e _ { k } \coloneqq e _ { n ( k - 1 ) + i } \ \ ( i = 1, \dots, n, \, k \in \mathbb { N } )$$ /negationslash /negationslash Assume n = ∞ . Define the action of O ∞ on /lscript 2 ( N ) by Since s e 1 1 = e 1 , ω 1 := 〈 e 1 | ( ) · e 1 〉 satisfies ω 1 ( s 1 ) = 1. Therefore the existence is proved. Next we prove the irreducibility of the action (B.1). Remark that any k ∈ N is uniquely written as n k ( ′ -1) + i for some i = 1 , . . . , n and k ′ ∈ N . Hence we see { e k : k ∈ N } = { s J e 1 : J ∈ I} . From this and (B.1), e 1 is a cyclic vector of /lscript 2 ( N ). Let v = ∑ m ≥ 1 v m m e ∈ /lscript 2 ( N ), v = 0. Define m 0 = min { m ∈ N : v m = 0 . Then there exists } J 0 ∈ I k 1 for some k ≥ 1 such that e m 0 = s J 0 e 1 . Hence 〈 e 1 | s ∗ J 0 v 〉 = v m 0 = 0. Therefore we can construct v ′ ∈ O n v such that v ′ = e 1 + v ′′ for some v ′′ ∈ /lscript 2 ( N ), 〈 e 1 | v ′′ 〉 = 0. Then we can verify ‖ ( s ∗ 1 ) l v ′ -e 1 ‖ → 0 for l →∞ . Therefore e 1 ∈ O n v . This implies that any non-zero invariant closed subspace of /lscript 2 ( N ) coincides with /lscript 2 ( N ). Therefore the action in (B.1) is irreducible. Hence ω 1 is pure. $$s _ { i } e _ { k } \coloneqq e _ { 2 ^ { i - 1 } ( 2 k - 1 ) } \quad ( i, k \geq 1 ). \quad \quad \quad$$ Then s e 1 1 = e 1 and { s J e k : J } = { e m : m ∈ N } . Therefore e 1 is a cyclic unit vector of /lscript 2 ( N ) and ω 1 := 〈 e 1 | ( ) · e 1 〉 satisfies ω 1 ( s 1 ) = 1. As the same token, we can prove that the action in (B.2) is irreducible. Hence ω 1 is pure. (ii) Let U ( h ) denote the unitary group on h . Let { e i } denote the standard basis of h . For z ∈ h 1 , let g = ( g ij ) ∈ U ( h ) such that ge 1 = z where g ij := 〈 e i | ge j 〉 . Then g j 1 = z j for all j . For ω 1 in (i), define $$\omega ^ { \prime } \coloneqq \omega _ { 1 } \circ \alpha _ { g ^ { * } } & \quad \quad ( B. 3 ) \\ \dots \cdot & \cd$$ /negationslash where α is as in (1.8), which can be also well defined when n = ∞ . By (B.3), ω ′ is pure and we can verify ω ′ ( s j ) = z j for all j where we use ω 1 ( s i ) = 0 when i = 1. Hence ω ′ is a Cuntz state by z . Therefore the existence is proved. If ω ′′ is a Cuntz state by z , then we can verify that ( ω ′′ ◦ α g )( s 1 ) = 1 for g in (B.3). This implies that ω ′′ ◦ α g = ω 1 in (i) and ω ′′ = ω 1 ◦ α g ∗ = ω ′ . Hence the uniqueness of the Cuntz state by z is proved. (iii) Assume ω z ∼ ω y . Then there exists an action of O n on a Hilbert space H with two cyclic unit vectors Ω z and Ω y such that s z ( )Ω z = Ω z and s y ( )Ω y = Ω y from Lemma 3.2 (the case of n = ∞ also holds) where s z ( ) := ∑ z s j j ∈ O n . Then 〈 Ω z | s J Ω y 〉 = z J 〈 Ω Ω z | y 〉 for any J ∈ I k 1 . Since { s J Ω y : J } spans H 〈 , Ω Ω z | y 〉 /negationslash = 0 because Ω z = 0. On the other hand, /negationslash $$\langle \Omega _ { z } | \Omega _ { y } \rangle & = \langle s ( z ) \Omega _ { z } | s ( y ) \Omega _ { y } \r$$ Since 〈 Ω Ω z | y 〉 /negationslash = 0, 〈 z y | 〉 must be 1. This implies z = y from Lemma A.1. The inverse direction is trivial. (iv) By definition, the statement is verified. /negationslash ## C Sub-Cuntz states on O∞ In this section, we generalize sub-Cuntz states on O n ( n &lt; ∞ ) to O ∞ . Except some parts, main theorems and properties of the state parametrization hold like the case of n &lt; ∞ . Hence we list different points and some remarks for the case of O ∞ . ## C.1 Definition and parametrization Let N := { 1 2 , , . . . } and let O ∞ denote the Cuntz algebra [12], that is, a C -algebra which is universally generated by ∗ { s i : i ∈ N } satisfying $$s _ { i } ^ { * } s _ { j } = \delta _ { i j } I \ \ ( i, j \in \mathbb { N } ), \ \ \sum _ { i = 1 } ^$$ For a unit vector z ∈ /lscript 2 ( N ), ω z is a Cuntz state on O ∞ by z if ω z is a state on O ∞ which satisfies ω z ( s i ) = z i for all i . Then ω z exists uniquely and is pure for any z ; ω z ∼ ω y if and only if z = y (see Appendix B). Theorem C.1 For m ≥ 1 and a unit vector z = ∑ z J e J ∈ /lscript 2 ( N m ) , there exists a state ω on O ∞ which satisfies ω s ( J ) = z J for all J ∈ N m . Such ω is called a sub-Cuntz state by z of order m . ↦ Proof. Fix a bijection f : N ∼ = N m and define the endomorphism ˆ of f O ∞ by s i → ˆ ( f s i ) := s f ( ) i for each i ∈ N where s f ( ) i := s j 1 · · · s j m when f ( ) = ( i j 1 , . . . , j m ). Then ˆ ( f O ∞ ) = ∼ O ∞ and ˆ ( f s i )'s are Cuntz generators of ˆ ( f O ∞ ). Then, for a unit vector z ∈ /lscript 2 ( N m ), ω is a sub-Cuntz state on O ∞ by z if and only if ω is an extension of the Cuntz state ω ˆ z on ˆ ( f O ∞ ) by ˆ to z O ∞ where ˆ := ( z z f ( ) i ) i ∈ N ∈ /lscript 2 ( N ). Since an extension of ω ˆ z to O ∞ always exists from Proposition 2.1(i), the statement holds. Let V ∞ ,m := /lscript 2 ( N m ) with the standard basis { e J : J ∈ N m } . We identify V ∞ ,m with /lscript 2 ( N ) ⊗ m . Then the periodicity, decomposability and equivalence of parameters are defined as same as the case of n &lt; ∞ . Let ω be a state on O ∞ with the GNS representation ( H , π, Ω) and z = ∑ z J e J ∈ ( /lscript 2 ( N m )) 1 . In a similar fashion with Theorem 2.3, we see that the following are equivalent: (i) ω is a sub-Cuntz state by z . (ii) ∑ z J π s ( J )Ω = Ω. (iii) π s ( J ) ∗ Ω = z J Ωfor all J . Remark that s z ( ) = ∑ z J s J is well defined in O ∞ for any z . Hence the l.h.s in (ii) is well defined. ## C.2 Main theorems and naturalities of parametrization Statements in main theorems are almost same with the case of n &lt; ∞ . Let U ( ∞ ) denote the group of all unitaries in B ( /lscript 2 ( N )). Then the state parametrization z → ˜ ω z satisfies the U ( ∞ )-covariance. ↦ For J = ( j 1 , . . . , j m ) ∈ N m and K = ( k , . . . , k 1 m ) ∈ { 1 , . . . , n } m , define J /squaremultiply K = ( l 1 , . . . , l m ) ∈ N m by l t := n j ( t -1) + k t for t = 1 , . . . , m . For z ∈ V ∞ ,m and y ∈ V n,m , define z /squaremultiply y ∈ V ∞ ,m by For the ϕ -tensor product of states on O ∞ , the following new definitions are necessary. For 2 ≤ n &lt; ∞ , let { s ( ∞ ) k } and { s ( n ) i } denote Cuntz generators of O ∞ and O n , respectively. Define the embedding ϕ ∞ ,n of O ∞ into O ∞ ⊗O n by ϕ ∞ ,n ( s ( ∞ ) n k ( -1)+ i ) := s ( ∞ ) k ⊗ s ( n ) i for k ∈ N , i = 1 , . . . , n . For ω 1 ∈ S ∞ and ω 2 ∈ S n , define ω 1 ⊗ ϕ ω 2 ∈ S ∞ by ω 1 ⊗ ϕ ω 2 := ( ω 1 ⊗ ω 2 ) ◦ ϕ ∞ ,n . For ω 1 ∈ S ∞ , ω 2 ∈ S n and ω 3 ∈ S n ′ , ( ω 1 ⊗ ϕ ω 2 ) ⊗ ϕ ω 3 = ω 1 ⊗ ϕ ( ω 2 ⊗ ϕ ω 3 ) ([35], the proof of Theorem 1.2(iv)). If ω 1 and ω 2 are sub-Cuntz states on O ∞ and O n , respectively, then we see that ω 1 ⊗ ϕ ω 2 is a sub-Cuntz state on O ∞ . $$z \bigotimes y \coloneqq \sum _ { J \in \mathbb { N } ^ { m } } ( z \bigotimes y ) _ { J } e _ { J }, \ \ ( z \bigotimes y ) _ { J } \coloneqq z _ { J ^ { \prime } } y _ { J ^ { \prime \prime } } \quad \quad \text{(C.2)} \\ \intertext { t \quad \dots \quad \cdot \quad \cdot \quad \cdot \quad \dots \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdots \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \dots \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cd.$$ where J ′ ∈ N m and J ′′ ∈ { 1 , . . . , n } m are uniquely defined as J = J ′ /squaremultiply J ′′ . For z ∈ V ∞ ,m and y ∈ V n,l , define z ∗ y ∈ V ∞ ,αm by z ∗ y := z ⊗ α /squaremultiply y ⊗ β where α and β are chosen such that αm = βl is the least common multiple of m and l . If z ∈ V ∞ ,m and y ∈ V n,l are nonperiodic, then z ∗ y is also nonperiodic and ˜ ω z ⊗ ϕ ˜ ω y = ˜ ω z ∗ y . ## C.3 Infinitely correlated sub-Cuntz states on O ∞ Lemma 2.4(i) does not hold for O ∞ . We prove that a sub-Cuntz state on O ∞ is not always finitely correlated by using examples. /negationslash Proposition C.2 For a unit vector x = ∑ x e i i ∈ /lscript 2 ( N ) , define z := ∑ x e j j ⊗ e j ∈ ( /lscript 2 ( N ) ⊗ 2 ) 1 , X := { i ∈ N : x i = 0 } and N := # X . Assume that ω is a sub-Cuntz state on O ∞ by z . Then ω is finitely correlated if and only if N &lt; ∞ . Proof. Let ( H , π, Ω) denote the GNS representation by ω . By definition, ω s s ( i j ) = δ ij x i for all i, j . This implies ∑ x π s i ( 2 i )Ω = Ω and $$\omega ( s _ { i } s _ { j } ^ { * } ) = \sum _ { l } \delta _ { i l } \delta _ { j l } \, \overline { x _ { i } } \, x _ { j } = \delta _ { i j } | x _ { i } | ^ { 2 } \text{ \ for all } i, j.$$ We divide the case of N ≥ 2 from the case of N = 1. Assume N ≥ 2. In this case, z is nonperiodic. From Theorem 1.4(iii) for O ∞ , 〈 Ω | π s ( i ) ∗ Ω = 〉 ω s ( ∗ i ) = 0 for all i . From this and (C.3), { Ω , | x i | -1 π s ( ∗ i )Ω : i ∈ X } i ≥ 1 is an orthonormal family in H . Define I := ⋃ a ≥ 0 N a . Then I is a free monoid with respect to the concatenation [47]. Define the subsemigroup W of I generated by { ( ii ) : i ∈ N } : $$W \coloneqq \langle \{ ( i i ) \, \colon i \in \mathbb { N } \} \rangle \subset \mathcal { I }.$$ Then $$\pi ( s _ { J } ^ { * } ) \Omega = \begin{cases} \ x [ J _ { 1 } ] \pi ( s _ { i } ) ^ { * } \Omega & \text{ when } J = J _ { 1 } i, J _ { 1 } \in W, \\ \ x [ J ] \Omega & \text{ when } J \in W, \\ 0 & \text{ otherwise} \end{cases} ( C. 5 ) \\ \text{where } x [ J ] \coloneqq x _ { i _ { 1 } } x _ { i _ { 2 } } \cdots x _ { i _ { l } } \in \mathbb { C } \text{ when } J = ( i _ { 1 } i _ { 1 } i _ { 2 } i _ { 2 } \cdots i _ { l } i _ { l } ) \in W. \text{ From this,} \\ \text{Lin} ( \{ \pi ( s _ { l } ) ^ { * } \Omega \colon J \} ) = \text{Lin} ( \{ \Omega. \pi ( s _ { i } ) ^ { * } \Omega \colon i \in X \} ). \text{ Therefore}$$ dim K = dimLin 〈{ Ω , π ( s i ) ∗ Ω : i ∈ X }〉 = 1 + # X = 1 + N (C.6) where K := Lin 〈{ π s ( J ) ∗ Ω : J }〉 ⊂ H . From (C.6), the statement holds except the case of N = 1. where x J [ ] := x i 1 x i 2 · · · x i l ∈ C when J = ( i 1 i 1 i 2 i 2 · · · i i l l ) ∈ W . From this, Lin 〈{ π s ( J ) ∗ Ω : J }〉 = Lin 〈{ Ω , π ( s i ) ∗ Ω : i ∈ X }〉 . Therefore Assume N = 1. It is sufficient to show that ω is finitely correlated. By assumption, there exists j such that z = x e j j ⊗ e j and | x j | = 1. In this case, we obtain x π s j ( 2 j )Ω = Ω. From this, $$\pi ( s _ { i } s _ { k } ) ^ { * } \Omega = \delta _ { i j } \delta _ { j k } x _ { j } \Omega \text{ \ for all } i, k.$$ Let q be a quadratic root of x j . Then there exists 0 ≤ a ≤ 1 such that ω = aω + + (1 -a ω ) -where ω ± denotes the Cuntz state by ± qe j . In the proof of Theorem 1.5, there exists a unit vector ( α, β ) ∈ R 2 such that Ω = α Ω + + β Ω -and α 2 = a and β 2 = 1 -a where Ω ± denotes the GNS cyclic vector by ω ± . Then we see that π s ( i ) ∗ Ω = qδ ij ( α Ω + -β Ω ) for all -i . From this and (C.7), π s ( J ) ∗ Ω ∈ Lin 〈{ Ω , α Ω + -β Ω -}〉 for any J . Therefore dim K ≤ dimLin 〈{ Ω , α Ω + -β Ω -}〉 ≤ 2. Hence ω is finitely correlated. For example, let x := ∑ 2 -i/ 2 e i ∈ ( /lscript 2 ( N )) 1 . Then ω associated with x satisfies N = ∞ in Proposition C.2. ## References - [1] M. Abe, K. Kawamura, Pseudo-Cuntz algebra and recursive FP ghost system in string theory, Int. J. Mod. Phys. A 18(4) (2003), 607-625. - [2] M. Abe, K. Kawamura, Branching laws for endomorphisms of fermions and the Cuntz algebra O 2 , J. Math. Phys. 49 (2008), 043501-01-04350110. - [3] H. Araki, A.L. Carey, D.E. Evans, On O n +1 , J. Operator Theory 12 (1984), 247-264. - [4] W.R. Bergmann, R. Conti, Induced product representation of extended Cuntz algebras, Annali di Mathematica 182 (2003), 271-286. - [5] R. Bhatia, Matrix analysis, Springer, 1997. - [6] O. Bratteli, P.E.T. Jorgensen, Endomorphisms of B H ( ) II. Finitely correlated states on O n , J. Funct. Anal. 145 (1997), 323-373. - [7] O. Bratteli, P.E.T. Jorgensen, Iterated function systems and permutation representations of the Cuntz algebra, Mem. Amer. Math. Soc. 139 (1999), 1-89. - [8] O. Bratteli, P.E.T. Jorgensen, A. Kishimoto, R.F. Werner, Pure states on O d , J. Operator Theory 43(1) (2000), 97-143. - [9] O. Bratteli, P.E.T. Jorgensen, V. Ostrovsky˘ ı, Representation theory and numerical AF-invariants. The representations and centralizers of certain states on O d , Mem. Amer. Math. Soc. 168(797) (2004), 1-178. - [10] O. Bratteli, P.E.T. Jorgensen, G.L. Price, Endomorphisms of B H ( ), in Quantization, nonlinear partial differential equations, and operator algebra (W. Arveson, T. Branson, and I. Segal, eds.), Proc. Sympos. Pure Math., 59, Amer. Math. Soc., 1996, pp. 93-138. - [11] A.H. Clifford, G.B. Preston, The algebraic theory of semigroup vol. II, American Mathematical Society, 1967. - [12] J. Cuntz, Simple C ∗ -algebras generated by isometries, Commun. Math. Phys. 57 (1977), 173-185. - [13] K.R. Davidson, D.R. Pitts, The algebraic structure of non-commutative analytic Toeplitz algebras, Math. Ann. 311 (1998), 275-303. - [14] K.R. Davidson, D.R. Pitts, Invariant subspaces and hyper-reflexivity for free semigroup algebras, Proc. London Math. Soc. 78 (1999), 401430. - [15] J. Dixmier, C ∗ -algebras, North-Holland Publishing Company, 1977. | [16] | N. Dunford, J.T. Schwartz, Linear operators. II, Interscience, New York, 1963. | |--------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [17] | D.E. Dutkay, J. Haussermann, P.E.T. Jorgensen, Atomic representa- tions of Cuntz algebras, arXiv:1311.5265v1. | | [18] | L. Eld´n, e B. Savas, A Newton-Grassmann method for computing the best multilinear rank-( r 1 , r 2 , r 3 ) approximation of a tensor, SIAM. J. Matrix Anal. & Appl., 31(2) (2009), 248-271. | | [19] | D.E. Evans, On O n , Publ. RIMS, Kyoto Univ. 16 (1980), 915-927. | | [20] | N.J. Fowler, M. Laca, Endomorphisms of B ( H ), extensions of pure states, and a class of representations of O n , J. Operator Theory 40(1) (2000), 113-138. | | [21] | M.J. Gabriel, Cuntz algebra states defined by implementers of endo- morphisms of the CAR algebra, Canad. J. Math. 54 (2002), 694-708. | | [22] | J. Glimm, Type I C ∗ -algebras, Ann. Math. 73(3) (1961), 572-612. | | [23] | G.H. Golub, C.F. Van, Matrix computations 3rd ed., The Johns Hop- kins University Press, 1996. | | [24] | J.M. Howie, Fundamentals of semigroup theory, Oxford Science Publi- cations, 1995. | | [25] | M. Izumi, Subalgebras of infinite C ∗ -algebras with finite Watatani in- dices. I. Cuntz algebras, Commun. Math. Phys. 155(1) (1993), 157-182. | | [26] | E.-C. Jeong, Irreducible representations of the Cuntz algebra O n , Proc. Amer. Math. Soci. 127(12) (1999), 3583-3590. | | [27] | E.-C. Jeong, Linear functionals on the Cuntz algebra, Proc. Amer. Math. Soc. 134(1) (2005), 99-104. | | [28] | K. Kawamura, Generalized permutative representations of the Cuntz algebras, arXiv:math/0505101. | | [29] | K. Kawamura, Extensions of representations of the CAR algebra to the Cuntz algebra O 2 -the Fock and the infinite wedge-, J. Math. Phys. 46(7) (2005), 073509-1-073509-12. | | [30] | K. Kawamura, The Perron-Frobenius operators, invariant measures and representations of the Cuntz-Krieger algebras, J. Math. Phys. 46(8) (2005), 083514-1-083514-6. | | [31] | K. Kawamura, Polynomial endomorphisms of the Cuntz algebras arising from permutations. I -General theory-, Lett. Math. Phys. 71 (2005), 149-158. | |--------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [32] | K. Kawamura, Branching laws for polynomial endomorphisms of Cuntz algebras arising from permutations, Lett. Math. Phys. 77 (2006), 111- 126. | | [33] | K. Kawamura, A tensor product of representations of Cuntz algebras, Lett. Math. Phys. 82(1) (2007), 91-104. | | [34] | K. Kawamura, Automata computation of branching laws for endomor- phisms of Cuntz algebras, Int. J. Alg. Comput. 17(7) (2007), 1389-1409. | | [35] | K. Kawamura, C ∗ -bialgebra defined by the direct sum of Cuntz alge- bras, J. Algebra 319 (2008), 3935-3959. | | [36] | K. Kawamura, Classification and realizations of type III factor repre- sentations of Cuntz-Krieger algebras associated with quasi-free states, Lett. Math. Phys. 87 (2009), 199-207. | | [37] | K. Kawamura, Pentagon equation arising from state equations of a C ∗ - bialgebra, Lett. Math. Phys. 93 (2010), 229-241. | | [38] | K. Kawamura, R -matrices and the Yang-Baxter equation on GNS rep- resentations of C ∗ -bialgebras, Linear Alg. Appli. 438 (2013), 573-583. | | [39] | K. Kawamura, Tensor products of type III factor representations of Cuntz-Krieger algebras, Algebr. Represent. Theor. 16(5) (2013), 1397- 1407. | | [40] | K. Kawamura, Y. Hayashi, D. Lascu, Continued fraction expansions and permutative representations of the Cuntz algebra O ∞ , J. Number Theory 129 (2009), 3069-3080. | | [41] | T. Kobayashi, Theory of discretely decomposable restrictions of unitary representations of semisimple Lie groups and some applications, (trans- lation of S¯gaku u 51(4) (1999), 337-356), Sugaku Expositions 18(1) (2005), 1-37. | | [42] | M. Laca, Gauge invariant states of O ∞ , J. Operator Theory 30(2) (1993), 381-396. | | [43] | S. Lang, Algebra Revised 3rd ed., Springer, 2002. | | [44] | L.D. Lathauwer, B.D. Moor, J. Vandewalle, Amultilinear singular value decomposition, SIAM J. Matrix Anal. Appl., 21 (2000), 1253-1278. | |--------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [45] | M.V. Lawson, Primitive partial permutation representations of the polycyclic monoids and branching function systems, Periodica Math- ematica Hungarica 58 (2) (2009), 189-207. | | [46] | J.-R. Lee, D.-Y. Shin, The positivity of linear functionals on Cuntz alge- bras associated to unit vectors, Proc. Amer. Math. Soc. 132(7) (2004), 2115-2119. | | [47] | M. Lothaire, Combinatorics on words, Cambridge University Press, 1983. | | [48] | D.-Y. Shin, State extensions of states on UHF n algebra to Cuntz alge- bra, Bull. Korean Math. Soc. 39(3) (2002), 471-478. | | [49] | M.A.O. Vasilescu, D. Terzopoulos, Multilinear analysis of image en- sembles: Tensorfaces. In Proc. 7th European Conference on Computer Vision (ECCV'02), Lecture Notes in Computer Science, 2350 (2002), |
null
[ "Katsunori Kawamura" ]
2014-08-06T04:10:28+00:00
2014-08-06T04:10:28+00:00
[ "math.OA", "46K10" ]
Classification of sub-Cuntz states
Let ${\cal O}_n$ denote the Cuntz algebra for $2\leq n<\infty$. With respect to a homogeneous embedding of ${\cal O}_{n^m}$ into ${\cal O}_n$, an extension of a Cuntz state on ${\cal O}_{n^m}$ to ${\cal O}_n$ is called a sub-Cuntz state, which was introduced by Bratteli and Jorgensen. We show (i) a necessary and sufficient condition of the uniqueness of the extension, (ii) the complete classification of pure sub-Cuntz states up to unitary equivalence of their GNS representations, and (iii) the decomposition formula of a mixing sub-Cuntz state into a convex hull of pure sub-Cuntz states. Invariants of GNS representations of pure sub-Cuntz states are realized as conjugacy classes of nonperiodic homogeneous unit vectors in a tensor-power vector space. It is shown that this state parameterization satisfies both the $U(n)$-covariance and the compatibility with a certain tensor product. For proofs of main theorems, matricizations of state parameters and properties of free semigroups are used.
1408.1179v1
## On the hopping pattern design for D2D discovery with invariant Email: Qizhi Zhang, Changqing Yang Huawei Technologies Co. Ltd., Beijing, China { zhangqizhi, changqing.yang } @huawei.com Abstract -In this paper, we focus on the hopping pattern design for device-to-device (D2D) discovery. The requirements of hopping pattern is discussed, where the impact of specific system constraints, e.g., frequency hopping, is also taken into consideration. Specifically speaking, we discover and utilize the novel feature of resource hopping, i.e., 'hopping invariant' to design four new hopping patterns and analyze their performance. The hopping invariant can be used to deliver information for specific users without extra radio resources, and due to the connection between hopping invariant and resource location, receiver complexity can be significantly reduced. Furthermore, our schemes are designed to be independent of discovery frame number, which makes them more suitable to be implemented in practical systems. other D2D UEs while transmitting its own, even on different but adjacent frequency bands. Therefore, the radio resources used by a D2D UE to transmit and receive discovery signal should be carefully arranged to enable efficient discovery procedure. In [10], a hopping pattern is proposed to facilitate the discovery procedure. In this scheme, periodic discovery frame is designed and each of which consists of n sub frame. In addition, the frequency band of system is divided into m parallel channels using Single Carrier Frequency Division Multiple Access (SC-FDMA), where m ≤ n . ## I. INTRODUCTION Mobile traffic explosion due to the popularity of smart devices (e.g., smart phones and electronic tablets) and various multimedia applications has imposed a significant impact on the cellular networks. In industry, it is estimated that about 1000 times capacity improvement is necessary in the decade between 2010 and 2020. Although how to meet this requirement is still an open issue, current study shows that device-todevice (D2D) communications have been considered as one of the key techniques in the Third Generation Partnership Project (3GPP) Long Term Evolution Advanced (LTE-Advanced) due to its flexibility in improving local service and offloading data from cellular networks [1]. Generally speaking, D2D communication is composed of two relatively independent procedures, i.e., D2D discovery and D2D data communication. In D2D discovery procedure, D2D user equipments (UEs) discover each other with a well design operation flow, while in D2D communication procedure, resource allocation is carried out to facilitate the data transmission. To the best knowledge of the authors, there have been a lot of researches on D2D communication procedure. For example, in [2], [3], [4], power control in D2D communication is studied. In [5], [6], [7], D2D communication with Multiple Input Multiple Output (MIMO) is studied. As the previous procedure in D2D communication, D2D discovery is a key step to determine which users are included in a D2D transmission group. However, the design and optimization of D2D discovery procedure is still a challenge issue and limited work has been done. The main obstruction in D2D discovery is half duplex constraint, which means that a certain D2D UE cannot receive discovery signals from Fig. 1. Example of hopping pattern ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1179v1-figure-a3e48fb2-83cf-43ed-a021-2b46a8a7d25c.jpg) A frequency-time block shown in Figure 1 corresponds to a unique discovery resource unit and is the basic resource unit for the device to send or receive a discovery signal. Hence, in one discovery repetition period, the discovery channel resource is logically divided into mn discovery resource unit. All devices transmit their discovery signal as following hopping pattern: $$i ( t ) & = i ( 0 ) + c \mod m \\ j ( t ) & = ( j ( 0$$ where i ( ) t , j ( ) t means the time-domain and frequency-domain location the discovery resource used by a certain UE, and c is a integral constant number. The two equations indicate a certain UE's transmission frequency-time unit ( ( ) i t , j ( )) t in discovery frame t , which is decided by the frequency time unit ( (0) i , j (0)) in discovery frame 0 . Therefore, the impact of half duplex constraint is weakened. For example, assume UE 0 transmits its discovery signal on red units, i.e., ( (0) i , j (0)) = (0 0) ( (1) , , i , j (1)) = (0 , 0) , · · · while UE 3 transmits its discovery signal on blue units, i.e., ( (0) i , j (0)) = (1 0) ( (1) , , i , j (1)) = (1 1) , , · · · . Although they can not receive each others discovery signals in discovery frame 0 as they are transmitting, it is possible for them to receive the signals and find each other in other frames (e.g., frame 1 or 2 ) . Once hopping pattern is determined, some relation is determined between the discovery resource units in different discovery frames. To be general, the set of frequency-time units for a certain UE can be regarded as a particular logic discovery resource. For example, we can see the red and blue frequency-time units as the logical discovery resources for UE1 and UE2, respectively. To the best of the authors' knowledge, few work has been done on the design of hopping pattern for D2D discovery. In [11] and [12], new hopping patterns are proposed which are applicable for more general structure of discovery frame. In [13], a pattern 'independent of frame number t ' is proposed which is robust and can reduce overhead if deployed in LTE networks. For more details, please refer to [13] or section 2.2 in this paper. In this paper, we design four new types of hopping pattern, i.e., type A1, A2, B1 and B2, based on a new feature called 'hopping invariant', due to which additional information, e.g., the service type, can be easily embedded in the hopping pattern. Besides, since only a small part of the radio resources is connected to a certain hopping invariant, it helps to significantly simplify the operation of the receivers which are only interested in ceratin additional information. Furthermore, we consider the impact of hopping in frequency and the discovery frame number, which makes our scheme more suitable to be implemented in practical system, e.g., LTE. The structure of this paper is as below: in section 2, we form the problem of discovery with system constraint including hopping invariant, hopping in frequency and irrelevance of discovery frame number. Next we solve the problem with linear algebra theory on finite fields and get our proposed hopping patterns. After analyzing the performance of our schemes, we draw the conclusion in section 4. Some of the mathematical symbols and expressions used in this paper are listed below: For a finite set S , | S | means the number of elements in S . For two set X and Y , X × Y means the Cartesian product of X and Y ; ↦ $$\begin{matrix} f \colon & X & \longrightarrow & Y \\ & x & \mapst$$ means a map from X to Y , which name is f . Z means the set of integral numbers, Z /n Z means the set { 0 1 2 , , , · · · , n - } 1 for positive integral number n . ## II. MODELING AND PROBLEM FORMULATION We discuss the basic requirement of hopping pattern, together with the constraint of LTE system and the new feature of 'hopping invariant'. After that, we give the formulation of the problem in subsection II-D. ## A. Basic requirement for hopping pattern A discovery frame is divided into some sub frames, we denote the set consists of them by J . The frequency band of Physical Uplink Shared Channel (PUSCH) is divided into some parallel channels using SC-FDMA, we denote the set consists of them by I . Then the resources in every discovery frame are divided into | I | × | J | parts, each of which is corresponding to an element in set I × J and called a frequencytime resource in this discovery frame. Such structure allows | I |×| J | UEs transmit their own discovery signal with different frequency-time resources in a single discovery frame. Due to half duplex constraint, if two UEs always transmit discovery signals in same time, they can't receive each other all the time. Hence we have: Req 1. If two UEs transmit their own discovery signal simultaneously in a discovery frame, they should transmit own discovery signal at different times in next discovery frame. ## B. Embedding in LTE system In LTE Frequency Division Duplex (FDD) system, since the uplink load is usually lighter than that of downlink, idle uplink radio resources can be utilized to facilitate the D2D discovery procedure. In the discovery frame, the both ends of band need to be preserved for acknowledgement/non-acknowledge (ACK/NACK) of downlink. Hence if a UE closed to evolved Node B (eNodeb) always transmits own discovery signal on a sub-band closed to an end of band, its discovery signal may impose significant interference on ACK/NACK received by eNodeb. (Notice: For the purpose that be discovered by more UEs, the power of discovery signal may not be controlled by eNodeb.) To randomize such interference, the frequency coordinate of logical discovery resource should be carrier out, e.g., via hopping. Hence we have: Req 2. The frequency coordinate of every logical discovery resource should hop. If ( ( ) i t , j ( )) t is totally determined by ( (0) i , j (0)) and t , we call the hopping pattern deterministic. For example, the hopping pattern defined in section 1.1 is a deterministic hopping pattern. The random hopping pattern is not a deterministic hopping pattern. The deterministic hopping patterns have the advantage that the receiver can jointly decode the discovery signals from a ceratin UE by combining them in multiple discovery frames. It easy to see, that for a deterministic hopping pattern { ( ( ) i t , j ( )) t } t ∈ Z , there exists a sequence of bijections $$\{ f _ { t } \colon I \times J \longrightarrow I \times J \} _ {$$ such that ( ( i t + 1) , j ( t + 1)) = f t ( ( ) i t , j ( )) t . We call { f t } t ∈ Z the frequency-time hopping function of hopping pattern { ( ( ) i t , j ( )) t } t ∈ Z . If there exists a bijection $$f \, \colon I \times J \longrightarrow I \times J \quad \quad \quad$$ such that f t = f for any t ∈ Z , we call the frequency-time hopping function independent of frame number, else call it dependent on frame number. Consider the next cases: Case 1: UE1 starts to search D2D discovery signal from discovery frame t , suppose it had detected energy on frequencytime coordinate ( ( ) i t , j ( )) t , but it can not decoded it. Then UE1 wants to hear it again in next discovery period for the purpose of time diversity or joint decoding. Hence UE1 needs to compute ( ( i t +1) , j ( t +1)) from ( ( ) i t , j ( )) t . Case 2: UE1 starts to search D2D discovery signal from discovery frame t , suppose it detected no energy or rather low energy on frequency-time coordinate ( ( ) i t , j ( )) t , it wants to transmit own discovery signal in this resource from next discovery frame. Hence UE1 needs to compute ( ( i t +1) , j ( t + 1)) from ( ( ) i t , j ( )) t . In above two cases, UE1 needs to compute ( ( +1) i t , j ( +1)) t from ( ( ) i t , j ( )) t . If the frequency-time hopping function is independent of t , UE1 can compute it easily. But if the frequency-time hopping function is dependent on t , UE1 needs to know the number t of current discovery frame. But in several system the system frame number is a number in Z /T Z . For example, in the LTE system, the system frame number is a number in Z / 1024 Z . For the purpose of decreasing the occupancy ratio of resources, the interval between two discovery frame should be long, hence UE1 can not learn the number t of current discovery frame from system frame number. Therefore, we have: Req 3. The deterministic hopping pattern with frequencytime hopping function independent on t should be used. ## C. Hopping invariant Discovery signal should carry some information, for example, the information about UE identity (ID) and service type. The information can be carried through coding and modulation, it can also be carried by frequency-time coordinate. The method to carry information by using frequencytime coordinate has the virtue that the information carried by frequency-time coordinate impossibly is decoded wrong. Therefore we wish to use the frequency-time coordinate to carry some important information. But the frequency-time coordinate vary in every discovery frame. When the hopping pattern { ( ( ) i t , j ( )) t } t ∈ Z is deterministic, a natural idea is to use the frequency-time coordinate ( (0) i , j (0)) in discovery frame 0 to carry the information. For example, when the information is service type, we can classify I × J into some non-intersect subsets U , U 0 1 , , U q -1 , that corresponding to the service type 0 1 , , ..., q -1 respectively. Any UE with service type k transmit own discovery signal on a discovery resource ( ( ) i t , j ( )) t such that ( (0) i , j (0)) lie in the subset U k . If a UE received a discovery signal from a discovery resource ( ( ) i t , j ( )) t in discovery frame t , it needs to compute ( (0) i , j (0)) from ( ( ) i t , j ( )) t and t , and get the service type of sending UE from ( (0) i , j (0)) . But in several system the system frame number is a number in Z /T Z . For example, in the LTE system, the system frame number is a number in Z / 4096 Z . For the purpose of decreasing the occupancy ratio of resources of system, the interval between two discovery frame should be long, hence receiving UE can not learn the number t of current discovery frame then can not compute ( (0) i , j (0)) from ( ( ) i t , j ( )) t . Then the mechanism to carry information by using ( (0) i , j (0)) is unsuccessful. However, in this situation, the invariant of hopping pattern defined as follows can carry information. Definition II.1. Let { ( ( ) i t , j ( )) t } t ∈ Z be a deterministic hopping pattern on discovery frame structure ( m,n ) . If there exists a set X and a surjection g : I × J -→ X such that g (( ( ) i t , j ( ))) t = g (( ( i t ′ ) , j ( t ′ ))) as maps from S to I × J for any t, t ′ ∈ Z , we call g an invariant of hopping pattern { ( ( ) i t , j ( )) t } t ∈ Z . For example, when the information is service type, I × J is classifying by invariant into some non-intersect subsets U , U , , U 0 1 q -1 naturally, which invariant equal to 0 1 , , ..., q -1 respectively, that corresponding to the service type 0 1 , , ..., q -1 respectively. Any UE with service type k transmit own discovery signal on a discovery resource s such that ( (0) i , j (0)) lie in the subset U k . If a UE received a discovery signal from a discovery resource s with frequency-time coordinate ( ( ) i t , j ( )) t in discovery frame t , it compute the invariant from ( ( ) i t , j ( )) t , and learn the service type of sending UE. Moreover, if a UE want to find the UEs with special service type, it only need to decode the discovery signal in the resources which invariant corresponding to this service type. Relative to the method decode the discovery signals on all the resources, energy is reduced. Hence we have: Req 4. A pattern with hopping invariant should be used. ## D. Formulation Through the discussion above, we wish find a bijection (hopping function, corresponding to Req. 3. ) ↦ $$f \colon \ \, I \times J \ \, \longrightarrow \ \, I \times J \$$ satisfying: /negationslash - (i). f 2 ( i 1 , j ) = f 2 ( i 2 , j ) for i 1 = i 2 . (Solve the half duplex problem, corresponding to Req. 1.) /negationslash /negationslash - (ii). f 1 ( i, j ) = i for any ( i, j ) ∈ I × J . (Frequency hopping, corresponding to Req. 2.) (iii). There exists a set X and a surjection g : I × J -→ X such that $$\stackrel { \ell } { \text{scovery} } \quad g \circ f$$ ## III. SOLUTIONS OF THE PROBLEM Firstly, we derive the solutions in a special case that the column number of pattern is prime in subsection III-A. Then we generate the conclusions to general case in subsection III-B. ## A. Special case (column number is prime) This subsection is the process to search the solutions. Readers interesting in only results can hop it and go to next subsection. For simplicity, we suppose that the discovery frame structure is I = J = { 0 1 , , · · · , p - } 1 , where p is a prime number, and search a bijection f : I × J -→ I × J satisfying above property (i), (ii), (iii) and of affine form. i.e From (ii), we know ( λc +1) + i λ d ( -1) j + λf ≡ i mod p , for any i and j . It means the linear equation /negationslash ↦ $$\begin{array} {$$ Because f is a bijection, we know the determinant of the matrix ( a b c d ) is coprime to p . i.e. $$\mathfrak { n o u r s } \lambda c \equiv 0 \mod p,$$ /negationslash $$( a d - b c, p ) = 1 \quad \quad \quad ( 6 )$$ From (i), we know /negationslash $$c i _ { 1 } + d j + f \not \equiv c i _ { 2 }$$ /negationslash for any i 1 ≡ i 2 and any j , hence $$( c, p ) = 1 & & ( 8 ) & \quad \text{in} \quad$$ 1) Invariant of degree 1: Firstly, we suppose that the hopping invariant in (iii) is a linear map first, i.e. it has the form $$\begin{smallmatrix} I \times J & \longrightarrow & \mathbb { Z } / p \mathbb { Z } \\ ( i, j ) & \mapsto & ( x i + y j ) \mod p \end{smallmatrix} \text{i.e.}$$ ↦ where x is not divided by p or y is not divided by p . Then we have $$( x, y ) \left ( \begin{array} { c c c } a & b & e \\ c & d & f \end{array} \right ) \left ( \begin{array} { c } i \\ j \\ 1 \end{array} \right ) \\ \left / \left ( i \right )$$ $$\equiv & ( x, y, 0 ) \left ( \begin{array} { c } i \\ j \\ 1 \end{array} \right ) \mod p, \quad \text{for all $i,j$} \\ \text{and hence}$$ and hence $$( x, y ) \left ( \begin{array} { c c c } a & b & e \\ c & d & f \end{array} \right ) \equiv ( x, y, 0 ) \mod p \quad ( 1 0 ) \quad \text{satisfy}$$ hence $$x ( a - 1, b, e ) + y ( c, d - 1, f ) \equiv 0 \mod p. \quad ( 1 1 ) \quad _ { \mathbf n \dots }$$ Because x or y is not divided by p and ( c, p ) = 1 , we know x ≡ 0 mod p . Let λ := -x -1 y mod p , then we get /negationslash $$\lambda ( c, d - 1, f ) = ( a - 1, b, e ) \quad \quad ( 1 2 ) \quad f \colon$$ Therefore hence $$\lambda \not \equiv 0 \mod p, \ \ c \equiv 0 \mod p, \ \ \ \ ( 2 0 )$$ /negationslash $$d - 1 \equiv 0 \mod p, \ \ f \not \equiv 0 \mod p \quad \ ( 2 1 )$$ /negationslash It contradict that ( c, p ) = 1 . Hence there is not a bijection f : I × J -→ I × J satisfying property (a), (b) with a linear invariant for the discovery frame structure I = J = Z /p Z . But we see, if /negationslash $$\text{that the } \lambda c \not \equiv 0 \mod p, \ \lambda ( d - 1 ) \equiv 0 \mod p, \ \lambda f \equiv 0 \mod p$$ i.e. $$\lambda \not \equiv 0 \mod p, \ \ c \not \equiv 0 \mod p, \quad \quad ( 2 3 )$$ /negationslash /negationslash $$d - 1 \equiv 0 \mod p, \ \ f \equiv 0 \mod p, \quad ( 2 4 )$$ the equation (18) has not solution in I ′ × J , where I ′ := I \{ 0 } , and the restriction $$f _ { | I ^ { \prime } \times J } \colon I ^ { \prime } \times J \longrightarrow I ^ { \prime } \times J \quad \quad ( 2 5 )$$ of f on I ′ × J is a bijection from I ′ × J to itself. Combine the formula (13), (17) and (23), in fact we got a family { f λ,c } λ,c ∈ I ,p ′ /notbar ( λc +1) of bijections ↦ $$f _ { \lambda, c } \colon \ I ^ { \prime } \times J \ \longrightarrow \ \ I ^ { \prime } \times J \\ ( i, j ) \ \ \mapsto \ \ ( ( \lambda c + 1 ) i \mod p, ( c i + j ) \mod p )$$ satisfying the condition (1), (2), (3), where the invariant of f λ,c is ( λj -i ) mod p . On the basis of above discussion, in fact we get: Proposition III.1. Let p be a odd prime number, I ′ := { 1 2 , , · · · , p - } 1 , J := { 0 1 , , · · · , p - } 1 . Let λ, c ∈ I ′ such that λc +1 ≡ 0 mod p . Define the map /negationslash $$( 1 2 ) \quad f \colon \ I ^ { \prime } \times J \ \longrightarrow \ \ I ^ { \prime } \times J \\ ( i, j ) \quad \mapsto \ \ ( ( \lambda c + 1 ) i \mod p, ( c i + j ) \mod p ).$$ ↦ Then f satisfies the condition (i), (ii), (iii), where ( λj -i ) mod p is a hopping invariant. 2) Invariant of degree 2: We suppose that the hopping invariant in (3) has degree 2 , i.e. it has the form ↦ $$\begin{array} { c c c c c c } & I \times J & \longrightarrow & \mathbb { Z } / p \mathbb { Z } \\ & ( i, j ) & \mapsto & ( i, j, 1 ) \left ( \begin{array} { c c c c } x & u & v \\ u & y & w \\ v & w & z \end{array} \right ) \left ( \begin{array} { c } i \\ j \\ 1 \end{array} \right ) \mod p \\ \end{array}$$ $$a \equiv \lambda c + 1 \mod p, \text{ \quad \ \ } ( 1 3 ) \mod$$ $$b \equiv \lambda ( d - 1 ) \mod p, \quad \quad ( 1 4 ) \quad 2 )$$ $$e \equiv \lambda f \mod p \quad \quad \ \ ( 1 5 ) \quad \inf _ { \real } ^ { \real ^ { \prime } }$$ From (6), we know $$( \lambda c + 1 ) d - \lambda ( d - 1 ) c \not \equiv 0 \mod p$$ hence /negationslash $$d + \lambda c \not \equiv 0 \mod p$$ /negationslash (16) $$( 1 7 )$$ Hence $$\text{Hence} & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \text{It easy} & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & \text{It easy} & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & & } } & \$$ From (2), we know that the equation about ( i, j ) $$( a - 1 ) i + b j + e = 0 \text{ \quad \ \ } ( 3 0 )$$ has not solve F p . Hence /negationslash a -1 ≡ 0 mod p, b ≡ 0 mod p, e ≡ 0 mod p (31) Hence $$\text{Hence} \\ \left ( \begin{array} { c c c c } 1 & c & 0 \\ 0 & d & 0 \\ e & f & 1 \end{array} \right ) \left ( \begin{array} { c c c c } x & u & v \\ u & y & w \\ v & w & z \end{array} \right ) \left ( \begin{array} { c c c c } 1 & 0 & e \\ c & d & f \\ 0 & 0 & 1 \end{array} \right ) \quad & ( 3 2 ) & \text{When} \, \in \, \\ \equiv \left ( \begin{array} { c c c c } x & u & v \\ u & y & w \\ v & w & z \end{array} \right ) \mod p \quad & ( 3 3 ) & \text{where} \, ( \begin{array} { c c c c } \end{array} \, \\ \text{Then we know that the systems of linear equations}$$ Then we know that the systems of linear equations $$& \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$v}} } } } } } } } \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{ $\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{ $\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text $\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\test{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\test$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text $\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text#$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text}$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text.$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text<$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text'$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text`$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text & \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{ $\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\test}$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\$$$ on F p has non trivial solutions. Because ( c, p ) = 1 , left multiply the invertible matrix $$\L a p y u e \, m e v i n o e \, m a u l \, \\ \begin{pmatrix} 1 & 0 & 0 & 0 & 0 \\ \frac { 1 - d } { c ^ { 2 } } & \frac { 2 } { c } & 0 & 0 & 0 \\ 0 & 0 & 1 & 0 & 0 \\ \frac { ( d - 1 ) ^ { 2 } } { c ^ { 2 } } & \frac { 2 ( 1 - d ) } { c } & 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 0 & 1 \end{pmatrix} \quad & ( i, \\ \begin{pmatrix} & ( 3 5 ) & \equiv c ^ { 2 } \\ \end{pmatrix} \\ \end{pmatrix} \\ \begin{pmatrix} & ( 3 5 ) & \equiv c ^ { 2 } \\ \end{pmatrix} \\ \end{pmatrix} \\ \begin{pmatrix} & ( 3 5 ) & \equiv c ^ { 2 } \\ \end{pmatrix}$$ to the both side of the equation, we get the equations $$\begin{pmatrix} \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \\ \text{to the point side or the equation, we get the equations} & \text{rpos} | \end{pmatrix}$$ on F p . It is equivalent to the equations $$\cos ^ { 2 } p. \emph { s o p u r a n o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o U o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o u o } } \left ( \begin{array} { c c c c } 0 & c ^ { 2 } & 2 c & 0 & 0 & 0 \\ 0 & d + 1 & 0 & 0 & 0 & 0 \\ e & c f & c e + f & 0 & 0 & c & c \\ 0 & d f & d e & 0 & d e & 0 & d - 1 \\ e ^ { 2 } & f ^ { 2 } & 2 e f & 2 e & 2 f & \end{array} \right ) \left ( \begin{array} { c } x \\ y \\ u \\ v \\ w \end{array} \right ) = 0 & ( 3 7 ) & \text{Then} \ f \\ v \\ w \end{array} \right ) & \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{if} \quad \text{invaria} \end{array}$$ It easy to see that the determined of the coefficient matrix is 4 ce 2 ( d 2 -1) . Because ( c, p ) = 1 ( , e, p ) = 1 and p is a odd prime, we know that the equation has non-trivial solution if and only if $$d ^ { 2 } - 1 \equiv 0 \mod p.$$ When d ≡ 1 mod p , we get the solution $$\nu \quad w \text{en} \ a \equiv 1 \ \text{ mod}$$ When d ≡ -1 mod p , we get the solution $$\text{When $d\equiv -1$ mod $p$, we get the solution}$$ When d ≡ 1 mod p , the hopping function has the form: $$\begin{smallmatrix} f \colon I \times J & \longrightarrow & I$$ ↦ where ( c, p ) = 1 , ( e, p ) = 1 . It has a hopping invariant $$\max \cos \vee ( \vee, \Gamma / - \varepsilon$$ When d ≡ -1 mod p , the hopping function has the form: $$\begin{array} {$$ ↦ where ( c, p ) = 1 , ( e, p ) = 1 . It has a hopping invariant $$\text{where} \ ( c, p ) = 1, ( e, p ) = 1.$$ On the basis of above discussion, in fact we get: Proposition III.2. Let p be a odd prime number, I = J := { 0 1 , , · · · , p - } 1 . Let c, e ∈ I \ { 0 } , f ∈ I . Define the map $$f \colon \ I \times J \ \longrightarrow \ I \times J \\ ( i$$ ↦ Then f satisfies the condition (i), (ii), (iii), where ( ci 2 +(2 f -ce i ) -2 ej ) mod p is a hopping invariant. Proposition III.3. Let p be a odd prime number, I = J := { 0 1 , , · · · , p - } 1 . Let c, e ∈ I \ { 0 } , f ∈ I . Define the map $$\begin{array} {$$ ↦ Then f satisfies the condition (i), (ii), (iii), where ( c 2 2 i + 4 j 2 -4 cij + (2 c f -ce i ) +2( ce -2 f ) j ) mod p is a hopping invariant. ## B. General case We can generalize the conclusions in previous subsection to some more general situation. has at most one solve in Z /m Z . Hence we just need to prove that for any c ∈ [0 , m ) , the equation $$( 2 x \mod m ) \equiv x + c \mod n$$ Proposition III.4. Let m be a positive odd number, n be a positive integral number divided by m . Let I ′ := { 1 2 , , · · · , m -1 } , J := { 0 1 , , · · · , n - } 1 . Let u, v be two integral numbers such that ( u, m ) = 1 ( , u -1 , m ) = 1 ( , v, m ) = 1 . Define the map f : has at most one solve in [0 , m ) . Hence we just need to prove that for any c ∈ [0 , m ) , the curve $$V \, \colon \, \ y = 2 x \mod m \ \ ( x \in$$ and the curve $$\cdot \quad V _ { c } \, \colon \ y = ( x + c ) \mod n \ \ ( x \in [ 0, m ) )$$ $$I ^ { \prime } \times J & \ \longrightarrow \ \ I ^ { \prime } \times J \\ ( i, j ) & \ \mapsto \ \ ( u i \mod m, j - v i + v ( u i \mod m ) \mod n ). \quad V _ { c } \colon$$ ↦ Then f is a bijection satisfying the condition (i), (ii), (iii), where ( j -vi ) mod n is a hopping invariant. We call the hopping patterns determined by such maps ' hopping pattern of type A1 '. Proof. Because ( u, m ) = 1 , we know f is a bijection. We prove that f satisfies the condition (i), (ii), (iii) as follows: have at most one intersection point. We can see it in the following graph. When c ∈ [0 , m 2 ) , V (blue line) and V c (red line) has one intersection point; when c ∈ [ m 2 , n -m 2 ] , V and V c (green line) has no intersection point; when c ∈ [ n -m 2 , m ) (may be empty), V and V c (pink line) has one intersection point. $$( i ) \text{ Suppose that } f _ { 2 } ( i _ { 1 }, j ) = f _ { 2 } ( i _ { 2 }, j ), \text{ then we have }$$ $$j - v i _ { 1 } + v ( u i \mod m ) \equiv j - v i _ { 2 } + v ( u i _ { 2 } \mod m ) \mod t ^ { \ a } \ \Big |$$ Because n is divided by m , we have $$j + v ( u - 1 ) i _ { 1 } \equiv j - v ( u - 1 ) i _ { 2 }.$$ Because ( u -1 , m ) = 1 and ( v, m ) = 1 , we know i 1 = i 2 . (ii) Suppose that f 1 ( i, j ) = i , then we have ui ≡ i mod m , and hence ( u -1) i ≡ 0 mod m . It contradict that ( u -1 , m ) = 1 . ## (iii) It easy to check that the map $$\begin{smallmatrix} I ^ { \prime } \times J & \longrightarrow &$$ ↦ satisfies this condition. Proposition III.5. Let m be a positive odd number, n be a positive integral number greater than or equal to m . Let I ′ := { 1 2 , , · · · , m - } 1 , J := { 0 1 , , · · · , n - } 1 . Define the map ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1179v1-figure-0e5d1183-4add-4065-a3e0-d4812fade1b2.jpg) $$\begin{array} {$$ ↦ Then f is a bijection satisfying the condition (i), (ii), (iii), where ( j -i ) mod n ∈ Z /n Z is a hopping invariant. We call the hopping patterns determined by such maps ' hopping pattern of type A2 '. Proof. It easy to see that f is a bijection. We prove that f satisfies the condition (i), (ii), (iii) as follows: - (i) We just need to prove that the map $$\mathbb { Z } / m \mathbb { Z } \ \longrightarrow \ \math$$ ↦ is an injection. Hence we just need to prove that for any c ∈ Z /n Z the equation $$( 2 x \mod m ) - x \equiv c \mod n$$ (ii) Suppose that f 1 ( i, j ) = i , then we have 2 i ≡ i mod m , and hence i ≡ 0 mod m . It contradict that i ∈ I ′ . (iii) It easy to check that the map $$\begin{smallmatrix} I ^ { \prime } \times J & \longrightarrow &$$ ↦ satisfies this condition. Proposition III.6. Let m be a positive odd number, n be a positive integral number divided by m . Let I := { 0 1 , , · · · , m - } 1 , J := { 0 1 , , · · · , n - } 1 . Let e be an integral number not divided by m c , be an integral number coprime to m f , be an integral number. Define the map $$f \colon \begin{array} { c c c } I \times J & \longright$$ ↦ Fig. 2. Intersection of V and V c Then f is a bijection satisfying the condition (i), (ii), (iii), where ( ci 2 +(2 f -ce i ) -2 ej ) mod m is a hopping invariant. We call the hopping patterns determined by such maps ' hopping pattern of type B1 '. Proof. It easy to see that f is a bijection. We prove that f satisfies the condition (i), (ii), (iii) as follows: - (i) Suppose that f 2 ( i 1 , j ) = f 2 ( i 2 , j ) , then we have $$c i _ { 1 } + j + f \equiv c i _ { 2 } + j +$$ and hence ci 1 ≡ ci i mod m because n is divided by m . Therefore we have i 1 ≡ i 2 mod m , because c is coprime to m . - (ii) It is trivial, because e is not divided by m . - (iii) It easy to check that the map $$\begin{smallmatrix} I \times J & \longrightarrow & \mathbb { Z$$ ↦ satisfies this condition. Proposition III.7. Let m be a positive odd number, n be a positive integral number divided by m . Let I := { 0 1 , , · · · , m - } 1 , J := { 0 1 , , · · · , n - } 1 . Let e be an integral number not divided by m c , be an integral number coprime to m f , be an integral number. Define the map $$\begin{array} {$$ ↦ Then f satisfies the condition (i), (ii), (iii), where ( c 2 2 i + 4 j 2 -4 cij + (2 c f -ce i ) +2( ce -2 f ) j ) mod n is a hopping invariant. We call the hopping patterns determined by such maps ' hopping pattern of type B2 '. Proof. It is similar to the proof of above proposition. Based on the discussion above, we have obtained four kinds of patterns with hopping invariant, and for further detailed understanding of theses patterns, we compare them with these from QC as below. /negationslash | pattern | time hopping | frequency hopping | independent of t | have hopping invariant | |-------------------|----------------|---------------------|--------------------|--------------------------| | QC( c ≡ 0 mod m ) | Y | N | Y | Y | | QC( c ≡ 0 mod m ) | Y | Y | N | N | | type A1 | Y | Y | Y | Y | | type A2 | Y | Y | Y | Y | | type B1 | Y | Y | Y | Y | | type B2 | Y | Y | Y | Y | From this table, we can see that the hopping patterns of type A1, A2, B1, B2 have all the advantage we hoping: time hopping, frequency hopping, independent of t and hopping invariant. ## IV. CONCLUSION In this paper, we discover and utilize the property 'hopping invariant' to design several hopping patterns to enable high efficient D2D discovery procedure. Besides, we consider the basic requirement of hopping pattern and the specific system constraints, which makes our schemes more robust and suitable to be implemented in practical systems such as LTE. Furthermore, the application of 'hopping invariant' leads to efficient information delivery as no extra system resources are needed and the receiver complexity can be reduced significantly since the embedded connection between resource location and the hopping invariant. After comparison, it is shown that our schemes outperform other referred ones in terms of frequency hopping, independence of frame number and hopping invariant. ## REFERENCES - [1] Daquan Feng et al., Device-to-device communications in cellular networks , IEEE Commun. Mag., vol 52, no. 4, 2014, pp. 49-55. - [2] Hongnian Xing ; Hakola, S., The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system , IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2010. - [3] Dongyu Wang ; Xiaoxiang Wang ; Yuan Zhao, An Interference Coordination Scheme for Device-to-Device Multicast in Cellular Networks , IEEE Vehicular Technology Conference (VTC Fall), 2012. - [4] Si Wen ; Xiaoyue Zhu ; Zhesheng Lin ; Xin Zhang ; Dacheng Yang, Energy Efficient Power Allocation Schemes for Device-to-Device(D2D) Communication , IEEE 78th Vehicular Technology Conference (VTC Fall), 2013. - [5] Janis, P. ; Koivunen, V. ; Ribeiro, C.B. ; Doppler, K. ; Hugl, K., Interference-avoiding MIMO schemes for device-to-device radio underlaying cellular networks , IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009. - [6] Li, J.C.F. ; Ming Lei ; Feifei Gao , Device-to-device (D2D) communication in MU-MIMO cellular networks , IEEE Global Communications Conference (GLOBECOM), 2012. - [7] Huan Tang ; Chenxi Zhu ; Zhi Ding , Cooperative MIMO precoding for D2D underlay in cellular networks , IEEE International Conference on Communications (ICC), 2013. - [8] Doppler, K. ; Ribeiro, C.B. ; Kneckt, J., Advances in D2D communications: Energy efficient service and device discovery radio , 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace &amp; Electronic Systems Technology (Wireless VITAE), 2011. - [9] Tiirola, E. ; Raaf, B. ; Lahetkangas, E. ; Harjula, I. ; Pajukoski, K., On the design of discovery patterns for half-duplex TDD nodes operating in frame-based systems , Future Network and Mobile Summit, 2013. - [10] F. Baccelli, N. Khude, R. Laroia, J. Li, T. Richardson, S. Shakkottai, S. Tavildar, and X. Wu, On the design of device-to-device autonomous discovery , Fourth International Conference on Communication Systems and Networks, 2012. - [11] Qualcomm Inc., Techniques for D2D discovery , 3GPP TSG RAN WG1 Meeting 74, R1-133600, 2013. - [12] Qizhi Zhang, Deping Liu, On the hopping pattern design for D2D discovery, arXiv:1405.4217 [cs.NI], to appear in VTC2014-Fall. - [13] Huawei, HiSilicon, Resource allocation for type-1 and type-2B discovery, 3GPP TSG RAN WG1 Meeting 76bis, R1-141138, 2014.
null
[ "Qizhi Zhang", "Changqing Yang" ]
2014-08-06T04:13:11+00:00
2014-08-06T04:13:11+00:00
[ "cs.IT", "math.IT" ]
On the hopping pattern design for D2D discovery with invariant
In this paper, we focus on the hopping pattern design for device-to-device (D2D) discovery. The requirements of hopping pattern is discussed, where the impact of specific system constraints, e.g., frequency hopping, is also taken into consideration. Specifically speaking, we discover and utilize the novel feature of resource hopping, i.e., "hopping invariant" to design four new hopping patterns and analyze their performance. The hopping invariant can be used to deliver information for specific users without extra radio resources, and due to the connection between hopping invariant and resource location, receiver complexity can be significantly reduced. Furthermore, our schemes are designed to be independent of discovery frame number, which makes them more suitable to be implemented in practical systems.
1408.1180v1
## A class of hopping patterns with minimal collisions Qizhi Zhang Huawei Technologies Co. Ltd., Beijing, China Email: { zhangqizhi } @huawei.com Abstract -In [3] three metrics for hopping pattern performance evaluation is proposed: column period, maximal collision ratio, maximal continual collision number, a lower bound of maximal continual collision number is given also. In this paper we give a lower bound of maximal collision ratio, a class of hopping pattern whose both maximal collision ratio and maximal continual collision number fit the lower bounds is constructed also. ## I. INTRODUCTION In classical wireless communication, devices communicate with each other through base station and core network. But the connection capacity of base station is limited. If a lot of devices in a domain have the request of communication, base station may can not satisfy all the requests. D2D ( Device to Device ) communication is a manner that devices communicate with each other through direct wireless signal transmitting [1]. This technic reduce the load of base station and core network. Fig. 1. Classical wireless communication and D2D communication ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1180v1-figure-62da7b5a-20ea-4a32-b96e-57eec98244a3.jpg) OFDMA (Orthogonal Frequency Division Multiple Access) is a multiple access method that allow multiple users to use orthogonal subcarrier to transmit signal in same time. This is a suitable multiple access method for D2D communication, but the half-duplex property need to be considered. It means: a device transmitting own signal can not receive the signals from other devices in same time. In [2], a relative fair method to solve this problem is introduced, the idea is that to let devices 'hopping' to avoid always collision. A sequence of periodic frames is set in system. A frame is divided into n sub frame. In addition, the frequency band of system is split into m parallel channels using OFDMA, where m ≤ n . A frequency-time unit shown in Figure 1 is the basic resource unit for the device to send or receive a discovery signal. Hence, in one frame, there are mn resource units and each device use one resource unit to transmit its discovery signal according to the following hopping pattern: $$i ( t ) & = i ( 0 ) \\ j ( t ) & = ( j ( 0 ) + i ( 0 ) t ) \mod n.$$ Fig. 2. Example of hopping pattern ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1180v1-figure-6901a551-8556-4d6a-a535-517d8a389101.jpg) The two equations define a UE's transmission frequencytime unit ( ( ) i t , j ( )) t in frame t , which is decided by the frequency-time unit ( (0) i , j (0)) in frame 0 . For example, if UE 0 transmits its discovery signal on red units ,witch ( (0) i , j (0)) = (0 0) ( (1) , , i , j (1)) = (0 0) , , · · · , and UE 3 transmits its discovery signal on blue units, witch ( (0) i , j (0)) = (1 0) ( (1) , , i , j (1)) = (1 1) , , · · · , though they can not receive each others discovery signals in frame 0 , yet in frame 1 they can receive the signals. Once hopping pattern is determined, some relation is created between the resource units in differential frames. For example, we can see the red frequency-time units as one logical resource, and the blue frequency-time units as another logical resource. In [3], A formalized definition of hopping pattern is given. In which a hopping pattern is defined as a sequence of maps: $$( i ( t ), j ( t ) ) \colon S \longrightarrow I \times J \text{ \ for any } t \in \mathbb { Z } _ { \geq 0 }, \text{ \ \ } ( 1 )$$ where S is the set of logical discovery resources, and contains | I | × | J | elements, I is the set of frequency-domain locations, J is the sets of time-domain locations. [3] also give three metrics to evaluate hopping patterns: column period , maximal collision ration , maximal continual collision number as follows: Let { ( ( ) i t , j ( )) t } t ∈ Z ≥ 0 be a hopping pattern. If there exists a positive integral number T satisfying the following condition (P), the hopping pattern is called 'be column periodical'. (P): for any s, s ′ ∈ S, t ∈ Z , $$j ( t ) ( s ) = j ( t ) ( s ^ { \prime } ) \text{ if and only if } j ( t + T ) ( s ) = j ( t + T ) ( s ^ { \prime } ).$$ If the hopping pattern is column periodical, the minimal positive integral number T satisfying the condition (P) is called the column period of the hopping pattern; otherwise the hopping pattern is called has column period infinity. If for any s, s ′ ∈ S , there exists a real number ρ s,s ′ such that $$\frac { 1 } { t _ { b } } \ddot { \mu } \{ t = 0, 1, \cdots, t _ { b } - 1 \ | \ j ( t ) ( s ) = j ( t ) ( s ^ { \prime } ) \}$$ converges in probability to ρ s,s ′ , the value $$\max _ { s, s ^ { \prime } \in S, s \neq s ^ { \prime } } \rho _ { s, s ^ { \prime } }$$ /negationslash is called the maximal collision ratio of this pattern. The maximal continual collision number is defined as $$\text{$me$ $\max$ $\min$ $\min$ $\min$ as $f$} \\ \max \{ l = 1, 2, \dots | \text{ There exist $s,s^{\prime}$, $t$ such that} \\ j ( t ) ( s ) = j ( t ) ( s ^ { \prime } ), \\ j ( t + 1 ) ( s ) = j ( t + 1 ) ( s ^ { \prime } ), \\ \dots, \\ j ( t + l - 1 ) ( s ) = j ( t + l - 1 ) ( s ^ { \prime } ) \}, \\ \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \end{cases}$$ whose value is either a positive integral number or ∞ ; A lower bound of the maximal continual collision number is given in [3]: Proposition I.1. The maximal continual collision number of any hopping pattern on frame structure Z /m Z × Z /n Z is greater than or equal to log n ( m ) . Moreover, some example fitting the lower bound of maximal continual collision number is given in [3]. The hopping pattern proposed in [4] fit the lower bound of maximal continual collision number in some situation also. But for maximal collision ratio there is not a result about the lower bound. In this paper, we give a lower bound of the maximal collision ratio, and propose a class of pattern that fit the both lower bound of maximal continual collision number and maximal collision ratio. ## II. THE LOWER BOUND OF MAXIMAL COLLISION RATIO Proposition II.1. The maximal collision ratio of any hopping pattern on frame structure I × J is greater than or equal to m -1 mn -1 , where m = | I , n | = | J | . Moreover, if a pattern fit the lower bound, the number of devices transmitting discovery signal in every time-domain location must be same. Proof. For any logical discovery resources s, s ′ and positive integral number t b , let $$\rho _ { s, s ^ { \prime } } ^ { t _ { b } } \coloneqq \mathfrak { j } \{ t = 0, 1, \cdots, t _ { b } - 1 \ | \ j ( t ) ( s ) = j ( t ) ( s ^ { \prime } ) \}.$$ Then we have the maximal collision ratio /negationslash /negationslash $$\max _ { s \ne s ^ { \prime } } \rho _ { s, s ^ { \prime } } = \max _ { s \ne s ^ { \prime } } \lim _ { t _ { b } \to \infty } \frac { \rho _ { s, s ^ { \prime } } ^ { t _ { b } } } { t _ { b } }$$ The maximal value should be not less than the average value, hence /negationslash /negationslash /negationslash $$\text{ence} \\ \max _ { s \neq s ^ { \prime } } \rho _ { s, s ^ { \prime } } & \geq \frac { 1 } { m n ( m n - 1 ) } \sum _ { s \neq s ^ { \prime } } \lim _ { t _ { b } \to \infty } \frac { \rho _ { s, s ^ { \prime } } ^ { t _ { b } } } { t _ { b } } \\ & = \frac { 1 } { m n ( m n - 1 ) } \lim _ { t _ { b } \to \infty } \sum _ { s \neq s ^ { \prime } } \frac { \rho _ { s, s ^ { \prime } } ^ { t _ { b } } } { t _ { b } }. \\ \text{et}$$ Let $$\rho _ { s, s ^ { \prime } } ( t ) \coloneqq \begin{cases} \ 1 & \text{if $j(t)(s)=j(t)(s^{\prime})$} \\ 0 & \text{otherwise} \end{cases} \\ \_ \dots \ 1 \dots \end{cases}$$ Then we have /negationslash $$\sum _ { s \neq s ^ { \prime } } \rho _ { s, s ^ { \prime } } ^ { t _ { b } } = \sum _ { s \neq s ^ { \prime } } \sum _ { t = 0 } ^ { t _ { b } } \rho _ { s, s ^ { \prime } } ( t ) = \sum _ { t = 0 } ^ { t _ { b } } \sum _ { s \neq s ^ { \prime } } \rho _ { s, s ^ { \prime } } ( t ). \\ \intertext { a n o m m a n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n i n j }$$ /negationslash /negationslash From the lemma II.1 below, we know that /negationslash $$\sum _ { s \ne s ^ { \prime } } \rho _ { s, s ^ { \prime } } ( t ) \geq m ^ { 2 } n - m n \quad \quad ( 2 ) \\ \pi \quad \ e \quad \.$$ for any t . Therefore we have /negationslash $$\sum _ { s \ne s ^ { \prime } } \rho _ { s, s ^ { \prime } } ^ { t _ { b } } \geq t _ { b } ( m ^ { 2 } n - m n ),$$ and hence /negationslash $$\underset { \colon \cdot } { f } \quad \max _ { s \neq s ^ { \prime } } \rho _ { s, s ^ { \prime } } \geq \frac { 1 } { m n ( m n - 1 ) } ( m ^ { 2 } n - m n ) = \frac { n - 1 } { m n - 1 }.$$ /negationslash If a pattern has maximal collision ratio max s = s ′ ρ s,s ′ = m -1 mn -1 , the inequality (2) should be equality for any t . Hence the number of devices transmitting discovery signal in every time-domain location must be same by lemma II.1. Lemma II.1. Let X be a set consists of mn elements, and be divided into n 's disjoint parts X = ∐ n j =1 X i . Let $$\rho _ { x, x ^ { \prime } } = \begin{cases} \ 1 & \text{if $x$ and $x^{\prime}$ in same part} \\ 0 & \text{otherwise} \end{cases} \\ \psi & \quad. \quad \partial \quad \begin{pmatrix} \. \end{pmatrix} \. \end{cases} \.$$ /negationslash Then ∑ x = x ′ ∈ X ρ x,x ′ ≥ m n 2 -mn . The equality sign is fitted if and only if the numbers of elements in every parts X j are same. ## Proof. /negationslash $$& \sum _ { x \neq x ^ { \prime } \in X } \rho _ { x, x ^ { \prime } } \\ = & \sum _ { j = 1 } ^ { n } \sum _ { x \neq x ^ { \prime } \in X _ { j } } \rho _ { x, x ^ { \prime } } \\ = & \sum _ { j = 1 } ^ { n } | X _ { j } | ( | X _ { j } | - 1 ) \\ = & \sum _ { j = 1 } ^ { n } | X _ { j } | ^ { 2 } - \sum _ { j = 1 } ^ { n } | X _ { j } |$$ /negationslash We know that ∑ n j =1 | X j | = | X | = mn , and $$\sqrt { \frac { \sum _ { j = 1 } ^ { n } | X _ { j } | ^ { 2 } } { n } } \geq \frac { \sum _ { j = 1 } ^ { n } | X _ { j } | } { n } = m,$$ which implies /negationslash $$\sum _ { x \neq x ^ { \prime } \in X } \rho _ { x, x ^ { \prime } } \geq m ^ { 2 } n - m n. \\ \cdot \sin \text{is fitted if and only if the cardina}$$ The equality sign is fitted if and only if the cardinality of every X j s are same. ## III. A CLASS OF PATTERN FITTING BOTH LOWER BOUNDS In [3], authors gave a class of pattern whose maximal continual collision number fit to the lower bound log n ( m ) and whose maximal collision ratio equal to 1 n which close to the lower bound m -1 mn -1 , where m = | I , n | = | J | . In this section we propose a class of hopping pattern whose maximal continual collision number fit to the lower bound log n ( m ) as well as the maximal collision ratio fit to the lower bound m -1 mn -1 . Suppose the number n = q be powers of a prime number p , m = q r be a power of q . Fix a bijection I /similarequal F ( r ) q and J /similarequal F q . We will always use a column vector in F ( r ) q to represent a frequency domain location, and use a column vector in F q to represent a time domain location in following. Let and f ( x ) = x r +1 + a x 1 r + · · · + a r +1 be an irreducible polynomial on F q satisfying the following condition (G): (G): The minimal integral number c satisfying $$x ^ { c } \equiv 1 \mod f ( x ) \, \left ( \, \text{as the polynomials in } \mathbb { F } _ { q } [ x ] \, \right )$$ is p r +1 -1 . ( In fact, the image of such x under the ring homomorphism F p [ x ] -→ F p [ x ] ( f ( x )) /revasymptequal F p r +1 is a generator of the multiplicative group F × p r +1 . ) Let ( (0) i , j (0)) : S -→ F ( r ) q × F q be any bijection, and define { ( ( ) i t , j ( )) t } t ∈ Z ≥ 0 as follows: $$\left ( \begin{array} { c } i ( t + 1 ) \\ j ( t + 1 ) \end{array} \right ) = A \left ( \begin{array} { c } i ( t ) \\ j ( t ) \end{array} \right ) \\ \text{: the common matrix of $f(r)$ on $\mathbb{R}$ } \ ;$$ where A is the companion matrix of f ( x ) on F q , i.e $$A = \begin{pmatrix} 0 & 0 & \cdots & 0 & - a _ { r + 1 } \\ 1 & 0 & & \vdots & - a _ { r } \\ 0 & 1 & \ddots & \vdots \\ \vdots & \ddots & \ddots & 0 & \vdots \\ 0 & \cdots & 0 & 1 & - a _ { 1 } \end{pmatrix} \\ \text{position fill}. 1. \, The hopping pattern $\{ (i ( t ), j ( t ) ) \} _ { t \in \mathbb { Z } _ { \zeta } }$$ Proposition III.1. The hopping pattern { ( ( ) i t , j ( )) t } t ∈ Z ≥ 0 defined previously has column period mn -1 n -1 , maximal continual collision number log n ( m ) and maximal collision ratio m -1 mn -1 . ## Proof. Column period. It is easy to see that $$\left ( \begin{array} { c } i ( s + t ) \\ j ( s + t ) \end{array} \right ) = A ^ { t } \left ( \begin{array} { c } i ( s ) \\ j ( s ) \end{array} \right )$$ for any integral number s, t . By lemma III.1. a below we know that $$\left ( \begin{array} { c } i ( s + \frac { q ^ { r + 1 } - 1 } { q - 1 } ) \\ j ( s + \frac { q ^ { r + 1 } - 1 } { q - 1 } ) \end{array} \right ) = \left ( \begin{array} { c } y i ( s ) \\ y j ( s ) \end{array} \right ) \\ -.. \ - \ - \. \ \. \ \. \ \.$$ for some y ∈ F × q . Hence the column period is a divisor of q r +1 -1 q -1 . Suppose the column period is T , it means that A T has the form $$A ^ { T } & = \left ( \begin{array} { c c } \tilde { A } & \beta \\ 0 & \lambda \end{array} \right ) \\ \cdot \quad \,. \quad \,.$$ where ˜ A is a square matrix of degree r on F q , β is a column vector of dimension r on F q , and λ is a element in F × q . Let Y = { (0 , 0 , · · · , 0 , y r +1 ) ∈ F r +1 q | y r +1 ∈ F × q } . It is easy to see that $$Y A ^ { T } \subset Y.$$ Hence we know that $$& \text{mber $p$}, & & A ^ { T } \in \left \{ y I _ { r + 1 } \ | \ y \in \mathbb { F } _ { q } ^ { \times } \right \} \\ & \text{sent a} \quad & \text{by lemma III.1.d below. Hence $T$ is divided by $^{q^{r+1}-1}^{q-1}$}.$$ Maximal collision ratio. We know that the column period of the hopping pattern is a divisor of q r +1 -1 . For any two different logical discovery resources s and s ′ , we have $$\text{ Hence } T = \frac { q ^ { r + 1 } - 1 } { q - 1 } = \frac { m n - 1 } { n - 1 }.$$ /negationslash $$\left ( \begin{array} { c } i ( 0 ) ( s ) - i ( 0 ) ( s ^ { \prime } ) \\ j ( 0 ) ( s ) - j ( 0 ) ( s ^ { \prime } ) \end{array} \right ) \neq 0$$ and $$\Box _ { \text{and} } \left ( \begin{array} { c } i ( t ) ( s ) - i ( t ) ( s ^ { \prime } ) \\ j ( t ) ( s ) - j ( t ) ( s ^ { \prime } ) \end{array} \right ) = A ^ { t } \left ( \begin{array} { c } i ( 0 ) ( s ) - i ( 0 ) ( s ^ { \prime } ) \\ j ( 0 ) ( s ) - j ( 0 ) ( s ^ { \prime } ) \end{array} \right ).$$ The lemma III.1. b below shows that $$A ^ { t } \left ( \begin{array} { c } i ( 0 ) ( s ) - i ( 0 ) ( s ^ { \prime } ) \\ j ( 0 ) ( s ) - j ( 0 ) ( s ^ { \prime } ) \end{array} \right ) \quad \text{for $t=0,1,\cdots,q^{r+1}-2$} \\. \quad. \quad. \quad - \iota r + 1 \iota. \, \dots \quad. \quad. \quad. \end{array}$$ take every values in F ( r +1) q \{ } 0 once. On the other hand, there are q r -1 's elements in F ( r +1) q \ { 0 } with last coordinate 0 , which means the collision number of the two logical discovery resources s and s ′ is q r -1 in continual q r +1 -1 's frames. Hence the maximal collision ratio of this pattern is q r -1 q ( r +1) -1 = m -1 mn -1 . Maximal continual collision number. We know the maximal continual collision number is greater than or equal to log n ( m ) = r by proposition I.1. Suppose it is greater than r , then there are two different logical resources s and s , and an integral number t such that $$j ( t ) ( s ) & = j ( t ) ( s ^ { \prime } ) \\ j ( t + 1 ) ( s ) & = j ( t + 1 ) ( s ^ { \prime } )$$ $$j ( t + r ) ( s ) = j ( t + r ) ( s ^ { \prime } )$$ $$\lambda ^ { \prime } & = j ( t + 1 ) ( s ^ { \prime } ) \\ \vdots \\ ( s ) & = j ( t + r ) ( s ^ { \prime } )$$ Let β := i ( )( t s ) -i ( )( t s ′ ) , then we have $$( 0, 0, \cdots, 1 ) A ^ { k } \left ( \begin{array} { c } \beta \\ 0 \end{array} \right ) = 0 \\ \dots \ r \ I e t \ R \ h e a \ m a t r i v \ o f \ d e r e e _ { 1 }$$ for k = 0 1 , , · · · , r . Let R be a matrix of degree r +1 whose k th ′ row is (0 , 0 , · · · , 1) A k , then we have $$R \left ( \begin{array} { c } \beta \\ 0 \end{array} \right ) = 0 \intertext { c o f $R$ are linear in $c$}$$ But we know the rows of R are linear independent on F q from lemma III.1. e below, hence R is a non-singular matrix, which implies β = 0 . It is contradictory to that s and s ′ are different logical resources. Lemma III.1. Suppose A is defined as before, then we have: a. The multiplication group &lt; A &gt; generate by A is a cyclic group of degree q r +1 -1 ; and the multiplication group &lt; A q r +1 -1 q -1 &gt; generate by A q r +1 -1 q -1 equal to { yI r +1 | y ∈ F × q } . b. &lt; A &gt; faithfully and transitively acts on F ( r +1) q \ { 0 } buy left multiplication. ( A group left action G × X -→ X is called faithful and transitive if and only if for any x ∈ X , the map g → gx is a bijection from G to X .) ↦ - c. &lt; A &gt; faithfully transitively acts on F r +1 q \{ } 0 buy right multiplication. ( A group right action X × G -→ X is called faithful and transitive if and only if for any x ∈ X , the map g → xg is a bijection from G to X .) ↦ - d. Let Y = { (0 , 0 , · · · , 0 , y r +1 ) ∈ F r +1 q | y r +1 ∈ F × q } , and H Y := { σ ∈ &lt; A &gt; Y σ | ⊂ Y } , then we have where I r +1 is the identity matrix of degree r +1 . $$H _ { Y } = \left \{ y I _ { r + 1 } \, | \$$ e. For any α ∈ F r +1 q \ { 0 } , the row vectors αA ,k k = 0 1 , , · · · , r, are linear independent on F q . ## Proof. a. Because under the isomorphism F q [ A ] /similarequal F q [ x / f ] ( ( x )) /similarequal F q r +1 , the image ¯ x of A is a generator of the multiplicative group F × q r +1 , we know A has multiplicative order q r +1 -1 . On the other hand, ¯ x q r +1 -1 q -1 generate the multiplicative subgroup F × q , which is corresponding to { yI r +1 | y ∈ F × q } in F q [ A ] . b. Consider the commutative diagram /d47 /d47 /d15 /d15 /d15 /d15 /d15 /d15 /d47 $$\begin{array} {$$ /d47 ↦ The left vertical map defined by A → ¯ x is a isomorphism between groups. The middle vertical map defined by ↦ is a bijection between sets. The right vertical map is same as the middle one. $$\begin{array} { c } \text{$a$ groups. $me$ measure vector map$$ The map in up line is defined by the multiplication of matrix, the map in down line is defined by the multiplication in finite fields. Because F × q r +1 acts on F × q r +1 faithfully and transitively, we have &lt; A &gt; faithfully transitively acts on F ( r +1) q \ { 0 } . c. It is similar to the proof of b . $$\mathfrak { d }. \, \text{Let } X = \mathbb { F$$ $$X \subset \bigcup _ { \sigma \in < A > } Y \sigma$$ Therefore $$| X | \leq | Y | \times | < A > / H |$$ But we know that | X | = | A | , hence $$| H | = | Y | = q - 1.$$ But it easy to see that { yI r +1 | y ∈ F × q } ⊂ H Y , hence we know e. Suppose there are a , a 0 1 , · · · , a n ∈ F q not all zero such that $$H _ { Y } = \left \{ y I _ { r + 1 } \, | \, y \in \mathbb { F } _ { q } ^ { \times } \right \}. \\ \, \text{there are } a _ { 0 }, a _ { 1 }, \cdots, a _ { n } \in \mathbb { F } _ { q } \text{ not}$$ $$\sum _ { k = 0 } ^ { r } a _ { k } \alpha A ^ { k } = 0, \\ \text{here is a contradiction}$$ we will show that there is a contradiction. $$, \, a n a \, \\ & \quad \text{Let } g ( x ) = a _ { 0 } + a _ { 1 } x + a _ { 2 } x ^ { 2 } + \cdots + a _ { r } x ^ { r }, \, \text{then we have}$$ $$\alpha g ( A ) = 0.$$ On the other hand, we have $$\alpha f ( A ) = 0$$ because A is the companion matrix of f ( x ) . Hence we have $$\alpha h ( A ) = 0$$ /negationslash where h x ( ) is the greatest common divisor of f ( x ) and g x ( ) . Because f ( x ) is irreducible and g x ( ) = 0 and deg g x ( ) ≤ r , we know that f and g are co-prime. Hence we have h x ( ) = 1 , and then $$\alpha = 0,$$ which is contradictory to α ∈ F \ { 0 } r +1 q . ## IV. CONCLUSION AND FUTURE WORK In this paper, we gave a lower bound of the maximal collision ratio of hopping patterns. Then a class of hopping pattern is constructed. Both maximal collision ratio and maximal continual collision number of these pattern fit to the lower bounds. These pattern apply to the frame structure that the number n of time-domain resources is a power of a prime number, and the number m of frequency-domain resources is a power of n . It is still an open problem that how to construct a hopping pattern fitting the both lower bounds of maximal collision ratio and maximal continual collision number for more general frame structure. ## REFERENCES - [1] 3GPP TR 22.803, Feasibility study for Proximity Services (ProSe) (Release 12), V12.2.0 (2013-06). - [2] F. Baccelli, N. Khude, R. Laroia, J. Li, T. Richardson, S. Shakkottai, S. Tavildar, and X. Wu, On the design of device-to-device autonomous discovery . Fourth International Conference on Communication Systems and Networks, 2012. - [3] Qizhi Zhang, Deping Liu, On the hopping pattern design for D2D discovery, arXiv:1405.4217 [cs.NI], to appear in VTC2014-Fall. - [4] Qualcomm Inc., Techniques for D2D Discovery. 3GPP TSG RAN WG1 Meeting R1-133600.
null
[ "Qizhi Zhang" ]
2014-08-06T04:14:04+00:00
2014-08-06T04:14:04+00:00
[ "cs.IT", "math.IT" ]
A class of hopping patterns with minimal collisions
In \cite{VTC} three metrics for hopping pattern performance evaluation is proposed: column period, maximal collision ratio, maximal continual collision number, a lower bound of maximal continual collision number is given also. In this paper we give a lower bound of maximal collision ratio, a class of hopping pattern whose both maximal collision ratio and maximal continual collision number fit the lower bounds is constructed also.
1408.1181v1
## A New Approach to the Main Problem of Subspace Coding Liu Haiteng Department of Information Science and Electronics Engineering Zhejiang University, 38 Zheda Road 310027 Hangzhou, China Email: [email protected] Thomas Honold Department of Information Science and Electronics Engineering Zhejiang University, 38 Zheda Road 310027 Hangzhou, China Email: [email protected] Abstract -Subspace codes form the appropriate mathematical setting for investigating the KoetterKschischang model of fault-tolerant network coding. The Main Problem of Subspace Coding asks for the determination of a subspace code of maximum size (proportional to the transmission rate) if the remaining parameters are kept fixed. We describe a new approach to finding good subspace codes, which surpasses the known size limit of lifted MRD codes and is capable of yielding an alternative construction of the currently best known binary subspace code of packet length 7 , constant dimension 3 and minimum subspace distance 4 . Index Terms -Subspace code, Main Problem of Subspace Coding, network coding, linear operator channel, MRD code, parallelism ## I. Introduction Let q &gt; 1 be a prime power. A q -ary (constantdimension) subspace code with parameters ( v, M, d ; k ) is a set C = { U , . . . , U 1 M } of M distinct k -dimensional subspaces U i of the 'ambient' vector space F v q (over F q ) with minimum subspace distance d ( s C ) = min { d ( s U , U i j ); 1 ≤ i &lt; j ≤ M } = d . Here the subspace distance of U and V is defined in general as d ( s U, V ) = dim( U + V ) -dim( U ∩ V ) and in the special case dim( U ) = dim( V ) = k reduces to d ( s U, V ) = 2 k -2 dim( U ∩ V ). In particular, d = 2 δ is always even and t = k -δ +1 is the smallest integer such that every t -dimensional subspace of F v q is contained in at most one member of C . The Main Problem of (constant-dimension) Subspace Coding can be described as follows: Given a prime power q &gt; 1 and positive integers v, k, δ with 2 ≤ δ ≤ k ≤ v/ 2, determine the largest cardinality M of a q -ary ( v, M, 2 ; δ k ) subspace code. This cardinality will be denoted by A ( q v, 2 ; δ k ). ↦ Restriction to the case k ≤ v/ 2 entails no loss, since the map U → U ⊥ (orthogonality being taken with respect to the usual dot product) preserves the subspace distance and hence identifies q -ary ( v, M, 2 ; δ k ) subspace codes with ( v, M, 2 ; δ v -k ) subspace codes. The Main Problem of Subspace Coding arose in connection with the Koetter-Kschischang model of fault-tolerant network coding [1] (see [2] for an introduction), which uses appropriate subspace codes to encode messages before transmission over an ordinary network-coded (implemented by some form of random linear network coding) packet network. Subspace codes with large size and large minimum distance account for large transmission rate and good error-correcting capabilities, respectively, and the determination of the best such codes is thus of particular importance. The Main Problem of Subspace Coding is akin to its classical counterpart, the Main Problem of Algebraic Coding Theory, which asks for the determination of the best linear codes over F q relative to the Hamming distance and forms the mathematical abstraction of the engineering problem of finding the best point-to-point channel codes. The Main Problem of Subspace Coding is much more difficult, however, since the set of all subspaces of F v q does not admit a group structure compatible with the subspace metric. Hence there is no suitable notion of 'linearity' for subspace codes, which could be exploited. In Finite Geometry language, a q -ary ( v, M, 2 ; δ k ) subspace code is a set C of M distinct ( k -1)-flats in the projective geometry PG( v -1 , q ) such that any ( k -δ )-flat is contained in at most one member of C and some ( k -δ -1)-flat is contained in at least two members of C . The Main Problem of Subspace Coding is therefore equivalent to the packing problem for ( k -1)-flats in PG( v -1 , q ) when these flats are identified with sets of ( t -1)-flats (all ( t -1)-flats contained in the given ( k -1)flat), where t = k -δ + 1. Thus it comes as no surprise that most of the known results on the Main Problem, at the time of its advent, had been obtained by Finite Geometers. With a few exceptions, these results pertain to the extremal case δ = k of pairwise disjoint ( k -1)-flats, so-called spreads or partial spreads, and really satisfactory results were known only for the 'line' case k = 2. While some progress has been made since then, the Main Problem (unlike its classical counterpart) is still widely open. Koetter and Kschischang, in their seminal paper [1], used so-called maximum-rank-distance (MRD) codes, found earlier by Delsarte [3], Gabidulin [4] and Roth [5], and a suitable lifting construction to produce a good approximation to optimal subspace codes for general parameter sets. Etzion and Silberstein [6] (cf. [7] for the latest improvements) introduced the echelon-Ferrers construction as a method to augment lifted MRD (LMRD) codes by further subspaces, while keeping their minimum distance. Further constructions of subspace codes for specific parameter sets, improving on the general methods mentioned so far but usually relying heavily on computer searches, can be found in [8], [9], [10]. The numbers A ( q v, 2 ; δ k ) have been determined exactly for v ≤ 5 (all q ) and in the binary case also for v = 6. This includes A (4 4; 2) = q , q 2 +1 (realized by a line spread in PG(3 , q )), A (5 4; 2) q , = q 3 + 1 (the maximal size of a partial line spread in PG(4 , q ); cf. [11]), and A 2 (6 , 4; 3) = 77 (realized by 5 different isomorphism types of optimal subspace codes; cf. [12]). Moreover, from the recent ground-breaking discovery of the first 2-analogue of a Steiner triple system in [13] it is also known that A 2 (13 4; 3) = 1597245. , Our contribution in this paper is a new approach to the construction of good subspace codes, which has its origin in the observation made in [12] that removing certain subcodes from an LMRD code may result in the opportunity to add even more subspaces to the expurgated LMRD code, thereby surpassing the size of the LMRD code, as well as any other subspace code containing an LMRD code. In contrast with the construction of a binary (6 , 77 4; 3) , subspace code of Type A in [12], which used the smallest possible set of removed codewords, we propose to remove a much larger set of codewords from an LMRD code. As it turns out, our approach is capable of constructing a binary (7 , 329 4; 3) subspace code, equalizing the current record , size and providing an alternative construction of a code with M = 329 for the parameter set q = 2, v = 7, k = 3, d = 4; cf. [10]. The main result is described in Section V. Section II contains information about a putative binary (7 381 , , 4; 3) subspace code, whose existence/non-existence is a famous unsolved problem, and the subsequent two sections contain preparatory material for our main result and related subspace code constructions. Throughout the paper we will use basic concepts and terminology from Finite Geometry. Readers are referred to [14], [15], [16] for the relevant background information and any unexplained terms. ## II. The Putative 2 -Analogue of the Fano Plane An easy double-counting argument yields the bound M ≤ 381 for any binary (7 , M, 4; 3) subspace code C . If equality holds then with t = 2, k = 3, v = 7 every t -dimensional subspace of F v 2 must be contained in precisely one k -dimensional subspace (codeword) of C . Such a structure is known as a Steiner system over F 2 , and in the particular case ( t, k, v ) = (2 , 3 7) under consideration , has been named '2-analogue of the Fano plane PG(2 2)', , since PG(2 2) is the unique ordinary Steiner system with , these parameters. Steiner systems over finite fields (and, more generally, combinatorial designs over finite fields) were introduced by Thomas [17], who then was able to show that a putative 2-analogue of the Fano plane cannot be constructed using the obvious idea of combining three plane orbits (of size 127) of a Singer group of PG(6 , 2). In an attempt to construct such a 2-analogue C , one can proceed as follows. Out of the [ ] 7 4 2 = 11811 solids in PG(6 2) (4-dimensional subspaces of , F 7 2 ), 15 × 381 = 5715 should contain a codeword of C and 6096 should not contain a codeword of C . We now fix one such solid as the subspace S = (0 0 0 , , , ∗ ∗ ∗ ∗ , , , ) of F 7 2 and count the number of codewords of C meeting S in a subspace of fixed dimension. Lemma 1: Suppose C is a putative 2-analogue of the Fano plane and a i = # { U ∈ C ; dim( U ∩ S ) = i } for 0 ≤ i ≤ 3 is the so-called intersection vector of S with respect to C . Then ( a , a 1 1 , a 2 , a 3 ) is either (128 , 224 28 1) , , or (136 210 35 0), , , , depending on whether S contains a codeword of C or not, respectively. This lemma also follows from the general theory of intersection numbers for subspace designs, as developed in [18]. Proof: We prove only the case where S does not contain a codeword of C , i.e. a 3 = 0. The other case is proved similarly. Each of the [ ] 4 2 2 = 35 lines in S is contained in exactly one codeword and the 35 codewords obtained in this way are distinct, since the planes in S spanned by two of the lines are not in C . This gives a 2 = 35. Double-counting yields that each point of PG(6 , 2) is contained in 21 codewords. Hence each of the 15 points in S must be contained in 7 codewords meeting S in a line and in 14 codewords meeting S in a point. Consequently, a 1 = 15 · 14 = 210 and a 0 = 381 -35 -210 = 136. Further information about a putative 2-analogue C of the Fano plane can be derived along these lines. For example, every hyperplane (5-flat) of PG(6 , 2) must contain exactly 45 codewords, every 4-flat exactly 5 codewords, and every point-hyperplane flag ( p, H ) must be incident with exactly 5 codewords U (i.e., p ⊂ U ⊂ H ). All this is not yet sufficient, however, to narrow down the number of possible configurations, so that a computer search becomes feasible. ## III. Augmented LMRD codes Suppose k, m, n are positive integers with k ≤ m ≤ n . 1 An ( m,n,k ) maximum rank distance (MRD) code over F q is a set A = { A 1 , ..., A q nk } of q nk distinct matrices in F m n × q having minimum rank distance d ( r A ) = min { rk( A i -A j ); 1 ≤ i &lt; j ≤ q nk } = n -k + 1. An argument similar to that used in the proof of the Singleton bound for ordinary block codes shows that q -ary ( m,n,k = n -d +1) MRD codes in F m n × q have maximum size subject to the requirement d ( r A ≥ ) d , accounting for their name. According to [3], [4], [5], MRD codes exist for all admissible parameters q, k, m, n and may be constructed using a q -analogue of the familiar Reed-Solomon code construction (employing linearized polynomials in place of ordinary polynomials). As shown in [1], [19], the map λ sending a matrix A ∈ F m n × q to the row space of ( I m | A ) ∈ F m × ( m n + ) q satisfies d s ( λ ( A ) , λ ( B ) ) = 2d ( r A B , ) (i.e. constitutes a 'scaled isometry' with scale factor 2). This immediately gives that for any q -ary ( m,n,k ) MRD code A the image λ ( A ) forms a q -ary ( m + n, q nk , 2( n -k +1); m ) subspace code, a so-called lifted maximum rank distance (LMRD) code . We are interested in the case q = 2, ( m,n,k ) = (3 , 4 2), , since an MRD code with these parameters gives rise to a binary (7 256 4; 3) subspace code, providing a good ap-, , proximation to binary optimal (7 , M, 4; 3) subspace codes. The standard MRD code with these parameters is the 'Gabidulin code' ↦ G = { a x 0 + a x 1 2 ; a , a 0 1 ∈ F 16 } , viewed as a set of F 2 -linear transformations W → F 16 , x → a x 0 + a x 1 2 on a fixed 3-dimensional F 2 -subspace W of F 16 , which is conveniently taken as the set of all elements u ∈ F 16 of absolute trace zero (i.e. Tr( u ) = Tr F 16 / F 2 = u + u 2 + u 4 + u 8 = 0). If F 16 is constructed as F 2 [ α ] subject to α 4 + α + 1 = 0, we have W = { 0 1 , , α, α 2 , α 4 , α 5 , α 8 , α 10 } . An explicit representation of G by binary 3 × 4 matrices can then be obtained through fixing bases of W and F 16 over F 2 and using coordinates with respect to these bases. ↦ In our implementation we have used W = 〈 1 , α, α 2 〉 , F 16 = 1 〈 , α, α 2 , α 3 〉 . Then the 4 × 4 matrices corresponding to x → αx and x → x 2 (which determine all 256 matrices of the 4 × 4 matrix representation of G ) are ↦ $$\begin{pmatrix} 0 & 1 & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 1 \\ 1 & 1 & 0 & 0 \end{pmatrix} \quad \text{and} \quad \begin{pmatrix} 1 & 0 & 0 & 0 \\ 0 & 0 & 1 & 0 \\ 1 & 1 & 0 & 0 \\ 0 & 0 & 1 & 1 \end{pmatrix}, \\.. \. \. \. \. \. \. \. \. \. \. \. \. \end{pmatrix}$$ ↦ respectively, and the 3 × 4 matrix representation of G is obtained by deleting the last row of all 256 matrices. The rank of the 255 nonzero 3 × 4 matrices (and hence the subspace distance between any two distinct 3 × 4 matrices) is at least 2, since a nonzero F 2 -linear transformation W → F 16 , x → a x 0 + a x 1 2 has a kernel of dimension ≤ 1. Applying λ to the 256 selected 3 × 4 matrices produces the required (7 , 256 4; 3) LMRD code , λ ( G ) as an explicit set of 256 generating matrices in F 3 × 7 2 . Remark 1: Sometimes it is more convenient to work with the polynomials in G directly rather than with their representing matrices. A basis-independent representation of λ ( G ) can be obtained as follows: Take W × F 16 ∼ = F 7 2 as the ambient vector space and the codewords of λ ( G ) as the graphs (in the sense of Real Analysis) of the linear maps induced by the polynomials in G . In this representation the 256 codewords of λ ( G ) are $$\underset { \sim } { x } \text{ for } \underset { \sim } { G } ( a _ { 0 }, a _ { 1 } ) = \left \{ \underset { \sim } { ( x, a _ { 0 } x + a _ { 1 } x ^ { 2 } ) } { ; x } \in W \right \}, \quad a _ { 0 }, a _ { 1 } \in \mathbb { F } _ { 1 6 }. \, \\ \circ. \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \quad \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \, \ \$$ ↦ Since x → a x 0 + a x 1 2 is F 2 -linear, it is clear that each set G a , a ( 0 1 ) is a 3-dimensional F 2 -subspace of W × F 16 . Moreover, using coordinates in W × F 16 with respect to the ordered basis (1 , 0), ( α, 0), ( α , 2 0), (0 , 1), (0 , α ), (0 , α 2 ), (0 , α 3 ) identifies the spaces G a , a ( 0 1 ) with the codewords of λ ( G ) as introduced earlier. It has been shown in [20] using the concept of 'pending dots' that the lifted (7 , 256 4; 3) Gabidulin code , λ ( G ) can be augmented by 35 further subspaces to a (7 291 4; 3) , , subspace code. Any further enlargement is impossible, since the codewords of λ ( G ) cover all 7 × 256 = 1792 lines disjoint from the special solid S = (0 0 0 , , , ∗ ∗ ∗ ∗ , , , ), so that additional codewords must meet S at least in a line, which clearly conflicts with some of the 35 codewords outside λ ( G ) already chosen. We close this section by providing a different geometric construction of the augmented (7 291 4; 3) subspace , , code, which seems to be worth mentioning. It is known that PG(3 2) admits a line , packing (parallelism) S = {S 0 , S 1 , S 2 , S 3 , S 4 , S 5 , S } 6 , i.e. the 35 lines are partitioned into 7 spreads S i , each spread containing 5 pairwise disjoint lines. 2 Now take seven points p i , 0 ≤ i ≤ 6, in PG(6 2) such that , the seven 4-flats 〈 p , S i 〉 are distinct (and hence represent all the 4-flats above S ). Connect a line L in S to p i if L ∈ S i , and augment λ ( G ) by the 35 planes 〈 p , L i 〉 obtained in this way. It is readily checked that the resulting subspace code C of size 291 still has d ( s C ) = 4. Using the known 'cyclic' description of S it is not hard to produce a list of the 35 additional codewords. In the basis-independent representation one can take p 0 = F 2 (1 , 0) = F 2 ×{ } 0 and S 0 to consist of { 0 }× α j F 4 for 0 ≤ j ≤ 4, i.e. start with the 5 planes E (0 , j ) = F 2 × α j F 4 , 0 ≤ j ≤ 4, and generate the remaining codewords from these by applying the linear permutation σ = (0)( α 14 )(1 , α, α 2 , α 4 , α 5 , α 10 , α 8 )( α , α 7 13 , α 9 , α 12 , α 11 , α 6 , α 3 ) of F 16 simultaneously to both coordinates of W × F 16 . The resulting 35 additional codewords are $$\text{The} \quad E ( i, j ) = \sigma ^ { i } ( \mathbb { F } _ { 2 } ) \times \sigma ^ { i } ( \alpha ^ { j } \mathbb { F } _ { 4 } ), \ \ 0 \leq i \leq 6, \ 0 \leq j \leq 4.$$ The choice of a point of the special form p = F 2 ( a, 0) in every additional plane is not mandatory, and in fact one could make 35 arbitrary choices for the second coordinates of these points. ## IV. Expurgating the LMRD Code First From [12] we know that it makes sense to remove certain sets of codewords from the (7 256 4; 3) code , , λ ( G ). The idea behind this approach is that the removal of M 0 codewords from λ ( G ) 'frees' 7 M 0 lines disjoint from the special 2 Such a line packing provides a solution to Kirkman's School Girl Problem; see e.g. [21]. solid S , which are no longer covered by the expurgated subspace code, and hence can possibly be rearranged, four lines at a time, into 'new planes' N of PG(6 2) meeting , S in a point. In the best case, it will be possible to add 7 M / 0 4 new planes to the expurgated subspace code, resulting in a subspace code of size 256 -M 0 +7 M / 0 4 = 256 + 3 M / 0 4 that is superior to λ ( G ). The results in [12] imply that all 7 M 0 free lines can be rearranged into new planes if the removed set of codewords has the form λ ( R ) for some (disjoint) union R = ⊎ t s =1 ( f s + T ) of cosets of the following special 3dimensional F 2 -subspace T of G : $$\mathcal { T } = \{ u ^ { 2 } x + u x ^ { 2 } ; u \in W \}.$$ /negationslash Any such choice of R uniquely determines 14 t new planes meeting S in a point and covering, together with the codewords in the expurgated subspace code, each line disjoint from S exactly once. It remains to be checked whether the new planes N i mutually satisfy the subspace distance condition d ( s N , N i j ) ≥ 4 if i = j . Equivalently, if N i and N j pass through the same point s ∈ S then N i ∩ N j = { } s . (For new planes passing through distinct points of S there is no further restriction.) Using the computer algebra package SAGE ( www.sagemath.org ), we have checked how many cosets of T can be put into R without violating the subspace distance condition for the resulting new planes. It turned out that the maximum is t = 2 and R can be taken as { u x 2 + ux 2 ; u ∈ F 16 } . This results in a (7 268 4; 3) , , subspace code, which can be further augmented by 35 planes meeting S in a line (using the method described at the end of Section III with some specific choice of the points p i ) to a (7 , 303 4; 3) subspace code. , A straightforward extension of the reasoning in [12] shows that the 28 new planes, obtained by rearranging the 112 lines in the planes G u , u ( 2 ), u ∈ F 16 , corresponding to R , meet S in the points F 2 ( a b 2 + ab 2 ) with a, b ∈ W nonzero and distinct, and have the basis-independent representation $$N ( Z, u ) = \left \{ ( x, u ^ { 2 } x + u x ^ { 2 } + y ) ; x \in Z, y \in \mathbb { F } _ { 2 } ( a ^ { 2 } b + a b ^ { 2 } ) \right \}, \quad \text{of } 1 4 \, \mathfrak { n e } } { \text{subspac} }$$ where Z = 〈 a, b 〉 denotes one of the seven 2-dimensional F 2 -subspaces of W und u ∈ F 16 /Z . From this we realized that the intersection points with S of the new planes determined by R are simply the points on W (which forms a subplane of S ), and thus account for only 7 of the 15 points on S . This is in contrast with the construction in [12], which has dim( S ) = 3 and new planes passing through every point of S . Extending our scope to the 'rotated' subspaces T v = { ( u x 2 + ux 2 ) v u ; ∈ W,v ∈ F × 16 } , we were able to overcome this restriction, but now had 15 × 32 = 480 cosets to consider simultaneously. Moreover, cosets f + T v for distinct v need no longer be disjoint, imposing an additional restriction. The new problem can be viewed as a maximum clique problem in graph theory. 3 View every coset f + T v as a vertex of an undirected graph G . If two cosets are disjoint and their subspace lifts have subspace distance at least 4 from each other, draw an edge between these two vertices. The clique number of G then gives the number of cosets f + T v we can put into R . The clique number of G turned out to be 4 (again with the help of SAGE), i.e. 4 × 8 = 32 planes can be removed in exchange for 56 new planes, resulting in a (7 , 280 4; 3) , subspace code. The augmentation problem for this code can be modelled as a maximum clique problem as well, and we found this time that 34 further planes can be added to produce a (7 314 4; 3) subspace code. , , ## V. The New Approach From Section II we know that in order to qualify for a putative 2-analogue of the Fano plane, the 'removed set' of subspaces of λ ( G ) should be much larger than those considered in the previous section-about half the size of G . In the case where S does not contain a codeword (which can always be assumed by suitably changing the coordinate system), we should remove 120 = 15 · 8 planes (i.e. 15 cosets f + T v ) from λ ( G ) and replace these by 210 = 14 × 15 new planes (14 new planes through each point of S ). A moment's reflection shows that there is an obvious candidate for the corresponding removed set of matrices R , viz. take $$\mathcal { R } = \bigoplus _ { v \in \mathbb { F } _ { 1 6 } ^ { \times } } ( u ^ { 2 } x + u x ^ { 2 } + \mathcal { T } ) v, \quad \text{where } \text{Tr} ( u ) = 1.$$ These 15 cosets are disjoint, since G admits a partition into { 0 } , F × 16 x , F × 16 x 2 and the 15 sets { ( u x 2 + ux 2 ) v u ; ∈ F × 16 } with v ∈ F × 16 . Using this set R as the removed set, it is at least conceivable that the resulting 7 × 120 = 4 × 210 free lines can be rearranged into 210 new planes satisfying the subspace distance condition. This condition is in fact quite easy to check, since problems can occur only for the 14 new planes passing through a fixed point of S , and the 15 sets of 14 new planes determined in this way are isomorphic as subspace codes (since multiplication by v ∈ F × 16 , viewed as a Singer group acting on S = (0 0 0 , , |∗ , ∗ ∗ ∗ , , ), identifies these sets). The key question therefore is: What is the size of the largest clique in one of these 14-sets of new planes (say, the 14 new planes through p = F 2 (0 , 0 0 1 , | , 0 0 0))? , , Using again a maximum clique model, we found that the clique number is 11 &lt; 14 (hence a putative 2-analogue of the Fano plane cannot be constructed in this way), and the number of maximum cliques is 4. This yields a new subspace code of size M = 256 -120 + 11 × 15 = 301, 3 A clique in an undirected graph G = ( V, E ) is a subset C ⊆ V of the vertex set such that any two vertices in C are connected by an edge in E . A maximum clique is a clique of the largest possible size # , called the C clique number of G . subject to further augmentation by planes meeting S in a line or being contained in S . However, since there are 4 choices for the 11 new planes through each point of S , the total number of new (7 301 4; 3) subspace codes obtained , , in this way is 4 15 = 1073741824. It is impossible to check all these subspace codes for further augmentation in a reasonable amount of time. Instead we used a randomized search method (checking several thousands of cases) and found a maximum of 28 planes that can be added to some (in fact, many different) of the 4 15 subspace codes, resulting in a binary (7 329 4; 3) subspace code. This is , , our main result and equalizes the record set in [10]. ## VI. Conclusion We have outlined a new framework for the construction of good binary ( v, M, 4; 3) subspace codes, which starts with a distinguished ( v -3)-dimensional subspace S of the ambient space F v 2 and selects codewords based on their intersection dimension with S . The subspace codes constructed do not contain lifted MRD codes and hence are able to overcome the size limit imposed on such codes. We have worked out the case v = 7 in detail and found that our framework is capable of yielding the largest known subspace codes in this case. Several challenging questions arise from our work. Is it possible to construct the recently found 2-analogue of a Steiner triple system, a binary (13 , 1597245 4; 3) subspace , code along these lines? For this the distinguished subspace S would be 10-dimensional and, as one can show, admit many different feasible intersection vectors ( a , a 0 1 , a 2 , a 3 ). There is, however, a particular choice for a 0 , which is motivated by the example v = 7 and determines the intersection vector completely: a 0 = 2 19 +2 = 524800 = 9 2 9 × 5 2 × 41, a 1 = 916608 = 2 7 × 3 × 7 × 11 × 31, a 2 = 152 768 = 2 6 × 7 × 11 × 31, a 3 = 3069 = 3 × 11 × 31. Thus S would have to contain 3069 = 3 × 1023 (three times the number of points in S ) codewords, and through each point p ∈ S there would be 2 7 × 7 = 896 new planes meeting S in p . Is such a construction of a binary (13 1597245 4; 3) subspace code actually possible? , , Further questions are those for the largest q -ary (7 , M ; 4; 3) subspace codes constructible by our method for prime powers q &gt; 2, and for general lower bounds on the clique numbers of the graphs involved that could be used to derive an infinite family of, say, binary ( v, M, 4; 3) subspaces codes improving on the known general constructions. ## Acknowledgment The authors wish to thank Michael Kiermaier, University of Bayreuth, for valuable discussions related to this paper and three reviewers for their comments/suggestions on the initial submission. ## References - [1] R. Koetter and F. Kschischang, 'Coding for errors and erasures in random network coding,' IEEE Transactions on Information Theory , vol. 54, no. 8, pp. 3579-3591, Aug. 2008. - [2] F. R. Kschischang, 'An introduction to network coding,' in Network Coding: Fundamentals and Applications , M. M´ edard and A. Sprintson, Eds. Elsevier Science Publishers, 2012, ch. 1, pp. 1-37. - [3] P. Delsarte, 'Bilinear forms over a finite field, with applications to coding theory,' Journal of Combinatorial Theory, Series A , vol. 25, pp. 226-241, 1978. - [4] E. M. Gabidulin, 'Theory of codes with maximum rank distance,' Problems of Information Transmission , vol. 21, no. 1, pp. 1-12, 1985. - [5] R. M. Roth, 'Maximum-rank array codes and their application to crisscross error correction,' IEEE Transactions on Information Theory , vol. 37, no. 2, pp. 328-336, Mar. 1991, comments by Emst M. Gabidulin and Author's Reply, ibid. 38(3):1183, 1992. - [6] T. Etzion and N. Silberstein, 'Error-correcting codes in projective spaces via rank-metric codes and Ferrers diagrams,' IEEE Transactions on Information Theory , vol. 55, no. 7, pp. 29092919, Jul. 2009. - [7] --, 'Codes and designs related to lifted mrd codes,' IEEE Transactions on Information Theory , vol. 59, no. 2, pp. 10041017, Feb. 2013. - [8] A. Kohnert and S. Kurz, 'Construction of large constant dimension codes with a prescribed minimum distance,' in Mathematical Methods in Computer Science. Essays in Memory of Thomas Beth , ser. Lecture Notes in Computer Science, J. Calmet, W. Geiselmann, and J. M¨ uller-Quade, Eds., no. 5393. Springer-Verlag, 2008, pp. 31-42. - [9] T. Etzion and A. Vardy, 'Error-correcting codes in projective space,' IEEE Transactions on Information Theory , vol. 57, no. 2, pp. 1165-1173, Feb. 2011. - [10] M. Braun and J. Reichelt, ' q -analogs of packing designs,' Journal of Combinatorial Designs , vol. 22, no. 7, pp. 306-321, Jul. 2014, preprint arXiv:1212.4614 [math.CO]. - [11] A. Beutelspacher, 'Partial spreads in finite projective spaces and partial designs,' Mathematische Zeitschrift , vol. 145, pp. 211230, 1975, corrigendum, ibid. 147:303, 1976. - [12] T. Honold, M. Kiermaier, and S. Kurz, 'Optimal binary subspace codes of length 6, constant dimension 3 and minimum distance 4,' Nov. 2013, accepted for publication in the Proceedings of the 11th International Conference on Finite Fields and their Applications (Magdeburg, July 22-26, 2013). Preprint arXiv:1311.0464 [math.CO]. - [13] M. Braun, T. Etzion, P. R. J. ¨ sterg ˚ rd, O a A. Vardy, and A. Wassermann, 'Existence of q -analogs of Steiner systems,' Apr. 2013, preprint arXiv:1304.1462 [math.CO]. - [14] P. Dembowski, Finite Geometries . Springer-Verlag, 1968, classics in Mathematics Series, 1997. - [15] J. W. P. Hirschfeld, Projective Geometries over Finite Fields , 2nd ed. Oxford University Press, 1998. - [16] J. D. Beule and L. Storme, Eds., Current Research Topics in Galois Geometry . Nova Science Publishers, 2011. - [17] S. Thomas, 'Designs over finite fields,' Geometriae Dedicata , vol. 24, pp. 237-242, 1987. - [18] M. Kiermaier and M. O. Pavˇ cevi´, 'Intersection c numbers for subspace designs,' may 2014, journal of Combinatorial Designs, accepted for publication. - [19] D. Silva, F. Kschischang, and R. Koetter, 'A rank-metric approach to error control in random network coding,' IEEE Transactions on Information Theory , vol. 54, no. 9, pp. 39513967, Sep. 2008. - [20] A.-L. Trautmann and J. Rosenthal, 'New improvements on the Echelon-Ferrers construction,' in Proceedings of the 19th International Symposium on Mathematical Theory of Networks and Systems (MTNS 2010) , A. Edelmayer, Ed., Budapest, Hungary, 5-9 July 2010, pp. 405-408, reprint arXiv:1110.2417 [cs.IT]. - [21] D. M. Mesner, 'Sets of disjoint lines in PG(3 , q ),' Canadian Journal of Mathematics , vol. 19, pp. 273-280, 1967.
null
[ "Haiteng Liu", "Thomas Honold" ]
2014-08-06T04:33:27+00:00
2014-08-06T04:33:27+00:00
[ "math.CO", "94B05, 05B25, 51E20, 51E23 (Primary), 51E05 (Secondary)" ]
A New Approach to the Main Problem of Subspace Coding
Subspace codes form the appropriate mathematical setting for investigating the Koetter-Kschischang model of fault-tolerant network coding. The Main Problem of Subspace Coding asks for the determination of a subspace code of maximum size (proportional to the transmission rate) if the remaining parameters are kept fixed. We describe a new approach to finding good subspace codes, which surpasses the known size limit of lifted MRD codes and is capable of yielding an alternative construction of the currently best known binary subspace code of packet length 7, constant dimension 3 and minimum subspace distance 4.
1408.1182v2
## Empirical non-parametric estimation of the Fisher Information Visar Berisha ∗ and Alfred O. Hero † ## Abstract The Fisher information matrix (FIM) is a foundational concept in statistical signal processing. The FIM depends on the probability distribution, assumed to belong to a smooth parametric family. Traditional approaches to estimating the FIM require estimating the probability distribution function (PDF), or its parameters, along with its gradient or Hessian. However, in many practical situations the PDF of the data is not known but the statistician has access to an observation sample for any parameter value. Here we propose a method of estimating the FIM directly from sampled data that does not require knowledge of the underlying PDF. The method is based on non-parametric estimation of an f -divergence over a local neighborhood of the parameter space and a relation between curvature of the f -divergence and the FIM. Thus we obtain an empirical estimator of the FIM that does not require density estimation and is asymptotically consistent. We empirically evaluate the validity of our approach using two experiments. ## 1 Introduction The Fisher information matrix (FIM) is an important quantity in signal processing and statistical estimation. It can be used to benchmark the performance of an estimator (via the Cram´r-Rao Lower Bound (CRLB)) [1], design an optie mal experiment to maximize the trace or determinant of the FIM [2], or develop super-efficient estimators [3]. The FIM can be computed as the covariance matrix of the gradient of the log likelihood function (the score function). However, the statistical model is often unknown or the covariance computation may be intractable to manipulate. In some cases one has access to a generative model, a black box that can generate multiple realizations from a distribution for various ∗ V. Berisha is with the School of Electrical, Computer, and Energy Engineering and the Department of Speech and Hearing Science, Arizona State University, e-mail: [email protected]. This author gratefully acknowledges partial support of this work by ONR grant N000141410722. † A. Hero is with the Department of Electrical Engineering and Computer Science, University of Michigan, e-mail: [email protected]. This author gratefully acknowledges partial support of this work by ARO grant W911NF-11-1-0391 and NSF grant CCF-1217880. settings of its parameters, e.g., when one can generate data from a controlled experiment with accessible and tunable operating parameters [4, 5, 6]. In such cases it makes sense to try and compute the FIM empirically from multiple perturbed experiments. This is the case addressed here. The first approach that might come to mind would be to perform nonparametric density estimation for each of the perturbed experiments and then compute a numerical gradient of the log density followed by sample averaging. Another, related, approach would be to estimate an f -divergence measure between the estimated densities and use the relation between the f -divergence and the FIM through its second variational term in the Taylor expansion. However, these density estimate-and-plug strategies are not the most natural approaches. Indeed it seems ill-advised to approach the problem of estimation of a finite dimensional quantity, e.g. the elements of the FIM, by first generating an estimate of an infinite dimensional quantity, e.g., the density function. Here we introduce a more direct way of estimating the FIM that estimates the f -divergence measure directly from the data, and does not require density estimation. We empirically evaluate this procedure on two experiments: (1) comparing the nonparametric estimate of the FIM to an estimate based on a closed-form expression for the FIM in a setting where the closed-form expression is available; and (2) using the FIM as a proxy for the difficulty of an estimation problem (based on its relationship with the CRLB) using data from a cochlear implant simulator. ## 2 A Non-Parametric f -Divergence Given two probability density functions p and q with domain I R K and a parameter α ∈ (0 . . . 1), let us consider the following divergence between the two distributions: $$\text{stributions} \cdot \cdot \cdot \\ D _ { \alpha } ( p, q ) = \frac { 1 } { 4 \alpha ( 1 - \alpha ) } \left [ \int \frac { ( \alpha p ( x ) - ( 1 - \alpha ) q ( x ) ) ^ { 2 } } { \alpha p ( x ) + ( 1 - \alpha ) q ( x ) } d x - ( 2 \alpha - 1 ) ^ { 2 } \right ] \quad \ \ ( 1 ) \\ \text{$1$} \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \, \cdot \colon \colon$$ The divergence measure in (1) belongs to the class of f -divergences or AliSilvey distances [7]. Intuitively, an f -divergence is an average of the ratio of two distributions, weighted by some function f ( ): t D f ( p, q ) = ∫ f ( p ( x ) q ( x ) ) q ( x ) d x . Many common divergences used in statistical signal processing fall in this category, including the KL-divergence, the Hellinger distance, the total variation distance, etc. [7]. For D α ( p, q ), the corresponding function f ( ) is, t $$\Gamma _ { \alpha }, \epsilon _ { 1 } ( 1 ) \cdot \Gamma _ { \alpha } \, \nu _ { \alpha } \, \varphi, \varphi _ { 1 }, \, \text{inc} \, \text{compounding} \, \text{union} \, J \, \vee \, \infty, \\ f ( t ) & = \frac { 1 } { 4 \alpha ( 1 - \alpha ) } \left [ \frac { ( \alpha t - ( 1 - \alpha ) ) ^ { 2 } } { \alpha t + ( 1 - \alpha ) } - ( 2 \alpha - 1 ) ^ { 2 } \right ]. \quad \quad ( 2 ) \\. \quad \, \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdot \tilde { \nu } \cdots$$ Furthermore, f ( ) is defined for all t t &gt; 0, is convex, and f (1) = 0, consistent with the requirements of the definition of an f -divergence [7]. Indeed, for the special case of α = 1 2 , the divergence in (1) becomes the symmetric χ 2 f -divergence in [8] and is similar to the Rukhin f -divergence in [9]. The divergence in (1) has the remarkable property that it can be estimated directly without estimation or plug-in of the densities p and q based on an extension of the Friedman-Rafsky (FR) multi-variate two sample test statistic [10]. Let us consider sample realizations from p and q , denoted by X p ∈ I R N p × K , X q ∈ I R N q × K , and α = N p N p + N q . The FR test statistic, C ( X p , X q ), is constructed by first generating a Euclidean minimal spanning tree (MST) on the concatenated data set, X p ∪ X q , and then counting the number of edges connecting a data point from p to a data point from q . The test assumes a unique MST for X p ∪ X q -therefore all inter point distances between data points must be distinct. However, this assumption is not restrictive since the MST is unique with probability one when p and q are Lebesgue continuous densities. Henze and Penrose proved the following theorem related to this test statistic [11]: Theorem 1. As N p →∞ and N q →∞ in a linked manner such that N p N p + N q → α , $$\frac { \mathcal { C } ( \mathbf X _ { p }, \mathbf X _ { q } ) } { N _ { p } + N _ { q } } \to A _ { \alpha } ( p, q ) \ a l m o s t \ s u r e l y,$$ where A α ( p, q ) = 2 α (1 -α ) ∫ p ( x ) q ( x ) αp ( x )+(1 -α q ) ( x ) d x . Combining the results of Theorem 1 with the definition of the divergence function in (1) we see that $$D _ { \alpha } ( p, q ) = 1 - \frac { A _ { \alpha } ( p, q ) } { 2 \alpha ( 1 - \alpha ) }. \quad \quad \quad ( 3 ) \\. \quad \dots \quad. \quad. \quad. \quad.$$ Further, under the same conditions as those in Theorem 1, $$1 - \mathcal { C } ( \mathbf X _ { p }, \mathbf X _ { q } ) \frac { N _ { p } + N _ { q } } { 2 N _ { p } N _ { q } } \to D _ { \alpha } ( p, q ).$$ It is important to note that the parameter α does not directly appear in (4) but rather is controlled by the ratio of samples from p ( x ) to the total number of samples - it is interpreted as a prior probability that a sample comes from p . The left side of (4) specifies an empirical estimator of the f -divergence in (1) that does not require estimation of the densities p and q . We use this fact to derive a non-parametric estimator of the Fisher Information directly from data. ## 3 FIM Estimation Let the densities p and q with domain I R K be parameterized by a multidimensional parameter θ with domain I R d and consider the case where q is a directional perturbation of p about some particular value of θ : $$q = p _ { \theta + \mathbf u },$$ where θ + u is a small perturbation around θ . Amari and Cichocki showed that any f -divergence induces a unique information monotonic Riemannian metric, given by the d × d Fisher information matrix, F θ = E θ [ ∇ p θ ∇ p T θ ] (Thm. 5 in [12]). The FIM is a symmetric positive semidefinite definite matrix with d d ( +2) 2 distinct entries. / Using the Taylor expansion they show that any f -divergence, D f ( p θ , p θ + u ), is related to the FIM through the asymptotic relation $$D _ { f } ( p _ { \theta }, p _ { \theta + \mathbf u } ) = \frac { 1 } { 2 } \mathbf u ^ { T } \mathbf F _ { \theta } \mathbf u + o ( | | \mathbf u | | ^ { 2 } ).$$ Combining this relationship with the non-parametric f -divergence from the previous section, we define $$Q _ { p q } = 2 D _ { \alpha } ( p, q ) \approx \mathfrak { u } ^ { T } \mathbf F _ { \theta } \mathbf u,$$ where the approximation on the right is accurate when ‖ u ‖ is small. This relation is the basis for the proposed FIM estimator: we can estimate D α using the FR runs statistic computed using the datasets from p = p θ and q = p θ + u for various perturbations u on θ , then solve for F θ . /negationslash The above is the key relation that allows one to estimate F θ directly from the data. In particular, assume that the experimenter can generate a data set X 01 , . . . X 0 N p from the reference density p θ and M other data sets X k 1 , . . . X kN q , k = 1 , . . . , M , from perturbed densities p θ + u 1 , . . . , p θ + u M , where u i = u j , i = . j Furthermore, assume that the experimenter has full control of u and that M is at least equal to d d ( +1) 2, where / d is the dimension of the parameter space. Let Q = [ Q , . . . , Q 1 M T ] be the M different values of Q pq that are computed from the FR runs statistic applied to the pairs of datasets { X 0 i } N p i =1 ∪{ X ki } N q i =1 , k = 1 , . . . , M . /negationslash To solve for F θ in (7), we vectorize F θ by including the distinct lower triangular values of the FIM and convert the equation in (7) to a linear function of this quantity. A least squares estimator of F θ can then be easily constructed. Define the d d ( + 1) / 2 element vector of direction component pairs [ u 2 11 , . . . , u 2 1 d , 2 u 11 u 12 , . . . , 2 u 1( d -1) u 1 d ], and likewise for the other M -1 directions u 2 , . . . , u M . Concatenate all of these direction component pair vectors in the M × d d ( +1) 2 matrix / U . Define the d d ( +1) 2 element FIM vector: / $$\mathbf F _ { \text{vec} } = \left [ F _ { 1 1 }, \dots, F _ { d d }, F _ { 1 2 }, \dots, F _ { d ( d - 1 ) } \right ] ^ { \text{T} }$$ This formulation allows us to write (7) as Q ≈ UF vec and to solve for F vec using the least squares estimator given by: ̂ F vec = ( U U T ) -1 U Q T , (9) where Q is the M × 1 vector defined above. This approach, however, does not ensure that the resulting estimate is positive semidefinite (PSD). We propose an alternate estimator that further constrains the problem by ensuring the solution is PSD. For a given parameter, θ , an alternative estimator can be defined for estimating the corresponding FIM. Specifically, we can perturb the individual components of θ independently to iteratively reconstruct the diagonal FIM values, ̂ F ii , using a least squares procedure. This results in an estimate of the first d components of F vec and provides an additional set of constraints with which to further regularize the full FIM reconstruction. To estimate the full FIM, we propose the following semi-definite program: $$\minimize _ { F _ { v e c } } \left | \left | U F _ { v e c } - Q \right | \right | ^ { 2 } \\ \text{subject to } \text{$F_{vec}(i)=\widehat{F}_{ii}$, $i\in 1\dotsd$,} \\ \text{mat} ( F _ { v e c } ) \succeq 0$,} \\ \text{nat} ( ) \text{ operator converts the vectorized FIM to a full matrix represen-}$$ where the mat() operator converts the vectorized FIM to a full matrix representation. This formulation aims to minimize the /lscript 2 prediction error with respect to the vectorized FIM, subject to the constraint that the diagonal values are the same as those estimated individually and that the full FIM is PSD. This formulation is motivated by Boyd's constrained least squares covariance estimation algorithm in [13]. In principle the pertubation parameter, u , could be selected according to an optimal design criterion, e.g., minimize an empirical estimate of the FIM estimation error. However, any set of u i 's that make the matrix U of rank d d ( +1) 2 will lead to an asymptotically consistent FIM estimator as / N ,N p q → ∞ and ‖ u i ‖→ 0, i = 1 , . . . , M . In the sequel, we select the perturbations randomly over a small radius ball in I R d . ## 4 Results In this section we validate the proposed procedure. In the first experiment, we estimate the mean square error (MSE), as measured by the squared Frobenius norm of the estimator error, of the FIM estimator for different data dimensions. In the second experiment, we empirically analyze a complicated signal processing chain for which it becomes impossible to derive an analytical relation between parameters and observations. We analyze a cochlear implant (CI) simulator similar to the one in [14]. Through the relationship between the CRLB and the FIM, we empirically estimate the minimum variance of the best unbiased estimator of the signal energy at different frequency components in the input speech signal (parameters, θ ), given only current levels of the different electrodes. This is the problem that CI patients must solve - given electrode stimulation, resolve the input speech. Here we assume an equal number of samples from p and q , therefore α = 1 2 implicitly. / Empirical FIM Estimation: The objective of this experiment is to compare estimates of the FIM using the method proposed here with the closed form solution for Gaussian data. Let us consider a Gaussian distribution parameterized by the mean µ θ ( ) = θ and unity covariance. We aim to estimate the FIM at θ = 0 , F 0 , for different data dimension. Let us denote a K -dimensional Gaussian PDF with mean 0 K × 1 and covariance σ 2 I K × K by p 0 ,σ 2 I ( x ), where I is the identity matrix and 0 is the zero vector. We perturb this distribution by u about θ = 0 and denote the resulting PDF by p u ,σ 2 I ( x ), where u ∼ N (0 , σ 2 u ). For this experiment, the closed form estimate of the FIM is known (given by the identity matrix, I K × K , since Figure 1: (a) MSE of the FIM estimate for the proposed D 1 2 -based estimator (b) The MSE difference between the two estimators in (a). The benchmark is an oracle estimator that knows that the distribution is multivariate Gaussian. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1182v2-figure-35e7c170-e156-499d-9c8c-3c0746f9c999.jpg) σ 2 = 1). It is important to note that for this scenario, d = K since the distribution is parameterized by the mean. We estimate the FIM from empirical data using the algorithm proposed here and evaluate the FIM MSE. In particular, we draw N = 1000 points from both p 0 ,σ 2 I ( x ) and p u ,σ 2 I ( x ) and estimate the f -divergence for multiple values of u ( σ 2 u = 0 05) for different values of . K ranging from 4 to 14. Note that this corresponds to α = 1 2 and / N p = N q = N in (3) and (4). For each dimension, we perform M = 50 K K ( + 1) / 2 random perturbations. From this set of parameters, we use the least squares estimator in 3 to obtain an estimate of the FIM. For this problem the FIM is σ -2 I d × d . In Fig. 4 (a), we plot the MSE between the proposed estimator of the FIM and the true FIM as a function of dimension. The MSE estimate shown in Fig. 1 is the result of averaging over 25 Monte Carlo simulations and for every run we use a different realization of u . Because we use a large value of M (50 times more samples than the minimum required), the estimate is stable from iteration to iteration. This allows us to use a smaller number of Monte Carlo iterations for estimating the MSE. The benchmark against which we compare is an oracle estimate of the FIM that assumes that we know that the distribution is multivariate Guassian but do not know its covariance: we estimate our benchmark FIM by inverting the sample covariance estimator and refer to it as the 'sample FIM estimate'. We see that the error between the two estimators is comparable, though the sample FIM has a lower MSE given the additional information. Interestingly, this error decreases for higher dimensions since, for the same level of perturbation, it becomes easier to reliably estimate D 1 ( p, q ) from data. 2 In Fig. 4 we plot the MSE difference between the D 1 2 -based estimator and the sample estimator as the sample size increases. We fix the dimension to K = 20 and use the same perturbation variance, σ 2 u = 0 05. . As expected, the sample FIM starts with a lower MSE due its access to the additional side information that the distribution is Gaussian, however the difference between the two estimators decreases as the sample size increases. The proposed estimator performs almost as well as the oracle estimator even though it does not have access to this side information. Estimating the CRLB in a Complex System: Beyond estimating the Fisher Information itself, we can use the non-parametric divergence to characterize the difficulty of an estimation problem. It is well known that the FIM Figure 2: The cochlear implant signal processing chain. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1182v2-figure-f47493bf-07c0-4841-87e0-a1e9bf040ab8.jpg) can be used to benchmark the performance of an estimator (via the CRLB). If ̂ θ is an unbiased estimator of θ , then the inverse FIM lower bounds the covariance matrix of the estimator by cov( ̂ θ ) ≥ F -1 θ . The CRLB is known in closed form for certain distributions; however, for complex signal processing systems, it becomes impossible to characterize the CRLB for a specific parameter unless simplifying assumptions are made. We consider a signal processing simulator for a 16-electrode cochlear implant device. CI's provide hearing in patients with damage to sensory hair cells by stimulating the 16 electrodes with appropriate energy. In a CI, a microphone picks up audio from the environment, a speech processor decomposes the speech in sub-bands and identifies the appropriate amount of current with which to stimulate each of the electrodes, and stimulates the electrode array. We have implemented a CI simulator in Matlab, similar to the Simulink simulator by Loizou in [14] (see Fig. 2). This speech processor includes linear (filtering) and non-linear (rectification, intensity compression) operations. The input of the processor is the spectrum of the speech signal ( θ ) and the output of the simulator ( x ) represents the current level (in amp` eres) measured at the 16 output electrodes. Here, we are interested in characterizing the bound on estimator variance for the amplitude spectrum of the speech signal when we observe the electrode current level. We evaluate the algorithm on the TIMIT corpus - a phonemically balanced database that spans multiple speakers and multiple regional dialects in the US [15]. We sample 100 sentences from this database, resample to 8 kHz, normalize the average energy to a fixed value, and estimate the FIM as in Sec. 3. We first process each speech signal through the CI simulator. The simulator analyzes each input speech signal using a 10ms frame size (with 80% overlap) and estimates the current level at each of the 16 electrodes per frame. If the total number of frames is N , this results in a data matrix of N × 16. We denote this matrix by X θ . For a given frequency component, we perturb this parameter by a small value u by simply adding a sinusoid of appropriate energy to the original speech. We then process the resulting audio through the CI simulator to generate a new data matrix, X θ + u . In this simulation, rather than estimating the FIM in a single step, we restrict ourselves to the diagonal components of the FIM. We sweep through the frequency spectrum by iteratively perturbing the spectrum of the original speech signal and generating a new data set for each perturbation (through the CI simulator) then iteratively estimate the diagonal components of this matrix one at a time. For every speech signal, at every frequency we perform M = 10 perturbations with u drawn from a normal distribution of mean 3.5 and variance 1. In Fig. 3 (top), we plot the average divergence as a function of frequency Figure 3: (Top) D 1 2 as a function of frequency (Bottom) The average speech spectrum and the empirically-estimated CRLB ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1182v2-figure-243e2029-a7a3-401e-af0b-6cb2ea6b596b.jpg) from 150 Hz to 3.6 kHz. As the figure shows, there is a general increasing trend in the plot. This makes sense intuitively as the average speech spectrum contains more signal energy at low frequencies. The 16 peaks and troughs of the divergence measure are also consistent with the filter bank used in the simulator. In Fig. 3 (bottom), we plot the square root of the estimated CRLB over the average frequency spectrum. As the figure shows, the amplitude and the standard deviation (SD) of the estimator are often of the same order. Indeed, for a number of frequencies, the SD is greater than the mean indicating that, at those frequencies, even the best estimator will have difficulty identifying significant differences between the true signal energy and no energy. This is consistent with the poor fidelity speech in real CIs [16]. In addition to calculating the diagonal CRLB for the TIMIT database, we also compare the difficulty of estimating specific vowels by calculating the full CRLB matrix for each vowel. We use the vowels from male speaker 'm01' in the Hillenbrand data set [17]. As before, we resample the data to 8 kHz, normalize the average energy to a fixed value, and perform the experiment as in Sec. 3. To manage computational complexity, rather than estimating the full FIM associated with all input frequencies, we reconstruct the 16 × 16 sub-matrix associated with the center frequencies of the auditory filter bank in Fig. 2. We justify this by noting that the CI model is most sensitive at these center frequencies (see peaks in Fig. 3 (top)); this sub-matrix acts as a best-case estimation bound. For each vowel, every component of u is drawn from a normal distribution of mean 3.5, variance 1 for and a total of M = 10 d d ( +1) 2 = 1360 / perturbations per FIM estimate. We estimate F θ using the D 1 / 2 -based estimator in Sec. 3 and we invert to calculate the CRLB, C θ = F -1 θ . Prior to inverting, we use the Bayesian-based diagonal loading procedure by Haff for regularization [18]. For each vowel, we compute the volume of the CRLB matrix, weighted by a perceptual weight- Figure 4: The CRLB volume for each of the 11 vowels in [17]. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1182v2-figure-28d1cd2c-6bd4-4479-ab25-f064ac0e439d.jpg) ing filter giving more weight to bands that contain more signal energy. The weighting matrix, W , is a diagonal matrix with the components given by the signal energy at the location of the 16 frequencies associated with θ . Perceptual weighting of frequency bands by signal energy is common in many speech applications [19, 20]. The volume of the weighted CRLB matrix is given by Vol = log(det( VDWV T )), where C θ = VDV T is the SVD of C θ . This serves as a proxy for the uncertainty associated with estimating the spectrum of the speech signal from only the current at the electrodes. It is expected that vowels with a small volume will be more intelligible than vowels with a large volume by CI patients. In Fig. 4 we plot the CRLB volume for the vowels in the study. Asimilar behavioral study was conducted by Dorman et. al in [21]. Using the same dataset, the authors encode the vowels with a simulated CI and conduct an intelligibility assessment task where they ask participants to correctly identify the encoded vowels. As in Fig. 4, Dorman shows that there are two vowels that prove to be difficult for the listeners, /ah/ as in 'hod' (43% correct classification rate) and /ae/ as in 'had' (68% correct classification rate) (Table II in [21]). Overall, correlating the average CRLB volumes in Fig. 4 with the intelligibility values reveals a correlation coefficient of -0.801. ## 5 Conclusion In this paper we have proposed a new data-driven approach for estimating the Fisher information by exploiting the relationship between the FIM and the family of f -divergence measures. The estimator relies on multiple perturbations of a signal model followed by a semidefinite program that reconstructs the FIM. We test the algorithm by evaluating its ability to reconstruct the FIM for a signal model with analytical ground truth FIM. In addition, we showed that we can predict the difficulty of resolving different speech samples processed through a CI by comparing intelligibility values estimated through behavioral experiments with the volume of the CRLB. Future work will analyze the asymptotic properties of this estimator and discretization bias. This would allow us to better understand the approximation error as a function of the underlying density and could serve as a starting point for developing theory for selecting parameter perturbations. ## References - [1] H. Cram´ er, 'A contribution to the theory of statistical estimation,' Scandinavian Actuarial Journal , vol. 1946, no. 1, pp. 85-94, 1946. - [2] V. V. Fedorov, Theory of optimal experiments . Elsevier, 1972. - [3] L. M. Le Cam, On some asymptotic properties of maximum likelihood estimates and related Bayes' estimates . University of California press, 1953, vol. 1, no. 11. - [4] L. Gilbertson and R. A. Lutfi, 'Correlations of decision weights and cognitive function for the masked discrimination of vowels by young and old adults,' Hearing research , 2014. - [5] S. Nelander, W. Wang, B. Nilsson, Q.-B. She, C. Pratilas, N. Rosen, P. Gennemark, and C. Sander, 'Models from experiments: combinatorial drug perturbations of cancer cells,' Molecular systems biology , vol. 4, no. 1, 2008. - [6] R. C. Jansen, 'Studying complex biological systems using multifactorial perturbation,' Nature Reviews Genetics , vol. 4, no. 2, pp. 145-151, 2003. - [7] I. Csisz´r and P. C. Shields, 'Information theory and statistics: A tutorial,' a Communications and Information Theory , vol. 1, no. 4, pp. 417-528, 2004. - [8] S.-H. Cha, 'Comprehensive survey on distance/similarity measures between probability density functions,' City , vol. 1, no. 2, p. 1, 2007. - [9] A. Rukhin, 'Optimal estimator for the mixture parameter by the method of moments and information affinity,' in Trans. 12th Prague Conference on Information Theory , 1994, pp. 214-219. - [10] J. H. Friedman and L. C. Rafsky, 'Multivariate generalizations of the waldwolfowitz and smirnov two-sample tests,' The Annals of Statistics , pp. 697-717, 1979. - [11] N. Henze and M. D. Penrose, 'On the multivariate runs test,' Annals of statistics , pp. 290-298, 1999. - [12] S.-I. Amari and A. Cichocki, 'Information geometry of divergence functions,' Bulletin of the Polish Academy of Sciences: Technical Sciences , vol. 58, no. 1, pp. 183-195, 2010. - [13] S. Boyd and L. Xiao, 'Least-squares covariance matrix adjustment,' SIAM Journal on Matrix Analysis and Applications , vol. 27, no. 2, pp. 532-546, 2005. - [14] Mathworks, 'Cochlear implant speech processor,' 2014. - [15] W. M. Fisher, G. R. Doddington, and K. M. Goudie-Marshall, 'The darpa speech recognition research database: specifications and status,' in Proc. DARPA Workshop on speech recognition , 1986, pp. 93-99. - [16] P. C. Loizou, 'Mimicking the human ear,' Signal Processing Magazine, IEEE , vol. 15, no. 5, pp. 101-130, 1998. - [17] J. Hillenbrand, L. A. Getty, M. J. Clark, and K. Wheeler, 'Acoustic characteristics of american english vowels,' The Journal of the Acoustical society of America , vol. 97, no. 5, pp. 3099-3111, 1995. - [18] L. Haff, 'Empirical bayes estimation of the multivariate normal covariance matrix,' The Annals of Statistics , pp. 586-597, 1980. - [19] R. M. Udrea, N. D. Vizireanu, and S. Ciochina, 'An improved spectral subtraction method for speech enhancement using a perceptual weighting filter,' Digital Signal Processing , vol. 18, no. 4, pp. 581-587, 2008. - [20] M. Mauc and W. Navarro, 'Analysis-by-synthesis speech coding method with truncation of the impulse response of a perceptual weighting filter,' Oct. 5 1999, uS Patent 5,963,898. - [21] P. C. Loizou, M. F. Dorman, and V. Powell, 'The recognition of vowels produced by men, women, boys, and girls by cochlear implant patients using a six-channel cis processor,' The Journal of the Acoustical Society of America , vol. 103, no. 2, pp. 1141-1149, 1998.
10.1109/LSP.2014.2378514
[ "Visar Berisha", "Alfred O. Hero" ]
2014-08-06T04:35:58+00:00
2014-11-16T22:32:29+00:00
[ "stat.CO", "cs.IT", "math.IT", "stat.ML" ]
Empirical non-parametric estimation of the Fisher Information
The Fisher information matrix (FIM) is a foundational concept in statistical signal processing. The FIM depends on the probability distribution, assumed to belong to a smooth parametric family. Traditional approaches to estimating the FIM require estimating the probability distribution function (PDF), or its parameters, along with its gradient or Hessian. However, in many practical situations the PDF of the data is not known but the statistician has access to an observation sample for any parameter value. Here we propose a method of estimating the FIM directly from sampled data that does not require knowledge of the underlying PDF. The method is based on non-parametric estimation of an $f$-divergence over a local neighborhood of the parameter space and a relation between curvature of the $f$-divergence and the FIM. Thus we obtain an empirical estimator of the FIM that does not require density estimation and is asymptotically consistent. We empirically evaluate the validity of our approach using two experiments.
1408.1183v1
## Network Robustness: Detecting Topological Quantum Phases Chung-Pin Chou Beijing Computational Science Research Center, Beijing 100084, China Can the topology of a network that consists of many particles interacting with each other change in complexity when a phase transition occurs? The answer to this question is particularly interesting to understand the nature of phase transitions if the distinct phases do not break any symmetry, such as topological phase transitions. Here we present a novel theoretical framework established by complex network analysis for demonstrating that across a transition point of the topological superconductors, the network space experiences a homogeneousheterogeneous transition invisible in real space. This transition is nothing but related to the robustness of a network to random failures. We suggest that the idea of the network robustness can be applied to characterizing various phase transitions whether or not the symmetry is broken. PACS numbers: 64.60.aq, 74.20.Rp, 75.10.Pq Phases of matter can be distinguished by using Landau's approach, which characterizes phases in terms of underlying symmetries that are spontaneously broken. The information we need to understand phase transitions is usually encoded in appropriate correlation functions, e.g. the correlation length would diverge close to a quantum critical point. Particularly, the low-lying excitations and the long-distance behavior of the correlations near the critical phase are believed to be well described by quantum field theory. A major problem is, however, that in some cases it is unclear how to extract important information from the correlation functions if these phases do not break any symmetries, such as topological phase transitions [1-4]. Complex network theory has become one of the most powerful frameworks for understanding network structures of many real-world systems [5-9]. According to graph theory, the elements of a system often are called nodes and the relationships between them, which a weight is associated with, are called links. Decades ago, this unnoticed idea constructing a weighted network from condensed matters had been proposed in quantum Hall systems [10]. In the language of network analysis, therefore, each network of N nodes can be described by the N × N adjacency matrix ˆ A . In what follows, we consider lattice sites as the nodes of the weighted network of which each weighted link between nodes i and j is expressed by the element of the adjacency matrix ˆ A ij . In Fig.1(a), we start from a square-lattice example of size N = 9 in which the nodes form a simple regular network. Following the procedure [Fig.1(b) and (c)], we then reconnect them by using some correlation functions as weights of network links to generate a complete network with the link-weight distribution (see Fig.1(d)). The links now carry the weights containing information about important relationship between particles in many-body systems. In this letter, focusing on the topological superconductors in one (1D) and two (2D) dimensions [11, 12], we explore the possibilities of detecting the topological phase transitions by using the novel network analysis. Our analysis reveals that (i) a homogeneous-heterogeneous transition occurs in network space from a topologically trivial phase to a topologically nontrivial phase, which is accompanied by a hidden symmetry breaking (namely, a reduction of the network robustness), and (ii) the complex many-body network analysis can be applied to other phase transitions without a prior knowledge of the system's symmetry. 1D p -wave superconductor. -The first model we consider was introduced by Kitaev [11]. The Hamiltonian for L spinless fermions in a chain with periodic boundary conditions is $$\stackrel { e _ { - } } { \varkappa } H _ { 1 D } = - \sum _ { i } \left ( \hat { c } _ { i } ^ { \dagger } \hat { c } _ { i + 1 } + \hat { c } _ { i } ^ { \dagger } \hat { c } _ { i + 1 } ^ { \dagger } + H. c. \right ) + \mu \hat { c } _ { i } ^ { \dagger } \hat { c } _ { i }, \quad ( 1 )$$ where µ is chemical potential. The simplest superconducting (SC) model system shows the two-fold ground-state degeneracy stemming from an unpaired Majorana fermion at the end of the chain with open boundary conditions. This model has two phases sharing the same physical symmetries: a topologically trivial (strong pairing) phase for µ &gt; µ c ( = 2 ) and a topologically non-trivial (weak pairing) phase for µ &lt; µ c . FIG. 1: An example of the construction of complex many-body networks: (a) The system is a 3 × 3 square lattice with periodic boundary conditions; (b) The system is replotted based on the same topology as (a); (c) All links are removed from (b); (d) All nodes are reconnected by using some correlations between particles. The thickness of links denotes the magnitude of the correlation. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1183v1-figure-46299dba-2705-42c1-82d0-7e35223d8637.jpg) The transition between them is the topological phase transition identified by the presence or absence of unpaired Majorana fermions localized at each end. The Hamiltonian in momentum space is quadratic of fermionic operators ˆ c k , given by $$\sum _ { k } \left ( \begin{array} { c } \hat { c } _ { k } ^ { \dagger } & \hat { c } _ { - k } \end{array} \right ) \left ( \begin{array} { c } \epsilon _ { k } & - i \sin { k } \\ i \sin { k } & - \epsilon _ { k } \end{array} \right ) \left ( \begin{array} { c } \hat { c } _ { k } \\ \hat { c } _ { - k } ^ { \dagger } \end{array} \right ), \quad ( 2 )$$ where glyph[epsilon1] k = -µ 2 -cos k . By using the standard Bogoliubov transformation, γ k = cos ( θ k / 2)ˆ c k -i sin ( θ k / 2)ˆ c † -k where tan θ k = sin k /glyph[epsilon1] k , the Hamiltonian can be diagonalized. The excitation spectrum of the form, E k = √ (2 glyph[epsilon1] k ) 2 +sin 2 k , remains fully gapped except at the critical point µ c . The SC ground state is the state annihilated by all γ k : $$| \Psi _ { G S } \rangle = e ^ { \frac { 1 } { 2 } \sum _ { i, j } G _ { i j } \hat { c } _ { i } ^ { \dagger } \hat { c } _ { j } ^ { \dagger } } | 0 \rangle, \quad \quad ( 3 ) \quad \text{fig}$$ where G ij represents the pairing amplitude given by [13] $$G _ { i j } = \frac { 1 } { L } \sum _ { \mathbf k } \tan { ( \theta _ { \mathbf k } / 2 ) e ^ { i \mathbf k \cdot ( \mathbf r _ { i } - \mathbf r _ { j } ) } }. \quad \quad ( 4 ) \quad \text{div} \quad \text{div} \quad \text{(} \quad \text{$n\choose a,$\dots$}.$$ Apossible choice of the adjacency matrix of the 1D superconductor is the normalized pairing amplitude in which the nonlocal property between spinless fermions is concealed. The adjacency matrix can serve as an intuitive definition for the network of spinless fermions with p -wave Cooper pairing: $$\hat { A } _ { i j } = \frac { | G _ { i j } | } { \max G _ { i j } }. \quad \quad \ \ ( 5 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ The node i or j stands for a given lattice site. The weights of links contain information about the pairing strength between spinless fermions. In Fig.2(a), one can see the change of network topologies for different µ in a short chain of L = 10 . Below µ c , the topologically non-trivial phase displays irregular patterns of the complete network, where each node is connected to all other nodes with different link weights. As increasing µ above µ c , the topologically trivial phase demonstrates a ring structure comprised of the nodes with the largest link weight in the network pond. There are only few links with the strongest weight that is called 'highways' of the network. The obvious change of topologies of the network across the critical point is intimately related to the critical behavior observed in real space. We now recall the pairing amplitude in real space shown in Eq.(4). Consider translational invariance, Figure 2(b) shows how the normalized pairing amplitude A r ≡| r i -r j | ( = ˆ A ij ) changes as the topological phase transition occurs. For µ &lt; µ c , the weak pairing phase indicates that the size of the Cooper pair is infinite, leading to A r ∼ const . At the critical point, the critical phase has power-law correlations at large distances. Above the critical point, i.e. µ &gt; µ c , the strong pairing phase instead shows that the pairing amplitude is exponentially decaying with distances: A r ∼ e -r/ξ . The Cooper pairs form molecules from two fermions bound in real FIG. 2: (a) The evolution of network topologies of the 1D p -wave superconductor from chemical potential µ = 0 2 . to 4 2 . . The chain length L = 10 . The thickness and color of links represent their weights. Color scale: Blue (Red) indicates the largest (smallest) weights. (b) Pairing amplitude A r as a function of distance r for different µ . (c) The probability distribution p w ( ) of the weights w of network links for different µ . The bin size is chosen for clear demonstrations. The chain length L = 1000 . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1183v1-figure-b43cc30b-5c5d-4008-b54b-038aded05332.jpg) space over a length scale ξ . The exponentially decaying pairing amplitude in real space results in a ring structure in network space. Similar physics would also appear in the wellknown phenomena of BEC-BCS crossover in s -wave superconductors [14]. To further analyze the network structure, we examine how the probability distribution p w ( ) of the weights w of network links evolves over contiguous topological phases. In Fig.2(c), the weights distribute like a delta function for µ &lt; µ c . Namely, the weights homogeneously distribute in network space. As further increasing µ , the distributions begin to lose weight but still remain nearly homogeneous. It is noteworthy that the distribution at the critical point possesses a decaying function with a heavy tail. Hence the weight distribution of network links becomes more heterogeneous. In the strong pairing regime ( µ &gt; µ c ), the distribution moves to almost zero weight and recovers a sharp peak at w ∼ 0 . The tail of the distribution in the strong pairing regime thus looks much more heterogeneous than the weak pairing regime. This observation reminds us of a well-known fact in realworld networks that a network with the heterogeneous weight distribution of links is robust to random failures [15, 16]. The robustness of the network originating from its heterogeneity seems to indicate a hidden symmetry in network space. More precisely, the hidden symmetry describes a phenomenon that the network function and structure remain unchanged or invariant under random removal of its links. Thus, there exists a homogeneous-heterogeneous network transition hidden in the topological phase transition. It may allow us to define a topological order parameter in network space for identifying the phase transition without any local order parameter. FIG. 3: (a) The evolution of network topologies of the 2D p +i p superconductor from chemical potential µ = -2 5 . to -6 . The lattice size N = 16 . (b) Pairing amplitude A r as a function of distance r for different µ . (c) The probability distribution p w ( ) of the weights w of network links for different µ . The lattice size N = 1600 . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1183v1-figure-dba904e0-9160-4bbd-9a82-e491275a9d45.jpg) 2D p +i p superconductor. -Consider now a 2D timereversal symmetry breaking superconductor, the p +i p superconductor for N spinless fermions: $$H _ { 2 D } = \sum _ { k } \varepsilon _ { k } \hat { c } _ { k } ^ { \dagger } \hat { c } _ { k } + \left ( \Delta _ { k } \hat { c } _ { k } ^ { \dagger } \hat { c } _ { - k } ^ { \dagger } + H. c. \right ), \quad ( 6 ) \quad \text{new} \quad \text{theor} \quad.$$ where the single-particle dispersion ε k = -2(cos k x + cos k y ) -µ and the gap function ∆ = sin k k x + sin i k y . For the spinless fermions, the gap function has odd parity symmetry, ∆ -k = -∆ k . One can see that the excitation spectrum has gapless nodes at time-reversal invariant momenta: (0 , 0) , (0 , π ) , ( π, 0) , ( π, π ) . Following the same analysis as the 1D example, the SC ground-state wave function has the same form as Eq.(3). However, the pairing amplitude G ij is now given by $$G _ { i j } = \frac { 1 } { N } \sum _ { \mathbf k } \frac { v _ { \mathbf k } } { u _ { \mathbf k } } e ^ { i \mathbf k \cdot ( \mathbf r _ { i } - \mathbf r _ { j } ) }, \quad \quad ( 7 ) \quad \text{ave} \quad \text{$i$} \\ \text{sysis}$$ where v k and u k are BCS coherence factors (More details can be found in Ref. 12). Note that the system preserves the particle-hole symmetry so that only µ ≤ 0 will be considered later. This model also has two topological distinct phases: a topologically trivial phase for µ &lt; µ c ( = -4 ) and a topologically non-trivial phase for µ &gt; µ c . Other than the 1D case, however, there is the other transition point at µ ′ c = 0 due to the bulk gap closure at ( π, 0) and (0 , π ) . We now investigate how the network analysis performs in the face of the 2D topological phase transition. The definition for the adjacency matrix ˆ A ij in the 2D superconductor is still the same as Eq.(5). The complex topologies of the weighted network for the topological trivial and non-trivial phases are shown in Fig.3(a) in a square lattice of N = 16 . The topologically non-trivial phase ( µ &gt; µ c ) gives rise to a weighted complete network with the link-weight distribution. It would be just a trivial complete network if the network were unweighted. For µ &lt; µ c , each node only has four highways to its neighbors, hence the network topology is equivalent to a torus which corresponds to a square lattice with periodic boundary conditions. As in the 1D example the difference between the strong pairing phase and the weak pairing phase can be distinguished by examining the pairing amplitude. In Figure 3(b), with µ &gt; µ c a weakly paired condensate forms from Cooper pairs loosely bound in real space, which gives A r ∼ r -1 at large distance. As for µ &lt; µ c , the pairing amplitude falls exponentially for large r , A r ∼ e -r/ξ , because the pairs of the strong pairing phase are tightly bound in real space. Thus, the exponentially decaying pairing amplitude gives rise to the torus structure in network space. Let us turn to discussing the probability distribution of the weights of network links. For µ &gt; µ c , Fig.3(c) shows that the distribution still shows a bell-like function due to powerlaw decaying pairing amplitude. Most links centering around a moderate weight behave homogeneous in network space. Similar to the 1D case, the heterogeneity of the distribution appears as further approaching µ c . For µ &lt; µ c , a majority of links lose their weights, hence, the distribution becomes much more heterogeneous and exhibits a long tail. The 2D superconductor shows much broader weight distribution of network links than the 1D case. Even so, a homogeneousheterogeneous transition is still observed in the network space. Network measures. -So far we have not introduced the topological order parameter for the topological superconductors in 1D and 2D yet. We turn our attention to two network measures that could be used in these topological quantum systems. One is the so-called small-world phenomena [17]. Many of real-world networks have the property of relatively short average path length defined by a shortest route running along the links of a network. A small-world network including not only strong clustering but also short path length has also been introduced to describe real-world networks [18]. Instead of the weighted clustering coefficient C [19] and the average path length D [20] commonly used in network analysis (see more details in the Supplemental Material [21]), a measure of the small-world property called 'small-worldness' has been recently proposed [22, 23]. It is defined as $$S \equiv \frac { C } { D },$$ which is based on the maximal tradeoff between high clustering and short path length. A network with larger S has a higher small-world level. The small-worldness seems to be appropriate to describing the universal critical properties because it can extract information about both locality (weighted clustering coefficient) and non-locality (average path length) from network space. In Fig.4(a), we illustrate the critical behavior of the smallworldness in the 1D p -wave superconductor. One can see that the small-worldness drops to zero when the 1D super- conductor comes from the topologically non-trivial phase to the topologically trivial phase. This coincidence convinces us that the network topology enables the small-worldness, akin to an order parameter in the theory of conventional phase transitions, to expose the change of nontrivial topology inherent in the weak pairing regime [23]. For the 2D p +i p superconductor, however, the small-worldness displays the notorious finite size effect for the topologically non-trivial phase as a result of its much broader weight distribution. In order to overcome this hassle, we define the normalized small-worldness as S ∗ = S/ max S µ ( ) . In Fig.4(b), near the critical point µ c the normalized small-worldness vanishes in the strong pairing regime as well. Surprisingly, the other critical point µ ′ c seems to be also characterized by a decline in the normalized small-worldness. There is an alternative way to understand the disappearance of the small-worldness in the strong pairing regime. As approaching the strong pairing phase, most links start to lose weights and the weight distribution shows more heterogeneous, thus leading to the reduction of the small-worldness. The phenomenon that most links are like slow traffic lanes results in vanishing small-worldness. In other words, the regular network of the strong pairing phase has a very small weighted clustering coefficient and much longer average path length as the system size goes to infinity. The same reasoning from the weight distribution of network links can be also applied to other many-body systems with/without local order parameters. Hence, this result strongly suggests that the smallworldness can be considered as a topological order parameter in the network space. We have to mention a point now in passing. In the network representation, there exists a hidden symmetry corresponding to a heterogeneous network with a long-tail weight distribution. The homogeneous-heterogeneous transition of the network topology observed is intimately related to the hidden symmetry breaking. The hidden symmetry is nothing but the robustness of a complex network. The heterogeneity of network links implies that a weighted network is more robust against random failures [16], accompanied by higher hidden symmetry in network space. Conversely, the homogeneity of network links means that a weighted network becomes fragile to random failures, and thus breaks the hidden symmetry. The other network measure we have to take is just to quantify the hidden symmetry. The network structure and function strongly rely on its structural robustness, i.e. the ability of a network to maintain the connectivity when a fraction of nodes or links are randomly removed. A variety of network measures have been proposed to detect the structural robustness [24-27]. Recently the concept of natural connectivity derived from the graph spectrum has been introduced to measure the structural robustness [28-30] (also see the details in the Supplemental Material [21]). We can further extend the concept of natural connectivity to the weighted network. The natural connectivity in a weighted network represent the 'strength' of loops of all lengths instead of the number of loops. Thus we call the natu- FIG. 4: (a) Small-worldness S and (c) network robustness R of the 1D p -wave superconductor vs chemical potential µ for different chain length L . (b) Normalized small-worldness S ∗ and (d) network robustness R of the 2D p +i p superconductor for different lattice size N as a function of µ . The blue lines indicate the critical points. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1183v1-figure-22696cfd-7aff-448b-b701-8e9727bc13a2.jpg) ral connectivity as the network robustness R , that can be given by $$R = \ln \left ( \frac { 1 } { n } \sum _ { i = 1 } ^ { n } e ^ { \bar { \lambda } _ { i } } \right ),$$ where ¯ λ i ( ≡ λ / i max λ i ) stands for the normalized eigenvalue of the adjacency matrix ˆ A to avoid the enhancement of the network robustness as increasing the number of nodes n ( = L in 1D and N in 2D). glyph[negationslash] In Fig.4(c) and (d), we analyze the homogeneousheterogeneous transition of network topology by plotting the network robustness R for the topological superconductors. As we expect, in both 1D and 2D cases the strong pairing phase always exhibits more robust network structure than the weak pairing phase, owing to its more heterogeneous weight distribution. For the homogeneous-heterogeneous transition in network space, the hidden symmetry breaking at the critical point indicates that the network loses its robustness ( R = 0 , namely, the hidden symmetry is broken), further leading to an appearing order parameter: the small-worldness ( S = 0 ). This is a clear picture that Landau's symmetry breaking theory works well even in network space. More interestingly, the symmetry-breaking idea is successfully applied to identifying the topological phase transitions in the topological superconductors. It is worthy to be mentioned that the concept behind the hidden symmetry breaking can also provides significant information to comprehend traditional phase transitions with Landau's symmetry breaking in condensed matter systems. Conclusions. -By using complex network analysis we have addressed how to read useful information from the pairing amplitude to characterize the topological phases in 1D and 2D topological superconductors. We have illustrated that a network measure, small-worldness, plays a significant role as a topological order parameter in network space, relied on Lan- dau symmetry-breaking picture. The evolution of the weight distribution of network links across the critical point is responsible for the change of the small-worldness, which is analogous to the change of the speed limit on a road network from the highway to the slow traffic lane. The phenomenon that the structure of the weighted network varies from heterogeneity to homogeneity implies a hidden symmetry broken -or, to put it another way, the disappearance of the network robustness to random failures. The hidden symmetry breaking has been successfully described by another network measure, network robustness. The robustness of a complex network is able to uncover a wealth of topological information underneath the pairing amplitude, and further comprehend the mechanism of the phase transitions without local order parameters. We thus suggest that complex network analysis can be a valuable tool to investigate quantum or classical phase transitions in condensed matters. We would like to thank Ting-Kuo Lee and Ming-Chung Chang for helpful discussion and comments. Our special thanks go to Xiao-Sen Yang for fruitful collaborations. This work is supported by CAEP and MST. - [1] X.-G. Wen, Quantum Field Theory of Many-Body Systems (Oxford University, New York, 2007). - [2] C. Nayak, S. H. Simon, A. Stern, M. Freedman, and S. Das Sarma, Rev. Mod. Phys. 80 , 1083 (2008). - [3] J. Alicea, Rep. Prog. Phys. 75 , 076501 (2012). - [4] B. A. Bernevig, Topological Insulators and Topological Superconductors (Princeton University Press, Princeton, 2013). - [5] R. Albert and A.-L. Barabasi, Rev. Mod. Phys. 74 , 47 (2002). - [6] S. N. Dorogovtsev and J. F. F. Mendes, Adv. Phys. 51 , 1079 (2002). - [7] M. E. J. Newman, SIAM Rev. 45 , 167 (2003). - [8] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. - Hwang, Phys. Rep. 424 , 175 (2006). - [9] S. N. Dorogovtsev, A. V. Goltsev and J. F. F. Mendes, Rev. Mod. Phys. 80 , 1275 (2008). - [10] T. Senthil, J. B. Marston, and M. P. A. Fisher, Phys. Rev. B 60 , 4245 (1999). - [11] A. Y. Kitaev, Phys. Usp. 44 , 131 (2001). - [12] N. Read and D. Green, Phys. Rev. B 61 , 10267 (2000). - [13] M. C. Chung and I. Peschel, Phys. Rev. B 64 , 064412 (2001). - [14] Q. Chen, J. Stajic, S. Tan, and K. Levin, Phys. Rep. 412 , 1 (2005). - [15] R. Albert, H. Jeong, and A.-L. Barabasi, Nature 406 , 378 (2000). - [16] B. Wang, H. Tang, C. Guo, and Z. Xiu, Physica A, 363 , 591 (2006). - [17] D. J. Watts, Small worlds: the dynamics of networks between order and randomness , Princeton University Press (1999). - [18] D. J. Watts and S. H. Strogatz, Nature (London) 393 , 440 (1998). - [19] J. P. Onnela, J. Saramaki, J. Kertesz and K. Kaski, Phys. Rev. E 71 , 065103 (2005). - [20] M. E. J. Newman, Networks: an introduction , Oxford University Press (2010). - [21] See Supplemental Material at http://link.aps.org/supplemental/ of several network measures. - [22] M. D. Humphries and K. Gurney, PLoS ONE 3 , e0002051 (2008). - [23] C.-P. Chou and M.-C. Chang, arXiv:1308.0255 (2013). - [24] F. Harary, Networks 13 , 347 (1983). - [25] M. S. Krishnamoorthy and B. Krishnamurthy, Comput. Math. Appl. 13 , 577 (1988). - [26] A. H. Esfahanian and S. L. Hakimi, Inf. Process. Lett. 27 , 195 (1988). - [27] G. Bauer and G. Bolch, Comput. Commun. 13 , 494 (1990). - [28] J. Wu, M. Barahona, Y. J. Tan, and H. Z. Deng, Chin. Phys. Lett. 27 , 078902 (2010). - [29] J. Wu, M. Barahona, Y. J. Tan, and H. Z. Deng, Chaos 22 , 043101 (2012). - [30] E. Estrada, N. Hatano, and M. Benzi, Phys. Rep. 514 , 89 (2012).
null
[ "Chung-Pin Chou" ]
2014-08-06T04:37:16+00:00
2014-08-06T04:37:16+00:00
[ "cond-mat.stat-mech", "cond-mat.dis-nn" ]
Network Robustness: Detecting Topological Quantum Phases
Can the topology of a network that consists of many particles interacting with each other change in complexity when a phase transition occurs? The answer to this question is particularly interesting to understand the nature of phase transitions if the distinct phases do not break any symmetry, such as topological phase transitions. Here we present a novel theoretical framework established by complex network analysis for demonstrating that across a transition point of the topological superconductors, the network space experiences a homogeneous-heterogeneous transition invisible in real space. This transition is nothing but related to the robustness of a network to random failures. We suggest that the idea of the network robustness can be applied to characterizing various phase transitions whether or not the symmetry is broken.
1408.1184v1
## A new low-frequency backward mode in inhomogeneous plasmas J. Vranjes 1, a) (Dated: 7 August 2014) Institute of Physics Belgrade, Pregrevica 118, 11080 Zemun, Serbia When an electromagnetic transverse wave propagates through an inhomogeneous plasma so that its electric field has a component in the direction of the background density gradient, there appears a disbalance of charge in every plasma layer, caused by the density gradient. Due to this some additional longitudinal electric field component appears in the direction of the wave vector. This longitudinal field may couple with the usual electrostatic longitudinal perturbations like the ion acoustic, electron Langmuir, and ion plasma waves. As a result, these standard electrostatic waves are modified and in addition to this a completely new low-frequency mode appears. Some basic features of the coupling and modification of the ion acoustic wave, and properties of the new mode are discussed here, in ordinary electron-ion and in pair plasmas. PACS numbers: 52.30.Ex; 52.35.Fp; 52.35.Hr; 52.27.Ep ## I. INTRODUCTION In ordinary electron-ion plasmas, both transverse electromagnetic (TEM) and longitudinal electrostatic (LES) Langmuir wave have the same cut-off at the electron plasma frequency ω pe . For very small wave-numbers the frequencies of both modes are close to each other. The two modes are physically very different and within linear theory they are typically not coupled. On the other hand, ion modes [like ion acoustic (IA), and ion plasma (IP) modes 1-3 ] are well separated from the two mentioned modes and it is believed that there is no linear coupling either. However, the situation may be quite different in the presence of a density gradient in the direction perpendicular to the direction of propagation of the TEM wave. In such a case the LES modes (IA, IP, and Langmuir) become coupled with the TEM mode even within linear theory. The coupling is more profound for the IA mode , implying that these electrostatic modes may have 4 some electromagnetic features. The coupling with the IA mode has been studied in detail in Ref. 4 for both cold and hot ions, collisional and collision-less, isothermal and adiabatic. It was shown that in a part of spectrum, for small wave-numbers k , the IA mode may become backward in the sense that ∂ω/∂k &lt; 0, it gets some cut-off caused by the density gradient, and in this same domain it is coupled with TEM wave. However, in the previous work 4 it was not realized that the general dispersion equation, which describes coupling between TEM and LES waves in the presence of a density gradient, allows for some additional peculiar low frequency hybrid (LFH) mode in the range below the IA wave frequency kc s and below the ion thermal mode kv T i , where c , v s T i are the sound and ion thermal speeds, respectively. In the large part of the spectrum this LFH mode is backward, ∂ω/∂k &lt; 0, and it appears only in the presence of a TEM wave propagating through an inhomogeneous environment. The mode is the result of linear a) Electronic mail: [email protected] coupling between TEM and LES modes. At frequencies close to kc s there is an exchange of identities of this new mode and the IA mode; the latter becomes backward above kc s for small wave-numbers , while the LFH mode 4 follows the kc s line (but remaining below it) for k → 0. Some basic features of this new low-frequency mode, and its coupling with the IA mode are presented in this work. ## II. PLASMA WITHOUT MAGNETIC FIELD We start with a static plasma containing two general species a and b , which thus may include some ionelectron or pair (pair-ion, electron-positron) plasma, and we assume small isothermal electromagnetic perturbations that propagate in z -direction. Note that much more general cases were studied in our recent work 4 , for collisional plasma with hot ions, with the Landau damping effect, and together with the energy equation. In the present case we take a simple model in order to see some basic features of the new low-frequency mode, presented here for the first time. Linear perturbations imply the momentum equation for the general species j : $$\inf _ { \begin{array} { c } m _ { j } n _ { j 0 } \frac { \partial \vec { v } _ { j 1 } } { \partial t } = q _ { j } n _ { j 0 } \vec { E } _ { 1 } - \kappa T _ { j 0 } \nabla n _ { j 1 } - \kappa n _ { j 1 } \nabla T _ { j 0 }. \end{array} } ( 1 )$$ Here, indices 0 , 1 describe the equilibrium and perturbed quantities, respectively, for the two species j = a, b , where q a = e , q b = -e , n j 0 = n 0 , and T j ≡ T j 0 . We shall assume small equilibrium gradients of the temperature and density to be in x -direction, and with the characteristic inhomogeneity length far exceeding the wavelength, so that we apply the usual local approximation analysis. We allow for the presence of both longitudinal (electrostatic) and transverse (electromagnetic) perturbations propagating in the z -direction, ∼ -iωt + ikz . The speed due to both of these perturbations $$\vec { v } _ { j 1 } = \frac { i q _ { j } \vec { E } _ { 1 } } { m _ { j } \omega } - \frac { i v _ { T j } ^ { 2 } } { \omega } \frac { \nabla n _ { j 1 } } { n _ { 0 } } - \frac { i v _ { T j } ^ { 2 } } { \omega } \frac { n _ { j 1 } } { n _ { 0 } } \frac { \nabla T _ { j } } { T _ { j } }, \quad ( 2 )$$ is used in the continuity equation which becomes $$- \, i \omega \frac { n _ { j 1 } } { n _ { 0 } } + \nabla \cdot \vec { v } _ { j 1 } + \vec { v } _ { j 1 } \frac { \nabla n _ { 0 } } { n _ { 0 } } = 0. \quad \ \ ( 3 ) \quad \ \ \ \ \ \.$$ In what follows we use the fact that glyph[vector] k ⊥∇ n 0 , glyph[vector] k ⊥∇ T j and without any approximation from Eq. (3) we have $$n _ { j 1 } = \frac { q _ { j } n _ { 0 } } { m _ { j } \omega _ { j } ^ { 2 } } \nabla \cdot \vec { E } _ { 1 } + \frac { q _ { j } } { m _ { j } \omega _ { j } ^ { 2 } } \vec { E } _ { 1 } \cdot \nabla n _ { 0 }, \quad \ ( 4 )$$ $$\omega _ { j } ^ { 2 } = \omega ^ { 2 } - k ^ { 2 } v _ { T j } ^ { 2 } + \frac { v _ { T j } ^ { 2 } T _ { j } ^ { \prime \prime } } { T _ { j } }.$$ Here, n ′ 0 , T ′′ j are the first and second derivatives of n , T 0 j in the x -direction. The electric field in principle has both longitudinal and transverse components; the one in the term with the density gradient is due to transverse planepolarized electromagnetic perturbations. It produces the term with E 1 x n ′ 0 which contributes to density perturbations and it is therefore responsible for the coupling between longitudinal and transverse oscillations (this is described in more details below, see Fig. 1). Clearly, for the purpose of the present work, this transverse glyph[vector] E 1 can be in any direction perpendicular to z , except strictly perpendicular to the density gradient (i.e., in the y direction). So for simplicity, in what follows we shall assume it to be in the plane of the density gradient (the x -plane). We need ∇ n j 1 in Eq. (2), and from Eq. (4) the result is $$\nabla n _ { j 1 } = \frac { q _ { j } n _ { 0 } } { m _ { j } \omega _ { j } ^ { 2 } } \nabla ( \nabla \cdot \vec { E } _ { 1 } ) + \frac { q _ { j } \nabla \cdot \vec { E } _ { 1 } } { m _ { j } \omega _ { j } ^ { 2 } } \nabla n _ { 0 } + \frac { q _ { j } n _ { 0 } ^ { \prime } } { m _ { j } \omega _ { j } ^ { 2 } } \nabla E _ { 1 x } \quad \ell$$ $$+ \frac { q _ { j } E _ { 1 x } } { m _ { j } \omega _ { j } ^ { 2 } } \nabla n _ { 0 } ^ { \prime } + \frac { k ^ { 2 } v _ { T j } ^ { 2 } } { \omega _ { j } ^ { 4 } } \frac { q _ { j } E _ { 1 x } n _ { 0 } ^ { \prime } } { m _ { j } } \frac { \nabla T _ { j } } { T _ { j } }$$ $$+ \, \frac { k ^ { 2 } v _ { T j } ^ { 2 } } { \omega _ { j } ^ { 4 } } \frac { q _ { j } n _ { 0 } \nabla \cdot \vec { E } _ { 1 } } { m } \frac { \nabla T _ { j } } { T _ { j } }.$$ In this expression only one term containing the third derivative v 2 T j ∇ T ′′ j / ω T ( 4 j j ) has been neglected. Eqs. (4, 5) are used in Eq. (2) which becomes $$\vec { v } _ { j 1 } = \frac { i q _ { j } } { m _ { j } \omega } \vec { E } _ { 1 } - \frac { i q _ { j } v _ { T j } ^ { 2 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \nabla ( \nabla \cdot \vec { E } _ { 1 } )$$ $$- \frac { i q _ { j } v _ { T j } ^ { 2 } \nabla \cdot \vec { E } _ { 1 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \left ( \frac { \nabla n _ { 0 } } { n _ { 0 } } + \frac { \nabla T _ { j } } { T _ { j } } \right ) - \frac { i q _ { j } v _ { T j } ^ { 2 } E _ { 1 x } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } \frac { \nabla T _ { j } } { T _ { j } }$$ $$- \frac { i q _ { j } v _ { T j } ^ { 2 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \left ( E _ { 1 x } \frac { \nabla n _ { 0 } ^ { \prime } } { n _ { 0 } } + \nabla E _ { 1 x } \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } \right )$$ $$- \, \frac { i q _ { j } k ^ { 2 } v _ { T j } ^ { 4 } } { m _ { j } \omega \omega _ { j } ^ { 4 } } \frac { \nabla T _ { j } } { T _ { j } } \left ( E _ { 1 x } \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } + \nabla \cdot \vec { E } _ { 1 } \right ). \quad \, ( 6 )$$ We may omit the third order small terms, and the velocity becomes $$\vec { v } _ { j 1 } = \frac { i q _ { j } } { m _ { j } \omega } \vec { E } _ { 1 } - \frac { i q _ { j } v _ { T j } ^ { 2 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \nabla ( \nabla \cdot \vec { E } _ { 1 } )$$ $$- \frac { i q _ { j } v _ { T j } ^ { 2 } \nabla \cdot \vec { E } _ { 1 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \left ( \frac { \nabla n _ { 0 } } { n _ { 0 } } + \frac { \nabla T _ { j } } { T _ { j } } \right )$$ $$- \, \frac { i q _ { j } v _ { T j } ^ { 2 } } { m _ { j } \omega \omega _ { j } ^ { 2 } } \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } \nabla E _ { 1 x } - \frac { i q _ { j } k ^ { 2 } v _ { T j } ^ { 4 } } { m _ { j } \omega \omega _ { j } ^ { 4 } } \frac { \nabla T _ { j } } { T _ { j } } \nabla \cdot \vec { E } _ { 1 }. \quad ( 7 )$$ Here and further in the text the second derivative of temperature in ω j is neglected, in accordance with the used local approximation. Eq. (7) is used in the general wave equation $$c ^ { 2 } k ^ { 2 } \vec { E } _ { 1 } - c ^ { 2 } \vec { k } ( \vec { k } \cdot \vec { E } _ { 1 } ) - \omega ^ { 2 } \vec { E } _ { 1 } - \frac { i \omega \vec { j } _ { 1 } } { \varepsilon _ { 0 } } = 0, \quad ( 8 )$$ $$\vec { j } _ { 1 } = n _ { 0 } \left ( q _ { a } \vec { v } _ { a 1 } - q _ { b } \vec { v } _ { b 1 } \right ).$$ This yields the following wave equation expressed through the perturbed electric field only: $$c ^ { 2 } k ^ { 2 } \vec { E } _ { 1 } - c ^ { 2 } \vec { k } \left ( \vec { k } \cdot \vec { E } _ { 1 } \right ) - \omega ^ { 2 } \vec { E } _ { 1 } + \left ( \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } \right ) \vec { E } _ { 1 }$$ $$- \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \nabla E _ { 1 x }$$ $$- k ^ { 2 } \nabla \cdot \vec { E } _ { 1 } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 4 } } { \omega _ { a } ^ { 4 } } \frac { \nabla T _ { a } } { T _ { a } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 4 } } { \omega _ { b } ^ { 4 } } \frac { \nabla T _ { a } } { T _ { a } } \right )$$ $$- \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \nabla \left ( \nabla \cdot \vec { E } _ { 1 } \right )$$ $$- \nabla \cdot \vec { E } _ { 1 } \left [ \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } \left ( \frac { \nabla n _ { 0 } } { n _ { 0 } } + \frac { \nabla T _ { a } } { T _ { a } } \right )$$ $$+ \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \left ( \frac { \nabla n _ { 0 } } { n _ { 0 } } + \frac { \nabla T _ { b } } { T _ { b } } \right ) \right ] = 0. \quad \quad ( 9 )$$ Here, ω 2 pj = e n / ε m 2 0 ( 0 j ) and the electric field includes both transverse and longitudinal components. ## A. Mechanism of transverse-longitudinal electric field coupling The mechanism of the coupling can be understood 4 from Fig. 1 where we have a density gradient in x -direction and an EM wave propagating along the z -axis, glyph[vector] k = kglyph[vector] e z . Due to the electric field glyph[vector] E trans = E x 1 glyph[vector] e x , plasma particles with opposite charges move in opposite directions. The physics is essentially the same for both electron-ion and pair-ion plasma, although in the former case the displacement of particles is more effective for electrons of course. In case of particles of the same mass, displacements of positive particles, that were initially in an arbitrary layer (which we denote as x = 0) with density n 0 (0), is represented by the sinusoidal line. Two arbitrary points A (0 , z 1 ) and B (0 , z 2 ) at two different positions in z -direction are displaced to A x ,z ′ ( 1 1 ) and B x ,z ′ ( 2 2 ). As a result, due to background density gradient, the amount of positively charged particles at A (0 , z 1 ) and B (0 , z 2 ) will no longer be the same; in the point A (0 , z 1 ) it is reduced (they are replaced by the particles of the same species which come from some other point in x direction with lower density), and in the point B (0 , z 2 ) it is increased. In the same time, because of opposite motion of negatively charged particles, the amount of negative charges at A (0 , z 1 ) will be increased (they are displaced and moved from the area with a higher density) and at B (0 , z 2 ) decreased. Something similar happens at every point in the z direction, and for every layer along the x axis. This means that there will be a difference of charge in the chosen arbitrary points, and this further implies that there will be an additional electric field E 1 z in the z direction, as indicated in Fig. 1. FIG. 1. Origin of a longitudinal electric field in case of a transverse electromagnetic wave propagating through an inhomogeneous plasma. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1184v1-figure-04bba71f-9c3c-4ae5-8e6a-6ff837daca0a.jpg) ## B. The case of equilibrium with opposite density and temperature gradients So far nothing is assumed about a possible relation between the temperature and density gradients in the equilibrium. One possible and physically plausible scenario may include a plasma with a balance of the two gradients in the equilibrium: $$\frac { \nabla T _ { j } } { T _ { j } } = - \frac { \nabla n _ { 0 } } { n _ { 0 } }.$$ Note that this also allows for different temperatures of the two species T b = αT a . With this, the last two terms in Eq. (9) vanish and we consequently have the following wave equation: $$c ^ { 2 } k ^ { 2 } \vec { E } _ { 1 } - c ^ { 2 } \vec { k } \left ( \vec { k } \cdot \vec { E } _ { 1 } \right ) - \omega ^ { 2 } \vec { E } _ { 1 } + \left ( \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } \right ) \vec { E } _ { 1 }$$ $$- \frac { \nabla E _ { 1 x } } { L _ { n } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right )$$ $$+ \frac { k ^ { 2 } \vec { e } _ { x } } { L _ { n } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 4 } } { \omega _ { a } ^ { 4 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 4 } } { \omega _ { b } ^ { 4 } } \right ) \nabla \cdot \vec { E } _ { 1 }$$ $$- \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \nabla \left ( \nabla \cdot \vec { E } _ { 1 } \right ) = 0. \quad ( 1 1 )$$ Here L n = ( n /n 0 ′ 0 ) is the characteristic scale-length for the equilibrium density gradient, n ′ 0 = dn /dx 0 , and L n = -L T . The y -component of Eq. (11) yields one TEM wave ω 2 = ω 2 pa + ω 2 pb + k c 2 2 which is decoupled from the rest. The z and x components are coupled and they yield $$\left [ - \omega ^ { 2 } + \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } + k ^ { 2 } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \right ] E _ { 1 z }$$ $$- \, \frac { i k } { L _ { n } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) E _ { 1 x } = 0, \quad ( 1 2 )$$ $$\left ( - \omega ^ { 2 } + \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } + k ^ { 2 } c ^ { 2 } \right ) E _ { 1 x }$$ $$+ \frac { i k ^ { 3 } } { L _ { n } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 4 } } { \omega _ { a } ^ { 4 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 4 } } { \omega _ { b } ^ { 4 } } \right ) E _ { 1 z } = 0. \quad ( 1 3 )$$ Eqs. (12, 13) describe coupled longitudinal E 1 z and transverse (electromagnetic) E 1 x perturbations. Obviously, the coupling described by Eqs. (12, 13) vanishes in the absence of inhomogeneity L n → ∞ . In this limit Eq. (13) yields yet another EM transverse wave with the electric field in the x -direction, while in e-i plasmas Eq. (12) describes the usual IA, IP, and Langmuir modes. As Fig. 1 suggests, the high-frequency longitudinal electric field (produced by the transverse EM wave) will cause simultaneous high-frequency density oscillations in the z -direction. In the presence of an additional independent longitudinal (ion-acoustic, or electron Langmuir, or ion-plasma) mode propagating in the z -direction, obviously there may be coupling of these two longitudinal displacements of completely different origin, and this is what Eqs. (12, 13) describe, but this is not all. In fact, as it will be shown below, there appears an extra oscillatory longitudinal mode, which is partly backward and very low-frequency. From all this it is self-evident that glyph[vector] E trans does not have to be polarized strictly in the ( x, z )-plain. To have the described high-frequency longitudinal motion caused by the transverse wave, it is enough that the electric field vector of the transverse wave has a component in the x -direction regardless how small, as we stressed earlier. So in the presence of inhomogeneity, the dispersion equation obtained from Eqs. (12, 13) reads: $$\omega ^ { 2 } \left ( 1 - \frac { \omega _ { p a } ^ { 2 } } { \omega _ { a } ^ { 2 } } - \frac { \omega _ { p b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \left ( c ^ { 2 } k ^ { 2 } + \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } - \omega ^ { 2 } \right )$$ $$+ \, \frac { k ^ { 4 } } { L _ { n } ^ { 2 } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 4 } } { \omega _ { a } ^ { 4 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 4 } } { \omega _ { b } ^ { 4 } } \right ) = 0. \quad \frac { \frac { 1 } { 1 } } { \omega _ { a } ^ { 2 } }$$ $$2 ) \\ \Big ) = 0. \\ ( 1 4 ) \text{nogene}$$ Here, ω 2 a,b ≈ ω 2 -k v 2 2 T a,b . In the absence of inhomogeneity this equation describes the usual TEM, Langmuir, and IA modes. With equilibrium gradients it yields some extra branches, like the ion thermal and more importantly a completely new low frequency mode described below for electron-ion and pair-ion plasmas. ## 1. Electron-ion plasma a. Ion acoustic range. In electron-ion plasmas we may discuss Eq. (14) in the IA frequency range, and for simplicity we may assume T a glyph[lessmuch] T b , where a denotes ions a = i , and therefore b = e . Assuming only that ω 2 glyph[lessmuch] ω 2 pi , ω 2 pe , k 2 v 2 T e (all well-justified for the IA frequency range), this yields the modified IA mode 4,5 $$\omega ^ { 2 } = k ^ { 2 } c _ { s } ^ { 2 } \left ( 1 + \frac { m _ { i } } { m _ { e } } \frac { 1 } { k ^ { 2 } L _ { n } ^ { 2 } } \frac { 1 } { 1 + k ^ { 2 } \lambda _ { e } ^ { 2 } } \right ) \frac { 1 } { 1 + k ^ { 2 } \lambda _ { d e } ^ { 2 } }, \ \ ( 1 5 ) \quad \text{tr.fi} \\ \text{all} \, \, \text{t}$$ $$\lambda _ { e } = \frac { c } { \omega _ { p e } }, \ \lambda _ { d e } = \frac { v _ { T e } } { \omega _ { p e } }, \ \ c _ { s } ^ { 2 } = \frac { \kappa T _ { e } } { m _ { i } }.$$ The IA mode is partly backward, ∂ω/∂k &lt; 0, due to the second term within brackets in Eq. (15), and this is in the range of small k , i.e., for a strong enough inhomogeneity: $$L _ { n } ^ { 2 } < \frac { m _ { i } } { m _ { e } } \frac { \lambda _ { e } ^ { 2 } } { ( 1 + k ^ { 2 } \lambda _ { e } ^ { 2 } ) ^ { 2 } }.$$ In this k -range the IA mode does not go to zero following the usual kc s line a [which here is not a straight line due to logarithmic ω -scale]. Instead, the frequency is increased [see Fig. 2] and various consequences of this are discussed in detail in Ref. 4, including the reduced Landau damping. As a result, the IA mode may be expected even in hot-ion plasmas like the solar corona 4 . This all is just the consequence of the plasma inhomogeneity. b. Sub-IA range: new hybrid mode. The described backward features of the IA mode are a part of a more global picture which could be partly seen by solving the dispersion equation (14) numerically and analytically. Keeping the ion thermal terms and in the low frequency limit ω glyph[lessmuch] kv T i this yields a new low-frequency hybrid (LFH) mode in an electron-ion plasma with the frequency which in the given limit reads: $$\omega ^ { 2 } \simeq \frac { \lambda _ { d } ^ { 2 } } { L _ { n } ^ { 2 } } \frac { \omega _ { p e } ^ { 2 } + \omega _ { p i } ^ { 2 } } { ( 1 + k ^ { 2 } \lambda _ { e i } ^ { 2 } ) ( 1 + k ^ { 2 } \lambda _ { d } ^ { 2 } ) }, \quad \quad ( 1 6 )$$ $$\lambda _ { d } ^ { 2 } = \frac { \lambda _ { d i } ^ { 2 } \lambda _ { d e } ^ { 2 } } { \lambda _ { d i } ^ { 2 } + \lambda _ { d e } ^ { 2 } }, \quad \lambda _ { e i } ^ { 2 } = \frac { c ^ { 2 } } { \omega _ { p e } ^ { 2 } + \omega _ { p i } ^ { 2 } }.$$ This mode is backward for large wavenumber k , it has /s51 FIG. 2. Dispersion equation Eq. (14) solved for argon-electron plasma. Only ion acoustic and low-frequency hybrid modes are presented. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1184v1-figure-e5c09bf0-51f5-4bcd-9306-7f8ae3504352.jpg) both electromagnetic and electrostatic features (the electric field of the mode includes two components, one parallel to the wave-number, and another transverse component in the direction of the density gradient), and it appears only in an inhomogeneous plasma due to linear coupling between TEM and LES waves. Because the frequency increases for decreased k , in the smallk range the frequency line would cross the IA dispersion line kc s [see the dotted line in Fig. 2], but instead of this the two modes exchange identities in such a way that the IA mode becomes backward in the range above kc s as described by Eq. (15), while the LFH mode becomes a direct mode which goes to zero following the line kc s for k → 0. These all features can be seen in Fig. 2 which shows the actual ion acoustic wave (line b ) in an arbitrary inhomogeneous ( L n = 0 5 m) argon-electron plasma with . n 0 = 10 16 m -3 , T e = 10 4 K, T i = 2 · 10 3 K. This line is nicely described by the approximate analytical expression (15). The usual IA mode kc s in a homogenous plasma is presented by line a . Clearly, in the small k range it is very different from the actual IA wave in inhomogeneous plasma, line b . The new, gradient-driven low frequency hybrid mode (LFH) is presented by line c ; its maximum frequency in the graph is about 44 kHz and it is achieved at λ = 0 06 m, i.e., . k = 90 (note that the corresponding ion acoustic wave minimum in the same k -range is about 208 kHz). For large k (i.e., in the range where it is backward), the approximate analytic expression (16) describes the LFH mode rather accurately. ## 2. Pair-ion plasma In pair-ion plasmas 6-12 without density gradient Eq. (14) yields the following dispersion equation: $$1 = \frac { \omega _ { p } ^ { 2 } } { \omega ^ { 2 } - k ^ { 2 } v _ { T a } ^ { 2 } } + \frac { \omega _ { p } ^ { 2 } } { \omega ^ { 2 } - k ^ { 2 } v _ { T b } ^ { 2 } }, \ \omega _ { p } ^ { 2 } = \frac { e ^ { 2 } n _ { 0 } } { \varepsilon _ { 0 } m }. \quad ( 1 7 ) \quad \begin{pmatrix} \text{Fig. } \ddot { \vdots } \\ \lambda \ll \\ \vdots \, \varepsilon \, \cdots \end{pmatrix}$$ glyph[negationslash] Eq. (17) is discussed in our earlier work. 13 It gives a longitudinal electrostatic Langmuir mode, and the ion sound mode in the pair plasma (the latter only on condition T a = T b ). In the presence of the density/temperature gradients, the LFH mode with mixed transverse-longitudinal features can be found in the pair-ion plasma as well. In the limit ω 2 glyph[lessmuch] ω , k 2 p 2 v 2 T , Eq. (14) reduces to $$\omega ^ { 2 } = \frac { v _ { T } ^ { 2 } } { L _ { n } ^ { 2 } } \frac { 1 } { ( 1 + k ^ { 2 } r _ { d } ^ { 2 } / 2 ) ( 1 + k ^ { 2 } \lambda _ { i n } ^ { 2 } / 2 ) }. \quad ( 1 8 ) \quad \exp \epsilon _ { \substack { \text{img} \\ \dots \dots \end{matrix} } }.$$ Here, λ in = c/ω p is the inertial length for the two species, and r d = v T /ω p is the plasma Debye radius. Eq. (18) is an approximate solution valid only for relatively large wave-numbers; in this range of k it is also backward, it should have similar features as the mode in e-i plasma, in particular in the limit k → 0, but this cannot be checked analytically because the condition ω 2 glyph[lessmuch] k v 2 2 T becomes violated. Eq. (14) can be solved numerically for any pair plasma (electron-positron, hydrogen pair plasma H ± , or fullerene pair plasma). In cylindric configuration in pair-plasma experiments the radial scale was very small, so now we choose L n = 0 03 m. . In Fig. 3 we present only the new hybrid mode for an arbitrary pair-proton plasma with the temperature T a = T b = 5 · 10 3 K, and for two densities n 0 = 10 14 m -3 , and n 0 = 10 16 m -3 . The approximate solution given by Eq. (18) is practically identical to the numerical one presented in Fig. 3 which is obtained from Eq. (14). FIG. 3. New backward mode in inhomogeneous pair H ± plasma. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1184v1-figure-f452bf1e-9bda-45c7-a338-f474ac89218e.jpg) For the given k -range the thermal mode kv T is with the frequency in the range above 10 6 Hz and the plasma frequency is ∼ 10 7 Hz, so the new mode presented in Fig. 3 is far separated from these frequencies, and it is truly a different branch of oscillations. Note that r d glyph[lessmuch] λ glyph[lessmuch] λ in so the backward features are mainly due to k λ 2 2 in term in Eq. (18). For a larger laboratory configuration the mode may be observable by naked eyes. Taking for example L n = 0 2 . m and λ = 0 01 m for the same temperature as above . and n 0 = 10 14 m -3 yields ω = 3 Hz. The same behavior can be shown by taking fullerene pair plasma, but frequencies in that case are far below Hz. Taking parameters which would correspond to experiments 6-9 is not appropriate because of the following two major problems: particle gyro radius becomes comparable with the plasma column radius, and the density scale length L n (in radial direction) is much shorter than the parallel wavelength. In such a case an eigenmode analysis is needed 14 and the local approximation is not applicable, so this is avoided here in order to show that the new mode and its backward features are not the result of the finite geometry and boundary effects. ## III. PLASMA IN MAGNETIC FIELD In the laboratory environment, instead of the equilibrium condition (10) we may have a more realistic situation of a plasma confined by an external magnetic field. Hence, we shall assume the presence of a background magnetic field directed along the z -axis, and with perturbations propagating in the same direction. In such a case the equilibrium implies the presence of the diamag- netic drift speed $$\vec { v } _ { j 0 } = \frac { \vec { e } _ { z } \times \nabla p _ { j 0 } } { q _ { j } n _ { 0 } B _ { 0 } }, \ \ p _ { j 0 } = \kappa T _ { j 0 } n _ { j 0 }. \quad \ \ ( 1 9 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ The equilibrium may obviously be satisfied even for a homogeneous temperature and this is a frequent situation in lab-plasmas. Also, in pair-ion experiments no temperature gradient is mentioned, so we can omit it in (19) and keep only the density gradient. In such a case, and for other parameters as above for electron ion plasma we have v e 0 = 1 7 . /B 0 m/s, and for the pair-ion plasma parameters v j 0 = 14 3 . /B 0 m/s, so an eventual magnetic field shear inhomogeneity caused by this diamagnetic current is negligible. On the other hand, eventual equilibrium magnetic field gradient, which may in principle appear in the equilibrium condition ∇ [ p 0 + B / 2 0 (2 µ 0 )] = 0, can also be made negligible if plasmaβ is small, 15,16 and this is the case for the parameters used so far in the text. Note also that glyph[vector] v j 0 will not contribute to the previously used continuity equation through the term n 1 ∇· glyph[vector] v j 0 because ∇· glyph[vector] v j 0 ≡ 0. Another issue are the terms glyph[vector] v 1 × glyph[vector] B 0 ≡ glyph[vector] v ⊥ 1 × glyph[vector] B 0 and glyph[vector] v 0 × glyph[vector] B 1 that should appear in the momentum equation (1) in the presence of the magnetic field. Regarding their role with respect to the TEM wave, the first can be made negligible because the Lorentz force due to this term acts on the particle within time interval that is far shorter than the gyro-rotation time (particle changes direction within very short time intervals corresponding to the TEM wave). Note that for the pair-ion case discussed in the previous section and assuming B 0 = 0 3 . T (like in the experiment) for the two densities we have ω / p Ω i ≈ 2 , 22, where Ω i = q B /m i 0 i . The frequency of the electromagnetic wave is in fact much higher than ω p glyph[similarequal] 10 6 Hz; for the smallest k in Fig. 3 it is of the order of 10 11 Hz. So it would be surely justified to omit glyph[vector] v 1 × glyph[vector] B 0 term even for the parameters used so far for plasma without the magnetic field . The second term glyph[vector] v 0 × glyph[vector] B 1 is even smaller. For the electron-ion plasma the Lorentz force due to TEM wave can make difference for electrons only, but it can also be negligible if the magnetic field is not too strong. For example, for the parameters used in Fig. 2 the physics related to the TEM mode alone will not change if the introduced magnetic field is kept below 0.01 T, but the field can be allowed to be much stronger if the number density is assumed higher. However, in the case of the LFH mode studied in the present text, there appears a slow transverse particle dynamics associated with this mode as well, and this can further be affected by the background field. For this motion there are several possibilities which can be discussed separately. 1) Gyro-effects will not appear for unmagnetized particles, which corresponds to the frequency limit: $$\Omega _ { j } ^ { 2 } < \omega ^ { 2 } \ll \omega _ { p i } ^ { 2 }, k ^ { 2 } v _ { T i } ^ { 2 }. \quad \quad ( 2 0 ) \quad \text{will}$$ In pair plasmas (e.g., electron-positron, H ± ) the condition (20) is satisfied in a weak field B -5 0 T, and for T 0 = 10 5 K, n 0 = 10 18 m 3, -L n = 0 01 m. . Hence, in this case the magnetic field effects can be omitted from the terms describing the perpendicular perturbed speed, and the analysis can be done similar as before with neglected temperature gradient only. The wave Eq. (9) now becomes $$c ^ { 2 } k ^ { 2 } \vec { E } _ { 1 } - c ^ { 2 } \vec { k } ( \vec { k } \cdot \vec { E } _ { 1 } ) - \omega ^ { 2 } \vec { E } _ { 1 } + \left ( \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } \right ) \vec { E } _ { 1 }$$ $$- \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \left [ \frac { n _ { 0 } ^ { \prime } } { n _ { 0 } } \nabla E _ { 1 x } + \nabla ( \nabla \cdot \vec { E } _ { 1 } )$$ $$+ ( \nabla \cdot \vec { E } _ { 1 } ) \frac { \nabla n _ { 0 } } { n _ { 0 } } \Big ] = 0, \ \omega _ { j } ^ { 2 } = \omega ^ { 2 } - k ^ { 2 } v _ { t j } ^ { 2 }. \quad ( 2 1 )$$ The y -component yields again a separate TEM mode and from the other two components we obtain the dispersion equation $$\omega ^ { 2 } \left ( 1 - \frac { \omega _ { p a } ^ { 2 } } { \omega _ { a } ^ { 2 } } - \frac { \omega _ { p b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \left ( c ^ { 2 } k ^ { 2 } + \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } - \omega ^ { 2 } \right )$$ $$- \, \frac { k ^ { 2 } } { L _ { n } ^ { 2 } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) ^ { 2 } = 0.$$ $$\begin{array} { c } \omega ^ { 2 } \left ( 1 - \frac { \omega _ { p a } ^ { 2 } } { \omega _ { a } ^ { 2 } } - \frac { \omega _ { p b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) \left ( c ^ { 2 } k ^ { 2 } + \omega _ { p a } ^ { 2 } + \omega _ { p b } ^ { 2 } - \omega ^ { 2 } \right ) \\ \\ - \, \frac { k ^ { 2 } } { L _ { n } ^ { 2 } } \left ( \frac { \omega _ { p a } ^ { 2 } v _ { T a } ^ { 2 } } { \omega _ { a } ^ { 2 } } + \frac { \omega _ { p b } ^ { 2 } v _ { T b } ^ { 2 } } { \omega _ { b } ^ { 2 } } \right ) ^ { 2 } = 0. \quad & ( 2 2 ) \end{array}$$ In the pair plasma, for v T a = v T b = v T , dispersion equation (22) yields the same expression (18) for the frequency. 2) For electron-ion plasma and for parameters and geometry used in Fig. 2 and assuming B 0 = 0 01 T or . smaller, the frequency of the LFH mode (line c ) in the given k -range is always above the ion gyro-frequency. So the frequency range (20) applies for ions and their dynamics would remain the same. But electrons are magnetized for the same parameters (their gyro-frequency is 10 9 Hz) and their dynamics would become much more complex. Within some reasonable approximations their perpendicular speed can be written as: $$\underset { \substack { \text{$range$} \\ 0 1 \text{ $T$,} \\ \text{if the} } } \quad \vec { v } _ { e \perp 1 } \approx - \frac { 1 } { B _ { 0 } } \vec { e } _ { z } \times \vec { E } _ { 1 z } - \frac { v _ { T e } ^ { 2 } } { \Omega _ { e } } \vec { e } _ { z } \times \frac { \nabla _ { \perp } n _ { e 1 } } { n _ { 0 } } - \frac { 1 } { \Omega _ { e } B _ { 0 } } \frac { \partial E _ { 1 \perp } } { \partial t }. \\ \underset { \text{$m$} \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \end{array}$$ Here, only the last term (the polarization drift) describes the motion in the direction of the TEM wave electric field, and only this electron motion can contribute to the appearance of the longitudinal electric field (see Fig. 1), but it is typically negligible. The other two terms describe electron drift motion in the y -direction. Electron parallel dynamics (along the magnetic field) will be the same as before. From Fig. 1 it is clear that the longitudinal electric field will appear whenever any of the two species move along the density gradient. In the present case this will be mainly due to ion direct motion in the TEM wave field. So some sort of the LFH mode is expected to develop again, but ions are less mobile and the mode may be considerably modified. But in a different geometry, with the TEM wave electric field making an angle θ with respect to the density gradient, the electron drift speed glyph[vector] v d will have one component v d sin( θ ) along the density gradient. Electrons will then considerably contribute to the longitudinal electric field, very much similar to what happens in Fig. 1. - 3) Finally, if both species are magnetized ω 2 &lt; Ω , 2 j only drift motion can develop in direction perpendicular to the magnetic field. From Fig. 1 we have learned that, to have the effects studied here, there must be displacement (of any kind) of particles (of any species) along the density gradient, and obviously this can be either a direct motion (as presented in the figure) or a drift in the presence of the magnetic field. However, in the present case, the drift of particles along the density gradient will develop only if the electric field of the incident TEM wave is not strictly in the same direction. So some sort of LFH mode is expected again but geometry should be assumed different from the cases studied above. In both cases 2) and 3), derivations are lengthy, particle dynamics in two perpendicular directions become coupled, and several additional modes appear (like electron and ion cyclotron, lower and upper hybrid, etc.). Yet no essential new physics is expected to emerge and such derivations will be omitted here. ## IV. SUMMARY AND CONCLUSIONS The mechanism of coupling between TEM and LES waves propagating in inhomogeneous plasmas, discovered in Ref. 4, is shown here to contain some crucial extra physics. A completely new mode is shown to exist, which was not noticed in Ref. 4. This new low frequency hybrid (LFH) mode is the result of coupling between transverse and longitudinal electric fields of electromagnetic and electrostatic waves in the presence of density gradient. So the backward features of the ion acoustic mode, discussed in Ref. 4, are a a part of a more profound and complex phenomenon: for relatively small wave-numbers the backward LFH mode exchanges identity with the IA wave, the latter becomes backward for k → 0 and eventually gets some cut-off or its frequency continues to grow in this k -range, while the LFH mode goes towards ω = 0 following the usual IA line kc s in the same k -limit. These features are partly seen in Fig. 2. The properties of the LFH mode do not necessarily change in the presence of the magnetic field because transverse motion of particles (with respect to the magnetic field vector) is essentially due to the TEM wave which is of very high-frequency so that gyro-motion of particles is usually negligible. In the text, the features of the LFH mode are presented for two possible equilibria and for both electron-ion and pair plasmas. The presented TEM-LES coupling is linear, and it hap- pens only in the presence of a density gradient. However, for some nonlinear phenomena the LFH mode may take over the role of the usual IA wave. The obvious possibilities are the following: electron decay instability (LHF mode interacting with two Langmuir waves propagating in opposite directions), parametric backscattering (LFH mode interacting with two light waves propagating in opposite directions), and parametric decay instability (incident light wave interacting with Langmuir wave and LFH mode moving in opposite direction). The two different equilibria discussed in Secs. II B, III have effect on the dispersion equation in general [see the coupling term containing L n in dispersion equations (14, 22)], although in the case of the LFH mode this effect vanishes in approximate expressions. This approximate absence of the effect on the LFH mode may be explained in the following way. As pointed out earlier, in the case ∇ p j 0 = 0 [no magnetic field, the condition (10)] the last two terms in equation (9) vanish, and the remaining temperature gradient terms can be traced in Eqs. (11, 14) through the terms which contain v 4 T j . On the other hand, in the presence of magnetic field, the temperature gradient is assumed absent because it is not essential or required for the equilibrium, so these terms are set to zero in Eq. (9). Now the remaining density gradient terms yield the term α = ω 2 pa v 2 T a /ω 2 a + ω 2 pb v 2 T b /ω 2 b in Eq. (21) that appears with both glyph[vector] E -field components E 1 x , E 1 z , which are however coupled and this then yields α 2 in the dispersion equation (22). But in the LFH mode limit all the terms ω 2 j = ω 2 -k v 2 2 T j reduce to -k v 2 2 T j , and then there is an obvious cancelation of the remaining thermal terms in the coupling term with L n , so these equilibrium differences vanish. Though strictly speaking this is so only for relatively large values of k , as can be deduced from Fig. 2 where neglecting ω 2 in the small k limit is not justified any longer. - 1 G. M. Sessler, Phys. Rev. Lett. 17 , 243 (1966). - 2 H. J. Doucet and D. Gresillon, Phys. Fluids 13 , 773 (1970). - 3 J. Vranjes and M. Kono, Phys. Plasmas 21 , 042104 (2014). - 4 J. Vranjes, Astron. Astrophys. 554 , A90 (2013). - 5 J. Vranjes, H. Saleem, and S. Poedts, Phys. Plasmas 14 , 034504 (2007). - 6 W. Oohara and R. Hatakeyama, Phys. Rev. Lett. 91 , 205005 (2003). - 7 W. Oohara, D. Date, and R. Hatakeyama, Phys. Rev. Lett. 95 , 175003 (2005). - 8 W. Oohara, Y. Kuwabara, and R. Hatakeyama, Phys. Rev. E 75 , 056403 (2007). - 9 W. Oohara and R. Hatakeyama, Phys. Plasmas 14 , 055704 (2007). - 10 I. Kourakis, F. Verheest, and N. F. Cramer, Phys. Plasmas 14 , 022306 (2007). - 11 M. Kono, J. Vranjes and N. Batool, Phys. Plasmas 20 , 122111 (2013). - 12 M. Kono, J. Vranjes and N. Batool, Phys. Rev. Lett. 112 , 105001 (2014). - 13 J. Vranjes, D. Petrovic, B. P. Pandey, and S. Poedts, Phys. Plasmas 15 , 072104 (2008). - 14 J. Vranjes and S. Poedts, Phys. Plasmas 15 , 044501 (2008). - 15 N. Krall, in Advances in Plasma Physics , eds. A. Simon and W. - B. Thompson (Interscience, New York, 1968) p. 153 - 16 J. Vranjes, Mon. Not. R. Astron. Soc. 415 , 1543 (2011).
10.1063/1.4891657
[ "J. Vranjes" ]
2014-08-06T04:41:51+00:00
2014-08-06T04:41:51+00:00
[ "physics.plasm-ph" ]
A new low-frequency backward mode in inhomogeneous plasmas
When an electromagnetic transverse wave propagates through an inhomogeneous plasma so that its electric field has a component in the direction of the background density gradient, there appears a disbalance of charge in every plasma layer, caused by the density gradient. Due to this some additional longitudinal electric field component appears in the direction of the wave vector. This longitudinal field may couple with the usual electrostatic longitudinal perturbations like the ion acoustic, electron Langmuir, and ion plasma waves. As a result, these standard electrostatic waves are modified and in addition to this a completely new low-frequency mode appears. Some basic features of the coupling and modification of the ion acoustic wave, and properties of the new mode are discussed here, in ordinary electron-ion and in pair plasmas.
1408.1185v4
## Bond Model and Group Theory of Second Harmonic Generation in ## GaAs(001) ∗ Hendradi Hardhienata , 1 † Adalberto Alejo-Molina, 2 Andrii Prylepa, 3, 1 Cornelia Reitböck, 3, 1 David Stifter, 3, 1 and Kurt Hingerl 1 1 Center for surface- and nanoanalytics, Johannes Kepler University, Altenbergerstr. 69, 4040 Linz, Austria 2 Centro de Investigacíon en Ingeniería y Ciencias Aplicadas, UAEM Cuernavaca, Mor. 62160, Mexico 3 Christian Doppler laboratory for microscopic and spectroscopic material characterization, Johannes Kepler University, Altenbergerstr. 69, 4040 Linz, Austria (Dated: September 15, 2014) ## Abstract A comprehensive analysis of second harmonic generation (SHG) in a diatomic zincblende crystal based on the Simplified Bond Hyperpolarizability Model (SBHM), Group Theory (GT) is presented. The third rank tensor between the two approaches are compared and applied to reproduce rotational anisotropy (RA) SHG experimental result. It is well known that such a crystal is noncentrosymmetric, therefore the second harmonic generation source is dominated by bulk dipoles with a SHG polarization P i = χ (2) ijk E j ( ω E ) k ( ω ) . We show that the SBHM previously applied to silicon can also be applied to an atomic cell containing two different atoms e.g. GaAs by introducing an effective hyperpolarizability α 2 GaAs = ( α 2 Ga -α 2 As ) . Comparison with GT yields the same third rank tensor for a T d point group corresponding to bulk tetrahedral structure. Interestingly, SBHM gives good agreement with RA-SHG experiment of GaAs using only one single fitting parameter when Fresnel relations is also incorporated in the model. † on leave from Theoretical Physics Division, Bogor Agricultural University, Jl. Meranti S, Darmaga, Indonesia ## I. INTRODUCTION The field of nonlinear optics flourished since the discovery of higher harmonic generation by Franken and coworkers in the 1960 [1]. Theoretical efforts to understand nonlinear phenomena soon followed, perhaps most notably the rigorous analysis of higher harmonics by the group of Pershan [2]. The theory has been further developed by Bloembergen et al. [3] to explain nonlinearity in centrosymmetric material where it is argued that due to inversion symmetry nonlinear dipole contribution inside the material bulk is forbidden but electric quadrupole and magnetic dipole arising from quantum perturbative treatment of the interacting Hamiltonian are allowed. Other researchers apply parity consideration to that the symmetric potential inside the bulk of a centrosymmetric material requires electronic transition from either symmetric-to-symmetric or antisymmetric-to-antisymmetric states which are forbidden thus resulting in zero components for the even order susceptibilty tensors and as a logical consequence even order nonlinear harmonics cannot exists inside the bulk [4]. However, it is interesting to note the work of Guidotti and Driscoll [5]. Based on their experiment, they argue that intense light illumination may produce dipolar contribution inside the bulk in contradiction with previous believes. Their argument is based on tensorial analysis and that although second harmonic generation intensity in Si(001) experiment can be explained by fitting bulk quadrupole contribution the authors state that this agreement is maybe accidental. Other researchers rebutted this conclusion and, using symmetry considerations of the nanosecond lasers SHG experiment on Ge and Si semiconductor, argue that surface dipolar and bulk quadrupolar are contributing to the SHG intensities [6]. Since then, dipole contribution inside the bulk of a centrosymmetric crystal has been mainly neglected. Instead notable work particulary by Mizrahi and Sipe [7] was performed to develop the nonlinear polarization term in Ref. [3] using Fresnel equation. Their idea was soon developed further to analyze second harmonic (SHG) and third harmonic generation (THG) from vicinal Si(111) surfaces [8] yielding excellent fits but unfortunately requiring more than 10 input parameter that are perhaps not really independent of each other to reproduce experimental data. Unfortunately, the high amount of fit parameters makes the physical insight of nonlinearity in such systems more complicated. Nevertheless, the general view holds that both the surface dipolar and bulk quadrupolar effects are both significant in generating correct SHG intensity profiles that are observed in reflection. Newer experimental techniques [9] suggest that magnetic dipolar effects to SHG can also not be neglected. Although most of the work on SHG from centrosymmetric material is based on the phenomenological theory where the final formula is in the form of a Fourier series, another approach called the Simplified Bond Hyperpolarizability Model (SBHM) which is based on a classical Lorentz nonlinear oscillator model has been proposed in 2002 by Powell and coworkers [10]. Their effort was motivated by the complexity arising from phenomenological theory and notion that SHG experimental intensities from centrosymmetric system particularly vicinal Si(111) should be reproducable by another model using fewer parameters. Inspired by Ewald-Oseen's method [11,12] to calculate far field intensities in linear optics via superposition of dipoles, they extend this principle to nonlinear optics and obtain surprisingly a simplier analysis than the linear case [13]. The core idea of SBHM is that the driving field oscillates the charge in the material surface/interface harmonically and anharmonically along the bond direction between the atoms and because in classical electrodynamics an accelerated charge radiates, it produces linear and nonlinear harmonics in the reflection spectra. The advantage of using this simplified model is that -although it is not an ab initio theory- it gives a clear picture of the microscopic physics that produces higher harmonics. In addition, it requires less fitting parameters especially for low symmetry systems such as non vicinal centrosymmetric surfaces. Since the model has been proposed, SBHM has achieved some success. Assuming only contribution from the surface, SBHM was able to reproduce the four polarization SHG intensities of a Si(111) facet mentioned in Ref. [8] using only two parameters which are the complex up ( α u ) and down ( α d ) hyperpolarizabilities. However, it has also several limitations in that it could not fit certain Si orientation such as Si(011) and because it is generally seen as a surface model it cannot explain bulk related nonlinear source which has brought several criticism notably by McGilp [14]. As a response Aspnes and coworkers extended their model to cope with retardation (RD), spatialdispersion (SD), and magnetic (MG) effects and using this new contributions, they were able to fit the Si(011) data [15]. Other work was also performed by Kwon and coworkers [16] to explain SHG in non and vicinal Si(001) facet by introducing additional assumption namely that the anharmonic oscillation of the charge can also oscillate perpendicular to the bonds. They also argue that bulk quadrupolar contribution can be modelled in analogy to the surface dipolar fashion but using the multipole expansion of the nonlinear polarization or perturbative expansion form of the nonlinear polarization such as in [3] applying not three but four outer products of the bonds and one additional gradient vector representing the quadrupolar nature of the source. This bulk quadrupole formulation is different than proposed by Peng [17] because the latter uses an expansion of the driving field gradient. In addition to SHG from centrosymmetric structures such as Si, some work has been performed to investigate SHG in GaAs [18-22] which has a zincblende structure. Such a system is - in contrary to Si - not centrosymmetric due to the different atomic potentials between Ga and As. Therefore SHG produced by dipole inside the bulk is not forbidden and can be studied using the bond model which so far has been sucessful in predicting dipole radiation from centrosymmetric surfaces. Although the 4 fold symmetry has been obtained from various experiments, the exact origin is unknown [18]. Further investigation on vicinal GaAs structure also exist where the SHG contribution seems to arise from surface and bulk dipoles [19]. An experiment to measure fourth harmonic generation from GaAs has been performed and found a strong 4 fold anisotropic surface specific signal that is not present in SHG [20]. In addition SHG analysis from induced electric currents due to assymetric distribution of carriers in GaAs has been investigated using quantum mechanical arguments involving the creation of an exciton and band transition analysis [21]. To the best of our knowledge however, the classical bond model has never been applied by other researchers to analyze SHG from a diatomic unit cell, in this case GaAs. In our previous work [22] we have briefly discussed the relation between SBHM and group theory for diamond monocrystal and diatomic zincblende crystal. In this work we elaborate our points more clearly and go further by explaining how SBHM can really reproduce experimental results using only one fitting parameter and describe in length the mechanism and physical assumption that lead to the final SHG intensity formula and how it should be intepreted. For clarity we organize this work as follows: we start by describing the instrumental setup of our experiment in Section II. We then proceed into Section III by introducing the force equation followed by defining the corresponding bond direction for the unit cell and how it is inserted into the nonlinear SHG polarization. In Section IV we compare the model with the point group symmetry of diatomic zinc blende and check whether the two apporaches yields the same susceptibility tensor. Section V gives a complete expression for the 4 polarization SHG intensity of GaAs that is obtained using SBHM. The experimental result is then fitted with the additional requirement of Fresnel equation as an important incorporation to the model. Finally, a brief summary describing the major points is presented. ## II. ROTATIONAL ANISOTROPY SHG EXPERIMENTAL SETUP Here we present our experimental setup and explain how the SHG intensity curve is obtained. Rotation anisotropy SHG (RA-SHG) is a technique that is able to monitor the crystal structure and the microgeometry of the surface of centrosymmetrical mediums which is often not available using linear diagnostic optical methods. The schematic configuration of the experimental setup for RA-SHG measurements is shown in Fig. 1. A diode pumped Nd:LSB solid-state sub-nanosecond (0,6 ns) pulse laser with wavelength of 1064 nm was used as a source of radiation. The fundamental radiation goes out of the laser and Figure 1: Scheme of the RA- SHG setup. The following notations are used: HWP - half-wave plate, PMT- photomultiplier tube, G-T polarizer - Glan-Taylor calcite polarizer, F - filter, L1, L2 - microscope objectives. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-81b92f09-a83d-4414-a9b7-9152c1f90b66.jpg) is passed through the power variable attenuator. After that the beam is directed to the half-wave plate which determines the orientation of the plane of polarization of the incident beam. Passing through filter (F) ensures that only laser light at fundamental wavelength is focused on the sample by the lens. The beam is then focused onto the sample by the lens L 1 with focal distance 25 mm that provides a spot diameter of ≈ 10 µm in the focal position. The incident angle of the fundamental radiation is 45 ◦ with respect to the surface normal. The sample is placed on the motorized rotation stage which allows rotating the sample in the azimuthal plane. The reflected SHG and the fundamental radiations are collected by the second lens L 2 and are directed towards the Glan-Taylor calcite polarizer which is used as an analyzer of the polarization state of the SHG radiation. After that the radiation is directed to the Pellin-Broca prism near Brewster's angle minimizing reflection losses in p -polarized light. Then, the radiation exits at 90 ◦ with respect to the input direction plus a small angle due to dispersion which is less for longer wavelengths. Due to this, SHG and residual fundamental radiations exit at different angles. The SHG radiation is passed to the photomultiplier tube (R7518, Hamamatsu) having a high sensitiveness at wavelength λ SHG = 532 nm through the slit, which blocks the residual fundamental radiation. At the output of PMT, electric signal is gained by lock-in-amplifier SR830 (Stanford Research system). The gained electric signal is recorded in the memory of computer by an acquisition card PCI-6110 from "National Instrument". The process of measurement is performed in automatic mode under control of personal computer and software "Labview". The average power of the incident radiation in the focal plane was set 35 mW that is lower than the damage threshold. ## III. BOND MODEL FOR SHG IN ZINCBLENDE DIATOMIC CRYSTAL SBHM is a classical model that in its most simplified form takes the following assumptions: The nonlinear radiations are only produced by anharmonic dipoles that are oscillating along the bonds. Before proceeding further we would like to point out various sources that can generate SHG inside the material. For the case of a centrosymmetric structure such as Si, dipole radiation inside the bulk is forbidden due to the fact that a symmetric potential leads to zero even order hyperpolarizability. However at the surface there is anisotropy and the symmetry is broken, therefore SHG can be generated from dipoles at the surface [23]. Also because there is a field gradient due to absorption SHG can also be generated inside the bulk by quadrupolar effects. However, in a noncentrosymmetric crystal SHG dipole radiation is now allowed inside the bulk[24]. For GaAs this noncentrosymmetricity is due to the existence of two different atoms that sit in the center of each domain. It will be shown later that for this case the hyperpolarizability is not canceling out. Furthermore because the driving field can of course experience significant decay there can be bulk quadrupolar effects too whose strength depend on the field decay gradient and penetration depth of the crystal. However if we assume that the field decay is sufficiently low there is not much difference between the fields strength at the layers below the first bulk layer and bulk dipoles then become the sole dominating SHG source. In this work we limit ourself to bulk dipoles only and show later on that this assumption can fit RA-SHG experiment nicely. The GaAs atomic structure inside the bulk is zincblende. Each atom is surrounded by 4 bonds forming a tetrahedral structure and has a sp 3 atomic orbital. The highest probability density of finding an electron is along the bond. Thus if the driving force has higher electric field component that is parallel in the direction of the bond it will produce a higher SHG contribution than if the field is aligned more perpendicular to the bond. Furthermore, the strength of the oscillation also depends on how easy the charges are moved by the driving field relative to the heavy nuclei which we assume at rest thus forming a static lattice. Therefore the electron nonlinear radiation also depends on the type of atom at the center of the tetrahedral cell. In the model, this effect is incorporated by specifying a different hyperpolarizability for the Ga and As atom. Figure 2: GaAs (001) configuration inside the bulk showing the bond direction relative to the coordinate system. The vector is defined by taking the center of the domain as the (0,0,0) coordinate. Each cube represents a domain consisting of four bonds. The system may freely rotate around the z -axis. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-f7264545-4263-4fa0-b314-a4acc8f50cba.jpg) In the (001) direction the configuration of the bonds is depicted in Fig. 2 repeating itself along the z direction. The choice of the coordinate system is arbitrary but we choose it in such a way so that it corresponds to the coordinate system choosen for comparison with group theory. To analyze the symmetry more clearly we define two atomic domains labelled 1 and 2 each consisting of four bonds with two bonds directed upwards and two downwards but a different atom sitting in the center. Here we take for the first domain Ga as the center and for the the second domain As as the center. If the two centers happened to be the same atom as in the case of Si we would have a center of inversion that lies in the diagonal ends between the two domains. The definition of the bond orientation in domain 1 is as follows $$\hat { b } _ { 1 } = \left ( \begin{array} { c } - \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ - \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ - \cos \frac { \beta } { 2 } \end{array} \right ) \quad \hat { b } _ { 2 } = \left ( \begin{array} { c } \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ - \cos \frac { \beta } { 2 } \end{array} \right ) \quad \hat { b } _ { 3 } = \left ( \begin{array} { c } - \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ \cos \frac { \beta } { 2 } \end{array} \right ) \quad \hat { b } _ { 4 } = \left ( \begin{array} { c } \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ - \frac { 1 } { \sqrt { 2 } } \sin \frac { \beta } { 2 } \\ \cos \frac { \beta } { 2 } \end{array} \right ) \ ( 1 )$$ where β = 2arccos[1 / √ 3] ≈ 109 4 . 0 is the angle between each bond. Meanwhile, a closer inspection to the geometry of the system quickly reveals that the bond orientation in the second domain is the same as in domain 1 but with a rotation of 90 degree about the z axis or about the [110] plane. Thus the bond orientation in domain 2 can be written as $$\hat { b } _ { 5 } = - \hat { b } _ { 1 } \quad \hat { b } _ { 6 } = - \hat { b } _ { 2 } \quad \hat { b } _ { 7 } = - \hat { b } _ { 3 } \quad \hat { b } _ { 8 } = - \hat { b } _ { 4 }$$ Figure 3: Bond vector orientation of the two domains centered at (0,0,0) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-b6f6d06b-f46e-4ed3-9482-9e0a2bcf5822.jpg) Because each of the bond contribute SHG we must sum up over all eight bonds to obtain the total SHG radiation. It has to be noted that in the model all the bond vectors are defined relative to one center as depicted in Fig.3. This does not change the physics in the sense that nonlinear polarization wavelength is far larger than the domain distance so that the driving field that is experienced by each domain is practically the same. The hyperpolarizability of the first 4 bonds is the same but differs from the last four bonds, thus they are not cancelling each other out as in the case of Si(001) where the hyperpolarizability inside the bulk is the same for all 8 bonds. Classically, nonlinearity can be seen as produced by a nonlinear polarization source term inside the material. This nonlinear source term is due to anharmonic oscillatory motion of the bound charge that is driven by the fundamental field. This anharmonic oscillation in turn produces a nonlinear radiation which can be detected in the far field. As noted by Aspnes in Ref. [27] this method is inspired by the Ewald-Oseen extinction theory where it has been shown in Ref. [28] that the formulas for reflection and transmission in linear optics can be derived microscopically within a classical framework in agreement with the macroscopic derivation using Maxwell boundary conditions. Therefore an extension into nonlinear optics by summing the nonlinear dipole contribution is a logical and ingenious step. For the sake of clarity and comprehention, we derive the microscopic expression for the nonlinear polarization source starting from the nonlinear force equation taking the equilibrium position as zero [10, 29]: $$F = q _ { j } \vec { E } \hat { b _ { j } } e ^ { - i \omega t } - \kappa _ { 1 } x - \kappa _ { 2 } x ^ { 2 } - \gamma \dot { x } = m \ddot { x }$$ here q, m, x are the electron charge, mass, and its displacement from equilibrium, respectively and κ 1 and κ 2 are the harmonic and anharmonic spring constants, and the term -γx ˙ is the common frictional loss in oscillation. Solving for glyph[triangle] x 1 and glyph[triangle] x 2 by using the assumption that x can be written as x = x 0 + glyph[triangle] x e 1 -iωt + glyph[triangle] x e 2 -i 2 ωt gives for the lowest order of approximation: $$\triangle x _ { 1 } = \frac { \hat { b } _ { j } \cdot \vec { E } } { \kappa _ { 1 } - m \omega ^ { 2 } - i \gamma \omega }$$ $$\triangle x _ { 2 } = \frac { \kappa _ { 2 } } { \kappa _ { 1 } - 4 m \omega ^ { 2 } - i \gamma 2 \omega } \left ( \frac { \hat { b _ { j } } \cdot \vec { E } } { \kappa _ { 1 } - m \omega ^ { 2 } - i \gamma \omega } \right ) ^ { 2 }$$ defining the linear and second order polarization that are produced by each bond b j as p 1 j = q j glyph[triangle] x 1 = α 1 j ( ˆ b j · glyph[vector] E ) and p 2 j = q j glyph[triangle] x 2 = α 2 j ( ˆ b j · E ) 2 where α 1 and α 2 are the microscopic polarizability and second order hyperpolarizability. Because there are two atoms we have two linear susceptibilites α 1 Ga and α 1 As as well as two hyperpolarizabilities α 2 Ga and α 2 As . In our experiment, the sample is rotated about the z axis so we need to define a more general bond direction by allowing rotation along the [011] plane $$\hat { b } _ { j } ( \phi ) = R _ { z } ( \phi ) \cdot \hat { b } _ { j }$$ where R z ( φ ) is the common rotation matrix $$R _ { z } ( \phi ) = \begin{pmatrix} \cos \phi & - \sin \phi & 0 \\ \sin \phi & \cos \phi & 0 \\ 0 & 0 & 1 \end{pmatrix}$$ The total linear and second harmonic polarization produced by all the bonds inside the bulk allowing rotation are thus : $$\underset { \text{uus} } { \text{uus} } \,.$$ and $$\vec { p _ { 2 } } = \frac { 1 } { V } \sum _ { j = 1 } ^ { n } \alpha _ { 2 j } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right ) ^ { 2 }$$ where n = 8 if we use two domains and n = 4 if we use one domain. Because each domain contains different atoms at its center we have two polarizabilities and hyperpolarizabilities. Therefore the total linear polarizability from the two domains is $$\vec { p _ { 1 } } = \frac { 1 } { V } \sum _ { j = 1 } ^ { 4 } \alpha _ { 1 G a } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right ) + \frac { 1 } { V } \sum _ { j = 5 } ^ { 8 } \alpha _ { 1 A s } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right )$$ whereas the total SHG polarizability is $$\vec { p _ { 2 } } = \frac { 1 } { V } \sum _ { j = 1 } ^ { 4 } \alpha _ { 2 G a } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right ) ^ { 2 } + \frac { 1 } { V } \sum _ { j = 5 } ^ { 8 } \alpha _ { 2 A s } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right ) ^ { 2 }$$ here we assume that the susceptibility and hyperpolarizability does not depend on the orientation of the j -th bond relative to the field but only depends on the type of the atomic center because they are inside the bulk We can write the total bulk polarization in a more compact form $$\vec { P } = \chi _ { 1 G a } \vec { E } + \chi _ { 1 A s } \vec { E } + \chi _ { 2 G a } \vec { E } \vec { E } + \chi _ { 2 A s } \vec { E } \vec { E }$$ where V is the volume and χ 1 and χ 2 are the first- and second-order suceptibility tensors of the system. In the preceding equation the nomenclature highlights already the tryadic product of the bond directions, as well the dyadic product of the electric fields. Although there are two different hyperpolarizabilities for the SHG polarization the experimenter cannot distinguish the SHG contribution from the first and second domain and thus can only measure the effective hyperpolarizability/susceptibility. In other words because each bond in a domain has its corresponding antibond with a negative bond vector in the other domain the total SHG radiation is the difference between the SHG radiation from the first and second domain. In other words due to the symmetric fact we can reduce the problem from eight bonds (2 domains) into four bonds (effective domain) by introducing the effective hyperpolarizability $$\alpha _ { 2 G a A s } = ( \alpha _ { 2 G a } - \alpha _ { 2 A s } )$$ Therefore Eq. (13) for the SHG part now can be written as $$\vec { P } _ { S H G } = \frac { 1 } { V } \sum _ { j = 1 } ^ { 4 } \alpha _ { G a A s } \hat { b } _ { j } ( \phi ) \left ( \hat { b } _ { j } ( \phi ) \cdot \vec { E } \right ) ^ { 2 } = \chi _ { G a A s } ^ { ( 2 ) } \vec { E } \vec { E }$$ where we have for our coordinate system the definition of the incoming unit vector for the fields: $$\hat { E } _ { p } = \left ( \begin{array} { c } \cos \theta _ { i } \\ 0 \\ \sin \theta _ { i } \end{array} \right )$$ $$\hat { E } _ { s } = \left ( \begin{array} { c } 0 \\ 1 \\ 0 \end{array} \right )$$ The nonlinear third rank tensor χ (2) GaAs in Eq.(14) is obtained by direct product over all the bond directions. One might ask the question whether such an operation is a valid way in obtaining the tensor. Therefore, a comparison of the tensor from group theory is presented. ## IV. GROUP THEORY ANALYSIS OF GALLIUM ARSENIDE Group theory is a mathematical tool that can be applied to investigate the group of symmetry that belongs to a crystal. It is related to the physics by the so called Neumann's Principle [22]: 'The symmetry elements of any physical crystal property must include the symmetry elements of the crystal point group.' In other words the optical properties such as the nonlinear susceptibility that are attributed to a certain crystal must contain the tensorial elements obtained from group theory. The latter is obtained by investigating all the allowed symmetric operations such as rotation and reflection for specific mirror planes. The allowed operations are those that do not change the physics or crystal properties and form a point group. Fortunately the symmetry groups of the second and third rank tensor (or even fourth rank tensor) for several crystal orientations are well known and can be found in standard group theory literature such as Nye [25] or books that focus on group theory applications [26]. As can be seen from Fig. 4 GaAs conventional cell is a zincblende which can be generated using tetrahedral structures. We have shown in the previous section that inside the bulk the 8 bonds can be decomposed into a 4 bond tetrahedral with an effective susceptibility. This structure has a symmetry group called T d and has a third rank tensor in the form $$\chi _ { i j k } ^ { ( 2 ) } = \left ( \begin{array} { c c c c } 0 & 0 & 0 \\ 0 & 0 & d _ { 1 3 2 } \\ 0 & d _ { 1 3 2 } & 0 \\ \left ( \begin{array} { c c c c } 0 & 0 & d _ { 1 3 2 } \\ 0 & 0 & d _ { 1 3 2 } \\ 0 & 0 & 0 \\ d _ { 1 3 2 } & 0 & 0 \\ \left ( \begin{array} { c c c c } 0 & d _ { 1 3 2 } & 0 \\ d _ { 1 3 2 } & 0 & 0 \\ d _ { 1 3 2 } & 0 & 0 \\ 0 & 0 & 0 \end{array} \right ) \\ \end{array} \right )$$ where d 132 = χ 123 is an arbitrary constant that in this case must be fitted. It is interesting that already here GT demand only one arbitrary parameter for the fit. The effective third rank tensor describing SHG can be obtained from Eq. (14) $$\chi _ { i j k } ^ { ( 2 ) } = \frac { \alpha _ { 2 G a A s } } { V } \sum _ { j = 1 } ^ { 4 } b _ { j } ( \phi ) \otimes b _ { j } ( \phi ) \otimes b _ { j } ( \phi )$$ The next step is to apply the same initial coordinate that is applied in the standard textbooks and those from the SBHM because in general the tensor elements contain a rotation matrix whereas in Ref. [25,26] they are fixed on the coordinate given in Fig. [4]. As can been seen it turns out that they are the same for this case because we have choosen the bond direction definition before in such a way so that it does not need to be rotated. This will not be the case for other orientations e.g. GaAs(111) where one has to perform two rotations for the comparison. Therefore we can simply set φ = 0 in Eq. (18) and generate the third rank tensor which takes the form [22]: ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-cea45331-c298-4769-b1ee-f168ec591b1d.jpg) which is exactly the same as the tensor in Eq.(17) obtained by group theory. Thus we have demonstrated that for the GaAs bulk SBHM and GT gives the same tensor elements and the same independent parameter which is the effective susceptibility. If there would have been a different result one could have questioned the validity of SBHM in modelling the experiment because of violation of the Neumann's principle. Figure 4: (a) Definition of the SBHM GaAs (001) bond coordinate and (b) the configuration used in group theory textbook , Refs.[25,26]. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-38bff22f-e425-46c1-98d5-42381e0f036f.jpg) ## V. EXPERIMENTAL RESULTS AND DISCUSSION In this section we compare the experimental result from RA-SHG spectroscopy on GaAs with SBHM. With the assumption that the bond charges radiate as dipoles, the far-field radiation E ff can be written as [10,16,29] $$\vec { E } _ { f f } = k ^ { 2 } \frac { e ^ { i k r } } { r } \left ( \vec { P } - \hat { k } \left [ \hat { k } \cdot \vec { P } \right ] \right ) = k ^ { 2 } \frac { e ^ { i k r } } { r } \left ( I - \hat { k } \hat { k } \right ) \cdot \vec { P }$$ where k is the direction of the outgoing (observer) SHG wave and can be written for the p -input case $$\hat { k } = \sin \theta _ { o } \hat { x } + \cos \theta _ { o } \hat { z }$$ Eq. (20) can be evaluated to obtain the four polarization intensities p -in p -out, p -in s -out, s -in p -out, and s -in s -out: $$\mathbf I _ { p p } \, = \, \frac { 4 } { 2 7 } \alpha \alpha ^ { * } \sin ^ { 2 } 2 \phi \cos ^ { 2 } \theta _ { i } \left ( 3 \sin \left [ \theta _ { i } - \theta _ { 0 } \right ] + \sin \left [ \theta _ { i } + \theta _ { 0 } \right ] \right ) ^ { 2 }$$ $$I _ { p s } \, = \, \frac { 1 6 } { 2 7 } \alpha \alpha ^ { * } \cos ^ { 2 } 2 \phi \sin ^ { 2 } 2 \theta _ { i }$$ $$I _ { s p } \, = \, \frac { 1 6 } { 2 7 } \alpha \alpha ^ { * } \sin ^ { 2 } 2 \phi \sin ^ { 2 } \theta _ { o }$$ $$I _ { s s } \, = \, 0$$ where we have abbreviated α 2 GaAs as α . From the SHG intensity formulas above it is straightforward to see that the produced azimuthal rotational SHG intensities (except for ss which is zero) should be 4 fold due to the sin (2 2 φ ) or cos (2 2 φ ) term which also suggest a phase shift of φ = 45 o between the ps and the other two polarizations, the latter two being in phase to each other. Physically for the given configuration the dipoles oscillating along the bonds radiate a stronger field when measured in the s -out direction rather than the p -out. The most interesting feature however is that the intensity requires only one experimental parameter (see Eq. (19)) which is the effective hyperpolarizability or α 2 GaAs . Fig. (5) depicts the simulation for the incoming fundamental and outgoing SHG. In the experiment the incoming field is incident at θ i = θ o = 45 0 but because it is the bulk dipole that radiates SHG driven by the fundamental field inside the bulk, the angle is adjusted using Snell's law by taking n ωGaAs = 3 4 . so that θ i = 12 0 and because the outgoing wave is radiating at 2 ω therefore Figure 5: GaAs (001) experiment vs theory. (a) Sketch of the change of the driving field and SHG field direction inside the material. (b) RA-SHG experiment (c) SBHM simulation without Fresnel coefficients (d) SBHM simulation with Fresnel coefficient included. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1185v4-figure-7817b471-9b17-433d-b1dc-077d55f92b03.jpg) we use n 2 ωGaAs = 3 6 . resulting in θ o = 11 3 . 0 (see the sketch in Fig 5a). The fitting result is seen in Fig. 5c and gives a good match for α 2 GaAs = 2 8 . where we put a dc factor 0 1 . to model the experimental noise (viewed as a circle around the center). What is not satisfied is that the pp and sp SHG radiation are likely in the same order which is contradictory to the experiment given in Fig 5b. However, we found that this problem can be resolved if we include the Fresnel coefficients which is incorporated in standard SHG phenomenological theory [7] but as far as we know has never been implemented in SBHM. Using the well known Fresnel formulas with n 1 = 1 (air), n 2 = 3 4 . (GaAs refractive index for ω ), and n 22 = 3 6 . (GaAs for 2 ω ) we obtain for the p and s transmission fundamental coefficients from the air to the material: $$t _ { p } = \frac { 2 n _ { 1 } \cos \theta _ { o } } { n _ { 2 } \cos \theta _ { i } + n _ { 1 } \cos \theta _ { o } } = \frac { 2 ( 1 ) \cos 1 2 ^ { \circ } } { 3. 4 \cos 4 5 ^ { \circ } + 1 \cos 1 2 ^ { 0 } } \approx 0. 5 8$$ $$t _ { s } = \frac { 2 n _ { 1 } \cos \theta _ { i } } { n _ { 1 } \cos \theta _ { i } + n _ { 2 } \cos \theta _ { t } } = \frac { 2 ( 1 ) \cos 4 5 ^ { \circ } } { 1 \cos 4 5 ^ { \circ } + 3. 4 \cos 1 2 ^ { 0 } } \approx 0. 3 5$$ whereas for the p and s SHG transmission from the material to air coefficents: $$t _ { 2 p } = \frac { 2 n _ { 2 2 } \cos \theta _ { o } } { n _ { 1 } \cos \theta _ { i } + n _ { 2 2 } \cos \theta _ { o } } = \frac { 2 ( 3. 6 ) \cos 1 1. 3 ^ { \circ } } { 1 \cos 4 5 ^ { \circ } + 3. 6 \cos 1 1. 3 ^ { \circ } } \approx 0. 4 3$$ $$t _ { 2 s } = \frac { 2 n _ { 2 2 } \cos \theta _ { i } } { n _ { 2 2 } \cos \theta _ { i } + n _ { 1 } \cos \theta _ { t } } = \frac { 2 ( 3. 6 ) \cos 4 5 ^ { \circ } } { 3. 6 \cos 4 5 ^ { \circ } + 1 \cos 1 1. 3 ^ { \circ } } \approx 0. 4 0$$ Because the nonlinear polarization is proportional to the square of the driving field the transmission coefficient of the fundamental from air to media has to be squared whereas the SHG radiation is proportional to the 2 ω field. Therefore for the pp , ps , and sp one has the following Fresnel coefficients $$f _ { p p } = t _ { p } t _ { p } t _ { 2 p } \approx 0. 1 4 3$$ $$f _ { p s } = t _ { p } t _ { p } t _ { 2 s } \approx 0. 1 3 6$$ $$f _ { s p } = t _ { s } t _ { s } t _ { 2 p } \approx 0. 0 5 3$$ Therefore the sp SHG intensity is about f sp f pp ≈ 0 37 . times smaller than the pp polarization and this has to be accounted in the model. Also the pp SHG intensity is just slightly larger than the ps by a factor of f pp f ps ≈ 1 05 . . Doing this adjustment one arrives at Fig. 5d this time with α 2 GaAs = 3 which gives a good fit when compared to the RA-SHG data. However the pp SHG polarization intensity is smaller than in the experiment. We attribute this due to neglect of possible surface interface contribution where there is perhaps an additional field along the z direction which is clearly the case in Ref. [21] that contributing to the increase in p out polarization, but this is still an open question and requires further investigation. ## VI. SUMMARY We have provided for the first time a comprehensive analysis of SHG in reflection from a diatomic zincblende structure e.g. GaAs involving the bond model, group theory, and state the importance of including Fresnel analysis in SBHM. We show by considering bulk dipole as the main SHG contribution in GaAs that the third rank hyperpolarizability tensor obtained by assuming anharmonic SHG dipole oscillation along the bond (SBHM) is exactly equal with the tensor obtained from group theory (GT) which is the T d point group. Both SBHM and GT demand only one independent parameter in the form of an effective hyperpolarizability to fit the RA-SHG experiment. The model correctly predicts the phase and the 4 fold symmetry and gives a good agreement of the SHG intensity profile if Fresnel coefficients are further incorporated in SBHM. Acknowledgements : The authors would like to thank financial support by the Austrian Federal Ministry of Economy, the Austrian Family and Youth and the Austrian National Foundation for Research, Technology and Development. H.H. would also like to acknowledge funding from the Technology Grant Southeast Asia. ∗ email: hendradi\[email protected] - 1 P. A. Franken, A. E. Hill, C. W. Peters, and G. Weinreic , Phys. Rev. Lett. 7, (1961). - 2 J. A. Armstrong, N. Bloembergen, J. Ducuing, and P. S. Pershan, Phys. Rev. 127, (1962) - 3 N. Bloembergen, R. K. Chang, S. S. Jha, and C. H. Lee, Phys.Rev. 174, 813 (1968). - 4 J. F. McGilp, Surface Review and Letters, Vol. 6, Nos. 3 -4 , 529-558 (1999) - 5 T. A. Driscoll and D. Guidotti, Phys. Rev. B 28, (1983). - 6 J. A. Litwin, J. E. Sipe, and H. M. van Driel, Phys. Rev. B 31, (1985) - 7 V. Mizrahi and J. E. Sipe, J. Op. Soc. Am. B. 5, 233402 (1988). - 8 G. Luepke, D. J. Bottomley, and H. M. van Driel, J. Opt. Soc. Am. B 11, 33 (1994). - 9 M. Scalora1, M. A. Vincenti, D. de Ceglia, N. Akozbek, V. Roppo, M. J. Bloemer, and J. W. Haus, Phys. Rev. A 85, 053809 (2012) - 10 G. D. Powell, J.-F. Wang, and D. E. Aspnes, Phys. Rev. B 65, 205320 (2002). - 11 P. Ewald, Ann. Phys. 49, 1 (1916). - 12 C. W. Oseen, Ann. Phys. 48, 1 (1990). - 13 D. Aspnes, Phys. Status Solidi B 2 247, 1873 (2010). - 14 J. F. McGilp, J. Phys.: Condens. Matter 19 (2007) 016006 (13pp). - 15 E. J. Adles and D. E. Aspnes , Phys. Rev. B 77, 165102 (2008) . - 16 J. Kwon, M. C. Downer, and B. S. Mendoza, Phys. Rev. B 73, 195330 (2006). - 17 H. J. Peng, E. J. Adles, J.-F. T. Wang, and D. E. Aspnes, Phys. Rev. B 72, 205203 (2005) - 18 S.R. Armstrong, R.D. Hoare, M.E. Pemble, I.M. Povey, A. Stafford and A.G. Taylor, Journal ofCrystal Growth 120 (1992) - 19 M.i Takebayashi, Goro Mizutani , Sukekatsu Ushioda Optics Communications 133, (1997) - 20 Y.-S. Lee, M. H. Anderson, and M. C. Downer, Opt, Lett., Vol. 22, No. 13. 1997 - 21 Brian A. Ruzicka, Lalani K. Werake, Guowei Xu, Jacob B. Khurgin, E. Ya. Sherman, Judy Z. Wu, and Hui Zhao, Phys. Rev. Lett. 108, 077403 (2012) - 22 Adalberto Alejo-Molina, Hendradi Hardhienata, and Kurt Hingerl, JOSA B, Vol. 31, Issue 3, pp. (2014) - 23 J.-F. T. Wang, G. D. Powell, R. S. Johnson, G. Lucovsky, and D. E. Aspnes, J. Vac. Sci. Technol. B 20, (2002) - 24 R. W. Boyd, Nonlinear Optics, 2nd ed. (Academic, 2003) - 25 J. F. Nye, Physical Properties of Crystals, Their Representations by Tensors and Matrices (Clarendon, 1957) - 26 R. C. Powell, Symmetry, Group Theory, and the Physical Properties of Crystals, Lecture Notes in Physics (Springer, 2010). - 27 D. Aspnes, Phys. Status Solidi B 2 247, 1873 (2010). - 28 Fearn, James, and Milonni] H. Fearn, D. F. V. James, and P. W. Milonni, Am. J. Phys. 64, 986 (1996). - 29 H. Hardhienata, A. Prylepa, D. Stifter, and K. Hingerl, J. Phys. 423, 012046 (2013)
null
[ "Hendradi Hardhienata", "Adalberto Alejo-Molina", "Andrii Prylepa", "Cornelia Reitböck", "David Stifter", "Kurt Hingerl" ]
2014-08-06T05:00:34+00:00
2014-09-12T06:55:09+00:00
[ "cond-mat.mtrl-sci" ]
Bond Model and Group Theory of Second Harmonic Generation in GaAs(001)
A comprehensive analysis of second harmonic generation (SHG) in a diatomic zincblende crystal based on the Simplified Bond Hyperpolarizability Model (SBHM), Group Theory (GT) is presented. The third rank tensor between the two approaches are compared and applied to reproduce rotational anisotropy (RA) SHG experimental result.It is well known that such a crystal is noncentrosymmetric, therefore the second harmonic generation source is dominated by bulk dipoles with a SHG polarization $P_{BD}=\chi_{ijk}^{(2)}E(\omega)E(\omega)$. We show that the SBHM previously applied to mono crystal system such as Silicon can also be applied to an atomic cell containing two different atoms e.g. GaAs by introducing an effective hyperpolarizability $\alpha_{2GaAs}=\left(\alpha_{2Ga}-\alpha_{2As}\right)$ . Comparison with GT yields the same third rank tensor for a $T_d$ point group corresponding to bulk tetrahedral structure. Interestingly, SBHM gives good agreement with RASHG experiment of GaAs using only one single fitting parameter when Fresnel analysis is also incorporated in the model.
1408.1187v1
## The functional mean-shift algorithm for mode hunting and clustering in infinite dimensions Mattia Ciollaro Christopher R. Genovese Jing Lei Larry Wasserman [email protected] [email protected] [email protected] [email protected] Department of Statistics Carnegie Mellon University 5000 Forbes Avenue Pittsburgh (PA) 15213 USA Editor: ADD EDITOR ## Abstract We introduce the functional mean-shift algorithm , an iterative algorithm for estimating the local modes of a surrogate density from functional data. We show that the algorithm can be used for cluster analysis of functional data. We propose a test based on the bootstrap for the significance of the estimated local modes of the surrogate density. We present two applications of our methodology. In the first application, we demonstrate how the functional mean-shift algorithm can be used to perform spike sorting , i.e. cluster neural activity curves. In the second application, we use the functional mean-shift algorithm to distinguish between original and fake signatures. Keywords: Clustering, Functional data analysis, mean-shift algorithm, Mode hunting, Surrogate density ## 1. Introduction A probability density function contains information that can be used for clustering data drawn from that distribution. Figure 1 depicts a probability density function that is a mixture of two distinct unimodal densities. Intuitively, we can say that this density represents two clusters. To unambiguously characterize the two clusters, we can use the basin of attraction of each local mode: if we repeatedly shift a point x 0 on the x axis along the direction of steepest ascent, the sequence thus generated converges either to the left or to the right local mode. If the destination of x 0 is the left (right) local mode, then x 0 belongs to the basin of attraction of the left (right) local mode. The set of points in the domain of the density whose common destination is the left (right) local mode naturally form a welldefined cluster. This idea of modal clustering easily generalizes to q -dimensional densities (Figure 2). If the density is unknown, as is usually the case in statistical inference, a set of empirical local modes and the corresponding set of empirical clusters can be obtained by performing the above procedure on an estimate of the density. Figure 1: A probability density function representing two clusters. Each cluster is the basin of attraction of a local mode. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-dfffb8f2-fe73-4cdb-8d22-cb8fc0ba6f95.jpg) In this paper, we extend the idea of modal clustering to non-Euclidean spaces of infinite dimension. We demonstrate that: - 1. We can meaningfully define a surrogate notion of density in an infinite dimensional space that lacks a natural dominating measure. - 2. We can find the local modes of this surrogate density and the corresponding clusters. - 3. We test if, given a sample of infinite dimensional data, a set of estimated local modes and their corresponding clusters are significant or only due to random fluctuation. In particular, - 1. We consider a surrogate of the notion of probability density that does not require the existence of a dominating measure. Suppose that the probability associated to the open ball of radius glyph[epsilon1] centered at the element x of the infinite dimensional space X admits the asymptotic approximation $$P ( X \in B ( x, \epsilon ) ) = p ( x ) \phi ( \epsilon ) + o ( \phi ( \epsilon ) )$$ for a functional p and a function φ glyph[epsilon1] ( ) as glyph[epsilon1] → 0. Then, we call the functional p a surrogate density for P . This p can be consistently estimated. - 2. We generalize the mean-shift algorithm , a simple and fast iterative procedure that estimates the local modes of a probability density, to functional data and surrogate densities. The functional mean-shift algorithm repeatedly shift a point x ∈ X towards its closest local sample mean using the update equation $$x \leftarrow \frac { \sum _ { X \in S } k \left ( \frac { d ( X, x ) } { h } \right ) X } { \sum _ { X \in S } k \left ( \frac { d ( X, x ) } { h } \right ) },$$ Figure 2: Modal clustering on a bivariate density with compact support. The density has three local modes and therefore three well-defined clusters. Within each basin of attraction, the gradient ascent path of a point that belongs to that basin is highligthed. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-90f318e4-43e1-4302-b3fe-af223cad6c58.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-8d6b9af7-9bf2-404d-8229-0f1edb7ea385.jpg) where X is an element of the sample S = { X ,. . . , X 1 n } ⊂ X , k is a kernel function, d is a suitable distance, and h &gt; 0 is a bandwidth parameter. The sequence generated by the above update equation converges to a critical point x ∗ of a kernel density estimate of the unknown surrogate density p . - 3. We construct a bootstrap test for the significance of the estimated local modes. Suppose that x ∗ is a candidate local mode of the unknown surrogate density p . We test whether the curvature of the surrogate density p at x ∗ is negative: $$H _ { 0 } & \colon \lambda _ { x ^ { * } } \geq 0 \\ & \text{vs.} \\ H _ { 1 } & \colon \lambda _ { x ^ { * } } < 0,$$ where λ x ∗ = sup ‖ y ‖ =1 p (2) x ∗ ( y, y ) and p (2) x ∗ is the Hessian of the surrogate density p at x ∗ . We illustrate our methodology and its performance with two applications on smooth curves. The first application aims at clustering a set of curves corresponding to the neural activity of a Macaque monkey performing a particular task. In the second application, we apply our methodology to distinguish between original and fake signatures. ## 2. Related literature The problem of estimating the mode of an unknown probability density dates back at least as early as Parzen (1962). The work of Parzen has been extended in several directions, for instance by Chernoff (1964), who shows the asymptotic normality of the sample mode, Eddy (1980), who studies its rate of convergence, and Romano (1988), who derives asymptotic minimax risk lower bounds. Donoho and Liu (1991) obtain the minimax rate for estimating a mode in one dimension. Vieu (1996) proposes four density mode estimators that attain the same rate of convergence of Eddy (1980). Klemel¨ a (2005) proposes an adaptive estimator which attains the optimal rate of convergence. The more general problem of estimating nonparametrically the local modes of an unknown probability density has its roots in the seminal work of Fukunaga and Hostetler (1975) on the mean-shift algorithm (see also Silverman, 1981). The work of Fukunaga and Hostetler (1975), later generalized by Cheng (1995), also promotes the mean-shift algorithm as a tool for cluster analysis (Silverman, 1986). More recently, the algorithm has been widely used in the computer science community for image segmentation tasks (Comaniciu and Meer, 2002 and Carreira-Perpi˜´n, 2006). na The mechanics of the mean-shift algorithm are simple. An arbitrary point x ∈ R q is repeatedly shifted towards its closest local sample mean by the iterated application of the mean-shift update equation $$\intertext { a n o n } x \leftarrow \frac { \sum _ { X \in S } k \left ( \frac { \| X - x \| } { h } \right ) X } { \sum _ { X \in S } k \left ( \frac { \| X - x \| } { h } \right ) },$$ where X is a point belonging to the sample S = { X ,. . . , X 1 n } ⊂ R q , k is a kernel function, ‖·‖ denotes the usual Euclidean norm, and h &gt; 0 is a bandwidth parameter. The update is performed iteratively until convergence and the sequence of x 's thus generated determines a polygonal line which approximates the continuous gradient ascent path joining the initial point in the sequence and the closest candidate local mode of the unknown probability density of the X 's. More precisely, the polygonal line generated by the repeated application of the update equation (1) from an initial point x ∈ R q approximates the integral curve π x : R + → R q that solves the initial value problem $$\begin{cases} \pi _ { x } ^ { \prime } ( t ) = \nabla p ( \pi _ { x } ( t ) ) \\ \pi _ { x } ( 0 ) = x, \end{cases}$$ where p is the unknown probability density. The curve π x is also called a gradient flow line . A theoretical discussion about the connection between gradient ascent and the meanshift algorithm, including general results on the rates of convergence of the polygonal line generated by gradient ascent to the corresponding gradient flow line, can be found in AriasCastro et al. (2013). Chac´ on (2012) provides a formal justification of clustering based on high density regions and local modes by means of Morse theory. The basic idea is that a cluster can be defined as the set of points x in the domain of a probability density (with non-degenerate critical points) whose gradient ascent paths π x culminate at the same local mode, i.e. a cluster is the basin of attraction of a local mode (see also Li et al., 2007a). From the theory of differential equations, it is known that a curve π x satisfying the initial value problem (2) exists and is unique under appropriate regularity assumptions on p . Moreover, because distinct integral curves can only intersect at the stationary points of p , the equivalence class of points whose gradient flow lines culminate at the same local mode naturally forms a cluster, and the collection of these equivalence classes is a partition of the support of the density function. The definition of cluster as the basin of attraction of a local mode is particularly appealing from an inferential viewpoint, because it endows cluster analysis with a sound theoretical foundation. By embracing this definition, we have a clear dichotomy between the notion of population cluster , which corresponds to the set of points associated to the high density region surrounding a local mode of the unknown probability density, and that of empirical cluster , corresponding to the set of points associated to the high density region surrounding a local mode of the estimated probability density. Hartigan (1975) defines the population clusters of a probability distribution with density p as the connected components of the upper level sets of p . The connected components of the set L λ ( ) = { x ∈ R q : p x ( ) ≥ λ } for a given λ ≥ 0, are considered the population clusters of p . These clusters can be estimated by ˆ ( L λ ) = { x ∈ R q : ˆ( p x ) ≥ λ } , as soon as an estimate ˆ of p p is available, or otherwise by means of some other estimate of L λ ( ) (see, among others, Cuevas and Fraiman, 1997; Stuetzle, 2003; Azzalini and Torelli, 2007; Stuetzle and Nugent, 2010; Rinaldo and Wasserman, 2010). However, the fact that this definition of population cluster depends on the resolution parameter λ is a severe limitation and may represent a drawback in certain applications (see, for instance, Rinaldo et al., 2012). Furthermore, the computation of plug-in estimates of L λ ( ) and their connected components poses some difficulties and often requires intricate algorithms. Finally, a completely different approach to mode-based clustering based on persistent homology is considered by Chazal et al. (2013). Although the problem of estimating the local modes of a probability density and using them for cluster analysis has been extensively studied in the Euclidean case, and the mean- shift algorithm is widely used to perform this task, the same challenge has not received the same attention with functional data . Functional Data Analysis (Bosq, 2000; Ramsay and Silverman, 2005; Ferraty and Vieu, 2006; Horv´th and Kokoszka, 2012) is a modern a branch of statistics which deals with data that are intrinsically infinite dimensional such as functions, curves or surfaces. In the last two decades, several statistical methods (both parametric and nonparametric) that are fully developed for Euclidean data have been extended to the setting of random variables with infinite dimensional realizations. The theory of mode estimation for functional data is recent (see, for instance, Gasser et al., 1998; DaboNiang et al., 2004 or Ferraty and Vieu, 2006 and references therein), but the estimation of local modes for functional data has received less attention, and a principled extension of the mean-shift algorithm that is adapted to this type of data has not been devised. Similarly, the literature on clustering methods for functional data is not as vast as that for Euclidean data (the reader can refer to Jacques and Preda, 2013 for a recent review). In particular, density-based clustering has received scant attention in the setting of functional data, mainly because of the difficulty related to defining a probability density in infinite dimensional spaces. In this paper, we address these challenges by providing a statistical framework that allows us to define and interpret a mean-shift algorithm for functional data, which we call the functional mean-shift algorithm . ## 3. The mean-shift algorithm for Euclidean data The original mean-shift algorithm was proposed by Fukunaga and Hostetler (1975). The algorithm consists of repeatedly shifting a finite set of data points in the q dimensional Euclidean space towards their local sample means. More precisely, let S = { X ,. . . , X 1 n } ⊂ R q be a sample of i.i.d. random vectors with distribution P that has density p with respect to the Lebesgue measure. Then, Fukunaga and Hostetler (1975) define the mean-shift operator m ( ) as · $$m ( x ) = \frac { \sum _ { X \in S } K _ { h } ( X - x ) X } { \sum _ { X \in S } K _ { h } ( X - x ) } - x, \quad \quad \quad ( 3 )$$ where K is a kernel function and K h ( ) = · k ( ‖ · ‖ /h ). For instance, K may correspond to the boxcar kernel $$K ( x ) = k ( \| x \| ) = \begin{cases} 1 & \text{if } \| x \| \leq 1 \\ 0 & \text{if } \| x \| > 1 \end{cases},$$ or the Gaussian kernel $$K ( x ) = k ( \| x \| ) \in e ^ { - \frac { \| x \| ^ { 2 } } { 2 } }.$$ Here, ‖ · ‖ indicates the standard Euclidean norm, h &gt; 0 is a bandwidth parameter and $$x + m ( x ) = \frac { \sum _ { X \in S } K _ { h } ( X - x ) X } { \sum _ { X \in S } K _ { h } ( X - x ) }$$ is a local sample mean. For a general kernel function K x ( ) = k ( ‖ x ‖ ), the associated function k is referred to as the profile of K . The original mean-shift algorithm consists of repeatedly updating all the data points X ∈ S simultaneously according to the mean-shift update $$X \leftarrow X + m ( X )$$ until convergence. Because the data points X ∈ S tend to converge to a finite number of points ˜ M = { ˜ µ , . . . , µ 1 ˜ r } ⊂ R q , the algorithm can be used to perform clustering. In particular, the j -th cluster of data points is defined as the subset of X 's in S all converging to ˜ µ j after the repeated iteration of the mean-shift update. Cheng (1995) generalizes the original mean-shift algorithm proposed by Fukunaga and Hostetler (1975) and shows that the mean-shift algorithm includes k -means clustering as a limit case. He considers general isotropic kernels K and allows for the presence of positive weights ω in the local averaging of the sample points, so that the mean-shift operator of equation (3) now reads $$m ( x ) = \frac { \sum _ { X \in S } \omega ( X ) K _ { h } ( X - x ) X } { \sum _ { X \in S } \omega ( X ) K _ { h } ( X - x ) } - x.$$ Most importantly, Cheng (1995) allows the mean-shift operator m to act on any arbitrary subset of points in R q while keeping the sample S fixed, as opposed to the original Fukunaga and Hostetler (1975) version which applies equation (4) simultaneously to all the observed data points X ∈ S , in fact updating the entire sample S ← S + m ( S ) and thus generating a 'blurring' sequence of multi-sets. Today, Cheng's version of the algorithm is called the meanshift algorithm, and the original algorithm of Fukunaga and Hostetler is instead referred to as the blurring mean-shift algorithm. When using Cheng's mean-shift algorithm, one can imagine following the path generated by the update equation $$x \leftarrow x + m ( x ) = \frac { \sum _ { X \in S } \omega ( X ) K _ { h } ( X - x ) X } { \sum _ { X \in S } \omega ( X ) K _ { h } ( X - x ) }$$ from any arbitrary initial x ∈ R q while keeping the data points X ∈ S fixed. This operation corresponds to performing gradient ascent on the kernel density estimate $$\tilde { p } ( x ) = \frac { 1 } { n h ^ { q } } \sum _ { X \in \mathcal { S } } \omega ( X ) G _ { h } ( X - x )$$ of the true density p of the X 's based on a second kernel G (often called the shadow of K ). It is easy to verify that the mean-shift update of equation (6) corresponds to an update of the type $$x \leftarrow x + s ( x ) \nabla \tilde { p } ( x ),$$ where s x ( ) is a step size parameter depending on the current position x , and ∇ ˜( p x ) corresponds to the gradient of ˜ at p x . Equivalently, one can rewrite the update above as $$x \leftarrow x + s ( x ) \| \nabla \tilde { p } ( x ) \| a ^ { * } ( x ) = x + \bar { s } ( x ) a ^ { * } ( x ),$$ where the adaptive step size is $$\bar { s } ( x ) \in \| \nabla \tilde { p } ( x ) \| \frac { h ^ { 2 } } { \hat { p } ( x ) },$$ a ∗ is the unitary norm vector in the direction of the gradient ∇ ˜( p x ) and $$\hat { p } ( x ) = \frac { 1 } { n h ^ { q } } \sum _ { X \in \mathcal { S } } \omega ( X ) K _ { h } ( X - x )$$ is a kernel density estimate of the unknown density p using the kernel K . The unit norm vector a ∗ gives the direction of steepest ascent at x . The important feature of equation (8) is the adaptive nature of the step size: if the current position x corresponds to a low density position (i.e. x is far from a local mode), then ˆ( p x ) is small and the step in the direction of the gradient ascent is large; conversely, if the current position x corresponds to a high density position (i.e. x already is close to a local mode), then ˆ( p x ) is large and the step in the direction of gradient ascent is small. Thus, thanks to the adaptivity of the step size, low density regions are only visited for a small number of iterations while, at the same time, the algorithm does not overshoot in high density regions. The repeated application of the mean-shift update starting from an initial arbitrary point x ∈ R q generates a trajectory that eventually converges to a (candidate) local mode of the estimated density ˜. p This trajectory, which is a polygonal line, can be viewed as an estimate of the unknown gradient ascent path (or gradient flow line ) π x : R + → R q that solves the initial value problem $$\begin{cases} \pi _ { x } ^ { \prime } ( t ) = \nabla p ( \pi _ { x } ( t ) ) \\ \pi _ { x } ( 0 ) = x. \end{cases}$$ This feature of the algorithm allows us to determine a partition of R q in which each set of the partition corresponds to the basin of attraction of a local mode of the estimated density ˜, i.e. p the equivalence class of all the points x ∈ R q whose mean-shift trajectories culminate at the same local mode ˜ of ˜ (which is an estimate of the equivalence class of points µ p x ∈ R q whose unknown gradient flow lines of p converge to the same unknown local mode µ of p ). Similarly, a cluster of data points in the sample S can be defined as a subset of X 's in S whose mean-shift trajectories culminate at the same local mode of the estimated density ˜. p If the true density p was known, both the location and the number of the local modes M = { µ , . . . , µ 1 R } of p would be known. Therefore, if one accepts the above definition of cluster as basin of attraction of a local mode of the density, knowing p implies knowing the true population clustering of R q based on p . Because the true density p is generally unknown, the set M (and therefore the true population clusters) are instead estimated by performing gradient ascent on an estimate ˜ of p the true density p . The estimated local modes ˜ M = { ˜ µ , . . . , µ 1 ˜ r } and their corresponding basins of attraction based on ˜ thus p provide a natural estimate of the unknown true population clustering. Recent results about the convergence of empirical clusters to their corresponding population clusters have been obtained by Chac´n (2014). o ## 4. A statistical framework for the functional mean-shift algorithm In the remainder of the paper, we assume that the data S = { X ,. . . , X 1 n } consist of n i.i.d. random variables defined on a suitable abstract probability space (Ω , A , P ) and we further assume that each random variable X ∈ S takes values in a (potentially) infinite dimensional measurable Hilbert space ( X 〈· ·〉 , , ). The inner product induces a norm ‖ · ‖ on X , defined for any element x ∈ X as ‖ x ‖ = √ 〈 x, x 〉 . The norm ‖ · ‖ , in turn, generates a distance d , defined between any pair x, y of elements of X as d x, y ( ) = ‖ x - ‖ y . Often it can be difficult to define a density for P if X lacks a natural dominating measure. Whenever this is the case, we replace the notion of density with that of a surrogate density as in Gasser et al. (1998) and Ferraty et al. (2012). Specifically, let B x,glyph[epsilon1] ( ) ⊆ X indicate the open ball of radius glyph[epsilon1] centered at x in the topology induced by d and assume that there exist a function φ and a well-behaved functional p such that for any x ∈ X $$\varphi _ { x } ( \epsilon ) = P ( X \in B ( x, \epsilon ) ) \sim p ( x ) \phi ( \epsilon ),$$ meaning that the so-called small ball probability function ϕ x ( glyph[epsilon1] ) satisfies ϕ x ( glyph[epsilon1] ) = p x φ glyph[epsilon1] ( ) ( ) + o φ glyph[epsilon1] ( ( )) as glyph[epsilon1] → 0. Then, we consider the functional p : X → R + satisfying the identifiability condition E p X ( ( )) = 1 a surrogate probability density of P on X , and the function φ (often referred to as the concentration function ) can be considered a volume parameter. Ferraty et al. (2006) and Ferraty et al. (2012) provide some examples of stochastic processes whose small ball probabilities fulfill the decomposition of equation (9). Notice that in the simpler setting in which X is a continuous real valued random variable with cumulative distribution function F , one has ϕ x ( glyph[epsilon1] ) = P X ( ∈ B x,glyph[epsilon1] ( )) = F x ( + ) glyph[epsilon1] -F x ( -glyph[epsilon1] ) = p x ( )2 glyph[epsilon1] + ( ) where o glyph[epsilon1] p here corresponds to the usual Radon-Nikodym derivative of P with respect to the Lebesgue measure and φ glyph[epsilon1] ( ) = 2 glyph[epsilon1] is the Lebesgue measure of B x,glyph[epsilon1] ( ). However, for our purposes, we do not assume the existence of a dominating measure for P . Ferraty et al. (2012) propose to estimate the population surrogate density p by means of glyph[negationslash] $$\hat { p } ( x ) = \frac { \frac { 1 } { n } \sum _ { i = 1 } ^ { n } K _ { h } \left ( X _ { i }, x \right ) } { \frac { 1 } { n \left ( n - 1 \right ) } \sum _ { i = 1 } ^ { n } \sum _ { j \neq i } K _ { h } \left ( X _ { i }, X _ { j } \right ) } = w _ { K } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } K _ { h } \left ( X, x \right ), \quad \ \ ( 1 0 )$$ which is well-defined for h ≥ min i,j d X , X ( i j ). The kernel K is defined in terms of its profile k as $$K ( x, y ) = k ( d ( x, y ) ),$$ and the profile k is a function of the distance d between two points x and y . The estimator is consistent under mild assumptions (Ferraty et al., 2012, assumptions H1-H4). We henceforth assume that k ≥ 0, k has compact support [0 1], , ∫ R k t ( ) dt = 1 (although, as pointed out by Cheng, 1995, the unit integral condition is superfluous for the mean-shift algorithm), there exist constants -∞ &lt; C 1 &lt; C 2 ≤ 0 such that C 2 ≤ k ′ ≤ C 1 in (0 , 1) and k ′′ exists in (0 , 1). It is worth mentioning that other surrogate densities have been proposed for random variables valued in infinite dimensional spaces. For instance, the reader may refer to Delaigle and Hall (2010) who define a surrogate probability density for function-valued random variables on the basis of the eigendecomposition obtained by means of principal component analysis. Remark 1 Assuming that the factorization of the small ball probability of equation (9) holds is not strictly necessary in practice, although it helps to establish a clearer connection between the standard mean-shift algorithm and the functional mean-shift algorithm in the rest of our discussion. When the factorization does not hold, one can work with the numerator of the estimator of equation (10) , $$\frac { 1 } { n } \sum _ { X \in \mathcal { S } } K _ { h } \left ( X, x \right )$$ and view it as an estimator of its own expected value, E P ( K h ( X,x )) . In turn, E P ( K h ( X,x )) can be interpreted as a smooth population functional which (for some h &gt; 0 ) is informative about local features of P . Remark 2 The choice of the distance in equation (11) should not be perceived as a complication, but rather as a useful element of flexibility in applied work. While on the one hand more traditional methods implicitly impose to the user the choice of the space in which to embed the data (e.g. functional PCA forces the user towards L 2 spaces and L 2 distances), the functional mean-shift algorithm allows the user to incorporate prior knowledge of the data generating process by choosing in which space to embed the data. This is implicitly done by tuning the distance function. In many practical problems, this flexibility can save a lot of work in pre-processing the data. For example, suppose that we observe a sample of curves that exhibit the same basic pattern except for a completely random and uninformative vertical shift, i.e. X t i ( ) = X t j ( ) + δ ij where δ ij ∈ R . In this case, a (semi-)distance based on the first derivatives such as $$d ( x, y ) = \| x ^ { \prime } - y ^ { \prime } \| _ { L _ { 2 } }$$ avoids the need to perform a vertical alignment of the curves before further analysis. In fact, in this case, d X ( i ( ) t , X j ( )) = 0 t . Similar considerations apply for systematic differences in the higher order derivatives among the curves (see Ferraty and Vieu, 2006). ## 5. The functional mean-shift algorithm In this section, we show that applying the mean-shift algorithm to the elements of an Hilbert space using a kernel K is equivalent to applying an adaptive gradient ascent algorithm based on the Gateˆux derivative of the estimated surrogate density a $$\tilde { p } ( x ) = w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } G _ { h } \left ( X, x \right )$$ based on a second kernel, G . The kernel G , which is often referred to as the shadow of K , has a profile g which is related to the profile k of K in a particular way. We further discuss the notion of shadow of a kernel and the link between the profile k and g later in this section. We show that the gradient ascent direction can be characterized as the element of X that has unit norm and maximizes the Gateˆux derivative of ˜. a p Before proceeding, let us briefly recall the definition of Gateˆux differential and derivaa tive. ↦ Definition 3 (Gateˆux differentiability, Ambrosetti and Prodi, 1995) a Let B be a a Banach space and let U be an open subset of B . The map F : U → V is Gateˆ aux differentiable at u ∈ U if there exists a continuous linear map F u from B to V , called the Gateˆ aux differential of F at u , such that for all w ∈ U $$\lim _ { \alpha \rightarrow 0 } \frac { F ( u + \alpha w ) - F ( u ) } { \alpha } = F _ { u } ( w ),$$ ↦ where α ∈ R . If F is Gateˆ aux differentiable at all u ∈ U , then F is said to be Gateˆux a differentiable in U . The map F ′ G : u → F u , which associates to each u ∈ U the continuous linear operator F u , is called the Gateˆux derivative of a F . The Gateˆ aux derivative of the estimated surrogate density ˜ is p obtained in the following Lemma. Lemma 4 (Gateˆ aux differential of the estimated surrogate density) Let ˜ ( p x y ) denote the Gateˆux differential of a ˜ p at x ∈ X evaluated at y ∈ X . Let h X ( ) be an adaptive bandwidth possibly varying across the data points X ∈ S which possibly depends on the entire sample S , but not on x . Then, $$\tilde { p } _ { x } ( y ) = \left \langle y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } \left ( X, x \right ) \left ( X - x \right ) \right \rangle,$$ where the profiles g and k of the kernel G used in ˜ p and the kernel K satisfy k t ( ) = -g ′ ( ) t / Ct ( ) for a constant C &gt; 0 . Remark 5 If the profile k of K is not continuous at 1 (as it is the case for the truncated Gaussian profile for instance), the Gateˆux derivative of a ˜ p is still almost surely continuous at any fixed x ∈ X as long as P (⋃ X ∈S { d X,x ( ) = h X ( ) } ) = 0 . In the second last line of the proof of the above Lemma (see Appendix), we set $$k ( t ) = - \frac { g ^ { \prime } ( t ) } { C t }$$ with $$C = \int _ { \mathbb { R } } - \frac { g ^ { \prime } ( t ) } { t } \, d t > 0.$$ One can verify that equation (13) (which is a differential version of equation (15) of Cheng, 1995) implies, among others, the correspondences of Table 1. For our purposes, we give the following definition of the shadow of a kernel. Definition 6 (Shadow of a kernel) If the profile k of the kernel K used in the meanshift algorithm and the profile g of the kernel G used in the corresponding gradient ascent algorithm satisfy equation (13) , then G is said to be the shadow of K . As a matter of fact, Gaussian kernels are the only kernels that coincide with their own shadows; see Table 1 and (Cheng, 1995, Theorem 2). When the Gateˆ aux derivative of a functional F : X → R at a point x ∈ X can be expressed as an inner product of the form 〈 y, ∇ ˜ p x 〉 for any y ∈ X , then the element ∇ ˜ p x ∈ X is the functional gradient of ˜ p at x . Thus, the function $$\nabla \tilde { p } _ { x } = C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } \left ( X, x \right ) \left ( X - x \right )$$ of equation (12) is the functional gradient of ˜ at p x . We can rewrite equation (14) as $$\nabla \tilde { p } _ { x } = C w _ { G } ( \mathcal { S } ) m ( x ) \bar { p } ( x ),$$ where ¯ is a weighted and unnormalized estimate of the surrogate density p p based on K , $$\bar { p } ( x ) = \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ),$$ Table 1: Some correspondences between the profile k of the kernel K and the profile g of its shadow G implied by equation (13). | G | K | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | g ( t ) ∝ (1 - t 2 ) ✶ [0 , 1] ( t ) (Epanechnikov) g ( t ) ∝ (1 - t 2 ) 2 ✶ [0 , 1] ( t ) (biweight) g ( t ) ∝ (1 - t 2 ) 3 ✶ [0 , 1] ( t ) (triweight) g ( t ) ∝ cos ( π 2 t ) ✶ [0 , 1] ( t ) (cosine) g ( t ) ∝ e - t 2 2 [0 , 1] ( t ) (Gaussian) | k ( t ) ∝ ✶ [0 , 1] ( t ) (uniform) k ( t ) ∝ (1 - t 2 ) ✶ [0 , 1] ( t ) (Epanechnikov) k ( t ) ∝ (1 - t 2 ) 2 ✶ [0 , 1] ( t ) (biweight) k ( t ) ∝ sin ( π 2 t ) t ✶ [0 , 1] ( t ) (sinc) k ( t ) ∝ e - t 2 2 [0 , 1] ( t ) (Gaussian) | ✶ ✶ and m is the functional mean-shift operator $$m ( x ) = \frac { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) X } { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) } - x.$$ Notice that equation (16) is a functional analog of equation (5) with ω X ( ) = 1 /h 2 ( X ). Let a ∗ ( x ) denote the element with unit norm in the direction of ∇ ˜ p x from x , i.e. $$a ^ { * } ( x ) = \frac { \nabla \tilde { p } _ { x } } { \| \nabla \tilde { p } _ { x } \| }.$$ Then, from (15) it follows that $$m ( x ) = \frac { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) X } } { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) } - x = \frac { \| \nabla \tilde { p } _ { x } \| } { C w _ { G } ( \mathcal { S } ) \bar { p } ( x ) } a ^ { * } ( x ),$$ hence the functional mean-shift update $$x \leftarrow x + m ( x ) = \frac { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) X } { \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x ) }$$ corresponds to a gradient ascent update x ← x + ( ) s x a ∗ ( x ) that is conceptually identical to equation (7), with a step size $$s ( x ) = \frac { \| \nabla \tilde { p } _ { x } \| } { C w _ { G } ( \mathcal { S } ) \bar { p } ( x ) }$$ that is conceptually identical to (8). Notice further that if x ∗ ∈ X is a fixed point of the functional mean-shift update of equation (18) (i.e. m x ( ∗ ) = 0 in equation (17)), then it is easily seen that ∇ ˜ p x ∗ = 0. It is now clear that, because the functional mean-shift algorithm is a gradient ascent algorithm in an infinite-dimensional space, the trajectory generated by the repeated application of the functional mean-shift operator of equation (18) can be thought of as an estimate of the gradient flow line associated to the initial value problem $$\begin{cases} \pi _ { x } ^ { \prime } ( t ) = \nabla p _ { \pi _ { x } ( t ) } \\ \pi _ { x } ( 0 ) = x, \end{cases}$$ whenever such flow exists. It is known from the theory of differential equations with Lipschitz coefficients that, in a generic Hilbert space X , the initial value problem above has exactly one solution for any starting point x ∈ X if functional gradient of p is a Lipschitz map, i.e. if there exists L &gt; 0 such that for any x, y ∈ X we have ‖∇ p x -∇ p y ‖ ≤ L x ‖ - ‖ y . It is easy to check that the functional gradient of the estimated surrogate density is a Lipschitz map, therefore the functional gradient flow starting from an arbitrary point x ∈ X exists and it is unique on the estimated surrogate density. Furthermore, because any finite sample only spans a finite dimensional subspace of X , the gradient flows on the estimated surrogate density also converge. The Lipschitz condition, however, is not enough to guarantee the convergence of the gradient flows as t →∞ in general, and in particular it does not guarantee the convergence of the gradient flows of a general population surrogate density p . Convergence, indeed, is a delicate question (especially in infinite dimensional spaces) and usually requires strong regularity conditions on p . We do not address this question in this paper, nor do we address the question of the convergence of the sequences generated by the mean-shift algorithm (which is a topic of active research even in finite dimensions; see, among others, Li et al., 2007b and Aliyari Ghassabeh, 2013). Intuitively, however, a sequence of elements of X obtained by means of the functional mean-shift algorithm approximates the corresponding gradient flow on the estimated surrogate density ˜, and can p be thought of as an estimate of the associated gradient flow on the unknown population surrogate density p (whenever such flow exists). Remark 7 If the bandwidth is fixed rather than adaptive, i.e. h X ( ) = h &gt; 0 for all X ∈ S , then the step size of equation (19) is $$s ( x ) = \frac { \| \nabla \tilde { p } _ { x } \| } { C w _ { G } ( \mathcal { S } ) } \frac { h ^ { 2 } } { \bar { \bar { p } } ( x ) } \in \| \nabla \tilde { p } _ { x } \| \frac { h ^ { 2 } } { \bar { \bar { p } } ( x ) },$$ where now the fixed bandwidth is not incorporated in the unnormalized surrogate density estimate $$\bar { \bar { p } } ( x ) = \sum _ { X \in \mathcal { S } } K _ { h } ( X, x ),$$ and the analogy with equation (8) is even more evident. ## Remark 8 The first order condition $$C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } \left ( X, x \right ) \left ( X - x \right ) = 0$$ is a necessary optimality condition that is satisfied by all critical points of the surrogate density estimate ˜ p , and by the uninteresting trivial roots in the set X \ ⋃ X ∈S ¯ ( B X,h X ( )) , where ¯ ( B X,h X ( )) denotes the closure of the open ball. This condition is not sufficient for local maxima and thus every x ∈ ⋃ X ∈S ¯ ( B X,h X ( )) satisfying ∇ ˜ p x = 0 should be considered a candidate local mode of the estimated surrogate density ˜ p . To verify that a solution x ∗ ∈ ⋃ X ∈S ¯ ( B X,h X ( )) of the functional equation ∇ ˜ p x = 0 is in fact a local mode and rule out unstable maxima (such as saddle points or plateaus), one can apply a suitable perturbation δ to x ∗ and then reapply the functional mean-shift algorithm to x ∗ + δ . If the sequence of functions generated by the functional mean-shift algorithm starting from x ∗ + δ still converges to x ∗ , then x ∗ can be regarded as a local mode of the estimated surrogate density. In the Euclidean setting, Genovese et al. (2013) develop a procedure to test the hypothesis H 0 : x ∗ is not a mode of the population density p versus H 1 : x ∗ is a mode of the population density p . We provide a similar test for the functional case in the next section. Remark 9 Equation (13) imposes some restrictions on the choice of the profiles k and g . In fact, once we fix the profile g in the gradient ascent scheme, the profile k of the corresponding mean-shift algorithm must satisfy the differential inequality $$k ^ { \prime } ( t ) = \frac { t g ^ { \prime \prime } ( t ) - g ^ { \prime } ( t ) } { t ^ { 2 } } \leq 0$$ for t ∈ (0 1) , and the condition $$\lim _ { t \to 0 ^ { + } } k ( t ) = \lim _ { t \to 0 ^ { + } } - \frac { g ^ { \prime } ( t ) } { t } = c$$ with 0 &lt; c &lt; ∞ . In particular, (20) implies that g must satisfy $$g ( t ) \leq c _ { 1 } + c _ { 2 } t ^ { 2 }$$ for some c 1 &gt; 0 (to ensure that g is positive at t = 0 and c 2 &lt; 0 (to ensure that g is decreasing for t ≥ 0 ), while (21) requires that g is locally quadratic in a (right) neighborhood of t = 0 . All the profiles presented in Table 1 satisfy these two conditions. Remark 10 Another useful property of the mean-shift algorithm is that it automatically detects outliers in the sample S . If an element X ∗ ∈ S is separated from the other elements X ∈ S with respect to the norm ‖ · ‖ of the Hilbert space in which the data are embedded, then the algorithm generates the atomic cluster { X ∗ } . To illustrate, suppose that we are able to choose the bandwidths h X ( ) according to a 'good' procedure. Then, if $$X ^ { * } \notin \bigcup _ { X \in \mathcal { S } } \bar { B } ( X, h ( X ) ),$$ we have ∇ ˜ p X ∗ = Cw G ( S ) ∑ X ∈S 1 h 2 ( X ) K h ( X,X ∗ ) ( X -X ∗ ) = 0 as long as K has a profile that is supported on [0 , 1] . Atomic clusters produced by the functional mean-shift algorithm under a 'good' choice of the bandwidth should therefore be regarded as potential outliers. We conclude this section by noting that, in analogy with the Euclidean case, the blurring version of the functional mean-shift algorithm is easily obtained by iterating $$X \leftarrow X + m ( X )$$ on all X ∈ S simultaneously, with m as in equation (16). ## 6. Connection with clustering using fPCA and k -means For the clustering of a sample of functional data that have a small intrinsic dimensionality (say, D ), the functional mean-shift algorithm under the L 2 distance is expected to perform at least as good as applying k -means clustering to the projection coefficients on the first D principal components. If the intrinsic dimensionality is in fact D , then the squared distance between two functional data points is $$d ^ { 2 } ( X _ { i }, X _ { j } ) = \| X _ { i } - X _ { j } \| ^ { 2 } \approx \sum _ { k = 1 } ^ { D } ( \theta _ { i, k } - \theta _ { j, k } ) ^ { 2 },$$ where θ i,k is the projection coefficient of X i on the k -th principal component. In this case, clustering using the functional mean-shift algorithm is essentially equivalent to densitybased clustering using a kernel density estimate based on the D -dimensional projection coefficients. k -means tends to produce accurate clusterings when the number of clusters is known and the empirical clusters have elliptical shapes. Hence, roughly speaking, if D is small, the number of clusters is known, and the clusters of principal component scores have elliptical shapes, then the functional mean-shift algorithm with the L 2 distance is expected to yield very similar results when compared to k -means clustering on the D -dimensional projection coefficients of fPCA (Figure 3). However, when the intrinsic dimensionality of the functional data is large, the functional mean-shift algorithm has greater flexibility compared to the combined fPCA/ k -means clustering, in that it can pick up differences between the clusters that may not be evident in the projections onto the lower dimensional space spanned by the first few principal components. Also, as opposed to the fPCA/ k -means approach, the functional mean-shift algorithm does not require the user to select the number of clusters a priori. Interestingly, even in finite dimensional settings there exist situations in which the functional mean-shift algorithm outperforms the combined fPCA/ k -means analysis. For example, Figure 4 depicts the projections of a set of 200 curves that lie in the span of the functions sin(2 πt ) and cos(2 πt ) onto their first two principal components (which explain 100% of the sample variance). Here, k -means is doomed to fail with the circular pattern of Figure 4 even when the number of clusters is known and the seeds are placed suitably. Figure 5 depicts the clusters obtained by means of the combined fPCA/ k -means approach. It is clear that these clusters do not represent the underlying structure of the data. On the other hand, the functional mean-shift algorithm generates meaningful clusters (Figure 6) and effectively summarizes each of the them by its modal curve. ## 7. Inference on the functional modes In the previous section, we showed that the functional mean-shift algorithm locates the candidate local modes of the estimated surrogate density ˜, p namely a set of points ˜ M = { ˜ µ , . . . , µ 1 ˜ r } such that the first order condition $$\nabla \tilde { p } _ { \mu _ { j } } = 0 \iff \tilde { p } _ { \tilde { \mu } _ { j } } ( y ) = 0 \quad \forall y \in \mathcal { X }$$ is satisfied for j = 1 , . . . , r . We may want to test whether ˜ µ j ∈ M ˜ is a statistically significant functional mode of the unknown surrogate density p , i.e. we may want to test Figure 3: Top 4 panels: Projection coefficients on the first two principal components of a set of 150 curves in the span of sin(2 πt ) and cos(2 πt ). Bottom 4 panels: Clusters recovered by the functional mean-shift algorithm (top) with modal curves (red dashed lines) and clusters recovered by fPCA/ -means (bottom). k When the clusters have elliptical shapes, the combined fPCA/ k -means analysis and the functional mean-shift algorithm both recover the underlying clustering structure of the data. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-3b85810f-c018-45b4-a7c6-9b47d9ed2ac7.jpg) Figure 4: Projection coefficients on the first two principal components of a set of 200 curves in the span of sin(2 πt ) and cos(2 πt ). The circular pattern prevents k -means clustering from achieving a satisfactory result even when the number of clusters is known a priori and the initial seeds (hollow circles in the bottom left panel) are suitably placed. The large full circles in the bottom left panel represent the final cluster centers obtained with k -means. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-97885dfc-aefd-4109-819a-cfc5fef84f2f.jpg) Figure 5: Clusters obtained with the combined PCA/ k -means analysis. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-e76534bc-08eb-4a4c-9854-c0603c405e14.jpg) Figure 6: Clusters obtained with the functional mean-shift algorithm. The modal curves are represented by the red dashed lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-1fc0cf77-64a4-422b-92e9-f7f138cce797.jpg) whether ˜ µ j ∈ M ˜ is a critical point of p and the second Gateˆux derivative of a p is a negative definite operator at ˜ µ j . Let us assume that the unknown surrogate density is twice Gateˆux a differentiable with second Gateˆux differential at a x ∈ X denoted by ↦ $$p _ { x } ^ { ( 2 ) } \colon \mathcal { X } \times \mathcal { X } & \to \mathbb { R } \\ ( y, z ) & \mapsto p _ { x } ^ { ( 2 ) } ( y, z ),$$ which is a symmetric continuous bilinear operator (the analog of the Hessian matrix in infinite dimensions). A critical point µ j ∈ M of the unknown surrogate density p is a local maximum if and only if p (2) µ j is negative definite, i.e. $$\sup _ { \| y \| = 1 } p _ { \mu _ { j } } ^ { ( 2 ) } ( y, y ) = \lambda _ { \mu _ { j } } < 0.$$ Thus, for ˜ µ j ∈ M ˜ , we want to test glyph[negationslash] $$H _ { 0 } & \colon \lambda _ { \tilde { \mu } _ { j } } \geq 0 \quad \text{or} \quad \nabla p _ { \tilde { \mu } _ { j } } \neq 0 \\ & \quad \text{vsc.} \\ H _ { 1 } & \colon \lambda _ { \tilde { \mu } _ { j } } < 0 \quad \text{and} \quad \nabla p _ { \tilde { \mu } _ { j } } = 0,$$ that is $$H _ { 0 } \colon \tilde { \mu } _ { j } & \text{ is not a mode of } p \\ & \text{vs.} \\ H _ { 1 } \colon \tilde { \mu } _ { j } & \text{ is a mode of } p.$$ The pointwise nature of the alternative hypothesis on the functional gradient may constitute a problem in the specification of the above hypothesis test. For instance, in the Euclidean setting, the condition ∇ p ˜ µ j = 0 would correspond to a zero (Lebesgue) measure set. At least in the Euclidean setting, one possibility is to recast the hypothesis test as follows (Genovese et al., 2013): $$H _ { 0 } \colon \neg H _ { 1 } \\ & \text{vs.} \\ H _ { 1 } \colon \lambda _ { \tilde { \mu } _ { j } } < 0 \quad \text{and} \quad \| \nabla p _ { \tilde { \mu } _ { j } } \| < \delta$$ for some δ &gt; 0, so that we are instead testing the hypothesis that ˜ µ j is an approximate mode of p . The sample splitting procedure introduced in the test of Genovese et al. (2013) is such that constraint on the gradient has essentially no effect in (22) (we will later return to this point in Remark 14). In the following, we consider a similar test that is adapted to the functional case. We focus on $$H _ { 0 } & \colon \lambda _ { \tilde { \mu } _ { j } } \geq 0 \\ & \text{vs.} \\ H _ { 1 } & \colon \lambda _ { \tilde { \mu } _ { j } } < 0.$$ A natural test statistic for (23) is ˜ λ ˆ µ j = sup ‖ y ‖ =1 ˜ p (2) ˆ µ j ( y, y ). Lemma 11 gives the explicit form of the second Gateˆux differential of the estimated surrogate density at an arbitrary a point x ∈ X . The explicit form of the test statistic ˜ λ x is then derived in Lemma 12. Lemma 11 (Second Gateˆ aux differential of the estimated surrogate density) The second Gateˆ aux differential of the estimated surrogate density ˜ p at x ∈ X evaluated at ( y, z ) ∈ X × X is $$\tilde { p } _ { x } ^ { ( 2 ) } ( y, z ) & = - C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } \left [ \frac { 1 } { h ( X ) } K _ { h } ^ { \prime } ( X, x ) \frac { \langle X - x, y \rangle \langle X - x, z \rangle } { \| X - x \| } \\ & + K _ { h } ( X, x ) \langle y, z \rangle \right ].$$ Lemma 12 (Test statistic for the second order optimality condition) We have $$\tilde { \lambda } _ { x } & = \sup _ { \| y \| = 1 } \tilde { p } ^ { ( 2 ) } ( y, y ) = C w _ { G } ( \mathcal { S } ) \left [ 2 \left \| \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 3 } ( X ) } K _ { h } ^ { \prime } ( X, x ) \frac { X - x } { \| X - x \| } \right \| - \\ & \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } \left [ \frac { 1 } { h ( X ) } K _ { h } ^ { \prime } ( X, x ) \left ( \| X - x \| + \| X - x \| ^ { - 1 } \right ) + K _ { h } ( X, x ) \right ] \right ].$$ Remark 13 Notice that when the profiles g and k satisfy the conditions of Remark 9, lim t → 0 + k ′ ( ) t t exists and it is finite. Thus, we can safely set k ′ (0) 0 = lim t → 0 + k ′ ( ) t t in the expressions involved in the two previous Lemmata whenever needed. We are now in the position to describe our testing procedure. Suppose for simplicity that the sample S contains an even number of elements, say 2 n , and that we use a non-adaptive bandwidth parameter h X ( ) = h &gt; 0 for all X ∈ S . Stage 1: First, we divide the sample in two subsamples of size n . We apply the functional mean-shift algorithm on the first subsample, denoted X ,. . . , X 1 n , in order to determine the set ˜ M = { ˜ µ , . . . , µ 1 ˜ r } of candidate local modes of ˜, which is an estimate of the p set M = { µ , . . . , µ 1 R } of local modes of the unknown surrogate density p . This step usually requires using the first subsample X ,. . . , X 1 n to determine the value of the bandwidth h for the functional mean-shift algorithm. Stage 2: Next, we use the second subsample, denoted Y , . . . , Y 1 n , to compute the test statistic ˜ λ ˜ µ j for j = 1 , . . . , r . For b = 1 , . . . , B we sample with replacement n elements of the second subsample, Y ∗ 1 ,b , . . . , Y ∗ n,b from the empirical distribution of Y , . . . , Y 1 n , P n ( y ) = 1 n ∑ n i =1 δ Y i ( y ). For b = 1 , . . . , B we compute the test statistic ˜ λ ∗ ˜ µ ,b j using the bootstrap sample Y ∗ 1 ,b , . . . , Y ∗ n,b and we thus construct a 1 -α bootstrap confidence interval for λ ˜ µ j , C n, 1 -α ( λ ˜ µ j ) where α ∈ (0 1). , Finally, if sup { λ ∈ C n, 1 -α ( λ ˜ µ j ) } &lt; 0, we reject the null hypothesis that ˜ µ j is not a local mode of the unknown surrogate density p . By setting α ′ = α/glyph[lscript] , we can use the same procedure to construct a confidence rectangle for glyph[lscript] ∈ { 1 , . . . , r } of the λ ˜ µ j 's simultaneously. This rectangle takes the form C n, 1 -α ( λ ˜ µ j 1 , . . . , λ C n, 1 -α ′ ( λ ˜ µ j 1 ) × · · · × C n, 1 -α ′ ( λ ˜ µ j glyph[lscript] ) . Note that the purpose of sample splitting in Stage 1 is to assure the validity of the confidence intervals. The simultaneous test algorithm is summarized in Figure 7. Remark 14 Because each candidate local mode ˜ µ j ∈ M ˜ is such that ∇ ˜ p ˜ µ j = 0 in the first stage, the estimated gradient is likely to be null also in the second stage. Thus, the constraint ‖∇ p ˜ µ j ‖ &lt; δ has a negligible effect in (22) . Let us now illustrate the above testing procedure by means of a simple simulation. We randomly draw 150 curves from these three groups: - · X t ( ) = η X cos (5 π/ 2 · t ) - · Y ( ) = 3 + t η Y cos (5 π/ 2 · t ) · C t ( ) = γ +3 · ✶ { U&gt; . 0 5 } +cos(5 π/ 2 · t ) where η X d = η Y ∼ N ( µ = 1 , σ = 0 1), . γ ∼ N ( µ = 0 , σ = 0 8), . U ∼ Unif(0 1), , t ∈ [0 , 1], and all the random variables involved are independent of each other. The probability of drawing a curve from a given group is the same for each group and equal to 1 / 3. In this simulation, the X 's and the Y 's are thought of as realizations of two distinct signals , whereas the C 's are clutter curves that correspond to a version of these signals that is subject to a vertical perturbation. On the basis of the data generating process, it makes sense to expect the existence of a modal curve µ X for the X 's and a distinct modal curve µ Y for the Y 's. However, the clutter curves are likely to generate some spurious local mode (at least for small enough bandwidths) when one estimates µ X and µ Y using the functional mean-shift algorithm. The simulated curves are presented in the top panel of Figure 8 (the X 's is grey, the Y 's in red and the C 's in light blue). The functional mean-shift identifies 3 candidate ˜ µ j glyph[lscript] ) = ## Local functional mode set testing algorithm Input: sample S with #( S ) = 2 n , coverage level 1 -α Output: a set ˜ M ⊂X S of significant local modes at the approximate level 1 -α - 1. split the sample in two halves, X ,. . . , X 1 n and Y , . . . , Y 1 n - 2. apply the mean-shift algorithm on X ,. . . , X 1 n to find the set of candidate local modes ˜ M = { ˜ µ , . . . , µ 1 ˜ r } - 3. for each j = 1 , . . . , r and for b = 1 , . . . , B do - · resample with replacement n elements Y ∗ 1 ,b , . . . , Y ∗ n,b - · compute ˜ λ ∗ ˜ µ ,b j - 4. for each j = 1 , . . . , r construct the 1 -α/r level confidence interval C n, 1 -α/r ( λ ˜ µ j ) using the empirical quantiles of ˜ λ ∗ ˜ µ , j 1 , . . . , λ ˜ ∗ ˜ µ ,B j . - 5. for each j = 1 , . . . , r check the condition sup { λ ∈ C n, 1 -α/r ( λ ˜ µ j ) } &lt; 0 - 6. set ˜ M S = { ˜ µ j ∈ M ˜ : sup { λ ∈ C n, 1 -α/r ( λ ˜ µ j ) } &lt; 0 } - 7. output ˜ M S . Figure 7: The local functional mode set testing algorithm. Sample spitting assures the validity of the test. functional modal curves ˜ µ X , ˜ µ C , and ˜ µ Y , with the asymmetric truncated Gaussian kernel (top panel of Figure 8). Inside the kernel, we set d to be the L 2 distance and the bandwidth is set to h = 7 5 (approximately the 41th percentile of the . L 2 distances among the curves in the first subsample). As expected, only the local modes corresponding to the X 's and the Y 's are significant on the basis of the local mode testing algorithm of Figure 7 (in this simulation, we set the number of bootstrap replications B equal to 1000). The output of the testing procedure and the 95% simultaneous approximate confidence intervals for λ ˜ µ X , λ ˜ µ C , and λ ˜ µ Y are summarized in the bottom panel of Figure 8. ## 8. Application: spike sorting In this section, we describe how the functional mean-shift algorithm can be used to cluster a set of curves that correspond to neural activity. The available data, displayed in Figure 9, represent a subset of 40 recordings of neurons over time which come from a behavioral experiment performed at the Andrew Schwartz motorlab ( http://motorlab.neurobio.pitt.edu/index.php ) on a macaque monkey (the authors thank Andrew Schwartz, Val´ erie Ventura and Sonia Todorova for providing the data). The monkey performs a center-out and out-center target reaching task with 26 targets in a virtual 3D environment. The curves of Figure 9 show the voltage of neurons versus the times recorded at electrodes (32 equidistant time points per curve; time is standardized between 0 and 1). The recorded neural activity consists of all the action potentials detected above a channel-specific threshold on a 96-channel Utah array implanted in the primary motor cortex. The goal is to perform spike sorting , i.e. clustering the curves in a set of distinct homogeneous groups. Each cluster of curves is then thought to correspond to the activity of a single neuron since each neuron tends to have its own characteristic curve (or spike ). An analysis of (a larger set of) these curves can also be found in Lei et al. (2013), who cluster the curves following the conformal prediction approach (Vovk et al., 2009). On the basis of Figure 9, one may expect to find 3 clusters, each summarized by a corresponding modal curve. We set d to be the distance associated with the Sobolev space H 1 of square integrable functions on the standard unit interval with square integrable first weak derivative, i.e. $$d ( x, y ) = \| x - y \| _ { L _ { 2 } } + \| x ^ { \prime } - y ^ { \prime } \| _ { L _ { 2 } }.$$ This distance is associated to the inner product $$\langle x, y \rangle _ { H _ { 1 } } = \langle x, y \rangle _ { L _ { 2 } } + \langle x ^ { \prime }, y ^ { \prime } \rangle _ { L _ { 2 } }.$$ The curves are smoothed using local quadratic polynomials and their first derivatives are obtained directly from the local polynomial fit. We apply the functional mean-shift on this dataset of curves using the asymmetric truncated Gaussian kernel. A fixed bandwidth parameter is chosen using a heuristic based on the plot of the number of non-atomic clusters (that is, clusters of sample curves containing more than a single curve) as a function of bandwidth (Figure 10). In particular, we repeatedly run the functional mean-shift using an increasing sequence of bandwidths (100 equally separated values between 5% and 50% of the largest observed distance between the sample curves). The candidate bandwidths are chosen ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-64c2146d-7e02-4b98-a8a6-7324218004e8.jpg) Figure 8: Top panel: Simulated data. The red and the black curves (top and bottom bundles of continuous lines) are representative of two similar, but distinct, signals. The blue curves (dashed lines) are clutter curves. The highlighted curves are the 3 candidate functional local modes identified by the functional mean-shift algorithm, ˜ µ X , ˜ µ C , and ˜ µ Y . Bottom panel: Simultaneous approximate 95% confidence intervals for λ ˜ µ X , λ ˜ µ C , and λ ˜ µ Y using B = 1000 bootstrap replications. Only the confidence intervals associated to the candidate modal curves ˜ µ X and ˜ µ Y entirely lie to the left of 0. Therefore, as expected, only ˜ µ X and ˜ µ Y appear to correspond to significant functional local modes. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-c72240ea-e557-4492-9d1e-04ef83459273.jpg) Figure 9: Plot of the 40 neural activity curves. Three curves are highlighted to show typical trajectories. On the basis of this figure, one expects that the curves can be clustered in 3 homogeneous groups, each characterized by its own modal trajectory. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-627c4850-ecc8-4e05-a52b-71c80b0fd6c0.jpg) as the midpoints of the ranges where the number of clusters stabilizes. For these data, this heuristic identifies h 1 = 0 2150 . · max X,X ′ ∈S d X,X ( ′ ) and h 2 = 0 3525 . · max X,X ′ ∈S d X,X ( ′ ) as the two candidate bandwidths. The output of the mean-shift algorithm is displayed in Figures 11 and 12. In this 'multi-bandwidth' analysis, the largest candidate bandwidth, h 2 , produces a coarse clustering of the sample curves: from Figure 11, we see that the two most similar bundles of curves are clustered together in a unique cluster. At this resolution, the algorithm recognizes that these two bundles have a more similar shape, which is different from the sigmoid shape of the third bundle. The smallest candidate bandwidth, h 1 , produces a clustering of the sample curves that is just right (Figure 12). At this resolution, the functional mean-shift algorithm also identifies two atomic clusters (dashed lines in the lower two panels of Figure 12) which, in light of Remark 10, could be considered potential outliers. ## 9. Application: signature forgery Suppose that a dataset of n similar signatures, S = { X ,. . . , X 1 n } , is available to us. Each observed signature X ∈ S can be thought of as a (discretized version of a) curve in R 2 of the type ↦ $$t \mapsto X ( t ) = ( x ( t ), y ( t ) ),$$ where, for simplicity, we can take t ∈ [0 , 1]. To simplify, we may identify each signature in the dataset with its tangential acceleration , i.e. the real valued function ↦ $$t \mapsto S ( t ) = \left ( x ^ { \prime \prime } ( t ), y ^ { \prime \prime } ( t ) \right ) \cdot \frac { ( x ^ { \prime } ( t ), y ^ { \prime } ( t ) ) } { \| \left ( x ^ { \prime } ( t ), y ^ { \prime } ( t ) \right ) \| _ { 2 } },$$ Figure 10: Number of non-atomic clusters of neural activity curves as a function of the bandwidth parameter, h . The number of non-atomic clusters stabilizes in the 2 highlighted ranges. The candidate bandwidth parameters are then set to be the midpoint of the 2 relevant ranges. The numbers in parentheses above the candidate bandwidths denote the number of sample curves that are clustered in non-atomic clusters using the corresponding candidate bandwidth. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-54de7a2f-5c1f-4ffd-9cf9-d51a5b2472e1.jpg) Figure 11: Output of the functional mean-shift algorithm on the 40 neural activity curves with the largest candidate bandwidth, h 2 . The plots are on the same scale. Each panel represents an individual cluster of neural activity curves and the bold line is the estimated modal curve for that cluster. With this choice of the bandwidth, the functional mean-shift algorithm detects that there are two bundles of curves that share a similar shape (top blue cluster) and a third cluster corresponding to curves with a more pronounced sigmoid shape (bottom yellow cluster). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-5610aeb1-c020-4696-9f85-f4d8904f7980.jpg) Figure 12: Output of the functional mean-shift algorithm on the 40 neural activity curves with the smallest candidate bandiwidth, h 1 . The plots are on the same scale. Each panel represents an individual cluster of neural activity curves and the bold line is the estimated modal curve for that cluster. From the plots, it appears that the choice of the bandwidth is just right: the functional mean-shift algorithm detects three internally homogeneous clusters. With this choice of the bandwidth, the algorithm identifies 2 atomic clusters (potential outliers) which correspond to the dashed curves in the two lower panels. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-e6d10f48-b9ee-4c5e-8698-dc2b43aefd49.jpg) ## Original Figure 13: Examples of signatures from a sample of 40 SVC 2004 signatures (20 original, 20 fake). The upper panel displays an example of the owner's signature, while the bottom panel contains an example of a forged signature. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-4feaf5da-9dc7-4008-930a-357ee68c7e1b.jpg) which captures the amount of acceleration along the line tangent to the signature X at time t . From now on we identify the sample of signatures with the i.i.d. sample of tangential accelerations S = ( S , S 1 2 , . . . , S n ), S 1 ∼ P . It is reasonable to imagine that if all the signatures in S are produced by the same author (the owner of the signature), then the common distribution P of the S 's is 'unimodal'. In fact, in this case we might expect the distribution of the tangential accelerations to concentrate around a central tangential acceleration curve in the space of the S 's (the 'typical' tangential acceleration of the owner's signature); the scattering of the other tangential accelerations around this central curve would correspond to the random variation among different instances of an original signature. However, if some of the signatures in S are instead forged by one or more skilled fakers whose forgeries appear to be good replicates of the original owner's signature to the naked eye, but whose tangential acceleration curves are sufficiently different from the tangential acceleration curves of the owner, then we may expect P to be 'multimodal'. Suppose that we do not know exactly how many different authors produced the signatures in S , i.e. we suspect that some signatures could be forged versions of the owner's signature. Running the functional mean-shift algorithm on S would output of a set ˜ M = { ˜ µ , . . . , µ 1 ˜ r } of modal tangential accelerations (corresponding to local modes of ˜, p the estimated surrogate density of P ) and would assign each observed tangential acceleration S ∈ S to the closest mode in ˜ , thus allowing us to divide the sample signatures in M r distinct clusters. If the functional mean-shift algorithm detects a unique modal signature, and therefore all the observed signatures are grouped in a unique cluster, we may conclude that there is no evidence (at least on the basis of the tangential accelerations) that there exist forged signatures in S . However, if ˜ M contains more than a single modal curve ( r &gt; 1), and thus the functional mean-shift algorithm partitions S in more than a single cluster, then we have empirical evidence that the sample S may contain signatures both from the owner and (potentially) other authors. In this case, we may conclude that some signatures in S are forged versions of the owner's original signature. In this section, we test the functional mean-shift on a set of 40 signatures from a sample catalog of the SVC 2004 Signature Verification Competition ( http://www.cse.ust.hk/ svc2004/download.html , Sample Data, User 1). While it is known that in this sample there are 20 original owner's signatures (corresponding to the first 20 curves in the dataset) and 20 fake signatures (corresponding to the curves numbered from 21 to 40 in the dataset), we pretend that we do not know this information a priori. If the two groups of signatures are sufficiently separated in the space of the tangential accelerations, then the functional meanshift should detect at least two modal curves. Our analysis represents an unsupervised counterpart of the analysis of Geenens (2011), who develops a nonparametric functional classifier for these data. Figure 13 displays two signatures (one original, one fake) from the SVC 2004 sample. It is not immediately evident to the naked eye that the two signatures are not produced by the same author. Our first step is to smooth the x and y components of the 40 signatures in the sample with a locally quadratic polynomial to get a smooth representation of x ′ , x ′′ , y ′ and y ′′ . In particular, we use the locpoly function of the KernSmooth R package to perform the local polynomial smoothing and the function dpill of the same package to select the bandwidth parameter. With these smooth estimates of the derivatives, we then obtain Tangential accelerations (all) Figure 14: Smooth tangential accelerations obtained from the balanced dataset of 40 SVC 2004 signatures. The top panel displays the smooth tangential accelerations of all the 40 signatures together, whereas the middle and the bottom panels display the smooth tangential accelerations for the original and for the fake signatures, respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-c1342b2d-a850-4d27-bcc7-fc0ee9858fb1.jpg) the smooth tangential acceleration curve of equation (24) for each of the 40 signatures in the dataset which is then normalized so that it has unit L 2 norm. Figure 14 depicts the normalized smooth tangential accelerations obtained from the smooth representation of x ′ , x ′′ , y ′ and y ′′ and equation (24). We apply the functional mean-shift algorithm with the asymmetric truncated Gaussian profile on the smooth tangential acceleration curves. Within the kernel, d is set to be the distance induced by the L 2 norm (as in Geenens, 2011), and the same heuristic of Section 8 is used to select two candidate bandwidths, h 1 = 0 4485 . · max X,X ′ d X,X ( ′ ) and h 2 = 0 5242 . · max X,X ′ d X,X ( ′ ). The plot of non-atomic clusters as a function of bandwidth for the tangential acceleration curves is depicted in Figure 15. Figure 16 displays the output of the functional mean-shift on the smooth tangential acceleration curves when h = h 1 and Figure 17 shows the output of the algorithm when h = h 2 . The functional mean-shift algorithm finds 5 clusters with h = h 1 : the top cluster (black) contains 8 original signatures and appears very similar to the second, the fourth, and the fifth clusters (red, blue and yellow). These clusters contain 6 original and 1 fake signature (red), 2 original and 1 fake signature (blue), and 2 original signatures (yellow), respectively. The middle cluster (green) contains 15 of the 20 fake signatures. Overall, it seems that the clustering may be too fine. Figure 17 displays the output of the functional mean-shift algorithm when h = h 2 . This time, the algorithm produces two internally homogeneous clusters which appear to meaningfully summarize the structure of the data: the top cluster (black) contains 19 of the 20 original signatures and the second cluster (green) contains all the 20 fake signatures. Figure 15: Number of non-atomic clusters as a function of the bandwidth parameter, h . The number of non-atomic clusters stabilizes in the 2 highlighted ranges. The candidate bandwidth parameters are then set to be the midpoint of these 2 relevant ranges. The number in parentheses above the candidate bandwidths denote the number of sample curves that are clustered in non-atomic clusters using the corresponding candidate bandwidth. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-f744d25f-dfd1-4009-a3f9-317c10f15fca.jpg) ## 10. Discussion The mean-shift algorithm is an iterative algorithm that corresponds to a form of adaptive gradient ascent. The mean-shift algorithm has been extensively studied for scalar and vector data, but a counterpart of this algorithm for infinite-dimensional data has not been devised. In this paper, we introduce the functional mean-shift algorithm , a functional version of the mean-shift algorithm of Fukunaga and Hostetler (1975) and Cheng (1995) which is designed to deal with data that are intrinsically infinite-dimensional. The functional mean-shift algorithm expands the applicability of the mean-shift algorithm well beyond the familiar Euclidean case. In Section 5, we show that the functional mean-shift algorithm corresponds to a form of adaptive gradient ascent on the estimated surrogate density of random variables that are valued in an infinite-dimensional Hilbert space: for practitioners, this fact establishes a reassuring formal analogy with the standard mean-shift algorithm for scalar and vector data. In Section 7, we provide a bootstrap-based simultaneous significance test for the local modes in infinite dimensions. We illustrate by means of a simulation that the test allows us to infer which of the candidate local modes identified by the functional mean-shift algorithm (and therefore which of the clusters) are significant and correspond to real features of the data generating process. In Sections 8 and 9, we consider two examples of application which demonstrate the effectiveness of the algorithm for the task of clustering smooth curves. A strength of the algorithm lies in the fact that it does not require the application of a dimension reduction procedure on the sample curves, nor does it require the user to Figure 16: Output of the functional mean-shift algorithm on the 40 smooth tangential acceleration curves when h = h 1 . The plots are on the same scale. Each panel represents an individual cluster of tangential acceleration curves and the bold line is the estimated modal curve for that cluster. The candidate local mode of the black cluster (top panel) contains 8 original signatures and appears very similar to that of the red (6 original, 1 fake), blue (2 original, 1 fake) and yellow (2 original) clusters (respectively, the second, the fourth and the fifth plots from the top). This similarity suggests that h 1 is producing a very fine clustering of the curves. The green cluster (mid plot) contains 15 of the 20 fake signatures. The remaining 5 atomic clusters are not shown in this figure. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-5ebf6140-540a-41c0-8236-a67c52274f37.jpg) Figure 17: Output of the functional mean-shift algorithm on the 40 smooth tangential acceleration curves when h = h 2 . The plots are on the same scale. Each panel represents an individual cluster of tangential acceleration curves and the bold line is the estimated modal curve for that cluster. The black cluster (top) contains 19 of the 20 original signatures, whereas the green cluster (bottom) contains the 20 fake signatures. With this choice of the bandwidth, the functional mean-shift algorithm achieves a perfect separation between original and fake signatures. The algorithm finds an atomic cluster (dashed curve in the top panel, corresponding to the first original signature in the dataset), which is therefore flagged as a potential outlier. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-980dbf14-2703-4210-b521-7b6e2ee8c0b0.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1187v1-figure-c9173b25-03dc-4922-850c-5dd6948c7574.jpg) choose the number of clusters a priori (in contrast to PCA-based clustering and k -means). Furthermore, the functional mean-shift algorithm is a flexible algorithm because it allows the user to tune the distance function and therefore to choose implicitly in which space to embed the data. As it is the case with scalar or vector data, the effectiveness of the functional mean-shift algorithm comes at the cost of being able to properly select the bandwidth parameter h . The selection of the bandwidth is a crucial step in any analysis based on the mean-shift algorithm: a poor selection of the bandwidth can drive the algorithm to produce puzzling output. Several automatic and data-driven bandwidth selectors have been proposed for the mean-shift algorithm in the Euclidean setting, some of which reduce to the problem of optimally choosing the bandwidth parameter for the estimation of the underlying probability density (see Park and Marron, 1990 and Sheather and Jones, 1991 who develop optimal plugin bandwidth selectors or, among others, Faraway and Jhun, 1990 for a bootstrap-based bandwidth selector). This is arguably not the optimal strategy to select the bandwidth for the mean-shift algorithm: the mean-shift algorithm is a gradient ascent algorithm, therefore it appears more natural to select the bandwidth in such a way to optimize the estimation of the density derivatives (Chac´ on and Duong, 2013). An incomplete list of other proposals includes Comaniciu et al. (2001), who propose strategies to select datadriven adaptive bandwidths, Einbeck (2011), who introduces a bandwidth selector based on principal curves (Hastie and Stuetzle, 1989; Flury, 1990; Flury, 1993), and Genovese et al. (2013), who propose a bandwidth selection method based on the maximization of the number of significant modes. The significance test of Section 7 allows us to choose the bandwidth in such a way to maximize the number of significant modes as suggested in Genovese et al. (2013). Also, the multi-bandwidth analysis that we discuss in Sections 8 and 9 offers an alternative approach for the selection of the bandwidth in applied work. However, it seems harder to come up with a theory for bandwidth selection in the infinite-dimensional setting that we consider. We regard the investigation of theoretically justified data-driven bandwidth selectors for the functional mean-shift algorithm as an interesting direction for further theoretical research. ## Acknowledgments ADD ACKNOWLEDGMENTS ## Proof of Lemmata ## Proof of Lemma 4 The Gateˆ aux differential of the estimated surrogate density can be obtained by applying the chain rule. We report here a more explicit calculation that highlights the relationschip between the kernel K used in the functional mean-shift algorithm and its shadow G that is used in the corresponding gradient ascent analog. $$\text{between the kernel $K$ used in the functional mean-shift algorithm and its shadow $G$ that is} \\ \delta _ { x } ( y ) & = \frac { d } { d \alpha } \bar { p } ( x + \alpha y ) \Big | _ { \alpha = 0 } = \frac { d } { d \alpha } w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } G _ { h } \left ( X, x + \alpha y \right ) \Big | _ { \alpha = 0 } \\ & = \frac { d } { d \alpha } w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } g \left ( \frac { d ( X, x + \alpha y ) } { h ( X ) } \right ) \Big | _ { \alpha = 0 } \\ & = \frac { d } { d \alpha } w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } g \left ( \frac { \| X - x - \alpha y \| } { h ( X ) } \right ) \Big | _ { \alpha = 0 } \\ & = w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } - \frac { 1 } { h ( X ) } g ^ { \prime } \left ( \frac { \| X - x - \alpha y \| } { h ( X ) } \right ) \frac { \alpha \| y \| ^ { 2 } - \langle X - x, y \rangle } { \| X - x - \alpha y \| } \Big | _ { \alpha = 0 } \\ & = \Big \langle y, w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } - \frac { 1 } { h ( X ) } g ^ { \prime } \left ( \frac { d ( X, x ) } { h ( X ) } \right ) \frac { X - x } { d ( X, x ) } \Big \rangle \\ & = \Big \langle y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } k \left ( \frac { d ( X, x ) } { h ( X ) } \right ) ( X - x ) \Big \rangle \\ & = \Big \langle y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in \mathcal { S } } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } \left ( X, x \right ) ( X - x ) \Big \rangle.$$ ## Proof of Lemma 11 $$\text{Proof of Lemma 11} \\ \hat { p } _ { x } ^ { ( 2 ) } ( y, z ) & = \frac { d } { d \alpha } \hat { p } _ { x + \alpha z } ( y ) \Big | _ { \alpha = 0 } \\ & = \frac { d } { d } \Big < y, C w _ { G } ( \mathcal { S } ) \sum _ { X \varepsilon } \frac { 1 } { h ^ { 2 } ( X ) } K _ { h } ( X, x + \alpha z ) ( X - x - \alpha z ) \Big > \Big | _ { \alpha = 0 } \\ & = \Big < y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in S } \frac { 1 } { h ^ { 2 } ( X ) } \frac { d } { d \alpha } K _ { h } ( X, x + \alpha z ) ( X - x - \alpha z ) \Big > \Big | _ { \alpha = 0 } \\ & = \Big < y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in S } \frac { 1 } { h ^ { 2 } ( X ) } \Big [ - K _ { h } ( X, x + \alpha z ) z \\ & = \frac { 1 } { d \left ( X - x, z \right ) + \alpha \| z \| ^ { 2 } } { K ^ { \prime } _ { h } ( X, x + \alpha z ) ( X - x - \alpha z ) } \Big ] \Big > \Big | _ { \alpha = 0 } \\ & = \Big < y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in S } \frac { 1 } { h ^ { 2 } ( X ) } \Big [ - \frac { 1 } { h ( X ) } \left ( X - x, z \right ) } { K ^ { \prime } _ { h } ( X, x ) ( X - x ) } \\ & - K _ { h } ( X, x ) z \Big ] \Big > \\ & = - \Big < y, C w _ { G } ( \mathcal { S } ) \sum _ { X \in S } \frac { 1 } { h ^ { 2 } ( X ) } \Big [ \frac { 1 } { h ( X ) } K ^ { \prime } _ { h } ( X, x ) \left ( X - x, y \right ) \left ( X - x, z \right ) } { \| X - x \| } \\ & + K _ { h } ( X, x ) \left ( y, z \right ) \Big ].$$ ## Proof of Lemma 12 $$\tilde { \lambda } _ { x }$$ $$\begin{array} { c } \text{prod} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\text } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text` } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\, } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text. } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text1 } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text { } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text2 } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text<{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \end{array}$$ ## References Youness Aliyari Ghassabeh. On the convergence of the mean shift algorithm in the onedimensional space. Pattern Recognition Letters , 34(12):1423 - 1427, 2013. Antonio Ambrosetti and Giovanni Prodi. A primer of nonlinear analysis . Number 34. Cambridge University Press, 1995. Ery Arias-Castro, David Mason, and Bruno Pelletier. On the estimation of the gradient lines of a density and the consistency of the mean-shift algorithm. unpublished manuscript , 2013. Adelchi Azzalini and Nicola Torelli. Clustering via nonparametric density estimation. Statistics and Computing , 17(1):71-80, 2007. Denis Bosq. Linear processes in function spaces: theory and applications . Springer, 2000. - Miguel A. Carreira-Perpi˜´n. ´ na Fast nonparametric clustering with gaussian blurring meanshift. In Proceedings of the 23rd International Conference on Machine Learning , pages 153-160, 2006. - Jos´ E. Chac´n. e o Clusters and water flows: a novel approach to modal clustering through morse theory. arXiv preprint arXiv:1212.1384 , 2012. - Jos´ E. e Chac´ on. A population background for nonparametric density-based clustering. unpublished manuscript , 2014. - Jos´ E. Chac´n and Tarn Duong. Data-driven density derivative estimation, with applicae o tions to nonparametric clustering and bump hunting. Electronic Journal of Statistics , 7: 499-532, 2013. - Fr´ ed´ric Chazal, Leonidas J Guibas, Steve Y Oudot, and Primoz Skraba. Persistence-based e clustering in riemannian manifolds. Journal of the ACM (JACM) , 60(6):41, 2013. Yizong Cheng. Mean shift, mode seeking, and clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence , 17(8):790-799, 1995. Herman Chernoff. Estimation of the mode. Annals of the Institute of Statistical Mathematics , 16(1):31-41, 1964. Dorin Comaniciu and Peter Meer. Mean shift: a robust approach toward feature space analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence , 24:603-619, 2002. Dorin Comaniciu, Visvanathan Ramesh, and Peter Meer. The variable bandwidth mean shift and data-driven scale selection. In Proceedings of the Eighth IEEE International Conference on Computer Vision , volume 1, pages 438-445, 2001. Antonio Cuevas and Ricardo Fraiman. A plug-in approach to support estimation. The Annals of Statistics , 25(6):2300-2312, 1997. Sophie Dabo-Niang, Fr´ ed´ric e Ferraty, and Philippe Vieu. Estimation du mode dans un espace vectoriel semi-norm´. e Comptes Rendus Mathematique , 339(9):659-662, 2004. Aurore Delaigle and Peter Hall. Defining probability density for a distribution of random functions. The Annals of Statistics , 38(2):1171-1193, 2010. David L. Donoho and Richard C. Liu. Geometrizing rates of convergence, iii. The Annals of Statistics , pages 668-701, 1991. - William F. Eddy. Optimum kernel estimators of the mode. The Annals of Statistics , 8(4): 870-882, 1980. - Jochen Einbeck. Bandwidth selection for mean-shift based unsupervised learning techniques: a unified approach via self-coverage. Journal of Pattern Recognition Research , 6(2):175192, 2011. - Julian J. Faraway and Myoungshic Jhun. Bootstrap choice of bandwidth for density estimation. Journal of the American Statistical Association , 85(412):1119-1122, 1990. Fr´ ed´ric e Ferraty and Philippe Vieu. Nonparametric functional data analysis: theory and practice . Springer, 2006. Fr´ ed´ric e Ferraty, Ali Laksaci, and Philippe Vieu. Estimating some characteristics of the conditional distribution in nonparametric functional models. Statistical Inference for Stochastic Processes , 9(1):47-76, 2006. Fr´ ed´ric Ferraty, Nadia Kudraszow, and Philippe Vieu. Nonparametric estimation of a sure rogate density function in infinite-dimensional spaces. Journal of Nonparametric Statistics , 24(2):447-464, 2012. Bernard D. Flury. Estimation of principal points. Applied Statistics , pages 139-151, 1993. Bernhard A. Flury. Principal points. Biometrika , 77(1):33-41, 1990. Keinosuke Fukunaga and Larry Hostetler. The estimation of the gradient of a density function, with applications in pattern recognition. IEEE Transactions on Information Theory , 21(1):32-40, 1975. Theo Gasser, Peter Hall, and Brett Presnell. Nonparametric estimation of the mode of a distribution of random curves. Journal of the Royal Statistical Society, Series B , 60(4): 681-691, 1998. Gery Geenens. A nonparametric functional method for signature recognition. In Fr´d´ric e e Ferraty, editor, Recent advances in functional data analysis and related topics , Contributions to statistics, pages 141-147. Physica-Verlag HD, 2011. Christopher Genovese, Marco Perone-Pacifico, Isabella Verdinelli, and Larry Wasserman. Nonparametric inference for density modes. arXiv preprint arXiv:1312.7567 , 2013. John A. Hartigan. Clustering algorithms . John Wiley &amp; Sons, 1975. | Trevor Hastie and Werner Stuetzle. Principal curves. Journal of the American Statistical Association , 84(406):502-516, 1989. | |----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Lajos Horv´th a and Piotr Kokoszka. Inference for functional data with applications . Springer, 2012. | | Julien Jacques and Cristian Preda. Functional data clustering: a survey. Advances in Data Analysis and Classification , pages 1-25, 2013. | | Jussi Klemel¨. a Adaptive estimation of the mode of a multivariate density. Journal of Nonparametric Statistics , 17(1):83-105, 2005. | | Jing Lei, Alessandro Rinaldo, and Larry Wasserman. A conformal prediction approach to explore functional data. Annals of Mathematics and Artificial Intelligence , pages 1-15, 2013. | | Jia Li, Surajit Ray, and Bruce G. Lindsay. A nonparametric statistical approach to clus- tering via mode identification. Journal of Machine Learning Research , 8(8):1687-1723, 2007a. | | Xiangru Li, Zhanyi Hu, and Fuchao Wu. A note on the convergence of the mean shift. Pattern Recognition , 40(6):1756 - 1762, 2007b. | | Byeong U. Park and James S. Marron. Comparison of data-driven bandwidth selectors. Journal of the American Statistical Association , 85(409):66-72, 1990. | | Emanuel Parzen. On estimation of a probability density function and mode. The Annals of Mathematical Statistics , 33(3):1065-1076, 1962. | | James O. Ramsay and Bernard W. Silverman. Functional Data Analysis . Springer, 2005. | | Alessandro Rinaldo and Larry Wasserman. Generalized density clustering. The Annals of Statistics , 38(5):2678-2722, 2010. | | Alessandro Rinaldo, Aarti Singh, Rebecca Nugent, and Larry Wasserman. Stability of density-based clustering. Journal of Machine Learning Research , 13(1):905-948, 2012. | | Joseph P. Romano. On weak convergence and optimality of kernel density estimates of the mode. The Annals of Statistics , 16(2):629-647, 1988. | | Simon J. Sheather and Michael C. Jones. A reliable data-based bandwidth selection method for kernel density estimation. Journal of the Royal Statistical Society, Series B , 53(3): 683-690, 1991. | | Bernard W. Silverman. Using kernel density estimates to investigate multimodality. Journal of the Royal Statistical Society, Series B , pages 97-99, 1981. | | Bernard W. Silverman. Density estimation for statistics and data analysis . Chapman & Hall, 1986. | Werner Stuetzle. Estimating the cluster tree of a density by analyzing the minimal spanning tree of a sample. Journal of Classification , 20(1):025-047, 2003. Werner Stuetzle and Rebecca Nugent. A generalized single linkage method for estimating the cluster tree of a density. Journal of Computational and Graphical Statistics , 19(2), 2010. Philippe Vieu. A note on density mode estimation. Statistics &amp; Probability Letters , 26(4): 297-307, 1996. Vladimir Vovk, Ilia Nouretdinov, and Alex Gammerman. On-line predictive linear regression. The Annals of Statistics , 37(3):1566-1590, 2009.
null
[ "Mattia Ciollaro", "Christopher Genovese", "Jing Lei", "Larry Wasserman" ]
2014-08-06T05:12:04+00:00
2014-08-06T05:12:04+00:00
[ "stat.ME", "stat.AP", "stat.ML" ]
The functional mean-shift algorithm for mode hunting and clustering in infinite dimensions
We introduce the functional mean-shift algorithm, an iterative algorithm for estimating the local modes of a surrogate density from functional data. We show that the algorithm can be used for cluster analysis of functional data. We propose a test based on the bootstrap for the significance of the estimated local modes of the surrogate density. We present two applications of our methodology. In the first application, we demonstrate how the functional mean-shift algorithm can be used to perform spike sorting, i.e. cluster neural activity curves. In the second application, we use the functional mean-shift algorithm to distinguish between original and fake signatures.
1408.1188v1
## On the Kurzweil-Henstock Integral in Probability ## Sorin G. Gal ## Department of Mathematics and Computer Science, University of Oradea, Universitatii 1, 410087, Oradea, Romania E-mail: [email protected] ## Abstract By using the method in [5], the aim of the present note is to generalize the Riemann integral in probability introduced in [7], to KurzweilHenstock integral in probability. Properties of the new integral are proved. ## AMS 2000 Mathematics Subject Classification : 26A39, 60A10. Keywords and phrases : Random variable, Probability, Riemann integral in probability, Kurzweil-Henstock integral in probability. ## 1 Introduction Let ( E,B,P ) be a field of probability, where E is a nonempty set, B a field of parts on E and P a composite probability on B . Let us denote by L E,B,P ( ) the set of all real random variables defined on E and a.e. finite. It is well-known the following concept : Definition 1.1. (see e.g. [7], p. 50) We say that the random function f : [ a, b ] → L E,B,P ( ) (where a, b ∈ R , a &lt; b ) is Riemann integrable in probability on [ a, b ], if there exists a random variable I = I ( ω ) ∈ L E,B,P ( ) satisfying : for all ε &gt; 0 , η &gt; 0, there exists δ = δ ε ( ) &gt; 0, such that for all divisions d : a = x 0 &lt; x 1 &lt; ... &lt; x n = b with the norm ν d ( ) &lt; δ and all ξ i ∈ [ x , x i i +1 ], i ∈ { 0 , ..., n - } 1 , we have $$P ( \{ \omega \in E ; | S ( f ; d, \xi _ { i } ) ( \omega ) - I ( \omega ) | \geq \varepsilon \} ) < \eta,$$ where ν d ( ) = max { x i +1 -x i ; i = 0 1 , , ..., n - } 1 and $$S ( f ; d, \xi _ { i } ) ( \omega ) = \sum _ { i = 0 } ^ { n - 1 } f ( \xi _ { i }, \omega ) ( x _ { i + 1 } - x _ { i } ). \\ T ( \lambda ) \, \infty \, \text{in a hold the D} \, \text{in non-in} \, \text{in both} \, \text{in} \, \text{f} \, \text{f}.$$ In this case, I ( ω ) is called the Riemann integral in probability of f on [ a, b ] and it is denoted by I ( ω ) = ( P ) b a f ( t, ω ) dt . /negationslash ∫ Remark. As it was proved in [7, p. 50], if I 1 ( ω , I ) 2 ( ω ) are Riemann integrals in probablity of f on [ a, b ], then P ( { ω ∈ E I ; 1 ( ω ) = I 2 ( ω ) } ) = 0. Using the method in [5], in Section 2 we introduce the so-called KurzweilHenstock (Riemann generalized) integral in probability. Section 3 contains basic properties of this generalized integral. ## 2 The Kurzweil-Henstock Integral in Probability Firstly, we recall some concepts in [5] we need for our purpose. A tagged division of [ a, b ] is of the form $$d _ { S } \colon a = x _ { 0 } \leq \xi _ { 0 } \leq x _ { 1 } < \dots < x _ { i } \leq \xi _ { i } \leq x _ { i + 1 } < \dots < x _ { n - 1 } \leq \xi _ { n - 1 } \leq x _ { n } = b.$$ A gauge on [ a, b ] is an open interval valued function γ defined on [ a, b ], such that t ∈ γ t ( ), t ∈ [ a, b ]. A tagged division d S of [ a, b ] is called γ -sharp if [ x , x i i +1 ] ⊂ γ ξ ( i ), for all i ∈ { 0 , ..., n - } 1 . Now, we are in position to introduce the following. Definition 2.1. Let f : [ a, b ] → L E,B,P ( ). A random variable I ( ω ) ∈ L E,B,P ( ) is called a Kurzweil-Henstock (shortly (KH)) integral in probability of f on [ a, b ], if : for all ε &gt; 0 , η &gt; 0, there exists γ ε,η -gauge on [ a, b ], such that for any tagged division d S which is γ ε,η -sharp, we have $$P ( \{ \omega \in E ; | S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) - I ( \omega ) | \geq \varepsilon \} ) < \eta,$$ /negationslash where S f ( ; d S , ξ i )( ω ) = ∑ n -1 i =0 f ( ξ , ω i )( x i +1 -x i ) . In this case, we write I ( ω ) = ( KH ) ∫ b a f ( t, ω ) dt . Theorem 2.2. If I 1 ( ω ) , I 2 ( ω ) are (KH) integrals in probability of f on [ a, b ] , then P ( { ω ∈ E I ; 1 ( ω ) = I 2 ( ω ) } ) = 0 . Proof. We will prove that P ( { ω ∈ E ; | I 1 ( ω ) -I 2 ( ω ) | &gt; 0 } ) = 0. Let ε, η &gt; 0. There exists the gauges γ (1) ε,η , γ (2) ε,η on [ a, b ], such that for any tagged divisions of [ a, b ], d (1) S , d (2) S which are γ (1) ε,η -sharp and γ (2) ε,η -sharp, respectively, we have $$P ( \{ \omega \in E ; | S ( f ; d _ { S } ^ { ( 1 ) }, \xi _ { i } ) ( \omega ) - I _ { 1 } ( \omega ) | \geq \varepsilon / 2 \} ) < \eta / 2,$$ $$P ( \{ \omega \in E ; | S ( f ; d _ { S } ^ { ( 2 ) }, \xi _ { i } ) ( \omega ) - I _ { 2 } ( \omega ) | \geq \varepsilon / 2 \} ) < \eta / 2.$$ Let us define a new gauge on [ a, b ] by γ t ( ) = γ (1) ε,η ( ) t ⋂ γ (2) ε,η ( ), t t ∈ [ a, b ]. By [5, Section 1.8], there exists a γ -sharp tagged division d S of [ a, b ]. Since γ t ( ) ⊂ γ (1) ε,η ( ), t γ t ( ) ⊂ γ (2) ε,η ( ), t t ∈ [ a, b ], obviously that d S is γ (1) ε,η -sharp and γ (2) ε,η -sharp too. We have $$| I _ { 1 } ( \omega ) - I _ { 2 } ( \omega ) | \leq | I _ { 1 } ( \omega ) - S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) | + | S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) - I _ { 2 } ( \omega ) |,$$ which immediately implies $$\{ \omega \in E ; | I _ { 1 } ( \omega ) - I _ { 2 } ( \omega ) | \geq \varepsilon \} \subset \{ \omega \in E ; | I _ { 1 } ( \omega ) - S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) | \geq \varepsilon / 2 \}$$ and $$\bigcup \{ \omega \in E ; | S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) - I _ { 2 } ( \omega ) | \geq \varepsilon / 2 \}$$ P ( { ω ∈ E ; | I 1 ( ω ) -I 2 ( ω ) | ≥ ε } ) ≤ P ( { ω ∈ E ; | I 1 ( ω ) -S f ( ; d S , ξ i )( ω ) | ≥ ε/ 2 } ) $$+ P ( \{ \omega \in E ; | S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) - I _ { 2 } ( \omega ) | \geq \varepsilon / 2 \} ) < \eta / 2 + \eta / 2 = \eta.$$ Now, considering ε &gt; 0 fixed and passing to limit with η → 0, we get P ( { ω ∈ E ; | I 1 ( ω ) -I 2 ( ω ) | ≥ } ε ) = 0. $$P ( \{ \omega \in E ; | I _ { 1 } ( \omega ) - I _ { 2 } ( \omega ) | > 0 \} ) = \lim _ { n \to \infty } P ( A _ { n } ) = 0,$$ For ε = 1 n , let us denote A n = { ω ∈ E ; | I 1 -I 2 | ≥ 1 /n } . Obviously A n ⊂ A n +1 and ⋃ ∞ n =1 A n = { ω ∈ E ; | I 1 ( ω ) -I 2 ( ω ) | &gt; 0 } . Then, which proves the theorem. /square As in the case of usual real functions, another definition for the (KH) integral can be the following. Definition 2.3. Let f : [ a, b ] → L E,B,P ( ). We say that f is KurzweilHenstock integrable in probability on [ a, b ], if there exists I ∈ L E,B,P ( ) with the property : for all ε &gt; 0 and η &gt; 0, there exists δ ε,η : [ a, b ] → R + , such that for any division d S : a = x 0 &lt; x 1 &lt; ... &lt; x n = b and any ξ i ∈ [ x , x i i +1 ] with x i +1 -x i &lt; δ ε,η ( ξ i ), i = 0 , ..., n -1, we have $$P ( \{ \omega \in E ; | S ( f ; d _ { S }, \xi _ { i } ) ( \omega ) - I ( \omega ) | \geq \varepsilon \} ) < \eta.$$ Remarks. 1) The Definitions 2.1 and 2.3 are equivalent. Indeed, this easily follows from the fact that any function δ ε,η : [ a, b ] → R + , generates the gauge γ ε,η ( ) = ( t t -δ ε,η ( ) t / 2 , t + δ ε,η ( ) t / 2), t ∈ [ a, b ] and conversely, any gauge γ ε,η on [ a, b ] (which obviously can be written in the form γ ε,η ( ) = ( t t -α t , t ( ) + β t ( )), α t , β ( ) ( ) t &gt; 0, t ∈ [ a, b ]) generates the function δ ε,η ( ) = t α t ( ) + β t ( ), t ∈ [ a, b ], such that the (KH)-integrability which uses the function δ ε,η is equivalent with the (KH)-integrability which uses the gauge γ ε,η . 2) If δ ε,η is a constant function, Definition 2.3 reduces to Definition 1.1. ## 3 Properties of the (KH)-Integral in Probability In this section, we will prove some properties of the (KH)-integral in probability. Firstly, we need the following. Definition 3.1. (see e.g. [3, p. 82], [4]). We say that ϕ : [ a, b ] → R is Kurzweil-Henstock integrable on [ a, b ], if there exists I ∈ R , such that for all ε &gt; 0, there exists δ ε : [ a, b ] → R , such that for any division d : a = x 0 &lt; x 1 &lt; ... &lt; x n = b and any ξ i ∈ [ x , x i i +1 ] with x i +1 -x i &lt; δ ξ ( i ), we have | I -∑ n -1 i =0 ϕ ξ ( i )( x i +1 -x i ) | &lt; ε . We write I = ( KH ) ∫ b a ϕ t dt ( ) . The following result holds. Theorem 3.2. If f : [ a, b ] → L E,B,P ( ) is of the form f ( t, ω ) = ∑ p k =1 C k ( ω ) · ϕ k ( ) t , where C k ∈ L E,B,P ( ) and ϕ k are Kurzweil-Henstock integrable on [ a, b ] , k = 1 , ..., p , then f is Kurzweil-Henstock integrable in probability on [ a, b ] and we have $$\ a v e \\ ( K H ) \int _ { a } ^ { b } f ( t, \omega ) d t & = \sum _ { k = 1 } ^ { p } C _ { k } ( \omega ) \cdot ( K H ) \int _ { a } ^ { b } \varphi _ { k } ( t ) d t. \\. \quad \ a \sim \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array},$$ Proof. Obviously that it is sufficient to consider only the case when f ( t, ω ) = C ω ( ) · ϕ t ( ), ω ∈ E t , ∈ [ a, b ]. If d : a = x 0 &lt; ... &lt; x n = b , ξ i ∈ [ x , x i i +1 ], i = 0 , ..., n -1, then it is easy to see that S f ( ; d, ξ i )( ω ) = C ω ( ) · ∑ n -1 i =0 ϕ ξ ( i ) · ( x i +1 -x i ). Let us denote I = ( KH ) ∫ b a ϕ t dt ( ) and A m = { ω ∈ E ; | C ω ( ) | ≥ m } . Obviously, A m +1 ⊂ A m , m ∈ N . Denoting A = ⋂ ∞ m =1 A m , since C ∈ L E,B,P ( ) we get P A ( ) = 0 and lim m →∞ P A ( m ) = P A ( ) = 0. Consequently, if η &gt; 0, there exists N η ( ) ∈ N , such tat $$P ( \{ \omega \in E ; | C ( \omega ) | \geq m \} ) < \eta, m \in \mathbb { N }, m \geq N ( \eta ).$$ For fixed m ≥ N η ( ), let us consider ε &gt; 0, such that 1 /ε ≥ m . Now, for ε 2 &gt; 0, since ϕ is Kurzweil-Henstock integrable on [ a, b ], by Definition 3.1, there exists δ ε 2 : [ a, b ] → R , such that for any division d : a = x 0 &lt; ... &lt; x n = b and any ξ i ∈ [ x , x i i +1 ] with x i +1 -x i &lt; δ ε 2 ( ξ i ), i = 0 , ..., n -1, we have | I -∑ n -1 i =0 ϕ ξ ( i )( x i +1 -x i ) | &lt; ε 2 . We have $$\{ \omega \in E ; | S ( f ; d, \xi _ { i } ) ( \omega ) - C ( \omega ) \cdot I | \geq \varepsilon \}$$ $$& = \{ \omega \in E ; | C ( \omega ) | \cdot | I - \sum _ { i = 0 } ^ { n - 1 } \varphi ( \xi _ { i } ) ( x _ { + 1 } - x _ { i } ) | \geq \varepsilon \} \\ & \sim \{ \omega \in F \colon | C ( \omega ) | > 1 / \varepsilon \} \cap \{ \omega \in F \colon | C ( \omega ) | > m \}.$$ $$\subset \{ \omega \in E ; | C ( \omega ) | \geq 1 / \varepsilon \} \subset \{ \omega \in E ; | C ( \omega ) | \geq m \},$$ i.e. P ( { ω ∈ E ; | S f ( ; d, ξ i )( ω ) -C ω ( ) · I | ≥ } ε ) &lt; η , for any division d : a = x 0 &lt; ... &lt; x n = b and any ξ i ∈ [ x , x i i +1 ] with x i +1 -x i &lt; δ ε 2 ( ξ i ) (in fact, ε depends on m , which depends on η , therefore δ ε 2 ( ξ i ) depends on η too). Then, by Definition 2.3, we get $$( K H ) \int _ { a } ^ { b } f ( t, \omega ) d t = C ( \omega ) \cdot ( K H ) \int _ { a } ^ { b } \varphi ( t ) d t, \\ \text{proves the theorem.} \bigoplus _ { \substack { \mathcal { C } \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \, \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \dots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \, \cdots \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot }$$ which proves the theorem. Remark. Since the Kurzweil-Henstock integrability of a function ϕ : [ a, b ] → R is more general than the Riemann integrability (in fact, it is equivalent with the so-called Denjoy-Perron integrability, see [2], [8]), Theorem 3.2 gives examples of random functions which are Kurzweil-Henstock integrable in probability on [ a, b ] but are not Riemann integrable in probability in the sense of Definition 1.1. For p ≥ 1, let us consider $$L ^ { p } ( E, B, P ) = \{ g \in L ( E, B, P ) ; \int _ { E } | g ( \omega ) | ^ { p } d P ( \omega ) < + \infty \},$$ where ∫ E | g ω ( ) | q dP ω ( ) represents the q -th moment of the random variable g . The following Fubini-type result holds. $$( K H ) \int _ { a } ^ { b } \left [ \int _ { E } f ( t, \omega ) d P ( \omega ) \right ] d t = \sum _ { i } \left [ ( K H ) \int _ { a } ^ { b } f ( t, \omega ) d t \right ] d P ( \omega ).$$ Theorem 3.3. Let f : [ a, b ] → L E,B,P ( ) be Kurzweil-Henstock integrable in probability on [ a, b ] and such that there exists A ∈ L 1 ( E,B,P ) , A ω ( ) ≥ 0 , a.e. ω ∈ E with P ( { ω ∈ E ; | f ( t, ω ) | ≤ A ω ( ) } ) = 1 , for all t ∈ [ a, b ] . Then, ϕ t ( ) = ∫ E f ( t, ω ) dP ω ( ) , t ∈ [ a, b ] , is Kurzweil-Henstock integrable on [ a, b ] and Proof. Let us denote I ( ω ) = ( KH ) ∫ b a f ( t, ω ) dt ∈ L E,B,P ( ). Since f is Kurzweil-Henstock integrable on [ a, b ], for ε &gt; 0 and η = 1 /m m , ∈ N , there exists δ ε,m : [ a, b ] → R , such that for any division d m : a = x ( m ) 0 &lt; x ( m ) 1 &lt; ... &lt; x ( m ) n m = b and any ξ ( m ) i ∈ [ x ( m ) i , x ( m ) i +1 ], with x ( m ) i +1 -x ( m ) i &lt; δ ε,m ( ξ ( m ) i ), i = 0 , ..., n m -1, we have $$P ( \{ \omega \in E ; | S ( f ; d _ { m }, \xi _ { i } ^ { ( m ) } ) ( \omega ) - I ( \omega ) | \geq \varepsilon \} ) < 1 / m, \, m \in \mathbb { N }.$$ This means that S f ( ; d m , ξ ( m ) i )( ω ) → I ( ω ) in probability, as m →∞ . On the other hand, $$| S ( f ; d _ { m }, \xi _ { i } ^ { ( m ) } ) ( \omega ) | & = | \sum _ { i = 0 } ^ { n _ { m } - 1 } f ( \xi _ { i } ^ { ( m ) }, \omega ) ( x _ { i + 1 } ^ { ( m ) } - x _ { i } ^ { ( m ) } ) | \leq A ( \omega ) \cdot ( b - a ), \text{ a.e.} \ \omega \in E \\ \text{and taking into account the well-known property of the integral with respect to}$$ and taking into account the well-known property of the integral with respect to P, we immediately get $$\int _ { E } I ( \omega ) d P ( \omega ) & = \lim _ { m \to \infty } \int _ { E } S ( f ; d _ { m }, \xi _ { i } ^ { ( m ) } ) ( \omega ) d P ( \omega ) \\ & \quad n _ { \dots } - 1 \ \tilde { \ }. \quad \tilde { \ }.$$ $$& = \lim _ { m \to \infty } \sum _ { i = 0 } ^ { n _ { m } - 1 } \left [ \int _ { E } f ( \xi _ { i } ^ { ( m ) }, \omega ) d P ( \omega ) \right ] \cdot ( x _ { i + 1 } ^ { ( m ) } - x _ { i } ^ { ( m ) } ). \\, & \text{ reasoning exactly as in the case of the definitions of Riemann int}.$$ Now, reasoning exactly as in the case of the definitions of Riemann integrability (see e.g. [6, p. 379-380 and p. 383-384]), it is easy to obtain that the Kurzweil-Henstock integrability in Definition 3.1 is equivalent with the fact that there exists a sequence δ m : [ a, b ] → R , m ∈ N , such that for any sequence of divisions ( d m m ) ∈ N , d m : a = x ( m ) 0 &lt; x ( m ) 1 &lt; ... &lt; x ( m ) n m = b , and any sequence ( ξ ( m ) i ) i =0 ,n m -1 with ξ ( m ) i ∈ [ x ( m ) i , x ( m ) i +1 ], x ( m ) i +1 -x ( m ) i &lt; δ m ( ξ ( m ) i ), i = 0 , ..., n m -1, we have $$\lim _ { m \to \infty } S ( \varphi, d _ { m }, \xi _ { i } ^ { ( m ) } ) = I = ( K H ) \int _ { a } ^ { b } \varphi ( t ) d t. \\ \int _ { a } \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \p \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \pi \nolimits \, \detect }$$ But, denoting ϕ t ( ) = ∫ E f ( t, ω ) dP ω ( ), t ∈ [ a, b ], by the previous reasonings we immediately get that ϕ is Kurzweil-Henstock integrable on [ a, b ] and $$( K H ) \int _ { a } ^ { b } \left [ \int _ { E } f ( t, \omega ) d P ( \omega ) \right ] d t = \int _ { E } I ( \omega ) d P ( \omega )$$ $$\int _ { E } \left [ ( K H ) \int _ { a } ^ { b } f ( t, \omega ) d t \right ] d P ( \omega ),$$ which proves the theorem. /square Remarks. 1) Theorem 3.3 is an analogue of Theorem III.8 in [7, p. 55]. 2) Let f, F : [ a, b ] → R be such that F ′ ( x ) = f ( x ), x ∈ ( a, b ). It is known (se e.g. [1]) that in this case f is (KH)-integrable on [ a, b ] and ( KH ) ∫ b a f ( x dx ) = F b ( ) -F a ( ). /negationslash Now, let f, F : [ a, b ] → L E,B,P ( ) be such that in each t 0 ∈ ( a, b ), f is the derivative in probability of F t , w ( 0 ), i.e. for all ε, η &gt; 0, there exists δ ε, η ( ) &gt; 0, such that for all t ∈ [ a, b ], t = t 0 , | t -t 0 | &lt; δ ε, η ( ), we have $$P ( \{ \omega \in E ; | \, [ F ( t _ { 0 }, \omega ) - F ( t, \omega ) ] \, / ( t - t _ { 0 } ) - f ( t _ { 0 }, \omega ) | \geq \varepsilon \} ) < \eta,$$ holds. Then, the following question arises : in what conditions f ( t, ω ) is (KH)integrable in probability on [ a, b ] and $$( K H ) \int _ { a } ^ { b } f ( t, \omega ) d P ( \omega ) = F ( b, \omega ) - F ( a, \omega ), \text{ a.e. } \omega \in E.$$ ## References - [1] G. Cross, O. Shisha, A new approach to integration , J. Math. Anal. Appl. 114 (1986), 289-294. - [2] R. Henstock, Theory of Integration , Butterworths, London, 1963. - [3] R. Henstock, A Riemann-type integral of Lebesque power , Canad. J. Math., 20 (1968), 79-87. - [4] J. Kurzweil, Generalized ordinary differential equations and continuous dependence on a parameter , Czechoslovak Math. J., 7(82) (1957), 418-446. - [5] R. M. MacLeod, The Generalized Riemann Integral , Carus Mathematical Monographs, The Mathematical Association of America, 1980. - [6] M. Nicolescu, N. Dinculeanu, S. Marcus, Mathematical Analysis(Romanian) , vol. 1, Ed. 4, Edit. Did. Pedag., Bucharest, 1983. - [7] O. Onicescu, Gh. Cenusa, I. Sacuiu, Random Function Almost Periodic in Probability(Romanian) , Academic Press, Bucharest, 1983. - [8] L. P. Yee, W. Naak-In, A direct proof that Henstock and Denjoy integrals are equivalent , Bull. Malaysian Math. Soc., (2)5(1982 , 43-47.
null
[ "Sorin G. Gal" ]
2014-08-06T05:23:15+00:00
2014-08-06T05:23:15+00:00
[ "math.CA", "26A39, 60A10" ]
On the Kurzweil-Henstock integral in probability
By using the method in [5], the aim of the present note is to generalize the Riemann integral in probability introduced in [7], to Kurzweil-Henstock integral in probability. Properties of the new integral are proved.
1408.1189v3
## QCD θ -vacua from the chiral limit to the quenched limit Kazuya Mameda Department of Physics, The University of Tokyo, Hongo, Tokyo 113-0031, Japan ## Abstract We investigate the dependence of the QCD vacuum structure on the θ -angle and quark mass, using the Di-Vecchia-Veneziano model. Although the Di-Vecchia-Veneziano model is a chiral effective model, it contains the topological properties of the pure Yang-Mills theory. It is shown that within this model, the ground state energies for all θ are continuous functions of quark mass from the chiral limit to the quenched limit, even including the first order phase transition at θ = π . Based on this effective model, we discuss (i) how the ground state depends on quark mass, and (ii) why the phase transition at θ = π is present both in the chiral and quenched limit. In order to analyze the relation between quark mass and the θ -vacua, we calculate the chiral condensate as a function of quark mass. Also, considering the presence of the innate metastable states included in the QCD θ -vacuum, we also give a unified understanding of the phase transitions at θ = π in the chiral and quenched limit. ## 1 Introduction An SU(N) gauge theory contains the topology which originates in topologically non-trivial excitations of the gauge field. The vacuum structure in Quantum Chromodynamics (QCD) is directly influenced from such a topology because QCD vacuum is defined by the parameter, so-called θ -angle, which enters in the QCD action as the Chern-Simons term iQθ (where Q denotes the winding number of gluon, Q = ∫ d x 4 g 2 32 π F a µν ˜ F µν a ). In principle, the actual value of the θ -angle is so important for investigations of QCD phenomena. (Note that any transition between different θ -vacua is forbidden in infinite volume.) The CP symmetry in QCD, especially, depends only on the value of the θ -angle since the Chern-Simons term violates CP . The θ = 0 case is the most reliable candidate maintained by an experimental result θ ≤ 10 -10 [1] and in fact, phenomena in terms of the strong interaction seem not to break CP symmetry. Unfortunately, we do not know the theoretical reason why θ = 0 is selected. This is one of the unsolved problems in the standard model, referred to as the strong CP problem [2,3]. One might wonder if it is necessary to study the topological property in QCD, because of the fact that the θ -angle is found to have a negligibly small value. Nevertheless, we should consider the θ -vacuum structure for investigations of QCD since there exists another origin of the topology in QCD, i.e. the axial anomaly. For example, the η ′ -meson acquires, through the anomaly, an extra mass much larger than the mass of other mesons which seem to be the pseudo Nambu-Goldstone bosons related to the chiral symmetry breaking [4,5]. Lattice QCD simulations confirm that the η ′ mass formula gives a value consistent with the observed one. We have to note here that the mass formula suggested in Ref. [4,5] includes only quantities at θ = 0. It is indicated, hence, that even if θ = 0, the topological nature of QCD can give contributions to physics. (It has been also proposed recently that dark energy could stem from the θ -vacuum at θ = 0 [6-8].) /negationslash Among the physics involved with the QCD topology, phenomena with θ = 0 are on the frontier of the most important subjects in QCD. It has been suggested that the θ -angle can take various values event by event in heavy ion collisions [9, 10]. In other words, the θ -angle in the collision is considered not as a constant parameter, but a function of space-time coordinates (or like axion, which is the dynamical field introduced to solve the strong CP problem [11]). Such a new possibility of the θ -angle leads to interesting phenomena related to the topological structure of QCD [12-17]. The presence of an experimentally accessible situation with a finite θ -angle gives a strong motivation for the study of the θ -vacuum. Specifically, there is a need to investigate what happens when θ = 0 changes into finite values. Indeed for the structure for a finite θ -angle, the vacuum structure has been the subject of detailed studies over the years, and it has been shown that the case where θ = π is of particular importance [18-37]. (See also Ref. [38], which summarizes works related to the θ -dependence of QCD.) Naively, it might seem that θ = π is merely another candidate where QCD is CP invariant, and that there is nothing particularly special about θ = π . Nevertheless, θ = π does give rise to intriguing physics: the first order phase transition that leads to spontaneous CP symmetry breaking. This is one of the main points discussed in this paper. /negationslash As we have already mentioned, the axial symmetry is deeply connected to the QCD topology, as well as non-trivial gluonic excitations. We can assume, then, that the quark sector is strongly affected by this structure originating from the Chern-Simons term. Namely, by an axial rotation of the fermion field, the θ -dependence moves to the quark mass term from the Chern-Simons term. This implies that the θ -vacua depend not only on the strong θ -angle but also on quark mass. Here, the best quantity which explicitly shows the mass-dependence of the θ -vacuum is the topological susceptibility, χ top ( m ), interpreted as a function of quark mass. Indeed the topological susceptibilities in the chiral limit and the quenched limit have quite different forms as a function of the mass. It is important, hence, that we investigate the mass-dependence of the θ -vacuum, in order to completely understand the topological nature in QCD. Nevertheless, the vacuum structure for arbitrary quark mass has not been studied in detail, except for the chiral theory and the pure gluonic theory. (See Ref. [39], where differences between the chiral and quenched limit are argued, comparing the cases that N f = 0 and that N f = 0.) Briefly speaking, we do not know the vacuum structure for quarks heavier than Λ QCD , and no effective theory including the θ -angle is known. (In Ref. [40], for example, it is pointed out that effects of the axial anomaly definitely exist in the heavy quark effective theory, but not method for calculating these contributions to dynamics is proposed.) The Di-Vecchia-Veneziano model [41] is one of the simplest, yet remarkable chiral effective models reflecting the topological properties of QCD, and thus the dynamics described by this model have been investigated from many points of view [7,10,42-44]. (It is also possible to discuss a phenomenon related to θ and electromagnetic field B , based on the Di-Vecchia-Veneziano model [45].) In this paper, we discuss the θ -vacuum structure from the point of view of the mass-dependence, within the Di-Vecchia-Veneziano model. In Sec. 2, we mention the relation between quark mass and the topology more specifically. In Sec. 3, we show that this model is not a mere chiral model containing the QCD topology, but a more remarkable model that includes even the features of the θ -vacua in the quenched limit. In other words, the suggestion from this chiral model is quite pedagogical even for large mass. Based on this idea, in Sec. 4, we calculate the vacuum energies for arbitrary quark mass. In Sec. 5, by calculating chiral condensate as a function of quark mass within this model, we reveal the dynamical mechanism of the θ -vacuum, specifically the role of quark mass in the decision of vacuum states. Moreover, we investigate the first order phase transition at θ = π , which is quite beneficial for the understanding of the vacuum structure as a function of quark mass. It is important, here, that the phase transition in the chiral limit and the one in the quenched limit seem naively similar, although the dynamics in two limits are completely different. In Sec. 6, we discuss the origin of such a similarity of the vacuum structure, on the basis of the degeneracy of the metastable vacua included in QCD vacuum. ## 2 Mass-dependence of the θ -vacuum Quark mass is one of the most important factors when discussing topological properties of QCD. Let us review the global symmetries in QCD and the axial anomaly here, in order to reveal the mass-dependence of the θ -vacuum. The classical Lagrangian of massless QCD with N f flavors is invariant under the transformations related to the global symmetry group SU(N ) f L × SU(N ) f R × U(1) V × U(1) A . In contrast, in quantum theory, the axial symmetry U(1) A is broken due to the axial anomaly. Specifically, the measure of the functional integration of the quark field changes under the U(1) A -rotation with a phase α as D q →D q exp( -iN αω f ), where ω denotes the winding number density i.e., ∫ d xω 4 = Q . The measure of anti-quark field is transformed similarly. Thus, by this rotation, an extra term is added to the Lagrangian; L → L 2 N αω f . Choosing the rotation angle as α = θ/ N 2 f , one can cancel the Chern-Simons term iQθ . In massive QCD, however, the θ -angle remains in the Lagrangian even though under the same rotation, due to the extra factor appearing the quark mass term, which is not invariant under the U(1) A -rotation; m → me iγ 5 θ/N f . Hence, one can schematically write this transformation of the QCD action, as follows; $$S _ { \theta } = S ( m ) + i Q \theta \ \xrightarrow { \text{Axial} } \ S _ { \theta } = S ( m e ^ { i \gamma _ { 5 } \theta / N _ { t } } ).$$ This means that the θ -dependence of QCD enters only through the factor coupled with quark mass, and thus the θ -vacuum structure depends not only on θ but also on m . The mass-dependence of the QCD θ -vacua emerges in typical limits: the chiral limit and the quenched limit. In these two limits, the topological susceptibility $$\chi _ { \text{top} } = \frac { 1 } { V _ { 4 } } \int d ^ { 4 } x \langle \omega ( x ) \omega ( 0 ) \rangle \Big | _ { \theta = 0 }, & ( 2 ) \\ \text{mpletely different values. Lattice QCD simulation shows that the subscript}.$$ for example, takes completely different values. Lattice QCD simulation shows that the susceptibility in the pure Yang-Mills theory is a constant; χ top = χ pure ∼ (170 -180MeV) 4 [46]. On the other hand, it is derived that for small quark mass, the topological susceptibility is proportional to the mass; χ top ∝ m [43]. (This is consistent with the fact that the θ -dependence through the mass term vanishes in the chiral limit, as shown in Eq. (1).) Since the topological susceptibility is the potential curvature of the θ -vacuum at θ = 0, the difference of the topological susceptibilities in two limits actually indicates that the vacuum structure depends on quark mass. For middle mass, i.e., finite large mass, the θ -vacuum structure is, however, not clear. This is due to the fact that neither a heavy quark effective model or theory including the θ -angle is known, and thus there is no method for calculating the physical quantities under the presence of the θ -angle for heavy quarks, compared with Λ QCD (i.e., c -, t -, and b -quarks). The unclarity of the θ -vacuum for large mass might be realized if one reconsiders the θ -vacuum in the pure Yang Mills theory, comparing with the one in the heavy quark theory. In general, the degree of freedom in a theory is a dynamical field. Heavy quarks do not, therefore, engaged in dynamics, or the propagations of heavy flavors become negligible as the masses are increased. This can be rephrased in the language of field theory as follows; the pure Yang-Mills theory is regarded as the theory after one integrates out heavy flavors. From a naive calculation, however, this procedure to obtain the pure Yang-Mills theory from QCD would lead to an incorrect θ -dependence. By the U(1) A -rotation, q → e iγ 5 θ/ N 2 f q , as mentioned already, the Chern-Simons term can be canceled, and instead of this, the θ -angle appears only in the mass term. If starting from this axial rotated action, one could integrate out heavy quarks, then θ -angle also have been removed from the action. However, this θ -independent pure Yang-Mills theory lies in direct contradiction to the fact that we can obtain the pure Yang-Mills theory with the definite θ -dependence, starting from the action before the rotation. In fact, as mentioned, the topological susceptibility in the pure Yang-Mills theory has a finite value χ pure . This inconsistency might be caused by the non-commutativity of the large mass limit and the regularization of the axial anomaly (which is indeed the case that we shall see the cause of the non-commutativity for the vacuum state in a later section). This implies, however, that the heavy quark approximation with the θ -angle is never trivial and the pure Yang-Mills theory cannot be derived straightforwardly from full QCD. Therefore, we should take care the quenched theory in the presence of θ -angle. Additionally the non-commutativity imposes us to analyze more particularly the θ -vacuum structure depending on quark mass. We discuss the dynamical effect of quark mass in Sec. 5, by the estimation of the chiral condensate as a function of quark mass. The physics at θ = π is one of the most intriguing points in the investigation of the θ -vacua, and also give a good example that demonstrates the mass-dependence. As mentioned in Sec. 1, θ = π is related to the important feature of the θ -vacuum, namely the first order phase transition [18]. Using, the Di-Vecchia-Veneziano model, which is a chiral effective model involving the U(1) A anomaly in full QCD, one can see that the phase transition occurs at θ = π [20]. It is also suggested that the first order phase transition occurs in the quenched theory, i.e., the pure Yang-Mills theory by the investigations with the holographic approach [31]. These phase transitions, one in the chiral theory and the other in the pure Yang-Mills theory, might appear as an inherent feature involving in the θ -vacuum. We should note, however, that this similarity is never trivial, and indeed that these phase transitions have completely different underlying mechanics. The phase transition at θ = π in the chiral effective model results from the dynamics of meson fields or quarks. On the other hand, in the pure Yang-Mills theory, of course, there are only gluons which could trigger such a transition. Additionally, the formations of metastable states which leads to the phase transitions are definitely different in the chiral and quenched limits. While in the quenched limit, there are infinite non-degenerate metastable states, those in the chiral limit are categorized into only few patterns. This difference with respect to the metastable states implies, hence, that the degeneracy originates in the number of dynamical flavors. We discuss in Sec. 6, including the point of view of the relation between dynamical flavors and metastable states, the difference of the first order phase transitions in the chiral and quenched limit, based on a unified framework. ## 3 Di-Vecchia-Veneziano model for large mass The main goal of this paper is to find the the ground state as a function of the θ -angle and quark mass, based on the Di-Vecchia-Veneziano model [41] given by the following Lagrangian, $$\mathcal { L } & = \frac { f _ { \pi } ^ { 2 } } { 4 } \text{tr} \left [ \partial _ { \mu } U ^ { \dagger } \partial ^ { \mu } U + 2 \chi ( M U ^ { \dagger } + U M ) \right ] - \frac { \chi _ { \text{pure} } } { 2 } \left [ \theta - \frac { i } { 2 } \text{tr} ( \ln U - \ln U ^ { \dagger } ) \right ] ^ { 2 }, \quad \ \ ( 3 ) \\ \text{where } f \text{ is the union above content } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text$$ where f π is the pion decay constant, χ = -〈 ¯ qq /f 〉 2 π is a parameter given by the Gell-MannOakes-Renner relation, and χ pure stands for the topological susceptibility in the pure Yang-Mills theory. The first trace part are the first order terms of the chiral perturbation theory and the second part, including the θ -angle, reflects the axial anomaly. From this effective Lagrangian, we calculate the θ -vacuum for arbitrary quark mass, following the argument in Ref. [20]. Since the Di-Vecchia-Veneziano model is based on the chiral perturbation theory, however, only the exact ground state for small mass is obtained, and indeed in the original work [20], quark masses are assumed as realistic small values. Therefore it is necessary to discuss the validity of the extending this model to the case for heavy quark. For this purpose, it is useful to analyze the topological susceptibility calculated from this model. For the case of the two degenerate light flavors, namely M = diag ( m,m ), for example, the topological susceptibility as a function of quark mass is written as [43]; $$\chi _ { \text{top} } ( m ) = \frac { \chi _ { \text{pure} } m } { m + 2 \chi _ { \text{pure} } / f _ { \pi } ^ { 2 } \chi }.$$ The mass-dependence of the topological susceptibility is indicated in Fig. 1. Originally, this relation is derived, based on the discussion in Ref. [20], where the quark masses are light. However, the derivation of Eq. (4) does not necessarily require that quark masses are light. If Eq. (4) is regarded as a valid relation even for large quark mass, then one finds that in the large mass limit, this function approaches to the expected topological susceptibility χ pure . This implies, hence, that the Di-Vecchia-Veneziano model contains the property of the θ -vacuum even in the quenched limit. It is not accidental that the Di-Vecchia-Veneziano model reproduces the result in the pure Yang-Mills theory. The topological property in this model is introduced through the 1 /N c approximation [41]. In the large N c limit, quarks are decoupled completely from gluons, and thus there are no dynamical quarks after integrating out fermion fields. This situation is equivalent to the one in the large mass limit. The topological property in the large mass limit, therefore, enters automatically in the Di-Vecchia-Veneziano model. Figure 1: The topological susceptibility as a function of quark mass where f 2 π /χ = -〈 ¯ qq 〉 = (250 MeV) . 3 For small mass the topological susceptibility is a linear function of quark mass. On the other hand, the topological susceptibility for large mass is asymptotically equal to χ pure . The two green lines in this figure denote χ top ( m ) = mf χ/ 2 π 2 and χ top ( m ) = χ pure , respectively. The Di-Vecchia-Veneziano model, therefore, includes the vacuum structure both in the chiral and quenched limit. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-1af1a54f-26df-48ec-a1ef-1e8ec17852da.jpg) Since higher order mass terms should be considered for large quark mass, the Di-VecchiaVeneziano model, which contains only the leading order of mass term, could not be used. Nevertheless, the topological susceptibility Eq. (4) reproduces the result in the pure Yang-Mills theory. In addition to this, in Sec. 4, we will find that the θ -vacuum state calculated with the Di-VecchiaVeneziano model in the large mass limit becomes exactly the same form as the one obtained in the pure Yang-Mills theory. In this sense, the Di-Vecchia-Veneziano model can be regarded as the simplest model which satisfies both boundary conditions: the topological properties in the chiral limit and the quenched limit. Then we emphasize that the Di-Vecchia-Veneziano model is quite pedagogical for the investigation of the θ -vacuum structure, and at least, the vacuum for sufficiently small and large mass can be obtained correctly from this effective model. ## 4 Analysis of the model In this section, we consider two quarks with degenerate masses i.e., M = diag( m,m ). For the ground state energy, the dynamical field should be written as U = diag( e iφ u , e iφ d ). The potential part of Eq. (3) can then be reduced to the following simpler form; $$V ( \phi _ { u }, \phi _ { d } ) = - f _ { \pi } ^ { 2 } \chi m ( \cos \phi _ { u } + \cos \phi _ { d } ) + \frac { \chi _ { \text{pure} } } { 2 } ( \theta + \phi _ { u } + \phi _ { d } ) ^ { 2 },$$ which leads to the set of equations of motion $$f _ { \pi } ^ { 2 } \chi m \sin \phi _ { i } + \chi _ { \text{pure} } \left ( \theta + \phi _ { u } + \phi _ { d } \right ) = 0, \quad i = u, d.$$ The set of solutions which could give the ground state are φ u = φ d -2 πk = φ , where k is an integer since Eq. (6) implies sin φ u = sin φ d . (Another type of solution, φ u = (2 k -1) π -φ d = φ never gives the minimum energy.) Then the equation to solve becomes $$f _ { \pi } ^ { 2 } \chi m \sin \phi + \chi _ { \text{pure} } \left ( \theta + 2 \pi k + 2 \phi \right ) = 0.$$ Especially, in the chiral and quenched limit, this transcendental equation can be solved analytically, and the solutions read $$\phi ( \theta, m ) = \begin{cases} - \frac { \theta + 2 \pi k } { 2 } + \mathcal { O } ( m ) & \text{(small $m$)} \\ - \frac { \chi \text{pure} } { f _ { \pi } ^ { 2 } \chi m } ( \theta + 2 \pi k ) + \mathcal { O } ( m ^ { - 2 } ) & ( \text{large $m$} ), \\ \text{ive the potentials in these limits} \end{cases}$$ which give the potentials in these limits: $$\lambda \quad & \quad \cdot \\ & V ( \phi, \phi + 2 \pi k ) = \begin{cases} - 2 f _ { \pi } ^ { 2 } \chi m \cos \left ( \frac { \theta + 2 \pi k } { 2 } \right ) + \mathcal { O } ( m ^ { 2 } ) & \text{(small $m$)} \\ \\ - 2 f _ { \pi } ^ { 2 } \chi m + \frac { \chi p u r e } { 2 } ( \theta + 2 \pi k ) ^ { 2 } + \mathcal { O } \left ( m ^ { - 1 } \right ) & \text{(large $m$)}. \end{cases}$$ Note that the potential V ( φ, φ + 2 πk ) is a candidate of the true ground state energy. In other words, V ( φ, φ + 2 πk ) is regarded as the potential of a metastable vacuum state labeled with an integer k , and the true vacuum energy is given by min k [ V ( φ, φ +2 πk )]. (In Sec. 6, we will give a detailed discussion concerning these metastable states.) As shown in Ref. [20], the vacuum for small mass is decided by the competition between two metastable state with even k and the one with odd k . On the other hand, we also obtain the same result as the one derived from the holographic approach [31]; the vacuum of the pure Yang-Mills theory is determined by the minimum of the parabolic functions, i.e. min ( k θ +2 πk ) 2 . As mentioned in Sec. 3, the Di-Vecchia-Veneziano model is based on the chiral perturbation theory, and thus naively it might seem that this model cannot be directly applied to cases where quarks are not light. Nevertheless, we stress that our extension of this model is validated because the vacuum in the pure Yang-Mills theory is derived within this model. Additionally, if this model can be used even for arbitrary quark mass, we obtain the vacuum energies as a function of quark mass and the θ -angle, from numerical calculation of Eq. (6) (see Fig. 2). This figure shows that the Di-Vecchia-Veneziano model gives the θ -vacua as a continuous function of quark mass, and that it reproduces the characteristic first order phase transition at θ = π (mod 2 π ), unless quarks are massless. We understand why the vacuum energies for small and large mass are described as different functions of the θ -angle, considering the structure of Eq. (7) and its solution Eq. (8). As mass increased, the solution φ θ, m ( ) becomes much smaller, and eventually approaches to zero, as described in Eq. (8). In other words, quark mass plays the role of fixing the dynamical meson field U to unity. In this sense, we find an answer for the question raised in Sec. 2: the reason why Figure 2: QCD vacuum energy as a function of the θ -angle and quark mass. The θ -vacuum structure indicates that there are phase transitions at θ = (2 n -1) π unless quarks are massless. Here, we expressed ˜ V = V + 2 f 2 π χm instead of V so that the θ -dependence appears more clearly. Also we chose the parameters as f π = 93 MeV, f 2 π χ = -〈 ¯ qq 〉 = (250 MeV) , and 3 χ pure = (170 MeV) . 4 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-22342353-e214-4c46-849a-834b61c6d746.jpg) the pure Yang-Mills theory with the Chern-Simons term iQθ cannot be obtained by integrating out the U(1) A -rotated heavy fermion field e iγ 5 θ/ N 2 f q . Namely, for heavy quarks, a change of the phase of U , such as an axial rotation, is prohibited energetically because such a transformed U does not minimize the potential energy. At the end of this section, we comment about the periodicity of θ . Any physical quantity should be a function with the periodicity under the transformation θ → θ + 2 π . We have to note that the periodicity of θ is necessary not for the energy of a metastable state, but for the vacuum energy. In fact, its potentials Eq. (9) are not such periodic function. The periodicity in terms of the vacuum energy is verified, if one notices from Eq. (7) that the transformation θ → θ + 2 π is equivalent to the change of an integer k into k + 1. Therefore, the vacuum energy given by min [ k V ( φ, φ + 2 πk )] does not change under the transformation k → k +1, or equivalently θ → θ +2 . π ## 5 Chiral condensate As well known, the chiral condensate with a finite θ -angle becomes a complex value, because under the U(1) A -rotation with the angle θ/ N 2 f , the mass term is transformed as $$m \bar { q } q & \to m \bar { q } e ^ { i \gamma _ { 5 } \theta / N _ { f } } q \\ & = m \bar { q } q \cos ( \theta / N _ { f } ) + i m \bar { q } \gamma _ { 5 } q \sin ( \theta / N _ { f } ).$$ Since in our argument, chiral condensate is regarded as tr U with phases φ u and φ d , its real part (or σ -condensate) and imaginary part (or η -condensate) can be obtained directly from the solution φ θ, m ( ) for the minimized equation Eq. (7); $$\text{Re} \langle \bar { q } q \rangle _ { \theta } = \langle \bar { q } q \rangle \cos \phi ( \theta, m ), \quad \text{Im} \langle \bar { q } q \rangle _ { \theta } = \langle \bar { q } q \rangle \sin \phi ( \theta, m ),$$ where 〈 ¯ qq 〉 stands for the chiral condensate for θ = 0. The mass- and θ -dependences of the condensates are shown in Fig. 3. From the chiral condensate as a function of quark mass and the θ -angle, we confirm again the contribution of mass to the θ -vacua, and also obtain a new suggestion in terms of the θ -dependence of chiral condensate. As discussed in Sec. 4, the solution φ θ, m ( ) for large mass is fixed to zero. As a result of this, the imaginary part of the complex chiral condensate ∼ sin φ θ, m ( ) is suppressed for large quark mass (see the right panel of Fig. 3). This means that the complex chiral condensate, even for finite θ -angle, becomes a real value in the large mass limit. In other words the complex chiral condensate is also fixed to the real direction on the chiral circle, due to the effect of large mass. Besides, based on such a fixation mechanism of the chiral condensate, we can obtain another reason why taking the quenched limit after the axial rotation Eq. (10) leads to an incorrect action without the topology. Namely, the real direction of chiral condensate on the complex plane is most favorable, and thus the axial rotation in the large mass limit is energetically forbidden. For light quarks, we also find the typical behavior in Fig. 3. As long as quarks are light enough, the θ -dependence of the imaginary part remains because there is no energetic restriction of the axial rotation. Moreover, the singularities in Fig. 3 are related to that of the potential Fig. 2. Indeed it is pointed out that the Numbu-Jona-Lasinio model leads to such a singularity of chiral condensate at θ = π [33] (see also Ref. [29], which gives a similar discussion of the massive Schwinger model). Based on the periodicity of the θ -angle for the vacuum energy, we can check that for the chiral condensate. As mentioned in Sec. 4, the vacuum energy given by the true solution for Eq. (6) is a periodic function of the θ -angle. This implies that the true solution should also be periodic under the transformation θ → θ +2 . On the other hand, the chiral condensate is π also determined by such a solution, through Eq. (11). Thus, the chiral condensate is, actually, periodic under the transformation θ → θ +2 . π ## 6 Metastable states In this section, we discuss metastable states that are the origin of the first order phase transitions at θ = π . In order to do this, first we review a remarkable work related to the nature of the metastable state in QCD [47]. The QCD partition function including the θ -angle can be written in the following form, $$Z ( \theta ) = \sum _ { Q } Z _ { Q } e ^ { i Q \theta } = \sum _ { \tilde { Q } } f ( \tilde { Q } ) e ^ { i \theta V _ { 4 } \tilde { Q } }.$$ Here, we introduced the topological charge density ˜ Q = Q/V 4 , and V 4 denotes the four dimensional volume. (Note that we used and will use some different notations from those of the original paper.) This partition function, taking the large volume limit i.e., ˜ Q → x , gives its continuous version; $$Z ( \theta ) \underset { V _ { 4 } \to \infty } { \longrightarrow } \mathcal { Z } _ { \text{c} } ( \theta ) = V _ { 4 } \int d x f ( x ) e ^ { i \theta V _ { 4 } x }.$$ ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-dee020c8-d7be-4d14-bd3b-3238c73cf3ac.jpg) Figure 3: θ -and mass-dependence of the complex chiral condensate. For both the real and imaginary part of the condensate, there are singularities at θ = π . The same result is pointed out for small mass in Ref. [33]. These condensates for large mass do not depend on the θ -angle, and especially the imaginary part is suppressed. This is because the phases of meson field U , i.e. φ u and φ d are fixed dynamically to zero for heavy quark mass. Therefore, the chiral condensate for large mass is fixed to the real value 〈 ¯ qq 〉 even if θ = 0. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-5a865a76-64e7-4930-858c-37312e977d59.jpg) /negationslash Then using the Poisson summation formula, one can obtain the relation between Z θ ( ) and Z c ( θ ) as $$Z ( \theta ) = \sum _ { n } \mathcal { Z } _ { \text{c} } ( \theta + 2 \pi n ).$$ This relation implies a physical meaning of the integers n . In the large mass limit, the sum in Eq. (14) may receive only one dominant contribution, and thus the QCD ground potential takes the following form; $$\Omega = - \frac { 1 } { V _ { 4 } } \ln Z ( \theta ) \underset { V _ { 4 } \to \infty } { \longrightarrow } \min _ { n } \left [ - \frac { 1 } { V _ { 4 } } \ln \mathcal { Z } _ { \text{c} } ( \theta + 2 \pi n ) \right ].$$ In this sense, Z c ( θ +2 πn ) is regarded as the partition function of the metastable state labeled by n . Note that an integer n has nothing to do with the label related to topological vacua, i.e. Q or x . Indeed the partition function of n -state includes the contributions from all topological vacua, as shown in Eq. (13). In this context, let us consider CP symmetry. Similarly to the partition function Eq. (14), the topological charge density, which is the order parameter of CP symmetry, is also given by the sum of the contribution from each metastable state; $$\langle \tilde { Q } \rangle = \sum _ { n } \langle x _ { n } \rangle, \quad \langle x _ { n } \rangle = \frac { V _ { 4 } } { Z ( \theta ) } \int d x x f ( x ) e ^ { i ( \theta + 2 \pi n ) x V _ { 4 } }.$$ The topological charge density 〈 ˜ Q 〉 should vanish at θ = π because there is the CP symmetry for θ = π . In fact, although each 〈 x n θ 〉 = π my be a finite value, all adjacent pairs cancel out; based on the definition of 〈 x n 〉 in Eq. (16), we can check 〈 x n θ 〉 = π = -〈 x n -1 〉 θ = π . In the large volume limit, however, CP might be broken. This is because for large volume, only one dominant metastable state remains in the sum Eq. (14) and so in Eq. (16). It is possible, hence, that the total topological charge density 〈 ˜ Q 〉 becomes finite, as long as that in the dominant state is not zero. We note that a dominant metastable state is selected by the value of the θ -angle. Suppose that the n = 0 metastable state is dominant for 0 ≤ θ ≤ π (at least, it is dominant for small θ since all the others are suppressed by the phase factor e i 2 πnxV 4 ). In this case, the n = -1 state also becomes dominant for π ≤ θ ≤ 3 π . Thus, θ = π could be the boundary between the phases dominated by the n = 0- and n = -1 state. This is the main idea of origin of the phase transition at θ = π . In the upper parts of Fig. 4 and Fig. 5, these domains are shown. /negationslash For the investigation of the metastable states in the Di-Vecchia-Veneziano model, we mention the following three remarks (the first and second are actually connected to our discussion). First, each domain does not have to be physically different from each other, and even if several phases are equivalent, the phase transition might occur at θ = π . For example, suppose that all the phases dominated by an odd n -state are equivalent and so are all the phases dominated by an even n -state, and that these two types of domains are different. Namely, there are two independent phases. Then the phase transition at θ = π exists since θ = π is the boundary between different phases dominated by the n = 0- and n = -1 state. Secondly, even if one takes the large volume limit, the phase transition at θ = π does not always occur. There is no phase transition at θ = π , for example, if the n = 0 and n = -1 state are physically equivalent. Hence, there is the first order phase transition at θ = π only if 〈 x 0 〉 θ = π = 〈 x -1 〉 θ = π . Finally, we also have to note that the aforementioned mechanism of the phase transition is rather general, except for an assumption that the n = 0 state is dominant for 0 ≤ θ ≤ π . In other words, even for the Di-Vecchia-Veneziano model, the origin of the first order phase transition at θ = π should be explained, considering the innate metastable states included in QCD. Next we analyze the relation between quark mass and the metastable states. In the pure gluonic theory, the energy density of the θ -vacuum is given by [31], $$E ( \theta ) \in \min _ { k } ( \theta + 2 \pi k ) ^ { 2 }.$$ From the viewpoint of the metastable states, this energy configuration means that the integer k in Eq. (17) corresponds one-to-one with the label of these states, n in Eq.(14) (see Fig. 4). We can confirm directly, thus, that the phase transition for large mass is caused by the metastable states. On the other hand, for small mass, there are only a few types of the metastable states [20]. Indeed Eq. (9) shows that the potential energies for small mass are separated by the two types corresponding to odd k and even k . More generally, the true vacuum for the N f light flavors case consists of N f types of potential, and the vacuum energy is given by $$E ( \theta ) \, \in \, \min _ { k = 1, \cdots, N _ { f } } \left [ - \cos \left ( \frac { \theta + 2 \pi k } { N _ { f } } \right ) \right ].$$ Since k never coincide with n in Eq. (14), it seems naively that the phase transition for light mass should be interpreted as physically different from that in the pure Yang-Mills theory. The phase transition can also be explained by the metastable states, however, if we consider that an infinite number of metastable states are degenerate (see Fig. 5). Namely, the phase transition for small mass results from the degeneracy of the metastable states; { n = 0 , ± 1 , ± 2 , · · · } -→ { k = 1 2 , , · · · , N f } . Figure 4: Interpretation of the phase transition in the pure Yang-Mills theory, based on Ref. [47]. In this case, all the domains in the upper figure correspond to each parabola, and the metastable states are labeled by integer k in Eq. (7). The phase transition θ = π for heavy quarks results from the infinite parabolic energy functions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-531156ca-f9f2-423e-9ae0-1ea19bc72f73.jpg) Here, analyzing again the equation of motion of the Di-Vecchia-Veneziano model, we can clarify the structure of the degenerate metastable states. If we suppose that all flavors are light, the solution is given approximately by the simple equation of motion $$\theta + \sum _ { i } \phi _ { i } = 0,$$ so that the topological term ∼ ( θ + ∑ i φ i ) 2 in the potential should be very small. Considering heavy quarks together with light ones, however, Eq. (19) should be changed. For example, let us assume that there are one heavy flavor named φ 1 , and two light flavors, φ 2 and φ 3 . As we see in Sec. 4, the heavy flavor φ 1 is fixed to zero so that the mass term becomes small. The equation of motion to solve, therefore, is rewritten as $$\theta + \phi _ { 2 } + \phi _ { 3 } = 0, \quad \phi _ { 1 } = 0.$$ As a result, the θ -dependence is determined only by the two light flavors. As shown in Fig. 6, this is equivalent to the case that there are only two dynamical flavors. The degeneracy factor of the metastable states is equal not to the number of the flavors included originally in theory, but to that of dynamical quarks. The above discussion leads us to an interesting result for the one flavor case. From the viewpoint of the degeneracy of the metastable states, there is no phase transition for the one light flavor case because all adjacent regions are dominated by the same metastable states. On the other hand, since the potential in the large mass limit is given by Eq. (17) independently on N f , there appears the phase transition at θ = π . For N f = 1, this implies the presence of a new transition (strictly speaking, a crossover) between two phases in terms of the absence and the existence of the spontaneous CP breaking at θ = π . If the solution φ 1 = φ θ, m ( ) has the singularity at θ = π , the spontaneous CP breaking occurs at θ = π . In Fig. 7, therefore, we can Figure 5: Degeneracy of the metastable states for light quarks. The true vacuum energy Eq. (18) for N f = 2 consists of only two energy functions: -cos ( θ/ 2 + π ) for k = 1 and -cos ( θ/ 2) for k = 2. All the metastable states labeled by odd (even) n degenerate as the k = 1 ( k = 2) states. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-74168f3c-2969-4e52-b71f-ff3f445148db.jpg) Figure 6: Metastable states under the presence of three light flavors (Left), and one heavy and two light flavors (Right). Because heavy flavor is fixed to zero, as mentioned in Sec. 4, only the light flavors contribute to the equation of motion. As a result of this, the vacuum energy of the case described in the Right panel is equivalent to the one for N f = 2. One can confirm from the example, therefore, that the degeneracy factor of the metastable states is determined not by the number of flavors included in the theory, but the one of the dynamical flavors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-c89ffb03-76af-476d-856d-64d3d3b513b1.jpg) confirm such a new phase transition, from the discontinuity of φ 1 = φ θ, m ( ) at m /greaterorsimilar f π . The same result is argued in Ref. [25,26]. ## 7 Conclusion We showed in this paper how quark mass contributes to the QCD θ -vacua as a function of the θ -angle and quark mass, within the Di-Vecchia-Veneziano model. The discussions in this paper are based of a new interpretation that the physics even for large mass is described by the Di-VecchiaVeneziano model. This is confirmed, for example, from the fact that the topological susceptibility computed within this model reproduces an expected result for large mass; χ top ( m ) → χ pure . First of all, we investigated the effect of heavy quark to the θ -vacuum state, calculating the potential energy of the vacuum. Then we found that the phase of the meson field minimizing the potential is fixed to zero. As a result of this, any axial rotation for large mass is forbidden energetically. Figure 7: Classical solution of the one flavor Di-Vecchia-Veneziano model as a function of the θ -angle and quark mass. For small mass, the solution is a smooth function of θ , and thus there is no phase transition related to the variation of the θ -angle. As mass increased, the discontinuity at θ = π , however, appears in the vicinity of m /similarequal f π . This shows the existence of the crossover between the phases in which the CP at θ = π is restored (for small mass) and broken spontaneously (for large mass). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1189v3-figure-97cd8450-a370-4e82-a556-92c7aafd4ddb.jpg) This argument leads to the mass dependence of chiral condensate; as mass increased, the chiral condensate after the axial rotation, i.e., 〈 ¯ qe iγ 5 θ/N f q 〉 is fixed to the real direction on the chiral circle. We analyzed the innate metastable states included in the QCD θ -vacuum (these are different from the topological vacua labeled by the Chern-Simons number). In the Veneziano-Di- Vecchia model, there are basically infinite solutions for the classical equation of motion, and each solution is labeled by an integer k . In the quenched limit, all solutions give different potential energies, and thus the vacuum is decided by the infinite metastable states. In contrast, there are only N f solutions in the small mass limit. As a result, the vacuum state for small mass consists of N f metastable states. The reduction of the number of the metastable states as quark mass decreased implies that dynamical quarks play an important role leading to the degeneracy of the metastable states underlying full QCD. Indeed, we checked that for N f = 1, a unique metastable state in the small mass limit is split into a number of metastable states, as mass increased. Additionally, the phase transitions at θ = π for small and large mass are also interpreted uniformly; for arbitrary mass, θ = π is the boundary between the two phases dominated by different metastable states. Finally, we stress that a thorough investigation of the property of the θ -vacua, especially in regard to the mass-dependence. For example, we need to discuss the heavy quark effective theory with the θ -vacuum taken account into. Such an approach might give supports for our calculation based on the Di-Vecchia-Veneziano model. At the same time, the numerical method instead of lattice QCD simulation, which does not work for finite θ -angle, also has to be performed for the study of the θ -vacuum structure [48,49]. Besides, combining this new effective theory with the locally P and/or CP violating domains in the collision [9,10], the discussion of the θ -dependence for large mass would be quite fruitful for the heavy flavors, which are the important probes in order to identify the initial state of the relativistic heavy ion collision. Conversely, from a new actual estimation of the energy loss of the heavy quark jet [50, 51] with consideration of the θ -vacua for large mass, one could obtain some information of the locally P and/or CP violating bubbles in the collision. The author is grateful to Kenji Fukushima, Arata Yamamoto, Pablo A. Morales, and Sanjin Benic for valuable discussions. The author also thanks the Yukawa Institute for Theoretical Physics, Kyoto University, where this work was developed considerably during the YITP-T-1305 on 'New Frontiers in QCD 2013'. ## References - [1] C. Baker, D. Doyle, P. Geltenbort, K. Green, M. van der Grinten, et al., An Improved experimental limit on the electric dipole moment of the neutron, Phys.Rev.Lett. 97 (2006) 131801. arXiv:hep-ex/0602020 , doi:10.1103/PhysRevLett.97.131801 . - [2] H.-Y. Cheng, The Strong CP Problem Revisited, Phys.Rept. 158 (1988) 1. doi:10.1016/0370-1573(88)90135-4 . - [3] R. Peccei, Reflections on the strong CP problem arXiv:hep-ph/9807514 . - [4] E. Witten, Current Algebra Theorems for the U(1) Goldstone Boson, Nucl.Phys. B156 (1979) 269. doi:10.1016/0550-3213(79)90031-2 . - [5] G. Veneziano, U(1) Without Instantons, Nucl.Phys. B159 (1979) 213-224. doi:10.1016/0550-3213(79)90332-8 . - [6] F. R. Urban, A. R. Zhitnitsky, The cosmological constant from the QCD Veneziano ghost, Phys.Lett. B688 (2010) 9-12. arXiv:0906.2162 doi:10.1016/j.physletb.2010.03.080 , . - [7] F. R. Urban, A. R. Zhitnitsky, The QCD nature of Dark Energy, Nucl.Phys. B835 (2010) 135-173. arXiv:0909.2684 , doi:10.1016/j.nuclphysb.2010.04.001 . - [8] N. Ohta, Dark Energy and QCD Ghost, Phys.Lett. B695 (2011) 41-44. arXiv:1010.1339 , doi:10.1016/j.physletb.2010.11.044 . - [9] P. Morley, I. Schmidt, Strong P, CP, T Violations in Heavy Ion Collisions, Z.Phys. C26 (1985) 627. doi:10.1007/BF01551807 . - [10] D. Kharzeev, R. Pisarski, M. H. Tytgat, Possibility of spontaneous parity violation in hot QCD, Phys.Rev.Lett. 81 (1998) 512-515. arXiv:hep-ph/9804221 , doi:10.1103/PhysRevLett.81.512 . - [11] R. Peccei, H. R. Quinn, CP Conservation in the Presence of Instantons, Phys.Rev.Lett. 38 (1977) 1440-1443. doi:10.1103/PhysRevLett.38.1440 . - [12] A. Vilenkin, EQUILIBRIUM PARITY VIOLATING CURRENT IN A MAGNETIC FIELD, Phys.Rev. D22 (1980) 3080-3084. doi:10.1103/PhysRevD.22.3080 . - [13] D. Son, A. R. Zhitnitsky, Quantum anomalies in dense matter, Phys.Rev. D70 (2004) 074018. arXiv:hep-ph/0405216 , doi:10.1103/PhysRevD.70.074018 . - [14] M. A. Metlitski, A. R. Zhitnitsky, Anomalous axion interactions and topological currents in dense matter, Phys.Rev. D72 (2005) 045011. arXiv:hep-ph/0505072 , doi:10.1103/PhysRevD.72.045011 . - [15] D. E. Kharzeev, L. D. McLerran, H. J. Warringa, The Effects of topological charge change in heavy ion collisions: 'Event by event P and CP violation', Nucl.Phys. A803 (2008) 227-253. arXiv:0711.0950 , doi:10.1016/j.nuclphysa.2008.02.298 . - [16] K. Fukushima, D. E. Kharzeev, H. J. Warringa, The Chiral Magnetic Effect, Phys.Rev. D78 (2008) 074033. arXiv:0808.3382 , doi:10.1103/PhysRevD.78.074033 . - [17] D. E. Kharzeev, H.-U. Yee, Chiral Magnetic Wave, Phys.Rev. D83 (2011) 085007. arXiv:1012.6026 , doi:10.1103/PhysRevD.83.085007 . - [18] R. F. Dashen, Some features of chiral symmetry breaking, Phys.Rev. D3 (1971) 1879-1889. doi:10.1103/PhysRevD.3.1879 . - [19] S. R. Coleman, More About the Massive Schwinger Model, Annals Phys. 101 (1976) 239. doi:10.1016/0003-4916(76)90280-3 . - [20] E. Witten, Large N Chiral Dynamics, Annals Phys. 128 (1980) 363. doi:10.1016/0003-4916(80)90325-5 . - [21] G. 't Hooft, Topology of the Gauge Condition and New Confinement Phases in Nonabelian Gauge Theories, Nucl.Phys. B190 (1981) 455. doi:10.1016/0550-3213(81)90442-9 . - [22] N. Ohta, Vacuum Structure and Chiral Charge Quantization in the Large N Limit, Prog.Theor.Phys. 66 (1981) 1408. doi:10.1143/PTP.66.1408 . - [23] U. Wiese, Numerical Simulation of Lattice θ Vacua: The 2d U(1) Gauge Theory as a Test Case, Nucl.Phys. B318 (1989) 153. doi:10.1016/0550-3213(89)90051-5 . - [24] I. Affleck, Nonlinear sigma model at Theta = pi: Euclidean lattice formulation and solid-onsolid models, Phys.Rev.Lett. 66 (1991) 2429-2432. doi:10.1103/PhysRevLett.66.2429 . - [25] M. Creutz, Chiral symmetry on the lattice, Nucl.Phys.Proc.Suppl. 42 (1995) 56-66. arXiv:hep-lat/9411033 , doi:10.1016/0920-5632(95)00187-E . - [26] M. Creutz, Quark masses and chiral symmetry, Phys.Rev. D52 (1995) 2951-2959. arXiv:hep-th/9505112 , doi:10.1103/PhysRevD.52.2951 . - [27] M. Creutz, Anomalies and chiral symmetry in QCD, Annals Phys. 324 (2009) 1573-1584. arXiv:0901.0150 , doi:10.1016/j.aop.2009.01.005 . - [28] M. Creutz, Quark masses and strong CP violation, AIP Conf.Proc. 1343 (2011) 618-618. arXiv:1011.0908 , doi:10.1063/1.3575115 . - [29] Y. Hosotani, R. Rodriguez, J. Hetrick, S. Iso, Confinement and chiral dynamics in the multiflavor Schwinger model arXiv:hep-th/9606129 . - [30] A. V. Smilga, QCD at theta similar to pi, Phys.Rev. D59 (1999) 114021. arXiv:hep-ph/9805214 , doi:10.1103/PhysRevD.59.114021 . - [31] E. Witten, Theta dependence in the large N limit of four-dimensional gauge theories, Phys.Rev.Lett. 81 (1998) 2862-2865. arXiv:hep-th/9807109 , doi:10.1103/PhysRevLett.81.2862 . - [32] I. E. Halperin, A. Zhitnitsky, Anomalous effective Lagrangian and theta dependence in QCD at finite N(c), Phys.Rev.Lett. 81 (1998) 4071-4074. arXiv:hep-ph/9803301 , doi:10.1103/PhysRevLett.81.4071 . - [33] D. Boer, J. K. Boomsma, Spontaneous CP-violation in the strong interaction at theta = pi, Phys.Rev. D78 (2008) 054027. arXiv:0806.1669 , doi:10.1103/PhysRevD.78.054027 . - [34] J. K. Boomsma, D. Boer, The High temperature CP-restoring phase transition at theta = pi, Phys.Rev. D80 (2009) 034019. arXiv:0905.4660 , doi:10.1103/PhysRevD.80.034019 . - [35] M. D'Elia, F. Negro, θ dependence of the deconfinement temperature in Yang-Mills theories, Phys.Rev.Lett. 109 (2012) 072001. arXiv:1205.0538 , doi:10.1103/PhysRevLett.109.072001 . - [36] M. D'Elia, F. Negro, Phase diagram of Yang-Mills theories in the presence of a θ term, Phys.Rev. D88 (3) (2013) 034503. arXiv:1306.2919 , doi:10.1103/PhysRevD.88.034503 . - [37] S. Aoki, M. Creutz, Pion masses in 2-flavor QCD with η condensation, Phys.Rev.Lett. 112 (2014) 141603. arXiv:1402.1837 , doi:10.1103/PhysRevLett.112.141603 . - [38] E. Vicari, H. Panagopoulos, Theta dependence of SU(N) gauge theories in the presence of a topological term, Phys.Rept. 470 (2009) 93-150. arXiv:0803.1593 , doi:10.1016/j.physrep.2008.10.001 . - [39] M. H. Tytgat, QCD at theta similar to pi reexamined: Domain walls and spontaneous CP violation, Phys.Rev. D61 (2000) 114009. arXiv:hep-ph/9909532 , doi:10.1103/PhysRevD.61.114009 . - [40] J. Soto, R. Tzani, Anomalies in the effective theory of heavy quarks, Phys.Lett. B297 (1992) 358-366. arXiv:hep-ph/9210205 , doi:10.1016/0370-2693(92)91275-E . - [41] P. Di Vecchia, G. Veneziano, Chiral Dynamics in the Large n Limit, Nucl.Phys. B171 (1980) 253. doi:10.1016/0550-3213(80)90370-3 . - [42] K. Kawarabayashi, N. Ohta, The Problem of η in the Large N Limit: Effective Lagrangian Approach, Nucl.Phys. B175 (1980) 477. doi:10.1016/0550-3213(80)90024-3 . - [43] H. Leutwyler, A. V. Smilga, Spectrum of Dirac operator and role of winding number in QCD, Phys.Rev. D46 (1992) 5607-5632. doi:10.1103/PhysRevD.46.5607 . - [44] D. Blaschke, F. Saradzhev, S. Schmidt, D. Vinnik, A Kinetic approach to eta-prime production from a CP odd phase, Phys.Rev. D65 (2002) 054039. arXiv:nucl-th/0110022 , doi:10.1103/PhysRevD.65.054039 . - [45] K. Fukushima, K. Mameda, Wess-Zumino-Witten action and photons from the Chiral Magnetic Effect, Phys.Rev. D86 (2012) 071501. arXiv:1206.3128 , doi:10.1103/PhysRevD.86.071501 . - [46] B. Alles, M. D'Elia, A. Di Giacomo, Topological susceptibility at zero and finite T in SU(3) Yang-Mills theory, Nucl.Phys. B494 (1997) 281-292. arXiv:hep-lat/9605013 , doi:10.1016/S0550-3213(97)00205-8 . - [47] V. Azcoiti, A. Galante, V. Laliena, Theta vacuum: Phase transitions and / or symmetry breaking at theta = pi, Prog.Theor.Phys. 109 (2003) 843-851. arXiv:hep-th/0305065 , doi:10.1143/PTP.109.843 . - [48] G. Aarts, K. Splittorff, Degenerate distributions in complex Langevin dynamics: onedimensional QCD at finite chemical potential, JHEP 1008 (2010) 017. arXiv:1006.0332 , doi:10.1007/JHEP08(2010)017 . - [49] G. Aarts, L. Bongiovanni, E. Seiler, D. Sexty, I.-O. Stamatescu, Complex Langevin simulation for QCD-like models arXiv:1310.7412 . - [50] E. Braaten, M. H. Thoma, Energy loss of a heavy quark in the quark - gluon plasma, Phys.Rev. D44 (1991) 2625-2630. doi:10.1103/PhysRevD.44.2625 . - [51] C. Herzog, A. Karch, P. Kovtun, C. Kozcaz, L. Yaffe, Energy loss of a heavy quark moving through N=4 supersymmetric Yang-Mills plasma, JHEP 0607 (2006) 013. arXiv:hep-th/0605158 , doi:10.1088/1126-6708/2006/07/013 .
10.1016/j.nuclphysb.2014.11.002
[ "Kazuya Mameda" ]
2014-08-06T06:02:38+00:00
2015-09-21T21:28:39+00:00
[ "hep-ph" ]
QCD $θ$-vacua from the chiral limit to the quenched limit
We investigate the dependence of the QCD vacuum structure on the $\theta$-angle and quark mass, using the Di-Vecchia--Veneziano model. Although the Di-Vecchia--Veneziano model is a chiral effective model, it contains the topological properties of the pure Yang--Mills theory. It is shown that within this model, the ground state energies for all $\theta$ are continuous functions of quark mass from the chiral limit to the quenched limit, even including the first order phase transition at $\theta = \pi$. Based on this effective model, we discuss (i) how the ground state depends on quark mass, and (ii) why the phase transition at $\theta = \pi$ is present both in the chiral and quenched limit. In order to analyze the relation between quark mass and the $\theta$-vacua, we calculate the chiral condensate as a function of quark mass. Also, considering the presence of the innate metastable states included in the QCD $\theta$-vacuum, we also give a unified understanding of the phase transitions at $\theta = \pi$ in the chiral and quenched limit.
1408.1190v3
## Multilayer weighted social network model Yohsuke Murase, 1, 2, ∗ J´ anos T¨ or¨k, o 3 Hang-Hyun Jo, 4, 5 Kimmo Kaski, 4 and J´ anos Kert´sz e 6, 3, 4 1 RIKEN Advanced Institute for Computational Science, 7-1-26, Minatojima-minami-machi, Chuo-ku, Kobe, Hyogo, 650-0047, Japan 2 CREST, Japan Science and Technology Agency 4-1-8 Honcho, Kawaguchi, Saitama, 332-0012, Japan 3 Department of Theoretical Physics, Budapest University of Technology and Economics, H-1111 Budapest, Hungary 4 Department of Biomedical Engineering and Computational Science, Aalto University School of Science, P.O. Box 12200, Espoo, Finland 5 BK21plus Physics Division and Department of Physics, Pohang University of Science and Technology, Pohang 790-784, Republic of Korea 6 Center for Network Science, Central European University, N´dor u. a 9, H-1051 Budapest, Hungary (Dated: November 12, 2014) Recent empirical studies using large-scale data sets have validated the Granovetter hypothesis on the structure of the society in that there are strongly wired communities connected by weak ties. However, as interaction between individuals takes place in diverse contexts, these communities turn out to be overlapping. This implies that the society has a multilayered structure, where the layers represent the different contexts. To model this structure we begin with a single-layer weighted social network (WSN) model showing the Granovetterian structure. We find that when merging such WSN models, a sufficient amount of interlayer correlation is needed to maintain the relationship between topology and link weights, while these correlations destroy the enhancement in the community overlap due to multiple layers. To resolve this, we devise a geographic multilayer WSN model, where the indirect interlayer correlations due to the geographic constraints of individuals enhance the overlaps between the communities and, at the same time, the Granovetterian structure is preserved. ## I. INTRODUCTION The abundance of data due to the rapid development of the information and communication technology (ICT) has generated entirely new, multidisciplinary approaches in social sciences [1, 2], in which physics plays a considerable role both in terms of data analysis and modeling. One of the major challenges in this context is the understanding of the structure of the society, which is crucial for many applications ranging from epidemiology to urban planning. While traditional techniques based mainly on questionnaires focused on small scale organization of the society [3] the new tools enable one to uncover the structure on many scales up to the societal level. A broad range of ICT data has been used to study empirically these questions. Examples include email [4], mobile phone call (MPC) [5-8], short-message communication, social network services (SNS) [9], and scientific collaborations [10, 11]. is a tie, the larger is the overlap between the further contacts of those, who form the tie. This local property has severe consequences on the entire structure: The society consists of communities, which are strongly wired and these communities are then connected by weak ties, thus playing an important role to hold society together. The duration or the frequency of calls serves as a natural measure of the strength of ties for mobile phone calls and in this way it was possible to prove the Granovetter hypothesis on this data set [5, 6]. Mobile phone data have a special role in this endeavor as the coverage in the adult population approaches 100% and much of the interpersonal communication runs today over mobile phones. Therefore the records of the calls can be used to map out the network of social interactions [5, 6, 12]. In this mobile call network the famous Granovetter hypothesis about the 'strength of weak ties' [13] turned out to be correct. According to this hypothesis links between individuals have different strengths corresponding to the intensity of the relationship, the time spent together, mutual confiding, etc., and the stronger ∗ [email protected] In order to demonstrate the global consequences a link percolation analysis was carried out. Provided that links are sorted according to their weights, removing the weakest links first one by one results in a sharp transition at a relatively early stage, indicating the fragmentation of the society. In the opposite case, when links were eliminated in the descending order of their weights, the percolation threshold set in at a much higher portion of removed links because strong links are within the communities, where a large number of paths between nodes exist. In this sense, the difference ∆ f c between the two percolation thresholds can be considered as the measure of the Granovetterian character of the network. After this empirical verification of the Granovetter hypothesis, the next step was to understand the mechanisms leading to the formation of these structures in a social network by constructing a model, which incorporates basic link-formation processes between individuals. Two main mechanisms were taken into account, namely local and global attachment rules together with tie strength reinforcement [14, 15]. Here the local and global attachment rule correspond to cyclic and focal closure mechanisms [4], with the former referring to the link forma- tion with one's network neighbors, or with friends of friends and the latter to the attribute-related link formation which is independent of the local network topology. The reinforcement step corresponds to the general observation that social ties get strengthened by using them. With these simple processes, the complex Granovetterian weight-topology relation of social networks could be successfully reproduced as demonstrated for the large value of ∆ f c [14]. The community structure of complex networks is an extensively studied topic [16]. The identification of communities or structural modules, i.e., groups of nodes having more connections among themselves than outside the group is a highly nontrivial task and much effort has been devoted to its solution (see, e.g., [17-19].) Most of the methods produce a partition of the network, meaning that a node can belong to only one community. However, as pointed out in [20] this cannot lead to an appropriate description of many complex networks, especially of social ones, where there is usually considerable overlap between the communities due to the fact that nodes can belong simultaneously to several of them. A number of algorithms have been suggested to uncover overlapping communities [20-22]. The community detection method of Ahn et al. [22] was based on the identification of link communities; at the same time they suggested a remarkable mechanism as the origin of overlapping communities. Using the language of social networks (what we are interested in here), they propose that a person can be in different types of relationships, like kinship, collaboration, friendship, etc. Moreover, people are switching their social contexts and communication channels depending on the occasions, and the social network should strongly depend on the context [23, 24]. To handle these aspects, it is necessary to represent the social networks as a multilayer or multiplex network [25-27], where each layer corresponds to a different type of relationship. Since these contexts are hardly distinguishable from the available data, the networks observed in this way are usually considered as projections or an aggregate of multiple layers. Such a projection of multilayer networks should be in line with the observed stylized facts faithfully with empirical data, such as Granovetter-type structure. An important aspect of multilayer structure is missing both from the original Granovetter paper [13] and the above described model [14]. The aim of the present paper is to investigate the possibilities to model the combination of the multilayer structure of the society with the Granovetterian relationship between tie strengths and topology. In order to do so, we start from the simple, single-layer model by Kumpula et al. [14] and introduce the multilayer structure in different ways. This paper is organized as follows. In the next section, a naive multilayer network is investigated and it is shown that it leads to a break down of the Granovetter-type structure as correlations are suppressed. We therefore introduce the copy-and-shuffle model, where a parameter tunes the correlations. We find a regime with ∆ f c significantly different from zero, however, there the average number of overlapping communities, a node participates in, is low. To overcome this difficulty, we formulate a model in Sec. III, where correlations are caused by the dependence on the geographic distance. This model has a parameter region where both Granovetterian structure and a considerable enhancement of the average overlap are observed. The last Section is devoted to a summary and discussion. ## II. MULTILAYER WEIGHTED SOCIAL NETWORK (WSN) MODEL ## A. Single-layer WSN Model Let us first summarize the original WSN model by Kumpula et al. [14]. It considers an undirected weighted network of N nodes. The links in the networks are updated by the following three rules. The first rule is called local attachment (LA). Node i chooses one of its neighbors j with probability proportional to w ij , which stands for the weight of the link between nodes i and j . Then, node j chooses one of its neighbors except i , say k , randomly with probability proportional to w jk . If node i and k are not connected, they are connected with probability p ∆ with a link of weight w 0 , but if they are already connected this link weight and the other two link weights w ij and w jk in a triangle are increased by δ . The second rule is global attachment (GA), where if a node has no links or otherwise with probability p r , it is connected to a randomly chosen node with weight w 0 . Finally, the third rule node deletion (ND) is introduced to the model, where with probability p d , a node loses all its links. At each time step, LA, GA, and ND are applied to all nodes. Starting from a network without any links, the network reaches a statistically stationary state after a sufficient number of updates. As a function of the reinforcement parameter δ this model shows a gradual transition from a module free topology to a Granovetterian structure with strongly wired communities connected by weak ties. ## B. Generalization to the multilayer case In order to study multilayer effects we generalize the single-layer WSN model in the following naive way. We consider L layers of the same set of nodes and we assume that each layer corresponds to a different type of relationship or communication context. For each layer, we independently construct a network in the same way as in the original single-layer WSN model. For simplicity, the same parameters are used for all the layers. After the stationary networks are constructed in each layer, the aggregate network is constructed by summing up the edge weights: w ij = ∑ L k =1 w k ij , where w k ij is the weight of the link between nodes i and j in the k -th layer [28]. It is this FIG. 1. (Color online) Link percolation analysis for L = 1 (left) and L = 2 (right). The upper figures show the relative size of the largest connected component, R LCC , as a function of the fraction of the removed links f . The lower figures show the susceptibility χ . Red solid (green dashed) lines correspond to the case when links are removed in ascending (descending) order of the link weights. The error bars show standard errors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-4eee10df-53fb-457e-9a74-f97f05898a1a.jpg) FIG. 2. (Color) Snapshots of the copy-and-shuffle model with different p shuffling parameter values and N = 300. Red (blue) links are in the first (second) layer, and green links are in both layers. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-c81a5ffc-3656-4005-bae0-e425f6317a82.jpg) aggregate network for which we expect the Granovetterian structure. In the following, N = 50000, p r = 0 0005, . p ∆ = 0 05, . p d = 0 001, . δ = 1, and w 0 = 1 are used. The results are obtained after 25 × 10 3 time steps and averaged over 50 realizations. To see whether the multilayer model reproduces a realistic social network of the kind the mobile FIG. 3. (Color online) Percolation thresholds for various shuffle fraction values p for the copy-and-shuffle model. The green upper and red lower lines denote the critical points f d c and f a c , respectively. The critical points are determined by the peak of the susceptibility. The points are calculated for 50 independent runs. The blue dashed line is calculated using Eq. (3). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-59447139-b4d5-4c00-a0c9-303990d12840.jpg) phone call (MPC) graph is a proxy [5, 6], a link percolation analysis is carried out for the model. We removed fraction f of the links from the generated networks in both ascending and descending orders, and measured the relative size R LCC of the largest connected component and the normalized susceptibility χ = ∑ n s /N s 2 , where n s is the number of components of size s and the sum is taken over all but the largest component. At the percolation threshold the order parameter R LCC vanishes and χ diverges in the thermodynamic limit. For finite systems the former quantity shows a fast decay and the latter one a sharp peak at the threshold value f c . The significant difference ∆ f c in the thresholds for the two sequences of link removal is characteristic by the Granovetter structure; ∆ f c = f d c -f a c , where the upper index d ( a ) stands for descending (ascending) sequences of removed links. Figure 1 shows R LCC and χ as a function of f for a single-layer network ( L = 1) and a double-layer network ( L = 2). The two plots in each figure show the results for ascending and descending orders. For L = 1 we get ∆ f c ≈ 0 35, . while for L = 2 the figure shows that the percolation threshold for ascending order f a c is not significantly different from that for descending order f d c (i.e., ∆ f c ≈ 0). The percolation thresholds for L = 2 are approximately the same, f c ≈ 0 95, indicating that the introduc-. tion of a second layer destroys the Granovetterian structure. The percolation threshold agrees well with that of an Erd˝ os-R´nyi (ER) random network having the same e average degree 〈 k 〉 as the simulated model: f c = 1 -1 / k 〈 〉 with the measured 〈 k 〉 = 21 9. (Note that this is twice the . average degree of a single layer.) This observation shows that combining already two independent layers from the original single-layer WSN model leads to a high level of randomization in the aggregate [29]. One may think that the observed effect is due to the increasing total degree when two layers are merged. However, we carried out simulations, where the total degree was controlled by p ∆ and found that for L = 2 the thresholds are always very close to each other; ∆ f c ≈ 0. ## C. Copy-and-shuffle WSN model Due to the fact that merging two layers of WSN models destroys the Granovetterian structure, we investigated how the correlation between layers affects the properties of the network. We created the second layer by copying the first layer and then shuffled the fraction p of the nodes in the second layer. Shuffling nodes i and j means that all original links ( i, k ) become ( j, k ) and vice versa. This is just a relabeling of the nodes in that layer, meaning that the topology remains the same, i.e., both layers correspond to single-layer WSN models but with increasing p the correlations between them decrease. This is called the 'copy-and-shuffle' model (see Fig. 2). When p = 0, the aggregate network is equivalent to the single-layer network whose link weights are doubled. For p = 1, it is the same as the double-layer model; the Granovetterian structure gets entirely destroyed by randomization. By controlling p between 0 and 1, a transient behavior is observed. Figure 3 shows how the threshold values f a c get closer to f d c as p is increased and for p → 1 we get ∆ f c → 0. The reason is that strong links in the second layer connect the communities more randomly since the correlation between the first and the second layer diminishes. The randomization has the consequence that the percolation threshold f a c gets closer to that of the corresponding Erd˝s-R´ enyi random network. o However, for a reasonably large range of p , we can clearly differentiate f a c and f d c thus the similarity between the layer assures the Granovetterian structure. The gradual transition can be understood in the following way. Let us make the assumptions that the original network (first layer) is composed of strongly connected groups interconnected by weak links [see Fig. 2(a)] and the average size of these groups is s which is small and independent of the total number of agents N . Eventually the number of groups is N g = N/s . In the link percolation analysis starting from the weak links (ascending order) we can consider the groups as 'supernodes' and we have to solve the percolation problem for the links connecting them. Not only the intergroup links turn out to be weak but also some intragroup ones. Let us denote the number of links by M , the total number of weak links by M w and the intergroup weak links by M g which are a subset of M w . Let us remove the f a fraction of the total links in ascending order. In this case the number of weak links gets M w ( f a ) = M w -Mf a since we only removed weak links. Thus it is clear that this approximation will not work for f a &gt; M /M w . The intergroup links are removed by the same rate as weak links, so the number of intergroup links after removing the f a part of the total links in ascending order is $$M _ { g } ( f ^ { a } ) = M _ { g } \left ( 1 - f ^ { a } \frac { M } { M _ { w } } \right ). \quad \quad ( 1 )$$ In order to have quantitative results we need the number of strong links. This can be estimated if we assume that M w = M k ( 〈 〉 -2) / k 〈 〉 . This means that each node has two strong links while the rest are weak. This can be justified by considering the effect of cyclic closure: The cyclic closure is the most frequent interaction which strengthens two links of a focal node with positive feedback of their weights. Assuming a random network for the groups at the percolation threshold, one should get M f g ( a c ) = N / g 2. This gives 〈 k g 〉 ≡ 2 M /N g g = 3 26 for . the single-layer model, where 〈 k g 〉 is the average degree of the connections between the groups, i.e., that of the supernodes. Snapshots of the single-layer model as in Fig. 2(a) justify the low contact number for the groups. The shuffling of agents creates new connections from one group to another. These connections increase the intergroup connection degree by $$\langle k _ { g } \rangle ( p ) \approx \langle k _ { g } \rangle ( p = 0 ) + p \bar { s } \langle k \rangle. \text{ \quad \ \ } ( 2 )$$ Thus there is a linear increase of the average degree of the groups with p . Now we can use Eq. (1) to go in the reverse direction, namely that knowing M /N g g we can get the percolation threshold (note that M w and M also depend on p in a trivial way): $$f _ { c } ^ { a } & = \frac { M _ { w } ( p ) } { M ( p ) } \left ( 1 - \frac { N _ { g } } { 2 ( M _ { g } + p N \langle k \rangle ) } \right ) \\ & = \frac { \langle k \rangle - 2 } { \langle k \rangle } \left ( 1 - \frac { 1 } { \langle k _ { g } \rangle ( p = 0 ) + 2 \bar { s } \langle k \rangle p } \right ). \quad ( 3 ) \\ \infty \quad \ e \dots \ e \dots \ e \dots \ e \dots.$$ The average size of the groups for the single layer can be obtained by an infomap analysis [19] and was found to be s = 15 1. The resulting curve is shown in Fig. 3 as . a dashed line and is compared to the empirical threshold values. The calculated line fits the initial part very well, where the above picture is expected to work. The copy-and-shuffle model produces a region of p , where a multilayer Granovetterian structure exists. Now we have to check whether our construction has lead to enhancement of the overlapping of the communities, too. We have analyzed the aggregate networks by the method of Ahn et al. [22] and calculated c/c 0 , the ratio of the average numbers of communities a node belongs to at parameter value p and p = 0 [30]. We expect that c/c 0 should increase as shuffling goes on. Figure 4 shows the dependence of this quantity on p . The overlap starts to increase only when the Granovetterian correlation between link weight and topology is already wiped away. FIG. 4. (Color online) Characteristic quantities for the copyand-shuffle multilayer WSN model. The difference ∆ f c between the percolation thresholds decreases with the shuffling probability p , while c/c 0 , the ratio of the average number of communities a node belongs to at parameter value p and p = 0, decreases. There is no regime, where ∆ f c is significantly larger than zero and c/c 0 is considerably larger than one. The results are averaged by 50 independent samples and the errors are smaller than the symbol size. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-0f45f00d-1848-4d82-8faa-e610b84778ee.jpg) In the next section we make another attempt to produce a model, where the Granovetterian structure and overlapping communities coexist. ## III. GEOGRAPHIC MULTILAYER WSN MODEL The above results show that some correlations are needed between layers in order to have ∆ f c significantly different from zero for a multilayer model. Previous studies have reported that there are strong geographic constraints on social network groups even in the era of the Internet [31] and this is reflected in the MPC data [12, 32, 33]. For example, intercity communication intensity is inversely proportional to the square of their Euclidean distance, which is reminiscent of the gravity law [12, 32]. Motivated by these observations, we consider now a model embedded into a two-dimensional geographic space. At the beginning of the simulation nodes are distributed randomly in the unit square with periodic boundary condition. These geographic positions are fixed and shared by all the layers. We assume that the probability for making a new connection in the global attachment (GA) step in the WSN model is higher if the two nodes are geographically close. The probability that node i makes a new connection to node j by GA is proportional to r -α ij , where r ij is a distance between nodes i and j , and α is a new parameter controlling the dependence on geographic distance as in [34, 35]. When FIG. 5. (Color online) Link percolation analysis for (a) α = 0 and (b) α = 6. The upper figures show the relative size of the largest connected component, R LCC , as a function of the fraction of the removed links f . The lower figures show the susceptibility χ . Note that the scale of the horizontal axis is different from Fig. 1. Red solid (green dashed) lines correspond to the case when links are removed in ascending (descending) order of the link weight. The results are obtained by 50 independent samples. The error bars show standard errors. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-869b085b-f224-4778-9196-d47b30e8d82d.jpg) α = 0, this probability is independent of the geographic distance, thus the model is equivalent to the uncorrelated multilayer model we presented in the previous section. When α is larger, the nodes tend to be connected with geographically closer nodes yielding the correlation between the networks in different layers. Since only nonconnected pairs are considered, the probability for node i to make connection with a node j which is not yet connected to i is given by $$p _ { i j } = \frac { r _ { i j } ^ { - \alpha } } { \sum _ { k \in S _ { i } } r _ { i k } ^ { - \alpha } },$$ where S i is the set of the nodes not connected to the node i . The other rules such as LA or ND are kept the same as in the original WSN model. Figure 5 shows the results for link percolation analysis for the geographic model with α = 0 and 6. Because the network for larger α has a smaller average degree, we used a larger value of p r (0 002) in order to keep the average . degree comparable to the results for the nongeographic model ( 〈 k 〉 = 18 0 for . α = 6 and 〈 k 〉 = 27 6 for . α = 0). As shown in the figure, the network for α = 6 exhibits a Granovetterian structure as f a c and f d c are significantly different with ∆ f c ≈ 0 1. . Small samples of networks ( N =300) for different α are shown in Fig. 6. While the network for α = 0 and 2 look similar to the uncorrelated double-layer nongeographic network in Fig. 2(d), the networks for larger α clearly show a nice community structure. About 19 percent of FIG. 6. (Color) Sample of double-layer networks of the geographic model for N = 300. Links only in the first and the second layers are shown in blue and red, respectively, and links shared by both layers are depicted in green. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-b9a84774-801d-4ef1-bf27-cbab15e5cbdb.jpg) the links are shared by two layers for α = 6, while less than 0 1 percent of the total links are shared for . α = 0; see also the inset of Fig. 7. This already indicates the possibility of overlapping communities. The dependence of f c on α is shown in Fig. 8, which summarizes the main results for the geographic model. ∆ f c becomes larger with increasing α and seems to get saturated around 0.15. The ratio c/c 0 decreases rather rapidly and reaches the limit value of 2. This means that for sufficiently large α we have both Granovetterian properties and the enhancement of the number of overlapping communities due to the multilayer structure. We note that for α &gt; 4 both the average degree in one layer 〈 k L ( = 1) 〉 glyph[similarequal] 11 and c 0 ( α &gt; 4) glyph[similarequal] 3 is the same as in the nongeographic case indicating similar structure. We note that neither the percolation thresholds nor the average degree show significant dependence on α for α &lt; 2. We speculate that this is because the network dimension becomes infinite for α &lt; 2 even when it is embedded in a two-dimensional space [35]. Since the dimensionality of the network is finite, the clustering coefficient for the network is higher compared to the network with smaller α . (For α = 0, 2 and 6, clustering coefficients are 0 23, 0 24, and 0 55, respectively.) . . . This also explains the change in the average degree. If a link and its neighboring link are selected by LA, the probability that the third link closing the triangle is already there will be higher for higher α thus the number of links newly created by LA is smaller leading to the decrease in the average degree. FIG. 7. (Color online) Percolation thresholds f a c and f d c for the geographic model as a function of α . The percolation thresholds are determined as the point where maximum susceptibility is observed and then averaged over 50 independent samples. (Inset) Average degrees divided by L as a function of α for L = 1 and L = 2. The values for L = 2 are smaller than those for L = 1 when α is sufficiently large because there are links appearing in both layers. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-70178756-9042-452f-835a-e0478606026f.jpg) FIG. 8. (Color online) This figure is a similar plot in Fig. 4 for the geographic multilayer WSN model. Here ∆ f c and c/c 0 are shown as a function of α . Note that for this model c 0 also depends on α . For α ≥ 6 we have ∆ f c significantly larger than 0 and c/c 0 close to 2. The results are obtained by 50 independent samples. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-79112af8-fa3e-4189-ac7c-a5573630c800.jpg) ## IV. SUMMARY AND DISCUSSION Our aim in this paper has been to model two important properties of the social network: Its Granovetterian structure and the large amount of overlapping communities due to its multilayer character. We introduced the difference ∆ f c of the percolation thresholds f d c and f a c as a single variable characterizing the weight-topology rela- tion and c/c 0 , the ratio of the average number of communities a node participates in for the multilayer and the single-layer networks. We expect from a model satisfying our goal simultaneously a ∆ f c considerably different from zero and c/c 0 significantly larger than one. The naive introduction of multiple layers of singlelayer WSN models breaks the Granovetter-type weighttopology relation since the communities in one layer get connected by strong ties in another layer. If we control the amount of randomness by the shuffling probability p and start from replicas of single-layer models then we arrive at a multilayer model, which, however, has no region of the control parameter p , where both required properties can simultaneously be observed. In order to maintain both requirements, we introduced an extension of the single-layer model such that each node has a geographic position and that geographically close nodes have more chance to form a link via GA. The multilayer model consists then of a combination of such single layers. Controlling the distance dependence by the exponent α [as defined in Eq. (4)] we conclude that for α ≥ 6 we have a multilayer weighted social network, which has both the Granovetterian structure and the enhanced community overlap. We note here that previous studies on MPC data have revealed that intercity communication density is inversely proportional to the square of the distance [12, 32]. Regarding the geographic model, the relation between α and the exponent characterizing intercity communication density is not trivial because the links created by LA are not affected by the geographic position. Furthermore, we assumed that the position of the nodes are uniformly distributed, which is clearly an idealized aspect of the model since we know that population usually aggregates around city areas. Our results have several implications. First, they show that geographic correlations play a key role to change the picture drastically in a multilayer weighted network similarly to what was observed for interdependent networks [36]. Moreover, although the models we studied are strong simplifications of the society, we believe that they have their role in the investigation of social structures. In particular, such models enable one to study the special effects of the Granovetterian and the overlapping community structure on dynamic phenomena like spreading. - [1] D. Lazer, A. Pentland, L. Adamic, S. Aral, A.-L. Barab´ asi, D. Brewer, N. Christakis, N. Contractor, J. Fowler, M. Gutmann, T. Jebara, G. King, M. Macy, D. Roy, and M. Van Alstyne, Science 323 , 721 (2009). - [2] P. Sen and B. K. Chakrabarti, Sociophysics: an introduction (Oxford University Press, 2013). - [3] S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications (Cambridge university press, 1994). Communities organize themselves along common attributes like sharing working places, classes at universities, joint interest, e.g., in sport, residential districts etc. [34]. Geographic proximity is just one of the possibilities and other attributes can play an important role in the formation of network as well. Future work is needed to find out how to treat explicitly these attributes and their impact on the formation of the network. Our models have also implications for further empirical studies. Unfortunately, most datasets contain only information about one channel of communication, which substantially restricts sampling of relationships even in the case of mobile call networks. An alternative approach is 'reality mining', where a limited number of volunteers (of the order of one hundred) carry devices, which record several channels of communication, including face-to-face encounters [37]. This methodology could pave the way for studies of the effects of the multilayer character of human society, especially from the points of view presented in this paper. ## ACKNOWLEDGMENTS Y. M. appreciates hospitality at Aalto University and H.-H. J. acknowledges financial support from the Aalto University postdoctoral program. The systematic simulations in this study were assisted by OACIS [38]. J. T. acknowledges financial support from the European Union and the European Social Fund through project FuturICT.hu (Grant No.: TAMOP-4.2.2.C-11/1/KONV2012-0013). J. K. acknowledges support from EU Grant No. FP7 317532 (MULTIPLEX). ## Appendix A: Trial with other parameters We tested other parameters for copy-and-shuffle model in order to verify the results are robust against the change of parameters. Figure 9 shows the results when the parameters p ∆ , p r , and p d are modified from the ones used in Section. II B. All the tested results are qualitatively similar to Fig. 4: ∆ f c decreases to zero more quickly than the increase in c/c 0 when p is increased. - [4] G. Kossinets and D. J. Watts, Science 311 , 88 (2006). - [5] J.-P. Onnela, J. Saram¨ki, J. Hyv¨nen, G. Szab´, M. A. a o o De Menezes, K. Kaski, A.-L. Barab´si, a and J. Kert´sz, e New J. Phys. 9 , 179 (2007). - [6] J.-P. Onnela, J. Saram¨ aki, J. Hyv¨ onen, G. Szab´ o, D. Lazer, K. Kaski, J. Kert´sz, e and A.-L. Barab´si, Proc. a Nat. Acad. Sci. 104 , 7332 (2007). - [7] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, Nature (London) 453 , 779 (2008). - [8] R. K. Pan, M. Kivel¨ a, J. Saram¨ aki, K. Kaski, and J. Kert´sz, Phys. Rev. E e 83 , 046112 (2011). - [9] M. Szell, R. Lambiotte, and S. Thurner, Proc. Nat. Acad. Sci. 107 , 13636 (2010). - [10] M. E. Newman, Proc. Nat. Acad. Sci. 98 , 404 (2001). - [11] G. Menichetti, D. Remondini, P. Panzarasa, R. J. Mondrag´n, o and G. Bianconi, PLOS ONE 9 , e97857 (2014). - [12] R. Lambiotte, V. D. Blondel, C. de Kerchove, E. Huens, C. Prieur, Z. Smoreda, and P. Van Dooren, Physica A 387 , 5317 (2008). - [13] M. S. Granovetter, Am. J. Sociol. 78 , 1360 (1973). - [14] J. M. Kumpula, J.-P. Onnela, J. Saram¨ aki, K. Kaski, and J. Kert´sz, Phys. Rev. Lett. e 99 , 228701 (2007). - [15] H.-H. Jo, R. K. Pan, and K. Kaski, PLOS ONE 6 , e22687 (2011). - [16] S. Fortunato, Phys. Rep. 486 , 75 (2010). - [17] M. E. Newman, Proc. Nat. Acad. Sci. 103 , 8577 (2006). - [18] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, J. Stat. Mech. 2008 , P10008 (2008). - [19] M. Rosvall and C. T. Bergstrom, Proc. Nat. Acad. Sci. 105 , 1118 (2008). - [20] G. Palla, A.-L. Barab´si, a and T. Vicsek, Nature (London) 446 , 664 (2007). - [21] A. Lancichinetti, S. Fortunato, and J. Kert´sz, New J. e Phys. 11 , 033015 (2009). - [22] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, Nature (London) 466 , 761 (2010). - [23] H.-H. Jo, M. Karsai, J. Karikoski, and K. Kaski, EPJ Data Science 1 , 10 (2012). - [24] H.-H. Jo, R. K. Pan, J. I. Perotti, and K. Kaski, Phys. Rev. E 87 , 062131 (2013). - [25] M. Kivel¨, a A. Arenas, M. Barthelemy, J. Gleeson, Y. Moreno, and M. Porter, J. Complex Networks 2 , 203 - (2014), arXiv:1309.7233. - [26] S. Boccaletti, G. Bianconi, R. Criado, C. del Genio, J. G´ omez-Garde˜es, n M. Romance, I. Sendi˜a-Nadal, n Z. Wang, and M. Zanin, Phys. Rep. 544 , 1 (2014). - [27] H.-H. Jo, S. K. Baek, and H.-T. Moon, Physica A 361 , 534 (2006). - [28] Significant difference was not found even if we take the maximum of the link weights instead of the sum. This is because majority of the links belong to one of the layers. - [29] Of course, the resulting network has a topology different from an ER random graph as it has high clustering by construction. - [30] We get even for p = 0 a value larger than 1 ( c 0 = 2 96. . This is due to the fact that the method of [22] is a partition of the link graph producing a large number of single links (diads) as communities, which enhance the overlap. - [31] J.-P. Onnela, S. Arbesman, M. C. Gonz´ alez, A.-L. Barab´ asi, and N. A. Christakis, PLOS ONE 6 , e16939 (2011). - [32] G. Krings, F. Calabrese, C. Ratti, and V. D. Blondel, J. Stat. Mech. 2009 , L07003 (2009). - [33] P. Expert, T. S. Evans, V. D. Blondel, and R. Lambiotte, Proc. Nat. Acad. Sci. 108 , 7663 (2011). - [34] K. Kosmidis, S. Havlin, and A. Bunde, Europhys. Lett. 82 , 48005 (2008). - [35] L. Daqing, K. Kosmidis, A. Bunde, and S. Havlin, Nature Phys. 7 , 481 (2011). - [36] R. Parshani, C. Rozenblat, D. Ietri, C. Ducruet, and S. Havlin, Europhys. Lett. 92 , 68002 (2010). - [37] N. Eagle and A. Pentland, Personal and ubiquitous computing 10 , 255 (2006). - [38] Y. Murase, T. Uchitane, and N. Ito, to appear in Physics Procedia 57 , 73 (2014), arXiv:1404.3867. FIG. 9. (Color online) These figures show the same quantities as Fig. 4 for several values of p ∆ (a), p r (b), and p d (c). The results are obtained by simulation of N = 10000 and averaged over 20 independent samples. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-f9e45902-e61d-45d0-a0c7-7a02a806b4a6.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-ddacd016-8fa8-4c19-97e4-dfb2b5e09c3f.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1190v3-figure-232ffa74-f1a6-4bf0-a1e8-9fb7fe1bf13e.jpg)
10.1103/PhysRevE.90.052810
[ "Yohsuke Murase", "János Török", "Hang-Hyun Jo", "Kimmo Kaski", "János Kertész" ]
2014-08-06T06:18:19+00:00
2014-11-11T04:26:00+00:00
[ "physics.soc-ph", "cs.SI" ]
Multilayer weighted social network model
Recent empirical studies using large-scale data sets have validated the Granovetter hypothesis on the structure of the society in that there are strongly wired communities connected by weak ties. However, as interaction between individuals takes place in diverse contexts, these communities turn out to be overlapping. This implies that the society has a multilayered structure, where the layers represent the different contexts. To model this structure we begin with a single-layer weighted social network (WSN) model showing the Granovetterian structure. We find that when merging such WSN models, a sufficient amount of interlayer correlation is needed to maintain the relationship between topology and link weights, while these correlations destroy the enhancement in the community overlap due to multiple layers. To resolve this, we devise a geographic multilayer WSN model, where the indirect interlayer correlations due to the geographic constraints of individuals enhance the overlaps between the communities and, at the same time, the Granovetterian structure is preserved.
1408.1191v2
## Cluster detection and risk estimation for spatio-temporal health data Duncan Lee 1 and Andrew Lawson 2 1 School of Mathematics and Statistics, University of Glasgow - 2 Division of Biostatistics and Bioinformatics, Department of Public Health Sciences, Medical University of South Carolina November 11, 2014 ## Abstract In epidemiological disease mapping one aims to estimate the spatio-temporal pattern in disease risk and identify high-risk clusters, allowing health interventions to be appropriately targeted. Bayesian spatio-temporal models are used to estimate smoothed risk surfaces, but this is contrary to the aim of identifying groups of areal units that exhibit elevated risks compared with their neighbours. Therefore, in this paper we propose a new Bayesian hierarchical modelling approach for simultaneously estimating disease risk and identifying high-risk clusters in space and time. Inference for this model is based on Markov chain Monte Carlo simulation, using the freely available R package CARBayesST that has been developed in conjunction with this paper. Our methodology is motivated by two case studies, the first of which assesses if there is a relationship between Public health Districts and colon cancer clusters in Georgia, while the second looks at the impact of the smoking ban in public places in England on cardiovascular disease clusters. Bayesian modelling, Cluster detection, Software, Spatio-temporal health mapping ## 1 Introduction The risk of disease varies in both space and time, as a result of variation in environment exposures, risk inducing behaviors and public health policy. Modelling and mapping this spatio-temporal variation in disease risk has substantial health, financial and societal benefits. The public health benefits include the ability to estimate temporal disease trends and detect spatial clusters of areas exhibiting high risks, enabling timely and targeted interventions for disease outbreaks. The financial benefit is the ability to forecast future disease burdens, yielding predictions of the required size and geographical spread of future health resources. Disease maps also enable policymakers to understand the nature and scale of health inequalities between different social groups, which lead to social injustice and may undermine social cohesion. The scale of such health inequalities can be substantial, with a 2014 Office for National Statistics report finding a differential of nineteen years in average healthy life expectancy between the richest and poorest neighbourhoods in England (Office for National Statistics, 2014). Maps of raw disease rates are routinely produced by health agencies such as Public Health England (PHE) and the Centers for Disease Control and Prevention (CDC), but they are contaminated by random noise and do not provide a natural framework for inference. Therefore, Bayesian spatio-temporal models for risk estimation have been proposed by Bernardinelli et al. (1995), Knorr-Held (2000) and Lawson (2013), while scan statistics have been proposed for cluster detection by Kulldorff et al. (2005). However, these modelling approaches have fundamentally different goals, as the former aims to use the spatio-temporal autocorrelation present in the data to estimate smoothed maps of disease risk, while the latter aims to identify clusters of areal units that exhibit elevated risks compared with neighbouring areas. Risk estimation and cluster identification are both epidemiologically important goals, and it would be preferable if both could be addressed in a unified modelling framework, rather than doing separate analyses, possibly using different software packages, which make different assumptions about the data. A two-stage approach for addressing both aims was proposed by Charras-Garrido et al. (2013) in a purely spatial context, which applies a clustering algorithm to the risk surface estimated from a spatial smoothing model. Attempting to identify clusters (i.e. discontinuities between neighbouring areas) from a spatially smoothed risk surface is inherently problematic, and Anderson et al. (2014) show that such an approach does not lead to good cluster recovery. Alternatively, clusters could be identified based on exceedence probabilities (Richardson et al. (2004)), but as tail area probabilities these are sensitive to the model chosen and require the user to specify a threshold level for exceedences. Alternatively, Gangnon and Clayton (2000), Knorr-Held and Rasser (2000), Green and Richardson (2002), Forbes et al. (2013), Wakefield and Kim (2013) and Anderson et al. (2014) have proposed an integrated modelling approach to risk estimation and cluster identification in a purely spatial context, while only Choi and Lawson (2011), Lawson et al. (2012) and Li et al. (2012) have extended these models to the spatio-temporal domain. However, the latter have focused on detecting shared latent structures and unusual temporal trends, and an integrated modelling framework for spatio-temporal risk estimation and cluster detection is yet to be proposed. The contribution of this paper is to fill this gap, by proposing a novel Bayesian spatio-temporal model for cluster detection and risk estimation. The model is able to detect clusters dynamically, so that both cluster membership and their average risk levels can evolve over time. Inference is based on Markov chain Monte Carlo (McMC) simulation, and unlike most existing models for spatiotemporal disease mapping, our methodology can be implemented in freely available software, making this research reproducible. This software is the R package CARBayesST , which was developed in conjunction with this paper. The methodology developed here is motivated by two case studies, and the motivating questions for both analyses focus on the relationship between public health policy and disease clustering. The background and motivation for these case studies are outlined in Section 2, together with a brief review of spatio-temporal disease mapping. Section 3 presents our methodological contribution, and details the software that has been developed. Section 4 quantifies the performance of our methodology by simulation, while the results from the two case studies are presented in Section 5. Finally, Section 6 concludes the paper. ## 2 Background and motivation ## 2.1 Spatio-temporal disease mapping Disease data ( y it , e it ) denote the observed and expected numbers of disease cases across i = 1 , . . . , N contiguous areal units during t = 1 , . . . , T time periods. The latter, e it , is computed using internal or external standardisation, and accounts for the heterogeneous population sizes and demographic structures across the N areal units. The same set of age and sex specific disease rates are used in the standardisation for all time periods, because any estimated temporal trend in disease risk is then relative to a common baseline. The Poisson model y it | e it , θ it ∼ Poisson( e it θ it ) is commonly assumed for the disease counts y it in the spatio-temporal disease mapping literature, where θ it is the risk of disease in areal unit i during time period t relative to e it . Log-linear models are typically specified for θ it , and the first model to be proposed in the literature was Bernardinelli et al. (1995), who represented { θ it } by a set of spatially varying linear time trends. However, linear trends are not always appropriate, and the most popular model in the literature is the main effects and interaction decomposition proposed by Knorr-Held (2000): $$\ln ( \theta _ { i t } ) \ & = \ \beta + \phi _ { i } + \theta _ { i } + \alpha _ { t } + \delta _ { t } + \gamma _ { i t }, \quad ( 1 ) \\ \phi _ { i } | \phi _ { - i }, W, \tau _ { \phi } ^ { 2 } \ & \sim \ N \left ( \frac { \sum _ { j = 1 } ^ { N } w _ { i j } \phi _ { j } } { \sum _ { j = 1 } ^ { N } w _ { i j } }, \frac { \tau _ { \phi } ^ { 2 } } { \sum _ { j = 1 } ^ { N } w _ { i j } } \right ), \\ \theta _ { i } | \tau _ { \theta } ^ { 2 } \ & \sim \ N ( 0, \tau _ { \phi } ^ { 2 } ), \\ \alpha _ { t } | \alpha _ { t - 1 }, \tau _ { \alpha } ^ { 2 } \ & \sim \ N ( \alpha _ { t - 1 }, \tau _ { \alpha } ^ { 2 } ), \\ \delta _ { t } | \tau _ { \delta } ^ { 2 } \ & \sim \ N ( 0, \tau _ { \delta } ^ { 2 } ), \\ \gamma _ { i t } | \gamma _ { - i t }, \tau _ { \gamma } ^ { 2 } \ & \sim \ N ( m _ { i t }, \tau _ { \gamma } ^ { 2 } v _ { i t } ).$$ The spatial ( φ i + θ i ) and temporal ( α t + δ t ) main effects are a convolution of independent ( θ , δ i t ) and autocorrelated ( φ , α i t ) processes. Spatial autocorrelation is modelled by an intrinsic conditional autoregressive (ICAR, Besag et al., 1991) model with a binary N × N neighbourhood matrix W , where w ij = 1 if areal units ( i, j ) share a common border and is zero otherwise. Thus the conditional expectation is the mean of the random effects in neighbouring areal units, inducing spatial smoothness into φ i . Temporal autocorrelation is modelled by a first order random walk, where the conditional expectation of α t is α t -1 . Four different models were proposed by Knorr-Held (2000) for the interaction term γ it , which respectively assume independence, purely spatial autocorrelation, purely temporal autocorrelation and spatio-temporal autocorrelation. The first of these has ( m it = 0 , v it = 1), and further details are given by Knorr-Held (2000). Weakly informative Inverse-gamma and Gaussian priors can be specified for the variance parameters ( τ 2 φ , τ 2 θ , τ 2 α , τ 2 δ , τ 2 γ ) and intercept term ( β ) respectively. Another popular approach is to allow the spatially smoothed log-risk surface to evolve over time via an autoregressive process, and a number of models of this type have been proposed (see for example Mugglin et al. (2002), Ugarte et al. (2012) and Rushworth et al. (2014)). Here we outline the model of Rushworth et al. (2014), which is given by: $$\ln ( \theta _ { i t } ) \ & = \ \beta + \phi _ { i t }, & ( 2 ) \\ \phi _ { 1 } = ( \phi _ { 1 1 }, \dots, \phi _ { N 1 } ) \ & \sim \ N \left ( 0, \, \tau ^ { 2 } Q ( W, \rho ) ^ { - 1 } \right ), \\ \phi _ { t } | \phi _ { t - 1 } \ & \sim \ N \left ( \gamma \phi _ { t - 1 }, \, \tau ^ { 2 } Q ( W, \rho ) ^ { - 1 } \right ) \, \text{ for } t = 2, \dots, T, \\ \gamma, \rho \ & \sim \, \text{ Uniform} ( 0, 1 ).$$ Here β is again an intercept term and φ t = ( φ 1 t , . . . , φ Nt ) represents the spatial pattern in the log-risk surface at time period t . Temporal autocorrelation between the log-risk surfaces is controlled by the autoregressive parameter γ , while spatial autocorrelation is induced via the precision matrix Q W,ρ ( ) = ρ [diag( W 1 ) -W ] + (1 -ρ )I, where 1 is an N × 1 vector of ones and I is the N × N identity matrix. This precision matrix corresponds to the conditional autoregressive model proposed by Leroux et al. (1999), which for time period 1 has the full conditional decomposition: $$\phi _ { i 1 } | \phi _ { - i 1 }, \rho, \tau ^ { 2 }, W \sim N \left ( \frac { \rho \sum _ { j = 1 } ^ { N } w _ { i j } \phi _ { j 1 } } { \rho \sum _ { j = 1 } ^ { N } w _ { i j } + 1 - \rho }, \frac { \tau ^ { 2 } } { \rho \sum _ { j = 1 } ^ { N } w _ { i j } + 1 - \rho } \right ).$$ The level of spatial smoothing is controlled by ρ , and if ρ = 1 equation (3) reduces to the ICAR model while if ρ = 0 the random effects have identical and independent normal prior distributions. Although (1) and (3) are appropriate models for risk estimation, neither have an inbuilt mechanism for identifying clusters of areas exhibiting elevated disease risks. Thus in Section 3 we extend (2) to allow for such cluster detection, but before that we present our two motivating case studies. ## 2.2 Case study 1 - The relationship between Public Health Districts (PHD) in Georgia and disease clustering The state of Georgia, USA contains N = 159 counties, which for the provision of healthcare are grouped into 18 Public Health Districts containing between 1 and 16 counties (for details see http://dph.georgia.gov/publichealth-districts ). The motivating question for this analysis is whether disease risk clusters by PHD, which may be indicative of differential levels of health care across the 18 PHD. We test this hypothesis using yearly counts of colon cancer incidence (International Classification of Disease tenth revision (ICD-10) code C18) between 2001 and 2010, and maps of the standardised incidence ratio (SIR it = y it /e it ) for the first (2001) and last (2010) years of the study period are displayed in the top row of Figure 1. The white lines on the maps depict the 18 Public Health Districts in Georgia, and no clear relationship between SIR and PHD exists for either of the two years. The SIRs also exhibit substantial skewness, with little in the way of a spatially consistent pattern between the two years. This lack of spatial consistency occurs in all years, as the maximum pairwise correlations in SIR in different years is 0.47. An exploratory analysis of the relationship between SIR and PHD shows weak evidence for a relationship. A two-way analysis of variance incorporating the effects of year and PHD shows a statistically significant effect of PHD on SIR (p-value 1 098 . × 10 -12 ), but this only explains 5.8% of the variation in the SIR data. Therefore, the spatio-temporal clustering model proposed in this paper will be applied to these data in Section 5 to provide a more conclusive answer to this question. ## 2.3 Case study 2 - The impact of the smoking ban in England on circulatory disease clustering A ban on smoking in indoor public places such as restaurants, bars, etc was introduced in England on 1st July 2007, following similar bans in Ireland (2004) and Scotland (2005). The goal of this case study is to assess whether the English ban has had any effect in reducing circulatory disease risk, and whether any such reduction applies equally across communities with different baseline risk levels. Thus the clustering question here is the extent to which the clusters identified are consistent over time, and whether the cluster specific mean risk levels have reduced since July 2007. To answer these questions we use quarterly count data quantifying the numbers of admissions to hospital due to circulatory disease (ICD-10 codes I00-I99) for the set of N = 323 local authorities in mainland England between 2003 to 2011. The expected counts for all quarters were computed using age and sex specific disease rates for England in 2003, the first year of the study. The SIRs for the first (2003 quarter 1) and last (2011 quarter 4) time periods are displayed in the bottom panel of Figure 1, and show definite clusters of high-risk areas in Greater Manchester / West Yorkshire (mid to north of the study region) and Tyneside (far north east of the study region). These clusters appear to be temporally stable, as the exploratory analysis of these data shows a mean pairwise correlation of 0.95 between the spatial SIR surfaces across different time periods. The exploratory analysis also suggests no clear decline in risk on average since 2007, although this global pattern may hide cluster specific patterns and the analysis in Section 5 of the main paper will address this issue. ## 3 Methodology This section describes the general Bayesian spatio-temporal cluster detection and risk estimation model developed in this paper, as well as outlining the software that has been developed to allow others to apply it to their own data. ## 3.1 Likelihood model The disease data ( y it , e it ) are modelled with the following Poisson log-linear model: $$y _ { i t } | e _ { i t }, \theta _ { i t } \ & \sim \ \text{Poisson} ( e _ { i t } \theta _ { i t } ) \quad \text{for } i = 1, \dots, N \text{ and } t = 1, \dots, T, \\ \ln ( \theta _ { i t } ) \ & = \ \lambda _ { t, Z _ { i t } } + \phi _ { i t },$$ which uses the same Poisson log-linear structure as the majority of the existing spatio-temporal disease mapping literature. The spatio-temporal pattern in the log-risk surface is modelled as a linear combination of a smooth space-time component φ it and a piecewise constant clustering or intercept component λ t,Z it , which allows disease risk to vary smoothly between neighbouring areas within the same cluster but exhibit a step-change if those areas are in different clusters. Thus if the spatiotemporal risk surface is completely smooth with no clusters then the smoothing component ( φ it ) will dominate the clustering component ( λ t,Z it ), while at the other extreme for a piecewise constant risk surface the clustering component λ t,Z it will dominate. A general model for the piecewise constant cluster component λ t,Z it is presented in Section 3.2, while potential models for the spatial smoothing component are presented in Section 3.3. ## 3.2 Clustering component λ t,Z it The clustering component for time period t comprises at most G distinct (log) risk levels or classes ( λ t 1 , . . . , λ tG ), so that it is essentially a piecewise constant intercept term over the set of N areal units. These risk classes are ordered as λ t 1 &lt; λ t 2 &lt; . . . &lt; λ tG , which helps mitigate against the label switching problem common in mixture models. A-priori , one would expect the mean risk levels in each class to evolve smoothly over time, which is achieved by putting first order random walk priors on the set ( λ 1 j , . . . , λ Tj ) for each risk class j = 1 , . . . , G . However, the cluster means follow the ordering constraint λ t 1 &lt; λ t 2 &lt; . . . &lt; λ tG across the G groups for each time period, leading to the constrained random walk prior model: $$\lambda _ { t j } | \lambda _ { t - 1, j } & \ \sim \ N ( \lambda _ { t - 1, j }, \sigma ^ { 2 } ) _ { I ( \lambda _ { t j } \in [ \lambda _ { t, j - 1 }, \lambda _ { t, j + 1 } ] ) } \quad \text{for $j=1,\dots,G$, $t=2,\dots,T$,} \\ \lambda _ { 1 j } & \ \sim \ \text{Uniform} ( \lambda _ { 1, j - 1 }, \lambda _ { 1, j + 1 } ) \quad \text{for $j=1,\dots,G$,} \\ \sigma ^ { 2 } & \ \sim \ \text{Inverse-Gammama} ( a = 0.001, b = 0.001),$$ where I ( ) . denotes an indicator function. At time period one a flat prior is specified on the interval obeying the same ordering constraint, and in the above notation λ t 0 = -∞ and λ t,G +1 = ∞ for all t . The assignment of areal unit i to one of the G risk classes during time period t is controlled by the class indicator Z it ∈ { 1 , . . . , G } , and our choice of prior f ( Z it ) is guided by two considerations. First, one may expect the risk in an area to evolve smoothly in time, which would favour a temporally autocorrelated prior for Z it such as a Markov model. The second consideration relates to how the number of risk classes G is chosen, and here we do not estimate it in the model using a reversible jump McMC algorithm (Knorr-Held and Rasser, 2000). Instead we adopt a penalty based approach, which fixes G to be overly large and then uses the prior for Z it to penalise values in the extreme risk classes. Thus { Z it } are allowed to take values in the set { 1 , . . . , G } but are not forced to completely cover the set, meaning that some of these classes may be empty. These two considerations suggest a Markov decomposition for the prior of Z = { Z it | i = 1 , . . . , N, t = 1 , . . . , T } of the form: $$f ( \mathbf z ) \ = \ \prod _ { i = 1 } ^ { N } \left [ f ( Z _ { i 1 } ) \prod _ { t = 2 } ^ { T } f ( Z _ { i t } | Z _ { i, t - 1 } ) \right ].$$ No spatial autocorrelation is enforced on Z , because two different high-risk clusters could be present on opposite sides of the study region. As each Z it ∈ { 1 , . . . , G } we propose a discrete prior distribution that combines a Markov component with a penalty component and is given by: $$f ( Z _ { i t } | Z _ { i, t - 1 } ) \ & = \ \frac { \exp ( - \alpha ( Z _ { i t } - Z _ { i, t - 1 } ) ^ { 2 } - \delta ( Z _ { i t } - G ^ { * } ) ^ { 2 } ) } { \sum _ { r = 1 } ^ { G } \exp ( - \alpha ( r - Z _ { i, t - 1 } ) ^ { 2 } - \delta ( r - G ^ { * } ) ^ { 2 } ) } \quad \text{for } i = 1, \dots, N, \ \ t = 2, \dots, T, \ \ ( 7 ) \\ f ( Z _ { i 1 } ) \ & = \ \frac { \exp ( - \delta ( Z _ { i t } - G ^ { * } ) ^ { 2 } ) } { \sum _ { r = 1 } ^ { G } \exp ( - \delta ( r - G ^ { * } ) ^ { 2 } ) }, \\ \alpha, \delta \ & \sim \ \text{Uniform} ( 0, M ) \quad \text{for } i = 1, \dots, N.$$ Temporal autocorrelation in Z is controlled by the -α Z ( it -Z i,t -1 ) 2 component, and α = 0 corresponds to independence of ( Z ,Z it i,t -1 ). The penalty term δ Z ( it -G ∗ ) 2 penalises class indicators Z it towards the middle risk class G ∗ = ( G +1) 2, so that / δ = 0 corresponds to having no such smoothing penalty. This penalty term is required because G is fixed to be overly large rather than estimated, as it guards against a potential lack of identifiability in the model. For example, if G = 3 but the data contain only one risk class (i.e. a background risk level close to one), then the model will fit equally well if all Z it = 1 2 3 when , , δ = 0. The smoothing parameters ( α, δ ) are assigned uniform priors on a large range ( M is chosen to be overly large), and are simultaneously estimated in the model. ## 3.3 Smoothing component φ it The smoothing component φ it models spatially and temporally autocorrelated variation in the log risk surface, which allows two adjacent areal units and time periods within the same cluster to have similar but not identical disease risks. A number of models are possible to represent this smooth variation, and we consider a range of them here. ## 3.3.1 Model-1: no smoothing The two components ( λ t,Z it , φ it ) may compete with each other to represent the same variation in the data, potentially leading to disease clusters wrongly being modelled by the smoothing component φ it . Therefore the first alternative we consider is the simplification φ it = 0 for all areas and time periods, which assigns all the variation in disease risk to the non-smooth clustering component. ## 3.3.2 Model-2: spatio-temporal smoothing The random effects { φ it } can be smoothed in space and time using the model of Rushworth et al. (2014) that is described in Section 2, which has the autoregressive decomposition: $$\phi _ { 1 } \ & \sim \ N \left ( 0, \, \tau ^ { 2 } Q ( W, \rho ) ^ { - 1 } \right ), \\ \phi _ { t } | \phi _ { t - 1 } \ & \sim \ N \left ( \gamma \phi _ { t - 1 }, \, \tau ^ { 2 } Q ( W, \rho ) ^ { - 1 } \right ) \text{ for } t = 2, \dots, T.$$ Here uniform priors on the unit interval are specified for the temporal and spatial autocorrelation parameters ( γ, ρ ), and further details are given in Section 2. ## 3.3.3 Model-3: spatial CAR smoothing Both the mean risk levels { λ tj } and the class indicators { Z it } are temporally autocorrelated, and additional temporal autocorrelation in the smoothing component may be unnecessary. Therefore we consider a simplification of Model 2 where γ = 0, which spatially smoothes the random effects with independent CAR priors for each time period. ## 3.3.4 Model-4: spatial convolution smoothing Finally, a CAR style structure may not be the best model for the smoothing component, so we also consider a convolution style model similar to Best et al. (2005): $$\phi _ { i t } \ & = \ \sum _ { j = 1 } ^ { N } f ( d _ { i j } | \rho ) X _ { j t }, \\ X _ { j t } \ & \sim \ N ( 0, \tau ^ { 2 } ), \\ \tau ^ { 2 } \ & \sim \ \text{Inverse-Gamma} ( a = 0. 0 0 1, b = 0. 0 0 1 ), \\ \rho \ & \sim \ \text{Uniform} ( 0, P ).$$ Here f ( d ij | ρ ) is a scaled Gaussian kernel of distance d ij between two area's centroids defined by f ( d ij | ρ ) = exp( -d 2 ij / (2 ρ )) / ∑ N k =1 exp( -d 2 ik / (2 ρ )), except that f ( d ii | ρ ) = 0. Here ρ acts as a spatial smoothness parameter, with larger values of ρ leading to spatially smoother surfaces. The upper limit on the prior for ρ , P , is chosen to be overly large, so that different levels of spatial smoothness can be estimated from the convolution. ## 3.4 Model interpretation and software An add-on package to the statistical software R (R Core Team, 2013) called CARBayesST has been developed in conjunction with this paper to implement the models discussed here, which is one of the first R packages to implement spatio-temporal models for areal unit data. The package is freely available to download from http://cran.r-project.org/ , and can fit the model class proposed here as well as the models of Knorr-Held (2000) (with independent interaction effects) and Rushworth et al. (2014). For the cluster model proposed here the spatial cluster structure in the data is defined by the posterior median of the risk class allocation variable { Z it } . This is because if two adjacent areas have the same Z value then their risks will either be identical (when φ it = 0) or spatially smoothed, meaning they are in the same risk cluster. In contrast, if two adjacent areas ( i, j ) have different Z values then their risk levels could be substantially different, due to having different intercept parameters ( λ t,Z it , λ t,Z jt ). Thus this corresponds to being in different spatial clusters. ## 4 Model assessment via simulation This section presents a simulation study, which compares the four different specifications for the general clustering model proposed in Section 3 with existing disease mapping models. The latter include the main effects and interaction decomposition proposed by Knorr-Held (2000) with independent interactions, as well as the autoregressive model of Rushworth et al. (2014). Each of the clustering models is fitted with a maximum of G = 5 risk classes, where as the simulated data exhibit either one or two distinct risk levels. ## 4.1 Data generation and study design Simulated data are generated for the N = 159 counties comprising the state of Georgia, USA for a period of T = 10 years, which is the study region for the first case study outlined in Section 2.2. Disease counts are generated from a Poisson log-linear model, where the size of the expected numbers { e it } is varied in this study to assess their impact on model performance. The log-risk surface is generated from a multivariate Gaussian distribution, with a piecewise constant mean (for clustering) and a spatially smooth variance matrix. The latter induces smooth spatial variation into the log-risks within a cluster, and is defined by an exponential correlation function based on the Euclidean distance between areal unit centroids. The high-risk clusters present in the simulated data are depicted by the black shaded regions in the top row of Figure 2, which displays sample realisations of the SIR surfaces under the set of scenarios considered here (see below). This cluster structure was chosen to contain clusters of different shapes, including a singleton cluster, a long thin cluster, a block cluster and a cluster with a hole in the middle. We consider five different scenarios in this study, which are outlined below. - 1. No clustering -The null scenario where the risk surface exhibits a smoothly varying baseline risk close to one with no clustering, as illustrated in the bottom row of Figure 2. This scenario tests whether the methods falsely identify clusters when none are present. - 2. Medium temporally consistent clustering - The risk surface contains high-risk clusters with average risks of r = 2 for all time periods, as illustrated in the middle row of Figure 2. This scenario tests whether the methods can identify clusters whose risk is elevated slightly above the background risk level. - 3. High temporally consistent clustering -The risk surface contains high-risk clusters with average risks of r = 3 for all time periods, as illustrated in the top row of Figure 2. This scenario tests whether the methods can identify clusters whose risk is highly elevated above the background risk level. - 4. Medium temporally inconsistent clustering - The risk surface contains no high-risk clusters during time periods 1 to 3 or periods 8 to 10, and the realisations look like those under scenario 1. However, high-risk clusters with an average risk of r = 2 appear during time periods 4 to 7, yielding SIR surfaces similar to scenario 2. This scenario tests the models ability to detect slightly elevated clusters that are not temporally consistent. - 5. High temporally inconsistent clustering -The risk surface contains no high-risk clusters during time periods 1 to 3 or periods 8 to 10, and the realisations look like those under scenario 1. However, high-risk clusters with an average risk of r = 3 appear during time periods 4 to 7, yielding SIR surfaces similar to scenario 3. This scenario tests the models ability to detect clusters with highly elevated risks that are not temporally consistent. The five scenarios above are repeated with expected numbers of disease cases e it ∈ [10 , 30], [90 , 110], [190 , 210], which allows us to examine model performance for diseases with different underlying prevalences. SIR surfaces generated under these different disease prevalences are displayed in the columns of Figure 2, and show that as e it increases the SIR values are smoother and exhibit less random noise due to Poisson sampling variation. Inference for each model is based on 10,000 McMC samples, which were generated following a burn-in period of a further 10,000 samples. Convergence was visually assessed to have been reached after 10,000 samples by viewing trace plots of sample parameters for a number of simulated data sets. Two hundred data sets are generated under each scenario, and model performance is summarised using two metrics. The first is the root mean square error (RMSE) of the estimated risk surface, which summarises a models ability to accurately estimate the spatio-temporal variation in disease risk. RMSE is computed as RMSE = √ 1 NT ∑ T t =1 ∑ N i =1 ( θ it -ˆ θ it ) 2 , where ˆ θ it is the posterior median for θ it . The second metric we use is the Rand Index (Rand (1971)), which quantifies a models ability to correctly identify the true cluster structure in the data. It is given by Rand = a + b ( NT 2 ) , where a is the number of pairs of risks ( θ it , θ jr ) that are classified in the same cluster under both the true and estimated cluster structures, while b is the number of pairs of risks that are classified in different clusters under both cluster structures. The Rand index thus measures the proportion of agreement between the two cluster structures, with a value of one indicating the structures are identical. For the clustering models, the cluster area i is in during time period t is summarised by the posterior median of Z it , while the models of Knorr-Held (2000) and Rushworth et al. (2014) have no such inbuilt clustering mechanism. Therefore for these latter models we implement the posterior classification approach described in Charras-Garrido et al. (2012), which applies a Gaussian mixture model to the posterior median risk surface to obtain the estimated cluster structure. ## 4.2 Results The results of this study are displayed in Table 1, which compares the models proposed by Knorr-Held (2000) (with independent interactions, denoted Model-KH ) and Rushworth et al. (2014) (denoted Model-RLM ) with the four different variants of the model proposed in Section 3 (denoted Model-1 to Model-4 ). The top panel of the table displays the RMSE of the estimated risk surface while the bottom panel displays the Rand index quantifying a model's clustering ability, and in both cases the mean values over the 200 simulated data sets are presented. The table shows that in the absence of high-risk clusters (scenario 1) Model-RLM and Model-2 perform best in terms of RMSE, as they utilise the same spatio-temporal smoothing component. In contrast, when a risk surface contains high-risk clusters (scenarios 2 to 5) but the disease prevalence is low (small { e it } ) Model-KH , Model-RLM and Model-2 perform best, while the other clustering models estimate the risk surface much less accurately. However, as { e it } increases cluster models 2-4 outperform the global smoothing models ( Model-KH Model-RLM , ), although no one variant from models 2-4 is universally superior. Therefore, Model-2 performs best overall in terms of RMSE across the range of scenarios, having the lowest or close to lowest RMSE values in 10 of the 15 scenarios considered. Therefore in general, fitting a model that explicitly accounts for high-risk clusters will lead to improved estimation performance compared with existing models such as Model-KH and Model-RLM that do not account for such clustering. The Rand index results in the bottom panel of Table 1 show that applying a clustering algorithm to a smoothed posterior risk surface generally performs poorly, and should not be used for cluster detection in this context. This is particularly evident in scenario 1, where the Rand indices from Model-KH and Model-RLM indicate that clustering the estimated risk surfaces from these models have resulted in large numbers of false positives being identified. The results for the clustering models proposed here show that the Rand indices increase (better cluster identification) as e it increases, which is because this results in a reduced variance in the data on the risk scale (e.g. Var[SIR it = y it /e it ] = θ it /e it ), making cluster detection less demanding. Model 1 with no smoothing component almost uniformly outperforms the remaining clustering models in terms of Rand index, with values that are higher or as high for nearly all scenarios. This is because Model-1 is not trying to partition the spatial variation in risk between competing model components ( λ t,Z it , φ it ), so that true cluster structure is not wrongly captured by the smoothing component. Finally, the clustering models are all conservative in terms of cluster identification, as when disease prevalence is low and the elevated risks are not that high (scenarios 2 and 4) no clusters are identified. Therefore, overall Model-1 is the most consistent model for cluster detection, while Model-2 is the most consistent for risk estimation. ## 5 Results from the case studies ## 5.1 Modelling We apply four models to the Georgia and England case studies, namely the existing global smoothing models Model-KH and Model-RLM , as well as Model-1 with no smoothing component and Model-2 with a spatio-temporal smoothing component. The latter two are included because the simulation study showed they respectively have the best clustering and model fitting performance across the range of models proposed in this paper. Inference for each model is based on 20,000 McMC samples, which were generated following a burn-in period of 20,000 samples. In common with the simulation study convergence was assessed visually using trace plots of the McMC samples for selected parameters. The cluster models were fitted with G = 5, although a sensitivity analysis showed changing this did not affect the results. The overall fit of each model to each data set is summarised in Table 2, which displays the Deviance Information Criterion (DIC, Spiegelhalter et al., 2002) and Log Marginal Predictive Likelihood (LMPL, Congdon, 2005) statistics. ## 5.2 Case study 1 - Georgia colon cancer study Table 2 shows that the DIC and LMPL statistics differ in their assessment of the best fitting model, as the DIC is minimised by Model-KH while the LMPL is maximised by Model-RLM and Model2 . This is because the DIC penalises models with larger effective numbers of parameters ( p.d ), and Model-RLM (and Model-2 ) has over 100 more effective parameters than Model-KH . Thus the unadjusted deviance is lower for Model-RLM than Model-KH , 6737.0 compared with 6796.9, suggesting a better absolute fit to the data of the former. This difference in p.d is due to the relative amounts of shrinkage applied to the random effects, as for Model-KH the variance parameters are all less than 0.007. The exception is for the spatial main effect (ˆ τ 2 φ = 0 180,) which has . K random effects, while in Model-RLM τ 2 = 0 0385 for . KN random effects. However, substantial smoothing of the random effects has taken place in both models, as the p.d values are much smaller than the numbers of random effects in each model. This smoothing is evident in the top panel of Figure 3, which displays the estimated risk surface { θ it } for the first year of the study 2001 from Model-KH (left) and Model-2 (right). The two models show broadly similar spatial patterns, with the main difference being that the estimates from Model-KH are more extreme and less smoothed than those from Model-2 , which is due to the larger estimated spatial variance as discussed above. Model-2 did not identify any clusters of areas at high risk for these data, as all counties were classified as being in the baseline risk class for all years. This null clustering result was also obtained when fitting Model-1 , and suggests that the extreme SIR values are likely to be caused by a combination of small expected numbers e it and Poisson sampling variation. However, the figure does suggest that there are counties exhibiting slightly elevated or slightly reduced risks compared with the rest of the state, but that these are not related to PHD. An example is the group of counties in the north of the state that exhibit slightly lower risks, which cover parts of many PHD and do not respect their borders. This lack of PHD effect is confirmed by the bottom panel of Figure 3, which displays boxplots of estimated risks from Model-2 by PHD for all years. The plot shows that with the exception of three PHDs that contain just one county, the variation in risks within a PHD is large, and thus the distribution of risks overlaps with the distributions from most other PHDs. ## 5.3 Case study 2 - England cardiovascular study Table 2 shows no clear consensus on the best fitting model, as the DIC suggests Model-KH followed by Model-2 and then Model-RLM , while the LMPL suggests Model-RLM followed by Model-2 and Model-KH . The cluster structure estimated by Model-2 is largely consistent over time, with the local authorities being classified into two different risk classes for 34 out of the 36 time periods. These risk classes are a baseline class and an elevated risk class, which contain 298 and 25 areas on average over time. The allocation of local authorities to these risk classes is also largely consistent, as there is an average 99.7% agreement in class allocation between any two time periods. The risk class allocations for quarter 2 in 2007 (just before the implementation of the smoking ban) and quarter 4 in 2011 (the last time period) are displayed in the top panel of Figure 4, where areas in the baseline and elevated risk classes are shaded light grey and black respectively. The figure shows that the class structures before and after the smoking ban are identical, with areas in the elevated classes typically being in mid to northern England including the cities of Birmingham, Liverpool, Manchester and Leeds. The exceptions to this are the southern authorities of Bristol, Wiltshire and Cornwall, and this cluster structure follows the pattern of socio-economic deprivation closely. The bottom panel in Figure 4 displays the posterior median (solid line) and 95% credible intervals (dashed lines) for the average risk in each class (e.g. exp( λ t,Z it )), and the vertical line denotes the beginning of the smoking ban in July 2007. The figure shows that the baseline and elevated risk classes exhibit very little temporal trend, with average risks of 1.010 and 1.593 before the smoking ban and 0.999 and 1.619 after the ban. Computing the mean estimated risk before and after the smoking ban shows that 154 local authorities exhibit reduced risks after the ban compared to 169 that exhibit elevated risks. However, these risk differences are small, and only 6 and 4 local authorities exhibit more than a 10% decrease or increase in risk respectively. These results tentatively suggest that the smoking ban has not yet impacted cardiovascular disease risk and clustering, although further study over a longer time period is required to make more definitive conclusions. ## 6 Discussion This paper has proposed one of the first models for simultaneously estimating disease risk and identifying high-risk clusters, and is accompanied by freely available software, the R package CARBayesST . Existing approaches either estimate a spatio-temporal smoothed risk surface without cluster detection, or utilise testing based paradigms to identify clusters without estimating the risk surface for the entire study region. Some work has combined these facets into a unified model in a purely spatial context, but the extension to a spatio-temporal setting throws up a number of additional modelling challenges that this paper is the first to address. A number of general themes emerged from our simulation study. First, risk estimation and cluster detection can be undertaken successfully in a single model, as Model-2 , which combines clustering and smoothing components, showed good overall performance. It outperformed two commonly used spatio-temporal smoothing models in terms of risk estimation as quantified by RMSE, and led to good overall cluster recovery. The exception to this is when the disease is rare ( e it is small), which is because of the increased sampling variation around the raw risk estimates ˆ θ it = y it /e it . A simplified model with φ it = 0 performs better in terms of clustering because the two components ( λ t,Z it , φ it ) are not competing with each other to represent the same spatio-temporal variation, but this is at the expense of accuracy in terms of risk estimation. Applying a post-hoc clustering algorithm to smoothed risk surfaces performs uniformly poorly throughout, because one is trying to identify differences in risk between neighbouring areal units from a smoothed surface. Finally, setting the maximum number of risk classes G to be overly large and penalising { Z it } towards the middle class works well, as long as the penalty is not undermined by additional smoothing constraints, such as the temporal smoothing constraints considered here. In common with the vast majority of the disease mapping literature our clustering models do not include covariates, so that the risk classes relate to the risk in an area and not the residual or unexplained component of risk after adjusting for the covariates. This allows us to classify groups of areas at elevated risk, so public health interventions can be appropriately targeted. However, classifying the residual risk surface after adjusting for covariates would aid in the identification of unknown etiologic covariates, as the residual class structure could be examined to look for similarity with spatially varying covariates. Covariate information could also be used as predictors for the cluster allocation model ( Z it ), and both these areas will be investigated in future work. Another avenue for future work is illustrated by the simulation and Georgia case studies, which show the difficulties in cluster detection and risk estimation for rare diseases. All models smoothed the extreme raw SIRs towards the null risk of one, as the spatial smoothing priors dominated the count data. Thus further work is required to develop spatio-temporal disease mapping models specifically designed for low count data y it . Another future direction will extend the cluster models to consider multiple diseases simultaneously, which throws up additional modelling challenges. One of these key challenges will be whether and how to extend the penalty prior for { Z it } to account for between disease correlations. ## Acknowledgements Hospital admission records from the Health and Social Care Information Centre ( www.hscic.gov.uk ) were analysed at the UK Met Office by Dr Christophe Sarran to provide counts of hospital admissions for circulatory disease by local authority. ## Supplementary material Supplementary material accompanying this paper is available, and includes exploratory analyses for the two cases studies as well as full simulation results for the second simulation study. ## References Anderson, C., D. Lee, and N. Dean (2014). Identifying clusters in Bayesian disease mapping. Biostatistics 15 , 457-469. Bernardinelli, L., D. Clayton, C. Pascutto, C. Montomoli, M. Ghislandi, and M. Songini (1995). Bayesian analysis of space-time variation in disease risk. Statistics in Medicine 14 , 2433-2443. - Besag, J., J. York, and A. Mollie (1991). Bayesian image restoration with two applications in spatial statistics. Annals of the Institute of Statistics and Mathematics 43 , 1-59. - Best, N., S. Richardson, and A. Thomson (2005). A comparison of Bayesian spatial models for disease mapping. Statistical Methods in Medical Research 14 , 35-59. - Charras-Garrido, M., D. Abrial, and J. de Goer (2012). Classification method for disease risk mapping based on discrete hidden Markov random fields. Biostatistics 13 , 241-255. - Charras-Garrido, M., L. Azizi, F. Forbes, S. Doyle, N. Peyrard, and D. Abrial (2013). On the difficulty to delimit disease risk hot sports. Journal of Applied Earth Observation and Geoinformation 22 , 99-105. - Choi, J. and A. B. Lawson (2011). Evaluation of bayesian spatial-temporal latent models in small area health data. Environmetrics 22 , 1008-1022. - Congdon, P. (2005). Bayesian models for categorical data (1st ed.). John Wiley and Sons. - Forbes, F., M. Charras-Garrido, L. Azizi, S. Doyle, and D. Abrial (2013). Spatial risk mapping for rare disease with hidden Markov fields and variational EM. Annals of Applied Statistics 7 , 1192-1216. - Fraley, C. and A. Raftery (2007). Bayesian regularization for normal mixture estimation and modelbased clustering. Journal of Classification 24 , 155-181. - Gangnon, R. and M. Clayton (2000). Bayesian detection and modeling of spatial disease clustering. Biometrics 56 , 922-935. - Green, P. and S. Richardson (2002). Hidden Markov models and disease mapping. Journal of the American Statistical Association 97 , 1055-1070. - Knorr-Held, L. (2000). Bayesian modelling of inseparable space-time variation in disease risk. Statistics in Medicine 19 , 2555-2567. - Knorr-Held, L. and G. Rasser (2000). Bayesian detection of clusters and discontinuities in disease maps. Biometrics 56 , 13-21. - Kulldorff, M., R. Heffernan, J. Hartman, R. Assuncao, and F. Mostashari (2005). A space-time permutation scan statistic for disease outbreak detection. PLoS Medicine 2 , 216-224. - Lawson, A. B. (2013). Bayesian Disease Mapping: hierarchical modeling in spatial epidemiology (2 ed.). New York: CRC Press. - Lawson, A. B., J. Choi, B. Cai, M. M. Hossain, R. Kirby, and J. Liu (2012). Bayesian 2-stage spacetime mixture modeling with spatial misalignment of the exposure in small area health data. Journal of Agricultural, Biological and Environmental Statistics 17 , 417-441. - Leroux, B., X. Lei, and N. Breslow (1999). Estimation of disease rates in small areas: A new mixed model for spatial dependence. Statistical Models in Epidemiology, the Environment and Clinical Trials, Halloran, M and Berry, D (eds) , pp. 135-178. Springer-Verlag, New York. - Li, G., N. Best, A. Hansell, I. Ahmed, and S. Richardson (2012). BaySTDetect: detecting unusual temporal patterns in small area data via bayesian model choice. Biostatistics 13 , 695-710. - Mugglin, A., N. Cressie, and I. Gemmell (2002). Hierarchical statistical modelling of influenza epidemic dynamics in space and time. Statistics in Medicine 21 , 2703-2721. - Office for National Statistics (2014). Inequality in healthly life expectancy at birth by national deciles of area deprivation: England, 2009-11. - R Core Team (2013). R: A Language and Environment for Statistical Computing . Vienna, Austria: R Foundation for Statistical Computing. - Rand, W. (1971). Objective Criteria for the Evaluation of Clustering Methods. Journal of the American Statistical Association 66 , 846-850. - Richardson, S., A. Thomson, N. Best, and P. Elliott (2004). Interpreting Posterior Relative Risk Estimates in Disease Mappling Studies. Environmental Health Perspectives 112 , 1016-1025. - Rushworth, A., D. Lee, and R. Mitchell (2014). A spatio-temporal model for estimating the longterm effects of air pollution on respiratory hospital admissions in Greater London. Spatial and Spatio-temporal Epidemiology 10 , 29-38. Spiegelhalter, D., N. Best, B. Carlin, and A. Van der Linde (2002). Bayesian measures of model complexity and fit. Journal of the Royal Statistical Society Series B 64 , 583-639. Ugarte, D., J. Etxeberria, T. Goicoa, and E. Ardanaz (2012). Gender-specific spatio-temporal patterns of colorectal cancer incidence in Navarre, Spain (1990-2005). Cancer Epidemiology 36 , 254-262. Wakefield, J. and A. Kim (2013). A Bayesian model for cluster detection. Biostatistics 14 , 752-765. Figure 1: Maps showing the SIR for colon cancer incidence in Georgia in 2001 and 2010 (top panel) and circulatory disease in England in 2003 quarter 1 (Q1) and 2011 quarter 4 (Q4) (bottom panel). For the latter the Easting and Northing coordinates are in kilometres. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-0768611e-c3c8-4fb2-aaee-52874c23cbe0.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-759fe250-31b7-4d78-82a4-1ab0e6cf2aff.jpg) Figure 2: Maps showing example realisations of the SIR surfaces generated in the simulation study. The rows correspond to different values of risk r for the high-risk clusters, while the columns correspond to different disease prevalences { e it } . High risk clusters are present for r = 2 3, and their locations , are denoted by the black shaded regions in the map on the top right of the figure. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-608515b8-f85c-4b08-8d5b-8c18d03c3146.jpg) Table 1: Table showing the root mean square error (RMSE, top panel) for the risk surface estimated by each of the six models, and the Rand index (bottom panel) which measures the clustering ability of each model. | Scenario | e | Model | Model | Model | Model | Model | Model | |------------|------------|----------|-----------|---------|---------|---------|---------| | | it | Model-KH | Model-RLM | Model-1 | Model-2 | Model-3 | Model-4 | | RMSE | | | | | | | | | | [10, 30] | 0.037 | 0.035 | 0.041 | 0.036 | 0.041 | 0.041 | | 1 | [90, 110] | 0.030 | 0.025 | 0.039 | 0.025 | 0.031 | 0.032 | | | [190, 210] | 0.028 | 0.022 | 0.040 | 0.022 | 0.026 | 0.029 | | | [10, 30] | 0.084 | 0.123 | 0.355 | 0.123 | 0.192 | 0.211 | | 2 | [90, 110] | 0.045 | 0.072 | 0.060 | 0.072 | 0.087 | 0.058 | | | [190, 210] | 0.037 | 0.056 | 0.048 | 0.038 | 0.037 | 0.034 | | | [10, 30] | 0.094 | 0.167 | 0.247 | 0.166 | 0.240 | 0.248 | | 3 | [90, 110] | 0.051 | 0.090 | 0.058 | 0.047 | 0.049 | 0.045 | | | [190, 210] | 0.042 | 0.068 | 0.058 | 0.030 | 0.036 | 0.040 | | | [10, 30] | 0.149 | 0.125 | 0.240 | 0.125 | 0.151 | 0.170 | | 4 | [90, 110] | 0.088 | 0.075 | 0.046 | 0.065 | 0.069 | 0.057 | | | [190, 210] | 0.067 | 0.059 | 0.043 | 0.034 | 0.035 | 0.032 | | | [10, 30] | 0.194 | 0.164 | 0.169 | 0.163 | 0.193 | 0.189 | | 5 | [90, 110] | 0.099 | 0.090 | 0.049 | 0.047 | 0.047 | 0.038 | | | [190, 210] | 0.072 | 0.067 | 0.050 | 0.027 | 0.035 | 0.034 | | Rand | | | | | | | | | | [10, 30] | 0.683 | 0.704 | 1.000 | 1.000 | 1.000 | 1.000 | | 1 | [90, 110] | 0.669 | 0.652 | 1.000 | 1.000 | 1.000 | 1.000 | | | [190, 210] | 0.707 | 0.673 | 1.000 | 1.000 | 1.000 | 1.000 | | | [10, 30] | 0.890 | 0.979 | 0.749 | 0.726 | 0.726 | 0.726 | | 2 | [90, 110] | 0.925 | 0.958 | 0.996 | 0.731 | 0.851 | 0.981 | | | [190, 210] | 0.885 | 0.948 | 1.000 | 0.931 | 0.984 | 1.000 | | | [10, 30] | 0.905 | 0.945 | 0.969 | 0.726 | 0.741 | 0.912 | | 3 | [90, 110] | 0.929 | 0.958 | 1.000 | 0.977 | 0.998 | 1.000 | | | [190, 210] | 0.899 | 0.966 | 0.998 | 0.997 | 0.998 | 0.998 | | | [10, 30] | 0.766 | 0.770 | 0.878 | 0.878 | 0.878 | 0.878 | | 4 | [90, 110] | 0.932 | 0.798 | 0.999 | 0.905 | 0.929 | 0.958 | | | [190, 210] | 0.965 | 0.901 | 0.998 | 0.970 | 0.984 | 0.998 | | | [10, 30] | 0.642 | 0.712 | 0982 | 0.878 | 0.887 | 0.920 | | 5 | [90, 110] | 0.977 | 0.843 | 0.993 | 0.970 | 0.983 | 0.991 | | | [190, 210] | 0.982 | 0.929 | 0.952 | 0.974 | 0.962 | 0.965 | Table 2: Summary of the overall fit to the data of each model, as measured by the DIC (and effective number of parameters p.d ) and LMPL. The top panel of the table relates to the Georgia colon cancer case study, while the bottom panel relates to the England circulatory data. | | Model | Model | Model | Model | |--------------|--------------------|--------------------|-------------------|--------------------| | Metric | Model-KH | Model-RLM | Model-1 | Model-2 | | Georgia data | | | | | | DIC ( p.d ) | 6917.9 (121.0) | 6964.5 (227.5) | 7702.4 (2.5) | 6968.5 (227.9) | | LMPL | -3340.2 | -3271.8 | -3848.5 | -3272.6 | | England data | | | | | | DIC ( p.d ) | 100,476.4 (1842.7) | 101,551.8 (4242.9) | 161,004.7 (123.0) | 100,817.5 (3560.5) | | LMPL | -48,528.7 | -47,146.6 | -80,334.7 | -47,261.2 | Figure 3: The maps in the top row display the estimated risks for 2001 from Model-KH (left panel (a)) and Model-2 (right panel (b)), while the bottom panel (panel (c)) displays boxplots of estimated risks from Model-2 for all years by PHD. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-6afca82d-df29-43fd-a8e1-21defbf48455.jpg) (c) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-552b1ae4-1c18-4599-aca9-c5affc5e6e8b.jpg) Figure 4: Maps showing the posterior median risk class for 2007 quarter 2 (top left) and 2011 quarter 4 (top right) from Model-2 , where light grey areas are in the baseline risk class while the black areas are in the elevated risk class. The Easting and Northing coordinates are in kilometres. The bottom panel displays the temporal trend in the mean of these three risk classes over time (again from Model 2 ), where the implementation of smoking ban is denoted by the vertical line. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1191v2-figure-21171ac6-6528-49ba-b3d6-b881df2ffa5c.jpg)
null
[ "Duncan Lee", "Andrew Lawson" ]
2014-08-06T06:18:48+00:00
2014-11-10T06:42:03+00:00
[ "stat.ME" ]
Cluster detection and risk estimation for spatio-temporal health data
In epidemiological disease mapping one aims to estimate the spatio-temporal pattern in disease risk and identify high-risk clusters, allowing health interventions to be appropriately targeted. Bayesian spatio-temporal models are used to estimate smoothed risk surfaces, but this is contrary to the aim of identifying groups of areal units that exhibit elevated risks compared with their neighbours. Therefore, in this paper we propose a new Bayesian hierarchical modelling approach for simultaneously estimating disease risk and identifying high-risk clusters in space and time. Inference for this model is based on Markov chain Monte Carlo simulation, using the freely available R package CARBayesST that has been developed in conjunction with this paper. Our methodology is motivated by two case studies, the first of which assesses if there is a relationship between Public health Districts and colon cancer clusters in Georgia, while the second looks at the impact of the smoking ban in public places in England on cardiovascular disease clusters.
1408.1192v1
## Magnetic braking of stellar cores in red giants and supergiants Andr´ e Maeder 1 and Georges Meynet 1 Geneva Observatory, Geneva University, CH-1290 Sauverny, Switzerland andre.maeder@unige, [email protected] ## ABSTRACT Magnetic configurations, stable on the long term, appear to exist in various evolutionary phases, from Main-Sequence stars to white dwarfs and neutron stars. The large scale ordered nature of these fields, often approximately dipolar, and their scaling according to the flux conservation scenario favor the model of a fossil field (Duez et al. 2010). We make some first estimates of the magnetic coupling between the stellar cores and the outer layers in red giants and supergiants. Analytical expressions of the truncation radius of the field coupling are established for a convective envelope and for a rotating radiative zone with horizontal turbulence. The timescales of the internal exchanges of angular momentum are considered. Numerical estimates are made on the basis of recent model grids. The direct magnetic coupling of the core to the extended convective envelope of red giants and supergiants appears unlikely. However, we find that the intermediate radiative zone is fully coupled to the core during the He-burning and later phases. This coupling is able to produce a strong spin down of the core of red giants and supergiants, also leading to relatively slowly rotating stellar remnants, like white dwarfs and pulsars. Some angular momentum is also transferred to the outer convective envelope of red giants and supergiants during the He-burning phase and later. Subject headings: stars: magnetic field, stars: red giants, stars: rotation, stars: pulsars, stars: white dwarf ## 1. Introduction The degenerate objects in the final stages of stellar evolution have strong magnetic fields. Conservation of the magnetic flux of Main Sequence stars with fields in the range of 10 G to 1 kG would lead to neutron stars with magnetic fields in the range of 10 11 to 10 13 G and to white dwarfs with fields in the range of 10 5 to 10 7 G (Chanmugam 1992). This is generally consistent with the field of classical pulsars of the order of 10 12 G. Recent results (Landstreet et al. 2012) indicate that about 10% of the white dwarfs (WD) are hosting magnetic fields in the range of 10 5 to 10 8 G. At present, it is not clear whether all WD have a magnetic field at a lower level. locking during the accretion phase in star formation (Hartmann 1998), by magnetic braking due to the stellar winds of solar type stars (Kawaler 1988) as well as of massive stars (Meynet et al. 2011), by influencing the distribution of internal rotation and mixing of the chemical elements (Maeder &amp; Meynet 2003; Heger et al. 2005), by their interaction with meridional circulation, turbulence and shears (Mathis &amp; Zahn 2005), by the viscous and magnetic coupling of the core and envelope (Spada et al. 2011), by producing the pulsar emission and spin-down, etc. The action of magnetic fields is not necessarily limited to the early and final evolutionary stages. The fields may be acting in various ways during star evolution, for example by disk The long-term stability of non-force-free magnetic topologies has been shown by Duez et al. (2010). According to these authors, this might help to understand some stable magnetic configurations existing in various evolutionary phases, from Main-Sequence stars to white dwarfs and neutron stars. Duez et al. point out that the large scale ordered nature of these fields, often approximately dipolar, and their scaling according to the flux conservation scenario favor a fossil field. Although pure poloidal or toroidal fields are unstable, an axisymmetric mixed configuration may provide a stable equilibrium topology (Tayler 1973; Markey &amp; Tayler 1973; Tayler 1980). The object of the present study is to study the effects of a dipolar magnetic field attached to stellar cores of relatively high density, as in the stellar stages from and further the He-burning phase. We examine whether a field with a scaling as a function of its host core density is able to exert some significant torque on the outer layers and to produce some coupling of the central region with the above radiative layers and parts of the extended convective envelope. Such a coupling may lead to an acceleration of the rotation of the outer layers and a braking of the central core. Among the consequences of this effect, the contrast of angular velocity between the core and envelope of the red giants and supergiants may become smaller, and the final remnants may have a slower rotation than predicted by current models which do not account for such effects. The inclusion of the above effect in models is particularly interesting and topical, since the evolutionary models leading to pulsars always rotate much too fast compared to the observed rotation rates of pulsars (Heger et al. 2004; Hirschi et al. 2005). This is even the case when the magnetic field of the Tayler-Spruit dynamo (Spruit 2002), which could act in rotating radiative regions, is accounted for: some internal coupling is introduced, but it is insufficient to slow down the pulsars into the range of the observed rotation rates. A similar problem appears for white dwarfs, which generally show rotation velocities much lower than predicted by standard models (Berger et al. 2005). The inclusion of the magnetic field which could result from the Tayler-Spruit dynamo within radiative regions improves the comparison, but not entirely since a difference of about one order of a magnitude remains for initial masses in the range of 1 to 3 M /circledot (Langer 2007; Suijs et al. 2008). Here, we must note that the existence of the Tayler-Spruit dynamo is still strongly debated. MHD simulations of instabilities in the radiative zone of a differentially rotating star by Zahn et al. (2007) well show the presence of the Pitts and Tayler instability (Pitts &amp; Tayler 1985), but find no sign of dynamo action. An analysis with a linear theory of the Tayler instability in the radiative zone of hot stars by R¨diger et al. (2012) also confirms u the absence of a dynamo action resulting from this instability. Recent asteroseismic observations also indicate similar trends about the too slow rotation of stellar cores in red giants compared to model predictions. The precise determinations from KEPLER of the rotational frequency splittings of mixed modes provide information on the internal rotation of red giants. Beck et al. (2012) showed that in the case of the red giant KIC 8366239 the core must rotate about 10 times faster than the surface. Deheuvels et al. (2012, 2014) analyzed the rotation profiles of six red giants and found that the cores rotate between about 3 to 20 times faster than the envelope. Moreover, they found that the rotation contrast between the core and envelope increases during the subgiant branch, indicating that the cores spin up with time, while the envelopes spin down. The observed differences of rotation between cores and envelopes are much smaller than predicted by evolutionary models of rotating stars. Analyses with stellar modeling by several groups (Eggenberger et al. 2012; Marques et al. 2013; Ceillier et al. 2013; Tayar &amp; Pinsonneault 2013) clearly demonstrate that some generally unaccounted physical process is at work producing an important internal viscosity. Thus, there is an ensemble of observations pointing in favor of some additional internal coupling in star evolution. In Sect. 2, we examine up to which level (the truncation radius) the magnetic field of central regions may produce some coupling of a convective envelope. On the basis of standard models of rotating stars, we do some numerical estimates. In Sect. 3, we do the same, but for the intermediate radiative layers subject to horizontal turbulence. In Sect. 4, we examine the timescale of the magnetic coupling and calculate the change of the rotation for the core and for the external layers. In each case, we make some numerical estimates. Sect. 5 gives the discussion and conclusions. ## 2. The extension of the magnetic braking in a rotating convective envelope We consider a rotating stellar core, partly degenerate, of a red giant or red supergiant in the stage of central He burning or in subsequent stages. We assume that a magnetic field of fossil origin is attached to this dense core and that it is extending in the external regions where dissipation occurs. At the surface of the core, the magnetic field has an intensity B c . The cases of a dipolar field is considered in this work. Indeed, a dipolar geometry is the preferred one for a magnetic field of fossil origin as demonstrated analytically by Duez &amp; Mathis (2010), who examined the possible magnetic equilibrium configurations of initial fossil fields. This conclusion is in agreement with numerical simulations performed by Braithwaite &amp; Spruit (2004). Here, we consider the intensity B c of the fossil field in the core as a free parameter of the models, although it is confined within certain limits according to the density scaling as discussed below. Numerical models will explore the consequences of various field intensities. This may allow us to estimate the range of field intensities necessary to reproduce the differences of angular velocities between the core and envelope of red giants, as obtained from asteroseismic observations. We are guided in our estimate of the field intensity by the rough scaling of the pulsar magnetic field of about 10 12 G for a density of about 10 14 6 . g cm -3 . Since the pulsar fields are consistent with the flux conservation of Main Sequence stars (Chanmugam 1992), we may hope that this hypothesis is somehow verified in the intermediate stages between Main Sequence and neutron stars. With flux conservation in the stellar mass during evolutionary stages, we would get for densities of 10 3 , 10 , 10 4 5 , and 10 6 g cm -3 magnetic fields of 2 · 10 , 9 4 · 10 , 4 4 10 , and 2 10 · 5 · 6 Grespectively. This is uncertain, but nevertheless indicates the kind of field intensities which could be expected in stellar cores. Thus, we have some guidelines about the range of possible fields in the core of red giants and supergiants, which may be further constrained by asteroseismic observations. In case the new field estimates would be very different, this might reveal other processes, such as efficient dynamos, at work for coupling the cores and envelopes. The field outside the core behaves like $$B ( r ) = B _ { c } \, \left ( \frac { R _ { c } } { r } \right ) ^ { n } \,. \quad \quad ( 1 )$$ As a result of the flux conservation, n = 3 for a dipolar field (Kawaler 1988; Hartmann 1998), (while n would be equal to 2 in a radial spherical case). We note that for low mass stars, a value intermediate between n = 2 and n = 3 corresponds to the Skumanich law for the longterm decrease of the rotational velocities of solar type stars with time (Skumanich 1972). For Ap stars, the observations suggest a variety of geometries, with a dominant large scale dipolar component and strong deviations of axisymmetry, with often some indications of multipolar components (Bagnulo 2001) and even strong small scale components (Silvester et al. 2011). A dipolar field is likely to be preferred on large scales, as mentioned in Sect.1. Thus, below we will consider the case n = 3 for the field extending in radiative shells outside the core and possibly through a part of the extended convective envelope of red giants or supergiants. For simplification, we assume full magnetic coupling up to a certain truncation radius r t in the convective envelope and no coupling outside this level. This is evidently a simplified way of treating the complex process of winding up the field lines and magnetic coupling in the limiting region. Such magnetic interactions between a radiative core and a convective envelope have been studied by several authors, particularly in the case of the solar spin-down. By assuming a time independent poloidal field, Charbonneau &amp; MacGregor (1993) identify essentially three different phases of the interactions: a rapid buildup of a toroidal field component in the radiative zone, then phase mixing (interaction of Alfv´n waves on neighbour field e lines) leading to the damping of the large scale toroidal oscillations and coupling of the rotation profile. The third stage is a quasi-stationary evolution with a toroidal field such that its stress, added to the viscous one, compensates for the torque at the solar surface, while the rotation rate becomes almost constant on the surfaces of constant poloidal field (Ferraro's state of isorotation). These three different phases of magnetic coupling between core and envelope were also well confirmed by the detailed analysis of Spada et al. (2011): -Linear buildup of toroidal field, -Torsional Alfv´n waves, -Quasi-stationary evolution, e where the first two phases may typically last for less than 1 Myr. They emphasize the need of a viscosity enhancement by a factor 10 4 with respect to molecular viscosity and also pointed out that the transport of angular momentum by the Tayler instability appears negligible. Numerical 3D-MHD simulations of the magnetic coupling between the solar core and envelope were also performed by Strugarek et al. (2011a,b) with the aim to examine whether the thinness of the solar tachocline may result from magnetic confinement (this is the transition region from the convective envelope where the rotation varies with latitude to the radiative core where the rotation is almost uniform). They found that the magnetic confinement fails to explain the thinness of the tachocline. Most interestingly, they demonstrated that the interior magnetic field does not stay confined in the radiative core, but expands into the convective zone. This leads to an efficient outward transport of angular momentum through the tachocline, imposing Ferraro's law of iso-rotation over some distance. However, subsequent numerical models by Acevedo-Arreguin et al. (2013) reconsider the magnetic confinement by a large scale meridional circulation associated to the convective envelope first proposed by Gough &amp; McIntyre (1998) and support the results of these authors. ## 2.1. Estimate of the truncation radius in a convective zone The dipolar magnetic field extends in the outer convective zone, which is subject to vertical motions and strong turbulence, which may interfere with the effects of the magnetic coupling. As, the velocity of the convective motions increases from the deep interior to reach sonic velocities in the very external regions with partial hydrogen ionization, the effects associated to convection increase outwards. There are several effects which may influence the penetration of the fossil field in the convective envelope and the extension of the magnetic coupling. The 2-D geometry of the axisymmetric field is important in the global description of the field as shown by Charbonneau &amp; MacGregor (1993), who also account for the interaction of the field components with differential rotation and of the damping of magnetic oscillations. Also, we may mention such effects, as the initial conditions, the Ohmic diffusion, the interaction of the field with the meridional circulations both in the radiative and convective regions, the interactions with rotational shears, convective motions and turbulence, an ensemble of effects which were often studied in relation with the problem of the thinness of the solar tachocline. In the present work, we assume that the truncation radius r t lies at the place where the energy density u B of the magnetic field B is equal to some factor f multiplying the energy density of the convective motions u conv . We introduce this factor f with values 0.1, 1.0 and 10 to account for the uncertainties associated to the multiple processes which may influence the magnetic coupling of a dipolar field to an external convective zone. The use of such a factor may also allow us to test the robustness of the conclusions we obtain about the coupling. Below r t , magnetic energy dominates and coupling is present, however the coupling is not instantaneous and in Sect. 4 we account for the timescale of the process. Above r t convection dominates and there is no magnetic coupling. One has $$u _ { B } ( r ) = \frac { B ^ { 2 } ( r ) } { 8 \pi } \quad \text{and} \ \ u _ { \text{conv} } = \frac { 1 } { 2 } \ \varrho \, v _ { \text{conv} } ^ { 2 } \. \ ( 2 )$$ The CGS system of units is used here with 1 Gauss= 1 g 1 / 2 cm -1 / 2 s -1 . For the convective velocity, one takes the usual expression appropriate to adiabatic interior stellar regions in the mixinglength theory $$v _ { \text{conv} } ^ { 2 } = g \, \delta ( \nabla - \nabla _ { \text{ad} } ) \, \frac { \ell ^ { 2 } } { 8 H _ { P } } \, \quad \ \ ( 3 )$$ where the usual notations of stellar structure have been used. The mixing-length is usually given by /lscript = αH P , where α ∼ = 1 6 for the Sun. The energy . density of the convective motions is $$u _ { \text{conv} } = \frac { 1 } { 1 6 } \alpha ^ { 2 } \, g \, \varrho \, \delta ( \nabla - \nabla _ { \text{ad} } ) \, H _ { P } \. \quad ( 4 )$$ Expressing the equality $$u _ { B } ( r _ { t } ) \, = \, f \, u _ { c o n v } ( r _ { t } ), \quad \quad ( 5 )$$ we get for the ratio of truncation radius to the core radius in the case of a dipolar field, $$\left ( \frac { r _ { t } } { R _ { c } } \right ) \, = \, \left ( \frac { 2 \, B _ { c } ^ { 2 } } { f \, \pi \alpha ^ { 2 } \, g \varrho \delta ( \nabla - \nabla _ { \text{ad} } ) H _ { P } } \right ) ^ { \frac { 1 } { 6 } } \,. \quad ( 6 ) \quad \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \ \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \quad \, \ \,$$ We notice the very weak dependence on the factor f and also see that the truncation radius in the convective envelope increases slowly with the magnetic field of the core; for lower densities and gravities, it extends further out. ## 2.2. Numerical estimates during the red supergiants Let us consider the case of a model of a 15 M /circledot star with solar metallicity Z = 0 014 and an ini-. tial rotation velocity equal to 40% of the critical value (Ekstr¨m et al. 2012). o We first examine the situation during the helium burning phase when the central helium mass fraction is Y c = 0 30 (age . = 14 467535 . · 10 6 yr.), with a central density of 1 26 . · 10 3 g cm -3 . The star with an actual mass of 12.991 M /circledot is in the stage of red supergiant with log( L/L /circledot ) = 4 868 and log . T eff = 3 566. . The core totally deprived of hydrogen ( X c &lt; 10 -10 ) extends up to M /M r = 0 328 with a radius of . r = 2 164 . · 10 10 cm, while the base of the convective envelope lies at M /M r = 0 687, . with r = 3 954 . · 10 12 cm, i.e. at a distance equal to 182.7 times the size of the core. At such a large distance, the dipolar field has so much decreased that it is not likely to exert some coupling of the convective envelope. Only an extreme dipolar core field, with a very unrealistic intensity of 10 11 G or more could build an efficient coupling of the convective envelope at this stage, while a field of about 2 2 . · 10 4 G would be expected according to the central density and the pulsar scaling. The same mass model at the end of the central C-burning stage at an age of 15 065866 . · 10 6 yr. with a central density of 4 37 . · 10 6 g cm -3 looks slightly less unfavorable. The core totally deprived of hydrogen extends further out up to M /M r = 0 4260 with a radius of . r = 2 357 . · 10 10 cm, while the base of the convective envelope goes deeper than during the He-burning phase down to M /M r = 0 469, with . r = 2 565 . · 10 11 cm, i.e. at a distance equal to only 10.88 times the size of the core. The estimate of the ratio ( r /R t c ) from (6) in the region at the base of the convective envelope indicates that, due to the fast decrease of the dipolar field, a field in the core of 2 5 . · 10 8 G (for f = 1) would be necessary to produce the coupling of the core up to the base of the convective envelope. For f -values of 0.1 or 10, the necessary core field would be 8 · 10 7 G and 8 · 10 8 G respectively. Now, adopting the rough scaling of pulsar fields mentioned in Sect. 2, we see that the central density would imply a magnetic field of 5 · 10 6 G. Thus, we see that, even if f is equal to 0.1, it seems very unlikely that a coupling of the regions at the base of the convective envelope is possible, and this by a relatively wide margin. We note that the envelope is extremely extended, the star radius is 886.2 R /circledot , which represents 2625 times the core radius. Near the stellar surface, the magnetic dipolar field would be as low as 8 4 . · 10 -4 G and totally unable to produce some coupling of the outer layers subject to nearly sonic velocities. We note that this value is very different from the value of a few Gauss found at the surface of red giants (Konstantinova-Antova et al. 2013). We take this as an indication that the fossil field does not permeate the huge convective envelope, in which the interaction of convective motions and rotation may produce some dynamo like in the solar case. The observed field may thus be a result of the stellar convective dynamo, rather than a signature of central fossil field. From these numerical estimates, we reach the following conclusion. Magnetic fields consistent with the pulsar field-density scaling (Sect. 2), in the core of stars in the He-burning or later evolutionary phases, appear unable to produce a magnetic coupling of the large convective envelopes present in red giants and supergiants. ## 3. The truncation radius in a rotating radiative zone We have seen above that in the stages of helium burning, there may be a large zone between the core and the outer convective envelope. The intermediate region may be totally or partly occupied by a radiative zone. Indeed, depending on mass loss, there may exist some small convective zones in this intermediate region. If so, within such convective zones, the appropriate expression (6) of the truncation radius also applies. In the intermediate radiative region, many physical variables are generally changing rapidly, such as the density, the composition and also the angular velocity Ω. The layers in differential rotation are subject to turbulence both vertical and horizontal. The horizontal turbulence is the largest, since it is not damped by the vertical density stratification (Zahn 1992). This turbulence is characterized by a diffusion coefficient D h , which is rather uncertain and various expressions have been proposed for it (Zahn 1992; Maeder 2003; Mathis et al. 2004). Moreover, the horizontal turbulence can be modified by the presence of the field. ## 3.1. Estimate of the truncation radius in a horizontal turbulent zone The velocity v h of the horizontal turbulence can be written $$v _ { \text{h} } = \frac { D _ { \text{h} } } { r } \,, \quad \quad \quad ( 7 )$$ since the turbulence is highly anisotropic there is no factor 1 / 3 here. The corresponding energy density u h is $$u _ { \text{h} } \, = \, \frac { 1 } { 2 } \, \varrho \, \frac { D _ { \text{h} } ^ { 2 } } { r ^ { 2 } } \,.$$ As in Sect. 2.1, we define the truncation by the location where the energy densities are equal, also considering an f factor equal to 0.1 or 10 in order to account the many uncertainties intervening in the coupling, $$u _ { B } ( r _ { t } ) \, = \, f \, u _ { \text{h} } ( r _ { t } ) \,. \, \text{ \quad \ \ } ( 9 )$$ With (1) and (2), this gives $$\frac { B _ { c } ^ { 2 } } { 4 \pi } \frac { R _ { c } ^ { 6 } } { r _ { t } ^ { 4 } } \, = \, f \, \varrho \, D _ { \text{h} } ^ { 2 } \,. \, \quad \quad ( 1 0 )$$ We obtain for the ratio of the truncation to the core radius, $$\left ( \frac { r _ { t } } { R _ { c } } \right ) \, = \, \left ( \frac { B _ { c } ^ { 2 } \, R _ { c } ^ { 2 } } { 4 \pi \, f \, \varrho \, D _ { \text{h} } ^ { 2 } } \right ) ^ { \frac { 1 } { 4 } } \,. \quad \ \ ( 1 1 )$$ Consistently, this ratio increases with the magnetic field and decreases with increasing turbulence. We see that the truncation is more sensitive to the field intensity in the case of horizontal turbulence than in the case of convective motions. We also notice that the truncation radius depends very weakly on the power -(1 / 2) of the coefficient of horizontal turbulence. The expression of the coefficent of horizontal turbulence D h currently used in Geneva models in that by Zahn (1992), $$D _ { \text{h} } \, = \, \frac { 1 } { c _ { \text{h} } } \, r \, | 2 \, V _ { 2 } - \alpha \, U _ { 2 } |$$ $$( 1 2 )$$ where V 2 and U 2 are respectively the amplitudes of the radial and horizontal components of the velocity of meridional circulation. The coefficient c h is normally ≤ 1, but is generally taken equal to 1, while α = (1 / 2)[ dln r ( 2 Ω) /dlnr ], which is equal to 1 in region of uniform rotation. Below, we mention the cases of the other diffusion coefficients of horizontal turbulence (Mathis et al. 2004; Maeder 2009). ## 3.2. Numerical estimates in radiative zones of red supergiants We first consider the same model as in Sect. 2.2 of a 15 M /circledot star at the stage of central He-burning with Y c = 0 30 in the red supergiant phase. . We recall that in this model the base of the convective envelope lies at a distance equal to 182.7 times the size of the convective core. The layers between the core and the convective envelope are fully radiative. (In some cases, there could be some intermediate convective zones, particularly in models with little or no mass loss, but in the present model the whole intermediate zone is radiative). The horizontal turbulence is D h = 8 11 . · 10 10 cm 2 s -1 and the density /rho1 = 3 85 . · 10 -6 near the top of the intermediate zone (at M /M r = 0 673, . this means at 1.4 % in mass fraction below the bottom of the outer convective zone). We make such a choice in order that the value of D h is not influenced by some edge effects. We find with these values and expression (11) that a dipolar field in the core equal to about 8 7 . · 10 2 G would be sufficient to fully couple the intermediate zone to the core. Such core fields are much lower than the one approximately suggested (2 2 . · 10 4 G) by the pulsar field scaling on the actual central core density (1 26 . · 10 3 g cm -3 ), as given at the beginning of Sect. 2. Thus, we conclude that the intermediate radiative zone is likely to be fully magnetically coupled to the core. This conclusion applies whatever the factor f , since we consider the top of the intermediate radiative zone. From the dependence of ( r /R t c ) on B c and D h in expression (11), we notice that the above conclusion on the coupling remains valid even if D h is larger by one order of magnitude than given here. However, this would not necessarily be the case if D h would be larger by several orders or magnitude and become close to values of diffusion more typical of convective zones. For the model of Sect. 2.2 at the end of the Cburning phase, the intermediate radiative zone extends up to 10.88 times the radius of the core. The coefficient of horizontal turbulence ( D h = 4 69 10 . · 8 cm 2 s -1 ) near the top of the radiative zone is much smaller than the coefficient of convective diffusion of the order of a few 10 16 cm 2 s -1 at the base of the convective zone. This means that the perturbations of the magnetic field by the horizontal turbulence in the radiative region are extremely small compared to the effects of the turbulence in the convective zone. We find that even a dipolar field of 1 G in the core would be sufficient to couple the radiative zone up to its top. We conclude the following: - -Radiative rotating stellar zones, subject to horizontal turbulence, are much more easily coupled to the core than convective regions. The reason is the much lower turbulent diffusion coefficient than the one characterizing convection. - - Even weak dipolar fields attached to the core are sufficient to couple an extended intermediate radiative zone up to the base of the convective envelope. This applies to the phase of He-burning and is even more likely in further evolutionary phases. However, the overall results also depend on the timescales of the process as shown in the next Section. ## 4. The exchange of angular momentum The magnetic coupling between the core and the external layers produces a slowing down of the core and a gain of angular momentum by the outer layers. The treatment of the problem is also depending whether these layers are radiative or convective. ## 4.1. The reduction of the angular momentum in the core Let us examine the reduction of the angular momentum J c of the core of mass M c , radius R c and angular velocity Ω c due to the coupling with the above layers up to truncation radius r t . Assuming that the spherical symmetry of the inner layers is not much modified by rotation, we write the angular momentum of the core, $$J _ { c } = \left ( \frac { 2 } { 3 } \right ) \Omega _ { c } \int _ { 0 } ^ { M _ { c } } r ^ { 2 } d M _ { r } \,. \quad \ \ ( 1 3 )$$ The core, whether convective or radiative, is supposed to rotate uniformly due to the internal magnetic coupling. The reduction of the angular momentum of the core due to the coupling of the layers from M c to M r ( t ) is $$\delta J _ { c } = - \left ( \frac { 2 } { 3 } \right ) \, \int _ { M _ { c } } ^ { M ( r _ { t } ) } r ^ { 2 } \left [ \Omega _ { c } - \Omega ( M _ { r } ) \right ] d M _ { r } \,. \, \left ( 1 4 \right )$$ since the core generally rotates faster than the envelope, as a result of core contraction. The rate ( dJ /dt c ) of the change of the angular momentum of the core provides the change of the angular velocity of the core. $$\frac { 1 } { \Omega _ { c } } \, \frac { d \Omega _ { c } } { d t } \, = \, \frac { 1 } { J _ { c } } \, \frac { d J _ { c } } { d t } \,. \quad \quad ( 1 5 )$$ Here, we must not account for the change of the momentum of inertia of the core over a time step, because the consequences of stellar expansion or contraction on the transport of angular momentum are already accounted for in the general equation describing the evolution of Ω( M r ), see for example expressions (10.121) and (10.122) in Maeder (2009). The frequency of a magnetic wave is the Alfv´n e frequency ω A , $$\omega _ { A } ( M _ { r } ) \, = \, \frac { B ( M _ { r } ) } { r \, ( 4 \pi \, \varrho ) ^ { 1 / 2 } } \,. \quad \quad ( 1 6 )$$ The characteristic timescale for the exchange of angular momentum between differentially rotating layers is the Alfv´n timescale e ω -1 A ( M r ), calculated with the poloidal component of the magnetic field (Mestel 1970). The rate of change of the angular momentum thus becomes $$\Gamma _ { 0 } \quad & \frac { d J _ { c } } { d t } = - \left ( \frac { 2 } { 3 } \right ) \, \int _ { M _ { c } } ^ { M ( r _ { t } ) } r ^ { 2 } \left [ \Omega _ { c } - \Omega ( M _ { r } ) \right ] \omega _ { A } ( M _ { r } ) \, d M _ { r } \,. \\ \Gamma _ { 0 } \quad & \Gamma _ { 0 } \, \text{each item to the one on non-nil} \, \text{with} \,.$$ At each time step, this expression permits (with the parameters of the considered time step) to calculate the change of the rotation of the regions within the radius R c . Some attention is to be paid to the definition of the core of mass M c . It is not necessarily the mass of the convective core at the considered evolutionary phase, since in some advanced nuclear phases central convection is even absent. We suggest to consider that the outer limit of the core with strong magnetic field is located in the region of the very steep density gradient, which separates the central region deprived of hydrogen from the envelope where hydrogen is present. The variation of the magnetic field with the density at the power 2/3 applies when the mass and the magnetic flux remains constant. After the end of core He-burning, the core mass has essentially reached its final value, but its radius can change, so that from this point onwards the dependence of the field on density is likely very well represented by the 2/3 exponent. Detailed numerical models will allows us to explore the domain of parameters. ## 4.2. Gain of angular momentum by the external layers Now, we have also to be concerned by the gains of angular momentum and changes of angular velocity of the magnetically coupled layers external to the core. Let us first examine the case of the radiative layers above the core. Each layer of mass thickness ∆ M r (the width of the mass steps in the models) between radius r 1 and r 2 ( r 2 &gt; r 1 ) has a certain momentum of inertia ∆ I ( M r ), at the time considered, $$\Delta I ( M _ { r } ) \, = \, \frac { 2 } { 5 } \, \frac { r _ { 2 } ^ { 5 } - r _ { 1 } ^ { 5 } } { r _ { 2 } ^ { 3 } - r _ { 1 } ^ { 3 } } \, \Delta M _ { r } \,. \quad ( 1 8 )$$ A mass shell is usually characterized by a mean value of the density and thus this assumption applies. The shell has a certain amount of angular momentum ∆ J M ( r ), $$\Delta J ( M _ { r } ) \, = \, \Delta I ( M _ { r } ) \, \Omega ( M _ { r } ) \,. \quad ( 1 9 )$$ The rate of increase of the angular momentum due to the magnetic torque on this shell per unit of time is, $$\frac { d [ \Delta J ( M _ { r } ) ] } { d t } = \Delta I ( M _ { r } ) \left [ \Omega _ { c } - \Omega ( M _ { r } ) \right ] \omega _ { A } ( M _ { r } ) \,. \quad & \colon \\ ( 2 0 ) \quad & \,,$$ Thus, the corresponding rate of change of the angular velocity Ω( M r ) is $$\frac { 1 } { \Omega ( M _ { r } ) } \, \frac { d \Omega ( M _ { r } ) } { d t } \, = \, \frac { 1 } { \Delta J ( M _ { r } ) } \, \frac { d [ \Delta J ( M _ { r } ) ] } { d t } \,. \, \ ( 2 1 )$$ Again, we have not to account for the change of the momentum of inertia for the same reasons as above. Expression (21) can be rewritten with the help of (20) and (19) at the level M r (which we now generally omit in the equations below), $$\frac { d \Omega } { d t } = \Omega \frac { 1 } { \Delta J } \Delta I \left [ \Omega _ { c } - \Omega \right ] \omega _ { A } = \left [ \Omega _ { c } - \Omega \right ] \omega _ { A } \. \ ( 2 2 )$$ This just means that for a shell of a given mass and momentum of inertia the change of Ω due to the magnetic torque is equal to the difference of angular velocity between the core and the considered layer multiplied by the ratio of the interval of time dt to (1 /ω A ), the characteristic time of the coupling. This differential equation is easily integrated, if we consider that ω A is constant, which is valid over a small interval of time ∆ . t The solution is $$[ \Omega _ { c } - \Omega ( \Delta t ) ] \, = \, [ \Omega _ { c } - \Omega ( \Delta t ) ] _ { 0 } \, e ^ { - ( \omega _ { A } \, \Delta t ) } \,, \ \ ( 2 3 )$$ at the mass level M r . It gives the Ω-difference after the time interval ∆ t as a function of the Ωdifference at the beginning of this time interval. Since ω A is not a constant, but a slowly varying function of time, the interval ∆ t must at each level be small with respect to (1 /ω A ). In case the timescale (1 /ω A ) at a certain level M r would be very small, i.e. negligible with respect to the evolutionary timescale, the solution is simply to assume Ω( M r ) = Ω , i.e. c that magnetic equilibrium is instantaneous. The effects of meridional circulation and shears, when present, have also to be included, as usual in models of rotating stars, for the calculation of the evolution of Ω( M r ). For a convective envelope, some further operations are needed. Such envelopes are often considered, to the first order, as having a solid body rotation, due to the very high viscosity associated to convective turbulence. In such case, one also has to estimate by (20) the rates of change ( d [∆ J M ( r )] /dt ) i of the angular momentum for all convective layers i = 1 to N up to the truncation radius. In this way, the various changes ∆[∆ J M ( r )] i over a time step ∆ t are obtained. Then, by summing up all the changes one gets the total change ∆ J conv of angular momentum of the convective envelope due to magnetic coupling during that interval of time, $$\Delta J _ { \text{conv} } = \sum _ { i = 1, N } \Delta [ \Delta J ( M _ { r } ) ] _ { i } \,. \quad ( 2 4 )$$ Now, the change ∆Ω conv of angular velocity Ω conv of the convective envelope over the time interval ∆ is obtained by t $$\frac { \Delta \Omega _ { \text{conv} } } { \Omega _ { \text{conv} } } \, = \, \frac { \Delta J _ { \text{conv} } } { J _ { \text{conv} } } \,. \quad \quad ( 2 5 )$$ The usual treatment of convective envelopes in our models conserves the angular momentum of the convective envelope with a proper account of the change of the momentum of inertia. Thus, Eq. (25) represents only the change of angular velocity due to the magnetic torque. There the angular momentum J conv is given by $$J _ { \text{conv} } = \left ( \frac { 2 } { 3 } \right ) \, \Omega _ { \text{conv} } \, \int _ { M _ { \text{base} } } ^ { M _ { \text{top} } } r ^ { 2 } \, d M _ { r } \,, \quad ( 2 6 )$$ where the integration is performed from the base to the top of the convective envelope. In red giants and supergiants, the top of this envelope is the total stellar radius. ## 4.3. Numerical estimates of the timescale of the coupling during the helium burning phase The timescale of the magnetic coupling is a major characteristic of the process determining the kind of distribution of Ω in the stars at the various phases. Let us first consider the same model of a 15 M /circledot in the stage of central helium burning with Y c = 0 30 as in Sect. . 2.2 and 3.2. We have seen that at this stage the magnetic coupling is possible for the intermediate zone, while it seems unlikely for the outer convective envelope. At the edge of the core deprived of hydrogen ( Mr/M = 0 328), . the Alfv´n frequency for a typical field in the core e of 2 2 . · 10 4 G as given by the pulsar scaling is ω A = 4 96 . · 10 -8 s -1 . This corresponds to a timescale of 0.64 yr. Thus, in view of the long timescale of the He-burning phase (1 49 . · 10 6 yr), we conclude that the coupling is extremely fast at the edge of the core. Now, we examine the timescales near the outer edge of the intermediate zone, at M /M r = 0 673 . like in Sect. 3.2. There, for the same typical intensity of the dipolar field in the core of 2 2 . · 10 4 G, we have ω A = 4 07 . · 10 -13 s -1 , corresponding to an Alfv´ en timescale of 7 8 . · 10 4 yr. This timescale is longer than the one at the edge of the core. This value is shorter than the timescale of 1 49 . · 10 6 yr of the He-burning phase of a rotating star of 15 M /circledot . Thus, for fields in the range of 10 3 to 10 5 G, compatible with the pulsar scaling (Sect. 2), the timescale for the magnetic coupling of the dipolar field is short enough that we may expect full coupling up to the truncation radius. We recall that this radius is unlikely to be in the outer convective envelope, but the intermediate radiative zone is likely fully coupled. Globally, we can say that the red giants and supergiants in the He-burning phase will experience no direct magnetic coupling between the core and the outer convective envelope, but the intermediate radiative zone between the core and the envelope will be magnetically coupled to the core. This intermediate radiative zone at the stage Y c = 0 30 . contains a fraction of the stellar mass comparable to that of the core deprived of hydrogen, while the momentum of inertia of the intermediate zone is at least one order of magnitude larger than that of the core. Thus, one may expect a strong braking of the core rotation during the He-burning phase. Through the other transport mechanisms, like shear, meridional circulation and convection, some transport of angular momentum to the outer convective envelope may also result. ## 4.4. The timescale at the end of the phase of central C-burning We now examine the timescale at the edge of the core deprived of hydrogen ( M /M r = 0 426). . We consider a field of 5 · 10 6 G at the surface of the core, consistent with the pulsar scaling. The Alfv´ en frequency is 1 90 . · 10 -5 s -1 , which corresponds to a timescale of 14.6 h. The coupling is thus instantaneous at the edge of the core. We have seen that the intermediate zone may experience the magnetic torque, but not the convective envelope. Thus, we consider the situation near the top of the intermediate radiative zone as before. The same dipolar field of 5 · 10 6 G at the surface of the core leads here to a field 4 41 . · 10 3 G. The corresponding Alfv´ en frequencies are 2 97 . · 10 -7 s -1 , which corresponds to a timescale of 0.11 yr. Thus, the coupling of the core with the entire intermediate radiative zone is very fast in the C-burning phase and full coupling up to the truncation radius is expected. ## 5. Conclusions These are first estimates of the possible magnetic coupling between dense stellar cores and external layers based on a simple modelling. Despite this fact, the first estimates of the order of magnitude of the main intervening effects support some clear conclusions: - - The direct magnetic coupling of the convective envelopes with the stellar cores is very unlikely throughout the advanced evolution. - -However, the magnetic coupling between the core and the intermediate radiative zone appears very effective during the He-burning phase in red supergiants and even more in later phases. - - This coupling of the core and intermediate radiative zone is able to produce a strong spin down of the core of red giants and supergiants, leading also to relatively slowly rotating stellar remnants, like white dwarfs and pulsars. - -The slowly rotating envelopes of supergiants will receive some additional angular momentum from the He-burning phase and later, for two reasons. First, because the other processes of angular momentum transport, like shear and circulation, transmit anyway some angular momentum between the radiative and convective envelope and secondly because as evolution proceeds the convective envelope gets much deeper and encompasses layers which have been spun up previously. As mentioned in the introduction, magnetic braking may intervene at all stages of stellar evolution. The properties of the magnetic field needs to be further studied by detailed numerical simulations through the various evolutionary stages. The first results presented here, which seem rather robust in view of the orders of magnitude obtained, are encouraging for future study concerning the magnetic coupling between stellar cores and the adjacent radiative layers. Acknowledgments: We express our best thanks to Dr. S. Mathis for his many very appropriate and helpful remarks. ## REFERENCES Acevedo-Arreguin, L.A., Garaud, P. &amp; Wood, T.S. 2013, MNRAS, 434, 720 Bagnulo, S. 2001, in Astronomical Society of the Pacific Conference Series, Vol. 248, Magnetic Fields Across the Hertzsprung-Russell Diagram, ed. G. Mathys, S. K. Solanki, &amp; D. T. Wickramasinghe, 287 Beck, P. G., Montalban, J., Kallinger, T., et al. 2012, Nature, 481, 55 Berger, L., Koester, D., Napiwotzki, R., Reid, I. N., &amp; Zuckerman, B. 2005, A&amp;A, 444, 565 Braithwaite, J. &amp; Spruit, H.C. 2004, Nature, 431, 819 Ceillier, T., Eggenberger, P., Garcia, R.A. &amp; Mathis, S., 2013, A&amp;A, 555, 54 Chanmugam, G. 1992, ARA&amp;A, 30, 143 Charbonneau, P. &amp; MacGregor, K.B. 1993, ApJ, 417,762 Deheuvels, S.,Garcia, R.A., Chaplin, W.G., Basu, S., Antia, H.M. et al., 2012, ApJ, 756, 19 Deheuvels, S.,Dogan, G., Goupil, M.J., Appourchaux, T., Benomar, O. et al., 2014, A&amp;A, 564, 27 Duez, V. &amp; Mathis, S. 2010, A&amp;A, 517, 58 Duez, V., Braithwaite, J., &amp; Mathis, S. 2010, ApJ, 724, L34 Eggenberger, P., Montalb´ an, J., &amp; Miglio, A. 2012, A&amp;A, 544, L4 Ekstr¨m, S., Georgy, C., Eggenberger, P., et al. o 2012, A&amp;A, 537, A146 Gough, D. &amp; McIntyre, M.E. 1998, Nature, 394, 755 Hartmann, L. 1998, Accretion Processes in Star Formation, ed. Cambridge University Press Heger, A., Woosley, S. E., Langer, N., &amp; Spruit, H. C. 2004, in IAU Symposium, Vol. 215, Stellar Rotation, ed. A. Maeder &amp; P. Eenens, 591 Heger, A., Woosley, S. E., &amp; Spruit, H. C. 2005, ApJ, 626, 350 Hirschi, R., Meynet, G., &amp; Maeder, A. 2005, A&amp;A, 443, 581 Kawaler, S. D. 1988, ApJ, 333, 236 Konstantinova-Antova, R., Auri`re, M., Charbone nel, C., Drake, N., Wade, G. &amp; et al., A. 2013, arXiv: 1311.0482 Landstreet, J. D., Bagnulo, S., Valyavin, G. G., et al. 2012, A&amp;A, 545, A30 Langer, N. 2007, in Astronomical Society of the Pacific Conference Series, Vol. 372, 15th European Workshop on White Dwarfs, ed. R. Napiwotzki &amp; M. R. Burleigh, 3 Maeder, A. 2003, A&amp;A, 399, 263 Maeder, A. 2009, Physics, Formation and Evolution of Rotating Stars, ed. Springer Berlin Heidelberg. Maeder, A. &amp; Meynet, G. 2003, A&amp;A, 411, 543 Markey, P., &amp; Tayler, R. J. 1973, MNRAS, 163, 77 Marques, J.P.,Goupil, M.J., Lebreton, Y., Talon, S., Palacios, A. et al., 2013, A&amp;A, 549, A74 Mathis, S., Palacios, A. &amp; Zahn, J.-P. 2004, A&amp;A, 425, 243 Mathis, S. &amp; Zahn, J.-P. 2005, A&amp;A, 440, 653 Mestel, L. 1970, M´ emoires of the Soci´t´ Royale e e des Sciences de Li`ge, 19, 167 e Meynet, G., Eggenberger, P., &amp; Maeder, A. 2011, A&amp;A, 525, L11 Pitts, E., Tayler, R.J. 1985, MNRAS, 216, 139 R¨ udiger, G., Kitchatinov, L.L., &amp; Elstner, D. 2012, MNRAS, 425, 2267 Silvester, J., Wade, G., Kochukhov, O., Landstreet, J., &amp; Bagnulo, S. 2011, in Astronomical Society of the Pacific Conference Series, Vol. 449, Astronomical Society of the Pacific Conference Series, ed. P. Bastien, N. Manset, D. P. Clemens, &amp; N. St-Louis, 280 Skumanich, A. 1972, ApJ, 171, 565 Spada, F., Lanzafame, A. C., Lanza, A. F., Messina, S., &amp; Collier Cameron, A. 2011, MNRAS, 416, 447 Spruit, H. C. 2002, A&amp;A, 381, 923 Strugarek, A., Brun, A. S., &amp; Zahn, J.P. 2011a, Astron. Nachricht., 332, 881 Strugarek, A., Brun, A. S., &amp; Zahn, J.P. 2011b, A&amp;A, 532, 34 Suijs, M. P. L., Langer, N., Poelarends, A.-J., et al. 2008, A&amp;A, 481, L87 Tayar, J. &amp; Pinsonneault, M.H. 2013, ApJ, 775, L1 Tayler, R. J. 1973, MNRAS, 161, 365 Tayler, R. J. 1980, MNRAS, 191, 151 Zahn, J.-P. 1992, A&amp;A, 265, 115 Zahn, J.-P.,Brun, S.,Mathis, S. 2007, A&amp;A, 474, 145 This 2-column preprint was prepared with the AAS L T E X A macros v5.2.
10.1088/0004-637X/793/2/123
[ "Andre Maeder", "Georges Meynet" ]
2014-08-06T06:30:12+00:00
2014-08-06T06:30:12+00:00
[ "astro-ph.SR" ]
Magnetic braking of stellar cores in red giants and supergiants
Magnetic configurations, stable on the long term, appear to exist in various evolutionary phases, from Main-Sequence stars to white dwarfs and neutron stars. The large scale ordered nature of these fields, often approximately dipolar, and their scaling according to the flux conservation scenario favor the model of a fossil field (Duez et al. 2010). We make some first estimates of the magnetic coupling between the stellar cores and the outer layers in red giants and supergiants. Analytical expressions of the truncation radius of the field coupling are established for a convective envelope and for a rotating radiative zone with horizontal turbulence. The timescales of the internal exchanges of angular momentum are considered. Numerical estimates are made on the basis of recent model grids. The direct magnetic coupling of the core to the extended convective envelope of red giants and supergiants appears unlikely. However, we find that the intermediate radiative zone is fully coupled to the core during the He-burning and later phases. This coupling is able to produce a strong spin down of the core of red giants and supergiants, also leading to relatively slowly rotating stellar remnants, like white dwarfs and pulsars. Some angular momentum is also transferred to the outer convective envelope of red giants and supergiants during the He-burning phase and later.
1408.1193v3
## Possible new resonance from W W L L -hh interchannel coupling F´ ısica Rafael L. Delgado, Antonio Dobado and Felipe J. Llanes-Estrada Te´ orica I, Univ. Complutense, Parque de las Ciencias 1, 28040 Madrid, Spain. We propose and theoretically study a possible new resonance caused by strong coupling between the Higgs-Higgs and the W W L L ( Z Z L L ) scattering channels, without regard to the intensity of the elastic interaction in either channel at low energy (that could be weak as in the Standard Model). We expose this channel-coupling resonance from unitarity and dispersion relations encoded in the Inverse Amplitude Method, applied to the Electroweak Chiral Lagrangian with a scalar Higgs. The LHC experiments CMS and ATLAS [1] have seemingly found what looks like a Higgs boson (mainly an excess of four-lepton events and two-photon events at 125 GeV suggestive of scalar quantum numbers). This finding has been widely discussed, but less recognized is the equally interesting fact that no new physics beyond the Standard Model (SM) appears up to energies of 600-700 GeV for generic searches [2], as shown in Fig. 1. Therefore the unknown system giving rise to the electroweak symmetry breaking (the Symmetry Breaking Sector (SBS)) from SU (2) L × U (1) Y to U (1) em should contain four low-mass states: the three wouldbe Goldstone bosons ω a ( a = 1 2 3) responsible for the , , W ± and Z masses and the recently discovered particle h . Because this Higgs-like boson turns out to be light and the spectrum is gapped up to the scale of any new physics, it is natural to think of it also as an approximate (composite) Goldstone boson (GB) itself [3]. For instance, as one of GB corresponding to the spontaneous symmetry breaking from a group G to a group H with dim( G ) -dim( H ) = 4. This is for example the case of the so-called MCHM (Minimal Composite Higgs Model [4], with G = SO (5) and H = SO (4)). Another exciting possibility is that the Higgs is the dilaton [5] (the Goldstone boson associated with spontaneous breaking of the scale symmetry of the SBS). Assuming the approximate, well established SU (2) L + R custodial symmetry, the low-energy GB dynamics can be properly described by a SU (2) L × U (1) Y gauged non-linear effective Lagrangian [6, 7], which is an extension of the former Higgsless Electroweak Chiral Lagrangian [8]. Thus the three ω a GB fields parametrize the coset SU (2) L × SU (2) R /SU (2) L + R and the Higgslike boson h is a custodial isospin singlet. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-f7083f4d-f1d5-4347-a45f-a8e8a560605b.jpg) ∣⌊∥/∖()⌊([)[]⌊⌊⌊∥⌋⌈(⌉⌊([)[ Figure 1: Electroweak-symmetry breaking sector of the Standard Model after the LHC run I: there are four 'low-energy' bosons and any new physics is split by a mass gap. In this work we are concerned with the W W L L , Z Z L L and hh scattering. This is because thanks to the Equivalence Theorem [9], we can get information about the unknown SBS of the SM by studing the GB dynamics, whose amplitudes approximate well those of the longitudinal vector bosons W L and Z L ( W L for short in the following) of the SM for energies well above the W mass ( E glyph[greatermuch] M W ). In this regime we can also neglect the h boson mass since M h = 125 GeV ∼ M W . Then the relevant Lagrangian for W W L L and hh scattering is [10]: $$^ { \prime } \quad \underset { \omega \arg \max \min \, \colon \, } { \longmapsto } \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psigma \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psu \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \PsPsi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \Psi \, \quad \cdot \quad \mathcal { L } \, & = \, \left ( 1 + 2 a \frac { h } { v } + b \frac { h } { v ^ { 2 } } \left ( \partial _ { \mu } \omega ^ { a } \partial _ { \nu } \omega ^ { a } \right ) ^ { 2 } + \frac { 4 a _ { 5 } } { v ^ { 4 } } \left ( \partial _ { \mu } \omega ^ { a } \partial ^ { \mu } \omega ^ { a } \right ) ^ { 2 } \\ \quad \cdot \quad \cdot \quad \frac { 1 } { 2 } \partial _ { \mu } h \partial ^ { \mu } h + \frac { g } { v ^ { 4 } } ( \partial _ { \mu } h \partial ^ { \mu } h ) ^ { 2 } \quad \left ( 1 \right ) \\ \quad \cdot \quad \quad \text{which should be valid for } M _ { W }. \, M _ { h } \ll E \ll 4 \pi v \simeq 3 \, \text{TeV}.$$ which should be valid for M ,M W h glyph[lessmuch] E glyph[lessmuch] 4 πv glyph[similarequal] 3 TeV. Thus we have set M h = M W = M Z glyph[similarequal] 0. Different SBS dynamics can be modeled by a proper tuning of the parameters a , b , a 4 , a 5 , d , e and g . The last five of them must be renormalized to some scale µ to absorb the oneloop divergencies coming from the lowest order (LO), i.e. the first term in the Lagrangian, in a similar way as in Chiral Perturbation Theory [11]. In the SM a 2 = b = 1 and the rest of the tree level parameters vanish ( a 4 = a 5 = d = e = g = 0). As is well known in this particular case we get a linear theory which is renormalizable in the standard way and weakly interacting for light h . From the Lagrangian density in Eq. (1), the LO partial waves with I = J = 0 ( I being the custodial isospin) can be easily computed and one finds: $$\cdots \, \lambda \cdots \, \lambda \cdots \, \lambda \cdots \, \cdots \\ A _ { 0 } ( \omega \omega \to \omega \omega ) \ & = \ \frac { s } { 1 6 \pi v ^ { 2 } } ( 1 - a ^ { 2 } ) \quad \quad ( 2 ) \\ T _ { 0 } ( h h \to h h ) \ & = \ 0 \\ M _ { 0 } ( \omega \omega \to h h ) \ & = \ \frac { \sqrt { 3 } s } { 3 2 \pi v ^ { 2 } } ( a ^ { 2 } - b ) \. \\ \cdots \quad \cdots \quad \cdots$$ glyph[negationslash] glyph[negationslash] From these low-energy theorems we can expect strong W W L L elastic scattering whenever a 2 = 1 (as Eq. (2) grows with s = E 2 cm ). For b = a 2 we have strong mixing between the W W L L and hh channels [12, 13] even in the Figure 2: Typical Feynman diagram mixing the ωω (wiggled lines) and the Higgs-Higgs (dashed lines) channels. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-f1c81016-dd60-4ff1-b9cc-0218c695cc18.jpg) case a = 1 (no LO contribution to W W L L elastic scattering). As we will show bellow, this strong mixing gives rise to a new resonance in the I = J = 0 channel for an important region of the available ( a, b ) parameter space after taking into account the experimental information coming from the LHC. At next to leading order (NLO) all three amplitudes in Eq. (2) acquire one-loop contributions of order O s ( 2 ). The elastic ones A 1 and T 1 are accompanied by logarithmic left and right cuts (LC and RC respectively) in the s -plane, entailing an imaginary part for physical energy corresponding to s just above the RC. Those amplitudes have already been reported in recent literature [10, 14]. The divergences appearing for massless W and h can be absorbed by renormalization of the a 4 , a 5 , d , e and g parameters but no a or b renormalization is needed in this case. glyph[negationslash] In this work we want to focus on the very interesting phenomenon of the strong mixing appearing whenever a 2 = . In order to emphasize this point we will concenb trate first in the particular case where a = 1 (no direct W W L L LO elastic scattering) and the rest of the parameters except b vanish [15]. As the renormalized parameters depend on the renormalization scale µ , that particularly simple choice requires to set this scale to some given value that now plays the role of an ultraviolet cutoff. For definiteness we will take µ = 4 πv glyph[similarequal] 3 TeV which is roughly the limit of applicability of our effective theory. The relevant NLO I = J = 0 partial waves read [10]: $$\text{evant NLO} \, I = J = 0 \text{ partial waves read } [ 1 0 ] \colon & \quad \text{the n} \\ A _ { 1 } ( \omega \omega \to \omega \omega ) = \frac { s ^ { 2 } ( 1 - b ) ^ { 2 } } { 2 5 6 \pi ^ { 3 } v ^ { 4 } } \times \, \quad ( 3 ) \, \quad \text{mesor} \\ \left [ \frac { 1 7 } { 9 } - \frac { 1 } { 6 } \log \left ( \frac { s } { \mu ^ { 2 } } \right ) - \frac { 3 } { 4 } \log \left ( \frac { - s } { \mu ^ { 2 } } \right ) \right ] \, & \quad \text{were} \, \colon \\ T _ { 1 } ( h h \to h h ) = \frac { s ^ { 2 } ( 1 - b ) ^ { 2 } } { 3 2 \pi ^ { 3 } v ^ { 4 } } \times \, \quad ( 4 ) \, \quad \text{the p} \\ \left [ \frac { 1 } { 3 } - \frac { 1 } { 1 6 } \log \left ( \frac { s } { \mu ^ { 2 } } \right ) - \frac { 3 } { 3 2 } \log \left ( \frac { - s } { \mu ^ { 2 } } \right ) \right ] \, & \quad \text{FAl} \\ M _ { 1 } ( \omega \omega \to h h ) = \frac { \sqrt { 3 } s ^ { 2 } ( 1 - b ) ^ { 2 } } { 9 2 1 6 \pi ^ { 3 } v ^ { 4 } } \left [ \frac { 1 } { 2 } - \log \left ( \frac { s } { \mu ^ { 2 } } \right ) \right ] \,. \, \ ( 5 ) \quad \text{whose at O} ( F I A } \\ \text{These partial waves have adequate analytical runner-} \quad \text{imag}$$ These partial waves have adequate analytical properties featuring a LC and also a RC just under the physical region s = E 2 cm + iglyph[epsilon1] . However, unitarity is satisfied only perturbatively, with Im A 1 = Im T 1 = | M 0 | 2 on the RC. Notice also that the cross-channel amplitude M 1 has only a LC and is thus purely real (Im( M 0 + M 1 ) = 0) on the RC. As the amplitudes grow with s they will eventually violate the unitarity bound (for example Im A ≤ 1). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-39c33c47-6439-4075-a016-347e2e176a1b.jpg) Figure 3: Left graph: elastic | A IAM 2 | . Right graph: crosschannel | M IAM 2 | . Various values of b shown are b = 1 1 . (lowest, solid black line), b = 1 5 (dot-dashed, . red online), b = 2 (dashed, green online) and b = 3 (dotted, blue online). The inelastic amplitude M IAM shows the resonance with most clarity: it becomes narrower and less massive for larger b . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-eb007865-e760-4f08-9440-129492d6e384.jpg) Grouping the two coupled channels in matrix form, $$F \ & = \ F _ { 0 } + F _ { 1 } + \dots \\ & = \ \left ( \begin{smallmatrix} 0 & M _ { 0 } \\ M _ { 0 } & 0 \end{smallmatrix} \right ) \ + \left ( \begin{smallmatrix} A _ { 1 } & M _ { 1 } \\ M _ { 1 } & T _ { 1 } \end{smallmatrix} \right ) + \dots$$ the perturbative unitarity relation satisfied is Im F 1 = F F † 0 0 ; but exact unitarity requires Im F = F F † instead. However there is a very well known method, based on dispersion relations, called the Inverse Amplitude Method (IAM) [16], that allows to fully unitarize the perturbative partial waves, even in the coupled channel case [17]. The resulting amplitudes are given by F IAM := F 0 ( F 0 -F 1 ) -1 F 0 . The IAM amplitudes still have the analytical properties found above but now they fulfill exact unitarity. In addition, the determinant of F 0 -F 1 appearing in the denominators allows for the possibility of having poles in the second Riemann sheet for some regions of the parameter space. When they are close enough to the physical region, those poles have the natural interpretation of dynamical resonances. The IAM amplitudes have been extensively used to fit mesonmeson scattering data [18]. The method has also been applied to W W L L elastic scattering [19] where resonances were found in different channels in terms of the a 4 and a 5 parameters. In this work we are rather interested in the pure coupled channel resonances appearing even for a = 1. The IAM amplitudes are given in this case by: $$F ^ { 1 \text{AM} } = \frac { M _ { 0 } ^ { 2 } } { ( M _ { 0 } - M _ { 1 } ) ^ { 2 } - A _ { 1 } T _ { 1 } } \binom { A _ { 1 } } { M _ { 0 } - M _ { 1 } } T _ { 1 } \, \left ( 7 \right )$$ whose perturbative expansion coincides with Eq. (6) at O s ( 2 ) but that satisfies exact unitarity, Im F IAM = ( F IAM ) † F IAM as is easily checked. The IAM resums the imaginary parts of diagrams like that in Fig. 2 In Fig. 3 we show the square moduli of two distinct matrix elements of F IAM ( A IAM and M IAM ). For b nearly 1 the amplitude vanishes in the LHC region of interest (with W W L L → W W L L reducing to the small SM amplitude). For larger b there is a resonant structure most clearly seen in the inelastic process ωω → hh , but that leaves a trace also in the elastic amplitudes that grow Figure 4: Imaginary part of the unitarized partial waves in the second Riemann sheet in terms of the Mandelstam variable s for b = 2. Top: the elastic amplitude A IAM . Bottom: the inelastic amplitude M IAM . These amplitudes are different but still they show a pole at the same point of the second Riemann sheet that could be understood as a new resonance. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-589445f0-a544-4053-99fd-80e344f58c04.jpg) almost vertically for large b and even peak slightly up to the resonance mass, growing more calmly afterwards. In order to explore in more detail the peaks in Fig. 3, we have analytically extended the complex log( -s/µ 2 ) of Eqs.(3) to (5) to the second Riemann sheet, and indeed we found a pole (see Fig. 4) at the same point in all the channels. This pole is naturally interpreted as a dynamical resonance whenever it is close enough to the physical, real s . Then the position of the pole s 0 is related to the parameters of the resonance (mass M and width Γ) as s 0 = M 2 -i Γ M which for small Γ /M means √ s 0 glyph[similarequal] M -i Γ 2. We follow these variables with / b in the complex s plane, numerically finding the zeroes of the denominator of Eq. (7) in the second Riemann sheet (that denominator is an even function of b -1, so there is an approximate symmetry between b &gt; 1 and b &lt; 1). The pole escapes to infinity as b approaches 1, then returns along nearly the same trajectory as b increases beyond 1. Currently there is no constraint on the b parameter but, if a is set to its SM value of 1, and in the absence of NLO couplings, we can provide the bound b ∈ -( 1 3) , (around the SM b = 1) because otherwise the resonance moves below 700 GeV where it would have already been seen by ATLAS and CMS. These exclusion limits on b are of course uncertain by M /E W glyph[similarequal] 15% from our using the Equivalence Theorem ( ω a glyph[similarequal] W a L ) and, consistently, the massless Higgs approximation M h glyph[lessmuch] E . Another potential source of uncertainty is the IAM uni- Figure 5: Three unitarisation methods closely agree on the existence of a coupled-channel resonance (we show Im A = | A | 2 + | M | 2 for a → 1, b = 3). The I = J = 0 IAM mass (0 95 TeV) is within 2% of the Improved-K and within 10% . of the N/D methods. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-47af2fdf-4ca6-447d-8f56-b4592313a020.jpg) Figure 6: Dependence of resonant mass and width on b , with a 2 = 1 fixed (lower curve) and for a = √ 1 -ξ , b = 1 -2 ξ with ξ = v /f 2 2 as in the MCHM (upper curve, blue online). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-d90e8497-57bf-454c-92fa-1ca52c7d1b19.jpg) tarization employed. In the accompanying article we also address the N/D method and the Improved-K matrix. Because the scalar resonance follows from unitarity and analiticity (causality) in the presence of strong channel coupling, all three methods (that encode those properties and agree with perturbation theory at low energy) find it at a very similar position (see Fig. 5). glyph[negationslash] Once we have identified the new coupled-channel resonance by switching off the LO elastic W W L L channel by setting a = 1, we can consider now the more general case of arbitrary a . From the LHC data we know this parameter must belong to the 2 σ interval (0 88 . , 1 15) (ATLAS) . and (0 96 1 34) (CMS) [20], . , . while b is much more unconstrained. As commented in page 1, the simplest composite model where the three ω a and h show up as composite (pseudo) GB is the so called MCHM featuring the symmetry breaking pattern SO (5) to SO (4) [4]. In this model the a and b parameters are given by a = √ 1 -ξ and b = 1 -2 , ξ where ξ = v /f 2 2 and f is a new symmetry-breaking, higher scale. The relevant IAM partial waves in the general case a = 1 may be retrieved from [10, 21]. In Fig. 6 we show the mass and width in terms of ξ for the MCHM model. Our new resonance appears for an important range of the allowed ξ parameter range (0 &lt; ξ &lt; 0 5). . Even for the region where Figure 7: Parameter a -b plane showing whether the resonance mass is beyond the 3 TeV reach of our approach (white), below 700 GeV and disfavored by LHC data (black) or between those two values, where we can trust theory and data still allows (striped). The SM value a = b = 1 is also marked. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1193v3-figure-78d6e460-9584-4d2d-9beb-f0263e5e8500.jpg) glyph[negationslash] the pole is too far away from the real axis to be considered a resonance, it will produce a huge increment of the cross section for W W L L and hh production that could be probed at the LHC. This conclusion probably applies to other composite models beyond the MCHM too. The figure also shows the pure coupled-channel case a = 1 = b 2 described in page 3. For finite a -1 the resonance receives strength from both elastic and coupled-channel scattering, but we have shown [13, 21] that the σ -like structure from elastic dynamics alone is much broader; for finite b -a 2 the resonance, as shown in figure 6, is significantly narrower and lighter due to the coupled-channel dynamics. Figure 7 shows the a -b parameter plane shading in light gray the region where the resonance in the 2 nd Riemann sheet is between 700 GeV and 3 TeV. To conclude, we made the case for an interesting potential phenomenon to be sought at the LHC run II and beyond; a new resonance in the W W L L -hh coupled channels, caused by the channel-mixing interaction even when direct elastic interactions in both channels are weak [22]. We do not have a strong reason to predict this resonance, rather observe that it features in the largest part of parameter space of the effective Lagrangian with the known particle content, that supports strong channel coupling. The alternative, weakly coupled resonances that do not saturate unitarity, implies parameters fine-tuned to be very close to a = b = 1, those of the Standard Model (that also remains a viable theory with current data). We thank J.R. Pel´ez for discussion. a ADG and RLD thank, respectively, the CERN TH-unit and the HEP group at the University of Southampton (NEXT institute) for their hospitality. Supported by the Spanish grants UCM:910309, MINECO:FPA2014-53375-C21-P, MINECO:FPA2011-27853-C02-01 and BES-2012056054 (RLD). - [1] S. Chatrchyan et al. (CMS Collaboration), Phys. Lett. B 716 , 30 (2012); G. Aad et al. (ATLAS Collaboration), Phys. Lett. B 716 , 1 (2012). - [2] G. Aad et al. [ATLAS Collaboration], arXiv:1407.6583 - [hep-ex]. Bounds are even higher, well into the TeV region, for new vector resonances, see G. Aad et al. [ATLAS Collaboration], arXiv:1407.1376 [hep-ex]. - [3] D.B.Kaplan and H.Georgi, Phys. Lett. B 136 , 183 (1984). - [4] K. Agashe, R. Contino and A. Pomarol, Nucl. Phys. B 719 , 165 (2005); R. Contino, L. Da Rold and A. Pomarol, Phys. Rev. D 75 , 055014 (2007). - [5] E. Halyo, Mod. Phys. Lett. A 8 , 275 (1993); W. D. Goldberger, B. Grinstein and W. Skiba, Phys. Rev. Lett. 100 , 111802 (2008). - [6] R. Alonso, et al. Phys. Lett. B 722 , 330 (2013). - [7] G. Buchalla, O. Cata and C. Krause, Nucl. Phys. B 880 , 552 (2014); G. Buchalla and O. Cata, JHEP 1207 , 101 (2012). - [8] A. Longhitano, Phys. Rev. D 22 , 1166 (1980); Nucl. Phys. B 188 , 118 (1981); A. Dobado, D. Espriu, M.J. Herrero, Phys. Lett. B 255 , 405 (1991); B. Holdom and J. Terning, Phys. Lett. B 247 , 88 (1990); A. Dobado, D. Espriu and M.J. Herrero, Phys. Lett. B 255 , 405 (1991); M. Golden and L. Randall, Nucl. Phys. B 361 , 3 (1991). - [9] J.M. Cornwall, D.N. Levin and G. Tiktopoulos, Phys. Rev. D 10 , 1145 (1974). - [10] R. L. Delgado, A. Dobado and F. J. Llanes-Estrada, JHEP 1402 , 121 (2014). - [11] S. Weinberg. Physica 96A , 327 (1979); J. Gasser and H. Leutwyler, Ann. of Phys. 158 , 142 (1984). - [12] R. Contino et al. JHEP 1005 , 89 (2010). - [13] R. L. Delgado, A. Dobado and F. J. Llanes-Estrada, J. Phys. G 41 , 025002 (2014). - [14] D. Espriu, F. Mescia and B. Yencho, Phys. Rev. D 88 , 055002 (2013) [arXiv:1307.2400 [hep-ph]]. - [15] Similar proposals are known in hadron physics, e.g. the I = 1 2 resonance / oscillating between φN and K ∗ Λ around 2 GeV in K. P. Khemchandani et al. , Phys. Rev. D 83 , 114041 (2011); see also E. Oset and A. Ramos, Eur. Phys. J. A 44 , 445 (2010). - [16] A. Dobado, M. J. Herrero and T. N. Truong, Phys. Lett. B 235 , 129 (1990); A. Dobado and J. R. Pelaez, Phys. Rev. D 47 , 4883 (1993); 56 , 3057 (1997). - [17] J. R. Pelaez, J. A. Oller and E. Oset, Nucl. Phys. A 675 , 92C (2000). - [18] A. Gomez-Nicola, J. R. Pelaez, Phys. Rev. D 65 , 054009 (2002). - [19] D. Espriu and B. Yencho, Phys. Rev. D 87 , 055017 (2013). - [20] CMS Collaboration, Collaboration report CMSPASHIG-14-009; ATLAS Collaboration, Collaboration report ATLAS-CONF-2014-009. - [21] R. L. Delgado, A. Dobado and F. J. Llanes-Estrada, submitted to Phys. Rev. D. - [22] Outside particle physics one can find strongly coupled channels with small elastic interaction. For example, C 2 + O 2 → C 2 + O 2 or CO + CO → CO + CO elastic scattering is negligible against the channel-coupling C +O 2 2 → 2CO, a strong exothermic oxidation reaction, freeing almost 11 eV, driven by the large phase space. What is perhaps distinctive in our mechanism is that the channel-coupling probability is large, with no phase space advantage (all particles being approximately massless).
10.1103/PhysRevLett.114.221803
[ "Rafael L. Delgado", "Antonio Dobado", "Felipe J. Llanes-Estrada" ]
2014-08-06T06:38:40+00:00
2015-06-17T13:04:52+00:00
[ "hep-ph" ]
Possible new resonance from $W_L W_L$-$hh$ interchannel coupling
We propose and theoretically study a possible new resonance caused by strong coupling between the Higgs-Higgs and the W_L W_L (Z_L Z_L) scattering channels, without regard to the intensity of the elastic interaction in either channel at low energy (that could be weak as in the Standard Model). We expose this channel-coupling resonance from unitarity and dispersion relations encoded in the Inverse Amplitude Method, applied to the Electroweak Chiral Lagrangian with a scalar Higgs.
1408.1194v3
## A comparison between models of gravity induced decoherence ## Sayantani Bera a 1 , Sandro Donadi b 2 , Kinjalk Lochan c 3 and Tejinder P. Singh a 4 a Tata Institute of Fundamental Research, Homi Bhabha Road, Mumbai 400005, India b Department of Physics, University of Trieste, Strada Costiera 11, 34151 Trieste, Italy Istituto Nazionale di Fisica Nucleare, Trieste Section, Via Valerio 2, 34127 Trieste, Italy c IUCAA, Post Bag 4 , Pune University Campus, Ganeshkhind, Pune 411 007, India. ## ABSTRACT It has been suggested in the literature that spatial coherence of the wave function can be dynamically suppressed by fluctuations in the spacetime geometry. These fluctuations represent the minimal uncertainty that is present when one probes spacetime geometry with a quantum probe. Two similar models have been proposed, one by Di´si [D-model] and one by Karolyhazy and colo laborators [K-model], based on apparently unrelated minimal spacetime bounds. The two models arrive at somewhat different expressions for the dependence of the localization coherence length on the mass and size of the quantum object. In the present article we compare and contrast the two models from three aspects: (i) comparison of the spacetime bounds, (ii) method of calculating decoherence time, (iii) comparison of noise correlation. We show that under certain conditions the minimal spacetime bounds in the two models can be derived one from the other. We argue that the methods of calculating the decoherence time are equivalent. We re-derive the two-point correlation for the fluctuation potential in the K-model, and confirm the earlier result of Di´si and Luk´cs o a that it is non-white noise, unlike in the D-model, where the corresponding correlation is white noise in time. This seems to be the origin of the different results in the two models. We derive the non-Markovian master equation for the K-model. We argue that the minimal spacetime bound cannot predict the noise correlation uniquely, and additional criteria are necessary to accurately determine the effects of gravitationally induced decoherence. 1 [email protected] 2 [email protected] 3 [email protected] 4 [email protected] ## I. INTRODUCTION What happens when a quantum system interacts with a classical measuring apparatus? Why is it that the wave function collapses from being in a superposition of the eigenstates of the measured observable, to being in just one of those states, in violation of the linear superposition principle obeyed by the deterministic Schr¨dinger equation? o And what is the origin of the Born probability rule? This set of questions is what is commonly known as the quantum measurement problem [1-7]. Broadly, there are three classes of explanations which have been investigated in detail. The first explanation is to say that collapse never takes place, and to explain the experimental result as a consequence of interaction with the environment, which causes decoherence [8-16]. This is supplemented with the many-worlds interpretation [17-26] so that an observer sees only one of the various elements of the diagonalized density matrix. This explanation requires no change to standard quantum theory, except a reinterpretation (many worlds). The second explanation is Bohmian mechanics [27-33] which is a mathematical reformulation of quantum theory, according to which particles move along definite trajectories, but there is a probability distribution in the initial conditions, which in turn reflects in different outcomes in successive repetitions of a quantum measurement. Bohmian mechanics makes the same experimental predictions as standard quantum theory, as far as both theories are understood. The third explanation is that standard quantum theory is an approximation to a stochastic nonlinear quantum theory [34-47]. There is nothing special about quantum measurement; spontaneous collapse of the wave function is an inherent property of the nonlinear theory, but in microscopic systems the collapse occurs so rarely that the theory is effectively indistinguishable from the standard linear Schr¨dinger equation. o However, for mesoscopic systems (such as a metal cluster of mass 10 9 amu) and for macroscopic systems (such as the quantum system + measuring apparatus, or classical objects such as a table or a cat), collapse happens so frequently that any superposition breaks down very rapidly and the system gets well localized in position. The experimental predictions of this nonlinear theory are very close to the standard theory in the micro world, but differ from the standard theory in the meso and the macro world. A decisive experiment which chooses between standard quantum theory and stochastic nonlinear theories has not yet been performed, although an extraordinary worldwide effort in this direction is currently in progress [48]. The main reason is that, even if for meso and macro systems the nonlinear effects may be relevant, in this regime the interaction with the environment plays also an important role, which masks the nonlinear effects. This is equivalent to saying, and very important to emphasize, that for objects larger than 10 5 amu, quantum theory has not been tested. From 10 18 amu [roughly the scale above which classical mechanics holds], down to 10 5 amu, is an experimentally untested desert which spans some thirteen orders of magnitude! Thus, the way things stand today, decoherence plus many worlds, Bohmian mechanics, and nonlinear quantum theory, are all valid explanations of observed quantum phenomena and the quantum measurement process. Only future investigations can decide as to which (if any) of these explanations is the correct one; and such investigations are of tremendous importance in helping decide the domain of validity of the standard theory [49]. One successful formulation 1 of stochastic nonlinear quantum theory, known as Continuous Spontaneous Localization [CSL], was proposed in the eighties [50], and has been studied very extensively since then. Simply put, CSL is a modification of the Schr¨dinger equation, to which a stochastic o nonlinear part is added, and two new fundamental constants of nature are introduced, a collapse rate λ , and a localization length scale r c . CSL explains the collapse of the wave function during a measurement, and it explains the Born probability rule. The CSL model is being subjected to stringent experimental tests, and various constraints have also been imposed on its parameters from astrophysical and cosmological observations [49]. It is hoped that in the coming decades tests will either verify or rule out this model. Nonetheless, even if CSL were to be experimentally verified, it would still remain a phenomenological model, having been specifically designed to explain collapse of the wave function, and the Born probability rule. Furthermore, the fundamental constants λ and r c , as well as their numerical values, have been proposed in an ad hoc manner, so as to be consistent with experimental data. Moreover, the relativistic generalization of CSL is also sought for natural reasons. Significant progress would be made if one could understand why CSL is required in the first place, without taking recourse to the measurement problem, and the Born rule. Considerable effort has been invested in this direction, and some encouraging results have been obtained. One possibility is to consider CSL as a model which can be derived from a more fundamental underlying theory. A noteworthy effort has been due to Adler and collaborators, where quantum theory, and then CSL model [subject to some specific assumptions] are seen as emerging in the statistical limit from a deterministic theory known as Trace Dynamics [51]. Another possibility is to look for some physical mechanism which could be effectively responsible for a significant modification of quantum theory, on macroscopic scales. One mechanism worth 1 by successful we mean the model provides a solution for the quantum measurement problem without violating causality, which is a typical problem of deterministic nonlinear modifications to the Schr¨dinger equation. o considering, and which has been explored in some detail, is the universally present force of gravity. All objects produce a gravitational field, including quantum objects, although today we do not know exactly how the gravitational field of a quantum object is related to its properties such as mass. Since the quantum object does not move on a definite trajectory, the gravitational field produced by it presumably has quantum fluctuations too. The evolution of the object's wave function in such a fluctuating geometry can in principle suffer decoherence and localization, as parts of the wave function that are sufficiently separated in space can lose phase coherence. This principle, or some variation of it, has actually been implemented by a few groups of researchers to show that this effect can cause loss of spatial coherence in macroscopic objects, while having negligible effect on microscopic physics. This phenomenon is commonly referred to as gravity induced decoherence of the wave function. The first work in this direction was carried out by Karolyhazy and collaborators [we will call this the K-model] [52-61]. Subsequently, gravity induced decoherence models were also developed by Di´ osi [we will call this the D-model] [62-64]. While we do not discuss a third development here, mention must be made of the important work of Penrose [65] on the effect of self-gravity on quantum evolution, and the subsequent investigations by various researchers on the Schr¨dingero Newton equation, reviewed for instance in [49, 66, 67]. It is important to stress that in the K-model as well as in the first version of the D-model [62, 63] the evolution of the state vector is given by a random unitary Schr¨dinger equation i.e. o a Schr¨dinger equation where a stochastic potential describes the fluctuations in the geometry of o the spacetime. Therefore, in contrast to the CSL model, these two models do not describe any real collapse of the wave function: they only explain an appearance of decoherence effects due to the presence of the stochastic potential. However, there is an important connection between random unitary Schr¨dinger equations and nonlinear stochastic equations like the one of collapse models. o As shown in [68], given a random unitary Schr¨dinger equation, there is always a corresponding o nonlinear equation (which has exactly the form as in the collapse models equation), which leads to the same master equation. Therefore, even though the dynamics for the state vectors in these models are very different, as far as we are concerned with averaged quantities, (derivable from the master equation), the two dynamics lead to exactly same predictions. As an example, in the case of the D-model, the corresponding collapse equation was proposed in [64]. Therefore, even though the K-model and D-model we consider here do not describe any real collapse of the wave function, they can still be used to get information about some relevant quantity, like the typical length and time scale over which coherence effects are suppressed, which would be the same also for the corresponding gravity induced collapse equations. While both the models study gravity induced decoherence, and have some common features, they arrive at results which are quantitatively different at times. The purpose of the present paper is to compare and contrast the K-model and the D-model, and to understand why their results differ quantitatively. The K-model begins by asking to what precision a length s = cT in flat spacetime can be measured using a quantum probe which obeys the uncertainty principle. Karolyhazy shows that there will be a minimum uncertainty ∆ s in the inferred length which is given by the relation $$\Delta s ^ { 3 } & \sim l _ { p } ^ { 2 } \ s,$$ where l p = √ /planckover2pi1 G/c 3 is the Planck length. This uncertainty is accounted for by hypothesizing that there coexist in spacetime a family of curved metrics ( g µν ) β , each of which yields a corresponding value s β for the measured length. The family of metrics is chosen in such a way that they average to s = cT with a variance $$\Delta s ^ { 2 } = \langle ( s - s _ { \beta } ) ^ { 2 } \rangle$$ (here 〈 ... 〉 denotes the average over the metrics) which yields a ∆ s which matches with the uncertainty given by (1). As we will recall in the next section, this matching requires an appropriate choice for the family of metrics. Given such a family of metrics, one studies the propagation of an initial wavefunction Ψ 0 for an object of mass m and size R (assuming a spherical shape), in different metrics ( g µν ) β . Inevitably, the wave function Ψ β at a later time will belong to a set { Ψ β } whose elements will differ from each other in their spatial dependence. In particular, the phase separation between two spatial points acquires a variance when averaged over the family, and a decoherence length scale a c (to which the wave function gets localized) is defined as the spatial separation a c over which the phase uncertainty becomes of the order of π . The decoherence time is given by τ c ≈ ma / 2 c /planckover2pi1 . Of great interest is the calculated dependence of the coherence length on the mass m and the size R of the object. The results of the K-model are as follows [58]. For an extended object of size R the localization length is calculated from a generic form of the phase variance for a system of particles. There are two interesting cases: one for R /greatermuch a c and another for R /lessmuch a c . For a microobject of linear size R /lessmuch a c , the expression for the coherence length virtually reduces to that of an elementary particle of mass m and the coherence length a c over which decoherence effects become relevant is given by $$a _ { c } \approx \frac { \hslash ^ { 2 } } { G } \ \frac { 1 } { m ^ { 3 } } = \left ( \frac { L } { l _ { p } } \right ) ^ { 2 } L ; \quad L = \frac { \hslash } { m c }.$$ While for R /greatermuch a c , the critical length can be expressed as, $$a _ { c } \approx \left ( \frac { \hbar { ^ { 2 } } } { G } \right ) ^ { 1 / 3 } \, \frac { R ^ { 2 / 3 } } { m } = \left ( \frac { R } { l _ { p } } \right ) ^ { 2 / 3 } L.$$ [Putting a c = R in Eqn. (4), the two expressions coincide. Thus a c = R denotes the transition from macro-regime to micro-regime.] Summarizing this, the following important inferences can be drawn: $$a _ { c } \gg R \implies \frac { \hslash ^ { 2 } } { G } \gg m ^ { 3 } R \quad \colon m i c r o - r e g i o n,$$ $$a _ { c } \approx R \implies \frac { \hslash ^ { 2 } } { G } \approx m ^ { 3 } R \quad \colon t r a n s i t i o n - r e g i o n,$$ $$a _ { c } \ll R \implies \frac { \hslash ^ { 2 } } { G } \ll m ^ { 3 } R \quad \colon m a c r o - r e g i o n.$$ Some estimates are of interest. From Eqn. (3) it can be estimated that for a proton $$a _ { c } \approx 1 0 ^ { 2 5 } \, \text{cm}, \quad \tau _ { c } \approx 1 0 ^ { 5 3 } \, \text{sec}.$$ What this means is that while according to quantum theory, an initial wave function for the proton would continue to spread indefinitely and forever, gravity induced decoherence causes its loss of coherence, after an enormous time of 10 53 sec, to a very large length scale 10 25 cm. Given these length and time scales, we are of course completely justified in thinking of the proton as a quantum mechanical object. Contrast this with a macroscopic ball of radius R = 1 cm, having density 1 gm/cm , for which we get 3 $$a _ { c } \approx 1 0 ^ { - 1 6 } \, \text{cm}, \quad \tau _ { c } \approx 1 0 ^ { - 4 } \, \text{sec}.$$ Furthermore, the transition from the micro to the macro domain occurs for a c = R , which for a density of 1 gm/cm , works out from (4) to be 3 $$a _ { t r } \approx 1 0 ^ { - 5 } \, \text{cm}, \quad \tau _ { t r } \approx 1 0 ^ { 3 } \, \sec, \quad m _ { t r } \approx 1 0 ^ { - 1 4 } \, \text{gm}.$$ Notice that the coherence length a tr for transition matches with the favoured value for r c in the collapse models. The transition mass corresponds to about 10 10 amu, which is still about five orders of magnitude higher than the largest masses (about 10 5 amu) for which quantum position superposition has been observed through interferometry. The similarity between CSL and gravity induced localization has been discussed for instance in [49]. It is important though to emphasize that while CSL explains localization, as well as realization of a specific random outcome upon measurement in accordance with the Born rule, gravity models only explain localization [without selection of one outcome]. In this sense, these models should perhaps better be called models of gravity induced decoherence, instead of gravity induced collapse. The next model of gravity induced collapse was developed by Di´si, and in a spirit somewhat o similar to the K-model, the work begins by asking to what accuracy a Newtonian gravitational field g can be measured by a quantum probe obeying the uncertainty principle. It is shown that the uncertainty δ g in the measured field, averaged over a spacetime volume V T , is bounded by $$( \delta \tilde { \mathfrak { g } } ) ^ { 2 } \geq G \hbar { / } V T \,.$$ This result is in spirit similar to the Karolyhazy bound (1) mentioned above, and later in this paper we will discuss the relation between these two bounds. Di´ osi models this uncertainty by introducing a classical stochastic potential, whose two point correlation reflects this bound. The stochastic potential is then introduced as a source potential in the Schr¨dinger equation, making o the evolution of the wave function stochastic. A deterministic Markovian master equation can be deduced for the density matrix, and the stochastic potential is responsible for decoherence of the density matrix. The decoherence time τ c and the localization length a c (related as before by τ c = ma / 2 c /planckover2pi1 ) can be calculated. For a spherical object of mass m and size R the localization length is given in two limiting cases by $$a _ { c } & \sim ( \hbar { ^ { 2 } } / G m ^ { 3 } ) ^ { 1 / 4 } R ^ { 3 / 4 }, \quad \text{if} \quad R m ^ { 3 } \gg \hbar { ^ { 2 } } / G, \\ & \sim ( \hbar { ^ { 2 } } / G m ^ { 3 } ) ^ { 1 / 2 } R ^ { 1 / 2 }, \quad \text{if} \quad R m ^ { 3 } \ll \hbar { ^ { 2 } } / G \,.$$ The result in the first line, which is for the macro limit, should be compared with the corresponding K-model result, given by Eqn. (4). The two results are different, and one would like to understand the reasons for the difference. In the subsequent sections we compare the two models and show that while the two spacetime bounds (1) and (11) are equivalent, they do not imply a unique twopoint noise correlation for the assumed stochastic potential. While the D-model assumes white noise, the noise correlation in the K-model is not white, and the corresponding master equation is non-Markovian. This confirms the earlier finding of [69] about the different noise in the two models; however unlike [69] we suggest that the minimal spacetime bounds in the two models are equivalent, and that the bound does not determine the noise correlation. Quantitatively too, the two models show a major difference, even though in both models the micro to macro transition takes place at the same value of the coherence length: a tr = R = /planckover2pi1 2 /Gm 3 . In the D-model, for a proton, assumed to have a classical radius R ≈ 10 -13 cm, the localization length and the decoherence time are found to be 10 6 cm and 10 15 sec respectively, much smaller than the corresponding numbers (10 25 cm and 10 53 sec) for the K-model. In the macro limit, the D-model gives a localization length 10 -12 cm for R = 1 cm and a density of 1 gm/cm , which is 3 larger than the K-model value by four orders of magnitude. Strangely enough, this corresponds to a decoherence time of about 10 3 sec, which is unreasonably high, in contrast to the more plausible value 10 -4 sec yielded by the K-model. Considering that these numerical values are now of interest to experimentalists in the field, it is highly desirable to try and make unique model predictions which do not differ by many orders. It should be emphasised that both in the K-model and in the D-model, the classical stochastic potential is postulated by way of an assumption, to represent the quantum space-time uncertainty. Consequently, strictly speaking, the two-point correlation functions associated with the corresponding stochastic fields are also postulates, albeit ones that are motivated by certain physical and mathematical choices made in the respective models. The plan of this paper is as follows. In Section II we briefly review the K-model, and argue that one can think of the family of metrics as a stochastic potential. We then reconfirm the result of [69] on the two point noise correlation for this potential, and show that it corresponds to non-white noise. We also write down the non-Markovian master equation for this model. In Section III we recall the D-model, and show how can one think of the uncertainty bounds of the two models, Eqns. (1) and (11) as being equivalent to each other. We also argue that the methods used by the two models for calculating the decoherence time are equivalent. In Section IV we highlight that the spacetime uncertainty bound does not uniquely determine the noise correlation, and some additional criterion will have to be sought to obtain a unique prediction for the localization length. ## II. A BRIEF REVIEW OF THE K-MODEL, AND SOME NEW RESULTS In the first part of this section we report some of the most important properties of the K-model, following the derivation given in [52, 53]. As noted above, the bound (1) is modeled by introducing a family of metrics ( g µν ) β which are very close to the Minkowski metric. β = 0 labels the Minkowski metric. The proper length s = cT between two world-points x 1 and x 2 is defined as the mean of the lengths s β as measured in different members of the family $$s = c T = \langle s _ { \beta } \rangle$$ and the uncertainty ∆ s in the length of the line segment is given by Eqn. (2). Assuming the particle motion to be nonrelativistic, only the departure of the g 00 metric component from its Minkowski value is of interest, and one introduces the perturbation $$( g _ { 0 0 } ) _ { \beta } ( { \mathbf x }, t ) = 1 + \gamma _ { \beta } ( { \mathbf x }, t ) \.$$ Now, the idea is to select the set γ β in such a way that the length of the world line $$s _ { \beta } = \int d t \left [ g _ { \mu \nu } ^ { \beta } \frac { d x ^ { \mu } } { d t } \frac { d x ^ { \nu } } { d t } \right ] ^ { 1 / 2 }$$ averages to (13), and the uncertainty in length as defined by Eqn. (2) matches with the bound (1). For this purpose, the K-model assumes (since spacetime is free apart from matter particles) that the γ β satisfy the wave equation $$\Box \gamma _ { \beta } ( { \mathbf x }, t ) = 0 \.$$ In Section IV we will point out that this is not a unique choice for γ β and other choices can also yield (1). To proceed further, it is convenient to make a Fourier expansion of the γ β satisfying (16) with ω = | k | c $$\gamma _ { \beta } ( { \mathbf x }, t ) = \frac { 1 } { \sqrt { l ^ { 3 } } } \sum _ { \mathbf k } \left [ c _ { \beta } ( { \mathbf k } ) c ^ { i ( { \mathbf k } \cdot { \mathbf x } - \omega t ) } + c. c \right ] \,.$$ Also, the K-model assumes c β ( k ) = f ( k e ) iα β ( k ) , where α is a random phase such that $$\langle c _ { \beta } ( { \mathbf k } ) \rangle = 0, \quad \langle c _ { \beta } ^ { 2 } ( { \mathbf k } ) \rangle = 0, \quad \langle c _ { \beta } ( { \mathbf k } ) c _ { \beta } ^ { * } ( { \mathbf k } ^ { \prime } ) \rangle = \delta _ { { \mathbf k }, { \mathbf k } ^ { \prime } } ( f ( k ) ) ^ { 2 }.$$ This is a simplifying assumption of the model; namely that the c β ( k ) are independent stochastic variables with zero mean, and a Gaussian probability distribution (see Eqn. 4 of [55]). It is then shown that in order to recover (1) the function f ( k ) is given by $$f ( k ) = l _ { p } ^ { 2 / 3 } k ^ { - 5 / 6 }.$$ Having determined the family γ β the next task is to determine the evolution of a given initial wave function ψ 0 , and find out how the evolution depends on γ β . Different metrics will result in different evolution, thus leading to a family of wave functions ψ β , all of which in fact describe the same system. Decoherence results when there is a significant difference in the evolution as β is varied: this is quantified as follows. We start from the Klein-Gordon equation $$\frac { 1 } { \sqrt { - g _ { \beta } } } \frac { \partial } { \partial x ^ { \mu } } ( \sqrt { - g _ { \beta } } g _ { \beta } ^ { \mu \nu } \frac { \partial \phi } { \partial x ^ { \nu } } ) - \left ( \frac { m c } { \hbar } \right ) ^ { 2 } \phi = 0, \\ \dots \dots \dots \dots \dots \dots \dots.$$ and takes its nonrelativistic limit to arrive at the Schr¨dinger equation o $$i \hbar { \frac { \partial } { \partial t } } \psi _ { \beta } = \left ( - \frac { \hbar { ^ { 2 } } } { 2 m } \nabla ^ { 2 } + V _ { \beta } \right ) \psi _ { \beta }$$ where the perturbing potential V β is given by $$V _ { \beta } ( { \mathbf x }, t ) = \frac { m c ^ { 2 } \gamma _ { \beta } ( { \mathbf x }, t ) } { 2 }.$$ The non-relativistic limit has been arrived at by first substituting the metric form diag g ( 00 , -1 , -1 , -1) in the Klein-Gordon equation and using the perturbative expansion (14) for g 00 . Then, as is conventionally done, the state φ in the Klein-Gordon equation is written as φ ≡ e iS and the function S expanded as a power series in c 2 : S = c 2 S 0 + S 1 + c -2 S 2 + .. . Substitution of this expansion in the Klein-Gordon equation, and comparison of terms at different orders in c 2 yields the non-relativistic Schr¨dinger equation at order o c 0 after the identification ψ β ≡ e iS 1 / /planckover2pi1 . A more detailed discussion can be found for instance in [70]. An important remark is in order with regard to Eqn. (20). Since this equation is being treated as the non-relativistic limit of a relativistic system, semiclassical Einstein equations imply that in principle one ought to consider a contribution to the potential from self-gravity, of the form ∇ 2 V self ∝ | ψ | 2 . The latter self-interaction is precisely what is considered in the Schr¨dinger-Newton o [SN] equation; however the SN equation does not consider the effect of spacetime uncertainty that is being studied in the K-model / D-model. In a sense the SN equation is complimentary to the present study, although it has its own limitations [66], and in particular does not incorporate quantum fluctuations of the mean self-gravity. In our view a compete treatment should simultaneously include both self-gravity and the effects of intrinsic spacetime uncertainty. To the best of our knowledge this has not been done, and we hope to investigate this in the future. Generalization of the above non-relativistic equation to the many-particle case is achieved by replacing the potential V β by $$U _ { \beta } ( \{ \mathbf X \}, t ) = \sum _ { i } \frac { m _ { i } c ^ { 2 } \gamma _ { \beta } ( \mathbf x _ { i }, t ) } { 2 },$$ where { X } labels a point in configuration space: { X } = ( x 1 , x 2 , .... x N ). Then the Schr¨dinger o equation becomes: $$i \hbar { \frac { } { } } \overline { \partial t } \Psi _ { \beta } ( \{ \mathbf X \}, t ) = \left ( H + U _ { \beta } ( \{ \mathbf X \}, t ) \right ) \Psi _ { \beta }.$$ To realize decoherence one starts with an initial wave function Ψ ( 0 { X } , 0), same for all the metrics { g µν β } . After evolution, different Ψ β ( { X } , t ) will become different. It can be shown that, to a good approximation [55] $$\Psi _ { \beta } ( \{ X \}, t ) & \approx \Psi _ { 0 } ( \{ X \}, t ) e ^ { i \phi _ { \beta } ( \{ X \}, t ) },$$ with $$\phi _ { \beta } ( \{ \mathbf X \}, t ) = - \frac { 1 } { \hbar } \int _ { 0 } ^ { t } d t ^ { \prime } U _ { \beta } ( \{ \mathbf X \}, t ).$$ We fix an { X 1 } and an { X 2 } , and calculate the difference in phase between these two points in configuration space for different β . The answer will depend on β and on time. The root mean square spread in the phase (average is over β ) $$\langle [ \phi _ { \beta } ( \{ \mathbf X _ { 1 } \}, t ) - \phi _ { \beta } ( \{ \mathbf X _ { 2 } \}, t ) ] ^ { 2 } \rangle ^ { 1 / 2 }$$ can be estimated as a function of { X 1 } , { X 2 } and time t . The uncertainty in the relative phase depends only on the separation between the two points in configuration space, and for a sufficiently large separation a c can reach the value π after some time. When that happens, decoherence and localization is said to occur, and the aforementioned results (3) and (4) are shown to hold. [The phase correlations are assumed to be Gaussian, so that the two-point function carries the entire information about the correlations.] In our paper, we will attempt to recast the analysis of the K-model in a manner which might be regarded as more conventional, and which facilitates comparison with the D-model. Thus, there is nothing which really prevents us from thinking of the family γ β as a stochastic potential with zero mean, and whose two point correlation is such that when a length s = cT is measured in the presence of such a potential, it exhibits an uncertainty given by (1). In order to avoid possible divergences due to taking a discrete distribution of point-like particles, we rewrite Eqn. (22) considering a system with mass density given by a smooth function f ( x ), $$i \hbar { \frac { \partial } { \partial t } } \psi _ { \beta } ( { \mathbf x }, t ) = \left ( H + \frac { c ^ { 2 } } { 2 } \int d ^ { 3 } x ^ { \prime } \, f ( { \mathbf x } ^ { \prime } - { \mathbf x } ) \, \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ) \right ) \psi _ { \beta } ( { \mathbf x }, t ),$$ where γ β is now a stochastic potential, and the wave function is also a stochastic quantity, which represents the family ψ β . We now compute the two point correlation (assuming a Gaussian probability distribution) for the stochastic potential γ β in the K-model. By means of the Fourier expansion (17) we can write, $$\left \langle \gamma _ { \beta } ( { \mathbf x }, t ) \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \right \rangle = \frac { 1 } { l ^ { 3 } } \left \langle \sum _ { { \mathbf k } } \sum _ { { \mathbf k } ^ { \prime } } \left [ c _ { \beta } ( { \mathbf k } ) e ^ { i ( { \mathbf k } \times { \mathbf x } - { \omega } t ) } + c. c \right ] \left [ c _ { \beta } ( { \mathbf k } ^ { \prime } ) e ^ { i ( { \mathbf k } ^ { \prime } \times { \mathbf x } ^ { \prime } - { \omega } t ^ { \prime } ) } + c. c \right ] \right \rangle$$ and using relations (18) we obtain $$\left \langle \gamma _ { \beta } ( { \mathbf x }, t ) \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \right \rangle = \frac { 1 } { l ^ { 3 } } \sum _ { \mathbf k } \left [ f ^ { 2 } ( k ) e ^ { i { \mathbf k } \cdot ( { \mathbf x } - { \mathbf x } ^ { \prime } ) } e ^ { - i { \omega } ( t - t ^ { \prime } ) } + f ^ { 2 } ( k ) e ^ { - i { \mathbf k } \cdot ( { \mathbf x } - { \mathbf x } ^ { \prime } ) } e ^ { i { \omega } ( t - t ^ { \prime } ) } \right ].$$ In the limit l →∞ we can write $$\langle \gamma _ { \beta } ( { \mathbf x }, t ) \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \rangle = \frac { 1 } { ( 2 \pi ) ^ { 3 } } \int d { \mathbf k } \left [ f ^ { 2 } ( k ) e ^ { i { \mathbf k } \cdot ( { \mathbf x } - { \mathbf x } ^ { \prime } ) } e ^ { - i { \omega } ( t - t ^ { \prime } ) } + f ^ { 2 } ( k ) e ^ { - i { \mathbf k } \cdot ( { \mathbf x } - { \mathbf x } ^ { \prime } ) } e ^ { i { \omega } ( t - t ^ { \prime } ) } \right ] \quad ( 2 8 ) \\ \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots.$$ which, introducing r = | x -x ′ | and τ = t -t ′ becomes $$\left \langle \gamma _ { \beta } ( { \mathbf x }, t ) \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \right \rangle = \frac { 1 } { ( 2 \pi ) ^ { 3 } } \int d { \mathbf k } \left [ f ^ { 2 } ( k ) e ^ { i { \mathbf k } r \cos \theta } e ^ { - i { \mathbf \omega } \tau } + f ^ { 2 } ( k ) e ^ { - i { \mathbf k } r \cos \theta } e ^ { i { \mathbf \omega } \tau } \right ].$$ Let us first calculate the first term: $$I _ { 1 } = \frac { 1 } { ( 2 \pi ) ^ { 2 } } \int _ { 0 } ^ { \infty } \int _ { 0 } ^ { \pi } k ^ { 2 } d k f ^ { 2 } ( k ) \sin \theta d \theta e ^ { i k r \cos \theta } e ^ { - i \omega \tau }$$ $$= \frac { l _ { p } ^ { 4 / 3 } } { ( 2 \pi ) ^ { 2 } } \frac { 2 } { r } \int _ { 0 } ^ { \infty } k ^ { - 2 / 3 } \sin ( k r ) e ^ { - i k c \tau } d k.$$ $$I _ { 1 } & = \frac { 1 } { ( 2 \pi ) ^ { 2 } } \int _ { 0 } ^ { \infty } \int _ { 0 } ^ { \pi } k ^ { 2 } d k f ^ { 2 } ( k ) \sin \theta d \theta e ^ { i k r \cos \theta } e ^ { - i \omega \tau } \\ & = \frac { l _ { p } ^ { 4 / 3 } } { ( 2 \pi ) ^ { 2 } } \frac { 2 } { r } \int _ { 0 } ^ { \infty } k ^ { - 2 / 3 } \sin ( k r ) e ^ { - i k c \tau } d k. \\ & \\ \tilde { \tau } \tilde { \, \tau } \tilde { \, \tau } \tilde { \, \tau }$$ Similarly, the second term gives, $$I _ { 2 } = \frac { l _ { p } ^ { 4 / 3 } } { ( 2 \pi ) ^ { 2 } } \frac { 2 } { r } \int _ { 0 } ^ { \infty } k ^ { - 2 / 3 } \sin ( k r ) e ^ { i k c \tau } d k$$ and, adding these two terms, we finally get: $$\left \langle \gamma _ { \beta } ( \mathbf x, t ) \gamma _ { \beta } ( \mathbf x ^ { \prime }, t ^ { \prime } ) \right \rangle = \frac { l _ { p } ^ { 4 / 3 } } { ( 2 \pi ) ^ { 2 } } \frac { 4 } { r } \int _ { 0 } ^ { \infty } k ^ { - 2 / 3 } \sin ( k r ) \cos ( k c \tau ) d k. \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ Upon integration, the final form of two point correlation is, $$\left \langle \gamma _ { \beta } ( { \mathbf x }, t ) \gamma _ { \beta } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \right \rangle = \frac { l _ { p } ^ { 4 / 3 } } { 4 \pi ^ { 2 } r } \Gamma \left ( 1 / 3 \right ) \left [ \frac { 1 } { ( r + c | \tau | ) ^ { \frac { 1 } { 3 } } } + \frac { \, \text{sign} ( r - c | \tau | ) } { | r - c | \tau | | ^ { \frac { 1 } { 3 } } } \right ]. \quad \quad \quad$$ This result was first reported in [69], and this is evidently not white noise, and is the feature responsible for the difference in the results obtained for localization length in the K-model and the D-model. However, unlike what [69] seems to suggest, we will demonstrate in the next section that the uncertainty bounds (1) and (11) are equivalent. Furthermore, the phase variance method used in the K-model to determine the decoherence time will be shown to be equivalent to the more conventional method used in the D-model (i.e. studying the master equation for the density matrix). Thus these are not the reasons why the two models arrive at different results. We can also write down the non-Markovian master equation corresponding to this non-white noise. Rewriting (25) without projecting to the position basis we have $$i \hbar { \frac { \partial } { \partial t } } \left | \psi \left ( t \right ) \right \rangle & = \left [ H + \frac { c ^ { 2 } } { 2 } \int d ^ { 3 } x ^ { \prime } f \left ( x ^ { \prime } - \hat { \mathbf q } \right ) \gamma _ { \beta } \left ( x ^ { \prime }, t \right ) \right ] \left | \psi \left ( t \right ) \right \rangle. \\ \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot \quad \cdot$$ It has been shown in [68], that when the noise can be treated as a perturbation, the corresponding master equation to the lowest perturbative order in the noise is $$\frac { d \rho \left ( t \right ) } { d t } = - \frac { i } { \hbar } \left [ H, \rho \left ( t \right ) \right ] - \left ( \frac { c ^ { 2 } } { 2 \hbar } \right ) ^ { 2 } \int d ^ { 3 } x d ^ { 3 } x ^ { \prime } \int _ { 0 } ^ { t } d t ^ { \prime } \left \langle \gamma _ { \beta } \left ( \mathbf x, t \right ) \gamma _ { \beta } \left ( \mathbf x ^ { \prime }, t ^ { \prime } \right ) \right \rangle \left [ f \left ( \mathbf x$$ with f ( x ) = f ( x ′ -ˆ), q 〈 γ β ( x , t ) γ β ( x ′ , t ′ ) 〉 given in Eq. (33) and x ′ ( t ′ -t ) the position operator in interaction picture evolved up to the time t ′ -t . The calculation of decoherence time from this master equation is by no means straightforward nor obvious, and the phase variance method used in the K-model is decidedly far simpler. As we show in the next section, for the D-model, the phase variance method is equivalent to the Markovian master equation, in so far as the calculation of the decoherence time is concerned. We conjecture that the same equivalence is true, if that master equation is replaced by the above non-Markovian equation of the K-model, and that this latter equation also yields decoherence in position. However we do not have a proof for this, or a derivation of the phase variance method from this master equation, and we hope to address these questions in a future study. ## III. ABRIEF REVIEW OF THE D-MODEL, AND COMPARISON WITH THE K-MODEL Di´ osi and Luk´ acs [62] work in the framework of Newtonian Quantum Gravity [NQG], where G and /planckover2pi1 appear in the analysis, but c does not. They ask: if a quantum probe is used to measure a classical gravitational field g , what is the maximum accuracy with which g can be measured? They assume that in a realistic measurement only an average ˜ g of g $$\tilde { \mathfrak { g } } ( { \mathbf x }, t ) = \frac { 1 } { V T } \int \mathfrak { g } ( { \mathbf x } ^ { \prime }, t ) d ^ { 3 } x ^ { \prime } d t, \quad | { \mathbf x } - { \mathbf x } ^ { \prime } | < R, \quad | t ^ { \prime } - t | < \frac { T } { 2 }$$ over a space and time interval can be measured. The volume V = 4 πR / 3 3 and the time-interval T are properties of the probe, assumed to be a spherical object with linear extent R . The quantum probe, assumed to be a mass M with wave-packet of initial extent R picks up a momentum P = M T ˜ g during the measurement time T . However there is a quantum uncertainty δP ∼ /planckover2pi1 /R in the classical value of P , showing that there is an inaccuracy in the measurement of ˜ g given by δ ( ˜ g ) ∼ /planckover2pi1 /MRT . This inaccuracy can be decreased by increasing M , but the mass M produces its own gravitational field, which disturbs the field being measured, and has an intrinsic uncertainty δ g ∼ GM/R 2 because of the spread of the wave-packet. Consequently the optimal choice for M is M ∼ √ /planckover2pi1 R/GT and the final minimal uncertainty in the measurement of the gravitational field is $$\delta ( \tilde { \mathfrak { g } } ) & \sim \sqrt { G \hbar { / } V T }.$$ This minimal uncertainty appears to have a universal character, and could be mathematically modeled, for the sake of further application, as a stochastic contribution g st ( x , t ) (having zero mean) to the classical field g cl ( x , t ) $$g ( x, t ) = g _ { c l } ( x, t ) + g _ { s t } ( x, t ) \.$$ The minimal bound (37) can be recovered using this stochastic field, provided that, after spacetime averaging, it satisfies $$\langle ( \tilde { \mathfrak { g } } _ { s t } ) ^ { 2 } \rangle \sim \frac { G \hbar } { V T } \.$$ The spacetime average that appears on the left hand side can be written explicitly, so that $$\langle \tilde { \mathbf g } _ { s t } ^ { 2 } \rangle = \frac { 1 } { V ^ { 2 } T ^ { 2 } } \int \int d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \, d t \, d t ^ { \prime } \langle \mathbf g _ { s t } ( \mathbf x, t ) \mathbf g _ { s t } ( \mathbf x ^ { \prime }, t ^ { \prime } ) \rangle \.$$ Now, as is easily verified, a possible two-point correlation on the right hand side which will satisfy this relation is white-noise: $$\langle \mathfrak { g } _ { \text{st} } ( \mathbf x, \mathbf t ) \mathfrak { g } _ { \text{st} } ( \mathbf x ^ { \prime }, \mathbf t ^ { \prime } ) \rangle = \mathbf I G \hbar { \delta } ( \mathbf x - \mathbf x ^ { \prime } ) \delta ( t - \mathbf t ^ { \prime } )$$ The form of the correlation leads to the cancellation of a factor V T in (40), which is what is desired. From here it can be shown that the two point correlation for the gravitational potential φ defined by g = -∇ φ is given by $$\langle \phi ( { \mathbf x }, t ) \phi ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \rangle - \langle \phi ( { \mathbf x }, t ) \rangle \langle \phi ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \rangle \sim \frac { G \hbar { } } { | { \mathbf x } - { \mathbf x } ^ { \prime } | } \ \delta ( t - t ^ { \prime } ),$$ where 〈 φ ( x , t ) 〉 = φ cl ( x , t ) and φ cl ( x , t ) satisfies the Poisson equation $$\nabla ^ { 2 } \phi ( { \mathbf x }, t ) = 4 \pi G \rho ( { \mathbf x }, t ).$$ As before, the probability distribution for the stochastic potential is assumed to be Gaussian. From here on, the analysis proceeds in a straightforward manner: one uses the correlation function for the stochastic potential, and then constructs a Schr¨dinger equation for evolution of an object in o this stochastic potential. From there one can construct a Lindblad master equation, from which the decoherence effects of the fluctuating gravitational potential can be deduced. This leads to Diosi's results mentioned above in Eqn. (12). Now, we notice that Eqns. (39) and (40) do not uniquely imply that the noise is white. For instance, suppose that in Eqn. (40) the correlation on the right hand side has a form $$\langle \mathfrak { g } _ { s t } ( \mathbf x, t ) \mathfrak { g } _ { s t } ( \mathbf x ^ { \prime }, t ^ { \prime } ) \rangle = \mathbf I G \hbar { F } ( \mathbf x - \mathbf x ^ { \prime } ) G ( t - t ^ { \prime } )$$ with F and G functions other than delta-functions. Now it is obvious, by defining new coordinates say, p = x -x ′ , q = x + x ′ , r = t -t ′ , s = t + t ′ , that the right hand side of Eqn. (40) can be written as $$\frac { 1 } { V T } \int \, | d e t J | ^ { - 1 } \, d ^ { 3 } p \, d r \ F ( \mathbf p ) G ( r ).$$ Here J is the Jacobian of the transformation. This form can in principle yield (39) with a suitable choice of the functions F and G (other than delta functions), since a factor 1 /V T has again cancelled out. Thus it seems to us that the minimal bound (39) can also be achieved by noise which is not white, and this would make a difference in the final quantitative conclusions one draws about decoherence and how it depends on the mass and size of the decohering object. [For the sake of completeness we recall that the master equation for the D-model has an intrinsic divergence. To regularise this divergence a cut-off was first proposed at the nucleon scale [64]; unfortunately such a cut-off leads to excessive heating inconsistent with observations. It was then proposed to raise this cut-off to a much higher value r c , the length scale of the CSL model [71]. While this solves the heating problem, it is difficult to physically justify the inclusion of the scale r c in the D-model, one of whose motivations was to give a parameter free description of decoherence and collapse. In a recent paper [72], the issue of this divergence has been discussed in detail, and the authors also consider the possibility of avoiding overheating by introducing dissipation in the dynamics, instead of introducing a high cut-off.] The second observation which we wish to make is the role played by spacetime averaging. In principle, it is possible to consider an idealized quantum probe whose spread is small enough that the gravitational field maybe assumed uniform over the extent of the probe and over the duration of the measurement. In such a case, the analysis leading upto Eqn. (37) can be again repeated, but now without referring to spacetime averaging, and the minimal uncertainty will be given by $$\delta ( \mathbf g ) & \sim \sqrt { G \hbar { / } V T },$$ where no reference to averaging is made. It is possible to relate this bound to the spacetime bound in the K-model, as we will see in a moment. Spacetime averaging is of course essential in the D-model, for the purpose of deducing a white noise correlation, as is evident from Eqn. (40). If spacetime averaging is not done, and we accept the bound (46), then this can be related to the minimal bound in the K-model, once we think of Newtonian gravity as an approximation to general relativity. The bound (46) is equivalent to an uncertainty in the measured gravitational potential, given by $$\delta ( \phi ) \sim \sqrt { G \hbar { / } R T } \,.$$ If the mean value of φ is zero, then δ φ ( ) is of the order of the perturbing potential which distorts a Minkowski spacetime background. Now, if one attempts to measure a length s = cT , an uncertainty in its measurement will be induced by δ φ ( ), and given as follows: $$s ^ { \prime } = \sqrt { g _ { 0 0 } } c T = \sqrt { 1 + \frac { 2 \phi } { c ^ { 2 } } } c T \sim c T + \sqrt { \frac { G \hbar } { c ^ { 4 } R T } } c T$$ giving that $$( \Delta s ) ^ { 2 } \equiv ( s ^ { \prime } - c T ) ^ { 2 } \sim l _ { p } ^ { 2 } \frac { s } { R },$$ which with the assumption R = ∆ s becomes the Karolyhazy relation ∆ s 3 = l 2 p s . [Equating R and ∆ s is justified because we are looking for the minimum length uncertainty; a smaller value of R would increase ∆ s and a larger value of R would imply that the actual uncertainty is R and not ∆ .] s Furthermore, it can be shown that the averaged potential in the D-model also implies the K-model spacetime bound, provided the white noise correlation is assumed. We calculate the stochastic world line length similar to s β in K-model but now with a spacetime averaged potential ˜ = φ 1 V T ∫ ∫ φ ( x , t ) d xdt 3 : $$s = \int _ { 0 } ^ { T } \sqrt { 1 + \frac { 2 \tilde { \phi } } { c ^ { 2 } } } c \, d t.$$ Note that here ˜ is a stochastic variable and the line element φ s thus obtained is also stochastic. Hence, $$s - s _ { a v r g } \simeq c \int _ { 0 } ^ { T } \frac { \tilde { \phi } } { c ^ { 2 } } \, d t$$ where s avrg = cT . Next we calculate ∆ s 2 = ( 〈 s -s avrg ) 2 〉 : $$\Delta s ^ { 2 } = \frac { 1 } { c ^ { 2 } } \left \langle \int _ { 0 } ^ { T } \tilde { \phi } \, d t ^ { \prime } \int _ { 0 } ^ { T } \tilde { \phi } \, d t ^ { \prime \prime } \right \rangle.$$ As ˜ has already been averaged over the measuring time φ T , it depends only weakly on t and can be thought to remain almost constant within time T . Using this, we can directly integrate over time to get $$\Delta s ^ { 2 } = \frac { T ^ { 2 } } { c ^ { 2 } } \langle \tilde { \phi } ^ { 2 } \rangle \.$$ Now, we explicitly calculate 〈 ˜ φ 2 〉 , $$\langle \tilde { \phi } ^ { 2 } \rangle = \frac { 1 } { V ^ { 2 } T ^ { 2 } } \left \langle \int \int \phi ( { \mathbf x }, t ) \, d ^ { 3 } x \, d t \int \int \phi ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \, d ^ { 3 } x ^ { \prime } \, d t ^ { \prime } \right \rangle \,.$$ Using the two point correlation function (42) we get, $$\langle \tilde { \phi } ^ { 2 } \rangle = \frac { \hbar { G } T } { V ^ { 2 } T ^ { 2 } } \int \int \frac { 1 } { | \vec { x } - \vec { x ^ { \prime } } | } \, d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \,.$$ We now calculate the double integral by first denoting /vector x ≡ ( x , x 1 2 , x 3 ) and /vector x ′ ≡ ( x , x ′ 1 ′ 2 , x ′ 3 ) and make a coordinate transformation as follows: $$s = x _ { 1 } - x _ { 1 } ^ { \prime }, \ \ p = x _ { 2 } - x _ { 2 } ^ { \prime }, \ \ q = x _ { 3 } - x _ { 3 } ^ { \prime }, \ \ l = x _ { 1 } + x _ { 1 } ^ { \prime }, \ \ m = x _ { 2 } + x _ { 2 } ^ { \prime }, \ \ n = x _ { 3 } + x _ { 3 } ^ { \prime }.$$ This allows us to write the integral as: $$\frac { 1 } { | \det J | } \int \int \frac { 1 } { \sqrt { s ^ { 2 } + p ^ { 2 } + q ^ { 2 } } } \, d s \, d p \, d q \, d l \, d m \, d n = \frac { 1 } { | \det J | } \int \int \frac { 1 } { r } \, d ^ { 3 } r \, d l \, d m \, d n. \\ \text{To find the limits of integration, we note that since the dimension of the probe is } R, \, \text{we can say,}$$ To find the limits of integration, we note that since the dimension of the probe is R , we can say, $$x _ { 1 }, x _ { 2 }, x _ { 3 }, x _ { 1 } ^ { \prime }, x _ { 2 } ^ { \prime }, x _ { 3 } ^ { \prime } \colon - R / 2 \to R / 2, \quad r \colon 0 \to R$$ and, evaluating the integral, we get $$\int \int \frac { 1 } { | \vec { x } - \vec { x ^ { \prime } } | } \, d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \simeq R ^ { 5 }.$$ This is of the order V 2 /R , and substituting this result back in the original equation, we get $$\Delta s ^ { 2 } = \frac { l _ { p } ^ { 2 } } { R } s,$$ where s = cT . Now R ≈ ∆ reproduces the K-model bound, s $$\Delta s ^ { 3 } = l _ { p } ^ { 2 } s \.$$ We thus see that the minimal spacetime bounds in the D-model and in the K-model are essentially equivalent, and the difference in their final results is coming about because in one model the noise is white, and in the other it is not. We have seen above that in the K-model the decoherence time is estimated by setting the phase variance to be of the order π 2 . On the other hand, in the D-model, decoherence time is estimated from the master equation. We show below that in the D-model, the phase variance method gives the same result for decoherence time, as the master equation. This suggests that the phase variance method could well be sufficiently general, and equivalent to the master equation method, for a non-Markovian equation as well. The phase of a wavefunction moving in a potential U β ( x , t ) after time T is, $$\delta _ { \beta } ( { \mathbf x }, T ) = - \frac { 1 } { \hbar } \int _ { 0 } ^ { T } U _ { \beta } ( { \mathbf x }, t ) \, d t \.$$ In Di´si's model, the potential for a given configuration o X is given as follows [63]: $$U ( { \mathbf X }, t ) = \int _ { v o l } \phi ( { \mathbf x }, t ) f ( { \mathbf x } | { \mathbf X } ) \, d ^ { 3 } x$$ where f ( x X | ) denotes the mass density function at a point x for the configuration X . Thus phases accumulated at time t at configuration X is $$\delta ( { \mathbf X }, t ) = - \frac { 1 } { \hbar } \int _ { 0 } ^ { t } \int _ { v o l } \phi ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) f ( { \mathbf x } ^ { \prime } | { \mathbf X } ) \, d ^ { 3 } x ^ { \prime } \, d t ^ { \prime } \,,$$ We now evaluate the variance 〈 [ δ ( X , t ) -δ ( X ′ , t )] 2 〉 . We can write $$\langle [ \delta ( { \mathbf X }, t ) - \delta ( { \mathbf X } ^ { \prime }, t ) ] ^ { 2 } \rangle = \frac { 1 } { h ^ { 2 } } \left \langle \left [ \int _ { 0 } ^ { t } \int _ { v o l } \phi ( { \mathbf X } ^ { \prime }, t ^ { \prime } ) f ( { \mathbf X } ^ { \prime } | { \mathbf X } ) \, d ^ { 3 } x ^ { \prime } \, d t ^ { \prime } - \int _ { 0 } ^ { t } \int _ { v o l } \phi ( { \mathbf X } ^ { \prime \prime }, t ^ { \prime \prime } ) f ( { \mathbf X } ^ { \prime } | { \mathbf X } ^ { \prime } ) \, d ^ { 3 } x ^ { \prime \prime } \, d t ^ { \prime \prime } \right ] ^ { 2 } \right \rangle \,,$$ calculate term by term and take the stochastic average using Eqn. (42). The square modulus of the first term is $$\left \langle \int _ { 0 } ^ { T } \int _ { v o l } \phi ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) f ( { \mathbf x } ^ { \prime } | { \mathbf x } ) \int _ { 0 } ^ { T } \int _ { v o l } \phi ( { \mathbf x }, t ^ { \prime \prime } ) f ( { \mathbf x } | { \mathbf x } ) \, d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \, d t ^ { \prime } \, d t ^ { \prime \prime } \right \rangle \\ = \frac { G T } { \hbar } \int _ { v o l } \int _ { v o l } f ( { \mathbf x } ^ { \prime } | { \mathbf x } ) f ( { \mathbf x } | { \mathbf x } ) \frac { 1 } { | { \mathbf x } - { \mathbf x } ^ { \prime } | } \, d ^ { 3 } x \, d ^ { 3 } x ^ { \prime }. \\.. \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots$$ Similarly evaluating the square modulus of the second term and the cross term and summing those, we finally get, $$\langle [ \delta ( { \mathbf X }, T ) - \delta ( { \mathbf X } ^ { \prime }, T ) ] ^ { 2 } \rangle = \frac { G T } { \hbar } \int \int d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \frac { [ f ( { \mathbf x } | { \mathbf X } ) - f ( { \mathbf x } | { \mathbf X } ^ { \prime } ) ] [ f ( { \mathbf x } ^ { \prime } | { \mathbf X } ) - f ( { \mathbf x } ^ { \prime } | { \mathbf X } ^ { \prime } ) ] } { | { \mathbf x } - { \mathbf x } ^ { \prime } | } \,.$$ For decoherence, we need 〈 [ δ ( X , T ) -δ ( X ′ , T )] 2 〉 ≈ π 2 . This gives us a decay time scale, $$\tau _ { d } ^ { - 1 } = \frac { G } { \pi ^ { 2 } \hbar } \int \int d ^ { 3 } x \, d ^ { 3 } x ^ { \prime } \frac { [ f ( \mathbf x | \mathbf X ) - f ( \mathbf x | \mathbf X ^ { \prime } ) ] [ f ( \mathbf x ^ { \prime } | \mathbf X ) - f ( \mathbf x ^ { \prime } | \mathbf X ^ { \prime } ) ] } { | \mathbf x - \mathbf x ^ { \prime } | }.$$ This is same as the decay time obtained by Di´si using the master equation o apart from some constant factors. Thus use of master equation or phase variance method gives similar result for the decay time. This suggests that the phase variance method is possibly a more general one which can give decay time for both white and non-white noise. ## IV. SPACETIME UNCERTAINTY BOUND AND THE NOISE CORRELATION We have seen that in K-model and in D-model, the correlation functions of the potentials are completely different. Let us now try to find a general form of such potentials which would satisfy the following bound: $$\Delta s ^ { 3 } & \sim l _ { p } ^ { 2 } s.$$ The most general form of the potential is, $$\phi ( { \mathbf x }, t ) = K F _ { s t } ( { \mathbf x }, t ),$$ where K is a constant with a suitable combination of G c , and /planckover2pi1 . Now we will use this form to calculate the uncertainty in the length of a line element. Then we have, $$s ^ { \prime } & = \int _ { 0 } ^ { T } \sqrt { g _ { 0 0 } } c d t = \int _ { 0 } ^ { T } \sqrt { 1 + K F _ { s t } ( \mathbf x, t ) } c d t \approx c \int _ { 0 } ^ { T } \left ( 1 + \frac { 1 } { 2 } K F _ { s t } ( \mathbf x, t ) \right ) d t. \\ \text{--} \quad \. & \quad \ \.$$ If we write s = cT , then $$( s ^ { \prime } - s ) ^ { 2 } = \frac { K ^ { 2 } c ^ { 2 } } { 4 } \left ( \int _ { 0 } ^ { T } F _ { s t } ( { \mathbf x }, t ) d t \right ) ^ { 2 } \,.$$ The uncertainty in the measurement of the length is obtained, as in the K-model, by averaging Eqn. (62): ∆ s 2 = ( 〈 s ′ -s ) 2 〉 . We assume the correlation function of F st ( x , t ) to be separable in space and time, i.e. $$\langle F _ { s t } ( { \mathbf x }, t ) F _ { s t } ( { \mathbf x } ^ { \prime }, t ^ { \prime } ) \rangle = P ( { \mathbf x }, { \mathbf x } ^ { \prime } ) g ( t, t ^ { \prime } ),$$ which leads to: $$\Delta s ^ { 2 } = \frac { K ^ { 2 } c ^ { 2 } } { 4 } P ( { \mathbf x }, { \mathbf x } ) \int _ { 0 } ^ { T } \int _ { 0 } ^ { T } g ( t, t ^ { \prime } ) \, d t \, d t ^ { \prime } \.$$ The linear size of the object under consideration is R . At this point we impose the following three relations: $$\Delta s ^ { 3 } \sim l _ { p } ^ { 2 } s \quad R \sim \Delta s \quad s \sim c T.$$ For the above class of solutions, where we assumed that the noise correlation is separable in space and time coordinates, to obtain the Karolyhazy uncertainty relation, P ( x x , ) must be independent of x (e.g. P ( x x , ′ ) might depend on | x -x ′ | ), but it can be a function of R and g t, t ( ′ ) can have a number of solutions such that the two point correlation function is given by: $$g ( t, t ^ { \prime } ) = T ^ { m } t ^ { n _ { 1 } } t ^ { ^ { \prime } n _ { 2 } }.$$ We note that the form of the correlation function suggested above is neither the most general nor motivated from symmetries. However a large number of correlation functions can be constructed from the form given above and the linear combinations thereof. In general, the correlation function can take other forms also (e.g. a function of ( t -t ′ ) as we have already shown in the previous section). We now show below how different solutions lead to the same K-bound. Using the two point correlation in Eqn. (65), we find, $$\Delta s ^ { 2 } = \frac { K ^ { 2 } c ^ { 2 } } { 4 } P ( { \mathbf x }, { \mathbf x } ) \frac { T ^ { m + n _ { 1 } + n _ { 2 } + 2 } } { ( n _ { 1 } + 1 ) ( n _ { 2 } + 1 ) }.$$ The constants can be adjusted to reproduce the K-bound from the above equation for different choices of { m,n ,n 1 2 } . Below we illustrate some examples for a simplified version where n 1 = n 2 = n . - 1) P ( x x , ) = 1 R . In this case, we have, $$\Delta s ^ { 2 } \in \frac { 1 } { R } T ^ { m + 2 n + 2 }.$$ Now, since R ∼ ∆ and s s ∝ T , we can write, from the above equation, $$\Delta s ^ { 3 } \in s ^ { m + 2 n + 2 }$$ and so, we must have, m +2 n +2 = 1 which gives m/ 2 + n = -1 2. / For this, we find, $$\langle \phi ^ { 2 } ( { \mathbf x }, t ) \rangle = \frac { K ^ { 2 } } { R } T ^ { m } t ^ { 2 n }.$$ All such φ ( x , t ), for which m 2 + n = -1 2 , are possible solutions. Note that m = -1 , n = 0 gives the form 〈 φ 2 〉 = G /planckover2pi1 RT which we had already predicted as a possible form of Di´si stochastic o potential in Eqn. (47). $$2 ) \ P ( { \mathbf x }, { \mathbf x } ) = 1. \text{ We get}$$ $$\Delta s ^ { 2 } \in s ^ { m + 2 n + 2 }.$$ Since, according to K-bound, it must be $$\Delta s ^ { 2 } \in s ^ { 2 / 3 },$$ we get the condition: $$m + 2 n + 2 = \frac { 2 } { 3 }.$$ In general, we can say that if P ( x x , ) has a form P ( x x , ) = R 2 j where j is real, then the condition it must satisfy is $$1 - j = \frac { 3 } { 2 } ( m + 2 n + 2 ).$$ Thus, we see that for different choices of j , m and n we get different potentials all satisfying the Karolyhazy uncertainty relation. This has been shown for separable forms only. In general, the solution can be non-separable also, as in the K-model, where γ ( x , t ) cannot be separated in space and time coordinates. We conclude that, given the uncertainty in measurement or the space-time bound, the form of the potential cannot be uniquely determined. There is a whole class of solutions as discussed which lead to the same bound. It seems that the γ in K-model and φ in Di´si's o model are two special cases which simplify the mathematical treatment, but they are not unique choices. We are not suggesting that the above examples given by us are necessarily that of physically realistic noise, but rather that more work needs to be done to uniquely determine the gravitational noise correlation. It is important to compare our analysis with that of Di´si and Luk´cs [DL] [69] who in their o a Eqn. (8) propose that the fundamental geodesic uncertainty relation is $$\Delta s ^ { 2 } \approx l _ { p } ^ { 2 } \frac { s } { R },$$ which is the same as our Eqns. (49) and (53) but different from the Karolyhazy relation (1). To our understanding, DL suggest that (68), rather than (1), is the fundamental relation. Through their analysis leading up to their Eqn. (11), which is $$( \Phi ) _ { R, T } & \approx \sqrt { \hbar { G } / R T },$$ they relate (68) to the metric uncertainty in their Eqn. (11), which is the same as our Eqn. (47). On the other hand, as we have argued below Eqn. (49), one should set R ∼ ∆ for optimal minimal s uncertainty, in which case Eqn. (68) above becomes the same as the Karolyhazy uncertainty bound (1). In (68) above, it appears that increasing R decreases ∆ s , but if R &gt; ∆ s this does not seem physically reasonable, since the uncertainty would be bounded from below by the probe size R . Hence R ∼ ∆ seems optimal. s Thus it seems to us that the main difference between the work of DL and our work is that whereas DL suggest the spacetime bounds in the two models are different, we have argued that the two bounds are actually equivalent to each other. Also, as we have attempted to demonstrate, the bound does not by itself favor white noise over colored noise, nor the other way around. It would appear that this issue is open for further examination. ## V. SUMMARY AND CONCLUDING REMARKS The K-model proposes a minimal spacetime uncertainty bound, namely the accuracy with which a length interval can be measured by a quantum probe. This bound is realized via a hypothesized coexisting family of metrics. The propagation of the wave function in this kind of a hazy spacetime is shown to lead to loss of coherence, which becomes relevant for macroscopic objects. We showed that this family of metrics can equivalently be interpreted as a stochastic potential, whose twopoint noise correlation can be worked out, and shown to be non-white noise. The Schr¨ odinger evolution takes place in the presence of this stochastic potential, and the master equation for the density matrix is non-Markovian. The D-model also proposes an, apparently different, spacetime bound, i.e. the accuracy with which the gravitational field averaged over a spacetime region can be measured by a quantum probe. This uncertainty in the gravitational field can be modeled by a stochastic potential, which is assumed to have a white noise correlation. The Schr¨ odinger evolution of the wave function takes place in this stochastic potential, making the wave function stochastic. A Markovian master equation for the density matrix is set up, and once again decoherence in position basis for large objects is demonstrated. The quantitative estimates for the decoherence time and localization length are however different from those of the K-model. We showed that the spacetime uncertainty bounds in the two models are essentially equivalent to each other. We then argued that the difference in the quantitative results of the two models is due to the assumed nature of the noise - white in one case, and coloured in the other case. We also argued that the spacetime bound does not uniquely predict the noise correlation, and many choices are possible, each of which is likely to give different results for the decoherence time scale. White noise may be the simplest choice, but there seems to be no physical reason why gravitational effects must conform to white noise. Thus it would appear that additional criteria, apart from the minimal bound, are essential to precisely define a model of gravity induced decoherence. Nonetheless, it can be said that the role of gravity in decoherence is fundamentally suggested, and further investigation of this problem is highly desirable. Acknowledgements: The authors are grateful to Lajos Di´si o for bringing Ref. [69] to their attention, and for helpful correspondence.The work of TPS is supported by Grant # 39530 from the John Templeton Foundation. SD acknowledges support from NANOQUESTFIT, the COST Action MP1006 and INFN, Italy. SD and KL acknowledge the hospitality of the Tata Institute of Fundamental Research (Mumbai) where part of this work has been done. TPS would like to thank Aniket Agrawal for collaboration during the early stages of this work. ## REFERENCES [1] J. A. Wheeler and W. H. Zurek, Quantum theory and measurement (Princeton University Press, 1983). [2] J. S. Bell, Speakable and unspeakable in quantum mechanics (Cambridge University Press, Cambridge, 1987) pp. xii+212. - [3] D. Albert, Quantum mechanics and experience (Harvard University Press, Cambridge, MA, 1992). - [4] A. J. Leggett, J. Phys. Cond. Mat. 14 , R415 (2002). - [5] A. J. Leggett, Science 307 , 871 (2005). - [6] G. Ghirardi, Sneaking a Look at God's Cards: Unraveling the Mysteries of Quantum Mechanics (Princeton University Press, 2005). - [7] T. Maudlin, Quantum non-locality and relativity: metaphysical intimations of modern physics , 3rd ed. (Wiley-Blackwell, 2011). - [8] R. A. Harris and L. Stodolsky, J. Chem. Phys. 74 , 2145 (1981). - [9] M. Brune, E. Hagley, J. Dreyer, X. Maitre, A. Maali, C. Wunderlich, J. M. Raimonde, and S. Haroche, Phys. Rev. Lett. 77 , 4887 (1996). - [10] H.-P. Breuer and F. Petruccione, Relativistic quantum measurement and decoherence (Springer, 2000). - [11] E. Joos, H. Zeh, C. Kiefer, D. Giulini, J. Kupsch, and I.-O. Stamatescu, Decoherence and the appearance of a classical world in quantum theory (Springer Verlag, Berlin, 2003) p. 496. - [12] M. Schlosshauer, Decoherence and the quantum-to-classical transition (Springer: Berlin-Heidelberg, 2007). - [13] H. D. Zeh, Found. Phys. 1 , 69 (1970). - [14] A. O. Caldeira and A. J. Leggett, Physical Review Letters 46 , 211 (1981). - [15] E. Joos and H. Zeh, Z. Phys. 59 , 223 (1985). - [16] W. H. Zurek, Rev. Mod. Phys. 75 , 715 (2003). - [17] H. Everett III, Rev. Mod. Phys. 29 , 454 (1957). - [18] D. S. DeWitt and N. Graham, The many-worlds interpretation of Quantum Mechanics (Princeton University Press, Princeton, NJ, 1973). - [19] A. Kent, Int. J. Mod. Phys. A5 , 1745 (1990). - [20] D. Deutsch, The fabric of reality: the science of parallel universes and its implications (Penguin Books, 1998). - [21] L. Vaidman, 'http://plato.stanford.edu/entries/qm-manyworlds/,' (2002). - [22] D. Wallace, Stud. Hist. Philos. Mod. Phys. 34 , 415 (2003). - [23] H. Putnam, British J. Philos. Sci. 56 , 615 (2005). - [24] M. Tegmark, Nature 448 , 23 (2007). - [25] J. A. Barrett and P. Byrne, eds., The Everett Interpretation of Quantum Mechanics: Collected Works 1955-1980 (Princeton University Press, 2012). - [26] S. Saunders, J. Barrett, A. Kent, and D. Wallace, eds., Many Worlds? Everett, Quantum Theory, &amp; Reality (Oxford University Press, 2010). - [27] D. Bohm, Phys. Rev. 85 , 166 (1952). - [28] D. Bohm, Phys. Rev. 85 , 180 (1952). - [29] D. D¨ urr and S. Teufel, Bohmian Mechanics (Springer, 2009). - [30] P. R. Holland, The Quantum Theory of Motion: An Account of the de Broglie-Bohm Causal Interpretation of Quantum Mechanics (Cambridge University Press, 1993). - [31] D. Bohm and B. J. Hiley, The Undivided Universe: An Ontological Interpretation of Quantum Theory (Routledge, New York, 1995). - [32] J. Bub, Interpreting the quantum world (Cambridge University Press, 1997). - [33] D. D¨ urr and S. Goldstein, Quantum physics without quantum philosophy (Springer, 2012). - [34] P. Pearle, Phys. Rev. D 13 , 857 (1976). - [35] P. Pearle, Int. J. Theo. Phys. 18 , 489 (1979). - [36] P. Pearle, Found. Phys. 12 , 249 (1982). - [37] P. Pearle, Phys. Rev. D 29 , 235 (1984). - [38] P. Pearle, Phys. Rev. A 39 , 2277 (1989). - [39] P. Pearle, in Open Systems and Measurement in Relativistic Quantum Theory , Lecture Notes in Physics, Vol. 526 (Springer Verlag, Berlin, 1999). - [40] N. Gisin, J. Phys. A 14 , 2259 (1981). - [41] N. Gisin, Phys. Rev. Lett. 52 , 1657 (1984). - [42] N. Gisin, Helv. Phys. Acta 62 , 363 (1989). - [43] L. Di´si, Phys. Lett. A o 129 , 419 (1988). - [44] L. Di´si, J. Phys. A o 21 , 2885 (1988). - [45] N. Gisin and M. Rigo, J. Phys. A 28 , 7375 (1995). - [46] S. Weinberg, arXiv:1109.6462 (2011). - [47] G. C. Ghirardi, A. Rimini, and T. Weber, Phys. Rev. D 34 , 470 (1986). - [48] M. Arndt and K. Hornberger, Nature Physics 10 , 271 (2014). - [49] A. Bassi, K. Lochan, S. Satin, T. P. Singh, and H. Ulbricht, Rev. Mod. Phys. 85 , 471 (2013). - [50] G. C. Ghirardi, P. Pearle, and A. Rimini, Phys. Rev. A 42 , 78 (1990). - [51] S. L. Adler, Quantum theory as an emergent phenomenon (Cambridge University Press, Cambridge, 2004) pp. xii+225. - [52] F. Karolyhazy, Nuovo Cimento 42A , 390 (1966). - [53] F. Karolyhazy, A. Frenkel, and B. Luk´cs, in a Quantum concepts in space and time , edited by R. Penrose and C. J. Isham (Clarendon, Oxford, 1986). - [54] F. Karolyhazy, Magy. Fiz. Foly. 22 , 23 (1974). - [55] F. Karolyhazy, in Sixty-two years of uncertainty , edited by A. Miller (Plenum, New York, 1990). - [56] F. Karolyhazy, in Fundamental problems of quantum physics , edited by M. Ferrero and A. van der Merwe (Kluwer Acad. Publ., Netherlands, 1995). - [57] F. Karolyhazy, A. Frenkel, and B. Lukacs, in Physics as natural philosophy , edited by A. Shimony and H. Feshbach (MIT Press, Cambridge, 1982). - [58] A. Frenkel, Found. Phys. 32 , 751 (2002). - [59] A. Frenkel, Found. Phys. 20 , 159 (1990). - [60] A. Frenkel, in Fundamental problems of quantum physics , edited by M. Ferrero and A. van der Merwe (Kluwer Acad. Publ., Netherlands, 1995). - [61] A. Frenkel, in Experimental Metaphysics , Vol. 1, edited by A. Shimony, R. S. Cohen, M. Horne, and J. Stachel (Kluwer Acad. Publ., Boston, 1997) p. 39. - [62] L. Di´si and B. Lukacs, Annalen der Physik o 44 , 488 (1987). - [63] L. Di´si, Physics Letters A o 120 , 377 (1987). - [64] L. Di´si, Phys. Rev. A o 40 , 1165 (1989). - [65] R. Penrose, Gen. Rel. Grav. 28 , 581 (1996). - [66] M. Bahrami, A. Großardt, S. Donadi, and A. Bassi, New J. Phys. 11 , 115007 (2014). - [67] T. P. Singh, arXiv:1501.03040 (2014). - [68] S. L. Adler and A. Bassi, J. Phys. A 40 , 15083 (2007). - [69] L. Di´si and B. Luk´cs, Phys. Lett. A o a 142 , 331 (1989). - [70] C. Kiefer and T. P. Singh, Phys. Rev. D 44 , 1067 (1991). - [71] G. Ghirardi, R. Grassi, and A. Rimini, Phys. Rev. A 42 , 1057 (1990). - [72] M. Bahrami, A. Smirne, and A. Bassi, Phys. Rev. A 90 , 062105 (2014).
null
[ "Sayantani Bera", "Sandro Donadi", "Kinjalk Lochan", "Tejinder P. Singh" ]
2014-08-06T06:53:05+00:00
2015-06-28T14:53:03+00:00
[ "quant-ph", "gr-qc" ]
A comparison between models of gravity induced decoherence
It has been suggested in the literature that spatial coherence of the wave function can be dynamically suppressed by fluctuations in the spacetime geometry. These fluctuations represent the minimal uncertainty that is present when one probes spacetime geometry with a quantum probe. Two similar models have been proposed, one by Di\'osi [D-model] and one by Karolyhazy and collaborators [K-model], based on apparently unrelated minimal spacetime bounds. The two models arrive at somewhat different expressions for the dependence of the localization coherence length on the mass and size of the quantum object. In the present article we compare and contrast the two models from three aspects: (i) comparison of the spacetime bounds, (ii) method of calculating decoherence time, (iii) comparison of noise correlation. We show that under certain conditions the minimal spacetime bounds in the two models can be derived one from the other. We argue that the methods of calculating the decoherence time are equivalent. We re-derive the two-point correlation for the fluctuation potential in the K-model, and confirm the earlier result of Di\'osi and Luk\'acs that it is non-white noise, unlike in the D-model, where the corresponding correlation is white noise in time. This seems to be the origin of the different results in the two models. We derive the non-Markovian master equation for the K-model. We argue that the minimal spacetime bound cannot predict the noise correlation uniquely, and additional criteria are necessary to accurately determine the effects of gravitationally induced decoherence.
1408.1195v1
## Search for Proton Decay via p → ν K + using 260 kiloton year data of Super-Kamiokande · K. Abe, 1,26 Y. Hayato, 1,26 K. Iyogi, 1 J. Kameda, 1,26 M. Miura, 1,26 S. Moriyama, 1,26 M. Nakahata, 1,26 S. Nakayama, 1,26 R. A. Wendell, 1,26 H. Sekiya, 1,26 M. Shiozawa, 1,26 Y. Suzuki, 1,26 A. Takeda, 1,26 Y. Takenaga, 1 K. Ueno, 1 T. Yokozawa, 1 H. Kaji, 2 T. Kajita, 2, 26 K. Kaneyuki, 2,26, ∗ K. P. Lee, 2 K. Okumura, 2 T. McLachlan, 2 L. Labarga, 3 E. Kearns, 4,26 J. L. Raaf, 4 J. L. Stone, 4, 26 L. R. Sulak, 4 M. Goldhaber, 5, ∗ K. Bays, 6 G. Carminati, 6 W. R. Kropp, 6 S. Mine, 6 A. Renshaw, 6 M. B. Smy, 6,26 H. W. Sobel, 6,26 K. S. Ganezer, 7 J. Hill, 7 W. E. Keig, 7 J. S. Jang, 8 J. Y. Kim, 8 I. T. Lim, 8 J. B. Albert, 9 K. Scholberg, 9,26 C. W. Walter, 9,26 T. Wongjirad, 9 T. Ishizuka, 10 S. Tasaka, 11 J. G. Learned, 12 S. Matsuno, 12 S. N. Smith, 12 T. Hasegawa, 13 T. Ishida, 13 T. Ishii, 13 T. Kobayashi, 13 T. Nakadaira, 13 K. Nakamura, 13,26 K. Nishikawa, 13 Y. Oyama, 13 K. Sakashita, 13 T. Sekiguchi, 13 T. Tsukamoto, 13 A. T. Suzuki, 14 Y. Takeuchi, 14 K. Ieki, 15 M. Ikeda, 15 H. Kubo, 15 A. Minamino, 15 A. Murakami, 15 T. Nakaya, 15,26 Y. Fukuda, 16 K. Choi, 17 Y. Itow, 17 G. Mitsuka, 17 M. Miyake, 17 P. Mijakowski, 29 J. Hignight, 18 J. Imber, 18 C. K. Jung, 18 I. Taylor, 18 C. Yanagisawa, 18 H. Ishino, 19 A. Kibayashi, 19 Y. Koshio, 19 T. Mori, 19 M. Sakuda, 19 J. Takeuchi, 19 Y. Kuno, 20 S. B. Kim, 21 H. Okazawa, 22 Y. Choi, 23 K. Nishijima, 24 M. Koshiba, 25 Y. Totsuka, 25, ∗ M. Yokoyama, 25,26 K. Martens, 26 Ll. Marti, 26 Y. Obayashi, 26 M. R. Vagins, 26,6 S. Chen, 27 H. Sui, 27 Z. Yang, 27 H. Zhang, 27 K. Connolly, 28 M. Dziomba, 28 and R. J. Wilkes 28 (The Super-Kamiokande Collaboration) 1 Kamioka Observatory, Institute for Cosmic Ray Research, University of Tokyo, Kamioka, Gifu 506-1205, Japan 2 Research Center for Cosmic Neutrinos, Institute for Cosmic Ray Research, University of Tokyo, Kashiwa, Chiba 277-8582, Japan 3 Department of Theoretical Physics, University Autonoma Madrid, 28049 Madrid, Spain 4 Department of Physics, Boston University, Boston, MA 02215, USA 5 Physics Department, Brookhaven National Laboratory, Upton, NY 11973, USA 6 Department of Physics and Astronomy, University of California, Irvine, Irvine, CA 92697-4575, USA 7 Department of Physics, California State University, Dominguez Hills, Carson, CA 90747, USA 8 Department of Physics, Chonnam National University, Kwangju 500-757, Korea 9 Department of Physics, Duke University, Durham NC 27708, USA 10 Junior College, Fukuoka Institute of Technology, Fukuoka, Fukuoka 811-0295, Japan 11 Department of Physics, Gifu University, Gifu, Gifu 501-1193, Japan 12 Department of Physics and Astronomy, University of Hawaii, Honolulu, HI 96822, USA 13 High Energy Accelerator Research Organization (KEK), Tsukuba, Ibaraki 305-0801, Japan 14 Department of Physics, Kobe University, Kobe, Hyogo 657-8501, Japan 15 Department of Physics, Kyoto University, Kyoto, Kyoto 606-8502, Japan 16 Department of Physics, Miyagi University of Education, Sendai, Miyagi 980-0845, Japan 17 Solar Terrestrial Environment Laboratory, Nagoya University, Nagoya, Aichi 464-8602, Japan 18 Department of Physics and Astronomy, State University of New York at Stony Brook, NY 11794-3800, USA 19 Department of Physics, Okayama University, Okayama, Okayama 700-8530, Japan 20 Department of Physics, Osaka University, Toyonaka, Osaka 560-0043, Japan 21 Department of Physics, Seoul National University, Seoul 151-742, Korea 22 Department of Informatics in Social Welfare, Shizuoka University of Welfare, Yaizu, Shizuoka, 425-8611, Japan 23 Department of Physics, Sungkyunkwan University, Suwon 440-746, Korea 24 Department of Physics, Tokai University, Hiratsuka, Kanagawa 259-1292, Japan 25 The University of Tokyo, Bunkyo, Tokyo 113-0033, Japan 26 Kavli Institute for the Physics and Mathematics of the Universe (WPI), Todai Institutes for Advanced Study, University of Tokyo, Kashiwa, Chiba 277-8582, Japan 27 Department of Engineering Physics, Tsinghua University, Beijing, 100084, China 28 Department of Physics, University of Washington, Seattle, WA 98195-1560, USA 29 National Centre For Nuclear Research, 00-681 Warsaw, Poland (Dated: August 7, 2014) We have searched for proton decay via p → ν K + using Super-Kamiokande data from April 1996 to February 2013, 260 kiloton year exposure in total. No evidence for this proton decay mode is found. A lower limit of the · proton lifetime is set to τ / B p ( → ν K + ) &gt; . 5 9 × 10 33 years at 90% confidence level. PACS numbers: 12.10.Dm,13.30.-a,12.60.Jv,11.30.Fs,29.40.Ka ## I. INTRODUCTION for many experimental results. However, the standard model offers no guidance on the unification of the strong and electroweak forces, and has many other open questions. Various attempts have been made to resolve the shortcomings by unifying the strong and electroweak interactions in a single larger gauge group, i.e. a Grand Unified Theory (GUT) [1]. GUTs are motivated by the apparent convergence of the running couplings of the strong, weak, and electromagnetic forces at a high energy scale (10 15 -10 16 GeV). Energy scales this large are out of the reach of accelerators but may be probed by virtual processes such as those that govern particle decay. A general feature of GUTs is the instability of nucleons by baryon number violating decay. Nucleon decay experiments are direct experimental tests of the general idea of grand unification. In GUTs, nucleon decay can proceed via exchange of a massive gauge boson between two quarks. The favored gauge-mediated decay mode in many GUTs is p → e + π 0 . In the minimal SU(5) GUT, the predicted proton lifetime to e + π 0 is 10 31 ± 1 years, which has been ruled out by experimental results from IMB [2], Kamiokande [3], and SuperKamiokande [4]. GUT models incorporating supersymmetry [6] (SUSY-GUTs) raise the GUT scale [7], suppressing the decay rate of p → e + π 0 , thereby allowing compatibility with the experimental limit. However, SUSY-GUTs introduce dimension five operators that enable the mode p → ν K + to have a high branching fraction and short partial lifetime [8]. In the SUSY SU(5) GUT with minimal assumptions and TeV scale SUSY particles, the partial proton lifetime to ν K + is less than 10 31 years [9], which has also been excluded by previously published experimental constraints [2, 3, 5]. Nonminimal SUSY SU(5) GUTs [11] or SUSY GUTs based on SO(10) [12] have been constructed that evade this limit, yet still predict partial lifetimes in the range 10 32 to 10 35 years, with some particular models that require the lifetime be less than a few times 10 34 years. The low ends of the lifetime predictions by these models are probed by this experimental search. In this paper, our search is for the two-body decay of proton to a K + and a neutrino. In most models, ( B -L ) is conserved and the final state contains an anti-neutrino; however we do not detect the neutrino and cannot distinguish p → ν K + from p → ν K + , nor can we determine the flavor ( e , µ , or τ ) of the neutrino. In fact, our search can be applied to any nearly massless neutral final-state particle such as a gravitino or axino. The Super-Kamiokande collaboration published a search for p → ν K + with 91.7 kton years exposure of the first phase · of the experiment, and set a partial lifetime limit τ ( p → ν K + ) &gt; 2 3 . × 10 33 years [10]. In this paper, we refine the analysis and update the search with 2.8 times greater detector exposure including later phases of the experiment. ## II. SUPER-KAMIOKANDE DETECTOR Super-Kamiokande [13] is a large water Cherenkov detector. It is an upright cylinder in shape, 39 m in diameter and 40m in height, and it contains 50 kton of pure water. It lies about 1,000m underneath the top of Mt. Ikenoyama (2,700 m TABLE I: Summary of data sets that are used in this paper. | Live days | | kton · yr | Coverage | Note | |-------------|--------|-------------|------------|-------------------------| | SK-I | 1489.2 | 91.7 | 40% | | | SK-II | 798.6 | 49.2 | 19% | Half PMT density | | SK-III | 518.1 | 31.9 | 40% | | | SK-IV | 1417.4 | 87.3 | 40% | New readout electronics | water equivalent underground) to reduce cosmic ray background. The detector is optically separated into two regions: inner detector (ID) and outer detector (OD). Cherenkov light in the ID is detected by 20-inch PMTs [14] facing inward, evenly covering the cylindrical inner surface. Cherenkov light from penetrating particles, usually cosmic ray muons or exiting muons, is detected by 8-inch PMTs facing outward. The fiducial volume is defined as a cylindrical volume with surfaces 2 meters inwards from the ID PMT plane. The fiducial mass is 22.5 ktons, corresponding to 7 5 . × 10 33 protons. Super-Kamiokande started observation in April 1996 with 11,146 PMTs which covered 40% of the ID surface. The observation was continued until July 2001, with 1489.2 live days, or equivalently, 91.7 kton years. · This period is called Super-Kamiokande-I (SK-I). After an accident in 2001, about half of the ID PMTs were lost and the detector was reconstructed with 5,182 ID PMTs uniformly distributed over the cylindrical surface decreasing photo coverage to 19%. The PMTs were thereafter enclosed in acrylic and FRP cases. The period from December 2002 until October 2005, corresponding to 798.6 live days (49.2 kton years), is called SK-II. Af-· ter production and installation of replacement 20-inch PMTs, the photo coverage was recovered to 40% in 2006. The period between July 2006 and September 2008, corresponding to 518.1 live days (31.9 kton years), is defined as SK-III. In · the summer of 2008, we upgraded our electronics with improved performance including a data acquisition that records all PMT hit information without dead time [15]. This has been the configuration of the detector since September 2008; it is called SK-IV. In this paper, we use data until February 2013, corresponding to 1417.4 live days (87.3 kton years). · Table I summarizes the data sets used for the proton decay search in this paper. The trigger to record an event is based on the coincidence of the number of hit PMTs exceeding a threshold. For SK I-III, the trigger was implemented in hardware using a signal proportional to the number of hit PMTs produced by each front-end electronics module. For SK-IV, the trigger is implemented in software. The trigger threshold is less than 10 MeV for all SK periods, and the trigger efficiency for this proton decay mode is 100% 1 . The charge and timing of the PMTs are calibrated using various calibration sources [16]. The timing resolution of the 20- 1 For the case of prompt gamma tag (Method 1), with gamma energy typically 6 MeV, the muon from K + decay can provide the event trigger. inch PMT is about 2.1 nsec at the single photo-electron level. The PMT response, water quality, and reflections from the detector wall are tuned in the SK detector simulation program using injected light as well as various control data samples such as cosmic ray muons. ## III. SIMULATION To determine selection criteria for the proton decay search, and to estimate efficiencies and background rates, we use proton decay and atmospheric neutrino Monte Carlo (MC) simulations. Because the configuration of the detector is different in SK-I through IV, we generated MC samples for each period. Proton decay MC samples with 50,000 events are generated in an oversized volume which is 1 meter outside the fiducial volume boundary, and therefore 1 meter from the detector wall. This allows us to include event migration near the fiducial boundary in our estimates. The selection efficiency is defined as the number of events fulfilling all requirements divided by number of generated events in the fiducial volume. The MC equivalent of 500 years of atmospheric neutrino exposure are generated for each period. These atmospheric neutrino MC samples are used for our studies of neutrino oscillations [17]. Because the background rates for the proton decay studied in this paper are small (less than one event for the entire exposure for two of the analysis techniques), these large MC background samples provide fewer than 40 atmospheric neutrino events that survive the proton decay selection criteria. ## A. Proton Decay A water molecule contains two free protons and eight protons bound in the oxygen nucleus. In the decay of a free proton, the ν and the K + are emitted opposite each other with momenta of 339 MeV/ . In the case of proton decay in oxyc gen, Fermi momentum, correlation with other nucleons, nuclear binding energy, and kaon-nucleon interactions are taken into account as described below. We use the Fermi momentum and nuclear binding energy measured by electron- 12 C scattering [18]. Nuclear binding energy is taken into account by modifying the proton mass. Ten percent of decaying protons are estimated to have wave functions which are correlated with other nucleons within the nucleus [19]. These correlated decays cause the total invariant mass of the decay products to be smaller than the proton mass because of the momentum carried by the correlated nucleons. Figure 1 shows the invariant mass of the products of the decaying proton, K + and ν and the resulting kaon momenta after the simulation of the proton decay for both bound and free protons. Correlated decays produce the broad spectrum below about 850 MeV/ c 2 . In our experiment, the kaon momentum is unobserved because the kaon is always produced below the Cherenkov threshold of 749 MeV/ c in water. The majority of K + (89%) are stopped in water and decay at rest. We search for K + decay at rest into µ + ν µ (64% branching fraction) and π + π 0 (21% branching fraction). FIG. 1: (color online) The upper figure shows the decaying proton mass distribution in 16 O and the lower figure shows the K + momentum distribution from the simulation of p → ν K + . In the upper figure, the single-bin histogram shows the free proton case and the broad histogram shows the bound proton case. The rightmost peak in the bound proton case corresponds to the p -state, located slightly lower than the proton mass by 15.5 MeV of binding energy; the second rightmost peak is the s -state (39 MeV in binding energy). The correlated nucleon decay makes the longer tail in the lower mass region. In the lower figure, the single-bin histogram shows the free proton case (339 MeV/c) and the broad histogram shows the bound proton case which is smeared by Fermi motion. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-3b010047-d9d1-499c-a8c9-856e0c20af96.jpg) The position of the decaying proton in 16 O is calculated according to the Woods-Saxon nuclear density model [20]. The kaon nucleon interactions which are considered include elastic scattering and inelastic scattering via charge exchange. The type of interaction is determined using the calculated mean free path [21]. For kaons, whose momenta are described by Fig. 1, the probability of charge exchange for K + in p → ν K + is 0.14%. If a nucleon decays in the oxygen nucleus, the remaining nucleus can be left in an excited state from which it promptly de-excites by the emission of gamma rays. The prompt gamma emission processes are simulated based on reference [23]. The dominant gamma ray is 6.3 MeV from the p 3 / 2 state with 41% branching fraction. The probabilities of γ emission in this simulation are summarized in Table II. Other states emitting low energy gamma rays are averaged and assigned 3.5 MeV γ emission. Nuclear decay into states that emit protons or neutrons and nuclear decay into the ground state are taken to have no γ ray emission. TABLE II: Summary of probabilities of nuclear γ ray emissions at the de-excitation of the remaining nucleus. | State | Energy of γ | Probability | |-----------------------|---------------|---------------| | p 3 / 2 | 6.3 MeV | 41% | | p 3 / 2 | 9.9 MeV | 3% | | s 1 / 2 | 7.03 MeV | 2% | | s 1 / 2 | 7.01 MeV | 2% | | others | 3.5 MeV | 16% | | Other than γ emission | | | | p / n emission | - | 11% | | ground state | - | 25% | ## B. Atmospheric Neutrinos The SK standard atmospheric neutrino MC used in the previous neutrino oscillation analyses [17] and proton decay searches [4, 10, 24, 25] is used in this analysis. It is based on the Honda atmospheric neutrino flux [26] and NEUT [21] neutrino-nucleus interaction model. Some neutrino interactions which produce K mesons via resonances could be potential background sources for p → ν K + search. Cross sections of the single meson production via resonances are calculated based on Rein and Sehgal's theory [22]. In NEUT, the neutrino reactions: + → $$\nu \, n & \to l ^ { - } \, \Lambda \, K ^ { + } \\ \nu \, n & \to \nu \, \Lambda \, K ^ { 0 } \\ \nu \, p & \to \nu \, \Lambda \, K ^ { + } \\ \overline { \nu } \, p & \to l ^ { + } \, \Lambda \, K ^ { 0 } \\ \overline { \nu } \, n & \to \overline { \nu } \, \Lambda \, K ^ { 0 } \\ \overline { \nu } \, p & \to \overline { \nu } \, \Lambda \, K ^ { + }$$ are taken into account assuming the same cross section both for ν e and ν µ . The differential cross sections are shown in Fig. 2. We simulate propagation of the produced particles and Cherenkov light in water by custom code based on GEANT3 [27]. The propagation of charged pions in water is simulated by custom code based on Ref. [28] for less than 500MeV/ c and by GCALOR [29] for more than 500MeV/ . c The equivalent of 500 years of SK atmospheric neutrino data is simulated for each SK run period. The generated atmospheric neutrino samples are weighted to include the effect of ν µ disappearance due to ν µ -ντ oscillation assuming ∆ m 2 = 2 5 . × 10 -3 eV 2 and sin 2 2 θ = 1 0, ignoring the appear-. ance of ν e or ντ as a possible background. The final background event rates for each period are normalized by the observed total sub-GeV event rate. FIG. 2: (color online) Cross sections of the single K-meson productions via resonances calculated by NEUT. Upper plots show neutrino interactions and lower show anti-neutrino interactions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-4ddc731a-7438-4fbc-b928-dcd1561be3f5.jpg) ## IV. DATA SET, REDUCTION AND RECONSTRUCTION The vast majority of the triggered events are cosmic ray muons and low energy backgrounds from the radioactivity of materials around the detector wall. Several stages of data reduction were applied to the events before proceeding to further detailed event reconstruction processes. Details of the data reduction and reconstruction can be found in [17]. The fully contained (FC) data sample in the fiducial volume (FV) is defined by the following cuts: - · number of hit PMTs in the largest OD hit cluster is less than 10 for SK-I and 16 for other period. - · total visible energy is greater than 30 MeV in ID - · distance of the reconstructed vertex from the ID PMT surface is greater than 2 meters (corresponding to 22.5 kton of water volume) The rate of FCFV events is about 8 events per day. The contamination of events other than atmospheric neutrinos is estimated to be less than 1% and composed of cosmic rays that evaded the OD veto and events caused by flashing PMTs. Reconstruction algorithms are applied to the events remaining after the reduction process to determine the event vertex, the number of Cherenkov rings, the particle type of each ring, the momentum assigned to each ring, and number of Michel electrons. As a first step, the event vertex is defined as the point at which the timing distribution, after subtraction of the calculated time of flight of the photon from the vertex (TOF subtraction), has the sharpest peak. The dominant ring direction is determined from the charge distribution as a function of angle. Then other ring candidates are searched for using the Hough transform method [30], a technique for extracting a particular shape from an image, assuming all particles are generated in one vertex. Each ring candidate is tested against a likelihood function to remove fake rings before determining the final number of rings. Each ring is classified as e -like (showering type as from e ± , , γ ) or µ -like (non-showering type) based on a likelihood using the ring pattern and Cherenkov opening angle for single ring case, and only ring pattern for multi-ring case. Michel electrons from the decay of the µ ± are tagged by searching for clusters of in-time hits after the primary event. During the SK-I to SK-III periods, there was an impedance mismatch between cables and electronics which caused a signal reflection at 1000 ns after the main event. The time period between 800 ns and 1200ns from the primary events was excluded for the decay electron search due to this signal reflection. For SK-IV, the new electronics have better impedance matching to avoid signal reflection, and no such exclusion is required. As a result, the tagging efficiency of decay electrons from µ + with momentum of 236MeV/c has been improved from 85% (SK-I, II, and III) to 99% (SK-IV), which improves the selection efficiency for p → ν K + . The momentum for each ring is decided from the charge spatially inside of 70 ◦ from the ring direction and temporally from -50nsec to +250 nsec around the TOF-subtracted main event peak. The number of photoelectrons from each PMT are corrected by light attenuation in water, PMT acceptance, dark noise, time variation of gain, and track length in the case of µ -like rings. If a Michel electron is within 250 nsec of the parent particle, the time window for momentum determination is shortened and the charge sum is corrected from the nominal +250 nsec case. The momentum scale is checked by cosmic ray muons, Michel electrons from the cosmic ray muons which stop in the inner detector, and also the invariant mass distributions of π 0 events produced in atmospheric neutrino interactions. The uncertainty on the momentum scale is less than 3% for the entire period. An additional precise vertex fitter is applied only for singlering events. The expected charge for each PMT is calculated using the result of particle identification ( e -like or µ -like) and using the momentum estimate. The expected charge is compared with the observed charge by varying the vertex along the particle direction. The estimated vertex resolution for FC single-ring sub-GeV events is about 30 cm. ## V. ANALYSIS If a proton decays by p → ν K + , the K + itself is not visible in a water Cherenkov detector since its velocity is below Cherenkov threshold. However, the K + can be identified by its decay products in the decay modes K + → µ + ν and K + → π + π 0 . Being two-body decay processes, the daughter particles have monochromatic momentum in the K + rest frame: 236MeV/ c for µ + ν µ and 205MeV/ c for π + π 0 . There are three established methods for the p → ν K + mode search [5]: (Method 1) since the γ ray is promptly emitted at the time - of K + production, look for single muon events with a deexcitation γ ray just before the time of the muon; (Method 2) search for an excess of muon events with a momentum of 236 MeV/ c in the momentum distribution; and (Method 3) search for π + π 0 events with a momentum of 205 MeV/ . c ## A. Method 1: K + → µ + ν , tag by prompt gamma ray If this proton decay happens, the Super-K detector should observe a single µ -like ring preceded by PMT hits due to a nuclear deexcitation gamma ray. Figure 3 shows a graphical event display of the PMT hit pattern for an example event, as a Monte Carlo simulation of the proton decay. A prompt gamma ray, a muon, and a Michel electron peak should be observed in order, as seen in another example in Fig. 4, where the time of each particle is labeled as used in the analysis. To search for events tagged by the prompt gamma ray, single-ring µ -like events are selected by requiring the following criteria: - (A-1) a fully contained event with one non-showering ( µ -like) ring, - (A-2) there is one Michel decay electron, - (A-3) the reconstructed muon momentum is between 215 and 260MeV/ , c - (A-4) the distance between the vertices of the muon and the Michel electron is less than 200 cm, - (A-5) the TOF-subtracted timing distribution for the muon vertex is required to have a minimum goodness-of-fit ( &gt; 0.6), - (A-6) the pattern of the single non-showering ring is more likely to be a muon than a proton: Lpr -Lµ &lt; 0, Lpr , Lµ are likelihood functions assuming a proton and a muon, which are described later, - (A-7) gamma hits are found: 8 &lt; N γ &lt; 60 for SK-I, III, and VI, 4 &lt; N γ &lt; 30 for SK-II - (A-8) the time difference from the gamma tag to the kaon decay is consistent with the kaon lifetime: t µ -t γ &lt; 75nsec, The cut criteria (A-4) and (A-5) are applied to reject events with a high momentum recoil proton (above Cherenkov threshold) accompanied by an invisible muon or charged pion (below the Cherenkov threshold) which produces a Michel electron in its decay chain. Since the particle type of the single non-showering Cherenkov ring is assumed to be that of a muon, the vertex accuracy is worse when the Cherenkov ring is from a recoil proton. The inaccurate vertex determination causes incorrect TOF subtraction of the Cherenkov light. As a result, recoil protons may create a false peak in the time distribution of hit PMTs, which can fake a prompt gamma ray. The event may include Michel electrons from the decay of the invisible muon, but the distance between the misreconstructed vertex and the Michel electron is typically large. FIG. 3: (color online) An example graphical event display of a simulated proton decay passing all of the criteria for Method 1. The single Cherenkov ring was produced by the muon from kaon decay and fit with momentum 231 MeV/ . c The color of the hit PMTs represents the residual hit time after subtracting the time-of-flight of Cherenkov light in water from the vertex to the PMT. The hit PMTs associated with a 6 MeV prompt gamma are colored cyan. The decay electron was detected after the displayed event. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-3227e8b6-2b9a-47bf-ac54-1aae25e78afc.jpg) FIG. 4: Number of hits versus hit time for a typical proton decay MC event selected by Method 1. In the upper figure, three hit clusters due to prompt γ , µ , and the Michel electron can be seen in order. The lower figure is expanded around the µ -cluster and t γ , t 0 , and t µ are shown as a demonstration. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-38a7144e-6922-4eec-aeae-effd04ca2217.jpg) The proton identification criterion (A-6) is a refinement to the methods in our previous paper for rejecting single proton ring events. It is used for reduction of single proton ring events. The algorithm [31] makes a likelihood function assuming a muon ( Lµ ) and a proton ( Lpr ) by using the Cherenkov angle and the width of the Cherenkov ring. Figure 5 shows the likelihood function. The upper figure is for the sample requiring cuts (A-1) through (A-5). Data and MC agree well. The lower figure is the same distribution after applying cuts (A-7) and (A-8) additionally. Background events are efficiently reduced by (A-6). FIG. 5: (color online) The likelihood distribution to separate µ and proton. The negative region is µ -like and positive is proton-like. In the upper figure, the atmospheric ν MC (box) is compared with data merging SK-I/III/IV (dot) requiring cuts (A-1) through (A-5), and they are in good agreement. The lower figure shows the same distributions after γ -tagging cuts; the remaining background is reduced by the likelihood cut. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-3789a0f0-d966-4ec0-9209-ecb6fd343c51.jpg) After cuts (A-1) through (A-6), a distribution of hits ( N ) vs. time after TOF subtraction ( ) is made. t To search for the prompt gamma ray, three quantities of time must be defined. The first is t µ , which represents the time associated with the detection of the muon, or equivalently, the decay of the kaon. The second is t 0, which is the start time to search in the past time distribution of hits to find the prompt gamma ray hits. The third is t γ , which is the associated time of the gamma ray detection. PMTs outside of a 50 ◦ cone with respect to the muon direction are masked and t µ is defined as the time where dN dt / is maximum. The signal of the gamma ray is so tiny, compared to the muon, that it can easily be hidden by muon hits. To avoid this, the gamma finding is started earlier than the muon hits. To determine t 0, dN dt / is calculated from the muon peak time into the past. Muon hits are dominant while dN dt / &gt; 0, and t 0 is defined at the point where dN dt / changes to less than or equal to 0. Then, in the N -versust distribution, a time window with 12 nsec width is slid backward from t 0. The associated time of the gamma ray candidate, t γ , is defined as the middle of the time window where the number of hits in the window is maximum, N γ . Figure 6 shows the N γ distribution for SK-I, III, and IV in the upper figure and SK-II in the lower figure after all cuts except (A-7). An arrow in the figure shows the signal region, i.e. with cut (A-7) applied; there are no data in this region. FIG. 6: (color online) Number of γ ray hit distributions. The upper figure shows sum of SK-I, III, and IV which have 40% photo coverage, the lower figure corresponds to SK-II with 19% photo coverage. Dots, squares, and histogram correspond to data, atmospheric ν MC normalized to livetime of data, and proton decay MC with arbitrary normalization, respectively. The signal regions are indicated by arrows. The peaks at small numbers of hits are due to dark hits of the PMTs. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-105488d3-decb-48f7-b122-57d9c27b9a7f.jpg) Table III show background rate per Megaton year and ex-· pected events estimated by atmospheric ν MC, observed events in data, and efficiencies evaluated by the proton decay MC for each reduction step. SK-I, III, and IV which have 40% photo-coverage are merged and results of SK-II with 19% photo-coverage are separately shown. The selection efficiencies, expected number of background, and observed number of events are summarized in Table V. The efficiency in SK-IV is higher than the other periods because the tagging efficiency for Michel electrons has been improved thanks to the new electronics described in the detector section. The total expected background for 260 kton year ex-· posure is 0.4 events, and no events are observed. The dominant neutrino interaction in the background expectation comes from ∆ S = 0 kaon production (48%): ν p → ν K + Λ , where the Λ decays to unobserved proton and π -. If the neutrino interaction is accompanied by de-excitation gamma rays, the event has the same configuration as the proton decay signal. The second most prevalent background is ν µ charged current quasi-elastic scattering accompanied by de-excitation gamma rays (25%). The dominant systematic error for the selection of signal is uncertainty in the de-excitation gamma ray emission probabilities. They are estimated to be 15% for the 6.3 MeV gamma ray and 30% for the others [23], and they contribute 19% to the overall systematic uncertainty on the selection efficiency. The other systematic uncertainties come from event reconstruction: energy scale, particle ID, ring-counting, fiducial volume, water scattering and attenuation parameters, and they range in size from 1% to 3%. In total, 22% is the systematic error of the selection. The uncertainty in the background rate comes from atmospheric neutrino flux and the cross section of neutrino interactions. The uncertainty in the neutrino flux is conservatively estimated to be 20% [26]. By changing the cross section of charged current quasi-elastic scattering, neutral current elastic scattering, and single π production interaction by ± 30%, and the deep inelastic scattering by ± 50%, a 10% uncertainty in background rate is found. The total systematic error for the background in Method 1 is estimated to be 25%. There were several improvements in our analysis since our last paper about p → ν K + was published in 2005 [10]. As described in the reconstruction section, the time window for hits used to calculate momentum is changed if a Michel electron is closer than 250 nsec from the parent particle. This is a new algorithm which prevents the overestimation of the momentum due to including PMT hits from the Michel electron. Previously, the vertices of those events tended to be misfit in the forward direction since the precise fitter used the expected charge for each PMT based on an overestimated momentum with larger Cherenkov angle. This resulted in more TOF to be subtracted for hits backward of the particle direction and, as a result, it sometimes made fake prompt γ signals in atmospheric ν interactions. The improvement of the momentum calculation algorithm reduced the atmospheric ν background by a factor of three and eliminated a candidate event in the SKIV data that would have survived based on the uncorrected algorithm. As a result, the expected background for the gammatag method in SK-I is reduced from the value in the previous paper 0.7 events, to 0.2 events while maintaining signal efficiency. The new selection criterion (A-6) further rejects 60% of the atmospheric background (after all other cuts) while losing only 8% efficiency. As a result, the expected background for Method 1 is greatly reduced, finally to 0.08 events for the SK-I period. ## B. Method 2: K + → µ + ν µ , mono-energetic muon search Since most of the K + s stop in water, the monoenergetic µ + s from kaon decays would lead to an excess peak in the muon momentum distribution of atmospheric neutrino background. To avoid using the same events as in Method 1, Method 2 requires all the criteria in Method 1 except: the requirements in momentum (A-3) are relaxed to allow a spectrum fit, and the gamma hits (A-7) must not be present. We search for an excess of muon events in the momentum distribution by fitting the data with the proton decay signal expectation over the atmospheric neutrino background events. The signal and back- TABLE III: Event rates per Megaton year and expected numbers of event from atmospheric · ν MC, observed numbers of event in data, and signal efficiencies estimated from proton decay MC, for each step. SK-I/III/IV with 40% photo-coverage and SK-II with 19% are shown separately. | | SK-I/III/IV | SK-I/III/IV | SK-I/III/IV | SK-I/III/IV | SK-II | SK-II | SK-II | SK-II | |-----------|---------------|---------------|---------------|---------------|-----------|----------|---------|-------------| | Criterion | Bkg. Rate | Exp. Bkg. | Data | Signal Eff. | Bkg. Rate | Exp. Bkg | Data | Signal Eff. | | A-1 | 35240.8 | 7432.3 | 7497 | 0.575 | 34910.6 | 1717.6 | 1712 | 0.566 | | A-2 | 24865.7 | 5244.2 | 5240 | 0.520 | 22239.7 | 1094.2 | 1051 | 0.473 | | A-3 | 2496.6 | 526.5 | 531 | 0.494 | 2161.0 | 106.3 | 91 | 0.440 | | A-4 | 2443.7 | 515.4 | 520 | 0.485 | 2067.8 | 101.7 | 87 | 0.420 | | A-5 | 2400.3 | 506.2 | 514 | 0.479 | 2030.0 | 99.9 | 82 | 0.414 | | A-6 | 2302.7 | 485.6 | 488 | 0.436 | 1931.5 | 95.0 | 78 | 0.368 | | A-7 | 1.34 | 0.28 | 0 | 0.084 | 5.84 | 0.29 | 0 | 0.063 | | A-8 | 1.11 | 0.24 | 0 | 0.084 | 2.75 | 0.14 | 0 | 0.062 | ground normalizations are free parameters in the fit. Figure 7 shows the muon momentum distribution of data from SK-I to SK-IV compared with MC. No significant excess is observed in the signal region, defined by vertical lines. FIG. 7: (color online) Muon momentum distribution for 260 kton year. · Dots, boxes, and histogram correspond to data, atmospheric ν MC, and proton decay MC, respectively. The data are fit by the background plus signal by free normalization. No excess above the expected background is observed. The normalization of the proton decay MC histogram shown is at the upper limit allowed by the fit. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-c70f5254-7af6-4cbe-a44a-493df5409ae3.jpg) ## C. Method 3: K + → π + + π 0 In Method 3, π 0 events with a momentum of 205 MeV/ c are selected. An example event display is shown in Fig. 8. The π 0 decays into two photons; if the energy of one photon is much smaller than the other, sometimes those events are misidentified as a single-ring event. A special π 0 reconstruction algorithm is used to search for proton decay candidates within the single-ring event sample. The π + does not make a clear Cherenkov ring due to its low momentum. However, hit activity in the opposite direction of the π 0 , caused by the π + , is used to identify the K + → π + π 0 signal. The following selection criteria are used: - (C-1) FC events with one or two rings and all rings are e -like, - (C-2) one Michel decay electron from the muon produced by π + decay, - (C-3) the reconstructed invariant mass of the π 0 candidate is between 85 and 185 MeV/ c 2 , - (C-4) the reconstructed momentum of the π 0 candidate is between 175 and 250 MeV/ , c - (C-5) the residual visible energy associated with neither the π 0 nor the π + is low: Eres &lt; 12MeVfor two-ring events and Eres &lt; 20MeV for single-ring events, Eres is described in latter, - (C-6) the likelihood for the photon distribution is consistent with that expected for signal events: Lshape &gt; 2.0 for two-ring events and Lshape &gt; 3.0 for single-ring events in SK-I/III/IV; Lshape &gt; 1.0 for SK-II. Lshape is explained later. - (C-7) there is visible energy backwards from the π 0 direction consistent with a low momentum π + : 10MeV &lt; Ebk &lt; 50MeV. A detailed description of Ebk is given later. A special π 0 reconstruction algorithm is applied to the single-ring sample, which was developed for rejecting singlering π 0 background from CC ν e appearance in neutrino oscillations. The π 0 algorithm forces a fit to the best second ring by comparing the observed and the expected light patterns under the assumption of two electromagnetic showers and reconstructs the invariant mass and momentum of the π 0 FIG. 8: (color online) An example graphical event display of a simulated proton decay passing all of the criteria for Method 3. The two Cherenkov rings were produced by gamma rays from π 0 decay and reconstructed to an invariant mass of 155 MeV/ c 2 and momentum of 209 MeV/ . c The color of the hit PMTs represents the residual hit time after subtracting the time-of-flight of Cherenkov light in water from the vertex to the PMT. The π + does not make a Cherenkov ring that is reconstructed, however PMT hits due to this particle are present opposite to the π 0 direction, visible in the upper left of the ID barrel region. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-a0da1b2a-d169-4ca2-ad9a-60c324702b4e.jpg) candidate. Then (C-3) and (C-4) can be applied even for the single-ring samples. After selecting single π 0 candidates in the signal momentum region, and requiring a Michel electron, further cuts are applied to find the tiny Cherenkov light from the π + . Figure 9 shows the photoelectron distribution versus angle for proton decay Monte Carlo events. The angle is calculated from the opposite direction of the reconstructed π 0 , which can be assumed as the π + direction. The small bump around 23 ◦ comes from π + . The Cherenkov light in an event is then divided into three regions: (1) a π 0 dominant region, inside of 90 ◦ from each γ direction, (2) a π + dominant region, inside of 35 ◦ from the backwards direction from the reconstructed π 0 momentum vector, and (3) a residual region. These regions are illustrated in Fig. 10. Visible energy sums are calculated for regions (2) and (3) by masking region (1) to define Ebk and Eres to be used in criteria (C-5) and (C-7), respectively. Non-zero Ebk is used to identify the presence of the π + . By requiring low Eres , we reject background events with additional final state particles that produce Cherenkov light. In the case of a single-ring π 0 candidate, only the ring direction found by the default reconstruction is masked as region (1), because the other ring candidate found by the π 0 special algorithm is often found at a large angle from the existing ring direction due to asymmetric decay, and if the 90 ◦ cone of the additional ring is masked, the π + direction may be also masked. In this case, the missing γ may exist in region (2) or (3), so the cut value for Eres FIG. 9: (color online) Charge distribution as a function of angle to the π + direction which is defined as opposite the reconstructed π 0 direction. The upper figure shows the distribution for the signal MC in which K + decays into π + and π 0 . The bump around 23 ◦ in the signal is made by Cherenkov light of π + . The lower figure shows only the region from 0 ◦ to 60 ◦ for signal MC (blue) and atmospheric ν MC (hatched red) after the (C-1)-(C-5) criteria are required. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-e88ccaed-c0bf-4893-9eec-46b48bac17e2.jpg) FIG. 10: (color online) An illustration showing each region for K + → π + π 0 . Region (1) is an area which is inside of 90 ◦ from each γ direction, region (2) is an area which is inside of 35 ◦ from backward of reconstructed π 0 direction, and region (3) is defined as residual part. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-80a304c5-063a-42d2-a8ba-1cb9c57a19b8.jpg) is looser than in the two-ring case. The shape of the angular distribution seen in Fig. 9 is also useful to separate signal and background. Based on Fig. 9, the expected photoelectrons are generated assuming signal and background, and a likelihood function ( Lshape ) is calculated for use in (C-6). Then π + can be tagged by using deposited energy ( Ebk ) and shape of charge distribution ( Lshape ). The shape of the angular distribution is slightly different in the single-ring and two-ring cases, and also depends on photo-coverage, so the cut value is tuned separately for SK-II. Figure 11 shows Eres , Lshape , and Ebk distributions of the two-ring sample of SK-I+III+IV data and the atmospheric ν MC normalized by livetime, after cuts from (C-1) through (C-4), with good agreement between data and simulation. Figures 12 through 15 show Eres , Lshape , and Ebk distributions after all cuts except the cut for itself. FIG. 11: (color online) Eres (upper), Lshape (middle), and Ebk (lower) distributions for the two-ring sample in SK-I,III, and IV after cuts from (C-1) through (C-4). Black crosses correspond to data and red histograms show the atmospheric ν MC normalized by livetime. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-611f0e27-33b0-4767-9cb8-79a3d7d040e2.jpg) Table IV shows background rates per megaton year expo-· sure, expected events estimated by atmospheric ν MC, observed number of events in data, and efficiencies for each step. Results for SK-II, which has 19% photo-coverage are separately shown in the table. The selection efficiencies, expected numbers of background, and observed numbers of events for each period are summarized in Table V. The total expected background for 260 kton year exposure is · 0.6 events. No events are observed in the SK data. The dominant neutrino interaction modes in the background are charged current single π production (38%) with low momentum µ , kaon production (37%) described in Method 1, and neutral current multiπ production (11%). The uncertainty for the π 0 fitter is rather large, 18% [32], but is only applied to the fraction of the single-ring π 0 sample (19%) with a final systematic error of 4.5%. The leading systematic uncertainty in the signal efficiency of Method 3 is in the π + interaction in water, estimated to be 5%. Including other reconstruction errors as listed for Method 1, the total systematic uncertainty in the signal efficiency of Method 3 is estimated to be 9.5%. The systematic uncertainty for the background in Method 3 is estimated to be 29% based on the FIG. 12: (color online) Eres distributions for the two-ring (upper) and single-ring (lower) samples after all cuts except (C-5) in all periods. Red histograms are atmospheric ν MC, and blue histograms are proton decay MC, respectively. No data remain after cuts. Arrows in the figures show signal regions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-90720d99-2a37-473f-9cb2-adb3bd7edb7c.jpg) FIG. 13: (color online) Lshape distributions for the two-ring (upper) and single-ring (lower) samples for SK-I,III, and IV , after all cuts except (C-6). Black dots correspond to data, red histograms are atmospheric ν MCnormalized to the livetime of data, and blue histograms are proton decay MC, respectively. Arrows in the figures show signal regions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-798395c8-72e2-4836-9e90-ea48e1047acd.jpg) TABLE IV: Event rates per Megaton year and expected numbers of event from atmospheric · ν MC, observed numbers of event in data, and signal efficiencies estimated from proton decay MC, for method 3. SK-I/III/IV with 40% photo-coverage and SK-II with 19% are shown separately. | | SK-I/III/IV | SK-I/III/IV | SK-I/III/IV | SK-I/III/IV | SK-II | SK-II | SK-II | SK-II | |-----------|---------------|---------------|---------------|---------------|-----------|----------|---------|-------------| | Criterion | Bkg. Rate | Exp. Bkg. | Data | Signal Eff. | Bkg. Rate | Exp. Bkg | Data | Signal Eff. | | C-1 | 51874.1 | 10940.3 | 10945 | 257 | 53574.1 | 2635.8 | 2615 | 0.277 | | C-2 | 5275.4 | 1112.6 | 1126 | 0.191 | 5421.1 | 266.7 | 300 | 0.191 | | C-3 | 1003.9 | 211.7 | 200 | 0.153 | 1266.7 | 62.3 | 56 | 0.137 | | C-4 | 225.6 | 47.6 | 42 | 0.131 | 244.1 | 12.0 | 10 | 0.114 | | C-5 | 171.8 | 36.2 | 37 | 0.120 | 178.1 | 8.76 | 7 | 0.101 | | C-6 | 10.1 | 2.13 | 2 | 0.098 | 15.9 | 0.780 | 0 | 0.775 | | C-7 | 2.09 | 0.44 | 0 | 0.087 | 3.42 | 0.17 | 0 | 0.067 | FIG. 14: (color online) Lshape distributions for the two-ring (upper) and single-ring (lower) samples for SK-II after all cuts except (C6), respectively. Red histograms are atmospheric ν MC, and blue histograms are proton decay MC. No data remain after cuts. Arrows in the figures show signal regions. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-1feb0c90-f35f-40d9-a445-abd142f22ef9.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1195v1-figure-75473888-bc2a-4b4f-8f78-dca8c55849bb.jpg) uncertainties in atmospheric neutrino flux and cross section following the same procedure as described for Method 1. Compared to our previous publication, Method 3 is improved in efficiency by the addition of the single-ring π 0 sample which occupies 19% of the selected events in the signal MC. The angle cut at 40 ◦ applied to calculate the charge sum in region (2) in the previous paper was rather loose (refer to Figure 9). The cut value was tuned to 35 ◦ by maximizing S / √ N to reduce more background. The new variable Lshape also reduces background. As a result, the efficiency of Method 3 is increased by 30% and the background is reduced by 30% from the previously published result for SK-I. The efficiencies, backgrounds, and observed events are summarized in Ta- FIG. 15: (color online) Ebk distributions for the two-ring (uper) and single-ring (lower) samples after all cuts except (C-7) in all periods. Black dots correspond to data, red histograms are atmospheric ν MC, and blue histograms are proton decay MC, respectively. Arrows in the figures show signal regions. ble V. The efficiency in SK-IV is larger than the other periods because of the improvement in efficiency for Michel electron tagging. ## D. Lifetime Limit In the absence of any excess signal above the background expectation, we calculate the lower limit on the proton partial lifetime using a Bayesian method [33] to incorporate systematic uncertainty. The calculation method used in our previous publication [10] is applied in this analysis. For Methods i = 1 and 3, where ni is the number of can- TABLE V: Summary of the proton decay search with selection efficiencies and expected backgrounds for each detector period. | | | SK-I | SK-II | SK-III | SK-IV | |------------------|------------------|------------|------------|------------|------------| | Exp.(kton · yrs) | Exp.(kton · yrs) | 91.7 | 49.2 | 31.9 | 87.3 | | Prompt γ | Eff.(%) | 7.9 ± 0.1 | 6.3 ± 0.1 | 7.7 ± 0.1 | 9.1 ± 0.1 | | Prompt γ | BKG/Mt · yr | 0.8 ± 0.2 | 2.8 ± 0.5 | 0.8 ± 0.3 | 1.5 ± 0.3 | | Prompt γ | BKG | 0.08 | 0.14 | 0.03 | 0.13 | | Prompt γ | OBS | 0 | 0 | 0 | 0 | | P µ spec. | Eff.(%) | 33.9 ± 0.3 | 30.6 ± 0.3 | 32.6 ± 0.3 | 37.6 ± 0.3 | | P µ spec. | BKG/Mt · yr | 2107 ± 39 | 1916 ± 35 | 2163 ± 40 | 2556 ± 47 | | P µ spec. | BKG | 193 | 94.3 | 69.0 | 223.1 | | P µ spec. | OBS | 177 | 78 | 85 | 226 | | π + π 0 | Eff.(%) | 7.8 ± 0.1 | 6.7 ± 0.1 | 7.9 ± 0.1 | 10.0 ± 0.1 | | π + π 0 | BKG/Mt · yr | 2.0 ± 0.4 | 3.4 ± 0.6 | 2.3 ± 0.4 | 2.0 ± 0.3 | | π + π 0 | BKG | 0.18 | 0.17 | 0.09 | 0.18 | | π + π 0 | OBS | 0 | 0 | 0 | 0 | didate events in the i -th proton decay search, the conditional probability distribution for the decay rate is expressed as: where λ i is the true detector exposure, ε i is the true detection efficiency including the meson branching ratio, and bi is the true number of background events. The decay rate prior probability distribution P ( Γ ) is 1 for Γ ≥ 0 and otherwise 0. The prior probability distributions incorporating uncertainties in detector exposure P ( λ i ) , efficiency P ( ε i ) , and background P bi ( ) , are expressed as: $$P ( \lambda _ { i } ) \ & = \ 8 ( \lambda _ { i } - \lambda _ { 0, i } ) \\ \quad \, \substack { \, 0 ( \lambda _ { i } - \lambda _ { 0, i } ) \\ \quad \, \substack { \, 0 ( \lambda _ { i } - \lambda _ { 0, i } ) ^ { 2 } + \lambda _ { \pi } ^ { 2 } + \lambda _ { \pi } ^ { 2 } + \lambda _ { \pi } ^ { 2 } ) } }$$ $$& \varphi ^ { 7 } \quad & P ( \lambda _ { i } ) \ = \ \delta ( \lambda _ { i } - \lambda _ { 0, i } ) & & ( 2 ) \\ & \quad P ( \varepsilon _ { i } ) \ = \ \exp \left [ - ( \varepsilon _ { i } - \varepsilon _ { 0, i } ) ^ { 2 } / 2 \sigma _ { \varepsilon, i } ^ { 2 } \right ] & & ( 3 ) \\ & \frac { ( 0 \leq \varepsilon _ { i } \leq 1, \text{ otherwise } 0 ) } { 3 } \\ & \quad P ( b _ { i } ) \ = \ \int _ { 0 } ^ { \infty } \frac { e ^ { - b ^ { \prime } } ( b ^ { \prime } ) ^ { b _ { 0, i } } } { b _ { 0, i }! } \exp \left [ \frac { - ( b _ { i } C _ { i } - b ^ { \prime } ) ^ { 2 } } { 2 \sigma _ { b, i } ^ { 2 } } \right ] d b ^ { \prime } & & ( 4 ) \\ & \quad & ( 0 \leq b _ { i }, \text{ otherwise } 0 ) \\ & \quad \,. \quad \, \hat { \ } \cdot \,. \quad \cdot \,. \quad \cdot \,. \quad \cdot \,. \quad \hat { \ } \,.$$ where λ 0 , i is the estimated exposure, ε 0 , i is the estimated efficiency, b 0 , i is the estimated number of background events in 500 years MC, Ci is the MC-to-exposure normalization factor, and σε , i and σ b i , are the uncertainties in detection efficiency and background, respectively. $$P ( \Gamma | n _ { i } ) \ = \ \iiint \frac { e ^ { - ( \Gamma \lambda _ { i } \varepsilon _ { i } + b _ { i } ) } ( \Gamma \lambda _ { i } \varepsilon _ { i } + b _ { i } ) ^ { n _ { i } } } { n _ { i }! } \times \quad \text{ } <?P( \Gamma ) P ( \lambda _ { i } ) P ( \varepsilon _ { i } ) P ( b _ { i } ) \, d \lambda _ { i } \, d \varepsilon _ { i } \, d b _ { i } \quad \, ( 1 ) \quad \, \text{ \quad \text{ \quad P ( \Gamma ) P ( \lambda _ { i } ) P ( \varepsilon _ { i } ) P ( b _ { i } ) \, d \lambda _ { i } \, d \varepsilon _ { i } \, d b _ { i } \quad \, ( 1 ) \quad \, \text{ \quad \text{ \quad \text{ \quad \text{ \quad \text{ \quad \text{ \quad \text{ \quad \text{ \quad \end{ \end{array}$$ To combine Method 2, the remaining events are divided into three momentum bins: 200-215MeV/ , 215-260MeV/ , c c and 260-305MeV/ c and the number of observed events are denoted as m 1 , m 2 , m 3 instead of ni . Then, the nucleon decay rate probability, P ( Γ | m 1 , m 2 , m 3 ) , is calculated as: $$P ( \Gamma ) m _ { 1 }, m _ { 2 }, m _ { 3 } ) = \iiint \prod _ { j = 1 } ^ { 3 } \frac { e ^ { - ( \Gamma _ { j } \varepsilon _ { j } + b _ { s h a p e, j } b ) } } { m _ { j }! } \frac { b _ { s h a p e, j } b ) ^ { m _ { j } } } { m _ { j }! } \, P ( \Gamma ) P ( \varepsilon _ { j } ) P ( \varepsilon _ { j } ) P ( b ) P ( b _ { s h a p e, j } ) \, d \lambda _ { j } \, d \varepsilon _ { j } \, d b \, d b _ { s h a p e, j },$$ where j = 1 2 3 corresponds to each momentum bin, , , P b ( ) is defined as one for b &gt; 0 and otherwise 0, and ε j denotes the efficiency for each bin. The number of background events, bshape j , , is bj normalized by b 2. The uncertainty function of the background shape P bshape j ( , ) is defined by a Gaussian function for the 1st and 3rd bin, and a delta function for the 2nd bin. The uncertainties of the background are estimated to be 7% and 8% respectively from the difference of MC models. We combine all three searches to calculate the lower limit of the nucleon decay rate, Γ limit as: $$CL = \frac { \int _ { \Gamma = 0 } ^ { \Gamma _ { \lim i t } } \prod _ { i = 1 } ^ { N = 3 } P ( \Gamma | n _ { i } ) \, d \Gamma } { \int _ { \Gamma = 0 } ^ { \infty } \prod _ { i = 1 } ^ { N = 3 } P ( \Gamma | n _ { i } ) \, d \Gamma }, \quad ( 6 ) \quad \lim _ { \ } 2. 6 > \\ \intertext { a r - 2 } \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \colon \end{matrix}$$ where N = 3 is the number of independent search methods 2 , and CL is the confidence level, taken to be 90%. The lower 2 for i = 2, the second search method, P ( Γ | n 2 ) ≡ P ( Γ | m 1 , m 2 , m 3 ) lifetime limit is given by: $$\tau / B _ { p \rightarrow \nu K ^ { + } } = \frac { 1 } { \Gamma _ { \lim i t } } \sum _ { i = 1 } ^ { N } [ \epsilon _ { 0, i } \cdot \lambda _ { 0, i } ]. \quad \quad ( 7 )$$ The result of the limit calculation combining the three search methods is: $$\tau / B _ { p \rightarrow \nu K ^ { + } } > 5. 9 \times 1 0 ^ { 3 3 } \text{years},$$ at the 90% confidence level. If only the results of the low background searches are used, Methods 1 and 3, the lower limits of proton lifetime are estimated to be 2.5 × 10 33 and 2.6 × 10 33 years, respectively. The lifetime limit from the muon momentum spectrum fit, Method 2, is 0 8 . × 10 33 years. ## VI. CONCLUSION The proton decay search for p → ν K + was carried out with 260 kton year exposure, including SK-I, II, III, and IV . There · are several improvements in the analysis and we succeeded to reduce backgrounds drastically and to increase efficiencies. However, we do not find any evidence for proton decay in this exposure, therefore we have set a limit on the partial lifetime as 5.9 × 10 33 years, which is more than 2.5 times more stringent than our previous publication. The non-observation of proton decay into this mode constrains, but does not exclude, recent SUSY GUT models. ## VII. ACKNOWLEDGMENTS We gratefully acknowledge the cooperation of the Kamioka Mining and Smelting Company. The Super-Kamiokande ex- - [1] H. Georgi and S. L. Glashow, Phys. Rev. Lett. 32 , 438 (1974). - [2] C. McGrew et al. , Phys. Rev, D 59 , 052004 (1999). - [3] K. S. Hirata et al. , Phys. Lett, B 220 , 308 (1989). - [4] M. Shiozawa et al. , Phys. Rev. Lett. 81 , 3319 (1998); H. Nishino et al. , Phys. Rev. Lett. 102 , 141801 (2009). - [5] Y. Hayato et al. [Super-Kamiokande Collaboration], Phys. Rev. Lett. 83 , 1529 (1999) [hep-ex/9904020]. - [6] J. Wess and B. Zumino, Nucl. Phys. B 70 , 39 (1974). - [7] W. J. Marciano and G. Senjanovic, Phys. Rev. D 25 , 3092 (1982). - [8] N. Sakai and T. Yanagida, Nucl. Phys. B 197 , 533 (1982); S. Weinberg, Phys. Rev. D 26 , 287 (1982). - [9] H. Murayama and A. Pierce, Phys. Rev. D 65 , 055009 (2002). - [10] K. Kobayashi et al. , Phys. Rev. D 72 , 052007 (2005). - [11] K. S. Babu, B. Bajc and Z. Tavartkiladze, Phys. Rev. D 86 , 075005 (2012); T. Goto and T. Nihei, Phys. Rev, D 59 , 115009 (1999). - [12] K. S. Babu, J. C. Pati and Z. Tavartkiladze, JHEP 1006 , 084 (2010); V. Lucas and S. Raby, Phys. Rev. D 55 , 6986 (1997). - [13] S. Fukuda et al. , Nucl. Inst. and Meth. A 501 , 418 (2003). - [14] H. Kume et al. , Nucl. Inst. and Meth. 205 , 443 (1983); A. Suzuki et al. , Nucl. Inst. and Meth. A 329 , 299 (1993). - [15] H. Nishino et al. , Nucl. Inst. and Meth. A 610 , 710 (2011); S. Yamada et al. , IEEE Trans. Nucl. Sci. 57, 2010, 428. - [16] K. Abe et al. , submitted to Nucl. Inst. and Meth. A [arXiv:1307.0162]. periment has been built and operated from funding by the Japanese Ministry of Education, Culture, Sports, Science and Technology, the United States Department of Energy, and the U.S. National Science Foundation. Some of us have been supported by funds from the Korean Research Foundation (BK21), the National Research Foundation of Korea (NRF20110024009),the State Committee for Scientific Research in Poland (grant1757/B/H03/2008/35), the European Union FP7 (DS laguna-lbno PN-284518 and ITN invisibles GA-2011289442), the Japan Society for the Promotion of Science, and the National Natural Science Foundation of China under Grants No.10575056. - [17] K. Abe et al. , Phys. Rev. Lett. 110 , 181802 (2013); K. Abe et al. , Phys. Rev. Lett. 107 , 241801 (2011); R. Wendell et al. , Phys. Rev. D 81 , 092004 (2010) (and more relevant references). - [18] K. Nakamura et al. , Nucl. Phys. A 268 , 381 (1976). - [19] T. Yamazaki and Y. Akaishi, Phys. Lett. B 453 , 1 (1999). - [20] R. D. Woods and D. S. Saxon, Phys. Rev. 95 , 577 (1954). - [21] Y. Hayato, Nucl. Phys. Proc. Suppl. 112 , 171 (2002); G. Mitsuka, AIP Conf. Proc. 967 , 208 (2007); G. Mitsuka, AIP Conf. Proc. 981 , 262 (2008). - [22] D. Rein and L.M. Sehgal, Ann. of Phys. 133 , 1780 (1981). - [23] H. Ejiri, Phys. Rev. C 48 , 1442 (1993). - [24] H. Nishino et al. , Phys. Rev. D 85 , 112001 (2012). - [25] C. Regis et al. , Phys. Rev. D 86 , 012006 (2012). - [26] M. Honda, T. Kajita, K. Kasahara, S. Midorikawa, and T. Sanuki, Phys. Rev. D 75 , 043006 (2007). - [27] CERN Program Library W5013 (1994). - [28] M. Nakahata et al. , J. Phys. Soc. Jpn. 55 , 3786 (1986); A. S. Clough et al. , Nucl. Phys. B 76 , 15 (1974). - [29] J. P. Albanese et al. , Nucl. Phys. A 350 , 301 (1980); C. H. Q. Ingram et al. , Phys. Rev. C 27 , 1578 (1983). - [30] E. R. Davies, Mahine Vision: Theory, Algorithms, Practicalities , Academic Press, Sandiego (1997). - [31] M. Fechner et al. , Phys. Rev. D 79 , 112010 (2009). - [32] T2K collaboration., Phys. Rev. Lett. 107 , 041801 (2011). - [33] C. Amsler et al. , Phys. Lett. B 667 , 1 (2008).
10.1103/PhysRevD.90.072005
[ "The Super-Kamiokande Collaboration", ":", "K. Abe", "Y. Hayato", "K. Iyogi", "J. Kameda", "M. Miura", "S. Moriyama", "M. Nakahata", "S. Nakayama", "R. A. Wendell", "H. Sekiya", "M. Shiozawa", "Y. Suzuki", "A. Takeda", "Y. Takenaga", "K. Ueno", "T. Yokozawa", "H. Kaji", "T. Kajita", "K. Kaneyuki", "K. P. Lee", "K. Okumura", "T. McLachlan", "L. Labarga", "E. Kearns", "J. L. Raaf", "J. L. Stone", "L. R. Sulak", "M. Goldhaber", "K. Bays", "G. Carminati", "W. R. Kropp", "S. Mine", "A. Renshaw", "M. B. Smy", "H. W. Sobel", "K. S. Ganezer", "J. Hill", "W. E. Keig", "J. S. Jang", "J. Y. Kim", "I. T. Lim", "J. B. Albert", "K. Scholberg", "C. W. Walter", "T. Wongjirad", "T. Ishizuka", "S. Tasaka", "J. G. Learned", "S. Matsuno", "S. N. Smith", "T. Hasegawa", "T. Ishida", "T. Ishii", "T. Kobayashi", "T. Nakadaira", "K. Nakamura", "K. Nishikawa", "Y. Oyama", "K. Sakashita", "T. Sekiguchi", "T. Tsukamoto", "A. T. Suzuki", "Y. Takeuchi", "K. Ieki", "M. Ikeda", "H. Kubo", "A. Minamino", "A. Murakami", "T. Nakaya", "Y. Fukuda", "K. Choi", "Y. Itow", "G. Mitsuka", "M. Miyake", "P. Mijakowski", "J. Hignight", "J. Imber", "C. K. Jung", "I. Taylor", "C. Yanagisawa", "H. Ishino", "A. Kibayashi", "Y. Koshio", "T. Mori", "M. Sakuda", "J. Takeuchi", "Y. Kuno", "S. B. Kim", "H. Okazawa", "Y. Choi", "K. Nishijima", "M. Koshiba", "Y. Totsuka", "M. Yokoyama", "K. Martens", "Ll. Marti", "Y. Obayashi", "M. R. Vagins", "S. Chen", "H. Sui", "Z. Yang", "H. Zhang", "K. Connolly", "M. Dziomba", "R. J. Wilkes" ]
2014-08-06T07:06:53+00:00
2014-08-06T07:06:53+00:00
[ "hep-ex" ]
Search for Proton Decay via $p \rightarrow νK^{+}$ using 260 kiloton$\cdot$year data of Super-Kamiokande
We have searched for proton decay via $p \rightarrow \nu K^{+}$ using Super-Kamiokande data from April 1996 to February 2013, 260 kiloton$\cdot$year exposure in total. No evidence for this proton decay mode is found. A lower limit of the proton lifetime is set to $5.9 \times 10^{33}$ years at 90% confidence level.
1408.1196v1
International Journal of Modern Physics A c © World Scientific Publishing Company ## A REVIEW OF CENTRAL PRODUCTION EXPERIMENTS AT THE CERN OMEGA SPECTROMETER ## ANDREW KIRK Culham Centre for Fusion Energy, Abingdon, Oxfordshire, United Kingdom [email protected] ## Received Revised The non-Abelian nature of QCD suggests that particles that have a gluon constituent, such as glueballs or hybrids, should exist. This paper presents a study of central meson production in the fixed target experiments WA76, WA91 and WA102 at the CERN Omega spectrometer at centre-of-mass energies of √ s = 12 7, 23.8 and 29 GeV. A study . of the resonance production cross section as a function of √ s shows which states are compatible with being produced by Double Pomeron Exchange (DPE). In these DPE processes, the difference in the transverse momentum between the exchange particles ( dP T ) can be used to select out known qq states from nonqq candidates. The distribution of the azimuthal angle ( φ ) between the two exchange particles suggests that the Pomeron transforms like a non-conserved vector current. Finally there is evidence from an analysis of the the decay modes of the scalar states observed, that the lightest scalar glueball manifests itself through the mixing with nearby qq states. Keywords : Glueballs; Double Pomeron Exchange; WA102. PACS numbers:12.39.Mk, 14.40.Be, 11.55.Jy, 13.85.Ni ## 1. Introduction Quantum ChromoDynamics (QCD) not only describes how quarks and antiquarks interact, but also predicts that the gluons, which are the quanta of the field, will themselves interact to form mesons. If the object formed is composed entirely of valence gluons the meson is called a glueball, however if it is composed of a mixture of valence quarks, antiquarks and gluons (i.e. qqg ) it is called a hybrid. In addition, qqqq states are also predicted. The best estimate for the masses of glueballs comes from lattice gauge theory calculations 1 which show that the lightest glueball has J PC = 0 ++ and that $$m ( 2 ^ { + + } ) / m ( 0 ^ { + + } ) \approx 1. 5$$ and depending on how the lattice parameters are extrapolated to the mass scale that $$m ( 0 ^ { + + } ) = ( 1 5 0 0 - 1 7 5 0 ) \, \text{MeV}.$$ ## 2 Andrew Kirk The mass of the 0 -+ glueball is predicted to be similar to that of the 2 ++ glueball whilst glueballs with other quantum numbers are predicted to be higher in mass. The flux tube model has been used to calculate the masses of the lowest lying hybrid states and predicts 2 that $$m ( 1 ^ { - - }, 0 ^ { - + }, 1 ^ { - + }, 2 ^ { - + } ) \approx 1 9 0 0 \text{ MeV}.$$ Since the lightest nonqq states are predicted to have the same quantum numbers and lie in the same mass region as qq states one way to find them is to look for extra states, that is states that have quantum numbers of already completed nonets and that have masses which are sufficiently low that they are unlikely to be members of the radially excited nonets. It was hoped that these extra states would have unusual branching ratios and/or be preferentially produced in gluon rich processes such as Double Pomeron Exchange (DPE), where the Pomeron trajectory is thought to be mediated by the exchange of a virtual multi-gluon state. The CERN fixed target experiments WA76, WA91 and WA102, which were performed at the Omega spectrometer were designed to study exclusive final states formed in the reaction $$\ p p \longrightarrow \ p _ { f } X ^ { 0 } \text{p} _ { s },$$ where the subscripts f and s refer to the fastest and slowest particles, identified as protons, in the laboratory frame respectively and X 0 represents the central system. Such reactions are expected to be mediated by double exchange processes where both Pomeron and Reggeon exchange can occur. Fig. 1. Layout of the Ω spectrometer for the 1996 run of experiment WA102. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-a2e49c85-b75a-4d8d-84db-04100fc12aca.jpg) The CERN NA12/2 experiment contributed to this programme through the study of neutral decay modes of light mesons using the GAMS 4000 electromagnetic calorimeter. 3 The WA76 and WA91 experiments, which were performed at the A review of central production experiments at the CERN Omega spectrometer 3 Omega spectrometer concentrated mainly on the decay to charged particles using proton beams at 85, 300 and 450 GeV corresponding to centre-of-mass energies of √ s = 12 7, 23.8 and 29 GeV. In 1995 and 1996 experiment WA102 combined the . excellent charged particle reconstruction from the CERN Omega spectrometer with the neutral particle identification offered by GAMS 4000. The main results shown in this paper are from the WA102 experiment, which searched for nonqq mesons in the mass range up to 2.5 GeV. The layout of the 1996 run of WA102 is shown in fig. 1. The positively charged H1 beam in the west area was incident on a 60 cm long liquid hydrogen target. A set of ten 20 µ m pitch micro-strip detectors were used to perform an accurate measurement of the incident beam's trajectory. The outgoing fast track, which had a momentum in the range 300 to 450 GeV, was measured by two sets of 4 micro-strip detectors placed 8 and 12 m downstream from the target. The Omega Multi Wire Proportional Chambers (MWPCs) and Drift Chambers were used to measure the medium momentum tracks ( ≈ 1 to 40 GeV) leaving the interaction region, with particle identification coming from a threshold Cerenkov counter (C1). Photon detection was provided by the GAMS-4000 lead glass calorimeter. The trigger was designed to enhance double exchange processes with respect to single exchange and elastic processes. Details of the trigger conditions, the data processing and event selection have been given in previous publications. 4 In this paper the status of these experiments is reviewed. In section 2 the possibility that a kinematic filter exists in central production that can discriminate between gluonic and qq states is discussed while in section 3 and 4 the status of the search for the scalar and tensor glueball is presented. ## 2. The effect of kinematic variables on central meson production The experiments have been performed at incident beam momenta of 85, 300 and 450 GeV, corresponding to centre-of-mass energies of √ s = 12 7, 23.8 and 29 GeV. . Theoretical predictions 5 of the evolution of the different exchange mechanisms with centre of mass energy, suggest that $$\sigma ( R R ) \sim s ^ { - 1 }, \\ \sigma ( R P ) \sim s ^ { - 0. 5 }, \\ \sigma ( P P ) \sim \text{constant}, \\ \text{for} \ \ + \ \ D \text{account} \ D \text{account} \.$$ where RR, R I P and I P I P refer to Reggeon-Reggeon, Reggeon-Pomeron and Pomeron-Pomeron exchange respectively. Hence it is expected that Double Pomeron Exchange (DPE) would become more significant at high energies, whereas the Reggeon-Reggeon and Reggeon-Pomeron mechanisms would decrease in importance. The decrease of the non-DPE cross section with energy can be inferred by comparing the π + π -mass spectrum obtained in pp interactions, under the same trigger conditions, from WA76 at √ s = 12.7 GeV (fig. 2a) and from WA102 at √ s = 29 GeV (fig. 2b). The π + π -mass spectra for the two cases show that the signal-to- ## 4 Andrew Kirk Fig. 2. The centrally produced π + π -effective mass spectrum at √ s = a) 12.7 GeV and b) 29 GeV using a LL trigger and c) at 29 GeV from a LR trigger. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-9d8a89a5-5310-462b-8978-b62e3b8ce85a.jpg) background ratio for the ρ 0 (770) is much lower at high energy. The WA76 collaboration reported that the ratio of the ρ 0 (770) cross sections at 23.8 GeV and 12.7 GeV is 0.44 ± 0.07. 6 Since isospin 1 states such as the ρ 0 (770) cannot be produced by DPE, the decrease of the ρ 0 (770) signal at high √ s is consistent with DPE becoming relatively more important with increasing energy with respect to other exchange processes. Due to the fact that there was no electromagnetic calorimeter in the WA76 experiment at √ s of 12.7 GeV, the s dependence of only a subset of states could be determined. The states that were compatible with being produced by DPE were: η ′ , f 0 (980), f 0 (1500), f 1 (1285), f 1 (1420), f 2 (1270) and f 2 (1950). 7 A comparison of the production cross-section for all the resonances observed in the WA102 experiment at √ s = 29.1 GeV 7 shows that ss ¯ states are produced much more weakly than nn ¯ states (i.e. those containing u and d quarks). For example, the cross section for the production of the f 2 (1270), whose production has been found to be consistent with DPE, is more than 40 times greater than the cross section of the f ′ 2 (1525). Part of this suppression could be due to the fact that there is a kinematic suppression of M -2 X 0 and some could be explained by the fact that the centre of mass energy dependence of the f 2 (1270) allows for up to a 30 % contribution from non-DPE processes. However, a suppression of ≈ 20 still needs to be explained. Hence there could be some strong dependence on the mass of the produced quarks in DPE. The fact that known qq ¯ states are also seen in DPE initially frustrated the hope that such experiments would prove to be a clean glueball source. However, during the experiments an additional kinematic variable was found, which was initially exposed due to a change in the trigger conditions that were implemented moving from WA76 to WA91. In the WA76 experiment in order to remove the much more frequently occurring pp elastic scattering events the trigger required that the two outgoing protons were on the same side relative to the incident beam (classified as LL) and shown pictorially in fig. 3a. In WA91 a second trigger condition was implemented, which allowed the detection of the decay of the centrally produced meson to charged ## A review of central production experiments at the CERN Omega spectrometer 5 Fig. 3. Schematic diagrams in the centre of mass for a) LL and b) LR triggers. c) Definition of the azimuthal angle φ between the P T vectors of the outgoing protons ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-ef1b97cc-b04d-4fc1-82dd-56eafd9134eb.jpg) particles. This allowed configurations to be recorded where the outgoing protons were on opposite sides of the beam (classified as LR), which is shown pictorially in fig. 3b. The azimuthal angle φ which is defined as the angle between the p T vectors of the two outgoing protons (see fig. 3c) is small for the LL configuration and near to 180 degrees for the LR configuration. The WA91 collaboration found that there was a difference in the resonances observed for these two trigger configurations. 8 Fig. 2b and c compares the π + π -mass spectrum obtained with the LL and LR trigger configuration from WA102 at √ s =29 GeV. In the LR configuration, the ρ 0 (770) and f 2 (1270), known qq states are very prominent. The SFM collaboration at the ISR had also observed that the directions taken by the outgoing fastest and slowest particles were correlated with the production of the f 2 (1270), 9 however, in that case they concluded that the observation may suggest that the f 2 (1270) may have a large glue content. In the case of WA91, since the ρ 0 (770) and f 2 (1270) have a similar dependence the conclusion drawn was that the configuration of the outgoing protons may provide a way of distinguishing between qq and nonqq states. In fact, the WA91 collaboration 8 showed that there were a wide variety of resonances that favoured production when the angle between the outgoing slow and fast protons was near to 0 degrees compared to when the angle was near to 180 degrees. In order to try to explain this effect in terms of a physical model, Close and Kirk 10 proposed that the data be analysed in terms of the parameter dP T , which is the difference in transverse momentum between the particles exchanged from the fast and slow vertices. The WA102 collaboration presented studies of how different resonances were produced as a function of the parameter dP T (see 7 and references therein). The fraction of each resonance was calculated for dP T ≤ 0.2 GeV and dP T ≥ 0.5 GeV and the ratio of the production at small dP T to large dP T was found to be a useful discriminant. 7 It was found that all the undisputed qq states (for example, η , η ′ , f 1 (1285), f 1 (1420), f 2 (1270) and f 2 (1525)) which can be produced in DPE, namely those with positive G parity and I = 0, have a very small value for this ratio ( ≤ 0 1). . However, the interesting states, which could have a nonqq or gluonic component ## 6 Andrew Kirk have a large value for this ratio, 7 for example f 0 (980), f 0 (1500), f 0 (1710), f 2 (1910) and f 2 (1950). Fig. 4. The φ dependence for undisputed qq states a) η ′ , b) f 1 (1285), c) η 2 (1645) and d) f 2 (1270) for the data (dots) and the model (histogram). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-1bcf4b66-170e-40d4-aa31-dd54ae475f8a.jpg) In addition to the dP T dependencies, an interesting effect was observed in the azimuthal angle φ which is defined as the angle between the p T vectors of the two outgoing protons (see 3c). Previously it had been assumed that the Pomeron, which is said to have 'vacuum quantum numbers', transforms as a scalar and hence that the φ distribution would be flat for resonances produced by DPE. Fig. 4 shows the φ dependence for the production of undisputed qq states with a range of spin quantum numbers, J PC . The observed φ dependencies are clearly not flat and considerable variation is observed among the resonances produced. For the qq mesons that can be produced by DPE the φ distributions maximise around 90 o for resonances with J PC = 0 -+ , at 180 o for those with J PC = 1 ++ and at 0 o for those with J PC = 2 -+ . A review of central production experiments at the CERN Omega spectrometer 7 Several theoretical papers have been published on these effects. 11,12 All agree that the exchanged particle must have J &gt; 0 and that J = 1 is the simplest explanation for the observed φ distributions. Close and Schuler 12 have calculated the φ dependencies for the production of resonances with different J PC for the case where the exchanged particle is a Pomeron that transforms like a non-conserved vector current. In order to gain insight into the nature of the particles exchanged in central pp interactions Close, Kirk and Schuler 13 compared the predictions of this model with the data for resonances with different J PC observed in the WA102 experiment. They found that for the production of J PC = 0 -+ mesons they could predict the φ dependence as well as the observed vanishing cross section as t → 0 absolutely. Superimposed on fig. 4a is the prediction of this model. The model was also able to predict the the φ dependence for the J PC = 1 ++ and 2 -+ mesons (fig. 4b and c). 13 In the 0 ++ and 2 ++ sector the φ distributions can be fitted with one parameter ( µ 2 ), where the sign of this parameter determines if the φ distribution is peaked at 0 o or 180 . For example, fig. 4d shows the o φ dependence for the f 2 (1270) which can be well described with µ 2 = -0.4 GeV 2 . Understanding the dynamical origin of this sign then became a central issue in the quest to distinguish qq states from glueballs or other exotic states and this will be discussed in the following sections. One of the first applications of these kinematic filters was to the axial vector nonet. At the start of the WA102 experiment the f 1 (1420), which was prominently observed in central production, was thought to be a nonqq candidate (see 14 and references therein). There appeared to be three candidates for the I=0 members of the J PC = 1 ++ nonet: f 1 (1285), f 1 (1420) and f 1 (1510). However, the application of these kinematic selections showed that the f 1 (1285) and f 1 (1420) have the same behaviour; namely consistent with the f 1 (1420) being the partner to the f 1 (1285) in the 3 P 1 nonet of axial mesons. The conclusion reached from the analysis presented in ref. 14 was that without confirmation of the existence of the f 1 (1510) the isoscalar members of the J PC = 1 ++ nonet should be considered to be the f 1 (1285) and f 1 (1420) with a singlet-octet mixing angle of approximately 50 0 . ## 3. The search for the scalar glueball In the 1990s the search for nonqq states became possible due to the advent of high statistics experiments. To identify a scalar nonqq state the first question to ask is how many 0 ++ states are there in the 1-2 GeV mass region. The problem was that in the scalar sector there appeared to be a multitude of states, with different experiments claiming new scalar states that had effectively no overlap in their mass and width. It quickly became apparent that in order to compare results from different experiments a unified and unitarised method of analysis was required. A good example of why such an approach is required can be seen by looking at what was being reported in the 1.5 GeV mass region in 1994. In addition to the f 0 (1370) and f 0 (1710), several experiments had observed apparently different scalar states. The GAMS collaboration observed a G(1590) decaying to ηη and ηη ′ . 3 ## 8 Andrew Kirk Fig. 5. The S-wave contributions to the a),b) π + π -, c) K K + -, d) ηη , f) σσ , g) ρρ and h) ωω mass spectra and e) the total ηη ′ mass spectra. The location of the J PC = 0 ++ states identified are indicated. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-4d4cc4f2-185e-48e1-aeb5-41ecc7f6f186.jpg) Experiments WA76 and WA91 observed a narrow state (Γ ≈ 50 MeV) called the X(1450) in the centrally produced π + π -π + π -channel. 15 While the Crystal Barrel experiment observed the f 0 (1500) in several final states in pp annihilations. 16 Therefore there appeared to be three new scalar states around 1.5 GeV, each observed in different experiments. However under closer examination it became apparent that all three states were in fact the same and it was only the analysis techniques that made them appear different. The difference in mass between the states observed by the Crystal Barrel collaboration and the GAMS collaboration could be reconciled if they both used the same Breit-Wigner parameterisation. To reconcile the data from WA91 required invoking the idea that there could be an interference between coherently produced states. A previously known example of this coherent interference is the observation of the f 0 (980) in central production. 17 In the KK channel the f 0 (980) appears as a peak near threshold (see for example fig. 5c), whereas in the ππ channel, due to interference with the low mass s-wave continuum or σ , it often appears as a dip in the mass spectrum (see fig. 5a). 17 In a similar way the WA91 collaboration showed that the X(1450) could be explained as being due to the coherent interference of the f 0 (1370) and the f 0 (1500). 18 Fig. 5 shows all the J PC = 0 ++ states observed by the WA102 collaboration. These states were observed in the ππ 19 20 , KK 20 21 , ηη , 22 ηη ′ , 23 4 π 24 and ωω 25 final states. In addition to the low mass ππ continuum or σ ( f 0 (500)) these are f 0 (980), f 0 (1370), f 0 (1500), f 0 (1710) and f 0 (2000). The fact that there are three clearly established states, the f 0 (1370), f 0 (1500) and f 0 (1710), in a region where the standard nonet structure would only require two and that this is the mass region expected for the scalar glueball, meant that it was possible that one of these states could be the scalar glueball. However, none of them had the decay modes characteristic of a glueball state and so it was postulated that the observed states are in fact a result of the mixing of the glueball with the nearby qq states with the same J PC (see 26 and references therein). Such a mixing would lead to three isoscalar states and the relative gg to qq content of these states would lead to a predictable pattern of decay branching ratios. 27-29 The observation of these states in a wide range of decay modes meant that, for the first time, a complete data set of the two-body decays of these states was available and this was used to extract their quark content. The WA102 data, presented in fig. 5, produced the following relative decay rates: 26 ππ : KK : ηη : ηη ′ : 4 π f 0 (1370): 1 : 0 46 . ± 0 19 : 0 16 . . ± 0 07 : 0 0 : 34 0 . . . - 9 +22 f 0 (1500): 1 : 0 33 . ± 0 07 . : 0 18 . ± 0 03 . : 0 096 . ± 0 026 . : 1 36 . ± 0 15 . f 0 (1710): 1 : 5 0 . ± 0 7 : 2 4 . . ± 0 6 : . &lt; 0 18 (90 % . CL ) : &lt; 5 4 (90 % . CL ) These data were used as input to a fit to investigate the glueball-quarkonia content of the f 0 (1370), f 0 (1500) and f 0 (1710). In the | G 〉 = | gg 〉 , | S 〉 = | ss ¯ , 〉 | N 〉 = | uu ¯ + dd / ¯ 〉 √ 2 basis, the physical states | f 0 (1710) , 〉 | f 0 (1500) 〉 and | f 0 (1370) 〉 were found to be 26 $$& | f _ { 0 } ( 1 7 1 0 ) \rangle = 0. 4 2 | G \rangle + 0. 8 9 | S \rangle + 0. 1 7 | N \rangle, \\ & | f _ { 0 } ( 1 5 0 0 ) \rangle = - 0. 6 1 | G \rangle + 0. 3 7 | S \rangle - 0. 6 9 | N \rangle, \\ & | f _ { 0 } ( 1 3 7 0 ) \rangle = 0. 6 5 | G \rangle - 0. 1 5 | S \rangle - 0. 7 3 | N \rangle. \\ \hat { \ } \quad \. \quad \. \quad \. \quad \. \quad \. \quad \. \quad \. \quad \. \.$$ $$| f _ { 0 } ( 1 3 7 0 ) \rangle = 0. 6 5 | G \rangle - 0. 1 5 | S \rangle - 0. 7 3 | N \rangle. \\.. \quad. \quad. \quad. \quad.. \quad.. \quad.. \quad.. \quad.. \quad.. \quad..$$ The transformation matrix obtained, although not imposed, is close to being unitary indicating the robustness of the solution. 26 The solution shows that the ## 10 Andrew Kirk glue content is shared between the three states, it is in phase with the nn content in the f 0 (1500) and f 0 (1710) and out of phase in the f 0 (1370). The ss content is dominantly in the f 0 (1710). This solution was consistent with the production of these states in γγ collisions, p¯ p annihilations and in radiative J/ψ decays. 26 For central production, as was discussed in section 2, the cross sections of well established quarkonia in WA102 suggest that the production of ss is strongly suppressed relative to nn . The relative cross sections for the three states are pp → pp + ( f 0 (1710) : f 0 (1500) : f 0 (1370)) ∼ 0 14 : . 1 7 . : 1 . This would be natural if the production were via the nn and gg components of DPE. There is an important qualitative difference for these three states in the distribution of the the azimuthal angle φ between the p T vectors of the two outgoing protons (see fig. 6). The f 0 (1710) and f 0 (1500) peak as φ → 0 whereas the f 0 (1370) is more peaked as φ → 180 . While it is possible to explain these observations by postulating that o the gg and nn components are produced coherently (positive µ 2 ) as φ → 0 but are out of phase (negative µ 2 ) as φ → 180, 26 no such explanation for the observed production of these states as a function of dP T has been attempted. Fig. 6. The φ dependence for a) f 0 (1370), b) f 0 (1500) and c) f 0 (1710) for the data (dots) and the model (histogram). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-9c4747cb-35a4-46ef-b258-dc280c1595b3.jpg) ## 4. The search for the tensor glueball The tensor sector is much less explored and the level of cross machine analysis is much lower than in the scalar sector. However, interesting candidates do exist. The WA76 collaboration reported the observation of a previously unobserved meson with a mass of 1950 MeV and width of 450 MeV in the π + π -π + π -final state at a incident beam momentum of 300 GeV. 30 A spin parity analysis performed by the WA102 collaboration showed that it has I G ( J PC ) = 0 + (2 ++ ), with J Z = 0 ## A review of central production experiments at the CERN Omega spectrometer 11 /j69/j118/j101/j110/j116/j115/j32/j47/j32/j48/j46/j48/j52/j32/j71/j101/j86 /j50 Fig. 7. The D-wave contributions to the a) π + π -, b) K K + -, c) ηη , e) ωω , f) f 2 (1270) ππ , g) K K ∗ ∗ and h) φφ mass spectra and d) the total ηη ′ mass spectra. The location of the J PC = 2 ++ states identified are indicated. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-4a4d8efc-69a7-48db-a418-507f8e4bc06a.jpg) and decays dominantly to f 2 (1270) ππ with smaller decays to K K ∗ ∗ and φφ . 24 The observation of this state in DPE combined with the fact that the mass coincides with that expected for a state with J=2 on the Pomeron trajectory 31 led to speculation that this may be the tensor glueball. However, this was not the only tensor state ## 12 Andrew Kirk /negationslash observed in this mass region. Figure 7 shows all the states with I G ( J PC ) = 0 + (2 ++ ) observed by WA102. The isoscalar ground state nonet members, the f 2 (1270) and f 2 (1525), are clearly observed in the π + π -and K K + -D-wave respectively, both are produced with J Z = 0. A state called the f 2 (2150) is observed decaying to K K + -and ηη . Another state in the 1.9 GeV region is observed in the ηη ′ and ωω final states. The reason that this state is thought to be distinct from the f 2 (1950) is due to the fact that it is produced exclusively with spin projection J Z = 2; the only state observed in WA102 with J Z = 0. It is also narrower with a width of 200 MeV. As in the scalar sector there appears to be three states where only two would be expected and as can be seen from fig. 8 the φ distributions show that the f 2 (1910) and f 2 (1950) peak at 0 o , while the f 2 (2150) peaks near to 180 . Unfortunately there o is not enough information on their decay modes to try to extract their relative glue content. However, like the f 0 (1500) and f 0 (1710) in the scalar sector the f 2 (1910) and f 2 (1950) are produced predominantly at small dP T . While the f 2 (1950) is accepted as an established state and appears in the summary tables of the Particle Data Group book 32 the f 2 (1910) is not included. To resolve the tensor glueball further studies are required. Fig. 8. The φ dependence for a) f 2 (1910), b) f 2 (1950) and c) f 2 (2150). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1196v1-figure-68b8fe44-8347-4f3e-9fe3-5e3a2eb617ca.jpg) ## 5. Conclusions Quantum ChromoDynamics (QCD) not only describes how quarks and antiquarks interact to form the standard qq mesons but also predicts the existence of glueballs, hybrids and four-quark states. These states should be produced in Double Pomeron Exchange. Fixed target experiments at the CERN Omega spectrometer have studied centrally produced mesons at centre-of-mass energies of √ s = 12 7, 23.8 and 29 GeV. . This range of energies has allowed the relative strength of the DPE process to be A review of central production experiments at the CERN Omega spectrometer 13 investigated. Cuts on the dP T variable select out known qq ¯ states from nonqq or glueball candidates. Why this works is still to be understood. The azimuthal angle φ has given information on the nature of the Pomeron, which is consistent with it transforming like a non-conserved vector current. Based on the decay rates of the scalar states observed by WA102 and on the hypothesis that the scalar glueball mixes with the nearby qq nonet states, the flavour content of the f 0 (1370) , f 0 (1500) and f 0 (1710) has been determined. The solution found is also compatible with the relative production strengths of the f 0 (1370) , f 0 (1500) and f 0 (1710) in γγ collisions, p¯ p annihilations and J/ψ radiative decays. Tensor candidates exist but further studies are required to resolve this sector. ## References - 1. G. Bali et al. (UKQCD), Phys. Lett. B309 , 378 (1993); - D. Weingarten, hep-lat/9608070; - J. Sexton et al., it Phys. Rev. Lett. 75 , 4563 (1995); - F.E. Close and M.J. Teper, 'On the lightest Scalar Glueball' Rutherford Appleton Laboratory report no. RAL-96-040; Oxford University report no. OUTP-96-35P - 2. N. Isgur, AIP. Conf. Proc. 185, Particles and Fields 36, Glueballs, hybrids and exotic hadrons, (1988) 3 - 3. F. Binon et al., Nuovo Cimento A78 , 313 (1983); - D. Alde et al., Phys. Lett. B201 , 160 (1988). - 4. T.A. Armstrong et al., Nucl. Instr. and Methods A274 , 165 (1989); - F. Antinori et al., Il Nuovo Cimento A107 , 1857 (1994). - 5. S.N. Ganguli and D.P. Roy, Phys. Rep. 67 , 203 (1980). - 6. T.A.Armstrong et al. , Zeit. Phys. C 51 , 351 (1991). - 7. A. Kirk Phys. Lett. B489 , 24 (2000). - 8. D.Barberis et al. , Phys. Lett. B388 , 853 (1996). - 9. A.Breakstone et al. , Zeit. Phys. C 48 , 569 (1990). - 10. F.E. Close and A. Kirk, Phys. Lett. B397 , 333 (1997). - 11. F.E. Close, Phys. Lett. B419 , 387 (1998); - P. Castoldi, R. Escribano and J.-M. Frere, Phys. Lett. B425 , 359 (1998); - N. I. Kochelev, hep-ph/9902203; - N.I. Kochelev, T. Morii and A.V. Vinnikov, Phys. Lett. B457 , 202 (1999); - F.E. Close and G. Schuler, Phys. Lett. B458 , 127 (1999). - 12. F.E. Close and G. Schuler, Phys. Lett. B464 , 279 (1999). - 13. F.E. Close, A. Kirk and G. Schuler, Phys. Lett. B477 , 13 (2000). - 14. F.E. Close and A. Kirk, Z. Phys. C76 , 469 (1997). - 15. S. Abatzis et al., Phys. Lett. B324 , 509 (1994). - 16. V. V. Anisovitch et al., Phys. Lett. B323 , 233 (1994); - C. Amsler et al., Phys. Lett. B342 , 433 (1995); - C. Amsler et al., Phys. Lett. B291 , 347 (1992); - C. Amsler et al., Phys. Lett. B340 , 259 (1994). - 17. T. Akesson et al., Nucl. Phys. Lett. B264 , 154 (1986); - K.L. Au, D. Morgan and M.R. Pennington, Phys. Rev. D35 , 1633 (1987). - 18. F. Antinori et al., Phys. Lett. B353 , 589 (1995). - 19. D. Barberis et al., Phys. Lett. B453 , 316 (1999); - D. Barberis et al., Phys. Lett. B453 , 325 (1999). - 20. D. Barberis et al., Phys. Lett. B462 , 462 (1999). ## 14 Andrew Kirk - 21. D. Barberis et al., Phys. Lett. B453 , 305 (1999). - 22. D. Barberis et al., Phys. Lett. B479 , 59 (2000). - 23. D. Barberis et al., Phys. Lett. B471 , 435 (2000). - 24. D. Barberis et al., Phys. Lett. B474 , 423 (2000). - 25. D. Barberis et al., Phys. Lett. B484 , 198 (2000). - 26. F.E. Close and A. Kirk, Phys. Lett. B483 , 345 (2000). - 27. C. Amsler and F.E. Close, Phys. Lett. B353 , 385 (1995). - 28. F.E. Close, Rep. Prog .Phys. 51 , 833 (1988). - 29. F.E. Close, G. Farrar and Z.P. Li, Phys.Rev. D55 , 5749 (1997). - 30. T.A. Armstrong et al., Phys. Lett. B228 , 536 (1989). - 31. S. Donnachie et al., Pomeron Physics and QCD , Cambridge University Press 2003 - 32. J. Beringer et al., Phys. Rev. D86 , 010001 (2012).
10.1142/S0217751X14460014
[ "Andrew Kirk" ]
2014-08-06T07:15:20+00:00
2014-08-06T07:15:20+00:00
[ "hep-ex", "hep-ph" ]
A review of central production experiments at the CERN Omega spectrometer
The non-Abelian nature of QCD suggests that particles that have a gluon constituent, such as glueballs or hybrids, should exist. This paper presents a study of central meson production in the fixed target experiments WA76, WA91 and WA102 at the CERN Omega spectrometer at centre-of-mass energies of $\sqrt{s} = 12.7$, 23.8 and 29~GeV. A study of the resonance production cross section as a function of $\sqrt{s}$ shows which states are compatible with being produced by Double Pomeron Exchange (DPE). In these DPE processes, the difference in the transverse momentum between the exchange particles ($dP_T)$ can be used to select out known $q\overline q$ states from non-$q \overline q$ candidates. The distribution of the azimuthal angle ($\phi$) between the two exchange particles suggests that the Pomeron transforms like a non-conserved vector current. Finally there is evidence from an analysis of the the decay modes of the scalar states observed, that the lightest scalar glueball manifests itself through the mixing with nearby $q\overline q$ states.
1408.1197v2
## FAST DIRECTIONAL COMPUTATION OF HIGH FREQUENCY BOUNDARY INTEGRALS VIA LOCAL FFTS ## LEXING YING Abstract. The boundary integral method is an efficient approach for solving time-harmonic acoustic obstacle scattering problems. The main computational task is the evaluation of an oscillatory boundary integral at each discretization point of the boundary. This paper presents a new fast algorithm for this task in two dimensions. This algorithm is built on top of directional low-rank approximations of the scattering kernel and uses oscillatory Chebyshev interpolation and local FFTs to achieve quasi-linear complexity. The algorithm is simple, fast, and kernel-independent. Numerical results are provided to demonstrate the effectiveness of the proposed algorithm. ## 1. Introduction This paper is concerned with the solution of time-harmonic acoustic obstacle scattering problems. Let ω be the frequency of the wave field and Ω be the scatterer with boundary ∂ Ω. The boundary integral method is an appealing approach for this problem since it typically requires fewer unknowns and provides better accuracy when compared to the volumetric type methods. The main computational task of the boundary integral method is the evaluation of the integral $$u ( x ) = \int _ { \partial \Omega } G ( x, y ) f ( y ) d y, \ \ x \in \partial \Omega,$$ where G x,y ( ) is the Green's function of the Helmholtz operator at frequency ω , or a similar integral where the kernel is replaced with one of the derivatives of the Green's function. The numerical treatment of u x ( ) requires boundary discretization. For a typical scattering problem, at least a couple of points per wavelength λ = 2 π/ω is required in order for the solution method to achieve reasonable accuracy. If we assume that both the diameter and the boundary length of Ω 2010 Mathematics Subject Classification. 65N38, 65R20, 78A45. Key words and phrases. Boundary integral method, scattering, high-frequency waves, directional algorithm, low-rank approximation, Chebyshev interpolation, fast Fourier transforms. This work was partially supported by the National Science Foundation under award DMS-0846501 and the U.S. Department of Energys Advanced Scientific Computing Research program under award DE-FC02-13ER26134/DE-SC0009409. The author thanks Anil Damle for comments and suggestions. are of order Θ(1), then the boundary ∂ Ω shall be discretized with a set P of n = Θ(1 /λ ) = Θ( ω ) points. Discretizing (1) with an appropriate numerical quadrature scheme results in the following discrete summation problem: for each x ∈ P , evaluate $$u ( x ) = \sum _ { y \in P } G ( x, y ) f ( y ).$$ Direct evaluation of (2) takes Θ( n 2 ) steps. This can be computationally intensive for high frequency problems where ω and n are large. Hence, there is a practical need for algorithms that can evaluate (2) rapidly and accurately. In the past thirty years, a lot of research has been devoted to this problem and several successful algorithms have been proposed. The first, and probably the most well-known approach is the high frequency fast multipole method initiated by Rokhlin in [18, 19] and further developed in [6, 8, 12, 20, 21]. This method follows the structure of the classical fast multipole method for the Laplace equation and uses fast spherical harmonic transforms and diagonal forms to construct the multipole and local expansions efficiently. This method has an Θ( n log n ) complexity but is rather technical. The second method is the butterfly algorithm proposed by Michielssen and Boag in [15], where the main observation is that the interaction between two regions under certain geometric configuration is numerically lowrank even for high frequency scattering problems. The complexity of this algorithm is Θ( n log 2 n ) with a relatively large prefactor. A third method is the directional FMM-type algorithm proposed by Engquist and Ying in [10, 11], where the concept of a directional parabolic separation condition is introduced to construct directional low-rank approximations between certain square regions and wedges with narrow opening angle. This algorithm has a Θ( n log n ) complexity and the advantage of being kernel-independent. Other algorithms that rely on this directional low-rank idea include [2,14]. While all the above methods are based on hierarchical partitioning of the boundary, methods based on the fast Fourier transform [4,5] are also used widely. These methods are relatively easy to implement, but have superlinear complexity like Θ( n α log n ) with α = 1 5 for example. . In this paper, we introduce a new algorithm for 2D problems. This algorithm leverages the directional idea of [10, 11] and uses oscillatory Chebyshev interpolation and local FFTs to speed up the computation. This new method has a Θ( n log 2 n ) complexity and is conceptually much simpler than the previous hierarchical methods. The rest of this paper is organized as follows. Section 2 explained the algorithm in detail. Section 3 provides numerical results and discussions are given in Section 4. ## 2. Algorithm - 2.1. Notations. In 2D, the Green's function of the Helmholtz equation is given by $$G ( x, y ) = \frac { i } { 4 } H _ { 0 } ^ { 1 } ( \omega | x - y | ) \, _ { \dots } \, _ { \dots } \, _ { \dots } \,.$$ and λ = 2 π/ω is the wavelength. To simplify the problem, we assume that the domain Ω has a C 2 boundary and that both its diameter and its boundary length L are of order Θ(1) and let ρ : ∂ Ω → [0 , L ] be the arclength parameterization of the boundary. The extension to piecewise C 2 boundary is quite straightforward and requires little extra effort. We also assume without loss of generality that the length L of ∂ Ω is equal to 4 q λ , where q &gt; 0 is an integer. The actual number 4 q is not important but it makes the presentation of the algorithm simpler. Under these assumptions, it is clear that λ = Θ(1 4 ) and / q ω = Θ(4 ). q Following the typical practice of using a constant number p of points per wavelength, we discretize the boundary ∂ Ω with a set P of n = 4 q p equally-spaced sampling points. 2.2. Existence of low-rank approximation. A function H x,y ( ) with x ∈ X and y ∈ Y is said to have a separated approximation of n terms with relative accuracy glyph[epsilon1] , if there exist functions { α i ( x ) } 1 ≤ ≤ i n and { β i ( y ) } 1 ≤ ≤ i n such that $$| H ( x, y ) - \sum _ { i = 1 } ^ { n } \alpha _ { i } ( x ) \beta _ { i } ( y ) | \leq \epsilon | H ( x, y ) |. \\. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad.$$ The following result is the theoretical foundation of new algorithm. Theorem 1. Consider two rectangles $$\cdot \, \underset { \cdot } { \underset { \cdot } { \underset { \cdot } { \sum } } } \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$ } \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu`} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu` } \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu'} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu' } \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu''} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu''}\, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \, \text{$\nu$} \\.$$ Suppose that d &gt; 1 and d ≥ 2 max( h , h 1 2 ) 2 . Then, for each glyph[epsilon1] &gt; 0 sufficiently small, there exists an ( ω, d ) -independent constant C glyph[epsilon1] ( ) such that G x,y ( ) = i 4 H 1 0 ( ω x | -y | ) with x ∈ R 1 and y ∈ R 2 has a separated approximation of C glyph[epsilon1] ( ) terms with relative accuracy glyph[epsilon1] . The main point of the theorem is that the number of terms C glyph[epsilon1] ( ) is independent of ω and d . Therefore, even if ω and d grow, the number of terms remains uniformly bounded. For this reason, such a separated approximation is called low-rank. Proof. The geometric setting is illustrated in Figure 1. We first observe that G x, y ( ) can be written as $$G ( x, y ) = \exp ( i \omega | x - y | ) G _ { 0 } ( | x - y | )$$ ! Figure 1. The geometric setup of Theorem 1. where G 0 ( | x - | y ) is a non-oscillatory real analytic function (see [1] for example). A low-rank separation approximation for G 0 ( | x - | y ) with relative error glyph[epsilon1] can be constructed via Taylor expansion or Chebyshev interpolation. Hence, the remaining task is to find a low-rank separated approximation for exp( iω x | -y | ) with relative accuracy glyph[epsilon1] . For x = ( x , x 1 2 ) ∈ R 1 and y = ( y , y 1 2 ) ∈ R 2 , we write $$\exp ( i \omega | x - y | ) = \exp ( i \omega ( x _ { 1 } - y _ { 1 } ) ) \exp ( i \omega ( | x - y | - ( x _ { 1 } - y _ { 1 } ) ) ).$$ As the first term on the right hand side is obviously separated, we only focus on the second term, which can be rewritten as $$\exp ( i \omega ( | x - y | - ( x _ { 1 } - y _ { 1 } ) ) ) = \exp \left ( i \omega ( x _ { 1 } - y _ { 1 } ) \left ( \sqrt { 1 + \frac { | x _ { 2 } - y _ { 2 } | ^ { 2 } } { | x _ { 1 } - y _ { 1 } | ^ { 2 } } } - 1 \right ) \right ).$$ We denote the last term by η and decompose its calculation into multiple steps by introducing $$\psi _ { 1 } \circ \psi _ { j } \text{ m a c u m } \\ \xi & = \frac { 1 } { | x _ { 1 } - y _ { 1 } | ^ { 2 } }, \quad \alpha = | x _ { 2 } - y _ { 2 } | ^ { 2 } \xi, \quad \beta = \sqrt { 1 + \alpha } - 1, \\ \gamma & = i \omega ( x _ { 1 } - y _ { 1 } ) \beta, \quad \eta = \exp ( i \gamma ). \\ \dots$$ For a quantity δ , we use the notation lrsa( δ ) to stand for a separated approximation of δ with a number of terms that is ( ω, d )-independent and with a relative error bounded by a constant multiple of glyph[epsilon1] . For ξ = 1 / x | 1 -y 1 | 2 , applying a truncated Taylor expansion of x 1 at the center of R 1 with relative error glyph[epsilon1] gives a low-rank separated approximation lrsa( ξ ) for which the number of terms is ( ω, d )-independent due to scale invariance: $$\text{lrsa} ( \xi ) = \xi ( 1 + \epsilon _ { \xi } ), \ \ | \epsilon _ { \xi } | \lesssim \epsilon.$$ For α = | x 2 -y 2 | 2 ξ , we define lrsa( α ) = | x 2 -y 2 | 2 lrsa( ξ ). Clearly, by letting glyph[epsilon1] α = glyph[epsilon1] ξ , we have $$\text{lrsa} ( \alpha ) = \alpha ( 1 + \epsilon _ { \alpha } ), \ \ | \epsilon _ { \alpha } | \lesssim \epsilon.$$ From the relation α = | x 2 -y 2 | 2 / x | 1 -y 1 | 2 and the geometric setup in Figure 1, it is clear that α ∈ (0 , 1 4). / Hence, by choosing glyph[epsilon1] sufficiently small, one can easily guarantee that lrsa( α ) ∈ (0 , 1 3). / √ Next, we consider β = 1 + α -1. Since both α and lrsa( α ) is between 0 and 1 / 3, expanding √ 1 + α -1 with truncated Taylor series at α = 0 with ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1197v2-figure-9b351719-1277-4a87-ba91-61e04c973516.jpg) relative error glyph[epsilon1] gives a polynomial p α ( ) for which the number of terms is independent of ω and d . We then define lrsa( β ) = p (lrsa( α )). Notice that $$\tt t o t \, \text{or} \, \omega \text{ and} \, \alpha. \, \text{ we then define} \, \i r s a ( \beta ) = p ( \i r s a ( \alpha ) ). \, \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ a \text{ uniformly bounded constant.} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{a uniformly bounded constant.} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ }$$ where C is a uniformly bounded constant. By defining glyph[epsilon1] β = (1 + Cglyph[epsilon1] α )(1 + glyph[epsilon1] ) -1, we have $$\text{lrsa} ( \beta ) = \beta ( 1 + \epsilon _ { \beta } ), \ \ | \epsilon _ { \beta } | \lesssim \epsilon.$$ For γ = iω x ( 1 -y 1 ) β , we define lrsa( γ ) = iω x ( 1 -y 1 )lrsa( β ) and glyph[epsilon1] γ = glyph[epsilon1] β . Clearly, $$\text{lrsa} ( \gamma ) = \gamma ( 1 + \epsilon _ { \gamma } ), \ \ | \epsilon _ { \gamma } | \lesssim \epsilon.$$ An easy but essential calculation also shows that $$\gamma = i \omega ( x _ { 1 } - y _ { 1 } ) \left ( \sqrt { 1 + \frac { | x _ { 2 } - y _ { 2 } | ^ { 2 } } { | x _ { 1 } - y _ { 1 } | ^ { 2 } } } - 1 \right )$$ is of order O (1) for x ∈ R 1 and y ∈ R 2 . Then it follows that lrsa( γ ) is also of order O (1). Finally, consider η = exp( iγ ). As both γ and lrsa( γ ) are of order O (1), applying truncated Taylor expansion to exp( iγ ) near γ = 0 with relative error glyph[epsilon1] gives a polynomial q γ ( ) with an ( ω, d )-independent number of terms. We then define lrsa( η ) = q (lrsa( γ )) and have $$\ddot { \nu } ^ { \dagger } \quad \cdots \quad \cdots \quad \cdots \quad \\ \text{lrsa} ( \eta ) & = q ( \text{lrsa} ( \gamma ) ) = \exp ( i \text{lrsa} ( \gamma ) ) ( 1 + \epsilon ) \\ & = \exp ( i \gamma ) \exp ( i ( \text{lrsa} ( \gamma ) - \gamma ) ) ( 1 + \epsilon ) \\ & = \exp ( i \gamma ) \exp ( i \gamma \epsilon _ { \gamma } ) ( 1 + \epsilon ) \\ & = \exp ( i \gamma ) ( 1 + C \gamma \epsilon _ { \gamma } ) ( 1 + \epsilon ). \\. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad \cdots \quad \cdots \quad \cdots \quad \cap \cdots \quad \cap \cdots \quad........................................................................................................................................................................................................$$ where C is uniformly bounded from the fact that γ = O (1) and lrsa( γ ) = O (1). By defining glyph[epsilon1] η = (1 + Cγglyph[epsilon1] γ )(1 + glyph[epsilon1] ) -1, one has $$\text{lrsa} ( \eta ) = \eta ( 1 + \epsilon _ { \eta } ), \ \ | \epsilon _ { \eta } | \lesssim \epsilon.$$ This shows that exp( iω x | - | y ) has a low-rank separated approximation with an ( ω, d )-independent number of terms and relative error O glyph[epsilon1] ( ). Combined with the approximation for G 0 ( | x - | y ), we conclude that G x, y ( ) has a lowrank separated approximation with an ( ω, d )-independent number of terms and relative error O glyph[epsilon1] ( ). At this point, it is clear that in order to get a relative error strictly bounded by glyph[epsilon1] , we only need to repeat the above argument by pre-dividing glyph[epsilon1] by a uniform constant factor. glyph[square] 2.3. Setup algorithm. We call that the length of ∂ Ω is 4 q λ . The setup algorithm first generates a complete binary tree structure of ∂ Ω by bisecting it into segments of equal length recursively. The process is stopped when a segment is of length m λ glyph[lscript] , where m glyph[lscript] is a constant typically set to 2 or 4. A segment at the final level is called a leaf and it contains m p glyph[lscript] discretization points. A segment T is called almost-planar if its length is bounded by by 2 q λ/ √ κ T , where κ T is the maximum of the absolute value of the curvature within the segment T . The key component of the setup algorithm is how to compress the interaction between two segments. Consider two segments T and S and let - · c T and c S be the centers of T and S , - · t T and t S be the tangent directions at c T and c S , and - · a TS = ( c T -c S ) / c | T -c S | be the unit vector pointing from c S to c T (see Figure 2). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1197v2-figure-a4551fda-e08e-4bcf-aac6-f728a3492eda.jpg) ! Figure 2. The geometric setting for constructing low-rank approximation between two segments T and S . The pair ( T, S ) is called parabolically separated if T and S can be enclosed in two rectangles R 1 and R 2 that satisfy the condition of Theorem 1. More precisely, we define - · glyph[lscript] TS to be the line passing through the centers c T and c S , - · w λ T and w λ S to be the lengths of the projections of T and S onto glyph[lscript] TS , - · d TS λ to be the distance between the projections, and - · h T λ and h λ S to be the lengths of the projections of T and S , respectively, onto the direction a ⊥ TS . With these definitions, ( T, S ) is parabolically separated if d TS &gt; 1, d TS &gt; max( w ,w T S ), and d TS &gt; 2 max( h T , h S ) 2 . Theorem 1 states that, for a parabolically separated pair ( T, S ), the interaction between T and S is numerically low-rank. As we shall see, the setup algorithm constructs a lowrank approximation for such a pair when at least one of T and S is also almost-planar. Let G be an empty set initially. The algorithm first traverses the tree in a breadth first search. Whenever it reaches an almost-planar segment, the algorithm inserts it into G and skip the whole subtree starting from it. When it reaches a leaf, the algorithm also inserts it into G . At the end of this step, G consists of almost-planar segments and non-planar leaves, and they form a disjoint union of the boundary ∂ Ω. Next, the algorithm starts with a queue Q of segment pairs, initialized to be { ( T, S ) , T, S ∈ G} , as well as a set F , initialized to be empty. When the queue Q is not empty, the top element is popped out and denoted by ( T, S ). The algorithm treats the pair ( T, S ) depending on the types of T and S . - · If both T and S are non-planar leaves, we mark ( T, S ) as a dense pair and insert it into F . - · Suppose that T is a non-planar leaf but S is almost-planar. If ( T, S ) is parabolically separated, then we mark ( T, S ) as a low-rank pair and insert it into F . If it is not, one of the following two options is taken. - -If S is not at the leaf level, we partition S evenly into two segments S 1 and S 2 and insert ( T, S 1 ) and ( T, S 2 ) into Q . - -If S is at the leaf level, we mark ( T, S ) as a dense pair and insert it into F . - · Suppose that T is almost-planar but S is a non-planar leaf. If ( T, S ) is parabolically separated, then we mark ( T, S ) as a low-rank pair and insert it into F . If it is not, one of the following two options is taken. - -If T is not at the leaf level, we partition T evenly into two segments T 1 and T 2 and insert ( T , S 1 ) and ( T , S 2 ) into Q . - -If T is at the leaf level, we mark ( T, S ) as a dense pair and insert it into F . - · Suppose that both T and S are almost-planar. If ( T, S ) is parabolically separated, then we mark ( T, S ) as a low-rank pair and insert it into F . If it is not, one of the following options is taken. - -If T is longer than S , partition T evenly into two segments T 1 and T 2 and insert ( T , S 1 ) and ( T , S 2 ) into Q . - -If S is longer than T , partition S evenly into two segments S 1 and S 2 and insert ( T, S 1 ) and ( T, S 2 ) into Q . - -If T and S are of the same length but are not at the leaf level, then partition T evenly into T 1 and T 2 and S evenly into S 1 and S 2 and insert ( T , S 1 1 ), ( T , S 2 1 ), ( T , S 1 2 ), and ( T , S 2 2 ) into Q . - -Finally if T and S are of the same length and at the leaf level, then mark ( T, S ) as a dense pair and insert it into F . This process is repeated as long as the queue Q is not empty. When Q is empty, the set F provides a hierarchical compressed approximation of (2). 2.3.1. Construction of directional low-rank approximation. What is missing at this point is the procedure of constructing a actual low-rank separated approximation. In the setup algorithm, this procedure is used when ( T, S ) is parabolically separated and at least one of T and S is almost-planar. Let us first consider a low-rank pair ( T, S ) ∈ F where both T and S are almost-planar. It is instructive to consider the function exp( iω x | - | y ) instead of G x, y ( ) as this is where the oscillations come from. In what follows, we shall use ∼ to denote an approximation up to a non-oscillatory multiplicative term. Let 2 glyph[lscript] T λ and 2 glyph[lscript] S λ be the lengths of T and S , respectively. For a point x ∈ T and y ∈ S , $$& \exp ( i \omega | x - y | ) \sim \exp ( i \omega a _ { T S } \cdot ( x - y ) ) \\ = & \exp ( i \omega a _ { T S } \cdot \left ( ( x - c _ { T } ) + ( c _ { T } - c _ { S } ) + ( c _ { S } - y ) ) \right )$$ (3) $$= \exp ( i \omega a _ { T S } \cdot ( x - c _ { T } ) ) \cdot \exp ( i \omega a _ { T S } \cdot ( c _ { T } - c _ { S } ) ) \cdot \exp ( - i \omega a _ { T S } \cdot ( y - c _ { S } ) ),$$ where the approximation in the first line is based on the fact that ( T, S ) is parabolically separated. To further approximate the first term in (3), we perform a Taylor expansion for ρ -1 ( ) near t t = ρ c ( T ) and evaluate it at ρ x ( ): $$& | \rho ^ { - 1 } ( \rho ( x ) ) - \left ( \rho ^ { - 1 } ( \rho ( c _ { T } ) ) + t _ { T } ( \rho ( x ) - \rho ( c _ { T } ) ) \right ) | \\ & \lesssim \frac { 1 } { 2 } | \rho ( x ) - \rho ( c _ { T } ) | ^ { 2 } \kappa _ { T } \leq \frac { 1 } { 2 } ( 2 ^ { q } \lambda / \sqrt { \kappa _ { T } } ) ^ { 2 } \kappa _ { T } = O ( 4 ^ { q } \lambda ^ { 2 } ) = O ( \lambda ), \\ \cdot \quad \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array}$$ where κ T is the maximum of the absolute value of the curvature in T and here we also use the fact that T is almost-planar. This is equivalent to $$( x - c _ { T } ) = ( \rho ( x ) - \rho ( c _ { T } ) ) \cdot t _ { T } + O ( \lambda ).$$ Multiplying it with iωa TS and taking exponential gives the approximation $$( 4 ) \quad \ \exp ( i \omega a _ { T S } \cdot ( x - c _ { T } ) ) \sim \exp ( i \omega a _ { T S } \cdot t _ { T } ( \rho ( x ) - \rho ( c _ { T } ) ) ).$$ For the last term of (3), the same argument works for ( y -c S ). Since S is almost-planar, we get $$( y - c _ { S } ) = ( \rho ( y ) - \rho ( c _ { S } ) ) \cdot t _ { S } + O ( \lambda ),$$ and $$( 5 ) \quad \ \exp ( - i \omega a _ { T S } \cdot ( y - c _ { S } ) ) \sim \exp ( - i \omega a _ { T S } \cdot t _ { S } ( \rho ( y ) - \rho ( c _ { S } ) ) ).$$ Noticing that ωa TS · t T ∈ -[ ω, ω ], we partition the interval [ -ω, ω ] uniformly into 2 glyph[lscript] T +1 m f intervals with a set K T of 2 glyph[lscript] T +1 m f +1 gridpoints. Here m f is a parameter that is typically set to 2 or 4. A key step of the algorithm is to approximate ωa TS · t T with a nearby gridpoint. More precisely, we define [ k ] T to the value of rounding k to the nearest gridpoint in K T . Since $$| ( \omega a _ { T S } \cdot t _ { T } - [ \omega a _ { T S } \cdot t _ { T } ] _ { T } ) ( \rho ( x ) - \rho ( c _ { T } ) ) | \leq \frac { 2 \omega } { 2 ^ { \ell _ { T } + 1 } m _ { f } } \cdot \frac { 1 } { 2 } \cdot \frac { 2 ^ { \ell _ { T } } \lambda } { 2 } = \frac { 2 \pi } { 4 m _ { f } } = O ( 1 ),$$ replacing ωa TS · t T with [ ωa TS · t T T ] in (4) only introduces a non-oscillatory multiplicative term. Therefore, $$( 6 ) \quad \ \exp ( i \omega a _ { T S } \cdot ( x - c _ { T } ) ) \sim \exp ( i [ \omega a _ { T S } \cdot t _ { T } ] _ { T } ( \rho ( x ) - \rho ( c _ { T } ) ) ).$$ Similarly for -ωa TS · t S , we partition the interval [ -ω, ω ] uniformly into 2 glyph[lscript] S +1 m f intervals with a set K S of 2 glyph[lscript] S +1 m f +1 gridpoints and define [ k ] S to the value of rounding k to the nearest gridpoint in K S . Again since $$| ( - \omega a _ { T S } \cdot t _ { S } - [ - \omega a _ { T S } \cdot t _ { S } ] _ { S } ) ( \rho ( y ) - \rho ( c _ { S } ) ) | \leq \frac { 2 \omega } { 2 ^ { \ell _ { S } + 1 } m _ { f } } \cdot \frac { 1 } { 2 } \cdot \frac { 2 ^ { \ell _ { S } } \lambda } { 2 } = \frac { 2 \pi } { 4 m _ { f } } = O ( 1 ),$$ replacing -ωa TS · t S with [ -ωa TS · t S S ] in (5) introduces an extra nonoscillatory multiplicative term. Thus - (7) exp( -iωa TS · ( y -c S )) ∼ exp( [ i -ωa TS · t S S ] ( ρ y ( ) -ρ c ( S ))) . The reason for introducing the rounding is that: - · exp( ik ρ x ( ( ) -ρ c ( T )) for x ∈ T and k ∈ K T is a partial Fourier matrix since both ρ x ( ) and k are on a uniform grid. The same also holds for exp( ik ρ y ( ( ) -ρ c ( S )) for y ∈ S and k ∈ K S . As we shall see, this has an enormous impact on the efficiency of applying the low-rank approximations. By introducing $$k _ { T S } ^ { T } = [ \omega a _ { T S } t _ { T } ] _ { T },$$ $$k _ { T S } ^ { S } = [ - \omega a _ { T S } t _ { S } ] _ { S },$$ $$F _ { T } ( x, k ) = \exp ( i k ( \rho ( x ) - \rho ( c _ { T } ) ) ), \ \ x \in T, k \in K _ { T }$$ $$F _ { S } ( y, k ) = \exp ( i k ( \rho ( y ) - \rho ( c _ { S } ) ) ), \ \ y \in S, k \in K _ { S }$$ and applying (6) and (7) to (3), we have $$\exp ( i \omega | x - y | ) \sim F _ { T } ( x, k _ { T S } ^ { T } ) \cdot \exp ( i \omega ( c _ { T } - c _ { S } ) \cdot a _ { T S } ) \cdot F _ { S } ( y, k _ { T S } ^ { S } ).$$ So far, we have been considering the kernel exp( iω x | -y | ). Let us now replace exp( iω x | -y | ) back with the kernel G x,y ( ). Since the difference G 0 ( | x - | y ) is a non-oscillatory term, the above discussion applies without any change and we have the following representation for G x,y ( ) - (8) G x,y ( ) = F T ( x, k T TS ) · G mm TS ( x, y ) · F S ( y, k S TS ) , x ∈ T, y ∈ S, where the term G mm TS ( x, y ) defined via this equation is non-oscillatory in x ∈ T and y ∈ S . The superscript mm of G mm TS indicates that the complex exponential modulation is done both for T and for S . In a more compact operator form, we can write (8) as - (9) G T,S ( ) = diag( F T (: , k T TS )) · G mm TS ( T, S ) · diag( F S (: , k S TS )) . Since G mm TS ( x, y ) is non-oscillatory, it can be approximated with Chebyshev interpolation in the parametric domain of the boundary. More specifically, we define - · m c to be the size of the Chebyshev grid used, - · R T be the image (under ρ -1 ) of the Chebyshev grid in T and R S be the image of the Chebyshev grid in S , - · I T and I S to be the interpolation operator for T and S associated with the Chebyshev grids R T and R S , respectively. In the matrix notation, I T is a matrix with entries given by I T ( x, j ) for x ∈ T and j ∈ R T and I S is a matrix with entries given by I S ( y, j ) for y ∈ S and j ∈ R S . In an operator form, this approximation reads $$G _ { T S } ^ { m m } ( T, S ) \approx I _ { T } \cdot G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot I _ { S } ^ { t }.$$ Putting it together with (9) gives $$G ( T, S ) \approx \text{diag} ( F _ { T } ( \colon, k _ { T S } ^ { T } ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot I _ { S } ^ { t } \cdot \text{diag} ( F _ { S } ( \colon, k _ { T S } ^ { S } ) ).$$ Notice that for a pair ( T, S ), representing this low-rank approximation only requires storing k T TS , k S TS , and G mm TS ( R ,R T S ). The above discussion is for the case in which both T and S are almostplanar. However, the setup algorithm also needs to construct low-rank approximations for low-rank pairs in which only one of T and S is almostplanar. For those cases, the oscillatory Chebyshev interpolation is only used for the almost-planar segment while a dense evaluation is used at the other non-planar segment. More precisely, if S is almost-planar, we form the representation $$G ( T, S ) = G _ { T S } ^ { \cdot m } ( T, S ) \cdot \text{diag} ( F _ { S } ( \cdot, k _ { T S } ^ { S } ) )$$ and the approximation $$G ( T, S ) \approx G _ { T S } ^ { \cdot m } ( T, R _ { S } ) \cdot I _ { S } ^ { t } \cdot \text{diag} ( F _ { S } ( \colon, k _ { T S } ^ { S } ) ),$$ where the superscript · m means that the exponential modulation is done only for S . Similarly if T is almost-planar, we construct the representation $$G ( T, S ) = \text{diag} ( F _ { T } ( \colon, k _ { T S } ^ { T } ) ) \cdot G _ { T S } ^ { m \cdot } ( T, S )$$ and the approximation $$G ( T, S ) \approx \text{diag} ( F _ { T } ( \colon, k _ { T S } ^ { T } ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m \cdot } ( R _ { T }, S ),$$ where the superscript m · means that the exponential modulation is done only for T . 2.3.2. Complexity of the setup algorithm. Since Ω has a C 2 boundary, the curvature is uniformly bounded. Let us first estimate the number of segments in G . From the setup algorithm, it is clear that the length of a segment T in G is bounded by min(2 q λ, 2 q λ/ √ κ T ) = Θ(2 q λ ) = Θ( √ ωλ ). As the total length of the boundary is Θ(1), the number of segments in G is bounded by Θ(1 ( / √ ωλ )) = Θ( √ ω ). Next, let us consider the number of pairs in F . Since that the boundary is C 2 , for almost all pairs ( T, S ) in F the segments T and S have the same length. Consider first the segments of length 2 q λ . As there are 2 q segments of this length, the total number of pairs is bounded by 2 2 q = Θ( ω ). For length equal to smaller values, a segment T only appears together with a constant number of segments S in its neighborhood. Therefore, the total number of pairs in F is again Θ( ω ). The complexity of the setup algorithm contains three parts: - · The generation of the set F . It takes O ω ( log ω ) steps. - · The evaluation of the dense pairs. Clearly there are at most Θ( ω ) dense pairs. Since each leaf segment contains at most O (1) points, the dense matrix G T,S ( ) has O (1) entries. Therefore, the evaluation cost of all dense pairs is O ω ( ). - · The evaluation of the low-rank pairs. Again, the number of low-rank pairs is at most Θ( ω ). In all cases of the low-rank pairs, the matrices G mm T,S , G · m S T, , and G m ,S · T have O (1) entries. Therefore, the evaluation cost of all low-rank pairs is also O ω ( ). Summing these contributions together gives a Θ( ω log ω ) = Θ( n log n ) complexity for the setup algorithm. ## 2.4. Evaluation algorithm. Now we are ready to describe how to evaluate the sums $$u ( x ) = \sum _ { y \in P } G ( x, y ) f ( y ), \ \ x \in P$$ efficiently. In the following discussion, we slightly abuse notation by using u to denote the vector ( u x ( )) x ∈ P and f to denote the vector ( f ( y )) y ∈ P . For a segment T , u T ( ) stands for the subvector obtained by restricting u to the points in T . Similarly, f ( S ) is the restriction of f to the points in S . Initially, we set u = 0. The algorithm visits all pairs ( T, S ) ∈ F . If ( T, S ) is dense, then $$u ( T ) \Leftarrow u ( T ) + G ( T, S ) f ( S ),$$ where ⇐ stands for assignment. If ( T, S ) is low-rank and both T and S are almost-planar, (10) $$\stackrel { \lambda } { u } ( T ) \leq u ( T ) + \text{diag} ( F _ { T } ( \cdot, k _ { T S } ^ { T } ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot I _ { S } ^ { t } \cdot \text{diag} ( F _ { S } ( \cdot, k _ { T S } ^ { S } ) ) \cdot f ( S ).$$ If ( T, S ) is low-rank and only S is almost-planar, - (11) u T ( ) ⇐ u T ( ) + G · m TS ( T, R S ) · I t S · diag( F S (: , k S TS )) · f ( S . ) If ( T, S ) is low-rank and only T is almost-planar, $$( 1 2 ) \quad \ u ( T ) \Longleftrightarrow u ( T ) + \text{diag} ( F _ { T } ( \cdot, k _ { T S } ^ { T } ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m \cdot } ( R _ { T }, S ) \cdot f ( S ).$$ Direct evaluation of these three formulas results in a Θ( ω 3 2 / ) complexity. In order speed up this calculation, the work is split into multiple steps. Let us consider (10), i.e., the situation where both T and S are almost-planar. First, at segment S , one needs to compute $$I _ { S } ^ { t } \cdot \text{diag} ( F _ { S } ( \colon, k _ { T S } ^ { S } ) ) \cdot f ( S ).$$ It turns out to be extremely useful to consider all k ∈ K S altogether instead of one by one: $$I _ { S } ^ { t } \cdot \text{diag} ( F _ { S } ( \colon, k ) ) \cdot f ( S ).$$ This is equivalent to evaluating for each j ∈ R S $$( 1 3 ) \quad \langle I _ { S } ( \cdot, j ), F _ { S } ( \cdot, k ) \odot f ( S ) \rangle = \langle F _ { S } ( \cdot, k ), I _ { S } ( \cdot, j ) \odot f ( S ) \rangle \coloneqq \hat { f } _ { S } ( j, k ),$$ where the symbol glyph[circledot] stands for the entrywise product of two vectors and 〈· , ·〉 is the bilinear product, i.e., 〈 v, w 〉 = ∑ i v w i i . An essential observation from the last equation is that: - · Computing ˆ ( f S j, :) (i.e., all k ∈ K S with a fixed j ∈ R S ) simply requires entrywise product of f ( S ) with I S (: , k ), followed by an FFT. Looping through each j ∈ R S provides all entries in the | R S | × | K S | matrix ˆ (: f S , :). Second, instead of considering one pair ( T, S ) at a time, we fix T and consider all pairs for which the first component is T and both T and S are almost-planar. More precisely, $$u ( T ) \Leftarrow u ( T ) + \sum _ { S } \text{diag} ( F _ { T } ( \cdot, k _ { T S } ^ { T } ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot \hat { f } _ { S } ( \cdot, k _ { T S } ^ { S } )$$ $$\leftarrow u ( T ) + \sum _ { k \in K _ { T } } \sum _ { S \colon k _ { T S } ^ { T } = k } \text{diag} ( F _ { T } ( \colon, k ) ) \cdot I _ { T } \cdot G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot \hat { f } _ { S } ( \colon, k _ { T S } ^ { S } ) \\.$$ $$\leq u ( T ) + \sum _ { k \in K _ { T } } \text{diag} ( F _ { T } ( \colon, k ) ) \cdot I _ { T } \cdot \left ( \sum _ { S \colon k _ { T S } ^ { T } = k } G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \cdot \hat { f } _ { S } ( \colon, k _ { T S } ^ { S } ) \right ).$$ Motivated by the last equation, we introduce an | R T | × | K T | matrix ˆ u T (: , :) defined via $$\hat { u } _ { T } ( \vdots, k ) = \sum _ { S \colon k _ { T S } ^ { T } = k } G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \hat { f } _ { S } ( \vdots, k _ { T S } ^ { S } ).$$ Third, we can now write $$u ( T ) \leq u ( T ) + \sum _ { k \in K _ { T } } \text{diag} ( F _ { T } ( \colon, k ) ) \cdot I _ { T } \cdot \hat { u } _ { T } ( \colon, k ).$$ To perform this computation efficiently, notice that the last term is (14) $$\sum _ { k \in K _ { T } } ^ { \{ \iota \iota \jmath } \sum _ { j \in R _ { T } } \text{diag} ( F _ { T } ( \iota, k ) ) I _ { T } ( \iota, j ) \cdot \hat { u } _ { T } ( j, k ) = \sum _ { j \in R _ { T } } I _ { T } ( \iota, j ) \odot \left ( \sum _ { k \in K _ { T } } F _ { T } ( \iota, k ) \hat { u } _ { T } ( j, k ) \right ).$$ An essential observation is that - · for a fixed j ∈ R T , the sum over k ∈ K T can be carried out by an FFT. Therefore, for each j ∈ R T , the work is reduced to an FFT followed by an entrywise product. The above discussion addresses the case where both T and S are almostplanar. For the cases where only one of them is almost-planar, i.e., (11) and (12), the procedure is similar except that the oscillatory Chebyshev interpolation and local FFTs are done only on one side. To summarize, the evaluation algorithm takes the following steps: - (1) Set u = 0 and ˆ u T (: , :) = 0. DIRECTIONAL COMPUTATION OF HIGH FREQUENCY BOUNDARY INTEGRALS13 - (2) For each segment S and for each j ∈ R S , form ˆ ( f S j, :) by an entrywise product followed by an FFT, as shown in (13). - (3) For each pair ( T, S ) in F , - (a) If ( T, S ) is dense, $$u ( T ) \Leftarrow u ( T ) + G ( T, S ) f ( S ).$$ - (b) If ( T, S ) is low-rank and both are almost-planar, $$\hat { u } _ { T } ( \vdots, k _ { T S } ^ { T } ) \leq \hat { u } _ { T } ( \vdots, k _ { T S } ^ { T } ) + G _ { T S } ^ { m m } ( R _ { T }, R _ { S } ) \hat { f } _ { S } ( \vdots, k _ { T S } ^ { S } ).$$ - (c) If ( T, S ) is low-rank and only S is almost-planar, $$u ( T ) \leq u ( T ) + G _ { T S } ^ { \cdot m } ( T, R _ { S } ) \hat { f } _ { S } ( \colon, k _ { T S } ^ { S } ).$$ - (d) If ( T, S ) is low-rank and only T is almost-planar, $$\hat { u } _ { T } ( \colon, k _ { T S } ^ { T } ) \leq \hat { u } _ { T } ( \colon, k _ { T S } ^ { T } ) + G _ { T S } ^ { m \colon } ( R _ { T }, S ) f ( S ).$$ - (4) For each segment T and for each j ∈ R T , apply an FFT and then an entrywise product to ˆ u T ( j, :) and add the result to u T ( ), as shown in (14). - 2.4.1. Complexity of the evaluation algorithm. The complexity of the four steps of the evaluation algorithm is estimated as follows. - (1) The cost of the first step is clearly O ω ( ). - (2) The FFT for a segment of length tλ and tp points take Θ( t log t ) steps as p is constant. Since there are O (4 q /t ) segments of this length, the overall cost is O (4 q log t ) = O ω ( log t ). Now summing over all possible values of t results a complexity of O ω ( log 2 ω ) for the second step of the algorithm. - (3) Now consider the third step. The matrices G T,S ( ), G mm TS ( R ,R T S ), G · m TS ( T, R S ), and G m S · T ( R ,S T ) that appear in all four scenarios all have size O (1). Taking into consideration that there are at most O ω ( ) pairs in F , the cost of this step is O ω ( ). - (4) The last step is very similar to the second one. Its cost is O ω ( log 2 ω ) as well. Putting these together shows that the complexity of the evaluation algorithm is O ω ( log 2 ω ) = O n ( log 2 n ). ## 3. Numerical Results The proposed algorithms are implemented in Matlab and the numerical results in this section are obtained on a desktop computer with a 3.60GHz CPU. The numerical experiments are performed for two domains: (a) an ellipse and (b) a bean-shaped object (shown in Figure 3). The constants in the algorithm are set as follows. - · The number of points p per wavelength is 8. - · The length of the leaf segment is m λ glyph[lscript] with m glyph[lscript] = 4. - · The constant m f in defining the frequency grid is equal to 2. Figure 3. The two scatterers used in the numerical tests. (a) an ellipse. (b) a bean-shaped object. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1197v2-figure-8c3401dc-5aea-47c1-9f9c-4d0c87cdce51.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1197v2-figure-360261f6-323e-4c89-836f-0a3dc95efbab.jpg) - · The size m c of the Chebyshev grid is equal to 6, 8, 10, or 12. This number controls the accuracy of the evaluation algorithm. We denote the exact values and the numerical approximations by u e ( x ) and u a ( x ), respectively. To check the error, the exact solution is evaluated at a set S of 100 points and the relative error is estimated by $$\int _ { - - } \left ( \frac { \sum _ { x \in S } | u _ { e } ( x ) - u _ { a } ( x ) | ^ { 2 } } { \sum _ { x \in S } | u _ { e } ( x ) | ^ { 2 } } \right ) ^ { 1 / 2 }.$$ The experiments are performed for the following four operators $$\begin{matrix} 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\ \end{matrix}$$ $$( y ) d y,$$ $$\text{pemions are peromem } \text{or in the following } \text{or perom } \\ u ( x ) & = ( S f ) ( x ) \coloneqq \int _ { \partial \Omega } G ( x, y ) f ( y ) d y, \\ u ( x ) & = ( D f ) ( x ) \coloneqq \int _ { \partial \Omega } \frac { \partial G ( x, y ) } { \partial n ( y ) } f ( y ) d y, \\ u ( x ) & = ( D ^ { \prime } f ) ( x ) \coloneqq \int _ { \partial \Omega } \frac { \partial G ( x, y ) } { \partial n ( x ) } f ( y ) d y, \\ u ( x ) & = ( N f ) ( x ) \coloneqq \int _ { \partial \Omega } \frac { \partial ^ { 2 } G ( x, y ) } { \partial n ( x ) \partial n ( y ) } f ( y ) d y, \\ \text{typically referred as single layer } ( S ), \text{ double layer } ( S ), \text{ double } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text { } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text`}$$ which are typically referred as single layer ( S ), double layer ( D ), normal derivative of single layer ( D ′ ), and normal derivative of double layer ( N ) [7,16]. These operators are the basic building blocks of the boundary integral methods for solving the Dirichlet and Neumann problems of acoustic wave scattering. The numerical results for the single layer operator S on the two domains are given in Tables 1 and 2. In these tables, - · m c is the size of the Chebyshev grid that controls the accuracy of the method, - · ω is the frequency of the wave field, - · n is the number of boundary discretization points, - · T s is the running time for the setup algorithm, - · T a is the running times of the application algorithm, and - · e is the relative error estimated via (15). The numerical results for the double layer operator D on the two domains are given in Tables 3 and 4. The numerical results for the normal derivative of the single layer operator D ′ on the two domains are given in Tables 5 and 6. Finally, the numerical results for the normal derivative of the double layer operator N on the two domains are given in Tables 7 and 8. Table 1. Numerical results of operator S for the ellipse. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5300 | 33000 | 19 | 1.3 | 0.00024 | | 6 | 21000 | 130000 | 80 | 5.5 | 0.00035 | | 6 | 85000 | 520000 | 330 | 22 | 0.00029 | | 8 | 5300 | 33000 | 20 | 1.9 | 1e-05 | | 8 | 21000 | 130000 | 82 | 5.6 | 8.8e-06 | | 8 | 85000 | 520000 | 330 | 24 | 1.3e-05 | | 10 | 5300 | 33000 | 21 | 2 | 9.9e-07 | | 10 | 21000 | 130000 | 84 | 6.1 | 7.8e-07 | | 10 | 85000 | 520000 | 340 | 26 | 5.3e-07 | | 12 | 5300 | 33000 | 22 | 2.2 | 2e-08 | | 12 | 21000 | 130000 | 88 | 6.6 | 2.2e-08 | | 12 | 85000 | 520000 | 360 | 29 | 2.7e-08 | Table 2. Numerical results of operator S for the beanshaped object. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5200 | 33000 | 26 | 2 | 0.00076 | | 6 | 21000 | 130000 | 100 | 6.6 | 0.00091 | | 6 | 83000 | 520000 | 420 | 30 | 0.00094 | | 8 | 5200 | 33000 | 27 | 2.4 | 5.6e-05 | | 8 | 21000 | 130000 | 110 | 7 | 5.4e-05 | | 8 | 83000 | 520000 | 430 | 30 | 7.5e-05 | | 10 | 5200 | 33000 | 28 | 2.5 | 2.2e-06 | | 10 | 21000 | 130000 | 110 | 7.4 | 2.3e-06 | | 10 | 83000 | 520000 | 440 | 32 | 2.7e-06 | | 12 | 5200 | 33000 | 29 | 2.7 | 1.9e-07 | | 12 | 21000 | 130000 | 120 | 7.9 | 3.1e-07 | | 12 | 83000 | 520000 | 470 | 34 | 3.5e-07 | The numerical results show that both the setup and the evaluation algorithms scale linearly with respect to ω and n . The log-square factor log 2 ω of the application algorithm is not significant. The running time reported here are obtained with our current Matlab implementation. We expect a careful | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5300 | 33000 | 22 | 1.4 | 0.00033 | | 6 | 21000 | 130000 | 86 | 5.3 | 0.00051 | | 6 | 85000 | 520000 | 350 | 23 | 0.00047 | | 8 | 5300 | 33000 | 22 | 1.9 | 2.1e-05 | | 8 | 21000 | 130000 | 89 | 5.8 | 1.9e-05 | | 8 | 85000 | 520000 | 360 | 24 | 2.6e-05 | | 10 | 5300 | 33000 | 22 | 2 | 6.8e-07 | | 10 | 21000 | 130000 | 91 | 6.2 | 4.8e-07 | | 10 | 85000 | 520000 | 370 | 26 | 8.3e-07 | | 12 | 5300 | 33000 | 23 | 2.2 | 2.3e-08 | | 12 | 21000 | 130000 | 95 | 6.7 | 2.7e-08 | | 12 | 85000 | 520000 | 390 | 29 | 2.6e-08 | Table 3. Numerical results of operator D for the ellipse. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5200 | 33000 | 28 | 2.5 | 0.0012 | | 6 | 21000 | 130000 | 110 | 6.6 | 0.002 | | 6 | 83000 | 520000 | 450 | 30 | 0.001 | | 8 | 5200 | 33000 | 29 | 2.3 | 7.8e-05 | | 8 | 21000 | 130000 | 110 | 7 | 6.3e-05 | | 8 | 83000 | 520000 | 460 | 30 | 7.3e-05 | | 10 | 5200 | 33000 | 30 | 2.5 | 1.6e-06 | | 10 | 21000 | 130000 | 120 | 7.4 | 4.1e-06 | | 10 | 83000 | 520000 | 470 | 32 | 4e-06 | | 12 | 5200 | 33000 | 31 | 2.7 | 3.2e-07 | | 12 | 21000 | 130000 | 120 | 8 | 4.5e-07 | | 12 | 83000 | 520000 | 500 | 34 | 5.4e-07 | Table 4. Numerical results of operator D for the beanshaped object. C/C++ or Fortran implementation to exhibit much lower absolute running times. The relative error is clearly controlled by the size of the Chebyshev grid m c . Even for relative small Chebyshev grids, the algorithms achieve good accuracy. An attractive feature of the new algorithms is that once the kernel function is provided the algorithms are fully kernel-independent. ## 4. Discussions This paper presented a new directional algorithm for rapid evaluation of high frequency boundary integrals via oscillatory Chebyshev interpolation and local FFTs. This algorithm is conceptually simple, fast, and kernelindependent. Table 5. Numerical results of operator D ′ for the ellipse. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5300 | 33000 | 21 | 2.3 | 0.00031 | | 6 | 21000 | 130000 | 86 | 5.4 | 0.00032 | | 6 | 85000 | 520000 | 350 | 23 | 0.00043 | | 8 | 5300 | 33000 | 21 | 1.9 | 1.5e-05 | | 8 | 21000 | 130000 | 88 | 5.8 | 1.7e-05 | | 8 | 85000 | 520000 | 350 | 24 | 1e-05 | | 10 | 5300 | 33000 | 22 | 2 | 3.8e-07 | | 10 | 21000 | 130000 | 91 | 6.2 | 4.1e-07 | | 10 | 85000 | 520000 | 370 | 26 | 4.1e-07 | | 12 | 5300 | 33000 | 23 | 2.2 | 1.6e-08 | | 12 | 21000 | 130000 | 96 | 6.7 | 3.3e-08 | | 12 | 85000 | 520000 | 390 | 29 | 1.8e-08 | Table 6. Numerical results of operator D ′ for the beanshaped object. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5200 | 33000 | 28 | 2.5 | 0.0016 | | 6 | 21000 | 130000 | 110 | 6.6 | 0.0015 | | 6 | 83000 | 520000 | 450 | 31 | 0.00076 | | 8 | 5200 | 33000 | 29 | 2.3 | 9.3e-05 | | 8 | 21000 | 130000 | 110 | 7 | 0.00013 | | 8 | 83000 | 520000 | 460 | 30 | 0.0001 | | 10 | 5200 | 33000 | 30 | 2.5 | 6.3e-06 | | 10 | 21000 | 130000 | 120 | 7.4 | 5e-06 | | 10 | 83000 | 520000 | 470 | 32 | 3.6e-06 | | 12 | 5200 | 33000 | 31 | 2.7 | 2.5e-07 | | 12 | 21000 | 130000 | 120 | 7.9 | 3.7e-07 | | 12 | 83000 | 520000 | 500 | 35 | 3.8e-07 | Among the previously presented algorithms, this algorithm shares with the algorithm in [10, 11] the idea of using directional low-rank separated approximations. However, in [10,11] the directional upward and downward equivalent sources are computed in upward and downward passes in a recursive fashion. In this algorithm, the low-rank separated approximations are computed instead using local FFTs combined with oscillatory Chebyshev interpolation. This makes the current algorithm much simpler to implement. Though the paper presented the algorithms in the case of smooth boundaries, they work for piecewise smooth boundaries without much modification. One assumption is that the discretization points are equally spaced | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5300 | 33000 | 24 | 2.3 | 0.00069 | | 6 | 21000 | 130000 | 100 | 5.3 | 0.00042 | | 6 | 85000 | 520000 | 400 | 23 | 0.00031 | | 8 | 5300 | 33000 | 25 | 1.9 | 2e-05 | | 8 | 21000 | 130000 | 100 | 5.8 | 1.3e-05 | | 8 | 85000 | 520000 | 420 | 24 | 1.6e-05 | | 10 | 5300 | 33000 | 27 | 2 | 4.5e-07 | | 10 | 21000 | 130000 | 110 | 6.2 | 1.3e-06 | | 10 | 85000 | 520000 | 440 | 26 | 7.4e-07 | | 12 | 5300 | 33000 | 29 | 2.2 | 3e-08 | | 12 | 21000 | 130000 | 120 | 6.7 | 2.9e-08 | | 12 | 85000 | 520000 | 470 | 28 | 2e-08 | Table 7. Numerical results of operator N for the ellipse. | m c | ω | n | T s | T a | e | |-------|-------|--------|-------|-------|---------| | 6 | 5200 | 33000 | 32 | 2.6 | 0.0012 | | 6 | 21000 | 130000 | 130 | 6.6 | 0.0011 | | 6 | 83000 | 520000 | 510 | 30 | 0.0014 | | 8 | 5200 | 33000 | 33 | 2.4 | 0.0001 | | 8 | 21000 | 130000 | 130 | 7 | 0.00012 | | 8 | 83000 | 520000 | 530 | 30 | 0.00012 | | 10 | 5200 | 33000 | 35 | 2.5 | 4.2e-06 | | 10 | 21000 | 130000 | 140 | 7.4 | 4.6e-06 | | 10 | 83000 | 520000 | 560 | 32 | 3.4e-06 | | 12 | 5200 | 33000 | 38 | 2.8 | 5.1e-07 | | 12 | 21000 | 130000 | 150 | 8 | 3.4e-07 | | 12 | 83000 | 520000 | 610 | 34 | 5.9e-07 | Table 8. Numerical results of operator N for the beanshaped object. according to the arclength parameterization. This assumption can be relaxed if the parameterization is a smooth function of the arclength. For an irregular discretization, the non-uniform FFTs [3, 9, 13, 17] can be used instead. The main topic for future work is the extension of this approach to the 3D boundary integral formulations of the scattering problems. ## References - [1] Milton Abramowitz and Irene A. Stegun (eds.), Handbook of mathematical functions with formulas, graphs, and mathematical tables , Dover Publications, Inc., New York, 1992. Reprint of the 1972 edition. MR1225604 (94b:00012) - [2] M. Bebendorf, C. Kuske, and R. Venn, Wideband nested cross approximation for Helmholtz problems , 2012. SFB 611, Preprint 536, submitted. - [3] G. Beylkin, On the fast Fourier transform of functions with singularities , Appl. Comput. Harmon. Anal. 2 (1995), no. 4, 363-381. MR1354915 (96i:65122) - [4] E. Bleszynski, M. Bleszynski, and T. Jaroszewicz, Aim: Adaptive integral method for solving large-scale electromagnetic scattering and radiation problems , Radio Science 31 (1996), no. 5, 1225-1251. - [5] Oscar P. Bruno and Leonid A. Kunyansky, A fast, high-order algorithm for the solution of surface scattering problems: basic implementation, tests, and applications , J. Comput. Phys. 169 (2001), no. 1, 80-110. MR1829284 (2002b:65188) - [6] R. Coifman, V. Rokhlin, and S. Wandzura, The fast multipole method for the wave equation: a pedestrian prescription , Antennas and Propagation Magazine, IEEE 35 (1993June), no. 3, 7-12. - [7] David Colton and Rainer Kress, Inverse acoustic and electromagnetic scattering theory , Third, Applied Mathematical Sciences, vol. 93, Springer, New York, 2013. MR2986407 - [8] Eric Darve, The fast multipole method. I. Error analysis and asymptotic complexity , SIAM J. Numer. Anal. 38 (2000), no. 1, 98-128 (electronic). MR1770344 (2001e:65047) - [9] A. Dutt and V. Rokhlin, Fast Fourier transforms for nonequispaced data , SIAM J. Sci. Comput. 14 (1993), no. 6, 1368-1393. MR1241591 (95d:65114) - [10] Bj¨ orn Engquist and Lexing Ying, Fast directional multilevel algorithms for oscillatory kernels , SIAM Journal on Scientific Computing 29 (2007), no. 4, 1710-1737. - [11] Bj¨ orn Engquist and Lexing Ying, A fast directional algorithm for high frequency acoustic scattering in two dimensions , Commun. Math. Sci. 7 (2009), no. 2, 327345. MR2536441 (2010d:65351) - [12] Michael A. Epton and Benjamin Dembart, Multipole translation theory for the threedimensional laplace and helmholtz equations , SIAM J. Sci. Comput. 16 (July 1995), no. 4, 865-897. - [13] Leslie Greengard and June-Yub Lee, Accelerating the nonuniform fast Fourier transform , SIAM Rev. 46 (2004), no. 3, 443-454. MR2115056 (2006g:65222) - [14] Matthias Messner, Martin Schanz, and Eric Darve, Fast directional multilevel summation for oscillatory kernels based on Chebyshev interpolation , J. Comput. Phys. 231 (2012), no. 4, 1175-1196. MR2876448 - [15] E. Michielssen and A. Boag, A multilevel matrix decomposition algorithm for analyzing scattering from large structures , IEEE Transactions on Antennas and Propagation 44 (1996), no. 8, 1086-1093. - [16] Jean-Claude N´ ed´lec, e Acoustic and electromagnetic equations , Applied Mathematical Sciences, vol. 144, Springer-Verlag, New York, 2001. Integral representations for harmonic problems. MR1822275 (2002c:35003) - [17] Daniel Potts, Gabriele Steidl, and Manfred Tasche, Fast Fourier transforms for nonequispaced data: a tutorial , Modern sampling theory, 2001, pp. 247-270. MR1865690 - [18] V. Rokhlin, Rapid solution of integral equations of scattering theory in two dimensions , J. Comput. Phys. 86 (1990), no. 2, 414-439. MR1036660 (90k:76081) - [19] , Diagonal forms of translation operators for the Helmholtz equation in three dimensions , Appl. Comput. Harmon. Anal. 1 (1993), no. 1, 82-93. MR1256528 (95d:35034) - [20] J. M. Song and W. C. Chew, Multilevel fast-multipole algorithm for solving combined field integral equations of electromagnetic scattering , Microwave Opt. Tech. Lett. 10 (1995), no. 1, 15-19. - [21] Jiming Song, Cai-Cheng Lu, and Weng Cho Chew, Multilevel fast multipole algorithm for electromagnetic scattering by large complex objects , Antennas and Propagation, IEEE Transactions on 45 (1997Oct), no. 10, 1488-1493. Department of Mathematics and Institute for Computational and Mathe- matical Engineering, Stanford University, Stanford, CA 94305 E-mail address : [email protected]
null
[ "Lexing Ying" ]
2014-08-06T07:27:14+00:00
2014-09-16T19:49:54+00:00
[ "math.NA" ]
Fast Directional Computation of High Frequency Boundary Integrals via Local FFTs
The boundary integral method is an efficient approach for solving time-harmonic acoustic obstacle scattering problems. The main computational task is the evaluation of an oscillatory boundary integral at each discretization point of the boundary. This paper presents a new fast algorithm for this task in two dimensions. This algorithm is built on top of directional low-rank approximations of the scattering kernel and uses oscillatory Chebyshev interpolation and local FFTs to achieve quasi-linear complexity. The algorithm is simple, fast, and kernel-independent. Numerical results are provided to demonstrate the effectiveness of the proposed algorithm.
1408.1199v1
3 ## Self-assembly of hard helices: a rich and unconventional polymorphism Hima Bindu Kolli, 1 Elisa Frezza, 2 Giorgio Cinacchi, 3 Alberta Ferrarini, 4 Achille Giacometti, 1 Toby S. Hudson, 5 Cristiano de Michele, 6 and Francesco Sciortino 6 1 Dipartimento di Scienze Molecolari e Nanosistemi, Universit` a Ca' Foscari di Venezia, Dorsoduro 2137, 30123 Venezia, Italy 2 Dipartimento di Scienze Chimiche, Universit` di Padova, via F. Marzolo 1, 35131 Padova, a Italy. Present address:Bases Molculaires et Structurales des Syst´mes Infectieux, e Uni. Lyon I/CNRS UMR 5086,IBCP, 7 Passage du Vercours, 69367 Lyon, France Departamento de F´ ısica Te´rica de la Materia Condensada and Instituto de F´ ısica de la Materia Condensada, o Universidad Aut´noma de Madrid, Campus de Cantoblanco, 28049 Madrid, Spain o 4 Dipartimento di Scienze Chimiche, Universit` di Padova, via F. Marzolo 1, 35131 Padova, Italy a 5 School of Chemistry, University of Sydney, NSW 2006, Australia 6 Dipartimento di Fisica, Universit` di Roma 'La Sapienza', Piazzale A. Moro 5, 00185 Roma, Italy a (Dated: today) Hard helices can be regarded as a paradigmatic elementary model for a number of natural and synthetic soft matter systems, all featuring the helix as their basic structural unit: from natural polynucleotides and polypeptides to synthetic helical polymers; from bacterial flagella to colloidal helices. Here we present an extensive investigation of the phase diagram of hard helices using a variety of methods. Isobaric Monte Carlo numerical simulations are used to trace the phase diagram: on going from the low-density isotropic to the high-density compact phases, a rich polymorphism is observed exhibiting a special chiral screw-like nematic phase and a number of chiral and/or polar smectic phases. We present a full characterization of the latter, showing that they have unconventional features, ascribable to the helical shape of the constituent particles. Equal area construction is used to locate the isotropic-to-nematic phase transition, and results are compared with those stemming from an Onsager-like theory. Density functional theory is also used to study the nematic-to-screw-nematic phase transition: within the simplifying assumption of perfectly parallel helices, we compare different levels of approximation, that is second- and third-virial expansions and Parsons-Lee correction. ## I. INTRODUCTION Short-range repulsive interactions are those mainly responsible for the structure of classical particle fluid systems; this is what originally conferred worthiness to hard-body particle models.[1] These have actually proven to be a very good representation of colloidal particle systems, with a very good agreement between the theoretical phase diagram of hard spheres and the experimental phase behaviour of colloidal spheres.[2] Today, ever-increasing importance of colloids and advances in the synthesis of colloidal particles of non-spherical symmetry [3-5] are depriving theoretical studies of any hard particle system of what is remaining of a mere academic aura, demonstrating that these studies may be crucial for the design of new colloidal materials.[6] Helical particles are especially worth investigating as Nature has conferred to the helix a rather prominent role. Helical polynucleotides and polypeptides function at large enough densities that the details of their shape start to be relevant.[7] The desire of mimicking Nature in reproducing the functions carried out by helical biopolymers has, in turn, led to a very active area in polymer research - the synthesis and characterisation of helical polymers, aiming at exploiting the inherent chirality of the helical structure to produce new functional materials to be used especially in asymmetric catalysis and enantiomeric separation. [8, 9] This material interest merges with its inherent biological interest in the currently pursued attempt to employ DNA, perhaps the most emblematic of all helical biomolecular systems, as a building-block for new materials.[10, 11] Rather surprisingly, in spite of this wealth of inspiration sources, helices appear to have been mostly overlooked in past theoretical studies on hard-body non-spherical particle systems, focussing mostly on rod- or disc-like particles,[12, 13] possibly due to the tacit assumption that helices, as elongated objects, can be assimilated to rods. To fill this gap, we have undertaken a systematic investigation of the phase behaviour of hard helices, using numerical simulation and density functional theory. We have found how finely the isotropic-nematic phase boundaries depend on the structural parameters defining a helical particle, with a dependence not simply rooted in its aspect ratio, thus making a mapping onto an effective rod rather loose.[14] More importantly, we have also provided evidence for the existence of a new chiral nematic phase, named screw-nematic, the helix twofold symmetry axes spiral around the main phase director.[16] This was the phase observed in experiments on systems of colloidal helical filaments,[17] but our results on such a basic model suggest this screw-nematic phase to be a general feature of any helical particle system, including DNA suspensions at sufficiently high densities.[18] In the present work, we build upon past work by extending it in several respects. (i) We present a complete phase diagram in the density-pressure plane, with a special emphasis on the smectic phases occurring at densities higher than those typical of the conventional and screw-nematic phases, and discuss how the screw-nematic order merges with a tendency to layering to produce new chiral, screw-like, smectic phases. (ii) We perform a detailed study of the isotropic-nematic coexistence; (iii) We extend the second-virial theory for the nematic-to-screw-nematic phase transition [16] by adding the third-virial contribution, and validate it against numerical simulations. In the next section, we provide details on the various theoretical and computational methods used. We first describe the Monte Carlo simulation technique and then the density functional theory at different levels of approximation. Section III presents and discusses the results, sub-divided in several parts. In the first, phase diagrams, as obtained from isobaric Monte Carlo simulations, are shown and the structure of the smectic phases occurring in the higher density regions is described by means of positional and orientational order parameters and pair correlation functions. In the second part, attention is paid to the isotropic-nematic phase transition, with the aim of a proper location of the coexisting densities and pressure. The third part presents the theoretical results for the nematic-to-screw-nematic phase transition. Finally, Section IV concludes this work by giving a brief summary and possible outlooks. ## II. MODEL AND METHODS Helices were simply modelled as a line of 15 fused hard spherical beads of diameter D rigidly arranged into a helicoidal shape, with a contour length fixed to L = 10 D .[14] On changing the radius r and pitch p at fixed L , the shape of the helical particle can be tuned from a straight rod to very wound coils (Fig.1). We focus on increasingly twisted helical shapes in the range r/D ∈ [0 2; 0 4] and . . p/D ∈ [2; 8]. Such particles have a sufficiently large effective aspect ratio to display a rich polymorphic liquid-crystal phase behaviour, and yet they have an intermediate degree of 'curliness' ( L/p = O (1)), so that phase sequences and phase structures are expected to depend sensitively on the overall set of parameters defining the particle shape. Hereafter, all lengths will be expressed in units of D . To trace the full phase diagrams of such objects, we resorted to Monte Carlo (MC) numerical simulations in the isobaric(-isothermal) ensemble (MC-NPT) [19, 20]. These calculations were preceded by the construction of the initial compact configurations. Additional MC simulations in the canonical ensemble (MC-NVT) [19, 20] were performed in one specific case to identify the precise value of the volume fractions and pressure at the coexistence. Onsager theory, FIG. 1. Model for a hard helix, with r its radius and p the pitch. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-5a5ecf43-eb5d-4f27-852a-2ee89d142983.jpg) in different forms,[21-23] was used for studying the isotropic-to-nematic and nematic-screw-nematic phase transitions. The remainder of this section provides details on the various methods used to investigate the phase behaviour. ## A. Isopointal search method (ISM) One of the difficulties arising in simulations of non-spherical objects stems from the choice of a judicious set of initial conditions that allow a correct span of the whole phase diagram. Usually, a disordered initial condition is unable to probe the most compact phases. On the other hand, high-density compact configurations of particles of arbitrary shape are not readily envisageable and unexpected features may arise. In this respect, hard (sphero-)cylinders seem an exception;[26] hard ellipsoids, thought for long to crystallise in a 'stretched-fcc' structure,[27] were recently shown to also do otherwise.[28] In order to cope with this problem, we have exploited an isopointal search method [29] to construct compact configurations that we then used as initial configurations in most of the simulations. The method hinges on a structural search for dense packing, supported and guided by crystallographic inputs helping to reduce its computational cost, and coupled to an annealing scheme that progressively increases the density of a small number of helices within a unit cell, until the maximum possible packing is achieved. Calculations were made for a single layer of parallel helices with their centres of mass lying on the same plane. This led to a considerable simplification in that one could limit the analysis to the 17 two-dimensional wallpaper space groups, rather than having to deal with the full set of the 230 three-dimensional space groups. When applied to a system of hard helices with radii ranging in the interval 0 1 . ≤ r ≤ 1 and pitches in the range 1 ≤ p ≤ 10, the ISM predicts that, apart from the peculiar case of p = 1, a specific wallpaper group with a single helix per unit cell provides the maximum possible packing fraction. Fig. 2 (bottom panel) provides a top view of the resulting structure in the case r = 0 2 and . p = 3, with the circles having their centre coincident with the projection on a perpendicular plane to the helix axis, and their radius equal to the helix radius r (the red circle) and to r +1 2 (the black circle). / The black thick lines inside the red circles give the orientation of the twofold (C ) symmetry axis of the helices. 2 Notice that they are aligned along the same direction, meaning that helices are all in register. The darker grey areas indicate overlapping regions, where the grooves of neighbouring helices intrude into each other voids. For any given helix morphology, the method provides the shape and area of the unit cell, also displayed in Fig. 2. The crucial quantity provided by the calculation is the ratio A helix /A cell where A helix is the area occupied by the helix (i.e. the section of the cylinder containing the helix) and A cell the area of the unit cell. Because of the significant overlap between neighbouring helices, this ratio might exceed unity, as clearly indicated by the differences in the two pictures in Fig.2. In case of no overlap, the maximal packing would be the bidimensional hexagonal, having a packing fraction η hex = π/ √ 12 = 0 9064 . . . . and with each larger circle inscribed in the unit cell of area A cell,hex = (2 r +1) 2 π/ 3 (Fig.2 top). This is significantly different from the reported example of a helix with r = 0 2 and . p = 3 (Fig.2 bottom) where the black circle covers a surface substantially larger than the corresponding unit cell. The result for A helix /A cell can then be translated into a volume fraction as $$\eta = \frac { n _ { h e l i x } v _ { 0 } } { A _ { c e l l } \left ( \Lambda + D \right ) }$$ ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-fd6cf0da-12d1-4ee4-ac6c-4576464db5dc.jpg) FIG. 2. Maximally packed structure for two different cases. (Top) Non-overlapping circles, the two-dimensional counterpart of hard cylinders (limit case of helices with r = 0 and p = ∞ , having η hex = π/ √ 12). (Bottom) Overlapping circles corresponding to hard helices with r = 0 2 and . p = 3. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-3cb3b2ff-46c4-4d95-9568-4d73f4e43384.jpg) where n helix is the number of helices in the unit cell (= 1 in the large majority of the cases, as anticipated), v 0 is the volume of the helix, calculated as in Ref.[14], and Λ is the Euclidean length measured as the component parallel to the main axis of the helix of the distance between the first and the last bead.[14, 15] The value of η is reported in Fig. 3 in a colour map as a function of helix r and p . Since these values for η have FIG. 3. Colour map of the maximal packing fraction ( η ) as function of the helix r and p . The digit inserts indicate the value of η . A snapshot of the correspoding helix is also shown in the inset. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-bff1125f-26b8-4a0c-8f5a-b8c4d340be27.jpg) been obtained by considering each layer as independent, they can only be regarded as a reasonable lower bound of the real maximally packed configuration that could be achieved by a further interlayer occupancy optimization. Yet, the so-built configurations constitute a very handy compact initial condition to achieve well equilibrated high density structures, as we will see below. ## B. Isobaric Monte Carlo simulations The MC-NPT method [31] was used for calculating the equation of state of a system of hard helical particles. Up to N =2000 particles were inserted in a generally triclinic and floppy (i.e. shape adapting) computational box, with standard periodic boundary conditions. Such conditions are fully appropriate as long as the spatial periodicity of the mesophases are comparable with the particle length scale, as it is the case of the various phases that we will be discussing in the present study. They would not be appropriate, however, for phases with a periodicity much longer than the particle size. This is in general the case of the cholesteric phase,[33, 34] which for this reason cannot be observed in our simulations. However, just because of its long length scale, the absence of the twist distortion is not expected to substantially affect the boundaries and the local structure of the nematic phase. For this reason, we will henceforth always refer to an untwisted conventional nematic phase, in spite of the chiral nature of helical particles. We will return to this point later on. In the majority of cases, simulations were started from a compact configuration as generated by the ISM. Few tests were additionally carried out to check the robustness of the obtained results with respect to the choice of the initial conditions. Every simulation run was organised in cycles, each of them consisting of N/ 2 translational and N/ 2 rotational trial moves, performed either using quaternions or the Barker-Watts method [19] supplemented with a rotation around the helix main axis, and an attempt to vary shape and volume of the computational box. The typical length of the equilibration runs was 3 -4 × 10 6 MC cycles. Equilibration runs were then followed by typically 2 × 10 6 MC cycle long production runs, during which averages of several order parameters and correlation functions were accumulated. These quantities were used to characterise and distinguish the various phases. Dedicated additional simulations were also carried out with the helix long axes constrained along a fixed direction to validate the theory for the nematic-to-screw-nematic phase transition described in Section II D. ## C. Order parameters and correlation functions Different liquid crystal phases will be distinguished by using appropriate order parameters combined with suitable correlation functions. For the definition of these quantities, we refer to Fig.4 where the helix main axis ̂ u and secondary axis ̂ w , parallel to the C 2 symmetry axis, are shown, along with the unit vectors parallel to the main phase director ( ̂ n ) and to the minor phase director ( ̂ c ) at a given position. The various order parameters calculated are as follows. FIG. 4. Helix with arrows showing the unit vectors ̂ u and ̂ w defined in the molecular frame, and the unit vectors ( ̂ ̂ n c , ) defined in the laboratory frame. X Z , are the axes of the laboratory frame, with α the angle between ̂ w and the X axis. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-25246e92-edfa-4a82-86bf-f8865f28e14d.jpg) - · The nematic order parameter [33, 34] is defined as the averaged second Legendre polynomial $$\langle P _ { 2 } \rangle = \left \langle \frac { 3 } { 2 } ( \widehat { \mathbf u } \cdot \widehat { \mathbf n } ) ^ { 2 } - \frac { 1 } { 2 } \right \rangle,$$ where the average is over the configurations. It can be computed using the standard procedure patterned after the early work of Veilliard-Baron [35] by introducing, for each configuration, the second-rank tensor $$Q _ { \alpha \beta } = \frac { 1 } { N } \sum _ { i = 1 } ^ { N } \frac { 3 } { 2 } \widehat { u } _ { \alpha } ^ { i } \widehat { u } _ { \beta } ^ { i } - \frac { 1 } { 2 } \delta _ { \alpha \beta }$$ with ̂ u α , ̂ u β the Cartesian components of ̂ u and δ α,β the Kr¨necker symbol. This second-rank traceless tensor is o then diagonalized to compute the largest eigenvalue and the corresponding eigendirection. The latter is identified as the configuration's nematic director ̂ n . The maximum eigenvalues are then averaged over the configurations, to give the order parameter 〈 P 2 〉 defined in Eq.(2). This order parameter (essentially) vanishes in the isotropic phase (I) whereas in the nematic phase is (distinctly) larger than zero and approaches unity as density increases. - · The screw-nematic order parameter [16, 18] is defined as $$\langle P _ { 1, c } \rangle = \langle \widehat { \mathbf w } \cdot \widehat { \mathbf c } \rangle \,.$$ This order parameter measures the average alignment along a common direction ( ̂ c ) of the secondary axes ( ̂ w ) of helices having their centre of mass on the same plane perpendicular to the main director ̂ n . In the screw-like organisation, the minor phase director ̂ c , perpendicular to ̂ n , rotates around it in a helical fashion with a pitch p . To determine this order parameter, we have followed the following procedure. Firstly for each configuration, after having determined the main director ̂ n as explained in the previous item, an untwisting of -2 πZ /p i around ̂ n is enforced on the coordinates of particles, where Z i is the coordinate of the center mass of the i -th helix along the Z axis parallel to ̂ n . Then the quantity ̂ w c · ̂ is calculated for each helix and finally 〈 P 1 ,c 〉 is obtained by averaging over all helices and configurations. The order parameter 〈 P 1 ,c 〉 thus enables us to distinguish between the conventional (N) and the unconventional screw-nematic (N ∗ S ) phases. - · The smectic order parameter [33, 34] is defined as $$\langle \tau _ { 1 } \rangle = \left | \left \langle e ^ { i 2 \pi \frac { R, \theta } { d } } \right \rangle \right |,$$ with R the position of a particle centre of mass and d the optimal layer spacing. Evaluated following standard prescriptions (e.g. Ref.[36, 37]), 〈 τ 1 〉 indicates the onset of a smectic phase, where particles tend to organise in layers perpendicular to the director ̂ n . - · The sixfold bond-orientational (hexatic) order parameter and the average number of nearest-neighbours. The former order parameter is defined as: $$\langle \psi _ { 6 } \rangle = \left \langle \frac { 1 } { N } \sum _ { i = 1 } ^ { N } \left | \frac { 1 } { n ( i ) } \sum _ { j = 1 } ^ { n ( i ) } e ^ { 6 i \theta _ { i j } } \right | \right \rangle.$$ Here θ ij is the angle that the i j , intermolecular distance vector forms with a pre-fixed axis in a plane perpendicular to ̂ n , while n i ( ) is the number of nearest-neighbours of molecule i within a single layer. As 〈 τ 1 〉 can only signal the onset of a generic smectic phase, we will then be using 〈 ψ 6 〉 to probe the onset of hexatic order (e.g. [36, 38]). The piece of information stemming from 〈 ψ 6 〉 can be supported by computing the average number 〈 n 〉 of nearest-neighbours within each layer, that tends to 6 in the hexatic phase. This quantity is computed by averaging n i ( ) over all helices in a plane, and over all possible configurations. We remark here that the actual value of n i ( ) is rather sensitive to the definition of nearest-neighbours distance, that has always a certain degree of arbitrariness, especially for hard-body particles, and here is taken to be 1 1. . Both ψ 6 and n i ( ) display consistent behaviour for different layers, and hence the results for a single, arbitraly chosen layer will be shown below. In addition to order parameters, we have calculated several positional and orientational correlation functions that provide a more detailed picture of a single thermodynamic state point. - · The parallel positional correlation function:[39] glyph[negationslash] $$g _ { \| } ( R _ { \| } ) = \frac { 1 } { N } \left \langle \frac { 1 } { \rho L _ { x } L _ { y } } \sum _ { i = 1 } ^ { N } \sum _ { j \neq i } ^ { N } \delta ( R _ { \| } - { \mathbf R } _ { i j } \cdot \hat { \mathbf n } ) \right \rangle$$ - · The perpendicular positional correlation function:[39] glyph[negationslash] $$g _ { \perp } ( R _ { \perp } ) = \frac { 1 } { 2 \pi R _ { \perp } N } \left \langle \frac { 1 } { \rho L _ { z } } \sum _ { i = 1 } ^ { N } \sum _ { j \neq i } ^ { N } \delta \left ( R _ { \perp } - | \mathbf R _ { i j } \times \hat { \mathbf n } | \right ) \right \rangle$$ (8) - · The screw-like parallel orientational correlation function:[16] glyph[negationslash] glyph[negationslash] $$g _ { 1, \| } ^ { \widehat { w } } ( R _ { \| } ) = \left \langle \frac { \sum _ { i = 1 } ^ { N } \sum _ { j \neq i } ^ { N } \delta ( R _ { \| } - \mathbf R _ { i j } \cdot \hat { \mathbf n } ) ( \widehat { w } _ { i } \cdot \widehat { w } _ { j } ) } { \sum _ { i = 1 } ^ { N } \sum _ { j \neq i } ^ { N } \delta ( R _ { \| } - \mathbf R _ { i j } \cdot \hat { \mathbf n } ) } \right \rangle.$$ In Eqs. (7)-(9), ρ = N/V is the number density of the system; V is the volume of the sample; L x and L y are the computational box dimensions along mutually orthogonal directions normal to ̂ n ; L z is the computational box dimension along ̂ n ; δ () is the Dirac δ -function and R ij = R j -R i is the vector joining the centres of helices i and j . The first two positional correlation functions, Eqs. (7) and (8), are used to distinguish a homogeneous (isotropic or nematic) phase (both g ‖ ( R ‖ ) and g ⊥ ( R ⊥ ) liquid-like), a layered (smectic) phase ( g ‖ ( R ‖ ) solid-like and g ⊥ ( R ⊥ ) liquid-like), a columnar phase ( g ‖ ( R ‖ ) liquid-like and g ⊥ ( R ⊥ ) solid-like) or a crystalline phase (both g ‖ ( R ‖ ) and g ⊥ ( R ⊥ ) solid-like). Eq. (9) is used in connection with the screw-nematic order parameter, Eq. (4), for establishing and quantifying the existence of a screw-like type of order in the system. ## D. Density Functional Theory (DFT) This section describes the general density functional theory [40] framework that has been used for studying the I-N and the N-N ∗ S phase transitions. Let us consider a pure system of hard helices whose mechanical state is described by a set of translational and rotational variables. The former are collected under the symbol R , while the latter under the symbol Ω. The single-particle density function is then denoted as ρ ( R , Ω) = ρ ( x ) and normalised such that ∫ d x ρ ( x ) = N . By retaining only the second and third terms in the virial expansion, the excess Helmholtz free energy of such a system is given by: $$\beta F ^ { e x } = \frac { 1 } { 2 } \int d x d x ^ { \prime } \rho ( { \mathbf x } ) M ( { \mathbf x }, { \mathbf x } ^ { \prime } ) \rho ( { \mathbf x } ^ { \prime } ) \left [ 1 + \frac { 1 } { 3 } \int d x ^ { \prime \prime } M ( { \mathbf x }, { \mathbf x } ^ { \prime \prime } ) \rho ( { \mathbf x } ^ { \prime \prime } ) M ( { \mathbf x } ^ { \prime \prime }, { \mathbf x } ^ { \prime } ) \right ],$$ with β = 1 /k B T and M ( x x , ′ ) the Mayer function changed in sign.[41] Let us assume that the system can form liquid crystal phases and that the translational order, if any, is only present along one direction, Z , with a periodicity equal to p . Thus, the single-particle density function can be expressed as ρ ( x ) = ρ Z, ( Ω). Therefore the excess free energy density of the system is given by: $$\frac { \beta F ^ { e x } } { V } = \beta f ^ { e x } = \frac { 1 } { 2 p } \int _ { 0 } ^ { p } d Z d \Omega \rho ( Z, \Omega ) \int d Z ^ { \prime } d \Omega ^ { \prime } \rho ( Z ^ { \prime }, \Omega ^ { \prime } ) \left [ a _ { e x e } ( Z, \Omega, Z ^ { \prime }, \Omega ^ { \prime } ) + \frac { 1 } { 3 } \int d Z ^ { \prime \prime } d \Omega ^ { \prime \prime } \rho ( Z ^ { \prime \prime }, \Omega ^ { \prime \prime } ) a _ { 3 } ( Z, \Omega, Z ^ { \prime }, \Omega ^ { \prime }, Z ^ { \prime \prime }, \Omega ^ { \prime \prime } ) \right ],$$ where the functions a excl ( Z, Ω , Z , ′ Ω ) and ′ a 3 ( Z, Ω , Z , ′ Ω ′ , Z ′′ , Ω ) have been introduced. The first is given by: ′′ $$a _ { e x c l } ( Z, \Omega, Z ^ { \prime }, \Omega ^ { \prime } ) = \int \int d X ^ { \prime } d Y ^ { \prime } M ( 0, Z, \Omega, X ^ { \prime }, Y ^ { \prime }, Z ^ { \prime }, \Omega ^ { \prime } )$$ and is interpreted as the area of the surface obtained by cutting with a plane perpendicular to the director and at position Z ′ the volume excluded to a particle with orientation Ω ′ by a particle at position Z and with orientation Ω.[24] The second function in eq.11 is given by: $$& \alpha _ { 3 } ( Z, \Omega, Z ^ { \prime }, \Omega ^ { \prime }, Z ^ { \prime \prime }, \Omega ^ { \prime \prime } ) = \\ & \int d X ^ { \prime } d Y ^ { \prime } d X ^ { \prime \prime } d Y ^ { \prime \prime } M ( 0, Z, \Omega, X ^ { \prime }, Y ^ { \prime }, Z ^ { \prime }, \Omega ^ { \prime } ) M ( 0, Z, \Omega, X ^ { \prime \prime }, Y ^ { \prime \prime }, Z ^ { \prime \prime }, \Omega ^ { \prime \prime } ) M ( X ^ { \prime }, Y ^ { \prime }, Z ^ { \prime }, \Omega ^ { \prime }, X ^ { \prime \prime }, Y ^ { \prime \prime }, Z ^ { \prime \prime }, \Omega ^ { \prime \prime } ),$$ $$\cdot$$ but does not lend itself to a ready geometrical interpretation. Since a excl and a 3 actually depend on the differences ζ ′ = Z ′ -Z and ζ ′′ = Z ′′ -Z , the equation above can be re-written in a slightly neater way as: $$\frac { \beta F ^ { e x } } { V } = \beta f ^ { e x } = \frac { 1 } { 2 p } \int _ { 0 } ^ { p } d Z d \Omega _ { \rho } ( Z, \Omega ) \int d \zeta ^ { \prime } d \Omega ^ { \prime } \rho ( Z + \zeta ^ { \prime }, \Omega ^ { \prime } ) \left [ a _ { e x e d } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime } ) + \frac { 1 } { 3 } \int d \zeta ^ { \prime \prime } d \Omega ^ { \prime \prime } \rho ( Z + \zeta ^ { \prime \prime }, \Omega ^ { \prime \prime } ) a _ { 3 } ( \zeta ^ { \prime }, \Omega, \Omega ^ { \prime }, \zeta ^ { \prime \prime }, \Omega ^ { \prime \prime } ) \right ]$$ The single-particle density function can be decomposed as follows: $$\rho ( Z, \Omega ) = \rho ( Z ) f ( \Omega | Z ),$$ with ρ Z ( ) the purely translational single particle density, normalised such that (1 /p ) ∫ p 0 dZρ Z ( ) = ρ , and f (Ω | Z ) the particle orientational distribution function at position Z , normalised such that ∫ d Ω (Ω f | Z ) = 1, irrespective of Z . Thus: $$\frac { \beta F e x } { V } & = \beta f ^ { e x } = \frac { 1 } { 2 p } \int _ { 0 } ^ { p } d Z \rho ( Z ) \int d \Omega f ( \Omega | Z ) \int d \zeta ^ { \prime } \rho ( Z + \zeta ^ { \prime } ) \int d \Omega ^ { \prime } f ( \Omega ^ { \prime } | Z + \zeta ^ { \prime } ) \\ & \quad \left [ a _ { e x c l } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime } ) + \frac { 1 } { 3 } \int d \zeta ^ { \prime \prime } \rho ( Z + \zeta ^ { \prime \prime } ) f ( \Omega ^ { \prime \prime } | Z + \zeta ^ { \prime \prime } ) a _ { 3 } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime }, \zeta ^ { \prime \prime }, \Omega ^ { \prime \prime } ) \right ].$$ In the I, N and N ∗ s phases the translational single-particle density does not depend on Z , i.e. ρ Z ( ) = ρ . Eq. 15 can thus be re-written as: $$\frac { \beta F e x } { N } = \frac { \rho } { 2 } \int d \Omega f ( \Omega / 0 ) \int d \zeta ^ { \prime } \int d \Omega ^ { \prime } f ( \Omega ^ { \prime } | \zeta ^ { \prime } ) \left [ a _ { e x c l } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime } ) + \, \frac { \rho } { 3 } \int d \zeta ^ { \prime \prime } \int d \Omega ^ { \prime \prime } f ( \Omega ^ { \prime \prime } | \zeta ^ { \prime \prime } ) a _ { 3 } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime }, \zeta ^ { \prime \prime }, \Omega ^ { \prime \prime } ) \right ]. \, ( 1 6 )$$ If the expansion is truncated at the second virial term, Onsager theory [21] is recovered. One approximate form of the excess free energy density was proposed where the expansion is still truncated at the leading order and a pre-factor introduced that is meant to correct for higher order terms:[22, 23] $$\frac { \beta \mathbb { F } ^ { e x } } { N } = \frac { G ( \eta ) } { 2 } \rho \int d \Omega f ( \Omega | 0 ) \int d \zeta ^ { \prime } \int d \Omega ^ { \prime } f ( \Omega ^ { \prime } | \zeta ^ { \prime } ) a _ { e x c l } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime } )$$ where G η ( ) = (4 -3 η / ) 4(1 -η ) 2 , η being the volume fraction, equal to ρv 0 . This will be denoted as Parsons-Lee (PL) approximation. It was originally formulated for monodisperse systems of hard rod-like particles. Later it was used for other more complex systems (e.g. Refs. [24, 25]). The total free energy density contains also an ideal term [41] and a contribution accounting for the entropy cost of orientational ordering, which is expressed as: $$\frac { \beta F ^ { o r } } { N } = \int d \Omega f ( \Omega ) \ln \left [ 8 \pi ^ { 2 } f ( \Omega ) \right ].$$ The orientational distribution function in the I and N phases is independent of Z , constant in the former and peaked at ± ̂ n in the latter. In the N ∗ s phase it has an implicit dependence on Z because of the local frame rotation around ̂ n with a period equal to p . The equilibrium orientational distribution function is obtained by functional minimization of the free energy density under the constraint of normalisation. This leads to the non-linear self-consistent equation: $$\ln \left [ K f ( \Omega ) \right ] = - \rho \int d \zeta ^ { \prime } \int d \Omega ^ { \prime } f ( \Omega ^ { \prime } | \zeta ^ { \prime } ) \left [ a _ { e x c l } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime } ) + \frac { \rho } { 2 } \int d \zeta ^ { \prime \prime } \int d \Omega ^ { \prime \prime } f ( \Omega ^ { \prime \prime } | \zeta ^ { \prime \prime } ) a _ { 3 } ( \Omega, \zeta ^ { \prime }, \Omega ^ { \prime }, \zeta ^ { \prime \prime }, \Omega ^ { \prime \prime } ) \right ], \quad ( 1 9 )$$ with K ensuring that f (Ω) is correctly normalised. Once f (Ω) is known, thermodynamic properties such as pressure and chemical potential are obtained by differentiating the free energy. We determined the I-N coexistence for helices using Onsager theory with PL correction. Since the orientational distribution function in the I and N phases is independent of the position, f = f (Ω), eq. 17 takes the form:[14] $$\frac { \beta F ^ { e x } } { N } = \frac { G ( \eta ) } { 2 } \rho \int d \Omega f ( \Omega ) \int d \Omega ^ { \prime } f ( \Omega ^ { \prime } ) v _ { e x c l } ( \Omega, \Omega ^ { \prime } )$$ where v excl (Ω Ω ) = , ′ ∫ dζ a ′ excl (Ω , ζ ′ , Ω ) is ′ the excluded volume. A modified form of the Parsons-Lee factor was adopted, as proposed in ref. [54] for non-spherical particles, using the helix volume v 0 calculated as in ref. [14]. Numerical minimisation of the Helmholtz free energy was performed under the constraint of equal pressure, P , and chemical potential, µ , in the two coexisting phases: P I = P N , µ I = µ N . Starting from one point in the isotropic (low density) and one in the nematic phase (high density), calculations at increasing and decreasing density, respectively, were performed. Coexistence was then identified by the crossing of the curves for the I and N branches in the ( P , µ ) plot. For the second order N-N ∗ s phase transition we assumed perfect orientational ordering, which can be justified by the fact that in MC simulations this phase transition is observed at very large values of the nematic order parameter. In this approximation, the functions a excl and a 3 in eq.16 depend, respectively on ( ζ , γ ′ ′ ) and ( ζ , γ , ζ ′ ′ ′′ , γ ′′ ), with γ ′ FIG. 5. Equation of state for helices having r = 0 2 and . p = 8. Different colours indicate different phases: I=isotropic; N=nematic; N ∗ S =screw-nematic; Sm ∗ A,S =screw-smectic A; Sm B,p = smectic B polar. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-e8fdb617-6785-4489-810d-51a34bf89dfc.jpg) ( γ ′′ ) being the angle between the ̂ w axes of two helices whose centres of mass are separated by a distance ζ ′ ( ζ ′′ ) along ̂ n . Thus eq. 16 becomes: $$\frac { \beta F e x } { N } = \frac { \rho } { 2 } \int d \bar { \gamma } f ( \bar { \gamma } | 0 ) \int d \bar { \zeta } ^ { \prime } \int d \bar { \gamma } ^ { \prime } f ( \bar { \gamma } ^ { \prime } | \zeta ^ { \prime } ) \left [ a _ { e x a l } ( \zeta ^ { \prime }, \gamma ^ { \prime } ) + \frac { \rho } { 3 } \int d \zeta ^ { \prime \prime } \int d \bar { \gamma } ^ { \prime \prime } f ( \bar { \gamma } ^ { \prime \prime } | \zeta ^ { \prime \prime } ) a _ { 3 } ( \zeta ^ { \prime }, \gamma ^ { \prime }, \zeta ^ { \prime \prime }, \gamma ^ { \prime \prime } ) \right ],$$ where the angles ˜, ˜ , ˜ γ γ ′ γ ′′ define the orientation of the the ̂ w axes of helices in the laboratory frame, so γ ′ = ˜ γ ′ -˜, γ γ ′′ = ˜ γ ′′ -˜. γ In turn, in this approximation Eq. 17 becomes: $$\frac { \beta \mathrm F ^ { e x } } { N } = G ( \eta ) \frac { \rho } { 2 } \int d \tilde { \gamma } f ( \tilde { \gamma } | 0 ) \int d \zeta ^ { \prime } \int d \tilde { \gamma } ^ { \prime } f ( \tilde { \gamma } ^ { \prime } | \zeta ^ { \prime } ) a _ { e x c l } ( \zeta ^ { \prime }, \gamma ^ { \prime } ).$$ Calculations were performed using Onsager theory with and without PL correction, as well as with the virial expansion extended to the third order contribution. The orientational distribution function at various density values was obtained either by numerical solution of the integral equation, Eq. (19), by adapting the method of Ref. [42], or by numerical minimisation of the Helmholtz free energy.[14] Compared to the calculations at a second-virial level, the incorporation of the third-virial terms called for a significant, but still manageable, increase in the computational cost. Note that it has been assumed that phase pitch coincides with the helix's. Exploratory calculations were performed in which this constraint was released. These calculations confirmed that the equilibrium phase pitch coincides with the helix's, as was indeed plainly expected and as MC simulations were showing. ## III. RESULTS ## A. Phase diagrams from MC-NPT We start by presenting the results obtained for the straightest among the helices investigated, those corresponding to r = 0 2 and . p = 8. Fig. 5 shows the equation of state of this system, with the reduced pressure P ∗ = βPD -3 plotted versus the volume fraction η = Nv /V 0 . Different phases can be distinguished with the help of the order parameters and correlation functions defined in Section II C. At low η the system is in the I phase, but, as η approaches a value ≈ 0 23, . helices tend to align their long axis ( ̂ u ) along a common direction, the main director ̂ n . The onset of the nematic phase is signaled by a jump of the order parameter 〈 P 2 〉 to a value ∼ 0 4, as shown in Fig.6 (left panel). . This is the conventional N phase, as indicated by the absence of translational order and the low or vanishing value of all the other order parameters defined in section II C. Above η ≈ 0 4, Fig.6 (right panel) illustrates how the . 〈 P 1 ,c 〉 order parameter has a marked upswing, the signature of screw-like ordering: the C 2 axes of helices ( ̂ w ) tend to preferentially align along a common axis ̂ c , orthogonal to ̂ n and spiralling around it. Unlike the nematic, this order is locally polar, i.e. the ̂ w vectors on a given plane perpendicular to ̂ n preferentially point to the same direction. Additional insights on the onset of the N ∗ S phase are provided by the correlation functions g ‖ ( R ‖ ) and g ̂ w 1 , ‖ ( R ‖ ), shown in Fig. 7, for two selected state points corresponding to pressure P ∗ = 0 9 and . P ∗ = 1 0, across the N-N . ∗ S phase transition. One can FIG. 6. Order parameters 〈 P 2 〉 and 〈 P 1 ,c 〉 , for helices with r = 0 2 and . p = 8. Different colours indicate state points belonging to different phases (see fig. 5). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-711cca9c-0b5e-4b24-8810-df074202bcef.jpg) FIG. 7. The g ‖ ( R ‖ ) and g ̂ w 1 , ‖ ( R ‖ ) correlation functions for helices with r = 0 2 and . p = 8, calculated for P ∗ = 0 9 in the . N phase (left) and P ∗ = 1 0 in the N . ∗ S phase (right). Also depicted are two corresponding snapshots, colour coded according to the local tangent as explained in the text. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-8b3acb3a-cdb8-483a-85d6-d1b37f37c213.jpg) clearly notice the difference in the behaviour of g ̂ w 1 , ‖ ( R ‖ ) at the two sides of the phase transition, with the function at P ∗ = 1 0 showing a well developed periodicity that matches the pitch of helices . p . The sinusoidal behaviour of g ̂ w 1 , ‖ ( R ‖ ) is representative of an azimuthal correlation in planes perpendicular to ̂ n , indeed a footprint of the N ∗ S phase. A glance at two snapshots [43] also reported in Fig. 7 gives a visual support of this interpretation. Here, as well as in other snapshots reported henceforth, helices are colour coded according to their P 2 (cos θ ) value, where P 2 is the second Legendre polynomial and θ is the angle between the local tangent to helices and an arbitrarily chosen axis, not parallel to the main director ̂ n . This angle changes as the tangent moves along a helix, so that P 2 (cos θ ) and then the colour changes, with a periodicity equal to half the pitch p . Therefore, the regular stripes occurring in the bottom right snapshot of Fig. 7 corresponding to the N ∗ S state point ( P ∗ = 1), but absent in the bottom left snapshot corresponding to the N state point ( P ∗ = 0 9), highlight the different organization occurring at the two pressures. . In Fig. 7 one can further notice a small amplitude oscillation in function g ‖ ( R ‖ ) at P ∗ = 1, that is absent in the corresponding lower pressure case P ∗ = 0 9. . This is indicative of an incipient smectic order, which sets in at the slightly higher pressure P ∗ = 1 1, as confirmed by the solid-like behaviour of . g ‖ ( R ‖ ) shown in Fig.8 (top left). Here we can recognize a periodicity of ∼ 12, only slightly longer than the effective length of the helices, which is equal to 10.88. This is different from the periodicity of g ̂ w 1 , ‖ ( R ‖ ) (top right), which corresponds to the helix pitch p , here equal to 8. Thus the screw-like order has combined with layer ordering to give rise to a new chiral smectic phase. The presence of two different periodicities is evident in the snapshot in Fig. 8. The correlation function g ⊥ ( R ⊥ ) (Fig. 8, bottom left) does not provide indication of translational order within each single layer, and 〈 ψ 6 〉 is found to be very small. This screw-smectic phase, globally uniaxial with the main director perpendicular to the layers, is FIG. 8. The functions g ‖ ( R ‖ ) (top left) and g ̂ w 1 , ‖ ( R ‖ ) (top right) at P ∗ = 1 1, for helices with . r = 0 2 and . p = 8 (Sm ∗ A,S phase.. Also depicted is g ⊥ ( R ⊥ ) and a corresponding snapshot colour coded according to the local tangent to helices (right). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-8609d76c-9317-4945-ab2f-fc4c3db11090.jpg) FIG. 9. Behaviour of g ⊥ ( R ⊥ ) (left) and g ‖ ( R ‖ ) (right) and relative snapshot, colour coded according to the local tangent (left) and to the C 2 axis (right) at P ∗ = 1 3, in the case . r = 0 2 and . p = 8. This state point belongs to the Sm B,p phase. Note that in the case of the C 2 axis, azimuthal rotations of angles in the range [90 ◦ , 180 ] are colour coded in the same way as in the case ◦ [0 ◦ , 90 ] because of the limitations in the QMGA software [43]. ◦ For this reason, this color coding will not be further exploited in the remaining of the paper. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-2d10da73-1aa8-4890-9f3e-7738bd0a51c5.jpg) of type A and labelled as Sm ∗ A,S . At higher pressure, P ∗ = 1 3 ( . η ≈ 0 52), hexatic order sets in within each single . layer, as shown by the behavior of g ⊥ ( R ⊥ ) that exhibits well developed characteristic double peak structure, with maxima at √ 3 σ and 2 σ (Fig. 9, left panel), σ being the position of the main, nearest-neighbour peak. The presence of hexatic order is further confirmed by the high value of 〈 ψ 6 〉 (Fig.10 left panel) and by the fact that the average number of nearest-neighbours 〈 n 〉 tends to 6 at η ≈ 0 52. . The plot of g ̂ w 1 , ‖ ( R ‖ ) (Fig.9, top right panel) shows a clear in-plane azimuthal correlation, but the absence of the helical periodicity that was present in the Sm ∗ A,S phase. The correlation now is only within layers, which are uncorrelated from each other. This difference from the Sm ∗ A,S phase clearly appears from comparison of the relative snapshots of Fig. 8 with those of Fig. 9. We refer to this phase as smectic B polar (Sm B,p ), to highlight the presence of hexatic order combined with polarity within layers. Note that the gaps appearing in the g ̂ w 1 , ‖ ( R ‖ ) are indicative of the absence of particles with those particular R ‖ values and are specific of state points at very high density. On increasing the helical twist, the onset of unconventional screw-like phases becomes more and more pronounced. We first keep the radius fixed at r = 0 2 and decrease the pitch down to . p = 4. The equation of state and corresponding order parameters are reported in Fig.11. As for the case r = 0 2 and . p = 8, there are both the N and the N ∗ S phase, but the latter becomes predominant in this case. Also the higher density smectic phase exhibits new features, with the 〈 P 1 ,c 〉 order parameter being large throughout the entire smectic range and a final sudden drop only at the onset of the compact phase C. Thus all smectic phases exhibit screw-like order. However they are distinguished by the profile of g ⊥ ( R ⊥ ) and by a substantially different behaviour of 〈 ψ 6 〉 , which is larger in the state points belonging to the phase denoted as Sm ∗ B,S than the Sm ∗ A,S phase. Perhaps surprisingly, the average nearest-neighbour number 〈 n 〉 in the Sm ∗ B,S phase remains significantly smaller than 6, in spite of the large value of 〈 ψ 6 〉 . As remarked, this quantity is very sensitive to the definition of the nearest-neighbour distance that contains a significant degree of arbitrariness, and hence might be more accurate for some state points than others. A top view of the relative snapshots none the less confirms the presence of a hexatic ordering in the state points labelled as Sm ∗ B,S and not in those labelled as FIG. 10. Hexatic order parameter 〈 ψ 6 〉 and average nearest-neigbour number 〈 n 〉 , both indicative of in-plane hexatic ordering, for helices with r = 0 2 and . p = 8. State points belonging to different phases are colour as in Fig. 5. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-dc20bb0f-589b-4253-9f86-b75896e01b57.jpg) FIG. 11. Equation of state and order parameters 〈 P 2 〉 , 〈 P 1 ,c 〉 , 〈 τ 1 〉 , 〈 ψ 6 〉 and average nearest-neigbors 〈 n 〉 , (in typewriter order) in the case r = 0 2 and . p = 4. Note that in the plot for the equation of state (top,left), additional points between the two extrema, have been included in the N ∗ s phase, for completness. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-a9c67b57-a8ee-4210-9ec3-68a55505345a.jpg) ## Sm ∗ A,S . The 'curliest' among the investigated helices are those with r = 0 4 and . p = 4, whose morphology is displayed in the inset of Figure 12 showing the equation of state. This exhibits important differences with the phase diagram reported in Figs. 5 and 11, with only two intermediate high-density liquid crystal phases being present, the N ∗ S and Sm ∗ B,S . The system then undergoes a direct first-order transition from the I to the N ∗ S phase, without an intermediate N phase. This behaviour can be ascribed to the combined effect of significant twist and small effective aspect ratio, in agreement with the interpretation given above of the results obtained for the less curly helices. One more novel feature is a direct transition from the N ∗ S phase to a smectic phase with in-plane ordering Sm ∗ B,S . The profile of g ‖ ( R ‖ ) obtained at P ∗ = 1 5 (Fig. 13 top panel) indicates layering with a periodicity close to the effective helix length, 9.47 in . the present case. Hexatic in-plane order is inferred from the behavior of g ⊥ ( R ⊥ ) (Fig. 13 central panel) and from the corresponding high value of 〈 ψ 6 〉 . However, differently from Sm B,p phase (Fig. 9), here there is additional screw-like ordering, with a period equal to the helix pitch p = 4, which is evidenced by the correlation function g ̂ w 1 , ‖ ( R ‖ ) (Fig. 13 bottom panel) and by the high 〈 P 1 ,c 〉 order parameter. Another interesting feature supporting the Sm ∗ B,S nature of the smectic phase is included in the (red) dotted line of g ⊥ ( R ⊥ ) (Fig. 13 central panel) that reports the behaviour of g ⊥ ( R ⊥ ) when the average is limited to a single layer. In particular, the absence of the first peak at R ⊥ ≈ 0 in this case, and conversely present when the average is carried out over all layers, is a clear indication of a AAA structure, reminiscent of a columnar structure, where a helix belonging to a given layer locks with the one stacked immediately on its top, and belonging to the successive layer, to form an essentially 'infinite' helix spanning the full computational box. This essential difference between the structure of the Sm ∗ B,S and the Sm ∗ B,p phases is summarized in the sketch of Fig. 14. While in the Sm ∗ B,S phase (Fig. 14 left) helices are azimuthally correlated within each plane and screw-like correlated between different planes, in the Sm B,p phase (Fig. 14 right) only intra-plane azimuthal correlation is present, with different layers being uncorrelated both positionally and orientationally. Given the crucial FIG. 12. Equation of state for helices with r = 0 4 and . p = 4. Filled circles refer to the same initial conditions used throughout this work, whereas filled darker squares refer to different initial condition, as detailed in the text. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-39ac75df-060b-4924-9078-a4e26de30ba7.jpg) FIG. 13. Top left panel. Plot of g ‖ ( R ‖ ) in the case of r = 0 4, = 4, at reduced pressure . P ∗ = 1 5 (Sm . ∗ B,S phase). Top right panel. Profile of g ⊥ ( R ⊥ ) calculated by averaging over all layers (solid line) and over a single layer (red dotted line). Bottom panel. Behavior of g ̂ w 1 , ‖ ( R ‖ ). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-2d65762a-1602-4324-b9d4-a588b14ffaf0.jpg) role that starting configurations may have at high density, as a final point it is instructive to dwell on their effect on the final phase diagram. We remind at this stage that all results discussed so far were obtained by starting from a very compact initial configuration, obtained by the ISM and then equilibrated at the appropriate value of P ∗ . While for the isotropic and nematic phases a different initial condition would result into an almost indistinguishable picture, this is not necessarily true for higher density phases, as it also happens in the case of hard spherocylinders.[26] This turns out to be also the case here, as reported in Fig.12, where the original results (filled circles) are contrasted with those obtained starting from an equilibrated configuration at the immediately lower pressure (filled squares). In both cases the first smectic point was obtained from the original compact configuration. This small reagion of hysteresis indicates a maximal range of uncertainty of the true thermodynamic coexistence pressure. The results collected so far point to the existence of a first-order transition between the Compact and the Smectic phases: the hysteresis observed may be interpreted as a signal of it. FIG. 14. Cartoon of the smectic B phases discussed in the text. Circles represent transversal sections through the center of helices and arrows the corresponding ̂ w vectors. I,II, III indicate adjacent layers. Left: Sm ∗ B,S phase, with through-layers positional correlation (AAA structure, highlighted by the dashed lines) and screw-like (orientational) correlation of ̂ w vectors. Right: Sm B,p phase, with in-layer correlation of ̂ w vectors and neither positional nor orientational correlation between layers. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-ebb61b83-58e5-4bf0-8670-cd73e0b7d71a.jpg) ## B. Locating the isotropic-to-nematic phase transition It proves of interest, at this stage, to discuss how to properly locate the volume fractions and pressure at the isotropic-nematic coexistence. The most direct method is a technique known as Successive Umbrella Sampling (SUS),[44] originally developed for the calculation of the gas-liquid coexistence in the grand-canonical ensemble. In the isotropic-nematic coexistence of hard rods this has been discussed in Ref.[45]. Although it could be clearly applied to the present case as well, we have found this to be particularly problematic as a result of the combination of the sole hard-core interactions and of the reduced aspect ratio. As the aspect ratio decreases, the I-N transition shifts to higher densities, and insertion of a particle becomes increasingly harder. This agrees with a similar observation made by the authors of Ref.[45], who estimated 15 as the minimum aspect ratio to study the phase transition with a reasonable computational effort, whereas our helices have typical aspect ratios of the order of 10 or less. This notwithstanding, SUS can still be applied to a helical particle system by using a somewhat more elaborate procedure that will be discussed elsewhere. Under these conditions, we have here found it more convenient to resort to a different procedure that, albeit less direct, is still able to provide a rather accurate value of the coexisting densities and pressure. The basic idea is to perform, via MC-NVT simulations, a detailed description of the equation of state across the I-N transition, and then use an equal area construction to infer the coexisting volume fractions and pressure. This is depicted in Fig. 15 in the case r = 0 2 and . p = 4, which is a blow-up of the case analyzed in Fig.11 close to the I-N phase transition. The MayerWood loop [46] is consistent with a first order transition, and an equal area construction provides the two coexisting volume fractions η I = 0 2642 . ± 0 0002 and . η N = 0 2772 . ± 0 0001 (crossed points) at pressure . P IN = 0 4805 . ± 0 0035 . (dotted line). Notwithstanding the finite size effects, it is worth noticing that the precision and reliability of this result does not unfavourably compare with those usually obtained via SUS calculations. These findings can be contrasted with those obtained via the DFT theory, eq. 20, as illustrated in Section II D. This result is also reported in Fig.15 as a thick solid line. Roughly speaking, we find DFT to underestimate the coexistence pressure by ≈ 15% and the coexistence densities by ≈ 4%. This is consistent with previous comparison with NPT simulations [14] and with the typical accuracy achieved by DFT calculations. ## C. Theoretical description of the nematic-screw-nematic phase transition In this Subsection, we will assess the accuracy of the various DFT approximations introduced in Section II D to investigate the N-N ∗ S transition, through a direct comparison with numerical simulations. To this aim, we will consider the particular case of helices having full translational and azimuthal freedom, but with their ˆ axis parallel to the ˆ u n director. This assumption, partly justified by the observation that the N-N ∗ S phase transition occurs at large values of the nematic order parameter, has the advantage of simplifying the theoretical treatment and considerably reducing FIG. 15. Equal area construction in the case of r = 0 2 and . p = 4. Points are results from MC simulations, traversed by their Akima spline interpolation. Resulting values for coexisting volume fractions are η I = 0 2642 . ± 0 0002 and . η N = 0 2772 . ± 0 0001 . (crossed points) at pressure P IN = 0 4805 . ± 0 0035 (dotted line). . Also displayed are the results from DFT (think solid line). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-d128cca1-2cdd-4144-8cc8-febe7bf877ba.jpg) FIG. 16. The function a excl ( ζ , γ ′ ′ ) (see Eq. 21), calculated for helices with r = 0 4 and . p = 4 322. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-d79aadbb-9a40-4673-aee6-ab3ded4d5084.jpg) its computational cost. This notwithstanding, it can still be useful for several different reasons. Firstly, it provides direct insights into the order of the N-N ∗ S transition, and its relationship with the helix morphology, decoupled from the effects of the particle structure on the stability of the nematic phase. Secondly, it allows us to probe the reliability of theory to describe this rich and unconventional scenario. Finally, it is an interesting problem on its own right as the behavior of non-convex hard particles has so far largely overlooked in spite of the large number of examples in real systems. We remark that, unlike previous cases, we have here used the number of complete turns ( n ) as input variable, thus resulting in a non-integer pitch value p . The relation between n and p can be found in Ref.[14]. Fig. 16 gives an example of the function a excl ( ζ , γ ′ ′ ) (Eq. 21), for the case with r = 0 4 and . p = 4 322. . This function exhibits oscillations, whose number reflects the number of turns in the helix. Oscillations are comprised between the values of excluded area for cylinders enclosing the whole helix ( a excl = π (2 r +1) ) and for cylinders enclosing a linear chain 2 of beads ( a excl = π ), as they should. The decrease of a excl resulting from the interpenetration of helices is related to the entropy gain that drives the formation of the N ∗ S phase. Fig. 17 shows equation of state and screw-nematic order parameter as a function of η for the cases with r = 0 2 . and p = 9 925 and 4 839, while Fig. . . 18 shows the same quantities for the cases with r = 0 4 and . p = 9 679 and . 4 322. . These figures provide results from second- and third-virial theories along with corresponding MC simulation FIG. 17. Equation of state (top) and screw-nematic order parameter as a function of the volume fraction η (bottom), for perfectly aligned hard helices with r = 0 2 and . p = 9 925 (left) and . p = 4 839 (right). . Results from Onsager theory (dotted), from modified PL theory (dashed) and from third-virial theory (solid). Top panels: green is for the N phase and red for the N ∗ S phase. Symbols are results from MC simulations: N (empty circles), N ∗ S (full circles) and Sm ∗ S (full squares). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-1816fc9e-627d-4977-93c1-b7075a2c856a.jpg) FIG. 18. Equation of state (top) and screw-nematic order parameter as a function of the volume fraction η (bottom), for perfectly aligned hard helices with r = 0 4 and . p = 9 679 (left) and . p = 4 322 (right). . Results from Onsager theory (dotted), from modified PL theory (dashed) and from third-virial theory (solid). Top panels: green is for the N phase and red for the N ∗ S phase. Symbols are results from MC simulations: N (empty circles), N ∗ S (full circles) and Sm ∗ S (full squares). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-f803c149-5ab0-4867-971e-720f0cbb8457.jpg) data. We can see that for these helices, which have a pitch larger than the bead diameter, the location of the phase transition is essentially determined by the radius r , depending mildly on p , and in particular it occurs at increasing density with decreasing radius. This can be understood considering that less curly helices have weaker oscillations of a excl , thus a lower entropy gain is achieved for them upon the settling in of the screw-like order. Present results would seem to hardly reconcile with the phase diagrams shown in Sec. III A, where the N-N ∗ S phase transition occurs at a volume fraction that increases on moving from r = 0 2, . p = 4, to r = 0 4, . p = 4 and then to r = 0 2, . p = 8. However, it has to be recalled that, on one hand, the hard helices considered here have the same contour length and their effective aspect ratio thus decreases on going from straight to curly particles and, on the other hand, that in the MC-NPT simulations helices are freely rotating. The onset of any liquid-crystalline order thus always competes with the I phase, favoured at low densities and whose stability shifts to higher densities as the effective aspect ratio becomes smaller. Compared to MC data for perfectly aligned helices, while a purely second-virial theory alone proves overall inadequate, significant improvements are achieved including PL correction and the third-virial term. By looking at each and confronting one another all these figures, it seems that the predictions of a third-virial theory improve as r increases and p decreases, to such an extent that, for the cases with r =0.4 quantitative agreement is there between theory and simulations. This situation is in a way spoilt by the fact that the phase observed in simulations at higher densities is actually a Sm ∗ S [47] rather than a N ∗ S phase. Theoretical calculations that include the former are not FIG. 19. The screw-like coupled translation and rotation. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-886955fc-521b-4921-8c75-0faa1bf33ff5.jpg) FIG. 20. Cartoon of the cholesteric (top), and of the screw-nematic (middle) organization. Here ̂ h is a unit vector parallel to the axis around which either the molecular axis ̂ u (cholesteric) or ̂ w (screw-nematic) spirals, respectively. In the latter case, the tip of the tangent to the helices ̂ T forms a conical path (bottom). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1199v1-figure-c79e7101-4044-41f7-8817-04900133fd75.jpg) available at present (it would amount to deal with Eq.15 rather than simpler Eq.16). In spite of this caveat, results from a third-virial theory are considered overall encouraging. ## IV. DISCUSSION We are now in the position to try and understand the physical origin of the phase sequence exhibited by helical particles. The nematic phase spans a density range that can be subdivided in two regions, the first being the conventional N phase at lower densities, the second being the screw-like N ∗ S phase at higher density. The relative width of the two regions varies depending upon the helix parameters, but with the screw-like N ∗ S phase always popping out at the right edge of the nematic window, while the N phase may or may not be present. Indeed, the latter can be absent altogether for sufficiently high degree of curliness as shown by our results in the case of r = 0 4 and . p = 4. Indeed, on increasing the helical twist, the relative width of the screw-like region increases with respect to the conventional N region, until the latter eventually disappears. The underlying mechanism is as follows. Imagine to have two neighbouring helices that are sufficiently far apart to be able to rotate about their own main axis. Effectively, they behave as cylinders, their specific helix character being rather irrelevant and the liquid-crystal phase they may be in is the conventional N phase. This is however no longer the case if the two helices are in close contact one another so that neighbouring grooves significantly intrude into each other into a in-phase locked configuration, as illustrated in Fig.19. Because of this azimuthal locking of the C 2 axes, there is then a severe limitation of the rotational entropy and there must then be a correspondingly higher gain in translational entropy in order for the new chiral nematic phase to be stable with respect to the N phase. This is achieved through a screw-like organization, schematically illustrated in Fig.19 where the right helix rotates about its own axis by performing an additional translation along the same axis. The N ∗ S is a novel kind of chiral nematic phase, different from the well known cholesteric. The latter may be formed in general by any kind of chiral mesogenic particles, whereas the former is special of helical particles. It may be useful to highlight analogies and differences between these phases. In the cholesteric phase the ̂ u axes of helices spiral around a perpendicular axis ( ̂ h ) as illustrated in Fig.20 (top). The order of the ̂ u axes is non-polar, i.e. there is up-down symmetry. In the N ∗ S phase the ̂ u axes of helices are preferentially aligned along the same direction throughout the sample, but the transversal ̂ w axes spiral around this direction, as depicted in Fig. 20 (center). In this case the ̂ w axes have polar order, i.e. they preferentially point in the same direction. Another important difference between screw-nematic and cholesteric is the length scale of the phase periodicity, which is equal to the pitch of the helical particles in the former, and orders of magnitude longer in the latter. This is the reason why the screw-like organization, unlike the cholesteric, can be observed in simulations with box sizes of a few molecular lengths and standard periodic boundary conditions. A different description of the screw-nematic phase could be made, in terms of the Frenet frame routinely used for the description of flexible and semi-flexible polymers (e.g. [48]). This however provides a redundant description for rigid objects of finite lengths as the helices considered in the present work. Using this picture, the tip of the local tangent the helices ( ̂ T ) follows a conical path on moving along the director ̂ n , due to the variation of the azimuthal angle at fixed polar angle, as shown in Fig.20 (bottom). This was the description used in Ref.[17] to explain the experimental results for helical flagella and that led to denoting this phase as conical.[49, 50] We also have found it useful for the visualization of snapshots colour coded according to the local tangent of helices. The situation is expectedly much more complex in smectic phases, where screw-like organization, layering and hexatic order may compete and combine one another. As the system is entering a smectic phase, there still exists a non-negligible fraction of interlayer helices while positional ordering along the ̂ n direction progressively increases. These helices lying in the interlayer regions provide a bridge between two adjacent layers, and allow a screw-like organization to be present througout the whole smectic phase. When the concentration of helices is still moderate, hexatic ordering is not significantly present and the first smectic phase encountered upon increasing density is the Sm ∗ A,S . As in the nematic phase, this roto-translational coupling may be more or less effective depending upon the morphology of the helix, but is always present in the initial part of the smectic phases. As pressure is further increased, the hexatic order gradually sets in, typically accompanied by a concomitant increase of the azimuthal correlation of the ̂ w axes of helices within each layer. This may lead to two different, and up to a certain extent competing, effects. The first possibility is that helices are azimuthally aligned within each each layer, but with neither positional nor orientational correlations between layers. Each layer can also in principle rigidly slide with respect to next layers, to gain translational entropy. Under these conditions, layering is very strong as testified by the solid-like peaks in the observed g ‖ ( R ‖ ). This situation, depicted in the cartoon of Fig.14 (right panel), differs from the conventional smectic B phase for the presence of the in-plane (polar) correlation between the ̂ w axes of helices, and hence the phase was denoted as Sm B,p . The alternative scenario stems from the possibility that tips of helices protruding out from a layer are still able to propagate the ordering to the neighboring layers. Thus, helices belonging to different layers stack on top of each other along ̂ n to form parallel, 'infinitely' long, helices. The alignement of the the ̂ w axes then translates into a screwlike ordering propagating across the layers. Under these conditions, clearly different layers are strongly correlated with each other. The layer structure along ̂ n is preserved, but positional ordering along ̂ n is less effective, due to the presence of protruding helices, as testified by the reduced peaked structure of g ‖ ( R ‖ ). This is the situation represented in the left panel of Fig.14. We denoted this phase as Sm ∗ B,S , because it couples layering with hexatic positional order and screw-like azimuthal correlations. The entropic advantage of this scheme is to form a set of 'infinite' parallel helices, which allows the favourable screw-like motion to be still operative. One may envisage the additional presence of a columnar phase in the case of helices with sufficiently long contour lengths, well beyond those considered here. This is a subject that deserves a dedicated study. ## V. CONCLUSIONS AND OUTLOOK TABLE I. Summary of the different phases exhibited by hard helices. ( a ) ̂ u axes oriented along ̂ n ; ( b ) as in N with azimuthal coupling of ̂ w axes along ̂ c that in turn spirals about ̂ n ; ( c )as in Sm A with azimuthal coupling of ̂ w axes along ̂ c that in turn spirals about ̂ n ; ( d ) as in Sm A with additional in-plane polar and hexatic order; ( e ) as in Sm ∗ A,S with additional hexatic order. | Phase | Code | Organisation type | |----------------------|----------|---------------------| | Conventional nematic | N | ( a ) | | Screw- nematic | N ∗ S | ( b ) | | Screw-smectic A | Sm ∗ A,S | ( c ) | | Polar smectic B | Sm B,p | ( d ) | | Screw-smectic B | Sm ∗ B,S | ( e ) | In this work, we have studied the self-assembly properties of systems of hard helices as a function of helix morphology. Helical particles have been modelled as a set of fused hard spheres properly arranged to form a rigid helix of a fixed contour length. Using a combination of numerical simulations and density functional theories, we have analyzed the sequence of different liquid crystal phases appearing at increasing density, using a set of suitable order parameters and correlation functions. The rich and unconventional polymorphism that we found is in striking contrast with the conventional wisdom of assimilating the phase behaviour of helical particles to that of rods, an assumption commonly adopted also in the analysis of experiments on helical (bio)polymers. Table I summarizes the distinctive features of all phases discussed in this work. The first novel phase encountered with increasing density is the screw-nematic (N ∗ S ). As neighboring helices tend to lock into an in-phase nematic configuration by an azimuthal correlation of the helix ̂ w axes along a common direction ̂ c , there must be a concomitant gain in translational entropy counterbalancing that loss of rotational entropy for this new phase to be stable. This is achieved through a translational-rotational coupling where ̂ c spirals around the main nematic director ̂ n , with a periodicity equal to the pitch of the single helix. We have also implemented a density functional theory with increasing degrees of accuracy, for the screw-nematic N ∗ S phase, under the assumption of perfectly aligned helices, and tested its accuracy with numerical simulations on the same system. We find the results of the most accurate versions of the theory in reasonably good quantitative agreement with numerical simulations. With increasing density a smectic A phase with screw-like order (Sm ∗ A,S ) can appear, which differs from the N ∗ S for the presence of layers. However helices laying in the interlayer regions provide a bridge between adjacent layers, which allows to keep the screw-like organization. As density increases, positional ordering along ̂ n also increases, while in-plane hexatic order tends to set in. This leads to the formation of either a polar Sm B,p phase, characterized by the fact that different layers can rotate and translate independently of each other with no coupling between orientations of ̂ w axes in different layers, or of a Sm ∗ B,S , with screw-like coupling between adjacent layers, Our results indicate that a Sm B,p phase is more favoured for slender helices, with a gradual transition to screw-smectic Sm ∗ B,S phases for curlier particles. At even higher densities, a very compact phase, that we generally labelled as C, is achieved. This phase is likely to display some regular crystal structure, as indicated by the regular peaks in several correlation functions the we have monitored. A detailed study of this phase will be discussed elsewhere. The results presented here call for experimental verification. To this purpose, an important distinctive feature of most of the novel phases identified in our study is the presence of a phase modulation with the periodicity equal to the pitch of the constituting helical particles. In principle, helical biopolymers such as DNA or helical colloidal particles, appear as good candidates for this investigation. [51-53] Indeed, a screw-nematic phase was already observed a few years ago in colloidal suspensions of helical flagella isolated from prokaryotic bacteria.[17] The helical pitch p of these particles is µ m in size and hence the phase modulation is easily visible under polarized optical microscopy. However, for chiral polymers typical values of the pitch are in the nm range, which is far too small to be observable by any optical microscopy. In this case the experimental determination of the phase periodicity constitutes an experimental challenge. We hope that our study can stimulate new work in this direction. ## ACKNOWLEDGMENTS H.B.K., E.F. A.F. and A.G. gratefully acknowledge support from PRIN-MIUR 2010-2011 project (contract 2010LKE4CC). G.C. is grateful to the Government of Spain for the award of a Ram´n y Cajal research fellowo ship. H.B.K., A.G. and T.S.H. also acknowledge the support of a Cooperlink bilateral agreement Italy-Australia. - [1] Barker, J.A. and Henderson, D., Rev.Mod.Phys., 48 , 587 (1976) - [2] Pusey, P.N. and van Megen, W, Nature, 320 , 340 (1986) - [3] Glotzer, S.C. and Solomon, M.J, Nature Mat., 6 , 557 (2007) - [4] Sacanna, S. and Korpics, M. and Rodriguez, K. and Colon-Melendez, L. and Kim, S.H. and Pine, D.J. and Yi, G.R., Nature Comm, 4 1 (2013) - [5] Sacanna, S. and Pine, D.J. and Yi G.R., Soft Matter, 9 , 8096 (2013) - [6] Solomon, M.J, Curr. Op. Coll. Int. Scie, 16 , 158 (2011) - [7] Stevens, M.J., Science, 343 , 981 (2014) - [8] Nakano, T. and Okamoto, Y., Chem. Rev, 101 , 2001 - [9] Yashima, E. and Maeda, K. and Iida, I. and Furusho, Y. and Nagai, K., Chem. Rev, 109 (2009) - [10] N.C. Seeman, Nature 421 , 427 (2003) - [11] Douglas, S.M. and Dietz, H. and Liedl, T. and H¨gberg, B. and Graf, F. and Shih, W.H, Nature o 459 , 414 (2009) - [12] Allen, M.P. and Evans, G.T. and Frenkel, D. and Mulder, B., Adv. Chem. Phys 86 , 1 (1993) - [13] Tarazona, P. and Cuesta, J.A. and Martinez-Raton, Y., Lect. Notes Phys. 753 , 247 (2008) - [14] Frezza, E. and Ferrarini, A. and Kolli, H.B. and Giacometti, A. and Cinacchi, G., J. Chem. Phys. 138 , 164906 (2013) - [15] The effective length of helices is taken equal to Λ+ D , where Λ is the Euclidean length [14] to which the bead diameter is added. - [16] Kolli, H.B. and Frezza, E. and Cinacchi, G. and Ferrarini, A. and Giacometti, A. and Hudson, T.S, J. Chem. Phys. Communications 140 , 081101 (2014) - [17] Barry, E. and Hensel, Z. and Dogic, Z. and Shribak, M. and Oldenbourg, R., Phys. Rev. Lett. 96 , 018305, (2006) - [18] Manna, F. and Lorman, V. and Podgornik, R. and B. Zeks, B., Phys. Rev. E 75 ,030901(R) (2007) - [19] Allen, M.P. and Tildesley, D.J. Computer Simulation of Liquids , (Clarendon Press, Oxford) (1987) - [20] Frenkel, D. and Smit, B. Understanding Molecular Simulation: From Algorithms to Applications , (Clarendon Press, Oxford) (1987) - [21] Onsager, L, Ann. N.Y. Acad. Sci 51 , 627 (1949) - [22] Parsons, J.D., Phys. Rev. A 19 , 1225 (1979) - [23] Lee, S.D., J. Chem. Phys. 87 , 1225 (1987) - [24] Cinacchi, G. and Mederos, L. and Velasco, E., J. Chem. Phys. 121 , 3854 (2004) - [25] Wensink, H.H. and Vroege, G. J., J. Phys.; Condens. Matt., 16 , S015 (2004) - [26] Bolhuis, P. and Frenkel, D., J. Chem. Phys., 106 , 666 (1997) - [27] Frenkel, D. and Mulder, B.M., Mol. Phys., 55 (1985) - [28] Donev, A. and Stillinger, F.H. and Chaikin, P.M. and Torquato, S., Phys.Rev.Lett. 92 ,255506 (2004) - [29] Hudson, T.S. and Harrowell, P., J. Phys. Chem. B 112 , 8139 (2008) - [30] Elias, N.T. and Hudson, T.S., J. Phys.:Conf. Ser. 402 , 012005 (2012) - [31] Wood, W.W., J. Chem. Phys 48 , 415 (1968) - [32] Wood, W.W., J. Chem. Phys 52 , 729 (1970) - [33] Priestley, E.B. and Woitowiczs, P.J. and Sheng, P Introduction to Liquid Crystals , (Plenum Press, New York) (1974) - [34] de Gennes, P.G. and Prost, J. The Physics of Liquid Crystals , (Clarendon Press, Oxford) (1993) - [35] Veilliard-Baron, J., Mol. Phys. 28 , 809 (1974) - [36] Memmer, R, Liquid Crystals 29 , 483 (2002) - [37] Cifelli, M. and Cinacchi, G. and De Gaetani, L., J. Chem. Phys 125 , 164912 (2006) - [38] Cinacchi, G. and De Gaetani, L., Phys. Rev. E 77 , 051705 (2008) - [39] Cinacchi, G. and Tani, A., J. Chem. Phys. 117 , 11392 (2002) - [40] Wu, J. and Li, Z.,Ann. Rev. Phys. Chem. 58 , 85 (2007) - [41] McQuarrie, D.A. Statistical Mechanics , (Sausalito, CA) (2000) - [42] Herzfeld, J. and Berger, A.E. and Wingate, J.W. , Macromolecules 17 , 1718 (2984) - [43] Gabriel, A.T. and Meyer, T. and Germano, G., J. Chem. Theo. Comp. 4 ,468 (2008) - [44] Virnau, P. and M¨ller, M., J. Chem. Phys. u 120 ,10925 (2004) - [45] Vink, R.L.C. and Wolfsheimer, S. and Schilling, T., J. Chem. Phys. 123 , 074901 (2005) - [46] Mayer, J.E. and Wood, W.W., J. Chem. Phys. 42 , 4268 (2965) - [47] We did not pursue the further characterisation of this screw-smectic phase as this would have been contingent here. - [48] Kamien, R.D., Rev. Mod. Phys. 74 , 953 (2002) - [49] Meyer, R.B., Appl.Phys.Lett. 12 , 281 (1968) - [50] Kamien, R.D.,J. Phys. II 6 , 461 (1996) - [51] Nakata, M. and Zanchetta, G. and Champam, B.D. and Jones, C.D. and Cross, J.O. and Pindak, R. and Bellini, T. and Clark, N.A., Science (2007) - [52] Zanchetta, G. and Giavazzi, F. and Nakata, M. and Buscaglia, M. and Cerbino, R. and Clark, N.A. and Bellini, T., Proc. Natl. Acad. Sci U.S.A 107 , 17497 (2010) - [53] De Michele, C. and Bellini, T. and Sciortino, F, Macromolecules 45 , 1090 (2012) - [54] Varga, S. and Sazlai, I., Mol. Phys. 98 , 693 (2000)
10.1039/C4SM01305K
[ "Hima Bindu Kolli", "Elisa Frezza", "Giorgio Cinacchi", "Alberta Ferrarini", "Achille Giacometti", "Toby S. Hudson", "Cristiano de Michele", "Francesco Sciortino" ]
2014-08-06T07:43:35+00:00
2014-08-06T07:43:35+00:00
[ "cond-mat.soft" ]
Self-assembly of hard helices: a rich and unconventional polymorphism
Hard helices can be regarded as a paradigmatic elementary model for a number of natural and synthetic soft matter systems, all featuring the helix as their basic structural unit: from natural polynucleotides and polypeptides to synthetic helical polymers; from bacterial flagella to colloidal helices. Here we present an extensive investigation of the phase diagram of hard helices using a variety of methods. Isobaric Monte Carlo numerical simulations are used to trace the phase diagram: on going from the low-density isotropic to the high-density compact phases, a rich polymorphism is observed exhibiting a special chiral screw-like nematic phase and a number of chiral and/or polar smectic phases. We present a full characterization of the latter, showing that they have unconventional features, ascribable to the helical shape of the constituent particles. Equal area construction is used to locate the isotropic-to-nematic phase transition, and results are compared with those stemming from an Onsager-like theory. Density functional theory is also used to study the nematic-to-screw-nematic phase transition: within the simplifying assumption of perfectly parallel helices, we compare different levels of approximation, that is second- and third-virial expansions and Parsons-Lee correction.
1408.1200v2
## Orbital magnetic moments in insulating Dirac systems: Impact on magneto-transport in graphene van der Waals heterostructures Marko M. Gruji´ c, 1, 2, ∗ Milan Z. Tadi´ c, ˇ 1, † and Fran¸ cois M. Peeters 2, ‡ 1 School of Electrical Engineering, University of Belgrade, P.O. Box 3554, 11120 Belgrade, Serbia 2 Department of Physics, University of Antwerp, Groenenborgerlaan 171, B-2020 Antwerp, Belgium In honeycomb Dirac systems with broken inversion symmetry, orbital magnetic moments coupled to the valley degree of freedom arise due to the topology of the band structure, leading to valley-selective optical dichroism. On the other hand, in Dirac systems with prominent spin-orbit coupling, similar orbital magnetic moments emerge as well. These moments are coupled to spin, but otherwise have the same functional form as the moments stemming from spatial inversion breaking. After reviewing the basic properties of these moments, which are relevant for a whole set of newly discovered materials, such as silicene and germanene, we study the particular impact that these moments have on graphene nano-engineered barriers with artificially enhanced spin-orbit coupling. We examine transmission properties of such barriers in the presence of a magnetic field. The orbital moments are found to manifest in transport characteristics through spin-dependent transmission and conductance, making them directly accessible in experiments. Moreover, the Zeeman-type effects appear without explicitly incorporating the Zeeman term in the models, i.e., by using minimal coupling and Peierls substitution in continuum and the tight-binding methods, respectively. We find that a quasi-classical view is able to explain all the observed phenomena. PACS numbers: 75.70.Tj, 72.80.Vp, 85.75.-d Keywords: Dirac, orbital, magnetic, moment, spin-orbit, valley, mass, graphene, honeycomb, transport ## I. INTRODUCTION One of the more intriguing recent developments in the field of graphene research is the artificial generation of properties that are otherwise vanishing in intrinsic samples. For instance, carrier mass can be created by sandwiching graphene with hexagonal boron nitride (hBN), in which case a gap arises for sufficiently aligned layers. 1,2 The occurrence of the gap is dictated by the interplay of the elastic energy of the graphene lattice, and the potential energy landscape stemming from hBN. 3 The energetically preferred commensurate structure, in which a carbon atom sits on top of a boron atom, will maximize its area at the expense of other stacking configurations by stretching the graphene layer. This in turn leads to the appearance of an average gap in the resulting van der Waals heterostructure. 2 with relativistic quasiparticles described by the Dirac equation. From the theoretical point of view, both of the aforementioned parameters appear in a similar form in the low-energy continuum picture. They are captured by staggered potential terms ∆ and ∆ SO in the case of mass and SOC, respectively. 12 The term 'staggered potential' originates in the language of the tight-binding method, and it refers to the breaking of the sublattice symmetry by a traceless potential. Unlike SOC, for which the staggered potential changes sign depending on the spin and valley of the electron, ∆ opens up a topologically trivial band gap in the vicinity of the K and K ′ points through inversion symmetry breaking. 13 On the other hand, it was postulated that spin-orbit coupling (SOC) in graphene can be enhanced by hydrogen adsorption, which forces local rehybridization of bonds. 4 Note that quantum spin Hall transport signatures introduced by random adatoms are well described by models taking into account a renormalized and uniform SOC. 5,6 Moreover, the proximity effect caused by an appropriate substrate was speculated to lead to SOC enhancement as well. Both of these mechanisms were recently confirmed experimentally, opening new avenues for theoretical research. 7,8 While in graphene the carrier mass and SOC have to be artificially engineered, they are ubiquitous in other group IV monolayers such as silicene, germanene, and stanene, thanks to their buckled structure and the heavier constituent atoms. 9-11 Given their honeycomb lattice, they also belong to the same class of materials as graphene, At the same time, however, the inversion symmetry breaking leads to a nontrivial alteration of the semiclassical equations of motion on a honeycomb lattice. 14,15 The quantum corrections, which reflect the impact of the Berry phase, and are therefore topological in nature, are twofold. On the one hand, when subjected to an electric field in the plane, massive Dirac fermions will attain a velocity component transverse to the field, which is opposite in the two valleys, thus giving rise to the valley Hall effect. This effect was recently observed experimentally in a MoS 2 device, as well as in graphene-hBN heterostructures. 16,17 On the other hand, self-rotation of electron wavepackets near the two valleys will produce valley-contrasting orbital magnetism. 15 It is well established that the valley Hall and intrinsic spin Hall effects share the same origin, reflecting the Berry curvature properties of the underlying insulating systems, generated by ∆ and ∆ SO terms, respectively. Therefore, the two Hall effects are fully analogous. 18,19 Valley-contrasting magnetism was first reported in Ref. 15. On the other hand, we recently found evidence of the corresponding spin-contrasting magnetism in transport calculations involving spin-orbit barriers in bulk graphene, 20 which motivated us to explore the subject more thoroughly. These orbital magnetic moments were previously investigated in a more generalized analysis on the abundance of Hall effects (and the accompanying wealth of orbital magnetization), found in multilayer graphene systems in Ref. 21. There, the electron-electron interaction leads to various broken symmetry phases, denoted by the general term 'pseudospin ferromagnetism', 22-25 which are captured with a diverse set of mass terms in the low-energy continuum approximation, in models analogous to the ones studied in this paper. This emerging orbital magnetism is a mechanism that effectively alters the Zeeman energy, and it is the subject of this paper, particularly the moments associated with spin-orbit coupling in monolayer Dirac systems. We first review how the intrinsic SOC in honeycomb monolayers gives rise to orbital magnetic moments coupled to spin, in the same way in which inversion symmetry breaking gives rise to moments coupled to the valley degree of freedom. These moments are completely analogous in nature, and they share exactly the same functional form, apart from coupling to different degrees of freedom. We derive expressions for the moments using both tight-binding and continuum theories, and we show their impact on the Landau level (LL) quantization in the presence of a magnetic field. Finally, we investigate the influence of the moments on the magneto-transport properties, where we look at the transmission through a barrier with enhanced spin-orbit coupling in graphene. Such a barrier could be realized by an appropriately formed van der Waals heterostructure in an otherwise fully ultrarelativistic material. 5-8 We discuss this case in great detail from the semiclassical point of view, and we present conclusions that are of practical relevance, namely how the device conductance is affected by orbital magnetism. In the end, we show that the results are identical whether one uses the continuum Dirac theory or the tight-binding nonequilibrium Green function method (TB NEGF) when calculating the transport properties. Remarkably, both approaches yield Zeemantype transport signatures while employing the magnetic field only through kinetic terms, without actually enforcing the coupling of the spin with the magnetic field, which reflects the orbital nature of the magnetic moments. ## II. ORBITAL MOMENTS IN THE TIGHT BINDING PICTURE We start with the low-energy tight binding Kane-Mele Hamiltonian valid for a whole set of Dirac materials with prominent intrinsic spin-orbit coupling, 26 $$H = \hbar { v } _ { F } \left [ \tau k _ { x } \sigma _ { x } + k _ { y } \sigma _ { y } \right ] + s \tau \Delta _ { S O } \sigma _ { z }, \quad ( 1 ) \quad \text{layer} \right ]$$ FIG. 1. The orbital magnetic moments of the spin-up (spindown) states shown by thick red (dashed blue) lines, and the corresponding low-energy band structure, shown in black, for: (a) ∆ = 0 and ∆ SO = 30 meV, and (b) ∆ = 30 meV and ∆ SO = 0. Note that in (b) the orbital magnetic moments for the two spins are equal, due to the absence of SOC. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-dd61b26b-19e5-4755-b711-48bb2eff713e.jpg) where v F is the Fermi velocity, ∆ SO is spin-orbit coupling, σ z is a Pauli matrix operating in the sublattice subspace, s = +1 / -1 labels the spin ↑ / ↓ , and τ = +1 / -1 labels the valley K/K ′ . As already mentioned this form of SOC is universal to all group IV monolayers other than graphene, in which on the other hand it could be artificially generated. Note that here k x and k y are only parameters, and not operators. The dispersion relations extracted from Eq. (1) are shown by solid black curves in Fig. 1(a). The Hamiltonian (1) describes a two-state, electronhole symmetric system. For such systems, the orbital magnetic moment ( m ) is directly proportional to the Berry curvature (Ω), m ∼ Ω. 15,21,27 On the other hand, the system is also time-reversal invariant, and since we disregard the staggered potential ∆ at the moment, inversion symmetry is not broken either. Since for spatialinversion and time-reversal symmetric systems Berry curvature vanishes, 28,29 one might conclude that the orbital moments must vanish as well. However, it is rarely stressed that this only holds for spinless electrons, which is not the case considered here. 30 In fact, the Hamiltonian (1) describes a topological insulator, having a non-zero and opposite Chern number for opposite spins. 26 This is because the Kane-Mele model is formed by two opposite copies of the Haldane model, 31 thus breaking the time-reversal symmetry separately in each spin sector. Since the Chern number is obtained as an integral of Ω over the Brillouin zone, the Berry curvature is nontrivial, and consequently, the orbital magnetic moments will be nonzero. The orbital moments are perpendicular to the monolayer, and originate from the self-rotation of the elec- tron wave packet around its center of mass, and they can be obtained from the tight binding Bloch eigenfunctions | u ( k ) 〉 15,21,28 $$m = - i \frac { e } { 2 \hbar } \langle \nabla _ { \mathbf k } u | \times \left [ H - E \left ( \mathbf k \right ) \right ] | \nabla _ { \mathbf k } u \rangle, \quad ( 2 )$$ which makes their topological origin much clearer. For the particular Hamiltonian in Eq. (1), we have $$\left | u \left ( { \mathbf k } \right ) \right \rangle = \left ( \begin{array} { c } \sqrt { \frac { E + s \tau \Delta _ { S Q } } { 2 E } } \\ \tau \sqrt { \frac { E - s \tau \Delta _ { S Q } } { 2 E } } e ^ { i \tau \phi } } \end{array} \right ), \quad \ \ ( 3 ) \quad H$$ where E is the electron energy, and φ = arctan k /k y x . It is then straightforward to show that the expression for the magnetic moments that arise from the spin-orbit coupling reads $$m = - s \frac { e \hbar { v } _ { F } ^ { 2 } \Delta _ { S O } } { 2 \left ( \Delta _ { S O } ^ { 2 } + \hbar { ^ { 2 } } v _ { F } ^ { 2 } k ^ { 2 } \right ) }. \quad \quad ( 4 ) \quad \begin{array} { c } k _ { y } \\ \text{the} \\ \text{duc} \end{array}$$ Variations of the orbital moments in the vicinity of the Dirac points are shown for both spins in Fig. 1(a). They are maximum near the band edges, decay away from the two Dirac points, and are obviously opposite for opposite spins. glyph[negationslash] One can compare these moments with the valleycontrasting moments, arising for ∆ SO = 0 and ∆ = 0. 15,28 Their magnitude is given by $$m = - \tau \frac { e \hbar { v } _ { F } ^ { 2 } \Delta } { 2 \left ( \Delta ^ { 2 } + \hbar { ^ { 2 } } v _ { F } ^ { 2 } k ^ { 2 } \right ) }, \quad \ \ ( 5 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ and they are depicted in Fig. 1(b). It is clear that the two sets of moments share a similar functional form, except the former couple to spin, while the latter couple to the valley degree of freedom. 21 The energy region where the moments are prominent was termed the Berry curvature hot spot in Ref. 17 There it was unequivocally shown that the gap in well-aligned graphene-hBN van der Waals heterostructures is accompanied by the introduction of nontrivial Berry curvature. Finally, in the case of both nonzero ∆ SO and ∆, and in the low energy limit, the magnetic moment is given by $$m = - \frac { e \hbar { v } _ { F } ^ { 2 } } { 2 \left ( s \Delta _ { S O } + \tau \Delta \right ) }.$$ The orbital magnetic moments are responsible for the optical selection rules of light absorption in Dirac materials, through the so-called circular dichroism effect. 19,27,32 Note that the orbital moments in Eq. (4) can dominate the Zeeman response of a system, since they can be orders of magnitude stronger than the free-electron Bohr magneton for realistic SOC strengths found in typical Dirac materials. 15,21,25,28 In other words, they will lead to a renormalization of the Land´ e g factor, which was recently observed for transition metal dichalcogenides from first-principles calculations. 33 ## III. LANDAU LEVELS, PSEUDOSPIN POLARIZATION AND ORBITAL MOMENTS IN THE CONTINUUM PICTURE ## A. Landau levels We proceed with the case of an applied perpendicular magnetic field B = B e z in bulk graphene, which is included in the Hamiltonian through minimal coupling $$H = \hbar { v } _ { F } \left [ \tau k _ { x } \sigma _ { x } + ( k _ { y } + \frac { e } { \hbar } A _ { y } ) \sigma _ { y } \right ] + s \tau \Delta _ { S O } \sigma _ { z } + \Delta \sigma _ { z }. \\ \tau \vdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots.$$ This equation could be employed to solve the electron spectrum in the Dirac system in the presence of ∆ SO , ∆, and magnetic field. It will subsequently lead us to resolve the magnetic moments. Here, the Landau gauge A = (0 , A y ) with A y = Bx is chosen. In this gauge, k y is a good quantum number and the solutions have the form Ψ( x, y ) = exp( ik y y ) ( ψ A ( x , ψ ) B ( x )) T . Introducing glyph[planckover2pi1] v F glyph[epsilon1] = E , glyph[planckover2pi1] v F δ = sτ ∆ SO + ∆, one can obtain the LLs in the infinite graphene sheet. In solving the LL spectrum it is useful to adopt the operators b † τ = -i ( l B / √ 2) ( τk x + ik y + ieA / y glyph[planckover2pi1] ) and b τ , where l B = √ glyph[planckover2pi1] /eB denotes the magnetic length. b † τ and b τ are the bosonic ladder operators, and they satisfy [ b τ , b † τ ] = τ . It could be useful to define these operators such that they fully correspond to the standard ladder operators of the quantum harmonic oscillator (QHO) shifted by x 0 = k l y B 2 and having the mass m = glyph[planckover2pi1] 2 /l 4 B k . Then the eigenstates will be given by the standard (obviously shifted and rescaled) QHO solutions $$\underset { \mathbb { z } \text{ to } } { \text{the} } \underset { \mathbb { z } \text{ to } } \langle x | n \rangle = \frac { 1 } { \sqrt { 2 ^ { n } n! } } e ^ { - ( x / l _ { B } + k _ { y } l _ { B } ) ^ { 2 } / 2 } H _ { n } \left ( \frac { x } { l _ { B } } + k _ { y } l _ { B } \right ), \ \ ( 8 )$$ where H n are Hermite polynomials. The problem can now be solved in terms of these solutions for the case of the regular two-dimensional (2D) electron gas in a magnetic field, having in mind that b † 1 | n 〉 = √ n +1 | n + 1 , 〉 b 1 | n 〉 = √ n n | -1 〉 and b 1 | 0 〉 = 0, and that the ladder operators change character in the K ′ valley. The system of coupled equations with ladder operators is now given by $$\delta \psi _ { A } - i \frac { \omega _ { c } } { v _ { F } } b _ { \tau } \psi _ { B } = \epsilon \psi _ { A }, \quad \quad ( 9 )$$ $$\nu _ { F } ^ { \nu _ { F } } i \frac { \omega _ { c } } { v _ { F } } b _ { \tau } ^ { \dagger } \psi _ { A } - \delta \psi _ { B } = \epsilon \psi _ { B },$$ where ω c = √ 2 v F /l B is the cyclotron frequency for Dirac-Weyl electrons. Then for n ≥ 1 the energies of the LLs are given by $$\epsilon _ { n, s, \tau, \pm } = \pm \sqrt { \delta ^ { 2 } + n \omega _ { c } ^ { 2 } / v _ { F } ^ { 2 } }. \quad \quad ( 1 1 )$$ The s and τ quantum numbers are contained implicitly in the definition of δ . The joint spinor for the two valleys FIG. 2. Several lowest Landau levels of all spin and valley flavors for (a) ∆ SO = 30 meV and ∆ = 0, (b) ∆ SO = 0 and ∆ = 30 meV, and (c) ∆ SO = ∆ = 30 meV. The n = 0 Landau level is depicted by the horizontal solid black line. Also shown are the bulk bands as red (spin up) and blue (spin down) shaded regions, as well as the sketch of the corresponding orbital moments, with the length of the arrow being proportional to the intensity. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-fff3e99b-232b-451e-b16c-2eae2d71d4c7.jpg) can be written as $$| n, s, \tau, \pm \rangle = \left ( \begin{array} { c } | n - \frac { \tau } { 2 } - \frac { 1 } { 2 } \rangle \\ \pm i \left [ \frac { \omega _ { c } \sqrt { n } } { ( \epsilon + \tau \delta ) v _ { F } } \end{array} \right ] ^ { \tau } | n + \frac { \tau } { 2 } - \frac { 1 } { 2 } \rangle \, \right ). \quad ( 1 2 ) \quad \text{trace} \\ \vdots \vdots \vdots \vdots. \end{array}$$ The case of n = 0 needs special attention, since the solution, Eq. (12), is not valid in this case. Then, the appropriate choice for the solution is $$\left | 0, s, \tau \right \rangle = \left ( - \tau / 2 + 1 / 2, \tau / 2 + 1 / 2 \right ) ^ { T } \left | 0 \right \rangle, \quad \left ( 1 3 \right )$$ while the energies are expressed as 34 $$\epsilon _ { 0, s, \tau } = - \tau \delta. \quad \quad \quad ( 1 4 ) \quad \begin{smallmatrix} & \text{w} \\ & m \\ & & \text{...} \end{smallmatrix}$$ It is worth pointing out however, that observation of the conductance plateaus corresponding to the derived spectrum can depend on the symmetry class of the disorder present in the samples. 35 Note also that these eigenvectors and eigenvalues reduce to the ones for the massless fermions, under the requirement δ → 0, collapsing the level (14) to zero energy. Nevertheless, massless fermions can also display quantum Hall signatures, such as a magnetic-field-independent plateau at zero filling factor, which originate from valley mixing scattering processes. 35 Thus the SOC and mass terms split and shift the zeroth LLs away from zero energy as depicted in Fig. 2, which glyph[negationslash] shows the low-lying Landau levels for (a) only ∆ SO = 0, (b) only ∆ = 0 and (c) ∆ SO = ∆ = 0 at B = 2 T. We also depict the bands, as well as the emerging magnetic moments, given by Eqs. (4) and (5). The orientation of the moments is related to the position of the n = 0 Landau level, which is shown by the horizontal solid black lines. Note that the zeroth LLs always reside on the edges of the appropriate bands. The duality ∆ SO ↔ ∆, s ↔ τ present in Eq. (14) is evident in Fig. 2. In other words, SOC couples the LLs to spin in the same way that mass couples them to the valley degree of freedom. 34,36,37 The state depicted in Fig. 2(c) is dubbed spin-valleypolarized metal, 38 and it hosts both a massless (lacking the orbital moments) and a massive relativistic Landau spectrum. It can appear in silicene subjected to a perpendicular electric field, for instance. On the other hand, in transition-metal dichalcogenides, both parameters are inherently present, with ∆ &gt; ∆ SO , and SOC splits only the LLs in the valence band, yielding a unique set of Hall plateaus. 39 glyph[negationslash] glyph[negationslash] ## B. Orbital moments The underlying explanation for the behavior of the LL spectrum can be sought in the existence of orbital magnetic moments. 15,40,41 In a similar fashion to Ref. 41, we can obtain the effective Bohr's magneton in the presence of ∆ SO , starting from the Dirac-Weyl equation, and expanding near the conduction band bottom. We first point out that near the bottom of the conduction bands, the sublattice pseudospins get polarized perpendicular to the graphene sheet, with the majority of the weight concentrated on the A (B) sublattice for δ &gt; 0 ( δ &lt; 0). Likewise, at the top of the valence band, most of the weight is found on the A (B) sublattice for δ &lt; 0 ( δ &gt; 0). This is obvious for the zeroth LLs, and it occurs in the δ = 0 limit as well, 42,43 but to see it for higher levels it is helpful to derive the expectation value for the sublattice pseudospin, $$\langle n, s, \tau, \pm | \sigma _ { z } | n, s, \tau, \pm \rangle = \frac { \delta } { \epsilon }. \quad \quad ( 1 5 )$$ which is exactly the same as in the absence of SOC and magnetic field, 44 only now it is to be used for the discrete energy values corresponding to the Landau levels. Therefore, perfect pseudospin polarization is achieved in the bottom (top) of the conduction (valence) band. On the other hand, decoupling the Dirac equation gives $$\mathbb { s } _ { - } ^ { ^ { * } } \mathbb { s } _ { - } ^ { ^ { * } } \left [ k _ { x } ^ { 2 } + \left ( k _ { y } + \frac { x } { l _ { B } ^ { 2 } } \right ) ^ { 2 } \pm \frac { \tau } { l _ { B } ^ { 2 } } \right ] \psi _ { A / B } = \left ( \epsilon ^ { 2 } - \delta ^ { 2$$ Therefore, there is a spatially uniform term proportional to the magnetic field, with opposite signs on opposite sublattices and opposite valleys. Consider the importance of this term for states whose sublattice pseudospin mostly lies in the graphene plane, i.e. for states far away from the band gap, Eq. (15). For such states, the two signs play a tug of war, effectively canceling each other out. However, near the band gap, sublattice polarization occurs, and the term corresponding to a majority sublattice starts dominating over the other, giving rise to an effective paramagnetic moment. For instance, when δ &gt; 0 sublattice A dominates for low electron energies, and the upper sign starts impacting the electron motion. To fully appreciate this fact, and to write the equation in a manifestly paramagnetic form, one needs to perform a low energy expansion for the equation of the majority sublattice. After reintroducing E , ∆, and ∆ SO explicitly, we can write E = ξ +( sτ ∆ SO +∆) for δ &gt; 0, and E = ξ -( sτ ∆ SO +∆) for δ &lt; 0. Taking the limit ξ → 0, the following equation is obtained for the bottom of the conduction band $$\left [ \frac { p _ { x } ^ { 2 } } { 2 m _ { e f f } } + \frac { ( p _ { y } + e A _ { y } ) ^ { 2 } } { 2 m _ { e f f } } + \frac { e \hbar { v } _ { F } ^ { 2 } B } { 2 \left ( s \Delta _ { S O } + \tau \Delta \right ) } \right ] \psi = \xi \psi _ { \begin{array} { c c } \\ \\ \\$$ where m eff = | sτ ∆ SO +∆ | /v 2 F is the electron effective mass due to the band gap. This is the form of the Schr¨dinger equation in the presence of a magnetic field o in which the emerging magnetic moments are obviously manifested. Once again, we see the duality of the orbital moments of the same nature as mentioned previously in the case of LLs: the moments are coupled to SOC through spin and to mass through the valley degree of freedom. Moreover, it is obvious that the expression for the magnetic moment is equal to the results of the low energy expansion given in Eq. (6). Having in mind that these moments effectively shift the low energy parabolic bands, one can use the same argument as in Ref. 40 to show that the separation between the lowest LL and the bottom of each shifted band is for each spin, valley and band to first order equal to half the separation between this and the first excited LL. This is in analogy with the LLs in a 2D massive-electron gas, where the lowest level sits at half the cyclotron frequency. 40,41 The difference for higher energy LLs is a consequence of the deviation of the dispersion from the quadratic one. ## IV. MANIFESTATION OF ORBITAL MOMENTS ON MAGNETO-TRANSPORT We proceed with considering how the emerging magnetic moments affect the transport properties. In particular, we analyze transport through a single 1D barrier in bulk graphene, extending from x = 0 up to x = W , and along the y direction, in which the intrinsic SOC is modified. The magnetic field is included only in the barrier, so we choose the following vector potential (within the Landau gauge) $$A _ { y } = \begin{cases} 0 & x < 0 & \text{(} \\ B x & 0 \leq x \leq W \,. \quad & ( 1 8 ) & \text{for} \\ B W & x > W & \text{non} | \end{cases}$$ FIG. 3. Contour plots of the transmission coefficient as function of incident angle and energy for ∆ SO = 30 meV, ∆ = 0 and W = 200 nm. The magnetic field equals 0 T in (a-b), 0 1 T in (c-d), 0 2 T in (e-f), and 0 3 T in (g-h). . . . The results are shown for both spin orientations. The semiclassical critical boundaries glyph[epsilon1] cr 0 and glyph[epsilon1] crW are depicted by dash-dotted and dotted lines, respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-d7df899a-8c03-4f3d-9607-0d0c349475a3.jpg) The explicit derivation of the transmission coefficient is given in Appendix A. glyph[negationslash] Since we analyze a barrier made exclusively out of SOC, the valley degree of freedom plays no role in the electron transmission, which can be concluded from the theory presented in Secs. II and III. Therefore, the contour plots of the transmission coefficient T = | t | 2 , for the two spin flavors, and for the 200-nm wide barrier as a function of energy and the incident angle of the incoming electron, are shown in Fig. 2. Each horizontal panel in this figure corresponds to a specific value of the magnetic field, which is 0, 0 1, 0 2 to 0 3 T from top to . . . bottom. Because of the duality ∆ SO ↔ ∆ and s ↔ τ , the results presented below also apply for transmission through a barrier when ∆ = 0 and ∆ SO = 0. But for this case the spin and valley quantum numbers should be interchanged. For both barrier types, we found that the magnetic field causes cyclotron motion, whose main feature is the appearance of a transmission window dependent on energy and incident angle φ . 20,45 Outside of this window, the waves after the barrier become evanescent, and therefore no transmission takes place. This occurs when the longitudinal momentum k ′ x = √ glyph[epsilon1] 2 -k ′ y of each electron state in the region after the barrier becomes imaginary. The transmission window is given by $$\epsilon > \frac { \gamma } { 1 - \sin \phi }, \quad \begin{pmatrix} ( 1 9 ) & \leq \\ \overbrace { \mathfrak { a } } \\ \end{pmatrix}.$$ where γ = W/l 2 B . The transmission windows for different B are shown by solid black curves in Fig. 3. glyph[negationslash] When the magnetic field increases, the transmission asymmetry with respect to the incident angle becomes larger, due to the cyclotron motion, as shown in Fig. 3. Besides, whereas transmission coefficients are identical for both spins when no magnetic field is present, T ↑ and T ↓ differ when B = 0, which is a consequence of the SOCinduced magnetic moments. In fact, it is clear from Eq. (16) that a quasi-classical longitudinal momentum q x $$q _ { x } \left ( x \right ) = \sqrt { \epsilon ^ { 2 } - \delta ^ { 2 } - \left ( k _ { y } + x / l _ { B } ^ { 2 } \right ) ^ { 2 } - s / l _ { B } ^ { 2 } } \quad ( 2 0 ) \quad - 0. 0$$ can be assigned to the sublattice-polarized states. In order to understand the effects of the emerging magnetic moments on the transmission characteristics, it is instructive to investigate how classical turning points vary with glyph[epsilon1] and φ . Those turning points are extracted from q x ( x ) = 0, where q x is given by Eq. (20), and are given by $$x _ { 1, 2 } = - \epsilon l _ { B } ^ { 2 } \sin \phi \mp l _ { B } ^ { 2 } \sqrt { \epsilon ^ { 2 } - \delta ^ { 2 } - \mu }, \quad ( 2 1 ) \quad \underset { \underset { \underset { \underset { \underset { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } {\ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ }{ \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \} { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { \ } { }$$ where µ = s/l 2 B is the magnetic moment term which appears in the expression for the quasi-classical momentum in Eq. (20). Given that the barrier extends from 0 to W , the condition that no turning points are found within the barrier is obtained by requiring x 1 &lt; 0 and x 2 &gt; W . The former condition leads to $$\text{mer common} \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\quad and } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text$$ while the latter results in $$x _ { 2 } > W \Rightarrow \begin{cases} \epsilon > \sqrt { \delta ^ { 2 } + \mu }, \quad \epsilon \sin \phi + \gamma < 0 \\ \epsilon > \frac { \gamma \sin \phi + \sqrt { \gamma ^ { 2 } + ( \delta ^ { 2 } + \mu ) \cos ^ { 2 } \phi } } { \cos ^ { 2 } \phi }, \quad \epsilon \sin \phi + \gamma > 0 \quad \text{for while} \\ \text{(23)} \quad \text{at the $t$} \\ \text{On the other hand} \text{ both caseical} v for hidden and else} \quad a _ { \sim } ( 0 ) \, = \end{cases}$$ On the other hand, both classically forbidden and classically allowed regions will be present in the barrier if 0 &lt; x 1 &lt; x 2 &lt; W . The two extreme cases of vanishing allowed regions occur when the leftmost turning point approaches the right interface of the barrier $$\text{approaces the right, inriace or in the parrier} \quad & \text{r.g. } \quad \\ x _ { 1 } < W \Rightarrow \begin{cases} \epsilon > \frac { \gamma \sin \phi + \sqrt { \gamma ^ { 2 } + ( \delta ^ { 2 } + \mu ) \cos ^ { 2 } \phi } } { \cos ^ { 2 } \phi }, & \epsilon \sin \phi + \gamma < 0 & \text{cognitive} \\ \epsilon > \sqrt { \delta ^ { 2 } + \mu }, & \epsilon \sin \phi + \gamma > 0 & \text{meV, W} \\ \text{we plot} \\ \text{and when the ri\thotmost,turning\sigma\text{noint}\,annroaches the left} & \text{r.g. } \end{cases}$$ and when the rightmost turning point approaches the left barrier interface $$x _ { 2 } > 0 \Rightarrow \begin{cases} \epsilon > \sqrt { \delta ^ { 2 } + \mu }, & \phi < 0 \\ \epsilon > \frac { \sqrt { \delta ^ { 2 } + \mu } } { \cos \phi }, & \phi > 0 \end{cases} \quad. \quad ( 2 5 ) \quad \text{ is b} \quad \text{reg} \quad \end{cases}$$ FIG. 4. (a) The regions with different ranges of turning points for W = 200 nm, ∆ SO = 30 meV, ∆ = 0 and B = 0 2 T. Dif-. ferent classically allowed trajectories are found in differently shaded regions, demarcated by the two critical boundaries. (b) A family of four different classical trajectories which correspond to the states labeled by numbered crosses in each region of (a). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-4aa57112-4357-4707-997d-90f21ae12587.jpg) From the angle dependent functions in the last four equations one might define the critical energies $$\epsilon _ { c r 0 } = \frac { \sqrt { \delta ^ { 2 } + \mu } } { \cos \phi },$$ and $$\epsilon _ { c r W } = \frac { \gamma \sin \phi + \sqrt { \gamma ^ { 2 } + ( \delta ^ { 2 } + \mu ) \cos ^ { 2 } \phi } } { \cos ^ { 2 } \phi }, \quad ( 2 7 )$$ . for which the classical turning points are located exactly at the two interfaces, i.e. they are obtained by solving q x (0) = 0 and q x ( W ) = 0, respectively. Those critical boundaries are plotted as dash-dotted and dotted curves in Fig. 3. , In order to elucidate the quasi-classical behavior, in Fig. 4(a) we plot the zones corresponding to different configurations of turning points by different colors. The same set of parameters is used as in Fig. 3(e) (∆ SO = 30 meV, W = 200 nm, B = 0 2 T and . s = +1). In Fig. 4(b) we plot a set of classical trajectories that correspond to the zones shown in Fig. 4(a). As could be inferred from Fig. 2, for glyph[epsilon1] larger than both glyph[epsilon1] cr 0 and glyph[epsilon1] crW (green colored region in Fig. 4(a)), there is no classically forbidden region inside the barrier. However, if the electron energy is between the two critical energies (red or blue colored region in Fig. 4(a)), a classically forbidden energy range will appear on either end of the barrier. In other words, the electron will have to tunnel through a part of the barrier adjacent to one of its interfaces, whereas propagation is free in the other part. For the most extreme case displayed as the magenta colored region in Fig. 4(a), the electron has to tunnel through both ends of the barrier. One may notice that the two critical energies whose variation with φ is depicted by dash-dotted and dotted lines in Fig. 3 are almost identical for the two spins. Also, by careful inspection of Fig. 3 it becomes evident that the quasi-classical zones we derived explain the observed transmission very well, especially for the spin up states. For the spin down states, however, transmission is enhanced with respect to the spin up states in the zones for which the electron waves must tunnel through a region of the barrier (the red and blue energy zones in Fig. 4(a)). This could be understood if one recalls that the WKB expression for the tunneling coefficient is given by $$& T \approx e ^ { - 2 I m \int q _ { x } ( x ) d x }, \quad \quad ( 2 8 ) \quad \overbrace { \mathfrak { C } }$$ glyph[negationslash] where the integration is over a classically forbidden region. Having this in mind, it is obvious that for ∆ SOC = 0 and B = 0 spin-up states decay faster than the spindown states in classically forbidden regions, due to the paramagnetic term. This difference increases at higher magnetic fields, which leads to an increasing difference between the transmission coefficients for the two spins, as Fig. 3 clearly demonstrates. When the magnetic field is absent, the emerging paramagnetism vanishes, and therefore, the transmission characteristics for the two spins are identical (see Figs. 3(a) and (b)). glyph[negationslash] Next, we explore how the presence of the magnetic moments affects the interference pattern shown in Fig. 3. This could be the most important effect from a practical point of view. In the Fabry-Perot model, the interference pattern depends on the phase the electron wave function accumulates between the barrier interfaces and the bounces from the interface(s) and/or turning point(s) $$\alpha = \alpha _ { W K B } + \alpha _ { 1 } + \alpha _ { 2 }, \text{ \quad \ \ } ( 2 9 )$$ where α 1 and α 2 are the backreflection phases, whereas α WKB is the WKB phase $$\alpha _ { W K B } = 2 \int _ { \max ( 0, x _ { 1 } ) } ^ { \min ( W, x _ { 2 } ) } q _ { x } \left ( x \right ) d x. \quad \ \ ( 3 0 ) \quad \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \$$ glyph[negationslash] To analyze how the orbital magnetic moments influence the fringe pattern we could once again invoke Eq. (20) and the associated diagram in Fig. 4. It follows that Fabry-Perot resonances have different character in the different zones. Whenever B = 0, the WKB phase is accumulated throughout the entire barrier for glyph[epsilon1] &gt; max( glyph[epsilon1] cr 0 , glyph[epsilon1] crW ), but only in region [ x , W 1 ] for glyph[epsilon1] cr 0 &gt; glyph[epsilon1] &gt; glyph[epsilon1] crW (the red-shaded region in Fig. 4(a)). Consequently, in the latter case the transmission maxima (depicted by the red color in Fig. 3) are almost linear functions of φ , whereas in the former case their dependence on φ is nonlinear. FIG. 5. The derivative of the conductance versus incident energy, for (a) 0 1 T, (b) 0 2 T and (c) 0 3 T. All other pa-. . . rameters are the same as in Fig. 3. Insets show the variation of the conductance with incident energy for the corresponding magnetic field. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-ef2000d1-fb25-427b-a5f7-2f6214525bf6.jpg) The crucial point, however, is that the phase accumulated during the propagation differs for the different spin orientations. This occurs because magnetic moments associated with opposite spins contribute to α WKB in opposite ways (see Eq. (20)). To see this clearly, and to provide experimentally verifiable predictions it is important to consider the conductivity of the entire studied structure, given as, 46 $$G \left ( \epsilon \right ) = G _ { 0 } \int _ { - \pi / 2 } ^ { \pi / 2 } T \left ( \epsilon, \phi \right ) \epsilon \cos \phi d \phi, \quad \ \ ( 3 1 )$$ where G 0 = e L/ 2 2 glyph[planckover2pi1] π 2 , with L denoting the lateral width of the entire structure in the y direction. Since the effects of magnetic moments are most vividly manifested in the dependence of dG/dE on energy, we display this quantity in Fig. 5, for the same set of parameters as in Fig. 3. Alongside with dG/dE , the corresponding conductance is shown in the insets for each case. As can be seen from these insets, G only depicts the fact that the spin-down conductance is increased with respect to the spin-up conductance, due to the enhanced transmission through the classically forbidden regions, as already discussed. On the other hand, the first derivative of the conductance with respect to energy conveys the information of the interference pattern, where the effects of the orbital moments are more transparent. Two issues are of importance here: (i) The difference between the FIG. 6. Transmission curves calculated using (a) the continuum and (b) the TB NEGF method. The parameters are W = 200 nm, B = 0 3 T and . E = 100 meV. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1200v2-figure-f8292c8e-0063-42c6-b96c-d43d91f7ed47.jpg) two spins is clearly more pronounced at higher magnetic fields. This happens because in such a case the orbital moments have a larger impact on the electron dynamics, as pointed out before. (ii) The distinction between the two spins is more prominent at lower energies. This is a consequence of the larger emerging orbital magnetic moments of the electrons whose energies are close to the band edges than of more energetic electrons, as Eq. (4) and Fig. 1(a) demonstrate. Finally, we would like to point out that the manifestation of orbital moments in transport properties can be captured by the tight-binding nonequilibrium Green function formalism as well. To show this, in Fig. 6(a) we plot a set of transmission curves obtained using the derived transmission amplitude, while in Fig. 6(b) we plot the results of our numerical transport simulations within the TB NEGF method, for the same barrier parameters. The phenomenological model used to describe graphene in this case is given by $$H = - t \sum _ { \langle i, j \rangle, \alpha } e ^ { i \varphi _ { i j } } c ^ { \dagger } _ { i \alpha } c _ { j \alpha } + i \lambda _ { S O } \sum _ { \langle \langle i, j \rangle \rangle, \alpha, \beta } \nu _ { i j } e ^ { i \varphi _ { i j } } c ^ { \dagger } _ { i \alpha } s ^ { z } _ { \alpha \beta } c _ { j \beta }. \quad \text{and} \, \Delta \, \varepsilon \\ \mathbb { m } { h a n d } \, \underline { \partial } \, \varepsilon \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \tau \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \tau \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an an} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a} \, \text{in an a}$$ The first term describes the usual hopping between nearest neighbor p z orbitals in graphene, which extends beyond the barrier. The second term describes the intrinsic spin-orbit interaction found in the barrier, through the next-nearest-neighbor (NNN) hopping amplitude λ SO (∆ SO = 3 √ 3 λ SO ). Note that ν ij determines the sign of the hopping; it is positive (negative) if an electron makes a right (left) turn at the intermediate atom in hopping from site j to site i . The Peierls term ϕ ij = e glyph[planckover2pi1] ∫ r j r i A · d l accounts for the phase the electron acquires while traveling in the presence of the magnetic field. The details of the NEGF procedure can be found in Refs. 47-50. Although the continuum and the TB NEGF schemes differ substantially as far as the formalism and implementation are concerned, they give practically indistinguishable results. This is not surprising, having in mind that the continuum Dirac picture is the effective theory corresponding to the low energy tight-binding method. Therefore, both approaches display these Zeeman-type effects, even though we use only minimal coupling and the Peierls substitution, to account for the influence of the magnetic field. Since strain in honeycomb lattices effectively induces time-reversal invariant pseudomagnetic fields, 51 stretching of insulating Dirac monolayers will inevitable galvanize orbital moments as well. 20 Note that the TB NEGF method could prove handy for studying the effects of disorder and imperfections on the manifestation of the spin-contrasting orbital moments. However, unlike the orbital moments coupled to the spin, the valley-contrasting orbital moments can not be distinguished by the TB NEGF transport simulations, since the contributions from the two valleys are inherently summed together, and cannot be separated. In this case, only the continuum calculations, where the valley degree of freedom is explicit, can elucidate the underlying physics. ## V. CONCLUSION In this paper, we addressed the orbital magnetic moments emerging from the topology of insulating Dirac systems, as well as their manifestation on transport characteristics. In particular, we first closely examined the moments coupled to the spin degree of freedom, arising due to strong spin-orbit coupling, and thus leading to the renormalization of the g-factor. Their duality with the valley-contrasting orbital moments found in honeycomb lattices with broken spatial symmetry is reviewed, alongside with the duality of the Landau spectrum, particularly manifested in the behavior of the zeroth Landau level. After establishing that magnetic properties couple with ∆ SO and the spin quantum number on the one hand, and ∆ and the valley quantum number on the other hand in an analogous fashion, we go on to explore the influence of the orbital magnetic moments on the transport properties. In particular, we focused on the transmission through a single 1D barrier made of artificially enhanced spin-orbit coupling in graphene. We have shown that certain Zeeman-like magneto-transport signatures are a clear manifestation of the induced moments. The conductance G through the device for the two spins start deviating from each other with increasing magnetic field. The effects of the moments on the fringe pattern of the transmission coefficients are most clearly observed in the energy dependence of the derivative of the conductance with respect to the electron energy dG/dE . This quantity reflects the increasing shifts in the interference maxima of opposite spins with increasing magnetic field; they are largest near the band edges, and they decrease for larger energies due to the decrease of the orbital magnetic moments themselves. glyph[negationslash] Because of the analogy between the mass and the SOC terms and the orbital moments they induce, the results presented here are also valid for valley transmission through a barrier with only ∆ = 0. This, however, can not be captured by numerical techniques such as the TB NEGF method, which is only able to account for the spin degree of freedom, and the associated orbital moments. Nevertheless, this behavior should be present in real devices, even in the absence of a clearly observable transport gap, since the Berry curvature hot spot can extend over a wide energy range. ## ACKNOWLEDGMENTS This work was supported by the Ministry of Education, Science and Technological Development (Serbia), and Fonds Wetenschappelijk Onderzoek (Belgium). ## Appendix A: Transmission through a barrier in bulk graphene The studied structure and the chosen gauge for the vector potential (Eq. (18)) ensure translational invariance along the y direction, so k y is a good quantum number and the solutions have the form Ψ( x, y ) = exp( ik y y ) ( ψ A ( x , ψ ) B ( x )) T . The following coupled system of differential equations, for the amplitudes on the two sublattices can then be obtained: $$\left ( \tau k _ { x } \mp i k _ { y } \mp i \frac { e } { \hslash } A _ { y } \right ) \psi _ { B / A } \pm \delta \psi _ { A / B } = \epsilon \psi _ { A / B }. \ \ ( A 1 ) \quad \text{is em} \quad \text{and } ($$ Reducing the coupled system to a set of two independent second order differential equations leads to $$& \left [ \partial _ { x } ^ { 2 } \mp \tau \frac { e } { \hbar } ( \partial _ { x } A _ { y } ) - ( k _ { y } + \frac { e } { \hbar } A _ { y } ) ^ { 2 } + \epsilon ^ { 2 } - \delta ^ { 2 } \right ] \psi _ { A / B } = 0. \quad \\ & \pi _ { \dots \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots - \dots } } \quad \text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text{$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$}$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$}\$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$\text$ \end{array} }$$ Having in mind the form of the vector potential, the differential equation in the barrier becomes $$\left [ \partial _ { x } ^ { 2 } \mp \frac { \tau } { l _ { B } ^ { 2 } } - ( k _ { y } + \frac { x } { l _ { B } ^ { 2 } } ) ^ { 2 } + \epsilon ^ { 2 } - \delta ^ { 2 } \right ] \psi _ { A / B } = 0. \quad ( \text{A3} ) \quad \text{Fir} \\ \text{non-2}$$ By using the transformation z = √ 2 ( k l y B + x/l B ) the following equation is obtained $$\left [ \partial _ { z } ^ { 2 } + 1 / 2 - 1 / 2 \mp \tau \frac { 1 } { 2 } + \left ( \epsilon ^ { 2 } - \delta ^ { 2 } \right ) \frac { l _ { B } ^ { 2 } } { 2 } - \frac { z ^ { 2 } } { 4 } \right ] \psi _ { A / B } = 0, \quad \text{with} \\ \text{and} \colon = \tau \colon = \tau \colon = \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \ tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau\dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colot \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \sigma \tau \colon \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \text{and} \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \ dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon \tau \dots \tau \colon.$$ which is of the form of the parabolic cylinder (Webers) differential equation $$y ^ { \prime \prime } + \left ( \nu + \frac { 1 } { 2 } - \frac { z ^ { 2 } } { 4 } \right ) y = 0, \quad \quad ( A 5 ) \quad \stackrel { \nu } { \ t o } ^ { \nu }$$ whose solutions are given in terms of parabolic cylinder functions $$y = C _ { 1 } D _ { \nu } ( z ) + C _ { 2 } D _ { \nu } ( - z ). \quad \quad ( A 6 )$$ Finally the solution for the first sublattice is given by $$\cdots \dots _ { \nu } \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \Delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \cdot \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \Dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \\ \cdot \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \\ \cdot \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \\ \cdot \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \dots \dots \dots \\ \cdot \cdots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \\ \cdot \cdots \dots \dots \dts \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \sigma \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \ delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta\delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta$$ where ν A = ( glyph[epsilon1] 2 -δ 2 ) l 2 B / 2 -τ/ 2 -1 2. / For the other sublattice after employing the recurrence relations $$\frac { \partial D _ { \nu } ( z ) } { \partial _ { z } } = \frac { 1 } { 2 } z D _ { \nu } ( z ) - D _ { \nu + 1 } ( z ), \quad \ ( A 8 )$$ and the relationship (A1), one obtains the following expression $$\psi _ { B } = & C _ { 1 } g D _ { \nu _ { B } } \left [ \sqrt { 2 } \left ( k _ { y } l _ { B } + x / l _ { B } \right ) \right ] \\ - & C _ { 2 } g D _ { \nu _ { B } } \left [ - \sqrt { 2 } \left ( k _ { y } l _ { B } + x / l _ { B } \right ) \right ], \\ \cdot \, \widehat { \ } \, \widehat { \ } \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cdot \, \cd.$$ where ν B = ( glyph[epsilon1] 2 -δ 2 ) l 2 B / 2 + τ/ 2 -1 / 2, and $$g = i \left [ \frac { \sqrt { 2 } } { \left ( \epsilon + \tau \delta \right ) l _ { B } } \right ] ^ { \tau }. \quad \quad ( \text{A10} )$$ If the relation $$D _ { \nu } \left ( z \right ) = 2 ^ { - \nu / 2 } e ^ { - z ^ { 2 } / 4 } H _ { \nu } \left ( \frac { z } { \sqrt { 2 } } \right ) \quad ( \text{A11} )$$ is employed, the spinor multiplied by C 1 in Eqs. (A7) and (A9) reduces to the solution (12), once the incident energy is equal to a particular Landau level, as could be expected. The incident wave function is given by $$\text{$A2$} ( \quad \psi _ { I } = e ^ { i k _ { z } x } \left ( \begin{array} { c } 1 \\ \tau e ^ { i \tau \phi } \end{array} \right ) + r e ^ { - i k _ { x } x } \left ( \begin{array} { c } 1 \\ \tau e ^ { i \tau ( \pi - \phi ) } \end{array} \right ), \ ( A 1 2 )$$ where φ = arctan k /k y x . Finally, in the third region the vector potential is a non-zero constant, and employing the standard plane wave ansatz, the solution is given by $$\psi _ { I I I } = t \sqrt { \frac { k _ { x } } { k _ { x } ^ { \prime } } } e ^ { i k _ { x } ^ { \prime } x } \left ( \begin{array} { c } 1 \\ \tau e ^ { i \tau \theta } \end{array} \right ), \quad \text{(A13)}$$ with the energy of the plane wave given by glyph[epsilon1] = α √ k ′ 2 x + k ′ 2 y , k ′ x = glyph[epsilon1] cos θ , the effective transverse momentum after the barrier k ′ y = glyph[epsilon1] sin θ = k y + W/l 2 B and θ being the angle of energy propagation, with respect to the direction transverse to the barrier. The additional factor under the square root follows from current conservation. 52 Again by replacing the expression for the momenta before and after the barrier, one obtains the effective law of refraction for a barrier of thickness W with nonzero ∆, ∆ SO and B as $$\epsilon \sin \theta = \epsilon \sin \phi + W / l _ { B } ^ { 2 }. \text{ \quad \ \ } ( A 1 4 )$$ The expressions for the wavefunctions in different regions, (A12), (A7), (A9), and (A13) are then matched at the interfaces x = 0 and x = W , which gives a system of equations, whose solution yields the transmission amplitude t $$t = \frac { 2 g \tau \cos ( \tau \phi ) \left ( G _ { A } ^ { + } G _ { B } ^ { - } + G _ { A } ^ { - } G _ { B } ^ { + } \right ) } { e ^ { i k _ { x } ^ { \prime } W } f } \sqrt { \frac { k _ { x } ^ { \prime } } { k _ { x } } }, \quad ( A 1 5 )$$ - ∗ [email protected] - † [email protected] - ‡ [email protected] - 1 B. Hunt, J. D. Sanchez-Yamagishi, A. F. Young, M. Yankowitz, B. J. LeRoy, K. Watanabe, T. Taniguchi, P. Moon, M. Koshino, P. Jarillo-Herrero, and R. C. Ashoori, Science 340 , 1427 (2013). - 2 C. R.Woods, L. Britnell, A. Eckmann, R. S. Ma, J. C. Lu, H. M. Guo, X. Lin, G. L. Yu, Y. Cao, R. V. Gorbachev, A. V. Kretinin, J. Park, L. A. Ponomarenko, M. I. Katsnelson, Yu. N. Gornostyrev, K.Watanabe, T. Taniguchi, C. Casiraghi, H-J. Gao, A. K. Geim, and K. S. Novoselov, Nat. Phys. 10 , 451 (2014). - 3 J. Jung, A. DaSilva, S. Adam, and A. H. MacDonald, arXiv:1403.0496v1. - 4 A. H. Castro Neto and F. Guinea, Phys. Rev. Lett. 103 , 026804 (2009). - 5 O. Shevtsov, P. Carmier, C. Groth, X. Waintal, and D. Carpentier, Phys. Rev. B 85 , 245441 (2012). - 6 H. Jiang, Z. Qiao, H. Liu, J. Shi, and Q. Niu, Phys. Rev. Lett. 109 , 116803 (2012). - 7 J. Balakrishnan, G. K. Koon, M. Jaiswal, A. H. Castro Neto, and B. Ozyilmaz, Nat. Phys. 9 , 284 (2013). - 8 A. Avsar, J. Y. Tan, T. Taychatanapat, J. Balakrishnan, G.K.W. Koon, Y. Yeo, J. Lahiri, A. Carvalho, A. S. Rodin, E.C.T. O'Farrell, G. Eda, A. H. Castro Neto, and B. Ozyilmaz, Nat. Commun. 5 , 4875 (2014). - 9 C.-C. Liu, W. Feng, and Y. Yao, Phys. Rev. Lett. 107 , 076802 (2011). - 10 S. Cahangirov, M. Topsakal, E. Akt¨rk, H. Sahin, and S. u ¸ Ciraci, Phys. Rev. Lett. 102 , 236804 (2009). - 11 Y. Xu, B. Yan, H. J. Zhang, J. Wang, G. Xu, P. Tang, W. Duan, and S. C. Zhang, Phys. Rev. Lett. 111 , 136804 (2013). - 12 ∆ SO also gives rise to massive particles, by virtue of opening the gap, however for brevity we refer only to the ∆ term as mass. - 13 C. L. Kane and E. J. Mele, Phys. Rev. Lett. 95 , 146802 (2005). - 14 M.-C. Chang and Q. Niu, Phys. Rev. B 53 , 7010 (1996). - 15 D. Xiao, W. Yao and Q. Niu, Phys. Rev. Lett. 99 , 236809 (2007). - 16 K. F. Mak, K. L. McGill, J. Park, and P. L. McEuen, Science 344 , 1489 (2014). - 17 R. V. Gorbachev, J. C. W. Song, G. L. Yu, A. V. Kretinin, where $$\text{the et-} \\ \text{/ with } \quad f = g ^ { 2 } \left ( F _ { B } ^ { + } G _ { B } ^ { - } - F _ { B } ^ { - } G _ { B } ^ { + } \right ) + e ^ { i \tau ( \theta - \phi ) } \left ( F _ { A } ^ { + } G _ { A } ^ { - } - F _ { A } ^ { - } G _ { A } ^ { + } \right ) \\ + g \tau e ^ { i \tau \theta } \left ( F _ { B } ^ { - } G _ { A } ^ { + } + F _ { B } ^ { + } G _ { A } ^ { - } \right ) + g \tau e ^ { - i \tau \phi } \left ( F _ { A } ^ { + } G _ { B } ^ { - } + F _ { A } ^ { - } G _ { B } ^ { + } \right ). \\ ( \text{A16} )$$ Here the coefficients F ± and G ± are given by $$F _ { A / B } ^ { \pm } = D _ { \nu _ { A / B } } \left [ \pm \sqrt { 2 } k _ { y } l _ { B } \right ], \quad \ \ \ ( \text{A17} )$$ $$G _ { A / B } ^ { \pm } = D _ { \nu _ { A / B } } \stackrel { \cdot } { \left [ \pm \sqrt { 2 } ( k _ { y } l _ { B } ^ { \prime } + \frac { W } { l _ { B } } ) \right ] } \,. \quad \ ( A 1 8 )$$ - F. Withers, Y. Cao, A. Mishchenko, I. V. Grigorieva, K. S. Novoselov, L. S. Levitov, and A. K. Geim, Science 346 , 448 (2014). - 18 W. Feng, Y. Yao, W. Zhu, J. Zhou, W. Yao, and D. Xiao, Phys. Rev. B 86 , 165108 (2012). - 19 D. Xiao, G. B. Liu, W. Feng, X. Xu, and W. Yao, Phys. Rev. Lett. 108 , 196802 (2012). - 20 M. M. Gruji´ c, M. Z. Tadi´, and F. M. Peeters, Phys. Rev. ˇ c Lett. 113 , 046601 (2014). - 21 F. Zhang, J. Jung, G. A. Fiete, Q. Niu, and A. H. MacDonald, Phys. Rev. Lett. 106 , 156801 (2011). - 22 H. Min, G. Borghi, M. Polini, and A. H. MacDonald, Phys. Rev. B 77 , 041407 (2008). - 23 F. Zhang, H. Min, M. Polini, and A. H. MacDonald, Phys. Rev. B 81 , 041402 (2010). - 24 R. Nandkishore and L. Levitov, Phys. Rev. B 82 , 115124 (2010). - 25 J. Jung, F. Zhang, and A. H. MacDonald, Phys. Rev. B 83 , 115408 (2011). - 26 C. L. Kane and E. J. Mele, Phys. Rev. Lett. 95 , 226801 (2005). - 27 W. Yao, D. Xiao, and Q. Niu, Phys. Rev. B 77 , 235406 (2008). - 28 D. Xiao, M. C. Chang, and Q. Niu, Rev. Mod. Phys. 82 , 1959 (2010). - 29 M. C. Chang and Q. Niu, J. Phys.: Condens. Matter 20 , 193202 (2008). - 30 M. Gradhand, D. V. Fedorov, F. Pientka, P. Zahn, I. Mertig, and B. L. Gy¨ orffy, J. Phys.: Condens. Matter 24 , 213202 (2012). - 31 F. D. M. Haldane, Phys. Rev. Lett. 61 , 2015 (1988). - 32 M. Ezawa, Phys. Rev. B 86 , 161407 (2012). - 33 A. Korm´ anyos, V. Z´ olyomi, N. D. Drummond, and G. Burkard, Phys. Rev. X 4 , 011034 (2014). - 34 C. J. Tabert and E. J. Nicol, Phys. Rev. Lett. 110 , 197402 (2013). - 35 P. M. Ostrovsky, I. V. Gornyi, and A. D. Mirlin, Phys. Rev. B 77 , 195430 (2008). - 36 P. M. Krstaji´ c and P. Vasilopoulos, Phys. Rev. B 86 , 115432 (2012). - 37 J. L. Lado, J. W. Gonz´ alez, and J. Fern´ndez-Rossier, a Phys. Rev. B 88 , 035448 (2013). - 38 M. Ezawa, Phys. Rev. Lett. 109 , 055502 (2012). - 39 X. Li, F. Zhang, and Q. Niu, Phys. Rev. Lett. 110 , 066803 (2013). - 40 T. Cai, S. A. Yang, X. Li, F. Zhang, J. Shi, W. Yao, and Q. Niu, Phys. Rev. B 88 , 115140 (2013). - 41 M. Koshino and T. Ando, Phys. Rev. B 81 , 195431 (2010). - 42 M. O. Goerbig, Rev. Mod. Phys. 83 , 1193 (2011). - 43 M. Gruji´ c, M. Zarenia, A. Chaves, M. Tadi´, G. A. Farias, c and F. M. Peeters, Phys. Rev. B 84 , 205441 (2011). - 44 L. Majidi and M. Zareyan, Phys. Rev. B 83 , 115422 (2011). - 45 M. Ramezani Masir, P. Vasilopoulos, A. Matulis, and F. M. Peeters, Phys. Rev. B 77 , 235443 (2008). - 46 M. Ramezani Masir, P. Vasilopoulos, and F. M. Peeters, Phys. Rev. B 79 , 035409 (2009). - 47 T. C. Li and S.-P. Lu, Phys. Rev. B 77 , 085408 (2008). - 48 S. Datta, Electronic Transport in Mesoscopic Systems (Cambridge University Press, Cambridge, 1995). - 49 In order to compare the results with the continuum theory, we need the numerical simulations within the NEGF formalism to provide us with the angular dependence of the transmission through a structure infinite in the y -direction. To achieve this, we resort to the recipe described in Ref. 50. In short, we take the narrowest possible zigzag nanoribbon, placed along the x -direction, where the semi-infinite left and right leads surround the barrier region in which SOC NNN hopping is nonzero. The structure is then taken to be periodic along the y -direction, prompting the use of the Bloch theorem in this direction. This means that the phase factor will enter all hopping terms along the y axis, which is none other than the transverse momentum k y . In this way, k y appears as a parameter, and since the incident energy E is a parameter as well, one is then able to reconstruct the angle of propagation using glyph[planckover2pi1] v F k y = E sin φ . Note that in our case, besides the Peierls phase factor, we must also add the vector potential, Eq. (18), to k y , in order to properly model the influence of the magnetic field. Finally, one needs to connect the Fermi velocity v F entering the Dirac equation, with the nearest-neighbor hopping t , as v F = 3 ta/ 2 glyph[planckover2pi1] , where a = 0 142 nm is the carbon-carbon . distance, and the hopping is set to t = 2 7 eV. . - 50 M. H. Liu, J. Bundesmann, and K. Richter, Phys. Rev. B 85 , 085406 (2012). - 51 F. Guinea, M. I. Katsnelson, and A. K. Geim, Nat. Phys. 6 , 30 (2010). - 52 P. E. Allain and J. N. Fuchs, Eur. Phys. J. B 83 , 301 (2011).
10.1103/PhysRevB.90.205408
[ "Marko M. Grujić", "Milan Ž. Tadić", "François M. Peeters" ]
2014-08-06T07:44:59+00:00
2014-11-14T08:40:27+00:00
[ "cond-mat.mes-hall" ]
Orbital magnetic moments in insulating Dirac systems: Impact on magnetotransport in graphene van der Waals heterostructures
In honeycomb Dirac systems with broken inversion symmetry, orbital magnetic moments coupled to the valley degree of freedom arise due to the topology of the band structure, leading to valley-selective optical dichroism. On the other hand, in Dirac systems with prominent spin-orbit coupling, similar orbital magnetic moments emerge as well. These moments are coupled to spin, but otherwise have the same functional form as the moments stemming from spatial inversion breaking. After reviewing the basic properties of these moments, which are relevant for a whole set of newly discovered materials, such as silicene and germanene, we study the particular impact that these moments have on graphene nanoengineered barriers with artificially enhanced spin-orbit coupling. We examine transmission properties of such barriers in the presence of a magnetic field. The orbital moments are found to manifest in transport characteristics through spin-dependent transmission and conductance, making them directly accessible in experiments. Moreover, the Zeeman-type effects appear without explicitly incorporating the Zeeman term in the models, i.e., by using minimal coupling and Peierls substitution in continuum and the tight-binding methods, respectively. We find that a quasiclassical view is able to explain all the observed phenomena.
1408.1201v1
## System Analysis and Design for integrated sponsored SMS/USSD Based M-Services A case study of Maternal Health M-Service in Tanzania Timothy Y. Wikedzi 1 , Ramadhani S. Sinde 2 Computational and Communication Sci &amp; Eng Nelson Mandela African Institution of Sci &amp; Tech Arusha, Tanzania 1 [email protected], 2 [email protected] Abstract-Mobile phones have proven to be the best way of providing reliable access to information to people in low and mid income countries where other forms of communication perform poorly. As a result of the wide spread of mobile phones, there has been an increase in number of Mobile Application (M-Services) which are being used as a tool for disseminating different type information to people. MServices of this nature are established to address informational challenges that are faced by people especially low income people. Because of this then, these projects must be sustained so that people can enjoy the benefits of it. Contrary to this, reports show that most of these M-Services are facing the challenge of cost of operating them, which in a direct way affects the sustainability of these services. In this paper therefore we present an analysis and later design of a noncommercial M-Service, which integrates advertising functionality as a tool for subsidizing the cost of operating M-Services. To achieve this we have employed some concepts of Information System Analysis and Design (ISAD) as the guiding principle towards achieving our design. A prototype of M-Health is used for the study. Keywords-M-Service; ISAD; Ad, USSD; SMS; Mobile; Sustainable; Cost of operation. ## I. INTRODUCTION The mobile communications technology has quickly become the world's most common way of transmitting voice, data, and services in the developing world. They carry a potential of being the best media for dissemination of information because mobile services are widely available and inexpensive, [1]. Mobile phones are less inhibited by traditional access barriers that hinder the widespread use of many other communications technologies including geography, socioeconomic status, infrastructure such as electricity and literacy, [2] The potential of Mobile Technology being the right tool for disseminating information has led to establishment M- Dan K. McIntyre 1 1 Information Technology University of Iringa Iringa, Tanzania [email protected] Service projects that are initiated to disseminate information to various social and economic groups within the society. An example of such projects operating in Tanzania and internationally are Mobile Alliance for Maternal Action (MAMA), M-Health Alliance, eagriculture and Maji Matone and many other applications for Farmers, Sports, Educations etc. Existence of these projects have been reported to Improve livelihood of people by providing them with information which is an important tool for making informed decisions and in staying updated, [3]. [4] also reported that M-Services can contribute in fighting poverty by facilitating the convergence of local and global knowledge and disseminate it to the rural areas so as to improve economic production capacity in the settings in which the majority of the poor live. Despite the fact that M-Service projects have proven to be a potential way for disseminating information to people, they are challenged by cost of service which is directly affecting sustainability of such services (MAMA 2013). mHealth Alliance report affirms to the fact that MServices improves access to information, But the question of financial sustainability and ultimately 'Who pays?' poses persistent challenges and barriers to scale and investment in such projects. Studies show that cost of information is among the major barriers to effective use of information which has resulted in underperformance and in some cases, total failure of M-Service e.g. Maji Matone Project in Tanzania. The experience of MAMA is a similar case for most other M-Services even those which are not related to M-Health. A report by mHealth Alliance on usage of mobile phone applications for disseminating information indicated that, at present, the majority of MServices, particularly in low and middle-income countries, are dependent on donor funding. The report states further that, this model of financing is unsustainable because of the lack of certainty that funding will be renewed and always the funds are limited to allow the project to run in full scale. As a result, most of these MService projects do not survive because of their dependence on this form of financing. The question, who pays? Is at the centre of most M-Services discussion. According to [5] report, Securing sufficient revenue is still a challenge for most providers of noncommercial MServices. [5] Presents a solution that, M-Service providers must develop a creative mix of revenue streams while taking into account the affordability of services. The report identifies the challenge of limited income for people in rural areas and so recommends an advertising model to be used to cover the cost of operating the MService. There are M-Services which have succeeded and based on the current trend they have shown potential for further adoption (intermedia 2013), examples of such services are Mobile Money (M-Money) and Mobile Banking. Which uses a self-financing mechanism by charging users per transaction. There are also existing commercial MServices agencies which run mobile services for information access such as Health information and agricultural information on weather and market prices for farmers as well as other forms of SMS campaigns, [6], [7]. Instead of providing free access to information these agents charge all their subscribers an access fee that ranges between 250Tsh, 500Tsh or higher for access. These models of financing M-Services promise sustainability but they pose a threat of Digital Divide between those who can pay for access and those who cannot pay. Cost of service in running M-Service has direct impact to the sustainability of M-Services. Donor funded M-Service project will only survive as long as the project gets support, but as the size of the project grows it then becomes a direct threat to sustainability of the MService. A sustainable financial model is needed to ensure survival of M-Service projects [8] This study is set to adopt the recommendation from [5] and design an M-Service that integrates Advertisements functionality as system module for subsiding cost of operating an M-Service. Advertisements have widely been used in the field of Information technology as a mechanism for covering cost and of course making profits. Companies like Google, for example, make a fortune through advertisements. The potential of advertisements in covering the cost of access has benefited a lot of other companies like Facebook and Yahoo which provide users with free access at the cost of receiving advertisements. Nowadays there are thousands of free mobile apps in the market which use advertisements as a tool for generating income. However in this study we are set to present an idea of SMS advertisesments as a potential solution for free access to information for all categories of mobile phone users. Implementing a sustainable M-Services is an important aspect towards ensuring long term benefits of those projects. In this paper we present the Analysis and Design of an Integrated M-Service that addresses the challenge of cost of operation by using SMS advertisement support as an integral part of the system. A case study of M-Service for Maternal Heath in Tanzania is used. ## II. LITERATURE REVIEW ## A. Mobile Application as M-Service [5] Defines mobile Applications as software designed to take advantage of mobile technology. In this paper we specifically refer to Mobile Applications as SMS Based Mobile Application (M-Services). This way we put a distinction of M-Service from more complex and advanced Mobile Applications that run on smartphones. The reason to do this is that, although mobile phones are widely spread in low and mid income countries, the majority of people, especially in low income countries, own basic phones which have limited features compared to smartphones. ## B. Sustainable M-Service [9] Defines Sustainability as the process of maintaining something that already exists over time without needing an outside support for it to continue existing. Whereas [10] provides us with a more specific definition of sustainable IT as a Technology that is capable of being maintained over a long span of time without being affected by the changes in both hardware and software. This definition presents to us two important things to consider when talking about sustainable IT, in this case an M-Service, one is the life span of the system, and two is the ability of a system not being affected by the changes in hardware and the software. ## C. SMS Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages, [11]. Content of one SMS is limited to a maximum160 ASCII characters. SMS are sent to mobile phones via the SMS Gateway. Using SMS technology, it is also possible to send them in Bulk, in which one or more SMS are sent to more than one user. This offers a better way of reaching out to more people at a time. ## D. Ad This is a term that is used to refer to Advertisement. In this context, it always refers to a text base advertisement that is intended to be sent to the end user inform of an SMS. ## E. SMS advertising SMS advertising is a subset of Mobile advertising, a form of advertising via mobile phones or other mobile devices. Other forms of mobile advertising which are specifically common in smart mobile devices are Mobile Web Banner (top of page) and Mobile Web Poster [12]. The focus of this paper though is on SMS advertising, which has been reported to be the leading form of Mobile advertising worldwide, for the reason that our proposed system is also for no smartphone users. ## F. Approaches of pushing SMS advertisements - 1) Receiver Opt-in: This form of SMS advertisement involves requesting for the consent of the potential receiver before starting pushing of advertisements. - 2) Purchase of Receiver numbers from third part source: This form of advertisement involves purchasing of receivers contacts from third party companies and using them to push SMS advertisements ## G. USSD [13] Defines Unstructured Supplementary Service Data (USSD) as a communication protocol used to send text messages between a mobile phone and applications running on the network. It is a messaging service used in Global System for Mobile Communications (GSM) networks similar to SMS. However, unlike SMS; USSD provides session-based connections. Because of its realtime and instant messaging service capability, USSD service offers better performance and is much cheaper than SMS for two-way transactions. This service is unique and only available to GSM networks. The following are the advantages of USSD as described by [13]. ## 1) USSD code format USSD communication is initiated by dialing a special code. USSD codes comprise of asterisk (*), followed by a combination of digits (0 to 9) and a hash (#) Example *150*00#. The * and # codes are used to signify the beginning and end of the request. ## 2) USSD Architecture According to [13] The USSD architecture basically comprises -  The network part that includes the Home Location Register (HLR), Visitor Location Register (VLR), and MSC -  Simple Messaging Peer-Peer (SMPP) interface for applications to enable services -  USSD Gateway and all specific USSD application servers Figure 1: Elements of the USSD Mobile Network (Source Aricent) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-b6500a89-5408-4e37-82a9-a3aad23d8496.jpg) While USSD seems to be a complex architecture, the focus of this study is not in analyzing USSD architecture but rather to make use of it as a black box. Our only concern is on the Internet and Subscriber sides. In this paper we present the analysis and design of an Application that that interfaces with USSD to reach the end users. ## III. OVERVIEW OF THE SYSTEM In this paper, we present the analysis and Design of an MService (m-Health) that rely on sponsorship (advertisement) to convey maternal health information to the public of Tanzania. The proposed system will involve the use of mobile phones to deliver messages to the target audience. The system will allow the user to subscribe and get information via short messages. All messages stored on the system will be provided by health professionals to ensure that the information sent to users are correct. These health professionals will be assigned special accounts that they will use to access and work in the system. End users will be able to retrieve this information via SMS using their mobile phones. They will also have the opportunity to send various questions and receive answers from medical professionals. The system is designed with a capability of sending advertisements to end users as a way of covering the cost of operation. To ensure future sustainability of this system, the system design also integrates a payment system for economic buyers who will not want to receive advertisements. Payment service will also be useful in time if there are no funds to cover the cost of free access and in meeting the needs of those who would want unlimited access. However, the focus of our analysis and design is on Sponsored access (access through advertisements). ## A. Integrating Technologies The Architectural design of our M-Health is based on four tiers architecture (see Error! Reference source not found. ) as it has been proposed by [14]. They identified that using a four tier architecture for mobile applications offers more abstraction, more independence between components of the system, and hence a more flexible way of implementing mobile applications. We have adopted this architecture because we see it fitting our design idea. It also gives us a great opportunity to plan for growth as mobile technologies evolve so fast and the future holds that more mobile phone users will be upgrading to smartphones and other devices. Figure 2: Adopted Four Tier Architecture (Source: http://blogs.forrester.com/) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-461650ea-02f5-4c81-a4b1-37c782dad57b.jpg) ## B. Implementing the Four Tier architecture for our MHealth -  A client tier : Represents end users means of accessing our M-Health System. The client tier in this case refers to both mobile phones and web clients. This presentation layer creates a separation between the applications and accessing devices and the backend services that the application delivers. -  Delivery tier : Is the channeling tier. It handles the physical routing of requests and information to and from the system. This is the direct interface of the systems and the end users. In our M-Health Systems this represents Telecommunication channels and services such as USSD and SMS. It also represents the Internet as the channel through which Medical Experts will be interacting with the system. -  Aggregation tier : Acts as a bridge between data and upper tiers. It provides means for handling all data requests and exchanging data between service tier and the Delivery tier. Our M-Health System will run on PHP as the language for our application. -  A services tier : Handles all data functionalities. It includes the database that stores and manages all data. The choice of Database for our M-Health system is a MySQL database. The reason for choosing this type of Database management system is that it's open source and has a strong community for support. ## C. Sponsored (Advertisement) access Request life cycle Under this subsection we describe the concept of the advertisement mechanism for our proposed M-Service. Of the two approaches for pushing advertisements to the end user, we will be using the opt-in approach. Therefore, all our designs are based on an assumption that the end user opted to receive an advertisement ## 1) Information Requesting Information processing begins with the user, sending a USSD request from his mobile phone. After dialing a special USSD code, the user receives a USSD menu from which he can choose categories of information to access. Information request is limited to categories after which a random information will be sent to the end user base on the selected category. ## USSD menu generation The USSD menu is dynamically generated from the defined categories of information in the database. This menu gives a user access to various types of information that is stored in the database. Generating menus dynamically adds more flexibility to the system. ## 2) Advertisement processing ## a. Fetching of an Ad from the database All advertisements will be stored in the database and associated with sponsors who will be registered into the system. The process of fetching an ad from the database is triggered internally after the M-Service has received an access request. Before an ad is sent, the system checks to see if there are any existing ads. The conditions for an ad to exist is that there should be at least one sponsor with some remaining balance. This is how the system will know that a message can be sent. Once the ad has been confirmed to exist the system will proceed on fetching the current ad in the queue and submit it for further processing ## b. Processing ads based on available sponsors. In this initial design, all ads will be sent in a queue that will rotate around all available sponsors whose balance is above zero. The future design of this system will allow ads to be sent to a client base on the relevance of the locality as the first priority. This way the system will be able to send context based and relevant ads to end users. This of course will be achieved with an upgrade to smartphones. Figure 3: Design concept of the advertising mechanism ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-53c21717-b7c5-4d3c-b862-f2c0b96742b6.jpg) ## 3) Fetching of information Once sponsorship has been confirmed, content is then prepared to be sent to the users. As it has been stated earlier, information to be sent to the user will depend on the category of information that was picked by the user. ## 4) Integrating an ad with requested information The next step after fetching both the ad and the information is to bind them together and send them as a single data packet to the user. There are two alternatives on how this information will be sent to the user; first, we send two separate SMS one for the ad and the other with the requested information. Second, we send one SMS containing both the ad and the content. ## 5) Content Delivery Though all information requests will be issued via the USSD service, the requested information will be sent back to the user via an SMS. This is because USSD messages are session based, so once the session is over the returned message is lost. Also USSD messages cannot be saved in the inbox of the end user's phone. ## IV. ISAD FOR SUSTAINABLE M-SERVICE In Information Systems (IS) development, Analysis and Designing is used as a tool for developing successful IS. History and experience prove that most of the IS projects that had in one way or another ignored ISAD suffered great failures in the form of exceeding budgets, failure to meet the running cost of the system and in some cases total rejection of the system by the users. ISAD as a tool is a part of System Development Life Cycle (SDLC). Dennis, A. et el, 2012 define the Systems development Lifecycle (SDLC) as the process of determining how an information system (IS) can support business needs, designing the system, building it, and delivering it to users. The key concept in this definition is that IS are need based, meaning that there is no purposeless IS as they are all developed for the sake of addressing a certain need. In this paper, we present ISAD considerations for sustainable M-Service. We present the analysis and Design of an M-Service that integrated Advertisement as a tool for subsidizing the cost. ## A. Identification of end users As a part of ISAD, the project must clearly identify the end user, in the case of M-Service the end user is referred to as the individual(s) that and are intended to be accessing information offered by the service. The process of identifying users of an M-Service is highly dependent on the type of M-Service. If for example a service is meant for Farming activities, then clearly it means that farmers form a primary group of end users of that service. In the case of an M-Health (Maternal Healthy) system which we refer to as a case study in this paper, the end users of the system are primarily Pregnant women, Fathers, Mothers and all those who would benefit from accessing maternal health information. User identification as an aspect of ISAD is necessary to ensure that a solution based MService is developed and better design is later achieved. ## B. Considering the cost of operation Well, this is the focus of this study. As it has been reported that covering the cost of operation is a challenge that most M-Services face,. The cost of operation is a critical factor to be considered in any M-Service since they all rely on Mobile communications which are run commercially. Mobile network operators dominate the M-Services ecosystem in developing countries. They serve as gatekeepers, and dictating matters related to revenues including requiring payments for the service [5]. M-Services are categorized into two major types; commercial M-Services which are typically developed to deliver information or conduct transactions (or both) and noncommercial M-Services which are developed only to provide information [5]. Commercial M-Services require end users to pass through some form of payment when accessing the service. Sponsored (noncommercial) MServices on the other hand have a third person who covers the cost so that end users can enjoy a free service. Running a Commercial M-service is clear when it comes to costs of operating them. Because end users are charged for the service and in so doing the host of such application makes a profit and covers the cost of operations. Examples of such M-Services are M-Banking, M-Money etc. In Tanzania the leading Commercial M-Service provider is Vodacom with their M-Pesa service which is a form of MMoney service that offers a service of mobile money transactions. The Analysis and Design focus of this paper is on Sponsored M-services because, they have potential of or extending information accessibility to people of low income. Considering the current economic state of people in rural areas of Tanzania which according to census results of 2012 more than 60% of the whole population live in rural area where there is extreme poverty. ## C. System and User interactions The question of how users will interact with the system is critical in any IS project because it determines the type of technologies to be used as well as in planning for the cost of operation. Our M-Heath System offers two types of users Web Client users (Administrator and the Medical Experts) and Mobile subscribers who are the end users of our M-Health System. Web users interact with the system through Web browsers and internet whereas all our mobile subscribers uses their mobile phones to access the system. The mode of communication between the System and the subscribers will be via SMS/USSD services. Subscribers will also be able to post questions by sending them via SMS to a special number. Administrator and Medical Experts will be able to add new content and manage the system from the backend. ## D. Requirements gathering and Analysis [15] Defines Requirements as statements of what the system must do or what characteristics it needs to have. Any IS relies on requirements for its implementation an M-Service is no exception. However M-services present a challenge when it comes to gathering of requirements, M-Services are IS that are not domain based. They are developed to be used as a medium of disseminating information to open end users, it could be a well-defined group of end users, like in this case pregnant women for example. But still these people are not organized under one domain, they are all independent and with freedom to choose to adopt the service or to remain as watchers. We understand though, the idea of our M-Service is that it will be delivering simple text messages either in form of SMS service or USSD messages. End users of our application need not to know how the backend of our application is structured. Our Analysis and Design is therefore characterized by the idea of a information system that delivers information to end users in a manner that users can afford to get it, access it easily, and understand the content. ## 1) M-Health application requirement Since the focus of this paper has been on Sponsored MServices we will then discuss requirements based on that sector. Before defining requirements we need to describe how it will work with use cases. In a domain limited IS projects, requirements are derived from the business processes of a particular domain e.g. Human Resource IS, Academic IS, Payroll IS etc.IN the other hand, MServices are open ended systems, meaning that the developer proposes the requirement and implements the system. The role of end users is not to provide initial requirements but rather to give feedback that will later improve their experience with the service. ## 2) Functional Requirements Functional requirements are those requirements that are used to illustrate the internal working nature of the system. They describe what tasks the system should perform. - a) Subscribers -  Subscribes -  Send questions -  Access Information via mobile phone ## b) Administrator -  Manage Doctors -  Monitor Subscribers -  Manage Sponsor Information -  Access Information ## 3) Nonfunctional Requirements ## a) Operational -  USSD/SMS service -  The system should interface with SQL database. ## b) Maintainability &amp; Upgrades -  System should allow upgrade to smartphone usage -  System should allow updates and upgrades without affecting users' experience - c) Acceptance -  System Language should be Swahili These are a summary of all requirements that as a developing side we have come up with. It is of course true that some or most of these requirements will change overtime as users will require some aspect of the systems to be improved, added, or dropped. There is at all-times a call for better future versions of the system and services. ## E. Structuring of the Requirement Having defined the requirement for our M-Service we move to the next stage of systems analysis. According to [16] system analysis phase consists of two parts, determining requirements and structuring requirements. During structuring of the requirements the goal is to interpret and model processes and data for our application. A common tool used for structuring information is the Data-Flow Diagram (DFD). [16] Describes data flow as data that are in motion and moving as a unit from one place in a system to another. DFDs use four symbols, data flows, data stores (e.g. database), processes, and sources/sinks (or external entities) to represent both physical and logical information systems. Figure 4 : DFS tools ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-9f360407-9560-404d-8a5d-8524178ee13f.jpg) - 1) Process flow modelling: Process modelling is meant to provide a description of how data flows from one point to another. Our M-Health system has three possible users who will act as the action source to our system. These users interact with the system with different roles and each causes different types of data to flow. - a) Context Diagram: A Context Diagram in this case is meant to give a general concept of the system and data that will be flowing as ads to the identified interfaces (users). Figure 5 Shows the context diagram for the proposed System. It consists of the main process Health SBMA (SMS Based Mobile Application) Figure 5: Context Diagram showing general data flows for our mHealth ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-26f817bd-fc0b-4ebd-b620-cb7465a1db11.jpg) ## b) Level 0 Process Diagram Expounding the context diagram, we create the object Level 0 diagram. The level 0 diagram basically breaks down the Health SBMA (SMS Based Mobile Application) as identified in the context diagram. Figure 6 show the diagram for level 0 of the proposed M-Health System. Figure 6: Level 0 data flow diagram describing processes in more details ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-0843c165-9ede-4ed5-9b35-083eed9ae6ad.jpg) ## c) Level 1 Process Diagram Level 1 diagram for our M-Health describes the breaking down of process 2.0 which handles the task of processing information requests. There are two types of request that the system can receive, one is of free access to information and the other one is for the paid access. Figure 7: Level 1 Data low diagram for Process 2.0 in Level 0 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-52e87cf4-3246-4e6d-ad80-47a1084be49f.jpg) ## 2) Conceptual Data Modelling [16] describes conceptual data modelling as a way of representing organizational (Information Systems) data. The goal of data modelling is to show as many rules about the meaning and interrelationships among data as possible, independent of any database management system (e,g MySQL, Oracle, MS SQL, SQLite). The common tool that is used to model the data are Entityrelationship (E-R) data models. These are diagrams that show how data are organized in an information system. ERD uses a special notation of Rectangles (to describe entities), diamonds (to describe relations), and lines to represent as much meaning about data as possible. The deliverable from the conceptual data-modeling step within the analysis phase is an ERD Diagram During the analysis of requirements for our M-Health we had put focus on data to gain the perspective on data needed to develop a data model. The following entities have been identified; (1) USER\_GROUP (Defines roles of users e.g Doctors, Administrator), (2) USER (Handles users' profile data), (3) SUBSCRIBER (Stores subscribers information) , (4) QUESTION (Stores posted questions), (5) ANSWER (stores responses to questions), (6) CATEGORY (Stores categories of information which forms menus and submenus), (7) CONTENT (Stores information that subscribers can access), (8) RECEIVED\_SMS, (9) SPONSOR (Stores sponsors information), (10) ADS (Stores all the advertisements) The conceptual data model of these schemas is represented diagrammatically by Figure 8 Figure 8: ERD Diagrams describing the conceptual model of our mHealth System ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-fd00ef76-1fb3-4749-a03e-f27e27a2b2b9.jpg) The ERD diagrams presented in this subsection forms the basis for the database implementation. ## F. System Designing Considerations ## 1) Keeping it simple SMS based application are characterized by the size of the SMS which is determined by a fixed number of text characters. The size of SMS directly affects the cost of operation because the cost of sending SMS increases with the number of Messages. For this reason, then it is important that the overall application is kept simple and more focus to be put on means for optimizing the amount of information for an SMS. ## 2) Information Design [17] States that a high quality information design communicates information in a manner appropriate and pertinent to a reader's situational context. It must focus on the reader ability to understand it and to extract meaning from that information. Information Design is one of the very important factors for a sustainable M-Service. Our M-Health System is meant for Tanzanians and so information design aspect should consider the nature of these people to determine the type of information and in which form that information going to be delivered. The national Language of Tanzania is Kiswahili? And it is both the official language and the language that most people understand. It is obvious then, one of information design criterial for our M-Service is that its content must be in Swahili. Another very important factor to consider is, as has been mentioned before, that this application relies on SMS/USSD services. The cost of these services is determined by the size of message ## 3) Designing Interactive menus for USSD All end users (Subscribers) of the system will access the system via their mobile phones. The system is designed to work for all types GSM of phones. Error! Reference source not found. Shows a summary of user actions when accessing our M-Health application via the mobile phones. The flow of actions is numbered from 1 to 12. (1) User enters the USSD code to access information in this case it is *31022, (2) If the user is accessing the system for the time he will be asked to subscribe by sending a messages to a special number (registration could free or onetime payment of 250Tsh). (3) Once in the system the user will receive a USSD message informing him that the service is free but he will receive an ad. (4) User can then choose to proceed or quit. (5) Upon agreeing to continue a menu of information categories will be presented.(7) More submenus will be presented for user to narrow down his choice. (9) After reaching to the last subcategory, user will receive a USSD SMS informing him that information will be sent to his phone as an SMS. (10) User will then receive an advertisement with a code that he will have to send to the system via USSD. Sending of this code is a way of making sure that at least the user read the Ad SMS. (12) Lastly the requested information Figure 9: Action Flow UI's whowing end Users Usage of the SYstem (Content on phone is in Swahili because the targeted end users are the Tanzanians) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-13d92d10-928d-4b75-b082-7c623b478bea.jpg) ## 4) Web interface Design Both system administrator and the doctors will access the systems by using a web interface. This way they will be able to add and manage new users and manage new content respectively. Figure 10: Sample web Client page interface for administrators and Medical Experts to access the system. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1201v1-figure-b2c73c2f-f950-47b7-8038-ab1b7504effa.jpg) ## G. Ads Consideration In the context of this paper, we strictly consider advertisements as an information and therefore the concepts of information design also apply to them. It is important for all the advertisements to be categorised so that right ads can be delivered to the right people. Ads can be delivered base on Locality of an individual but also base on the type of content that the user requested. Some ads may be useless to people who cannot afford to pay for what is advertised, Though not each of our subscribers will be poor, it is still important to determine the type of advertisments to be sent to subscribers. ## H. Defining the right source of information Sustainable M-Service must have a reliable source of information. Reliability of information in this case does not mean only availability of such information, but it also implies trusted sources of right information. We do not want to feed our users with false information this could easily lead to misleading and loosing trust of our users. Our M-Health service will rely on Qualified Doctors and other Medical practitioners as the source of content for our M-Health. ## I. Conclusion In this study, we set out to do a case study on how to develop a system which is maintainable and sustainable in a community. By reflecting on the process, and the system being designed we intended to draw conclusions of the important aspects which exists when developing such a system. Our study is based on a M-Health prototype application that was analyzed and designed based on the knowledge of how existing M-Services work from end users perspective. This way we were able to design our M-Health prototype which will later be improved through feedback from end users. We acknowledge the fact that a sustainable IS puts into consideration the growth aspect. It is then meaningless for - a system to be developed to offer a useful service or solution and due to failure of shifting to new technology. This being the case, we recommend that a sustainable IS should not be tightly coupled with technology but rather should run independently of it and be flexible to change and adopt new technologies whenever a change is required, example changing to smartphones and modern technologies that are supported by mobile devices. SMS Based M-Services must therefore be developed strategically ready to be upgraded into smartphone applications, this will guarantee greater chances of continuing provision of the service. We have chosen to adopt the four tier architecture that decouples Data, processing application, Distribution Channels and Client technologies. This way our application can integrate and work well with Mobile devices, Web Clients, Any Data source and can potentially be distributed via internet and GSM networks. As an outcome of this study and analysis, we finally conclude by acknowledging that M-Services have proven to possess a great potential of addressing information challenges that are facing low and mid income countries, therefore they must be kept sustainable to ensure that the intended service is continually offered for the benefit of people. ## RFERENCES - [1] J. Muthee and N. Mhando, "African Media Development Initiative Tanzania.," 2006. - [2] R. Genuchten, W. Haring, D. Kassel, and K. Yakubi, "Mobile phone use in Tanzania," 2012. - [3] A. S. Sife, E. Kiondo, and J. G. Lyimo, "Contribution Of Mobile Phones To Rural Livelihoods And Poverty Reduction Inmorogoro Region, Tanzania," EJISDC, vol. 42, pp. 1-15, 2010. - [4] A. K. Hassan and D. Semkwiju, "The Role of Mobile Phones on Sustainable Livelihood," The Economic and Social Research Foundation (ESRF), 2011. - [5] C. Z. Qiang, S. C. Kuek, A. Dymond, and S. Esselaar, "MobileApplications\_for\_ARD," 2011. - [6] BongoLIVE. (2014, July 8 2014). Targeted SMS Marketing. Available: http://www.bongolive.co.tz/sms\_advertising.php - [7] PushSMS. (2014, July 8 2014). Mobile advertising. Available: http://www.push.co.tz/marketing/advertising/ - [8] MAMA, "healthy pregnancy, healthy baby text messaging service Tanzania," 2013. - [9] J. Reynolds and W. Stinson, "Sustainability analysis, Primary Health Care Management Advancement Programme," 1993. - [10] G. Misund and J. Høiberg, "Sustainable Information Technology for Global Sustainability, Digital Earth," Information Resources for Global Sustainability Symposium, vol. 9, pp. 21.-25, 2003. - [11] Wikipedia. (2008). Short Message Service. Available: http://en.wikipedia.org/wiki/SMS#cite\_note-1 - [12] Wikipeda. (2014, July 8, 2014,). Mobile Avdertisment. Available: http://en.wikipedia.org/wiki/Mobile\_advertising - [13] J. Sanganagouda. (2013). USSD: a communication technology to potentially oust SMS dependency. - [14] M. Facemire, J. McCarthy, and T. Schadler. (2013). Mobile Needs A Four-Tier Engagement Platform. Available: http://blogs.forrester.com/print/ted\_schadler/13-11-20-mobile\_needs\_a\_four\_tier\_engagement\_platform - [15] A. Dennis, B. H. Wixom, and R. M., "Systems analysis and design," 5 ed: John Wiley &amp; Sons, Inc., 2012, p. 104. - [16] J. S. Valacich, J. F. George, and J. A. Hoffer, Essentials of Systems Analysis and Design, 5 ed. New York: Pearson, 2012. - [17] M. J. Albers and M. B. Mazur, Content and Complexity: Information Design in Technical Communication: Taylor &amp; Francis, 2014. ## AUTHORS PROFILES TImothy Wikedzi, is a Master's student at the Nelson Mandela African Institution of Science and Technology. He is pursuing a master's degree in Communication Science and Technology. He currently lives and study in Tanzania Dan K. McIntyre, is an Adjunct Professor at University of Iringa in Tanzania. He is a an expert in Computer Science particularly Software Engineering. He currently lives in United States of America. Ramadhani S. Sinde is an Assistant lecture at Nelson Mandela African Institution of Science and Technology. He is an expert in Telecommunication.
null
[ "Timothy Y. Wikedzi", "Ramadhani S. Sinde", "Dan K. McIntyre" ]
2014-08-06T07:53:01+00:00
2014-08-06T07:53:01+00:00
[ "cs.CY", "cs.SE" ]
System Analysis and Design for integrated sponsored SMS/USSD Based M-Services (A case study of Maternal Health M-Service in Tanzania)
Mobile phones have proven to be the best way of providing reliable access to information to people in low and mid income countries where other forms of communication perform poorly. As a result of the wide spread of mobile phones, there has been an increase in number of Mobile Application (M-Services) which are being used as a tool for disseminating different type information to people. M-Services of this nature are established to address informational challenges that are faced by people especially low income people. Because of this then, these projects must be sustained so that people can enjoy the benefits of it. Contrary to this, reports show that most of these M-Services are facing the challenge of cost of operating them, which in a direct way affects the sustainability of these services. In this paper therefore we present an analysis and later design of a noncommercial M-Service, which integrates advertising functionality as a tool for subsidizing the cost of operating M-Services. To achieve this we have employed some concepts of Information System Analysis and Design (ISAD) as the guiding principle towards achieving our design. A prototype of M-Health is used for the study.
1408.1202v1
## Linearization of partial quasi-orderings in the Solovay model revisited. ∗ Vladimir Kanovei † Vassily Lyubetsky ‡ August 7, 2014 ## Abstract We modify arguments in [5] to reprove a linearization theorem on realordinal definable partial quasi-orderings in the Solovay model. ## 1 Introduction The following theorem is the main content of this note. Theorem 1.1 (in the Solovay model) . Let /precedesorcurly be a ROD (real-ordinal definable) partial quasi-ordering on ω ω and ≈ be the associated equivalence relation. Then exactly one of the following two conditions is satisfied : - (I) there is an antichain A ⊆ 2 &lt;ω 1 and a ROD map F : ω ω → A such that - 1) if a, b ∈ ω ω then : x /precedesorcurly y = ⇒ F x ( ) /lessorequalslant lex F y ( ) , and - 2) if a, b ∈ ω ω then : x ≈ y = ⇒ F x ( ) = F y ( ) ; /negationslash /negationslash - (II) there exists a continuous 1 -1 map F : 2 ω → ω ω such that - 3) if a, b ∈ 2 ω then : a ≤ 0 b = ⇒ F a ( ) /precedesorcurly F b ( ) , and - 4) if a, b ∈ 2 ω then : a E 0 b = ⇒ F a ( ) /precedesorcurly F b ( ) . /negationslash /negationslash Here /lessorequalslant lex is the lexicographical order on sets of the form 2 α , α ∈ Ord -it linearly orders any antichain A ⊆ 2 &lt;ω 1 , while ≤ 0 is the partial quasi-ordering on 2 ω defined so that x ≤ 0 y iff x E 0 y and either x = y or x k ( ) &lt; y k ( ), where k is the largest number with x k ( ) = y k ( ). 1 /negationslash The proof of this theorem (Theorem 6) in [5, Section 6]) contains a reference to Theorem 5 on page 91 (top), which is in fact not immediately applicable in ∗ Partial support of RFFI grant 13-01-00006 acknowledged. † IITP RAS and MIIT, Moscow, Russia, [email protected] -contact author ‡ IITP RAS, Moscow, Russia, [email protected] 1 Clearly ≤ 0 orders each E 0 -class similarly to the (positive and negative) integers, except for the class [ ω ×{ } 0 ] E0 ordered as ω and the class [ ω ×{ } 1 ] E0 ordered the inverse of ω . the Solovay model. The goal of this note is to present a direct and self-contained proof of Theorem 1.1. The combinatorial side of the proof follows the proof of a theorem on Borel linearization in [4], in turn based on earlier results in [2, 1]. This will lead us to (I) in a weaker form, with a function F mapping ω ω into 2 ω 2 . To reduce this to an antichain in 2 &lt;ω 1 , a compression lemma (Lemma 5.1 below) is applied, which has no counterpart in the Borel case. Our general notation follows [6, 8], but for the convenience of the reader, we add a review of notation. PQO, partial quasi-order : reflexive ( x ≤ x ) and transitive in the domain; LQO, linear quasi-order : PQO and x ≤ y ∨ y ≤ x in the domain; LO, linear order : LQO and x ≤ y ∧ y ≤ x = ⇒ x = y ; associated equivalence relation : x ≈ y iff x ≤ y ∧ y ≤ x . associated strict ordering : x &lt; y iff x ≤ y ∧ y ≤ x ; /negationslash LR (left-right) order preserving map : any map f : 〈 X ; ≤〉 → 〈 X ′ ; ≤ 〉 ′ such that we have x ≤ y = ⇒ f ( x ) ≤ ′ f ( y ) for all x, y ∈ dom f ; &lt; lex , /lessorequalslant lex : the lexicographical LOs on sets of the form 2 α , α ∈ Ord , resp. strict and non-strict; [ x ] E = { y ∈ dom E : x E y } (the E -class of x ) and [ X ] E = ⋃ x ∈ X [ x ] E -whenever E is an equivalence relation and x ∈ dom E , X ⊆ dom E . Remark 1.2. We shall consider only the case of a parameterfree OD ordering /precedesorcurly in Theorem 1.1; the case of OD( ) with a fixed real parameter p p does not differ much. ## 2 The Solovay model and OD forcing We start with a brief review of the Solovay model. Let Ω be an ordinal. Let ΩSM be the following hypothesis: Ω-SM: Ω = ω 1 , Ω is strongly inaccessible in L , the constructible universe, and the whole universe V is a generic extension of L via the Levy collapse forcing Coll ( ω, &lt; Ω), as in [9]. Assuming Ω-SM, let P be the set of all non-empty OD sets Y ⊆ ω ω . We consider P as a forcing notion (smaller sets are stronger). A set D ⊆ P is: - -dense , iff for every Y ∈ P there exists Z ∈ D Z , ⊆ Y ; - -open dense , iff in addition we have Y ∈ D = ⇒ X ∈ D whenever sets Y ⊆ X belong to P ; A set G ⊆ P is P -generic, iff 1) if X,Y ∈ G then there is a set Z ∈ G , Z ⊆ X ∩ Y , and 2) if D ⊆ P is OD and dense then G ∩ D = ∅ . /negationslash /negationslash Given an OD equivalence relation E on ω , ω a reduced product forcing notion P × E P consists of all sets of the form X × Y, where X, Y ∈ P and [ X ] E ∩ [ Y ] E = ∅ . For instance X × X belongs to P × E P whenever X ∈ P . The notions of sets dense and open dense in P × E P , and ( P × E P )-generic sets are similar to the case of P A condition X × Y in P × E P is saturated iff [ X ] E = [ Y ] E . Lemma 2.1. If X × Y is a condition in P × E P then there is a stronger saturated subcondition X ′ × Y ′ in P × E P . Proof. Let X ′ = X ∩ [ Y ] E and Y ′ = Y ∩ [ X ] E $$\ast$$ Proposition 2.2 (lemmas 14, 16 in [3]) . Assume Ω -SM. If a set G ⊆ P is P -generic then the intersection ⋂ G = { x G [ ] } consists of a single real x G [ ] , called P -generic - its name will be . x . Given an OD equivalence relation E on ω , ω if a set G ⊆ P × E P is ( P × E P ) -generic then the intersection ⋂ G = {〈 x le [ G , x ] ri [ G ] 〉} consists of a single pair of reals x le [ G , x ] ri [ G ] , called an ( P × E P ) -generic pair - their names will be . x le , . x ri ; either of x le [ G , x ] ri [ G ] is separately P -generic. As the set P is definitely uncountable, the existence of P -generic sets does not immediately follow from Ω-SM by a cardinality argument. Yet fortunately P is locally countable , in a sense. Definition 2.3 (assuming Ω-SM) . A set X ∈ OD is OD-1st-countable if the set P OD ( X ) = P ( X ) ∩ OD of all OD subsets of X is at most countable. For instance, assuming Ω-SM, the set X = ω ω ∩ OD = ω ω ∩ L of all OD reals is OD-1st-countable. Indeed P OD ( X ) = P ( X ) ∩ L , and hence P OD ( X ) admits an OD bijection onto the ordinal ω L 2 &lt; ω 1 = Ω. Lemma 2.4 (assuming Ω-SM) . If a set X ∈ OD is OD-1st-countable then the set P OD ( X ) is OD-1st-countableeither. Proof. There is an ordinal λ &lt; ω 1 = Ω and an OD bijection b : λ onto -→ P OD ( X ). Any OD set Y ⊆ λ belongs to L , hence, the OD power set P OD ( λ ) = P ( λ ) ∩ L belongs to L and card ( P OD ( λ )) ≤ λ + &lt; Ω in L . We conclude that P OD ( λ ) is countable. It follows that P OD ( P OD ( X )) is countable, as required. Lemma 2.5 (assuming Ω-SM) . If λ &lt; Ω then the set Coh λ of all elements f ∈ λ ω , Coll ( ω, λ ) -generic over L , is OD-1st-countable. Proof. If Y ⊆ Coh λ is OD and x ∈ Y then 'ˇ x ∈ ˇ ' Y is Coll ( ω, λ )-forced over L . It follows that there is a set S ⊆ λ &lt;ω = Coll ( ω, λ ) , S ∈ L , such that Y = Coh λ ∩ ⋃ t ∈ S N t , where N t = { x ∈ λ &lt;ω : t ⊂ x } , a Baire interval in λ &lt;ω . But the collection of all such sets S belongs to L and has cardinality λ + in L , hence, is countable under Ω-SM. Let P ∗ be the set of all OD-1st-countable sets X ∈ P . We also define $$P ^ { * } \times _ { E } { \mathbf P } ^ { * } = \{ X \times Y \in { \mathbf P } \times _ { E } { \mathbf P } \colon X, Y \in { \mathbf P } ^ { * } \}.$$ Lemma 2.6 (assuming Ω-SM) . The set P ∗ is dense in P , that is, if X ∈ P then there is a condition Y ∈ P ∗ such that Y ⊆ X . If E is an OD equivalence relation on ω ω then the set P ∗ × E P ∗ is dense in P × E P and any X × Y in P ∗ × E P ∗ is OD-1st-countable. /negationslash Proof. Let X ∈ P . Then X = ∅ , hence, there is a real x ∈ X . It follows from Ω-SM that there is an ordinal λ &lt; ω 1 = Ω, an element f ∈ Coh λ , and an OD map H : λ ω → ω ω , such that x = H f ( ). The set P = { f ′ ∈ Coh λ : H f ( ′ ) ∈ X } is then OD and non-empty (contains f ), and hence so is its image Y = { H f ( ′ ) : f ′ ∈ P } ⊆ X (contains x ). Finally, Y ∈ P ∗ by Lemma 2.5. To prove the second claim, let X × Y be a condition in P × E P . By Lemma 2.1 there is a stronger saturated subcondition X ′ × Y ′ ⊆ X × Y . By the first part of the lemma, let X ′′ ⊆ X ′ be a condition in P ∗ , and Y ′′ = Y ′ ∩ [ X ′′ ] E . Similarly, let Y ′′′ ⊆ Y ′′ be a condition in P ∗ , and X ′′′ = X ′′ ∩ [ Y ′′′ ] E . Then X ′′′ × Y ′′′ belongs to P ∗ × E P ∗ . Corollary 2.7 (assuming Ω-SM) . If X ∈ P then there exists a P -generic set G ⊆ P containing X . If X × Y is a condition in P × E P then there exists a ( P × E P ) -generic set G ⊆ P × E P containing X × Y . Proof. By Lemma 2.6, assume that X ∈ P ∗ . Then the set P ⊆ X of stronger conditions contains only countably many OD subsets by Lemma 2.4. ## 3 The OD forcing relation The forcing notion P will play the same role below as the Gandy - Harrington forcing in [2, 7]. There is a notable technical difference: under Ω-SM, OD-generic sets exist in the ground Solovay-model universe by Corollary 2.7. Another notable difference is connected with the forcing relation. Definition 3.1 (assuming Ω-SM) . Let ϕ x ( ) be an Ord -formula , that is, a formula with ordinals as parameters. A condition X ∈ P is said to P -force ϕ ( . x ) iff ϕ x ( ) is true (in the Solovaymodel set universe considered) for any P -generic real x . If E is an OD equivalence relation on ω ω then a condition X × Y in P × E P is said to ( P × E P ) -force ϕ ( . x le , . x ri ) iff ϕ x, y ( ) is true for any ( P × E P )-generic pair 〈 x, y 〉 . Lemma 3.2 (assuming Ω-SM) . Given an Ord -formula ϕ x ( ) and a P -generic real x , if ϕ x ( ) is true (in the Solovay-model set universe considered) then there is a condition X ∈ P containing x , which P -forces ϕ ( . x ) . Let E be an OD equivalence relation on ω . ω Given an Ord -formula ϕ x, y ( ) and a ( P × E P ) -generic pair 〈 x, y 〉 , if ϕ x, y ( ) is true then there is a condition in P × E P containing 〈 x, y 〉 , which ( P × E P ) -forces ϕ ( . x le , . x ri ) . Proof. To prove the first claim, put X = { x ′ ∈ ω ω : ϕ x ( ′ ) } . But this argument does not work for P × E P . To fix the problem, we propose a longer argument which equally works in both cases - but we present it in the case of P which is slightly simpler. Formally the forcing notion P does not belong to L . But it is orderisomorphic to a certain forcing notion P ∈ L , namely, the set P of codes 2 of OD sets in P . The order between the codes in P , which reflects the relation ⊆ between the OD sets themselves, is expressible in L , too. Furthermore dense OD sets in P correspond to dense sets in the coded forcing P in L . Now, let x be P -generic and ϕ x ( ) be true. It is a known property of the Solovay model that there is another Ord -formula ψ x ( ) such that ϕ x ( ) iff L [ x ] | = ψ x ( ). Let g ⊆ P be the set of all codes of conditions X ∈ P such that x ∈ X . Then g is a P -generic set over L by the choice of x , and x is the corresponding generic object. Therefore there is a condition p ∈ g which P -forces ψ ( . x ) over L . Let X ∈ P be the OD set coded by p , so that x ∈ X . To prove that X OD-forces ϕ ( . x ), let x ′ ∈ X be a P -generic real. Let g ′ ⊆ P be the P -generic set of all codes of conditions Y ∈ P such that x ′ ∈ Y . Then p ∈ g ′ , hence ψ x ( ′ ) holds in L [ x ′ ], by the choice of p . Then ϕ x ( ′ ) holds (in the Solovay-model set universe) by the choice of ψ , as required. Corollary 3.3 (assuming Ω-SM) . Given an Ord -formula ϕ x ( ) , if X ∈ P does not P -force ϕ ( . x ) then there is a condition Y ∈ P , Y ⊆ X , which P -forces ¬ ϕ ( . x ) . The same for P × E P . ## 4 Some similar and derived forcing notions Some forcing notions similar to P and P × E P will be considered: /negationslash - 1 . ◦ P ⊆ W = { Q ⊆ W : ∅ = Q ∈ OD , where } W ⊆ ω ω or W ⊆ ω ω × ω ω is an OD set. Especially, in the case when W ⊆ E , where E is an OD equivalence relation on ω ω (that is, 〈 x, y 〉 ∈ W = ⇒ x E y ) - note that [ dom W ] E = [ ran W ] E in this case. - 2 . ◦ ( P × E P ) ⊆ X × Y = { X ′ × Y ′ ∈ P × E P : X ′ ⊆ X ∧ Y ′ ⊆ Y } , where E is an OD equivalence relation on ω ω and X × Y ∈ P × E P . 2 A code of an OD set X is a finite sequence of logical symbols and ordinals which correspond to a definition in the form X = { x ∈ V α : V α | = ϕ x ( ) } . /negationslash /negationslash - 3 . ◦ P ⊆ W × E P ⊆ X = { P × Y : P ∈ P ⊆ W ∧ Y ∈ P ⊆ X ∧ [ Y ] E ∩ [ dom P ] E = ∅ } , where E is an OD equivalence relation on ω , ω W ⊆ E is OD, X ∈ P , and [ X ] E ∩ [ dom W ] E = ∅ (equivalently, [ X ] E ∩ [ ran W ] E = ∅ ). /negationslash /negationslash - 4 . ◦ P ⊆ W × E P ⊆ W = { P × Q P,Q : ∈ P ⊆ W ∧ [ dom P ] E ∩ [ dom Q ] E = ∅ } , where E is an OD equivalence relation on ω ω and W ⊆ E is OD. They have the same basic properties as P - the forcing notions of the form 1 , or as ◦ P × E P - 2 , 3 , 4 . ◦ ◦ ◦ This includes such results and concepts as 2.2, 2.6, 2.7, the associated forcing relation as in 3.1, and 3.2, 3.3, with suitable and rather transparent corrections, of course. ## 5 Compression lemma A set A ⊆ 2 &lt; Ω is an antichain if its elements are pairwise ⊂ -incomparable, that is, no sequence in A properly extends another sequence in A . Clearly any antichain is linearly ordered by /lessorequalslant lex . Let Θ = Ω + ; the cardinal successor of Ω in both L , the ground model, and its Coll ( ω, &lt; Ω)-generic extension postulated by Ω-SM to be the set universe; in the latter, Ω = ω 1 and Θ = ω 2 . Lemma 5.1 (compression lemma) . Assume that Ω ≤ ϑ ≤ Θ and X ⊆ 2 Θ is the image of ω ω via an OD map. Then there is an OD antichain A X ( ) ⊆ 2 &lt; Ω and an OD isomorphism f : 〈 X ; /lessorequalslant lex 〉 - → 〈 onto A X ( ) ; /lessorequalslant lex 〉 . /negationslash Proof. If ϑ = Θ then, as card X ≤ card ω ω = Ω, there is an ordinal ϑ &lt; Θ such that x /harpoonupright ϑ = y /harpoonupright ϑ whenever x = y belong to X - this reduces the case ϑ = Θ to the case Ω ≤ ϑ &lt; Θ. We prove the latter by induction on ϑ . /negationslash The nontrivial step is the step cof λ = Ω, so that let ϑ = ⋃ α&lt; Ω ϑ , α for an increasing OD sequence of ordinals ϑ . α Let I α = [ ϑ , ϑ α α +1 ) . Then, by the induction hypothesis, for any α &lt; Ω the set X α = { S /harpoonupright I α : S ∈ X } ⊆ 2 I α is &lt; lex -order-isomorphic to an antichain A α ⊆ 2 &lt; Ω via an OD isomorphism i α , and the map, which sends α to A α and i α , is OD. It follows that the map, which sends each S ∈ X to the concatenation of all sequences i α ( x /harpoonupright I α ), is an OD &lt; lex -order-isomorphism X onto an antichain in 2 Ω . Therefore, in fact it suffices to prove the lemma in the case ϑ = Ω . Thus let X ⊆ 2 Ω . First of all, note that each sequence S ∈ X is ROD. Lemma 7 in [3] shows that, in this case, we have S ∈ L [ S /harpoonupright η ] for an ordinal η &lt; Ω Let . η S ( ) be the least such an ordinal, and h S ( ) = S /harpoonupright η S , ( ) so that h S ( ) is a countable initial segment of S and S ∈ L [ h S ( )] . Note that h is still OD. Consider the set U = ran h = { h S ( ) : S ∈ X } ⊆ 2 &lt; Ω . We can assume that every sequence u ∈ U has a limit length. Then U = ⋃ γ&lt; Ω U , γ where U γ = U ∩ 2 ωγ ( ωγ is the the γ -th limit ordinal). For u ∈ U , γ let γ u = γ . If u ∈ U then by construction the set X u = { S ∈ X : h S ( ) = u } is OD( ) u and satisfies X u ⊆ L [ u ]. Therefore, it follows from the known properties of the ↦ Solovay model that X u belongs to L [ u ] and is of cardinality ≤ Ω in L [ u ]. Fix an enumeration X u = { S u ( α ) : γ u ≤ α &lt; Ω } for all u ∈ U . We can assume that the map α, u -→ S u ( α ) is OD. If u ∈ U and γ u ≤ α &lt; Ω, then we define a shorter sequence, s u ( α ) ∈ 3 ωα +1 , as follows. - (i) s u ( α )( ξ +1) = S u ( α )( ξ ) for any ξ &lt; ωα . - (ii) s u ( α )( ωα ) = 1. - (iii) Let δ &lt; α. If S u ( α ) /harpoonupright ωδ = S v ( δ ) /harpoonupright ωδ for some v ∈ U (equal to or different from u ) then s u ( α )( ωδ ) = 0 whenever S u ( α ) &lt; lex S v ( δ , ) and s u ( α )( ωδ ) = 2 whenever S v ( δ ) &lt; lex S u ( α . ) - (iv) Otherwise ( i. e. , if there is no such v ), s u ( α )( ωδ ) = 1. To demonstrate that (iii) is consistent, we show that S u ′ ( δ ) /harpoonupright ωδ = S u ′′ ( δ ) /harpoonupright ωδ implies u ′ = u . ′′ Indeed, as by definition u ′ ⊂ S u ′ ( δ ) and u ′′ ⊂ S u ′′ ( δ , ) u ′ and u ′′ must be ⊆ -compatible: let, say, u ′ ⊆ u . ′′ Now, by definition, S u ′′ ( δ ) ∈ L [ u ′′ ] , therefore ∈ L [ S u ′ ( δ )] because u ′′ ⊆ S u ′′ ( δ ) /harpoonupright ωδ = S u ′ ( δ ) /harpoonupright ωδ, finally ∈ L [ u , ′ ] which shows that u ′ = u ′′ as S u ′′ ( δ ) ∈ X u ′′ . ↦ We are going to prove that the map S u ( α ) -→ s u ( α ) is a &lt; lex -order isomorphism, so that S v ( β ) &lt; lex S u ( α ) implies s v ( β ) &lt; lex s u ( α ). /negationslash We first observe that s v ( β ) and s u ( α ) are ⊆ -incomparable. Indeed assume that β &lt; α. If S u ( α ) /harpoonupright ωβ = S v ( β ) /harpoonupright ωβ then clearly s v ( β ) ⊆ s u ( α ) by (i). If S u ( α ) /harpoonupright ωβ = S v ( β ) /harpoonupright ωβ then s u ( α )( ωβ ) = 0 or 2 by (iii) while s v ( β )( ωβ ) = 1 by (ii). Thus all s u ( α ) are mutually ⊆ -incomparable, so that it suffices to show that conversely s v ( β ) &lt; lex s u ( α ) implies S v ( β ) &lt; lex S u ( α ). Let ζ be the least ordinal such that s v ( β )( ζ ) &lt; s u ( α )( ζ ); then s u ( α ) /harpoonupright ζ = s v ( β ) /harpoonupright ζ and ζ ≤ min { ωα,ωβ . } /negationslash /negationslash The case when ζ = ξ +1 is clear: then by definition S u ( α ) /harpoonupright ξ = S v ( β ) /harpoonupright ξ while S v ( β )( ξ ) &lt; S u ( α )( ξ , ) so let us suppose that ζ = ωδ, where δ ≤ min { α, β } . Then obviously S u ( α ) /harpoonupright ωδ = S v ( β ) /harpoonupright ωδ. Assume that one of the ordinals α, β is equal to δ, say, β = δ. Then s v ( β )( ωδ ) = 1 while s u ( α )( ωδ ) is computed by (iii). Now, as s v ( β )( ωδ ) &lt; s u ( α )( ωδ ), we conclude that s u ( α )( ωδ ) = 2 , hence S v ( β ) &lt; lex S u ( α , ) as required. Assume now that δ &lt; min { α, β } . Then easily α and β appear in one and the same class (iii) or (iv) with respect to the δ . However this cannot be (iv) because s v ( β )( ωδ ) = s u ( α )( ωδ . ) Hence we are in (iii), so that, for some (unique) w ∈ U . 0 = S v ( β ) &lt; lex S w ( δ ) &lt; lex S u ( α ) = 2 , as required. This ends the proof of the lemma, except for the fact that the sequences s u ( α ) belong to 3 &lt; Ω , but improvement to 2 &lt; Ω is easy. ## 6 The dichotomy Here we begin the proof of Theorem 1.1. We assume Ω -SM in the course of the proof . And we assume that the ordering /precedesorcurly of the theorem is just OD - then so is the associated equivalence relation ≈ and strict order ≺ . Let F be the set of all OD LR order preserving maps F : 〈 ω ω ; /precedesorcurly 〉 → 〈 A ; /lessorequalslant lex 〉 , where A ⊆ 2 &lt; Ω is an OD antichain. Let $$x \, \mathbf E \, y \, \text{ iff } \, \forall \, F \in \mathcal { F } \left ( F ( x ) = F ( y ) \right )$$ for x, y ∈ ω ω . Then E is an OD equivalence relation, OD-smooth in the sense that it admits an obvious OD reduction to the equality on the set 2 F . Lemma 6.1. If R x,y ( ) is an OD relation and ∀ x, y ( x E y = ⇒ R x,y ( )) then there is a function F ∈ F such that ∀ x, y ( F x ( ) = F y ( ) = ⇒ R x,y ( )) . Proof. Clearly card F = Θ = Ω + and F admits an OD enumeration F = { F ξ : ξ &lt; Θ . } If x ∈ ω ω then let f ( x ) = F 0 ( x ) ∧ F 1 ( x ) ∧ . . . ∧ F ξ ( x ) ∧ . . . -the concatenation of all sequences F ξ ( x ). Then f : 〈 ω ω ; /precedesorcurly 〉 → 〈 X ; /lessorequalslant lex 〉 is an OD LR order preserving map, where X = ran f = { f ( r ) : r ∈ ω ω } ⊆ 2 Θ , and f ( x ) = f ( y ) = ⇒ R x,y ( ) by the construction. By Lemma 5.1 there is an OD isomorphism g : 〈 X ; /lessorequalslant lex 〉 - → 〈 onto A ; /lessorequalslant lex 〉 onto an antichain A ⊆ 2 &lt; Ω . The superposition F x ( ) = g f ( ( x )) proves the lemma. /negationslash Lemma 6.2. Let OD sets ∅ = X,Y ⊆ ω ω satisfy [ X ] E = [ Y ] E . Then the set B = {〈 x, y 〉 ∈ X × Y : x E y ∧ x /precedesorcurly y } is non-empty, dom B = X , ran B = Y . Proof. It suffices to establish B = ∅ . The OD set /negationslash $$X ^ { \prime } = \{ x ^ { \prime } \in \omega ^ { \omega } \colon \exists \, x \in X \left ( x ^ { \prime } \, \text{E} \, x \wedge x ^ { \prime } \prec x \right ) \}$$ is downwards /precedesorcurly -closed in each E -class, and if B = ∅ then X ′ ∩ Y = ∅ . By Lemma 6.1, there is a function F ∈ F such that x ∈ X ′ = ⇒ x ′ ∈ X ′ holds whenever F x ( ) = F x ( ′ ) and x ′ /precedesorcurly x . It follows that the derived function $$G ( x ) = \begin{cases} \ F ( x ) ^ { \wedge } 0 \,, & \text{whenever} \ \ x \in X ^ { \prime } \\ \ F ( x ) ^ { \wedge } 1 \,, & \text{whenever} \ \ x \in \omega ^ { \omega } \smallsetminus X ^ { \prime } \end{cases}$$ /negationslash belongs to F . Thus if x ∈ X ⊆ X ′ and y ∈ Y ⊆ ω ω /integerdivide X ′ then G x ( ) = G y ( ) and hence x E y . In other words, [ X ] E ∩ [ Y ] E = ∅ , a contradiction. /negationslash We'll make use of the OD-forcing notions P and P × E P . Lemma 6.3. Condition ω ω × ω ω ( P × E P ) -forces . x le E . x ri . /negationslash /negationslash Proof. Otherwise, by Lemma 3.2, there is a function F ∈ F and a condition X × Y in P × E P which ( P × E P )-forces F ( . x le )( ξ ) = 0 = 1 = F ( . x ri )( ξ ) for a certain ordinal ξ &lt; Ω. We may assume that X × Y is a saturated condition. Then easily F x ( )( ξ ) = 0 = 1 = F y ( )( ξ ) holds for any pair 〈 x, y 〉 ∈ X × Y , so that we have F x ( ) = F y ( ) and x E y whenever 〈 x, y 〉 ∈ X × Y , which contradicts the choice of X × Y in P × E P . /negationslash /negationslash Case 1: ≈ and E coincide on ω ω , so that x E y ⇐⇒ x ≈ y for x, y ∈ ω ω . By Lemma 6.1 there is a single function F ∈ F such that F x ( ) = F y ( ) implies x ≈ y for all x, y ∈ U ∗ , as required for (I) of Theorem 1.1. Case 2: ≈ is a proper subrelation of E , hence, the OD set $$U _ { 0 } = \left \{ x \in \omega ^ { \omega } \colon \exists \, y \in \omega ^ { \omega } \left ( x \not \approx y \wedge x \, \mathbf E \, y \right ) \right \}$$ /negationslash (the domain of singularity) is non-empty. It follows that U 0 ∈ P and U 0 × U 0 is a condition in P × E P . We'll work towards (II) of Theorem 1.1. ## 7 The domain of singularity Since the set U 0 belongs to P , there is a set U ∗ ∈ P ∗ , U ∗ ⊆ U 0 . Then obviously U ∗ × U ∗ belongs to P ∗ × E P ∗ . Lemma 7.1. Condition U ∗ × U ∗ ( P × E P ) -forces that the reals . x le and . x ri are /precedesorcurly -incomparable. Proof. Suppose to the contrary that, by Corollary 3.3, a subcondition X × Y in P × E P either ( P × E P )-forces . x le ≈ . x ri or ( P × E P )-forces . x le ≺ . x ri . We will get a contradiction in both cases. Note that X,Y ⊆ U ∗ are non-empty OD sets and [ X ] E ∩ [ Y ] E = ∅ . /negationslash Claim 7.2. The set W = {〈 x, x ′ 〉 ∈ X × X x : E x ′ ∧ x ′ ≈ x } is non-empty. /negationslash Proof. Suppose to the contrary that W = ∅ , so E coincides with ≈ on X. As X ⊆ U ∗ , at least one of the OD sets $$Z = \{ z \colon \exists \, x \in X \left ( z \, \mathbf E \, x \wedge z \not \in x \right ) \} \,, \, Z ^ { \prime } = \{ z \colon \exists \, x \in X \left ( z \, \mathbf E \, x \wedge x \not \in z \right ) \}$$ /negationslash /negationslash is non-empty; assume that, say, Z = ∅ . Consider the OD set /negationslash $$U = \left \{ z \colon \exists \, x \in X \left ( z \, \mathbf E \, x \wedge z \prec x \right ) \right \}.$$ /negationslash /negationslash Then X ⊆ U and U ∩ Z = ∅ , U is downwards /precedesorcurly -closed while Z is upwards /precedesorcurly -closed in each E -class, therefore y /precedesorcurly x whenever x ∈ U ∧ y ∈ Z ∧ x E y , and hence we have [ U ] E ∩ [ Z ] E = ∅ be Lemma 6.2. Yet by definition [ X ] E ∩ [ Z ] E = ∅ and X ⊆ U , which is a contradiction. (Claim) /negationslash /negationslash Suppose that condition X × Y ( P × E P )-forces . x le ≈ . x ri . As W = ∅ by Claim 7.2, the forcing P ⊆ W of all non-empty OD sets P ⊆ W adds pairs 〈 x, x ′ 〉 ∈ W of P -generic (separately) reals x, x ′ ∈ X which satisfy x ′ E x and x ′ ≈ x . If P ∈ P ⊆ W then obviously [ dom P ] E = [ ran P ] E . Consider a more complex forcing P = P ⊆ W × E P of all pairs P × Y ′ , where P ∈ P ⊆ W , Y ′ ∈ P , Y ′ ⊆ Y , and [ dom P ] E ∩ [ Y ′ ] E = ∅ . For instance, W × Y ∈ P ⊆ W × E P . Then P adds a pair 〈 . x le , . x ri 〉 ∈ W and another real . x ∈ Y such that both pairs /negationslash /negationslash Now suppose that condition X × Y ( P × E P )-forces x le ≺ x ri . The set 〈 . x le , . x 〉 and 〈 . x ri , . x 〉 belong to X × Y and are ( P × E P )-generic, hence, we have . x le ≈ . x ≈ . x ri by the choice of X × Y . On the other hand, . x le ≈ . x ri since the pair belongs to W , which is a contradiction. . . $$B = \{ \langle x, y \rangle \in X \times Y \colon y \, \mathbf E \, x \wedge y \prec x \}$$ /negationslash is non-empty by Lemma 6.2. Consider the forcing P ⊆ B of all non-empty OD sets P ⊆ B ; if P ∈ P ⊆ B then obviously [ dom P ] E = [ ran P ] E . Consider a more complex forcing P ⊆ B × E P ⊆ B of all products P × Q , where P, Q ∈ P ⊆ B and [ dom P ] E ∩ [ dom Q ] E = ∅ . In particular B × B ∈ P ⊆ B × E P ⊆ B . Let 〈 x, y ; x , y ′ ′ 〉 be a P ⊆ B × E P ⊆ B -generic quadruple in B × B , so that both 〈 x, y 〉 ∈ B and 〈 x , y ′ ′ 〉 ∈ B are P ⊆ B -generic pairs in B , and both y /precedesorcurly x and y ′ /precedesorcurly x ′ hold by the definition of B . On the other hand, an easy argument shows that both criss-cross pairs 〈 x, y ′ 〉 ∈ X × Y and 〈 x , y ′ 〉 ∈ X × Y are P × E P -generic, hence x ≺ y ′ and x ′ ≺ y by the choice of X × Y . Altogether y /precedesorcurly x ≺ y ′ /precedesorcurly x ′ ≺ y , which is a contradiction. ## 8 The splitting construction Our aim is to define, in the universe of Ω-SM, a splitting system of sets which leads to a function F satisfying (II) of Theorem 1.1. Let $$B = \{ \langle x, y \rangle \in U ^ { * } \times U ^ { * } \colon x \, \mathrm E \, y \wedge x \asymp y \} ; \ \ B \neq \varnothing \, \text{ by Lemma $6.2$}.$$ /negationslash The construction will involve three forcing notions: P P , × E P , and P ⊆ B , the collection of all non-empty OD sets P ⊆ B . We also consider the dense (by Lemma 2.6) subforcings P ∗ ⊆ P , P ∗ × E P ∗ ⊆ P × E P (see Section 2), and $$\mathbf P _ { \subseteq B } ^ { * } = \left \{ Q \in \mathbf P _ { \subseteq B } \colon Q \text{ is OD-1st-countable} \right \} \subseteq \mathbf P _ { \subseteq B } \,.$$ Now note the following. - 1. As U ∗ ∈ P ∗ , the set D of all sets open dense in the restricted forcing P ⊆ U ∗ , is countable by Lemma 2.6; hence we can fix an enumeration D = { D n : n ∈ ω } such that D n ⊆ D m whenever m&lt;n . - 2. As U ∗ × U ∗ ∈ P ∗ × E P ∗ , the set D ′ of all sets, open dense in the restricted forcing ( P × E P ) ⊆ U ∗ × U ∗ , is countable as above; fix an enumeration D ′ = { D ′ n : n ∈ ω } s. t. D ′ n ⊆ D ′ m for m&lt;n . - 3. If Q ∈ P ∗ ⊆ B then the set D ( Q ) of all sets open dense in the restricted forcing P ⊆ Q , is countable by Lemma 2.6; hence we can fix an enumeration D ( Q ) = { D n ( Q ) : n ∈ ω } such that D n ( Q ) ⊆ D m ( Q ) whenever m&lt;n . The chosen enumerations are not necessarily OD, of course. /negationslash A pair 〈 u, v 〉 of strings u, v ∈ 2 n is called crucial iff u = 1 k ∧ 0 ∧ w and v = 0 k ∧ 1 ∧ w for some k &lt; n and w ∈ 2 n - -k 1 . Note that each pair of the form 〈 1 k ∧ 0 0 , k ∧ 1 〉 is a minimal crucial pair, and if 〈 u, v 〉 is a crucial pair then so is 〈 u ∧ i, v ∧ i 〉 , but not 〈 u ∧ i, v ∧ j 〉 whenever i = j . The graph of all crucial pairs in 2 n is actually a chain connecting all members of 2 n . We are going to define, in the assumption of Ω -SM , a system of sets X u ∈ P ∗ , where u ∈ 2 &lt;ω , and sets Q uv ∈ P ∗ ⊆ B , 〈 u, v 〉 being a crucial pair in some 2 n , satisfying the following conditions: - (1) X u ∈ P ∗ and Q uv ∈ P ∗ ⊆ B ; - (2) X u ∧ i ⊆ X u ; - (3) Q u ∧ i , v ∧ i ⊆ Q uv ; - (4) if 〈 u, v 〉 is a crucial pair in 2 n then dom Q uv = X u and ran Q uv = X v ; - (5) X u ∈ D n whenever u ∈ 2 n +1 ; /negationslash - (6) if u, v ∈ 2 n +1 and u n ( ) = v n ( ) then X u × X v ∈ D ′ n and X u ∩ X v = ∅ . - (7) if 〈 u, v 〉 = 1 〈 k ∧ 0 ∧ w, 0 k ∧ 1 ∧ w 〉 is a crucial pair in 2 n +1 and k &lt; n (so that w in not the empty string) then Q uv ∈ D n ( Q 1 k ∧ 0 0 , k ∧ 1 ); Remark 8.1. It follows from (4) that [ X u ] E = [ X v ] E for all u, v ∈ 2 n , because Q uv ⊆ B ⊆ E and u, v are connected in 2 n by a chain of crucial pairs. ## Why this implies the existence of a function as in (II) of Theorem 1.1? First of all, if a ∈ 2 ω then the sequence of sets X a n /harpoonupright is P -generic by (5), therefore the intersection ⋂ n ∈ ω X a n /harpoonupright is a singleton by Proposition 2.2. Let F a ( ) ∈ ω ω be its only element. It does not take much effort to prove that F is continuous and 1 -1. /negationslash Consider any a, b ∈ 2 ω satisfying a E 0 b . Then a n ( ) = b n ( ) for infinitely many n, hence the pair 〈 F a , F ( ) ( b ) 〉 is P × E P -generic by (7), thus F a ( ) and F b ( ) are /precedesorcurly -incomparable by Lemma 7.1. /negationslash Consider a, b ∈ 2 ω satisfying a &lt; 0 b . We may assume that a and b are &lt; 0 -neighbours, i. e. , a = 1 k ∧ 0 ∧ w while b = 0 k ∧ 1 ∧ w for some k ∈ ω and w ∈ 2 ω . The sequence of sets Q a n, b n /harpoonupright /harpoonupright , n &gt; k, is P ⊆ B -generic by (6), hence it results in a pair of reals satisfying x /precedesorcurly y. However x = F a ( ) and y = F b ( ) by (4). ## 9 The construction of a splitting system Now the goal is to define, in the assumption of Ω -SM , a system of sets X u and Q uv satisfying (1) - (7) above. Suppose that the construction has been completed up to a level n, and expand it to the next level. From now on s, t will denote strings in 2 n while u, v will denote strings in 2 n +1 . Step 0 . To start with, we set X s ∧ i = X s for all s ∈ 2 n and i = 0 1 , , and Q s ∧ i , t ∧ i = Q st whenever i = 0 1 , and 〈 s, t 〉 is a crucial pair in 2 n . For the initial crucial pair 〈 1 n ∧ 0 0 , n ∧ 1 〉 at this level, let Q 1 n ∧ 0 , 0 n ∧ 1 = X 1 n × X 0 n . The newly defined sets satisfy (1) - (4) except for the requirement Q uv ∈ P ∗ ⊆ B in (1) for the pair 〈 u, v 〉 = 1 〈 n ∧ 0 0 , n ∧ 1 . 〉 This ends the definition of 'initial values' of X u and Q uv at the ( n +1)-th level. The plan is to gradually shrink the sets in order to fulfill (5) - (7). Step 1 . We take care of item (5). Consider an arbitrary u 0 = s 0 ∧ i ∈ 2 n +1 . As D n is dense there is a set X ′ ∈ D , X n ′ ⊆ X u 0 . The intention is to take X ′ as the 'new' X u 0 . But this change has to be propagated through the chain of crucial pairs, in order to preserve (4). Thus put X ′ u 0 = X ′ . Suppose that u ∈ 2 n +1 , a set X ′ u ⊆ X u has been defined, and 〈 u, v 〉 is a crucial pair, v ∈ 2 n +1 being not yet encountered. Define Q ′ uv = ( X ′ u × ω ω ) ∩ Q uv and X ′ v = ran Q ′ uv . Clearly (4) holds for the 'new' sets X , X , Q ′ u ′ v ′ uv . Similarly if 〈 v, u 〉 is a crucial pair, then define Q ′ vu = ( ω ω × X ′ u ) ∩ Q vu and X ′ v = dom Q ′ uv . Note that still Q ′ 1 n ∧ 0 , 0 n ∧ 1 = X ′ 1 n × X ′ 0 n . The construction describes how the original change from X u 0 to X ′ u 0 spreads through the chain of crucial pairs in 2 n +1 , resulting in a system of new sets, X ′ u and Q ′ uv , which satisfy (5) for the particular u 0 ∈ 2 n +1 . We iterate this construction consecutively for all u 0 ∈ 2 n +1 , getting finally a system of sets satisfying (5) (fully) and (4), which we denote by X u and Q uv from now on. /negationslash Step 2 . We take care of item (6). Consider a pair of u 0 and v 0 in 2 n +1 , such that u 0 ( n ) = 0 and v 0 ( n ) = 1. By the density of D ′ n , there is a set X ′ u 0 × X ′ v 0 ∈ D ′ n included in X u 0 × X v 0 . We may assume that X ′ u 0 ∩ X ′ v 0 = ∅ . (Indeed it easily follows from Claim 7.2 that there exist reals x 0 ∈ X u 0 and y 0 ∈ X v 0 satisfying x 0 E y 0 but x 0 = y , 0 say x 0 ( k ) = 0 while y 0 ( k ) = 1. Define $$X = \left \{ x \in X _ { 0 } \, \colon x ( k ) = 0 \wedge \exists \, y \in Y _ { 0 } \left ( y ( k ) = 1 \wedge x \, \mathbf E \, y \right ) \right \},$$ and Y correspondingly; then [ X ] E = [ Y ] E and X ∩ Y = ∅ .) Spread the change from X u 0 to X ′ u 0 and from X v 0 to X ′ v 0 through the chain of crucial pairs in 2 n +1 , by the method of Step 1, until the wave of spreading from u 0 meets the wave of spreading from u 0 at the crucial pair 〈 1 n ∧ 0 0 , n ∧ 1 . 〉 This leads to a system of sets X ′ u and Q ′ uv which satisfy (7) for the particular pair 〈 u , v 0 0 〉 and still satisfy (6) possibly except for the crucial pair 〈 1 n ∧ 0 0 , n ∧ 1 〉 (for which basically the set Q ′ 1 n ∧ 0 , 0 n ∧ 1 is not yet defined for this step). By construction the previous steps leave Q 1 n ∧ 0 , 0 n ∧ 1 in the form X 1 n ∧ 0 × X 0 n ∧ 1 , where X 1 n ∧ 0 and X 0 n ∧ 1 are the 'versions' at the end of Step 1). We now have the new sets, X ′ 1 n ∧ 0 and X ′ 0 n ∧ 1 , included in resp. X 1 n ∧ 0 and X 0 n ∧ 1 and satisfying [ X ′ 0 n ∧ 0 ] E = [ X ′ 0 n ∧ 1 ] E . (Indeed [ X ′ u 0 ] E = [ X ′ v 0 ] E held at the beginning of the change.) Now we put Q ′ 1 n ∧ 0 , 0 n ∧ 1 = ( X ′ 1 n ∧ 0 × X ′ 0 n ∧ 1 ) ∩ B . Then Q ′ 1 n ∧ 0 , 0 n ∧ 1 ∈ P ⊆ B , and we have dom Q ′ 1 n ∧ 0 , 0 n ∧ 1 = X ′ 1 n ∧ 0 , ran Q ′ 1 n ∧ 0 , 0 n ∧ 1 = X ′ 0 n ∧ 1 by Remark 8.1 and Lemma 6.2. This ends the consideration of the pair 〈 u , v 0 0 〉 . Applying this construction consecutively for all pairs of u 0 and v 0 with u 0 ( n ) = 0, v 0 ( n ) = 1 (including the pair 〈 1 n ∧ 0 0 , n ∧ 1 ) we finally get a system 〉 of sets satisfying (1) - (6), except for the requirement Q uv ∈ P ∗ ⊆ B in (1) for the pair 〈 u, v 〉 = 1 〈 n ∧ 0 0 , n ∧ 1 , 〉 - and these sets will be denoted still by X u and Q uv from now on. Step 3 . Now we take care of (7). Consider a crucial pair in 2 n +1 , $$\langle u _ { 0 }, v _ { 0 } \rangle = \langle 1 ^ { k \wedge } 0 ^ { \wedge } w, 0 ^ { k \wedge } 1 ^ { \wedge } w \rangle \in 2 ^ { n + 1 }.$$ /negationslash If k &lt; n then 〈 u , v 0 0 〉 = 〈 1 k ∧ 0 0 , k ∧ 1 , 〉 the set Q 1 k ∧ 0 0 , k ∧ 1 ∈ P ∗ ⊆ B is defined at a previous level, and Q u ,v 0 0 ⊆ Q 1 k ∧ 0 0 , k ∧ 1 . By the density, there exists a set Q ′ u ,v 0 0 ∈ D n ( Q 1 k ∧ 0 0 , k ∧ 1 ), Q ′ u ,v 0 0 ⊆ Q u ,v 0 0 . If k = n then 〈 u , v 0 0 〉 = 〈 1 n ∧ 0 0 , n ∧ 1 , and by Lemma 2.6 there is a set 〉 Q ′ u ,v 0 0 ∈ P ∗ ⊆ B , Q ′ u ,v 0 0 ⊆ Q u ,v 0 0 . In both cases define X ′ u 0 = dom Q ′ u ,v 0 0 and X ′ v 0 = ran Q ′ u ,v 0 0 and spread this change through the chain of crucial pairs in 2 n +1 , exactly as above. Note that [ X ′ u 0 ] E = [ X ′ v 0 ] E as sets in P ⊆ B are included in E . This keeps [ X ′ u ] E = [ X ′ v ] E for all u, v ∈ 2 n +1 through the spreading. Executing this step for all crucial pairs in 2 n +1 , we finally accomplish the construction of a system of sets satisfying (1) through (7). $$\Box \left ( \text{Theorem 1.1} \right )$$ ## References - [1] L. A. Harrington, A. S. Kechris, and A. Louveau. A Glimm-Effros dichotomy for Borel equivalence relations. J. Amer. Math. Soc. , 3(4):903-928, 1990. - [2] L. A. Harrington, D. Marker, and S. Shelah. Borel orderings. Trans. Am. Math. Soc. , 310(1):293-302, 1988. - [3] Vladimir Kanovei. An Ulm-type classification theorem for equivalence relations in Solovay model. J. Symb. Log. , 62(4):1333-1351, 1997. - [4] Vladimir Kanovei. When a partial Borel order is linearizable. Fund. Math. , 155(3):301-309, 1998. - [5] Vladimir Kanovei. Linearization of definable order relations. Ann. Pure Appl. Logic , 102(1-2):69-100, 2000. - [6] Vladimir Kanovei. Borel equivalence relations. Structure and classification. Providence, RI: American Mathematical Society (AMS), 2008. - [7] Vladimir Kanovei. Bounding and decomposing thin analytic partial orderings. ArXiv e-prints , July 2014, no 1407.0929. - [8] Vladimir Kanovei, Martin Sabok, and Jindˇ rich Zapletal. Canonical Ramsey theory on Polish spaces. Cambridge: Cambridge University Press, 2013. - [9] R.M. Solovay. A model of set-theory in which every set of reals is Lebesgue measurable. Ann. Math. (2) , 92:1-56, 1970.
10.4064/fm977-10-2015
[ "Vladimir Kanovei", "Vassily Lyubetsky" ]
2014-08-06T08:02:28+00:00
2014-08-06T08:02:28+00:00
[ "math.LO", "03E15, 03E45" ]
Linearization of partial quasi-orderings in the Solovay model revisited
We modify arguments in Vladimir Kanovei, Linearization of definable order relations, APAL, 102(1-2):69--100, 2000, to reprove a linearization theorem on real-ordinal definable partial quasi-orderings in the Solovay model.
1408.1204v1
## Harmonic mode locking in a high-Q whispering gallery mode ## microcavity Takumi Kato, Tomoya Kobatake, Ryo Suzuki, Zhelun Chen, and Takasumi Tanabe Department of Electronics and Electrical Engineering, Faculty of Science and Technology, Keio University 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, 223-8522, Japan Tel/Fax: +81-45-566-1730/1529 [email protected] ## Abstract: A numerical and experimental study of the generation of harmonic mode locking in a silica toroid microcavity is presented. We use a generalized mean-field Lugiato-Lefever equation and solve it with the split-step Fourier method. We found that stable harmonic mode locking regime can be accessed when we reduce the input power after strong pumping even when we do not carefully adjust the wavelength detuning. This is due to the bistable nature of the nonlinear cavity system. The experiment agrees well with the numerical analysis, where we obtain low-noise Kerr comb spectrum at low longitudinal mode spacing by gradually reducing the pumping input after strong pumping. This finding clarifies the procedure for generating harmonic mode locking in such highQ microcavity systems. High quality factor ( Q ) microcavities have been investigated intensively, because their high Q and small mode volume allow various applications that require a strong interaction between light and matter [1-4]. One of the attractive applications of a highQ whispering galley mode (WGM) optical microcavity is frequency comb generation [5,6]. The comb based on a microcavity is called a Kerr comb and its fundamental mechanism was recently revealed [7,8]. A method for mode locking in a microcavity system has been reported both theoretically [9] and experimentally [10-12]. On the other hand, comb formation has been analyzed with modal expansion and a split-step Fourier method [13,14]. These simulations help us to comprehend the transient behavior of the comb formation starting from perturbations; for example we will be able to understand the required input power, optimal input detuning and coupling between a waveguide and a cavity. In this study, we numerically and experimentally show the generation of harmonic mode locking in a microcavity. In particular, we analyze the generation of harmonic mode locking with a split-step Fourier method, and reveal the procedure required to obtain mode locking with a designed free spectral range (FSR) mode spacing (i.e. 1, 2, and multi-FSRs). Harmonic mode locking is often studied with a fiber laser to obtain high repetition rate pulses [15]. Complex configurations such as the adjustment of the delay lines and spectral filtering are required for a fiber laser. Furthermore, there is a limitation as regards achieving a high repetition rate, because active mode locking requires a fast electro-optic modulator. In contrast, the study of passive harmonic mode locking in a microcavity has just begun [16,17]. Even though the underlying physics of harmonic mode locking is the same for both a microcavity and a fiber oscillator, the FSR mode spacing 𝑓 R is large and it can satisfy 𝑓 R &gt; 𝑔FWM in a microcavity, where 𝑔FWM is the gain bandwidth of the four wave mixing. This characteristic makes the microcavity system unique, because the relationship is usually the opposite for a fiber oscillator. Therefore it is needed to conduct a detailed study to understand the mechanism on how a harmonic mode locking is generated in a microcavity. Here we focus on the multi-FSR comb generation, which will allow us to obtain a simple on-chip optical pulse train source with an ultra-high repetition rate. To analyze the evolution of the Kerr comb, we use a generalized mean-field Lugiato-Lefever equation (LLE) and solve it with a split-step Fourier method [14,18]. ## The model is described as, $$t _ { R } \frac { \partial E } { \partial r } = \left [ - \frac { \alpha } { 2 } - \frac { \kappa } { 2 } - i \delta _ { 0 } + i L \sum _ { k \geq 2 } \frac { \beta _ { k } } { k! } \left ( \frac { i \partial } { \partial t } \right ) ^ { k } + i \gamma L | E | ^ { 2 } \right ] E + \sqrt { \kappa } S$$ where, 𝑡 R , 𝛼 , 𝜅 , 𝛿0 , 𝐿 𝛽 , , 𝛾 , and 𝑆 are the round-trip time, intrinsic cavity loss, coupling loss, detuning of the input wavelength, cavity length, dispersion of the cavity, nonlinear coefficient, and the input driving power, respectively. Our fabricated device is a silica toroid microcavity with a radius of 42 μm, and whose cavity length corresponds to the FSR spacing of 800 GHz. A microscope image and the cross-sectional mode profile are shown in the inset of Fig. 1(a). In a microcavity analysis, the exact dispersion 𝛽 is required; so we calculated the material dispersion with the Sellmeier equation and the geometrical dispersion of the resonator with the finite element method (COMSOL Multiphysics). The dispersion for the fabricated structure is shown in Fig. 1(a), and this data is used for the rest of the numerical analysis. We would like to emphasize that our analysis can also be applied to other type of cavities, such as CaF2 and MgF2 WGM cavities, and silicon nitride microrings, by recalculating 𝛽 and use different nonlinear parameters. First, we show our typical calculation result of the mode locking in a silica toroid microcavity at a wavelength of 1.55 μm. The nonlinear refractive index of silica is 𝑛2 = 2.2 × 10 -20 m 2 W -1 and the effective mode volume of the cavity is 𝐴eff = 2.04 μm 2 . Hence 𝛾 = 1.13 × 10 -8 W -1 μm -1 . The intrinsic Q of the cavity is 𝑄int = 1.0 × 10 7 , and this value is close to the value we used in the experiment that we describe later. We set the coupling Q at 𝑄couple = 1.0 × 10 7 and set the detuning of the input laser light at 𝛿0 = 1.0 × 10 -4 rad . When we fed the cavity with a 20-mW continuous wave (CW) laser light, we obtained a Kerr comb with a spacing of 1-FSR. Figure 1(b) and (c) show the spectral and temporal profiles of the output. It is clear that the generated spectrum is not smooth. Indeed the temporal waveform does not indicate stable pulse generation, and we can see that the cavity is in an unstable state, even though the spectrum appeared as 1-FSR mode-locking. It is because the input is beyond the point of Hopf bifurcation [19-21]. The stable cavity solitons will only exist when the power in the cavity satisfies the condition that suppresses the soliton collision [22]. So we changed the input power to 𝑃in = 10 mW ; then we obtain four stable pulses in a microcavity. The spectrum is now smooth and shows that the cavity is generating 4-FSR harmonic mode locking. The important fact is that we only modified the input power to switch from unstable 1 to stable 4 FSR Kerr comb generation. Next we studied the way in which the input power affects the dynamics in the cavity in more detail. For this series of studies we used a cavity with intrinsic and coupling Q s of 𝑄int = 1.0 × 10 7 and 𝑄couple = 5.0 × 10 7 , respectively. The minor diameter of the cavity is 3 μm, and the dispersion is given in Fig. 1(a). It is known that the intra-cavity power exhibits bistable behavior with respect to the input power when the cavity consists of material with a nonlinear refractive index [23]. When we set the normalized detuning at larger than √3 times the half width half maximum (HWHM), we can obtain two clear stable states, where Δ = 2δ0/(𝛼 + 𝜅) . Indeed the theoretical curve reveals a nonlinear threshold as shown by the solid line in Fig. 2(a), when the detuning is Δ = √3 . This curve is drawn by using an equation where it models the ideal Kerr dispersive bistability in a Fabry-Pérot cavity The dots in Fig. 2(a) show the intra-cavity power as a function of the input power when Δ = √3 , calculated from LLE with the split-step Fourier method. The power in the cavity is recorded after the cavity reaches a steady state. It should be noted that the theoretical curve shown in Fig. 2(a) and (b) covers only single wavelength. This means that nonlinear loss is added when the input power goes into a nonlinear regime. Therefore, the calculated intracavity power travels a different route from the solid line since effective detuning is changed as a result of four-wave-mixing. When we look close to Fig. 2(a), we found that stable 3-FSR harmonic mode locking is only obtained when reduce the input. When we increase the input, the cavity enters an unstable regime before exhibiting mode locking at a power of 7.5 mW. Figure 2(a) shows that we can obtain 2-FSR mode-locking when we increase the input power if we carefully select the detuning. However, this is not an easy experiment, because the effective detuning easily changes due to the nonlinear loss and thermo-optic effect. Indeed when the detuning is larger than Δ = 2 , we cannot obtain 2-FSR mode locking when we increase the power. The result is shown in Fig. 2(b), which is the case when the normalized detuning is Δ = 2.2 . But even in this case, it is possible to access 2-FSR mode-locking when we reduce the power after strong pumping; the comb formation changes from 3-FSR to 2-FSR when the input power is reduced. Our result is consistent to that of a previous report [10], where they show that the repetition rate will change when the input detuning is scanned. However, Figs. 2(a) and (b) provide clear understanding on the relationship between the stable mode-locking and the bistable nature of the cavity system. They show that stable state sits at the bistable regime and usually this regime is accessed only by reducing the input power. In other word, our result shows that the history on how we change the coupled power to the cavity is the key to access to a stable harmonic mode locking. The time and spectrum profile for CW, 3-FSR and 2-FSR mode locking are shown in Fig. 2(c)-(h). Finally, we describe our experimental demonstration of harmonic mode locking in a silica toroid microcavity. Our setup consists of a tunable laser (Santec TSL-510) that is amplified by an erbium doped fiber amplifier (Pritel LNHP-30) to an output power of up to 1 W. Then the light power is decreased by precisely controlling it with a variable optical attenuator. A polarization controller is placed in front of the cavity. The output from a microcavity is measured with a power meter (Agilent 81634B) and an optical spectrum analyzer (Advantest Q8383). A fast diode (New Focus 1411) and an electrical spectrum analyzer (Advantest R3265A) are used to detect the radio frequency of the amplitude noise of the output Kerr comb. A tapered fiber with diameter of ~1 μm is used as an evanescent coupler to excite the whispering gallery modes in a silica toroid cavity. Figure 3 shows the measured radio frequency (RF) spectrum at different input powers from a silica toroid microcavity with a Q of 𝑄load = 2.0 × 10 6 . The silica toroid microcavity was fabricated using the method developed by Armani et al. [3]. We successfully observed Kerr comb generation at different FSRs by changing the input power. When the input power was large, the output was 1-FSR as shown in the inset of Fig. 3(a). However, the RF spectrum is noisy, which indicates that the comb is unstable. On the other hand, when we pump the cavity with lower power, it exhibits stable harmonic mode locking with lower noise in the RF spectrum as shown in Fig. 3(b). To investigate the above phenomenon in more detail, we performed an experiment where we precisely controlled the input power. We used a cavity with a 𝑄load = 2.0 × 10 6 that had an FSR of about 800 GHz for this experiment. The coupling is set slightly in an over-coupled regime to compensate for the nonlinear loss. The cavity will be in a critical-coupling condition in a nonlinear regime. The result in Fig. 2 shows that the harmonic mode locking at a lower repetition rate is achieved by reducing the input power. So we started from 200 mW and then reduced the input power. Figure 4(a) is the output spectrum when the input is 200 mW. Although the frequency spacing is 1-FSR, the cavity is in an unstable regime as shown in Fig. 1(b). When we slowly decrease the input power to 183 mW, we obtain a spectrum as shown in Fig. 4(b), where the frequency spacing is now 3-FSR. When we further decrease the input to 58 mW, we obtain 2-FSR spacing as shown in Fig. 4(c). This agrees well with the simulation, where clean harmonic mode locking was obtained simply by reducing the input power. In summary, we investigated harmonic mode locking in an optical microcavity and found through simulation and experiment that stable mode locking was achieved easily when we reduced the input power after strong pumping. The relationship between the harmonic mode locking and the bistable nature in a microcavity system has been studied, which will help us to reveal the optimal design and procedure with which to obtain an ultra-high repetition rate optical pulse train source for practical applications. - 1. K. Vahala, Nature 424, 839 (2003). - 2. T. Tanabe, M. Notomi, E. Kuramochi, A. Shinya, and H. Taniyama, Nat. Photon. 1, 49 (2007). - 3. D. Armani, T. Kippenberg, S. Spillane, and K. Vahala, Nature 421, 925 (2003). - 4. I. Grudinn, A. Matsko, A. Savchenkov, D. Strekalov, V. Ilchenko, and L. Maleki, Opt. Comm. 265, 33 (2006). - 5. P. Del'Haye, A. Schliesser, O. Arcizet, T. Wilken, R. Holzwarth, and T. Kippenberg, Nature 450, 1214 (2007). - 6. T. Kippenberg, R. Holzwarth, and S. Diddams, Science 332, 555 (2012). - 7. F. Ferdous, H. Miao, D. Leaird, K. Srinivasan, J. Wang, L. Chen, L. Varghese, and A. Weiner, Nat. Photon. 5, 770 (2011). - 8. T. Herr, K. Hartinger, J. Riemensberger, C. Wang, E. Gavartin, R. Holzwarth, M. Gorodetsky, and T. Kippenberg, Nat. Photon. 6, 480 (2012). - 9. A. Matsko, A. Savchenkov, W. Liang, V. Ilchenko, D. Seidel, and L. Maleki, Opt. Lett. 36, 2845 (2011). - 10. T. Herr, V. Brasch, J. Jost, C. Wang, N. Kondratiev, M. Gorodetsky, and T. Kippenberg, Nat. Photon. 8, 145 (2014). - 11. K. Saha, Y. Okawachi, B. Shim, J. Levy, R. Salem, A. Johnson, M. Foster, M. Lamont, M. Lipson, and A. Gaeta, Opt. Express 21, 97 (2013). - 12. M. Pecciani, A. Pasquazi, Y. Park, B. Little, S. Chu, D. Moss, and R. Morandotti, Nat. Comm. 3, 765 (2012). - 13. Y. Chembo, D. Strekalov, and N. Yu, Phys. Rev. Lett. 104, 103902 (2010). - 14. S. Coen, H. Randle, T. Sylvestre, and M. Erkintalo, Opt. Lett. 38, 37 (2013). - 15. J. Kutz, and B. Sandstede, Opt. Express 16, 636 (2008). - 16. V. Torres-Company, D. Castelló-Lurbe, and E. Silvestre, Opt. Express 22, 4678 (2014). ## 17. A. Coillet and Y . Chembo, Opt. Lett. 39, 1529 (2014). - 18. L. Lugiato, and R. Lefever, Phys. Rev. Lett. 58, 2209 (1987). - 19. F. Leo, L. Gelens, P. Emplit, M. Haelterman, and S. Coen, Opt. Express 21, 886 (2013). - 20. A. Matsko, A. Savchenkov, and L. Maleki, Opt. Lett. 37, 4856 (2012). - 21. A. Coillet, and Y . Chembo, Chaos 24, 013113 (2014). - 22. S. Wabnitz, Opt. Lett. 18, 601 (1993). - 23. H. Gibbs, S. McCall, and T. Venkatesan, Phys. Rev. Lett. 36, 1135 (1976). Fig. 1: (a) Material and geometric dispersions of a silica toroid microcavity used for the numerical analysis. The inset illustrates the setup with a microscope image of the silica toroid microcavity coupled with a tapered fiber. A cross-sectional mode profile is also shown. (b) The output spectrum when the input power is 20 mW. (c) Temporal waveform in the cavity for (b). The round trip time of the cavity is 1.3 ps. (d) As (b) but with 10 mW pumping. (e) Temporal waveform in the cavity for (d). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1204v1-figure-eb111e9c-a236-4bae-95c3-910b223608c1.jpg) Fig. 2: (a) Calculated average intracavity power as a function of the input power when the normalized detuning of the input laser is Δ = √3 from the resonance of the cavity. (b) As (a) but with detuning Δ = 2.2 (c-h) Spectra and temporal waveforms at different input powers. The corresponding points are shown in (b). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1204v1-figure-67aedd63-6e6b-4422-a030-53d29ac24698.jpg) Fig. 3: (a) The experimental RF spectrum of the output from a silica toroid microcavity with strong pumping. The inset is the optical spectrum. (b) As (a) but with weaker optical pumping. The RF frequency is at the noise floor of the measurement apparatus. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1204v1-figure-ca3287d0-2537-4aa2-92be-29d60b0124a4.jpg) Fig. 4: The output optical spectrum when the cavity is pumped at 200 mW (a), 183.2 mW (b), and 58.6 mW (c). The pumping power was gradually reduced during the experiment. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1204v1-figure-fe0352fe-dfe4-43d5-9fb3-e696aecb4c78.jpg)
null
[ "Takumi Kato", "Tomoya Kobatake", "Ryo Suzuki", "Zhelun Chen", "Takasumi Tanabe" ]
2014-08-06T08:15:31+00:00
2014-08-06T08:15:31+00:00
[ "physics.optics" ]
Harmonic mode locking in a high-Q whispering gallery mode microcavity
A numerical and experimental study of the generation of harmonic mode locking in a silica toroid microcavity is presented. We use a generalized mean-field Lugiato-Lefever equation and solve it with the split-step Fourier method. We found that stable harmonic mode locking regime can be accessed when we reduce the input power after strong pumping even when we do not carefully adjust the wavelength detuning. This is due to the bistable nature of the nonlinear cavity system. The experiment agrees well with the numerical analysis, where we obtain low-noise Kerr comb spectrum at low longitudinal mode spacing by gradually reducing the pumping input after strong pumping. This finding clarifies the procedure for generating harmonic mode locking in such high-Q microcavity systems.
1408.1205v1
## Discovery of relatively hydrogen-poor giants in the Galactic globular cluster ω Centauri B. P. Hema and Gajendra Pandey Indian Institute of Astrophysics, Bengaluru, Karnataka 560034, India; [email protected], [email protected] ## ABSTRACT In this letter, the results of our low-resolution spectroscopic survey for identifying the hydrogen-deficient (H-deficient) stars in the red giant sample of the globular cluster ω Cen are reported. Spectral analyses were carried out on the basis of the strengths of (0,0) MgH band and the Mg b triplet. In our sample, four giants were identified with weak/absent MgH bands in their observed spectra not as expected for their well determined stellar parameters. The Mg abundances for the program stars were determined from subordinate lines of the MgH band to the blue of the Mg b triplet, using the spectral synthesis technique. The derived Mg abundances for the program stars were as expected for the red giants of ω Cen (Norris &amp; Da Costa 1995), except for the four identified candidates. Determined Mg abundances of these four candidates are much lower than that expected for the red giants of ω Cen, and are unacceptable based on the strengths of Mg b triplet in their observed spectra. Hence, the plausible reason for the weak/absent MgH bands in the observed spectra of these stars is a relatively lower abundance of hydrogen in their atmospheres. These giants may belong to the group of helium enriched red giants of ω Cen. Subject headings: globular clusters: general - globular clusters: individual (Omega Centauri) - stars: chemically peculiar ## 1. Introduction A rare group of hydrogen-deficient (H-deficient) and carbon rich supergiants in the order of their increasing effective temperatures are: hydrogen deficient carbon (HdC) stars, RCoronae Borealis (RCB) stars, and extreme helium (EHe) stars (Hema et al. 2012; Pandey et al. 2006). The origin and evolution of these peculiar stars is not yet clear. The distances are not accurately known to any of the Galactic H-deficient stars. The position of a star on the HR-diagram gives us an idea about its evolution and possibly its origin. To place these stars on the HR-diagram, a survey was conducted to identify new H-deficient stars in the most massive and brightest Galactic globular cluster (GGC): ω Centauri. The observed large spread in the metallicity ([Fe/H]) and the other abundance anomalies of ω Cen cluster stars (Johnson &amp; Pilachowski 2010; Marino et al. 2011; Simpson &amp; Cottrell 2013; Sollima et al. 2005) including the existence of multiple stellar populations, the Henormal and He-enhanced or H-poor (Piotto et al. 2005), makes it an enigmatic GGC. The recent spectroscopic studies of Dupree &amp; Avrett (2013) and Marino et al. (2014) confirms the existence of the He-enhanced stars in ω Cen and NGC 2808, respectively. Hence, our survey also explores the H-deficiency or the He-enhancement in the sample giants of ω Cen. ## 2. Sample Selection and Observations Our survey is based on the Str¨mgren photometric studies of red giant stars in o ω Cen by Calamida et al. (2009). Stars in the GGCs are expected to be homogeneous in metallicities ([Fe/H]). But, there are a few GGCs which show a large dispersion in their metallicities. One of them being the GGC ω Cen, with a range in [Fe/H]: -2.5 &lt; [Fe/H] &lt; +0.5 (Johnson &amp; Pilachowski (2010) and references therein). This spread in metallicity, which is not as expected for a GGC, is possibly an indication for the presence of H-deficient stars in ω Cen. Note that, the metal lines are much stronger in the spectra of the H-deficient supergiants: the RCB and the HdC stars, when compared with those observed in the spectra of F- and G-type normal supergiants. This is attributed to the lower opacity in the atmosphere due to H-deficiency. Hence, H-deficient stars appear metal richer than they actually are (Sumangala Rao et al. 2011). Our suspicion was that the metal rich giants of ω Cen may possibly be H-poor. In this survey the priority was given to the giants in the metallicity range: -0.5 &gt; [Fe/H] &lt; +0.5. However, for the sake of the completeness, irrespective of the metallicity, all the giants, brighter than 14.5 y magnitude (Str¨mgren visual) were consido ered for our study. The other criterion that was applied to increase the probability of finding H-deficient stars in our sample was the (J-H) 0 and (H-K) 0 colours (IR-colours). The RCB and the HdC stars' distribution in the IR-colours plot is distinct from the normal dwarfs and giants (Feast 1997; Tisserand et al. 2009). The J, H and K magnitudes and the corresponding Galactic dust reddening for extinction correction were adopted from Two Micron All Sky Survey (2MASS) Catalogue 1 and NASA/IPAC Infrared Science Archive , respectively. 2 Note that, for observations, all the metal rich giants (+0.5 &gt; [Fe/H] &gt; -0.5) were selected, irrespective of their IR-colours - these were 130 in number. However, the metal poor giants ( -0.5 &gt; [Fe/H] &gt; -2.5) selected for observations, with IR-colours like RCB stars, were 40 in number. Though, the sample of red giants from the core of ω Cen were not included in our sample (to avoid confusion in identifying the giants in the crowded field), many of the giants in the periphery were double or multiple objects. The giants which were not clearly resolved were excluded from our observations. Hence, only 34 of the 130 metal rich stars and about 11 of the 40 metal poor stars were selected for observations. Low-resolution optical spectra for these selected red giants of ω Cen were obtained from the 2.34 m Vainu Bappu Telescope (VBT), Vainu Bappu Observatory, equipped with the Optomechanics Research spectrograph (Prabhu et al. 1998) and 1K × 1K CCD camera. These spectra obtained using 600 l/mm grating centered at H α line at 6563 ˚ A were at a resolution of about 8 ˚ . The data reduction and analyses were carried out using the IRAF A 3 (Image Reduction and Analysis Facility) software package. ## 3. Analyses and Results The observed spectra of all the program stars were continuum normalized. The region of the spectrum (having maximum flux) free of absorption lines is treated as the continuum point, and a smooth curve passing through these points is defined as the continuum. The well defined continuum in the spectrum of the sample metal poor giant, and in the spectrum of Arcturus with very high signal-to-noise (S/N), is used as a reference for judging the continuum for the sample metal rich stars in the wavelength window 4900 - 5400A including the Mgb triplet and the complete MgH band. The analyses of the observed spectra of the program stars were carried out based on the strengths of the blue degraded (0,0) MgH band extending from 5330 to 4950 ˚ , with the band head at 5211 ˚ , and the Mg A A b lines at 5167.32 ˚ , A 5172.68 ˚ and 5183.60 ˚ . Based on the strengths of these features in the observed spectra, A A three groups were identified in our sample: (i) the metal rich giants with strong Mg b lines and the MgH band, (ii) the metal poor giants with weak Mg b lines and no MgH band, 1 http://irsa.ipac.caltech.edu/Missions/2mass.html 2 http://irsa.ipac.caltech.edu/applications/DUST/ 3 The IRAF software is distributed by the National Optical Astronomy Observatories under contract with the National Science Foundation. and (iii) the metal rich giants with strong Mg b lines, but no MgH band. To analyze the strengths of the MgH band in the observed spectra of sample stars, the stars with similar (J-K) 0 colours (∆(J-K) 0 ∼± 0.1), and y magnitudes (∆y ∼± 0.5), that represent the effective temperatures ( T eff ) and surface gravities (log g ), respectively, were selected. The spectra of stars having similar y magnitude and (J-K) 0 colours were then compared with each other. From this comparison four stars were identified having weaker or absent MgH band than expected. Two stars: 178243 and 73170 are from the first group showing the strong Mg b lines, but weaker MgH band than expected for their stellar parameters (see Figure 1). The other two stars: 262788 and 193804 are from the third group showing relatively strong Mg b lines, but absent MgH band not as expected for their stellar parameters 4 (see Figure 2). Judging by the observed strengths of the Mg b lines and the presence/absence of the MgH band expected for their stellar parameters, the spectra of the giants 178243, 73170, 262788 and 193804, suggest that their atmospheres are relatively H-poor. Hence, to confirm this suggestion, the observed strengths of the MgH bands were further analyzed by synthesizing the spectra of these four stars along with the program stars of first and third groups for their adopted stellar parameters. Note that, observed spectra with S/N &gt; 60 were analyzed. A literature survey was done for the high-resolution spectroscopic studies of the program stars. Many of the program stars were found in Johnson &amp; Pilachowski (2010). The stellar parameters: T eff , log g , and [Fe/H] for the program stars were adopted from Johnson &amp; Pilachowski (2010). The T eff for the program stars were also determined using their photometric colours: (J-H) , 0 (J-K) , 0 and (b-y) 0 using Alonso et al. (1999)'s empirical calibrations. The log g for the program stars were determined using the standard relation. These determined T eff and log g values are within an agreement of ± 200K, and ± 0.2 (cgs units), and with a mean difference of ± 100K, and ± 0.1 (cgs units), respectively, with those determined by Johnson &amp; Pilachowski (2010). Hence, we have used our estimates of the T eff and log g for the stars not available in Johnson &amp; Pilachowski (2010). The spectra were synthesized from 5100 ˚ -5200 ˚ that includes the Mg A A b lines and the (0, 0) MgH band. For synthesizing the spectra, the atomic lines were compiled from the standard atomic data sources, and all the atomic lines identified by Hinkle et al. (2000) were included. The (0, 0) MgH molecular line list was adopted from Hinkle et al. (2013). Synthetic spectra were generated by combining the LTE spectral line analysis/synthesis code MOOG (Sneden 1973), and the ATLAS9 (Kurucz 1998) plane parallel, line-blanketed LTE model atmospheres with convective overshoot. Spectrum of Arcturus, a typical red giant, was synthesized to validate the adopted gf -values of the atomic/molecular lines. Using the spectrum synthesis 4 Note that, the contribution of the MgH lines to the Mg b line strength makes the latter appear stronger in the first group than the third group. code, synth in MOOG, the high resolution optical spectrum of Arcturus was synthesized for the stellar parameters and the abundances given by Ram´ ırez &amp; Allende Prieto (2011). The synthesized spectrum was convolved with a Gaussian profile with a width that represents the broadening due to macroturbulence and the instrumental profile. Minimal adjustments were made to the abundances of the atomic lines to obtain the best fit to the observed high-resolution optical spectrum of Arcturus (Hinkle et al. 2000). The changes in the log gf values were not more than 0.1 dex. A reasonably good fit was obtained to the MgH molecular lines for the adopted isotopic values from McWilliam &amp; Lambert (1988). The synthesized high-resolution spectrum was further convolved by a Gaussian profile of width of about 8 ˚ , A to match with the observed low-resolution Arcturus spectrum obtained from VBT. A good match of the synthesized Arcturus spectrum to the observed, both high- and low-resolution spectra, validates the adopted line list for the adopted stellar parameters of Arcturus. These checks on published analysis of Arcturus are taken as evidence that our implementation of the code MOOG, the LTE models, and the adopted line list were successful for the syntheses of the red giants' spectra. Hence, the spectra of the program stars were synthesized following the above procedure. The synthesized spectra, for their adopted stellar parameters and abundances, were then compared with the observed spectra. From the studies of Norris &amp; Da Costa (1995), the average [Mg/Fe] 5 for the red giants of ω Cen is about +0.4 dex over a metallicity range: [Fe/H]= -2.0 to -0.7. Hence, in our synthesis the [Mg/Fe]=+0.4 dex was adopted initially. Since the subordinate lines of MgH band at about 5167 ˚ are blended with the saturated Mg A b lines, the subordinate lines of MgH band in the wavelength window 5120-5160 ˚ were given more weight in our synthesis. A The best fit of the spectrum synthesized for the adopted stellar parameters to the observed was obtained by adjusting the Mg abundance, and therefore estimating the Mg abundance 6 for the program star (see Figure 3 for example). Note that, the derived Mg abundances are in excellent agreement with the two common stars in Norris &amp; Da Costa (1995) study. The adopted stellar parameters and the derived Mg abundances for the program stars (first and third group) are given in Table 1. For all the normal first and third group stars, our derived Mg abundances (mean [Mg/Fe] ∼ +0.3 dex) for their adopted stellar parameters, were as expected for the red giants of ω Cen, with just four exceptions. These four exceptions are: 73170 and 178243 from the first group, and 262788 and 193804 from the third group, that were identified with the weak/absent MgH bands in their observed spectra. The Mg abundances derived for these four giants are much lower than that expected (for details see Hema 2014). 5 [Mg/Fe] = (Mg/Fe) ∗ -(Mg/Fe) /circledot 6 log /epsilon1 ( Mg ) = log ( Mg/H ) + 12.0, this convention is used throughout this study. ## 4. Discussion The two stars of the first group with strong Mg b lines and weaker MgH band are 73170 and 178243. The MgH subordinate lines to the redward and the blueward of the Mg b lines are clearly weaker in the observed spectra of 73170 and 178243, when compared with the spectra of stars with similar stellar parameters. Figure 1 shows the spectra of the first group stars in the order of their increasing T eff from bottom to top. This comparison clearly shows that the weaker MgH bands in the spectra of these two stars are not as expected for their adopted stellar parameters. If the weaker MgH band is not due to the star's T eff , log g and [Fe/H], then the reason would be a lower Mg abundance. These stars are metal rich with strong Mg b lines in their observed spectra, indicating that the Mg abundance in their atmospheres is as expected for their metallicities. Hence, neither the stellar parameters nor the Mg abundances are possible reasons for the weaker MgH bands observed in these stars. The only possible reason for the weaker MgH bands would be a lower hydrogen abundance in their atmospheres. For the derived Mg abundance of 73170, the [Mg/Fe] is about -0.2. This value is about +0.6 dex lower than the average, and about +0.4 dex lower than the minimum [Mg/Fe], derived for the ω Cen giants at the star's metallicity of [Fe/H]= -0.65, as reported by Norris &amp; Da Costa (1995). For the derived Mg abundance of 178243, the [Mg/Fe] is about -0.4. This value is about +0.8 dex lower than the average, and about +0.6 dex lower than the minimum [Mg/Fe] derived for the red giants of ω Cen at the star's metallicity of [Fe/H]= -0.8 (Norris &amp; Da Costa 1995). Nevertheless, going by the observed strengths of the Mg b lines and the expected Mg abundance for the stars' metallicity, our derived low Mg abundances for these two stars are unacceptable. Hence, we emphasize that the weaker MgH bands in these two stars are not due to the stellar parameters and the Mg abundances, but most probably due to a relatively lower abundance of hydrogen in their atmospheres. The typical errors of about ± 100K on T eff , determined from the high-resolution spectroscopic studies of red giants, were adopted. Note that, the syntheses of the MgH bands for the upper limit of the T eff for these two stars do not provide a fit to the observed spectrum (see Figure 3 for example). The two third group stars, 262788 and 193804, have similar stellar parameters, as given by Johnson &amp; Pilachowski (2010), and their observed spectra are near identical. Hence, treated as twins. The observed spectra of these twins were compared with the observed spectra of the first and second group stars of similar stellar parameters (see Figure 2). The first group star, 251701, with similar stellar parameters as the twins of the third group, shows clear presence of the MgH band in the observed spectrum, but note the absence of MgH bands in the observed spectra of the twins. The reason for the absence of the MgH band in the spectra of these twins would be a lower Mg abundance in their atmospheres. However, the Mg b lines in their observed spectra are strong, as expected for their metallicity and similar in strengths to those of the first group stars. The Mg b lines in the spectra of these twins are fairly stronger than in the spectra of the second group stars. Note that, the second group stars are metal poor and have weak or no Mg b lines (see Figure 2). The strong Mg b lines in the spectra of 262788 and 193804, clearly indicate that the Mg abundance is normal or as expected for the stars' metallicity. Hence, the stellar parameters and the lower Mg abundances are ruled out as the possible reasons for the absence of the MgH band in the spectra of these twins. The only possibility could be a relatively lower abundance of hydrogen in their atmospheres. For 262788, the derived [Mg/Fe] ≤-0.6. This is about +1.0 dex lower than the average, or about +0.8 dex lower than the minimum [Mg/Fe] value as derived by Norris &amp; Da Costa (1995), for the star's metallicity, [Fe/H]= -1.0. For 193804, the derived [Mg/Fe] &lt; -0.1. This value is about +0.5 dex lower than the average, or about +0.3 dex lower than the minimum [Mg/Fe] value, as reported by Norris &amp; Da Costa (1995), for the star's metallicity [Fe/H]= -1.0. Hence, going by the observed strengths of the Mg b lines, and the expected Mg abundance for the stars' metallicity, our derived low Mg abundances for these two stars are unacceptable. This rules out the effects of stellar parameters and the lower Mg abundances, as the possible reasons for the absence of the MgH band in the observed spectra of 262788 and 193804. The only possible reason for the absence of MgH band could be a relatively lower abundance of hydrogen in their atmospheres. The spectra synthesized for the upper limit of the T eff for the stars 262788 and 193804, do not provide a fit to the observed spectra. The observed weak/absent MgH band in 214247, of the third group, is as expected for the star's warmer T eff and metallicity. The derived Mg abundance is as expected for the star's metallicity. The weak/absent MgH band in the observed spectra of these four giants inspite of the presence of strong Mg b lines, may not be due to the uncertainty in adopted stellar parameters or a lower Mg abundance. The only plausible reason is a relatively lower abundance of hydrogen in their atmospheres. Hence, we report the discovery of four giants with relatively lower abundance of hydrogen in their atmospheres. These giants may belong to the group of helium enriched ( n He / n H ∼ 0.16 - 0.2) 7 red giants of ω Cen similar to those found in the studies of Dupree et al. (2011), for which the blue main sequence (bMS) stars may be the progenitors. The double main sequence, the red main sequence (rMS) and the blue main sequence (bMS), in ω Cen was discovered by Anderson (1997). The bMS stars differ from 7 Note that, the expected n He / n H ratio and Y for the normal giants are about 0.1 and 0.25, respectively. rMS stars by their helium enrichment upto Y ∼ 0.38 with the range: 0.35 &lt; Y &lt; 0.4 (Norris 2004; Piotto et al. 2005). The Y value for rMS stars is about 0.25 (Norris 2004; Piotto et al. 2005). From the studies of Marino et al. (2011), unlike the observed Na-O anticorrelation for the metal poor giants of ω Cen, the number of giants with Na-enrichment increases with the metallicity ([Fe/H]). Note that 11 stars of our metal rich sample, including the reported 4 H-poor or He-rich stars, show Na-enhancement (Marino et al. 2011; Johnson &amp; Pilachowski 2010). One star, however, is Na-normal. For rest of our metal rich sample of 5 stars, Na abundances are not available. However, no obvious trend is seen in Al-Mg, as the Al-Mg anticorrelation provides further clue for the He-enrichment in the metal rich giants (D'Ercole et al. 2010). None of these newly discovered H-deficient giants show the carbon features as seen in the spectra of RCB stars and they do not exhibit RCB IR-colours. Hence, these are not the H-deficient stars of RCB type. To ascertain a range in H-deficiency or the helium enrichment of these newly discovered giants and the analyzed metal rich sample, it is essential to study these stars by obtaining their high resolution spectra. ## 5. Acknowledgements We thank the referee for a nice and constructive report. We thank David L. Lambert, H. C. Bhatt, and B. E. Reddy for fruitful discussions. We thank the VBO staff for their assistance. ## REFERENCES Alonso, A., Arribas, S., &amp; Mart´ ınez-Roger, C. 1999, A&amp;AS, 140, 261 Anderson, A. J. 1997, PhD thesis, UNIVERSITY OF CALIFORNIA, BERKELEY Calamida, A., et al. 2009, ApJ, 706, 1277 D'Ercole, A., D'Antona, F., Ventura, P., Vesperini, E., &amp; McMillan, S. L. W. 2010, MNRAS, 407, 854 Dupree, A. K., &amp; Avrett, E. H. 2013, ApJ, 773, L28 Dupree, A. K., Strader, J., &amp; Smith, G. H. 2011, ApJ, 728, 155 Feast, M. W. 1997, MNRAS, 285, 339 Hema, B. P., Pandey, G., &amp; Lambert, D. L. 2012, ApJ, 747, 102 Hema,B.P., 2014, PhD thesis, submitted to PONDICHERRY UNIVERSITY, PONDICHERRY, INDIA. Hinkle, K., Wallace, L., Valenti, J., &amp; Harmer, D. 2000, Visible and Near Infrared Atlas of the Arcturus Spectrum 3727-9300 A Hinkle, K. H., Wallace, L., Ram, R. S., Bernath, P. F., Sneden, C., &amp; Lucatello, S. 2013, ApJS, 207, 26 Johnson, C. I., &amp; Pilachowski, C. A. 2010, ApJ, 722, 1373 Kurucz, R. L. 1998, http://kurucz.harvard.edu/ Marino, A. F., et al. 2011, ApJ, 731, 64 -. 2014, MNRAS, 437, 1609 McWilliam, A., &amp; Lambert, D. L. 1988, MNRAS, 230, 573 Norris, J. E. 2004, ApJ, 612, L25 Norris, J. E., &amp; Da Costa, G. S. 1995, ApJ, 447, 680 Pandey, G., Lambert, D. L., Jeffery, C. S., &amp; Rao, N. K. 2006, ApJ, 638, 454 Piotto, G., et al. 2005, ApJ, 621, 777 Prabhu, T. P., Anupama, G. C., &amp; Surendiranath, R. 1998, Bulletin of the Astronomical Society of India, 26, 383 Ram´ ırez, I., &amp; Allende Prieto, C. 2011, ApJ, 743, 135 Simpson, J. D., &amp; Cottrell, P. L. 2013, MNRAS, 433, 1892 Sneden, C. A. 1973, PhD thesis, THE UNIVERSITY OF TEXAS AT AUSTIN. Sollima, A., Ferraro, F. R., Pancino, E., &amp; Bellazzini, M. 2005, MNRAS, 357, 265 Sumangala Rao, S., Pandey, G., Lambert, D. L., &amp; Giridhar, S. 2011, ApJ, 737, L7 Tisserand, P., et al. 2009, A&amp;A, 501, 985 This preprint was prepared with the AAS LT E X macros v5.2. A Fig. 1.- The spectra of the first group stars are shown in the order of their increasing T eff from bottom to top. The strong Mg b lines and the (0, 0) MgH band are marked. The vertical lines marked to the red of the Mg b lines are Fe i lines. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1205v1-figure-47133689-f0a1-4b4b-9a58-c36e4dbfc9c5.jpg) Table 1. The stellar parameters, metallicities and derived Mg abundances for the program stars in the order of their increasing T eff . | Star | Star(LEID) a | S/N | T eff | log g | [Fe/H] | Group | log /epsilon1 (Mg) | [Mg/Fe] | |----------|----------------|-------|---------|---------|----------|---------|----------------------|-----------| | 269309 | · · · | 70 | 3760 | 0.9 | - 0.5 | First | 7.1 ± 0.2 | 0.0 | | 73170 | 39048 | 100 | 3965 | 0.95 | - 0.65 | First | 6.75 ± 0.2 | - 0.2 | | 178243 | 60073 | 100 | 3985 | 0.75 | - 0.8 | First | 6.4 ± 0.2 | - 0.4 | | 172980 b | 61067 | 110 | 4035 | 0.85 | - 1.0 | First | 7.0 ± 0.2 | +0.4 | | 178691 | 50193 | 110 | 4075 | 0.65 | - 1.2 | First | 6.6 ± 0.2 | +0.2 | | 271054 | · · · | 100 | 4100 | 1.4 | - 1.0 | First | 6.7 ± 0.2 | +0.1 | | 40867 | 54022 | 110 | 4135 | 1.15 | - 0.5 | First | 7.2 ± 0.2 | +0.1 | | 250000 | · · · | 90 | 4175 | 1.4 | - 1.0 | First | 6.9 ± 0.2 | +0.3 | | 131105 | 51074 | 80 | 4180 | 1.05 | - 1.1 | First | 6.9 ± 0.2 | +0.4 | | 166240 b | 55101 | 60 | 4240 | 1.15 | - 1.0 | First | 6.8 ± 0.2 | +0.2 | | 262788 | 34225 | 110 | 4265 | 1.3 | - 1.0 | Third | < 6.0 ± 0.2 | < - 0.6 | | 251701 | 32169 | 100 | 4285 | 1.35 | - 1.0 | First | 7.0 ± 0.2 | +0.4 | | 193804 | 35201 | 80 | 4335 | 1.1 | - 1.0 | Third | < 6.5 ± 0.2 | < - 0.1 | | 5001638 | · · · | 150 | 4400 | 1.6 | - 0.5 | First | 7.3 ± 0.2 | +0.2 | | 270931 | · · · | 100 | 4420 | 1.25 | - 0.5 | First | 7.2 ± 0.2 | +0.1 | | 214247 | 37275 | 60 | 4430 | 1.45 | - 1.5 | Third | 6.5 ± 0.2 | +0.4 | | 216815 | 43475 | 80 | 4500 | 1.85 | - 0.6 | First | 7.3 ± 0.2 | +0.3 | | 14943 | 53012 | 100 | 4605 | 1.35 | - 1.8 | Second | < 6.7 ± 0.2 | < +0.9 | a Stellar parameters are from Johnson &amp; Pilachowski (2010) for the giants with LEID identification. b Common stars with the sample of Norris &amp; Da Costa (1995). Norris &amp; Da Costa report [Mg/Fe] of 0.53 and 0.27 for 172980 and 166240, respectively. Fig. 2.- Figure shows the observed spectrum of 262788 and 193804, the third group starstwins, compared with the observed spectrum of 251701, the first group star. Also shown is the observed spectrum of 14943, the second group star. The key features such as Mg b lines, the MgH band and the Fe i lines are marked. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1205v1-figure-13452959-6d0d-4388-9aa3-910e66edc1fc.jpg) Fig. 3.- Figure shows the observed spectrum and the synthesized spectra for the star 178243. The spectrum synthesized for the best fit value of [Mg/Fe], and for different T eff for the expected [Mg/Fe] of ω Cen red giants are shown in the figure - see key on the figure. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1205v1-figure-bc78ccaa-6186-46c7-a348-53f1df4fe0b9.jpg)
10.1088/2041-8205/792/2/L28
[ "B. P. Hema", "Gajendra Pandey" ]
2014-08-06T08:19:16+00:00
2014-08-06T08:19:16+00:00
[ "astro-ph.SR" ]
Discovery of relatively hydrogen-poor giants in the Galactic globular cluster Omega Centauri
In this letter, the results of our low-resolution spectroscopic survey for identifying the hydrogen-deficient (H-deficient) stars in the red giant sample of the globular cluster Omega Cen are reported. Spectral analyses were carried out on the basis of the strengths of (0,0) MgH band and the Mg b triplet. In our sample, four giants were identified with weak/absent MgH bands in their observed spectra not as expected for their well determined stellar parameters. The Mg abundances for the program stars were determined from subordinate lines of the MgH band to the blue of the Mg b triplet, using the spectral synthesis technique. The derived Mg abundances for the program stars were as expected for the red giants of Omega Cen (Norris & Da Costa 1995), except for the four identified candidates. Determined Mg abundances of these four candidates are much lower than that expected for the red giants of Omega Cen, and are unacceptable based on the strengths of Mg b triplet in their observed spectra. Hence, the plausible reason for the weak/absent MgH bands in the observed spectra of these stars is a relatively lower abundance of hydrogen in their atmospheres. These giants may belong to the group of helium enriched red giants of Omega Cen.
1408.1206v2
## Self-Organized Criticality in a Spherically Closed Cellular Automaton: Modeling Soft Gamma Repeater Bursts Driven by Magnetic Reconnection Ken'ichiro Nakazato 1, ∗ 1 Department of Physics, Faculty of Science &amp; Technology, Tokyo University of Science, 2641 Yamazaki, Noda, Chiba 278-8510, Japan (Dated: August 19, 2014) A new cellular automaton (CA) model is presented for the self-organized criticality (SOC) in recurrent bursts of soft gamma repeaters (SGRs), which are interpreted as avalanches of reconnection in the magnetosphere of neutron stars. The nodes of a regular dodecahedron and a truncated icosahedron are adopted as spherically closed grids enclosing a neutron star. It is found that the system enters the SOC state if there are sites where the expectation value of the added perturbation is nonzero. The energy distributions of SOC avalanches in CA simulations are described by a power law with a cutoff, which is consistent with the observations of SGR 1806 -20 and SGR 1900+14. The power-law index is not universal and depends on the amplitude of the perturbation. This result shows that the SOC of SGRs can be illustrated not only by the crust quake model but also by the magnetic reconnection model. PACS numbers: 05.65.+b, 97.60.Jd, 45.90.+t, 94.30.cp ## I. INTRODUCTION Self-organized criticality (SOC) proposed by Bak et al. [1, 2] has revealed a wide range of mechanisms of complex behavior occurring in nature. According to the concept of SOC, a nonequilibrium open system evolves spontaneously into a critical state characterized by a power-law distribution of its physical quantity. One of the most well-known examples of an SOC system is earthquakes, where the energy supplied by plate motion is dissipated in the crust. The SOC of earthquakes has been illustrated with a sand-pile model, and an empirical power-law relation between the size and frequency of seismic events has been demonstrated [3, 4]; a related model for the propagation of brittle failure had previously shown power laws [5]. SOC models fit some properties of astrophysical phenomena, for instance, solar flares [6]. The recurrent bursts of soft gamma repeaters (SGRs) have event energy distributions well fitted with a power law [7-9]. It is currently thought that SGRs are associated with ultrastrongly magnetized neutron stars ( /greaterorsimilar 10 14 G). They generally undergo the recurrent emission of soft gamma rays with a short duration ( ∼ 0.1 s). These bursts have been suggested to be due to neutron star crust fractures driven by the stress of an evolving magnetic field [10], which are called starquakes. Recently, however, Link [11] pointed out that it is difficult to reproduce the typically observed rise time of emission ( /lessorsimilar 10 ms) if the energy is deposited deep in the crust or deeper. The trapped seismic energy takes seconds to minutes to reach the stellar surface and cause burst emissions. As a corollary, the energy should be released not inside the star but in the magnetosphere [12-16]. ∗ Electronic address: [email protected] In this paper, we present a new cellular automaton (CA) model that mimics SOC avalanches in SGRs. We first follow the CA model for solar flares proposed by Lu and Hamilton [17], which is expressed as discretized magnetohydrodynamic (MHD) equations [18]. In their model, solar flares are interpreted as avalanches of many small magnetic reconnections. Similarly, we assume that the energy is released in the magnetosphere of neutron stars through MHD instabilities, such as the tearing mode [13, 15]. In the original model by Lu and Hamilton, a three-dimensional Cartesian coordinate grid of points is used. However, a neutron star may be sufficiently small for the size of avalanches to be comparable to the system size. In fact, since the energy of a magnetic field B in a region of volume L 3 is E = B L / π 2 3 8 , the length scale is L ∼ 10 4 cm with B = 10 14 G and E = 10 38 erg, which is the lowest observed energy of short bursts [7, 8]. Note that the radius of neutron stars is typically R ∼ 10 6 cm. Furthermore, the perturbation rule in the original model by Lu and Hamilton tends to increase the magnetic field in a certain direction. Here, we use the grid with a closed geometry and modify the perturbation rule to satisfy a conservation law for magnetic field. ## II. CELLULAR AUTOMATON MODEL ## A. grids We introduce 'spherically' closed grids for our CA model to map the surface enclosing a neutron star. To avoid grid anisotropy, we require that (i) the shape is nearly spherical, (ii) all edges are of equal length and (iii) all nodes are equivalent. Among the polyhedra which satisfy these conditions, the nodes of a regular dodecahedron and a truncated icosahedron (the shapes of a soccer ball and fullerene C 60 ), which have n = 20 and 60 nodes, respectively, are adopted as our grids. They have a closed geometry, in marked contrast to CA models for SOC systems studied so far. Incidentally, Schein and Gayed [19] recently presented the techniques to construct the icosahedral Goldberg polyhedra, which are nearly spherical grids with more nodes. These grids satisfy the conditions (i) and (ii) but not (iii). Although the investigation with more nodes is interesting, we defer it to future work. In the CA simulation, we assign the values of B i for the i -th site of the grids, which represent the deviation of the radial component of the magnetic field from the unperturbed background configuration. We set B i = 0 for all sites at the initial time. ## B. step 1: perturbations As the first step of our CA rule, we add perturbations to B i . This perturbation corresponds to the bending of magnetic field line outward because B i is the deviation of the radial component. Since the CA simulation is carried out on the closed surface ( S ) in our model, the magnetic field should be perturbed to satisfy a conservation law, $$\oint _ { S } B \cdot n \, \mathrm d S = 0 \ \implies \ \sum _ { i = 1 } ^ { n } B _ { i } = 0, \quad ( 1 ) \ \frac { \ m a p _ { i } } { \text{start} } \\ \text{resp} \cdot$$ where n is the outward-pointing unit normal vector of the surface S . Therefore, we choose two neighboring sites and add a positive perturbation (+∆ B ) to one and a negative perturbation ( -∆ ) to the other. B The perturbation, ∆ B , is given as $$\Delta B = \langle \Delta B \rangle | \sigma |, \quad \text{ \quad \ \ } ( 2 ) \quad \text{ a } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{\ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text{ } \text$$ where σ is a random number obeying a Gaussian distribution with zero mean and unit variance. The amplitude of the perturbation, 〈 ∆ B 〉 , is a model parameter as discussed later. The sites where the perturbation is added are chosen as follows. In our model, we assume the bending of magnetic field line outward similarly to the rise of the magnetic field line on the surface of the Sun. Then positive and negative perturbations appear at the footpoints of the magnetic field line. For simplicity, we deal with two cases for the unperturbed background configuration, namely, poloidal and toroidal magnetic fields, and randomly choose one of the edges considered to be along the background field lines. The perturbations are added to the sites corresponding to both ends and the polarity of the magnetic field line is reflected in the sign of the perturbations. This procedure is illustrated in Figure 1. The edges along the background field lines are determined as below. At first, for poloidal case, we choose edges connecting nodes with the different latitude. The number of such edges is 20 for a regular dodecahedron with 30 edges and 60 for a truncated icosahedron with 90 edges. Then the polarity is assigned for the end points of each edge reflecting their latitudes. Next, for toroidal case, we choose the edges to construct the circuits. In FIG. 1: Schematic diagrams of poloidal and toroidal magnetic field lines in the magnetosphere of neutron stars and their mapping on a regular dodecahedron ( n = 20) grid. Positive (+∆ B ) and negative ( -∆ ) perturbations are added at the B start point and end point of the edges shown as thick lines, respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1206v2-figure-17043c7a-e28a-47e0-ac12-25602c6afc20.jpg) this process, the edges connecting nodes with the same longitude are not chosen and the number of edges considered is set to be same with the poloidal case. For a regular dodecahedron, circuits with 5 edges, 10 edges and 5 edges are constructed as shown in the bottom right of Figure 1. For a truncated icosahedron, circuits with 5 edges, 15 edges, 20 edges, 15 edges and 5 edges are constructed. ## C. step 2: reconnections The second step of our CA rule is reconnection. We define the magnetic field stress, which is the difference between the local magnetic field and the average of its three nearest neighbors B nn , as $$\mathrm d B _ { i } = B _ { i } - \frac { 1 } { 3 } \sum _ { \mathrm n n } B _ { \mathrm n n }.$$ The site is unstable to reconnection when the absolute value of its magnetic stress exceeds some critical value B c [17, 20], $$| \mathrm d B _ { i } | > B _ { \mathrm c }.$$ This criterion is reasonable because a large magnetic stresses favors magnetic reconnection [20]. If a reconnection instability occurs, the magnetic field stress is canceled as follows: $$B _ { i } \to B _ { i } - \frac { 3 } { 4 } \mathrm d B _ { i }, \quad B _ { \mathrm n n } \to B _ { \mathrm n n } + \frac { 1 } { 4 } \mathrm d B _ { i }, \quad ( 5 )$$ resulting in d B i → 0. If the nearby sites become unstable owing to the reconfiguration expressed by (5), additional reconnection events occur, leading to a large avalanche in some cases. ## D. step 3: event energy When all instabilities in the grid have been relaxed, we return to the first step of adding perturbations. The energy released during the avalanche is defined as $$E = \sum _ { i = 1 } ^ { n } \left | B _ { i } ^ { ( 0 ) } \right | ^ { 2 } - \sum _ { i = 1 } ^ { n } \left | B _ { i } ^ { ( 1 ) } \right | ^ { 2 }, \quad \ ( 6 ) \\ \cdot \text{the supersrints} \, ( 0 ) \text{ and } ( 1 ) \text{ denote the values be}$$ where the superscripts (0) and (1) denote the values before and after the avalanche, respectively. Note the dimensionless quantities in our CA model. The threshold for the reconnection instability is fixed at B c = 4 in this study. Since the cases with same values of 〈 ∆ B /B 〉 c are equivalent, we only investigate the dependence on 〈 ∆ B 〉 . If a reconnection event occurs at a single site i , the released energy is 3 4 | d B i | 2 . Therefore, the minimum released energy in our CA model is E min = 12 for B c = 4. ## III. RESULTS ## A. poloidal versus toroidal Now we move on to the results of our CA simulations. In Figure 2, cumulative energy distributions of avalanches, N &gt;E ( ), are plotted for the case of 〈 ∆ B 〉 = 0 2. . As can be seen, the models with perturbations under poloidal and toroidal fields have considerably different profiles. In the models with poloidal perturbations, large avalanches with the size of the system occur, which is one of the characteristic features of SOC. In contrast, the models with toroidal perturbations do not reach the SOC state. There are very few bursts with energy /greaterorsimilar 3 E min while small bursts occur accidentally. In the toroidal models, the time average of the random perturbations is zero at each site (see Figure 1). This result is consistent with that of Lu and Hamilton [17], where SOC was not found with the random perturbation being symmetric about zero. However, in the poloidal models, the system reaches the critical state while the spatial average of the perturbations is zero. In this case, the time average of each node depends on the latitude. It is positive for one hemisphere but negative for the other hemisphere. This is because, as already stated, the polarity is assigned reflecting the latitude. Here, we investigate the mixed case of poloidal and toroidal fields. In the step 1 of the CA rule, we choose the poloidal perturbation or toroidal perturbation randomly and the probability of poloidal is set to f pl . Thus the purely poloidal and toroidal cases correspond to f pl = 1 FIG. 2: Cumulative burst energy distributions, N &gt;E ( ), for the case of 〈 ∆ B 〉 = 0 2. . Thick and thin lines represent the models with poloidal and toroidal perturbations, respectively. Dashed and solid lines represent the models with the regular dodecahedron ( n = 20) grid and truncated icosahedron ( n = 60) grid, respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1206v2-figure-1f395d28-3fc9-49d2-8541-288aaededcb9.jpg) and f pl = 0, respectively. The dependence of f pl is shown in Figure 3 for the cases of 〈 ∆ B 〉 = 0 2 and the trun-. cated icosahedron model with n = 60 nodes. As already mentioned, in our CA model, bursts with /lessorsimilar 3 E min happen even if the system does not reach the SOC state. Thus the distributions with E /lessorsimilar 3 E min may include a contamination and we pay attention to the events with /greaterorsimilar 3 E min . For the case with f pl = 0 5, where the poloidal . and toroidal fields are regarded as comparable, large avalanches are still observed. On the other hand, for the dominantly toroidal case ( f pl = 0 1), . it is hard to find the SOC feature. ## B. parameter dependence Hereafter, we focus on the purely poloidal models. The cumulative distributions appear to decrease rapidly at high energies owing to finite-size effects. In fact, the cutoff energy of the truncated icosahedron model with n = 60 nodes is higher than that of the regular dodecahedron model with n = 20. A cutoff feature was also found in the observations of SGR 1806 -20 and SGR 1900+14 [9]. While the statistical significance of the observed cutoff is not high, bursts with the highest energy may correspond to avalanches enclosing the central neutron star. On the other hand, the distributions of the truncated icosahedron model and regular dodecahedron model are similar at low energies, where finite-size effects are negligible. We show the dependence on the amplitude of perturba- FIG. 3: Same as Figure 2 but for the models with the truncated icosahedron ( n = 60) grid. Solid, dashed, dot-dashed and dotted lines correspond to the cases with f pl = 1 (purely poloidal), 0.5, 0.1 and 0 (purely toroidal), respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1206v2-figure-d793cbe1-5452-4a66-8240-0bdefa5c6a87.jpg) tion 〈 ∆ B 〉 in Figure 4, where the cumulative distributions are plotted for the models with the truncated icosahedron ( n = 60) grid and poloidal perturbations. We find that the distributions with E /greaterorsimilar 3 E min are well fitted with power laws. The power-law index, γ , of the differential distributions d N ∝ E -γ d E is related to the power-law fit of the cumulative distributions as N &gt;E ( ) ∝ E 1 -γ . According to the observations of SGR 1806 -20 and SGR 1900+14, the energy distributions of bursts have been fitted with γ = 1 43-1.76 [7, 8] and . γ ∼ 1 55 [9]. . In our CA simulation, γ depends on the value of 〈 ∆ B 〉 and it is 1.44, 1.57 and 1.74 for 〈 ∆ B 〉 = 0 1, 0.2 and 0.4, respectively. . Here, Kolmogorov-Smirnov probabilities of the fitting in the range of 3 E min &lt; E &lt; 100 E min are &gt; 0.999, &gt; 0.999 and 0.964 for 〈 ∆ B 〉 = 0 1, 0.2 and 0.4, respectively. . On the other hand, in the range of E &gt; 3 E min , KolmogorovSmirnov probabilities are 0.000 for all models due to the cutoff. From Figure 5, we can see that the power-law index γ increases with the amplitude of perturbation 〈 ∆ B 〉 . The most natural interpretation for this is that, for large 〈 ∆ B 〉 , the perturbation of one site can grow exclusively and the site tends to become unstable before accumulating perturbations of other sites. As a result, the number of large avalanches, i.e. with a large energy, is reduced. The lack of universality of the power-law index is an interesting feature that was also observed in the model of Olami et al. [4]. FIG. 4: Same as Figure 2 but for the models with the truncated icosahedron ( n = 60) grid and poloidal perturbations. Thick dot-dashed, thick solid and thick dashed lines correspond to the cases with 〈 ∆ B 〉 = 0 1, 0.2 and 0.4, respectively. . Thin lines are power laws N &gt;E ( ) ∝ E 1 -γ with γ = 1 44 . (dot-dashed), 1.57 (solid) and 1.74 (dashed). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1206v2-figure-897bd3b2-7225-4d52-9545-2a9694d9a281.jpg) FIG. 5: Power-law index γ as a function of the amplitude of perturbation 〈 ∆ B 〉 for the models with the truncated icosahedron ( n = 60) grid and poloidal perturbations. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1206v2-figure-9b47bffe-c7c5-4e73-8ade-eeca6e3a0b96.jpg) ## IV. CONCLUSION AND DISCUSSION In conclusion, we have shown the SOC behavior of a new CA model with spherically closed grids so as to demonstrate the recurrent bursts of SGRs. We adopted the nodes of a regular dodecahedron and a truncated icosahedron as our CA grids. Perturbations were added to satisfy a conservation law (1) and the sign was determined from the polarity of the unperturbed background magnetic field line. For the configuration of the unperturbed field, both poloidal and toroidal cases were considered. We found that the SOC state is reached only for the poloidal case owing to the existence of sites where the expectation value of the added perturbation is nonzero. The cumulative burst energy distribution has a cutoff at high energies owing to finite-size effects. Similarly, the cutoff found in the observations of SGRs may be attributed to the compactness of the magnetosphere of neutron stars. In addition to the recurrent bursts, giant flares with enormous energy ( ∼ 10 44 -10 47 erg) and long duration ( ∼ 100 s) are occasionally observed from SGRs [21-25]. The energy release in the magnetosphere of neutron stars was proposed early on as an explanation of a giant flare [12]. Taking the large difference in emission energies into account, it is difficult for our CA model to describe the giant flares, which might be produced by global field reconfiguration [26]. The power-law index, γ , found in our CA model depends on the amplitude of perturbation, 〈 ∆ B 〉 , and ranges from 1.2 to 1.8. This value is consistent with the observations. According to Prieskorn and Kaaret [9], there is no difference between the power-law indices observed in high- and low-burst-rate regimes. This result may appear to contradict our CA model with 〈 ∆ B 〉 dependence, but we found that cases with the same values of 〈 ∆ B /B 〉 c are equivalent. If the amplitude of perturbation and the criterion for reconnection depend on the unperturbed background magnetic field likewise (for instance, they are linearly related), 〈 ∆ B /B 〉 c and γ may be almost insensitive to the environment. In any case, further investigation of the relation between the power-law index and burst rate is important. Comparing with the original model by Lu and Hamilton [17], the grid and the perturbation rule for magnetic field are modified in this study. On the other hand, the CA rule of reconnection is identical with that in Lu and - [1] P. Bak, C. Tang and K. Wiesenfeld, Phys. Rev. Lett. 59 , 381 (1987). - [2] P. Bak, C. Tang and K. Wiesenfeld, Phys. Rev. A 38 , 364 (1988). - [3] P. Bak and C. Tang, J. Geophys. Res. 94 , 15635 (1989). - [4] Z. Olami, H.J.S. Feder and K. Christensen, Phys. Rev. Lett. 68 , 1244 (1992). - [5] J.I. Katz, J. Geophys. Res. 91 , 10412 (1986). - [6] M.J. Aschwanden, Astrophys. J. 782 , 54 (2014). - [7] E. G¨ o˘¨¸, P.M. Woods, C. Kouveliotou, J. van Paradijs, gus M.S. Briggs, R.C. Duncan and C. Thompson, Astrophys. J. Lett. 526 , L93 (1999). - [8] E. G¨ o˘¨¸, P.M. Woods, C. Kouveliotou, J. van Paradijs, gus M.S. Briggs, R.C. Duncan and C. Thompson, Astrophys. J. Lett. 532 , L121 (2000). - [9] Z. Prieskorn and P. Kaaret, Astrophys. J. 755 , 1 (2012). - [10] C. Thompson and R.C. Duncan, Mon. Not. R. Astron. Hamilton model while the number of nearest neighbors is different. This CA model relates to the induction equation, $$\frac { \partial B } { \partial t } = \nabla \times ( V \times B ) + \eta \nabla ^ { 2 } B, \text{ \quad \ \ } ( 7 )$$ where V and η are the plasma velocity and the resistivity, respectively [18, 20]. Note that the Laplacian of the magnetic field ∇ 2 B corresponds to the right hand side of equation (3) while the sign is opposite. Thus, if the reconnection occurs, the variation of B i is proportional to -d B i as in equation (5). On the other hand, the perturbation of this CA model is interpreted as the convective term ∇ × ( V × B ). As already mentioned, this CA model was originally proposed for solar flares. In contrast, we have applied it to recurrent bursts of SGRs. The modifications for SGRs, such as the relativistic forms of the MHD equations and QED effects, will be interesting issues. In this paper, we have shown that the SOC of SGRs can be illustrated not only by the crust quake model but also by the magnetic reconnection model. To mimic magnetic reconnections, other CA rules have been examined in the context of solar flares [27-30]. Incidentally, we have revised the CA rule for the redistribution from equation (5) to that proposed by Lu et al. [27], but the qualitative features remained unchanged. It would also be interesting to study the distributions of other SOC parameters (avalanche size, waiting time and so forth) [6, 31], which will be presented elsewhere. ## Acknowledgments The author is grateful to Masanao Sumiyoshi for useful discussions and valuable comments. This work was partially supported by Grants-in-Aids for the Scientific Research (Nos. 24105008, 26870615) from MEXT in Japan. Soc. 275 , 255 (1995). - [11] B. Link, Mon. Not. R. Astron. Soc. 441 , 2676 (2014). - [12] J.I. Katz, Astrophys. J. 260 , 371 (1982). - [13] M. Lyutikov, Mon. Not. R. Astron. Soc. 346 , 540 (2003). - [14] M. Lyutikov, Mon. Not. R. Astron. Soc. 367 , 1594 (2006). - [15] S. Komissarov, M. Barkov and M. Lyutikov, Mon. Not. R. Astron. Soc. 374 , 415 (2007). - [16] R. Gill and J.S. Heyl, Mon. Not. R. Astron. Soc. 407 , 1926 (2010). - [17] E.T. Lu and R.J. Hamilton, Astrophys. J. Lett. 380 , L89 (1991). - [18] H. Isliker, A. Anastasiadis, D. Vassiliadis and L. Vlahos, Astron. Astrophys. 335 , 1085 (1998). - [19] S. Schein and J.M. Gayed, Proc. Natl. Acad. Sci. U.S.A. 111 , 2920 (2014). - [20] M. Dimitropoulou, H. Isliker, L. Vlahos and M.K. Geor- - goulis, Astron. Astrophys. 529 , A101 (2011). - [21] E.P. Mazets, S. Golentskii, V.N. Il'inskii, R.L. Aptekar', and Y.A. Guryan, Nature 282 , 587 (1979). - [22] K. Hurley et al. , Nature 397 , 41 (1999). - [23] K. Hurley et al. , Nature 434 , 1098 (2005). - [24] D.M. Palmer et al. , Nature 434 , 1107 (2005). - [25] T. Terasawa et al. , Nature 434 , 1110 (2005). - [26] Y. Masada, S. Nagataki, K. Shibata, and T. Terasawa, Publ. Astron. Soc. Japan 62 , 1093 (2010). - [27] E.T. Lu, R.J. Hamilton, J.M. McTiernan and K.R. Bro- - mund, Astrophys. J. 412 , 841 (1993). - [28] M. Geolgoulis, R. Kluiving and L. Vlahos, Physica A 218 , 191 (1995). - [29] D. Vassiliadis, A. Anastasiadis, M. Geolgoulis and V. Vlahos, Astrophys. J. Lett. 509 , L53 (1998). - [30] L.F. Morales and P. Charbonneau, Nonlin. Processes Geophys. 17 , 339 (2010). - [31] S.W. McIntosh, P. Charbonneau, T.J. Bogdan, H.-L. Liu, and J.P. Norman, Phys. Rev. E 65 , 046125 (2002).
10.1103/PhysRevD.90.043010
[ "Ken'ichiro Nakazato" ]
2014-08-06T08:20:01+00:00
2014-08-18T11:20:51+00:00
[ "astro-ph.HE", "nlin.AO" ]
Self-organized criticality in a spherically closed cellular automaton: Modeling soft gamma repeater bursts driven by magnetic reconnection
A new cellular automaton (CA) model is presented for the self-organized criticality (SOC) in recurrent bursts of soft gamma repeaters (SGRs), which are interpreted as avalanches of reconnection in the magnetosphere of neutron stars. The nodes of a regular dodecahedron and a truncated icosahedron are adopted as spherically closed grids enclosing a neutron star. It is found that the system enters the SOC state if there are sites where the expectation value of the added perturbation is nonzero. The energy distributions of SOC avalanches in CA simulations are described by a power law with a cutoff, which is consistent with the observations of SGR 1806-20 and SGR 1900+14. The power-law index is not universal and depends on the amplitude of the perturbation. This result shows that the SOC of SGRs can be illustrated not only by the crust quake model but also by the magnetic reconnection model.
1408.1207v1
## Ground state, magnetization process and magnetocaloric effect of the exactly tractable spin-electron tetrahedral chain L. G´ alisov´ a 1 , ∗ and J. Streˇka c 2 1 Department of Applied Mathematics and Informatics, Faculty of Mechanical Engineering, Technical University, Letn´ a 9, 042 00 Koˇ sice, Slovak Republic 2 Department of Theoretical Physics and Astrophysics, Faculty of Science, P. J. ˇ af´rik S a University, Park Angelinum 9, 040 01 Koˇ sice, Slovak Republic (Dated: August 7, 2014) A hybrid spin-electron system on one-dimensional tetrahedral chain, in which the localized Ising spin regularly alternates with the mobile electron delocalized over three lattice sites, is exactly investigated using the generalized decoration-iteration transformation. The system exhibits either the ferromagnetic or antiferromagnetic ground state depending on whether the ferromagnetic or antiferromagnetic interaction between the Ising spins and mobile electrons is considered. The enhanced magnetocaloric effect during the adiabatic demagnetization suggests a potential use of the investigated system for low-temperature magnetic refrigeration. PACS numbers: 75.10.Pq, 75.60.Ej; 75.30.Sg; 05.50.+q Keywords: spin-electron tetrahedral chain, magnetization process, magnetocaloric effect, exact results ## I. INTRODUCTION One-dimensional magnetic systems exhibit a variety of interesting phenomena, which are the subject of intensive theoretical and experimental studies nowadays. One of such systems is the coupled tetrahedral chain, which can be observed in the compound Cu Mo O 3 2 9 [1]. The tetrahedral chain structure was first theoretically introduced by Mambrini et al. [2] to investigate the residual entropy and spin gap in tetrahedral coupled Heisenberg chain. Since that time, several other models with this lattice geometry have been discussed in the literature, as for instance the Heisenberg and Hubbard models [3], the exactly solvable spinless fermion model [4] and the exactly solvable Ising-Heisenberg model [5]. In this work, we will consider another exactly solvable tetrahedral chain, in which the Ising spins localized at nodal lattice sites regularly alternate with triangular plaquettes available for mobile electrons. Assuming the one mobile electron per triangular plaquette, we will study the ground state, the magnetization process and the magnetocaloric effect of this model. ## II. MODEL AND SOLUTION Let us consider an one-dimensional tetrahedral chain, in which one Ising spin localized at the nodal lattice site regularly alternates with three equivalent lattice sites available for one mobile electron (Fig. 1). The considered model can be alternatively viewed as the Ising chain, whose bonds are decorated by triangular plaquettes available to mobile electrons. From this perspective, the total Hamiltonian of this model can be written as a sum over cluster Hamiltonians H = ∑ N k =1 H k , where N is the total number of nodal lattice sites and the Hamiltonian H k ∗ e-mail:[email protected] FIG. 1. A part of the spin-electron system on tetrahedral chain. The black (red) circles indicate the lattice sites available for localized Ising spins (mobile electrons). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-47a60dce-12b7-40da-a99e-38e74683547d.jpg) reads $$\underset { \substack { \text{time} \\ \text{is} \\ \text{is} \\ \text{$[3],$} \\ \text{id the} } } \quad \mathcal { H } _ { k } = - t \sum _ { \alpha = \uparrow, \downarrow } \left ( c _ { k 1, \alpha } ^ { \dagger } c _ { k 2, \alpha } + c _ { k 2, \alpha } ^ { \dagger } c _ { k 3, \alpha } + c _ { k 3, \alpha } ^ { \dagger } c _ { k 1, \alpha } + \text{h.c.} \right )$$ $$+ \, \frac { J } { 2 } ( \sigma _ { k } ^ { z } + \sigma _ { k + 1 } ^ { z } ) \sum _ { i = 1 } ^ { 3 } \left ( c _ { k i, \uparrow } ^ { \dagger } c _ { k i, \uparrow } - c _ { k i, \downarrow } ^ { \dagger } c _ { k i, \downarrow } \right )$$ $$\stackrel { \unlhd } { u } _ { \mathfrak { g } } & \quad - \frac { H _ { 1 } } { 2 } ( \sigma _ { k } ^ { z } + \sigma _ { k + 1 } ^ { z } ) - \frac { H _ { e } } { 2 } \sum _ { i = 1 } ^ { 3 } \left ( c _ { k i, \uparrow } ^ { \dagger } c _ { k i, \uparrow } - c _ { k i, \downarrow } ^ { \dagger } c _ { k i, \downarrow } \right ). ( 1 )$$ Here, c † ki,α and c ki,α ( α = ↑ ↓ , ) represent fermionic creation and annihilation operators, respectively, while σ z k = ± 1 / 2 stands for the Ising spins. The parameter t &gt; 0 takes into account the kinetic energy of a single mobile electron delocalized over a triangular plaquette, the Ising coupling J denotes the exchange interaction between electrons and their nearest Ising neighbours, H I and H e are the Zeeman's terms acting on the localized Ising spins and mobile electrons, respectively. Following the rigorous procedure developed in Ref. [6] for similar two-dimensional model on doubly decorated planar lattices with one mobile electron delocalized over each couple of decorating sites, one obtains a simple mapping relation between the partition function Z of the spin-electron tetrahedral chain and the partition function Z IC of the spin-1 / 2 Ising linear chain with the effective nearest-neighbour coupling J e ff and the effective magnetic field H e ff , $$\mathcal { Z } ( \beta, J, t, H _ { 1 }, H _ { \text{e} } ) = A ^ { N } \mathcal { Z } _ { \text{IC} } ( \beta, J _ { \text{eff} }, H _ { \text{eff} } ). \quad ( 2 )$$ In above, β = 1 /T is the inverse temperature (we set k B = 1) and the unknown parameters A J , e ff and H e ff are given by the expressions $$A & = 2 \left [ 2 \exp ( - \beta t ) + \exp ( 2 \beta t ) \right ] \left ( V _ { - } V _ { + } V ^ { 2 } \right ) ^ { 1 / 4 }, \quad \text{$by$ as} \\ J _ { e f f } & = T \ln \left ( \frac { V _ { - } V _ { + } } { V ^ { 2 } } \right ), \ \ H _ { e f f } = H _ { 1 } + T \ln \left ( \frac { V _ { - } } { V _ { + } } \right ), \ ( 3 ) \quad \text{$state$} \\ \hat { \wedge } \cdots \, \hat { \wedge } \cdots$$ where V ∓ = cosh( βJ/ 2 ∓ βH / e 2) and V = cosh( βH / e 2). Note that Eq. (2) allows an exact enumeration of the Helmholtz free energy F = -T ln Z of the considered spin-electron tetrahedral chain and, subsequently, other thermodynamic quantities, e.g., the sublattice magnetization m I = -1 N ( ∂ F ∂H I ) , m e = -1 N ( ∂ F ∂H e ) of the localized Ising spins and mobile electrons, respectively, or the entropy per one magnetic particle s = -1 2 N ( ∂ F ∂T ) . ## III. RESULTS AND DISCUSSION Now, let us proceed to a discussion of the ground state, magnetization process and magnetocaloric effect of the spin-electron tetrahedral chain with the ferromagnetic ( J &lt; 0) or the antiferromagnetic ( J &gt; 0) Ising interaction. To reduce the number of free interaction parameters, we will assume equal magnetic fields acting on the Ising spins and mobile electrons H = H I = H e . As expected, the investigated tetrahedral chain exhibits the trivial ferromagnetic (FM) ground-state ordering with a full alignment of all nodal Ising spins and mobile electrons into the magnetic field direction, if J &lt; 0, or it passes from two-fold degenerate antiferromagnetic (AF) ground state to the ferromagnetic (FM) one at the critical field H / J c | | = 1, if J &lt; 0. These two ground states can be characterized through the following eigenvectors and energies per one nodal lattice site: $$| \text{FM} \rangle & = \prod _ { k = 1 } ^ { N } | \uparrow \rangle _ { \sigma _ { k } } \frac { 1 } { \sqrt { 3 } } \, ( c _ { k 1, \uparrow } ^ { \dagger } + c _ { k 2, \uparrow } ^ { \dagger } + c _ { k 3, \uparrow } ^ { \dagger } ) | 0 \rangle _ { k }, \\ E _ { \text{FM} } & = \frac { J } { 2 } - 2 t - H ; \\.$$ $$E _ { \text{FM} } & = \frac { J } { 2 } - 2 t - H ; & ( 4 ) \\ | \text{AF} \rangle & = \prod _ { k = 1 } ^ { N } \begin{cases} | \uparrow \rangle _ { \sigma _ { k } } \frac { 1 } { \sqrt { 3 } } \, ( c _ { k 1, \downarrow } ^ { \dagger } + c _ { k 2, \downarrow } ^ { \dagger } + c _ { k 3, \downarrow } ^ { \dagger } ) | 0 \rangle _ { k } & \\ | \downarrow \rangle _ { \sigma _ { k } } \frac { 1 } { \sqrt { 3 } } \, ( c _ { k 1, \uparrow } ^ { \dagger } + c _ { k 2, \uparrow } ^ { \dagger } + c _ { k 3, \uparrow } ^ { \dagger } ) | 0 \rangle _ { k }, & \\ E _ { \text{AF} } & = \frac { J } { 2 } - 2 t. & \\ \text{In above, the product runs over all primitive unit cells.} \end{cases},$$ In above, the product runs over all primitive unit cells, the ket vector | ↑〉 σ k ( | ↓〉 σ k ) determines the up (down) state of k th localized Ising spin and | 0 〉 k labels the vacuum state for the k th triangular plaquette occupied by one mobile electron. It is apparent from Eq. (5) that the two-fold degenerate AF ground state corresponds to the antiferromagnetic order, in which the mobile electrons are aligned in opposite to their Ising neighbours. Next, let us turn our attention to the magnetic behaviour of the investigated spin-electron model at finite temperatures. In Fig. 2 we depict the magnetization process of the model with the ferromagnetic [Fig. 2(a)] as well as the antiferromagnetic Ising interaction [Fig. 2(b)], by assuming the fixed hopping term t and various temperatures. In agreement with the aforedescribed groundstate analysis, the total magnetization [ m = ( m I + m / e ) 2] of the system with the ferromagnetic Ising interaction J &lt; 0 takes the saturated value m sat = 1 2 in the whole / field region at T/J = 0, since all mobile electrons as well as Ising spins are fully polarized into the magnetic field direction. On the other hand, the zero-temperature magnetization curve corresponding to the system with the antiferromagnetic Ising interaction J &gt; 0 exhibits the abrupt jump from zero to the saturation magnetization at the critical field H / J c | | = 1, which coincides with the field-induced phase transition between two possible ground states AF and FM. At any finite temperature, both magnetization curves start from zero in accordance with the one-dimensional character of the investigated spin-electron system. As usual, abrupt changes in lowtemperature magnetization curves observable around the fields H/J = 0 for J &lt; 0 and H / J c | | = 1 for J &gt; 0 are gradually smeared out upon increasing temperature [see the curves corresponding to T/J = 0 15 0 2 0 3 0 4 in . , . , . , . Fig. 2(a) and T/ J | | = 0 05 0 2 0 4 in Fig. 2(b)]. . , . , . /s32 /s109/s32/s47/s32/s109 /s32 /s32 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-32976a3e-946b-4b0e-9699-54fa9d920fb6.jpg) /s109/s32/s47/s32/s109 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-59620f7c-f6a3-4098-bb09-169e3984524e.jpg) /s32 FIG. 2. Magnetization normalized with respect to its saturation value as a function of the magnetic field at various temperatures for the model with the fixed hopping term t and the Ising interaction: (a) J &lt; 0; (b) J &gt; 0. Finally, let us take a look at the adiabatic demagnetization of the investigated spin-electron model. Fig. 3 shows several typical isentropic changes of the temperature upon varying the external magnetic field for both particular cases with the ferromagnetic and antiferromagnetic exchange coupling J . As can be seen from Fig. 3(a), the model with J &lt; 0 exhibits an enhanced magnetocaloric effect just around the zero field on assumption that the entropy is very small. By contrast, for other particular case with J &gt; 0 shown in Fig. 3(b), the most obvious drop/grow of the temperature can be found in the vicinity of the critical field H /J c = 1, where the system undergoes a zero-temperature phase transition between the AF and FM ground states. Obviously, an enhanced magnetocaloric effect can be detected in this particular case just if the entropy is sufficiently close to the value s = ln ( 1+ √ 5 2 ) . /s32 /s32 /s32 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-fb1ba7e3-2e13-4673-a0c8-080e1f983bed.jpg) /s84/s32/s47/s32/s74 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-dc6f34b0-ed31-4fb6-90b3-48b87d6ea326.jpg) /s32 FIG. 3. Temperature as a function of the magnetic field at various values of the entropy s for the model with the fixed hopping term t and the Ising interaction: (a) J &lt; 0; (b) J &gt; 0. To describe an efficiency of the cooling process in the studied model, the adiabatic cooling rate ( ∂T ∂H ) s as a function of the external magnetic field is illustrated in - [1] M. Hase, H. Kitazawa, K. Ozawa, T. Hamasaki, H. Kuroe, T. Sekine, J. Phys. Soc. Jpn. 77 , 034706 (2008). - [2] M. Mambrini, J. Tr´ ebosc, and F. Mila, Phys. Rev. B 59 , 13806 (1999). - [3] M. Maksymenko, O. Derzhko, and J. Richter, Eur. Phys. J. B 84 , 397 (2011). Fig. 4 for both particular cases J &gt; 0 and J &lt; 0 by keeping the entropy constant. In agreement with the previous analysis, the model with J &lt; 0 shows the asymptotically fast cooling during the adiabatic demagnetization around H/ J | | = 0 when the entropy is small enough, whereas the model with J &gt; 0 exhibits the most rapid cooling/heating during the adiabatic demagnetization just around the transition field H /J c = 1 when the entropy is sufficiently close to the value s = ln ( 1+ √ 5 2 ) . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1207v1-figure-aca486bd-175b-4ce5-ac21-f5d2561a6524.jpg) /s32 /s32 /s32 FIG. 4. Adiabatic cooling rate as a function of the magnetic field for the model with the fixed hopping term t and the Ising interaction J &lt; 0 (left panel), J &gt; 0 (right panel) at various values of the entropy. ## IV. SUMMARY In this paper, we have studied the ground state, the magnetization process and the enhanced magnetocaloric effect of the exactly solvable spin-electron tetrahedral chain by assuming one Ising spin localized at each nodal lattice site and one mobile electron delocalized over each triangular plaquette. It has been demonstrated that the system with the ferromagnetic interaction J &lt; 0 exhibits an enhanced magnetocaloric effect when the entropy is kept very small, while the system with the antiferromagnetic interaction J &gt; 0 exhibits an enhanced magnetocaloric effect when the entropy is set sufficiently close to its optimal value s = ln ( 1+ √ 5 2 ) . This suggests a potential use of the investigated system for low-temperature magnetic refrigeration. Acknowledgments : This work was financially supported by the grant of the Slovak Research and Development Agency under the contract No. APVV-0097-12. - [4] M. Rojas, S. M. de Souza, O. Rojas, arXiv:1212.5552. - [5] D. Antonosyan, S. Bellucci and V. Ohanyan, Phys. Rev. B 79 , 014432 (2009). - [6] J. Streˇka, A. Tanaka, M. Jaˇˇur, J. Phys.: Conf. Ser. c sc 200 022059 (2010).
10.12693/APhysPolA.127.216
[ "Lucia Gálisová", "Jozef Strečka" ]
2014-08-06T08:22:01+00:00
2014-08-06T08:22:01+00:00
[ "cond-mat.str-el" ]
Ground state, magnetization process and magnetocaloric effect of the exactly tractable spin-electron tetrahedral chain
A hybrid spin-electron system on one-dimensional tetrahedral chain, in which the localized Ising spin regularly alternates with the mobile electron delocalized over three lattice sites, is exactly investigated using the generalized decoration-iteration transformation. The system exhibits either the ferromagnetic or antiferromagnetic ground state depending on whether the ferromagnetic or antiferromagnetic interaction between the Ising spins and mobile electrons is considered. The enhanced magnetocaloric effect during the adiabatic demagnetization suggests a potential use of the investigated system for low-temperature magnetic refrigeration.
1408.1208v1
## Binary frequency of planet-host stars at wide separations ## A new brown dwarf companion to a planet-host star N. Lodieu 1 2 , /star /star/star , A. P´ erez-Garrido 3 , V. J. S. B´jar e 1 2 , , B. Gauza 1 , M. T. Ruiz 4 , R. Rebolo 1 2 5 , , , D. J. Pinfield 6 , and E. L. Mart´ ın 7 - 1 Instituto de Astrof´ ısica de Canarias (IAC), Calle V´ ıa L´ ctea s n, E-38200 La Laguna, Tenerife, Spain a / e-mail: nlodieu,vbejar,bgauza,[email protected] - 2 Departamento de Astrof´ ısica, Universidad de La Laguna (ULL), E-38206 La Laguna, Tenerife, Spain - 3 Universidad Polit´ ecnica de Cartagena, Campus Muralla del Mar, Cartagena, Murcia E-30202 Spain - 4 Departamento de Astronom´ ıa, Universidad de Chile, Casilla 36-D, Santiago, Chile - 5 Consejo Superior de Investigaciones Cient´ ıficas, CSIC, Spain - 6 Centre for Astrophysics Research, Science and Technology Research Institute, University of Hertfordshire, Hatfield AL10 9AB, UK - 7 Centro de Astrobiolog´ ıa (INTA-CSIC), Departamento de Astrof´ ısica. P.O. Box 78, E-28691 Villanueva de la Ca˜ada, Madrid, Spain n August 7, 2014; August 7, 2014 ## ABSTRACT Aims. The aim of the project is to improve our knowledge on the multiplicity of planet-host stars at wide physical separations. Methods. We cross-matched approximately 6200 square degree area of the Southern sky imaged by the Visible Infrared Survey Telescope for Astronomy (VISTA) Hemisphere Survey (VHS) with the Two Micron All Sky Survey (2MASS) to look for wide common proper motion companions to known planet-host stars. We complemented our astrometric search with photometric criteria. Results. We confirmed spectroscopically the co-moving nature of seven sources out of 16 companion candidates and discarded eight, while the remaining one stays as a candidate. Among these new wide companions to planet-host stars, we discovered a T4.5 dwarf companion at 6.3 arcmin ( ∼ 9000 au) from HIP 70849, a K7V star which hosts a 9 Jupiter mass planet with an eccentric orbit. We also report two new stellar M dwarf companions to one G and one metal-rich K star. We infer stellar and substellar binary frequencies for our complete sample of 37 targets of 5.4 ± 3.8% and 2.7 ± 2.7% (1 σ confidence level), respectively, for projected physical separations larger than ∼ 60-160 au assuming the range of distances of planet-host stars (24-75 pc). These values are comparable to the frequencies of non planet-host stars. We find that the period-eccentricity trend holds with a lack of multiple systems with planets at large eccentricities (e &gt; 0.2) for periods less than 40 days. However, the lack of planets more massive than 2.5 Jupiter masses and short periods ( &lt; 40 days) orbiting single stars is not so obvious due to recent discoveries by ground-based transit surveys and space missions. Key words. Stars: low-mass - Stars: brown dwarfs - surveys - techniques: photometric - techniques: spectroscopic ## 1. Introduction The discoveries of the first extrasolar planet orbiting a solartype star and the first brown dwarfs were announced the same year (Mayor &amp; Queloz 1995; Rebolo et al. 1995; Nakajima et al. 1995). Since then, more than one thousand exoplanets have been discovered, mainly thanks to radial velocity surveys and transit campaigns but also through direct imaging, microlensing, and timing 1 . In the meantime, a similar number of nearby field L, T, and Y dwarfs ( ∼ 1300) 2 , have been announced thanks to the advent of large-scale surveys such as the DEep Near Infrared Survey (DENIS; e.g. Epchtein et al. 1997; Delfosse et al. 1997; Mart´ ın et al. 1997, 1999), the Two Micron All Sky Survey (2MASS; e.g. Skrutskie et al. 2006; Burgasser et al. 1999, 2003b; Cruz et al. 2007), the Sloan Digital Sky Survey (SDSS; e.g. York et al. 2000; Leggett et al. 2000b; Geballe et al. 2002; Chiu et al. 2006), the UKIRT Infrared Deep Sky Survey (UKIDSS; Lawrence et al. 2007; Lodieu et al. 2007; Pinfield et al. 2008; Burningham et al. 2010, 2013), and the Wide-field Infrared Survey Explorer (WISE; Wright et al. 2010; Kirkpatrick et al. 2011; Mace et al. 2013; Thompson et al. 2013). However, only one wide brown dwarf companion comoving with a planet-host star has been reported to date, HD3651B (T7.5; d = 11.1 ± 0.1 pc; Mugrauer et al. 2006b; Liu et al. 2007; Leggett et al. 2007; Burgasser 2007). /star Based on observations collected at the European Organisation for Astronomical Research in the Southern Hemisphere, Chile. - /star/star Based on observations made with the Gran Telescopio Canarias (GTC), installed in the Spanish Observatorio del Roque de los Muchachos of the Instituto de Astrof´ ısica de Canarias, in the island of La Palma (program program GTC65-13B) - 1 see the exoplanet.eu repositary for a complete list of planets and references - 2 the full list is available in DwarfArchives.org The presence of companion(s) to planet-host stars is thought to a ff ect the e ffi ciency of planet formation as well as the properties of any planet orbiting the primary star (Boss 2006; Nelson 2003; Moriwaki &amp; Nakagawa 2004) due to several processes, such as gravitational instability, accretion, velocities of colliding planetesimals, dissipation, and or Kozai e / ff ects. Looking at a sample of close and wide companions to planet-host stars can reveal peculiarities in the eccentricity or mass distribution within those systems that may constrain current models of planet for- mation. In other words, one would like to address the following question: do companions to planet-host stars influence the properties of the planetary systems and to what degree? Some planet-host stars are members of well-known multiple systems, such as 16 Cyg for example (Mason et al. 2001). Eggenberger et al. (2004) announced a sample of 15 new wide low-mass companions to planet-host stars and suggested a possible di ff erence in the mass-period and eccentricity-period distributions, trend previously reported in Zucker &amp; Mazeh (2002). These discoveries and potential di ff erences in the properties of planets orbiting single stars and planets orbiting stars in multiple systems triggered dedicated searches by several groups (Butler et al. 1997; Mugrauer et al. 2004a,b; Konacki 2005; Mugrauer et al. 2005a,b; Eggenberger et al. 2006; Mugrauer et al. 2006a, 2007a,b; Desidera &amp; Barbieri 2007; Bonavita &amp; Desidera 2007) to confirm (or otherwise) those trends in the properties of exoplanets. These searches also led to the discoveries of the first wide brown dwarf companion to HD 3651 (Mugrauer et al. 2006b), a K7 dwarf with a sub-Saturn mass planet (Fischer et al. 2004; Santos et al. 2005), and the most evolved multiple system with an exoplanet (Butler et al. 2001), composed of a K subgiant and a white dwarf (HD27442; Chauvin et al. 2006; Raghavan et al. 2006; Mugrauer et al. 2007a). Moreover, several close companions have been announced around planet-host stars, thanks to high-resolution adaptive optics imaging (Els et al. 2001; Patience et al. 2002) and lucky imaging (Ginski et al. 2012). All these surveys point towards a global multiplicity of at least 20% among solar-type stars with exoplanets (Mugrauer et al. 2007a). In this paper, we describe a new search for wide companions to planet-host stars taking advantage of the homogeneous coverage of the Visible and Infrared Survey Telescope for Astronomy (VISTA; Emerson 2001; Emerson et al. 2004b; Dalton et al. 2006) Hemisphere Survey (VHS; McMahon 2012) that will provide a full coverage of the Southern sky in the upcoming years. We cross-correlated VHS with 2MASS (Cutri et al. 2003; Skrutskie et al. 2006) over an area of ∼ 6200 square degrees. Our work represents an extension and a complementary approach to the techniques employed by other authors (e.g. Mugrauer et al. 2007a). In Section 2 we present the characteristics of the 2MASS and VHS surveys as well as our astrometric and photometric search criteria. In Section 3 we describe our optical and nearinfrared spectroscopic follow-up of companion candidates conducted with the spectrographs mounted on the New Technology Telescope (NTT) at La Silla Observatory in Chile and the OSIRIS instrument on the 10.4-m Gran Telescopio de Canarias at the Roque de Los Muchachos observatory on the island of La Palma (Canary Islands, Spain). In Sections 4 and 5 we present the optical spectral classification scheme and the absolute magnitude vs spectral type relation employed throughout our analysis. In Section 6 we analyse the properties of the new wide companions found in our sample, including a brown dwarf binary candidate co-moving with HIP 70849. In Sections 7-9 we discuss the stability of the widest companions in our sample, derive the frequency of planet-host stars at wide separations, and examine the dynamical properties of the systems with respect to previous studies (Eggenberger et al. 2004; Mugrauer et al. 2007a; Desidera &amp; Barbieri 2007). ## 2. Surveys and search criteria ## 2.1. The 2MASS database The 2MASS project imaged the full sky in three near-infrared filters, J (1.25 µ m), H (1.65 µ m), and Ks (2.17 µ m), down to 10 σ depths of 15.8 mag, 15.1 mag, and 14.3 mag, respectively (Skrutskie et al. 2006) 3 . The survey was conducted with 256 × 256 HgCdTe detectors installed on two automated 1.3-m telescopes located on Mount Hopkins in Arizona (USA) and on Cerro Tololo (CTIO) in Chile. The observing strategy consisted of scanning the sky in three filters simultaneously with patches on the sky covering six degrees in declination and 8.5 arcmin in right ascension. The Northern site started operations in 1997, followed by the Southern site a year later. The survey ended at the beginning of 2001, providing a final world-public catalogue of ∼ 471 million sources (Cutri et al. 2003). Comparison of the 2MASS catalogue with other catalogues such as Tycho2 (Høg et al. 2000) and UCAC (Zacharias et al. 2003) indicate that 2MASS positions in the International Celestial Reference System are accurate to 70-80 mas (root-mean-square; rms) over most of the magnitude range ( Ks between 6 and 15 mag). This all-sky survey played a major role in astronomy over the past decade, in particular in our knowledge of the low-mass and substellar populations of the solar neighbourhood (e.g. Reid et al. 1999; Burgasser et al. 1999; Burgasser 2004; Cruz et al. 2007; Kirkpatrick et al. 2010). ## 2.2. The VISTA Hemisphere survey VISTA is a 4-m telescope (Emerson 2001; Emerson et al. 2004b) located at the Cerro Paranal Observatory (Chile) run by the European Southern Observatory (ESO). The telescope is equipped with the world's largest infrared camera, VIRCAM (Dalton et al. 2006) composed of 67 million pixels o ff ering a field-of-view of 1.65 degrees in diameter, 0.6 square degrees of which is sampled by 'pawprints' of 16 non-contiguous detectors with 0.34 arcsec pixels. Six suitably o ff sets and jittered pawprints are combined into a filled 1.5 square degree 'tile', in which each piece of sky has been sampled by at least 2 pixels (ignoring the jitters), together with two additional 5.5 × 88.5 arcmin strips at opposite sides of the tile which are just covered once. The VISTA astrometric requirements, to an airmass of 2, are twofold: di ff erential astrometric accuracies of 0.1 and 0.03 arcsec rms within the field covered by the full mosaic and each individual detector, respectively (Emerson et al. 2004a). Seventy-five percent of the time available on VISTA is dedicated to European Southern Observatory (ESO) public surveys , 4 one of them being the VHS (McMahon 2012) planned to image the entire Southern sky in J and Ks over several years. Five thousands square degrees linked to the Dark Energy Survey (DES) 5 will be observed in JHKs whereas another 5000 square degrees around the Galactic caps will be imaged in YJHKs . The averaged 5 σ depths measured for VHS are J = 19.5 ± 0.3 mag and Ks = 18.5 ± 0.3 mag. One of the main scientific drivers of the VHS includes the search for and characterisation of the nearest and coolest low-mass stars and brown dwarfs. The current VHS data release is DR2 , made public on 17 October 2011 via the 6 VISTA Science Archive (Hambly et al. 2008; Cross et al. 2012), 3 http: // www.ipac.caltech.edu 2mass / / 4 www.eso.org sci observing PublicSurveys sciencePublicSurveys.html / / / / 5 http: // www.darkenergysurvey.org / 6 http: // www.eso.org sci observing phase3 data / / / / releases vhs dr2.pdf / Table 1. Wide common proper motion companions to planet-host stars. We list their coordinates (J2000), J and Ks photometry from VHS, w 1 and w 2 magnitudes from WISE, proper motions in right ascension and declination (mas yr) with a typical errors of 15-20 / mas yr in each direction, the name of the associated planet-host star with its spectral type in brackets, the distance of the planet-host / star, the separation in arcmin, proper motions of the primary (in mas yr) with their errors from Hipparcos, and the final conclusion / (C?) on the validity of the system. From top to bottom, panels list objects with 'Y' which are truly wide common proper motion systems, objects classified as 'Y:' that are common proper motion candidates located at very wide separations, and rejected systems marked as 'N'. | R.A. | dec | J | K s | w 1 | w 2 | µ α cos δ | µ δ | Name | dist | Sep | µ α cos δ | µ δ | SpT | C? | |-------------|--------------|--------|--------|--------|--------|-------------|----------|---------------------|--------|--------|-----------------|-----------------|--------------|------| | hh:mm:ss.ss | ◦ :':' | mag | mag | mag | mag | mas / yr | mas / yr | | pc | arcmin | mas / yr | mas / yr | | | | 14:26:45.74 | - 05:10:20.9 | 12.116 | 11.279 | 11.060 | 10.921 | - 140 | - 145 | HD126614 (K0V + MV) | 72.4 | 0.70 | - 152.04 ± 0.86 | - 147.93 ± 0.76 | M4.5 ± 0.5 | Y | | 14:28:42.32 | - 46:28:41.7 | 15.533 | 15.582 | 15.174 | 13.853 | - 35 | - 196 | HIP70849 (K7Vk) | 24.0 | 6.29 | - 47.12 ± 2.15 | - 203.52 ± 1.93 | T4.5 ± 0.5 | Y | | 22:31:08.09 | - 49:26:59.0 | 12.415 | 11.595 | 11.208 | 11.030 | - 143 | - 191 | HD213240 (G0 / G1V) | 40.6 | 1.59 | - 136.01 ± 0.48 | - 194.44 ± 0.33 | M5-M5.5 | Y | | 11:00:49.99 | - 11:03:43.2 | 14.062 | 13.242 | 13.034 | 12.816 | - 179 | - 20 | BD10 - 3166 (K0V) | 66.0 | 38.86 | - 185.50 ± 1.80 | - 5.20 ± 1.80 | M5-M5.5 | Y: | | 12:37:18.37 | - 39:53:14.8 | 12.350 | 11.542 | 11.046 | 10.899 | - 185 | - 9 | HD109749 (G3V) | 56.3 | 55.48 | - 157.85 ± 0.93 | - 5.43 ± 0.72 | M3.5 ± 0.5 | Y: | | 15:58:41.31 | - 44:27:54.2 | 14.568 | 13.749 | 13.591 | 13.324 | - 176 | - 79 | HD143361 (G6V) | 65.66 | 33.76 | - 158.32 ± 1.37 | - 118.21 ± 1.01 | M6-M6.5 | Y: | | 21:51:24.97 | - 26:36:42.6 | 13.912 | 13.039 | 12.832 | 12.625 | 133 | - 117 | HD207832 (G5V) | 54.4 | 38.57 | 132.05 ± 0.97 | - 143.15 ± 0.52 | M6.5 ± 0.5 | Y: | | 23:13:45.29 | - 08:22:56.8 | 12.036 | 11.236 | 11.016 | 10.838 | 361 | - 23 | 91 Aqr (K0III) | 45.9 | 52.91 | 368.68 ± 0.40 | - 17.16 ± 0.28 | M3.5 ± 0.5 | Y:? | | 01:48:24.30 | - 53:33:49.6 | 16.332 | 15.635 | 15.523 | 15.670 | 133 | - 91 | HD10647 (F9V) | 17.3 | 53.63 | 166.32 ± 0.24 | - 106.52 ± 0.27 | - | N | | 11:57:01.82 | - 12:45:39.0 | 16.939 | 15.645 | 14.700 | 14.296 | - 165 | 7 | HD103774 (F5V) | 55.0 | 39.20 | - 125.50 ± 0.49 | - 19.95 ± 0.34 | - | N | | 12:40:36.35 | - 40:59:00.7 | 11.788 | 10.954 | 10.802 | 10.760 | - 188 | - 3 | HD109749 (G3V) | 56.3 | 39.19 | - 157.85 ± 0.93 | - 5.43 ± 0.72 | K7 | N | | 16:01:36.44 | - 45:11:05.2 | 13.040 | 12.466 | 12.200 | 12.220 | - 136 | - 119 | HD143361 (G6V) | 65.66 | 45.06 | - 158.32 ± 1.37 | - 118.21 ± 1.01 | Early | N | | 17:36:35.14 | - 42:35:39.8 | 13.378 | 12.724 | 12.639 | 12.527 | - 194 | - 147 | HD159868 (G5V) | 58.7 | 42.34 | - 231.62 ± 1.04 | - 167.00 ± 0.81 | sdM0.5 ± 0.5 | N | | 17:41:02.53 | - 42:34:54.8 | 12.769 | 12.097 | 11.912 | 11.732 | - 214 | - 175 | HD159868 (G5V) | 58.7 | 40.69 | - 231.62 ± 1.04 | - 167.00 ± 0.81 | M3.0 ± 0.5 | N | | 22:53:23.80 | - 47:54:01.8 | 12.631 | 11.881 | 11.660 | 11.467 | 215 | - 89 | HD216435 (G0V) | 32.62 | 41.95 | 217.04 ± 0.37 | - 81.76 ± 0.29 | M4-M4.5 | N | | 23:40:52.27 | - 05:45:01.4 | 14.687 | 13.881 | 13.713 | 13.372 | - 125 | - 116 | HD222582 (G5 ) | 42.0 | 20.41 | - 144.88 ± 0.88 | - 111.93 ± 0.56 | - | N | but we also accessed data through flat-files made available to the VHS consortium. ## 2.3. Search criteria We took advantage of the &gt; 10 year baseline between the VHS and 2MASS databases (McMahon 2012; Cutri et al. 2003; Skrutskie et al. 2006) to search for wide companions to planethost stars imaged by the VHS. We searched for common proper motion companions to planet-host stars over a separation of 60 arcmin. We identified a total of 49 planet-host stars in the ∼ 6200 square degrees (assuming 1.2 square degree coverage for the 5175 files) covered by VHS up to 31 October 2012. Among those 49 stars, 12 have incomplete coverage out to 60 arcmin at the time of writing, yielding a complete search for wide companions around 37 planet-host stars. Our search probes a similar parameter space as the hunt for wide binaries in the rNLTT catalogue (Gould &amp; Salim 2003; Salim &amp; Gould 2003) described by Chanam´ e &amp; Gould (2004), except that we focus here on planethost stars. We applied the following criteria to our photometric and astrometric search: - -Sources brighter than J VHS = 17 mag to ensure a reliable photometric detection in 2MASS - -Di ff erence in J -band magnitude between 2MASS and VHS photometry less than 0.5 mag to remove unreliable photometry from 2MASS and VHS at the faint and bright ends, respectively - -Sources with separations larger than 1 arcsec between 2MASS and VHS - -Separations from the primary up to 60 arcmin - -Di ff erences of less than 40 mas yr (typically 2-3 / σ of the rms determined from stars in the fields-of-view of our targets) between each component of the proper motion of the candidate(s) and the planet-host star, corresponding to a maximum total di ff erence of 56 mas yr / This query returned 16 wide co-moving proper motion candidates to 14 planet-host stars, including one brown dwarf can- didate with the typical colours of mid-T dwarfs (Section 6.3). We list the coordinates (J2000), near-infrared ( J Ks , ) photometry from VHS (McMahon 2012), mid-infrared ( w , w 1 2) photometry from the WISE all-sky release (Wright et al. 2010), proper motions in mas yr for the primary and co-moving candidate from / our VHS-WISE cross-match, physical separations, final spectral types (Section 6), and conclusions on the true companionship of the candidates in Table 1. We plot our candidates in the ( J -Ks ,M ) colour-absolute J magnitude diagram displayed in Fig. 1, where we assumed the planet-host star distance to determine a possible absolute J -band magnitude. We note that the companion to HD 213240 was already published by Mugrauer et al. (2005b) and that Desidera &amp; Barbieri (2007) already reported a wide companion to HD 109749 but at a closer separation. Wewere able to discard three candidates photometrically before carrying out the spectroscopic follow-up i.e. both components of the system don't seem to be located at the same distance in the colour-absolute magnitude diagram (e.g. Fig. 1). We found these candidates around HD 10647, HD 103774 (also discarded astrometrically after inspection of the images), and HD 222582 (Table 1) but we do not discuss them further below. We estimate the typical dispersion observed in the vector point diagram for the sources identified in 2MASS and VHS to be of the order of 15-20 mas. In the case of three co-moving candidates to planet-host stars discussed at length in Section 6, we derive dispersions along both axes of approximately 15-20 mas yr Moreover, we should take into account possible orbital / motions, which we estimate to be less than 9-12 mas over 12 years (typical baseline between 2MASS and VHS). For our calculation, we considered again the case of the three confirmed companions (see Section 6). Their spectroscopic distances lie in the range 24-72 pc and their physical separations are larger than 3000 au. Moreover, we assumed longitudinal motions (the worst case) with an amplitude of twice the separation over half of the period of the binary systems. Hence, we conclude that orbital motion is negligible because its e ff ect is below the uncertainty on our proper motion determination. We note that Fig. 1. ( J -Ks , MJ ) colour-absolute magnitude diagram for our wide co-moving companion candidates to planet-host stars surveyed by VHS and 2MASS. Filled circles indicate candidates confirmed spectroscopically as companions, open triangles indicate very wide co-moving pairs, whereas crosses mark rejected candidates. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1208v1-figure-add52ee3-7f3b-45e0-87c3-aa99e3a128ef.jpg) Chanam´ e &amp; Gould (2004) found a general excess of proper motion di ff erences for separations larger than 42 arcsec but for closer systems. ## 2.4. Known planet-host star binaries in VHS We checked how many of the known planet-host stars within the VHS area considered in this work are known multiple systems in the literature to gauge the completeness of our search. We identified a total of six wide or relatively wide systems which we briefly describe below. - 1. HD109749 is a double G3IV star at 59 pc (van Leeuwen 2007) with a physical separation of approximately 750 au. The system harbours a 0.28 MJup planet with a period of 5.24 days (Nordstr¨ om et al. 2004; Fischer et al. 2006). - 2. HD126614 is a metal-rich (Fe H / =+ 0.56 dex) K0 star resolved in two components separated by 0.5 arcsec, corresponding to a projected physical separation of ∼ 36 au at a distance of 72.4 ± 5.4 pc (Howard et al. 2010). A second M dwarf, NLTT,37349, has been reported as a wide companion by Gould &amp; Chanam´ e (2004). - 3. HR6 ( = HD142) is a double star at 20.6 pc (van Leeuwen 2007) whose components are separated by approximately 85 au (Fabricius et al. 2002; Gray et al. 2006). The star is orbited by three planets announced by Tinney et al. (2002) and Wittenmyer et al. (2012). - 4. HR8734 ( = HD217107) is a G8IV double star at 19.72 pc (Montes et al. 2001; van Leeuwen 2007) made of the CDMJ22583 -0224A and CDMJ22583 -0224B components (Høg et al. 2000; Fabricius et al. 2002) with a separation of ∼ 10 au and orbited by two Jupiter-mass planets (Wright et al. 2009). - 5. HD28254 is a metal-rich (Fe H / =+ 0.36 dex) G1IV V / star at 56.2 pc (van Leeuwen 2007). It includes the components CCDMJ04248 -5037A; J = 6.395 mag) and CCDMJ04248 -5037B( J = 7.60 mag) separated by ∼ 240 au and a 1.16 MJup planet with a long period (P = 1116 days; Naef et al. 2010) - 6. Gl86 is a metal-poor G9V star (Torres et al. 2006) at 10.9 pc (van Leeuwen 2007) with a white dwarf companion (Gl 86B; Els et al. 2001; Mugrauer &amp; Neuh¨ auser 2005; Lagrange et al. 2006) at a separation of ∼ 17.4 au. Queloz et al. (2000) announced a 4 MJup planet orbiting Gl86 in ∼ 15.8 days. Wedonotrecover any of these planet-host stars because each component is very bright ( J 2MASS = 4.7-8.8 mag), leading to differences in the J -band magnitudes between 2MASS and VHS larger than 0.5 mag, our upper limit (Section 2.3). This e ff ect comes from the heavy saturation e ff ects seen for these stars on the VHS images. Furhermore, HR 8734 has a very low proper motion in both directions whereas the mean proper motions of HD109749and HD28254are slightly larger than 0.15 arcsec yr. / Moreover, HD 126614 is unresolved on the seeing-limited VHS images. ## 3. Spectroscopic follow-up of potential companions ## 3.1. NTT/EFOSC2 optical spectroscopy Weobtained optical spectroscopy of eight of the ten new systems with the ESO Faint Object Spectrograph and Camera (EFOSC2; Buzzoni et al. 1984) installed on the 3.58-m New Technology Telescope (NTT) in La Silla (Chile) on 11 August 2013 in visitor mode (Table 2). The observations of our candidates took place between UT = 0h and 5h. The night was non photometric with thin cirrus all night. The moon was illuminated at 48% and was up until UT = 5h. The seeing oscillated between 1 and 1.7 arcsec during that night. We observed three other candidates with the same set-up on 11 March 2014, a clear night with photometric conditions and seeing between 0.7 and 0.9 arcsec. We observed our targets at the end of the night when the moon had set. EFOSC2 is equipped with a Loral Lesser, thinned, / ultraviolet flooded 2048 × 2048 chip sensitive to optical wavelengths. The 2 × 2 binning mode o ff ers a pixel scale of 0.24 arcsec and a field-of-view of 4.1 × 4.1 arcmin. We used grism #5 with a slit of 1 arcsec for spectroscopic observations, covering the 520-935 nm wavelength range with a resolution of 1.54 nm. We obtained single or multiple on-source integrations between 300 sec and 1800sec at parallactic angle, depending on the brightness of the object (Table 2). We observed internal flat fields straight after the spectra of the targets to correct for fringing at red wavelengths. We also obtained bias and Helium-Argon arc frames during the afternoon preceding our observations as well as one spectro-photometric standard star per run observed in between our targets to calibrate them in flux (LTT7379 (G0); HR 5501 (B9.5 van Altena et al. 1995; Gontcharov 2006; van Leeuwen 2007; Pancino et al. 2012) . We carried out the data reduction of all optical spectra under the IRAF environment (Tody 1986, 1993) 7 . We subtracted the raw median-combined bias frame from the raw spectrum and divided by a normalised internal flat field obtained at the same 7 IRAF is distributed by the National Optical Astronomy Observatories, which are operated by the Association of Universities for Research in Astronomy, Inc., under cooperative agreement with the National Science Foundation Table 2. Log of the spectroscopic observations. We give two integration times for the SofI observations because we observed the object with the blue and red gratings to cover the full 0.9 to 2.5 micron wavelngth range. | R.A. | dec | Tel. Inst. | Date | ExpT | |-------------|--------------|--------------|--------------|------------| | hh:mm:ss.ss | ◦ :':' | | dd / mm / yy | sec | | 01:48:24.30 | - 53:33:49.6 | no spectrum | - | - | | 11:00:49.99 | - 11:03:43.2 | GTC OSIRIS | 04 / 11 / 13 | 240 | | 11:57:01.82 | - 12:45:39.0 | no spectrum | - | - | | 12:37:18.37 | - 39:53:14.8 | NTT EFOSC2 | 11 / 03 / 14 | 4 × 300 | | 12:40:36.35 | - 40:59:00.7 | NTT EFOSC2 | 11 / 08 / 13 | 300 | | 14:26:45.74 | - 05:10:20.9 | NTT EFOSC2 | 11 / 03 / 14 | 3 × 600 | | 14:28:42.31 | - 46:28:41.7 | NTT SofI | 29 / 12 / 12 | 960 + 1200 | | 15:58:41.31 | - 44:27:54.2 | NTT EFOSC2 | 11 / 08 / 13 | 1800 | | 16:01:36.44 | - 45:11:05.2 | NTT EFOSC2 | 11 / 03 / 14 | 3 × 600 | | 17:36:35.14 | - 42:35:39.8 | NTT EFOSC2 | 11 / 08 / 13 | 1200 | | 17:41:02.53 | - 42:34:54.8 | NTT EFOSC2 | 11 / 08 / 13 | 600 | | 21:51:24.97 | - 26:36:42.6 | NTT EFOSC2 | 11 / 08 / 13 | 1800 | | 22:31:08.09 | - 49:26:59.0 | NTT EFOSC2 | 11 / 08 / 13 | 600 | | 22:53:23.80 | - 47:54:01.8 | NTT EFOSC2 | 11 / 08 / 13 | 600 | | 23:13:45.29 | - 08:22:56.8 | NTT EFOSC2 | 11 / 08 / 13 | 600 | | 23:40:52.27 | - 05:45:01.4 | no spectrum | - | - | position of our targets to minimize the fringing in the red part of the spectrum. We extracted a one-dimensional (1D) spectrum, choosing an optimal sky background and aperture. In the case of multiple exposures, we combined the spectra before conducting the extraction. We calibrated our spectrum in wavelength with Helium-Argon arc lamps before calibrating it in flux, using the spectro-photometric standard star. The final optical spectra of our targets, normalised at 750 nm, are displayed in Figure 2. ## 3.2. GTC/OSIRIS optical spectroscopy We obtained low-resolution (R = 500) optical spectroscopy with the OSIRIS (Optical System for Imaging and low-intermediate Resolution Integrated Spectroscopy; Cepa et al. 2000) mounted on the 10.4-m GTC telescope in La Palma. We observed the potential companion to BD 10-3166 on 4 November 2013 in service mode (Table 2) as part of program GTC65-13B (PI Lodieu). OSIRIS is equipped with two 2048 × 4096 Marconi CCD4282 detectors o ff ering a field-of-view approximately 7 × 7 arcmin with an unbinned pixel scale of 0.125 arcsec. The night was dark with spectroscopic conditions and a seeing of 1.7 arcsec. We used a slit of 1.0 arcsec, the R500R grating and a single onsource integration of 240 sec. Bias frames, dome flat fields, and Neon, Xenon, and HgAr arc lamps were observed by the observatory sta ff during the afternoon preceding the observations. We reduced the OSIRIS optical spectrum in a very similar way as the EFOSC2 spectra. We substracted the raw spectrum by a median-combined bias and divided by a normalised median-combined dome flat field taken during the afternoon. We extracted optimally a 1D spectrum from the 2D image and calibrated that spectrum in wavelength with the lines from the combined arc lamp. We calibrated our spectrum in flux with the GD248 spectro-photometric standard (Farihi et al. 2005; Landolt &amp; Uomoto 2007) corrected for the second-order contamination. We corrected the second-order by joining the response of the detector from the observations of the standard star with the R500R grating and the same grating in combination with the Sloan z broad-band filter. The final GTC spectrum of Fig. 2. Low-resolution optical spectra for wide companion candidates obtained with NTT EFOSC2 and GTC OSIRIS (Table / / 2). The names of the candidate companions and final spectral types are written on top of each spectrum. Spectra are ordered by increasing spectral types. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1208v1-figure-0a39e341-6f55-40a2-9d84-7155d5beaf4a.jpg) 2MASS11004999 -1103432,normalised at 750nm, is displayed in Figure 2. ## 3.3. NTT/SofI near-infrared spectroscopy We performed near-infrared spectroscopy of the wide companion to HIP 70849 on 29 December 2012 with the Son of ISAAC (SofI) instrument mounted on the 3.5-m New Technology Telescope (NTT; Moorwood et al. 1998) in La Silla, Chile (Table 2). SofI is equipped with a Hawaii HgCdTe 1024 × 1024 array with squared 18.5 micron pixels and o ff ers imaging and spectroscopic capabilities. The pixel scale is 0.292 arcsec in the Large Field configuration, o ff ering a 4.9 × 4.9 arcmin field-ofview. We observed our target with the blue ZJ and red HK gratings, covering 0.9-1.64 and 1.53-2.52 microns, respectively, at a resolution of ∼ 600 with a slit of 1 arcsec. We set one and two ABBA patterns with individual on-source integrations to 60 sec repeated four and five times in the ZJ and HK gratings, respectively, to correct for the sky. The total integration times are 20 min and 40 min for the blue and red gratings, respectively. We observed a telluric standard immediately after our target at a similar airmass to correct for telluric absorption, HIP 68930 (A0V; Houk 1978; van Leeuwen 2007). Dome flats and halogen arc lamps were taken during the afternoon preceding the beginning of the night with the same set-up as our observations. Each individual frame was flat-fielded and sky-subtracted before a one-dimensional spectrum was extracted. We combined the individual one-dimensional spectra to increase the signal-tonoise. Then, we divided this combined spectrum of the target by the extracted spectrum of the standard star and later multiplied by an appropriate spectral template of spectral type A0 (containing the main hydrogen lines in absorption) smoothed to our resolution. The final one-dimensional spectrum of HIP 70849B, normalised at 1.25 microns, is shown in Figure 3 along with known T dwarf spectral standards taken from the IRTF SpeX library . / 8 8 http: // pono.ucsd.edu / ∼ adam browndwarfs spexprism / / / Fig. 3. NTT SofI / low-resolution near-infrared spectra of the T4.5 dwarf co-moving with HIP 70849 (black line). Overplotted are IRTF SpeX spectra of SDSS J000013.54 / + 255418.6 (T4.5; Knapp et al. 2004; Jameson et al. 2008; Burgasser et al. 2006) and the average spectrum of a T4 and T5 dwarf. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1208v1-figure-58fed95d-4401-4819-8d8d-c118ff4f0e58.jpg) ## 4. Optical spectral classification To classify the components of our potential wide multiple systems, we opted for the direct comparison of our optical spectra with known M dwarf templates created from the Sloan Digital Sky Survey (SDSS; York et al. 2000) spectroscopic database by Bochanski et al. (2007). This database contains a repository of good-quality M0-M9 spectra spanning the 380-940 nm wavelength range at a resolution of 2000. All spectra are wavelengthand flux-calibrated and corrected for telluric absorption. M dwarfs are classified based on the Hammer classification scheme (Covey et al. 2007) which uses the spectral energy distribution of stars over the 0.3-2.5 micron range using photometry from SDSS and 2MASS. We added sub-type to this list of templates to provide a complete list of spectral templates with optical spectral types accurate to one sub-type. In addition to this list of solar-metallicity M dwarf templates, we dowloaded the spectra of the brightest object of each subclass of low-metallicty M dwarfs, classified either as subdwarfs, extreme subdwarfs, or ultrasubdwarfs. The low-metallicity classification follow the scheme by L´ epine et al. (2007), which is an updated version of the original scheme proposed by Gizis (1997). For more details, we refer the reader to Espinoza Contreras et al. (2014). We compared each of our optical spectra to this grid of spectral templates and assign a spectral type to the nearest half subclass, which we consider as our (absolute) uncertainty. All our targets are either solar-type M dwarfs or M subdwarfs, except 2MASSJ12403635 -4059007 which we classify as a K7 dwarf (Table 1). ## 5. Absolute magnitude vs spectral type relation Throughout this section and the rest of the paper, we will make use of the absolute magnitude vs spectral type relations given in Table 3 to derive spectroscopic distances for the co-moving companion candidates to planet-host stars. We calculated the absolute J -, H -, and Ks -band magnitudes using the 8 pc census of Mdwarfs listed in Table 4 of Kirkpatrick et al. (2012). We com- Table 3. Absolute J , H , and Ks magnitudes as a function of spectral types for M dwarfs with spectral types between M0 and M7 drawn from the census of 8 pc compiled by Kirkpatrick et al. (2012). The last column indicates the number of stars used to derive the average absolute magnitudes | SpType | M J | M H | M K s | Nb | |----------|----------------|----------------|---------------|------| | | mag (err) | mag | mag | | | M0.0 | 6.273 (0.322) | 5.577 (0.440) | 5.408 (0.337) | 3 | | M0.5 | 6.761 (0.258) | 6.031 (0.230) | 5.888 (0.200) | 1 | | M1.0 | 6.393 (0.089) | 5.736 (0.144) | 5.491 (0.125) | 2 | | M1.5 | 6.943 (0.540) | 6.350 (0.572) | 6.063 (0.537) | 8 | | M2.0 | 7.134 (0.584) | 6.554 (0.608) | 6.253 (0.597) | 4 | | M2.5 | 7.255 (0.288) | 6.667 (0.297) | 6.409 (0.294) | 5 | | M3.0 | 7.758 (0.650) | 7.206 (0.664) | 6.936 (0.645) | 9 | | M3.5 | 8.025 (0.458) | 7.460 (0.454) | 7.183 (0.464) | 14 | | M4.0 | 8.558 (0.518) | 8.027 (0.567) | 7.721 (0.563) | 10 | | M4.5 | 9.038 (0.420) | 8.495 (0.440) | 8.183 (0.438) | 7 | | M5.0 | 9.617 (0.121) | 9.029 (0.164) | 8.685 (0.136) | 3 | | M5.5 | 9.671 (0.392) | 9.101 (0.397) | 8.745 (0.394) | 7 | | M6.0 | 10.439 (0.025) | 9.883 (0.069) | 9.535 (0.120) | 2 | | M6.5 | 10.505 (0.067) | 9.899 (0.079) | 9.552 (0.089) | 2 | | M7.0 | 10.776 (0.026) | 10.126 (0.022) | 9.739 (0.027) | 1 | piled all M dwarfs with spectral types between M0 and M7 with parallaxes and accurate spectral types. We computed the average values (Table 3), after excluding some outliers and members of multiple systems with unresolved 2MASS photometry. We also list in brackets the dispersion in absolute magnitudes taken from the full sample of objects considered for each sub-type. ## 6. New wide companions to planet-host stars In this section, we only describe the properties of the three planet-host stars with most probable wide companions and derive their main properties (Table 1) thanks to our spectroscopic follow-up (Section 3). The other companions, located at very wide separations or rejected as co-moving companions to planethost stars are discussed in the appendix A. ## 6.1. HD 126614 Howard et al. (2010) announced a 0.38 MJup planet with a period of 1244 days orbiting the metal-rich (Fe H / =+ 0.56 dex) K0 star, HD 126614. These authors also resolved HD 126614 in two components separated by 0.5 arcsec (Howard et al. 2010), corresponding to a projected physical separation of ∼ 36 au at a distance of 72.4 ± 5.4 pc (van Leeuwen 2007). However, if we apply a spectral type vs absolute magnitude relation for K0 mainsequence stars using Gl 68 as a K0 template at 7.53 pc ( J = 3.83 mag; Gray et al. 2006; Kirkpatrick et al. 2012), we derive a spectroscopic distance of ∼ 40 pc for HD 126614. This discrepancy might arise from two facts. On the one hand, HD 126614 is not a main-sequence K0 star but rather a metal-rich K0 subgiant because of its temperature (5541-5645K) and mass (1.031.25 M /circledot ; Howard et al. 2010; Santos et al. 2013). On the other hand, HD126614 is a metal-rich star, with [Fe H] / = 0.46-0.60 (Howard et al. 2010; Santos et al. 2013). Hence, the above relationship for solar-type K0 main-sequence star is not applicable so we favour the Hipparcos distance. We identified a relatively close companion at 41.8 arcsec from the planet-host system, previously reported by Gould &amp; Chanam´ e (2004) as being NLTT 37349. We confirm the common proper motion of the pair after examination of the optical and infrared images of the system taken by the Digital Sky Survey, 2MASS, and VHS over a period of more than 50 years. The common motion of the two sources over such long period adds strong credibility to their association. We obtained an optical spectrum of this close companion and classify it as M4.5 ± 0.5 dwarf. If a true companion, this M4.5 dwarf represents a very interesting M dwarf with supersolar metallicity that is amenable for further investigation. We derive a spectroscopic distance of 41.3 pc with a possible range of 29-65 pc, assuming that the absolute magnitude vs spectral type relation is valid for (single) solar-metallicity M dwarfs. We note that, according to the Padova tracks (Bertelli et al. 2008), a 0.16 M /circledot dwarf is less luminous ( ∼ 0.07 dex), cooler ( ∼ 200K), and fainter by approximatly 0.1 mag in the near-infrared than a solar-metallicity object with the same mass. Moreover, if this companion is an equal-mass binary, it would lie at a distance greater by 40% (41-91 pc). This value is in agreement with the spectroscopic distance of the primary and the range of possible distances is within 1.5 σ of the Hipparcos distance. Hence, we argue that these two objects form a physical pair with a projected physical separation of approximately 3000 au (assuming a distance of 72.4 pc). ## 6.2. HD 213240 Santos et al. (2001) reported an eccentric (0.45 ± 0.05) planet with a mass of 4.5 MJup and a period of ∼ 950 days, orbiting HD213240, an old (5.11 Gyr) G0 G1V star (Houk 1978) / at 40.6 ± 1.0 pc van Leeuwen (2007) and with a metallicity of [Fe H] / = 0.16 (Nordstr¨ om et al. 2004). We unveiled a potential wide companion to HD 213240, located at 1.6 arcmin only, the closest companion found among our candidates. We classify this companion as a M5-M5.5 dwarf, translating into a spectroscopic distance of 29-42 pc. We conclude that these two objects form a co-moving pair at a projected physical separation of ∼ 3900 au, adopting the distance of the primary. ## 6.3. A new brown dwarf companion to HIP 70849 S´ egransan et al. (2011) reported a 9 ± 6 MJup planet orbiting HIP70849 in a very eccentric orbit (0.60 ± 0.13) associated to a long period of ∼ 10000 days. The planet-host star is a low-mass star (0.63 ± 0.03 M /circledot ) of spectral type K7V located 24.0 ± 1.2 pc (van Leeuwen 2007) from the Sun, an age of 1-5 Gyr, and a metallicity possibly close to solar. We detected a potential wide proper motion companion at 6.3 arcmin from HIP 70849. We unambiguously confirm the association of the potential brown dwarf companion and the planet-host in the vector point diagram and in the ( J -K ,M ) J colour-absolute magnitude diagram displayed in Fig. 4. We obtained near-infrared spectroscopy with NTT SofI (Section 3.3), / classifying the companion as a T4.5 dwarf (Fig. 3), hence, confirming its substellar status. It is the second brown dwarf directly imaged around a planet-host star after HD 3651 (Mugrauer et al. 2006b) and possibly the first brown dwarf binary at wide separation from a star orbited by a 9 MJup planet. To check whether the binary is physically bound or a chance alignment, we have estimated the probability that the companion is a field T dwarf contaminant in our search. First, we have estimated that the expected number of T dwarfs in the full area of our search ( ∼ 150 deg 2 around the full sample of 49 stars) is ∼ 1.3. We have adopted a density of 5 × 10 -3 objects pc / -3 (Burgasser et al. 2003a) and an average absolute magnitude of M J ∼ 15 mag (Vrba et al. 2004) for such objects, and considered that our search is limited to J = 17 mag. Secondly, we have estimated the probability that one of this object has a proper motion within 40 mas yr of the primary's proper motion in each di-/ rection. We have determined that about 20% of the high proper motion objects in our full catalogue have such similar proper motion as HD 70849. Hence, we estimate that the final probability that a field T dwarf lies at separations less than 60 arcmin of one of our primaries is of 0.27. If we take into account that the T4.5 was found at a separation of 6.29 arcmin from the primary, the probability of contamination decrease by a factor of 100, yielding a probability of 0.027. These estimates combined with the similar spectroscopic distances derived for both components support that the T4.5 is a true physical companion of the HD70849 planet-host star. ## 7. Stability of wide companions Three of our planet-host star companions (HIP70849B, HD213240B, HIP126614B) are located at angular separations between 0.7 and 6.3 arcmin, corresponding to physical separations in the 3000-9100 au range. The mass of their primaries lie between 0.63 and 1.22 M /circledot . To study the dynamical stability of these systems, we can investigate their separations versus total masses (see Fig. 16 in Close et al. 2007). From this kind of diagrams, we can see that these three systems are located in the region that is dynamically stable for the typical stellar densities of the Solar vicinity. However, the other planet-host star companions are located at physical separations of 100,000-150,000 au (0.50-0.75 pc). Given that the mass of their primaries are about 1 M /circledot , these extremely wide binary systems are not dynamically stable at the typical density of field stars and the age of the Solar vicinity but do exist (Scholz et al. 2008; Shaya &amp; Olling 2011). Although binaries with separations larger than 10,000 au and up to 200,000 au have been reported in the literature (e.g. Makarov et al. 2008; Quinn &amp; Smith 2009; Poveda et al. 2009; Raghavan et al. 2010; Deacon et al. 2012), most of these systems are either young or expected to be disrupted at older ages or are halo binaries. Another possibility is that these systems could be disrupted binaries that drift apart quite slowly because disruption does not necessarily denote a violent phenomenon, suggesting that these pairs would survive as common proper motion associations for much longer than their disruption time-scales (Shaya &amp; Olling 2011). Following the analytical solutions given in Weinberg et al. (1987) and Binney &amp; Tremaine (1987) we estimate the timescale for disruption of these systems in an environment with typical densities of the solar vicinity ( ∼ 0.07 object pc -3 ) of a several hundred million years. This is much lower than the expected age of these systems, considering that we have not found any evidence of youth in the spectra of the secondaries. These estimations suggest that these systems are not physically bound. Given the large uncertainties in the determination of their distances, they are either objects with similar proper motions that lie along the same line of sight by chance, but lie at di ff erent distances, or they are systems located at the same distance and share similar projected velocities. This may be the result of a common origin or a similar dynamical evolution, in the same way as stars which are members to moving groups. We have estimated the probability of these five wide companions to be truly associated with the planet-host stars. We counted the numbers of high proper motion stars in the full Fig. 4. Left: Proper motion diagram for all point sources within 60 arcmin from the primary stars with confirmed wide common proper motion companions: HD 126614 (top), HD 213240 (middle), HIP 70849 (bottom). Right: Colour-magnitude diagrams showing the position of the three planet-host stars and their companions. Overplotted are known M, L and T dwarfs with parallaxes from Leggett et al. (2000a), Vrba et al. (2004), and Kirkpatrick et al. (2012). 8 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1208v1-figure-0dce4826-724a-4678-bd1d-06d94d31acff.jpg) 2MASS-VHS catalogue with similar motions as the planet-host star. We found 19553 objects that fulfill those criteria, implying that we would expect 9.9 ± 3.1 contaminants (assuming Poisson errors) around the 49 planet-host stars located in 6200 square degrees surveyed by the VHS (Table 1).. However, this number represents an upper limit because we have added a distance criterion to our sample, based on our spectroscopic follow-up. We rejected eight of our candidates, in agreement with the minimum of seven contaminants. Additionally, we have five very wide companions sharing the same proper motion and distance as the planet-host stars. We conclude that among the 13 doubtful candidate companions in Table 1 a few could be part of comoving groups. We have three very wide companions with spectral types later than M5, whose number of field objects is typically lower than earlier spectral types, suggesting that those are most likely to be associated to th planet-host star (if any of these are). This result is not so surprising and in line with the conclusions of Chanam´ e &amp; Gould (2004) who argue that binaries with separations larger than 8.3 arcmin belonging to the thin disk can not be identified reliably. ## 8. Multiplicity of planet-host stars We have cross-correlated approximately 6200 square degrees of the Southern sky imaged by VHS and 2MASS. We found 37 planet-host stars (20 G, 7 F, 10 K, 5 M) with a full VHS covereage within a radius of 60 arcmin and separations larger than 2 arcsec between 2MASS and VHS. In this complete sample, we confirmed spectroscopically one substellar companion, two M dwarf companions, and another four (or five if we add the companion to 91Aqr) at separations larger than 100,000 au. If we consider only dynamically-stable systems (see Section 7), we derive a frequency of wide ( &gt; 50-150 au) stellar and substellar companions to planet-host stars of 2 37 / = 5.4 ± 3.8% and 1 37 / = 2.7 ± 2.7% (1 σ confidence level with poissonian errors), respectively. Note that we have excluded from this estimate the known companions described in Section 2.4 because we do not recover them in our study (only two have projected separations larger than our lower limit). In any case, our multiplicity estimates represent lower limits to the true binary frequency of planet-host stars because our study is not sensitive to close systems (e.g. HD 126614 (K0 + M; Howard et al. 2010). Overall, our binary frequencies of a few percents are in agreement with the number of wide substellar companions to young solar analogues (0.5-6.3% for separations in the 28-1590 au range; Metchev &amp; Hillenbrand 2009), M dwarfs (0.1-2.2% for separations larger than ∼ 120 au ; Radigan et al. 2008), the frequency of 1 ± 1% of brown dwarf companions to GKM stars in the 75-300 au range (McCarthy &amp; Zuckerman 2004) or the lack of planetary-mass objects more massive than 5-10 MJup around young nearby stars beyond 36-65 au (Masciadri et al. 2005). Similarly, Raghavan et al. (2010) derived a stellar multiplicity of 7.3% and 2.2% among solar-type stars within 25 pc for projected separations in the 1000-10,000 au and 10,00050,000 au ranges, respectively (their Figure 11 and Table 5). These estimates are in good agreement with our results. If we apply our photometric and astrometric selection constraints to the 454 solar-type stars listed in Raghavan et al. (2010), we found 11 wide common proper motion candidates to 74 stars (21 F, 33 G, 20 K) imaged by the VHS at the time of writing, corresponding to 11 74 / = 13.5 ± 4.0% if all are true companions. Only one candidate lies close to its G-type primary whereas the others lie at projected physical separations larger than 10,000 au. This value is slightly larger than our determination, but in agreement within the error bars. In conclusion, the frequency of wide stellar companions to solar-type stars with or without planets (alt. closein planets, radial velocity planets) seems similar whereas there might be an excess of wide substellar companions to planet-host stars, although this should be taken with caution because this determination is based on one case only. ## 9. Dynamical properties planet-host stars In Fig. 5, we plot three diagrams depicting the period-mass, period-eccentricity, and mass-eccentricity relations for planethost stars in multiple systems (filled symbols) or isolated (open symbols). We have only included the 49 planet-host stars (open symbols) in the area in common between VHS and 2MASS. The planet-host stars with wide companions (filled black circles) are taken from Eggenberger et al. (2004) and Mugrauer et al. (2007a) and our new discoveries added as red dots with open squares. At the bottom right-hand side of Fig. 5 we have added a diagram showing the planet semi-major axis as a function of the binary projected separation of known planet-host stars from Mugrauer et al. (2007a) and our three new discoveries. We see a homogeneous distribution for the range shown. We observe that our survey fills the top right part of this diagram, extending the discovery to long periods and large binary separations with a special mention to the substellar companion. Zucker &amp; Mazeh (2002) and Eggenberger et al. (2004) found two main trends in the period-mass diagram (top left panel in Fig. 5), facts supported by the enhanced number of multiple systems discussed in Mugrauer et al. (2007a). On the one hand, no stars with planets more massive than 2.5 Jupiter masses are found at periods less than 40 days. On the other hand, stars in multiple systems have planets less massive than 5 MJup for periods longer than 100 days. Our discoveries confirm the latter trend where the systems with the most massive planets exhibit periods longer than 950 days. We also found a wide companion to HD 126614, orbited by a small planet with a period longer than than 1000 days. However, the former trend does not seem to hold because over 80 short period ( &lt; 40 days) planets more massive than 2.5 MJup have now been announced around stars by several programs like the COnvection ROtation and planetary Transits (Corot) (Barge et al. 2006) and Kepler (Borucki et al. 2010) missions or the Hungarian-made Automated Telescope (HATNet; Bakos et al. 2002) and SuperWASP (Pollacco et al. 2006) projects, among others. These objects are not plotted in fig. 5 because they lie outside the VHS coverage but half of them should be observed by the VHS during the next years because they are in the Southern hemisphere. We note that only four of these stars with short-period planets more massive than 2.5 MJup were known prior to 2007, at the time of Mugrauer et al. (2007a) publication. Moreover, most of these stars have small proper motions, typically less than 0.2 arcsec yr (our lower limit for the as-/ trometric search), which makes the search for co-moving companions extremely hard. This bias can be easily understood in the case of CoroT, Kepler, HAT,Net and SuperWASP surveys, which are dedicated to the search for planetary transits without a specific requirement in proper motion. We observe that the trend for low eccentricities and short periods among planet-host multiple systems holds (top right panel in Fig. 5) because we do not find any new candidate in this part of the diagram. We note that only one system, not included in the plots shown by Mugrauer et al. (2007a), has a short period ( &lt; 40 days) and an eccentricity higher than 0.05, the possible planet 'e' around 55 Cnc A (Wisdom 2005) which remains to be confirmed. We also find that our discoveries confirm the Fig. 5. Diagrams showing the period-mass (top left), period-eccentricity (top right), mass-eccentricity (bottom left), and binary projected separation vs planet semi-major axis (bottom right) relations for single stars with planets within the VHS area considered in this work and multiple-star systems with planets (filled symbols). Black dots represent known planet-host stars previously published in the literature whereas red dots with open squares show our three best new discoveries. Plots amended from the original version published by Eggenberger et al. (2004) and later updated by Mugrauer et al. (2007a), the lower right plot being added. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1208v1-figure-3f569160-839c-4029-be85-9a4f1eaeb2ca.jpg) trend seen in the mass-eccentricity diagram (bottom left panel in Fig. 5), where more massive planets have on average higher mean eccentricities. Overall, we corroborate the conclusions of Desidera &amp; Barbieri (2007) that wide companions seem to have less influence on the properties of planets than closer systems. mon proper motion companions lies between 19% and 50%. We derive frequencies of stellar and substellar wide companions to planet-host stars of 5.4 ± 3.8% and 2.7 ± 2.7%, respectively. ## 10. Conclusions and future work We identified new potential common proper motion wide companions to known stars harbouring extrasolar planets. We confirmed spectroscopically two M dwarf and one mid-T dwarf companions sharing the same distance and proper motion as the planet-host star. One companion to 91 Aqr remains as a candidate until radial velocity is available. Moreover, four candidates lie further than 100,000 au suggesting that these systems are not bound but might originate from a common stellar origin, share a similar dynamical evolution, or are disrupted binaries drifting away slowly from each other. The highlight of our search is the discovery of the second brown dwarf companion to a planet-host star, HIP 70849, which might be an equalmass binary. Overall, our success rate in confirming wide com- Considering the success of our search for wide companions to planet-host stars in a few thousands square degrees of the Southern sky imaged by the VHS, we plan to extend our automatic selection procedure to the entire Southern sky at the end of the VHS lifetime. Moreover, we plan to apply our method to Northern sources cross-matching the UKIRT Infrared Deep Sky Survey (UKIDSS; Lawrence et al. 2007) with 2MASS to provide a full view of the binarity among planet-host stars. Additional studies of these new systems should include highresolution imaging with adaptive optics techniques to look for close companions and radial velocity or transit searches to detect any additional exoplanet(s) in those systems. Acknowledgements. NL was funded by the Ram´ on y Cajal fellowship number 08-303-01-02. NL and VJSB are financially supported by the projects AYA2010-19136 and AYA2010-20535 from the Spanish Ministry of Economy and Competitiveness (MINECO), respectively. APG has been supported by Project No. 15345 PI 10 from the Fundaci´ on S´ eneca and MINECO under the / / grant AYA2011-29024. This work is based on observations collected at the European Southern Observatory, Chile, under programme numbers 090.C-0791(A), 091.C-0862(B), and 092.C-0874. Based on observation obtained as part of the VISTA Hemisphere Survey, ESO progamme, 179.A-2010 (PI: McMahon). This work is based on observations (program GTC65-13B; PI Lodieu) made with the Gran Telescopio Canarias (GTC), operated on the island of La Palma in the Spanish Observatorio del Roque de los Muchachos of the Instituto de Astrof´ ısica de Canarias. The VISTA Data Flow System pipeline processing and science archive are described in Irwin et al. (2004) and Cross et al. (2012). We have used data from the first data release (VHS DR1) described in McMahon (2012). We are grateful to the Cambridge Astronomy Survey Unit and the VISTA Science Archive at the Wide Field Astronomy Unit, Edinburgh, for providing us with the reduced data and catalogues. This research has made use of the Simbad and Vizier databases, operated at the Centre de Donn´ ees Astronomiques de Strasbourg (CDS), and of NASA's Astrophysics Data System Bibliographic Services (ADS). This publication makes use of data products from the Two Micron All Sky Survey (2MASS), which is a joint project of the University of Massachusetts and the Infrared Processing and Analysis Center California Institute of Technology, / funded by the National Aeronautics and Space Administration and the National Science Foundation. This research has benefitted from the exoplanet.eu webpage and the SpeX Prism Spectral Libraries, maintained by Adam Burgasser at http: // pono.ucsd.edu / ∼ adam browndwarfs spexprism. / / ## References Bakos, G. A., L´ az´r, J., Papp, I., S´ri, P., &amp; Green, E. M. 2002, PASP , 114, 974 ´ a a Barge, P., L´ger, A., Ollivier, M., et al. 2006, in ESA Special Publication, V ol. e 1306, ESA Special Publication, ed. M. Fridlund, A. Baglin, J. Lochard, &amp; L. Conroy, 83 Bertelli, G., Girardi, L., Marigo, P., &amp; Nasi, E. 2008, A&amp;A, 484, 815 Binney, J. &amp; Tremaine, S. 1987, Galactic dynamics Bochanski, J. J., West, A. A., Hawley, S. L., &amp; Covey, K. R. 2007, AJ, 133, 531 Bonavita, M. &amp; Desidera, S. 2007, A&amp;A, 468, 721 Borucki, W. J., Koch, D., Basri, G., et al. 2010, 327, 977 Boss, A. P. 2006, ApJ, 641, 1148 Burgasser, A. J. 2004, ApJS, 155, 191 Burgasser, A. J. 2007, ApJ, 658, 617 Burgasser, A. J., Geballe, T. R., Leggett, S. K., Kirkpatrick, J. D., &amp; Golimowski, D. A. 2006, ApJ, 637, 1067 Burgasser, A. J., Kirkpatrick, J. D., Brown, M. E., et al. 1999, ApJL, 522, L65 Burgasser, A. J., Kirkpatrick, J. D., McElwain, M. W., et al. 2003a, AJ, 125, 850 Burgasser, A. J., McElwain, M. W., &amp; Kirkpatrick, J. D. 2003b, AJ, 126, 2487 Burningham, B., Cardoso, C. V., Smith, L., et al. 2013, MNRAS, 433, 457 Burningham, B., Pinfield, D. J., Lucas, P. W., et al. 2010, MNRAS, 406, 1885 Butler, R. P., Marcy, G. W., Williams, E., Hauser, H., &amp; Shirts, P. 1997, ApJL, 474, L115 Butler, R. P., Tinney, C. G., Marcy, G. W., et al. 2001, ApJ, 555, 410 Butler, R. P., V ogt, S. S., Marcy, G. W., et al. 2000, ApJ, 545, 504 Butler, R. P., Wright, J. T., Marcy, G. W., et al. 2006, ApJ, 646, 505 Buzzoni, B., Delabre, B., Dekker, H., et al. 1984, The Messenger, 38, 9 Cepa, J., Aguiar, M., Escalera, V. G., et al. 2000, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 4008, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, ed. M. Iye &amp; A. F. Moorwood, 623-631 Chanam´ e, J. &amp; Gould, A. 2004, ApJ, 601, 289 Chauvin, G., Lagrange, A.-M., Udry, S., et al. 2006, A&amp;A, 456, 1165 Chiu, K., Fan, X., Leggett, S. K., et al. 2006, AJ, 131, 2722 Close, L. M., Zuckerman, B., Song, I., et al. 2007, ApJ, 660, 1492 Covey, K. R., Ivezi´ c, ˇ ., Schlegel, D., et al. 2007, AJ, 134, 2398 Z Cross, N. J. G., Collins, R. S., Mann, R. G., et al. 2012, A&amp;A, 548, A119 Cruz, K. L., Reid, I. N., Kirkpatrick, J. D., et al. 2007, AJ, 133, 439 Cutri, R. M., Skrutskie, M. F., van Dyk, S., et al. 2003, 2MASS All Sky Catalog of point sources, 2246 Dalton, G. B., Caldwell, M., Ward, A. K., et al. 2006, in Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, Vol. 6269, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series Deacon, N. R., Liu, M. C., Magnier, E. A., et al. 2012, ApJ, 757, 100 Delfosse, X., Tinney, C. G., Forveille, T., et al. 1997, A&amp;A, 327, L25 Desidera, S. &amp; Barbieri, M. 2007, A&amp;A, 462, 345 Eggenberger, A., Mayor, M., Naef, D., et al. 2006, A&amp;A, 447, 1159 Eggenberger, A., Udry, S., &amp; Mayor, M. 2004, A&amp;A, 417, 353 Els, S. G., Sterzik, M. F., Marchis, F., et al. 2001, A&amp;A, 370, L1 - Emerson, J. P. 2001, in Astronomical Society of the Pacific Conference Series, Vol. 232, The New Era of Wide Field Astronomy, ed. R. Clowes, A. Adamson, &amp; G. Bromage, 339 - Emerson, J. P., Irwin, M. J., Lewis, J., et al. 2004a, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 5493, Optimizing Scientific Return for Astronomy through Information Technologies, ed. P. J. Quinn &amp; A. Bridger, 401-410 - Emerson, J. P., Sutherland, W. J., McPherson, A. M., et al. 2004b, The Messenger, 117, 27 - Epchtein, N., de Batz, B., &amp; Capoani, L. e. 1997, The Messenger, 87, 27 Fabricius, C., Høg, E., Makarov, V . V ., et al. 2002, A&amp;A, 384, 180 - Farihi, J., Becklin, E. E., &amp; Zuckerman, B. 2005, ApJS, 161, 394 Fischer, D., Valenti, J. A., &amp; Marcy, G. 2004, in IAU Symposium, V ol. 219, Stars as Suns : Activity, Evolution and Planets, ed. A. K. Dupree &amp; A. O. Benz, 29 Fischer, D. A., Laughlin, G., Marcy, G. W., et al. 2006, ApJ, 637, 1094 Geballe, T. R., Knapp, G. R., Leggett, S. K., et al. 2002, ApJ, 564, 466 Ginski, C., Mugrauer, M., Seeliger, M., &amp; Eisenbeiss, T. 2012, MNRAS, 421, 2498 - Gizis, J. E. 1997, AJ, 113, 806 - Gontcharov, G. A. 2006, Astronomy Letters, 32, 759 - Gould, A. &amp; Chanam´ e, J. 2004, ApJS, 150, 455 - Gould, A. &amp; Salim, S. 2003, ApJ, 582, 1001 - Gray, R. O., Corbally, C. J., Garrison, R. F., et al. 2006, AJ, 132, 161 - Haghighipour, N., Butler, R. P., Rivera, E. J., Henry, G. W., &amp; V ogt, S. S. 2012, ApJ, 756, 91 - Hambly, N. C., Collins, R. S., Cross, N. J. G., et al. 2008, MNRAS, 384, 637 Hawley, S. L., Gizis, J. E., &amp; Reid, I. N. 1996, AJ, 112, 2799 - Høg, E., Fabricius, C., Makarov, V . V ., et al. 2000, A&amp;A, 355, L27 - Hog, E., Kuzmin, A., Bastian, U., et al. 1998, A&amp;A, 335, L65 - Houk, N. 1978, Michigan catalogue of two-dimensional spectral types for the HD stars Howard, A. W., Johnson, J. A., Marcy, G. W., et al. 2010, ApJ, 721, 1467 Irwin, M. J., Lewis, J., Hodgkin, S., et al. 2004, in Optimizing Scientific Return for Astronomy through Information Technologies. Edited by Quinn, Peter J.; Bridger, Alan. Proceedings of the SPIE, Volume 5493, pp. 411-422 (2004)., ed. P. J. Quinn &amp; A. Bridger, 411-422 Jameson, R. F., Casewell, S. L., Bannister, N. P., et al. 2008, MNRAS, 384, 1399 Jenkins, J. S., Jones, H. R. A., Go´dziewski, K., et al. 2009, MNRAS, 398, 911 z Jenkins, J. S., Murgas, F., Rojo, P., et al. 2011, A&amp;A, 531, A8 Kirkpatrick, J. D., Cushing, M. C., Gelino, C. R., et al. 2011, ApJS, 197, 19 Kirkpatrick, J. D., Gelino, C. R., Cushing, M. C., et al. 2012, ApJ, 753, 156 Kirkpatrick, J. D., Looper, D. L., Burgasser, A. J., et al. 2010, ApJS, 190, 100 Knapp, G. R., Leggett, S. K., Fan, X., et al. 2004, AJ, 127, 3553 - Koen, C., Kilkenny, D., van Wyk, F., &amp; Marang, F. 2010, MNRAS, 403, 1949 Konacki, M. 2005, Nat, 436, 230 - Lagrange, A.-M., Beust, H., Udry, S., Chauvin, G., &amp; Mayor, M. 2006, A&amp;A, 459, 955 - Landolt, A. U. &amp; Uomoto, A. K. 2007, AJ, 133, 768 - Lawrence, A., Warren, S. J., Almaini, O., et al. 2007, MNRAS, 379, 1599 Leggett, S. K., Allard, F., Dahn, C., et al. 2000a, ApJ, 535, 965 - Leggett, S. K., Geballe, T. R., Fan, X., et al. 2000b, ApJL, 536, L35 - Leggett, S. K., Marley, M. S., Freedman, R., et al. 2007, ApJ, 667, 537 - L´ epine, S., Rich, R. M., &amp; Shara, M. M. 2007, ApJ, 669, 1235 - Liu, M. C., Leggett, S. K., &amp; Chiu, K. 2007, ApJ, 660, 1507 - Lodieu, N., Pinfield, D. J., Leggett, S. K., et al. 2007, MNRAS, 379, 1423 - Mace, G. N., Kirkpatrick, J. D., Cushing, M. C., et al. 2013, ApJS, 205, 6 Makarov, V. V., Zacharias, N., &amp; Hennessy, G. S. 2008, ApJ, 687, 566 - Mart´ ın, E. L., Basri, G., Delfosse, X., &amp; Forveille, T. 1997, A&amp;A, 327, L29 - Mart´ ın, E. L., Delfosse, X., Basri, G., et al. 1999, AJ, 118, 2466 - Masciadri, E., Mundt, R., Henning, T., Alvarez, C., &amp; Barrado y Navascu´ es, D. 2005, ApJ, 625, 1004 - Mason, B. D., Wyco ff , G. L., Hartkopf, W. I., Douglass, G. G., &amp; Worley, C. E. 2001, AJ, 122, 3466 - Mayor, M. &amp; Queloz, D. 1995, Nat, 378, 355 - McCarthy, C. &amp; Zuckerman, B. 2004, AJ, 127, 2871 - McMahon, R. 2012, in Science from the Next Generation Imaging and Spectroscopic Surveys - Metchev, S. A. &amp; Hillenbrand, L. A. 2009, ApJS, 181, 62 - Minniti, D., Butler, R. P., L´pez-Morales, M., et al. 2009, ApJ, 693, 1424 o - Mitchell, D. S., Re ff ert, S., Trifonov, T., Quirrenbach, A., &amp; Fischer, D. A. 2013, ArXiv e-prints - Montes, D., L´pez-Santiago, J., G´ alvez, M. C., et al. 2001 , MNRAS, 328, 45 o - Moorwood, A., Cuby, J.-G., &amp; Lidman, C. 1998, The Messenger, 91, 9 - Moriwaki, K. &amp; Nakagawa, Y. 2004, ApJ, 609, 1065 - Mugrauer, M., Neuhaeuser, R., Guenther, E., &amp; Mazeh, T. 2005a, Astron. Nachr., 326, 629 - Mugrauer, M. &amp; Neuh¨ auser, R. 2005, MNRAS, 361, L15 - Mugrauer, M., Neuh¨ auser, R., &amp; Mazeh, T. 2007a, A&amp;A, 469, 75 5 - Mugrauer, M., Neuh¨ auser, R., Mazeh, T., Alves, J., &amp; Guenth er, E. 2004a, A&amp;A, 425, 249 - Mugrauer, M., Neuh¨ auser, R., Mazeh, T., Guenther, E., &amp; Fer n´ andez, M. 2004b, Astron. Nachr., 325, 718 - Mugrauer, M., Neuh¨ auser, R., Mazeh, T., et al. 2006a, Astro n. Nachr., 327, 321 Mugrauer, M., Neuh¨ auser, R., Seifahrt, A., Mazeh, T., &amp; Gue nther, E. 2005b, A&amp;A, 440, 1051 - Mugrauer, M., Seifahrt, A., &amp; Neuh¨ auser, R. 2007b, MNRAS, 3 78, 1328 - Mugrauer, M., Seifahrt, A., Neuh¨ auser, R., &amp; Mazeh, T. 2006 b, MNRAS, 373, L31 - Naef, D., Mayor, M., Lo Curto, G., et al. 2010, A&amp;A, 523, A15 - Nakajima, T., Oppenheimer, B. R., Kulkarni, S. R., et al. 1995, Nat, 378, 463 Nelson, R. P. 2003, MNRAS, 345, 233 - Nordstr¨ om, B., Mayor, M., Andersen, J., et al. 2004, A&amp;A, 41 8, 989 - O'Toole, S. J., Butler, R. P., Tinney, C. G., et al. 2007, ApJ, 660, 1636 Pancino, E., Altavilla, G., Marinoni, S., et al. 2012, MNRAS, 426, 1767 - Patience, J., Ghez, A. M., Reid, I. N., &amp; Matthews, K. 2002, AJ, 123, 1570 - Perryman, M. A. C., Lindegren, L., Kovalevsky, J., Hoeg, E., &amp; 15 co-authors. 1997, A&amp;A, 323, L49 - Pinfield, D. J., Burningham, B., Tamura, M., et al. 2008, MNRAS, 390, 304 Pollacco, D. L., Skillen, I., Collier Cameron, A., et al. 2006, PASP, 118, 1407 Poveda, A., Allen, C., Costero, R., Echevarr´ ıa, J., &amp; Hern´ andez-Alc´ antara, A. 2009, ApJ, 706, 343 - Queloz, D., Mayor, M., Weber, L., et al. 2000, A&amp;A, 354, 99 - Quinn, D. P. &amp; Smith, M. C. 2009, MNRAS, 400, 2128 - Radigan, J., Lafreni`re, D., Jayawardhana, R., &amp; Doyon, R. 2008, ApJ, 689, 471 e - Raghavan, D., Henry, T. J., Mason, B. D., et al. 2006, ApJ, 646, 523 - Raghavan, D., McAlister, H. A., Henry, T. J., et al. 2010, ApJS, 190, 1 - Rebolo, R., Zapatero-Osorio, M. R., &amp; Mart´ ın, E. L. 1995, Nat, 377, 129 - Reid, I. N., Kirkpatrick, J. D., Liebert, J., et al. 1999, ApJ, 521, 613 - Sa ff e, C., G´mez, M., &amp; Chavero, C. 2005, A&amp;A, 443, 609 o - Salim, S. &amp; Gould, A. 2003, ApJ, 582, 1011 - Santos, N. C., Israelian, G., Mayor, M., et al. 2005, A&amp;A, 437, 1127 - Santos, N. C., Mayor, M., Naef, D., et al. 2001, A&amp;A, 379, 999 - Santos, N. C., Sousa, S. G., Mortier, A., et al. 2013, A&amp;A, 556, A150 - Scholz, R.-D., Kharchenko, N. V., Lodieu, N., &amp; McCaughrean, M. J. 2008, A&amp;A, 487, 595 - S´ egransan, D., Mayor, M., Udry, S., et al. 2011, A&amp;A, 535, A54 - Shaya, E. J. &amp; Olling, R. P. 2011, ApJS, 192, 2 - Skrutskie, M. F., Cutri, R. M., Stiening, R., et al. 2006, AJ, 131, 1163 - Thompson, M. A., Kirkpatrick, J. D., Mace, G. N., et al. 2013, PASP, 125, 809 Tinney, C. G., Butler, R. P., Marcy, G. W., et al. 2002, ApJ, 571, 528 - Tody, D. 1986, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 627, Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, ed. D. L. Crawford, 733 - Tody, D. 1993, in Astronomical Society of the Pacific Conference Series, V ol. 52, Astronomical Data Analysis Software and Systems II, ed. R. J. Hanisch, R. J. V . Brissenden, &amp; J. Barnes, 173 Torres, C. A. O., Quast, G. R., da Silva, L., et al. 2006, A&amp;A, 460, 695 - van Altena, W. F., Lee, J. T., &amp; Ho ffl eit, E. D. 1995, The general catalogue of trigonometric [stellar] parallaxes, ed. van Altena, W. F., Lee, J. T., &amp; Ho ffl eit, E. D. - van Leeuwen, F. 2007, A&amp;A, 474, 653 - Vrba, F. J., Henden, A. A., Luginbuhl, C. B., et al. 2004, AJ, 127, 2948 Weinberg, M. D., Shapiro, S. L., &amp; Wasserman, I. 1987, ApJ, 312, 367 - Wisdom, J. 2005, in Bulletin of the American Astronomical Society, Vol. 37, AAS Division of Dynamical Astronomy Meeting #36, 525 / Wittenmyer, R. A., Horner, J., Tuomi, M., et al. 2012, ApJ, 753, 169 Wright, E. L., Eisenhardt, P. R. M., Mainzer, A. K., et al. 2010, AJ, 140, 1868 Wright, J. T., Upadhyay, S., Marcy, G. W., et al. 2009, ApJ, 693, 1084 York, D. G., Adelman, J., Anderson, J. E., et al. 2000, AJ, 120, 1579 - Zacharias, N., Urban, S. E., Zacharias, M. I., et al. 2003, UCAC2 Catalogue, 1289, 0 - Zucker, S. &amp; Mazeh, T. 2002, ApJL, 568, L113 ## Appendix A: Potential moving group members In this appendix, we describe the properties of the planet-host stars with very wide companions that might belong to moving group as well as systems rejected as bona-fide pairs based on our spectroscopic follow-up (Section 3; Table 1). ## A.1. BD10 -3166 Butler et al. (2000) announced a planet with almost circular orbit (e = 0.05) and a mass of 0.48 Jupiter masses (MJup) with a period of ∼ 3.5 days around the G4V solar-type star BD 10 -3166 (Hog et al. 1998; Høg et al. 2000). The star is located at 66 pc from the Sun, has an age of ∼ 4.2 Gyr, is metal-rich ([Fe H] / = 0.5 dex), and has a proper motion of ∼ 0.2 arcsec yr. We confirm this / estimated distance based on the absolute magnitude of a mid-G dwarf (e.g. Figure 10 of Kirkpatrick et al. 2012). We found a bright and wide common proper motion companion located at ∼ 39 arcmin from BD 10 -3166. We classify this potential companion as a M5-M5.5 dwarf based on the GTC optical spectrum. Using the J -band magnitudes of M5 and M5.5 dwarfs with their errors listed in Table 3 above, we derive a spectroscopic mean distance of 75-77 pc with a possible range of 63-90 pc. We conclude that these two objects are located at the same spectroscopic distance, with a projected physical separation of ∼ 150,000-200,000 au. ## A.2. HD109749 Fischer et al. (2006) discovered a planet with a mass of 0.28 MJup with a period of ∼ 5.2 days (e = 0.01) around the G3IV (or G3V C) star, HD 109749 (Houk 1978). The planet-host star is located at 56.3 ± 4.3 pc with an age range of 7.4-13.2 Gyr and a metallicity estimated to [Fe H] / = 0.25 ± 0.05 dex. The primary is part of a double system formed by CCDM J12373-4049A and CCDM J12373-4049B, which are separated by ∼ 8.4-9.2 arcsec (Mason et al. 2001). We detected two potential co-moving companions at 39.2 and 55.5 arcmin. We classify the closest wide companion as a K7 dwarf, comparing its spectrum with HD 157881 (Koen et al. 2010) 9 . Using Gl825 as a K7V reference at 3.946 ± 0.012 pc (Hawley et al. 1996; van Leeuwen 2007), we determine a spectroscopic distance of approximately 140 pc. This distance estimate is 2.4 times greater than the distance of the planet-host star, implying that these two objects do not form a pair, even if we include the uncertainty on spectral classification and binary e ff ects. We classify the second companion as a M3.5 ± 0.5 dwarf by direct comparison with Sloan templates. We derive a mean spectroscopic distance of 73.3 pc for the potential companion, with a range of 45-144 pc including the uncertainties on the spectral type and absolute magnitude vs spectral type relations. Hence, we conclude that these two objects are located at the same spectroscopic distance. ## A.3. HD143361 Jenkins et al. (2009) detected an eccentric planet (e = 0.17 ± 0.15) with a mass of 3.12 MJup and a orbital period larger than 1000 days around HD143361 (Houk 1978; Jenkins et al. 2011). The planet-host star is a G6V star (Houk 1978) at 65.66 ± 5.51 pc from the Sun (van Leeuwen 2007) and a metallicity of Fe H] / = 0.29 dex (Nordstr¨ om et al. 2004). We note that Minniti et al. (2009) quotes a spectral type of G0V (no reference is given though) and a distance of 59.35 pc for HD 143361 based on the early analysis of Hipparcos parallax (Perryman et al. 1997). Here we favour the new reduction of Hipparcos data performed by van Leeuwen (2007). 9 http: // www.ast.obs-mip.fr users leborgne stelib stars.html / / / / We found two wide companions at 33.7 and 45 arcmin from the planet-host star. We classify the closest candidate as a M6M6.5 dwarf, suggesting a distance of 63-68 pc. Both components seem to be located at a very similar spectroscopic distance so we conclude that they might be physically associated. At the distance of 33.7 arcmin, we derive a projected physical separation of ∼ 120,000-137,000 au for the pair. We spotted a second potential co-moving companion at 45 arcmin from the planet-host star. We discarded that object photometrically. Nonetheless, we took an optical spectrum with NTT EFOSC2 to confirm that it is an early-type star. Hence, this / candidate companion is not associated with the planet-host star. ## A.4. HD159868 Wittenmyer et al. (2012) announced a second planet orbiting HD159868 (Houk 1978) in addition to an eccentric planet candidate reported by O'Toole et al. (2007). After collecting more data and re-analysing the periodiograms of HD 159868, Wittenmyer et al. (2012) concluded that this subgiant star at 58.7 ± 2.7 pc harbours two planets with masses of 2.1 and 0.73 MJup and periods of about 1180 and 353 days, respectively. The age of HD 159868 is estimated to be 8.1 Gyr with solar composition. We uncovered two potential wide companion to the planethost star, at about 40.7 and 42.3 arcmin. We classify the closest as a M3.0 ± 0.5 dwarf and the furthest as a sdM0.5 subdwarf. For the former, we derive a mean spectroscopic distance of 130 (72175) pc, twice larger than the distance of the planet-host star. For the latter we infer a spectroscopic distance of 96 ± 12 pc based on the parallax of LHS 536 (44.6 ± 5.3 pc; van Altena et al. 1995) and its spectral type (sdM0.5; Gizis 1997). This distance is much larger than the distance of the planet-host star. Moreover, we observe a metallicity di ff erence between this candidate and the planet-host star. To summarise, we reject both potential companions as comoving objects to the planet-host star HD 159868. ## A.5. HD207832 Haghighipour et al. (2012) discovered two jupiter mass planets orbiting the solar-metallicity (Fe H / = 0.06) G5V star HD 207832 (54.4 ± 2.7 pc; van Leeuwen 2007; Jenkins et al. 2011) by radial velocity. Their minimum masses are estimated to 0.56 and 0.73 MJup, with orbital periods of about 162 and 1156 days, and eccentricities of 0.13 and 0.27, respectively. We unearthed a wide common proper motion companion to HD207832, located at 38.6 arcmin. We classify it as a M6.5 dwarf, implying a distance of 48 pc (42-50 pc). We conclude that these two objects most likely form a pair with similar spectroscopic distances and a projected physical separation of ∼ 97,000-132,000 au. ## A.6. HD216435 Butler et al. (2006) announced a new planet orbiting HD216435, a G0V star at 32.62 ± 0.42 pc (van Leeuwen 2007) with an age of 5.27 Gyr (Sa ff e et al. 2005) and a metallicity of [Fe H] / = 0.244. The planet, detected by radial velocity, has a minimum mass of 1.26 MJup, low eccentricity (e ∼ 0.07), and a period of ∼ 1300 days. We discovered a potential wide companion with J = 12.631 mag at about 42 arcmin from HD 216435. We classify it as a M4-M4.5 dwarf. We derive a spectroscopic distance of 52-65 pc (41-82) for the companion, suggesting that these two objects are not physically associated. ## A.7. 91 Aqr Mitchell et al. (2013) published a 3.2 MJup planet orbiting the K0 giant, 91 Aqr. The planet-host star is located at 45.9 ± 0.6 pc (van Leeuwen 2007) with an age of 3.56 ± 0.63 Gyr, and solar composition. This planet-host star has the largest proper motion of our sample ( ∼ 0.37' yr). The planet has a low eccentricity / (e = 0.027) and a orbital period of 181.4 days. We found a wide companion located at 52.9 arcmin from 91 Aqr and a proper motion in good agreement with the planethost star (van Leeuwen 2007). We infer a spectroscopic distance of 63 (39-125) pc. Hence, we can not discard the pair as wide co-moving system, which would have a projected separation of ∼ 146,000 au. Radial velocity measurement are required to further assess the companionship.
10.1051/0004-6361/201424210
[ "N. Lodieu", "A. Perez-Garrido", "V. J. S. Bejar", "B. Gauza", "M. T. Ruiz", "R. Rebolo", "D. J. Pinfield", "E. L. Martin" ]
2014-08-06T08:28:11+00:00
2014-08-06T08:28:11+00:00
[ "astro-ph.EP" ]
Binary frequency of planet-host stars at wide separations: A new brown dwarf companion to a planet-host star
The aim of the project is to improve our knowledge on the multiplicity of planet-host stars at wide physical separations. We cross-matched approximately 6200 square degree area of the Southern sky imaged by the Visible Infrared Survey Telescope for Astronomy (VISTA) Hemisphere Survey (VHS) with the Two Micron All Sky Survey (2MASS) to look for wide common proper motion companions to known planet-host stars. We complemented our astrometric search with photometric criteria. We confirmed spectroscopically the co-moving nature of seven sources out of 16 companion candidates and discarded eight, while the remaining one stays as a candidate. Among these new wide companions to planet-host stars, we discovered a T4.5 dwarf companion at 6.3 arcmin (~9000 au) from HIP70849, a K7V star which hosts a 9 Jupiter mass planet with an eccentric orbit. We also report two new stellar M dwarf companions to one G and one metal-rich K star. We infer stellar and substellar binary frequencies for our complete sample of 37 targets of 5.4+/-3.8% and 2.7+/-2.7% (1 sigma confidence level), respectively, for projected physical separations larger than ~60-160 au assuming the range of distances of planet-host stars (24-75 pc). These values are comparable to the frequencies of non planet-host stars. We find that the period-eccentricity trend holds with a lack of multiple systems with planets at large eccentricities (e > 0.2) for periods less than 40 days. However, the lack of planets more massive than 2.5 Jupiter masses and short periods (<40 days) orbiting single stars is not so obvious due to recent discoveries by ground-based transit surveys and space missions.
1408.1209v1
## Anonymizing Social Graphs via Uncertainty Semantics Hiep H. Nguyen, Abdessamad Imine, and Micha¨ el Rusinowitch LORIA/INRIA Nancy-Grand Est, France Email: { huu-hiep.nguyen,michael.rusinowitch } @inria.fr, [email protected] Abstract -Rather than anonymizing social graphs by generalizing them to super nodes/edges or adding/removing nodes and edges to satisfy given privacy parameters, recent methods exploit the semantics of uncertain graphs to achieve privacy protection of participating entities and their relationship. These techniques anonymize a deterministic graph by converting it into an uncertain form. In this paper, we propose a generalized obfuscation model based on uncertain adjacency matrices that keep expected node degrees equal to those in the unanonymized graph. We analyze two recently proposed schemes and show their fitting into the model. We also point out disadvantages in each method and present several elegant techniques to fill the gap between them. Finally, to support fair comparisons, we develop a new tradeoff quantifying framework by leveraging the concept of incorrectness in location privacy research. Experiments on large social graphs demonstrate the effectiveness of our schemes. uncertain one. Most of schemes in this category are scalable, i.e. runnable on million-scale graphs or more. As an example, Boldi et al. [2] introduced the concept of (k, /epsilon1 )-obfuscation (denoted as ( k, /epsilon1 )-obf), where k ≥ 1 is a desired level of obfuscation and /epsilon1 ≥ 0 is a tolerance parameter. However, the pursuit for minimum standard deviation σ in (k, /epsilon1 )-obf has high impact on node privacy and high privacy-utility tradeoff. Edge rewiring method based on random walks (denoted as RandWalk ) in [10] also introduces uncertainty to edges as we show in section IV. This scheme suffers from high lower bounds for utility despite its excellent privacy-utility tradeoff. ## I. INTRODUCTION Graphs represent a rich class of data observed in daily life where entities are described by vertices and their connections are characterized by edges. With the emergence of increasingly complex networks [11], the research community requires large and reliable graph data to conduct in-depth studies. However, this requirement usually conflicts with privacy rights of data contributing entities. Naive approaches like removing user ids from a social graph are not effective, leaving users open to privacy risks, especially re-identification attacks [1] [7]. Therefore, many graph anonymization schemes have been proposed [24], [9], [25], [4], [20], [18]. Given an unlabeled undirected graph, the existing anonymization methods fall into four main categories. The first category includes random addition, deletion and switching of edges to prevent the re-identification of nodes or edges. The methods in the second category provide k-anonymity [17] by deterministic edge additions or deletions, assuming attacker's background knowledge regarding certain properties of its target nodes. The methods in the third category assign edge probabilities to add uncertainty to the true graph. The edges probabilities may be computed explicitly as in [2] or implicitly via random walks [10]. Finally, the fourth class of techniques, generalization , cluster nodes into super nodes of size at least k . Note that the last two classes of schemes induce possible world models, i.e., we can retrieve sample graphs that are consistent with the anonymized output graph. The third category is the most recent class of methods which leverage the semantics of edge probability to inject uncertainty to a given deterministic graph, converting it into an Motivated by (k, /epsilon1 )-obf and RandWalk , we propose in this work a generalized model for anonymizing graphs based on edge uncertainty. Both (k, )-obf and RandWalk display their /epsilon1 fitting into the model. We point out disadvantages in (k, /epsilon1 )-obf and RandWalk, the tradeoff gap between them and present several elegant techniques to fill this gap. Finally, to support fair comparisons, we develop a new tradeoff quantifying framework using the concept of incorrectness in location privacy research [15]. Our contributions are summarized as follows: - · We propose a generalized model called uncertain adjacency matrix for anonymizing graph via edge uncertainty semantics (Section IV). The key property of this model is that expected degrees of all nodes must be unchanged. We show the fitting of (k, /epsilon1 )-obf and RandWalk into the model and then analyze their disadvantages (Sections III, IV). - · We introduce the Maximum Variance (MaxVar) scheme (Section V) that satisfies all the properties of the uncertain adjacency matrix. It achieves good privacy-utility tradeoff by using two key observations: nearby potential edges and maximization of total node degree variance via a simple quadratic program. - · Towards a fair comparison for anonymization schemes on graphs, this paper describes a generic quantifying framework (Section VI) by putting forward the distortion measure (also called incorrectness in [15]) to measure the re-identification risks of nodes. As for the utility score, typical graph metrics [2] [21] are chosen. - · We conduct a comparative study of aforementioned approaches on three real large graphs and show the effectiveness of our gap-filling solutions (Section VII). Table I summarizes notations used in this paper. TABLE I: List of notations | Symbol | Definition | |-----------------------|---------------------------------------------------| | G 0 = ( V, E G 0 ) | true graph with n = | V | and m = | E G 0 | | | G = ( V, E,p ) | uncertain graph constructed from G 0 | | G = ( V, E G ) | sample graph from G , G /subsetsqequal G | | d u ( G ) , d u ( G ) | degree of node u in G, G | | ∆( d ) | number of nodes having degree d in G | | N ( u ) | neighbors of node u in G | | R σ | truncated normal distribution on [0,1] | | r e ← R σ | a sample from the distribution R σ | | p i ( p uv ) | probability of edge e i ( e uv ) | | n p | number of potential edges, | E | = m + n p | | A , A | adjacency matrices of G 0 , G | | P RW | random walk transition matrix of G 0 | | B ( t ) | uncertain adjacency matrix, B ( t ) = AP t - 1 RW | | t | walk length | | S | switching matrix | | TV | total degree variance | ## II. RELATED WORK ## A. Anonymizing Deterministic Graphs There is a vast literature on graph perturbation that deserves a survey. In this section, we enumerate only several groups of ideas that are related to our proposed schemes. 1) Anonymizing unlabeled vertices for node privacy: In unlabeled graphs, node identifiers are numbered in an arbitrary manner after removing their labels. An attacker aims at reidentifying nodes solely based on their structural information. For this line of graphs, node privacy protection implies link privacy. Techniques of adding and removing edges, nodes can be done randomly or deterministically. Random perturbation is a naive approach and usually used as a baseline method. More guided approaches consist of k-neighborhood [24], k-degree [9], k-automorphism [25], k-symmetry [20], k-isomorphism [4] and k 2 -degree [18]. These schemes provide k-anonymity [17] semantics and usually rely on heuristics to avoid combinatorial intractability. K-automorphism, k-symmetry, and kisomorphism can resist any structural attacks by exploiting the inherent symmetry in graph. k 2 -degree addresses the friendship attacks, based on the vertex degree pair of an edge. Ying and Wu [21] propose a spectrum preserving approach which wisely chooses edge pairs to switch in order to keep the spectrum of the adjacency matrix not to vary too much. The clearest disadvantage of the above schemes is that they are inefficient on large scale graphs. Apart from the two above categories, perturbation techniques have other categories that settle on possible world semantics. Hay et al. [7] generalize a network by clustering nodes and publish graph summarization of super nodes and super edges. The utility of this scheme is limited. On the other hand, Boldi et al. [2] take the uncertain graph approach. With edge probabilities, the output graph can be used to generate sample graphs by independent edge sampling. Our approach belongs to this class of techniques with different formulation and better privacy-utility tradeoff. Note that in k-symmetry [4], the output sample graphs are also possible worlds of the symmetric intermediate graph. 2) Anonymizing labeled vertices for link privacy: If nodes are labeled, we are only concerned about the link disclosure risk. For example, Mittal et al. [10] employ an edge rewiring method based on random walks to keep the mixing time tunable and prevent link re-identification by Bayesian inference. This method is effective for social network based systems, e.g. Sybil defense, DHT routing. Link privacy is also described in [21] for Random Switch, Random Add/Del. Interestingly, RandWalk [10] can also be used for unlabeled graphs as shown in Section IV. 3) Min entropy, Shannon entropy and incorrectness measure: We now survey commonly used notions of privacy metrics. Min entropy [16] quantifies the largest probability gap between the posterior and prior over all items in the input dataset. K-anonymity has the same semantics with the corresponding min entropy of log 2 k . So we say k-anonymity based perturbation schemes belong to min entropy. Shannon entropy argued in [3] and [2] is another choice of privacy metrics. The third metrics that we use in this paper is the incorrectness measure from location privacy [15]. Given the prior information (e.g. node degree in the true graph) and the posterior information harvested from the anonymized output, incorrectness measure is the number of incorrect guesses made by the attacker. This measure gauges the distortion caused by the anonymization algorithm. ## B. Mining Uncertain Graphs Uncertain graphs pose big challenges to traditional mining techniques. Because of the exponential number of possible worlds, naive enumerations are intractable. Typical graph search operations like k-Nearest neighbor and pattern matching require new approaches [13] [26] [23]. Those methods answer threshold-based queries by using pruning strategies based on Apriori property of frequent patterns. ## III. PRELIMINARIES This section starts with definitions and common assumptions on uncertain graphs. It then analyzes vulnerabilities in ( k, /epsilon1 ) -obf [2]. ## A. Uncertain Graph Let G = ( V, E, p ) be an uncertain undirected graph, where p : E → [0 , 1] is the function that gives an existence probability to each edge (see Fig.1b). The common assumption is on the independence of edge probabilities. Following the possible-worlds semantics in relational data [5], the uncertain graph G induces a set { G = ( V, E G ) } of 2 | E | deterministic graphs (worlds), each is defined by a subset of E . The probability of G = ( V, E G ) /subsetsqequal G is: $$P r ( G ) = \prod _ { e \in E _ { G } } p ( e ) \prod _ { e \in E \vee E _ { G } } ( 1 - p ( e ) ) \quad \ \ ( 1 )$$ Note that deterministic graphs are also uncertain graphs with all edges having probabilities 1. Fig. 1: (a) True graph (b) An obfuscation with potential edges (dashed) (c) Truncated normal distribution on [0,1] (bold solid curves) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-46df78f8-f8e0-47c7-b80f-1d0f69075dde.jpg) ## B. ( k, /epsilon1 ) -obf and Its Limitations In [2], Boldi et al. extend the concept of k-obfuscation developed earlier [3]. Definition 3.1: (k, /epsilon1 )-obf [2]. Let P be a vertex property, k ≥ 1 be a desired level of obfuscation, and /epsilon1 ≥ 0 be a tolerance parameter. The uncertain graph G is said to k-obfuscate a given vertex v ∈ G with respect to P if the entropy of the distribution Y P v ( ) over the vertices of G is greater than or equal to log 2 k : $$H ( Y _ { P ( v ) } ) \geq \log _ { 2 } k \quad \quad \quad ( 2 ) \quad \text{pair} \quad \\ \cdot \quad \cdot \quad \cdot$$ The uncertain graph G is a ( k, /epsilon1 ) -obf with respect to property P if it k-obfuscates at least (1 -/epsilon1 ) n vertices in G with respect to P. /square Given the true graph G 0 (Fig.1a), the basic idea of ( k, /epsilon1 ) -obf (Fig.1b) is to transfer the probabilities from existing edges to potential (non-existing) edges to satisfy Definition 3.1. For each existing sampled edge e , it is assigned a probability 1 -r e where r e ← R σ (Fig. 1c) and for each non-existing sampled edge e ′ , it is assigned a probability r e ′ ← R σ . Table II gives an example of how to compute degree entropy for the uncertain graph in Fig. 1b. Here vertex property P is the node degree. Each row in the left side is the degree distribution for the corresponding node. For instance, v 1 has degree 0 with probability (1 -0 8) (1 . . -0 3) (1 . . -0 9) = 0 014 . . . The right side normalizes values in each column (i.e. in each degree value) to get distributions Y P v ( ) . The entropy H Y ( P v ( ) ) for each degree value is shown in the bottom row. Given k = 3 log , 2 k = 1 585 . , then v 1 , v 3 with true degree 2 and v 2 , v 4 with true degree 1 satisfy (2). Therefore, /epsilon1 = 0 . TABLE II: The degree uncertainty for each node (left) and normalized values for each degree (right) | | node degree uncertainty | node degree uncertainty | node degree uncertainty | node degree uncertainty | Y P ( v ) | Y P ( v ) | Y P ( v ) | Y P ( v ) | |----|---------------------------|---------------------------|---------------------------|---------------------------|-------------|-------------|-------------|-------------| | | d=0 | d=1 | d=2 | d=3 | d=0 | d=1 | d=2 | d=3 | | v1 | .014 | .188 | .582 | .216 | .044 | .117 | .355 | .491 | | v2 | .210 | .580 | .210 | .000 | .656 | .362 | .128 | .000 | | v3 | .036 | .252 | .488 | .224 | .112 | .158 | .298 | .509 | | v4 | .060 | .580 | .360 | .000 | .187 | .362 | .220 | .000 | | | | | | H | 1.40 | 1.84 | 1.91 | 0.99 | While ( k, /epsilon1 ) -obf provides a novel technique to come up with an uncertain version of the graph, the specific approach Fig. 2: (a) Semantics of selfloops (left), multi-selfloops (middle) and multiedges (right) in uncertain adjacency matrix (b) Edge switching ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-a965fd4b-2c1f-4a97-804a-6f1a4d0d84c0.jpg) in [2] has two drawbacks. First, it formulated the problem as the minimization of σ . With small values of σ , r e highly concentrates around zero, so existing sampled edges have probabilities nearly 1 and non-existing sampled edges are assigned probabilities almost 0. By the simple rounding technique, the attacker can easily reveal the true graph. Even if the graph owner only publishes sample graphs, the reidentification attacks are still effective as we show in Section VII. Note that in [2], the found values of σ vary in a wide range from 10 -1 to 10 -8 . Second, the approach in [2] does not consider the locality (subgraph) of nodes in selecting pairs of nodes for establishing potential edges. As shown in [6], subgraph-wise perturbation effectively reduces structural distortion. ## IV. A GENERALIZED MODEL FOR UNCERTAIN GRAPH This section introduces a generalized model of graph anonymization via semantics of edge uncertainty. Then we analyze several schemes using this model. ## A. A Generalized Model: Uncertain Adjacency Matrix Given the true graph G 0 , an uncertain graph G constructed from G 0 must have its uncertain adjacency matrix A satisfying - 2) A ij ∈ [0 , 1] and A ii = 0 . If we relax this constraint to (2') allow A ii &gt; 0 then we have selfloop s and allow A ij &gt; 1 then we have multiedge s (Fig. 2a). - 1) symmetry A ij = A ji - 3) expected degrees of all nodes must be unchanged. It means n j =1 A ij = d i ( G 0 ) i = 1 ..n ∑ We first define the transition matrix P RW which is right stochastic (i.e. non-negative and row sums equal to 1) as follows (note that we use the short notation d i = d i ( G 0 ) ) /negationslash $$P _ { R W } ( i, j ) = \begin{cases} 1 / d _ { i } & \text{if $(i,j)\in E_{G_{0}}$ $i\neq j$} \\ 0 & \text{otherwise.} \end{cases}$$ The power P t RW when t →∞ is P ∞ RW ( i, j ) = d j 2 m . We prove two lemmas on properties of the products A P and AP t where P is right stochastic. Lemma 4.1: For an adjacency matrix A and a right stochastic matrix P , the product A P is non-negative and has row sums equal to those of A . Proof: The non-negativity of A P is trivial. The sum of row i of A P is ∑ ∑ j ( k A ik P kj ) = ∑ k A ik ( ∑ j P kj ) = ∑ k A ik . 1 = ∑ k A ik Lemma 4.2: For a deterministic graph G possessing adjacency matrix A and P RW , the product B ( ) t = AP t -1 RW is also symmetric. /negationslash Proof: We prove the result by induction. The case t = 1 is trivial. We prove that for any t ≥ 2 , B ( ) t ij = ∑ p t ( i,j ) ∏ k ∈ p t ( i,j ) ,k = i,j 1 /d k where p t ( i, j ) is a path of length t from i to j . /negationslash /negationslash /negationslash When t = 2 , B (2) ij = ∑ k A ik P kj = ∑ ( i,k ) ( , k,j ) ∈ E 1 /d k , so the result holds. Assuming that the result is correct up to t -1 , i.e. B ( t -1) ij = ∑ p t -1 ( i,j ) ∏ k ∈ p t -1 ( i,j ) ,k = i,j 1 /d k . Because B ( ) t = B ( t -1) P RW , B ( ) t ij = ∑ l B ( t -1) il P lj = ∑ l, ( l,j ) ∈ E ( ∑ p t -1 ( i,l ) ∏ k ∈ p t -1 ( i,l ) ,k = i,l 1 /d k )1 /d l = p t ( i,j ) k ∈ p t ( i,j ) ,k = i,j 1 /d k . We prove the uniqueness of P RW in the following proposition. ∑ ∏ Because G is undirected, the set of all p t ( i, j ) is equal to the set of all p t ( j, i ) , so B ( ) t ij = B ( ) t ji . Proposition 4.3: Given a deterministic graph G with adjacency matrix A , there exists one and only one right stochastic matrix P that satisfies P uv = 0 for all ( u, v ) / G ∈ and AP t is symmetric for all t ≥ 0 . The unique solution is P = P RW . Proof: Lemma 4.2 shows that P = P RW satisfies P uv = 0 for all ( u, v ) / G ∈ and AP t is symmetric for all t ≥ 0 . /negationslash /negationslash /negationslash ## B. RandWalk Approach To prove that this is the unique solution, we repeat the formula in the proof of Lemma 4.2. Let B ( ) t = AP t -1 , then B ( ) t ij = ∑ p t ( i,j ) ∏ k ∈ p t ( i,j ) ,k = i,j P k,k +1 where k + 1 implies the successive node of k in p t ( i, j ) . Because B ( ) t ji has the same number of products as B ( ) t ij (i.e. the number of paths of length t ), B ( ) t is symmetric if and only if corresponding products are equal, i.e. ∏ k ∈ p t ( i,j ) ,k = i,j P k,k +1 = ∏ k ∈ p t ( j,i ) ,k = i,j P k,k +1 . At t = 2 , for any path ( i, k, j ) we must have P kj = P ki . Along with the requirement that P is right stochastic, i.e. ∑ i P ki = 1 , we obtain P ki = 1 /d k . This is exactly P RW . Now we apply the model of uncertain adjacency matrix to the analysis of RandWalk [10]. Algorithm 1 depicts the steps of RandWalk. As we show below, the trial-and-error condition in Line 6 makes RandWalk hard to analyze 1 . So we modify it by removing the condition and using parameter α instead of 1.0 in Line 12 2 (see Algorithm 2). When α = 0 5 . , all edges ( u, z ) are assigned with probability 0.5. In RandWalk-mod, we add a checking for d u = 1 (Line 8) to keep the total degree of G ′ equal to that of G , which is missing in RandWalk. Note that RandWalk-mod accepts selfloops and multiedges. Let Q be the edge adding matrix defined as $$Q _ { i j } = \begin{cases} 0. 5 & \text{ if } d _ { i } = 1 \wedge j \text{ is the unique neighbor of } i & \text{ For sp} \\ \alpha & \text{ if } j \text{ is the first neighbor of } i & \text{ $p$ is the } \cdot \\ \frac { 0. 5 d _ { i } - \alpha } { d _ { i } - 1 } & \text{ if } j \text{ is a neighbor of } i \text{ but not the first one} & \lambda + 1 ; \text{th} \\ 0 & \text{ otherwise.} & \text{$Pro$,} \\ R e m a \\ ^ { 1 } \text{It also causes edge miss at } t = 2, e. g. \text{ a 2-length walk on edge (v 3, v 2)} & \text{ equival} \\ ( \text{Fig. } 1 a ) \text{ causes the selfloop (v 3, v 3)}. \end{cases}$$  1 It also causes edge miss at t = 2 , e.g. a 2-length walk on edge ( v 3 , v 2) (Fig. 1a) causes the selfloop ( v 3 , v 3) . 2 This line causes errors for degree-1 nodes as shown in RandWalk-mod . We show that RandWalk-mod can be formulated as an uncertain adjacency matrix A RW = ( AP t -1 RW ) ◦ ( Q + Q T ) , where ◦ is the Hadamard product (element-wise). AP t -1 RW is equivalent to computations in lines 2-6 and Q + Q T is equivalent to computations in lines 7-13. We use Q + Q T instead of Q due to the fact that when the edge ( u, z ) is added to G ′ with probability Q uz , the edge ( z, u ) is also assigned the same probability. We come up with the following theorem. Theorem 4.4: RandWalk-mod can be formulated as A RW = ( AP t -1 RW ) ◦ ( Q + Q T ) . A RW is symmetric. It satisfies the 3 Proof: By Lemmas 4.1 and 4.2, let B ( ) t RW be AP t -1 RW , we have symmetric B ( ) t RW and its row sums are equal to those of A . Because A RW = B ( ) t RW ◦ ( Q + Q T ) and both B ( ) t RW and ( Q + Q T ) are symmetric, A RW is also symmetric. constraint of unchanged expected degree iff α = 0 5 . . Due to the fact that ( Q + Q T ) has the same locations of nonzeros as B ( ) t RW , the condition of unchanged expected degree is satisfied if and only if all non-zeros in ( Q + Q T ) are 1. This occurs if and only if α = 0 5 . . ## Algorithm 1 RandWalk( G , t, M 0 ) [10] Input: undirected graph G 0 , walk length t and maximum loop count M ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-d7c43104-f6ec-4c46-9f88-647b18183f7e.jpg) We investigate the limit case when t → ∞ (i.e. P t -1 RW → P ∞ RW ). Correspondingly B ∞ RW = AP ∞ RW has B ∞ RW ( i, j ) = d d i j 2 m . The following theorem quantifies the number of selfloops and multiedges in B ∞ RW for power-law (PL) graphs and sparse Erd¨ os-Renyi (ER) random graphs [11]. Theorem 4.5: For power-law graphs with the exponent γ , the number of selfloops in B ∞ RW is ζ γ ( -2) ζ γ ( -1) , where ζ ( γ ) is the Riemann zeta function defined only for γ &gt; 1 ; the number of multiedges is zero. For sparse ER random graphs with λ = np constant where p is the edge probability, the number of selfloops in B ∞ RW is λ +1 ; the number of multiedges is zero. Proof: See Appendix A. Remark 4.1: We notice that RandWalk-mod can be done equivalently by the idea in SybilGuard [22]. We first pick a 3 This implies a mistake in Theorem 3 of [10] ## Algorithm 2 RandWalk-mod( G , t, α 0 ) Input: undirected graph G 0 , walk length t and probability α Output: anonymized graph ′ ``` Algorithm: 2 RandWalk-mod(G_{0}, t, \alpha) Input: undirected graph G_{0}, walk length t and probability \alpha Output: anonymized graph G' 1: G' = null 2: for u in G_{0} do 3: count = 1 4: for v in \mathcal { N } (u) do 5: perform t - 1 hop random walk from v 6: z is the terminal node of the random walk 7: if count == 1 then 8: if d_u == 1 then 9: add (u, z) to G' with probability 0.5 10: else 11: add (u, z) to G' with probability \alpha 12: else 13: add (u, z) to G' with probability \frac { d _ { u } - 1 } 14: count + + return G' ---........................................................................................................................................................................................................ ``` random permutation π u on neighbors of each node u to get d u pairs of (in-edge, out-edge). Then for any walk reaching node u by the in-edge ( v, u ) , the out-edge is fixed to ( u, π u ( v )) . In this formulation, it is straightforward to verify that the transition probability from u to a neighbor v is 1 /d u ( G 0 ) . ## C. Edge Switching In edge switching ( EdgeSwitch ) approaches (Fig. 2b), two edges ( u, v ) , ( w, t ) are chosen and switched to ( u, t ) , ( w, v ) if a ut = a wv = 0 . This is done in s switches. Using the switching matrix S , we represent 1-step EdgeSwitch in the form AS = A (Equation (4)). The switching matrix S is feasible if and only if a uw a vt = 0 . Note that in the full form, S is n × n matrix with the n -4 remaining elements on diagonal are 1, other off-diagonal are 0. In general, S is not right stochastic and this happens only when a uw = a vt = 0 . For s -step EdgeSwitch A ∏ s i =1 S i = A . If ∀ i, S i is right stochastic (i.e. we choose edges ( u, v ) , ( w, t ) such that a uw = a vt = 0 ), then Lemma 4.1 applies. ## D. Direct Construction Given the deterministic adjacency matrix A , we can directly construct A that satisfies all three constraints (1),(2) and (3) in Section IV-A. (k, /epsilon1 )-obf [2] introduces such an approach. As explained in Section III-B, the expected degrees of nodes in ( k, /epsilon1 ) -obf are approximately unchanged due to the fact that r , r e e ′ are nearly zero by small σ . So (k, )-obf satisfies /epsilon1 constraints (1) and (2) but it only approximately satisfies the third constraint. To remedy this shortcoming, we present the MaxVar approach in Section V. It adds potential edges to G 0 , then tries to find the assignment of edge probabilities such that the expected node degrees are unchanged while the total variance is maximized. A comparison among schemes is also shown in the end of Section V-C. ## E. Mixture Approach In this section, we present the Mixture approach by the uncertain adjacency matrix A p parametrized by p , with the output sample graph G p . Given the true graph G 0 and an anonymized G /subsetsqequal G , every edge ( i, j ) is chosen into G p with probability A p ( i, j ) where $$\mathcal { A } _ { p } ( i, j ) = \begin{cases} 1 & \text{if $(i,j)\in E_{G_{0}}\cap E_{G}$} \\ 1 - p & \text{if $(i,j)\in E_{G_{0}}\ \, \L E_{G}$} \\ p & \text{if $(i,j)\in E_{G}\ \, \L E_{G_{0}}$} \end{cases} \\ \text{It is straightforward to show that $\mathcal{A}_{p}= (1-p)A(G_{0})$} \\ 4 ( G ). \, \text{When applied to $G$ generated by $RandWalk-mod w$}$$ If there exists P mix with constraint P mix ( i, j ) = 0 if ( i, j ) / E ∈ G 0 such that P t -1 mix = (1 -p I ) n + pP t -1 RW , then Mixture can be simulated by the RandWalk-mod approach with the transition matrix P mix .  It is straightforward to show that A p = (1 -p A G ) ( 0 ) + pA G ( ) . When applied to G generated by RandWalk-mod with α = 0 5 . , we have A p = (1 -p A ) + pAP t -1 RW = A [(1 -p I ) n + pP t -1 RW ] and A p satisfies three constraints (1) (2') and (3). ## F. Partition Approach Another approach that can apply to RandWalk-mod, ( k, /epsilon1 ) -obf, MaxVar and EdgeSwitch is the Partition approach. Given true graph G 0 , this divide-and-conquer strategy first partitions G 0 into disjoint subgraphs sG , then it applies one of the above anonymization schemes on subgraphs to get anonymized subgraphs s G . Finally, it combines s G to obtain G . Note that the partitioning may cause orphan edges as in MaxVar (Section V). Those edges must be copied to G to keep node degrees unchanged. ## V. MAXIMUM VARIANCE APPROACH We start this section with the formulation of MaxVar in the form of quadratic programming based on two key observations. Then we describe the anonymization algorithm. ## A. Formulation Two key observations underpinning the MaxVar approach are presented as follows. 1) Observation #1: Maximum Degree Variance: We argue that efficient countermeasures against structural attacks should hinge on node degrees. If a node and its neighbors have their degrees changed, the re-identification risk is reduced significantly. Consequently, instead of replicating local structures as in k-anonymity based approaches [24], [9], [25], [4], [20], [18], we can deviate the attacks by changing node degrees probabilistically . For example, node v1 in Fig.1a has degree 2 with probability 1.0 whereas in Fig.1b, its degree gets four possible values { 0 1 2 3 , , , } with probabilities { 0 014 0 188 0 582 0 216 . , . , . , . } respectively. Generally, given edge probabilities of node u as p , p 1 2 , ..p d u ( G ) , the degree of u is a sum of independent Bernoulli random variables, so its expected value is ∑ d u ( G ) i =1 p i and its variance is ∑ d u ( G ) i =1 p i (1 -p i ) . If we naively target the maximum (local) degree variance without any constraints, the naive solution is at p i = 0 5 . ∀ i . However, such an assignment distorts graph structure severely and deteriorates the utility. Instead, by following the model of uncertain adjacency matrix, we have the constraint ∑ d u ( G ) i =1 p i = d u ( G 0 ) . Note that the minimum $$\frac { \left [ \begin{smallmatrix} 0 & 1 & a _ { u w } & 0 \\ 1 & 0 & 0 & a _ { v t } \\ a _ { u w } & 0 & 0 & 1 \\ 0 & a _ { v t } & 1 & 0 \end{smallmatrix} \right ] \left [ \begin{smallmatrix} 0 & - a _ { v t } & 1 & a _ { v t } \\ - a _ { u w } & 0 & a _ { u w } & 1 \\ 1 & a _ { v t } & 0 & - a _ { v t } \\ a _ { u w } & 1 & - a _ { u w } & 0 \end{smallmatrix} \right ] = \left [ \begin{smallmatrix} 0 & 0 & a _ { u w } & 1 \\ 0 & 0 & 1 & a _ { v t } \\ a _ { u w } & 1 & 0 & 0 \\ 1 & a _ { v t } & 0 & 0 \end{smallmatrix} \right ]$$ variance of an uncertain graph is 0 and corresponds to the case G has all edges being deterministic, e.g. when G = G 0 and in switching-edge based approaches. In the following section, we show an interesting result relating the total degree variance with the variance of edit distance. 2) Variance with edit distance: The edit distance between two deterministic graphs G,G ′ is defined as: $$D ( G, G ^ { \prime } ) & = | E _ { G } \, \sum E _ { G ^ { \prime } } | + | E _ { G ^ { \prime } } \, \sum E _ { G } | \, \quad \ \ ( 5 ) \\. \quad \dots \quad \dots \quad \dots \quad \dots \quad \dots$$ A well-known result about the expected edit distance between the uncertain graph G and the deterministic graph G /subsetsqequal G is $$E [ D ( \mathcal { G }, G ) ] = \sum _ { G ^ { \prime } \sqsubseteq \mathcal { G } } P r ( G ^ { \prime } ) D ( G, G ^ { \prime } ) = \sum _ { e _ { i } \in E _ { G } } ( 1 - p _ { i } ) + \sum _ { e _ { i } \notin E _ { G } } p _ { i } \prod _ { \substack { e _ { i } \\ \text{$input$ deter} \\ 1 ) \text{ Oven} } } ^ { \nu. \ a g \nu \mu \nu \mu }.$$ Correspondingly, the variance of edit distance is $$V a r [ D ( \mathcal { G }, G ) ] & = \sum _ { G ^ { \prime } \sqsubseteq \mathcal { G } } P r ( G ^ { \prime } ) [ D ( G, G ^ { \prime } ) - E [ D ( \mathcal { G }, G ) ] ] ^ { 2 } \quad \min _ { \text{mg} } \\ \text{We were in the following than} \text{thoration that the variance of} \quad \text{phase}$$ We prove in the following theorem that the variance of edit distance is the sum of all edges' variance (total degree variance) and it does not depend on the choice of G . Theorem 5.1: Assume that G ( V, E, p ) has k uncertain edges e , e 1 2 , ..., e k and G /subsetsqequal G (i.e. E G ⊆ E ). The edit distance variance is V ar D [ ( G , G )] = ∑ k i =1 p i (1 -p i ) and does not depend on the choice of G . ## Proof: See Appendix B. 3) Observation #2: Nearby Potential Edges: As indicated by Leskovec et al. [8], real graphs reveal two temporal evolution properties: densification power law and shrinking diameters . Community Guided Attachment (CGA) model [8], which produces densifying graphs, is an example of a hierarchical graph generation model in which the linkage probability between nodes decreases as a function of their relative distance in the hierarchy. With regard to this observation, ( k, /epsilon1 ) -obf, by heuristically making potential edges solely based on node degree discrepancy, produces many inter-community edges. Shortest-path based statistics will be reduced due to these edges. MaxVar, in contrast, tries to mitigate the structural distortion by proposing only nearby potential edges before assigning edge probabilities. Another evidence is from [19] where Vazquez analytically proved that Nearest Neighbor can explain the power-law for degree distribution, clustering coefficient and average degree among the neighbors. Those properties are in very good agreement with the observations made for social graphs. Sala et al. [14] confirmed the consistency of Nearest Neighbor model in their comparative study on graph models for social networks. Fig. 3: MaxVar approach ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-24259146-f927-41d8-b677-a8a6856e85d8.jpg) ## B. Algorithms This section describes the steps of MaxVar to convert the input deterministic graph into an uncertain one. 1) Overview: The intuition behind the new approach is to formulate the perturbation problem as a quadratic programming problem. Given the true graph G 0 and the number of potential edges allowed to be added n p , the scheme has three phases. The first phase tries to partition G 0 into s subgraphs, each one with n s = n /s p potential edges connecting nearby nodes (with default distance 2, i.e. friend-of-friend ). The second phase formulates a quadratic program for each subgraph with the constraint of unchanged node degrees to produce the uncertain subgraphs s G with maximum edge variance. The third phase combines the uncertain subgraphs s G into G and publishes several sample graphs. The three phases are illustrated in Fig. 3. By keeping the degrees of nodes in the perturbed graph, our approach is similar to the edge switching approaches (e.g.[21]) but ours is more subtle as we do it implicitly and the switching occurs not necessarily on pairs of edges. - 2) Graph Partitioning: Because of the complexity of exact quadratic programming (Section V-B3), we need a preprocessing phase to divide the true graph G 0 into subgraphs and run the optimization on each subgraph. Given the number of subgraphs s , we run METIS 4 to get almost equal-sized subgraphs with minimum number of inter-subgraph edges. Each subgraph has n s potential edges added before running the quadratic program. This phase is outlined in Algorithm 3. 3) Quadratic Programming: By assuming the independence of edges, the total degree variance of G = ( V, E, p ) for edit distance (Theorem 5.1) is: $$V a r ( E ) & = \sum _ { i = 1 } ^ { | E | } p _ { i } ( 1 - p _ { i } ) = | E _ { G _ { 0 } } | - \sum _ { i = 1 } ^ { | E | } p _ { i } ^ { 2 } \quad ( 6 ) \\ 4 \dots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots$$ 4 http://glaros.dtc.umn.edu/gkhome/views/metis Input: true graph G 0 = ( V, E G 0 ) , number of subgraphs s , number of potential edges per subgraph n s Output: list of augmented subgraphs gl - 1: gl ← METIS ( G , s 0 ). - 2: for sG in gl do 3: i ← 0 $$4 \colon \quad \text{while $i<n_{s}$ do}$$ 5: randomly pick u, v ∈ V sG and ( u, v ) / ∈ E sG with d u, v ( ) = 2 $$\frac { 6 \colon \stackrel { \omega _ { \omega }, \nu _ { \nu } } { E _ { s G } \leftarrow E _ { s G } \cup ( u, v ) } } { 7 \colon \begin{smallmatrix} 1 & 1 \\ & 1 \leftarrow i + 1 \end{smallmatrix} }$$ The last equality in (6) is due to the constraint that the expected node degrees are unchanged (i.e. ∑ d u ( G ) i =1 p i = d u ( G 0 ) ), so ∑ | E | i =1 p i is equal to | E G 0 | . By targeting the maximum edge variance, we come up with the following quadratic program. $$\text{Minimize} \quad \sum _ { i = 1 } ^ { | E | } p _ { i } ^ { 2 } \\ \text{Subject to} \quad \begin{array} { c } \sum _ { i = 1 } ^ { | E | } p _ { i } ^ { 2 } \\ 0 \leq p _ { i } \leq 1 \, \forall i \\ \sum _ { v \in \mathcal { N } ( u ) } p _ { u v } = d _ { u } ( G _ { 0 } ) \, \forall u \end{array} \end{array} \begin{array} { c } \left | E | \\ \sum _ { i = 1 } ^ { | E | } p _ { i } ^ { 2 } \\ \end{array} \right |$$ The objective function reflects the privacy goal (i.e. sample graphs do not highly concentrate around the true graph) while the expected degree constraints aim to preserve the utility. By dividing the large input graph into subgraphs, we solve independent quadratic optimization problems. Because each edge belongs to at most one subgraph and the expected node degrees in each subgraph are unchanged, it is straightforward to show that the expected node degrees in G are also unchanged. We have a proposition on problem feasibility and an upper bound for the total variance. Proposition 5.2: The quadratic program in MaxVar is always feasible. The total variance TV MaxVar = V ar E ( ) is upper bounded by mn p m n + p . Proof: The feasibility is due to the fact that { p e | p e = 1 ∀ e ∈ E G 0 and p e = 0 otherwise } is a feasible point. Let k u be the number of potential edges incident to node u . By requiring u 's expected degree to be unchanged, we have ∑ v ∈N ( u ) p uv = d u . Applying Cauchy-Schwarz inequality, we get ∑ v ∈N ( u ) p 2 uv ≥ 1 d u + k u ( ∑ v ∈N ( u ) p uv ) 2 = d 2 u d u + k u . Now we take the sum over all nodes to get the following $$m + n _ { p }$$ $$\leq m - \frac { 1 } { 2 } \sum _ { u } \frac { d _ { u } ^ { 2 } } { d _ { u } + d _ { k } } \leq m - \frac { 1 } { 2 } \frac { ( \sum _ { u } d _ { u } ) ^ { 2 } } { \sum _ { u } ( d _ { u } + k _ { u } } \\ \intertext { where } \text{ the last equality is again due to } \text{$c$}.$$ $$& V a r ( E ) = m - \sum _ { i = 1 } ^ { m + n _ { p } } p _ { i } ^ { 2 } = m - \frac { 1 } { 2 } \sum _ { u } \sum _ { v \in \mathcal { N } ( u ) } p _ { u v } ^ { 2 } \quad \begin{pmatrix} N \\ \text{the } \L \\ T V _ { F } \\ \text{in th} \end{pmatrix}$$ where the last equality is again due to Cauchy-Schwarz inequality. ## C. Comparison of schemes Table III shows the comparison of schemes we investigate in this work. Only MaxVar and EdgeSwitch satisfy all three properties (1),(2) and (3). The next two propositions quantify the TV of ( k, /epsilon1 ) -obf and RandWalk-mod . TABLE III: Comparison of schemes | Scheme | Prop #1 | Prop #2 | Prop #3 | Uncertain A | |-----------------------|-----------------------------------------|-----------------------------------------|-----------------------------------------|-----------------------------------------| | RandWalk-mod | ◦ ( α = 0 . 5 ) | × | ◦ | ◦ | | RandWalk | ◦ | ◦ | × | ◦ | | EdgeSwitch | ◦ | ◦ | ◦ | × | | ( k, /epsilon1 ) -obf | ◦ | ◦ | × | ◦ | | MaxVar | ◦ | ◦ | ◦ | ◦ | | Mixture | depends on the mixed scheme | depends on the mixed scheme | depends on the mixed scheme | depends on the mixed scheme | | Partition | depends on the scheme used in subgraphs | depends on the scheme used in subgraphs | depends on the scheme used in subgraphs | depends on the scheme used in subgraphs | Proposition 5.3: The expected total variance of ( k, /epsilon1 ) -obf TV obf is ( m + n p )( E r [ e ] -E r [ 2 e ]) . The expressions of E r [ e ] , E r [ 2 e ] are given in (7) and (8). Proof: In ( k, /epsilon1 ) -obf, m existing edges are assigned probabilities 1 -r e while n p potential edges are assigned probabilities r e . Therefore, the total variance is TV obf = m (1 -r e )(1 -(1 -r e )) + n r p e (1 -r e ) = ( m + n p ) r e (1 -r e ) where r e ← R σ . Take the expectation of TV obf , we get E TV [ obf ] = ( m + n p )( E r [ e ] -E r [ 2 e ]) . R σ has pdf f ( x ) = C 1 σ √ 2 π e -x / σ 2 2 2 if x ∈ [0 , 1] and 0 otherwise. The normalization constant C = 0 5 . erf (1 /σ √ 2) where erf is the error function. Basic integral computations (change of variable and integration by parts) give us the formulas for E r [ e ] and E r [ 2 e ] as follows $$E [ r _ { e } ] = \frac { C \sigma } { \underset { \mu \mu } { \sqrt { 2 \pi } } } ( 1 - e ^ { - 1 / 2 \sigma ^ { 2 } } ) \quad \ \quad \ \ ( 7 )$$ $$\mu _ { \omega \infty } & = \frac { \sqrt { 2 \pi } \nu ^ { \nu } \lambda ^ { \prime } } { E [ r _ { e } ^ { 2 } ] } = \frac { C \sigma } { \sqrt { 2 \pi } } ( \frac { \sigma \sqrt { 2 \pi } } { C } - e ^ { - 1 / 2 \sigma ^ { 2 } } ) \quad \quad ( 8 )$$ Note that for , and 1 / σ 2 2 , so $$E [ T V _ { o b f } ] \approx ( m + n _ { p } ) \left ( \frac { \sigma } { \sqrt { 2 \pi } } - \sigma ^ { 2 } \right ) \quad \ \ ( 9 )$$ Proposition 5.4: The total variance of RandWalk-mod TV RW ( ) t at walk-length t is upper bounded by m K ( t -m ) K t where K t is the number of non-zeros in B ( ) t . $$& \text{at for $\sigma \leq 0.1$, $C$} \approx 1 $ \text{ and } e ^ { - 1 / 2 \sigma ^ { 2 } } \approx 0, \text{ so} \\ & \quad E [ T V _ { o b f } ] \approx ( m + n _ { p } ) \left ( \frac { \sigma } { \sqrt { 2 \pi } } - \sigma ^ { 2 } \right ) \\ & \text{osition $5.4$} \colon The \text{ total variance of } $ $ " ' . - , + ) ; < : | > ( !$$ For power-law graphs with the exponent γ , TV PL RW ( ∞ ) = m -1 2 [ ζ γ ( -2) ζ γ ( -1) ] 2 . For sparse ER random graphs with λ = np constant, TV ER RW ( ∞ ) = m -1 2 ( λ +1) 2 Proof: The proof uses the same arguments as in Proposition 5.2 and Theorem 4.5. We omit it due to space limitation. Note that the K t increases with t and when t is equal to the diameter of G K , t = n 2 . Therefore, the upper bound of TV RW ( ) t converges very fast to m , compatible with the results in the limit cases of PL and ER random graphs. ## VI. QUANTIFYING FRAMEWORK This section describes a generic framework for privacy and utility quantification of anonymization methods. ## A. Privacy Measurement We focus on structural re-identification attacks under various models of attacker's knowledge as shown in [7]. We quantify the privacy of an anonymized graph as the sum of re-identification probabilities of all nodes in the graph. We differentiate closed-world from open-world adversaries. For example, when a closed-world adversary knows that Bob has three neighbors, this fact is exact. An open-world adversary in this case would learn only that Bob has at least three neighbors. We consider the result of structural query Q on a node u as the node signature sig Q ( u ) . Given a query Q , nodes having the same signatures form an equivalence class . So given the true graph G 0 and an output anonymized graph G ∗ , the privacy is measured as in the following example. Example 6.1: Assuming that we have signatures of G 0 and signatures of G ∗ as in Table IV, the re-identification probabilities in G ∗ of nodes 1,2 are 1 3 , of nodes 4,8 are 1 2 , of nodes 3,5,6,7 are 0s. And the privacy score of G ∗ is 1 3 + 1 3 + 1 2 + 1 2 + 0 + 0 + 0 + 0 = 1 66 . . In G 0 , the privacy score is 1 3 + 1 3 + 1 3 + 1 2 + 1 2 + 1 3 + 1 3 + 1 3 = 3 , equal to the number of equivalence classes. TABLE IV: Example of node signatures | Graph | Equivalence classes | |---------|---------------------------------------------------------------| | G 0 | s 1 { 1 , 2 , 3 } , s 2 { 4 , 5 } , s 3 { 6 , 7 , 8 } | | G ∗ | s 1 { 1 , 2 , 6 } , s 2 { 4 , 7 } , s 3 { 3 , 8 } , s 4 { 5 } | We consider two privacy scores in this paper. - · H1 score uses node degree as the node signature, i.e. we assume that the attacker know apriori degrees of all nodes. - · H2 open uses the set (not multiset) of degrees of node's friends as the node signature. For example, if a node has 6 neighbors and the degrees of those neighbors are { 1 2 2 3 3 5 , , , , , } , then its signature for H 2 open attack is { 1 2 3 5 , , , } . Higher-order scores like H 2 (exact multiset of neighbors' degrees) or H 3 (exact multiset of neighbor-of-neighbors' degrees) induce much higher privacy scores of the true graph G 0 (in the order of | V | ) and represent less meaningful metrics for privacy. The following proposition claims the automorphisminvariant property of structural privacy scores. Proposition 6.1: All privacy scores based on structural queries [7] are automorphism-invariant, i.e. if we find a nontrivial automorphism G 1 of G 0 , the signatures of all nodes in G 1 are unchanged. Proof: The proof is trivially based on the definition of graph automorphism. We omit it due to the lack of space. ## B. Utility Measurement Following [2] and [21], we consider three groups of statistics for utility measurement: degree-based statistics, shortestpath based statistics and clustering statistics. ## 1) Degree-based statistics: - · Number of edges: S NE = 1 2 ∑ v ∈ V d v - · Degree variance: S DV = 1 n ∑ v ∈ V ( d v -S AD ) 2 · Power-law exponent of degree sequence: S PL is the estimate of γ assuming the degree sequence follows a power-law ∆( ) d ∼ d -γ - · Average degree: S AD = 1 n ∑ v ∈ V d v · Maximal degree: S MD = max v ∈ V d v - 2) Shortest path-based statistics: - · Average distance: S APD is the average distance among all pairs of vertices that are path-connected. - · Effective diameter: S EDiam is the 90-th percentile distance among all path-connected pairs of vertices. - · Connectivity length: S CL is defined as the harmonic mean of all pairwise distances in the graph. - · Diameter : S Diam is the maximum distance among all path-connected pairs of vertices. - 3) Clustering statistics: - · Clustering coefficient: S CC = 3 N ∆ N 3 where N ∆ is the number of triangles and N 3 is the number of connected triples. All of the above statistics are computed on sample graphs generated from the uncertain output G . In particular, to estimate shortest-path based measures, we use Approximate Neighbourhood Function (ANF) [12]. The diameter is lower bounded by the longest distance among all-destination breadfirst-searches from 1,000 randomly chosen nodes. ## VII. EVALUATION In this section, our evaluation aims to show the disadvantages of ( k, /epsilon1 ) -obf and RandWalk/RandWalk-mod as well as the gap between them. We then illustrate the effectiveness and efficiency of the gap-filling approaches MaxVar and Mixture . The effectiveness is measured by privacy scores (lower is better) and the relative error of utility (lower is better). The efficiency is measured by the running time. All algorithms are implemented in Python and run on a desktop PC with Intel /circleR Core i7-4770@ 3.4Ghz, 16GB memory. We use MOSEK 5 as the quadratic solver. Three large real-world datasets are used in our experiments 6 . dblp is a co-authorship network where two authors are connected if they publish at least one paper together. amazon is a product co-purchasing network where the graph contains an undirected edge from i to j if a product i is frequently copurchased with product j . youtube is a video-sharing web site that includes a social network. The graph sizes ( | V , E | | | ) of dblp , amazon and youtube are (317080, 1049866), (334863, 925872) and (1134890, 2987624) respectively. We partition dblp , amazon into 20 subgraphs and youtube into 60 subgraphs. The sample size of each test case is 20. 5 http://mosek.com/ 6 http://snap.stanford.edu/data/index.html Fig. 4: H 1 of MaxVar ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-7aed6778-e32d-4048-bf5a-aaef2553df43.jpg) Fig. 5: H 2 open of MaxVar ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-b5b80e4d-1a7d-4420-9c21-5ae8798613e4.jpg) ## A. ( k, /epsilon1 ) -obf and RandWalk We report the performance of ( k, /epsilon1 ) -obf in Table V. We keep the number of potential edges equal to m (default value in [2]) and vary σ . We find that the scheme achieves low relative errors only at small σ . However, privacy scores, especially H 2 open , rise fast (up to 50% compared to the true graph). This fact incurs high privacy-utility tradeoff as confirmed in Table VIII. Table VI shows the performance similarity between RandWalk and RandWalk-mod except the case of youtube and for t = 2 in amazon . Because RandWalk-mod satisfies the third constraint, it benefits several degree-based statistics while the existence of selfloops and multiedges does not impact much on shortest-path based metrics. RandWalk misses a lot of edges at t = 2 (see footnote 1 in Section IV-B). The remarkable characteristics of random-walk schemes are the very low privacy scores and the high relative errors (lower-bounded around 8 to 10%). Clearly, there is a gap between high tradeoffs in ( k, /epsilon1 ) -obf and high relative errors in RandWalk where MaxVar and Mixture may play their roles. ## B. Effectiveness of MaxVar We assess privacy and utility of MaxVar by varying the number of potential edges n p . The results are shown in Table VII. As for privacy scores, if we increase n p , we gain better privacy as we allow more edge switches. Due to the expected degree constraints in the quadratic program, all degree-based metrics vary only a little. We observe the near linear relationships between H 1 , rel.err and the number of replaced edges | E G 0 \ E G | in Figures 4, 6 and near quadratic relationship of H 2 open against | E G 0 \ E G | in Fig.5. The ratio of replaced edges in Figures 4,5 and 6 is defined as | E G 0 \ E G | | E G 0 | . The runtime of MaxVar consists of time for (1) partitioning G 0 , (2) adding friend-of-friend edges to subgraphs, (3) solving quadratic subproblems and (4) combining uncertain subgraphs to get G . We report the runtime in Fig.7. As we can see, the total runtime is in several minutes and the runtime of the partitioning step is almost negligible. Increasing n p gives rise to the runtime in steps 2,3 and 4 and the trends are nearly linear. The runtime on youtube is three times longer than on the other two datasets, almost linear to their data sizes. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-bf14292c-2787-47ef-9196-32077e64e619.jpg) Fig. 6: Rel.error of MaxVar ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-31923320-a227-4e13-9a72-9a9ff6e90ecf.jpg) Fig. 8: Tradeoff in dblp Fig. 7: Runtime of MaxVar ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-2848de1f-cf82-4060-9a75-fe199ec461a5.jpg) Fig. 9: Tradeoff in amazon ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-ccdca7a9-2ab1-446b-b8d5-61154f6c1edf.jpg) ## C. Comparative Evaluation Table VIII shows comparisons between MaxVar , ( k, /epsilon1 ) -obf and RandWalk/RandWalk-mod . The column tradeoff is √ H 2 open × rel.err as we conjecture the quadratic and linear behavior of H 2 open and rel.err respectively (Figures 5 and 6). We omit the column H 1 × rel.err because they are almost equal for all schemes considered in this work. Clearly, MaxVar gains better privacy-utility tradeoffs than ( k, /epsilon1 ) -obf, but worse than RandWalk RandWalk-mod , . However, MaxVar has its own merit as a gap-filling solution. Figures 8,9 and 10 show that while RandWalk, RandWalk-mod have the best tradeoffs, they suffer from high lower bounds for utility. In other words, if the dataset allows higher privacy risk for better utility (lower rel.err) then the usage of two random walk based solutions may be limited. The simple solution Mixture also fills the gap. We omit EdgeSwitch due to its worst tradeoffs. In addition to the re-identification scores H 1 and H 2 open , we also compute /epsilon1 for k ∈ { 30 50 100 , , } to have a fair comparison with ( k, /epsilon1 ) -obf. Table VIII shows that MaxVar has the best ( k, /epsilon1 ) scores. The number of potential edges used in MaxVar could be 20% of | E G 0 | , much less than that of ( k, /epsilon1 ) -obf (100% for c = 2 [2]). MaxVar and RandWalk/RandWalkmod have | E G 0 \ E G | /similarequal | E G \ E G 0 | and these two quantities 0 Fig. 10: Tradeoff in youtube ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-8a485f18-50e4-4fb2-88d2-8c65831503ff.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1209v1-figure-5ec031be-2a46-45c4-b01b-1cf73df27f59.jpg) Fig. 11: Total Variance (TV) TABLE V: ( k, /epsilon1 ) -obf | σ | H 1 | H 2 open | S NE | S AD | S MD | S DV | S CC | S PL | S APD | S ED | S CL | S Diam | rel.err | |---------|-------|------------|---------|--------|---------|---------|--------|--------|---------|--------|--------|----------|-----------| | dblp | 199 | 125302 | 1049866 | 6.62 | 343 | 100.15 | 0.306 | 2.245 | 7.69 | 9 | 7.46 | 20 | | | 0.001 | 72.9 | 40712.1 | 1048153 | 6.61 | 316 | 97.46 | 0.303 | 2.244 | 7.74 | 9.4 | 7.5 | 20 | 0.018 | | 0.01 | 41.1 | 24618.2 | 1035994 | 6.53 | 186 | 86.47 | 0.294 | 2.248 | 7.82 | 9.5 | 7.59 | 19.8 | 0.077 | | 0.1 | 19.7 | 7771.4 | 991498 | 6.25 | 164.9 | 64.2 | 0.284 | 2.265 | 8.08 | 10 | 7.85 | 20 | 0.128 | | amazon | 153 | 113338 | 925872 | 5.53 | 549 | 33.2 | 0.205 | 2.336 | 12.75 | 16 | 12.1 | 44 | | | 0.001 | 55.7 | 55655.9 | 924321 | 5.52 | 479.1 | 31.73 | 0.206 | 2.34 | 12.14 | 15.2 | 11.65 | 33.2 | 0.057 | | 0.01 | 34.5 | 39689.8 | 915711 | 5.47 | 299.7 | 27.18 | 0.22 | 2.348 | 12.4 | 15.6 | 11.91 | 32.4 | 0.101 | | 0.1 | 19.2 | 16375.4 | 892140 | 5.33 | 253.9 | 21.87 | 0.232 | 2.374 | 12.52 | 15.5 | 12.06 | 31.4 | 0.144 | | youtube | 978 | 321724 | 2987624 | 5.27 | 28754 | 2576 | 0.0062 | 2.429 | 6.07 | 8 | 6.79 | 20 | | | 0.001 | 157.2 | 36744.6 | 2982974 | 5.26 | 28438 | 2522.6 | 0.0062 | 2.416 | 6.24 | 8 | 6.01 | 19.5 | 0.022 | | 0.01 | 80 | 22361.7 | 2940310 | 5.18 | 26900 | 2282.6 | 0.0061 | 2.419 | 6.27 | 8 | 6.04 | 19 | 0.043 | | 0.1 | 23.4 | 5806.9 | 2624066 | 4.62 | 16353 | 970.8 | 0.007 | 2.438 | 6.59 | 8.1 | 6.36 | 20.4 | 0.160 | TABLE VI: RandWalk and RandWalk-mod | t | H 1 | H 2 open | S NE | S AD | S MD | S DV | S CC | S PL | S APD | S ED | S CL | S Diam | rel.err | |------------|-------|------------|---------|--------|---------|---------|--------|--------|---------|--------|--------|----------|-----------| | dblp | 199 | 125302 | 1049866 | 6.62 | 343 | 100.15 | 0.306 | 2.245 | 7.69 | 9 | 7.46 | 20 | | | (RW) 2 | 10 | 4.9 | 1001252 | 6.32 | 309.3 | 86.16 | 0.152 | 2.197 | 7.43 | 9.1 | 7.2 | 19.7 | 0.094 | | 3 | 11.8 | 10.9 | 1048129 | 6.61 | 315.4 | 98.04 | 0.107 | 2.155 | 7.08 | 8.7 | 6.88 | 17.8 | 0.110 | | 5 | 11.7 | 5.6 | 1049484 | 6.62 | 321.6 | 100.77 | 0.065 | 2.148 | 6.79 | 8 | 6.62 | 16.4 | 0.142 | | 10 | 11.9 | 2.9 | 1049329 | 6.62 | 329.2 | 103.06 | 0.03 | 2.144 | 6.54 | 8 | 6.4 | 14.3 | 0.171 | | (RW-mod) 2 | 11.8 | 4.5 | 1049921 | 6.62 | 327 | 105.3 | 0.093 | 2.11 | 7.75 | 9.7 | 7.48 | 23 | 0.109 | | 3 | 11.9 | 9.4 | 1049877 | 6.62 | 343.3 | 105.1 | 0.071 | 2.117 | 7.32 | 9 | 7.1 | 20.4 | 0.099 | | 5 | 12 | 5.4 | 1049781 | 6.62 | 340.5 | 105.1 | 0.044 | 2.115 | 6.95 | 8.4 | 6.76 | 18.3 | 0.131 | | 10 | 11.9 | 2.6 | 1049902 | 6.62 | 340 | 105.3 | 0.021 | 2.116 | 6.59 | 8 | 6.44 | 16 | 0.164 | | amazon | 153 | 113338 | 925872 | 5.53 | 549 | 33.2 | 0.205 | 2.336 | 12.75 | 16 | 12.1 | 44 | | | (RW) 2 | 5.7 | 5.4 | 861896 | 5.15 | 274.9 | 23.11 | 0.148 | 2.337 | 10.7 | 13.8 | 10.19 | 38.7 | 0.180 | | 3 | 10 | 16.5 | 923793 | 5.52 | 495.6 | 32.72 | 0.113 | 2.282 | 10.33 | 13.1 | 9.87 | 34.1 | 0.137 | | 5 | 10.4 | 8.6 | 925185 | 5.53 | 507.7 | 33.52 | 0.08 | 2.276 | 9.45 | 12.1 | 9.07 | 29.6 | 0.181 | | 10 | 10.2 | 4.6 | 925748 | 5.53 | 498.1 | 34.37 | 0.046 | 2.273 | 8.55 | 10.5 | 8.25 | 25.7 | 0.234 | | (RW-mod) 2 | 9.8 | 3.2 | 925672 | 5.53 | 255.1 | 37.61 | 0.099 | 2.246 | 12.02 | 15.5 | 11.4 | 43.2 | 0.139 | | 3 | 9.9 | 11.2 | 925532 | 5.53 | 535.3 | 37.32 | 0.082 | 2.254 | 10.89 | 14 | 10.38 | 37.9 | 0.134 | | 5 | 9.7 | 6 | 926163 | 5.53 | 522.8 | 37.42 | 0.059 | 2.252 | 9.83 | 12.5 | 9.4 | 33 | 0.185 | | 10 | 9.9 | 3.3 | 925809 | 5.53 | 491.4 | 37.45 | 0.035 | 2.251 | 8.76 | 11 | 8.44 | 28.7 | 0.238 | | youtube | 978 | 321724 | 2987624 | 5.27 | 28754 | 2576 | 0.0062 | 2.429 | 6.07 | 8 | 6.79 | 20 | | | (RW) 2 | 13.4 | 1.5 | 2636508 | 4.65 | 19253.8 | 1139.7 | 0.022 | 2.191 | 6.18 | 7.9 | 5.93 | 23.5 | 0.403 | | 3 | 23.8 | 17.6 | 2982204 | 5.26 | 26803.6 | 2389.6 | 0.004 | 2.108 | 5.73 | 7 | 5.52 | 18 | 0.103 | | 5 | 24.6 | 8.4 | 2985967 | 5.26 | 26018.7 | 2340 | 0.005 | 2.106 | 5.55 | 7 | 5.38 | 16.3 | 0.120 | | 10 | 21.9 | 1.8 | 2984115 | 5.26 | 24695.8 | 2099.4 | 0.009 | 2.1 | 5.49 | 6.9 | 5.33 | 18.7 | 0.145 | | (RW-mod) 2 | 26.4 | 1.4 | 2987228 | 5.26 | 23829.7 | 2578.5 | 0.018 | 2.053 | 6.27 | 8 | 6.02 | 22.1 | 0.245 | | 3 | 26.9 | 22.3 | 2988011 | 5.27 | 28611.5 | 2579.7 | 0.005 | 2.077 | 5.75 | 7.2 | 5.54 | 19 | 0.081 | | 5 | 26.1 | 11 | 2987479 | 5.26 | 28619.3 | 2581.4 | 0.005 | 2.076 | 5.61 | 7 | 5.44 | 18.3 | 0.090 | | 10 | 26.3 | 1.7 | 2987475 | 5.26 | 28432.2 | 2579.9 | 0.008 | 2.073 | 5.58 | 7 | 5.41 | 18.8 | 0.099 | are higher than those of ( k, /epsilon1 ) -obf where the number of edges is preserved only at small σ . RandWalk and RandWalk-mod do not have many edges preserved due to their rewiring nature. | E G 0 \ E G | increases slowly in MaxVar because the edges in G 0 always have positive probabilities. Fig 11 compares the normalized total variance (i.e. divided by | E G 0 | ) of three schemes. Again, MaxVar is between ( k, /epsilon1 ) -obf and RandWalkmod. ## VIII. CONCLUSION We provide a generalized view of graph anonymization based on the semantics of edge uncertainty. Via the model of uncertain adjacency matrix with the constraint of unchanged expected degree for all nodes, we analyze recently proposed schemes and explain why there exists a gap between them by comparing the total degree variance. We propose MaxVar , a novel anonymization scheme exploiting two key observations: maximizing the total degree variance while keeping the expected degrees of all nodes unchanged and using nearby potential edges. We also investigate an elegant Mixture approach that together with MaxVar fill the gap between ( k, e ) -obf and RandWalk . Furthermore, we promote the usage of incorrectness measure for privacy assessment in a new quantifying framework rather than Shannon entropy and min-entropy (k-anonymity). The experiments demonstrate the effectiveness of our methods. Our work may incite several directions for future research including (1) novel constructions of uncertain graphs based on the uncertain adjacency matrix (2) deeper analysis on the privacy-utility relationships in MaxVar (e.g. TABLE VII: Effectiveness of MaxVar ( k denotes one thousand) | n p | H 1 | H 2 open | S NE | S AD | S MD | S DV | S CC | S PL | S APD | S ED | S CL | S Diam | rel.err | |---------|-------|------------|---------|--------|---------|---------|--------|--------|---------|--------|--------|----------|-----------| | dblp | 199 | 125302 | 1049866 | 6.62 | 343 | 100.15 | 0.306 | 2.245 | 7.69 | 9 | 7.46 | 20 | | | 200 k | 59.7 | 3257.2 | 1049774 | 6.62 | 342.3 | 100.73 | 0.279 | 2.213 | 7.66 | 9.3 | 7.43 | 19.5 | 0.017 | | 400 k | 40.7 | 744 | 1049813 | 6.62 | 343.5 | 101.26 | 0.255 | 2.189 | 7.56 | 9.1 | 7.33 | 18.9 | 0.030 | | 600 k | 32.1 | 325.7 | 1050066 | 6.62 | 343.4 | 101.73 | 0.235 | 2.173 | 7.46 | 9 | 7.25 | 17.7 | 0.045 | | 800 k | 29.5 | 199.2 | 1049869 | 6.62 | 345.9 | 102.07 | 0.219 | 2.163 | 7.45 | 9 | 7.24 | 17 | 0.056 | | 1000 k | 27 | 140.7 | 1049849 | 6.62 | 345.4 | 102.29 | 0.205 | 2.155 | 7.34 | 9 | 7.15 | 17 | 0.064 | | amazon | 153 | 113338 | 925872 | 5.53 | 549 | 33.2 | 0.205 | 2.336 | 12.75 | 16 | 12.1 | 44 | | | 200 k | 30.2 | 2209.1 | 925831 | 5.53 | 551.5 | 33.83 | 0.197 | 2.321 | 12.38 | 16.1 | 11.72 | 40.5 | 0.022 | | 400 k | 22.8 | 452.4 | 925928 | 5.53 | 550.2 | 34.4 | 0.182 | 2.306 | 11.88 | 15.3 | 11.28 | 37.1 | 0.050 | | 600 k | 17.8 | 188.4 | 925802 | 5.53 | 543.9 | 34.79 | 0.167 | 2.296 | 11.6 | 15 | 11.04 | 36.9 | 0.066 | | 800 k | 17.2 | 118.8 | 925660 | 5.53 | 550 | 35.11 | 0.154 | 2.289 | 11.33 | 14.4 | 10.81 | 34.5 | 0.087 | | 1000 k | 15.2 | 82.4 | 925950 | 5.53 | 551.8 | 35.43 | 0.142 | 2.282 | 11.13 | 14.1 | 10.62 | 31.8 | 0.105 | | youtube | 978 | 321724 | 2987624 | 5.27 | 28754 | 2576 | 0.0062 | 2.429 | 6.07 | 8 | 6.79 | 20 | | | 600 k | 114.4 | 4428.8 | 2987898 | 5.27 | 28759 | 2576 | 0.0065 | 2.373 | 6.19 | 7.8 | 5.97 | 18.6 | 0.030 | | 1200 k | 84.2 | 1419.2 | 2987342 | 5.26 | 28754 | 2576 | 0.0064 | 2.319 | 6.02 | 7.2 | 5.82 | 17.9 | 0.042 | | 1800 k | 71.4 | 814.4 | 2987706 | 5.27 | 28745 | 2577 | 0.0062 | 2.287 | 5.97 | 7.1 | 5.78 | 17.2 | 0.049 | | 2400 k | 65.3 | 595.5 | 2987468 | 5.26 | 28749 | 2577 | 0.006 | 2.265 | 5.96 | 7.1 | 5.77 | 16.6 | 0.056 | | 3000 k | 62.8 | 513.7 | 2987771 | 5.27 | 28761 | 2578 | 0.0058 | 2.251 | 5.89 | 7.1 | 5.71 | 16.4 | 0.062 | explaining the near linear and near quadratic curves) (3) study on directed and bipartite graphs. - [17] L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems , 10(05):557-570, 2002. ## REFERENCES - [1] L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW , pages 181-190. ACM, 2007. - [2] P. Boldi, F. Bonchi, A. Gionis, and T. Tassa. Injecting uncertainty in graphs for identity obfuscation. Proceedings of the VLDB Endowment , 5(11):1376-1387, 2012. - [3] F. Bonchi, A. Gionis, and T. Tassa. Identity obfuscation in graphs through the information theoretic lens. In ICDE , pages 924-935. IEEE, 2011. - [4] J. Cheng, A. W.-c. Fu, and J. Liu. K-isomorphism: privacy preserving network publication against structural attacks. In SIGMOD , pages 459470. ACM, 2010. - [5] N. Dalvi and D. Suciu. Management of probabilistic data: foundations and challenges. In PODS , pages 1-12. ACM, 2007. - [6] A. M. Fard, K. Wang, and P. S. Yu. Limiting link disclosure in social network analysis through subgraph-wise perturbation. In EDBT , pages 109-119. ACM, 2012. - [7] M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proceedings of the VLDB Endowment , 1(1):102-114, 2008. - [8] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD) , 1(1):2, 2007. - [9] K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD , pages 93-106. ACM, 2008. - [10] P. Mittal, C. Papamanthou, and D. Song. Preserving link privacy in social network based systems. In NDSS , 2013. - [11] M. E. Newman. The structure and function of complex networks. SIAM review , 45(2):167-256, 2003. - [12] C. R. Palmer, P. B. Gibbons, and C. Faloutsos. Anf: A fast and scalable tool for data mining in massive graphs. In KDD , pages 81-90. ACM, 2002. - [13] M. Potamias, F. Bonchi, A. Gionis, and G. Kollios. K-nearest neighbors in uncertain graphs. Proceedings of the VLDB Endowment , 3(1-2):9971008, 2010. - [14] A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and B. Y. Zhao. Measurement-calibrated graph models for social network experiments. In WWW , pages 861-870. ACM, 2010. - [15] R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In SP , pages 247-262. IEEE, 2011. - [16] G. Smith. On the foundations of quantitative information flow. In Foundations of Software Science and Computational Structures , pages 288-302. Springer, 2009. - [18] C.-H. Tai, P. S. Yu, D.-N. Yang, and M.-S. Chen. Privacy-preserving social network publication against friendship attacks. In KDD , pages 1262-1270. ACM, 2011. - [19] A. V´ azquez. Growing network with local rules: Preferential attachment, clustering hierarchy, and degree correlations. Physical Review E , 67(5):056104, 2003. - [20] W. Wu, Y. Xiao, W. Wang, Z. He, and Z. Wang. k-symmetry model for identity anonymization in social networks. In EDBT , pages 111-122. ACM, 2010. - [21] X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SDM , volume 8, pages 739-750. SIAM, 2008. - [22] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM , volume 36, pages 267-278. ACM, 2006. - [23] Y. Yuan, G. Wang, H. Wang, and L. Chen. Efficient subgraph search over large uncertain graphs. Proc. VLDB Endow , 4(11), 2011. - [24] B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE , pages 506-515. IEEE, 2008. - [25] L. Zou, L. Chen, and M. T. ¨ zsu. O K-automorphism: A general framework for privacy preserving network publication. Proceedings of the VLDB Endowment , 2(1):946-957, 2009. - [26] Z. Zou, J. Li, H. Gao, and S. Zhang. Mining frequent subgraph patterns from uncertain graph data. Knowledge and Data Engineering, IEEE Transactions on , 22(9):1203-1218, 2010. ## APPENDIX ## A. Proof of theorem 4.5 Proof: For power-law graphs, the node degree distribution is P k ( ) = k -γ ζ γ ( ) . The number of selfloops n PL sl in B ∞ RW is the sum of elements on the main diagonal. $$& \text{ACM,} \\ & \text{ghbors} \\ & \text{$\Psi$} \colon 9 7 - \\ & \text{$n_{s} l} \colon 9 7 - \\ & \text{$n_{i=1} } \\ & \text{$n_{k=1} } \\ & \text{ments.} \\ & \text{$n_{k} \colon 9 7 - \\ & \text{$n_{k=1} } \\ & \text{$n_{k} \colon 9 7 - \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 -} \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n_{k} \colon 9 7 - } \\ \text{$n_{n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - } \\ \text{$n} \colon 9 7 - }$$ To prove that there is no multiedge in B ∞ RW we show that all elements in B ∞ RW are less than 1. This is equivalent to show d max &lt; √ 2 m . We use the constraint that the number of $$& = \frac { 1 } { E ( k ) } \sum _ { k = 1 } ^ { \infty } \frac { k ^ { - ( \gamma - 2 ) } } { \zeta ( \gamma ) } = \frac { \zeta ( \gamma ) } { \zeta ( \gamma - 1 ) } \frac { \zeta ( \gamma - 2 ) } { \zeta ( \gamma ) } = \frac { \zeta ( \gamma - 2 ) } { \zeta ( \gamma - 1 ) } \\ & \text{row that there is no multidead as in } R ^ { \infty } \quad \text{we show that}$$ $$\begin{matrix} \\ \end{matrix}$$ TABLE VIII: MaxVar vs. ( k, /epsilon1 ) -obf , RandWalk and RandWalk-mod (lower tradeoff is better) | | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | PRIVACY UTILITY | |------------------------------------|-------------------|-------------------------|--------------------------|-------------------------|-------------------------|-------------------------|-------------------------|-------------------|-------------------| | graph | H 1 | H 2 open | | E G 0 \ E G | | | E G \ E G 0 | | /epsilon1 ( k = 30) | /epsilon1 ( k = 50) | /epsilon1 ( k = 100) | rel.err | tradeoff | | dblp | 199 | 125302 | | | 0.00238 | 0.00393 | 0.00694 | | | | σ = 0 . 001 σ = 0 . 01 σ = 0 . 1 | 72.9 41.1 19.7 | 40712.1 24618.2 7771.4 | 6993.0 19317.3 65285.1 | 5280.2 5444.9 6916.8 | 0.00039 0.00051 0.00179 | 0.00122 0.00062 0.00199 | 0.00435 0.00082 0.00245 | 0.018 0.077 0.128 | 3.61 12.03 11.33 | | (MV) n p = 200 k (MV) n p = 600 k | 59.7 32.1 | 3257.2 325.7 | 94508.0 246155.6 | 94416.5 246355.3 | 0.00033 0.00017 | 0.00077 0.00029 | 0.00152 0.00085 | 0.017 0.045 | 0.99 0.82 | | (RW) t = 2 (RW) t = 5 | 10.0 11.7 | 4.9 5.6 | 615966.2 754178.1 | 567352.2 753796.3 | 0.00318 0.00271 | 0.00439 0.00386 | 0.00789 0.00689 | 0.094 0.142 | 0.21 0.34 | | (RW-mod) t = 2 (RW-mod) t = 5 | 11.8 12.0 | 4.5 5.4 | 719361.2 784872.3 | 719416.5 784786.8 | 0.00073 0.00057 | 0.00135 0.00113 | 0.00252 0.00228 | 0.109 0.131 | 0.23 0.30 | | amazon | 153 | 113338 | | | 0.00151 | 0.00218 | 0.00456 | | | | σ = 0 . 001 σ = 0 . 01 σ = 0 . 1 | 55.7 34.5 19.2 | 55655.9 39689.8 16375.4 | 6158.9 14962.0 39382.6 | 4607.4 4801.3 5650.3 | 0.00048 0.00038 0.00068 | 0.00119 0.00052 0.00102 | 0.00293 0.00066 0.00190 | 0.065 0.114 0.145 | 13.40 21.33 18.46 | | (MV) n p = 200 k (MV) n p = 600 k | 30.2 17.8 | 2209.1 188.4 | 104800.9 266603.7 | 104759.9 266533.7 | 0.00023 0.00015 | 0.00032 0.00023 | 0.00065 0.00047 | 0.022 0.066 | 1.03 0.91 | | (RW) t = 2 (RW) t = 5 | 5.7 10.4 | 5.4 8.6 | 649001.0 629961.8 | 585025.5 629274.9 | 0.00213 0.00146 | 0.00338 0.00239 | 0.00550 0.00423 | 0.180 0.181 | 0.42 0.53 | | (RW-mod) t = 2 (RW-mod) t = 5 | 9.8 9.7 | 3.2 6.0 | 725440.1 671694.2 | 725239.9 671985.4 | 0.00048 0.00038 | 0.00073 0.00058 | 0.00133 0.00137 | 0.139 0.185 | 0.25 0.45 | | youtube | 978 | 321724 | | | 0.00291 | 0.00402 | 0.00583 | | | | σ = 0 . 001 σ = 0 . 01 σ = 0 . 1 | 157.2 80.0 23.4 | 36744.6 22361.7 5806.9 | 19678.5 62228.6 378566.0 | 15028.5 14914.3 15007.5 | 0.00143 0.00060 0.00038 | 0.00232 0.00105 0.00052 | 0.00421 0.00232 0.00074 | 0.022 0.043 0.160 | 4.28 6.38 12.20 | | (MV) n p = 600 k (MV) n p = 1800 k | 114.4 71.4 | 4428.8 814.4 | 213097.3 521709.9 | 213371.4 521791.6 | 0.00047 0.00040 | 0.00063 0.00052 | 0.00108 0.00090 | 0.030 0.049 | 2.00 1.38 | | (RW) t = 2 | 13.4 | 1.5 | 2836169.3 | 2485053.4 | 0.00319 | 0.00425 | 0.00623 0.00598 | 0.403 0.120 | 0.50 0.35 | | (RW) t = 5 | 24.6 26.4 | 8.4 | 2468068.6 | 2466411.3 | 0.00304 | 0.00408 0.00226 | 0.00355 | 0.245 | 0.29 | | (RW-mod) t = 2 (RW-mod) t = 5 | 26.1 | 1.4 11.0 | 2863112.1 2467414.9 | 2862716.3 2467269.5 | 0.00159 0.00153 | 0.00322 | 0.00159 | 0.090 | 0.30 | nodes with degree d max must be at least 1, i.e. nd -γ max ζ γ ( ) ≥ 1 ↔ d max ≤ ( n/ζ γ ( )) 1 /γ . Because ζ ( γ ) &gt; 1 and we consider γ &gt; 2 in social networks, ( n/ζ γ ( )) 1 /γ &lt; √ n . Meanwhile, √ 2 m = √ n ζ γ ( -1) ζ γ ( ) &gt; √ n due to the fact that ζ ( γ ) is monotonically decreasing. So we conclude n PL me = 0 . Assume that the result is correct up to k -1 edges, i.e. V ar D [ ( G k -1 , G k -1 )] = ∑ k -1 i =1 p i (1 -p i ) for all G k -1 /subsetsqequal G k -1 , we need to prove that it is also correct for k edges. We use the subscript notations G k , G k for the case of k edges. We consider two cases of G k : e k ∈ G k and e k / G ∈ k . Case 1. The formula for V ar D [ ( G k , G k )] is $$\begin{array} { c } k! \, \ell \\ V a r [ D ( \mathcal { G } _ { k }, G _ { k } ) ] = \sum _ { G ^ { \prime } _ { k } \sqsubseteq \mathcal { G } _ { k } } P r ( G ^ { \prime } _ { k } ) [ D ( G ^ { \prime } _ { k }, G _ { k } ) - E [ D ( \mathcal { G } _ { k }, G _ { k } ) ] ] ^ { 2 } \\ \ell _ { k } ^ { 2 } P ( k ) \quad \bigtriangledown _ { \mathfrak { m } \cdots \mathcal { C } ^ { \prime } \, \llcorner \, \infty } \, \sum _ { \mathfrak { m } \cdots \mathcal { C } ^ { \prime } \, \llcorner \, \infty } \, \sum _ { \mathfrak { m } \cdots \mathcal { C } ^ { \prime } \, \llcorner \, \infty } \, \sum _ { \mathfrak { m } \cdots \mathcal { C } ^ { \prime } \, \llcorner \, \infty } \, \sum _ { \mathfrak { m } \cdots \mathcal { C } ^ { \prime } \, \llcorner \, \infty } \end{array}$$ For sparse ER random graphs, we have P k ( ) → e -λ λ k k ! . The number of selfloops n ER sl is $$& \quad n _ { s l } ^ { E R } = \frac { 1 } { 2 m } \sum _ { i = 1 } ^ { n } d _ { i } ^ { 2 } = \frac { 1 } { 2 m } \sum _ { k = 1 } ^ { n } k ^ { 2 } n P ( k ) = \frac { n } { n E ( k ) } \sum _ { k = 1 } ^ { \infty } k ^ { 2 } P ( k ) = \sum _ { \substack { e _ { k } \in G _ { k } ^ { \prime } \\ P r ( G _ { k } ^ { \prime } ) [ D k - E [ D ] ] ^ { 2 } + \sum _ { \substack { e _ { k } \not \in G _ { k } ^ { \prime } \\ P r ( G _ { k } ^ { \prime } ) [ D k - E [ D ] ] ^ { 2 } \\ = \frac { 1 } { 2 } E ( k ^ { 2 } ) = \frac { 1 } { 2 } ( E ( k ) ^ { 2 } + V a r ( k ) ) = \frac { 1 } { 2 } ( \lambda ^ { 2 } + \lambda ) = \lambda + 1 } \sum _ { \substack { e _ { k } \not \in G _ { k } ^ { \prime } \\ P r ( G _ { k } ^ { \prime } ) [ D k - E [ D ] ] ^ { 2 } + \sum _ { \substack { e _ { k } \not \in G _ { k } ^ { \prime } \\ P r ( G _ { k } ^ { \prime } ) [ D k - E [ D ] ] ^ { 2 } \\ = \frac { 1 } { 2 } E ( k ^ { 2 } ) = \frac { 1 } { 2 } ( E ( k ) ^ { 2 } + V a r ( k ) ) = \frac { 1 } { 2 } ( \lambda ^ { 2 } + \lambda ) = \lambda + 1 } \sum _ { \substack { e _ { k } \not \in G _ { k } ^ { \prime } \\ P r ( G _ _ { k } ^ { \prime } ) [ D k - E [ D ] ] ^ { 2 } \\ = \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \in \frac { 1 } { 2 } \end{array}.$$ Similar to the case of PL graphs, we show that d max &lt; √ 2 m where d max = max k ne -λλ k k ! ≥ 1 = max k λ k ! k ≤ ne -λ . Using the basic facts k k/ 2 ≤ k ! and k &gt; λ we get k k/ 2 λ k ≤ ne -λ &lt; n , so k &lt; n 2 /k λ 2 &lt; √ nλ = √ 2 m as long as n is sufficiently large and λ ≥ 4 . So we conclude n ER me = 0 . The first sum is ∑ G ′ k -1 /subsetsqequalG k -1 p Pr G k ( ′ k -1 )[ D k -1 -E D [ k -1 ] -(1 -p k )] 2 . The second sum is ∑ G ′ k -1 /subsetsqequalG k -1 (1 -p k ) Pr G ( ′ k -1 )[ D k -1 -E D [ k -1 ] + p k )] 2 . $$n _ { s l } ^ { E R } = \frac { 1 } { 2 m } \sum _ { i = 1 } ^ { n } d _ { i } ^ { 2 } = \frac { 1 } { 2 m } \sum _ { k = 1 } ^ { \infty } k ^ { 2 } n P ( k ) = \frac { n } { n E ( k ) } \sum _ { k = 1 } ^ { \infty } k ^ { 2 } P ( k ) \, = \, \sum _ { e _ { k } \in G _ { k } ^ { \prime } } F \\ = \frac { 1 } { \lambda } E ( k ^ { 2 } ) = \frac { 1 } { \lambda } ( E ( k ) ^ { 2 } + V a r ( k ) ) = \frac { 1 } { \lambda } ( \lambda ^ { 2 } + \lambda ) = \lambda + 1 \, \quad \, \quad \, \quad \, \text{The if} \quad \text{$f$} \quad \text{$\sim$} \quad \text{$\sim$} \quad \text{$\sim$} \quad \text{$E[D_\dots]}$} \, - \, \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \text{$f$} \quad \end{cases}.$$ Here we use shortened notations D k for D G ,G ( ′ k k ) and E D [ k ] for E D [ ( G k , G k )] . ## B. Proof of theorem 5.1 Proof: We prove the result by induction. When k = 1 , we have two cases of G 1 : E G 1 = { e 1 } and E G 1 = ∅ . For both cases, V ar D [ ( G 1 , G 1 )] = p 1 (1 -p 1 ) , i.e. independent of G 1 . By simple algebra, we have V ar D [ ( G k , G k )] = V ar D [ ( G k -1 , G k -1 )] + q k (1 -q k ) = ∑ k i =1 p i (1 -p i ) . Case 2. similar to the Case 1.
null
[ "Hiep H. Nguyen", "Abdessamad Imine", "Michaël Rusinowitch" ]
2014-08-06T08:31:50+00:00
2014-08-06T08:31:50+00:00
[ "cs.SI" ]
Anonymizing Social Graphs via Uncertainty Semantics
Rather than anonymizing social graphs by generalizing them to super nodes/edges or adding/removing nodes and edges to satisfy given privacy parameters, recent methods exploit the semantics of uncertain graphs to achieve privacy protection of participating entities and their relationship. These techniques anonymize a deterministic graph by converting it into an uncertain form. In this paper, we propose a generalized obfuscation model based on uncertain adjacency matrices that keep expected node degrees equal to those in the unanonymized graph. We analyze two recently proposed schemes and show their fitting into the model. We also point out disadvantages in each method and present several elegant techniques to fill the gap between them. Finally, to support fair comparisons, we develop a new tradeoff quantifying framework by leveraging the concept of incorrectness in location privacy research. Experiments on large social graphs demonstrate the effectiveness of our schemes.
1408.1210v1
## HARISH-CHANDRA SERIES IN FINITE UNITARY GROUPS AND CRYSTAL GRAPHS THOMAS GERBER, GERHARD HISS AND NICOLAS JACON Abstract. The distribution of the unipotent modules (in nondefining prime characteristic) of the finite unitary groups into Harish-Chandra series is investigated. We formulate a series of conjectures relating this distribution with the crystal graph of an integrable module for a certain quantum group. Evidence for our conjectures is presented, as well as proofs for some of their consequences for the crystal graphs involved. In the course of our work we also generalize Harish-Chandra theory for some of the finite classical groups, and we introduce their Harish-Chandra branching graphs. ## 1. Introduction Harish-Chandra theory provides a means of labelling the simple modules of a finite group G of Lie type in non-defining characteristics, including 0 . The set of simple modules of G (up to isomorphism) is partitioned into disjoint subsets, the Harish-Chandra series, each arising from a cuspidal simple module of a Levi subgroup of G . Inside each series, the modules are classified by the simple modules of an IwahoriHecke algebra arising from the the cuspidal module which representing the series. This yields, however, a rather indirect labelling of the simple modules, as it requires the classification of the cuspidal simple modules. Moreover, for each of these, the corresponding Iwahori-Hecke algebra has to be computed and its simple modules have to be classified. This program has been completed successfully by Lusztig for modules over fields of characteristic 0 (see [38]). For modules over fields of positive characteristic, only partial results are known. In some cases a different labelling of the simple modules of G is known. This arises from Lusztig's classification of the simple modules Date : August 7, 2014. 2000 Mathematics Subject Classification. 20C33, 20C08, 20G42, 17B37, 81R50. Key words and phrases. Harish-Chandra series, unitary group, branching graph, Fock space, crystal basis, crystal graph. in characteristic 0 , together with sufficient knowledge of Brauer's theory of decomposition numbers. This applies in particular to the general linear groups G = GL n ( q ) and the general unitary groups G = GU n ( q ) , where the unipotent modules (in any non-defining characteristic) are labelled by partitions of n . For characteristic 0 this result is due to Lusztig and Srinivasan [39], for prime characteristic it follows from work of Dipper [3] and Geck [10]. In these cases it is natural to ask how to determine the partition of the unipotent modules into HarishChandra series from these labels of the unipotent modules, i.e. from the partitions of n . By work of Dipper and Du (see [5, Section 4 ]), this can be done for the general linear groups. First attempts to find a similar description for the unitary groups are described in [13]. It turned out, however, that this is possible only in a favourable case, the case of linear characteristic (see [21, Corollary 8 11 . ] in conjunction with the above mentioned results by Dipper and Du). The general description of the Harish-Chandra series of the unitary groups and other classical groups is still open. In this paper we present a series of conjectures which, when true and proved, will solve generalized versions of this problem, at least for large characteristics. Let us now describe our main results and conjectures. As above, G denotes a finite group of Lie type, viewed as group with a split BN -pair of characteristic p . We also let /lscript be a prime different from p . In this introduction, by a simple module for G we will always mean an absolutely simple module over a field of characteristic 0 or /lscript . In Section 2 we introduce a generalization of Harish-Chandra theory if G is a unitary, symplectic and odd dimensional orthogonal groups. Thus the Weyl group of G , as group with a BN -pair, is of type B . Instead of using all Levi subgroups for Harish-Chandra induction, we restrict to what we call pure Levi subgroups: those that arise from a connected subset of the Dynkin diagram of G which is either empty or else contains the first node ajacent to the double edge. This way we obtain more cuspidal modules, which we call weakly cuspidal. All main results of Harish-Chandra theory remain valid in this more general context. In particular, we obtain a distribution of the simple modules into weak Harish-Chandra series (Proposition 2.3). The usual Harish-Chandra series are unions of weak Harish-Chandra series. In characteristic 0 , the two notions coincide for unipotent modules, as a Levi subgroup having a unipotent cuspidal module is pure by Lusztig's classification. In Section 3 we prove some results on the endomorphism ring of a Harish-Chandra induced weakly cuspidal module. Theorem 3.2 states that, under some mild restrictions, this endomorphism ring is in fact an Iwahori-Hecke algebra of type B . Some information about the parameters of this algebra are also given. For example, if a simple weakly cuspidal module in characteristic /lscript lies in a block containing an ordinary cuspidal module, then the parameters of the two Iwahori-Hecke algebras are related through reduction modulo /lscript . In Section 4 we define the Harish-Chandra branching graph for the unipotent modules of the classical groups considered. This graph records the socle composition factors of Harish-Chandra induced unipotent modules, very much in the spirit of Kleshchev's branching rules for modules of symmetric groups (see [33, 34, 35, 36], in particular [34, Theorem 0 5 . ]). Section 5 contains our conjectures. These are restricted to the case of the unitary groups. We thus let G = GU n ( q ) from now on and we write e for the multiplicative order of -q in a field of characteristic /lscript . Following [21, Definition 5 3 . ], we call /lscript linear for G , if e is even. For our conjectures, however, we assume that e is odd and larger than 1 , so that in particular /lscript is non-linear for G . (The case e = 1 , i.e. /lscript | q +1 has been settled in [14].) Conjecture 5.4 concerns the relation between Harish-Chandra series of ordinary modules and those in characteristic /lscript . It predicts that if two unipotent modules of G , labelled by the partitions λ and µ , respectively, lie in the same weak Harich-Chandra series, then λ and µ have the same 2 -core, i.e. the ordinary unipotent modules labelled by these two partitions also lie in the same HarishChandra series. In this sense the /lscript -modular Harish-Chandra series (of unipotent modules) form a refinement of the ordinary Harish-Chandra series. According to Conjecture 5.5, the e -core of λ should be a 2 -core, if λ labels a weakly cuspidal unipotent module. This amounts to the assertion that if a unipotent /lscript -block contains a weakly cuspidal module, then the block also contains an ordinary cuspidal module (not necessarily unipotent). Conjecture 5.7 relates the Harish-Chandra branching graphs with crystal graphs arising from canonical bases in submodules of Fock spaces of level 2 , which are acted on by the quantum group U ′ v ( ̂ sl e ) . This is in analogy to the case of Kleshchev's branching graph in characteristic p , which is isomorphic to the crystal graph of a Fock space of level 1 with an action of the quantum group U ′ v ( ̂ sl p ) (see [33, 34, 35, 36]). The conjecure is also put in perspective by the results of Shan [40] on the branching rules on the category O of the cyclotomic rational double affine Hecke algebras. Finally, Conjecture 5.8 is just a weaker form of Conjecture 5.7. Its statement gives an algorithm to compute the distribution of the unipotent modules in characteristic /lscript into weak Harish-Chandra series from the combinatorics of the crystal graph involved. In our conjectures we assume that /lscript is large enough (compared to n ), without specifying any bound. In the computed examples, /lscript &gt; n is good enough. In Section 6 we collect our evidence for the conjectures. In Theorem 6.2 we prove that Conjecture 5.8 holds for some subgraphs of the Harish-Chandra branching graph and the crystal graph, respectively. It is a generalization of the main result of Geck [11] for principal series to other ordinary Harish-Chandra series. Similarly, Theorem 6.6 asserts that parts of our conjectures hold for blocks of weight 1 , i.e. blocks with cyclic defect groups. We also compute the parameters of the Iwahori-Hecke algebra corresponding to a weakly cuspidal module under the assumption that Conjecture 5.5 holds true (Proposition 6.3). Finally, the truth of Conjectures 5.7 and 5.8 implies an isomorphism of certain connected components of crystal graphs with different parameters. This is discussed in 6.4. In Section 7 we prove that the consequences implied by the conjectures for the crystal graphs are indeed true. This adds more evidence to our conjectures. Conjecture 5.8 implies that a weakly cuspidal module is labelled by a partition which gives rise to a highest weight vertex in the crystal graph. Such partitions can be characterized combinatorially (see [28]). We prove in Theorem 7.6 that the corresponding e -core is indeed a 2 -core, as predicted by Conjecture 5.5. In [13, Theorem 8 3 . ] we had proved that the unipotent module of G labelled by the partition (1 n ) is cuspidal if and only if /lscript divides n or n -1 . Weprove that the anologous statement holds for corresponding vertices of the crystal graph (Proposition 7.5). Another consequence is stated in Corollary 7.7. Suppose that λ labels a weakly cuspidal module of G and that the 2 -core of λ is different from λ and contains more than one node. Then there is a particular e -hook of λ such that the partition λ ′ obtained from λ by removing this e -hook also labels a weakly cuspidal module, and the two weakly cuspidal modules should give rise to isomorphic HarishChandra branching graphs. This is remarkable as n and n -e have different parities and the modules of G = GU n ( q ) and GU n -e ( q ) are not directly related via Harish-Chandra induction. We prove in Theorem 7.8 that, as predicted in 6.4, the two connected components in question are isomorphic (as unlabelled) graphs. A further consequence of our conjectures is stated in Corollary 7.9: non-isomorphic composition factors of the socles of modules Harish-Chandra induced from G = GU n ( q ) to GU n +2 ( q ) , lie in different /lscript -blocks. Let us finally comment on the history of this paper. First notes of the second author date back to 1993, following the completion of [13]. There, a general conjecture for the distribution of the simple modules of a unitary group into Harish-Chandra series for the linear prime case was presented. This conjecture was later verified in [21]. A further conjecture of [13] for the case that /lscript divides q +1 was proved in [14]. The conjectures in [13] were based on explicit decomposition matrices of unipotent modules of GU n ( q ) , computed by Gunter Malle. These decomposition matrices were completely known in the linear prime case for n ≤ 10 and published in [13]. At that time, the information in the non-linear prime case was less comprehensive. Much more complete versions of these decomposition matrices and the distribution of the unipotent modules into Harish-Chandra series are now available by the recent work [7] of Dudas and Malle. Since the publication of [13], many attempts have been made to find the combinatorial pattern behind the Harish-Chandra series of the unitary groups. The breakthrough occurred in 2009, when the second and last author shared an office during a special program at the Isaac Newton Institute in Cambridge. The paper [11] by Geck and some other considerations of the second author suggested that the simple modules of certain Iwahori-Hecke algebras of type B should label some unipotent modules of the unitary groups. The paper [15] by Geck and the third author on canonical basic sets then proposed the correct labelling by Uglov bipartitions. This set of bipartitions is defined through a certain crystal graph, called G c ,e below. The two authors compared their results on these crystal graphs on the one hand, and on the known Harish-Chandra distribution on the other hand. Amazingly, the two results matched. ## 2. A generalization of Harish-Chandra theory Here we introduce a generalization of Harish-Chandra theory for certain families of classical groups by restricting the set of Levi subgroups. - 2.1. Let q be a power of the prime p . For a non-negative integer n let G := G n := G n ( q ) denote one of the following classical groups, where we label the cases according to the (twisted) Dynkin type of the groups: ( 2 A ) : GU ( q ) , ( 2 A 2 n ) : GU 2 n +1 ( q ) , 2 n - 1 2 n ( B n ) : SO 2 n +1 ( q ) , ( C n ) : Sp 2 n ( q ) . (We interpret GU 0 ( q ) and Sp 0 ( q ) as the trivial group.) If n ≥ 1 , the group G is a finite group with a split BN -pair of characteristic p , satisfying the commutator relations. In these cases, 6 the Weyl group W of G is a Coxeter group of type B n , and we number the set S = { s , . . . , s 1 n } of fundamental reflections of W according to the following scheme. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1210v1-figure-a6238129-737a-4b06-8db7-28a4e56930c9.jpg) 2.2. A subset I ⊆ S is called left connected , if it is of the form I = { s , s 1 2 , . . . , s r } for some 0 ≤ r ≤ n . The corresponding standard Levi subgroup L I of G is denoted by L r,n -r . ALevi subgroup L of G is called pure , if it is conjugate in N to a standard Levi subgroup L I with I left connected. The set of all pure Levi subgroups of G is denoted by L ∗ , whereas L denotes the set of all N -conjugates of all standard Levi subgroups of G . If L ∈ L ∗ , a pure Levi subgroup of L is an element M ∈ L ∗ with M ≤ L . Notice that the set of N -conjugacy classes in L ∗ is linearly ordered in the following sense. Let L, M ∈ L ∗ . Then | L &lt; M | | | if and only if there is x ∈ N such that x L ≤ M . In particular, | L | = | M | if and only if L and M are conjugate in N . Put δ := 2 , if G n ( q ) = GU n ( q ) , and δ := 1 , otherwise. Then the standard Levi subgroup L r,n -r of G has structure $$L _ { r, n - r } \cong G _ { r } ( q ) \times G L _ { 1 } ( q ^ { \delta } ) \times \cdots \times G L _ { 1 } ( q ^ { \delta } )$$ with n -r factors GL 1 ( q δ ) , and with a natural embedding of the direct factors of L r,n -r into G . Lemma. Let I and J be two left connected subsets of S , and let x ∈ D IJ , where D IJ ⊆ W denotes the set of distinguished double coset representatives with respect to the parabolic subgroups W I and W J of W . Then x I ∩ J is left connected. Proof. We identify W with the set of permutations π of {± i | 1 ≤ i ≤ n } satisfying π ( -i ) = -π i ( ) for all 1 ≤ i ≤ n . If J = ∅ , there is nothing to prove. Thus assume that J = { s , . . . , s 1 r } for some 1 ≤ r ≤ n . Then W J is the stabilizer of the subset {± i | 1 ≤ i ≤ r } and all the singletons not in this set. It follows that x W I ∩ W J is the stabilizer of a set {± i | i ∈ Z } and all the singletons not in this set, where Z ⊆ { 1 , . . . , r } . On the other hand, if J ′ := x I ∩ J , then x W I ∩ W J = W J ′ , as x ∈ D IJ . This implies that J ′ is left connected, as otherwise W J ′ would not be a stabilizer as above. /square Götz Pfeiffer has informed us of a different proof of the above result, using the descent algebra of W . Pfeiffer's proof also applies to Weyl groups of type A and D . Proposition. Let L , M be pure Levi subgroups of G , and let x ∈ N . Then x L ∩ M is a pure Levi subgroup of G . Proof. We may assume that L = L I and M = L J for I, J ⊆ S left connected. As x L I ∩ L J is conjugate in N to y L I ∩ L J , where y ∈ D IJ , we may also assume that x ∈ D IJ . Then x I ∩ J is left connected by the lemma. This completes the proof. /square /negationslash Let L ∈ L . We write R G L and ∗ R G L for Harish-Chandra induction from kL -mod to kG -mod and Harish-Chandra restriction from kG -mod to kL -mod, respectively. For X ∈ kL -mod we put - 2.3. Let k be a field of characteristic /lscript = p ≥ 0 , such that k is a splitting field for all subgroups of G . We write kG -mod for the category of finite-dimensional kG -modules. It is known that Harish-Chandra philosophy for kG carries over to the situation where L is replaced by L ∗ . The first ideas in this direction go back to Grabmeier's thesis [19], who replaced Green correspondence in symmetric groups by a generalized Green correspondence with respect to Young subgroups. Further developments are due to Dipper and Fleischmann [6]. A comprehensive treatment including several new aspects can be found in [2, Chapter 1]. The crucial ingredient in this generalization is Proposition 2.2. $$H _ { k } ( L, X ) \coloneqq \text{End} _ { k G } ( R _ { L } ^ { G } ( X ) )$$ for the endomorphism algebra of R G L ( X ) . /negationslash /negationslash Let X ∈ kG -mod. We say that X is weakly cuspidal , if ∗ R G L ( X ) = 0 for all G = L ∈ L ∗ . Apair ( L, X ) with L ∈ L ∗ and X a weakly cuspidal simple kL -module is called a weakly cuspidal pair . Let ( L, X ) be a weakly cuspidal pair. Then the weak Harish-Chandra series defined by ( L, X ) consists of the simple kG -modules which are isomorphic to submodules of R G L ( X ) . If Y ∈ kG -mod lies in the weak Harish-Chandra series defined by ( L, X ) , then L ∈ L ∗ is minimal with ∗ R G L ( Y ) = 0 , and X is a composition factor of ∗ R G L ( Y ) . We collect a few important facts about weak Harish-Chandra series. Proposition. Let ( L, X ) be a weakly cuspidal pair. (a) Write $$R _ { L } ^ { G } ( X ) = Y _ { 1 } \oplus \dots \oplus Y _ { r }$$ with indecomposable modules Y i , 1 ≤ i ≤ r . Then each Y i has a simple head Z i , which is also isomorphic to the socle of Y i . Moreover, Y i ∼ = Y j , if and only if Z i ∼ = Z j . The Harish-Chandra series defined by ( L, X ) consists of the kG -modules isomorphic to the Z i . - (b) The weak Harish-Chandra series partition the set of isomorphism types of the simple kG -modules. - (c) The weak Harish-Chandra series defined by ( L, X ) is contained in a usual Harish-Chandra series, and thus every usual Harish-Chandra series is partitioned into weak Harish-Chandra series. Proof. It follows from [2, Theorems 1 20( . iv ) , 2 27 . ] that H k ( L, X ) is a symmetric k -algebra (notice that the cited results are also valid in our situation where L is replaced by L ∗ ). This implies the statements of (a) (see, e.g. [2, Theorem 1 28 . ]). The proof of (b) is analogous to the proof in the usual HarishChandra theory. To prove (c), let M ∈ L , and let Z ∈ kM -mod be cuspidal (in the usual sense) such that X occurs in the socle of R L M ( Z ) . Then R G L ( X ) is a submodule of R G L ( R L M ( Z )) = ∼ R G M ( Z ) , and thus every simple module in the socle of R G L ( X ) also occurs in the socle of R G M ( Z ) and hence in the usual Harish-Chandra series defined by ( M,Z ) . /square - 2.4. Let ( L, X ) be a weakly cuspidal pair. The following proposition gives information about those composition factors of R G L ( X ) that do not lie in the weak Harish-Chandra series defined by ( L, X ) . The corresponding result for usual Harish-Chandra series is implicitly contained in [23, Lemma 5 7 . ] (see the remarks in [13, (2.2)]). Since this result is particularly relevant in the definition of the Harish-Chandra branching graph, and since it is not explicitly formulated in [23, Lemma 5 7 . ], and wrongly stated in [12, Proposition 2 11( ) . b ], we give a proof here. Proposition. Let ( L, X ) be a weakly cuspidal pair, and let Y be a composition factor of R G L ( X ) . Suppose that Y lies in the weak HarishChandra series defined by ( M,Z ) , a weakly cuspidal pair. Then there is x ∈ N such that x L ≤ M . If x L = M , then Z ∼ = x X . In particular, if Y does not lie in the weak Harish-Chandra series defined by ( L, X ) , then | L &lt; M | | | . Proof. Let P Z ( ) denote the projective cover of Z . We have /negationslash $$0 \neq [ P ( Z ), ^ { * } R _ { M } ^ { G } ( Y ) ] = [ R _ { M } ^ { G } ( P ( Z ) ), Y ],$$ the inequality arising from the fact that Z is a composition factor of ∗ R G M ( Y ) , the equation arising from adjointness. As Y is a composition factor of R G L ( X ) , we obtain /negationslash $$\text{factor of } K _ { L } ^ { \prime } ( \mathcal { A } ), \, \text{we obtain} \\ 0 \neq [ R _ { M } ^ { G } ( P ( Z ) ), R _ { L } ^ { G } ( X ) ] = \sum _ { x \in D _ { M, L } } [ P ( Z ), R _ { M \cap ^ { z } L } ^ { M } ( ^ { * } R _ { M \cap ^ { z } L } ^ { x L } ( ^ { x } X ) ) ].$$ /negationslash /negationslash (Here, D M,L ⊆ N denotes a suitable set of representatives for double cosets with respect to parabolic subgroups of G with Levi complements M and L , respectively.) Thus there is x ∈ D M,L such that [ P Z , R ( ) M M x ∩ x L ( ∗ R x L M ∩ x L ( x X ))] = 0 . As ( L, X ) is a weakly cuspidal pair, so is ( x L, X ) . It follows that M ∩ x L = x L , and thus x L ≤ M . If x L = M , we obtain [ P Z , X ( ) x ] = 0 , hence our claim. /square 2.5. If char ( k ) = 0 , a kG -module is unipotent , if it is simple and its character is unipotent. If /lscript &gt; 0 , a kG -module is unipotent , if it is simple and its Brauer character (with respect to a suitable /lscript -modular system) is a linear combination of unipotent characters (restricted to /lscript ′ -elements). As L ∗ ⊆ L , every cuspidal kG -module X is weakly cuspidal. The converse is not true, as the following example shows. Let G = GU 6 ( q ) and suppose that /lscript &gt; 6 and divides q 2 -q +1 . The Levi subgroup L = GL 3 ( q 2 ) (a Levi complement of the stabilizer of a maximal isotropic subspace of the natural vector space of G ), contains a cuspidal unipotent kL -module X by [13, Theorem 7.6]. By applying [14, Lemma 3.16] and [20, Proposition 2.3.5] we find that R G L ( X ) is indecomposable. Let Y denote the unique head composition factor of R G L ( X ) (see [14, Theorem 2 4 . ]). By construction, Y is not cuspidal, but weakly cuspidal. (The kG -module Y has label 2 3 in the notation of [7, Table 8 ]). /negationslash Now suppose that /lscript = 0 . Then a weakly cuspidal unipotent kG -module is cuspidal. Indeed, GL n ( q δ ) has a cuspidal unipotent module over k only if n = 1 . In particular, if L ∈ L has a cuspidal unipotent module over k , then L ∈ L ∗ . If X is a weakly cuspidal unipotent kG -module and L ∈ L is minimal with ∗ R G L ( X ) = 0 , every constituent of ∗ R G L ( X ) is cuspidal. Thus L ∈ L ∗ and hence, as X is weakly cuspidal, L = G . ## 3. The endomorphism algebra of Harish-Chandra induced weakly cuspidal modules In important special cases the endomorphism algebras H k ( L, X ) of weakly cuspidal pairs ( L, X ) are Iwahori-Hecke algebras. The result applies in particular when X is unipotent. We keep the notation of Section 2, except that we assume that n ≥ 1 here. Thus if G = G n ( q ) is one of the groups introduced in 2.1, then G has a split BN -pair of rank n . Let /lscript be a prime not dividing q . We choose an /lscript -modular system ( K, O , k ) such that K is large enough for G . That is, O is a complete discrete valuation ring with field of fractions K of characteristic 0 , and residue class field k of characteristic /lscript . Moreover, K is a splitting field for all subgroups of G . - 3.1. Put r := n -1 and L := L r, 1 ∈ L ∗ . Thus L = M × T with M ∼ = G q r ( ) and T ∼ = GL 1 ( q δ ) . (In case n = 1 , either M is the trivial group, or cyclic of order q + 1 if G = GU 3 ( q ) .) Let P denote the standard parabolic subgroup of G with Levi complement L and let U denote its unipotent radical. We have | W G ( L ) | = 2 and we let s ∈ N G ( L ) denote an inverse image of the involution in W G ( L ) . We choose s of order 2 if G is unitary or orthogonal, and of order 4 with s 2 ∈ T if G is symplectic, and such that s centralizes M . (Such an s always exists.) Let R be one of the rings K , O , or k . As M is an epimorphic image of P , we get a surjective homomorphism π : RP → RM . Consider the element $$y \coloneqq \sum _ { \substack { u, u ^ { \prime } \in U \\ s u ^ { \prime } s u s \in P } } \ s u ^ { \prime } s u s \in R P.$$ $$\begin{array} { l l l } \text{element} \\ ( 2 ) & & y \coloneqq \sum _ { \substack { u, u ^ { \prime } \in U \\ s u ^ { \prime } s u s \in P \\ \end{array} } \ s u ^ { \prime } s u \\ \text{---} & & \tilde { \lambda } & \frac { \pi } { 2 } \dots \end{array}$$ Then z := π y ( ) ∈ Z RM ( ) as s centralizes M . Lemma. With the above notation, z = ( q -1) z ′ for some z ′ ∈ Z RM ( ) . In case G is a unitary group, we have z ′ = 1 + ( q + 1) z ′′ for some z ′′ ∈ Z RM ( ) . Proof. We first claim that T ∼ GL ( q δ ) acts on $$\mathcal { U } \coloneqq \{ ( u ^ { \prime }, u ) \in U \times U \ | \ s u ^ { \prime } s u s \in P \}$$ $$& \text{ aim that } T \cong \text{GL} _ { 1 } ( q ^ { \delta } ) \text{ acts on} \\ & = \left \{ ( u ^ { \prime }, u ) \in U \times U \ | \ s u ^ { \prime } s u s \in P \right \}$$ by $$x. ( u ^ { \prime }, u ) \coloneqq ( s x s ^ { - 1 } u ^ { \prime } s x ^ { - 1 } s ^ { - 1 }, x u x ^ { - 1 } ), \ \ x \in T, ( u ^ { \prime }, u ) \in \mathcal { U }.$$ Indeed, $$( 3 ) \quad s ( s x s ^ { - 1 } u ^ { \prime } s x ^ { - 1 } s ^ { - 1 } ) s ( x u x ^ { - 1 } ) s = ( s ^ { 2 } x s ^ { - 2 } ) s u ^ { \prime } s u s ( s ^ { - 1 } x ^ { - 1 } s )$$ for x ∈ T, ( u , u ′ ) ∈ U . As s normalizes T , the claim follows. Now π x ( ) = 1 for x ∈ T and thus (3) implies π su sus ( ′ ) = π sv sv ( ′ ) if ( u , u ′ ) , ( v , v ′ ) ∈ U are in the same T -orbit. /negationslash /negationslash The claims in the arguments below can be verified by a direct computation in G . Suppose that G is a unitary or symplectic group. For each 1 = u ∈ Z U ( ) there is a unique u ′ ∈ Z U ( ) such that ( u , u ′ ) ∈ U . For every such pair we have π su sus ( ′ ) = 1 . The elements ( u , u ′ ) ∈ U with u ∈ Z U ( ) lie in regular T -orbits, as T acts fixed point freely on U \ Z U ( ) by conjugation. This implies our result, as | Z U ( ) | = q and | T | = q δ -1 . Now suppose that G is an orthogonal group. Then T acts with regular orbits on U \{ } 1 , hence on U , again implying our result. /square - 3.2. Let R be one of K or k . If X is an indecomposable RG -module, we let ω X denote the central character of RG determined by the block containing X . Let r be an integer with 0 ≤ r ≤ n and put m := n -r . Let L := L r,m ∈ L ∗ denote the standard Levi subgroup of G = G n ( q ) isomorphic to G q r ( ) × GL 1 ( q δ ) m . Write M and T for the direct factors of L isomorphic to G q r ( ) and GL 1 ( q δ ) m , respectively. Let X be a weakly cuspidal simple RM -module, extended trivially to an RL -module. For R = K and X cuspidal, the following result is due to Lusztig (see [37, Section 5 ]). Theorem. With the above notation, H R ( L, X ) is an Iwahori-Hecke algebra corresponding to the Coxeter group of type B m , with parameters as in the following diagram. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1210v1-figure-46f0aee3-b05e-45b6-8c1d-5856ef6ee89b.jpg) The parameter Q is determined as follows. Let U and z be as in 3.1, applied to G r +1 . Put γ := ω X ( z ) ∈ R and let ξ ∈ R be a solution of the quadratic equation $$x ^ { 2 } - \gamma \, x - | U | = 0.$$ Then $$Q = \frac { \xi \gamma } { | U | } + 1.$$ Moreover, the following statements hold. - (a) Suppose that R = k and that X lies in a block containing a cuspidal KM -module Y . If ˆ Q is the parameter of H K ( L, Y ) associated to the leftmost node of the diagram (4), then Q is the reduction modulo /lscript of ˆ Q . - (b) If R = k and /lscript | q -1 , then Q = 1 . - (c) If R = k and /lscript | q +1 , then Q = -1 . Proof. First notice that we have W G ( L, X ) = W G ( L ) , and that W G ( L ) is isomorphic to a subgroup of W and a Coxeter group of type B m (see [25]). We also have $$\dim _ { R } ( H _ { R } ( L, X ) ) = | W _ { G } ( L ) |.$$ Put N ( L ) := ( N G ( L ) ∩ N L ) (recall that G has a BN -pair), so that W G ( L ) = N ( L /L ) . Then N ( L ) = M × C with T ≤ C and C/T ∼ = W G ( L ) . In particular, we may view X as an R N ( L ) -module on which C acts trivially. The parameters not corresponding to the leftmost node of (4) can now be computed exactly as in the case where X is cuspidal and unipotent (see [14, Proposition 4 4 . ]). To determine Q we may assume that m = 1 . Thus G = G r +1 ( q ) and L ∼ = M × GL 1 ( q 2 ) . We are thus in the situation of 3.1 and make use of the notation introduced there. Then H := H R ( L, X ) is 2 -dimensional over R with basis elements B 1 and B s , where B 1 is the unit element of H and B s is defined as follows. We may realize R G L ( X ) as $$R _ { L } ^ { G } ( X ) = \{ f \, \colon G \rightarrow X \ | \ f ( h g ) = h. f ( g ), \text{ for all } h \in P, g \in G \}.$$ Then B s is defined by $$\i m \, \nu _ { s } \, \text{is a memo } \nu y \\ B _ { s } ( f ) ( g ) \coloneqq \frac { 1 } { | U | } \sum _ { u \in U } f ( s u g ), \quad \ \ f \in R _ { L } ^ { G } ( X ), g \in G, \\ \sim \quad \ \dots \quad \dots \quad \dots \quad \ \ e \quad \ \ d \quad \ e \quad \ d \quad \ e \quad \ d \quad \ e \quad \ d \quad \ e \quad \ d \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ e \quad \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ \ e \quad \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \t \, \ e \quad \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \. \ \ e \quad \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t. \ \ e \quad \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t\, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t. \ \ e \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ e \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \, \ t \}$$ as s ∈ C acts trivially on X . We have B 2 s = ζB 1 + ηB s with ζ = 1 / U | | , and η such that the element y of (2) acts as the scalar | U η | on X . This is proved exactly as in [26, Proposition 3.14]. Now y acts in the same way on X as z = π y ( ) . Since X is absolutely irreducible, z ∈ Z RM ( ) acts by the scalar ω X ( z ) . Thus | U η | = ω X ( z ) = γ . Put $$T _ { s } \coloneqq \xi B _ { s }, \ \ T _ { 1 } \coloneqq B _ { 1 }.$$ Then $$T _ { s } ^ { 2 } = Q T _ { 1 } + ( Q - 1 ) T _ { s }$$ with Q = ξη +1 . This gives our first claim. To prove (a), put ˆ := γ ω Y ( z ) , and let ˆ ξ be a solution of x 2 -ˆ γx -| U | = 0 . Observe that ˆ γ, ξ ˆ ∈ O . Then the reduction modulo /lscript of ˆ γ equals ω X ( z ) , and the reduction modulo /lscript of ˆ ξ is a solution of x 2 -γx -| U | = 0 . Thus the reduction modulo /lscript of ˆ := ˆ ˆ+ 1 Q ξη equals ξη +1 = Q and (a) is proved. Suppose now that R = k . If /lscript | q -1 , we have γ = 0 by Lemma 3.1 and thus Q = 1 . If G is unitary and /lscript | q +1 , we have γ = -2 , again by Lemma 3.1. Also, | U | is an odd power of q , i.e. | U | = -1 in k , hence ξ = -1 and Q = -1 . This completes our proof. /square ## 4. The Harish-Chandra branching graph /negationslash In this section we fix a prime power q of p and a prime /lscript = p . We also let k denote an algebraically closed field of characteristic /lscript . - 4.1. For n ∈ N , we let G := G n := G n ( q ) denote one of the groups of 2.1. Recall that G n is naturally embedded into G n +1 , by embedding G n into the pure Levi subgroup L n, 1 ∼ = G n × GL 1 ( q δ ) of G n +1 . By iterating, we obtain an embedding of G n into G n + m for every m ∈ N . By kG -mod u we denote the full subcategory of kG -mod consisting of the modules that have a filtration by unipotent kG -modules. By the result of Broué and Michel [1], and by [22], kG -mod u is a direct sum of blocks of kG . The above embedding of G n into G n + m yields a functor $$R _ { n } ^ { n + m } \colon k G _ { n } \text{-mod} ^ { u } \rightarrow k G _ { n + m } \text{-mod} ^ { u },$$ defined by $$R _ { n } ^ { n + m } ( X ) \coloneqq R _ { L _ { n, m } } ^ { G _ { n + m } } ( \text{Inf} _ { G _ { n } } ^ { L _ { n, m } } ( X ) ), \ \ X \in k G _ { n } \text{-mod} ^ { u },$$ where Infl L n,m G n ( X ) denotes the trivial extension of X to L n,m ∼ = G n × GL 1 ( q δ ) m . The adjoint functor $$* R _ { n } ^ { n + m } \colon k G _ { n + m } \text{-mod} ^ { u } \rightarrow k G _ { n } \text{-mod} ^ { u },$$ is given by $$R _ { n } ^ { n + m } ( X ) \coloneqq \text{Res} _ { G _ { n } } ^ { L _ { n, m } } ( ^ { * } R _ { L _ { n, m } } ^ { G _ { n + m } } ( X ) ), \ \ X \in k G _ { n + m } \text{-mod} ^ { u }.$$ Let R n := R n ( q ) denote the Grothendieck group of kG n -mod , and u put $$\mathcal { R } \coloneqq \mathcal { R } ( q ) \coloneqq \bigoplus _ { n \in \mathbb { N } } \mathcal { R } _ { n }. \\ \mathcal { C } \cdots \mathcal { A } u \cdots \mathcal { C } \cdots \mathcal { I } \vdots \mathcal { I } \cdots \mathcal { I } \vdots$$ For an object X ∈ kG n -mod , we let u [ X ] denote its image in R n . 4.2. The (twisted) Dynkin type of G is one of the symbols 2 A ι with ι ∈ { 0 1 , } , B or C , where GU r ( q ) has twisted Dynkin type 2 A ι with ι ≡ ( r mod 2) . The Harish-Chandra branching graph G D ,q,/lscript corresponding to q , /lscript and the (twisted) Dynkin type D is the directed graph whose vertices are the elements [ X ] , where X is a simple object in kG n -mod u for some n ∈ N . Thus the vertices of G D ,q,/lscript are the standard basis elements of R . We say that the a vertex [ X ] has rank n , if [ X ] ∈ R n . Let [ X ] and [ Y ] be vertices in G D ,q,/lscript . Then there is a directed edge from [ X ] to [ Y ] if and only if there is n ∈ N such that [ X ] has rank n and [ Y ] has rank n + 1 , and such that Y is a head composition factor of R n +1 n ( X ) . A vertex in G D ,q,/lscript is called a source vertex , if it has only outgoing edges. As every unipotent kG -module is self dual, Y is a head composition factor of R n +1 n ( X ) if and only if Y is in the socle of R n +1 n ( X ) . By adjunction, Y is a head composition factor of R n +1 n ( X ) if and only if X is in the socle of ∗ R n +1 n ( Y ) , and Y is in the socle of R n +1 n ( X ) if and only if X is a head composition factor of ∗ R n +1 n ( Y ) . An example for part of a Harish-Chandra branching graph is displayed in Table 1, where the vertices are represented by their labels. This can be proved with the help of the decomposition matrices computed in [7] plus some ad hoc arguments. - 4.3. We have the following relation with the weak Harish-Chandra series of G . Proposition. Let [ X ] be a vertex of rank n of G D ,q,/lscript . Then [ X ] is a source vertex if and only if X ∈ kG n -mod u is weakly cuspidal. Suppose that X is weakly cuspidal and let m ∈ N . View X as a module of L n,m via inflation. Then a simple object Y ∈ kG n + m -mod u lies in the weak ( L n,m , X ) Harish-Chandra series, if and only if there is a directed path from [ X ] to [ Y ] in G D ,q,/lscript . Proof. Clearly, X is weakly cuspidal if n = 0 . Assume that n ≥ 1 . Then X is weakly cuspidal if and only if ∗ R n n -1 ( X ) = 0 , which is the case if and only if [ X ] is a source vertex. Assume now that X is weakly cuspidal, let m ∈ N and let [ Y ] be a vertex of rank n + m . Suppose there is a path from [ X ] to [ Y ] . We proceed by induction on m to show that Y occurs in the head of R n + m n ( X ) . If m = 0 , there is nothing to prove. So assume that m &gt; 0 and that the claim has been prove for m -1 . Let [ Z ] be a vertex of rank n + m -1 that occurs in a path from [ X ] to [ Y ] . By induction, Z is a head composition factor of R n + m -1 n ( X ) . By exactness, R n + m n + m -1 ( Z ) is a quotient of R n + m n + m -1 ( R n + m -1 n ( X )) = ∼ R n + m n ( X ) . As Y is a quotient of R n + m n + m -1 ( Z ) , we are done. Suppose now that Y occurs in the head of R n + m n ( X ) . We proceed by induction on m to show that there is a path from [ X ] to [ Y ] , the cases m ≤ 1 being trivial. As Y is isomorphic to a quotient of R n + m n ( X ) = ∼ R n + m n + m -1 ( R n + m -1 n ( X )) , there is a composition factor Z of R n + m -1 n ( X ) such that Y is a quotient of R n + m n + m -1 ( Z ) . In particular, there is an edge from [ Z ] to [ Y ] . If Z occurs in the head of R n + m -1 n ( X ) , there is a path from [ X ] to [ Z ] by induction, and we are done. Aiming at a contradiction, assume that Z does not occur in the head of R n + m -1 n ( X ) . Then Z does not lie in the weak Harish-Chandra series of G n + m -1 defined by ( L n,m -1 , X ) . It follows from Proposition 2.4 that Z lies in the weak Harish-Chandra series defined by ( L n ,n ′ -n ′ + m -1 , X ′ ) for some n &lt; n ′ and some weakly cuspidal module X ′ . In particular, Y lies in this weak Harish-Chandra series. This contradiction completes our proof. /square ## 5. Conjectures Here we formulate a series of conjectures about the /lscript -modular HarishChandra series and the Harish-Chandra branching graph for the unitary groups. - 5.1. As always, we let q denote a power of a prime p , and we fix a prime /lscript different from p . The multiplicative order of -q modulo /lscript is denoted by e := e q, /lscript ( ) . Thus e is the smallest positive integer such that /lscript divides ( -q ) e -1 . For a non-negative integer n we let G := GU n ( q ) be the unitary group of dimension n . Also, ( K, O , k ) denotes an /lscript -modular system such that K is large enough for G and with k algebraically closed. - 5.2. The set of partitions of a non-negative integer n is denoted by P n and we write λ /turnstileleft n if λ ∈ P n . We put P := ∪ n ∈ N P n . Let λ ∈ P . Then λ (2) and λ (2) denote the 2 -core and the 2 -quotient of λ , respectively. (As in [9, Section 1 ], the 2 -quotient is determined via a β -set for λ with an odd number of elements, where we use the term β -set in its original sense of being a finite set of non-negative integers as introduced in [30, p. 77 f].) For a non-negative integer t we write ∆ := ( t t, t -1 , . . . , 1) for the triangular partition of t ( t +1) 2 / . Then λ (2) = ∆ t for some t ∈ N . Suppose that λ (2) = ( µ , µ 1 2 ) . We then put ¯ λ (2) := ( µ , µ 1 2 ) if t is even, and ¯ λ (2) := ( µ , µ 2 1 ) , otherwise. If µ = ( µ , µ 1 2 ) is a bipartition, we let Φ ( t µ ) denote the unique partition λ with λ (2) = ∆ t and ¯ λ (2) = ( µ , µ 1 2 ) (see [30, Theorem 2 7 30 . . ]). The set of bipartitions of n is denoted by P (2) n , and we put P (2) := ∪ n ∈ N P (2) n . Finally, we write µ /turnstileleft 2 n if µ ∈ P (2) n . - 5.3. By a result of Lusztig and Srinivasan [39], the unipotent KG -modules are labelled by partitions of n . We write Y λ for the unipotent KG -module labelled by λ ∈ P n . Let λ and µ be partitions of n . It follows from the main result of Fong and Srinivasan [8, Theorem (7A)], that Y λ and Y µ lie in the same /lscript -block of G , if and only if λ and µ have the same e -core. The e -weight and the e -core of the /lscript -block containing Y λ are, by definition, the e -weight and the e -core of λ , respectively. It was shown by Geck in [10] that if the Y λ , λ /turnstileleft n , are ordered downwards lexicographically, the corresponding matrix of /lscript -decomposition numbers is square and upper unitriangular. This defines a labelling of the unipotent kG -modules by partitions of n , and we write X µ for the unipotent kG -module labelled by µ ∈ P n . Thus X µ is determined by the following two conditions. Firstly, X µ occurs exactly once as a composition factor in a reduction modulo /lscript of Y µ , and secondly, if X µ is a composition factor in a reduction modulo /lscript of Y ν for some ν ∈ P n , then ν ≤ µ . - 5.4. Our first conjecture asserts a compatibility between ordinary and modular Harish-Chandra series. Conjecture. Let µ, ν ∈ P n . If X µ and X ν lie in the same weak HarishChandra series of kG -modules, then µ and ν have the same 2 -core, i.e. Y µ and Y ν lie in the same Harish-Chandra series of KG -modules. (In other words, the partition of P n arising from the weak /lscript -modular Harish-Chandra series is a refinement of the partition of P n arising from the ordinary Harish-Chandra series.) - 5.5. We also conjecture that a weakly cuspidal unipotent module can only occur in an /lscript -block of G which contains a cuspidal simple KG -module (not necessarily unipotent). In fact, if e is odd, a unipotent /lscript -block B contains a cuspidal simple KG -module if and only if the e -core of B is a 2 -core. This can be seen as follows. Suppose first that the e -core of B is the 2 -core ∆ s . Put m ′ := s s ( +1) 2 / . Let x be an /lscript -element in G with C := C G ( x ) = ( q e +1) w × GU m ′ ( q ) , where ( q e +1) w denotes a direct product of w factors of the cyclic group of order q e + 1 (and n = we + m ′ ). Let Z denote the cuspidal unipotent KC -module labelled by ∆ s , and let Y be the simple KG -module corresponding to Z under Lusztig's Jordan decomposition. Then Y is cuspidal by [37, 7.8.2], and Y lies in B by [8, Theorem (7A) and Proposition (4F)]. Conversely, suppose that B contains some cuspidal simple KG -module Y . Then Y determines a unipotent KC -module, where C is the centralizer in G of some /lscript -element. Let µ ∈ P be the partition labelling Z . Then µ is a 2 -core, and in turn, the e -core of µ is a 2 -core as well. As the e -core of µ equals the e -core of B , again by [8, Theorem (7A) and Proposition (4F)], our claim follows. Conjecture. Let λ ∈ P n . If X λ is weakly cuspidal, then the e -core of λ is a 2 -core. It follows from [21, Corollary 8 8 . ] that if e is even, then X λ is cuspidal if and only if λ is a 2 -core. (In this case, λ also is an e -core.) Assuming that Conjecture 5.5 holds, the parameter Q of a weakly cuspidal unipotent kG -module X λ of G can be computed from the e -core of λ by Corollary 6.3 below. 5.6. To present our next conjectures, we first have to introduce the Fock space of level 2 and its corresponding crystal graph. The results summarized below are due to Jimbo, Misra, Miwa and Okado [31] and Uglov [41]. For a detailed exposition see also [16, Chapter 6 ]. A charged bipartition is a pair ( µ, c ) , written as | µ, c 〉 with µ ∈ P (2) and c ∈ Z 2 . Fix c = ( c , c 1 2 ) ∈ Z 2 , and let v denote an indeterminate. The Fock space (of level 2 ) and charge c is the Q ( v ) -vector space $$\text{I level } 2 \right ) \text{ and canarge } c \text{ is } \in \bigoplus _ { m \in \mathbb { N } } \bigoplus _ { \mu \vdash _ { 2 } m } \mathbb { Q } ( v ) | \mu, c \rangle.$$ Assume that e ≥ 2 . There is an action of the quantum group U ′ v ( ̂ sl e ) on F c such that F c is an integrable U ′ v ( ̂ sl e ) -module and | µ, c 〉 is a weight vector for every m ∈ N and µ /turnstileleft 2 m . Moreover, | ( - -, ) , c 〉 is a highest weight vector and U ′ v ( ̂ sl e ) . | ( - -, ) , c 〉 is isomorphic to V (Λ( c )) , the simple highest weight module with weight Λ( ) = Λ c c 1 mod e +Λ c 2 mod e , where the Λ 0 i ≤ i ≤ e -1 denote the fundamental weights of ̂ sl e . We write F c ,e when we view F c as a U ′ v ( sl e ) -module. ̂ There is a crystal graph G c ,e describing the canonical basis of F c ,e . The vertices of G c ,e are all charged bipartitions | µ, c 〉 , µ /turnstileleft 2 m m , ∈ N . There is a directed, coloured edge | µ, c 〉 i → | ν, c 〉 if and only if ν is obtained from µ by adding a good i -node, where the colours i are in the range 0 ≤ i ≤ e -1 . The associated Kashiwara operator ˜ f i acts on G c ,e by mapping the vertex | µ, c 〉 to | ν, c 〉 if and only if there is an edge | µ, c 〉 → | i ν, c 〉 , and to 0 , otherwise (see e.g. [16, 6.1]). Let us now describe, following [16], how to compute the good i -nodes of | µ, c 〉 , and thus the graph G c ,e , algorithmically. A node of µ = ( µ , µ 1 2 ) is a triple ( a, b, j ) , where ( a, b ) is a node in the Young diagram of µ j , for j = 1 2 , . A node γ of µ is called addable (respectively removable) if µ ∪ { γ } (respectively µ \{ γ } ) is still a bipartition. The content of γ = ( a, b, j ) is the integer cont ( γ ) = b -a + c j . The residue of γ is the element of { 0 1 , , . . . , e - } 1 defined by res ( γ ) = cont ( γ ) mod e . For 0 ≤ i ≤ e -1 , γ is called an i -node if res ( γ ) = i . Fix i ∈ { 0 1 , , . . . , e - } 1 , and define an order on the set of addable and removable i -nodes of µ by setting $$\i \text{ removable } i \text{-nodes of } \mu \text{ by setting } \\ \gamma \prec _ { \mathbf c } \gamma ^ { \prime } \text{ if } \begin{cases} \text{ cont} ( \gamma ) < cont ( \gamma ^ { \prime } ) \text{ or } \\ \text{ cont} ( \gamma ) = cont ( \gamma ^ { \prime } ) \text{ and } \ j > j ^ { \prime }. \end{cases} \\ \cdot \quad \hat { \ }. \quad \hat { \ }. \quad \hat { \ }. \quad \hat { \ }. \quad \hat { \ }. \quad \hat { \ }.$$ Sort these set of nodes according to ≺ c , starting from the smallest one. Encode each addable (respectively removable) i -node by the letter A (respectively R ), and delete recursively all occurences of consecutive letters RA . This yields a word of the form A α i R β i , which is called the reduced i -word of µ . Note that by Kashiwara's crystal theory [32, Section 4.2], we have the following expression for the weight of the vector | µ, c 〉 : $$\intertext { ( 5 ) } \quad \ \ \ \ w t ( \mu, \mathbf c ) = \sum _ { i = 0 } ^ { e - 1 } ( \alpha _ { i } - \beta _ { i } ) \Lambda _ { i }. \\ \tau \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \. \.. \.. \........................................................................................................................................................................................................ }$$ Let γ be the rightmost addable (respectively leftmost removable) i -node in the reduced i -word of µ . Then γ is called the good addable (respectively good removable ) i -node of µ . Each connected component of G c ,e is isomorphic to the crystal of a simple highest weight module of U ′ v ( ̂ sl e ) , whose highest weight vector is the unique source vertex of the component. The rank of a vertex | µ, c 〉 of G c ,e is m , if µ /turnstileleft 2 m . We write G ≤ m c ,e for the induced subgraph of G c ,e containing the vertices of rank at most m . As an example, the graph G ≤ 3 (0 0) 3 , , is displayed in Table 3. 5.7. Let t be a non-negative integer, put r := t ( t + 1) / 2 and ι := r ( mod 2) ∈ { 0 1 , } . Then K GU r ( q ) has a unipotent cuspidal module Y , and ( GU r ( q , Y ) ) determines a Harish-Chandra series of unipotent K GU r +2 m ( q ) -modules for every m ∈ N . Recall from 4.2 that G 2 A ,q,/lscript ι denotes the Harish-Chandra branching graph corresponding to q , /lscript and the groups GU 2 n + ι ( q ) . As we are dealing exclusively with unitary groups in this section, we shall replace the index 2 A ι by ι in the symbol for the graph. The vertices of G ι,q,/lscript correspond to the isomorphism classes of the unipotent k GU 2 n + ι ( q ) -modules, where n runs through the set of positive integers. We may thus label the vertices of G ι,q,/lscript by the set ∪ n ∈ N P 2 n + ι . To formulate our next conjecture, we assume that Conjecture 5.4 holds. Under this assumption, the induced subgraph of G ι,q,/lscript whose vertices are labelled by the set of partitions with 2 -core ∆ t , is a union of connected components of G ι,q,/lscript . We write ˜ G t ι,q,/lscript for the graph with vertices P (2) , and a directed edge µ → ν , if and only if there is a directed edge in G ι,q,/lscript between the vertices labelled by Φ ( t µ ) and Φ ( t ν ) . If µ /turnstileleft 2 m is a vertex of ˜ G t ι,q,/lscript , the rank of this vertex is m . For a nonnegative integer d we let ˜ G t, ≤ d ι,q,/lscript denote the induced subgraph of ˜ G t ι,q,/lscript containing the vertices of rank at most d . Conjecture. Let the notation be as above. Assume that e is odd and put c := ( t + (1 -e / ) 2 0) , . Then there is an integer b := b /lscript ( ) such that ˜ G t, ≤ b ι,q,/lscript equals G ≤ b c ,e , if the colouring of the edges of the latter graph is neglected. - 5.8. As the Harish-Chandra series of unipotent kG -modules can be read off from the Harish-Chandra branching graph by Proposition 4.3, the truth of Conjecture 5.7 would give an algorithm to determine the partition of the kG -modules into weak Harish-Chandra series from the labels of the modules, at least if /lscript is large enough. In particular, the question of whether X λ is weakly cuspidal, can be read off from λ . Conjecture. Let λ ∈ P and let t ∈ N such that λ (2) = ∆ t . Let µ = ¯ λ (2) (see 5.2). Assume that /lscript is large enough, that e is odd and put c := ( t +(1 -e / ) 2 0) , . Then X λ is weakly cuspidal, if and only if | µ, c 〉 is a source vertex in G c ,e . Suppose that X λ is weakly cuspidal and let ρ ∈ P . Then X ρ lies in the weak Harish-Chandra series defined by X λ , if and only if ρ (2) = λ (2) = ∆ t , and | ¯ ρ (2) , c 〉 lies in the connected component of G c ,e containing | µ, c 〉 , i.e. | ¯ ρ (2) , c 〉 is obtained from | µ, c 〉 by adding a sequence of good nodes. ## 6. Some evidence Here we present the evidence for our conjectures. Keep the notation of Section 5. We also assume that e is odd and larger than 1 in this section. - 6.1. Conjecture 5.7 holds for e = 3 5 , and the groups GU n ( q ) for n ≤ 10 , if /lscript &gt; n . In these cases, most of the decomposition numbers and the Harish-Chandra series have been computed by Dudas and Malle [7]. The Harish-Chandra branching graphs can be determined from this information using some additional arguments. The corresponding crystal graphs can be computed with the GAP3 programs written by one of the authors (see [27]). Conjecture 5.8 holds for n = 12 and e = 3 if /lscript ≥ 13 . - 6.2. There are cases where Conjecture 5.8 is known to be true. Theorem. Let 0 ≤ t &lt; ( e -1) / 2 be an integer, put r := t ( t +1) 2 / and let λ := ∆ t . Let m ∈ N , put n := r +2 m and G := GU ( q ) . Then $$L \coloneqq L _ { r, m } \cong \text{GU} _ { r } ( q ) \times \text{GL} _ { 1 } ( q ^ { 2 } ) ^ { m }$$ $$& \colon r + 2 m \ a n d \ G \coloneqq G U _ { n } ( q ). \\ & = L _ { r, m } \cong G U _ { r } ( q ) \times G L _ { 1 } ( q ^ { 2 } )$$ is a pure Levi subgroup of G and X λ is a cuspidal unipotent kL -module. If /lscript is large enough, the unipotent kG -module X ρ lies in the HarishChandra defined by ( L, X λ ) if and only if $$\bar { \rho } ^ { ( 2 ) } \in \Phi _ { e, m } ^ { ( t + ( 1 - e ) / 2, 0 ) },$$ where Φ ( +(1 t -e / ) 2 0) , e,m denotes the set of Uglov bipartitions of m . (See [15, Definition 4 4 . ] ; the Uglov bipartitions are simply the bipartitions labelling the vertices of the connected component of the crystal graph containing | ( - -, ) , c 〉 .) Proof. The cuspidal unipotent KG -module Y λ of GU r ( q ) reduces irreducibly to the unipotent kG -module X λ (see [13, Theorem 6 10 . ]). In particular, X λ is cuspidal. Let ˆ X λ denote the (unique) O L -lattice in Y λ . The endomorphism algebra H O ( L, X ˆ λ ) is an Iwahori-Hecke algebra over O of type B m with parameters q 2 +1 t and q 2 . By a result of Dipper [4, Theorem 4 9 . ], the /lscript -modular decomposition matrix of H O ( L, X ˆ λ ) is embedded into the decomposition matrix of the unipotent KG -modules as a submatrix. By our assumption, /lscript does not divide the order of L and thus X λ and ˆ X λ are projective. It follows that R G L ( ˆ X λ ) is projective. The corresponding columns of the decomposition matrix of O G are exactly the columns of the decomposition matrix of H O ( L, X ˆ λ ) . Let ˆ Z be an indecomposable summand of R G L ( ˆ X λ ) and let Y ρ be a composition factor of K ⊗ O ˆ Z with ρ maximal. Then X ρ equals the head of k ⊗ O ˆ Z and thus lies in the Harish-Chandra series defined by ( L, X λ ) . Every element of this series arises in this way. To proceed, we will make use of the notion of a canonical basic set as defined in [16, Definition 3 2 1 . . ]. Applying the results of [11, Section 3 ], we obtain the following facts. Firstly, the Iwahori-Hecke algebra H k ( L, X λ ) has a canonical basic set with respect to Lusztig's a -function on H k ( L, X λ ) (see [16, p. 13 ]), if /lscript is large enough. Secondly, this canonical basic set agrees with the canonical basic set of a suitable specialization of a generic Iwahori-Hecke algebra to an IwahoriHecke algebra H (2 e ) K of type B m , whose parameters are powers of a 2 e th root of unity. The canonical basic set of H L,X k ( λ ) (or rather of the algebra H (2 e ) K ), is determined in [15, Theorem 5 4 . , Example 5 6 . ]. The elements of this canonical basic set are labelled by the set of Uglov m -bipartitions. The simple H K ( L, Y λ ) -modules correspond to the simple constituents of R G L ( Y λ ) . Arrange the latter by lexicographically decreasing labels. By [17, Theorem 3 7 . ] and the results of Lusztig summarized in [16, 2.2.12], this ordering corresponds to the ordering of the simple modules of H K ( L, Y λ ) via Lusztig's a -function. Through the embedding of the decomposition matrix of H O ( L, X ˆ λ ) , the members of the canonical basic set thus correspond to the composition factors of R G L ( Y λ ) which are at the top of their respective columns in the decomposition matrix of O G . As these top composition factors label the kG -modules in the Harish-Chandra series of kG defined by ( L, X λ ) , our claim follows. /square Theorem 6.2 is true without the assumption that t &lt; ( e -1) / 2 if Conjecture 5.4 holds. Indeed, in this case every unipotent kG -module in the ( L, X λ ) -series is labelled by a partition with 2 -core ∆ t . Let ̂ P X ( λ ) ∈ O L -mod denote the projective cover of X λ . Again by [4, Theorem 4 9 . ], the decomposition matrix of R G L ( ̂ P X ( λ )) contains the decomposition matrix of H O ( L, Y λ ) as a submatrix (with a row of the latter labelled by µ /turnstileleft 2 m corresponding to a row of the former labelled by Φ ( t µ ) ). Let ˆ Z be an indecomposable summand of R G L ( ̂ P X ( λ )) such that the head of k ⊗ O ˆ Z lies in the Harish-Chandra series defined by ( L, X λ ) . Put Z := K ⊗ O ˆ Z , and let Y ρ be a unipotent composition factor of Z with ρ maximal. Then X ρ is the head of k ⊗ O ˆ Z , and hence ρ (2) = ∆ t . It follows as in the proof above that ¯ ρ (2) ∈ Φ ( +(1 t -e / ) 2 0) , e,m . - 6.3. Provided Conjecture 5.5 is true, we can compute the parameters of H L,X k ( ) for weakly cuspidal pairs ( L, X ) . We use the notation of Theorem 3.2 in the following. Proposition. Suppose that X lies in a kM -block B whose e -core equals the 2 -core ∆ s for some s ≥ 0 . Then Q = q 2 +1 s . Proof. By the results summarized in 5.5, the block B contains a cuspidal simple KM -module Y . By Theorem 3.2(a), the parameter Q is equal to the corresponding parameter of the Iwahori-Hecke algebra H K ( L, Y ) . By the results of Lusztig [37, Section 5 ], we have Q = q 2 +1 s . /square - 6.4. If the Conjectures 5.7 and 5.8 are true, Proposition 6.3 implies a compatibility between certain connected components of the crystal graph. Suppose that X λ is weakly cuspidal, that λ (2) = ∆ t , and that the e -core of λ equals ∆ s . (The e -core of λ should be a 2 -core by Conjecture 5.5.) Put r := t ( t +1) 2 / and suppose that n = r +2 m and let L denote the pure Levi subgroup of GU n ( q ) isomorphic to GU r ( q ) × GL 1 ( q 2 ) m . By Theorem 3.2 and Proposition 6.3, we have that H L,X k ( λ ) is an Iwahori-Hecke algebra of type B m with parameters q 2 +1 s and q 2 . According to [15], the irreducible modules of this Hecke algebra are labelled by Φ ( s +(1 -e / ) 2 0) , e = ∪ m ≥ 0 Φ ( s +(1 -e / ) 2 0) , e,m . By the generalization of [14, Theorem 2 4 . ] to weakly cuspidal modules, the elements of the - ( L, X λ ) -Harish-Chandra series of kG are labelled by these bipartitions (see also Proposition 2.3(a)). On the other hand, by Conjecture 5.8, this Harish-Chandra series should also be labelled by the set of bipartitions arising from ¯ λ (2) by adding a sequence of good nodes with respect to the charge ( t +(1 -e / ) 2 0) , . The compatibility of the two labellings is guaranteed by Theorem 7.8 below. - 6.5. We give an example for the phenomenon discussed above. Suppose that e = 3 and let L := GU 4 ( q ) × GL 1 ( q 2 ) m . Then the Steinberg kL -module X (1 4 ) is cuspidal. As the 2 -core of (1 ) 4 is trivial we have t = 0 . According to Conjecture 5.7, the connected component of the Harish-Chandra branching graph beginning in (1 ) 4 should coincide, up to some rank depending on /lscript , with the component of the crystal graph corresponding to e = 3 and charge ( -1 0) , containing the bipartition ( -, 1 ) 2 . The Iwahori-Hecke H k ( L, X (1 4 ) ) is of type B m with parameters q 3 and q 2 , as s = 1 . Its simple modules are labelled by the Uglovbipartitions corresponding to e = 3 and charge (0 , 0) . - 6.6. For blocks of e -weight 1 (for the notions of e -core and e -weight of a unipotent /lscript -block of G see 5.3), Conjecture 5.5 is true. Theorem. Let B be a unipotent /lscript -block of GU n ( q ) of e -weight 1 . Then B contains a weakly cuspidal kG -module, if and only if the e -core of B is a 2 -core. Proof. Suppose first that the e -core of B is a 2 -core. Then B contains a cuspidal simple KG -module by the results recalled in 5.5. In particular, B contains a cuspidal unipotent kG -module. Now suppose that the e -core of B is not a 2 -core. Let s ( B ) denote the Scopes number of B (see [24, 7.2] for the definition of s ( B ) ). Our assumption implies that s ( B ) ≥ 1 . Indeed, consider an e -abacus diagram (in the sense of [30, p. 78 f] or [9, Section 1 ]) for the e -core of B . Since the latter is not a 2 -core, there is 0 ≤ i ≤ e -1 such that the number of beads on string i is at least one larger than the number of beads on string i -2 , if 2 ≤ i ≤ e -1 , and at least two larger than the number of beads on string e -2 or e -1 , if i = 0 or 1 , respectively. This exactly means s ( B ) ≥ 1 . The Reduction Theorem and its consequence [24, Theorems 7 10 . , 8 1 . ] now imply that every projective kG -module of B is obtained from Harish-Chandra induction of a projective kG -module of GU n -2 ( q ) × GL 1 ( q 2 ) . In particular, B contains no weakly cuspidal kG -module. /square 6.7. We now determine all partitions µ ∈ P of e -weight 1 such that X µ is weakly cuspidal. For 0 ≤ t ≤ ( e -1) / 2 let $$\mu _ { t, e } \coloneqq ( t, t - 1, \dots 3, 2, 1 ^ { e + 1 } ),$$ and for 0 ≤ t &lt; ( e -1) / 2 let $$\nu _ { t, e } \coloneqq ( t + 2, t + 1, \dots, 3, 2, 1 ^ { e - 2 t - 2 } ).$$ (we understand µ 0 ,e = 1 e and µ 1 ,e = 1 e +1 ). For t = ( e -1) / 2 , we also put ν t,e := µ t,e . Proposition. Let µ ∈ P n have e -weight 1 . Then X µ is weakly cuspidal if and only if n = t ( t + 1) / 2 + e for some 0 ≤ t ≤ ( e -1) / 2 and µ ∈ { µ t,e , ν t,e } . Proof. Let B denote the unipotent /lscript -block of G containing X µ . Assume first that X µ is weakly cuspidal. Then, by Theorem 6.6, the e -core of µ is a 2 -core, ∆ t , say. In particular, n = ( +1) 2+ t t / e . As ∆ t is an e -core, we have 0 ≤ t ≤ ( e -1) / 2 . By [9, (6A)], the partitions µ t,e and ν t,e label the unipotent KG -modules in B connected to the exceptional vertex of the Brauer tree of B (there is only one such if t = ( e -1) / 2 ). /negationslash Assume that µ ∈ { µ t,e , ν t,e } . Let µ ′ ∈ { µ t,e , ν t,e } such that Y µ and Y µ ′ lie on the same side of the exceptional vertex in the Brauer tree of B . Then µ and µ ′ have the same 2 -core ∆ s , say, again by [9, (6A)]. If µ ′ = µ t,e , we clearly have s &lt; t , and thus ∆ s is an e -core. If µ ′ = ν t,e , then s = +2 t , and ∆ s is an e -core if e ≥ 2 +5 t , and of e -weight 1 if e = 2 +3 t . In the latter case, n = ( + 1) 2 + (2 t t / t +3) = ( t +2)( t +3) 2 = / | ∆ s | , and thus µ = ∆ s = ν t,e , a contradiction. Thus in any case ∆ s is an e -core, and so X ∆ s is projective. Using [9, (6A)] once more, we find that X µ lies in the Harish-Chandra series defined by ( L, X ∆ s ) , where L is the pure standard Levi subgroup of G corresponding to GU | ∆ s | ( q ) . In particular, X µ is not weakly cuspidal, contradicting our assumption. Now assume that µ is one of µ t,e or ν t,e . Then the e -core of µ equals ∆ t , and X µ corresponds to the edge of the Brauer tree linking Y µ with the exceptional vertex. By the results summarized in 5.5, the exceptional vertex labels cuspidal simple KG -modules. Thus X µ is cuspidal. This completes our proof. /square More evidence for our conjectures is given in the next section where we prove some consequences of our conjectures for the crystal graph. ## 7. Some properties of the crystal graph The conjectures formulated in Section 5 imply some combinatorial properties of the crystal graphs involved. In this final section we prove some of these properties. Throughout this section we let e and t be nonnegative integers with e odd and larger than 1 . (Contrary to previous usage, the letter k no longer denotes a field, but just an integer.) /negationslash /negationslash 7.1. Following [16, 6.5.17], we define a 1 -runner abacus to be a subset A of Z such that -j ∈ A and j ∈ A for all j ≥ n and some 0 = n ∈ N . Let A be a 1 -runner abacus. We enumerate the elements of A by a , a 1 2 , . . . with a 1 &gt; a 2 &gt; · · · . The elements of Z \ A are called the holes of A . If we define λ j to be the number of holes of A less than a j , j = 1 2 , , . . . , then λ := ( λ , λ , . . . 1 2 ) is the partition associated to A . The charge of A is the integer a 1 -λ 1 . Let n be a positive integer such that {-j | j ≥ n } ⊆ A . Then the number of elements of A larger than -n equals n plus the charge of A . Moreover, a β -set for λ , in the sense of [29, p. 2 ], is obtained by adding a constant d to the elements of A \ {-j | j ≥ n } to make them all non-negative. Let A and A ′ be 1 -runner abaci with associated partitions λ and λ ′ and charges c and c ′ . Then A = A ′ if and only if λ = λ ′ and c = c ′ . Also, if A ⊆ A ′ and | A ′ \ A | = 1 , then c ′ = c +1 . By a symbol we mean a pair B := ( B B 1 , 2 ) of 1 -runner abaci. The components B 1 and B 2 are also called the first and second row of B , respectively. If µ i and c i are the partition associated to B i and the charge of B i , respectively, i = 1 2 , , we also write B = B ( µ, c ) with µ = ( µ , µ 1 2 ) and c = ( c , c 1 2 ) . Let c = ( c , c 1 2 ) ∈ Z 2 and let µ ∈ P (2) be a bipartition. Then B ( µ, c ) can be computed as follows (see [28, 2.2]). Let µ = ( µ , µ 1 2 ) with µ i = ( µ i j ) j ≥ 1 and µ i j ≥ µ i j +1 ≥ 0 for j ≥ 1 and i = 1 2 , . Then B ( µ, c ) = ( B ( µ, c ) 1 , B ( µ, c ) 2 ) with B ( µ, c ) i := B ( µ, c ) i j , where B ( µ, c ) i j := µ i j -j + c i +1 for i = 1 2 , and j ≥ 1 . - 7.2. Put c = ( t +(1 -e / ) 2 0) , and let µ = ( µ , µ 1 2 ) be a bipartition. To B ( µ, c ) we associate the 1 -runner abacus $$\mathfrak { A } _ { e } ( \mu, \mathfrak { c } ) \coloneqq \{ 2 j + e \ | \ j \in \mathfrak { B } ( \mu, \mathfrak { c } ) ^ { 1 } \} \cup \{ 2 j \ | \ j \in \mathfrak { B } ( \mu, \mathfrak { c } ) ^ { 2 } \}.$$ In order to determine the partition associated to A e ( µ, c ) , choose an even positive integer n = 2 m such that {-j | j ≥ n - } ⊆ 1 A e ( µ, c ) and put $$\bar { \mathfrak { A } } \coloneqq \{ x + n \ | \ x \in \mathfrak { A } _ { e } ( \mu, \mathbf c ), x \geq - n \}.$$ Then ¯ A is a β -set for the partition associated to A e ( µ, c ) with 0 1 , ∈ ¯ A . Let $$\bar { \mathfrak { A } } ^ { 1 } \coloneqq \{ ( x - 1 ) / 2 \ | \ x \in \bar { \mathfrak { A } }, x \text{ odd} \}$$ and $$\bar { \mathfrak { A } } ^ { 2 } \coloneqq \{ x / 2 \ | \ x \in \bar { \mathfrak { A } }, x \text{ even} \}.$$ Then $$\bar { \mathfrak { A } } ^ { 1 } = \{ j + ( e - 1 ) / 2 + m \ | \ j \in \mathfrak { B } ( \mu, \mathfrak { c } ) ^ { 1 }, j \geq - m - ( e - 1 ) / 2 \}$$ and $$\bar { \mathfrak { A } } ^ { 2 } = \{ j + m \ | \ j \in \mathfrak { B } ( \mu, \mathbf c ) ^ { 2 }, j \geq - m \}.$$ In particular, ¯ A i is a β -set for µ i , i = 1 2 , and | ¯ A 1 | = | ¯ A 2 | + t . The latter equality follows from the remarks in the first paragraph of 7.1. Lemma. The partition associated to A e ( µ, c ) equals Φ ( t µ ) . Proof. Use the notation introduced above. Then | ¯ A | = ( ¯ | A 1 | + | ¯ A 2 | ) ≡ t ( mod 2) . Thus ¯ A is a β -set for the partition with 2 -core ∆ t , and 2 -quotient (computed with respect to a β -set with an odd number of elements) ( µ , µ 2 1 ) if t is odd, and ( µ , µ 1 2 ) if t is even. This implies our claim. /square /negationslash - 7.3. Let c = ( +(1 t -e / ) 2 0) , and let µ ∈ P (2) . We are interested in the operation of deleting e -hooks from Φ ( t µ ) . On A e ( µ, c ) , this amounts to replacing an element y ∈ A e ( µ, c ) with y -e ∈ A e ( µ, c ) by y -e . If y is odd, this replacement corresponds to the operation of deleting j = ( y -e / ) 2 from B ( µ, c ) 1 and inserting j into B ( µ, c ) 2 . If y is even, this replacement corresponds to the operation of deleting j = y/ 2 from B ( µ, c ) 2 and inserting j -e into B ( µ, c ) 1 . This leads to the following operations on symbols, to which we refer as elementary operations . - (a) Delete an element j in the first row, which is not in the second row, and insert j in the second row. - (b) Delete an element j in the second row, such that j -e is not in the first row, and insert j -e in the first row. Iterating the two operations we end up with a symbol for which no such operation is possible. Even though the resulting symbol does not depend on the order in which we perform these operations, we decide to do the former operation first if possible, and always take the largest possible j so that each step in the algorithm is well defined. This gives the following elementary operations in a more restrictive sense. - (a ) ′ Delete the largest element j in the first row, which is not in the second row, and insert j in the second row. - (b ) ′ If every element in the first row is contained in the second row, delete the largest element j in the second row, such that j -e is not in the first row, and insert j -e in the first row. Proposition. Put λ := Φ ( t µ ) . Let µ ′ = (( µ ′ ) 1 , ( µ ′ ) 2 ) ∈ P (2) and c ′ ∈ Z 2 such that B ( µ , ′ c ′ ) is obtained from B ( µ, c ) by an elementary operation of type (a) or (b). Applying this elementary operation corresponds to removing an e -hook from λ . Denote by λ ′ the resulting partition, and let t ′ be such that λ ′ (2) = ∆ t ′ . Suppose that ˜ = (˜ µ µ , µ 1 ˜ ) 2 is the bipartition such that Φ (˜) = t ′ µ λ ′ . Then t ′ = t +2 , if the elementary operation applied is of type (b). If the elementary operation applied is of type (a), then Moreover, $$\ddot { \strut r a t i o n \ a p p l i e d \ i s \ o f \ t y p e \ ( a ), \dot { \ t h \epsilon } \\ t ^ { \prime } = \begin{cases} \ t - 2, & \text{if $t\geq 2$,} \\ 0, & \text{if $t=1$,} \\ 1, & \text{if $t=0$.} \end{cases} \\ i f \ t \ a n d \ t ^ { \prime } \ h a s u e \ t h e \ e \end{cases}$$ $$& M o r e o v e r, \\ & \tilde { \mu } = \begin{cases} \ \mu ^ { \prime }, & \text{if $t$ and $t^{\prime}$ have the same parity}, \\ ( ( \mu ^ { \prime } ) ^ { 2 }, ( \mu ^ { \prime } ) ^ { 1 } ), & \text{otherwise}, \end{cases}$$ Proof. Consider a β -set ¯ A for Φ ( t µ ) as constructed in 7.2. An elementary operation results in replacing an element x of ¯ A by x -e yielding the β -set ¯ A ′ for λ ′ . (Notice that ¯ A ′ is constructed from B ( µ , ′ c ′ ) in the same way as ¯ A from B ( µ, c ) .) Moreover, x is even or odd, if the elementary operation is of type (b) or (a), respectively. In the former case, the number of odd elements of ¯ A increases by 1 , and thus t ′ = +2 t . In the latter case, the number of odd elements of ¯ A decreases by 1 . Hence t ′ = t -2 if t ≥ 2 , t ′ = 0 if t = 1 , and t ′ = 1 if t = 0 . If the parity of t is the same as that of t ′ , then the constructions of Φ ( t µ ) and of Φ (˜) t ′ µ are the same, namely we have λ (2) = ( µ , µ 1 2 ) and ( λ ′ ) (2) = (˜ µ , µ 1 ˜ ) 2 (respectively λ (2) = ( µ , µ 2 1 ) and ( λ ′ ) (2) = (˜ µ , µ 2 ˜ ) 1 ) if t is even (respectively odd). Therefore, one can read off ˜ µ directly on the symbol B ( µ , ′ c ′ ) (or on the β -sets ¯ A i , i = 1 2 , ). It follows that ˜ = µ µ ′ . On the contrary, if t and t ′ have different parities (say, without loss of generality, t even and t ′ odd), then the construction of Φ (˜) t ′ µ requires a permutation, unlike that of Φ ( t µ ) . Therefore, one needs to permute the components of the bipartition one reads off B ( µ , ′ c ′ ) , i.e. ˜ = (( µ µ ′ ) 2 , ( µ ′ ) 1 ) /square As an example, consider the bipartition µ = ((5 3 , 4 ) 2 , (6)) , let e = 3 and t = 5 . Then c = (4 0) , and $$t = 5. \, \text{Ihen c} = ( 4, 0 ) \text{ and } \\ \mathfrak { B } ( \mu, \mathfrak { c } ) = \left ( \begin{array} { c c c c c } \cdots & - 2 & - 1 & 6 \\ \cdots & - 2 & - 1 & 4 & 5 & 7 & 8 & 9 \end{array} \right ).$$ The associated 1 -runner abacus A 3 ( µ, c ) can be represented as follows: $$\stackrel { - 2 \ - 1 \ 0 \ 1 \ 2 \ 3 \ 4 \ 5 \ 6 \ 7 \ 8 \ 9 \ 1 0 \ 1 1 \ 1 2 \ 1 3 \ 1 4 \ 1 5 \ 1 6 \ 1 7 \ 1 8 \ 1 9 \ 2 0 \ 2 1 } { + }$$ With the notation of 7.2, taking n = 2 we obtain the β -set ¯ A = { 0 1 3 13 14 15 19 21 23 , , , , , , , , } for the partition λ := Φ ( 5 µ ) associated to A 3 ( µ, c ) . We also have ¯ A 1 = { 0 1 6 7 9 10 11 , , , , , , } and ¯ A 2 = { 0 7 , } , wich are β -sets for µ 1 = (5 3 , 4 ) 2 and µ 2 = (6) respectively. Notice that λ = (15 14 13 10 , , , 3 , 1) . An elementary operation of type (a ) on the ′ symbol yields $$\infty \text{ yields } \\ \mathfrak { B } ( \mu ^ { \prime }, c ^ { \prime } ) = \left ( \begin{array} { c c c c c } \cdots & - 2 & - 1 & 6 & 9 \\ \cdots & - 2 & - 1 & 4 & 5 & 7 & 8 \end{array} \right ),$$ with µ ′ = ((5 2 , 4 ) 2 , (8 , 6)) and c ′ = (3 1)) , . The 1 -runner abacus A 3 ( µ , ′ c ′ ) cna be pictured as follows: ## -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 /a116 /a116 /a113 /a116 /a113 /a113 /a113 /a113 /a113 /a113 /a113 /a113 /a113 /a116 /a116 /a116 /a113 /a113 /a113 /a116 /a116 /a116 /a113 /a113 We obtain ¯ A ′ = { 0 1 3 13 14 15 19 20 21 , , , , , , , , } , again using n = 2 . Next, ( ¯ A ′ ) 1 = { 0 1 6 7 9 10 , , , , , } and ( ¯ ) A 2 = { 0 7 10 , , } , wich are β -sets for (5 2 , 4 ) 2 and (8 , 6) respectively. The partition associated to A 3 ( µ , ′ c ′ ) is λ ′ = (13 3 , 10 3 , 1) which is obtained from λ by removing a 3 -hook. We have λ ′ (2) = ∆ 3 , i.e. t ′ = 3 , and Φ ( 3 µ ′ ) = λ ′ . 7.4. In the following we will make use of the notion of an e -period of a symbol (see [28, Definition 2 2 . ]) and the concept of totally periodic symbols (see [28, Definition 5 4 . ]). Let | µ, c 〉 be a charged bipartition. In our special situation, an e -period of B ( µ, c ) is a sequence ( i 1 , k 1 ) , ( i 2 , k 2 ) , . . . , ( i e , k e ) of pairs of integers with 2 ≥ k 1 ≥ k 2 ≥ · · · ≥ k e ≥ 1 such that B ( µ, c ) k l i l = m -l +1 for some integer m . Moreover, m is the largest element in B ( µ, c ) 1 ∪ B ( µ, c ) 2 , and if m -l +1 ∈ B ( µ, c ) 1 for some 1 ≤ l ≤ e , then k l = 1 . Suppose that B ( µ, c ) has an e -period ( i 1 , k 1 ) , ( i 2 , k 2 ) , . . . , ( i e , k e ) . Then this e -period is unique and the entries B ( µ, c ) k l i l of B ( µ, c ) are called the elements of the period. Removing these elements from B ( µ, c ) , we obtain the symbol B ( µ , ′ c ′ ) corresponding to a charged bipartition | µ , ′ c ′ 〉 which may or may not have an e -period. If iterating this procedure ends up in a symbol B ( ν, d ) such that ν is the empty bipartition, then B ( µ, c ) is called totally periodic. By [28, Theorem 5 9 . ], the symbol B ( µ, c ) is totally periodic, if and only if | µ, c 〉 is a highest weight vertex of G c ,e . If B ( µ, c ) is totally periodic, then for each entry j in B ( µ, c ) , there is a symbol B ′ , obtained from B ( µ, c ) by removing a sequence of e -periods, and an e -period ( i 1 , k 1 ) , . . . , ( i e , k e ) of B ′ , such that j = ( B ′ ) k l i l for some 1 ≤ l ≤ e . By a slight abuse of terminology, we say that j is contained in the period ( i 1 , k 1 ) , . . . , ( i e , k e ) of B . Let B ′ denote the symbol obtained from B ( µ, c ) by applying an elementary operation. ## Lemma. If B ( µ, c ) is totally periodic, so is B ′ . Proof. Suppose first that B ′ is obtained from B ( µ, c ) by an elementary operation (a). Moving j from row 1 to row 2 transforms the period ( i 1 , k 1 ) , . . . , ( i e , k e ) containing j into a period ( i ′ 1 , k ′ 1 ) , . . . , ( i ′ e , k ′ e ) such that ( B ′ ) k ′ l i ′ l = B ( µ, c ) k l i l for all l . In particular, B ′ is also totally periodic. Suppose now that B ′ is obtained from B ( µ, c ) by an elementary operation (b). Deleting j from row 2 and inserting j -e in row 1 transforms the period ( i 1 , k 1 ) , . . . , ( i e , k e ) containing j into a period ( i ′ 1 , k ′ 1 ) , . . . , ( i ′ e , k ′ e ) such that ( B ′ ) k ′ l i ′ l = B ( µ, c ) k l i l -1 for all l &lt; e -1 and ( B ′ ) k ′ e i ′ e = B ( µ, c ) k e i e -e . In particular, B ′ is also totally periodic. /square 7.5. Let G = GU n ( q ) , and let /lscript and e be as in 5.1. In [13, Theorem 8 3 . ] we have proved that X (1 n ) is cuspidal if and only if e is odd and divides n or n -1 . This is consistent with Conjecture 5.8, as will be shown below. Let λ = (1 ) n . Then the 2 -core of λ equals ∆ t with t = 0 if n is even, and t = 1 if n is odd. Also ¯ λ (2) = ( -, 1 m ) with m = /floorleft n/ 2 /floorright ; notice that n = 2 m + t . Proposition. Let e ≥ 3 be an odd integer, let m ∈ N and t ∈ { 0 1 , } . Put c := ( t +(1 -e / ) 2 0) , . Then the vertex | ( -, 1 m ) , c 〉 of G c ,e is a highest weight vertex, if and only if e | 2 m + t or e | 2 m + t -1 . /negationslash Proof. The proof proceeds by induction on m , the case m = 0 being clear. Assume that m &gt; 0 and let s, s ′ ∈ { ( e -1) / 2 ( , e -3) / 2 } with s = s ′ . The symbol B of | ( -, 1 m ) , ( -s, 0) 〉 equals $$s \neq s ^ { \prime }. \, \text{$1$ the symbol $\mathfrak{B}$ of $\left| ( -, 1$""), ( - s, 0 ) \right \rangle$ equals} \\ \mathfrak { B } = & \left ( \begin{array} { c c c c c } \cdots & - m & 2 - m & 3 - m & \cdots & - s + 1 & - s + 2 & \cdots & 1 \\ \cdots & - m & 1 - m & 2 - m & \cdots & - s \end{array} \right ).$$ Let B ′ be the symbol obtained by removing the e -period from B . If m&lt;e -1 , we find $$m < e - 1, \, \text{we find} \\ \mathfrak { B } ^ { \prime } = & \left ( \begin{array} { c c c c } \cdots & - ( e - 1 ) & \cdots & - m & 2 - m & \cdots & - s \\ \cdots & - ( e - 1 ) & & & & \\ \cdots &. &. \end{array} \right ),$$ and if m = e -1 , we have $$\text{ if } m = e - 1, \, \text{ we have } \\ \mathfrak { B } ^ { \prime } = \left ( \begin{array} { c c c c c } \cdots & - ( e - 1 ) & - ( e - 3 ) & \cdots & - s \\ \cdots & - ( e - 1 ) & & & \\ \cdots & - ( e - 1 ) & & & \\ \end{array} \right ).$$ In the latter two cases, B ′ does not have an e -period and thus B is not totally periodic. On the other hand, e does not divide one of 2 m -1 , 2 m , or 2 m +1 , as 1 ≤ m ≤ e -1 . If m ≥ e , then $$& \text{It $m\geq e$, then} \\ & \mathfrak { B } ^ { \prime } = \left ( \begin{array} { c c c c c } \cdots & - m & 2 - m & 3 - m & \cdots & - e + 2 & - e + 3 & \cdots - s \\ \cdots & - m & 1 - m & 2 - m & \cdots & - e + 1 \\ \cdots & - m & 1 - m & 2 - m & \cdots & - e + 1 \\ \cdots & \cdots & \cdots \end{array} \right ).$$ Thus B ′ is the symbol of | ( -, 1 m s - -1 ) , ( -s , ′ 0) 〉 . Now B is totally e -periodic if and only if B ′ is totally e -periodic. By induction, B ′ is totally e -periodic if and only if e | 2 m -2 s -2 or e | 2 m -2 s -3 in case s ′ = ( e -1) / 2 , respectively if and only if e | 2 m -2 s -2 or e | 2 m -2 s -1 in case s ′ = ( e -3) / 2 . Suppose first that s ′ = ( e -1) / 2 . Then s = ( e -3) / 2 and thus 2 m -2 s -2 = 2 m + 1 -e . The claim follows. The other case works analogously. /square 7.6. Let | µ, c 〉 be a charged bipartition, put B := B ( µ. c ) and B k := B ( µ, c ) k for k = 1 2 , . Lemma. Suppose that B is totally e -periodic, that B 1 ⊆ B 2 and that j -e ∈ B 1 for all j ∈ B 2 with j ≥ m for some m ∈ Z . Then for k = 1 2 , we have j -1 ∈ B k for all j ∈ B k with j ≥ m e -+1 . /negationslash Proof. Let j ∈ B k with j -1 ∈ B k . Then j -1 ∈ B 1 and the period of B containing j ends in j . The first element in this period is j + e -1 , and j + e -1 ∈ B 2 . As j -1 = j + e -1 -e , it follows that j + e -1 &lt; m , hence our claim. /square /negationslash Put c = ( +(1 t -e / ) 2 0) , . If Conjecture 5.8 is true, the highest weight vectors of the crystal graph G c ,e label the weakly cuspidal unipotent GU n ( q ) -modules for large enough primes /lscript with e = e q, /lscript ( ) . More explicitly, a weakly cuspidal GU n ( q ) -module X λ with λ (2) = ∆ t should be labelled by the highest weight vector | ¯ λ (2) , c 〉 . Moreover, if X λ is weakly cuspidal, the e -core of λ should be a 2 -core by Conjecture 5.5. Recall that λ with λ (2) = ∆ t and ¯ λ (2) are related by λ = Φ ( ¯ t λ (2) ) . Theorem. Let the notation be as above. Let µ ∈ P (2) be such that | µ, c 〉 is a highest weight vertex in G c ,e . Then the e -core of Φ ( t µ ) is a 2 -core. Proof. Starting with B ( µ, c ) , we apply a sequence of elementary operations, until we reach a symbol B ′ , which does not allow any such operation. Starting with A e ( µ, c ) , the corresponding sequence of operations results in a 1 -runner abacus A ′ , such that y -e ∈ A ′ for all y ∈ A ′ . By Lemma 7.2, the partition associated to A ′ is the e -core of Φ ( t µ ) . The symbol B ′ is totally e -periodic by Lemma 7.4, and satisfies the assumptions of the above lemma for all m ∈ Z . Hence for k = 1 2 , , we have j -1 ∈ ( B ′ ) k for every j ∈ ( B ′ ) k . This implies that x -2 ∈ A ′ for all x ∈ A ′ . In particular, the partition associated to A ′ is a 2 -core. /square We now sketch a different proof of the above theorem. Consider, for s ∈ Z , the space of semi-infinite wedge products Λ s + ∞ / 2 , as it is defined in [41, § 4 ]. We do not need the precise definition of this space here but we need to know that there are three ways to index the elements of its basis ('the semi-infinite ordered wedges'): - -by the set of elements denoted by | λ, s 〉 where λ ∈ P ; - -by the set of elements denoted by | µ, c 〉 , where µ ∈ P (2) and c = ( c , c 1 2 ) ∈ Z 2 is such that c 1 + c 2 = s . The way to pass from | λ, s 〉 to | µ, c 〉 is purely combinatorial; - -by the set of elements denoted by | λ ( e ) , c ( e ) 〉 where λ ( e ) is the e -quotient of λ and c ( e ) = ( c , . . . , c 1 e ) ∈ Z e satisfies ∑ e i =1 = s and parametrizes the e -core of λ . Setting u := -v -1 , we have three actions of the algebras U ′ v ( ̂ sl e ) , U ′ u ( ̂ sl 2 ) and another algebra H (the Heisenberg algebra) on the space Λ s + ∞ / 2 . Moreover these three actions commute and we have the following decomposition (see [41, Theorem 4.8]): where A 2 e ( s ) is the set of elements c ∈ Z 2 such that c 1 -c 2 ≤ e and c 1 + c 2 = s . In addition, if we fix c , the associated Fock space of level 2 is a U ′ v ( sl e ) -submodule of Λ s + ∞ / 2 (that is the actions are compatible). $$\underset { \text{$\text{position} } } { \text{position} } & ( \text{see} \left [ 4 1, \, I \text{theorem $4.8$} \right ] ) \colon \\ \Lambda ^ { s + \infty / 2 } & = \bigoplus _ { \text{c} \in A _ { e } ^ { 2 } ( s ) } \, \mathcal { U } _ { v } ^ { \prime } ( \widehat { s } \mathfrak { i } _ { e } ) \mathcal { H } \mathcal { U } _ { u } ^ { \prime } ( \widehat { s } \mathfrak { i } _ { 2 } ) \cdot | ( -, - ), \, \text{c} \rangle, \\ \text{e $A^{2} ( s )$ is the set of elements $c \in \mathbb{Z}^{2}$ such that $c$} \, - c \circ e$$ ̂ Let i ∈ { 0 1 , } . Denote by E i and F i the Chevalley operators of U ′ u ( ̂ sl 2 ) . Regarding the action of E i on the set of charged bipartitions following Uglov's work, we see that | µ, d 〉 appears in the expansion of E . λ, i | c 〉 if and only if the symbol of | µ, d 〉 is obtained from the symbol of | λ, c 〉 by one of the two elementary operations (a) and (b) described in 7.3. This thus gives an algebraic interpretation of these transformations on symbols. Moreover, combining this interpretation with some properties of the crystal of Λ s + ∞ / 2 (see [41, § 4 3 . ]) leads to an alternative proof of the above theorem. - 7.7. For a highest weight vertex | µ, c 〉 , write B µ, ( c ) for the connected component of G c ,e containing µ . General crystal theory (see [32] for instance) ensures that B µ, ( c ) /similarequal B ν, ( d ) as soon as | µ, c 〉 and | ν, d 〉 are both highest weight vertices and wt ( ν, c ) = wt ( µ, d ) . Moreover, by the characterization (5), the weights of | µ, c 〉 and | ν, d 〉 coincide if these two charged bipartitions have the same reduced i -word for all 0 ≤ i ≤ e -1 . From now on, let | µ, c 〉 be a highest weight vertex in G c ,e . Let | µ , ′ c ′ 〉 be a charged bipartition such that B ( µ , ′ c ′ ) is the symbol obtained from B ( µ, c ) by applying one of the elementary operations described in 7.3 (a ), (b ). ′ ′ By Lemma 7.2, this implies in particular that Φ ( t µ ) is not an e -core. Lemma. Under the above hypothesis, | µ , ′ c ′ 〉 is a highest weight vertex and there is a crystal isomorphism B µ, ( c ) /similarequal B µ , ( ′ c ′ ) . /negationslash /negationslash Proof. By Lemma 7.4, we know that B ( µ , ′ c ′ ) is totally periodic, and thus | µ , ′ c ′ 〉 is a highest weight vertex by [28, Theorem 5 9 . ]. By the discussion at the beginning of this paragraph, it remains to show that the reduced i -words of | µ, c 〉 and | µ , ′ c ′ 〉 coincide for all 0 ≤ i ≤ e -1 . Denote these words by w µ, i ( c ) and w µ , i ( ′ c ′ ) . In this proof, we use for more clarity the notation A k ( j ) (respectively R k ( j ) ) instead of simply A (respectively R ) to encode the addable (respectively removable) node of content j lying in component k of B ( µ, c ) . Note that the contents of the addable and removable nodes of a bipartition are the elements j -1 and j , respectively, for j in the corresponding symbol (provided j encodes a non-zero part). In fact, a removable node of content j -1 corresponds to an element j ∈ B ( µ, c ) k such that j -1 ∈ B ( µ, c ) k , and an addable node of content j corresponds to an element j ∈ B ( µ, c ) k such that j +1 ∈ B ( µ, c ) k . Therefore, since an elementary operation affects either just one element j or just j and j -e , the only differences that can occur between w µ, i ( c ) and w µ , i ( ′ c ′ ) are with letters A and R corresponding to nodes of content j -1 , j , j -e -1 and j -e . We review the only possible changes by enumerating the cases. /negationslash Suppose first that we apply the elementary operation (a ), that is ′ to say we move j from row 1 of B ( µ, c ) to row 2 . Moreover, j is the largest element in B ( µ, c ) 1 for which j ∈ B ( µ, c ) 2 . Denote by l the largest element of B ( µ, c ) 2 . To begin with, assume that j is the largest element of B ( µ, c ) 1 . - If j &gt; l , then j is the first element of its period, and thus j -1 ∈ B ( µ, c ) 1 . Moreover, either - · j &gt; l +1 , in which case the elementary operation takes A 1 ( j ) to A 2 ( j ) and creates an occurence of R 2 ( j -1) A 1 ( j -1) , which cancels in the reduced i -word (for i = j -1 mod e ), or - · j = l + 1 , in which case A 1 ( j ) in B ( µ, c ) becomes A 2 ( j ) in B ( µ , ′ c ′ ) , and A 2 ( j -1) becomes A 1 ( j -1) . If j &lt; l , the following possibilities arise. - · If j +1 / ∈ B ( µ, c ) 2 , then again j is the first element of its period, and thus j -1 ∈ B ( µ, c ) 1 . Moreover, either - ∗ j -1 / ∈ B ( µ, c ) 2 , and A 1 ( j ) becomes A 2 ( j ) and R 2 ( j -1) A 1 ( j -1) appears, or - · If j +1 ∈ B ( µ, c ) 2 , then either - ∗ j -1 ∈ B ( µ, c ) 2 , and A 2 ( j -1) becomes A 1 ( j -1) and A 1 ( j ) becomes A 2 ( j ) . - ∗ j -1 ∈ B ( µ, c ) 1 and j -1 / ∈ B ( µ, c ) 2 , in which case R 2 ( j ) A 1 ( j ) vanishes and R 2 ( j -1) A 1 ( j -1) appears, or - ∗ j -1 ∈ B ( µ, c ) 1 and j -1 ∈ B ( µ, c ) 2 , in which case A 2 ( j -1) becomes A 1 ( j -1) and R 2 ( j ) A 1 ( j ) vanishes, or /negationslash - ∗ j -1 ∈ B ( µ, c ) 1 and j -1 / ∈ B ( µ, c ) 2 , in which case R 1 ( j -1) becomes R 2 ( j -1) and R 2 ( j ) A 1 ( j ) vanishes, or /negationslash /negationslash - ∗ j -1 ∈ B ( µ, c ) 1 and j -1 ∈ B ( µ, c ) 2 , in which case j is the last element in its period; if m ≥ j +1 is the smallest element of B ( µ, c ) 2 with m + 1 ∈ B ( µ, c ) 2 , then m and j -1 are congruent modulo e , and R 1 ( j -1) A 2 ( m ) and R 2 ( j ) A 1 ( j ) vanish. /negationslash Assume now that j is not the largest element of B ( µ, c ) 1 . First we consider the case that j +1 / ∈ B ( µ, c ) 1 . The fact that B ( µ, c ) is totally periodic then implies that j + 1 ∈ B ( µ, c ) 2 if j -1 / ∈ B ( µ, c ) 1 and j -1 ∈ B ( µ, c ) 2 if j -1 ∈ B ( µ, c ) 1 and j +1 ∈ B ( µ, c ) 2 . We obtain the following five subcases. /negationslash - · If j -1 / ∈ B ( µ, c ) 1 , j +1 ∈ B ( µ, c ) 2 and j -1 / ∈ B ( µ, c ) 2 , then R 2 ( j ) A 1 ( j ) vanishes and R 1 ( j -1) becomes R 2 ( j -1) . - · If j -1 / ∈ B ( µ, c ) 1 , j +1 ∈ B ( µ, c ) 2 and j -1 ∈ B ( µ, c ) 2 , then R 2 ( j ) A 1 ( j ) vanishes and R 2 ( j -1) A 1 ( j -1) appears. /negationslash - · If j -1 ∈ B ( µ, c ) 1 , j +1 ∈ B ( µ, c ) 2 and j -1 / ∈ B ( µ, c ) 2 , then R 2 ( j ) A 1 ( j ) vanishes and R 2 ( j -1) A 1 ( j -1) appears. - · If j -1 ∈ B ( µ, c ) 1 , j +1 ∈ B ( µ, c ) 2 and j -1 / ∈ B ( µ, c ) 2 , then A 1 ( j ) becomes A 2 ( j ) and R 2 ( j -1) A 1 ( j -1) appears. - · If j -1 ∈ B ( µ, c ) k , k = 1 2 , and j + 1 ∈ B ( µ, c ) 2 , then R 2 ( j ) A 1 ( j ) vanishes and A 2 ( j -1) becomes A 1 ( j -1) . If j + 1 ∈ B ( µ, c ) 1 , then j + 1 ∈ B ( µ, c ) 2 otherwise j would not be moved. - · If j -1 / ∈ B ( µ, c ) 2 and j -1 / ∈ B ( µ, c ) 1 , then R 1 ( j -1) becomes R 2 ( j -1) and R 2 ( j ) becomes R 1 ( j ) . - · The case j -1 ∈ B ( µ, c ) 2 and j -1 / ∈ B ( µ, c ) 1 can not occur as B ( µ, c ) is totally periodic. - · If j -1 / ∈ B ( µ, c ) 2 and j -1 ∈ B ( µ, c ) 1 , then R 2 ( j ) becomes R 1 ( j ) and R 2 ( j -1) A 1 ( j -1) appears. - · If j -1 ∈ B ( µ, c ) 2 and j -1 ∈ B ( µ, c ) 1 , then R 2 ( j ) becomes R 1 ( j ) and A 2 ( j -1) becomes A 1 ( j -1) . Suppose now that we apply operation (b ), that is to say, that we ′ delete j from B ( µ, c ) 2 and insert j -e in B ( µ, c ) 1 . This implies in particular that all elements of B ( µ, c ) 1 are in B ( µ, c ) 2 . Again, assume first that j is the largest element of B ( µ, c ) 2 . As B ( µ, c ) is totally e -periodic, j -1 appears in B ( µ, c ) , hence j -1 ∈ B ( µ, c ) 2 . Denote by l the largest element of B ( µ, c ) 1 . Suppose first that j -e &gt; l . - · If j -e &gt; l +1 , then A 2 ( j ) becomes A 1 ( j -e ) , and R 1 ( j -1 -e A ) 2 ( j -1) appears. - · If j -e = +1 l , then A 2 ( j ) becomes A 1 ( j -e ) and A 1 ( j - -e 1) becomes A 2 ( j -1) . Now assume that j -e &lt; l . Note that in this case j -e +1 ∈ B ( µ, c ) 1 . ndeed, j is the first element in the period of B ( µ, c ) , and j -e +1 the last. As l ≥ j -e +1 and l lies in the first row, so does j -e +1 . - · If j - -e 1 / ∈ B ( µ, c ) 1 , then R 1 ( j -e A ) 2 ( j ) vanishes and R 1 ( j -e -1) A 2 ( j -1) appears. - · If j -e -1 ∈ B ( µ, c ) 1 , then A 1 ( j -e -1) becomes A 2 ( j -1) and R 1 ( j -e A ) 2 ( j ) vanishes. Finally, assume that j is not the largest element of B ( µ, c ) 2 and let j ′ denote the largest element of B ( µ, c ) 2 . Then j ′ -e ∈ B ( µ, c ) 1 , as our operation of type (b ) always moves the largest possible element. ′ Hence l ≥ j ′ -e &gt; j -e . Now j is the largest element of B ( µ, c ) 2 such that j -e is not in B ( µ, c ) 1 . By Lemma 7.6, this implies that for k = 1 2 , and every r &gt; j -e +1 we have r -1 ∈ B ( µ, c ) k if r ∈ B ( µ, c ) k . Hence all integers in the interval [ j -e +1 , j ′ ] and [ j -e +1 , l ] are contained in B ( µ, c ) 2 and B ( µ, c ) 1 , respectively. This implies in particular that j -e ∈ B ( µ, c ) 2 as otherwise the element j -e +1 of the second row must be the last element in its period. But then the element j -e +1 of the first row must lie in an earlier period, which is impossible. This leaves to check the following possibilities. - · If j -e -1 ∈ B ( µ, c ) 1 it is also contained in B ( µ, c ) 2 , and R 1 ( j -e ) becomes R 2 ( j ) and A 1 ( j -e -1) becomes A 2 ( j -1) . /negationslash - · If j -e -1 ∈ B ( µ, c ) 2 and j -e -1 ∈ B ( µ, c ) 1 , then R 1 ( j -e ) becomes R 2 ( j ) and R 1 ( j -e -1) A 1 ( j -1) appear. /negationslash - · If j -e -1 ∈ B ( µ, c ) 2 and j -e -1 ∈ B ( µ, c ) 1 , then R 1 ( j -e ) becomes R 2 ( j ) and R 1 ( j -e -1) A 1 ( j -1) appear. /negationslash In each case, we see that w µ i ( ) = w µ i ( ′ ) , for all i = 1 , . . . , e -1 . /square We record a first consequence of the above lemma. Let t ′ ∈ N and ˜ µ ∈ P (2) be such that λ ′ := Φ t ′ (˜) µ equals the partition obtained from λ := Φ ( t µ ) be removing the e -hook which corresponds to the elementary operation transforming B ( µ, c ) into B ( µ , ′ c ′ ) . (See Proposition 7.3 how to compute t ′ and ˜ µ .) Suppose that t and t ′ have the same parity and put ˜ := ( c t ′ +(1 -e / ) 2 0) , . Then ˜ = µ µ ′ and ˜ c is obtained from c ′ by adding or subtracting 1 to each of its components. By definition of the crystal graph, it is clear that translating each component of the charge by some fixed integer, results in the same graph with an overall translation of the labels of the arrows. In particular, | ˜ ˜ µ, c 〉 is a highest weight vertex. Corollary. Suppose that Conjecture 5.7 is true. Then the HarishChandra branching graphs corresponding to the weakly cuspidal modules X λ and X λ ′ are isomorphic (up to some rank). Proof. It follows from the considerations preceeding the corollary, that B µ, ( c ) and B µ, (˜ ˜0 c are isomorphic up to a global shift of the arrow labels. /square This corollary shows that the validity of Conjecture 5.7 would yield a remarkable connection between the Harish-Chandra theory of unitary groups of odd and even degrees. 7.8. We finally prove a property of the crystal graph which is implied by the considerations in 6.4. Let λ ∈ P with λ (2) = ∆ t and ¯ λ (2) = µ . Put c := ( t +(1 -e / ) 2 0) , . Assume that | µ, c 〉 is a highest weight vector in G c ,e . By Theorem 7.6, the e -core of λ is a 2 -core, ∆ s , say, for some non-negative integer s . Put s := ( s +(1 -e / ) 2 0) , . Theorem. With the notation introduced above, there is a graph isomorphism $$B ( \mu, { \mathbf c } ) \simeq B ( ( -, - ), { \mathbf s } ),$$ up to a shift of the labels of the arrows. Proof. We apply the algorithm used to compute the e -core of λ = Φ ( t µ ) described in the proof of Theorem 7.6. Applying a sequence of elementary operations of types (a ) and (b ) to ′ ′ B ( µ, c ) , we end up with the symbol B (( - -, ) , d ) for some charge d = ( d , d 1 2 ) . We may as well apply the corresponding sequence of moves to the β -set ¯ A for λ = Φ ( t µ ) as constructed in 7.2. This results in a β -set ¯ A ′ for ∆ s . The number of odd elements of ¯ A exceeds its number of even elements by t = c 1 -(1 -e / ) 2 -c 2 . If the number of odd elements of ¯ A ′ is not smaller than the number of its even elements, the difference between the two numbers equals s . Otherwise, there are s + 1 more even numbers in ¯ A ′ than odd ones. An operation of type (a ) decreases ′ the first component of the current charge by 1 and increases the second component by 1 . The corresponding move on the β -set replaces an odd number by an even one. The analogous remarks apply for elementary operations of type (b ). ′ We thus find $$d _ { 1 } - d _ { 2 } = s + ( 1 - e ) / 2$$ or $$d _ { 2 } - d _ { 1 } = s + ( 1 + e ) / 2.$$ By Lemma 7.7, we have a crystal isomorphism $$B ( \mu, \mathbf c ) \simeq B ( ( -, - ), \mathbf d ).$$ If we set d ′ = ( d 2 -e, d 1 ) , we also have a crystal isomorphism $$B ( \mu, { \mathbf c } ) \simeq B ( ( -, - ), { \mathbf d } ^ { \prime } )$$ (see [16, 6.2.9, 6.2.17]). By the remark preceding Corollary 7.7, we obtain $$B ( \mu, \mathbf c ) \simeq B ( ( -, - ), ( d _ { 1 } - d _ { 2 }, 0 ) )$$ and $$B ( \mu, \mathbf c ) \simeq B ( ( -, - ), ( d _ { 2 } - e - d _ { 1 }, 0 ) )$$ up to an overall shift of the labels of the arrows. Applying Identities (6) respectively (7), we see that s + (1 -e / ) 2 equals d 1 -d 2 in the first case and d 2 -e -d 1 in the second. This concludes our proof. /square Note that there should be a way to relate these elementary crystal isomorphisms with the so-called canonical crystal isomorphism of [18]. 7.9. Put c := ( t +(1 -e / ) 2 0) , . Let µ = ( µ , µ 1 2 ) be a bipartition. For 0 ≤ j ≤ e -1 , let ˜ f j denote the associated Kashiwara operator on G c ,e (see 5.6). /negationslash - Proof. Let 0 ≤ j ≤ e -1 . First note that if ˜ f . µ, j | c 〉 /negationslash = 0 then (1) B ( µ, c ) 1 = B ( ˜ f .µ, j c ) 1 and B ( ˜ f .µ, j c ) 2 = B ( µ, c ) 2 ∪{ }\{ k k - } 1 for k ∈ Z such that k ≡ j ( mod e ) , or Proposition. Let 0 ≤ j 1 = j 2 ≤ e -1 . Suppose that ˜ f j i . | µ, c 〉 /negationslash = 0 for i = 1 2 , . Write ˜ f j i . | µ, c 〉 = | ν , i c 〉 , i = 1 2 , . Then the e -cores of Φ ( t ν 1 ) and of Φ ( t ν 2 ) are distinct. - (2) B ( µ, c ) 2 = B ( ˜ f .µ, j c ) 2 and B ( ˜ f .µ, j c ) 1 = B ( µ, c ) 1 ∪{ }\{ k k - } 1 for k ∈ Z such that k ≡ j ( mod e ) . /negationslash We have seen in 7.6 how to compute the e -cores of Φ ( t ν i ) , i = 1 2 , . In this procedure, some of the elements x in B ( ν , i c ) , i = 1 2 , , must be replaced by x -k.e for some k ∈ N . If the e -core of Φ ( t ν 1 ) equals the e -core of Φ ( t ν 2 ) , this implies that at the end of these procedures, we obtain the same symbols. However, this is impossible as j 1 ≡ j 2 ( mod e ) . /square Corollary. Suppose that Conjecture 5.7 is true. Let X be a unipotent k GU n ( q ) -module. Then, if /lscript is large enough, any two non-isomorphic simple submodules of R GU n +2 ( q ) GU n ( q ) ( X ) lie in distinct /lscript -blocks. Proof. By Conjecture 5.7, the non-isomorphic simple submodules of R GU n +2 ( q ) GU n ( q ) ( X ) correspond to two distinct directed edges in a suitable crystal graph. By the Proposition, the corresponding partitions have distinct e -cores, and thus the unipotent modules labelled by these partitions are in distinct /lscript -blocks. /square ## Acknowledgements Above all, we thank Meinolf Geck and Gunter Malle for inspiring this work in many ways and for their constant interest. We also thank Klaus Lux and Pham Huu Tiep for inviting the second author to the University of Arizona. During his visit parts of this paper were written. We thank Götz Pfeiffer for helpful discussions regarding Lemma 2.2. Finally, we very much thank the Isaac Newton Institute for Mathematical Sciences for inviting two of us to the special programme Algebraic Lie Theory (12 January to 26 June 2009), where the ground for the conjectures in this paper was lead. ## References - [1] M. Broué and J. Michel , Blocs et séries de Lusztig dans un groupe réductif fini, J. reine angew. Math. 395 (1989), 56-67. - [2] M. Cabanes and M. Enguehard , Representation theory of finite reductive groups , Cambridge University Press, Cambridge, 2004. - [3] R. Dipper , On the decomposition numbers of the finite general linear groups. II, Trans. Amer. Math. Soc. 292 (1985), 123-133. - [4] R. Dipper , On quotients of Hom-functors and representations of general linear groups I, J. Algebra 130 (1990), 234-259. - [5] R. Dipper and J. Du , Harish-Chandra vertices and Steinberg's tensor product theorem for general linear groups, Proc. London Math. Soc. 75 (1997), 559-599. - [6] R. Dipper and P. Fleischmann , Modular Harish-Chandra theory I, Math. Z. 211 (1992), 49-71. - [7] O. Dudas and G. Malle , Decomposition matrices for low rank unitary groups, preprint, 2013. - [8] P. Fong and B. Srinivasan , The blocks of finite general linear and unitary groups, Invent. Math. 69 (1982), 109-153. - [9] P. Fong and B. Srinivasan , Brauer trees in classical groups, J. Algebra 131 (1990), 179-225. - [10] M. Geck , On the decomposition numbers of the finite unitary groups in nondefining characteristic, Math. Z. 207 (1991), 83-89. - [11] M. Geck , Modular principal series representations, Int. Math. Res. Not. 2006, Art. ID 41957, 20 pp. - [12] M. Geck and G. Hiss , Modular representations of finite groups of Lie type in non-defining characteristic, in: M. Cabanes, ed. , Finite reductive groups (Luminy, 1994), Progr. Math., 141, (Birkhäuser Boston, Boston, MA 1997), 195-249. - [13] M. Geck, G. Hiss and G. Malle , Cuspidal unipotent Brauer characters, J. Algebra 168 (1994), 182-220. - [14] M. Geck, G. Hiss and G. Malle , Towards a classification of the irreducible representations in non-defining characteristic of a finite group of Lie type, Math. Z. 221 (1996), 353-386. - [15] M. Geck and N. Jacon , Canonical basic sets in type B n , J. Algebra 306 (2006), 104-127. - [16] M. Geck and N. Jacon , Representations of Hecke algebras at roots of unity, Algebra and Applications 15 , Springer-Verlag London, 2011. - [17] M. Geck and G. Malle , On the existence of a unipotent support for the irreducible characters of a finite group of Lie type, Trans. Amer. Math. Soc. 352 (2000), 429-456. - [18] T. Gerber , The canonical crystal isomorphism in Fock spaces, preprint, 2014, arXiv:1312.0021v2. - [19] J. Grabmeier , Unzerlegbare Moduln mit trivialer Youngquelle und Darstellungstheorie der Schuralgebra, Bayreuth. Math. Schr. 20 (1985), 9-152. - [20] J. Gruber , Green vertex theory, Green correspondence, and Harish-Chandra induction, J. Algebra 186 (1996), 476-521. - [21] J. Gruber and G. Hiss , Decomposition numbers of finite classical groups for linear primes, J. Reine Angew. Math. 485 (1997), 55-91. - [22] G. Hiss , Regular and semisimple blocks of finite reductive groups, J. London Math. Soc. 41 (1990), 63-68. - [23] G. Hiss , Harish-Chandra series of Brauer characters in a finite group with a split BN -pair, J. London Math. Soc. 48 (1993), 219-228. - [24] G. Hiss and R. Kessar , Scopes reduction and Morita equivalence classes of blocks in finite classical groups, J. Algebra 230 (2000), 378-423. - [25] R. B. Howlett , Normalizers of parabolic subgroups of reflection groups, J. London Math. Soc. 21 (1980), 62-80. - [26] R. B. Howlett and G. I. Lehrer , Induced cuspidal representations and generalised Hecke rings, Invent. Math. 58 (1980), 37-64. - [27] N. Jacon , http://njacon.perso.math.cnrs.fr/jacon\_crystal.g.zip - [28] N. Jacon and C. Lecouvey , A combinatorial decomposition of higher level Fock spaces, Osaka J. Math. 50 (2013), 897-920. - [29] G. D. James , Some combinatorial results involving Young diagrams, Math. Proc. Cambridge Philos. Soc. 83 (1978), 1-10. - [30] G. D. James and A. Kerber , The representation theory of the symmetric group, Encyclopedia Math. 16 , 1988. - [31] M. Jimbo, K. C. Misra, T. Miwa M. Okado , Combinatorics of representations of U q ( sl ( n )) at q = 0 , Comm. Math. Phys. 136 (1991), 543-566. - ̂ [32] M. Kashiwara , On crystal bases, in: Representations of groups (Banff, AB, 1994), CMS Conf. Proc. 16 , Amer. Math. Soc., Providence, RI, 1995, pp. 155-197. - [33] A. S. Kleshchev , Branching rules for modular representations of symmetric groups. I, J. Algebra 178 (1995), 493-511. - [34] A. S. Kleshchev , Branching rules for modular representations of symmetric groups. II, J. Reine Angew. Math. 459 (1995), 163-212. - [35] A. S. Kleshchev , Branching rules for modular representations of symmetric groups. III. Some corollaries and a problem of Mullineux, J. London Math. Soc. (2) 54 (1996), 25-38. - [36] A. S. Kleshchev , Branching rules for modular representations of symmetric groups. IV, J. Algebra 201 (1998), 547-572. - [37] G. Lusztig , Irreducible representations of finite classical groups, Invent. Math. 43 (1977), 125-175. - [38] G. Lusztig , Characters of reductive groups over a finite field, Ann. Math. Studies 107 , Princeton University Press, 1984. - [39] G. Lusztig and B. Srinivasan , The characters of the finite unitary groups, J. Algebra 49 (1977), 167-171. - [40] P. Shan , Crystals of Fock spaces and cyclotomic rational double affine Hecke algebras, Ann. Sci. Éc. Norm. Supér. (4) 44 (2011), 147-182. - [41] D. Uglov , Canonical bases of higher-level q -deformed Fock spaces and Kazhdan-Lusztig polynomials, in: Physical combinatorics (Kyoto, 1999) , Progr. Math. 191 , Birkhäuser, Boston, 2000, pp. 249-299. Table 1. The Harish-Chandra branching graph for GU n ( q ) , 1 ≤ n ≤ 7 odd, /lscript | q 2 -q +1 , /lscript &gt; 7 /d15 /d15 /d125 /d125 /d15 /d15 /d33 /d33 /d124 /d124 /d34 /d34 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1210v1-figure-1c095080-cb8a-44e7-9ebf-7196d623480c.jpg) /d126 /d126 /d15 /d15 /d125 /d125 /d15 /d15 /d125 /d125 /d126 /d126 /d15 /d15 /d15 /d15 /d126 /d126 /d15 /d15 /d34 /d34 /d33 /d33 /d15 /d15 /d33 /d33 /d15 /d15 /d34 /d34 /d124 /d124 /d15 /d15 /d124 /d124 /d124 /d124 /d15 /d15 /d15 /d15 /d15 /d15 /d123 /d123 /d35 /d35 /d15 /d15 /d15 /d15 /d124 /d124 /d34 /d34 /d34 /d34 /d15 /d15 /d35 /d35 ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1210v1-figure-123f4a86-ae14-4eae-9564-3b08a5cdb17a.jpg) TG: Laboratoire de Mathématiques et Physique Théorique, (UMR 7350, CNRS - Université de Tours) Parc de Grandmont, 37200, Tours GH: Lehrstuhl D für Mathematik, RWTH Aachen University, 52056 Aachen, Germany NJ: Laboratoire de Mathématique de Reims, 51687 Reims cedex 2 E-mail address : [email protected] E-mail address : [email protected] E-mail address : [email protected]
null
[ "Thomas Gerber", "Gerhard Hiss", "Nicolas Jacon" ]
2014-08-06T08:32:09+00:00
2014-08-06T08:32:09+00:00
[ "math.RT", "20C33, 20C08, 20G42, 17B37, 81R50" ]
Harish-Chandra series in finite unitary groups and crystal graphs
The distribution of the unipotent modules (in non-defining prime characteristic) of the finite unitary groups into Harish-Chandra series is investigated. We formulate a series of conjectures relating this distribution with the crystal graph of an integrable module for a certain quantum group. Evidence for our conjectures is presented, as well as proofs for some of their consequences for the crystal graphs involved. In the course of our work we also generalize Harish-Chandra theory for some of the finite classical groups, and we introduce their Harish-Chandra branching graphs.
1408.1211v1
## A Unifying Hierarchy of Valuations with Complements and Substitutes Uriel Feige ∗ Michal Feldman † Nicole Immorlica ‡ Rani Izsak § Brendan Lucier ¶ Vasilis Syrgkanis ‖ ## Abstract We introduce a new hierarchy over monotone set functions, that we refer to as MPH (Maximum over Positive Hypergraphs). Levels of the hierarchy correspond to the degree of complementarity in a given function. The highest level of the hierarchy, MPH -m (where m is the total number of items) captures all monotone functions. The lowest level, MPH -1, captures all monotone submodular functions, and more generally, the class of functions known as XOS . Every monotone function that has a positive hypergraph representation of rank k (in the sense defined by Abraham, Babaioff, Dughmi and Roughgarden [EC 2012]) is in MPH -k . Every monotone function that has supermodular degree k (in the sense defined by Feige and Izsak [ITCS 2013]) is in MPH -( k +1). In both cases, the converse direction does not hold, even in an approximate sense. We present additional results that demonstrate the expressiveness power of MPH -k . One can obtain good approximation ratios for some natural optimization problems, provided that functions are required to lie in low levels of the MPH hierarchy. We present two such applications. One shows that the maximum welfare problem can be approximated within a ratio of k +1 if all players hold valuation functions in MPH -k . The other is an upper bound of 2 k on the price of anarchy of simultaneous first price auctions. Being in MPH -k can be shown to involve two requirements - one is monotonicity and the other is a certain requirement that we refer to as PLE (Positive Lower Envelope). Removing the monotonicity requirement, one obtains the PLE hierarchy over all non-negative set functions (whether monotone or not), which can be fertile ground for further research. ∗ Weizmann Institute of Science; [email protected] † Tel-Aviv University; [email protected] ‡ Microsoft Research; [email protected] § Weizmann Institute of Science; [email protected] ¶ Microsoft Research; [email protected] ‖ Cornell University; [email protected] ## 1 Introduction In a combinatorial auction setting, a set M of m items is to be allocated among a set N of n buyers. Each buyer i ∈ N has a valuation function that assigns a non-negative real number v i ( S ) to every bundle of items S ⊆ M . A well motivated objective is to find a partition of the items X = ( X ,.. . , X 1 n ) among the buyers so as to maximize the social welfare , defined as the sum of buyers' valuations from the bundles they obtain SW X ( ) = ∑ i ∈ N v i ( X i ). The model of combinatorial auctions is highly applicable to real-world settings such as spectrum auctions and electronic advertisement markets. Most of the existing literature on combinatorial auctions has focused on the case where buyer valuations are complement-free. Roughly speaking, this means that the value for the union of two bundles of items cannot exceed the sum of the values for each individual bundle. Such valuations do not capture scenarios where certain items produce more value when acquired in conjunction with each other (such as a left and right shoe). Complement-free valuations are arguably more wellbehaved than general combinatorial valuations in many aspects. From an algorithmic perspective, complement-free valuations admit constant-factor polynomial time approximation algorithms [15, 11, 12], while general valuations are hard to approximate even to within a factor that is subpolynomial in the number of items [22]. From a game-theoretic perspective, simple auctions, such as running simultaneously a single-item first-price auction for each item, induce equilibria that achieve constant factor approximations to the optimal welfare if all valuations are complement-free [31, 16, 18, 8, 2]. In contrast, if valuations exhibit complements, the worst-case inefficiency grows with the number of items [18]. While the theory suggests that complementarities degrade the performance of combinatorial auctions, they arise very naturally in many economic scenarios. A prominent example is the FCC spectrum auctions, where it is desirable to win licenses for the same band of spectrum in adjacent geographical regions. The prevalence of complementarities in practice calls for a better theoretical understanding of the effect of the level of complementarity on the performance of auctions. To this end, we introduce a new hierarchy of monotone set functions called maximum over positive hypergraphs ( MPH ), whose level captures the degree of complementarity. A new hierarchy is useful if it has a strong expressiveness power on the one hand, and algorithmic and economic implications on the other. We show that important classes of functions are captured in low levels of our hierarchy (a detailed exposition is deferred to Section 1.2.). We then present algorithmic and economic results that illustrate the usefulness of our hierarchy. In particular, we develop an algorithm that approximates the welfare maximization problem to within a factor of k +1, where k is the degree of complementarity of the valuations, as captured by our hierarchy. We further show that an auction that solicits bids on each item separately and allocates each item to the highest bidder (at a cost equals to her bid) achieves a 2 k -approximation to the optimal welfare at any equilibrium of bidder behavior. ## 1.1 The Maximum over Positive Hypergraph ( MPH ) Hierarchy Given a set M of m items, a set function v : 2 M → R + is normalized if v ( ∅ ) = 0 and monotone if v T ( ) ≥ v S ( ) whenever S ⊆ T ⊆ M . 1 A normalized monotone set function is necessarily nonnegative. Throughout the paper we assume that all set functions are normalized and monotone, unless stated otherwise. In the context of combinatorial auctions, we refer to the set functions as valuation functions. 1 We use R + for non-negative real numbers. That is, 0 is included. /negationslash A set function v is symmetric if v S ( ) = v T ( ) whenever | S | = | T | . Ahypergraph representation of a set function v : 2 M → R + is a (normalized but not necessarily monotone) set function h : 2 M → R that satisfies v S ( ) = ∑ T ⊆ S h T ( ). It is easy to verify that any set function v admits a unique hypergraph representation and vice versa. A set S such that h S ( ) = 0 is said to be a hyperedge of h . Pictorially, the hypergraph representation can be thought of as a weighted hypergraph, where every vertex is associated with an item in M , and the weight of each hyperedge e ⊆ M is h e ( ). Then the value of the function for any set S ⊆ M , is the total value of all hyperedges that are contained in S . The rank of a hypergraph representation h is the largest cardinality of any hyperedge. Similarly, the positive rank (respectively, negative rank ) of h is the largest cardinality of any hyperedge with strictly positive (respectively, negative) value. The rank of a set function v is the rank of its corresponding hypergraph representation, and we refer to a function v with rank r as a hypergraphr function. Last, if the hypegraph representation is non-negative, i.e. for any S ⊆ M h S , ( ) ≥ 0, then we refer to such a function as a positive hypergraphr ( PH -r ) function . We define a parameterized hierarchy of set functions, with a parameter that corresponds to the degree of complementarity. Definition 1.1 (Maximum Over Positive Hypergraphk ( MPH -k ) class) . A monotone set function v : 2 M → R + is Maximum over Positive Hypergraphk ( MPH -k ) if it can be expressed as a maximum over a set of PH -k functions. That is, there exist PH -k functions { v /lscript } /lscript ∈L such that for every set S ⊆ M , $$v ( S ) = \max _ { \ell \in \mathcal { L } } v _$$ where L is an arbitrary index set. The MPH hierarchy has the following attributes: - 1. Completeness . Every monotone set function is contained in some level of the hierarchy (see below). - 2. Usefulness . The hierarchy has implications that relate the level in the hierarchy to the efficiency of solving optimization problems. Specifically, we show implications of our hierarchy to the approximation guarantee of the algorithmic welfare maximization problem (in Section 3.3) and the price of anarchy of simultaneous single item auctions (in Section 3.4). - 3. Expressiveness . The hierarchy is expressive enough to contain many functions in its lowest levels (see Section 2). We conclude this section with some basic properties of the MPH hierarchy (for more properties, see Section 2). The two extreme cases of MPH -k functions coincide with two important classes of valuations. Specifically, MPH -1 is the class of functions that can be expressed as the maximum over a set of additive functions. This is exactly the class of XOS valuations [21], which is a complement-free valuation class that has been well-studied in the literature. This class contains all submodular valuations, i.e. valuations that exhibit decreasing marginal returns. On the other side, MPH -m coincides with the class of all monotone functions, 2 and so the hierarchy is complete. For intermediate values of k , MPH -k is monotone; namely, for every k &lt; k ′ it holds that MPH -k ⊂ MPH -k ′ . We get the following hierarchy: $$\text{Submodular} \subset X O S = \mathcal { M P H }$$ 2 Simply create a separate PH | -S | function for each set S with a single hyperedge equal to the set S and with weight f ( S ). Then, by monotonicity, the maximum of these functions is equal to the initial valuation. ✎☞ ✍✌ ✎☞ ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1211v1-figure-df8d5b5b-3e5a-4a45-bac1-1ecae43605c5.jpg) ✍✌ Figure 1: The left figure depicts a spectrum auction inspired hypergraph valuation with positive edges and negative hyperedges, which can be expressed as the maximum over the positive graphical valuations on the right. A simple example. Consider the example depicted in Figure 1.1, which has an intuitive interpretation in the context of FCC spectrum auctions. Suppose that A B , are two spectrum bands and that A , B i i are auctions representing band A or B at location i . Locations 1 and 2 are neighboring geographic regions and therefore, a bidder gets a much larger value for getting the same band in both regions. Therefore, A 1 and A 2 have a complementary relationship and similarly B 1 and B 2 . However, each A i has a substitute relationship with B i and additionally the pair ( A , A 1 2 ) has a substitute relationship with the pair ( B , B 1 2 ), since a bidder will only utilize one pair of bands. This valuation can be represented as a hypergraph, as in the left-most diagram in Figure 1.1. Also, as illustrated in Figure 1.1, this valuation can be represented as a maximum over positive hypergraph valuations of rank 2. Fractionally 'Subadditive' Characterization of MPH -k . We show that the definition of MPH -k functions has a natural analogue as an extension of fractionally subadditive functions. See Appendix A. ## 1.2 Related Work Expressiveness. Since the maximum welfare allocation problem is NP -hard to approximate even with very poor ratio (see for example [22] for the case of single minded bidders - bidders that want one particular bundle of items), there has been extensive work on classification of monotone set functions. We distinguish between two types of classifications. One is that of restricted classes of set functions, and the other is inclusive hierarchies that capture all monotone set functions. Restricted classes of monotone set functions. Lehmann, Lehmann and Nisan [21] initiated a systematic classification of set functions without complementarities. The main classes in their classification (in order of increasing expressiveness) are additive , gross substitutes (a class introduced by Kelso and Crawford [20]), submodular , XOS (the terminology for this class is taken from earlier work of Sandholm [28]), and subadditive . Subsequent research showed that the maximum welfare can be approximated within a ratio somewhat better than 1 -1 /e in the submodular case [15], 1 -1 /e in the XOS case [11] and 2 in the subadditive case [12]. These approximation algorithms assume demand queries access to the valuation functions, though for the submodular case, if one is satisfied with a 1 -1 /e ratio, then value queries suffice [32]. It follows from the definitions that MPH -1, the first level of our hierarchy, coincides with the class of XOS functions. Conitzer, Sandholm, and Santi [9] consider the class of graphical valuations . Namely, every item has a weight, and every pair of items (edge of the graph) has a weight (positive if the items are complements, negative if they are substitutes, and 0 if they are independent), and the value of a set of items is the sum of weights of items and edges within the set. It will follow (though this is a nontrivial claim that requires a proof) that this class is contained in MPH -2. Abraham, Babaioff, Dughmi, and Roughgarden [1] consider the hierarchy of PH -k valuation functions, as already defined, (which are obviously contained in MPH -k ) that allows only complements but no substitutes. In particular, submodular functions cannot be expressed in this hierarchy, and moreover, even some supermodular functions cannot be expressed in this hierarchy. It is shown in [1] that the maximum welfare problem can be approximated within a ratio of k if all valuation functions are in PH -k . They also discuss mechanisms that are truthful in expectation, but the approximation ratios achieved by their mechanisms deteriorate with the total number m of items, even if k remains fixed. Inclusive hierarchies of monotone set functions. Feige and Izsak [13] introduced a hierarchy of monotone set functions, parameterized by the so-called supermodular degree . Unlike the MPH hierarchy whose levels are numbered from 1 to m , the levels of the supermodular degree hierarchy are numbered from 0 to m -1, and one should keep this in mind when comparing levels of these hierarchies. The functions with supermodular degree 0 are the submodular functions. As shown in [13], there is a greedy algorithm that approximates the welfare maximization problem within a ratio of k + 2 if the supermodular degree of all valuation functions is at most k . We show that for every k , functions of supermodular degree k are in MPH -( k + 1). For the other direction, there are functions in MPH -2 that cannot even be approximated by functions of low supermodular degree (e.g., functions of supermodular degree √ m approximate them only within a ratio of Ω( √ m )). The XOS class introduced in [21] is based on 'OR' and 'XOR' operations previously introduced in [28], but with the restriction that 'OR' operations are applied on single items. Removing this restriction and allowing operations on bundles, one obtains an XOS hierarchy parameterized by the size of the largest bundle. (The XOS hierarchy was suggested to us in personal communication by Noam Nisan.) While XOS -k and MPH -k coincide for k = 1, MPH -k is strictly better than XOS -k . It can be shown that XOS -k is contained in MPH -k , whereas there are functions in MPH -2 that cannot even be approximated in XOS -k for any constant k . (The proof uses the PH -2 function used in Section C). Welfare approximation The complement-free valuations introduced in [21] have also been studied in the game-theoretic context of equilibria in simultaneous single-item auctions. It has been established that the Bayes-Nash and Correlated price of anarchy of this auction format, with a first-price payment rule, are at most e/ e ( -1) in the XOS case [30] and at most 2 in the subadditive case [16]. For the second-price payment rule, these bounds become 2 for XOS [8] and 4 for subadditive [16]. These results build upon a line of work studying non-truthful item auctions for complement-free valuations [3, 2, 8, 18, 26]. Equilibrium analysis of non-truthful auctions has been applied to several other settings such as position auctions [6], bandwidth allocation mechanisms [31], combinatorial auctions with greedy allocation rules [23], and multi-unit auctions [24]. Recently, Roughgarden [27], Syrgkanis [29] and Syrgkanis and Tardos [31] proposed general smoothness frameworks for bounding the social welfare obtained in equilibria of (compositions of) mechanisms. ## 2 Summary of Results We obtain results on the expressiveness power of the MPH hierarchy and show applications of it for approximating social welfare in combinatorial auctions. Expressiveness. The first theorem establishes the expressiveness power of MPH . For some limitations, see Appendix L. Theorem 2.1. The MPH hierarchy captures many existing hierarchies, as follows: - 1. By definition, MPH -1 is equivalent to the class XOS (defined by Lehmann, Lehmann and Nisan [21]) and every function that has a positive hypergraph representation of rank k (defined by Abraham et al. [1], see Section 1.1) is in MPH -k . - 3. Every monotone function that has a hypergraph representation with positive rank k and laminar negative hyperedges (with arbitrary rank) is in MPH -k (See Section E.2). - 2. Every monotone graphical valuation (defined by Conitzer et al. [9]) is in MPH -2. Furthermore, every monotone function with positive rank 2 is MPH -2 (see Sections 3.2 and E.1). - 4. Every monotone function that has supermodular degree k (defined by Feige and Izsak [13]) is in MPH -( k +1) (See Section E.3). We further establish that the converse direction does not hold, even in an approximate sense, and conclude that the MPH -k hierarchy is strictly more expressive than many existing hierarchies. Specifically, we show that MPH -1 and MPH -2 contain functions that cannot be approximated by functions in low levels of other hierarchies. We first state the notion of approximation and then the proposition, whose proof is deferred to Appendix C. Definition 2.1. We say that a set function f approximates a set function g within a ratio of ρ ≥ 1 if there are ρ 1 and ρ 2 such that for every set S ρ 1 ≤ f ( S ) g S ( ) ≤ ρ 2 , and ρ 2 ρ 1 ≤ ρ . Proposition 2.2. There are functions in very low levels of the MPH hierarchy that cannot be approximated well even at relatively high levels of other hierarchies, as follows: - 1. There exists a submodular function (i.e., supermodular degree 0 , MPH -1 ) such that - (a) A graphical function cannot approximate it within a ratio better than Ω( m ) . - (b) A positive hypergraph function cannot approximate it within a ratio better than m . - (c) A hypergraph function of rank k (both negative and positive) cannot approximate it within a ratio better than Ω( m k 2 ) , for every k . - 2. There exists a PH -2 function (i.e., MPH -2) such that every function of supermodular degree d cannot approximate it within a ratio better than Ω( m/d ) . Applications. With the new hierarchy at hand, we are in a position to revisit fundamental algorithmic and game-theoretic problems about welfare maximization in combinatorial auctions. Our results are reassuring: we obtain good approximation ratios for settings with valuations that lie in low levels of the MPH -k hierarchy. From the algorithmic perspective, we provide a polynomial time ( k + 1)-approximation algorithm for the welfare maximization problem when valuations are MPH -k (assuming access to demand oracles). Theorem 2.3. If all agents have MPH -k valuations, then there exists an algorithm that gives k +1 approximation to the optimal social welfare. This algorithm runs in polynomial time given an access to demand oracles for the valuations. Our approximation algorithm first solves the configuration linear program for welfare maximization introduced by [10]. As is well known, solving this LP can be done in polynomial time using demand queries. We then round the solution to the LP so as to get an integer solution. Our rounding technique is oblivious and does not require access to demand queries. By analyzing the integrality gap, it is established that our rounding technique is nearly best possible. The second setting we consider is a simultaneous first-price auction - where each of the m items is sold via a separate single-item auction. We quantify the welfare loss in this simple auction when bidders have MPH -k valuations. We find that the price of anarchy is at most 2 k . Theorem 2.4. For simultaneous first price auctions, when bidders have MPH -k valuations, both the correlated price of anarchy and the Bayes-Nash price of anarchy are at most 2 k . Our proof technique extends the analysis for complement-free valuations in [16] and the smoothness framework introduced in [31] to settings with complementarities. We also establish an almost matching lower bound (See section G). Theorem 2.5. There exists an instance of a simultaneous first price auction with single minded bidders in MPH -k in which the price of anarchy is Ω( ) k . Remarks. Most of our expressiveness results showing that a certain function belongs to MPH -k are established by showing that the function satisfies a certain requirement that we refer to as the Positive Lower Envelope (PLE) condition. We also observe that, together with monotonicity, this requirement becomes a sufficient and necessary condition for membership in MPH -k . This observation motivates the definition of a new hierarchy, referred to as PLE . The class PLE -k contains MPH -k , but also includes non-monotone functions. While monotonicity is a standard assumption in the context of combinatorial auctions, PLE can be applicable outside the scope of combinatorial auctions. We defer to Appendix J, an analysis of the expressiveness of PLE functions and the observation that our approximation results extend to non-monotone PLE functions. Extensions. One of the main open problems suggested by this work is the relation between hypergraph valuations of rank k and MPH -k valuations. We make the following conjecture: Conjecture 2.6. Every hypergraph function with rank k (positive or negative) is in MPH -O k ( 2 ) . We make partial progress toward the proof of this conjecture, by confirming it for the case of symmetric functions. For non-symmetric, observe that for the case of laminar negative hyperedges, we show an even stronger statement in item (3) of Theorem 2.1. Theorem 2.7. Every monotone symmetric hypergraph function with rank k (positive or negative) is in MPH -O k ( 2 ) (See Sections 3.2 and F). For symmetric functions, we conjecture a more precise bound of ⌈ k 2 ⌉ ⌈ k +1 2 ⌉ , suggested by a computer-aided simulation based on a non-trivial LP formulation. For the special cases of symmetric functions of ranks k = 3 and 4, we show that they are in MPH -4 and MPH -6, respectively, and that this is tight. We use an LP formulation whose optimal solution is the worst symmetric function possible for a given rank, and its value corresponds to the level of this worst function in the MPH hierarchy. We bound the value of this LP, by using LP duality. (see Section K for proofs) ## 3 Proofs In this section we include a part of our proofs. Due to space constraints, we defer the other proofs to the appendix. ## 3.1 Positive lower envelope technique Proving that a particular set function f : 2 M → R + can be expressed as MPH -k requires constructing a set of PH -k valuations that constitutes the index set L over which the maximum is taken. In what follows we present a canonical way of constructing the set L . The idea is to create a PH -k function for every subset S of the ground set M . The collection of these PH -k functions, one for each subset, constitutes a valid MPH -k representation if they adhere to the following condition. Definition 3.1 (Positive Lower Envelope (PLE)) . Let f : 2 M → R + be a monotone set function. A positive lower envelope (PLE) of f is any positive hypergraph function g such that: - · g M ( ) = f ( M ) . - · For any S ⊆ M g S , ( ) ≤ f ( S ) . [No overestimate] Before presenting the characterization, we need the following definition. A function f : 2 M → R + restricted to a subset S , S ⊆ M , is a function f S : 2 S ⊆ R + with f S ( S ′ ) = f ( S ′ ) for every S ′ ⊆ S . Proposition 3.1 (A characterization of MPH ) . A function f is in MPH -k if and only if it is monotone and f S admits a lower envelope of rank k for every set S ⊆ M . ## 3.2 Some proofs of expressiveness We provide here a sketch of the proof of the second assertion in Theorem 2.1, namely that any monotone set function of positive rank 2 is in MPH -2 Proof. Let v : 2 M → R + be a monotone set function of positive rank 2 and let G v be the hypergraph representation of v , where the vertices of G v are the items of M . By Proposition 3.1 it suffices to show that every S ⊆ M has a positive lower envelope of rank 2 (abbreviated as PLE-2). Consider an arbitrary S ⊆ M . We construct a positive lower envelope for S by induction. Starting with an empty set of vertices, we iteratively add the vertices of S , one at a time. Let u i ∈ S denote the vertex added at iteration i , and S i ⊆ S denote the resulting subset. The inductive invariant that we maintain is that each S i has a PLE-2. The base case of the induction is S 1 , and there the inductive hypothesis holds because v is nonnegative. We now prove the inductive step. Namely, we assume that S i -1 has a PLE-2, and prove the same for S i . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1211v1-figure-80d13a3a-5b96-40f4-aaa2-29e76523ca75.jpg) Let N i ( P i , respectively) denote the set of negative (positive, respectively) hyperedges in G v that contain u i and are contained in S i . (As v has positive rank 2, the hyperedges in P i have rank at most 2.) Consider an auxiliary bipartite graph H with members of N i as one set of vertices, members of P i as the other set of vertices, and edges between e ∈ N i and e ′ ∈ P i iff e ′ ⊂ e (namely, the negative hyperedge contains all items of the positive hyperedge). These edges have infinite capacities. Add two auxiliary vertices, s connected to each member of N i by an edge of capacity equal to the (absolute value of the) weight of the corresponding hyperedge in G v , and t connected to each member of P i by an edge of capacity equal to the weight of the corresponding hyperedge in G v . We claim that there is a flow F from s to t saturating all edges of s . This follows from the max flow min cut theorem, together with the facts that v is monotone and all positive hyperedges have rank at most 2. Given this claim (whose proof appears in Appendix E.1), we add to the PLE-2 of S i -1 only the the members of P i (hence positive edges of rank at most 2), but each of them with a weight reduced by the amount of flow that goes from it to t (according to the saturated flow F ). The flow F gives us a way of charging every negative hyperedge that is discarded against a reduction in weight of positive hyperedges contained in it, and this implies (see details in Appendix E.1) that the result is indeed a PLE-2 for S i . Next we provide a sketch of the proof of Theorem 2.7, namely that every monotone symmetric hypergraphr function is in MPH -O r ( 2 ). Proof. Let f be a normalized monotone symmetric set function of rank r , and let h be its hypergraph representation. Consider the following normalized monotone symmetric set function g defined by its positive hypergraph representation p : p S ( ) = f ( U / ) ( n R ) if | S | = R , and p S ( ) = 0 otherwise, for R = 3 r 2 . As all four functions f, h, g, p are symmetric, we shall change notation and replace f ( S ) by f ( | S | ). As special cases of this notation, f ( U ) is replaced by f ( n ), and f ( φ ) is replaced by f (0). The proof proceeds by means of contradiction: suppose there is some f that serves as a negative example, namely, that for this f there is R ≤ k ≤ n -1 for which g k ( ) &gt; f k ( ). We can show that if such an example exists then there exists one where k = n -1 (Details appear in Appendix F). Thus it suffices to show that g n ( -1) = ( n -1 R ) f ( n / ) ( n R ) = n -R n f ( n ) ≤ f ( n -1) for any f that is hypergraph- . r We claim that g is a lower envelope for f . There are three conditions to check. Two of them trivially hold, namely, g (0) = f (0) = 0, and g n ( ) = ( n R ) p R ( ) = f ( n ). The remaining condition requires that g k ( ) ≤ f ( k ) for every 1 ≤ k ≤ n -1. This trivially holds for k &lt; R because in this case g k ( ) = 0, whereas f ( k ) ≥ 0. Hence the main content of our proof is to establish the inequality g k ( ) ≤ f ( k ) for every R ≤ k ≤ n -1. We will consider the (not necessarily monotone) degree r polynomial F x ( ) = ∑ r i =1 ( ) x i h i ( ), that matches f ( x ) at integral points { 0 , . . . , n } . Let M = max 0 ≤ ≤ x n | F x ( ) | and let 0 ≤ y ≤ n be such that | F y ( ) | = M . By Markov's inequality regarding bounds on derivatives of polynomials [25], we can show that max 0 ≤ ≤ x n | F ′ ( x ) | ≤ 2 r 2 n M . If y is an integer then monotonicity of f (and hence of F on integer points) implies that M = f ( n ). However, y need not be integer. In that case i &lt; y &lt; i + 1 for some 0 ≤ i ≤ n -1. Let m = max[ | F i ( ) | , | F i ( + 1) ]. | Then M ≤ m + 1 2 max i ≤ ≤ x i +1 [ | F ′ ( x ) ] | ≤ f ( n ) + r 2 n M . As n ≥ R ≥ 3 r 2 we obtain that M ≤ 3 f ( n / ) 2. On the other hand, f ( n -1) = F n ( -1) ≥ f ( n ) -max 0 ≤ ≤ x n F ′ ( x ) ≥ f ( n ) -2 r 2 n M ≥ f ( n ) -3 r 2 n f ( n ). Since R = 3 r 2 we have that f ( n -1) ≥ (1 -R n ) f ( n ) = g n ( -1), as desired. ## 3.3 Algorithmic Welfare Maximization (Proof of Theorem 2.3) In this section we consider the purely algorithmic problem, ignoring incentive constraints. While constant factor approximations exist for welfare maximization in the absence of complementarities (see [10, 12]), it is not hard to see that complementarities can make the welfare problem as hard as independent set and hence inapproximable to within an almost linear factor. Our hierarchy offers a linear degradation of the approximation as a function of the degree of complementarity. At a high level, our algorithm works as follows: define the configuration linear program (LP) (introduced in [10]) by introducing a variable x i,S for every agent i and subset of items S . Given the valuation function v i of each agent i , the configuration LP is: $$\begin{array} {$$ The first set of constraints guarantees that no agent is allocated more than one set and the second set of constraints guarantees that no item belongs to more than one set. This LP provides an upper bound on the optimal welfare. To find a solution that approximates the optimal welfare, we first solve this LP (through duality using demand queries 3 ) and then round it (see below). Rounding the LP. The rounding proceeds in two steps. First each agent i is assigned a tentative set S ′ i according to the probability distribution induced by the variables x i,S . Note that this tentative allocation has the same expected welfare as the LP. However, it may be infeasible as agents' sets might overlap. We must resolve these contentions. Several approaches for doing this when there are no complementarities were proposed and analyzed in [10, 12]. However, these approaches will fail badly in our setting, due to the existence of complementarities. Instead, we resolve contention using the following technique: We generate a uniformly random permutation π over the agents and then at each step t for 1 ≤ t ≤ n , assign agent i = π t ( ) items S i = S ′ i \ {∪ π t ( -1) i ′ = (1) π S i ′ } , i.e., those items in his tentative set that have not already been allocated. The following proposition shows that this way of contention resolution guarantees a loss of at most a factor of k +1, when all agents have MPH -k valuations. Proposition 3.2. If all agents have MPH -k valuations, then given a solution to the configuration LP, the above random permutation rounding algorithm produces (in expectation) an allocation that approximates the maximum welfare within a ratio no worse than k +1 . Proof. First, note that the solution is feasible, since every item is allocated at most once. We upper bound the approximation guarantee. The sum of values of tentative sets preserve, in expectation, the value of the optimal welfare returned by the configuration LP. Consider an arbitrary agent and his tentative set T . This set attained its value according to some positive hypergraph H that has no edges of rank larger than k . Consider an arbitrary edge of H contained in T , and let r ≤ k be its rank. We claim that its expected contribution (expectation taken over the random choices of the other agents and the random permutation) towards the final welfare is at least 1 / r ( +1) of its value. The expected number of other agents who compete on items from this edge is at most r (by summing up the fractional values of sets that contain items from this edge). Given that there are /lscript other competing agents, the agent gets all items from the edge with probability exactly 1 / /lscript ( +1). As the expectation of /lscript is at most r , the expectation of 1 / /lscript ( +1) is at least 1 / r ( +1) (by convexity) and hence at least 1 / k ( +1) as the valuation function is MPH -k . The proof follows from linearity of expectation. It is known that there is an integrality gap of k -1 + 1 k for hypergraph matching in k -uniform hypergraphs (see Chan and Lau [7] and references therein). These instances are special cases of welfare maximization with MPH -k valuations. Hence, our rounding technique in Proposition 3.2 is nearly best possible. For completeness, we show this integrality gap for our setting in Appendix M. Recall also that even for the case of single-minded bidders with sets of size up to k , it is NP -hard to approximate the welfare maximization problem to a better factor than Ω( ln k k ). 4 ## 3.4 Welfare Maximization at Equilibrium (Proof of Theorem 2.4) In this section we study welfare guarantees at equilibrium of the simultaneous item auction, when all agents have MPH -k valuations. In a simultaneous item (first-price) auction, every bidder i ∈ [ n ] simultaneously submits a bid b ij ≥ 0 for every item j ∈ [ m ]. We write b i = ( b i 1 , . . . , b im ) for the vector of bids of bidder i , and b = ( b 1 , . . . , b n ) for the bid profile of all bidders. Every item is 3 For definition of demand queries see Appendix O and for discussion on representation of set functions Appendix B. 4 This hardness is obtained by an approximation preserving reduction from k -set packing given in [22], together with a hardness result of [19]. allocated to the bidder who submits the highest bid on it (breaking ties arbitrarily), and the winning bidder pays his bid. We let X b i ( ) denote the bundle allocated to bidder i under bid profile b , and we write X b ( ) = ( X b ,... , X 1 ( ) n ( b )) for the allocation vector under bids b . When clear in the context, we omit b and write X for the allocation. A bidders's utility is assumed to be quasi-linear; i.e., u i ( b ; v i ) = v i ( X b i ( )) -∑ j ∈ X b i ( ) b ij . Given a valuation profile v , the welfare of an allocation X is the sum of the agents' valuations: SW X ( ; v ) = ∑ n i =1 v i ( X i ). We also denote the welfare-maximizing allocation for values v by X ∗ ( v ) (or X ∗ in short), and its social welfare by Opt ( v ). In this part we assume that the valuations of the players are common knowledge; see end of the section for incomplete information extensions. A Nash equilibrium is a profile of (possibly random) bids B = ( B , . . . , B 1 n ), such that no player's utility can increase by deviating to some other bid. To quantify the inefficiency that can arise in a simultaneous item auction, we will use the price of anarchy (PoA) measure, which is the maximum ratio (over all valuation profiles) of the optimal welfare over the welfare obtained at any Nash equilibrium. $$P O A = \max _ { \mathbf v \, ; \, B \colon B$$ Bounding the PoA. We provide a proof that the PoA of the auction is at most 4 k , when bidders have MPH -k valuations. Let B be a randomized bid profile that constitutes a Nash equilibrium under valuations v . For each item j ∈ [ m ], let P j = max j B ij be the price of item j ; P j is a random variable induced by the bid profile. Consider what would happen if bidder i deviated from B and instead bid b ∗ ij = 2 k · E [ P j ] on all the items j ∈ X ∗ i and 0 on the other items. By Markov's inequality bidder i wins each item j ∈ X ∗ i with probability at least 1 -1 2 k . Let v ∗ i be the PH -k lower envelope with respect to set X ∗ i (recall bidders have MPH -k valuations). Then, v i ( X ∗ i ) = v ∗ i ( X ∗ i ) and, for any X i ⊆ X ∗ i , v i ( X i ) ≥ v ∗ i ( X i ). Since v ∗ i is a PH -k valuation, each hyperedge of v ∗ i has size at most k ; it then follows byu the union bound that bidder i wins all items in any such hyperedge with probability at least 1 2 . Therefore, the value that the player derives from this deviation is at least 1 2 v ∗ i ( X ∗ i ) = 1 2 v i ( X ∗ i ). Hence, his utility from the deviation is at least 1 2 v i ( X ∗ i ) -2 k · ∑ j ∈ X ∗ i E [ P j ]. By the Nash condition his utility at equilibrium is at least this high. By summing the above bound over all bidders i , the sum of bidders' utilities at equilibrium is at least 1 2 Opt ( v ) -2 k · ∑ j ∈ [ m ] E [ P j ]. Adding the expression for the total utility, we get: $$\mathbb { E } [ S W ( B ; \mathbf v ) ] - \sum _$$ Since every player has the option to drop out of the auction, his expected utility must be nonnegative. Therefore, the expected total payment at equilibrium is bounded above by the welfare at equilibrium. Substituting this in the above inequality gives that 2 k · E [ SW B ( ; v )] ≥ 1 2 Opt ( v ), which establishes an upper bound of 4 k on the PoA, as desired. Extensions. In Appendix H we provide a tighter bound of 2 k on the PoA via the smoothness framework [31]. By using the smoothness framework, this bound immediately extends to Bayesian settings, where the valuations of the players are unknown but are drawn from commonly known independent distributions. The bound also extends to outcomes derived from no-regret (learning) behavior in repeated games. Acknowledgements. We are grateful to Noam Nisan for valuable discussions. We used computer-assisted simulations in order to find feasible solutions for the dual LPs. Specifically, we used Microsoft .NET together with Gurobi ([17]) and IBM CPLEX and also Wolfram Mathematica. We thank Ofer Bartal and Matan Karklinsky for their help in this matter. The work of Uriel Feige and Rani Izsak is supported in part by the Israel Science Foundation (grant No. 621/12) and by the I-CORE Program of the Planning and Budgeting Committee and The Israel Science Foundation (grant No. 4/11). The work of Michal Feldman is supported in part by the European Research Council under the European Union's Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement number 337122. The work of Vasilis Syrgkanis is partly supported by a Simons Graduate Fellowship in Theoretical Computer Science and part was done while an intern at Microsoft Research. ## References - [1] Ittai Abraham, Moshe Babaioff, Shaddin Dughmi, and Tim Roughgarden. Combinatorial auctions with restricted complements. In Proceedings of the 13th ACM Conference on Electronic Commerce , EC '12, pages 3-16, New York, NY, USA, 2012. ACM. - [2] Khsipra Bhawalkar and Tim Roughgarden. Welfare guarantees for combinatorial auctions with item bidding. In SODA , 2011. - [3] Sushil Bikhchandani. Auctions of heterogeneous objects. Games and Economic Behavior , 26(2):193 - 220, 1999. - [4] Liad Blumrosen and Noam Nisan. chapter Combinatorial Auctions. Camb. Univ. Press, '07. - [5] Liad Blumrosen and Noam Nisan. On the computational power of demand queries. SIAM Journal on Computing , 39:1372-1391, 2009. - [6] Ioannis Caragiannis, Christos Kaklamanis, Panagiotis Kanellopoulos, Maria Kyropoulou, Brendan Lucier, Renato Paes Leme, and Eva Tardos. On the efficiency of equilibria in generalized ´ second price auctions. CoRR , abs/1201.6429, 2012. - [7] Lau L. C. Chan. Y. H. On linear and semidefinite programming relaxations for hypergraph matching. Mathematical Programming , 135:123-148, 2012. - [8] George Christodoulou, Annam´ aria Kov´ acs, and Michael Schapira. Bayesian combinatorial auctions. In ICALP , 2008. - [9] Vincent Conitzer, Tuomas Sandholm, and Paolo Santi. Combinatorial auctions with k-wise dependent valuations. In In Proc. 20th National Conference on Artificial Intelligence (AAAI05 , pages 248-254. AAAI Press, 2005. - [10] Shahar Dobzinski, Noam Nisan, and Michael Schapira. Approximation algorithms for combinatorial auctions with complement-free bidders. Mathematics of Operations Research , 35:1-13, 2010. Preliminary version in STOC'05. - [11] Shahar Dobzinski and Michael Schapira. An improved approximation algorithm for combinatorial auctions with submodular bidders. In SODA , pages 1064-1073, 2006. [12] Uriel Feige. On maximizing welfare when utility functions are subadditive. In STOC , 2006. - [13] Uriel Feige and Rani Izsak. Welfare maximization and the supermodular degree. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science , ITCS '13, pages 247256, New York, NY, USA, 2013. ACM. | [14] | Uriel Feige and Shlomo Jozeph. Demand queries with preprocessing. In Manuscript , 2014. | |--------|------------------------------------------------------------------------------------------------------------------------------------------------------| | [15] | Uriel Feige and Jan Vondr´k. a Approximation algorithms for allocation problems: Improving the factor of 1 - 1 /e . In FOCS , pages 667-676, 2006. | | [16] | M. Feldman, H. Fu, N. Gravin, and B. Lucier. Simultaneous auctions are (almost) efficient. In STOC , 2013. | | [17] | Inc. Gurobi Optimization. Gurobi optimizer reference manual, 2014. | | [18] | A. Hassidim, Haim Kaplan, Yishay Mansour, and Noam Nisan. Non-price equilibria in markets of discrete goods. In EC'11 . | | [19] | Elad Hazan, Shmuel Safra, and Oded Schwartz. On the complexity of approximating k -set packing. Computational Complexity , 15:20-39, 2006. | | [20] | Alexander Kelso and Vincent Crawford. Job matching, coalition formation, and gross substi- tutes. Econometrica , 50:1483-1504, 1982. | | [21] | Benny Lehmann, Daniel Lehmann, and Noam Nisan. Combinatorial auctions with decreasing marginal utilities. In EC , 2001. | | [22] | Daniel Lehmann, Liadan O'Callaghan, and Yoav Shoham. Truth revelation in approximately efficient combinatorial auctions. In EC , pages 96-102, 1999. | | [23] | B. Lucier and A. Borodin. Price of anarchy for greedy auctions. In SODA , 2010. | | [24] | Evangelos Markakis and Orestis Telelis. Uniform price auctions: Equilibria and efficiency. In SAGT , 2012. | | [25] | Andrey Markov. On a question by D. I. Mendeleev. Zap. Imp. Akad. Nauk SPb , 62:1-24, 1890. | | [26] | Renato Paes Leme, Vasilis Syrgkanis, and ´ Eva Tardos. Sequential auctions and externalities. In SODA , 2012. | | [27] | Tim Roughgarden. The price of anarchy in games of incomplete information. In EC , 2012. | | [28] | Tuomas Sandholm. An algorithm for optimal winner determination in combinatorial auctions. In IJCAI , pages 542-547, 1999. | | [29] | Vasilis Syrgkanis. Bayesian games and the smoothness framework. CoRR , abs/1203.5155, 2012. | | [30] | Vasilis Syrgkanis and Eva Tardos. Bayesian sequential auctions. In EC , 2012. | | [31] | Vasilis Syrgkanis and Eva Tardos. Composable and efficient mechanisms. In STOC , 2013. | | [32] | Jan Vondr´k. a Optimal approximation for the submodular welfare problem in the value oracle model. In STOC , pages 67-74, 2008. | ## A Fractional Covers and MPH Valuations In this section we show an equivalence between Maximum over Hypergraph Valuations and a generalization of fractionally subadditive valuations, where fractional covers are defined as covering every possible subset of size at most k of nodes. More formally, consider a set S of items and let S | k be all the subsets of S of size at most k . We say that a collection of sets T ⊆ 2 S together with a weight a T for each T ∈ T is a fractional cover of all the subsets of size at most k ( k -fractional cover) of S if ∀ s ∈ S | k : ∑ T ∈T : T ⊇ s a T ≥ 1. A valuation v : 2 M → R + is k -fractionally subadditive if for every S ⊆ M and every k -fractional cover ( a T , T ) of S , we have v S ( ) ≤ ∑ T ∈T a T · v T ( ). Theorem A.1. The class of monotone k -fractionally subadditive valuations is equivalent to the class of MPH -k valuations. Proof. First it is easy to observe that any MPH -k valuation is k -fractionally subadditive: $$\sum _ { T \in \mathcal { T } } a _ { T } \cdot v ( T ) & = \sum _ { T \in \mathcal { T } } a _ { T } \cdot \max _ { \ell \in \mathcal { L } } \sum _ { s \in T | _ { k } } w _ { s } ^ { \ell } \geq \max _ { \ell \in \mathcal { L } } \sum _ { T \in \mathcal { T } } a _ { T } \sum _ { s \in T | _ { k } } w _ { s } ^ { \ell } = \max _ { \ell \in \mathcal { L } } \sum _ { s \in S | _ { k } } w _ { s } ^ { \ell } \sum _ { T \in T \colon T \supseteq s } a _ { T } \\ & \geq \max _ { \ell \in \mathcal { L } } \sum _ { s \in S | _ { k } } w _ { s } ^ { \ell } = v ( S )$$ To show that any monotone k -fractionally subadditive valuation is an MPH -k valuation, we follow a similar analysis to that carried by Feige [12], as follows. For every set S , we construct a hypergraphk valuation associated with the set S , and denote it by /lscript ( S ). The set of valuations is then L = ∪ S ⊆ [ m ] /lscript ( S ). The hypergraph valuation /lscript ( S ) is constructed such that: (i) v S ( ) = ∑ s ∈ | S k w /lscript ( S ) s , and (ii) for any subset T ⊆ S : v T ( ) ≥ ∑ s ∈ T | k w /lscript ( S ) s . Monotonicity then implies that for any set S , v S ( ) = max /lscript ∈L s ∈ | S k w /lscript s , as desired. ∑ It remains to construct the valuation /lscript ( S ). To this end, we consider the following linear program and its dual: $$\text{and now} \, \text{$V(S)} = \min _ { ( a _ { T } ) _ { T \subseteq S } } \sum _ { T \subseteq S } a _ { T } \cdot v ( T ) & C ( S ) = \max _ { ( w _ { s } ) _ { s \in S | _ { k } } } \sum _ { s \in S | _ { k } } w _ { s } \\ \forall s \in S | _ { k } \colon \sum _ { T \supseteq s } a _ { T } \geq 1 & \forall T \subseteq S \colon \sum _ { s \in T | _ { k } } w _ { s } \leq v ( T ) \\ \forall T \subseteq S \colon \, a _ { T } \geq 0 & \forall s \in S | _ { k } \colon \, w _ { s } \geq 0 \\ \text{By definition, every feasible solution to the primal program constitutes a fractional cover of every}$$ By definition, every feasible solution to the primal program constitutes a fractional cover of every subset of size at most k of S . Therefore, it follows by k -fractional subadditivity that V ( S ) ≥ v S ( ). Since v S ( ) can be obtained by setting a S = 1 and a T = 0 for any T ⊂ S , we get that V ( S ) = v S ( ). Duality then implies that C S ( ) = v S ( ). Thus if we set ( w /lscript ( S ) s ) s ∈ | S k to be the solution to the dual, then the conditions that need to be hold for /lscript ( S ) are satisfied by the constraints of the dual and the duality. ## B MPH as a useful representation An explicit description (as a truth table) of a set function over m items contains 2 m -1 entries. However, one is typically more interested in those set functions that have implicit descriptions of size polynomial in m (which by a simple counting argument constitute only a small fraction of all possible set functions). A set function may have several different polynomial size descriptions, that differ wildly in their usefulness. For example, a useful description of a linear function simply lists the values of all items, whereas a rather useless description is to list m NP -hard optimization problems, with the intended interpretation that the value of the i th item is equal to the value of the optimal solution of the i th problem. Given a description of a set function f , a 'minimal' notion of usefulness is that of having the ability to answer value queries , namely, to have a fast (polynomial time) algorithm that given a set S as input, returns f ( S ). Such an algorithm is referred to as a value oracle for f . Ideally, the value oracle has a polynomial size implementation, say, as a circuit of size polynomial in m . However, in the context of combinatorial auctions, one may also imagine using exponential size implementations of value oracles: an agent may hold a representation of his own valuation function f as a truth table. This representation may be too long to be communicated in its entirety to the welfare maximization algorithm, but the agent may answer value queries quickly upon request, by having random access (rather than sequential access) to this table. Another notion of usefulness that comes up naturally in the context of combinatorial auctions is that of having the ability to answer demand queries , namely, to have a fast (polynomial time) algorithm that given a list of item prices p i as input, returns the set S that maximizes f ( S ) -∑ i ∈ S p i . Such an algorithm is referred to as a demand oracle for f . A demand oracle is at least as difficult to implement as a value oracle, because value queries can be implemented using demand queries (see [5]). It is shown in [14] that even some submodular functions that have a polynomial representation do not have any polynomial size implementation of demand oracles (not even oracles that answer demand queries approximately), unless NP has polynomial size circuits. In fact, there are such functions that do not have any polynomial size implementation of value oracles (unless NP has polynomial size circuits). Hence not all functions in MPH -1 have useful representations, not even those functions that have a polynomial representation. A function f is said to have a polynomial size MPH representation if it can be represented as a maximum over polynomially many positive hypergraphs, where each hypergraph is of polynomial size. Interestingly, a polynomial size MPH representation is always a useful representation. Proposition B.1. Given a polynomial size MPH representation of a set function f , one can answer demand queries in polynomial time. Proof. It was observed in [1] that one can solve a demand query on a positive hypergraph valuation by the following algorithm: subtract the item prices from the corresponding vertices and then observe that the resulting graph (which potentially has negative vertex weights) defines a supermodular function. Supermodular function maximization is equivalent to submodular function minimization, and is well-known to be solvable in strongly polynomial time. To answer a demand query on a function with a polynomial size MPH representation, simply solve the demand query on each hypergraph separately, as proposed above, and then return the maximum. ## C Proofs on Limitations of previous hierarchies In this section we prove Proposition 2.2 by constructing functions that lie in MPH -k for small values of k , but that are not approximable by functions that are low in alternative hierarchies. Recall (from Definition 2.1) that a set function f approximates a set function g within a ratio of ρ ≥ 1 if there are ρ 1 and ρ 2 such that for every set S , ρ 1 ≤ f ( S ) g S ( ) ≤ ρ 2 , and ρ 2 ρ 1 ≤ ρ . We begin by proving the first half of Proposition 2.2. Let f 1 be the function such that f 1 ( S ) = 1 for every nonempty set S ⊆ M . Note that f 1 is submodular. Recall that the hypergraph rank of a function f is the cardinality of the largest (nonzero) hyperedge in the hypergraph representation of f . Proposition C.1. The hypergraph rank of f 1 is | M | . Moreover, for every k (the following result is nontrivial for k ≤ o ( √ m ) ), every function of hypergraph rank k approximates f 1 within a ratio no better than Ω ( m k 2 ) . For the moreover part of the proposition, we only sketch the proof; the missing details can be found in the proof of Theorem 2.7. Let f be an arbitrary function of hypergraph rank k that approximates f 1 within a ratio of ρ . We may assume without loss of generality that f is a symmetric function (otherwise we can symmetrize it by averaging all m ! functions that are obtained from f by permuting the items of M ). By scaling we may assume that f ( S ) ≤ 1 for every set S , with equality for some nonempty S . Then the approximation guarantee is that f ( S ) ≥ 1 /ρ for every nonempty set S . Expressing the symmetric function f as a degree k polynomial in one variable, the derivative of this polynomial is bounded by O ( k 2 m ) (see details in the proof of Theorem 2.7). As f (0) = 0 this implies that f (1) ≤ O ( k 2 m ). Combining with the the approximation requirement of f (1) ≥ 1 /ρ we obtain that ρ ≥ Ω( m k 2 ), as desired. Proof. The unique hypergraph representation of f 1 sets h S ( ) = 1 for every odd cardinality set S , and h S ( ) = -1 for every nonempty even cardinality set S . Hence its hypergraph rank is | M | . For k = 2, Proposition C.1 immediately implies that graphical valuations cannot approximate f 1 within a ratio better than Ω( m ). Likewise, it is similarly seen that no function in the PH hierarchy can approximate f 1 within a ratio better than m . We next turn to the second half of Proposition 2.2. Let f 2 denote the function with the following graphical representation: the complete graph in which each vertex has value 0 and each edge has value 1. Hence f ( S ) = 0 for | S | ≤ 1 and f ( S ) = ( | S | 2 ) otherwise. Observe that f 2 is a graphical valuation function (by definition) and that f 2 is in PH -2 (again, by definition). Proposition C.2. Every function of supermodular degree d approximates f 2 within a ratio no better than m d +1 -1 . In particular, f 2 has supermodular degree Ω( m ) . Proof. Let f be a function of supermodular degree d . Then, there must exist a set T with | T | ≥ m d +1 such that f restricted to T is submodular (such a set can be obtained by picking an item, discarding the at most d items that have supermodular dependence with it, and repeating). Without loss of generality, normalize f such that f ( T ) = f 2 ( T ) = ( | T | 2 ) . Then, by submodularity of f on T , there is a set T ′ ⊂ T with | T | = 2 such that f ( T ′ ) ≥ 2 | T | f ( T ) = | T | -1. But f 2 ( T ′ ) = 1, implying that the approximation ratio ρ is at least | T | -1 ≥ m d +1 -1. ## D Positive lower envelope technique Proof of Proposition 3.1 : First direction: Monotone, PLE of rank k ⇒MPH -k : Let f : 2 M → R + be a monotone set function. For any T ⊆ M , let g T be a positive lower envelope of rank k of f restricted to T . We argue that { g T } T ⊆ M is an MPH -k representation of f . Specifically, we show that for every S ⊆ M , it holds that max T ⊆ M g T ( S ) = f ( S ). Let S ⊆ M . By the first property of Definition 3.1, it holds that g S ( S ) = f ( S ). Therefore, $$\max _ { T \subseteq M } g _ { T } ( S ) \geq g _ { S } ( S ) = f ( S )$$ Additionally, for any T ⊆ M g , T ( S ) = g T ( S ∩ T ) ≤ f ( S ∩ T ) ≤ f ( S ), where the equality follows from the fact that g T is restricted to T ; the first inequality follows from the no-overestimate property of Definition 3.1 and the last inequality follows from monotonicity of f . Therefore, $$\max _ { T \subseteq M } g _ { T } ( S ) \leq f ( S )$$ The first direction follows by Equations (5) and (6). Second direction: MPH -k ⇒ Monotone, PLE of rank k : Let f : 2 M → R + be a function in MPH -k and let L be an MPH representation of it. We first prove that f is monotone. Assume towards contradiction that f is not monotone. Then, there exist S ′ ⊂ S ⊆ M such that f ( S ′ ) &gt; f S ( ). Since L is an MPH representation of f , there exists a positive hypergraph function f h ∈ L such that f h ( S ′ ) = f ( S ′ ). This means that f h ( S ) ≥ f ( S ′ ) &gt; f S ( ), which implies that max g ∈L g S ( ) &gt; f S ( ), deriving a contradiction. The monotonicity of f follows. We next show that for every set S ⊆ M f , S admits a positive lower envelope of rank k . Let S ⊆ M . There exists a positive hypergraph function f h ∈ L such that f h ( S ) = f ( S ). Moreover, no set S ′ ⊆ S can have value strictly greater than f ( S ′ ) according to f h , since if it does, this will be a lower bound on the value of S ′ according to L . Therefore f h is a positive lower envelope of f S , as desired. The second direction follows. We conclude the proof of Proposition 3.1. ## E Proof of Expressiveness Theorem 2.1 ## E.1 Graphical Valuations with Negative Hyperedges We prove the part of Theorem 2.1 dealing with monotone set functions with positive rank 2. Theorem E.1. Any monotone set function of positive rank 2 is in MPH -2 Proof. Let f be a monotone hypergraph set function with positive rank 2, and let h be its hypergraph representation. In order to prove the theorem, we invoke the lower envelope technique, given in Proposition 3.1. Specifically, for every set S , we construct a monotone positive lower envelope w S of rank 2 with a hypergraph representation g S . Fix a set S of cardinality r . For every hyperedge e that is not contained in S or such that h e ( ) = 0, set g S ( e ) = 0. The rest of the proof deals with hyperedges e that are contained in S and such that h e ( ) = 0. /negationslash /negationslash /negationslash The idea is to charge the negative values of the edges in E -j ( S &lt;j ) to positive edges in E + j ( S &lt;j ) in such a way that the absolute value of every negative hyperedge is charged completely to positive edges that are subsets of the negative hyperedge. In particular, for every e ∈ E + j ( S &lt;j ), we compute Let s , . . . , s 1 r be an arbitrary order of the items in S . We construct g S incrementally, considering one item at a time. For every j ≤ r , let S &lt;j be the set { s , . . . , s 1 j -1 } . For an item s j and a set of items T ⊆ S &lt;j , let E + j ( T ) denote the set of positive hyperedges that are created when adding item s j to the set T ; i.e., E + j ( T ) = { e ∈ S : h e ( ) &gt; 0 , e ⊆ T ∪ { s j } , e ⊆ T } . Similarly, let E -j ( T ) denote the set of negative hyperedges that are created when adding item s j to T ; i.e., E -j ( T ) = { e ∈ S : h e ( ) &lt; 0 , e ⊆ T ∪ { s j } , e ⊆ T } . Specifically, E + j ( S &lt;j ) and E -j ( S &lt;j ) are the respective new positive and negative hyperedges that are created when s j is added to S &lt;j . a charging c e ≤ h e ( ), satisfying the following two conditions: $$\sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) } c _ { e } = \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) } | h ( e ) |$$ $$\forall T \subseteq S _ { < j } \colon \sum _ { e \in E _ { j } ^ { + } ( T ) } c _ { e } \geq \sum _ { e \in E _ { j } ^ { - } ( T ) } | h ( e ) |$$ Then, for every e ⊆ S such that h e ( ) &lt; 0, we set g S ( e ) = 0, and for every e ⊆ S such that h e ( ) &gt; 0, we set g S ( e ) = h e ( ) -c e , In order to prove the theorem, we need to establish two arguments: First, we need to show that g S , calculated by a charging scheme that satisfies Equations (7) and (8), is a hypergraph representation of a lower envelope of v with respect to S . Second, we need to argue that there exists a charging scheme satisfying Equations (7) and (8). We start with the first argument. Namely, we show that w S , with a hypergraph representation g S , satisfies the two conditions of Lemma 3.1. We first establish the first property. $$\mathring { \xi }, \text{ satisfies the two conditions of Lemma 3.1. } \, \text{We first establish the first property.} \\ v ( S ) & = \, \sum _ { j = 1 } ^ { r } v ( s _ { j } \, | \, S _ { < j } ) = \sum _ { j = 1 } ^ { r } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) } h ( e ) - \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) } | h ( e ) | \right ) \\ & = \, \sum _ { j = 1 } ^ { r } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) } h ( e ) - \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) } c _ { e } \right ) = \sum _ { j = 1 } ^ { r } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) } g ^ { S } ( e ) \right ) \\ & = \, \sum _ { j = 1 } ^ { r } w ^ { S } ( s _ { j } \, | \, S _ { < j } ) = w ^ { S } ( S ) \, \\ \text{ here the first and second equalities are by definitions (marginal set function and hypergra}$$ where the first and second equalities are by definitions (marginal set function and hypergraph representation, respectively); the third is by (7); the fourth is by definition of g S ( e ); the fifth is by definitions of g S and w S and the last is by definition of marginal set function. We next establish the no-overestimate property; i.e., for every set T , v T ( ) ≥ w S ( T ). $$\text{the no-overestimate property; i.e., for every set $T$, $v(T) \geq w^{S}(T)$.} \\ v(T ) & = \sum _ { s _ { j } \in T } v ( s _ { j } \, | \, S _ { < j } \cap T ) = \sum _ { s _ { j } \in T } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } \cap T ) } h ( e ) - \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } \cap T ) } | h ( e ) | \right ) \\ & \geq \sum _ { s _ { j } \in T } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } \cap T ) } h ( e ) - \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } \cap T ) } c _ { e } \right ) = \sum _ { s _ { j } \in T } \left ( \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } \cap T ) } g ^ { S } ( e ) \right ) \\ & = \sum _ { s _ { j } \in T } w ^ { S } ( s _ { j } \, | \, S _ { < j } \cap T ) = w ^ { S } ( T ) \, \\ \text{where the inequality is by $(8)$.}$$ where the inequality is by (8). We now prove the latter argument; i.e., that a charging scheme satisfying Equations (7) and (8) exists. We reduce the existence problem to a max-flow min-cut computation on an appropriately defined graph. For every item s j ∈ S , we associate a flow graph G , with source s , target t , and two sets of nodes L and R as described next. To avoid confusion between the hypergraph edges and the edges of the flow graph G , we refer to the edges of G as arcs. For every hyperedge e ∈ E -j ( S &lt;j ) associate a node e ∈ L , and draw an arc from the source s to node e with capacity | h e ( ) . | Similarly, for every hyperedge e ∈ E + j ( S &lt;j ) associate a node e ∈ R , and draw an arc from node e to the target node t with capacity h e ( ). In addition, for every node v ∈ L , we draw an arc with capacity + ∞ to every node u ∈ R such that e u ⊆ e v , where e u and e v are the hyperedges associated with nodes u and v , respectively. We will soon show that the maximum flow of this graph is equal to ∑ e ∈ E -j ( S &lt;j ) | h e ( ) | (i.e., all edges from s to nodes in L are fully saturated). Then, for every node v ∈ R , we let the charging of the edge e associated with v to be equal to the flow on the edge from v to t in the maximum flow. We argue that such a charging satisfies Equations (7) and (8). Equation (7) is clearly satisfied, as the total charging on the positive edges is equal to the total flow, which is the total absolute value of the negative hyperedges. To establish Equation (8), consider a subset T ⊆ S &lt;j . If a hyperedge e ∈ E -j ( S &lt;j ) is also contained in E -j ( T ), then all of the positive edges that are subsets of e are contained in E + j ( T ). In addition, by the design of the flow graph, all the negative value of e was charged to positive edges that are contained in it. Therefore, the total charging associated with the positive edges E + j ( T ) is at least as much as the total absolute value of the negative edges in E -j ( T ), establishing Equation (8). It now remains to establish a flow with value ∑ e ∈ E -j ( S &lt;j ) | h e ( ) . | We equivalently establish that the minimum ( s, t )-cut in G equals this value. Clearly, there exists a cut with this value; namely, the set of the outgoing edges from the source s . It remains to show that every cut has at least this value. Let ( A,B ) be an arbitrary ( s, t )-cut of G , such that s ∈ A and t ∈ B , and let c A, B ( ) denote its value. We show that $$c ( A, B ) \geq \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) } | h ( e ) |.$$ If there exist two nodes v, u such that v ∈ L ∩ A and u ∈ R ∩ B , then the cut ( A,B ) contains an arc with infinite capacity, so Equation (9) holds. Otherwise, for every node in L ∩ A , every node u ∈ R connected to v must be in A too. It follows that the value of the cut can be expressed as follows: $$C ( A, B ) = \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) \cap B } | h ( e ) | + \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) \cap A } h ( e ),$$ and so we need to show that $$\sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) \cap B } | h ( e ) | + \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) \cap A } h ( e ) \geq \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) } | h ( e ) |.$$ Substituting ∑ e ∈ E -j ( S &lt;j ) | h e ( ) | = ∑ e ∈ E -j ( S &lt;j ) ∩ A | h e ( ) | + ∑ e ∈ E -j ( S &lt;j ) ∩ B | h e ( ) , | it remains to show that $$\sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) \cap A } h ( e ) \geq \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) \cap A } | h ( e ) |.$$ Let A -j = ∪ e ∈ E -j ( S &lt;j ) ∩ A ( e \ { s j } ) be the union of items in the negative hyperedges in A , excluding s j . Consider the hypothetical case of adding item s j to A -j . Observe that when adding s j to A -j the absolute value of the negative edges created is at least the sum of all the absolute values of negative hyperedges in A . By the fact that the positive edges are of cardinality at most 2, the total value of the positive edges created is exactly equal to the union of the positive edges that are subsets of some of the negative hyperedges in A . Note that the fact that all positive edges are of cardinality at most 2 is crucial here: if there were positive hyperedges of cardinality greater than 2, then additional hyperedges could have been created and the argument would break. The latter union is exactly the set of positive edges in A . Thus we get: $$v ( s _ { j } \ | \ A _ { j } ^ { - } ) \leq \sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) \cap A } h ( e ) - \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) \cap A } | h ( e ) |.$$ The monotonicity of v implies that v s ( j | S -( A )) ≥ 0, implying that $$\sum _ { e \in E _ { j } ^ { + } ( S _ { < j } ) \cap A } h ( e ) - \sum _ { e \in E _ { j } ^ { - } ( S _ { < j } ) \cap A } | h ( e ) | \geq 0,$$ as required. ## E.2 Laminar Negative Hyperedges We prove the part of Theorem 2.7 dealing with monotone hypergraph functions with laminar negative hyperedges. Theorem E.2. Every monotone hypergraph function with positive rank r and laminar negative hyperedges (with arbitrary rank) is in MPH -r Proof. Let f : 2 M → R + be a non-negative set function with positive rank r and hypergraph representation w : 2 M → R . For this proof we actually only assume that f is non-negative and not the stronger assumption that it is monotone. Under solely the non-negativity assumption we construct a valid positive lower envelope of f of rank k . Then this would directly imply that when the function is also monotone, then it is in MPH -k . Note that we construct a positive lower envelope only for f itself, but the proof applies to any restriction of f , as well. /negationslash Let E denote the set of hyperedges of w (i.e. S ⊂ M with w S ( ) = 0). We will denote with F = ( M,E,w ) the actual hypergraph on vertices M , hyperedge-set E and hyperedge weights w . By our assumption the negative hyperedges of F are laminar. We show how to remove the negative hyperedges of F one by one, without either changing its value for M , increasing its value for any S ⊆ M or disobeying its non-negativity. Thus at the end of this construction, the positive hypergraph that will remain will be a valid positive lower envelope of f . Let e be a negative hyperedge of minimum rank and let S e ⊆ M be the set of items represented by vertices contained in e . From non-negativity f ( S e ) ≥ 0. Therefore, there exist positive hyperedges E + containing only vertices representing items of S e with sum of values of at least | w e ( ) . | We remove e and total value of | w e ( ) | from the edges in E + (arbitrarily, without introducing any new negative edges). Let F ′ be F after this change and let f ′ be the function F ′ represents. We show F ′ still represents a non-negative function f ′ . Assume towards contradiction this is not the case. Let S -be a minimal set of vertices representing set of items with negative value by f ′ . From minimality of S -it must be that removing any vertex of S -results in removing at least one negative hyperegde from the induced subgraph. That is, S -is a collection of negative edges. Let e -1 , . . . , e -l be these negative edges. From laminarity, these negative edges must be disjoint. Therefore, f ′ ( S -) = ∑ l 1 f ′ (items( e -i )) (where items( e -i ) are the items represented by the vertices contained in e -i ). Since this sum is strictly negative, it must be that the value of at least one of the addends is negative. So, from minimality of S -it must be that l = 1. That is, S -must contain the items of exactly one negative edge (which may contain, of course, other negative or positive edges). But, since f ( S -) ≥ 0, it must be that S -contains at least one of the positive edges of E + and does not contain e . Therefore, e -1 and e must not be disjoint. This contradicts laminarity of negative edges. Therefore, it must be that f ′ is a non-negative function. Moreover, since f is laminar and since no negative edges have been added, f ′ is laminar as well. Theorem E.2 follows by an inductive argument by observing that F ′ contains less negative edges than F . ## E.3 Supermodular Degree We prove the part of Theorem 2.1 dealing with the supermodular degree hierarchy. Theorem E.3. Every function with supermodular degree k is in MPH -( k +1) . Proof. Let f : 2 M → R + be in SMD -k . Invoking Proposition 3.1, we construct a positive lower envelope g : 2 M → R + of f that has rank k + 1. We denote by w : 2 M → R + the (positive) hypergraph representation of g . Note that we construct a positive lower envelope only for f itself, but the proof applies to any restriction of f , as well. Consider an arbitrary ordering of the items: M = { 1 , . . . , m } . For every item j ∈ M , let e j be the set of items that contains j and all the items j ′ ∈ M such that j ′ is supermodularly dependent with j . By the assumption of the supermodular degree of k : | e j | ≤ k +1. Let S &lt;j = 1 { , . . . , j - } 1 . For every j , we associate a weight of f ( j | S &lt;j ) with hyperedge e j (i.e., w e ( j ) = f ( j | S &lt;j )), and every other hyperedge has a weight of zero. For simplicity of presentation, we will allow for multiple identical hyperedges. If e j is identical to some other e j ′ , then we implicitly assume that the weight of the hyperedge is the addition of the two weights. By construction we have that f ( M ) = ∑ m j =1 f ( j | S &lt;j ) = ∑ m j =1 w e ( j ) = ∑ e ∈ E w w e ( ) = g M ( ), where E w is the set of hyperedges of w . Thus, the first property of Definition 3.1 is satisfied. It remains to show that for every subset T ⊆ M , it holds that f ( T ) ≥ g T ( ) = ∑ e ∈ E w : e ⊆ T w e ( ). Observe that it suffices to consider only sets T that are unions of hyperedges with positive weights. This is because any vertex that is not contained in some hyperedge e j contributes no value to the summand on the right hand side. Thus we assume that T = ∪ j ∈ J e j for some index set J ⊆ M . We need to show that f ( T ) ≥ ∑ j ∈ J w e ( j ). Note that: $$f ( T ) = \sum _ { j \in T } f ( j \ | \ T \cap S _ { < j } ) = \sum _ { j \in T - J } f ( j \ | \ T \cap S _ { < j } ) + \sum _ { j \in J } f ( j \ | \ T \cap S _ { < j } ) \geq \sum _ { j \in J } f ( j \ | \ T \cap S _ { < j } ),$$ where the last inequality follows by monotonicity (which implies that every summand of the first sum is non-negative). Now we argue that for every j ∈ J , f ( j | T ∩ S &lt;j ) ≥ f ( j | S &lt;j ). To see this observe that for every j ∈ J , e j ⊆ T , which implies that every item j ′ ∈ M that supermodularly depends on j is in T . Therefore, S &lt;j -T contains only items that do not supermodularly depend on j . Consequently, adding any element in S &lt;j -T to T ∩ S &lt;j can only decrease the marginal contribution of j ; that is: $$\forall j ^ { \prime } \in S _ { < j } - T, \ \ f ( j \ | \ T \cap S _ { < j } ) \geq f ( j \ | \ T \cap S _ { < j } + \{ j ^ { \prime } \} ).$$ Repeating the above analysis for every item in S &lt;j -T establishes the desired claim. Combining the above, we get: $$f ( T ) \geq \sum _ { j \in J } f ( j \ | \ T \cap S _ { < j } ) \geq \sum _ { j \in J } f ( j \ | \ S _ { < j } ) = \sum _ { j \in J } w ( e _ { j } ) = g ( T ),$$ as desired. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1211v1-figure-de6c1f3a-5cda-4ae2-9309-f61f7309de08.jpg) ## F Proof of Symmetric Functions Theorem 2.7 Definition F.1 (Symmetric set function) . We say that a set function f : 2 M → R + is symmetric , if there exists a function f ′ : { 0 , . . . , | M |} → R + such that for any S ⊆ M f , ′ ( | S | ) = f ( S ) . For simplicity, we sometimes refer to f itself as a function getting only the cardinality of a subset and not a subset. Observation F.1. The hypergraph representation of any symmetric set function is symmetric, in the sense it has the same value for any hyperedge of a given rank. Lemma F.2 (Canonical PLE for symmetric set functions) . Let f : { 0 , . . . , m } → R + be a monotone symmetric set function of rank r . Then, if f has a positive lower envelope of rank R , it must be that the symmetric set function g f : { 0 , . . . , m } → R + that has hypergraph representation with positive hyperedges of rank R of value ( m R ) f ( m ) and no other (non-zero) hyperedges is a positive lower envelope of f . We refer to g f as the canonical positive lower envelope of rank R of f . Proof. Let M be a ground set and let g : 2 M → R + be a positive lower envelope of f of rank R . We consider G = ( V, E, w ), the hypergraph representation of g . Note that G must have only positive hyperedges, from the definition of positive lower envelope. We cancel the hyperedges of G of size less than R as follows. Let e be an hyperedge of G of size less than R . We arbitrarily introduce a new hyperedge of size R that contains all the vertices of e and has value w e ( ). When having only hyperedges of rank R , we just take their average value and assign it to each possible subset of rank R as its new value. The proof of Lemma F.2 follows by symmetry of f and by uniqueness of g after being modified. Lemma F.3. Let r, R ∈ N . If there exists a monotone symmetric set function f : { 0 , . . . , m } → R + of rank r with no positive lower envelope of rank R , then there exists a monotone symmetric set function f ′ : { 0 , . . . m ′ } → R + of rank r , such that any positive hypergraph set function of rank R that obeys g m ( ′ ) = f ′ ( m ′ ) , must have g m ( ′ -1) &gt; f ′ ( m ′ -1) . Proof. Let f : { 0 , . . . , m } → R + be a monotone symmetric set function of rank r with no positive lower envelope of rank R , such that m is the smallest possible. Let g be the canonical positive lower envelope of rank R of f . Then, there exists R ≤ k ≤ m -1 for which g k ( ) &gt; f k ( ). We claim that since m is the smallest possible, we can just take k = m -1 for f itself. Suppose otherwise that g m ( -1) ≤ f ( m -1), and for some other k &lt; m -1 it holds that g k ( ) &gt; f k ( ). Scale g by multiplying it by f ( m -1) /g m ( -1) and denote it by g ′ . Then, it holds that g ′ ( m -1) = f ( m -1) and g ′ ( k ) &gt; f k ( ). Additionally, g ′ is the canonical positive lower envelope of rank R of f defined on { 0 , . . . , m - } 1 . Therefore, by Lemma F.2, f defined on { 0 , . . . , m - } 1 is also a function of rank r with no positive lower envelope of rank R . Contradiction. The proof of Lemma F.3 follows. Corollary F.4. Let r ≥ 1 . In order to show that any monotone symmetric set function of rank r has a positive lower envelope of rank R , it is sufficient to show that any monotone symmetric set function f : { 0 , . . . , m } → R + of rank r obeys f ( m -1) ≥ m R -m f ( m ) . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1211v1-figure-d200426f-7a0a-49d7-85c3-73caf2f840f4.jpg) Proof. Let f : { 0 , . . . , m } → R + be a monotone symmetric set function of rank r . Let g be the canonical positive lower envelope of rank R of f . Observe that g m ( -1) = ( m -1 R ) f ( m ) ( m R ) = m R -m f ( m ). The proof of Corollary F.4 follows by Lemma F.3. From Corollary F.4 together with Lemma F.2, we have: Corollary F.5. Let r ≥ 1 . Any monotone symmetric set function of rank r has a positive lower envelope of rank R , if and only if any monotone symmetric set function f : { 0 , . . . , m } → R + of rank r obeys f ( m -1) ≥ m R -m f ( m ) . Moreover, if a specific function f : { 0 , . . . , m } → R + does not obey f ( m -1) ≥ m R -m f ( m ) , it has no positive lower envelope of rank R . ## F.1 Upper bound for symmetric hypergraph functions with rank k In this section we prove Theorem 2.7, which asserts that every monotone symmetric set function of rank r (positive and negative) is MPH -(3 r 2 ). We claim that g is a lower envelope for f . 5 There are three conditions to check. Two of them trivially hold, namely, g (0) = f (0) = 0, and g m ( ) = ( m R ) w G ( R ) = f ( m ). The remaining condition requires that g k ( ) ≤ f ( k ) for every 1 ≤ k ≤ m -1. This trivially holds for k &lt; R because in this case g k ( ) = 0, whereas f ( k ) ≥ 0. Hence the main content of our proof is to establish the inequality g k ( ) ≤ f ( k ) for every R ≤ k ≤ m -1. Proof of Theorem 2.7 : The proof is by the positive lower envelope technique (i.e. Proposition 3.1). Let f be a monotone symmetric set function of rank r , and let H be its hypergraph representation. Consider the following monotone symmetric set function g defined by its positive hypergraph representation G = ( V G , E G , w G ) that has hyperedges of rank R = 3 r 2 of value f ( U / ) ( m R ) and no other (non-zero) hyperedges. Suppose for the sake of contradiction that there is some f that serves as a negative example, namely, that for this f there is R ≤ k ≤ m -1 for which g m ( ) &gt; f m ( ). By Corollary F.4 it is sufficient to show that f ( m -1) ≥ m R -m f ( m ), in order to derive a contradiction. We now develop some machinery for this aim. Proposition F.6. There is some polynomial F of degree at most r such that F X ( ) = f ( x ) whenever x ∈ { 0 1 , , . . . , m } . Proof. The polynomial is F x ( ) = ∑ r i =1 ( ) x i h i ( ), where h i ( ) are constants derived from the hypergraph representation H , and ( ) x i is the polynomial 1 i ! x x ( -1) . . . ( x -i + 1). This concludes the proof of Proposition F.6. Given that F x ( ) is a polynomial of degree at most r , we shall use Markov's inequality regarding derivatives of polynomials [25]. Theorem F.7 (Markov [25]) . Let p be a polynomial of degree d and let p ′ denote its derivative. Then $$\max _ { - 1 \leq x \leq 1 } | p ^ { \prime } ( x ) | \leq d ^ { 2 } \max _ { - 1 \leq x \leq 1 } | p ( x ) |$$ By a simple transformation of the range on which the polynomial is defined, Theorem F.7 implies that for our polynomial F x ( ) the following holds: $$\max _ { 0 \leq x \leq m } | F ^ { \prime } ( x ) | \leq \frac { 2 r ^ { 2 } } { m } \max _ { 0 \leq x \leq m } | F ( x ) |$$ Let MAX = max 0 ≤ ≤ x m | F x ( ) | and let 0 ≤ y ≤ m be such that | F y ( ) | = MAX . If y is an integer then monotonicity of f (and hence of F on integer points) implies that MAX = f ( m ). However, y need not be integer. In that case i &lt; y &lt; i + 1 for some 0 ≤ i ≤ m -1. Let max = max {| F i ( ) | , | F i ( +1) |} . Then, $$M A X \leq m a x + \frac { 1 } { 2 } \max _ { i \leq x \leq i + 1 } | F ^ { \prime } ( x ) | \leq f ( m ) + \frac { 1 } { 2 } \max _ { 0 \leq x \leq m } | F ^ { \prime } ( x ) | \leq f ( m ) + \frac { r ^ { 2 } } { m } M A X$$ 5 Proof for any restriction of f to a subset is essentially the same. where the last inequality was derived from inequality (11). As m ≥ R = 3 r 2 , we obtain that MAX ≤ 3 f ( m / ) 2. Now we use inequality (11) to bound f ( m -1) = F m ( -1) from below. $$F ( m - 1 ) \geq f ( m ) - \max _ { 0 \leq x \leq m } F ^ { \prime } ( x ) \geq f ( m ) - \frac { 2 r ^ { 2 } } { m } M A X \geq f ( m ) - \frac { 3 r ^ { 2 } } { m } f ( m )$$ Using R = 3 r 2 we have that f ( m -1) ≥ (1 -R m ) f ( m ) = g m ( -1), as desired. This concludes the proof of Theorem 2.7. ## G Proof of PoA Lower Bound Theorem 2.5 Proof. Consider a projective plane of order k . It has k k ( -1) + 1 items, k k ( -1) + 1 bundles, each bundle contains k items, each item is contained in k bundles, every two bundles intersect in exactly one item (and for every two items there is exactly one bundle that contains them, a fact not needed in the proof). Suppose there are k k ( -1) + 1 players, each desiring a distinct bundle and valuing it at 1. We argue that the following is a mixed Nash equilibrium for simultaneous first price auction. Each player selects at random a value x ∈ [0 , 1 k ] distributed as Pr x [ ≤ t ] = ( kt ) 1 ( k -1) 2 , and bids this value x on each of the items in his bundle. Fix a player i . We show that, given that other players follow the Nash strategy, every value of x gives player i expected utility exactly 0. For every item in player i 's bundle, player i competes with k -1 additional players who play according to the Nash strategy, and therefore wins this item with probability ( kx ) 1 ( k -1) . Thus, player i wins his entire desired bundle (of k items) with probability ( kx ) k ( k -1) ; this is exactly his expected value. The expected number of items player i wins is k · ( kx ) 1 ( k -1) , amounting to an expected payment of ( kx ) k ( k -1) . It follows that the expected utility - the probability of getting the bundle minus the expected payments - is 0, for every value x ∈ [0 , 1 k ], as claimed. It remains to show that whenever a player does not bid exactly the same value on all his items, the expected utility is negative. To see this, fix a player i , two arbitrary items in his bundle, and his bids on the other ( k -2) items in his bundle (not necessarily equal bids). Suppose that all other players bid according to the Nash strategy, and let x and y denote player i 's bids on the two designated items. It suffices to show that x = y in every best response of player i . By the best response condition, the derivative of player i 's expected utility with respect to x equals 0, and the same holds with respect to y . The expected utility can be expressed as follows: $$\alpha x ^ { \frac { 1 } { k - 1 } } y ^ { \frac { 1 } { k - 1 } } - \beta - x ( k x ) ^ { \frac { 1 } { k - 1 } } - y ( k y ) ^ { \frac { 1 } { k - 1 } },$$ where α and β are constants that do not depend on x and y . The derivative of the expected utility with respect to x is $$& \frac { \alpha } { k - 1 } y ^ { \frac { 1 } { k - 1 } } x ^ { \frac { 2 - k } { k - 1 } } - \frac { k } { k - 1 } ( k x ) ^ { \frac { 1 } { k - 1 } }. \\ \text{to $u$ is obtained by swapping $x$ and $u$ in th}$$ /negationslash The derivative with respect to y is obtained by swapping x and y in the last expression. Equating both derivatives to 0 and solving the obtained system of equations gives us x = y for every k = 0, as desired. Given the above, consider k such independent projective planes (hence there are k 2 ( k -1) + k players), each with such a Nash equilibrium. Now add k k ( -1)+1 auxiliary players, where auxiliary player i wants a bundle composed of the i th item of each projective plane. The optimal solution is to give each auxiliary player his desired bundle, giving value k k ( -1) + 1. However, given the equilibrium of the original players, the unique optimal strategy for the auxiliary players is not to bid at all. Indeed, they are faced with strictly more competition than the Nash players, and the Nash players have expected utility of 0. (For concreteness, following the same reasoning as above, a player's best response is to bid equally on all items in his bundle. For any bid x , he derives an expected value of ( kx ) k 2 ( k -1) 2 , which is strictly smaller than his expected payment, being ( kx ) k ( k -1) 2 +1 .) Hence in the Nash solution in each projective plane only one player gets value, giving a total value of k , and the price of anarchy for this example is k k ( -1)+1 k = k -1 + 1 k . ## H Smoothness of the Simultaneous Auction We now prove Theorem 2.4 in its full generality by showing that the simultaneous first price auction is actually a Smooth Mechanism as defined in [31]. This implies an efficiency guarantee that extends to Bayes-Nash equilibria as well as to no-regret learning outcomes. For completeness we first present the definition and the main implication of smooth mechanisms. Definition H.1 ([31]) . A mechanism M is ( λ, µ ) -smooth if for any valuation profile v there exists an action profile a ∗ i ( v ) such that for all a ∈ A : $$\sum _ { i } u _ { i } ( a _ { i } ^ { * } ( v ), a _ { - i } ; v _ { i } ) \geq \lambda O P T ( v ) - \mu \sum _ { i } P _ { i } ( a )$$ Theorem H.1 ([31]) . If a mechanism is ( λ, µ ) -smooth then the Bayes-Nash and the correlated price of anarchy is at most µ/λ . We will analyze a generic simultaneous single-item auction where each item j is sold via an auction with some allocation and payment rule (i.e., not necessarily the first-price auction). We will show that if each individual single-item auction is a ( λ, µ )-smooth mechanism and bidders have MPH -k valuations then the simultaneous single-item auction is (1 -k +min { λ, 1 } · k, µ )-smooth. We can then invoke known results about the smoothness of the first-price auction to complete the proof of Theorem 2.4. Theorem H.2. The game defined by running m simultaneous ( λ, µ ) -smooth single-item auctions is (1 -k +min { λ, 1 } · k, µ ) -smooth, when players have MPH -k valuations. Proof. We will first show that if we prove smoothness of the simultaneous auction for hypergraphk valuations then this immediately implies smoothness for MPH -k valuations (Lemma H.3). We will then complete the proof of Theorem H.2 by proving smoothness for the class of hypergraphk valuations. Lemma H.3. If a simultaneous single-item auction game is ( λ, µ ) -smooth for PH -k valuations then it is also ( λ, µ ) -smooth for the class of MPH -k valuations. Proof. Consider a valuation profile v . Let X ∗ ( v ) be the optimal allocation for valuation profile v , so that X ∗ i ( v ) is the allocation to player i in this optimal allocation. Since v i is MPH -k , we have v i ( X ∗ i ( v )) = max /lscript ∈L v /lscript i ( X ∗ i ( v )). Choose v ∗ i ∈ arg max /lscript ∈L v /lscript i ( X ∗ i ( v )), so v ∗ i is the additive valuation supporting player i 's value for set X ∗ i ( v ). Then, by definition, v i ( X ∗ i ( v )) = v ∗ i ( X ∗ i ( v )) and for any set T ⊆ [ m ], v i ( T ) ≥ v ∗ i ( T ). Observe that a player's utility under valuation v i is at least as much as his utility under v ∗ i : u i ( a v ; i ) ≥ u i ( a v ; ∗ i ). Now consider the smoothness deviations a ∗ i ( v ∗ ) that correspond to valuation profile v ∗ = ( v , . . . , v ∗ 1 ∗ n ), which exist by the assumption that the mechanism is smooth for hypergraphk valuations. Then we get that for any action profile: $$\sum _ { i } u _ { i } ( a _ { i } ^ { * } ( \nu ^ { * } ), a _ { - i } ; v _ { i } ) & \geq \sum _ { i } u _ { i } ( a _ { i } ^ { * } ( \nu ^ { * } ), a _ { - i } ; v _ { i } ^ { * } ) \geq \lambda O P T ( \nu ^ { * } ) - \mu \sum _ { i } P _ { i } ( a ) \\ & \geq \lambda S W ( X ^ { * } ( \nu ) ; \nu ^ { * } ) - \mu \sum _ { i } P _ { i } ( a ) = \lambda O P T ( \nu ) - \mu \sum _ { i } P _ { i } ( a ).$$ We will now move on to proving smoothness for the class of PH -k valuations. Consider a PH -k valuation profile v and for each valuation v i : 2 M → R + , let w i : 2 M → R + be its positive hypergraphk representation. Also let X ∗ i be the optimal set of items for each player i . Consider an action profile a = ( a j ) j ∈ [ m ] on each auction j and each player deviating to some strategy ˜ a i = ( ˜ a j i ) j ∈ [ m ] . Denote with Pr( S, a ) the probability of winning set S under a randomized action profile a . Also we denote with S | k the collection of subsets of a set S of size at most k . Then by analyzing the utility of the player and applying the union bound in a generic way, we get $$\text{profile a. Also we denote with $S|_{k}$ the collection of subsets of a set $S$ of size at most $k$. Then by} \\ \text{analyzing the utility of the player and applying the union bound in a generic way, we get} \\ \text{$u_{i}(\hat{$i}_{a}_{-i}) = \sum _ { S \in M | _ { k } } w_{i}(S) \cdot P r(S,(\hat{$i}_{a}_{i} a_{-i}) - \sum _ { j \in M } P _ { i } ^ { j } ( \hat{$a _ { i } ^ { j }, a _ { - i } ) } \\ \geq \sum _ { S \in X _ { i } ^ { \prime } | _ { k } } w_{i}(S) \cdot P r(S, ( \hat{$i}_{a}_{i} a_{-i}) ) - \sum _ { j \in M } P _ { i } ^ { j } ( \hat{$a _ { i } ^ { j }, a _ { - i } ^ { j } ) } \\ \geq \sum _ { S \in X _ { i } ^ { \prime } | _ { k } } w_{i}(S) \cdot \left ( 1 - \sum _ { j \in S } ( 1 - P r ( \{ j \}, ( \hat{$i }_{a}_{-i} a_{-i}) ) \right ) - \sum _ { j \in M } P _ { i } ^ { j } ( \hat{$a _ { i } ^ { j }, a _ { - i } ^ { j } ) } \\ \geq \sum _ { S \in X _ { i } ^ { \prime } | _ { k } } w_{i}(S) \cdot ( 1 - | S | ) + \sum _ { S \in X _ { i } ^ { \prime } | _ { k } } w_{i}(S) \sum _ { j \in S } P r ( \{ j \}, ( \hat{$i }_{a}_{i} a_{-i}) ) - \sum _ { j \in M } P _ { i } ^ { j } ( \hat{$a _ { i } ^ { j }, a _ { - i } ^ { j } ) } \\ \geq \sum _ { S \in X _ { i } ^ { \prime } | _ { k } } w_{i}(S) \cdot ( 1 - | S | ) + \sum _ { j \in M } \left \{ \left ( \sum _ { S \in X _ { i } ^ { \prime } | _ { k } \cdot S \ni j } w_{i}(S) \cdot 1 _ { j \in X _ { i } ^ { \prime } } \right ) \cdot P r \left \{ \{ j \}, ( \hat{$i }_{a}_{i} a _ { - i } ^ { \prime } ) \right ) - P _ { i } ^ { j } ( \hat{$a _ { i } ^ { j }, a _ { - i } ^ { j } ) } \right \} \\ \text{Consider the second command in the above expression. For each $j$, this corresponds to the} \\ \text{utility of player $i$ under a deviation to action $\hat{$a _ { i } ^ { \prime }$, of a single-item auction, in which only player $i$} \\ \text{has a value of $\sum_{s\in X _ { i } ^ { \prime } | _ { k } \cdot S \neq j } w_{s}$ for the auction and everyone else has a value of $0$. Summing up over}$$ Consider the second summand in the above expression. For each j , this corresponds to the utility of player i under a deviation to action ˜ , of a single-item auction, in which only player a j i i has a value of ∑ s ∈ X ∗ i | k : s /owner j w s for the auction and everyone else has a value of 0. Summing up over all players, this is a sum of deviating utilities for each player, over multiple single-item auctions: $$\sum _ { j \in M } \sum _ { i \in P } \left \{ \left ( \sum _ { S \in X _ { i } ^ { * } | _ { k } \colon S \ni j } w _ { i } ( S ) \cdot 1 _ { j \in X _ { i } ^ { * } } \right ) \cdot \Pr \left ( \{ j \}, ( \tilde { a } _ { i } ^ { j }, a _ { - i } ^ { j } ) \right ) - P _ { i } ^ { j } ( \tilde { a } _ { i } ^ { j }, a _ { - i } ^ { j } ) \right \}. \\ \text{ Thus, if we set } \tilde { a } ^ { j } \, \text{ equal to the smoothness deviation for the above valuation profile, we get that}$$ Thus, if we set ˜ a j equal to the smoothness deviation for the above valuation profile, we get that the latter expression is at least $$\sum _ { j \in M } \left \{ \lambda \cdot \sum _ { i \in P } \left ( \sum _ { S \in X _ { i } ^ { * } | _ { k } \colon S \ni j } w _ { i } ( S ) \cdot 1 _ { j \in X _ { i } ^ { * } } \right ) - \mu \sum _ { i \in P } P _ { i } ^ { j } ( a ^ { j } ) \right \} = \lambda \sum _ { i \in P } \sum _ { S \in X _ { i } ^ { * } | _ { k } } w _ { i } ( S ) \cdot | S | - \mu \sum _ { i \in P } P _ { i } ( a ). \\ \sigma ^ { * }$$ $$\cdot$$ Combining the above we get: $$\sum _ { i \in P } u _ { i } ( \tilde { a } _ { i }, a _ { - i } ) & \geq \sum _ { i \in P } \sum _ { S \in X _ { i } ^ { * } | _ { k } } w _ { i } ( S ) \cdot ( 1 - | S | ) + \lambda \sum _ { i \in P } \sum _ { S \in X _ { i } ^ { * } | _ { k } } w _ { i } ( S ) \cdot | S | - \mu \sum _ { i \in P } P _ { i } ( a ) \\ & = \sum _ { i \in P } \sum _ { S \in X _ { i } ^ { * } | _ { k } } w _ { i } ( S ) \cdot ( 1 - ( 1 - \lambda ) | S | ) - \mu \sum _ { i \in P } P _ { i } ( a ).$$ If λ &lt; 1 then we use the fact that | S | ≤ k to get the (1 -k + λk, µ )-smoothness property, otherwise we can simply ignore the term (1 -λ ) | S | and get the (1 , µ )-smoothness property, completing the proof of Theorem H.2. We now show how to use Theorem H.2 to prove Theorem 2.4. For the case in which each singleitem auction is a first price auction then we know by [31] that each auction is ( β · (1 -e -1 /β ) , β )-smooth for any β . Thus we get that for any β the simultaneous first price auction with MPH -k valuations is (1 -(1 -β · (1 -e -1 /β )) · k, β )-smooth. Substituting β = log( k k -1 ), we get a bound of 1 1 -( k -1) log( k k -1 ) ≤ k (2 -e -k ) on the price of anarchy, as desired. This establishes the proof of Theorem 2.4. ## I Composition of General Mechanisms Our analysis can be extended beyond simultaneous single-item auctions to the simultaneous composition of general mechanisms, such as position auctions. We consider the mechanism defined by running m different mechanisms simultaneously. Each mechanism M j has its own feasible set of allocations X j ⊆ X j 1 × . . . ×X j n , action spaces A j , allocation function X j : A → X j j and payment function P j : A → j R n + . Each player i has a valuation over allocations in different mechanisms, given by v i : X 1 i × . . . ×X m i → R + . We consider the natural generalization of MPH -k valuations: Definition I.1. A valuation is MPH -k across mechanisms if for any x i ∈ X 1 i × . . . ×X m i $$v _ { i } ( x _ { i } ^ { 1 }, \dots, x _ { i } ^ { m } ) = \max _ { \ell \in \mathcal { L } _ { i } } \sum _ { e \in E _ { \ell } } v _ { i } ^ { e, \ell } ( x _ { i } ^ { e } ) \\.$$ where L i is some arbitrary index set, E /lscript ⊆ { S ⊆ M : | S | ≤ k } , x e i = ( x j i ) j ∈ e is the vector of outcomes on the mechanisms in the set e and for all e ∈ E /lscript , v e,/lscript i ( x e i ) ≥ 0 . We show that if each allocation space X j i is partially ordered and the value functions v e,/lscript i ( x e i ) are monotone coordinate-wise with respect to this partial order, then if each mechanism is ( λ, µ )-smooth for the class of monotone valuations then this implies that the simultaneous composition is (1 -k +min { λ, 1 } · k, µ )-smooth. Theorem I.1. Consider the simultaneous composition of m mechanisms each being ( λ, µ ) -smooth for any monotone valuation with respect to some partial order of the allocation space. If players have MPH -k valuations across mechanisms such that v e,/lscript i ( ) · are monotone coordinate-wise with respect to each partial order, then the composition is (1 -k +min { λ, 1 } · k, µ ) -smooth Proof. For simplicity we will consider a PH -k valuation profile v across mechanisms, i.e. for each player i we have: $$v _ { i } ( x ) = \sum _ { e \in E _ { i } } v _ { i } ^ { e } ( x _ { i } ^ { e } ),$$ where E i ⊆ { S ⊆ M : | S | ≤ k } and x e i = ( x j i ) j ∈ e . Let ˜ x i = (˜ ) x j i j ∈ [ m ] be the optimal allocation of each player i . Consider an action profile a = ( a j ) j ∈ M on each auction j and each player deviating to some strategy ˜ a i = ( ˜ a j i ) j ∈ [ m ] . Then following an analysis similar to the proof of Theorem H.2 we can obtain the following lower bound a player's utility from the deviation: $$& \text{following an analysis similar to the proof of $I$ theorem $H.2$ we can obtain the following lower bound} \\ & \text{a player's utility from the deviation:} \\ & \text{$u_{i}(\tilde{a}_{i}, a_{-i}) = \sum_{\epsilonE_{i}},\sum_{\nu_{i}^{\epsilon}(x_{i}^{ep})\cdotPr(X_{i}^{ep}(\tilde{a}_{i}, a_{-i}))=x_{i}^{ep})-\sum_{j\inM}P_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i})$} \\ & \quad \geq \sum_{\epsilonE_{i}},\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\cdotPr(X_{i}^{ep}(\tilde{a}_{i}, a_{-i})\suc_{x_{i}^{ep})-\sum_{j\inM}P_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i})$} \\ & \quad \geq \sum_{\epsilonE_{i}},\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\cdot\left(1-\sum_{j\epsilon} \left(1-Pr\left(X_{i}^{j}(\tilde{a}_{i}, a_{-i}) \suc_{x_{i}^{ep})\right) \right) -\sum_{j\inM}P_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i})$} \\ & \quad = \sum_{\epsilonE_{i}},\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\cdot(1-|e|) + \sum_{\epsilonE_{i}},\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\sum_{j\epsilon}Pr\left(X_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i}) \suc_{x_{i}^{ep})-\sum_{j\inM}P_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i})$} \\ & \quad = \sum_{\epsilonE_{i}},\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\cdot(1-|e|) + \sum_{j\inM} \left(\sum_{\epsilon}\nu_{i}^{ep}(\tilde{x}_{i}^{ep})\right) \cdotPr\left(X_{i}^{j}(\tilde{a}_{i}, a_{-i}) \suc_{x_{i}^{ep})-P_{i}^{j}(\tilde{a}_{i}^{j}, a_{-i})$} \right \right \}. \\ & \text{Summing up over all players we observe that the second command in the above expression will} \\ & \text{correspond to deviating utilities of individual single-item auctions, where each player unilaterally} \\ & \text{diviates to $\tilde{a}_{i}^{j}$ and in which every player has a valuation of $\sum_{e\epsilonj}^{\epsilonj}^{\epsilonj}(\tilde{x}_{i}^{ep})$ for getting any allocation}$$ Summing up over all players we observe that the second summand in the above expression will correspond to deviating utilities of individual single-item auctions, where each player unilaterally deviates to ˜ a j i and in which every player has a valuation of ∑ e /owner j v e i (˜ ) for getting any allocation x e i x j i /followsequal ˜ x j i and 0 otherwise. The latter is a monotone valuation and hence we can set the local deviating utilities at each mechanism to the smoothness deviations for the latter monotone valuation profiles and get: $$\sum _ { i } u _ { i } ( \tilde { a } _ { i }, a _ { - i } ) & \geq \sum _ { i } \sum _ { e \in E _ { i } } v _ { i } ^ { e } ( \tilde { x } _ { i } ^ { e } ) ( 1 - | e | ) + \lambda \sum _ { i } \sum _ { e \in E _ { i } } v _ { i } ^ { e } ( \tilde { x } _ { i } ^ { e } ) \cdot | e | - \mu \sum _ { i } P _ { i } ( a ) \\ & = \sum _ { i } \sum _ { e \in E _ { i } } v _ { i } ^ { e } ( \tilde { x } _ { i } ^ { e } ) \cdot ( 1 - ( 1 - \lambda ) | e | ) - \mu \sum _ { i } P _ { i } ( a ).$$ The remainder of the proof precisely follows the proof of Theorem H.2. Example: position auctions. An example of such a composition of mechanisms is the composition of m position auctions. Suppose that each position auction is a first price pay-per-impression auction. Syrgkanis and Tardos [31] showed that such a mechanism is (1 / , 2 1)-smooth. We extend this analysis to show that it is (1 -1 2 β , β )-smooth for any β ≥ 1. Lemma I.2. The first-price pay-per-impression position auction is a (1 -1 2 β , β ) -smooth mechanism for any β ≥ 1 . Proof. Consider a bid profile b and let j ∗ i be the optimal position of player i and let π j ( ) be the player that gets slot j under bid profile b . Suppose that each player deviates to bidding a random bid b ′ i , uniformly in [0 , v ij ∗ i β ] and let f ( ) t denote the density function of the random bid. If the random bid t of a player is b π j ( ∗ i ) &lt; t then player i wins his optimal slot or a higher slot and hence his value is at least v ij ∗ i by monotonicity of the valuation. Thus a player's utility from this deviation is at least: $$u _ { i } ( b _ { i } ^ { \prime }, b _ { - i } ) \geq \int _ { b _ { \pi ( j _ { i } ^ { \ast } ) } ^ { \frac { v _ { i j _ { i } ^ { \ast } } } { \beta } } } ^ { \frac { v _ { i j _ { i } ^ { \ast } } } { \beta } } v _ { i j _ { i } ^ { \ast } } f ( t ) d t - \frac { v _ { i j _ { i } ^ { \ast } } } { 2 \beta } = \int _ { b _ { \pi ( j _ { i } ^ { \ast } ) } ^ { \frac { v _ { i j _ { i } ^ { \ast } } } { \beta } } } ^ { \frac { v _ { i j _ { i } ^ { \ast } } } { \beta } } \beta \cdot d t - \frac { v _ { i j _ { i } ^ { \ast } } } { 2 \beta } = \left ( 1 - \frac { 1 } { 2 \beta } \right ) v _ { i j _ { i } ^ { \ast } } - \beta \cdot b _ { \pi ( j _ { i } ^ { \ast } ) }$$ Summing over all players we get the (1 -1 2 β , β )-smoothness property. Combined with Theorem I.1, we get that for any MPH -k valuation across position auctions the simultaneous position auction mechanism is (1 -k 2 β , β )-smooth, yielding a price of anarchy bound of 2 k for β = k . ## J Non-Monotone Valuations As we saw in Section 3, positive lower envelopes are a useful tool for showing that a monotone function admits a MPH -k representation. Observe that while MPH -k contains only monotone functions, even a non-monotone function can admit a positive lower envelope for any restriction to a subset. This observation motivates the following hierarchy of (not necessarily monotone) set functions. Definition J.1 (Positive Lower Envelope k ( PLE -k ) class) . Let f : 2 M → R + be a set function. f is in PLE -k if any restriction of it to a subset of its ground set admits a positive lower envelope of rank k . While monotonicity is a very natural assumption in the context of combinatorial auctions, hierarchies of non-monotone functions can have potential applications in more general contexts such as set function minimization and maximization. In Propositions 3.1 and 3.1 we showed that PLE -k is equivalent to MPH -k for monotone functions. Thus MPH -k is exactly the monotone part of the PLE -k class. Moreover, we point out that both our algorithmic approximation result (Theorem 2.3) and our price of anarchy result (Theorem 2.4) apply more generally to the class of PLE -k functions, and in particular do not require monotonicity (assuming that players are able to drop out of an auction and receive no items). With respect to expressiveness, exploring the expressive power of the PLE hierarchy is an interesting space for future research. In particular, one might explore the connection between PLE -k and the class of functions with a given positive and/or negative hypergraph rank. To this end, we show some results on this connection. We first observe that a strong positive result similar to Theorem 2.7, cannot possibly hold for non-monotone non-symmetric set functions. That is, for any constant k , there exist a non-negative set function of rank 2 that is not PLE -k . This is not the case for non-negative functions with positive rank 1 and arbitrary negative rank, which can be shown to be in PLE -1. Theorem J.1. Let k ∈ N . There exists a non-negative set function f k : 2 M → R + of rank 2 that has no positive lower envelope of rank k . Proof. Given k , we have the following hypergraph representing f k . We set some m ≥ k +3 to be the number of items in the ground set M of f . We set a special item j ∈ M . Let v j be its corresponding vertex in the hypergraph representation. We set the value of the singleton hyperedge v j to be ( k +1 2 ) and the value of any other singleton hyperedge to be 0. We set the value of any rank 2 edge to be 1 if it does not contain v j and -k otherwise. There are no other hyperegdes, so the set function represented by this representation is indeed of rank 2. We show that f k is non-negative. It is trivial that the value of any subset of items not containing j is non-negative. Let S be a subset of items such that j ∈ S and let l = | S | -1. Then, f k ( S ) = ( ) l 2 -lk + ( k +1 2 ) . Clearly, for l = k and for l = k +1, it equals 0, and for any other integer it is strictly greater than 0. Therefore, f k is indeed non-negative and it has value 0 for any subset containing j and exactly other k (or k +1) distinct items. Assume towards a contradiction that f k has a positive lower envelope of rank k . Let g k be such a positive lower envelope. Then, g k must be monotone, since its hypergraph representation contains only hyperedges of non-negative value. Therefore, it has value 0 for any subset of up to size k + 1, since any such subset is either of value 0 by f k (in case it contains j ) or contained in a subset of value 0 by f k (in case it does not contain j ). Therefore and since the rank of g k is assumed to be at most k , any hyperedge in its hypergraph representation must be of value 0. But, since m ≥ k +3, we have f k ( M &gt; ) 0. contradiction. Therefore, f k does not have any positive lower envelope of rank up to k , as desired. Moreover, the proof of Theorem E.2 extends to non-negative functions in PLE -k . That is, any non-negative function with positive rank k and arbitrary negative rank is in PLE -k , if negative hyperedges are laminar. Theorem J.2. There is a positive lower envelope of rank 1 for any non-negative set function of positive rank 1. Proof. Let f : 2 M → R + be a non-negative set function of positive rank 1 and let E be the largest value dividing all images of f . We refer to each value E as 'unit of value'. Let G f be the hypergraph representation of f . We show how to discard all the negative hyperedges of G f . We build the following bipartite graph H V,W,E ( ). For each unit of value of every vertex of G f , we have a vertex in V . For each unit of value of every negative hyperedge, we have a vertex in W . For simplicity, we refer sometimes to vertices in H as units of value. Let v ∈ V and w ∈ W . We have an edge ( v, w ) if and only if the hyperedge in G f that corresponds to the unit of value of w contains the vertex that corresponds to the unit of value of v . We show that there exists a matching in H that saturates W . Such a matching will enable us to remove all the negative hyperedges of G f by reducing also the value of vertices of G f that their corresponding vertices participate in the matching in H . Assume towards a contradiction that there is no matching in H that saturates W . Then, by Hall's theorem, there exists W ′ ⊆ W such that | W ′ | &gt; N | H ( W ′ ) , | where N H ( W ′ ) are the neighbours of W ′ in H . Note that by definition of H N , H ( W ′ ) contains either zero or all units of value of any single vertex of G f . Therefore, we can add to W ′ all units of value of any hyperedge of H that at least one unit of value of it is already containted in W ′ , without increasing | N H ( W ′ ) . | Let W ′′ be the resulting subset. Clearly, | W ′′ | &gt; N | H ( W ′′ ) . | Moreover W ′′ contains for any vertex of G f either zero or all units of values of it. Additionally, as before, N H ( W ′′ ) contains for any hyperedge of G f either zero or all units of values of it. Therefore, for the set S ⊆ M that contains exactly the items that corresponds to the vertices of G f contained in hyperedges corresponding to the vertices of W ′′ , it must be that f ( S ) &lt; 0. 6 Contradiction. Therefore, there is a matching saturating W in H . Note that if we discard all the negative hyperedges and also decrease the value of each of the vertices according to the number of units of value of it participating in the matching, we will never increase the value of any subset of M by f . Moreover, we will not change f ( M ). Therefore, we can discard all the negative hyperedges and then return as a hypergraph representation of a positive 6 Note that all the positive hyperedges induced by S are indeed represented appropriately in the matching, since we have positive rank 1. If we had positive rank strictly greater than 1, it might have been that a positive hyperedge will be induced by S and not by the matching. This would have happened if e.g. part of its vertices were contained in one negative hyperedge participating in the matching and all the rest in another, but there was no single negative hyperedge containing all its vertices. lower envelope of f all the positive vertices that survived, with the value of them that survived. This concludes the proof of Theorem J.2. ## K Tight bounds for symmetric set functions with ranks 3 and 4 ## K.1 Any monotone symmetric set function of rank 3 is MPH -4 We show the following theorem and then show its tightness. Theorem K.1. Let f : 2 M → R + be a monotone symmetric set function of rank 3. Then, there exists a positive lower envelope of f of rank 4 for any restriction of it to a subset of M . That is, any monotone symmetric set function of rank 3 is in MPH -4. Proof. For simplicity of presentation, we prove Theorem K.1 only for f itself, and not for any restriction of it to a subset. The proof for any restriction is essentially the same. Let m = | M | . Assume towards a contradiction that there is a monotone symmetric set function f of rank 3 with no positive lower envelope of rank 4. We scale f to have f ( m ) = m . Then, by Corollary F.4, we may assume without loss of generality that f ( m -1) &lt; m -4. We consider the following linear program. $$\text{Linear Program K.1.} \\ \text{Minimize} \, \binom { m - 1 } { 1 } x _ { 1 } + \binom { m - 1 } { 2 } x _ { 2 } + \binom { m - 1 } { 3 } x _ { 3 } \\ \text{subject to:}$$ $$3$$ $$& M o n o t o n i c i t y \colon \, \forall _ { t \in \{ 0, 1, \dots m - 1 \} } \colon x _ { 1 } + \binom { t } { 1 } x _ { 2 } + \binom { t } { 2 } x _ { 3 } \geq 0. \\ & S c a l i n a \colon \, m x \colon + \binom { m } { x _ { 0 } } + \binom { m } { x _ { 0 } } x _ { 0 } = m.$$ Let f ∗ be an optimum of Linear Program K.1. Then, it must be that f ∗ ( m -1) &lt; n -4. We consider the dual of Linear Program K.1: $$S c a l i n g \colon m x _ { 1 } + \binom { m } { 2 } x _ { 2 } + \binom { m } { 3 } x _ { 3 } = m \\ \text{Let. } f ^ { * } \text{ be an continuum of Linear Proors}$$ ## Linear Program K.2. Maximize n · z Subject to: - 1. ∑ m -1 t =0 y t + ( m 1 ) z = ( m -1 1 ) - 3. ∑ m -1 t =0 ( ) t 2 y t + ( m 3 ) z = ( m -1 3 ) - 2. ∑ m -1 t =0 ( ) t 1 y t + ( m 2 ) z = ( m -1 2 ) - 4. ∀ t y t ≥ 0 Since f ∗ ( m -1) &lt; m -4 and from duality theorem, it must be that any feasible solution of Linear Program K.2 is of value strictly less that m -4. We show a feasible solution to Linear Program K.2 of value m -4 and derive a contradiction. Specifically, we prove that for any m&gt; 3, there is a feasible solution for Linear Program K.2 with z = m -4 m . That is, we show that the following equation system has a solution with non-negative variables y t for t ∈ { 0 , . . . , m - } 1 , for any m : $$\begin{cases} \sum _ { t = 0 } ^ { m - 1 } y _ { t } = 3 \\ \sum _ { t = 0 } ^ { m - 1 } t \cdot y _ { t } = m - 1 \\ \sum _ { t = 0 } ^ { m - 1 } \binom { t } { 2 } y _ { t } + \binom { m } { 3 } z = \binom { m - 1 } { 3 } \\ \end{cases}$$ We consider the following separate cases with solutions concluded with the aid of a computer 7 to solve Linear Program K.2 for various values of m : m mod 3 = 1: The solution we consider is the following: We need to show that: $$y _ { t } = \begin{cases} \frac { 2 ( m - 1 ) } { m + 2 } & t = \frac { m - 4 } { 3 } \\ 1 & t = \frac { m - 1 } { 3 } \\ \frac { 6 } { m + 2 } & t = 2 \frac { m - 1 } { 3 } \\ 0 & \text{otherwise} \end{cases} \\ \begin{matrix} \cdot \end{matrix}$$ $$\begin{cases} y _ { \frac { m - 4 } { 3 } } + y _ { \frac { m - 1 } { 3 } } + y _ { 2 \frac { m - 1 } { 3 } } = 3 \\ \frac { m - 4 } { 3 } y _ { \frac { m - 4 } { 3 } } + \frac { m - 1 } { 3 } y _ { \frac { m - 1 } { 3 } } + 2 \frac { m - 1 } { 3 } y _ { 2 \frac { m - 1 } { 3 } } = m - 1 \\ \frac { ( m - 4 ) ( m - 7 ) } { 1 8 } y _ { \frac { m - 4 } { 3 } } + \frac { ( m - 1 ) ( m - 4 ) } { 1 8 } y _ { \frac { m - 1 } { 3 } } + \frac { ( 2 m - 2 ) ( 2 m - 5 ) } { 1 8 } y _ { 2 \frac { m - 1 } { 3 } } = \frac { ( m - 1 ) ( m - 2 ) } { 6 } \end{cases} \\ \text{When substituting the rest of our considered solution, we get the following: For the first equatic} \\ \text{$w_coef_{\frac{m-2+6}_{\perp 1}=2$ which is observation} \end{cases}$$ For the second one we get When substituting the rest of our considered solution, we get the following: For the first equation we get 2 m -2+6 m +2 +1 = 3, which is obviously true. $$\frac { 2 ( m - 1 ) ( m - 4 ) } { 3 ( m + 2 ) } + \frac { m - 1 } { 3 } + \frac { 1 2 ( m - 1 ) } { 3 ( m + 2 ) } = m - 1 \.$$ By multiplying both sides by 3( m +2) ( / m -1) we get 2( m -4) + m +2+12 = 3 m +6, which is obviously true. For the third one we get $$\frac { 2 ( m - 1 ) ( m - 4 ) ( m - 7 ) } { 1 8 ( m + 2 ) } + \frac { ( m - 1 ) ( m - 4 ) } { 1 8 } + \frac { 6 ( 2 m - 2 ) ( 2 m - 5 ) } { 1 8 ( m + 2 ) } = \frac { ( m - 1 ) ( m - 2 ) } { 6 } \.$$ By multiplying both sides by 18( m +2) ( / m -1), we get 2( m -4)( m -7)+( m -4)( m +2)+12(2 m -5) = 3( m +2)( m -2), which is true by simple calculations. n mod 3 = 2: The solution we consider is the following: $$y _ { t } = \begin{cases} 1 & t = \frac { m - 5 } { 3 } \\ \frac { 2 ( m - 5 ) } { m - 2 } & t = \frac { m - 2 } { 3 } \\ \frac { 6 } { m - 2 } & t = 2 \frac { m - 2 } { 3 } \\ 0 & \text{otherwise} \end{cases}$$ Correctness follows by substitution at Equation System (15) and simple calculations. m mod 3 = 0: The solution we consider is the following: $$y _ { t } = \begin{cases} \frac { 3 m - 2 3 } { m - 3 } & t = \frac { m - 3 } { 3 } \\ \frac { 8 } { m } & t = \frac { m - 6 } { 3 } \\ \frac { 6 ( m + 4 ) } { m ( m - 3 ) } & t = 2 \frac { m - 3 } { 3 } \\ 0 & \text{otherwise} \end{cases}$$ 7 We used Microsoft .NET together with Gurobi ([17]) and IBM CPLEX and also Wolfram Mathematica. Correctness follows by substitution at Equation System (15) and simple calculations. This concludes the proof of Theorem K.1. Theorem K.1 is tight by the following theorem. Theorem K.2. There exists a monotone symmetric set function of rank 3 that has no positive lower envelope of rank 3. Proof. Let f : { 0 , . . . , m } → R + be a set function with the following hypergraph representation. Hyperedges of rank 1 have value 1; Hyperedges of rank 2 have value -1; Hyperedges of rank 3 have value 1; That is, f ( x ) = x -( ) x 2 + ( ) x 3 . It is clear this function is symmetric and that it has rank 3. We show monotonicity. From simple calculations, f (1) = f (2) = f (3) = 1. The marginal value for adding the x th item to at least 2 items is: $$f ( x ) - f ( x - 1 ) = 1 - ( x - 1 ) + \binom { x - 1 } { 2 } = \binom { x - 1 } { 2 } - x + 2 = \frac { 1 } { 2 } ( x - 1 ) ( x - 2 ) - x + 2 = \frac { 1 } { 2 } x ^ { 2 } - 2 \frac { 1 } { 2 } x + 3 \,.$$ This is greater than 0 for any x &gt; 3, as desired. We show inexistence of positive lower envelope of rank 3. By Corollary F.5 it is sufficient to show that f ( m -1) &lt; m -3 m f ( m ). We show it is true for n = 6: $$f ( m ) = f ( 6 ) = 6 - \binom { 6 } { 2 } + \binom { 6 } { 3 } = 1 1 \.$$ $$f ( m - 1 ) = f ( 5 ) = 5 - \binom { 5 } { 2 } + \binom { 5 } { 3 } = 5 \.$$ Therefore, $$\frac { m - 3 } { m } f ( m ) = \frac { 1 } { 2 } \cdot 1 1 = 5. 5 > 5 = f ( m - 1 )$$ as desired. This concludes the proof of Theorem K.2. ## K.2 Any monotone symmetric set function of rank 4 is MPH -6 We show the following theorem and then show its tightness. Theorem K.3. Let f : 2 M → R + be a monotone symmetric set function of rank 4. Then, there exists a positive lower envelope of f of rank 6 for any restriction of it to a subset of M . That is, any monotone symmetric set function of rank 4 is in MPH -6. Proof. For simplicity of presentation, we prove Theorem K.3 only for f itself, and not for any restriction of it to a subset. The proof for any restriction is essentially the same. Let m = | M | . Assume towards a contradiction that there is a monotone symmetric set function f of rank 4 with no positive lower envelope of rank 6. We scale f to have f ( m ) = m . Then, by Corollary F.4, we may assume without loss of generality that f ( m -1) &lt; m -6. We consider the following linear program (similarly to the case of rank 3). ## Linear Program K.3. Minimize m - 1 m 1 x 1 + - 2 x 2 + m - 3 x 3 + m - 4 x 4 Subject to: ( ) ( ) ( ) ( ) $$M o n o t o n i c i t y \colon \forall _ { t \in \{ 0, 1, \dots m - 1 \} } \colon x _ { 1 } + \binom { t } { 1 } x _ { 2 } + \binom { t } { 2 } x _ { 3 } + \binom { t } { 3 } x _ { 4 } \geq 0.$$ 1 1 1 $$S c a l i n g \colon \, & m x _ { 1 } + \binom { m } { 2 } x _ { 2 } + \binom { m } { 3 } x _ { 3 } + \binom { m } { 4 } x _ { 4 } = m \\ & \text{Let $f^{*}$ be an continuum of Linear Program $K.3$. $T$}$$ Let f ∗ be an optimum of Linear Program K.3. Then, it must be that f ∗ ( m -1) &lt; m -6. We consider the dual of Linear Program K.3: ## Linear Program K.4. Maximize m z · ## Subject to: - 1. ∑ m -1 t =0 y t + ( m 1 ) z = ( m -1 1 ) - 3. ∑ m -1 t =0 ( ) t 2 y t + ( m 3 ) z = ( m -1 3 ) - 2. ∑ m -1 t =0 ( ) t 1 y t + ( m 2 ) z = ( m -1 2 ) - 4. ∑ m -1 t =0 ( ) t 3 y t + ( m 4 ) z = ( m -1 4 ) - 5. ∀ t y t ≥ 0 Since f ∗ ( m -1) &lt; n -6 and from duality theorem, it must be that any feasible solution of Linear Program K.2 is of value strictly less that m -4. We show a feasible solution to Linear Program K.2 of value m -6 and derive a contradiction. Specifically, we prove that for any n &gt; 4, there is a feasible solution for Linear Program K.4 with z &gt; m -68 m . We consider separately even and odd values of m , with solutions concluded with the aid of a computer 9 to solve Linear Program K.2 for various values of m : ## n is even: $$z = \frac { m - 1 - \sum _ { t } y _ { t } } { m } = \frac { m - 4 } { m + 2 }$$ $$y _ { t } = \begin{cases} 1 & t = 0 \\ \frac { 2 m - 2 } { m + 2 } & t = \frac { m } { 2 } - 1 \\ \frac { 2 m - 2 } { m + 2 } & t = \frac { m } { 2 } \\ 0 & \text{otherwise} \end{cases} \\ z = \frac { m - 1 - \sum _ { t } y _ { t } } { m } = \frac { m - 4 } { m + 2 }$$ We show that for any even m this solution is feasible and that z &gt; m -6 m . We start with showing feasibility. For the first equation ∑ m -1 t =0 y t + ( m 1 ) z = ( m -1 1 ) it is trivial it is satisfied, by the value chosen for z . For the second equation ∑ m -1 t =0 ( ) t 1 y t + ( m 2 ) z = ( m -1 2 ) we have $$\sum _ { t = 0 } ^ { m - 1 } t \cdot y _ { t } = 0 \cdot 1 + \frac { m } { 2 } - 1 \cdot \frac { 2 m - 2 } { m + 2 } + \frac { m } { 2 } \cdot \frac { 2 m - 2 } { m + 2 } = ( m - 1 ) \cdot \frac { 2 m - 2 } { m + 2 } = \frac { 2 ( m - 1 ) ^ { 2 } } { m + 2 }$$ and $$\binom { m } { 2 } z = \frac { ( 1 / 2 ) \cdot m ( m - 1 ) ( m - 4 ) } { m + 2 } \.$$ 8 Of course, z ≥ m -6 m would also be enough. 9 We used Microsoft .NET together with Gurobi ([17]) and IBM CPLEX and also Wolfram Mathematica. Therefore, $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 1 } y _ { t } + \binom { m } { 2 } z = \frac { 2 ( m - 1 ) ^ { 2 } + ( 1 / 2 ) \cdot m ( m - 1 ) ( m - 4 ) } { m + 2 } & = \\ ( m - 1 ) \cdot \frac { \frac { 1 } { 2 } \cdot ( m ^ { 2 } - 4 ) } { m + 2 } & = \\ ( m - 1 ) \frac { \frac { 1 } { 2 } ( m - 2 ) ( m + 2 ) } { m + 2 } & = \binom { m - 1 } { 2 } \\ \cdot \cdot \cdot \cdot \cdot \frac { \nu } { 2 } = \frac { 1 } { 2 } \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon$$ as desired. For the third equation ∑ m -1 t =0 ( ) t 2 y t + ( m 3 ) z = ( m -1 3 ) we have $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 2 } y _ { t } = \binom { \frac { m } { 2 } - 1 } { 2 } \cdot \frac { 2 m - 2 } { m + 2 } + \binom { \frac { m } { 2 } } { 2 } \cdot \frac { 2 m - 2 } { m + 2 } = \frac { ( m - 2 ) ^ { 2 } ( m - 1 ) } { 2 ( m + 2 ) }$$ and $$\binom { m } { 3 } z = \frac { m ( m - 1 ) ( m - 2 ) ( m - 4 ) } { 6 ( m + 2 ) } \.$$ Therefore, $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 2 } y _ { t } + \binom { m } { 3 } z = \frac { 3 ( n - 1 ) ( n - 2 ) ^ { 2 } + m ( m - 1 ) ( m - 2 ) ( m - 4 ) } { 6 ( m + 2 ) } & = \\ \frac { ( m - 1 ) ( m - 2 ) ( 3 ( m - 2 ) + m ( m - 4 ) ) } { 6 ( m + 2 ) } & = \\ \frac { ( m - 1 ) ( m - 2 ) ( m + 2 ) ( m - 3 ) } { 6 ( m + 2 ) } & = \binom { m - 1 } { 3 } \\ \cdots \cdots \cdots \mp \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \colon \\ \vdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots \cdots$$ as desired. For the fourth equation ∑ m -1 t =0 ( ) t 3 y t + ( m 4 ) z = ( m -1 4 ) we have $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 3 } y _ { t } = \binom { \frac { m } { 2 } - 1 } { 3 } \cdot \frac { 2 m - 2 } { m + 2 } + \binom { \frac { m } { 2 } } { 3 } \cdot \frac { 2 m - 2 } { m + 2 } = \frac { ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m - 4 ) } { 1 2 ( m + 2 ) }$$ and $$\binom { m } { 4 } z = \frac { m ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m - 4 ) } { 2 4 ( m + 2 ) }$$ which immediately gives the desired. In order to show that z &gt; m -6 m we show that ∑ t y t &lt; 5. Since z = ∑ t y t = 1 + 2(2 m -2) m +2 , it is enough to show that 2(2 m -2) n + m &lt; 4, which is obviously true. m is odd: $$y _ { t } = \begin{cases} 1 & t = 0 \\ \frac { 4 ( m - 2 ) } { m + 1 } & t = \frac { m - 1 } { 2 } \\ 0 & \text{otherwise} \end{cases} \\ z = \frac { ( m - 2 ) ( m - 3 ) } { m ( m + 1 ) }$$ We show that for any odd m this solution is feasible and that z &gt; m -6 m . We start with showing feasibility. For the first equation ∑ n -1 t =0 y t + ( n 1 ) z = ( n -1 1 ) we have $$\sum _ { t = 0 } ^ { m - 1 } y _ { t } + \binom { m } { 1 } z = 1 + \frac { 4 ( m - 2 ) } { m + 1 } + \frac { ( m - 2 ) ( m - 3 ) } { m + 1 } = 1 + \frac { ( m - 2 ) ( m + 1 ) } { m + 1 } = \binom { m - 1 } { 1 } \\ \cdots \cdots \cdots \cdots \cdots \cdots \cdots.$$ as desired. For the second equation ∑ n -1 t =0 ( ) t 1 y t + ( n 2 ) z = ( n -1 2 ) we have $$\sum _ { t = 0 } ^ { m - 1 } t \cdot \psi _ { t } + \binom { m } { 2 } z = \frac { 4 ( m - 1 ) ( m - 2 ) } { 2 ( m + 1 ) } + \frac { ( m - 1 ) ( m - 2 ) ( m - 3 ) } { 2 ( m + 1 ) } = \frac { ( m - 1 ) ( m - 2 ) ( m + 1 ) } { 2 ( m + 1 ) } = \binom { m - 1 } { 2 } \\ \dots \dots \dots \dots \dots.$$ as desired. For the third equation ∑ m -1 t =0 ( ) t 2 y t + ( m 3 ) z = ( m -1 3 ) we have $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 2 } y _ { t } + \binom { m } { 3 } z = \frac { 3 ( m - 1 ) ( m - 2 ) ( m - 3 ) } { 6 ( m + 1 ) } + \frac { ( m - 1 ) ( m - 2 ) ^ { 2 } ( m - 3 ) } { 6 ( m + 1 ) } & = \\ \frac { ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m + 1 ) } { 6 ( m + 1 ) } & = \binom { m - 1 } { 3 } \\ \vdots \cdot \cdot \cdot \cdot \, \nu = \cdot \cdot \cdot \, \nu = m - 1 / t \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \end{array}$$ as desired. For the fourth equation ∑ m -1 t =0 ( ) t 3 y t + ( m 4 ) z = ( m -1 4 ) we have $$\sum _ { t = 0 } ^ { m - 1 } \binom { t } { 3 } y _ { t } + \binom { m } { 4 } z = \frac { 2 ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m - 5 ) } { 2 4 ( m + 1 ) } + \frac { ( m - 1 ) ( m - 2 ) ^ { 2 } ( m - 3 ) ^ { 2 } } { 2 4 ( m + 1 ) } & = \\ \frac { ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m ^ { 2 } - 3 m - 4 ) } { 2 4 ( m + 1 ) } & = \\ \frac { ( m - 1 ) ( m - 2 ) ( m - 3 ) ( m - 4 ) ( m + 1 ) } { 2 4 ( m + 1 ) } & = \binom { m - 1 } { 4 } \\ \text{as desired.}$$ as desired. We show z &gt; m - 6 m . $$z - \frac { m - 6 } { m } = \frac { ( m - 2 ) ( m - 3 ) } { m ( m + 1 ) } - \frac { m - 6 } { m } = \frac { ( m - 2 ) ( m - 3 ) - ( m - 6 ) ( m + 1 ) } { m ( m + 1 ) } = \frac { 1 2 } { m ( m + 1 ) } > 0$$ where the second and third equalities follow from m&gt; 0. This concludes the proof of Theorem K.3. Theorem K.4. There exists a monotone symmetric set function of rank 4 that has no positive lower envelope of rank 5. Proof. Let f : { 0 , . . . , m } → R + be a set function with the following hypergraph representation. Hyperedges of rank 1 have value 0; Hyperedges of rank 2 have value 10; Hyperedges of rank 3 have value -8; Hyperedges of rank 4 have value 3. That is, f ( x ) = 10 ( ) x 2 -8 ( ) x 3 +3 ( ) x 4 . It is clear this function is symmetric and that it has rank 4. This function is monotone, since from simple calculation the marginal value is non-negative for any integer (actually it is positive for any m&gt; 7). We show inexistence of positive lower envelope of rank 5. By Corollary F.5 it is sufficient to show that f ( m -1) &lt; m -5 m f ( m ). We show it is true for m = 12: $$f ( m ) = f ( 1 2 ) = 3 8 5$$ $$f ( m - 1 ) = f ( 1 1 ) = 2 2 0$$ $$\frac { m - 5 } { m } f ( m ) = \frac { 7 } { 1 2 } \cdot 3 8 5 = \frac { ^ { \prime } } { 1 2 } \approx 2 2 4. 5 8 3 > 2 2 0 = f ( m - 1 )$$ $$\begin{matrix} 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\ \end{matrix}$$ as desired. This concludes the proof of Theorem K.4. ## L Limitations of MPH Despite the advantages of the MPH hierarchy, it has a few limitations. First, even a function in the lowest level of the hierarchy may need an exponential number of hypergraphs in its support. Proposition L.1. Every MPH representation (regardless of rank) of the submodular function f ( S ) = min[ | S , n/ | 2] (which is in MPH -1) requires exponentially many hypergraphs. /negationslash Proof. Consider two different sets S and T with | S | = | T | = m/ 2. Let h be an arbitrary supermodular function (hence any positive hypergraph qualifies here) satisfying h Q ( ) ≤ f ( Q ) for every set Q . We claim that either h S ( ) = f ( S ) or h T ( ) = f ( T ). This proves that at least ( m m/ 2 ) hypergraphs are needed. /negationslash To prove the claim observe that f ( S ∩ T ) &lt; m/ 2 and f ( S ∪ T ) = m/ 2. Suppose for the sake of contradiction that h S ( ) = h T ( ) = m/ 2. Then by supermodularity h S ( ∩ T ) + h S ( ∪ T ) ≥ m , implying that either h S ( ∩ T ) &gt; f S ( ∩ T ) or h S ( ∪ T ) &gt; f S ( ∪ T ), a contradiction. Second, there are complement-free functions that can only be represented in level m/ 2 of the MPH hierarchy. Proposition L.2. There exists a subadditive function that cannot be represented by an MPH -k function for any k &lt; m/ 2 , when m is even. Proof. For a ground set of even size m , consider the function f that gives value 1 for every subset except for the set of all m items, for which the value is 2. This function is clearly subadditive. Additionally, for any rank k &lt; m/ 2, it follows by the 'moreover' part of Corollary F.5 and by straightforward calculations that f does not have a positive lower envelope of rank k . Finally, the canonical positive lower envelope of rank m/ 2 of f (see Lemma F.2) is a legal positive lower envelope of it. ## M Integrality gap of LP 3 Proposition M.1. Let k ∈ N be such than k -1 is a power of prime. There exists an instance of the welfare maximization problem with PH -k valuations and integrality gap k -1 + 1 k for Linear Program (3). Note that such an instance is in particular MPH -k . Proof. Let FPP k -1 be the finite projective plane of order k -1 (it is known to exist, since k -1 is a power of prime). We set the following hypergraph H = ( V, E ). For each point in FPP k -1 , we have a vertex in V , and for each line, we have a hyperedge in E , containing the vertices representing the points that are on this line. The following follows from the definitions of finite projective planes: - · | V | = | E | = ( k -1) 2 +( k -1) + 1 = ( k -1) k +1. - · Any two hyperedges in E have a vertex in common. - · Any hyperedge in E contains exactly k vertices (i.e. the hyperedges in E are all of rank k ). - · Any vertex in V is contained in exactly k hyperedges. Our instance of the welfare maximization problem has ( k -1) 2 + k agents. Each agent i has one distinct preferred hyperedge e i ∈ E . The valuation function v i of agent i has value 1 for any subset containing all the items represented by vertices in e i and 0 otherwise. It is trivial that v i is in PH -k . Furthermore, the agents are single minded. An optimal integral solution of this instance is an allocation of all the items represented by vertices in e i to agent i , for some arbitrary i . This solution has value of 1. However, there exists a better fractional solution. Any agent i gets a fraction of 1 k of all the items represented by vertices in e i . It is easy to verify that this is a feasible fractional solution with value (( k -1) k +1) /k = k -1 + 1 k , as desired. ## N Complement-Free Valuations For completeness, we present the hierarchy of complement-free valuations (see for example [21, 12]). Let M be a ground set and let f : 2 M → R + be a set function. Definition N.1 (Additive function) . We say that f is additive or linear if for every subset S ′ ⊆ M of items, we have f ( S ′ ) = ∑ j ∈ S ′ f ( { } j ) . Definition N.2 (Submodular function) . We say that f is submodular if for every S ′′ ⊆ S ′ ⊆ M and x ∈ M \ S ′ , f ( x | S ′ ) ≤ f ( x | S ′′ ) . Definition N.3 (XOS) . We say that f is in XOS if for some l ∈ N there exist additive set functions f , 1 · · · f l such that for every S ′ ⊆ M , we have f ( S ′ ) = max 1 ≤ ≤ i l f i ( S ′ ) . Definition N.4 (Fractionally subadditive function) . We say that f is fractionally subadditive if for every subset S ′ ⊆ M , subsets T i ⊆ S ′ and every coefficients 0 &lt; α i ≤ 1 such that for every x ∈ S ′ , ∑ i x : ∈ T i α i ≥ 1 , it holds that f ( S ′ ) ≤ ∑ i α f i ( T i ) . Definition N.5 (Subadditive function) . We say that f is subadditive or complement free if for every S , S 1 2 ⊆ M f S , ( 1 ∪ S 2 ) ≤ f ( S 1 ) + f ( S 2 ) . Note that Additive ⊆ Submodular ⊆ XOS = Fractionally subadditive ⊆ Subadditive. ## O Types of queries We recall the definitions of basic types of queries for set functions. Let M be a ground set and let f : 2 M → R + be a set function. Definition O.1 (Value queries) . Value queries are the following: Input: A subset S ′ ⊆ M . Output: f ( S ′ ) . Definition O.2 . Input: A cost function c : M → R (Demand queries) Demand queries are the following: + . Output: A subset S ′ ⊆ M maximizing f ( S ′ ) -∑ j ∈ S ′ c j ( ) . Note that demand queries are strictly stronger than value queries (see [4]).
null
[ "Uriel Feige", "Michal Feldman", "Nicole Immorlica", "Rani Izsak", "Brendan Lucier", "Vasilis Syrgkanis" ]
2014-08-06T08:37:36+00:00
2014-08-06T08:37:36+00:00
[ "cs.GT", "cs.DS" ]
A Unifying Hierarchy of Valuations with Complements and Substitutes
We introduce a new hierarchy over monotone set functions, that we refer to as $\mathcal{MPH}$ (Maximum over Positive Hypergraphs). Levels of the hierarchy correspond to the degree of complementarity in a given function. The highest level of the hierarchy, $\mathcal{MPH}$-$m$ (where $m$ is the total number of items) captures all monotone functions. The lowest level, $\mathcal{MPH}$-$1$, captures all monotone submodular functions, and more generally, the class of functions known as $\mathcal{XOS}$. Every monotone function that has a positive hypergraph representation of rank $k$ (in the sense defined by Abraham, Babaioff, Dughmi and Roughgarden [EC 2012]) is in $\mathcal{MPH}$-$k$. Every monotone function that has supermodular degree $k$ (in the sense defined by Feige and Izsak [ITCS 2013]) is in $\mathcal{MPH}$-$(k+1)$. In both cases, the converse direction does not hold, even in an approximate sense. We present additional results that demonstrate the expressiveness power of $\mathcal{MPH}$-$k$. One can obtain good approximation ratios for some natural optimization problems, provided that functions are required to lie in low levels of the $\mathcal{MPH}$ hierarchy. We present two such applications. One shows that the maximum welfare problem can be approximated within a ratio of $k+1$ if all players hold valuation functions in $\mathcal{MPH}$-$k$. The other is an upper bound of $2k$ on the price of anarchy of simultaneous first price auctions. Being in $\mathcal{MPH}$-$k$ can be shown to involve two requirements -- one is monotonicity and the other is a certain requirement that we refer to as $\mathcal{PLE}$ (Positive Lower Envelope). Removing the monotonicity requirement, one obtains the $\mathcal{PLE}$ hierarchy over all non-negative set functions (whether monotone or not), which can be fertile ground for further research.
1408.1212v1
## Terajets produced by 3D dielectric cuboids V.Pacheco-Peña, 1,a) , M. Beruete, 1,b) I. V. Minin 2,c) and O. V. Minin 2,d) 1 Antennas Group - TERALAB, Universidad Pública de Navarra, Campus Arrosadía, 31006 Pamplona, Spain 2 Siberian State Academy of Geodesy, Plahotnogo 10, Novosibirsk, 630108, Russia The capability of generating terajets using 3D dielectric cuboids working at terahertz (THz) frequencies (as analogues of nanojets in the infrared band) are introduced and studied numerically. The focusing performance of the terajets are evaluated in terms of the transversal full width at half maximum along xand ydirections using different refractive indexes for a 3D dielectric cuboid with a fixed geometry, obtaining a quasi-symmetric terajet with a subwavelength resolution of ~0.46λ0 when the refractive index is n = 1.41. Moreover, the backscattering enhancement produced when metal particles are introduced in the terajet region is demonstrated for a 3D dielectric cuboid and compared with its 2D counterpart. The results of the jet generated for the 3D case are experimentally validated at sub-THz waves, demonstrating the ability to produce terajets using 3D cuboids. a) Electronic mail: [email protected] b) Electronic mail: [email protected] (Corresponding author) c) Electronic mail: [email protected] d) Electronic mail: [email protected] ## I. Introduction It is known that in order to generate subwavelength resolution in microscopy applications, it is required to deal with the limit imposed by the diffraction of electromagnetic waves. To overcome this 1 problem, different solutions have been reported in the past involving metamaterials 2-4 , solid immersion lenses 5 , diffractive optics 6,7 and microspherical particles. 8-10 Several years ago, subwavelength photonic nanojets were introduced and identified using micro scaled cylindrical (2D) and spherical (3D) dielectrics at optical frequencies. 11,12 Photonic nanojets are high intensity, narrow, and non-evanescent beams located at the output surface of a lossless dielectric cylinder/sphere when it is illuminated with a plane wave, demonstrating the ability to obtain a resolution of λ0/3 using microspheres, below the diffraction limit. 13,14 Based on this, photonic nanojets have been studied using different properties of the dielectric structure such as non-spherical nanoparticles 15 and also graded index concepts have been applied. 16,17 Besides, experimental demonstration of the backscattering enhancement generated by photonic jets at microwave frequencies has been reported. 18 In this paper, a new mechanism to produce jets is numerically demonstrated using 3D dielectric cuboids (hexahedrons) working at sub-THZ and THz frequencies. By using a 3D dielectric cuboid with a refractive index n = 1.41 immersed in vacuum ( n0 = 1), it is shown that '3D terajets' can be obtained just at the surface of the output face of the dielectric structure. Moreover, the performance of the 3D terajets are evaluated when the refractive index of the cuboid is changed from 1.2 up to 2, demonstrating that the position of the focus can be obtained inside or outside the 3D cuboid. Also, the subwavelength focusing properties of 3D dielectric cuboids are numerically studied in terms of the full width at half maximum (FWHM) along both ( x and y ) transversal axes, demonstrating a quasispherical terajet when n = 1.41. Furthermore, the performance of the 3D terajet is evaluated along with its 2D counterpart in terms of the backscattering enhancement perturbation produced when metal microspheres are inserted within the 3D/2D terajets; showing the ability of both structures to enhance the backscattering of metal spheres. Finally, experimental and numerical results of the normalized power distribution along the transversal xaxis at z =0.1 λ0 are performed at sub-THz frequencies using a 3D cuboid of Teflon, demonstrating the ability to produce 'microjets' using the structure here proposed. ## II. Terajets performance. To begin with, the 3D dielectric cuboid is schematically presented in Fig. 1. The cuboid has lateral dimensions L = λ0 , along x and y axes while the dimension H is selected to be 1.2 λ0 . In order to evaluate the focusing performance of the structure, the transient solver of the commercial software CST Microwave Studio TM is used along with an extra fine hexahedral mesh with a minimum mesh size of λ0/45. In the simulation the 3D cuboid is illuminated with a vertically ( Ey ) polarized plane wave (see Fig. 1) at 0.1THz (λ0 = 3mm). Moreover, vacuum ( n0 = 1) is used as the background medium and expanded open boundary conditions are used in order to insert the 3D cuboid within an infinite medium. Based on this, the performance of the terajets is evaluated using homogeneous 3D cuboids with different values of refractive index ( n ). Numerical results of the power distribution on the yz -plane/ E -plane (left column) and xz -plane/ H -plane (right column) are shown in Fig. 1 (b-d) for values of n = 2, 1.75, 1.41 and 1.2, respectively. Similar to photonic nanojets produced by cylindrical and spherical dielectrics, 11,14 it can be observed that the terajet is located inside the dielectric structure for higher values of refractive index. By decreasing n , the terajet is moved away from the surface of the 3D cuboid along the optical axis ( ) with less power at its focal position. As the refractive index of the z cuboid approaches that of the surrounding medium the focusing properties of the 3D cuboid diminish accordingly, as expected. Moreover, the full width at half maximum (FWHM) along both ( x and y ) transversal directions for positions from 0 up to 1λ0 along the optical axis ( z ) with a step of 0.2λ0 are presented in Fig. 2 (a,b) for different values of the 3D cuboid refractive index. Also, the intensity enhancement along the z- axis (calculated as the power distribution with and without the presence of the dielectric cuboids) are shown in Fig. 2(c) for the dielectric cuboids here studied. The best resolution is obtained for n = 1.75 with FWHMx,y &lt; 0.4λ0 and an intensity enhancement of  15 times the incident plane wave at the output surface of the 3D cuboid. However, for n = 1.41 a quasi-symmetric terajet is obtained with relatively similar values of FWHMx and FWHMy and an intensity of  10 times the power of the incident plane wave. For example, just at the surface of the 3D cuboid, the terajet has a resolution of FWHMx = 0.47λ0 and FWHMy = 0.45λ0. From Fig. 2(c), it can be observed that, even though the intensity enhancement for n =1.41 near the cuboid is lower than the value obtained for n=1.75, the intensity enhancement decays smoothly for n =1.41, which could be an advantage for applications such as backscattering enhancement 18 in order to detect metal particles away from the surface of the 3D cuboid (see next section). Regarding this last aspect, we can define the parameter terajet exploration range , denoted as  z , as the distance from the surface at which the intensity enhancement has decayed to half its maximum value (note that we are implicitly assuming here that the maximum appears at the surface, since this is the preferred scenario for microscopy applications). From the figure (dotted lines) it is obvious that the exploration range for n = 1.41 is  z = 0.72λ0 notably larger than for n = 1.75,  z = 0.16λ0. Thus, the case n = 1.41 is a good tradeoff between intensity enhancement and length of the terajet exploration range. It is important to highlight that for n = 2, FWHM values are not represented for all the distances along the optical axis because the terajet is located inside the 3D cuboid and focusing is only observed on the xz -plane for distances up to 0.6λ0. The lower intensity enhancement at the focal position is obtained for the case when n = 1.2 (  4) with an exploration range of about 1.96λ0 because the focus is away from the surface of the dielectric cuboid. Thus, in order to generate jets at the surface of the dielectric cuboid a refractive index contrast relative to the background medium less than 2:1 is required, in agreement with the results of photonic nanojets using circular 2D/3D dielectrics reported recently 11,12 ## III. Backscattering enhancement evaluation. As it has been described previously, several applications have been reported using photonic nanojets 13 . Similarly to nanojets produced by cylindrical and spherical dielectrics, 11,12,18 here we evaluate the backscattering enhancement when a metal particle is introduced within the terajet with respect to the backscattering without the metal particle. The evaluation of the backscattering enhancement is numerically studied using the same simulation properties described previously using the 3D cuboid of Fig. 1(d) with a refractive index n = 1.41. First a gold sphere (  Au = 4.561·10 7 S/m) is placed in the vicinity of the output surface of the 3D cuboid and moved along the optical axis ( z -axis) from z=0.2λ0 up to z=2λ0 with a step of 0.0833λ0 [see Fig. 3(a)]. Note that a finite conductivity model is used for the gold sphere, which is a good approximation for frequencies below 10THz. For higher frequencies, a Drude model could fit better the dispersive behavior of metals at infrared frequencies. 19-21 Based on this, the Radar Cross Section (RCS) at the backward direction is obtained with and without the presence of the gold sphere. The backscattering enhancement is calculated as W3D+mp /W3D, where W3D+mp is the calculated RCS at the backward direction for the whole system 3D cuboid + metal particle and W3D is the RCS at the backward direction calculated with the 3D cuboid alone. Simulation results of the backscattering enhancement are presented in Fig. 3(b) when several metal particles with different diameters ( d1 =0.08λ0, d 2 =0.14λ0 and d 3 =0.2λ0) are placed along the optical z -axis. It can be observed that the backscattering enhancement changes periodically and the maximum and minimum peaks are located at the same position (0.5λ0) along z for the three gold spheres with a periodic oscillation of 0.6λ0. Moreover, the maximum values of enhancement are 0.67dB, 2.82dB and 6.44dB for the sphere diameters d1 , d2 and d3 respectively. Note that these values are found within the terajet exploration range (which extends up to 0.72λ0 along z - axis) as expected due to the high power confinement inside this region. For distances far from the terajet, the backscattering is reduced monotonically. Also, in order to evaluate the transversal backscattering enhancement, simulation results are shown in Fig. 3(c) when the gold spheres are placed at z =0.5λ0 (where the first maximum was obtained) and moved from -0.67λ0 to 0.67λ0 with a step of 0.16λ0 along the x -axis. These results demonstrate the ability of the 3D cuboid to produce terajets and enhance the backscattering for different metal spheres along the optical and transversal axes. For the sake of completeness, the backscattering enhancement of 2D and 3D dielectric cuboids are compared. For the 2D case, the dimension of the cuboid along y -axis is changed to 6L (6λ0) in order to evaluate its performance as a quasi-infinite structure. Note that by using one dimension larger than the rest of the 2D cuboid, the focusing performance along the yz -plane/ E -plane is changed and a cylindrical Terajet (' teraknife ') is obtained [see Fig. 3(d-e)]. For both 2D and 3D cases several gold spheres with different diameters ( di ) are placed at the distance zi = di /2, where i = 1, 2, 3… represents the sphere number, in order to evaluate the backscattering produced by the system when the spheres are touching the output face of the 2D/3D cuboids. Simulation results of the backscattering enhancement are presented in Fig. 3(f) as a function of the diameter of the gold spheres. It is shown that higher values are obtained for the 3D case, in good agreement with previous results 11,12 . This is as expected due to the ability to generate terajets on both Eand H -planes using 3D cuboids. However, even though lower values of backscattering enhancement are achieved using 2D cuboids, these structures are able to detect particles placed at different positions along the cylindrical teraknife by recording its backscattering intensity. ## IV. Experimental results: jet generation Finally, the existence of terajets is experimentally demonstrated at sub-THz frequencies. As it has been explained previously, the 3D cuboid here proposed can be scaled from microwaves up to optical frequencies. The ability of a 3D cuboid to generate terajets is evaluated in the sub-THZ range at f exp =35GHz ( λexp = 8.57mm). The dimensions of the 3D cuboid are the same as described in previous sections for the terajet case considering λ0 = λexp . The measurements of the power distribution are carried out using the method of movable probe. 7 Experimental and simulation results of the normalized power distribution along the transversal x -axis at z =0.1λ0, i.e., close to the output face of the 3D cuboid of Teflon ( n = 1.46) are presented in Fig. 4. It is shown that both simulation and experimental results are in good agreement, with a maximum error between them of 7% and a focusing enhancement of  10 times the incident plane wave. Note that this value is also in good agreement with Fig.2(c) where an enhancement of  9.5 times the incident plane wave is obtained at the same distance as experiment using a 3D cuboid with n = 1.41. ## V. Conclusions In conclusion, 3D dielectric cuboids working at terahertz frequencies with the ability to generate terajets at its output surface under plane wave illumination have been studied numerically. By changing the refractive index of the 3D cuboids, it has been demonstrated that the focus is moved from inside to outside the structure with a quasi-symmetric terajet and a high intensity of about 10 times the illuminating power when n =1.41. Moreover, it has been demonstrated the ability of such 3D dielectric cuboids to enhance the backscattering perturbation when gold spheres of different sizes are introduced within the terajet region and moved along z and x axis. Finally, the performance of 3D and 2D dielectric cuboids has been studied demonstrating the ability of both structures to enhance the backscattering of gold spheres relative to the backscattering produced by the isolated spheres. The structure here proposed can be used at microwaves and also as a scaled model at optical frequencies, simplifying the fabrication process compared with spherical dielectrics and could find applications in novel microscopy devices. ## ACKNOWLEDGMENTS This work was supported in part by the Spanish Government under contract Consolider Engineering Metamaterials CSD2008-00066 and contract TEC2011-28664-C02-01. V.P.-P. is sponsored by Spanish Ministerio de Educación, Cultura y Deporte under grant FPU AP-2012-3796. M.B. is sponsored by the Spanish Government via RYC-2011-08221. In memoriam of our beloved friend Mario Sorolla. ## REFERENCES - 1 M. Born and E. Wolf, Principles Of Optics , 7th ed. (Cambridge University Press, New York, 1999). - 2 J.B. Pendry, Phys. Rev. Lett. 85 , 3966 (2000). - 3 N. Fang, H. Lee, C. Sun, and X. Zhang, Science 308 , 534 (2005). - 4 Z. Liu, H. Lee, Y. Xiong, C. Sun, and X. Zhang, Science 315 , 1686 (2007). - 5 S.M. Mansfield and G.S. Kino, Appl. Phys. Lett. 57 , 2615 (1990). - 6 I.V. Minin, O.V. Minin, N. Gagnon, and A. Petosa, in 2006 Jt. 31st Int. Conf. Infrared Millim. Waves 14th Int. Conf. Teraherz Electron. (IEEE, Shanghai, China, 2006), p. 170. - 7 I. V. Minin and O. V. Minin, Chinese Opt. Lett. 12 , 060014 (2014). - 8 Y.F. Lu, L. Zhang, W.D. Song, Y.W. Zheng, and B.S. Luk'yanchuk, J. Exp. Theor. Phys. Lett. 72 , 457 (2000). - 9 X. Hao, C. Kuang, X. Liu, H. Zhang, and Y. Li, Appl. Phys. Lett. 99 , 203102 (2011). - 10 Z. Wang, W. Guo, L. Li, B. Luk'yanchuk, A. Khan, Z. Liu, Z. Chen, and M. Hong, Nat. Commun. 2 , 218 (2011). - 11 Z. Chen, A. Taflove, and V. Backman, Opt. Express 12 , 1214 (2004). - 12 X. Li, Z. Chen, A. Taflove, and V. Backman, Opt. Express 13 , 526 (2005). - 13 A. Heifetz, S.-C. Kong, A. V Sahakian, A. Taflove, and V. Backman, J. Comput. Theor. Nanosci. 6 , 1979 (2009). - 14 S. Lecler, Y. Takakura, and P. Meyrueis, Opt. Lett. 30 , 2641 (2005). - 15 C. Liu, L. Chang, L. Yang, E. Engineering, and N.T. City, Proceeding 9th IEEE Int. Conf. Nano/micro Eng. Mol. Syst. 536 (2014). - 16 C. Liu, Prog. Electromagn. Res. Lett. 37 , 153 (2013). - 17 Y.E. Geints, A. a. Zemlyanov, and E.K. Panina, J. Opt. Soc. Am. B 28 , 1825 (2011). - 18 A. Heifetz, K. Huang, A. V. Sahakian, X. Li, A. Taflove, and V. Backman, Appl. Phys. Lett. 89 , 221118 (2006). - 19 M. a Ordal, R.J. Bell, R.W. Alexander, L.L. Long, and M.R. Querry, Appl. Opt. 24 , 4493 (1985). - 20 M. Staffaroni, J. Conway, S. Vedantam, J. Tang, and E. Yablonovitch, Photonics Nanostructures Fundam. Appl. 10 , 166 (2012). - 21 J. Lloyd-Hughes and T.-I. Jeon, J. Infrared, Millimeter, Terahertz Waves 33 , 871 (2012). FIG. 1.Schematic representation of the proposed 3D dielectric cuboid with dimensions L = λ0 and H = 1.2λ0: (a) Perspective and (b) lateral view. Numerical simulations of the terajet performance for different values of the refractive index: (b) n = 2, (c) n = 1.75, (d) n = 1.41 and (e) n = 1.2 on the yz -plane/ E -plane (left column) and xz -plane/ H -plane (right column). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1212v1-figure-712287b6-2516-41ab-98c0-e7a4e6ebeb36.jpg) FIG. 2.Full width at half maximum (FWHM) along: (a) x -axis and (b) y -axis for positions from 0 to 1λ0 along z -axis with a step of 0.2λ0 for 3D cuboids with refractive index n = 2 (brown circles), n = 1.75 (red circles), n = 1.41 (blue triangles) and n =1.2 (green squares). (c) Intensity enhancement along zaxis calculated as the relation between the power distribution with and without the presence of the 3D cuboids of different refractive index. The dotted lines correspond to the exploration range for each jet generated with different refractive indexes. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1212v1-figure-98c2d16a-bedc-45ab-af7f-1e5f8c9084bd.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1212v1-figure-b22d4d26-4018-4670-bae9-d8c0fb0494f7.jpg) 2 x ( 0 ) -0.6 -0.4 -0.2 0.0 0.2 0.4 0.6 0 FIG. 3. (a) Schematic representation of the configuration used to evaluate the backscattering enhancement generated by the 3D cuboid. Simulation results of the backscattering enhancement of the system 3Dcuboid+metal particle relative to the 3Dcuboid alone when metal particles with diameters d1 = 0.08λ0 (blue lines), d2 = 0.14λ0 (green lines) and d3 = 0.2λ0 (red lines) are moved along zaxis (b) and along xaxis at z = 0.5λ0 (c). Simulation results of the cylindrical Terajet generated for a 2D dielectric cuboid with refractive index n = 1.41 with the same dimensions as Figure 1 along xand - axes and 6L = 6λ0 along z y -axis: (d) power distribution on the xzplane/ H -plane and (e) on the yzplane/ E -plane. (f) Backscattering enhancement of the system 2D/3D cuboid+metal particle relative to the metal particle alone for different diameters of gold spheres placed at the distance zi = di /2 from the output face of the cuboids. Backscattering enhancement (dB) FIG. 4. Experimental (filled circles) and simulation (continuous line) results of the normalized power distribution along the xaxis at z= 0.1λ0. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1212v1-figure-8507aefe-722d-49a5-8505-dc2db1efc7f1.jpg)
10.1063/1.4894243
[ "V. Pacheco-Peña", "M. Beruete", "I. V. Minin", "O. V. Minin" ]
2014-08-06T08:39:17+00:00
2014-08-06T08:39:17+00:00
[ "physics.optics" ]
Terajets produced by 3D dielectric cuboids
The capability of generating terajets using 3D dielectric cuboids working at terahertz (THz) frequencies (as analogues of nanojets in the infrared band) are introduced and studied numerically. The focusing performance of the terajets are evaluated in terms of the transversal full width at half maximum along x- and y- directions using different refractive indexes for a 3D dielectric cuboid with a fixed geometry, obtaining a quasi-symmetric terajet with a subwavelength resolution of ~0.46{\lambda}0 when the refractive index is n = 1.41. Moreover, the backscattering enhancement produced when metal particles are introduced in the terajet region is demonstrated for a 3D dielectric cuboid and compared with its 2D counterpart. The results of the jet generated for the 3D case are experimentally validated at sub-THz waves, demonstrating the ability to produce terajets using 3D cuboids.
1408.1213v3
## THE MAXIMAL FUNCTION AND CONDITIONAL SQUARE FUNCTION CONTROL THE VARIATION: AN ELEMENTARY PROOF KEVIN HUGHES, BEN KRAUSE, AND BARTOSZ TROJAN Abstract. In this note we prove the following goodλ inequality, for r &gt; 2, all λ &gt; 0, δ ∈ ( 0 , 1 2 ) $$C \cdot \nu \{ V _ { r } ( f ) > 3 \lambda ; \mathcal { M } ( f ) < \delta \lambda \} \leq \nu \{ s ( f ) > \delta \lambda \} + \frac { \delta ^ { 2 } } { ( r - 2 ) ^ { 2 } } \cdot \nu \{ V _ { r } ( f ) > \lambda \},$$ where M ( f ) is the martingale maximal function, s f ( ) is the conditional martingale square function, C &gt; 0 is (absolute) constant. This immediately proves that V r ( f ) is bounded on L p , 1 &lt; p &lt; ∞ and moreover is integrable when the maximal function and the conditional square function are. ## 1. Introduction Let ( X, F , ν ) be σ -finite measure space with a filtration ( F n : n ∈ Z ) , i.e ( F n : n ∈ Z ) is a sequence of σ -fields such that F n ⊆ F n +1 ⊆ F . For a martingale ( f n : n ∈ Z ) we define the maximal function, the square function $$\mathcal { M } ( f ) = \sup _ { n \in \mathbb { Z } } | f _ { n } |, \ \ S ( f ) = \left ( \sum _ { n \in \mathbb { Z } } | f _ { n } - f _ { n - 1 } | ^ { 2 } \right ) ^ { 1 / 2 },$$ and a conditional square function $$s ( f ) = \left ( \sum _ { n \in \mathbb { Z } } \mathbb { E } \left [ \left | f _ { n } - f _ { n - 1 } \right | ^ { 2 } \left | \mathcal { F } _ { n - 1 } \right ] \right ) ^ { 1 / 2 }. \\ \iota \dots \iota \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots.$$ For a dyadic filtration on R d we have S f ( ) = s f ( ) since the square of a martingale difference | f n -f n -1 | 2 is F n -1 -measurable. It is well known (see [2, Theorem 9] and [4, Theorem 1], see also [3, Theorem 1.1]) that for each p ∈ [1 , ∞ ) there exists C p &gt; 0 such that $$C _ { p } ^ { - 1 } \| \mathcal { M } ( f ) \| _ { L ^ { p } ( \nu ) } \leq \| S ( f ) \| _ { L ^ { p } ( \nu ) } \leq C _ { p } \| \mathcal { M } ( f ) \| _ { L ^ { p } ( \nu ) }.$$ Also, by convexity Lemma (see [3, Theorem 3.2]) for each p ∈ [2 , ∞ ) there is C p &gt; 0 satisfying $$\| s ( f ) \| _ { L ^ { p } ( \nu ) } \leq C _ { p } \| S ( f ) \| _ { L ^ { p } ( \nu ) }.$$ For p ∈ (0 , 2), we have $$\| \mathcal { M } f \| _ { L ^ { p } ( \nu ) } \leq C _ { p } \| s ( f ) \| _ { L ^ { p } ( \nu ) }.$$ Date : October 30, 2014. 2010 Mathematics Subject Classification. Primary 60G42, 60E15; Secondary 47B38, 46N30. In general, the conditional square function s is not necessary bounded on L p (Ω , ν ), for p ∈ (1 , 2). Let us recall that the filtration ( F n : n ∈ Z ) is regular if there is R ≥ 1 such that for all nonnegative martingales ( g n : n ∈ Z ), $$g _ { n } \leq R g _ { n - 1 }.$$ If the filtration ( F n : n ∈ Z ) is regular then (1.1) is valid for all p ∈ (0 , ∞ ); moreover, for all p ∈ (0 , ∞ ) there is C p &gt; 0 such that $$C _ { p } ^ { - 1 } \| s ( f ) \| _ { L ^ { p } ( \nu ) } \leq \| S ( f ) \| _ { L ^ { p } ( \nu ) } \leq C _ { p } \| s ( f ) \| _ { L ^ { p } ( \nu ) }.$$ Another family of operators which measure oscillation are the r -variation operators defined for r ≥ 1 by $$V _ { r } ( f ) = \sup _ { n _ { 0 } < n _ { 1 } < \dots < n _ { J } } \left ( \sum _ { j = 1 } ^ { J } | f _ { n _ { j } } - f _ { n _ { j - 1 } } | ^ { r } \right ) ^ { 1 / r }.$$ These variation operators are more difficult to control than the maximal function M . In fact, for any n 0 ∈ Z , one may pointwise dominate $$\mathcal { M } ( f ) \leq V _ { r } ( f ) + | f _ { n _ { 0 } } |,$$ where r ≥ 1 is arbitrary. We further remark that the variation operators become larger (more sensitive to oscillation) as r decreases . The fundamental boundedness result concerning the r -variation operators is due to L´pingle. e Theorem 1.1 ([7]) . For each p ∈ [1 , ∞ ) there is A p &gt; 0 such that for all f ∈ L p ( X,ν ) and r &gt; 2 and for all λ &gt; 0 $$\left \| V _ { r } ( f ) \right \| _ { L ^ { p } ( \nu ) } \leq A _ { p } \frac { r } { r - 2 } \| f \| _ { L ^ { p } ( \nu ) }, \quad ( p > 1 ), \\ \lambda > 0$$ $$\nu \left \{ V _ { r } ( f ) > \lambda \right \} \leq A _ { 1 } \frac { r } { r - 2 } \lambda ^ { - 1 } \| f \| _ { L ^ { 1 } ( \nu ) }, \quad ( p = 1 ).$$ We remark that the range of r in the above theorem is sharp, since these estimates can fail for r ≤ 2, (see e.g. [5, 9]). By now, comparatively simple proofs of L´ epingle's theorem can be found in Pisier and Xu [8] and Bourgain [1] (see also [6]). The idea was to leverage known estimates for jump inequalities to recover variational estimates. Let us recall that the number of λ -jumps, denoted by N λ ( f ), is equal to the supremum over J ∈ N such that there is an increasing sequence n 0 &lt; n 1 &lt; . . . &lt; n J satisfying $$| f _ { n _ { j } } - f _ { n _ { j - 1 } } | > \lambda$$ for all 1 ≤ j ≤ J . The key result concerning λ -jumps is the following theorem. Theorem 1.2 ([1, 8]) . For each p ∈ [1 , ∞ ) there exist B p &gt; 0 such that for all f ∈ L p ( X,ν ) and λ &gt; 0 and $$\| \lambda N _ { \lambda } ^ { 1 / 2 } ( f ) \| _ { L ^ { p } ( \nu ) } & \leq B _ { p } \| f \| _ { L ^ { p } ( \nu ) }, \quad ( p > 1 ), \\ \quad \,. \, \infty$$ for any t &gt; 0 . $$\nu \left \{ \lambda N _ { \lambda } ^ { 1 / 2 } ( f ) > t \right \} \leq B _ { 1 } t ^ { - 1 } \| f \| _ { L ^ { 1 } ( \nu ) }, \ \ ( p = 1 ), \\ > 0.$$ The goal of this note is to provide a new and elementary proof of L´pingle's result. e The significance of our approach is that it sheds new insight into the relationship between maximal function, conditional square function, and variation operator. Specifically, we prove the following theorem. Theorem A. There is C &gt; 0 such that for all δ ∈ ( 0 , 1 2 ) , r &gt; 2 and λ &gt; 0 $$( 1. 2 ) \ C \cdot \nu \{ V _ { r } ( f ) > 3 \lambda ; \mathcal { M } ( f ) \leq \delta \lambda \} \leq \nu \{ s ( f ) > \delta \lambda \} + \frac { \delta ^ { 2 } } { ( r - 2 ) ^ { 2 } } \cdot \nu \{ V _ { r } ( f ) > \lambda \}. \\ \intertext { r - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots - r \cdots \cdots \cdots - r \cdots \cdots \cdots - r \cdots \cdots \cdots - r \cdots \cdots \cdots \cdots }$$ In particular, by integrating distribution functions we obtain that for all p ∈ (0 , ∞ ) and r &gt; 2, V r ( f ) ∈ L p ( X,ν ) whenever s f ( ) and M ( f ) are in L p ( X,ν ). - 1.1. Acknowledgments. The authors wish to thank Konrad Kolesko, Christoph Thiele, and Jim Wright for helpful discussions, and Michael Lacey and Terence Tao for their careful reading and support. Furthermore, this work was completed during the 'Harmonic Analysis and Partial Differential Equations' trimester program at Hausdorff Research Institute for Mathematics; the authors wish to thank HIM for their hospitality. ## 2. The Proof We begin with a preliminary lemma. Lemma 2.1. There is C &gt; 0 such that for any A ∈ F m , all λ &gt; 0 , and δ ∈ ( 0 , 1 2 ) for each f ∈ L 2 ( X,ν ) satisfying $$\nu \left \{ A ; V _ { r } ( f ) > \lambda ; \mathcal { M } ( f ) \leq \delta \lambda \right \} & \leq C \lambda ^ { - 2 } ( r - 2 ) ^ { - 2 } \int _ { A } | f | ^ { 2 } \, \mathrm d \nu \\ \mathcal { m } \dots \mathcal { m } \, \mathcal { e } \, \mathcal { r } \, 2 / \mathcal { r } \, \cdots \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e } \, \mathcal { m m } \, \mathcal { e }$$ $$f _ { n } \cdot \mathbb { 1 } _ { A } = 0$$ for all n ≤ m . Proof. By homogeneity, it suffices to prove the result with λ = 1. We can pointwise dominate the variation as in [1, § 3] $$\left ( V _ { r } ( f ) \right ) ^ { r } \leq \sum _ { l \in \mathbb { Z } } 2 ^ { r l } N _ { 2 ^ { l } } ( f ).$$ Let s = ( r +2) 2. / Since M ( f ) &lt; δ &lt; 1 / 2, the above sum runs over l ≤ 0, which leads to the containment $$\left \{ A ; V _ { r } ( f ) > 1 ; \mathcal { M } ( f ) < \delta \right \} \subset \left \{ A ; \sum _ { l \leq 0 } 2 ^ { r l } N _ { 2 ^ { l } } ( f ) > 1 \right \} \subset \bigcup _ { l \leq 0 } \left \{ 2 ^ { s l } N _ { 2 ^ { l } } ( g ) > c _ { r } \right \},$$ where g = f · 1 A and $$c _ { r } ^ { - 1 } = \frac { 1 } { 2 } \sum _ { l \leq 0 } 2 ^ { ( r - 2 ) l / 2 }.$$ Let us observe that c r = ( o r -2). In light of Theorem 1.2, this immediately leads to the majorization 1 $$\nu \{ A ; V _ { r } ( f ) > 1 ; \mathcal { M } ( f ) < \delta \} \lesssim c _ { r } ^ { - 1 } \sum _ { l \leq 0 } 2 ^ { ( s - 2 ) l } \int _ { A } | f | ^ { 2 } \, \mathrm d \nu \lesssim ( r - 2 ) ^ { - 2 } \int _ { A } | f | ^ { 2 } \, \mathrm d \nu.$$ 1 We write X /lessorsimilar Y , or Y /greaterorsimilar X to denote the estimate X ≤ CY for an absolute constant C &gt; 0. Proof of Theorem A. By homogeneity, it will suffice to prove (1.2) for λ = 1. Let B = { s f ( ) &gt; δ } , B ∗ = { M ( 1 B ) &gt; 1 / 2 } and G = ( B ∗ ) c . By Doob's inequality, we have $$\nu ( B ^ { * } ) & \lesssim \int | 1 _ { B } | ^ { 2 } \, \mathrm d \nu = \nu \{ s ( f ) > \delta \}. \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cong \nu \quad \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot$$ Therefore, it is enough to show that there is C &gt; 0 such that for all δ ∈ (0 , 1 2 ) and any N ∈ N $$\nu \left \{ V _ { r } ( f _ { n } \colon - N \leq n ) > 3 ; \mathcal { M } ( f ) < \delta ; G \right \} \leq C \delta ^ { 2 } \cdot \nu \{ V _ { r } ( f ) > 1 \}. \\ \text{Let $\sigma$ be a stonning time defined to be equal to the minimal $m \in \mathbb{Z}$ such that}$$ Let σ be a stopping time defined to be equal to the minimal m ∈ Z such that $$V _ { r } \left ( f _ { n } \colon - N \leq n \leq m \right ) & > 1. \\ f _ { \ } V \, l \, f \, \cdot \, - N < n \rangle & > 3 \rangle \text{ \, where have } - 1$$ $$& V _ { r } ( f _ { n } \colon - N \leq n ) \leq V _ { r } \left ( f _ { n } - f _ { n \wedge \sigma } \colon - N \leq n \right ) + 2 \mathcal { M } ( f ) + V _ { r } \left ( f _ { n \wedge \sigma } \colon - N \leq n < \sigma \right ), \\ & \text{thus for } a = f - f _ { \wedge } \text{ we have}$$ Notice, that on the set { V r ( f n : -N ≤ n ) &gt; 3 } , we have -N ≤ σ &lt; ∞ . Next, thus for g = f -f σ we have $$\left \{ V _ { r } ( f _ { n } \, \colon - N \leq n ) > 3 ; \mathcal { M } ( f ) < \delta ; G \right \} \subseteq \left \{ V _ { r } ( g ) > 1 ; \mathcal { M } ( g ) < 2 \delta ; G \right \}. \\ \text{We are going to prove that for each } m \in \mathbb { Z }$$ We are going to prove that for each m ∈ Z $$\nu \left \{ V _ { r } ( g ) > 1 ; \mathcal { M } ( g ) < 2 \delta ; G ; \sigma = m \right \} \lesssim \delta ^ { 2 } \cdot \nu \{ \sigma = m \}. \\ \iota \in \mathbb { V } \text{ we define } U _ { \mathbb { R } } = \{ x \colon \mathbb { E } [ 1 _ { 0 } | \mathcal { F } _ { \mathbb { R } } | ( x ) < 1 / 2 \}. \text{ We notice that. if } x \in G$$ For n ∈ Z we define U n = { x : E [ 1 B |F n ]( x ) &lt; 1 / 2 } . We notice that, if x ∈ G then x ∈ U n for all n ∈ Z . Let $$\tilde { g } ( x ) = \sum _ { n \in \mathbb { Z } } \left ( g _ { n } ( x ) - g _ { n - 1 } ( x ) \right ) \cdot \mathbf 1 _ { U _ { n - 1 } } ( x ).$$ We observe that g k ( x ) = ˜ ( g k x ) for all x ∈ G and k ∈ Z . Indeed, ( g n -g n -1 ) · 1 U n -1 is F n -measurable and Thus for x ∈ G we have $$\mathbb { E } \left [ \left ( g _ { n } - g _ { n - 1 } \right ) \cdot \mathbb { 1 } _ { U _ { n - 1 } } | \mathcal { F } _ { n - 1 } \right ] = 0. \\ \text{: have}$$ $$\tilde { g } _ { k } ( x ) = \sum _ { n \leq k } \left ( g _ { n } ( x ) - g _ { n - 1 } ( x ) \right ) \cdot \mathbf 1 _ { U _ { n - 1 } } ( x ) = g _ { k } ( x ).$$ Therefore, we obtain $$\nu \left \{ V _ { r } ( g ) > 1 ; \mathcal { M } ( g ) < 2 \delta ; G ; \sigma = m \right \} & = \nu \left \{ V _ { r } ( \tilde { g } ) > 1 ; \mathcal { M } ( \tilde { g } ) < 2 \delta ; G ; \sigma = m \right \} \\ & \leq \nu \left \{ V _ { r } ( \tilde { g } ) > 1 ; \mathcal { M } ( \tilde { g } ) < 2 \delta ; \sigma = m \right \}.$$ Because ˜ = 0 on the set g { σ = m } , by Lemma 2.1 we conclude $$\leq \nu \left \{ V _ { r } ( \tilde { g } ) > 1 ; \mathcal { M } ( \tilde { g } ) < 2 \delta ; \sigma = m \right \}. \\ \intertext { I. e m m a n $ 2 $ 1 $ w e c o n c h d e }$$ $$\nu \left \{ V _ { r } ( \tilde { g } ) > 1 ; \mathcal { M } ( \tilde { g } ) < 2 \delta ; \sigma = m \right \} \lesssim ( r - 2 ) ^ { - 2 } \int _ { \{ \sigma = m \} } | \tilde { g } | ^ { 2 } \, \mathrm d \nu.$$ Next, since s preserves L 2 -norm thus $$\int _ { \{ \sigma = m \} } | \tilde { g } | ^ { 2 } \, \mathrm d \nu = \int s \left ( \tilde { g } \cdot \mathbf 1 _ { \{ \sigma = m \} } \right ) ^ { 2 } \, \mathrm d \nu = \sum _ { n \in \mathbb { Z } } \int _ { \{ \sigma = m \} } \mathbb { E } \left [ | g _ { n } - g _ { n - 1 } | ^ { 2 } | \mathcal { F } _ { n - 1 } \right ] \cdot \mathbf 1 _ { U _ { n - 1 } } \, \mathrm d \nu.$$ Since 1 U n -1 ≤ 2 · E [ 1 B c |F n -1 ] we get $$\int _ { \{ \sigma = m \} } ^ { \cdot \cdot \cdot } | \tilde { g } | ^ { 2 } \, \mathrm d \nu & \leq 2 \sum _ { n \in \mathbb { Z } } \int _ { \{ \sigma = m \} } \mathbb { E } \left [ | g _ { n } - g _ { n - 1 } | ^ { 2 } | \mathcal { F } _ { n - 1 } \right ] \cdot \mathbb { E } \left [ \mathbb { 1 } _ { B ^ { c } } | \mathcal { F } _ { n - 1 } \right ] \mathrm d \nu \\ & \sim \int _ { \varphi \circ \varphi } \nu \quad,$$ $$= 2 \int _ { \{ \sigma = m \} } s ( f ) ^ { 2 } \cdot 1 _ { B ^ { c } } \, d \nu$$ which is bounded by 2 δ 2 · ν { σ = m } $$\{ \sigma = m \}. & & \Box$$ ## 3. Applications to dyadic A ∞ -weights We remark that in the case of the dyadic filtration on R d , the proof generalizes to handle measures given by w , dyadic A ∞ -weights. First, let us recall the following definition. Definition 3.1. A non-negative locally integrable function w belongs to dyadic A ∞ , if for every /epsilon1 &gt; 0 there exists γ &gt; 0 so that for every dyadic interval I and any measurable set E ⊂ I , if | E | ≤ γ · | I | then $$w ( E ) \leq \epsilon w ( I ).$$ If additionally, there is C &gt; 0 such that for all dyadic intervals I $$C ^ { - 1 } w ( I _ { l } ) \leq w ( I _ { r } ) \leq C w ( I _ { l } ),$$ where I l and I r are, respectively, left and right children of I , then w is called dyadic doubling. Corollary 1. Let w be a dyadic A ∞ -weight. There exist C &gt; 0 so that for each /epsilon1 &gt; 0 and r &gt; 2 there is δ &gt; 0 such that for all λ &gt; 0 $$w \{ V _ { r } ( f ) > 3 \lambda ; \mathcal { M } ( f ) < \delta \lambda \} \leq C \cdot w \{ S ( f ) > \delta \lambda \} + \epsilon \cdot w \{ V _ { r } ( f ) > \lambda \}. \\ P r o o f. \, & \, \text{Using the notation as in the proof of Theorem A we may write}$$ Proof. Using the notation as in the proof of Theorem A we may write and $$\left \{ V _ { r } ( f ) > 3 ; \mathcal { M } ( f ) < \delta ; G ; \sigma = m \right \} \subseteq \left \{ \sigma = m \right \}$$ $$& \text{and} \\ & \left | \left \{ V _ { r } ( f ) > 3 ; \mathcal { M } ( f ) < \delta ; G ; \sigma = m \right \} \right | \leq C \frac { \delta ^ { 2 } } { ( r - 2 ) ^ { 2 } } \cdot \left | \left \{ \sigma = m \right \} \right |. \\ & \text{Given } \epsilon > 0 \text{ we take } \delta > 0 \text{ small enough so that } C \frac { \delta ^ { 2 } } { ( r - 2 ) ^ { 2 } } \leq \gamma. \text{ Then, by } ( 3. 1 ) \text{ we}$$ Given /epsilon1 &gt; 0 we take δ &gt; 0 small enough so that C δ 2 ( r -2) 2 ≤ γ . Then, by (3.1) we get $$w \{ V _ { r } ( f ) > 3 ; \mathcal { M } ( f ) < \delta ; G ; \sigma = m \} \leq \epsilon \cdot w \{ \sigma = m \}. \\ \text{for the dyadic filtration $S(f)=s(f)$ we conclude the proof.}$$ Since for the dyadic filtration S f ( ) = s f ( ) we conclude the proof. /square Again, by integrating distribution functions for each p ∈ [1 , ∞ ) and r &gt; 2 we can find C p,r &gt; 0 such that $$C _ { p, r } \| V _ { r } ( f ) \| _ { L ^ { p } ( w ) } \leq \| S ( f ) \| _ { L ^ { p } ( w ) } + \| \mathcal { M } ( f ) \| _ { L ^ { p } ( w ) }.$$ By [10, § 2], for each w , a dyadic A ∞ -weight there is C p &gt; 0 $$\| \mathcal { M } ( f ) \| _ { L ^ { p } ( w ) } \leq C _ { p } \| S ( f ) \| _ { L ^ { p } ( w ) },$$ so the square function alone dominates V r in L p ( w ). In the case where w is a dyadic doubling, we have the reverse inequality as well $$\| S ( f ) \| _ { L ^ { p } ( w ) } \leq C _ { p } ^ { - 1 } \| \mathcal { M } ( f ) \| _ { L ^ { p } ( w ) },$$ and thus the maximal function alone dominates V r in L p ( w ). ## References - 1. J. Bourgain, Pointwise ergodic theorems for arithmetic sets. With an appendix by the author, Harry Furstenberg, Yitzhak Katznelson and Donald S. Ornstein. , Publ. Math.-Paris 69 (1989), no. 1, 5-45. - 2. D.L. Burkholder, Martingale transforms , Ann. Stat. 37 (1966), 1494-1504. - 3. D.L. Burkholder, B.J. Davis, and R.F. Gundy, Integral inequalities for convex functions of operators on martingales , Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability, Volume 2: Probability Theory, University of California Press, 1972, pp. 223-240. - 4. B.J. Davis, On the inequality of the martingale square function , Israel J. Math. 8 (1970), 1494-1504. - 5. R. Jones and G. Wang, Variation inequalities for the Fej´r e and Poisson kernels , T. Am. Math. Soc. 356 (2004), no. 11, 4493-4518. - 6. R.L. Jones, A. Seeger, and J. Wright, Strong variational and jump inequalities in harmonic analysis , Trans. Amer. Math. Soc. (2008), 6711-6742. - 7. D. L´ epingle, La variation d'ordre p des semi-martingales , Z. Wahrscheinlichkeit. 36 (1976), no. 4, 295-316. - 8. G. Pisier and Q. Xu, The strong p -variation of martingales and orthogonal series , Probab. Theory Rel. 77 (1988), no. 4, 497-514. - 9. J. Qian, The p -variation of partial sum processes and the empirical process , Ann. Probab. 26 (1998), no. 3, 1370-1383. - 10. M. Wilson, Weighted Littlewood-Paley theory and exponential-square integrability , Lect. Notes Math., vol. 1924, Springer, 2008. Kevin Hughes, School of Mathematics, The University of Edinburgh, James Clerk Maxwell Building, The King's Buildings, Mayfield Road, Edinburgh, EH9 3JZ, UK E-mail address : [email protected] Ben Krause, UCLA Math Sciences Building, Los Angeles, CA 90095-1555, USA E-mail address : [email protected] Bartosz Trojan, Instytut Matematyczny, Uniwersytet Wroc/suppress lawski, Pl. Grunwaldzki 2/4, 50-384 Wroc/suppress law, Poland E-mail address : [email protected]
null
[ "Kevin Hughes", "Ben Krause", "Bartosz Trojan" ]
2014-08-06T08:45:48+00:00
2015-09-21T10:03:54+00:00
[ "math.CA", "math.PR" ]
The Maximal Function and Square Function Control the Variation: An Elementary Proof
In this note we prove the following good-$\lambda$ inequality, for $r>2$, all $\lambda > 0$, $\delta \in \big(0, \frac{1}{2} \big)$ \[ \nu\big\{ V_r(f) > 3 \lambda ; \mathcal{M}(f) \leq \delta \lambda\big\} \leq 4 \nu\{s(f) > \delta \lambda\} + {\delta^2 \left(1+\frac{16}{r-2}\right)^2} \cdot \nu\big\{ V_r(f) > \lambda\big\}, \] where $\mathcal{M}(f)$ is the martingale maximal function, $s(f)$ is the conditional martingale square function. This immediately proves that $V_r(f)$ is bounded on $L^p$, $1 < p <\infty$ and moreover is integrable when the maximal function is.
1408.1214v1
## DYNAMICS OF A DUMBBELL SATELLITE UNDER THE ZONAL HARMONIC EFFECT OF AN OBLATE BODY ELBAZ I. ABOUELMAGD 1 2 , , JUAN L.G. GUIRAO 3 AND JUAN A. VERA 4 Abstract. The aim of the present paper is to study the dynamics of a dumbbell satellite moving in a gravity field generated by an oblate body considering the effect of the zonal harmonic parameter. We prove that the pass trajectory of the mass center of the system is periodic and different from the classical one when the effect of the zonal harmonic parameter is non zero. Moreover, we complete the classical theory showing that the equations of motion in the satellite approximation can be reduced to Beletsky's equation when the zonal harmonic parameter is zero. The main tool for proving these results is the Lindstedt-Poincare's technique. ## 1. Introduction From the end of the sixth decade of the last century, a part of the mathematical community, has directed its attention to the study the so called dumbbell body or satellite in central gravity, see for instance Mor´ an [21], Schechter [25], Brereton and Modi [11], Beletsky [10, 9], Maciejewski et al. [20]; Kirchgraber et al. [18], Krupa et al. [19], Elipe et al. [15], Burov and Dugain [12] or Nakanishi et al. [23]. Recall that a dumbbell body is a quite simple structure composed by two masses connected by a massless rod. It is assume that this object is moving around a planet whose gravity field is approximated by the field of the attracting center. In general, the distance between the two points masses is considered to be much smaller that the distance between the satellite's center of mass and the attracting center of mass. Thus, it is common to neglect the influence of the attitude dynamics on the motion of the center of mass and treat it as an unperturbed Keplerian one. Rodnikov [24] studied equilibrium positions of a weight on a cable fixed to a dumbbell-shaped space station moving along a circular geocentric orbit. This model is composed by two masses coupled by a weightless rod, while the cable is weightless and non-stretched. The equations of motion are stated when the motion is produced in a single plane and the center of mass of the Key words and phrases. Dumbbell satellite, Lindstedt-Poincare's technique, Zonal harmonic parameter, Beletsky's equation. 2010 Mathematics Subject Classification. Primary: 70E17, 70E20, 70E40. Secondary: 37C27. system moves along a circular geocentric orbit. Moreover, the equilibrium configurations of the system are obtained and the Lyapunov stability of configurations for two situations, first when the station is composed of equal masses, second when masses at the ends of the station are different are analyzed. For the 'dumbbells-load' system with two unilateral connections, all relative equilibria on the circular Keplerian orbit were established by Munitsina [22]. Recall that a relative equilibria of the system is a point of the phase space giving an evolution which is a one-parameter orbit of the action of the symmetry group of the system. These results were interpreted for studying the relative equilibria for which both connections are stretched in geometrical terms. The necessary and sufficient conditions for stability of the relative equilibria were stated. Celletti and Sidorenko [14] investigated the dumbbell satellite's attitude dynamics, when the center of mass moves on a Keplerian trajectory. They found a stable relative equilibrium position in the case of circular orbits which disappears as far as elliptic trajectories are considered. They replaced the equilibrium position by planar periodic motions and they proved this motion is unstable with respect to out-of-plane perturbations. They also gave some numerical evidences of the existence of stable spatial periodic motions. Burov et al. [13] considered the motion of a dumbbell-shaped body in an attractive Newtonian central field. They used the Poincare's theory to determine the conditions for the existence of families of system periodic motions depending on the arising small parameter and passing into some stable radial steady-state motion of the unperturbed problem as the small parameter tends to zero. They also proved that, each of the radial relative equilibria generates one family of such periodic motions, for sufficiently small parameter values. Furthermore, they studied the stability of the obtained periodic solutions in the linear approximation as well as these solutions were calculated up to terms of the first order in the small parameter. Guirao et al. [17] gave sufficient conditions for the existence of periodic solutions of the perturbed attitude dynamics of a rigid dumbbell satellite in a circular orbit. The statement of our main results is the following. Theorem 1. Consider a dumbbell satellite moving in a gravity field generated by an oblate body considering the effect of the zonal harmonic parameter A . The pass trajectory of the mass center of the system is periodic and different from the classical one. If A is equal to zero our solution coincides with the elliptical classical one. Finally, considering the motion in the satellite approximation we complete the classical theory, stating the following result. Theorem 2. The equations of motion in the satellite approximation can be reduced to Beletsky's equation when A is equal to zero. Note that Theorem 1 generalizes Celletti and Sidorenko [14], Burov and Dugain [12] and Nakanishi et al. [23] due to oblateness parameter. The structure of the paper is as follows. In Section 2 we present the model description, the potential, the kinetic energy and the Lagrangian function of the system. In Section 3 we present the morphology of the equations of motion and the equation of the mass center of the system. In Sections 4 and 5 we respectively provide proof of Theorems 1 and 2. We remark that when J 2 = 0 is clear that the dynamics occurs on a plane, however when the coefficient J 2 is considered the effects of the gravitational potential are not the same for planes with different inclinations and a natural question is if there is an invariant plane for the dynamics. The answer of this fact is positive and it will be a key point in the proofs of our main result. In the Appendix we provide a proof of this property. ## 2. Model description - 2.1. Hypothesis. Weassume that the dumbbell satellite is formed by massless rod of length l with to masses m 1 and m 2 placed at its ends. Let consider c the center of mass of the two masses moving in a gravity field generated by an oblate body whose mass m having mass center located at 0 where the distance between 0 and c is r and r glyph[greatermuch] l . Let us consider the orbital reference frame c xy with origin at the dumbbell's center, and the polar coordinates of the center are ( r, θ ). While the rotation of the satellite relative to ray oc will be determined by an angle Θ. Furthermore we denote the reduced mass by µ and the sum of the two masses by m s where µ = m m /m 1 2 s and m s = m 1 + m 2 , see Figure 1 for details. Now, we assume that r i is the position vector of m i with respect to 0. Moreover, let the vector n i denotes the position vector of m i with respect to the center of mass of the dumbbell satellite, i ∈ { 1 2 , } . Therefore, the magnitudes of the position vectors r i are controlled by $$r _ { i } ^ { 2 } = r ^ { 2 } + n _ { i } ^ { 2 } + 2 ( - 1 ) ^ { 2 - i } n _ { i } r \cos \Theta$$ where $$n _ { i } = m _ { 3 - i } l / m _ { s }.$$ 2.2. The potential of the model. From the potential theory, the gravitational potential (any object has axial symmetry m 0 ) experienced by the satellite m will be controlled by (see Murray and Dermott [16]) Figure 1. The dumbbell satellite model ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-4080e63b-5bde-4917-8a52-bd4785214283.jpg) $$V = - \frac { G m _ { 0 } m } { r _ { 0 } } \left [ 1 - \sum _ { n = 2 } ^ { + \infty } J _ { n } \left ( \frac { R } { r _ { 0 } } \right ) p _ { n } ( \sin ( \delta ) ) \right ]$$ where: - (1) G is the universal constant; m 0 is the mass of the oblate object and m is the mass of the satellite; - (2) R is the mean radius of the oblate object; - (3) J n is a dimensionless coefficient that characterizes the size of nonspherical components of the potential; - (4) r 0 is the distance between m 0 and m ; - (5) p n sin( δ ) are the Legendre polynomials of degree n ; - (6) δ denotes the latitude of the satellite. If the two bodies move in the same plane, then δ = 0 and equation (3) can be written as: $$V = - \frac { G m _ { 0 } m } { r _ { 0 } } \left [ 1 - \sum _ { n = 2 } ^ { + \infty } J _ { n } \left ( \frac { R } { r _ { 0 } } \right ) p _ { n } ( 0 ) \right ],$$ $$& \text{where} \\ & p _ { 2 n } ( 0 ) = \frac { ( - 1 ) ^ { n } 2 n! } { 2 ^ { 2 n } ( n! ) ^ { 2 } }, \, p _ { 2 n + 1 } ( 0 ) = 0. \\ & \text{from} \quad \text{mod} \, \text{mod} \, \text{is the} \, \text{$1$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$ } \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \, \text{$2$} \.$$ In the present model we shall consider the planar motion, for more details on it see the Appendix, and take the effect of the zonal harmonic up to J 2 , hence equation (4) can be rewritten as where $$V _ { 0 } = - G m _ { 0 } m ( \frac { 1 } { r _ { 0 } } + \frac { J _ { 2 } R ^ { 2 } } { 2 r _ { 0 } ^ { 3 } } ), \\ \epsilon \, \equiv \, \infty \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \cos \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \tan \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \sin \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \tan \, \epsilon \, \epsilon \, \cos \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \epsilon \, \cos \, \epsilon \, \cos \, \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \, \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \sin \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \, \cos \epsilon \},$$ see [1, 2, 3, 4, 5, 6, 7, 8] for more details. If we assume that R represent the unit of distance, m 0 is also the unit mass and denote J 2 by A . We have that the potential experienced by the masses m 1 and m 2 are V 1 and V 2 such that $$V _ { 1 } = - G m _ { 1 } ( \frac { 1 } { r _ { 1 } } + \frac { A } { 2 r _ { 1 } ^ { 3 } } ),$$ $$V _ { 2 } = - G m _ { 2 } ( \frac { 1 } { r _ { 2 } } + \frac { A } { 2 r _ { 2 } ^ { 3 } } ).$$ Therefore the total potential V can be written as $$V = - k ( \frac { m _ { 1 } } { r _ { 1 } } + \frac { m _ { 2 } } { r _ { 2 } } + A ( \frac { m _ { 1 } } { 2 r _ { 1 } ^ { 3 } } + \frac { m _ { 2 } } { 2 r _ { 2 } ^ { 3 } } ) ), \quad \.$$ where k = G denotes the gravity parameter associated to the oblate body. 2.3. The kinetic energy of the model. Let the vectors e 1 and e 2 be an orthogonal set of unitary vectors with e 1 corresponding to the direction from 0 to c . Consider i and j be another orthogonal set of unitary vectors such that i is a vector in the direction of x axis. Consequently the vectors of the locations r i and associates velocities v i of masses m i can be written as $$\underline { r } _ { i } = \underline { r } + \underline { n } _ { i },$$ $$\underline { v } _ { i } = \frac { d \underline { r } _ { i } } { d t },$$ $$\underline { r } = r ( \cos \theta \underline { i } + \sin \theta \underline { j } ),$$ $$\underline { n } _ { i } = ( - 1 ) ^ { i } n _ { i } ( \cos \Theta \underline { e } _ { 1 } + \sin \Theta \underline { e } _ { 2 } ),$$ $$\underline { e } _ { i } = ( - 1 ) ^ { i } \left ( \cos \left ( \theta + \frac { \pi } { i } \right ) \underline { i } + \sin \left ( \theta + \frac { \pi } { i } \right ) \underline { j } \right ).$$ Therefore, after some calculations, we obtain $$v _ { i } ^ { 2 } = \left \{ \begin{array} { c c c } \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } + n _ { i } ^ { 2 } ( \dot { \theta } + \dot { \Theta } ) ^ { 2 } \\ - 2 ( - 1 ) ^ { i } \dot { r } n _ { i } ( \dot { \theta } + \dot { \Theta } ) \sin \Theta \\ + 2 ( - 1 ) ^ { i } r n _ { i } \dot { \theta } ( \dot { \theta } + \dot { \Theta } ) \cos \Theta \end{array} \right \}.$$ Since the kinetic energy of the dumbbell satellite system is $$T = \frac { 1 } { 2 } \sum _ { i = 1 } ^ { 2 } m _ { i } v _ { i } ^ { 2 }.$$ Substituting equation (8) into (9), the kinetic energy can be written in the form $$T = T _ { s } + T _ { r }.$$ where $$T _ { s } = \frac { 1 } { 2 } m _ { s } ( \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } ).$$ $$T _ { r } = \frac { 1 } { 2 } \mu l ^ { 2 } ( \dot { \theta } + \dot { \Theta } ) ^ { 2 }.$$ Hence $$T & = \frac { 1 } { 2 } m _ { s } ( \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } ) + \frac { 1 } { 2 } \mu l ^ { 2 } ( \dot { \theta } + \dot { \Theta } ) ^ { 2 }.$$ 2.4. The Lagrangian function of the model. Since the Lagrange's function is defined by L = T -V from equations (7) and (11) we get $$( 1 2 ) \ L = \frac { 1 } { 2 } m _ { s } ( \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } ) + \frac { 1 } { 2 } \mu l ^ { 2 } ( \dot { \theta } + \dot { \Theta } ) ^ { 2 } + k ( \frac { m _ { 1 } } { r _ { 1 } } + \frac { m _ { 2 } } { r _ { 2 } } + A ( \frac { m _ { 1 } } { 2 r _ { 1 } ^ { 3 } } + \frac { m _ { 2 } } { 2 r _ { 2 } ^ { 3 } } ) ).$$ Therefore, the equations of motion will be governed by $$\frac { d } { d t } ( \frac { \partial L } { \partial \dot { \chi } } ) - \frac { \partial L } { \partial \chi } = 0, \ \chi \in \{ r, \theta, \Theta \}.$$ $$3. \ E Q U A T I O N \ \text{OF MOTION}$$ 3.1. Equations of motion for the general case. Substituting equation (12) into (13) when χ ∈ { r, θ, Θ } the equations of motion can be written in the following form $$& \quad \_ \\ & ( 1 4 ) \\ & ( m _ { s } r ^ { 2 } + \mu l ^ { 2 } ) \dot { \theta } + \mu l ^ { 2 } \dot { \Theta } = p _ { \theta } = Q, \\ & m _ { s } ( \ddot { r } - r ( \frac { p _ { \theta } - \mu l ^ { 2 } } { m _ { s } r ^ { 2 } + \mu l ^ { 2 } } ) ^ { 2 } ) = - k \begin{Bmatrix} \left ( \frac { m _ { 1 } ( r - n \cos \Theta ) } { r _ { 1 } ^ { 3 } } + \frac { m _ { 2 } ( r + ( l - n ) \cos \Theta ) } { r _ { 2 } ^ { 3 } } \right ) \\ + \frac { 3 } { 2 } A ( \frac { m _ { 1 } ( r - n \cos \Theta ) } { r _ { 1 } ^ { 5 } } + \frac { m _ { 2 } ( r + ( l - n ) \cos \Theta ) } { r _ { 2 } ^ { 5 } } ) \end{Bmatrix}, \\ & \quad \delta + \frac { 2 \dot { r } ( \mu l ^ { 2 } \dot { \Theta } - p _ { \theta } ) } { r ( m _ { s } r ^ { 2 } + \mu l ^ { 2 } ) } = - \frac { k ( m _ { s } r ^ { 2 } + \mu l ^ { 2 } ) \sin \Theta } { m _ { s } l r } ( \frac { 1 } { r _ { 1 } ^ { 3 } } - \frac { 1 } { r _ { 2 } ^ { 3 } } ) + \frac { 3 } { 2 } A ( \frac { 1 } { r _ { 1 } ^ { 5 } } - \frac { 1 } { r _ { 2 } ^ { 5 } } ) ), \\ & \quad \text{where} \ Q \text{ is constant and } n _ { 1 } = n, \, n _ { 2 } = l - n \text{ while } p _ { \theta } \text{ is a constant expresses}$$ where Q is constant and n 1 = n n , 2 = l -n while p θ is a constant expresses the angular momentum conservation. 3.2. Dumbbell's center of motion. Since ( r, θ ) is the coordinate of the dumbbell's center, therefore the kinetic energy T s is given by equation (10), while the potential of the center of mass V s is given by $$V _ { s } = - G m _ { s } ( \frac { 1 } { r } + \frac { A } { 2 r ^ { 3 } } ).$$ Consequently, the Lagrange function L s of the center of mass can be represented in the form $$L _ { s } = \frac { 1 } { 2 } m _ { s } ( \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } ) + G m _ { s } ( \frac { 1 } { r } + \frac { A } { 2 r ^ { 3 } } ).$$ Substituting equation (15) into (13) with L = L s and χ ∈ { r, θ } and taking account that the equations of motion can be written on the form $$\frac { d } { d t } ( \frac { \partial L _ { s } } { \dot { \lambda } } ) - \frac { \partial L _ { s } } { \dot { \lambda } r } = 0,$$ $$\frac { d } { d t } ( \frac { \partial L _ { s } } { \partial \dot { r } } ) - \frac { \partial L _ { s } } { \partial r } & = 0, \\ \frac { d } { d t } ( \frac { \partial L _ { s } } { \partial \dot { \theta } } ) - \frac { \partial L _ { s } } { \partial \theta } & = 0, \\ \text{ion of dumbbell's center wifi}$$ we state that the motion of dumbbell's center will be controlled by $$\ddot { r } - r \dot { \theta } ^ { 2 } = - k ( \frac { 1 } { r ^ { 2 } } + \frac { 3 A } { 2 r ^ { 4 } } ), \\ m _ { s } r ^ { 2 } \dot { \theta } = F \text{ or } r ^ { 2 } \dot { \theta } = h, \\ \frac { 1 } { 2 } \dot { r } ^ { 2 } - \frac { k } { r } - \frac { 6 k A } { r ^ { 3 } } = E, \\ \text{where $F$ is a constant.} \ h$ is the angular momentum which$$ where F is a constant, h is the angular momentum which is constant too, that can be evaluated by the initial conditions and E is the preservation of the total energy for the dumbbell's center. $$\text{Let be } r = \frac { 1 } { u } \, \text{ consequently}$$ $$\frac { d ^ { 2 } u } { d \theta ^ { 2 } } + u = \frac { k } { h ^ { 2 } } ( 1 + \frac { 3 } { 2 } A u ^ { 2 } ).$$ $$\begin{array} { c } \dot { \theta } = - h u ^ { 2 }, \\ \frac { 1 } { 2 } h ^ { 2 } \left ( \frac { d u } { d \theta } \right ) ^ { 2 } - k u - 6 k A u ^ { 3 } = E. \end{array}$$ It is worth mentioning that the system of equations (17) does not represent only dumbbell's center motion, it represents too the motion of two-body problem under the effect of the zonal harmonic motion which can be reduced to the motion of the classical case when A = 0. Therefore our results on the dumbbell's center of motion can be applied it to the motion of two-body problem. Now let us go back to dumbbell's center motion in which we can be assumed that this motion follows a Kepler's type orbit when the effect of oblateness parameter is absent ( A = 0). Consequently the solution can be written as $$r _ { 0 } = \frac { h ^ { 2 } / k } { ( 1 + e _ { 0 } \cos \theta ) }$$ where r 0 = 1 u 0 , e 0 is the orbit eccentricity such that 0 ≤ e 0 &lt; 1, in the framework of elliptic orbits and θ is a true anomaly of the center of mass. When θ = 0 , u 0 = 1 r p = k h 2 (1 + e 0 ) , r p = a (1 -e 0 ) is the pericenter (periapsis) and a is a semi-major axis, see Figures 2 and 3. Now we look for solutions in the form u θ, glyph[epsilon1] ( ) under the condition 0 &lt; glyph[epsilon1] glyph[lessmuch] 1. Since A = J 2 and J 2 ∈ [1 × 10 -3 , 1 × 10 -6 ] for the most of celestial bodies then we can replace glyph[epsilon1] by A. In addition, this solution must hold the initial conditions $$\cdot$$ $$u ( 0, A ) = \frac { 1 } { r _ { p } }, \\ D _ { \theta } u ( 0, A ) = 0. \\. \cdots. \cdots.$$ Therefore, we search for straight forward expansion of an asymptotes solution as a tends to zero in the following form $$u ( \theta, A ) & = u _ { 0 } ( \theta ) + A u _ { 1 } ( \theta ) + o ( A ^ { 2 } ).$$ The effect of the zonal harmonic of J 2 is taking account, but the perturbation due to J 2 is of order about 10 -3 of the unperturbed main term ( m /r 1 1 ) or ( m /r 2 2 ). While all other coefficients of zonal harmonic are about 10 -6 or less. Therefore, it is sufficient from practical point of view, we take the expansion in equation (19) up to A . On the other hand, o A ( 2 ) represents the effect of the zonal harmonic J 4 while our potential does not contain the zonal harmonic J 4 . Consequently we truncate the expansion in equation (19) up to the linear term A . In this case the leading-order perturbation equations are $$D _ { \theta \theta } u _ { 0 } + u _ { 0 } = \frac { k } { h ^ { 2 } },$$ $$D _ { \theta \theta } u _ { 0 } + u _ { 0 } = \frac { } { h ^ { 2 } }, \\ D _ { \theta \theta } u _ { 1 } + u _ { 1 } = \frac { 3 } { 2 } \frac { k } { h ^ { 2 } } u _ { 0 } ^ { 2 }. \\ 1$$ Under the conditions u 0 (0) = 1 r p , D u θ 0 = 0 , u 1 (0) = 0 and D u θ 1 = 0, hence the solution is governed by $$u _ { 0 } = \frac { k } { h ^ { 2 } } ( 1 + e _ { 0 } \cos \theta )$$ and $$u _ { 1 } = \frac { 3 k ^ { 3 } } { 2 h ^ { 6 } } [ 1 + \frac { 1 } { 2 } e _ { 0 } ^ { 2 } - ( 1 + \frac { 1 } { 3 } e _ { 0 } ^ { 2 } ) \cos \theta + e _ { 0 } \theta \sin \theta - \frac { 1 } { 6 } e _ { 0 } ^ { 2 } \cos 2 \theta ].$$ Therefore, the general expression of the dumbbell's center motion up to o A ( ) will be governed by $$u ( \theta, A ) & = u _ { 0 } ( \theta ) + A u _ { 1 } ( \theta ).$$ ## 4. Proof of Theorem 1 Since equation (20) represents a solution which contains a secular term that grows in θ . As a result, the expansion is not uniformly valid in θ and breaks down when θ = ( o A ), furthermore Au 1 is no longer a small correction of u 0 . But convergent series approximation of the periodic solution can be determined by the continuation method known as the Lindstedt-Poincare's technique. Since equation (17) is a second order differential equation, it describes a dynamical system in which A is a small parameter. Consequently if A = 0 the system will be reduced to a harmonic oscillator which has a solution with period T = 2 π/ω 0 where ω 0 = 1. glyph[negationslash] The continuation method enables us to construct a periodic solution for A = 0. If we consider that the angular velocity changes due to the nonlinear terms, the asymptotic solution u θ, ( A ) and the angular velocity ω of the dynamical system can be expanded as $$\begin{array} { c c } u ( \theta, A ) = u _ { 0 } ( \theta ) + A u _ { 1 } ( \theta ) + A ^ { 2 } u _ { 2 } ( \theta ) + \dots \\ \omega = 1 + A \omega _ { 1 } + A ^ { 2 } \omega _ { 2 } + \dots \end{array}$$ To construct a uniformly valid solution, we will introduce a stretched variable τ = ωθ , therefore $$\begin{array} { c } \frac { d } { d \theta } = \omega \frac { d } { d \tau }, \\ \frac { d ^ { 2 } } { d \theta ^ { 2 } } = \omega ^ { 2 } \frac { d ^ { 2 } } { d \tau ^ { 2 } }. \\ \end{array} \,.$$ Substituting equations (22) into (17) we obtain $$\omega ^ { 2 } \frac { d ^ { 2 } u } { d \tau ^ { 2 } } + u = \frac { k } { h ^ { 2 } } ( 1 + \frac { 3 } { 2 } A u ^ { 2 } ).$$ Now, under the following conditions $$u ( 0, A ) = \frac { 1 } { r _ { p } }, \\ u _ { \tau } ( 0, A ) = 0, \\ u ( \tau + 2 \pi, A ) = u ( \tau, A ), \\ \dots \dots \dots \tau \in \mathfrak { m } \colon \dots \tau \in \mathfrak { m } \colon \dots \dots$$ we insert the series expansion (21) into (23) and equating terms of the same order in A with keeping the terms up to first order of A , we obtain the following: (24) - · The coefficient of A 0 gives a homogeneous equation in the form $$\frac { d ^ { 2 } u _ { 0 } } { d \tau ^ { 2 } } + u _ { 0 } = \frac { k } { h ^ { 2 } }$$ where u 0 (0) = 1 r p , du 0 (0) dτ = 0 and u 0 ( τ +2 π, A ) = u 0 ( τ, A ) with a solution $$u _ { 0 g } ( \tau ) = \frac { k } { h ^ { 2 } } ( 1 + e _ { 0 } \cos \tau ),$$ being $$r = \frac { h ^ { 2 } / k } { 1 + e _ { 0 } \cos \tau }.$$ - · The coefficient of A gives a non-homogeneous equation in the form $$( 2 6 )$$ $$\frac { d ^ { 2 } u _ { 1 } } { d \tau ^ { 2 } } + u _ { 1 } = a _ { 1 } + a _ { 2 } \cos \tau + a _ { 3 } \cos 2 \tau$$ $$\text{where } u _ { 1 } ( 0 ) = 0 \, \, \frac { d u _ { 1 } ( 0 ) } { d \tau } = 0$$ $$\Lambda = 0 \, \, \frac { d u _ { 1 } ( 0 ) } { d \tau } = 0 \text{ and } \\ a _ { 1 } = \frac { 3 k ^ { 3 } } { 2 h ^ { 6 } } ( 1 + \frac { 1 } { 2 } e _ { 0 } ^ { 2 } ), \\ a _ { 2 } = \frac { 3 e _ { 0 } k ^ { 3 } } { h ^ { 6 } } ( 1 + \frac { 2 \omega _ { 1 } h ^ { 4 } } { 3 k ^ { 2 } } ), \\ 3 e _ { 0 } ^ { 2 } k ^ { 3 }$$ $$a _ { 3 } = \frac { 3 e _ { 0 } ^ { 2 } k ^ { 3 } } { 4 h ^ { 6 } }$$ with a particular solution $$u _ { 1 } ( \tau + 2 \pi, A ) = u _ { 0 } ( \tau, A )$$ $$u _ { 1 p } = a _ { 1 } + \frac { 1 } { 2 } a _ { 2 } \cos \tau + \frac { 1 } { 2 } a _ { 2 } \tau \sin \tau - \frac { 1 } { 3 } a _ { 3 } \cos 2 \tau.$$ This solution contain a secular term a τ 2 sin τ/ 2, to avoid this term and the solution becomes periodic we have to equate it coefficient by zero, hence $$\omega _ { 1 } = - \frac { 3 k ^ { 2 } } { 2 h ^ { 4 } }. \\. \quad \varepsilon \quad \dots$$ Therefore the general solution of equation (26) is controlled by $$u _ { 1 g } = \frac { 3 k ^ { 3 } } { 2 h ^ { 6 } } ( 1 + \frac { 1 } { 2 } e _ { 0 } ^ { 2 } ) - \frac { k ^ { 3 } } { 2 h ^ { 6 } } ( 3 + e _ { 0 } ^ { 2 } ) \cos \tau - \frac { e _ { 0 } ^ { 2 } k ^ { 3 } } { 4 h ^ { 6 } } \cos 2 \tau.$$ Substituting equations (24) and (27) into (21), the general solution of equation (23) becomes $$u = \frac { k } { h ^ { 2 } } ( 1 + k _ { 1 } ) [ 1 + ( \frac { e _ { 0 } - k _ { 2 } } { 1 + k _ { 1 } } ) \cos \tau + \frac { k _ { 3 } } { 1 + k _ { 1 } } \cos 2 \tau ]$$ where $$k _ { 1 } = \frac { 3 A k ^ { 2 } } { 4 h ^ { 4 } } ( 2 + e _ { 0 } ^ { 2 } ),$$ $$k _ { 2 } = \frac { \stackrel { \cdots } { A k } ^ { 2 } } { 2 h ^ { 4 } } ( 3 + e _ { 0 } ^ { 2 } ), \\ \dots \circ \circ$$ $$k _ { 3 } = - \frac { \dots } { \dots \theta } ^ { A k ^ { 2 } e _ { 0 } ^ { 2 } },$$ $$\tau = ( 1 - \frac { 3 A k ^ { 2 } } { 2 h ^ { 4 } } ) \theta.$$ Therefore $$r = \frac { \nu _ { 1 } / 2 \nu _ { 2 } } { l ^ { 1 + 2 } \simeq \simeq \simeq + 1 \simeq \simeq \simeq 0 - \lambda },$$ $$r = \frac { h ^ { 2 } / \overline { k } } { ( 1 + e \cos \tau + \overline { e } \cos 2 \tau ) },$$ with $$\bar { k } = k ( 1 + k _ { 1 } ), \\ e = ( \frac { e _ { 0 } - k _ { 2 } } { 1 + k _ { 1 } } ), \\ \bar { e } = \frac { k _ { 3 } } { 1 + k _ { 1 } }.$$ $$\bar { e } = \frac { k _ { 3 } } { 1 + k _ { 1 } }.$$ In short, it is clear that the trajectory of the mass center differs from that assumed by Celletti and Sidorenko [14], Burov and Dugain [12] and Nakanishi et al. [23] due to oblateness parameter. Although, this solution is periodic. While this trajectory is the same as their solutions when the effect of oblateness is ignored. Since e 0 &lt; 1 and A &lt;&lt; 1 as a result Ae 2 0 &lt;&lt; 1 is very small. Therefore, if we neglect all terms that include Ae 2 0 , the equation (28) will be reduced to $$r = \frac { h ^ { 2 } / \bar { k } } { ( 1 + e \cos \tau ) },$$ $$\overline { k } = k ( 1 + \frac { 3 A k ^ { 2 } } { 2 h ^ { 4 } } ),$$ $$e = e _ { 0 } - \frac { 3 A k ^ { 2 } } { 2 h ^ { 4 } } ( 1 + e _ { 0 } ).$$ This means that the trajectory of the mass center is elliptic as the classical case with the decreasing of the elliptical parameter and the eccentricity, ending the proof. Remark 1. Taking account the oblateness effect we have proved that the solution is periodic, see equation (28) . While for the small value of the parameter A, we have elliptical solutions as in the classical case with the decreasing in the elliptical parameter, see (29) . Thus, there is no discontinuity and the solution varies smoothly as A approaches zero. Figure 2. Variation in the trajectory of dumbbell's center when e 0 = 0 3 for different values of zonal harmonic param-. eter. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-b38e7323-db13-4dbb-8692-64220319544e.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-c3dfd11b-675d-4616-b013-9f5c00d322ee.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-fd5b5d31-0498-41e5-84bf-9b29b960edb3.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-82b773d6-85c6-4364-a9d9-98d2ec50f0be.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-7fae5ec5-9421-4eaa-9554-c59e9c459492.jpg) Figure 3. Variation in the trajectory of dumbbell's center when e 0 = 0 8 for different values of zonal harmonic param-. eter. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-46f09f16-310a-474a-a910-3b85349072c1.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-02c6f689-a2c7-4377-9144-0e57f4657427.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1214v1-figure-958e298c-2797-4de1-afea-6a5bccae867d.jpg) Note 1. Figures 2 and 3 represent the changes in the trajectory of the dumbbell's center corresponding to the changes in the eccentricity and in the zonal harmonic parameter, here we have considered that k and h are equal to 1. We denote the curves representing the classical case (the effect of zonal harmonic is switched off) by (CC). If the effect of zonal harmonic is consider ignoring all terms with coefficients Ae 2 0 the curves will be denoted by (EC). Finally, by (PC) we denote the general trajectory. We observe that all trajectories are quasi-elliptical and the decreasing in the ellipse parameters is very small for small values of classical eccentricity e 0 and the zonal harmonic parameter J 2 , see some cases of Figure 2. While for some relative large values of the classical eccentricity e 0 the decreasing in the ellipse parameter is observed especially when the parameter of zonal harmonic is assigned by big value. ## 5. Proof of Theorem 2 We shall start by the deduction of the equations of motion in satellite approximation. Indeed, substituting equations (1) and (2) into (7), the approximation of the potential energy can be written as $$V = - k ( m _ { s } ( \frac { 1 } { r } + \frac { A } { 2 r ^ { 3 } } ) + \frac { \mu l ^ { 2 } } { 2 r ^ { 3 } } ( 3 \cos ^ { 2 } \Theta - 1 ) ).$$ In this potential we neglect all terms that contain coefficients (1 /r ) with power four or more, since l glyph[lessmuch] r . Therefore the Lagrangian function becomes $$L = \frac { 1 } { 2 } m _ { s } ( \dot { r } ^ { 2 } + r ^ { 2 } \dot { \theta } ^ { 2 } ) + \frac { 1 } { 2 } \mu l ^ { 2 } ( \dot { \theta } + \dot { \Theta } ) ^ { 2 } \\ + k ( m _ { s } ( \frac { 1 } { r } + \frac { A } { 2 r ^ { 3 } } ) + \frac { \mu l ^ { 2 } } { 2 r ^ { 3 } } ( 3 \cos ^ { 2 } \Theta - 1 ) ).$$ Substituting equation (31) into (13), the approximation equations of motion are $$\begin{array} { c } \text{ton are} & \\ & m _ { s } ( \ddot { r } - r \dot { \theta } ^ { 2 } ) = - k ( m _ { s } ( \frac { 1 } { r ^ { 2 } } + \frac { 3 A } { 2 r ^ { 4 } } ) + \frac { 3 \mu l ^ { 2 } } { 2 r ^ { 4 } } ( 3 \cos ^ { 2 } \Theta - 1 ) ), \\ ( 3 2 ) & ( m _ { s } r ^ { 2 } + \mu l ^ { 2 } ) \dot { \theta } + \mu l ^ { 2 } \dot { \Theta } = p _ { \theta }, \\ & \mu l ^ { 2 } ( \ddot { \theta } + \ddot { \Theta } ) = - \frac { 3 k \mu l ^ { 2 } } { r ^ { 3 } } \cos \Theta \sin \Theta. \end{array}$$ Now replacing the independent variable t with the starched variable τ where τ = ωθ and r 2 ˙ θ = h therefore, it is possible to write ˙ τ = Ω( ) such τ that $$\Omega ( \tau ) = \frac { \omega \bar { k } ^ { 2 } } { h ^ { 3 } } ( 1 + e \cos \tau + \bar { e } \cos 2 \tau ) ^ { 2 }.$$ Hence $$& \frac { d } { d t } = \Omega \frac { d } { d \tau }, \\ & \frac { d ^ { 2 } } { d t ^ { 2 } } = \Omega ^ { 2 } \frac { d ^ { 2 } } { d \tau ^ { 2 } } + \Omega \Omega ^ { \prime } \frac { d } { d \tau },$$ $$\dots$$ where ( ) · ′ means d dτ . Inserting equations (34) into (32) and using equation (33), we obtain (35) $$( 1 + e \cos \tau + \bar { e } \cos 2 \tau ) \Theta ^ { \prime \prime } - 2 ( e \sin \tau + 2 \bar { e } \sin 2 \tau ) ( \frac { 1 } { \omega } + \Theta ^ { \prime } ) + \frac { 3 k } { \omega ^ { 2 } \bar { k } } \cos \Theta \sin \Theta = 0.$$ Since τ = ωθ , we can rewrite equation (35) in the form $$( 3 6 ) \quad & ( 1 + e \cos \omega \theta + \bar { e } \cos 2 \omega \theta ) \frac { d ^ { 2 } \Theta } { d \theta ^ { 2 } } - 2 \omega ( e \sin \omega \theta + 2 \bar { e } \sin 2 \omega \theta ) ( 1 + \frac { d \Theta } { d \theta } ) \\ + \frac { 3 k } { k } \cos \Theta \sin \Theta = 0 \$$ where $$\omega = 1 - \frac { 3 A k ^ { 2 } } { 2 h ^ { 4 } },$$ $$\bar { e } = \frac { A k ^ { 2 } e _ { 0 } ^ { 2 } } { 4 h ^ { 4 } },$$ and $$\overline { k } = k [ 1 + \frac { 3 A k ^ { 2 } } { 4 h ^ { 4 } } ( 2 + e _ { 0 } ^ { 2 } ) ].$$ Now, for finishing only remark that equation (36) can be reduced to Beletsky's equation, see [9] for more details, if we assume the oblateness effect is not consider (i.e., A = 0) obtaining the relation $$( 1 + e \cos \theta ) \frac { d ^ { 2 } \Theta } { d \theta ^ { 2 } } - 2 e \sin \theta \frac { d \Theta } { d \theta } + 3 \cos \Theta \sin \Theta = 2 e \sin \theta,$$ which ends the proof. ## Appendix Let us introduce now an inertial reference frame I ( O E E E ; 1 , 2 , 3 ). The coordinates of a generic vector in this reference system are denoted by x = ( x, y, z ) I . Recall that we are considering a dumbbell formed by two material points M 1 , of mass m 1 and M 2 of mass m 2 rigidly connected by a segment of constant length l and negligible mass mutually attracted by a gravitational potential due to nearly spherical body M . Recall that the potential is given by $$\mathcal { V } ( \mathbf x ) = - \frac { G M } { \| \mathbf x \| } \left ( 1 - \sum _ { n = 2 } ^ { \infty } J _ { n } \left ( \frac { R } { \| \mathbf x \| } \right ) ^ { n } P _ { n } \left ( \frac { z } { \| \mathbf x \| } \right ) \right )$$ with G is the gravitational constant, M the mass of the body, and R the equatorial radius. P n ( u ) is the Legendre polynomial of degree n and argument u , and the J n are constant coefficients characterizing the potential of the body M. We can define a rotating frame R G ( ; e 1 , e 2 , e 3 ), with G be the center of masses of the dumbbell, such that the unitary vector e 3 is directed along the dumbbell towards the point M 2 and e 1 , e 2 are two orthonormal vectors, perpendicular to e 3 . In this frame, the principal moments of inertia ( I , I 1 2 , I 3 ) of the dumbbell are $$I _ { 1 } = I _ { 2 } = \mu l ^ { 2 }, \ I _ { 3 } = 0$$ with $$\mu = \frac { m _ { 1 } m _ { 2 } } { m _ { s } }$$ where m s = m 1 + m 2 and $$l _ { 1 } = n = \frac { m _ { 2 } l } { m _ { s } }, \quad l _ { 2 } = l - n = \frac { m _ { 1 } l } { m _ { s } }$$ the distances from M 1 and M 2 to G . The attitude of the dumbbell is given by two angles, namely nutation Θ and precession φ . The coordinates of points M 1 and M 2 in the space frame S are $$\mathbf M _ { 1 } \equiv - l _ { 1 } \left ( \sin \Theta \sin \phi, - \sin \Theta \cos \phi, \cos \phi \right ) _ { \mathcal { S } }$$ $$\mathbf M _ { 2 } \equiv l _ { 2 } \left ( \sin \Theta \sin \phi, - \sin \Theta \cos \phi, \cos \phi \right ) _ { \mathcal { S } }.$$ The coordinates of G respect to the inertial frame I , using cylindrical coordinates are $$\mathcal { G } \equiv ( r \cos \theta, r \sin \theta, z ) _ { \mathcal { I } }.$$ Using the Koenig's Theorem, the Lagrangian of the dumbbell is L ( P V ; P ) equal to $$\ e q u a t o & \quad \begin{array} { c } m _ { s } \\ \frac { m _ { s } } { 2 } \left ( \left ( \frac { d r } { d t } \right ) ^ { 2 } + r ^ { 2 } \left ( \frac { d \theta } { d t } \right ) ^ { 2 } + \left ( \frac { d z } { d t } \right ) ^ { 2 } \right ) + \frac { \mu l ^ { 2 } } { 2 } \left ( \left ( \frac { d \phi } { d t } \right ) ^ { 2 } + \left ( \frac { d \Theta } { d t } \right ) ^ { 2 } \sin ^ { 2 } \phi \right ) - \mathcal { U } ( \mathbf P ) \\ \quad \text{with } ( \mathbf P ; \mathbf V _ { P } ) = \left ( r, z, \theta, \Theta, \phi ; \frac { d r } { d t }, \frac { d z } { d t }, \frac { d \theta } { d t }, \frac { d \Theta } { d t }, \frac { d \phi } { d t } \right ), \text{ and} \\ \mathcal { U } ( \mathbf P ) = \mathcal { V } ( \mathbf x _ { \mathbf M _ { 1 } } ) + \mathcal { V } ( \mathbf x _ { \mathbf M _ { 2 } } ). \end{array}$$ The coordinates of x M 1 and x M 2 are $$\mathbf x _ { \mathbf M _ { 1 } } \equiv ( r \cos \theta - l _ { 1 } \sin \Theta \sin \phi, r \sin \theta + l _ { 1 } \sin \Theta \cos \phi, z - l _ { 1 } \cos \phi ) _ { \mathcal { I } }$$ $$\mathbf x _ { \mathbf M _ { 2 } } \equiv ( r \cos \theta + l _ { 2 } \sin \Theta \sin \phi, r \sin \theta - l _ { 2 } \sin \Theta \cos \phi, z + l _ { 2 } \cos \phi ) _ { \mathcal { I } }$$ $$\begin{matrix} \end{matrix}$$ and $$\left \| \mathbf x _ { \mathbf M _ { 1 } } \right \| ^ { 2 } & = r ^ { 2 } + z ^ { 2 } + l _ { 1 } ^ { 2 } - 2 l _ { 1 } \left ( z \cos \phi + r \sin \phi \sin \left ( \Theta - \theta \right ) \right ) \\ \left \| \mathbf x _ { \mathbf M _ { 2 } } \right \| ^ { 2 } & = r ^ { 2 } + z ^ { 2 } + l _ { 2 } ^ { 2 } + 2 l _ { 2 } \left ( z \cos \phi + r \sin \phi \sin \left ( \Theta - \theta \right ) \right )$$ The potential of the system has the following expression $$\stackrel { \dots } { \dots } \, r \, \cdots \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stack | \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stack { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stack. } } } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \text. } } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, } } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots. } } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stack | \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel { \dots } \, \stackrel {$$ A.1 Hamiltonian expressions. From the expressions of the kinetic energy and the potential, we can derive the Hamiltonian $$\mathcal { H } ( \mathbf P ; T \, \mathbf V _ { P } ) = \frac { 1 } { 2 m _ { s } } \left ( P _ { r } ^ { 2 } + \frac { P _ { \theta } ^ { 2 } } { r ^ { 2 } } + P _ { z } ^ { 2 } \right ) + \frac { 1 } { 2 \mu l ^ { 2 } } \left ( \frac { P _ { \Theta } ^ { 2 } } { \sin ^ { 2 } \phi } + P _ { \phi } ^ { 2 } \right ) + \mathcal { U } ( r, z, \Theta - \theta, \phi )$$ with $$( \mathbf P ; T \, \mathbf V _ { P } ) = ( r, z, \theta, \Theta, \phi ; P _ { r }, P _ { \theta }, P _ { z }, P _ { \Theta }, P _ { \phi } ) \,.$$ The angles θ and Θ appear only as the difference Θ -θ , we can reduce the order of the Hamiltonian by means of the canonical transformation $$( \theta, \Theta - \theta, P _ { \theta }, P _ { \Theta } ) \rightarrow ( \lambda, \psi, P _ { \psi } - P _ { \lambda }, P _ { \psi } ).$$ The new Hamiltonian is $$( A. 1 ) \mathcal { H } = \frac { 1 } { 2 m _ { s } } \left ( P _ { r } ^ { 2 } + \frac { ( P _ { \psi } - P _ { \lambda } ) ^ { 2 } } { r ^ { 2 } } + P _ { z } ^ { 2 } \right ) + \frac { 1 } { 2 \mu l ^ { 2 } } \left ( \frac { P _ { \psi } ^ { 2 } } { \sin ^ { 2 } \phi } + P _ { \phi } ^ { 2 } \right ) + \mathcal { U } ( r, z, \psi, \phi ).$$ The variable λ is cyclic and the momentum P λ is a constant of the motion. The Hamiltonian itself is another integral. A.2 Equations of the motion. The Hamiltonian equations of the motion are $$( A. 2. 1 ) \, d \psi \, \frac { d r } { d t } = \frac { P _ { r } } { \mu }, \quad \frac { d P _ { r } } { d t } = \frac { ( P _ { \psi } - P _ { \lambda } ) ^ { 2 } } { \mu r ^ { 3 } } - \frac { \partial \mathcal { U } } { \partial r }, \\ \frac { d \psi } { d t } = \frac { P _ { \psi } - P _ { \lambda } } { \mu r ^ { 2 } } + \frac { P _ { \psi } } { \mu l ^ { 2 } \sin ^ { 2 } \phi }, \quad \frac { d P _ { z } } { d t } = - \frac { \partial \mathcal { U } } { \partial z }, \\ \frac { d \phi } { d t } = \frac { P _ { \phi } } { \mu l ^ { 2 } }, \quad \frac { d P _ { \phi } } { d t } = \frac { P _ { \psi } ^ { 2 } \cos \phi } { \mu l ^ { 2 } \sin ^ { 3 } \phi } - \frac { \partial \mathcal { U } } { \partial \phi }. \\ \text{Theorem. The equations (A. 2. 1 ) has an invariant manifold qiven by z \equiv }$$ Theorem. The equations (A.2.1) has an invariant manifold given by z ≡ 0 , P z ≡ 0 , φ ≡ π/ 2 and P φ ≡ 0 . Proof. Using the equations $$\frac { d z } { d t } = \frac { P _ { z } } { \mu }, \quad \frac { d P _ { z } } { d t } = - \frac { \partial \mathcal { U } } { \partial z },$$ $$\frac { d \phi } { d t } = \frac { P _ { \phi } } { \mu l ^ { 2 } }, \quad \frac { d P _ { \phi } } { d t } = \frac { P _ { \psi } ^ { 2 } \cos \phi } { \mu l ^ { 2 } \sin ^ { 3 } \phi } - \frac { \partial \mathcal { U } } { \partial \phi }.$$ the result is immediate. The Hamiltonian (A.1) restricted to the invariant manifold is $$\mathcal { H } = \frac { 1 } { 2 m _ { s } } \left ( P _ { r } ^ { 2 } + \frac { P _ { \psi } ^ { 2 } } { l ^ { 2 } } + \frac { ( P _ { \psi } - P _ { \lambda } ) ^ { 2 } } { r ^ { 2 } } \right ) + \mathcal { U } _ { 1 } ( r, \psi ).$$ with $$\mathcal { U } _ { 1 } ( r, \psi ) = - G M \left [ \left ( \frac { m _ { 1 } } { \sqrt { r ^ { 2 } + l _ { 1 } ^ { 2 } - 2 l _ { 1 } r \sin \psi } } + \frac { m _ { 2 } } { \sqrt { r ^ { 2 } + l _ { 2 } ^ { 2 } + 2 l _ { 2 } r \sin \psi } } \right ) + \frac { \cdot } { \cdot }$$ $$R ^ { 2 } J _ { 2 } \left ( \frac { m _ { 1 } } { \left ( \sqrt { r ^ { 2 } + l _ { 1 } ^ { 2 } - 2 l _ { 1 } r \sin \psi } \right ) ^ { 3 } } + \frac { m _ { 2 } } { \left ( \sqrt { r ^ { 2 } + l _ { 2 } ^ { 2 } + 2 l _ { 2 } r \sin \psi } \right ) ^ { 3 } } \right ) ^ { 3 } } \right ) + O ( J _ { 4 } ) \right ]$$ If r &gt;&gt; l and R = 1, M = 1, k = G J , 2 = A we obtain $$\left ( A. 2. 3 \right ) \, \mathcal { U } _ { 1 } ( r, \psi ) = - k \left ( m _ { s } \left ( \frac { 1 } { r } + \frac { A } { 2 r ^ { 3 } } \right ) + \frac { \mu l ^ { 2 } } { 2 r ^ { 3 } } \left ( 3 \cos ^ { 2 } \psi - 1 \right ) \right ).$$ A.3 The Lagrangian function. The Lagrangian are $$\mathcal { L } \left ( r, \lambda, \psi, \frac { d r } { d t }, \frac { d \lambda } { d t }, \frac { d \psi } { d t } \right ) = \frac { m _ { s } } { 2 } \left ( \left ( \frac { d r } { d t } \right ) ^ { 2 } + r ^ { 2 } \left ( \frac { d \lambda } { d t } \right ) ^ { 2 } \right ) + \frac { \mu l ^ { 2 } } { 2 } \left ( \frac { d \left ( \lambda + \psi \right ) } { d t } \right ) ^ { 2 } - \mathcal { U } _ { 1 } ( r, \psi )$$ and the second order equations of the motion are given by $$e \text{ second order equations of the motion are given by} \\ m _ { s } \left ( \frac { d ^ { 2 } r } { d t ^ { 2 } } - r \left ( \frac { d \lambda } { d t } \right ) ^ { 2 } \right ) = - \frac { \partial \mathcal { U } _ { 1 } } { \partial r }, \\ ( A. 3 ) \ \mu l ^ { 2 } \left ( \frac { d ^ { 2 } \lambda } { d t ^ { 2 } } + \frac { d ^ { 2 } \psi } { d t ^ { 2 } } \right ) = - \frac { \partial \mathcal { U } _ { 1 } } { \partial \psi }, \\ m _ { s } r ^ { 2 } \frac { d \lambda } { d t } + \mu l ^ { 2 } \left ( \frac { d \lambda } { d t } + \frac { d \psi } { d t } \right ) = \text{constant.} \\ \text{clear that if we relace the svmbols } \lambda \, \text{bv } \theta \text{ and } \psi \text{bv } \Theta \text{ the}$$ It is clear that if we replace the symbols λ by θ and ψ by Θ the equation (A.2.3) is the same of equation (30). Also the system of equations (A.3) becomes into the system of equations (14) when U 1 is represented by equation (A.2.3) and it is the same of equation (32) when U 1 is represented by equation (A.3). ## Acknowledgements This work has been partially supported by MICINN/FEDER grant number MTM2011-22587. ## References - [1] E.I. Abouelmagd, S.M. El-Shaboury , Periodic orbits under combined effects of oblateness and radiation in the restricted problem of three bodies , Astrophys Space Sci. 341 (2012), 331-341 - [2] E.I. Abouelmagd , Existence and stability of triangular points in the restricted threebody problem with numerical applications , Astrophys Space Sci. 342 (2012), 45-53 - [3] E.I. Abouelmagd , Stability of the triangular points under combined effects of radiation and oblateness in the restricted three-body problem , Earth Moon and Planets 110 (2013), 143-155 - [4] E.I. Abouelmagd , Existence and stability of triangular points in the restricted threebody problem with numerical applications , Astrophys Space Sci. 342 (2012), 45-53 - [5] E.I. Abouelmagd , The effect of photogravitational force and oblateness in the perturbed restricted three-body problem , Astrophys Space Sci. 346 (2013), 321-332 - [6] E.I. Abouelmagd, M.A. Sharaf , The motion around the libration points in the restricted three-body problem with the effect of radiation and oblateness , Astrophys Space Sci. 344 (2013), 321-332 - [7] E.I. Abouelmagd, H.M. Asiri, M.A. Sharaf , The effect of oblateness in the perturbed restricted three-body problem , Meccanica 48 (2013), 2479-2490 - [8] E.I. Abouelmagd, M.E. Awad, E.M.A. Elzayat, I.A. Abbas , Reduction the secular solution to periodic solution in the generalized restricted three-body problem , Astrophys Space Sci. 350 (2014), 495-505 - [9] V.V. Beletsky , Motion of an artificial satellite about its center of mass , Israel program for scientific translations. Jerusalem (1966) - [10] V.V. Beletsky and D.V. Pankova , Connected bodies in the orbit as dynamic billiard , Regular Chaot. Dynam. 1 (1996), 87-103 - [11] R.C. Brereton and V.J. Modi , On the stability of planar librations of a dumbbell satellite in an elliptic orbit , Aeronaut. J. 70 (1966), 1098-1102 - [12] A. Burov and A. Dugain , Planar oscillations a vibrating dumbbell-like body in a central field of forces , Aeronaut. J. 49(4) (2011), 353-359 - [13] A. Burov, I.I. Kosenko and H. Troger , On periodic motions of an orbital dumbbell-shaped body with a cabin elevator , Mechanics of Solids 47(3) (2012), 269-284 - [14] A. Celletti and V. Sidorenko , Some properties of the dumbbell satellite attitude , Celestial Mech. Dyn. Astr. 101 (2008), 105-126 - [15] A. Elipe, M. Palacios and H. Pretka-Ziomek , Equilibria of the two-body problem with rigid dumbbell satellite , Chaos Soliton &amp; Fractals 35 (2008), 830-842 - [16] C.D. Murray and S.F. Dermott , Solar system dynamics , Cambridge University Press, (1999) - [17] J.L.G. Guirao, J.A. Vera and B.A. Wade , On the periodic solutions of a rigid dumbbell satellite in a circular orbit , Astrophys Space Sci. 346 (2013), 437-442 - [18] U. Kirchgraber, U. Manz and D. Stoffer , Rigorous proof of chaotic behavior in a dumbbell satellite model , J. Math. Anal. Appl. 251 (2000), 897-911 - [19] M. Krupa, A. Steindl and I.I. Troger , Stability of relative equilibria. Part II: Dumbbell satellites , Meccanica 35 (2001), 353-371 - [20] A.J. Maciejewski , About attitude motion of a satellite with time dependent moments of inertia , Artificial Satellites 17(2-3) (1982), 49-60 - [21] J.P. Mor´n a , Effects of plane librations on the orbital motion of a dumbbell satellite , ARS Journal 31(8) (1961), 1089-1096 - [22] M.A. Munitsina , Relative equilibrium on the circular Keplerian orbit of the 'Dumbbells-Load' system with unilateral connections , Automation and Remote Control 68(9) (2007), 1476-1481 - [23] K. Nakanishi, H. Kojima and T. Watanabe , Trajectories of in plane periodic solutions tethered satellite system projected on van der Pol planes , Acta Astronautica 68 (2011), 1024-1030 - [24] A.V. Rodnikov , Equilibrium positions of a weight on a cable fixed to a dumbbellshaped space station moving along a circular geocentric orbit , Cosmic Research 44 (2006), 58-68 - [25] H.B. Schechter , Dumbbell librations in elliptic orbits , AIAA Journal 2 (1964), 1000-1004 - 1 Mathematics Department, Faculty of Science and Arts (Khulais), King Abdulaziz, University, Jeddah, Saudi Arabia - 2 Nonlinear Analysis and Applied Mathematics Research Group (NAAM) Department of Mathematics, King Abdulaziz University, Jeddah, Saudi Arabia E-mail address : [email protected], [email protected] - 3 Departamento de Matem´ atica Aplicada y Estad´ ıstica. Universidad Polit´cnica e de Cartagena, Hospital de Marina, 30203-Cartagena, Regi´n de Murcia, Spain.o Corresponding Author- - E-mail address : [email protected] - 4 Centro Universitario de la Defensa. Academia General del Aire. Universidad Polit´cnica de Cartagena, 30720-Santiago de la Ribera, Regi´n de e o Murcia, Spain. E-mail address : [email protected]
10.1016/j.cnsns.2014.06.033
[ "Elbaz I. Abouelmagd", "Juan L. G. Guirao", "Juan A. Vera" ]
2014-08-06T08:51:09+00:00
2014-08-06T08:51:09+00:00
[ "astro-ph.EP" ]
Dynamics of a dumbbell satellite under the zonal harmonic effect of an oblate body
The aim of the present paper is to study the dynamics of a dumbbell satellite moving in a gravity field generated by an oblate body considering the effect of the zonal harmonic parameter. We prove that the pass trajectory of the mass center of the system is periodic and different from the classical one when the effect of the zonal harmonic parameter is non zero. Moreover, we complete the classical theory show- ing that the equations of motion in the satellite approximation can be reduced to Beletsky's equation when the zonal harmonic parameter is zero. The main tool for proving these results is the Lindstedt{Poincare's technique.
1408.1215v2
## TERRESTRIAL PLANET FORMATION IN THE PRESENCE OF MIGRATING SUPER-EARTHS ## Andr´ e Izidoro 1,2 University of Nice-Sophia Antipolis, CNRS, Observatoire de la Cˆte d'Azur, Laboratoire Lagrange, BP 4229, 06304 Nice Cedex 4, o France. Capes Foundation, Ministry of Education of Brazil, Bras´ ılia/DF 70040-020, Brazil. ## Alessandro Morbidelli 1 University of Nice-Sophia Antipolis, CNRS, Observatoire de la Cˆte d'Azur, Laboratoire Lagrange, BP 4229, 06304 Nice Cedex 4, o France. ## Sean. N. Raymond 3 CNRS and Universit´ e de Bordeaux, Laboratoire d'Astrophysique de Bordeaux, UMR 5804, F-33270, Floirac, France ## Abstract Super-Earths with orbital periods less than 100 days are extremely abundant around Sun-like stars. It is unlikely that these planets formed at their current locations. Rather, they likely formed at large distances from the star and subsequently migrated inward. Here we use N-body simulations to study the effect of super-Earths on the accretion of rocky planets. In our simulations, one or more superEarths migrates inward through a disk of planetary embryos and planetesimals embedded in a gaseous disk. We tested a wide range of migration speeds and configurations. Fast-migrating super-Earths ( τ mig ∼ 0.01-0.1 Myr) only have a modest effect on the protoplanetary embryos and planetesimals. Sufficient material survives to form rocky, Earth-like planets on orbits exterior to the super-Earths'. In contrast, slowly migrating super-Earths shepherd rocky material interior to their orbits and strongly deplete the terrestrial planet-forming zone. In this situation any Earth-sized planets in the habitable zone are extremely volatile-rich and are therefore probably not Earth-like. Subject headings: Planets and satellites: formation; Methods: numerical ## 1. INTRODUCTION Close-in super-Earths are the most abundant known class of extrasolar planets. Planets with sizes between 1 and 4 Earth radii with orbital periods smaller than 100 days are present around at least 30-50% of Sun-like (GK spectral types) stars (Mayor et al. 2009, 2011; Howard et al. 2010, 2012) and perhaps close to 100% (Chiang &amp; Laughlin 2013). Many Earth-sized planets have been found. Fressin et al. (2013) found that about 17% of Sunlike stars have an Earth-sized planet with radii between 0.8 and 1.25 R ⊕ and orbital period smaller than 85 days. Petigura et al. (2013) found that ∼ 6% of Sun-like stars have planets with radii between 1 and 2 R ⊕ and periods between 200-400 days (see also Dong &amp; Zhu 2013). There are a few confirmed Earth-sized or slightly larger planets in the habitable zones of their host stars (e.g., Kepler-62 e - Borucki et al 2013, and Kepler-186 f - Quintana et al 2014). rapidly when the gaseous disk was still around the star, and therefore they are likely to possess a primitive atmosphere. This makes them broadly different from the Earth. In contrast, extrasolar terrestrial-like planets are defined as planets that formed slowly, after the gaseous disk fully dissipated, through a phase of giant impacts among smaller planetary embryos, in a process similar to that leading to the inner planets in our solar system (e.g. Chambers 2001). But size is not everything. Earth-sized planets around other stars - even on Earth-like orbits - might be significantly different from the Earth. It may be relevant to have a more restrictive definition of Earth-like planets. The process of formation may be used to identify truly Earth-like planets. Raymond et al. (2014) defined two different classes of Earth-sized planets, called 'giant planetary embryos' (or 'mini-cores') and terrestrial-like planets. Mini-cores are Earth-sized planets that formed Early papers proposing in situ formation (Hansen &amp; Murray, 2012, 2013; Chiang &amp; Laughlin, 2013) assumed that the disk had a huge local density to start with. In situ formation can indeed reproduce many of the observed features of low-mass planets. However, the assumption of a extraordinarily high local surface density of the disk suffers from several inconsistencies. First, it requires extremely massive disks very close to their stars (Raymond et al 2008, 2014; Chiang &amp; Laughlin 2013). These disks must have a range of surface density slopes extending from extremely steep to extremely shallow slopes, a large fraction of which are incompatible with disk theory (Raymond &amp; Cossou 2014). Second, in situ accretion inherently assumes that orbital migration is negligible. However, the accretion timescale at such close-in orbital distances is so short that the planets must be fully formed long before the disappearance of the gaseous disk. Assuming that no migration occurs essentially ignores 30 years of disk-planet studies that show the inevitability of orbital migration (e.g., Goldreich &amp; Tremaine 1980; Ward 1997). Third, super-Earths that accrete in situ may have not been able to retain the H-He atmospheres that have been observed (Ikoma &amp; Hori, 2012). Finally, in situ accretion often fails at a conceptual level. For instance, a 'minimum-mass' disk that was generated from a given system often cannot actually lead to the formation of that system because other factors such as the width of feeding zones are not included in generating the disk (see Bolmont et al 2014 for the case of Kepler-186). These problems have been at least partially alleviated by the proposal that the local disk density was enhanced due to pile-up of drifting material of various sizes, from grains to small-mass embryos (Hansen, 2014; Chatterjee, &amp; Tan; 2014; Boley &amp; Ford, 2013), down to some putative stopping radius. If super-Earth planets in the vicinity of the star do form in this way, then the study that we propose in this paper obviously does not apply. However, we cannot fail noticing that this process did not happen at least in our solar system, whereas migration of Uranus and Neptune into the inner solar system would have occurred in absence of Jupiter and Saturn (Morbidelli, 2014). Thus, in this paper we assume that most hot superEarths formed via the inward migration model, namely we assume that they formed in the outer part of the disk and migrated close to the star due to the well-known planet-disk interactions (e.g. Terquem &amp; Papaloizou 2007; Cossou et al 2014; Raymond et al. 2014). Although this model has not been fully tested (but see Cossou et al 2014), it offers a self-consistent picture that is consistent with other facets of planet formation (e.g., Papaloizou &amp; Terquem 2006; Armitage 2010), for instance: the fact that it may be easier to form big objects where water ice is available as solid material, that in our solar system the most massive bodies clearly formed in the outer disk, the low density of most characterized super-Earths (Marcy et al., 2014), the unavoidable character of planet migration. The migration model predicts that most final systems of super-Earths should be locked in mutual mean motion resonance (Rein, 2012; Rein et al., 2012; Ogihara &amp; Kobayashi, 2013; Ford, 2014; Zhang et al., 2014)). However, only a few observed systems may be in resonance. Many multiplanet systems have orbital period ratios just slightly larger than first-order mean motion resonances (Lissauer et al., 2011; Fabrycky et al., 2014) and others are far from commensurability. This has been considered the main problem for the inward migration model. However, several ideas have been proposed to explain this slightly off-resonance spacing between planet pairs. Exact period commensurabilities between these planets could be broken down as a result of dissipative effects and resonance repulsion in response to tidal damping (Lithwick &amp; Wu, 2012; Batygin &amp; Morbidelli, 2013; Delisle &amp; Laskar, 2014; but see also Petrovich et al., 2013), late instabilities in resonant chains triggered by the dispersal of the gaseous disk (Terquem &amp; Papaloizou 2007; Cossou et al 2014), planet interaction with a residual population of planetesimals (Chatterjee &amp; Ford, 2014) or late gravitational interaction between planets and their parent protoplanetary disk (Baruteau &amp; Papaloizou, 2013). Thus, the lack of exact resonances should not be taken as evidence for in situ planet formation (Goldreich &amp; Schlichting, 2014). Unfortunately, a true discrimination between the in situ and migration models is not currently possible. This would require the knowledge of the chemical composition of the close-in super-Earths (see Table 1 of Raymond et al 2008). Planets with a large fraction of their mass in water should have formed beyond the snow-line and suffered radial migration. If it contains a large amount of water, a planet will have a larger radius for a given mass (or lower mass for a given radius) than a dry planet (e.g., Fortney et al 2007). We expect water-poor bodies to be mainly formed in situ (Raymond et al., 2008; Hansen &amp; Murray, 2012). Although the bulk densities of many low-mass planets have been measured (Marcy et al., 2014), a statistical discrimination between models requires higher precision than is currently feasible (see Selsis et al 2007). In addition, as we show below, inward-migrating icy superEarths can in some cases trigger the formation of close-in rocky planets, which makes the rocky versus icy nature of these objects a weaker discriminant of formation scenarios than hoped for. Also, the final mass-size relation can depend on what fraction of solid compared to gas the planets can accrete before reaching isolation (Chatterjee &amp; Tan, 2014). In this paper we study the effect of migrating superEarths on the formation of classical terrestrial planets. We make two key assumptions. First, we assume that hot super-Earths form by inward migration in the outer disk and reach their close-in orbits by inward migration. For the reasons discussed above we think this represents a far more likely scenario than in situ accretion. Second, we assume that hot super-Earths form first and therefore their migration has an influence on the accretion of rocky Earth-like planets. This second assumption is based on the expectation that rocky planets grow more slowly than icy/gaseous ones formed beyond the snow line because the latter could accrete from a radially wide disk of icy pebbles spiraling toward the ice line, while the former could only accrete from silicate grains and rocky planetesimals (Lambrechts et al., 2014; Kretke et al., 2014 communication at IAU symposium 310). Likewise, it is thought that Jupiter and Saturn (and even Uranus and Neptune) were fully-formed long before the terrestrial planets in the solar system and played an important role for Earth's formation (e.g., Morbidelli et al., 2012). Previous studies have simulated the effect of migrating giant planets on terrestrial planet formation (Mandell &amp; Sigurdsson 2003; Fogg &amp; Nelson, 2005, 2007a, 2007b, 2009; Raymond et al., 2006; Lufkin et al 2006; Mandell et al, 2007). However, hot Jupiters are far less common than close-in super-Earths, existing around only 0.5-1% of Sun-like stars (Cumming et al 2008; Mayor et al., 2011; Howard et al., 2012; Batalha et al., 2013; Fressin et al., 2013). Thus, the formation of terrestrial-like planets in the context of migrating super-Earths is more interesting not only from an astrophysical perspective but also from an astrobiological point of view. ## 1.1. Migrating Planets We now briefly review our current understanding of planet migration (see detailed reviews by Papaloizou &amp; Terquem 2006; Kley &amp; Nelson, 2012). This will serve to motivate the setup of our simulations. There exist multiple different regimes of gas-driven planet migration. The migration regime strongly depends on the mass of the migrating planets and the gasdisk properties (eg. Papaloizou et al., 2007). Jupiter mass planets open a gap and undergo 'type II' migration which drives them to the vicinity of the star on a timescale comparable to that of the viscous evolution of the gaseous disk (Lin &amp; Papaloizou, 1986; Nelson et al., 2000). On the other hand, lower-mass planets, as superEarths, are not able to open a gap and migrate in a different fashion, denominated 'Type I' regime (Papaloizou &amp; Lin, 1984; Crida et al., 2006). The type I migration regime is complex and sensitive to the disk's properties. In a locally isothermal gas disk with surface density similar to the minimum-mass solar nebula (Weidenschilling, 1977; Hayashi et al, 1981) a 10M ⊕ planet at 5 AU migrates all the way to the star in ∼ 0.01-0.1 Myr (Ward, 1997). This fast radial drift was considered for many years to be a major problem for the core accretion model of giant planet formation (Pollack et al., 1996), because a forming core would fall into the star before having the chance to accrete enough atmosphere and become a giant planet. However, Paardekooper &amp; Mellema (2006) showed that in, non-isothermal disks with radiative transfer, type-I migration is slowed down and can even be reversed. This is due to slight changes in the gas density in the regions leading and trailing the planet along the horseshoe streamlines which exert a positive torque named 'entropy-driven coorbital torque'. This torque can in some cases exceed the net type-I Lindblad negative torque, driving outward migration. Subsequent studies (Baruteau &amp; Masset 2008; Paardekooper &amp; Papaloizou 2008; Kley &amp; Crida, 2008; Bitsch &amp; Kley, 2011) found that outward migration can only occur in the inner part of the disk. The outer part of the disk behaves as an isothermal disk. Consequently, outward migration must stop at an orbital radius where the entropy-driven torque and the type I Lindblad torque cancel out (Paardekooper &amp; Mellema, 2008). This orbital radius, which is dependent on planet mass, is called a 'zero-torque radius'. As the disk evolves, zero-torque regions shift and move inward (Lyra et al. 2010). Thus, upon reaching the zero-torque radius a planet will migrate slowly inward, as the disk loses mass by viscous accretion and photoevaporation. Following this process, Lyra et al., (2010) concluded that low-mass planets avoid the catastrophic infall of planetary cores predicted by isothermal models and are instead delivered within ∼ 1 AU from the star at the time of the ultimate disappearance of the gas. Super-Earths (and mini-Neptunes) are observed in the vicinity of at least 30-50% of the stars (e.g., Howard et al 2010, 2012; Mayor et al 2011). If these planets formed in situ via the pileup of migrating material (Hansen, 2014; Chatterjee, &amp; Tan; 2014; Boley &amp; Ford, 2013) one should expect that terrestrial planets with smaller masses should be present further out, possibly reaching the habitable zone. However, if super-Earths formed in the outer disk and migrated to their current location, the effect of their migration must be taken into account when considering the formation of Earth-sized planets in the habitable zone. Bitsch et al., (2014) showed that type I migration in real disks may be even more complex. The dependence of the net total torque on planetary mass and on the disk's dustgas ratio demonstrated in their study, indicated that the zero-torque radius might disappear at some stage during the disk's evolution. Consequently, a planet initially at the zero-torque radius might be let free to migrate to- ward the star at a fast type I like migration rate when the zero-torque radius disappears. If this is correct, the real evolution of small-mass planets is totally different from that described in Lyra et al., (2010). To summarize, it is not currently possible to quantitatively and reliably model the migration history of superEarths toward the central star. In this study we explore a range of migration rates for the super-Earths (fast and slow) and different timescales for the gas-disk dissipation. Planets migrating inward at different timescales may cross the terrestrial region at different ages of the gas disk, and also disturb the protoplanetary bodies in this region in different as a result of distinct migration speeds. We identify correlations between the different migration scenarios and the resulting state of the protoplanetary disk of planetary embryos and planetesimals potentially leading to the terrestrial planet formation in the habitable zone of the star. The layout of the paper is as follows. In section 2 we describe our model and the initial conditions of our simulations. In Section 3 we outline our simulations. In Section 4 we present the results of the simulations. In Section 5 we discuss the composition and habitability of terrestrial exoplanets in the context of our simulations. In Section 6 we summarize our conclusions. ## 2. METHODS We distinguish two different phases of planet formation: preand post-gas disk dissipation (Armitage, 2010). Gaseous protoplanetary disks around young stars are believed to last no more than 10 Myr (Haisch et al., 2001; see Soderblom et al., 2014 for a review). Over this timescale, gas effects play a very important role for the dynamics of building blocks of planets regulating, for example, the accretion rates of planetesimals onto protoplanets (e.g. Safronov, 1972). Gas-driven planet migration also occurs during this phase. Our simulations are divided into two parts. In the first part we set up a disk of planetesimals and planetary embryos. We study how this disk evolves in response to the migration through the habitable region of one or more super-Earths. Various gas effects on planetesimals and planetary embryos are taken into account (specified below). The gas is removed exponentially during the first phase. The second part of the simulations evolves the population of surviving embryos and planetesimals in a gas-free environment for a few million years. The amount of material near the habitable zone gives an indication of whether terrestrial planet formation in that region may be possible or not. Below, we describe the initial set up of the disk of embryos and planetesimals, of the disk of gas, and of the gas effects (drag, tidal damping and migration). ## 2.1. Disk of Solids Our simulations start from a disk of planetary embryos and planetesimals predicted by runaway and oligarch models of accretion (Kokubo &amp; Ida, 1998, 2000, 2002). The central host star is assumed to have the same mass as our Sun. The initial protoplanetary disk extends from 0.3 AU to ∼ 4 8AU, and its mass is equally divided be-. tween planetesimals and planetary embryos. The disk's radial mass distribution follows a surface density profile given by $$\lambda _ { 0 } \sum _ { \substack { \Sigma ( r ) _ { d } = \Sigma _ { 1 _ { d } } \left ( \frac { r } { 1 A U } \right ) ^ { - 3 / 2 }. \quad \ \ ( 1 ) \quad \ s u _ { \ t o } \\ \quad. \quad \ e \quad. \quad. \quad. \quad. \quad. \quad. \quad. \quad.$$ where we have assumed a surface density at 1 AU, Σ 1 d = 13 gcm -2 . This corresponds to a protoplanetary disk nearly twice as massive as the minimum-mass solar nebula (Weidenschilling 1977, Hayashi, 1981), with ∼ 10 Earth masses of solid material between 0.3 and ∼ 4 8AU AU. The individual . embryo's mass scales as r 3(2 -α / ) 2 ∆ 3 / 2 (Kokubo &amp; Ida 2002; Raymond et. al., 2005), where α is the surface density profile index and ∆ is the number of mutual Hill radii. In our case α =1.5 (Eq. 1) and ∆ is assumed to be 5-10 (Kokubo &amp; Ida, 2000). Planetesimals' individual masses are set to be 10 -8 solar masses (= 0.0033 Earth masses). In total, there are about 1500 planetesimals and ∼ 80 planetary embryos. While planetary embryos are allowed to gravitationally interact with all bodies in the system, planetesimals do not feel each other but are allowed to interact with other objects (planetary embryos, central star and super-Earths). The initial orbital inclinations of all bodies in the disk were chosen randomly from 10 -4 to 10 -3 degrees, eccentricities were set initially to zero and mean anomalies were taken randomly between 0 ◦ and 360 . The arguments of periastron and longitudes of as-◦ cending nodes of all objects were initially set to zero. Figure 1 shows one of our initial conditions. In this figure planetesimals are the filled circles with mass equal to 0.0033 Earth masses. Planetary embryos are represented by open circles with masses ranging from Moon-size to Mars-size. For each scenario we studied, we ran at least 3 simulations with slightly different initial conditions for the protoplanetary embryos and planetesimals. When generating these different initial conditions, we used different randomly generated values for ∆ in the 5-10 range and also for the orbital inclinations and mean anomalies of planetary embryos and planetesimals. Fig. 1.Initial distribution of 82 planetary embryos and 1500 planetesimals representative of our set of initial conditions. The masses of planetesimals are smaller than 0.004 Earth masses ( ∼ 0 0033M . ⊕ .) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-8d52b8e0-3ee8-4957-be6d-9fd363eb13eb.jpg) ## 2.2. Disk of Gas We include a power-law disk model to represent the surface density of gas. The gas surface density is taken to be $$\Sigma _ { g } ( r ) = \Sigma _ { 1 g } \left ( \frac { r } { 1 A U } \right ) ^ { - 3 / 2 }, \quad \quad ( 2 ) \\ \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \cdot \colon$$ where r is the distance to the star and Σ 1g = 3400gcm -2 is the reference surface density at 1 AU. Thus as for the surface density in solids, the gas surface density corresponds to a model twice as massive as the minimum-mass solar nebula. The disk radial temperature is considered as in Hayashi (1981), $$T ( r ) = 2 8 0 \left ( \frac { r } { 1 A U } \right ) ^ { - 1 / 2 } K \quad \left ( 3 \right )$$ where r also represents the distance to the star and the temperature is considered vertically uniform in the disk. The corresponding isothermal sound velocity is given by $$c _ { s } ( r ) = 9. 9 \times 1 0 ^ { 4 } \left ( \frac { r } { 1 A U } \right ) ^ { - 1 / 4 } \text{cms} ^ { - 1 } \quad ( 4 ) \\. \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \ tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde{ m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m} \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \tilde { m } \cosh.$$ and the scale height is $$h ( r ) = h _ { 1 } \left ( \frac { r } { 1 A U } \right ) ^ { 1. 2 5 } A U \quad ( 5 ) \\ - \, \alpha \, \alpha \pi \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdot \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd>: \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd>. \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd.: \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd: \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd. \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd.. \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdors \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdts \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vdots \, \vd.]$$ where h 1 = 0 047 is the half-thickness of disk at 1 AU. . The density in the midplane is given by $$\overset { \circ } { \circ } \\ \mathfrak { z d } } _ { \mathfrak { z d } } \quad \rho _ { g } ( r ) = \frac { \Sigma ( r ) _ { g } } { \sqrt { \pi } h } = 2. 9 \times 1 0 ^ { - 9 } \left ( \frac { r } { 1 A U } \right ) ^ { - 1 1 / 4 } \text{gcm} ^ { - 3 } \quad ( 6 )$$ To mimic the gas disk dissipation due to viscous evolution and photoevaporation, we assumed a simple exponential decay for the gas surface density, given by Exp( -t /τ gas ), where t is the time and τ gas is the gas dissipation timescale. Simulations were carried out considering values for τ gas between 1 and 10 Myr. For simplicity, in all simulations, the gas is assumed to dissipate instantaneously at t= τ diss and the dynamical system starts to evolve in a gas-free environment. We fix τ diss to be the largest between τ gas and the super-Earth migration timescale. ## 2.2.1. Gas Effects Aerodynamic gas drag on planetesimals -Gas drag transfers angular momentum between the gas and the planetesimals. When gas orbits at a sub-Keplerian speed, it causes planetesimals to spiral inward. The aerodynamic gas drag implemented in our simulations follows the formalism of Adachi et al., (1976). The deviation of the angular velocity of the gas from the Keplerian angular velocity is $$\Omega _ { g } = \Omega _ { k } ( 1 - \eta ) ^ { 1 / 2 } \quad \ ( 7 ) \\ \omega _ { g } = \nu _ { g } \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \ dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots\dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \dots \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \Delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta \delta$$ where Ω k is the Keplerian orbital frequency and η is the ratio of the gas pressure gradient to the stellar gravity in the radial direction which is $$\eta = \frac { 1 1 } { 1 6 } \left ( \frac { h } { r } \right ) ^ { 2 }.$$ The gas drag acceleration is given by $$\mathfrak { a } _ { \text{drag} } = - \frac { 3 C _ { \text{d} } \rho _ { \text{g} } \mathbf v _ { \text{rel} } \mathbf v _ { \text{rel} } } { 8 \rho _ { \text{p} } R _ { \text{p} } } \, \quad \quad ( 9 )$$ where C d is the drag coefficient, v rel is the relative velocity of the object with respect to the surrounding gas, and ρ p and R p are the planetesimal's bulk density and radius, respectively. The coefficient gas drag is implemented as in Brasser et al., (2007). As observed in Eq. 9, the planetesimal radius is the key factor governing the magnitude of the aerodynamic gas drag. The nominal planetesimal radius assumed in our simulations was 100 km, however, for comparison, we also performed simulations considering planetesimals with radii equal to 10 and 1000 km. Tidal interaction of protoplanetary embryos with the gas -Planetary embryos and planetesimals interact differently with the gaseous protoplanetary disk. While small planetesimals only feel the headwind of the gas, planetary embryos are massive enough to gravitationally excite density waves. Consequently, they feel torques exerted by those waves (Goldreich &amp; Tremaine 1980; Ward,1986; Tanaka et al., 2002; Tanaka &amp; Ward, 2004). For a planetary embryo, evolving in a slightly eccentric and/or inclined orbit these density waves can be divided into three groups. The first group acts even if the planet's inclination and eccentricities are zero. They are spiral density waves launched at the Lindblad resonances, which transfer angular momentum to the disk and force the embryo to migrate inward. The second and third groups are made of eccentricity and bending waves, which damp the embryo's eccentricity and inclination, respectively (Tanaka &amp; Ward, 2004). To include the effects of type I migration, eccentricity and inclination damping on embryos, we followed the formalism of Tanaka et al., (2002) and Tanaka &amp; Ward (2004), modified by Papaloizou and Larwood (2000), and Cresswell &amp; Nelson (2006; 2008) to include the case of large eccentricities. The timescales for semimajor axis, eccentricity and inclination damping are given by t m , t e and t , respectively. i Their values are: $$t _ { m } = \frac { 2 } { 2. 7 + 1. 1 \alpha } \left ( \frac { M _ { \odot } } { m _ { p } } \right ) \left ( \frac { M _ { \odot } } { \Sigma _ { g } a _ { p } ^ { 2 } } \right ) \left ( \frac { h } { r } \right ) ^ { 2 } \left ( \frac { 1 + \left ( \frac { e r } { 1. 3 h } \right ) ^ { 5 } } { 1 - \left ( \frac { e r } { 1. 1 h } \right ) ^ { 4 } } \right ) \Omega _ { k } ^ { - 1 }, \quad \text{the } \mathbb { m } { \mathbb { m } { N e l s } }$$ $$t _ { e } & = \frac { t _ { w a v e } } { 0. 7 8 0 } \left ( 1 - 0. 1 4 \left ( \frac { e } { h / r } \right ) ^ { 2 } + 0. 0 6 \left ( \frac { e } { h / r } \right ) ^ { 3 } + 0. 1 8 \left ( \frac { e } { h / r } \right ) \left ( \frac { i } { h / r } \right ) ^ { 2 } \right ), \quad \text{incidi} \\ &,$$ and $$t _ { i } & = \frac { t _ { w a v e } } { 0. 5 4 4 } \left ( 1 - 0. 3 \left ( \frac { i } { h / r } \right ) ^ { 2 } + 0. 2 4 \left ( \frac { i } { h / r } \right ) ^ { 3 } + 0. 1 4 \left ( \frac { e } { h / r } \right ) ^ { 2 } \left ( \frac { i } { h / r } \right ) \right ) \quad \text{and} \, i \, \text{is} \, \text{acl}$$ where $$t _ { \text{wave} } = \left ( \frac { M _ { \odot } } { m _ { p } } \right ) \left ( \frac { M _ { \odot } } { \Sigma _ { g } a ^ { 2 } } \right ) \left ( \frac { h } { r } \right ) ^ { 4 } \Omega _ { k } ^ { - 1 } \quad ( 1 3 ) \quad \ e t a \, \begin{matrix} \lambda \end{matrix} \,.$$ and M /circledot , a , p i, e are the solar mass and the embryo's semimajor axis, inclination and eccentricity, respectively. α is the gas disk surface density profile index, which in our case is equal to 1.5 (Eq. 2). To model the damping of semimajor axis, eccentricity, and inclination, we implemented synthetic accelerations as defined in Cresswell &amp; Nelson (2008): $$\mathfrak { a } _ { m } = - \frac { \mathbf v } { t _ { m } } \quad \quad \ \ ( 1 4 ) \quad I$$ $$\mathfrak { a } _ { e } = - 2 \frac { ( \mathbf v. r ) \mathbf r } { \mathbf r ^ { 2 } \mathbf t _ { e } } \quad \quad ( 1 5 )$$ $$a _ { i } = - \frac { v _ { z } } { t _ { i } } k,$$ where k is the unit vector in the z-direction. ## 3. NUMERICAL SIMULATIONS Our simulations were run with the Symba integrator (Duncan et al., 1998) adopting a 2-day time step. The code has been slightly changed to include aerodynamic gas drag, type I migration, and tidal damping of the embryos' eccentricities and inclinations as explained before. Collisions are considered to be inelastic, resulting in a merging event that conserves linear momentum. During the simulations, planetesimals and protoplanetary embryos that reach heliocentric distances smaller than 0.1 AU are assumed to collide with the central body. Planetesimals or protoplanetary embryos are removed from the system if ejected beyond 100 AU of the central star. ## 3.1. The Different Models Gas drag - both aerodynamic and tidal - plays a very important role both during and after the migration of a large planet (Fogg &amp; Nelson, 2005; 2007a; Raymond et al., 2006; Mandell et al 2007). Different approaches have been used when considering the gas dissipative effects on planetesimals and protoplanetary embryos. For example, while Raymond et al., (2006) only included type I eccentricity and inclination damping, Fogg &amp; Nelson (2007b) also included the effects of type I migration on planetary embryos in their simulations. At the beginning of our simulations, planetary embryos are Moon- to Mars-sized (Fig. 1). How these ∼ 0 1 . M ⊕ bodies migrate is unclear. Real protoplanetary disks are almost certainly turbulent, and stochastic torques that result from turbulent density fluctuations can dominate the effects of type-I migration. Consequently, the orbits of low-mass planetary embryos can experience a random walk in semimajor axis (Nelson &amp; Papaloizou 2004; Nelson 2005) rather than a monotonic inward migration. Thus, in this work, we have performed simulations both including type I migration of embryos and neglecting this effect. For cases where type I migration of planetary embryos is taken into account simulations were performed considering the nominal type I rate (Tanaka et al., 2002) and also a type I migration rate reduced ten times. This is achieved by multiplying t m , in Eq. 10, by a factor 10. Table 1 summarizes the effects that were considered for our different scenarios. In our fiducial model, type I migration of protoplanetary embryos is neglected. Model I includes all dissipative forces acting on the protoplanetary embryos as described before. Finally, Model II neglects all effects of the gas on planetesimals and protoplanets. Model II is clearly unrealistic but we use it to highlight the role of the gas in comparison with simulations conducted in the framework of the fiducial model. ## 3.2. Migrating Super-Earths We consider a system of either one or multiple superEarths originally residing beyond the outer edge of the TABLE 1 Different models explored in our simulations concerning the gas dissipative effects on planetesimals and protoplanetary embryos. For each model, the included forces are indicated by ( /check ) and the neglected ones are shown by ( × ) a | Model | Gas Drag ( a drag | Radial damp. ( a | Ecc. damp. ( | a e ) | Inc. damp. ( | a i ) | |----------------|---------------------|--------------------|----------------|---------|----------------|---------| | Fiducial | /check | × | /check | | /check | | | I | /check | /check | | /check | /check | | | II (Toy-Model) | × | × | | × | × | | a From left to right the columns represent the model, aerodynamic gas drag ( a drag ), type-I migration ( a m ), eccentricity damping ( a e ), and inclination damping ( a i ) disk of planetary embryos and planetesimals ( ≥ 5AU). We considered two 'end members' of super-Earth populations when performing our numerical simulations. First, considering a single super-Earth, we performed simulations exploring a range of masses from 5 to 15 Earth masses. However, because the evolution was quite insensitive of the super-Earth mass over the considered range, we only present results for 10 Earth-mass planets. To represent multiplanet systems of migrating super-Earths, we consider a planetary system composed by six superEarths. The masses of these six planets were taken to be the upper limits of those of the planets in the Kepler 11 system (Lissauer et al., 2013). Table 2 shows the initial semimajor axes and masses of the migrating super-Earths in our simulations. Using these two sets of initial conditions of super-Earths we qualitatively cover a range of possibilities within the spectrum of the planetary systems uncovered by Kepler. TABLE 2 Initial semimajor axis and mass of the migrating planets in our simulations. | System | P-I | | P-II | P-III | P-IV | P-V | P-VI | |-------------|----------|-----|--------|---------|--------|-------|--------| | Single | | | | | | | | | | a [AU] | 5.0 | - | - | - | - | - | | | M [M ⊕ ] | 10 | - | - | - | - | - | | Multiplanet | | | | | | | | | | a [AU] | 5.0 | 6.05 | 7.33 | 8.88 | 10.76 | 13.03 | | | M [M ⊕ ] | 3.5 | 6 | 8 | 9.5 | 3 | 12 | Initially, the eccentricities and orbital inclinations of the super-Earths are set to zero. We apply a synthetic acceleration to force the super-Earth(s) to migrate inward on the timescale τ SE 1 . This migration does not affect the evolution of the eccentricity and orbital inclination of the migrating planets. To save computational time when running our simulations, we removed the migrating super-Earths from the system when they reached a heliocentric distance equal to 0.1 AU. This assumption does not bias our results, since we are interested in the accretion of terrestrial planets from the objects left beyond 0.5 AU after super-Earth(s) migration and gas disk dissipation. For migrating multi-super-Earth systems, we tested two different migration scenarios. The first scenario called 'locked migration' - mimics inward migration in 1 Obviously, we have always considered τ SE ≤ τ diss a stable multiresonant configuration as observed in hydrodynamical simulations (Terquem &amp; Papaloizou, 2007; Cresswell &amp; Nelson 2008; Morbidelli et al., 2008; Horn et al., 2012; Pierens et al., 2013). The period ratios of the super-Earths are kept fixed during the migration and, to ensure the stability of the system, we neglect the mutual interactions among the super-Earths. The second scenario of migration for the multiplanet system of super-Earths is called 'migrating in sequence'. In this scenario, we consider that the super-Earths migrate one by one. Each one of them migrates on a timescale /similarequal τ SE / n, where n is the number of migrating super-Earths in the system. Numbering the super-Earths according to their initial heliocentric distance, where the closest one is labeled by '1' and the farthest by 'n' (in our case n=6), the 'ith' super-Earth is only allowed to migrate when the '(i -1)th' super-Earth has reached a heliocentric distance of 0.1 AU, and, consequently, has been removed from the system. Table 3 shows the simulations that were performed considering different scenarios of migrating super-Earths and the models for the gas effects defined in Table 1. TABLE 3 Summary of simulations performed considering different configurations of migrating super-Earths combined with gas effect models of Table 1. | Config. | Fiducial | Model | I Model II | |----------------------|--------------|---------|--------------| | Single | /check /star | × | /check | | Multiplanet/locked | /check | /check | /check | | Multiplanet/sequence | /check | × | /check | Note: The ' /star ' shows the case for which we have also carried simulations considering different size for the planetesimals, i.e. 10 and 1000km, the fiducial size being equal to 100 km. ## 3.2.1. Super Earths Migration Timescale A key issue is the effect of the super-Earths' migration timescale τ SE . As discussed above, the rate of type I migration is an open issue. Super-Earths may migrate either fast or slowly depending on the gas-disk structure and thermodynamics (see discussion in Section 1.1). For this reason, we have adopted two migration modes for the super-Earths in our simulations (Table 2), which we called of 'fast' and 'slow' migrating scenarios. Our fast inward migration is characterized by the timescale estimated in isothermal disk models for a 10 Earth-mass planet to migrate from 5 AU down to the star: 0.010.1 Myr (Ward, 1997). On the other hand, our slowmigrating planet(s) have migration timescales comparable to the gas-disk lifetime (Lyra et al., 2010; Horn et al., 2012), which we considered to range between 1 and 10 Myr. ## 3.2.2. Prescription for Super-Earth's migration In our simulations, the super-Earths' migration is implemented by applying an external synthetic torque to each planet's orbit such that its semimajor axis varies as $$a _ { p } ( t ) \simeq a _ { i n i } + \Delta a \frac { t - t _ { i n i } } { \tau _ { \text{SE} } } \quad \quad ( 1 7 )$$ where a ini is the initial semimajor axis of the planet, ∆a is the radial displacement, t is the time, t ini is the time that each planet starts to migrate and τ SE is the timescale for planet migration as mentioned before. The ∆a value of each migrating super-Earth is purposely chosen such that the inward-migrating planet comes sufficiently close to the star to be artificially removed from the simulation (according to our criterion of removal) on the timescale /similarequal τ SE . ## 4. RESULTS As a super-Earth migrates through a sea of planetesimals and protoplanetary embryos, any given small body will follow one of three possible evolutionary pathways. Planetary bodies are either shepherded, scattered into external orbits, or accreted by super-Earths during their passage (Ward &amp; Hahn, 1995; Tanaka &amp; Ida, 1996; 1997). No planetary embryos or planetesimals were ejected in any of our simulations, simply because the relative velocities between the super-Earths and these objects are too small to scatter objects strongly enough (e.g., Ford &amp; Rasio 2008). When a super-Earth interacts with the disk of planetesimals and planetary embryos it stir ups these objects and increases their velocity dispersion by gravitational scattering (Lissauer, 1987). The protoplanetary objects recoil in semimajor axis away from the super-Earth while they are scattered into more eccentric and inclined orbits. If an efficient dissipative force acts at the same time on the protoplanetary objects, such as aerodynamic gas drag, dynamical friction or tidal damping from the disk of gas, their orbits tend to be circularized. As a result, these objects are driven inward, ahead of the migrating superEarth, which results in an effective shepherding process. If, instead, there are no efficient dissipative forces acting on the protoplanetary bodies, the latter have their orbits perturbed until they eventually cross the orbit of the super-Earth. This favors collisions with the superEarth or scattering into external orbits (Tanaka &amp; Ida, 1999; Mandell et al 2007). Below we detail the evolution of the system in these various scenarios (as summarized in Tables 1, 2 and 3). ## 4.1. A Single Migrating Super-Earth We first present the results of simulations with a single migrating super-Earth. The super-Earth is initially placed at 5 AU (see Table 2) and migrates inward at the start of the simulations. The semimajor axis of the super-Earth varies as in Eq (17) owing to the synthetic forces applied to its orbit. ## 4.1.1. Dependence of the Results on the Migration Speed Figures 2 and 3 show the dynamical evolution of two systems containing a single 10 Earth-mass planet migrating on different timescales. Both simulations were performed in the framework of our fiducial model (Table 1). Figure 2 shows the evolution of a simulation in which a super-Earth migrated inward in 0.1 Myr. The superEarth rapidly opens a gap around its orbit by scattering (or accreting) nearby planetesimals and protoplanetary embryos (Tanaka &amp; Ida, 1997). Within 0.01 Myr, the super-Earth has moved from 5 to 4.5 AU and the signature of scattering of nearby bodies is apparent. As the super-Earth migrates through the sea of planetesimals and embryos, it scatters most of the bodies it encounters onto external orbits rather than shepherding them along its own radial excursion. Consequently, at the end of the migration, the protoplanetary disk is only weakly perturbed by the passage of the super-Earth and a significant portion of the disk's initial mass survives the super-Earth's migration. Only about 5-10% of the protoplanetary bodies collide with the super-Earth instead of being scattered. An additional ∼ 10-15% of planetary embryos and planetesimals fall into the star. There are two explanations for the survival of most of the disk. First, the super-Earth is not very massive. A Jupiter mass planet migrating at this same migration rate would produce a very different outcome (Raymond et al., 2006). Second, the migration is fast. The gas drag and tidal forces acting on planetesimals and protoplanetary embryos do not have enough time to damp the eccentricities of the excited bodies, so shepherding is inefficient. Although most of bodies were scattered during the super-Earth's passage, the majority of the disk's solid mass remains confined within the original region. In fact, ∼ 75% of the initial mass of embryos and planetesimals survives inside 5 AU at the end of the simulation (Figures 2 and 4). This is also a consequence of the fast migration speed of the super-Earth, for two reasons. First, a fast migration speed implies that, for each object, the scattering phase is short; thus no object can be scattered onto a distant orbit. Second, a fast migration inhibits the shepherding process, as stated above. Although Figure 2 shows the dynamical evolution of the system only until 0.3 Myr, we numerically integrated the evolution of the system for another 10 Myr. This second part of the evolution follows a pattern that is well documented in the literature. While the gaseous disk is still present, planetesimals and embryos stay in a dynamically cold orbital configuration. This promotes the rapid growth of the embryos (Kokubo &amp; Ida, 2000). After gas dispersal, planetary embryos stir up planetesimals and increase their velocity dispersion, which drastically slows their own growth rate (Ida &amp; Makino, 1993). The system of embryos eventually becomes unstable and giant collisions start, leading to the formation of a terrestrial planets in stable orbits (Chambers &amp; Wetherill, 1998). In figure 2, it is evident that the emergence of terrestrial-like planets is likely to happen given that, after the super-Earth migration and gas dissipation, the mass between 0.7 and 1.5 AU is about ∼ 1M . ⊕ Figure 3 shows a contrasting scenario with a slowly migrating super-Earth. The migration timescale τ SE is 5 Myr. This slow migrating mode results in trends significantly different from those in Figure 2. First, before the super-Earth reaches the terrestrial planet region the number of planetesimals has decreased drastically owing to accretion by protoplanetary embryos. Second, most embryos are shepherded inward by the super-Earth instead of being scattered onto external orbits. This is because the slow migration rate of the super-Earth, combined with the strong gas dissipative effects on the embryos, favors capture into mean motion resonances between the super-Earth and the embryos. Long chains of embryos in mean motion resonance are maintained until the bodies reach a heliocentric distance of 0.1 AU and are removed from the simulation. In this case the amount of leftover material in the terrestrial zone after the passage of the super-Earths is likely insufficient to build a 1 Fig. 2.Snapshots of the dynamical evolution of a disk of planetesimals and protoplanetary embryos in presence of a single migrating Super-Earth with mass equal to 10M ⊕ . The gas disk lifetime is τ gas = 10Myr, and the super-Earth migrates on a timescale τ SE = 0 1Myr. . The left-hand panel shows the dynamical evolution in a diagram semimajor axis versus eccentricity while the right-hand panel shows the dynamical evolution in a diagram semimajor axis versus inclination. The size of each dot is proportional to M 1 / 3 , where M is the mass of the corresponding body. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-576af1f6-2748-482b-9520-558998f2618a.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-87049bcb-ed95-4573-a7fd-1a39a209e631.jpg) Earth-mass planet around 1 AU. Figure 4 shows the final mass distribution of protoplanetary embryos and planetesimals in the disk after the super-Earth passage for simulations considering different timescales for super-Earth's migration. For all cases, the mass distribution is computed at 10 Myr. For each scenario, the results of 3 or more different simulations with slightly different initial conditions for planetary embryos and planetesimals are shown (see Section 2.1). When considering the fiducial model, a migration timescale longer than 1 Myr results in an effective shepherding process. For these cases, the final amount of mass between 0.7 and 1.5 AU is, in general, much smaller than 1 Earth mass, if not equal to zero. see that in those simulations where the gas disk dissipates faster, the final disk of planetesimals and embryos tends to be slightly less depleted. ## 4.1.2. Gas Effects We have also analyzed how the dissipation timescale of the gaseous disk affects the final results. Our analysis is made by comparing the results of the simulations of Figure 4, where τ gas = 10 Myr, with simulations enacting the same super-Earth migration rates but using smaller values for τ gas . These simulations were in the framework of our fiducial model. Figure 5 shows the results for the faster dissipation timescales. Again, the cumulative mass is shown for all cases at 10 Myr. Comparing Figure 4 and Figure 5 we note that different dissipation timescales do not change the results dramatically. However, looking in detail we A more dramatic way to highlight the effects of gas is to compare with simulations that neglect the gasdamping effects on planetesimals and protoplanetary embryos (Model II). The resulting mass distributions in the disk are also shown in Figure 5. For fast-migrating superEarths ( τ SE ≤ 1 Myr) there is little difference between the simulations with and without gas drag. Gravitational scattering is the dominant process in these systems. But for a slowly migrating super-Earth gas drag plays a very important role. If gas drag is neglected a much larger fraction of terrestrial material survives at 1 AU than when gas drag is included. Accounting for the gas dissipative effects on the protoplanetary embryos (embryos and planetesimals) is crucial for the realism of the simulations. ## 4.2. Multiplanet Configuration of Migrating Super-Earths In this section we present the results of simulations considering a multiplanet configuration of migrating super-Earths. We include six super-Earths with masses similar to those of the planets in the Kepler 11 system (Lissauer et al., 2011, 2013). The exact locations of these planets at the beginning of our simulations are shown in Table 2. We explored many different scenarios, con- Fig. 3.Same as Fig. 2, but for a case where τ gas = 10Myr, and τ SE = 5Myr. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-ebbc174b-f588-41e0-aee1-16ca9355086d.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-ffab1afb-e40a-4002-8afd-6bfeeb55987a.jpg) sidering different migration timescales for these bodies, gaseous disk lifetimes, and two different arrangements for the migrating bodies, as defined in section 3.2. The results of simulations considering the scenario 'migration in sequence' will be presented in Section 4.2.3. ## 4.2.1. Migration Speed When considering a convoy of migrating super-Earths, the migration speed has the same effect as for a single super-Earth. That is, when the super-Earths migrate fast, on a timescale ∼ 0.1 Myr or shorter, the protoplanetary disk is only weakly disturbed and a significant fraction of the initial mass survives after the migration. Figure 6 shows the dynamical evolution of 6 superEarths migrating together (in a locked configuration) on a timescale of 0.1 Myr. Of course, the protoplanetary disk is more disturbed than when a single super-Earth is considered. However, the system is quickly cooled down owing to the dissipative effects of the gas exerted on planetary embryos and planetesimals after the passage of the super-Earths. Figure 7 shows a simulation of a system of slowly migrating super-Earths ( τ SE = 5 Myr). As expected, shepherding dominates over scattering, as was the case for a single super-Earth. After the super-Earths migration, the region between 0.5 and 3 AU is virtually devoid of solid material. Figure 8 shows the final cumulative mass distributions in the disk of planetesimals and planetary embryos for simulations for different super-Earth migration speeds. These simulations are similar to those in Figure 4 for the fiducial model with a single super-Earth. However, as expected, less material survives around 1 AU for the migrating multiple-super-Earth system, reducing the probability of forming terrestrial planets (or perhaps just producing lower-mass terrestrial planets; Raymond et al 2007b). Given the stronger scattering in the multiplanet scenario, some planetesimals and embryos survive on distant orbits, with semimajor axes up to 14 AU. In contrast, nothing was scattered past 7-8 AU in the simulations with a single super-Earth migrating at the same speed (compare Figure 8 with Figure 4). ## 4.2.2. Dependence on planetesimal size and type-I migration of planetary embryos Planetesimal Size -We ran a suite of simulations all adopting the same timescales for the super-Earth's migration and for the gas disk dissipation. We find that that the planetesimal size does not significantly change the trends observed before for planetesimals sizes of 100 km. Figure 9 shows a comparison between the final cumulative mass distributions in simulations with planetesimal sizes of 10 and 1000 Km. This comparison is done considering the multiple-super-Earth system, for two different migration timescales. Simulations with smaller planetesimals tend to produce final protoplanetary disks with a smaller amount of surviving mass. This happens for two reasons. Smaller planetesimals undergo faster radial drift than bigger ones, so many spiral onto the star before the super-Earth's passage. Second, when planetesimals are smaller their orbits are more effectively damped by gas Fig. 4.Cumulative mass distribution vs semimajor axis in the protoplanetary disk, after the super-Earth's passage, for different migration speeds. All these results corresponds to simulations considering a single migrating super-Earth. The solid line represents the original mass distribution in protoplanetary embryos and planetesimals. Solid lines overlapped by points represent simulations conducted in the framework of our fiducial model. The point styles on the lines represent three different simulations (a, b and c) with only slightly different initial condition for the planetary embryos and planetesimals. The time at which the cumulative mass distribution is computed is 10 Myr. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-359f2d13-b229-4dad-93c4-8940525de18e.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-3762f506-2974-48a0-a520-12f795254679.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-113a5e7f-254f-4d94-976c-59ee29b12825.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-dbbaa2e4-53f8-43ad-85e7-7486079e0c09.jpg) drag and therefore they are more efficiently accreted by the protoplanetary embryos, which are then pushed toward the star by the migrating super-Earths. Effects of type-I migration of planetary embryos -We also performed simulations including type I migration of planetary embryos. These experiments correspond to Model I (Table 1). Type I migration of planetary embryos was taken into account in two ways. In the first series of simulations we imposed the nominal type I migration rate, given by Eq. 10. In the second series, we considered a reduced type-I migration rate, 10 times slower than the nominal one. Recall that our fiducial model neglects type-I migration of the planetary embryos (i.e. t m = ∞ in Eq. 10). rates for the super-Earths and dissipation timescales for the gas. In general, the simulations implementing type I migration of the embryos present trends similar to those of our fiducial model. However, qualitatively, the faster the type I migration of the embryos the smaller the final mass in the protoplanetary disk. In order to explain that, we have to consider separately the two different scenarios of migration of super-Earths: fast and slow. Representative results of these simulations are shown in Figure 10, again in the form of the final cumulative mass distributions in the disk of embryos and planetesimals. The two panels correspond to different migration When super-Earths migrate slowly ( τ SE ≥ 1Myr) many protoplanetary embryos initially in the inner parts of the disk spiral down onto the star before the super-Earth's passage. Indeed, one could also imagine that planetary embryos scattered by the super-Earths onto distant orbits might type I migrate back into the terrestrial planet region near 1 AU. We find that this process is not very effective. First, very few planetary embryos are scattered on distant orbits when super-Earths migrate slowly (similar to Figures 3 and 7) . Second, in general, those scattered protoplanetary embryos do not have not enough Fig. 5.Same as Fig. 4 but for simulations with different gas dissipations timescales. Solid lines overlapped by points represent simulations with the value of τ gas reported in the panel, while dashed lines overlapped by points correspond to the results obtained within Model II, i.e. neglecting all damping effects of the gas. The values of τ diss are also shown. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-346b73b2-a932-416a-831b-ef1586d9e8da.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-23d2d1ae-fc3d-4d78-844d-c49700abffad.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-d7920e27-5370-44e4-8d36-894855cba03c.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-36692383-ca0f-4f47-baed-6667921aec75.jpg) time to migrate from larger distances to the star to the terrestrial planet region because the gas disk dissipates shortly after the migrating super-Earths cross the terrestrial region. Third, even in our extreme cases where gas lasts relatively longer after super-Earths passage (eg. τ gas =10 Myr and τ SE = 3Myr), these migrating planetary embryos are very few (2 or 3) and rarely are found in the terrestrial planet region at the time the gas is gone. Obviously, as the mass of these bodies are in general ∼ 0.1M ⊕ it is quite unlikely that they be able to collide and accrete to form an Earth-sized planet near/in the terrestrial zone. protoplanetary disks with less amount of mass compared to similar experiments using our fiducial model. However, as advised before, if super-Earths in reality stop at the inner edge of the gas disk many planetary embryos could be saved from the infall onto the star if caught in exterior mean motion resonances with the super-Earths and other embryos. The resonance chain would extend up to ∼ 1 AU or not depending on the final number of planetary embryos in the chain, and the disk edge location where the migration of the super-Earth stops (or the location of the farthest super-Earth from the sun in the case of multiplanet system of super-Earths). When super-Earths migrate fast, most of protoplanetary embryos and planetesimals survive the superEarth's passage but planetary embryos continue spiraling toward the star until the gaseous disk dissipates. Thus, during this period (after super-Earths passage until gaseous disk dissipation) many migrating protoplanetary embryos reach heliocentric distance equal to 0.1 AU and are removed from our simulations. As consequence of this process, these simulations also tend to produce final ## 4.2.3. Super-Earths Migrating in Sequence Instead of migrating in a multiresonant configuration, super-Earths might migrate independently from each other. This phenomenon could be the result of planets forming in sequence at different times. Figure 11 shows snapshots of the dynamical evolution of a system with 6 super-Earths migrating in sequence. In this case, the migration of super-Earths covers a time span Fig. 6.Same as Figure 3, but for a system of 6 super-Earths. The gas disk lifetime is τ gas = 10Myr, and the super-Earths migrate on a timescale τ SE = 0 1Myr in a locked-configuration. . ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-93e20610-bcc3-453c-b68e-0f80e51a7fdf.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-53ab192f-a530-438c-8950-68acbc5cb4b4.jpg) τ SE = 5Myr. Each super-Earth migrates inward on a timescale τ SE = 5Myr 6 = 0 83Myr. / . When they migrate one by one, each super-Earth triggers its own shepherding and scattering process. After the migration of all super-Earths, only a small fraction of the initial mass in solids survives between 0.5 and 1.5 AU. The effect of the migration timescale is similar for the migration-in-sequence scenario to the locked migration case. If each super-Earth migrates on a timescale smaller than or equal to 0.1 Myr the disk is weakly disturbed. However, if they migrate more slowly then only a small amount of mass tends to survive around 1 AU. Figure 12 shows this using cumulative mass distributions. When the migration timescale is equal to 0.1 or 1 Myr, the results produced by the locked and in-sequence scenarios are indistinguishable. However, for slower migration cases, when τ SE = 5 or 10 Myr, despite the total surviving mass inside 14 AU being about the same, the simulations with locked migration tend to produce more depletion in the inner parts. This is because the shepherding process is more effective when super-Earths migrate in the locked configuration than in sequence (see Figures 7 and 11). In addition, bodies can be scattered onto more distant orbits if the super-Earths migrate in a locked configuration, because they can be gravitationally passed outward from one super-Earth to the next. ## 4.3. Radial Mixing We now consider the radial mixing of protoplanetary bodies in the disk. The degree of radial mixing deter- mines each planet's feeding zone, and the feeding zone is the most important factor in determining each planet's composition (e.g., Morbidelli et al 2000; Raymond et al 2007a, b; Izidoro et al 2013; 2014). The degree of radial mixing between planetesimals and planetary embryos depends on the super-Earths' migration speed. Figure 13 shows that in simulations where super-Earths migrate fast there is little mixing. Shepherding of embryos is ineffective when the super-Earths migrate fast. There is some mixing from scattering by sending particles to larger semimajor axis. In fact, in each bin in Fig. 13 there is little material from farther out but some from close-in. Despite that this configuration of migration does not help to bring volatiles in large quantities from the outer part of the disk to the inner part, the subsequent gravitational interaction between planetesimals and planetary embryos during their final stage of growth may be able to promote some degree of radial mixing of material. Thus, it could still be possible to form Earth-size planets around 1 AU carrying some amount of water and other volatiles delivered by bodies originated from larger heliocentric distances (e.g. Quintana &amp; Lissauer, 2014). In contrast, when super-Earths migrate slowly there is significant radial mixing. This occurs because of the very effective shepherding of material toward the star. Figure 14 shows the radial mixing for the simulations from Figures 3 and 4. The upper panel in Figure 14 correspond to the snapshot in Figure 3 when the time is equal to 4.7 Myr. The lower panel in Figure 14 correspond to Fig. 7.Same as figure 6, but for τ SE = 5Myr ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-c3840e59-ce45-4f66-a2e6-01f5c0af953c.jpg) the snapshot in Figure 7 when the time is equal to 4.2 Myr. At these times the planetesimals and protoplanetary embryos have not yet been pushed inside of 0.1 AU and removed from the simulation. As shown in all these figures, most of the planetesimals and planetary embryos initially inward of 4 AU are pushed inside 1 AU by the super-Earths. Figure 14 shows this compression of mass inside 1 AU. More than 60-70% of the total initial mass ( ∼ 10M ⊕ ) of the disk carried by protoplanetary embryos and planetesimals is confined inside 1 AU. Because we are mainly interested in the late accretion of terrestrial-like planets beyond 0.5 AU, in our simulations we remove bodies when they reach orbital radii smaller than 0.1 AU (eg. the last snapshots in Figure 3 and 7). However, in reality, if the super-Earths migration stops (e.g. at the inner edge of the disk), the shepherded material can survive and generate one or more additional planets. Migrating super-Earths qualitatively change the compositional gradients in a planetary system. The superEarths probably originate beyond the terrestrial planetforming region and are therefore likely to be more volatile-rich. When they migrate inward quickly, they pass through the rocky terrestrial planet-forming material and stop at the inner edge of the disk. Thus, the innermost planets of the system are volatile-rich but the more distant, 'terrestrial' planets may be rocky. Even more distant planets are likely to again be volatile-rich. There is simply a belt that may contain rocky worlds. The situation is different for slowly migrating superEarths. In that case, the material that originated interior ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-93687925-35f8-488d-9777-46d23f275ebb.jpg) to the super-Earths is shepherded inward. In some cases the shepherded embryos may grow massive enough to stop at the inner edge of the disk (Masset et al 2006). The planets that form from shepherded material have feeding zones that encompass the entire planetary system interior to the innermost super-Earth's starting location. If super-Earths form at ∼ 5 AU, then this may include a large fraction of material with composition akin to Ctype asteroids with significant volatile contents (typically ∼ 10% water; e.g., Demeo &amp; Cary 2014). Alternately, if shepherded planetary embryos do not grow large enough to halt the migration then they are likely to be destabilized and scattered once they enter the inner parts of the system. They may be pushed interior to the inner edge of the disk into a gas-free cavity (e.g., Cossou et al 2014) and will likely be accreted onto the super-Earths. This would slightly 'dilute' the volatilerich super-Earths. Such a system would not contain any rocky planets. Migrating super-Earths clearly strongly shape the compositional gradient of their parent systems (see also Table 1 of Raymond et al 2008). Constraints on the compositions of super-Earths around other stars (see Marcy et al 2014) are therefore especially important in understanding the formation of these systems. The most valuable pieces of information for such studies are compositional constraints on multiple planets in the same system. Once this information is available, the interpretation of each system in terms of formation mechanisms has to be done on a case-by-case basis, but we hope that the analysis presented above will provide some general guidelines Fig. 8.Same as Figure 4 but for a system of six super-Earths with different migration timescales, reported on each panel. The super-Earths migrate in a locked configuration. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-d7db609c-6d96-4ef1-8b92-f8c40d0e92d6.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-d9d37082-6fd1-4d39-8db1-5afcc1a6b8b0.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-57e58147-e113-4018-918c-1e2e718ec21a.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-4e2ca47a-6139-49c3-8b4e-b49adbd7dc02.jpg) to narrow the range of possible scenarios to search. ## 5. DISCUSSION ## 5.1. Formation of habitable planets Super-Earths (and mini-Neptunes) are known to exist close to at least 30-50% of main-sequence FGKM stars (e.g., Howard et al 2010, 2012; Mayor et al 2011; Fressin et al 2013). If these planets formed in situ via the pileup of migrating material (Hansen, 2014; Chatterjee, &amp; Tan; 2014; Boley &amp; Ford, 2013) one should expect that terrestrial planets with smaller masses should be present farther out, possibly reaching the habitable zone. However, if super-Earths formed in the outer disk and migrated to their current location, the effect of their migration must be taken into account when considering the formation of Earth-sized planets in the habitable zone. al., 1993; Selsis et al 2007; Kopparapu et al., 2013, 2014; Leconte et al 2013). The fraction of Sun-like stars with Earth-sized or super-Earth-sized planets in the HZ has recently been estimated as ∼ 6% (Petigura et al 2013; see also Dong &amp; Zhu 2013). This fraction has been estimated as being even higher - roughly 40% - for low-mass stars (Bonfils et al 2013; Fressin et al 2013; Gaidos 2013; Tuomi et al 2014). The habitable zone of a star (HZ) is defined as the range of heliocentric distances at which an Earth-sized planet could keep liquid water on its surface, given certain assumptions for the planet's atmosphere and mass. A conservative estimate for our solar system suggests that the HZ is between 0.95 and 1.67 AU (Kasting et Our results suggest that Earth-sized planets in the habitable zone may not always be Earth-like. If super-Earths migrated in quickly, then rocky planetary embryos and planetesimals are only modestly disturbed. Rocky planets like Earth should form readily. However, if superEarths migrated slowly, then the rocky material was all pushed into the innermost parts of the system. Any planets in the HZ are likely to be super-Earth-like and not Earth-like. In other words, these planets would likely be extremely volatile-rich. They would be akin to the minicores proposed by Raymond et al (2014) rather than true Earth analogues, even at sizes comparable to Earth. One recent study (Alibert, 2014) suggests that mini-cores are not habitable, because they possess too much water for Fig. 9.Same as Figure 4, for different planetesimal sizes and two migration timescales for super-Earths. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-4cdc8b55-37f3-4019-a28d-fd6ca3a497a8.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-2f916673-2c27-4b69-b734-5202531cb1ab.jpg) their mass, so that a layer of high-pressure sub-oceanic ice is expected, isolating the hydrosphere from the crust and preventing a successful CO cycle. Given the complex feedbacks inherent in any planet (e.g., Kasting &amp; Catling 2003), we cannot claim to assess the habitability of such non-Earth-like worlds. We hope that our work can stimulate additional studies in this area. ## 5.2. The solar system in context With no super-Earths in the inner planetary system and no planets inside of Mercury's orbits, our solar system is an oddity compared to the 'typical' planetary system. According to our current understanding of solar system evolution, the peculiar structure of our system is mainly due to three properties: - · (i) The inner disk was deficient in solid material relative to the outer disk, so that in the inner part only Mars-mass planetary embryos formed before gas removal while the outer part managed to generate at least 4 massive planetary cores. - · (ii) The innermost two major planets (Jupiter and Saturn) happened to be giant planets with a mass ratio preventing long-lasting inward migration (the so-called Grand-Tack scenario, see Masset and Snellgrove, 2001; Morbidelli &amp; Crida, 2007; Walsh et al., 2011; Pierens &amp; Raymond 2011). - · (iii) The presence of Jupiter and Saturn on orbits not migrating inward prevented Uranus and Neptune from migrating into the inner solar system. Without Jupiter and Saturn, Uranus and Neptune would have become 'typical' close-in super-Earths (Morbidelli, 2014) Fig. 10.Same as Fig. 9 but comparing results obtained imposing different type-I migration timescales on the planetary embryos. 'N. type-I ' ' labels represent simulations using the nominal type-I migration rate for planetary embryos while the 'R. type-I' ' labels represent simulations where is applied a reduced type-I migration rate for planetary embryos (see Section 3.1). These results corresponds to simulations within the model I. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-b0a74f85-c1c7-49ac-a806-7e13ea1c1673.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-a4b2473a-01ae-449a-93f0-c6664d6c6ac3.jpg) It is clear that the properties above, particularly property (II) are nongeneric and require some lucky combination of events. The specific formation and evolution pattern of the solar system, as improbable as it may be, obviously led to Fig. 11.Same as Figure 7, but for a system of super-Earths migrating in sequence. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-2d2ef53f-3ee7-4a7c-95cc-50e09f36b880.jpg) ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-55876cd3-82a6-41a3-b598-19b97010dc4f.jpg) the formation of a habitable and inhabited planet. It is not clear, though, whether this specific pattern is necessary for the emergence of habitable terrestrial planets, or other more generic patterns could be equally good. If the latter were the case, it would be strange that we live in an 'odd' system, rather than in a typical one. We have shown that if super-Earths migrate slowly inward then the formation of terrestrial planets is stunted in the habitable zone. In this case, the most typical planetary systems would not host habitable planets; thus something like our solar system is needed, refraining super-Earths from migration. However, if super-Earths form in situ or migrate quickly through the habitable zone this is not the case. Not knowing yet enough about super-Earth formation and migration, unfortunately we cannot conclude on the place of our solar system in the context of habitable planets. Earths migration process for the later accretion of terrestrial planets in these systems. Type I migration of Earthmass planets is complicated and sensitive to the disk properties (Paardekooper et al 2011; Kretke &amp; Lin 2012; Bitsch et al., 2013, 2014). To cover the range of plausible outcomes we considered different migration speeds for super-Earths. Fast migration is consistent with isothermal disk models (e.g., Ward 1997; Tanaka et al 2002). Slow migration assumes that super-Earths are trapped at zero-torque zones that themselves migrate inward on roughly the disk's evolutionary timescale (e.g., Lyra et al 2010, Horn et al 2012). Simulations were performed considering a single and also a system of migration superEarths. ## 6. CONCLUSIONS The Kepler mission (Borucki et al 2010; 2011) has discovered a plethora of planets with orbital period shorter than 100 days. Statistical analysis based on the detection rate and bias evaluation indicates that this class of planets should be present in at least 30-50 percent of sun-like stars (e.g., Howard et al 2012; Fressin et al 2013; Petigura et al 2013). Two models can form this population of planets: in situ accretion and inward migration (see Raymond et al 2008, 2014). There are a number of reasons to favor the inward-migration model (Terquem &amp; Papaloizou 2007, Cossou et al 2014). In this paper we explore the consequences of the super- Fast-migrating super-Earths only weakly disturb the disk of planetesimals and planetary embryos. A significant part of the original mass of the disk survives within its initial semimajor axis distribution. Consequently, the later emergence of terrestrial planets in these systems is very probable. However, in the slow migration scenario, where the migration timescale for the super-Earths is ∼ 110 Myr, most protoplanetary embryos and planetesimals are shepherded in resonances by the super-Earths and pushed toward the star. This is particularly the case if the gas effects are strong: tidal damping of the eccentricities and inclinations of the protoplanetary embryos and gas drag on the planetesimals. Of course, given that the super-Earths' migration is gas-driven, gas must be present and shepherding is a natural outcome of slow inward migration of super-Earths. Shepherding strongly depletes the disk in and near the habitable zone. The j Fig. 12.Same as Figure 4, but comparing the results of simulations where the super-Earths migrate in sequence versus in a locked configuration. Different panels refer to different migration timescales. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-566093ea-a8db-4029-8da8-e49d2aa56466.jpg) subsequent formation of terrestrial-like planets is unlikely, so any planets that form in the habitable zone must be super-Earth-like rather than Earth-like. The material shepherded inward from interior to the superEarths' initial orbits ( /lessorsimilar 4 AU) toward the star could stimulate the formation of rocky close-in planets. In that case rocky planets could exist closer in than volatile-rich ones, although neither would have compositions representative of the condensation in their final locations. We thank an anonymous referee for the careful reading of our manuscript and the valuable comments. A. I. thanks financial support from CAPES Foundation (Grant: 18489-12-5). A. M. and S. R thank the Agence Nationale pour la Recherche for support via grant ANR13-BS05-0003 (project MOJO). We thank the CRIMSON team for managing the mesocentre SIGAMM of the OCA, where these simulations were performed. ## ACKNOWLEDGEMENTS ## REFERENCES Adachi, I., Hayashi, C., &amp; Nakazawa, K. 1976, Progress of Theoretical Physics, 56, 1756 Alibert, Y. 2014, A&amp;A, 561, A41 Armitage P. J., 2010, Astrophysics of Planet Formation. Cambridge Univ. Press, Cambridge, UK Baruteau, C., &amp; Masset, F. 2008, ApJ, 672, 1054 Baruteau, C., &amp; Papaloizou, J. C. B. 2013, ApJ, 778, 7 Batalha, N. M., Rowe, J. F., Bryson, S. T., et al. 2013, ApJS, 204, 24 Batygin, K., &amp; Morbidelli, A. 2013, AJ, 145, 1 Bitsch, B., Crida, A., Morbidelli, A., Kley, W., &amp; Dobbs-Dixon, I. 2013, A&amp;A, 549, A124 Bitsch, B., &amp; Kley, W. 2011, A&amp;A, 536, A77 Bitsch, B., Morbidelli, A., Lega, E., &amp; Crida, A. 2014, arXiv:1401.1334 Boley, A. C., &amp; Ford, E. B. 2013, arXiv:1306.0566 Bolmont, E., Raymond, S. N., von Paris, P., et al. 2014, ApJ, 793, 3 Bonfils, X., Delfosse, X., Udry, S., et al. 2013, A&amp;A, 549, A109 Borucki, W. J., Koch, D., Basri, G., et al. 2010, Science, 327, 977 Borucki, W. J., Koch, D. G., Basri, G., et al. 2011, ApJ, 736, 19 Borucki, W. J., Agol, E., Fressin, F., et al. 2013, Science, 340, 587 Brasser, R., Duncan, M. J., &amp; Levison, H. F. 2007, Icarus, 191, ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-e36e2a1b-f010-4d46-9227-ac084e3f3acd.jpg) Fig. 13.Radial mixing of protoplanetary embryos and planetesimals after super-Earth(s) passage for three different configurations of migrating super-Earths. Different configurations are shown on each panel. The super-Earth migration timescale is τ SE =0.1Myr. The histogram base shows different regions around the star. Dashed histogram-boxes show the total amount of mass in protoplanetary embryos and planetesimals for such regions in the beginning of our simulations. Each color-histogram-bar is composed by smaller boxes showing the fraction of mass that came from different locations. The colors represent 5 different source regions of material. The sum of the different fractions, for each region shown in the histogram base, gives the respective total amount of mass left after super-Earth passage. These panels show average values computed from 3 simulations with slightly different initial conditions for protoplanetary embryos and planetesimals. All these results were obtained within the fiducial model. Chambers, J. E. 2001, Icarus, 152, 205 Chambers, J. E., &amp; Wetherill, G. W. 1998, Icarus, 136, 304 Chatterjee, S., &amp; Tan, J. C. 2014, ApJ, 780, 53 Chatterjee, S., &amp; Ford, E. B. 2014, arXiv:1406.0521 Chiang, E., &amp; Laughlin, G. 2013, MNRAS, 431, 3444 Cresswell, P., &amp; Nelson, R. P. 2006, A&amp;A, 450, 833 Cresswell, P., &amp; Nelson, R. P. 2008, A&amp;A, 482, 677 Crida, A., &amp; Morbidelli, A. 2007, MNRAS, 377, 1324 Crida, A., Morbidelli, A., &amp; Masset, F. 2006, Icarus, 181, 587 Cossou, C., Raymond, S. N., &amp; Pierens, A. 2013, A&amp;A, 553, L2 Cossou, C., Raymond, S. N., Hersant, F., &amp; Pierens, A. 2014, arXiv:1407.6011 Cumming, A., Butler, R. P., Marcy, G. W., et al. 2008, PASP, 120, 531 DeMeo, F. E., &amp; Carry, B. 2014, Nature, 505, 629 Delisle, J.-B., &amp; Laskar, J. 2014, arXiv:1406.0694 Dong, S., &amp; Zhu, Z. 2013, ApJ, 778, 53 Duncan, M. J., Levison, H. F., &amp; Lee, M. H. 1998, AJ, 116, 2067 Fabrycky, D. C., Lissauer, J. J., Ragozzine, D., et al. 2014, , ApJ, 790, 146 Fogg, M. J., &amp; Nelson, R. P. 2005, A&amp;A, 441, 791 Fogg, M. J., &amp; Nelson, R. P. 2007a, A&amp;A, 461, 1195 Fogg, M. J., &amp; Nelson, R. P. 2007b, A&amp;A, 472, 1003 Fogg, M. J., &amp; Nelson, R. P. 2009, A&amp;A, 498, 575 Ford, E. B. 2014, arXiv:1404.3157 Ford, E. B., &amp; Rasio, F. A. 2008, ApJ, 686, 621 Fortney, J. J., Marley, M. S., &amp; Barnes, J. W. 2007, ApJ, 659, 1661 Fressin, F., Torres, G., Charbonneau, D., et al. 2013, ApJ, 766, 81 Gaidos, E. 2013, ApJ, 770, 90 Fig. 14.Same as Figure 13 but for super-Earths migrating in a timescale τ SE =5Myr. Each panel shows the result obtained for a single simulation. The time at which the radial mixing is computed is indicated on each panel and correspond to one of the snapshots shown in Figure 3 (4.7 Myr - upper panel) and Figure 7 (4.2 Myr - lower panel). ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1215v2-figure-a799bbd0-13f5-4975-a48f-54fb91a4dcde.jpg) - Goldreich, P., &amp; Schlichting, H. E. 2014, AJ, 147, 32 Goldreich, P., &amp; Tremaine, S. 1980, ApJ, 241, 425 Haisch, K. E., Jr., Lada, E. A., &amp; Lada, C. J. 2001, ApJ, 553, L153 Hansen, B. M. S. 2014, MNRAS, 440, 3545 Hansen, B. M. S., &amp; Murray, N. 2012, ApJ, 751, 158 Hansen, B. M. S., &amp; Murray, N. 2013, ApJ, 775, 53 Hayashi, C. 1981, Progress of Theoretical Physics Supplement, 70, 35 Horn, B., Lyra, W., Mac Low, M.-M., &amp; S´ndor, Z. 2012, ApJ, a 750, 34 Howard, A. W., Marcy, G. W., Johnson, J. A., et al. 2010, Science, 330, 653 Howard, A. W., Marcy, G. W., Bryson, S. T., et al. 2012, ApJS, 201, 15 Ida, S., &amp; Makino, J. 1993, Icarus, 106, 210 Ikoma, M., &amp; Hori, Y. 2012, ApJ, 753, 66 Izidoro, A., Haghighipour, N., Winter, O. C., &amp; Tsuchida, M. 2014, ApJ, 782, 31 Izidoro, A., de Souza Torres, K., Winter, O. C., &amp; Haghighipour, N. 2013, ApJ, 767, 54 Kasting, J. F., Whitmire, D. P., &amp; Reynolds, R. T. 1993, Icarus, 101, 108 Kasting, J. F., &amp; Catling, D. 2003, ARA&amp;A, 41, 429 Kley, W., &amp; Crida, A. 2008, A&amp;A, 487, L9 Kley, W., &amp; Nelson, R. P. 2012, ARA&amp;A, 50, 211 Kokubo, E., &amp; Ida, S. 1998, Icarus, 131, 171 Kokubo, E., &amp; Ida, S. 2000, Icarus, 143, 15 Kokubo, E., &amp; Ida, S. 2002, ApJ, 581, 666 Kopparapu, R. K., Ramirez, R., Kasting, J. F., et al. 2013, ApJ, 765, 131 Kopparapu, R. k., Ramirez, R. M., SchottelKotte, J., et al. 2014, arXiv:1404.5292 Kretke, K. A., &amp; Lin, D. N. C. 2012, ApJ, 755, 74 Lambrechts, M., Johansen, A., &amp; Morbidelli, A. 2014, arXiv:1408.6087 Leconte, J., Forget, F., Charnay, B., Wordsworth, R., &amp; Pottier, A. 2013, Nature, 504, 268 Lin, D. N. C., &amp; Papaloizou, J. 1986, ApJ, 309, 846 Lissauer, J. J. 1987, Icarus, 69, 249 - Lissauer, J. J., Jontof-Hutter, D., Rowe, J. F., et al. 2013, ApJ, 770, 131 - Lithwick, Y., &amp; Wu, Y. 2012, ApJ, 756, L11 Lyra, W., Paardekooper, S.-J., &amp; Mac Low, M.-M. 2010, ApJ, 715, L68 - Lissauer, J. J., Ragozzine, D., Fabrycky, D. C., et al. 2011, ApJS, 197, 8 - Lovis, C., S´gransan, D., Mayor, M., et al. 2011, A&amp;A, 528, A112 e Lufkin, G., Richardson, D. C., &amp; Mundy, L. G. 2006, ApJ, 653, 1464 - Mandell, A. M., Raymond, S. N., &amp; Sigurdsson, S. 2007, ApJ, 660, 823 - Mandell, A. M., &amp; Sigurdsson, S. 2003, ApJ, 599, L111 - Marcy, G. W., Isaacson, H., Howard, A. W., et al. 2014, ApJS, 210, 20 - Masset, F., &amp; Snellgrove, M. 2001, MNRAS, 320, L55 - Masset, F. S., Morbidelli, A., Crida, A., &amp; Ferreira, J. 2006, ApJ, 642, 478 - Mayor, M., Marmier, M., Lovis, C., et al. 2011, arXiv:1109.2497 Mayor, M., Udry, S., Lovis, C., et al. 2009, A&amp;A, 493, 639 - Morbidelli, A., Chambers, J., Lunine, J. I., et al. 2000, Meteoritics and Planetary Science, 35, 1309 - Morbidelli A. 2014, Phil. Trans. R. Soc. A, 372, 20130072 - Morbidelli. A, &amp; Crida, A. 2007, Icarus, 191, 158 - Morbidelli, A., Lunine, J. I., O'Brien, D. P., Raymond, S. N., &amp; Walsh, K. J. 2012, Annual Review of Earth and Planetary Sciences, 40, 251 - Morbidelli, A., Crida, A., Masset, F., &amp; Nelson, R. P. 2008, A&amp;A, 478, 929 - Nelson, R. P. 2005, A&amp;A, 443, 1067 - Nelson, R. P., Papaloizou, J. C. B., Masset, F., &amp; Kley, W. 2000, MNRAS, 318, 18 - Nelson, R. P., &amp; Papaloizou, J. C. B. 2004, MNRAS, 350, 849 - Ogihara, M., &amp; Kobayashi, H. 2013, ApJ, 775, 34 - Papaloizou, J., &amp; Lin, D. N. C. 1984, ApJ, 285, 818 - Papaloizou, J. C. B., &amp; Larwood, J. D. 2000, MNRAS, 315, 823 - Papaloizou, J. C. B., Nelson, R. P., Kley, W., Masset, F. S., &amp; Artymowicz, P. 2007, Protostars and Planets V, 655 Paardekooper, S.-J., &amp; Mellema, G. 2006, A&amp;A, 459, L17 - Paardekooper, S.-J., &amp; Mellema, G. 2008, A&amp;A, 478, 245 - Papaloizou, J. C. B., &amp; Terquem, C. 2006, Reports on Progress in Physics, 69, 119 - Paardekooper, S.-J., Baruteau, C., &amp; Kley, W. 2011, MNRAS, - Paardekooper, S.-J., &amp; Papaloizou, J. C. B. 2008, A&amp;A, 485, 877 Petrovich, C., Malhotra, R., &amp; Tremaine, S. 2013, ApJ, 770, 24 Petigura, E. A., Howard, A. W., &amp; Marcy, G. W. 2013, - 410, 293 - Proceedings of the National Academy of Science, 110, 19273 - Pierens, A., Cossou, C., &amp; Raymond, S. N. 2013, A&amp;A, 558, A105 - Quintana, E. V., Barclay, T., Raymond, S. N., et al. 2014, Science, 344, 277 - Pierens, A., &amp; Raymond, S. N. 2011, A&amp;A, 533, A131 Pollack, J. B., Hubickyj, O., Bodenheimer, P., et al. 1996, Icarus, 124, 62 - Quintana, E. V., &amp; Lissauer, J. J. 2014, ApJ, 786, 33 - Raymond, S. N., Kokubo, E., Morbidelli, A., Morishima, R., &amp; Walsh, K. J. 2014, Protostars and Planets VI, University of Arizona Press (2014), eds. H. Beuther, R. Klessen, C. Dullemond, Th. Henning - Raymond, S. N., &amp; Cossou, C. 2014, arXiv:1401.3743 - Raymond, S. N., Mandell, A. M., &amp; Sigurdsson, S. 2006, Science, 313, 1413 - Raymond, S. N., Scalo, J., &amp; Meadows, V. S. 2007b, ApJ, 669, 606 - Raymond, S. N., Quinn, T., &amp; Lunine, J. I. 2007a, Astrobiology, 7, 66 - Raymond, S. N., Quinn, T., &amp; Lunine, J. I. 2005, ApJ, 632, 670 Raymond, S. N., Barnes, R., &amp; Mandell, A. M. 2008, MNRAS, 384, 663 - Rein, H., Payne, M. J., Veras, D., &amp; Ford, E. B. 2012, MNRAS, 426, 187 - Rein, H. 2012, MNRAS, 427, L21 - Safronov, V. S. 1972, Evolution of the protoplanetary cloud and formation of the earth and planets., by Safronov, V. S.. Translated from Russian. Jerusalem (Israel): Israel Program for Scientific Translations, Keter Publishing House, 212 p., - E. E., &amp; Naylor, T. 2013, arXiv:1311.7024 - Selsis, F., Kasting, J. F., Levrard, B., et al. 2007, A&amp;A, 476, 1373 Soderblom, D. R., Hillenbrand, L. A., Jeffries, R. D., Mamajek, - Tanaka, H., &amp; Ida, S. 1996, Icarus, 120, 371 - Tanaka, H., Takeuchi, T., &amp; Ward, W. R. 2002, ApJ, 565, 1257 - Tanaka, H., &amp; Ida, S. 1997, Icarus, 125, 302 - Tanaka, H., &amp; Ward, W. R. 2004, ApJ, 602, 388 - Terquem, C., &amp; Papaloizou, J. C. B. 2007, ApJ, 654, 1110 - Tanaka, H., &amp; Ida, S. 1999, Icarus, 139, 350 - Tuomi, M., Jones, H. R. A., Barnes, J. R., Anglada-Escud´, G., &amp; e Jenkins, J. S. 2014, arXiv:1403.0430 - Ward, W. R. 1986, Icarus, 67, 164 - Zhang, X., Li, H., Li, S., &amp; Lin, D. N. C. 2014, ApJ, 789, L23 Walsh, K. J., Morbidelli, A., Raymond, S. N., O'Brien, D. P., &amp; Mandell, A. M. 2011, Nature, 475, 206 - Ward, W. R. 1997, Icarus, 126, 261 - Weidenschilling, S. J. 1977, Ap&amp;SS, 51, 153 - Ward, W. R., &amp; Hahn, J. M. 1995, ApJ, 440, L25
10.1088/0004-637X/794/1/11
[ "André Izidoro", "Alessandro Morbidelli", "Sean N. Raymond" ]
2014-08-06T08:58:55+00:00
2014-09-11T09:42:17+00:00
[ "astro-ph.EP" ]
Terrestrial Planet Formation in the Presence of Migrating Super-earths
Super-Earths with orbital periods less than 100 days are extremely abundant around Sun-like stars. It is unlikely that these planets formed at their current locations. Rather, they likely formed at large distances from the star and subsequently migrated inward. Here we use N-body simulations to study the effect of super-Earths on the accretion of rocky planets. In our simulations, one or more super-Earths migrates inward through a disk of planetary embryos and planetesimals embedded in a gaseous disk. We tested a wide range of migration speeds and configurations. Fast-migrating super-Earths ($\tau_{mig} \sim$0.01-0.1 Myr) only have a modest effect on the protoplanetary embryos and planetesimals. Sufficient material survives to form rocky, Earth-like planets on orbits exterior to the super-Earths'. In contrast, slowly migrating super-Earths shepherd rocky material interior to their orbits and strongly deplete the terrestrial planet-forming zone. In this situation any Earth-sized planets in the habitable zone are extremely volatile-rich and are therefore probably not Earth-like.
1408.1216v1
## Half metallic ferromagnetism in tri-layered perovskites Sr T O 4 3 10 (T=Co, Rh) ## Madhav P. Ghimire 1 2 , , R. K. Thapa , D. P. Rai , Sandeep , 3 3 3 T. P. Sinha 4 and Xiao Hu 2 - 1 Nepal Academy of Science and Technology, P. O. Box 3323, Khumaltar, Lalitpur, Nepal - 2 International Center for Materials Nanoarchitectonics (WPI-MANA), National Institute for Materials Science, Tsukuba 305-0044, Japan - 3 Department of Physics, Mizoram University, Aizawl 796-004, India - 4 Department of Physics, Bose Institute, Kolkata 796-004, India E-mail: [email protected] Abstract. First-principles density functional theory (DFT) is used to investigate the electronic and magnetic properties of Sr 4 Rh O 3 10 , a member of the Ruddlesden-Popper series. Based on the DFT calculations taking into account the co-operative effect of Coulomb interaction ( U ) and spin-orbit couplings (SOC), Sr 4 Rh O 3 10 is found to be a half metallic ferromagnet (HMF) with total angular moment µ tot =12 µ B per unit cell. The material has almost 100% spin-polarization at the Fermi level despite of sizable SOC. Replacement of Rh atom by the isovalent Co atom is considered. Upon full-replacement of Co, a low-spin to intermediate spin transition happens resulting in a HMF state with the total angular moment three-time larger (i.e. µ tot =36 µ B per unit cell), compared to Sr Rh O 4 3 10 . We propose Sr 4 Rh O 3 10 and Sr 4 Co O 3 10 as candidates of half metals. PACS numbers: 85.75.-d, 75.70.Tj, 75.50.Cc, 71.15.Mb ## 1. Introduction The emerging developments of magneto-electronic devices have intensified research on novel materials that can be applied as a single-spin electron sources and highefficiency magnetic sensors [1]. One of the key points to achieve such materials is to manipulate the spin polarization by band engineering. Half metals (HMs) are one class of promising materials which are metallic in one spin channel, while insulating in the opposite spin channel due to the asymmetric band structures. HMs can generate fully spin-polarized currents without any external operation [2,3]. Ideally HM is specified by integer spin magnetization in units of Bohr magneton, where the total number of electrons per unit cell is an integer and all valence bands are fully filled in the insulating spin channel. HM states have been identified in several groups of materials which includes oxides (CrO ), mixed-valent manganites (La 2 1 -x A MnO x 3 where A=Ca, Ba, Sr), Heusler alloys (NiMnSb), perovskites (Sr 2 FeTO , where T=Mo, Re), etc. [4-18]. 6 A recent study on layered-perovskites belonging to the Ruddlesden-Popper (RP) series [19] exhibits novel properties desirable in spintronics [9]. In cobaltates, the single-layered compound Sr CoO 2 4 shows ferromagnetic (FM) as well as HM behavior [20, 21]. The same material is reported to show negative magnetoresistance [22]. La 1+ x Sr 2 -x Mn O 2 7 is found to exhibit colossal magnetoresistance (CMR) [23] while its nonstoichiometric samples shows novel microstructural features [24]. In ruthenates, the change in number n of RuO 2 layers leads to a variety of collective phenomena: spin-triplet chiral superconductivity [25] ( n = 1); heavy d -electron masses [26] ( n = 2 3), CMR effects [27] ( , n = 2) and itinerant ferromagnetism and metamagnetism ( n = 3) [28, 29] as well as HM ferromagnetism ( n = ∞ ) [30]. Furthermore, the delicate interplay between electron-electron correlation and spin-orbit coupling (SOC) in iridates gives rise to various unconventional phases. Insulator-metal transition was observed in Sr n +1 Ir n O 3 n +1 with increasing n [31]. Sr IrO 2 4 and Sr Ir O 3 2 7 have been realized as a J eff = 1 2 Mott-insulator evidenced by an experiment [31-35] whereas, / SrIrO 3 is a paramagnetic metal [35]. A newly synthesized tri-layered rhodate Sr Rh O 4 3 10 [36] belonging to Sr-Rh-O family in the RP series [19] comes into our attention with the unique properties. The crystal with general formula Sr n +1 Rh O n 3 n +1 (where n = 3) is built up by regular intergrowth of rock-salt Sr-O sheets and perovskites (SrRhO ) 3 n . Rh atoms carry on charge state +4 with spin magnetizations, and the material exhibits strong crystal distortion due to rotation and tilting of the octahedra. With a total of 68 atoms in its unit cell, the system has four formula units. The other member in the series includes well studied compounds such as Sr RhO , Sr Rh O , and SrRhO 2 4 3 2 7 3 [37-42]. In this study, we investigate for the first-time the electronic and magnetic properties of Sr 4 Rh O 3 10 by using first-principles density functional theory (DFT). The ground-state of Sr 4 Rh O 3 10 is found to be a half-metallic ferromagnet (HMF). With an integer total angular moment µ tot = 12 µ B per unit cell, the HM state is robust to strong electron-correlation and SOC effects. Replacement of Rh by Co atoms is considered in Sr 4 Rh O 3 10 . For full replacement, the material Sr 4 Co O 3 10 is a HMF with total magnetization increasing by three times of magnitude due to intermediate spin configuration. The insulating state of Sr 4 Co O 3 10 flips to the opposite spin channel in contrast with Sr 4 Rh O 3 10 . Figure 1. Crystal structure of the tri-layered perovskite Sr 4 Rh O 3 10 . O1 (planar) and O2 (apical) are the oxygen bonded to Rh ions forming RhO 6 octahedron. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1216v1-figure-c1c0376b-60b5-4a73-a190-7947753e6c41.jpg) ## 2. Crystal structures and methods Sr Rh O 4 3 10 crystallizes in an orthorhombic structure with space group Pbam as shown in figure 1. The unit cell is composed of triple layers of corner-shared RhO 6 octahedra separated by double rock-salt layers of Sr-O. Each layer is formed independently by two types of Rh atoms as shown in figure 1. In the crystal of Sr Rh O 4 3 10 two inequivalent oxygen atoms were found along the plane (O1) and along the apex (O2). The bond-lengths between Rh and planar (1.98 ˚ ) and apical (2.02 ˚ ) A A oxygens are different due to tilting and rotation of RhO 6 octahedron. The amplitude of rotation of RhO 6 octahedra estimated from experiments [36] is ∼ 12 ◦ which is close to that of Sr Rh O 3 2 7 (10.5 ◦ ) [41]. The electronic structure calculations were performed by using the full-potential linearized augmented plane wave plus local orbital method implemented in the WIEN2k code [43]. The atomic sphere radii ( R MT ) were 2.2, 2.07, 1.97 and 1.7 Bohr for Sr, Rh, Co, and O respectively. The standard generalized gradient approximation (GGA) exchange-correlation potential within the Perdew-Burke-Ernzerhof scheme [44] were used. The results presented below are for Coulomb interaction [45] U =3 and 5eV for Rh and Co, respectively, and we have confirmed that the main conclusions do not change with U = 1 ∼ 5eV for Rh and U = 4 2 . ∼ 8eV for Co [46]. The SOC was considered via second variational method using the scalar-relativistic orbitals as basis. Starting from the experimental results [36], we optimize the lattice parameters to determine the equilibrium positions of all the individual atoms and reach the stable structure using WIEN2k code [43] with the force convergence set at 1mRy/a.u. All the presented results are of the optimized structure tabulated in table 1, which agrees Table 1. Optimized atomic coordinates for Sr 4 Rh O 3 10 obtained by minimizing the total energy from first principles DFT calculations. | Atom | x | y | z | |--------|--------|--------|--------| | Sr1 | 0.5 | 0 | 0.0697 | | Sr2 | 0.5 | 0 | 0.2047 | | Sr3 | 0 | 0 | 0.2953 | | Sr4 | 0 | 0 | 0.4303 | | Rh1 | 0 | 0 | 0 | | Rh2 | 0 | 0 | 0.14 | | Rh3 | 0.5 | 0 | 0.354 | | Rh4 | 0.5 | 0 | 0.5 | | O1 | 0.3135 | 0.1866 | 0 | | O2 | 0.1919 | 0.3081 | 0.1391 | | O3 | 0.308 | 0.3081 | 0.3609 | | O4 | 0.1865 | 0.1866 | 0.5 | | O5 | 0 | 0 | 0.0689 | | O6 | 0 | 0 | 0.21 | | O7 | 0.5 | 0 | 0.2899 | | O8 | 0.5 | 0 | 0.4311 | with the results obtained from the experimental lattice parameters [36]. ## 3. Parent material Sr Rh O 4 3 10 In the ionic picture, Rh with five d -electrons nominally has a charge state +4. The five 4 d electrons occupy the t 2 g triplet and leave the higher e g doublet empty due to large crystal-field generated by oxygen octahedron. The low-spin alignment of Rh is then t 3 2 g ↑ , t 2 2 g ↓ giving rise to a moment of 1 µ B / atom. In order to know the ground state electronic and magnetic structures of Sr Rh O 4 3 10 , we perform the DFT calculations considering the co-operative effect of U and SOC. The ground state is found to be ferromagnetic (FM) with the lowest energy among other magnetic configurations. To compare the relative effect from U and SOC, the total density of states (DOS) are plotted in figure 2 with GGA, GGA+ U and GGA+ U +SO functional. Within GGA functional, Sr Rh O 4 3 10 shows metallic characters for both spin-up and spin-down channels. For U ≥ 1eV, the topmost valence band in spin-up channel shifts deeper towards the valence region giving rise to an insulating state. In contrary, for spin-down channel the metallic state is maintained, except that the DOS peak near E F is splitted due to strong electron-correlations. The effect of U is comparatively small as expected due to partial occupation of the orbitals in spin-down channel. With spin-up channel insulating (band-gap 0.9eV) and the spin-down channel metallic, Sr 4 Rh O 3 10 is a half-metal (HM). It is generally considered that the presence of heavy element with strong SOC strength might destroy the HM state. In the present case it turns out that the HM state is fully preserved even with SOC as observed in figure 2(c). This happens due to the large-exchange splitting between the spin-up and spin-down bands at E F . As revealed by the site-projected DOS shown in figure 3 for spin-up and spindown channels obtained from first-principles calculations within GGA+ U +SO, two Figure 2. Total DOS for Sr 4 Rh O 3 10 within (a) GGA+SO, (b) GGA+ U , and (c) GGA+ U +SO, respectively. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1216v1-figure-2d6eb2a5-274c-432b-8cf3-7429cb1474d4.jpg) in-equivalent Rh ions play significant role in dictating the electronic properties of Sr Rh O 4 3 10 . The crystal field effect is found prominent in Rh which causes the splitting between t 2 g and e g states. The partial DOS contribution from d states of two inequivalent Rh atoms shows full occupation of the t 2 g states with its sub-level d xy and d xz + d yz lying below E F , whereas the e g states are in the conduction region for spin-up channel. For spin-down channel, the t 2 g states are partially occupied due to deficiency of one electron in the d xz + d yz sub-levels. As a result, these bands cross E F and form a continuous band at E F . The order of occupation observed in figure 3 is consistent with the ionic picture. The crystal-field energy ( ∼ 1.3eV) is close to the exchange energy splitting ( ∼ 1.2eV) between spin-up and spin-down bands of Rh atoms. This clearly indicates the low-spin configuration consistent with the ionic picture. As shown in figure 3, Rh1 has a dominant t 2 g characters near E F with an itinerant DOS due to its strong hybridization with the oxygen atoms. On the other hand Rh2 has a sharp peak near E F contributed by d xy states since the hybridization with the oxygen is relatively weak unlike the d xz + d yz states. This occurs mainly due to crystal distortion in Sr 4 Rh O 3 10 . Since the hybridization of Rh with the planar oxygen (O1) is stronger than apical oxygen (O2) in both spin channels, the moment induced at O1 is larger than O2 (see table 2). To distinguish the effect of SOC, we show the spin-resolved band structure for Figure 3. Partial density of states for two in-equivalent Rh-4 d states and contributions from planar as well as apical oxygen-2 p states in spin-up ( ↑ ) and spin-down ( ↓ ) channels for Sr 4 Rh O 3 10 within GGA+ U +SO. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1216v1-figure-5acb0db4-880e-486b-b4f9-b89c00ab49db.jpg) Sr Rh O 4 3 10 within GGA+ U and GGA+ U +SO as shown in figure 4, together with a schematic diagram of the band ordering of Rhd states. First we look at the gap between spin-up and spin-down channel in the conduction region for GGA+ U . The gap is found to be ∼ 0.1eV at high symmetry point Γ in the Brillouin zone (BZ) (see figure 4(left)). When SOC is considered, the electronic band structure is modified. The major changes are observed in the conduction region above 0 7eV and in the . valence region below -0.3eV. Due to SOC effect of Rh ( ζ =191meV) [39], the spin-up bands in the conduction region at ∼ 0 7eV are pushed up towards higher energy by . the spin-down bands. This generates a gap of ∼ 0 24eV at the high symmetry point . Γ in the conduction region (see figure 4(right)). Similar changes are observed below E F around -0 3eV, where the spin-up bands are pushed deeper in the valence region. . Thus, the bands at E F are purely of spin-down channel. This shows that HM state is fully preserved in Sr 4 Rh O 3 10 even though sizable SOC exists. At the ground state obtained from first-principles calculations, the total angular moment ( µ tot ) is 12 µ B per unit cell contributed by Rh atoms and oxygen atoms (see table 2). The orbital contribution in Rh ( ∼ 0 1 . µ B ) is in accordance with the Hund's third rule, where Rh with more than half-filled t 2 g -shell has its orbital moment parallel to its spin moment. The Rh moment is less than unity, with the remaining part Figure 4. Band structures for Sr 4 Rh O 3 10 within GGA+ U (left) and GGA+ U +SO (right) approach. Schematic band-diagram (middle) demonstrates the contribution from Rhd bands in the band structure for GGA+ U . Bands in red (black) within GGA+ U indicates spin up (down) channel. ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1216v1-figure-05248cde-c68e-4cbe-a705-3a2dc48ea880.jpg) Table 2. Moments per atom of Rh and Co, one set of two in-equivalent oxygen atoms and unit cell ( µ tot ) for Sr 4 T O 3 10 (where T=Rh, Co) from first-principles calculations within GGA+ U +SO. The unit of moments is the Bohr magneton µ B . The contributions from individual atoms are within muffin-tins while the total moment includes those from the interstitial regime. | | T1 | T2 | O1 | O2 | µ tot | |----------------|------|------|------|------|---------| | Sr 4 Rh 3 O 10 | 0.63 | 0.54 | 0.11 | 0.05 | 12 | | Sr 4 Co 3 O 10 | 2.65 | 2.68 | 0.02 | 0.18 | 36 | transferred to oxygen due to strong hybridization as seen from the partial DOS (see figure 3). Planar oxygen atoms have higher moment than the apical oxygen due to shorter bond-length with Rh-ions. In an ionic picture, each Rh ion carries moment +1 µ B giving rise to µ tot = 12 × (+1 µ B ) = 12 µ B in a unit cell, consistent with the first-principles calculations. ## 4. Doped material Sr Co O 4 3 10 We consider the replacement of Rh by Co atoms, which corresponds to iso-valent doping into the parent material Sr 4 Rh O 3 10 . In the ionic picture Co retains the charge state +4. The spin state transforms from low-spin of Sr Rh O 4 3 10 to intermediatespin t 3 2 g ↑ , d 1 3 z 2 -r 2 ↑ , d 1 xy ↓ . The spin-state transition is observed frequently in cobaltates [47]. We focus on the most interesting case (i.e. full-replacement of Rh by Co atoms) where HM state is achieved. From the total and partial DOS of Sr Co O 4 3 10 shown in figure 5, the material has full occupation of the t 2 g states and partial occupation of the e g states resulting to Figure 5. Density of states for Sr 4 Co O 3 10 in spin-up ( ↑ ) and spin-down ( ↓ ) channels within GGA+ U +SO: (a) total; (b) partial contribution from Cod and O- orbitals. p ![image](https://ac.marcodsn.me/arxiv-markdown-images/1408.1216v1-figure-ae798dbc-2bb9-4f73-b81e-ce605dcb889f.jpg) a metallic state in spin-up channel. In spin-down channel, d xy state is fully occupied whereas the remaining t 2 g and e g states lie in the conduction region. This gives rise to band-gap of ∼ 0.5eV in spin-down channel. Due to crystal distortion the d states of Co hybridize strongly with the O-2p states in both spin-channels. It is interesting to note that doping of Co flips the insulating state from spin-up to spin-down channel due to intermediate-spin configuration of Co in Sr 4 Co O 3 10 [46]. Thus, with metallic state in spin-up channel and the insulating state in spin-down channel, the material Sr Co O 4 3 10 is a HM. From the first-principles calculations, the total angular moment is found to be µ tot = 36 µ B per unit cell. The moments of Co atoms and oxygen atoms are shown in table 2. ## 5. Discussions First-principles calculations on magnetic anisotropy energy of Sr Rh O 4 3 10 and Sr Co O 4 3 10 indicate the c axis of the crystal as their easy axis with anisotropy energy of ∼ 3meV and ∼ 0 95meV per unit cell, respectively. . SOC mixes the spin-up and spin-down electrons together which possibly destroys the HM state. In the present materials the exchange-splitting between the spin-up and spin-down DOS at E F is large (see figures 2 and 5), which makes the mixing marginally small at E F . Hence, HM state is preserved even with SOC. From our calculations, the material Sr Rh O 4 3 10 has larger exchange splitting which reduces the mixing of spin-up and spin-down bands at E F , and its low total moment causes a small stray field generated by local magnetic ions. Hence compared to Sr Co O 4 3 10 with a three-time larger moment, Sr Rh O 4 3 10 is more desirable as a HMF. ## 6. Conclusions Based on the first-principles density functional approach, Sr 4 Rh O 3 10 is found to be a half metallic ferromagnet due to the cooperative effect from Coulomb interaction, spin-orbit coupling and the crystal field. It is demonstrated that doping iso-valent atom into the system by replacing Rh with Co, a half metal with larger moment is achieved. It is emphasized that the large exchange splitting between spin-up and spin-down bands at the Fermi level retains the half metallicity even in presence of spin-orbit coupling. ## Acknowledgments MPG thanks M. Richter, IFW-Dresden for valuable discussions and suggestions and the organizers of FPLO-2013 for financial support to present this work. MPG acknowledges the partial support from NAST (Nepal) and INSA (India) under the NAST-INSA bilateral exchange program. This work was supported partially by WPI Initiative on Materials Nanoarchitectonics, MEXT, Japan. ## References - [1] Wolf S A, Awschalom D D, Buhrman R A, Daughton J M, von Molnar S, Roukes M L, Chtchelkanova A Y and Treger D M 2001 Spintronics: A spin-based electronics vision for the future Science 294 1488 - [2] de Groot R A, Mueller F M, van Engen P G and Buschow K H J 1983 New class of materials: Half-metallic ferromagnets Phys. Rev. Lett. 50 2024 - [3] Pickett W E and Moodera J S 2001 Half metallic magnets Physics Today 54 39 - [4] Schwarz, K 1986 CrO 2 predicted as a half-metallic ferromagnet J. Phys. F Met. Phys. 16 L211 - [5] Pickett W E 1998 Spin-density-functional-based search for half-metallic antiferromagnets Phys. Rev. B 57 10613 - [6] Kobayashi K -I, Kimura T, Sawada H, Terakura K and Tokura Y 1998 Room-temperature magnetoresistance in an oxide material with an ordered double-perovskite structure Nature (London) 395 677 - [7] Sarma D D, Mahadevan P, Saha-Dasgupta T, Ray S and Kumar A 2000 Electronic structure of Sr 2 FeMoO 6 Phys. Rev. Lett. 85 2549 - [8] Dowben P A and Skomski R 2003 Finite-temperature spin polarization in half-metallic ferromagnets J. Appl. Phys. 93 7948 - [9] Felser C, Fecher G H and Balke B 2007 Spintronics: A challenge for materials science and solid-state chemistry Angew. Chem. Int. Ed. 46 668 - [10] Hu X 2012 Half-metallic antiferromagnet as a prospective material for spintronics Adv. Mater. 24 294 - [11] Wan X, Kohno M and Hu X 2005 Orbital order and ferrimagnetic properties of Sr 8 CaRe Cu O 3 4 24 Phys. Rev. Lett. 94 087205; Wan X, Kohno M and Hu X 2005 Robust half-metallic character and large oxygen magnetism in a perovskite cuprate Phys. Rev. Lett. 95 146602 - [12] Galanakis I, Mavropoulos Ph and Dederichs P H 2006 Electronic structure and SlaterPauling behaviour in half-metallic Heusler alloys calculated from first principles J. Phys. D: Appl. Phys. 39 765 - [13] Sargolzaei M, Richter M, Koepernik K, Opahle I, Eschrig H 2006 Spin and orbital magnetism in full Heusler alloys: A density functional theory study of Co 2 YZ (Y=Mn,Fe; Z=Al,Si,Ga,Ge) Phys. Rev. B 74 224410 - [14] Kandpal H C, Fecher G H and Felser C. 2007 Calculated electronic and magnetic properties of the half-metallic, transition metal based Heusler compounds J. Phys. D: Appl. Phys. 40 1507 - [15] Katsnelson M I, Irkhin Y Yu, Chioncel L, Lichtenstein A I and de Groot R A 2008 Half-metallic ferromagnets: From band structure to many-body effects Rev. Mod. Phys. 80 315 - [16] M¨ uller G M, Walowski J, Djordjevic M, Miao G -X, Gupta A, Ramos A V, Gehrke K, Moshnyaga V, Samwer K, Schmalhorst J, Thomas A, H¨tten A, Reiss G, Moodera J S and M¨nzenberg u u M 2009 Spin polarization in half-metals probed by femtosecond spin excitation Nat. Mater. 8 56 - [17] Ghimire M P, Sandeep, Sinha T P and Thapa R K 2011 First principles study of the electronic and magnetic properties of semi-Heusler alloys NiXSb (X = Ti, V, Cr and Mn) J. Alloys Compd. 509 9742 - [18] Ghimire M P, Wu L -H and Hu X 2014 Possible half metallic antiferromagnetism in a double perovskite material with strong spin-orbit couplings arXiv :1407.3408 - [19] Ruddlesden S N and Popper P 1957 New compounds of the K NiF 2 4 type Acta Crystallogr. 10 538; Ruddlesden S N and Popper P 1958 The compound Sr Ti O 3 2 7 and its structure Acta Crystallogr. 11 54 (1958). - [20] Matsuno J, Okimoto Y, Fang Z, Yu X Z, Matsui Y, Nagaosa N, Kawasaki M and Tokura Y 2004 Metallic ferromagnet with square-lattice CoO 2 sheets Phys. Rev. Lett. 93 167202 - [21] Pandey S K 2010 Correlation induced half-metallicity in a ferromagnetic single-layered compound: Sr CoO 2 4 Phys. Rev. B 81 035114 - [22] Wang X L, Sakurai H and Muromachi E T 2005 Synthesis, structures, and magnetic properties of novel RoddlesdenPopper homologous series Sr n +1 Co O n 3 n +1 (n=1,2,3,4, and ∞ ) J. Appl. Phys. 97 10M519 - [23] Moritomo Y, Asamitsu A, Kuwahara H and Tokura Y 1996 Giant magnetoresistance of manganese oxides with a layered perovskite structure Nature 380 141 - [24] Seshadri R, Maignan A, Martin C, Letouzr F and Raveau B 1997 Magnetic and transport properties of the 1201-phase Tl 0 94 . Sr 2 Cu 0 4 . Co 0 6 . O 5 -Phys. Rev. B 56 5504 (1997). - [25] Mackenzie A P and Maeno Y 2003 The superconductivity of Sr 2 RuO 4 and the physics of spintriplet pairing Rev. Mod. Phys. 75 657 - [26] Lee J, Allan M P, Wang M A, Farrel J, Grigera S A, Baumberger F, Davis J C and Mackenzie A P 2009 Heavy d -electron quasiparticle interference and real-space electronic structure of Sr 3 Ru O 2 7 Nature Phys. 5 800 - [27] Lin X N, Zhou Z X, Durairaj V, Schlottmann P and Cao G 2005 Colossal magnetoresistance by avoiding a ferromagnetic state in the Mott system Ca 3 Ru O 2 7 Phys. Rev. Lett. 95 017203 - [28] Mao Z Q, Zhou M, Hooper J, Golub V and O'Connor C J 2006 Phase separation in the itinerant metamagnetic transition of Sr 4 Ru O 3 10 Phys. Rev. Lett. 96 077205 - [29] Cao G, Balicas L, Song W H, Sun Y P, Xin Y, Bondarenko V A, Brill J W, Parkin S and Lin X N 2003 Competing ground states in triple-layered Sr 4 Ru O 3 10 : Verging on itinerant ferromagnetism with critical fluctuations Phys. Rev. B 68 174409 - [30] Jeng H -T, Lin S -H and Hsue C -S 2006 Orbital ordering and Jahn-Teller distortion in perovskite ruthenate SrRuO 3 Phys. Rev. Lett. 97 067002 - [31] Moon S J, Jin H, Kim K W, Choi W S, Lee Y S, Yu J, Cao G, Sumi A, Funakubo H, Bernhard C and Noh T W 2008 Dimensionality-controlled insulator-metal transition and correlated metallic state in 5 d transition metal oxides Sr n +1 Ir n O 3 n +1 ( n = 1, 2, and ∞ ) Phys. Rev. Lett. 101 226402 - [32] Kim B J, Jin H, Moon S J, Kim J -Y, Park B -G, Leem C S, Yu J, Noh T W, Kim C, Oh S -J, Park J -H, Durairaj V, Cao G and Rotenberg E 2008 Novel J eff = 1 2 Mott state induced by / relativistic spin-orbit coupling in Sr 2 IrO 4 Phys. Rev. Lett. 101 076402 - [33] Kim B J, Ohsumi H, Komesu T, Sakai S, Morita T, Takagi H, Arima T 2009 Phase-sensitive observation of a spin-orbital Mott state in Sr 2 IrO 4 Science 323 1329 - [34] Okada Y, Walkup D, Lin H, Dhital C, Chang T -R, Khadka S, Zhou W, Jeng H -T, Paranjape M, Bansil A, Wang Z, Wilson S D and Madhavan V 2013 Imaging the evolution of metallic states in a correlated iridate Nat. Mater. 12 707 - [35] Zhang H, Haule K and Vanderbilt D 2013 Effective J = 1 2 insulating state in Ruddlesden-/ Popper iridates: An LDA+DMFT study Phys. Rev. Lett. 111 246402 - [36] Yamaura K, Huang Q, Young D P and Muromachi E T 2004 Crystal structure and magnetic properties of the trilayered perovskite Sr 4 Rh O 3 10 : A new member of the strontium rhodate family Chem. Mater. 16 3424 - [37] Lee Y S, Lee J S, Noh T W, Byun D Y, Yoo K S, Yamaura K and Muromachi E T 2003 Systematic trends in the electronic structure parameters of the 4 d transition-metal oxides SrMO (M=Zr, Mo, Ru, and Rh) 3 Phys. Rev. B 67 113101 - [38] Kim B J, Yu J, Koh H, Nagai I, Ikeda S I, Oh S -J and Kim C 2006 Missing xy-band Fermi surface in 4 d transition-metal oxide Sr 2 RhO : 4 Effect of the octahedral rotation on the electronic structure Phys. Rev. Lett. 97 106401 - [39] Haverkort M W, Elfimov I S, Tjeng L H, Sawatzky G A and Damascelli A 2008 Strong spin-orbit - coupling effects on the Fermi surface of Sr RuO and Sr RhO Phys. Rev. Lett. 101 026406 - [40] Itoh M, Shimura T, Inaguma Y and Morii Y 1995 Structure of two-dimensional conductor of Sr RhO J. Sol. Stat. Chem. 118 206 - 2 4 2 4 2 4 - [41] Yamaura K, Huang Q, Young D P, Noguchi Y and Muromachi E T 2002 Crystal structure and electronic and magnetic properties of the bilayered rhodium oxide Sr 3 Rh O 2 7 Phys. Rev. B 66 134431 - [42] Yamaura K and Muromachi E T 2001 Enhanced paramagnetism of the 4 d itinerant electrons in the rhodium oxide perovskite SrRhO 3 Phys. Rev. B 64 224424 - [43] Blaha P, Schwarz K, Madsen G K H, Kvasnicka D and Luitz J 2001 WIEN2k, An augmented plane wave+Local orbitals program for calculating crystal properties (Technische Universit¨t a Wien, Vienna, Austria ISBN 3-9501031-1-2) - [44] Perdew J P, Burke K and Ernzerhof M 1996 Generalized gradient approximation made simple Phys. Rev. Lett. 77 3865 - [45] Liechtenstein A I, Anisimov V I and Zaanen J 1995 Density-functional theory and strong interactions: Orbital ordering in Mott-Hubbard insulators Phys. Rev. B 52 R5467; Anisimov V I, Aryasetiawan F and Lichtenstein A I 1997 First-principles calculations of the electronic structure and spectra of strongly correlated systems: the LDA+U method J. P hys. : Condens. Matter 9 767 - [46] It should be noted that band gap opens for Sr 4 Co O 3 10 in spin-down channel for U eff ≥ 4 2eV . (where U eff = U -J with J fixed to 0.8eV). - [47] Zhang W, Koepernik K, Richter M and Eschrig H 2009 Magnetic phase transition in CoO under high pressure: A challenge for LSDA+U Phys. Rev. B 79 155123
10.1063/1.4907933
[ "Madhav P. Ghimire", "R. K. Thapa", "D. P. Rai", "Sandeep", "T. P. Sinha", "Xiao Hu" ]
2014-08-06T09:08:58+00:00
2014-08-06T09:08:58+00:00
[ "cond-mat.mtrl-sci", "cond-mat.mes-hall" ]
Half metallic ferromagnetism in tri-layered perovskites Sr$_4$T$_{3}$O$_{10}$ (T=Co, Rh)
First-principles density functional theory (DFT) is used to investigate the electronic and magnetic properties of Sr$_4$Rh$_3$O$_{10}$, a member of the Ruddlesden-Popper series. Based on the DFT calculations taking into account the co-operative effect of Coulomb interaction ($U$) and spin-orbit couplings (SOC), Sr$_4$Rh$_3$O$_{10}$ is found to be a half metallic ferromagnet (HMF) with total angular moment $\mu_{\rm {tot}}$=12$\mu_B$ per unit cell. The material has almost 100$\%$ spin-polarization at the Fermi level despite of sizable SOC. Replacement of Rh atom by the isovalent Co atom is considered. Upon full-replacement of Co, a low-spin to intermediate spin transition happens resulting in a HMF state with the total angular moment three-time larger (i.e. $\mu_{\rm {tot}}$=36$\mu_B$ per unit cell), compared to Sr$_4$Rh$_3$O$_{10}$. We propose Sr$_4$Rh$_3$O$_{10}$ and Sr$_4$Co$_3$O$_{10}$ as candidates of half metals.