text
stringlengths 2.85k
2.55M
| label
int64 0
10
|
---|---|
(Preprint)
Control of a Bucket-Wheel for Surface Mining of Asteroids and
Small-Bodies
Ravi teja Nallapu,* Erik Asphaug,† and Jekan Thangavelautham‡
Near Earth Asteroids (NEAs) are thought to contain a wealth of resources,
including water, iron, titanium, nickel, platinum and silicates. Future space
missions that can exploit these resources by performing In-Situ Resource
Utilization (ISRU) gain substantial benefit in terms of range, payload capacity
and mission flexibility. Compared to the Moon or Mars, the milligravity on
some asteroids demands a fraction of the energy for digging and accessing
hydrated regolith just below the surface. However, asteroids and small-bodies,
because of their low gravity present a major challenge in landing, surface
excavation and resource capture. These challenges have resulted in adoption of a
“touch and go techniques”, like the upcoming Osiris-rex sample-return mission.
Previous asteroid excavation efforts have focused on discrete capture events (an
extension of sampling technology) or whole-asteroid capture and processing.
This paper analyzes the control of a bucket-wheel design for asteroid or smallbody excavation. Our study focuses on system design of two counter rotating
bucket-wheels that are attached to a hovering spacecraft. Regolith is excavated
and heated to 1000oC to extract water. The water in turn is electrolyzed to
produce hydrogen and oxygen for rocket fuel. We analyze control techniques to
maximize traction of the bucket-wheels on the asteroid surface and minimize
lift-off the surface, together with methods to dig deeper into the asteroid surface.
Our studies combine analytical models, with simulation and hardware testing.
For initial evaluation of material-spacecraft dynamics and mechanics, we
assume lunar-like regolith for bulk density, particle size and cohesion. Our early
studies point towards a promising pathway towards refinement of this
technology for demonstration aboard a future space mission.
INTRODUCTION
Asteroids are known to contain large reserves of water, iron, titanium, nickel, platinum, palladium and silicates1. In-Situ Resource Utilization (ISRU)2 aims at extracting these resources onsite, which if successful, can improve our current space exploration capabilities. While there has
been progress reported in ISRU research for applications on the lunar surfaces3 and Mars4, the
low-gravity environments on asteroids, on the other hand, presents additional challenges in performing ISRU5. One of the major challenges includes lift-off due to excavator thrusting off the
small body.
*
PhD Student, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace Mall,
Tempe, AZ.
†
Professor and Ronald Greeley Chair of Planetary Science, Space and Terrestrial Robotic Exploration Laboratory,
Arizona State University, 781 E. Terrace Mall, Tempe, AZ
‡
Assistant Professor, Space and Terrestrial Robotic Exploration Laboratory, Arizona State University, 781 E. Terrace
Mall, Tempe, AZ
1
In this paper we focus on use of bucket-wheels to perform excavation. Bucket-wheels have
been identified as one of the best tools for excavation in low-gravity environments, beating out
bulldozers and front-loaders10,13. This paper addresses the problem of excavator lift-off which is
the predominant concern on very low-gravity environments; by considering a dual bucket wheel
excavator on the surface of Martian moon Phobos. Phobos as shown in Figure 1 has an escape
velocity of about 11.1 m/s. Hence if any of the excavation mechanisms experience a force that
can impart this speed, the mechanism would be thrown off the surface of Phobos.
Figure 1. Martian moon Phobos is a promising target for ISRU.
In this paper, we present a bucketwheel excavator system that has two counter rotating bucket
wheels, like RASSOR developed by NASA KSC6, and can apply the necessary vertical plunge
force. The counter rotation ensures that no horizontal velocities are imparted, and the vertical
plungers ensure the compensation for lift-off due to any reactive-excavation forces.
The paper starts with introduction to the bucket-wheel system design followed by optimization of
its size, operating parameters and power source 7,8. We then present dynamical and control models of the system and a simulation of the proposed mechanism, followed by preliminary results
and conclusions.
BUCKET WHEEL SYSTEM DESIGN
The design of a bucketwheel is a multi-disciplinary problem. Several forces, geometry, and
performance requirements are considered. To understand the role of an excavator, a diagram of
the full ISRU system is shown in Figure 2.
The excavation system is powered by solar insolation. The solar panels generate the power
based on the incident radiation, which is used to charge an onboard system battery that powers
various subsystems.
The ISRU unit is tasked with excavating regolith, extracting water by heating regolith and
electrolyzing hydrogen and oxygen from the water. The hydrogen and oxygen would be used as
propellant for rockets on their journey to earth or to power fuel cells power supplies during
eclipse14,15,16.
A design of a bucket-wheel and ISRU system was provided by Nallapu et al.8 (Figure 3)
where the geometric parameters of the bucket wheel, including number of buckets and their dimensions were obtained by constraining the total operating power to 10 kW.
2
Figure 2. Systems diagram for the proposed ISRU system
Figure 3. Proposed excavator with counter rotating bucket wheels
This proposed unit consists of 2 counter rotating bucket-wheels that cancel out horizontal motion. The unit is also capable of compensating for any lift-off vertical forces by exerting a radial
thrust as shown in Figure 3.
SYSTEM DYNAMICS
Excavation dynamics
Consider a bucket wheel excavator, plunging the bucket into the regolith as shown in Figure 4.
Let the wheel be applied torque, τ, and be spinning with a speed, ω. During the excavation, the
wheel experiences the resistive forces from the regolith, Freg, normal to the cutting surface. Let
Fsup, a force applied to counter-act any lift-off experienced.
3
Figure 4. Excavation modelling
The resistive regolith forces are modeled based on a Luth-Wismer model9. The Luth-Wismer
model separates the regolith forces as a non-cohesive force (sand) and pure cohesive (clay) forces. Skonieczny et al.10 formulates these forces as:
(1)
and,
(2)
The force acts normal to the cutting surface, and the total force is given by:
(3)
Equations of motion
This method of separating the forces along the horizontal and vertical axis is similar in procedure
used by Park11 and Xiao et al.12. The equations of motion for the system shown in Figure 3 are
therefore given by:
(4)
(5)
(6)
(7)
(8)
(9)
where F1 and F2 are the forces applied to counteract any lift-off forces on wheels 1 and 2 respectively. The forces Fr1 and Fr2 are the resistive forces on regolith acting on wheels 1 and 2 respec-
4
tively, and whose magnitude is calculated by Equation 3. Additionally, a random disturbance
force in the range [0, Freg/2] was added to the magnitudes of Fr1 and Fr2 to account for any unmodeled dynamics. Finally, τ1 and τ2 represent the control torques exerted on the wheels 1 and 2
respectively.
SIMULATION
The design of the wheel as mentioned earlier was to maintain the total operational power under 10 kW. This required that the wheels’ spin at about 3 RPM8, which is the value of ωdes in
Equations 11 and 12. Additionally, the translator motion needs to be confined vertically downwards, and no horizontal motion was desired. To realize this, a proportional-derivative (PD) controller was applied to the vertical forces, and wheel torques as given by Equations 10-12. The
control law given by Equation 10 is only applied when y>0. The gains Ky, Kvy, K1, K2, and Kx are
chosen by repetitively running simulations and picking the values that give satisfactory performance.
(10)
(11)
(12)
Equations 4 through 5 were propagated with an ODE4513 solver in MATLAB with the following
parameters shown in Table 1.
Table 1. Simulation Parameters.
Simulation Parameter
# Wheels
Value
2
# Buckets per wheel
24
Mass of wheel (kg)
5
D (m)
0.622
W (m)
6.31E-02
β1 (degrees)
10
β2(degrees)
-10
V (m/s)
0.12
3
1880
p (kg/m )
2
g (m/s )
0.0057
c (Pa)
147
Specific heat of the material (J/[Kg-Celsius])
1,430
Surface temperature of the material (Celsius)
200
5
Water extraction temperature (Celsius)
1,000
Water content in the regolith (%)
10
Kx
1
Ky
0.9
Kvy
90,000
K1
4,000
K2
4,000
RESULTS
This section presents the results of simulations described above. These simulations were run for a
time length of 100 seconds with a step length of 0.1 seconds.
Excavator Displacement
The displacement response of the excavator is shown in Figure 5. As seen here, the displacement
is confined to the negative y direction, while the counter rotating wheels ensure that there is no
horizontal displacement.
Figure 5. Target position of bucket-wheel
Angular Velocity Response
Angular velocity response of the 2 bucket wheels are shown in Figure 6. As seen here the 2
wheels reach the desired speed of 3.3 RPM almost instantly while rotating in opposite directions.
6
Figure 6. Angular velocity response
Wheel Motion
The rotations of the two bucket wheels are shown in Figure 7. As expected, their magnitudes are
equal in opposite directions because of the counter rotations of the wheel.
Figure 7. Wheel rotations
CONCLUSIONS
In this paper, we present the significance of ISRU in extracting resources from small-bodies
such as Martian moon Phobos. Phobos is strategic location and a potential base-camp for a future
human mission to Mars. This paper identifies one of the principle challenges of ISRU, namely
lift-off of the excavation system in low-gravity environments such as Phobos. A dynamics and
control model of a 10 kW excavator and ISRU system is presented, and its equations of motion
are then propagated with computer simulations. The simulations show the proposed bucket-wheel
excavator can indeed be stable on an asteroid surface, and is not susceptible to liftoff forces. Further work will be required in testing algorithms in a relevant environment and in identifying the
required sensors and actuators to maintain a steady-pace of excavation on the surface of the
small-body.
7
REFERENCES
1
W. F. Bottke, Asteroids III, University of Arizona Press, Tucson, Arizona 2002.
2
K. Zacny, P. Chu, G. Paulsen, et al. 'Mobile in-Situ Water Extractor (MISWE) for Mars, Moon, and Asteroids in Situ
Resource Utilization', AIAA SPACE Conference, 2012.
3
P. Mueller, and R. H. King. 'Trade Study of Excavation Tools and Equipment for Lunar Outpost Development and
ISRU', Space Technology and Applications International Forum (STAIF 2008), vol. 969, 2008, pp. 237-244.
4
G. B. Sanders, A. Paz, L. Oryshchyn, et al. 'Mars ISRU for Production of Mission Critical Consumables – Options,
Recent Studies, and Current State of the Art', AIAA SPACE 2015 Conference and Exposition, 2015.
5
A. Probst, G. Peytavi, B. Eissfeller, et al. 'Mission Concept Selection for an Asteroid Mining Mission', Aircraft Engineering and Aerospace Technology, vol. 88, no. 3, 2016, pp. 458-470.
6
R. Mueller, R. E. Cox, T. Ebert, et al. 'Regolith Advanced Surface Systems Operations Robot (RASSOR)', 2013 IEEE
Aerospace Conference, 2013, pp. 1-12.
7
T. Nakamura, and B. K. Smith. 'Solar Thermal System for Lunar ISRU Applications: Development and Field Operation at Mauna Kea, HI', Proceedings of SPIE, vol. 8124, no. 1, 2011.
8
R. T. Nallapu, A. Thoesen, L. Garvie, E. Asphaug, J. Thangavelautham. “Optimized Bucket Wheel Design for Asteroid Excavation,” International Astronautic Congress, 2016, Guadalajara, Mexico, IAF.
9
H.J. Luth and R.D. Wismer, 'Performance of Plane Soil Cutting Blades in Sand’. Journal of Terramechanics, vol. 9,
no. 4, 1973, pp. 67-67.
10
K. Skonieczny,. 'Lightweight Robotic Excavation', PhD Thesis, Carnegie Mellon University, 2013.
11
B. Park. 'Development of a Virtual Reality Excavator Simulator: A Mathematical Model of Excavator Digging and a
Calculation Methodology', 2002.
12
Thangavelautham, J., Abu El Samid, N., Grouchy, P., Earon E., Fu, T., Nagrani, N., D'Eleuterio, G.M.T., “Evolving
Multirobot Excavation Controllers and Choice of Platforms Using Artificial Neural Tissue Controllers,” Proceedings of
the IEEE Symposium on Computational Intelligence for Robotics and Automation, 2009, DOI:
10.1109/CIRA.2009.542319
13
J. Thangavelautham, K. Law, T. Fu, N. Abu El Samid, A. Smith, G. M.T. D’Eleuterio, “Autonomous Multirobot
Excavation for Lunar Applications,” Robotica, pp. 1-39, 2017.
14
J. Thangavelautham and S. Dubowsky, “On the Catalytic Degradation in Fuel Cell Power Supplies for Long-Life
Mobile Field Sensors.” Journal of Fuel Cells: Fundamental to Systems, pp. 181-195, 2013.
15
P. Iora, J. Thangavelautham, “Design of a mobile PEM power backup system through detailed dynamic and control
analysis,” International Journal of Hydrogen Energy, vol. 37, no. 22, pp. 17191–17202, 2012.
16
J. Thangavelautham, D. Strawser, M. Cheung, S. Dubowsky, “Lithium Hydride Powered PEM Fuel Cells for LongDuration Small Mobile Robotic Missions,” IEEE International Conference on Robotics and Automation (ICRA), St.
Paul, Minnesota, 2012.
8
| 3 |
Opinion dynamics in social networks with stubborn agents: An
issue-based perspective ?
Ye Tian a , Long Wang b,∗
arXiv:1609.03465v2 [cs.SY] 13 Aug 2017
a
Center for Complex Systems, School of Mechano-electronic Engineering, Xidian University, Xi’an 710071, P. R. China
b
Center for Systems and Control, College of Engineering, Peking University, Beijing 100871, P. R. China
Abstract
Classic models on opinion dynamics usually focus on a group of agents forming their opinions interactively over a single issue. Yet
generally agreement can not be achieved over a single issue when agents are not completely open to interpersonal influence. In this paper,
opinion formation in social networks with stubborn agents is considered over issue sequences. The social network with stubborn agents
is described by the Friedkin-Johnsen (F-J) model where agents are stubborn to their initial opinions. Firstly, we propose a sufficient and
necessary condition in terms of network topology for convergence of the F-J model over a single issue. Secondly, opinion formation of
the F-J model is investigated over issue sequences. Our analysis establishes connections between the interpersonal influence network and
the network describing the relationship of agents’ initial opinions for successive issues. Taking advantage of these connections, we derive
the sufficient and necessary condition for the F-J model to achieve opinion consensus and form clusters over issue sequences, respectively.
Finally, we consider a more general scenario where each agent has bounded confidence in forming its initial opinion. By analyzing the
evolution of agents’ ultimate opinions for each issue over issue sequences, we prove that the connectivity of the state-dependent network
is preserved in this setting. Then the conditions for agents to achieve opinion consensus over issue sequences are established. Simulation
examples are provided to illustrate the effectiveness of our theoretical results.
Key words: Opinion dynamics, issue sequences, path-dependence, convergence, confidence bound
1
Introduction
Recently, opinion dynamics has attracted much attention
of researchers from various disciplines, such as applied
mathematics, economics, social psychology, control theory, etc., due to its broad applications in modeling and
explaining complex phenomena in social and artificial networks (Degroot, 1974; Lamport et al., 1982; Hegselmann
& Krause, 2002; Acemoglu et al., 2010; Frasca et al.,
2015; Ravazzi et al., 2015). In a social network, agents
form opinions on various political, economic and social
issues according to the information they received from
neighbors determined by the network topology (Jadbabaie
et al., 2003; Olfati-Saber & Murray, 2004; Ren & Beard,
2005) or the confidence/influence bound (Blondel et al.,
2009; Mirtabatabaei & Bullo, 2012; Jing et al., 2016). A
fundamental question in opinion dynamics is: how do the
? This work was supported by National Science Foundation of
China (Grant Nos. 61533001 and 61375120) and the Fundamental
Research Funds for the Central University (Grant No. JBZ170401).
∗ Corresponding author : Long Wang
Email addresses: [email protected] (Ye Tian),
[email protected] (Long Wang).
Preprint submitted to Automatica
network structure and opinions’ initial distribution influence
the diffusion and aggregation of scattered opinions in the
process of opinion formation? In Degroot (1974), a model
is presented to characterize the process of a group of agents
reaching opinion consensus on a common issue by pooling
their subjective opinions, which is known as the Degroot
model. The interactions between agents are described by
a stochastic matrix which can be regarded as the one-step
transition probability matrix of a Markov chain and some
sufficient conditions for achieving opinion consensus are
provided. To further investigate how the interpersonal influence contributes to the opinion formation, the work in
Friedkin & Johnsen (1999) extends the Degroot model by
introducing a diagonal matrix which represents agents’
susceptibilities to interpersonal influence. In the Degroot
model and the Friedkin-Johnsen (F-J) model, interactions
between agents are specified by given networks. Different
from these linear models, in Hegselmann & Krause (2002),
the authors present a nonlinear model in which agents have
bounded confidence for others. In the Hegselmann-Krause
(H-K) model, two agents are said to be connected if and
only if the difference between their opinions is smaller than
a given confidence bound, which means that the network
topology of the H-K model is state-dependent.
15 August 2017
about convergence of the F-J model over a single issue
usually require that the interpersonal influence network is
undirected and connected or its adjacent matrix is strictly
row-substochastic (Ghaderi & Srikant, 2014; Mirtabatabaei
et al., 2014). We propose a milder sufficient and necessary
condition in terms of network topology to guarantee that
opinions of agents converge to constant values. Several
properties of agents’ ultimate opinions for a single issue are
provided. Secondly, we study opinion formation of the F-J
model over a sequence of interdependent issues inspired
by the path-dependence theory (North, 1990; Page, 2006;
MacKay et al., 2006; Egidi & Narduzzo, 1997). By virtue
of the inherent coherence between basic assumption of
the F-J model and the path-dependence theory, we assume
that the factor of each agent’s cognitive inertia over two
interdependent issues equals to its stubborn factor. Then,
each agent will form its initial opinion for the next issue
by making a tradeoff between its initial opinion for the last
interdependent issue and other agents’ initial opinions for
the next issue. The connections between the interpersonal
influence network and the network which characterizes
the relationship of agents’ initial opinions for successive
issues are established, and the sufficient and necessary condition for the F-J model to achieve opinion consensus or
form clusters over issue sequences is proposed. Finally, we
consider the more general case in which an information
assimilation mechanism is employed to weaken agents’ interpersonal influence. We assume that each agent maintains
a confidence bound in forming its initial opinions. This
assumption is consistent with the reported echo-chamber
effect (Sunstein, 2012; Dandekar et al., 2013), i.e., people
usually assimilate information in a selective way: they tend
to give considerable weight to the information supporting
their initial opinions, and dismiss the undermining information meanwhile. Connectivity preservation of the modified
F-J model is analyzed. Then we derive the conditions for
achieving opinion consensus. The main difficulties for our
analysis are twofold. On one hand, the evolution of agents’
initial opinions over issue sequences is not directly determined by the interpersonal influence network and agents’
stubborn extent, which increases complexity of our analysis from the graphical perspective. On the other hand,
due to the fact that the evolution of agents’ initial opinions over issue sequences is influenced by the evolution of
their opinions over time sequences, connectivity preservation of the modified F-J model is more complex compared
with connectivity preservation of the H-K model. As has
been widely reported (Ghaderi & Srikant, 2014; Frasca et
al., 2015; Friedkin, 2015), a social network with stubborn
agents does not generally achieve consensus over a single
issue. Our investigation shows that opinions of a group of
individuals can achieve consensus over each path-dependent
issue sequence 1 , even if agents are stubborn to their initial
opinions. Simply put, repeatedly arising or interdependent
As the research in multi-agent systems continues, the
tools that are available within opinion dynamics have been
enriched considerably. The Degroot model is further investigated both on continuous-time dynamics and switched
topologies (Jadbabaie et al., 2003; Olfati-Saber & Murray,
2004; Ren & Beard, 2005). In addition, many complex scenarios are also considered, including asynchronous consensus (Xiao & Wang, 2008), time delays (Wang & Xiao,
2007), finite-time consensus (Wang & Xiao, 2010), leaderfollowing framework (Liu et al., 2012; Ma et al., 2016), heterogeneous model (Zheng & Wang, 2014) and antagonistic
interactions (Altafini, 2013), to name but a few. Based on the
gossip algorithm (Boyd et al., 2006), randomized opinion
dynamics is investigated in Acemoglu et al. (2010), Ravazzi
et al. (2015), Frasca et al. (2015) and Li et al. (2013), respectively. In Ghaderi & Srikant (2014), the equilibrium and
convergence rate of the F-J model are investigated. Under the
assumption that the adjacent matrix of the interpersonal influence network is an irreducible sub-stochastic matrix with
the row sum of at least one row strictly smaller than one,
the authors transform the F-J model to a random walk, and
the form of equilibrium is proposed based on the first hitting
probabilities of the random walk. In Bindel et al. (2011),
the F-J model is interpreted as a best-response game, and
the ratio between the optimal solution and the Nash equilibrium solution, which is defined as the price of anarchy, is
discussed under both undirected and directed networks.
Most of the available literature on the F-J model focuses
on opinion evolving over a single issue. Yet the F-J model
does not in general converge to consensus over a single issue
due to the presence of stubborn agents. Actually, the empirical evidence shows that consensus may be reached over a sequence of issues (Joshi et al., 2010). In practice, associations
of individuals (such as small groups within firms, deliberative bodies of government, etc.) are usually constituted to
deal with issues within particular issue domains which consist of deeply interdependent issues, especially repeatedly
arising issues. In this scenario, individuals’ opinions for interdependent issues are always correlated. Thus, extending
the existing theories of opinion dynamics to issue sequences
is necessary and can uncover the underlying mechanism of
opinion formation in the real world. Mirtabatabaei et al.
(2014) and Jia et al. (2015) modify the F-J model and the
Degroot model to investigate the evolution of agents’ selfappraisals over an issue sequence, respectively. In Parsegov
et al. (2017), the authors present a multidimensional extension of the F-J model in which agents’ opinions for several
interdependent issues evolve over time sequences.
Different from the works which focus on agents’ selfappraisal dynamics (Mirtabatabaei et al., 2014; Jia et al.,
2015) over sequences of independent issues, or evolution
of agents’ opinions for multiple interdependent but unordered issues over time sequences (Parsegov et al., 2017),
we consider the opinion formation of the F-J model which
evolves over both interdependent issue sequences and time
sequences in this paper. Firstly, convergence of the F-J
model is studied over a single issue. The existing results
1
In the sequel, we say that an issue sequence is path-dependent
or has the property of path-dependence if individual’s opinions
over it have the path-dependent property. A detailed explanation
of path dependence will be presented below.
2
ei j ∈ E means w ji , 0, otherwise, w ji = 0. A directed path of
length m+1 from i to j is a finite ordered sequence of distinct
vertices of G with the form i, k1 , k2 , · · · , km , j. Particularly, if
i = j, the directed path is called a cycle of i( j). The directed
graph G is said to be strongly connected if between every
pair of distinct vertices i, j, there exists a directed path that
begins at i and ends at j. A maximal subgraph of G that is
strongly connected forms a strongly connected component
(SCC). In an SCC of digraph G, if there exists a vertex
which has parents belonging to other SCCs, we say that
the in-degree of this SCC is nonzero, otherwise, we call it
an independent strongly connected component (ISCC). The
directed graph G is said to have a spanning tree if there exists
a vertex that is called the root which has a directed path to
every other vertex. The directed graph G is said to contain
a star subgraph if there exists a vertex that is called the
center vertex which has directed edges to any other vertices.
An undirected graph is a digraph G(W) which satisfies that
wi j = w ji for any i, j ∈ V. For more details about algebraic
graph theory, we refer to Godsil & Royal (2001).
issues lead to consensus. Our study also provides a theoretical explanation for the cohort effect (Joshi et al., 2010).
Moreover, the evolution of opinions over issue sequences
enhances the connectivity of the social network. As long as
one of the partially stubborn agent’s opinions can scatter
to all the rest partially stubborn agents through partially
stubborn or non-stubborn agents, opinion consensus can be
reached, and all the partially stubborn agents form a star
subgraph in the network which characterizes the relationship of agents’ initial opinions for successive issues. The
differences between opinion dynamics over issue sequences
and a single issue give us a deeper understanding of opinion
formation in social networks.
The rest of this paper is organized as follows. In Section
2, we introduce some notions on graph theory and the F-J
model. In Section 3, convergence of the F-J model is studied
over a single issue, and some properties of ultimate opinions are proposed. In Section 4, opinion formation of the F-J
model is investigated over issue sequences. In Section 5, we
consider opinion formation of the F-J model over issue sequences with bounded confidence. In Section 6, numerical
simulations are given to illustrate the effectiveness of theoretical results. Some conclusions are drawn in Section 7.
2.2
The F-J model presented in Friedkin & Johnsen (1999)
sheds light on the relationship between interpersonal influence and opinion change in social networks. The F-J model
is a generalization of the Degroot model (Degroot, 1974).
It introduces a positive diagonal matrix to quantify the extent of each member of the group open to the interpersonal
influence.
Notation: Denote the set of real numbers, natural numbers, n-dimensional real vector space and n × n real square
matrix space by R, N, Rn and Rn×n , respectively. 1n is a vector of size n having all the elements equal 1. In is the n × n
identity matrix. For a given vector or matrix A, AT denotes
its transpose, kAk∞ denotes its maximum row sum norm. 0
denotes an all-zero vector or matrix with compatible dimension. ρ(A) denotes the spectral radius for a matrix A ∈ Rn×n .
By | · | we denote the absolute value, modulus and cardinality of real number, complex number and set, respectively.
Given a vector ζ ∈ Rn and a matrix sequence {Ak }m
k=1 with
Ak ∈ Rn×n , diag(ζ) denotes an n×n diagonal matrix whose diagonal elements are the elements of ζ, diag(A1 , A2 , . . . , Am )
denotes an nm × nm block diagonal matrix with Ak being its
block on diagonal.
2
Consider n agents forming opinions on a certain issue
in a network formulated by a weighted digraph G(W) =
(V, E, W). Each agent holds an initial opinion xi (0), i ∈ V.
The classic F-J model is:
x(k + 1) = ΞW x(k) + (I − Ξ)x(0),
(1)
where x(k) = (x1 (k), x2 (k), . . . , xn (k))T ∈ Rn is a vector representing the stack of opinions with k ∈ N being the scale of
time, W is a stochastic weighted adjacency matrix characterizing the structure of the interpersonal influence network,
Ξ = diag(ξ) is the diagonal matrix mentioned above with
ξ = (ξ1 , ξ2 , . . . , ξn )T ∈ Rn satisfying ξi ∈ [0, 1]. ξi represents
the susceptibility of agent i to interpersonal influence while
1 − ξi quantifies the extent to which agent i is stubborn to
its initial opinion. Here, xi (0) can be regarded as the internal opinions of agent i for the issue (Bindel et al., 2011).
Note that if ξ = 1n , the F-J model collapses to the Degroot
model. However, different from the Degroot model in which
disagreement is mainly the consequence of lack of communication, it is more likely the result of the presence of stubborn agents anchored to their own initial opinions in the F-J
model. This is coincident with the empirical evidence that
failing in reaching agreement usually owes to the stubbornness of individuals in practice, rather than the insufficiency
of persistent contracts and interactions (Friedkin & Johnsen,
1999; Friedkin, 2011; Frasca et al., 2015).
Preliminaries
In this section, some basic concepts on graph theory are
introduced. Then, a brief introduction of the F-J model is
presented.
2.1
Introduction of the F-J model
Basic concepts on graph theory
A weighted directed graph (digraph) G of order n is a
triple G(W) = (V, E, W) which consists of a vertex set V =
{1, 2, . . . , n}, an edge set E = {ei j : i, j ∈ V} and a weighted
adjacency matrix W = [wi j ]n×n with entries wi j . An edge ei j
is an ordered pair (i, j) which means that node j can obtain
information from node i, but not necessarily vice versa. i is
called the parent of j if (i, j) ∈ E. The adjacency elements
associated with the edges of the graph are nonzero, i.e.,
3
As mentioned above, if Ξ = I in equation (1), the F-J
model is transformed into the Degroot model:
model is convergent if and only if 1 is the only maximummodulus eigenvalue of W.
x(k + 1) = W x(k),
For two positive integers, we say they are coprime if and
only if their greatest common divisor is 1. For agent i, if
ξi < 1, we say it is a stubborn agent, otherwise, we say it is
a non-stubborn agent. In Golub & Jackson (2010), the authors prove that the Degroot model (2) is convergent if and
only if each ISCC of G(W) is aperiodic from the perspective
of Markov chain corresponding to W. In Friedkin (2015),
convergence of the F-J model requires that the lengths of
all cycles of G(ΞW) are coprime. In the next theorem, we
propose a graph-theoretical condition for the F-J model to
achieve convergence by virtue of properties of irreducible
and primitive matrix’s eigenvalue. Different from the Degroot model (2), convergence of the F-J model only depends
on the ISCC composed of non-stubborn agents in G(W).
Before proposing our convergence condition, we need the
following lemmas in Horn & Johnson (2012).
(2)
where W is a stochastic matrix. On the other hand, consider
the augmented system of the F-J model (1). Let x̂(k) =
[x(0)T x(k)T ]T , we have
x̂(k + 1) = Ŵ x̂(k),
(3)
where
In×n
Ŵ =
(I − Ξ)
0
.
ΞW
From equation (3), the F-J model is equivalent to the leaderfollowing structure (Liu et al., 2012) where agents’ initial
opinion are virtualized as stationary leaders.
3
Lemma 2 Let A ∈ Rn×n be irreducible and suppose that
λ ∈ R is not in the interior of any Ger s̆gorin disc of A. If
some Ger s̆gorin circle of A does not pass through λ, then λ
is not an eigenvalue of A.
Convergence of the F-J model over a single issue
A fundamental problem with respect to the F-J model is
its limiting behavior when the time scale k tends to infinity.
In this subsection, convergence of the F-J model is considered over a single issue. A sufficient and necessary condition
on the regularity of ΞW for convergence of the F-J model
is presented in Parsegov et al. (2017). Here we give a sufficient and necessary condition from the perspective of the interpersonal influence network G(W) which ensure that x(k)
converges to a constant vector as k → ∞. Firstly, we propose
the definition of the convergence of dynamic systems.
Lemma 3 Let A ∈ Rn×n be irreducible and nonnegative,
and let P1 , P2 , . . . , Pn be the vertices of the directed graph
G(A). Let Li = {l1i , l2i , . . .} be the set of lengths of all cycles
of Pi in G(A), Let γi be the greatest common divisor of all
the lengths in Li . Then A is primitive if and only if γ1 = γ2 =
· · · = γn = 1.
Remark 1 Note that the condition in Lemma 3 is consistent with the definition of aperiodicity (Definition 2 in Golub
& Jackson (2010)). For a nonnegative and irreducible matrix, aperiodicity ensures that it does not have any periodic
eigenvalues, that is , it is primitive. Thus, aperiodicity is a
graph-theoretical criterion for primitivity. By the virtue of
aperiodicity, we provide a sufficient and necessary condition
concerning on the interpersonal influence network G(W) for
the F-J model to achieve convergence in the next theorem.
Definition 1 For a dynamic system with state vector `(k) ∈
Rn , k ∈ N, if for any initial state `(0), there exists a constant
vector `ˆ ∈ Rn , such taht
ˆ
lim `(k) = `,
k→∞
we say the system is convergent.
Lemma 1 The F-J model (1) is convergent if and only if 1
is the only maximum-modulus eigenvalue of ΞW.
Assumption 1 For each ISCC of G(W) which only consists
of more than one non-stubborn agent, there exists at least
one agent having two cycles which are coprime in length.
Lemma 1 naturally follows from Corollary 2 and Lemma
5 in Parsegov et al. (2017). In Lemma 1, that 1 is the only
maximum-modulus eigenvalue of ΞW means ΞW has no
other maximum-modulus eigenvalues except 1, here the algebraic multiplicity of eigenvalue 1 may be larger than one.
In other words, suppose λ is an eigenvalue of ΞW, then
|λ| = 1 implies λ = 1. Otherwise, let a + bi , 1 be an eigenb
value of ΞW with |a+bi| = 1. We have a+bi = ei arctan a = eiθ ,
where θ ∈ [−π, π] is the principal value of the argument of
a + bi. Thus, (a + bi)k = eiθk , which shows that (a + bi)k is periodic. Suppose that J is the Jordan canonical form of ΞW,
then J k is periodic, which indicates that system (1) is nonconvergent. Let Ξ = I, one can readily get that the Degroot
Assumption 1 means that all ISCCs of G(W) consisting of
only non-stubborn agents are aperiodic. This condition is
milder than condition for convergence of the Degoot model
(2) which requires that all ISCC of G(W) are aperiodic
(Golub & Jackson, 2010).
Theorem 1 The F-J model (1) achieves convergence if and
only if Assumption 1 holds.
Proof. Suppose that G(W) has α SCCs with α ≤ n. Because
W is reducible, then there exists a permutation matrix P such
4
Since system (1) is convergent under Assumption 1, the limit
of Ψ(k) exists. Let Ψ = limk→∞ Ψ(k).
that
W1 × · · · ×
W
·
·
·
×
2
T
W̃ = P WP =
. . .. ,
. .
Wα
Property 1 Ψ is a stochastic matrix.
0
Proof. Firstly, we show that Ψ(k) is stochastic for any k ∈ N
inductively. Note that ΞW and I − Ξ are both nonnegative,
thus Ψ(k) is nonnegative. From equation (5), we have Ψ(0) =
I and Ψ(1) = ΞW + I − Ξ are both stochastic. Now suppose
that Ψ(l) is a stochastic matrix, we have
where Wi , i ∈ {1, 2, . . . , α} is the irreducible adjacent matrix corresponding to each SCC of G(W) (Brualdi & Ryser,
1991).
Let Ξ̃ = PT ΞP = diag(Ξ1 , Ξ2 , . . . , Ξα ), then we have
ΞW = PΞ̃W̃PT . If there exists ξ j = 0 which is a diagonal
element of Ξi , then G(Wi ) is separated into a vertex j which
corresponds to a row of Ξi Wi with all elements being zero
and several SCCs with nonzero in-degrees in G(Ξi Wi ). Otherwise, if G(Wi ) has nonzero in-degree, or G(Wi ) is an ISCC
but contains at least one stubborn agent, Ξi Wi is a irreducible
matrix which satisfies kΞi Wi k∞ ≤ 1 and contains at least one
row whose row sum is strictly smaller than 1. From Lemma
2, we obtain ρ(Ξi Wi ) < 1. If G(Wi ) is an ISCC and contains
no stubborn agent, i.e., Ξi Wi = Wi is an irreducible stochastic matrix, then 1 is its only maximum-modulus eigenvalue
if and only if Wi is primitive. In this case, if G(Wi ) contains
only one non-stubborn agent i, then the eigenvalue of Wi is
1. Otherwise, by Lemma 3, 1 is the only eigenvalue of Wi
that has maximum modulus if and only if there exists at least
one agent in G(Wi ) which has at least two cycles with coprime length. In conclusion, 1 is the only eigenvalue of ΞW
with maximum-modulus if and only if Assumption 1 holds.
By Lemma 1, the F-J model (1) achieves convergence if and
only if Assumption 1 holds.
Ψ(l + 1)1n = ((ΞW)l+1 +
= ((ΞW)l ΞW +
= ((ΞW)l (ΞW + I − Ξ) +
l−1
X
(ΞW)t (I − Ξ))1n
t=0
l−1
X
= (ΞW)l Ψ(1)1n +
(ΞW)t (I − Ξ)1n .
t=0
l
l
Since Ψ(1) is stochastic, we have (ΞW)
Pl−1Ψ(1)1nt = (ΞW) 1n .
l
Therefore, Ψ(l + 1)1n = ((ΞW) ΞW + t=0 (ΞW) (I − Ξ))1n =
Ψ(l)1n = 1n , which implies that Ψ(k) is stochastic for any
k ∈ N. Moreover, since Ψ1n = limk→∞ Ψ(k)1n = 1n , we
obtain that Ψ is a stochastic matrix.
Property 1 shows that each agent’s opinion converges to
a convex combination of all agents’ initial opinions. Let
x∗ = limk→∞ x(k). Denote the set of fully stubborn agents
by V f = {i ∈ V|ξi = 0}, the set of partially stubborn agents
by V p = {i ∈ V|0 < ξi < 1} and the set of non-stubborn
agents by Vn = {i ∈ V|ξi = 1}. Without loss of generality,
let V f = {1, 2, . . . , r1 }, V p = {r1 + 1, r1 + 2, . . . , r1 + r2 }, Vn =
{r1 + r2 + 1, r1 + r2 + 2, . . . , n}. Let Ψ = [ψ1 , ψ2 , . . . , ψn ],
where ψi ∈ Rn . The following property reveals the influence
of the interpersonal influence network G(W) and the levels
of stubbornness of agents to the ultimate opinion x∗ .
Property 2 Under
Assumption 1, for any i ∈ Vn , if there
S
exists j ∈ V f V p which has a directed path to agent i in
graph G(W), then ψi = 0.
Proof. Following equation (5), we obtain
Ψ(k + 1) − Ψ(k)
k
k−1
X
X
k+1
t
k
=(ΞW) +
(ΞW) (I − Ξ) − (ΞW) +
(ΞW)t (I − Ξ)
t=0
t=0
(4)
=(ΞW)
k+1
− (ΞW) + (ΞW) (I − Ξ)
k
k
=(ΞW)k Ξ(W − I).
where
k−1
X
(ΞW)t (I − Ξ) + (ΞW)l (I − Ξ))1n
t=0
Next, we shall further analyze the ultimate opinion of
system (1). Employing equation (1) iteratively, we have
Ψ(k) = (ΞW)k +
(ΞW)t (I − Ξ))1n
t=0
l−1
X
Remark 2 In the available literature, convergence of the
F-J model over a single issue usually requires that G(W)
is undirected connected or every ISCC of G(W) contains
at least one stubborn agent (Mirtabatabaei et al., 2014;
Ghaderi & Srikant, 2014). Theorem 1 shows that the convergence is achieved under the milder condition which ensures
condition in Lemma 1. The proof of Theorem 1 also implies
that each ISCC consisting of non-stubborn agents achieves
consensus as the F-J model converges. Note that from Theorem 1, that each ISCC consisting of non-stubborn agents
of G(W) has at least one agent containing self-loop is a sufficient but not necessary condition for convergence of the
F-J model. However, if G(W) is undirected, the F-J model
achieve convergence if and only if each ISCC consisting of
non-stubborn agents has at least one agent containing selfloop in G(W). The proof directly follows from Theorem 1.
x(k) = Ψ(k)x(0),
l
X
(ΞW)t (I − Ξ).
(5)
From the proof of Theorem 1, limk→∞ (ΞW)k exists. More-
t=0
5
over, since limk→∞ Ψ(k) = Ψ , we have
lim (ΞW)k Ξ(W − I) = lim (ΞW)k (I − Ξ) = 0.
k→∞
k→∞
represents the proportion of the initial opinion of agent i in
each agent’s ultimate opinion. Property 2 suggests that if a
non-stubborn agent wants to determine the group’s ultimate
opinion, i.e., to be a leader, it must ensure that it is not influenced by stubborn agents. If we regard initial opinions of
stubborn agents as external information, then this result is
consistent with the experimental results in Dyer et al. (2009)
and Couzin et al. (2005) that the leaders emerging spontaneously in groups are usually the individuals who have more
power in communication or external information. Furthermore, for any individual who has no external information, it
can never be a leader unless it does not receive information
of the individuals who have external information.
(6)
Let limk→∞ (ΞW)k = Q = [q1 , q2 , . . . , qn ] = [qi j ]n×n with
qi ∈ Rn , from equation (6) we obtain
(
QΞ = Q
QW = Q.
S
Because QΞ = Q, we have qi = 0 for any i ∈ VS
V p . It
f
follows
from
QW
=
Q
that
for
any
i
∈
V,
j
∈
V
V
, one
f
p
P
has nt=r1 +r2 +1 qit wt j = 0. Recalling that Q and W are both
nonnegative,
we have that for any i ∈ Vn , if there exists
S
j ∈ V f V p such that wi j , 0, then qli = 0 for any l ∈ V,
i.e., qi = 0. Furthermore, for aforementioned i ∈ Vn , l ∈ V
and qli = 0, if there exists u ∈ Vn satisfying wui , 0, then
qlu wui = qli = 0. Thus, qu = 0. This indicates that for any
agent i ∈ Vn , as long as it receives information from any
stubborn agents directly or indirectly, there holds qi = 0.
4
Opinion formation of the F-J model over issue sequences
In this section, we study opinion formation of the F-J
model over sequences consisting of interdependent issues.
On one hand, most of the prior investigations on opinion dynamics are considered over a single issue. In practice, however, associations of individuals are constituted to deal with
sequences of issues within particular domains, and successive issues in specific issue domain are always correlated.
On the other hand, for individuals, related issues always
arise repeatedly in practice. Empirical evidences show that a
group of individuals who share a common set of experiences
will hold highly similar beliefs or characteristics (Joshi et
al., 2010). Hence, it is significant to consider the formation
of opinions over issue sequences.
P
t
Let Q̃ = limk→∞ k−1
t=0 (ΞW) (I − Ξ) = [q̃1 , q̃2 , . . . , q̃n ], then
there holds Ψ = Q + Q̃ = [ψ1 , ψ2 , . . . , ψn ] = [q1 + q̃1 , q2 +
q̃2 , . . . , qn + q̃n ]. Since ξi = 1 for any i ∈ Vn , we obtain
q̃i = 0 for any i ∈ Vn , namely, qi = ψi for anySi ∈ Vn . In
conclusion, for any i ∈ Vn , if there exists j ∈ V f V p which
has a directed path to agent i in graph G(W), then ψi = 0.
In Ghaderi & Srikant (2014), the authors study the equilibrium of system (1). Under the assumption that the network topology is undirected and connected, they present the
form of equilibrium taking advantage of the appropriately
defined hitting probabilities of a random walk over the network. However, since their conditions for convergence require that ρ(ΞW) < 1, the equilibrium is only related to the
initial opinions of stubborn agents. A similar assumption for
directed graph is presented in Mirtabatabaei et al. (2014). In
Property 2, we show that under the condition of Assumption
1, if a non-stubborn agent can obtain information directly
or indirectly from any stubborn agents, including fully stubborn and partially stubborn agents, then the ultimate opinion x∗ does not include the information of this non-stubborn
agent’s initial opinion. Otherwise, according to the proof of
Theorem 1, the ultimate opinion is also related to the initial
opinions of non-stubborn agents which form ISCCs with no
stubborn agents in it.
Next, we shall briefly introduce the path-dependence theory. The path-dependence theory is originally studied in economic and institutional change (North, 1990; Page, 2006),
and subsequently developed in cognitive psychology (Egidi
& Narduzzo, 1997; MacKay et al., 2006). In Egidi & Narduzzo (1997), path-dependence is observed in the behavioral experiments of human groups. The main point of pathdependence is “history matters”. That is, the decision one
faces for any given circumstance are constrained by the
decisions one has made in the past, even though past circumstance may no longer be relevant. This phenomenon is
ubiquitous in technological innovation, institutional change
and cognitive process of humans, etc. In the cognitive and
decision-making process of humans, people always have
cognitive inertia with which they are unwilling to change
their beliefs or decisions over interdependent issues. For example, one may wonder that why the U.S. standard railroad
gauge is 4 feet 8.5 inches, which is an exceedingly odd number. A well known explanation for this question is that it
is resulted from path-dependence (North, 1990). Firstly, the
U.S. railroads were built by English expatriates and that is
the guage they built them in England. Further, the first rail
lines of England were built by the same people who built the
pre-railroad tramways, where that gauge was used. Moreover, the tramways were built by the same people who built
wagons using the same jigs and tools. In fact, that gauge
is the wheel spacing of the wagon. In this example, peo-
Remark 3 Property 1 and Property 2 also provide an interesting perspective on leadership in social networks (Dyer
et al., 2009) and animal groups (Couzin et al., 2005). In
Wang & Xiao (2007), a generalized definition of “leader”
and “follower” is presented. A leader refers to the agent
who determines the ultimate state of the system, and the rest
are followers. This definition includes the notion of “leader”
and “follower” in which a leader is the agent who sends
information to others but never receives information. From
Property 1, Ψ is a stochastic matrix, thus the element of ψi
6
issue 0
issue 1
...
issue 2
issue s
where the first term of Ci (x) depicts the cognitive inertia of
agent i to change its initial opinions (i.e., internal opinions)
for interdependent issues, and the second term represents
the willingness of agent i to escape being unsocial. As a
consequence, the initial opinion of agent i for issue s + 1
satisfies
issue s+1
time
0
k0
k1
k2
ks-1
ks
Fig. 1. An issue sequence.
ple’s decisions over the interdependent issue sequence “The
gauge of the U.S. railroad”, “The gauge of the English railroad”, “The gauge of the tramway” and “The wheel spacing
of the wagon” remain unaltered. This phenomenon is named
cognitive freezing (MacKay et al., 2006). Since in the FJ model, agents’ initial opinions can be regarded as their
internal opinions, we will establish a connection between
agents’ initial opinions for interdependent issues based on
the path-dependence theory.
xi (s+1, k s+1 ) = ζi xi (s, k s )+(1−ζi )
n
X
wi j x j (s+1, k s+1 ), (9)
j=1
i.e.,
x(s + 1, k s+1 ) = Λx(s, k s ) + (I − Λ)W x(s + 1, k s+1 ),
(10)
where Λ = diag(ζ1 , ζ2 , . . . , ζn )T .
Let s = 0, 1, 2, . . . denote a sequence of interdependent
or repeatedly arising issues over which path-dependence
works 2 , k s be a constant denoting the time at which issue
s arises, x(s, k) denote agents’ opinions for issue s at time
k. Suppose that issue 0 arises at time 0, agents stop dealing with issue s − 1 and start to deal with issue s at time k s
(Fig. 1). Note that different from the assumptions in Mirtabatabaei et al. (2014) and Jia et al. (2015) which require the
time interval k s+1 − k s tends to infinity, here k s+1 − k s can
be any positive integer. For a given issue s, system (1) is
modified as:
The hypothesis in equation (10) can be naturally observed
from reality. In practice, an individual always has cognitive
inertia over sequences of path-dependent issues, especially
when an issue arises repeatedly. In extreme cases, cognitive
inertia may reinforce into cognitive freezing with which individuals keep their decisions unchangeable, even they are
exposed to more efficient options (Egidi & Narduzzo, 1997;
MacKay et al., 2006). Next we propose an assumption about
G(W) which ensures that I − ΞW is nonsingular.
x(s, k + 1) = ΞW x(s, k) + (I − Ξ)x(s, k s ),
(7)
Assumption 2 For each ISCC of G(W), there exists at least
one stubborn agent in it.
where x(s, k s ) represents initial opinions, i.e., internal opinions, of agents for issue s, and k ∈ [k s , k s+1 ].
Lemma 4 I − ΞW is nonsingular if and only if Assumption
2 holds.
Let ζi denote the factor of cognitive inertia of agent i for
two successive issues in an path-dependent issue sequence.
Note that the basic assumption of the F-J model is that agents
are anchored to their initial opinions over a given issue,
this is coincident with the path-dependence theory which
emphasizes that individual has the cognitive inertia over a
sequence of interdependent issues. Thus, we assume that for
each agent i, its factor of cognitive inertia ζi equals to its
stubborn factor, i.e., ζi = 1 − ξi . Then, basing on the game
theory formulation of the F-J model in Bindel et al. (2011)
and the self-reinforcing process of path-dependence (North,
1990), we assume that in forming its initial opinion for issue
s + 1, agent i attempts to myopically minimize the following
cost function:
Ci (x) = ζi (xi − xi (s, k s ))2 + (1 − ζi )
n
X
wi j (xi − x j )2 ,
Proof. Sufficiency. Since Assumption 2 holds, the proof of
Theorem 1 shows that ρ(ΞW) = ρ(Ξ̃W̃) < 1, which implies
that I − ΞW is nonsingular.
Necessity. If Assumption 2 does not hold, there exists at
least one eigenvalue of ΞW equals to 1. Namely, I − ΞW is
singular.
From equation (10) we have
(I − W + ΛW)x(s + 1, k s+1 ) = Λx(s, k s ).
If Assumption 2 holds, then I − ΞW is nonsingular. Since
Λ = I − Ξ, we obtain
(8)
x(s + 1, k s+1 ) = (I − ΞW)−1 (I − Ξ)x(s, k s ).
j=1
2
Note that the issue sequence is not necessarily consecutive over
time, some other uncorrelated issues may interpolate in it. For
example, Let S 1 = S 10 , S 11 , S 12 , . . . denote a issue sequence which
consists of interdependent issues, and S 2 denote another. The issues in S 1 and S 2 may be irrelevant and arise alternately. Without
loss of generality, we focus on each path-dependent subsequence
in this paper.
(11)
Since ΞW + I − Ξ is a stochastic matrix, we have that for
any nontrivial Ξ and W, x(s, k s+1 ) = χ1n if and only if
x(s, k s ) = χ1n , where χ ∈ R is a constant. Thus, we focus
on consensus of agents’ initial opinions for each issue in
the sequel. Now, we shall propose a definition of opinion
consensus for system (7), (10).
7
1 for any i ∈ V. From (14) we obtain
Definition 2 System (7), (10) is said to achieve consensus
if and only if for any initial opinion x(0, 0), there exists a
constant χ ∈ R, such that
lim x(s, k s ) = χ1n .
1 + ξi
(12)
s→∞
ψ̂ii =
Remark 4 Suppose that Assumption 2 holds. If k s+1 − k s is
large enough for each s, such that
∞
P
then, according to Lemma 4 and equation (7), we obtain
x(s + 1, k s+1 ) = x(s, ∞),
(13)
which implies that agents’ initial opinions for issue s + 1
equal to their limiting opinions for issue s, namely, cognitive freezing happens. This is consistent with our discussion
above that cognitive inertia can be reinforced into cognitive freezing in extreme cases. For example, as more people bought QWERTY keyboard, buying other keyboards with
different key configuration requires learning to type anew.
Thus, people’s opinions for the sequence of issues related to
keyboard will be locked in QWERTY keyboard, even though
there are many other more efficient types of keyboard (Page,
2006). Other examples of cognitive freezing are also reported, such as the fall of the Dundee jute industry (MacKay
et al., 2006), the persistence of the narrow-gauge rail (North,
1990), etc. In Page (2006), the author attributes cognitive
freezing to the externalities of other people. Note that in
equation (8), we assume that each agent’s initial opinion for
the next issue is influenced by other agents, i.e., the interpersonal influence creates externalities under Assumption 2,
which lead to cognitive freezing in equation (13).
S
1
> 0.
1 − ξi wii
V p , we have ψii = ψ̂ii (1 −
(ΞW)t . Let (ΞW)t = [ψ̂ti j ]n×n . Note that ψ̂ti j > 0 repre-
Lemma 5 connects G(Ψ) with G(W), such that we can
address property of G(Ψ) by analyzing G(W). From the proof
of Lemma 5, we have
Ir1 ×r1 0
Ψ = Ψ p f Ψ pp
Ψn f Ψnp
Let Ψ = [ψi j ]n×n = (I − ΞW)−1 (I − Ξ). The next lemma
reveals the connections between G(Ψ) and G(W).
0
0 ,
0
where Ψ pp ∈ Rr2 ×r2 .
Property 3 Any root of subgraph G(Ψ pp ) is a center vertex
which has directed edges to any other vertices of G(Ψ pp ).
Lemma 5 Under Assumption 2, the following statements
hold:
S
(i) ψii > 0 for any i S
∈ V f Vp. S
(ii) For any i ∈ V p Vn , j ∈ V f V p , i , j, ψi j > 0 if and
only if there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i)
from
S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈
V p Vn .
Proof. Suppose that i is a root of G(Ψ pp ). Let (i, j) and
( j, l) be edges of G(Ψ pp ) for j, l ∈ V p . By Lemma
S 5, there
exist directed paths consisting of vertices in V p Vn from
i to j and j to l in G(W), respectively. Thus, there exists at
least aSdirected path consisting of edges between vertices
in V p Vn from i to l in G(W). From Lemma 5 we have
ψli > 0, namely, there exists a directed edge from i to l in
G(Ψ pp ). Following the same lines as above, one has that
any root of subgraph G(Ψ pp ) is a center vertex which has
directed edges to any other vertices of G(Ψ pp ).
Proof. Let Ψ̂ = [ψ̂i j ]n×n = (I − ΞW)−1 .
(i) Since (I − ΞW)Ψ̂ = I, we have
i ∈ V.
≥
sents that there exist paths consisting of t edges (maybe
appear repeatedly or contain self-loops ) in G(ΞW) start
from vertex j to vertex i. Moreover, if we take no account of the weights, G(ΞW) and G(W) have no difference except the edges to fully stubborn agents. Thus, if
there exists a directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) S
from
vertex j to vertex i in G(W), and j1 , j2 , . . . , jm ∈ V p Vn ,
we have ψ̂m
i j > 0. Therefore, ψ̂i j > 0. Otherwise, we have
ψ̂ti j = 0 for any t ∈ N. Thus, ψ̂i j = 0. Since ξ j < 1 for
S
j ∈ V f S V p , ψi j = ψ̂Si j (1 − ξ j ), we have that ψi j > 0 for any
i ∈ V p Vn , j ∈ V f V p , i , j if and only if there exists a
directed path ( j, j1 ), ( j1 , j2 ), . . . , ( jm , i) from
S vertex j to vertex i in G(W), where j1 , j2 , . . . , jm ∈ V p Vn .
Thus,
wit ψ̂ti ,
1 − ξi wii
(ii) Since Assumption 2 holds, one has (I − ΞW)−1 =
t=0
x(s, ∞) = (I − ΞW)−1 (I − Ξ)x(s, k s ).
n
X
wit ψ̂ti
t=1
t,i
Since 1 − ξi > 0 for any
S i ∈ Vf
ξi ) > 0 for any i ∈ V f V p .
x(s, k s+1 ) = x(s, ∞),
ψ̂ii (1 − ξi wii ) = 1 + ξi
n
P
(14)
t=1
t,i
Lemma 5 and Property 3 show that if there exists a directed path from a stubborn agent i to a partially stubborn
or non-stubborn agent j in G(W), then (i, j) is an edge of
G(Ψ). Moreover, if G(Ψ pp ) contains a spanning tree, then it
Assumption 2 implies that if wii = 1, ξi < 1. Thus, ξi wii <
8
also contains a star subgraph. In other words, the connectivity of the social network is enhanced over issue sequences.
The block form of Ψ shows that fully stubborn agents never
change their opinions in the process of opinion formation.
Thus, we consider the scenario in which there are no fully
stubborn agents in the social network.
form of Ψ indicates that when there exists more than one
fully stubborn agent in the network, consensus can not be
achieved for arbitrary initial opinion unless the influence of
fully stubborn agents to others is identical (Friedkin, 2015).
Since the condition for achieving opinion consensus in Theorem 2 is sufficient and necessary, it also gives the condition
for opinions of agents to form clusters.
Theorem 2 Suppose that V f = ∅ and Assumption 2 holds.
System (7), (10) achieves opinion consensus if and only if
there exists a partially stubborn agent which has directed
paths to any other partially stubborn agents in G(W).
Corollary 1 Suppose that V f = ∅ and Assumption 2 holds.
System (7), (10) forms opinion clusters if and only if there
exists more than one ISCC in G(W).
Proof. Sufficiency. Since V f = ∅, i.e., r1 = 0, we have
5
Ψ pp
W pp W pn
, Ψ =
W =
Ψnp
Wnp Wnn
0
,
0
As discussed in Section 4, the cognitive inertia of agent
can be reinforced into cognitive freezing under Assumption
2, i.e., each agent’s initial opinion for issue s + 1 equals to
its limiting opinion for issue s if its opinion for s converges.
It is mainly because of the externalities created by agents’
interpersonal influence under which agents treat opinions of
others with no difference. However, in practice, people usually assimilate information in a selective way: they tend to
give considerable weight to the information supporting their
initial opinions, and dismiss the undermining information
meanwhile, which is named echo-chamber effect (Sunstein,
2012; Dandekar et al., 2013). Similar observations in animal
groups are reported in Couzin et al. (2005). In this section,
we consider a more general scenario that each agent maintains a confidence bound in forming its initial opinions.
where W pp ∈ Rr2 ×r2 , Wnn ∈ Rn−r2 ×n−r2 , Ψ pp ∈ Rr2 ×r2 . From
Property 1 we have that Ψ pp and Ψnp are both stochastic matrices. Lemma 5. (i) indicates that Ψ pp has positive diagonal
elements. Moreover, since there exists a partially stubborn
agent which has
S directed paths consisting of edges between
vertices in V p Vn to any other partially stubborn agents in
G(W), Lemma 5. (ii) implies that G(Ψ pp ) has a spanning tree.
By Corollary 3.5 and Lemma 3.7 in Ren & Beard (2005),
we have that Ψ pp is stochastic, indecomposable and aperiodic (SIA). That is, there exists a nonnegative vector ν ∈ Rr2
such that lim Ψ spp = 1r2 νT , where ν satisfies ΨTpp ν = ν and
s→∞
1T ν = 1. Note that
Ψ spp
lim Ψ = lim
s→∞
s→∞ Ψ Ψ s−1
np pp
s
Opinion formation of the F-J model over issue sequences with bounded confidence
For simplicity, we employ the assumption used in Mirtabatabaei et al. (2014) and Jia et al. (2015) that the scale of
time k increases faster than the scale of issue s in this section. In other words, the convergence of opinion x(s, k) can
be achieved with k increasing before the next issue s+1 arising, i.e., k s = ∞ for issue s − 1 and k s = 0 for issue s. From
Remark 4, we have x(s + 1, 0) = x(s, ∞) under Assumption
2, which means that agents take their ultimate opinions for
the last issue as their initial opinions for the next issue. Inspired by the echo-chamber effect, we suppose that agent
i forms its initial opinion xi (s + 1, 0) by taking a weighted
average of other agents’ ultimate opinions x j (s, ∞), j ∈ V
which satisfy |xi (s, ∞) − x j (s, ∞)| < d, where d ∈ R is the
given confidence bound.
0 1r2 νT 0 1r2 νT 0
=
=
,
0
Ψnp 1r2 νT 0
1n−r2 νT 0
which indicates that Ψ spp converges to a matrix of rank
one as s → ∞. Since Assumption 2 holds, we have
lim s→∞ x(s, k s ) = Ψ s x(0, 0) = [νT 0Tn−r2 ]x(0, 0)1n , namely,
system (7), (10) achieves opinion consensus as s → ∞.
Necessity. If there exists no partially stubborn S
agent which
has directed paths consisting of vertices in V p Vn to any
other partially stubborn agents in G(W), Lemma 5. (ii) suggests that G(Ψ pp ) does not contain any spanning trees. This
implies that the eigenvalue 1 of Ψ pp has algebraic multiplicity larger than one, that is, Ψ has more than one eigenvalue equal to 1. In conclusion, opinion consensus cannot
be achieved.
Let Ni (s) = { j ∈ V : |xi (s, ∞) − x j (s, ∞)| < d} denote the
set of agents whose ultimate opinions for issue s are within
the confidence interval of agent i, NiΨ = { j ∈ V : ψi j > 0}
denote the set of neighbors of agent i in G(Ψ). Here we
employ a symmetric modification of the H-K model (Jing
et al., 2016; Yang et al., 2014):
X
xi (s + 1, 0) = xi (s, ∞) + h
(x j (s, ∞) − xi (s, ∞)), (15)
As is often pointed out, the F-J model does not generally
achieve opinion consensus over a single issue even if the network topology is completely connected (Ghaderi & Srikant,
2014; Frasca et al., 2015). However, Theorem 2 shows that
in the absence of fully stubborn agents, as long as there
exists at least one partially stubborn agent whose opinion
can scatter to other partially stubborn agents through partially stubborn agents or non-stubborn agents, opinion consensus can be achieved over a sequence of issues. The block
j∈Ni (s)
where h ∈ R satisfies h > 0 and 1 − (n − 1)h > 0. Note that if
the differences of agents’ initial opinions are large enough
9
such that Ni (s) = {i} for any i ∈ V and s ∈ N, equation (15)
will collapse to equation (11). Combining equation (15) and
Lemma 4, we have
G(Φ0 (s)) has a spanning tree, we have G(Φ1 (s)) contains a
spanning tree. Following from Corollary 3.5 and Lemma 3.7
in Ren & Beard (2005), Φ1 (s) is SIA.
x(s, ∞) = Ψx(s, 0),
Lemma 6 implies that as long as the connectivity of
G(Φ0 (s)) can be preserved, Φ1 (s) is SIA. This is on account
of enhanced connectivity of the interpersonal influence network over issue sequences, which is shown in Property 3.
Next, we give the condition for H(0) to preserve connectivity.
and
x(s + 1, 0) = H(s)x(s, ∞),
where Ψ = (I − ΞW)−1 (I − Ξ), H(s) = [hi j (s)]n×n , and
hii (s) = 1 − h(|Ni (s)| − 1) i ∈ V,
hi j (s) = h
j , i, j ∈ Ni (s),
hi j (s) = 0
otherwise.
(16)
Let y(s) = Ψx(s), then x(s + 1) = H(s)y(s). Denote the set
of common neighbors of agents i and j for issue s by
For simplicity, we omit the time scale k in the sequel. Let
Φ(s) = [ϕi j (s)]n×n = H(s)Ψ, then we have x(s + 1) =
Φ(s)x(s). According to the partition of V, we have
Φ1 (s)
Φ(s) =
Φ2 (s)
Ni j (s) = {l ∈ V : |yi (s) − yl (s)| < d, |y j (s) − yl (s)| < d}.
0
,
0
From equation (15), we have that G(H(s)) is undirected. The
following assumption proposes the conditions for connectivity preservation of G(H(s)).
where Φ1 (s) ∈ R(r1 +r2 )×(r1 +r2 ) . Rewrite H(s) as a same block
form of W:
H f f (s) H f p (s) H f n (s)
H(s) = H p f (s) H pp (s) H pn (s) ,
Hn f (s) Hnp (s) Hnn (s)
S
T
Assumption 3 (i) For any i ∈ V f , j ∈ (V p Vn ) Ni (0)
S
and l ∈ N Ψ
, l ∈ Ni (0). For any i ∈ V p Vn , j ∈
T
S
T j
, l ∈ N j (0) Ni (0).
(V p Vn ) Ni (0) and l ∈ N Ψ
Tj
(ii) For any i ∈ V f , j ∈ V f Ni (0), |Ni j (0)| > n2 . For any
S
T
1
.
i ∈ V p Vn , j ∈ V Ni (0), |Ni j (0)| > n2 + 4h
where H f f (s) ∈ Rr1 ×r1 , H pp (s) ∈ Rr2 ×r2 and Hnn (s) ∈
R(n−r1 −r2 )×(n−r1 −r2 ) . Let
H f f (s) H f p (s)
Φ0 (s) =
Wp f
W pp
.
As mentioned above, only if the difference between two
agents’ opinions is small enough, agents will take account
of other agents’ opinions. In Assumption 3, we give some
conditions about the distribution of agents’ ultimate opinions for the first issue to ensure that G(H(0)) is adequately
connected and thus the connectivity of G(H(s)) can be preserved for any s ∈ N. Note that given a social network, the
interpersonal influence network G(W) and agents’ stubborn
extent Ξ are determined, and y(0) = (I −ΞW)−1 (I −Ξ)x(0, 0).
Therefore, the conditions on y(0) in Assumption 3 are actually conditions on x(0, 0). From equation (15), we have
1
. Moreover, since |Ni j (0)| < n, from Assumption 3
h < n−1
1
1
1
we have h > 2n
. Thus, 2n
< h < n−1
.
(r1 +r2 )×(r1 +r2 )
Lemma 6 For any s ∈ N, if G(Φ0 (s)) has a spanning tree,
then Φ1 (s) is SIA.
Proof. From equation (16), H(s) is a nonnegative and
stochastic matrix with positive diagonal elements.
By
S
Lemma 5, we have ψii > 0 for any i ∈ V f V p . Thus,
Φ(s) and Φ1 (s) are both stochastic matrices and Φ1 (s) has
positive diagonal elements. Since Φ(s) = H(s)Ψ, we have
n
P
ϕi j (s) = hi j (s) +
hit (s)ψt j
t=r1 +1
n
P
hit (s)ψt j
ϕi j (s) =
t=r1 +1
i ∈ Vf
S
Vp, j ∈ V f ,
i ∈ Vf
S
Vp, j ∈ Vp.
Lemma 7 Under Assumption 3, no edge in G(H(0)) will be
lost in G(H(s)) for any s ∈ N.
(17)
S
Hence, for any i ∈ V f , j ∈ V f V p , hi j (s) > 0 indicates
ϕi j (s) > 0.SMoreover, Lemma 5. (ii) shows that for i ∈
V p , j ∈ V f V pS
, wi j > 0 means ψi j > 0. Thus, for any
i ∈ V p , j ∈ V f V p , wi j > 0 implies ϕi j > 0. Because
Proof. Firstly, we shall show that if Assumption 3 holds for
issue s, then it holds for issue s + 1. Suppose that for any
|yi (s) − y j (s)| < d, i, j ∈ V, Assumption 3 holds for issue s.
10
For i, j ∈ V f , we have
N j (s)
T
Ni (s) and |Nil (0)| >
X
|yi (s + 1) − y j (s + 1)|
=|xi (s + 1) − x j (s + 1)|
X
X
= yi (s) + h
(yl (s) − yi (s)) − y j (s) − h
(yl (s) − y j (s))
l∈Ni (s)
= yi (s) − y j (s) + h
X
+
(y j (s) − yi (s))+
h
X
(yl (s) − yi (s)) − h
≤
(yl (s) − y j (s))
X
≤(1 − h|Ni j (s)|)|yi (s) − y j (s)| + h
X
<
l∈N j (s)\Ni j (s)
ψ jl (xi (s + 1) − xl (s + 1)) .
l∈N Ψ
j
Noting that for any l ∈ N Ψ
j , one has l ∈ Ni (s) and |Nil (0)| >
n
.
Following
the
same
lines
as above, we obtain
2
|yi (s + 1) − y j (s + 1) |<
X
ψ jl (xi (s + 1) − xl (s + 1))
X
ψil
d X
d
ψ jl = d.
+
2
2
Ψ
l∈N j
The connectivity preservation is a crucial and challenging
problem in research for the consensus problem of the H-K
model since the evolution of agents’ opinions is only associated with the initial states and their distribution. In Jing et al.
(2016), a potential function is presented to measure the total
difference of agents’ initial opinions such that the connectivity is preserved by restricting the distribution of agents’
initial opinions. Following a different line, in Lemma 7 we
ensure that the links existing in G(H(0)) will never be lost
as s increases by proposing a lower bound for the number of
agents’ common neighbors in G(H(0)). In addition, different from the modified H-K model considered in Yang et al.
(2014), in system (7), (15), the evolution of opinions over
time scale increases the complexity of our analysis.
Vn , we have
l∈N Ψ
j
=
ψil (xl (s + 1) − xi (s + 1))
That is to say, if Assumption 3 holds for issue s, then no
edge contained in G(H(s)) will be lost, which implies that
Assumption 3 holds for issue s+1. Thus, no edge in G(H(0))
will be lost in G(H(s)) for any s ∈ N under Assumption 3.
|yi (s + 1) − y j (s + 1)|
X
= xi (s + 1) −
ψ jl xl (s + 1)
X
ψ jl (xi (s + 1) − xl (s + 1))
X
l∈NiΨ
<(1 − h|Ni j (s)|)d + h(|Ni (s)| + |N j (s)| − 2|Ni j (s)|)d
≤(1 − h|Ni j (s)|)d + h(n − |Ni j (s)|)d
≤(1 + hn − 2h|Ni j (s)|)d
<d.
S
X
l∈N Ψ
j
|(yl (s) − y j (s))|
For i ∈ V f , j ∈ V p
ψil (xl (s + 1) − xi (s + 1))
X
+
|(yl (s) − yi (s))|
l∈Ni (s)\Ni j (s)
+h
ψ jl xl (s + 1)
l∈N Ψ
j
l∈NiΨ
l∈N j (s)\Ni j (s)
l∈Ni (s)\Ni j (s)
X
we obtain
l∈N Ψ
j
l∈Ni j (s)
X
1
4h ,
l∈NiΨ
l∈N j (s)
X
+
ψil xl (s + 1) −
l∈NiΨ
=
n
2
Lemma 8 (Lemma 3.1, Ren & Beard (2005)) Let P1 , P2 , ...,
Pm ∈ Rn×n be m nonnegative matrices with positive diagonal
elements, then
ψ jl d = d.
P1 P2 ...Pm ≥ η(P1 + P2 + ... + Pm ),
l∈N Ψ
j
where η can be specified from matrices Pi , i = 1, 2, ..., m.
ψ jl xl (s + 1) .
By the proof of Lemma 6 and Lemma 7, that the subgraph of G(H(0)) corresponding to stubborn agents is connected also implies that Φ1 (s) is SIA. In the next theorem,
we employ a more feasible condition which reduces the requirements for the distribution of agents’ initial opinions.
Since for any l ∈ N Ψ
j , Assumption 3 ensures l ∈
Theorem 3 Under Assumption 2 and 3, system (7), (15)
achieves opinion consensus if the following conditions hold:
(i) there exists a partially stubborn
Sagent which has directed
paths consisting of vertices in V p Vn to any other partially
For i, j ∈ (V p
S
Vn ), we get
|yi (s + 1) − y j (s + 1)| =
X
l∈NiΨ
ψil xl (s + 1) −
X
l∈N Ψ
j
11
stubborn agents in G(W);
(ii) G(H f f (0)) is connected;
(iii) there exists an edge in G(H(0)) between a partially
stubborn agent and a fully stubborn agent.
Theorem 3 show that consensus can be achieved by the F-J
model over a sequence of issues. Yet in the same context,
it generally fails to achieve consensus over a single issue,
even under completely connected networks. In practice, as
the number of the issues that individuals collaborate to deal
with increases, initial opinions of individuals for each issue
become more and more similar and reach agreement ultimately. This phenomenon is named cohort effect (Joshi et
al., 2010), which describes a high degree of similarity in
characteristics or beliefs of a group of individuals who share
a common set of experiences. Moreover, this mechanism is
usually used to train groups for specific tasks (to name but
a few, athlete team, special action force or fire brigade) to
make the opinions or decisions of the group members grow
similar.
Proof. From Assumption 3 and Lemma 7, we have that
G(Φ0 (s)) contains a spanning tree for any s ∈ N. Hence,
Lemma 6 implies that Φ1 (s) is SIA and G(Φ1 (s)) contains
a spanning tree for any s ∈ N. Let ∆(s) = Φ(s − 1)Φ(s −
2) . . . Φ(1)Φ(0), then x(s) = ∆(s)x(0). From the block form
of Φ(s), we have
Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0)
∆(s) =
Φ2 (s − 1)Φ1 (s − 2) . . . Φ1 (0)
0
.
0
Since the set of all possible matrices H(s) is finite under
equation (16), Φ(s) = H(s)Ψ, one has that the set of all
possible matrices Φ(s) is finite, which indicates that the set
of all possible matrices Φ1 (s) is finite. Moreover, because
G(Φ1 (s)) contains a spanning tree for any s ∈ N, from
Lemma 8, we have Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) is SIA for
any s ∈ N. From Wolfowitz Theorem (Wolfowitz, 1963),
there exists a nonnegative vector ν ∈ Rr1 +r2 such that
6
In this section, numerical simulations are provided to illustrate the effectiveness of the theoretical results proposed
above.
Example 1 (Convergence of the F-J model over a single issue) Consider 10 agents labeled from 1 to 10
interacting with each other in digraph G(W 1 ) (Fig.
2a). W 1 is the stochastic adjacent matrix of G(W 1 ).
Let ξ1 = (0, 0, 0, 0.2, 0.5, 0.7, 1, 1, 1, 1)T , namely, V f =
{1, 2, 3}, V p = {4, 5, 6} and Vn = {7, 8, 9, 10}. Initialize x(k)
with x(0) = (−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T , the trajectory
of x(k) under G(W 1 ) with k increasing is shown in Fig. 2b.
lim Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) = 1r1 +r2 νT .
s→∞
Thus,
Φ1 (s − 1)Φ1 (s − 2) . . . Φ1 (0) 0
lim
s→∞ Φ (s − 1)Φ (s − 2) . . . Φ (0)
0
2
1
1
T
1
ν
0
r
+r
1
2
.
=
lim s→∞ Φ2 (s − 1)1r1 +r2 νT 0
Note that in Fig. 2b, the opinions of fully stubborn agents
are fixed, while the opinions of partially stubborn agents
and non-stubborn agents tend to be constant as k increases.
The network G(W 1 ) has four SCCs, i.e., {1, 4, 5}, {3, 6, 7},
{8, 9, 10}, {2}. The ISCC consisting of non-stubborn agents is
{8, 9, 10}, in which agent 9 and agent 10 both have two cycles
whose lengths are 2 and 3, respectively. Thus, Assumption 1
is satisfied. By computing we find√ that the maximum-modulus
√
eigenvalues of W 1 are 1, − 21 + 23 i, and − 12 − 23 i, while the
maximum-modulus eigenvalue of Ξ1 W 1 is 1, which accords
with the algebraic condition in Lemma 1. In Fig. 2b, the
trajectory of x(k) is almost fixed after k = 20. When k =
20, one can find that the ISCC {8, 9, 10} achieve consensus,
while the other non-stubborn agent 7 has different ultimate
opinion with them. Moreover, we have ψ7 = 0, ψ8 , ψ9 and
ψ10 are nonzero, which is consistent with Property 2 and the
discussion following it.
Since Φ2 is stochastic, we obtain
1r +r νT
lim ∆(s) = 1 2
s→∞
1n−r1 −r2 νT
0
.
0
Therefore,
lim lim x(s, k) = lim x(s) = [νT 0Tn−r1 −r2 ]x(0)1n ,
s→∞ k→∞
Simulations
s→∞
which implies that system (7), (15) achieves consensus as
k → ∞, s → ∞.
Example 2 (Consensus of the F-J model over issue
sequences) Consider 10 agents labeled from 1 to 10
in which agents 1 to 5 are partially stubborn agents,
others are non-stubborn agents. The network topology is characterized by the digraph G(W 2 ) (Fig. 3a).
Let ξ2 = (0.3, 0.6, 0.2, 0.8, 0.7, 1, 1, 1, 1, 1)T . x(0, 0) =
(−1, 0, 1, 1, −2, 0, −1, −2, 1, 2)T is the initial opinion vector
at s = 0 and k = 0. The trajectory of x(k) is showed in Fig.
4.
As we discussed in Rmark 4, cognitive freezing emerges
in model (7), (10) under Assumption 2. This is attributed
to the externality resulted from the interpersonal influence.
Thus, in model (7), (10), fully stubborn agents will keep
their opinions unchangeable for all issues. Theorem 3 shows
that the cognitive freezing is weakened by the bounded confidence of agents so that consensus can be achieved even
in the presence of fully stubborn agents. Theorem 2 and
12
2
2
partially stubborn agent
fully stubborn agent
6
partially stubborn agent
7
non-stubborn agent
6
non-stubborn agent
7
1
5
5
3
3
4
4
10
1
9
9
2
10
8
6
7
6
7
8
a . G(W 1 )
a . G(W 2 )
2.5
fully stubborn agents
partially stubborn agents
non−stubborn agents
2
partially stubborn agent
6
1.5
non-stubborn agent
7
1
x(k)
0.5
0
2
5
−0.5
3
−1
4
−1.5
1
−2
9
−2.5
0
10
4
8
12
16
20
k
7
b . x(k)
6
8
b . G(Ψ2 )
Fig. 2. The network topology G(W 1 ) and the trajectory of x(k).
Fig. 3. The network topologies G(W 2 ) and G(Ψ2 ).
Fig. 4 shows the trajectories of x(s, k) over issues s =
0, 1, 2, 5, 10, 20, respectively. Note that over each issue s,
x(s, k) tends to a steady opinion vector as k increases, and all
steady opinions tend to be a common value with s increasing. When s = 30, Fig. 4 shows that consensus is achieved
by system (7), (10). Moreover, since G(W 2 ) satisfies the condition in Assumption 2, we have Ψ3 = (I − Ξ2 W 2 )−1 (I − Ξ2 ).
From Lemma 5 and Property 3, the existence of a partially
stubborn agents in G(W 2 ) which has a directed path to other
partially stubborn agents implies that the subgraph corresponding to partially stubborn agents in G(Ψ2 ) not only has
a spanning tree, but also contains a star topology, and selfloops are contained by partially stubborn agents in G(Ψ2 ),
which are shown in Fig. 3b. We can find visually from Fig.
3b that partially stubborn agents do not receive information
from non-stubborn agents, which indicates that ψi = 0 for
any i ∈ {5, 6, . . . , 10}. This is consistent with the theoretical
result in Property 2.
Example 3 (Consensus of the F-J model over issue
sequences with bounded confidence) Consider system (7), (15) with 10 agents labeled from 1 to 10.
The network topology G(W 3 ) is showed in Fig. 5a.
Let ξ3 = (0, 0, 0, 0.8, 0.3, 0.2, 1, 1, 1, 1)T , namely, V f =
{1, 2, 3}, V p = {4, 5, 6} and others are non-stubborn agents.
Let x(0, 0) = (−0.7, 0.2, 0, 0.2, 2, −2.5, −1.5, 1, 1.5, −1)T .
1
1
The confidence bound is set as d = 1. Since 2n
< h < n−1
,
let h = 0.1. Fig. 6a and Fig. 6b show the trajectories of
x(s, k) and x(s, 0), respectively.
Because that in Fig. 5a, G(W 3 ) satisfies the condition
of Assumption 2, Ψ3 exists. G(Ψ3 ) is depicted in Fig. 5b.
Moreover, G(Ψ3 ) and x(0, 0) satisfy the conditions in Assumption 3 and Theorem 3, thus x(s, 0) reaches consensus
as s → ∞ (Fig. 6b), which implies x(s, k) reaches consensus (Fig. 6a). The connectivity of G(H(0)) is related with
the percentage of the fully stubborn agents. In this exam-
13
s=0
s=1
2
fully stubborn agents
partially stubborn agents
non−stubborn agents
2
x(1,k)
0
−2
0
10
20
s=2
30
0
1
−2
40 k
0
−2
s=5
k
0
s=10
s=20
k
−1
−3
10
9
k
2
0
0
−2
k
x(20,k)
x(10,k)
−2
2
−2
2
x(5,k)
x(2,k)
2
x(s,k)
x(0,k)
2
8
7
6
k
0
−2
partially stubborn agents
5
4
3
2
1
0
0
25
20
15
10
5
39
35
30
s
k
non−stubborn agents
a . The trajectories of x(s, k).
Fig. 4. The trajectories of x(s, k) at s = 0, 1, 2, 3, 4, 30, respectively.
2
fully stubborn agents
partially stubbornagents
non−stubborn agents
1.5
fully stubborn agent
2
1
partially stubborn agent
2
0.5
6
x(s,0)
non-stubborn agent
7
10
1
5
6
0
−0.5
0.1
−1
0
−1.5
−0.1
−2
−0.2
0.5
−2.5
0
2
4
6
8
10
12
14
1
16
1.5
18
20
2
22
2.5
24
3
26
28
30
32
34
36
3839
s
4
9
b . The trajectory of x(s, 0).
8
7
3
Fig. 6. The trajectories of x(s, k) and x(s, 0).
a . G(W 3 )
10
ple, Assumption 3 requires that each fully stubborn agent
has at least 8 neighbors in G(H(0)). By computing we have
y(0) = (−0.7, 0.2, 0, 0.2, 1.46, −1.9876, 0.0082, 0.0274, 0.2,
−0.25)T , thus agents 1, 2, 3, 4, 7, 8, 9, 10 form a completely
connected subgraph in G(H(0)), and agents 5 and 6 are isolated with others, respectively.
fully stubborn agent
2
partially stubborn agent
6
non-stubborn agent
1
7
2
7
6
In this paper, opinion dynamics in social networks with
stubborn agents has been investigated over issue sequences.
The social network with stubborn agents is described by
the F-J model. In order to investigate opinion formation of
the F-J model over issue sequences, we studied convergence
of the F-J model over a single issue and properties of the
ultimate opinion. Then taking advantage of the underlying
connections between the network of interpersonal influence
and the network describing the relationship of agents’ initial
opinion for successive issues, opinion consensus and cluster of the F-J model was investigated over issue sequences
based on the path-dependence theory. Moreover, we further
5
3
4
9
8
Conclusions
7
b . G(Ψ3 )
Fig. 5. The network topologies G(W 3 ) and G(Ψ3 ).
14
the community cleavage problem, IEEE Control Systems,
35(3), 40-51.
Friedkin, N. E., & Johnsen, E. C. (1999). Social influence
networks and opinion change, Advances in Group Processes, 16(1), 1-29.
Friedkin, N. E. (2011). A formal theory of reflected appraisals in the evolution of power, Administrative Science
Quarterly, 56(4), 501-529.
Frasca, P., Ishii, H., Ravazzi, C., & Tempo, R. (2015). Distributed randomized algorithms for opinion formation,
centrality computation and power systems estimation: A
tutorial overview, European journal of control, 24(1), 213.
Golub, B., & Jackson, M. O. (2010). Naive learning in social
networks and the wisdom of crowds, American Economic
Journal: Microeconomics, 2(1), 112-149.
Godsil, C., & Royal, G. (2001). Algebraic graph theory,
New York: Springer-Verlag.
Ghaderi, J., & Srikant, R. (2014). Opinion dynamics in social networks with stubborn agents: Equilibrium and convergence rate, Automatica, 50(12), 3209-3215.
Horn, R. A., & Johnson, C. R. (2012). Matrix analysis, New
York: Cambridge University Press.
Hegselmann, R., & Krause, U. (2002). Opinion dynamics
and bounded confidence models, analysis, and simulation,
Journal of Artificial Societies and Social Simulation, 5(3).
Jia, P., Mirtabatabaei, A., Friedkin, N. E., & Bullo, F. (2015).
Opinion dynamics and the evolution of social power in
influence networks, SIAM Review, 57(3), 367-397.
Jing, G., Zheng, Y., & Wang, L. (2016). Consensus of multiagent systems with distance-dependent communication
networks, IEEE Transactions on Neural Networks and
Learning Systems, DOI: 10.1109/TNNLS.2016.2598355.
Jadbabaie, A., Lin, J., & Morse, A. S. (2003). Coordination of groups of mobile autonomous agents using nearest
neighbor rules, IEEE Transactions on Automatic Control,
48(6), 988-1001.
Joshi, A., Dencker, J. C., Franz, G., & Martocchio, J. J.
(2010). Unpacking generational identities in organizations, Academy of Management Review, 35(3), 392C414.
Liu, H., Xie, G., & Wang, L. (2012). Necessary and sufficient
conditions for containment control of networked multiagent systems, Automatica, 48(7), 1415-1422.
Li, L., Scaglione, A., Swami, A., & Zhao, Q. (2013). Consensus, polarization and clustering of opinions in social
networks, IEEE Journal on Selected Areas in Communications, 31(6), 1072-1083.
Lamport, L., Shostak, R., & Pease, M. (1982). The Byzantine
generals problem, ACM Transactions on Programming
Languages and Systems, 4(3), 382-401.
Mirtabatabaei, A., & Bullo, F. (2012). Opinion dynamics
in heterogeneous networks: convergence conjectures and
theorems, SIAM Journal on Control and Optimization,
50(5), 2763-2785.
Mirtabatabaei, A., Jia, P., Friedkin, N. E., & Bullo, F. (2014).
On the reflected appraisals dynamics of influence networks with stubborn agents, American Control Conference, IEEE, 3978-3983.
Ma, J., Zheng, Y., Wu, B., & Wang, L. (2016). Equilibrium
considered the more general scenario where agents have
bounded confidence to others when they form their initial
opinions. Mathematical conditions for opinions achieving
consensus or forming clusters were established, respectively.
We showed that the F-J model may achieve opinion consensus over each path-dependent issue sequence, while it generally does not achieve consensus over a single issue. The
connections between network characterizing interpersonal
influence and the one describing the relationship of agents’
initial opinions for successive issues uncover the difference
between opinion formation over issue sequences and over a
single issue, such as the enhanced network connectivity in
the former. Our investigation may provide some theoretical
explanations for many observations in the real world such as
decision making in human society or animal kingdom. The
future work will focus on the evolution of agents’ extent of
stubborn over issue sequences.
References
Acemoglu, D., Ozdaglar, A., & ParandehGheibi, A. (2010).
Spread of (mis) information in social networks, Games
and Economic Behavior, 70(2), 194-227.
Altafini, C. (2013). Consensus problems on networks with
antagonistic interactions, IEEE Transactions on Automatic Control, 58(4), 935-946.
Brualdi, R. A., & Ryser, H. J. (1991). Combinatorial matrix
theory, New York: Cambridge University Press.
Boyd, S., Ghosh, A., Prabhakar, B., & Shah, D. (2006). Randomized gossip algorithms, IEEE Transactions on Information Theory, 52(6), 2508-2530.
Blondel, V. D., Hendrickx, J. M., & Tsitsiklis, J. N. (2009).
On Krause’s multi-agent consensus model with statedependent connectivity, IEEE Transactions on Automatic
Control, 54(11), 2586-2597.
Bindel, D., Kleinberg, J., & Oren, S. (2011). How bad is
forming your own opinion?, Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science, 57-66.
Couzin, I. D., Krause, J., Franks, N. R., & Levin, S. A.
(2005). Effective leadership and decision-making in animal groups on the move, Nature, 433(7025), 513-516.
Degroot, M. H. (1974). Reaching a consensus, Journal of
the American Statistical Association, 69(345), 118-121.
Dyer, J. R. G., Johansson, A., Helbing, D., Couzin, I. D., &
Krause, J. (2009). Leadership, consensus decision making
and collective behaviour in humans, Philosophical Transactions of the Royal Society of London B: Biological Sciences, 364(1518), 781-789.
Dandekar, P., Goel, A., & Lee, D. T. (2013). Biased assimilation, homophily, and the dynamics of polarization, Proceedings of the National Academy of Sciences, 110(15),
5791-5796.
Egidi, M., & Narduzzo, A. (1997). The emergence of pathdependent behaviors in cooperative contexts. International Journal of Industrial Organization, 15(6), 677-709.
Friedkin, N. E. (2015). The problem of social control and
coordination of complex systems in sociology: A look at
15
topology of multi-agent systems with two leaders: A zerosum game perspective, Automatica, 73, 200-206.
MacKay, R., Masrani, S., & McKiernan, P. (2006). Strategy
options and cognitive freezing: The case of the Dundee
jute industry in Scotland, Futures, 38(8), 925-941.
North, D. C. (1990). Institutions, institutional change and
economic performance, Cambridge university press.
Olfati-Saber, R., & Murray, R. M. (2004). Consensus problems in networks of agents with switching topology and
time-delays, IEEE Transactions on Automatic Control,
49(9), 1520-1533.
Parsegov, S. E., Proskurnikov, A. V., Tempo, R., & Friedkin,
N. E. (2017). Novel Multidimensional Models of Opinion Dynamics in Social Networks, IEEE Transactions on
Automatic Control, 62(5), 2270-2285.
Page, S. E. (2006). Path dependence, Quarterly Journal of
Political Science, 1(1), 87-115.
Ren, W., & Beard, R. W. (2005). Consensus seeking in
multiagent systems under dynamically changing interaction topologies, IEEE Transactions on Automatic Control,
50(5), 655-661.
Ravazzi, C., Frasca, P., Tempo, R., & Ishii, H. (2015).
Ergodic randomized algorithms and dynamics over networks. IEEE transactions on control of network systems,
2(1), 78-87.
Sunstein, C. (2012). Breaking up the echo, NY Times, A25.
Wang, L., & Xiao, F. (2007). A new approach to consensus
problems in discrete-time multiagent systems with timedelays, Science in China Series F: Information Sciences,
50(4), 625-635.
Wang, L., & Xiao, F. (2010). Finite-time consensus problems
for networks of dynamic agents, IEEE Transactions on
Automatic Control, 55(4), 950-955.
Wang, L., Jiang, F., Xie, G., & Ji, Z. (2009). Controllability of multi-agent systems based on agreement protocols,
Science in China Series F: Information Sciences, 52(11),
2074-2088.
Wang, L., Shi, H., Chu, T., Zhang, W., & Zhang, L.
(2004). Aggregation of foraging swarms, In Australasian
Joint Conference on Artificial Intelligence (pp. 766-777).
Springer, Berlin, Heidelberg.
Wolfowitz, J. (1963). Products of indecomposable, aperiodic, stochastic matrices, Proceedings of the American
Mathematical Society, 14(5), 733-736.
Xiao, F., & Wang, L. (2008). Asynchronous consensus
in continuous-time multi-agent systems with switching
topology and time-varying delays, IEEE Transactions on
Automatic Control, 53(8), 1804-1816.
Yang, Y., Dimarogonas, D. V., & Hu, X. (2014). Opinion
consensus of modified Hegselmann-Krause models, Automatica, 50(2), 622-627.
Zheng, Y., & Wang, L. (2014). Containment control of heterogeneous multi-agent systems, International Journal of
Control, 87(1), 1-8.
Zheng, Y., Ma, J., & Wang, L. (2017). Consensus of Hybrid
Multi-agent Systems, IEEE Transactions on Neural Networks and Learning Systems, DOI:10.1109/TNNLS.2017.
2651402.
16
| 3 |
1
The Stochastic Geometry Analyses of Cellular
Networks with α-Stable Self-Similarity
arXiv:1709.05733v1 [cs.IT] 18 Sep 2017
Rongpeng Li, Zhifeng Zhao, Yi Zhong, Chen Qi, and Honggang Zhang
Abstract—To understand the spatial deployment of base stations (BSs) is the first step to facilitate the performance analyses
of cellular networks, as well as the design of efficient networking
protocols. Poisson point process (PPP) has been widely adopted
to characterize the deployment of BSs and established the
reputation to give tractable results in the stochastic geometry
analyses. However, given the total randomness assumption in
PPP, its accuracy has been recently questioned. On the other
hand, the actual deployment of BSs during the past long evolution
is highly correlated with heavy-tailed human activities. The αstable distribution, one kind of heavy-tailed distributions, has
demonstrated superior accuracy to statistically model the spatial
density of BSs. In this paper, we start with the new findings
on α-stable distributed BSs deployment and investigate the
intrinsic feature (i.e., the spatial self-similarity) embedded in
the BSs. Based on these findings, we perform the coverage
probability analyses and provide the relevant theoretical results.
In particular, we show that for some special cases, our work could
reduce to the fundamental work by J. G. Andrews in [1]. We also
examine the network performance under extensive simulation
settings and validate that the simulations results are consistent
with our theoretical derivations.
Index Terms—Stochastic geometry, coverage probability, cellular networks, Poisson point process (PPP), α-stable distributions,
self-similarity
I. I NTRODUCTION
As a key enabler in the information and communications
technology (ICT) industry, cellular networks play a decisive
role in delivering communication messages and entertainment
content [2]. In order to meet the increasing traffic demand,
cellular network operators gradually deploy different types of
necessary infrastructure including lots of base stations (BSs).
To understand the spatial deployment of BSs is the first step
to facilitate the performance analyses of cellular networks,
as well as the design of efficient networking protocols. In
the earliest stages, a two-dimensional hexagonal grid model
was used, implying that BSs were deployed regularly, which
deviates from the real scenarios. In the recent stages, Poisson
point process (PPP) [1], [3]–[5] was assumed, which could
roughly model the randomness in the realistic deployment
of BSs in cellular networks, meanwhile leading to tractable
results. However, given the total randomness assumption in
PPP, its practical accuracy has been recently questioned [6],
[7]. Consequently, in order to reduce the modeling gap between the PPP model and the realistic spatial deployment of
R. Li, Z. Zhao, C. Qi and H. Zhang are with Zhejiang University, Hangzhou 310027, China (email:{lirongpeng, zhaozf, qichen7c, honggangzhang}@zju.edu.cn).
Y. Zhong is with Huazhong University of Science and Technology, Wuhan
430073, China (email: [email protected]).
BSs, other kinds of point processes have been exploited to
obtain more precise analytical results [8]. In particular, Poisson
cluster processes [9], [10] and Gauss-Poisson process [11] are
exploited to model the attractive behavior between BSs, while
Matérn hard core point process (MHCP) [12], Ginibre point
process (GPP) [8], [13], [14], and determinantal point process
[15] are studied to characterize the repulsive feature between
BSs [7], [16]–[18].
On the other hand, the actual deployment of BSs during the
past long evolution is highly correlated with human activities
[19]. Humans tend to live together with societal relationship,
and their social behaviors lead to mobile traffic hotspots, thus
causing BSs to be more densely deployed in certain areas.
Interestingly, according to an observation named “preferential
attachment” [20], Barabási et al. argued that many large
networks should grow to be heavy-tailed. As its names implies,
a heavy-tailed distribution has non-exponential bounded tail.
Mathematically, for a heavy-tailed random variable X, the
probability Pr(X > x) satisfies lim eκx Pr(X > x) = ∞,
x→∞
for all κ > 0. Many well-known statistical distributions including power-law distribution (also named as generalized Pareto
distribution), Weibull distribution, log-normal distribution, and
α-stable distribution [6], [21], [22] belong to the heavy-tailed
family. Therefore, heavy-tailed distributions appear to be more
suitable to capture the societal feature and clustering property
for the practical BSs.
Based on the practical BS deployment information, we have
validated that the α-stable distributions demonstrate superior
accuracy to statistically model the spatial density of BSs and
also outperform other aforementioned heavy-tailed distributions [7], [19], [23]–[25]. But the spatial density alone cannot
reach some intuitive conclusions. Fortunately, the α-stable
distributions, which have been widely adopted to characterize
the distribution of aggregated traffic at the BS level in cellular
networks and at the switch level in wired broadband networks,
often imply the self-similarity of traffic [22], [26]. As a popular
property in complex networks [27], the self-similarity of traffic
in the temporal domain means that the distribution of traffic
remains invariant under different temporal scales. Similar to
the case of traffic, as the practically deployed BSs are αstable distributed, it is natural to ask whether the spatial selfsimilarity holds in cellular networks. Furthermore, compared
to other point process models, the inhomogeneous PPP with αstable distributed density becomes applicable with significant
merit. The system model based on multiple tiers of PPPs
may lead to some tractable results, but it lacks the reasonable
explanation to divide the gradually deployed and increasingly
2
denser heterogeneous cells [28] into different tiers. On the
contrary, α-stable distributions contribute to understanding the
spatial self-similarity and bridging the gap between cellular
networks and other social behavior-based complex networks.
A. Related Works
Stochastic geometry tools have successfully established the
reputation to model and analyze wireless networks, as they
are able to capture the topological randomness in the network
geometry and lead to tractable analytical results [1], [3]–
[5], [9]–[18]. There is no doubt that the PPP belongs to
the most popular point process used in the literature because of its tractability and has led to a lot of meaningful
research results for cellular networks with different kinds of
cutting-edge techniques. The baseline operations in singletier and/or multiple-tier downlink cases are examined in [1],
[29]–[32] (and references therein) while their counterparts
in uplink cases are considered in references like [33]–[38].
User association and load balancing are examined in [39]–
[42]. Cognitive, cooperative and intelligent cellular networks
are taken into account in [18], [43]–[47]. Energy efficiency,
energy harvesting, and BS sleeping for green cellular networks
are investigated in [48]–[52]. Besides, multiple-input multipleoutput (MIMO) antenna and in-band full-duplex (FD) systems
are studied in [53]–[62]. Also, the PPP-related works have
been extended to mobile ad hoc networks [63]. Along with
the continuous progress in techniques for physical-layer and
network management in wireless networks, the PPP model
offers a useful theoretical platform for the initial performance
calibration, so as to save economic expenditure and avoid timeconsuming large-scale setup for realistic tests. For example,
FD communication, which benefits from the advance in signal
processing and self-interference cancellation techniques, is
optimistically promoted to double the spectral efficiency for
wireless networks [64]. However, given the more complicated
interference in FD networks, it is essential to conduct a careful
re-examination. Consistent with the system-level simulation
results in [64], [65] has taken advantage of the PPP model
and demonstrated the potential negative effect that FD communications might impose on the uplink transmission.
Although the PPP model provides many useful performance
trends, the concern about total independence between nodes
(e.g., BSs) has never stopped. Hence, in order to reduce the
modeling gap between the PPP model and the practical BS
deployment, point processes with either attractive or repulsive
spatial correlations have been explored as well.
• For attractive point processes, [66] has shown that Poisson cluster process is more suitable to model the spatial
distribution of BSs in urban areas. The general clustering
nature of deployed BSs in highly populated urban areas
clearly reflects the aggregation property of ever-growing
traffic demands in cellular networks [7]. [10] has further
verified the aggregated interference when the transmitting
nodes are modeled by Poisson cluster process and compared the corresponding results with that in the classical
PPP model.
• On the contrary, [29] and [67] have argued that BSs,
in particular macro BSs, in cellular networks tend to be
deployed systematically, such that any two BSs are not
too close. Thus, a spatial model based on a point process
with the repulsive nature seems to be more desirable
[29], [67]. Furthermore, the MHCP model [12] possesses
limited tractability and leaves many open challenges to
be addressed. The GPP model, one typical example of
determinantal point processes on the complex plane,
has been widely adopted and shows a promising tradeoff between accuracy and tractability [8], [13], [14]. In
particular, Deng et al. [8] have shown that the GPP leads
to the same trend curve of coverage probability1 as the
PPP.
Hence, we can come to the following conclusion that the
spatial BS density of large-scale cellular networks simultaneously possesses two conflicting features, that is, the density is
very large in some clustering regions while being significantly
smaller in others. The conclusion is also consistent with our
common sense. Furthermore, the heavy-tailed distributions,
which generate small values with the high probability but
still allow comparatively larger values, fit well to model the
spatial BS density. Our previous works [6], [7], [23]–[25] have
shown that the α-stable distribution, one kind of heavy-tailed
distributions, could be used to perfectly model the spatial BS
density in China and Italy, especially in urban areas.
In fact, α-stable distributions are not totally new to researchers in the communications field. On one hand, a distribution is called stable if a linear combination of two
independent identically distributed random variables has the
same distribution [21]. In particular, the Gaussian distribution,
which is one specific kind of α-stable distributions with α = 2,
has been widely adopted to model the distribution of channel
noise. On the other hand, α-stable distributions have been
observed for the distribution of wired broadband network
traffic [68] since two decades ago, and have recently been
found in modeling the cellular network traffic [22], [26]. αstable distributions also owe their importance in both theory
and practice to the generalization of the central limit theorem
[21] and the accompanying self-similarity [27], [69]–[71] of
the stable family. Furthermore, the well-known self-similarity
lays the very foundation for the traffic predictability, thus
making it possible to perform some actions beforehand. For
example, [70] has highlighted the practicability to perform
resource reservation schemes for the broadband network traffic
with self-similarity. Hence, as the spatial BS density could be
better modeled by the α-stable distributions, it is essential to
theoretically examine the spatial self-similarity and understand
its impact on coverage probability. In other words, we will take
the very first step to investigate the spatial self-similarity in the
BS deployment and perform stochastic geometry analyses of
cellular networks when the BS density is α-stable distributed.
B. Contributions
Different from the previous works, this paper aims at
explaining the implications to statistically model the spatial
1 The coverage probability indicates the probability that the signal-tointerference-plus-noise ratio (SINR) for a mobile user achieves a target
threshold.
3
BS density by α-stable distributions and to build the theory
to derive the coverage probability mathematically. Belonging
to one of the precursor works, we take advantage of a large
amount of practical BS deployment records and provide the
following key insights:
• Firstly, this paper visits and confirms the self-similarity in
the spatial deployment of BSs. To our best knowledge, it
is the first work in the literature to validate the spatial selfsimilarity among BSs in cellular networks. Therefore, this
paper lays the foundation to apply the advance in complex
network theory to examine cellular networks.
• Secondly, this paper provides the approach to characterize the coverage probability and derive the computable
representation when the spatial BS deployment satisfies
the self-similarity and the density of the practical BSs
obeys α-stable distributions.
• Thirdly, this paper theoretically proves that for some special cases, our result could be reduced to the fundamental
work by J. G. Andrews in [1]. Besides, this paper studies
the coverage probability performance under extensive
simulation settings and validates that the simulations
results are consistent with our theoretical derivations. The
paper also evaluates the impact of self-similarity on the
coverage probability performance.
The remainder of the paper is organized as follows. In Section II, we present some necessary mathematical background,
introduce the realistic dataset of spatial BS deployment and
validate the spatial self-similarity. In Section III, we provide
the analyses of coverage probability. Section IV evaluates the
computable representation obtained by the theoretical analysis
and compares it with the classical PPP model. Finally, we
conclude this paper in Section V.
Our previous works [6], [23] have validated that β = 1
holds for the fitting results of actual spatial BS density in
both Hangzhou, China and Rome, Italy. For simplicity of
representation, we use the operator b ∼ c to denote that b and
c have the same distribution and further have λ ∼ S(α, σ, µ)
to indicate that the spatial BS density λ follows the α-stable
distributions with β = 1.
2) The self-similarity: The self-similarity has been mostly
applied to model time series [69]. Given zero-mean, stationary
time series Y = (Yt , t = 1, 2, 3, · · · ), Y is called as self(m)
similar process if its m-aggregated series Y (m) = (Yt , t =
tm
P
(m)
Yk satisfy
1, 2, 3, · · · ) with each element Yt
=
k=(t−1)m+1
(m)
Yt
H
∼ m Yt for all m > 0, where H ∈ (0, 1) is the Hurst
parameter indicating the decay rate of statistical dependence
of two points with increasing time interval. In other words,
the self-similarity implies that the time series is exactly or
approximately similar to a part of itself.
The concept of self-similarity is also applicable to spatial
scenarios. For example, H. ElSawy et al. [16] have shown
the aggregated interference from distributed nodes to a receiver obey α-stable distributions, while X. Ge et al. [72]
have verified that the statistical characteristics of the wireless
cellular coverage boundary possess the self-similarity or fractal
property.
However, no exact self-similar phenomenon exists in the
real world. Most of the self-similar phenomena observed in the
real world only have the statistical characteristic. Moreover,
the self-similarity of random processes is usually evaluated
by the Hurst parameter, which can be estimated using two
typical methods and should be in the interval (0, 1).
• The rescaled adjusted range statistic (R/S) method:
For the random process
Yt , the partial sum is dePn
noted
by
Z(n)
=
Y
, and then the sample varit
II. M ATHEMATICAL BACKGROUND AND S TATISTICAL
t=1
Pn
Z(n) 2
t=1 (Yt − n )
M ODELING
.
ance could be denoted by S 2 (n) =
n
R(n)
A. Mathematical Background
The R/S statistic could be formulated as S(n) =
i
i
max (0,Z(i)− n
Z(n))− min (0,Z(i)− n
Z(n))
Beforehand, Table I summarizes the most used notations in
0≤i≤n
0≤i≤n
. The log-log
S(n)
this paper.
relationship between the R/S statistic and n should also
1) α-Stable distributions: A random variable x is said to
be linear with a slope of H.
obey the α-stable distribution f (x) if there are parameters
• The variance-time (V-T) method: This involves the aggre0 < α ≤ 2, σ ≥ 0, −1 ≤ β ≤ 1, and µ ∈ R such that its
(m)
gated series Yt
and the blocking size m. The log-log
characteristic function is of the following form:
(m)
plot of the variance of Yt
with respect to m should
Φ(ω) = E (exp(jωx)) =
follow a straight line with the slope ι if the data are
πα
n
o
statistical self-similar. In this case, H = 1 − 2ι .
α
α
+ jµω , α 6= 1;
exp −σ |ω| 1 − jβsgn(ω) tan 2
Moreover, a larger H ∈ (0.5, 1) corresponds to stronger self
2β
similarity.
exp −σ|ω| 1 + j sgn(ω) ln |ω| + jµω , α = 1.
π
(1)
The function E(·) represents the expectation operation with B. Statistical Modeling
respect to a random variable. α is called the characteristic
As validated in [6], [23], [25], when we divide the region
exponent and indicates the index of stability, while β is iden- into several parts and calculate the corresponding probability
tified as the skewness parameter. α and β together determine density function (PDF) of the spatial BS density in each part,
the shape of the distribution. Moreover, σ and µ are called we observe that the PDF follows the α-stable distributions.
scale and location shift parameters, respectively. In particular, For example, Fig. 1(a) depicts that a region is divided into
if α = 2, the α-stable distribution reduce to the Gaussian four parts. The spatial BS density in each part λ1 , λ2 , λ3 and
λ4 are mutually dependent and obey the α-stable distributions
distribution.
4
TABLE I
A
Λ(s, b, c)
Ξ(s, b, c)
The coverage probability
α-stable distributions with stability α, skewness β = 1, scale σ and shift µ
Pathloss exponent
The Rayleigh fading gain for the signal link
The fading exponent for the interfering links
Rayleigh fading factor
Noise factor
The Hurst parameter
The self-similarity zooming parameter
The predefined radius of inner circle in Fig. 1
The spatial density of BSs
The number of BSs within an r-radius R
circle
The standard Gamma function Γ(d) = 0∞ tRd−1 e−t dt
The incomplete Gamma function Γ(d, x) = x∞ td−1 e−t dt
def
Θ(s, b, c) = (sg)2/δ Γ(− 2δ + 1, sgb−δ ) − Γ(− δ2 + 1, sgc−δ )
def
Λ(s, b, c) = c2 1− exp −sgc−δ − b2 1 − exp −sgb−δ
def
Ξ(s, b, c) = πEg Λ(s, b, c) − Θ(s, b, c)
–
α = 0.6, σ = 0.25 and µ = 0.25
δ=4
–
Assumed to follow Rayleigh fading.
ζ=1
N0 = 1 (i.e., SNR = 0 dB)
H = 0.9
a=2
R = 40
–
–
–
–
(a)
(b)
l1
–
(c)
N 3 N 2 N1
3R
l3
lS l1
R
l4
–
2R
l2
–
aR
Θ(s, b, c)
Default Value in Sec. IV
R
pc
S(α, σ, µ)
δ
h
g
ζ
N0
H
a
R
λ
N (r)
Γ(d)
Γ(d, x)
Meaning
r
Symbol
LIST OF THE MAIN SYMBOLS AND FUNCTIONS IN THE PAPER .
Fig. 1. An illustration of the self-similarity for the spatial BS deployment.
with the same values α, σ and µ. The correlation between
BS density in different parts makes it challenging to directly
derive the coverage probability. Instead, it is essential to take
the statistical modeling of the correlation into consideration. In
that regards, self-similarity emerges as a promising technique
to characterize the correlation of the spatial density, as it has
manifested its importance and effectiveness by modeling the
correlation in different scales.
In order to show the self-similarity in spatial BS deployment, we take advantage of the collected BS deployment
records in Hangzhou, China and Rome, Italy2 . Fig. 2(a) and
2(d) illustrate the corresponding deployment situation in both
cities. Similar to the common validation process in temporal
dimension [69], we verify the accuracy of self-similarity in
spatial BS deployment as follows. As depicted in Fig. 1(b),
we randomly select a point as the starting “origin point” and
thus get some concentric circles with increasingly larger radii
(e.g., from R to 2R, 3R, · · · ). Then, we could get a series,
each value corresponding to the number of BSs in one circle.
Afterwards, we could apply the aforementioned R/S method
and V-T method in Section II-A2. Fig. 2(b)(c) and Fig. 2(e)(f)
2 Interested readers could also refer to [25] to check our preliminary results
on the spatial self-similarity in a more systematic manner.
provide the corresponding log-log plots for both cities. From
these figures, it can be observed that all the estimated Hurst
parameters are very close to 1. Therefore, we could boldly
argue that the spatially deployed BSs possess the spatial selfsimilarity. Then, according to the definition of self-similarity,
the number of BSs N (aR) within a circle of radius aR should
satisfy that N (aR) ∼ aH N (R), ∀R, a > 0, 0 ≤ H < 1,
where a indicates the self-similarity zooming parameter and
H denotes the Hurst parameter.
Remark 1. For cellular networks, the number of BSs exhibit
the spatial self-similarity.
III. T HE C OVERAGE P ROBABILITY A NALYSES
In this part, we derive the coverage probability in a downlink cellular network. Specifically, the coverage probability
is defined as the probability that the SINR for a mobile
user achieves a target threshold. Mathematically, the coverage
probability is formulated as
hr−δ
P(SINR > T ) = P
>T ,
(2)
N0 + Ir
where δ denotes the pathloss exponent factor of the standard
propagation channel. N0 is the additive white Gaussian noise
5
(a) BS Deployment in
Hangzhou, China
2.5
2
200
1.5
150
0.5
50
0
0
50
150
100
150
1.94
1.92
1.9
-0.5
0
log(Var) vs. log(m)
fitting line
1.96
1
100
(c) V-T Method
H=0.97553
1.98
log(R/S) vs. log(n)
fitting line
log(Var)
250
log(R/S)
km
300
(b) R/S Method
H=0.96645
1.88
0
0.5
1
1.5
2
0
0.5
1
km
log(n)
log(m)
(d) BS Deployment in
Rome, Italy
(e) R/S Method
H=0.84158
(f)V-T Method
H=0.86876
2
1.2
log(R/S) vs. log(n)
fitting line
1.5
1.5
log(Var) vs. log(m)
fitting line
1.1
1
log(Var)
km
log(R/S)
100
0.5
1
0.9
50
0
0.8
-0.5
0
0
50
100
150
200
250
300
0.7
0
0.5
km
1
1.5
2
0
0.5
log(n)
1
1.5
log(m)
Fig. 2. The self-similarity modeling results for the spatial BS deployment in Hangzhou and Rome.
(AWGN) factor and T is the target threshold. Besides, assuming that the fading follows the Rayleigh fading, we have
h ∼ exp(ζ). Without loss of generality, we assume the mobile
user is located at the “origin point”. When the distance from a
mobile user to its serving BS b0 is r, Ir denotes the cumulative
interference from all other BSs i (except BS b0 ) to the mobile
user.
A. Impact of α-Stable Distributions and Self-similarity
Before delving into the coverage probability, we first talk
about how the α-stable distributions and the self-similarity will
mathematically shape the BS deployment?
As depicted in Fig. 1(c), we assume that there exists a
specific R (i.e., R > r) to divide the whole region of interest
into two parts. Besides, the spatial BS density λ for the region
within the radius R satisfies λ ∼ S(α, σ, µ). Moreover, we
can have the following lemma to characterize the spatial BS
density λS for the region outside the radius R.
Lemma 1. The spatial BS density λ has a Laplace transform
σα α
exp − cos πα s − µs , α 6= 1;
2
Ψ(s) = E (exp(−sλ)) =
2σ
exp
s ln s − µs , α = 1.
π
(3)
while the spatial BS density λS will follow α-stable distributions (i.e., λS ∼ λaH−2 ) and the corresponding Laplace
transform could be formulated as
ΨS (s)
= E (exp(−sλS ))
σ α aα(H−2) α
H−2
exp
−
s
−
sa
µ
, α 6= 1;
cos πα
2
=
2σaH−2
H−2
exp
s
[ln
s
+
(H
−
2)
ln
a]
−
sa
µ
,
π
α = 1.
(4)
Proof. Following the definition of self-similarity, the number
of BSs in the interfering region is coupled with the selfsimilarity zooming parameter a and could be formulated as
N (aR) = λS πa2 R2 ∼ aH N (R) = λπaH R2 . Therefore,
λS ∼ λaH−2 .
(5)
When x ∼ S(α, σ, 0), we get the corresponding Laplace
transform (Proposition 1.2.12, [21]) as
σα α
exp − cos πα s , α 6= 1;
2
Ψ(s) = E (exp(−sx)) =
2
exp σ s ln s , α = 1.
π
(6)
6
α
(πσ)α 2α−1
exp −µπr2 − (πσ) r2α
2µπr
+
2α
, α 6= 1;
r
cos πα
cos πα
f (r) =
2
2
exp −µπr2 + 2σr2 ln(πr2 ) 2µπr + 4σr ln(πr2 ) + 4σr , α = 1.
(
σ α aα(H−2) h
Λ(s, R, aR)
πE
Λ(s,
r,
R)
−
Θ(s,
r,
R)
−
exp
−
λπE
g
g
cos πα
2
)
iα
H−2
− Θ(s, R, aR)
−a
µπEg Λ(s, R, aR) − Θ(s, R, aR) , α 6= 1;
(
LIr (s) =
o
i
n
h
exp 2σaH−2 ln πEg Λ(s, R, aR) − Θ(s, R, aR) + (H − 2) ln a − πaH−2 µ
)
· Eg Λ(s, R, aR) − Θ(s, R, aR) − λπEg Λ(s, r, R) − Θ(s, r, R) , α = 1.
ΨS (s)
By merging Eq. (6) and Eq. (7), we obtain the result.
(12)
0, ∀λ < 0. The equation (b) is originated from the Laplace
transform for a variable k ∼ S(α, σ, 0) in Eq. (6).
So, the PDF of r
Then, the Laplace transform of λS could be derived as
= E exp(−saH−2 (x + µ))
= Ψ(saH−2 ) · exp −saH−2 µ .
(8)
(7)
f (r) =
B. The PDF of the Distance from Serving BS to UE
In this paper, we adopt the minimum distance as the user
association metric. Therefore, when the distance from a mobile
user to its serving BS b0 is r, all distances from the interference
BSs to the target mobile user must be larger than r. The
derivation methodology of the PDF of r could basically
follow the well-established lines in [1]. However, as the BS
density varies in space and obeys the α-stable distributions,
the derivations should be re-considered. Therefore, we give
the following the theorem.
Theorem 1. The PDF of the distance from the closest BS r
to the target mobile user in a cellular network with α-stable
distributed BS density is expressed in Eq. (8).
Proof. Firstly, we take advantage of the simple fact that the
null probability of a 2-D Poisson process in an area A with
the given density λ is exp(−λA). Since λ ∼ S(α, σ, µ), we
have
P [r > rT ]
= P(No BS closer than rT )
Z ∞
2
e−λπ(rT ) f (λ)dλ
=
Z0 ∞
Z ∞
2
(a)
−λπ(rT )2
=
e
f (λ)dλ =
e−(k+µ)π(rT ) f (k)dk (9)
−∞
−∞
α
(πσ)
2α
exp −µπ(rT )2 −
, α 6= 1;
(rT )
(b)
cos πα
=
2
exp −µπ(r )2 + 2σ(r )2 ln(π(r )2 ) , α = 1,
T
T
T
where the equation (a) is based on the fact that the spatial
density in physical worlds should be non-negative, or f (λ) =
dF (r)
d (1 − P [r > rT ])
=
dr
drT
(10)
Then, merging Eq. (9) with Eq. (10) leads to the result.
Corollary 1. For homogeneous PPP with static density λ, the
PDF of r could reduce to f (r) = exp(−λπr2 )2πλr. Similarly,
for varying distribution λ, the conditional probability P(r|λ) =
exp(−λπr2 )2πλr.
This corollary could be achieved by directly applying Theorem 1 with a static density λ = µ and thus σ = 0. It is also
consistent with the conclusions in [1].
C. Main Result
We now state our main result for the coverage probability
analysis. Generally, the coverage probability pc is mainly
determined by the SINR threshold T , the spatial BS density
distribution S(α, σ, µ), and the pathloss exponent δ. In some
sense, pc (T, S(α, σ, µ), δ) is tightly coupled with the cumulative interference Ir for the α-stable distributed and selfsimilar BS deployment. The following lemma characterizes
the relationship between pc (T, S(α, σ, µ), δ) and Ir .
Lemma 2. The coverage probability pc (T, S(α, σ, µ), δ) could
be obtained from the following formula, that is,
pc (T, S(α, σ, µ), δ)
ZZ
δ
e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ,
=
(11)
r>0,λ>0
where LIr (s) is the Laplace transformation of random variable
Ir evaluated at s conditioned on the distance to the closest BS
from the origin. The Rayleigh fading coefficient is assumed
to satisfy h ∼ exp(ζ).
We leave the proof of Lemma 2 in Appendix A, as the
proof could be simply obtained by calculating the condition
probability on the distance r from the serving BS to the mobile
user.
7
exp −λS
L∆S (s) =
(1 − f (x))dx f (λS )dλS
λS =0
∆S
Z
α
Z
σ α aα(H−2)
H−2
(1 − f (x))dx
(1 − f (x))dx , α 6= 1;
−a
µ
exp − cos πα
∆S
∆S
(a)
2
(
(16)
=
Z
Z
)
H−2
2σa
H−2
ln
(1 − f (x))dx + (H − 2) ln a − a
µ
(1 − f (x))dx
, α = 1.
exp
π
∆S
∆S
(
!)
!#α
"
σ α aα(H−2)
H−2
exp −
, α 6= 1;
−a
µπEg Λ(s, R, aR) − Θ(s, R, aR)
πEg Λ(s, R, aR) − Θ(s, R, aR)
cos πα
2
!)
!
("
(
(b)
H−2
=
+ (H − 2) ln a
exp
2σa
ln πEg Λ(s, R, aR) − Θ(s, R, aR)
!)
#
H−2
, α = 1.
− πa
µ · Eg Λ(s, R, aR) − Θ(s, R, aR)
Z
∞
Z
Next, we focus on how to calculate the Laplace transform
of the cumulative interference LIr (s), when the BS deployment obey α-stable distributions and self-similarity. In Section
III-A, we divide the region of interest into two concentric
circles. For the inner circle ∆ with a radius R, the impact
of the spatial BS density λ is similar to the impact of r and
explicitly represented by the latter’s PDF f (r). Meanwhile,
the outer circle ∆S with the radius spanning from R to aR
has a spatial BS density λS ∼ λaH−2 and understanding
the impact of the interference from BSs in the outer circle is
one of the core contributions
Pof this paper. ForPsimplicity of
representation, we let Ir = i∈∆/b0 gi R̂i−δ + i∈∆S gi R̂i−δ
to denote the cumulative interference from all the other BSs i
(except the serving BS b0 ) to the mobile user with the distance
R̂i and pathloss gi . We could obtain the following lemma,
Lemma 3. The Laplace transform of the cumulative interference Ir for a cellular network with α-stable distributed
def
BSs could be formulated as Eq. (12), where Θ(s, b, c) =
2
−δ
2/δ
) − Γ(− 2δ + 1, sgc−δ ) . Γ(d, x) =
(sg)
δ + 1, sgb
R ∞ d−1 Γ(−
−t
t e dt Rdenotes the incomplete Gamma function,
x
∞
while Γ(d) = 0 td−1 e−t dt denotes the standard Gamma
def
function.
Besides, Λ(s,
b, c) = c2 1 − exp −sgc−δ −
b2 1 − exp −sgb−δ .
The equation (a) comes from the identical, independent distribution of gi and its further independence from the point
process.
From Eq. (13), it can be observed that the
Laplace transform his composedh of two parts
ii (i.e.,
Q
−δ
and
exp
−sg
R̂
E
L∆ (s)
=
E∆
g
i
ii
hQ i∈∆/b0 h
−δ
), which
L∆S (s) = E∆S
i∈∆S Eg exp −sg R̂i
is also consistent with our intuition. Next, we derive the
representation of these two parts separately.
• For L∆ (s), we have a fixed spatial density λ. Then, from
Q
the Campbell
theorem [12],
x∈∆ f (x) =
we have E
R
exp −λ ∆ (1 − fh(x))dx
i
.
Since f (x) = Eg exp −sg R̂−δ , we have
Z
(1 − f (x))dx
∆
Z R
vdv
1 − Eg exp −sgv −δ
= 2π
r(
)
(a)
= πEg Λ(s, r, R) − Θ(s, r, R)
We leave the derivation of the equation (a) in Appendix
B. Accordingly, we have
!#
"
Proof. According to the definition of Laplace transform, we
have
LIr (s)
= EIr e−sIr
= E∆
· E∆S
"
Y
i∈∆/b0
Y
i∈∆S
L∆ (s) = exp −λπEg Λ(s, r, R) − Θ(s, r, R)
(15)
For L∆S (s), as λS ∼ λaH−2 , we have Eq. (16),
where the equation (a) comes from the Laplace
transform of λS in Lemma 1. RThe equation (b) is
achieved by applying the result ∆S (1 − f (x))dx =
πEg {Λ(s, R, aR) − Θ(s, R, aR)}, which can be obtained by adopting a similar methodology as the derivation of Eq. (14).
Combining Eq. (15) and Eq. (16), we obtain the result.
•
= E∆+∆s ,gi exp −s
(a)
(14)
X
i∈(∆+∆s )/b0
gi R̂i−δ
i
h
−δ
Eg exp −sg R̂i
#
i
h
−δ
Eg exp −sg R̂i
(13)
With the results above, we could obtain the final result in
the following theorem.
8
pc (T, S(α, σ, µ), δ)
Z
n σ α aα(H−2)
α
=
2πr exp −
Ξ(ζT rδ , R, aR) − aH−2 µΞ(ζT rδ , R, aR) − µΞ(ζT rδ , r, R)
πα
cos 2
r>0
o h σα α
i
σα
δ
2 α
2
δ
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
−
µπr
−
ζT
r
N
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
dr
−
0
cos πα
cos πα
2
2
pc (T, S(α, σ, µ), δ)
(
Z
2πr exp
=
r>0
δ
h 2σaH−2
i
ln Ξ(ζT rδ , R, aR) + (H − 2) ln a − aH−2 µ Ξ(ζT rδ , R, aR)
π
2σΞ(ζT r , r, R) + 2σπr2
ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R) − µπr2
) π
i
h 2σ
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ dr
− ζT rδ N0 · −
π
+
Υ(r) =
Z
λ>0
(
"
δ
δ
!
exp −λπ Eg Λ(ζT r , r, R) − Θ(ζT r , r, R)
+r
2
#)
Proof. From Lemma 2, the coverage probability could be
calculated as
o
σα
δ
2 α
2
δ
πα (Ξ(ζT r , r, R) + πr ) − µπr − ζT r N0
cos 2
h σα α
i
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
dr
(21)
cos πα
2
2) if α = 1
r>0
where the equation (a) is the direct result of Corollary 1 and
Lemma 3 and Υ(r) couldRbe formulated as Eq. (20), where
the equation (b) is due to x e−sx xf (x)dx = − dΦ(s)
ds .
Merging Eq. (20), Eq. (19), and Lemma 3, we have the
result.
When we consider the whole region (i.e., the outer circle
spanning from R to ∞, or a → 0), we get the following
corollary.
Corollary 2. When a → ∞, the coverage probability could be
reduced to
1) if α 6= 1
Z
n
2πr exp − µΞ(ζT rδ , r, R)
pc (T, S(α, σ, µ), δ) =
r>0
Z
r>0
(19)
(20)
−
pc (T, S(α, σ, µ), δ) =
pc (T, S(α, σ, µ), δ)
ZZ
δ
e−ζT r N0 LIr (ζT rδ )P(r|λ)f (λ)drdλ
=
Z r>0,λ>0
δ
(a)
2πre−ζT r N0 L∆s (ζT rδ )Υ(r)dr
=
(18)
λf (λ)dλ
n
o
σα
exp −
(Ξ(ζT rδ , r, R) + πr2 )α − µΞ(ζT rδ , r, R) − µπr2
πα
cos 2
h σα α
i
δ
2 α−1
·
(Ξ(ζT
r
,
r,
R)
+
πr
)
+
µ
, α 6= 1
(b)
cos πα
2
=
n 2σΞ(ζT rδ , r, R) + 2σπr2
ln(Ξ(ζT rδ , r, R) + πr2 ) − µΞ(ζT rδ , r, R)
exp
π
oh 2σ
i
− µπr2 −
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 + µ , α = 1
π
Theorem 2. The coverage probability in a cellular networks
with α-stable distributed BS density and the self-similarity
is given by Eq. (17) and Eq. (18) for α 6= 1 and α = 1,
respectively, where Ξ(s, b, c) = πEg (Λ(s, b, c) − Θ(s, b, c)).
(17)
2πr exp
(
− µΞ(ζT rδ , r, R) − µπr2
2σΞ(ζT rδ , r, R) + 2σπr2
− ζT rδ N0 +
ln(Ξ(ζT rδ , r, R)+
π
)
i
h
2σ
ln(Ξ(ζT rδ , r, R) + πr2 ) + 1 dr (22)
πr2 ) · µ −
π
Proof. Firstly, we have
h
r δ i
lim a2 R2 1 − exp −ζT g(
)
a→∞
aR
r δ
R2 1 − exp −ζT g( aR
)
= lim
2
a→∞
1/a
r δ δ
) k
R2 1 − exp −ζT g( R
= lim+
(23)
k2
k→0
δ
−ζT g(δ − 1) Rrδ−2
r
(a)
exp −ζT g( )δ k δ k δ−2
= lim+
2
R
k→0
=0
where the equation (a) comes from the l’Hôpital’s Rule and
applies the fact that the pathloss exponent δ ≥ 2.
9
#
α−1
2(ζT g)2/δ r2
2
2
σα
πEg
Γ(− , ζT g) − Γ(− )
+µ ·
pc (T, S(α, σ, µ), δ) =
2πr
cos πα
δ
δ
δ
r>0
2
!α
(
2(ζT g)2/δ r2
2
2
σα α
Γ(− , ζT g) − Γ(− )
− ζT rδ N0
exp −
πEg
cos πα
δ
δ
δ
2
!)
2(ζT g)2/δ r2
2
2
− µπEg
Γ(− , ζT g) − Γ(− )
dr
δ
δ
δ
!
Z
2(ζT g)2/δ r2
i
h
2
2σ
2
ln πEg
+1 ·
Γ(− , ζT g) − Γ(− )
2πr µ −
pc (T, S(α, σ, µ), δ) =
π
δ
δ
δ
r>0
(
2(ζT g)2/δ r2
2(ζT g)2/δ r2
2
2
Γ(− , ζT g) − Γ(− ) ln πEg
exp − ζT rδ N0 2σEg
δ
δ
δ
δ
!
)
2/δ
2
2(ζT g) r
2
2
2
2
− µπEg
dr
Γ(− , ζT g) − Γ(− )
Γ(− , ζT g) − Γ(− )
δ
δ
δ
δ
δ
"
Z
Hence, as a → ∞, we have aH−2 → 0 for H ∈ (0, 1). So,
a
H−2
lim R2 1 − exp −ζT g( Rr )δ
R→∞
!
= aH−2 πEg Λ(s, b, c) − Θ(s, b, c)
h
r i
=a
πEg − R 1 − exp −ζT g( )δ
R
!
r
2
− (ζT g)2/δ r2 Γ(− + 1, ζT g( )δ )
δ
R
= πEg
(24)
− r2 [1 − exp (−ζT g)] − (ζT g)2/δ r2 ·
!
h
r i
2
Γ(− + 1, ζT g) + πEg R2 1 − exp −ζT g( )δ
δ
R
!
r
2
(27)
+ (ζT g)2/δ r2 Γ − + 1, ζT g( )δ
δ
R
2
− r2 [1 − exp (−ζT g)] + (ζT g)2/δ r2 Γ(− + 1)
δ
!
2
− (ζT g)2/δ r2 Γ(− + 1, ζT g)
δ
!
2
2
2(ζT g)2/δ r2
(a)
2
Γ(− , ζT g) − Γ(− )
= −πr + πEg
δ
δ
δ
→ πEg
→0
From Theorem 2, it can be observed that when
→ ∞, only the term aH−2 Ξ(ζT rδ!
, R, aR) =
will be af-
fected. We have the conclusion.
Based on Corollary 2, we have the following remark.
Remark 2. When we expand the interference to the whole
region, the cumulative interference from the outer circle could
be negligible and the coverage probability is mainly contingent
on the SINR within the inner circle.
When R → ∞, we can further simplify the results to get
more interesting insight.
Theorem 3. When R → ∞, the coverage probability could
be reduced to Eq. (25) and Eq. (26) for α 6= 1 and α = 1,
respectively.
Proof. Similar to the lines to proveCorollary 2, we
r δ
)
=
0 and
have
lim a2 R2 1 − exp −ζT g( aR
R→∞
2.
Ξ(ζT rδ , r, R) = πEg Λ(s, b, c) − Θ(s, b, c)
2
aH−2 πEg Λ(ζT rδ , R, aR) − Θ(ζT rδ , R, aR)
≥
δ
!
h
r δ i
+ aH−2 πEg a2 R2 1 − exp −ζT g(
)
aR
!
r δ
2
2/δ 2
) )
+ (ζT g) r Γ(− + 1, ζT g(
δ
aR
a
0 for all δ
(26)
Then lim Ξ(ζT r , R, aR) = 0. On the other hand, as
R→∞
R → ∞,
δ
Ξ(ζT r , R, aR)
H−2
=
(25)
where the Equation (a) comes from Γ(s, x) = (s − 1)Γ(s −
1, x) + xs−1 e−x and Γ(s) = (s − 1)Γ(s − 1).
There, we obtain the result in the theorem after simple
mathematical manipulations.
Next, we state the coverage probability when extra constraints are imposed, that is, the spatial density in the inner
circle is fixed (i.e., σ = 0 and λ = µ in Theorem 3). We get
the following corollary.
Corollary 3. The coverage probability in cellular networks
with fixed spatial BS density is
pc (T, S(α, 0, λ), δ)
(
Z
2(ζT g)2/δ r2
=
2πµr exp − ζT rδ N0 − µπEg
δ
r>0
10
1
0.9
-Stable theory, SNR = 20 dB
-Stable theory, SNR = 0 dB
PPP theory, SNR = 20 dB
PPP theory, SNR = 0 dB
-Stable simulation, SNR = 20 dB
-Stable simulation, SNR = 0 dB
PPP simulation, SNR = 20 dB
PPP simulation, SNR = 0 dB
Coverage Probability
0.8
0.7
0.6
0.7
0.5
0.4
0.3
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0.1
0
-10
-Stable, = 0.25
-Stable, = 25
-Stable, = 100
PPP, = 0.25
PPP, = 25
PPP, = 100
0.8
Coverage Probability
0.9
-8
-6
-4
-2
0
2
4
6
8
0
-10
10
-8
-6
-4
SINR Threshold (dB)
Fig. 3. The coverage probability comparison under different SNR environment.
!)
dr
0
2
4
6
8
10
Fig. 4. The coverage probability comparison under various (average) spatial
BS densities.
0.9
(28)
Remark 3. When the spatial density is fixed and equals λ,
the self-similarity patterns no longer take effect and our result
could be reduced to the well-recognized conclusions obtained
by J. G. Andrews et al. in [1].
IV. N UMERICAL A NALYSES
In this part, we provide numerical evaluations through which
we compare the coverage probability of the cellular network
with α-stable distributed BS density and the classical PPP
model. Our simulation parameters are configured according to
Table I. In particular, the default spatial BS density for the PPP
model is consistent with that in [1]. As [21] states that when
α ∈ (0, 1), the mean value of S(α, σ, µ) equals µ. Therefore,
it is fair to compare the network with α-stable distributed BS
density and the classical PPP model.
Firstly, we leverage the theoretical analysis results and give
the coverage probability comparison under different AWGN
environment in Fig. 3. From the figure, the network with αstable distributed BS density exhibits significant performance
improvement than the PPP model in low SNR environment
while the performance gap becomes gradually narrow along
with the increase of SNR. On the other hand, the performance
gap between SNR = 0 dB and SNR = 20 dB is only 4 dB
and 6 dB for the α-stable model and the PPP, respectively,
which demonstrates that the cellular network is interferencelimited rather than noise-limited. Fig. 3 also depicts the results
by Monte Carlo simulations (see the dashed or dotted curves)
and each curve is averaged under 15000 iterations. It can be
observed that the results obtained by Monte Carlo simulations
match well with those obtained by the theoretical analyses,
which further verifies the correctness of our theoretical derivations.
Fig. 4 illustrates interesting coverage probability comparison under various (average) spatial BS densities. It shows that
µ = 0.25 has lead to remarkable coverage probability and
-Stable,
-Stable,
-Stable,
PPP
0.8
= 0.5
= 0.7
= 0.9
0.7
Coverage Probability
h
2 i
2
Γ(− , ζT g) − Γ(− )
δ
δ
-2
SINR Threshold (dB)
0.6
0.5
0.4
0.3
0.2
0.1
-10
-8
-6
-4
-2
0
2
4
6
8
10
SINR Threshold (dB)
Fig. 5. The impact of α on the coverage probability comparison.
also made the networks to be interference-limited. Therefore,
further increasing the spatial density would add more to the
aggregated interference and impose negative impact on the
coverage probability. It also implies that the influence of
the spatial BS density on the coverage probability is rather
sophisticated. Fig. 5 and Fig. 6 further examine the impact of
α and σ. They show that when α becomes larger or σ gets
smaller, the network coverage probability increases. In some
cases, the network with α-stable self-similarity could produce
interior performance than the PPP model.
Next, we focus on the impact of the spatial self-similarity on
the coverage probability. Recalling the statements in Section
II-A2, the spatial self-similarity is examplified by the relationship N (aR) ∼ aH N (R) or λS ∼ aH−2 λ. Therefore, we
examine the coverage probability when a and H differs and
provide the corresponding results in Table II. From the table,
we observe increasing H or decreasing a will result in a slight
reduction of the coverage probability. The trivial impact of
a and H on the network performance can be explained as
that a variation of H or a will make the spatial BS density
11
TABLE II
A
SUMMARY OF THE NETWORK COVERAGE PROBABILITY UNDER DIFFERENT a AND
SNR
-10 dB
0 dB
10 dB
a=2
H = 0.9
a = 20
H = 0.9
α-Stable
a = 200
H = 0.9
a=2
H = 0.1
a=2
H = 0.5
PPP
0.8015
0.4437
0.1355
0.8019
0.4441
0.1357
0.8020
0.4443
0.1357
0.8016
0.4439
0.1356
0.8016
0.4438
0.1355
0.7531
0.3580
0.1153
0.9
0.9
-Stable,
-Stable,
-Stable,
-Stable,
PPP
0.8
= 0.25
= 2.5
= 25
= 250
-Stable, R = 40
-Stable, R = 1
-Stable, R = 0.5
PPP
0.8
0.7
Coverage Probability
Coverage Probability
0.7
0.6
0.5
0.4
0.3
0.6
0.5
0.4
0.3
0.2
0.2
0.1
0
-10
H.
-8
-6
-4
-2
0
2
4
6
8
0.1
-10
10
-8
-6
-4
SINR Threshold (dB)
-2
0
2
4
6
8
10
SINR Threshold (dB)
(a) The impact of R
Fig. 6. The impact of σ on the coverage probability comparison.
0.9
-Stable, = 2.5
-Stable, = 3
-Stable, = 4
PPP, = 2.5
PPP, = 3
PPP, = 4
0.8
0.7
Coverage Probability
λS of the outer circle larger from a probabilistic sense, thus
making BSs over-crowded and generating huge interference.
This phenomenon that stronger self-similarity incurs negative
impact is also consistent with its counterpart of self-similar
Ethernet traffic. As stated in [73], stronger self-similarity in
Ethernet traffic will make heavier traffic prone to arrive in a
sequel and congest the network.
We continue the performance analyses in Fig. 7(a) and Fig.
7(b). Fig. 7(a) shows reducing R will cause a reduction of
coverage probability for low SINR threshold but an increment
for high SINR threshold. On the other hand, consistent with
our intuition, Fig. 7(b) depicts that a smaller pathloss exponent
will bring a lower coverage probability. However, the network
with α-stable distributed BSs always demonstrates relatively
larger coverage probability than the PPP model.
0.6
0.5
0.4
0.3
0.2
0.1
0
-10
-8
-6
-4
-2
0
2
4
6
8
10
SINR Threshold (dB)
(b) The impact of δ
Fig. 7. Performance sensitivity analyses under different R and δ.
V. C ONCLUSION
In this paper, we have performed the stochastic geometry
analyses in cellular networks with α-stable self-similarly deployed BSs. Based on the practical BS deployment records
in China and Europe (Italy), we have validated the spatial
self-similarity among BSs. Afterwards, we have theoretically
derived the coverage probability for cellular networks with
self-similarity and provided a tractable result. In particular,
we have demonstrated that our analytical results could be
reduced to the works achieved by J. G. Andrews [1]. We
have also simulated the coverage probability performance
under extensive parameter settings and verified the consistence
between the theoretical and simulation results. Our results
have shown that compared to the classical PPP model, the
modeling with α-stable self-similarity could contribute to
analyze the performance under more sophisticated network
configurations, thus making it easier to understand the actual
network variations.
There still exist some open questions to be addressed. For
example, our work has shown that instead of improving the
coverage performance, simple yet stubborn deployment of
BSs incurs significant interference and degrades the coverage
performance. Therefore, frequency reuse has been applied in
practical cellular communication. In this case, it is still mean-
12
ingful to combine α-stable self-similarity with more realistic
network configurations, so as to produce more valuable results.
A PPENDIX
A. Proof of Lemma 2
Proof. According to the definition of the coverage probability,
we have
pc (T, S(α, σ, µ), δ)
= Er [P(SINR > T |r)]
ZZ
P(SINR > T |r)P(r|λ)f (λ)drdλ
=
r>0,λ>0
ZZ
hr−δ
> T |r P(r|λ)f (λ)drdλ
P
=
N0 + Ir
r>0,λ>0
(29)
Next, recalling that theh pathloss in Rayleigh
fading satisfies
i
hr −δ
h ∼ exp(ζ), the term P N0 +Ir > T |r will satisfy
hr−δ
> T |r
N0 + Ir
= P h > rδ T (N0 + Ir )|r
= EIr P h > rδ T (N0 + Ir )|r, Ir
= EIr exp(−ζrδ T (N0 + Ir ))|r, Ir
P
= e−ζT r
δ
N0
(30)
LIr (ζT rδ )
Combining Eq. (29) and Eq. (30), we get the result.
B. Derivations of Eq. (14)
In this part, we provide the details about the equation (a)
in the Eq. (14).
Z
Z
R
(1 − f (x))dx = 2π
vdv
1 − Eg exp −sgv −δ
∆
r
Z ∞Z R
1 − exp −sgv −δ vdvf (g)dg
(31)
= 2π
=π
Z
0
0
∞
Z
|r
r
R−δ
−δ
2
{1 − exp (−sgy)} dy − δ f (g)dg
{z
}
(>)
n
o
= πEg Λ(s, r, R) − Θ(s, r, R)
The last equation holds, since for the inside integral (>), we
have
2
R−δ
(>) = y − δ [1 − exp (−sgy)] −δ
r
Z R−δ
2
2
(32)
(sgy)− δ exp (−sgy) dy
− (sg) δ
r −δ
= R2 1 − exp −sgR−δ − r2 1 − exp −sgr−δ
2
2
2
−δ
−δ
δ
− (sg) Γ(− + 1, sgr ) − Γ(− + 1, sgR )
δ
δ
R EFERENCES
[1] J. G. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to
coverage and rate in cellular networks,” IEEE Trans. Wireless Commun.,
vol. 59, no. 11, pp. 3122–3134, Nov. 2011.
[2] R. Li, Z. Zhao, X. Zhou, G. Ding, Y. Chen, Z. Wang, and H. Zhang,
“Intelligent 5G: When cellular networks meet artificial intelligence,”
IEEE Wireless Commun., Mar. 2017, (early access).
[3] J. G. Andrews, H. Claussen, M. Dohler, S. Rangan, and M. C. Reed,
“Femtocells: Past, present, and future,” IEEE J. Sel. Area. Comm.,
vol. 30, no. 3, pp. 497–508, Apr. 2012.
[4] J. G. Andrews, S. Singh, Q. Ye, X. Lin, and H. Dhillon, “An
overview of load balancing in HetNets: Old myths and open
problems,” arXiv:1307.7779 [cs, math], Jul. 2013. [Online]. Available:
http://arxiv.org/abs/1307.7779
[5] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
M. Franceschetti, “Stochastic geometry and random graphs for
the analysis and design of wireless networks,” IEEE J. Sel. Area.
Comm., vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
[6] Y. Zhou, R. Li, Z. Zhao, X. Zhou, and H. Zhang, “On the α–stable
distribution of base stations in cellular networks,” IEEE Commun. Lett.,
vol. 19, no. 10, pp. 1750–1753, Oct. 2015.
[7] Y. Zhou, Z. Zhao, Y. Louet, Q. Ying, R. Li, X. Zhou, X. Chen, and
H. Zhang, “Large-scale spatial distribution identification of base stations
in cellular networks,” IEEE Access, vol. 3, pp. 2987 – 2999, Dec. 2015.
[8] N. Deng, W. Zhou, and M. Haenggi, “The Ginibre point process as
a model for wireless networks with repulsion,” IEEE Trans. Wireless
Commun., vol. 14, no. 1, pp. 107–121, Jan. 2015.
[9] M. Haenggi and R. K. Ganti, “Interference in large
wireless networks,” Foundations and Trends in Networking,
vol. 3, no. 2, pp. 127–248, Nov. 2009. [Online]. Available:
http://www.nowpublishers.com/article/Details/NET-015
[10] Y. J. Chun, M. O. Hasna, and A. Ghrayeb, “Modeling heterogeneous
cellular networks interference using poisson cluster processes,” IEEE J.
Sel. Area. Comm., vol. 33, no. 10, pp. 2182 – 2195, May 2015.
[11] A. Guo, Y. Zhong, W. Zhang, and M. Haenggi, “The Gauss-Poisson
process for wireless networks and the benefits of cooperation,” IEEE
Trans. Commun., vol. 64, no. 5, pp. 1916–1929, May 2016.
[12] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry
and its applications,, 3rd ed. Wiley, Jul. 2013. [Online]. Available:
http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470664819.html
[13] N. Miyoshi and T. Shirai, “A cellular network model with Ginibre
configured base stations,” Adv. in Appl. Probab., vol. 46, no. 3, pp.
832–845, Sep. 2014.
[14] T. Kobayashi and N. Miyoshi, “Uplink cellular network models with
Ginibre deployed base stations,” in Proc. IEEE ITC 2014, Karlskrona,
Sweden, Sep. 2014.
[15] Y. Li, F. Baccelli, H. S. Dhillon, and J. G. Andrews, “Fitting determinantal point processes to macro base station deployments,” in Proc.
IEEE Globecom 2014, Austin, TX, USA, Dec. 2014.
[16] H. ElSawy, A. Sultan-Salem, M. S. Alouini, and M. Z. Win, “Modeling
and analysis of cellular networks using stochastic geometry: A tutorial,”
IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167–203, 2017.
[17] I. Flint, X. Lu, N. Privault, D. Niyato, and P. Wang, “Performance
analysis of ambient RF energy harvesting with repulsive point process
modeling,” IEEE Trans. Commun., vol. 14, no. 10, pp. 5402–5416, Oct.
2015.
[18] H. ElSawy and E. Hossain, “Two-tier HetNets with cognitive femtocells: Downlink performance modeling and analysis in a multichannel
environment,” IEEE Trans. Mob. Comput., vol. 13, no. 3, pp. 649–663,
Mar. 2014.
[19] X. Zhou, Z. Zhao, R. Li, Y. Zhou, J. Palicot, and H. Zhang, “Human
mobility patterns in cellular networks,” IEEE Commun. Lett., vol. 17,
no. 10, pp. 1877–1880, Oct. 2013.
[20] A.-L. Barabsi and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509–512, Oct. 1999.
[21] G. Samorodnitsky, Stable non-gaussian random processes:
Stochastic
models
with
infinite
variance.
New
York:
Chapman and Hall/CRC, Jun. 1994. [Online]. Available:
http://www.amazon.com/Stable-Non-Gaussian-Random-Processes-Stochastic/dp/041205
[22] R. Li, Z. Zhao, J. Zheng, Y. Chen, C. Mei, Y. Cai, and H. Zhang,
“The learning and prediction of application-level traffic data in cellular
networks,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3899 –
3912, Jun. 2017.
[23] L. Chiaraviglio, F. Cuomo, M. Maisto, A. Gigli, J. Lorincz, Y. Zhou,
Z. Zhao, C. Qi, and H. Zhang, “What is the best spatial distribution
13
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
to model base station density? A deep dive into two European mobile
networks,” IEEE Access, vol. 4, pp. 1434–1443, Apr. 2016.
L. Chiaraviglio, F. Cuomo, A. Gigli, M. Maisto, Y. Zhou, Z. Zhao, and
H. Zhang, “A reality check of base station spatial distribution in mobile
networks,” in Proc. IEEE INFOCOM 2016, San Francisco, CA, USA,
Apr. 2016.
Z. Zhao, M. Li, and R. Li, “Temporal-spatial distribution nature of
traffic and base stations in cellular networks,” IET Commun., Aug. 2017,
accepted.
R. Li, Z. Zhao, C. Qi, X. Zhou, Y. Zhou, and H. Zhang, “Understanding
the traffic nature of mobile instantaneous messaging in cellular networks:
A revisiting to α-stable models,” IEEE Access, vol. 3, pp. 1416–1422,
Sep. 2015.
C. Song, S. Havlin, and H. A. Makse, “Self-similarity of complex
networks,” Nature, vol. 433, no. 7024, pp. 392–395, Jan. 2005.
X. Ge, S. Tu, G. Mao, C. X. Wang, and T. Han, “5G ultra-dense cellular
networks,” IEEE Wireless Communications, vol. 23, no. 1, pp. 72–79,
Feb. 2016.
A. Guo and M. Haenggi, “Spatial stochastic models and metrics for the
structure of base stations in cellular networks,” IEEE Trans. Wireless
Commun., vol. 12, no. 11, pp. 5800–5812, Nov. 2013.
W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Throughput optimization, spectrum allocation, and access control in two-tier femtocell
networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 561–574, Apr.
2012.
S. Mukherjee, “Distribution of downlink SINR in heterogeneous cellular
networks,” IEEE J. Sel. Area. Comm., vol. 30, no. 3, pp. 575–585, Apr.
2012.
B. Yu, L. Yang, H. Ishii, and S. Mukherjee, “Dynamic TDD support in
macrocell-assisted small cell architecture,” IEEE J. Sel. Area. Comm.,
vol. 33, no. 6, pp. 1201–1213, Jun. 2015.
M. D. Renzo and P. Guan, “Stochastic geometry modeling and systemlevel analysis of uplink heterogeneous cellular networks with multiantenna base stations,” IEEE Trans. Commun., vol. 64, no. 6, pp. 2453–
2476, Jun. 2016.
F. J. Martin-Vega, G. Gomez, M. C. Aguayo-Torres, and M. D. Renzo,
“Analytical modeling of interference aware power control for the uplink
of heterogeneous cellular networks,” IEEE Trans. Wireless Commun.,
vol. 15, no. 10, pp. 6742–6757, Oct. 2016.
T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modeling
of uplink cellular networks,” IEEE Trans. Wireless Commun., vol. 12,
no. 6, pp. 2669–2679, Jun. 2013.
S. Singh, X. Zhang, and J. G. Andrews, “Joint rate and SINR coverage
analysis for decoupled uplink-downlink biased cell associations in
hetnets,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5360–
5373, Oct. 2015.
H. Y. Lee, Y. J. Sang, and K. S. Kim, “On the uplink SIR distributions
in heterogeneous cellular networks,” IEEE Communications Letters,
vol. 18, no. 12, pp. 2145–2148, Dec. 2014.
Z. Zeinalpour-Yazdi and S. Jalali, “Outage analysis of uplink two-tier
networks,” IEEE Trans. Commun., vol. 62, no. 9, pp. 3351–3362, Sep.
2014.
M. Mirahsan, R. Schoenen, and H. Yanikomeroglu, “HetHetNets:
Heterogeneous traffic distribution in heterogeneous wireless cellular
networks,” IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2252–2265,
Oct. 2015.
Y. Lin, W. Bao, W. Yu, and B. Liang, “Optimizing user association and
spectrum allocation in hetnets: A utility perspective,” IEEE J. Sel. Area.
Comm., vol. 33, no. 6, pp. 1025–1039, Jun. 2015.
H. S. Dhillon, R. K. Ganti, and J. G. Andrews, “Load-aware modeling
and analysis of heterogeneous cellular networks,” IEEE Trans. Wireless
Commun., vol. 12, no. 4, pp. 1666–1677, Apr. 2013.
S. Singh, H. Dhillon, and J. G. Andrews, “Offloading in heterogeneous
networks: Modeling, analysis, and design insights,” IEEE Trans. Wireless
Commun., vol. 12, no. 5, pp. 2484–2497, May 2013.
H. ElSawy, E. Hossain, and D. I. Kim, “HetNets with cognitive small
cells: User offloading and distributed channel access techniques,” IEEE
Commun. Mag., vol. 51, no. 6, pp. 28–36, Jun. 2013.
Y. S. Soh, T. Q. S. Quek, M. Kountouris, and G. Caire, “Cognitive
hybrid division duplex for two-tier femtocell networks,” IEEE Trans.
Wireless Commun., vol. 12, no. 10, pp. 4852–4865, Oct. 2013.
K. Huang and J. G. Andrews, “An analytical framework for multicell
cooperation via stochastic geometry and large deviations,” IEEE Trans.
Inf. Theory, vol. 59, no. 4, pp. 2501–2516, Apr. 2013.
C. H. M. de Lima, M. Bennis, and M. Latva-aho, “Statistical analysis
of self-organizing networks with biased cell association and interference
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
avoidance,” IEEE Trans. Veh. Tech., vol. 62, no. 5, pp. 1950–1961, Jun.
2013.
P. Semasinghe, E. Hossain, and K. Zhu, “An evolutionary game for
distributed resource allocation in self-organizing small cells,” IEEE
Trans. Mob. Comput., vol. 14, no. 2, pp. 274–287, Feb. 2015.
Y. Deng, L. Wang, M. Elkashlan, M. D. Renzo, and J. Yuan, “Modeling and analysis of wireless power transfer in heterogeneous cellular
networks,” IEEE Trans. Commun., vol. 64, no. 12, pp. 5290–5303, Dec.
2016.
C. Li, J. Zhang, and K. B. Letaief, “Throughput and energy efficiency
analysis of small cell networks with multi-antenna base stations,” IEEE
Trans. Wireless Commun., vol. 13, no. 5, pp. 2505–2517, May 2014.
D. Cao, S. Zhou, and Z. Niu, “Optimal combination of base station
densities for energy-efficient two-tier heterogeneous cellular networks,”
IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4350–4362, Sep.
2013.
——, “Improving the energy efficiency of two-tier heterogeneous cellular networks through partial spectrum reuse,” IEEE Trans. Wireless
Commun., vol. 12, no. 8, pp. 4129–4141, Aug. 2013.
Y. S. Soh, T. Q. Quek, M. Kountouris, and H. Shin, “Energy efficient
heterogeneous cellular networks,” IEEE J. Sel. Area. Comm., vol. 31,
no. 5, pp. 840–850, May 2013.
M. D. Renzo and P. Guan, “A mathematical framework to the computation of the error probability of downlink MIMO cellular networks by
using stochastic geometry,” IEEE Trans. Commun., vol. 62, no. 8, pp.
2860–2879, Aug. 2014.
N. Lee, D. Morales-Jimenez, A. Lozano, and R. W. Heath, “Spectral
efficiency of dynamic coordinated beamforming: A stochastic geometry
approach,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 230–241,
Jan. 2015.
A. K. Gupta, H. S. Dhillon, S. Vishwanath, and J. G. Andrews, “Downlink multi-antenna heterogeneous cellular network with load balancing,”
IEEE Trans. Commun., vol. 62, no. 11, pp. 4052–4067, Nov. 2014.
L. H. Afify, H. ElSawy, T. Y. Al-Naffouri, and M. S. Alouini, “A
unified stochastic geometry model for MIMO cellular networks with
retransmissions,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp.
8595–8609, Dec. 2016.
T. Bai and R. W. Heath, “Analyzing uplink SINR and rate in massive
MIMO systems using stochastic geometry,” IEEE Trans. Commun.,
vol. 64, no. 11, pp. 4592–4606, Nov. 2016.
S. Singh, M. N. Kulkarni, A. Ghosh, and J. G. Andrews, “Tractable
model for rate in self-backhauled millimeter wave cellular networks,”
IEEE J. Sel. Area. Comm., vol. 33, no. 10, pp. 2196–2211, Oct. 2015.
F. Muhammad, Z. H. Abbas, and F. Y. Li, “Cell association with load
balancing in nonuniform heterogeneous cellular networks: Coverage
probability and rate analysis,” IEEE Trans. Veh.Tech., vol. 66, no. 6,
pp. 5241–5255, Jun. 2017.
I. Atzeni and M. Kountouris, “Full-duplex mimo small-cell networks:
Performance analysis,” in Proc. IEEE Globecom 2015, San Diego, CA,
USA, Dec. 2015.
J. Lee and T. Q. S. Quek, “Hybrid full-/half-duplex system analysis
in heterogeneous wireless networks,” IEEE Trans. Wireless Commun.,
vol. 14, no. 5, pp. 2883–2895, May 2015.
H. Tabassum, A. H. Sakr, and E. Hossain, “Analysis of massive MIMOenabled downlink wireless backhauling for full-duplex small cells,”
IEEE Trans. Commun., vol. 64, no. 6, pp. 2354–2369, Jun. 2016.
K. Huang, J. G. Andrews, D. Guo, R. W. Heath, and R. A. Berry, “Spatial
interference cancellation for multiantenna mobile ad hoc networks,”
IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1660–1676, Mar. 2012.
R. Li, Y. Chen, G. Y. Li, and G. Liu, “Full-duplex cellular networks,”
IEEE Commun. Mag., vol. 56, no. 4, pp. 184 – 191, Apr. 2017.
A. AlAmmouri, H. ElSawy, O. Amin, and M. S. Alouini, “In-band αduplex scheme for cellular networks: A stochastic geometry approach,”
IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6797–6812, Oct.
2016.
C.-H. Lee, C.-Y. Shih, and Y.-S. Chen, “Stochastic geometry based
models for modeling cellular networks in urban areas,” Wireless Net.,
vol. 19, no. 6, pp. 1063–1072, Aug. 2013.
N. Miyoshi and T. Shirai, “Spatial modeling and analysis of cellular networks using the Ginibre point process: A tutorial,” IEICE Transactions
on Communications, vol. E99.B, no. 11, pp. 2247–2255, Nov. 2016.
A. Karasaridis and D. Hatzinakos, “Network heavy traffic modeling
using α-stable self-similar processes,” IEEE Trans. Commun., vol. 49,
no. 7, pp. 1203–1214, Jul. 2001.
M. Crovella and A. Bestavros, “Self-similarity in world wide web traffic:
Evidence and possible causes,” IEEE/ACM Trans. Netw., vol. 5, no. 6,
pp. 835–846, Dec. 1997.
14
[70] W. Song and W. Zhuang, “Resource reservation for self-similar data
traffic in cellular/WLAN integrated mobile hotspots,” in Proc. IEEE
ICC 2010, Cape Town, South Africa, May 2010.
[71] C. Qi, Z. Zhao, R. Li, and H. Zhang, “Characterizing and modeling
social mobile data traffic in cellular networks,” in Proc. IEEE VTC 2016Spring, Nanjing, China, May 2016.
[72] X. Ge, Y. Qiu, J. Chen, M. Huang, H. Xu, J. Xu, W. Zhang, Y. Yang,
C. X. Wang, and J. Thompson, “Wireless fractal cellular networks,”
IEEE Wireless Commun., vol. 23, no. 5, pp. 110–119, Oct. 2016.
[73] K. Park, G. Kim, and M. Crovella, “On the effect of traffic self-similarity
on network performance,” in Proc. SPIE ICPCNS 1997, Dallas, TX,
USA, Oct. 1997.
| 7 |
Subspace arrangements and motives
of classifying stacks of reflection groups
arXiv:1507.03486v2 [math.AG] 8 Sep 2017
Emanuele Delucchi, Ivan Martino
September 12, 2017
Abstract
We study some combinatorial aspects of a subspace arrangement associated to every faithful representation of finite groups, with a view on the
triviality problem for motivic classes of classifying stacks. In particular,
for finite reflection groups we reduce this problem to a conjecture which
would generalize a theorem by Aluffi.
In this paper we unfold the combinatorics underlying the computation of
the motivic class {BG} of the classifying stack of a finite group G in the
Grothendieck ring of algebraic stacks K0 (Stackk ). In the case of complex reflection groups, we reduce it to the following conjecture.
Conjecture. Let W ⊂ GL(V ) be a finite complex reflection group and let AW
be the arrangement of hyperplanes associated to W (see Definition 1.3). Call Ve
the open complement of this arrangement and call Ve/W its quotient under the
action of W .
Then, the motivic class {Ve/W } is a polynomial in L, the class of the affine
line. More precisely, it has the following form:
{Ve/W } = χAW /W (L),
where χAW /W (L) denote the characteristic polynomial of the quotient arrangement.
This conjecture generalizes a theorem of Aluffi [1] asserting that {Ve } = χAW (L).
Before we go any further, let us put this in context and explain our motivation.
The Noether Problem. Let k be a any field and G be a finite group. A
century ago, Emmy Noether [11] studied the rationality of the field extension
k(V )G /k, where k(V )G denotes the invariants of the field of rational functions
k(V ) over the regular representation V of G. This rationality question became
known as the Noether problem and no counterexamples to the rationality were
found for more than 50 years.
In fact, the first such counterexample came in 1969 with work of Swan [16]
Z
proving that the extension Q(V ) /47Z /Q is not rational. In the Eighties, several
other non rational extensions were found over the complex field by Saltman [13]
and Bogomolov [2] for certain p-groups of order p9 and of order p6 , respectively.
More recently Hoshi, Kang and Kunyavskii [7] studied the order p5 cases with
non rational extension C(V )G /C.
1
The triviality of the motivic class of BG. In 2009, Ekedahl [4] showed
that the Noether problem relates to the computation of a certain second degree
cohomology of the motivic class {BG}. Each group of this cohomology is called
an Ekedahl invariant of G in [10, 9], to which we refer for an overview of the
topic. A motivic class is said to be trivial if it coincides with the class of a point
{Spec(k)}, that we denote for simplicity by 1 because it is the neutral element
with respect to the product in K0 (Stackk ). In all above-mentioned nonrational
instances of the Noether Problem, {BG} is not trivial in K0 (Stackk ).
A further point of interest in this triviality problem comes from recent work of
Totaro [17] which relates it with other five properties of finite groups: stable
rationality of quotient varieties V /G, triviality for the birational motive of the
quotient varieties V /G, the weak Chow Künneth property of BG, the Chow
Künneth property of BG and the mixed Tate property of BG.
The known instances of triviality for {BG} are
– the finite subgroups G ⊂ GL1 (k) (see [4, Proposition 3.2]);
– the symmetric groups Sn (see [4, Theorem 4.3]);
– all finite subgroups of the group of affine transformations of A1k , assuming
k algebraically closed (see [4, Example ii) on page 8]).
– the finite subgroups G ⊆ GL3 (k), if char(k) = 0 [9, Theorem 2.4].
Our results. The computation of the motivic class of {BG} relates to an orbit
stratification of the quotient stack [V /G] for any faithful representation ρ of G
in GL(V ). In this paper we focus on the combinatorics of such stratification.
We say that a subgroup H of G is a stabilizer subgroup if there exists v ∈ V
stabilized only by H, that is Stabρ (v) = H (see Definition 1.4). The set of
stabilizer subgroups Pρ with reverse inclusion has a natural poset structure (see
Definition 1.4).
Moreover the group G acts on Pρ by conjugation and so we denote by
P̃ρ := Pρ/G
the set of conjugacy classes of stabilizer subgroups. It will be useful to denote
by P̃ρ′ the poset of all all conjugacy classes of stabilizer subgroups.
Under certain group theoretic and geometric conditions, we reduce the computation of {BG} to the knowledge of the combinatorics of P̃ρ′ . In order to state
our first result, let us denote by ∆ρ the order complex of P̃(G) (this is the set
of its ordered chains, that is the set of flags f as H0 < H1 < · · · < Hk ), and call
NG (f ) the intersection of all normalizer subgroups NG (Hi ) with Hi stabilizer
subgroup in the flag.
Theorem A. Let ρ : G → GL(V ) be a faithful representation of a finite group
G such that
(1) {BNG (f )} = 1 for all f ∈ ∆ρ and
(2) {V /NG (H)} = Ldim V
H
H
for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G).
Then,
{BG}ϕρ (L) = ϕρ (L),
where ϕρ is the characteristic polynomial of ρ. (see Definition 1.6).
2
Notice that, ϕρ (t) is a polynomial defined only using the combinatorial information of P̃(G). As a token of motivation let us emphasize the following
fact: under the hypothesis of Theorem A, if ϕρ (L) is invertible in K0 (Stackk ),
then {BG} = 1.
Finite reflection groups are a distinguished family of finite subgroups of
the general linear group, which contains the symmetric groups and all cyclic
groups. This fact already suggests finite reflection groups as sensible candidates for the study of {BG}. Moreover, the wealth of combinatorial, geometric and representation-theoretic results about finite reflection groups provides
many useful tools. In particular, to every finite reflection group W is associated
a reflection arrangement, i.e., the arrangement of hyperplanes defined by the
fix-point sets of the reflections in W . Reflection arrangements lie at the roots
of the general theory of hyperplane arrangements, for an introduction to which
we point to the textbook [12].
For this class of groups, we are able to identify a combinatorial property of
the poset of stabilizer subgroups (Definition 1.4) which allows us to explicitly
compute the polynomial ϕρ (t) for the standard linear representation of finite
reflection groups.
Theorem B. If W is a d-dimensional irreducible finite reflection group in
GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1.
Using the fact that Ld − 1 is invertible in K0 (Stackk ), these computations
allow us to pave the way for the proof of the triviality of the motivic class for
the reflection groups.
The missing part is precisely the proof of the conjecture, affirming that
{Ve/W } = χAW /W (L).
We stress that χAW /W (L) = χP̃(W ) (L).
Theorem C. If the Conjecture holds, then {BW } = 1 in K0 (Stackk ).
This type of rationality problems have also been studied in literature by
different authors. For instance, Looijenga [8, Lemma 5.1] has shown that
{V /G} = Ln for every abelian group acting linearly on a n-dimensional kvector space, where k is a field of characteristic zero containing a root of unity
of degree the order of G.
However, this condition fails for the counterexamples to the Noether problem
given by Saltman [13], Bogomolov [2] and Hoshi, Kang and Kunyavskii [7]. Usm
ing [4, Proposition 3.1], one shows that for m large enough {V /G} = {BG}Lmn
in the Kontsevich value ring of algebraic varieties. Since {BG} is not trivial then
m
{V /G} is not Lmn in the K0 (VarC ).
This rationality problem has also been studied by Esnault and Viehweg (see
Lemma 1.1 and Proposition 1.3 in [6]).
To conclude, we do not know whether the conjecture might be true for a
class of group larger than that of the reflection groups. Indeed, the hypothesis
of Theorem A seem very restrictive and may well characterize finite reflection
groups.
The structure of the paper is the following. First, in Section 1 we review
some basics on subspace arrangements, partially ordered sets, Motivic classes
3
and reflection groups. We present the new Conjecture in Section 2 and then in
Section 3 we prove Theorem A. In section 4, we study the poset of conjugacy
classes of stabilizer subgroups for a complex reflection group and we show Theorem B. Finally in Section 4.1, we prove that the conjecture implies that the
class of the classifying stack of W is trivial, that is Theorem C.
Acknowledgements. We thank Emanuele Ventura for pointing out the reference
[1]. We are very thankful to an anonymous referee who pointed out a mistake
in a older version of this manuscript.
Both authors have been partially supported by the Swiss National Science
Foundation Professorship grant PP00P2 150552/1. The second author have
been partially supported by the Zelevinsky Research Instructor Fund, by the
Knut and Alice Wallenberg Fundation and by the Royal Swedish Academy of
Science.
1
1.1
Preliminaries and generalities
Combinatorics of subspace arrangements
The main combinatorial structure of interest in this paper is that of a partially
ordered set or, for short, poset. In this section we briefly review some basic
terminology and the results we will need later. For more background, a standard
reference is [15, Chapter 3].
A poset is a pair (P, ≤) consisting of a set P with a partial order relation ≤.
In what follows the set P will always be finite and the order relation will be
understood (so we will just say ”the poset P ” referring to (P, ≤)). If p, q ∈ P
are such that p ≤ q, the interval determined by p and q is the subset [p, q] :=
{r ∈ P | p ≤ r ≤ q}. The set of all intervals of P is denoted I(P ). A lattice is a
poset where every pair of elements has a unique minimal upper bound as well
as a unique maximal lower bound. For example, the poset LG of all subgroups
of a given finite group G, ordered by inclusion, is a lattice.
The Möbius function of the poset P is the function µP : I(P ) → Z defined
recursively as follows:
X
µ(p, p) =
1 for all p ∈ P ;
µ(p, r)
0 for all p < q in P.
=
r∈[p,q]
If the poset P has a unique minimal element (i.e., an element 0̂ with p ≤ 0̂ for
all p ∈ P \ {0̂}), for every p ∈ P we will write µP (p) as a shorthand for µP (0̂, p).
To every poset P is associated the poset ∆(P ) of all chains of P . Precisely,
this is the set
∆(P ) := {{p1 , p2 , . . . , pk } ⊆ P | p1 < p2 < . . . < pk }
ordered by inclusion. If the poset P has a unique minimal element 0̂ and a
b ) := ∆(P \ {0̂, 1̂}).
unique maximal element 1̂, we define also ∆(P
Since every subset of a totally ordered set is again totally ordered, ∆(P ) and
ˆ ) are naturally abstract simplicial complexes. Their topology is related to
∆(P
the Möbius function as follows.
4
Theorem 1.1. For every p ≤ q in a poset P , µP (p, q) is the reduced Euler
P
b
characteristic of ∆([p,
q]), that is µP (p, q) = ω∈∆([p,q])
(−1)|ω|−1 .
b
We will be concerned with posets arising from subspace arrangements. Let
k be a field, V a k-vector space of dimension d. An arrangement of subspaces
in V is a finite set A of linear subspaces of V ; its poset of intersections is the
set
\
L(A) := {
W | X ⊆ A}
(1)
W ∈X
ordered by reverse inclusion: for x, y ∈ L(A), x ≤ y if x ⊇ y. These posets
are always lattices, and in particular they have a unique minimal element 0̂
(corresponding
T to the intersection of the empty family) and a unique maximal
element 1̂ = W ∈A W . The arrangement is called essential if dim ∩A = 0. The
characteristic polynomial of the arrangement A is
X
µ(x)tdim x .
χA (t) =
x∈L(A)
1.2
The subspace arrangement of a representation
Fix a field k. Let G be a finite group and let ρ : G → GL(V ) be a krepresentation of G. For every g ∈ G and v ∈ V , we write the action as
g · v = ρ(g)v for every g ∈ G and v ∈ V , where gv is the usual matrix-vector
product.
Following [4], for any v ∈ V and for any subgroup H ⊆ G we define the
following objects.
NG (H)
Stabρ (v)
VH
VH
:= {g ∈ G | gH = Hg} ⊆ G
:= {g ∈ G | g · v = v} ⊆ G
:= {v ∈ V | H = Stabρ (v)} ⊆ V
:= {v ∈ V | H ⊆ Stabρ (v)} ⊆ V.
In other words, NG (H) is the normalizer of the subgroup H in G; V H is the
k-vector subspace of V of all points fixed (at least) by all elements of H; VH is
the set of points that are fixed exactly by the elements of H.
Definition 1.2. We say that a subgroup H is a stabilizer subgroup with respect
to the representation ρ if VH is not empty.
Definition 1.3. The arrangement of subspaces of the representation ρ is
Aρ := {V H | H 6= {e} and H is a stabilizer subgroup with respect to ρ}.
The set Aρ is ordered by reverse inclusion similar to L(A) in (1). It is useful to
observe that V e = V and so the poset Aρ ∪ {V e } as a minimal unique element.
Notice that every VH is the complement of the union of a set of subspaces inside
V H.
Definition 1.4. The poset of stabilizer subgroups of the representation ρ is
Pρ := {H | H is a stabilizer subgroup with respect to ρ},
ordered by inclusion H1 ≤ H2 if H1 ⊆ H2 .
5
Then one has:
Aρ ∪ {V e } ≃ L(Aρ ) ≃ Pρ
The first isomorphism is proven essentially by definition and by observing that
V e = V is the only missing subspace in Aρ . For the second isomorphism,
consider the function
Pρ
→ L(Aρ )
H
7→ V H .
This is order-preserving and bijective. Indeed, if V H1 = V H2 for two stabilizer
subgroups, then, by definition, they contain each other. Moreover, every intersection S in L(Aρ ) is of the form ∩H∈X V H , where X is a finite set of subgroups.
′
Thus, there exists a maximal H ′ containing all H in X, with S = V H . Since
both posets are finite, then it is an isomorphism of posets. In particular, if ρ is
a representation of a reflection group, then Pρ is a lattice.
The group G acts on Pρ by conjugation.
Definition 1.5. Define
P̃ρ := Pρ/G,
i.e., the set of all orbits under the G-action, ordered according to G·H1 ≤ G·H2
if H1 ≤ g · H2 in Pρ for some g ∈ G.
It will be useful to denote by P̃ρ′ the poset of all all nontrivial stabilizer subgroups
H. We close this section by recalling a definition due to Ekedahl [4].
Definition 1.6. Let Ñρ denote the poset of normal stabilizer subgroups of G
ordered by reverse inclusion. The following is the characteristic polynomial of
ρ:
X
X
H
(−1)dim f (tdim V − 1).
ϕρ (t) =
H∈Ñρ f ∈∆(P̃ρ ),
max f =H
Assumption. From now on we will assume that the representation ρ is faithful,
i.e. Ker ρ = {e}. Moreover, notice that, given such a representation of G, we
can always reduce to the case where dim VG = 0 and, when this happens, we
say that this representations is essential (because Aρ is). If the representation
is faithful and clear from the context, we write AG instead of Aρ and, similarly,
for AG , PG , and P̃G .
1.3
Motivic classes of classifying stacks, Ekedahl’s formula
The aim of this section is to briefly introduce the motivic classes of the classifying
stack of a group and to present and to collect the necessary tools for this paper.
As a general reference for a more comprehensive introduction we point to [10].
We begin by recalling that the Grothendieck ring of algebraic varieties K0 (Vark )
is the group generated by the isomorphism classes {X} of algebraic k-varieties
X, under the relation
{X} = {Y } + {X \ Y }, for all closed subvarieties Y of X.
The ring structure of K0 (Vark ) is given by {X} · {Z} = {X × Z}.
6
Like algebraic varieties, algebraic stacks also have their own Grothendieck
ring. In [5, Theorem 4.1] it is proved that
K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 , ∀n ∈ N],
where the symbol L stands for the class of the affine line A1k .
The classifying stack of the group G is usually defined as the stack quotient
of the point Spec(k) by the group G, i.e. BG := [Spec(k)/G]. Its motivic class is
denoted by {BG} ∈ K0 (Stackk ).
Ekedahl in [4] proposed a combinatorial way to approach the computation
of {BG}. Here we present his theorem in purely combinatorial terms, after a
preparatory definition.
Definition 1.7. Given a representation ρ : G → GL(V ) of a finite group G, we
write
b P̃ρ )
∆ρ := ∆(
and, for any f = {H1 ⊆ H2 ⊆ . . . ⊆ Hm } ∈ ∆ρ , dim f := |f | − 1, df := dim V Hm ,
and NG (f ) = ∩m
i=1 NG (Hi ).
Theorem 1.8 ([4, Theorem 3.4]). Let G be a finite group and let ρ : G →
GL(V ) be a faithful and essential representation of dimension d. Then
X
{BG}(Ld − 1) = {Ve/G} +
(−1)dim(f ) {BNG (f )}(Ldf − 1).
f ∈∆ρ
Remark 1.9. We point out that in the statement of Theorem 3.4 in [4] Ekedahl
uses the term stabilizer flag instead of our chain for f .
1.4
Characteristic classes of subspace arrangements
An arrangement of hyperplanes in kd is an arrangement of subspaces all whose
elements have codimension 1. In this section we recall a result of Aluffi [1] linking
the characteristic polynomial of a hyperplane arrangement to the characteristic
class of its complement M (A). We reproduce its proof in order to show that it
immediately generalizes to the case of subspace arrangements.
Theorem 1.10 ([1, Theorem 2.1]). Let L be the class of the affine line in the
Grothendieck ring of algebraic k-varieties, K0 (Vark ). Let A be an arrangement
of hyperplanes in kn . Then, we have the following equality in K0 (Vark ):
{M (A)} = χA (L).
Proof. Consider the intersection lattice L(A) defined in (1 and pick an element
x ∈ L(A). We set xo = x \ ∪y>x y, that is the complement in x of the union of
all intersections inside x. Trivially {x} = Ldim x .
Every P
element y in L(A) is the disjoint union of all xo with
Px > y, that is
{y} = x≥y {xo }. Now, by Möbius inversion we have {y o } = x≥y µ(y, x){x},
and therefore we can compute
X
X
µ(x)Ldim x = χA (L).
µ(0̂, x){x} =
{M (A)} = {0o } =
x∈L(A)
x≥0̂
7
It is now apparent that Aluffi’s argument also proves the following stronger
statement.
Theorem 1.11. Let B denote a subspace arrangement in kd . Then, with notations as above,
{M (B)} = χB (L) in K0 (Vark ).
2
Towards the conjecture
We now focus on the case of finite groups which admit representations whose
associated subspace arrangement is the set of intersections of an arrangement
of hyperplanes. These are the so-called finite reflection groups. A detailed
treatment of geometric and combinatorial aspects of hyperplane arrangements
associated to reflection groups is [12, Chapter 6]. Here we only sketch some
basics we’ll have use for.
Let V be a k-vector space. Any g ∈ GL(V ) is called a reflection if it has
finite order and it fixes a subspace of codimension 1 (which is then called the
reflecting hyperplane of g). Following [12, Section 6.2], we call reflection group
any finite group W ⊆ GL(V ) whose order is not divisible by char k and which is
generated by reflections. The Chevalley-Shephard-Todd theorem [3, 14] shows
that W is a finite reflection group exactly if and only if V /W is isomorphic to
affine space.
From now on when we talk about a finite reflection group W , we consider
the obvious representation ρ given by the inclusion in GL(V ) and we write AW
omitting reference to the representation.
In particular, we are interested in the quotient arrangement in V ≃ V /W :
AW /W
:= {X/W , X ∈ AW }.
Even if V /W ≃ V , this is not anymore an arrangement of subspaces in V , but
an arrangement of quotient varieties.
We can now state a conjecture that aims at generalizing Theorem 1.11.
Conjecture. If W is a finite complex reflection group, then,
{Ve/W } = χAW /W (L).
The statement of the conjecture would for instance follow from the existence
of a faithful representation of the group W such that one of the two following
conditions are satisfied for all nontrivial stabilizer subgroups H:
A {V /NG (H)} = Ldim V
H
B
V H/NG (H)
≃ Akdim V
H
H
for all H ∈ P̃ ′ (G);
for all H ∈ P̃ ′ (G).
In what follows we are going to show that the proof of this conjecture will have
immediate application in the study of the motivic class of the classifying stack
of a finite group. It is worth to note that any of the above conditions will imply
that the hypothesis of Theorem A are satisfied.
8
3
An inductive criterion
In this section we are going to prove Theorem A. For this we need two technical
results: the first one deals with the motivic class of the open complement Ve/G
and the second one relates this result to the class of BG.
Here and in what follows, µ denotes the Möbius function of P̃(G).
Lemma 3.1. Let ρ : G → GL(V ) be a d-dimensional faithful representation of
a finite group G. Then
X
H
µ(H){V /NG (H)}.
{Ve/G} =
H∈P̃ρ
Proof. We follow the same step of the proof in Theorem 1.10 and we have that
X
X
H
H
µ(H){V /NG (H)}.
µ({e}, H){V /NG (H)} =
{Ve/G} =
H≥{e}
H∈P̃ρ
Let us apply this to the computation of the class of BG.
Proposition 3.2. Let ρ : G → GL(V ) be a d-dimensional faithful representation of a finite group G. Then
X X
X
H
H
(−1)dim f {BNG (f )}(Ldim V −1).
µ(H){V /NG (H)}+
{BG}(Ld −1) =
H∈P̃ρ′
H∈P̃ρ
f ∈∆ρ
max f =H
Proof. We use Theorem 1.8 and Proposition 3.1 and we obtain the following.
X
X
H
(−1)dim(f ) {BNG (f )}(Ldf − 1),
µ(H){V /NG (H)} +
{BG}(Ld − 1) =
f ∈∆ρ
H∈P̃ρ
which readily implies the claim.
The next theorem is an inductive triviality criterion. Together with the
statement of the Conjecture presented in Section 2, it opens an avenue for
inductive proofs of triviality of the motivic class of BG. We will explain more
about this strategy in Section 4.1.
Theorem A. Let ρ : G → GL(V ) be a d-dimensional faithful and essential
representation of a finite group G such that
(1) {BNG (f )} = 1 for all f ∈ ∆ρ and
(2) {V /NG (H)} = Ldim V
H
H
for all nontrivial stabilizer subgroups H ∈ P̃ ′ (G).
Then,
{BG}ϕρ (L) = ϕρ (L),
where ϕρ is the characteristic polynomial of ρ (see Definition 1.6).
9
Proof. We start our computation by expanding the formula of Proposition 3.2:
{BG}(Ld − 1) =
Ld + µ(G)
X
H
µ(H)Ldim V
+
H∈P̃ρ′
X
+
H∈P̃ρ′
X
−
H∈P̃ρ′
X
f ∈∆ρ
max f =H
X
H
(−1)dim f {BNG (f )}Ldim V
(−1)dim f {BNG (f )}.
f ∈∆ρ
max f =H
Now isolate on the right hand side all the terms containing the motivic class of
BG:
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
{BG}Ldim V H
H∈P̃ ′
ρ
+
X
′
H∈P̃
ρ
−
X
f ∈∆ρ
max f =H
NG (f )6=G
X
{BG}
X
X
H∈P̃ρ′
−
H∈P̃ρ′
(−1)dim f
X
f ∈∆ρ
max f =H
NG (f )=G
H
(−1)dim f {BNG (f )}Ldim V
X
(−1)dim f
f ∈∆ρ
max f =H
NG (f )=G
f ∈∆ρ
max f =H
NG (f )6=G
(−1)dim f {BNG (f )}.
Using assumption (1) we can continue the computation as follows.
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
dim V H
{BG}L
H∈P̃ρ′
10
X
f ∈∆ρ
max f =H
NG (f )=G
dim f
(−1)
X
+
X
f ∈∆ρ
dim V H
L
H∈P̃ρ′
−
X
{BG}
X
X
H∈P̃ρ′
Now we add and subtract
X
(−1)dim f
(−1)dim f
f ∈∆ρ
max f =H
NG (f )6=G
X
X
X
(−1)
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′ max f =H,
NG (f )=G
and
dim f
max f =H
NG (f )6=G
H∈P̃ρ′
−
X
H∈P̃ρ′ max f =H,
NG (f )=G
(−1)dim f ,
H
(−1)dim f Ldim V .
Remark also that, for all x 6∈ {{e}, G}, by Theorem 1.1.
X
X
(−1)dim f +1 = −µ(x).
(−1)dim f =
f ∈∆ρ
max f =x
′
f ∈P̃ρ,<x
Using this identity, we can rewrite as follows.
{BG}(Ld − 1) =
+
Ld + µ(G)
X
H
µ(H)Ldim V
H∈P̃ρ′
+
X
({BG} − 1)L
X
µ(H)Ldim V
X
({BG} − 1)
X
µ(H).
dim V H
H∈P̃ρ′
−
H∈P̃ρ′
+
+
X
dim f
(−1)
f ∈∆ρ
max f =H
NG (f )=G
H
X
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′
(−1)dim f
H∈P̃ρ′
The defining identity of the Möbius function implies µ(G) +
µ(e) = 0. Thereby, we simplify as follows:
{BG}(Ld − 1) =
Ld − 1
11
P
H∈P̃ρ′
µ(H) +
+
X
({BG} − 1)L
X
({BG} − 1)
dim V H
H∈P̃ρ′
+
X
f ∈∆ρ
max f =H
NG (f )=G
H∈P̃ρ′
X
f ∈∆ρ
max f =H
NG (f )=G
dim f
(−1)
(−1)dim f .
The claim now follows by regrouping terms and noticing that NG (f ) = G implies
that all elements of f are normal subgroups.
4
The conjugacy classes stabilizer poset for W
Let us now focus on finite reflection groups. The following is a useful fact in
order to study P̃W .
Proposition 4.1. If W is a finite reflection group in GL(V ), then N is a
normal stabilizer subgroup if and only if W/N is a reflection group.
Proof. Let N be a normal subgroup of W . The subspace V N fixed by N is an
element of the lattice of intersections of AW , thus V N = ∩ni=1 Ri where Ri are
the reflecting hyperplanes of the reflections ri ∈ N . Call t1 , . . . , ts the reflections
that are not in N and Tj the reflecting hyperplane of tj .
If N is a normal stabilizer subgroup, then V N is a faithful representation of
W/N by Lemma 3.3 in [4]. Moreover, W/N is generated by τj = tj + N . Each τj
fixes V N ∩ Tj , a subspace of codimension one in V N .
For the reverse implication assume that W/N is generated by the reflections
γ1 , . . . , γk but N is not a normal stabilizer subgroup. Call N ′ the stabilizer
′
′
subgroup N ⊆ N ′ such that V N = V N . The G-orbit of V N consists of the
H
′
′
subspaces V with H in the same conjugacy class of N . If N is not a normal
subgroup then this orbit consists of at least two distinct subspaces. But this
′
goes against the fact that V N = V N and the orbit of V N consists only of the
N
points of V because N is normal. Thus N ′ needs to be normal. Since N ′ is
′
also a stabilizer subgroup, then (by the proof of the first implication) V N is a
faithful representation of the reflection group W/N ′ ≃ W/N/(N ′/N ). We know that
V N = ∩ni=1 Ri because W/N is generated by reflections, and similarly deduce
′
that V N is the intersection of ∩ni=1 Ri with certain Tj s (at least one), and this
is not possible. Therefore N ′ = N .
So we can compute the poset of conjugacy classes for a complex reflection
group.
Proposition 4.2. If W is an irreducible finite reflection group in GL(V ), then
ÑW = P̃W ∩ NW = {e, W }.
Proof. In order to prove the statement, we observe that if N is a non trivial
normal subgroup of W , then because of Proposition 4.1, the representation
decomposes in the sum of two representations V = V N ⊕ (V N )⊥ . This is
against the fact that W is an irreducible reflection group.
12
Hence, under the hypothesis of Theorem A, one can compute the main ingredient for the computation of BW .
Theorem B. If W is a d-dimensional irreducible finite reflection group in
GL(V ) that fulfills the hypothesis of Theorem A, then ϕW (t) = td − 1.
Proof. The proof of the results comes directly by combining Proposition 4.2 and
Theorem A.
4.1
The reduction to the conjecture
We are ready to show that if the conjecture holds, the motivic class of the
classifying stack of BW is trivial in the Grothendieck group of algebraic stacks.
Theorem C. If W is a finite reflection group such that Conjecture holds, then
{BW } = 1 in K0 (Stackk ).
Proof. Every reflection group is product of irreducible ones and we observe that
B(W1 × W2 ) = BW1 × BW2 and so {B(W1 × W2 )} = {BW1 }{BW2 }. Hence
we assume without loss of generality that W is an irreducible complex reflection
group.
One then easily proves the statement for small (inclusion-minimal) reflection
groups and proceeds by using the induction step as in the previous computations.
Then {BW }pW (L) = pW (L) and so by Proposition 4.2
{BW }(Ld − 1) = (Ld − 1).
The claim now readily follows since the polynomial Ld − 1 is clearly invertible
in K0 (Stackk ) = K0 (Vark )[L−1 , (Ln − 1)−1 ].
References
[1] P. Aluffi, Grothendieck classes and Chern classes of hyperplane arrangements, Int. Math. Res. Not. IMRN, (2013), pp. 1873–1900.
[2] F. A. Bogomolov, The Brauer group of quotient spaces of linear representations, Izv. Akad. Nauk SSSR Ser. Mat., 51 (1987), pp. 485–516, 688.
[3] C. Chevalley, Invariants of finite groups generated by reflections, Amer.
J. Math., 77 (1955), pp. 778–782.
[4] T. Ekedahl, A geometric invariant of a finite group. arXiv:0903.3148v1,
2009.
[5]
, The Grothendieck group of algebraic stacks. arXiv:0903.3143v2, 2009.
[6] H. Esnault and E. Viehweg, On a rationality question in the
Grothendieck ring of varieties, Acta Math. Vietnam., 35 (2010), pp. 31–
41.
[7] A. Hoshi, M.-C. Kang, and B. E. Kunyavskii, Noether’s problem and
unramified Brauer groups, Asian J. Math., 17 (2013), pp. 689–713.
13
[8] E. Looijenga, Motivic measures, Astérisque, (2002), pp. 267–297.
Séminaire Bourbaki, Vol. 1999/2000.
[9] I. Martino, The Ekedahl invariants for finite groups, J. Pure Appl. Algebra, 220 (2016), pp. 1294–1309.
[10]
, Introduction to the Ekedahl invariants, Math. Scand., 120 (2017),
pp. 211–224.
[11] E. Noether, Gleichungen mit vorgeschriebener Gruppe, Math. Ann., 78
(1917), pp. 221–229.
[12] P. Orlik and H. Terao, Arrangements of hyperplanes, vol. 300 of
Grundlehren der Mathematischen Wissenschaften [Fundamental Principles
of Mathematical Sciences], Springer-Verlag, Berlin, 1992.
[13] D. J. Saltman, Noether’s problem over an algebraically closed field, Invent. Math., 77 (1984), pp. 71–84.
[14] G. C. Shephard and J. A. Todd, Finite unitary reflection groups, Canadian J. Math., 6 (1954), pp. 274–304.
[15] R. P. Stanley, Enumerative combinatorics. Volume 1, vol. 49 of Cambridge Studies in Advanced Mathematics, Cambridge University Press,
Cambridge, second ed., 2012.
[16] R. G. Swan, Invariant rational functions and a problem of Steenrod, Invent. Math., 7 (1969), pp. 148–158.
[17] B. Totaro, The motive of a classifying space. arXiv:1407.1366, 2014.
Emanuele Delucchi
Department of Mathematics, University of Fribourg,
1700 Fribourg, Switzerland.
E-mail address: [email protected]
Ivan Martino
Department of Mathematics, Northeastern University,
Boston, MA 02115, USA.
E-mail address: [email protected]
14
| 4 |
Gradient Flows in Uncertainty Propagation
and Filtering of Linear Gaussian Systems
arXiv:1704.00102v4 [math.OC] 29 Sep 2017
Abhishek Halder, and Tryphon T. Georgiou
University of California, Irvine
Abstract— The purpose of this work is mostly expository and
aims to elucidate the Jordan-Kinderlehrer-Otto (JKO) scheme
for uncertainty propagation, and a variant, the LaugesenMehta-Meyn-Raginsky (LMMR) scheme for filtering. We point
out that these variational schemes can be understood as
proximal operators in the space of density functions, realizing
gradient flows. These schemes hold the promise of leading to
efficient ways for solving the Fokker-Planck equation as well as
the equations of non-linear filtering. Our aim in this paper is
to develop in detail the underlying ideas in the setting of linear
stochastic systems with Gaussian noise and recover known
results.
I. I NTRODUCTION
n
Consider the gradient flow dx
dt = −∇ψ(x) in R , where
∇ is the gradient (w.r.t. the Euclidean metric) of a function
ψ(x), and consider the discretization
xk = xk−1 − h∇ψ(xk−1 ), for k ∈ N.
was to show that the minimizer of (2) approximates the
solution ρ(x, t) of the heat equation
∂ρ(x, t)
= ∆ρ(x, t), with ρ(x, 0) = ρ0 (x),
∂t
in the sense that ̺k (x, h) → ρ(x, t = kh), as h ↓ 0. Thus,
(2) establishes the remarkable result that the heat equation is
the gradient descent flow of the (negative) entropy integral
with respect to the Wasserstein metric.
An analogous JKO-like scheme was introduced recently
in Laugesen et al. [9] for the measurement update-step in
continuous-time filtering. More specifically, let us consider
the general system of Itô stochastic differential equations
(SDE’s)
p
(4a)
dx(t) = −∇U (x) dt + 2β −1 dw(t),
dz(t)
= c(x(t), t) dt + dv(t),
(4b)
(1)
where x ∈ Rn , z ∈ Rm , β > 0, U (·) is a potential, the
process and measurement noise processes w(t) and v(t) are
Wiener and satisfy E [dwi dwj ] = Qij dt ∀ i, j = 1, . . . , n
and E [dvi dvj ] = Rij dt ∀ i, j = 1, . . . , m, with Q, R ≻ 0,
respectively. Then x(t) and z(t) represent state and sensor
measurements at time t. Further, as usual, v(t) is assumed to
be independent of w(t) and independent of the initial state
x(0). Given the history of noise corrupted sensor data up to
time t, the filtering problem requires computing the posterior
probability distribution that obeys the Kushner-Stratonovich
stochastic PDE [19]–[21].
the solution, which depends on the choice of the step size
h, satisfies xk (h) → x(t = kh), as h → 0.
For the special case of trivial state dynamics, i.e., dx = 0,
and R the identity, Laugesen et al. [9] introduced
−
̺+
k (x, h) = arg inf {DKL ̺k̺k + hΦ(̺)}, k ∈ N, (5)
As is well known in finite-dimensional optimization,
1
xk = arg min{ kx − (xk−1 − h∇ψ(xk−1 ))k2 }
2
x
1
= arg min kx − xk−1 k2 + hψ(x) + o(h).
2
x
By recursively evaluating the proximal operator [1], [2]
xk
k·k
= proxhψ (xk−1 )
1
= arg min{ kx − xk−1 k2 + hψ(x)},
2
x
The Jordan-Kinderlehrer-Otto (JKO) scheme, introduced
in [3], is a similar recursion in the infinite-dimensional space
of density functions with respect to the Wasserstein geometry
[4], namely,
̺k (x, h) = arg min
̺
1 2
W (̺, ̺k−1 ) + hS(̺), k ∈ N, (2)
2 2
where W2 (·, ·) denotes the Wasserstein-2 distance between
two (probability) density functions,
Z
̺(x) log(̺(x))dx
(3)
S(̺) :=
Rn
is the negative differential entropy functional, and dx is the
volume element. In other words, (2) can be viewed as the
2
proximal operation proxW
hS (̺k−1 ). The main result in [3]
̺∈D2
with
1
E̺ {(yk − c(x))⊤ R−1 (yk − c(x))}, (6)
2
where yk is the noisy measurement in discrete-time defined
via yk := h1 ∆zk , ∆zk := zk − zk−1 , and {zk−1 }k∈N the
sequence of samples of z(t) at {tk−1 }k∈N for tk−1 := (k −
1)h. Laugesen et al. [9] proved that the LMMR equation (5)
approximates the solution of
h
⊤
dρ+ (x(t), t) = c(x(t), t) − Eρ+ {c(x(t), t)} R−1
dz(t) − Eρ+ {c(x(t), t)}dt ρ+ (x(t), t), (7)
Φ(̺) :=
i.e., of the Kushner-Stratonovich PDE corresponding to
+
dx = 0, in the sense that ̺+
k (x, h) ⇀ ρ (x(t), t) over
t ∈ [(k − 1)h, kh), as h ↓ 0. Thus, they showed that
in this special case, the Kushner-Stratonovich PDE is the
gradient descent of functional Φ(·) with respect to DKL , i.e.,
−
KL
computed by proxD
hΦ (̺k ).
The purpose of the present paper is to develop this circle of
ideas, namely, that both uncertainty propagation and filtering
can be viewed as gradient flows in the special case of linear
stochastic systems with Gaussian noise. In fact, we consider
the general case of the linear stochastic system
dx(t) = Ax(t) dt + B dw(t),
(8)
where w(t) is a Wiener process as before, though possibly
not of the same dimension as x. We suppose that the uncertain initial condition x(0) has a known Gaussian PDF, the
matrix A is Hurwitz, and that the diffusion matrix B is such
that (A, B) is a controllable pair. For this, we recover the
well-known propagation equations (see for example [6, Ch.
3.6]) for the mean and covariance of the state x(t) out of the
JKO-scheme via a two-step optimization. The applicability
of the JKO-scheme to (8) is not immediately obvious since
the development in [3] requires the state dynamics to be
in the canonical form (4a) with the drift being a gradient
and the diffusion coefficient being a positive scalar. We
further show that this two-step optimization procedure that
we introduce, can be used to derive the Kalman-Bucy filter
from a generalized version of the LMMR equation (5). We
remark that variational schemes for estimator/observer design
based on gradient flows can also be seen as regularized
dynamic inversion in the spirit of [23].
Notation
Throughout we use bold-faced upper-case letters for matrices, and bold-faced lower case letters for vectors. The
notation I stands for identity matrix of appropriate dimension, we use tr(·) and det(·) to respectively denote the trace
and determinant of a matrix, and the symbols ∇ and △
denote the gradient and Laplacian operators, respectively. We
denote the space of probability
R density functions (PDFs) on
Rn by
D
:=
{ρ
:
ρ
≥
0,
Rn ρ = 1}, by D2 := {ρ ∈
R
D | Rn x⊤ x ρ(x)dx < ∞} the space of PDFs with finite
second moments, by Dµ,P denote the space of PDFs which
share the
R same mean vector µ and same covariance matrix
P := Rn (x − µ)(x − µ)⊤ ρ(x)dx. Likewise, let Dµ,τ
denote the space of PDFs which have the same mean µ and
same trace of covariance τ := tr(P ) > 0. Clearly, Dµ,P ⊂
Dµ,τ ⊂ D2 ⊂ D. We use the symbol N (µ, P ) to denote
a multivariate Gaussian PDF with mean µ, and covariance
P . The notation x ∼ ρ means that the random vector x has
PDF ρ; and E {·} denotes the expectation operator while,
when
the probability density is to be specified, Eρ {·} :=
R
(·)ρ(x)dx.
n
R
II. JKO S CHEME
IN
G ENERAL
We now discuss in some detail the JKO scheme for the
case of the diffusion process in (4a), and the corresponding
Fokker-Planck equation [7]
∂ρ
= ∇ · (∇U (x)ρ) + β −1 △ρ, ρ(x, 0) = ρ0 (x). (9)
∂t
To this end we first introduce the Wasserstein metric, the
free energy, and the Kullback-Leibler divergence.
The Wasserstein-2 distance W2 (ρ1 , ρ2 ) between a pair
of PDFs ρ1 (x), ρ2 (y) ∈ D (or, even between probability
measures, in general), supported on X , Y ⊆ Rn , is
12
Z
2
(10)
W2 (ρ1 , ρ2 ) :=
inf
kx − yk2 dσ(x, y)
dσ∈Π(ρ1 ,ρ2 )
X ×Y
where Π (ρ1 , ρ2 ) is a probability measure on the product
space X × Y having finite second moments and marginals
ρ1 , ρ2 , respectively. It is well known that W2 : D × D 7→
[0, ∞) is a metric [4, p. 208]. Further, its square W22 (ρ1 , ρ2 )
represents the smallest amount of “work” needed to “morph”
ρ1 into ρ2 [5]. The infimum is achieved over a space of
measures, and under mild assumptions, the minimizing dσ
has support on the graph of the optimal “transportation map”
T : X 7→ Y that pushes ρ1 to ρ2 . Alternatively, one may
view the optimization problem in (10) as seeking the joint
distribution of two random vectors x and y, distributed
according to
ρ1 and ρ2 respectively, that minimizes the
variance E kx − yk22 .
Another important notion of distance that enters into our
discussion, which however is not a metric, is the KullbackLeibler divergence (also known as relative entropy) between PDFs or positive Rmeasures in general. This is given
dρ1
dρ1
1
by DKL (dρ1 kdρ2 ) := ( dρ
dρ2 ) log( dρ2 )dρ2 where dρ2 denotes the Radon-Nikodym derivative. When1 dρi = ρi (x)dx,
i ∈ {1, 2}, are absolutely continuous with respect to the
Lebesgue measure, then
Z
ρ1 (x)
ρ1 (x) log
DKL (dρ1 kdρ2 ) =
dx.
ρ
2 (x)
Rn
Gradient flow requires
an energy functional, which we
R
denote by E (ρ) := U (x)ρ(x)dx, where U (·) is the potential energy. Then, a stochastically driven gradient flow is
modeled by the Itô SDE (4a) and the Fokker-Planck equation
(9) for the corresponding PDF as before. The stationary
solution of (9) is the Gibbs distribution ρ∞R(x) = Z1 e−βU(x) ,
where the normalization constant Z := Rn e−βU(x) dx is
known as the partition function. The distance to equilibrium
which, in a way, quantifies the amount of work that the
system can deliver, is captured by the so-called free energy
functional F (ρ), defined as the sum of the energy functional
E (ρ) and the negative differential entropy S (ρ) given in (3),
that is,
F (ρ) := E (ρ) + β −1 S (ρ)
= β −1 DKL ρke−βU(x) .
(11a)
(11b)
1 Here we use a slight abuse of notation in that we denote both, the
measure and the density with the same symbol.
For the case of (4a), the JKO scheme becomes
parameterized subset of D2 in such a way that when we
optimize
the functionals 21 W 2 (̺, ̺0 ) and hF (̺) individually
1
̺k (x, h) = arg inf { W22 (̺, ̺k−1 ) + h F (̺)}, k ∈ N, (12) over this chosen subspace, the arginfs (which are achieved)
2
̺∈D2
of the two individual optimization problems match. Hence,
for step-size h > 0, and initialized by a given ̺0 (satisfying the sum of the two has the same arginf over the chosen
F (̺0 ) < ∞). For U (x) ≡ 0, (12) reduces to (2). Solving subspace. In the second step, we optimize over the subspace
(12) results in a sequence of PDFs {̺k (x, h)}k∈N in D2 . parameters. Our choice for the parameterized set of densities
It can be shown following [3] that ̺k (x, h) ⇀ ρ (x(t), t) is Dµ,P ⊂ D2 , i.e., the PDFs with given mean-covariance
weakly in L1 (Rn ) for t ∈ [(k − 1)h, kh), k ∈ N, as h ↓ 0.
pair (µ, P ); the choice of the optimal pair is to be decided
in the second optimization step.
III. JKO S CHEME FOR LINEAR G AUSSIAN SYSTEMS
The development below requires several technical lemmas
that
are collected in the Appendix.
We now develop and solve the JKO scheme for the linear
Gaussian system in (8) with ρ0 = N (µ0 , P0 ) and Q ≡ I,
without loss of generality. Therefore, we are concerned with
the linear Fokker-Planck (Kolmogorov’s forward) PDE
n
∂ρ
∂2
1 X
= −∇ · (ρAx) +
ρBQB ⊤ ij . (13)
∂t
2 i,j=1 ∂xi ∂xj
Under the stated assumptions, it is well-known that (13)
admits a steady-state, which is Gaussian with mean zero
and covariance P∞ ≻ 0 that uniquely solves the algebraic Lyapunov equation AP∞ + P∞ A⊤ + BQB ⊤ = 0.
Also, starting from ρ0 (x) = N (µ0 , P0 ), the transient is
ρ(x(t), t) = N (µ(t), P (t)) where the µ(t) and P (t) satisfy
the following ordinary differential equations (ODEs) [6, Ch.
3.6]
µ̇(t) = Aµ(t), µ(0) = µ0 ,
(14a)
Ṗ (t) = AP (t) + P (t)A⊤ + BQB ⊤ , P (0) = P0 . (14b)
Below, we recover these equations using the JKO scheme.
First, in Section III-A, wep
explain how this is done when
A is symmetric and B ≡ 2β −1 I, β > 0, in which case,
Ax = −∇U (x) for a suitable potential. The general case,
in Section III-B, is more involved and requires to view the
drift as the gradient of a time-varying potential.
p
A. The case where A is symmetric and B ≡ 2β −1 I
p
2β −1 I, the pair (A, B) is controllable.
Since B ≡
Further, since A is Hurwitz and symmetric, Γ := −A ≻ 0,
and utilizing the potential
1 ⊤
x Γx ≥ 0,
2
we can cast (8) in the canonical form (4a). Then,
1 ⊤
E(̺) := E[U (x)] =
µ Γµ + tr (ΓP ) ,
2
where P is the covariance of x. Notice that E(·) depends
on the PDF of x only via its mean and covariance.
U (x) :=
To carry out the optimization (12) over D2 , we adopt
a two-step strategy. Our approach is motivated by the
observation that the objective function in (12) is a sum
of two functionals. In the first step, we choose a suitable
1) Optimizing over Dµ,P : Given ̺0 ≡ ρ0 = N (µ0 , P0 ),
and a µ and P ≻ 0, we first determine
1
̺1 = arg inf { W22 (̺, N (µ0 , P0 )) + h F (̺)}.
(15)
̺∈Dµ,P 2
1
From Lemma 2 we see that arg inf W22 (̺, N (µ0 , P0 ))
2
̺∈Dµ,P
is achieved by ̺ = N (µ, P ) (uniquely). From Lemma 3,
since U (x) = 21 x⊤ Γx, we also know that arg inf h F (̺) is
̺∈Dµ,P
achieved by ̺ = N (µ, P ) (uniquely). Thus, ̺1 = N (µ, P ).
The infimal value in (15) is now the sum of the two infima,
"
1 !#
2
1
1
h
1
2
2
2
+
k µ − µ0 k2 + tr P + P0 − 2 P0 P P0
2
2β
h
i
−n − n log(2π) − log det(P ) + βµ⊤ Γµ + β tr (ΓP ) . (16)
2) Optimizing over (µ, P ): Equating the gradient of (16)
w.r.t. µ to zero, results µ = φ(µ0 ) := (I + hΓ)−1 µ0 . The
recursion µk = φ(µk−1 ), up to first order in h, becomes
µk = (I − hΓ) µk−1 + O(h2 ).
(17)
We see that this recursion coincides with the solution of
(14a) in the “small h” limit. Specifically, µ(t) = eAt µ0 ⇒
k
µk := µ(t = kh) = eAh µ0 ⇒ µk = eAh µk−1 =
(I + hA) µk−1 + O(h2 ), which is same as (17) since Γ :=
−A. Thus, we have recovered (14a) using discrete timestepping via JKO scheme in the small step-size limit.
Setting the gradient of (16) w.r.t. P to zero (using Lemma
4), we obtain
1 1
1
h
−1
−1 2
P02 − P −1 + hΓ = 0. (18)
I − P02 P0 2 P −1 P0 2
β
− 12
By pre and post multiplying both sides of (18) with P0
1
−1 2
−1
=: Z, we arrive at
and letting P0 2 P −1 P0 2
,
β
β −1
−1
Z − P0 2 (I + hΓ)P0 2 = 0,
h
h
which admits the unique closed-form solution [16, p. 304]
21 !
h − 12
β
− 12
−I + I + 4 P0 (I + hΓ) P0
. (19)
Z=
2h
β
Z2 +
Expanding (19), we obtain
β
1 h
−I + I + 4 P0 (I + hΓ) P0 +
2h
2 β
#
1 1
2
1
−
1
16h
−1
−
−1
3
2 2
2
2
(I + hΓ) P0 (I + hΓ) P0 + O(h )
P
2!
β2 0
h
−1
−1
= P0 2 I + hΓ − P0−1 P0 2 + O(h2 ).
(20)
β
Z=
−1
2
−1
2
1
−1 2
−1
back into (20), squarSubstituting Z = P0 2 P −1 P0 2
ing, and rearranging, we get that
−1
−1
1
1
P = I + h Γ − P0−1
P0 I + h Γ − P0−1
+O(h2 )
β
β
1
1
P0 I − h Γ − P0−1
+ O(h2 )
= I − h Γ − P0−1
β
β
= Ψ(P0 ) + O(h2 ),
where Ψ(P0 ) := P0 + h −ΓP0 − P0 Γ + 2β −1 I . Set the
matrix-valued recursion Pk = Ψ (Pk−1 ), where
Ψ (Pk−1 ) := Pk−1 + h −ΓP0 − P0 Γ + 2β −1 I + O(h2 ). (21)
To show that (21) indeed recovers (14b),
p first notice that
substituting A = A⊤ = −Γ and B = 2β −1 I in (14b)
results the Lyapunov differential equation
Ṗ (t) = −ΓP (t) − P (t)Γ + 2β −1 I
subject to P (0) = P0 , which can be solved via the method
of integrating factor as
1
(22)
P (t) = Γ−1 I − e−2Γt + e−Γt P0 e−Γt .
β
Thus, for t = kh, (22) gives
Pk := P (kh) = β −1 Γ−1 I − e−2Γkh + e−Γkh P0 e−Γkh
1) Equipartition of energy coordinate transformation:
Consider
the stationary covariance P∞ associated with
√
(A, 2B) that satisfies
AP∞ + P∞ A⊤ + 2BB ⊤ = 0.
For a system at a stationary distribution, we define the
thermodynamic temperature θ as the average amount of
“energy” per degree of freedom, that is,
1
θ := tr(P∞ ),
n
and, thereby, β := θ−1 the inverse temperature. By pre and
−1
post multiplying (23) with P∞ 2 , and rescaling by θ so as to
preserve the temperature in the new coordinates, we get
√
√
Aep θI + θIA⊤
2θBep ( 2θBep )⊤ = 0,
(24)
ep +
Pk − Pk−1 = 2β −1 hI − hΓP0 − hP0 Γ + O(h2 ),
which is same as (21) derived from JKO scheme. Thus,
we have recovered the covariance evolution through FokkerPlanck dynamics using the time-stepping procedure via JKO
scheme in the small step-size limit.
−1
1
−1
2
, Bep := P∞ 2 B, while
where Aep := P∞ 2 AP∞
the stationary covariance θI reflects equipartition of energy.√The equipartition√of energy co-ordinate transformation
(A, 2B) 7→ (Aep , 2θBep ), corresponds to the state√ −1
transformation x 7→ xep := θP∞ 2 x, leading to
√
dxep (t) = Aep xep (t) dt + 2θBep dw(t).
(25)
This settles how β is to be defined and interpreted in the
context of JKO scheme (11) and (12). On the other hand,
Aep being similar to A, is guaranteed to be Hurwitz but not
symmetric, unless A was symmetric to begin with. Thus, it
remains for us to “symmetrize” Aep and define a suitable
potential energy U (·) as needed in (12). We do this next.
2) Symmetrization transformation: We introduce the
time-varying transformation
= 2β −1 khI + (P0 − khΓP0 − khP0 Γ) + O(h2 ).
Replacing k with k−1 in the latter yields a similar expression
for Pk−1 . Then, subtracting these expressions for Pk−1 from
Pk we obtain that
skew
where
Askew
ep
xep 7→ xsym := e−Aep
:=
1
2 (Aep
skew
t
t
xep
A⊤
ep ).
−
This results in
√
√
(Aep , 2θBep ) 7→ (F (t), 2θG(t)),
with
F (t) := e−Aep
skew
Aep
Asym
ep e
where, similarly, Asym
:=
ep
satisfies
t
skew
, and G(t) := e−Aep
1
2 (Aep
dxsym (t) = F (t)xsym (t) dt +
B. The case of Hurwitz A and controllable (A, B)
√
We scale B into 2B without loss of generality, and
take as initial PDF ̺0 ≡ ρ0 = N (µ0 , P0 ). Since we allow
any Hurwitz√(not necessarily symmetric) A, and any B that
makes (A, 2B) a controllable pair, it is not apparent if
and how one can express (8) in the canonical form (4a).
The main impediment in doing so, is twofold: (1) how to
define the potential energy U (x), and (2) how to interpret and
define the parameter β in the generic case. In the following,
we show that by two successive co-ordinate transformations,
system (8) can indeed be put in the form (4a). Similar
transformations have been mentioned in [17, p. 1464], [18]
in a different context.
(23)
t
Bep ,
+ A⊤
ep ). Thus, xsym (t)
√
2θG(t) dw(t).
(26)
Notice that F (t) is symmetric for all t. Furthermore, observe that the new coordinates xsym is simply obtained by a
(time-varying) orthogonal transformation of the equipartition
of energy coordinates xep . Hence the stationary covariance
of xsym is identical to that of xep , which is θI (from Section
III-B.1). What happens is that the covariance of xsym (t)
tends to the same steady state value as t → ∞ in spite of
the fact that (26) has time varying coefficients. To see this
⊤
in different way, we can rewrite (24) as Bep Bep
= −Asym
ep ,
and deduce that
skew
G(t)G(t)⊤ = e−Aep
skew
⊤ Aep t
Bep Bep
e
= −F (t),
√
√
⇒ F (t)θI + θIF (t) + 2θG(t)( 2θG(t))⊤ = 0.
t
(27)
The symmetrization xep 7→ xsym leaves the stationary
covariance θI invariant. This guarantees that the definition
of temperature θ stays intact. The coordinate transformations
described above are summarized in Table I.
3) Recovery of the Fokker-Planck solution: We are now
ready to apply the JKO scheme to√ the generic stochastic
linear system dx(t) = Ax(t) dt + 2B dw(t), with initial
PDF ρ(x(0), 0) = N (µ0 , P0 ). To this end, we carry out a
computation akin to the two steps in Section III-A, for the
transformed SDE (26) in the symmetrized coordinate xsym .
From there on, we recover the Fokker-Planck solution in the
original coordinate x.
Since x 7→ xsym is a linear transformation, it follows
that xsym ∼ N (µsym , Psym ) whenever x ∼ N (µ, P ).
Thus, carrying out the first step of the optimization in xsym
coordinate, we get an expression similar to (16) wherein
(µ, P ) is to be replaced by (µsym , Psym ), and (µ0 , P0 ) is
to be replaced by (µsym0 , Psym0 ). To carry out the second
⊤
step of optimization, notice that Asym
= −Bep Bep
0,
ep
skew
skew
−Aep t sym Aep t
and consequently F (t) = e
Aep e
0. Thus,
considering the time-varying potential
1
U (xsym ) := − x⊤
F (t)xsym ≥ 0,
2 sym
and setting the partial derivative of the infimal value from
first stage of the optimization w.r.t. µsym to zero, results
the recursion µsymk = (I − hF (kh))−1 µsymk−1 . Recalling
skew √
−1
that xsym = e−Aep t θP∞ 2 x, we arrive at a recursion in
original coordinate:
1
skew
2 Aep
µk = P∞
e
kh
skew
{(I − hF (kh))−1 eAep
e
−Askew
kh
ep
−1
P∞ 2
h
}
µk−1 .
(28)
By series expansion and collecting linear terms in h, one can
verify the following:
2
(I − hF (kh))−1 = I + hAsym
ep + O(h ),
−1 Askew
h
ep
(I − hF (kh))
e
Askew
kh
ep
e
where C ∈ Rm×n , and ρ0 = N (µ0 , P0 ). The conditional
PDF ρ+ (x(t), t) = N (µ+ (t), P + (t)), given measurements
up to time t, is well-known and given by the Kalman-Bucy
filter [22]
dµ+ (t) = Aµ+ (t)dt + K(t) dz(t) − Cµ+ (t)dt , (31a)
Ṗ +(t) = AP +(t)+P +(t)A⊤+2BB ⊤−K(t)RK(t)⊤ (31b)
that specifies a vector SDE and a matrix ODE, respectively,
for the conditional mean µ+ (t) and covariance P + (t). The
initial conditions are µ+ (0) = µ0 , P + (0) = P0 , and
K(t) := P + (t)C ⊤ R−1 is the so-called Kalman gain.
In the sequel, we demonstrate that by applying the twostep optimization strategy we used before in Section III, we
can recover the Kalman-Bucy filter from LMMR-equation
(5) for the linear Gaussian case as the h ↓ 0 limit.
A. LMMR gradient descent scheme
Once again we proceed with carrying out the following
two optimization steps. First, we optimize (5) over Dµ,P ,
and then optimize the minimum value over the choice of
parameters (µ, P ).
−
−
1) Optimizing over Dµ,P : Consider ̺−
k = N (µk , Pk )
to be our prior for the state PDF at time t = kh. Observe
that
inf
̺∈Dµ,P
−
DKL ̺kN (µ−
k , Pk ) =
inf
̺∈Dµ,P
−E̺ {log
e
F ILTERING
dz(t) = Cx(t) dt + dv(t),
= I + hAep + O(h ),
e
FOR
In this section, we focus on the linear Gaussian filtering
problem, with process model and measurement models
√
dx(t) = Ax(t)dt + 2Bdw(t),
2
−1 Askew
h −Askew
kh
ep
ep
(I − hF (kh))
IV. JKO- LIKE S CHEMES
Z
̺(x) log ̺(x)dx
Rn
−
N (µ−
k , Pk )} ,
(32)
and that
2
= I + hAep + O(h ).
−1
1h
⊤
(µ − µ−
Pk−
(µ − µ−
k)
k )
2
1
+ tr P (Pk− )−1 − log (2π)n det(Pk− )
2
−
E̺ {log N (µ−
k , Pk )} = −
Hence (28) yields
1
−1
2
Aep P∞ 2 µk−1 + O(h2 )
µk = I + hP∞
= (I + hA) µk−1 + O(h2 ),
− 21
(29)
1
2
where the last equality follows from Aep := P∞ AP∞
.
hA
2
Since µ̇ = Aµ and e = I + hA + O(h ), in the small h
limit, equation (29) thus recovers (14a), as in Section III-A.
A similar straightforward but tedious computation leads to
the matrix recursion
Pk − Pk−1 = h(APk−1 + Pk−1 A⊤ + 2BB ⊤ ) + O(h2 ),
(30)
which in the limit h ↓ 0, is indeed a first-order approximation
of the Lyapunov equation for the original system. We omit
the details for brevity.
remains invariant for all ̺ ∈ Dµ,P . Therefore, the arginf
in (32) is achieved by the Gaussian PDF N (µ, P ) (i.e., the
maximum entropy PDF with given mean-covariance), and
−
the infimal value is precisely DKL (N (µ, P )kN (µ−
k , Pk )).
On the other hand, notice that
1h
1
(yk − Cµ)⊤
E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} =
2
2
i
R−1 (yk − Cµ) + tr C ⊤ R−1 CP
= constant
(33)
inf
̺∈Dµ,P
❤❤❤
→
❤❤❤Coordinate
❤❤❤
Attribute ↓
❤❤
Original
Equipartition of energy
Symmetrization
State vector
x
xep
xsym
(A,
System matrices
Stationary covariance
√
2B)
P∞
(Aep ,
√
2θBep )
θI
(F (t),
√
2θG(t))
θI
TABLE I: Summary of the coordinate transformations for Section III-B.
as well over Dµ,P . Hence
−
arg inf DKL ̺kN (µ−
k , Pk )
B. Alternative JKO-like schemes for filtering
̺∈Dµ,P
+
h
E̺ {(yk − Cx)⊤ R−1 (yk − Cx)} = N (µ, P ),
2
and the corresponding infimum value is
1
− −1
⊤
tr (Pk− )−1 P + (µ−
(µ−
k − µ) (Pk )
k − µ) − n−
2
h
(yk − Cµ)⊤ R−1 (yk − Cµ)
log det (Pk− )−1 P +
2
+ tr C ⊤ R−1 CP .
(34)
2) Optimizing over (µ, P ): Equating the partial derivative
of (34) w.r.t. µ to zero, and setting µ ≡ µ+
k in the resulting
algebraic equation, we get
+
⊤ −1
(Pk− )−1 µ−
yk − Cµ+
k − µk + hC R
k = 0,
−
− ⊤ −1
(35)
yk − Cµ+
⇒µ+
k .
k = µk + hPk C R
On the other hand, equating the partial derivative of (34)
w.r.t. P to zero, and then setting P ≡ Pk+ in the resulting
algebraic equation, we get
(Pk+ )−1 = (Pk− )−1 + hC ⊤ R−1 C ⇒ Pk+ = I + hPk− C ⊤
−1 −
R−1 C
Pk = Pk− − hPk− C ⊤ R−1 CPk− + O(h2 ).
(36)
With ∆zk = yk h, as in Section I,
2
µ+ (t)dt = µ+
k h + O(h ),
and from (29) that
+
2
µ−
k = (I + hA)µk−1 + O(h ).
These, together with (36), allow us to simplify (35) as
2
+
+
+ ⊤ −1
µ+
∆zk − hCµ+
k −µk−1 = hAµk−1 + Pk C R
k + O(h ),
which in the limit h ↓ 0, leads to (31a).
Substituting (30) into (36) we arrive at
+
+
−hPk−1
C ⊤ R−1 CPk−1
+ O(h2 ).
In the limit h ↓ 0, (37) recovers (31b).
̺+
k (x, h) = arg inf
̺∈D2
1 2
W2 ̺, ̺−
+ hΦ(̺),
k
2
k ∈ N, (38)
where the functional Φ(·) is as in (6). The template of the
two-step optimization again applies and, specializing to the
linear Gaussian case, the solution of (38) in the h ↓ 0 limit,
is N (µ+ (t), P + (t)), given by
dµ+ (t) = Aµ+ (t)dt + L dz(t) − Cµ+ (t)dt ,
(39a)
Ṗ + (t)=(A − LC)P + (t)+P + (t)(A − LC)⊤+2BB ⊤(39b)
where L := C ⊤ R−1 , and µ+ (0) = µ0 , P + (0) = P0 . This
follows by noticing from Sections III-A.1 and IV-A.1 that
1 2
−
−
W ̺, N (µk , Pk + hΦ(̺) = N (µ, P ),
arg inf
2 2
̺∈Dµ,P
where the infimum value is
1
1
− 21 2
−
− 12
2
P
(P
)
k µ−µ−
k
+
tr
P
+
P
−2
(P
)
k
k 2
k
k
2
h
+ (yk − Cµ)⊤ R−1 (yk − Cµ)+tr C ⊤ R−1 CP .(40)
2
dz(t) = ∆zk + O(h2 ),
+
+
+
Pk+ − Pk−1
= h(APk−1
+ Pk−1
A⊤ + 2BB ⊤ )
The ideas in the LMMR-scheme suggest the possibility
of alternative variational schemes to approximate stochastic
estimators. Such a viewpoint has been put forth in [23],
promoting the notion of regularized dynamic inversion. As an
example, one may consider a gradient descent with respect
to the Wasserstein distance 12 W22 , instead of KL-divergence
DKL in (5). In that case, the posterior may be constructed
according to
(37)
Equating the partial derivative of (40) w.r.t. µ to zero, then
+
+
setting µ ≡ µ+
k , and using (29), we find (µk −µk−1 ) equals
⊤ −1
2
∆zk − hCµ+
hAµ+
k + O(h ),
k−1 + C R
(41)
which in the limit h ↓ 0, results the SDE (39a). Similarly,
using Lemma 4, we equate the partial derivative of (40) w.r.t.
P to zero, and then setting P ≡ Pk+ , we get
(Pk+ )−1 = I + hC ⊤ R−1 C (Pk− )−1 I + hC ⊤ R−1 C ⇒
Pk+ = Pk− − h Pk− C ⊤ R−1 C + C ⊤ R−1 CPk− + O(h2 ),
+
+
which combined with the recursion Pk− = Pk−1
+h(APk−1
+
⊤
⊤
2
+ Pk−1 A + 2BB ) + O(h ) from Section III-B.3, yields
+
+
+
Pk+ = Pk−1
+h A − C ⊤ R−1 C Pk−1
+ Pk−1
(A−
i
⊤
2
⊤ −1
⊤
C R C + 2BB + O(h ). (42)
In the limit h ↓ 0, recursion (42) gives Lyapunov ODE (39b).
It is instructive to compare the SDE-ODE system (39)
with that in (31). In the case of (39), the estimator is of
a Luenberger type with a static gain matrix L which is
decoupled from the covariance, unlike (31). The estimator
(39) is obviously not optimal in the minimum mean-square
error sense. It is only presented here as a guideline to explore
other variational schemes with desirable properties.
V. C ONCLUDING
REMARKS
Reformulating uncertainty propagation and the filtering
equations as gradient flows [8] is potentially transformative
[3] [9]. The full power of this viewpoint is yet to be
uncovered. Moreover, casting the iterative approximation
steps in the language of proximal operators on the space
of density functions may provide theoretical insights and
computational benefits. A specific direction of future work
would be developing proximal algorithms [2] to numerically
solve the nonlinear filtering problem by recursively solving
convex optimization problems, and to quantify computational
performance of the same with respect to existing sequential
Monte Carlo algorithms like the particle filter. The purpose
of the present paper has been to highlight and elucidate
the ideas in [3] and [9] in the context of linear Gaussian
systems. We hope that this study will help to motivate further
exploration of this topic.
A PPENDIX
In this Appendix, we collect some lemmas that are used in
Sections III and IV. In addition, we will show in Corollary
1 below that applying Lemma 1 and 2 together enables us
to provide an alternative proof of a Theorem in [14], which
might be of independent interest.
Lemma 1: If X and Y are symmetric positive definite
1
21
p
1
matrices, then tr X 2 Y X 2
≤ tr (X) tr (Y ).
Proof: From Uhlmann’s variational formula (see [10],
also Theorem 6.1 in [11]) , given any G ≻ 0, we have
21 p
1
1
≤ tr (XG) tr (Y G−1 ),
(43)
tr
X2Y X2
where the equality in (43) is achieved for the specific choice
1
− 21 1 1
1
1
1
Gopt = Y 2 X 2 Y X 2
X 2 Y 2 X − 2 . Specializing
(43) for G = Y , and noting that tr (XY ) ≤ tr (X) tr (Y ),
the statement follows.
Lemma 2: Given a PDF ̺0 (x) ∈ D2 with mean
µ0 ∈ Rn , and n × n covariance matrix P0 ≻ 0. Then
inf W22 (̺, ̺0 ) equals
̺∈Dµ,P
kµ−
µ0 k22
1
21
1
2
2
,
+ tr P + P0 − 2 P0 P P0
(44)
and is achieved by push-forward of ̺0 (x) via an affine trans 1
− 12 1
1
1
port map M x + m, where M := P 2 P 2 P0 P 2
P 2,
and m := µ− µ0 , that is, the arginf for (44) is ̺(x)
=
q
1
12
1
1
1
det(P0 )
−2
P 2 P0 P 2
P − 2 (x − µ) + µ0 . In
det(P ) ̺0 P
particular, if ̺0 = N (µ0 , P0 ), then ̺ = N (µ, P ).
Proof: Let ̺0 be as given, and choose any ̺ ∈ Dµ,P .
Let ̺0 and ̺ be obtained by translating ̺0 and ̺ respectively,
such that both ̺0 and ̺ have zero mean. Using (10), we can
directly verify [12, p. 236] that W22 (̺, ̺0 ) =k µ − µ0 k22
+W22 (̺, ̺0 ). On the other hand, it is known [13, p. 11,
Proposition 1.1.6] that
1
21
1
2
2
2
W2 (̺, ̺0 ) ≥ tr P + P0 − 2 P0 P P0
⇒ W22 (̺, ̺0 ) ≥ right hand side of (44).
(45)
Now consider a candidate transport map M x + m where
M and m are functions of P , P0 , µ, µ0 as in the statement.
It suffices to prove that our candidate transport map indeed
achieves the equality in (45). To this end, directly substituting
the expressions for M and m, notice that the push-forward
has mean M µ0 + m = µ, and covariance M P0 M ⊤ =
P . So our candidate transport map (M , m) is feasible.
To show optimality, from (10) notice that W22 (̺, ̺0 ) =
inf tr(P + P0 − 2C), where C := M P0 solves P0 −
C∈Rd×d
CP −1 C ⊤ 0, which has known optimal solution Copt :=
1
− 21 1
1
1
Mopt P0 = P0 P 2 P 2 P0 P 2
P 2 . Since our candi1
−
2
1
1
1
1
P 2 satisfies tr (M P0 ) =
date M := P 2 P 2 P0 P 2
12
1
1
, the statement follows.
tr (Mopt P0 ) = tr
P02 P P02
In the Corollary below, combining Lemma 1 and 2, we
recover a result in [14, Theorem 3.1].
Corollary 1: Given d-dimensional joint PDF ̺0 with
mean µ0 , covariance P0 ≻ 0, suppose tr(P0 ) = τ0 . For
fixed µ and τ > 0,
√ 2
√
inf W22 (̺, ̺0 ) =
τ − τ 0 + k µ − µ0 k22 , (46)
̺∈Dµ,τ
and is achieved by ̺(x) =
τ0
τ
d2
̺0
τ0
τ
(x − µ) + µ0 .
Proof: Let us choose P := ττ0 P0 , and from (44)
√ 2
√
observe that inf W22 (ξ, ̺0 ) = ( τ − τ 0 ) + k µ −
ξ∈Dµ,P
µ0 k22 . On the other hand, for any ̺ ∈ Dµ,τ , we know from
(45) that
1
12
1
W22 (̺, ̺0 ) ≥ τ + τ0 − 2 tr P02 SP02
+ k µ − µ0 k22 ,
where S is the covariance of ̺. Using Lemma 1, we get
21
1
1
√
≤ τ τ0 ⇒ W22 (̺, ̺0 ) ≥
tr P02 SP02
√
√ 2
inf W22 (ξ, ̺0 ) =
τ − τ 0 + k µ − µ0 k22 , (47)
[7] H. Risken, The Fokker-Planck Equation: Methods of Solution and Applications. Springer Series in Synergetics, Vol. 18, First ed., Springer;
1989.
[8] L. Ambrosio, N. Gigli, and G. Savaré, Gradient Flows: in Metric
Spaces and in the Space of Probability Measures. Lectures in Mathematics, ETH Zürich, Second ed., Birkhäuser; 2008.
[9] R.S. Laugesen, P.G. Mehta, S.P. Meyn, and M. Raginsky, “Poisson’s
Equation in Nonlinear Filtering”. SIAM Journal on Control and
Optimization. Vol. 53, No. 1, pp. 501–525, 2015.
ξ∈Dµ,P
and that the equality is achieved when S = P = ττ0 P0 . In
d
that case, det(S) = ττ0 det(P0 ), and hence Lemma 2
yields the arg inf ̺(x) for (46) as
s
1
12
1
det(P0 )
− 12
− 12
2
2
̺0 S
S P0 S
S (x − µ) + µ0
det(S)
τ d2 τ
0
0
̺0
(x − µ) + µ0 .
=
τ
τ
Lemma 3: If E(·) depends on ̺ only via the mean and
covariance of ̺, then inf F (̺) is achieved by N (µ, P ).
̺∈Dµ,P
Proof: As E(̺) ≡ E(µ, P ), henceR from (11) we get
̺ log ̺ dx. Since
inf F (̺) = E(µ, P ) + β −1 inf
̺∈Dµ,P
̺∈Dµ,P
[10] A. Uhlmann, “The “Transition Probability” in the State Space of a
*-Algebra”. Reports on Mathematical Physics, Vol. 9, No. 2, pp. 273–
279, 1976.
[11] D. Petz, Quantum Information Theory and Quantum Statistics. Theoretical and Mathematical Physics, First ed., Springer; 2008.
[12] C.R. Givens, and R.M. Shortt, “A Class of Wasserstein Metrics for
Probability Distributions”. The Michigan Mathematical Journal, Vol.
31, No. 2, pp. 231–240, 1984.
[13] S.T. Rachev, and L. Rüschendorf, Mass Transportation Problems.
Volume I: Theory. First ed., Springer; 1998.
[14] E.A. Carlen, and W. Gangbo, “Constrained Steepest Descent in the
2-Wasserstein Metric”. Annals of Mathematics, pp. 807–846, 2003.
[15] A. Halder, and E.D.B. Wendel, “Finite Horizon Linear Quadratic
Gaussian Density Regulator with Wasserstein Terminal Cost”. Proceedings of the 2016 American Control Conference, pp. 7249–7254,
2016.
N (µ, P ) is the maximum entropy PDF under prescribed
mean µ and covariance P , hence the statement.
[16] N.J. Higham, and H.M. Kim, “Solving A Quadratic Matrix Equation
by Newton’s Method with Exact Line Searches”. SIAM Journal on
Matrix Analysis and Applications, Vol. 23, No. 2, pp. 303–316, 2001.
Lemma 4: For P , P0 ≻ 0,
21
1 1
1
1
∂
1 1 −1
−1 2
tr P02 P P02
= P02 P0 2 P −1 P0 2
P02 .
∂P
2
Proof: We refer the readers to Appendix B in [15].
[17] D. Liberzon, and R.W. Brockett, “Spectral Analysis of Fokker–Planck
and Related Operators Arising from Linear Stochastic Differential
Equations”. SIAM Journal on Control and Optimization, Vol. 38, No.
5, pp. 1453–1467, 2000.
R EFERENCES
[1] H.H. Bauschke, and P.L. Combettes, Convex Analysis and Monotone
Operator Theory in Hilbert Spaces. CMS Books in Mathematics,
Springer; 2011.
[18] R.W. Brockett, and J.C. Willems, “Stochastic Control and the Second
Law of Thermodynamics”. Proceedings of the 1978 IEEE Conference
on Decision and Control including the 17th Symposium on Adaptive
Processes, pp. 1007–1011, 1978.
[19] R.L. Stratonovich, “Application of the Theory of Markov Processes for
Optimum Filtration of Signals”. Radio Eng. Electron. Phys. (USSR),
Vol. 1, pp. 1–19, 1960.
[2] N. Parikh, and S. Boyd, “Proximal Algorithms”. Foundations and
Trends in Optimization. Vol. 1, No. 3, pp. 127–239, 2014.
[20] H.J. Kushner, “On the Differential Equations Satisfied by Conditional
Densities of Markov Processes, with Applications”. Journal of the
SIAM Series A Control, Vol 2, No. 1, pp. 106–119, 1964.
[3] R. Jordan, D. Kinderlehrer, and F. Otto, “The Variational Formulation
of the Fokker–Planck Equation”. SIAM Journal on Mathematical
Analysis. Vol. 29, No. 1, pp. 1–17, 1998.
[21] M. Fujisaki, G. Kallianpur, and H. Kunita, “Stochastic Differential
Equations for the Non Linear Filtering Problem”. Osaka Journal of
Mathematics, Vol. 9, No. 1, pp. 19–40, 1972.
[4] C. Villani, Topics in Optimal Transportation. Graduate Studies in
Mathematics, Vol. 58, First ed., American Mathematical Society; 2003.
[22] R.E. Kalman, and R.S. Bucy, “New Results in Linear Filtering and
Prediction Theory”. Journal of Basic Engineering, Vol. 83, No. 3, pp.
95–108, 1961.
[5] J.-D. Benamou, and Y. Brenier, “A Computational Fluid Mechanics
Solution to the Monge–Kantorovich Mass Transfer Problem”. Numerische Mathematik. Vol. 84, No. 3, pp. 375–393, 2000.
[6] K.J. Åström, Introduction to Stochastic Control Theory. Academic
Press; 1970.
[23] A. Yezzi, and E.I. Verriest, “Nonlinear Observers via Regularized
Dynamic Inversion”. Proceedings of the 2007 American Control
Conference, pp. 1693–1698, 2007.
| 3 |
Leveraging Joint Interactions for
Credibility Analysis in News Communities
Subhabrata Mukherjee
Gerhard Weikum
Max Planck Institute for Informatics
{smukherjee, weikum}@mpi-inf.mpg.de
arXiv:1705.02667v2 [cs.AI] 9 May 2017
Abstract
Media seems to have become more partisan, often providing a
biased coverage of news catering to the interest of specific groups.
It is therefore essential to identify credible information content that
provides an objective narrative of an event. News communities such
as digg, reddit, or newstrust offer recommendations, reviews, quality
ratings, and further insights on journalistic works. However, there
is a complex interaction between different factors in such online
communities: fairness and style of reporting, language clarity and
objectivity, topical perspectives (like political viewpoint), expertise
and bias of community members, and more.
This paper presents a model to systematically analyze the different interactions in a news community between users, news, and
sources. We develop a probabilistic graphical model that leverages
this joint interaction to identify 1) highly credible news articles, 2)
trustworthy news sources, and 3) expert users who perform the role
of “citizen journalists” in the community. Our method extends CRF
models to incorporate real-valued ratings, as some communities
have very fine-grained scales that cannot be easily discretized without losing information. To the best of our knowledge, this paper is
the first full-fledged analysis of credibility, trust, and expertise in
news communities.
Categories and Subject Descriptors
H.3.3 [Information Storage and Retrieval]: Information Search
and Retrieval - Information Filtering; I.2.7 [Computing Methodologies]: Artificial Intelligence - Natural Language Processing
Keywords
Credibility; News Community; Probabilistic Graphical Models
1.
INTRODUCTION
Motivation: Media plays a crucial role in the public dissemination
of information about events. Many people find online information
and blogs as useful as TV or magazines. At the same time, however,
people also believe that there is substantial media bias in news
coverage [24, 8], especially in view of inter-dependencies and crossownerships of media companies and other industries (like energy).
Several factors affect the coverage and presentation of news in
media incorporating potentially biased information induced via the
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee. Request permissions from [email protected].
CIKM’15, October 19-23, 2015, Melbourne, VIC, Australia
Copyright 2015 ACM. ISBN 978-1-4503-3794-6/15/10 ...$15.00.
DOI: http://dx.doi.org/10.1145/2806416.2806537
.
fairness and style of reporting. News are often presented in a polarized way depending on the political viewpoint of the media source
(newspapers, TV stations, etc.). In addition, other source-specific
properties like viewpoint, expertise, and format of news may also be
indicators of information credibility.
In this paper, we embark on an in-depth study and formal modeling of these factors and inter-dependencies within news communities
for credibility analysis. A news community is a news aggregator
site (e.g., reddit.com, digg.com, newstrust.net) where users can give
explicit feedback (e.g., rate, review, share) on the quality of news
and can interact (e.g., comment, vote) with each other. Users can
rate and review news, point out differences, bias in perspectives,
unverified claims etc. However, this adds user subjectivity to the
evaluation process, as users incorporate their own bias and perspectives in the framework. Controversial topics create polarization
among users which influence their ratings. [30, 6] state that online
ratings are one of the most trusted sources of user feedback; however
they are systematically biased and easily manipulated.
Problem Statement: Given a set of news sources generating news
articles, and users reviewing those articles on different qualitative
aspects with mutual interactions — our objective is to jointly rank the
sources, articles, and users based on their trustworthiness, credibility,
and expertise respectively.
In this process, we want to analyze the influence of various factors
like the writing style of a news article, its topic distribution, type of
media and format of news, political viewpoint and expertise, and
other user traits on the credibility analysis of the community.
Our Approach: To analyze the factors and inter-dependencies in a
news community, we have developed a sophisticated probabilistic
graphical model, specifically a Continuous Conditional Random
Field (CCRF) model, which exploits several moderate signals of
interaction jointly between the following factors to derive a strong
signal for information credibility (refer to Figures 1a and 1b). In
particular, the model captures the following factors.
• Language and credibility of a news article: objectivity, rationality,
and general quality of language in the news article. Objectivity is
the quality of the news to be free from emotion, bias and prejudice
of the author. The credibility of a news article refers to presenting
an unbiased, informative and balanced narrative of an event.
• Properties and trustworthiness of a news source: trustworthiness
of a news source in the sense of generating credible articles based
on source properties like viewpoint, expertise and format of news.
• Expertise of users and review ratings: expertise of a user, in the
news community, in properly judging the credibility of news articles. Expert users should provide objective evaluations – by
reviews and/or ratings – of news articles, corroborating with the
evaluations of other expert users. This can be used to identify
potential “citizen journalists” [17] in the community.
We show that the CCRF performs better than sophisticated col-
2.
MODELING NEWS COMMUNITIES
Our approach exploits the rich interaction taking place between
the different factors in a news community. We propose a probabilistic graphical model that leverages the interplay between news
credibility, language objectivity, source trustworthiness, and user
expertise. Refer to Figure 1 for the following discussion.
Consider a set of news sources hsi (e.g., s1 in Figure 1c) generating articles hdi which are reviewed and analyzed by users hui for
their credibility. Consider rij to be the review by user uj on article
di . The overall article rating of di is given by yi .
In our model, each news source, news article, user and her rating
or review, and overall article rating is associated with a continuous
random variable r.v. ∈ [1 . . . 5], that indicates its trustworthiness,
objectivity, expertise, and credibility, respectively. 5 indicates the
best quality that an item can obtain, and 1 is the worst. Discrete
ratings, being a special case of this setting, can be easily handled.
Each node is associated with a set of observed features that are
extracted from the news community. For example, a news source
has properties like topic specific expertise, viewpoint and format of
news; a news article has features like topics, and style of writing
from the usage of discourse markers and subjective words in the
article. For users we extract their topical perspectives and expertise, engagement features (like the number of questions, replies,
Joint Probabilistic
Inference
Source
Trustworthiness
News
Article
Language
Objectivity
News
Source
Users
Topics
Reviews
User
Expertise
…, Engagement,
Expertise
V
Ex iew
pe p
rt oin
is t
e, ,
...
Observable Features
Emotionality,
Discourse,...
laborative filtering approaches based on latent factor models, and
regression methods that do not consider all these interactions.
Although this work is focused on news communities, the framework can also be used for instance, in health communities (e.g.
healthboards.com) where users write posts on drug usage — the
objective being to jointly rank posts, drug side-effects, and users
based on their quality, credibility, and trustworthiness respectively.
In this work, the attributes credibility and trustworthiness are
always associated with a news article and a news source, respectively.
The joint interaction between several factors also captures that a
source garners trustworthiness by generating credible news articles,
which are highly rated by expert users. Similarly, the likelihood
of a news article being credible increases if it is generated by a
trustworthy source.
Some communities offer users fine-grained scales for rating different aspects of news articles and news sources. For example, the
newstrust.net community analyzes an article on 15 aspects like insightful, fairness, style and factual. These are aggregated into an
overall real-valued rating after weighing the aspects based on their
importance, expertise of the user, feedback from the community,
and more. This setting cannot be easily discretized without blowup or risking to lose information. Therefore, we model ratings as
real-valued variables in our CCRF.
Contributions: The paper introduces the following novel elements:
• A continuous CRF that captures the mutual dependencies between
credibility of articles, trustworthiness of sources, expertise of users,
and expresses real-valued ratings.
• An inference method for the CCRF that allows us to jointly (a)
predict ratings; and (b) rank articles, sources, and users by their
credibility, trustworthiness, and expertise, respectively.
• A large experimental study with data from newstrust.net, one of
the most sophisticated news communities with a focus on quality
journalism.
The rest of the paper is organized as follows. Section 2 presents
how we model news communities, and which factors we include in
the model. Section 3 develops the CCRF that captures the interaction
between all the factors. Section 4 introduces the dataset that we use
for experimental evaluation and further studies. Section 5 presents
our experimental results followed by discussion.
Article Credibility
Ratings
(a) Interactions between source trustworthiness, article credibility, language
objectivity, and user expertise.
(b) Sample instantiation.
(c) Clique representation.
Figure 1: Graphical model representation.
reviews posted) and various interactions with other users (like upvotes/downvotes) and news sources in the community.
The objective of our model is to predict credibility ratings hyi
of news articles hdi by exploiting the mutual interactions between
different variables. The following edges between the variables
capture their interplay:
• Each news article is connected to the news source from where it is
extracted (e.g., s1 − d1 , s1 − d2 )
• Each news article is connected to its review or rating by a user
(e.g., d1 − r11 , d1 − r12 , d2 − r22 )
• Each user is connected to all her reviews (e.g., u1 − r11 , u2 − r12 ,
u2 − r22 )
• Each user is connected to all news articles rated by her (e.g., u1 −
d1 , u2 − d1 , u2 − d2 )
• Each source is connected to all the users who rated its articles (e.g.,
s1 − u1 , s1 − u2 )
• Each source is connected to all the reviews of its articles (e.g.,
s1 − r11 , s1 − r12 , s1 − r22 )
• For each article, all the users and all their reviews on the article are
inter-connected (e.g., u1 − r12 , u2 − r11 , u1 − u2 ). This captures
user-user interactions (e.g., u1 upvoting/downvoting u2 ’s rating on
d1 ) influencing the overall article rating.
Therefore, a clique (e.g., C1 ) is formed between a news article, its
source, users and their reviews on the article. Multiple such cliques
(e.g., C1 and C2 ) share information via their common news sources
(e.g., s1 ) and users (e.g., u2 ).
News topics play a significant role on information credibility.
Individual users in community (and news sources) have their own
perspectives and expertise on various topics (e.g., environmental politics). Modeling user-specific topical perspectives explicitly captures
credibility judgment better than a user-independent model. However,
many articles do not have explicit topic tags. Hence we use Latent
Dirichlet Allocation (LDA) [1] in conjunction with Support Vector
Regression (SVR) [4] to learn words associated to each (latent)
topic, and user (and source) perspectives for the topics. Documents
are assumed to have a distribution over topics as latent variables,
with words as observables. Inference is by Gibbs sampling. This
LDA model is a component of the overall model, discussed next.
We use a probabilistic graphical model, specifically a Conditional
Random Field (CRF), to model all factors jointly. The modeling
approach is related to the prior work of [23]. However, unlike that
work and traditional CRF models, our problem setting requires a
continuous version of the CRF (CCRF) to deal with real-valued
ratings instead of discrete labels. In this work, we follow an approach similar to [26, 27, 32] in learning the parameters of the
CCRF. We use Support Vector Regression [4] to learn the elements
of the feature vector for the CCRF.
The inference is centered around cliques of the form h source,
article, h users i, h reviews ii. An example is the two cliques
C1 : s1 − d1 − hu1 , u2 i − hr11 , r12 i and C2 : s1 − d2 − u2 − r22
in the instance graph of Figure 1c. This captures the “cross-talk”
between different cliques sharing nodes. A news source garners
trustworthiness by generating multiple credible articles. Users attain
expertise by correctly identifying credible articles that corroborate
with other expert users. Inability to do so brings down their expertise. Similarly, an article attains credibility if it is generated by a
trustworthy source and highly rated by an expert user. The inference
algorithm for the CCRF is discussed in detail in Section 3.
In the following subsections, we discuss the various feature
groups that are considered in our CCRF model.
2.1
Articles and their Stylistic Features
The style in which news is presented to the reader plays a pivotal
role in understanding its credibility. The desired property for news
is to be objective and unbiased. In this section, we examine the
different stylistic indicators of news credibility. All the lexicons
used in this section are compiled from [28, 23].
Assertives: Assertive verbs (e.g., “claim”) complement and modify
a proposition in a sentence. They capture the degree of certainty to
which a proposition holds.
Factives: Factive verbs (e.g., “indicate”) pre-suppose the truth of a
proposition in a sentence.
Hedges: These are mitigating words (e.g., “may”) to soften the
degree of commitment to a proposition.
Implicatives: These words trigger pre-supposition in an utterance.
For example, usage of the word complicit indicates participation in
an activity in an unlawful way.
Report verbs: These verbs (e.g., “argue”) are used to indicate
the attitude towards the source, or report what someone said more
accurately, rather than using just say and tell.
Discourse markers: These capture the degree of confidence, perspective, and certainty in the set of propositions made. For instance,
strong modals (e.g., “could”), probabilistic adverbs (e.g., “maybe”),
and conditionals (e.g., “if”) depict a high degree of uncertainty and
hypothetical situations, whereas weak modals (e.g., “should”) and
inferential conjunctions (e.g., “therefore”) depict certainty.
Subjectivity and bias: News is supposed to be objective: writers
should not convey their own opinions, feelings or prejudices in their
stories. For example, a news titled “Why do conservatives hate
your children?” is not considered objective journalism. We use
a subjectivity lexicon1 , a list of positive and negative opinionated
words2 , and an affective lexicon3 to detect subjective clues in arti1
http://mpqa.cs.pitt.edu/lexicons/subj_lexicon/
http://www.cs.uic.edu/ liub/FBS/opinion-lexicon-English.rar
3
http://wndomains.fbk.eu/wnaffect.html
2
Latent Topics
Topic Words
Obama admin.
Citizen journ.
US military
AmyGoodman
Alternet
Climate
obama, republican, party, election, president, senate, gop, vote
cjr, jouralism, writers, cjrs, marx, hutchins, reporting, liberty, guides
iraq, war, military, iran, china, nuclear, obama, russia, weapons
democracy, military, civil, activist, protests, killing, navajo, amanda
media, politics, world news, activism, world, civil, visions, economy
energy, climate, power, water, change, global, nuclear, fuel, warming
Table 1: Latent topics (with illustrative labels) and their words.
cles. The affective features capture the state of mind (like attitude
and emotions) of the writer while writing an article or post (e.g.,
anxiousness, confidence, depression, favor, malice, sympathy etc.).
We additionally harness a lexicon of bias-inducing words extracted from the Wikipedia edit history from [28] exploiting its
Neutral Point of View Policy to keep its articles “fairly, proportionately, and as far as possible without bias, all significant views that
have been published by reliable sources on a topic”.
Feature vector construction: For each stylistic feature type fi
and each news article dj , we compute the relative frequency of
words of type fi occurring in dj , thus constructing a feature vector
F L (dj ) = hf reqij = #(words in fi ) / length(dj )i. Consider
the review rj,k written by user uk on the article dj . For each such
review, analogous to the per-article stylistic feature vector hF L (dj )i,
we construct a per-review feature vector hF L (rj,k )i.
2.2
Articles and their Topics
Topic tags for news articles play an important role in user-perceived
prominence, bias and credibility, in accordance to the ProminenceInterpretation theory [7]. For example, the tag Politics is often
viewed as an indicator of potential bias and individual differences;
whereas tags like Energy or Environment are perceived as more
neutral news and therefore invoke higher agreement in the community on the associated articles’ credibility. Obviously, this can be
misleading as there is a significant influence of Politics on all topics
in all format of news.
Certain users have topic-specific expertise that make them rate
articles on those topics better than others. News sources also have
expertise on specific topics and provide a better coverage of news on
those topics than others. For example, National Geographic provides
a good coverage of news related to environment, whereas The Wall
Street Journal provides a good coverage on economic policies.
However, many news articles do not have any explicit topic tag.
In order to automatically identify the underlying theme of the article,
we use Latent Dirichlet Allocation (LDA) [1] to learn the latent
topic distribution in the corpus. LDA assumes a document to have a
distribution over a set of topics, and each topic to have a distribution
over words. Table 1 shows an excerpt of the top topic words in each
topic, where we manually added illustrative labels for the topics.
The latent topics also capture some subtle themes not detected by the
explicit tags. For example, Amy Goodman is an American broadcast
journalist, syndicated columnist and investigative reporter who is
considered highly credible in the community. Also, associated
with that topic cluster is Amanda Blackhorse, a Navajo activist and
plaintiff in the Washington Redskins case.
Feature vector construction: For each document dj and each of
its review rj,k , we create feature vectors hF T (dj )i and hF T (rj,k )i
respectively, using the learned latent topic distributions, as well as
the explicit topic tags. Section 3.1 discusses our method to learn the
topic distributions.
2.3
News Sources
A news source is considered trustworthy if it generates highly
credible articles. We examine the effect of different features of a
news source on its trustworthiness based on user assigned ratings
Category
Elements
Variables
Type
Description
Media
Format
Scope
Viewpoint
Top Topics
Expertise on
Topics
newspaper, blog, radio, magazine, online
editorial, investigative report, news, research
local, state, regional, national, international
far left, left, center, right, neutral
politics, weather, war, science„ U.S. military
U.S. congress, Middle East, crime, presidential election,
Bush administration, global warming
dj
s
u
rj,k
Vector
Vector
Vector
Vector
yj,k
z
SVRuk , SVRsi
SVRL , SVRT
Ψ = f (hψj i)
Real Number
Vector
Real Number
∈ [1 . . . 5]
Real Number
λ=
hαu , βs , γ1 , γ2 i
yn×1
Xn×m
Qn×n
bn×1
Σn×n
µn×1
Vector
Document with sequence of words hwi
Sources
Users
Review by user uk on document dj
with sequence of words hwi
Rating of rj,k
Sequence of topic assignments for hwi
SVR prediction for users, sources,
language, and topics
Clique potential with ψj = hyj , si , dj ,
huk i, hrj,k ii for clique of dj
Combination weights for users hui,
sources hsi, language and topic models
Credibility rating of documents hdi
Feature matrix with m = |U | + |S| + 2
f (λ)
f (λ, X)
f (λ)
f (λ, X)
Table 2: Features for source trustworthiness.
in the community. We consider the following source features (summarized in Table 2): the type of media (e.g., online, newspaper, tv,
blog), format of news (e.g., news analysis, opinion, special report,
news report, investigative report), (political) viewpoint (e.g., left,
center, right), scope (e.g., international, national, local), the top
topics covered by the source, and their topic-specific expertise.
Feature vector construction: For each news source sl , we create
a feature vector hF S (sl )i using features in Table 2. Each element
fiS (sl ) is 1 or 0 indicating presence or absence of a feature. Note
that above features include the top (explicit) topics covered by any
source, and its topic-specific expertise for a subset of those topics.
2.4
Users, Ratings and Interactions
A user’s expertise in judging news credibility depends on many
factors. [5] discusses the following traits for recognizing an expert.
Community Engagement of the user is an obvious measure for
judging the user authority in the community. We capture this with
different features: number of answers, ratings given, comments,
ratings received, disagreement and number of raters.
Inter-User Agreement: Expert users typically agree on what constitutes a credible article. This is inherently captured in the proposed
graphical model, where a user gains expertise by assigning credibility ratings to articles that corroborate with other expert users.
Topical Perspective and Expertise: The potential for harvesting
user preference and expertise in topics for rating prediction of reviews has been demonstrated in [22, 21]. For credibility analysis
the model needs to capture the user’s perspective and bias towards
certain topics based on their political inclination that bias their ratings, and their topic-specific expertise that allows them to evaluate
articles on certain topics better as “Subject Matter Experts”. These
are captured as per-user feature weights for the stylistic indicators
and topic words in the language of user-contributed reviews.
Interactions: In a community, users can upvote (digg, like, rate)
the ratings of users that they appreciate, and downvote the ones they
do not agree with. High review ratings from expert users increase
the value of a user; whereas low ratings bring down her expertise.
Similar to this user-user interaction, there can be user-article, usersource and source-article interactions which are captured as edges
in our graphical model (by construction). Consider the following
anecdotal example in the community showing an expert in nuclear
energy downvoting another user’s rating on nuclear radiation: “Nonexpert: Interesting opinion about health risks of nuclear radiation, from a
physicist at Oxford University. He makes some reasonable points ...
Low rating by expert to above review: Is it fair to assume that you have no
background in biology or anything medical? While this story is definitely very
important, it contains enough inaccurate and/or misleading statements...”
Feature vector construction: For each user uk , we create an engagement feature vector hF E (uk )i. In order to capture user subjectivity, in terms of different stylistic indicators of credibility, we
consider the per-review language feature vector hF L (rj,k )i of user
uk (refer to Section 2.1). To capture user perspective and expertise
on different topics, we consider the per-review topic feature vector
hF T (rj,k )i of each user uk .
Vector
Matrix
Diagonal Matrix
Vector
CovarianceMatrix
Mean Vector
Table 3: Symbol table.
3.
JOINT PROBABILISTIC INFERENCE
In this section we incorporate the discussed features and insights
into a joint probabilistic graphical model. The task is to identify
credible news articles, trustworthy news sources, and expert users
jointly in a news community. Table 3 summarizes the important
notations used in this section.
3.1
Topic Model
Consider an article d consisting of a sequence of {Nd } words
denoted by w1 , w2 , ...wNd . Each word is drawn from a vocabulary
V having unique words indexed by 1, 2, ...V . Consider a set of
topic assignments z = {z1 , z2 , ...zK } for d, where each topic zi
can be from a set of K possible topics.
LDA [1] assumes each document d to be associated with a multinomial distribution θd over topics Z with a symmetric dirichlet prior
ρ. θd (z) denotes the probability of occurrence of topic z in document d. Topics have a multinomial distribution φz over words drawn
from a vocabulary V with a symmetric dirichlet prior ζ. φz (w) denotes the probability of the word w belonging to the topic z. Exact
inference is not possible due to intractable coupling between Θ and
Φ. We use Gibbs sampling for approximate inference.
Let n(d, z, w) denote the count of the word w occurring in document d belonging to the topic z. In the following equation, (.) at
any position in the above count indicates marginalization, i.e., summing up the counts over all values for the corresponding position
in n(d, z, w). The conditional distribution for the latent variable z
(with components z1 to zK ) is given by:
P (zi = k|wi = w, z−i , w−i ) ∝
n(., k, w) + ζ
n(d, k, .) + ρ
P
×P
k n(d, k, .) + Kρ
w n(., k, w) + V ζ
(1)
Let hT E i and hT L i be the set of explicit topic tags and latent
topic dimensions, respectively. The topic feature vector hF T i for an
article or review combines both explicit tags and latent topics and is
constructed as follows:
if T E0 = FtT
#f req(w, d),
t
T
Ft (d) = #f req(w, d) × φT L0 (w), if TtL0 = FtT and φT L0 (w) > δ
t
t
0
otherwise
So for any word in the document matching an explicit topic tag,
the corresponding element in the feature vector hF T i is set to its
occurrence count in the document. If the word belongs to any latent
topic with probability greater than threshold δ, the probability of the
word belonging to that topic (φt (w)) is added to the corresponding
element in the feature vector, and set to 0 otherwise.
3.2
Support Vector Regression
We use Support Vector Regression (SVR) [4] to combine the
different features discussed in Section 2. SVR is an extension of
the max-margin framework for SVM classification to the regression
problem. It solves the following optimization problem to learn
weights w for features F :
N
min
w
X
1 T
(max(0, |yd − wT F | − ))2
w w+C×
2
d=1
(2)
Article Stylistic Model: We learn a stylistic regression model
SVRL using the per-article stylistic feature vector hF L (dj )i for
article dj (or, hF L (rj,k )i for review rj,k ), with the overall article
rating yj (or, yj,k ) as the response variable.
Article Topic Model: Similarly, we learn a topic regression model
SVRT using the per-article topic feature vector hF T (dj )i for article
dj (or, hF T (rj,k )i for review rj,k ), with the overall article rating
yj (or, yj,k ) as the response variable.
Source Model: We learn a source regression model SVRsi using
the per-source feature vector hF S (si )i for source si , with the overall source rating as the response variable .
User Model: For each user uk , we learn a user regression model
SVRuk with her per-review stylistic and topic feature vectors
hF L (rj,k )∪F T (rj,k )i for review rj,k for article dj , with her overall
review rating yj,k as the response variable.
Note that we use overall article rating to train article stylistic and
topic models. For the user model, however, we take user assigned
article ratings and per-user features. This model captures user subjectivity and topic perspective. The source models are trained on
news-source specific meta-data and its ground-truth ratings.
3.3
Continuous Conditional Random Field
We model our learning task as a Conditional Random Field (CRF),
where the random variables are the ratings of news articles hdj i,
news sources hsi i, users huk i, and reviews hrj,k i. The objective is
to predict the credibility ratings hyj i of the articles hdj i.
The cliques in the CRF consist of an article dj , its source si ,
set of users huk i reviewing it, and the corresponding user reviews
hrj,k i — where rj,k denotes the review by user uk on article dj .
Different cliques are connected via the common news sources, and
users. There are as many cliques as the number of news articles.
Let ψj (yj , si , dj , huk i, hrj,k i) be a potential function for clique
j. Each clique has a set of associated vertex feature functions. In
our problem setting, we associate features to each vertex.The features constituted by the stylistic, topic, source and user features explained in Section 2 are: F L (dj )∪F T (dj )∪F S (si )∪k (F E (uk )∪
F L (rj,k ) ∪ F T (rj,k )).
A traditional CRF model allows us to have a binary decision if a
news article is credible (yj = 1) or not (yj = 0), by estimating the
conditional distribution with the probability mass function of the
discrete random variable y:
Qn
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
P r(y|D, S, U, R) = P Qn
y
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
Given a news article dj , its source id si , and a set of user ids
huk i who reviewed the article, the regression models SVRL (dj ),
SVRT (dj ), SVRsi , hSVRuk (dj )i (discussed in Section 3.2) predict
rating of dj . For notational brevity, hereafter, we drop the argument
dj from the SVR function. These SVR predictors are for separate
feature groups and independent of each other. Now we combine the
different SVR models to capture mutual interactions, such that the
weight for each SVR model reflects our confidence on its quality.
Errors by an SVR are penalized by the squared loss between the
predicted article rating and the ground-truth rating. There is an
additional constraint that for any clique only the regression models
corresponding to the news-source and users present in it should be
activated. This can be thought of as partitioning the input feature
space into subsets, with the features inside a clique capturing local
interactions, and the global weights capture the overall quality of
the random variables via the shared information between the cliques
(in terms of common sources, users, topics and language features) —
an ideal setting for using a CRF. Equation 5 shows one such linear
combination. Energy function of an individual clique is given by:
ψj (yj , si , dj , huk i, hrj,k i) = −
P r(y|D, S, U, R) =
n
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))
R∞ Q
n
j=1 exp(ψj (yj , si , dj , huk i, hrj,k i))dy
−∞
(4)
αk Iuk (dj )(yj − SVRuk )2
k=1
−
i=S
X
βi Isi (dj )(yj −SVRsi )2 −γ1 (yj −SVRL )2 −γ2 (yj −SVRT )2
i=1
(5)
Indicator functions Iuk (dj ) and Isi (dj ) are 1 if uk is a reviewer
and si is the source of article dj respectively, and are 0 otherwise.
As the output of the SVR is used as an input to the CCRF in Equation 5, each element of the input feature vector is already predicting
the output variable. The learned parameters λ = hα, β, γ1 , γ2 i
(with dimension(λ) = |U | + |S| + 2) of the linear combination of
the above features depict how much to trust individual predictors.
Large λk on a particular predictor places large penalty on the mistakes committed by it, and therefore depicts a higher quality for that
predictor. αu corresponding to user u can be taken as a proxy for
that user’s expertise, allowing us to obtain a ranked list of expert
users. Similarly, βs corresponding to news source s can be taken
as a proxy for that source’s trustworthiness, allowing us to obtain a
ranked list of trustworthy news sources.
Overall energy function of all cliques is given by:
Ψ=
n
X
ψj (yj , si , dj , huk i, hrj,k i)
j=1
(Substituting ψj from Equation 5 and re-organizing terms)
Ψ=
n
X
(−
j=1
−
i=S
X
k=U
X
αk Iuk (dj )(yj − SVRuk )2
k=1
βi Isi (dj )(yj − SVRsi )2 − γ1 (yj − SVRL )2 − γ2 (yj − SVRT )2 )
i=1
(3)
But in our problem setting, we want to estimate the credibility
rating of an article. Therefore, we need to estimate the conditional
distribution with the probability density function of the continuous
random variable y:
Q
k=U
X
=−
n
X
yj2 [
j=1
+
n
X
j=1
2yj [
k=U
X
αk Iuk (dj ) +
k=1
k=U
X
βi Isi (dj ) + γ1 + γ2 ]
i=1
αk Iuk (dj )SVRuk +
k=1
+ γ2 SVRT ] −
i=S
X
i=S
X
βi Isi (dj )SVRsi + γ1 SVRL
i=1
n k=U
i=S
X
X
X
[
αk Iuk (dj )SVR2uk +
βi Isi (dj )SVR2si
j=1 k=1
i=1
+ γ1 SVR2L + γ2 SVR2T ]
Organizing the bracketed terms into variables as follows:
(P
k=U
k=1
Qi,j =
bi = 2[
αk Iuk (di ) +
Pl=S
l=1
βl Isl (di ) + γ1 + γ2
0
k=U
X
l=S
X
αk Iuk (di )SVRuk +
∂Σ
∂Σ−1
= −Σ
Σ
∂λk
∂λk
= −2ΣΣ
i=j
i 6= j
∂
∂
(µT Σ−1 µ) =
(bT Σb)
∂λk
∂λk
βl Isl (di )SVRsl +γ1 SVRL +γ2 SVRT ]
l=1
k=1
= bT
i=S
n k=U
X
X
X
βi Isi (dj )SVR2si +γ1 SVR2L +γ2 SVR2T ]
αk Iuk (dj )SVR2uk +
c=
[
i=1
j=1 k=1
= bT (Σ
We can derive:
Ψ = −y T Qy + y T b − c
Qn
−∞
= 4X(.),k µ − 2µT µ
∂log|Σ−1 |
1
∂Σ−1
=
Trace(|Σ−1 |Σ
)
∂λk
|Σ−1 |
∂λk
exp(ψj )
j=1
exp(ψj )dy
= 2Trace(Σ)
exp(Ψ)
−∞ exp(Ψ)dy
= R∞
We can derive the gradient vector:
exp(−y T Qy + y T b)
T
T
−∞ exp(−y Qy + y b)dy
(7)
∂logP (y|X)
T
= −y T y+2y T X(.),k −2X(.),k
µ+µT µ+ Trace(Σ)
∂λk
(11)
= R∞
= R∞
exp(− 21 y T Σ−1 y + y T Σ−1 µ)
−∞
exp(− 21 y T Σ−1 y + y T Σ−1 µ)dy
Let η denote the learning rate. The update equation is given by:
(Substituting Q = 12 Σ−1 , b = Σ−1 µ)
Equation 7 can be transformed
R ∞ into a multivariate Gaussian distribution after substituting −∞ exp(− 12 y T Σ−1 y + y T Σ−1 µ)dy =
(2π)n/2
1
|Σ−1 | 2
exp( 12 µT Σ−1 µ). Therefore obtaining,
P (y|X) =
1
n
∂Σ
∂bT
∂b
+
b) +
Σb
∂λk
∂λk
∂λk
= 4X(.),k Σb − 2bT ΣΣb
(6)
Substituting Ψ in Equation 4:
j=1
P (y|X) = R ∞ Qn
∂Σb
∂bT
+
Σb
∂λk
∂λk
1
(2π) 2 |Σ| 2
1
exp(− (y − µ)T Σ−1 (y − µ))
2
(8)
Q represents the contribution of λ to the covariance matrix Σ.
Each row of the vector b and matrix Q corresponds to one training
instance, representing the active contribution of features present in
it. To ensure Equation 8 represents a valid Gaussian distribution,
the covariance matrix Σ needs to be positive definite for its inverse
to exist. For that the diagonal matrix Q needs to be a positive semidefinite matrix. This can be ensured by making all the diagonal
elements in Q greater than 0, by constraining λk > 0.
Since this is a constrained optimization problem, gradient ascent
cannot be directly used. We follow the approach similar to [27]
and maximize log-likelihood with respect to log λk , instead of λk
as in standard gradient ascent, making the optimization problem
unconstrained as:
∂logP (y|X)
∂logP (y|X)
= αk (
)
∂logλk
∂λk
(9)
Taking partial derivative of the log of Equation 8 w.r.t λk :
∂logP (y|X)
1 ∂
=
(−y T Σ−1 y + 2y T Σ−1 µ − µT Σ−1 µ
∂λk
2 ∂λk
+ log|Σ−1 | + Constant)
(10)
Substituting the following in the above equation:
∂Q
∂Σ−1
=2
∂λk
∂λk
= 2I
∂Σ−1 µ
∂b
=
[∵ µ = Σb]
∂λk
∂λk
= 2X(.),k
where, X(.),k indicates the kth column of the feature matrix X.
logλnew
= logλold
k
k +η
∂logP (y|X)
∂logλk
(12)
Once the model parameters are learned using gradient ascent,
the inference for the prediction y of the article credibility rating is
straightforward. As we assume the distribution to be Gaussian, the
prediction is the expected value of the function, given by the mean
of the distribution: y0 = argmaxy P (y|X) = µ = Σb.
Note that Σ and b are both a function of λ = hα, β, γ1 , γ2 i which
represents the combination weights of various factors to capture mutual interactions. The optimization problem determines the optimal
λ for reducing the error in prediction.
4.
USE CASE: NEWSTRUST
We performed experiments with data from a typical news community: newstrust.net4 . This community is similar to digg.com
and reddit.com, but has more refined ratings and interactions. We
chose NewsTrust because of the availability of ground-truth ratings
for credibility analysis of news articles; such ground-truth is not
available for the other communities.
We collected stories from NewsTrust from May, 2006 to May,
2014. Each such story features a news article from a source (E.g.
BBC, CNN, Wall Street Journal) that is posted by a member, and
reviewed by other members, many of whom are professional journalists and content experts5 . We crawled all the stories with their
explicit topic tags and other associated meta-data. We crawled all
the news articles from their original sources that were featured in
any NewsTrust story. The earliest story dates back to May 1, 1939
and the latest one is in May 9, 2014.
We collected all member profiles containing information about the
demographics, occupation and expertise of the members along with
their activity in the community in terms of the posts, reviews and
ratings; as well as interaction with other members. The members in
the community can also rate each others’ ratings. The earliest story
rating by a member dates back to May, 2006 and the most recent one
4
Code and data available at
http://www.mpi-inf.mpg.de/impact/credibilityanalysis/
5
http://www.newstrust.net/help#about_newstrust
Factors
Count
Unique news articles reviewed in NewsTrust
NewsTrust stories on news articles
NewsTrust stories with ≥ 1 reviews
NewsTrust stories with ≥ 3 reviews
NewsTrust member reviews of news articles
62,064
84,704
43,107
18,521
134,407
News articles extracted from original sources
NewsTrust stories on extracted news articles
47,565
52,579
News sources
Journalists who wrote news articles
Timestamps (month and year) of posted news articles
5,658
19,236
3,122
NewsTrust members who reviewed news articles
NewsTrust members who posted news articles
668
Explicit topic tags
Latent topics extracted
456
300
Nodes
Sources
Members
News articles
Reviews
Edges
Total triangles
Count
181,364
1,704
6,906
42,204
130,550
602,239
521,630
Factors
No. of weakly connected components
Diameter
Average path length
Average degree
Average clustering coefficient
Modularity
Latent Factor Models (LFM)
Simple LFM [15]
Experience-based LFM [21]
Text-based LFM [20]
Our Model: User SVR
0.95
0.85
0.78
0.60
Model
Table 4: Dataset statistics.
Factors
MSE
Table 6: MSE comparison of models for predicting users’ credibility
rating behavior with 10-fold cross-validation. Improvements are
statistically significant with P-value < 0.0001.
7,114
1,580
News sources reviewed by NewsTrust members
Model
Count
12
8
47
6.641
0.884
0.516
Table 5: Graph statistics.
is in Feb, 2014. In addition, we collected information on member
evaluation of news sources, and other information (e.g., type of
media, scope, viewpoint, topic specific expertise) about source from
its meta data.
Crawled dataset: Table 4 shows the dataset statistics. In total 62K
unique news articles were reviewed in NewsTrust in the given period, out of which we were able to extract 47K full articles from the
original sources like New York Times, TruthDig, ScientificAmerican etc — a total of 5.6K distinct sources. The remaining articles
were not available for crawling. There are 84.7K stories featured
in NewsTrust for all the above articles, out of which 52.5K stories
refer to the news articles we managed to extract from their original
sources. The average number of reviews per story is 1.59. For
general analysis we use the entire dataset. For experimental evaluation of the CCRF and hypotheses testing, we use only those stories
( 18.5K) with a minimum of 3 reviews that refer to the news articles
we were able to extract from original sources.
Generated graph: Table 5 shows the statistics of the graph constructed by the method of Section 2.
Ground-Truth for evaluation: The members in the community can
rate the credibility of a news article on a scale from 1 to 5 regarding
15 qualitative aspects like facts, fairness, writing style and insight,
and popularity aspects like recommendation, credibility and views.
Members give an overall recommendation for the article explained
to them as: “... Is this quality journalism? Would you recommend this story
to a friend or colleague? ... This question is similar to the up and down
arrows of popular social news sites like Digg and Reddit, but with a focus on
quality journalism." Each article’s aspect ratings by different members
are weighted (and aggregated) by NewsTrust based on findings of
[16], and the member expertise and member level (described below).
This overall article rating is taken as the ground-truth for the article
credibility rating in our work. A user’s member level is calculated by
NewsTrust based on her community engagement, experience, other
users’ feedback on her ratings, profile transparency and validation
by NewsTrust staff. This member level is taken as the proxy for user
expertise in our work. Members rate news sources while reviewing
an article. These ratings are aggregated for each source, and taken
Only
Title
MSE
Title
& Text
MSE
Language Model: SVR
Language (Bias and Subjectivity)
Explicit Topics
Explicit + Latent Topics
All Topics (Explicit + Latent) + Language
3.89
1.74
1.68
1.57
0.72
1.74
1.01
0.61
News Source Features and Language Model: SVR
News Source
News Source + All Topics + Language
1.69
0.91
1.69
0.46
Aggregated Model: SVR
Users + All Topics + Language + News Source
0.43
0.41
Our Model: CCRF+SVR
User + All Topics + Language + News Source
0.36
0.33
Table 7: MSE comparison of models for predicting aggregated article credibility rating with 10-fold cross-validation. Improvements
are statistically significant with P-value < 0.0001.
as a proxy for the source trustworthiness in our work.
Training data: We perform 10-fold cross-validation on the news
articles. During training on any 9-folds of the data, the algorithm learns the user, source, language and topic models from
user-assigned ratings to articles and sources present in the train
split. We combine sources with less than 5 articles and users with
less than 5 reviews into background models for sources and users,
respectively. This is to avoid modeling from sparse observations,
and to reduce dimensionality of the feature space. However, while
testing on the remaining blind 1-fold we use only the ids of sources
and users reviewing the article; we do not use any user-assigned
ratings of sources or articles. For a new user and a new source, we
draw parameters from the user or source background model. The
results are averaged by 10-fold cross-validation, and presented in
the next section.
Experimental settings: In the first two experiments we want to
find the power of the CCRF in predicting user rating behavior, and
credibility rating of articles. Therefore, the evaluation measure is
taken as the Mean Squared Error (MSE) between the prediction
and the actual ground-rating in the community. For the latter experiments in finding expert users (and, trustworthy sources) there is no
absolute measure for predicting user (and, source) quality; it only
makes sense to find the relative ranking of users (and, sources) in
terms of their expertise (and, trustworthiness). Therefore, the evaluation measure is taken as the Normalized Discounted Cumulative
Gain (NDCG) [13] between the ranked list of users (and, sources)
obtained from CCRF and their actual ranking in the community.
5.
5.1
EXPERIMENTS
Predicting User Ratings of Articles
First we evaluate how good our model can predict the credibility
ratings that users assign to news articles using the Mean Squared
Error (MSE) between the prediction and the actual rating.
Model
Experience LFM [21]
PageRank
CCRF
NDCG
0.80
0.83
0.86
Table 8: NDCG scores for
ranking trustworthy sources.
Model
Experience LFM [21]
Member Ratings
CCRF
NDCG
0.81
0.85
0.91
Table 9: NDCG scores for
ranking expert users.
Baselines: We consider the following baselines for comparison:
1. Latent Factor Recommendation Model (LFM) [15]: LFM considers the tuple huserId, itemId, ratingi, and models each user and
item as a vector of latent factors which are learned by minimizing
the MSE between the rating and the product of the user-item latent
factors. In our setting, each news article is considered an item and
rating refers to the credibility rating assigned by a user to an article.
2. Experience-based LFM [21]: This model incorporates experience
of a user in rating an item in the LFM. The model builds on the
hypothesis that users at similar levels of experience have similar
rating behaviors which evolve with time. The model has an extra
dimension: the time of rating an item which is not used in our SVR
model. Note the analogy between the experience of a user in this
model, and the notion of user expertise in the SVR model. However,
these models ignore the text of the reviews.
3. Text-based LFM [20]: This model incorporates text in the LFM
by combining the latent factors associated to items in LFM with
latent topics in text from topic models like LDA.
4. Support Vector Regression (SVR) [4]: We train an SVR model
SVRuk for each user uk (refer to Section 3.2) based on her reviews
hrj,k i with language and topic features hF L (rj,k )∪F T (rj,k )i, with
the user’s article ratings hyj,k i as the response variable. We also
incorporate the article language features and the topic features, as
well as source-specific features to train the user model for this task.
The other models ignore the stylistic features, and other fine-grained
user-item interactions in the community.
Table 6 shows the MSE comparison between the different methods. Our model (User SVR) achieved the lowest MSE and thus
performed best.
5.2
Finding Credible Articles
As a second part of the evaluation, we investigate the predictive
power of different models in order to find credible news articles
based on the aggregated ratings from all users. The above LFM
models, unaware of the user cliques, cannot be used directly for
this task, as each news article has multiple reviews from different
users which need to be aggregated. We find the Mean Squared Error
(MSE) between the estimated overall article rating, and the groundtruth article rating. We consider stories with at least 3 ratings about
a news article. We compare the CCRF against the following baselines:
1. Support Vector Regression (SVR) [4]: We consider an SVR model
with features on language (bag-of-all-words, subjectivity, bias etc.),
topics (explicit tags as well as latent dimensions), and news-sourcespecific features. The language model uses all the lexicons derived
and used in [28, 23]. The source model also includes topic features
in terms of the top topics covered by the source, and its topic-specific
expertise for a subset of the topics.
2. Aggregated Model (SVR) [4]: As explained earlier, the user
features cannot be directly used in the baseline model, which is
agnostic of the user cliques. Therefore, we adopt a simple aggregation approach by taking the average rating of all the user ratings
SVRuk (dj )
for an article dj as a feature. Note that, in contrast to this
|uk |
simple average used here, our CCRF model learns the weights hαu i
per-user to combine their overall ratings for an article.
Table 7 shows the MSE comparison of the different models.
MSE Comparison: The first two models in Table 6 ignore the
textual content of news articles, and reviews, and perform worse than
the ones that incorporate full text. The text-based LFM considers
title and text, and performs better than its predecessors. However,
the User SVR model considers richer features and interactions, and
attains 23% MSE reduction over the best performing LFM baselines.
The baselines in Table 7 show the model performance after incorporating different features in two different settings: 1) with news
article titles only as text, and 2) with titles and the first few paragraphs of an article. The language model, especially the bias and
subjectivity features, is less effective using only the article titles due
to sparseness. On the other hand, using the entire article text may
lead to very noisy features. So including the first few paragraphs of
an article is the “sweet spot”. For this, we made an ad-hoc decision
and included the first 1000 characters of each article. With this
setting, the language features made a substantial contribution to
reducing the MSE.
The aggregated SVR model further brings in the user features,
and achieves the lowest MSE among the baselines. This shows that a
user-aware credibility model performs better than user-independent
ones. Our CCRF model combines all features in a more sophisticated manner, which results in 19.5% MSE reduction over the most
competitive baseline (aggregated SVR). This is empirical evidence
that the joint interactions between the different factors in a news
community are indeed important to consider for identifying highly
credible articles.
5.3
Finding Trustworthy Sources
We shift the focus to two use cases: 1) identifying the most trustworthy sources, and 2) identifying expert users in the community
who can play the role of “citizen journalists”.
Using the model of Section 3, we rank all news sources in the
community according to the learned hβsi i in Equation 5. The
baseline is taken as the PageRank scores of news sources in the Web
graph. In the experience-based LFM we can consider the sources to
be users, and articles generated by them to be items. This allows us
to obtain a ranking of the sources based on their overall authority.
This is the second baseline against which we compare the CCRF.
We measure the quality of the ranked lists in terms of NDCG
using the actual ranking of the news sources in the community as
ground-truth. NDCG gives geometrically decreasing weights to
predictions at the various positions of the ranked list:
N DCGp =
DCGp
IDCGp
where DCGp = rel1 +
Pp
reli
i=2 log2 i
Table 8 shows the NDCG scores for the different methods.
5.4
Finding Expert Users
Similar to news sources, we rank users according to the learned
hαuk i in Equation 5. The baseline is the average rating received
by a user from other members in the community. We compute the
NDCG score for the ranked lists of users by our method. We also
compare against the ranked list of users from the experience-aware
LFM [21]. Table 9 shows the NDCG scores for different methods.
5.5
Discussion
Hypothesis Testing: We test various hypotheses under the influence
of the feature groups using explicit labels, and ratings available in
the NewsTrust community. A summary of the tests is presented in
Table 10 showing a moderate correlation between various factors
which are put together in the CCRF to have a strong indicator for
information credibility.
Language: The stylistic features (factor (a) in Table 10) like assertives, hedges, implicatives, factives, discourse and affective play
a significant role in the credibility detection of news, in conjunction
with other language features like topics.
Factors
Corr.
a) Stylistic Indicators Vs. Article Credibility Rating
Insightful (Is it well reasoned? thoughtful?)
Fairness (Is it impartial? or biased?)
Style (Is this story clear? concise? well-written?)
Responsibility (Are claims valid, ethical, unbiased?)
Balance (Does this story represent diverse viewpoints?)
0.77
0.75
0.65
0.72
0.49
b) Influence of Politics Vs. Disagreement
c) Expertise (Moderate, High) Vs. Disagreement
Interactions
d) User Expertise Vs. User-User Rating
e) Source Trustworthiness Vs. Article Credibility Rating
f) User Expertise Vs. MSE in Article Rating Prediction
0.11
-0.10, -0.31
0.40
0.47
-0.29
Table 10: Pearson’s product-moment correlation between various
factors (with P-value < 0.0001 for each test).
Money - Politics
War in Iraq
Media - Politics
Green Technology
Most Trusted
rollingstone.com
nybooks.com consortiumnews
discovermagazine.com
truthdig.com
consortiumnews thenation.com
nature.com
democracynow.org truthout.org
thedailyshow.com scientificamerican.com
Least Trusted
firedoglake.com
suntimes.com
trueslant.com
crooksandliars rushlimbaugh.com
timesonline
rightwingnews.com
suntimes.com foxnews.com
Table 11: Most and least trusted sources on sample topics.
Topics: Topics are an important indicator for news credibility. We
measured the influence of the Politics tag on other topics by their
co-occurrence frequency in the explicit tag sets over all the news
articles. We found significant influence of Politics on all topics,
with an average measure of association of 54% to any topic, and
62% for the overall news article. The community gets polarized due
to different perspectives on topical aspects of news. A moderate
correlation (factor (b) in Table 10) indicates a weak trend of disagreement, measured by the standard deviation in article credibility
rating among users, increasing with its political content. In general,
we find that community disagreement for different viewpoints are as
follows: Right (0.80) > Left(0.78) > Center(0.65) > Neutral (0.63).
Users: User engagement features are strong indicators of expertise.
Although credibility is ultimately subjective, experts show moderate
agreement (factor (c) in Table 10) on highly credible news. There
is a moderate correlation (factor (d) in Table 10) between feedback
received by a user on his ratings from community, and his expertise.
Sources: Various traits of a news source like viewpoint, format
and topic expertise are strong indicators of trustworthiness. In general, science and technology websites (e.g., discovermagazine.com,
nature.com, scientificamerican.com), investigative reporting and
non-partisan sources (e.g., truthout.org, truthdig.com, cfr.org), book
sites (e.g., nybooks.com, editorandpublisher.com), encyclopedia
(e.g., Wikipedia) and fact checking sites (e.g., factcheck.org) rank
among the top trusted sources. Table 11 shows the most and least
trusted sources on four sample topics. Overall, news sources are
considered trustworthy with an average rating of 3.46 and variance
of 0.15. Tables 12 and 13 show the most and least trusted sources
on different viewpoints and media types respectively. Contents from
blogs are most likely to be posted followed by newspaper, magazine
and other online sources. Contents from wire service, TV and radio are deemed the most trustworthy, although they have the least
subscription, followed by magazines.
Interactions: In principle, there is a moderate correlation between
trustworthy sources generating credible articles (factor (e) in Table 10) identified by expert users (factor (f) in Table 10). A negative
sign of correlation indicates decrease in disagreement or MSE with
Left
Right
Most
Trusted
democracynow,
truthdig.com,
rollingstone.com
courant.com, opinionjournal.com,
townhall.com
Least
Trusted
crooksandliars, suntimes.com, washingtonmonthly.com
rightwingnews,
foxnews.com,
weeklystandard.com
Center
Neutral
armedforcesjournal.com,
bostonreview.net
spiegel.de,cfr.org,
editorandpublisher.com
sltrib.com, examiner.com, spectator.org
msnbc.msn.com,
online.wsj.com,
techcrunch.com
Table 12: Most and least trusted sources with different viewpoints.
Magazine
Online
Newspaper
Blog
Most Trusted Sources
rollingstone.com
nybooks.com
thenation.com
truthdig.com
cfr.org
consortiumnews
nytimes.com
nola.com
seattletimes
juancole.com
dailykos.com
huffingtonpost
investigativevoice
northbaltimore
hosted.ap.org
suntimes.com
nydailynews.com
dailymail.co.uk
rightwingnews
firedoglake.com
crooksandliars
Least Trusted Sources
weeklystandard.com
commentarymagazine
nationalreview.com
Table 13: Most and least trusted sources on different types of media.
increase in expertise. In a news community, we can observe moderate signals of interaction between various factors that characterize
users, articles, and sources. Our CCRF model brings all these features together to build a strong signal for news credibility.
6.
RELATED WORK
Rating prediction in online communities: Collaborative filtering
based approaches [15] for rating prediction exploit user and item
similarities by latent factors. [21] further studies the temporal evolution of users and their rating behavior in this framework. Recent
works [20, 22] also tap into user review texts to generate userspecific ratings of reviews. Other papers have studied temporal
issues for anomaly detection [10].Prior work that tapped user review
texts focused on other issues. Sentiment analysis over reviews aimed
to learn latent topics [18], latent aspects and their ratings [35], and
user-user interactions [36]. Our model unifies several dimensions to
jointly study the role of language, users, topics, and interactions for
information credibility.
Information credibility in social media: [3] analyzes micro-blog
postings in Twitter related to trending topics, and classifies them as
credible or not based on features from user posting and re-posting
behavior. [14] focuses on credibility of users, harnessing the dynamics of information flow in the underlying social graph and tweet
content. [2] analyzes both topical content of information sources
and social network structure to find credible information sources in
social networks. Information credibility in tweets has been studied
in [11]. [33] conducts a user study to analyze various factors like
contrasting viewpoints and expertise affecting the truthfulness of
controversial claims. However, none of these prior works analyze
the interplay between sources, language, topics, and users.
The works closest to our problem and approach are [34, 23]. [34]
presents an algorithm for propagating trust scores in a heterogeneous network of claims, sources, and documents. [23] proposes a
method to jointly learn user trustworthiness, statement credibility,
and language objectivity in online health communities. However,
these works do not analyze the role of topics, language bias, user
perspective, expertise, and fine-grained interactions in community.
Bias in social communities and media: The use of biased language in Wikipedia and similar collaborative communities has been
studied in [9, 28]. Even more broadly, the task of characterizing
subjective language has been addressed, among others, in [37, 19].
The influence of different kinds of bias in online user ratings has
been studied in [30, 6]. [6] proposes an approach to handle users
who might be subjectively different or strategically dishonest.
Citizen journalism: [29] defines citizen journalism as “the act of
a citizen or group of citizens playing an active role in the process
of collecting, reporting, analyzing and dissemination of news and
information to provide independent, reliable, accurate, wide-ranging
and relevant information that a democracy requires.” [31] focuses on
user activities like blogging in community news websites. Although
the potential of citizen journalism is greatly highlighted in the recent
Arab Spring [12], misinformation can be quite dangerous when
relying on users as news sources (e.g., the reporting of the Boston
Bombings in 2013 [25]).
7.
CONCLUSIONS
In this work, we analyzed the effect of different factors like
language, topics and perspectives on the credibility rating of articles
in a news community. These factors and their mutual interactions
are the features of a novel model for jointly capturing credibility
of news articles, trustworthiness of news sources and expertise of
users. From an application perspective, we demonstrated that our
method can reliably identify credible articles, trustworthy sources
and expert users in the community.
As future work, we plan to model and analyze the temporal
evolution of the factors associated with each of the components in
our model. We have a strong intuition that time has a significant
influence on the trustworthiness of sources and credibility of news.
8.
REFERENCES
[1] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet
allocation. J. Mach. Learn. Res., 3, 2003.
[2] K. R. Canini, B. Suh, and P. Pirolli. Finding credible
information sources in social networks based on content and
social structure. In PASSAT, 2011.
[3] C. Castillo, M. Mendoza, and B. Poblete. Information
credibility on twitter. In WWW, 2011.
[4] H. Drucker, C. J. C. Burges, L. Kaufman, A. J. Smola, and
V. Vapnik. Support vector regression machines. In NIPS, 1996.
[5] H. J. Einhorn, R. M. Hogarth, and E. Klempner. Quality of
group judgment. Psychological Bulletin, 1977.
[6] H. Fang, J. Zhang, and N. Magnenat Thalmann. Subjectivity
grouping: Learning from users’ rating behavior. In AAMAS,
2014.
[7] B. J. Fogg. Prominence-interpretation theory: explaining how
people assess credibility online. In CHI, 2003.
[8] Gallup.com. Americans’ confidence in newspapers continues
to erode. http://www.gallup.com/poll/163097/americans-confidencenewspapers-continues-erode.aspx. Accessed: 2015-05-07.
[9] S. Greene and P. Resnik. More than words: Syntactic
packaging and implicit sentiment. In NAACL, 2009.
[10] S. Günnemann, N. Günnemann, and C. Faloutsos. Detecting
anomalies in dynamic rating data: A robust probabilistic
model for rating evolution. KDD, 2014.
[11] A. Gupta and P. Kumaraguru. Credibility ranking of tweets
during high impact events. In PSOSM, 2012.
[12] P. N. Howard, A. Duffy, D. Freelon, M. Hussain, W. Mari, and
M. Mazaid. Opening closed regimes: What was the role of
social media during the arab spring? 2011.
[13] K. Järvelin and J. Kekäläinen. Cumulated gain-based
evaluation of IR techniques. ACM Trans. Inf. Syst., 20(4),
2002.
[14] B. Kang, J. O’Donovan, and T. Höllerer. Modeling topic
specific credibility on twitter. In IUI, 2012.
[15] Y. Koren. Factorization meets the neighborhood: A
multifaceted collaborative filtering model. KDD, 2008.
[16] C. Lampe and R. K. Garrett. It’s all news to me: The effect of
instruments on ratings provision. In HICSS, 2007.
[17] S. C. Lewis, K. Kaufhold, and D. L. Lasorsa. Thinking about
citizen journalism: The philosophical and practical challenges
of user-generated content for community newspapers.
Journalism Practice, 4(2), 2010.
[18] C. Lin and Y. He. Joint sentiment/topic model for sentiment
analysis. CIKM, 2009.
[19] C. Lin, Y. He, and R. Everson. Sentence subjectivity detection
with weakly-supervised learning. In IJCNLP, 2011.
[20] J. McAuley and J. Leskovec. Hidden factors and hidden
topics: Understanding rating dimensions with review text.
RecSys, 2013.
[21] J. J. McAuley and J. Leskovec. From amateurs to
connoisseurs: modeling the evolution of user expertise
through online reviews. In WWW, 2013.
[22] S. Mukherjee, G. Basu, and S. Joshi. Joint author sentiment
topic model. In SDM, 2014.
[23] S. Mukherjee, G. Weikum, and C. Danescu-Niculescu-Mizil.
People on drugs: Credibility of user statements in health
communities. KDD, 2014.
[24] Nber.org. Media bias and voting.
http://www.nber.org/digest/oct06/w12169.html. Accessed: 2015-05-07.
[25] Nytimes.com. Should reddit be blamed for the spreading of a
smear? http://www.nytimes.com/2013/07/28/magazine/should-reddit-beblamed-for-the-spreading-of-a-smear.html. Accessed: 2015-05-07.
[26] T. Qin, T. Liu, X. Zhang, D. Wang, and H. Li. Global ranking
using continuous conditional random fields. NIPS, 2008.
[27] V. Radosavljevic, S. Vucetic, and Z. Obradovic. Continuous
conditional random fields for regression in remote sensing.
ECAI, 2010.
[28] M. Recasens, C. Danescu-Niculescu-Mizil, and D. Jurafsky.
Linguistic models for analyzing and detecting biased
language. In ACL, 2013.
[29] B. Shayne and W. Chris. We media: How audiences are
shaping the future of news and information. 2003.
[30] Sloanreview.mit.edu. The problem with online ratings.
http://sloanreview.mit.edu/article/the-problem-with-online-ratings-2/ .
Accessed: 2015-05-07.
[31] A. Stuart. Citizen journalism and the rise of ‘mass
self-communication’: Reporting the london bombings. Global
Media, 1(1), 2007.
[32] B. Tadas, P. Robinson, and L. Morency. Continuous
conditional neural fields for structured regression. In ECCV,
2014.
[33] V. Vydiswaran et al. BiasTrust: Teaching biased users about
controversial topics. CIKM, 2012.
[34] V. V. Vydiswaran, C. Zhai, and D. Roth. Content-driven trust
propagation framework. In KDD, 2011.
[35] H. Wang et al. Latent aspect rating analysis without aspect
keyword supervision. KDD, 2011.
[36] R. West, H. S. Paskov, J. Leskovec, and C. Potts. Exploiting
social network structure for person-to-person sentiment
analysis. TACL, 2(2), 2014.
[37] J. Wiebe and E. Riloff. Creating subjective and objective
sentence classifiers from unannotated texts. In CICLing, 2005.
| 2 |
Recognizing Abnormal Heart Sounds Using Deep Learning
arXiv:1707.04642v2 [cs.SD] 19 Oct 2017
Jonathan Rubin1 , Rui Abreu2 , Anurag Ganguli2 , Saigopal Nelaturi2 , Ion Matei2 , Kumar Sricharan2
1
Philips Research North America, 2 PARC, A Xerox Company
[email protected], [email protected],
{anurag.ganguli, saigopal.nelaturi, ion.matei, sricharan.kumar}@parc.com
Abstract
The work presented here applies deep learning to
the task of automated cardiac auscultation, i.e. recognizing abnormalities in heart sounds. We describe an automated heart sound classification algorithm that combines the use of time-frequency
heat map representations with a deep convolutional
neural network (CNN). Given the cost-sensitive
nature of misclassification, our CNN architecture
is trained using a modified loss function that directly optimizes the trade-off between sensitivity
and specificity. We evaluated our algorithm at the
2016 PhysioNet Computing in Cardiology challenge where the objective was to accurately classify normal and abnormal heart sounds from single, short, potentially noisy recordings. Our entry to the challenge achieved a final specificity of
0.95, sensitivity of 0.73 and overall score of 0.84.
We achieved the greatest specificity score out of
all challenge entries and, using just a single CNN,
our algorithm differed in overall score by only 0.02
compared to the top place finisher, which used an
ensemble approach.
1
PhysioNet [Goldberger et al., 2000] has held a Computing in Cardiology Challenge since 2000 that requires participants to automatically analyze physiologic time series data.
The 2016 challenge [Clifford et al., 2016] asked participants
to perform automated analysis of phonocardiogram (PCG)
waveforms, i.e. heart sound data collected using digital
stethoscopes. The objective of the challenge was to accurately classify normal and abnormal heart sounds. Recordings were collected from both healthy individuals, as well as
those with heart disease, including heart valve disease and
coronary artery disease. A PCG plot showing the recording
of the (normal) sounds made by the heart is given in Figure 1.
Introduction
Advances in deep learning [LeCun et al., 2015] are being made at a rapid pace, in part due to challenges such
as ILSVRC – the ImageNet Large-Scale Visual Recognition
Challenge [Russakovsky et al., 2015]. Successive improvements in deep neural network architectures have resulted in
computer vision systems that are better able to recognize and
classify objects in images [Lin et al., 2013; Szegedy et al.,
2015] and winning ILSVRC entries [Szegedy et al., 2014;
He et al., 2015]. While a large focus of deep learning has
been on automated analysis of image and text data, advances
are also increasingly being seen in areas that require processing other input modalities. One such area is the medical domain where inputs into a deep learning system could be physiologic time series data. An increasing number of large scale
challenges in the medical domain, such as [Kaggle, 2014] and
[Kaggle, 2015] have also resulted in improvements to deep
learning architectures [Liang and Hu, 2015].
Figure 1: A phonocardiogram showing the recording of normal heart sounds, together with corresponding electrocardiogram tracing. S1 is the first heart sound and marks the beginning of systole. Source [Springer et al., 2016].
Heart disease remains the leading cause of death globally,
resulting in more people dying every year due to cardiovascular disease compared to any other cause of death [World
Health Organization, 2017]. Successful automated PCG analysis can serve as a useful diagnostic tool to help determine
whether an individual should be referred on for expert diagnosis, particularly in areas where access to clinicians and
medical care is limited.
In this work, we present an algorithm that accepts PCG
waveforms as input and uses a deep convolutional neural network architecture to classify inputs as either normal or abnor-
mal using the following steps:
1. Segmentation of time series A logistic regression hidden
semi-Markov model is used to segment incoming heart
sound instances into shorter segments beginning at the
start of each heartbeat, i.e. the S1 heart sound.
2. Transformation of segments into heat maps Using
Mel-frequency cepstral coefficients, one dimensional
time series input segments are converted into twodimensional spectrograms (heat maps) that capture the
time-frequency distribution of signal energy.
3. Classification of heat maps using a deep neural network
A convolutional neural network is trained to perform
automatic feature extraction and distinguish between
normal and abnormal heat maps.
The contributions of this work are as follows:
1. We introduce a deep convolutional neural network architecture designed to automatically analyze physiologic
time series data for the purposes of identifying abnormalities in heart sounds.
2. Given the cost-sensitive nature of misclassification, we
describe a novel loss function used to train the above
network that directly optimizes the sensitivity and specificity trade-off.
3. We present results from the 2016 PhysioNet Computing
in Cardiology Challenge where we evaluated our algorithm and achieved a Top 10 place finish out of 48 teams
who submitted a total of 348 entries.
The remainder of this paper is organized as follows. In
Section 2, we discuss related works, including historical approaches to automated heart sound analysis and deep learning
approaches that process physiologic time series input data.
Section 3 introduces our approach and details each step of
the algorithm. Section 4 further describes the modified costsensitive loss function used to trade-off the sensitivity and
specificity of the network’s predictions, followed by Section
5, which details the network training decisions and parameters. Section 6 presents results from the 2016 PhysioNet
Computing in Cardiology Challenge and in Section 7 we provide a final discussion and end with conclusions in Section
8.
2
Related Work
Before the 2016 PhysioNet Computing in Cardiology Challenge there were no existing approaches (to the authors’
knowledge) that applied the tools and techniques of “deep
learning” to the automated analysis of heart sounds [Liu et
al., 2016]. Previous approaches relied upon a combination of
feature extraction routines input into classic supervised machine learning classifiers. Features extracted from heart cycles in the time and frequency domains, as well as wavelet
features, time-frequency and complexity-based features were
input into artificial neural networks [De Vos and Blanckenberg, 2007; Uğuz, 2012a; Uğuz, 2012b; Sepehri et al., 2008;
Bhatikar et al., 2005] and support vector machines [Maglogiannis et al., 2009; Ari et al., 2010; Zheng et al., 2015]
for classification. Previous works have also employed Hidden Markov Models for both segmenting PCG signals into
the fundamental heart sounds [Springer et al., 2014; Springer
et al., 2016], as well as classifying normal and abnormal instances [Wang et al., 2007; Saraçoglu, 2012].
While there have been many previous efforts applied to automated heart sound analysis, gauging the success of historical approaches has been somewhat difficult, due to differences in dataset quality, number of recordings available for
training and testing algorithms, recorded signal lengths and
the environment in which data was collected (e.g. clinical vs.
non-clinical settings). Moreover, some existing works have
not performed appropriate train-test data splits and have reported results on training or validation data, which is highly
likely to produce optimistic results due to overfitting [Liu et
al., 2016]. In this work, we report results from the 2016 PhysioNet Computing in Cardiology Challenge, which evaluated
entries on a large hidden test-set that was not made publicly
available. To reduce overfitting, no recordings from the same
subject were included in both the training and the test set and
a variety of both clean and noisy PCG recordings, which exhibited very poor signal quality, were included to encourage
the development of accurate and robust algorithms.
The work presented in this paper, is one of the first attempts at applying deep learning to the task of heart sound
data analysis. However, there have been recent efforts to apply deep learning approaches to other types of physiological
time series analysis tasks. An early work that applied deep
learning to the domain of psychophysiology is described in
[Martı́nez et al., 2013]. They advocate the use of preference
deep learning for recognizing affect from physiological inputs such as skin conductance and blood volume pulse within
a game-based user study. The authors argue against the use
of manual ad-hoc feature extraction and selection in affective
modeling, as this limits the creativity of attribute design to the
researcher. One difference between the work of [Martı́nez et
al., 2013] and ours is that they perform an initial unsupervised pre-training step using stacked convolutional denoising
auto-encoders, whereas our network does not require this step
and is instead trained in a supervised fashion end-to-end.
Similar deep learning efforts that process physiologic time
series have also been applied to the problems of epileptic
seizure prediction [Mirowski et al., 2008] and human activity
recognition [Hammerla et al., 2016].
3
Approach
Recall from Section 1 that our approach consists of three general steps: segmentation, transformation and classification.
Each is described in detail below.
3.1
Segmentation of time series
The main goal of segmentation is to ensure that incoming
time series inputs are appropriately aligned before attempting
to perform classification. We first segment the incoming heart
sound instances into shorter segments and locate the beginning of each heartbeat, i.e. the S1 heart sound. A logistic regression hidden semi-Markov model [Springer et al., 2016] is
used to predict the most likely sequence of heart sound states
Figure 2: MFCC heat map visualization of a 3-second segment of heart sound data. Sliding windows, i, are represented on
the horizontal axis and filterbank frequencies, j, are stacked along the inverted y-axis. MFCC energy information, ci,j is
represented by pixel color in the spectrograms. Also shown are the original one-dimensional PCG waveforms that produced
each heat map.
(S1 → Systole → S2 → Diastole) by incorporating information about expected state durations.
Once the S1 heart sound has been identified, a time segment of length, T , is extracted. Segment extraction can either
be overlapping or non-overlapping. Our final model used a
segment length of, T = 3 seconds, and we chose to use overlapping segments as this led to performance improvements
during initial training and validation.
3.2
Transformation of segments into heat maps
Each segment is transformed from a one-dimensional time
series signal into a two-dimensional heat map that captures
the time-frequency distribution of signal energy. We chose
to use Mel Frequency Cepstral Coefficents [Davis and Mermelstein, 1980] to perform this transformation, as MFCCs
capture features from audio data that more closely resembles
how human beings perceive loudness and pitch. MFCCs are
commonly used as a feature type in automatic speech recognition [Godino-Llorente and Gomez-Vilda, 2004].
We apply the following steps to achieve the transformation:
log transformation as sound volume is not perceived on
a linear scale.
c∗i,j = log(
ci,j =
k
(1)
n=1
where k ∈ [1, K], K is the length of the DFT and h(n)
is a hamming window of length N . The power spectral
estimate for window, i, is then given by (2).
Pi (k) =
1
|Si (k)|2
N
(2)
3. Apply a filterbank of, j ∈ [1, J], triangular band-pass
filters, dj,1...K , to the power spectral estimates, Pi (k),
and sum the energies in each filter together. Include a
J
X
j=1
c∗i,j cos
h k(2i − 1)π i
,k = 1...J
2J
(4)
The result is a collection ofcepstral
coefficients, ci,j for
T
window, i. For i = 1 . . . ∆
, ci,j can be stacked together to give a time-frequency heat map that captures
changes in signal energy over heart sound segments.
Figure 2 illustrates two example heat maps (one derived
from a normal heart sound input and the other from an
abnormal input), where ci,j is the MFCC value (represented by color) at location, i, on the horizontal axis and,
j, on the (inverted) vertical axis.
3.3
si (n)h(n)ei2πn `ν
(3)
We used a filterbank consisting of J = 26 filters,
where frequency ranges were derived using the Mel
scale that maps actual measured frequencies, f , to values
that better match how humans perceive pitch, M (f ) =
f
1125 ln(1 + 700
).
4. Finally, apply a Discrete Cosine Transform to decorrelate the log filterbank energies, which are correlated due
to overlapping windows in the Mel filterbank.
2. Compute the Discrete Fourier transform for each window.
Si (k) =
dj,k Pi (k))
k=1
1. Given an input segment of length, T , and sampling rate,
ν, select a window length, `, and step size, ∆, and extract
overlapping sliding windows, si (n),
from the input time
T
series segment, where i ∈ [1, ∆
] is the window index
and n ∈ [1, `ν] is the sample index. We chose a window
length of 0.025 seconds and a step size of 0.01 seconds.
`ν
X
K
X
Classification of heat maps using a deep neural
network
The result of transforming the original one-dimensional timeseries into a two-dimensional time-frequency representation
is that now each heart sound segment can be processed as an
image, where energy values over time can be visualized as a
heat map (see Figure 2). Convolutional neural networks are a
natural choice for training image classifiers, given their ability to automatically learn appropriate convolutional filters.
Therefore, we chose to train a convolutional neural network
architecture using heat maps as inputs.
Decisions about the number of filters to apply and their
sizes, as well as how many layers and their types to include
in the network were made by a combination of initial manual
Figure 3: Convolutional neural network architecture for predicting normal versus abnormal heart sounds using MFCC heat
maps as input
exploration by the authors, followed by employing a random
search over a limited range of network architecture parameters. Figure 3 depicts the network architecture of a convolutional neural network that accepts as input a single channel
6x300 MFCC heat map and outputs a binary classification,
predicting whether the input segment represents a normal or
abnormal heart sound.
The first convolutional layer learns 64 2x20 kernels, using
same-padding. This is followed by applying a 1x20 maxpooling filter, using a horizontal stride of 5, which has the
effect of reducing each of the 64 feature maps to a dimension
of 6x60. A second convolutional layer applies 64 2x10 kernels over the previous layer, once again using same padding.
This is again followed by a max-pooling operation using a filter size of 1x4 and a stride of 2, further reducing each feature
map to a dimension of 6x30. At this stage in the architecture a flattening operation is applied that unrolls each of the
64 6x30 feature maps into a single dimensional vector of size
11,520. This feature vector is fed into a first fully connected
layer consisting of 1024 hidden units, followed by a second
layer of 512 hidden units and finally a binary classification
output.
4
Sensitivity-Specificity Loss Trade-off
The loss function of the network was altered from a standard
softmax cross entropy loss function to instead directly tradeoff between sensitivity and specificity.
Given unnormalized log-probabilities, y = W x + b, from
a classifier consisting of weight matrix, W , and bias b. The
softmax function:
s(y (1) )
s(y (2) )
..
.
Y =
e
s(yi ) = P
eyj
(5)
j
gives probability predictions P (yi |x; W, b) for the class at index, i, for input x.
Consider,
y ∗(1)
y ∗(2)
..
.
∗
,Y =
y ∗(n)
s(y (n) )
(j)
where s(yi ), refers to the ith entry of row j and Y ∗ is the
corresponding one hot encoded matrix of actual class labels.
For the binary class labels of normal (y0∗ ) and abnormal
∗
(y1 ), we define the mask matrices, YN n and YAa , where entries within each matrix are softmax prediction values extracted ∀s(y(j) )∈Y , as follows:
YN n
(j)
∗(j)
s(y0 ), where y0 = 1 and
arg max {s(y (j) )} = arg max{y ∗(j) }
=
0,
otherwise
YAa
(j)
∗(j)
s(y1 ), where y1 = 1 and
arg max {s(y (j) )} = arg max{y ∗(j) }
=
0,
otherwise
We then define softmax sensitivity, Se , and specificity, Sp ,
as follows:
Se =
yi
X Y (j)
Aa
,
∗(j)
j
YAa
Sp =
X Y (j)
Nn
∗(j)
j
(6)
YN n
The final loss function we wish to minimize is given in (7).
LSeSp = −(Se + Sp ) + λR(W )
(7)
where λR(W ) is a regularization parameter and routine, respectively.
Hyper-parameters
Learning rate
Beta
Dropout
Network parameters
Regularization Type
Batch Size
Weight Update
Value
0.00015822
0.000076253698849
0.85565561
Value
L2
256
Adam Optimization
Table 1: Listing of hyper-parameters and selected network
parameters. Hyper-parameters were learned over the network
architecture described in Section 3.3, using random search
over a restricted parameter space.
5
Network Training
L2 regularization was computed for each of the fully connected layers’ weight and bias matrices and applied to the loss
function. Dropout was applied within both fully connected
layers. Table 1 shows the values of hyper-parameters chosen by performing a random search through parameter space,
as well as a list of other network training choices, including
weight updates and use of regularization. Adam optimization
[Kingma and Ba, 2014] was used to perform weight updates.
Models were trained on a single NVIDIA GPU with between
4 – 6 GB of memory. A mini-batch size of 256 was selected
to satisfy the memory constraints of the GPU.
5.1
Given that each model was trained on 3-second MFCC heat
map segments, it was necessary to stitch together a collection
of predictions to classify a single full instance. The simple
strategy of averaging each class’s prediction probability was
employed and the class with the greatest probability was selected as the final prediction.
6
Equations (8) and (9) show the modified sensitivity and specificity scoring metrics that were used to assess the submitted entries to the 2016 PhysioNet Computing in Cardiology
Challenge [Clifford et al., 2016]. Uppercase symbols reflect
the true class label, which could either be (A)bnormal, or
(N )ormal. Lowercase symbols refer to a classifier’s predicted
output where, once again, a is abnormal, n is normal and q
is a prediction of unsure. A subscript of 1 (e.g. Aa1 , N a1 )
refers to heart sound instances that were considered good signal quality by the challenge organizers and a subscript of 2
(e.g. An2 , N n2 ) refers to heart sound instances that were
considered poor signal quality by challenge organizers. Finally, the weights used to calculate sensitivity, wa1 and wa2 ,
capture the percentages of good signal quality and poor signal
quality recordings in all abnormal recordings. Correspondingly for specificity, the weights wn1 and wn2 are the proportion of good signal quality and poor signal quality recordings
in all normal recordings. Overall, scores are given by Se+Sp
.
2
Training/Validation/Test Datasets
The overall dataset used within the PhysioNet Computing in
Cardiology Challenge was provided by the challenge organizers and consisted of eight heart sound databases collected
from seven countries over a period of more than a decade
[Clifford et al., 2016]. In total 4,430 recordings were taken
from 1,072 subjects, resulting in 30 hours of heart sound
recordings. From this total dataset, 1,277 heart sound recordings from 308 subjects were removed to be used as heldout test data for evaluating challenge submissions. The test
dataset was not made publicly available and challengers were
only allowed to make 15 submissions, in total, to the challenge server to evaluate their models on a small 20% subset
of the hidden dataset, before final results were computed. The
number of allowed submissions was limited to avoid the issue of participants implicitly overfitting their models on the
hidden test dataset.
From the 3153 publicly available PCG waveforms supplied
by the challenge organizers, the authors set aside a further
301 instances to be used as a local held-out test-set to gauge
model performance before making a submission to the challenge server. The remaining instances were used to train initial models. Models were trained on the overlapping 3-second
MFCC segments extracted from the remaining 2852 PCG
waveforms. This resulted in approximately 90,000 MFCC
heat maps, which were split into a training (∼ 75, 000 instances) and validation set (∼ 15, 000 instances). This training and validation set was unbalanced, consisting of approximately 80% normal segments and 20% abnormal segments.
Training was performed on the unbalanced dataset and no attempt was made to compensate for this class imbalance.
Results
Se =
Sp =
wa1 · Aa1
wa2 · (Aa2 + Aq2 )
+
,
Aa1 + Aq1 + An1
Aa2 + Aq2 + An2
(8)
wn1 · N n1
wn2 · (N n2 + N q2 )
+
N a1 + N q1 + N n1
N a2 + N q2 + N n2
(9)
Table 2 shows a selected subset of the results for the 2016
PhysioNet Computing in Cardiology Challenge. For each
selected entry, sensitivity, specificity and overall scores are
shown, as well as the entry’s final ranking and a brief description of its approach. In total, 348 entries were submitted by
48 teams. Our entry, as described by the algorithm presented
in this paper, was ranked 8th with a sensitivity of 0.7278 and
specificity of 0.9521, giving an overall score of 0.8399. The
top entry to the competition achieved sensitivity of 0.9424,
specificity of 0.7781 for an overall score of 0.8602. Also
included in Table 2 is the result of a benchmark entry that
was supplied by the challenge organizers, which ranked 43rd
overall, with a sensitivity of 0.6545 and specificity of 0.7569,
for an overall score of 0.7057.
7
Discussion
Table 2 shows that the overall scores for the top entries to
the PhysioNet Computing in Cardiology challenge were very
close. In particular, our entry, which achieved an 8th place
ranking, had a difference in score of only 0.02, compared
to the top place finisher. For our entry, the overall score
of 0.8399 was achieved using a single convolutional neural
network, whereas other top place finishers achieved strong
classification accuracies using an ensemble of classifiers. Improvements in performance have often been witnessed using
Rank
1
2
3
4
5
6
7
8
9
10
43
48
Sensitivity
0.9424
0.8691
0.8743
0.8639
0.8848
0.8063
0.7696
0.7278
0.8691
0.7696
0.6545
0.8063
Specificity
0.7781
0.849
0.8297
0.8269
0.8048
0.8766
0.9125
0.9521
0.7873
0.8831
0.7569
0.2643
Overall
0.8602
0.859
0.852
0.8454
0.8448
0.8415
0.8411
0.8399
0.8282
0.8263
0.7057
0.5353
Description
AdaBoost & CNN
Ensemble of SVMs
Regularized Neural Networks
MFCCs, Wavelets, Tensors & kNN
Random Forest + LogitBoost
Unofficial entry
Probability-distribution based
Our Approach (see Section 3)
Approach Unknown
Approach Unknown
Provided Benchmark Entry
Approach Unknown
Table 2: Selected results from the 2016 PhysioNet Computing in Cardiology Challenge
an ensemble of networks or separate classifiers and we leave
this for future work/improvement. For practical purposes, a
diagnostic tool that relies on only a single network, as opposed to a large ensemble, has the advantage of limiting the
amount of computational resources required for classification. Deployment of such a diagnostic tool on platforms that
impose restricted computational budgets, e.g mobile-based,
could perhaps benefit from such a trade-off between accuracy
and computational cost.
Another point of interest is that our entry to the PhysioNet
Computing in Cardiology challenge achieved the greatest
specificity score (0.9521) out of all challenge entries. However, the network architecture produced a lower sensitivity
score (0.7278). Once again, considering the practical result
of deploying a diagnostic tool that relied upon our algorithm,
this would likely result in a system with few false positives,
but at the expense of misclassifying some abnormal instances.
Final decisions about the trade-off between sensitivity and
specificity would require further consideration of the exact
conditions and context of the deployment environment.
A final point of discussion and area of future improvement
is that the approach presented was limited to binary decision
outputs, i.e. either normal or abnormal heart sounds. An
architecture that also considered signal quality as an output
would likely result in performance improvement.
8
Conclusion
The work presented here is one of the first to apply deep
convolutional neural networks to the task of automated heart
sound classification for recognizing normal and abnormal
heart sounds. We have presented a novel algorithm that combines a CNN architecture with MFCC heat maps that capture
the time-frequency distribution of signal energy. The network
was trained to automatically distinguish between normal and
abnormal heat map inputs and it was designed to optimize
a loss function that directly considers the trade-off between
sensitivity and specificity. We evaluated the approach by
submitting our algorithm as an entry to the 2016 PhysioNet
Computing in Cardiology Challenge. The challenge required
the creation of accurate and robust algorithms that could deal
with heart sounds that exhibit very poor signal quality. Overall, our entry to the challenge achieved a Top-10 place finish
out of 48 teams who submitted 348 entries. Moreover, using just a single CNN, our algorithm differed by a score of at
most 0.02 compared to other top place finishers, all of which
used an ensemble approach of some kind.
References
[Ari et al., 2010] Samit Ari, Koushik Hembram, and
Goutam Saha. Detection of cardiac abnormality from pcg
signal using lms based least square svm classifier. Expert
Systems with Applications, 37(12):8019–8026, 2010.
[Bhatikar et al., 2005] Sanjay R Bhatikar, Curt DeGroff, and
Roop L Mahajan. A classifier based on the artificial neural network approach for cardiologic auscultation in pediatrics. Artificial intelligence in medicine, 33(3):251–260,
2005.
[Clifford et al., 2016] Gari D Clifford, CY Liu, Benjamin
Moody, David Springer, Ikaro Silva, Qiao Li, and Roger G
Mark. Classification of normal/abnormal heart sound
recordings: the physionet/computing in cardiology challenge 2016. Computing in Cardiology, pages 609–12,
2016.
[Davis and Mermelstein, 1980] Steven Davis and Paul Mermelstein. Comparison of parametric representations for
monosyllabic word recognition in continuously spoken
sentences. IEEE transactions on acoustics, speech, and
signal processing, 28(4):357–366, 1980.
[De Vos and Blanckenberg, 2007] Jacques P De Vos and
Mike M Blanckenberg. Automated pediatric cardiac auscultation. IEEE Transactions on Biomedical Engineering,
54(2):244–252, 2007.
[Godino-Llorente and Gomez-Vilda, 2004] Juan
Ignacio
Godino-Llorente and P Gomez-Vilda. Automatic detection of voice impairments by means of short-term cepstral
parameters and neural network based detectors. IEEE
Transactions on Biomedical Engineering, 51(2):380–384,
2004.
[Goldberger et al., 2000] A. L. Goldberger, L. A. N. Amaral, L. Glass, J. M. Hausdorff, P. Ch. Ivanov, R. G. Mark,
J. E. Mietus, G. B. Moody, C.-K. Peng, and H. E. Stanley.
PhysioBank, PhysioToolkit, and PhysioNet: Components
of a new research resource for complex physiologic signals. Circulation, 101(23):e215–e220, 2000.
[Hammerla et al., 2016] Nils Y. Hammerla, Shane Halloran,
and Thomas Plötz. Deep, convolutional, and recurrent
models for human activity recognition using wearables.
In Subbarao Kambhampati, editor, Proceedings of the
Twenty-Fifth International Joint Conference on Artificial
Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July
2016, pages 1533–1540. IJCAI/AAAI Press, 2016.
[He et al., 2015] Kaiming He, Xiangyu Zhang, Shaoqing
Ren, and Jian Sun. Deep residual learning for image recognition. CoRR, abs/1512.03385, 2015.
[Kaggle, 2014] Kaggle. American epilepsy society seizure
prediction challenge. https://www.kaggle.com/
c/seizure-prediction, 2014. [Online; accessed
22-December-2016].
[Kaggle, 2015] Kaggle.
Grasp-and-Lift EEG Detection.
https://www.kaggle.com/c/
grasp-and-lift-eeg-detection, 2015. [Online; accessed 22-December-2016].
[Kingma and Ba, 2014] Diederik P. Kingma and Jimmy Ba.
Adam: A method for stochastic optimization. CoRR,
abs/1412.6980, 2014.
[LeCun et al., 2015] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–
444, 2015.
[Liang and Hu, 2015] Ming Liang and Xiaolin Hu. Recurrent convolutional neural network for object recognition. In IEEE Conference on Computer Vision and Pattern
Recognition, CVPR 2015, Boston, MA, USA, June 7-12,
2015, pages 3367–3375. IEEE Computer Society, 2015.
[Lin et al., 2013] Min Lin, Qiang Chen, and Shuicheng Yan.
Network in network. CoRR, abs/1312.4400, 2013.
[Liu et al., 2016] Chengyu Liu, David Springer, Qiao Li,
Benjamin Moody, Ricardo Abad Juan, Francisco J Chorro,
Francisco Castells, José Millet Roig, Ikaro Silva, Alistair EW Johnson, et al. An open access database for the
evaluation of heart sound algorithms. Physiological Measurement, 37(12):2181, 2016.
[Maglogiannis et al., 2009] Ilias Maglogiannis, Euripidis
Loukis, Elias Zafiropoulos, and Antonis Stasis. Support
vectors machine-based identification of heart valve diseases using heart sounds. Computer methods and programs in biomedicine, 95(1):47–61, 2009.
[Martı́nez et al., 2013] Héctor Perez Martı́nez, Yoshua Bengio, and Georgios N. Yannakakis. Learning deep physiological models of affect. IEEE Comp. Int. Mag., 8(2):20–
33, 2013.
[Mirowski et al., 2008] Piotr W Mirowski, Yann LeCun,
Deepak Madhavan, and Ruben Kuzniecky. Comparing
svm and convolutional networks for epileptic seizure prediction from intracranial eeg. In 2008 IEEE Workshop on
Machine Learning for Signal Processing, pages 244–249.
IEEE, 2008.
[Russakovsky et al., 2015] Olga Russakovsky, Jia Deng,
Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma,
Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael
Bernstein, Alexander C. Berg, and Li Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–
252, 2015.
[Saraçoglu, 2012] Ridvan Saraçoglu. Hidden markov modelbased classification of heart valve disease with PCA for
dimension reduction. Eng. Appl. of AI, 25(7):1523–1528,
2012.
[Sepehri et al., 2008] Amir A Sepehri, Joel Hancq, Thierry
Dutoit, Arash Gharehbaghi, Armen Kocharian, and
A Kiani. Computerized screening of children congenital heart diseases. Computer methods and programs in
biomedicine, 92(2):186–192, 2008.
[Springer et al., 2014] David B Springer, Lionel Tarassenko,
and Gari D Clifford. Support vector machine hidden semimarkov model-based heart sound segmentation. In Computing in Cardiology 2014, pages 625–628. IEEE, 2014.
[Springer et al., 2016] David B Springer, Lionel Tarassenko,
and Gari D Clifford. Logistic regression-hsmm-based
heart sound segmentation. IEEE Transactions on Biomedical Engineering, 63(4):822–832, 2016.
[Szegedy et al., 2014] Christian Szegedy, Wei Liu, Yangqing
Jia, Pierre Sermanet, Scott E. Reed, Dragomir Anguelov,
Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. Going deeper with convolutions. CoRR,
abs/1409.4842, 2014.
[Szegedy et al., 2015] Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew
Wojna. Rethinking the inception architecture for computer
vision. CoRR, abs/1512.00567, 2015.
[Uğuz, 2012a] Harun Uğuz. Adaptive neuro-fuzzy inference system for diagnosis of the heart valve diseases using
wavelet transform with entropy. Neural Computing and
applications, 21(7):1617–1628, 2012.
[Uğuz, 2012b] Harun Uğuz. A biomedical system based on
artificial neural network and principal component analysis
for diagnosis of the heart valve diseases. Journal of medical systems, 36(1):61–72, 2012.
[Wang et al., 2007] Ping Wang, Chu Sing Lim, Sunita
Chauhan, Jong Yong A Foo, and Venkataraman Anantharaman. Phonocardiographic signal analysis method using a modified hidden markov model. Annals of Biomedical Engineering, 35(3):367–374, 2007.
[World Health Organization, 2017] World Health Organization. Cardiovascular diseases (cvds). http://who.
int/mediacentre/factsheets/fs317/en/,
2017. [Online; accessed 01-Febuary-2017].
[Zheng et al., 2015] Yineng Zheng, Xingming Guo, and Xiaorong Ding. A novel hybrid energy fraction and entropybased approach for systolic heart murmurs identification. Expert Systems with Applications, 42(5):2710–2721,
2015.
| 1 |
Shaping Influence and Influencing Shaping: A
Computational Red Teaming Trust-based Swarm
Intelligence Model
Jiangjun Tang1 , Eleni Petraki2 , and Hussein Abbass1
arXiv:1802.09647v1 [cs.AI] 26 Feb 2018
1
University of New South Wales, School of Engineering and Information Technology,
Canberra, ACT 2600, Australia?? .
2
Faculty of Science, Technology, Education, and Mathematics, University of
Canberra Canberra, Australia.
[email protected],[email protected],[email protected]
Abstract. Sociotechnical systems are complex systems, where nonlinear
interaction among different players can obscure causal relationships. The
absence of mechanisms to help us understand how to create a change in
the system makes it hard to manage these systems.
Influencing and shaping are social operators acting on sociotechnical systems to design a change. However, the two operators are usually discussed
in an ad-hoc manner, without proper guiding models and metrics which
assist in adopting these models successfully. Moreover, both social operators rely on accurate understanding of the concept of trust. Without
such understanding, neither of these operators can create the required
level to create a change in a desirable direction.
In this paper, we define these concepts in a concise manner suitable for
modelling the concepts and understanding their dynamics. We then introduce a model for influencing and shaping and use Computational Red
Teaming principles to design and demonstrate how this model operates.
We validate the results computationally through a simulation environment to show social influencing and shaping in an artificial society.
Keywords: Influence, Shaping, Trust, Boids
1
Introduction
Recently, computational social scientists are attracted to studying means for
measuring the concepts of influence and shaping. For influence to work is to
exert a form of social power. Servi and Elson [1] introduce a new definition
of influence which they apply to online contexts as ‘the capacity to shift the
patterns of emotion levels expressed by social media users’. They propose that
measuring influence entails identifying shifts in users’ emotion levels followed by
the examination of the extent to which these shifts can be connected with a user.
??
Portions of this work was funded by the Australian Research Council Discovery
Grant number DP140102590.
However, if the process of influence creates shifts in patterns of emotions which
can be detected in the short-term, can a persistent application of influencing
operators create a long-term shift (i.e. shaping)?
Shmueli et.al. [2] discuss computational tools to measure processes for shaping and affecting human behaviour in real life scenarios. Trust was identified as
a means to influence humans in a social system. Moreover, trust was found to
have a significant impact on social persuasion. Trust is a complex psychological
and social concept. A review of the concept can be found in [3].
Larson et.al. [4] are among a few to imply a distinction between influence
and shaping, whereby shaping is perceived to be a change to the organization
or the environment, while influence fosters attitudes, behaviours or decisions of
individuals or groups. However, the majority of the literature follows a tendency
to assume that social influencing would lead to shaping.
In this paper, we aim to distil subtle differences to distinguish between the
two concepts. This distinction is very important for a number of reasons. First,
it examines the validity of the implicit assumption that influencing is a sufficient
condition for shaping. Second, it is important when studying social sciences
using computational models (computational social sciences) to create models
that are not ambiguous about the social and psychological phenomena under
investigation. Third, it is vital to make it explicit that social influencing and
shaping work on different time scales; that is, social influencing is effective in
the short run, while shaping requires time and is more effective in the long run.
We will use a computational red teaming (CRT) model, whereby a red agent
acts on a blue team to influence, shape and sometimes distract the blue team.
The idea of the model should not be seen from a competition or conflict perspective. The model is general, were the red agent can be an agent that promotes a
positive attitude within a team (a servant leader) or a social worker correcting
the social attitude of a gang.
2
Influence, Shaping, and Trust
Influence will be defined in this paper as: an operation which causes a short-term
effect in the attitude or behaviour of an individual, group or an organization.
Shaping, on the other hand, is defined as: an operation which causes a long-term
effect in the attitude or behaviour of an individual, group or an organization.
We use the more accurate term “effect” rather than the term “change” because sometimes social influence and shaping need to operate to maintain the
status quo. If agent A is attempting to influence agent B by changing B’s behaviour, agent C can attempt to counteract agent A’s influence by influencing
B to maintain its behaviour. Therefore, influence does not necessarily require a
change to occur.
In a strict mathematical sense, social influence would change the parameters
of a model, while social shaping would alter the constraint system.
To illustrate the difference, we will use a model, whereby a group of blue
agents attempts to follow a blue leader. A red agent has a self-interest to influence
or shape the blue team. All agents are connected through a network. Each agent,
excluding the blue leader and the red agent, attempts to align their behaviour
with their neighbours (the other agents it is connected to). The blue leader
attempts to reach the blue goal (a position in space). When all agents fully trust
each other, and in the absence of the red agent’s effect, it is expected that the
intention of the blue leader will propagate throughout the network. Over time,
the blue agents will also move towards the blue goal.
The red agent has a different goal. It aligns with the agents it is connected
to, but it also attempts to influence and/or shape them towards its own goal
(or away from the blue’s goal). Social influence by red is represented through
changing red movements; thus, affecting the movements of its neighbours. Social
shaping by red is represented through a network re-wiring mechanism. Connections in a network are the constraints on the network’s topology. By rewiring the
network, the red agent changes the constraints system. We abstract trust to a
scale between -1 and 1, whereby “1” implies maximum trust, while “-1” implies
maximum distrust. We do not differentiate in this paper between distrust and
mistrust. A “0” value is a neutral indicator that is equivalent to not knowing a
person.
3
The Model
An agent-based Boids [5] model is proposed in this paper. All agents are randomly initialized with random headings and locations. Agents are connected
through a network structure that allows information exchange among the agents.
In this setup, the neighborhood is mostly defined by the hamming distance between two agents in the network, while sometimes it will be defined by the
proximity of one agent to another in the physical space. This latter definition is
the classic and default one used in the Boids model. Three Boids rules: cohesion,
alignment, and separation, are still adopted here. However, the first two vectors are sensed by network connections while the separation vector is perceived
through the Euclidean distance in the physical space. Each agent has a trust
factor value which decides how much this agent trusts the information perceived
from others. The first two vectors are scaled using the trust factor before an
agent’s velocity gets updated. An agent 100% trusts the cohesion and alignment
information from its linked neighbours when it has a trust factor of 1. When the
trust factor is -1, the agent totally believe that the information is deliberately
altered to the opposite value, and therefore, the agent reverses the information
it receives.
In the model, there are three types of agents: blue leader (AB ), red agent
(AR ), and blue agent. The blue leader always moves towards a specific location/goal, and attempts to make the other blue agents follow it. The blue agent
is an agent that senses its neighbours through network links for both cohesion
and alignment but by Euclidean distance for separation, and then makes decisions on its new velocity. The red agent is a special agent in the model who
controls the level of noise (η) in the velocity and network connections for influ-
encing and shaping. Many blue agents can exist but there is only a single blue
leader and a single red agent.
Agents form a set A and live in a space (S) defined by a given width (spaceW )
and a given length (spaceL). All agents are connected by a random network. To
establish network connections, a probability (p) is defined. If we have n agents
including one blue leader, one red agent, and n − 2 blue agents, the network
can be denoted as G(n, p). A Goal (G) is a 2-D position that sits at one of the
corners of S. Blue leader always aims to move towards G. The area surrounding
of G is denoted by δ. Once the blue leader enters this area, the position of G
changes. An agent has the following common attributes:
– Position (p), p ∈ S, is a 2-D coordinate.
– Velocity (v) is a 2-D vector representing the agent’s movement (heading and
speed) in a time unit.
– Cohesion Velocity (cohesionV ) of an agent is the velocity calculated based
on the mass of all agents that are connected to this agent.
– Alignment Velocity (alignmentV ) of an agent is the velocity calculated based
on the average velocity of all agents that are connected to this agent.
– Separation Velocity (separationV ) of an agent is the velocity that forces this
agent to keep a certain small distance from its neighbors and is based on the
Euclidean distance.
– Velocity weights:
• Cohesion weight (wc ): a scaler for the cohesion velocity.
• Alignment weight (wa ): a scaler for the alignment velocity.
• Separation weight (ws ): a scaler for the separation velocity.
– Trust factor (τ ) defines how much an agent trusts its connected neighbours.
It has an impact on both the cohesion velocity and alignment velocity but
not on the separation velocity.
All agents except the blue leader attempt moving towards the neighbours’
location guided with the cohesion vector. The cohesion vector,cohesionVi , of an
agent Ai is:
P|N |
j=0 pj
− pi
(1)
cohesionVi =
|N |
where, |N | is the cardinality of the neighbourhood N .
The alignment velocity of an agent with its linked neighbours is:
P|N |
alignmentVi =
j=0
|N |
vj
− vi
(2)
The separation velocity of an agent is calculated using neighbours Nd in the
spatial proximity of other agents as follows:
|Nd |
separationVi = −
X
j=0
(pj − pi )
(3)
The trust factor of a blue agent is updated by the average trust factors of all
its connected neighbours (N ) as below:
P|N |
τi = 0.5 × (τi +
j=0 τj
|N |
)
(4)
The blue leader and red agent’s trust factors are not updated.
The velocity of the blue leader always aims at the goal G at each step and it
is not affected by any other factor. The velocities at time t of all agents except
the blue leader are updated by Equation 5.
v = v + τ × (wc × cohesionV + wa × alignmentV ) + ws × separationV
(5)
where, cohesionV , AlignmentV , and separationV are normalized vectors. The
position at time t of each agent can be updated by:
p = p + vt
(6)
If an agent’s new position is outside the bounds of S, the reflection rule is
applied. According to Equation 5, an agent adjusts its own velocity in compliance
with both cohesionV and alignmentV when it has a positive trust value, and
follows the opposite direction as suggested by cohesionV and alignmentV when
its trust factor is negative. If τ = 0, only the separation vector takes effect on
this agent so that this agent doesn’t anyone.
The red agent introduces heading noise, changes its network structure, or
does both at each time step. The heading noise can be propagated to blue agents
through the connections of the network to cause a deviation in some blue agents’
moving directions. Changes in the network structure may result in long term
effects on blue agents.
At each time step, Red agent updates its own velocity (vRedAgent ) by Equation 5 and then Equation 7 uses a normal distribution (N (0, η)) to generate noise
and add it to Red’s velocity.
vRedAgent = vRedAgent + N (0, η)
(7)
Equation 6 is used to update the red agent’s position.
Furthermore, the red agent has the ability to re-configure network connections by using the noise level η as a probability that governs the eventuality of
the following steps:
1.
2.
3.
4.
Randomly pick up a blue agent (Ai ) who is connected with the red agent.
Randomly pick up another blue agent (Aj ) who is connected with Ai .
Break the connection between Ai and Aj .
Connect the red agent with a randomly chosen blue agent Aj .
In this way, the connection between the red agent and blue agents changes
but the number of edges of the whole network remains as before. The long term
effects of these topological updates are expected because the path along with
information propagates changes and some blue agents may not get consistent
updates from their neighbours.
The blue leader attempts to lead other blue agents towards a given destination, and the red agent attempts to disorient through influence (deliberate
changes in heading) and/or shaping (deliberate re-configuration of network structure). Therefore, the “effect” from our model can be derived as how well the blue
agents follow the blue leader given the influence/shaping by the red agent. A
straightforward measure of this effect within our model is the average distance
between blue agents and the goal when the blue leader reaches the goal. If this
distance is small, blue agents followed the blue leader. If it is large, red agent
distracted the blue agent.
During a single simulation run, the blue leader is tasked to reach the goal
multiple times. Each time it reaches the goal (an iteration), the location of the
goal changes. The effect is measured at the end of each iteration. The overall
effect of a simulation run is the average of all iterations except the first iteration, which is excluded to eliminate the warm-up period in the system resultant
from the random initialisation of agents. In summary, the effect is defined by
Equation 8.
!
n
M
X
1X
1
¯
dm,i
(8)
d=
M m=1 n i=1
where, M is the number of iterations except the first one, n is the number of
blue agents, and dm,i is the distance between agent i and the goal location at
the m’th iteration.
4
Experimental Design
Our aim is to evaluate the “effects” of the short term inference and long term
shaping caused by the red agent. Two stages are used for the experiments. The
first stage focuses on the noise of red agent where the effect from the trust factor
is minimised. The second stage investigates both the trust factor and the red
agent’s noise. The number of blue agents is 25, so there are a total of 27 agents
including a blue leader and a red agent. All agents’ initial locations are uniformly
initialised at random within S, where S is a square space with the dimension of
500×500. All agents’ headings are uniformly initialised at random with constant
speed of 1. All agents except the blue leader have the same velocity weights:
wc = 0.4 for cohesion, wa = 0.4 for alignment, and ws = 0.2 for separation. The
initial trust factor values of all blue agents are uniformly assigned at random
within the range of [−1, 1]. Connections among agents are created by a random
network G(n, 0.1), where n = 27.
In all experiments, two levels of noise (η − = 0.1 and η + = 0.9) are used. In
the first stage, to reduce the effect of the trust factor, it is assumed constant with
a value of 1 for all agents; that is, all blue agents trust any perceived information,
including the information arriving from red. In the second stage, the blue leader
has two trust levels: τB− = 0.2 and τB+ = 1, and the red agent has two levels of
trust: τR− = −0.2 and τR+ = −1.
Three scenarios are designed for investigating the red agent’s impact in our
experiments. In Scenario 1, the red agent introduces noise to its heading at
each time step thus this noise can immediately affect direct neighbours and can
be propagated through the network. In Scenario 2, the red agent changes the
network structure at each time step thus shaping the environment of the blue
agents. In Scenario 3, the red agent introduces noises to its heading and changes
network structures at each time step, so that both influence and shaping take
place in our model.
Using 2k factorial design [6], a total of 2 factor combinations is available at
the first stage and 8 at the second stage. Each combination has three individual
scenarios to study. Moreover, the randomness exists in the initialisation phase,
therefore 10 runs for each factor combination and impact are desired in order to
obtain meaningful results. In summary, there are 60 (3 × 2 × 10) simulation runs
in the first stage and 240 (3 × 8 × 10) runs in the second stage. The results and
analysis are provided in the next section.
5
Results and Discussion
The results from the first stage experiments are presented in Table 1. The dis¯ is listed from the
tance between blue agents and goal location of each run (d)
second column to the eleventh column. And the last three columns of the table
are the averages of 10 runs, the standard deviations and the confidence intervals
that are obtained at α = 0.05.
Table 1: Results of red agent’s noise impact when τB = 1 and τR = 1
R1
R2
η = 0.1 47.64 46.78
η = 0.9 145.90 155.75
eη
98.27 108.97
η = 0.1 45.71 59.28
η = 0.9 61.23 57.63
eη
15.52 -1.65
η = 0.1 45.34 47.09
η = 0.9 213.49 168.69
eη
168.15 121.59
R3
R4
R5
R6
R7
R8
R9
R10
Scenario1: Velocity Noise
39.26 56.63 47.09 67.29 60.65 38.76 42.99 44.86
168.04 199.94 171.94 243.61 162.15 144.08 103.82 117.94
128.78 143.31 124.85 176.33 101.50 105.33 60.83 73.08
Scenario 2: Network Changes
47.39 54.31 58.14 69.65 50.27 44.35 43.90 48.83
56.30 81.25 53.65 74.69 55.76 40.86 47.74 52.03
8.91 26.94 -4.49
5.04
5.49 -3.49
3.85
3.20
Scenario 3: Velocity Noise and Network Changes
65.90 54.05 51.93 84.91 54.66 41.11 43.88 52.21
197.52 188.80 171.62 236.93 174.46 183.98 84.95 122.82
131.62 134.75 119.69 152.02 119.80 142.87 41.07 70.61
Avg STD Conf.
49.19 8.90 6.36
161.32 37.65 26.93
112.12 31.70 22.68
52.18 7.78
58.11 11.36
5.93 9.00
5.56
8.13
6.44
54.11 12.23 8.75
174.32 41.20 29.47
120.22 35.90 25.68
The results show that the more noise the red agent has in its velocity, the more
deviation from the goal observed by the blue agents. Changes in the network
structure can lower blue agents performance, although the magnitude of this
decrease may not be significant. This is expected since the shaping operates
work on a smaller timescale than the influence operator. When both influence
and shaping work together, the effect is more profound than any of the individual
cases in isolation.
Table 2: Results of effects from red agent’s noise impact and trust factors. The
confidence level is at 0.05.
Effect
R1
R2
eτ B
eτ R
eN
-170.40 -146.54
165.32 160.08
1.78 15.84
eτ B
eτ R
eN
-122.99 -165.55
142.72 177.17
42.90
1.75
eτ B
eτ R
eN
-151.65 -140.59
157.63 152.23
2.27 22.60
R3
R4
R5
R6
R7
R8
R9
R10
Scenario 1: Velocity Noise
-83.92 -55.00 -131.83 -6.05 -128.09 -110.66 -184.81 -152.86
95.83 71.21 149.41 8.11 133.20 111.97 167.79 160.23
-9.18 6.22
6.74 3.40 -13.50
0.35 -14.64 -17.58
Scenario 2: Network Changes
-144.34 -64.94 -168.15 -8.09 -154.27 -170.61 -189.59 -187.66
154.10 77.45 186.62 24.03 164.25 172.21 171.13 172.02
12.81 19.08
8.50 -1.08
-0.29 -12.17 25.41 -15.03
Scenario 3: Velocity Noise and Network Changes
-132.44 -35.97 -166.98 -7.63 -159.37 -171.89 -194.38 -163.85
147.97 38.06 176.90 16.03 175.96 163.48 171.95 174.82
15.16 14.70 21.23 4.64
5.73 10.22 20.50
8.15
Avg STD Conf.
-117.02 55.01 39.35
122.31 51.75 37.02
-2.06 11.04 7.90
-137.62 58.31 41.71
144.17 52.25 37.38
8.19 17.62 12.61
-132.47 61.12 43.72
137.50 59.31 42.43
12.52 7.38 5.28
The results from the second stage are summarised in Table 2. Interestingly,
the trust factors of the blue leader and red agent become critical but the red
agent’s noise is not critical. The model responses to the trust factor as expected.
When the blue leader has a higher level of trust, all blue agents follow it better
(smaller effect values can be observed from eτB ). On the other hand, the blue
agents demonstrate disorder behaviours (larger value of eτR ) if red agents have
small negative trust. These situations are found in all three scenarios and the
effects of trust factors are all statistically significant. Although the red agent’s
noise has some effects on blue agents, it is very little and can be ignored when
compared to the effect of the trust factor. Negative trust values taken by the
blue agents counteract the influence generated by both blue and red agents.
The red agent’s noise can have impact on blue agents’ behaviours through
short term influence (velocity) and long term shaping (network structures) if the
effects of trust are low. When the trust factors are high, the situation changes.
Trust has a significant impact on blue agents’ behaviours.
Figure 1 illustrates the agents’ footprints when the red agent impacts velocity,
network structure or both but with minimum trust effects. These footprints are
obtained from the first runs of all three scenarios in the first stage and the results
are listed in the column “R1” of Table 1.
Figure 1a, 1b, and 1c show that the blue leader leads other agents towards
the goal well as being demonstrated by a few congested trajectories. When noise
increases, blue agents’ trajectories are disturbed as shown in Figure 1d. Figure 1e shows that changes in the network structure seem to not generate much
effects on blue agents’ behaviours. However, the blue agents behaviours are more
random when red affects both velocity and network structure. This manifests disorderliness as more scattered blue agents’ footprints can be observed in the last
figure.
Figure 2 shows two examples of agents’ footprints that are affected by trust
with small noise values (η = 0.1). The footprints presented in Figure 2a are
extracted from the first run of the third scenario in the second stage with τB =
0.2 and τR = −1. When the red agent’s trust is -1, the negative effect on blue
500
45
500
55
500
450
40
450
50
450
400
35
45
400
80
70
400
60
40
350
350
350
30
35
300
300
25
250
30
250
40
250
25
20
200
50
300
200
200
30
20
15
150
150
150
15
10
100
5
50
100
200
300
400
500
100
5
100
200
300
400
50
500
100
(b) Scenario 2: η = 0.1
25
450
20
400
20
100
10
0
(a) Scenario 1: η = 0.1
500
10
50
200
300
400
500
0
(c) Scenario 3: η = 0.1
500
55
500
20
450
50
450
18
400
16
350
14
300
12
250
10
200
8
150
6
100
4
45
400
40
350
350
35
15
300
300
30
250
250
25
10
200
200
20
150
150
15
5
100
50
100
10
50
100
200
300
400
500
(d) Scenario 1: η = 0.9
5
100
200
300
400
500
(e) Scenario 2: η = 0.9
2
50
100
200
300
400
500
0
(f) Scenario 3: η = 0.9
Fig. 1: Agents’ footprints under Red agent’s noise (η) impacts on velocity and
network with minimum trust effects (τB = 1 and τR = 1).
agents’ trust is continuously broadcasted throughout the network. Eventually,
all blue agents will have a negative trust value that is close to -1 since the blue
leader doesn’t have much power (τB = 0.2) to compete against the red agent.
This results in all blue agents distrusting each other. In this case, the blue agents
spread out to the boundaries. However, the reflection rule forces them back into
the given space, causing the blue agents to move around the corners after several
time steps as shown in Figure 2a.
The right side of Figure 2 depicts agents’ footprints extracted from the third
scenario in the second stage with τB = 1, τR = −0.2, and η = 0.1. Some
trajectory patterns can be observed from Figure 2b. In this case, the blue leader
has enough power to beat the red agent in terms of trust. All blue agents will
have positive trust that are passed from the blue leader. Although the red agent
has influence on their velocity and connections, the blue agents are still capable
to follow the blue leader to reach the goal locations (corners) as the trajectory
patterns show.
From the above examples and previous results, it can be concluded that trust
has a more significant impact on blue agents behaviours than the effect of noise
caused by the red agent.
6
Conclusion
In this paper, we presented a CRT trust-based model which is an extension of
the classic Boids. The network topologies for situation awareness and a trust
500
500
500
10
450
450
450
9
400
400
400
8
350
350
350
7
300
300
300
6
250
250
250
5
200
200
200
4
150
150
150
3
100
100
100
2
50
1
50
50
100
200
300
400
500
0
(a) τB = 0.2, τR = −1, and η = 0.1
100
200
300
400
500
0
(b) τB = 1, τR = 0.2, and η = 0.1
Fig. 2: Trust effects on agents behaviours with red agent noise level at 0.1 in
Scenario 3.
factor on perceived information are introduced into our model. They provide
the necessary tools to investigate influence and shaping using CRT.
A number of experiments are designed and conducted in order to differentiate
the potential impact from influence and shaping on a system. As the results of
the first experimental stage suggest, short term influence can have an immediate
effect on the system which is easily observed. The long term shaping effects may
not be easily observable although it has effect on the system, especially when
it interacts with influence. However, trust among agents plays a critical role in
the model. Based on our findings in the second experiment, trust dominates the
agents’ behaviours regardless of noise.
Acknowledgement
This is a pre-print of an article published in International Conference in Swarm
Intelligence, Springer, Cham, 2016. The final publication is available at https:
//doi.org/10.1007/978-3-319-41000-5_2.
References
1. Les Servi and Sara Beth Elson. A mathematical approach to gauging influence
by identifying shifts in the emotions of social media users. Computational Social
Systems, IEEE Transactions on, 1(4):180–190, 2014.
2. Erez Shmueli, Vivek K Singh, Bruno Lepri, and Alex Pentland. Sensing, understanding, and shaping social behavior. Computational Social Systems, IEEE Transactions
on, 1(1):22–34, 2014.
3. Eleni Petraki and Hussein Abbass. On trust and influence: A computational red
teaming game theoretic perspective. In Computational Intelligence for Security
and Defense Applications (CISDA), 2014 Seventh IEEE Symposium on, pages 1–7.
IEEE, 2014.
4. Eric V Larson, Richard E Darilek, Daniel Gibran, Brian Nichiporuk, Amy Richardson, Lowell H Schwartz, and Cathryn Q Thurston. Foundations of effective influence
operations: A framework for enhancing army capabilities. Technical report, DTIC
Document, 2009.
5. Craig W Reynolds. Flocks, herds and schools: A distributed behavioral model. In
ACM SIGGRAPH computer graphics, volume 21, pages 25–34. ACM, 1987.
6. Douglas C Montgomery. Design and analysis of experiments. John Wiley & Sons,
2008.
| 2 |
arXiv:1705.03510v1 [math.PR] 9 May 2017
The middle-scale asymptotics of
Wishart matrices
Didier Chételat and Martin T. Wells
Department of Applied Mathematics
and Industrial Engineering
École Polytechnique
Montréal, Québec H3T 1J4
Canada
e-mail: [email protected]
Department of Statistical Science
Cornell University
1198 Comstock Hall
Ithaca, NY 14853-3801
USA
e-mail: [email protected]
Abstract: We study the behavior of a real p-dimensional Wishart random
matrix with n degrees of freedom when n, p Ñ 8 but p{n Ñ 0. We establish
the existence of phase transitions when p grows at the order npK`1q{pK`3q
for every k P N, and derive expressions for approximating densities between
every two phase transitions. To do this, we make use of a novel tool we call
the G-transform of a distribution, which is closely related to the characteristic function. We also derive an extension of the t-distribution to the
real symmetric matrices, which naturally appears as the conjugate distribution to the Wishart under a G-transformation, and show its empirical
spectral distribution obeys a semicircle law when p{n Ñ 0. Finally, we discuss how the phase transitions of the Wishart distribution might originate
from changes in rates of convergence of symmetric t statistics.
MSC 2010 subject classifications: Primary 60B20, 60B10; secondary
60E10.
1. Introduction
The roots of random matrix theory lies in statistics, with the work of Wishart
[1928] and Bartlett [1933], and in numerical analysis, with the work of Von Neumann and Goldstine [1947]. In this early period, many well-known matrix distributions were introduced. This includes the real Gaussian matrix ensemble
Gpp, qq, a p ˆ q matrix with independent standard Gaussian entries, the Gaussian orthogonal
ensemble GOEppq, the distribution of a symmetric matrix pX `
?
X t q{ 2 with X „ Gpp, pq, and the Wishart (also known as Laguerre) distribution Wp pn, Ip {nq, the distribution of a symmetric matrix XX t {n with
X „ Gpp, nq. During that time, the main concern was to derive properties
of these distributions for a fixed dimension. Some asymptotics of the Wishart
distribution were considered, but only as n Ñ 8 for fixed p.
1
Chételat and Wells/Mid-scale Wishart asymptotics
2
Starting with the pioneering work of Wigner [1951, 1955, 1957], Porter and
Rosenzweig [1960], Gaudin [1961] and Mehta [1960a,b], researchers began investigating the asymptotics of Gaussian ensembles as their dimension grew to
infinity. As a result of decades of work, the behavior of a GOEppq matrix is now
well understood both in the classical setting where p is fixed, and in the setting
where p Ñ 8.
However, the situation asymptotics of the Wishart distribution is more complicated, as it depends on two parameters, n and p, and initial progress was slow.
The work of Marchenko and Pastur [1967] clearly established that the analogue
of a Gaussian orthogonal ensemble matrix whose dimension p grows to infinity
is a Wishart matrix whose degrees of freedom n and dimension p jointly grow
to infinity in such a way that p{n Ñ c P p0, 1q. Since then, we gained a very
good understanding of the behavior of Wishart matrices in this regime.
But this body of work left open the question as to what happens to a Wishart
matrix when n, p Ñ 8 with p{n Ñ 0. Since such asymptotics are middle-scale
between the classical regime where p is fixed as n Ñ 8 and the high-dimensional
regime where p{n Ñ c P p0, 1q, we might refer to them as middle-scale regimes.
Hence, we might ask: what is the asymptotic behavior of a Wishart matrix
Wp pn, Ip {nq in the middle-scale regimes? This question is addressed this article.
To gain some intuition, it is instructive to look at the eigenvalues λ1 ą ¨ ¨ ¨ ą
λp ą 0 of a Wp pn, Ip {nq Wishart matrix. In the classical regime where p is
fixed as n Ñ 8, the eigenvalues must all almost surely tend to 1 by the strong
law of large numbers. In constrast, in the high-dimensional regime where both
n, p Ñ 8 with p{n Ñ c P p0, 1q, the Marchenko-Pastur law states that for any
bounded, continuous f ,
a
ż c`
n
pc` ´ lqpc´ ´ lq
1 ÿ
dl
a.s.,
f pλi q Ñ
f plq
n i“1
2πcl
c´
?
where c˘ “ p1 ˘ cq2 . Thus the eigenvalues do not all tend to 1, but rather
distribute themselves in the shape of a Marchenko-Pastur law with parameter
c.
What happens between these two extremes? When c Ñ 0, the MarchenkoPastur law converges weakly to a Dirac measure with mass at 1. This suggests
that whenever n, p Ñ 8 with p{n Ñ 0
n
1 ÿ
f pλi q Ñ f p1q
n i“1
a.s.,
or in other words that the eigenvalues converge almost surely to 1, as in the
classical case.
This motivates a binary view of Wishart asymptotics. It appears that the
behavior of a Wishart matrix in the middle-scale regimes is the same as in
the classical regime, and therefore that there really are only two regimes: lowdimensional where p{n Ñ 0, and high-dimensional where p{n Ñ c P p0, 1q.
This binary view has very concrete repercussions. For example, in statistics,
many covariance matrix estimators have been developed that leverage high-
Chételat and Wells/Mid-scale Wishart asymptotics
3
dimensional Wishart asymptotics (see Pourahmadi [2013] for a review). When
faced with a problem where p is large with respect to n, it has been argued
that the high-dimensional asymptotics, rather than the classical, constitute the
correct model. The binary view provides a useful rule of thumb: small p’s call
for classical covariance estimators, while large p’s call for high-dimensional covariance estimators.
Unfortunately, recent results establish that this binary view is incorrect. In
the classical regime where p is fixed, the central limit theorem implies that
ı
? ”
n Wp pn, Ip {nq ´ Ip ñ GOEppq,
as n Ñ 8, where the arrow stands for weak convergence. In fact, something
better is known: recent work has extended this result to the case where p
tends to infinity. Recall that the total variation distance between two absolutely continuous distributions şF1 and F2 with densities f and g is given by
dTV pF1 , F2 q “ dTV pf1 , f2 q “ |f1 pxq ´ f2 pxq|dx. With different approaches,
Jiang and Li [2015] and Bubeck et al. [2016] independently established that
˙
ˆ ”
ı
?
n Wp pn, Ip {nq ´ Ip , GOEppq Ñ 0
dTV
whenever p3 {n Ñ 0. Thus, when p3 {n Ñ 0, the same asymptotics hold as in the
p fixed case, and we might regard these regimes as rightfully belonging to the
classical setting.
The surprising part is that the converse is true! When p3 {n Û 0, results of
Bubeck et al. [2016] and Rácz and Richey [2016] show that
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , GOEppq Û 0.
?
Thus a phase transition occurs when p is of the order 3 n. This begs the?question:
if a normal approximation fails to hold when p grows faster than 3 n, what
asymptotics hold? Is there a uniform asymptotic behavior that holds whenever
p{n Ñ 0 with p3 {n Û 0, or are there further phase transitions as the growth
rate of p is increased?
The results of this paper offers a mostly complete answer to this question.
Namely, we establish that when p3 {n Û 0 but p2 {n Ñ 0,
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , F1 Ñ 0,
where F1 is a continuous distribution on the space of real symmetric matrices
whose density is given when n ě 3p ´ 3 by
?
ˇ „
"
ˇ
2i
i
i
1
3
4
f1 pXq 9 ˇˇE exp ? tr XZ ´ ? tr Z `
tr Z ` 3{2 tr Z 5
4n
5n
8
3 2n
?
*ˇ2
ˇ
1
ipp ` 1q
p`1
4 2ipp ` 1q
6
2
3
ˇ ,
´ 2 tr Z ` ?
tr Z ´
tr Z ´
tr Z
(1.1)
ˇ
3{2
3n
4n
3n
2 2n
Chételat and Wells/Mid-scale Wishart asymptotics
4
Fig 1. Correct picture of Wishart asymptotics. This contrasts with the binary view, where no
phase transitions occur between p held constant and p growing like n.
?
for a Z „ GOEppq. When p grows like n, another phase transition occurs.
Namely, we establish that when p2 {n Û 0 but p5{3 {n Ñ 0,
˙
ˆ ”
ı
?
n Wp pn, Ip {nq ´ Ip , F2 Ñ 0,
dTV
where F2 is a continuous distribution on the space of real symmetric matrices
whose density is given when n ě 3p ´ 3 by
?
ˇ „
"
ˇ
i
i
1
2i
3
4
ˇ
f2 pXq 9 ˇE exp ? tr XZ ´ ? tr Z `
tr Z ` 3{2 tr Z 5
4n
5n
8
3 2n
?
?
ipp`1q
1
2 2i
p`1
4 2ipp`1q
7
6
2
tr Z 3
´ 2 tr Z ´ 5{2 tr Z ` ?
tr Z ´
tr Z ´
3n
4n
7n
3n3{2
2 2n
*ˇ2
ˇ
p`1
1024pp`1q
512pp`1q
5
4
6
ˇ ,
`
tr
Z
´
tr
Z
`
i
tr
Z
(1.2)
ˇ
4n2
3n3
5n5{2
again for a Z „ GOEppq.
In general, for every K P N we find a continuous distribution FK on the space
of real symmetric matrices, with density given when n ě 3p ´ 3 by
2K`3`
1rK
odds
ˇ «
#
ÿ
ˇ
´ 2 ¯ k2 tr Z k
i
n
ˇ
fK pXq 9 ˇE exp ? trpXZq `
ik
ˇ
4
n
k
8
k“3
2K`2´
1rK odds
p `1
`
4
ÿ
k
i
+ffˇ2
ˇ
ˇ
ˇ
ˇ
k
´ 2 ¯ k2 tr Z k
n
(1.3)
k“1
for a Z „ GOEppq, which approximates the normalized Wishart distribution in
some (but not all) middle-scale regimes. Namely, we prove the following, which
can be regarded as the main result of this paper.
Theorem 1.For any K P N,?the total variation distance between the the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s and the K th degree density
fK satisfies
ˆ ”
˙
ı
?
dTV
n Wp pn, Ip {nq ´ Ip , FK Ñ 0
Chételat and Wells/Mid-scale Wishart asymptotics
5
as n Ñ 8 with pK`3 {nK`1 Ñ 0.
The definition of fK and proof of Theorem 1 are found in Section 6, and
follow from definitions and results from Sections 3, 4 and 5 that constitute the
bulk of this paper.
The main consequence of this theorem is the existence of an infinite countable
number of phase transitions, occurring when p grows like npK`1q{pK`3q for K P
N. A diagram is provided at Figure 1. This naturally groups“ the middle-scale
˘
log p
K
K`1
regimes satisfying lim log
n ă 1 by which semi-open interval K`2 , K`3 their
nÑ8
log p
nÑ8 log n
limit lim
belongs to. We might refer to this grouping as the degree of the
log p
regime. In other words, we will say an middle-scale regime satisfying lim log
n ă
nÑ8
“ K K`1 ˘
log p
1 has degree K when lim log n P K`2 , K`3 .
nÑ8
The main result of this paper, Theorem 1, may then be summarized as saying
that the normalized Wishart distribution can be approximated by the distribution with density fK in every middle-scale regime of degree K or less. The
0th degree case corresponds to the classical setting, while the higher degrees
correspond to previously unknown behavior. In fact, we show that our 0th degree approximation F0 is asymptotically equivalent to the Gaussian orthogonal
ensemble. The results of this paper can therefore be regarded as a wide generalization of the Wishart asymptotics results of Jiang and Li [2015], Bubeck et al.
[2016], Bubeck and Ganguly [2016] and Rácz and Richey [2016].
Our approach relies on a novel technical tool we call the G-transform. It
turns out that to understand middle-scale regime behavior of Wishart matrices,
densities are less clear than characteristic functions (that is, Fourier transforms
of densities). Unfortunately, characteristic functions are difficult to relate to
metrics like the total variation distance. To remedy this problem, we develop
the G-transform and some associated theory in Section 3. An interesting aspect
of G-transform theory is that to every distribution we can associate a closely
related distribution called its G-conjugate. In fact, the G-conjugate of a Wishart
matrix is essentially a generalization of the t distribution to real symmetric
matrices. In Section 4, we define and derive several results concerning this new
distribution, including a semicircle law. From these results, we derive in Section
5 approximations to the Wishart distribution for middle-scale regimes of every
degree. Since these approximations are given using the language of G-transforms,
we derive in Section 6 density approximations, from which Theorem 1 follows.
We briefly discuss what concrete effects the phase transitions might have on
Wishart asymptotics in Section 7. Finally, we compile auxiliary results in Section
8, while we discuss in Section 9 open questions that arise from these results.
Although the results of this paper explain a large part of the behavior of
Wishart matrices when p{n Ñ 0, there exists regimes for which p{n Ñ 0 yet
log p
p R OpnpK`1q{pK`3q q for all K P N, or in other words for which lim log
n “ 1.
nÑ8
?
An example is when p grows at the order n1´1{ log n . Although the results of
our paper characterize almost all middle-scale regimes in the sense that among
log p
log p
those regimes satisfying lim log
n ď 1, those such that lim log n “ 1 represent
nÑ8
nÑ8
Chételat and Wells/Mid-scale Wishart asymptotics
6
a negligible set, they nonetheless exist. One might regard regimes such as those
as having infinite degree. Beyond this, however, it is difficult to say anything
about the behavior of Wishart matrices in these regimes. More work in that
direction is clearly needed.
2. Notation and definitions
The transpose of a matrix is denoted t , and the identity matrix of dimension
p is Ip . As is standard, we take the trace operator to have lower priority than
the power operator: thus for a matrix X, tr X k means the trace of X k . We will
write trk X when we mean the k th power of the trace of X. The Kronecker delta
is the symbol δkl “ 1rk “ ls.
The space of all real-valued symmetric matrices is denoted Sp pRq “ tX P
Mp pRq|X “ X t u. For a symmetric matrix X, we define the symmetric differentiation operator Bs {Bs Xkl by
#
1 B
for k “ l
1 ` δkl B
Bs
kl
“
“ 2 BX
B
Bs Xkl
2 BXkl
for k “ l.
BXkk
This operator has the elegant property that BSBXS kl trpXY q “ Ykl for any two
symmetric matrices X, Y .
The space of symmetric matrices Sp pRq can be assimilated to Rppp`1q{2 by
mapping a symmetric matrix to its upper triangle. By integration over Sp pRq,
we mean integration with respect to the pullback Lebesgue measure under this
isomorphism, that is,
ż
ż
f pXq dX “
Sp pRq
p
` ˘ź
f X
dXij .
Rppp`1q{2 iďj
We say a real symmetric matrix follows the Gaussian orthogonal ensemble
GOEppq distribution if Xkl , k ď l are all independent, with diagonal elements
Xkk „ Np0, 2q and off-diagonal elements Xkl „ Np0, 1q.
Let X be a n ˆ p matrix of i.i.d. Np0, 1q random variables, and let Σ be a
p ˆ p positive-definite matrix. The Wishart distribution Wp pn, Σq is the distri1
1
bution of the random matrix Σ 2 X t XΣ 2 . This is a special case of the matrix
gamma distribution. Following Gupta and Nagar [1999, Section 3.6], we say
a positive-definite matrix X has a matrix gamma distribution Gp pα, Σq with
shape parameter α ą pp ´ 1q{2 and scale parameter Σ if it has density over
Sp pRq given by
!
)
ˇ ˇα´ p`1
1
2
ˇX ˇ
exp ´ trpΣ´1 Xq 1rX ą 0s ,
f pXq “
α
|Σ| Γp pαq
where Γp is the multivariate gamma function. With this definition, the Wishart
distribution Wp pn, Σq is a matrix gamma with shape n2 and scale 2Σ.
While studying the Wishart distribution, the expression n ´ p ´ 1 comes up
so often that it makes sense to give it its own symbol. We will therefore write
m “ n ´ p ´ 1.
Chételat and Wells/Mid-scale Wishart asymptotics
7
The Hellinger distance is metric between absolutely continuous probability measures. For two distributions F1 and F2 with densities f1 and f2 , their
Hellinger distance is defined as
ˇ2 ¯ 12
´ż ˇ
ˇ
ˇ 1{2
1{2
HpF1 , F2 q “ Hpf1 , f2 q “
ˇf1 pxq ´ f2 pxqˇ dx .
The Hellinger distance is closely related to the total variation distance by the
inequalities
1
1{2
dTV pf1 , f2 q ď Hpf1 , f2 q ď dTV pf1 , f2 q.
(2.1)
2
In particular, Hpf1 , f2 q Ñ 0 if and only if dTV pf1 , f2 q Ñ 0. Thus they can
be seen as inducing the same topology on absolutely continuous probability
measures, called the strong topology, in contrast to the topology induced by
weak convergence of measures called the weak topology. One can show that if a
sequence of measures converges in the strong sense (i.e. in the dTV or H metrics),
then it converges weakly.
3. G-transforms
Our analysis of Wishart matrices relies heavily on a tool we call the G-transform
of a probability measure. To do so, we first need to define the Fourier transform
over symmetric matrices.
In Section 2, we clarified what we meant by integration over Sp pRq. For a
function f : Sp pRq Ñ C in L1 pSp pRqq, we define its Fourier transform to be
ż
Ftf upT q “
1
p
22 π
ppp`1q
4
e´i trpT Xq f pXq dX.
(3.1)
Sp pRq
It is more common to define
the Fourier
transform on symmetric(matrices with
(
ř
the integrand exp ´ i kďl Tkl Xkl , but choosing exp i trpT Xq considerably
simplifies our computations.
We extend this definition to f P Lr pSp pRqq, 1 ă r ď 2 in the usual manner. Because of the specific normalization chosen, this definition obeys a simple
version of Plancherel’s theorem, namely
ż
ż
f pXqs
g pXq dX “
Sp pRq
Ę q dT.
Ftf upT qFtgupT
Sp pRq
We now define the G-transform. In itself, the definition has nothing to do
with symmetric matrices and could have been perfectly well defined on any
other space endowed with a Fourier transform.
Definition 1 (G-transform of a density). Let f be an integrable function
Sp pRq Ñ C. Its G-transform is the complex-valued function Gtf u : Sp pRq Ñ C
defined by
Gtf u “ Ftf 1{2 u2 ,
where z 1{2 stands for the principal branch of the complex logarithm.
(3.2)
Chételat and Wells/Mid-scale Wishart asymptotics
8
In the same way that the Fourier transform maps L2 pSp pRqq to itself, the
G-transform maps L1 pSp pRqq to itself.
By extension, for an absolutely continuous distribution on Sp pRq with density
f , we will define its G-transform to be the G-transform of its density. (This
usage mirrors other transforms, such as the Stietjes transform.) We will usually
denote the G-transform of f by ψ. Since a density is integrable, this is always
well-defined. Moreover, f “ F ´1 tψ 1{2 u2 , so the density can be recovered from
the G-transform, and therefore to understand a distribution it is equivalent to
study its density or its G-transform.
Two comments are in order. First, for many densities, f 1{2 P L1 pSp pRqq. In
this case, the G-transform can be written explicitly as
ż
ˆ
˙2
1
´i trpT Xq 1{2
(3.3)
e
f pXq dX .
ψpT q “ Gtf upT q “
ppp`1q
2p π 2
Sp pRq
Second, throughout this article we will often talk about “the” square root of a
G-transform. To be clear, by ψ 1{2 we will always mean Ftf 1{2 u.
Now, in many ways, the G-transform behaves similarly to the characteristic
function (Fourier transform of a density), but it has unique features. First,
Plancherel’s theorem yields that
ż
ż
|ψ 1{2 pT q|2 dT
|ψpT q| dT “
Sp pRq
żS pRq
p
ż
|f 1{2 pXq|2 dX “
“
Sp pRq
|f pXq| dX “ 1.
(3.4)
Sp pRq
Thus |ψ| is itself a density, which we will call the G-conjugate of f . (In particular, ψ 1{2 is much like a quantum-mechanical wavefunction.) We will also
use an asterisk notation, so that the G-conjugate of a Np0, 1q distribution
will be denoted Np0, 1q˚ . For example, straightforward computations yield that
2
2
?1
Np0, 1q˚ “ Np0, 1{8q, χ2˚
n “ 8n tn{2 (where χν and tν are the univariate χ and
˚
´1 ˚
t distributions with ν degrees of freedom, respectively) and paF ` bq “ a F
for any distribution F and scalars a “ 0, b P R. Studying the G-conjugate of the
Wishart distribution will play a key part in deriving results about the Wishart
distribution itself. We should note that, in general, the double G-conjugate F ˚˚
is not the same as F . For example, χ2˚˚
is a density involving modified Bessel
n
functions of the first kind, not a χ2n .
A second feature that distinguishes G-transforms from characteristic functions is that they are easy to relate to the Hellinger distance between probability
measures. Consider two densities f1 , f2 with G-transforms ψ1 , ψ2 . By analogy,
we could define the “total variation” and “Hellinger” distances of ψ1 and ψ2
by
ż
dTV pψ1 , ψ2 q “
|ψ1 pT q ´ ψ2 pT q| dT,
Sp pRq
(3.5)
Chételat and Wells/Mid-scale Wishart asymptotics
ż
´
and
1{2
1{2
|ψ1 pT q ´ ψ2 pT q|2 dT
Hpψ1 , ψ2 q “
¯ 12
.
9
(3.6)
Sp pRq
Since the modulus of the G-transforms integrate to one, their total variation and
Hellinger distances are related to each other in the same way as in Equation 2.1
for densities, namely
1
1{2
dTV pψ1 , ψ2 q ď Hpψ1 , ψ2 q ď dTV pψ1 , ψ2 q.
(3.7)
2
Thus dTV pψ1 , ψ2 q Ñ 0 if and only if Hpψ1 , ψ2 q Ñ 0. But the Hellinger distance
between G-transforms is much more useful. Indeed, by the Plancherel theorem,
for any two densities f1 , f2 with G-transforms ψ1 , ψ2 , their Hellinger distance
satisfies
ż
H2 pf1 , f2 q “
1{2
1{2
|f1 pXq ´ f2 pXq|2 dX
żS pRq
p
“
1{2
1{2
|ψ1 pT q ´ ψ2 pT q|2 dT “ H2 pψ1 , ψ2 q.
(3.8)
Sp pRq
Thus to compute the Hellinger distance H2 pf1 , f2 q between two densities, we
can instead compute the Hellinger distance H2 pψ1 , ψ2 q of their G-transforms.
In contrast, there is no explicit way to express the Hellinger distance in terms
of characteristic functions. And no such connection exists between the total
variation distances of densities and G-transforms.
The G-transform does have some disadvantages compared to the Fourier
transform. It is a non-linear transformation (and therefore not a true transform),
and it does not behave well with respect to convolution. For our purposes,
however, the advantages listed above outweigh these problems.
In practice, it is not aways easy to control the Hellinger distance directly, and
one often focuses on the Kullback-Leibler divergence instead. The two quantities
are related through the well known inequality
„
f1 pXq
for X „ f1 .
H2 pf1 , f2 q ď E log
f2 pXq
For G-transforms, the following analog holds, which clarifies our interest in Gconjugates:
ˇ2
„
„ˇ
ˇ
ψ1 pT q
ψ1 pT q ˇˇ
H2 pψ1 , ψ2 q ď E < Log
` 2E ˇˇ= Log
for T „ F1˚ ,
ψ2 pT q
ψ2 pT q ˇ
where Log stands for the principal branch of the complex logarithm. In fact, in
this article we will need a further generalization, where ψ2 does not need to be
a G-transform of a density.
Proposition 1 (Kullback-Leibler inequality for G-transforms). Let ψ1 be the
G-transform of an absolutely continuous distribution F1 on Sp pRq, and let ψ2
Chételat and Wells/Mid-scale Wishart asymptotics
10
be an integrable function Sp pRq Ñ C. Then
ż
„
„
ψ1 pT q
H2 pψ1 , ψ2 q ď
|ψ2 |pT q dT ´ 1 ` E < Log
ψ2 pT q
Sp pRq
ż
ˇ 1
„ˇ
ˇ
1
ψ1 pT q ˇˇ 2
ˇ
2
`2
|ψ2 |pT q dT ¨ E ˇ= Log
ψ2 pT q ˇ
Sp pRq
for T „ F1˚ , where Log stands for the principal branch of the complex logarithm.
Proof. We can write
ż
1{2
H2 pψ1 , ψ2 q “
Sp pRq
„
1{2 1{2
´ ψ1 ψs2 dT
ż
ż
«
|ψ2 |pT q| ´ 1 ` 2 ´
“
1{2
|ψ1 |pT q ` |ψ2 |pT q| ´ ψs1 ψ2
1{2
ψ1 pT q
Sp pRq
1{2
1{2
ψ2 pT q
`
ψ̄2 pT q
1{2
ψ̄1 pT q
ff
|ψ1 |pT q dT
Sp pRq
ż
„
ż
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
#
“
żS pRq
żS pRq
p
„
<
p
1{2
ψ2 pT q
1{2
ψ1 pT q
+
|ψ1 |pT q dT
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
"
*
1
ψ1 pT q
exp ´ < Log
2
ψ2 pT q
Sp pRq
Sp pRq
“
˙
ψ1 pT q
1
= Log
|ψ1 |pT q dT .
2
ψ2 pT q
a
Now using the inequality ´ cospxq ď ´1 ` 2|x| that holds for any x P R. The
last quantity is bounded as
ˆ
¨ cos
ż
„
ż
„
|ψ2 |pT q| ´ 1 ` 2 1 ´
"
*
1
ψ1 pT q
exp ´ < Log
|ψ1 |pT q dT
2
ψ2 pT q
Sp pRq
Sp pRq
ď
ż
`2
ˇ
"
*dˇ
ˇ
1
ψ1 pT q
ψ1 pT q ˇˇ
ˇ
exp ´ < Log
ˇ= Log ψ2 pT q ˇ|ψ1 |pT q dT.
2
ψ2 pT q
Sp pRq
In the second term, use 1 ´ x ď ´ logpxq for x ě 0, while in the third term, use
the Cauchy-Schwarz inequality to obtain
ż
ż
„
ď
|ψ2 |pT q| ´ 1 ´ 2 log
"
*
ψ1 pT q
1
|ψ1 |pT q dT
exp ´ < Log
2
ψ2 pT q
Sp pRq
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
ż
`2
11
ż
"
*
1
ψ1 pT q
exp ´< Log
|ψ1 |pT q dT 2
ψ2 pT q
ˇ
1
ψ1 pT q ˇˇ
ˇ
ˇ= Log
ˇ|ψ1 |pT q dT 2 .
ψ2 pT q
Sp pRq
Sp pRq
Now use Jensen’s inequality in the second term and the algebraic identity
expt´< Log ψ1 pT q{ψ2 pT qu “ |ψ2 |pT q{|ψ1 |pT q in the third term to obtain
ż
ż
„
ď
|ψ2 |pT q| ´ 1 `
< Log
Sp pRq
Sp pRq
ψ1 pT q
|ψ1 |pT q dT
ψ2 pT q
ż
ż
|ψ2 |pT q dT 2
ˇ
1
ψ1 pT q ˇˇ
ˇ
ˇ= Log
ˇ|ψ1 |pT q dT 2 ,
ψ2 pT q
Sp pRq
Sp pRq
1
`2
as desired.
Let us now compute the G-transform of the Gaussian Orthogonal Ensemble
and the normalized Wishart distribution, which will be needed in our proofs.
The density of a GOEppq matrix over Sp pRq is
! 1
)
1
fGOE pXq “ ppp`3q ppp`1q exp ´ tr X 2 .
(3.9)
4
2 4 π 4
To compute its G-transform, we will make use of the fact that the elements
of a GOEppq matrix are independent to reduce the expression to a product of
characteristic functions.
Proposition 2. The G-transform of the Gaussian Orthogonal Ensemble density
on Sp pRq is
pp3p`1q
!
)
2 4
ψGOE pT q “ ppp`1q exp ´ 4 tr T 2 .
π 4
?
1{2
Proof. From Equation (3.9), fGOE is proportional to the density of the 2 GOEppq
distribution, so it is integrable. Therefore, we can apply Equation (3.3) to find
that
ż
1
1{2
ψGOE pT q “
p
2
2 π
ppp`1q
4
!
)
1{2
exp ´ i trpT Xq fGOE pXq dX
żS pRq
p
1
“
2
ppp`7q
8
π
3ppp`1q
8
!
)
1
exp ´ i trpT Xq ´ tr X 2 dX
8
żS pRq
p
1
“
2
ppp`7q
8
π
3ppp`1q
8
p
p
!
ÿ
1ÿ 2
exp ´ 2i
Tkl Xkl ´
X
4 kăl kl
kăl
Rppp`1q{2
´i
p
ÿ
k“1
Tkk Xkk ´
p
p
1 ÿ 2 )ź
Xkk
dXkl
8 k“1
kďl
Chételat and Wells/Mid-scale Wishart asymptotics
12
ż
“
2
pp3p`1q
8
π
ppp`1q
8
p
ź
kăl
) exp ´ 1 X 2 (
? 4 kl dXkl
exp ´ 2iTkl Xkl
4π
!
R
ż
p
ź
) exp ´ 1 X 2 (
? 8 kk dXkk
exp ´ iTkk Xkk
8π
!
¨
k“1
“
2
pp3p`1q
8
π
ppp`1q
8
R
p
p
”
!
)ı
”
! ?
)ı ź
ź
E exp ´ 2iTkk Z
E exp ´ 8iTkl Z
kăl
k“1
for Z „ Np0, 1q. The characteristic function of a Np0, 1q is expp´t2 {2q, so
pp3p`1q
p
p
!
)ź
!
)
ź
2 8
2
2
“ ppp`1q
exp ´ 4Tkl
exp ´ 2Tkk
π 8 kăl
k“1
pp3p`1q
!
)
2 8
“ ppp`1q exp ´ 2 tr T 2 .
π 8
Squaring this result yields the desired expression for ψGOE .
In particular, we see that |ψGOE | is the density of a GOEppq{4 distribution,
or in other words that GOEppq˚ “ GOEppq{4. In particular the Gaussian orthogonal ensemble is its own G-conjugate, up to a constant factor.
Let us now compute the G-transform of the normalized Wishart distribution.
Unlike the GOEppq case, the elements of the matrix are not independent, but
the elements of its Cholesky decomposition are. By being careful about complex
changes of variables, we can reduce the computation of the G-transform to the
computation of characteristic functions of the Cholesky elements.
Proposition?3. Let n ě p´2. Then the G-transform of the normalized Wishart
distribution nrWp pn, Ip {nq ´ Ip s density on Sp pRq is given by
ˇ´ n`p`1
"
*ˇ
2
ˇ
ˇ
?
4T
ψNW pT q “ Cn,p exp 2i n tr T ˇˇIp ` i ? ˇˇ
n
with
˘
`
ppn`2pq
Γ2p n`p`1
2 2
4˘
`
Cn,p “ ppp`1q ppp`1q
.
Γp n2
π 2 n 4
Proof. Recall the notation m “ n ´ p ´ 1 used throughout this article. The
density of a Y „ Wp pn, Ip {nq distribution is
np
! n
) m
n 2 1rY ą 0s
` n ˘ exp ´ tr Y |Y | 2 .
fW pY q “
np
2
2 2 Γp 2
?
?
If we do a change of variables X “ npY ´ Ip q, so that Y “ Ip ` X{ n and
p
p
ź
ź
1
dYij “ ppp`1q
dXij ,
n 4 iďj
iďj
?
we see that the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has den-
Chételat and Wells/Mid-scale Wishart asymptotics
13
sity
„
ppn`mq
n 4
X
`
˘
?
1
I
`
ą
0
np
p
n
2 2 Γp n2
fNW pXq “
! n ”
X ˇˇ m2
X ı)ˇˇ
¨ exp ´ tr Ip `?
ˇIp `? ˇ . (3.10)
2
n
n
` 4 ´1 ˘
p`1
n`p`1
1{2
Notice that fW is proportional to expt´ tr r n Ip s Y u|Y | 4 ´ 2 , so it
`
˘
must be proportional to the density of a matrix gamma distribution Gp n`p`1
, n4 Ip
4
ą p´1
when n`p`1
4
2 , i.e. n ě p ´ 2. In particular, it must be integrable. As fNW
1{2
was obtained by a linear change of variables from fW , fNW must be integrable
too, that is
ż
1{2
fNW pXqdX ă 8.
(3.11)
Sp pRq
Therefore, we can apply Equation (3.3) to obtain
ż
1
1{2
ψN W pT q “
“
p
22 π
1
p
22 π
ppp`1q
4
ppn´2q
4
1
ppp`1q
4
!
)
1{2
exp ´ i trpT Xq fNW pXq dX
Sp pRq
”
!
)
ı
´1{2
E exp ´ i trpT Xq fNW pXq
`n˘
„
"
*
n ”
X ı ˇˇ
X ˇˇ´ m4
?
?
E
exp
´
i
trpT
Xq
`
tr
I
`
`
.
ˇI
ˇ
p
p
ppp`1q
ppn`mq
4
n
n
π 4 n 8
?
If we rewrite the expectation in terms of Y “ Ip ` X{ n, this last expression
equals
1 ` ˘
ppn´2q
*
„ "´
`?
˘
?
2 4 Γp2 n2
n ¯
´m
4
.
(3.12)
“ ppp`1q ppn`mq exp i n tr T E etr ´i nT ` Ip Y |Y |
4
π 4 n 8
Since T is real symmetric, there must be a spectral decomposition T “ ODOt
with O real orthogonal and D real diagonal. As Ot Y O has the same distribution
as Y , namely Wp pn, Ip {nq, we can rewrite Equation (3.12) as
1 ` ˘
ppn´2q
„ "´
*
˘
`?
?
2 4 Γp2 n2
n ¯
´m
4
“ ppp`1q ppn`mq exp i n tr T E etr ´i nD ` Ip Y |Y |
.
(3.13)
4
π 4 n 8
Now, since Y is positive-definite it has a Cholesky decomposition Y “ U t U
with U upper-triangular. According to Bartlett’s theorem [see Muirhead, 1982,
Theorem 3.2.14], all the elements of U are independent, the diagonal elements
2
have the distribution Ukk
„ χ2n´k`1 {n and the upper diagonal elements have
Ukl „ Np0, 1{nq for k ă l. Since
„´
p ´
ÿ
?
?
Ip ¯
n ¯
1
tr
´ i nD `
Y “
´ i nD ` Ip
Ukl
Ulj
4
4
jk
j,k,l
“
2
Γp2
2
Chételat and Wells/Mid-scale Wishart asymptotics
p ´
ÿ
“
lďk
14
?
n¯ 2
´ i nDkk `
U
4 lk
śp
2
k“1 Ukk , we have by independence and Equation (3.13) that
#
+ p „
1 ` ˘
ppn´2q
*
"´
ź
?
?
2 4 Γp2 n2
n¯ 2
“ ppp`1q ppn`mq exp i n tr T
U
E exp
´ i nDkk `
4 lk
π 4 n 8
lăk
*
„
"´
p
ź
?
n¯ 2
2 ´m
E exp
´ i nDkk `
¨
Ukk pUkk
q 4 . (3.14)
4
k“1
and |Y | “
We will now compute these expected values in several steps. For a given 1 ď
k ď p, let
„
"´
*
?
n¯ 2
´m
A “ E exp
´ i nDkk `
(3.15)
Tkk Tkk 2 .
4
2
Since Tkk
„ χ2n´k`1 {n and m “ n ´ p ´ 1, we have
ż8 "
*
n´k`1
´
2
?
m
n
n¯
¯
exp
´ i nDkk `
x x´ 4
A “ n´k`1 ´
n´k`1
4
2 2 Γ
0
2
! n )
n´k`1
¨ x 2 ´1 exp ´ x dx
2
ż8 "
*
n´k`1
´
¯
n´2k`p`3
n 2
n ?
´1
4
¯
“ n´k`1 ´
dx
(3.16)
exp ´
` nDkk i x x
n´k`1
4
2
Γ
2
0
2
Consider the truncated integrands
" ´
¯ * n´2k`p`3
n ?
´1
4
hM pxq “ exp ´
` nDkk i x x
1r0 ă x ă M s .
4
Clearly this sequence is dominated by the integrable positive function h,
"
*
n´2k`p`3
n
´1
4
,
|hM pxq| ď hpxq “ exp ´ x x
4
ˆ ˙ n´2k`p`3
˙
ˆ
ż8
4
4
n ´ 2k ` p ` 3
hpxqdx “
ă 8.
Γ
n
4
0
Therefore, by the Dominated Convergence Theorem and Equation (3.16),
żM "
n´k`1
´n ?
¯ * n´2k`p`3
2
n
´1
4
¯ lim
A “ n´k`1 ´
exp ´
` nDkk i x x
dx.
M
Ñ8
n´k`1
4
2 2 Γ
0
2
`n ?
˘
By the change of variables z “ 4 ` nDkk i x, this can be rewritten
“
n
n´k`1
2
?
˘´ n´2k`p`3
4
nDkk i
4 `
´
¯
lim
n´k`1
M Ñ8
2 2 Γ n´k`1
2
`n
ż
nM
4
?
` nDkk M i
e´z z
n´2k`p`3
´1
4
dz.
(3.17)
0
To compute this integral, we use a contour argument. Consider the closed path
nM
C “ C1 ` C2 ` C3 given by C1 a path from 0 to nM
4 , C2 a path from 4 to
Chételat and Wells/Mid-scale Wishart asymptotics
y
nM
4
15
?
` nDkk M i
C3
C2
C1
0
nM
4
x
Fig 2. Contour C “ C1 ` C2 ` C3 when Dkk ě 0. The diagram is mirrored around the x axis
when Dkk ă 0.
?
?
` nDkk M i and finally C3 a path from nM
nDkk M i to 0. A diagram
4 `
is provided as Figure 2.
n´2k`p`3
´1
4
As k ď p, z ÞÑ e´z z
is entire and its integral over C must be zero.
Therefore
?
ˇ
ˇ
nM
ˇ
ˇ
4 ` nDkk M i
ˇ
˙ˇ
ˆ
ˇ
ˇ
n´2k`p`3
n
´
2k
`
p
`
3
´1
ˇ lim
ˇ
4
e´z z
dz ´ Γ
ˇM Ñ8
ˇ
4
ˇ
ˇ
ˇ
ˇ
0
?
ˇ
ˇ
nM
nM
ˇ
ˇ
4 ` nDkk M i
4
ˇ
ˇ
ˇ
ˇ
n´2k`p`3
n´2k`p`3
´1
´1
4
4
“ lim ˇˇ
e´z z
dz ´
e´x x
dxˇˇ
M Ñ8 ˇ
ˇ
ˇ 0
ˇ
0
?
ˇ
ˇ
ˇ
ˇ
nM
ˇ
ˇ
ˇ
ˇ
4 ` nDkk M i
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
n´2k`p`3
n´2k`p`3
´z
´z
´1
´1
ˇ
ˇ
ˇ
4
4
e z
“ lim ˇ
e z
dz ˇ “ lim ˇ
dz ˇˇ .
M Ñ8 ˇ
M
Ñ8
ˇ
ˇ
ˇ
ˇ C2
ˇ
ˇ nM
ˇ
4
nM
?
z´ 4
?
Do a change of variables z “ nM
4 ` y nDkk M i, so that y “ nDkk M i is real on
the path. It yields
ˇ
ˇ
1
ˇ
ˇ
ˇ
„
n´2k`p`3
´1 ˇ
4
?
ˇ
?
?
M ˇˇ
nM
“ n|Dkk | lim nM ˇ e´y nDkk M i
`y nDkk M i
dy ˇˇ
M Ñ8 e 4 ˇ
4
ˇ
ˇ 0
ˇ
nM
4
ż
ż
ż
ż
ż
ż
ż
ď
?
1
ˇ
ˇ n´2k`p`3
n´2k`p`3
´1
4
ˇn
ˇ
4
?
M
ˇ ` y nDkk iˇ
dy
¨
lim
.
nM
ˇ4
ˇ
M Ñ8
e 4
n|Dkk |
0
This last integral is finite, since it is continuous on a bounded interval. Therefore
Chételat and Wells/Mid-scale Wishart asymptotics
the limit is zero and by Equation (3.17) and the previous expression,
´
¯
n´k`1
´n ?
¯´ n´2k`p`3
n 2 Γ n´2k`p`3
4
4
´
¯
A “
.
` nDkk i
n´k`1
n´k`1
4
2 2 Γ
2
16
(3.18)
Going back to (3.14), let us now consider the expectations in the second
products. For fixed 1 ď l ă k ď p, let
„
"´
*
?
n¯ 2
´ i nDkk `
B “ E exp
T
.
(3.19)
4 lk
2
Since Tlk
„ χ21 {n,
ż8
c
B “
"´
n
2π
exp
* n
?
n ¯ e´ 2 x
´ i nDkk `
x ? dx
4
x
0
ż8
c
“
" ´
¯ * 1
?
n
exp ´
` i nDkk x ? dx.
4
x
n
2π
(3.20)
0
Consider the truncated integrands
" ´
¯ * 1 „ 1
?
n
` i nDkk x ? 1
ăxăM .
(3.21)
hM pxq “ exp ´
4
x M
We see that they are dominated by a positive, integrable function hpxq,
c
ż8
n
e´ 4 x
π
|hM pxq| ď hpxq “ ? ,
ă 8.
hpxqdx “ 2
x
n
0
Therefore, by the Dominated Convergence Theorem and Equation (3.20), we
conclude that
M
c
" ´
¯ * 1
?
n
n
B “
lim
exp ´
` i nDkk x ? dx.
2π M Ñ8
4
x
1{M
`
˘
?
A complex change of variables z “ n4 ` i nDkk x yields
ż
ż
c
“
¯´ 12
?
n ´n
` i nDkk
lim
M Ñ8
2π 4
nM
4
?
` nDkk M i
?
e´z { z dz.
?
nDkk
n
4M `
M
(3.22)
i
Let’s compute this integral again using a contour integration argument. Consider
n
the contour C “ C1 ` C2 ` C3 ` C4 given by C1 a line from 4M
to nM
2 a line
4 , C?
?
?
nM
nM
nM
n
kk
from 4 to 4 ` nDkk M i, C3 a line from 4 ` nDkk M i to 4M ` nD
i
M
?
nD
n
n
kk
and C4 a line from?4M ` M i to 4M . A diagram is provided as Figure 3.
Since z ÞÑ e´z { z is holomorphic away from zero,
?
?
ˇ
ˇ
ˇ
ˇ
nM
nM
nM
ˇ
ˇ
ˇ
ˇ
4 ` nDkk M i
4 ` nDkk M i
4
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
?
?
?
´z
´z
´x
ˇ lim
ˇ “ lim ˇ
ˇ
e
{
z
dz
´
π
e
{
z
dz
´
e
{
x
dx
ˇM Ñ8
ˇ M Ñ8 ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
?
nDkk
nDkk
ˇ
ˇ
ˇ
ˇ
n
n
n
`
i
`
i
ż
4M
ż
ż
M
4M
M
4M
Chételat and Wells/Mid-scale Wishart asymptotics
y
nM
4
17
?
` nDkk M i
C3
n `
4M
?
nDkk
M
C2
i
C4
0
n
4M
C1
nM
4
x
Fig 3. Contour C “ C1 ` C2 ` C3 ` C4 when Dkk ě 0. The diagram is mirrored around the
x axis when Dkk ă 0.
ˇ
ˇ
ˇ
ˇ
“ lim ˇ
M Ñ8 ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ď lim ˇˇ
M Ñ8 ˇ
ˇ
ż
ż
ˇ
ˇ
ˇ
?
?
ˇ
e´z { z dz `
e´z { z dz ˇ
ˇ
ˇ
C2
C4
?
ˇ
ˇ
ˇ
nM
n
ˇ ˇ
ˇ
4 ` nDkk M i
4M
ˇ ˇ
ˇ
ˇ
ˇ
ˇ
?
?
e´z { z dz ˇˇ ` ˇˇ
e´z { z dz ˇˇ .
ˇ ˇ
ˇ
ˇ ˇ n ` ?nDkk i ˇ
nM
4
4M
M
?
?
nDkk
n
By changes of variables z “ nM
i on the
4 ` y nDkk M i and z “ 4M ` y M
two respective integrals, we get
ˇ 1
ˇ
ˇ
ˇ
?
ˇ
ˇ
nD
M
i
y
kk
?
M ˇ
e
ˇ
“ n|Dkk | lim nM ˇ
1 dy ˇ
ı
”
M Ñ8 e 4 ˇ
ˇ
?
2
ˇ 0 nM
ˇ
4 ` y nDkk M i
ˇ 1
ˇ
?
ˇ
ˇ
nDkk
ˇ
ˇ
i
y
?
1 ˇ
e M
ˇ
` n|Dkk | lim
dy
ˇ
ˇ
n
1
”
ı
?
M Ñ8 M e 4M ˇ
ˇ
2
n
kk
ˇ 0 4M
ˇ
` y nD
i
M
ż
ż
ż
ż
ż1
ď
?
n|Dkk |
0
?
1
M
dy
¨
lim
nM
ˇ
ˇ 12
M
Ñ8
?
ˇn
ˇ
e 4
ˇ 4 ` y nDkk iˇ
ż1
1
1
?
n .
ˇ
ˇ 12 dy ¨ Mlim
Ñ8
?
M e 4M
ˇn
ˇ
0 ˇ 4 ` y nDkk iˇ
1
ˇ
ˇ
´ 2
¯´ 14
?
ˇ
ˇ´ 2
2
“ n16 ` y 2 nDkk
is continuous on r0, 1s, a bounded
Since ˇ n4 ` y nDkk iˇ
interval, we conclude that the integrals are finite and that the limits are zero.
`
?
n|Dkk |
Chételat and Wells/Mid-scale Wishart asymptotics
Therefore, by Equation (3.22),
c ´
¯´ 12
?
n n
B “
` i nDkk
.
2 4
18
(3.23)
Recall the definitions of A and B at Equations (3.15) and (3.19). Combining
1{2
both Equations (3.18) and (3.23) into the expression for ψNW at Equation (3.14)
provides
1 ` ˘
ppn´2q
"
*ź
p c ´
¯´ 12
?
?
2 4 Γp2 n2
n n
1{2
ψNW pT q “ ppp`1q ppn`mq exp i n tr T
` i nDkk
2 4
π 4 n 8
lăk
¯
´
n´k`1
p n 2
¯´ n´2k`p`3
´n ?
Γ n´2k`p`3
ź
4
4
´
¯
¨
nD
i
`
kk
n´k`1
n´k`1
4
Γ
k“1 2 2
2
´
¯
1 ` ˘
ppn´2q
"
*
n´k`1
k´1
p Γ n´2k`p`3
p
n
2
`
ź
ź
4
2
?
2
Γp 2
4
n 2
`
˘
“ ppp`1q ppn`mq
exp
i
n
tr
T
n´k`1
` k´1
Γ n´k`1
2
2
π 4 n 8
2
k“1
k“1 2
p ´
n´2k`p`3
¯
ź
´
´ k´1
n ?
4
2
´ nDkk i
¨
4
k“1
´
¯
n´2k`p`3
ˇ n`p`1
"
*ˇ
pp2n`p`1q
p
Γ
ź
ˇn
8
?
? ˇ´ 4
4
n
` n´k`1 ˘ exp i n tr T ˇˇ Ip ` i nT ˇˇ
“ ppn`2q ppp`1q
.
4
2 4 π 4 k“1 Γ
2
But by Muirhead [1982, Theorem 2.1.12],
p
`
˘
´
¯
ppp´1q ś
˘
`
π 4
Γ n`p`1
` 1´k
p Γ n´2k`p`3
4
2
ź
Γp n`p`1
4
k“1
4
` ˘ ,
`
˘ “
p
˘ “ Γp n
`
ppp´1q ś
Γ n´k`1
2
2
k“1
π 4
Γ n2 ` 1´k
2
k“1
so by taking a n{4 factor out of the determinant, we find that
`
˘
ˇ´ n`p`1
"
*ˇ
ppn`2pq
4
ˇ
?
Γp n`p`1
2 4
4T ˇˇ
1{2
4
ˇ
?
ψNW pT q “ ppp`1q ppp`1q
exp
i
n
tr
T
I
`
i
.
`
˘
p
ˇ
1{2
nˇ
Γp n2
π 4 n 8
Squaring this result yields the desired expression for ψNW .
By Proposition 3, when n ě p ´ 2 the G-conjugate of a normalized Wishart
distribution must have a density on Sp pRq given by
`
˘ˇ
ˇ´ n`p`1
ppn`2pq
4
ˇ
Γ2p n`p`1
2 2
16T 2 ˇˇ
4
` n ˘ ˇˇIp `
|ψNW |pT q “ ppp`1q ppp`1q
.
(3.24)
ˇ
n
Γp 2
π 2 n 4
As mentioned in the paragraph following Equation (3.4), the G-conjugate of
a χ2n {n distribution is a scaled tn{2 . Thus, by analogy, Equation (3.24) should
be represent some kind of generalization of the t distribution to the real symmetric matrices. Matrix-variate generalizations of the t distribution have been
investigated in the past, but not for symmetric matrices. Hence it appears the
concept is new.
Chételat and Wells/Mid-scale Wishart asymptotics
19
This motivates us to propose in Section 4 a candidate for a symmetric matrix
variate t distribution. Using that definition, the G-conjugate to the normalized
Wishart could then be regarded as the t distribution with n{2 degrees of freedom
and scale matrix Ip {8, which we denote Tn{2 pIp {8q. But regardless of its name,
this distribution will play a key role in our results about the middle-scale regime
asymptotics of Wishart matrices, and will be investigated in depth in Section
4.
4. The symmetric matrix variate t distribution
In Section 3, Equation (3.24), we proved ?
that when n ě p ´ 2, the G-conjugate
of the normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s has density on
Sp pRq given by
`
˘ˇ
ˇ n`p`1
ppn`2pq
2 ˇ´ 4
ˇ
Γ2p n`p`1
16T
2 2
4
ˇ
` ˘ ˇˇIp `
|ψNW |pT q “ ppp`1q ppp`1q
.
(4.1)
n ˇ
Γp n2
π 2 n 4
Two remarks are in order. First, we are unaware of any matrix calculus tools
that could let us integrate this expression directly. Thus, the mere fact that
this expression integrates to unity, a consequence of being the G-conjugate of
another distribution, seems remarkable.?
Second, when p “ 1, this is the tn{2 { 8 distribution. Thus, as we mentioned
while discussing Equation (3.24), it is natural to interpret this distribution as the
parametrization of some generalization of the t distribution to Sp pRq, the space
of real-valued symmetric matrices. The purpose of this section is to propose
a candidate definition for such generalization, as well as prove several results
concerning the normalized Wishart G-conjugate.
To the best of our knowledge, no extension of the t distribution to symmetric
matrices has ever been proposed. However, a non-symmetric matrix variate t
distribution has been thoroughly investigated in the literature – see Gupta and
Nagar [1999, Chapter 4] for a thorough summary. Several definitions exist. For
our purposes, we say that a p ˆ q real-valued random matrix T has the matrix
variate t distribution with ν degrees of freedom and q ˆ q positive-definite scale
matrix Ω if it has density
¯
´
ˇ
ˇ´ ν`p`q´1
Γp ν`p`q´1
2
pˇ
2
T Ω´1 T t ˇˇ
´
ˇ
2
´
¯
|Ω|
I
`
.
p
ˇ
ˇ
pq
pq
ν
ν 2 π 2 Γ ν`p´1
p
2
It is not exactly clear what should be the proper analog of this distribution
for symmetric matrices. But it would be elegant if the degrees of freedom of
Equation (4.1) were to be exactly n{2, as in the univariate case. Thus, the
following definition seems natural.
Definition 2 (Symmetric matrix variate t distribution). We say a real symmetric p ˆ p matrix T has the symmetric matrix variate t distribution with
ν ě p{2 ´ 1 degrees of freedom and p ˆ p positive-definite scale matrix Ω,
Chételat and Wells/Mid-scale Wishart asymptotics
20
denoted Tν pΩq, if it has density
ˇ´ ν`pp`1q{2
ˇ
2
ˇ
T Ω´1 T ˇˇ
ˇ
.
fTn pΩq pT q 9 ˇIp `
ˇ
ν
With this definition, the G-conjugate to the normalized Wishart distribution,
whose density is given by Equation (4.1), is the Tn{2 pIp {8q distribution on Sp pRq.
In fact, since Equation (4.1) integrates to one, we can deduce the normalization constant of Definition 2. For an arbitrary degrees of freedom parameter ν,
imagine the density |ψNW | of the G-conjugate of a normalized Wishart distribution with n “ 2ν ě p ´ 2. By virtue of being a G-conjugate,
it must integrate to
1 ?
1
unity. Then from the change of variables T “ Ω´ 4 SΩ´ 4 { 8 which has Jacobian
ppp`1q
p`1
dT “ 8´ 4 |Ω|´ 4 dS, we see that
ż
1“
ż
|ψNW |pT q dT “
Sp pRq
2ppν´1q Γ2p
“
π
ppp`1q
2
ν
´
1
2
3ppp`1q
4
ν`pp`1q{2
2
ppp`1q
4
|Ω|
p`1
4
ˆ ´1
1 ˙
Ω 4 SΩ´ 4
?
dS
|ψNW |
8
Sp pRq
ż
¯
|Ω|
´ p`1
4
Γp pνq
ˇ
ˇ ν`pp`1q{2
´1 ˇ´
2
ˇ
ˇIp ` SΩ S ˇ
dS.
ˇ
ˇ
ν
Sp pRq
Thus we must have
fTn pΩq pT q “
2ppν´1q Γ2p
´
ν`pp`1q{2
2
¯
ˇ
ˇ´ ν`pp`1q{2
2
ˇ
T Ω´1 T ˇˇ
I
`
.
p
ˇ
ˇ
ν
´ p`1
4 ˇ
|Ω|
(4.2)
ppp`1q
ppp`1q
π 2 ν 4 Γp pνq
It would be interesting to see if this distribution satisfies the properties we would
expect of a t distribution, to ensure our guess is the “correct” one. However, this
would take us too far away from the topic of this article. Instead, we will focus
in the rest of this section on proving results about Tn{2 pIp {8q, the G-conjugate
to the normalized Wishart distribution.
Our first result will concern the asymptotic expansion of its normalization
constant. We mention that this constant is the same as the Cn,p term appearing
in the expression of the G-transform of the normalized Wishart in Proposition
3.
Lemma 1. The normalization constant of the Tn{2 pIp {8q distribution
`
˘
ppn`2pq
Γ2p n`p`1
2 2
4˘
`
Cn,p “ ppp`1q ppp`1q
Γp n2
π 2 n 4
has, for every K P N, the asymptotic expansion
" K`1
pp3p`1q
2 4
1 ÿ 1rk evens pk`2
Cn,p “ ppp`1q exp ´
2 k“1 kpk`1qpk`2q nk
π 4
(4.3)
K`1
´ pK`3 ¯*
1 ÿ 1`21rk evens pk`1
´
` o K`1 .
4 k“1
kpk`1q
nk
n
as n Ñ 8 with p{n Ñ 0.
Chételat and Wells/Mid-scale Wishart asymptotics
21
Proof. By Stirling’s approximation applied to log Γ, as well as Muirhead [1982,
Theorem 2.1.12], we find that
˙
ˆ
p
ÿ
ppp ´ 1q
i´1
log Γp pxq “
log π `
log Γ x ´
4
2
i“1
„ˆ
˙
ˆ
˙
p
ÿ
ppp ´ 1q
i´1 1
i´1
“
log π `
x´
´
log x ´
4
2
2
2
i“1
˙
ˆ ˙
ˆ
1
1
i´1
` log 2π ` O
´ x´
2
2
x
ppp ` 1q
p
ppp ´ 1q
“
log π ` log 2 ´ px `
4
2
4
˙
ˆ
˙
p ˆ
´p¯
ÿ
i
i´1
`
log x ´
`O
x´
2
2
x
i“1
as x Ñ 8. Thus
˙
ˆ
´ n ¯ ppp ` 1q
p
n`p`1
´ log Γp
“
log π ` log 2
2 log Γp
4
2
4
2
ˆ
˙
ˆ
˙
p
ppp ` 3q ÿ n`p`1
n`p`1 i´1
´
`
´ i log
´
4
2
4
2
i“1
˙
ˆ
˙
ˆ
p
ÿ n
i
n i´1
´
log
´
` op1q
´
2
2
2
2
i“1
“
ppp ` 1q
pp2n ` p ´ 1q
ppp ` 1q
ppp ` 3q
log π ´
log 2 `
log n ´
4
4
4
4
ˆ
˙
p
¯
1 ÿ´
2i´p´3
`
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
p
i´1
1ÿ
pn ´ iq log 1 ´
` op1q,
´
2 i“1
n
as n Ñ 8 with p{n Ñ 0, and so by Equation (4.3),
pp3p ` 1q
ppp ` 1q
ppp ` 3q
log Cn,p “
log 2 ´
log π ´
4
4
4
˙
p
¯ ˆ
1 ÿ´
2i´p´3
`
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
p
1ÿ
i´1
´
pn ´ iq log 1 ´
` op1q.
(4.4)
2 i“1
n
Let us now focus on the two sums in this expression. Recall that for any k ě 1,
x2
x3
xk
´ logp1 ´ xq “ x `
`
` ¨¨¨ `
` Opxk`1 q as x Ñ 0,
(4.5)
2
3
k
even for negative x. Therefore,
ˆ
˙
p
1ÿ
i´1
´
pn ´ iq log 1 ´
2 i“1
n
Chételat and Wells/Mid-scale Wishart asymptotics
22
ˆ K`4 ˙
p
p
K`2
K`1
1 ÿ ÿ pi´1qk
1 ÿ ÿ pi´1qk
p
´
`
O
n
i
2 i“1 k“1 k nk
2 i“1 k“1 k nk
nK`2
ˆ K`3 ˙
˙
p
p K`1 ˆ
p
p
1ÿ
1 ÿ ÿ i´1
i pi´1qk
`O
“
pi´1q `
´
k
K`1
2 i“1
2 i“1 k“1 k´1 k
n
n
n
ˆ
˙
˙
ˆ
p
K`1
pK`3
ppp ´ 1q 1 ÿ ÿ
1 pi´1qk
i´1
`o
“
´
`
k
4
2 i“1 k“1 kpk`1q k
n
nK`1
ˆ K`3 ˙
p´1
p´1
K`1
K`1
ÿ
ppp ´ 1q 1 ÿ
1
1 ÿ 1 ÿ k
p
k`1
“
´
i
i
.
´
`
o
k
k
4
2 k“1 kpk`1qn i“1
2 k“1 k n i“1
nK`1
“
Now let Bk denote the Bernoulli numbers, with the convention B1 “ 12 . Faulhaber’s formula provides
K`1
k`2
ppp ´ 1q 1 ÿ
1
1 ÿ
“
´
¨
Bk`2´l pp´1ql
4
2 k“1 kpk`1qnk k`2 l“1
ˆ K`3 ˙
K`1
k`1
1 ÿ
p
1 ÿ 1
l
¨
Bk`1´l pp´1q ` o
.
´
2 k“1 k nk k`1 l“1
nK`1
But by the binomial theorem,
pk`1
n
` op1q and
pp´1ql
“ op1q
nk
K`1
ÿ „ˆ
pp´1qk`2
nk
“
pk`2
nk
k`1
´ pk ` 2q pnk ` op1q,
pp´1qk`1
nk
“
for any 1 ď l ď k. Thus
˙
k`2
B0
pk`2 ´ pk`2qpk`1
ppp ´ 1q 1
´
“
4
2 k“1
k`2 kpk`1qpk`2q
nk
ˆ
˙
k`2
B1
pk`1
`
` op1q
k`1 kpk`1qpk`2q nk
˙
ˆ K`3 ˙
K`1 „ˆ
1 ÿ
k`1
B0 pk`1
p
` op1q ` o
.
´
2 k“1
k`1 kpk`1q nk
nK`1
Using that B0 “ 1 and B1 “ 12 , we obtain
“
K`1
ppp ´ 1q 1 ÿ
1
pk`2
´
4
2 k“1 kpk`1qpk`2q nk
ˆ K`3 ˙
K`1
1 ÿ
1
pk`1
p
´
`o
.
4 k“1 kpk`1q nk
nK`1
(4.6)
The analysis of the other sum of Equation (4.4) is similar but more involved,
as we must distinguish the cases where p is even and where p is odd. We find,
from Equation (4.5) again, that
˙
p
¯ ˆ
1 ÿ´
2i´p´3
n ´ r2i´p´1s log 1 ´
2 i“1
n
ˆ
˙
ˆ
˙
p
p
1ÿ
1ÿ
2i´p´3
2i´p´3
“´
`
p2i´p´1q log 1 ´
n log 1 ´
2 i“1
n
2 i“1
n
Chételat and Wells/Mid-scale Wishart asymptotics
23
ˆ K`4 ˙
p
p K`2
K`1
ÿ p2i´p´3qk
1ÿ
1 ÿ ÿ p2i´p´3qk
p
´
`
O
p2i´p´1q
n
k
k
K`2
2 i“1
k
n
2
k
n
n
i“1 k“1
k“1
˙
p
p K`1ˆ
1ÿ
1 ÿ ÿ 2i´p´1 2i´p´3 p2i´p´3qk
“
p2i´p´3q `
´
2 i“1
2 k“1 k“1
k
k`1
nk
ˆ K`3 ˙
p
p
`O
K`1
n
n
ˆ K`3 ˙
ˆ
˙
p K`1
k
ÿ
ÿ
p
2i´p´3 2 p2i´p´3q
1
`o
`
“p`
2 i“1 k“1 kpk`1q
k
nk
nK`1
“
“p`
p
K`1
ÿ
1 ÿ
1
p2i´p´3qk`1
2 k“1 kpk`1qnk i“1
ˆ K`3 ˙
p
1 ÿ
p
k
`
p2i´p´3q ` o
k
K`1
kn
n
i“1
k“1
„
p
ÿ
k`1
k`1
k`1
p´p´1q
`
p´p`1q
`
p2i´p´3q
k
K`1
ÿ
K`1
1 ÿ
1
2 k“1 kpk`1qn
i“3
ˆ K`3 ˙
p
K`1
ÿ 1 „
ÿ
p
k
k
k
`
p´p´1q ` p´p`1q ` p2i´p´3q ` o
.
k
kn
nK`1
i“3
k“1
“p`
(4.7)
At this point, it is simpler to analyze the cases where p is even and odd separately. If p is odd, define q “ pp´3q{2 and observe that by Faulhaber’s formula,
p
q
”
ıÿ
ÿ
p2i´p´3ql “ 1`p´1ql
p2iql
i“3
i“1
“
1rl evens
l`1
By the binomial theorem,
op1q and
p2qql
“
nk
k`1
p´p´1q
nk
l`1
ÿ
ˆ
s“1
p2qqk`2
nk
“
˙
l`1
Bl`1´s 2l`1´s p2qqs .
s
pk`2
nk
k`1
´ 3pk`2q pnk ` op1q,
p2qqk`1
nk
“
pk`1
nk
`
op1q for 1 ď l ď k. Moreover,
“
p´p`1qk`1
p´pqk`1
“
` op1q
k
n
nk
(4.8)
and
p´p´1qk
p´p`1qk
“
“ op1q.
(4.9)
nk
nk
Thus, for odd p, Equation 4.7 equals
„
ˆ
˙
K`1
1 ÿ
1
k`2 B0 pk`2 ´ 3pk`2qpk`1
“p`
` 1rk odds
2 k“1 kpk`1q
k`2 k`2
nk
ˆ
˙
k`2 2B1 pk`1
p´pqk`1
` 1rk odds
`2
` op1q
nk
k`1 k`2 nk
Chételat and Wells/Mid-scale Wishart asymptotics
`
24
ˆ K`3 ˙
ˆ
˙
K`1 „
1 ÿ 1
p
k`1 B0 pk`1
`
op1q
`
o
1rk evens
.
2 k“1 k
k`1 k`1 nk
nK`1
Moreover,
2p´pqk`1 ´ 31rk odds pk`1 ` 1rk odds pk`1 ` 1rk evens pk`1
“ ´1rk evens pk`1 .
Thus,
ˆ K`3 ˙
K`1
K`1
p
1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1
´
`o K`1 .
“p`
2 k“1 kpk`1qpk`2q nk
2 k“1 kpk`1q nk
n
(4.10)
When p is even, let q “ pp ´ 2q{2 and observe that by Faulhaber’s formula,
ˆÿ
˙
p
q
2q
q
”
ıÿ
ÿ
ÿ
l
l
l
l
l
p2i´p´3q “ 1`p´1q
p2i ´ 1q “ 21rl evens
i ´
p2iq
i“3
i“1
“
1rl evens
l`1
But by the binomial theorem,
p2qql
nk
pk`1
nk
l`1
ÿ
s“1
ˆ
i“1
i“1
˙
l`1
Bl`1´s p2 ´ 2l`1´s q p2qqs .
s
p2qqk`2
nk
“
pk`2
nk
k`1
´ 2pk `2q pnk ` op1q,
p2qqk`1
nk
“
` op1q and
“ op1q for 1 ď l ď k. If we apply Equations (4.8)–(4.9),
then Equation (4.7) becomes
„
ˆ
˙
K`1
1
k`2 p2 ´ 1qB0 pk`2 ´ 2pk ` 2qpk`1
1 ÿ
1rk odds
“p`
2 k“1 kpk`1q
k`2
k`2
nk
ˆ
˙
k`2 p2 ´ 2qB1 pk`1
` 1rk odds
`
op1q
k`1
k`2
nk
„
ˆ
˙
ˆ K`3 ˙
K
k`1 p2 ´ 1qB0 pk`1
p
1 ÿ 1
1rk evens
` op1q `o K`1 .
`
k
2 k“1 k
k`1
k`1
n
n
Moreover,
2p´pqk`1 ´ 21rk odds pk`1 ` 1rk evens pk`1 “ ´1rk evens pk`1 .
Thus again,
“p`
ˆ K`3 ˙
K`1
K`1
1 ÿ 1rk odds pk`2 1 ÿ 1rk evens pk`1
p
´
`o
.
k
k
2 k“1 kpk`1qpk`2q n
2 k“1 kpk`1q n
nK`1
(4.11)
which is the exact same result as in the odd p case (see Equation 4.10). Plugging
Equations (4.6) and (4.10)–(4.11) in Equation (4.4), we obtain
K`1
ppp ` 1q
1 ÿ
pp3p ` 1q
1rk evens pk`2
log 2 ´
log π ´
log Cn,p “
4
2
2 k“1 kpk`1qpk`2q nk
ˆ K`3 ˙
K`1
1 ÿ 1 ` 21rk evens pk`1
p
´
`o K`1 ,
4 k“1
kpk`1q
nk
n
as desired.
Chételat and Wells/Mid-scale Wishart asymptotics
25
Thus the constant Cn,p is closely related to the normalization constant of the
GOEppq distribution 2pp3p`1q{4 {π ppp`1q{2 .
We now turn our attention to the study of the asymptotic moments of a
Tn{2 pIp {8q distribution. We first remind the reader of some classic results. For a
Gaussian Orthogonal Ensemble matrix Z „ GOEppq, a moment-based approach
to Wigner’s theorem states that for any k P N, its k th moment satisfy
„
1 ´ Z ¯k
“ Ck{2 1rk evens ,
lim E tr ?
pÑ8
p
p
`2k˘
1
where Ck “ k`1
is the k th Catalan number. In fact, Anderson et al.
k
[2010, section
2.1.4 on‰ p.17] show that the variance of the k th moment satisfies
“1
?
lim Var p trpZ{ pqk “ 0, so we really have
pÑ8
1 ´ Z ¯k L2
tr ?
ÝÑ Ck{2 1rk evens
p
p
as p Ñ 8.
“ Now,‰ what do we know about the moments of Tn{2 pIp {8q? By symmetry,
E tr T k “ 0 for odd k, but it is much less clear what happens for even k. It
turns out that in many ways, if T „ Tn{2 pIp {8q then 4T „ Tn{2 p2Ip q mimics the
Gaussian Orthogonal Ensemble results outlined above, especially when p{n Ñ 0
as n Ñ 8. We have the following result.
Theorem 2. Let k P N and T „ T“n{2 pIp {8q.
‰ If p{n Ñ c P r0,“1q, the‰moments of
T satisfy the asymptotic bounds E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q
as n Ñ 8. In fact, for any k P N,
1 ´ 4T ¯k L2
tr ?
ÝÑ Ck{2 1rk evens
p
p
`2k˘
1
th
Catalan number.
as n, p Ñ 8 with p{n Ñ 0, where Ck “ k`1
k is the k
Although our proof will rely on the close relationship between the Wishart
and the t distribution, it is worthwhile to step back and think why a Tn{2 p2Ip q
should behave like a GOEppq when p{n Ñ 0. One good reason might be the
classic result that as n Ñ 8, the density of a t distribution converges pointwise
to a standard normal density. Thus, we might think that as long as p does not
grow too fast, in some aspects the symmetric t distribution should behave like
a GOEppq.
In the context of the proof, it will prove useful to use the notion of power sum
symmetric polynomials. For any integer partition κ “ pκ1 , . . . , κq q in decreasing
order κ1 ě ¨ ¨ ¨ ě κq ą 0, define its associated power sum polynomial to be
q
ź
rκ pZq “
tr Z κi .
(4.12)
i“1
The norm of the partition κ is |κ| “ κ1 ` ¨ ¨ ¨ ` κq ą 0, which should not be
confused with its length qpκq “ q (number of elements).
By convention, we will assume there also exists an empty partition ∅ “ pq
with length qp∅q “ 0, norm |∅| “ 0 and power sum polynomial r∅ pZq “ 1.
Chételat and Wells/Mid-scale Wishart asymptotics
26
Let’s now turn to the proof of the theorem. The odd moments of the Tn{2 pIp {8q
moments
sense
to focus on the even moments
“
‰ are zero by symmetry, so it makes
“
‰
E tr T 2k and the square moments E tr2 T k . Our first step in the proof is to
express these in terms of expectations of power sum polynomials of an inverse
Wishart Y ´1 „ W´1
p pn, Ip {nq, where by power sum polynomials we mean expressions like at Equation (4.12). Recall the useful shorthand m “ n ´ p ´ 1.
Lemma 2. Let T „ Tn{2 pIp {8q. Then for any k P N, whenever n is large enough
so that n ě p ` 16k ` 6, we can compute the 2k th moment of T by
ż
np
“
‰ p´1qk
E tr T 2k “
nk
p
ÿ
¨
i1 ,...,i2k
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4
np
4
2 2 Γp 2
Y ą0
ˇ
)ˇ
! n
ˇ m4 ˇ
Bs
Bs
Bs
ˇ
ˇ
...
dY
exp ´ trpY `Xq Y `X ˇˇ
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
4
X“0
“
“
‰
p´1qk ÿ p1q
bκ pn, m, pq E rκ pY ´1 q
k
n
(4.13)
|κ|ď2k
and its squared k th moment by
ż
np
“
‰ p´1qk
E tr2 T k “
nk
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4
4
2 Γp 2
np
2
p
ÿ
Y ą0
Bs
Bs
Bs
Bs
Bs
Bs
...
...
B
X
B
X
B
X
B
X
B
X
B
X
s j3 j2 s j2 j1 s i1 ik
s i3 i2 s i2 i1
i1 ,...,ik s j1 jk
j1 ,...,jk
ˇ
)ˇ
! n
ˇ m4 ˇ
ˇ
ˇ
dY
exp ´ trpY `Xq Y `X ˇˇ
4
X“0
k
ÿ
“
‰
p´1q
“
bκp2q pn, m, pq E rκ pY ´1 q ,
(4.14)
k
n
¨
|κ|ď2k`1
for Y
´1
„
W´1
p pn, Ip {nq
p1q
p2q
p1q
p2q
and some bκ , bκ . These bκ , bκ are polynomials in
p1q
n, m, p, indexed by integer partitions κ, whose degrees satisfy deg bκ ď 2k ` 1 ´
p2q
qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums are taken over all partitions of the
integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the empty
partition.
Proof. Let fNW and ψNW
? stand for the density and the G-transform of a normalized Wishart matrix nrWp pn, Ip {nq ´ Ip s. In the proof of Proposition 3, we
1{2
concluded at Equation (3.11) that fNW had to be integrable when n ě p ´ 2, as
its integral was proportional to a multivariate gamma function. Let RpXq “ ´X
1{2
1{2
be the flip operator. Since fNW is integrable, fNW ˝R must be integrable as well,
Chételat and Wells/Mid-scale Wishart asymptotics
27
` 1{2
˘
1{2
and so their convolution fNW ‹ fNW ˝ R is well-defined and integrable.
At Equation (3.1) at the start of Section 3, we defined our notion of Fourier
transform for integrable functions on Sp pRq. Define the map ι : Sp pRq Ñ
Rppp`1q{2 that maps a symmetric matrix to its vectorized upper triangle, and
let τ : Sp pRq Ñ Sp pRq be the map
#
2Xij if i ‰ j
τ pXqij “
Xjj
if i “ 1.
Then in terms of the usual Fourier transform on Rppp`1q{2 ,
(`
˘
ppp´1q
Ftf upT q “ 2 4 F f ˝ ι´1 ι ˝ τ pT q .
This close relationship transfer properties to our Fourier transform on Sp pRq.
We will need three.
(
1. For any integrable function f , we have F f ˝ R “ Ftf u.
2. (Convolution) For any two integrable functions f1 and f2 , we have Ftf1 ‹
ppp`1q
p
f2 u “ 2 2 π 4 Ftf1 uFtf2 u.
3. (Fourier inversion) For any continuous integrable f with integrable Fourier
transform φ, we have
ż
f pXq “
1
p
2
2 π
ppp`1q
4
ei trpT Xq φpT q dT “ Ftφup´Xq,
Sp pRq
for all X P Sp pRq.
These properties are important for the following. Since fNW is real-valued, properties 1 and 2 provide
!
)
` 1{2
˘)
(
ppp`1q
p
1{2
1{2
1{2
2´ 2 π ´ 4 F fNW ‹ fNW ˝ R “ F fNW F fNW ˝ R
ˇ 1{2 ˇ
1{2 (
1{2 1{2
1{2 (
“ F fNW F fNW “ ψNW ψNW “ ˇψNW ˇ.
But then, since |ψNW | is integrable (in fact, to unity), the Fourier inversion
formula yields that
ż
` 1{2
˘
1{2
fNW ‹ fNW ˝ R pXq “
ˇ
ˇ
ei trpT Xq ˇψNW pT qˇ dT.
(4.15)
Sp pRq
Thus we might say the characteristic function of the Tn{2 pIp {8q distribution is
˘
1{2 ` 1{2
given by fNW ‹ fNW ˝ R . It is well known that the derivatives of the characteristic function of a distribution evaluated at zero provide its moments, up to a
˘
1{2 ` 1{2
constant. This suggests
should
try“ to repeatedly
differentiate fNW ‹ fNW ˝R
“ we2k
‰
‰
at zero to compute E tr T
and E tr2 T k , our ultimate goal.
Unfortunately, the convolution is given by an integral whose domain makes
it difficult to directly interchange the differentiation and integration symbols.
Because the integrand is orthogonally invariant, we found it easier to compute
the derivatives at zero by taking a limit over a sequence of decreasing positive-
Chételat and Wells/Mid-scale Wishart asymptotics
28
definite matrices at both sides instead. In this spirit, define on the open set
t0 ă X ă Ip u Ă Sp pRq the real-valued functions
p´1qk
H1 pXq “
nk
p
ÿ
˘?
Bs
Bs
Bs
1{2 ` 1{2
...
fNW ‹ fNW ˝R p nXq
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,i2k
and
p´1qk
H2 pXq “
nk
p
ÿ
Bs
Bs
Bs
Bs
Bs
Bs
...
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1 Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,ik
j1 ,...,jk
for fixed k, p and n. Here
˘?
1{2 ` 1{2
fNW ‹ fNW ˝R p nXq
Bs
Bs Xij
stands for the symmetric differentiation operator
?
“
as defined in Section 2. The n scaling in the argument
helps link the convolution to an expectation with respect to an inverse Wishart
distribution.
Let’s first relate these functions to the moments of the Tn{2 pIp {8q distribution. The symmetric differentation operator has the pleasant property that
Bs
Bs Xij trpXT q “ Tij for any two symmetric matrices X, T . Thus, for any 1 ď
l ď 2k and indices 1 ď i1 , . . . , i2l ď p, we find that
ˇ
ˇ
?
ˇ
ˇ
ˇ
ˇ
Bs
Bs
Bs
i n trpT Xq ˇ
ˇ
ˇ
...
ψNW pT qˇˇ
e
ˇ Bs Xi i
Bs Xi4 i3 Bs Xi2 i1
2l 2l´1
ˇ
ˇˇ
ˇ
ˇ
ˇ
“ nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti4 i3 Ti2 i1 ˇˇψNW ˇpT q (4.16)
1`δij B
2 BXij ,
Bs
Bs Xij
for all X P Sp pRq.
We now show that the right hand side (4.15) is integrable. This is not a mere
formality: when p “ 1, asking if this expression is integrable is the same as
asking if the t distribution with n{2 degrees of freedom has an lth moment, and
it is well-known that the t distribution only possesses moments of order smaller
than its degrees of freedom. So the answer is most likely to be positive, but only
for n large enough.
Let us see why. For any symmetric matrix T ,
g
f p ´
¯ bˇ
a
fź
ˇ
2
|Tij | ď λ1 pT q ď e
1 ` λi pT 2 q “ ˇIp ` T 2 ˇ,
i“1
where λ1 pT 2 q ě ¨ ¨ ¨ ě λp pT 2 q ě 0 are the ordered eigenvalues of the positivedefinite matrix T 2 . Thus
ż
ˇ
ˇˇ
ˇ
ˇ
ˇ
nl ˇTi2l i2l´1 ¨ ¨ ¨ Ti2 i1 ˇˇψNW ˇpT q dT
Sp pRq
ż
3l
2
n
“ l Cn,p
4
ˇ´ n`p`1
ˇ
ˇ 4T
4
4Ti2 i1 ˇˇˇˇ
16T 2 ˇˇ
ˇ i2l i2l´1
¨ ¨ ¨ ? ˇˇIp `
dT
ˇ ?
ˇ
n
n
n
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
ż
ˇ
ˇ pn´2lq`p`1
2 ˇ´
4
ˇ
ˇIp ` 16T ˇ
dT
ˇ
n ˇ
3l
2
n
ď l Cn,p
4
Sp pRq
3l
2
ˆ
n Cn,p
ď l
4 Cn´2l,p
29
ż
n
n ´ 2l
˙ppp`1q
4
ˇ
ˇ´ pn´2lq`p`1
4
ˇ
16T 2 ˇˇ
ˇ
Cn´2l,p ˇIp `
dT.
n ´ 2l ˇ
(4.17)
Sp pRq
When n ´ 2l ě p ´ 2, the last integrand is the density of a Tn{2´l pIp {8q
distribution, so integrates to unity. Thus, when n ě p ` 4k ´ 2, the right
hand side of Equation (4.16) is an integrable function for all 1 ď l ď 2k and
1 ď i1 , . . . , i2l ď p. By Equation (4.15), and repeated differentiation under the
integral sign justified by the integrability bounds given by Equations (4.16) and
(4.17), we find that
k
H1 pXq “
p´1q
nk
ż
p
ÿ
?
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
ei
i1 ,...,i2k
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT
Sp pRq
ż
tr T 2k ei
“
?
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT
(4.18)
Sp pRq
and
p´1qk
H2 pXq “
nk
p
ÿ
Bs
Bs
...
Bs Xj1 jk
Bs Xj2 j1
i1 ,...,ik
j1 ,...,jk
ż
Bs
Bs
Bs
...
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
ei
ˇ
ψNW pT qˇdT
Sp pRq
ż
“
?
ˇ
n trpT Xq ˇ
tr2 T k ei
?
ˇ
n trpT Xq ˇ
ˇ
ψNW pT qˇdT.
(4.19)
Sp pRq
for any X P Sp pRq and any n ě p ` 4k ´ 2.
˘
1{2 ` 1{2
Now let’s relate H1 and H2 to the definition of fNW‹ fNW˝R as a convolution.
This is where restricting H1 and H2 to small positive-definite matrices becomes
useful. By Equation (3.10), the expression is
ż
˘?
1{2 ` 1{2
fNW ‹ fNW ˝R p nXq “
ż
np
“
n2
` ˘
np
2 2 Γp n2
1{2
1{2
fNW pZqfNW pZ ´
?
nXqdZ
Sp pRq
! n
)ˇ
! n
)ˇ ˇ m
ˇm
exp ´ trpY `Xq ˇY `X ˇ 4 exp ´ tr Y ˇY ˇ 4 dY
4
4
Y `Xą0, Y ą0
?
ppp`1q
using the change of variables Y “ Ip ` Z{ n ´ X with dZ “ n 4 dY . For
Chételat and Wells/Mid-scale Wishart asymptotics
30
X ą 0, we have 1rY ` X ą 0, Y ą 0s “ 1rY ą 0s, and thus H1 , H2 satisfy
H1 pXq “
p
ÿ
p´1qk
nk
ż
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
i1 ,...,i2k
and
p´1qk
H2 pXq “
nk
p
ÿ
Y ą0
np
ˇm
ˇ
¨ˇY `X ˇ 4
! n
)
exp ´ trpY `Xq
4
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
np
4
2 2 Γp 2
(4.20)
Bs
Bs
Bs
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1
i1 ,...,ik
j1 ,...,jk
ż
Bs
Bs
Bs
...
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
! n
)ˇ
ˇm
exp ´ trpY `Xq ˇY `X ˇ 4
4
Y ą0
np
2
! n
)ˇ ˇ m
n
` n ˘ exp ´ tr Y ˇY ˇ 4 dY.
(4.21)
4
2 Γp 2
We would now like to interchange the integral and differentiation signs. )To do
m
so, we must understand what the repeated derivatives of expt´ n4 tr Y |Y | 4
look like. Differentiating once, we see that:
! n
)ˇ
ˇm
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi2 i1
4
„
! n
)ˇ
ˇm
n
m
´1
pY `Xqi2 i1 ´ pIp qi2 i1 exp ´ trpY `Xq ˇY `X ˇ 4 .
“
4
4
4
Differentiating twice, we see that:
! n
)ˇ
ˇm
Bs
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi4 i3 Bs Xi2 i1
4
„
m
m
´1
´1
“ ´ pY `Xq´1
pY `Xq´1
i2 i4 pY `Xqi3 i1 ´
i2 i3 pY `Xqi4 i1
8
8
mn
m2
´1
´1
`
pY `Xq´1
pY `Xq´1
i4 i3 pY `Xqi2 i1 ´
i4 i3 pIp qi2 i1
16
16
! n
)ˇ
ˇm
n2
mn
´1
´1
´1
´
pIp q´1
pY
`Xq
`
pI
q
pI
q
trpY `Xq ˇY `X ˇ 4.
p i4 i3 p i2 i1 exp ´
i4 i3
i2 i1
16
16
4
So in general, it is clear that the repeated derivatives are) given by some polym
nomial in entries of pY ` Xq´1 , times expt´ n4 trpY ` Xq |Y ` X| 4 . We won’t
investigate further the nature of these polynomials beyond remarking that for
any indices 1 ď l ď 2k and 1 ď i1 , . . . , i2l ď p, and any symmetric matrices
X, Y P Sp pRq, we must have some crude bound
ˇ
ˇ
*
"
ˇ
ˇ
ˇ m4 ˇ
Bs
Bs
Bs
n
ˇ
ˇ
ˇ
...
exp ´ trpY `Xq Y `X ˇˇ
ˇ Bs Xi i
Bs Xi i Bs Xi i
4
¨
2l 2l´1
4 3
2 1
np
2
Chételat and Wells/Mid-scale Wishart asymptotics
l
ÿ
ÿ
ď
31
s
l
ˇ ź
ˇ
ˇ
ˇ
ˇ
ˇź
ˇ
ˇ
ˇpY `Xq´1
ˇ
ˇ
ˇ
pI
q
pn,
mq
ˇ
ˇaJ,s
p j2t j2t´1
j2t j2t´1
"t“1
*
ˇ
ˇm
n
¨ exp ´ trpY `Xq ˇY `X ˇ 4
4
for some polynomials aJ,s that do not depend on X or Y . We relegate a proof
of this result as Lemma 3 in Section 8. This can be uniformly bounded for all
0 ď X ď Ip by
l
! n
)“
ÿ
‰ mp
ď C1 pn, m, pq
trs pY ´1 q exp ´ tr Y 1 ` tr Y 4
(4.22)
4
s“0
s“0
t“s`1
JP
t1,...,pu2l
for some constant C1 pn, m, pq that does not depend on X or Y . But for any
n ě p ´ 2 and l ě 0,
ż
l
ÿ
)“
! n
‰ mp
trs pY ´1 q exp ´ tr Y 1 ` tr Y 4
4
s“0
np
! n
)ˇ ˇ m
n2
¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
2 2 Γp 2
C1 pn, m, pq
Y ą0
ż
“
n
np
2
l
C1 pn, m, pq ÿ
`n˘
np
2 2 Γp 2
s“0
“
1`tr Y
‰ mp
4
trs pY ´1 q
Y ą0
! n
)ˇ ˇ n`p`1 p`1
´ 2
exp ´ tr Y ˇY ˇ 4
dY
2
`
˘ ”
ı
´ n ¯ mp
Γp n`p`1
mp
4
4˘
`
E p1 ` tr Y q 4 trs pY ´1 q
“
n
2
Γp 2
`
˘
for a Y with a matrix gamma distribution Gp n`p`1
, n2 Ip . The Cauchy-Schwarz
4
inequality then entails the bound
˘ ”
`
ı 12
´ n ¯ mp
ı 21 ”
Γp n`p`1
mp
4
4
` n ˘ E p1 ` tr Y q 2
E tr2s pY ´1 q .
(4.23)
ď
2
Γp 2
The first expectation is always finite when n ě p ´ 2. Since tr2s pY ´1 q can be
written as a sum of zonal polynomials indexed by partitions of the integer 2s, the
results of Muirhead [1982, Theorem 7.2.13] imply that the second expectation
is finite whenever n`p`1
ą 2s ` p´1
4
2 ô n ě p ` 8s ´ 2. Thus, in Equation (4.20)
with l ď k and (4.21) with l ď 2k, whenever n ě p ` 16k ´ 2 we are justified
in repeatedly differentiating under the integral sign by the integrability bounds
given by Equations (4.22) and (4.23), and obtain in that case
ż
p´1qk
H1 pXq “
nk
p
ÿ
Y ą0 i1 ,...,i2k
Bs
Bs
Bs
...
Bs Xi1 i2k
Bs Xi3 i2 Bs Xi2 i1
(4.24)
Chételat and Wells/Mid-scale Wishart asymptotics
32
np
! n
)ˇ
! n
)ˇ ˇ m
ˇ m4
n2
ˇ
ˇ
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
exp ´ trpY `Xq Y `X
np
4
4
2 2 Γp 2
(4.25)
and
ż
p
ÿ
p´1qk
H2 pXq “
nk
i ,...,ik
Y ą0 1
Bs
Bs
Bs
...
Bs Xj1 jk
Bs Xj3 j2 Bs Xj2 j1
j1 ,...,jk
! n
)ˇ
ˇm
Bs
Bs
Bs
...
exp ´ trpY `Xq ˇY `X ˇ 4
Bs Xi1 ik
Bs Xi3 i2 Bs Xi2 i1
4
np
! n
)ˇ ˇ m
n2
¨ np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY.
4
2 2 Γp 2
(4.26)
Let us now look at how H1 pXq and H2 pXq behave
as X Ñ 0. On one hand,
a
?
for any symmetric matrix T we have | tr T k | ď p tr T 2k ď p|Ip ` T 2 |k{2 , so
we must have the bounds
ˇ
ˇ
ˇ
ˇ pn´4kq`p`1
k
2 ˇ´
4
?
ˇ
ˇ
ˇˇ
ˇ
n
C
16T
n,p
2k
i
n
trpT
Xq
ˇ tr T e
ˇψNW pT qˇˇ ď
ˇ
ˇ
ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ
ˇ
and
ˇ
ˇ
ˇ pn´4kq`p`1
ˇ
k
2 ˇ´
4
ˇˇ
ˇ 2 k i?n trpT Xq ˇ
ˇ
pn
C
16T
n,p
ˇψNW pT qˇˇ ď
ˇ tr T e
ˇ
ˇ
.
ˇ 16k Cn´4k,p Cn´4k,p ˇIp ` n ˇ
ˇ
holding uniformly in X. When n ´ 4k ě p ´ 2 ô n ě p ` 4k ´ 2, the right hand
sides are proportional to the density of the G-conjugates of the normalized
Wishart distributions with n ´ 4k degrees of freedom, so are integrable. Thus,
by the dominated convergence theorem and Equations (4.18) and (4.19),
ż
lim
XÑ0 H1 pXq
0ăXăIp
“
ˇ
ˇ
“
‰
lim ?
tr T 2k XÑ0 ei n trpT Xq ˇψNW pT qˇdT “ E tr T 2k
(4.27)
0ăXăIp
Sp pRq
and
lim
XÑ0 H2 pXq
0ăXăIp
ż
“
lim ei?n trpT Xq ˇˇψ pT qˇˇdT “ E“tr2 T k ‰
tr2 T k XÑ0
NW
(4.28)
0ăXăIp
Sp pRq
for T „ Tn{2 pI{ 8q.
On the other hand, the integrands at Equations (4.25) and (4.26) take a
particularly simple form. Lemma 4 establishes by induction that there must be
p1q
p2q
p1q
polynomials bκ and bκ in n, m and p with degrees deg bκ ď 2k ` 1 ´ qpκq
Chételat and Wells/Mid-scale Wishart asymptotics
33
p2q
and deg bκ ď 2k ` 2 ´ qpκq such that
ż
p´1qk
H1 pXq “
nk
ÿ
bp1q
κ pn, m, pqrκ prY
` Xs
|κ|ď2k
Y ą0
"
*
n
q exp ´ trpY ` Xq
4
np
ˇ
ˇm
¨ˇY ` X ˇ 4
and
´1
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
2 Γp 2
np
2
(4.29)
ż
p´1qk
H2 pXq “
nk
ÿ
bp2q
κ pn, m, pqrκ prY
|κ|ď2k`1
´1
` Xs
"
*
n
q exp ´ trpY ` Xq
4
Y ą0
np
! n
)ˇ ˇ m
n2
` n ˘ exp ´ tr Y ˇY ˇ 4 dY
(4.30)
4
2 Γp 2
for any 0 ă X ă Ip and n ě p ` 16k ´ 2. The sums are taken over all partitions
of the integers κ satisfying |κ| ď 2k and |κ| ď 2k ` 1 respectively, including the
empty partition. But for any integer partition κ, the bound
ˇm
ˇ
“
‰ mp
n
n
rκ prY ` Xs´1 qe´ 4 trpY `Xq ˇY ` X ˇ 4 ď tr|κ| pY ´1 qe´ 4 tr Y 1 ` tr Y 4
ˇ
ˇm
¨ˇY ` X ˇ 4
np
2
holds uniformly in 0 ď X ď Ip . Thus for |κ| ď 2k ` 1, the right hand side is
integrable for n ě p ` 16k ` 6, by the same argument as for Equation (4.23).
Thus for such n, by the dominated convergence theorem and Equations (4.29)
and (4.30), we obtain that
ż
lim
XÑ0 H1 pXq
0ăXăIp
“
p´1qk
nk
lim
XÑ0
0ăXăIp
Y ą0
ÿ
´1
bp1q
q
κ pn, m, pqrκ prY ` Xs
|κ|ď2k
"
*
np
! n
)ˇ ˇ m
ˇ
ˇm
n
n2
¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
4
2 2 Γp 2
k ÿ
“
‰
p´1q
´1
“
bp1q
q
(4.31)
κ pn, m, pq E rκ pY
nk
|κ|ď2k
and
lim
ż
XÑ0 H2 pXq
0ăXăIp
“
p´1qk
nk
lim
XÑ0
0ăXăIp
Y ą0
ÿ
´1
bp2q
q
κ pn, m, pqrκ prY ` Xs
|κ|ď2k`1
"
*
np
)ˇ ˇ m
! n
ˇ
ˇm
n2
n
¨ exp ´ trpY ` Xq ˇY ` X ˇ 4 np ` n ˘ exp ´ tr Y ˇY ˇ 4 dY
4
4
2 2 Γp 2
k
ÿ
“
‰
p´1q
´1
“
bp2q
q ,
(4.32)
κ pn, m, pq E rκ pY
k
n
|κ|ď2k`1
Chételat and Wells/Mid-scale Wishart asymptotics
34
where Y follows a Wp pn, Ip {nq distribution. Combining Equations (4.27)–(4.28)
with Equations (4.31)–(4.32) and Lemma 4 concludes the proof.
Something remarkable about Lemma 2 is that it provides us with an algorithm to compute the moments of a symmetric t distribution in terms of the
moments of an inverse Wishart matrix. For example, when k “ 1, repeated
differentiation yields that
p
! n
)ˇ
ÿ
ˇm
Bs
Bs
exp ´ trpY `Xq ˇY `X ˇ 4
BX
BX
4
i1 ,i2 s i1 i2 s i2 i1
„
mpm ´ 2q
mn
n2 p
“
trpY ` Xq´2 ´
trpY ` Xq´1 `
16
8
16
! n
)ˇ
ˇm
m 2
´ tr pY ` Xq´1 exp ´ trpY `Xq ˇY `X ˇ 4 . (4.33)
8
4
We can recognize trpY ` Xq´2 and tr2 pY ` Xq as the power sum polynomials
rp2q prY ` Xs´1 q and rp1,1q prY ` Xs´1 q in the sense of Equation (4.12), so we
p1q
p1q
p1q
p1q
must have bp2q “ mpm ´ 2q{16, bp1,1q “ ´m{8, bp1q “ mn{8 and b∅ “ n2 p{16 in
the
“ result
‰ of Lemma 4. Hence Lemma 2 really tells us that whenever n ě p ` 22,
E tr T 2 for T „ Tn{2 pIp {8q can be expressed as
“
‰ m “ 2 ´1 ‰
‰
mpm ´ 2q “
E tr Y ´2 `
E tr Y
E tr T 2 “ ´
16n
8n
‰ np
m “
E tr Y ´1 ´
(4.34)
`
8
16
where Y „ Wp pn, Ip {nq.
Of course, this also works with square moments and higher k. For example,
the same strategy
for,
“
‰ say, square moments with k “ 2 yields that whenever
n ě p ` 38, E tr2 T 2 for T „ Tn{2 pIp {8q can be expressed as
`
˘
“ 2 2‰
‰ m pm ´ 2q “
‰
m m2 ´ 5m ` 10 “
E tr T “ ´
E tr Y ´4 `
E tr Y ´3 tr Y ´1
2
2
16n
4n
`
˘
m m3 ´ 4m2 ` 20m ´ 32 “ 2 ´2 ‰
m2 “ 4 ´1 ‰
E tr Y
E tr Y
`
`
2
256n˘
64n2
` 2
‰ m pm ´ 2q “
‰
m m ´ 2m ` 16 “
E tr Y ´2 tr2 Y ´1 `
´
E tr Y ´3
2
64n
8n
`
˘
‰
m m2 ´ 2m ` 16 “
m2 “ 3 ´1 ‰
´
E tr Y ´2 tr Y ´1 `
E tr Y
64n
32n
‰ m p´m ` pq “ 2 ´1 ‰
m pmp ´ 2p ´ 8q “
`
E tr Y ´2 ´
E tr Y
128
64
‰ n2 p 2
mnp “
´
E tr Y ´1 `
(4.35)
64
256
again where Y „ Wp pn, Ip {nq.
Unfortunately, as we consider larger orders, the repeated differentiation of
expt´ n4 tr Zu|Z|m{4 quickly becomes too cumbersome to perform by hand. But
Chételat and Wells/Mid-scale Wishart asymptotics
35
at“ least ‰in theory,
“ we can
‰ compute expressions like (4.34) and (4.35) for any
E tr T 2k and E tr2 T k , and Lemma 2 summarize that fact. That is, using the
Fourier inversion theorem we have reduced the problem of computing moments
of the t-distribution Tn{2 pIp {8q to that of computing expected power sum polynomials of the inverse Wishart distribution W´1
p pn, Ip {nq, for large enough n.
How can we compute expected power sum polynomials of an inverse Wishart?
There are two approaches in the literature. Letac and Massam [2004] found an
expression in terms of a different basis, the zonal polynomials, which behave
particularly nicely with respect to the inverse Wishart distribution, and whose
expectations have a simple closed form. From this, they provided an algorithm
for computing expected power sum polynomials to arbitrary order. Matsumoto
[2012] found expressions of coordinate-wise moments in terms of modified Wiengarten orthogonal functions, from which expectations of power sum polynomials
can be computed. We follow the idea of Letac and Massam [2004] in our asymptotic analysis.
For any integer partition κ, there exist coefficients cκ,λ (which depend solely
on κ and λ) such that
ÿ
rκ pY ´1 q “
cλ Cλ pY ´1 q
|λ|“|κ|
for Cλ the so-called zonal polynomials. For an overview of the topic with a focus
on random matrix theory, see Muirhead [1982, Chapter 7]. The coefficients cκ,λ
are explicitly computable. If we follow the normalization of zonal polynomials
of Muirhead [1982], for example, we find that
“ ‰ “ ‰
„
„
„
r∅ “ C∅ ,
Cp2q
rp2q
1 ´ 21
and
.
“
(4.36)
“
‰ “
‰
Cp1,1q
rp1,1q
1 1
rp1q “ Cp1q ,
As mentioned, expectations of zonal polynomials with respect to a Wishart or
inverse Wishart distribution take a particularly simple form. From Muirhead
[1982, Theorem 7.2.13 and Equation (18) on p.237], the expected zonal polynomials for Y ´1 „ W´1
p pn, Ip {nq are
“
‰
n|λ|
E Cλ pY ´1 q “
Cλ pIp q
ś
qpλq
2|λ| i“1 m´i`1
2
śqpλq
i ´1
ź λź
2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq |λ| qpλq
p ` p1 ´ i ` 2lq
n
“
(4.37)
śqpλq
m
´ p1 ´ i ` 2lq
i“1 l“0
i“1 p2λi ` qpλq ´ iq!
“
‰
for λ ‰ ∅, and E C∅ pY ´1 q “ 1. For example, the first few expected zonal
polynomials are
“
‰
“
‰ np
,
E C∅ pY ´1 q “ 1,
E Cp1q pY ´1 q “
m
“
‰ 2n2 p pp ´ 1q
“
‰
n2 p pp ` 2q
E Cp1,1q pY ´1 q “
,
E Cp2q pY ´1 q “
.
3m pm ` 1q
3m pm ´ 2q
‰
“
‰
“
‰
“
From this, we can exactly compute E rκ pY ´1 q and thus E tr T 2k and E tr2 T k ,
Chételat and Wells/Mid-scale Wishart asymptotics
36
as a function of p and n (or m). For example, by Equation (4.36) we find that
“
‰
“
‰ np
E r∅ pY ´1 q “ 1,
E rp1q pY ´1 q “
,
m
“
‰
“
‰
n2 p pm ` pq
n2 p pmp ´ p ` 2q
, E rp2q pY ´1 q “
.
E rp1,1q pY ´1 q “
m pm ´ 2q pm ` 1q
m pm ´ 2q pm ` 1q
and thus, by Equation (4.34), whenever n ě p ` 38
‰
“
np pmp ` m ` 2q
E tr T 2 “
.
16 pm ´ 2q pm ` 1q
(4.38)
In a similar way, we can compute the expected zonal polynomials and hence,
the expected power sum polynomials of Y ´1 for |κ| “ 3, 4. So from Equation
(4.35), we obtain for n ě p ` 38 that
´
“
‰
n2 p
m3 p3 ` 2m3 p2
E tr2 T 2 “
256 pm ´ 6q pm ´ 2q pm ´ 1q pm ` 1q pm ` 3q
` 5m3 p ` 4m3 ´ 3m2 p3 ` 6m2 p2 ` 9m2 p ` 24m2 ´ 12mp3
¯
´ 36mp2 ` 36mp ´ 36p .
(4.39)
Of course, this reasoning also works for other k’s. In particular, we essentially derived a (potentially inefficient) algorithm to compute the moments of a
Tn{2 pIp {8q distribution to arbitrary order on our path to proving this theorem.
At this point, it is worthwhile to realize that Equations (4.38) and (4.39) are
already enough to prove the theorem for small moments. For example, when
n Ñ 8 such that p{n Ñ c P r0, 1q, then m „ p1 ´ cqn and
ˆ 2
˙
“
‰
m2
np
np
n
1
`
`
„
p2 ,
E tr T 2 “
pm ´ 2q pm ` 1q 16m 16m 8m2
16p1 ´ cq
“
‰
which proves that E tr T 2 “ Opp2 q. In fact,
ˆ
˙
„
m2
1
p
2
3
2
2
1 ´ 4T ¯2
´1“
`
`
`
` 2` 2
E tr ?
pm´2q pm`1q p m m mp m
p
p
m p
1
p
Ñ 0.
(4.40)
„ `
p m
Moreover, when n, p Ñ 8 such that p{n Ñ 0, then m „ n and
„ˆ
˙
2
‰ 32 “
‰2
1 ´ 4T ¯2
256 “
E
tr ?
´1
“ 4 E tr2 T 2 ´ 2 E tr T 2 ` 1
p
p
p
p
ˆ
5
m
5
4
2
22
“
` 3`
`
pm´6q pm´2q pm´1q pm`1q pm`3q p2
p
m mp
27
32
p2
6p
33
60
115
52
`
`
`
` 2` 2` 2 ` 2 2` 2 3
2
3
2
mp
mp
m
m
m
m p m p
m p
24
12p2
3p2
6p
3
118
93
96p
´ 3 ` 3` 3` 3 ` 3 2` 3 3´
´ 4
m
m
m
m p m p
m p
m4
m
Chételat and Wells/Mid-scale Wishart asymptotics
48
84
144
144
36
36
´ 4´ 4 ´ 4 2´ 5 ´ 5 ´ 5 2
m
m p m p
m
m p m p
2
p2
5
` 2 Ñ 0.
„ 2`
p
m m
37
˙
(4.41)
Thus
1 ´ 4T ¯2 L2
tr ?
ÝÑ 1 “ C1
p
p
and the theorem is proven for the second moment.
In theory, we could proceed in the same way for any moment of interest, but
naturally we could never conclude that the theorem holds for all moments that
way. Nonetheless, the calculations give us some hints about how to argue in the
general case.
The idea is to express the moments of the symmetric t distribution as polynomials of p and p{m. There are two regimes where random matrix theory is
well understood: the classical regime where p is held fixed as n Ñ 8, and the
linear, high-dimensional regime where p grows linearly with n. From this, we
can therefore conclude a few facts regarding the behavior of symmetric t moments in these regimes. But these moments are polynomials, and a polynomial
is a very rigid object: results from the two extreme cases where p is fixed and
p grows linearly will be enough to prove results for every regime in between,
yielding the first part of the theorem. Proving the second part will then be the
simple matter of applying the GOE approximation of Jiang and Li [2015] and
Bubeck et al. [2016] to the specific shape found for the symmetric t moments
while proving the first part, namely Equations (4.54) and (4.55).
Proof of Theorem 2. Recall the expected zonal polynomial of an inverse Wishart
W´1
p pn, Ip {nq is given by Equation (4.37). Based on the previous calculations,
it is tempting to define
śqpλq
qpλq
i ´1
ź λź
2|λ| |λ|! iăj p2λi ´ 2λj ´ i ` jq
m
1
cλ “
, Rλ pmq “
śqpλq
m
´
p1
´ i ` 2lq
i“1 l“0
i“1 p2λi ` qpλq ´ iq!
ˆ
˙
qpλq
i ´1
ź λź
p
1 ´ i ` 2l
and
Pλ pm, pq “
`
(4.42)
m
m
i“1 l“0
so that
“
‰
E Cλ pY ´1 q “ c1λ n|λ| Rλ pmqPλ pm, pq.
With these expressions the expected power sum polynomials can be written as
˜
¸
p
ÿ
ź
ź
“
‰
´1
1 |κ|
´1
E rκ pY q “
cκ,λ cλ n
Rµ pmq
Rµ pmq Pλ pm, pq
|λ|“|κ|
“
|µ|“|κ|
|µ|“|κ|
µ“λ
ź
ÿ
ź
n|κ|
¨
Rµ pmq ¨ m|κ|
cκ,λ c1λ
Rµ´1 pmqPλ pm, pq.
|κ|
m
|µ|“|κ|
|λ|“|κ|
|µ|“|κ|
µ“λ
Chételat and Wells/Mid-scale Wishart asymptotics
38
In other words, if we define
ź
1
R|µ|
“
Rµ pmq,
|µ|“|κ|
1
P|λ|
pm, pq
“ m|κ|
ÿ
cκ,λ c1λ
|λ|“|κ|
ź
Rµ´1 pmqPλ pm, pq
(4.43)
|µ|“|κ|
µ“λ
then
“
‰
n|κ| 1
1
E rκ pY ´1 q “ |κ| R|κ|
pmqP|κ|
pm, pq.
(4.44)
m
`
˘
ś
ś
λi ´1
qpλq
1´ 1´i`2l
But Rµ´1 pmq “ i“1 l“0
is a polynomial in 1{m, while Pλ pm, pq “
m
˘
śqpλq śλi ´1 ` p
1´i`2l
is a polynomial in p{m and 1{m, both of degree at
i“1
i“1
m `
m
most |µ| “ |λ| “ |κ|. Thus
ÿ
ź
1
cκ,λ c1λ
Rµ´1 pmqPλ pm, pq
P|κ|
pm, pq ” m|κ|
|λ|“|κ|
“ m|κ|
|κ| ÿ
|κ|
ÿ
i“0 j“0
|µ|“|κ|
µ“λ
bij
´ p ¯i 1
m mj
(4.45)
for some coefficients bij that don’t depend on m, p (or n). Define the polynomials
ř|κ|
fj pαq “ i“0 bij αi , so that
|κ| ´
ÿ
p ¯ ´j
1
P|κ|
pm, pq “ m|κ|
f
m .
(4.46)
m
j“0
Let us show that for all 0 ď`j ă |κ|´qpκq, the polynomial
fj must be identically
˘
zero over the interval α P 0, 1{ maxp|κ| ´ 2, 0q . Indeed, say this was not the
case, and let 0 ď j0 ă |κ|
˘ smallest j with the property that
` ´ qpκq1 be the
. As fj0 is a polynomial, by continuity
fj0 pα0 q ‰ 0 for some α0 P 0, maxp|κ|´2,0q
it must be non-zero in a neighborhood of α0 , so we may as well assume
α‰0 is
“
rational without loss of generality. Now look at what happens to E rκ pY ´1 q as
α0
p grows to infinity at the very specific linear rate p “ t 1`α
pn ´ 1qu. Since α0 is
0
rational, there must be a subsequence nl such that pl is exactly an integer (for
example, if α0 “ a{b with a, b integers, we can take nl “ pa ` bql ` 1). Then for
α0
pl “ 1`α
pnl ´ 1q, we have exactly pl “ α0 ml .
0
` α ˘´1
1
0
Since α0 ă maxp|κ|´2,0q
, then |κ| ă 1 ` 1`α
. Thus by Hölder’s inequality
0
and Lemma 5,
ı
“
‰
1
1
1 ”
lim |κ|´qpκq´j ¨ qpκq E rκ pY ´1 q ď 0 ¨ lim
E tr Y ´|κ| “ 0.
0
lÑ8 m
lÑ8 pl
p
l
l
On the other hand, by Equations (4.44) and (4.46), the definition of j0 and the
fact that R|κ| pmq Ñ 1 as m Ñ 8,
“
‰
1
1
lim
¨ qpκq E rκ pY ´1 q
lÑ8 m|κ|´qpκq´j0
pl
l
Chételat and Wells/Mid-scale Wishart asymptotics
ˆ
“ lim
lÑ8
“ p1 `
nl
ml
˙|κ|
ˆ
1
R|κ|
pml q
ml
pl
˙qpκq ÿ
|κ|
39
fj pα0 qmjl 0 ´j
j“j0
´qpκq
α0 q|κ| α0
fj0 pα0 q.
As α0 ą 0, fj0 pα0 q must therefore equal zero, a contradiction. Hence, as claimed,
the
˘ fj pαq for 0 ď j ă |κ| ´ qpκq all vanish over the interval
` polynomials
1
0, maxp|κ|´2,0q
.
But a polynomial can have an infinite number of zeros only if all its coefficients
are zero, so we conclude that
bij “ 0
for
0 ď j ă |κ| ´ qpκq.
Thus, from Equations (4.44) and (4.45) we have
“
‰ ´ n ¯|κ| qpκq 1
R|κ| pmqPκ2 pm, pq
m
E rκ pY ´1 q “
m
where
|κ|
|κ|
´ p ¯i
ÿ
ÿ
1
Pκ2 pm, pq “
bij
.
j´|κ|`qpκq
m m
i“0 j“|κ|´qpκq
Going back to equations (4.13) and (4.14) and plugging in the above yields
that as long as n ě p ` 16k ` 6,
“
‰ m2k`1 1
R2k pmqQp1q
(4.47)
E tr T 2k “
κ pm, pq,
nk
“
‰ m2k`2 1
E tr2 T k “
R2k`1 pmqQp2q
(4.48)
κ pm, pq
nk
where
1
p1q
ÿ ´
1 ¯|κ| R|κ| pmq bκ pn, m, pq 2
p
k
`
Qp1q
pm,
pq
“
p´1q
1`
P pm, pq,
κ
1 pmq
m m
R2k
m2k`1´qpκq κ
|κ|ď2k
k
Qp2q
κ pm, pq “ p´1q
1
p2q
ÿ ´
1 ¯|κ| R|κ| pmq bκ pn, m, pq 2
p
P pm, pq.
1` `
1
m m
R2k`1
pmq m2k`2´qpκq κ
|κ|ď2k`1
Now, for any a ď b, we can associate a partition µ of norm |µ| “ a with the
partition µ˚ “ pµ1 ` b ´ a, µ` 2, . . . , µqpµq q of norm |µ˚ | “ b, which satisfies
˚
˚
ˆ
qpµ
i ´1
ź q µź
i“1
j“0
1´i`2j
1´
m
ˆ
qpµq
i ´1
ź µź
˙
“
i“1 j“0
1´i`2j
1´
m
µ1 `b
˙ ´a´1
ź ˆ
j“µ1
˙
2j
1´
.
m
By definition for the Rµ pmq’s at Equation (4.42), this means that every factor
that appears in Rµ´1 pmq appears in Rµ´1
˚ pmq, so by definition of the R|µ| pmq’s
p1q
1
at Equation (4.43), Ra pmqR´1 pmq is a polynomial in m
. Moreover, as bκ and
p2q
bκ are polynomials of degrees d1 pκq ” 2k ` 1 ´ qpκq and d2 pκq ” 2k ` 2 ´ qpκq
Chételat and Wells/Mid-scale Wishart asymptotics
p1q
40
p2q
respectively, there exists coefficients cijl and cijl such that
p1q
bκ pn, m, pq
m2k`1´qpκq
“
1
md1 pκq
d1 pκq d1 pκq
dÿ
´i ´i´j
1 pκq ÿ
ÿ
i“0
j“0
d1 pκq d1 pκq
dÿ
´i ´i´j
1 pκq ÿ
ÿ
“
i“0
j“0
p1q
cijl mi nj pl
l“0
1
p1q
cijl
l“0
md1 pκq´i´j´l
´
p
1 ¯j ´ p ¯l
1` `
m m
m
and
p2q
bκ pn, m, pq
m2k`2´qpκq
“
1
md2 pκq
d2 pκq d2 pκq
dÿ
´i ´i´j
2 pκq ÿ
ÿ
i“0
j“0
d2 pκq d2 pκq
dÿ
´i ´i´j
2 pκq ÿ
ÿ
“
i“0
j“0
l“0
p2q
cijl
p2q
cijl mi nj pl
l“0
´
1 ¯j ´ p ¯l
p
`
.
1`
m m
m
md2 pκq´i´j´l
1
As d1 p´i ´ j ´ l ě 0q, j, l ě 0 in the first case and d2 pκq ´ i ´ j ´ l, j, l ě 0
in the second case, we conclude that these two expressions are polynomials
p
1
in m
and m
. Therefore, looking back at (4.47) and (4.48), we conclude that
p2q
p1q
p
1
the Qκ pm, pq’s and Qκ pm, pq’s are polynomials in m
and m
. Therefore, if
p1q
p2q
n ě p ` 16k ` 6 there must be coefficients aij , aij and large enough integers
D1 , D2 such that
D1 ÿ
i
j
ÿ
“
‰ m2k`1
p1q p
E tr T 2k “
R
pmq
a
2k
ij
nk
mi
i“0 j“0
D1
´ m ¯k
ÿ
p1q
“
R2k pmq
gi ppqmk`1´i
(4.49)
n
i“0
D2 ÿ
i
j
ÿ
“
‰ m2k`2
p2q p
E tr2 T k “
R
pmq
a
2k`1
ij
nk
mi
i“0 j“0
D2
´ m ¯k
ÿ
p2q
“
R2k`1 pmq
gi ppqmk`2´i
(4.50)
n
i“0
p1q
for polynomials gi ppq “
i
ř
j“0
p1q
p2q
p1q
i
ř
p2q
aij pj .
j“0
p2q
gi must vanish
aij pj and gi ppq “
We will now proceed to show that gi and
on N for 0 ď
i0 ă k ` 1 and 0 ď i0 ă k ` 2 respectively. Our argument relies on the analysis
of the asymptotic behavior of the moments of T in the classical regime where p
is held fixed while n grows
to‰infinity.“
“
‰
Observe first that E tr T 2k and E tr2 T k must have a finite limit as n Ñ 8
with p held fixed. Indeed, since 16T 2 {n is positive definite, |Ip ` 16T 2 {n| is
Chételat and Wells/Mid-scale Wishart asymptotics
41
greater than one and so we have the bound
ż
‰
“
E tr T 2k “ Cn,p
tr T
2k
ˇ
ˇ n`p`1
2 ˇ´ 4
ˇ
ˇIp ` 16T ˇ
dT
ˇ
n ˇ
Sp pRq
ż
ď Cn,p
ˇ
ˇ´ n
ˇ
16T 2 ˇˇ 4
tr T 2k ˇˇIp `
dT.
n ˇ
Sp pRq
pp3p`1q
4
ppp`1q
4
When p is held fixed, lim Cn,p “ 2
{π
by Lemma 1. Moreover,
nÑ8
n
n
ˇ
ˇ
ˆ
˙
p
´
´
2ˇ 4
4
ź
ˇ
λi p4T 2 q
ˇIp ` 16T ˇ
“
1`
ˇ
ˇ
n
n{4
i“1
for λ1 p4T 2 q ě ¨ ¨ ¨ ě λp p4T 2 q ě 0 the eigenvalues of 4T 2 , and p1 ` x{nq´n is
monotone decreasing towards exppxq. Therefore, for a fixed dimension p we can
apply the monotone convergence theorem to obtain that
ż
pp3p`1q
“
‰
2 4
lim E tr T 2k ď
ppp`1q
nÑ8
π 4
“
‰
2
tr T 2k e´4 tr T dT “ E tr Z 2k ă 8
(4.51)
Sp pRq
for Z „ GOEppq{4. Repeating the argument with tr2 T k yields similarly
ż
pp3p`1q
4
“
‰
2
lim E tr2 T k ď
ppp`1q
π 4
nÑ8
“
‰
2
tr2 T k e´4 tr T dT “ E tr2 Z k ă 8.
(4.52)
Sp pRq
“
‰
“
‰
Thus indeed E tr T 2k and E tr2 T k have finite limits when p is held fixed.
p1q
p2q
We can use this to show that gi and gi must vanish on N for 0 ď i0 ă k `1
and 0 ď i0 ă k ` 2 as follows. Say the first statement wasn’t true, and let
p1q
0 ď i0 ă k ` 1 be the smallest i such that for some p0 P N, gi0 pp0 q ‰ 0. Then
“
‰
by Equation (4.49) and the definition of i0 , the limit of E tr T 2k as n Ñ 8
with p fixed at p0 satisfies
“
‰
D1
ÿ
E tr T 2k
p1q
p1q
k
“
1
¨
1
¨
lim
gi pp0 qmi0 ´i “ gi0 pp0 q.
lim
nÑ8
nÑ8 mk`1´i0
i“i
0
But m “ n´p´1 tends to infinity as n tends to infinity, and since k `1´i0 ą 0,
“
‰
p1q
Equation (4.51) means that E tr T 2k {mk`1´i0 must tend to zero. Thus gi0 pp0 q
has to equal zero, which contradicts our assumption. Thus for every 0 ď i ă k`1,
p1q
the polynomial gi must vanish on N.
p2q
Similarly, for 0 ď i ă k ` 2, the polynomial gi must vanish on N, because
if it wasn’t the case, we could take 0 ď i0 ă k ` 2 as the smallest i with the
p2q
property that for some p0 P N, gi0 pp0 q ‰ 0, and then by Equation (4.50) with
Chételat and Wells/Mid-scale Wishart asymptotics
42
p fixed at p0 as n Ñ 8 we would get
“
‰
D2
ÿ
E tr2 T k
p2q
p2q
k
“
1
¨
1
¨
lim
gi pp0 qmi0 ´i “ gi0 pp0 q.
lim
nÑ8
nÑ8 mk`2´i0
i“i
0
But then by Equation (4.52), as m tends to infinity and k ` 2 ´ i0 ě 1 the
“
‰
p2q
ratio E tr2 T k {mk`2´i0 must tend to zero. Thus we must have gi0 pp0 q “ 0, a
p2q
contradiction. Hence indeed for 0 ď i ă k ` 2, the polynomial gi must vanish
on N.
But of course, a polynomial can only have an infinite number of zeroes if its
coefficients are all zero, so we must have
p1q
for
0 ď i ă k ` 1,
p2q
for
0 ď i ă k ` 2.
aij “ 0
aij “ 0
(4.53)
Now say that p varies with n in such a way that limnÑ8 p{n “ α ă 1. Then
for large enough n, n ě p ` 16k ` 6 so by Equations (4.49) and (4.53),
D1 ÿ
i
´ m ¯k
j´pk`1q
ÿ
“
‰
1
p1q p
R2k pmq
aij i´pk`1q
lim k`1 E tr T 2k “ lim
nÑ8 n
nÑ8 p
m
i“k`1 j“0
«
p1q
D1 ÿ
k
ÿ
aij
“ p1 ´ αqk ¨ 1 ¨ lim
i´pk`1q ppk`1q´j
nÑ8
m
i“k`1 j“0
ff
D1
i
´ p ¯j´pk`1q 1
ÿ
ÿ
p1q
`
aij
m
mi´j
i“k`1
j“k`1
ff
«
˙
ˆ
p1q
D1
i´pk`1q
k
ÿ
ÿ
ak`1
α
p1q
(4.54)
“ p1 ´ αqk
`
a
`
˘pk`1q´j
ii
1´α
j“0 lim p
i“k`1
pÑ8
and by Equations (4.50) and (4.53),
D2 ÿ
i
´ m ¯k
j´pk`2q
ÿ
“
‰
1
p2q p
lim k`2 E tr2 T k “ lim
R2k`1 pmq
aij i´pk`2q
nÑ8 p
nÑ8 n
m
i“k`2 j“0
«
p2q
D
k`1
ÿ2 ÿ
aij
“ p1 ´ αqk ¨ 1 ¨ lim
i´pk`2q
nÑ8
m
ppk`2q´j
i“k`2 j“0
ff
D1
i
´ p ¯j´pk`2q 1
ÿ
ÿ
p2q
`
aij
m
mi´j
i“k`2 j“k`2
«
ff
ˆ
˙
p2q
D2
i´pk`2q
k`1
ÿ
ÿ
ak`2
α
p2q
“ p1 ´ αqk
aii
.
(4.55)
`
˘pk`2q´j `
1´α
j“0 lim p
i“k`2
pÑ8
Although we might not know what aij coefficients are, this shows at least that
the limits are finite.
In‰ particular, from “Equations
(4.54) and (4.55) we can
“
‰
conclude that E tr T 2k “ Oppk`1 q and E tr2 T k “ Oppk`2 q, which shows the
first claim of the theorem.
For the second claim, let n, p Ñ 8 with p{n Ñ α “ 0. Then Equations (4.54)
Chételat and Wells/Mid-scale Wishart asymptotics
43
and (4.55) specialize to
lim
nÑ8
1
pk`1
1
lim
nÑ8 pk`2
“
‰
p1q
E tr T 2k “ apk`1qpk`1q ,
“
‰
p2q
E tr2 T k “ apk`2qpk`2q .
(4.56)
What is interesting about this result is that these limits must be the same
regardless of the way p grows! As long as p Ñ 8 with p{n Ñ 0, the limits are
?
p1q
p2q
apk`1qpk`1q and apk`2qpk`2q , regardless of whether p „ log n or p „ n or some
other growth.
Now, Bubeck et al. [2016, Theorem 7] and Jiang and Li [2015, Theorem 1]
have shown that when p Ñ 8?with p3 {n Ñ 0, the total variation distance
between a normalized Wishart npWp pn, Ip {nq ´ Ip q matrix and a Gaussian
Orthogonal Ensemble GOEppq matrix tends to zero as n Ñ 8. Therefore, the
Hellinger distance satisfies also H 2 pψNW , ψGOE q “ H 2 pfNW , fGOE q Ñ 0 as n Ñ
8.
But convergence in Hellinger distance has strong implications for real-valued
statistics. Indeed, for T1 „ Tn{2 pIp {8q “ |ψNW |, T2 „ GOEppq{4 “ |ψGOE | and
any function g : Sp pRq Ñ R such that gpT1 q, gpT2 q are square-integrable,
ˇ
ˇ ˇˇ
”
ı ˇˇ
ˇ
ˇ
gpT q |ψNW |pT q ´ |ψGOE |pT q dT ˇˇ
ˇ ErgpT1 qs ´ ErgpT2 qs ˇ “ ˇˇ
ż
Sp pRq
ż
ˇ
ˇ
ď ˇˇ
”
ı ˇˇ
1{2
1{2
1{2
gpT qψNW pT q ψNW pT q ´ ψGOE pT q dT ˇˇ
Sp pRq
ˇ
ˇ
` ˇˇ
ż
”
ı ˇˇ
1{2
1{2
1{2
gpT qψGOE pT q ψNW pT q ´ ψGOE pT q dT ˇˇ
Sp pRq
ż
ż
„
1
gpT q2 |ψNW |pT qdT 2 `
ď
Sp pRq
ż
¨
1
gpT q2 |ψGOE |pT qdT 2
Sp pRq
ˇ
ˇ2 1
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψGOE pT qˇ dT 2
S pRq
p
1
1
“
‰
“
‰
“ E gpT1 q2 2 ` E gpT2 q2 2 HpψNW , ψGOE q
„
(4.57)
by the Cauchy-Schwarz inequality.
Let’s consider applying this result to gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2 .
What do we know about these statistics? In the case where T2 „ GOEppq{4,
results of Anderson et al. [2010, Lemma 2.1.6 and the equation above Equation
(2.1.21)] provide that
„
tr T22k
Ck
lim E k`1
“ 2k
nÑ8
p
4
Chételat and Wells/Mid-scale Wishart asymptotics
44
„ 2 k
˙2
´ „ tr T k ¯2 ˆ C
tr T
k{2
2
lim E k`22
“
1
rk
evens
“ lim E k{2`1
nÑ8
nÑ8
p
4k
p
„´
„
ˆ
˙2
´
tr T22k ¯2
tr T22k ¯2
Ck
lim E
“ lim E k`1
ă8
“
nÑ8
nÑ8
pk`1
p
42k
„
„´ 2 k ¯
tr T24k
tr T2 2
C2k
ď
lim
E
lim E
“ 4k ă 8
nÑ8
nÑ8
pk`2
p2k`1
4
because these expressions only depend on p, and since p Ñ 8 as n Ñ 8, taking
a limit as n Ñ 8 is the same as taking a limit as p Ñ 8. Moreover, in the
T1 „ Tn{2 pIp {8q case, using Jensen’s inequality and Equations (4.54)–(4.55) we
can at least see that
„´
„
tr T12k ¯2
tr T14k
lim E
ď lim E 2k`1 ă 8
nÑ8
nÑ8
pk`1
p
„ 2 2k
„´ 2 k ¯
2
tr T1
tr T1
ď lim E
ă 8.
lim E
nÑ8
nÑ8
pk`2
pk`2
Therefore, using Equation (4.57) with gpT q “ tr T 2k {pk`1 and gpT q “ tr2 T k {pk`2
we find that when n, p Ñ 8 with p3 {n Ñ 0,
ˇ
ˇ
„
ˆ
„´
1
˙
2k
ˇ
Ck ˇˇ
tr T12k ¯2 2
C2k
ˇ lim E tr T1
´ 2k ˇ ď
lim E
` 2k ¨ 0 “ 0,
ˇ nÑ8
nÑ8
pk`1
4
pk`1
4
ˇ
ˇ
„ 2 k ´
¯
2ˇ
ˇ
Ck{2
ˇ lim E tr T1 ´
1rk evens ˇˇ
ˇ nÑ8
k`2
k
p
4
ˆ
„´ 2 k ¯ 12
1{2 ˙
C2k
tr T1 2
ď
lim E
` 2k ¨ 0 “ 0.
nÑ8
pk`2
4
Since p3 {n Ñ 0 implies p{n Ñ 0, we conclude from Equation (4.56) that
2
Ck{2
Ck
p1q
p2q
2
apk`1qpk`1q “ 2k ,
apk`2qpk`2q “ 2k 1rk evens .
4
4
But then, by that same equation, we conclude that when n, p Ñ 8, not only
when p3 {n Ñ 0 but for all p such that p{n Ñ 0, we have
“
‰
Ck
1
lim
E tr T 2k “ 2k ,
nÑ8 pk`1
4
(4.58)
2
“ 2 k ‰ Ck{2
1
2
lim k`2 E tr T “ 2k 1rk evens
nÑ8 p
4
for
“ T „‰Tn{2 pIp {8q. To finish the proof, use Equation (4.58) with the fact that
E tr T k “ 0 for odd k to find that
„
„ 2 k
„
2
tr T k
tr T
tr T k
lim Var k{2`1 “ lim E k`2 ´ E k{2`1
nÑ8
nÑ8
p
p
p
2
´
¯2
Ck{2
Ck{2
2
“ 2k 1rk evens ´
1
rk
evens
“ 0.
4
4k
L2
Thus tr T k {pk`1 ÝÑ Ck {42k , as desired. This proves the second claim and
concludes the proof.
Chételat and Wells/Mid-scale Wishart asymptotics
45
A pleasant consequence of this result is that when n, p Ñ 8 with p{n Ñ 0, we
can conclude a version of the semicircle law holds for the Tn{2 p2Ip q distribution.
This is interesting because the Tn{2 p2Ip q distribution has dependent entries with
heavy tails, whose distribution varies with n, p.
?
?
?
?
Let 4T { p „ 4Tn{2 pIp {8q{ p, with eigenvalues λ1 p4T { pq ě ¨ ¨ ¨ ě λp p4T { pq.
Then define its empirical spectral measure to be
p
?
1ÿ
L4T {?p pAq “
1rλi p4T { pq P As .
p i“1
Since L4T {?p depends on the random matrix T , it is a random measure on R.
Corollary 1 (Semicircle law for the t distribution). The empirical spectral
?
measure L4T {?p of a 4Tn{2 pIp {8q{ p random matrix converges weakly, in square
mean, to the semicircle distribution
ż ?
4 ´ x2
1r|x| ď 2s dx.
LpAq “
2π
A
Proof. Let f be any continuous function R Ñ R that vanishes at infinity. By
the Stone-Weierstrass theorem, there exists a sequence f1 , f2 , . . . of polynomials
such that for any ą 0, supxPR |f pxq ´ fl pxq| ă . To fix some notation, write
fl pxq “
degf
ÿl
alk xk .
k“1
Then since L4T {?p and L are both probability measures,
«ˆ ż
˙2 ff 12
ż
f pxqdL4T {?p pxq ´ f pxqdLpxq
E
R
R
«ˆ ż
˙2 ff 21
“
‰
f pxq ´ fl pxq dL4T {?p pxq
ď E
R
«ˆ ż
˙2 ff 21
ż
fl pxqdL4T {?p pxq ´ fl pxqdLpxq
`E
R
R
«ˆ ż
˙2 ff 21
“
‰
`E
fl pxq ´ f pxq dLpxq
R
ď `
degf
ÿl
k“1
«ˆ
˙2 ff 21
1 ´ 4T ¯k
|alk | E
tr ?
´ Ck{2 1rk evens
` .
p
p
By Theorem 2, the expectation tends to zero as n, p Ñ 8 with p{n Ñ 0. Thus
«ˆ ż
˙2 ff 21
ż
lim E
f pxqdL4T {?p pxq ´ f pxqdLpxq
ď 2.
nÑ8
R
R
But this is true for every ą 0, so the limit must
ş be zero. Hence for every continuous f that vanishes at infinity, the integral f dL4T {?p converges in square
Chételat and Wells/Mid-scale Wishart asymptotics
46
ş
mean to f dL. By Chung [2001, Theoremş 4.4.1 and 4.4.2], this implies that for
every bounded continuous f , the integral f dL4T {?p converges in square mean
ş
to f dL. Thus the empirical spectral distribution L4T {?p converges weakly, in
square mean, to the semicircle distribution L, as desired.
5. Wishart asymptotics: the G-transform point-of-view
We now turn our attention to the main objective of this paper, namely studying
the behavior of Wishart matrices in the various middle-scale regimes. To do
this, we exploit the close connection between the Wishart and the symmetric
t distributions and make use of the results found Section 4. The main result
of this section, Theorem 3, states that we can approximate for every middlescale regime the G-transform ψNW of a normalized Wishart by a degree-specific
function ψK . This can be seen as an analogue of Theorem 1 in the G-transform
domain.
The reasoning behind the approximations is as follows. We could imagine
writing ψNW from Proposition 3 in exponential form, and expanding the terms
as a Taylor series would yield
ˇ
ˇ*
"
ˇ
?
4T ˇˇ
n`p`1
ˇ
log ˇIp ` i ? ˇ
ψNW pT q “ Cn,p exp 2i n tr T ´
2
n
"
ˆ
˙k *
8
´
?
n ` p ` 1 ÿ p´iqk p ¯ k2
4T
tr ?
.
“ Cn,p exp 2i n tr T `
2
k
n
p
k“1
Now imagine that the T ’s appearing in the expression follow a Tn{2 pIp {8q dis` 4T ˘k
tribution. By Theorem 2, we know that tr ?
“ Θppq when k is even, in
p
` 4T ˘k
2
an L sense. When k is odd, the theorem merely proves that tr ?
“ oppq,
p
k
but for a GOEppq matrix Z, we know that tr ?Zp is asymptotically normal
for odd k by Anderson et al. [2010, Theorem 2.1.31]. This would suggest that
` 4T ˘k
tr ?
“ Θp1q when k is odd. Thus we would have, in some sense,
p
"ÿ
ˆ k{2`1 ˙ ÿ
ˆ k{2 ˙ *
8
8
p
p
ψNW pT q “ Cn,p exp
Θ
`
Θ
k{2´1
k{2´1
n
n
k“2
k“2
even
“ Cn,p exp
"ÿ
8
k“0
odd
ˆ
Θ
k`2
p
nk
8
ÿ
˙
`
k“1
˜c
Θ
pp2k´1q`2
n2k´1
¸*
.
In other words, terms in the power series would be associated with some degree
K, such that they would be non-negligible in any middle-scale regime of degree
up to K, and negligible in higher degrees. In fact, a similar phenomenon occurs
with Cn,p , by Lemma 1. This suggests we should try truncating these power
series to derive degree-specific approximations.
Definition 3 (G-transform approximations). For any K P N, define the K th
Chételat and Wells/Mid-scale Wishart asymptotics
47
degree approximation ψK : Sp pRq Ñ C as
$ 2K`3`
,
2K`2´
’
/
odds
1
rK odds
& 1rK
.
ÿ
ÿ
¯
¯
´
´
k
k
k
k
pKq
p `1
4i tr T
4i tr T
ψK pT q “ Cn,p exp n
?
?
`
’
/
%2
n
k
2
n
k k“2
with
pKq
Cn,p
“
2
pp3p`1q
4
π
ppp`1q
4
k“1
" K`1
1 ÿ 1rk evens pk`2
exp ´
2 k“1 kpk`1qpk`2q nk
*
K`1
1 ÿ 1`21rk evens pk`1
´
.
4 k“1
kpk`1q
nk
Just like the G-transform of a normalized Wishart matrix, these functions
implicitly depend on n. The first three are
"
*
pp3p`1q
32
p`1
p`1
2 4
tr T 2 ,
ψ0 pT q “ ppp`1q exp ´4 tr T 2 ´i ? tr T 3 `2i ? tr T ´4
3 n
n
n
π 4
" 2
pp3p`1q
2 4
32
32
512
p
ψ1 pT q “ ppp`1q exp ´
´4 tr T 2 ´i ? tr T 3 ` tr T 4 `i 3{2 tr T 5
8n
3 n
n
5n
π 4
*
p
`
1
p
`
1
32pp
` 1q
1024
6
2
3
tr T `2i ? tr T ´4
tr T ´i
tr T
´
3n2
n
n
3n3{2
and
"
pp3p`1q
2 4
p4
32
32
p2
ψ2 pT q “ ppp`1q exp ´
´4 tr T 2 ´i ? tr T 3 ` tr T 4
´
2
48n
8n
3
n
n
4
π
512
1024
8192
p`1
`i 3{2 tr T 5 ´
tr T 6 ´i 5{2 tr T 7 `2i ? tr T
2
3n
n
5n
7n
p`1
32pp
`
1q
p
`
1
´4
tr T 2 ´i
tr T 3 `32 2 tr T 4
3{2
n
n
3n
*
512pp ` 1q
1024pp ` 1q
5
6
`i
tr
T
´
tr
T
.
3n3
5n5{2
These functions have the pleasant property that their modulus is bounded, up
to a constant, by the G-conjugate density |ψK |. Indeed, on one hand we can
rewrite Definition 3 into
K`1`
$
1rK
odds
’
? 2k
ÿ
&
n
tr p4T { nq
pKq
ψK pT q “ exp log Cn,p `
p´1qk
’
2
2k
%
k“1
K`1´
1rK odds
p`1
`
2
ÿ
p´1q
k“1
?
k tr p4T {
2k
2k
nq
K`1
n
´i
2
ÿ
k“1
p´1qk
? 2k`1
tr p4T { nq
2k ` 1
Chételat and Wells/Mid-scale Wishart asymptotics
48
,
? 2k`1 /
.
tr p4T { nq
´i
p´1qk
. (5.1)
/
2
2k ` 1
k“1
?
`
˘
On the other hand, for any x P R, we can write 1 ` ix “ 1 ` x2 exp i atanpxq
with the arctangent function taking values in p´π{2, π{2q. Thus by Proposition
3 we can rewrite ψNW as
ˇ
ˇ
"
ˇ
16T 2 ˇˇ
n`p`1
ˇ
log ˇIp `
ψNW pT q “ exp log Cn,p ´
4
n ˇ
ˆ
˙
*
?
n`p`1
4T
´i
tr atan ?
` 2i n tr T ,
(5.2)
2
n
with the understanding that the matrix-variate arctangent function operates on
eigenvalues by functional calculus. Now, for any x P R and odd integer L, there
is an elementary inequality
L
ÿ
1
x2l
ď ´ logp1 ` x2 q.
p´1ql
2l
2
l“1
K
ÿ
p`1
Notice that K ` 1 ˘ 1rK odds is always an odd integer. Thus, from the above
inequality and Equations (5.1) and (5.2), we can derive the bound
ˇ
! ´n p ` 1¯
ˇ ˇ
16T 2 ˇˇ)
ˇ
pKq
ˇψK ˇpT q ď Cn,p
exp ´
`
log ˇIp `
ˇ
4
4
n
pKq
ˇ
Cn,p ˇˇ
“
ψNW ˇpT q.
(5.3)
Cn,p
In particular, since ψNW is integrable whenever n ě p ´ 2 by Proposition 3,
Equation (5.3) implies that every ψK must also be integrable whenever n ě p´2.
In particular, for large enough n it makes sense to talk about the asymptotic
total variation or Hellinger distance between ψNW and ψK .
We now state the main result, which is that each function ψK approximates
the G-transform of a normalized Wishart for all middle-scale regimes of degree
K or lower, but no other.
log p
Theorem 3.Let lim log
n ă 1 as n Ñ 8. For any K P N, the total varianÑ8
tion
distance
between
the
G-transform of the normalized Wishart distribution
?
nrWp pn, Ip {nq ´ Ip s and the K th approximating function ψK satisfies
ż
`
˘
dTV ψNW , ψK “
ˇ
ˇ
ˇψNW pT q ´ ψK pT qˇ dT Ñ 0
as n Ñ 8
Sp pRq
if and only if pK`3 {nK`1 Ñ 0.
Proof. If statement. For the first part of the theorem, remark that by Equation
(3.7) it is equivalent to show that the Hellinger distance tends to zero, i.e. that
ż
`
˘
H2 ψNW , ψK “
ˇ
ˇ2
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψK pT qˇ dT Ñ 0
Sp pRq
as n Ñ 8
Chételat and Wells/Mid-scale Wishart asymptotics
49
when pK`3 {nK`1 Ñ 0. To control this quantity, we use the Kullback-Leibler
inequality for G-transforms. Notice that for any x P R and L P N,
ˇ
ˇ
L´1
ˇ 1
2l ˇ
ÿ
x2L
ˇ
2
lx ˇ
p´1q
,
(5.4)
ˇ ď
ˇ´ logp1 ` x q ´
ˇ 2
2l ˇ
2L
l“1
ˇ
ˇ
L´1
ˇ
2l`1 ˇ
ÿ
x2L
x
ˇ
ˇ
p´1ql
.
(5.5)
ˇ ď
ˇatanpxq ´
ˇ
2l ` 1 ˇ
2L
l“1
Let Log stand for the principal branch of the complex logarithm, and let us
study Log ψNW {ψK . Its real part can be bounded by
ˇ
ˇ
ˇ ˇˇ
ˇ
ˇ
2ˇ
ˇ
ˇ
ˇ
pKq
ˇ< Log ψNW pT q ˇ “ ˇˇ log Cn,p ´ n ` p ` 1 log ˇIp ` 16T ˇ ´ log Cn,p
ˇ
ˇ
ψK pT q ˇ ˇ
4
n ˇ
ˇ
K`1`
K`1´
k“1
k“1
1rK
odds
1rK
odds
? 2k
? 2k
ÿ
ÿ
n
p`1
tr p4T { nq
k tr p4T { nq
´
´
p´1q
p´1qk
2
2k
2
2k
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
K`1`
ˇ
ˇ
1rK
odds
ˇ
ˇ
ˇ
ˇ
ˇ
ˇ
?
ÿ
2k
ˇ
ˇ
2ˇ
ˇ
ˇ nˇ 1
ˇ
16T
tr
p4T
{
nq
ˇ
pKq
k
ˇ´
ď ˇˇ log Cn,p ´log Cn,p ˇˇ ` ˇ´ log ˇˇIp `
p´1q
ˇ
ˇ
2ˇ 2
n ˇ
2k
ˇ
ˇ
k“1
K`1´
ˇ
ˇ
odds
ˇ
ˇ
ˇ 1rK
? 2k ˇˇ
ÿ
ˇ
2
ˇ
16T ˇˇ
p`1ˇ 1
tr p4T { nq ˇ
´
`
p´1qk
ˇ´ log ˇˇIp `
ˇ.
ˇ
ˇ
2 ˇ 2
n
2k
ˇ
ˇ
k“1
By Equation (5.4), this can be bounded by
ˇ
ˇ
?
ˇ
ˇ n trp4T { nq2K`4`21rK odds
pKq ˇ
ˇ
ď ˇ log Cn,p ´log Cn,p ˇ `
2 2K ` 4 ` 21rK odds
?
p ` 1 trp4T { nq2K`4´21rK odds
`
2
2K ` 4 ´ 21rK odds
ˇ
ˇ
2K`3`21rK odds
ˇ
ˇ
4
tr T 2K`4`21rK odds
pKq ˇ
“ ˇˇ log Cn,p ´log Cn,p
ˇ ` K ` 2 ` 1rK odds nK`1`1rK odds
42K`3´21rK odds pp ` 1q tr T 2K`4´21rK odds
.
(5.6)
K ` 2 ´ 1rK odds
nK`2´1rK odds
We can bound the imaginary part of Log ψNW {ψK in a similar way. Define
x
Pp´π,πs : R Ñ p´π, πs to be the projection mapping Pp´π,πs x “ x ´ 2πr 2π
´ 12 s.
A plot is given as Figure 4.
It satisfies = Log z “ Pp´π,πs = log z for all branches of log z, as well as the
inequality |Pp´π,πs x| ď |x|. Using this mapping, we can see that the imaginary
`
Chételat and Wells/Mid-scale Wishart asymptotics
50
y
π
-5π
-3π
-π
π
3π
5π
x
-π
Fig 4. Plot of Pp´π,πq on p´5π, 5πs.
part of Log ψNW {ψK can be bounded as
ˇ
»
ˇ ˇˇ
ˇ
ˆ
˙
ˇ
ˇ
?
n`p`1
4T
ˇ= Log ψNW pT q ˇ “ ˇˇ Pp´π,πs—
tr atan ?
` 2 n tr T
–´
ˇ
ˇ
ˇ
ψK pT q
2
n
ˇ
fiˇ
K
? 2k`1
? 2k`1 ˇˇ
ÿ
p`1
tr p4T { nq
tr p4T { nq
ffiˇ
`
`
p´1qk
p´1qk
flˇ
ˇ
2
2k ` 1
2
2k ` 1
ˇ
k“1
k“1
ˇ
ˇ
ˇ
K`1
ˆ
˙
?
? 2k`1 ˇˇ
ÿ
4T
2 n tr T
n ˇˇ
ˇ
k tr p4T { nq
´
´
ď ˇ tr atan ?
p´1q
ˇ
ˇ
2ˇ
n
n{2
2k ` 1
ˇ
ˇ
k“1
ˇ
ˇ
ˇ
K
˙ ÿ
ˆ
? 2k`1 ˇˇ
ˇ
p`1ˇ
4T
tr p4T { nq
ˇ
`
´
p´1qk
ˇ tr atan ?
ˇ.
ˇ
2 ˇ
n
2k ` 1
ˇ
ˇ
k“1
K`1
ÿ
n
By Equation (5.5), this can be bounded by
?
?
p ` 1 trp4T { nq2K`2
n trp4T { nq2K`4
`
ď
2
2K ` 4
2
2K ` 2
2K`3
2K`4
2K`1
4
tr T
4
pp ` 1q tr T 2K`4
ď
`
.
(5.7)
K`1
K `2 n
K `1
nK`1
Recall that the G-conjugate of the normalized Wishart distribution is the t distribution with n{2 degrees of freedom and scale matrix Ip {8, denoted Tn{2 pIp {8q
– see Equation (3.24) and Section 4 for details. Let us bound the expectations of
these absolute real and imaginary parts under this distribution. By Equations
(5.10), (5.6), (5.7) and Theorem 2, we find that for T „ |ψNW | “ Tn{2 pIp {8q,
‰
“
ˇ
„ˇ
2K`3`21rK odds E tr T 2pK`2`1rK oddsq
ˇ
ˇ
ψ
pT
q
4
NW
ˇ ď
E ˇˇ< Log
ψK pT q ˇ
K ` 2 ` 1rK odds
nK`1`1rK odds
“
‰
´ pK`3 ¯
42K`3´21rK odds pp ` 1q E tr T 2pK`2´1rK oddsq
`
`
o
K ` 2 ´ 1rK odds
nK`1
nK`2´1rK odds
ˆ K`2`1rK odds`1 ˙
ˆ
˙
´
K`2´1rK odds`1
K`3 ¯
p
p¨p
p
ď O
`O
` o K`1
K`1`
1
odds
K`2´
1
odds
rK
rK
n
n
n
Chételat and Wells/Mid-scale Wishart asymptotics
“ O
51
´ pK`3 ¯
(5.8)
nK`1
and
“
‰
“
‰
ˇ
„ˇ
2K`3 E tr T 2pK`2q
2K`1 pp`1qE tr T 2pK`2q
ˇ
ˇ
ψ
pT
q
4
4
NW
ˇ ď
E ˇˇ= Log
`
ψK pT q ˇ
K `2
nK`1
K `1
nK`1
ˆ K`2`1 ˙
ˆ
˙
´ pK`3 ¯
p
p ¨ pK`2`1
ď O
(5.9)
`O
“ O K`1
K`1
K`2
n
n
n
as n Ñ 8 with p{n Ñ 0.
Moreover, from Lemma 1, we see that
" ˆ K`3 ˙*
p
p
pKq
Cn,p “ Cn,p exp o
as n Ñ 8 with Ñ 0.
(5.10)
K`1
n
n
Thus, from Equations (5.3) and (5.10), we see that when pK`3 {nK`1 Ñ 0, the
asymptotic L1 norm of ψK is bounded by
ż
ż
!
lim
nÑ8
ˇ
ˇ
ˇψK pT qˇ dT ď lim exp ´o
nÑ8
´ pK`3 ¯)
nK`1
Sp pRq
ˇ
ˇ
ˇψNW pT qˇ dT “ 1.
(5.11)
Sp pRq
In fact, at the end of this proof we will see that this bound is sharp and the
limit must be exactly 1.
Using Equations (5.8), (5.9) and (5.11) with Proposition (1) implies that
when pK`3 {nK`1 Ñ 0,
´
¯
0 ď lim H2 ψNW , ψK
nÑ8
ż
ż
„
ď
lim
nÑ8
|ψK |pT q dT ´ 1 ` 0 ` 2 lim
|ψK |pT q dT 2 ¨ 0 2
Sp pRq
Sp pRq
nÑ8
1
2
1
2
1
1
ď r1 ´ 1s ` 0 ` 2 ¨ 1 ¨ 0 “ 0.
`
˘
Thus` H2 ψNW˘, ψK Ñ 0, hence by Equation (3.7) we must have the limit
dTV ψNW , ψK Ñ 0, as desired.
Only if statement. For the second part of the theorem, assume
that˘ the total
`
variation distance satisfies dTV pψNW , ψK q Ñ 0, hence H ψNW , ψK Ñ 0 by
Equation (3.7), as n Ñ 8. We will show by contradiction this implies that
pK`3 {nK`1 Ñ 0.
log p
Assume this wasn’t the case. Since limnÑ8 log
n ă 1, there must be an L P N
such that pL`3 {nL`1 Ñ 0, and since pK`3 {nK`1 Û 0, we must have K ă L.
By Equation (5.8), we must have for T „ |ψNW | “ Tn{2 pIp {8q that
ˇ
„ˇ
´ pL`3 ¯
ˇ
ψNW pT q ˇˇ
ˇ
lim E ˇ< Log
ď lim O L`1 “ 0,
ˇ
nÑ8
nÑ8
ψL pT q
n
so
1
ψNW pT q L1
< Log
ÝÑ 0.
(5.12)
2
ψL pT q
Chételat and Wells/Mid-scale Wishart asymptotics
52
Now write, by Equation (5.1) and Definition 3,
L`1`
RpT q ”
1
ψL pT q
1
< Log
“ log
2
ψK pT q
2
1rLÿ
odds
ˆ
˙2k
n
p´1qk
4T
`
tr ?
4
2k
n
pLq
Cn,p
pKq
Cn,p
K`2`
k“1rK odds
L`1´
1rLÿ
odds
ˆ
˙2k
p`1
p´1qk
4T
tr ?
`
4
2k
n
K`2´
k“1rK odds
“ ´
L`1
ÿ 1`21rk evens pk`1
1 ÿ
1rk evens pk`2 1 L`1
´
4 k“K`2 kpk`1qpk`2q nk
8 k“K`2 kpk`1q
nk
L`1`
`
1rLÿ
odds
n
4
L`1´
p´1qk ´ p ¯k
tr
2k
n
ˆ
4T
?
p
˙2k
`
p`1
4
K`2`
k“1rK odds
1rLÿ
odds
ˆ
˙2k
4T
p´1qk ´ p ¯k
tr ?
.
2k
n
p
K`2´
k“1rK odds
But as pL`3 {nL`1 , we must have p{n Ñ 0, so by Theorem 2, we have
1
p
L2
4T 2k
trp ?
Ñ
pq
Ck . Moreover, as we assumed that pK`3 {nK`1 Û 0, we must have p Ñ 8. Thus
L`1
1 ÿ
1rk evens pk´K´1
nK`1
RpT
q
“
´
pK`3
4 k“K`2 kpk`1qpk`2q nk´K´1
L`1`
1
1`21rk evens 1 pk´K´1
1
`
8 k“K`2 kpk`1q
p nk´K´1
4
L`1
ÿ
´
1rLÿ
odds
p´1qk pk´K´2 1
tr
2k nk´K´2 p
ˆ
4T
?
p
˙2k
ˆ
4T
?
p
˙2k
K`2`
k“1rK odds
L`1´
1
`
4
L2
ÝÑ 0 ` 0 `
“
1rK evens
8pK ` 2q
ˆ
1
1`
p
odds
˙ 1rL
ÿ
p´1qk pk´K´1 1
tr
2k nk´K´1 p
K`2´
k“1rK odds
CK`2 `
1rK odds
8pK ` 1q
CK`1
CK`1`1rK evens
ą 0.
8pK ` 1 ` 1rK evensq
Then by the reverse triangle inequality,
ż
`
˘
0 “ lim H2 ψNW , ψK “ lim
nÑ8
nÑ8
ˇ
ˇ2
ˇ 1{2
ˇ
1{2
ˇψNW pT q ´ ψK pT qˇ dT
Sp pRq
(5.13)
Chételat and Wells/Mid-scale Wishart asymptotics
53
ż
ď
lim
nÑ8
ˇ2
ˇ
ˇ
ˇ
ˇ|ψNW |1{2 pT q ´ |ψK |1{2 pT qˇ dT
Sp pRq
«ˇ
ˇ2 ff
"
*
ˇ
ˇ
1
ψ
pT
q
K
“ lim E ˇˇ exp
< Log
´ 1ˇˇ
nÑ8
2
ψNW pT q
for a T „ |ψNW | “ Tn{2 pIp {8q, that is
"
*
1
ψK pT q
L2
exp
< Log
ÝÑ 1.
2
ψNW pT q
Since Lp convergence implies convergence in probability, by the continuous mapping theorem we must have
ψK pT q P
1
< Log
ÝÑ 0
2
ψNW pT q
as n Ñ 8, so by Equation (5.12)
ψK pT q
1
ψNW pT q P
1
´ < Log
ÝÑ ´0 ´ 0 “ 0.
RpT q “ ´ < Log
2
ψNW pT q 2
ψL pT q
But then, from Equation (5.13) and Slutsky’s lemma [van der Vaart, 2000,
Lemma 2.8 (iii)],
ˆ K`1
˙´1
pK`3
n
P 8pK ` 1 ` 1rK evensq
¨ 0 “ 0.
“
RpT
q
RpT q ÝÑ
K`1
K`3
n
p
CK`1`1rK evens
K`3
as n Ñ 8. As pK`3 {nK`1 is deterministic, this
{nK`1 Ñ 0
` implies ˘that p
2
as n Ñ 8, a contradiction. Thus whenever H ψNW , ψK Ñ 0 as n Ñ 8 with
lim log p ă 1, we must have pK`3 {nK`1 Ñ 0, as desired. This concludes the
nÑ8 log n
proof.
Although Theorem 3 states that the functions ψK approximate ψNW , there
is no guarantee that they are G-transforms of a probability density. In other
words, nothing guarantees that their inverse G-transforms f˜K “ G ´1 tψK u are
real-valued, non-negative and integrate to unity. However, the reverse triangle
inequality applied to the L2 -norm provides that
ż
ˇ
ˇ
ˇ
ż
|ψNW pT q| dT 2 ´
ˇ
`
˘
1ˇ
|ψK pT q| dT 2 ˇ ď H ψNW , ψK ,
Sp pRq
Sp pRq
1
so Theorem 3 and the Plancherel theorem implies that
ż
lim
nÑ8
ż
|f˜K pT q| dT “ lim
|ψK pXq| dX “ 1
Sp pRq
Sp pRq
nÑ8
(5.14)
when pK`3 {nK`1 Ñ 0. That is, the theorem at least guarantees that |f˜K | is
asymptotically a density in its associated regime. We discuss this further in
Section 6.
Chételat and Wells/Mid-scale Wishart asymptotics
54
We independently know, by the results of Jiang and Li [2015] and Bubeck
et al. [2016], that a Gaussian orthogonal ensemble approximation holds in the
classical regime. Although ψ0 is not the G-transform of a GOEppq, a simple
Kullback-Leibler argument is sufficient to prove that it approximates ψGOE for
0th degree regimes.
Proposition 4. The total variation distance between the 0th degree G-transform
approximation ψ0 and the Gaussian orthogonal ensemble G-transform ψGOE
satisfies dTV pψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0.
Proof. We use a similar strategy to Theorem 3: namely, by Equation (3.7) is it
equivalent to prove that Hpψ0 , ψGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0, and to control that quantity we can use the Kullback-Leibler inequality for G-transforms.
Let T „ |ψGOE | “ GOEppq{4. Since the Gaussian orthogonal ensemble has
been extensively studied, we understand well its empirical moments.
“
‰For example, according to Anderson et al. [2010, Lemma 2.2.2], we have E tr T 2 “ Opp2 q,
while
(2.1.45) of the same book we have Er| tr T |s “ Opp1{2 q and
“ from
‰ Equation
3
3{2
E | tr T | “ Opp q. Then from Definition 3 and Proposition 2, and using the
projection map Pp´π,πq as in the proof of Theorem 3, we find that
ˆ 3˙
„
‰
p`1 “
p
ψGOE pT q
2
“ ´4
E tr T “ O
E < Log
ψ0 pT q
n
n
and
ˇ
„ˇ
„
„ˇ
ˇ
ˇ
ˇ
ˇ
ψGOE pT q ˇˇ
p`1
3
ˇPp´π,πq ´ 32
ˇ
?
?
E ˇˇ= Log
“
E
tr
T
`
tr
T
ˇ
ˇ
ˇ
ψ0 pT q
3 n
n
ˆc 3 ˙
‰
p`1
p
32 “
.
ď ? E | tr T 3 | `2i ? Er| tr T |s “ O
3 n
n
n
ş
Since Sp pRq |ψ0 |pT qdT Ñ 0 when n Ñ 8 with p3 {n Ñ 0 by Equation (5.14), if
we apply Proposition 1 we find thatt
1
1
lim H2 pψ0 , ψGOE q ď 0 ` 0 ` 2 ¨ 1 2 ¨ 0 2 “ 0
nÑ8
for p3 {n Ñ 0. By Equation (3.7), this concludes the proof.
As a consequence, HpfNW , fGOE q “ HpψNW , ψGOE q ď HpψNW , ψ0 q`Hpψ0 , ψGOE q Ñ
0 when n Ñ 8 with p3 {n Ñ 0 by Theorem 3 and Proposition 4. Hence
dTV pfNW , fGOE q Ñ 0 by Equation (2.1) in the classical setting. This provides an
alternative proof of the results of Jiang and Li [2015] and Bubeck et al. [2016].
6. Wishart asymptotics: the density point-of-view
In Section 5,?we studied the asymptotic behavior of the normalized Wishart
distribution nrWp pn, Ip {nq ´ Ip s using its G-transform ψNW . In particular,
we derived an approximation to ψNW for every middle-scale regime of a given
degree. But although it is equivalent to study a probability distribution from a
density or a G-transform point of view, it is still natural to wonder if we can find
Chételat and Wells/Mid-scale Wishart asymptotics
55
approximations to the density of a normalized Wishart for every middle-scale
regime of a given degree.
Recall from Theorem 3 that dTV pψNW , ψK q Ñ 0 when pK`3 {nK`1 Ñ 0.
Define f˜K “ G ´1 tψK u. In general, there is no guarantee that these should be
real-valued. On the other hand, we know from Equation (5.3) that whenever
n ě p ´ 2, ψK must be integrable, and since the G-transform maps integrable
functions to integrable functions, f˜K must also be integrable. In fact, according to Equation (5.14), we know |f˜K | must be asymptotically a density when
pK`1 {nK`1 Ñ 0. This suggests we define the following densities.
Definition 4 (Density approximations). For any K P N and n ě p ´ 2, define
the K th degree density approximation as
|f˜K |pXq
,
fK pXq “ ş
|f˜K pY q|dY
Sp pRq
where f˜K “ G ´1 tψK u and ψK is as in Definition 3. The distribution on the real
symmetric matrices with density fK will be denoted FK .
The main interest is that we can asymptotically approximate the density fNW
of a normalized Wishart by the bona fide densities fK . This was the content
of Theorem 1 from Section 1, which we now prove as a simple corollary of its
G-transform analogue Theorem 3 from Section 5.
Proof of Theorem 1. As in the rest
? of this paper, we write the density of the
normalized Wishart distribution nrWp pn, Ip {nq ´ Ip s by fNW , and by Definition 4 the density of FK is fK . Notice that by Equation (2.1), to prove
dTV pfNW , fK q Ñ 0 it is equivalent to prove that HpfNW , fK q Ñ 0. From the
triangle inequality, the reverse triangle inequality, Theorem 3 and Equation
(5.14),
´
¯
´
¯
´
¯
lim H fNW , fK ď lim H fNW , |f˜K | ` lim H |f˜K |, fK
nÑ8
nÑ8
nÑ8
ż
ˇ
ˇ2
1
ˇ 1{2
ˇ
1{2
ˇfNW pXq ´ |f˜K |pXqˇ dX 2
“ lim
nÑ8
Sp pRq
ż
ˇ
ˇ 1{2
ˇ|f˜ |pXq ´ ş
ˇ K
` lim
nÑ8
Sp pRq
ˇ2
1{2
ˇ
|f˜K |pXq
ˇ dX 12
ˇ
1{2
˜
|fK |pY qdY
Sp pRq
ż
ď lim
nÑ8
ˇ
ˇ2
1
ˇ 1{2
ˇ
1{2
ˇfNW pXq ´ f˜K pXqˇ dX 2
Sp pRq
ż
ˇ
ˇ
` lim ˇˇ1 ´ ş
nÑ8
ˇ
ˇ
1
ˇ
ˇ
1{2
˜
|
f
|pY
qdY
K
Sp pRq
1
|f˜K |pXqdX 2
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
56
ˇ
1 ˇˇ
ˇ
“ 01{2 ` ˇ1 ´ 1{2 ˇ ¨ 11{2 “ 0.
1
when pK`3 {nK`1 Ñ 0. Thus HpfNW , fK q, hence dTV pfNW , fK q, tends to zero
when n Ñ 8 with pK`3 {nK`1 Ñ 0, as desired.
We defined fK in terms of the inverse G-transform of the ψK functions given
by Definition 3. How can we express this explicitely? By Equation (5.3), we see
that |ψK |pT q is asymptotically bounded by the Tn{2 pIp {8q density |ψNW |pT q,
which is integrable whenever n ´ p ` 2 ě 0. But |ψNW |1{2 pT q is proportional
n
Ip q density in the sense of Definition 2, which is integrable for
to a Tm{4 p 4m
m{4 ě p{2 ´ 1, that is whenever n ´ 3p ` 3 ě 0. Thus |ψNW |1{2 pT q and therefore
|ψK |1{2 pT q is integrable whenever n ´ 3p ` 3 ě 0. Hence we can use the Fourer
inversion theorem to conclude that fK is proportional to the integral
ˇ
ˇ
ˇ
ˇ
fK pXq 9 ˇG ´1 tψK uˇpXq
ˇ
ˇ
ˇ
9 ˇ
ˇ
ż
2K`3`
1rK
odds
ÿ
´ 4i ¯k tr T k
n
?
exp i trpXT q `
4
n
k
#
k“2
Sp pRq
2K`2´
1rK
odds
+ ˇ2
ÿ
ˇ
´ 4i ¯k tr T k
p `1
ˇ
?
`
dT ˇ
ˇ
4
n
k
(6.1)
k“1
?
whenever n ´ 3p ` 3 ě 0. In particular, if we do a change of variables Z “ 8T ,
we obtain Equation (1.3) from Section 1 whenever n ě 3p ´ 3, from which we
can derive Equations (1.1) and (1.2).
It would be quite pleasant if there was a way to solve the integral in Equation
(6.1) or (1.3) and obtain a (potentially quite complicated) closed form expression
for fK up to its normalization constant. So far, our efforts have been unfruitful.
We close our discussion with a final remark. At the end of Section 5, we
showed that ψ0 approximates ψGOE in 0th degree middle-scale regimes, from
which the classical asymptotic normality follows. It is natural to wonder if f0
approximates fGOE in the same context. An argument similar to that of Theorem 1 shows this is the case.
Proposition 5. The total variation distance between the 0th degree density approximation f0 and the Gaussian orthogonal ensemble G-transform fGOE satisfies dTV pf0 , fGOE q Ñ 0 as n Ñ 8 with p3 {n Ñ 0.
Proof. The Hellinger distance between f0 and fGOE satisfies
´
¯
´
¯
´
¯
lim H f0 , fGOE ď lim H f0 , |f˜0 | ` lim H |f˜0 |, fGOE
nÑ8
nÑ8
nÑ8
ż
ˇ
ˇ
ď lim ˇˇ1 ´ ş
nÑ8
Sp pRq
ˇ
ˇ
1
ˇ
ˇ
1{2
˜
|f |pY qdY
´
¯
1
|f˜0 |pXqdX 2 ` lim H f˜0 , fGOE
nÑ8
0
Sp pRq
Chételat and Wells/Mid-scale Wishart asymptotics
57
ˇ
´
¯
1 ˇˇ
ˇ
“ ˇ1 ´ 1{2 ˇ ¨ 11{2 ` lim H ψ0 , ψGOE “ 0.
nÑ8
1
By Equation (2.1), the result follows.
Of course, we could conclude from this that HpfNW , fGOE q ď HpfNW , f0 q `
Hpf0 , fGOE q Ñ 0 when n Ñ 8 with p3 {n Ñ 0, offering yet again another
proof that a Gaussian orthogonal ensemble approximation holds in the classical
setting.
7. The effect of phase transitions
Although we have established the existence of phase transitions, it does not shed
much light on how the behavior of a normalized Wishart distribution might differ
across phase transitions. To do this, it can be very illuminating to study the
asymptotics of some of its statistics. For example, we could study its empirical
moments.
?
For a normalized Wishart matrix X „ nrWp pn, Ip {8q ´ Ip s, a direct computation yields
„ˆ
˙
ˆ ˙
2
1 ´ X ¯2
5
4
8
20
20
5
1
E
tr ?
´1
“ 2` 3`
` 2 ` 3 “ 2 `o
p
p
p
p
np np
np
p
p2
so in every middle-scale regime, that is whenever n, p Ñ 8 with p{n Ñ 0,
?
›
›
´
¯
›
› 1 ´ X ¯2
5
all middle-scale
›
› tr ?
„
´
1
.
› 2
›p
regimes
p
p
L
Thus we have L2 convergence of the second empirical moment to 1, but otherwise nothing very interesting. There doesn’t seem to be any change of behavior
across the different middle-scale regimes. In contrast, the situation with the
symmetric t distribution is striking, and illustrates yet again that middle-scale
regime behavior becomes clearer under a G-transform. Indeed, we know from
4T 2
Theorem 2 that for a T „ Tn{2 pIp {8q, the quantity p1 trp ?
p q also converges to
1, but we know more. At Equation (4.41), we computed the exact L2 distance
4T 2
between p1 trp ?
p q and 1, and found that
˙
„ˆ
2
m5
1 ´ 4T ¯2
E
tr ?
´1
“
p
p
pm´6q pm´2q pm´1q pm`1q pm`3q
˙
„
ˆ
2
p2
2
p2
5
1
¨ 2`
` 2 `o
`
`
.
p
m m
p2
m m2
Thus the L2 distance must have middle-scale asymptotics
›
›
› 1 ´ 4T ¯2
›
› tr ?
´ 1››
›p
p
L2
Chételat and Wells/Mid-scale Wishart asymptotics
?
$
5
’
’
’
’
’
p
’
’
’
’
’
’
?
1
’
2
’
’
& 5 ` 2α ` α p
?
„
1
’
“ 5α´1 ` 2 ` α ?
’
’
n
’
’
?
’
’
´2
´1
’ “ 5α ` 2α ` 1 p
’
’
n
’
’
’
p
’
%
n
58
for
p2
Ñ0
n
for
p2
Ñα
n
for
¯
´
p2
second or higher
Ñ8
degree
n
´
`
classical or first
degree
second degree
¯
˘
(7.1)
4T 2
as n, p Ñ 8 with p{n Ñ 0. Thus there is a sharp change in behavior of p1 trp ?
pq
?
when p grows like n, and despite the symmetric t distribution satisfying a
semicircle law according to Corollary 1, it must ultimately behave differently
than a Gaussian orthogonal ensemble matrix. The first-order asymptotics look
the same: it is rather in the rate of this convergence that they differ.
This matters for both the symmetric t and the Wishart distribution because
rates of convergence can be distinguished in the strong topology. As a simple
example, consider the sequence of one-dimensional distributions
`
˘
`
˘
Fp “ N 0, 1{p ,
and Gp “ N 0, 1{p2 .
In the weak topology, these are asymptotically the same, since they converge to
the same distribution – namely Fp , Gp ñ δ0 as p Ñ 8, for δ0 the Dirac measure
at 0. In other words, in a metric that induces the weak topology such as the
Lévy metric,
dLévy pFp , Gp q Ñ 0.
Yet, by a direct computation of the Hellinger distance, which induces the strong
topology,
d
´
¯1{4
?
4p
dHellinger pFp , Gp q “ HpFp , Gp q “ 2 1 ´ 2
p ` 2p ` 1
?
Ñ 2ą0
as p Ñ 8. Thus it is clear that the strong topology captures rates of convergence in a way that the weak topology
can’t. But then, we should expect
?
a phase transition when p grows like n for the Tn{2 pIp {8q distribution. And
since the symmetric t is the G-conjugate
of the Wishart, this should imply a
?
phase transition when p grows like n for the Wishart distribution as well. This
is consistent with Theorem 3, and provides an alternative explanation for the
existence of the second phase transition.
A natural question then is to ask whether we can find symmetric t statistics
that exemplify all the middle-scale regime phase transitions. It is tempting to
look at the L2 error of the other empirical moments of the symmetric t distribution, because we can use the methodology developed in Section 4 to compute
their asymptotics to arbitrary order. As a reference, we compiled a table of the
Chételat and Wells/Mid-scale Wishart asymptotics
Normalized empirical moment
1 ´ 4T ¯
tr ?
p
p
1 ´ 4T ¯2
tr ?
p
p
1 ´ 4T ¯3
tr ?
p
p
1 ´ 4T ¯4
tr ?
p
p
Limit
Asymptotics of its squared L2 error
0
2
p2
C1 “ 1
5
2
p2
`
` 2
2
p
m
m
0
24
p2
C2 “ 2
50
25p2
97
`
`
2
p
m
m2
59
Table 1
Asymptotics of small normalized empirical moments of T „ Tn{2 pIp {8q.
few first few moments as Table 1.
As can be seen from the table, the odd moments seem to have uniform behavior across all middle-scale regimes. In contrast, the even ?
moments seem to
all change asymptotics at the second phase transition p “ Θp nq, but nowhere
else. Hence finding statistics that “flag” the other phase transitions remain an
open question.
8. Auxiliary results
This section compiles several lemmas used elsewhere in the article.
Lemma 3 (First derivatives lemma).For any indices 1 ď i1 , . . . , i2l ď p and real
symmetric matrix Z, there exist polynomials aJ,s pn, mq in n and m “ n ´ p ´ 1,
indexed by 0 ď s ď l and J “ pj1 , . . . , j2l q, such that
"
*
ˇ ˇm
Bs
Bs
Bs
n
...
exp ´ tr Z ˇZ ˇ 4
Bs Zi2l i2l´1
Bs Zi4 i3 Bs Zi2 i1
4
"
*
s
l
l
ź
ÿ
ÿ
ź
ˇ ˇm
n
´1
Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 .
“
aJ,s pn, mq
pIp qj2t j2t´1
4
t“1
s“0
t“s`1
JP
t1,...,pu2l
Proof. To simplify notation, let
*
"
l
s
ź
ź
ˇ ˇm
n
´1
MJ,s pZq “
pIp qj2t j2t´1
Zj2t j2t´1 exp ´ tr Z ˇZ ˇ 4 ,
4
t“s`1
t“1
and let Ml “ tMJ,s | J P t1, . . . , pu2l , s ď lu be the set of all such terms “on 2l
indices”. Let xMl y denote the linear span of Ml , that is, the space of all linear
combinations of elements of Ml , with as coefficients real polynomials in n and
m. Then we are really claiming that
"
*
ˇ ˇm
Bs
n
Bs
Bs
...
exp ´ tr Z ˇZ ˇ 4
P xMl y.
(8.1)
Bs Zi2l i2l´1
Bs Zi4 i3 Bs Zi2 i1
4
Chételat and Wells/Mid-scale Wishart asymptotics
60
To see this, let J “ pj1 , . . . , j2l´2 q P t1, . . . , pu2l´2 and define the extension
q
Ja,b
“ pj1 , . . . , jq´1 , a, b, jq`1 , . . . , j2l´2 q P t1, . . . , pu2l to be J with indices a, b
inserted (in this order) at the q th position. Then using that
ı
1 ” ´1 ´1
Bs
´1
´1
Zab
“ ´ Zai
Zi2l´1 b ` Zai
Zi´1
2l
2l´1
2l b
Bs Zi2l i2l´1
2
and
"
*
ˇ ˇm
n
exp ´ tr Z ˇZ ˇ 4
Bs Zi2l i2l´1
4
"
*
”m
ı
ˇ ˇm
n
n
“
Zi2l i2l´1 ´ pIp qi2l i2l´1 exp ´ tr Z ˇZ ˇ 4 ,
4
4
4
we conclude that
s
s
Bs
1 ÿ
1 ÿ
MJi2r i
´
M 2r
MJ,s pZq “ ´
,s`1
2l 2l´1
Bs Zi2l i2l´1
2 r“1
2 r“1 Ji2l´1 i2l ,s`1
m
n
` MJ 2s`1 ,s`1 ´ MJ 2s`1 ,s
P xMl y.
i
i
i2l i2l´1
4
4
2l 2l´1
Thus, by linearity, Bs {Bs Zi2l i2l´1 maps xMl´1 y to xMl y. But naturally we have
expt´ n4 tr Zu|Z|m{4 P xM0 y, so by induction Equation (8.1) must then hold, as
desired.
Bs
Lemma 4 (Second derivatives lemma).For any k P N and any Z P Sp pRq,
p
ÿ
i1 ,...,i2k
ˇ ˇm
n
Bs
Bs
Bs
...
e´ 4 tr Z ˇZ ˇ 4
Bs Zi1 i2k
B s Z i3 i2 B s Z i2 i1
n
“ e´ 4
ˇ ˇ m4 ÿ p1q
Zˇ
bκ pn, m, pqrκ pZ ´1 q
tr Z ˇ
|κ|ď2k
and
p
ÿ
i1 ,...,ik
j1 ,...,jk
ˇ ˇm
n
Bs
Bs
Bs
Bs
Bs
Bs
e´ 4 tr Z ˇZ ˇ 4
...
...
Bs Zj1 jk
Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 i2k
Bs Zi3 i2 Bs Zi2 i1
n
“ e´ 4
ˇ ˇ m4 ÿ p2q
Zˇ
bκ pn, m, pqrκ pZ ´1 q
tr Z ˇ
|κ|ď2k`1
p1q
bκ pn, m, pq
p2q
bκ pn, m, pq
p1q
with degrees deg bκ ď 2k `
and
for some polynomials
p2q
1 ´ qpκq and deg bκ ď 2k ` 2 ´ qpκq. The sums at the right hand sides are taken
over all integer partitions κ of norm at most 2k and 2k ` 1, including the empty
partition.
Proof. We give a spectral proof. Let OLOt be the spectral decomposition of Z,
with eigenvalues λ1 ě ¨ ¨ ¨ ě λp , and notice that
p
t
t
Bs Ohl
1 ÿ Oha Oai
1 ÿ Oha Oaj
“
Ojl `
Oil ,
Bs Zij
2 a‰l λl ´ λa
2 a‰l λl ´ λa
Bs λ h
“ Oih Ojh
Bs Zij
for any 1 ď i, j, h, l ď p. As a consequence, for any differentiable real-valued
Chételat and Wells/Mid-scale Wishart asymptotics
61
functions F1 pLq, . . . , Fp pLq, we have
ˆÿ
˙
p
p
p
p
ÿ
ÿ
Fb ´ Fa t
Bs
1 ÿ
BFa t
t
Oha
Oja Fa Oai
“
Oai `
Oha
O .
B
Z
2
λ
´
λ
Bλa ai
s
hj
b
a
a“1
a“1
j“1
a,b
b‰a
This suggests we define a new operator DL that would map the space of diagonal
matrices F pLq “ diagpF1 pLq, . . . , Fp pLqq that differentially depends on L, to
itself, by
p
p
ÿ
BFa
1 ÿ Fb ´ Fa
Bs
t
t
`
so that
OF Oji
“ OF Oki
.
DL tF ua “
2 b‰a λb ´ λa
Bλa
B
Z
j“1 s hj
In particular,
p
ÿ
i1 ,...,i2k
ˇ ˇm
n
Bs
Bs
Bs
...
e´ 4 tr Z ˇZ ˇ 4
Bs Zi1 i2k
Bs Zi3 i2 Bs Zi2 i1
p
ÿ
“
i1 ,...,i2k
Bs ” ´ n tr Z ˇˇ ˇˇ m4 ı
Bs
Bs
Z Ip
e 4
...
Bs Zi0 i2k
Bs Zi3 i2 Bs Zi2 i1
i1 i0
! n
ˇ ˇm )
2k
“ tr DL
e´ 4 tr Z ˇZ ˇ 4 Ip ,
(8.2)
and similarly
p
ÿ
i1 ,...,ik
j1 ,...,jk
ˇ ˇm
n
Bs
Bs
Bs
Bs
Bs
Bs
e´ 4 tr Z ˇZ ˇ 4
...
...
Bs Zj1 jk
Bs Zj3 j2 Bs Zj2 j1 Bs Zi1 ik
B s Z i3 i2 B s Z i2 i1
!
! n
ˇ ˇ m ))
k
k
“ tr DL
tr DL
e´ 4 tr Z ˇZ ˇ 4 Ip .
(8.3)
Let us look more closely at this operator DL . It satisfies the following.
(i) DL is linear, in the sense that for diagonals F pLq, GpLq and constants a,
b with respect to L,
DL taF ` bGu “ aDL tF u ` bDL tGu.
(ii) DL satisfies a restricted product rule, in the sense that for a diagonal
F pLq of the form F pLq “ f pLqIp for some function f pLq, and any diagonal
GpLq,
DL tF Gu “ DL tF uG ` F DL tGu.
Moreover, from the definition of DL ,
(
n
n n
DL e´ 4 tr L Ip “ ´ e´ 4 tr L Ip ,
4
(
DL trpL´s qIp “ ´sL´ps`1q ,
and
( m m
m
DL |L| 4 Ip “ |L| 4 Ip ,
4
s
(
s
1ÿ
trpL´rs`1´ts qL´t .
DL L´s “ ´ L´ps`1q ´
2
2 t“1
Chételat and Wells/Mid-scale Wishart asymptotics
62
Now define the spaces
#
Ml “
´n
4
bpn, m, pqe
ˇ
+
ˇ bpn, m, pq is a polynomial with
m
ˇ
ˇ
ˇ
tr L ˇ ˇ 4
L rκ pL´1 qL´s ˇ degree at most l ´ qpκq, and κ
ˇ and s satisfy |κ| ď l ´ s.
for l “ 1, . . . , 2k, and let xMl y denote the linear span of Ml , i.e. the space of
all real linear combinations of elements of Ml . Moreover, for a partition κ, let
κ ˘ i denote κ with the integer i added or removed, respectively. For example,
p3, 1, 1, 1q`2 “ p3, 2, 1, 1, 1q and p3, 2, 1, 1, 1q´1 “ p3, 2, 1, 1q. Note that |κ˘i| “
|κ| ˘ i. Then, for any F P Ml ,
)
!
ˇ ˇm
n
DL tF u “ DL bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
! n
)ˇ ˇ m
“ bpn, m, pqDL e´ 4 tr L Ip ˇLˇ 4 rκ pL´1 qL´s
!ˇ ˇ m )
n
` bpn, m, pqe´ 4 tr L DL ˇLˇ 4 Ip rκ pL´1 qL´s
!
)
ˇ ˇm
n
` bpn, m, pqe´ 4 tr L ˇLˇ 4 DL rκ pL´1 qIp L´s
!
)
ˇ ˇm
n
` bpn, m, pqe´ 4 tr L ˇLˇ 4 rκ pL´1 qDL L´s
ı n
” n
ˇ ˇm
“ ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
” m4
ı n
ˇ ˇm
`
bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´s
4
qpκq
ı n
ÿ”
ˇ ˇm
`
´ κi bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ´κi pL´1 qL´s
i“1
ı n
ˇ ˇm
s
` ´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ pL´1 qL´ps`1q
2
s ”
ı n
ÿ
ˇ ˇm
1
`
´ bpn, m, pq e´ 4 tr L ˇLˇ 4 rκ`ps`1´tq pL´1 qL´t
2
t“1
”
Thus DL tF u P xMl`1 y. It follows by linearity that DL maps xMl y to xMl`1 y.
ˇ ˇm
ˇ ˇm
n
2k ´ n
te 4 tr L ˇLˇ 4 Ip u P xM2k y.
Now, e´ 4 tr L ˇLˇ 4 Ip P M0 , so by induction DL
p1q
Hence, for some polynomials bκ,s pn, m, pq of degree at most 2k ´ qpκq,
! n
ÿ
ˇ ˇm )
ˇ ˇm
2k
´n
4 tr L ˇLˇ 4 r pL´1 q trpL´s q
tr DL
e´ 4 tr L ˇLˇ 4 Ip “
bp1q
κ
κ,s pn, m, pqe
|κ|`sď2k
ÿ
“
p1q
n
bκ1 pn, m, pqe´ 4
ˇ ˇ m4
Lˇ rκ1 pL´1 q
tr L ˇ
(8.4)
|κ1 |ď2k
p1q
p1q
p1q
p1q
for κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when
s “ 0. Notice that when s ‰ 0, the degree of the bκ1 ’s is at most 2k ´ qpκq “
2k ´ pqpκ1 q ´ 1q, while when s “ 0 it is at most 2k ´ qpκq ` 1 “ 2k ´ qpκ1 q ` 1.
p1q
Thus in both cases, deg bκ1 ď 2k ´ qpκ1 q ` 1, which by Equation (8.2) shows
the first statement of the lemma.
For the second statement of the lemma, by an argument analoguous to Equa-
Chételat and Wells/Mid-scale Wishart asymptotics
63
ˇ ˇ m4
Lˇ Ip u P xMk`1 y. Thus by induction
ˇ ˇm
n
k
k
again, we must have DL
ttr DL
te´ 4 tr L ˇLˇ 4 Ip uu P xM2k`1 y. Hence for some
n
k
tion (8.4) we find that tr DL
te´ 4
tr L ˇ
p2q
polynomials bκ,s pn, m, pq of degree at most 2k ` 1 ´ qpκq,
!
! n
ˇ ˇ m ))
k
k
DL
tr DL
e´ 4 tr L ˇLˇ 4 Ip
ÿ
ˇ ˇm
´n
4 tr L ˇLˇ 4 r pL´1 q trpL´s q
“
bp2q
κ
κ,s pn, m, pqe
|κ|`sď2k`1
ÿ
“
n
p2q
bκ1 pn, m, pqe´ 4
ˇ ˇ m4
Lˇ rκ1 pL´1 q
tr L ˇ
|κ1 |ď2k`1
p2q
p2q
p2q
p2q
for again κ1 “ κ ` s, bκ1 “ bκ,s when s ‰ 0, while κ1 “ κ, bκ1 “ pbκ,s when
p2q
s “ 0. By the same argument as before, deg bκ1 ď 2k ´ qpκ1 q ` 2, which by
Equation (8.3) shows the second statement of the lemma. This concludes the
proof.
We will also need in our proof a result about the asymptotics of inverse
moments of the Wishart distribution. Because we couldn’t find anything like it
in the literature, we think it is worthwhile to provide some context.
Let f : p0, 4q Ñ R be the restriction to the positive reals of a complex
function analytic in a neighborhood of p0, 4q. We are often interested in the
linear spectral statistic p1 tr f pY q for Y „ Wp pn, Ip {nq. Much is known about
its distributional properties in the high-dimensional regime where p Ñ 8 such
that lim np “ α ă 1. For example, if 0 ă α ă 1, there must be an ą 0 such
nÑ8
that p{n P r, 1 ´ s for all n large enough, so Bai and Silverstein [2010, Theorem
9.10] and the dominated convergence theorem yield that
ż
rp{ns`
a
prp{ns` ´ tqpt ´ rp{ns´ q
f ptq
dt
2πrp{nst
1
P
tr f pY q ÝÑ lim
nÑ8
p
ż α rp{ns
´
`
“
a
pα` ´ tqpt ´ α´ q
dt
f ptq
2παt
(8.5)
α´
?
P
as n Ñ 8. Here, Ñ stands for convergence in probability and x˘ for p1 ˘ xq2 .
In fact, the theorem states more, namely a central limit theorem, but what we
want to draw to attention is the class of functions for which this result was
proven.
This is sometimes enough, but often we would like to understand the expectation of this linear spectral statistic. If f is bounded, then Equation (8.5)
implies that
α`
a
ı
pα` ´ tqpt ´ α´ q
1 ”
f ptq
dt.
(8.6)
lim E tr f pY q “
nÑ8 p
2παt
ż
α´
This is nice for a function f pzq like ez or sin z that happens to be bounded
Chételat and Wells/Mid-scale Wishart asymptotics
64
on a neighborhood of p0, 4q, but it unfortunately excludes many interesting
unbounded functions, such as log z or 1{z. In fact, for unbounded f , it is in
general not even clear if lim p1 Ertr f pY qs will be finite!
nÑ8
The following result shows that, at least in the case f pzq “ 1{z s for s P N,
we can use Stein’s lemma to obtain Equation (8.6) and its α “ 0 analogue.
Lemma 5. Let for Y „ Wp pn, Ip {nq and s be any integer s ě 1. Then as long
as n ě p ` 4s ` 2, the sth inverse moment satisfies the recursive bound
ˆ
˙ ”
ı
”
ı
pp ` 1qs
1´
E tr Y ´s ď E tr Y ´ps´1q .
n
In particular, as p Ñ 8 such that lim np “ α ă 1, if s ă α´1 ´ 1 then
nÑ8
$ α`
a
’
’
pα` ´ tqpt ´ α´ q
&
ı ’
1 ”
dt
if 0 ă α ă 1,
´s
lim E tr Y
“
2παts`1
nÑ8 p
’
α
´
’
’
%
1
if α “ 0.
? 2
for α˘ “ p1 ˘ αq .
ż
Proof. The classical
lemma
that for any differentiable function f :
ˇstates
“ˇ`Stein’s
˘
‰
2
B
R Ñ R such that E ˇ BZ
´ Z f pZqˇ ă 8 for Z „ Np0, 1q and lim f pzqe´z {2 “
zÑ˘8
0, we must have
„´
¯
B
´ Z f pZq “ 0.
E
BZ
Let Z „ Nnˆp p0, In b Ip q be an n ˆ p matrix of i.i.d. standard normal random
variables, and let Y “ n1 Z t Z „ Wp pn, Ip {nq. For any 1 ď α ď n and 1 ď
β, i, j ď p,
´s
p
s
ı
Bs Yβj
B
2 ÿ
1 ÿ ” ´l ´ps´l`1q
Bs
´l ´ps´l`1q
Yβi Yβj
` Yββ
“
Zαi
and
“´
Yij
,
BZαβ n i“1
Bs Yiβ
Bs Yiβ
2 l“1
so for δ the Kronecker delta,
˙
ˆ
`
˘
B
´ Zαβ ZY ´s αβ
BZαβ
p „
p
ÿ
2 ÿ
Bs
´s
´s
´s
“
δβj Yβj `
Zαj Zαi
Y ´ Zαβ Zαj Yβj
n i“1
Bs Yiβ βj
j“1
´s
“ Yββ
´
s
s
˘ `
˘
˘
1 ÿ`
1 ÿ ´l `
ZY l αβ ZY ´ps´l`1q αβ ´
Yββ ZY ´ps´l`1q Z t αα
n l“1
n l“1
`
˘
´Zαβ ZY ´s αβ
(8.7)
Let us first show that this expression is integrable. For any matrix X, |Xij | ď
1{2
}X}2 “ }X t X}2 . Thus by Equation (8.7),
ˇ
„ˇˆ
˙
ˇ
`
˘ ˇ
B
´s
ˇ
ˇ
E ˇ
´ Zαβ ZY
αβ ˇ
BZαβ
Chételat and Wells/Mid-scale Wishart asymptotics
«
ď E }Y ´s }2 `
s
ÿ
1
65
1
}Y 2l`1 }22 }Y 2s`2l´1 }22
l“1
ff
s
ÿ
}Y
`
´2l
1
2
}2 }Y
´2s`2l
1
2
1
2
}2 ` n}Y }2 }Y
´2s`1
1
2
}2
l“1
As Y is positive definite, }Y ˘a }2 ď tr Y ˘a for any a P N, so by the CauchySchwarz inequality,
„
ÿ
s
”
ı 12 ”
ı 12
E tr Y ´2l`1 E tr Y ´2s`2l´1
ď E tr Y ´s `
l“1
s
”
ı 12 ”
ı 12
”
ı 12 ”
ı 12
ÿ
E tr Y ´2l E tr Y ´2s`2l ` n E tr Y E tr Y ´2s`1 ,
`
l“1
which is finite for n ě p ` 4s ` 2.
Moreover, pZY ´s qαβ can be expressed using minors and determinants as a
rational function of the entries of Z, so
lim
Zαβ Ñ˘8
2
pZY ´s qαβ e´Zαβ {2 “ 0.
So all conditions are fulfilled to apply Stein’s lemma to Equation 8.7 and obtain
ff
«
˙
p ˆ
n
`
˘
B
1 ÿ ÿ
´s
´ Zαβ ZY
0“E
αβ
n α“1 β“1 BZαβ
«
ff
s
s
1 ÿ
´s
´s
´l
´ps´lq
´ps´1q
“ E tr Y ´ tr Y ´
trpY q trpY
q ´ tr Y
n
n l“1
As trpY ´l q trpY ´ps´lq q ď p tr Y ´s for any 1 ď l ď s, and every term is integrable
as n ě p ` 4s ` 2, this means that
ˆ
˙ ”
ı
”
ı
pp ` 1qs
1´
E tr Y ´s ď E tr Y ´ps´1q .
(8.8)
n
This shows the first part of the proof.
For the second part, let S P N. If we let n Ñ 8 such that lim np “ α ă 1,
nÑ8
then any S ă α´1 we will have n ě p ` 4S ` 2 and n ě pp ` 1qS for n large
enough. So by repeatedly applying Equation (8.8) for s “ S, . . . , 1 and dividing
by p, we obtain
˙
S ˆ
ı
ı
ź
pp ` 1ql
1 ”
1 ”
1´
¨ E tr Y ´S ď
E tr Y ´0 “ 1.
n
p
p
l“1
Taking a limit in the above yields
S
ı
ź
1 ”
p1 ´ αlq lim E tr Y ´S ď 1.
nÑ8 p
l“1
Thus for any S ă α´1 , we have
S
ı
ź
1
1 ”
lim E tr Y ´S ď
ă 8.
nÑ8 p
1
´
αl
l“1
(8.9)
Chételat and Wells/Mid-scale Wishart asymptotics
66
In the case 0 ă α ă 1, if s`1 ă α´1 then by Jensen’s inequality and Equation
(8.9) applied to S “ s ` 1, we have
ı
˘1` 1s ı
1 ”
1 ”´
ď lim E tr Y ´ps`1q ă 8.
lim E tr Y ´s
nÑ8 p
nÑ8 p
1
´s
Thus p tr Y
is uniformly integrable, and by Equation (8.5),
żα
`
a
”
ı
pα` ´ tqpt ´ α´ q
1
dt
lim E tr T ´s “
nÑ8 p
2παts`1
α´
?
for α˘ “ p1 ˘ αq2 .
In contrast, by applying Jensen’s inequality twice,
„´
„
´s
„
¯´s
1
1
1
ďE
1 “ E tr Y
tr Y
ď E tr Y ´s
p
p
p
so when α “ 0, by applying Equation (8.9) with S “ s, we obtain that
lim p1 Ertr Y ´s s “ 1, as desired.
nÑ8
9. Conclusion
The results of this paper raise more questions than they answer. We enumerate
some that we found particularly interesting.
(1) The univariate t distribution
with ν degrees of freedom is often defined as
?
the distribution of Z{ s, for Z „ Np0, 1q and s „ χ2ν {ν independent. In
the real symmetric matrix case, we could imagine studying the distribution
of S 1{4 ZS 1{4 , for Z „ GOEppq and S „ Wp pν, Ip {νq independent. Is this
the Tν p2Ip q distribution in the sense of Section 4?
(2) By Theorem 2 and Corollary 1, it is clear the empirical moments of a
symmetric t distribution are quite similar to those of a Gaussian orthogonal ensemble matrix, except perhaps in their rates of convergence. From
Anderson et al. [2010, Theorem 2.1.31], we know the empirical moments
of a Gaussian orthogonal ensemble are asymptotically normal. Are the
empirical moments of the symmetric t distribution also asymptotically
normal?
(3) In Section 4, we showed that the rate of convergence of the even normalized
empirical
moments of a symmetric t distribution change when p grows like
?
n. Can we find analogue symmetric t statistics that change their rates of
convergence when p grows like npK`1q{pK`3q for every K P N? This would
establish phase transitions for the symmetric t distribution. If so, can we
find approximating densities between every two transitions, just like in the
Wishart case?
(4) As a counterpart of Theorem 1, could we prove that dTV pfNW , fK q Û 0
whenever pK`3 {nK`1 Û 0 as n Ñ 8? This is delicate because we have no
guarantee that the L1 norm of ψK is asymptotically bounded for regimes
of degree K ` 1 or higher.
Chételat and Wells/Mid-scale Wishart asymptotics
67
(5) Can we find the normalization constant or, better, solve the expectation
of Equation (1.3) in closed form?
(6) What asymptotics hold for the symmetric t or the Wishart distribution in
a middle-scale regime of infinite degree? How do these asymptotics differ
from the other middle-scale regimes, or the high-dimensional regime?
(7) The symmetric t distribution was discovered as the G-conjugate of the
Wishart distribution. What other distributions can be realized as the Gconjugate of some well-known distribution?
(8) In Lemma 2, we expressed the characteristic function of the G-conjugate
F ˚ of a distribution F as f 1{2 ‹ pf 1{2 ˝ Rq, for f the density of F and R the
flip operator. To obtain the moments, we then repeatedly differentiated
under the convolution integral at zero, and obtained an expression of the
moments as an expectation with respect to f . The argument worked when
F ˚ was the symmetric t distribution. Can this argument be generalized to
other F ˚ ? If F ˚ is a well-known distribution, does this give rise to novel
and nontrivial expressions for its moments?
(9) The G-transform of a distribution encodes all the information relative to
that distribution. However, taking a modulus removes some information,
and so in some sense the G-conjugate distribution is “less informative”
than the original distribution. What happens when we repeatedly apply
the G-conjugation operator, destroying information every time? For example, is there an attractor distribution G that is the limit of this process
regardless of the initial distribution?
(10) Can we find distinct random operators which can be regarded, in some
sense, as the total variation limit of a normalized Wishart matrix between
every two phase transitions?
It appears to us that some of these questions might be very difficult to answer.
We would be pleased if future work were able to shed light on any of them.
References
Greg W. Anderson, Alice Guionnet, and Ofer Zeitouni. An Introduction to
Random Matrices. Cambridge University Press, 2010.
Zhidong Bai and Jack W. Silverstein. Spectral Analysis of Large Dimensional
Random Matrices, volume 20. Springer, 2010.
Maurice S. Bartlett. On the theory of statistical regression. Proceedings of the
Royal Society of Edinburgh, 53:260–283, 1933.
Sébastien Bubeck and Shirshendu Ganguly. Entropic CLT and phase transition
in high-dimensional Wishart matrices. International Mathematics Research
Notices, pages 243–258, 2016.
Sébastien Bubeck, Jian Ding, Ronen Eldan, and Miklós Z. Rácz. Testing for
high-dimensional geometry in random graphs. Random Structures & Algorithms, 49:503–532, 2016.
Kai-Lai Chung. A Course in Probability Theory. Academic Press, 2001.
Chételat and Wells/Mid-scale Wishart asymptotics
68
Michel Gaudin. Sur la loi limite de l’espacement des valeurs propres d’une
matrice alé atoire. Nuclear Physics, 25:447–458, 1961.
Arjun K. Gupta and Daya K. Nagar. Matrix Variate Distributions. CRC Press,
1999.
Tiefeng Jiang and Danning Li. Approximation of rectangular beta-Laguerre
ensembles and large deviations. Journal of Theoretical Probability, 28:804–
847, 2015.
Gérard Letac and Hélène Massam. All invariant moments of the wishart distribution. Scandinavian Journal of Statistics, 31:295–318, 2004.
Vladimir A. Marchenko and Leonid A. Pastur. Distribution of eigenvalues for
some sets of random matrices. Matematicheskii Sbornik, 114:507–536, 1967.
Sho Matsumoto. General moments of the inverse real wishart distribution and
orthogonal weingarten functions. Journal of Theoretical Probability, 25:798–
822, 2012.
Madan L. Mehta. On the statistical properties of the level-spacings in nuclear
spectra. Nuclear Physics, 18:395–419, 1960a.
Madan L. Mehta. Lemploi des polynômes orthogonaux pour calculer certain
déterminants. Rapport S PH (Saclay), 658, 1960b.
Robb J. Muirhead. Aspects of Multivariate Statistical Theory. Wiley Series in
Probability and Mathematical Statistics. Wiley, 1982.
Charles E. Porter and Norbert Rosenzweig. Statistical properties of atomic and
nuclear spectra. Technical report, Univ. of Minnesota, Minneapolis, 1960.
Mohsen Pourahmadi. High-dimensional Covariance Estimation: with HighDimensional Data. John Wiley & Sons, 2013.
Miklós Z. Rácz and Jacob Richey. A smooth transition from Wishart to GOE.
arXiv:1611.05838, 2016.
Aad W. van der Vaart. Asymptotic statistics, volume 3. Cambridge University
Press, 2000.
John Von Neumann and Herman H. Goldstine. Numerical inverting of matrices
of high order. Bulletin of the American Mathematical Society, 53:1021–1099,
1947.
Eugene P. Wigner. On the statistical distribution of the widths and spacings
of nuclear resonance levels. In Mathematical Proceedings of the Cambridge
Philosophical Society, volume 47, pages 790–798, 1951.
Eugene P. Wigner. Characteristic vectors of bordered matrices with infinite
dimensions. Annals of Mathematics, 62:548–564, 1955.
Eugene P. Wigner. Statistical properties of real symmetric matrices with many
dimensions. In Proceedings of the Fourth Canadian Mathematical Congress.
University of Toronto Press, 1957.
John Wishart. The generalised product moment distribution in samples from a
normal multivariate population. Biometrika, 20A:32–52, 1928.
| 10 |
1
Time-Varying Block Codes for Synchronization
Errors: MAP Decoder and Practical Issues
arXiv:1802.08595v1 [cs.IT] 23 Feb 2018
Johann A. Briffa, Victor Buttigieg, Member, IEEE, and Stephan Wesemeyer
Abstract—In this paper we consider Time-Varying Block
(TVB) codes, which generalize a number of previous synchronization error-correcting codes. We also consider various practical
issues related to MAP decoding of these codes. Specifically, we
give an expression for the expected distribution of drift between
transmitter and receiver due to synchronization errors. We
determine an appropriate choice for state space limits based on
the drift probability distribution. In turn, we obtain an expression
for the decoder complexity under given channel conditions in
terms of the state space limits used. For a given state space, we
also give a number of optimizations that reduce the algorithm
complexity with no further loss of decoder performance. We
also show how the MAP decoder can be used in the absence of
known frame boundaries, and demonstrate that an appropriate
choice of decoder parameters allows the decoder to approach
the performance when frame boundaries are known, at the
expense of some increase in complexity. Finally, we express some
existing constructions as TVB codes, comparing performance
with published results, and showing that improved performance
is possible by taking advantage of the flexibility of TVB codes.
Index Terms—Insertion-Deletion Correction, MAP Decoder,
Forward-Backward Algorithm
I. I NTRODUCTION
Most error-control systems are designed to detect and/or
correct substitution errors, where individual symbols of the
received sequence have been substituted while maintaining
synchronization with the transmitted sequence. Some channels, however, also experience synchronization errors, where
symbols may additionally be deleted from or inserted into the
received sequence. It has long been recognized that codes can
be designed specifically for synchronization error correction
[1], [2]. Except for the less-known work by Gallager [3],
for a long time only some short block codes were known.
This changed when Davey and MacKay [4] proposed a concatenated scheme combining an outer LDPC code with good
error-correction capability with an inner code whose aim is
to correct synchronization errors. Ratzer [5] took a different
approach, using short marker sequences inserted in binary
LDPC codewords; a similar approach was used by Wang
et al. [6]. Yet another approach extends the state space of
convolutional codes to allow correction of synchronization
errors [7]–[9]. The problem of convolutional code design for
Manuscript submitted February 27, 2014; accepted May 29, 2014 for
publication in the IET Journal of Engineering. This research has been carried
out using computational facilities procured through the European Regional
Development Fund, Project ERDF-080.
J. A. Briffa and S. Wesemeyer are with the Dept. of Computing, University of Surrey, Guildford GU2 7XH, England. Email: [email protected];
[email protected]
V. Buttigieg is with the Dept. of Comm. & Computer Engineering, University of Malta, Msida MSD 2080, Malta. Email: [email protected]
synchronization error channels has been considered in [10].
More recently, this approach has been applied successfully to
turbo codes [11]. The renewed increase in interest is mainly
due to new applications requiring such codes. A recent survey
can be found in [12].
We have in previous papers extended the work of DaveyMacKay, proposing a maximum a posteriori (MAP) decoder
[13], improved code designs [14], [15], as well as a parallel
implementation of the MAP decoder resulting in speedups of
up to two orders of magnitude [16]. However, these papers
were restricted to the case where the frame boundaries were
known by the decoder. While Davey and MacKay showed that
the frame boundaries could be accurately determined for their
bit-level decoder and code construction [4], it has not been
shown whether this property extends to our MAP decoder and
improved constructions.
In this paper we define Time-Varying Block (TVB) codes in
terms of the encoding used in [16], and show that TVB codes
represent a new class of codes which generalizes a number of
previous synchronization error-correcting codes. We use the
MAP decoder of [16] for these codes, showing how it can
be used in an iterative scheme with an outer code. We also
consider a number of important issues related to any practical
implementation of the MAP decoder. Specifically, we give
an expression for the expected distribution of drift between
transmitter and receiver due to synchronization errors. We
determine an appropriate choice for state space limits based
on the drift probability distribution. In turn, we obtain an
expression for the decoder complexity under given channel
conditions in terms of the state space limits used. For a
given state space, we also give a number of optimizations
that reduce the algorithm complexity with no further loss of
decoder performance. We also show how the MAP decoder
can be used for stream decoding, where the boundaries of
the received frames are not known a priori. In doing so we
demonstrate how an appropriate choice of decoder parameters
allows stream decoding to approach the performance when
frame boundaries are known, at the expense of some increase
in complexity. We express some previously published codes
as TVB codes, comparing performance with published results,
and showing that the greater flexibility of TVB codes permits
the creation of improved codes.
In the following, we start with definitions in Section II
and summaries of results from earlier work. The applicable
design criteria for TVB codes are considered in Section III,
together with the representation of previously published codes
as TVB codes. The appropriate choice for state space limits is
given in Section IV, followed by expressions for the decoder
2
complexity in Section V. MAP decoder optimizations are given
in Section VI and the changes necessary for stream decoding in
Section VII. Finally, practical results are given in Section VIII.
II. BACKGROUND
A. TVB Codes
Consider the encoding defined in [16], used there to simplify
the representation of the inner code of [4]. We observe that
this encoding generalizes a number of additional previous
schemes, including the inner codes of [5], [6], [15] (c.f.
Section III-B). We define a TVB code in terms of this encoding
by the sequence C = (C0 , . . . , CN −1 ), which consists of the
constituent encodings Ci : Fq ,→ Fn2 for i = 0, . . . , N − 1,
where n, q, N ∈ N, 2n ≥ q, and ,→ denotes an injective
mapping. Two constituent encodings Ci , Cj are said to be
equal if Ci (D) ∈ Cj ∀D. For a given TVB code, the set
of unique constituent encodings is that set where no two
constituent encodings are equal; the cardinality of this set,
denoted by M ≤ N , is called the order of the code. Note that
unique constituent encodings may still have some common
codewords. We denoted a TVB code by the tuple (n, q, M ).
We restrict ourselves to binary TVB codes, where codewords
are sequences of bits; the extension to the non-binary case is
trivial.
For any sequence z, denote arbitrary subsequences as
zba = (za , . . . , zb−1 ), where zaa = () is an empty sequence. Given a message DN
= (D0 , . . . , DN −1 ), each
0
Ci maps the q-ary message symbol Di ∈ Fq to codeword
nN
Ci (Di ) of length n. That is, DN
=
0 is encoded as X0
C0 (D0 )k · · · kCN −1 (DN −1 ), where ykz is the juxtaposition
of y and z. Each q-ary symbol is encoded independently of
previous inputs, and different codebooks may be used for
each input symbol. This time-variation offers no advantage
on a fully synchronized channel. However, in the presence
of synchronization errors, the differences between neighbouring codebooks provide useful information to the decoder to
recover synchronization.
In practice a TVB code is suitable as an inner code to correct
synchronization errors in a serially concatenated construction.
A conventional outer code corrects residual substitution errors.
In such a scheme, the inner code’s MAP decoder a posteriori
probabilities (APPs) are used to initialize the outer decoder.
The concatenated code can be iteratively decoded, in which
case the prior symbol probabilities of the inner decoder are
set using extrinsic information from the previous pass of the
outer decoder.
B. Channel Model
We consider the Binary Substitution, Insertion, and Deletion
(BSID) channel, an abstract random channel with unbounded
synchronization and substitution errors, originally presented in
[17] and more recently used in [4], [5], [13]–[15] and others.
At time t, one bit enters the channel, and one of three events
may happen: insertion with probability Pi where a random
bit is output; deletion with probability Pd where the input is
discarded; or transmission with probability Pt = 1 − Pi − Pd .
A substitution occurs in a transmitted bit with probability Ps .
After an insertion the channel remains at time t and is subject
to the same events again, otherwise it proceeds to time t + 1,
ready for another input bit.
We define the drift St at time t as the difference between
the number of received bits and the number of transmitted
bits before the events of time t are considered. As in [4], the
channel can be seen as a Markov process with the state being
the drift St . It is helpful to see the sequence of states as a
trellis diagram, observing that there may be more than one
way to achieve each state transition. Also note that the state
space is unlimited for positive drifts but limited for negative
drifts. Specifically, St may take any positive value for t > 0,
though with decreasing probability as the value increases. On
the other hand, St ≥ −t where the lower limit corresponds to
receiving the null sequence.
C. The MAP Decoder
We summarize here the MAP decoder of [16]; this is the
same as the MAP decoder of [13] with a trivial modification
to work with the notation of TVB codes. The decoder uses
the standard forward-backward algorithm for hidden Markov
models. We assume a message sequence DN
0 , encoded using a
(n, q, M ) TVB code to the sequence Xτ0 , where τ = nN . The
sequence Xτ0 is transmitted over the BSID channel, resulting
in the received sequence Y0ρ , where in general ρ is not equal
to τ . To avoid ambiguity, we refer to the message sequence
as a block of size N and the encoded sequence as a frame
of size τ . We calculate the APP Li (D) of having encoded
symbol D ∈ Fq in position i for 0 ≤ i < N , given the entire
received sequence, using
X
1
σi (m0 , m, D),
(1)
Li (D) =
λN (ρ − τ ) 0
m ,m
where λi (m) = αi (m)βi (m),
(2)
σi (m0 , m, D) = αi (m0 )γi (m0 , m, D)βi+1 (m),
(3)
and αi (m), βi (m), and γi (m0 , m, D) are the forward, backward, and state transition metrics respectively. Note that
strictly, the above metrics depend on Y0ρ , but for brevity we do
not indicate this dependence in the notation. The summation in
(1) is taken over the combination of m0 , m, being respectively
the drift before and after the symbol at index i. The forward
and backward metrics are obtained recursively using
X
αi (m) =
αi−1 (m0 )γi−1 (m0 , m, D),
(4)
m0 ,D
and βi (m) =
X
βi+1 (m0 )γi (m, m0 , D).
(5)
m0 ,D
Initial conditions for known frame boundaries are given by
(
(
1 if m = 0
1 if m = ρ − τ
α0 (m) =
and βN (m) =
0 otherwise,
0 otherwise.
Finally, the state transition metric is defined as
n(i+1)+m
γi (m0 , m, D) = Pr {Di = D} R(Yni+m0
| Ci (D)) (6)
where Ci (D) is the n-bit sequence encoding D and R(ẏ|x) is
the probability of receiving a sequence ẏ given that x was sent
3
through the channel (we refer to this as the receiver metric).
The a priori probability Pr {Di = D} is determined by the
source statistics, which we generally assume to be equiprobable so that Pr {Di = D} = 1/q. In iterative decoding, the
prior probabilities are set using extrinsic information from the
previous pass of an outer decoder, as explained in Section II-A.
The receiver metric is obtained by calculating the forward
recursion
X
t+m
α̇t−1 (m0 ) · Q ẏt−1+m
α̇t (m) =
(7)
0 |xt−1 ,
m0
where for brevity we do not show the dependence on ẏ and
x, and Q(y|x) can be directly computed from y, x and the
channel parameters:
if µ = 0
Pd
Pi µ−1
1
Q(y|x) =
Pt P s + 2 Pi P d
if µ > 0, yµ−1 6= x
2
Pi µ−1
1
Pt P̄s + 2 Pi Pd
if µ > 0, yµ−1 = x,
2
where µ is the length of y and P̄s = 1 − Ps . The required
value of the receiver metric is given by R(ẏ|x) = α̇n (µ̇ − n),
where µ̇ is the length of ẏ, n is the length of x.
As in [16], the α, β, and α̇ metrics are normalized as
they are computed to avoid exceeding the limits of floatingpoint representation. We also assume that (7) is computed at
single precision1 , while the remaining equations use double
precision.
III. TVB C ODE D ESIGN
A. Construction Criteria
In any error-correcting scheme, the decoder’s objective is
to minimize the probability of decoding error (at the bit or
codeword level depending on the application). If the channel
does not introduce synchronization errors, this optimization
may be performed independently of previous or subsequent
codewords. Hence the performance of the code depends exclusively on its distance properties. In particular, the performance
of the code at low channel error rate is dominated by the code’s
minimum Hamming distance. At any channel error rate the
performance is determined by the code’s distance spectrum
[18], [19]. Thus when designing codes for substitution error
channels, either the minimum Hamming distance or the more
complete distance spectrum needs to be optimized for the
given code parameters.
In the case of the BSID channel, and other channels that
allow synchronization errors, a similar behaviour is observed
if the codeword boundaries are known, only this time the
Levenshtein distance [2] replaces the Hamming one. Recall
that the Levenshtein distance gives the minimum number of
edits (insertions, deletions, or substitutions) that will change
one codeword into another.
For the BSID channel an upper bound for the probability
of decoding a codeword in error was given in [15], assuming
codeword boundaries are known. For Pi , Pd , Ps 1, the
bound of [15, (9)] is dominated by the number of correctable
1 We refer to 32-bit floating point as single precision, and 64-bit floating
point as double precision.
errors, t. Now, for a code with jminimumk Levenshtein distance
d
−1
[2]. Hence designing
dlmin , it can be shown that t = lmin
2
TVB codes with constituent encodings having large dlmin will
result in the greatest improvement to the code’s performance
at low channel error rates.
However, in general the codeword boundaries are not known
and need to be estimated by the decoder. Therefore decoding
a given codeword on synchronization error channels depends
not only on the current received word, but also on previous and
subsequent ones. This means that the performance of a TVB
code depends not only on the distance properties of constituent
encodings considered separately, but also on the relationship
between constituent encodings. This effect becomes more
significant under poorer channel conditions, where the drift
can easily exceed the length of a codeword. Unfortunately,
the required relationship between constituent encodings for
optimal performance over the BSID channel is still an open
problem. What is known is that the diversity created by a
sequence of different encodings helps the decoder estimate
the drift within a codeword length, improving performance at
higher channel error rates [15].
B. Representation of Previous Schemes as TVB Codes
TVB codes generalize a number of existing synchronization
error-correcting codes. The flexibility of the generalization
allows the creation of improved codes at the same size and
rate, as we shall show.
Consider first the sparse inner codes with a distributed
marker sequence2 of the Davey-MacKay construction [4]. It is
clear that the sparse code is a fixed encoding C 0 : Fq ,→ Fn2 ;
these codewords are then added to a distributed marker sequence wi of length n, specific for each codeword index i.
Thus we can write Ci (Di ) = C 0 (Di ) + wi to represent the
inner codes of [4] as TVB codes. The equivalence of this
mapping to the inner code of [4] has also been shown in [16].
The distributed marker serves the same function as the use of
different encodings in TVB codes. The decoder of [4] tracks
the marker sequence directly, treating the additive encoded
message sequence as substitution errors. Therefore, to corrupt
the marker sequence as little as possible, the inner code used is
sparse. The sparseness results in a low dlmin , making it harder
for the decoder to distinguish between the various codewords,
and leads to relatively poor performance at low channel error
rates.
The codes of [15] can similarly be represented as TVB
codes, with C 0 corresponding to the Synchronization and Error
Correcting (SEC) code and wi corresponding to the Allowed
Modification Vectors (AMVs). SEC codes are designed with
a large dlmin for good performance at low channel error rates.
For such channels this code can perform much better than
the sparse code of [4]. AMVs are chosen such that when
added to the SEC code the resulting code’s dlmin does not
change. Clearly, the AMVs serve the same function as the
use of different encodings in TVB codes. In contrast to a
random distributed marker sequence, the use of AMVs does
2 This
was originally referred to as a watermark sequence.
4
Table I
A (7, 8, 4) TVB CODE C = (C0 , . . . , C3 ) WITH dlmin = 3.
100
C1
0000000
0000111
0011110
0110101
1001001
1100110
1111000
1111111
C2
0000011
0001100
0011111
0101010
1011001
1100000
1100111
1111110
C3
0000000
0001111
0101001
0110110
1000011
1001100
1110000
1111111
10−1
Symbol Error Rate
C0
0000000
0000111
0011001
0110110
1001010
1100001
1111000
1111111
Comparison of Inner Codes with (n,q) =(7,8) and N =666
(7,8) sparse + random marker
3 data bits + 4 marker bits
(7,8,3) SEC code with 8 AMVs
(7,8,4) TVB code
10−2
10−3
not compromise the performance of the underlying SEC code
at low channel error rates. In general, however, the Levenshtein distance spectrum is altered. The separate constituent
encodings in TVB codes give greater design freedom than SEC
codes with AMVs and also allows the design of constituent
encodings that maintain the required optimized Levenshtein
distance spectrum.
The marker codes given by Ratzer [5] can also be cast as
TVB codes by letting each possible sequence of data bits
(between markers) be represented by a q-ary symbol. For
example, consider a marker code with 3 marker bits inserted
after every 9 data bits, where the 3-bit marker is randomly
chosen between the sequences 001 and 110. This can be
represented as a (12, 512, 2) TVB code, where encoding C0
consists of all possible 9-bit sequences appended with 001,
and C1 consists of all possible 9-bit sequences appended with
110. Like the sparse codes of [4], these marker codes suffer
from a low dlmin , leading to relatively poor performance at
low channel error rates. On the other hand, the fixed marker
bits improve the determination of codeword boundaries, and
the random use of different marker bits creates the necessary
diversity to improve performance in poorer channel conditions.
To illustrate the difference in performance between the
various designs, consider encodings of size (n, q) = (7, 8)
with N = 666 (same size as codes C and H in [4]). A (7, 8, 4)
TVB code where each constituent code has the best possible
Levenshtein distance spectrum with dlmin = 3, found through
an exhaustive search, is given in Table I. In Fig. 1 we compare
this TVB code with earlier constructions from the literature
at the same size. Consider first the SEC code of the same
size and dlmin from [15], used with 8 AMVs in a random
sequence. As expected, the TVB code performs better due to
its improved Levenshtein distance spectrum, even though both
TVB and SEC codes have the same dlmin . The performance
of the sparse code with random distributed marker from [4]
is considerably worse, particularly at low channel error rates.
Similarly a code with three data bits and four marker bits
(randomly chosen between 0011/1100), similar to [5], also
performs poorly at low channel error rates.
IV. A PPROPRIATE L IMITS ON S TATE S PACE
The equations in Section II-C assume that summations can
be taken over the set of all possible states. For a channel such
as the one considered, the state space is unbounded for positive
drifts. A practical implementation will have to take sums over
a finite subset of states. In [4] the state space was limited
10−4 −5
10
10−4
10−3
10−2
Channel Error Event Probability (Pd = Pi; Ps =0)
10−1 3 ×10−1
Figure 1. Comparison of inner code designs of size (n, q) = (7, 8) with
N = 666: a sparse code with random distributed marker from [4], a marker
code with 0011/1100 marker bits similar to [5], a SEC code with randomlysequenced AMVs from [15], and the TVB code of Table I.
to a drift |St | ≤ xmax , where xmax was chosen to be ‘several
times larger’ than the standard deviation of the synchronization
drift over one block length, assuming this takes a Gaussian
distribution. No recommendation was given for the value that
should be used.
Limiting the state space is by definition sub-optimal. However, we can arbitrarily lower the number of cases where the
sub-optimal solution is worse than the optimal one, by ensuring that only the least likely states are omitted. The choice
of summation limits also involves a trade-off with complexity,
which has a polynomial relationship with the size of the state
space (c.f. Section V). Therefore, an appropriate choice of
summation limits will result in the smallest state space such
that the probability of the drift being outside that range is as
low as required. The first step to identify good summation
limits is to derive an accurate probability distribution of the
state space, avoiding the Gaussian approximation of [4].
A. Drift Probability Distribution
The drift ST after transmission of T bits was stated in [4]
(and shown in [20]) to be normally distributed with zero mean
and a variance equal to T p/(1 − p) for the special case where
p := Pi = Pd . This distribution is asymptotically valid as
T → ∞. For cases where Pi 6= Pd or where T is not large
enough, this distribution cannot be used. This is particularly
relevant for determining the summation limits of (7) where
the sequence length n is not large. An exact expression for
the probability distribution of ST is given by
ΦT (m) = Pr {ST = m}
j
T
X
T
T +m+j−1
Pi Pd
T m
= Pt Pi
,
j
m+j
Pt
j=j
(8)
0
where j0 = max(−m, 0). Observe that for a drift of m bits,
we need m insertion events more than we have deletion events.
Over a sequence of T bits, for j deletion events, this means
5
m + j insertion events and T − j transmission events. The
j
probability of this is Pim+j Pdj PtT −j = PtT Pim [Pi Pd /Pt ] . We
get (8) by adding all different combinations of these events,
and summing over j, noting that we cannot have fewer than 0
events of any type. Specifically, the number of combinations
for j deletions in T transmitted bits is given by Tj . The
number of combinations for m + j insertions is given by
T +m+j−1
, as the m + j insertion events create an additional
m+j
m + j opportunities for insertion.
B. Avoiding Numerical Issues
In a practical implementation, computing the drift probability (8) requires a few special considerations. Practical
codes from the literature have codeword size n in the range
5–12 bits and number of codewords N up to 1000, for a
frame length nN of about 4000–6000 bits. These codes are
designed to operate under channel conditions Pi , Pd from 10−3
to above 10−1 . Evaluating (8) under these conditions, one
encounters very large values for the two binomial coefficients
and very small values for the power term. For example,
consider evaluating (8) at m = 0 for T = 6000 and
Pi = Pd = 10−3 . The two binomial coefficients have a range
of up to 1.56 × 101804 (at j = 3000) and 8.34 × 103609
(at j = 6000) respectively. The power term has a range of
down to 1.65 × 10−35995 (at j = 6000). This range is far
beyond that representable even in double-precision floating
point. A direct implementation of (8) will therefore result in
numerical overflow and underflow (in computing the binomial
coefficients and power term respectively) for typical frame
sizes and channel conditions, even though the summation term
itself is representable.
The above numerical range problem can be avoided by
combining the computation of all terms in the summation as
follows. Observe that (8) can be rewritten as
ΦT (m) =
T
X
δj ,
(9)
j=j0
j
T +m+j−1
Pi Pd
T m T
(10)
where δj = Pt Pi
Pt
j
m+j
and j0 = max(−m, 0) as before. In this expression, note
that the summation is empty if j0 > T , resulting in zero
probability. Also, since j ≥ 0, the first binomial coefficient
is always non-zero, while the second binomial coefficient is
non-zero if T > 0. Expanding the binomial coefficients using
the factorial formula, we can express the summation term
recursively as
δj = δj−1 ·
Pi P d T + m + j − 1 T − j + 1
·
·
,
Pt
m+j
j
(11)
allowing successive factors to be determined easily from
previous ones. The initial factor required is the one at j0 ,
and can be determined from (10) by expanding the binomial
coefficients using the multiplicative formula:
j
j0
m+j0
Y
T − j0 − i Y T − 1 − i Pi Pd 0
δj0 = PtT Pim
.
i
i
Pt
i=1
i=1
(12)
Consider the earlier example, now evaluating (9) at m = 0
for T = 6000 and Pi = Pd = 10−3 . In this case, the initial
value δj0 = 6.07 × 10−6 , and the multiplier δj /δj−1 in the
recursive expression (11) has its smallest value of 3.34×10−10
at j = 6000. Both values are easily representable as floating
point numbers.
Using (9), numerical range issues remain when computing
δj0 for larger values of Pi , Pd , and consequently also for storing successive values of δj . For example, consider evaluating
(9) at m = 0 for T = 6000 and Pi = Pd = 10−1 . In
this case δj0 = 3.47 × 10−582 , and one needs to accumulate
a number of δj values in this range to obtain the required
result Φ6000 (0) = 0.0109. Again, the intermediate values are
beyond the range of double-precision floating point numbers
although the final result is representable. These numerical
range issues can be avoided by computing (11) and (12) using
logarithms. For the earlier example with m = 0, T = 6000,
and Pi = Pd = 10−1 , we now get log δj0 = −1.34 × 103 and
the smallest value of log δj is −1.93 × 104 at j = 6000.
Finally, the required drift probability is obtained by accumulating the exponential of the log δj values using (9).
However, the individual values of δj are still beyond the
range of double-precision floating point. In practice, we have
found that the use of extended-precision (80-bit) floating point
provides sufficient range. Alternatively, the accumulation in (9)
may be computed in logarithmic domain using
the property
log(A + B) = log A + log 1 + elog B−log A .
Note that expression (8) is valid for any Pi ≥ 0, Pd ≥ 0,
and Pi + Pd < 1. However, the computation using logarithms
cannot be applied directly when either or both of Pi and
Pd are zero. These degenerate cases have to be handled as
special cases, by first reducing (8) and then implementing the
simplified equations using logarithms.
C. Probability of Drift Outside Range
+
We want to choose lower and upper limits m−
T , mT such
that the drift after transmitting a sequence of T bits is outside
+
the range {m−
T . . . mT } with an arbitrarily low probability Pr :
+
Pr ST < m−
< Pr ,
T + Pr ST > mT
(13)
m+
T
or equivalently: 1 −
X
ΦT (m) < Pr .
(14)
m=m−
T
An appropriate choice of limits can be obtained iteratively
as follows. Observe that for the BSID channel ΦT (m) is
monotonically decreasing with increasing |m|. A first estimate
for the limits is given by:
−(1)
mT
+(1)
and mT
Pr
2
Pr
= min m ΦT (m + 1) <
,
2
= max m ΦT (m − 1) <
(15)
(16)
where the number in superscript parentheses indicates the
iteration count. If these estimates satisfy (14), we use them
6
103
That is, we extend the range by one in the direction of greatest
gain. The iterative process is repeated until (14) is satisfied.
−
The size of the state space is given by MT = m+
T − mT + 1.
E. Example
Overestimating the required state space increases computational complexity, while underestimating the state space
often results in poor decoding performance. Accurate limits
are particularly important for restricting the drifts considered
across each codeword. It is therefore useful to illustrate the
discrepancy between the approximate distribution of [4] and
the exact expression for the distribution of the drift. Consider
a system with typical block and codeword sizes N = 500, n =
Mτ (appr.)
Mτ (exact)
Mn (appr.)
Mn (exact)
M1 (appr.)
M1 (exact)
102
101
100 −4
10
D. Choice of Summation Limits
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
(a)
Probability of Event Outside Chosen Limits
When considering the whole frame, T = τ , so that the
overall size of the state space is given by Mτ . Now the final
output of the MAP decoder is calculated using (1), which sums
0
+
over all Mτ prior states m−
τ ≤ m ≤ mτ . For each prior state,
however, only the drifts introduced by the transmission of n
bits need to be considered, corresponding to a subset Mn of
+
states m−
n ≤ m ≤ mn . Similarly, the computation of (4)
+
and (5) is required for all Mτ states m−
τ ≤ m ≤ mτ , each
involving a summation over Mn prior or posterior states m−
n ≤
respectively.
Finally,
the
state
transition
metric
is
m0 ≤ m+
n
obtained using the forward pass of (7); this is computed over
+
a sequence of n bits for each of Mn states m−
n ≤ m ≤ mn .
Each recursion consists of a summation over prior states m0 ;
in this case only the drifts introduced by the transmission of
one bit need to be considered, corresponding to a subset M1
+
0
of prior states m−
1 ≤ m ≤ m1 .
Now consider that we want to limit the probability of any
of these summations not covering an actual channel event over
a whole frame to, say, no more than Pe . When computing the
limits over the whole frame, m±
τ , we simply need to set Pr =
Pe . However, when computing limits over an n-bit sequence,
m±
repeated for each of N such
n , since this summation is √
sequences, we set Pr = 1 − N 1 − Pe ≈ PNe for small Pe .
Similarly,
for limits over a 1-bit sequence, m±
1 , we use Pr =
√
τ
1 − 1 − Pe ≈ Pτe for small Pe .
Except in the case of stream decoding (c.f. Section VII),
the state space limits only need to be determined once and
remain valid as long as the channel conditions do not change.
In any case, the required values of ΦT (m) depend only on
the code parameters and channel conditions, so that a table
may be pre-computed. This makes the average complexity of
determining the state space limits negligible.
N =500, n =10, Pe =10−10
104
Number of States
as our lower and upper limits. Otherwise these estimates are
updated iteratively as follows:
(
−(i)
+(i)
−(i)
mT − 1 if ΦT (mT + 1) ≤ ΦT (mT − 1)
−(i+1)
mT
=
−(i)
mT
otherwise,
(17)
(
+(i)
+(i)
−(i)
mT + 1 if ΦT (mT + 1) > ΦT (mT − 1)
+(i+1)
mT
=
+(i)
mT
otherwise.
(18)
100
10−1
10−2
10−3
10−4
10−5
10−6
10−7
10−8
10−9
10−10
10−11
10−12
10−13 −4
10
N =500, n =10, Pe =10−10
Mτ (appr.)
Mτ (exact)
Mn (appr.)
Mn (exact)
M1 (appr.)
M1 (exact)
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
(b)
Figure 2. (a) Number of states within summation limits, and (b) probability
of encountering a channel event outside the chosen summation limits over a
single frame, using the approximation of [4] and our exact computation.
10. We plot in Fig. 2a the number of states within summation
limits using the approximate and exact expressions, in each
case for Pe = 10−10 . For T = 1, [4, Section VII.A] assumes
a maximum of two successive insertions; this is equivalent to
setting m+
1 = 2, so that M1 = 4. It is immediately apparent
that while the approximation is very close for large T and high
Pi = Pd , it quickly starts to underestimate the required range
at lower channel error rates. As expected, the discrepancy
is particularly large when considering shorter sequences. For
T = 1 it is not surprising that there is a large discrepancy for
channels with high error rate.
Next, we determine the probability of encountering a channel event outside the chosen limits over a single frame, shown
in Fig. 2b for the same limits used in Fig. 2a. For the
exact distribution, this probability is always below the chosen
threshold Pe = 10−10 , as expected. For the approximation,
however, the probability of exceeding the chosen limits is
higher than the threshold throughout the range considered.
7
At lower channel error rates, the discrepancy is significant
(several orders of magnitude) even for large T . For small T ,
the probability of exceeding the chosen limits is high enough
to make the approximation useless. For T = 1, the artificial
limit of two successive insertions of [4] means that channels
with high error rate will exceed this limit with high probability.
V. A LGORITHM C OMPLEXITY
A. Complexity of the MAP Decoder
As a first step towards determining the overall complexity of
the decoder, consider first the calculation of the state transition
metric in (6). This is recursively computed using the forward
pass of (7) over a sequence of n bits, for each of Mn states
m. Each recursion consists of a summation over M1 prior
states m0 as argued in Section IV-D. The bit-level probability
Q can be obtained by a look-up table. Thus the complexity
for calculating a single state transition metric is Θ(nMn M1 ).
The final output of the algorithm consists of q probabilities
for each of N symbols, calculated using (1). This equation
sums over all Mτ prior states m0 and Mn states m, defining the
domain for σi (m0 , m, D). It follows from (3) that the domain
for γi (m0 , m, D) is the same. Now the computation of (3) is
dominated by the evaluation of γi (m0 , m, D) in (6), whose
complexity is Θ(nMn M1 ) as shown. Considering the number
of times the γ metric is computed, the MAP decoder has an
asymptotic complexity of Θ(N nqMτ Mn2 M1 ).
B. Complexity of the Davey-MacKay Decoder
It would initially appear that the MAP decoder complexity
is significantly higher than that of the Davey-MacKay decoder,
given as O(N nMτ M1 ) in [4] for a direct implementation
(using our notation). However, the expression of the DaveyMacKay decoder seems to consider only the complexity of the
initial forward and backward passes, ignoring the additional
small forward passes needed to compute the final decoder
output.
The final output of the Davey-MacKay algorithm also consists of q probabilities for each of N symbols. Each of these is
computed using [4, (4)], which sums over all possible prior and
posterior states. In a direct implementation all possible prior
states need to be considered; using our notation the number of
states is Mτ . While not stated in [4], the number of posterior
states that need to be considered is Mn , as argued for the MAP
decoder. The computation within the summation of [4, (4)] is
dominated by the conditional probability, which is computed
using a separate forward pass. This forward pass is effectively
identical to (7) whose complexity is Θ(nMn M1 ). Considering
the number of times the forward pass is computed, it follows
that the Davey-MacKay decoder has an overall asymptotic
complexity of Θ(N nqMτ Mn2 M1 ).
C. Comments on Algorithm Complexity
Comparing the complexity expressions for the MAP decoder
for TVB codes and the Davey-MacKay decoder for sparse
codes with a distributed marker sequence, it follows that the
asymptotic complexity for both decoders is the same. This is
consistent with experimental running times for both decoders
in [13].
In the complexity expression note that N , n, and q depend
only on the code parameters while Mτ , Mn , and M1 also
depend on the channel conditions. For M1 , it was argued in
[4, Section VII.A] that it is sufficient to consider a maximum
of two successive insertions, at a minimal cost to decoding
performance. This is equivalent to setting m+
1 = 2, so
that M1 = 4; these limits were also used in [13], [14].
However, this artificially low limit is insufficient for more
advanced code constructions, as shown in [15]. It was also
argued in [4] that useful speedups can be obtained by only
following paths through the trellis that pass through nodes with
probabilities above a certain threshold. However, the choice of
this threshold was not analyzed. It is also likely that this choice
would depend on the properties of the inner code being used.
VI. S PEEDING T HINGS U P
A. Batch Computation of Receiver Metric
In a naïve implementation, each γ computation (6) requires
the computation of the receiver metric as a separate forward
pass using (7). However it can be observed that for a given
starting state m0 and symbol D, the γ metric will be computed for each end state m within the limits considered (c.f.
equations (1), (3), (4), and (5), where the γ computations are
used). In turn, this means that for a given x, the receiver metric
will need to be determined for all subsequences ẏ within the
drift limit considered. It is therefore sufficient to compute the
forward pass (7) once, with the longest subsequence ẏ required. In doing so, the values of the receiver metric for shorter
subsequences are obtained for free. We call this approach
batch computation. This effectively reduces the complexity
of computing the collection of γ metrics by a factor of Mn .
The asymptotic complexity of the MAP decoder is therefore
reduced to Θ(N nqMτ Mn M1 ).
B. Lattice Implementation of Receiver Metric
To compute the receiver metric, an alternative to the trellis
of (7) is to define a recursion over a lattice as in [17]. For
the computation of R(ẏ|x), the required lattice has n + 1
rows and µ̇ + 1 columns. Each horizontal path represents an
insertion with probability 21 Pi , each vertical path is a deletion
with probability Pd , while each diagonal path is a transmission
with probability Pt Ps if the corresponding elements from x
and ẏ are different or Pt P̄s if they are the same. Let Fi,j
represent the lattice node in row i, column j. Then the lattice
computation in the general case is defined by the recursion
Fi,j =
1
Pi Fi,j−1 + Pd Fi−1,j + Q̇(ẏj |xi )Fi−1,j−1 ,
2
(19)
which is valid for i < n, and where Q̇(y|x) can be directly
computed from y, x and the channel parameters:
(
Pt Ps if y 6= x
Q̇(y|x) =
(20)
Pt P̄s if y = x.
8
Table II
C OMPLEXITY EXPRESSIONS FOR THE MAP DECODER FOR VARIOUS
COMPUTATION MODES OF THE RECEIVER METRIC .
Initial conditions are given by
(
1 if i = 0, j = 0
Fi,j =
0 if i < 0 or j < 0.
(21)
The last row is computed differently as the channel model
does not allow the last event to be an insertion. In this case,
when i = n, the lattice computation is defined by
Fn,j = Pd Fn−1,j + Q̇(ẏj |xn )Fn−1,j−1 .
C. Optimizing the Lattice Implementation
In the lattice implementation of the receiver metric, it can
be readily seen that the horizontal distance of a lattice node
from the main diagonal is equivalent to the channel drift for
the corresponding transmitted bit. It should therefore be clear
that the likelihood of a path passing through a lattice node
decreases as the distance to the main diagonal increases.
We can take advantage of the above observation by limiting
the lattice computation to paths within a fixed corridor around
the main diagonal. Specifically, the arguments of Section IV
can be applied directly, resulting in a corridor of width Mn
in general for the transmitted sequence of n bits considered.
Exceptions to this width occur in the first few rows with index
+
i < −m−
n and the last few rows with index i > µ̇ − mn ,
where part of the corridor falls outside the lattice rectangle.
The number of nodes within this corridor is given by
where κUL =
κLR =
−
∆(−m−
n ) − ∆(−mn − n),
+
∆(n + m+
n − µ̇) − ∆(mn −
(
and ∆(k) =
k2 +k
2
0
if k > 0
otherwise.
(23)
(24)
µ̇),
Algorithm
Original
Batch computation
Lattice receiver
D
Corridor constraint
Complexity
Θ(N nqMτ Mn2 M1 )
Θ(N nqMτ Mn M1 )
+
Θ(N
nqMτ h[n + mn ]) h
ii
−
2
Θ N qMτ nMn − 21 (m−
n ) − mn
(22)
Finally, the required receiver metric is obtained from this
computation as R(ẏ|x) = Fn,µ̇ . The calculation of a single
run through the lattice requires a number of computations
proportional to the number of nodes in the lattice. Now for
the transmitted sequence of n bits considered, the number of
rows will always be n while the number of columns is at most
n + m+
n . The complexity of a direct implementation of this
algorithm is therefore Θ(n[n + m+
n ]).
It has been argued in Section VI-A that for a given x,
the receiver metric R(ẏ|x) needs to be determined for all
subsequences ẏ within the drift limit considered. Observe
that the same argument applies equally when the receiver
metric is computed using the lattice implementation (19).
Therefore, when the lattice implementation is used in batch
mode, the MAP decoder has an asymptotic complexity of
Θ(N nqMτ [n + m+
n ]).
κ = nMn − κUL − κLR ,
A
B
C
(25)
(26)
The complexity of the corridor-limited lattice algorithm is
therefore Θ(nMn − κUL − κLR ).
Some simplification of this expression is possible when
the corridor-limited lattice algorithm is used in the MAP
decoder with batch computation for the channel considered.
When batch computation is used, µ̇ = n + m+
n by definition, so that κLR = 0. Furthermore,
for
the
BSID
channel,
− 2
1
−
−n ≤ m−
≤
0,
so
that
κ
=
(m
)
−
m
.
Under
these
UL
n
n
n
2
conditions,the MAP decoder
has an asymptotic
complexity of
2
−
Θ N qMτ nMn − 12 (m−
)
−
m
.
n
n
D. Comparing Complexity
A summary of the complexity expressions for the MAP
decoder for various computation modes of the receiver metric
is given in Table II. Comparing the expressions in rows A
and B of Table II we can immediately see that the batch
computation of the receiver metric reduces complexity by a
factor equal to Mn . Unfortunately, the remaining complexity
expressions contain terms that depend on the code parameters
and channel conditions in a rather opaque way, making it
harder to understand the benefits of these improvements. In
the first instance, we can simplify the expressions further to
facilitate comparison. Consider the expression in row C of
Table II, when the lattice implementation is used. It can be
shown that n + m+
n → Mn − 1 as channel conditions get
worse; we can therefore simplify the complexity expression to
O(N nqMτ Mn ). Comparing this to the expression in row B of
Table II we can see that the use of the lattice implementation
reduces complexity by a factor of at least M1 . Finally, consider
the expression in row D of Table II, when the corridor
−
constraint
−is 2applied
to the lattice algorithm. Since mn ≤ 0,
1
−
the 2 (mn ) − mn term is strictly positive. The reduction in
complexity offered by the corridor constraint is therefore equal
2nMn
to 2nM −(m
− , and becomes significant as channel con− 2
n
n ) +mn
ditions improve. As channel conditions get worse, m−
n → −n,
so that the expression is dominated by the nMn term. Under
these conditions, the complexity of the corridor-constrained
lattice implementation becomes approximately equal to that
of the unconstrained lattice implementation.
We can also illustrate the effect of the proposed speedups
by considering a rate- 21 TVB code with typical block and
codeword sizes N = 500, n = 10, and q = 32. We
compute the MAP decoder complexity for this code under
a range of channel conditions, using the original algorithm
of Section II-C and the improvements described above. We
plot these in Fig. 3 using the same summation limits as
in Section IV-E. Note that for a fairer comparison between
the lattice and trellis modes, we include a constant factor of
three in the lattice computation. This follows the observation
that each lattice node computation (19) requires three multiplications while each trellis computation (7) requires only
one. A few general observations can be made on this graph:
a) The batch computation of the receiver metric results in
a considerable reduction of complexity throughout, but is
even more significant under poor channel conditions. b) The
lattice implementation is considerably less complex than the
9
N =500, n =10, q =32
Complexity (Number of Arithmetic Operations)
1014
1013
1012
Trellis
Trellis (batch)
Lattice (batch)
Lattice corridor (batch)
1011
1010
109
108
107 −4
10
10−3
10−2
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 3. MAP decoder complexity (in number of arithmetic operations) under
a range of channel conditions, for various computation modes of the receiver
metric.
trellis implementation at high channel error rates. c) The
lattice corridor constraint extends this improvement to the low
channel error rate range. In conclusion, the proposed speedups
result in a considerable reduction in complexity of almost
two orders of magnitude for typical code sizes and channel
conditions. We have observed a similar trend under a range of
typical code sizes, so this result can be taken as representative.
Note that in general this distribution βN (m) has a wider spread
than Φτ (m).
As discussed in Sections IV-C and IV-D, the choice of state
space limits depends on the expected distribution of drift.
For limits involving the whole frame, the distribution used
is Φτ (m), which assumes that the initial drift is zero. The
assumption does not hold under stream decoding conditions,
where the initial drift is not known a priori, although its distribution can be estimated. The uncertainty in locating the startof-frame position increases the uncertainty in locating the endof-frame position, resulting in a wider prior distribution for the
end-state boundary condition βN (m). Therefore, any limits on
state space determined using Φτ (m) will be underestimated.
The severity of this error depends on the difference between
βN (m) and Φτ (m), which increases as channel conditions
get worse. For stream decoding, therefore, it is sensible to
recompute the state space limit Mτ at the onset of decoding a
given frame, using βN (m) in lieu of Φτ (m). Doing so avoids
underestimating the required state space, and implies that for
stream decoding, the state space size will change depending
on how well-determined the frame boundaries are.
After decoding the current frame, we obtain the posterior
probability distribution for the drift at end-of-frame, given by:
n
o
n
o
τ +m+
τ +m+
Pr Sτ = m Ym− τ = λN (m)/ Pr Ym− τ
τ
τ
λN (m)
.
=P
0
m0 λN (m )
(28)
The most likely drift at end-of-frame can be found by:
VII. S TREAM D ECODING
We have so far considered the case where frame boundaries
are known exactly. While there are practical cases involving
single-frame transmission where this is true, exact frame
boundaries are often unknown. The MAP decoder can handle
such cases by changing the initial conditions for (4) and (5)
and choosing appropriate state space limits. This obviates
the need for explicit frame-synchronization markers as used
in conventional communication systems, and can therefore
reduce this overhead. The approach presented here is in
principle similar to that used in [4] for ‘sliding window’
decoding. However, there are some critical differences which
we explore further in Section VII-C.
A. Choosing End-of-Frame Priors
Consider first the common case where a sequence of frames
is transmitted in a stream. The usual practice in communication systems is for the receiver to decode one frame at a time,
starting the decoding process as soon as all the data related to
the current frame is obtained from the channel. In this
case,
τ +m+
the current received frame is considered to be Ym− τ , which
τ
may include some bits from the end of the previous frame and
start of the next frame. The end-state boundary condition for
(5) can be obtained by convolving the expected end-of-frame
drift probability distribution with the start-state distribution:
X
βN (m) =
α0 (m0 )Φτ (m − m0 ).
(27)
m0
λN (m)
= arg max λN (m).
0
m
m0 λN (m )
Ŝτ = arg max P
m
(29)
As in [4], we determine the nominal start position of the next
frame by shifting the received stream by τ + Ŝτ positions.
The initial condition for the forward metric for the next frame,
α̂0 (m), is set to:
λN (m + Ŝτ )
α̂0 (m) = P
,
0
m0 λN (m )
(30)
replacing the initial condition for (4) reflecting a known frame
boundary.
B. Stream Look-Ahead
Taking advantage of the different constituent encodings in
TVB codes, the MAP decoder can make use of information
from the following frame to improve the determination of the
end-of-frame position. We augment the current block of N
symbols with the first ν symbols from the following block
(or blocks, when ν > N ), for an augmented block size
N 0 = N +ν. The MAP decoder is applied to the corresponding
augmented frame. After decoding, only the posteriors for the
initial N symbols are kept; the start of the next frame is
determined from the drift posteriors at the end of the first
N symbols, and the process is repeated.
Consider the latency of the MAP decoder to be the time
from when the first bit of a frame enters the channel to when
the decoded frame is available. The cost of look-ahead is an
increase in decoding complexity and latency corresponding
10
to the change in block size from N to N 0 . The effect
on complexity is seen by using terms corresponding to the
augmented block size in the expressions of Table II. The
latency is equal to the time it takes to receive the complete
frame and decode it. Look-ahead increases the time to receive
the augmented frame linearly with ν and the decoding time
according to the increase in complexity.
The required look-ahead ν depends on the channel conditions and the code construction. In general, a larger value is
required as the channel error rate increases. We show how
an appropriate value for ν can be chosen for a given code
under specific channel conditions in Section VIII-A. Typical
values for ν are small (ν < 10) for good to moderate
channels (Pi , Pd < 10−2 ). The required look-ahead increases
significantly for poor channels: the example in Section VIII-A
requires ν = 1000 at Pi = Pd = 2 × 10−1 .
C. Comparison with Davey-MacKay Decoder
A key feature of the Davey-MacKay construction is the
presence of a known distributed marker sequence that is
independent of the encoded message. This allows the decoder,
in principle, to compute the forward and backward passes
over the complete stream. However, to reduce decoding delay,
the decoder of [4] performs frame-by-frame decoding using
a ‘sliding window’ mechanism. The ‘sliding window’ mechanism seems intended to approximate the computation of the
forward and backward passes over all received data at once.
This approach is similar in principle to ours when stream lookahead is used; however, there are some critical differences
which we discuss below.
In [4], the starting index for a given frame is taken to
be the most likely end position of the previous frame, as
determined by the Markov model posteriors. This is the same
as the approach we use in Section VII-A. However, in [4], the
initial conditions of the forward pass are simply copied from
the final values of the forward pass for the previous frame.
This is consistent with the view that the ‘sliding window’
mechanism approximates the computation over all received
data at once, but contrasts with our method. In Section VII-A
the initial conditions of the forward pass are determined from
the posterior probabilities of the drift at the end of the previous
frame. These drift posteriors include information from the
look-ahead region and from the priors at the end of the
augmented frame, which were determined analytically from
the channel parameters.
Observe that in the ‘sliding window’ mechanism of [4],
the backward pass values cannot be computed exactly as for
the complete stream. Instead, the decoder of [4] computes the
forward pass for some distance beyond the expected end of
frame position, and initializes the backward pass from that
point. The suggested distance by which to exceed the expected
end of frame position is ‘several (e.g. five) multiples of xmax ’,
where xmax is the largest drift considered. The concept is the
same as the stream look-ahead of Section VII-B. However,
we recommend choosing the look-ahead quantity ν based on
empirical evidence (c.f. Section VIII-A).
It is claimed in [4] that the backward pass is initialized
from the final forward pass values; the reasoning behind this
is unclear, and does not seem to have a theoretical justification.
We initialize the backward pass with the prior probabilities for
the drift at the end of frame, as explained in Section VII-A.
D. Initial Synchronization
The only remaining problem is to determine start-of-frame
synchronization at the onset of decoding a stream. This
can be obtained by choosing state space limits Mτ large
enough to encompass the initial desynchronization and by
setting equiprobable initial conditions: α0 (m) = βN (m) =
1
∀m. Previous experimental results [4] have assumed a
Mτ
known start for the first frame, with the decoder responsible
for maintaining synchronization from that point onwards. We
adopt the same strategy in the following.
VIII. R ESULTS
Practical results are given in this section. We show how
an appropriate choice of decoder parameters allows stream
decoding to perform as well as when frame boundaries are
known. Results are also given for existing constructions which
can be expressed as TVB codes, showing how the symbol-level
MAP decoder improves on the original decoder (in the case of
[4]) or is equivalent (in the case of [5]). We also demonstrate
some improved constructions allowed by the flexibility of TVB
codes. These are achieved by using simulated annealing to
find TVB codes of a required order with a good Levenshtein
distance spectrum. Specifically, we seek to find constituent
codes with the highest possible minimum Levenshtein distance
and the lowest multiplicity at small distances. For all codes
so designed, M < N ; we construct our TVB codes using a
random sampling with replacement of the unique constituent
codes, and use this as our inner code. Construction parameters
for all codes used in this section are given in Table III. To
facilitate reproduction of these results, the TVB codebooks
used are available for download from the first author’s web
site3 .
A. Stream Decoding with MAP Decoder
The results of [13] assumed known frame boundaries; under
these conditions, the decoder is arguably at an advantage
when comparing with the results of [4], [5]. It is also not
clear whether the MAP decoder can keep track of frame
boundaries with the non-sparse constructions of [13], [15] and
the TVB codes introduced here, especially in the absence of
a known marker sequence. In the following we investigate
the performance of the MAP decoder under stream decoding
conditions, and consider the choice of look-ahead required.
As in [4] we assume that the start of the first frame is known,
while the decoder is responsible for keeping synchronization
from that point onwards. We use the limits specified in
Section IV.
We start by investigating the effect of stream decoding on
the ability of the MAP decoder to track codeword boundaries.
We consider a (6, 8, 12) TVB code, which is the inner code
for the concatenated system N2b of Table III. We simulate
3 Available
at http://jabriffa.wordpress.com/publications/data-sets/.
11
Table III
C ONSTRUCTION PARAMETERS OF CODES USED IN SIMULATIONS .
Labela
P1
N1a
N1b
P2
N2a
N2b
P3
N3
P4
N4
P5
N5
Inner code
(5, 16) sparse
(5, 16) sparse
(10, 256, 3) TVB
(6, 8) sparse
(6, 8) sparse
(6, 8, 12) TVB
9 bits, uncoded
9 bits, uncoded
not applicable
(7, 8, 8) TVB
not applicable
(7, 4, 32) TVB
Marker
random, distributed
random, distributed
none
random, distributed
random, distributed
none
001/110, appended
001/110, appended
not applicable
none
not applicable
none
Outer code
LDPC (999, 888) F16
LDPC (999, 888) F16
LDPC (499, 444) F256
LDPC (1000, 100) F8
LDPC (1000, 100) F8
LDPC (1000, 100) F8
LDPC (3001, 2000) F2
LDPC (2997, 1998) F2 b
3
turbo code F2
Rate 14
LDPC (666, 333) F8
1
turbo code F2
Rate 10
LDPC (855, 300) F4
Comment
Published in [4, Fig. 8, Code D]
Identical construction to P1, symbol-level MAP decoder
Same overall rate and block size as P1
Published in [4, Fig. 8, Code I]
Identical construction to P2, symbol-level MAP decoder
Same overall rate, block size, and outer code as P2
Published in [5, Fig. 7, Code D]
Identical inner code to P3, marginally smaller outer code
Published in [11, Fig. 4, Code T2]
Same overall rate as P4
Published in [11, Fig. 4, Code T4]
Same overall rate as P5
a Labels
starting with P indicate previously published results, while labels starting with N indicate new simulation results.
by truncating the LDPC (3001, 2000) F2 of P3. This truncation is necessary so that the outer-encoded sequence can be expressed by an
integral number of inner codewords.
b Obtained
Fidelity at codeword boundaries, (p = Pd = Pi; Ps =0)
100
Frame Error Rate
Fidelity
10−2
10−3
10−1
10−2
(6,8,12) TVB, p =0.22
10−4
0
500
1000
1500
Index for codeword following boundary
2000
Figure 4. The fraction of correctly resynchronized codeword boundaries
(fidelity) as a function of codeword index, for code N2b of Table III.
this inner code with a block size N = 2000 under the channel
conditions at the onset of convergence for the concatenated
system, that is at Pi = Pd = 0.22, assuming only the
start position of the first frame is known. At each codeword
boundary we plot the fraction of correctly determined drifts
(fidelity) in Fig. 4. As expected, the fidelity drops at the end
of the frame, where the actual drift is unknown to the decoder.
However, it can be observed that the fidelity reaches a steady
high value within about 1000 codewords from the end of
frame. It could therefore be supposed that a look-ahead of
ν = 1000 would be sufficient for this code under these channel
conditions. The dip at the start of the frame is caused by the
uncertainty in the frame start position, due to the very low
fidelity at the end of the previous frame.
To test this hypothesis, we concatenate this inner code
with the (1000, 100) LDPC code over F8 of [4, Code I]. We
simulate this system under the following conditions: 1) known
frame start and end (frame decoding); 2) known start for
the first frame, unknown frame ends (stream decoding), no
Comparison of frame and stream decoding for code N2b
10−3 −1
10
Frame [1 iter]
Frame [5 iter]
Stream, ν =0 [1 iter]
Stream, ν =0 [5 iter]
Stream, ν =1000 [1 iter]
Stream, ν =1000 [5 iter]
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 5. Demonstration of the effect of look-ahead on the MAP decoder’s
performance under stream decoding conditions, and comparison with frame
decoding.
look-ahead; 3) stream decoding with look-ahead ν = 1000
codewords. Results are shown in Fig. 5. We give results after
the first and fifth iterations. As anticipated, performance under
stream decoding conditions is poorer than frame decoding if
there is no look-ahead. However, an appropriate look-ahead
quantity allows the decoder to perform as well under stream
decoding as under frame decoding.
It is important to highlight that this result is dependent on
the inner code structure, and that therefore the generalization
to other constructions is not obvious. However, we have
repeated the same test with other constructions, including
those of [4], [5], [13]–[15] and the new constructions in this
paper, and under different channel conditions. In all cases we
have found that the result is repeatable, in that it is possible
to approach the performance of frame decoding with stream
decoding, as long as an appropriate look-ahead quantity is
chosen. The only cost of stream decoding is therefore the need
for a fidelity analysis to determine a suitable look-ahead value
12
100
Comparison with Davey & MacKay
100
10−1
Frame Error Rate
Frame Error Rate
10−1
10−2
10−3
P1
N1a [1 iter]
N1a [5 iter]
N1b [1 iter]
N1b [5 iter]
10−4
10−5 −3
3 ×10
Comparison with Ratzer and Mansour & Tewfik
10−2
P2
N2a [1 iter]
N2a [5 iter]
N2b [1 iter]
N2b [5 iter]
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
3 ×10−1
Figure 6. Comparison with Davey-MacKay: improving the performance of
[4, Code D] (left) and [4, Code I] (right) using our MAP decoder, iterative
decoding, and an inner code with better Levenshtein distance spectrum.
and the increased decoding latency and complexity caused
by the augmented block size. Since the code performance is
undiminished, to simplify our analysis from this point onwards
we assume known frame start and end positions.
B. Comparison with Prior Art
We have already shown in [13] that the (symbol-level) MAP
decoder allows us to obtain better performance from the codes
of [4]. Further improvement can be obtained with iterative
decoding, as we show here. Additionally, the flexibility of
TVB codes allows us to obtain codes that perform better
at the same size and/or rate. In the following, we simulate
channel conditions Pi = Pd ; Ps = 0 in order to compare with
published results.
For low channel error rates, consider [4, Code D], listed as
P1 in Table III. We compare the previously published result
with a MAP decoding of the same code (N1a) in Fig. 6. As
shown in [13], the MAP decoder improves the performance
of this code even after the first iteration; additional iterations
improve the result further. At the same overall code rate and
block size we can improve the performance further by designing an inner TVB code with a better Levenshtein distance
spectrum (N1b). We repeat the process at higher channel
error rates for [4, Code I], listed as P2 in Table III. Again,
compared to the published result, a MAP decoding of the same
code (N2a) improves performance even after the first iteration,
also in Fig. 6. Additional iterations improve the result, but
the difference in this case is less pronounced. Replacing the
inner code with one of the same size but a better Levenshtein
distance spectrum (N2b) improves performance further.
As we have already discussed in Section II-A, the marker
codes given by Ratzer [5] can also be cast as TVB codes.
In [5] binary outer LDPC codes were used. To use a binary
outer code with our MAP decoder, the bitwise APPs can
be obtained from the q-ary symbol APPs by marginalizing
over the other bits [21, p. 326]; these are then passed to the
decoder for the binary outer code. In this case, for a binary
10−2
P3 [serial]
P3 [iterative]
N3 [1 iter]
N3 [20 iter]
P4 [10 iter]
N4 [5 iter]
P5 [10 iter]
N5 [20 iter]
10−3
10−4
10−5 −2
10
10−1
Channel Error Event Probability (Pd = Pi; Ps =0)
100
Figure 7. Comparison with Ratzer and with Mansour & Tewfik: demonstrating
the equivalence of our MAP decoder on [5, Code D], with and without iterative
decoding, and improving performance on [11, Codes T2, T4] at the same
overall code rate, using inner codes with improved Levenshtein distance in
concatenation with LDPC outer codes.
outer code we expect the performance of the concatenated
code to be identical, whether the inner code is decoded with
the bit-level (MAP) decoder of [5] or with our symbol-level
decoder. We show this in Fig. 7 for [5, Code D], listed as
P3 in Table III, in comparison with an almost-identical code
(N3) using our MAP decoder. It is important to highlight that
decoding marker codes as TVB codes provides no material
advantage; in fact, a cost is paid in complexity for doing
so. We do not propose or expect that marker codes will be
decoded as TVB codes. However, there is value in showing
that marker codes can be decoded as TVB codes with no loss
in performance. Specifically, this allows us to compare the
structure of marker codes with other constructions, within the
same context.
Finally, in Fig. 7 we compare with the more recent turbo
codes of [11, Codes T2, T4], respectively listed as P4 and P5
in Table III, with concatenated systems of the same overall
rate, using a TVB inner code and an LDPC outer code. It can
be seen that our concatenated systems outperform the codes of
[11], significantly at lower channel error rates, and somewhat
less so at higher channel error rates.
IX. C ONCLUSIONS
In this paper we have considered TVB codes, which generalize a number of previous codes for synchronization errors.
We discussed the applicable design criteria for TVB codes,
expressing some previously published codes as TVB codes
and showing that the greater flexibility of TVB codes allows
improved constructions. For example, our (7, 8, 4) TVB code
achieves a SER of 10−4 at a Pi , Pd that is almost two orders of
magnitude higher than a marker or distributed marker code of
the same size, and slightly better than our earlier SEC codes.
We also considered a number of important issues related
to a practical implementation of the corresponding MAP
decoder. Specifically, we have given an expression for the
13
expected distribution of drift between transmitter and receiver
due to synchronization errors, with consideration for practical
concerns when evaluating this expression. We have shown how
to determine an appropriate choice for state space limits based
on the drift probability distribution. The decoder complexity
under given channel conditions is then expressed as a function
of the state space limits used. For a given state space, we have
also given a number of optimizations that reduce the algorithm
complexity with no further loss of decoder performance. The
proposed speedups, which are independent of the TVB code
construction, result in a considerable reduction in complexity
of almost two orders of magnitude for typical code sizes and
channel conditions. For code constructions with appropriate
mathematical structure we expect to be able to replace the
receiver metric, which considers each possible transmitted
codeword, with a faster soft-output algorithm. Next, we have
considered the practical problem of stream decoding, where
there is no prior knowledge of the received frame boundary
positions. In doing so we have also shown how an appropriate choice of decoder parameters allows stream decoding to
approach the performance when frame boundaries are known,
at the expense of some increase in complexity.
Finally, practical comparisons of TVB codes with earlier
constructions were given, showing that TVB code designs can
in fact achieve improved performance. Even compared to the
state of the art codes of [11], the TVB codes presented here
1
achieve a FER of 10−3 at 24% higher Pi , Pd for a rate- 10
3
code, and at 84% higher Pi , Pd for a rate- 14 code. We expect
further improvements to the codes shown here to be possible,
particularly by co-designing optimized outer codes. However,
a detailed treatment of the design process is beyond the scope
of this paper, and will be the subject of further work.
R EFERENCES
[1] F. F. Sellers, “Bit loss and gain correction code,” IRE Trans. Inf. Theory,
vol. IT-8, pp. 35–38, 1962.
[2] V. I. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals,” Sov. Phys. Doklady, vol. 10, no. 8, pp. 707–710,
1966.
[3] R. G. Gallager, “Sequential decoding for binary channels with noise and
synchronization errors,” Massachusetts Inst. of Tech. Lexington Lincoln
Lab, Tech. Rep. 2502, Oct. 27th, 1961.
[4] M. C. Davey and D. J. C. MacKay, “Reliable communication over
channels with insertions, deletions, and substitutions,” IEEE Trans. Inf.
Theory, vol. 47, no. 2, pp. 687–698, 2001.
[5] E. A. Ratzer, “Marker codes for channels with insertions and deletions,”
Annals of Telecommunications, vol. 60, pp. 29–44, Jan. 2005.
[6] F. Wang, D. Fertonani, and T. M. Duman, “Symbol-level synchronization
and LDPC code design for insertion/deletion channels,” IEEE Trans.
Commun., vol. 59, no. 5, pp. 1287–1297, May 2011.
[7] T. Swart, H. Ferreira, and M. dos Santos, “Using parallel-interconnected
Viterbi decoders to correct insertion/deletion errors,” in 7th AFRICON
Conference in Africa, vol. 1, Sep. 2004, pp. 341–344.
[8] M. Schlauweg, D. Profrock, and E. Muller, “Correction of insertions and
deletions in selective watermarking,” in IEEE Intern. Conf. on Signal
Image Technology and Internet Based Systems (SITIS), 2008, Nov. 30th–
Dec. 3rd, 2008, pp. 277–284.
[9] M. Mansour and A. Tewfik, “Convolutional decoding in the presence
of synchronization errors,” IEEE J. Sel. Areas Commun., vol. 28, no. 2,
pp. 218–227, Feb. 2010.
[10] M. F. Mansour and A. H. Tewfik, “Convolutional decoding in the
presence of synchronization errors,” IEEE J. Selected Areas in Commun.,
vol. 28, no. 2, pp. 218–227, Feb. 2010.
[11] ——, “A turbo coding scheme for channels with synchronization errors,”
IEEE Trans. Commun., vol. 60, no. 8, pp. 2091–2100, Aug. 2012.
[12] H. Mercier, V. Bhargava, and V. Tarokh, “A survey of error-correcting
codes for channels with symbol synchronization errors,” IEEE Commun.
Surveys Tuts., vol. 12, no. 1, pp. 87–96, First Quarter 2010.
[13] J. A. Briffa, H. G. Schaathun, and S. Wesemeyer, “An improved
decoding algorithm for the Davey-MacKay construction,” in Proc. IEEE
Intern. Conf. on Commun., Cape Town, South Africa, May 23–27, 2010.
[14] J. A. Briffa and H. G. Schaathun, “Improvement of the Davey-MacKay
construction,” in Proc. IEEE Intern. Symp. on Inform. Theory and its
Applications, Auckland, New Zealand, Dec. 7–10, 2008, pp. 235–238.
[15] V. Buttigieg and J. A. Briffa, “Codebook and marker sequence design for
synchronization-correcting codes,” in Proc. IEEE Intern. Symp. Inform.
Theory, St. Petersburg, Russia, Jul. 31–Aug. 5, 2011.
[16] J. A. Briffa, “A GPU implementation of a MAP decoder for synchronization error correcting codes,” IEEE Commun. Lett., vol. 17, no. 5,
pp. 996–999, May 27th 2013.
[17] L. R. Bahl and F. Jelinek, “Decoding for channels with insertions,
deletions, and substitutions with applications to speech recognition,”
IEEE Trans. Inf. Theory, vol. 21, no. 4, pp. 404–411, Jul. 4, 1975.
[18] L. C. Perez, J. Seghers, and D. J. Costello, Jr., “A distance spectrum
interpretation of turbo codes,” IEEE Trans. Inf. Theory, vol. 42, no. 6,
pp. 1698–1709, Nov. 1996.
[19] G. Ferrari and K. M. Chugg, “Linear programming-based optimization
of the distance spectrum of linear block codes,” IEEE Trans. Inf. Theory,
vol. 49, no. 7, pp. 1794–1800, 2003.
[20] M. C. Davey, “Error-correction using low-density parity-check codes,”
Ph.D. dissertation, University of Cambridge, 1999.
[21] D. J. C. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003.
| 7 |
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
1
A Dissipative Systems Theory for FDTD with
Application to Stability Analysis and Subgridding
arXiv:1606.08761v1 [cs.CE] 28 Jun 2016
Fadime Bekmambetova, Xinyue Zhang, and Piero Triverio, Senior Member, IEEE
Abstract—This paper establishes a far-reaching connection
between the Finite-Difference Time-Domain method (FDTD) and
the theory of dissipative systems. The FDTD equations for a
rectangular region are written as a dynamical system having
the magnetic and electric fields on the boundary as inputs and
outputs. Suitable expressions for the energy stored in the region
and the energy absorbed from the boundaries are introduced,
and used to show that the FDTD system is dissipative under
a generalized Courant-Friedrichs-Lewy condition. Based on the
concept of dissipation, a powerful theoretical framework to
investigate the stability of FDTD methods is devised. The new
method makes FDTD stability proofs simpler, more intuitive, and
modular. Stability conditions can indeed be given on the individual components (e.g. boundary conditions, meshes, embedded
models) instead of the whole coupled setup. As an example of
application, we derive a new subgridding method with material
traverse, arbitrary grid refinement, and guaranteed stability. The
method is easy to implement and has a straightforward stability
proof. Numerical results confirm its stability, low reflections, and
ability to handle material traverse.
Index Terms—finite-difference time-domain, stability, energy,
dissipation, subgridding.
I. I NTRODUCTION
The Finite-Difference Time-Domain (FDTD) method is
widely used to solve Maxwell’s equations numerically in microwave and antenna engineering, photonics and physics [1],
[2]. FDTD is versatile, easy to implement, and has a low
computational cost per time step. Through explicit update
equations, FDTD recursively computes the electric and magnetic field in the region of interest without requiring the
solution of linear systems. This update process is stable if time
step ∆t satisfies the Courant-Friedrichs-Lewy (CFL) stability
limit [2]
1
∆t < q q
,
(1)
1
1
1
1
εµ
∆x2 + ∆y 2 + ∆z 2
where ∆x, ∆y, ∆z denote cell size, ε denotes permittivity
and µ denotes permeability. While many breakthroughs have
been achieved in FDTD since Yee’s original algorithm [3],
the efficiency of FDTD for multiscale problems remains an
open problem. The simultaneous presence of large and small
geometrical features can dramatically reduce FDTD efficiency
Manuscript received ...; revised ...
This work was supported in part by the Natural Sciences and Engineering
Research Council of Canada (Discovery grant program) and in part by the
Canada Research Chairs program.
F. Bekmambetova, X. Zhang and P. Triverio are with
the Edward S. Rogers Sr. Department of Electrical and
Computer Engineering, University of Toronto, Toronto, M5S
3G4
Canada
(email:
[email protected],
[email protected], [email protected]).
because of two factors. First, the mesh has to be refined,
at least locally, to properly resolve small features, which
increases the number of unknowns and the cost per iteration.
Second, because of (1), a mesh refinement imposes a smaller
time step, which further increases computational cost. For
example, a 3X refinement of the entire FDTD mesh increases
computational cost by 81 times. These issues are unfortunate
since multiscale problems abound in practice.
Numerous solutions have been proposed to mitigate this
issue, including sophisticated boundary conditions to mimic
open spaces [2], local grid refinement [4], [5], [6] (commonly
known as subgridding), thin wire models [1], lumped elements [7], [8], and hybridizations with model order reduction [9], [10], [11], finite elements [12], integral equations [13],
ray tracing [14] and implicit schemes like ADI-FDTD [15],
[16]. From a system theory viewpoint, many of these methods
consist of the interconnection of subsystems, such as models,
algorithms, boundary conditions. For example, in [13], an
FDTD model, used to describe an inhomogeneous scatterer,
is coupled to the time-domain method of moments, used to
model a thin-wire antenna. In this way, one can leverage the
respective strengths of different algorithms. However, while
the stability properties of the individual algorithms may be
well understood, ensuring the stability of their combination
can be a formidable task. Ensuring stability is not trivial even
in the relatively simple case of FDTD subgridding, where
one just couples a coarse and a fine FDTD grid through
an interpolation rule to relate fields at the grid transition.
The lack of a systematic approach to ensure the stability of
advanced FDTD methods is a major issue, that limits the
development of new methods and their adoption by industry,
where guaranteed stability is mandatory. This issue is the
main motivation for this paper, that proposes a new theoretical
framework to investigate and ensure the stability of both
simple and advanced FDTD methods.
Several techniques are available to analyze the stability
of FDTD-like methods. Von Neumann analysis [1] is the
simplest, but is only applicable to uniform meshes and homogeneous materials. The iteration method [2] checks if the
eigenvalues of the matrix that relates the current and next
field solution are all below one in magnitude. In the energy
method [8] instead, one writes an expression for the total
energy stored in the simulation domain, and then checks if
the algorithm satisfies a discrete equivalent of the principle of
energy conservation. Since energy conservation prevents an
unphysical growth of the solution, this implies stability [17].
The iteration and energy methods are general, but they can lead
to long derivations, since they require the analysis of the whole
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
West
boundary
North boundary
(Nx + 1, Ny + 1)
∆x
Ey |1, 3
2
Hz |1, 3
2
(1, 1)
∆y
Hz | 3 , 3
East boundary
coupled scheme, which may consist of many subsystems such
as FDTD meshes, different boundary conditions, reduced order
models, and so on. For example, in a subgridding scenario,
one must derive the iteration matrix or energy function of the
whole scheme, taking simultaneously into account coarse and
fine meshes, interpolation rules and boundary conditions. This
issue makes stability analysis quite involved. Moreover, it does
not yield stability conditions on the individual subsystems.
Consequently, if a subsystem is changed (for example, a different boundary condition is introduced), the iteration matrix or
energy function of the whole problem must be derived again.
In this paper, we propose a new stability framework for
FDTD. The framework is based on the theory of dissipative
systems [18], and generalizes the energy method. First, starting
from FDTD update equations, we develop a self-contained
mathematical model for a region with arbitrary permittivity,
permeability and conductivity. The model is in the form of a
discrete time dynamical system. The magnetic field tangential
to the boundary is taken as input, while the electric field
tangential to the boundary is taken as output. Through this
form, we reveal that an FDTD model can be interpreted as
a dynamical system which is dissipative when ∆t satisfies a
generalized CFL condition. If this condition is not met, the
system can generate energy on its own, leading to an unstable
simulation. We thus establish a connection between FDTD and
the elegant theory of dissipative systems, which is a novel
result. We believe that this connection will greatly benefit the
FDTD community, since the theory of dissipative systems has
been extremely successful in control theory for ensuring the
stability of interconnected systems. This key result sets the
basis for a powerful FDTD stability theory, where each part
of a given FDTD setup (standard meshes, boundary conditions,
interpolation schemes, ...) is interpreted as a subsystem, and is
required to be dissipative. Since the connection of dissipative
systems is dissipative [18], [17], this will ensure the stability
of the FDTD algorithm resulting from the connection of the
subsystems. The proposed theory has numerous advantages. It
simplifies stability proofs, since conditions can be imposed
on each subsystem individually, rather than on the whole
coupled algorithm. Stability proofs are thus made modular
and “reusable”: once a given FDTD model (e.g., an advanced
boundary condition) has been deemed to be dissipative, it can
be combined to any other dissipative FDTD subsystem with
guaranteed stability. The proposed approach also naturally
provides the CFL stability limit of the resulting scheme,
which will be the most restrictive CFL limit of the individual
subsystems. Finally, the theory is intuitive, since it is based on
the concept of energy, familiar to most scientists. The proposed
theory is presented in 2D, for the sake of clarity. An extension
to 3D is feasible and is currently under development.
As an example of application, the proposed theory is
used to derive the subgridding algorithm which is stable
by construction, and has several desirable features. Material
traverse is supported for both dielectrics and highly conductive
materials, which is a limitation of other stable subgridding
methods [19]. The proposed method has low reflections, and
avoids non-rectangular cells [6], finite element concepts [20]
and Withney forms [21], [22]. Corners are natively supported
2
y
z
x
2 2
Hz | 3 ,1 Ex | 3 ,1
2
2
South boundary
Figure 1: Graphical representation of the 2D region considered
in Sec. II. The hanging variables introduced on the four
boundaries are denoted in green.
without any special treatment [5] nor L-shaped cells [6].
Ultimately, the proposed algorithm just consists of a compact
FDTD-like update equation for the edges between coarse and
fine mesh, and is thus easy to implement. This update equation
is provided explicitly for an arbitrary integer refinement ratio
r, while several previous works [5], [6] provide the update
weights only for specific refinements (typically r = 2 or 3),
leaving the derivation of other cases to the Reader.
The paper is organized as follows. In Sec. II, we cast the
FDTD update equations for a rectangular region into the form
of a dynamical system with suitable inputs and outputs. In
Sec. III, we show that FDTD equations can be interpreted as
a dissipative system, and propose the new stability theory. The
theory is applied to derive a stable subgridding algorithm in
Sec. IV, followed by numerical results in Sec. V.
II. D ISCRETE T IME DYNAMICAL M ODEL FOR A 2D FDTD
R EGION
The goal of this section is to cast the FDTD equations for a
2D region into the form of a discrete time dynamical model.
The model shall be self-contained, involving only field samples
from the nodes belonging to the region. This goal will be
achieved by introducing suitable magnetic field samples at the
boundaries.
We consider the 2D rectangular region shown in Fig. 1,
operating in a TE mode with components Ex , Ey , and Hz .
The region is discretized with a uniform rectangular grid with
Nx × Ny cells, of width ∆x and height ∆y. In addition to
the field samples used by standard FDTD, we also sample the
H field on the four boundaries of the region. These additional
samples will be referred to as hanging variables [22], and will
allow us to:
1) develop a self-contained model for the region, which
does not involve field samples beyond its boundaries;
2) derive an expression for the energy absorbed from each
boundary;
3) connect the FDTD grid to other subsystems while maintaining stability.
To keep the notation compact, we collect all Ex and Ey
samples into column vectors Enx and Eny , of size NEx =
Nx (Ny + 1) and NEy = (Nx + 1)Ny , respectively. The Hz
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
3
samples at the internal nodes are collected into column vector
n+ 1
Hz 2 of size NHz = Nx Ny . The hanging variables on the
South boundary of the region are collected into the Nx × 1
vector
h
iT
n+ 1
n+ 1
n+ 1
(2)
HS 2 = Hz |1+ 12,1 . . . Hz |N +2 1 ,1 .
x
2
A. State Equation for Each Node
The dynamical model for the region consists of an update
equation for each E and H sample, excluding the hanging
variables. Those variables will indeed be eliminated once the
region is connected to the surrounding subsystems or to some
boundary conditions.
1) Internal Hz Nodes: For these nodes, we use a standard
FDTD update [2]
µ
µ
n+ 1
n− 1
Hz |i+ 12,j+ 1 = ∆x∆y Hz |i+ 12,j+ 1
2
2
2
2
∆t
∆t
− ∆xEx |ni+ 1 ,j + ∆xEx |ni+ 1 ,j+1
2
2
2
(3)
2
for i = 1, . . . , Nx and j = 1, . . . , Ny . In (3), µ denotes
n+ 1
the average permittivity on the edge where Hz |i+ 12,j+ 1 is
2
2
sampled. Subscripts are omitted from µ in order to simplify
the notation. Equations (3) can be written in matrix form as
Dµ n+ 12
Dµ n− 12
Hz
= DA
Hz
+ Gy Dlx Enx − Gx Dly Eny ,
∆t
∆t
(4)
where DA is a diagonal matrix containing the area of the
primary cells, Dµ is a diagonal matrix containing the average
permittivity on each edge of the secondary grid. Diagonal
matrices
DA
Dly = ∆yINEy
(5)
contain the length of the x- and y-directed edges of the primary
grid, respectively. With Im , we denote the m × m identity
matrix. Matrix Gx is the discrete derivative operator along x,
which can be written as
Gx = INy ⊗ WNx ,
(6)
where ⊗ is the Kronecker’s product [23] and WNx is the
Nx × (Nx + 1) matrix [24]
−1 +1
−1 +1
Wn =
(7)
.
..
..
.
.
−1 +1
Similarly,
Gy = WNy ⊗ INx .
2
2
2
for i = 1, . . . , Nx and j = 2, . . . , Ny . In (9), εx and σx denote,
respectively, the average permittivity and average conductivity
on the corresponding edge. While the common factor ∆x
could be eliminated from (9), it is kept as it will be useful
later.
For the Ex nodes on the South boundary, the standard
FDTD update equation involves a Hz sample outside the
region. In order to avoid this, we apply the finite difference
approximation to the half step of the
secondary grid between
nodes i + 12 , 1 + 12 and i + 12 , 1 , making use of the hanging variables. In this way, we obtain an update equation that
involves only field samples from the considered region
σx
∆y εx
+
Ex |n+1
=
∆x
i+ 21 ,1
2 ∆t
2
σx
∆y εx
−
Ex |ni+ 1 ,1
∆x
2
2 ∆t
2
n+ 12
n+ 1
+ ∆xHz |i+ 1 ,1+ 1 − ∆xHz |i+ 12,1 , (10)
2
+ ∆yEy |ni,j+ 1 − ∆yEy |ni+1,j+ 1
Dlx = ∆xINEx
2
2
Similarly, the hanging variables on the North, East and West
n+ 1
n+ 1
n+ 1
sides are cast into column vectors HN 2 , HE 2 and HW 2 ,
respectively.
∆x∆y
2) Ex Nodes: For the Ex nodes that fall strictly inside the
region, we use a standard FDTD update [2]
ε
ε
σx
σx
x
x
∆x∆y
Ex |n+1
=
∆x∆y
Ex |ni+ 1 ,j
+
−
1
i+ 2 ,j
2
∆t
2
∆t
2
n+ 21
n+ 21
+ ∆xHz |i+ 1 ,j+ 1 − ∆xHz |i+ 1 ,j− 1 (9)
(8)
2
2
for i = 1, . . . , Nx . In (10), εx and σx denote the material
properties of the half cell between nodes i + 12 , 1 + 12 and
i + 12 , 1 . The update equation for the Ex nodes on the North
boundary is obtained similarly, and reads
∆y εx
σx
∆x
=
+
Ex |n+1
i+ 21 ,Ny +1
2 ∆t
2
∆y εx
σx
∆x
−
Ex |ni+ 1 ,Ny +1
2
2 ∆t
2
n+ 21
n+ 1
+ ∆xHz |i+ 1 ,N +1 − ∆xHz |i+ 12,N + 1 , (11)
2
y
2
y
2
for i = 1, . . . , Nx . Relations (9), (10) and (11) can be
compactly written as
D εx
Dσx
Dlx Dly0
+
En+1
=
x
∆t
2
Dσx
Dεx
n+ 1
−
Enx − Dlx GTy Hz 2
Dlx Dly0
∆t
2
"
1#
2
Hn+
S
+ Dlx BS Dlx BN
, (12)
n+ 1
HN 2
where
• Dl0 is an NEx × NEx diagonal matrix containing the
y
length of the y-directed edges of the secondary grid,
including the half-edges of length ∆y/2 that intersect
the North and South boundaries;
• Dεx and Dσx are diagonal matrices storing the permittivity and conductivity on each x-directed primary edge,
respectively;
• BS has all entries set to zero, except for a −1 at
the intersection of each row associated with a South
boundary edge and the column of the corresponding
n+ 1
hanging variable in HS 2 ;
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
4
BN is defined similarly to BS , but has a +1 on each
entry associated with an edge of the North boundary.
3) Ey Nodes: The update equations for the Ey nodes are
derived with a similar procedure. A standard FDTD update
equation is written for the Ey nodes that fall strictly inside the
region. For the Ey nodes on the West and East boundaries,
instead, finite differences are applied on a half grid step,
similarly to (10) and (11). This process leads to
Dσy
D εy
+
En+1
=
Dly Dlx0
y
∆t
2
Dσy
D εy
n+ 1
Dly Dlx0
−
Eny + Dly GTx Hz 2
∆t
2
#
"
n+ 21
HW
, (13)
+ Dly BW Dly BE
n+ 1
HE 2
•
where
• Dl0 is an NEy × NEy diagonal matrix containing the
x
length of the x-directed edges of the secondary grid,
including the half-edges of length ∆x/2 that intersect
the East and West boundaries;
• Dεy and Dσy are diagonal permittivity and conductivity
matrices associated with the y-directed edges of the
primary grid, respectively;
• BW has all entries set to zero, except for a +1 at
the intersection of each row associated with a West
boundary edge and the column of the corresponding
n+ 1
hanging variable in HW 2 ;
• BE is analogous to BW , but has a −1 on each entry
associated with an East boundary edge.
B. Descriptor System Formulation
The update equations derived in the previous sections form
a complete dynamical model for the rectangular region
(R + F)xn+1
y
n
=
1
(R − F)xn + Bun+ 2 ,
T
n
= L x .
(14a)
equation (14b) extracts these values from the state vector xn .
The coefficients matrices in (14a) and (14b) read
Dεx
1
T
Dlx Dly0 ∆t
0
2 Dlx Gy
Dε
R=
0
Dly Dlx0 ∆ty − 12 Dly GTx , (17)
D
1
− 12 Gx Dly
DA ∆tµ
2 Gy Dlx
D
1
T
Dlx Dly0 2σx
0
D
G
l
y
x
2
Dσ
F=
0
Dly Dlx0 2 y − 21 Dly GTx , (18)
1
− 12 Gy Dlx
0
2 Gx Dly
Dlx BS Dlx BN
0
0
0
Dly BW Dly BE ,
B= 0
(19)
0
0
0
0
−BS BN
0
0
0
BW −BE .
L= 0
(20)
0
0
0
0
Equations (14a)-(14b) define an FDTD-like model for a
2D lossy, source-free region, with possibly non-uniform permittivity and permeability. From a control perspective, this
model is a discrete time descriptor system [25], also known
as generalized state-space. From an electrical standpoint, the
model is an impedance-type description of the region, because
it gives the electric field tangential to the boundary in terms
of the tangential magnetic field. In [24], a special case of
the proposed representation was derived for a lossy region
enclosed by PEC boundaries. The proposed developments
generalize [24] in two directions:
1) the assumption of a PEC termination is removed. Suitable input-output variables are introduced in such a
way that model (14a)-(14b) can be connected to other
subsystems, such as different FDTD grids, boundary
conditions, or reduced models;
2) the proposed formulation will allow us to prove, in the
next section, that FDTD equations can be interpreted as
a dissipative dynamical system.
(14b)
III. FDTD AS A D ISSIPATIVE D ISCRETE T IME S YSTEM
The first equation (14a) is formed by update equations (4),
(12) and (13), and updates the state vector
n
Ex
n
xn = Ey ,
(15)
n− 12
Hz
which consists of all electric and magnetic field samples in the
1
region, excluding hanging variables. The input vector un+ 2
n
and output vector y are given by
n+ 1
n
H 2
ES
Sn+ 21
n
1
H
E
N
yn = nN .
un+ 2 =
(16)
1
n+ 2
EW
HW
n
EE
n+ 1
HE 2
The input vector contains all hanging variables, i.e. all magnetic field samples on the region boundaries. The output
vector is made by the E samples at the same nodes, which
are collected into vectors EnS , EnN , EnW and EnE . Output
In this section, we define suitable expressions for the energy
stored in the 2D region and the energy absorbed from its
four boundaries. These expressions are then used to derive
the conditions under which system (14a)-(14b) is dissipative.
A. Dissipation Inequality
A discrete time system like (14a)-(14b) is dissipative when
it satisfies the following condition [26].
Definition 1. Dynamic system (14a)-(14b) is said to be
1
dissipative with supply rate s(yn , un+ 2 ) if there exists a
n
nonnegative function E(x ) with E(0) = 0, called storage
function, such that
1
E(xn+1 ) − E(xn ) ≤ s(yn , un+ 2 )
n+ 12
for all u
(21)
and all n.
The storage function E(xn ) can be interpreted as the energy stored in the system at time n, while the supply rate
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
5
1
s(yn , un+ 2 ) is the energy absorbed by the system from its
boundaries between time n and n+1. Clearly, only dissipative
systems can satisfy the dissipation inequality (21). Indeed,
their stored energy can increase between time n and n + 1
by at most the energy absorbed from the outside world. If
this limit is violated, the system is considered active, since it
can generate energy on its own. For most practical systems,
inequality (21) is satisfied strictly because of the presence of
losses.
B. Storage Function and Supply Rate
For system (14a)-(14b), we choose as candidate storage
function
∆t n T
(x ) Rxn ,
(22)
E(xn ) =
2
and as supply rate
n+ 12
n
s(y , u
yn + yn+1
) = ∆t
2
T
1
LT Bun+ 2 .
Substituting (27) into (23), we obtain
(EnS + En+1
)T n+ 12
S
HS
2
n+1 T
n
n
T
(E + EN )
(E + En+1
n+ 1
n+ 1
W )
+∆t∆x N
HN 2 +∆t∆y W
HW 2
2
2
T
(EnE + En+1
n+ 1
E )
HE 2 , (28)
− ∆t∆y
2
and see that the supply rate is the sum of the energy absorbed
by the region from each boundary between time n and n + 1.
Signs in (28) are consistent with the direction of the Poynting
vector on each boundary.
1
s(yn , un+ 2 ) = −∆t∆x
C. Dissipativity Conditions
Using the proposed storage function (22) and supply
rate (23), we can derive simple dissipativity conditions on the
coefficients matrices R, F, B and L in (14a)-(14b).
Theorem 1. If
(23)
R = RT > 0 ,
(29a)
Before showing that these functions satisfy (21), we investigate
their physical meaning. Substituting (17) into (22), we get
F + FT ≥ 0 ,
(29b)
B = LLT B ,
(29c)
1 n T
(E ) Dlx Dly0 Dεx Enx
2 x
T
1
Eny Dly Dlx0 Dεy Eny
+
2
∆t
Dµ n− 21
n
n
Hz
+
Gy Dlx Ex − Gx Dly Ey + DA
. (24)
2
∆t
E(xn ) =
Since the term between square brackets is the right hand side
of (4), we can reduce (24) to
1
T
E(x ) = (Enx ) Dlx Dly0 Dεx Enx
2
T
1
Eny Dly Dlx0 Dεy Eny
+
2
1 n− 12 T
n+ 1
Hz
DA Dµ Hz 2 . (25)
+
2
n
Z
A
1 2
1
1 2
2
εE (t) + εEy (t) + µHz (t) dA ,
2 x
2
2
(26)
the continuous expression for the electromagnetic energy per
unit height of a 2D TE mode in a region of area A. The first
term of (25) is the energy stored in the x component of the
electric field in the region. Indeed, the diagonal matrix Dlx Dly0
is the area of the half cells around the Ex edges. Similarly,
the second and third term in (25) represent the energy stored
in the Ey and Hz components, respectively.
We now discuss the physical meaning of supply rate (23).
Direct inspection reveals that
−∆xINx
0
0
0
0
+∆xINx
0
0
.
LT B =
0
0
+∆yINy
0
0
0
0
−∆yINy
(27)
then system (14a)-(14b) is dissipative according to Definition 1, with (22) as storage function and (23) as supply rate.
Proof. Condition (29a) makes storage function (22) nonnegative for all xn , as required by Definition 1. Next, we show
that if (29b) and (29c) hold, the dissipation inequality (21) will
hold as well. Substituting (22) and (23) into (21), we obtain
T
T
1
T
xn+1 Rxn+1 −(xn ) Rxn − yn + yn+1 LT Bun+ 2 ≤ 0 .
This inequality can be rewritten as
T
T
xn+1 R xn+1 − xn + xn+1 − xn Rxn
T
1
− yn + yn+1 LT Bun+ 2 ≤ 0
(30)
From (14a), we have that
1
R xn+1 − xn = −F xn+1 + xn − Bun+ 2
(31)
T
Using (31), the terms R xn+1 − xn and xn+1 − xn R
in (30) can be expressed in terms of F
T
T
− xn+1 F xn+1 + xn − xn+1 + xn FT xn
T
T
1
1
+ xn+1 Bun+ 2 + un+ 2
BT xn
T
1
1
T
− (xn ) LLT Bun+ 2 − xn+1 LLT Bun+ 2 ≤ 0 (32)
Under (29c), we can finally rewrite (32) as
T
xn+1 + xn
F + FT xn+1 + xn ≥ 0
(33)
which is clearly satisfied if (29b) holds.
We now investigate the physical meaning of the three
dissipativity conditions, starting from (29c), which can be
directly verified by combining (27) and (20). This condition
holds because the region inputs and outputs in (16) are
sampled at the same nodes, and is reminiscent of a similar
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
6
relation which holds for linear circuits under the impedance
representation [27]. Condition (29b) is related to losses, and
reads
Dlx Dly0 Dσx
0
0
F + FT =
0
Dly Dlx0 Dσy 0 ≥ 0 . (34)
0
0
0
Since Dlx , Dly , Dlx0 and Dly0 are diagonal with positive
elements only, (34) boils down to
D σx
≥ 0,
(35)
Dσy
≥ 0.
(36)
As one may expect, the average conductivity on each primary
edge must be non-negative in a dissipative system. Condition (29a) is the most interesting, and is a generalized CFL
criterion. From (17), we see that R = RT by construction.
With the Schur’s complement [28], we can transform (29a)
into
Dlx Dly0 Dεx > 0 ,
(37)
Dly Dlx0 Dεy > 0 ,
4
IN ,
SST <
∆t2 Hz
(38)
(39)
where
h
1
−1
−1
−1
−1
S = DA 2 Dµ 2 Gy Dl2x Dl0 2 Dεx2
i
1
−1
−1
−Gx Dl2y Dl0 2 Dεy2 .
y
x
(40)
Inequalities (37) and (38) are clearly satisfied by construction.
If we denote with sk the singular values of (40), inequality (39)
will hold if
2
∆t <
∀k .
(41)
sk
This condition sets an upper bound on the FDTD time step,
and is analogous to the generalized CFL constraint derived
in [24] for an FDTD grid terminated on PEC boundaries.
From (40), we indeed see that the time step upper limit
depends on grid size, permittivity and permeability. Using a
time step which violates (41) has two consequences. First, the
discretization of Maxwell’s equations leads to an active discrete time model, even if the real physical system has positive
losses everywhere, and should therefore be dissipative. The
numerical model is thus inconsistent with the actual physics.
Second, being able to generate energy on its own, model (14a)(14b) can lead to divergent transient simulations. Even when
such model is connected to other dissipative subsystems, its
ability to generate energy on its own can destabilize the
whole simulation. The proposed theory provides a new, deeper
understanding on the root causes of FDTD instability, and is
able to pinpoint which part of an FDTD setup is responsible
for it. It is hoped that this new explanation will facilitate
the development of powerful FDTD schemes with guaranteed
stability.
D. Relation to CFL Stability Limit
The relation between (41) and the CFL limit can be further
understood if we apply (41) to a single cell. The purpose
of (41) is to make storage function (22) non-negative. A
sufficient condition for this is to require the energy stored in
each primary cell to be positive. This condition can be derived
by applying (39) to a single primary cell. We consider the
primary cell extending from node (i, j) to node (i + 1, j + 1).
The coefficient matrices for this special case can be obtained
from the formulas in Sec. II by setting Nx = Ny = 1
Dlx = ∆xI2
∆x
I2
Dlx0 =
2
Gx = Gy = −1
1
Dly = ∆yI2
∆y
Dly0 =
I2
2
DA = ∆x∆y
(42)
(43)
(44)
The permeability matrix Dµ = µ|i+ 12 ,j+ 12 is the average
permeability on the secondary edge, while the permittivity
matrices
0
0
εx |i+ 12 ,j
εy |i,j+ 12
Dεx =
Dεy =
0
εx |i+ 21 ,j+1
0
εy |i+1,j+ 21
(45)
contain the average permittivity on the four primary edges.
Substituting (42)-(45) into (39), we obtain
"
!
1
1
1
∆t <
+
2∆x2 µ|i+ 12 ,j+ 12 εy |i,j+ 12
εy |i+1,j+ 12
! #− 21
1
1
1
, (46)
+
+
2∆y 2 µ|i+ 21 ,j+ 12 εx |i+ 12 ,j
εx |i+ 21 ,j+1
which is a generalized CFL condition. For a uniform medium
with permittivity ε and permeability µ, (46) reduces to
∆t < q
1
1
εµ
q
1
∆x2
+
1
∆y 2
,
(47)
the CFL limit of 2D FDTD. This derivation confirms that (29a)
is a generalized CFL condition, here reinterpreted in the
context of dissipation.
E. Application to Stability Analysis
The proposed dissipation theory can be effectively used
to investigate and enforce the stability of FDTD algorithms.
Most FDTD setups consist of an interconnection of FDTD
subsystems. In the simplest scenario, a uniform FDTD grid
is connected to some boundary conditions. In most advanced
scenarios, one may want to couple a main FDTD grid to
refined grids, reduced models, lumped elements, or models
from other numerical techniques, such as finite elements,
integral equations or ray tracing.
Ensuring stability of these hybrid schemes can be very
challenging, since stability is a property of the overall scheme,
rather than of its individual subsystems. By invoking the concept of dissipation, we can instead achieve stability in an easy
and modular way. Each part is seen as an FDTD subsystem
and required to satisfy dissipativity conditions (29a)-(29c).
Since the connection of dissipative systems is dissipative by
construction [17], the overall method will be guaranteed to be
stable. The proposed theoretical framework generalizes the socalled energy method [8], and has numerous advantages over
the state of the art:
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
1) non-uniform problems can be handled, unlike in the von
Neumann analysis [1];
2) stability conditions can be given on each subsystem
separately, unlike in the iteration method [2], which
requires the analysis of the iteration matrix of the whole
scheme. This makes stability analysis modular and thus
simpler;
3) once some given FDTD models have been proven dissipative, they can be arbitrarily interconnected without
having to carry out further stability proofs. With the
iteration method, when a single part of a coupled scheme
changes, the whole proof must be revised;
4) the CFL limit of the resulting scheme can be easily
determined by applying (37), (38) or (39) to each
subsystem and taking the most restrictive CFL limit;
5) the stability framework is intuitive, since it is based on
the fundamental physical concept of energy dissipation.
7
∆x
r
Ĥz |ı̂+ 12 ,̂+ 12
Ĥz |ı̂+ 32 ,̂+ 12
∆y
r
(ı̂, ̂) Ĥz |ı̂+ 21 ,̂ Êx |ı̂+ 12 ,̂ Ĥz |ı̂+ 32 ,̂ Êx |ı̂+ 32 ,̂
Hz |i+ 1 ,j
(i, j)
Ex |i+ 1 ,j
2
y
2
z
Hz |i+ 1 ,j− 1
2
x
2
Figure 2: Subgridding scenario considered in Sec. IV for the
case of r = 2. For clarity, a virtual gap has been inserted
between the two grids. This virtual gap is closed when the
two grids are connected.
Fine mesh
Ĥz |ı̂+ 1 ,̂
2
Êx |ı̂+ 3 ,̂ Ĥz |ı̂+ 3 ,̂
2
2
Êx |ı̂+ 1 ,̂
2
IV. A PPLICATION : S TABLE FDTD S UBGRIDDING
We demonstrate the proposed theory by deriving a subgridding algorithm which is stable by construction, easy to
implement and supports an arbitrary grid refinement ratio. The
goal is to derive stable update equations for a setup where one
or more fine grids are embedded in a main coarse grid. Without
loss of generality, we consider the case where a coarse grid
with cell size ∆x × ∆y hosts a single fine grid with cell size
∆x/r × ∆y/r, where r is an arbitrary integer. The algorithm
will ultimately consist of conventional FDTD equations to
update the fields that fall strictly inside the two grids, and
a special update equation to update the fields on the edges
at the grid transition. To derive the method, it is sufficient
to consider the interface between a single coarse cell and the
corresponding fine cells, as shown in Fig. 2. In the figure a
virtual gap has been opened between the two grids for clarity.
Without loss of generality, we consider a refinement in the
positive x direction. The other three cases can be derived in
the same way. The coarse cell under consideration is centered
at node (i+ 12 , j − 12 ) and the corresponding fine cells at nodes
(ı̂ + 12 , ̂ + 21 ), ... , (ı̂ + r − 12 , ̂ + 21 ), where coordinates (ı̂, ̂)
correspond to the same physical location as (i, j) in the coarse
grid. Superscript “ˆ” denotes variables related to the fine grid.
A subgridding algorithm can be interpreted as a the result
of the connection of the three subsystems, as shown in
Fig. 3. Two of those subsystems correspond to the coarse and
fine grids to be coupled. The third subsystem represents the
interpolation rule which is used to relate the fields on the
boundaries of the two grids, that are sampled with different
resolution.
A. State Equations for the Coarse and Fine Cells on the
Boundary
For the coarse and fine grids, we adopt the formulation of
Sec. II, introducing hanging variables on the two boundaries
to be connected. The purpose of the hanging variables is
to facilitate the coupling of the two meshes and the proof
of stability. These extra variables will be eliminated when
deriving the update equation for the fields at the interface.
Interpolation rule
Hz |i+ 1 ,j
2
Ex |i+ 1 ,j
2
Coarse mesh
Figure 3: Interpretation of the subgridding method as the
connection of three dynamical systems, representing the coarse
grid, the fine grid, and the interpolation rule.
On the North boundary of the coarse cell, we introduce the
hanging variable
n+ 12
HN
n+ 1
= Hz |i+ 12,j .
(48)
2
Similarly, on the South fine cell boundaries we introduce the
hanging variables
h
iT
n+ 1
n+ 1
n+ 12
ĤS 2 = Ĥz |ı̂+ 12,̂ . . . Ĥz |ı̂+r−
,
(49)
1
,̂
2
2
as shown in Fig. 2.
From (11), we obtain the following state equation for the
coarse E-field sample at the interface and the coarse hanging
variable
σx n+1
∆y εx
+
EN =
2 ∆t
2
∆y εx
σx n
n+ 1
n+ 1
−
EN + HN 2 − Hj− 12 , (50)
2
2 ∆t
2
where
n+ 1
n+ 1
Hj− 12 = Hz |i+ 12,j− 1 ,
2
2
2
n
EN
= Ex |ni+ 1 ,j ,
(51)
2
and εx and σx are the permittivity and conductivity on the
primary edge of the coarse cell below the interface. Similarly,
the state equation for the r fine cells can be written as
!
∆y D̂εx
D̂σx
+
Ên+1
=
S
2r
∆t
2
!
∆y D̂εx
D̂σx
n+ 1
n+ 1
−
ÊnS + Ĥ̂+ 12 − ĤS 2 , (52)
2
2r
∆t
2
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
8
where
n+ 1
Ĥ̂+ 12
2
h
iT
n+ 1
n+ 21
= Ĥz |ı̂+ 12,̂+ 1 . . . Ĥz |ı̂+r−
,
1
1
2
2
2 ,̂+ 2
iT
h
ÊnS = Êx |nı̂+ 1 ,̂ . . . Êx |nı̂+r− 1 ,̂ ,
2
2
(53)
(54)
and D̂εx and D̂σx are r × r diagonal matrices containing the
values of permittivity and conductivity above the interface for
the South edges where the fine Êx fields are sampled.
B. Interpolation Rule
The interpolation rule [29] relates the field sampled on
the coarse and fine grids. From the boundary condition for
tangential electric fields, we have that
n
ÊnS = EN
T
∀n ,
(55)
where T is an r × 1 matrix of ones. Condition (55) forces
the coarsely- and finely-sampled E fields to be equal at all
times.
On the magnetic fields at the boundary, we impose a
constraint reciprocal to (55)
n+ 12
n+ 1
TT ĤS 2
∀n .
(56)
r
We will see in Sec. IV-D that the reciprocity between the E
and H interpolation rules is required to ensure stability.
HN
=
C. Explicit Update Equation for the Interface
Interpolation conditions (55) and (56) can now be used
to combine (50) and (52) in order to derive an explicit
update equation for the fields at the coarse-fine interface, and
eliminate hanging variables.
Substituting (55) into (52), and multiplying the obtained
equation by TT /r on the left yields
!
∆y TT D̂εx T TT D̂σx T
n+1
+
EN
=
2r
r∆t
2r
!
∆y TT D̂εx T TT D̂σx T
n
−
EN
2r
r∆t
2r
n+ 1
TT Ĥ̂+ 12
n+ 1
TT ĤS 2
+
−
. (57)
r
r
For the simplicity of notation we define symbols for the
average permittivity and conductivity of the r South boundary
fine cells
2
TT D̂σx T
TT D̂εx T
, σ̂x =
.
r
r
Equation (57) can now be added to (50), yielding
!
σx + σ̂rx
∆y εx + ε̂rx
n+1
+
EN
=
2
∆t
2
!
σx + σ̂rx
∆y εx + ε̂rx
n
−
EN
2
∆t
2
ε̂x =
n+ 12
+ HN
n+ 1
− Hj− 12 +
2
n+ 1
TT Ĥ̂+ 12
2
r
(58)
TT ĤS
r
Rearranging (60), we get the following explicit update equation for EN in terms of the neighboring magnetic fields
!−1
!
σ̂x
ε̂x
σ̂x
ε̂x
σ
+
ε
+
σ
+
ε
+
x
x
x
x
n+1
n
r
r
r
r
EN
+
−
EN
=
∆t
2
∆t
2
!−1 T n+ 21
T Ĥ̂+ 1
1
εx + ε̂rx
σx + σ̂rx
2
n+
2
+
+
− Hj− 12 .
2
∆y
∆t
2
r
(61)
The fine interface electric fields are then updated using (55).
It should be noted that, when r = 1, equation (61) reduces to
the standard FDTD update equation.
The overall subgridding algorithm can be summarized as
follows:
1) Calculate the magnetic field samples everywhere at time
n + 12 using conventional FDTD update equations.
2) Use standard FDTD update equations to compute the E
fields at time n + 1 on the edges that are strictly inside
the coarse and fine grids.
n+1
3) Compute EN
, the coarsely-sampled electric field at
the interface, using (61).
4) Update the finely-sampled Êx fields at the interface
using (55).
The computational overhead of this scheme is minimal, since
the coefficients in (61) can be pre-computed before the update
iterations.
The proposed method is thus simple to implement, since it
consists of conventional FDTD update equations inside the two
meshes and a modified update equation for the edges at the
interface. In comparison to previous subgridding methods, we
avoid non-rectangular cells [6], finite element concepts [20]
and Withney forms [21], [22]. The proposed update equation
can be also used at corners with no modifications, unlike in
previous works that require special treatment [5] or L-shaped
cells [6]. Finally, we remark that in Sec. II, the FDTD update
equations have been given in matrix form in order to reveal the
dissipative nature of FDTD systems. This form, however, does
not have to be used in the practical implementation, which can
use conventional for loops or, in languages like MATLAB,
vectorized operations.
D. Proof of Stability
n+ 21
−
With the interpolation rule (56), we cancel the hanging variables to obtain
!
σx + σ̂rx
∆y εx + ε̂rx
n+1
+
EN
=
2
∆t
2
!
n+ 12
T
T
Ĥ
1
σx + σ̂rx
∆y εx + ε̂rx
̂+ 12
n+
n
EN
− Hj− 12 +
−
.
2
2
∆t
2
r
(60)
. (59)
The proposed dissipation theory makes it straightforward to
prove that the subgridding algorithm is stable under the CFL
limit of the fine grid. For stability, all three subsystems in
Fig. 3 need to be dissipative, which requires one to use the
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
9
more restrictive fine grid time step. With the time step chosen
correctly, in order to guarantee the overall stability we need
to only ensure dissipativity of the interpolation rule.
Analogously to (23) the supply rate for the interpolation
subsystem is defined as
n+1
EN
+
n+ 1
) = −∆t∆x
HN 2
s(yn , u
2
)T n+ 21
∆x (ÊnS + Ên+1
S
+ ∆t
ĤS . (62)
r
2
Substituting (55) and (56) into (62), we have
n+ 12
20 mm
∆x = 1 mm
∆y = 2 mm
40 mm
n
EN
PEC
Probe
y
∆x̂ = ∆x/4
∆ŷ = ∆y/4
z
x
40 mm
Source
60 mm
Figure 4: Layout of the PEC cavity considered in Sec. V-A.
1
s(yn , un+ 2 ) =
n+ 12
TT ĤS
r
−
n+ 1
HN 2
!
= 0 . (63)
Therefore, the proposed interpolation rule is a lossless system
that does not dissipate nor absorb any energy. Physically, this
result makes sense, since the connection system corresponds to
an infinitely thin region where no energy dissipation can take
place. In conclusion, since the proposed subgridding method
can be seen as the connection of three dissipative systems, it
is overall dissipative, and thus stable.
0.5
Hz (A/m)
n+1 T
(E n + EN
)
∆t∆x N
2
0
−0.5
0
2
4
6
Timestep
8
10
5
x 10
Figure 5: Magnetic field at the probe for the the empty cavity
with subgridding of Sec. V-A, computed for 106 time steps.
V. N UMERICAL E XAMPLES
The following sections provide the results of FDTD simulations that were done to verify the proposed theory. The
subgridding algorithm was implemented in Matlab and tests
were performed in order to check its stability, ability to handle
material traverse, its accuracy and speedup capability.
A. Stability Verification
Stability was verified by simulating an empty cavity with
perfect electric conductor (PEC) walls with a centrally placed
subgridding region for 106 time steps. The layout of the
simulation is shown in Fig. 4. The cavity was excited using
a modulated Gaussian magnetic current source with central
frequency of 3.75 GHz and half-width at half-maximum of
0.74 GHz. Magnetic field was recorded at a probe placed
inside the cavity. The time step was set 1% below the CFL
limit of the fine grid.
The resulting waveform in Fig. 5 shows that no instability
occurred after 106 time steps. Stable behavior after such a
large number of time steps verifies the correctness of the
proposed stability enforcement technique, especially since no
lossy materials were present to dissipate any spurious energy
artificially created by the algorithm.
B. Material Traverse
The ability of the proposed method to produce meaningful
results when objects traverse the subgridding interface was
tested using the setup in Fig. 6. A 16 × 16 mm slab of
material was simulated for three different placements of the
subgridding region: enclosing, traversing and away from the
slab. The test was done for copper and a lossy dielectric
with conductivity of 5 S/m and relative permittivity of 2.
As a reference, uniformly discretized all-coarse and all-fine
simulations were performed at the fine time step, in addition
to the subgridding simulations. Coarse and fine meshes in
uniformly discretized and subgridding runs were chosen as
1 mm and 0.2 mm respectively. 15 mm-thick perfectly matched
layer (PML) terminated the simulation region. Modulated
Gaussian magnetic current excitation was used at 15.0 GHz
central frequency with 8.82 GHz half-width at half-maximum
bandwidth. The time step was chosen as 0.467 ps in all test
cases.
The magnetic field waveforms at the probe recorded in the
different subgridding scenarios are shown in Fig. 7, and are in
excellent agreement among each other. This result confirms
that the proposed subgridding method can properly handle
material traverse, for both very good conductors and for lossy
dielectrics.
C. Application to Simulating Scatterer Reflections
In order to investigate the accuracy of the proposed scheme,
we looked at waveguide reflections from the scatterer shown in
Fig. 8, which consisted of four copper rods with 1 mm radius.
We have also investigated the reflections from the subgridding
interface, in order to assess the quality of the subgridding
scheme. The coarse cell was chosen to be 1 mm, which was
1
10 of the minimum wavelength of interest that corresponded
to 30.0 GHz. The fields of the incident wave were computed
by running a reference simulation without the scatterer and
without subgridding. Reflected wave fields were found by
subtracting the incident wave fields from the total fields in
simulations with the scatterer. 15 mm-thick PML boundary
was chosen to terminate the two sides of the waveguide. The
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
10
PEC
40 mm
x
z
Source
subgrids
y
Jy current
Probes
8×8 mm
y
Probe
PML
PML
x
z
PML
20 mm
2 mm
∆x = 1 mm
∆y = 1 mm
Figure 6: Layout used for the material traverse test of Sec. V-B,
and the three different placements of the subgridding region.
2 mm
Scatterer
66 mm
Figure 8: Layout of the four-rod reflection simulation discussed in Sec. V-C. The dashed line shows the location of
the subgrid in the subgridding run.
Lossy dielectric
−5
With scatterer
−10
0
11
|S | (dB)
Hz (A/m)
0.02
−0.02
−15
−20
−25
−30
−35
Copper
Sub−grid interface only
−40
0
|S | (dB)
Hz (A/m)
0.02
11
−0.02
0.2
0.25
Time (ns)
0.3
0.35
Figure 7: Time-domain magnetic field at the probe recorded for
the three locations of the subgrid in Sec. V-B: enclosed (
),
outside (
) and traversing the object (
). Waveforms
from the uniformly discretized all-coarse ( ) and allfine (
) simulations are also shown.
time steps in the subgridding runs were set 1% below the CFL
limit of the refined region. Uniformly discretized simulations
were run 1% below the CFL limits of the respective grids.
The resulting reflections are shown in Fig. 9 for the subgridding case with different refinement ratios, as well as the
reference run with full refinement by a factor of 6. The
simulation times are shown in Table I. It can be seen that
the local refinement of the grid around the scatterer with
the proposed subgridding method can improve the accuracy
substantially compared to the coarse grid run. The larger
choice of refinement ratio makes the solution very close to
the reference all-fine solution. Moreover, very good speedup
- almost by a factor of 11 - is achieved even for the grid
refinement of 6 when the redundant high resolution of the grid
in air is eliminated. The reflections from subgridding interface
were significantly lower than those from the scatterer, further
demonstrating the accuracy of the proposed method.
−60
−80
−100
0
5
10
15
20
Frequency (GHz)
25
Figure 9: Reflected power with respect to the incident for the
example of Sec. V-C. Top panel: reflections from the four-rod
scatterer for different global discretization: all-coarse ( )
and all-fine with r = 6 (
); and for the subgridding runs:
r=2(
), r = 4 (
) and r = 6 (
). Bottom panel:
reflections from the subgrid interface only.
D. Application to Exposure Studies
We show the possibility of applying the method for multiscale human exposure simulations. The chosen setup is shown
in Fig. 10. A transverse cross-section of the head of the model
of Ella from IT’IS Virtual Population V1.x [30] was used
to assign the material properties [31] to the FDTD cells. A
900 MHz source was placed approximately 3 meters away
from the human head. The simulation region was terminated
with 20 cm PML. The reference (fine) resolution in the tissues
was set to 2 mm, based on the mesh size chosen by [32] in a
radiation exposure study at that frequency. Specific absorption
rate, or SAR, was evaluated according to the formula in [33],
which was used as follows for sinusoidal excitation
SAR =
σ(Ex2p + Ey2p )
2ρ
,
(64)
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
Table I: Simulation times for different meshes in four-rod
scatterer simulations in Sec. V-C. Simulation times were
recorded for the total field run only - not for the reference
run.
Method
All-fine (r = 6)
All-coarse
Subgridding (r = 2)
Subgridding (r = 4)
Subgridding (r = 6)
Simulation time (s)
427.4
3.2
10.7
23.3
39.5
3.05m
Head
slice
Method
All-fine
All-coarse
Subgridding
All-fine
z
Error in SAR integral
Not applicable
59.5%
-3.1%
Subgridding
Simulation time (s)
1596.4
6.9
34.5
All-coarse
x
PML
4.01m
Figure 10: Layout of the simulation in Sec. V-D with human
head cross-section placed approximately 3 meters away from
a point source.
where subscript “p” denotes the peak absolute value of a
field component and ρ corresponds to tissue density. SAR
was calculated for each of the primary cells. The values of
the electric field components at the primary cell centers were
found by averaging the nearest known samples at the cell
edges. The peak values of the fields were found for the time
interval from 25.6 ns to 26.8 ns, which gave the wave sufficient
time to reach the head and penetrate inside it.
In the subgridding run, the empty space was coarsened to
1
1 cm, which corresponded to 33.3
of the wavelength. The
reference all-fine run was performed at 2 mm resolution, along
with the all-coarse run where the entire simulation region was
discretized at 1 cm. The volumetric integral of SAR over the
tissues was used as an accuracy metric
XX
SAR|i+ 12 ,j+ 12 ∆x∆y ,
(65)
i
Table II: Error in the integral of SAR and simulation times in
the simulations discussed in Sec. V-D.
y
subgrid
Source
11
j
where ∆x and ∆y are FDTD cell dimensions in the tissues.
Time step of 4.67 ps was chosen for the all-fine simulation
and for the subgridding simulation. The coarse grid case was
run at 23.11 ps.
The resulting SAR maps are shown in Fig. 11. Table II
shows simulation times and percent error in the total SAR
with respect to the all-fine simulation. The results show that
with subgridding a speedup of 46X can be obtained with only
3.1% loss in accuracy. No noticeable difference can be seen
on the SAR maps in Fig. 11 between the subgridding and
all-fine simulations. When, instead, the coarse resolution was
chosen for the entire grid, the head tissues were not sufficiently
resolved and the integral SAR differed from the reference by
59.5%, showing the necessity of local grid refinement.
VI. C ONCLUSION
This paper proposed a dissipative systems theory for FDTD,
recognizing that FDTD equations can be seen as a dynamical
Figure 11: SAR maps obtained in Sec. V-D with all-fine
(2 mm), all-coarse (1 cm) discretization and with subgridding
(2 mm in the tissues and 1 cm in the air).
system which is dissipative under a generalized CourantFriedrichs-Lewy condition. The theory provides a new, powerful framework to make FDTD stability analysis simpler
and modular. Stability conditions can indeed be given on
the individual components (e.g. boundary conditions, meshes,
thin-wire models) rather than on the whole coupled FDTD
setup. The theory is intuitive since rooted on the familiar
concept of energy dissipation, and sheds new light on the
root mechanisms behind FDTD instability. As an example of
application, a simple yet effective subgridding algorithm is
derived, with straightforward stability proof. The proposed algorithm allows material traverse, is simpler to implement than
existing solutions, and supports an arbitrary grid refinement
ratio. Numerical results confirm its stability and accuracy.
Speedups of up to 46X were observed with only 3.1% error
with respect to standard FDTD.
R EFERENCES
[1] A. Taflove and S. C. Hagness, Computational electrodynamics. Artech
house, 2005.
[2] S. D. Gedney, Introduction to the Finite-Difference Time-Domain
(FDTD) Method for Electromagnetics, 1st ed. San Rafael, CA: Morgan
& Claypool Publishers, 2011.
[3] K. Yee, “Numerical solution of initial boundary value problems involving Maxwell’s equations in isotropic media,” IEEE Trans. Antennas
Propag., vol. 14, no. 3, pp. 302–307, 1966.
[4] M. Okoniewski, E. Okoniewska, and M. Stuchly, “Three-dimensional
subgridding algorithm for FDTD,” IEEE Trans. Antennas Propag.,
vol. 45, no. 3, pp. 422–429, 1997.
[5] P. Thoma and T. Weiland, “A consistent subgridding scheme for the
finite difference time domain method,” Int. J. Numer. Model El., vol. 9,
no. 5, pp. 359–374, 1996.
[6] K. Xiao, D. J. Pommerenke, and J. L. Drewniak, “A three-dimensional
FDTD subgridding algorithm with separated temporal and spatial interfaces and related stability analysis,” IEEE Trans. Antennas Propag.,
vol. 55, no. 7, pp. 1981–1990, 2007.
[7] W. Sui, D. A. Christensen, and C. H. Durney, “Extending the twodimensional FDTD method to hybrid electromagnetic systems with
active and passive lumped elements,” IEEE Trans. Microw. Theory
Techn., vol. 40, no. 4, pp. 724–730, 1992.
[8] F. Edelvik, R. Schuhmann, and T. Weiland, “A general stability analysis
of FIT/FDTD applied to lossy dielectrics and lumped elements,” International Journal of Numerical Modelling: Electronic Networks, Devices
and Fields, vol. 17, no. 4, pp. 407–419, 2004.
JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBER 2012
[9] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “Generation
of FDTD subcell equations by means of reduced order modeling,” IEEE
Trans. Antennas Propag., vol. 51, no. 8, pp. 1806–1817, 2003.
[10] X. Li, C. D. Sarris, and P. Triverio, “Structure-Preserving Reduction of
Finite-Difference Time-Domain Equations with Controllable Stability
Beyond the CFL Limit,” IEEE Trans. Microw. Theory Techn., vol. 62,
no. 12, pp. 3228–3238, 2014.
[11] X. Li and P. Triverio, “Stable FDTD Simulations with Subgridding at the
Time Step of the Coarse Grid: a Model Order Reduction Approach,” in
IEEE MTT-S Int. Conf. on Numerical Electromagnetic and Multiphysics
Modeling and Optimization, Ottawa, Canada, August 11–14 2015.
[12] J.-F. Lee, R. Lee, and A. Cangellaris, “Time-domain finite-element
methods,” IEEE Trans. Antennas Propag., vol. 45, no. 3, pp. 430–442,
1997.
[13] A. R. Bretones, R. Mittra, and R. G. Martı́n, “A hybrid technique
combining the method of moments in the time domain and FDTD,”
IEEE Microw. Guided Wave Lett., vol. 8, no. 8, pp. 281–283, 1998.
[14] Y. Wang, S. Safavi-Naeini, and S. K. Chaudhuri, “A hybrid technique
based on combining ray tracing and FDTD methods for site-specific
modeling of indoor radio wave propagation,” IEEE Trans. Antennas
Propag., vol. 48, no. 5, pp. 743–754, 2000.
[15] T. Namiki, “A new FDTD algorithm based on alternating-direction
implicit method,” IEEE Microw. Wireless Compon. Lett., vol. 47, no. 10,
pp. 2003–2007, 1999.
[16] F. Zheng, Z. Chen, and J. Zhang, “A Finite-Difference time-domain
method without the Courant stability conditions,” IEEE Microwave
Guided Wave Lett., vol. 9, no. 11, pp. 441–443, Nov 1999.
[17] P. Triverio, S. Grivet-Talocia, M. S. Nakhla, F. Canavero, R. Achar,
“Stability, causality, and passivity in electrical interconnect models,”
IEEE Trans. Adv. Packag., vol. 30, no. 4, pp. 795–808, 2007.
[18] J. C. Willems, “Dissipative dynamical systems part i: General theory,”
Archive for rational mechanics and analysis, vol. 45, no. 5, pp. 321–351,
1972.
[19] Y. Wang, S. Langdon, and C. Penney, “Analysis of accuracy and stability
of FDTD subgridding schemes,” in 2010 European Microwave Conf.
IEEE, 2010, pp. 1297–1300.
[20] F. Collino, T. Fouquet, and P. Joly, “Conservative space-time mesh
refinement methods for the FDTD solution of Maxwell’s equations,”
J. Comput. Phys., vol. 211, no. 1, pp. 9–35, 2006.
[21] R. A. Chilton and R. Lee, “Conservative and provably stable FDTD
subgridding,” IEEE Trans. Antennas Propag., vol. 55, no. 9, pp. 2537–
2549, 2007.
[22] N. V. Venkatarayalu, R. Lee, Y.-B. Gan, and L.-W. Li, “A stable FDTD
subgridding method based on finite element formulation with hanging
variables,” IEEE Trans. Antennas Propag., vol. 55, no. 3, pp. 907–915,
2007.
[23] J. Brewer, “Kronecker products and matrix calculus in system theory,”
IEEE Trans. Circuits Syst., vol. 25, no. 9, pp. 772–781, 1978.
[24] B. Denecker, F. Olyslager, L. Knockaert, and D. De Zutter, “A new statespace-based algorithm to assess the stability of the Finite-Difference
time-domain method for 3D finite inhomogeneous problems,” AEU-Int.
J. Electron. C, vol. 58, no. 5, pp. 339 – 348, 2004.
[25] L. Dai, “Singular control systems,” 1989.
[26] C. Byrnes and W. Lin, “Losslessness, feedback equivalence, and the
global stabilization of discrete-time nonlinear systems,” IEEE Trans.
Autom. Control, vol. 39, no. 1, pp. 83–98, 1994.
[27] S. Grivet-Talocia and B. Gustavsen, Passive Macromodeling: Theory
and Applications. Hoboken, NJ: Wiley, 2015.
[28] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix
Inequalities in System and Control Theory, ser. Studies in Applied
Mathematics. SIAM, 1994, vol. 15.
[29] L. Kulas and M. Mrozowski, “Reciprocity principle for stable subgridding in the finite difference time domain method,” in EUROCON, 2007.
The International Conference on “Computer as a Tool”, Sept 2007, pp.
106–111.
[30] A. Christ et al., “The Virtual Family - Development of surface-based
anatomical models of two adults and two children for dosimetric
simulations,” Physics in Medicine and Biology, vol. 55, no. 2, pp. N23–
N38, 2010.
[31] IT’IS Foundation, “Overview - Database of Tissue Properties.”
[Online]. Available: http://www.itis.ethz.ch/virtual-population/tissueproperties/overview/ [Aug. 19, 2015].
[32] S. Kühn et al., “MMF/GSMA phase 2: scientific basis for base station
exposure compliance standards,” IT’IS Foundation, Tech. Rep. 21, June
2009.
[33] D. A. Sánchez-Hernández, High Frequency Electromagnetic Dosimetry.
Boston, MA: Artech House, 2009.
12
| 5 |
Approximation algorithms for the maximum weight internal
spanning tree problem∗
arXiv:1608.03299v2 [cs.DS] 26 May 2017
Zhi-Zhong Chen†
Guohui Lin‡§
Lusheng Wang¶
Yong Chenk‡
Dan Wang¶
May 30, 2017
Abstract
Given a vertex-weighted connected graph G = (V, E), the maximum weight internal spanning
tree (MwIST for short) problem asks for a spanning tree T of G such that the total weight of
the internal vertices in T is maximized. The unweighted variant, denoted as MIST, is NPhard and APX-hard, and the currently best approximation algorithm has a proven performance
ratio 13/17. The currently best approximation algorithm for MwIST only has a performance
ratio 1/3 − ǫ, for any ǫ > 0. In this paper, we present a simple algorithm based on a novel
relationship between MwIST and the maximum weight matching, and show that it achieves a
better approximation ratio of 1/2. When restricted to claw-free graphs, a special case been
previously studied, we design a 7/12-approximation algorithm.
Keywords: Maximum weight internal spanning tree; maximum weight matching; approximation algorithm; performance analysis
∗
An extended abstract appears in the Proceedings of COCOON 2017.
Division of Information System Design, Tokyo Denki University. Hatoyama, Saitama 350-0394, Japan. Email:
[email protected]
‡
Department of Computing Science, University of Alberta. Edmonton, Alberta T6G 2E8, Canada. Email:
[email protected]
§
Correspondence author.
¶
Department of Computer Science, City University of Hong Kong. Tat Chee Avenue, Kowloon, Hong Kong,
China. Email: [email protected]
k
Institute of Operational Research and Cybernetics, Hangzhou Dianzi University. Hangzhou, Zhejiang 310018,
China. Email: [email protected]
†
1
2
1
Chen et al. /v:May 30, 2017
Introduction
In the maximum weight internal spanning tree (MwIST for short) problem, we are given a vertexweighted connected graph G = (V, E), where each vertex v of V has a nonnegative weight w(v),
with the objective to compute a spanning tree T of G such that the total weight of the internal
vertices in T , denoted as w(T ), is maximized. MwIST has applications in the network design for
cost-efficient communication [18] and water supply [1].
When the vertex weights are uniform, or simply vertex-unweighted, the problem is referred to as
the maximum internal spanning tree (MIST for short) problem. MIST is clearly NP-hard because it
includes the NP-hard Hamiltonian-path [6] problem as a special case. Furthermore, MIST has been
proven APX-hard [12], suggesting that it does not admit a polynomial-time approximation scheme
(PTAS). In the literature, much research is done on designing (polynomial-time, if not specified)
approximation algorithms for MIST to achieve the worst-case performance ratio as close to 1 as
possible.
The probably first approximation for MIST is a local search algorithm, which achieves a ratio
of 1/2 and is due to Prieto and Sliper [14]. Salamon and Wiener [18] later modified slightly
Prieto and Sliper’s algorithm to make it run faster (in linear-time) while achieving the same ratio
of 1/2. Besides, two special cases of MIST were considered by Salamon and Wiener [18]: when
restricted to claw-free graphs, they designed a 2/3-approximation algorithm; when restricted to
cubic graphs, they designed a 5/6-approximation algorithm. Later, Salamon [17] proved that the
1/2-approximation algorithm in [18] actually achieves a performance ratio of 3/(r + 1) for the
MIST problem on r-regular graphs (r ≥ 3). Based on local optimization, Salamon [16] presented
an O(n4 )-time 4/7-approximation algorithm for MIST restricted to graphs without leaves. The
algorithm was subsequently simplified and re-analyzed by Knauer and Spoerhase [7] to run faster
(in cubic time), and it becomes the first improved 3/5-approximation for the general MIST. Via a
deeper local search strategy than those in [7] and [16], Li et al. [8] presented a further improved
approximation algorithm for MIST with ratio 2/3. At the same time, Li and Zhu [12] presented
another 2/3-approximation algorithm for MIST.
Unlike the other previously known approximation algorithms for MIST, the 2/3-approximation
by Li and Zhu [12] is based on a simple but crucial observation that the maximum number of
internal vertices in a spanning tree of a graph G can be upper bounded by the maximum number
of edges in a triangle-free 2-matching (a.k.a. path-cycle cover) of G. The time complexity of
this approximation algorithm is dominated by computing the maximum triangle-free 2-matching,
O(nm1.5 log n), where n and m are the numbers of vertices and edges in G, respectively. Li and
Zhu [11] claimed that they are able to further improve their design to achieve a 3/4-approximation
algorithm for MIST, of the same time complexity. Recently, Chen et al. [2] gave another 3/4approximation algorithm for MIST, which is simpler than the one in [11]; and they showed that by
applying three more new ideas, the algorithm can be refined into a 13/17-approximation algorithm
for MIST of the same time complexity. This is currently the best approximation algorithm for
MIST.
The parameterized MIST by the number of internal vertices k, and its special cases and variants,
have also been extensively studied in the literature [14, 13, 15, 3, 5, 1, 4, 9, 10]. The best known
kernel for the general problem has a size 2k, which leads to the fastest known algorithm with
running time O(4k nO(1) ) [9].
For the vertex-weighted version, MwIST, Salamon [16] designed the first O(n4 )-time 1/(2∆−3)approximation algorithm, based on local search, where ∆ is the maximum degree of a vertex in
the input graph. For MwIST on claw-free graphs without leaves, Salamon [16] also designed an
O(n4 )-time 1/2-approximation algorithm. Subsequently, Knauer and Spoerhase [7] proposed the
Approximating the maximum weight internal spanning tree
3
first constant-ratio 1/(3 + ǫ)-approximation algorithm for the general MwIST, for any constant
ǫ > 0. The algorithm is based on a new pseudo-polynomial time local search algorithm, that
starts with a depth-first-search tree and applies six rules to reach a local optimum. It yields a
1/3-approximation for MwIST and then is extended to a polynomial time 1/(3 + ǫ)-approximation
scheme. The authors also showed that the ratio of 1/3 is asymptotically tight.
In this paper, we deal with the MwIST problem. We first prove a novel relationship between the
total weight of the internal vertices in a spanning tree of the given vertex-weighted graph and the
maximum weight matching of an edge-weighted graph, that is constructed out of the given vertexweighted graph. Based on this relationship, we present a simple 1/2-approximation algorithm for
MwIST; this ratio 1/2 significantly improves upon the previous known ratio of 1/3. When restricted
to claw-free graphs, a special case previously studied in [18, 16], we design a 7/12-approximation
algorithm, improving the previous best ratio of 1/2.
2
The 1/2-approximation algorithm
Recall that in the MwIST problem, we are given a connected graph G = (V, E), where each vertex
v of V has a nonnegative weight w(v), with the objective to compute a spanning tree T of G such
that the total weight of the internal vertices in T , denoted as w(T ), is maximized. We note that for
such an objective function, we may assume without loss of generality that every leaf in the given
graph G has weight 0.
We construct an edge-weighted graph based on G = (V, E). In fact, the structure of the new
graph is identical to that of G: the vertex set is still V , but instead the vertices have no weights;
the edge set is still E, where the weight of each edge e = {u, v} is w(e) = w(u) + w(v), i.e., the
weight of an edge is the total weight of its two ending vertices in the original graph. Since there is
no ambiguity when we discuss the edge weights or the vertex weights, the new edge-weighted graph
is still referred to as G. The weight of an edge subset refers to the total weight of the edges therein;
while the weight of an acyclic subgraph refers to the total weight of the internal (and those surely
will become internal) vertices therein.
Let M ∗ denote the maximum weight matching of (the edge-weighted graph) G, which can be
computed in O(n min{m log n, n2 })-time, where n = |V | and m = |E|.
Lemma 1 Given a spanning tree T of G, we can construct a matching M of G such that w(T ) ≤
w(M ).
Proof. We construct M iteratively. Firstly, we root the tree T at an internal vertex r, and all the
edges of T are unmarked; then in every iteration we include into M an unmarked edge e = {u, v}
of T such that 1) both u and v are internal and 2) e is the closest to the root r measured by the
number of edges on the path from r to e, followed by marking all the edges incident at u or v.
This way, the total weight of the two internal vertices u and v in the tree T is transferred to M
by adding the edge e to M . At the time this iterative procedure stops, there is no unmarked edge
of T connecting two internal vertices, and thus every internal vertex whose weight has not been
transferred to M must be adjacent to at least a leaf each via an unmarked edge.
Next, we iteratively include into M a remaining unmarked edge e = {u, v} of T , followed by
marking all the edges incident at u or v. This way, the total weight of u and v, which is greater
than or equal to the weight of the internal vertex between u and v, is transferred to M by adding
the edge e to M . At the end of this procedure, T contains no more unmarked edges. Since leaves in
the tree T count nothing towards w(T ), we conclude that w(T ) ≤ w(M ). This proves the lemma.
✷
4
Chen et al. /v:May 30, 2017
The following corollary directly follows from Lemma 1, stating an upper bound on the total
weight of an optimal solution to the MwIST problem.
Corollary 1 Let T ∗ denote an optimal (maximum weight internal) spanning tree of G. Then,
w(T ∗ ) ≤ w(M ∗ ).
We next start with M ∗ to construct a spanning tree T . Let the edges of M ∗ be e1 , e2 , . . . , ek ;
let ej = {aj , bj }, such that w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. Note that there could be vertices
of degree 0 in the spanning subgraph G[V, M ∗ ] with the edge set M ∗ , and there could be edges of
weight 0 in M ∗ ; let X denote the set of such degree-0 vertices and the end-vertices of such weight-0
edges. Essentially we do not worry about the degree of any vertex of X in our final tree T , since their
weights (if any) are not counted towards w(M ∗ ). This way, we assume without loss of generality
that w(aj ) > 0 for each edge ej of M ∗ , and consequently the degree of aj is dG (aj ) ≥ 2, that is, aj
is adjacent to at least one other vertex than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k}, and
B = {bj | j = 1, 2, . . . , k}; note that V = A ∪ B ∪ X.
Let E aa = E(A, A ∪ X), i.e., the set of edges each connecting a vertex of A and a vertex of
A ∪ X, and E ab = E(A, B), i.e., the set of edges each connecting a vertex of A and a vertex of
B. Our construction algorithm first computes a maximal acyclic subgraph of G, denoted as H0 ,
by adding a subset of edges of E aa to M ∗ . This subset of edges is a maximum weight spanning
forest on A ∪ X, and it can be computed in O(|E aa | log n)-time via a linear scan. In the achieved
subgraph H0 , if one connected component C contains more than one edge, then the vertex aj of
each edge ej = {aj , bj } in C has degree at least 2, i.e. is internal. Therefore, the total weight of
the internal vertices in the component C is at least half of w(C ∩ M ∗ ), and C is called settled and
left alone by the algorithm.
Our algorithm next considers an arbitrary edge of M ∗ that is not yet in any settled component,
say ej = {aj , bj }. In other words, the edge ej is an isolated component in the subgraph H0 . This
implies that the vertex aj is not incident to any edge of E aa , and thus it has to be adjacent to
some vertex in B − {bj }. If aj is adjacent to some vertex bi in a settled component, then this edge
(aj , bi ) is added to the subgraph H0 (the edge ej is said merged into a settled component) and the
iteration ends. The updated component remains settled, as w(aj ) ≥ w(ej )/2 is saved towards the
weight of the final tree T .
In the other case, the vertex aj is adjacent to a vertex bi , such that the edge ei = {ai , bi } is also
an isolated component in the current subgraph. After adding the edge (aj , bi ) to the subgraph, the
algorithm works with the vertex ai exactly the same as with aj at the beginning. That is, if ai is
adjacent to some vertex bℓ in a settled component, then this edge (ai , bℓ ) is added to the subgraph
(the component that ai belongs to is merged into a settled component) and the iteration ends; if
ai is adjacent to a vertex bℓ , such that the edge eℓ = {aℓ , bℓ } is also an isolated component in the
current subgraph, then the edge (ai , bℓ ) is added to the subgraph, the algorithm works with the
vertex aℓ exactly the same as with aj at the beginning; in the last case, ai is adjacent to a vertex
bℓ inside the current component that ai belongs to, then the edge (ai , bℓ ) is added to the current
component to create a cycle, subsequently the lightest edge of M ∗ in the cycle is removed, the
iteration ends, and the current component becomes settled. We note that in the above last case,
the formed cycle in the current component contains at least 2 edges of M ∗ ; breaking the cycle by
removing the lightest edge ensures that at least half of the total weight of the edges of M ∗ in this
cycle (and thus in this component) is saved towards the weight of the final tree T . Therefore, when
the iteration ends, the resulting component is settled.
When the second step of the algorithm terminates, there is no isolated edge of M ∗ in the current
subgraph, denoted as H1 , and each component is acyclic and settled. In the last step, the algorithm
Approximating the maximum weight internal spanning tree
5
connects the components of H1 into a spanning tree using any possible edges of E. We denote the
entire algorithm as Approx.
Lemma 2 At the end of the second step of the algorithm Approx, every component C of the
achieved subgraph H1 is acyclic and settled (i.e., w(C) ≥ w(C ∩ M ∗ )/2).
Proof. Let C denote a component; C ∩ M ∗ is the subset of M ∗ , each edge of which has both
end-vertices in C.
If C is obtained at the end of the first step, then C is acyclic and for every edge ej ∈ C ∩ M ∗ ,
the vertex aj has degree at least 2, and thus w(C) ≥ w(C ∩ M ∗ )/2.
If a subgraph of C is obtained at the end of the first step but C is finalized in the second step,
then C is also acyclic and for every edge ej ∈ C ∩ M ∗ , the vertex aj has degree at least 2, and thus
w(C) ≥ w(C ∩ M ∗ )/2.
If C is newly formed and finalized in the second step, then at the time C was formed, there
was a cycle containing at least 2 edges of M ∗ of which the lightest one is removed to ensure the
acyclicity, and thus the total weight of the internal vertices on this path is at least half of the total
weight of the edges of M ∗ on this cycle. Also, the vertex aj of every edge ej not on the cycle has
degree at least 2. Thus, w(C) ≥ w(C ∩ M ∗ )/2.
✷
Theorem 1 The algorithm Approx is a 1/2-approximation for the MwIST problem.
Proof. One clearly sees that Approx runs in polynomial time, and in fact the running time is
dominated by computing the maximum weight matching M ∗ .
From Lemma 2, at the end of the second step of the algorithm Approx, every component C of
the achieved subgraph H1 is acyclic and satisfies w(C) ≥ w(C ∩ M ∗ )/2. Since there is no edge of
M ∗ connecting different components of the subgraph H1 , the total weight of the internal vertices
in H1 is already at least w(M ∗ )/2, i.e. w(H1 ) ≥ w(M ∗ )/2. The last step of the algorithm may
only increase the total weight. This proves that the total weight of the internal vertices of the tree
T produced by Approx is
w(T ) ≥ w(H1 ) ≥ w(M ∗ )/2 ≥ w(T ∗ )/2,
where the last inequality is by Corollary 1, which states that w(M ∗ ) is an upper bound on the
optimum. Thus, Approx is a 1/2-approximation for the MwIST problem.
✷
3
A 7/12-approximation algorithm for claw-free graphs
We present a better approximation algorithm for the MwIST problem on claw-free graphs. A graph
G = (V, E) is called claw-free if, for every vertex, at least two of its arbitrary three neighbors are
adjacent. We again assume without loss of generality that every leaf in the graph G has weight 0.
Besides, we also assume that |V | ≥ 5.
We first present a reduction rule, which is a subcase of Operation 4 in [2], that excludes certain
induced subgraphs of the given graph G from consideration.
Operation 1 If G has a cut-vertex v such that one connected component C of G − v has two, three
or four vertices, then obtain G1 from G − V (C) by adding a new vertex u of weight 0 and a new
edge {v, u}.
6
Chen et al. /v:May 30, 2017
Let tw(C) denote the maximum total weight of the internal vertices in a spanning tree of the
subgraph induced on V (C) ∪ v, in which w(v) is revised to 0. Then there is an optimal spanning
tree T1 of G1 of weight w(T1 ) if and only if there is an optimal spanning tree T of G of weight
w(T ) = w(T1 ) + tw(C).
Proof. Let Gc denote the subgraph induced on V (C) ∪ v, that is, Gc = G[V (C) ∪ v]; and let Tc
denote the spanning tree of Gc achieving the maximum total weight of the internal vertices, that
is, w(Tc ) = tw(C) (Tc can be computed in O(1)-time).
Note that in T1 , the leaf u must be adjacent to v and thus w(v) is counted towards w(T1 ). We
can remove the edge {v, u} and u from T1 while attach the tree Tc to T1 by collapsing the two
copies of v. This way, we obtain a spanning tree T of G, of weight w(T ) = w(T1 ) + w(Tc ) since
w(v) is not counted towards w(Tc ).
Conversely, for any spanning tree T of G, the vertex v is internal due to the existence of C.
We may duplicate v and separate out a subtree Tc on the set of vertices V (C) ∪ v, in which the
weight of v is revised to 0. This subtree Tc is thus a spanning tree of Gc , and every vertex of V (C)
is internal in T if and only if it is internal in Tc . We attach the 0-weight vertex u to the vertex v
in the remainder tree via the edge {v, u}, which is denoted as T1 and becomes a spanning tree of
G1 ; note that the vertex v is internal in T1 . It follows that w(T ) = w(Tc ) + w(T1 ).
✷
See Figure 1 for an illustration of the local configurations specified in Operation 1. When
|V (C)| = 2 and Gc is a triangle, we refer the configuration as a hanging triangle; when |V (C)| = 3
and Gc contains a length-4 cycle, we refer the configuration as a hanging diamond; when |V (C)| = 4
and Gc contains a length-5 cycle, we refer the configuration as a hanging pentagon. Applying
Operation 1, we assume in the sequel that there is no hanging triangle, or hanging diamond, or
hanging pentagon in the given graph G.
v
v
v
(a) A hanging triangle.
(b) A hanging diamond.
(c) A hanging pentagon.
Figure 1: Local configurations of a hanging triangle, a hanging diamond, and a hanging pentagon,
specified in Operation 1, where the dotted edges could be in or not in the graph.
Let M ∗ denote a maximum weight matching of G, which is computed in O(n min{m log n, n2 })time, where n = |V | and m = |E|. Let the edges of M ∗ be e1 , e2 , . . . , ek ; let ej = {aj , bj }, such that
w(aj ) ≥ w(bj ), for all j = 1, 2, . . . , k. For convenience, aj and bj are referred to as the head and the
tail vertices of the edge ej , respectively. The same as in the last section, we assume without loss
of generality that w(aj ) > 0 for each j, and consequently the degree of aj is dG (aj ) ≥ 2, that is,
aj is adjacent to at least one vertex other than bj in the graph G. Let A = {aj | j = 1, 2, . . . , k},
B = {bj | j = 1, 2, . . . , k}, and X = V − (A ∪ B).
Let E aa = E(A, A), i.e., the set of edges each connecting two vertices of A, E ax = E(A, X),
i.e., the set of edges each connecting a vertex of A and a vertex of X, and E ab = E(A, B), i.e., the
set of edges each connecting a vertex of A and a vertex of B, respectively.
Approximating the maximum weight internal spanning tree
7
Let M aa ⊆ E aa be a maximum cardinality matching within the edge set E aa . We next prove a
structure property of the spanning subgraph G[V, M ∗ ∪ M aa ], which has the edge set M ∗ ∪ M aa .
For an edge ej = {aj , bj } of M ∗ , if aj is not incident to any edge of M aa , then ej is called isolated
in G[V, M ∗ ∪ M aa ].
Lemma 3 Assume that two edges ej1 = {aj1 , bj1 } and ej2 = {aj2 , bj2 } of M ∗ are connected by the
edge {aj1 , aj2 } ∈ M aa in G[V, M ∗ ∪ M aa ]. Then there is at most one isolated edge ej3 = {aj3 , bj3 }
whose head aj3 can be adjacent to aj1 or aj2 .
Proof. By contradiction, assume that there are two isolated edges ej3 = {aj3 , bj3 } and ej4 =
{aj4 , bj4 } such that both the vertices aj3 and aj4 are adjacent to aj1 or aj2 . Then from the maximum
cardinality of M aa , aj3 and aj4 must be both adjacent to aj1 or both adjacent to aj2 . Suppose they
are both adjacent to aj1 ; from the claw-free property, at least two of aj2 , aj3 and aj4 are adjacent,
which contradicts the maximum cardinality of M aa . This proves the lemma.
✷
For an isolated edge ej3 = {aj3 , bj3 } whose head is adjacent to an edge {aj1 , aj2 } ∈ M aa (i.e.,
satisfying Lemma 3), and assuming that {aj2 , aj3 } ∈ E aa , we add the edge {aj2 , aj3 } to G[V, M ∗ ∪
M aa ]; consequently the edge ej3 is no longer isolated. Let N aa denote the set of such added edges
associated with M aa . At the end, the achieved subgraph is denoted as H0 = G[V, M ∗ ∪ M aa ∪ N aa ].
Lemma 4 In the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ],
• every connected component containing more than one edge has either two or three edges from
M ∗ , with their head vertices connected (by the edges of M aa ∪ N aa ) into a path; it is called a
type-I component (see Figure 2a) and a type-II component (see Figure 2b), respectively;
• for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of
E ax ∪ E ab , but with no edge of E aa .
Proof. The proof directly follows the definition of the subgraph H0 and Lemma 3.
aj2
aj1
aj3
bj2
bj1
bj3
(a) A type-I component.
aj2
bj2
✷
aj1
bj1
(b) A type-II component.
Figure 2: The configurations of a type-I component and a type-II component.
The following lemma is analogous to Lemma 3.
Lemma 5 Any vertex of X can be adjacent to the head vertices of at most two isolated edges in
the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ].
8
Chen et al. /v:May 30, 2017
Proof. By contradiction, assume that x ∈ X and there are three isolated edges ejk = {ajk , bjk },
k = 1, 2, 3, in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ], such that the edge {ajk , x} ∈ E ax . From
the claw-free property, at least two of aj1 , aj2 and aj3 are adjacent, which contradicts Lemma 4.
This proves the lemma.
✷
For an isolated edge ej = {aj , bj } in the subgraph H0 = G[V, M ∗ ∪ M aa ∪ N aa ] whose head is
adjacent to a vertex x ∈ X (i.e., satisfying Lemma 5), we add the edge {aj , x} to H0 ; consequently
the edge ej is no longer isolated. Let N ax denote the set of such added edges associated with X.
At the end, the achieved subgraph is denoted as H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ].
Lemma 6 In the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ],
• every connected component of H0 containing more than one edge remains unchanged in H1 ;
• every connected component containing a vertex x of X and some other vertex has either one
or two edges from M ∗ , with their head vertices connected (by the edges of N ax ) to the vertex
x; it is called a type-III component (see Figure 3a) and a type-IV component (see Figure 3b),
respectively;
• for every isolated edge ej = {aj , bj }, the head vertex is incident with at least one edge of E ab ,
but with no edge of E aa ∪ E ax .
Proof. The proof directly follows the definition of the subgraph H1 and Lemmas 4 and 5.
aj1
aj1
aj2
x
✷
x
bj1
(a) A type-III component.
bj2
bj1
(b) A type-IV component.
Figure 3: The configurations of a type-III component and a type-IV component.
Let E0ab denote the subset of E ab , to include all the edges {aj , bℓ } where both the edges ej =
{aj , bj } and eℓ = {aℓ , bℓ } are isolated in the subgraph H1 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ]. Let
M ab ⊆ E0ab be a maximum cardinality matching within the edge set E0ab . Let H2 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ] be the subgraph obtained from H1 by adding all the edges of M ab . One
clearly sees that all the isolated edges in the subgraph H1 are connected by the edges of M ab into
disjoint paths and cycles; while a path may contain any number of isolated edges, a cycle contains
at least two isolated edges. Such a path and a cycle component are called a type-V component (see
Figure 4a) and a type-VI component (see Figure 4b), respectively.
Note that in a type-V component, there is exactly one head vertex of degree 1 and there is
exactly one tail vertex of degree 1. We assume that for the tail vertex in a type-V component, it is
not adjacent to the head of any other edge (via an edge of E ab ) in the same component; otherwise,
through an edge exchange, the component is decomposed into a smaller type-V component and a
new type-VI component.
Approximating the maximum weight internal spanning tree
......
......
(a) A type-V component.
9
(b) A type-VI component.
Figure 4: The configurations of a type-V component and a type-VI component.
Lemma 7 In the subgraph H2 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ], for every type-V component,
the degree-1 head vertex is adjacent (via an edge of E ab ) to the tail vertex of an edge in a type-I,
-II, -III, or -IV component; on the other hand, the tail vertex of every edge in a type-I, -II, -III, or
-IV component is adjacent to at most one such head vertex.
Proof. We first show that the degree-1 head vertex in a type-V component C, denoted as aj ,
cannot be adjacent to the tail of any edge in another type-V or a type-VI component C ′ . By
contradiction, assume {aj , bℓ } ∈ E ab and eℓ is in C ′ . If the tail bℓ is already incident to some
edge of M ab , say {ai , bℓ }, then by the claw-free property at least two of ai , aj , aℓ must be adjacent,
contradicting the fact that they are all isolated in the subgraph H1 . In the other case, the tail bℓ is
the tail vertex of C ′ (which is a type-V component too), then it violates the maximum cardinality
of M ab since {aj , bℓ } ∈ E ab can be added to increase the size of M ab . This proves the first half of
the lemma.
The second half can be proven by a simple contradiction using the claw-free property of the
graph.
✷
Subsequently, every type-V component C is connected to a type-I, -II, -III, or -IV component
C ′ , via the edge between the degree-1 head vertex of C and the tail vertex of an edge in C ′ ∩ M ∗ .
This way, the degree-1 tail vertex of C takes up the role of “the tail vertex” of the edge in C ′ ∩ M ∗ ,
to become a tail vertex in the newly formed bigger component. For simplicity, the type of the
component C ′ is passed to the newly formed bigger component. Denote this set of newly added
edges as N ab , which is a subset of E ab − M ab . The achieved subgraph is denoted as H3 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ].
Lemma 8 In the subgraph H3 = G[V, M ∗ ∪ M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ],
• there is no isolated type-V component;
• the head vertex of every edge of M ∗ has degree at least 2.
Proof. The first half of the lemma follows from Lemma 7; the second half holds since there is no
more isolated type-V component, which is the only type of component containing a degree-1 head
vertex.
✷
We next create a set F of edges that are used to interconnect the components in the subgraph
H3 . F is initialized to be empty. By Lemma 8, for every type-I, -II, -III, or -IV component C in the
subgraph H3 , of weight w(C ∩M ∗ ), it is a tree and the total weight of the internal vertices therein is
at least 12 w(C ∩ M ∗ ); for every type-VI component C, which is a cycle, by deleting the lightest edge
10
Chen et al. /v:May 30, 2017
of C ∩ M ∗ from C we obtain a path and the total weight of the internal vertices in this path is also
at least 12 w(C ∩ M ∗ ). In the next five lemmas, we show that every component C in the subgraph
H3 can be converted into a tree on the same set of vertices, possibly with one edge specified for
connecting a leaf of this tree outwards, such that the total weight of the internal vertices (and the
leaf, if specified) in the tree is at least 32 w(C ∩ M ∗ ). The specified edge for the interconnection
purpose, is added to F . At the end of the process, the component C is called settled. A settled
component C can be expressed in multiple equivalent ways, for example, that the total weight of
the internal vertices (and the leaf, if specified) in the resulting tree is at least 32 w(C ∩ M ∗ ), or that
the total weight of the internal (and the leaf, if specified) vertices in the resulting tree is at least
twice the total weight of the leaves (excluding the specified leaf, if any).
In the sequel, we abuse the vertex notation to also denote its weight in math formulae; this
simplifies the presentation and the meaning of the notation is easily distinguishable. For estimating
the total weight of the internal vertices in a tree in the sequel, we frequently use the following
inequality:
∀w1 , w2 , w3 ∈ R, w1 + w2 + w3 − min{w1 , w2 , w3 } ≥ 2 min{w1 , w2 , w3 }.
Lemma 9 A type-I component in the subgraph H3 can be settled.
Proof. Consider a type-I component C in the subgraph H3 . Recall from Lemma 8 and the
paragraph right above it, that a general type-I component is an original type-I component (shown
in Figure 2a) augmented with zero to two type-V components.
Let the two original edges of M ∗ in C be ej1 and ej2 and the two tail vertices be b1 and b2 (which
replace bj1 and bj2 to be the tail vertices, respectively) with w(b1 ) ≥ w(b2 ). The corresponding two
head vertices to the tails b1 and b2 are denoted as a1 and a2 , respectively. See Figure 5 for the
general configuration of such a component. We assume that w(b1 ) > 0, since otherwise C is settled
automatically.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 5: The general configuration of a type-I component, with a type-V component adjacent to
each of the two tail vertices.
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F ; this settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 (recall that a
vertex notation here represents the weight of the vertex).
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Approximating the maximum weight internal spanning tree
11
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then by the construction of
a type-V component we know that v must be a tail of an edge of M ∗ (Figures 6a and 6b), and thus
dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 .
a2
b2
aj2
bj2
aj1
a1
a2
bj1 v
b1
b2
(a) dC (b1 , v) ≥ 4.
aj2
bj2
a1
aj1
bj1
v
b1
(b) dC (b1 , v) = 2.
Figure 6: Local configurations corresponding to Case 2, where v is inside the type-V component
adjacent to bj1 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj3 that bj3 is adjacent to
as aj4 (see Figure 6a). We conclude from the claw-free property that there must be at least an
edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it is
impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1 (see Figure 6b), i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and
{a1 , b1 }. Denote this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the
edges {b1 , bj3 } and {a1 , b2 } to C while delete the edge {a1 , bj3 } and the lightest among the edges
of C ∩ M ∗ from C. This way, the component becomes a tree and thus C is settled. If u is outside
C, then we add the edge {b1 , bj3 } to C while delete the edge {a1 , bj3 } from C, and add the edge
{a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 (see
Figure 7).
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 7: Local configurations corresponding to Case 3, where v = bj1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 },
then we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another edge
incident at a1 besides {a1 , bj1 } and {a1 , b1 }. (The following is the same as in Case 2.2.) Denote
this neighbor of a1 as u. If u is inside C, then u = b2 ; in this case, add the edges {b1 , bj1 } and
12
Chen et al. /v:May 30, 2017
{a1 , b2 } to C while delete the edge {a1 , bj1 } and the lightest among the edges of C ∩ M ∗ from C.
This way, the component becomes a tree and thus C is settled. If u is outside C, then we add the
edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C, and add the edge {a1 , u} to F ; this way,
the component becomes a tree and thus C is settled.
Case 4. If b1 6= bj1 and v = aj1 (see Figure 8), then we leave C as it is when w(b1 ) ≤ w(bj1 ),
or we add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. The total weight of the
internal vertices in the resulting path is at least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }),
and thus C is settled.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 8: Local configurations corresponding to Case 4, where v = aj1 .
Case 5. If b1 6= bj1 and v = aj2 (see Figure 9), then by the claw-free property there is at least
an edge among bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the
vertex v (being the farthest). If aj1 and b1 are adjacent, then it has been proven in Case 4 that
C can be settled. If bj2 and aj1 are adjacent, then similarly as in Case 4 we either leave C as
it is when w(b1 ) ≤ w(bj1 ), or add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete the edges
{aj1 , bj1 } and {aj2 , bj2 } from C; the total weight of the internal vertices in the resulting path is at
least a2 + aj1 + a1 + max{b1 , bj1 } ≥ 2(b2 + min{b1 , bj1 }), and thus C is settled.
a2
b2
aj2
bj2
aj1
a1
bj1
b1
Figure 9: Local configurations corresponding to Case 5, where v = aj2 .
Case 6. If b1 6= bj1 and v = bj2 (see Figure 10), then by the claw-free property aj2 and b1 must
be adjacent.
Case 6.1. If b2 6= bj2 , then we have three ways to convert C into a path ending at b2 : 1) doing
nothing to leave b1 as a leaf; 2) adding the edge {aj2 , b1 } to C while deleting the edge {aj2 , aj1 } to
leave aj1 as a leaf; 3) adding the edge {bj2 , b1 } to C while deleting the edge {aj2 , bj2 } to leave aj2
as a leaf. Then, the maximum total weight of the internal vertices among these three paths is at
least a2 + a1 + aj1 + aj2 + b1 − min{b1 , aj1 , aj2 } ≥ 2(b2 + min{b1 , aj1 , aj2 }). Thus, C is settled.
Approximating the maximum weight internal spanning tree
a2
aj2
b2
bj2
aj1
a1
bj1
b1
13
Figure 10: Local configurations corresponding to Case 6, where v = bj2 .
Case 6.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 , then we add the
edge {bj2 , b1 } to C while delete the lightest edge of C ∩ M ∗ from C to settle C, because C ∩ M ∗
contains at least three edges.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail (see Figure 11).
a2
2
a
v
aj2
aj1
b
bj2
bj1
(a) v is a head.
aj1
a1
a2
bj1
b1
b2
aj2
aj1
a1
bj1
b1
a
b2
2
aj2
1
b
bj2
v
bj2
1
(b) v = b2 .
(c) v is a tail.
Figure 11: Local configurations corresponding to Case 7, where v is inside the type-V component
adjacent to bj2 .
Case 7.1. If v is a head, say aj3 of the edge ej3 (see Figure 11a), and assume that aj3 is also
adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge
{aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of
the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }).
Thus, C is settled.
Case 7.2. If v is a tail, say bj3 of the edge ej3 (see Figures 11b and 11c). If b2 = bj3 (see
Figure 11b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of
C ∩ M ∗ to settle C since there are at least four edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 11c), then
by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and
thus the argument in Case 7.1 applies to settle C.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1
(see Figure 12).
Case 8. If b1 = bj1 and v = aj2 , then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1 (see Figure 13).
Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u}
to F , add the edge {aj2 , b1 } to C while delete the edge {a1 , aj2 } from C; this way, C is settled.
Case 8.2. Otherwise by the claw-free property a1 must be adjacent either to b2 or to bj2 .
14
Chen et al. /v:May 30, 2017
a2
a1
aj2
b2
b1
bj2
Figure 12: A special configuration without a type-V component adjacent to bj1 , i.e. bj1 = b1 .
a2
a1
aj2
b2
b1
bj2
Figure 13: Local configurations corresponding to Case 8, where v = aj2 .
Case 8.2.1. Assuming b2 6= bj2 , in the former case, we add the edges {aj2 , b1 } and {a1 , b2 } to
C while delete the edge {a1 , aj2 } and the lightest edge of C ∩ M ∗ from C; this way, C is settled
since there were at least three edges in C ∩ M ∗ . In the latter case, we conclude that dG (aj2 ) ≥ 4 by
Operation 1. Recursively, if there is a vertex u outside C that is adjacent to aj2 , then we add the
edge {aj2 , u} to F , add the edges {aj2 , b1 } and {a1 , bj2 } to C while delete the edges {a1 , aj2 } and
{aj2 , bj2 } from C; this way, C is settled. Otherwise by the claw-free property aj2 must be adjacent
to b2 ; we add three edges {aj2 , b1 }, {a1 , bj2 } and {aj2 , b2 } to C while delete the edges {a1 , aj2 } and
{aj2 , bj2 }, and the lightest edge of C ∩ M ∗ from C; this way, C is settled.
Case 8.2.2. Assuming b2 = bj2 , that is, there is no type-V component adjacent to bj2 . We
conclude that dG (a2 ) ≥ 4 and there is a vertex u outside C that is adjacent to a2 by Operation 1.
Thus, we add the edge {a2 , u} to F , add the edges {a2 , b1 } and {a1 , b2 } to C while delete the edges
{a1 , a2 } and {a2 , b2 } from C; this way, C is settled.
Case 9.
If b1 = bj1 and v = bj2 (see Figure 14), we consider two possible scenarios.
a2
aj2
a1
a2
a1
b2
bj2
b1
b2
b1
(a) b2 6= bj2 .
(b) b2 = bj2 .
Figure 14: Local configurations corresponding to Case 9, where v = bj2 .
Approximating the maximum weight internal spanning tree
15
Case 9.1. If b2 6= bj2 (see Figure 14a), then we conclude from the claw-free property and the
definition of v that b1 is also adjacent to aj2 . By Operation 1, at least one of a1 and aj2 must be
adjacent to another vertex u.
Case 9.1.1. If there is a vertex u outside C that is adjacent to a1 (aj2 , respectively) then we
add the edge {a1 , u} ({aj2 , u}, respectively) to F , add the edges {bj2 , b1 } and {aj2 , b1 } ({bj2 , b1 },
respectively) to C while delete the edges {a1 , b1 } and {aj2 , bj2 } ({aj2 , bj2 }, respectively) from C;
this way, C is settled.
Case 9.1.2. Otherwise by the claw-free property u ∈ {b2 , bj2 }. If u = b2 , then we can settle C
by converting C into a cycle on the same set of vertices, followed by deleting the lightest edge of
C ∩ M ∗ from C. In the other case, u = bj2 and thus a1 is adjacent to bj2 , which by Operation 1 is
impossible.
Case 9.2. If b2 = bj2 , that is, there is no type-V component adjacent to bj2 (see Figure 14b).
We conclude that either there is a vertex u outside C that is adjacent to a2 , or a2 is adjacent to b1
and there is a vertex u outside C that is adjacent to a1 . In either case, we add the edge {·, u} to
F , and convert C into a path with b2 and · as two ending vertices; this way, C is settled.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail (see Figure 15).
a2
a2
b2
v
aj2
a1
bj2
b1
(a) v is a head.
b2
aj2
bj2
a1
a2
b1
b2
(b) v = b2 .
aj2
v
bj2
a1
b1
(c) v is a tail.
Figure 15: Local configurations corresponding to Case 10, where v is inside the type-V component
adjacent to bj2 .
Case 10.1. If v is a head, say aj3 of the edge ej3 (see Figure 15a), and assume that aj3 is also
adjacent to bj4 , then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or add the edge
{aj3 , b1 } to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. Then, the total weight of
the internal vertices in the resulting path is at least a2 +a1 +aj4 +max{b1 , bj4 } ≥ 2(b2 +min{b1 , bj4 }).
Thus, C is settled.
Case 10.2. If v is a tail, say bj3 of the edge ej3 (see Figures 15b and 15c). If b2 = bj3 (see
Figure 15b), then we add the edge {b1 , b2 } to C makes it a cycle while delete the lightest edge of
C ∩ M ∗ to settle C since there are at least three edges in C ∩ M ∗ ; if b2 6= bj3 (see Figure 15c), then
by the claw-free property and the definition of v we conclude that b1 is adjacent to aj3 too, and
thus the argument in Case 10.1 applies to settle C.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 10 A type-II component in the subgraph H3 can be settled.
Proof. Consider a type-II component C in the subgraph H3 . Recall from Lemma 8 and the
paragraph right above it, that a general type-II component is an original type-II component (shown
16
Chen et al. /v:May 30, 2017
in Figure 2b) augmented with zero to three type-V components.
Let the three original edges of M ∗ in C be ej1 , ej2 , ej3 , with ej2 in the middle (see Figure 2b),
and the three tail vertices be b1 , b2 , b3 (which replace bj1 , bj2 , bj3 , respectively). We consider the
situation where b1 is the heaviest among the three tail vertices (the other situation is where b2 is
the heaviest, and can be similarly discussed). In the following, discussion for most cases is similar
to the cases in the proof of Lemma 9, and thus not all details are presented (neither the illustration
figures).
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 + a3 ≥ 2(b2 + b3 ) (recall
that a vertex notation here represents the weight of the vertex).
In the sequel we assume b1 is not adjacent to any vertex outside C, and thus it has to be
adjacent to some vertex inside C. Let v denote the vertex adjacent to b1 that is the farthest to b1
on C (tie breaks arbitrarily). We distinguish this distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be the tail of
an edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej4 = {aj4 , bj4 }, that is v = bj4 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex other than aj4 that bj4 is also adjacent
to as aj5 . We conclude from the claw-free property that there must be at least an edge among
aj4 , aj5 , b1 , which contradicts the identity of the type-V component. Thus it is impossible to have
dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj4 } and {a1 , b1 }. Denote
this neighbor of a1 as u. If u is inside C, then u ∈ {b2 , b3 }; in the case of u = b2 (the argument
for u = b3 is identical), we know that the branch incident at aj1 contains at least three edges of
M ∗ (ej1 , ej4 , e1 ), and thus we may add the edges {bj4 , b1 } and {a1 , b2 } to C while delete the edge
{a1 , bj4 } and the lightest among the three edges ej1 , ej4 , e2 (which are on the created cycle), denoted
as ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total
weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx );
that is, C is settled.
If u is outside C, then we add the edge {bj4 , b1 } to C while delete the edge {a1 , bj4 } from C,
and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , which is {a1 , b1 };
in this case, we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is at least another
edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. Denote this neighbor of a1 as u. If u is inside
C, then u ∈ {b2 , b3 }. In the case of u = b2 (the argument for u = b3 is identical), we may add the
edges {b1 , bj1 } and {a1 , b2 } to C while delete the edge {a1 , bj1 } to form a cycle. When bj2 = b2 ,
we either delete the edge {aj2 , bj2 } to leave bj2 as a leaf, or delete the edge {aj2 , aj1 } to leave aj1
as a leaf. The maximum total weight of the internal vertices between the two trees is at least
a3 + a1 + b1 + a2 + max{b2 , aj1 } ≥ 2(b3 + min{b2 , aj1 }), and thus C is settled. When bj2 6= b2 , we
delete the lightest among the three edges ej1 , ej2 , e2 (which are on the created cycle), denoted as
ex = {ax , bx }, from C. This way, the component becomes a tree with leaves b3 , ax , bx . The total
Approximating the maximum weight internal spanning tree
17
weight of the internal vertices in the tree is at least a3 + (a1 + b1 ) + 2(ax + bx ) ≥ 2(b3 + ax + bx );
that is, C is settled.
If u is outside C, then we add the edge {b1 , bj1 } to C while delete the edge {a1 , bj1 } from C,
and add the edge {a1 , u} to F ; this way, the component becomes a tree and thus C is settled.
Case 4. If b1 6= bj1 and v = aj1 , we consider the size of the type-V component containing b1 .
Case 4.1. If this type-V component contains more than one edge of M ∗ , then denote one edge
other than {a1 , b1 } as ej4 = {aj4 , bj4 }. We add the edge {aj1 , b1 } to C while either delete the edge
{aj1 , bj1 } to have a tree with leaves bj1 , b2 , b3 , or delete the edge {aj4 , bj4 } to have a tree with leaves
aj4 , bj4 , b2 , b3 . It follows that the maximum total weight of the internal vertices between the two
trees is at least a2 + a3 + a1 + b1 + aj1 + max{bj1 , aj4 + bj4 } ≥ 2(b2 + b3 + min{bj1 , aj4 + bj4 });
therefore, C is settled.
Case 4.2. If this type-V component contains only one edge of M ∗ , which is {a1 , b1 }, then from
the claw-free property and the definition of v being the farthest we conclude that bj1 is adjacent to
at least one of aj2 and b1 .
Case 4.2.1. Assume bj1 and aj2 are adjacent. By treating aj2 as the cut-vertex in Operation 1,
we conclude that at least one of the three vertices aj1 , bj1 , a1 is adjacent to a vertex u outside of
the set {aj2 , aj1 , bj1 , a1 , b1 }.
Case 4.2.1.1. If aj1 is adjacent to a vertex u outside the component C, then we add the edges
{aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a tree
with leaves b3 , b2 , aj1 ; thus, adding the edge {aj1 , u} to F settles C.
If bj1 is adjacent to a vertex u outside the component C, then we add the edge {aj1 , b1 } to C
while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus, adding the edge
{bj1 , u} to F settles C.
If a1 is adjacent to a vertex u outside the component C, then we add the edges {aj2 , bj1 } and
{aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {bj1 , a1 } from C to obtain a tree with leaves
b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C.
Case 4.2.1.2. If aj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). There are
only four possibilities.
When u = aj3 (u = bj3 and bj3 6= b3 implying that aj3 and aj1 are adjacent), we can add
the edges {aj3 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the edges {aj3 , aj2 }, {aj2 , aj1 } and
{aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is settled.
When u = bj2 , we can add the edges {bj2 , aj1 }, {aj2 , bj1 } and {aj1 , b1 } to C while delete the
edges {aj2 , aj1 }, {aj2 , bj2 } and {aj1 , bj1 } from C to obtain a path with leaves b3 , b2 ; thus, C is
settled.
When u = b3 (whether b3 = bj3 or not), we can add the edge {b3 , aj1 } to C while delete the
edge {aj2 , aj1 } from C to obtain a path with leaves b2 , b1 ; we also can add the edges {b3 , aj1 } and
{aj1 , b1 } to C while delete the edges {aj2 , aj1 } and {aj1 , bj1 } from C to obtain a path with leaves
b2 , bj1 . It follows that the maximum total weight of the internal vertices between the two paths is
at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }); therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.1.3. If a1 is not adjacent to any vertex outside the component C, but to some vertices
inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot
be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless
it is b2 or b3 . Therefore there are only two possibilities.
18
Chen et al. /v:May 30, 2017
When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while
delete the edge {aj2 , aj1 }. Then, we either delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or
delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the
internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 });
therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.1.4. If bj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily).
When u ∈ {aj3 , bj3 , bj2 } (u = bj3 and bj3 6= b3 implying that aj3 and bj1 are adjacent), similarly
as in Case 4.2.1.2, we can convert C into a path with leaves b3 , b2 to settle C. In the remaining
case, u is inside one of the attached type-V components.
When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and
assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves
b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with
leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 }
and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal
vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥
2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C.
When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but
bj 4 ∈
/ {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also
adjacent to aj4 . Thus the argument in the last paragraph applies to settle C.
Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is
adjacent either to aj1 , which is settled in Case 4.2.1.2, or to a1 , which is settled in Case 4.2.1.3.
Case 4.2.2. Assume bj1 is not adjacent to aj2 but to b1 . By treating aj1 as the cut-vertex
in Operation 1, we conclude that at least one of the two vertices bj1 , a1 is adjacent to a vertex u
outside the set {aj1 , bj1 , a1 , b1 }.
Case 4.2.2.1. If bj1 is adjacent to a vertex u outside the component C, then we add the edge
{aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C to obtain a tree with leaves b3 , b2 , bj1 ; thus,
adding the edge {bj1 , u} to F settles C.
If a1 is adjacent to a vertex u outside the component C, then we add the edges {bj1 , b1 } and
{aj1 , b1 } to C while delete the edges {aj1 , bj1 } and {a1 , b1 } from C to obtain a tree with leaves
b3 , b2 , a1 ; thus, adding the edge {a1 , u} to F settles C.
Case 4.2.2.2. If a1 is not adjacent to any vertex outside the component C, but to some vertices
inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that u cannot
be any head vertex, as otherwise it violates the algorithm; u cannot be any tail vertex either, unless
it is b2 or b3 . Therefore there are only two possibilities. (This is very similar to Case 4.2.1.3.)
When u = b3 (whether b3 = bj3 or not), we can add the edges {b3 , a1 } and {aj1 , b1 } to C while
delete the edge {aj2 , aj1 }. Then, we can delete {a1 , b1 } to obtain a path with leaves b2 , b1 , or we can
delete {a1 , bj1 } to obtain a path with leaves b2 , bj1 . It follows that the maximum total weight of the
internal vertices between the two paths is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 });
therefore, C is settled.
When u = b2 , it can be shown the same as in the last paragraph by replacing b3 with b2 , that
C can be settled.
Case 4.2.2.3. If bj1 is not adjacent to any vertex outside the component C, but to some
vertices inside C, then let u denote the farthest neighbor on C (tie breaks arbitrarily). Note that
u 6= aj2 , which is Case 4.2.1. When u ∈ {aj3 , bj3 , bj2 }, similarly as in Case 4.2.1.2, we can convert
Approximating the maximum weight internal spanning tree
19
C into a path with leaves b3 , b2 to settle C. In the remaining case, u is inside one of the attached
type-V components. (This is very similar to Case 4.2.1.4.)
When u is a head, say aj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), and
assume that aj4 is adjacent to bj5 besides bj4 , then we can do nothing to have a tree with leaves
b3 , b2 , b1 ; or we can add the edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } to obtain a tree with
leaves b3 , b2 , bj1 ; or we can add the edges {aj4 , bj1 } and {aj1 , b1 } to C while delete the edges {aj4 , bj5 }
and {aj1 , bj1 } to obtain a tree with leaves b3 , b2 , bj5 . The maximum total weight of the internal
vertices among the three trees is at least a3 + a2 + aj1 + bj1 + aj5 + bj5 + a1 + b1 − min{b1 , bj1 , bj5 } ≥
2(b3 + b2 + min{b1 , bj1 , bj5 }), which settles C.
When u is a tail, say bj4 of the edge ej4 in the type-V component attached to bj2 (or bj3 ), but
bj 4 ∈
/ {b2 , b3 }, then from the claw-free property and the definition of u we conclude that bj1 is also
adjacent to aj4 . Thus the argument in the last paragraph applies to settle C.
Lastly, when u = b2 (or b3 , which can be shown in the same way), we conclude that b2 is
adjacent either to aj1 or to a1 , the latter of which is settled in Case 4.2.2.3. In the remaining case
where b2 is adjacent to aj1 , we can add the edge {b2 , aj1 } to C while delete the edge {aj1 , aj2 } to
obtain a path with leaves b3 , b1 ; or we can add the edges {b2 , aj1 } and {b1 , aj1 } to C while delete the
edges {aj1 , aj2 } and {aj1 , bj1 } to obtain a path with leaves b3 , bj1 . The maximum total weight of the
internal vertices between the two trees is at least a3 + a1 + aj1 + max{b1 , bj1 } ≥ 2(b3 + min{b1 , bj1 }),
which settles C.
Case 5. If b1 6= bj1 and v = aj2 , then by the claw-free property there is at least an edge among
bj2 , aj1 , b1 . Note that bj2 and b1 cannot be adjacent due to the definition of the vertex v being the
farthest. If aj1 and b1 are adjacent, then it has been proven in the above Case 4 that C can be
settled. If bj2 and aj1 are adjacent, then we add the edges {aj2 , b1 } and {aj1 , bj2 } to C while delete
the edges {aj2 , aj1 } and {aj2 , bj2 } from C; this way we obtain a path with two leaves b2 and b3 , and
thus it settles C.
Case 6. If b1 6= bj1 and v = bj2 , then we add the edge {bj2 , b1 } to C while delete the edge {aj2 , bj2 }
from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C.
If b1 6= bj1 and v = aj3 , then we add the edge {aj3 , b1 } to C while delete the edge {aj3 , aj2 }
from C; this way we obtain a path with two leaves b2 and b3 , and thus it settles C.
If b1 6= bj1 and v = bj3 , then there are two possible scenarios. When b3 6= bj3 , by the clawfree property and the definition of v we conclude that aj3 and b1 must be adjacent, and the last
paragraph shows that C is settled. When b3 = bj3 , we add the edge {b3 , b1 } to C while either delete
the edge {a3 , aj2 } from C to achieve a path with two leaves a3 , b2 , or delete the edge {aj2 , aj1 } from
C to achieve a path with leaves aj1 , b2 ; we may also do nothing to C which is a tree with leaves
b1 , b2 , b3 . Among these three trees, the maximum total weight of the internal vertices is at least
a3 + b3 + a2 + aj1 + a1 + b1 − min{a3 , aj1 , b1 + b3 } ≥ 2(b2 + min{a3 , aj1 , b1 + b3 }); thus, C is settled.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail. (Note that the same argument applies to b3 6= bj3 and v is in the
type-V component containing b3 .)
Case 7.1. If v is a head, say aj4 of the edge ej4 , and assume that aj4 is adjacent to bj5 besides
bj4 , then we consider two distinct scenarios.
Case 7.1.1. When bj5 6= bj2 , besides two leaves b2 and b3 , we either do nothing to C to leave
1
b as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj4 , bj5 } from C to leave bj5
as a leaf, or add the edge {aj4 , b1 } to C while delete the edge {aj2 , bj2 } from C to leave bj2 as
20
Chen et al. /v:May 30, 2017
a leaf. Among these three trees, the maximum total weight of the internal vertices is at least
a3 + a2 + a1 + b1 + aj2 + bj2 + aj5 + bj5 − min{b1 , bj2 , bj5 } ≥ 2(b3 + b2 + min{b1 , bj2 , bj5 }); thus, C is
settled.
Case 7.1.2. When bj5 = bj2 , by the claw-free property and the definition of the vertex v we
conclude that bj2 is adjacent to at least one of bj4 and b1 . If bj2 and bj4 are adjacent, then we
add the edges {aj4 , b1 } and {bj2 , bj4 } to C while delete the edges {aj2 , bj2 } and {aj4 , bj4 } from C to
obtain a path with leaves b2 and b3 ; if bj2 and b1 are adjacent, then we add the edge {bj2 , b1 } to C
while delete the edge {aj2 , bj2 } from C to obtain a path with leaves b2 and b3 . Thus, C is settled.
Case 7.2. In the other case v is a tail, say bj4 of the edge ej4 .
Case 7.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as
leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the
edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the
maximum total weight of the internal vertices is at least a3 + a1 + aj1 + bj2 + b1 + b2 − min{b1 +
b2 , aj1 , bj2 } ≥ 2(b3 + min{b1 + b2 , aj1 , bj2 }); thus, C is settled.
(In this paragraph, we deal with the case where b3 takes the role of b2 and prove our claim at the
beginning of Case 7 “that the same argument applies to b3 6= bj3 and v is in the type-V component
containing b3 ”. The complete assumption of Case 7.2.1 is thus b3 6= bj3 and v = b3 . Then, besides
the leaf b2 , we either do nothing to C to leave b1 , b3 as leaves, or add the edge {b1 , b3 } to C and
delete the edge {aj2 , aj1 } to leave aj1 as a leaf, or add the edge {b1 , b3 } to C and delete the edge
{aj2 , aj3 } to leave aj3 as a leaf. Among these three trees, the maximum total weight of the internal
vertices is at least a2 + a1 + aj1 + aj3 + b1 + b3 − min{b1 + b3 , aj1 , aj3 } ≥ 2(b2 + min{b1 + b3 , aj1 , aj3 });
thus, C is settled. In summary, here the vertex aj3 takes up the role of bj2 correspondingly.)
Case 7.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude
that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 , the
argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 (the argument in Case 7.1.2
does not applied to settle C due to the deferent v), besides the leaves b2 and b3 , we either do
nothing to C to leave b1 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , bj2 }
to leave bj2 as a leaf, or add the edge {b1 , aj4 } to C and delete the edge {aj2 , aj1 } to leave aj1
as a leaf. Among these three trees, the maximum total weight of the internal vertices is at least
a3 + a2 + aj1 + aj2 + bj2 + a1 + b1 − min{b1 , aj1 , bj2 } ≥ 2(b3 + b2 + min{b1 , aj1 , bj2 }); thus, C is settled.
This finishes the discussion on Case 7.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component attached to bj1 .
Case 8. If b1 = bj1 and v = aj2 , then dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by Operation 1.
Case 8.1. If there is a vertex u outside C that is adjacent to a1 , then we add the edge {a1 , u}
to F , add the edge {aj2 , b1 } to C while delete the edge {aj2 , a1 } from C; this way, C is settled.
Case 8.2. Note that if a1 and bj3 (6= b3 ) are adjacent, then a1 and aj3 are adjacent too. By
the claw-free property, we conclude that a1 must be adjacent to a vertex u ∈ {aj3 , b3 , bj2 , b2 }.
Case 8.2.1. When u = aj3 (or u = bj2 ), we add the edges {a1 , u} and {b1 , aj2 } to C while
delete the edges {u, aj2 } and {aj2 , a1 } from C; this way, we obtain a path with two leaves b3 and
b2 , and thus settle C.
Case 8.2.2. Otherwise, aj3 and bj2 are adjacent. When u = b2 (6= bj2 ), we add the edge {a1 , b2 }
to C while delete the edge {aj2 , a1 } from C, to obtain a path with two leaves b3 and b1 ; we may
also add the edges {a1 , b2 } and {aj2 , b1 } to C while delete the edges {aj2 , a1 } and {aj2 , bj2 } from C
to obtain a path with two leaves b3 and bj2 . Between these two paths, the maximum total weight
of the internal vertices is at least a3 + aj2 + bj2 + a1 + b1 − min{b1 , bj2 } ≥ 2(b3 + min{b1 , bj2 }); thus,
Approximating the maximum weight internal spanning tree
21
C is settled. When u = b3 (6= bj3 ), the same argument applies to settle C.
Case 9. If b1 = bj1 and v = bj2 , we add the edge {b1 , bj2 } to C while delete the edge {aj2 , bj2 }
from C; this way, we obtain a path with two leaves b3 and b2 , and thus C is settled.
If b1 = bj1 and v = aj3 , we add the edge {b1 , aj3 } to C while delete the edge {aj3 , aj2 } from C;
this way, we obtain a path with two leaves b3 and b2 , and thus C is settled.
If b1 = bj1 and v = bj3 , then we distinguish whether bj3 = b3 or not. When bj3 6= b3 , then b1
and aj3 must be adjacent in G and thus C can be settled as in the last paragraph. When bj3 = b3 ,
if aj3 is adjacent to one of a1 and bj2 , then we can obtain a path with two leaves b3 and b2 to settle
C; if a1 and bj2 are adjacent and bj2 6= b2 , then we can obtain a path with two leaves being b2 and
the lightest among a3 , aj2 , a1 , and thus the total weight of the internal vertices of this path is at
least a2 + a3 + aj2 + a1 + b1 − min{a3 , aj2 , a1 } ≥ 2(b2 + min{a3 , aj2 , a1 }), which settles C; otherwise
bj2 = b2 , and then we add the edge {a1 , b2 } to C while delete the edge {a2 , a1 } from C to obtain a
cycle, followed by deleting the lightest edge of C ∩ M ∗ = {{a1 , b1 }, {a2 , b2 }, {a3 , b3 }} to settle C.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail. Note that the case where b3 6= bj3 and v is in the type-V component
containing b3 can be argued in exactly the same way.
Case 10.1. If v is a head, say aj4 of the edge ej4 , assume that aj4 is adjacent to bj5 besides
bj4 . Exactly the same argument as in Case 7.1 applies to settle C, since it does not matter whether
b1 = bj1 or not.
Case 10.2. If v is a tail, say bj4 of the edge ej4 . Note that bj4 6= bj2 , which has been dealt in
Case 9.
Case 10.2.1. If b2 = bj4 , then besides the leaf b3 , we either do nothing to C to leave b1 , b2 as
leaves, or add the edge {b1 , b2 } to C and delete the edge {aj2 , a1 } to leave a1 as a leaf, or add the
edge {b1 , b2 } to C and delete the edge {aj2 , bj2 } to leave bj2 as a leaf. Among these three trees, the
maximum total weight of the internal vertices is at least a3 + a1 + aj2 + bj2 + b1 + b2 − min{b1 +
b2 , a1 , bj2 } ≥ 2(b3 + min{b1 + b2 , a1 , bj2 }); thus, C is settled.
Case 10.2.2. If b2 6= bj4 , then by the claw-free property and the definition of v we conclude
that b1 is adjacent to aj4 too. Assume that aj4 is adjacent to bj5 besides bj4 . When bj5 6= bj2 ,
the argument in Case 7.1.1 can be applied to settle C; when bj5 = bj2 , if aj3 and bj2 are adjacent,
then we add the edges {aj3 , bj2 } and {b1 , aj4 } to C and delete the edges {aj3 , aj2 } and {bj2 , aj4 } to
achieve a path with leaves b3 and b2 ; if aj3 and a1 are adjacent, then we add the edges {aj3 , a1 },
{b1 , aj4 } and {b1 , bj4 } to C and delete the edges {aj3 , aj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path
with leaves b3 and b2 ; if bj2 and a1 are adjacent, then we add the edges {bj2 , a1 }, {b1 , aj4 } and
{b1 , bj4 } to C and delete the edges {aj2 , bj2 }, {a1 , b1 } and {aj4 , bj4 } to achieve a path with leaves
b3 and b2 . Thus, C is settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 11 A type-III component in the subgraph H3 can be settled.
Proof. Recall that a type-III component C in its original form contains only one edge ej1 =
{aj1 , bj1 } of M ∗ , with another edge {aj1 , x} where x ∈ X (see Figure 3a); there could be a type-V
component attached to bj1 , with its tail b1 replacing the role of bj1 .
22
Chen et al. /v:May 30, 2017
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is w(C ∩ M ∗ ).
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and x being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an
edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej2 = {aj2 , bj2 }, that is v = bj2 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj2 is adjacent to in the type-V
component as aj3 , besides aj2 . We conclude from the claw-free property that there must be at least
an edge among aj2 , aj3 , b1 , which contradicts the identity of the type-V component. Therefore, it
is impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj2 } and {a1 , b1 }. Denote
this neighbor of a1 as u, which is impossible to be inside C by our construction algorithm. Thus,
we add the edge {b1 , bj2 } to C while delete the edge {a1 , bj2 } from C, and add the edge {a1 , u} to
F ; this way, the component becomes a path and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 },
then exactly the same argument in Case 2.2 settles C.
Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is if w(b1 ) ≤ w(bj1 ), or we add the edge
{aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the internal
vertices in the resulting path is at least aj1 + a1 + max{bj1 , b1 } ≥ 3 min{bj1 , b1 }, and thus it settles
C.
Case 5. If b1 6= bj1 and v = x, then we leave C as it is if w(b1 ) ≤ w(aj1 ), or we add the edge
{x, b1 } to C while delete the edge {aj1 , x} from C. In either case, the total weight of the internal
vertices in the resulting path is at least a1 + max{aj1 , b1 } ≥ 2 min{aj1 , b1 }, and thus it settles C.
In summary, Cases 2-5 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 .
Case 6. If b1 = bj1 , then v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, that is, there is a vertex u outside C that is adjacent to a1 . Thus we add the edge
{a1 , u} to F , add the edge {x, b1 } to C while delete the edge {a1 , x} from C; this way, C is settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 12 A type-IV component in the subgraph H3 can be settled.
Proof. Denote the two edges of M ∗ in the type-IV component C in its original form as ej1 and
ej2 . Note that both aj1 and aj2 are adjacent to a vertex x ∈ X (see Figure 3b), and there could be
Approximating the maximum weight internal spanning tree
23
a type-V component attached to bj1 and bj2 , respectively, with the tails b1 , b2 replacing the roles of
bj1 , bj2 . We assume w.l.o.g. that w(b1 ) ≥ w(b2 ).
Case 1. If b1 is adjacent to a vertex v outside C, then we add the edge {b1 , v} to F , which settles
C, since the total weight of the internal vertices in C is at least a1 + b1 + a2 ≥ 3b2 .
We next consider the case where b1 is not adjacent to any vertex outside C, and thus it has to
be adjacent to some vertex inside C. Note that C is a path with b1 and b2 being its two ending
vertices. Let v denote the vertex adjacent to b1 that is the farthest to b1 on C. We distinguish this
distance dC (b1 , v) ≥ 2 and where v locates.
Case 2. If b1 6= bj1 and v is in the type-V component containing b1 , then v must be a tail of an
edge of M ∗ and thus dC (b1 , v) is even. Denote this edge as ej3 = {aj3 , bj3 }, that is v = bj3 .
Case 2.1. If dC (b1 , v) ≥ 4, then denote the head vertex bj3 is adjacent to in the type-V
component as aj4 , besides aj3 . We conclude from the claw-free property that there must be at least
an edge among aj3 , aj4 , b1 , which contradicts the identity of the type-V component. Therefore, it
is impossible to have dC (b1 , v) ≥ 4.
Case 2.2. If dC (b1 , v) = 2, then we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, i.e. there is at least another edge incident at a1 besides {a1 , bj3 } and {a1 , b1 }. Denote
this neighbor of a1 as u. If u is inside C, then u = b2 by our construction algorithm and the
claw-free property. We add the edges {a1 , b2 } and {bj3 , b1 } to C while delete the edge {bj3 , a1 }
from C to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since
C ∩ M ∗ has at least three edges. If u is outside C, then we add the edge {b1 , bj3 } to C while delete
the edge {a1 , bj3 } from C, and add the edge {a1 , u} to F ; this way, the component becomes a path
and thus C is settled.
Case 3. If b1 6= bj1 and v = bj1 , we consider the size of the type-V component containing b1 .
Case 3.1. If this type-V component contains more than one edge of M ∗ , then by the claw-free
property aj1 must be adjacent to b1 , which violates the definition of v being the farthest and thus
it is impossible.
Case 3.2. If the type-V component containing b1 has only one edge of M ∗ , that is {a1 , b1 },
then from the definition of v we have dG (b1 ) = 2, and thus dG (a1 ) ≥ 3 by Operation 1, i.e. there is
at least another edge incident at a1 besides {a1 , bj1 } and {a1 , b1 }. The same argument as in Case
2.2, with j3 replaced by j1 , applies to settle C.
Case 4. If b1 6= bj1 and v = aj1 , then we leave C as it is when w(b1 ) ≤ w(bj1 ), or we add the
edge {aj1 , b1 } to C while delete the edge {aj1 , bj1 } from C. In either case, the total weight of the
internal vertices in the resulting path is at least a2 + aj1 + a1 + max{bj1 , b1 } ≥ 2(b2 + min{bj1 , b1 }),
and thus it settles C.
Case 5. If b1 6= bj1 and v = x, then by the definition of v and the claw-free property aj1 and b1
are adjacent. We thus settle C as in Case 4. We note that this is simpler than Case 5 in the proof
of Lemma 10 because here aj1 and aj2 cannot be adjacent.
Case 6. If b1 6= bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x}
from C. This gives a path with leaves b2 and x, and thus it settles C.
If b1 6= bj1 and v = bj2 , then we conclude that aj2 and b1 are adjacent when b2 6= bj2 , and thus
we settle C as in the last paragraph; when b2 = bj2 , we add the edge {b2 , b1 } to C to obtain a cycle,
24
Chen et al. /v:May 30, 2017
followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at least three edges,
this settles C.
Case 7. If b1 6= bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail.
Case 7.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides bj3 ,
then we do nothing to C to leave b1 as a leaf when w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 }
to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. In either way, the total weight of
the internal vertices of the resulting path is at least a2 +aj4 +a1 +max{bj4 , b1 } ≥ 2(b2 +min{bj4 , b1 }).
Therefore, in either case C can be settled.
Case 7.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C
to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ from C. Since C ∩ M ∗ has at
least three edges, this settles C. If b2 6= bj3 , then by the claw-free property and the definition of v
we conclude that b1 is adjacent to aj3 too, and thus the argument in Case 7.1 applies to settle C.
This finishes the discussion on Case 7.
In summary, Cases 2-7 together prove that when b1 6= bj1 , the component C can be settled. We
next consider the situation where b1 = bj1 , that is, there is no type-V component adjacent to bj1 .
Case 8. If b1 = bj1 and v = x, and we conclude that dG (b1 ) = 2 and thus dG (a1 ) ≥ 3 by
Operation 1, that is there is a vertex u adjacent to a1 other than x and b1 .
Case 8.1. If u is inside C, then u = b2 by our construction algorithm and the claw-free property.
2
If b 6= bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete the edge {x, a1 } from C
to obtain a cycle, followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since C ∩ M ∗
has at least three edges. If b2 = bj2 , then we add the edges {a1 , b2 } and {x, b1 } to C while delete
the edges {x, a1 } and {x, a2 } from C to obtain a path with leaves x and a2 when w(a2 ) ≤ w(b1 ),
or otherwise we add the edge {a1 , b2 } to C while delete the edge {x, a1 } from C to obtain a path
with leaves x and b1 . In either way, the total weight of the internal vertices of the resulting path
is at least a1 + max{a2 , b1 } ≥ 2 min{a2 , b1 }. Therefore, C can be settled.
Case 8.2. If u is outside C, then we add the edge {b1 , x} to C while delete the edge {a1 , x}
from C, and add the edge {a1 , u} to F ; this way, the component becomes a path and thus C is
settled.
Case 9. If b1 = bj1 and v = aj2 , then we add the edge {aj2 , b1 } to C while delete the edge {aj2 , x}
from C to obtain a path with leaves x and b2 . Therefore, C can be settled.
If b1 = bj1 and v = bj2 , when b2 6= bj2 then we conclude from the claw-free property and
the definition of v that aj2 and b1 are also adjacent, and thus C can be settled as in the last
paragraph; when b2 = bj2 , we can either do nothing to C to leave b1 and b2 as leaves, or add the
edge {b2 , b1 } to C to obtain a cycle, followed by either deleting the edge {a2 , x} to obtain a path
with leaves a2 and x, or deleting the edge {a1 , x} to obtain a path with leaves a1 and x. This
way, the maximum total weight of the internal vertices among the three resulting paths is at least
a1 + a2 + b1 + b2 − min{a1 , a2 , b1 + b2 } ≥ 2 min{a1 , a2 , b1 + b2 }. Thus, C can be settled.
Case 10. If b1 = bj1 , b2 6= bj2 , and v is in the type-V component containing b2 , we distinguish
whether v is a head or a tail.
Case 10.1. If v is a head, say aj3 of the edge ej3 , and assume that aj3 is adjacent to bj4 besides
bj3 , then we do nothing to C to leave b1 as a leaf if w(b1 ) ≤ w(bj4 ), or otherwise add the edge {aj3 , b1 }
to C while delete the edge {aj3 , bj4 } from C to leave bj4 as a leaf. This way, the total weight of the
Approximating the maximum weight internal spanning tree
25
internal vertices of the resulting path is at least a1 + a2 + aj4 + max{b1 , bj4 } ≥ 2(b2 + min{b1 , bj4 }).
Thus, C can be settled.
Case 10.2. If v is a tail, say bj3 of the edge ej3 . If b2 = bj3 , then we add the edge {b1 , b2 } to C
to make it a cycle followed by deleting the lightest edge of C ∩ M ∗ ; this settles C since there are
at least three edges in C ∩ M ∗ . If b2 6= bj3 , then from the claw-free property and the definition of
v, we conclude that aj3 must be adjacent to b1 too. Therefore, the same as in Case 10.1, C can be
settled.
All possible cases have be discussed in the above. The lemma is proven.
✷
Lemma 13 A type-VI component in the subgraph H3 can be settled.
Proof. Recall that a type-VI component C is a cycle containing two or more edges of M ∗ , where
the head of one edge of M ∗ is adjacent to the tail of another edge of M ∗ (see Figure 4b). Clearly,
if there are three or more edges of M ∗ in C, we simply delete the lightest one to settle C. In the
sequel we deal with the case where C is a length-4 cycle. Denote the two edges of C ∩M ∗ as {a1 , b1 }
and {a2 , b2 }, and assume that w(b1 ) ≥ w(b2 ).
If a1 (a2 , respectively) is adjacent to a vertex v outside C, then we add the edge {a1 , v} ({a2 , v},
respectively) to F and delete the edge {a1 , b2 } ({a2 , b2 }, respectively) from C; this way, the total
weight of the internal vertices is at least a1 + a2 + b1 ≥ 3b2 , and thus C is settled.
If neither a1 nor a2 is adjacent to any vertex v outside C, then we conclude from the construction
algorithm that dG (a1 ) = dG (a2 ) = 2 since a1 and a2 are not adjacent to each other. It follows from
the claw-free property that neither b1 nor b2 can be adjacent to any vertex u outside C. This
implies |V | = 4, a contradiction to our assumption that |V | ≥ 5. The lemma is proved.
✷
Theorem 2 The MwIST problem on claw-free graphs admits a 12/7-approximation algorithm.
Proof. The above Lemmas 9–13 state that every component of the subgraph H3 = G[V, M ∗ ∪
M aa ∪ N aa ∪ N ax ∪ M ab ∪ N ab ] can be settled, without affecting any other components. Also, such a
settling process for a component takes only linear time, by scanning once the edges in the subgraph
induced on the set of vertices of the component. By settling, essentially the component is converted
into a tree, possibly with one edge of F specified for connecting a leaf of the tree outwards.
In the next step of the algorithm, it iteratively processes the heaviest component C, i.e. with
the largest w(C ∩ M ∗ ). If the component C has been associated with an edge e of F , and using
the edge e to connect a leaf of the resulting tree for C outwards does not create a cycle, then the
algorithm does this and C is processed. This guarantees the total weight of the internal vertices
in V (C) is at least 2w(C ∩ M ∗ )/3. If using the edge e to connect a leaf of the resulting tree for
C outwards would create a cycle, the algorithm processes C by replacing C with another tree that
guarantees the total weight of the internal vertices in V (C) at least 21 w(C ∩ M ∗ ). Notice that
the latter case happens only because of (at least) one edge of F in an earlier iteration where a
distinct component C ′ was processed, which connects a vertex of C ′ into a vertex of C. Therefore,
every such C is associated with a distinct component C ′ processed by the algorithm in an earlier
iteration, and thus w(C ′ ) ≥ w(C). On the other hand, every such component C ′ is associated to
one C only, due to its edge in F connecting a leaf outwards into a vertex of C. It follows that for
this pair of components C and C ′ , the total weight of the internal vertices in V (C) ∪ V (C ′ ) is at
least
w(C)/2 + 2w(C ′ )/3 ≥ 7(w(C) + w(C ′ ))/12.
26
Chen et al. /v:May 30, 2017
After all components of H3 are processed, we obtain a forest for which the total weight of the
internal vertices therein is at least 7w(M ∗ )/12. The algorithm lastly uses any other available edges
of E to interconnect the forest into a final tree, denoted as T ; clearly w(T ) ≥ 7w(M ∗ )/12.
The time for the interconnecting purpose is at most O(m log n). Therefore, by Corollary 1 we
have a 7/12-approximation algorithm for the MwIST problem on claw-free graphs.
✷
4
Concluding remarks
We have presented an improved approximation algorithm for the vertex weighted MIST problem,
denoted MwIST, which achieves the worst-case performance ratio 1/2, beating the previous best
ratio of 1/(3 + ǫ), designed by Knauer and Spoerhase in 2009 [7]. The key ingredient in the design
and analysis of our algorithm is a novel relationship between MwIST and the maximum weight
matching, which we uncovered and it is inspired by the work [12, 11, 2]. A step further, for the
problem restricted to claw-free graphs, we presented a 7/12-approximation algorithm, improving
the previous best ratio of 1/2 designed by Salamon in 2009 for claw-free graphs without leaves.
It would be interesting to see whether this newly uncovered relationship, possibly combined with
other new ideas, can be explored further to design better approximation algorithms for MwIST, or
special cases of MwIST including claw-free graphs and cubic graphs.
Acknowledgement
The authors are grateful to two reviewers for their insightful comments on the COCOON 2017
submission and for their suggested changes that improve the presentation greatly.
ZZC was supported in part by the Grant-in-Aid for Scientific Research of the Ministry of
Education, Culture, Sports, Science and Technology of Japan, under Grant No. 24500023. GL was
supported by the NSERC Canada and the NSFC Grant No. 61672323; most of his work was done
while visiting ZZC at the Tokyo Denki University at Hatoyama. LW was supported by the Hong
Kong GRF Grants CityU 114012 and CityU 123013. YC was supported in part by the NSERC
Canada, the NSFC Grants No. 11401149, 11571252 and 11571087, and the China Scholarship
Council Grant No. 201508330054.
References
[1] D. Binkele-Raible, H. Fernau, S. Gaspers, and M. Liedloff. Exact and parameterized algorithms
for max internal spanning tree. Algorithmica, 65:95–128, 2013.
[2] Z.-Z. Chen, Y. Harada, and L. Wang. An approximation algorithm for maximum internal
spanning tree. CoRR, abs/1608.00196, 2016.
[3] N. Coben, F. V. Fomin, G. Gutin, E. J. Kim, S. Saurabh, and A. Yeo. Algorithm for finding kvertex out-trees and its application to k-internal out-branching problem. Journal of Computer
and Systems Science, 76:650–662, 2010.
[4] F. V. Fomin, S. Gaspers, S. Saurabh, and S. Thomasse. A linear vertex kernel for maximum
internal spanning tree. Journal of Computer and Systems Science, 79:1–6, 2013.
Approximating the maximum weight internal spanning tree
27
[5] F. V. Fomin, D. Lokshtanov, F. Grandoni, and S. Saurabh. Sharp separation and applications
to exact and parameterized algorithms. Algorithmica, 63:692–706, 2012.
[6] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-completeness. W. H. Freeman and Company, San Francisco, 1979.
[7] M. Knauer and J. Spoerhase. Better approximation algorithms for the maximum internal
spanning tree problem. In Proceedings of WADS 2009, LNCS 5664, pages 489–470, 2009.
[8] W. Li, J. Chen, and J. Wang. Deeper local search for better approximation on maximum
internal spanning tree. In Proceedings of ESA 2014, LNCS 8737, pages 642–653, 2014.
[9] W. Li, J. Wang, J. Chen, and Y. Cao. A 2k-vertex kernel for maximum internal spanning tree.
In Proceedings of WADS 2015, LNCS 9214, pages 495–505, 2015.
[10] X. Li, H. Jiang, and H. Feng. Polynomial time for finding a spanning tree with maximum
number of internal vertices on interval graphs. In Proceedings of FAW 2016, LNCS 9711,
pages 92–101, 2016.
[11] X. Li and D. Zhu. A 4/3-approximation algorithm for the maximum internal spanning tree
problem. CoRR, abs/1409.3700, 2014.
[12] X. Li and D. Zhu. Approximating the maximum internal spanning tree problem via a maximum
path-cycle cover. In Proceedings of ISAAC 2014, LNCS 8889, pages 467–478, 2014.
[13] E. Prieto. Systematic kernelization in FPT algorithm design. PhD thesis, The University of
Newcastle, Australia, 2005.
[14] E. Prieto and C. Sliper. Either/or: Using vertex cover structure in designing fpt-algorithms
– the case of k-internal spanning tree. In Proceedings of WADS 2003, LNCS 2748, pages
474–483, 2003.
[15] E. Prieto and C. Sloper. Reducing to independent set structure – the case of k-internal spanning
tree. Nordic Journal of Computing, 12:308–318, 2005.
[16] G. Salamon. Approximating the maximum internal spanning tree problem. Theoretical Computer Science, 410:5273–5284, 2009.
[17] G. Salamon. Degree-Based Spanning Tree Optimization. PhD thesis, Budapest University of
Technology and Economics, Hungary, 2009.
[18] G. Salamon and G. Wiener. On finding spanning trees with few leaves. Information Processing
Letters, 105:164–169, 2008.
| 8 |
arXiv:1610.03376v1 [math.GR] 9 Oct 2016
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
TOMASZ ODRZYGÓŹDŹ
3
Abstract. Our main result is that for densities < 10
a random group in the
square model has the Haagerup property and is residually finite. Moreover, we
generalize the Isoperimetric Inequality, to some class of non-planar diagrams
and, using this, we introduce a system of modified hypergraphs providing the
structure of a space with walls on the Cayley complex of a random group.
Then we show that the natural action of a random group on this space with
walls is proper, which gives the proper action of a random group on a CAT(0)
cube complex.
1. Introduction
In [Odr16] we introduced the square model for random groups, where we draw
at random relations of length four. The motivation was that the Cayley complex of
such a group has a natural structure of a square complex, which should be easier
to analyze than the polygonal Cayley complexes for groups in the Gromov model.
Definition 1.1. [Square model, [Odr16, Definition 1.3]] Consider the set An =
{a1 , . . . , an }, which we will refer to as an alphabet. Let Wn be the set of all
cyclically reduced words of length 4 over An . Note that |Wn | = (2n − 1)4 up
to a multiplicative constant. By Fn we will denote the free group generated by
the elements of An . By relators we will understand words over generators and by
relations the corresponding equalities holding in the group.
For d ∈ (0, 1) let us choose randomly, with uniform distribution, a subset Rn ⊂
Wn such that |Rn | = ⌊(2n − 1)4d ⌋. Quotienting Fn by the normal closure of the set
Rn , we obtain a random group in the square model at density d.
We say that property P occurs in the square model at density d with overwhelming probability (w.o.p.) if the probability that a random group has property P
converges to 1 as n → ∞.
In [Odr16] we showed that a random group in the square model at density d
w.o.p.:
• is trivial for d > 21 ,
• is infinite, hyperbolic, torsion-free of geometric dimension 2 for d < 12 ,
• is free for d < 41
• does not have Property (T) for d < 31
In this paper we prove
3
a random group in the square model w.o.p.
Theorem 1.2. For densities d < 10
acts properly and cocompactly on a CAT(0) cube complex.
3
Corollary 1.3. For densities d < 10
a random groups in the square model w.o.p.
has the Haagerup property and is residually finite.
1
2
TOMASZ ODRZYGÓŹDŹ
Proof. The residual finiteness results from [Ago13, Corollary 1.2] and the Haagerup
Property by a folklore remark (see for example [CMV04]).
To obtain Theorem 1.2 we needed to generalize the isoperimetric inequality
([Oll07, Theorem 2]) to a class of non-planar diagrams (see Theorem 2.5). This
generalization has already proved to be useful in other work on random groups (see
for example [MP15]). Theorem 2.5 is stated in the regime of the square model, but
the reasoning can be easily repeated in the Gromov model (see [Odr14] for some
version of it). The main idea of the proof of Theorem 1.2 is based on introducing
modified hypergraps, which provide a structure of a space with walls on the Cayley
complex of a random group, that has desired metric properties. This modified walls
allowed us to construct a proper action of a random group on a space with walls,
which was impossible to obtain using standard hypergraphs (introduced in [OW11]
for the Gromov model and in [Odr16] for the square model).
Organization. The paper is organized as follows: first we prove a generalization of
the isoperimetric inequality, then using this we introduce “corrected” hypergraphs
that provide the structure of a space with walls on the Cayley complex of a random
group. Finally we show that a random group acts properly on this space with walls.
The idea of correcting hypergraphs was inspired by [MP15].
Acknowledgements. The author would like to thank Piotr Przytycki for many
discussions and Piotr Nowak for general advice on writing.
2. Non-planar isoperimetric inequality
The goal of this section is to generalize the isoperimetric inequality to some class
of non-planar complexes, but having “disc-like” structure, meaning that they are
unions of a large disc component and some bounded non-planar pieces. Firstly, let
us recall the isoperimetric inequality:
Theorem 2.1 ([Oll07, Theorem 2]). For any ε > 0, in the Gromov model at density
d < 21 , with overwhelming probability all reduced van Kampen diagrams associated
to the group presentation satisfy
(2.1)
|∂D| ≥ l(1 − 2d − ε)|D|.
Here ∂D denotes the set of boundary edges of the diagram D and |D| denotes the
number of 2-cells of D.
One of the corollaries of Theorem 2.1 is that in the Gromov density model
at densities < 21 a random group is w.o.p. hyperbolic (see [Oll04, Theorem 1]
and [Gro93]). In [Odr16, Theorem 3.15] the author proved that Equation (2.1) is
satisfied w.o.p. as well for the square model of random groups.
Let us now introduce some definitions.
Definition 2.2. Suppose Y is a finite 2–complex, not necessarily a disc diagram.
˜ |, is
• The generalized boundary length of Y , denoted |∂Y
X
˜ | :=
(2 − deg(e)),
|∂Y
e∈Y (1)
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
• and the cancellation in Y is
Cancel(Y ) :=
X
e∈Y
3
(deg(e) − 1),
(1)
where deg(e) is the number of times that e appears as the image of an edge of the
attaching map of a 2–cell of Y .
˜ | = |∂Y |. Moreover, Cancel(Y ) =
Note, that for every planar diagram Y we have |∂Y
| − |∂Y |).
1
2 (4|Y
Definition 2.3. We say that a finite 2-complex Y is fulfilled by a set of relators
e
R if there is a combinatorial map from Y to the presentation complex X/G
that is
locally injective around edges (but not necessarily around vertices).
e is fulfilled by R.
In particular, any subcomplex of the Cayley complex X
Definition 2.4 (Diagram with K-small legs). Let G = hS|Ri be a finite group
presentation where R consists of cyclically reduced words of length 4 over S. For
K > 0 let Y be a 2–complex that is a union of a reduced Van Kampen diagram Z
and a family Zi of connected complexes, called legs of Y , such that |Zi | ≤ K, for
each i the leg Zi contains an external vertex of Z and that every edge of Y belongs
to maximally two legs. We call such Y a diagram with K-small legs (with respect
to the presentation hS|Ri). The disc diagram Z is called the disc basis of Y .
Until the end of this section G will denote the random group in the square model
e — the Cayley complex of G with respect to this
with the presentation hS|Ri and X
presentation.
Theorem 2.5 (Generalized Isoperimetric Inequality). In the square model at density d ≤ 21 the following statement holds w.o.p.: for each K and ε > 0 there is no
diagram Y with K-small legs fullfilable by R and satisfying:
(2.2)
Cancel(Y ) > 4(d + ε)|Y |,
or equivalently
(2.3)
˜ | > 4(1 − 2d − ε)|Y |.
|∂Y
Our strategy to prove Theorem 2.5 is to first prove a “local” version of it, that is
with the additional limit on the number of 2-cells in a diagram, and then to show
that this locality assmuption can be ommited. Analogous results for the Gromov
model was obtained by the author in [Odr14] and used in [MP15] to construct
balanced walls. We thank Piotr Przytycki for suggesting the statement of Theorem
2.5 involving the notion of cancellation.
2.1. Local version of the generalized isoperimetric inequality.
Lemma 2.6. In the square model at density d ≤ 21 , for each K, ε > 0 w.o.p. there
is no 2-complex Y with |Y | ≤ K fulfilled by R and satisfying
(2.4)
Cancel(Y ) > 4(d + ε)|Y |.
Our proof of Lemma 2.6 will be only a slight modification of Olliver’s proof of
Theorem 2.1. We postpone it to to introduce some necessary tools first.
4
TOMASZ ODRZYGÓŹDŹ
Definition 2.7. Let Y be a 2-complex. Suppose that the following additional
information is given:
(1) Every face of Y is labeled by a number i ∈ {1, 2, . . . , n}. The labels can
repeat and for each number 1 ≤ i ≤ n there is at least one face labeled with
i. We call n the number of distinct relators.
(2) For each face there is a distinguished edge, called the starting edge and an
orientation.
Such Y will be referred to as an abstract 2-complex. We say that Y is fulfilled
by a sequence of relators (r1 , r2 , . . . , rn ) if it is fulfilled by {r1 , r2 , . . . , rn } as 2complex, in such a way that each face f labelled by i ∈ {1, 2, . . . , n} (according
to (1) in Definition 2.7) is sent under the combinatorial map to the face of X/G
corresponding to ri , so that the image in X (1) /G of the attaching path of f , starting
at the oriented starting edge (according to (2) in Definition 2.7) reads off the word
ri . If f is labeled by i we say that f bears the relator i.
Recall that S denotes the cardinality of the generating set of a random group in
the square model. Let m denote the cardinality of the set S.
Proposition 2.8. Let R be a random set of relators at density d and at length
4 on m generators. Let Y be an abstract 2-complex. Then either Cancel(Y ) <
4(d + 2ε)|Y | or the probability that there exists a tuple of relators in R fulfilling Y
is less than (2m − 1)−4ε .
Before we prove this proposition we introduce some additional notation. Let n
be the number of distinct relators in an abstract 2-complex Y . For 1 ≤ i ≤ n let
mi be the number of times relator i appears in Y . Up to reordering the relators we
can suppose that m1 ≥ m2 ≥ · · · ≥ mn .
For 1 ≤ i1 , i2 ≤ n and 1 ≤ k1 , k2 ≤ l we say that (i1 , k1 ) > (i2 , k2 ) if i1 > i2
or i1 = i2 but k1 > k2 (lexicographic order). Suppose that for some s ≥ 2 an
edge e of Y is adjacent to faces f1 , f2 , . . . , fs labeled by i1 , i2 , . . . , is accordingly.
Suppose moreover that for 1 ≤ j ≤ s the edge e is the kj –th edge of the face fj .
Since Y → X/G is locally injective around e, the pairs (ij , kj ) are distinct. Choose
j = jmin for which (ij , kj ) is minimal. We say that edge e belongs to faces fj for
j ∈ {1, 2, . . . s} \ {jmin }.
Let δ(f ) be the number of edges belonging to a face f . For 1 ≤ i ≤ n let
κi = max{δ(f ) : f is a face labeled by relator i}
Note that
(2.5)
Cancel(Y ) =
X
f ∈Y
(2)
δ(f ) ≤
X
mi κ i
1≤i≤n
Definition 2.9. Let Y be an abstract 2-complex with n distinct relators. For
1 ≤ k ≤ n let R′ = (w1 , w2 , . . . , wk ) be a sequence of relators. We say that Y is
partially fulfilled by R′ if the abstract 2-complex Y ′ ⊂ Y that is the closure of the
faces of Y labeled by the numbers i ∈ {1, 2, ..., k} is fulfilled by R′ .
Lemma 2.10. For 1 ≤ i ≤ n let pi be the probability that i randomly chosen words
w1 , w2 , . . . , wi partially fulfill Y and let p0 = 1. Then
pi
≤ (2m − 1)−κi .
(2.6)
pi−1
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
5
Proof. Suppose that first i − 1 words w1 , . . . , wi−1 partially fulfilling Y are given.
We will successively analyze what is the choice for the consecutive letters of the
word wi , so that Y is fulfilled. Let k ≤ 4 and suppose that the first k − 1 letters of
wi are chosen. Let f be the face realizing δ(f ) = κi and let e be the k-th edge of
the face f .
If e belongs to f this means that there is another face f ′ meeting e which bears
relator i′ < i or bears i too, but e appears in f ′ as a k ′ < k-th edge. In both cases
the letter on the edge e is imposed by some letter already chosen so drawing it at
1
up to some small error. In fact, this estimate
random has probability ≤ (2m−1)
would be valid only if the words were only required to be reduced; since they are
cyclically reduced a negligible error appears, which we ignore.
Combining all these observations we get that the probability to choose at random
the correct word wi is at most pi−1 (2m − 1)−κi .
Now we can provide the proof of Proposition 2.8
Proof of Proposition 2.8. For 1 ≤ i ≤ n let Pi be the probability that there exists
an i-tuple of words partially fulfilling Y in the random set of relators R. We trivially
have:
Pi ≤ |R|i pi = (2m − 1)4id pi
(2.7)
Combining equations (2.5) and (2.6) we get
n
X
Cancel(Y ) ≤
mi (log2m−1 pi−1 − log2m−1 pi ) =
i=1
=
n−1
X
(mi+1 − mi ) log2m−1 pi − mn log2m−1 pn + m1 log2m−1 p0 .
i=1
Now p0 = 1 so log2m−1 p0 = 0 and we have
Cancel(Y ) ≤
n−1
X
(mi+1 − mi ) log2m−1 pi − mn log2m−1 pn .
i=1
From (2.7) and the fact that mi+1 − mi ≤ 0 we obtain
Cancel(Y ) ≤
n−1
X
(mi+1 − mi )(log2m−1 Pi − 4id) − mn log2m−1 (Pn − 4nd)
i=1
Observe that
Pn−1
i=1
(mi − mi+1 )i + mn n =
Cancel(Y ) ≤ 4|Y |d +
n−1
X
Pn
i=1
mi = |Y |. Hence
(mi+1 − mi ) log2m−1 Pi − mn log2m−1 Pn
i=1
Setting P = mini Pi and using the fact that mi+1 − mi ≤ 0 we get
Cancel(Y ) ≤ 4|Y |d + (log2m−1 P )
n−1
X
(mi+1 − mi ) − mn log2m−1 P =
i=1
= 4|Y |d − m1 log2m−1 P ≤ |Y |(4d − log2m−1 P ),
6
TOMASZ ODRZYGÓŹDŹ
since m1 ≤ |Y |. It is clear that a complex is fulfillable if it is partially fulfillable for
any i ≤ n and so:
Probability(Y is fullfillable by relators of R) ≤ P ≤ (2m − 1)
4|Y |d−Cancel(Y )
|Y |
which was to be proven.
,
Proof of Lemma 2.6. Denote by C(K, m) the number of abstract square complexes
with at most K 2-cells. Observe that there are finitely many square complexes with
at most K faces. There are also finitely many ways to decide which faces would
bear the same relator, and also finitely many ways to choose the starting point of
each relator. Therefore, the values {C(K, m)}m∈N with fixed K have a uniform
bound M . We know by Proposition 2.8 that for any abstract 2-complex with at
most K faces violating the inequality Cancel(Y ) < 4(d + ε)|Y | the probability that
it is fulfilled by a random set of relators is ≤ (2m − 1)−4ε . So the probability that
there exists a fulfilled 2-complex with at most K faces, violating the inequality is
≤ C(K, m)(2m − 1)−4εl ≤ M (2m − 1)−4εl , so it converges to 0 as m → ∞.
2.2. From the local version to the global. We start this subsection by reformulating [Oll07, Lemma 11] by replacing the length of relator l by 4.
Lemma 2.11. Let G = hS|Ri be a finite presentation in which all elements of R
have length 4. Suppose that for some constant C ′ > 0 every van Kampen diagram
E of this presentation satisfies:
|∂E| ≥ 4C ′ |E|.
Then every van Kampen diagram D can be partitioned into two diagrams D′ , D′′ by
with endpoints on the boundary
cutting it along a path of length at most 4 + 8 log(|D|)
C′
of D such that each of D′ and D′′ contains at least one quarter of the boundary of
D.
We will state now prove two propositions „approximating” Theorem 2.5.
Proposition 2.12. Let G = hS|Ri be a finite presentation such that all elements of
R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen
diagrams D with respect to this presentation satisfy
|∂D| ≥ C ′ 4|D|.
7A
Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1 + C2′ log( 6C
′ ) + 2K).
Suppose that for some C > 0 all diagrams with K–small legs Y having the disc
basis of boundary at most 4A satisfy:
˜ | ≥ C4|Y |.
|∂Y
Then all diagrams with K–small legs Y having the disc basis of boundary at most
14
3 A satisfy:
˜ | ≥ (C − ε)4|Y |
|∂Y
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
7
Proof. Let Y be the diagram with K–small legs such that its disc basis Z has the
boundary length between 4A and 14
3 A. By Lemma 2.11 we can perform a partition
of Z into two reduced disc diagrams Z ′ and Z ′′ such that: |∂Z ′ |, |∂Z ′′ | ≥ 41 |∂Z|
and |∂Z ′ ∩ ∂Z ′′ | ≤ 4 + C8′ log(|Z|). The number of 1–cells that belong both to Z
and one of the legs Zi is bounded by 4K, since there are no more than 4K 1–cells
in Zi . We define Y ′ to be the union of Z ′ and all legs of Y that are adjacent to
Z ′ , and Y ′′ to be the union of Z ′′ and all legs of Y adjacent to it. Hence we can
perform a partition of Y into two diagrams Y ′ and Y ′′ with K–small legs such that
˜ | ≥ |∂Y
˜ ′ | + |∂Y
˜ ′′ | − 2(4 + 8′ log(|Z|) + 8K).
|∂Y
C
Note that |∂Z ′ |, |∂Z ′′ | < 4A so by our assumption we know
˜ ′ | ≥ C4|Y ′ |
|∂Y
˜ ′′ | ≥ C4|Y ′′ |.
|∂Y
Moreover by the assumption on van Kampen diagrams we obtain that
7A
1
C ′ log( 6C ′ ). Hence
1
C′
log(|Z|) <
˜ | ≥ |∂Y
˜ ′ | + |∂Y
˜ ′′ | − 2(4 + 8 log(|Z|) + 8K)
|∂Y
C′
7A
8
≥ C4(|Y ′ | + |Y ′′ |) − 2(4 + ′ log( ′ ) + 8K).
C
6C
7A
We have chosen A large enough so that 2(1 + 2 C1′ log( 6C
′ ) + 2K) < εA so we
can continue estimation
˜ | ≥ Cl|Y | − 4εA ≥ 4(C − ε)|Y |
|∂Y
since 4|Y | ≥ |∂Z| ≥ 4A.
The last approximation to Theorem 2.5 is the following
Proposition 2.13. Let G = hS|Ri be a finite presentation such that all elements of
R are reduced words of length 4. Suppose that for some constant C ′ all van Kampen
diagrams D with respect to the presentation satisfy
(2.8)
|∂D| ≥ C ′ l|D|.
7A
Choose any K, ε > 0. Take A large enough to satisfy εA > 2(1+2 C1′ log( 6C
′ )+2K).
Suppose that for some C > 0 all diagrams Y with K–small legs and the disc basis
with boundary length at most 4A satisfy:
(2.9)
˜ | ≥ 4C|Y |.
|∂Y
Then all diagrams with K–small legs Y satisfy:
˜ | ≥ 4(C − ε)|Y |
|∂Y
Proof. The assumptions of this proposition and Proposition 2.12 are the same.
Hence by the statement of Proposition 2.12 we can conclude that the assumptions
1
of Proposition 2.12 are fulfilled with the new parameters: A1 = 67 A, ε1 = ε( 67 ) 2
and C1 = C − ε instead of A, ε, C and with the same C ′ (these new parameters
1
indeed satisfy ε1 A1 > 2(1 + C2′ log( 7A
6C ′ ) + 2K)). By induction every diagram with
8
TOMASZ ODRZYGÓŹDŹ
K − small legs such that its disc basis has boundary of length at most 4A
satisfies
˜ |≥
|∂Y
C−ε
k−1
X
i=0
and we conclude by the inequality
P∞
i=0
6
7
6
7
2i
2i !
7 k
6
4|Y |
< 14.
Proof of Theorem 2.5. First, by Theorem 2.1 we know that all Van Kampen diagrams satisfy Equation (2.8) for C = (1 − 2d − ε′ ), for arbitrary small ε′ . By
Lemma 2.6 we know that for any K, ε all diagrams with K-small legs satisfy Equation (2.9). Hence the assumptions of the Proposition 2.13 are satisfied, which gives
the statement.
3. Colored hypergraphs
In this section we we will introduce colored hypergraphs, which can be effectively
used in investigating random groups in the square model. We start with
e be the Cayley complex of a random group in the square
Proposition 3.1. Let X
1
model at density d < 3 . Then w.o.p.:
e having three common edges.
(1) There is no pair of 2-cells in X
e such that |∂D ∩ ∂E| = 2, then there is no 2-cell
(2) If D and E are 2-cells in X
e
F in X such that |(∂D ∪ ∂E) ∩ ∂F | > 1.
e having three common edges forms a van Kampen
Proof. (1) A pair of 2-cells in X
diagram D satisfying |∂D| = 2 and |D| = 2. Therefore |∂D| ≤ 43 |D|, so D violates
Theorem 2.5, which implies that w.o.p. there is no such a pair of 2-cells.
(2) Suppose, on the contrary, that there exist such 2-cells D, E and F . Consider
a diagram D consisting of 2-cells D and E. Adding a new 2-cell to D by gluing
it along two edges does not change the generalized boundary length of D. Hence
˜ | = 4, |Y | = 3.
the diagram Y that is a union of D and the 2-cell F satisfies: |∂Y
˜
Therefore, Y violates Theorem 2.5, which states that |∂Y | > 4(1 − 2d)|Y |, so w.o.p.
there is no such a triple of 2-cells.
e be the Cayley complex of a random group in the square
Definition 3.2. Let X
1
e have two common edges, we say they are
model at density ≤ 3 . If two 2-cells in X
strongly adjacent. If a 2-cell D is strongly adjacent to some other 2-cell we say that
D is a distinguished 2-cell. The common edges of two strongly adjacent 2-cells we
call distinguished edges. A 2-cell which is not a distinguished 2-cell we call a regular
2-cell.
Proposition 3.3. Let D and E be strongly adjacent 2-cells. Then there is no
e
element of a random group G sending D to E under the natural action of G on X.
e
In other words, D and E are in different orbits of the action of G on X.
(2n−1)4 −6(2n)2
(2n−1)4d
(2n−1)4
(2n−1)4d
,
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
9
Proof. Suppose that there exists g ∈ G sending D to E. By Lemma 3.1 we know
that a 2-cell can be strongly adjacent to at most one other 2-cell, co g preserves the
pair {D, E}. The diagram Y consisting of 2-cells D and E has exactly one internal
vertex (that is a vertex isolated from the boundary). If the diagram {D, E} is
preserved by g the internal vertex must be also preserved, which contradicts the
fact that the action of G on its Cayley graph is free.
Definition 3.4 (Procedure of painting the Cayley complex). By Proposition 3.1
we know that distinguished 2-cells form a set S of disjoint unordered pairs of 2-cells.
By Proposition 3.3 we know that none of these pairs lies in one orbit of G-action
e We will now perform a procedure of painting distinguished 2-cells in two
on X.
colors: red and blue.
In the first step we consider one of the pairs {D, E} ∈ S and choose arbitrarily
one 2-cell from this pair. Without loss of generality we can suppose that D is
chosen. We say that D is a red 2-cell and E is a blue cell. Moreover we say that
each element in the orbit of D is red and each element in the orbit of E is blue.
In the next step we choose another pair of strongly adjacent 2-cells {D1 , D2 },
that is not in the orbit of the pair {D, E}. Then we paint all elements in the orbit
of D1 in red, and all elements in the orbit of E1 in blue. We repeat this step until
all distinguished 2-cells are painted. The Cayley complex is cofinite, so there are
finitely many orbits of 2-cells and therefore this painting procedure must end after
a finite number of steps. The Cayley complex with painted distinguished 2-cells we
call painted Cayley complex.
From now we will always assume that the Cayley complex of a random group is
e
painted, and we will denote it by X.
We now recall the definition of a hypergraph from [OW11, Definition 2.1].
Definition 3.5 (standard hypergraph). Let X be a connected square complex. We
define a graph Γ as follows: The set of vertices of Γ is the set of 1-cells of X. There
is an edge in Γ between two vertices if there is some 2-cell R of X such that these
vertices correspond to opposite 1-cells in the boundary of R (if there are several
such 2-cells we put as many edges in Γ). The 2-cell R is the 2-cell of X containing
the edge.
There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the
midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining
two opposite points in the 2-cell R. Note that the images of two edges contained
in the same 2-cell R always intersect, so that in general ϕ is not an embedding.
A standard hypergraph in X is a connected component of Γ. The 1-cells of X
through which a hypergraph passes are dual to it. The hypergraph Λ embeds if ϕ
is an embedding from Λ to X, that is, if no two distinct edges of Λ are mapped to
the same 2-cell of X.
We call the subdiagram of X consisting of all open faces containing edges of the
hypergraph Λ the carrier of Λ and denote it by Car(Λ).
The hypergraph segment in X is a finite path in a hypergraph immersed into X.
The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open
2-cells containing edges of the segment Λ′ .
By [Odr16, Lemma 5.16] we know that standard hypergraphs are embedded
trees. Moreover, [OW11, Lemma 2.3] states that for each standard hypergraph Γ
e − Γ has exactly two connected components. However the system of
the space X
10
TOMASZ ODRZYGÓŹDŹ
standard hypergraphs is not sufficient to construct a proper action of a random
group on a CAT(0) cube complex, which we need to prove Theorem 1.3. Our
strategy of constructing such an action is based on showing that the wall space
metric on the Cayley complex is equivalent to the edge path metric. This means
in particular that for every number N if we have two enough distant points in the
Cayley complex they are separated by at least N walls, which are hypergraphs in our
case. In Figure 1 we present an example of a geodesic edge-path γ of an arbitary
length such that no standard hypergraph separates its ends x and y. Situation
presented in Figure 1 cannot be excluded for densities ≥ 14 in the square model,
therefore we need a better system of walls, based on more systems of hypergraphs.
x
γ
...
y
Figure 1. Arbitrary long geodesic edge-path joining points x and
y that are not separated by a hypergraph.
We now introduce a new type of hypergraph - red hypegraph, which is modified
on red 2-cells.
Definition 3.6 (red and blue hypergraph). Let X be a connected square complex
e We define a graph Γ as
that is a subcomplex of the painted Cayley complex X.
follows: The set of vertices of Γ is the set of 1-cells of X. We put an edge in Γ
between two vertices if one the following holds:
(1) there is some regular or blue 2-cell R of X such that these vertices correspond to opposite 1-cells in the boundary of R (if there are several such
2-cells we put as many edges in Γ
(2) there is some red 2-cell R of X such that one of this vertices corresponds to
distinguished edge e of R and the second corresponds to non distinguished
edge of R which is not opposite to e.
The 2-cell R is the 2-cell of X containing the edge.
There is a natural map ϕ from Γ to X, which sends each vertex of Γ to the
midpoint of the corresponding 1-cell of X and each edge of Γ to a segment joining
two points in the boundary 2-cell R.
A red hypergraph in X is a connected component of Γ. The 1-cells of X through
which a hypergraph passes are dual to it. The red hypergraph Λ embeds if ϕ is an
embedding from Λ to X.
We call the subdiagram of X consisting of all open 2-cells containing edges of
the red hypergraph Λ the carrier of Λ and denote it by Car(Λ).
The hypergraph segment in X is a finite path in a hypergraph immersed into X.
The carrier of a segment Λ′ denoted Car(Λ′ ) is the diagram consisting of all open
2-cells containing edges of the segment Λ′ .
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
11
If in the above definition we replace every occurrence of the word “red” by the
word “blue” we obtain the definition of the blue hypergraph.
The comparison of the hypergraphs introduced above is presented in Figure 2.
Λst
blue
2-cell
Λst
blue
2-cell
Λred
red 2-cell
Λblue
red 2-cell
a)
b)
Figure 2. a) The comparison of a red hypergraph Λred and a
standard hypergraph Λst , b) The comparison of a blue hypergraph
Λblue and a standard hypergraph Λst .
3.1. Hypergraphs are embedded trees. Now we are going to prove
Theorem 3.7. In the square model at density d <
e are embedded trees.
hypergraphs in X
1
3
w.o.p. all red and blue
To investigate standard and red hypergraphs we need a notion of a collared
diagram. Our definition is a slight modification of the one introduced by Ollivier
and Wise in [OW11, Definition 3.2].
Definition 3.8. (collared diagram) Let D be a Van Kampen with the following
properties:
(1) there is an external 2-cell C called a corner of D
e of a hypergraph (standard, red or blue) of
(2) there is a segment λ → D → X
length at least 2
(3) the first and the last edge of λ lie in C, and no other edge lies in C
(4) λ passes through every other external 2-cell of D exactly once
(5) λ does not pass through any internal 2-cell of D
We call D a collared diagram and λ a collaring segment. We also say that D
is cornerless if the first and the last edge of λ coincide in C (in which case the
hypergraph cycles).
Now we will use the additional color-structure of a Painted Cayley complex to
perform the following procedure of adding horns to a diagram.
e
Definition 3.9 (adding horns procedure). Let D be a van Kampen diagram in X.
Let ∂2 (D) be the set of all 2-cells in D that contain a boundary edge of D. Let
∂2s (D) be the set of all distinguished 2-cells c in 2 − ∂(D) such that a 2-cell c′ , that
is strongly adjacent to c, does not belong to D.
12
TOMASZ ODRZYGÓŹDŹ
We define a diagram with horns D in the following way: for each c ∈ ∂2 (D) we
glue to a diagram D a 2-cell c′ that is strongly adjacent to c (gluing is in a way that
e
these 2-cells are glued in X).
If that will be clear we will call diagrams with horns just diagrams, for shortness.
˜
Lemma 3.10. Let D be a diagram with horns. Then |∂(D)|
(the generalized boundary length) is an even number.
Proof. The statement results from the fact that every 2-cell of D has even number of
edges and every gluing of 2-cells along an edge decreases the generalized boundary
length by 2.
Remark 3.11. A diagram with horns is a union of a disc diagram D and a set
Z of 2-cells, each of them being adjacent to the boundary of D along at least one
vertex and such that no two elements of Z share an edge.
Proof. The only thing that we need to prove is that no two elements of Z share an
edge. This results by Proposition 3.1.
Corollary 3.12 (of Remark 3.11). Collared diagrams with horns w.o.p. satisfy the
assumptions of Theorem 2.5.
The following theorem shows the relation between collared diagrams and hypergraphs
Theorem 3.13 (reformulation of [OW11, Theorem 3.5]). Let Λ be a hypergraph in
e The following conditions are equivalent:
X.
(1) Λ is an embedded tree.
(2) There is no collared diagram collared by a segment of Λ.
There is a definition of a diagram collared by a hypergraph in [OW11, Definition
3.11]. However, in the paper [OW11] this definition was stated for a general l-gon
complex and for the standard hypergraphs that join antipodal midpoints of faces
they are passing through. Definition 4.3 is a modification of [OW11, Definition
3.11]: we use it for l = 4 and for hypergraphs defined in a different way, but the
e is not necessary
fact the hypergraph joins the antipodal midpoints of edges in X
to provide the proof of Theorem 3.13, in fact the proof can be repeated, as well, in
case of colored hypergraphs.
The next theorem is motivated by Theorem 3.13 and shows the relation between
collared diagrams with horns and colored hypergraphs.
e If
Theorem 3.14. Let Λ be a red or blue hypergraph in X.
Λ is not an embedded tree, then there is a collared diagram with horns collared by
a segment of Λ.
Proof. By Theorem 3.13 we know that there exists collared diagram collared by a
segment of Λ. We obtain the statement of Theorem 3.14 by applying the procedure
of adding horns to a diagram described in Definiton 3.9
Proof of Theorem 3.7. Suppose, on the contrary, that there is a red or blue hypergraph that is not an embedded tree. By Theorem 3.14 we know that there is a
˜
collared diagram
with horns E collared by some segment λ. Let n = |∂E|.
For
1
ε < 2 3 − d by Theorem 2.5 we have w.o.p.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
13
˜ ≥ 4|E|(1 − 2d − ε) > 4 |E|
n = |∂E|
3
There are two possibilities: either E is cornerless or not. First consider the
case where E is cornerless. Then every external 2-cell, which is not red or blue has
exactly one external edge. Each pair of strongly adjacent 2-cells gives a contribution
˜ equal 2, independently of the way the blue or red 2-cell is glued to the
to |∂E|
diagram E. Hence |E| ≥ n. By (3.1) we know that with overwhelming probability
all collared cornerless diagrams with horns satisfy:
(3.1)
4
n,
3
which is a contradiction. Therefore, with overwhelming probability there are no
such diagrams.
Let us now consider the case where the diagram E is not cornerless. The only
difference between the previous case is that a corner can have two external edges.
Therefore |E| ≥ n − 1. We have two possibilities |E| ≥ n or |E| = n − 1. If |E| ≥ n
we again obtain (3.2), which is a contradiction. Hence, the only remaining case is
˜ = n and |E| = n − 1. Again we use (3.1) to obtain:
where |∂E|
(3.2)
n>
4
(n − 1).
3
It can be easily seen that for n > 3 this is not possible. So we only have to exclude
˜ = 3. But there are no diagrams with odd generalized
the diagram |E| = 2, |∂E|
boundary length, according to Lemma 3.10.
n>
Lemma 3.15. Suppose that a red hypergraph or a blue hypergraph Λ is an embedded
e Then X
e − Λ consists of two connected components.
tree in X.
Proof. The proof is analogous to the proof of [OW11, Lemma 2.3].
4. Metrically proper action on a space with walls
In this section our goal is to prove the following
3
. Let
Theorem 4.1. Let G be a random group in the square model at density d < 10
e
e
X be the Cayley complex of G. For x, y ∈ X we denote by dwall (x, y) the number
of hypergraphs Λ (standard, red and blue) such that x and y lie in the different
e − Λ. Then w.o.p.
connected components of X
1
d e (1) (x, y)⌋,
15 X
e
denotes the edge metric on the 1-skeleton of X.
dwall (x, y) ≥ ⌊
where dXe (1)
The meaning of the foregoing theorem comes from the following
Proof of Theorem 1.2. By Lemma 3.15 hypergraphs are embeddes trees, and by
Lemma 3.15 and [OW11, Lemma 2.3] they separate the Cayley complex into two
connected components, so they provide a structure of a space with walls on it.
Every discrete group acts properly on its Cayley complex, and by Theorem 4.1 the
wall metric and edge metric on the Cayley complex are equivalent. Therefore a
14
TOMASZ ODRZYGÓŹDŹ
group acts properly on a space with walls. Then by [CN05] there is an action of a
random group on a CAT(0) cube complex.
Before we provide the proof of Theorem 4.1 we need several facts about the
geometry of hypergraphs. For simplicity, until the end of this section we will denote
e the painted Cayley complex of a random group in the square model at density
by X
3
e (1) the 1-skeleton of X
e (i.e. the Cayley graph of a random group).
and by X
d < 10
e let E be a 2-cell having exactly
Lemma 4.2. Let D be a distinguished 2-cell in X,
one common edge with D and let F be a 2-cell different than D and having at least
one common edge with E. Then w.o.p. E and F are regular 2-cells.
Proof. Suppose, on the contrary, that E is a distinguished 2-cell. Then let D′ and
E ′ be the 2-cells strongly adjacent to D and E respectively. By the assumption
we know that D′ 6= E and E ′ 6= D (otherwise D and E would be strongly adjacent). By Proposition 3.1 we know that D′ 6= E ′ . Therefore there are two pairs
of distinguished 2-cells {D, D′ } and {E, E ′ } which have at least one common edge.
Consider the diagram D consisting of 2-cells D, D′ , E, E ′ , glued in the way they
˜ ≤ 6. Note, that every diagram A consiste We will show that |∂D|
are glued in X.
˜ = 4. Gluing two
ing of two strongly adjacent 2-cells satisfies: |A| = 4 and |∂A|
such diagrams, consisting of disjoint sets of 2-cells, along one edge decreases the
˜ ≤ 6. Therefore, the diagram D violates
generalized boundary length by 2, so |∂D|
˜ ≥ |D|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a
the inequality |∂D|
diagram D. Therefore E is a regular 2-cell.
Now suppose, on the contrary, that F is a distinguished 2-cell. Let F ′ be the
2-cell strongly adjacent to F . Again by Propistion 3.1, shows that F ′ 6= D, D′ 6= F
and F ′ 6= D′ . Moreover, from the previous part of the proof we know that with
w.o.p. E is a regular 2-cell, so F ′ 6= E. Hence, there is a diagram E, which is a
union of a pair {D, D′ } of strongly adjacent 2-cells, 2-cell E, and a second pair
of strongly adjacent 2-cells {F, F ′ }. Analogously as above, we can prove that E
˜ ≤ 8. Therefore the diagram E violates the inequality
satisfies: |E| = 5 and |∂E|
˜
|∂E| ≥ |E|4(1 − 2d), so by Theorem 2.5 w.o.p. there is no such a diagram E. Hence
F is a regular 2-cell.
Now, we introduce the notion of a diagram collared by hypergraph and path.
Definition 4.3. Let λ be a segment of a hypergraph (red, blue or standard) and
e (1) . Let D be a van Kampen diagram with the following
let γ be an edge-path in X
additional properties:
(1) λ passes only through external 2-cells of D
(2) every external edge of D belongs to the boundary of the carrier of λ or
belongs to γ.
We call D a diagram collared by hypergraph and path. After applying the procedure
of adding horns(see Definition 3.9) to D we obtain a diagram with horns collared
by hypergraph and path. We call λ a collaring hypergraph segment and γ a collaring
edge-path.
There is a definition of a diagram collared by hypergraphs and paths in [OW11,
Definition 3.11]. In the paper [OW11] this definition was stated for a general polygonal complex and for the hypergraphs that join antipodal midpoints of faces they
are passing through. Definition 4.3 is a modification of [OW11, Definition 3.11]: we
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
15
use it for l = 4, one path and one hypergraph segment, and for hypergraphs defined
in a different way, but the fact the hypergraph joins the antipodal midpoints is not
necessary to provide the proofs of upcoming lemmas. The proofs of lemmas from
[OW11] that we will use can be as well repeated for red and blue hypergraphs. The
following lemma is then a slight modification of [OW11, Lemma 3.17].
e and γ be an edge path in X
e (1) . Suppose,
Lemma 4.4. Let Λ be a hypergraph in X
that γ intersects Λ in two consecutive points x, y. Then there is a diagram with
horns collared by Λ and a segment of γ bounded by points x and y (here γ is an
edge path which starts and ends at“midedge vertices” corresponding to vertices of
Λ.
Proof. First we prove that there exists a diagram collared collared by Λ and a
segment of γ bounded by points x and y. The proof of this fact is analogous to
the proof of [OW11, Lemma 3.17]. Then we apply a procedure of adding horns
(Definition 3.9) to that diagram.
e (1) and let Λ be a hypergraph in X.
e
Lemma 4.5. Let γ be a geodesic edge-path in X
Suppose that there is a finite, nonempty geodesic segment γ ′ ⊂ γ, such that the first
and the last vertex of γ ′ lie in Car(Λ) but no other vertices of γ ′ lie in Car(Λ) and
no edge of γ ′ lie in Car(Λ). Then w.o.p. γ ′ has length 2, and there is the following
e
diagram D consisting of three 2-cells immersed in X:
γ′
Λ′
Figure 3. The diagram D.
Moreover, every 2-cell of D is a regular 2-cell.
Definition 4.6. A diagram D having the same shape as the one presented in Figure
4.5 will be called a house diagram. The geodesic segment γ ′ we be called a roof (of
a house diagram).
Proof. Let e0 , e1 be some edges dual to Λ with endpoints in the first and the last
vertex of γ ′ . By Lemma 4.4 we know that there is a diagram D with horns collared
by the edge-path {e0 , γ ′ , e1 } and a segment Λ′ of Λ. Suppose that the length of
this hypergraph segment equals k and the length of γ ′ equals l. Let k ′ denote the
number of horns in D. Note that
˜ ≤ k + k ′ + l + 2.
(4.1)
|∂D|
Note that every edge of γ ′ lies in the boundary of some 2-cell in D that is not in the
carrier of Λ, since otherwise there would be an inner vertex of γ ′ lying in Car(Λ).
Moreover, more than 2 edges of γ ′ cannot lie in the boundary of one 2-cell in D,
16
TOMASZ ODRZYGÓŹDŹ
since otherwise γ ′ would not be a geodesic. Therefore, there are at least
in D not lying in Car(Λ). Hence
l
′
.
(4.2)
|D| ≥ k + k +
2
l
2
2-cells
Moreover, l ≥ 2, because there is at least one vertex of γ ′ not lying in the carrier
of Λ and l ≤ k because γ is a geodesic. By Lemma 3.10 the number k + k ′ + l must
be even. Combining this with Theorem 2.5 gives the following system of conditions,
which is w.o.p. satisfied by k, k ′ and l:
(4.3)
l
8
′
′
k + k + l + 2 > 5 k + k + 2
l ≤ k, l ≥ 2, k ≥ 1 ⇐⇒ 2 ≤ l ≤ k
k + k ′ + l is an even number
Now we will find the possible values of l (see 4.3).
If l is even then we can rewrite the first inequality in (4.3) in form k + k ′ + l + 2 >
8
l
′
′
5 (k + k + 2 ). This is equivalent to 3(k + k ) < 10 + l. Combining this with the
second inequality in (4.3), that is l ≤ k, we obtain k < 5. Therefore l ≤ 4, since l
is even. Hence for even l possible solutions are: l = 4 and l = 2.
If l is odd then the first inequality in (4.3) becomes k +k ′ +l+2 > 85 (k +k ′ + l+1
2 ),
which is equivalent to 3(k + k ′ ) < l + 6. Combining this with l ≤ k we get k < 3.
Therefore l ≤ 1 since l is odd. This contradicts l ≥ 2. Hence, there are no solutions
with odd l.
First, consider the case, where l = 2. Then
8
k + k ′ + 4 > (k + k ′ + 1),
5
′
so k + k < 4. Combining this with the parity of k + k ′ + l we obtain that only
possible solution for l = 2 is k + k ′ = 2. Hence, there are two subcases to consider:
k ′ = 0 and k ′ = 1. If k ′ = 1 then the segment Λ′ consists of a distinguished 2-cell
c, which is strongly adjacent to some 2-cell c′ :
c′
A
c
B
Λ
γ′
D
C
Figure 4. The diagram D with one of possible hypergraphs Λ and
geodesic segments γ ′ .
The geodesic segment γ ′ joins vertices A and C or B and D, since otherwise γ
would not be geodesic. It can be easily seen that the 2-cell c′ also belongs to the
carrier of Λ. Therefore γ ′ cannot run along the boundary path of c′ , since it has at
least one vertex that lies outside the carrier of Λ. Hence, there must be at least one
˜ = 4 and |D| ≥ 3, which contradicts Theorem
more 2-cell in D. This gives us |∂D|
2.5.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
17
The second subcase (of the case l = 2) is k ′ = 0 and k = 2. In that subcase
Car(Λ′ ) consists of two regular 2-cells (see Figure 5 a) ).
γ′
A
B
C
A
B
Λ′
F
E
C
Λ′
D
F
a)
E
D
b)
Figure 5. The diagram D.
Note, that γ ′ can join only vertices A with C or D with F , since in all other
cases γ ′ is either not a geodesic or intersects Λ, according to Lemma 3.15. After
relabelling vertices, we can always obtain a diagram D presented in Figure 5 b), as
desired. Moreover, every 2-cell in D is a regular 2-cell, since D does not have any
horns. There are exactly three 2-cells in D since by 2.5 there are no diagrams with
the boundary equal 6 consisting of more than three 2-cells.
Now, consider the case where l = 4. Then
8
k + k ′ + 6 ≥ (k + k ′ + 2),
5
so k + k ′ ≤ 4. We start with the subcase, where k + k ′ = 4. We know that
˜
|∂D| ≤ k + k ′ + l = 10 and |D| ≥ k + k ′ + 2l = 6. By Theorem 2.5 and the fact
˜ ≤ 10 we obtain that |D| = 6 and |∂D|
˜ = 10. Let C = D ∩ Car(Λ). The
that |∂D|
diagram D − C consists of two 2-cells, call them A and B. Note that all edges of γ ′
belong to A ∪ B. Therefore 2-cells A and B have no common edges, since otherwise
there will be no two points in A ∪ B within distance 4. This means, that there are
three vertices of γ ′ belonging to C. This contradicts our assumption on γ ′ so there
is no diagram with k + k ′ = 4 satisfying the assumptions of the Lemma 4.5.
Now consider the case, where k + k ′ = 2 and l = 4. If k + k ′ = 2 then the carrier
of Λ′ consists of maximally two 2-cells, so every pair of vertices in this carrier lies
in the distance dXe (1) equal at most 3. Therefore γ ′ cannot join any vertices of the
carrier of Λ′ . Hence, there is no diagram D with k + k ′ = 2 and l = 4.
There are no other possibilities, because of the parity of k + k ′ + l.
Definition 4.7. Let λ be a segment of a hypergraph. A diagram consisting of
two strongly adjacent 2-cells, such that λ passes through this pair will be called a
divided tile (of λ) we. A 2-cell in the carrier of λ that is not a regular 2-cell but
is not an element of a divided tile of λ will be called an isolated 2-cell. A tile is a
divided tile or a regular 2-cell.
Lemma 4.8 (hypergraphs do not osculate). Let Λ′ be a hypergraph segment in
e (1) . Suppose that one of the following conditions is satisfied
X
18
TOMASZ ODRZYGÓŹDŹ
a) Λ′ is a segment of a red hypergraph and there are no isolated red 2-cells of Λ′ ,
b) Λ′ is a segment of a blue hypergraph and there are no isolated blue 2-cells of Λ′ ,
c) Λ′ is a segment of a standard hypergraph and there is no divided tile of Λ′ .
Then w.o.p. holds
(1) For every vertex v of Car(Λ′ ) there is only one edge in Car(Λ′ ) ending in
v, dual to Λ′ that is not an internal edge of a divided tile (the situation
presented in Figure 6 a) does not occur). In other words: if there is a
vertex in Car(Λ′ ) being the endpoint of two edges dual to Λ′ then one of
these edges must be an internal edge of a divided tile.
e (1) such that its vertices lie in Car(Λ′ ) but e does
(2) There is no edge e in X
′
not lie in Car(Λ ), see Figure 6 b).
c1 v
c2
e
a)
b)
Figure 6. Two types of hypergraphs osculations.
Proof. (1) Suppose, on the contrary, that such a point v exists. Then let e1 , e2 be
the two edges, ending in v that are dual to the hypergraph segment Λ′ and that are
none of them is an internal edge of a divided tile. Let D be a diagram collared by
˜ ≤ |D| + 2. Therefore, by
Λ′ and an edge-path {e1 , e2 }. Such diagram satisfies |∂D|
˜
Theorem 2.5 we obtain |D| ≤ 3. Hence |∂D| ≤ 5, and combining this with Lemma
˜ ≤ 4. This by Theorem 2.5 gives us that that |D| ≤ 2. A
3.10 we get that |∂D|
diagram consisting of two 2-cells and having the generalized boundary length at
most 4 must be a pair of strongly adjacent 2-cells. This ends the proof in the case
c). If Λ′ is red or blue hypergraph we need to provide further argument. Note,
that both red and blue hypergraph join the antipodal midpoints of bundary edges
of every tile. Hence, there are no two edges that are dual do Λ′ , have common end
and non of them is an internal edge of a divided tile. This ends the proof in cases
a) and b).
Therefore there is a blue 2-cell and a red 2-cell in the carrier of Λ′ , which contradicts assumptions a), b) and c).
(2) Let v1 and v2 be the ends of the edge e. For i = 1, 2 let ei be the edge
dual to Λ′ ending in vi that is not an internal edge of a divided tile. Let E be a
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
19
diagram with horns collared by Λ′ and the edge-path {e1 , e, e2 }. As previously, E
satisfies |∂E| ≤ |E| + 2. Therefore by 2.5 |E| ≤ 3, so |∂E| ≤ 5. By Lemma 3.10 we
obtain that in fact |∂E| ≤ 4, which, by previous observation, means that |E| ≤ 2.
A diagram with two 2-cells and the boundary length equal 4 must be a pair of
strongly adjacent 2-cells. In a diagram which is a pair of strongly adjacent 2-cells
there is no edge which does not lie in Car(Λ) but its endpoints do. This end the
proof in cases a), b) and c).
e (1)
Lemma 4.9. Let Λ1 be a hypergraph segment and γ be a geodesic segment in X
that intersects Λ1 in two points, which are the endpoints of γ. Let Λ2 6= Λ1 be a
e intersecting γ in point x.
hypergraph in X
(1) Λ1 and Λ2 pass through a common 2-cell cx , that is Car(Λ1 )∩Car(Λ2 ) ⊇ cx .
(2) If moreover Λ2 intersects γ in two different points x and y that do not lie
in the boundary of the same 2-cell of Car(Λ1 ) then there are two different
2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
Proof. Part (1) Let e be an edge of γ dual to Λ2 . There are two possibilities
• The edge e lies in the boundary of a 2-cell c ∈ Car(Λ1 ). In that case Λ2 is
dual to the boundary edge of c, so cx := c belongs to Car(Λ2 ). See Figure
7 a).
• The edge e does not lie in the boundary edge of a 2-cell c ∈ Car(Λ1 ). Since
γ is a geodesic edge-path, by Lemma 4.5 combined with Lemma 4.8 we
know that e lies in the boundary of a house diagram presented in Figure 7
b). It is clear from the Figure 7 b) that cx ∈ Car(Λ1 ) ∩ Car(Λ2 ).
Part (2). If x and y lie in the boundaries of distinct 2-cells cx and cy belonging
to Car(Λ) then it is clear that cx and cy both lie in Car(Λ1 ) ∩ Car(Λ2 ) (see Figure
7.
Consider the case where x lies in the boundary of a 2-cell c1 in Car(Λ1 ) and
y do not. Considering a hypergraph Λ1 dual to γ passing through y we will find
(as in part (1) ) a regular 2-cell c2 that lies in Car(Λ1 ) ∩ Car(Λ2 ) and that there
is no edge of γ in the boundary of c2 . Hence c2 6= c1 and c1 and c2 both lie in
Car(Λ1 ) ∩ Car(Λ2 ).
The last case to consider is when neither x nor y lie in the boundary of Car(Λ1 ).
First, note that x and y cannot lie in the roof of the same house diagram since
then there would be a self intersection of Λ2 (see Figure 7 b) ) which contardicts
Theorem 3.7. Hence, x and y lie in the roofs of different house diagrams, which
means that one 2-cell from each of those diagrams belongs to Car(Λ1 ) ∩ Car(Λ2 ).
This means that there are at least two different 2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
e Let γ be a geodesic edge-path in the
Lemma 4.10. Let Λ be a hypergraph in X.
e Suppose that γ intersects Λ in two consecutive points x and y. Let
1-skeleton of X.
Λxy be the segment of Λ joining x and y. Then:
(1) if Λ is a red hypergraph, there is an isolated red 2-cell c of Λxy ,
(2) if Λ is a blue hypergraph, there is an isolated blue 2-cell c of Λxy ,
(3) if Λ is a standard hypergraph, there is a divided tile of Λxy , such that the
none of its internal edges belong to γ.
Proof. The proof relies on the idea, that if a geodesic crosses a hypergraph two
times it must be worthwile in terms of distance. If the hypergraph does not “turn”
20
TOMASZ ODRZYGÓŹDŹ
cx
cx
Λ1
γ
e
Λ2
γ
Λ1
x
y
x
e
a)
b)
Figure 7. Intersections of hypergraphs Λ1 and Λ2 .
there is no reason for a geodesic to cross it two times. A colored hypergraph can
“turn” only if there is an isolated 2-cell of the segment of hypergraph and a standard
hypergraph “effectively turns” when meeting a pair of strongly adjacent 2-cells. Let
now state a precise argument.
First, consider the case where Λ is a red hypergraph. Suppose, on the contrary,
that there is no isolated red 2-cell of Λxy . The the carrier of Λxy consists only
of tiles (regular 2-cells or divided tiles) and every edge of Λxy joins an antipodal
midpoints of boundary edges of every tile in Car(Λ′ ) i.e. the carrier of Λ′ has the
shape illustrated in Figure 8.
γ
x′
x
x′′
Λ′
...
y′
y
y ′′
k
Figure 8. The diagram collared by Λxy and γ.
e containing x, and suppose that
Let x′ and x′′ be the two ends of the edge of X
′
′′
e
x lies on γ between x and y. Let y and y be the two ends of the edge of X
′
′
containing y, and suppose that y lies on γ between x and y. Let γ0 be the subpath
of γ joining x′ and y ′ (see Figure 8). Let V be the set of vertices of γ ′ . Define
′
V ′ = {v ∈ V |there is at least one edge of γ ′ ending in v and not belonging to Car(Λ′ )}.
For each pair s, t of two consecutive vertices in V ′ consider the subsegment of
′
′
γ joining s and t and denote it by γst
. By Lemma 4.8 part (2) we obtain that γst
either
(1) lies in the boundary of the carrier of Λ, or
(2) has a length at least 2.
′
In the latter case, we know that γst
is a roof of a house diagram. Therefore
′
without change of the total length of γ ′ we can replace γst
with an edge-path of
length 2, that lies in the boundary of Car(Λxy ) and does not cross Λxy .
Hence, we can modify γ ′ to a path having the same length such that all its edges
lie in the boundary of Car(Λxy ). From now γ ′ denotes modified path. For every
′
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
21
vertex v of γ ′ denote by ev the edge dual to Λ′ ending in v that is not an internal
edge of a divided tile (this definition is unambiguous according to Lemma 4.8 part
(1) ). We will prove now that the length d of γ ′ equals the number k of tiles of
Λxy . Every edge of γ ′ lies in the boundary of exactly one tile so k ≥ d. Suppose,
on the contrary, that k > d. This means that there must be a vertex of γ ′ that is
a common vertex of more than two tiles. But in that case there are at least two
edges dual to Λxy that are not internal edges of a divided tile. This contradicts
e joining x′′
Lemma 4.8 part 1). Hence k = d. Consider now the edge-path γ ′′ in X
′′
and y and goes along the boundary of Car(Λxy ). The length of this edge-path is
not greater then k since every tile of Λxy shares at most one boundary edge with
γ ′′ . Hence there exists an edge-path joining x′′ and y ′′ of length k. Note that the
segment of γ joining x′′ and y ′′ has length k + 2. This contradicts the fact that γ
is a geodesic.
If Λ′ is a blue hypergraph the proof is analogous.
Consider now the case, where Λ is a standard hypergraph. In that case we can
provide an analogous argument to prove that there must be a divided tile of Λxy .
We only need to prove that none of the internal edges of a divided tile belong to γ.
Suppose, on the contrary, that this is the case.
By Lemma 4.4 there exists a planar diagram D collared by Λxy and γ. By
definiton of a diagram collared by a hypergraph and path γ cannot contain any
internal edge of D which ends the proof.
The definition of a 2-collared diagram in case of standard hypergraphs can be
found in [OW11, Subsection 3.3]. In a nutshell this is a diagram collared by two
hypergraphs (see Definition [OW11, Lemma 3.17]). Let us state this definition for
a case of general hypergraphs.
Definition 4.11 (2-collared diagram). Let λ1 and λ2 be two hypergraph segments.
Let D be a van Kampen diagram with the following additional properties:
(1)
(2)
(3)
(4)
There are two external 2-cells of D called corners
λ1 and λ2 pass only through external 2-cells of D
every external edge of D belongs to Car(λ1 ) ∪ Car(λ2 )
corners are the only 2-cells of D containing the edges of both hypergraph
segments λ1 and λ2 .
We call D 2-collared diagram (collared by λ1 and λ2 ).
Lemma 4.12 (reformulation of [OW11, Theorem 3.12]). Suppose, Λ1 and Λ2 are
e and that they intersect at least
distinct hypergraphs that are embedded trees in X,
twice. Let c be a common 2-cell of Car(Λ1 ) and Car(Λ2 ) Then there exists a 2collared diagram collared by segments Λ1 and Λ2 . Moreover we can choose c to be
one of its corners.
There is a definition of a 2-collared diagram in the beginning of [OW11, Section
3.11]. However this is the special case of the general definition of a diagram collared
by hypergraphs and paths that was stated for a general polygonal complex and for
the standard hypergraphs. Definition 4.11 is a modification of it: we use it for l = 4
and for general hypergraphs, but the fact that the hypergraph joins the antipodal
e is not necessary to provide the proof of Lemma 4.12, in
midpoints of edges in X
fact the proof can be provided, as well, in the case of colored hypergraphs.
22
TOMASZ ODRZYGÓŹDŹ
Figure 9. 2-collared diagram. Collaring segments are indicated
with thick lines.
e is a pair of strongly adjacent
Lemma 4.13. W.o.p. every 2-collared diagram in X
2-cells.
Proof. Let D be a 2-collared diagram (with horns) collared by hypergraphs Λ1 and
Λ2 . Let k1 be the length of the collaring segment of Λ1 and k2 be the length of
the collaring segment of Λ2 . Let h denote the number of horns in D. Each pair
of strongly adjacent 2-cells gives a contribution to the generalized boundary length
˜ ≤ k1 + k2 + h. There are two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ), so
equal 2, hence |∂D|
3
|D| ≥ k1 + k2 + h − 2. Hence, by Theorem 2.5 for the density d < 10
we obtain
that w.o.p.:
˜ > 8 |D| > 8 (k1 + k2 + h − 2).
k1 + k2 + h ≥ |∂D|
5
5
˜ is even. Therefore
Hence k1 + k2 + h ≤ 5. By Lemma 3.10 we know that |∂D|
˜
|∂D| ≤ 4 and by (4.4) we obtain |D| ≤ 2. Hence, D must be a diagram consisting
of two strongly adjacent 2-cells.
(4.4)
Lemma 4.14. The following statement holds w.o.p.: Let Λ1 and Λ2 be two hypere Suppose that Λ1 and Λ2 intersect transversally in a 2-cell c, meaning
graphs in X.
that Car(Λ1 ) ∩ Car(Λ2 ) contains a regular 2-cell c and that Λ1 ∩ c 6= Λ2 ∩ c. Then Λ
and Λ′ intersect only once. Moreover c is the only one 2-cell in Car(Λ1 ) ∩ Car(Λ2 ).
Proof. Suppose, on the contrary, that there is another point of intersection. Then
by Lemma 4.12 there is a 2-collared diagram with horns D collared by Λ1 and Λ2
and containing c. By Lemma 4.13 we know that every 2-cell of D is distinguished,
so this is a contradiction with the assumption that c is regular.
Now suppose, on the contrary, that there is a 2-cell d ∈ Car(Λ1 ) ∩ Car(Λ2 ) such
that d 6= c. We know that there is only one point of intersection of Λ1 and Λ2 , so
the only possibility is that d is a distinguished 2-cell of some color, and Λ1 and Λ2
are both hypergraphs of this color (see Figure 10).
But then Λ1 and Λ2 intersect in the middle of the 2-cell strongly adjacent to d,
so there are two points of intersection of Λ1 and Λ2 , which is a contradiction.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
Λ1
23
c
Λ2
d
Figure 10. Two 2-cells in Car(Λ1 ) ∩ Car(Λ2 ).
e (1) . Let e be an edge in γ, and
Lemma 4.15. Let γ be a geodesic edge-path in X
denote by s its midpoint. Then either:
(a) There is a hypergraph intersecting γ only in the point s.
(b) There is a hypergraph Λ such that its segment Λsx starting in s intersects γ
in two consecutive points: s and x such that there are at least two not sharing
an edge distinguished 2-cells in Λsx and Λ does not intersect γ anywhere else
between points s and x.
Proof. If one of the hypergraphs (red, blue or standard) dual to the edge e intersects γ only once, the statement is satisfied. Hence, consider the case where all
hypergraphs dual to the edge e intersect γ at least twice. Denote by x, y and z the
e (1) ), in which three hypergraphs
nearest points to s (in the edge-path metric in X
x
y
z
Λ , Λ and Λ dual to the edge e intersect γ. A priori, it may happen that some of
these points are equal. Without loss of generality, we can assume that x and y lie
in the same connected component of γ − s and that x is at least as far from s as y.
Now, we will prove that y 6= x. Suppose, on the contrary, that x = y. This
means that every time segments Λsx and Λsy split, they also rejoin at some point,
since they end in the same point. Every situation where Λsx and Λsy split an rejoin
gives us a 2-collared diagram collared by a subsegments of Λsx and Λsy . By Lemma
4.14 every 2-collared diagram is a pair of strongly adjacent 2-cells. This means that
if Λsx and Λsy split they rejoin in the next 2-cell of the common carrier, see Figure
11. This means that Car(Λsx ) = Car(Λsy ) and that distinguished 2-cells Car(Λsx )
occur only in strongly adjacent pairs.
blue
2-cell
red 2-cell
Λred
Λblue
Figure 11. The only possible way of splitting and rejoining of Λx
and Λy .
One of the hypergraphs Λx and Λy is red or blue, so by Lemma 4.10 in the carrier
of Λsx exists an isolated distinguished 2-cell, so this is a contradiction. Therefore
y 6= x.
24
TOMASZ ODRZYGÓŹDŹ
Therefore, y lies on a geodesic edge-path that intersects Λsx twice. Hence, by
Lemma 4.5 we know that y lies in the boundary of the carrier of Λsx (see Figure
12 a) or y lies the boundary of the house diagram F presented in Figure 12 b).
c
c1
Λy
c2
Λx
γsx
Λx
y
γsx
y
F
a)
b)
Figure 12. Two possible locations of y.
The hypergraphs Λx and Λy cannot intersect transversely in a regular 2-cell c1 ,
since otherwise by Lemma 4.14 they would intersect only once in the middle of
c1 , and we know that they intersect also in s. Hence y lies in the boundary of a
distinguished 2-cell cy ∈ Car(Λsx ). Therefore the carriers of the segments Λsx and
Λsy share a common distinguished 2-cell cy .
Without loss of generality, we can suppose that cy is red (if it is blue the argument
is analogous).
If Λx or Λy is blue then, according to Lemma 4.10, its carrier contains an isolated
blue 2-cell cb , so cb does not share an edge with cy . In that case the carrier of Λx
or Λy contains a red 2-cell cy and some non-adjacent by an edge to it blue 2-cell cb ,
so we are done.
The only cases left to consider are:
(1) Λy is a red hypergraph and Λx is a standard hypergraph
(2) Λx is a red hypergraph and Λy is a standard hypergraph.
First consider the situation 1). If there are at least two red 2-cells in the carrier
of Λsx , we are done. Hence, we can suppose that cy is the only isolated red 2-cell
in the carrier of Λsx . In that case Car(Λsx ) has the shape presented in Figure 13.
We know that y lies in the boundary of cy and y does not belong to Λsx . Hence
y = y1 or y = y2 . Recall that points s, x and y lie on γ. If y = y2 then there is
a segment of standard hypergraph bounded by s and y intersecting γ twice at its
ends, such that there is only one distinguished 2-cell in its carrier. This contradicts
Lemma 4.10 (3). If y = y2 we obtain analogous contradiction. Hence there must
be at least one more isolated red 2-cell in the carrier of Λsx , so we are done, since
two red 2-cells cannot share an edge.
Now consider situation 2), that is Λx is a standard hypergraph and there is only
one divided tile of Λsx and y belongs to this divided tile. In that case Car(Λsx ) has
the shape presented in Figure 14. We know that y lies in the boundary of cy but
y does not belong to Λsx . Moreover by 4.10 part (3) we know that y does not lie
on an internal edge of a divided tile. Hence y = y3 or y = y4 . If y = y3 then there
is a segment of a red hypegraph bounded by x and y intersecting γ twice with no
isolated red 2-cell in its carrier. This contradicts Lemma 4.10 part (1). If y = y4
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
25
y1
s
Λsx
...
y2
x
Figure 13. The carrier of Λsx in case where Λx is red.
y3
s
Λsx
...
y4
x
Figure 14. The carrier of Λsx in case where Λx is standard hypergraph.
we obtain the contradiction analogously. Hence, there must be at least two not
sharing an edge 2-cells in the carrier of Λsx .
e of length at
Theorem 4.16. Let γ be a geodesic edge-path in the 1-skeleton of X
least 21. Let E := {e−7 , e−6 , . . . , e0 , . . . , e7 } be the set of 15 consecutive edges of
e intersecting γ exactly once and such that this
γ. Then there is a hypergraph in X
intersection is the midpoint of one of the edges in E.
Proof. Denote the midpoint of the edge e0 by s. If one of the hypergraphs dual to
the edge e0 intersects γ only once, we are done. If not, by Lemma 4.10 we know
that there exists a hypergraph Λ, such that its segment Λsx intersects γ in two
consecutive points of γ: s and x and that the segment Λsx contains at least two
not sharing an edge distinguished 2-cells: ⌈1 and ⌈2 . We will consider two cases:
(1) There are at least seven 2-cells in Car(Λsx )
(2) There are at most six 2-cells in Car(Λsx ).
We will use slightly different methods to deal with each of these two cases.
4.1. Case 1: There are at least seven 2-cells in Car(Λsx ). Let c1 , c2 , c3 be
the 3-th, 4-th and 5-th 2-cells in Λsx respectively counted from s. According to
Lemma 4.2 at least one of them must be a regular 2-cell, call it c. Denote by Λc
26
TOMASZ ODRZYGÓŹDŹ
the standard hypergraph passing through 2-cell c and dual to Λ. By Lemma 4.14
Λc and Λ intersect only once. We will prove two assertions:
(a) Λc intersects some edge in E.
(b) Λc intersects γ exactly once.
We start with the proof of assertion (a). Let us resolve where is the point of
intersection of γ and Λc . If there is an edge ec of γ lying in the boundary of c then
Λc and γ intersect in the midpoint of ec . In this case denote by xc the midpoint of
e (1) that goes along the
ec , see Figure 15 a). In that case there is an edge-path in X
boundary of Car(Λ) of length at most 6, because there are at most five 2-cells in
Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 6.
If there is no edge of γ lying in the boundary of c then, by Lemma 4.5 we know
that the 2-cell c lies in the house diagram presented in Figure 15 b) so Λc intersects
the edge ec from Figure 15 b). In that case we denote by the xc the midpoint of
e (1) that goes along the boundary of
ec . In this situation, there is an edge-path in X
Car(Λ) and a boundary of a house diagram containing c of length at most 7, because
there are at most five 2-cells in Car(Λsx ) between s and c. Hence dγ (s, xc ) ≤ 7.
This ends the proof of assertion (a).
c
c
Λc
Λc
Λ
γ
Λ
ec xc
γ
xc
ec
a)
b)
Figure 15. Two possible ways of intersection of Λc and γ
Now we will prove assertion (b). By Lemma 3.15 there are exactly two cone − Λ. Hence, we can split Λc into two parts:
nected components of X
e − Λ containing
• Λ+ which is the intersection of Λc with the component of X
xc
e − Λ not con• Λ− which is the intersection of Λc with the component of X
taining xc .
We will show that Λ− does not intersect γ and that Λ+ intersects γ only once
(in the point xc ).
Firstly, consider Λ+ . Suppose, on the contrary, that Λ+ intersects γ in some
point yc 6= xc . Suppose that yc is the nearest among what point to xc in the metric
dγ . Points xc and yc cannot both lie in the boundary of c since there is at most
one common edge of c and γ.
We will consider three cases:
(1) yc belongs to the segment γsx of γ bounded by s and x, , see Figure 16 (1)
(2) yc does not belong to γsx and points xc and yc lie in the different connected
e − Λ, , see Figure 16 (2)
components of X
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
27
(3) yc does not belong to γsx and points xc and yc lie in the same connected
e − Λ. , see Figure 16 (3)
component of X
Λ−
Λ
(1)
γ
s
c
yc
xc
x
Λ+
Λ−
Λ
(2)
γ
c
s
xc
x
yc
Λ+
Λ−
Λ
(3)
γ
s
c
z2
xc
z1
yc
Λ+
Figure 16. Intersections of Λ+ and γ.
1)If yc belongs to the segment γsx of γ bounded by s and x. Then by Lemma
4.9 applied to Λ1 = Λ and Λ2 = Λc we obtain that there are two common 2-cells of
the carriers of Λ and Λc , which is a contradiction with Lemma 4.14.
e − Λ then
2) If points xc and yc lie in the different connected components of X
there is an intersection of Λ+ which contradicts the fact that Λ and Λc intersect
only once ( Lemma 4.14).
e − Λ then Λ
3) If points xc and yc lie in the same connected component of X
intersects γsx at least twice in some points z1 , z2 .
If this two points do not lie in the boundary of the same 2-cell c′ in Car(Λc ) then
′
c 6= c. By Lemma 4.9 applied for Λ1 = Λc and Λ2 = Λ we obtain that there are
two different 2-cells in Car(Λ) ∩ Car(Λc ), which contradicts Lemma 4.14. If z1 and
z2 lie in the boundary of the same 2-cell c′ in Car(Λc ) then we know, that c′ 6= c,
since c shares at most one edge with γ. Hence, c′ , c ∈ Car(Λc ) ∩ Car(Λ), which
again contardicts 4.14. Hence, we proved that Λ+ does not intersect γ.
Let us now consider Λ− . Suppose, on the contrary, that Λ− intersects γ. Let tc
be the point of the intersection of Λ− and γ, which is the nearest to the point xc
28
TOMASZ ODRZYGÓŹDŹ
in the edge-path metric on Λ− (see Figure 17). Note, that tc lies in the connected
e − Λ not containing xc , since otherwise there will be a second
component of X
intersection of Λ and Λc which is not allowed, according to Lemma 4.14.
Λ−
Λ
γ
tc
c
s
xc
x
Λ+
Figure 17. Intersection of Λ− and γ
Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . One
of the points {x, s} lies on γ between points xc and tc . Suppose first that this point
is s.
Since s lies on the geodesic segment, that intersects Λc twice, by Lemma 4.5 we
have two possibilities: s lies on the boundary of the 2-cell c (see Figure 18 a) ) or
s lies in the diagram presented in Figure 18 b).
c
c
Λ
Λ
Λc
γ
Λc
x
γ
a)
x
b)
Figure 18. Two possible locations of x
Note, that in both cases the segment of Λ joining the point s and the 2-cell
c consists of at most one 2-cell, which, if occurs, is a regular 2-cell. Remember
that between s and x in Car(Λ) was at least seven 2-cells and c is 3-rd, 4-th or
5-th of them. Hence there must be a least two 2-cells between c and s. This is a
contradiction, so Λ− does not intersect γ.
If x lies on γ between xc and tc the reasoning is analogous. This ends the proof
in Case 1.
CUBULATING RANDOM GROUPS IN THE SQUARE MODEL
29
4.2. Case 2: There are at most six 2-cells in Car(Λsx ). Now let us consider
the case, where there are at most six 2-cells in the carrier of Λsx . Let c be any
regular 2-cell in the carrier of Λsx that lies between ⌈1 and ⌈2 (recall that ⌈1 and
⌈2 were two not sharing an edge distinguished 2-cells in the segment Λsx ). Again,
we denote by Λc the hypergraph passing through c and dual to Λsx . Analogously
we state two assertions:
(a) Λc intersects some edge of the set E.
(b) Λc intersects γ exactly once.
To prove assertions (a) and (b) we first define the point xc as in Case 1.
Proof of assertion (a) is analogous as in Case 1.
Now, consider assertion (b). Again, we split Λc into two connected components:
e − Λ containing
• Λ+ which is the intersection of Λc with the component of X
xc
e − Λ not con• Λ− which is the intersection of Λc with the component of X
taining xc .
To prove that Λ+ intersects γ only once we can repeat the argument from Case
1.
Consider now Λ− . Suppose, on the contrary that Λ− intersects γ in a point
e − Λ not containing xc , so
tc . Note that tc lies in the connected component of X
the geodesic segment of γ bounded by xc and tc contains x or s. Without loss of
generality we can assume that this geodesic segment contains x.
Let Λ′− be the hypergraph segment of Λc bounded by the points xc and tc . The
same reasoning, as in previous case, shows that there is at most one 2-cell in Car(Λ)
between c and x, which, if occurs, is a regular 2-cell. This is a contraction since c
lies in Car(Λ) between two distinguished 2-cells, so there must be a distinguished
2-cell in Car(Λ) between c and x.
Thorem 4.1 is an immediate consequence of Theorem 4.16.
References
[Ago13] Ian Agol, The virtual Haken conjecture, Doc. Math. 18 (2013), 1045–1087. With an
appendix by Agol, Daniel Groves, and Jason Manning.
[KK13] Marcin Kotowski and Michał Kotowski, Random groups and property (T ): Żuk’s theorem revisited, J. Lond. Math. Soc. (2) 88 (2013), no. 2, 396–416.
[CMV04] Pierre-Alain Cherix, Florian Martin, and Alain Valette, Spaces with measured walls,
the Haagerup property and property (T), Ergodic Theory Dynam. Systems 24 (2004),
no. 6, 1895–1908.
[CN05] Indira Chatterji and Graham Niblo, From wall spaces to CAT(0) cube complexes, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 875–885.
[Oll05] Yann Ollivier, A January 2005 invitation to random groups, Ensaios Matemáticos
[Mathematical Surveys], vol. 10, Sociedade Brasileira de Matemática, Rio de Janeiro,
2005.
, Some small cancellation properties of random groups, Internat. J. Algebra
[Oll07]
Comput. 17 (2007), no. 1, 37–51.
[Gro93] M. Gromov, Asymptotic invariants of infinite groups, Geometric group theory, Vol. 2
(Sussex, 1991), London Math. Soc. Lecture Note Ser., vol. 182, Cambridge Univ. Press,
Cambridge, 1993, pp. 1–295.
[Oll07] Yann Ollivier, Some small cancellation properties of random groups, Internat. J. Algebra Comput. 17 (2007), no. 1, 37–51.
30
TOMASZ ODRZYGÓŹDŹ
[Oll04] Y. Ollivier, Sharp phase transition theorems for hyperbolicity of random groups, Geom.
Funct. Anal. 14 (2004), no. 3, 595–679.
[OW11] Yann Ollivier and Daniel T. Wise, Cubulating random groups at density less than 1/6,
Trans. Amer. Math. Soc. 363 (2011), no. 9, 4701–4733.
[MP15] John M. Mackay and Piotr Przytycki, Balanced walls for random groups, Michigan
Math. J. 64 (2015), no. 2, 397–419.
[Odr16] Tomasz Odrzygóźdź, The square model for random groups, Colloq. Math. 142 (2016).
, Nonplanar isoperimetric inequality for random groups, Note, aviable at:
[Odr14]
http://students.mimuw.edu.pl/∼to277393/web/files/nonplanar.pdf (2014).
Institute of Mathematics, Polish Academy of Sciences, Warsaw, Śniadeckich 8
E-mail address: [email protected]
| 4 |
Average Age of Information with Hybrid ARQ
under a Resource Constraint
Elif Tuğçe Ceran, Deniz Gündüz, and András György
arXiv:1710.04971v1 [cs.IT] 1 Oct 2017
Department of Electrical and Electronic Engineering
Imperial College London
Email: {e.ceran14, d.gunduz, a.gyorgy}@imperial.ac.uk
Abstract—Scheduling of the transmission of status updates
over an error-prone communication channel is studied in order
to minimize the long-term average age of information (AoI) at
the destination, under an average resource constraint at the
source node, which limits the average number of transmissions.
After each transmission, the source receives an instantaneous
ACK/NACK feedback, and decides on the next update, without a
priori knowledge on the success of the future transmissions. The
optimal scheduling policy is studied under different feedback
mechanisms; in particular, standard automatic repeat request
(ARQ) and hybrid ARQ (HARQ) protocols are considered.
Average-cost reinforcement learning algorithms are proposed
when the error probabilities for the HARQ system are unknown.
I. I NTRODUCTION
We consider a source node which continually communicates the most up-to-date status packets to the destination. In
particular, we are interested in the age of information (AoI)
[1], [2] at the destination, for a system in which the source
node samples an underlying time-varying process and sends
the sample values over an imperfect link which introduces
delays. Our goal is to minimize the average AoI taking into
account packet retransmissions. Most of the prior work on AoI
either do not consider retransmissions, or consider a standard
automatic repeat request (ARQ) protocol, where, if a packet
cannot be decoded, it is retransmitted until correct decoding,
up to a maximum number of retransmissions (e.g., [3], [4]).
Here, we analyze the AoI for both the standard ARQ and
hybrid ARQ (HARQ) protocols. In the latter, the receiver
combines information from all previous transmission attempts
of a packet in order to increase the success probability of
decoding after each retransmission [5].
To address the trade-off between the success probability and
the freshness of the status update to be transmitted, we develop
scheduling policies to minimize the expected average AoI under an average transmission-rate constraint. This constraint is
motivated by the fact that sensors sending status updates have
usually limited energy supplies (e.g., are powered via energy
harvesting); hence, they cannot afford to send an unlimited
number of updates, or increase the signal-to-noise-ratio in the
transmission. First, we assume that the success probability
before each transmission attempt is known (which depends on
the number of previous unsuccessful transmissions); hence, the
source can judiciously decide when to retransmit, and when to
discard failed information and send a fresh update. Then, we
consider transmitting status updates over an unknown channel,
Process H(t)
ACK/ NACK feedback
Sample of the process
Source
Error-prone
channel
Destination
Figure 1. System model of a status update system over an error-prone pointto-point link in the presence of ACK/NACK feedback from the destination.
in which the success probabilities of transmission attempts are
not known a priori, and must be learned in an online fashion.
The main contributions of this paper are outlined as follows:
• An long-term average resource constraint is imposed
on the transmitter, which limits the average number of
transmissions.
• Both retransmissions and pre-emption following a failed
transmission are considered, corresponding, respectively,
to the HARQ and ARQ protocols.
• The optimal preemptive transmission policy for the standard ARQ protocol is shown to be threshold-type, and
the optimal threshold value is derived in closed-form.
• An average-cost reinforcement learning (RL) algorithm is
proposed to learn the optimal scheduling decisions when
the transmission success probabilities are unknown.
• Extensive simulations are conducted in order to show the
effect of feedback, resource constraint and ARQ/ HARQ
error correction algorithms on the data freshness.
A. Related Work
Earlier work on AoI considered queue-based models, in
which the status updates arrive at the source node randomly
as a memoryless Poisson process, and are stored in a buffer
before being transmitted to the destination [1], [2], [6]. Instead,
in this paper, we follow the so-called generate-at-will model
that has been recently considered in [4] and [7], in which the
status updates of the underlying process of interest can be
sampled and generated at any time by the source.
A constant packet failure probability for status update
systems is investigated for the first time in [3], but this work
focuses on an M/M/1 queuing model, and no feedback is
considered for retransmissions. The paper [4] considers broadcasting of status updates to multiple clients over an unreliable
broadcast channel. However, this paper only considers index
policies, which update the information at every time slot, since
no constraint is imposed on the number of updates.
Optimizing the scheduling decisions in an AoI system is
also investigated in [7], focusing on multiple receivers, which
leads to a different set of constraints than ours, as we limit the
average number of transmissions to a single receiver. The AoI
in the presence of HARQ is modeled through an M/G/1 queue
in [8]; however, no resource constraint is taken into account,
and the status update arrivals are assumed to be memoryless
and random, in contrast to our work, which considers general
and controlled status update generation.
The rest of the paper is organized as follows. In Section II,
the system model is presented, and the problem of minimizing
the average AoI with HARQ under a resource constraint is
formulated as a constrained Markov decision process (CMDP).
In Section III, a primal-dual algorithm is proposed to solve this
CMDP. Then, minimizing the AoI under the standard ARQ
protocol is investigated in Section IV, and a computationally
efficient solution is proposed. Section V introduces a reinforcement learning algorithm to minimize AoI in an unknown
environment. Simulation results are presented in Section VI,
and the paper is concluded in Section VII.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
We consider a slotted status update system over an errorprone wireless link. The source monitors an underlying timevarying process, for which it is able to generate a status
update at the beginning of each time slot; this is known as the
generate-at-will model [4]. A transmission attempt of a status
update takes constant time, which is assumed to be equal to
the duration of one time slot.
We assume that the channel state changes randomly from
one time slot to the next in an independent and identically
distributed fashion. We further assume the availability of errorand delay-free single-bit feedback from the destination to
the source node. Successful reception of a status update is
acknowledged by an ACK signal, while a NACK signal is
sent in case of a failure. In the classical ARQ protocol, a
packet is retransmitted after each NACK feedback, until it
is successfully decoded, and the received signal is discarded
after each failed transmission attempt. However, in the AoI
framework there is no point in retransmitting a failed out-ofdate status packet if it has the same error probability with
a fresh status update. Hence, the source always removes a
failed status signal, and transmits a fresh status update (preemption). On the other hand, in the HARQ protocol, signals
from all previous transmission attempts are combined for
decoding; and therefore, the probability of error decreases with
every retransmission. In general, the error probability of each
retransmission attempt depends on the particular combining
technique used, as well as the channel conditions [5].
The AoI is defined as the time elapsed since the most upto-date packet at the destination is generated. Assume that the
most up-to-date packet at the destination at time t has a time
stamp of generation U (t), then the AoI at time t, denoted by
aging due to erronous transmission
aging due to resource constraint
minimum AoI level
t
at
i
i
n
x
x
n
x
i
n
i
i
i
n
δt
rt
1
2
3
4
5
3
4
2
3
1
1
2
3
0
0
0
1
2
0
1
0
0
0
0
0
0
Feedback
NACK NACK ACK NACK ACK
ACK
Figure 2. Illustration of the AoI in a slotted status update system with HARQ.
δt , is defined as: δt , t−U (t). Therefore, the AoI increases by
one when a transmission fails, while it decreases to one (or, to
the number of retransmissions in the case of HARQ) when a
status update is successfully decoded. The system model and
the evolution of AoI for a slotted status update system are
illustrated in Figures 1 and 2, respectively.
The probability of error after r retransmissions, denoted by
g(r), depends only on r, and the particular HARQ scheme
used for combining multiple transmission attempts. An empirical method to estimate g(r) is presented in [9]. As in
any reasonable HARQ strategy, g(r) is non increasing in
the number of retransmissions r, i.e., g(r1 ) ≥ g(r2 ) for all
r1 ≤ r2 . To simplify the analysis, we assume that there is a
maximum number of retransmissions rmax , and a packet is
assumed to be successfully decoded after rmax transmissions,
i.e., g(r) = 0, for all r ≥ rmax .
Let δt ∈ Z+ denote the AoI at time slot t, and rt ∈
{0, . . . , rmax } denote the transmission attempt number. We
define the state vector at time slot the t as st , (δt , rt ). At
each time slot, the source node takes one of the three possible
actions, denoted by a ∈ A, where A = {i, n, x}. It can i)
remain idle (a = i); ii) generate and transmit a new status
update packet (a = n); or, iii) retransmit the previously failed
packet (a = x).
The state transitions can be summarized as follows: The
next state (δt+1 , rt+1 ) is determined stochastically depending
on action at and the current state (δt , rt ):
Pr(δt+1 = δt + 1, rt+1 = rt |at = i, δt , rt ) = 1 (1a)
Pr(δt+1 = δt + 1, rt+1 = 1|at = n, δt , rt ) = g(0)
(1b)
Pr(δt+1 = 1, rt+1 = 0|at = n, δt , rt ) = 1−g(0) (1c)
Pr(δt+1 = δt + 1, rt+1 = rt + 1|at = x, δt , rt ) = g(rt )
(1d)
Pr(δt+1 = rt + 1, rt+1 = 0|at = x, δt , rt ) = 1−g(rt ) (1e)
and P r(δt+1 , rt+1 |at , δt , rt ) is zero elsewhere.
Note that if there is no resource constraint, remaining idle
for a time slot is not a favorable action since it increases the
AoI by 1. However, continuous transmission is typically not
possible in practice due to energy or interference constraints.
Thus, we impose a constraint on the average number of
transmissions denoted by Cmax .
This leads to the CMDP formulation, defined by the 5tuple {S, A, P, c, d} [10]. A countable set of states (δ, r) ∈ S
and a finite set of actions A = {i, n, x} are already defined.
P contains the transition probabilities outlined in (1). The
instantaneous cost ct at time slot t is equal to age δt , and
we use dt as the transmission count, that is, dt = 0 if at = i,
or dt = 1 otherwise.
Policies are represented by π : S × A → [0, 1], π ∈ Π,
where at maps states st ∈ S into actions at ∈ A with some
probability π(at |st ). We will use sπt = (δtπ , rtπ ) and aπt to
denote the states and actions, respectively, induced by policy
π. Let J π (s0 ) denote the infinite horizon average age, and
C π (s0 ) denote the expected average number of transmissions
when policy π is employed with initial state s0 . We restrict our
attention to stationary policies, and denote the set of feasible
policies by ΠF , such that C π ≤ Cmax , ∀π ∈ ΠF .
We can state the CMDP optimization problem as follows,
where Eπ [·] represents the expectation with respect to policy
π and error probabilities g(r):
Problem 1.
" T
#
1 π X π
(2)
δt s0 ,
Minimize J (s0 ) , lim sup E
T →∞ T
t=1
#
" T
1 π X
π
π
s.t. C (s0 ) = lim sup E
1[at 6= i] s0 ≤ Cmax .
T →∞ T
t=1
π
∗
We define a policy π ∗ to be optimal in ΠF if J ∗ , J π ≤
π
J for all π ∈ ΠF . A policy is said to be deterministic if it
chooses an action with certainty at each decision epoch, and
for convenience we denote a deterministic policy simply by π
[10]. Also, without loss of generalization, problem horizon is
assumed to begin when the information at the destination is
up-to-date, i.e. s0 = (1, 0); and s0 will be removed from the
notation for simplicity. We assume throughout this paper that
the MDP is unichain [10], [11], which is intuitive since any
reasonable policy for Problem 1 results in an ergodic Markov
chain.
A. Structure of the Optimal Policy
Note that a deterministic stationary policy which is optimal
for countable-state average-cost MDPs exist and can be found
under certain conditions defined in [11], [12]. However, the
optimal policies for constrained MDPs are no longer limited
to the set of deterministic policies [10], [13], and randomized
stationary policies should be considered. Since the CMDP
defined in Problem 1 has a single global constraint, Corollary 1
below follows immediately from Theorem 4.4 of [10].
Corollary 1. An optimal stationary policy for the CMDP
in Problem 1 exists, and it is a randomized mixture of two
deterministic policies.
The next proposition formalizes the simple observation that
retransmitting a packet immediately after a failed attempt is
better than waiting some slots and then retransmitting (since
the waiting time just increases the age in case of a successful
retransmission, and the age will be the same in case of a
failure). The proof of the proposition is trivial, and hence
omitted.
Proposition 1. There exists an optimal policy for Problem 1
that takes a retransmission action only after a failed transmission event, that is P r(a∗t+1 = x|a∗t = i) = 0.
Based on Proposition 1, the transition for rt in (1) can
be simplified when at = n, and we have rt+1 = 0 instead
of rt+1 = rt . In the next section, the methodology to solve
Problem 1 will be described.
III. P RIMAL -D UAL A LGORITHM
TO
M INIMIZE AO I
To solve the average cost CMDP in Problem 1, we adopt
the Lagrangian primal-dual method [10], [13]. Similar methods have been adopted in other wireless network problems
including [14], [15].
A. Relaxed Unconstrained MDP
Lagrangian relaxation of the constraint with non-negative
multiplier η can be written as:
!
" T
#
T
1 π X π
1 X
π
π
1[at 6= i] ,
Jη = lim
E
δt − η Cmax −
T →∞ T
T t=1
t=1
(3)
and the optimal Jη∗ for a given η is defined as Jη∗ , minπ Jηπ .
Following the methodology proposed in [10], for a constant
η, the above minimization is equivalent to an unconstrained
average-cost MDP, in which the instantaneous overall cost
becomes δt + η 1[aπt ∈ {n, x}].
Then, the problem is to minimize Jη which is the averagecost for the unconstrained problem for a given η. There exits an
optimal stationary deterministic policy, and thus, the optimality
equations can be written. Let h(δ, r) denote the differential
cost (bias) function, and ρ represent the gain, which is an
approximation of the average overall cost; i.e., Jη∗ → ρ [11].
The differential cost function h(δ, r) : S → R is defined
as the difference of the value function V (δ, r) with respect
to an arbitrary but fixed reference state (δ ref , rref ) [11], i.e.
h(δ ref , rref ) = 0, and ∀(δ, r) ∈ S,
h(δ, r) + ρ = min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] ,
a∈{i,n,x}
(4)
′
′
where (δ , r ) denotes the next state when decision a is taken
at state (δ, r) with a transition matrix given in (1. Equations in
(4) are also known as the Bellman optimality equations [11].
For countable S and finite A, there exists a differential cost
function h(δ, r), ∀(δ, r) ∈ S, and a unique gain ρ, which
satisfy the optimality equations in (4). Moreover, for a given
η value the optimal stationary deterministic policy π ∗ (δ, r) is
given by:
πη∗ (δ, r) ∈ arg min δ + η · 1[a 6= i] + Eπ [h(δ ′ , r′ )] . (5)
a∈{i,n,x}
Note that the state space of possible status age values
is possibly countably infinite. In order to write a practical
algorithm that solves the Bellman equations in (4), we truncate
to the state space S N = {1, 2, . . . , N } × {0, 1, . . . , rmax }
which approaches to the original countable state CMDP as
N → ∞ [16], [7]. Under any reasonable policy for Problem 1,
probability of visiting a state with a large age value decreases
exponentially whereas the cost incurred due to a large age is
polynomial, so it is intuitive to truncate to a large N . The
state transition function when at = i, or at ∈ {n, x} but the
transmission fails can be written as δt+1 = ⌊δt + 1⌋N , where
y = ⌊x⌋N implies y = x if x ≤ N , and y = N otherwise;
which provides the finite state space approximation similarly
to [16], [7].
B. Relative Value Iteration
Value iteration (VI) algorithm can be used to solve
countable-state finite-action MDPs [11]. However, for averagecost problems with Bellman equations defined as in (4), value
functions in VI generally do not converge and differences
between successive value iterations approximate to the true
value of Jη∗ . Due to possible large values, it may result
in numerical instability [11]. Therefore, the relative value
iteration (RVI) algorithm [11] is adopted to solve (4). Starting
with an arbitrary but a fixed reference state (δref , rref ), a
single value iteration for the RVI algorithm [11] is given as
follows:
Qn+1 (δ, r, a) ← δ + η · 1[aπ 6= i] + Eπ [hn (δ ′ , r′ )] ,
(6)
Vn+1 (δ, r) ← min(Qn+1 (δ, r, a)),
(7)
hn+1 (δ, r) ← Vn+1 (δ, r) − Vn+1 (δ ref , rref ),
(8)
a
where Qn (δ, r, a), Vn (δ, r) and hn (δ ′ , r′ ) denote the state
action value function, value function and differential value
function for iteration n, respectively.
C. Finding the Approximate Lagrange Parameter η ∗ and
Randomization
We start with an initial parameter η0 for m = 0, and at
each iteration, run the RVI algorithm and compute ηm+1 as
follows:
ηm+1 ← ηm + α(Cηm − Cmax ).
(9)
We continue iteration until convergence, and find the optimal
parameter η ∗ .
Note that, it is not straightforward to obtain two different
η values for two different deterministic policies, such that the
randomization between the two results in an optimal stochastic
policy. Thus, a heuristic method will be adopted: after obtaining η ∗ , it can be perturbed by small ξ, and the optimal policies
for Lagrange parameters η ∗ + ξ and η ∗ − ξ are computed
and randomized with probabilities µ and 1 − µ, respectively.
The randomization probability µ can be computed using the
average power consumptions of Cη∗ +ξ and Cη∗ −ξ , such that
µCη∗ +ξ + (1 − µ)Cη∗ −ξ = Cmax . The average transmission
bη∗ +ξ , C
bη∗ −ξ can be computed by empirical estimation,
rates C
and randomization probability µ is given by:
µ=
bη∗ +ξ
Cmax − C
.
bη∗ −ξ − C
bη∗ +ξ
C
(10)
IV. AO I WITH C LASSICAL ARQ P ROTOCOL
Now, assume that the system adopts the classical ARQ
protocol; that is, failed transmissions are discarded at the destination. In this case, there is no point in re-transmitting an undecoded packet since the successful transmission probabilities
are the same for a retransmission and the transmission of a
new update. The state space reduces to δ ∈ {1, 2, . . . , N }
as rt = 0, ∀t, and the action space to A ∈ {n, x}. The
probability of error in a status update is p , g(0). State
transitions in (1), Bellman optimality equations in (4) and
the RVI algorithm can all be simplified accordingly. Thanks
to these simplifications, we are able to provide a closedform solution to the corresponding unconstrained MDP with
Lagrange relaxation.
Lemma 1. The optimal policy that minimizes Jη with the standard ARQ protocol admits a deterministic threshold structure
characterized as follows for some threshold value ∆:
(
n if δ ≥ ∆,
π(δ) =
(11)
i if δ < ∆.
Proof. Proof is not included here due to space limitations, but
will be provided in the extended version of the paper.
Theorem 1. Optimal threshold value for the standard ARQ
protocol is given by:
p
2η(1 − p) + p − p
∗
∆ =
.
(12)
1−p
Proof. Proof will be provided in the extended version of the
paper.
Note that the optimal threshold value in (12) depends on η,
which stands for the trade-off between the average AoI and the
constraint. We can compute the average transmission rate for
a given η using the optimal threshold policy in (12), denoted
by Cη . An approximate solution for η ∗ can be obtained by
solving Cη = Cmax . Together with (12) we can obtain the
threshold value for the CMDP as follows:
p
1
−
.
(13)
∆∗ =
Cmax (1 − p) 1 − p
The threshold policy defined in (13) is the optimal deterministic policy for the standard ARQ case when randomization is
not considered, which is not sufficient for the CMDP.
Corollary 2. The optimal policy for the constrained average
AoI problem with standard ARQ is a randomized mixture of
two different threshold policies defined in Theorem 1.
Since we have the threshold in closed-form for the optimal
deterministic policy, which corresponds to η ∗ ; we can compute
∆1 , ∆2 directly by using ∆∗ , instead of finding η1 , η2
Algorithm 1: Average-cost modified SARSA with softmax
1
2
3
4
Input : Lagrange parameter η
n ← 0 /* time iteration
τ ← 1 /* softmax temperature parameter
×3
QN×M
← 0 , ρ ← 0 /* initialization
η
*/
*/
*/
foreach n do
foreach a ∈ A do
5
exp(−Qη (sn , a)/τ )
π(a|sn ) = X
exp(−Qη (sn , a′ )/τ )
6
a′ ∈A
end
Sample an from π(a|Sn ), observe next state sn+1 and cost
cn = δn + η1{an =1,2}
foreach a ∈ A do
exp(−Qη (sn+1 , an+1 )/τ )
π(a|sn+1 ) = X
exp(−Qη (sn+1 , a′n+1 )/τ )
7
8
9
10
a′n+1 ∈A
11
12
13
14
15
16
17
18
end
end
Sample an+1 from π(an+1 |sn+1 )
Update Q√
η (sn , an ) as:
αn ← 1/ n
Qη (sn , an ) ←
Qη (sn , an ) + αn [cn − ρ + Qη (sn+1 , an+1 ) − Qη (sn , an )]
/* update ρ at every step
*/
ρ ← ρ + 1/n[cn − ρ]
n← n+1
first, and then computing ∆1 , ∆2 accordingly. We propose a
heuristic policy (optimal if (∆, C ∆ ) pairs form a convex set)
in order to minimize the average AoI with standard ARQ by
randomizing between the two policies corresponding to the
nearest integers to ∆∗ in (13), that is ∆1 , ⌊∆∗ ⌋, ∆2 ,
⌈∆∗ ⌉. Randomization coefficient µ ∈ [0, 1] can be computed
by using the power consumptions C ∆j of the deterministic
threshold policies corresponding to ∆j , j = 1, 2. From (13)
we have:
C ∆j , (1 − p)−1 (∆j + p/(1 − p))−1 .
(14)
Therefore, randomization factor µ of stochastic policy can be
found using ∆j , j = 1, 2 as in 10, and the resultant algorithm
is a threshold policy that uses ∆1 on the threshold with with
probability µ and ∆2 with probability (1 − µ) at each slot.
V. L EARNING
TO MINIMIZE
AO I IN
AN UNKNOWN
ENVIRONMENT
Here we consider a practical scenario, in which the source
node may not have a-priori information about the channel or
the decoding probabilities at the destination, or these may
change over time. Therefore, an online learning algorithm
is employed to learn g(r) over time without degrading the
performance significantly. The literature for average-cost reinforcement learning (RL) is quite limited compared to discounted cost problems. R-learning [17] is an average-cost RL
algorithm which is an off-policy method similar to Q-learning
[18], and initially proposed with a uniform exploration strategy
(ǫgreedy ).
For the average AoI minimization problem in Problem 1, a
modified version of the R-learning algorithm is employed. In
Figure 3. Deterministic policies πη−ξ (top) and πη+ξ (bottom) when
Cmax = 0.4, p0 = 0.3, and rmax = 9, for a time horizon T = 1000.
The results are averaged over 1000 trials. (Blue circles, red stars and green
diamonds represent actions πη (δ, r) = i, n and x, respectively.)
Algorithm 1 we use the softmax exploration strategy instead
of ǫgreedy for the current and the next states [18]. Then,
Algorithm 1 becomes an on-policy RL algorithm. Moreover,
we update the gain ρ at every time slot based on the empirical
average instead of updating at non-explored time slots and
losing information. The resultant algorithm is called averagecost SARSA with softmax.
VI. N UMERICAL R ESULTS
Decoding error probability is assumed to be given by
g(r) , p0 21−r , where p0 denotes the failure probability
of the first transmission, and r is the retransmission count.
The exponential behavior of the error probability follows
from previous research on HARQ [5], [9]. In Figure 3, we
illustrate the deterministic policies obtained by RVI and η
search for given Cmax , rmax and p0 values. Final policies
are generated by randomizing between πη−ξ and πη+ξ . As it
can be seen from the figure, the designed policy transmits less
as η increases, and vice versa.
Figure 4 illustrates the performance of the proposed randomized HARQ policy with respect to Cmax for different
p0 values. We also include the performance of deterministic
and randomized threshold policies with ARQ. As expected,
average AoI can be reduced by randomization between two
deterministic threshold policies. We observe that average AoI
decreases exponentially with respect to Cmax . The average
AoI also decreases with decreasing p0 and with increasing
rmax as expected.
Figure 5 shows the evolution of the average AoI over time
when the proposed average-cost SARSA learning algorithm is
employed. It can be observed that the average AoI achieved
by Algorithm 1 converges to the one obtained from the RVI
algorithm which has a priori knowledge of g(r). Average
AoI achieved by the proposed online learning algorithm is
12
12
p =0.5, ARQ, deterministic
RL, p 0 =0.5, r max =3
0
p =0.5, ARQ, randomized
RVI, p 0 =0.5, r max =3
p0=0.5, rmax=3, HARQ
0
8
p =0.1, r
0
max
max
RVI, p 0 =0.2,r max =9
=3, HARQ
=9, HARQ
6
Average AoI
p =0.3, r
Average AoI
10
0
10
8
RL, p 0 =0.2, r max =9
6
4
4
2
2
0
0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Average number of transmissions, C max
Figure 4. Expected average AoI J π with respect to Cmax for ARQ and
HARQ protocols for different p0 and rmax values. Time horizon is set to
T = 1000, and the results are averaged over 1000 trials.
0.2
0.3
0.4
0.5
0.6
0.7
0.8
Average number of transmissions, C max
Figure 6. Performance of the RL (average-cost SARSA) with respect to RVI
Algorithm for n = 1000 iterations, and values are averaged over 1000 trials
for different p0 and rmax values (both the mean and the variance are shown).
R EFERENCES
Figure 5. Performance of the average-cost SARSA for rmax = 9, p0 = 0.2,
η = 10 and n ≤ 10000, averaged over 1000 trials (both the mean and the
variance are shown).
presented in Figure 6 as a function of Cmax , which shows
that the performance is close to that of RVI.
VII. C ONCLUSIONS
We have considered a wireless system transmitting timesensitive data over an imperfect channel with the average
AoI as the performance measure, which quantifies the timeliness of the data available at the destination. Considering
both the classical ARQ and the HARQ protocols, preemptive
scheduling policies have been proposed by taking into account
retransmissions under a resource constraint. In addition to
identifying a randomized threshold structure for the optimal
policy when the error probabilities are known, an efficient
RL algorithm is also proposed for practical applications, when
the system characteristics may not be known in advance. The
algorithms designed in this paper are relevant to other systems
concerning the timeliness of information, and the proposed
methodology can be used in other CMDP problems. As a
future work, the problem will be extended to time-correlated
channel statistics in a multi-user setting.
[1] S. Kaul, M. Gruteser, V. Rai, and J. Kenney, “Minimizing age of
information in vehicular networks,” in IEEE Coms. Society Conf. on
Sensor, Mesh and Ad Hoc Coms. and Nets., June 2011, pp. 350–358.
[2] S. Kaul, R. Yates, and M. Gruteser, “Real-time status: How often should
one update?” in INFOCOM, Proc. IEEE, March 2012, pp. 2731–2735.
[3] K. Chen and L. Huang, “Age-of-information in the presence of error,”
in IEEE Int’l Symp. on Inf. Theory (ISIT), July 2016, pp. 2579–2583.
[4] I. Kadota, E. Uysal-Biyikoglu, R. Singh, and E. Modiano, “Minimizing
age of information in broadcast wireless networks,” in Annual Allerton
Conf. On on Communication, Control, and Computing, September 2016.
[5] P. Frenger, S. Parkvall, and E. Dahlman, “Performance comparison of
harq with chase combining and incremental redundancy for hsdpa,” in
IEEE Vehicular Technology Conf. Proc., vol. 3, 2001, pp. 1829–1833.
[6] M. Kashef and A. Ephremides, “Optimal packet scheduling for energy
harvesting sources on time varying wireless channels,” Journal of
Communications and Networks, vol. 14, no. 2, pp. 121–129, April 2012.
[7] Y. P. Hsu, E. Modiano, and L. Duan, “Age of information: Design and
analysis of optimal scheduling algorithms,” in 2017 IEEE International
Symposium on Information Theory (ISIT), June 2017, pp. 561–565.
[8] E. Najm, R. D. Yates, and E. Soljanin, “Status updates through M/G/1/1
queues with HARQ,” CoRR, vol. abs/1704.03937, 2017.
[9] V. Tripathi, E. Visotsky, R. Peterson, and M. Honig, “Reliability-based
type ii hybrid arq schemes,” in Communications, 2003. ICC ’03. IEEE
International Conference on, vol. 4, May 2003, pp. 2899–2903 vol.4.
[10] E. Altman, Constrained Markov decision processes, ser. Stochastic
modeling. Boca Raton, London: Chapman & Hall/CRC, 1999.
[11] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. New York, NY, USA: John Wiley & Sons, 1994.
[12] L. I. Sennott, “Average cost optimal stationary policies in infinite state
markov decision processes with unbounded costs,” Operations Research,
vol. 37, no. 4, pp. 626–633, 1989.
[13] ——, “Constrained average cost Markov decision chains,” Probability
in Eng. and Informational Sciences, vol. 7, no. 1, p. 6983, 1993.
[14] M. H. Ngo and V. Krishnamurthy, “Monotonicity of constrained optimal
transmission policies in correlated fading channels with arq,” IEEE
Trans. on Signal Processing, vol. 58, no. 1, pp. 438–451, Jan 2010.
[15] A. Roy and A. Karandikar, “Optimal radio access technology selection
policy for lte-wifi network,” in Int’l Symp. Modeling and Opt. in Mobile,
Ad Hoc, and Wireless Nets. (WiOpt), May 2015, pp. 291–298.
[16] E. Altman, R. E. Azouzi, D. S. Menasché, and Y. Xu, “Forever young:
Aging control in dtns,” CoRR, vol. abs/1009.4733, 2010.
[17] S. Mahadevan, “Average reward reinforcement learning: Foundations,
algorithms, and empirical results,” Machine Learning, vol. 22, no. 1,
pp. 159–195, 1996.
[18] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning,
1st ed. Cambridge, MA, USA: MIT Press, 1998.
| 7 |
Class-Splitting Generative Adversarial Networks
Grinblat, G.L.1 , Uzal, L.C.1 and Granitto, P.M.1
arXiv:1709.07359v1 [stat.ML] 21 Sep 2017
1
CIFASIS, French Argentine International Center for Information and Systems
Sciences, UNR-CONICET, Argentina
Figure 1: Samples generated with our Splitting GAN method with supervised training on CIFAR-10
dataset. Each line has samples of one of the original classes. Each side has samples corresponding to
one of the two clusters generated for each class. We use ResNet-B architecture (see text for details).
Abstract
when no class information is available, i.e. in the
unsupervised setup. Our generated samples reach
Generative Adversarial Networks (GANs) produce state-of-the-art Inception scores for CIFAR-10 and
systematically better quality samples when class STL-10 datasets in both supervised and unsuperlabel information is provided., i.e. in the con- vised setup.
ditional GAN setup. This is still observed for
the recently proposed Wasserstein GAN formulaIntroduction
tion which stabilized adversarial training and al- 1
lows considering high capacity network architectures such as ResNet. In this work we show how The irruption of Generative Adversarial Nets
to boost conditional GAN by augmenting available (GAN) [5] produced a great leap for image data
class labels. The new classes come from cluster- generation. Samples were generated simply by aping in the representation space learned by the same plying a neural network transform to an input ranGAN model. The proposed strategy is also feasible dom vector sampled from a uniform distribution.
1
There is no need for any Markov chains or unrolled
approximate inference networks during either training or generation of samples [5]. GAN based generative models did not take long to reach impressive
image quality [13, 14, 17, 10] at least for some specific datasets.
However, current GAN models cannot produce
convincing samples when trained on datasets of images with high variability, even for relatively low
resolution images. On the other hand, it is observed
that sample quality improves when class information is taken into account in a conditional GAN
setup [11, 12]. These findings suggest that it is hard
to learn a multimodal distribution from a smooth
transform of a uniform (or Gaussian) distribution
and that providing categorical class information to
the generator alleviates this problem.
Our proposal is inspired in two observations.
First, as mentioned above, conditioning generation with categorical class labels with high level
of abstraction improves image quality. Second, as
early observed in [5, 13], the adversarial network
pair learns an useful hierarchy of representations
in an unsupervised setup. We propose to exploit
the same representation space learned by the GAN
model in order to generate new class labels with a
high level of abstraction. This is done by applying
a simple clustering method in this representation
space. By conditioning generation with this new
class labels the model is able to generate better
samples. This can be done either when prior class
information is available or not.
The main contributions of the present paper are1 :
Figure 2: Class-conditioned samples generated
with WGAN-GP method [7] over the ResNet-B architecture for CIFAR-10 dataset. Each row has
samples of a given class.
art Inception scores for CIFAR-10 and STL-10
datasets in both tasks.
2
Background
In the original GAN formulation [5], the generator is a neural network that transform noise input
z ∼ p(z) into fake samples and the discriminator
D is a neural network with a single scalar output
with a sigmoid activation. This output is interpreted as the model probability for its input being
a real image from the dataset distribution against
being a fake image sampled by generator G. The
discriminator D is trained using the standard binary classification formulation by minimizing the
binary cross-entropy between fake and real distributions. On the other hand, the generator G is
simultaneously trained to mislead the discriminator. This is accomplished in practice by updating
G parameters minimising the same loss but with
fake samples tagged with a ‘true’ label [5].
In other words, the discriminator is updated by
• We propose a method for increasing the number of class labels during conditional GAN
training based on clustering in the representation space learned by the same GAN model.
We base our implementation on the more stable Wasserstein GAN formulation [2, 7].
• We show an effectively way of adapting networks architecture to handle this increasing
number of classes.
• We show that this splitting GAN strategy improves samples quality both in the supervised
and unsupervised tasks, reaching state-of-the1 The source code will be available at https://github.
com/CIFASIS
2
Figure 3: Real CIFAR-10 samples corresponding to the 20 clusters found by our method. Each line is
divided in the same way as in Figure 1.
gradient descent over a negative log likelihood loss of the generated samples by adding more structure
to the GAN latent space and an auxiliary classiLD = − E [log(D(x̃))]− E [log(1−D(G(z)))], fier. This approach requires the dataset to include
x∼Pr
z∼p(z)
class labels, i.e. to work in a supervised setting.
(1)
The generator receives the noise vector z and also
while the generator minimizes
the selected label c so that the generated sample
LG = − E [log(D(G(z)))].
(2) is a function of both. Furthermore, the discrimiz∼p(z)
nator has, in addition to the usual objective, the
task of correctly classifying the real and generated
The main issue in the original GAN formula- samples (through an auxiliary classifier). The gention was the instability of the training process that erator is optimized not only to deceive the discrimmade very hard to improve architectures and to inator, but also to generate fake samples that minscale up to bigger images. In [13] a deep convo- imize the auxiliary classifier error, i.e. to produce
lutional architecture was proposed for both gen- well class-defined samples.
erator and discriminator which presents some degree of stability for adversarial training. This work
was the first one producing convincing image sam- 2.2 WGAN
ples for datasets with low variability (Bedrooms
and Faces) and relatively low resolution (64x64). In order to address the problem of instability in
However, standard GAN formulation fails to gen- GAN training, Arjovsky et al. in a series of works
erate globally consistent samples when trained on [1, 2] proposed a reformulation of the function to be
optimized. They argue that the original loss funcdatasets with high variability like ImageNet.
tion presents discontinuities and vanishing gradients with respect to generator parameters. Instead,
2.1 AC-GAN
they proposed a distance for distributions known
In order to tackle datasets with high variability, as Earth-Mover distance or Wasserstein-1, which
Odena et al. [12] proposed to improve the quality captures the cost of transporting mass in order to
3
transform one distribution into the other. From
this distance they derive the WGAN loss function
for the minimax objective
min max E [D(x)] −
G D∈D x∼Pr
E [D(G(z))]
(3)
z∼p(z)
where D (called critic in WGAN formulation) is
not anymore a binary classifier and is restricted to
be in the set D of 1-Lipschitz functions. Again, z is
a noise vector sampled from a simple distribution
(uniform or Gaussian distribution). The Lipschitzness of D was imposed by weight clipping in this
first version of WGAN.
The importance of Arjovsky’s contribution lies
on a gain in the robustness of the adversarial
training process and a reduction in the frequency
of the mode collapse phenomenon. Furthermore,
the proposed loss function correlates well with the
observed sample quality as opposed to the original GAN loss which gives little information about
training progress.
Figure 4: Samples generated with the ResNet-B architecture trained with Splitting GAN over CIFAR10 without class labels (unsupervised).
is the most recurrent benchmark for image generation in GAN literature. In the unsupervised setting
(without using any class information) they reach
2.2.1 WGAN-GP
the state-of-the-art, while in the supervised case
An improved version of WGAN was recently pro- (following the strategy of AC-GAN and without
posed by Gulrajani et al. [7]. They found that the tuning any hyperparameter nor architecture) they
2
weight clipping can cause convergence problems in reach the second place behind SGAN [8] . All this
some settings and propose to enforce the Lipschitz advantageous features made –to our knowledge–
constraint on the critic D by penalizing its gradi- WGAN the current standard formulation for adversarial training.
ent’s norm.
The penalty term is computed over a set of random points x̂ uniformly sampled from straight lines
Our Method:
Splitting
between real and fake sample points. Naming as Px̂ 3
the latter distribution, the new loss can be written
GAN
as
The main idea is to generate new artificial classes
L =
E [D(x̃)] − E [D(x)]
based on the representation learned by the last hidx∼Pr
x̃∼Pg
den layer of the critic after enough training itera
+λ E (k∇x̂ D(x̂)k2 − 1)2
(4) tions. This is done by applying k-means to each
x̂∼Px̂
class set in this representation space. We divide
each set in two clusters only when the class has
where the penalty coefficient is set to λ = 10.
This improved WGAN formulation exhibits high more samples than a certain threshold. After that,
robustness against changing model architecture. training is resumed replacing the old labels with
The authors tested six different network designs the new ones for the entire dataset.
With this procedure we need to make two mifor both G and D, which typically break standard
GAN training but show stable WGAN training for nor modifications to the model architecture before
all cases. Furthermore, WGAN formulation helps resuming learning:
achieving better quality samples. Quantitative re2 By simply duplicating the number of feature maps of
sults are reported by the authors in terms of the Gulrajani’s networks we found WGAN outperforms SGAN
Inception score [14] over CIFAR-10 dataset, which score. See Sec. 4
4
1. The auxiliary classifier needs to predict a different number of classes, so we extend the last
layer of this classifier adding a copy of the
weights of the parent class for each child class.
Method
Improved GAN (-L+HA) [14]
EGAN-Ent-VI [4]
DFM [15]
Splitting GAN ResNet-B (ours)
WGAN-GP ResNet-B
WGAN-GP ResNet-A [7]
Splitting GAN ResNet-A (ours)
Inception Score
6.86 ± 0.06
7.07 ± 0.10
7.72 ± 0.13
7.80 ± 0.08
7.81 ± 0.10
7.86 ± 0.07
7.90 ± 0.09
2. In the conditional WGAN-GP implementation
[6], the class labels are injected in each batch
normalization layer of the generative network
by setting a specific gain and bias parameters
(γ and b) for each class. We follow this strategy in our proposal and, for the class splitting,
we set the new pair (γ, b) for each child class as Table 1: Unsupervised Inception scores on CIFARγchild = γf ather +∆γ and bchild = bf ather +∆b, 10
with initialization ∆γ = 0 and ∆b = 0 when
the new classes are created. This formulation
Method
Inception Score
implies that child classes start both with the
father class params and they eventually beImproved GAN [14]
8.09 ± 0.07
come different.
AC-GAN [12]
8.25 ± 0.07
WGAN-GP ResNet-A [7]
8.42 ± 0.10
SGAN [8]
8.59 ± 0.12
4 Results
WGAN-GP ResNet-B
8.67 ± 0.14
Splitting GAN ResNet-A (ours)
8.73 ± 0.08
To demonstrate the effectiveness of our proposal,
Splitting GAN ResNet-B (ours)
8.87 ± 0.09
we conducted several experiments with CIFAR-10
[9], a dataset containing 50000 32x32 images corresponding to 10 different classes, and the unlabeled Table 2: Supervised Inception scores on CIFAR-10
set of STL-10, containing 100000 larger and more
diverse images [3]. We based our model on the improved WGAN algorithm proposed by Gulrajani et
al. [7, 6]. In all cases, during training, we sample ture with the original WGAN-GP algorithm. The
50000 images from the current model to select the results are detailed in Table 1 and Table 2.
best one so far based on the Inception score. FiAlso for comparison, samples obtained with the
nally, we sample another 50000 with the best model WGAN-GP supervised model (Figure 2) and obin order to calculate the reported score, following tained with the proposed method (Figure 1) are
[12].
shown. Figure 3 has real samples of CIFAR-10 corresponding to each of the 20 clusters found.
4.1
CIFAR-10
Figures 4 and 5 show generated images and clusters found in the unsupervised test.
With CIFAR-10, an unsupervised test was performed starting from all the examples considered
as a single class and dividing them into two clusMethod
Inception Score
ters every approximately 10 epochs. This was done
with the Gulrajani’s ResNet architecture without
Original Dataset [15]
26.08 ± 0.26
changes (named ResNet-A) and a modified version
DFM [15]
8.51 ± 0.13
(ResNet-B) doubling the number of maps in each
WGAN-GP
ResNet-A
9.05 ± 0.12
convolutional layer. A supervised test was also conSplitting
GAN
ResNet-A
(ours)
9.50
± 0.13
ducted with these two architectures, starting from
the original 10 classes of CIFAR and dividing them
into two at approximately 20 training epochs. For
comparison we also trained the ResNet-B architec- Table 3: Unsupervised Inception scores for STL-10
5
Figure 6: Images generated by the model trained
on STL-10.
4.2
STL-10
We treat STL-10 in the same way as [15]. That
is, we downsample each dimension by 2, resulting
in 48x48 RGB images. We tested our algorithm
with the ResNet-A architecture, with the minimum changes necessary for the model to generate
48x48 images. Table 3 shows the resulting Inception score. Figures 6 and 7 show the generated
images and the clusters found by the method.
5
Discussion
Several things can be observed from the results presented in the previous section. First, regarding the
obtained clusterization of the real samples (Figure
3 for the supervised case and Figure 5 for the unsupervised one), we can visually find rules that define
the vast majority of samples, for at least several
clusters. As an example, in the supervised case
(Figure 3) we can see in the left side of the fourth
row cats looking forward and in the left side of the
eighth row horse side views. Compare with cats
and horses in several positions corresponding to the
Figure 5: The 25 clusters found in the unsupervised clusters in the right side. In the unsupervised case
case (real CIFAR-10 samples). Each line has two (Figure 5) we can see a tendency to generate clusdifferent clusters.
ters for cars, planes or ships, but in general they
6
are much more mixed.
Regarding the generated samples in the supervised case (Figure 1 for our method and Figure 2 for
WGAN-GP), we can see that the class splits allows
the model to generate better samples. Not only for
the more uniform clusters such as the horse side
views or the cats looking forward, but for the whole
original class. Compare for example the fourth row
(cats) or the eighth row (horses) in Figure 1 with
those rows in Figure 2, corresponding to the same
model trained with WGAN-GP. Note that these
samples do not differ too much from those shown in
[7]. Even in classes where the clustering step does
not seem to have found an obvious separation rule,
such as cars (second row), a better sample quality
can be observed than in the original WGAN-GP.
In the unsupervised case with CIFAR-10 (Figure 4), although the Inception score is similar than
the one obtained by the state-of-the-art so far, the
samples generated seem to be of a higher quality.
Nevertheless, they do not reach the quality of the
generated images in a supervised setting. It is always advisable to start the division into clusters
from the predefined classes, if this information is
available.
In the case of STL-10 (Figure 6), there is a noticeable difference in the Inception score. The reason
of this may be that STL-10 is a much more diverse
dataset, so a division into a large number of classes
can be beneficial. It should be noted that in this
case the state-of-the-art is much further from the
actual dataset score than in the case of CIFAR-10.
The success of our Splitting GAN method suggests that reinjecting high level information from
critic to the generative model improves sampling
quality. This breaks the strictly adversarial training and allows some degree of information sharing
between both networks. We believe that this simFigure 7: The 15 clusters found by the model (real ple (but successful) strategy could inspire a new
STL-10 samples).
and better adversarial training formulation where
a small amount of high level information directly
flows from critic’s last layers to generator input.
6
Conclusions
Work
and
Future
In this work we showed that our Splitting GAN
method allows generating better images. This can
7
be seen in the results on CIFAR-10 and STL-10 for
which clearly better images were obtained. This
is supported by an Inception score well above the
previous state-of-the-art for both datasets.
A future direction of research to improve the current Splitting GAN version is oriented to understand how a given model architecture or dataset
determines the optimal number of clusters (or
classes). Also, clusterization could be enhanced
during adversarial training with the addition of an
extra loss term like in [16].
We are also currently working in a generalization of the Splitting GAN ideas following two paths:
First, making the high level information from the
critic’s representation flows continually to the generator, avoiding special purpose steps at predefined
times in the training process. Second, avoiding the
hard threshold clustering step and replacing it with
some sort of continuous representation capturing
the same amount of information.
A. Courville, and Y. Bengio. Generative
adversarial nets. In Advances in neural information processing systems, pages 2672–2680,
2014.
[6] I. Gulrajani. Improved Training of Wasserstein GANs. https://github.com/igul222/
improved_wgan_training, 2017. [Online; accessed 18-Sep-2017].
[7] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville. Improved training of wasserstein gans.
arXiv preprint
arXiv:1704.00028, 2017.
[8] X. Huang, Y. Li, O. Poursaeed, J. Hopcroft,
and S. Belongie.
Stacked generative
adversarial networks.
arXiv preprint
arXiv:1612.04357, 2016.
[9] A. Krizhevsky and G. Hinton. Learning multiple layers of features from tiny images. 2009.
[10] X. Mao, Q. Li, H. Xie, R. Y. Lau, Z. Wang,
and S. P. Smolley. Least squares generative adversarial networks. arXiv preprint
The authors acknowledge grant support from ANArXiv:1611.04076, 2016.
PCyT PICT-2016-4374.
[11] M. Mirza and S. Osindero.
Conditional
generative adversarial nets. arXiv preprint
arXiv:1411.1784, 2014.
References
7
Acknowledgements
[1] M. Arjovsky and L. Bottou. Towards princi- [12] A. Odena, C. Olah, and J. Shlens. Conditional image synthesis with auxiliary classifier
pled methods for training generative adversarGANs. In D. Precup and Y. W. Teh, editors,
ial networks. In International Conference on
Proceedings of the 34th International ConferLearning Representations 2017, 2017.
ence on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pages
[2] M. Arjovsky, S. Chintala, and L. Bot2642–2651, International Convention Centre,
tou.
Wasserstein gan.
arXiv preprint
Sydney, Australia, 06–11 Aug 2017. PMLR.
arXiv:1701.07875, 2017.
[3] A. Coates, A. Ng, and H. Lee. An analysis of [13] A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep
single-layer networks in unsupervised feature
convolutional generative adversarial networks.
learning. In Proceedings of the fourteenth inarXiv preprint arXiv:1511.06434, 2015.
ternational conference on artificial intelligence
and statistics, pages 215–223, 2011.
[14] T. Salimans, I. Goodfellow, W. Zaremba,
V. Cheung, A. Radford, X. Chen, and
[4] Z. Dai, A. Almahairi, P. Bachman, E. Hovy,
X. Chen. Improved techniques for training
and A. Courville.
Calibrating energygans. In D. D. Lee, M. Sugiyama, U. V.
based generative adversarial networks. arXiv
Luxburg, I. Guyon, and R. Garnett, editors,
preprint arXiv:1702.01691, 2017.
Advances in Neural Information Processing
[5] I. Goodfellow, J. Pouget-Abadie, M. Mirza,
Systems 29, pages 2234–2242. Curran AssoB. Xu,
D. Warde-Farley,
S. Ozair,
ciates, Inc., 2016.
8
[15] D. Warde-Farley and Y. Bengio. Improving
generative adversarial networks with denoising
feature matching. In International Conference
on Learning Representations 2017, 2017.
[16] Y. Wen, K. Zhang, Z. Li, and Y. Qiao. A
discriminative feature learning approach for
deep face recognition. In European Conference
on Computer Vision, pages 499–515. Springer,
2016.
[17] J. Zhao, M. Mathieu, and Y. LeCun. Energybased generative adversarial network. arXiv
preprint arXiv:1609.03126, 2016.
9
| 1 |
i
F WLBP: A Scale Invariant Descriptor for Texture
Classification
arXiv:1801.03228v1 [cs.CV] 10 Jan 2018
Swalpa Kumar Roy, Nilavra Bhattacharya, Bhabatosh Chanda, Bidyut B. Chaudhuri, Life Fellow, IEEE,
and Dipak Kumar Ghosh
Abstract—In this paper we propose a novel texture recognition
feature called Fractal Weighted Local Binary Pattern (FWLBP).
It has been observed that fractal dimension (FD) measure
is relatively invariant to scale-changes, and presents a good
correlation with human perception of surface roughness. We have
utilized this property to construct a scale-invariant descriptor. We
have sampled the input image using an augmented form of the
local binary pattern (LBP), and then used an indexing operation
to assign FD weights to the collected samples. The final histogram
of the descriptor has its features calculated using LBP, and its
weights computed from the FD image. The proposed descriptor
is scale, rotation and reflection invariant, and is also partially
tolerant to noise and illumination changes. In addition, it is also
shown that the local fractal dimension is relatively insensitive to
the bi-Lipschitz transformations, whereas its extension is able to
correctly discriminate between fundamental texture primitives.
Experimental results show the proposed descriptor has better
classification rates compared to the state-of-the-art descriptors
on standard texture databases.
Index Terms—Fractal Dimension (FD), Fractal weighted local
binary pattern (FWLBP), Scale invariance, Scale space, Texture
classification
C
I. I NTRODUCTION
ONSTRUCTING effective texture feature is a major
challenges in computer vision [1]. It has received a
lot of attention in the past decades due to its value in
understanding how human beings recognize textures. A crucial
issue of texture analysis is constructing an effective texture representation. There are primarily five methodologies
of texture representation: statistical, geometrical, structural,
model-based, and signal processing based [2], [3]. In recent
literature, two categories of texture classification approaches
dominate current research, namely texture descriptor based
methods [4], [5] and deep learning based methods. In the
second category, a convolutional neural network (C NN) is
trained to classify the texture images [6], [7]. The deep
learning based methods offer good classification performance,
however it has following limitations: it requires a large amount
of data and hence is computationally expensive to trains.
S. K. Roy and B. B. Chaudhuri are with the Optical Character Recognition
Lab, Computer Vision and Pattern Recognition Unit at Indian Statistical
Institute, Kolkata, India (email: [email protected]; [email protected]).
Nilavra Bhattacharya is with the School of Information, The University of
Texas, Austin, USA (email: [email protected]).
B. Chanda is with the Image Processing Lab, Electronics and Communication Sciences Unit at Indian Statistical Institute, Kolkata, India (email:
[email protected]).
D. K. Ghosh is with the Department of Electronics & Communication
Engineering, National Institute of Technology Rourkela, Orissa, India (email:
[email protected])
Basically the complex models take weeks to train using
several machines equipped with expensive GPUs. Also, at
present, no strong theoretical foundation on topology/training
method/flavor/hyper-parameters for deep learning exist in the
literature. On the other hand, the descriptor based methods
have the advantage of ease of use, data independence, and
robustness to real-life challenges such as illumination and
scale differences. In this category of methods the design of
effective texture descriptor is regarded as extremely important
for texture recognition.
A picture may be captured under geometric and photometric
varying conditions. An ideal model for describing and recognizing textures should be able to capture essential perceptual
properties of the texture. It should be robust enough against
changes, like view-point alteration, luminance variation, image
rotation, reflection, scale change, and geometry of the underlying surface. Attention has been focussed on the design of
local texture descriptors capable of achieving local invariance
[8]–[11]. The search for invariant descriptors started in the
1990s [12]. Kashyap and Khotanzad first proposed a circular
autoregressive dense model [13] to study rotation invariant
texture classification. Many other models including multiresolution [14], hidden Markov model [15], and Gaussian
Markov model [16] were explored to study rotation invariance.
More recently Varma and Zisserman [10] proposed to learn
a rotation invariant texton dictionary from a training set, and
then classify the texture image based on its texton distribution.
They also proposed another texton based algorithm [11] by
using the local image patch to represent the feature directly.
In addition some works have been done on scale and affine
invariant feature extraction in texture classification. Among
them Varma and Garg [17] extracted a local fractal vector
for each pixel, and computed a statistical histogram. Liu and
Fieguth [18] applied random projection for densely sampled
image patches, and extracted the histogram signature. Yao and
Sun [19] normalized statistical edge feature distribution to
resist the variation in scale. Lazebinik et al. [20] and Zhang et
al. [8] detected Harris and Laplacian key points for extracting
texture signatures. Recently, global scale invariant feature
extraction methods drew more attention because local scale
normalization is slow because of pixel by pixel operations are
needed there. Xu et al. [21] and Quan et al. [5] have classified
the image pixels into multiple point sets by gray intensities or
local feature descriptors. Instead of extracting scale invariant
features, pyramid histograms with shifted matching scheme
was proposed by some researchers [9], [22]. Roy et al. [23]
introduced a complete dual-cross pattern (C DCP) to address
ii
the scale and rotational effects in unconstrained texture classification. Generally, a texture can be characterized by geometric
multi-scale self-similar macro-structure (like fractal dimension
and L BP). Geometric structure of object in the image vary with
scale changes while illumination change does not change the
object structure. Several studies have been done using fractal
based texture classification [17], [24]–[26] but the drawback
of these techniques are that the value of fractal dimension is
continuous, so a quantization stage is required to compute the
histogram. However, an accurate quantization depends upon a
excessive training with large number of samples.
In this paper we approach the quantization problem by
proposing a new descriptor called Fractal Weighted Local
Binary Pattern (F WLBP) based on a commonly used method
of combining fractal dimension proposed by Chaudhuri and
Sarkar [27]. This method is based on differential boxcounting (D BC) algorithm [28]. Where instead of directly
measuring a texture surface, the measures at different scales
are obtained by means of counting the number of boxes of
different size, which can cover the whole surface.
In this paper, our main contributions are summarized below:
• We propose a simple, effective, yet robust fractaldimension based texture descriptor called Fractal
Weighted Local Binary Pattern (Sec. III-A) for texture
classification.
• The F WLBP descriptor achieves sufficient invariance to
address the challenges of scale, translation, and rotation
(or reflection); and is also partially tolerant to noise and
illumination for texture classification.
• The proposed algorithm takes a reasonable amount of
time in the feature extraction stage (Sec. III-B).
• We experimented and observed that our proposed descriptor outperforms the traditional L BP based and other stateof-the-art methods on different texture databases, such as
KTH-TIPS and CUReT (Sec. IV).
The remaining of this the paper is organized as follows.
Sec. II deals with the mathematical background of fractal
dimension, and our approach to convert the input image to
its FD form. The proposed F WLBP feature extraction scheme
is presented in Sec. III. In Sec. IV the performance of texture
classification is compared with the state-of-the-art methods.
Finally, concluding remarks are drawn in Sec. V.
II. F RACTAL D IMENSION
A fractal is a geometrical set whose Hausdorff - Besicovitch
dimension is strictly greater than its topological dimension
[30]. Mandelbrot introduced the term fractal to describe nonEuclidean, self-similar structures. The Fractal Dimension (FD)
of a structure gives an idea of its texture complexity, which
can be used to measure, analyse and classify shape and texture.
Fractal surfaces show the property of self-similarity.
In the Euclidian n-space, a set S is said to be self-similar,
if S is the union of Nr (s) distinct (non-overlapping) copies
of itself, each of which is scaled down by a ratio r > 0. Let
D(s)
(i.e. an exponential function of r), where
Nr (s) = k( 1r )
D(s) is a density function, and k is a constant. Then
1
log Nr (s) = log k + D(s) · log
(1)
r
Then, the local Fractal Dimension (FD) of s becomes
log(Nr (s))
D(s) = lim
.
(2)
r→0 log(1/r)
It is difficult to compute the local Fractal dimension D using
Eqn. (2) directly. In our implementation (Fig. 1), we transform
the texture images into FD images using the differential boxcounting (D BC) algorithm [28]. To achieve scale-invariance,
we construct a Gaussian scale space [31] using Eqn. (3):
Z
Γx,y,r = hGr (x, y)|I(x, y)i =
Gr (x, y)I(x, y)dxdy.
x,y∈R
(3)
In Eqn (3) a convolution formalism may be used when
convolution across the entire image is required. However, here
an inner product formalism (h.|.i) is more convenient where
Gr is a Gaussian smoothing kernel with variance r:
−kx2 k
1
Gr (x) = √ exp 2σ2
r 2π
As the 2D Gaussian function is separable [32], [33], its
convolution with the input image can be efficiently computed
by applying two passes of the 1D Gaussian function in the
horizontal and vertical directions:
Gr (x, y, r) = Gr (x)Gr (y).
The scaling operation to obtain Ir = Gr ∗ I (where ∗ represents
convolution operator) can be computed efficiently and stably
because of the properly localization of the Gaussian both in
space and frequency [34] even if the input image (I) is the result of physical measurement, so called directly sampled [35].
After constructing the Gaussian scale space, we use the D BC
algorithm on each layer of the scale space to generate a set
of intermediate images. We combine the intermediate images
into the final FD image using a linear-regression technique
adapted from [29].
The input texture image Ax,y (X × Y ) is used to generate a
Gaussian scale space Γx,y,r (X ×Y ×L) having L layers, with
scaling factor r varying from rmin , to rmax , and total number
of layers L = rmax −rmin +1. Each layer is considered as a 3−
D space, with (x, y) denoting the 2 − D position, and the third
coordinate, g, denoting the gray level. The D BC algorithm
is implemented by applying a varying-size non-linear kernel
bi,j (m × n), which operates on the image surface and finds
the difference between the maximum (gmax ) and the minimum
(gmin ) gray values of the region enclosed within the kernel
(Fig. 2). Non-negative integers α and β are used to center the
kernel b(i, j) on the pixel gx,y in the image layer. The kernel
is calculated as
β
α
X
X
gmax − gmin
b(i, j) =
floor
+1
(4)
r
i=−α
j=−β
where r is the scaling factor of the layer l, and
m−1
n−1
α = ceil
, and β = ceil
. (5)
2
2
The kernel is applied as
2
β
α
X
X
L
Ω(x, y, r) =
b(i, j)Γ(x + α, y + β, r)
(6)
r
i=−α
j=−β
iii
rmax
rmax rmax
Box n
Ax , y ( X Y )
rmin
rmin rmin
Image
intensity
surface
Box 2
(a)
Fx , y ( X Y )
Box 1
x , y ,r ( X Y L)
(b)
(e)
x , y ,r ( X Y L)
(d)
(c)
Fig. 1. Illustrates the Differential Box Counting (DBC) technique [28] for computing Fractal Dimension. (a) Input texture image. (b) Gaussian Scale Space
with six layers, generated from the input image with box sizes from rmin × rmin , . . . , rmax × rmax . (c) DBC is used to calculate the FD for each image
layer of the scale space. (d) Intermediate images. (e) Final FD image obtained using technique adapted from [29].
The slope can be determined by computing the sums of
squares:
P 2
X
( r)
(9)
Ψ1 =
r2 −
L
P 2 P 2
X
( r) ( Θ)
Ψ2 =
rΘ −
.
(10)
L
Finally, the FD image Fx,y (X × Y ) is calculated as:
g max
g min
F (x, y) = λxy =
=
Fig. 2. Image intensity surface enclosed within a box, showing the difference
between maximum and minimum gray values.
where Ωx,y,r (X × Y × L) is a matrix of intermediate images,
such that the first layer denotes the original image after it
has been filtered by the kernel with scale r = rmin , and the
highest layer denoting the image filtered by the kernel with
scale r = rmax . Thus, we define
g11r g12r · · · g1Y r
g21r g22r . . . g2Y r
Ω(x, y, r) = .
(7)
..
..
..
..
.
.
.
gX1r
gX2r
...
gXY r
The slope λx,y of the least square linear regression line
between Ω(x, y, r) and r will denote the pixel value F (x, y)
of the FD image Fx,y (X × Y ). For this purpose, a columnvector Θ is defined, such that the first gray values of all the
layers in Ω(x, y, r) comprise vector θ1 , all the second gray
values comprise vector θ2 etc. as shown in Eqn. (8).
Θ
θ1
θ2
..
.
θX×Y
=
g111
g121
..
.
g112
g122
..
.
···
...
..
.
g11L
g12L
..
.
gXY 1
gXY 2
...
gXY L
(8)
X X
Y
X
Ψ2
x=1 y=1
Ψ1
g11r
g21r
..
.
g12r
g22r
..
.
···
...
..
.
g1Y r
g2Y r
..
.
gX1r
gX2r
...
gXY r
.
(11)
Algorithm 1: Algorithm to compute FD image of input texture image.
1
2
3
4
5
6
Data: Input texture image, Ax,y (X × Y )
Result: Matrix Fx,y (X × Y ) containing FD values of each pixel of A
initialize (rmin = 2, rmax = 7, L = rmax − rmin + 1) ;
while (r ≥ rmin and r ≤ rmax ) do
Gr = Gaussian Kernel([r, r], r/2) ;
Γ(x,y,r) = hGr (x, y)|I(x, y)i;
/* Update D BC kernel b */
h
i
β
α
P
P
min
b(i, j) =
floor gmax −g
+1 ;
r
i=−α j=−β
7
8
/* Compute Ω(x, y, d) Matrix of intermediate FD values */
2
β
α
P
P
Ω(x, y, d) =
b(i, j)Γ(x + α, y + β, l) L
;
r
i=−α j=−β
9 end while
10 Convert the 3-D matrix Ωx,y,r (X × Y × L) to a column vector Θ, as
per Eqn. (8). ;
11 /* Compute sum of square */
12 Ψ1 =
13 Ψ2 =
P
P
P
( r)2
;
L
P
P
( r)2 ( Θ)2
−
L
r2 −
rΘ
14 Compute FD image F (x, y) =
;
X P
Y
P
x=1 y=1
Ψ2
Ψ1
;
A. Effects of Fractal Transform
An interesting property of the Fractal Transform is its invariance under bi-Lipschitz transform. A transform t : R2 → R2
iv
is called a bi-Lipschitz transform, if there exist two constants
0 < c1 ≤ c2 ≤ ∞ such that for any two points x1 , x2 ∈ R2 ,
c1 kx1 − x2 k < kt(x1 ) − t(x2 )k < c2 kx1 − x2 k
(12)
where kp1 − p2 k is the Euclidean metric between points p1
and p2 . So, any smooth transform (like translation, rotation,
projective transformation, texture warping of a regular surface,
change in viewpoint, and non-rigid deformation) is a biLipschitz transform [36], [37]. Up-sampling or down-sampling
by a factor of n are also special cases of the bi-Lipschitz
transform, where c1 = c2 = n. Then, we can drive the
following theorem:
Theorem 1. Let us consider an image as f (x), x ∈ R2 . Let
the fractal dimension and length of point x be D and L,
respectively. For a sampling function t(x) = nx, where n > 1
means up-sampling, and n < 1 means down-sampling, the
fractal dimension and length at point t(x) become
Dt = D,
Lt = L + D · log n
(13)
where L = log k.
Proof. For a point x, we have log Nr (x) = D · log( 1r ) +
L (from Eqn. (1)). By the definition of t(x) we know that
t is invertible and kt(x1 ) − t(x2 )k = n kx1 − x2 k. The biLipschitz constant ensures that Nr (t(x)) = N nr (x). Hence
we can write,
n
log N nr (x) = D · log + L
r
1
⇒ log Nr (t(x)) = D · log + D log n + L
r
(14)
1
⇒ log Nr (t(x)) = Dt · log + Lt
r
⇒ Dt = D,
Lt = L + D · log n
Hence, from the above theorem, the fractal dimension of an
image is invariant to scale changes, or in other words, invariant
to local bi-Lipschitz transforms, but not the fractal length of
the image. Theoretically, the fractal dimension of an image
remains unchanged when it is sampled-up with a factor of n
and vice-versa. This is our main motivation to take advantage
of the fractal dimension in our proposed descriptor.
III. P ROPOSED T EXTURE D ESCRIPTOR
Scale variations can create a dramatic impact on the appearance of a texture. There is no locally invariant texture
descriptor that can handle scale changes of such image intensity surface. Our goal in this paper is to build texture
descriptors which are invariant to scale changes in the intensity
surface of natural texture. Even local fractal dimension is a
powerful measurement of surface “roughness” of a natural
image, though the fractal dimension alone is not sufficient to
characterize natural texture. However, the FD yields continuous values and so it needs to be quantized. The quantization
process can be done by calculating the feature distribution
from all the training samples to know about the distribution
of feature space. Finally, some threshold value is calculated
to divided the feature space into fixed number of bins and
the quantization of test FD image is done according to the
training threshold values. Fig. 3 illustrates quantization process
of the feature space using four bins. There are the following
important limitations due to the quantization process, which
need to be addressed carefully.
• To determine the threshold values for each bin, it require
a pre-training stage.
• Texture images are captured under different geometric
and photometric varying conditions. So, the quantization
process fully depends on the training samples.
• The choice of number of bins is a challenging task
although there are some techniques [38] to select it. It
is always a trade-off between optimal number of bins for
the best of accuracy and feature size.
Since the distribution has a finite number of entries, choosing
a few bins may fail to provide sufficient discriminative power
while large number of bins may lead to sparse and unreliable
results. Hence, feature matching becomes computationally
inefficient. The method is explained in the following sections.
Fig. 3.
Quantization procedure of the feature space [39]
A. Fractal Weighted Local Binary Pattern (F WLBP)
A good texture descriptor should have four powerful characteristics: reliability, independence, discrimination, and small
size. Hence, we propose a simple, efficient, yet robust texturedescriptor called the Fractal Weighted Local Binary Pattern
(F WLBP) and offer a solution to the above problem based on
the concept of local image patterns exhibiting self-similarity.
The discrimination power of the proposed descriptor is enhanced by using the fractal dimensions as weights of the
histogram where the sampling method of indexing is an
augmentation of the native L BP [38]. We generated multi-scale
indexing images at different scales by varying the sampling
radius (R ∈ [Rmin , Rmax ]). However, to keep reasonable
complexity, we have kept number of sampling points (N )
constant across all the scales. Since fractal dimension is a
logarithmic function (Eqn. (2)), it helps to reduce effects
of illumination, because the log function expands the values
of darker pixels and compresses the brighter pixels in the
image. As a result, the FD values are spread more uniformly
[40]. Thus, the proposed descriptor is insensitive to scale,
translation, rotation or reflection, illumination; and is also
noise-tolerant.
After generating the scale-invariant FD image (Fig. 4b)
of the original texture using the D BC technique (Sec. II),
we proceed to compute the proposed descriptor – Fractal
v
the FD values of these n locations in the FD image are
F (x1 , y1 ), F (x2 , y2 ), . . . , F (xn , yn ), then the weight w of the
L BP value in the feature histogram becomes
(16)
w = F (x1 , y1 ) + F (x2 , y2 ) + . . . + F (xn , yn ).
(b)
(a)
I
Mathematically, it can be expressed as:
I
F WLBPR,N (p) = I(L BPR,N
x,y , Fx,y , p),
Rmin
O
Rmax
where
(e)
I
(c)
(d)
(f)
Fig. 4. Proposed F WLBP algorithm. (a) input texture image (b) computation
of FD image using Gaussian Scale Space and D BC algorithm (c) taking
L BPR,N samples from input image using R ∈ [Rmin , Rmax ] and constant
N (d) L BP images for varying R (e) indexing output FD image with the
different L BP images to calculate fractal weights (f) final feature vector
Weighted Local Binary Pattern (F WLBP). We generate multiresolution L BP images (Fig. 4(d)) from the input texture image
by varying the sampling radius R ∈ [Rmin , Rmax ] (Fig. 4(c)).
The L BP for a given pixel at location (x, y) in the input image
Ax,y (X × Y ) is computed by comparing its gray value ax,y
with a set of N local circularly and equally spaced neighbours
R,N
Px,y
placed at a radius R ( R ∈ [Rmin , Rmax ]) around the
pixel. L BP is computed for only those pixels whose all N
local neighbours lie within the image, and not for pixels along
the image boundary. The final L BP value of a given pixel is
calculated as
LBPR,N
x,y =
N
X
n=1
R,N
2n−1 × sign(Px,y
− ax,y )
p ∈ [0, 2N −1 ] (17)
(15)
where sign is a unit step function to denote whether a given
input is positive or not, and is defined as
(
1, z ≥ 0
sign(z) =
.
0, z < 0
The range of L BPR,N
x,y depends on the number of neighbouring sampling points (N ) around the pixel (x, y) at radius
R to form the pattern, and its value lies in between 0 to
2N −1 . In other words, the range of L BP is [0, 2N −1 ]. Fig. 4(d)
shows the computed local binary patterns (i.e. L BPR,N
x,y |R =
[Rmin , Rmax ]) for a candidate texture image (Fig. 4(a)).
Finally, we use an indexing operation I to combine each of
the L BP images with the previously generated FD image, and
then compute the feature histogram. The indexing operation
works as follows: in order to compute the histogram frequency
R,N
N −1
]) of
(weight) of a given pixel value (pR,N
x,y | px,y ∈ [0, 2
R,N
the L BP image L BPx,y , we refer to the FD image Fx,y (X ×
Y ). For all the pixel locations in the L BP image which have
the same value as pR,N
x,y , we find the sum of the FD values in
all the same pixel locations in the FD image. This sum is the
weight of the value pR,N
x,y in the histogram.
For instance, if the L BP value pR,N
x,y occurs at n locations
in the L BP image, namely (x1 , y1 ), (x2 , y2 ), . . . , (xn , yn ), and
I(L BPR,N
x,y , Fx,y , p), =
(P
∴ L BPR,N
x,y == p
otherwise
Fx,y ,
0,
where F WLBP(p) gives the weight of the value p in the
histogram, L BPR,N
x,y is the L BP image matrix constructed with
sampling radius R and N sampling points, Fx,y is the FD
image as computed in Sec.( II), and I is the indexing operation. The final F WLBP feature vector (Fig. 4(f)) is constructed
by concatenating all F WLBP(p) values. Since the weights of
the L BP histogram are decided by the value of the fractal dimensions, we named the descriptor as Fractal Weighted Local
Binary Pattern. Given a m texture image, we have created
the feature matrix Mm×n where each row corresponds to
the F WLBP descriptors of a texture. The principal component
analysis (P CA) feature is computed as following. Initially, we
compute the co-variance matrix Σ of feature matrix as,
Pn
(M(., i) − M(., i))(M(., i) − M(., i))T
Σ(i, j) = i=1
n−1
(18)
where Mm×n is the feature matrix, n is the number of feature,
M(., i) represents the ith column of M, and M(., i) is the
mean of respective column. We calculate eigen-vector e of
Σ if it satisfies Σe = λe. Where λ is an eigen-value of Σ.
The eigen-values of Σ are sorted in descending order as λ1 ≥
λ2 ≥ . . . ≥ λn and corresponding eigenvectors e1 , e2 , . . . , en
are used as columns of linear transform matrix U. Finally, M
is multiplied by UT . Thus, the P CA features are provided by
D = UT M. The scatter plot of proposed descriptor without
and with P CA are shown in Fig. 5.
20
200
0.01
15
0.008
150
0.006
10
0.004
100
5
0.002
0
50
140
120
100
80
60
40
20
50
100
150
200
250
300
0
1500
1000
500
(a)
1000
2000
3000
4000
0.035
0.03
0.025
0.02
0.015
0.01
0.005
(b)
0.04
0.06
0.08
0.1
(c)
0.15
300
2000
200
0.1
1000
100
0.05
0
0
0
−1000
−100
−2000
−200
−3000
−300
−4000
200
100
200
0
−100
0
−200
(d)
−200
6000
4000
2000
−0.05
−0.1
−0.15
−0.2
0.2
5000
0
−2000
0
−5000
(e)
0.1
0.2
0.1
0
0
−0.1
−0.1
−0.2
−0.2
(f)
Fig. 5. Top row (a)-(c) represent scatter plot of F WLBP feature, whereas
bottom row (d)-(f) represent F WLBP feature after P CA transform, are extracted
from Brodatz, KTH-TIPS and Outex TC10 databases .
vi
Algorithm 2: Algorithm to extract FWLBPx,y
R,N descriptor, where
N is the number of circular samples taken at radius R.
1
2
3
4
5
6
7
8
9
10
11
Data: Input texture image, Ax,y (X × Y ), FD image F (x, y)
Result: Normalized Fractal Weighted Local Binary Pattern (F WLBP)
Descriptor
initialize (Rmin = 1, Rmax = 3, N = 8, i = R + 1, j = R + 1,
k = [0, K]);
while (R ≤ Rmax ) do
/* Compute L BP image with sampling radius R, from a sample of
R,N
N local circularly spaced neighbours Px,y
around a central
pixel A(x, y) */
PN
R,N
L BP(x,y)R,N = n=1 2(n−1) × sign(Px,y
− A(x, y);
/* Compute weights of pixel values for histogram by indexing
operation */
R,N
F WLBP(p) = I(L
(PBPx,y , Fx,y , p) ;
Bx,y , f or all Bx,y where Ax,y == k
;
I(A, B, k) =
0,
otherwise
/* Generate histrograms, concatenate, and normalize */
HR,N = H IST(F WLBPR,N );
H FWLBP = concatNormalizeF WLBP(HR,N );
end while
B. Complexity of FWLBP
Assuming the image is of size M × M and the kernel is
of size r × r, the algorithmic complexity of the proposed
descriptors is computed as follows. To create the FD image
×M
of an input texture image with the number of blocks Mr×r
using Algorithm 1, the following operations are performed:
2M 2 comparisons, 4(M/r)2 addition, 5(M/r)2 subtractions,
4(M/r)2 multiplication and 2(M/r)2 divisions. Therefore
overall complexity of Algorithm 1 is O(M 2 ). In Algorithm 2,
assuming that neighboring pixels are considered with respect
to each center pixel for the evaluation of the L BP for FD image
of size M × M . The time complexity to evaluate Step 4 of
Algorithm 2 is O(p × M 2 ) [41] because p circular shifting
are required for each pixel, and there are M 2 pixels in total.
Step 6 of Algorithm 2 takes O(M 2 ) for Indexing operation
and Step 9 takes O(M 2 ) for building histogram. The overall
time complexity to compute the proposed F WLBP descriptor
using the combined Algorithms 1 and 2 is O(M 2 ).
C. Comparing Distribution of FWLBP
After computing the F WLBP descriptors, as elaborated in
the previous section, we need to represent their distributions
in the training (model) and test (sample) images. This is done
since the dissimilarity of sample and model histograms is a
test of goodness-of-fit, which can be measured with a nonparametric statistical test. Examples of metrics for evaluating
the fit between two histograms are histogram intersection,
log-likelihood ratio, and chi-square (χ2 ) statistic [38]. In this
paper, the classification is performed via a non-parametric
classifier called nearest subspace classifier (N SC) [42]. Here
we have chosen N SC over popular parametric classifier like
S VM due to the following reasons: the N SC finds an estimation
of the underlying subspace within each class and assigns data
points to the class that corresponds to its nearest subspace,
which does not required any parameter tuning, while S VM
has limitations in speed during both training and testing phase,
and there is always a trade-off between the selection of kernel
function, tuning of its hyper-parameters and classification
performance. In order to avoid the over emphasizing patterns
with large frequency, a pre-processing step is applied to the
proposed feature before using N SC, similar to that in [43]:
p
(19)
X¯m = Xm , m = 1, 2, ..., M
where M is the number of bins, and Xm is the original
frequency of the F WLBP at mth bin. The nearest subspace
classifier (N SC) first calculates the distance from the test
sample y to the ith class and measures the projection residual
ri from y to the orthogonal principle subspace Bi ∈ RM ×m
of the training sets
is spanned by the principal
P Xi , which
T
th
eigenvectors of
=
X
X
class, given as
i i for the i
i
follows,
ri = k(I − PBi )yk2 = k(I − Bi BT
i )yk2
(20)
where P = I ∈ RM ×M is a identity matrix where M rows
are selected uniformly at random. The test sample y is then
assigned to the one of the C classes with the smallest residual
among all classes, i.e.
i∗ = arg min ri
(21)
i=1,...,C
IV. E XPERIMENTAL E VALUATION
A. Texture Databases
We have evaluated the performance of our proposed descriptor on five standard texture databases: Outex TC-00010 (Outex TC10) [4], Outex TC-00012 (Outex TC12) [4], Brodatz album [44], KTH-TIPS [45], and CUReT [46] texture
database. We have compared the performance of the proposed
F WLBP descriptor with L BPR,N [38], L BPu2
R,N , D LBP R,N [41],
su2
riu2
riu2
[47],
multiscale
C
LBP
S
L BPsri
R,N
R,N /MR,N /C(1, 8 +
3, 16 + 5, 24) [48], B IF [9] and other state-of-the-art descriptors. We have tested the classification accuracy using a nonparametric classifiers – N SC, and have reported the classification accuracy using k-fold cross-validation test. In k-fold
cross-validation test, the feature set is randomly partitioned
into k equal sized subsets (k = 10). Of the k subsets, a
single subset is retained as the validation data for testing
the classifier, and the remaining (k − 1) subsets are used as
training data. The average of the classification accuracies over
k rounds give us a final cross-validation accuracy. We have
normalized each input image to have an average intensity of
128 and a standard deviation of 20 [38]. In VZ-MR8 and VZPatch methods, the texture samples are normalized to have an
average intensity of 0 and a standard deviation of 1 [10], [11],
[17]. This is done to remove global intensity and contrast. The
details of two experimental setups are given as follows:
TABLE I
S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2
Texture
Database
KTH-TIPS
Brodatz
CUReT
Image
Rotation
X
X
X
Illumination
Variation
X
X
Scale
Variation
X
X
Texture
Classes
10
32
61
Sample
Size (pixels)
200 x 200
64 x 64
200 x 200
Samples
per Class
81
64
92
Total
Samples
810
2048
5612
E XPERIMENT #1: Brodatz [44] album is chosen to allow a
direct comparison with the state-of-the-art results [41]. There
vii
are 32 homogeneous texture classes 1 . Each image is partitioned into 25 non-overlapping sub-images of size 128 × 128,
and each sub-image is down-sampled to 64 × 64 pixels.
Fig. 6. Ten texture images randomly taken from each class of KTH-TIPS
database.
For the CUReT database [46], we have used the same
subset of images as in [8], [10], [18], which contain 61 texture
classes with 92 images per class. It is designed to contain
large intra-class variation and is widely used to assess the
classification performance. The images are captured under
different illumination and viewing directions with constant
scale. All 92 images of 61 texture classes are cropped into
200 × 200 region and converted to gray scale [10].
The KTH-TIPS database [45] is extended by imaging new
samples of ten CUReT textures as shown in Fig. 6. It contains
texture images with 3 different poses, 4 illuminations, and 9
different scales of size 200×200 and hence each class contains
81 samples. The KTH-TIPS, Brodatz, and CUReT, databases
are summarized in Table I.
TABLE II
S UMMARY OF T EXTURE DATABASE USED IN E XPERIMENT #2
Texture
Database
Outex TC10
Outex TC12
Image
Rotation
X
X
Illumination
Variation
X
Scale
Variation
Texture
Classes
24
24
Sample
Size (pixels)
128 x 128
128 x 128
Samples
per Class
180
200
Total
Samples
4320
4800
E XPERIMENT #2: 24 different homogeneous texture classes
are selected from the Outex texture databases [4], each having the size of 128 × 128 pixels. Outex TC 00010 (Outex TC10) contains texture with illuminant “inca”, and Outex TC 00012 (Outex TC12) contains textures with illuminants “inca”, “horizon”, and “tl84”. Both of the Outex
test suites are collected under 9 different rotation angles
◦
◦
◦
◦
◦
◦
◦
◦
◦
(0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) in each texture
class. The test suites Outex TC10, and Outex TC12 are
summarized in Table II. Running experiments on the whole
Fig. 7. 24 texture images randomly taken from each class of Outex TC10
and Outex TC12 database
database is challenging due to a large number of texture
classes, small number of samples per class, and lack of intraclass variation.
1 The 32 Brodatz textures are Bark, Beachsand, Beans, Burlap, D10, D11,
D4, D51, D52, D5, D6, D95, Fieldstone, Grass, Ice, Image09, Image15,
Image17, Image19, Paper, Peb54, Pigskin, Pressedcl, Raffia2, Raffia, Reptile,
Ricepaper, Seafan, Straw2, Tree, Water, Woodgrain;
TABLE III
C OMPARISON WITH OTHER VARIANTS OF L BP
Methods
Classifier
L BPV [49]
B RINT [50]
L BPriu2
1,8 [38]
D LBP3,24 [41]
sri
L BP1,8 su2 [47]
N NC
N NC
N NC
S VM
N NC
N NC
N NC
N NC
S VM
N NC
N NC
N NC
N SC
L BP(1,8+2,16+3,24) [38]
C LBP SMC [48]
S SLBP [43]
P RI C O L BPg [51]
L BPHF S [52]
L BPHF S M [53]
C OA L BP [54]
Proposed F WLBP
Classification Accuracy (%)
KTH-TIPS [45]
Brodatz [44]
CUReT [46]
95.50
93.80
94.00
97.75
99.22
97.06
82.67
82.16
80.63
86.99
99.16
84.93
89.73
69.50
85.00
95.17
91.60
95.84
97.19
94.80
97.40
97.80
98.55
98.40
96.90
98.40
97.00
94.60
95.90
97.00
94.60
95.90
97.00
94.20
98.00
99.75
99.62
99.10
B. Results of Experiment #1
To test the scale invariance performance of the proposed
descriptor, we have used the KTH-TIPS database, which
contains relatively small variations in scales (i.e, 9 scales,
continually from 0.5 to 2) [45].
In literature, for texture classification task usually L BP
variants were used, in this section, we compared F WLBP
descriptor with some powerful variant of L BPs, which includes
su2
C LBP [48], L BPV [49], LTP [55], Dlbp [41], L BPsri
[47],
R,N
P RI C OLBP [51], B RINT [50], and C OA L BP [54]. The classification performance is evaluated on three well known benchmark texture databases (KTH-TIPS, Brodatz, and CUReT)
and results are shown in Table III. The observations noted
su2
from Table III are as follows: The scale-invariant L BPsri
R,N
riu2
descriptor performs better than L BPR,N . However, the perriu2
formance is worse than multi-resolution L BPR,N
descriptor,
riu2
riu2
and C LBP SR,N /MR,N /C descriptor; and much worse than
the proposed descriptor. This is because extracting consistent
and accurate scale for each pixel is difficult. However, the
su2
L BPsri
R(i,j),8 provides good performance in controlled environment [47], but it fails over more complex databases. The
D LBP, when combined with Gabor features, attains a higher
classification rate than the conventional L BP with N NC. However, its performance is quite less than the proposed F WLBP,
as it does not consider changes in scale. F WLBP achieves remarkably better classification performance than C LBP, L BPV,
L BPHF S and L BPHF S M on KTH-TIPS, Brodatz and
CUReT, texture datasets and yields comparable performance
with D LBP. Note that L BP, L BPHFS , L BPHF S M , C LBP,
and L BPV generally encode multi-scale information whereas
the proposed F WLBP descriptor encodes the spatial fractal
dimension to characterize the local scale information into the
1-D L BP histogram.
Table IV shows performance of texture classification performance other than L BP variants. Lazebinik et al. [20]
proposed to detect interest regions using Harris-affine corner
and Laplacian-affine blobs and then extracted S PIN and R IFT
as texture signatures after normalizing these regions. Finally,
texture classification is performed using nearest neighbor
classifier (N NC). Caputo et al. [56] used S VM kernel instead
of N NC and reveal that the S VM classifier could achieve
reasonably better performance. Zhang et al. [8] proposed
viii
0.8
FWLBP
LBP
0.6
1
S
3
S
4
S
5
S
6
S
7
S
8
S
9
S
(d)
S
2
0.4
0.2
0
(a)
(b)
1
2
3
4
5
Scales
6
7
8
(c)
Fig. 8. (a)-(c) represent the individual histograms (HR,N of F WLBP, where R = 1, 2, 3 and N = 8) for a texture sample taken from the KTH-TIPS database
[45], having 9 different scales. The abscissa and ordinate represent number of bins and feature probability distribution, respectively. As the histograms of
individual F WLBP for the 9 different scales are overlapping, it implies that the F WLBP descriptor is scale invariant. (d) represents the Chi-square (χ2 ) distance
of proposed F WLBP and L BP descriptor extracted from original texture image (S 1 ) and 8 texture image with different scale (S 2 − S 9 ).
Methods
Classifier
VZ-MR8 [10]
VZ-Patch [11]
Lazebnik et al. [20]
Zhang et al. [8]
Liu et al. [18]
M FS [24]
Capato et al. [56]
P FS [5]
B IF [9]
Proposed F WLBP
N NC
N NC
N NC
S VM
S VM
N NC
S VM
S VM
Shift N NC
N SC
Classification Accuracy (%)
KTH-TIPS [45]
Brodatz [44]
CUReT [46]
94.50
94.62
97.43
92.40
87.10
98.03
91.30
88.20
72.50
96.10
95.90
95.30
94.20
98.50
81.62
94.80
95.00
98.50
97.35
98.50
98.47
98.60
99.75
99.62
99.10
It is interesting to note that even for the database having
large number of variations and a few number of samples, this
property can make the proposed descriptor suitable for other
applications where the number of features plays an important
role.
100
99
98
Accuracy (%)
TABLE IV
T EXTURE C LASSIFICATION R ESULTS ON KTH-TIPS, B RODATZ , AND
CUR E T
97
96
95
Outex_TC10
KTH−TIPS
Brodatz
94
93
object and texture classification by analyzing different texture
features and kernels. Recently, global scale invariant feature
extraction methods drew attention because local scale normalization is usually slow due to pixel by pixel operations. Xu et
al. [21] and Quan et al. [5] have classified the image pixels
into multiple point sets by gray intensities or local feature
descriptors. Multi-scale B IF [9] at scales σ, 2σ, 4σ, and 8σ
gives better performance than the proposed F WLBP with N NC
classifier. This is mainly because B IF uses pyramid histogram
with time inefficient shift matching scheme. Also, the feature
dimension of B IF descriptor [9], C LBP [48], S SLBP [43] and
P RI C OLBP [51] are larger (64 = 1296, 2200, 480 × 5 = 1000
and 590 × 2 = 1180) than the dimension of proposed F WLBP
descriptor (256×3 = 768). The performance of B IF is reduced
when scale shifting scheme is not considered [9]. Apart from
bag-of-words model, the variant of L BP based descriptors,
sri su2
e.g., C LBP 2 , L BPV, LTP, D LBP, L BPR,N
, P RI C OLBP,
B RINT, C OA L BP, and S S L BP also perform reasonably well
on texture classification task. The observations noted from
Table IV are as follows: F WLBP also exceeds the classification
performance of several bag-of-words methods, [8], [11], [18],
[20], [54], [56]. Fig. 9 shows the graph of success rates
against the number of selected feature on Brodatz, KTHTIPS and Outex TC10 texture databases. The classification
rate of proposed descriptor rapidly increases due to P CA
transform, which carries the most relevant information with
large variance among the first component of the feature matrix.
2 We
used the best C LBP settings i.e., C LBP S/M/C in this paper
92
50
100
150
200
Feature Dimension
250
300
Fig. 9. Success rate against the number of descriptors on Brodatz, KTH-TIPS
and Outex TC10 texture databases
Although the images are captured under scale, rotation,
and illumination variations, the proposed F WLBP gives sound
performance as given by results in Table IV, and achieves
comparable, and sometimes even better performance, than the
state-of-the-art methods. It validates that the encoding strategy
preserves the relative information about local scale change
along with orientation angle are effective. An illustration of
the scale invariance property of the proposed descriptor is
given in Fig. 8, where S1 -S9 show nine KTH-TIPS texture
images of “corduroy” class at different scales from 0.5 to
2, and (a)-(c) depict the histograms (HR,N |R ∈ [1, 2, 3])
of individual F WLBPR,N descriptor with R = 1, 2, 3, and
N = 8. It is evident from Fig. 8(a)-(c) that the histograms of
individual F WLBP for the 9 different scales are approximately
identical. In addition Fig. 8(d) shows the Chi-square (χ)
distance [11] between extracted F WLBP and L BP descriptor
from original texture image (S 1 ) and 8 texture images with
different scale (S 2 − S 9 ), its shown that proposed descriptor
has less χ-distance compared to L BP. Therefore, from both
the observations it implies that the F WLBP descriptor is not
sensitive to small scale variations. The proposed descriptor
achieves scale invariance by utilizing the properties of Fractal Dimension and Gaussian Scale Space, as explained in
ix
Theorem 1. Fig. 10(a)-(b) represent images of two texture
classes taken form Brodatz database and Fig. 10(c) shows P CA
transformed F WLBP descriptor extracted from three images
per texture class and respective feature probability distribution
functions (P DF). Since both texture classes contain very small
intra-class variation even though their P DF provides a strong
indication about the discriminative power of the proposed
descriptor.
3
class 1
class 2
2.8
2.6
PDF
2.4
(a)
2.2
2
1.8
1.6
1.4
1.2
1
2
4
6
8
10
Descriptors
(b)
(c)
Fig. 10.
Discriminative power of the proposed F WLBP descriptors are
visualized using P CA. We have taken 6 images from two classes of Brodatz
textures and extracted the F WLBP. Notice that the classes are substantially
separated by the curves.
TABLE V
T HE C LASSIFICATION ACCURACIES OF PROPOSED F WLBP AND F WLBPu2
DESCRIPTORS USING DIFFERENT SCALING FACTORS OF D BC ALGORITHM
ON BRODATZ TEXTURE DATABASE .
Methods
Proposed
FWLBP
Std.
Error
Proposed
FWLBPu2
Std.
Error
Classification Rates With Different box sizes ranges rmin to rmax
2×2
2×2
2×2
2×2
2×2
to
to
to
to
to
2×2
3×3
4×4
5×5
6×6
7×7
99.24
99.25
99.27
99.27
99.31
99.62
±0.9216
0.0052
±0.9688
0.0052
±0.7547
0.0052
±0.6701
0.0104
±0.6484
0.0104
±0.3257
0.0002
98.05
98.16
98.30
98.45
98.53
98.57
±0.6717
0.0156
±0.8426
0.0208
±0.8590
0.0208
±0.8058
0.0156
±0.7514
0.0104
±0.7243
0.0260
C. Analysis of parameter rmax
The proposed fractal based descriptor has only one hyperparameter rmax , which is the maximum value of the scaling
factor of the D BC algorithm. The rmax represents how much a
specific intrinsic structure is self-similar [36] to its surrounding
pixels. The different values of rmax influence the deviation of
classification accuracies. Table V shows recognition accuracy
for Brodatz textures using proposed F WLBP and F WLBPu23 ,
where rmax values are ranging from 2 to 7. Its shows clearly
that both the descriptors have similar trends towards rmax and
recognition rate increases till it reaches rmax to 7. Table V also
indicates that for different scaling factors the proposed F WLBP
descriptor significantly outperforms F WLBPu2 on well-known
Brodatz texture database (includes images of scale and rotation
or view-point variations). To compute fractal dimension of an
image of size less than let say, 200 × 200 fast, Faraji and
Qi [40] recommend rmax to be used in between 7 and 10 to
3 Where
‘u2’ indicates uniform pattern encoding;
compromise between good texture recognition accuracy and
computational overheads. In our experimental setup, we use 7
as rmax value for all the texture databases.
D. Results of Experiment #2
The results of Experiment #2, carried out on Outex TC10
and Outex TC12 are tabulated in Table VI. It shows the average classification accuracy obtained by k-fold cross-validation
test (k = 10) for proposed descriptor, and the comparative
summary of the results for variants of L BP e.g., L BP(R,N )
[38], VZ-MR8 [10], VZ-Patch [11] and recent state-of-theart bag-of-word methods. The observations made from the
results of Experiment #2 are stated as follows. L BP and L BPV
have similar feature dimensions, but the later one incorporates additional contrast measures to the pattern histogram,
it produces a significant performance improvement compared
to the conventional L BP. L BPriu2
R,N /VAR R,N provides better
performance compared to L BPVriu2
R,N , because L BP and local
variance of a texture image are complementary; and hence
the joint distribution of L BP and local variance gives better
results than any one alone. C LBP S/M/C is created by fusing
C LBP S and C LBP M/C. It provides better performance
compared to other variants of C LBP as it has complementary
features of sign and magnitude, in addition to the center pixel
representing the gray value of the local patch. C DCP [23]
achieves improved performance over C LBP since in C DCP
patterns are extracted from component and holistic levels.
The state-of-the-art bag-of-words statistical algorithms, VZTABLE VI
AVERAGE CLASSIFICATION ACCURACY (%) ON O UTEX TC10 AND
O UTEX TC12 USING STATE - OF - THE - ART SCHEMES
Method
Classifier
Outex TC10
VZ-MR8 [10]
VZ-Patch [11]
LTP [55]
VAR [57]
L BP [38]
L BPriu2
R,N
L BP/VAR
riu2
L BPVR,N [49]
C LBP S/M/C [48]
T
L BPN
R,N [58]
D LBPR=3,N =24 [41]
B RINT C S C M [50]
P TP [59]
C DCP [23]
Proposed F WLBP
N SC
N SC
N NC
N NC
S VM
N NC
N NC
N NC
N NC
N NC
S VM
N NC
N NC
N SC
N SC
93.59
92.00
76.06
90.00
97.60
84.89
96.56
91.56
98.93
99.24
98.10
99.35
99.56
99.76
99.97
Outex TC12
horizon
tl84
92.82
92.55
92.06
91.41
63.42
62.56
64.35
62.93
85.30
91.30
63.75
65.30
78.08
79.31
77.01
76.62
92.29
90.30
96.18
94.28
87.40
91.60
97.69
98.56
98.08
97.94
99.82
99.62
99.98
99.93
Average
92.99
91.82
67.34
72.42
91.40
71.31
84.65
81.73
93.84
96.56
92.36
98.12
98.52
99.72
99.96
MR8 and VZ-Patch, take dense response from multiple filters.
However, their performance is poor compared to the proposed
F WLBP. Also, feature extraction and matching complexity
of these two techniques is quite high [11], when compared
to the proposed F WLBP due to the MR8 needs to find 8
maximum responses after 38 filters convolving with the image
and compares every 8-dimension vector in an image with all
the textons to build histograms using clustering technique.
D LBP + N GF utilizes the top ranking 80% of L BP pattern
to improve the recognition, as compared with the results
obtained using original L BPu2
R,N . But like VAR R,N , it neglects local spatial structure which is important for texture
discrimination. Also, D LBP needs pre-training stage, and the
dimensionality of the D BLP varies with the training samples.
x
0.7
FWLBP
0.6
5
10
15
30
45
60
75
LBP
0.5
90
(d)
0
0.4
0.3
0.2
0.1
0
(a)
(b)
1
2
3
4
5
Angles
6
7
8
(c)
Fig. 11. (a)-(c) represent individual F WLBP histograms (F W LBPR,N |R ∈ [1, 2, 3]) of a texture sample taken from the Outex database, with 9 different
orientations. The abscissa and ordinate represent the number of bins and feature probability distribution, respectively. The histograms show that the feature
distribution for the different texture orientations are approximately overlapping, which signify the rotation invariance property of the proposed F WLBP descriptor.
◦
◦
◦
(d) represents the Chi-square (χ) distance between original texture image (0 ) and 8 texture image with different angles (5 − 90 )
Though the trend is clear from the performance Table VI,
we have further analysed the performance using one way
statistical analysis of variance (A NOVA) test [60]. A NOVA is
a collection of statistical tests used to analyze the differences
among group means and their associated procedures. In other
word, one-way A NOVA is used to test the equality of two
or more means at one time using the variances. The null
hypothesis H0 for the test is, there is no significant difference
among group means. We have taken the significance level α
= 0.05 for this A NOVA test. We can reject H0 if the p-value
for an experiment is less than the selected significant level,
which implies that the at least one group mean is significantly
different from the others. To understand why the performance
of proposed F WLBP descriptor was significantly different from
well-known descriptors such as VZ-Patch, VZ-MR8, B RINT,
D LBP, C LBP, and L BPriu2 , we conduct one way A NOVA test
with significance level α = 0.05. The test results are shown
in Table VII where the p-value (1.6460e−07 ) is much lesser
than the pre-select significance level α = 0.05. This indicates
that the performance of proposed descriptor significantly better
than other descriptors and hence we can reject the hypothesis
H0 . In addition, the box plot corresponding to aforementioned
A NOVA test is shown in Fig. 12, which also clearly indicates
that the mean performance of F WLBP descriptor is significantly better than the well-known descriptors such as VZ-MR8
[10], VZ-Patch [11], B RINT [50], D LBP [41], C LBP [48], and
L BPriu2 [38].
100
Recognition rates (%)
For comparison, we have taken the best results of D LBP with
T
R = 3 and N = 24 in Table. VI. The L BPN
R,N [58] based
methods and B RINT [50] give better performance compared
to other state-of-the-art L BP methods. However, compared
to the proposed F WLBP, their accuracies are lower. This is
T
because L BPN
R,N extracts features by locally rotation invariant
riu2
L BPR,N approach, which produces only 10 bins. Such small
features cannot represent each class well. On the other hand,
B RINT extracts a large number of features from multiple
resolution (R = 1, 2, 3, 4) by utilizing rotation invariant
L BPri
R,N approach, but it loses some global image information.
From Table VI, it is evident that our proposed descriptor
provides better classification performance compared to other
state-of-the-art methods. The better performance is due to
generation of a six-layer Gaussian Scale Space to provide
basic scale-invariance (Fig. 1), transforming the scale space to
fractal dimension (FD) images, which also provides additional
levels of scale invariance and some degree of illumination
invariance (Sec. III), and finally using the FD as weights for
the values in the feature vector histograms. When all these are
put together we achieve high degree of invariance to scale,
rotation, and reflection, and are able to capture the micro
structure in the different illumination controlled environments
(for images like “inca”, “horizon” and “tl84”). To visualize the
rotation invariant characteristic of our proposed descriptor, an
example of the F WLBP feature distribution for a texture sample
is taken from the Outex TC10 database (with 9 orientations –
◦
◦
◦
◦
◦
◦
◦
◦
◦
0 , 5 , 10 , 15 , 30 , 45 , 60 , 75 , and 90 ) and is shown in
Fig. 11. Fig 11(a)-(c) represent the histograms (HR,N |R ∈
[1, 2, 3]) of individual (F WLBPR,N |R ∈ [1, 2, 3]). The histograms show that the F WLBP feature distribution for the
different texture orientations are approximately overlapping,
which signify the rotation invariance property of the F WLBP
descriptor. In addition, Fig. 11(c) represents the histograms of
individual F WLBP for the 9 different rotational angles, which
are approximately identical. In addition, Fig. 8(d) shows the
Chi-square (χ) distance [11] between extracted F WLBP and
◦
L BP features from original texture image (0 ) and 8 texture
◦
◦
images with different rotational view-points (5 − 90 ), it
is shown that the proposed descriptor has less χ-distance
compared to L BP.
95
90
85
80
75
70
65
FWLBP VZ−Patch VZ−MR8
BRINT
DLBP
CLBP
LBP_riu2
State−of−the−art descriptors
Fig. 12. The box plot (Descriptor vs. Accuracy) corresponding to one way
statistical A NOVA test for proposed F WLBP and state-of-the-art descriptors on
Outex, KTH-TIPS, Brodatz, CUReT databases.
xi
TABLE VII
O NE WAY STATISTICAL A NOVA TEST RESULTS FOR O UTEX , KTH-TIPS,
B RODATZ , AND CUR E T DATABASES , WHERE THE SIGNIFICANCE LEVEL α
IS 0.05.
Source
Groups
Error
Total
SS
1923.34
0621.82
2515.67
df
06
28
34
MS
325.557
022.208
F
14.36
Prob (p) > F
1.6460e−07
where the convolution filters are pre-defined as wavelet and
no learning process is needed. Inspired by ScatNet, a simple
deep learning network, P CA N ET is proposed by chan et al.
[64] which is based on cascading of multistage P CA, binary
hashing and histogram pooling.
E. Robustness to Noise
S NR = 5
24.06
99.74
51.22
57.37
50.88
88.31
99.93
Table VIII demonstrates the noise robustness of different
methods on Outex TC10 database based on classification rates
of various noise levels (measured using S NR i.e Signal to
Noise Ratio). The proposed descriptor achieves state-of-theart results in term of accuracy mean and standard deviations
100 ± 0%, 100 ± 0%, 99.97 ± 0.0732%, 99.95 ± 0.0976%,
and 99.93 ± 0.1118% on S NR = 100 dB, 30 dB, 15 dB, 10
dB, and 5 dB, respectively. It can be observed from Table VIII
that the proposed F WLBP descriptor is very modestly improved
as compared with other L BP based descriptors. The proposed
descriptor has inherited this property from the calculation of
fractal dimension in Gaussian scale space representation in
contrast to the L BP and its variants.
F. Comparison of Proposed F WLBP with state-of-art deep
learning based methods
A key characteristic of deep convolutional neural networks
(C NN)(see Fig. 13) is a hierarchical representation which is
universal and directly generated from the data, used to perform
image classification task. Deep C NNs have universal shown
their power of pattern recognition. However, the robustness for
recognition is limited due to the lack of geometric invariance
of global C NN activations. An effective texture descriptor FVCNN has been introduced by Cimpoi et al. [7], where at first
C NN features are extracted at multiple scales. Then an orderless Fisher Vector pooling operation is performed. Despite
significant progress of deep C NN models, not much analytical
insights into its internal operation and behaviour is available.
Mallat et al. [62], [63] have introduced scale and rotation
invariant wavelet convolution scattering network (ScatNet)
TABLE IX
T HE TEXTURE CLASSIFICATION PERFORMANCE AND FEATURE
DIMENSIONALITY OF THE PROPOSED L MP AND STATE - OF - ART DEEP
LEARNING BASED METHODS
Classification Accuracy (%)
Methods
FV-VGGDM (S VM) [7], [65]
FV-AlexNet (S VM) [65], [67]
S CAT N ET (P CA) [62], [63]
S CAT N ET (N NC) [62], [63]
P CA N ET (N NC) [64]
P CA N ETriu2 (N NC) [64]
R AND N ET (N NC) [64]
R AND N ETriu2 (N NC) [64]
Proposed F WLBP (N NC)
Proposed F WLBP (N RS)
80.00
67.30
99.69
98.59
39.87
35.36
47.43
43.54
99.79
99.86
82.30
72.30
99.06
98.10
45.53
40.88
52.45
45.70
99.41
99.73
88.20
77.90
68.92
63.66
59.43
52.15
60.67
56.90
98.37
99.87
99.80
99.10
96.15
88.64
57.70
49.80
56.57
48.20
97.12
99.90
Feature
C LBP SMC [48]
LTPriu2
R=3,N =24 [55]
N RLBPriu2
R,N [61]
B RINT [50]
Proposed F WLBP
Classification Accuracy (%)
S NR = 30
S NR = 15
S NR = 10
86.93
67.24
49.79
99.79
99.76
99.76
98.12
94.58
86.07
98.31
93.44
84.32
81.16
77.52
70.16
96.48
95.47
92.97
100
99.97
99.95
Dimention
N NC
N NC
N NC
N NC
N NC
N NC
N NC
S NR = 100
95.03
99.30
99.45
84.49
97.76
100
UIUC
Classifier
L BPriu2
R,N [38]
T
L BPN
R,N,k [58]
KTH-TIPS
Methods
A simple variation of P CA N ET, named R AND N ET, in which
the cascaded filters are randomly selected but not learned, was
also proposed by Chan et al. [64]. One of the major trends
in deep C NN research community is to use more and more
complex networks to improve the classification performances.
However, it needs the powerful and large memory computer
and GPUs to train very deep and computationally expensive
networks. The comparative results of texture classification performance with feature dimensionality of the proposed F WLBP
and state-of-art deep learning based methods such as F V-C NN
[7], [65], S CAT N ET [62], [63], P CA N ET, P CA N ETriu2 , and
R AND N ET [64], are tabulated in Table IX. It is observed from
Table IX that the proposed F WLBP provides comparable or
better classification performance compared to state-of-art deep
learning based methods. In addition, the feature dimension
of proposed F WLBP descriptor is less than the deep learning
based models4 .
Outex TC12
TABLE VIII
C LASSIFICATION ACCURACY (%) OF P ROPOSED M ETHOD AND
D IFFERENT STATE - OF - THE - ART M ETHODS ON O UTEX TC10 WITH
D IFFERENT N OISE L EVELS IN TERM OF D B .
Fig. 13. A Deep C NN architecture where the input is processed in a feed
forward manner through the stage of convolutions and sub-sampling and
finally classified with a linear or non-linear classifier.
Outex TC10
To evaluate the performance of the proposed method in
noisy environment, the experiments are carried out on Outex TC10 texture database (discussed in subsec. IV-A) by
adding white Gaussian noise, resulting in different Signal to
Noise Ratio (S NR). The training and testing set-up are the
same as in noise-free situation.
65536
32768
596
596
2048
80
2048
80
354
354
V. C ONCLUSIONS
In this paper, we have proposed a simple, efficient yet robust
descriptor, called the Fractal Weighted Local Binary Pattern
(F WLBP) for texture classification. At first, a Gaussian Scale
Space representation of the texture image is generated, and
4 The
results of deep learning based methods are taken from Liu et al. [66]
xii
then Differential Box Counting (D BC) algorithm is used to
transform the images into fractal dimension. An augmented
form of Local Binary Pattern (L BP), with fixed sample size
and varying radius is used, and the weights for the samples are
calculated using an indexing function. Finally, the normalized
feature vector is formed by concatenating the histogram of
F WLBP for all elements of L BP. Experimental results show
that our proposed F WLBP descriptor provides promising performance under scale, rotation, reflection, and illumination
variation. Comparative study indicates that our descriptor also
performs better, as compared to other state-of-the-art methods.
In addition, the dimensionality of the extracted feature vector
is significantly less the state-of-the-art method, making it
computationally efficient. As it offers reasonably high speed
to extract the features, this descriptor may be applied to
real time scenarios. Our current work is focused on texture
classification. In future, this work can be utilized in texture
classification in multi-texture scenario, also in other domains
like face and object recognition.
ACKNOWLEDGEMENT
The authors sincerely thank the Machine Vision Group
(MVG), University of Oulu, Finland, Visual Geometry Group
(VGG), University of Oxford, UK, Department of Computing,
The Hong Kong Polytechnic University, China, and Department of Computer Science, University College London, UK
for sharing the source codes of L BP, VZ-MR8, C LBP, and
B IF descriptors. The authors would also like to thank Manik
Varma, Timor Kadir and Andrew Zisserman for providing
preprocessed CUReT datasets.
R EFERENCES
[1] X. Xie and M. Mirmehdi, “A Galaxy of Texture Features,” in Handbook
Of Texture Analysis. World Scientific, 2008, pp. 375–406.
[2] R. M. Haralick, K. Shanmugam et al., “Textural features for image
classification,” IEEE Transactions on systems, man, and cybernetics,
no. 6, pp. 610–621, 1973.
[3] T. Randen and J. H. Husoy, “Filtering for texture classification: A
comparative study,” IEEE Transactions on pattern analysis and machine
intelligence, vol. 21, no. 4, pp. 291–310, 1999.
[4] T. Ojala, T. Maenpaa, M. Pietikainen, J. Viertola, J. Kyllonen, and
S. Huovinen, “Outex-new framework for empirical evaluation of texture
analysis algorithms,” in Pattern Recognition, 2002. Proceedings. 16th
International Conference on, vol. 1. IEEE, 2002, pp. 701–706.
[5] Y. Quan, Y. Xu, and Y. Sun, “A distinct and compact texture descriptor,”
Image and Vision Computing, vol. 32, no. 4, pp. 250–259, 2014.
[6] V. Andrearczyk and P. F. Whelan, “Using filter banks in convolutional
neural networks for texture classification,” Pattern Recognition Letters,
vol. 84, pp. 63–69, 2016.
[7] M. Cimpoi, S. Maji, I. Kokkinos, and A. Vedaldi, “Deep filter banks
for texture recognition, description, and segmentation,” International
Journal of Computer Vision, vol. 118, no. 1, pp. 65–94, 2016.
[8] J. Zhang, M. Marszałek, S. Lazebnik, and C. Schmid, “Local features
and kernels for classification of texture and object categories: A comprehensive study,” International journal of computer vision, vol. 73, no. 2,
pp. 213–238, 2007.
[9] M. Crosier and L. D. Griffin, “Using basic image features for texture
classification,” International Journal of Computer Vision, vol. 88, no. 3,
pp. 447–460, 2010.
[10] M. Varma and A. Zisserman, “A statistical approach to texture classification from single images,” International Journal of Computer Vision,
vol. 62, no. 1-2, pp. 61–81, 2005.
[11] ——, “A statistical approach to material classification using image
patch exemplars,” IEEE transactions on pattern analysis and machine
intelligence, vol. 31, no. 11, pp. 2032–2047, 2009.
[12] I. WEISS, “Geometric invariants and object recognition,” International
journal of computer vision, vol. 10, no. 3, pp. 207–231, 1993.
[13] R. L. Kashyap and A. Khotanzad, “A model-based method for rotation
invariant texture classification,” IEEE Transactions on Pattern Analysis
and Machine Intelligence, no. 4, pp. 472–481, 1986.
[14] J. Mao and A. K. Jain, “Texture classification and segmentation using
multiresolution simultaneous autoregressive models,” Pattern recognition, vol. 25, no. 2, pp. 173–188, 1992.
[15] J.-L. Chen and A. Kundu, “Rotation and gray scale transform invariant
texture identification using wavelet decomposition and hidden Markov
model,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 2, pp. 208–214, 1994.
[16] H. Deng and D. A. Clausi, “Gaussian MRF rotation-invariant features
for image classification,” IEEE transactions on pattern analysis and
machine intelligence, vol. 26, no. 7, pp. 951–955, 2004.
[17] M. Varma and R. Garg, “Locally invariant fractal features for statistical
texture classification,” in Computer Vision, 2007. ICCV 2007. IEEE 11th
International Conference on. IEEE, 2007, pp. 1–8.
[18] L. Liu and P. Fieguth, “Texture classification from random features,”
IEEE Transactions on Pattern Analysis and Machine Intelligence,
vol. 34, no. 3, pp. 574–586, 2012.
[19] C.-H. Yao and S.-Y. Chen, “Retrieval of translated, rotated and scaled
color textures,” Pattern Recognition, vol. 36, no. 4, pp. 913–929, 2003.
[20] S. Lazebnik, C. Schmid, and J. Ponce, “A sparse texture representation
using local affine regions,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 27, no. 8, pp. 1265–1278, 2005.
[21] Y. Xu, H. Ji, and C. Fermüller, “Viewpoint invariant texture description using fractal analysis,” International Journal of Computer Vision,
vol. 83, no. 1, pp. 85–100, 2009.
[22] J. Zhang, J. Liang, and H. Zhao, “Local energy pattern for texture classification using self-adaptive quantization thresholds,” IEEE transactions
on image processing, vol. 22, no. 1, pp. 31–42, 2013.
[23] S. K. Roy, B. Chanda, B. B. Chaudhuri, D. K. Ghosh, and S. R. Dubey,
“A complete dual-cross pattern for unconstrained texture classification.”
[24] Y. Xu, H. Ji, and C. Fermuller, “A projective invariant for textures,” in
Computer Vision and Pattern Recognition, 2006 IEEE Computer Society
Conference on, vol. 2. IEEE, 2006, pp. 1932–1939.
[25] J. B. Florindo, A. R. Backes, M. de Castro, and O. M. Bruno, “A
comparative study on multiscale fractal dimension descriptors,” Pattern
Recognition Letters, vol. 33, no. 6, pp. 798–806, 2012.
[26] Y. Quan, Y. Xu, Y. Sun, and Y. Luo, “Lacunarity analysis on image patterns for texture classification,” in Proceedings of the IEEE conference
on computer vision and pattern recognition, 2014, pp. 160–167.
[27] B. B. Chaudhuri and N. Sarkar, “Texture segmentation using fractal
dimension,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 1, pp. 72–77, 1995.
[28] N. Sarkar and B. B. Chaudhuri, “An efficient differential box-counting
approach to compute fractal dimension of image,” IEEE Transactions
on Systems, Man and Cybernetics, vol. 24, no. 1, pp. 115–120, 1994.
[29] O. S. Al-Kadi, D. Watson et al., “Texture analysis of aggressive
and nonaggressive lung tumor ce ct images,” IEEE transactions on
biomedical engineering, vol. 55, no. 7, pp. 1822–1830, 2008.
[30] B. B. Mandelbrot and R. Pignoni, The fractal geometry of nature. WH
freeman New York, 1983, vol. 173.
[31] T. Lindeberg, “Scale-space theory: A basic tool for analyzing structures
at different scales,” Journal of applied statistics, vol. 21, no. 1-2, pp.
225–270, 1994.
[32] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,”
International journal of computer vision, vol. 60, no. 2, pp. 91–110,
2004.
[33] L. D. Griffin and M. Lillholm, “Symmetry sensitivities of derivativeof-gaussian filters,” IEEE transactions on pattern analysis and machine
intelligence, vol. 32, no. 6, pp. 1072–1083, 2010.
[34] J. D. Victor and B. W. Knight, “Simultaneously band and space limited
functions in two dimensions, and receptive fields of visual neurons,” in
Perspectives and Problems in Nolinear Science. Springer, 1994, pp.
375–419.
[35] J. J. Koenderink, “The structure of images,” Biological cybernetics,
vol. 50, no. 5, pp. 363–370, 1984.
[36] K. Falconer, Fractal geometry: mathematical foundations and applications. John Wiley & Sons, 2004.
[37] R. Van Den Boomgaard and A. Smeulders, “The morphological structure
of images: The differential equations of morphological scale-space,”
IEEE transactions on pattern analysis and machine intelligence, vol. 16,
no. 11, pp. 1101–1113, 1994.
xiii
[38] T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale
and rotation invariant texture classification with local binary patterns,”
IEEE Transactions on pattern analysis and machine intelligence, vol. 24,
no. 7, pp. 971–987, 2002.
[39] M. Pietikäinen, A. Hadid, G. Zhao, and T. Ahonen, Computer Vision
Using Local Binary Patterns. Springer Science & Business Media,
2011, vol. 40.
[40] M. R. Faraji and X. Qi, “Face recognition under varying illumination
with logarithmic fractal analysis,” IEEE Signal Processing Letters,
vol. 21, no. 12, pp. 1457–1461, 2014.
[41] S. Liao, M. W. Law, and A. C. Chung, “Dominant local binary patterns
for texture classification,” IEEE transactions on image processing,
vol. 18, no. 5, pp. 1107–1118, 2009.
[42] J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Robust
face recognition via sparse representation,” IEEE transactions on pattern
analysis and machine intelligence, vol. 31, no. 2, pp. 210–227, 2009.
[43] Z. Guo, X. Wang, J. Zhou, and J. You, “Robust texture image representation by scale selective local binary patterns,” IEEE Transactions on
Image Processing, vol. 25, no. 2, pp. 687–699, 2016.
[44] P. Brodatz, Textures: a photographic album for artists and designers.
New York, NY, USA: Dover Pubns, 1966.
[45] E. Hayman, B. Caputo, M. Fritz, and J.-O. Eklundh, “On the significance of real-world conditions for material classification,” in European
conference on computer vision. Springer, 2004, pp. 253–266.
[46] K. J. Dana, B. Van Ginneken, S. K. Nayar, and J. J. Koenderink,
“Reflectance and texture of real-world surfaces,” ACM Transactions On
Graphics (TOG), vol. 18, no. 1, pp. 1–34, 1999.
[47] Z. Li, G. Liu, Y. Yang, and J. You, “Scale-and rotation-invariant local
binary pattern using scale-adaptive texton and subuniform-based circular
shift,” IEEE Transactions on Image Processing, vol. 21, no. 4, pp. 2130–
2140, 2012.
[48] Z. Guo, L. Zhang, and D. Zhang, “A completed modeling of local binary
pattern operator for texture classification,” IEEE Transactions on Image
Processing, vol. 19, no. 6, pp. 1657–1663, 2010.
[49] ——, “Rotation invariant texture classification using LBP variance
(LBPV) with global matching,” Pattern recognition, vol. 43, no. 3, pp.
706–719, 2010.
[50] L. Liu, Y. Long, P. W. Fieguth, S. Lao, and G. Zhao, “Brint: binary
rotation invariant and noise tolerant texture classification,” IEEE Transactions on Image Processing, vol. 23, no. 7, pp. 3071–3084, 2014.
[51] X. Qi, R. Xiao, C.-G. Li, Y. Qiao, J. Guo, and X. Tang, “Pairwise
rotation invariant co-occurrence local binary pattern,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 36, no. 11, pp. 2199–
2213, 2014.
[52] T. Ahonen, J. Matas, C. He, and M. Pietikäinen, “Rotation invariant
image description with local binary pattern histogram fourier features,”
Image analysis, pp. 61–70, 2009.
[53] G. Zhao, T. Ahonen, J. Matas, and M. Pietikainen, “Rotation-invariant
image and video description with local binary pattern features,” IEEE
Transactions on Image Processing, vol. 21, no. 4, pp. 1465–1477, 2012.
[54] R. Nosaka, Y. Ohkawa, and K. Fukui, “Feature extraction based on cooccurrence of adjacent local binary patterns,” in Pacific-Rim Symposium
on Image and Video Technology. Springer, 2011, pp. 82–91.
[55] X. Tan and B. Triggs, “Enhanced local texture feature sets for face
recognition under difficult lighting conditions,” in International Workshop on Analysis and Modeling of Faces and Gestures. Springer, 2007,
pp. 168–182.
[56] B. Caputo, E. Hayman, M. Fritz, and J.-O. Eklundh, “Classifying
materials in the real world,” Image and Vision Computing, vol. 28, no. 1,
pp. 150–163, 2010.
[57] T. Ojala, M. Pietikäinen, and D. Harwood, “A comparative study of
texture measures with classification based on featured distributions,”
Pattern recognition, vol. 29, no. 1, pp. 51–59, 1996.
[58] A. Fathi and A. R. Naghsh-Nilchi, “Noise tolerant local binary pattern
operator for efficient texture analysis,” Pattern Recognition Letters,
vol. 33, no. 9, pp. 1093–1100, 2012.
[59] K. Wang, C.-E. Bichot, C. Zhu, and B. Li, “Pixel to patch sampling
structure and local neighboring intensity relationship patterns for texture
classification,” IEEE Signal Processing Letters, vol. 20, no. 9, pp. 853–
856, 2013.
[60] G. R. Iversen and H. Norpoth, Analysis of variance. Sage, 1987, no. 1.
[61] J. Ren, X. Jiang, and J. Yuan, “Noise-resistant local binary pattern with
an embedded error-correction mechanism,” IEEE Transactions on Image
Processing, vol. 22, no. 10, pp. 4049–4060, 2013.
[62] J. Bruna and S. Mallat, “Invariant scattering convolution networks,”
IEEE transactions on pattern analysis and machine intelligence, vol. 35,
no. 8, pp. 1872–1886, 2013.
[63] L. Sifre and S. Mallat, “Rotation, scaling and deformation invariant
scattering for texture discrimination,” in Proceedings of the IEEE
conference on computer vision and pattern recognition, 2013, pp. 1233–
1240.
[64] T.-H. Chan, K. Jia, S. Gao, J. Lu, Z. Zeng, and Y. Ma, “Pcanet: A simple
deep learning baseline for image classification?” IEEE Transactions on
Image Processing, vol. 24, no. 12, pp. 5017–5032, 2015.
[65] M. Cimpoi, S. Maji, and A. Vedaldi, “Deep filter banks for texture
recognition and segmentation,” in Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, 2015, pp. 3828–3836.
[66] L. Liu, P. Fieguth, X. Wang, M. Pietikäinen, and D. Hu, “Evaluation of
lbp and deep texture descriptors with a new robustness benchmark,” in
European Conference on Computer Vision. Springer, 2016, pp. 69–86.
[67] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification
with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105.
| 1 |
On the stable Andreadakis problem
Jacques Darné
March 2, 2018
arXiv:1711.05991v2 [math.AT] 1 Mar 2018
Abstract
Let Fn be the free group on n generators. Consider the group IAn of automorphisms of Fn acting trivially on its abelianization. There are two canonical
filtrations on IAn : the first one is its lower central series Γ∗ ; the second one is
the Andreadakis filtration A∗ , defined from the action on Fn . In this paper, we
establish that the canonical morphism between the associated graded Lie rings
L(Γ∗ ) and L(A∗ ) is stably surjective. We then investigate a p-restricted version
of the Andreadakis problem. A calculation of the Lie algebra of the classical
congruence group is also included.
Introduction
Automorphisms of free groups have been widely studied over the years, from many
different points of view. They are linked to the mapping class groups of surfaces and
braid groups [FM12a]; they also act on a moduli space of graphs, called the outer
space, introduced in [CV86], which is still actively studied nowadays (see, for instance,
[BBM07], or [FM12b]). Recently, several results have also been obtained regarding the
stable homology of these groups [Gal11, RWW17, DV15, Dja16a].
One way to try and understand the structure of these automorphism groups is to
cut them into pieces, by considering a family of subgroups and studying how these
interact with each other. Such families of subgroups can arise from the action on
the free group Fn and related geometric objects, as is the case with the automorphisms
with boundaries (see for instance [JW04] or [DP12]), and for the Andreadakis subgroups,
which we now focus on.
The first Andreadakis subgroup of Aut(Fn ) is the IA-group. Precisely, we can first
look at how automorphisms act on Fnab ∼
= Zn . That is, we can consider the projection
from Aut(Fn ) onto GLn (Z). We then put aside this linear part by considering only IAn ,
the subgroup of automorphisms acting trivially on Zn , which is an algebraic analogue of
the Torelli subgroup of the mapping class group. An explicit finite set of generators of
IAn has been known for a long time [Nie24] – see also [BBM07, 5.6]. Nevertheless, the
structure of IAn remains largely mysterious. For instance, IA3 is not finitely presented
[KM97], and it is not known if IAn is finitely presented for n > 3. Recent results about
the IA-groups include the finite L-presentation of IAn given in [DP16], or finiteness
results on the lower central series of IAn obtained in [CP17].
The IA-group is the first step of the Andreadakis filtration IAn = A1 ⊇ A2 ⊇ · · · ,
in which Aj is the group of automorphisms acting trivially on Fn /Γj+1 (Fn ), where Fn
is filtered by its lower central series Fn = Γ1 (Fn ) ⊇ Γ2 (Fn ) ⊇ · · · . The Andreadakis
filtration is an N -series. As such, it contains the minimal N -series on IAn , its lower
1
central series: for all k, Ak ⊇ Γk (IAn ). We are thus led to the problem of comparing
these filtrations, that we call the Andreadakis problem.
Since the two filtrations are N -series, the associated graded objects are graded Lie
rings (that is, Lie algebras over Z), the Lie bracket being induced by the commutator
map (x, y) 7→ [x, y] = xyx−1 y −1 . The inclusion i : Γ∗ (IAn ) ⊆ A∗ induces a morphism
of Lie rings:
M
M
i∗ : L(Γ∗ (IAn )) =
Γj (IAn )/Γj+1 (IAn ) −→ L(A∗ ) =
Aj /Aj+1 .
(0.0.1)
j>1
j>1
Thus, the Andreadakis problem translates into the following question:
Problem 1 (Andreadakis). How close is the morphism (0.0.1) to be an isomorphism?
Andreadakis conjectured that the filtrations were the same [And65, p. 253]. In
[Bar13], Bartholdi disproved the conjecture, using computer calculations. He then tried
to prove that the two filtrations were the same up to finite index, but in the erratum
[Bar16], he showed that even this weaker statement cannot be true. His proof uses
the L-presentation of IAn given in [DP16], to which he applies algorithmic methods
described in [BEH08] to calculate (using the software GAP) the first degrees of the Lie
algebra associated to each filtration.
In this paper, we are interested in the difference between Ak (Fn ) and Γk (IAn ) for
n k, that is, in the stable range. We thus ask the following question:
Problem 2 (Andreadakis - stable version). How close is the morphism
i∗ : Lk (Γ∗ (IAn )) = Γk (IAn )/Γk+1 (IAn ) −→ Lk (A∗ ) = Ak /Ak+1
(0.0.2)
to be an isomorphism when n k?
Our main goal here is to show the following partial answer to this question.
Theorem 2.38 (Stable surjectivity). When n > k + 2, the morphism (0.0.2) is surjective.
A (weaker) rational version of this theorem has been obtained independently by
Massuyeau and Sakasai [MS17, th. 5.1]. Like them, we prove it by building on results
from [Sat12], but using quite different methods. These methods include a description
of Andreadakis-like filtrations via a categorical framework, allowing us to state and
study a p-restricted version of the problem. We answer the questions asked in [HM17]
about this problem, and use our answers to study the stable p-restricted Andreadakis
problem. Also, we solve the stable q-torsion Andreadakis problem for Zn , getting a
complete calculation of the Lie ring of the congruence group GLn (p Z) for n > 5.
Let us now describe in more detail the methods we use and the results contained
in the present paper. In section 1, we set up a general framework for understanding
N -series and their associated Lie algebras. We introduce a category SCF of N -series.
We remark that the categorical definition of an action of an object on another makes
sense in this category. This allows us to interpret an old construction of Kaloujnine
(see theorem 1.16) as the construction of universal actions in SCF. This category is
thus action-representative, a situation studied in [BJK05, BB07, Bou08]. Using this
language, we are able to recover and generalize several classical constructions:
2
• Taking the graded rings associated to N -series gives a functor L from SCF to the
category of Lie rings. This functor preserves actions, and the Johnson morphism
admits a nice generalisation as the classifying morphism associated to an action
between Lie rings obtained from an action in SCF.
• Lazard’s classical construction of N -series from algebra filtrations described in
[Laz54] is recovered as a particular case of Kaloujnine’s construction.
• We also obtain the filtrations on congruence groups studied in [Lop14].
In particular, we show that the filtration given by the last construction on the classical
congruence group GLn (q Z) coincides with its lower central series when n > 5. As a
consequence, we get an explicit calculation of this group’s Lie ring (generalizing [LS76,
Th. 1.1], which is the degree-one part):
Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of
graded Lie rings (in degrees at least one):
L(GLn (q Z)) ∼
= sln (Z /q)[t],
where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j .
Section 2 deals with the proof of our stable surjectivity result (Theorem 2.38). The
proof relies on the constructions of the first section, applied to Fox’s free differential
calculus. The Jacobian matrix map D : f 7→ Df turns out to be a derivation from
Aut(Fn ) to GLn (Z Fn ), sending the Andreadakis filtration to the congruence filtration
GLn ((IFn )∗ ) (the group algebra Z Fn being filtered by the powers of its augmentation
ideal IFn ). We then study such derivations, and the maps they induce on the graded
Lie rings associated to N -series they preserve. We thus show that the trace map defined
by Tr(f ) = Tr(Df − 1n ) induces a well-defined map:
Tr : L(A∗ ) −→ gr(Z Fn ).
The graded algebra gr(Z Fn ) is in fact the tensor algebra T V over V = Fnab . A result
from [BLGM90] implies that this trace map takes values in [T V, T V ]. Studying the
links between free differential calculus and differential calculus in T V , we show that
this trace map is exactly the one introduced by Morita [Mor93, Def. 6.4], getting
the explicit description in terms of contraction maps notably used by Satoh in [Sat12].
Denoting the Johnson morphisms by τ and τ 0 , we get a commutative diagram of graded
linear maps:
L(IAn )
τ0
i∗
L(A∗ )
τ
Der(LV )
TrM
T V,
where TrM ◦τ = Tr This gives the following inclusions of subspaces of Der(LV ):
Im(τ 0 ) ⊆ L(A∗ ) ⊆ Tr−1
M ([T V, T V ]).
We observe that calculations from [Sat12] work over Z. From this , we deduce that
the subspaces Im(τ 0 ) and Tr−1
M ([T V, T V ]) are stably the same, so these inclusions are
equalities in the stable range, and i∗ must be stably surjective. We close the section by
3
investigating some of the consequences of this result for automorphisms of free nilpotent
groups.
In section 3, we turn to the p-restricted version of the Andreadakis problem.
Precisely, we can do the same construction as above, replacing the lower central series
[p]
Γ∗ (Fn ) by the mod-p lower central series Γ∗ (Fn ), which is an Np -series:
[p]
[p]
(Γi )p ⊆ Γpi .
[p]
Kaloujnine’s construction gives an associated Andreadakis filtration A∗ on the group
IA[p] of automorphisms of Fn acting trivially on Fnab ⊗ Fp . This filtration was shown in
[p]
[HM17] to be an Np -series. It then contains the minimal Np -series Γ∗ (IA[p] ). Whence
the natural question:
Problem 3 (Andreadakis – p-restricted version). What is the difference between the
[p]
[p]
[p]
Np -series A∗ and Γ∗ (IAn ) ?
Answering to [HM17, rk. 8.6], we show that these two filtrations fit in the same kind
of nice machinery as their classical counterparts, but they turn out to always differ.
The paper ends on a quantification of the lack of stable surjectivity in this p-restricted
case (see Proposition 3.20).
Acknowledgements: This work is part of the author’s PhD thesis. The author
is indebted to his advisors, Antoine Touzé and Aurélien Djament, for their constant
support, countless helpful discussions, and numerous remarks and comments on earlier
versions of the present paper. He also thanks Gwenaël Massuyeau and Takao Satoh,
who kindly agreed to be the reviewers of his thesis, for their useful observations and
comments.
Contents
Introduction
1
1 Generalities on strongly central series
1.1 Notations and reminders . . . . . . . . . . . . . . . . .
1.2 Strongly central filtrations and Lie algebras . . . . . .
1.3 Actions in the category of strongly central filtrations .
1.4 Johnson’s morphisms . . . . . . . . . . . . . . . . . . .
1.5 The Andreadakis problem . . . . . . . . . . . . . . . .
1.6 Lazard’s theorem . . . . . . . . . . . . . . . . . . . . .
1.7 Congruence groups . . . . . . . . . . . . . . . . . . . .
1.8 Comparison between filtrations obtained from an action
2 Traces and stable surjectivity
2.1 Free differential calculus . . . . . . . . . . . .
2.2 Derivations and strongly central filtrations . .
2.3 Algebras, actions and derivations . . . . . . .
2.4 Traces . . . . . . . . . . . . . . . . . . . . . .
2.4.1 The induced map between Lie algebras
2.4.2 Introducing the contraction map . . . .
4
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
5
5
6
7
11
12
14
15
17
.
.
.
.
.
.
19
19
21
22
25
26
27
2.5
Stable surjectivity . . . . . . . . . . . . . . . . . .
2.5.1 Vanishing of the trace map . . . . . . . . .
2.5.2 Linear algebra . . . . . . . . . . . . . . . .
2.5.3 Stable cokernel of τ 0 and stable surjectivity
Automorphisms of free nilpotent groups . . . . .
2.6
3 The
3.1
3.2
3.3
3.4
1
case of positive caracteristic
Dark’s theorem . . . . . . . . . . . . . . . .
p-Restricted strongly central series . . . . .
The p-restricted Andreadakis problem . . . .
The stable p-restricted Andreadakis problem
3.4.1 Vanishing of the trace map . . . . . .
3.4.2 Linear algebra . . . . . . . . . . . . .
3.4.3 Stable cokernel of i∗ . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
28
28
30
30
31
.
.
.
.
.
.
.
33
33
34
35
37
37
38
39
Generalities on strongly central series
1.1
Notations and reminders
Throughout the paper, G will denote an arbitrary group, and k a commutative unitary
ring. The left and right action of G on itself by conjugation are denoted respectively
by xy = y −1 xy and yx = yxy −1 . The commutator of two elements x and y in G is
denoted by:
[x, y] := xyx−1 y −1 .
If A and B are subsets of G, we denote by [A, B] the subgroup generated by the
commutators [a, b] with (a, b) ∈ A×B. If A and B are stable by conjugation by elements
of G (resp. by all automorphisms of G), then [A, B] is a normal (resp. characteristic)
subgroup of G. For instance, [G, G] is a characteristic subgroup of G, called the derived
subgroup of G. The quotient Gab := G/[G, G] is the abelianization of G, its bigger
abelian quotient. The derived subgroup is the second step of a filtration of G by
characteristic subgroups:
Definition 1.1. The lower central series of G, denoted by Γ∗ (G), or shortly Γ∗ , is the
filtration of G defined by:
(
Γ1 := G,
Γk+1 := [G, Γk ].
Definition 1.2. A group G is said to be nilpotent if its lower central series stops. The
least integer c such that Γc+1 (G) = {1} is then G’s nilpotency class. More generally, G
is said to be residually nilpotent if its lower central series is separated, i.e. if:
\
Γi (G) = {1}.
i
One can easily check the following formulas:
Proposition 1.3. For all x, y, z ∈ G,
• [x, x] = 1,
• [x, y]−1 = [y, x],
• [x, yz] = [x, y] (y [x, z]) ,
5
• [[x, y], yz] · [[y, z], zx] · [[z, x], xy] = 1,
x
z
y
• [[x, y −1 ], z −1 ] · [[z, x−1 ], y −1 ] · [[y, z −1 ], x−1 ] = 1.
The last ones are two versions of the Witt-Hall identity, which implies the following:
Lemma 1.4 (3-subgroups lemma). Let A, B and C be three subgroups of a group G.
If two of the three following subgroups are trivial, then so is the third:
[A, [B, C]],
[B, [C, A]],
[C, [A, B]].
Equivalently, one of them is contained in the normal closure of the two others.
1.2
Strongly central filtrations and Lie algebras
The theory of strongly central series has notably been studied by M. Lazard [Laz54].
Definition 1.5. Let G be a group. A strongly central filtration of G (also called
strongly central series or N -series) is a filtration
G = G1 ⊇ · · · ⊇ Gi ⊇ · · ·
of G by subgroups, satisfying:
∀i, j > 1, [Gi , Gj ] ⊆ Gi+j .
Remark that indexation has to begin from G = G1 . In particular, [G, Ni ] ⊆ Ni+1 ⊆
Ni , which means exactly that the Ni are normal subgroups of G.
Proposition 1.6. Let G be a group. The lower central series Γ∗ (G) is a strongly
central series on G, and it is the minimal one.
Proof. The strong centrality is shown by induction, using the 3-subgroup lemma 1.4.
Given a strongly central filtration G∗ of G = G1 , a straightforward induction then
gives: Gi ⊇ Γi (G) for any i > 1.
Let G = G1 ⊇ · · · ⊇ Gk ⊇ · · · be any strongly central filtration of a group G. The
quotients Li (N∗ ) := Ni /Ni+1 are abelian (for any i > 1), since [Ni , Ni ] ⊆ N2i ⊆ Ni+1 .
The graded abelian group
M
L(N∗ ) :=
Li (N∗ ),
i>1
is endowed with a bracket induced by the commutator map (x, y) 7→ [x, y] of G. Using
the formulas 1.3, one easily checks that this defines a Lie bracket: L(G∗ ) is a Lie ring
(i.e. a Lie algebra over Z).
Notation 1.7. We denote L(Γ∗ (G)) by L(G) (that is, if we do not specify a strongly
central filtration on a group, it is understood to be filtered by its lower central series).
Example 1.8. If G is a free group, then L(G) is the free Lie algebra over the Z-module
Gab [Laz54, th. 4.2].
As products of commutators become sums of brackets inside the Lie algebra, the
following fundamental property follows from the definition of the lower central series:
Proposition 1.9. The Lie ring L(G) is generated in degree 1. Precisely, it is generated
(as a Lie ring) by L1 (G) = Gab . As a consequence, if G is of finite type, then each
Ln (G) is too.
6
1.3
Actions in the category of strongly central filtrations
Let SCF be the category whose objects are the strongly central filtrations, where
morphisms between G∗ and H∗ are the group morphisms from G1 to H1 preserving
filtrations. There is a forgetful functor ω1 : SCF −→ Grps defined by G∗ 7→ G1 . This
functor admits a left adjoint Γ : G 7→ Γ∗ (G) (see Proposition 1.6). It also admits a
right adjoint G 7→ (G, G, ...).
Proposition 1.10. The category SCF is complete and cocomplete, and is homological
(but not semi-abelian).
A general reference on homological categories is [BB04]. The reader can also consult
[HL11] for a simple version of the axioms defining homological cocomplete and semiabelian categories.
Proof of Proposition 1.10. The forgetful functor ω1 admits both a left and a right adjoint, so it has to commute to limits and colimits. It does not create either of them (in
the sense of [ML98], V.1), but it almost does.
Precisely, let F : D −→ SCF be a diagram. The colimit G∞ of the group diagram
ω1 F is in general endowed with several strongly central filtrations making ω1 F (d) −→
G∞ into filtration-preserving morphisms (for instance the trivial one). One checks
easily that the minimal such filtration (which is the intersection of all those) is the
colimit of F .
Similarly, the limit G∞ of the group diagram ω1 F is endowed with several strongly
central filtrations making ϕd : G∞ −→ ω1 F (d) into filtration-preserving morphisms
(for instance its lower central series). However, the maximal such filtration is the limit
of F . It is explicitly described as:
\
G∞
=
ϕ−1
∗
d (F (d)).
d
To check that SCF is homological, one can check the axioms given in [HL11]. It
is not semi-abelian, because there are equivalence relation R∗ ⊆ G2∗ for which R∗ is
not the induced filtration on R1 (like in topological groups – or more generally in the
categories of topological algebras considered in [BC05] – where an equivalence relation
does not have to be endowed with the induced topology).
In a homological category, we need to distinguish between usual epimorphisms (resp.
monomorphisms) and regular ones, that is, the ones obtained as coequalizers (resp.
equalizers). In SCF, the former are the u such that u1 = ω1 (u) is an epimorphism
(resp. a monomorphism), whereas the latter are surjections (resp. injections):
Definition 1.11. Let u : G∗ −→ H∗ be a morphism in SCF. It is called an injection
(resp. a surjection) when u1 is injective (resp. surjective) and u−1 (Hi ) = Gi (resp.
u(Gi ) = Hi ) for all i.
Examples of homological categories include abelian categories, the category Grps of
groups, or the category Lie of Lie algebras. The usual lemmas of homological algebra
(the nine lemma, the snake lemma, the five lemma...) are true in these categories.
Homological categories differ from abelian ones notably by the fact that in general,
two split extensions between the same objects are not isomorphic (by an isomorphism
preserving the splittings). This allows us to define an action of an object on another.
7
Definition 1.12. Let C be a homological category. If X and Z are two objects of C,
we define an action of Z on X as a split extension (with a given splitting):
X
Y
Z.
When such an action is given, we will say that Z acts on X, and write: Z X.
This definition (which needs only the weaker setting of pointed protomodular categories to make sense) is motivated by the situation in Grps, where an action of a group
K on a group G is encoded by a semi-direct product structure G o K.
Remark 1.13. The choice of splitting is crucial here. For instance, the canonical
extension:
X
0
1
1
0
X ×X
0
1
X
1
1
can be split by
, or by the diagonal
. The first choice gives the trivial action,
whereas the second one gives the adjoint action, which is highly non-trivial: in Lie,
this gives the adjoint representation; in Grps, we get the action of a group on itself by
conjugation.
The set Act(Z, X) of actions of Z on X is a contravariant functor in Z: the restriction of an action along a morphism is defined via a pullback. In Grps, as in Lie,
this functor is representable, for any X. Indeed, an action of a group K on a group
G is given by a morphism K −→ Aut(G). Similarly, an action of a Lie algebra k on a
Lie algebra g is given by a morphism k −→ Der(g), where Der(g) is the Lie algebra of
derivations from g to itself. Recall that a derivation ∂ is a linear map satisfying:
∂([x, y]) = [∂x, y] + [x, ∂y].
The situation when actions are representable has notably been studied in [BJK05], and
in several subsequent papers [BB07, Bou08]. The following terminology was introduced
in [BB07, Def. 1.1]:
Definition 1.14. A homological category C is said to be action-representative when
the functor Act(−, X) is representable, for any object X ∈ C.
Our goal for the rest of this section is to construct universal actions in SCF, getting
in particular the following result:
Proposition 1.15. The category SCF is action-representative.
A representative for Act(−, X) is a universal action on X. Explicitly, it is an action
of an object A(X) on X such that any action Z X is obtained by restriction along
a unique morphism Z → A(X). For instance, in Grps, the universal action on G is:
G
G o Aut(G)
Aut(G),
where the group G o Aut(G) is the holomorph of G. Its underlying set is G × Aut(G),
endowed with the product defined by (g, σ) · (h, τ ) := (gσ(h), στ ).
The construction of universal actions in SCF is given by a theorem of Kaloujnine
[Kal50a, Kal50b], quoted by Lazard in [Laz54, p. 117]:
8
Theorem 1.16 (Kaloujnine). Let G∗ be a strongly central series. Let j > 1 be an
integer. Let Aj (G∗ ) ⊆ Aut(G∗ ) be the subgroup of automorphisms acting trivially on
every quotient Gi /Gi+j . Then A∗ (G∗ ) is a strongly central series.
Notation 1.17. As for Lie rings (Notation 1.7) we abbreviate A∗ (Γ∗ (G)) to A∗ (G).
We can rewrite the definition of Aj (G∗ ) given in the theorem as:
!
Y
Aj (G∗ ) = ker Aut(G∗ ) −→
Aut (Gi /Gi+j ) .
i
Identifying G and Aut(G) to the subgroups G × 1 and 1 × Aut(G) of the holomorph
G o Aut(G), we can define the commutator of an automorphism with an element of G:
[σ, g] = σ(g)g −1 .
Note that [Aut(G), G] ⊆ G. Using this point of view, we can rephrase the previous
definition:
Aj (G∗ ) = { σ ∈ Aut(G∗ ) | ∀i > 1, [σ, Gi ] ⊆ Gi+j } ⊆ G1 o Aut(G∗ ).
(1.17.1)
Proof of Theorem 1.16. We abbreviate Aj (G∗ ) to Aj . Obviously, Aj+1 ⊆ Aj . We show
the strong centrality using the 3-subgroup lemma (Lemma 1.4). Precisely, let α, β > 1
be two integers. For all i > 1, the group Gi+α+β is normal in G o Aut(G∗ ) (it is normal
in G and Aut(G∗ )-stable). Lemma 1.4 thus implies:
[[Aα , Aβ ], Gi ] ⊆ Gi+α+β .
This says exactly that [Aα , Aβ ] ⊆ Aα+β , which is the desired conclusion.
Remark 1.18. The group A1 (G∗ ) is the group of automorphisms of G1 preserving G∗
and acting trivially on L(G∗ ).
Example 1.19. Let G∗ = Γ∗ (G). Then L(G∗ ) is generated in degree one as a Lie
algebra. As a consequence A1 (G∗ ) is the subgroup of automorphisms acting trivially
on the abelianization Gab = L1 (G), denoted by IAG .
In order to show that the filtration A∗ (G∗ ) acts universally on G∗ , we need to
investigate actions in SCF.
Proposition 1.20. An action K∗ G∗ in SFC consists of a group action of K = K1
on G = G1 such that :
∀i, j, [Ki , Gj ] ⊆ Gi+j .
Proof. Let an action of K∗ on G∗ be given:
G∗
H∗
K∗ .
The forgetful functor ω1 : G∗ 7→ G1 from SCF to groups has a left adjoint G 7→ Γ∗ G.
Hence, it commutes with kernels. Applying this functor to the given action, we get a
split extension of groups:
G1
H1
9
K1 .
The group H1 thus decomposes as a semi-direct product G1 o K1 of G1 by K1 .
In fact, there are other forgetful functors ωi : G∗ 7→ Gi , each one with a left adjoint
G 7→ Γd ∗i e G (where d−e is the usual ceiling function). We then get split extensions of
groups:
Gi
Hi
Ki .
The groups Hi thus decomposes as semi-direct products Gi o Ki of Gi by Ki .
As H∗ is a strongly central filtration, we can apply Lemma 1.21 below to get the
desired relation. Conversely, let a group action be given as in the statement of the
proposition. Using the same lemma, we see that H∗ = G∗ o K∗ is a strongly central
filtration on H = K o G, and the corresponding split sequence in SFC is exact.
Lemma 1.21. Let K G be an action in Grps, encoded in a semi-direct product
structure H = G o K. Let G∗ and K∗ be given filtrations on G = G1 and K = K1
respectively. Then the Hi := Gi o Ki are subgroups of H defining a strongly central
filtration of H if and only if:
K∗ is a strongly central series on K,
G∗ is a strongly central series on G,
∀i, j, [Kj , Gi ] ⊆ Gi+j .
Proof. Suppose first that (Gi o Ki )i is strongly central. Then its projection K∗ on K
also is. So is its intersection G∗ with G. Hence, the conclusion follows from:
[Kj , Gi ] ⊆ (Gi+j o Ki+j ) ∩ G = Gi+j .
Conversely, under the hypothesis listed above, Gi is stable under the action of Ki ,
so the Hi = Gi o Ki are subgroups of H. We then use the formulas 1.3 to compute
[kg, k 0 g 0 ] with k, g, k 0 , g 0 in Ki , Gi , Kj and Gj respectively:
0
[kg, k 0 g 0 ] = [kg, k 0 ] ·g [kg, g 0 ]
0
0
= k[g, k 0 ] · [k, k 0 ] · k k[g, g 0 ] · k [k, g 0 ]
∈ Gi+j · Ki+j · Gi+j · Gi+j = Gi+j o Ki+j .
This completes the proof.
We are now ready to show the result announced in Proposition 1.15:
Proposition 1.22. Let G∗ be a strongly central series. The strongly central series
A∗ (G∗ ) acts canonically on G∗ , and this action is universal.
Proof. That A∗ (G∗ ) acts on G∗ follows from the formula (1.17.1), Theorem 1.16 and
Proposition 1.20.
Given an action of a strongly central series K∗ on G∗ , the underlying group action
is described by a unique morphism from K1 to Aut(G1 ). From Proposition 1.20, we
deduce that this morphism sends Kj into Aj (G∗ ). Conversely, any morphism from K∗
to A∗ (G∗ ) in SCF gives a group action lifting to an action in SCF by Proposition
1.20.
Remark 1.23. If a group K acts on a group G, and G∗ is a strongly central filtration on
G = G1 , we can pull back the canonical filtration A∗ (G∗ ) by the associated morphism:
K −→ Aut(G).
10
This gives a strongly central filtration A∗ (K, G∗ ), maximal amongst strongly central
filtrations on subgroups of K which act on G∗ via the given action K G. It can be
described explicitly as:
Aj (K, G∗ ) = { k ∈ K | ∀i > 1, [k, Gi ] ⊆ Gi+j } ⊆ K.
1.4
Johnson’s morphisms
The construction of the Johnson morphism associated with an action in SCF relies on
the following:
Proposition 1.24. The Lie functor L : SCF −→ LieZ is exact, i.e. it preserves short
exact sequences [BB04, Def 4.1.5].
Proof. The exactness of L is equivalent to the exactness of each Li : SCF −→ Ab.
Consider the forgetful functors ωi : G∗ 7→ Gi from SCF to Grps. Each ωi has a
left adjoint G 7→ Γd ∗i e G, so these functors preserve kernels. Moreover, they preserve
regular epimorphisms, which are surjections in SCF (cf. Definition 1.11). Hence, they
are exact. Since Li is the cokernel of the injection ωi+1 ,→ ωi , its exactness follows
from the nine lemma in Grpes. Precisely, if E is any short exact sequence in SCF,
apply the nine lemma to the diagram ωi+1 (E) ,→ ωi (E) Li (E) to get the exactness
of Li (E) from that of ωi (E) and ωi+1 (E).
As a consequence of Proposition 1.24, the functor L preserves actions. Precisely,
from an action in SCF:
G∗
H∗
K∗ ,
we get an action in the category of graded Lie rings:
L(G∗ )
L(H∗ )
L(K∗ ).
Such an action is given by a morphism of graded Lie rings:
L(K∗ ) −→ Der∗ (L(G∗ )).
(1.24.1)
The target is the (graded) Lie algebra of graded derivations: a derivation is of degree
k when it raises degrees of homogeneous elements by k.
Definition 1.25. The morphism (1.24.1) is called the Johnson morphism associated
to the given action K∗ G∗ .
We can give an explicit description of this morphism: for k ∈ K, the derivation
associated to k̄ is induced by [k̄, −] inside L(G∗ oK∗ ) = L(G∗ )oL(K∗ ), so it is induced
by [k, −] inside G∗ o K∗ .
Example 1.26. The Johnson morphism associated to the universal action A∗ (G∗ )
G∗ is the Lie morphism:
τ : L(A∗ (G∗ )) −→ Der∗ (L(G∗ ))
induced by σ 7→ (x 7→ σ(x)x−1 ).
11
If K1 is in fact a normal subgroup of a group K0 , such that each Ki is normal in
K0 , and such that the action of K1 on G∗ can be extended to an action of K0 , then
K0 acts on L(G∗ o K∗ ) and this action factorizes through K0 /K1 . Moreover, as this
action is by automorphisms of the Lie ring:
Lemma 1.27. Let K0 .K1 be given as above. Then the Johnson morphism τ is K0 /K1 equivariant.
The action of K0 on derivations is by conjugation. Precisely:
τ (k · x) = [k · x, −] = k · [x, k −1 · −] = k ◦ τ (x) ◦ k −1 .
Lemma 1.28. Let K∗ H∗ be an action in SCF. The associated Johnson morphism
τ : L(K∗ ) −→ Der(L(G∗ )) is injective if and only if K∗ is the filtration A∗ (K, G∗ )
defined in Remark 1.23.
Proof. Every non-trivial element in ker(τj ) lifts to an element in Aj (K, G∗ ) − Kj .
Conversely, an element σ in Aj (K, G∗ ) − Kj is in Kk − Kk+1 for some k < j. Then
σ ∈ Kk /Kk+1 − {0} is a non-trivial element in ker(τ ).
Remark 1.29. The definition of Aj (K, G∗ ) makes sense for j = 0, giving a subgroup
K0 = A0 (K, G∗ ) of K acting as above. The morphism τ is then A0 (K, G∗ )-equivariant.
In fact, τ can then be extended to a morphism of extended Lie algebras, in the sense
of [HM17]. Ideed, their construction of an algebra of extended derivations is exactly
a construction of universal actions in the category of extended Lie algebras, and their
version of the Johnson morphism is exactly the one we find if we replace N -series and
Lie algebras by their extended version in the constructions above.
1.5
The Andreadakis problem
Let G be a group. To study the structure of Aut(G), we can consider first how automorphisms act on Gab . Then we can put aside this linear part by considering the kernel
of the projection from Aut(G) to GL(Gab ). This kernel IAG is (residually) nilpotent
when G is, and in endowed with two strongly central filtrations: its lower central series,
and the Andreadakis filtration A∗ (G). We are thus led to the problem of comparing
these filtrations, which we call the Andreadakis problem (Problem 1).
Recall from Theorem 1.16 and Example 1.19 that A∗ (G) is a strongly central filtration on A1 (G) = IAG . Since A1 (G) is the kernel of the canonical action of Aut(G) on
L(G), we get an induced faithful action of Aut(G)/IAG (6 GL(Gab )) on L(G). The
next lemma gives a similar concrete description of all the Aj (G):
Lemma 1.30. The group Aj (G) is the subgroup of automorphisms acting trivially on
G/Γj+1 (G), i.e. Aj (G) = { σ ∈ Aut(G) | [σ, G] ⊆ Γj+1 (G) } .
Proof. Let us denote by Kj the right-hand side of the equality. We only need to show
the inclusion Kj ⊆ Aj (G). The case j = 1 is given in Example 1.19. Suppose it true
for j − 1, and let σ ∈ Kj . In particular, σ is inside Kj−1 = Aj−1 (G), so it induces a
derivation [σ, −] of degree j − 1 of L(G), via the Johnson morphism. By definition,
[σ, G] ⊆ Γj+1 . This says exactly that the derivation [σ, −] is trivial on L1 (G). Since
L(G) is generated in degree one (Proposition 1.9), [σ, −] has to be trivial on all of
L(G): for all i, [σ, Γi ] ⊆ Γi+j , which is the desired conclusion.
12
The filtration A∗ (G) is strongly central on A1 (G) = IAG . As a consequence, Ak (G)
contains Γk (IAG ). A first consequence of this inclusion is that the (residual) nilpotency
of G implies the (residual) nilpotency of IAG . Precisely, let G be a c-nilpotent group.
Then Ac (G) = {1G }. Accordingly, Γc (IAG ) = {1G }, so IAG is (c − 1)-nilpotent. In a
similar fashion, one can check that IAG has to be residually nilpotent when G is.
The following question is crucial for trying to understand the structure of automorphism groups of residually nilpotent groups, in particular for trying to understand the
structure of Aut(Fn ):
Problem 1 (Andreadakis). What is the difference between A∗ (G) and Γ∗ (IAG ) ?
Example 1.31. Consider the alternating group An . When n 6= 2, 6, Aut(An ) = Σn
(acting by conjugation), as is easily deduced from [Rot95, cor. 7.5]. But if n > 5,
then An is perfect: [An , An ] = An . On the one hand, the Andreadakis filtration is
thus constant equal to IA(An ) = Aut(An ) = Σn . On the other hand, the lower central
series of Σn is Σn , An , An , ..., so the two filtrations differ in this case.
Recall from the Introduction that we are interested in a stable form of the problem
for G = Fn :
Problem 2 (Andreadakis - stable version). What is the difference between Ak (Fn ) and
Γk (IAn ) for n k ?
The Johnson morphism turns out to be a powerful tool in the study of the Andreadakis filtration (which is the analogous of Johnson’s filtration on the mapping
class group, defined by Johnson in [Joh83]).
Recall the A∗ (G) acts on Γ∗ (G) (see Proposition 1.22). The associated Johnson
morphism τ is described in Example 1.26. The Γi (G) are characteristic subgroups of
G, so A0 (G) = Aut(G). Lemmas 1.27 and 1.28 then give:
Lemma 1.32. The morphism τ is injective and Aut(G)/IAG -equivariant.
The filtration Γ∗ (IAG ) also acts on Γ∗ (G), by pulling back the universal action along
the inclusion i : Γ∗ (IAG ) ⊆ A∗ (Fn ). The associated Johnson morphism is denoted by:
τ 0 = τ ◦ i∗ . The morphism τ 0 is still equivariant, but is injective if and only if G satisfies
Andreadakis’ conjecture (i.e. if i∗ = 1 ).
Example 1.33. If G is a free group, then L(Fn ) is the free Lie algebra LV on V = Gab .
If g h is an action in Lie, then g also acts on ho , which is obtained by considering the
module h as an abelian Lie algebra. Derivations from g to h then identify with sections
of the projection ho o g g. Hence, the free Lie algebra is also free with respect to
derivations. In particular:
Derk (LV ) ∼
= Homk (V, Lk V ) ∼
= V ∗ ⊗ Lk V.
The following result is well-known [Kaw06, th. 6.1]:
Proposition 1.34. In degree one, the Johnson morphism τ 0 is a GLn (Z)-equivariant
isomorphism:
2
∼ ∗
τ10 : IAab
n = V ⊗ Λ V.
Proof. The group IAn is generated by the following elements [Nie24] – see also [BBM07,
5.6]:
(
(
xj xi x−1
if
t
=
i
[xj , xk ]xi if t = i
j
and Kijk : xt 7−→
(1.34.1)
Kij : xt 7−→
xt
else
xt
else.
One can check by a direct calculation that these generators are sent to a basis of the
free abelian group V ∗ ⊗ Λ2 V .
13
1.6
Lazard’s theorem
Definition 1.35. A filtered algebra A∗ is an associative k-algebra A0 endowed with a
filtration by ideals: A = A0 ⊇ A1 ⊇ ... such that: ∀i, j, Ai Aj ⊆ Ai+j . We denote by
f Alg the category of filtered algebras (and filtration-preserving morphisms).
Example 1.36. Let kG be the group algebra of G with coefficients in the (commutative) ring k. We denote by ε : kG → k its canonical augmentation and by Ik G := ker(ε)
its augmentation ideal (we will sometimes write IG, or even I, for short). Then kG is
filtered by the powers I ∗ G of its augmentation ideal. If G is a free group, then gr(kG)
is the tensor algebra over Gab ⊗ k [Pas79, th. 6.2].
From Theorem 1.16, we can deduce the useful corollary [Laz54, th. 3.1]:
Theorem 1.37 (Lazard). Let A = A0 ⊃ A1 ⊇ · · · be a filtered algebra. Then A×
∗ :=
×
A× ∩ (1 + A∗ ) is a strongly central filtration on A×
⊆
A
,
and
(−)
−
1
induces
an
1
embedding of graded Lie algebras:
L(A×
∗ ) ,→ gr∗ (A1 ).
α
Remark 1.38. Fix a morphism G −→ A× . We can pull back the filtration given by
the theorem to get a strongly central filtration α−1 (1 + A∗ ) on G1 = α−1 (1 + A1 ).
Proof of Theorem 1.37. The filtration A = A0 ⊃ A1 ⊇ · · · can be seen as a filtration
of the abelian group A. As A is abelian, it has to be strongly central. Consider the
action by left multiplication:
ρ : A× −→ Aut(A, +).
Let a ∈ A× . One can easily check that ρ(a) ∈ Aj (A∗ ) (where Aj (A∗ ) is the filtration
defined in Kaloujnine’s theorem 1.16) if and only if a ∈ 1 + Aj . Thus, A× ∩ (1 + Ai ) =
ρ−1 (Aj (A∗ )) is a strongly central filtration, as announced. It remains to show that
∂ = α − 1 induces a morphism of Lie ring (necessarily injective). This can be checked
directly from the formula:
[g, h] − 1 = [g − 1, h − 1]g −1 h−1 .
We will give a slightly different proof later on, using the concept of derivations (see
Paragraph 2.2).
Example 1.39. Applying Remark 1.38 to the inclusion of G in kG filtered by the
powers of the augmentation algebra, we get the dimension series of G:
D∗k G = G ∩ (1 + Ik∗ G).
It is a strongly central series on G, so it contains Γ∗ G. The question of the equality
of D∗Z G and Γ∗ G was known as the dimension subgroup problem during a long time,
until an example of a group for which the two filtration differ was given in [Rip72]. See
[MP09, chap. 2] for more on this subject.
If G is a free group, then L(D∗Z G) is the sub-Lie ring generated in degree one in the
tensor algebra gr(Z G) ∼
= T V . Hence (by the PBW theorem), it is the free Lie ring. It
then has to coincide with L(G), so D∗Z G = Γ∗ G. Thus, free groups have the dimension
property.
14
Lazard’s theorem gives a construction of a strongly central filtration from a filtered
algebra. Conversely, we can define a filtered algebra from a strongly central filtration
G∗ on G = G1 . Indeed, let kG be filtered by:
Fi := kG · (Ni − 1) = ker(kG −→ k(G/Hi )).
This filtration does not make kG into a filtered algebra, but it generates a filtration
which does:
X
akj (N∗ ) :=
kG · (Ni1 − 1) · · · (Nin − 1).
i1 +···+in >j
One can easily check that these constructions are universal:
Proposition 1.40. The above constructions define an adjunction:
SCF
1.7
ak∗
(−)×
∗
f Algk .
Congruence groups
If I is an (associative) ring without unit, recall that its congruence group GLn (I) is
defined as:
GLn (I) := ker(GLn (A) −→ GLn (A/I)),
where A is any unitary (associative) ring containing I as a (two-sided) ideal, (e.g.
A = I o Z). This group depends only on I, as it is exactly (1 + Mn (I))× .
If A = A0 ⊇ A1 ⊇ · · · is a filtered algebra (see Definition 1.35), then so is the
matrix algebra Mn (A), endowed with the filtration Mn (A∗ ). Theorem 1.37 gives us a
strongly central filtration of the congruence group:
GLn (A1 ) = GLn (A) ∩ (1 + Mn (A1 )) = ker(GLn (A) −→ GLn (A/A1 )).
by congruence subgroups:
GLn (Aj ) = GLn (A) ∩ (1 + Mn (Aj )) = ker(GLn (A) −→ GLn (A/Aj )),
and an embedding of the associated Lie ring into a matrix algebra:
L(GLn (A∗ )) ,→ gr∗ (Mn (A∗ )) ∼
= Mn (gr∗ (A∗ )).
As in the proof of Theorem 1.37, this filtration can be interpreted as:
GLn (A∗ ) = A∗ (GLn (A), An∗ ).
We also can recover Lazard’s theorem as the case n = 1 of this construction.
Suppose that A∗ is commutative. Then the usual determinant defines a filtrationpreserving morphism:
det : GLn (A∗ ) −→ GL1 (A∗ ) = A×
∗.
Indeed, if M ∈ Mn (Aj ), then det(1 +M ) ∈ 1+Aj . The following proposition determines
the associated graded morphism:
15
Proposition 1.41. The following square commutes:
L(GLn (A∗ ))
(−)−1
Mn (gr(A∗ ))
det
L(A×
∗)
Tr
(−)−1
gr(A∗ ).
Moreover, it is Cartesian, that is:
L(GLn (A∗ )) ∼
= Tr−1 (L(A×
∗ ) − 1).
The kernels of det and Tr then coincide. We thus recover (an generalize slightly) a
result of [Lop14]:
Corollary 1.42. Let SLn (A∗ ) be the kernel of the determinant. Then:
L(SLn (A∗ )) ∼
= ker(Tr) = sln (gr(A∗ )).
Remark 1.43. If L(A×
∗ ) = 0, then L(GLn (A∗ )) = L(SLn (A∗ )), and this Lie ring
identifies to sln (gr(A∗ )). This happens for example when GL1 (A1 ) = {1} (implying
SLn (A∗ ) = GLn (A∗ )), which is verified for A∗ = q ∗ Z (if q > 2), or A∗ = t∗ k[t].
Proof of Proposition 1.41. Let M ∈ Mn (Aj ). Then:
det(1 + M ) ≡ 1 + Tr(M )
(mod A2j ).
When j > 1, then A2j ⊆ Aj+1 , so this formula gives the commutativity of the above
square. The module Tr−1 (Lj (A×
∗ ) − 1) is additively generated by the matrices:
āeαβ , ā(e11 − eαα ) and b̄e11 , for α 6= β, a ∈ Aj and 1 + b ∈ A×
j .
Replacing ā(e11 − eαα ) by ā(e11 + e1α − eα1 − eαα ), we can lift these to GLn (Aj ) as
follows:
lifts āeαβ ,
1 + aeαβ
1 + a(e11 + e1α − eα1 − eαα ) lifts ā(e11 + e1α − eα1 − eαα ),
1 + be11
lifts b̄e11 .
This completes the proof.
Let n > 3. If A is a ”non-totally-imaginary Dedekind ring of arithmetic type” and q
is an ideal of A, then we have [BMS67, cor. 4.3 (b)] that SLn (q) is normally generated
in SLn (A) (in fact in En (A)) by the shear mappings 1 + teαβ with α 6= β and t ∈ q.
This applies for instance to A = Z and q = (q). From this we deduce:
Proposition 1.44. If n > 5, under the above hypothesis:
Γ∗ (SLn (q)) = SLn (q∗ ).
Proof. The filtration SLn (q∗ ) is strongly central on SLn (q), so it contains its lower
central series. Conversely, using that:
1 + (a + b)eαβ = (1 + aeαβ )(1 + beαβ ) if α 6= β,
1 + abeαβ = [1 + aeαγ , 1 + beγβ ]
if α, β and γ are pairwise distinct,
one can easily check that for any t in qk and any α 6= β, if n > 5:
1 + teαβ ∈ Γk (SLn (q)).
Using the result from [BMS67], we see that these generate SLn (qk ) as a normal subgroup of SLn (A). Hence SLn (qk ) ⊆ Γk (SLn (q)), as required.
16
Remark 1.45 (On the q-torsion Andreadakis problem for Zn ). Fix an integer q. A qtorsion strongly central filtration is a strongly central filtration G∗ such that Gqi ⊆ Gi+1
for every i > 1 (this means exactly that q L(G∗ ) = 0). On any group G, there is
(q)
a minimal q-torsion strongly central filtration Γ∗ (G). Moreover, A∗ (G∗ ) is q-torsion
whenever G∗ is, because L(A∗ (G∗ )) embeds into a q-torsion Lie algebra via the Johnson
(q)
(q)
(q)
morphism. Let us denote A∗ (Γ∗ (G)) by A∗ (G) and A1 (G) by IA(q) (G) (it is the
group of automorphisms acting trivially on Gab ⊗ (Z /q)). Thus we get an inclusion of
(q)
(q)
Γ∗ (IA(q) ) into A∗ and a corresponding q-torsion Andreadakis problem.
(q)
Apply this with G = Zn and q > 3. Then Γ∗ (G) = q ∗ Z, Aut(G) = GLn (Z),
(q)
and A∗ (G) = GLn (q ∗ Z) = SLn (q ∗ Z) Proposition 1.44 then gives an answer to the
(q)
q-torsion Andreadakis problem for Zn in the stable range (n > 5) : A∗ (Zn ) is the
lower central series of IA(q) (Zn ) = SLn (q Z).
When A = Z and q = (q), the graded ring gr(q ∗ Z) is (Z /q)[t]. Moreover,
GLn (q Z) = SLn (q Z) (see Remark 1.43). Proposition 1.44 and Corollary 1.42 thus
give:
Corollary 1.46. For all n > 5 and all q > 3, there is a canonical isomorphism of
graded Lie rings (in degrees at least one):
L(GLn (q Z)) ∼
= sln (Z /q)[t],
where the degree of t is 1, and the Lie bracket of M ti and N tj is [M, N ]ti+j .
Remark 1.47. This generalizes [LS76, Th. 1.1], which is the degree-one part.
Remark 1.48. For n = 2 and q > 5 a prime number, the group SL2 (q Z) is free
on 1 + q(q 2 − 1)/12 generators [Gro52, Fra33]. Its Lie ring is then a free Lie ring on
the same number of generators. The author does not know a complete calculation for
n = 3 or 4 : the above calculus does give the abelianization, but it fails to determine
the whole lower central series.
1.8
Comparison between filtrations obtained from an action
Let G be a group. Suppose that G acts on two strongly central series H∗ et K∗ (by
automorphisms in SCF). We then can ask what link exists between A∗ (G, H∗ ) and
A∗ (G, K∗ ) (as defined in Remark 1.23), depending on the links between H∗ an K∗ .
The next proposition describes the behaviour of the construction A∗ (G, −) with
respect to injections, surjections (see Definition 1.11) and semi-direct products in the
category G−SCF of strongly central series endowed with a G-action (where morphisms
respect this action):
Proposition 1.49. Let G be a group acting on strongly central series N∗ , H∗ and K∗ .
Let u : N∗ −→ H∗ and v : H∗ −→ K∗ be G-equivariant morphisms.
If u : N∗ −→ H∗ is an injection, then A∗ (G, H∗ ) ⊆ A∗ (G, N∗ ).
If v : H∗ −→ K∗ is a surjection, then A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ).
If N∗
H∗
K∗ is a split exact sequence in G − SCF, then:
A∗ (G, H∗ ) = A∗ (G, K∗ ) ∩ A∗ (G, N∗ ).
17
Proof. In the first case, we identify N = N1 to a subgroup of H = H1 . Let g ∈
Aj (G, H∗ ). We write:
[g, Ni ] = [g, N ∩ Hi ] ⊆ [g, N ] ∩ [g, Hi ] ⊆ N ∩ Hi+j = Ni+j .
Similarly, to show the second assertion, let us take g ∈ Aj (G, H∗ ). We write:
[g, Ki ] = [g, v(Hi )] = ϕ([g, Hi ]) ⊆ v(Hi+j ) = Ki+j .
The third assertion’s hypothesis comes down to require that H∗ decompose as a semidirect product K∗ o N∗ , the action of G on H∗ being factor-wise. We then get Gequivariant isomorphisms:
Hi /Hi+j ∼
= Ki /Ki+j o Ni /Ni+j .
An element g of G acts trivially on the left hand side if and only if it does on the right
hand side. Whence the result.
Remark 1.50. Let 1
N∗ u H∗ v K∗
1 be a non-split short exact sequence in G − SCF, the first part of Proposition 1.49 gives:
A∗ (G, H∗ ) ⊆ A∗ (G, K∗ ) ∩ A∗ (G, N∗ ).
Nevertheless, equality is not true in general. Indeed, the sequences:
1
Ni /Ni+j
u
Hi /Hi+j
v
Ki /Ki+j
1
are exact, but g ∈ G can act trivially on the kernel and quotient without acting trivially
on the middle term. For instance, H 1 (G) = Ext1G (Ztriv , Ztriv ) is non-trivial in general.
We can get a little more about semi-direct products:
H
K be a split exact sequence in G − Grps. SupProposition 1.51. Let N
pose that N is filtered by a strongly central series N∗ . Then:
A∗ (G, N∗ ) ⊆ A∗ (G, A∗ (K, N∗ )) .
Proof. Let us denote by K∗ the filtration A∗ (K, N∗ ) and by G∗ the filtration A∗ (G, N∗ ).
A straightforward application of the 3-subgroup lemma (Lemma 1.4) in (N o K) o G
provides the inclusion:
[[Gα , Kβ ], Nγ ] ⊆ Nα+β+γ .
Thus [Gα , Kβ ] ⊆ Aα+β (K, N∗ ) = Kα+β , which means that Gα ⊆ Aα (G, K∗ ).
Corollary 1.52. Let G be a group acting on a filtered algebra A∗ by automorphisms
of filtered algebras. Then:
A∗ (G, A∗ ) ⊆ A∗ (G, A×
∗ ).
Proof. Apply Proposition 1.51 to the G-equivariant split exact sequence:
A
A o A×
A×
and the given filtration on A.
Here is an interesting case when the filtrations of Corollary 1.52 are equal:
18
Proposition 1.53. Let G be a group, and k a commutative ring. Then:
A∗ Aut(G), D∗k G = A∗ (Aut(G), Ik∗ G) .
Proof. The algebra Z G is filtered by Ik∗ G, the powers of its augmentation ideal. The
group Aut(G) acts on Z G by automorphisms of filtered algebras. As A∗ (G, Ik∗ G) =
D∗k G, Proposition 1.51, applied to the action of Aut(G) on kG o G, gives an inclusion:
A∗ (Aut(G), Ik∗ G) ⊆ A∗ (Aut(G), D∗k G).
To show that it is in fact an equality, take ϕ ∈ A∗ (Aut(G), D∗k G). Then:
∀g ∈ G = D1 G, [ϕ, g] = (ϕ(g)g −1 − 1)g ∈ (Dj+1 − 1)G ⊆ I j+1 .
We then show that [ϕ, I i ] ⊆ I i+j by induction on i > 1, using the formula:
[ϕ, uv] = [ϕ, u]ϕ(v) + u[ϕ, v] (= (ϕ(u) − u) · ϕ(v) + u · (ϕ(v) − v)) .
Let us remark that, in the language of paragraph 2.3, the last formula states that [ϕ, −]
is a (1 , ϕ)-derivation, so we have in fact used lemma 2.18.
2
Traces and stable surjectivity
2.1
Free differential calculus
We recall some basic concepts of free differential calculus. A detailed account can be
found in [Fox53].
Definition 2.1. Let G be a group, and M a kG-module. A derivation from G to M
is a map ∂ : G −→ M such that:
∀g, h ∈ G, ∂(gh) = ∂g + g · ∂h.
It can be extended to a linear map ∂ : kG −→ M , which verifies:
∀u, v ∈ kG, ∂(uv) = ∂(u)ε(v) + u · ∂(v).
We denote by Der(G, M ) or Der(kG, M ) the space of derivations from G to M . We
will often write Der(kG) for Der(kG, kG).
Remark 2.2. Let G = FS be the free group over a set S. As derivations identify with
sections of M o G G, we get: Der(kFS , M ) ∼
= M S for any kG-module M .
Definition 2.3. Let S = (xi )i be a chosen basis of a free group F . The following
requirement defines a derivation of kF :
(
1 if t = i,
∂
: xt 7−→
∂xi
0 else.
Let us give a first version of the chainrule:
Proposition 2.4. Let λ : FY −→ G a group morphism, where FY is the free group on
a set Y = {yj }. Then, for u in kY and ∂ in Der(kG):
X ∂u
∂(λu) =
λ
∂(λyj ).
∂y
j
j
19
Remark 2.5. The sums involved here are finite, because only a finite number of letters
appear in a given element u.
Proof of proposition 2.4. One can check that each member of this equality defines a
derivation from kFY to kG, where kFY acts on kG by y · g = λ(y)g. As these formulas give the same result when evaluated at elements of the basis, the corresponding
derivations are equal.
If G = FX = hxi i is free too, we can apply proposition 2.4 with ∂ =
∂u ∂(λyj )
∂(λu) X
=
λ
.
∂xi
∂y
∂x
j
i
j
∂
∂xi
to get:
For X = Y and λ = 1FX , this gives a change-of-base formula similar to the usual one.
The following definition keeps on with our analogy with classical differential calculus:
Definition 2.6. Let FY = hyj i and FX = hxi i be free groups as above. Let f be a
morphism from FY to FX . We define its Jacobian matrix (with respect to the chosen
basis) by:
∂f (yj )
D(f ) :=
∈ MY X (kX).
∂xi
ji
Remark 2.7. The morphism f is determined by Df . Indeed, proposition 2.4, applied
with λ = 1, ∂ : v 7−→ v − ε(v) and u = f (xi ), gives:
f (xi ) − 1 =
X ∂f (xi )
∂xj
j
(xj − 1).
g
f
Let FZ = hzk i, FY = hyj i and FX = hxi i be free groups, and let FZ −→ FY −→ FX
be morphisms between them. We can use proposition 2.4 to get a chainrule for Jacobian
matrices:
∂g(zk ) ∂f (yj )
∂f (g(zk )) X
=
f
.
∂xi
∂yj
∂xi
j
This can be restated as:
g
f
Corollary 2.8. Let FZ −→ FY −→ FX be morphisms between free groups with fixed
basis, as above. Then:
D(f g) = f (Dg)D(f ).
Remark 2.9. The reader may have noticed that this formula seems to come ”in the
wrong way”. This can be explained as follows: a morphism f : FY −→ FX is in fact
a r-tuple of monomials f (yj ) = fj (xi ) ∈ kFX , and should as such be considered as a
”polynomial function from FX to FY ”, whose coordinates would be the fj s. From this
point of view, f g would be a ”polynomial function from FX to FZ ”, whose coordinates
would be given by f g(zk ) = gk (fj (xi )): it looks more like ”g ◦ f ” !
This seems to be completely analogous to the classical setting of algebraic geometry.
To get more accurate statements, one would have to interpret kFX as an algebra of
functions over a geometric object associated to FX . Which should look like a one-point
object with some local structure (as Df determines f ).
20
2.2
Derivations and strongly central filtrations
We introduce the notion of a derivation from a group G to a group H on which it
acts. Our aim here is to describe a general framework which will be useful to study
Jacobian matrices and their interactions with Lie brackets: the chainrule formula 2.8
tells us that D is a derivation. We will also get back to Lazard’s theorem 1.37 in this
framework.
Definition 2.10. Let H be a group, on which another group G acts. A map ∂ : G −→
H is a derivation if:
∀ x, y ∈ G, ∂(xy) = ∂x · x∂y.
Remark 2.11. If H = M is an abelian group, i.e. a representation of G, then we
recover the usual definition of a derivation from G to M (see Definition 2.1).
To give a derivation ∂ : G −→ H is exactly the same as giving a section σ = (∂, 1G )
of the canonical projection:
σ
H oG
p
G.
Keeping this in mind, the following lemma follows immediately:
Lemma 2.12. Let ∂ be a derivation from G to H. Then ∂ −1 sends G-stable subgroups
of H on subgroups of G.
Let H∗ be strongly central filtration on a subgroup H1 of H. Let G∗ be a strongly
central filtration on a subgroup G1 of G, which acts on H∗ through the given action of
G on H (see Proposition 1.20). A derivation ∂ from G to H being given, we can use
the morphism σ = (∂, 1G ) to pull back the filtration H∗ o G∗ . We thus get a strongly
central filtration on G1 ∩ ∂ −1 (H1 ):
σ −1 (Hi o Gi ) = Gi ∩ ∂ −1 (Hi ).
Remark 2.13. For instance, if H∗ is given, we can let G∗ be A∗ (G, H∗ ), the maximal
filtration acting on H∗ , as described in Remark 1.23. The above construction then
gives a strongly central filtration on A1 ∩ ∂ −1 (H1 ). This subgroup is all of G if and
only if:
G stabilises H∗ ,
G acts trivially on L(H∗ ),
(2.13.1)
∂(G) ⊆ H1 .
Under these conditions, A∗ ∩ ∂ −1 (H∗ ) is a strongly central series on G. In particular,
it then contains Γ∗ (G).
Keeping the above notations, the morphism σ = (∂, 1G ) induces a Lie ring morphism (which is injective by definition of the filtration on the domain):
σ̄ : L(G∗ ∩ ∂ −1 (H∗ )) ,−→ L(H∗ ) o L(G∗ ).
This ensures that ∂ induces a well-defined linear map ∂¯ between the Lie algebras.
¯ 1̄ ) : x 7−→ ∂x
¯ + x preserves Lie brackets, hence:
Moreover, the map σ̄ = (∂,
¯
¯ y] + [x, ∂y]
¯ + [∂x,
¯ ∂y].
¯
∂([x,
y]) = [∂x,
If L(H∗ ) is an abelian Lie algebra, then the last term is zero, and ∂¯ is a Lie derivation.
This happens in particular when H is an abelian group.
21
Back to the proof of Lazard’s theorem 1.37. Take the filtered (abelian) group (A, +) as
H, and the group A× as G acting by left multiplication ρ. We already know that:
×
Aj (A× , A∗ ) = A×
∗ = A ∩ (1 + Aj ).
Let ∂ be the derivation from A× to A defined by g 7−→ g −1. Obviously, ∂ −1 (Aj ) = A×
j ,
×
×
−1
which is exactly Aj (A , A∗ ). It is then equal to Aj (A , A∗ ) ∩ ∂ (Aj ).
The Lie ring L(A∗ ) is abelian (because A is an abelian group). Hence, the induced
map ∂¯ is a derivation (with respect to the canonical action of L(A×
∗ ) on L(A∗ )):
∂¯ : L(A×
∗ ) −→ L(A∗ ).
Let us remark that the Lie algebra L(A∗ ) is quite different from gr(A∗ ): the associative
structure of A has been completely forgotten. Nevertheless, some part of this structures
is encoded by the action of L(A×
∗ ), which is inherited from left multiplication. The
¯
map ∂ is a derivation with respect to this action, that is:
¯
¯ y] + [x, ∂y].
¯
∂([x,
y]) = [∂x,
These brackets are described through the action of L(A×
∗ ) on L(A∗ ), as induced by
commutators in A o A× :
∀g ∈ A×
1 , ∀x ∈ A, [g, x] = gx − x.
As a consequence:
¯
∂([x,
y]) = −(y(x − 1) − (x − 1)) + (x(y − 1) − (y − 1)) = xy − yx,
so ∂¯ is in fact a Lie morphism to gr(A∗ ).
2.3
Algebras, actions and derivations
We now turn to studying derivations of algebras. In particular, we get a precise link
between free differential calculus and differential calculus in the tensor algebra (see
Proposition 2.25). We will use this in Paragraph 2.4.2 to get an explicit description of
the trace map.
Let Alg− be the category of associative non-unitary algebras over a fixed commutative ring k. This category is pointed (by 0) and protomodular. We can define actions
there, as in paragraph 1.3. Actions in Alg− turn out to be representable. Precisely, for
any algebra I, let Endr (I) (resp. Endl (I)) be the algebra of right (resp. left) I-linear
endomorphisms of I, i.e. k-linear maps u from I to I satisfying:
∀x, y ∈ I, u(xy) = u(x)y (resp. u(xy) = xu(y)).
Define Endr,l (I) as the kernel of :
Endr (I) × Endl (I) −→
Endk (I)
α:
(u, v)
7−→ u ◦ v − v ◦ u.
Proposition 2.14. An action A I in Alg− can be represented by a (unique) morphism:
(λ,ρ)
A −→ Endr,l (I).
22
Proof. If an action
I
B
A
is given, λ(a) and ρ(a) are obtained from left and right multiplications by a in B.
Conversely, a morphism (λ, ρ) as above can be used to define an (associative) algebra
structure on I × A defining an action of A on I.
Let us remark that if I 2 = 0 (that is, I is endowed with a trivial algebra structure),
then an action of A on I is just a A-bimodule structure.
Remark 2.15. The same construction works in the category of (non-unitary) filtered
algebras f Alg− , where we also get a representation of actions. The algebras Endr (I)
and Endl (I) are then filtered by the usual requirement: a morphism u is of degree at
least j if u(Ii ) ⊆ Ii+j for all i. The same requirement will be used to define a filtration
on any module of morphisms between filtered modules or algebras.
Definition 2.16. Let A act on I as above. A derivation from A to I is a k-linear map
∂ : A −→ I satisfying:
∂(ab) = ∂a · b + a · ∂b.
The k-module of derivations from A to I is denoted by Der(A, I).
Remark 2.17. The relation defining derivations depends only on the A-bimodule
structure on I. We are thus led to consider I o , the algebra obtained by taking the
same underlying k-module as I, endowed with the trivial product. The action of A on
I induces an action of A on I o in the obvious manner, and a derivation from A to I is
then the same as a section of the projection:
Io o A A
in the category of algebras.
When we work in the category of filtered algebras, Der(A, I) is a filtered module,
a derivation ∂ being of degree at least j if ∂(Ai ) ⊆ Ii+j for all i. If A is filtered by its
powers Ai , we just have to check this in degree one:
Lemma 2.18. Let A be an algebra, filtered by its powers Ai := Ai , acting on a filtered
algebra I∗ . Let ∂ ∈ Der(A, I). Then ∂ is of degree at least j if and only if:
∂(A) ⊆ Ij+1 .
Proof. An action of A∗ on I∗ is given by a left and a right multiplication which are
filtered, meaning that Ai Ij ⊆ Ii+j and Ij Ai ⊆ Ii+j . Use the formula:
X
∂(a1 · · · ai ) =
a1 · · · ak−1 ∂(ak )ak+1 · · · ai
k
to get the desired result.
We can get examples of actions from algebras acting on themselves. Precisely, the
adjoint action of A on itself is just the obvious A-bimodule structure on A. Derivations
are then the usual ones.
Given an action of A on I represented by (ρ, λ), we can twist it by choosing endomorphisms ϕ and ψ of A and letting A act on I through (ρ ◦ ϕ, λ ◦ ψ). This means
that we let a ∈ A act on I by ϕ(a) · − on the left, and by − · ψ(a) on the right. We
give a name to derivations from A to the the twisted A-bimodule I.
23
Definition 2.19. Let ϕ and ψ be endomorphisms of A. A (ϕ, ψ)-derivation is a linear
map ∂ : A −→ I satisfying:
∂(ab) = ∂a · ψb + ϕa · ∂b.
We denote by Der(ϕ,ψ) (A, I) the k-module of such derivations.
Example 2.20. Let A be a group algebra kG and M a kG-module. We can make M
into a bimodule by making kG act trivially on the right (that is, through ε). Then,
Der(kG, M ) is exactly the usual module of derivations (see Definition 2.1). If M = kG,
it is already a bimodule, but the above structure can be obtained through twisting the
right action by ηε : g 7→ ε(g) · 1. Then Der(kG) (defined in Definition 2.1) is exactly
Der(id,ηε) (kG, kG).
We can apply Lemma 2.18 to A = I = IG, to get:
Corollary 2.21. Let ∂ be a derivation of Z G such that ∂(Z G) ⊆ (IG)l+1 (which is
always true for l = −1). For all integer k, we have:
∂((IG)k ) ⊂ (IG)k+l .
Remark 2.22. Let us stress that the proof given here is fairly direct. In fact, it gets
even shorter in this case, the result following from: ∀v ∈ I, ∂(uv) = u · ∂v.
Remark 2.23. The classical inclusion of Γk − 1 into IGk can be shown by a direct
induction, or follows from Lazard’s theorem (as D∗ (G) is a strongly central series, it
contains Γ∗ G). Under the hypothesis of Proposition 2.21, it implies ∂(Γk ) ⊆ (IG)k+l ,
using that ∂(1) = 0.
Remark 2.24. Some sets of derivations obtained from actions of A on itself can have
more structure than just a module structure. Precisely, if we twist the adjoint action of
A by some (ϕ, ψ) as above, and if we add the requirement that ϕ and ψ are idempotents,
then the set of (ϕ, ψ)-derivations from A to A commuting to ϕ and ψ is a sub-Lie algebra
of Endk (A):
[∂, ∂ 0 ](ab) = ∂∂ 0 a · ψ 2 b + ϕ∂ 0 a · ∂ψb + ∂ϕa · ψ∂ 0 b + ϕ2 a · ∂∂ 0 b
− ∂ 0 ∂a · ψ 2 b − ϕ∂a · ∂ 0 ψb − ∂ 0 ϕa · ψ∂b − ϕ2 a · ∂ 0 ∂b
= [∂, ∂ 0 ](a) · ψ(b) + ϕ(a) · [∂, ∂ 0 ](b).
In particular, if (ϕ, ψ) = (1 , 1 ), we get that Der(A) is a sub-Lie algebra of Endk (A).
Another example is given by A = kG and (ϕ, ψ) = (1 , ηε). But more is true is this last
case. Let kG be filtered by the powers of the augmentation ideal. If ∂, ∂ 0 ∈ Der(kG)
are such that ∂ 0 has degree at least 0, then ∂ ◦ ∂ 0 ∈ Der(kG), because ε(∂ 0 v) = 0 for
any v.
Let A∗ I∗ be an action of filtered algebras. Since the functor gr : f Alg −→ grAlg
from filtered algebras to graded ones is exact (the same proof as that of Proposition 1.24
works), this action is sent to an action gr(A∗ ) gr(I∗ ) of graded algebras. Moreover,
gr also commutes with (−)o (the definition of (−)o being extended to graded algebras
in the obvious way), so we get a morphism:
gr(Der(A∗ , I∗ )) ,→ Der∗ (gr(A∗ ), gr(I∗ )),
24
where the target is the graded module of graded derivations. This morphism is obviously injective. It is in fact a restriction of the natural injection:
gr(Homk (M∗ , N∗ )) ,→ Hom∗ (gr(M∗ ), gr(N∗ ))
between bifunctors on graded modules. As such, it preserves all algebraic structure
inherited from the additive bifunctor structure (see Remark 2.24).
When A∗ is kG, filtered by the powers of IG, acting on itself, we thus get a morphism
preserving the structure induced by composition:
gr(Der(kG)) ,→ Der∗ (gr(kG)).
Proposition 2.25. If G is a free group, and M∗ is a filtered kG-module (considered
as a bimodule with trivial right action), the canonical map:
gr(Der(kG, M∗ )) ,→ Der∗ (gr(kG), gr(M∗ ))
is an isomorphism. Here, by derivations, we mean (id, ε)-ones.
Proof. Let S be a free set of generators for G. Then V = Gab is free abelian on S, and
gr(kG) ∼
= T V is the tensor algebra. Identifying derivations with sections as above (see
Remark 2.17), we see that a derivation is completely determined by the choice of its
values on S:
Der∗ (T V, N∗ ) = F∗ (S, N∗ ),
for any graded T V -bimodule N∗ , where F∗ (S, N∗ ) is the set of graded maps from S
(concentrated in degree 0) to N∗ . The same is true for the other side. Indeed, a
derivation from kG to M is a section of the projection M o G G, so is determined
by a map S → M :
Der(kG, M∗ ) = Der(G, M∗ ) ∼
= M∗S .
The second member is the set of maps from S to M , with the filtration inherited from
the one on M . The desired isomorphism is then exactly: gr(M∗S ) ∼
= F∗ (S, gr(M∗ )).
Remark 2.26. If M is a G-module, we can endow it with the universal kG-filtration
(IG)∗ · M .
Remark 2.27. The isomorphism gr(Der(kG)) ∼
= Der∗ (T V ) thus obtained preserves
the algebraic structure obtained from the composition of derivations.
2.4
Traces
In [Bar13], Bartholdi defines the trace of an automorphism ϕ of Fn by:
Tr(ϕ) := Tr(Dϕ − 1 ) ∈ Z Fn ,
where Dϕ denotes ϕ’s Jacobian matrix. We will show that Tr induces a well-defined
map between the graded Lie algebras, which we still call Tr:
Tr : L(A∗ (Fn )) −→ gr(Z Fn ) ∼
= T V.
The aim of this paragraph is to show that this map is indeed well-defined, to investigate
its behaviour with respect to Lie structures, and to get Morita’s algebraic description
[Mor93], used by Satoh in [Sat12].
25
2.4.1
The induced map between Lie algebras
Let ϕ ∈ Ak (Fn ). By definition, ϕi := x−1
i ϕ(xi ) ∈ Γk+1 . The Jacobian matrix of ϕ can
be described explicitly:
∂(xi ϕi )
∂xi
∂(ϕi )
=
.
+xi
∂xj
∂xj
∂xj
|{z}
(Dϕ)ij =
δij
Hence:
Dϕ − 1 =
∂ϕi
xi
∂xj
.
ij
Using Remark 2.23, we see that this matrix is in fact in Mn (I k ) (to shorten notations,
we write I for IFn in the sequel). Moreover, xi acts trivially on I k /I k+1 . We thus get
an explicit formula for the trace map:
Tr(Dϕ − 1 ) =
X
i
xi
∂ϕi X ∂ϕi
≡
∂xi
∂xi
i
(mod I k+1 ).
Let G be any group. We can apply the construction of Paragraph 1.7 to A = kG,
filtered by the powers of the augmentation ideal. This gives a strongly central filtration
GLn (I ∗ G) on GLn (IG), which comes with an embedding of Lie algebras:
L(GLn (I ∗ G)) ,→ gr(Mn (kG)) ∼
= Mn (gr(kG)).
The next proposition replaces a formula from [Bar13, section 6]:
Proposition 2.28. The Jacobian matrix D induces a morphism between graded modules:
D : L(A∗ (Fn )) −→ L(GLn (I ∗ Fn )),
satisfying:
D([f, g]) = [g, Df ] + [Dg, f ] + [Dg, Df ] .
In order to address the issue raised in Remark 2.9, let us introduce some notations
before proving the proposition. If G is any group, we denote by Gop the opposite group,
where multiplication is defined by: g ·op h = hg. Let G∗ be a strongly central filtration
op
on G. Then Gop
and one easily checks that:
∗ is such a filtration on G
op
L(Gop
∗ ) = L(G∗ ) ,
where the bracket in L(G∗ )op is L(G∗ )’s additive inverse: [x, y]op = [y, x].
Proof of Proposition 2.28. Corollary 2.8 states exactly that D is a derivation from
Aut(Fn ) to GLn (I)op ⊂ Mn (Z Fn )op , where Mn (Z Fn ) is endowed with the obvious
Aut(Fn )-action. We thus can apply the results from 2.2 with ∂ = D, G = Aut(Fn ),
H = GLn (I)op , and H∗ = GLn (I ∗ )op .
The strongly central filtration A∗ (G, H∗ ) is in fact the Andreadakis filtration A∗ =
A∗ (Fn ) on A1 = IAn ⊂ Aut(Fn ). Indeed, there is a series of inclusions:
A∗ (G, D∗ Fn ) ⊇ A∗ (G, GLn (I ∗ )) ⊇ A∗ (G, Mn (Z Fn )) = A∗ (G, Z Fn ) .
26
The first one comes from 1.49 applied to the injection of D∗ Fn into GLn (I ∗ ) defined
by w 7−→ w · 1 . The second one is a particular case of 1.52. The last equality comes
from the fact that G acts component-wise on matrices:
[g, (mij )] = g · (mij ) − (mij ) = ([g, mij ]).
According to proposition 1.53, these inclusions are in fact equalities.
Moreover, we have seen at the beginning of the present paragraph that D sends A∗
to GLn (I ∗ )op . The filtration A∗ ∩ ∂ −1 (H∗ ) is thus only A∗ . The work already done in
2.2 allows us to get the desired result.
The map given by Proposition 2.28 can be composed with the morphism:
(−)−1
L(GLn (I ∗ )) −→ gr(Mn (Z Fn )) ∼
= Mn (gr(Z Fn )) = Mn (T V ).
Thus, for ϕ an element of Ak /Ak+1 , Dϕ − 1 is well-defined modulo Mn (I k+1 ). Composing with the usual trace, we get the announced well-defined linear map induced by
ϕ 7−→ Tr(Dϕ − 1 ):
Tr : L(A) −→ T V.
Remark 2.29. That the map D− 1 (hence Tr) induces a well-defined map between the
Lie algebras can be seen through explicit calculation, but the behaviour with respect
to the Lie bracket is much less obvious from this point of view. Indeed, let ϕ ∈ Ak . If
ϕ = ψχ, with χ ∈ Ak+1 , then:
ψ(xi ) = ϕ(xi χi ) = xi ϕi ϕ(χi ).
As χi stands inside Γk+2 , its image by ϕ does too. Thus:
∂ϕi
∂ϕ(χi )
∂ϕi
∂ψi
=
+ ϕi
≡
∂xj
∂xj
∂x
∂xj
| {zj }
(mod I k+1 ).
∈I k+1
2.4.2
Introducing the contraction map
Consider the evaluation map:
ev : Der(1 ,ε) (T V ) ⊗ T V −→ T V.
Using the universal property of T V , as in the proof of 2.25, we get a linear isomorphism:
Der(1 ,ε) (T V ) ∼
= Hom(V, T V ) ∼
= V ∗ ⊗ T V.
The evaluation map then is:
∗
V ⊗ TV ⊗ TV
ω⊗u⊗v
−→ T V
7−→ Φ(ω ⊗ v)u,
where Φ is the contraction map:
∗
V ⊗ V ⊗k+1
−→ V ⊗k
Φ:
α ⊗ Xi1 · · · Xik+1 7−→ Xi1 · · · Xik α(Xik+1 ),
extended by zero on k·1. This follows from the fact that any (1 , ε)-derivation ∂ verifies:
∂(uv) = u · ∂v,
when the degree of v is at least 1 (that is, when ε(v) = 0), and ∂(1) = 0.
We sum this up in the following:
27
Proposition 2.30. Let ∂ ∈ Der(1 ,ε) (T V ). Then:
∂ = Φ(∂|V ⊗ −).
Let us consider the derivation ∂x∂ i of Z Fn . It induces a (1 , ε)-derivation of degree
−1 of T V , denoted by ∂i (any derivation of kG is of degree at least −1, by Corollary
2.21). As ∂i |V = Xi∗ , we get the following:
Corollary 2.31. The (1 , ε)-derivation of T V induced by ∂x∂ i ∈ Der(Z Fn ) is represented
as:
∂
= ∂i = Φ(Xi∗ ⊗ −) : T V −→ T V.
∂xi
We can use these results to interpret the trace map in a way more suited to explicit
calculations:
Proposition 2.32. The trace map can be described as:
Tr = Φ ◦ ι ◦ τ,
where τ is the Johnson morphism (see Definition 1.26), ι denotes the inclusion of
Derk (LV ) ∼
= V ∗ ⊗ Lk+1 V into Derk (T V ) ∼
= V ∗ ⊗ V ⊗k+1 , and Φ is the contraction map.
Proof. Let ϕ ∈ Ak . Then τ (ϕ) is defined by:
∼
τ (ϕ)(Xi ) = x−1
i ϕ(xi ) = ϕi ∈ Γk+1 /Γk+2 = Lk+1 V.
We have seen at the beginning of Paragraph 2.4.1 that the trace map is given by:
Tr(Dϕ − 1 ) =
X ∂ϕi
i
∂xi
.
The formula of the proposition is then equivalent to:
!
X
X ∂ϕi
∗
Φ
.
Xi ⊗ ϕi =
∂xi
i
i
To get this formula, we evaluate the equality given by Corollary 2.31 to the elements
ϕi − 1 (keeping in mind that the inclusion of Lk+1 V into Tk+1 V is given by w 7→
w − 1).
2.5
2.5.1
Stable surjectivity
Vanishing of the trace map
Here, we show that the trace map takes values in brackets inside T V . This result can
also be found in [MS17, Prop. 5.3], where rational methods are used to get it.
Proposition 2.33 ([BLGM90, Th. 2.1], quoted in [Bar13, Th. 6.2]). Let k > 2, and
let J ∈ GLm (IZk Fn ). Denote by V the abelianization V = Fnab ∼
= Zn . Then:
Tr (J − 1 ) ∈ [T V, T V ]k ⊂ V ⊗k ∼
= I k /I k+1 .
This result relies on the following criterion:
28
Proposition 2.34 ([BLGM90, prop. 2.2]). Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Z)
be the sub-Z-module generated by the ei,i+1 . Suppose:
∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0.
Then f ∈ [T V, T V ]k .
The proof can be found in [BLGM90]. The reader is also referred to the proof of
Proposition 3.16, which is the same proof, adapted to the case of positive carateristic.
Proof of Proposition 2.33. The main idea is to use evaluations into commutative algebras to be able to use Proposition 1.41, and to then get back to the non-commutative
setting by using the above criterion.
Let 1 + tAi ∈ GLk (tk[t]). There is an evaluation morphism xi 7→ 1 + tAi from Fn to
GLk (t Z[t]), extending to a morphism from kFn to Mk (tk[t]) sending I ∗ to t∗ Mk (k[t]).
Taking congruence groups, we get an evaluation morphism:
ev1 +tAi : GLm (I ∗ Fn ) −→ GLm (t∗ Mk (k[t])) = GLmk (t∗ k[t]).
There is a commutative diagram:
L(GLm (I ∗ Fn ))
(−)−1
Mm (T V )
ev1 +tAi
L(GLmk (t∗ k[t]))
(−)−1
Mmk (k[t])
TV
evtAi
evtAi
det
L(k[t]×
∗) = 0
Tr
T rm
Mm (k[t])
Tr
Tr
(−)−1
k[t]
Here, we identify gr(I ∗ Fn ) with T V by xi 7→ 1 + Xi . We also identify gr(t∗ k[t]) with
k[t]. The evaluation xi 7→ 1 + tAi thus induces Xi 7→ tAi between the associated
graded. The bottom-left square is just the one in Proposition 1.41. The map T rm is
the usual trace when the base algebra is Mm (k[t]).
Let k = Z and f = Tr(J − 1 ) ∈ V ⊗k . The commutativity of the above diagram
gives:
0 = Tr(f (tAi )) = tk Tr(f (Ai )).
As a consequence, Tr(f (Ai )) = 0, for any 1 + tAi ∈ GLk (t Z[t]). We can then evaluate
this at t = 0 to get: Tr(f (πAi )) = 0. This evaluation π is the map:
π : L1 (GLk (t∗ Z[t]) ,→ Mk t Z[t]/t2 Z[t] ∼
= Mk (Z).
Using Proposition 1.42 and Remark 1.43, we see that its image is exactly sln (Z), so
the conclusion follows from the above criterion (2.34).
Because of Proposition 2.33, we will consider the trace map as taking values in the
abelianization T V ab = T V /[T V, T V ]. As [T V, T V ]k is generated by the elements:
[Xi1 ⊗ · · · ⊗ Xip , Xip+1 ⊗ · · · ⊗ Xik ] = Xi1 ⊗ · ⊗ Xik − tp · Xi1 ⊗ · ⊗ Xik ,
where t = 1̄ ∈ Z /k, the module T V ab is the module of cyclic powers C∗ V :
(T V ab )k = Ck V := V ⊗k /(Z /k).
The conclusion of Proposition 2.33 becomes, in this context: Tr (J − 1 ) = 0 ∈ C∗ V.
29
2.5.2
Linear algebra
Consider the Johnson morphism τ 0 : L (ΓIAn ) −→ Der∗ (L(Fn )) (cf. 1.5). The morphism τ10 is an isomorphism (see Proposition 1.34). Moreover, L (ΓIAn ) is generated
in degree 1 (cf. 1.9). As a consequence, the image of τ 0 is exactly the sub-Lie ring
generated in degree 1 inside Der (L(Fn )). As L(Fn ) is the free Lie ring LV , the study
of coker(τ 0 ) is solely a problem of linear algebra.
Recall from Proposition 2.32 that the trace map can be seen as the composite of
the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (LV ) ∼
= V ∗ ⊗ Lk+1 V with:
ι
Φ
π
TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V := V ⊗k /(Z /(k)),
where ι and π denote the canonical maps. All these morphisms are obviously GLn (Z)equivariant (with respect to the canonical actions).
Notation 2.35. Let I denote the image of τ 0 , which is the sub-Lie ring generated in
degree 1 inside Der(LV ).
The following proposition can be seen as a consequence of Proposition 2.33. Precisely, I = Im(τ 0 ) ⊆ Im(τ ), and Proposition 2.33 implies that TrM ◦τ = Tr vanishes.
Proposition 2.36. For every k > 2, TrM (Ik ) = {0}.
2.5.3
Stable cokernel of τ 0 and stable surjectivity
Let k > 2. Using Proposition 2.36, we get a commutative diagram with exact rows:
Ik
V ∗ ⊗ Lk+1 V
φ
coker(τk0 )
Φ
V ⊗k
[T V, T V ]k
Φ
π
Ck V.
In [Sat12], Satoh shows:
For n > k + 1, Φ is surjective, (lemma 3.2)
For n > k + 2, φ is surjective, (prop. 3.2)
For n > k + 2, ker Φ ⊆ I.
(Prop. 3.3)
His Theorem 3.1 is still true over Z:
Proposition 2.37. Let k > 2 and n > k + 2 be integers. Then Φ is a GLn (Z)equivariant isomorphism:
coker(τk0 ) ∼
= Ck V.
Proof. Let us denote by K (resp. L) the kernel of Φ (resp. its cokernel). There is a
commutative diagram in GLn (Z) − ModZ :
ker Φ
Ik
φ
0
V ∗ ⊗ Lk+1 V
coker(τ 0 )
Φ
[T V, T V ]k
V ⊗k
0
0
30
K
Φ
π
Ck V
L.
The snake lemma ensures that K and L are zero: Φ is an isomorphism.
We can now state our main result:
Theorem 2.38. Let k + 2 6 n. Then the canonical morphism
Lk (IAn ) −→ Lk (A∗ (Fn ))
is surjective, and τ induces an isomorphism: Lk (A∗ (Fn )) ∼
= Ik .
Remark 2.39. Basis being chosen, there is an injection of Fn in Fn+1 ∼
= Fn ∗ Z. An
automorphism ϕ of Fn can be extended to an automorphism ϕ∗ 1 of Fn+1 . This induces
injections IAn ,→ IAn+1 which in turn induce morphisms L(A∗ (Fn )) → L(A∗ (Fn+1 )).
Taking the colimit over n, we can define a Lie ring Lst (A∗ ). In the same way, we can
ab
define injections from Der(L(Fnab )) into Der(L(Fn+1
)) and take the colimit Ist of the
sub-algebras generated in degree one. With this point of view, the isomorphisms of
Theorem 2.38 give an isomorphism between graded Lie algebras:
τ st : Lst (A∗ ) ∼
= Ist ,
meaning exactly that Lst (A) is generated in degree one.
In fact, all the constructions appearing here are functors on the category denoted
by S(Z) in [Dja16b, section 7], where it is shown (using methods similar to the ones
of [CEFN14]) that these functors are finitely supported. This implies the equivalence
between τkst being an isomorphism and τk being one for n big enough.
Proof of theorem 2.38. Consider the commutative diagram:
i∗
L(IAn )
L(A∗ )
τ
τ0
Der(LV ).
The image I of τ 0 is the sub-Lie ring generated in degree one inside Der(LV ). Using
the results quoted in Paragraph 2.5.3, we see that in degrees k 6 n − 2, it also is the
kernel of the trace map. Proposition (2.33) tells us exactly that Tr ◦τ = 0, so that
Im τk ⊆ ker Trk = Im τk0 when k > n − 2. As a consequence, Im τ = Im τ 0 . As τ is
injective (1.32), it is an isomorphism onto its image, hence the result.
2.6
Automorphisms of free nilpotent groups
Automorphisms of nilpotent groups are easy to deal with, due to the following classical
fact:
Lemma 2.40. Let G be a finite-type nilpotent group. An endomorphism ϕ ∈ End(G)
is an automorphism if and only if the induced morphism ϕab ∈ End(Gab ) is.
Proof. If ϕ is an automorphism then ϕab has to be, with (ϕab )−1 = (ϕ−1 )ab . Conversely,
suppose that ϕab is an automorphism. This means that L1 (ϕ) is. Since L(G) is
generated in degree one, L(ϕ) is surjective. But each Lk (G) is abelian of finite type, so
each Lk (ϕ), being surjective, has to be bijective (it is obviously the case on the torsion
31
part, which is finite, and it also is on the free abelian part, for reasons of rank). The
lemma then follows by induction from the five-lemma applied to:
Lk (G)
Lk (ϕ)
Lk (G)
G/Γk+1 G
G/Γk G
ϕ̄
G/Γk+1 G
ϕ̄
G/Γk G.
This induction process stops since there is a c such that G = G/Γc+1 G.
b := lim (G/Γk G) .
Definition 2.41. The pro-nilpotent completion of a group G is: G
←−
b is canonically filtered by the Γ̄j G := lim (Γj G/Γk G). This filtraThe completion G
←−
tion is its closed lower central series, defined as the closure of the lower central series.
b An endomorphism of G
b
It is minimal amongst closed strongly central filtrations on G.
is continuous if and only if it preserve this filtration.
b is an automorLemma 2.42. Let G be a group. A continuous endomorphism ϕ of G
ab
ab
phism if and only if the induced morphism ϕ ∈ End(G ) is.
Proof. Such an endomorphism is an automorphism if and only if the associated morphism between projective system is. These are the induced endomorphisms of the
G/Γk G, which are nilpotent groups. This condition amounts to ϕ inducing an isomorphism on Ĝ/Γ̄2 = Gab , by Lemma 2.40.
b
In fact, we can readily deduce the following explicit description of the group AutC 0 (G)
b
of continuous automorphisms of G:
Proposition 2.43. The canonical map is an isomorphism:
b ∼
AutC 0 (G)
(Aut(G/Γk G)) .
= lim
←−
Let G = Fn be a free group of finite type. It is residually nilpotent, so it embeds
into its completion Fbn . A continuous endomorphism of Fbn is uniquely determined by
its (arbitrary) values on the topological generators xi .
Let us denote by Fn,c the free c-nilpotent group Fn /Γc+1 Fn . Using Lemmas 2.40 and
2.42, we can show two surjectivity results for automorphisms of free nilpotent groups:
Proposition 2.44. The canonical morphisms Aut(Fn,c ) → Aut(Fn,c−1 ) are surjective.
Proof. Let (xi ) be a free basis of Fn . Let ϕ ∈ Aut(Fn /Γc (Fn )). Lift the elements ϕ(x̄i )
to elements ti of Fn /Γc+1 (Fn ). Then define the endomorphism ϕ̃ of Fn /Γc+1 (Fn ) by
x̄i 7→ ti . Since ϕ and ϕ̃ induce the same endomorphism of Fnab , Lemma 2.40 implies
that ϕ̃ is an isomorphism.
Proposition 2.45 ([Bar13, th. 5.1]). The Johnson morphism associated to the universal action on Γ̄∗ (Fn ) is an isomorphism:
τ : L(A∗ (Γ̄∗ Fn )) ∼
= Der(LV ).
Proof. Because of Lemma 1.28, we know that τ is injective. We need to show that it is
surjective. Let us first remark that L(Γ̄∗ (Fn )) = L(Γ∗ (Fn )) ∼
= LV . Let ∂ ∈ Derk (LV ).
∼
Lift each ∂(Xi ) ∈ Γk /Γk+1 = Γ̄k /Γ̄k+1 to an element ti ∈ Γ̄k . We can define a continuous
endomorphism of Fbn by ϕ : xi 7→ ti xi . Then ϕ acts trivially on Fnab , so it is an
isomorphism by Lemma 2.42. As a consequence, ϕ ∈ Ak (Γ̄∗ (Fn )) satisfies τ (ϕ̄) = ∂.
This concludes the proof.
32
We can translate this last result into a statement about automorphisms of free
nilpotent groups : because of Propositions 2.43 and 2.44, Aut(Fn,c ) is a quotient of
AutC 0 (Fbn ). Moreover, the kernel of the canonical surjection is Ac (Γ̄∗ Fn ), by definition.
Thus, this projection induces the c-truncations at the level of the associated graded
objects :
Corollary 2.46. The Johnson morphism associated to the universal action on Γ∗ (Fn,c )
is an isomorphism:
τ : L(A∗ (Fn,c )) ∼
= Der(L6c V ).
Consider the Johnson morphism τ 0 : L(Γ∗ (IAFn,c )) → Der(L6c V ). Using the identification of corollary 2.46, we see that τ 0 identifies with the Andreadakis morphism
i∗ : L(Γ∗ (IAFn,c )) → L(A∗ (Fn,c )). Its image is the subalgebra generated in degree one
inside Der(L6c V ), as was the case in paragraph 2.5.2. This subalgebra is exactly the
truncation I<c , so is inside (and stably equal to) the kernel of the trace map. As a
consequence, the Andreadakis equality never holds for free nilpotent groups.
Moreover, in this context, our stable surjectivity result translates as :
Corollary 2.47. The following sequence always is a complex, and is exact for n > c+1:
i∗
Tr
L(Γ∗ (IAFn,c )) −→
L(A∗ (Fn,c )) ∼
= Der(L6c V ) −→ C<c V −→ 0.
Remark 2.48 (Non-tame automorphisms). The canonical morphism p : Aut(Fn ) →
Aut(Fn,c ) is in general not surjective: some basis of the free nilpotent group do not
lift to basis of the free group via Fn Fn,c . Automorphisms of Fn,c induced by
automorphisms of Fn are called tame. This was the original motivation of [BLGM90]
for considering the trace map. In this regard, our stable surjectivity result could be
re-stated as follows : in the stable range, the trace is the only obstruction for an
automorphism to be tame.
3
The case of positive caracteristic
3.1
Dark’s theorem
Let w be a word in a free group FS . Let w(r) be the word obtained from w by
replacing each generator s ∈ S by some power srs . Dark’s theorem [Dar68] describes
how to decompose w(r) as a product of commutators. This gives very useful universal
formulas, that can then be evaluated in any group. The reader is referred to [Pas79,
chap. IV, Th. 1.11] for a precise statement and a proof of the theorem. Here we recall
two corollaries, obtained by taking w = [x, y] and w = xy in F{x,y} .
The case w = [x, y] is [Pas79, IV, cor. 1.16]:
Corollary 3.1. There exists a unique map θ : (N∗ )2 −→ F2 = hx, yi verifying:
Y
α
β
∀α, β ∈ N, [xα , y β ] =
θ(r, s)( r )( s ) .
r,s>1
Each θ(r, s) is a product of {x±1 , y ±1 }-commutators such that x±1 appears at least r
times and y ±1 at least s times in each factor.
The case w = xy has been known for a long time (quoted in [Pas85, chap. 11, Th.
1.14], it already appears for instance in [Hal34]):
33
Corollary 3.2. There exists a unique map θ : N −→ F2 = hx, yi such that:
Y
α
∀α ∈ N, xα y α =
θ(r)( r ) ,
r>0
Each θ(r) is a product of {x±1 , y ±1 }-commutators of length at least r.
Remark 3.3. In both cases, uniqueness of the map θ is obvious: it can be defined by
induction.
3.2
p-Restricted strongly central series
Definition 3.4. Let p be a prime number. A strongly central series G∗ is said to be
p-restricted if:
∀i, Gpi ⊆ Gip .
Let G∗ be a p-restricted strongly central series. Using [Pas79, Th. III.1.7], we see
that the morphism:
L(G∗ ) −→ gr(aF∗ p (G∗ ))
induced by g 7−→ g − 1 (see Theorem 1.37 and Proposition 1.40) is injective. We
can identify L(G∗ ) with its image, which is stable by the p-th power operation in the
F
associative Fp -algebra gr(a∗ p (G∗ )), since (g − 1)p = g p − 1. From this we deduce that
L(G∗ ) is a p-restricted Lie algebra with p-th power operation induced by g 7−→ g p in G1 .
The reader is referred to the classical [Jac41] for a discussion of p-restricted Lie algebras.
We also can deduce from [Pas79, Th. III.1.7] that any p-restricted strongly central series
F
F
has to contain the dimension series D∗ p G defined in Example 1.39 (because a∗ p (G∗ )
contains IF∗p G):
F
Proposition 3.5. The filtration D∗ p G is the minimal p-restricted strongly central series, on any group G.
[p]
The filtration DFp , also denoted by Γ∗ also admits a description by induction, or
the more explicit description:
Y
j
[p]
Γk G =
(Γi G)p .
ipj >n
These can be found in [Laz54, Th. 5.6] or [Pas79, Th. IV.1.9]. We also refer to [CE16]
for a nice discussion of filtrations defined by induction. This description has a nice
[p]
consequence, similar to Proposition 1.9 (we abbreviate L(Γ∗ G) to L[p] (G)):
Proposition 3.6. The p-restricted Lie ring L[p] (G) is generated in degree 1. Precisely,
[p]
it is generated (as a p-restricted Lie ring) by L1 (G) = Gab ⊗ Fp .
Example 3.7. If G is a free group, then L[p] (G) = L(D∗ p G) is the p-restricted Lie
algebra generated by the degree-one part inside gr(Fp G) ∼
= TFp (Gab ) so, using PBW
over Fp [Jac41, Th. 1] it is the free p-restricted Lie algebra over the Fp -module Gab ⊗ Fp
[Laz54, Th. 6.5].
F
[p]
Remark 3.8. The filtration Γ∗ G (already defined in [Zas39]) is to be distinguished
(p)
from Stallings’ filtration Γ∗ G, defined in [Sta65]. The latter is the minimal p-torsion
strongly central filtration on a group G, where a strongly central filtration is p-torsion
when Gpi ⊆ Gi+1 (for all i). See remark 3.14 for more on q-torsion strongly central
series.
34
3.3
The p-restricted Andreadakis problem
[p]
[p]
[p]
[p]
Let us denote A∗ (Γ∗ G) by A∗ (G). Remark that A1 (G) is the group IAG of auto[p]
[p]
morphisms acting trivially on L1 (Γ∗ G) = Gab ⊗Fp , hence on all of L(Γ∗ G) (because of
[p]
Proposition 3.6). If we show that A∗ (G) is p-restricted (and we will – see Proposition
3.10) then we get an inclusion:
[p]
[p]
Γ∗ IAG ⊆ A∗[p] (G).
We are thus led to consider a p-restricted version of the Andreadakis problem:
Problem 3 (Andreadakis – p-restricted version). What is the difference between the
[p]
[p]
[p]
p-restricted strongly central series A∗ (G) and Γ∗ (IAG ) ?
[p]
Remark 3.9. The group IAG contains IAG as a normal subgroup. Moreover, the
[p]
quotient IAG /IAG is a subgroup of Aut(G)/IAG , hence of GL(Gab ). In fact, by
[p]
definition of IAG , it is contained in the congruence group:
GL(pGab ) = ker(GL(Gab ) → GL(Gab ⊗ Fp )).
When G = Fn is a free group of finite type, then Aut(G)/IAG ∼
= GLn (Z), and
[p]
IAG /IAG is exactly GLn (p Z).
Proposition 3.10 ([HM17], Prop. 8.5). Let G∗ be a p-restricted strongly central filtration, and K be a group acting on G∗ . Then A∗ (K, G∗ ) is a p-restricted strongly central
filtration.
Proof. Let κ ∈ Aj (K, G∗ ) and g ∈ Gi . Using Corollary 3.1, we get:
p
[κ , g] =
p
Y
p
θ(k, 1)(k) ,
k=1
p
with θ(k, 1) ∈ Gi+kj , for all k. If k < p, then θ(k, 1)(k) ∈ Gp(i+kj) ⊆ Gi+pj+1 . As θ(p, 1)
also is in Gi+pj , we have:
[κp , g] ∈ Gi+pj .
This is true for every g ∈ Gi , for all i. Hence κp ∈ Apj (K, G∗ ), which completes the
proof.
Proposition 3.10 can be refined:
Proposition 3.11. Under the same hypothesis as Proposition 3.10, A∗ (K, G∗ ) n G∗
is a p-restricted strongly central series.
Proof. Denote A∗ (K, G∗ ) n G∗ by K∗ . An element of Kj = Aj n Gj is a product κ · g,
with κ ∈ Aj and g ∈ Gj . Using Corollary 3.2, we get:
p p
κg =
p
Y
p
p
θ(k)(k) = (κg)p · θ(2)(2) · · · θ(p − 1)p · θ(p),
(3.11.1)
k=1
with θ(1) = κg and θ(k) ∈ Kkj for any k, as K∗ is strongly central. We use this formula
to show, by induction on d 6 p, the following result:
∀j, Kjp ⊆ Kdj .
35
This is true for d = 1, obviously. Let us assume that it holds for d − 1. Let κg ∈ Kj .
For the sake of clarity, let us rewrite the formula (3.11.1):
p
p p
−1
(κg) = κ g · θ(p)
·
2
Y
p
θ(k)−(k) .
k=p−1
Using, respectively, that A∗ is p-restricted (Proposition 3.10), that G∗ is (by definition)
and that K∗ = A∗ n G∗ is strongly central, we get:
κp , g p , θ(p) ∈ Kpj ⊆ Kdj ,
where the inclusion
comes from the inequality d 6 p. If 2 6 k < p, then θ(k) ∈ Kkj .
As p divides kp , the induction hypothesis implies:
p
p
⊆ K(d−1)kj ⊆ Kdj ,
θ(k)(k) ∈ Kkj
because (d − 1)kj > dj. Finally, we get what we were looking for:
(κg)p ∈ Kdj ,
which completes the induction step, and the proof of the proposition.
Let SCF p be the full subcategory of SCF given by p-restricted strongly central
series. As a consequence of Propositions 3.10 and 3.11, we get:
Corollary 3.12. The category SCF p is action-representative, the universal action on
G∗ being A∗ (G∗ ) G∗ .
This allows us to answer [HM17, rk. 8.6]. Indeed, the Lie functor restricts to
a functor L : SCF p −→ pLie with values in the category pLie of p-restricted Lie
algebras (over Fp ). Actions in pLie are represented by p-restricted derivations, in the
sense of Jacobson [Jac41]. As in Paragraph 1.4, an action K∗ G∗ in SCF p induces,
by exactness of the Lie functor, an action L(K∗ ) L(G∗ ) in pLie, which is encoded
by a morphism between p-restricted Lie algebras:
τ : L(K∗ ) −→ Der[p] (L(G∗ )),
where Der[p] ⊆ Der is the p-restricted sub-algebra of p-restricted derivations, i.e. derivations ∂ satisfying:
∂(ap ) = adp−1
a (∂a).
Let us stress that for g ∈ pLie, the Lie algebra Der(g) is indeed a p-restricted subalgebra of EndFp (g), but is does not act on g in pLie: the Lie algebra g o Der(g) bears
no natural p-restricted structure.
Remark 3.13. Using Proposition 3.6 instead of 1.9, and replacing derivations by p[p]
restricted ones in the proof, we can get an analogous of Lemma 1.30 for A∗ (G):
n
o
[p]
[p]
Aj (G) = σ ∈ Aut(G) [σ, G] ⊆ Γj+1 (G) .
[p]
[p]
In other words A∗ (G) in the subgroup of automorphisms acting trivially on G/Γj+1 (G).
This is exactly the definition used by Cooper [Coo15, def 3.2].
36
Remark 3.14 (On the q-torsion case). The same statements are true when considering
q-torsion strongly central filtrations (q does not have to be a prime number here), except
that they are easier to show, because the condition Gqi ⊆ Gi+1 is equivalent to the fact
that L(G∗ ) is q-torsion. Precisely, if L(G∗ ) is q-torsion, then Der(L(G∗ )) is too, and the
injectivity of the Johnson morphism L(A∗ (G∗ )) ,→ Der(L(G∗ )) implies that L(A∗ (G∗ ))
also is. Hence A∗ (G∗ ), and A∗ (G∗ ) n G∗ are q-torsion, so that these give a universal
action on G∗ in the category of q-torsion strongly central series.
Moreover, L(G∗ ) also gets some kind of q-th power operation, induced by q-th
(q)
powers in G = G1 . If G∗ = Γ∗ G is Stallings’ filtration on G, then these operations,
together with the Lie algebra structure, generate L(G∗ ) from its degree one part, which
(q)
allow us to get an analogue of Lemma 1.30: Aj (Γ∗ G) is the subgroup of automor(p)
phisms acting trivially on G/Γj+1 (G). Using only this definition, Cooper managed
to get the above results on the q-torsion case [Coo15]. However, his claim that the
p-restricted case worked similarly [Coo15, Lem. 3.7] seems flawed, and we do not see
how to get it without the technical work done above (Proposition 3.10).
The minimality of Stallings’ filtration also gives an inclusion:
[q]
(q)
G
,
Γ∗ IAG ⊆ A∗ Γ(q)
∗
and a corresponding Andreadakis problem. Nevertheless, our methods in studying
the Andreadakis problems so far rely heavily on algebraic structures associated to the
F
[p]
dimension subgroups D∗Z (Fn ) = Γ∗ (Fn ) and D∗ p (Fn ) = Γ∗ (Fn ), so they are not suited
to the study of this particular problem.
3.4
3.4.1
The stable p-restricted Andreadakis problem
Vanishing of the trace map
In the p-restricted context, Proposition 2.33 is replaced by:
Proposition 3.15. Let k > 2, and let J ∈ GLm (IFkp Fn ). Then:
Tr (J − 1 ) ∈ [T V, T V ]k + (T V )p ⊂ V ⊗k ∼
= I k /I k+1 ,
Where V = Fnab ⊗ Fp ∼
= Fnp .
The proof is exactly the same as the proof of proposition 2.33, over Fp instead of
Z, Proposition 2.34 being replaced by:
Proposition 3.16. Let f (X1 , ..., Xn ) ∈ V ⊗k . Let C ⊂ Mk (Fp ) be the sub-Z-module
generated by the ei,i+1 . Suppose:
∀Ci ∈ C, Tr(f (C1 , ..., Cn )) = 0.
Then f ∈ [T V, T V ]k + (T V )p .
Proof. We say that two elements u and u0 of V ⊗k are cyclically equivalent, and we
write u ∼ u0 if they are conjugate under the action of Z /p. We want to show that f is
cyclically equivalent to a p-th power. Let us decompose f , up toP
cyclical equivalence,
as a sum of pairwise non-cyclically equivalent monomials: f ∼
µg g, where each g
is of the form g = Xi1 · · · Xik . If g is such that the iα are pairwise distinct, evaluate
each Xiα as Ciα = eα,α+1 , and all Xi not appearing in g as Ci = 0. Then µg =
37
Tr(f (C1 , ..., Cn )) = 0. As a consequence, no such g can appear in our decomposition
of f .
P
Let λ be the algebra morphism from T V to T (V ⊗ V ) sending Xi to j Xij (where
Xij = Xi ⊗ Xj ). Take a monomial g = Xi1 · · · Xik as above. Its image is λ(g) =
P
k
j Xi1 j1 · · · Xik jk , the sum being taken over every j = (j1 , ..., jk ) ∈ {1, ..., k} . Let r be
the number of monomials cyclically equivalent to h = Xi1 1 · · · Xik k in this sum. Then r
is exactly the number of elements of Z /k stabilizing g. It is a multiple of p if and only
if g is a p-th power. If we decompose λ(f ) up to cyclic equivalence, as we did earlier
for f , the only occurrences of h must come from λ(g), hence the coefficient of h must
be rµg . Note that λ(f ) satisfies the same hypothesis as f , because C is stable under
addition. Since the Xiα α are pairwise distinct, we can apply the above argument and
find that rµg = 0. Thus, µg = 0 or g is a p-th power. Whence the result.
Remark 3.17. Any bracket and any p-th power satisfies the condition of Proposition
3.16. For brackets, it follows from the fact that the
P trace of a bracket is itself a sum
of brackets. For p-th power, remark that if M Q
=
mi ei,i+1 ∈ Mn (R), where R is an
p
associative ring of caracteristic p, then M = ( mi ) · 1p , and Tr(1p ) = p · 1 = 0 in k.
If k = pl and f = (Xi1 · · · Xil )p , apply this to M = Ci1 · · · Cil (where the Ciα are in C),
seen as a p × p-matrix with coefficients in Ml (k).
Because of Proposition 3.15, in characteristic p, we will consider the trace map
[p]
as taking values in C∗ V = T V /([T V, T V ] + (T V )p ), which is the quotient of the
cyclic power C∗ V by p-th powers. The conclusion of Proposition 3.15 then becomes:
[p]
Tr (J − 1 ) = 0 ∈ C∗ V.
3.4.2
Linear algebra
Consider the Johnson morphism
[p]
[p]
∼
(τ [p] )0 : L[p] IA[p]
−→
Der
L
(F
)
= V ∗ ⊗ L[p] V,
n
n
∗
the last isomorphism being obtained as in Example 1.33, using Example 3.7 instead of
Example 1.8, and replacing derivations by p-restricted ones. When p 6= 2, the morphism
[p]
(τ1 )0 is surjective. Indeed, the free Fp -Lie algebra LV is a sub-algebra of the free prestricted algebra L[p] V , and this inclusion is an isomorphism in degrees prime to p, in
particular in degree 2; thus we can lift the generators of V ∗ ⊗ Λ2 V by the generators of
IAn used in the proof of Proposition 1.34. Moreover, L[p] (IAn ) is generated in degree
1 as a p-restricted Lie algebra (cf. 3.6). As a consequence, the image of τ 0 is exactly
[p]
the p-restricted Lie algebra generated in degree 1 inside Der[p]
∗ (L V ).
The reader can easily check that the obvious p-restricted version of Proposition 2.32
does hold: the trace map obtained from free differential calculus can be seen as the
[p]
[p]
[p]
composite of the Johnson morphism τ : Lk (A∗ (Fn )) → Derk (L[p] V ) ∼
= V ∗ ⊗ Lk+1 V
with:
Φ
π
ι
[p]
[p]
TrM : V ∗ ⊗ Lk+1 V −→ V ∗ ⊗ V ⊗k+1 −→ V ⊗k −→ Ck V,
where ι and π again denote the canonical maps.
Notation 3.18. Let I[p] denote the image of (τ [p] )0 , the p-restricted Lie algebra generated in degree 1 inside Der(LV ).
The following proposition can be seen as a direct consequence of Proposition 3.15.
38
[p]
Proposition 3.19. For every k > 2, TrM (Ik ) = {0}.
Consider be the subspace of p-restricted derivations stabilizing the free Fp -Lie algebra LV ⊂ L[p] V . It is a p-restricted Lie sub-algebra of Der[p] (L[p] V ). Since each
derivation of LV extends to a unique p-restricted derivation of L[p] V , this sub-algebra
is isomorphic to Der(LV ). Under the identification with the graded module V ∗ ⊗L[p] V ,
it corresponds exactly to V ∗ ⊗ LV . As a consequence, if p 6= 2, the degree one part is
the same. Hence:
[p]
I[p] ⊆ DerLV (L[p] V ).
This implies that there is no stable surjectivity here: we can easily easily produce
examples of automorphisms whose associated derivation does not preserve LV . For
instance, take any world in Γk (Fn ) not containing any occurrence of x1 . Then the
[p]
automorphism ϕ defined by x1 7→ wp x1 and xi 7→ xi when i 6= 1 is obviously in Apk−1 ,
but τ (ϕ) = X1∗ ⊗ (w − 1)p sends X1 outside of LV .
3.4.3
Stable cokernel of i∗
We close the present paper with a quantification of the lack of stable surjectivity in
the p-restricted case.
Let k > 2. Like in paragraph 2.5.3, we get a commutative diagram with exact rows:
Īk
V ∗ ⊗ Lk+1 V
φ
[T V, T V ]k
Xk
Φ
Φ
π
V ⊗k
Ck V.
Here, V denotes Fnab ⊗ Fp , and Ī∗ = I∗ ⊗ Fp is the sub-Lie algebra generated in degree
one inside Der(LV ). The space Xk is just the quotient of V ∗ ⊗ Lk+1 V by Īk .
We will be interested in a slightly different diagram, though:
[p]
Ik
V ∗ ⊗ Lk+1 V
Xk0
Φ
φ
Φ
[p]
π
V ⊗k
[T V, T V ]k + (T V )p
Ck V.
We can still apply the calculations from [Sat12] to show that if n > k + 2, then Φ is
[p]
surjective and ker Φ ⊆ Īk ⊆ Ik . Only, now φ could have a cokernel. From [Sat12],
we only get that brackets are in its image, so this cokernel can only come from p-th
powers. In particular, it is concentrated in degrees divisible by p. We denote it by K.
The same application of the snake lemma as in the proof of Proposition 2.37 gives that
K is also the kernel of Φ, and that Φ is surjective.
Now consider the diagram:
[p]
Ik
V ∗ ⊗ Lk+1 V
Xk0
ι
ker(TrM )k
Φ
[p]
V ∗ ⊗ Lk+1 V
39
TrM
[p]
Ck V.
[p]
Denote by L the cokernel of the middle inclusion, then L = V ∗ ⊗ (Lk+1 V /Lk+1 V ) is
concentrated in degrees k = pl − 1 (with l > 1). The snake lemma gives a short exact
sequence:
0
K
coker(ι)
L
0.
Since the trace map TrM ◦τ vanishes, we have a commutative diagram:
i∗
[p]
L(IAn )
τ0
[p]
L(A∗ )
τ
ker(TrM ).
This implies that the cokernel of i∗ injects into the cokernel of ι. Thus, we have proved:
Proposition 3.20. Fix n an integer, and consider only degrees k 6 n−2. The cokernel
of the canonical morphism
i∗ : L(IAn[p] ) → L(A∗[p] (Fn ))
is concentrated in degrees k = pl − 1 and k = pl (for l > 1). If k = pl − 1, then
[p]
coker((i∗ )k ) injects into V ∗ ⊗ (Lk+1 V /Lk+1 V ). If k = pl, it is a sub-quotient of V ⊗l .
Remark 3.21. The tensor power V ⊗l appearing in the proposition is in fact the Frobenius twist of V ⊗l . This has no consequence here, as the Frobenius map is trivial on Fp ,
but it should be kept in mind for any functorial study of this situation.
References
[And65]
Stylianos Andreadakis. On the automorphisms of free groups and free
nilpotent groups. Proc. London Math. Soc. (3), 15:239–268, 1965. 2
[Bar13]
Laurent Bartholdi. Automorphisms of free groups. I. New York J. Math.,
19:395–421, 2013. 2, 25, 26, 28, 32
[Bar16]
Laurent Bartholdi.
Automorphisms of free groups. I—erratum [
MR3084710]. New York J. Math., 22:1135–1137, 2016. 2
[BB04]
Francis Borceux and Dominique Bourn. Mal’cev, protomodular, homological
and semi-abelian categories, volume 566 of Mathematics and its Applications. Kluwer Academic Publishers, Dordrecht, 2004. 7, 11
[BB07]
Francis Borceux and Dominique Bourn. Split extension classifier and centrality. In Categories in algebra, geometry and mathematical physics, volume 431 of Contemp. Math., pages 85–104. Amer. Math. Soc., Providence,
RI, 2007. 2, 8
[BBM07]
Mladen Bestvina, Kai-Uwe Bux, and Dan Margalit. Dimension of the
Torelli group for Out(Fn ). Invent. Math., 170(1):1–32, 2007. 1, 13
[BC05]
F. Borceux and Maria Manuel Clementino. Topological semi-abelian algebras. Adv. Math., 190(2):425–453, 2005. 7
40
[BEH08]
Laurent Bartholdi, Bettina Eick, and René Hartung. A nilpotent quotient
algorithm for certain infinitely presented groups and its applications. Internat. J. Algebra Comput., 18(8):1321–1344, 2008. 2
[BJK05]
Francis Borceux, George Janelidze, and Gregory M. Kelly. On the representability of actions in a semi-abelian category. Theory Appl. Categ.,
14:No. 11, 244–286, 2005. 2, 8
[BLGM90] Roger M. Bryant, Frank Levin, Chander K. Gupta, and Horace Y.
Mochizuki. Nontame automorphisms of free nilpotent groups. Comm.
Algebra, 18(11):3619–3631, 1990. 3, 28, 29, 33
[BMS67]
Hyman Bass, John Milnor, and Jean-Pierre Serre. Solution of the congruence subgroup problem for SLn (n > 3) and Sp2n (n > 2). Inst. Hautes
Études Sci. Publ. Math., 33:59–137, 1967. 16
[Bou08]
Dominique Bourn. Commutator theory, action groupoids, and an intrinsic
Schreier-Mac Lane extension theorem. Adv. Math., 217(6):2700–2735, 2008.
2, 8
[CE16]
Michael Chapman and Ido Efrat. Filtrations of free groups arising from
the lower central series. J. Group Theory, 19(3):405–433, 2016. 34
[CEFN14] Thomas Church, Jordan S. Ellenberg, Benson Farb, and Rohit Nagpal.
FI-modules over Noetherian rings. Geom. Topol., 18(5):2951–2984, 2014.
31
[Coo15]
James Cooper. Two mod-p Johnson filtrations. J. Topol. Anal., 7(2):309–
343, 2015. 36, 37
[CP17]
Thomas Church and Andrew Putamn. Generating the johnson filtration ii:
finite generation. arXiv:1704.01529, 2017. 1
[CV86]
Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms
of free groups. Invent. Math., 84(1):91–119, 1986. 1
[Dar68]
Rex S. Dark. On nilpotent products of groups of prime order. PhD thesis,
University of Cambridge, 1968. 33
[Dja16a]
Aurélien Djament. Décomposition de hodge pour l’homologie stable des
groupes d’automorphismes des groupes libres. arXiv:1510.03546, 2016. 1
[Dja16b]
Aurélien Djament. Des propriétés de finitude des foncteurs polynomiaux.
Fund. Math., 233(3):197–256, 2016. 31
[DP12]
Matthew Day and Andrew Putman. A Birman exact sequence for Aut(Fn ).
Adv. Math., 231(1):243–275, 2012. 1
[DP16]
Matthew B. Day and Andrew Putamn. On the second homology group of
the torelli subgroup of aut(fn ). arXiv:1408.6242v3, 2016. 1, 2
[DV15]
Aurélien Djament and Christine Vespa. Sur l’homologie des groupes
d’automorphismes des groupes libres à coefficients polynomiaux. Comment.
Math. Helv., 90(1):33–58, 2015. 1
41
[FM12a]
Benson Farb and Dan Margalit. A primer on mapping class groups, volume 49 of Princeton Mathematical Series. Princeton University Press,
Princeton, NJ, 2012. 1
[FM12b]
Stefano Francaviglia and Armando Martino. The isometry group of outer
space. Adv. Math., 231(3-4):1940–1973, 2012. 1
[Fox53]
Ralph H. Fox. Free differential calculus. I. Derivation in the free group ring.
Ann. of Math. (2), 57:547–560, 1953. 19
[Fra33]
Hermann Frasch. Die Erzeugenden der Hauptkongruenzgruppen für
Primzahlstufen. Math. Ann., 108(1):229–252, 1933. 17
[Gal11]
Søren Galatius. Stable homology of automorphism groups of free groups.
Ann. of Math. (2), 173(2):705–768, 2011. 1
[Gro52]
Emil Grosswald. On the parabolic generators of the principal congruence
subgroups of the modular group. Amer. J. Math., 74:435–443, 1952. 17
[Hal34]
Philip Hall. A contribution to the theory of groups of prime-power order.
Proc. London Math. Soc. (2), 36:29–95, 1934. 33
[HL11]
Manfred Hartl and Bruno Loiseau. A characterization of finite cocomplete
homological and of semi-abelian categories. Cah. Topol. Géom. Différ.
Catég., 52(1):77–80, 2011. 7
[HM17]
Kazuo Habiro and Gwenael Massuyeau. Generalized johnson homomorphisms for extended n-series. arXiv:1707.07428, 2017. 2, 4, 12, 35, 36
[Jac41]
Nathan Jacobson. Restricted Lie algebras of characteristic p. Trans. Amer.
Math. Soc., 50:15–25, 1941. 34, 36
[Joh83]
Dennis Johnson. A survey of the Torelli group. In Low-dimensional topology
(San Francisco, Calif., 1981), volume 20 of Contemp. Math., pages 165–
179. Amer. Math. Soc., Providence, RI, 1983. 13
[JW04]
Craig A. Jensen and Nathalie Wahl. Automorphisms of free groups with
boundaries. Algebr. Geom. Topol., 4:543–569, 2004. 1
[Kal50a]
Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes
d’un groupe abstrait. C. R. Acad. Sci. Paris, 230:2067–2069, 1950. 8
[Kal50b]
Léo Kaloujnine. Sur quelques propriétés des groupes d’automorphismes
d’un groupe abstrait. (Généralisation d’un theorème de M. Ph. Hall). C.
R. Acad. Sci. Paris, 231:400–402, 1950. 8
[Kaw06]
Nariya Kawazumi.
Cohomological aspects of magnus expansions.
arXiv:math/0505497, 2006. 13
[KM97]
Sava Krstić and James McCool. The non-finite presentability of IA(F3 )
and GL2 (Z[t, t−1 ]). Invent. Math., 129(3):595–606, 1997. 1
[Laz54]
Michel Lazard. Sur les groupes nilpotents et les anneaux de Lie. Ann. Sci.
Ecole Norm. Sup. (3), 71:101–190, 1954. 3, 6, 8, 14, 34
42
[Lop14]
Jonathan Lopez. Lie algebras and cohomology of congruence subgroups for
SLn (R). J. Pure Appl. Algebra, 218(2):256–268, 2014. 3, 16
[LS76]
Ronnie Lee and Robert H. Szczarba. On the homology and cohomology of
congruence subgroups. Invent. Math., 33(1):15–53, 1976. 3, 17
[ML98]
Saunders Mac Lane. Categories for the working mathematician, volume 5
of Graduate Texts in Mathematics. Springer-Verlag, New York, second
edition, 1998. 7
[Mor93]
Shigeyuki Morita. Abelian quotients of subgroups of the mapping class
group of surfaces. Duke Math. J., 70(3):699–726, 1993. 3, 25
[MP09]
Roman Mikhailov and Inder Bir Singh Passi. Lower central and dimension
series of groups, volume 1952 of Lecture Notes in Mathematics. SpringerVerlag, Berlin, 2009. 14
[MS17]
Gwenael Massuyeau and Takuya Sakasai. Morita’s trace maps on the group
of homology cobordisms. arXiv:1606.08244, 2017. 2, 28
[Nie24]
Jakob Nielsen. Die Isomorphismengruppe der freien Gruppen. Math. Ann.,
91(3-4):169–209, 1924. 1, 13
[Pas79]
Inder Bir S. Passi. Group rings and their augmentation ideals, volume 715
of Lecture Notes in Mathematics. Springer, Berlin, 1979. 14, 33, 34
[Pas85]
Donald S. Passman. The algebraic structure of group rings. Robert E.
Krieger Publishing Co., Inc., Melbourne, FL, 1985. Reprint of the 1977
original. 33
[Rip72]
Eliyahu Rips. On the fourth integer dimension subgroup. Israel J. Math.,
12:342–346, 1972. 14
[Rot95]
Joseph J. Rotman. An introduction to the theory of groups, volume 148 of
Graduate Texts in Mathematics. Springer-Verlag, New York, fourth edition,
1995. 13
[RWW17] Oscar Randal-Williams and Nathalie Wahl. Homological stability for automorphism groups. Adv. Math., 318:534–626, 2017. 1
[Sat12]
Takao Satoh. On the lower central series of the IA-automorphism group of
a free group. J. Pure Appl. Algebra, 216(3):709–717, 2012. 2, 3, 25, 30, 39
[Sta65]
John Stallings. Homology and central series of groups. J. Algebra, 2:170–
181, 1965. 34
[Zas39]
Hans Zassenhaus. Ein Verfahren, jeder endlichen p-Gruppe einen Lie-Ring
mit der Charakteristik p zuzuordnen. Abh. Math. Sem. Univ. Hamburg,
13(1):200–207, 1939. 34
43
| 4 |
HAND SEGMENTATION FOR HAND-OBJECT INTERACTION FROM DEPTH MAP
Byeongkeun Kang? Kar-Han Tan† Nan Jiang? Hung-Shuo Tai† Daniel Tretter‡ Truong Nguyen?
arXiv:1603.02345v3 [cs.CV] 10 Jan 2018
?
Department of Electrical and Computer Engineering, UC San Diego, La Jolla, CA 92093 USA
†
NovuMind Inc., Santa Clara, CA 95054 USA
‡
Hewlett-Packard, Inc., Palo Alto, CA 94304 USA
ABSTRACT
Hand segmentation for hand-object interaction is a necessary
preprocessing step in many applications such as augmented
reality, medical application, and human-robot interaction.
However, typical methods are based on color information
which is not robust to objects with skin color, skin pigment
difference, and light condition variations. Thus, we propose
hand segmentation method for hand-object interaction using
only a depth map. It is challenging because of the small
depth difference between a hand and objects during an interaction. To overcome this challenge, we propose the two-stage
random decision forest (RDF) method consisting of detecting hands and segmenting hands. To validate the proposed
method, we demonstrate results on the publicly available
dataset of hand segmentation for hand-object interaction. The
proposed method achieves high accuracy in short processing
time comparing to the other state-of-the-art methods.
Index Terms— Hand segmentation, human-machine interaction, random decision forest, depth map
1. INTRODUCTION
Recently, with the expansion of virtual reality (VR), augmented reality (AR), robotics, and intelligent vehicles, the
development of new interaction technologies has become
unavoidable since these applications require more natural
interaction methods rather than input devices. For these applications, many researches have been conducted such as
gesture recognition and hand pose estimation. However, most
technologies focus on understanding interactions which do
not involve touching or handling any real world objects although understanding interactions with objects is important
in many applications. We believe that this is because hand
segmentation is much more difficult in hand-object interaction. Thus, we present a framework of hand segmentation for
hand-object interaction.
This work is supported in part by NSF grant IIS-1522125.
1.1. Related work
Hand segmentation has been studied for many applications
such as hand pose estimation [1–6], hand tracking [7–9],
and gesture/sign/grasp recognition [10, 11]. In color imagebased methods, skin color-based method has been popular [10, 12–16]. For hand-object interaction, Oikonomidis
et al. and Romero et al. segmented hands by thresholding
skin color in HSV space [4, 5, 7, 8]. Wang et al. processed
hand segmentation using a learned probabilistic model where
the model is constructed from the color histogram of the
first frame [6]. Tzionas et al. applied skin color-based segmentation using the Gaussian mixture model [17]. However,
skin color-based segmentation has limitations in interacting
with objects in skin color, segmenting from other body parts,
skin pigment difference, and light condition variations. An
alternative method is wearing a specific color glove [18].
For depth map-based methods, popular methods are using a wrist band [3, 9, 11] or using random decision forest
(RDF) [1,2,19]. Although the method using a black wristband
is uncomplicated and effective, it is inconvenient. Moreover,
the method cannot segment hands from objects during handobject interaction since it processes segmentation by finding
connected components. Tompson et al. [1] and Sharp et al. [2]
proposed the RDF-based methods based on [19]. Although
the purposes of the methods are slightly different comparing
to the proposed method, the methods are the most relevant
methods.
In this paper, we propose the hand segmentation method
for hand-object interaction using only a depth map to avoid
the limitations of skin color-based methods. We present the
two-stage RDF method to achieve high accuracy efficiently.
2. METHOD
We propose two-stage RDF for hand segmentation for handobject interaction. In our two-stage RDF, the first RDF detects
hands by processing the RDF on an entire depth map. Then,
the second RDF segments hands in pixel-level by applying
the RDF in the detected region. This cascaded architecture is
designed for the second RDF to focus on the segmentation of
hands from objects and close body parts such as an arm.
Fig. 1. Random decision forest. Red, black, and green circles
represent root nodes, split nodes, and leaf nodes, respectively.
RDF consists of a collection of decision trees as shown in
Fig. 1. Each decision tree is composed of a root node, splitting
nodes, and leaf nodes. Given an input data at the root node, it
is classified to child nodes based on the split function at each
splitting node until it reaches a leaf node. In this paper, the
input data is the location of each pixel on a depth map. The
split function uses the feature of the depth difference between
two relative points on the depth map in [19]. At a leaf node,
a conditional probability distribution is learned in a training
stage, and the learned probability is used in a testing stage.
For more details about RDF, we refer the readers to [20–22].
Fig. 2. Detection of hands using the RDF in the first stage.
designed to evalutate the separation using the learned offset
vectors and criteria as follows:
X X |xc |
L(x, D, u, v, θ) = −
p(h|c) log p(h|c)
|x|
c∈{l,r} h∈{0,1}
(3)
where c and h are indexes for child nodes {l, r} and for
classes, respectively; |xc | denotes the number of data points
in the c child node; p(h|c) is the estimated probability of
being the class h at the child node c.
To learn offsets and a criteria, the algorithm randomly
generates possible candidates and selects the candidate with a
minimum loss L(·) as follows:
(u, v, θ) = argmin L(x, D, u, v, θ).
2.1. Training
(4)
(u,v,θ)
Given a training dataset D, the algorithm randomly selects a
set Di of depth maps D and then randomly samples a set of
data points x in the region of interest (ROI) on the selected
depth maps D. The ROI is the entire region of the depth
maps in the first stage. It is the detected regions using the first
RDF in the second stage (see Fig. 2). The sampled set of data
points x and the corresponding depth maps D are inputs to
the training of a decision tree.
Using the inputs (x, D), the algorithm learns a split function at each splitting node and a conditional probability distribution at each leaf node. First, learning the split function includes learning a feature f (·) and a criteria θ. We use the feature f (·) of the depth difference between two relative points
{x + u/D x , x + v/D x } in [19] as follows:
f (x, D, u, v) = Dx+u/Dx − Dx+v/Dx
(1)
where D x denotes the depth at a pixel x on a depth map D;
u ∈ R2 and v ∈ R2 represent offset vectors for each relative
point. Then, the criteria θ decides to split the data x to the left
child or the right child.
f (x, D, u, v) ≶ θ.
(2)
Thus, the algorithm learns two offset vectors (u, v) and a criteria θ at each splitting node.
Since the goal is separating the data points x of different classes to different child nodes, the objective function is
Learning a split function at each splitting node is repeated
until the node satisfies the condition for a leaf node. The condition is based on (1) the maximum depth of the tree, (2) the
probability distribution p(h|c), and (3) the amount of training
data |x| at the node. Specifically, it avoids too many splitting
nodes by limiting the maximum depth of the tree and by terminating if the child node has a high probability for a class or
if the amount of remaining training data is too small.
At each leaf node, the algorithm stores the conditional
probability p(h|l) (probability of being each class h given
reaching the node l) for the prediction in a testing stage.
2.2. Testing
Using the learned RDF, the algorithm predicts the probability
of being a class for a new data x. The new data is classified to child nodes using the learned split function at each
splitting node until it reaches a leaf node. At the leaf node l,
the learned conditional probability pT (h|l) is loaded. These
steps are repeated for entire trees T in the forest T . Then, the
probabilities are averaged to predict the probability p(h|x) of
being a class h for the new data x.
p(h|x) =
1 X
pT (h|l)
|T |
T ∈T
where |T | is the number of trees in the learned forest T .
(5)
(a)
(b)
Fig. 3. Scores depending on the decision boundary on the
validation dataset. (a) Score of the RDF in the first stage. (b)
Score of the two-stage RDF with filtering in Section 2.3.
In the first stage, the first RDF is applied on an entire
depth map to compute a probability map. Then, the probability map is used to detect hands as shown in Fig. 2. In the
second stage, the second RDF processes the data points in
the detected regions to predict the probability of being each
class. The proposed two-stage RDF improves both accuracy
and efficiency by focusing on each task in each stage.
Decision boundaries are exhaustively searched with the
step size of 0.01 using the predicted probability maps of the
validation dataset as shown in Fig. 3. Although the most typical boundary is 0.5 for a probability map, we found that it is
not the best parameter. The selected boundaries are shown in
Table 1.
Fig. 4. Analysis of accuracy and efficiency.
3. EXPERIMENTAL EVALUATIONS
3.1. Dataset
We collected a new dataset1 using Microsoft Kinect v2 [26].
The newly collected dataset consists of 27,525 pairs of depth
maps and ground truth labels from 6 people (3 males and 3 females) interacting with 21 different objects. Also, the dataset
includes the cases of one hand and both hands in a scene. The
dataset is separated into 19,470 pairs for training, 2,706 pairs
for validation, and 5,349 pairs for testing, respectively.
2.3. Modified bilateral filter
3.2. Results
Before classifying a data x to a class h, modified bilateral filter is applied to the predicted probability p(h|x) to make the
probability more robust. Since the probability p(h|x) is predicted for each pixel independently, the probability is stabilized by averaging the probabilities of the data points in close
distance and similar intensity on the depth map.
Unlike typical bilateral filter whose weights are based on
the input image (in this case, the probability map) [23], the
weights in the modified bilateral filter are based on a separate
image, the depth map. The filtering is defined as follows:
The proposed method is analyzed by demonstrating the results on the dataset in Section 3.1. For the quantitative comparison of accuracy, we measure F1 score, precision, and recall as follows:
tp
tp
precision =
, recall =
tp + fp
tp + fn
(7)
precision × recall
F1 = 2 ×
precision + recall
1 X
pe(h|x) =
gr (|D xi −D x |)gs (kxi −xk)p(h|xi ) (6)
w
xi ∈Ω
where Ω is the set of pixels within the filter’s radius and the
pre-defined
depth difference; w is the normalization term,
P
w = xi ∈Ω gr (|D xi − D x |)gs (kxi − xk); gr (·) and gs (·)
are the Gaussian functions for the depth difference and for the
spatial distance from the data point x, respectively. gr (r) =
s2
r2
exp(− 2σ
2 ); gs (s) = exp(− 2σ 2 ). The parameters in the filr
s
ter were selected based on the experiments using validation
dataset. The selected parameters are as follows: the maximum depth difference to be considered is 400mm. Both standard deviations (σr and σs ) are 100.
where tp, fp, and fn represent true positive, false positive, and
false negative, respectively. For the comparison of efficiency,
we measure the processing time using a machine with Intel
i7-4790K CPU and Nvidia GeForce GTX 770.
The proposed method is compared with the RDF-based
method in [1, 19] and the fully convolutional networks (FCN)
in [24, 25] using only a depth map. The proposed method
is not compared with color-based methods since the characteristics of depth sensors and color imaging sensors are quite
different. For example, a captured depth map using a depth
sensor does not vary depending on light condition. However,
a captured color image varies a lot depending on light condition. Thus, choosing the capturing environment affects the
1 https://github.com/byeongkeun-kang/HOI-dataset
Table 1. Quantitative comparison. The two boundaries for the proposed method are for each stage.
Method
Score
Processing time
Method
Boundary
(ms)
F1 score
Filter
Precision
Recall
RDF [1, 19]
RDF [1, 19] + Proposed in Sec. 2.2
FCN-32s [24, 25]
FCN-16s [24, 25]
FCN-8s [24, 25]
Proposed method
(a)
0.50
0.78
0.50, 0.50
0.50, 0.52
0.50, 0.52
11 × 11
(b)
(c)
38.1
54.5
70.0
68.0
70.4
59.2
60.8
62.9
91.2
72.7
68.6
72.2
74.4
77.4
75.1
75.6
53.7
62.3
69.3
70.1
72.3
67.1
67.2
68.7
(d)
6.7
6.7
376
376
377
8.9
8.9
10.7
(e)
Fig. 5. Visual comparison. (a) Ground truth label. (b) Result using RDF [1, 19]. (c) Result using RDF [1, 19] with the proposed
method in Section 2.2. (d) Result using FCN-8s [24, 25]. (e) Result using the proposed method. The results and ground truth
label are visualized using different color channels for better visualization.
comparison of results using depth maps and color images.
Hence, we only compare the proposed method with the stateof-the-art methods which can process using only depth maps.
Table 1 and Fig. 5 show quantitative results and visual results. The scores in Table 1 are scaled by a factor of 100. The
quantitative results show that the proposed method achieves
about 25% and 8% relative improvements in F1 score comparing to the RDF-based methods [1, 19] and its combination with the proposed method in Section 2.2, respectively.
Comparing to the deep learning-based methods [24, 25], the
proposed method achieves about 7% lower accuracy, but processes in about 42 times shorter processing time. Thus, deep
learning-based methods can not be used in real-time applica-
tions. Fig. 4 shows the comparison of methods in accuracy
and efficiency. The proposed method achieves high accuracy
in short processing time.
4. CONCLUSION
In this paper, we present two-stage RDF method for hand segmentation for hand-object interaction using only a depth map.
The two stages consist of detecting the region of interest and
segmenting hands. The proposed method achieves high accuracy in short processing time comparing to the state-of-the-art
methods.
5. REFERENCES
[1] J. Tompson, M. Stein, Y. Lecun, and K. Perlin, “Realtime continuous pose recovery of human hands using
convolutional networks,” ACM Trans. Graph., 2014.
[2] T. Sharp, C. Keskin, D. Robertson, J. Taylor, J. Shotton,
D. Kim, C. Rhemann, I. Leichter, A. Vinnikov, Y. Wei,
D. Freedman, P. Kohli, E. Krupka, A. Fitzgibbon, and
S. Izadi, “Accurate, robust, and flexible real-time hand
tracking,” in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015.
[3] C. Qian, X. Sun, Y. Wei, X. Tang, and J. Sun, “Realtime
and robust hand tracking from depth,” in Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, June 2014.
[4] J. Romero, H. Kjellstrom, and D. Kragic, “Hands in action: real-time 3d reconstruction of hands in interaction
with objects,” in Robotics and Automation (ICRA), 2010
IEEE International Conference on, May 2010.
[5] J. Romero, H. Kjellstrom, C. H. Ek, and D. Kragic,
“Non-parametric hand pose estimation with object context,” Image Vision Comput., vol. 31, no. 8, Aug. 2013.
[6] Y. Wang, J. Min, J. Zhang, Y. Liu, F. Xu, Q. Dai,
and J. Chai, “Video-based hand manipulation capture through composite motion control,” ACM Trans.
Graph., vol. 32, no. 4, July 2013.
[7] I. Oikonomidis, N. Kyriazis, and A.A. Argyros, “Full
dof tracking of a hand interacting with an object by modeling occlusions and physical constraints,” in Computer
Vision (ICCV), 2011 IEEE International Conference on,
2011.
[8] A. A. Argyros and M. I. A. Lourakis, “Real-time tracking of multiple skin-colored objects with a possibly
moving camera,” in Computer Vision - ECCV, 2004.
[9] B. Kang, Y. Lee, and T. Nguyen, “Efficient hand articulations tracking using adaptive hand model and depth
map,” in Advances in Visual Computing, Dec. 2015.
[10] M. Cai, K.M. Kitani, and Y. Sato, “A scalable approach
for understanding the visual structures of hand grasps,”
in Robotics and Automation (ICRA), 2015 IEEE International Conference on, May 2015.
[11] B. Kang, S. Tripathi, and T. Nguyen, “Real-time sign
language fingerspelling recognition using convolutional
neural networks from depth map,” in Pattern Recognition, 2015 3rd IAPR Asian Conference on, Nov. 2015.
[12] M. J. Jones and J. M. Rehg, “Statistical color models
with application to skin detection,” International Journal of Computer Vision, vol. 46, Jan. 2002.
[13] R. Khan, A. Hanbury, J. Stttinger, and A. Bais, “Color
based skin classification,” Pattern Recognition Letters,
vol. 33, Jan. 2012.
[14] C. Li and K.M. Kitani, “Pixel-level hand detection in
ego-centric videos,” in Computer Vision and Pattern
Recognition, 2013 IEEE Conference on, June 2013.
[15] S. L. Phung, A. Bouzerdoum, and D. Chai, “Skin segmentation using color pixel classification: analysis and
comparison,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 27, 2005.
[16] P. Kakumanu, S. Makrogiannis, and N. Bourbakis, “A
survey of skin-color modeling and detection methods,”
Pattern Recognition, vol. 40, Mar. 2007.
[17] D. Tzionas and J. Gall, “3d object reconstruction from
hand-object interactions,” in International Conference
on Computer Vision (ICCV), Dec. 2015.
[18] R. Y. Wang and J. Popović, “Real-time hand-tracking
with a color glove,” ACM Trans. Graph., vol. 28, 2009.
[19] J. Shotton, A. Fitzgibbon, M. Cook, T. Sharp, M. Finocchio, R. Moore, A. Kipman, and A. Blake, “Real-time
human pose recognition in parts from single depth images,” in Computer Vision and Pattern Recognition
(CVPR), 2011 IEEE Conference on, June 2011.
[20] A. Criminisi and J. Shotton, “Decision forests for computer vision and medical image analysis,” Advances in
Computer Vision and Pattern Recognition, 2013.
[21] L. Breiman, “Random forests,” Machine Learning, vol.
45, no. 1, 2001.
[22] T. Ho, “Random decision forests,” in Proceedings of the
Third International Conference on Document Analysis
and Recognition, 1995.
[23] C. Tomasi and R. Manduchi, “Bilateral filtering for gray
and color images,” in Computer Vision, Sixth International Conference on, Jan. 1998.
[24] J. Long, E. Shelhamer, and T. Darrell, “Fully convolutional networks for semantic segmentation,” in
The IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), June 2015.
[25] E. Shelhamer, J. Long, and T. Darrell, “Fully convolutional networks for semantic segmentation,” IEEE
Transactions on Pattern Analysis and Machine Intelligence, 2016.
[26] B. Kang, Y. Lee, and T. Q. Nguyen, “Depth adaptive
deep neural network for semantic segmentation,” IEEE
Transactions on Multimedia, 2018.
| 1 |
A Spatio-Temporal Representation for the Orienteering Problem
with Time-Varying Profits
arXiv:1611.08037v2 [cs.AI] 2 Jul 2017
Zhibei Ma, Kai Yin, Lantao Liu, Gaurav S. Sukhatme
Abstract— We consider an orienteering problem (OP) where
an agent needs to visit a series (possibly a subset) of depots,
from which the maximal accumulated profits are desired within
given limited time budget. Different from most existing works
where the profits are assumed to be static, in this work we
investigate a variant that has arbitrary time-dependent profits.
Specifically, the profits to be collected change over time and
they follow different (e.g., independent) time-varying functions.
The problem is of inherent nonlinearity and difficult to solve by
existing methods. To tackle the challenge, we present a simple
and effective framework that incorporates time-variations into
the fundamental planning process. Specifically, we propose a
deterministic spatio-temporal representation where both spatial
description and temporal logic are unified into one routing
topology. By employing existing basic sorting and searching algorithms, the routing solutions can be computed in an extremely
efficient way. The proposed method is easy to implement and
extensive numerical results show that our approach is time
efficient and generates near-optimal solutions.
I. I NTRODUCTION
The rapid progress of smart vehicle technologies allows us
to envision that, in the future autonomous vehicles are able
to carry out various tasks with little or even no human effort.
We are interested in designing an efficient routing method to
navigate a vehicle (agent) among a number of known and
fixed depots, where each depot has some profit (e.g., score,
benefit, utility, load) to be collected. If the travel time is
limited, it is likely that the agent is not able to traverse all
depots due to the limited time budget. This variant of routing
problems is called the orienteering problem (OP) [11]. In a
nutshell, an OP aims to find a tour traversing a subset of
depots so that the accumulated profit collected from those
traversed depots are maximized.
Different from many existing vehicle routing problems
which focus on analyzing path properties in the static context
(i.e., unchanging environment or topology with stationary
cost metrics) [17], [12], in this work we are intrigued to
investigate a time-varying variant of OPs, i.e., each depot
has a time-varying profit.
Here are a few motivational examples:
• As illustrated in Fig. 1, an autonomous truck needs to
pick up goods from a number of fixed depots where
manufacturing factories are located. The goods are
produced consistently and accumulated as time goes by
— so they are time-varying. The growth rate of goods at
different factories may be nonidentical: larger factories
Z. Ma, L. Liu and G.S. Sukhatme are with the Department of Computer
Science at the University of Southern California, Los Angeles, CA 90089,
USA. {zhibeima, lantao.liu, gaurav}@usc.edu. K.
Yin is with HomeAway, Inc., [email protected].
Fig. 1. An autonomous vehicle needs to route through depots with timevarying profits (loads). The goal is to maximize overall collected profits
within given limited time. The task can be persistent.
grow faster and smaller ones grow slower. Assume the
truck has sufficiently large capacity and it empties all
goods from a depot when it arrives there. The objective
is to find a route so that the truck will load the most
goods in a given time window.
• In environmental monitoring, autonomous robots are
deployed to collect environment data in order to estimate an underlying environment state. However, the
environment attributes at different locations can be timevarying (e.g., dissolved chemical compounds and algae
blooms in the water vary both spatially and temporally.)
An important objective of environment monitoring is to
plan so-called “informative paths” [5] that navigate the
robots to acquire data from those most information-rich
spots which best help estimate the environment.
In this paper, we present our initial study for the timevarying OP. We start our analysis from the single agent
planning case, and attempt to establish a new framework that
is different from traditional modeling and solving routines.
We will show that, a big challenge of the time-varying
OP (even for single agent case) lies in the requirement
of a special treatment in an extra dimension — the time
dimension, which inevitably introduces extra complexity as
we need to model, predict, and integrate future dynamics.
II. R ELATED W ORKS
The routing problems have been well studied in many
research domains including operations research, theoretical
computer science, and transportation systems [3], [4], [7].
Typical routing problems involve incorporation of constraints
expressed from the nature of the target problems, which
also narrow the space of searching for solutions [19]. We
are interested in a variant of routing problems called the
orienteering problems (OPs) [11], [22]. An OP considers
both travel cost (e.g., travel time) and scores collected along
the travel. The goal of the OP is to determine which subset
of vertices to visit and in which order so that the collected
scores within a given period is maximized. The OPs integrate
characteristics of both knapsack problems (KPs) [15] and
travelling salesman problems (TSPs) [19], and OPs are NPhard as well. In contrast to the TSP, not all vertices of an
OP need to be visited due to the limited time budget. During
the past few decades, several variants of OPs have been
studied, such as time-dependent OPs, Team OPs, (Team)
OPs with Time Windows and OPs with stochastic profits.
Recent survey papers [22], [12] have profoundly discussed
state-of-the-art techniques of these variants as well as their
applications.
While OPs can be formulated as mixed integer programs
(MIPs), the problem size typically is too large to directly
use commercial solvers. A wide range of decomposition
methods such as branch-and-price algorithms have been
developed so that a large-scale MIP can be decomposed
into smaller problems (e.g., a master problem and a series
of sub-problems) which can then be iteratively solved by
commercial solvers [13], [16]. In order to reduce the heavy
computational burden in decomposition methods, heuristics
and metaheuristics have been extensively studied, typically
including tabu-based or neighborhood search based procedures [6], [21], [24].
Although in general OPs have been well researched, the
time-dependent OPs (TOPs) have received relatively less
attention comparing with other variants [10], [12]. Even so,
most of existing TOPs discuss the time-varying properties
that are associated with the real travel time between pairwise
nodes, and assume that travel time between two nodes
depends on the departure time at the first (or an earlier)
node [18], [9], [8], [23]. Very rarely we could find the works
that discuss about time-varying scores of OPs. One work that
share certain similarity with this proposed problem is [2],
where multiple vehicles need to serve a number of clients
and the profit of each client follows a decreasing function
of time. The work analyzed a lower bound and upper bound
based on a classic MIP formulation.
Instead of employing conventional techniques such as the
column generation approach used in [2], in this work we
present our first study that models and tackles the problem
from a different perspective: we start from establishing a
representation built from the spatial and temporal constraints,
so that the time dependence attribute is transferred from the
bulk MIP to a separate and intuitive representation. With that,
fast approximate OP solutions can be found by employing
and extending order-sensitive topological algorithms.
III. P ROBLEM D ESCRIPTION AND F ORMULATION
A routing problem can be represented with a graph G =
(V, E), where V is the set of vertices and E denotes the set
of edges. Let us denote the number of vertices as |V | = n+1,
and suppose every edge takes time to traverse. Although the
travel time, in many situations, depends on the states and
properties of the network such as congestion and capacity,
we assume that the travel time τij between two vertices vi
and vj is time-invariant for simplicity∗ . We associate each
∗ It is relatively straightforward to incorporate time-dependent travel times
in our proposed model described in the following section.
vertex vi with a time-varying value, called profit, which is
denoted by fi (t) ≥ 0 at time t ≥ 0. Here fi (·) is of arbitrary
nonlinear function form. We assume that function fi (·) is
known or can be predicted or approximated.
Suppose that the agent (vehicle) starting from a dummy
node v0 at time 0 travels across a subset of vertices on the
graph G. When the agent visits vertex vi at time ti , it will
collect the profit fi (ti ). The remaining profit at the vertex
vi right after the agent leaves becomes 0 and accumulates
again. Additionally, the profit at v0 is assumed to be 0, i.e.,
f0 (t) = 0. Assuming the agent visits each vertex once, the
objective is to determine the order of a subset of vertices to
visit so that total profits collected by the agent is maximized
within a given planning period T . Note that we do not assign
a specific destination to the agent, as the problem with a fixed
end vertex is a special case for our problem.
Let xij = 1 if the agent travels from vi to vj , and 0
otherwise. Let t0 = 0. We also introduce extra variables ui
with u0 = 0 to eliminate the subtours. Then the problem in
this study can be formulated as the following mixed-integer
program.
max
xij
n
X
i=1
n
X
j=1
n
X
fi (ti ) ·
x0j =
xik =
i=0
tj 6 T ·
X
j
n
X
i=1
n
X
j=0
n
X
xji ,
(1)
xi0 = 1,
(2)
xkj 6 1,
xij ,
∀k 6= 0,
∀j,
(3)
(4)
i=0
ti + xij (τij + T ) 6 T + tj ,
1 6 ui 6 n,
ui − uj + 1 6 n(1 − xij ),
xij ∈ {0, 1},
∀i, j,
∀i 6= 0,
(5)
(6)
∀i 6= 0, j 6= 0,
∀i, j.
(7)
(8)
Eq. (1) is to maximize the total collected profits. Constraint (2) guarantees that the path starts and ends at dummy
node v0 . Note that our setup allows a path to end at any
node by discarding the inward edge. Constraints (3) ensure
the connectivity of the path and guarantee that every vertex
is visited at most once. The limited time budget is ensured by
Constraint (4), while Constraint (5) determines the visiting
time ti along the path. Constraints (6) and (7), so called
Miller-Tucker-Zemlin (MTZ) formulation in the traveling
sales problem[19], are used to prevent subtours.
IV. A S PATIO -T EMPORAL R EPRESENTATION
It appears a daunting task to solve the problem (1)-(8)
due to the complexity of objective function. Most of existing
literature in OPs either lumps all constraints together and
solves it by conventional solvers of MIPs [20], [22], or
decouples the constraints into master-subproblem modules
such as column generation [2], or use certain heuristics
such as center-of-gravity heuristic [11]. In contrast, we
(a)
(b)
(c)
(d)
Fig. 2. Illustrations of spatio-temporal representation. (a) Graph G = (V, E) constructed on a x-y plane. Numbers on vertices are the vertex IDs, and
numbers on edges denote required travel time costs; (b) Spatio-temporal graph of (a). In this example each vertex has 5 time units along the (z-axis);
(c)(d) Another example with 7 vertices and 8 time windows.
desire to develop a framework starting from a constraintincluded representation that is intuitive to understand, easy to
implement from scratch, and flexible to modify and extend.
In this section, we present a means for embedding constraints
into a spatio-temporal representation built on which the
original routing problem can be tackled by efficient methods
(though it is still a NP-hard problem).
As the problem essentially aims to determine the visiting
time and order of vertices, it inspires us to incorporate a time
dimension to extend the 2-dimensional graph on a spatial
plane to a 3-dimensional graph (topology). To make the
model implementable, the time range [0, T ] is discretized
into a sequence of time intervals ∆t of equal length, and
the interval ∆t is used as a time unit that specifies discrete
time resolution. Thus, the travel time τij can be expressed
as multiple times of the time unit. For example, τij = nij ∆t
and T = nT ∆t , where nij and nT are integers.
Figure 2 shows two examples that describe the basic idea.
Intuitively, one can imagine that each spatial graph vertex
(Fig. 2(a)) is extended to a sequence of vertices expanding
in the time dimension, where each vertex is on an unique
time layer corresponding to a future time moment (Fig. 2(b)).
Then edges are added by concatenating vertices of different
time layers, constrained by the real travel time. Formally,
two vertices on different time layers form an edge if and
only if the two vertices are spatially traversable and the time
difference between the two time layers is exactly equal to
the anticipated real travel time between the two vertices.
Each vertex contains a profit and the profit is time-varying.
In other words, the profits at different time layers are not
the same. Therefore, the problem is equivalent to finding a
path from the given start vertex at time 0 such that the path
transits other vertices within time T and the total collected
profits are maximized. It is worth mentioning that, the spatiotempral edges are “directed” since each edge must start
from a vertex at an earlier time layer and ends at one at a
later moment; Because the time is uni-directional and cannot
travel backwards, it is impossible to form a loop or cycle on
the spatio-temporal graph. As a result, such a spatio-temporal
representation is equivalent to a vertex-weighted Directed
Acyclic Graph (DAG) [18]. This allows us to conveniently
develop our own routing algorithm built on many existing
efficient DAG algorithms.
More formally, the spatio-temporal representation is a
vertex-weighted DAG, denoted by G0 = (V 0 , E 0 , W 0 ), where
V 0 = V × T , T = {0, ∆t , ..., nT ∆t }; eijus is a directed
0
0
edge from vertex viu
= (vi , u) to vjs
= (vj , s), and
0
eijus ∈ G if and only if the edge e(vi , vj ) ∈ E in G and
0
0
∈ W 0 for vertex viu
τij = ns ∆t − nu ∆t ; the weight wiu
0
has value wiu = fi (u). Keep in mind that u = nu ∆t and a
similar equation holds for s.
As an example, suppose that we have a complete graph
G with 3 vertices, ∆t = 1, and T = 5. In the spatiotemporal representation G0 shown in Fig. 2(b), there are 18
0
0
0
vertices v0,0
, v0,1
, ..., v2,5
, each vertex in the original graph G
is duplicated at the discrete time in T = {0, 1, 2, 3, 4, 5}. If
0
0
τ01 = 3 and τ21 = 5, then vertex v0,0
is directed to v1,3
and
0
0
v2,0
is directed to v1,5
. In this example, we have 9 directed
edges in total.
With graph G = (V, E) and given time limit T , the spatiotemporal graph G0 = (V 0 , E 0 , W 0 ) can be constructed by
Alg. 1. Assume there are n vertices in G, the time complexity
of Alg. 1 is O(n2 T /∆t ) because there are three for loops
each of which is associated with either n or T . Also there
are n(T /∆t + 1) vertices in G0 , so the space complexity is
O(nT /∆t ) .
Algorithm 1: SpatioTemporalGraph (G, T, v0 , ∆t )
Input:
1: Graph G = (V, E), time limit T , start vertex v0 , time
interval ∆t
Output:
2: for each vertex vi in graph G do
3:
for each t in time period [0, T ], time step is ∆t do
0
4:
vit
.id = i
0
0
5:
vit
.weight = fi (t), put wit
into the weight set W 0
0
6:
vit
.position = vi .position
0
7:
vit
.prof it = fi (t)
0
8:
vit
.sum = −∞
0
9:
vit
.parent = −1
10:
for each vi ’s neighbor vj do
11:
if t + τij is equal to t0 AND t0 <= T then
12:
put edge eijtt0 into the edge set E 0
0
0
13:
push vjt
0 into vector vit0 .successors
0
14:
update indegree of vit .
0
15:
put vit
into the vertex set V 0
0
16: set the v0,0 .sum to 0
17: return graph G0 = (V 0 , E 0 , W 0 )
0
Note: fi (t) is the time-varying profit function of vertex vi at time t. v0,0
is
the start vertex in G0 , and .sum is used to store accumulated profit from prior
traversal along a path. The label .parent points to the predecessor vertex.
V. ROUTING A LGORITHM
An important advantage of the spatio-temporal graph lies
in that, the time related constraints have been incorporated
into this spatio-temporal representation, so that temporal
related constraints can be decoupled and eliminated from the
process of optimizing the profits. Thus, the problem (1)-(8) is
0
equivalent to finding a path P from
P vertex v00,0 = (v0 , 0) to
0
0
vks on G where s ≤ T such that (v0 u)∈P wiu is maximum.
i
Since the spatio-temporal graph is essentially a DAG,
we develop our routing solution via extending classic DAG
algorithms. Specifically, we found that the profit maximization can be transformed to a longest path problem by
accumulating the profits collected from vertices instead of
summing up edge lengths along a path. We manipulate
the DAG so that vertices are sorted in a topological order
along the temporal dimension, and then employ a dynamic
programming paradigm to compute the maximal profit path.
It is also noteworthy that, while developing a solution to
the time-varying OP, we take two concerns that are related
to applications into account.
• Specification of a Routing Destination: Many routing
problems, including classic OPs, require to specify a
routing destination. The destination can be the original
depot where the agent departures (e.g., a mail truck
needs to return a central processing office); the destination can also be an arbitrary depot located somewhere
else (e.g., a freight truck needs to pick up goods and
unload them into some specified processing location that
is different from the starting depot).
• Persistent Task: Many long-term missions need repetitive and persistent routing, for which specifying a routing destination is not necessary or even inappropriate.
For instance, in the persistent environmental monitoring
task, we do not need the robot to stop at some specified
location, as the robot will need to resume to next round
of routing after the completion of current one. Thus,
the routing destination should be computed on the fly
based on the profit optimization constrained by time T ,
instead of being manually specified.
We will show that the proposed framework works for both
specified and unspecified routing destinations.
A. Topological Sorting of DAG in Temporal Dimension
The main purpose of topological sorting of the DAG
is that, the vertices are “placed” onto different “stages”
according to their temporal constraints, so that a dynamic
programming structure (discussed in the following subsection) can be applied.
Formally, a topological sort of a directed graph is a linear
ordering of its vertices such that for every directed edge euv
from vertex u to vertex v, u comes before v in ordering. A
topological sort of a graph requires that the graph must be
a DAG. We employ a well-known algorithm developed by
Kahn [14] to sort our spatial-temporal graph G0 , with main
steps shown in Alg. 2. Briefly, we first find a list of vertices
that have no incoming edges (with deg − (v) = 0), and insert
them into a set S. Note, at least one such vertex must exist
in a non-empty graph. Then we traverse the set S. Each time
we remove a vertex v from S, and add it to the tail of the list
L. After removing v, the indegree of its successors should be
decreased by 1. Then we insert those vertices with updated
indegree equal to 0 in the set S.
To analyze the time complexity, assume there are n
vertices in G, so there will be n(T /∆t + 1) vertices in G0 .
0
For each vertex vit
, there will be at most n−1 directed edges.
0
Therefore |E | = O(n2 T /∆t ), and the time complexity of
Alg. 2 is O(|V 0 | + |E 0 |) = O(n2 T /∆t ).
Algorithm 2: TopologicalSort (G0 )
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
L: an empty list that will contain the sorted elements
S: a set of all nodes with no incoming edges
while S is not empty do
remove a vertex v from S
add v to the end of L
for each successor u of v do
deg − (u) = deg − (u) − 1
if deg − (u) equals to 0 then
insert u into S
return L (a topologically sorted order)
Note: G0 is a DAG, the indegree of v is denoted as deg − (v).
B. Computing Maximal Profit Path
We transfer the time-varying OP to a longest path problem
in a DAG. The classic longest path problem is the problem of
finding a simple path of maximum length in a given graph.
We employ a dynamic programming structure to memorize
incumbent maximal accumulated profit at each vertex of
topologically sorted stages. Note that, in our problem, we
need to optimize profits collected from vertices, instead of
adding up length of edges. Therefore, instead of using the
longest path update function between two successive stages:
l[w] = l[v] + τvw , if l[v] + τvw > l[w],
(9)
where l[w] is the largest distance from start vertex to w, we
utilize an update function:
w.sum = v.sum+w.prof it, if v.sum+w.prof it > w.sum.
(10)
The computation of the maximal profit path is described
in Alg. 3. Briefly, the topologically sorted vertices V 0 of
the spatio-temporal graph G0 are used as an input. Then
vertices from different stages form dynamic programming
subproblems and they are updated with accumulated profits
0
0
recursively, starting from v0,0
. Here we use vit
.path to store
vertices along the path from start v00 to vi0 (Note, only spatial
information is recorded). To prevent from forming routing
subtours, we check and discard those already visited vertices
before each value update.
After the completion of dynamic programming, each vertex contains information of the maximal profit path that
0
routes from v0,0
to it. Since the graph G0 has incorporated the time limit T , every vertex is feasible to the time
constraint. To find a maximal profit path to a specified
vertex (destination) vi ∈ G, one simply needs to enumerate
0
all states vij
∈ G0 , ∀j of vertex vi and retrieve the path
with the largest value. If a destination is not specified, one
needs to enumerate all states of all vertices and find out the
maximal one among them. The time complexity of Alg. 3 is
O(n2 T /∆t ) due to its two for loops.
Algorithm 3: M aximalP rof itP ath(L)
vit .sum = 0, i = 0, t = 0
0
for each vertex vit
in topologically sorted order L do
0
0
for each vertex vjt
0 in vit .successors do
0
if vertex vj is not in the vit
.path then
0
0
0
if vit
.sum + vjt
0 .prof it > vjt0 .sum then
0
0
0
vjt0 .sum = vit .sum + vjt0 .prof it
0
0
update the vjt
0 .parent to vit
0
0
vjt0 .path = vit .path + vj
0
for each vertex vit
in G0 do
find the maximal sum
retrieve a path P by backtracking from end to start
12: return P
1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
Note: The label .path is a vector that stores all visited vertices from start to vi
C. Main Routing Algorithm
With the components descried above, the main algorithm
is shown in Alg. 4. According to the analysis of each part,
the overall time complexity of our algorithm is n2 T /∆t , and
the space complexity is n2 T /∆t as well.
Algorithm 4: Time-Varying OP
Input:
1: 2D graph G = (V, E), start vertex v0 , time limit T , time
interval ∆t
Output:
2: construct a spatio-temporal graph
G0 = SpatioT emporalGraph(G, T, v0 , ∆t )
3: L = T opologicalSort(G0 )
4: path = M aximalP rof itP ath(L)
5: return path
Our algorithm has a polynomial time complexity given a
fixed ∆t , but cannot guarantee to find the optimal solution to
this NP-hard problem. The main reason for possibly reaching
at sub-optimality lies in that, we added a non-subtour constraint in order to (1) prevent the path from traversing back
and forth among a small subset of adjacent vertices and (2)
comply with the structure of dynamic programming. Such a
constraint eliminates certain feasible searching space which
possibly contains the optimal solution. One may regard this
as a trade-off between solution quality and practical runtime.
Nevertheless, our evaluation results with extensive trials
show that on average our algorithm produces near-optimal
solutions.
D. Discussion: Effects of Discretization
The time interval ∆t plays a critical role in our framework
as the total profits are actually evaluated at travel time steps
equal to multiple ∆t . Yet it may be impractical to select
a small enough time interval because it would result in an
extremely large size of DAG. One possible implementation
is to round the travel time to a value closet to some integer
times of ∆t . Hence, it is important to analyze the impact of
errors due to such rounding procedure.
Assume that the profit function fi (t) satisfies the following
Lipschitz condition:
|fi (t) − fi (s)| ≤ K|t − s|, ∀t, s ∈ [0, T ], ∀i ∈ {0, ..., n},
(11)
where K is a constant independent of i. Suppose that the
optimal objective value for the problem (1)-(8) is z, and the
optimal objective value by the proposed framework is z 0 .
Then we have the result as follows.
Proposition 1: Under the condition (11), we have the
upper bound for the difference in two objective values:
|z − z 0 | ≤ [n(n + 1)/2] · K · ∆t .
(12)
proof: Let P be the optimal path in the graph G for the
problem (1)-(8) and let P 0 be the optimal path in the
proposed spatio-temporal DAG G0 . By the construction of
G0 , P must correspond to a path P̃ in the graph G0 . Let z̃
be the total profits (i.e. the value of objective (1) on this path)
for the path P̃ . Since the difference between the discrete time
in our framework and the original real-valued time is within
∆t , the fact that any path contains no more than n vertices
and the condition (11) lead to |z − z̃| ≤ [n(n + 1)/2]K∆t .
As P 0 rather than P̃ is the optimal path in G0 , we have
z̃ ≤ z 0 . By combining these results, we should have z − z 0 ≤
[n(n + 1)/2]K∆t . Conversely, by construction any feasible
path on the graph G0 must correspond to a feasible path on G.
Using similar arguments, we have z 0 −z ≤ [n(n+1)/2]K∆t .
Therefore, the result (12) holds. It is worthwhile noting that
the constraint that the path in G or G0 contains no subtours
is critical to the result (12).
VI. R ESULTS
We conducted numerical evaluations to validate the proposed algorithm. We compared our algorithm with other algorithms, all of which were implemented in C++. The experiments were performed on a system with an Intel i5 2.2GHz
processor and 4GB RAM. In our experiments, vertices are
randomly generated in the area [−50, 50] × [−50, 50] on the
x-y plane, and each vertex has a profit (weight) following
certain time-varying functions. The distance between two
vertices is Euclidean distance.
A. Routing Feature of “Orienteering”
First, we demonstrate that our solution has the basic
orienteering property: given limited time, the path always
goes through those vertices with large profits. Fig. 3(a) shows
an example. We purposely manipulate the profit distribution
among the vertices, such that in the upper right corner, there
are more vertices with larger profits. For better visualization,
in the figure the size of a vertex is proportional to the profit
on it. Additionally, we purposely put the starting vertex on
the left and do not specify a destination. From Fig. 3(a) we
(a)
(b)
Fig. 3. (a) Route feature of orienteering. ∆t is 1, vertex number is 200,
T is 200 and the start vertex is at (-49,0); (b) Route behavior under timevarying profit function, ∆t is 1, vertex number is 200, T is 200. The start
vertex v0 is at (-49,0). In all of our experimental graphs, the size of a vertex
represents the weight, which is proportional to its profit.
can see that, in order to obtain more profits, the route goes to
the upper-right corner almost directly from the start vertex.
In this way, a big part of time is used among traversing those
vertices with large profits.
B. Routing Properties under Temporal Variations
To examine the effects caused by temporal variations, we
manipulate the profit functions. Specifically, we divide the
space into four regions (quadrants) I,II,III and IV, as shown
in Fig. 3(b). The profits are the same if the vertices are in
the same region, but different if not. For example, in region
0
I, the profit function for each vit
is
(
5wi
if t 6 T /2
fi (t)I =
0
if t > T /2
where wi is the weight of vertex vi in graph G. (Keep in
0
mind that, wi is different from wit
which is time-varying.
Here the weight wi refers to a fixed parameter for profit
function.) Similarly, the profit functions in regions II, III and
IV are
(
10wi
if t 6 T /2
fi (t)II =
0
if t > T /2
(
0
if t 6 T /2
fi (t)III =
5wi
if t > T /2
(
0
if t 6 T /2
fi (t)IV =
10wi
if t > T /2
Figure 3(b) reveals that, the path first transits the vertices
in region II, because during the first half T , vertices in
region II have larger profits than those in region III. After the
path enters region I and after the time passes T /2, vertices
in region IV contain larger profits. Such variations attract
the path to go through vertices in region IV. This example
indicates that our algorithm is sensitive to the time-varying
profit functions.
C. Comparison with Optimal Solution
We compare the result of our algorithm with the optimal
solution that is obtained by enumerating all solutions in a
brute-force way. Because of the prohibitive time complexity
O(n!) for searching for the optimal solution, the practical
runtime for 13 vertices requires more than 10 minutes.
Thus, we tested up to 12 vertices to compare with the
optimal solutions. We investigated three representative profit
functions in the form of linear, quadratic and logarithmic,
respectively. The results are shown in Fig. 4. We can see
that the results of our algorithm are very close to those of
the optimal solutions, for all the three functions.
Figure 5 shows a group of paths produced from our
algorithm and the optimal solution. We use a linear profit
fi (t) = wi t/T for this example. In many cases, our algorithm get the same results as those of the optimal solution,
as shown in Fig. 5(a) and Fig. 5(b). Sometimes the paths are
different, such as Fig. 5(c) and Fig. 5(d), but the collected
profits are quite similar (in this example, ours obtains 183.5
whereas the optimal is 185.0). Fig. 5(e) and Fig. 5(f) show
another example.
D. Comparison with Classic OP Algorithm
We also compared our algorithm with the classic OP
algorithms. We implemented a well-known heuristic called
center-of-gravity [11], and tested with both time-invariant
and time-variant profits. Fig. 6 demonstrates the differences
between the results of our approach and those of the OP.
Fig. 7 show statistics of numerical evaluations with 200
vertices. We can see that, our algorithm outperforms the
OP for both the time-invariant and time-varying profits.
Particularly, the difference margin is larger for the timevarying profits. Actually, the classic OP cannot handle timevarying profits and the total profit curve quickly converges
(with fixed given time T , the overall profit of OP stops
growing along with the increment of the number of vertices).
The running time is compared in Fig. 7(c), from which we
can observe that, in practice our algorithm costs less time
than that of the OP using the center-of-gravity heuristic.
E. Path Quality under Different Time Intervals
Time interval ∆t determines time discretization resolution,
and therefore affacts the optimality as well. Table I shows
statistics of the route’s quality under different time intervals.
In the table, numbers in the first row are interval values, and
numbers in the first column are the number of vertices. The
remaining values are the collected profits from our algorithm.
We can see that, in general the route’s quality is better when
the time interval is smaller. However, obviously a smaller
time interval will inevitably lead to a larger graph and thus
require a larger running time.
F. Demonstration with New York Taxi Data
We demonstrate that the proposed algorithm can be used
for (autonomous) taxi routing. Fig. 8 shows real data of
taxi calls in New York city. The data is obtained from
NYC Taxi and Limousine Commission [1]. We use the kmeans clustering algorithm to cluster the whole New York
taxi calls into 50 local regions, as shown in Fig. 9(a). The
clustering centers are shown in Fig. 9(b). We assume that
each pick-up and the subsequent drop-off occur in the same
local region, and each pick-up and drop-off is counted as
(a) f (t) = wi t/T
(b) f (t) = −wi (t2 +tT +T 2 )/T 2
(c) f (t) = wi log(t + 1)
Fig. 4. Profit statistics on (a) Linear function; (b) Quadratic function; (c) Logarithmic function.
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 5. Examples with linear profit functions. The paths in red are from our algorithm while the paths in green are found with brute-force search. (a)(b)
Our algorithm obtains optimal solution 281; (c)(d) Our solution is 183.5 whereas the optimal solution is 185.0; (e)(f) Our solution is 186.6 whereas the
optimal solution is 195.1.
(a)
(b)
(c)
(d)
Fig. 6. Path comparisons. The paths in red are computed from our algorithm while the paths in green are from the classic OPs using the center-of-gravity
heuristic. (a)(b) Time-invariant profits fi (t) = wi ; (c)(d) Time-varying profits fi (t) = wi t/T
TABLE I
S TATISTICS OF SOLUTION QUALITY WITH VARIOUS TIME INTERVALS ∆t
Intervals
(a)
(b)
0.1
0.5
1
2
5
10
50
541.1
530.3
529.2
522.1
515.1
498.3
100
788.2
783.4
767.9
735.6
727.5
619.2
150
950.2
919.0
909.7
892.9
823.0
686.8
200
1129.5
1117.6
1107.1
1094.3
935.5
696.0
Note: T = 150, graph within [−50, 50] × [−50, 50] on x-y plane,
profit fi (t) = wi t/T. 50,100,150 and 200 are the numbers of
vertices.
(c)
Fig. 7.
(a) Performance on time-invariant profits fi (t) = wi ; (b)
Performance on time-varying profits fi (t) = wi t/T ; (c) Statistics of
practical running time.
other taxis too). Therefore, this problem can be formulated as
an orienteering problem with time-varying profits, where we
need to treat those clustered regions as super routing depots
that offer different profits at different times of a day. Fig. 11
demonstrates a result generated from running our algorithm,
from which we can observe that the taxi is routed across
those regions with the most taxi calls, even though we set
the starting point at a distant location with sparse requests.
a completion of one service. Then a taxi driver aims at
maximizing the profit by providing more services during a
fixed period. In each region, we calculate the total number
of taxi calls in every predefined time unit (e.g., minute). An
example is shown in Fig. 10. We regard the total number
of taxi calls in a region as a time-varying profit, and more
calls indicate higher chance of getting profits (note, there are
We presented a framework for addressing the orienteering
problem with time-varying profits. Instead of following traditional mixed integer program solution routines, we develop
an intuitive and effective framework that incorporates timevariations into the fundamental planning process. Specifically, we first construct a deterministic spatio-temporal
VII. C ONCLUSION AND F UTURE W ORK
Fig. 8.
Data of taxi calls in New York city
Fig. 11. The taxi routing path generated from our algorithm. The big
square is the starting location.
(a)
(b)
Fig. 9. (a) Taxi calls are clustered through k-means; (b) Clustering centers
represent high-level routing depots.
representation where both spatial description and temporal
logic are unified into one routing topology, and then we
extend existing sorting and searching algorithms, so that the
routing solutions can be computed in an extremely efficient
way. Finally, we validated our algorithm with numerical
evaluations and the results show that our framework produces
near-optimal solutions in a very efficient way.
R EFERENCES
[1] NYC Taxi and Limousine Commission. http://www.nyc.gov/
html/tlc/html/about/trip_record_data.shtml. Accessed: 2017-02-25.
[2] H. M. Afsar and N. Labadie. Team orienteering problem with
decreasing profits. Electronic Notes in Discrete Mathematics, 41:285–
293, 2013.
[3] R. Bellman. On a routing problem. Quarterly of applied mathematics,
pages 87–90, 1958.
[4] M. Bellmore and G. L. Nemhauser. The Traveling Salesman Problem:
A Survey. Operations Research, 16(3):538–558, May 1968.
[5] J. Binney, A. Krause, and G. S. Sukhatme. Optimizing waypoints for
monitoring spatiotemporal phenomena. The International Journal of
Robotics Research, 32(8):873–888, 2013.
[6] I.-M. Chao, B. L. Golden, and E. A. Wasil. The team orienteering
problem. European journal of operational research, 88(3):464–474,
1996.
[7] N. Christofides. The vehicle routing problem. Revue française
d’automatique, d’informatique et de recherche opérationnelle.
Recherche opérationnelle, 10(1):55–70, 1976.
(a)
(b)
Fig. 10. For a particular region (region 1 in this example), the number of
taxi calls is varying as time elapses. (a) Time unit is minute; (b) Time unit
is hour.
[8] H. C. B. de Oliveira and G. C. Vasconcelos. A hybrid search
method for the vehicle routing problem with time windows. Annals
of Operations Research, 180(1):125–144, 2010.
[9] F. V. Fomin and A. Lingas. Approximation algorithms for timedependent orienteering. Information Processing Letters, 83(2):57–62,
2002.
[10] A. Garcia, O. Arbelaitz, P. Vansteenwegen, W. Souffriau, and M. T.
Linaza. Hybrid approach for the public transportation time dependent
orienteering problem with time windows. In International Conference
on Hybrid Artificial Intelligence Systems, pages 151–158, 2010.
[11] B. L. Golden, L. Levy, and R. Vohra. The orienteering problem. Naval
research logistics, 34(3):307–318, 1987.
[12] A. Gunawan, H. C. Lau, and P. Vansteenwegen. Orienteering problem:
A survey of recent variants, solution approaches and applications.
European Journal of Operational Research, 2016.
[13] G. Gutiérrez-Jarpa, G. Desaulniers, G. Laporte, and V. Marianov.
A branch-and-price algorithm for the vehicle routing problem with
deliveries, selective pickups and time windows. European Journal of
Operational Research, 206(2):341–349, 2010.
[14] A. B. Kahn. Topological sorting of large networks. Commun. ACM,
5(11):558–562, Nov. 1962.
[15] H. Kellerer, U. Pferschy, and D. Pisinger. Introduction to NPCompleteness of knapsack problems. Springer, 2004.
[16] M. Keshtkaran, K. Ziarati, A. Bettinelli, and D. Vigo. Enhanced exact
solution methods for the team orienteering problem. International
Journal of Production Research, 54(2):591–601, 2016.
[17] G. Laporte. The traveling salesman problem: An overview of exact and
approximate algorithms. European Journal of Operational Research,
59(2):231–247, 1992.
[18] M. Mahmoudi and X. Zhou. Finding optimal solutions for vehicle
routing problem with pickup and delivery services with time windows:
A dynamic programming approach based on state–space–time network
representations. Transportation Research Part B: Methodological,
89:19–42, 2016.
[19] C. E. Miller, A. W. Tucker, and R. A. Zemlin. Integer programming
formulation of traveling salesman problems. Journal of the ACM
(JACM), 7(4):326–329, 1960.
[20] G. L. Nemhauser and L. A. Wolsey. Integer and Combinatorial
Optimization. Wiley-Interscience, New York, NY, USA, 1988.
[21] H. Tang and E. Miller-Hooks. A tabu search heuristic for the team
orienteering problem. Computers & Operations Research, 32(6):1379–
1407, 2005.
[22] P. Vansteenwegen, W. Souffriau, and D. Van Oudheusden. The
orienteering problem: A survey. European Journal of Operational
Research, 209(1):1–10, 2011.
[23] C. Verbeeck, K. Sörensen, E.-H. Aghezzaf, and P. Vansteenwegen.
A fast solution method for the time-dependent orienteering problem.
European Journal of Operational Research, 236(2):419–432, 2014.
[24] T. Vidal, N. Maculan, L. S. Ochi, and P. H. Vaz Penna. Large
neighborhoods with implicit customer selection for vehicle routing
problems with profits. Transportation Science, 50(2):720–734, 2015.
| 2 |
Synchronization Detection and Recovery of
Steganographic Messages with Adversarial Learning
Haichao Shi1,2 and Xiao-Yu Zhang1
1
2
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Abstract. As a means for secret communication, steganography aims at concealing a message within a medium such that the presence of the hidden message can
hardly be detected. In computer vision tasks, adversarial training has become a
competitive learning method to generate images. However, the generative tasks
are confronted with great challenge on synthesizing images. This paper studies
the mechanism of applying adversarial learning for discriminative tasks to learn
the steganographic algorithm. We show that through unsupervised adversarial
training, the adversarial model can produce robust steganographic solutions,
which act like an encryption. Through supervised adversarial training, we can
also train a robust steganalyzer, which is utilized to discriminate whether an image contains secret information. Our model is composed of three modules, i.e. a
generator, a discriminator and a steganalyzer. All the three members are trained
simultaneously. To formulate the algorithm, we use a game to represent the communication between the three parties. In this game, the generator and discriminator attempt to communicate with each other with secret messages hidden in an
image. While the steganalyzer attempts to analyze whether there is a transmission
of confidential information. Experimental results demonstrate the effectiveness
of the proposed method on steganography tasks.
Keywords: Steganography, Steganalysis, Adversarial learning.
1
Introduction
Steganography has become a heated research topic in information security, which is
widely used in various applications. It is used to conceal secret information (i.e. a message, an image or a sound) within a medium such that both the secret message as well
as its content will remain invisible. Therefore, the ultimate goal is to conceal a payload
into a cover object without affecting the sharpness of the cover object. With the emergence of all sorts of media, steganography, especially image-based steganography, has
drawn worldwide attention. The design of robust steganographic algorithms which are
used in secret communications is of vital importance.
Steganographic algorithms are designed to hide the secret information within a cover
message such that the cover message appears unaltered to an external adversary. Recent
researchers have made great efforts to design steganographic algorithms to minimize
2
the perturbations within the cover object when embedded into the secret message. Obviously, concealing both the content of the carrier as well as the presence of a secret
message is of vital importance for privacy sensitive communication. The steganography
aims to hide the presence of a secret message, while the steganalysis algorithms are
utilized to find out and recover the secret information of the carrier object. Similar with
adversarial training, the steganalysis serves as the adversarial to steganography.
For the game design of the steganographic techniques, we leverage the ideas from
the adversarial learning. Adversarial learning is based on game theory, and is combined
with unsupervised way to jointly train the model. In our previous work [19], we proposed a novel strategy of secure steganograpy based on generative adversarial networks
to generate suitable and secure covers for steganography, which was not considered the
decoding process. This paper is different from that, we not only encode the secret messages into the images, but decode it utilizing the network. Then we utilize a steganalysis
network to detect the presence of hidden messages. Through unsupervised training, the
generator plays the role of a sender, which is utilized to generate steganographic images
as real as possible. As the discriminator plays the role of a receiver, it not only differentiates real images and generated images, but also extracts the secret messages. And
the steganalysis network, as a listener of the whole process, incorporates supervised
learning with adversarial training to compete against state-of-the-art steganalysis methods.
In summary, this paper makes the following contributions:
(1) We incorporate the generative adversarial network into steganography, which
proves to be a good way of encryption.
(2) We integrate the unsupervised learning method and supervised learning method
to train the generator and steganalyzer respectively, and received robust steganographic
techniques in unsupervised manner.
(3) We also utilize the discriminative network to extract the secret information. Experiments are conducted on widely used datasets, which demonstrate the advantages of
the proposed method.
The rest of the paper is structured as follows. In Section 2, we discuss the related
work of steganography, adversarial networks. In Section 3, we elaborate the proposed
method. In Section 4, experiments are conducted to demonstrate the effectiveness of
the proposed method. In Section 5, we draw conclusions.
2
Related work
2.1
Steganography
The image-based steganography algorithm can be split into two categories. The one is
based on the spatial domain, the other is based on the DCT domain. In our work, we
focus on the spatial domain steganography. The state-of-the-art steganographic
schemes concentrate on embedding secret information within a medium while minimizing the perturbations within that medium. On the contrary, steganalysis is to figure
out whether there is secret information or not in the medium.
3
Least Significant Bit (LSB) [12] is one of the most popular embedding methods in
spatial domain steganography. If LSB is adopted as the steganography method, the statistical features of the image are destroyed. And it is easy to detect by the steganalyzer.
For convenience and simple implementation, the LSB algorithm hides the secret to the
least significant bits in the given image’s channel of each pixel. Mostly, the modification of the LSB algorithm is called ±1-embedding. It randomly adds or subtracts 1 from
the channel pixel, so the last bits would match the ones needed.
Besides the LSB algorithm, some sophisticated steganographic schemes choose to
use a distortion function which is used for selecting the embedding localization of the
image. This type of steganography is called the content-adaptive steganography. The
minimization of the distortion function between the cover image 𝐶 and the steganographic image 𝑆 is usually required. These algorithms are the most popular and the
most secure image steganography in spatial domain, such as HUGO (Highly Undetectable steGO) [4], WOW (Wavelet Obtained Weights) [2], S-UNIWARD (spatial universal wavelet relative distortion) [3], etc.
𝑑 𝐶, 𝑆 = 𝑓 𝐶, 𝑆 ∗ |𝐶 − 𝑆|
(1)
where 𝑓 𝐶, 𝑆 is the cost of modifying a pixel, which is variable in different steganographic algorithms.
HUGO is a steganographic scheme that defines a distortion function domain by assigning costs to pixels based on the effect of embedding some information within a
pixel. It uses a weighted norm function to represent the feature space. WOW is another
content-adaptive steganographic method that embeds information into a cover image
according to textural complexity of regions. In WOW shows that the more complex the
image region is, the more pixel values will be modified in this region. S-UNIWARD
introduces a universal distortion function that is independent of the embedded domain.
Despite the diverse implementation details, the ultimate goals are identical, i.e. they are
all devoted to minimize this distortion function, to embed the information into the noise
area or complex texture, and to avoid the smooth image coverage area.
2.2
Adversarial Learning
In recent years, GANs have been successfully applied to image generation tasks. The
method that generative adversarial networks generate images can be classified in two
manners in general. The first is mainly exploring image synthesis tasks in an unconditioned manner that generates synthetic images without any supervised learning
schemes. Goodfellow et al. [7] propose a theoretical framework of GANs and utilize
GANs to generate images without any supervised information. However, the early
GANs has somewhat noisy and blurry results and sometimes the gradient will be vanished when training the networks. Later, Radford et al. [15] propose a deep convolutional generative adversarial networks (DCGANs) for unsupervised representation. To
solve the situation of gradient vanishing, WGAN [14] is proposed using the Wasserstein distance instead of the Jensen-Shannon divergence, to make the data set distribution compared with the learning distribution from G.
4
Another direction of image synthesis with GANs is to synthesize images by conditioning on supervised information, such as text or class labels. The Conditional GAN
[16] is one of the works that develop a conditional version of GANs by additionally
feeding class labels into both generator and discriminator of GANs. Info-GAN [17]
introduces a new concept, which divides the input noise z into two parts, one is the
continuous noise signal that cannot be explained, and the other is called C. Where C
represents a potential attribute that can be interpreted as a facial expression, such as the
color of eyes, whether with glasses or not, etc. in the facial tasks. Recently, Reed et al.
[18] utilize GANs for image synthesis using given text descriptions, enabling translation from character level to pixel level.
Adversarial learning has been applied to steganographic and cryptographic problems. In Abadi’s [1] work, they apply two neural networks to adversarial game to encrypt a secret message. In which game the discriminator can be deceived. In this paper,
we are devoted to training a model that can learn a steganographic technique by itself
making full use of the discriminator.
3
Adversarial Steganography
This section discusses our proposed adversarial steganographic scheme, we present the
experiments supporting our claims after laying the theoretical groundwork.
3.1
Network Architecture
Generator. The generator receives the cover images and secret messages. Before learning the distribution of the images, the secret messages are first embedded into the cover
image. The generated steganographic images are then input into the generator. As is
shown in Fig.1, we use a fully connected layer, which can cover anywhere of the image
not merely a fixed region. Then four fractionally-strided convolution layers, and finally
a Hyperbolic tangent function layer. The architecture is shown as follows:
Fig. 1. The architecture of the generator
Discriminator. The discriminator is mainly responsible for extracting the secret messages. Besides, it can also help to optimize the visual quality of the generated images.
5
We use four convolutional layers, and then a fully connected layer. In detail, we additionally add a decoding function at the end of the network to extract the secret messages.
Which acts as an interface, accepting the steganographic images as input. The decoding
function analyzes the modification of pixels in images, and recovers the message. As is
shown as follows:
Fig. 2. The architecture of the discriminator
Steganalyzer. The steganalyzer’s inputs are both covers and steganographic images.
The steganalyzer’s architecture is similar to the discriminator, as is illustrated in Fig. 3.
With distinct, we first use a predefined high-pass filter to make a filtering operation,
which is mainly for steganalysis. And then four convolutional layers. Finally, we use a
classification layer, which includes several fully connected layers.
Fig. 3. The architecture of the steganalyzer
3.2
Optimization Objective
Our training scheme includes three parties: generator, discriminator and steganalyzer.
In this game, the generator conveys a secret medium to the discriminator, which the
steganalyzer attempts to eavesdrop the conveying process and find out whether there
are some special information containing in the process. Generally speaking, the generator generates a steganographic image within the cover image embedded with a secret
message. Then generator passes it to the next network which we called discriminator,
concentrating on decoding and recovering the message. The steganalyzer figures out a
6
confidence probability of how much likely the image is hidden with a secret message
when given an image.
For the whole process of information conveying is transparent to the discriminator,
so the decoding can be easily achieved. In the game of the three parties, the generator
is trained to learn to produce a steganographic image such that the discriminator can
decode and recover the secret message, and such that the steganalyzer can output a
better probability whether it is a cover or a steganographic image.
Fig. 4. The whole architecture of the training game. 𝑀 and 𝑀′ represents the secret message and
extracted message from the steganographic image respectively, 𝐶 represents the cover image,
and 𝑆𝐶 represents the steganographic image. 𝑝 is the probability of classifying the co-
vers and steganographic images. 𝑝′ is the probability of classifying the real images and
generated images.
The whole architecture can be depicted in Fig.4, the generator receives a cover image, 𝐶, and a secret message, 𝑀. Combined with the above two inputs, it outputs a steganographic image, 𝑆- , which is simultaneously given to the discriminator and steganalyzer. Once receiving the steganographic image, the discriminator decodes it and
attempts to recover the message. For the game is under generative adversarial networks,
the discriminator can also improve the visual quality of the generated images. In addition to the steganographic images, the cover images are also input into the steganalyzer,
whose output is a probability to classify the steganographic images and covers.
We let 𝜔/ , 𝜔0 , 𝜔1 denote the parameters of generator, discriminator and steganalyzer respectively. We utilize 𝐺(𝜔/ , 𝑀, 𝐶) represents generator’s output given an
image 𝐶 and secret message 𝑀 , 𝐷(𝜔0 , 𝑆- ) for discriminator’s output on steganographic images 𝑆- , and 𝑆(𝜔1 , 𝐶, 𝑆- ) for steganalyzer’s output on covers and steganographic images. Then we use 𝐿/ , 𝐿0 , 𝐿1 represent the loss of three networks respectively. And we can calculate as follows:
𝐷 𝜔0 , 𝑆- = 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶))
(2)
𝑆 𝜔1 , 𝐶, 𝑆- = 𝑆(𝜔1 , 𝐶, 𝐺(𝜔/ , 𝑀, 𝐶))
(3)
7
where the 𝐷 𝜔0 , 𝑆- is output of the discriminator, 𝑆 𝜔1 , 𝐶, 𝑆- is the output of the
steganalyzer.
For the generator’s loss, we correspond it with the other two networks. And we add
constraints to normalize the loss.
𝐿/ 𝜔/ , 𝑀, 𝐶 = 𝜆/ ∙ 𝑑 𝐶, 𝑆- + 𝜆0 ∙ 𝐿0 (𝜔0 , 𝑆- ) + 𝜆1 ∙ 𝐿1 (𝜔1 , 𝐶, 𝑆- )
(4)
where 𝑑 𝐶, 𝑆- is the Euclidean distance between the covers and the steganographic
images. And 𝜆/ , 𝜆0 , 𝜆1 are the calculation loss weights of the generator, discriminator
and steganalyzer respectively. These variables are varying from [0,1].
Also, we set discriminator’s loss to be the norm form. Here, we use the ℓ@ norm.
𝐿0 𝜔/ , 𝜔0 , 𝑀, 𝐶 = 𝑀, 𝐷 𝜔0 , 𝑆-
@
= ||𝑀, 𝐷(𝜔0 , 𝐺(𝜔/ , 𝑀, 𝐶))||@ = ||𝑀, 𝑀′||@ (5)
where the form ||𝑀, 𝑀′||@ is the distance between 𝑀 and 𝑀′.
And we set steganalyzer’s loss to be binary cross-entropy of logistic regression.
𝐿1 𝜔/ , 𝜔1 , 𝐶, 𝑆- = −
A
B
F 𝑦 ln 𝑆
𝜔1 , 𝐶, 𝑆- + (1 − 𝑦) ln(1 − 𝑆 𝜔1 , 𝐶, 𝑆- )
(6)
where 𝑦 = 1 if 𝑥 = 𝐶, which means classifying the images as covers, 𝑦 = 0 if 𝑥 = 𝑆- ,
which means the steganographic images are identified.
We apply adversarial learning techniques to discriminative tasks to learn the steganographic algorithm. Under unsupervised adversarial training, the model can produce steganographic techniques, which act like an encryption.
4
Experiments
As a proof of concept, we conducted our experiments on two image datasets: celebrity
faces in the wild (CelebA) [8] consisting of 202,599 images and BossBase, which is a
dataset of 10000 grayscale images of various scenes. Our datasets are formed of 64 ×
64 pixel images. For the choice of 𝑀, we concatenate a random paragraph message to
generalize our model to random message, with each sample of each dataset. And we
consider different kinds of embedding rates, which vary from 0.1bpp (bits per pixel) to
0.4bpp. Generally, most steganographic algorithms can successfully hide secret message approximately at 0.4bpp. All experiments were performed in TensorFlow[9], on a
workstation with a Titan X GPU.
4.1
CelebA dataset
For the CelebA dataset, which contains 202,599 images of celebrity faces from 10,177
unique identities. We train the model using RMSProp optimization algorithm with the
learning rate of 2×10JK . At each batch we train either the generator, discriminator, or
steganalyzer alternatively.
From the results, we can see that there is no noticeable image quality decrease between 0.1bpp and 0.4bpp. As is shown in Fig. 5. And we also calculate the PSNR (Peak
Signal to Noise Ratio) to evaluate the steganographic effect.
8
Fig. 5. The above are the covers and steganographic images of CelebA dataset. (a) represents the
covers, (b) represents the steganographic images with the embedding rates of 0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom is the contrast
of PSNR of embedding rates at 0.1bpp and 0.4bpp.
4.2
BossBase dataset
In addition to the experiments on the CelebA dataset, we also trained our model on the
BossBase dataset, which is a standard steganography dataset. For the images from this
dataset do not come from a single distribution, so the dataset can perform worse than
the experiments on the CelebA dataset.
9
Fig. 6. Similarly, the above are the covers and steganographic images of BossBase dataset. (a)
represents the covers, (b) represents the steganographic images with the embedding rates of
0.1bpp, (c) represents the steganographic images with the embedding rates of 0.4bpp. The bottom
is also the contrast of PSNR of embedding rates at 0.1bpp and 0.4bpp.
We can conclude from the two groups of experiments that for the datasets with distinct
distribution, different embedding rates can influence the similarity between the original
images and the embedded images.
4.3
Comparison with related work
We train in such a way that the steganalyzer can detect the covers and steganographic
images with low rates. Thus, on the basis of this experiment, we additionally conduct
another experiment compared with the state-of-the-art steganographic algorithms.
Which also shows competitive results.
For both datasets, we compare our scheme against steganographic algorithms HUGO
and S-UNIWARD. As is shown in Table 1, our steganalyzer performs competitively.
By training steganalyzer in a supervised fashion, the experiments show that it has the
capacity to become a strong steganalyzer, competing against established techniques like
GNCNN, and so is a good choice for the steganalyzer. Furthermore, for both the CelebA
10
and BossBase datasets, we use 10,000 samples and split them in half, creating a training
set and a test set. And we then trained the generator on the training set. Following this,
we then created an additional 5,000 steganographic images utilizing each steganography algorithm. Thus, we can make the cover set and steganographic images set consist
of 5,000 images respectively.
Table 1. Accuracy of distinguishing between cover and steganographic images for the GNCNN
and Steganalyzer at an embedding rate of 0.4bpp.
Steganographic
Algorithm
HUGO
S-UNIWARD
Generator
CelebA
Steganalyzer
GNCNN
0.93
0.91
0.94
Steganalyzer
0.91
0.89
0.92
BossBase
Steganalyzer
GNCNN
0.72
0.75
0.83
Steganalyzer
0.68
0.71
0.82
As demonstrated in the experiments, the steganalyzer performs competitively against
the GNCNN [10], and the generator also performs well against other steganographic
techniques. The experimental data shows that on the one hand, the generated images
are good at visual quality. On the other hand, the generated images are harder to detect,
which shows the security of the generated images as covers.
5
Conclusion
In this paper, we have proposed an adversarial steganography architecture with generative adversarial networks. On the basis of generative adversarial networks, we leverage the adversarial structure to form an effective steganographic method. Encouraging
results are received from experiments conducted on the widely used datasets in comparison with several state-of-the-art techniques. We think it could be used for adaptive
steganographic algorithm for social network in the future. We believe that, by exploring
more steganography properties, better performance can be achieved.
References
1. Abadi M, Andersen D G. Learning to Protect Communications with Adversarial Neural
Cryptography[J]. 2016:15.
2. Holub V, Fridrich J. Designing steganographic distortion using directional filters[C]// IEEE
International Workshop on Information Forensics and Security. IEEE, 2012:234-239.
3. Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an
arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1.
4. Pevný T, Filler T, Bas P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography[M]// Information Hiding. Springer Berlin Heidelberg, 2010:161177.
5. Xu G, Wu H Z, Shi Y Q. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 23(5):708-712, 2016.
11
6. Xu G, Wu H Z, Shi Y Q. Ensemble of CNNs for Steganalysis: An Empirical Study[C]//
ACM Workshop on Information Hiding and Multimedia Security. ACM, 2016:103-107.
7. Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative Adversarial Networks[J]. Advances in Neural Information Processing Systems, 3:2672-2680, 2014.
8. Liu Z, Luo P, Wang X, et al. Deep Learning Face Attributes in the Wild[J]. pp. 3730-3738,
2014.
9. Abadi M, Agarwal A, Barham P, et al. TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems[J]. 2016.
10. Yinlong Qian, Jing Dong, WeiWang, and Tieniu Tan. Deep learning for steganalysis via
convolutional neural networks. In IS&T/SPIE Electronic Imaging, pp. 94090J–94090J. International Society for Optics and Photonics, 2015a.
11. Browne M, Ghidary S S, Mayer N M. Convolutional Neural Networks for Image Processing
with Applications in Mobile Robotics[J]. Studies in Computational Intelligence, 2008,
83:327-349.
12. Mielikainen, Jarno. Lsb matching revisited. IEEE signal processing letters, 13(5):285–287,
2006.
13. Andrew D Ker. Resampling and the detection of lsb matching in color bitmaps. In Eletronic
Imaging 2005, pp. 1–15. International Society for Optics and Photonics, 2005.
14. Arjovsky M, Chintala S, Bottou L. Wasserstein GAN[J]. 2017.
15. Radford, Alec, Metz, Luke, and Chintala, Soumith. Unsupervised representation learning
with deep convolutional generative adversarial networks. CoRR, abs/1511.06434, 2015.
URL http://arxiv.org/abs/1511.06434.
16. Odena A, Olah C, Shlens J. Conditional Image Synthesis With Auxiliary Classifier
GANs[J]. 2016.
17. Chen X, Duan Y, Houthooft R, et al. InfoGAN: Interpretable Representation Learning by
Information Maximizing Generative Adversarial Nets[J]. 2016.
18. Reed S, Akata Z, Yan X, et al. Generative Adversarial Text to Image Synthesis[J].
2016:1060-1069.
19. Shi H, Dong J, Wang W, et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks[C]. 2017.
| 1 |
A NEW ROBUST FREQUENCY DOMAIN ECHO CANCELLER WITH CLOSED-LOOP
LEARNING RATE ADAPTATION
Jean-Marc Valin and Iain B. Collings
arXiv:1602.08609v1 [cs.SD] 27 Feb 2016
CSIRO ICT Centre, Sydney, Australia ([email protected])
ABSTRACT
One of the main difficulties in echo cancellation is the fact that
the learning rate needs to vary according to conditions such as
double-talk and echo path change. Several methods have been
proposed to vary the learning. In this paper we propose a new
closed-loop method where the learning rate is proportional to
a misalignment parameter, which is in turn estimated based
on a gradient adaptive approach. The method is presented in
the context of a multidelay block frequency domain (MDF)
echo canceller. We demonstrate that the proposed algorithm
outperforms current popular double-talk detection techniques
by up to 6 dB.
Fig. 1. Block diagram of echo cancellation system.
1. INTRODUCTION
In any echo cancellation system, the presence of near end
speech (double-talk) tends to make the adaptive filter diverge.
To counter the effect, robust echo cancellers require adjustment of the learning rate to account for the presence of doubletalk in the signal.
Most echo cancellation algorithms attempt to explicitly
detect double-talk [1] conditions and then react by freezing
the coefficients of the adaptive filter (setting the learning rate
to zero). Reliable double-talk detection is a difficult problem
and sometimes it is not clear what should be considered as
double-talk, especially in an acoustic echo cancellation context with stationary background noise.
In previous work [2], we proposed a new approach to
make echo cancellation more robust to double-talk. Instead of
attempting to explicitly detect double-talk conditions, a continuous learning rate was used. The learning rate depends on
a misalignment estimate, which is obtained through a linear
regression. While the technique gives good results, the estimation of the misalignment remains a difficult problem.
In this paper, we propose a new approach where the misalignment is estimated in closed-loop based on a gradient adaptive approach. This closed-loop technique is applied to the
block frequency domain (MDF) adaptive filter [3] and shows
a significant improvement over previous approaches.
c 2007 IEEE. Personal use of this material is permitted. Permission
from IEEE must be obtained for all other uses, in any current or future media,
including reprinting/republishing this material for advertising or promotional
purposes, creating new collective works, for resale or redistribution to servers
or lists, or reuse of any copyrighted component of this work in other works.
In Section 2, we discuss the optimal learning rate in presence of noise. Section 3 introduces the multidelay frequency
domain (MDF) adaptive filter. In Section 4, we propose a
gradient adaptive technique for adjusting the learning rate of
the MDF algorithm. Experimental results and a discussion
are presented in Section 5 and Section 6 concludes this paper.
2. OPTIMAL LEARNING RATE IN THE PRESENCE
OF DOUBLE-TALK
In the acoustic echo cancellation context illustrated in Fig. 1,
the speech signal x (n) received from the far end is played
into a loudspeaker. The microphone signal d (n) captures
both the convoluted far end speech y (n) and the near end
noisy speech v (n). The adaptive filter attempts to estimate
the impulse response ĥ (n) to be as close as possible to the
real impulse response h (n). The estimated echo ŷ (n) is subtracted from d (n), so the output signal e (n) contains both
double-talk v (n) and residual echo r (n) = y (n) − ŷ (n).
The conventional approach to double-talk robustness consists of setting the learning rate to zero when double-talk is
detected. Double-talk detectors [1] are thus an important aspect of the approach. Unfortunately, they are sometimes unreliable, especially in acoustic echo cancellation context when
background noise is present. In this paper, we investigate continuous learning rates that do not depend on a binary doubletalk decision.
Whenever an adaptive filter is not perfectly adjusted, its
residual signal r (n) can be used to gain better information
about the exact (time-varying) filter weights h (n). However,
the amount of information about h (n) present in e (n) decreases with the amount of noise and near end speech v(n). In
the case of the normalised least mean square (NLMS) filter, it
means that the stochastic gradient becomes less reliable when
the noise increases or when the filter misalignment decreases
(as the filter converges). The theoretical optimal learning rate
is approximately equal to the residual-to-error ratio [2]:
E r2 (n)
µopt (n) ≈
(1)
E {e2 (n)}
where r (n) = y (n) − ŷ (n) is the (unknown) residual echo
and e (n) is the error signal.
One possible method to vary the learning rate µ (n) would
be to use the generalized normalized gradient descent (GNGD)
algorithm [4], which includes the NLMS learning rate:
µ0 E x2 (n)
(2)
µ (n) =
E {x2 (n)} + ǫ (n)
where ǫ (n) is adapted based on the NLMS stochastic gradient
behaviour. To examine ǫ (n) more closely, it is reasonable to
surmise that (2) eventually converges to the optimal learning
rate defined by (1). Assuming steady state behaviour (ǫ (n) is
stable) and µ0 = 1, we find that:
E r2 (n)
E r2 (n)
≈
(3)
E {r2 (n)} + γ (n) ǫ (n)
E {e2 (n)}
2
2
where
2 γ = E r (n)2 /E x (n)
. Knowing that we have
E e (n) = E r (n) + E v 2 (n) , we find the relation ǫ (n) ≈ E v 2 (n) /γ (n). In other words, the gradientadaptive parameter ǫ (n) is approximately proportional to the
variance of the near-field signal and independent of the farfield signal. Because ǫ (n) can only be adapted slowly
over
time, it is clear that (2) implicitly assumes that E v 2 (n)
also varies slowly. While this is a reasonable assumption in
applications where the background noise is constant or slowly
varying, the assumption does not hold for acoustic echo cancellation, where double-talk can start or stop at any time.
In previous work [2], we proposed
to use (1) directly to
adapt the learning rate. While E e2 (n) can
easily be estimated, the estimation of the residual echo E r2 (n) is difficult because one does not have access to the real filter coefficients. One reasonable assumption we make is that:
E r2 (n) = η (n) E y 2 (n) ≈ η (n) E ŷ 2 (n)
(4)
where η (n) is the normalised filter misalignment (or the inverse of the echo return loss enancement) and is easier to estimate because it is assumed to vary slowly as a function of
time. Although direct estimation of η (n) through linear regression can lead to good results, estimating η (n) remains a
difficult problem. In this paper we propose to apply a gradient
adaptive approach to the problem of estimating η (n).
3. THE MDF ALGORITHM
In this paper, we consider the special case of the multidelay
block frequency domain (MDF) adaptive filter [3]. The MDF
algorithm in matrix form is detailed here for the sake of clarity. Let N be the MDF block size, K be the number of blocks
and F denote the 2N × 2N Fourier transform matrix, we denote the frequency-domain signals for frame ℓ as:
T
(5)
e (ℓ) = F [01×N , e (ℓN ) , . . . , e (ℓN + N − 1)]
o
n
T
xk(ℓ) = diag F[x((ℓ−k−1)N ),. . . ,x((ℓ−k+1)N −1)]
(6)
X (ℓ) = x0 , x1 , . . . , xK−1
(7)
d (ℓ) = F [01×N , d (ℓN ) , . . . , d (ℓN + N − 1)]
T
(8)
The MDF algorithm is then expressed in matrix form as:
e (ℓ) = d (ℓ) − y (ℓ)
(9)
ŷ (ℓ) = G1 X (ℓ) ĥ (ℓ)
(10)
ĥ (ℓ + 1) = ĥ (ℓ) + G2 µ (ℓ) ∇ĥ (ℓ)
(11)
H
∇ĥ (ℓ) = Φ−1
xx (ℓ) X (ℓ) e (ℓ)
(12)
where Φxx (ℓ) is the diagonal normalisation matrix as computed in [3], G1 and G2 are the constraint matrices:
0N ×N 0N ×N
F−1
(13)
G1 = F
0N ×N IN ×N
IN ×N 0N ×N
F−1
(14)
G̃2 = F
0N ×N 0N ×N
o
n
(15)
G2 = diag G̃2 , G̃2 , . . . , G̃2
and µ (ℓ) is the 2KN × 2KN diagonal learning rate matrix:
n
T o
(16)
µ (ℓ) = diag µT (ℓ) , µT (ℓ) , . . . , µT (ℓ)
µ (ℓ) = [µ0 (ℓ) , µ1 (ℓ) , . . . , µ2N −1 (ℓ)]
T
(17)
If µk (ℓ) = µo , we have the standard MDF algorithm.
4. GRADIENT-ADAPTIVE LEARNING RATE
In [2], we proposed to use the frequency-dependent learning
rate:
2
(ℓ)
ŷ
k
(18)
µk (ℓ) = min η (ℓ)
2 , µ0
|ek (ℓ)|
where η(ℓ) is a direct estimation of the normalised misalignment exploiting the non-stationarity of the signals and using
linear regression between the power spectra of the estimated
echo and the output signal. The motivation behind this formulation is that it factors the residual echo estimation into a
slowly-evolving (but unfortunately difficult to estimate) normalised misalignment η(ℓ) and a rapidly-evolving (but easy to
2
estimate) term far-end term yk (ℓ) . The learning rate can
thus react quickly to double-talk even if the estimation of the
residual echo (through the misalignment estimate) requires a
longer time period. A remaining problem with that approach
is that η(ℓ) is difficult to estimate and the algorithm does not
know whether its estimate of η(ℓ) is too low or too high. In
this sense, the η(ℓ) update in [2] is an open-loop estimate.
4.1. Adaptation algorithm
In this paper we bypass the difficulty of estimating η(ℓ) directly and instead propose a closed-loop gradient adaptive estimation of η(ℓ). The parameter η(ℓ) is no longer an estimate of the normalised misalignment, but is instead adapted
in closed-loop in such a way as to maximise convergence of
the adaptive filter. As with other gradient-adaptive methods
[5, 4] we compute the derivative of the mean square error
E (ℓ) = eH (ℓ) e (ℓ), this time with respect to η (ℓ − 1), using the chain derivation rule:
∂E (ℓ)
∂E (ℓ) ∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1)
=
∂η(ℓ−1)
∂e (ℓ) ∂ŷ (ℓ) ∂ ĥ (ℓ) ∂µ (ℓ − 1) ∂η (ℓ − 1)
(19)
= −e
≈−
H
H
(ℓ)G1 X(ℓ)G2 Φ−1
xx (ℓ)X (ℓ) e(ℓ)
ŷk (ℓ)
ŷk (ℓ)
2
2
|ek (ℓ)|
(20)
2
|ek (ℓ)|2
H
∇ĥ (ℓ) Φxx ∇ĥ (ℓ)
(21)
We propose to use a filtered version of the gradient with a
multiplicative update, similar to the general approch in [6],
and to drop the normalisation term Φxx . This results in the
new gradient-based learning rate adaptation rule:
n
o
2
H
(ℓ)
ℜ
ψ
(ℓ)
∇
ĥ
(ℓ)
ŷ
k
n
o
η (ℓ + 1) = η (ℓ) expρ
2P
∗
|ek (ℓ)|
k ℜ ψk (ℓ) ∇ĥk (ℓ)
(22)
ψ (ℓ + 1) = αψ (ℓ) + ∇ĥ (ℓ)
(23)
where ρ is the step size and α controls the gradient smoothing
(typically ρ = 1, α = 0.9).
An intuitive interpretation for the update equation in (22)
is that when the learning rate is too high (because η (ℓ)is too
high), the gradient oscillates, causing η (ℓ) to decrease. On
the other hand, when the learning rate is too low (perhaps because the echo path has changed) the gradient keeps pointing
in the same direction and η (ℓ) increases. Also, because of
|ŷ (ℓ)|2
the k 2 factor, we can apply (22) at each frame regardless
|ek (ℓ)|
of double-talk or even when no far-end speech is present (in
2
which case ŷk (ℓ) = 0 anyway).
The last aspect that needs to be addressed is the initial
condition. When the filter is initialised, all the weights are set
to zero, which means that ŷ (ℓ) = 0 and no adaptation can
take place in (18) and (22). In order to bootstrap the adaptation process, the learning rate µk (ℓ) is set to a fixed constant
(we use µk (ℓ) = 0.25) for a short time equal to twice the filter
length (only non-zero portions of signal x(n) are taken into
account). This procedure is only necessary when the filter is
initialised and is not required in case of echo path change.
4.2. Algorithm behaviour
Here we show that the adaptive learning rate described above
is able to deal with both double-talk and echo path change
without explicit modelling. From (18) we can see that when
2
double-talk occurs, the denominator |ek (ℓ)| rapidly increases,
causing an instantaneous decrease in the learning rate that
lasts only as long as the double-talk period lasts. In the case
of background noise, the learning rate depends on both the
presence of an echo signal as well as the misalignment estimate. As the filter misalignment becomes smaller, the learning
rate also becomes smaller.
One major difficulty involved in double-talk detection is
the need to distinguish between double-talk and echo path
change since both cause a sudden increase in the filter error
signal. This distinction is made implicitly in the gradientbased adaptation of η(ℓ). When the echo path changes, ∇ĥ (ℓ)
starts pointing steadily in the same direction, thus significantly increasing η(ℓ), which is a clear sign that the filter is no
longer properly adapted.
In gradient adaptive methods [5, 6], the implicit assumption is that both the near-end and the far-end signals are nearly
stationary. We have shown that the GNGD algorithm [4] only
requires the near-end signal to be nearly stationary. In our new
proposed method, both signals can be non-stationary, which
is a requirement for double-talk robustness.
5. RESULTS AND DISCUSSION
The proposed system is evaluated in an acoustic echo cancellation context with background noise, double-talk and a
change in the echo path (16 seconds into a 32-second recording). The two impulse responses used are 1024-sample long
and measured from real recordings in a small office room with
both the microphone and the loudspeaker resting on a desk.
The proposed algorithm is compared to our previous work
[2], to the normalised cross-correlation (NCC) method [1] and
to a baseline with no double-talk detection (no DTD). The
optimal threshold found for the NCC algorithm was 0.35 with
a learning rate µ = 0.25. It was found that choosing µmax =
0.75 as the upper bound on the learning rate gave good results
for the proposed algorithm. In practise, µmax has little impact
25
4.5
proposed
previous [2]
NCC [1]
no DTD
20
4
less double−talk
more double−talk
PESQ LQO-MOS
ERLE (dB)
3.5
15
10
3
2.5
2
proposed
previous [2]
NCC [1]
no DTD
no cancellation
5
1.5
0
-20
less double−talk
-15
-10
more double−talk
-5
0
5
10
Near-end-to-far-end ratio (dB)
15
20
1
-20
-15
-10
-5
0
5
10
Near-end-to-far-end ratio (dB)
15
20
Fig. 2. Steady-state ERLE (first two seconds of adaptation
not considered) as a function of the near-end to far-end ratio.
Fig. 3. PESQ objective listening quality measure (LQOMOS) as a function of the near-end to far-end ratio.
on the algorithm because the gradient-based adaptation would
compensate for a higher value of µmax by reducing η (ℓ). The
GNGD algorithm [4] is not included in the evaluation because
it is not intended for applications where the near-field signal is
highly non-stationary and it was not possible to obtain better
results than the baseline.
Fig. 2 shows the average steady-state (the first 2 seconds
of adaptation are not considered) ERLE for the test data with
different ratios of near-end signal and echo. Clearly, the proposed algorithm performs better than both our previous work
(2 dB average improvement) and the NCC algorithm (6 dB
average improvement). The perceptual quality of the output
speech signal is also evaluated by comparing it to the near
field signal v(n) using the Perceptual Evaluation of Speech
Quality (PESQ) ITU-T recommendations P.862 [7]. The perceptual quality of the speech shown in Fig. 3 is evaluated
based on the entire file, including the adaptation time. It is
again clear that the proposed algorithm performs better than
all other algorithms. It is worth noting that the reason why the
results in Fig. 2 improve with double-talk (unlike in Fig. 2) is
that the signal of interest is the double-talk v(n), so the higher
the double-talk the less (relative) echo in the input signal.
algorithm, we believe future work could apply it to other adaptive filtering algorithms, including the NLMS algorithm.
7. REFERENCES
[1] J. Benesty, D.R. Morgan, and J.H. Cho, “A new class of
doubletalk detectors based on cross-correlation,” IEEE
Trans. on Speech and Audio Processing, vol. 8, no. 2, pp.
168–172, 2000.
[2] J.-M. Valin, “On adjusting the learning rate in frequency
domain echo cancellation with double-talk,” IEEE Trans.
on Audio, Speech and Language Processing, 2007.
[3] J.-S. Soo and K.K. Pang, “Multidelay block frequency
domain adaptive filter,” IEEE Trans. ASSP, vol. 38, no.
2, pp. 373–376, 1990.
[4] D.P. Mandic, “A generalized normalized gradient descent
algorithm,” IEEE Signal Processing Letters, vol. 11, no.
2, pp. 115–118, 2004.
[5] V.J. Mathews and Z. Xie, “A stochastic gradient adaptive
filter with gradient adaptive step size,” IEEE Trans. on
Signal Processing, vol. 41, pp. 2075–2087, 1993.
6. CONCLUSION
We have demonstrated a novel method for adjusting the learning rate of frequency-domain adaptive filters based on a gradient adaptive estimation of the current misalignment. The proposed method performs better than a double-talk detector and
previous work using direct estimation of the misalignment. In
addition, the closed-loop gradient adaptive estimation of η (ℓ)
makes the algorithm conceptually simple and means that there
are very few important parameters to be tuned. Although the
proposed algorithm is presented in the context of the MDF
[6] W.-P. Ang and B. Farhang-Boroujeny, “A new class
of gradient adaptive step-size LMS algorithms,” IEEE
Trans. on Signal Processing, vol. 49, no. 4, pp. 805–810,
2001.
[7] ITU-T, P.862: Perceptual evaluation of speech quality
(PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and
speech codecs, 2001.
| 3 |
Reconfiguring spanning and induced subgraphs∗
Tesshu Hanaka†
Takehiro Ito‡
Naomi Nishimura§
Haruka Mizuta‡
Vijay Subramanya§
Benjamin Moore§
Akira Suzuki‡
arXiv:1803.06074v1 [cs.DS] 16 Mar 2018
Krishna Vaidyanathan§
March 19, 2018
Abstract
Subgraph reconfiguration is a family of problems focusing on the reachability of the
solution space in which feasible solutions are subgraphs, represented either as sets of vertices
or sets of edges, satisfying a prescribed graph structure property. Although there has been
previous work that can be categorized as subgraph reconfiguration, most of the related
results appear under the name of the property under consideration; for example, independent
set, clique, and matching. In this paper, we systematically clarify the complexity status of
subgraph reconfiguration with respect to graph structure properties.
1
Introduction
Combinatorial reconfiguration [6, 5, 11] studies the reachability/connectivity of the solution space
formed by feasible solutions of an instance of a search problem. More specifically, consider a graph
such that each node in the graph represents a feasible solution to an instance of a search problem
P , and there is an edge between nodes representing any two feasible solutions that are “adjacent,”
according to a prescribed reconfiguration rule A; such a graph is called the reconfiguration graph
for P and A. In the reachability problem for P and A, we are given source and target solutions
to P , and the goal is to determine whether or not there is a path between the two corresponding
nodes in the reconfiguration graph for P and A. We call a desired path a reconfiguration sequence
between source and target solutions, where a reconfiguration step from one solution to another
corresponds to an edge in the path.
1.1
Subgraph reconfiguration
In this paper, we use the term subgraph reconfiguration to describe a family of reachability
problems that take subgraphs (more accurately, vertex subsets or edge subsets of a given graph)
as feasible solutions. Each of the individual problems in the family can be defined by specifying
the node set and the edge set of a reconfiguration graph, as follows. (We use the terms node for
reconfiguration graphs and vertex for input graphs.)
Nodes of a reconfiguration graph. The set of feasible solutions (i.e., subgraphs) can be defined
in terms of a specified graph structure property Π which subgraphs must satisfy; for example, “a
graph is a tree,” “a graph is edgeless (an independent set),” and so on. By the choice of how
∗ This work is partially supported by JST ERATO Grant Number JPMJER1201, JST CREST Grant Number
JPMJCR1402, and JSPS KAKENHI Grant Numbers JP16K00004 and JP17K12636, Japan. Research by Canadian
authors is supported by the Natural Science and Engineering Research Council of Canada.
† Kyushu University, Fukuoka, Japan, [email protected]
‡ Tohoku University, Sendai, Japan, [email protected], [email protected],
[email protected]
§ University of Waterloo, Waterloo, Canada, {brmoore, nishi, v7subram, kvaidyan}@uwaterloo.ca
1
Table 1: Subgraph representations and variants
Subgraph representations
Variant names
Known reachability problems
edge subset
edge
spanning tree [6]
matching [6, 10], and b-matching [10]
clique [7]
independent set [6, 8]
vertex subset
induced
induced forest [9]
induced bipartite [9]
induced tree [12]
spanning
clique [7]
Es = E0
E1
E2
E3 = Et
Figure 1: A reconfiguration sequence hE0 , E1 , E2 , E3 i in the edge variant under the TJ rule (also
under the TS rule) with the property “a graph is a path,” where the edges forming solutions are
depicted by thick lines.
to represent subgraphs, each specific problem in the family can be categorized into one of three
variants. (See also Table 1.) If a subgraph is represented as an edge subset, which we will call the
edge variant, then the subgraph formed (induced) by the edge subset must satisfy Π. For example,
Figure 1 illustrates four subgraphs represented as edge subsets, where Π is “a graph is a path.”
On the other hand, if a subgraph is represented as a vertex subset, we can opt either to require
that the subgraph induced by the vertex subset satisfies Π or that the subgraph induced by the
vertex subset contains at least one spanning subgraph that satisfies Π; we will refer to these as the
induced variant and spanning variant, respectively. For example, if Π is “a graph is a path,” then
in the induced variant, the vertex subset must induce a path, whereas in the spanning variant, the
vertex subset is feasible if its induced subgraph contains at least one Hamiltonian path. Figure 2
illustrates feasible vertex subsets of the induced variant and spanning variant. In the figure, the
vertex subset V1′ is feasible in the spanning variant, but is not feasible in the induced variant,
because it contains a spanning path but does not induce a path. As can be seen by this simple
example, in the spanning variant, we need to pay attention to the additional complexity of finding
a spanning subgraph and the complications resulting from the fact that the subgraph induced by
the vertex subset may contain more than one spanning subgraph which satisfies Π.
Edges of a reconfiguration graph. Since we represent a feasible solution by a set of vertices
(or edges) in any variant, we can consider that tokens are placed on each vertex (resp., edge) in
the feasible solution. Then, in this paper, we mainly deal with the two well-known reconfiguration
rules, called the token-jumping (TJ) [8] and token-sliding (TS) rules [2, 4, 8]. In the former, a
token can move to any other vertex (edge) in a given graph, whereas in the latter it can move only
to an adjacent vertex (adjacent edge, that is sharing a common vertex.) For example, Figure 1
and Figure 2 illustrate reconfiguration sequences under the TJ rule for each variant. Note that the
sequence in Figure 1 can also be considered as a sequence under the TS rule. In the reconfiguration
graph, two nodes are adjacent if and only if one of the two corresponding solutions can be obtained
from the other one by a single move of one token that follows the specified reconfiguration rule.
Therefore, all nodes in a connected component of the reconfiguration graph represent subgraphs
having the same number of vertices (edges).
We note in passing that since in most cases we wish to retain the same number of vertices
and/or edges, we rarely use the token-addition-and-removal (TAR) rule [6, 8], where we can add
or remove a single token at a time, for subgraph reconfiguration problems.
2
Vs = V0
V1
V2
V3
V4 = Vt
(a) Induced variant
Vs = V0’
V1’
V2’ = Vt
(b) Spanning variant
Figure 2: Reconfiguration sequences hV0 , V1 , V2 , V3 , V4 i in the induced variant under the TJ rule
and hV0′ , V1′ , V2′ i in the spanning variant under the TJ rule with the property “a graph is a path,”
where the vertices forming solutions are depicted by colored circles, and the subgraphs satisfying
the property by thick lines.
1.2
Previous work
Although there has been previous work that can be categorized as subgraph reconfiguration,
most of the related results appear under the name of the property Π under consideration. Accordingly, we can view reconfiguration of independent sets [6, 8] as the induced variant of subgraph
reconfiguration such that the property Π is “a graph is edgeless.” Other examples can be found
in Table 1. We here explain only known results which are directly related to our contributions.
Reconfiguration of cliques can be seen as both the spanning and the induced variant; the
problem is PSPACE-complete under any rule, even when restricted to perfect graphs [7]. Indeed,
for this problem, the rules TAR, TJ, and TS have all been shown to be equivalent from the
viewpoint of polynomial-time solvability. It is also known that reconfiguration of cliques can be
solved in polynomial time for several well-known graph classes [7].
Wasa et al. [12] considered the induced variant under the TJ and TS rules with the property
Π being “a graph is a tree.” They showed that this variant under each of the TJ and TS rules
is PSPACE-complete, and is W[1]-hard when parameterized by both the size of a solution and
the length of a reconfiguration sequence. They also gave a fixed-parameter algorithm when parameterized by both the size of a solution and the maximum degree of an input graph, under
both the TJ and TS rules. In closely related work, Mouawad et al. [9] considered the induced
variants of subgraph reconfiguration under the TAR rule with the properties Π being either
“a graph is a forest” or “a graph is bipartite.” They showed that these variants are W[1]-hard
when parameterized by the size of a solution plus the length of a reconfiguration sequence.
1.3
Our contributions
In this paper, we study the complexity of subgraph reconfiguration under the TJ and TS
rules. (Our results are summarized in Table 2, together with known results, where an (i, j)-biclique
is a complete bipartite graph with the bipartition of i vertices and j vertices.) As mentioned above,
because we consider the TJ and TS rules, it suffices to deal with subgraphs having the same number
of vertices or edges. Subgraphs of the same size may be isomorphic for certain properties Π, such
as “a graph is a path” and “a graph is a clique,” because there is only one choice of a path or
a clique of a particular size. On the other hand, for the property “a graph is a tree,” there are
several choices of trees of a particular size. (We will show an example in Section 3 with Figure 4.)
As shown in Table 2, we systematically clarify the complexity of subgraph reconfiguration
for several fundamental graph properties. In particular, we show that the edge variant under the
TJ rule is computationally intractable for the property “a graph is a path” but tractable for the
3
Property Π
path
cycle
tree
Table 2: Previous and new results
Edge
Induced
variant
variant
NP-hard (TJ)
PSPACE-c. (TJ, TS)
[Theorem 2]
[Theorems 7, 9]
P (TJ, TS)
PSPACE-c. (TJ, TS)
[Theorem 3]
[Theorems 8, 9]
P (TJ)
PSPACE-c. (TJ, TS)
[Theorem 6]
[12]
(i, j)-biclique
P (TJ, TS)
[Theorem 5]
clique
P (TJ, TS)
[Theorem 4]
diameter
two
any
property
XP for solution
size (TJ, TS)
[Theorem 1]
PSPACE-c. for i = j (TJ)
PSPACE-c. for fixed i (TJ)
[Corollary 1, Theorem 12]
PSPACE-c. (TJ, TS)
[7]
PSPACE-c. (TS)
[Theorem 15]
XP for solution
size (TJ, TS)
[Theorem 1]
Spanning
variant
PSPACE-c. (TJ, TS)
[Theorems 7, 9]
PSPACE-c. (TJ, TS)
[Theorems 8, 9]
P (TJ)
PSPACE-c. (TS)
[Theorems 11, 10]
NP-hard for i = j (TJ)
P for fixed i (TJ)
[Theorems 13, 14]
PSPACE-c. (TJ, TS)
[7]
PSPACE-c. (TS)
[Theorem 15]
XP for solution
size (TJ, TS)
[Theorem 1]
property “a graph is a tree.” This implies that the computational (in)tractability does not follow
directly from the inclusion relationship of graph classes required as the properties Π; one possible
explanation is that the path property implies a specific graph, whereas the tree property allows
several choices of trees, making the problem easier.
1.4
Preliminaries
Although we assume throughout the paper that an input graph G is simple, all our algorithms
can be easily extended to graphs having multiple edges. We denote by (G, Vs , Vt ) an instance of a
spanning variant or an induced variant whose input graph is G and source and target solutions are
vertex subsets Vs and Vt of G. Similarly, we denote by (G, Es , Et ) an instance of the edge variant.
We may assume without loss of generality that |Vs | = |Vt | holds for the spanning and induced
variants, and |Es | = |Et | holds for the edge variant; otherwise, the answer is clearly no since under
both the TJ and TS rules, all solutions must be of the same size.
2
General algorithm
In this section, we give a general XP algorithm when the size of a solution (that is, the size
of a vertex or edge subset that represents a subgraph) is taken as the parameter. For notational
convenience, we simply use element to represent a vertex (or an edge) for the spanning and induced
variants (resp., the edge variant), and candidate to represent a set of elements (which does not
necessarily satisfy the property Π.) Furthermore, we define the size of a given graph as the number
of elements in the graph.
Theorem 1. Let Π be any graph structure property, and let f (k) denote the time to check if a
candidate of size k satisfies Π. Then, all of the spanning, induced, and edge variants under the
TJ or TS rules can be solved in time O(nk+1 k + nk f (k)), where n is the size of a given graph and
k is the size of a source (and target) solution. Furthermore, a shortest reconfiguration sequence
between source and target solutions can be found in the same time bound, if it exists.
Proof. Our claim is that the reconfiguration graph can be constructed in the stated time. Since
a given source solution is of size k, it suffices to deal only with candidates of size exactly k. For
4
Ps
Pt
e1s
s1
ens
s2
sn
e1t
t1
G
sn+1
tn
e1
x
t
en+1
ent
t2
s
en+1
e2
v
e3
s
t
w
tn+1
Figure 3: Reduction to the edge variant under the TJ rule for the property “a graph is a path.”
a given graph, the total number of possible candidates of size k is O(nk ). For each candidate,
we can check in time f (k) whether it satisfies Π. Therefore, we can construct the node set of
the reconfiguration graph in time O(nk f (k)). We then obtain the edge set of the reconfiguration
graph. Notice that each node in the reconfiguration graph has O(nk) adjacent nodes, because we
can replace only a single element at a time. Therefore, we can find all pairs of adjacent nodes in
time O(nk+1 k).
In this way, we can construct the reconfiguration graph in time O(nk+1 k + nk f (k)) in total.
The reconfiguration graph consists of O(nk ) nodes and O(nk+1 k) edges. Therefore, by breadthfirst search starting from the node representing a given source solution, we can determine in time
O(nk+1 k) whether or not there exists a reconfiguration sequence between two nodes representing
the source and target solutions. Notice that if a desired reconfiguration sequence exists, then the
breadth-first search finds a shortest one.
3
Edge variants
In this section, we study the edge variant of subgraph reconfiguration for the properties of
being paths, cycles, cliques, bicliques, and trees.
We first consider the property “a graph is a path” under the TJ rule.
Theorem 2. The edge variant of subgraph reconfiguration under the TJ rule is NP-hard
for the property “a graph is a path.”
Proof. We give a polynomial-time reduction from the Hamiltonian path problem. Recall that a
Hamiltonian path in a graph G is a path that visits each vertex of G exactly once. Given a graph G
and two vertices s, t ∈ V (G) of G, the NP-complete problem Hamiltonian path is to determine
whether or not G has a Hamiltonian path which starts from s and ends in t [3].
For an instance (G, s, t) of Hamiltonian path, we construct a corresponding instance (G′ , Es , Et )
of our problem, as follows. (See also Figure 3.) Let n = |V (G)|. We first add two new vertices v and x to G with two new edges e1 = xv and e2 = vs. We then add two paths Ps =
hs1 , s2 , . . . , sn+1 , xi and Pt = ht1 , t2 , . . . , tn+1 , xi, where s1 , s2 , . . . , sn+1 and t1 , t2 , . . . , tn+1 are distinct new vertices. Each of Ps and Pt consists of n+1 edges; we denote by es1 , es2 , . . . , esn+1 the edges
s1 s2 , s2 s3 , . . . , sn+1 x in Ps , respectively, and by et1 , et2 , . . . , etn+1 the edges t1 t2 , t2 t3 , . . . , tn+1 x in
Pt , respectively. We finally add a new vertex w with an edge e3 = tw, completing the construction
of G′ . We then set Es = {es1 , es2 , . . . , esn+1 , e1 , e2 } and Et = {et1 , et2 , . . . , etn+1 , e1 , e2 }; these edge
subsets clearly form paths in G′ . We have thus constructed our corresponding instance (G′ , Es , Et )
in polynomial time.
We now prove that an instance (G, s, t) of Hamiltonian path is a yes-instance if and only if
the corresponding instance (G′ , Es , Et ) is a yes-instance.
To prove the only-if direction, we first suppose that G has a Hamiltonian path P starting from
s and ending in t. Then, we construct an actual reconfiguration sequence from Es to Et using
the edges in P . Notice that P consists of n − 1 edges. Thus, we first move the n − 1 edges
es1 , es2 , . . . , esn−1 in Es to the edges in P one by one, and then move esn to e3 . Next, we move esn+1 to
etn+1 , and then move the edges in E(P ) ∪ {e3 } to etn , etn−1 , . . . , et1 one by one. By the construction
of G′ , we know that each of the intermediate edge subsets forms a path in G′ , as required.
5
We now prove the if direction by supposing that there exists a reconfiguration sequence hEs =
E0 , E1 , . . . , Eℓ = Et i. Let Eq be the first edge subset in the sequence such that E(Pt ) ∩ Eq 6= ∅;
we claim that Eq contains a Hamiltonian path in G. First, notice that the edge in E(Pt ) ∩ Eq
is etn+1 ; otherwise the subgraph formed by Eq is disconnected. Since |Eq | = |Es | = n + 3 and
|E(Ps )| = n + 1, we can observe that Eq contains no edge in Ps ; otherwise the degree of x would
be three, or Eq would form a disconnected subgraph. Therefore, the n + 2 edges in Eq \ {etn+1 }
must be chosen from E(G) ∪ {e1 , e2 , e3 }. Since |V (G)| = n and Eq must form a path in G′ , we
know that Eq \ {etn+1 } consists of e1 , e2 , e3 and n − 1 edges in G. Thus, Eq \ {etn+1, e1 , e2 , e3 } forms
a Hamiltonian path in G starting from s and ending in t, as required.
We now consider the property “a graph is a cycle,” as follows.
Theorem 3. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in linear time for the property “a graph is a cycle.”
Proof. Let (G, Es , Et ) be a given instance. We claim that the reconfiguration graph is edgeless, in
other words, no feasible solution can be transformed at all. Then, the answer is yes if and only if
Es = Et holds; this condition can be checked in linear time.
Let E ′ be any feasible solution of G, and consider a replacement of an edge e− ∈ E ′ with an
edge e+ other than e− . Let u, v be the endpoints of e− . When we remove e− from E ′ , the resulting
edge subset E ′ \{e} forms a path whose ends are u and v. Then, to ensure that the candidate forms
a cycle, we can choose only e− = uv as e+ . This contradicts the assumption that e+ 6= e− .
The same arguments hold for the property “a graph is a clique,” and we obtain the following
theorem. We note that, for this property, both induced and spanning variants (i.e., when solutions
are represented by vertex subsets) are PSPACE-complete under any rule [7].
Theorem 4. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in linear time for the property “a graph is a clique.”
We next consider the property “a graph is an (i, j)-biclique,” as follows.
Theorem 5. The edge variant of subgraph reconfiguration under each of the TJ and TS
rules can be solved in polynomial time for the property “a graph is an (i, j)-biclique” for any pair
of positive integers i and j.
Proof. We may assume without loss of generality that i ≤ j holds. We prove the theorem in the
following three cases: Case 1: i = 1 and j ≤ 2; Case 2: i, j ≥ 2; and Case 3: i = 1 and j ≥ 3.
We first consider Case 1, which is the easiest case. In this case, any (1, j)-biclique has at most
two edges. Therefore, by Theorem 1 we can conclude that this case is solvable in polynomial time.
We then consider Case 2. We show that (G, Es , Et ) is a yes-instance if and only if Es = Et
holds. To do so, we claim that the reconfiguration graph is edgeless, in other words, no feasible
solution can be transformed at all. To see this, because i, j ≥ 2, notice that the removal of any
edge e in an (i, j)-biclique results in a bipartite graph with the same bipartition of i vertices and
j vertices. Therefore, to obtain an (i, j)-biclique by adding a single edge, we must add back the
same edge e.
We finally deal with Case 3. Notice that a (1, j)-biclique is a star with j leaves, and its center
vertex is of degree j ≥ 3. Then, we claim that (G, Es , Et ) is a yes-instance if and only if the center
vertices of stars represented by Es and Et are the same. The if direction clearly holds, because
we can always move edges in Es \ Et into ones in Et \ Es one by one. We thus prove the only-if
direction; indeed, we prove the contrapositive, that is, the answer is no if the center vertices of
stars represented by Es and Et are different. Consider such a star Ts formed by Es . Since Ts has
j ≥ 3 leaves, the removal of any edge in Es results in a star having j − 1 ≥ 2 leaves. Therefore, to
ensure that each intermediate solution is a star with j leaves, we can add only an edge of G which
is incident to the center of Ts . Thus, we cannot change the center vertex.
6
Es = E0
E1
E2 = Et
Figure 4: Reconfiguration sequence hE0 , E1 , E2 i in the edge variant under the TJ rule with the
property “a graph is a tree.”
In this way, we have proved Theorem 5. Although Case 1 takes non-linear time, our algorithm
can be easily improved (without using Theorem 1) so that it runs in linear time.
We finally consider the property “a graph is a tree” under the TJ rule. As we have mentioned
in the introduction, for this property, there are several choices of trees even of a particular size,
and a reconfiguration sequence does not necessarily consist of isomorphic trees (see Figure 4). This
“flexibility” of subgraphs may yield the contrast between Theorem 2 for the path property and the
following theorem for the tree property.
Theorem 6. The edge variant of subgraph reconfiguration under the TJ rule can be solved
in linear time for the property “a graph is a tree.”
Proof. Suppose that (G, Es , Et ) is a given instance. We may assume without loss of generality that
|Es | = |Et | ≥ 2; otherwise |Es | = |Et | ≤ 1 holds, and hence the instance is trivially a yes-instance.
We will prove below that any instance with |Es | = |Et | ≥ 2 is a yes-instance if and only if all the
edges in Es and Et are contained in the same connected component of G. Note that this condition
can be checked in linear time.
We first prove the only-if direction of our claim. Since |Es | = |Et | ≥ 2 and subgraphs always
must retain a tree structure (more specifically, they must be connected graphs), observe that we
can exchange edges only in the same connected component of G. Thus, the only-if direction follows.
To complete the proof, it suffices to prove the if direction of our claim. For notational convenience, for any feasible solution Ei we denote by Ti the tree represented by Ei , and by Vi the
vertex set of Ti . In this direction, we consider the following two cases: (a) Vs ∩ Vt = ∅, and (b)
Vs ∩ Vt 6= ∅.
We consider case (a), that is, Vs ∩ Vt = ∅. Since Ts and Tt are contained in one connected
component of G, there exists a path hv0 , v1 , . . . , vℓ i in G such that v0 ∈ Vs , vℓ ∈ Vt and vi ∈
/ Vs ∪ Vt
for all i ∈ {1, 2, . . . , ℓ − 1}. Since Ts is a tree, it has at least two degree-one vertices. Let vs
be any degree-one vertex in Vs \ {v0 }, and let es be the leaf edge of Ts incident to vs . Then,
we can exchange es with v0 v1 , and obtain another tree represented by the resulting edge subset
(Es ∪ {v0 v1 }) \ {es }. By repeatedly applying this operation along the path hv1 , v2 , . . . , vℓ i, we can
obtain a solution Ek such that Vk ∩ Vt = {vℓ } 6= ∅; this case will be considered below.
We finally consider case (b), that is, Vs ∩ Vt 6= ∅. Consider the graph (Vs ∩ Vt , Es ∩ Et ). Then,
(Vs ∩ Vt , Es ∩ Et ) is a forest, and let G′ = (V ′ , E ′ ) be a connected component (i.e., a tree) of
(Vs ∩ Vt , Es ∩ Et ) whose edge set is of maximum size. We now prove that there is a reconfiguration
sequence between Es and Et by induction on k = |Es \ E ′ | = |Et \ E ′ |. If k = 0, then Es = E ′ = Et
and hence the claim holds. We thus consider the case where k > 0 holds. Since G′ is a proper
subtree of Tt , there exists at least one edge et in Et \ E ′ such that one endpoint of et is contained in
V ′ and the other is not. We claim that there exists an edge es in Es \ E ′ which can be moved into
et , that is, the subgraph represented by the resulting edge subset (Es ∪ {et }) \ {es } forms a tree. If
both endpoints of et are contained in Vs (not just V ′ ), Es ∪ {et } contains a cycle; let C ⊆ Es ∪ {et }
be the edge set of the cycle. Since the subgraph Tt has no cycle, there exists at least one edge in
C \ Et , and we choose one of them as es . On the other hand, if just one endpoint of et is contained
in Vs , then we choose a leaf edge of Ts in Es \ E ′ as es . Note that there exists such a leaf edge since
G′ is a proper subtree of Ts . From the choice of es and et , we know the subgraph represented by
the resulting edge subset (Es ∪ {et }) \ {es } forms a tree; let Ek = (Es ∪ {et }) \ {es }. Furthermore,
since Ek ∩ Et includes E ′ ∪ {et } and the subgraph formed by E ′ ∪ {et } is connected, the subgraph
7
G
G
s2
s1
s
t
t1
s1
t2
(a)
s
t
t1
(b)
Figure 5: Reductions for the properties (a) “a graph is a path,” and (b) “a graph is a cycle.”
formed by Ek ∩ Et has a connected component whose edge set has size at least |E ′ | + 1. Therefore,
we can conclude that Ek is reconfigurable into Et by the induction hypothesis.
4
Induced and spanning variants
In this section, we deal with the induced and spanning variants where subgraphs are represented as
vertex subsets. Most of our results for these variants are hardness results, except for Theorems 11
and 14.
4.1
Path and cycle
In this subsection, we show that both induced and spanning variants under the TJ or TS rules are
PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.” All proofs in
this subsection make use of reductions that employ almost identical constructions. Therefore, we
describe the detailed proof for only one case, and give proof sketches for the other cases.
We give polynomial-time reductions from the shortest path reconfiguration problem,
which can be seen as a subgraph reconfiguration problem, defined as follows [1]. For a
simple, unweighted, and undirected graph G and two distinct vertices s, t of G, shortest path
reconfiguration is the induced (or spanning) variant of subgraph reconfiguration under
the TJ rule for the property “a graph is a shortest st-path.” Notice that there is no difference
between the induced variant and the spanning variant for this property, because any shortest path
in a simple graph forms an induced subgraph. This problem is known to be PSPACE-complete [1].
Let d be the (shortest) distance from s to t in G. For each i ∈ {0, 1, . . . , d}, we denote by
Li ⊆ V (G) the set of vertices that lie on a shortest st-path at distance i from s. Therefore, we
have L0 = {s} and Ld = {t}. We call each Li a layer. Observe that any shortest st-path contains
exactly one vertex from each layer, and we can assume without loss of generality that G has no
vertex which does not belong to any layer.
We first give the following theorem.
Theorem 7. For the property “a graph is a path,” the induced and spanning variants of subgraph
reconfiguration under the TJ rule are both PSPACE-complete on bipartite graphs.
Proof. Observe that these variants are in PSPACE. Therefore, we construct a polynomial-time
reduction from shortest path reconfiguration.
Let (G, Vs , Vt ) be an instance of shortest path reconfiguration. Since any shortest stpath contains exactly one vertex from each layer, we can assume without loss of generality that
G has no edge joining two vertices in the same layer, that is, each layer Li forms an independent
set in G. Then, G is a bipartite graph. From (G, Vs , Vt ), we construct a corresponding instance
(G′ , Vs′ , Vt′ ) for the induced and spanning variants; note that we use the same reduction for both
variants. Let G′ be the graph obtained from G by adding four new vertices s1 , s2 , t1 , t2 which are
connected with four new edges s2 s1 , s1 s, tt1 , t1 t2 . (See Figure 5(a).) Note that G′ is also bipartite.
8
We then set Vs′ = Vs ∪ {s1 , s2 , t1 , t2 } and Vt′ = Vt ∪ {s1 , s2 , t1 , t2 }. Since each of Vs and Vt induces
a shortest st-path in G, each of Vs′ and Vt′ is a feasible solution to both variants. This completes
the polynomial-time construction of the corresponding instance.
We now give the key lemma for proving the correctness of our reduction.
Lemma 1. Let V ′ ⊆ V (G′ ) be any solution for the induced or spanning variant which is reachable
by a reconfiguration sequence from Vs′ (or Vt′ ) under the TJ rule. Then, V ′ satisfies the following
two conditions:
(a) s2 , s1 , s, t, t1 , t2 ∈ V ′ ; and
(b) V ′ contains exactly one vertex from each layer of G.
Proof. We first prove that condition (a) is satisfied. Notice that both Vs′ and Vt′ satisfy this
condition. Because V ′ is reconfigurable from Vs′ or Vt′ , it suffices to show that we cannot move
any of s2 , s1 , s, t, t1 , t2 in a reconfiguration sequence starting from Vs′ or Vt′ . Suppose for sake of
contradiction that we can move at least one of s2 , s1 , s, t, t1 , t2 . Then, the first removed vertex v ∈
{s2 , s1 , s, t, t1 , t2 } must be either s2 or t2 ; otherwise the resulting subgraph would be disconnected.
Let w be the vertex with which we exchanged v. Then, w ∈ V (G′ ) \ {s2 , s1 , s, t, t1 , t2 } = V (G) \
{s, t}. Therefore, the resulting vertex subset cannot induce a path, and hence it cannot be a
solution for the induced variant. Similarly, the induced subgraph cannot contain a spanning path,
and hence it cannot be a solution for the spanning variant.
We next show that condition (b) is satisfied. Recall that d denotes the number of edges in a
shortest st-path in G. Then, we have |V ′ | = |Vs′ | = |Vt′ | = d+ 5. By condition (a), we know that V ′
contains s2 , s1 , t1 , t2 , and hence in both induced and spanning variants, s and t must be connected
by a path formed by d + 1 vertices in V ′ \ {s2 , s1 , t1 , t2 }. Since the length of this st-path is d, this
path is shortest and hence V ′ must contain exactly one vertex from each of d + 1 layers of G.
Consider any vertex subset V ′′ ⊆ V (G′ ) which satisfies conditions (a) and (b) of Lemma 1; note
that V ′′ is not necessarily a feasible solution. Then, these conditions ensure that V ′′ \ {s2 , s1 , t1 , t2 }
forms a shortest st-path in G if and only if the subgraph represented by V ′′ induces a path in G′ .
Thus, an instance (G, Vs , Vt ) of shortest path reconfiguration is a yes-instance if and only if
the corresponding instance (G′ , Vs′ , Vt′ ) of the induced or spanning variant is a yes-instance. This
completes the proof of Theorem 7.
Similar arguments give the following theorem.
Theorem 8. Both the induced and spanning variants of subgraph reconfiguration under the
TJ rule are PSPACE-complete for the property “a graph is a cycle.”
Proof. Our reduction is the same as in the proof of Theorem 7 except for the following point (see
also Figure 5(b)): instead of adding four new vertices, we connect s and t by a path of length three
with two new vertices s1 and t1 . Then, the same arguments hold as the proof of Theorem 7.
4.2
Path and cycle under the TS rule
We now consider the TS rule. Notice that, in the proofs of Theorems 7 and 8, we exchange only
vertices contained in the same layer. Since any shortest st-path in a graph G contains exactly one
vertex from each layer, we can assume without loss of generality that each layer Li of G forms a
clique. Then, the same reductions work for the TS rule, and we obtain the following theorem.
Theorem 9. Both the induced and spanning variants of subgraph reconfiguration under the
TS rule are PSPACE-complete for the properties “a graph is a path” and “a graph is a cycle.”
4.3
Tree
Wasa et al. [12] showed that the induced variant under the TJ and TS rules is PSPACE-complete
for the property “a graph is a tree.” In this subsection, we show that the spanning variant for this
9
property is also PSPACE-complete under the TS rule, while it is linear-time solvable under the TJ
rule.
We first note that our proof of Theorem 9 yields the following theorem.
Theorem 10. The spanning variant of subgraph reconfiguration under the TS rule is
PSPACE-complete for the property “a graph is a tree.”
Proof. We claim that the same reduction as in Theorem 9 applies. Let V ′ ⊆ V (G′ ) be any
solution which is reachable by a reconfiguration sequence from Vs′ (or Vt′ ) under the TS rule, where
(G′ , Vs′ , Vt′ ) is the corresponding instance for the spanning variant, as in the reduction. Then, the
TS rule ensures that s2 , s1 , s, t, t1 , t2 ∈ V ′ holds, and V ′ contains exactly one vertex from each
layer of G. Therefore, any solution forms a path even for the property “a graph is a tree,” and
hence the theorem follows.
In contrast to Theorem 10, the spanning variant under the TJ rule is solvable in linear time.
We note that the reduction in Theorem 10 does not work under the TJ rule, because the tokens
on s2 and t2 can move (jump) and hence there is no guarantee that a solution forms a path for the
property “a graph is a tree.”
Theorem 11. The spanning variant of subgraph reconfiguration under the TJ rule can be
solved in linear time for the property “a graph is a tree.”
Suppose that (G, Vs , Vt ) is a given instance. We assume that |Vs | = |Vt | ≥ 2 holds; otherwise it
is a trivial instance. Then, Theorem 11 can be obtained from the following lemma.
Lemma 2. (G, Vs , Vt ) with |Vs | = |Vt | ≥ 2 is a yes-instance if and only if Vs and Vt are contained
in the same connected component of G.
Proof. We first prove the only-if direction. Since |Vs | = |Vt | ≥ 2 and the property requires subgraphs to be connected, the subgraph induced by any feasible solution contains at least one edge.
Because we can exchange only one vertex at a time and the resulting subgraph must retain connected, Vs and Vt are contained in the same connected component of G if (G, Vs , Vt ) is a yesinstance.
Next, we prove the if direction for the case where |Vs | = |Vt | = 2. In this case, G[Vs ] and
G[Vt ] consist of single edges, say es and et , respectively. Since Vs and Vt are contained in the same
connected component of G, there is a path in G between es and et . Thus, we can exchange vertices
along the path, and obtain a reconfiguration sequence from Vs to Vt . In this way, the if direction
holds for this case.
Finally, we prove the if direction for the remaining case, that is, |Vs | = |Vt | ≥ 3. Consider any
spanning trees Ts of G[Vs ] and Tt of G[Vt ]. Since |Vs | = |Vt | ≥ 3, each of Ts and Tt has at least two
edges. Then, if we regard (G, E(Ts ), E(Tt )) as an instance of the edge variant under the TJ rule
for the property “a graph is a tree,” we know from the proof of Theorem 6 that it is a yes-instance.
Thus, there exists a reconfiguration sequence E = hE(Ts ) = E0 , E1 , . . . , Eℓ = E(Tt )i of edge
subsets under the TJ rule. We below show that, based on E, we can construct a reconfiguration
sequence between Vs and Vt for the spanning variant under the TJ rule.
For each Ei in E, let Vi be the vertex set of the tree represented by Ei . Notice that Vi is a
feasible solution for the spanning variant, and that V0 = Vs and Vℓ = Vt hold. We claim that
the sequence hVs = V0 , V1 , . . . , Vℓ = Vt i of vertex subsets is a reconfiguration sequence for the
spanning variant under the TJ rule (after removing redundant vertex subsets if needed). To show
this, it suffices to prove |Vi \ Vi−1 | = |Vi−1 \ Vi | ≤ 1 for all i ∈ {1, 2, . . . , ℓ}. Suppose for the sake of
contradiction that there exists Vi such that |Vi \Vi−1 | ≥ 2 holds. (See also Figure 6.) Since |Ei | ≥ 2
and |Ei \ Ei−1 | = 1 hold, we have Ei ∩ Ei−1 6= ∅ and hence Vi ∩ Vi−1 6= ∅. Then there is at least
one edge e = uv in Ei \ Ei−1 joining a vertex u ∈ Vi \ Vi−1 and v ∈ Vi ∩ Vi−1 , because Ei must form
a connected subgraph. Since |Vi \ Vi−1 | ≥ 2, there is another vertex u′ 6= u in Vi \ Vi−1 , and there
is an edge e′ incident to u′ . Note that e 6= e′ . Furthermore, we know that e′ ∈ Ei \ Ei−1 because
u′ ∈ Vi \ Vi−1 . Therefore, we have e, e′ ∈ Ei \ Ei−1 , which contradicts the fact that |Ei \ Ei−1 | = 1
holds.
10
Vi-1
Vi
v
e
u
e’ u’
Figure 6: Illustration for the proof of Lemma 2.
L
R
G
...
Figure 7: Reduction for the property “a graph is an (i, j)-biclique” for any fixed i ≥ 1.
4.4
Biclique
For the property “a graph is an (i, j)-biclique,” we show that the induced variant under the TJ
rule is PSPACE-complete even if i = j holds, or i is fixed. On the other hand, the spanning variant
under the TJ rule is NP-hard even if i = j holds, while it is polynomial-time solvable when i is
fixed.
We first give the following theorem for a fixed i ≥ 1.
Theorem 12. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph
reconfiguration under the TJ rule is PSPACE-complete even for any fixed integer i ≥ 1.
Proof. We give a polynomial-time reduction from the maximum independent set reconfiguration problem [13], which can be seen as a subgraph reconfiguration problem. The maximum
independent set reconfiguration problem is the induced variant for the property “a graph
is edgeless” such that two given independent sets are maximum. Note that, because we are given
maximum independent sets, there is no difference between the TJ and TS rules for this problem.
This problem is known to be PSPACE-complete [13].
Suppose that (G, Vs , Vt ) is an instance of maximum independent set reconfiguration.
We now construct a corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TJ rule
for the property “a graph is an (i, j)-biclique,” where i is any fixed positive integer. (See also
Figure 7.) Let L and R be distinct sets of new vertices such that |L| = i and |R| = 1. The vertex
set of G′ is defined as V (G′ ) = V (G) ∪ L ∪ R, and the edge set of G′ as E(G′ ) = E(G) ∪ {uv | u ∈
V (G), v ∈ L} ∪ {vw | v ∈ L, w ∈ R}, that is, new edges are added so that there are edges between
each vertex of L and each vertex of V (G) ∪ R. Let Vs′ = Vs ∪ L ∪ R and Vt′ = Vt ∪ L ∪ R. Since L,
R, Vs and Vt are all independent sets in G′ , both Vs′ and Vt′ form (i, j)-bicliques, where i = |L| and
j = |Vs ∪ R| = |Vt ∪ R|. We have now completed the construction of our corresponding instance,
which can be accomplished in polynomial time.
Because each vertex in L is connected to all vertices in V (G), a vertex subset V ′′ ⊆ V (G′ )
cannot form a bipartite graph (and hence an (i, j)-biclique) if V ′′ ∩ L 6= ∅ or if V ′′ contains two
vertices joined by an edge in G. In addition, we cannot move any token placed on L ∪ R onto a
vertex in V (G) because both Vs and Vt are maximum independent sets of G. Note that, in the case
of i = 1, there may exist a vertex u in V (G) which is adjacent to all vertices in Vs or in Vt . However,
u is not adjacent to the vertex in R, and hence the token placed on the vertex in L cannot be moved
to u in this case, either. Therefore, for any feasible solution V ′ ⊆ V (G′ ) which is reconfigurable
from Vs′ or Vt′ under the TJ rule, the vertex subset V ′ ∩ V (G) forms a maximum independent
set of G. Thus, an instance (G, Vs , Vt ) of maximum independent set reconfiguration is a
11
G
G1
G2
...
...
...
...
B1
...
...
A1
A2
B2
B
A
Figure 8: Reduction for the property “a graph is a (k, k)-biclique.”
yes-instance if and only if our corresponding instance (G′ , Vs′ , Vt′ ) is a yes-instance.
The corresponding instance (G′ , Vs′ , Vt′ ) constructed in the proof of Theorem 12 satisfies i = j
if we set i = |Vs | + 1 = |Vt | + 1. Therefore, we can obtain the following corollary.
Corollary 1. For the property “a graph is an (i, j)-biclique,” the induced variant of subgraph
reconfiguration under the TJ rule is PSPACE-complete even if i = j holds.
We next give the following theorem.
Theorem 13. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph
reconfiguration under the TJ rule is NP-hard even if i = j holds.
Proof. We give a polynomial-time reduction from the balanced complete bipartite subgraph
problem, defined as follows [3]. Given a bipartite graph G and a positive integer k, the balanced
complete bipartite subgraph problem is to determine whether or not G contains a (k, k)biclique as a subgraph; this problem is known to be NP-hard [3].
Suppose that (G, k) is an instance of balanced complete bipartite subgraph, where G is
a bipartite graph with bipartition (A, B). Then, we construct a corresponding instance (G′ , Vs , Vt )
of the spanning variant under the TJ rule for the property “a graph is a (k, k)-biclique.” We first
construct a graph G′ . (See Figure 8.) We add to G two new (k, k)-bicliques G1 and G2 ; let (A1 , B1 )
be the bipartition of G1 , and (A2 , B2 ) be that of G2 . We then add edges between any two vertices
x ∈ B1 and y ∈ A, and between any two vertices x ∈ B and y ∈ A2 . Therefore, G′ [B1 ∪ A] and
G′ [B ∪ A2 ] are bicliques in G′ . This completes the construction of G′ . We then set Vs = V (G1 )
and Vt = V (G2 ). Then, Vs and Vt are solutions, since G[Vs ] and G[Vt ] contain (k, k)-bicliques G1
and G2 , respectively. In this way, the corresponding instance can be constructed in polynomial
time.
By the construction of G′ , any reconfiguration sequence between Vs = V (G1 ) and Vt = V (G2 )
must pass through a (k, k)-biclique of G. Therefore, the theorem follows.
We now give a polynomial-time algorithm solving the spanning variant for a fixed constant
i ≥ 1.
Theorem 14. For the property “a graph is an (i, j)-biclique,” the spanning variant of subgraph
reconfiguration under the TJ rule is solvable in polynomial time when i ≥ 1 is a fixed constant.
Proof. We give such an algorithm. We assume without loss of generality that j > i; otherwise both
i and j are fixed constants, and hence such a case can be solved in polynomial time by Theorem 1.
We will refer to the i vertices in the bounded-size part of the biclique as hubs, and the j vertices
in the other part as terminals. Let H ⊆ V (G) be an arbitrary vertex subset such that |H| = i.
We denote by C(H) the set of all common neighbors of H in G. Notice that, if |C(H)| ≥ j, then
the subgraph represented by H ∪ C(H) contains at least one (i, j)-biclique whose hub set is H.
We denote by S(H) the set of all solutions that contain (i, j)-bicliques with the hub set H. We
know that S(H) = ∅ if |C(H)| < j; otherwise H ∪ T is in S(H) for any subset T ⊆ C(H) such
that |T | = j. It should be noted that a solution in the spanning variant is simply a vertex subset
12
V ′ of V (G), and there is no restriction on how to choose a hub set from V ′ . (For example, if a
solution V ′ induces a clique of size five, then there are ten ways to choose a hub set from V ′ for
(2, 3)-bicliques.) Therefore, S(H) ∩ S(H ′ ) 6= ∅ may hold for distinct hub sets H, H ′ .
We describe two key observations in the following. The first one is that for a hub set H, any
two solutions Va , Vb ∈ S(H) are reconfigurable because we can always move vertices in Va \ Vb into
ones in Vb \ Va one by one. The second one is that for any two distinct hub sets Ha and Hb , if
there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and |Vb \ Va | ≤ 1 (this means that
Va and Vb are reconfigurable by one reconfiguration step, or Va = Vb ), then all pairs of solutions
in S(Ha ) ∪ S(Hb ) are reconfigurable.
Based on these observations, we construct an auxiliary graph A for a given instance (G, Vs , Vt ),
as follows. Each node in A corresponds to a set H of i vertices (hubs) in the input graph G such
that |C(H)| ≥ j; we represent the node in A simply by the corresponding hub set H. Two nodes
Ha and Hb are adjacent in A if there exist Va ∈ S(Ha ) and Vb ∈ S(Hb ) such that |Va \ Vb | ≤ 1 and
|Vb \ Va | ≤ 1. Let Hs and Ht be any two nodes such that Vs ∈ S(Hs ) and Vt ∈ S(Ht ), respectively.
Then, we claim that there is a reconfiguration sequence between Vs and Vt if and only if there is
a path in A between Hs and Ht .
We first suppose that there is a path P in A between Hs and Ht . We know that any two
consecutive nodes Ha and Hb in P are adjacent in A. Then, as we mentioned above, all pairs of
solutions in S(Ha ) ∪ S(Hb ) are reconfigurable. Since Vs ∈ S(Hs ) and Vt ∈ S(Ht ), we can thus
conclude that there is a reconfiguration sequence between Vs and Vt .
We now suppose that there exists a reconfiguration sequence R between Vs and Vt . For each
solution Va in R except for Vs and Vt , we choose an arbitrary node Ha in A which satisfies
Va ∈ S(Ha ). Consider any two consecutive solutions Va and Vb in R. Then, by the construction of
A, the chosen nodes Ha and Hb are adjacent in A (or sometimes Ha = Hb ) because |Va \ Vb | = 1
and |Vb \ Va | = 1. In this way, we can ensure the existence of a desired path in A.
The running time of the algorithm depends on the size i of a hub set. Let n be the number
of vertices in G. The size of the node set of A is in O(ni ). For any two nodes Ha and Hb in A,
we can determine in O(n) time whether there is an edge between them by checking that all of the
following four conditions hold or not:
(a) |(Ha ∪ C(Ha )) ∩ (Hb ∪ C(Hb ))| ≥ i + j − 1;
(b) |Ha \ (Hb ∪ C(Hb ))| ≤ 1;
(c) |Hb \ (Ha ∪ C(Ha ))| ≤ 1; and
(d) |Ha ∪ Hb | ≤ i + j + 1.
Note that, since we have assumed that i < j, condition (d) is always satisfied. Therefore, we take
O(n2i+1 ) time to construct A and to check whether the nodes corresponding to Vs and Vt are
connected.
4.5
Diameter-two graph
In this subsection, we consider the property “a graph has diameter at most two.” Note that the
induced and spanning variants are the same for this property.
Theorem 15. Both induced and spanning variants of subgraph reconfiguration under the
TS rule are PSPACE-complete for the property “a graph has diameter at most two.”
Proof. Since the induced variant and the spanning variant are the same for this property, it suffices
to show the PSPACE-hardness only for the induced variant. We give a polynomial-time reduction
from the clique reconfiguration problem, which is the induced variant (also the spanning
variant) of subgraph reconfiguration for the property “a graph is a clique.” This problem is
known to be PSPACE-complete under both the TJ and TS rules [7], and we give a reduction from
the problem under the TS rule.
Suppose that (G, Vs , Vt ) is an instance of clique reconfiguration under the TS rule such
that |Vs | = |Vt | ≥ 2; otherwise it is a trivial instance. Then, we construct a corresponding
instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule. Let V (G) = {v1 , v2 , . . . , vn }, where
n = |V (G)|. We form G′ by making two copies of G and adding edges between corresponding
13
l2
v2
v1
l1
l4
v4
l6
v6
r5
l5
v5
r4
r3
l3
v3
r2 = rs
r1
(a) G
r6
(b) G’
Figure 9: Reduction for the property “a graph has diameter at most two.” The vertices of Vs in
G and of Vs′ in G′ are depicted by gray vertices, where rs = r2 .
vertices of the two graphs. (See Figure 9.) More formally, the vertex set V (G′ ) is defined as
V (G′ ) = L ∪ R, where L = {li | vi ∈ V (G)} and R = {ri | vi ∈ V (G)}, and the edge set E(G′ ) is
defined as E(G′ ) = El ∪ Er ∪ Ec , where El = {li lj | vi vj ∈ E(G)}, Er = {ri rj | vi vj ∈ E(G)} and
Ec = {li ri | vi ∈ V (G)}. For each i ∈ {1, 2, . . . , n}, we call li and ri corresponding vertices, and
an edge joining corresponding vertices a connecting edge. We then construct Vs′ and Vt′ . We say
that a vertex v ′ in a vertex subset V ′ ⊆ V (G′ ) is exposed in V ′ if the corresponding vertex of v ′
does not belong to V ′ . We construct Vs′ and Vt′ so that they each have exactly one exposed vertex.
Let vs ∈ Vs be an arbitrary vertex in Vs and vt ∈ Vt be an arbitrary vertex in Vt . Then, we let
Vs′ = {li , ri | vi ∈ Vs } \ {rs } and Vt′ = {li , ri | vi ∈ Vt } \ {rt }. Note that ls and lt are the unique
exposed vertices in Vs′ and Vt′ , respectively. Since Vs and Vt form cliques in G, G′ [Vs′ ] and G′ [Vt′ ]
have diameter at most two. We have thus constructed our corresponding instance in polynomial
time.
Let V ′ be any subset of V (G′ ), and let VL′ = V ′ ∩ L and VR′ = V ′ ∩ R. The key observation
is that G[V ′ ] has diameter more than two if both VL′ and VR′ contain exposed vertices in V ′ .
We below prove that (G, Vs , Vt ) of clique reconfiguration is a yes-instance if and only if the
corresponding instance (G′ , Vs′ , Vt′ ) of the induced variant under the TS rule is a yes-instance.
We first prove the only-if direction, supposing that there exists a reconfiguration sequence
hVs = V0 , V1 , . . . , Vℓ = Vt i of cliques in G. Then, we show that Vs′ is reconfigurable into Vt′ by
induction on ℓ. If ℓ = 0 and hence Vs = Vt , then we can obtain Vt′ from Vs′ by exchanging rt in
Vs′ with rs (or Vs′ = Vt′ already holds). We then consider the case where ℓ ≥ 1. Let {vi } = V0 \ V1
and {vj } = V1 \ V0 ; note that vi and vj are adjacent in G since we consider the TS rule. Then, we
consider two vertex subsets V0′′ = (Vs′ ∪ {rs }) \ {ri } and V1′ = (V0′′ ∪ {lj }) \ {li }; note that rs and ri
are adjacent in G′ since rs , ri ∈ V0 = Vs , and that li and lj are adjacent in G′ since vi and vj are
adjacent in G. Notice that V ′′ and V1′ have distinct exposed vertices li and lj , respectively. By the
construction of G′ , since V0 and V1 are cliques in G, both G′ [V0′′ ] and G′ [V1′ ] have diameter at most
two. Then, the sequence hVs′ , V0′′ , V1′ i is a reconfiguration sequence between Vs′ and V1′ . Therefore,
by applying the induction hypothesis to (G′ , V1′ , Vt′ ) and (G, V1 , Vt ), we obtain a reconfiguration
sequence between V1′ and Vt′ . Thus, we can conclude that (G′ , Vs′ , Vt′ ) is a yes-instance.
To prove the if direction, we now suppose that there exists a reconfiguration sequence V ′ =
′
hVs = V0′ , V1′ , . . . , Vℓ′ = Vt′ i. Consider the case where Vi′ ∈ V ′ has the exposed vertex in the side L,
′
say li ∈ Vi′ , and hence ri 6∈ Vi′ ; the other case is symmetric. Because G′ [Vi+1
] must have diameter
′
at most two (and hence it must have only one exposed vertex), we know that Vi+1
is obtained from
Vi′ by one of the following three moves (1) a token on a vertex rk ∈ Vi′ is moved to ri ; (2) the token
on li is moved to its corresponding vertex ri ; or (3) the token on li is moved to a vertex lj ∈ L
which is not in Vi′ and is adjacent to all vertices Vi′ ∩ L. Notice that the other moves increase the
number of exposed vertices or make the resulting graph have diameter more than two. Then, each
Vi′ ∈ V ′ induces a clique of size |Vs | = |Vt | in either L or R, and we can obtain a desired sequence
of cliques between Vs and Vt .
We note that the TS rule is critical in the reduction of Theorem 15. Under the TJ rule, there
is no guarantee that we maintain a clique (and we cannot even guarantee that the resulting clique
gets bigger).
14
5
Conclusions and future work
The work in this paper initiates a systematic study of subgraph reconfiguration. Although
we have identified graph structure properties which are harder for the induced variant than the
spanning variant, it remains to be seen whether this pattern holds in general. For the general case,
questions of the roles of diameter and the number of subgraphs satisfying the property are worthy
of further investigation. Another obvious direction for further research is an investigation into the
fixed-parameter complexity of subgraph reconfiguration.
A natural extension of subgraph reconfiguration is the extension from isomorphism of
graph structure properties to other mappings, such as topological minors.
References
[1] P. Bonsma. The complexity of rerouting shortest paths. Theoretical Computer Science, 510:1–
12, 2013.
[2] P. Bonsma and L. Cereceda. Finding paths between graph colourings: PSPACE-completeness
and superpolynomial distances. Theoretical Computer Science, 410(50):5215–5226, 2009.
[3] M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of
NP-Completeness. Freeman, 1979.
[4] R. A. Hearn and E. D. Demaine. PSPACE-completeness of sliding-block puzzles and other
problems through the nondeterministic constraint logic model of computation. Theoretical
Computer Science, 343(1–2):72–96, 2005.
[5] J. van den Heuvel. The complexity of change. Surveys in Combinatorics 2013, 409:127–160,
2013.
[6] T. Ito, E. D. Demaine, N. J. A. Harvey, C. H. Papadimitriou, M. Sideri, R. Uehara, and
Y. Uno. On the complexity of reconfiguration problems. Theoretical Computer Science,
412(12–14):1054–1065, 2011.
[7] T. Ito, H. Ono, and Y. Otachi. Reconfiguration of cliques in a graph. In Proceedings of
the 12th Annual Conference on Theory and Applications of Models of Computation, pages
212–223, 2015.
[8] M. Kamiński, P. Medvedev, and M. Milanič. Complexity of independent set reconfigurability
problems. Theoretical Computer Science, 439:9–15, 2012.
[9] A. E. Mouawad, N. Nishimura, V. Raman, N. Simjour, and A. Suzuki. On the parameterized
complexity of reconfiguration problems. Algorithmica, 78(1):274–297, 2017.
[10] M. Mühlenthaler. Degree-constrained subgraph reconfiguration is in P. In Proceedings of
the 40th International Symposium on Mathematical Foundations of Computer Science, pages
505–516, 2015.
[11] N. Nishimura. Introduction to reconfiguration. Preprints 2017090055, 2017.
[12] K. Wasa, K. Yamanaka, and H. Arimura. The complexity of induced tree reconfiguration
problems. In Proceedings of the 10th International Conference of Language and Automata
Theory and Applications, pages 330–342, 2016.
[13] M. Wrochna. Reconfiguration in bounded bandwidth and tree-depth. Journal of Computer
and System Sciences, 93:1–10, 2018.
15
| 8 |
arXiv:1504.06729v4 [cs.DS] 12 Jul 2016
Optimal Principal Component Analysis in Distributed and
Streaming Models
Christos Boutsidis
New York, New York
[email protected]
David P. Woodruff
IBM Research
Almaden, California
[email protected]
Peilin Zhong
Institute for Interdisciplinary Information Sciences
Tsinghua University, Beijing, China
[email protected]
Abstract
We study the Principal Component Analysis (PCA) problem in the distributed and streaming
models of computation. Given a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an
accuracy parameter 0 < ε < 1, we want to output an m × k orthonormal matrix U for which
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F ,
where Ak ∈ Rm×n is the best rank-k approximation to A. We show the following.
1. In the arbitrary partition
Psmodel of Kannan et al. (COLT 2014), each of s machines holds
a matrix Ai and A = i=1 Ai . Each machine should output U. Kannan et al. achieve
O(skm/ε) + poly(sk/ε) words (of O(log(nm)) bits) communication. We obtain the improved bound of O(skm) + poly(sk/ε) words, and show an optimal Ω(skm) lower bound
up to low order terms. This resolves an open question for high precision PCA. A poly(ε−1 )
dependence is known to be required, but we separate this dependence from m.
2. We bypass the above lower bound when A is φ-sparse in each column and each server
receives a subset of columns. Here we obtain an O(skφ/ε) + poly(sk/ε) word protocol.
Our communication is independent of the matrix dimensions, and achieves the guarantee
that each server, in addition to outputting U, outputs a subset of O(k/ε) columns of A
containing a U in its span (that is, we solve distributed column subset selection). We show
a matching Ω(skφ/ε) lower bound for distributed column subset selection. Achieving our
communication bound when A is sparse but not sparse in each column, is impossible.
3. In the streaming model in which the columns arrive one at a time, an algorithm of Liberty
(KDD, 2013) with an improved analysis by Ghashami and Phillips (SODA, 2014) shows
O(km/ε) “real numbers” of space is achievable in a single pass, which we first improve to
an O(km/ε)+poly(k/ε) word space upper bound. This almost matches a known Ω(km/ε)
bit lower bound of Woodruff (NIPS, 2014). We show with two passes one can achieve
O(km) + poly(k/ε) words of space and (up to the poly(k/ε) term and the distinction
between words versus bits) this is optimal for any constant number of passes.
4. In turnstile streams, in which we receive entries of A one at a time in an arbitrary order, we show how to obtain a factorization of a (1 + ε)-approximate rank-k matrix using
O((m+n)kε−1 ) words of space. This improves the O((m+nε−2 )kε−2 ) bound of Clarkson
and Woodruff (STOC 2009), and matches their Ω((m + n)kε−1 ) word lower bound.
Notably, our results do not depend on the condition number of A.
1 Introduction
In distributed-memory computing systems, such as, Hadoop [1] or Spark [3], Principal Component Analysis (PCA) and the related Singular Value Decomposition (SVD) of large matrices is
becoming very challenging. Machine learning libraries implemented on top of such systems, for
example mahout [2] or mllib [4], provide distributed PCA implementations since PCA is often
used as a building block for a learning algorithm. PCA is useful for dimension reduction, noise
removal, visualization, etc. In all of these implementations, the bottleneck is the communication;
hence, the focus has been on minimizing the communication cost of the related algorithms, and
not the computational cost, which is the bottleneck in more traditional batch systems.
The data matrix corresponding to the dataset in hand, e.g., a term-document matrix representing a text collection, or the Netflix matrix representing user’s ratings for different movies, could
be distributed in many different ways [46]. In this paper, we focus on the following so-called arbitrary partition and column partition models. In the arbitrary partition
model, a matrix A ∈ Rm×n
Ps
is arbitrarily distributed among s machines. Specifically, A = i=1 Ai where Ai ∈ Rm×n is held
by machine i. Unless otherwise stated, we always assume m ≤ n. In the column partition model,
A
A
.
.
.
A
a matrix A ∈ Rm×n is distributed column-wise among s < n machines:
A
=
;
1
2
s
P
here, for i = 1 : s, Ai is an m × wi column submatrix of A with i wi = n. Note that the column partition model is a special case of the arbitrary partition model. Thus, it is desirable to
prove upper bounds in the arbitrary partition model, and lower bounds in the column partition
model. Both models have been adapted by traditional numerical linear algebra software libraries
for distributed memory matrix computations [12].
A recent body of work [29, 10, 41, 31, 37, 13] (see Section 3 for a comparison) has focused
on designing algorithms which minimize the communication needed for each machine to output an m × k matrix U for which an m × k orthonormal matrix U for which kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F , where Ak ∈ Rm×n is the best rank-k approximation to A. Each machine
should output the same matrix U which can then be used for downstream applications, such as
clustering, where one first projects the data to a lower dimensional subspace (see, e.g., [10]). The
protocol should succeed with large constant probability. The model is such that each of the s machines communicates with one machine, called the “coordinator” (which we sometimes refer to as
Server), but does not communicate with other machines. This is known as the coordinator model
and one can simulate arbitrary point-to-point communication with a constant factor overhead in
communication together with an additive O(log(mn)) bit overhead per message (see, e.g., [45]).
1.1 Our Results
The best upper bound in the arbitrary partition model is O((skmε−1 ) + s · poly(kε−1 )) words (of
O(log(mn)) bits) communication [37], while the only known lower bound for these problems is in
the arbitrary partition model and is Ω(skm) [37]. In high precision applications one may want to
set ε to be as small as possible and the leading order term of O(skmε−1 ) is undesirable. A natural
question is whether there is an O((skm) + s · poly(kε−1 )) word protocol. We note that there is a
fairly simple known Ω(ε−2 ) bit lower bound [54] (we present this in Lemma 75 for completeness),
so although one cannot achieve an O(log(1/ε)) dependence in the communication as one would
maybe expect given iterative algorithms for regression with running time O(log(1/ε)) (see section
2.6 of [55] for an overview), an O((skm) + s · poly(kε−1 )) would at least separate the dependence
of ε and m and allowing for much smaller ε with the same amount of communication.
There are many existing protocols using O(skmε−1 ) words of communication [29, 10, 41, 31,
37, 13], and the protocols work in very different ways: that of [29, 10] is based on coresets, while
1
that of [41, 31] is based on adapting a streaming algorithm to the communication setting, while
that of [37] is based on sketching, and that of [13] is based on alternating minimization and is
useful only under some assumptions on the condition number (see Section 3 for a more detailed
discussion of these protocols). It was thus natural to assume there should be a lower bound of
Ω(skmε−1 ).
Instead, we obtain a new upper bound in the arbitrary partition model and a matching lower
bound (up to lower order terms) in the column partition model.
Theorem 1 (Restatement of Theorem 43 and Theorem 82). Suppose matrix A ∈ Rm×n is partitioned
in the arbitrary-partition model (See Definition 14). For any 1 ≥ ε > 0, there is an algorithm which on
termination leaves the same orthonormal matrix U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the algorithm runs in
polynomial time with total communication complexity O(skm + s · poly(kε−1 )) words each containing
O(log(smnε−1 )) bits.
If matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15), then for any
positive constant C ≤ O(poly(skm)), the algorithm which can leave a orthonormal matrix U ∈ Rm×k on
each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability has at least
Ω(skm log(skm)) bits of communication.
In some applications even an O(skm) word protocol may be too costly, as m could be very
large. One could hope to do for communication what recent work on input sparsity algorithms
[22, 43, 44, 16, 25] has done for computation, i.e., obtain protocols sensitive to the number of
non-zero entries of A. Many matrices are sparse, e.g., Netflix provides a training data set of
100, 480, 507 ratings that 480, 189 users give to 17, 770 movies. If users correspond to columns
in the matrix, then the average column sparsity is ≈ 200 non-zero elements (out of the 17, 770
possible coordinates).
Our second contribution is the first protocol depending on the number of non-zero entries of
A in the column partition model. Our communication is independent of the matrix dimensions.
Denote by φ the maximum number of non-zero elements of a column in A. When we say that A
is φ-sparse, we mean that every column of A has at most φ non-zero elements and nnz(A) ≤ φ · n.
Our protocol has the additional feature of leaving on each machine the same subset C of O(k/ε)
columns of A for which there exists an m × k orthonormal matrix U in the column span of C for
which kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F . This is known as the column subset
selection problem, which is useful since C may be sparse if A is, and also it can lead to better data
intepretability. To partially complement our protocol, we show our protocol is optimal for any
protocol solving the column subset selection problem. We summarize these results as follows.
Theorem 2 (Restatement of Theorem 63). Suppose a φ-sparse matrix A ∈ Rm×n is partitioned in
the column-partition model (See Definition 15). For any 1 ≥ ε > 0, there is an algorithm which on
termination leaves C ∈ Rm×c with c = O(k/ε) columns of A and an orthonormal matrix U on each
machine such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large
constant probability. Further,
the algorithm runs in polynomial time with total communication complexity
O skφε−1 + sk2 ε−4 words each containing of O(log(smnε−1 )) bits.
If a φ-sparse matrix A ∈ Rm×n is distributed in the column-partition model (See Definition 15),
then for any positive constant C ≤ O(poly(skφ)), the algorithm which can leave a orthonormal matrix
U ∈ Rm×k on each machine such that kA − UUT Ak2F ≤ C · kA − Ak k2F holds with constant probability
has at least Ω(skφ log(skφ)) bits of communication.
Remark 3. Our protocol has no dependence on condition number and works for arbitrary matrices. We
2
Upper bounds
Lower bounds
Definition 16 (arbitrary partition model)
O(skm + s · poly(k/ε))
(Theorem 43)
Ω(skm) (Theorem 1.2 in [37])
Definition 17 (column partition model)
O(skm + s · poly(k/ε))
(Theorem 43)
Ω(skm) (Theorem 82)
Definition 17 with sparsity φ = o(ε · m)
O(skφε−1 + s · poly(k/ε)) (Theorem 63)
Ω(skφ) (Corollary 83 )
Table 1: Communication upper/lower bounds for the Distributed PCA problems.
make a serious effort as shown in Section 6 to achieve this. Note that even if the entries of A are specified
using O(log(mn)) bits, the condition number can be 2−Ω(mn log(mn)) [7].
Remark 4. We did not discuss the running time of the algorithms, but we are interested in the fastest
possible algorithms with the minimal communication cost, and provide fast algorithms as well.
Remark 5. The hard instance in Section 10.2.2 implies an Ω(skm) lower bound even if the input matrix
is sparse overall but has skm non-zero positions in arbitrarily locations. Therefore, to obtain our bounds we
discuss the sparsity on each column instead of the overall sparsity of the matrix.
A model closely related to the distributed model of computation is the streaming model of
computation. The model we focused on is the so-called turnstile streaming model. In this model,
there is a stream of update operations and each operation indicates that the corresponding entry of
A should be incremented by a specific number. We present novel PCA algorithms in this model.
Our first one-pass algorithm improves upon the best existing streaming PCA algorithm [41, 31]
in two respects. First, the space of [41, 31] is described in “real numbers” while our space bound
(O(mk/ε + poly(k/ε)) - see Theorem 52) is in terms of words (we also bound the word size). This
matches an Ω(km/ε) bit lower bound for one-pass algorithms in [53], up to the distinction between
words versus bits and a low order term poly(k/ε). Second, our algorithm can be applied in the
turnstile streaming model which is stronger than column update streaming model in [41, 31].
Theorem 6 (Restatement of Theorem 52). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which
uses a single pass over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such
that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant
probability. Further,
the algorithm runs in polynomial time with space of total O mk/ε + poly(kε−1 ) words each containing
O(log(smnε−1 )) bits.
A slight modification of the previous algorithm leads to a one-pass algorithm which can compute a factorization of a (1 + ε)-approximate rank-k matrix. The modified algorithm only needs
O((n + m)k/ε + poly(k/ε)) words of space which improves the O((m + nε−2 )kε−2 ) upper bound
in [21] and matches the Ω((n + m)k/ε) bit lower bound given by [21], up to the low order term
poly(k/ε).
Theorem 7 (Restatement of Theorem 53). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses
a single pass over the stream and on termination outputs a matrix A∗k ∈ Rm×n with rank(A∗k ) ≤ k such
that kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant probability. Further, the
algorithm runs in polynomial time with space of total O((m + n)k/ε + poly(kε−1 )) words each containing
O(log(smnε−1 )) bits.
3
Upper bounds
One-pass turnstile, Def. 21
One-pass turnstile, factorization, Def. 22
Two-pass turnstile, Def. 21
O(mkε−1 + poly(k, ε−1 ))
Lower bounds
(Theorem 52)
O((n + m)kε−1 + poly(k, ε−1 )) (Theorem 53)
O(mk + poly(k, ε−1 ))
(Theorem 55)
Ω(mkε−1 ) bits
[53]
Ω((n + m)kε−1 ) words [21]
Ω(mk) bits
[53]
Table 2: Space upper/lower bounds for the Streaming PCA problem.
We also show a two-pass algorithm which is an implementation of our distributed PCA protocol. It uses O((km)+poly(k/ε)) words of space, which up to the poly(k/ε) term and the distinction
between words versus bits, is optimal for any constant number of passes. A “next natural goal”
in [53] was to improve the lower bound of Ω(km) to a bound closer to the 1-pass Ω(km/ε) lower
bound established in that paper; our upper bound shows this is not possible.
Theorem 8 (Restatement of Theorem 55). Suppose A ∈ Rm×n is given by a stream of update operations
in the turnstile streaming model (See Definition 20). For any 1 ≥ ε > 0, there is an algorithm which uses
two passes over the stream and on termination outputs an orthonormal matrix U ∈ Rm×k such that kA −
UUT Ak2F ≤ (1 + ε) · kA − Ak k2F holds with arbitrarily large constant
probability. Further, the algorithm
runs in polynomial time with total space O mk + poly(kε−1 ) words each containing O(log(smnε−1 ))
bits.
1.2 Technical Overview
1.2.1
Upper Bounds
The Arbitrary Partition Model. Recall that the inputP
matrix A ∈ Rm×n is arbitrarily partitioned
m×n
into s matrices Ai ∈ R
, i.e., for i = 1, 2, . . . , s: A = si=1 Ai . By sketching on the left and right
2
2
by two small random sign matrices S ∈ RO(k/ε )×m and T ∈ Rn×O(k/ε ) , with O(sk 2 /ε4 ) words of
communication, the server can learn à = SAT which is a “sketch” of A. It suffices to compute
T
the best rank-k approximation Ãk to Ã. Suppose the SVD of Ãk = UÃk ΣÃk VÃ
. Then the server
k
can learn ATVÃk by the second round of communication which needs O(skm) words. We then
prove (see Lemma 28): kA − UUT Ak2F ≤ (1 + ε)kA − Ak k2F where U is an orthonormal basis of the
column space of ATVÃk . Notice that rank(U) ≤ k. Thus U is exactly what we want. Section 5.3
shows the details.
A technical obstacle in the analysis above is that it may require a large number of machine
words to specify the entries of VÃk , even if each entry in A is only a single word. In fact, one can
show (we omit the details) that the singular values of Ãk can be exponentially large in k/ε, which
means one would need to round the entries of VÃk to an additive exponentially small precision,
which would translate to an undesirable sm · poly(k/ε) bits of communication.
To counter this, we use the smoothed analysis of Tao and Vu [52] to argue that if we add small
random Bernoulli noise to A, then its minimum singular value becomes inverse polynomial in
n. Moreover, if the rank of A is at least 2k and under the assumption that the entries of A are
representable with a single machine word (so we can identify them with integers in magnitude
at most poly(nms/ε) by scaling), then we can show the additional noise preserves relative error
approximation. To our knowledge, this is the first application of this smoothing technique to
distributed linear algebra algorithms. Section 6 discusses the details of this approach.
4
On the other hand, if the rank of A is smaller than 2k, the smoothing technique need not preserve relative error. In this case though, we can learn a basis C ∈ Rm×O(k) for the column span
of A by multiplying by a pseudorandom matrix based on Vandermonde matrices. Since C has at
most 2k columns, we can efficiently communicate it to all servers using O(skm) communication.
At this point we set up the optimization problem minrank(X)≤k kCXCT A−AkF . The server cannot
learn CT A and A directly, as this would be Ω(nm) words, but we can choose additional “sketching matrices” Tlef t and Tright to instead solve minrank(X)≤k kTlef t (CXCT A − A)Tright kF , which
is a generalization of the subspace embedding technique to “affine embeddings” [53]. the server
learns Tlef t CXCT ATright and Tlef t ATright , which are small matrices, and can be sent to each machine. Each machine locally solves for the rank-k solution X∗ minimizing kTlef t CXCT ATright −
Tlef t ATright kF . Now each machine can find the same m × k orthonormal basis and output it
without further communication.
Sparse Matrices in the Column Partition Model. Our algorithm for sparse matrices is technically simpler than that in the arbitrary partition model. Section 8.2 presents a distributed PCA
algorithm that has O((φksε−1 ) + poly(sk/ε)) words of communication cost. Our idea in order to
take advantage of the sparsity in the input matrix A is to select and transfer to the coordinator
a small set of “good” columns from each sub-matrix Ai . Specifically, we design an algorithm
that first computes, in a distributed way, a matrix C̃ ∈ Rm×c with c = O(kε−1 ) columns of A, and
then finds U ∈ span(C̃) using a distributed, communication-efficient algorithm developed in [37].
The matrix C̃ is constructed using optimal algorithms for column sampling [17, 26, 24], extended
properly to the distributed case.
As mentioned, our algorithm actually solves the distributed column subset selection problem.
It builds on results for column subset selection in the batch setting [17, 26, 24], but gives a novel
analysis showing that in the distributed setting one can find columns as good as in the batch
setting. To the best of our knowledge, only heuristics for distributed column subset selection were
known [28]. We also optimize the time complexity of our algorithm, see Table 4.
Turnstile streaming model. Our one-pass streaming PCA algorithm starts by generating two
random sign matrices S ∈ RO(k/ε)×n and R ∈ Rm×O(k/ε) . As shown in Lemma 51,
min
kARXSA − Ak2F ≤ (1 + ε) · kA − Ak k2F
rank(X)≤k
T
The intuition of the above is as the following. Suppose the SVD of Ak is UAk ΣAk VA
where
k
Ak is the best rank-k approximation matrix to A. Since X can be chosen as ΣAk VAk , we have
minrank(X)≤k kUAk X − Ak2F = kAk − Ak2F . As shown in [21], S can provide a sketch for the
regression problem. Thus, kUAk X̃ − Ak2F ≤ (1 + ε) · minrank(X)≤k kUAk X − Ak2F where
X̃ = arg
min
rank(X)≤k
kSUAk X − SAk2F
Notice that X̃ is in the row space of span(SA). Then we focus on the regression problem:
min
kXSA − Ak2F .
rank(X)≤k
Similarly, we can use R to sketch the problem. Thus finally we only need to optimize
min
kARXSA − Ak2F .
rank(X)≤k
5
Upper bounds
Definition 18
Definition 19
O(skφε−1 )
Lower bounds
(Theorem 74)
Ω(skφε−1 ) (Theorem 90)
O skφε−1 + s · poly(k/ε) (Theorem 74)
Ω(skφε−1 ) (Corollary 91)
Table 3: Communication upper/lower bounds for the CSSP problems of Definitions 18 and 19.
However, it is too expensive to store the entire matrix A. Thus, we sketch on the left and right
by Tlef t and Tright . Since all of Tlef t AR, SATright and Tlef t ATright can be maintained in small
space, X∗ = arg minrank(X)≤k kTlef t (ARXSA−A)Tright k2F can be constructed after one pass over
the stream. Additionally, if AR is also maintained in the algorithm, we can get U ∈ Rm×k of which
columns are an orthonormal basis of span(ARX∗ ) satisfying kA − UUT Ak2F ≤ (1+ ε)·kA − Ak k2F .
T
,
Furthermore, if SA is also maintained, since it suffices to compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T
T = Tlef t ARUX∗ and K = VX
SAT
can
be
constructed
in
O((n
+
m)k)
words
of
space.
right
∗
Therefore, the algorithm can compute A∗k = TΣX∗ K = ARX∗ SA in O((n + m)k) words of
space. The algorithm then can output A∗k with total space O((n + m)k/ε + poly(k/ε)) words (see
Theorem 53).
Our two-pass streaming PCA algorithm is just an implemententation of our distributed PCA
algorithm in the streaming model.
1.2.2
Lower Bounds
Table 3 summarizes the matching communication lower bounds that we obtain for distributed
column-based matrix reconstruction. Theorem 90 proves a lower bound for the problem in Definition 18; then, a lower bound for the problem of Definition 19 follows immediately since this is a
harder problem (see Corollalry 91).
Distributed Column Subset Selection. Our most involved lower bound argument is in showing
the tightness for the distributed column subset selection problem, and is given in Theorem 90. To
illustrate the ideas, suppose k = 1. We start with the canonical hard matrix for column subset
selection, namely, an m × m matrix A whose first row is all ones, and remaining rows are a subset
of the identity matrix. Intuitively the best rank-1 approximation is very aligned with the first row
of A. However, given only o(1/ε) columns of the matrix, there is not a vector in the span which
puts a (1 − ε)-fraction of its mass on the first coordinate, so Ω(1/ε) columns are needed. Such a
matrix has φ = 2.
Obtaining a lower bound for general φ involves creating a large net of such instances. Suppose
we set m = φ and consider L̃A, where L̃ is formed by choosing a random φ × φ orthonormal
matrix, and then rounding each entry to the nearest integer multiple of 1/poly(n). We can show
that o(1/ε) columns of L̃A do not span a rank-1 approximation to L̃A. We also need a lemma
which shows that if we take two independently random orthonormal matrices, and round their
entries to integer multiples of 1/poly(n), then these matrices are extremely unlikely to share a
constant fraction of columns. The idea then is that if one server holds L̃A, and every other server
holds the zero matrix, then every server needs to output the same subset of columns of L̃A. By
construction of A, each column of L̃A is the sum of the first column of L̃ and an arbitrary column
of L̃, and since we can assume all servers know the first column of L̃ (which involves a negligible
6
O(sφ) amount of communication), this implies that each server must learn Ω(1/ε) columns of L̃.
The probability that random discretized orthonormal matrices share Ω(1/ε) columns is sufficiently
small that we can choose a large enough net for these columns to identify L̃ in that net, requiring
Ω(φ/ε) bits of communication per server, or Ω(sφ/ε) words in total. The argument for general k
can be viewed as a “direct sum theorem”, giving Ω(skφ/ε) words of communication in total.
Dense Matrices in the Column Partition Model. Our optimal lower bound for dense matrices
is technically simpler. It gives an Ω(skm) word communication lower bound in column partition
model for dense matrices. Theorem 82 argues that there exists an m × n matrix A such that for this
A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm), if there exists a protocol to
construct an m × k matrix U satisfying kA − UUT Ak2F ≤ C · kA − Ak k2F , with constant probability,
then this protocol has communication cost at least Ω(skm) words. This lower bound is proven for
a matrix A that has k fully dense columns. We should note that the lower bound holds even if
each machine only outputs the projection of Ai onto U, i.e., UUT Ai , rather than U itself. Note
that this problem is potentially easier, since given U, a machine could find UUT Ai .
The intuition of the proof is that machine 1 has a random matrix A1 ∈ Rm×k with orthonormal
columns (rounded to integer multiples of 1/poly(n)), while all other machines have a very small
multiple of the identity matrix. When concatenating the columns of these matrices, the best kdimensional subspace to project the columns onto must be very close to A1 in spectral norm.
Since machine i, i > 1, has tiny identity matrices, after projection it obtains a projection matrix
very close to the projection onto the column span of A1 . By choosing a net of m × k orthonormal
matrices, all of which pairwise have high distance in spectral norm, each machine can reconstruct
a random element in this net, which requires lots of information, and hence communication.
Our lower bound of Theorem 82 implies a lower bound of Ω(skφ) words for matrices in which
the column sparsity is φ (see Corollary 83) as a simple corollary.
1.3 Road Map
In the first ten pages, we have one additional section, Section 2, which gives an overview of our
algorithm in the arbitrary partition model.
In the Appendix, we then present more detail on prior results on distributed PCA algorithms
in Section 3. Section 4 introduces the notation and basic results from linear algebra that we use
in our algorithms. Section 5 presents our distributed PCA algorithm for arbitrary matrices for
Definition 16. The communication of the algorithm in this section can be stated only in terms of
“real numbers”. We resolve this issue in Section 6 where a modified algorithm has communication
cost bounded in terms of machine words. Section 7 discusses space-optimal PCA methods in
the streaming model of computation. Section 8 presents a distributed PCA algorithm for sparse
matrices in column partition model, while Section 9 extends this algorithm to a faster distributed
PCA algorithm for sparse matrices. Section 10 presents communication lower bounds.
2 Outline of our result in the arbitrary partition model
Here we give a brief outline of our result in the arbitrary patition model, deferring the full details
to the appendix.
We describe a fast distributed PCA algorithm with total communication O(msk) words plus
low order terms, which is optimal in the arbitrary partition model in the sense that an Ω̃(msk) bit
7
lower bound was given by [37]. The algorithm employs, in a novel way, the notion of projectioncost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimension-reductionbased SVD methods reduce one dimension of the input matrix to compute some approximation to
the SVD, our method reduces both dimensions and computes an approximation to the SVD from a
small almost square matrix (we note that other work, such as work on estimating eigenvalues [8],
uses sketches in both dimensions, but it is not clear how to compute singular vectors using such
sketches). Unlike [37] which reduces only one dimension in the first communication round, we
do the reduction on both dimensions in the same round.
We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal
distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers
a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all
these new algorithms in detail, we present the relevant results from the previous literature that
we employ in the analysis.
2.1 Projection-cost preserving sketching matrices
In this section, we recap a notion of sketching matrices which we call “projection-cost preserving
sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it
has the property that for all projections it preserves, up to some error, the difference between the
matrix in hand and its projection in Frobenius norm.
Definition 9 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices
P ∈ Rm×m , it satisfies
(1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F
where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A.
Due to the following lemma, we know that a good rank-k approximation projection matrix of
(ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A.
Lemma 10 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is
∗
an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW −
∗
PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F ,
kA − P̂Ak2F ≤
1+ε
· (1 + ε′ )kA − Ak k2F
1−ε
[24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension
as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix.
Lemma 11 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √
For ε < √
1, suppose
n×ξ
each entry of W ∈ R
is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where
ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost
preserving sketching matrix of A.
8
2.2 A batch algorithm for the fast low rank approximation of matrices
In this section, we describe a new method for quickly computing a low-rank approximation to
a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed
setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we
are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the
algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order
to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε)
matrix (see Step 2 in the algorithm below).
Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such
that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Construct à = SAT.
T
3. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Construct X = ATVÃk
5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
Theorem 29 later in this section analyzes the approximation error and the running time of the
previous algorithm. First, we prove the accuracy of the algorithm.
Lemma 12. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Proof.
T
T
T
kà − Ãk k2F = kà − ÃVÃk VÃ
k2F = kSAT − SATVÃk VÃ
k2F = kTT AT ST − VÃk VÃ
TT AT ST k2F
k
k
k
T
. The second equality is by the
The first equality follows by the SVD of Ãk = UÃk ΣÃk VÃ
k
construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F .
Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving
sketch matrix of TT AT . According to Lemma 26,
T
T
TT AT k2F ≤
k2F = kTT AT − VÃk VÃ
kAT − ATVÃk VÃ
k
k
1+ε
· kAT − (AT)k k2F
1−ε
Observe that
T
T
kUUT AT − ATk2F = kXX† AT − ATk2F ≤ kXVÃ
− ATk2F = kATVÃk VÃ
− ATk2F
k
which is at most
1+ε
1−ε
· kAT − (AT)k k2F .
9
k
(1)
The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is
followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction
that X = ATVÃk . The second inequality follows by Eqn (2).
Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch
matrix of A. Due to Lemma 26,
kUUT A − Ak2F ≤
(1 + ε)2
· kA − Ak k2F
(1 − ε)2
Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix
of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that
(1+ε)2
is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the
(1−ε)2
statement.
Next, we present the main theorem.
Theorem 13. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The running time of the algorithm is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The correctness is shown by Lemma 28. The running time is analyzed in Section 5.
2.3 The distributed PCA algorithm
Ps
Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A =
i Ai for i = 1 : s,
Ai ∈ Rm×n . The idea in the algorithm below is to implement the algorithm in Section 5.2 in the
distributed setting.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 =
O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
P
2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi .
T
3. Server computes the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Server sends VÃk to all machines.
5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X =
6. Server computes an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
P
i
Xi .
7. Server sends U to each machine.
Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27.
The major remaining challenge here is to obtain small bit complexity, since this protocol could
have very large bit complexity. See Section 5 in the Appendix for the full details of our algorithm.
10
References
[1] http://hadoop.apache.org/.
[2] https://mahout.apache.org.
[3] https://spark.apache.org/.
[4] https://spark.apache.org/mllib/.
[5] D. Achlioptas. Database-friendly random projections: Johnson-lindenstrauss with binary
coins. J. Comput. Syst. Sci., 66(4):671–687, 2003.
[6] N. Ailon and E. Liberty. Fast dimension reduction using rademacher series on dual bch codes.
In ACM-SIAM Symposium on Discrete Algorithms (SODA), 2008.
[7] N. Alon and V. H. Vu. Anti-hadamard matrices, coin weighing, threshold gates, and indecomposable hypergraphs. J. Comb. Theory, Ser. A, 79(1):133–160, 1997.
[8] A. Andoni and H. L. Nguyen. Eigenvalues of a matrix in the streaming model. In Proceedings
of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New
Orleans, Louisiana, USA, January 6-8, 2013, pages 1729–1737, 2013.
[9] Z.-J. Bai, R. H. Chan, and F. T. Luk. Principal component analysis for distributed data sets
with updating. In Advanced Parallel Processing Technologies, pages 471–483. Springer, 2005.
[10] M.-F. Balcan, V. Kanchanapally, Y. Liang, and D. Woodruff. Improved distributed principal
component analysis. arXiv preprint arXiv:1408.5823, to appear in NIPS, 2014.
[11] J. Batson, D. Spielman, and N. Srivastava. Twice-ramanujan sparsifiers. In Proceedings of the
41st annual ACM symposium on Theory of computing, pages 255–262. ACM, 2009.
[12] A. R. Benson, D. F. Gleich, and J. Demmel. Direct qr factorizations for tall-and-skinny matrices
in mapreduce architectures. In Big Data, 2013 IEEE International Conference on, pages 264–272.
IEEE, 2013.
[13] S. Bhojanapalli, P. Jain, and S. Sanghavi. Tighter low-rank approximation via sampling the
leveraged element. http://uts.cc.utexas.edu/˜bsrinadh/main.pdf, to appear in
SODA, 2015.
[14] L. S. Blackford, J. Choi, A. Cleary, E. D’Azevedo, J. Demmel, I. Dhillon, J. Dongarra, S. Hammarling, G. Henry, A. Petitet, et al. ScaLAPACK users’ guide, volume 4. siam, 1997.
[15] Y.-A. L. Borgne, S. Raybaud, and G. Bontempi. Distributed principal component analysis for
wireless sensor networks. Sensors, 2008.
[16] J. Bourgain, S. Dirksen, and J. Nelson. Toward a unified theory of sparse dimensionality
reduction in euclidean space. In Proceedings of the Forty-Seventh Annual ACM on Symposium
on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015, pages 499–508, 2015.
[17] C. Boutsidis, P. Drineas, and M. Magdon-Ismail. Near optimal column based matrix reconstruction. SIAM Journal on Computing (SICOMP), 2013.
11
[18] C. Boutsidis and A. Gittens. Improved matrix algorithms via the subsampled randomized
hadamard transform. SIAM Journal on Matrix Analysis and Applications, 34(3):1301–1340, 2013.
[19] C. Boutsidis and D. P. Woodruff. Optimal cur matrix decompositions. STOC, 2014.
[20] A. Chakrabarti and O. Regev. An optimal lower bound on the communication complexity of
gap-hamming-distance. SIAM Journal on Computing, 41(5):1299–1317, 2012.
[21] K. Clarkson and D. Woodruff. Numerical linear algebra in the streaming model. In Proceedings of the 41st annual ACM symposium on Theory of computing (STOC), 2009.
[22] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity
time. In In STOC, 2013.
[23] K. L. Clarkson and D. P. Woodruff. Low rank approximation and regression in input sparsity
time. ArxiV report: http://arxiv.org/pdf/1207.6365v4.pdf, 2013.
[24] M. Cohen, S. Elder, C. Musco, C. Musco, and M. Persu. Dimensionality reduction for k-means
clustering and low rank approximation. arXiv preprint arXiv:1410.6801, 2014.
[25] M. B. Cohen. Simpler and tighter analysis of sparse oblivious subspace embeddings. In
SODA, 2016.
[26] A. Deshpande, L. Rademacher, S. Vempala, and G. Wang. Matrix approximation and projective clustering via volume sampling. Theory of Computing, 2(12):225–247, 2006.
[27] A. Deshpande and S. Vempala. Adaptive sampling and fast low-rank matrix approximation.
In RANDOM - APPROX, 2006.
[28] A. K. Farahat, A. Elgohary, A. Ghodsi, and M. S. Kamel. Distributed column subset selection
on mapreduce. In Data Mining (ICDM), 2013 IEEE 13th International Conference on, pages 171–
180. IEEE, 2013.
[29] D. Feldman, M. Schmidt, and C. Sohler. Turning big data into tiny data: Constant-size coresets for k-means, pca and projective clustering. In SODA, pages 1434–1453. SIAM, 2013.
[30] S. Friedland and A. Torokhti. Generalized rank-constrained matrix approximations. SIAM
Journal on Matrix Analysis and Applications, 29(2):656–659, 2007.
[31] M. Ghashami and J. Phillips. Relative errors for deterministic low-rank matrix approximations. In SODA, 2013.
[32] G. H. Golub and C. F. Van Loan. Matrix computations, volume 3. JHU Press, 2012.
[33] M. Gu and S. C. Eisenstat. A divide-and-conquer algorithm for the bidiagonal svd. SIAM
Journal on Matrix Analysis and Applications, 16(1):79–92, 1995.
[34] R. Horn and C. Johnson. Matrix Analysis. Cambridge University Press, New York, 1985.
[35] E. Jessup and D. Sorensen. A parallel algorithm for computing the singular value decomposition of a matrix. Siam Journal on Matrix Analysis and Applications, 15(2):530–548, 1994.
[36] R. Kannan, S. Vempala, and D. P. Woodruff. Nimble algorithms for cloud computing. arXiv
preprint arXiv:1304.3162, v3, 2013.
12
[37] R. Kannan, S. S. Vempala, and D. P. Woodruff. Principal component analysis and higher
correlations for distributed data. In Proceedings of The 27th Conference on Learning Theory,
pages 1040–1057, 2014.
[38] M. Kapralov and K. Talwar. On differentially private low rank approximation. In Proceedings
of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New
Orleans, Louisiana, USA, January 6-8, 2013, pages 1395–1414, 2013.
[39] D. Kempe and F. McSherry. A decentralized algorithm for spectral analysis. In Proceedings of
the thirty-sixth annual ACM symposium on Theory of computing, pages 561–568. ACM, 2004.
[40] Y. Li, H. L. Nguyên, and D. P. Woodruff. On sketching matrix norms and the top singular
vector. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms,
pages 1562–1581. SIAM, 2014.
[41] E. Liberty. Simple and deterministic matrix sketching. In KDD, pages 581–588. ACM, 2013.
[42] S. V. Macua, P. Belanovic, and S. Zazo. Consensus-based distributed principal component
analysis in wireless sensor networks. In Signal Processing Advances in Wireless Communications
(SPAWC), 2010 IEEE Eleventh International Workshop on, pages 1–5. IEEE, 2010.
[43] X. Meng and M. W. Mahoney. Low-distortion subspace embeddings in input-sparsity time
and applications to robust linear regression. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 91–100. ACM, 2013.
[44] J. Nelson and H. L. Nguyên. Osnap: Faster numerical linear algebra algorithms via sparser
subspace embeddings. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual
Symposium on, pages 117–126. IEEE, 2013.
[45] J. M. Phillips, E. Verbin, and Q. Zhang. Lower bounds for number-in-hand multiparty communication complexity, made easy. In Proceedings of the Twenty-Third Annual ACM-SIAM
Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 486–
501, 2012.
[46] J. Poulson, B. Marker, R. A. van de Geijn, J. R. Hammond, and N. A. Romero. Elemental: A
new framework for distributed memory dense matrix computations. ACM Transactions on
Mathematical Software (TOMS), 39(2):13, 2013.
[47] Y. Qu, G. Ostrouchov, N. Samatova, and A. Geist. Principal component analysis for dimension reduction in massive distributed data sets. In Proceedings of IEEE International Conference
on Data Mining (ICDM), 2002.
[48] T. Sarlos. Improved approximation algorithms for large matrices via random projections. In
IEEE Symposium on Foundations of Computer Science (FOCS), 2006.
[49] K. C. Sou and A. Ranzer. On generalized matrix approximation problem in the spectral norm.
Linear Algebra and its Applications, 436(7):2331–2341, 2012.
[50] F. Tisseur and J. Dongarra. A parallel divide and conquer algorithm for the symmetric eigenvalue problem on distributed memory architectures. SIAM Journal on Scientific Computing,
20(6):2223–2236, 1999.
13
[51] M. D. Vose. A linear algorithm for generating random numbers with a given distribution.
Software Engineering, IEEE Transactions on, 17(9):972–975, 1991.
[52] V. H. Vu and T. Tao. The condition number of a randomly perturbed matrix. In Proceedings
of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June
11-13, 2007, pages 248–255, 2007.
[53] D. Woodruff. Low rank approximation lower bounds in row-update streams. In Advances in
Neural Information Processing Systems, pages 1781–1789, 2014.
[54] D. Woodruff and P. Zhong. Distributed low rank approximation of implicit functions of a
matrix. In manuscript, 2015.
[55] D. P. Woodruff. Sketching as a tool for numerical linear algebra. Foundations and Trends in
Theoretical Computer Science, 10(1-2):1–157, 2014.
14
3 Related Work
Distributed PCA (or distributed SVD) algorithms have been investigated for a long time. One line
of work, developed primarily within the numerical linear algebra literature, studies such algorithms from the perspective of parallelizing existing standard SVD algorithms without sacrificing
accuracy. This approach aims at high accuracy implementations with the least possible communication cost. The distributed models of computation go typically beyond the column-partition
model and arbitrary-partition model that we study in this paper [46]. An extensive survey of this
line of work is out of the scope of our paper; we refer the reader to [35, 50, 33] and references
therein for more details as well as to popular software for distributed SVD such ScaLAPACK [14]
and Elemental [46].
Another line of work for distributed PCA algorithms has emerged within the machine learning
and datamining communities. Such algorithms have been motivated by the need to apply SVD or
PCA to extremely large matrices encoding enormous amounts of data. The algorithms in this line
of research are typically heuristic approaches that work well in practice but come with no rigorous
theoretical analysis. We refer the reader to [47, 42, 9, 15] for more details.
Finally, distributed PCA algorithms in the column-partition model have been recently studied within the theoretical computer science community. Perhaps the more intuitive algorithm
for PCA in this model appeared in [29, 10]: first, a number of left singular vectors and singular
values are computed in each machine; then, the server collects those singular vectors and concatenates them column-wise in a new matrix and then it computes the top k left singular vectors
of this “aggregate” matrix. It is shown in [29, 10] that if the number of singular vectors and singular values in the first step is O(kε−1 ), then, the approximation error in Frobenius norm is at
most (1 + ε) times the optimal Frobenius norm error; the communication cost is O(skmε−1 ) real
numbers because each of the s machines sends O(kε−1 ) singular vectors of dimension m; unfortunately, it is unclear how one can obtain a communication cost in terms of words/bits. A different
algorithm with the same communication cost (only in terms of real numbers since a word/bit
communication bound remained unexplored) is implicit in [41, 31] (see Theorem 3.1 in [31] and
the discussion in Section 2.2 in [41]). Kannan, Vempala and Woodruff proposed arbitrary-partition
model in [37]. They developed
a (1 + ε) Frobenius norm error algorithm with communication cost
−1
2
−4
O skmε + sk ε
words. Bhojanapalli, Jain, and Sanghavi in [13] developed an algorithm
that provides a bound with respect to the spectral norm. Their algorithm is based on sampling
elements from the input matrix, but the communication cost is prohibitive if n is large. The cost
also depends on the condition number of A. Moreover, to implement the algorithm, one needs to
know kA − Ak kF . Finally, [39] discussed a distributed implementation of the “orthogonal iteration” to compute eigenvectors of graphs. The model they consider is different, but perhaps their
protocol could be extended to our model.
4 Preliminaries
Definitions. We formally define the problems and the models here.
Definition 14 (Arbitrary-partition model).
P An m×n matrix A is arbitrarily partitioned into s matrices
Ai ∈ Rm×n , i.e., for i = 1, 2, . . . , s: A = si=1 Ai . There are s machines, and the i-th machine has Ai as
input. There is also another machine, to which we refer to as the “server”, which acts as the central coordinator. The model only allows communication between the machines and the server. The communication
cost of an algorithm in this model is defined as the total number of words transferred between the machines
and the server, where we assume each word is O(log(nms/ε)) bits.
15
Reference
kA − UUT Ak2 ≤
kA − UUT Ak2
F ≤
δ
Communication cost
Implicit in [29]
-
(1 + ε)kA − Ak k2
F
0
-
Theorem 2 in [10]
-
(1 + ε)kA − Ak k2
F
0
-
Theorem 6 in [10]
-
(1 + ε)kA − Ak k2
F
>0
-
Implicit in [41, 31]
-
(1 + ε)kA − Ak k2
F
0
O(mnkε−2 )
Thm 1.1 in [37]*
-
(1 + ε)kA − Ak k2
F
O(1)
Thm 5.1 in [13]
kA − Ak k2 + Γ
-
>0
Remark p. 11 [13]
kA − Ak k2 + Γ
-
>0
Theorem 43*
-
(1 + ε)kA − Ak k2
F
O(1)
-
O skmε−1 + sk2 ε−4
5 −2
O sm + nk ε
∆
O sm + nk3 ε−2 ∆
Theorem 63
-
(1 + ε)kA − Ak k2
F
O(1)
O(skφε−1 + sk2 ε−4 )
Theorem 74
-
(1 + ε)kA − Ak k2
F
O(1)
O(skφε−1 + sk3 ε−5 )
O (mns
· poly(k, 1/ε))
O(skm + sk3 ε−5 )
Total
number of arithmetic operations
O mn min{m, n} + mskε−1 min{m, skε−1 }
O mn min{m, n} + mskε−1 min{m, skε−1 }
2 2
3
log sk
log m
O nnz(A) + s m 4k + k m
6
ε
dε
ε
ε
O(poly(m, n, k, s, ε−1 ))
−2
2
O nnz(A) + δ −1 nk5 ε−2 σ1
(A)σk (A)
−2
2
O nnz(A) + δ −1 nk5 ε−2 σ1
(A)σk (A)
O mnkε−2 + mk2 ε−4 + poly(kε−1 ) .
O nnz(A) · log2 ( ns
) + (m + n) · s · poly( k
log( ns
) .
δ
ε
δ
Table 4:
Distributed PCA Algorithms in the column-partition model with s machines (see Definition 15). ∗ indicates that the
algorithm can also be applied in the arbitrary partition model (see Definition 14). A ∈ Rm×n has rank ρ, U ∈ Rm×k with k < ρ is
orthonormal, 0 < ε < 1, and each column of A contains at most φ ≤ m
non-zero elements. δ is the failure probability. Finally, for
−1 .
notational convenience let Γ := εkA − Ak kF , ∆ := σ12 (A)σk−2 (A) log2 kAk2 kA − Ak k−1
F ε
Definition 15 (Column-partition model). An m × n matrix A is partitioned
arbitrarily
column-wise
P
m×w
i
into s blocks Ai ∈ R
, i.e., for i = 1, 2, . . . , s: A = A1 A2 . . . As . Here, wi = n. There are
s machines, and the i-th machine has Ai as input. There is also another machine, to which we refer to as the
“server”, which acts as the central coordinator. The model only allows communication between the machines
and the server. The communication cost of an algorithm in this model is defined as the total number of words
transferred between the machines and the server, where we assume each word is O(log(nms/ε)) bits.
Definition 16 (The Distributed Principal Component Analysis Problem in arbitrary partition
Psmodel).
m×n
Give an m×n matrix A arbitrarily partitioned into s matrices Ai ∈ R
(i : 1, 2, . . . , s): A = i=1 Ai ,
a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model
of Definition 14 which, upon termination, leaves on each machine a matrix U ∈ Rm×k with k orthonormal
columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the communication cost of the algorithm
is as small as possible.
Definition 17 (The Distributed Principal Component Analysis Problem in column partition model).
Given an m × n matrix A partitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s):
A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of Definition 15 which, upon termination, leaves on each machine a matrix
U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and the
communication cost of the algorithm is as small as possible.
Definition 18 (The Distributed Column Subset Selection Problem). Given an m × n matrix A par
titioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s): A = A1 A2 . . . As , a
rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm in the model of
Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of
A such that kA − CC† Ak2F ≤ (1 + ε) · kA − Ak k2F , and
1. The number of selected columns c is as small as possible.
2. The communication cost of the algorithm is as small as possible.
Definition 19 (The Distributed Column Subset Selection Problem - rank k subspace version).
Given an m × n matrix Apartitioned column-wise into s arbitrary blocks Ai ∈ Rm×wi (i : 1, 2, . . . , s):
A = A1 A2 . . . As , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1,
design an algorithm in the model of Definition 15 that, upon termination, leaves on each machine a matrix C ∈ Rm×c with c < n columns of A and a matrix U ∈ Rm×k with k orthonormal columns with
U ∈ span(C), such that kA − CC† Ak2F ≤ kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F , and
16
1. The number of selected columns c is as small as possible.
2. The communication cost of the algorithm is as small as possible.
Definition 20 (Streaming model for Principal Component Analysis). Let all the entries in A ∈ Rm×n
initially be zeros. In the streaming model of computation, there is a stream of update operations that the
q th operation has form (iq , jq , xq ) which indicates that Aiq ,jq should be incremented by xq where iq ∈
{1, ..., m}, jq ∈ {1, ..., n}, xq ∈ R. An algorithm is allowed a single pass over the stream. At the end of
the stream the algorithm stores some information regarding A which we call a “sketch” of A. The space
complexity of an algorithm in this model is defined as the total number of words required to describe the
information the algorithm stores during the stream including the sketch. Each word is O(log(nms/ε))
bits.
Definition 21 (The Streaming Principal Component Analysis Problem). Given an m × n matrix A,
a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an algorithm that, using
as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then,
using only this sketch outputs U ∈ Rm×k with k orthonormal columns such that kA − UUT Ak2F ≤
(1 + ε) · kA − Ak k2F .
Definition 22 (The Streaming Principal Component Analysis Problem (factorization)). Given an
m × n matrix A, a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1, design an
algorithm that, using as little space as possible, first finds a sketch of A in the streaming model (see Definition 20) and then, using only this sketch outputs A∗k ∈ Rm×n with rank(A∗k ) ≤ k such that kA−A∗k k2F ≤
(1 + ε) · kA − Ak k2F .
Notation. A, B, . . . are matrices; a, b, . . . are column vectors. In is the n × n identity matrix;
0m×n is the m × n matrix of zeros; 1n is the n × 1 vector of ones; ei is the standard basis (whose
dimensionality will be clear from the context): the ith element of ei is one and the rest are zeros.
A(i) and A(j) denotes the ith column and jth row of A, respectively. Aij is the (i, j)th entry in A.
Sampling Matrices. Let A = [A(1) , . . . , A(n) ] ∈ Rm×n and let C = [A(i1 ) , . . . , A(ic ) ] ∈ Rm×c
consist of c < n columns of A. Note that we can write C = AΩ, where the sampling matrix is
Ω = [ei1 , . . . , eic ] ∈ Rn×c (here ei are the standard basis vectors in Rn ). If D ∈ Rc×c is a diagonal
matrix, then AΩD contains c columns of A rescaled with the corresponding elements in D. We
abbreviate S := ΩD, hence the matrix S ∈ Rn×c “samples” and “rescales” c columns from A.
P
Matrix norms. We use the Frobenius and the spectral matrix-norms: kAk2F = i,j A2ij ; kAk2 =
maxkxk2 =1 kAxk2 . kAkξ is used if a result holds for both norms ξ = 2 and ξ = F. The standard
submultiplicativity property for matrix norms implies that for any A and B: kABkξ ≤ kAkξ ·kBkξ .
The triangle inequality for matrix norms implies that kA + Bkξ ≤ kAkξ + kBkξ . A version of the
triangle inequality for the norms squared is: kA + Bk2ξ ≤ 2 · kAk2ξ + 2 · kBk2ξ . A version of the
matrix pythagorean theorem is: if AT B is the all-zeros matrix, then kA + Bk2F = kAk2F + kBk2F .
If V has orthonormal columns, then kAV T kξ = kAkξ , for any A. If P is a symmetric projection
matrix (i.e., P = PT and P2 = P) then, kPAkξ ≤ kAkξ , for any A.
17
Singular Value Decomposition (SVD) and Moore-Penrose Pseudo-inverse.
Rm×n with rank(A) = ρ is
Σk
VkT
0
A = Uk Uρ−k
,
T
0 Σρ−k
Vρ−k
{z
}
|
|
{z
} | {z }
UA ∈Rm×ρ
ΣA ∈Rρ×ρ
The SVD of A ∈
T
VA
∈Rρ×n
with singular values σ1 ≥ . . . σk ≥ σk+1 ≥ . . . ≥ σρ > 0. Here, k < ρ. We will use σi (A) to denote
the i-th singular value of A when the matrix is not clear from the context. The matrices Uk ∈
Rm×k and Uρ−k ∈ Rm×(ρ−k) contain the left singular vectors of A, and, similarly, the matrices
Vk ∈ Rn×k and Vρ−k ∈ Rn×(ρ−k) contain the right singular vectors of A. It is well-known that
Ak = Uk Σk VkT = AVk VkT = Uk UkT A minimizes kA − Xkξ over P
all matrices X ∈ Rm×n of rank
2
2
2
at most k. Specifically, kA − Ak k2 = σk+1 (A) and kA − Ak kF = ρi=k+1 σi2 (A) (see [32]). A† =
T
n×m denotes the so-called Moore-Penrose pseudo-inverse of A ∈ Rm×n (here Σ−1
VA Σ−1
A
A UA ∈ R
is the inverse of ΣA ). By the SVD of A and A† , for all i = 1, . . . , ρ = rank(A) = rank(A† ):
σi (A† ) = 1/σρ−i+1 (A).
4.1 The best rank k matrix ΠξV,k (A) within a subspace V
Our analysis uses theory involving computing the best rank k approximation of a matrix A within
a given column subspace V. Let A ∈ Rm×n , let k < n be an integer, and let V ∈ Rm×c with
m×n is the best rank k approximation to A in the column span of V.
k < c < n. ΠF
V,k (A) ∈ R
Equivalently, we can write
ΠF
V,k (A) = VXopt ,
where
Xopt =
X∈R
argmin
kA − VXk2F .
:rank(X)≤k
c×n
In order to compute ΠF
V,k (A) given A, V, and k, one can use the following algorithm:
V = YΨ is a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c. This step requires O(mc2 )
arithmetic operations.
2: Ξ = Y T A ∈ Rc×n . This step requires O(mnc) arithmetic operations.
1:
T
Ξk = ∆Σ̃k Ṽk ∈ Rc×n is a rank k SVD of Ξ with ∆ ∈ Rc×k , Σ̃k ∈ Rk×k , and Ṽk ∈ Rn×k . This
step requires O(nc2 ) arithmetic operations.
4: Return Y∆∆T Y T A ∈ Rm×n of rank at most k.
3:
Notice that Y∆∆T Y T A ∈ Rm×n is a rank k matrix that lies in the column span of V. The next
lemma is a simple corollary of Lemma 4.3 in [21].
T
Lemma 23. Given A ∈ Rm×n , V ∈ Rm×c and an integer k, Y∆∆T Y T and QŨk Σ̃k Ṽk satisfy:
T
2
kA − Y∆∆T Y T Ak2F ≤ kA − Y∆Σ̃k Ṽk k2F = kA − ΠF
V,k (A)kF
The above algorithm requires O(mnc + nc2 ) arithmetic operations to construct Y, Ψ, and ∆. We will
denote the above procedure as [Y, Ψ, ∆] = BestColumnSubspaceSV D(A, V, k).
Proof. The equality was proven in Lemma 4.3 in [21]. To prove the inequality, notice that for any
matrix X : kA − Y∆(Y∆)† Ak2F ≤ kA − Y∆Xk2F . Also, (Y∆)† = ∆† Y† = ∆T Y T , because both
matrices are orthonormal.
18
Next, we state a version of the above lemma for the transpose of A, equivalently for the best
rank k approximation within the row space of a given subspace R. Let A ∈ Rm×n , let k < n be an
m×n is the best rank k approximation to A
integer, and let R ∈ Rc×n with k < c < m. ΠF
R,k (A) ∈ R
in the row span of R. Equivalently, we can write
ΠF
R,k (A) = Xopt R,
where
Xopt =
argmin
kA − XRk2F .
X∈Rm×c :rank(X)≤k
In order to compute ΠF
R,k (A) given A, R, and k, one can use the following algorithm:
RT = YZ is a qr decomposition of RT with Y ∈ Rn×c and Z ∈ Rc×c . This step requires O(nc2 )
arithmetic operations.
2: Ξ = AY ∈ Rm×c . This step requires O(mnc) arithmetic operations.
3: Ξk = Ũk Σ̃k ∆T ∈ Rm×c is a rank k SVD of Ξ with Ũk ∈ Rm×k , Σ̃k ∈ Rk×k , and ∆ ∈ Rc×k .
This step requires O(mc2 ) arithmetic operations.
4: Return AY∆∆T Y T ∈ Rm×n of rank at most k.
1:
Notice that AY∆∆T Y T ∈ Rm×n is a rank k matrix that lies in the row span of R. The next lemma
is a corollary of Lemma 23 when applied with A := AT and V := RT .
Lemma 24. Given A ∈ Rm×n , R ∈ Rc×n and an integer k, Y∆∆T Y T and Ũk Σ̃k ∆T satisfy:
2
kA − AY∆∆T Y T k2F ≤ kA − Ũk Σ̃k ∆T Rk2F = kA − ΠF
R,k (A)kF .
The above algorithm requires O(mnc + mc2 ) arithmetic operations to construct Y, Z, and ∆. We will
denote the above procedure as [Y, Z, ∆] = BestRowSubspaceSV D(A, R, k).
5 Distributed PCA in the arbitrary partition model
This section describes a fast distributed PCA algorithm with total communication O(msk) words
plus low order terms, which is optimal in the arbitrary partition model in the sense that an
Ω̃(msk) bits lower bound was given by [37]. The algorithm employs, in a novel way, the notion of
projection-cost preserving sketches from [24]. In particular, whereas all previous [48, 23] dimensionreduction-based SVD methods reduce one dimension of the input matrix to compute some approximation to the SVD, our method reduces both dimensions and computes an approximation to
the SVD from a small almost square matrix. Unlike [37] which reduces only one dimension in the
first communication round, we do the reduction on both dimensions in the same round.
We first present the batch version of the algorithm which offers a new low-rank matrix approximation technique; a specific implementation of this algorithm offers a communication-optimal
distributed PCA algorithm (we also discuss in Section 7 a variant of this algorithm that offers
a two-pass space-optimal PCA method in the turnstile streaming model). Before presenting all
these new algorithms in detail, we present the relevant results from the previous literature that
we employ in the analysis.
19
5.1 Projection-cost preserving sketching matrices
In this section, we recap a notion of sketching matrices which we call “projection-cost preserving
sketching matrices”. A sketching matrix from this family is a linear matrix transformation and it
has the property that for all projections it preserves, up to some error, the difference between the
matrix in hand and its projection in Frobenius norm.
Definition 25 (Projection-cost preserving sketching matrices). We say that W ∈ Rn×ξ is an (ε, k)projection-cost preserving sketching matrix of A ∈ Rm×n , if for all rank-k orthogonal projection matrices
P ∈ Rm×m , it satisfies
(1 − ε)kA − PAk2F ≤ kAW − PAWk2F + c ≤ (1 + ε)kA − PAk2F
where c is a non-negative constant which only depends on A and W. We also call AW an (ε, k)-projectioncost preserving sketch of A.
Due to the following lemma, we know that a good rank-k approximation projection matrix of
(ε, k)-projection-cost preserving sketch AW also provides a good rank-k approximation to A.
Lemma 26 (PCA via Projection-Cost Preserving Sketches - Lemma 3 in [24]). Suppose W ∈ Rn×ξ is
∗
an (ε, k)-projection-cost preserving sketching matrix of A ∈ Rm×n . Let P̂ = arg minrank(P)≤k kAW −
∗
PAWk2F . For all P̂, ε′ satisfying rank(P̂) ≤ k, ε′ ≥ 0, if kAW− P̂AWk2F ≤ (1+ε′ )kAW− P̂ AWk2F ,
kA − P̂Ak2F ≤
1+ε
· (1 + ε′ )kA − Ak k2F
1−ε
[24] also provides several ways to construct projection-cost preserving sketching matrices. Because we mainly consider the communication, we just choose one which can reduce the dimension
as much as possible. Furthermore, it is also an oblivious projection-cost preserving sketching matrix.
Lemma 27 (Dense Johnson-Lindenstrauss matrix - part of Theorem 12 in [24]). √
For ε < √
1, suppose
n×ξ
each entry of W ∈ R
is chosen O(log(k))-wise independently and uniformly in {1/ ξ, −1/ ξ} where
ξ = O(kε−2 ) [21]. For any A ∈ Rm×n , with probability at least 0.99, W is an (ε, k)-projection-cost
preserving sketching matrix of A.
5.2 A batch algorithm for the fast low rank approximation of matrices
In this section, we describe a new method for quickly computing a low-rank approximation to
a given matrix. This method does not offer any specific advantages over previous such techniques [48, 23, 18]; however, this new algorithm can be implemented efficiently in the distributed
setting (see Section 5.3) and in the streaming model of computation (see Section 7); in fact we
are able to obtain communication-optimal and space-optimal results, respectively. For completeness as well as ease of presentation, we first present and analyze the simple batch version of the
algorithm. The algorithm uses the dense Johnson-Lindenstrauss matrix of Lemma 27 in order
to reduce both dimensions of A, before computing some sort of SVD to a poly(k/ε) × poly(k/ε)
matrix (see Step 2 in the algorithm below).
Consider the usual inputs: a matrix A ∈ Rm×n , a rank parameter k < rank(A), and an accuracy parameter 0 < ε < 1. The algorithm below returns an orthonormal matrix U ∈ Rm×k such
that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Algorithm
20
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Construct à = SAT.
T
3. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Construct X = ATVÃk
5. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
Theorem 29 later in this section analyzes the approximation error and the running time of the
previous algorithm. First, we prove the accuracy of the algorithm.
Lemma 28. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
Proof.
T
T
T
k2F = kSAT − SATVÃk VÃ
k2F = kTT AT ST − VÃk VÃ
TT AT ST k2F
kà − Ãk k2F = kà − ÃVÃk VÃ
k
k
k
T
The first equality follows by the SVD of Ãk = UÃk ΣÃk VÃ
. The second equality is by the
k
construction of à = SAT. The third equality is due to ∀M, kMk2F = kM T k2F .
Due to Lemma 27, with probability at least 0.99, ST is an (ε, k)-projection-cost preserving
sketch matrix of TT AT . According to Lemma 26,
T
T
kAT − ATVÃk VÃ
k2F = kTT AT − VÃk VÃ
TT AT k2F ≤
k
k
1+ε
· kAT − (AT)k k2F
1−ε
(2)
Observe that
kUUT AT − ATk2F = kXX† AT − ATk2F
T
≤ kXVÃ
− ATk2F
k
T
= kATVÃk VÃ
− ATk2F
k
≤
1+ε
· kAT − (AT)k k2F
1−ε
The first equality uses the fact that U is an orthonormal basis of span(X). The first inequality is
followed by ∀X, M, N, kXX† M − Mk2F ≤ kXN − Mk2F . The second equality uses the construction
that X = ATVÃk . The second inequality follows by Eqn (2).
Due to Lemma 27, with probability at least 0.99, T is an (ε, k)-projection-cost preserving sketch
matrix of A. Due to Lemma 26,
kUUT A − Ak2F ≤
(1 + ε)2
· kA − Ak k2F
(1 − ε)2
Due to union bound, the probability that ST is an (ε, k)-projection-cost preserving sketch matrix
of TT AT and T is an (ε, k)-projection-cost preserving sketch matrix of A is at least 0.98. Note that
(1+ε)2
is 1 + O(ε) when ε is small enough, so we can adjust ε here by a constant factor to show the
(1−ε)2
statement.
Next, we present the main theorem.
21
Theorem 29. The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The running time of the algorithm is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The correctness is shown by Lemma 28.
Running time.
Next, we analyze the running time of the algorithm:
1. There are a total of (ξ1 × m + ξ2 × n) entries of S and T. It is enough to generate them in
O((n + m)kε−2 ) operations.
2. We first compute AT with O(mnξ2 ) arithmetic operations. Then, we compute SAT with
O(ξ1 mξ2 ) arithmetic operations.
3. This step requires O(poly(k/ε)) operations since we compute the SVD of a O(poly(k/ε)) ×
O(poly(k/ε)) matrix Ã.
4. We already have AT from the second step. Hence, O(mξ2 k) additional arithmetic operations
suffice to compute ATVÃk
5. O(mk2 ) operations suffice to compute an orthonormal basis for X, e.g., with a QR factorization.
5.3 The distributed PCA algorithm
Ps
Recall that the input matrix A ∈ Rm×n is partitioned arbitrarily as: A =
i Ai for i = 1 : s,
m×n
Ai ∈ R
. The idea in the algorithm below is to implement the algorithm in Section 5.2 in the
distributed setting.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
1. Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 =
O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
P
2. Each machine locally computes Ãi = SAi T and sends Ãi to the server. Server constructs à = i Ãi .
T
3. Server computes the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
4. Server sends VÃk to all machines.
5. Each machine construct Xi = Ai TVÃk and sends Xi to the server. Server constructs X =
6. Server computes an orthonormal basis U ∈ R
m×k
7. Server sends U to each machine.
for span(X) (notice that rank(X) ≤ k).
P
i
Xi .
Notice that in the first step, S and T can be described using a random seed that is O(log(k))wise independent due to Lemma 27.
22
5.3.1
Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm. Notice that the communication cost of this algorithm
is only given in terms of “real numbers”. The only step where we can not bound the length of
a machine word is when the server communicates VÃk to all machines; and this is because the
entries of VÃk could be unbounded (see the discussion regarding the upper bounds in Section 1.2).
We resolve this issue in the following section.
Theorem 30. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
(3)
The communication cost of the algorithm is
O(msk + s · poly(k/ε))
“real numbers” and the running time is of the order
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
Proof. The matrix U - up to the randomness in the algorithm - is exactly the same matrix as in the
batch algorithm in Section 5.2, hence Theorem 29 proves Eqn. 3.
The algorithm communicates O(msk + s · poly(k/ε)) real numbers in total: O(s · poly(k/ε)) in
steps 2 and 4, and O(smk) in steps 5 and 7.
The operations in the algorithm are effectively the same operations as in the batch algorithm
in Section 5.2, hence the analysis of the running time in Theorem 29 shows the claim.
6 Obtaining bit complexity for the distributed PCA algorithm
For the algorithm in the previous section, we were only able to provide a communication upper
bound in terms of “real numbers”. In this section, we describe how to obtain a communication
upper bound in terms of words for the above protocol, where each word is O(log(mnsk/ε)) bits.
The basic idea is that we have a case analysis depending on the rank of the matrix A. If the
rank of A is less than or equal to 2k, we follow one distributed protocol and if the rank is at
least 2k we follow a different protocol. In Section 6.1, Section 6.2, and Section 6.3 we describe
the algorithm that tests the rank of a distributed matrix, and the two PCA protocols, respectively.
Then, in Section 6.4 we give the details of the overall algorithm and in Section 6.5 we give its
analysis.
6.1 Testing the rank of a distributed matrix
Lemma 31. Given A ∈ Rm×n and a rank parameter k < rank(A), there exists a distributed protocol
in the arbitrary partition model to test if the rank of A is less than or equal to 2k using O(sk2 ) words of
communication and succeeding with probability 1 − δ for an arbitrarily small constant δ > 0.
Proof. This is an immediate implementation of a streaming algorithm due to [21] for testing if an
n × n matrix A has rank at least 2k in the streaming model, using O(k2 ) words of space. In that
algorithm, there is a fixed 6nk/δ × n matrix H whose entries are integers of magnitude at most
poly(n), where δ > 0 is an arbitrarily small constant. The algorithm simply chooses 4k random
23
rows from H. Letting H′ be the 2k × n matrix of the first 2k random rows, and H′′ be the n × 2k
matrix whose columns are the next 2k randomly chosen rows, the algorithm just declares that A
has rank at least k iff the rank of H′ AH′′ is 2k.
The above streaming algorithm can be implemented in the distributed setting by having the
coordinator choose 4k random rows of the fixed, known matrix, and send the row identities to
each of the machines. This only takes O(sk) words of communication. Then machine i computes
H′ Ai H′′ , and returns this to the coordinator. The coordinator can then add these up to compute
H′ AH′′ and compute its rank. The total communication is O(sk 2 ) words and the protocol succeeds
with probability at least 1 − δ for an arbitrarily small constant δ > 0. Note that we can assume our
input matrix A, which is m × n, is a square n × n matrix by padding with all-zeros rows. Those
rows of course, will never get communicated in the implementation described above.
6.2 Distributed PCA protocol when rank(A) ≤ 2k
6.2.1
Subsampled Randomized Hadamard Transform and Affine Embeddings
Our algorithms use the following tool, known as “Subsampled Randomized Hadamard Transform” or SRHT for short, to implement efficiently fast dimension reduction in large matrices.
Definition 32 (Normalized Walsh–Hadamard Matrix). Fix an integer m = 2p , for p = 1, 2, 3, .... The
(non-normalized) m × m matrix of the Walsh–Hadamard transform is defined recursively as,
Hm/2 Hm/2
+1 +1
.
,
with
H2 =
Hn =
+1 −1
Hm/2 −Hm/2
1
The m × m normalized matrix of the Walsh–Hadamard transform is equal to H = m− 2 Hm ∈ Rm×m .
Definition 33 (Subsampled Randomized Hadamard Transform (SRHT) matrix). Fix integers ξ and
m = 2p with ξ < m and p = 1, 2, 3, .... An SRHT matrix is an ξ × m matrix of the form
r
m
T=
· RHD;
ξ
• D ∈ Rm×m is a random diagonal matrix whose entries are independent random signs, i.e. random
variables uniformly distributed on {±1}.
• H ∈ Rm×m is a normalized Walsh–Hadamard matrix (see Definition 32).
• R ∈ Rξ×m is a subset or r rows from the n × n identity matrix, where the rows are chosen uniformly
at random and without replacement.
The next lemma argues that an SRHT matrix is a so-called “affine embedding matrix”. The
SRHT is one of the possible choices of Lemma 32 in [23] that will satisfy the lemma.
Lemma 34 (Affine embeddings - Theorem 39 in [23]). Suppose G and H are matrices with m rows,
and G has rank at most r. Suppose T is a ξ × m SRHT matrix (see Definition 33) with ξ = O(r/ε2 ).
Then, with probability 0.99, for all X simultaneously:
(1 − ε) · kGX − Hk2F ≤ kT(GX − H)k2F ≤ (1 + ε) · kGX − Hk2F .
Finally, we note that matrix-vector multiplications with SRHT’s are fast.
Lemma 35 (Fast Matrix-Vector Multiplication, Theorem 2.1 in [6]). Given x ∈ Rm and ξ < m, one
can construct T ∈ Rξ×m and compute Tx in at most 2m log2 (ξ + 1)) operations.
24
6.2.2
Generalized rank-constrained matrix approximations
Let M ∈ Rm×n , N ∈ Rm×c , L ∈ Rr×n , and k ≤ c, r be an integer. Consider the following optimization problem,
Xopt ∈
argmin
kM − NXLk2F .
X∈Rc×r ,rank(X)≤k
Then, the solution Xopt ∈ Rc×r with rank(Xopt ) ≤ k that has the minimum kXopt kF out of all
possible feasible solutions is given via the following formula,
T
T
L† .
MVL VL
Xopt = N† UN UN
k
T
T
T
T
MVL VL
∈
UN UN
MVL VL k ∈ Rm×n of rank at most k denotes the best rank k matrix to UN UN
m×n
R
. This result was proven in [30] (see also [49] for the spectral norm version of the problem).
6.2.3
The PCA protocol
Lemma 36. Suppose the rank ρ of A ∈ Rm×n satisfies ρ ≤ 2k, for some rank parameter k. Then, there is a
protocol for the Distributed Principal Component Analysis Problem in the arbitrary partition model using
O(smk + sk 2 /ε2 ) words of communication and succeeding with probability 1 − δ for an arbitrarily small
constant δ > 0.
Proof. The n×2k matrix H′′ chosen in the protocol of Lemma 31 satisfies that with probability 1−δ,
for an arbitrarily small constant δ > 0, the rank of AH′′ is equal to the rank of A if ρ < 2k. Indeed,
if this were not true, the algorithm could not be correct, as the rank of H′ AH′′ is at most the rank
of AH′′ (and the same algorithm can be used for any ρ < 2k). It follows that with probability 1 − δ,
the column span of AH′′ is equal to the column span of A. Hence, as in the protocol of Lemma
31, the coordinator learns the column space of A, which can be described with O(km) words. The
coordinator thus communicates this to all machines, using O(skm) total words of communication,
assuming the entries of A are integers of magnitude at most poly(mns/ε).
Let C = AH′′ , which is m × 2k. We can set up the optimization problem:
min
kCXCT A − AkF .
rank(X)≤k
(4)
Because the size of C is only m × 2k, every machine can know C by sending a total of O(smk)
words. Since the rank of C and A are small, we can sketch on the left and right using affine
embeddings Tlef t and Tright . Then machine i sends CT Ai Tright to the coordinator, together with
Tlef t Ai Tright . The coordinator computes CT ATright and Tlef t ATright by adding up the sketches,
and sends these back to all the machines. Each machine can then solve the optimization problem
min
kTlef t CXCT ATright − Tlef t ATright kF ,
rank(X)≤k
(5)
each obtaining the same X∗ which is the optimal solution to Eqn (5). Due to Lemma 34, X∗ is a
(1 + O(ε))-approximation to the best solution to Eqn (4). Finally, every machine outputs the same
orthonormal basis U ∈ Rm×k for CX∗ .
We can construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 =
O(k/ε2 ), ξ2 = O(k/ε2 ) (see Definition 33). The total communication of this protocol is O(skm +
sk 2 /ε2 ) words and the success probability can be made 1−δ for an arbitrarily small constant δ > 0.
25
6.3 Distributed PCA protocol when rank(A) > 2k
The idea here is more involved than in the previous subsection and in order to describe the algorithm we need several intermediate results.
6.3.1
Lower bounds on singular values of matrices with integers entries
The first lemma gives a lower bound on the singular values of a matrix with integer entries with
bounded magnitude.
Lemma 37. (Lemma 4.1 of [21], restated) If an m × n matrix A has integer entries bounded in magnitude
by γ, and has rank ρ = rank(A), then the k-th largest singular value A satisfies
σk ≥ (mnγ 2 )−k/(2(ρ−k)) .
Proof. In the proof of Lemma 4.1 of [21], equation (10), it is shown that if λk is the k-th largest
eigenvalue of AT A, then
λk ≥ (mnγ 2 )−k/(ρ−k) .
This implies the k-th singular value σk of A satisfies σk ≥ (mnγ 2 )−k/(2(ρ−k)) .
Next, we state two immediate corollaries of this lemma for future reference.
Corollary 38. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and
kA − Ak kF > 0, then
kA − Ak kF > (mns/ε)−O(k) .
Proof. Since kA − Ak kF > 0, the rank ρ of A is at least k + 1, so by the preceding lemma,
kA − Ak kF ≥ σk+1 ≥ (poly(mns/ε))−k/2 ,
as desired.
Corollary 39. If an m × n matrix A has integer entries bounded in magnitude by poly(mns/ε) and
rank(A) ≥ 2k, then
kA − Ak kF > 1/poly(mns/ε).
Proof. This follows by plugging ρ = 2k into Lemma 37.
6.3.2
Lower bounds on singular values of integer-perturbed matrices
In this section, we describe a perturbation technique for matrices and provide lower bounds for
the smallest singular value of the perturbed matrix. We start with a theorem of Tao and Vu.
Theorem 40. (Theorem 2.5 of [52]) Let M be an n×n matrix with integer entries bounded in magnitude by
nC for a constant C > 0. Let Nn be a matrix with independent entries each chosen to be 1 with probability
1/2, and −1 with probability 1/2. Then, there is a constant B > 0 depending on C, for which
Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n.
In words, the result indicates that the spectral norm of the inverse of the perturbed matrix is
bounded from below with high probability. We now describe a simple corollary of this result.
26
Corollary 41. Let M be an n × n matrix with integer entries bounded in magnitude by nC for a constant
C > 0. Let Nn be a matrix with independent entries each chosen to be 1/nD with probability 1/2, and
−1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant B > 0 depending on C
and D for which
Pr[k(M + Nn )−1 k2 ≥ nB ] ≤ 1/n.
Proof. This follows by Theorem 40 after replacing the constat C in that theorem with C + D, and
scaling by nD .
We need to generalize Corollary 41 to rectangular matrices since we will eventually apply this
perturbation technique to the matrix A to which we would like to compute a distributed PCA.
Lemma 42. Let M be an m × n matrix with integer entries bounded in magnitude by nC for a constant
C > 0, and suppose m ≤ n. Let Nm,n be a matrix with independent entries each chosen to be 1/nD with
probability 1/2 and −1/nD with probability 1/2, where D > 0 is a constant. Then, there is a constant
B > 0 depending on C and D for which
Pr[σm (M + Nm,n ) < 1/nB ] ≤ 1/n,
where σm (M + Nm,n ) denotes the smallest singular value of M + Nm,n .
Proof. Suppose we were to pad M with n − m zero rows, obtaining a square matrix M. Now
consider the n × n matrix Nn,n with independent entries each chosen to be 1/nD with probability
1/2 and −1/nD with probability 1/2. By Corollary 41, all singular values of M + Nn,n are at least
1/nB . Now consider a unit vector x ∈ Rn which is zero on all but its top m coordinates. Let
y ∈ Rm be the unit vector which agrees with x on its top m coordinates. Then,
1/nB ≤ kx(M + Nn,n )k2
= ky(M + Nm,n )k2 ,
where the inequality uses the lower bound on the singular values of M + Nn,n , which occurs with
probability at least 1 − 1/n, and the equality follows by definition of the matrices and vectors we
have defined. As y ∈ Rm can be chosen to be an arbitrary unit vector, it follows that σm (M +
Nm,n ) ≥ 1/nB , which completes the proof.
6.4 Description of algorithm
Using the above results, we are now ready to describe a distributed PCA algorithm whose communication cost can be bounded in terms of machine words and not just in terms of “real numbers”.
As in the algorithm in Section 5.3, we denote with Bi ∈ Rm×n the matrix that B1 arises from A1
after applying the Bernoulli perturbation technique
P discussed above in Lemma 42 and ∀i > 1, Bi
is equal to Ai . Using this notation, we have B := i Bi ∈ Rm×n . Notice that B exactly arises from
A after applying the such Bernoulli perturbation technique.
Input:
1. A ∈ Rm×n arbitrarily partitioned A =
2. rank parameter k < rank(A)
Ps
i
Ai for i = 1 : s, Ai ∈ Rm×n .
3. accuracy parameter ε > 0
Algorithm
27
1. Use the protocol of Lemma 31 with δ = 0.01 to test if the rank of A is less than 2k.
2. If rank(A) ≤ 2k, use the protocol of Lemma 36 to find some orthonormal U ∈ Rm×k .
3. If rank(A) > 2k,
(a) machine 1 locally and independently adds 1/nD with probability 1/2, and −1/nD with probability 1/2, to each of the entries of A1 , where D is the constant of Lemma 42. Note that this
effectively adds the matrix Nm,n of Lemma 42 to the entire matrix A. For notational convenience let B = A + Nm,n , B1 ∈ Rm×n be the local perturbed matrix of machine 1 and ∀i > 1,
Bi is just equal to Ai .
(b) Machines agree upon two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with
ξ1 = O(kε−2 ), ξ2 = O(kε−2 ) (see Lemma 27).
(c) Each machine locally computes B̃i = SBi T and sends B̃i to the server. Server constructs B̃ =
P
i B̃i .
T
(d) Server computes the SVD of B̃k = UB̃k ΣB̃k VB̃
(UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ).
k
(e) Now server rounds each of the entries in VB̃k to the nearest integer multiple of 1/nγ for a
sufficiently large constant γ > 0. Let the matrix after the rounding be V̂B̃k
(f) Server sends V̂B̃k to all machines.
(g) Each machine construct X̂i = Bi TV̂B̃k and sends X̂i to the server. Server constructs X̂ =
P
i X̂i .
(h) Server computes an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k), e.g.
with a QR factorization.
(i) Server sends U to each machine.
6.5 Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm. Notice that the communication cost of this algorithm is
given in terms of machine words.
Theorem 43. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant
probability:
(6)
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The communication cost of the algorithm
is O(msk + s · poly(k/ε)) words and the running time is
O nmkε−2 + mk2 ε−4 + poly(kε−1 ) .
6.6 Proof of Theorem 43
Proof of Eqn. 6 If rank(A) ≤ 2k, then Lemma 36 shows the claim. If rank(A) > 2k, then the
situation is more involved and we prove the approximation bound in the following subsection.
Communication Complexity Step 1 requires O(sk 2 ) words (Lemma 31). Step 2 requires O(smk+
sk 2 /ε2 ) words (Lemma 36). Step 3 requires O(msk + s · poly(k/ε)) words and this follows from the
analysis in Theorem 30. The only difference with Theorem 30 is that now all matrices communicated in the algorithm have real numbers which can be represented efficiently with one machine
word of at most O(log(mns/ε)) bits. To see this, note that each entry of V̂B̃k is bounded in magnitude by nO(B+C)/γ . Therefore, the entries of V̂B̃k and the entries of Xi = Bi TV̂B̃k can each be
described using O(log n) bits, i.e., a constant number of machine words.
28
Running time The operations in the third step in algorithm are effectively the same operations
as in the batch algorithm in Section 5.2 (plus some extra operations whose running time is not
asymptotically larger), hence the analysis of the running time in Theorem 29 shows the claim (the
number of operations in the first two steps of the algorithm is asymptotically less than the number
of operations in the third step).
6.7 Proof of Eqn. 6 if rank(A) > 2k
ξ×p be a matrix of which
Lemma 44 (Result in [21]). Suppose M ∈ Rp×q . For ε > 0, let√P ∈ R√
entries are O(q)-wise independently and uniformly chosen from {−1/ ξ, +1/ ξ} where ξ = O(q/ε2 ).
With arbitrarily large constant probability, P is an ε-subspace embedding matrix of column space of M.
Specifically, ∀x, it has
(1 − ε)kMxk2 ≤ kPMxk2 ≤ (1 + ε)kMxk2
Lemma 45 (Lemma C.2 in [40]). Suppose P is an ε-subspace embedding matrix of column space of
M ∈ Rp×q (q ≤ p). With arbitrarily large constant probability, ∀1 ≤ i ≤ q
(1 − ε)σi (PM) ≤ σi (M) ≤ (1 + ε)σi (PM)
where σi means the ith singular value.
It is suffice to show the following:
Lemma 46. With arbitrarily large constant probability, k(BTVB̃k )† k2 ≤ 8nB
Proof. Notice that BTVB̃k is an m × k matrix. With high probability, S is a ε-subspace embedding
matrix of column space of BTVB̃k due to Lemma 44. According to Lemma 45, σmin (BTVB̃k ) ≥
(1 − ε)σmin (SBTVB̃k ) where σmin means the minimum singular value. Without loss of generality, we assume ε < 1/2. Then σmin (BTVB̃k ) ≥ 12 σmin (SBTVB̃k ). Because VB̃k are the top
k right singular vectors of SBT, σmin (SBTVB̃k ) ≥ σmin (SBT). Applying Lemma 44 again,
TT is a constant error subspace embedding matrix of column space of BT ST . Combining with
Lemma 45, we can make σmin (SBT) ≥ 21 σmin (SB). Notice that Lemma 44 also implies that
q
ξ1 T
ξ1 which means ∀x ∈ Rξ1 , we can
m S is a constant error subspace embedding matrix of R
q
q
make kx ξm1 Sk2 > 12 kxk2 . Thus, ∀x ∈ Rξ1 , kx ξm1 SBk2 > 12 σmin (B)kxk2 . Due to Lemma 42,
q
q
σmin (B) > 1/nB which implies σmin (SB) > 12 · ξm1 σmin (B) > 12 ξm1 n1B > 12 n1B . To conclude
k(BTVB̃k )† k2 ≤ 1/σmin (BTVB̃k ) ≤ 8nB .
Let E = VB̃k − V̂B̃k , we have
kA − UUT AkF = kB − Nm,n − UUT (B − Nm,n )kF
≤ kB − UUT BkF + kNm,n kF
†
= kB − (BTV̂B̃k )(BTV̂B̃k ) BkF + kNm,n kF
≤ kB − (BT(VB̃k + E))(BTVB̃k )† BkF + kNm,n kF
≤ kB − (BTVB̃k )(BTVB̃k )† BkF + kBTE(BTVB̃k )† BkF + kNm,n kF
≤ (1 + O(ε))kB − Bk kF + kBTE(BTVB̃k )† BkF
≤ (1 + O(ε))kB − Bk kF
29
The first equality follows by using the relation B = A + Nm,n . The first inequality uses the triangle inequality for the Frobenius norm and the fact that I − UUT is a projector matrix and can
be dropped without increasing the Frobenius norm. The second equality uses the fact that both
†
UUT and (BTV̂B̃k )(BTV̂B̃k ) are the same projector matrices. The second inequality follows by
∀M, C, X, kM − CC† MkF ≤ kM − CXkF and the relation E = VB̃k − V̂B̃k . The third inequality
uses the triangle inequality. The fourth inequality uses that kB − Bk kF ≥ 1/poly(mns/ε) (follows
from Lemma 42) while kNm,n kF can be made 1/nt for an arbitrarily large integer t, and the fact
that kB − (BTVB̃k )(BTVB̃k )† BkF ≤ (1 + O(ε))kB − Bk kF (implied by replacing all A with B in
Lemma 28). The last inequality uses the fact kBTE(BTVB̃k )† BkF ≤ kBkF kTkF kEkF k(BTVB̃k )† kF kBkF
where kBkF , kTkF , k(BTVB̃k )† kF are poly(nms/ε) (Lemma 46 implies the bound of k(BTVB̃k )† kF )
and we can make |E|F be 1/np for an arbitrarily large p, and kB − Bk kF ≥ 1/poly(mns/ε).
Overall, after rescaling ε, we have
kA − UUT AkF ≤ (1 + ε)kB − Bk kF .
(7)
Finally, we need to relate kB − Bk kF to kA − Ak kF , which we do in the following lemma.
Lemma 47. Let A ∈ Rm×n be any matrix, Nm,n be the random matrix of Lemma 42, and B = A + Nm,n .
Let k < rank(A), ε > 0. Then, for arbitrarily large constant probability,
kB − Bk kF ≤ (1 + ε)kA − Ak kF .
Proof. Since B = A + Nm,n , the proof idea is to relate the singular values of B to the singular
values of A using Weyl’s inequality. Specifically, for i : 1 : m (recall we assume m ≤ n) we have
|σi (B) − σi (A)| ≤ kNm,n k2 ≤ 1/nD .
Rearranging terms in this inequality, and taking squares of the resulting relation we obtain (for
i = 1 : m),
2
σi2 (B) ≤ σi (A) + 1/nD .
(8)
We manipulate the term kB − Bk kF as follows:
v
u X
u m
σi2 (B)
kB − Bk kF = t
i=k+1
v
u X
u m
(σi (A) + 1/nD )2
≤ t
i=k+1
v
u X
u m
= t
σi2 (A) + 1/n2D + 2σi (A)/nD
i=k+1
v
u X
q
q
u m
2
2D
t
σi (A) + 1/n + 2σi (A)/nD
≤
i=k+1
≤ kA − Ak kF + ε · kA − Ak kF + ε · kA − Ak kF
≤ (1 + 2ε)kA − Ak kF .
30
The first inequality uses Eqn. (8). In the third inequality, we used
q
1/n2D ≤ εkA − Ak kF ,
which follows from Corollary 39 for a sufficiently large constant D. Also, we used
q
q
q
2σi (A)/nD ≤ 2σ1 (A)/nD ≤ poly(nms/ε)/nD ≤ εkA − Ak kF ,
where the second inequality follows because kAk2 ≤ poly(nms/ε) and the last inequality uses
again Corollary 39 for a sufficiently large constant D.
Completing the proof. Using Lemma 47 in Eqn (7), taking squares in the resulting inequality,
and rescaling ε concludes the proof.
7 Streaming Principal Component Analysis
In this section, we are interested in computing a PCA of a matrix in turnstile streaming model.
Specifically, there is a stream of update operations that the q th operation has form (iq , jq , xq ) which
indicates that the (iq , jq )th entry of A ∈ Rm×n should be incremented by xq where iq ∈ {1, ..., m}, jq ∈
{1, ..., n}, xq ∈ R. Initially, A is zero. In the streaming setting of computation, we are allowed only
one pass over the update operations, i.e., the algorithm “sees” each update operation one by one
and only once. Upon termination, the algorithm should return a matrix U with k orthonormal
columns which is a “good” basis for span(A) . In Section 7.1.1 below, we describe an algorithm
which gives a space-optimal streaming algorithm. Further more, we provide a variation of this
algorithm in Section 7.1.2 which can output A∗k satisfying kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F . It
meets the space lower bound shown in [21]. In Section 7.2, we relax the problem and we describe
a two-pass streaming algorithm which is a version of the algorithm of Section 5.2; unfortunately,
the space complexity of this algorithm can be bounded only in terms of “real numbers”. We fix
this in Section 7.3 where we describe an optimal two-pass streaming algorithm.
Inputs to the algorithms in Section 7.1, Section 7.2 and Section 7.3 are a stream of update
operations (i1 , j1 , x1 ), (i2 , j2 , x2 ), ..., (il , jl , xl ), a rank parameter k < rank(A), and an accuracy
parameter 0 < ε < 1.
7.1 One-pass streaming PCA
7.1.1
The algorithm which outputs U
In the following algorithm, the output should be U with orthogonal unit columns and satisfying
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
Our algorithm uses the following property of random sign matrices:
Lemma 48 (Sketch for regression - Theorem 3.1 in [21]). Suppose both of A and B have m rows and
rank(A) ≤ k. Further more, if each entry of S ∈ Rξ×m is O(k)-wise independently chosen from {−1, +1}
where ξ = O(k/ε) and
X̃ = arg min kSAX − SBk2F
X
, with probability at least 0.99,
kAX̃ − Bk2F ≤ (1 + ε) · min kAX − Bk2F
X
31
Algorithm
1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with
ξ2 = O(kε−1 ) (see Lemma 48)
2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 =
O(k/ε−3 ) (see Definition 33).
3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 . We will maintain
M, L, N, D such that M = Tlef t ATright , L = SATright , N = Tlef t AR and D = AR.
4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations)
(a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j .
(d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j
5. end
6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .)
rank(X)≤k
rank(X)≤k
T
(UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute
7. Compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T = DUX∗ .
8. Compute an orthonormal basis U ∈ Rm×k for span(T).
Theorem 52 later in this section analyzes the approximation error, the space complexity, and
the running time of the previous algorithm. First, we prove a few intermediate results.
Lemma 49. For all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98:
(1 − ε)2 kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 kARXSA − Ak2F
Proof. Notice that rank(AR) ≤ ξ2 = O(kε−1 ). Then from Lemma 34 (G := AR and H := A),
with probability at least 0.99 for all Y ∈ Rξ2 ×n :
(1 − ε)kARY − Ak2F ≤ kTlef t (ARY − A)k2F ≤ (1 + ε)kARY − Ak2F
Replacing Y = XSA, for an arbitrary X ∈ Rξ2 ×ξ1 , we obtain that with probability at least 0.99 and
for all X ∈ Rξ2 ×ξ1 simultaneously:
(1 − ε)kARXSA − Ak2F ≤ kTlef t (ARXSA − A) k2F ≤ (1 + ε)kARXSA − Ak2F
Now notice that rank(SA) ≤ ξ1 = O(kε−1 ). Then from Lemma 34 (G := AT ST and H :=
T
m×ξ2 :
AT Tlef
t ), with probability at least 0.99 for all Z ∈ R
T
2
T
T T T
T T
2
T T T
T T
2
(1 − ε)kA T ST ZT − AT Tlef
t kF ≤ kTright (A S Z − A Tlef t )kF ≤ (1 + ε)kA S Z − A Tlef t kF
T
ξ2 ×ξ1 , we obtain that with probability at least
Replacing Z = XT RT AT Tlef
t for an arbitrary X ∈ R
0.99 and for all X simultaneously:
(1 − ε)2 k(ARXSA − A)T k2F ≤ k(Tlef t (ARXSA − A) Tright )T k2F ≤ (1 + ε)2 k(ARXSA − A)T k2F
32
Lemma 50. Let Xopt = arg minrank(X)≤k kARXSA−Ak2F with Xopt ∈ Rξ2 ×ξ1 . Then, with probability
at least 0.98
(1 + ε)2
min
kTlef t (ARXSA − A) Tright k2F ≤ kARX∗ SA − Ak2F ≤
kARXopt SA − Ak2F
2
(1
−
ε)
rank(X)≤k
Proof. From Lemma 49, we have that for all matrices X ∈ Rξ2 ×ξ1 and with probability at least 0.98:
(1 − ε)2 · kARXSA − Ak2F ≤ kTlef t (ARXSA − A) Tright k2F ≤ (1 + ε)2 · kARXSA − Ak2F
Applying this for X := Xopt , we obtain:
(e)
(1 − ε)2 · kARXopt SA − Ak2F ≤ kTlef t (ARXopt SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F
Applying this for X := X∗ , we obtain:
(f )
(1 − ε)2 · kARX∗ SA − Ak2F ≤ kTlef t (ARX∗ SA − A) Tright k2F ≤ (1 + ε)2 · kARXopt SA − Ak2F
Combining (f ), (e) along with the optimality of X∗ , formally using the relation:
kTlef t (ARX∗ SA − A) Tright k2F ≤ kTlef t (ARXopt SA − A) Tright k2F ,
shows the claim.
In words, the lemma indicates that in order to (1 + ε)-approximate the optimization problem
minrank(X)≤k kARXSA − Ak2F , it suffices to “sketch” the matrix ARXSA − A from left and right
with the matrices Tlef t and Tright . Recall that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .
rank(X)≤k
Lemma 51. Let Xopt = arg minrank(X)≤k kARXSA − Ak2F . Then, with probability at least 0.98
kARXopt SA − Ak2F ≤ (1 + ε) · kA − Ak k2F ,
T
T
Proof. Suppose the SVD of A = UA ΣA VA
and Ak = UAk ΣAk VA
. Consider about the following
k
regression problem:
min kUAk X − Ak2F
rank(X)≤k
Since we can choose X to be
T
UA
A,
k
we have
min
rank(X)≤k
kUAk X − Ak2F ≤ kA − Ak k2F
Let X̃ = arg minrank(X)≤k kSUAk X − SAk2F . According to Lemma 48, with probability 0.99
kUAk X̃ − Ak2F ≤ (1 + ε)
min
rank(X)≤k
kUAk X − Ak2F ≤ (1 + ε)kA − Ak k2F
Since X̃ minimizes kSUAk X − SAk2F , the row space of X̃ is in the row space of SA (Otherwise,
we can project SUAk X into the row space of SA to get a better solution). We denote X̃ = WSA
where rank(W) ≤ k. Now, consider about another regression problem:
min
rank(X)≤k
k(WSA)T XT − AT k2F
33
If we choose X to be UAk , we have
min
rank(X)≤k
k(WSA)T XT − AT k2F ≤ kUAk X̃ − Ak2F ≤ (1 + ε)kA − Ak k2F
Let X̂ = arg minrank(X)≤k kRT (WSA)T XT − RT AT k2F . According to Lemma 48, with probability
0.99
T
kRT (WSA)T X̂ − RT AT k2F ≤ (1 + ε)
min
rank(X)≤k
k(WSA)T XT − AT k2F ≤ (1 + ε)2 kA − Ak k2F
Since X̂ minimizes kXWSAR − ARk2F , the column space of X̂ is in the column space of AR. We
denote X̂ = ARG where rank(G) ≤ k. Thus, we have
kARXopt SA − Ak2F ≤ kARGWSA − Ak2F ≤ (1 + ε)2 kA − Ak k2F
We scale the ε with a constant factor. The statement is shown by applying union bound.
Theorem 52. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.96:
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is O mk/ε + poly(kε−1 ) words, and the running time for each
update operation is O(poly(kε−1 )) and the total running time is of the order O l · poly(kε−1 ) + mk2 ε−1
where l is total number of updates.
Proof. Because UUT projects the columns of A into the column space of Tlef t ARX∗ ,
kA − UUT Ak2F ≤ kTlef t (ARXSA − A) Tright k2F
According to Lemma 50 and Lemma 51,
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F
To see the space complexity of the algorithm, observe that it suffices to maintain the matrices
in the fourth step of the algorithm. Furthermore, observe that by the end of the stream: M =
Tlef t ATright ∈ Rξ3 ×ξ4 , L = SATright ∈ Rξ1 ×ξ4 , N = Tlef t AR ∈ Rξ3 ×ξ2 and D = AR ∈ Rm×ξ2 .
Those matrices form the so called “sketch” of the algorithm.
Since all of ξ1 , ξ2 , ξ3 , ξ4 are O(kε−1 ), the running time for each update operation in the fourth
step is O(poly(kε−1 )). We can do the sixth step by using the result of Section 6.2.2. The computation takes poly(kε−1 ) running time. In the seventh step, computing SVD needs poly(kε−1 ),
and computing T needs O(mk2 ε−1 ). We can use O(mk2 ) to compute U in the final step, e.g. QR
decomposition.
7.1.2
A variation which outputs A∗k
We just slightly modify the previous algorithm in Section 7.1.1 to get the following one which can
output a matrix A∗k ∈ Rm×n satisfying
kA − A∗k k2F ≤ (1 + ε) · kA − Ak k2F
Algorithm
34
1. Construct random sign sketching matrices S ∈ Rξ1 ×m with ξ1 = O(kε−1 ) and R ∈ Rn×ξ2 with
ξ2 = O(kε−1 ) (see Lemma 48)
2. Construct affine embedding matrices Tlef t ∈ Rξ3 ×m and Tright ∈ Rn×ξ4 with ξ3 = O(kε−3 ), ξ4 =
O(k/ε−3 ) (see Definition 33).
3. Initialize all-zeros matrices: M ∈ Rξ3 ×ξ4 , L ∈ Rξ1 ×ξ4 , N ∈ Rξ3 ×ξ2 , D ∈ Rm×ξ2 and C ∈ Rξ1 ×n . We
will maintain M, L, N, D, C such that M = Tlef t ATright , L = SATright , N = Tlef t AR, D = AR
and C = SA.
4. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (one pass over the stream of update operations)
(a) For all i = 1, ..., ξ3 , j = 1, ..., ξ4 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., ξ1 , j = 1, ..., ξ4 , let Li,j = Li,j + Si,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ3 , j = 1, ..., ξ2 , let Ni,j = Ni,j + (Tlef t )i,iq · xq · Rjq ,j .
(d) For all j = 1, ..., ξ2 , let Diq ,j = Miq ,j + xq · Rjq ,j
(e) For all i = 1, ..., ξ1 , let Ci,jq = Ci,jq + Si,iq · xq
5. end
6. Construct X∗ = argmin kN·X·L−Mk2F . (Notice that X∗ = argmin kTlef t (ARXSA − A) Tright k2F .)
rank(X)≤k
rank(X)≤k
T
(UX∗ ∈ Rξ×k , ΣX∗ ∈ Rk×k VX∗ ∈ Rξ×k ); then, compute
7. Compute the SVD of X∗ = UX∗ ΣX∗ VX
∗
T = DUX∗
T
C
K = VX
∗
8. Output A∗k = TΣX∗ K
Theorem 53. With probability at least 0.96:
kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is O (m + n)k/ε + poly(kε−1 ) words, and the running time for
each update operation is O(poly(kε−1 )) and the total running time is of the order
O l · poly(kε−1 ) + (m + n)k2 ε−1 + mnk
where l is total number of updates.
Proof. Notice that A∗k = ARX∗ SA. According to Lemma 50 and Lemma 51, we have
kA − A∗k k2F ≤ (1 + O (ε)) · kA − Ak k2F .
The total space of “sketch” matrices M, L, N, D is the same as the algorithm in Section 7.1.1. The
maintenance of C needs additional O(nkε−1 ) space.
T
The running time is almost the same as before. Computation of K = VX
C needs additional
∗
O(nk2 ε−1 ), and computation of A∗k = TΣX∗ K needs additional O(mnk).
35
7.2 Two-pass streaming PCA with “real numbers” space complexity
A simple modification of the batch algorithm in Section 5.2 leads to a two-pass streaming algorithm with O(mk) + poly(k/ε) “real numbers” space complexity:
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Initialize all-zero matrices: Ã ∈ Rξ1 ×ξ2 , X ∈ Rm×k .
3. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
4. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Ãi,j = Ãi,j + Si,iq · xq · Tjq ,j .
5. end
T
6. Compute the SVD of Ãk = UÃk ΣÃk VÃ
(UÃk ∈ Rξ1 ×k , ΣÃk ∈ Rk×k , VÃk ∈ Rξ2 ×k ).
k
7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
8. For all i = 1, ..., ξ2 , j = 1, ..., k, let Xiq ,j = Xiq ,j + xq · Tjq ,i · (VÃk )i,j .
9. end
10. Compute an orthonormal basis U ∈ Rm×k for span(X) (notice that rank(X) ≤ k).
The theorem below analyzes the approximation error, the space complexity, and the running
time of the previous algorithm. Notice that the space complexity of this algorithm is only given in
terms of “real numbers” - we resolve this issue in the following section.
Theorem 54. The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.98:
kA − UUT Ak2F ≤ (1 + O (ε)) · kA − Ak k2F .
The space complexity of the algorithm is
O mk + poly(kε−1 )
“real numbers”, the running time of each update operation is O(poly(kε−1 )), and the total running time is
of the order
O l · poly(kε−1 ) + mk2
where l is the total number of update operations.
Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the
algorithm in Section 5.2, hence Theorem 29 shows the claim.
To see the space complexity of the algorithm, observe that it suffices to maintain the matrices in
the fourth and eighth steps of the algorithm. Furthermore, observe that by the end of the stream:
à = SAT,
and
X = ATVÃk
Since ξ1 , ξ2 are poly(kε−1 ), the running time for each update operation is poly(kε−1 ). Computing SVD in the sixth step needs poly(kε−1 ). Computing U in the final step needs O(mk 2 ).
36
7.3 Two-pass streaming PCA with bit space complexity
The previous algorithm could suffer from large space complexity in case we need a lot of machine
words to write down the entries of VÃk . To fix this issue we use the same idea as in the case of the
distributed PCA algorithm in Section 6. This leads to a two-pass streaming algorithm for PCA.
Again, as in the distributed case, we need to test if the rank of A is less than 2k, and then we use
one approach if rank(A) < 2k and another approach if rank(A) ≥ 2k. Both of these approaches
can be implemented with two passes. In the overall streaming PCA algorithm that we would like
to design, we can not wait for the algorithm that tests the rank to finish and then start running
one of the two PCA protocols, because this will lead to a three-pass algorithm (one pass to test
the rank and two passes for the actual PCA protocol). To keep the number of passes to two, we
just start running the PCA protocols in parallel with the protocol that tests the rank of the input
matrix. In the end of the first pass over the stream of update operations, we already know which
protocol to follow, and we just do this, disregarding the other protocol.
We already discussed the streaming version of the algorithm that tests the rank of the matrix
in Lemma 31. Below, we describe separately the two streaming PCA protocols.
7.3.1
Streaming PCA protocol when rank(A) ≤ 2k
The idea here is to implement a streaming version of the distributed PCA protocol in Lemma 36.
Algorithm
1. Construct an n × 2k matrix H′′ as in Lemma 36.
2. Construct affine embedding matrices Tlef t ∈ Rξ1 ×m and Tright ∈ Rn×ξ2 with ξ1 = O(k/ε2 ), ξ2 =
O(k/ε2 ) (see Definition 33).
3. Initialize all-zeros matrices: C ∈ Rm×2k , M ∈ Rξ1 ×ξ2 , L ∈ Rξ×ξ2 , N ∈ Rξ1 ×2k .
4. (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
(a) For all j = 1, ..., 2k, let Ciq ,j = Ciq ,j + xq · H′′jq ,j
5. end
6. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
(a) For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let Mi,j = Mi,j + (Tlef t )i,iq · xq · (Tright )jq ,j .
(b) For all i = 1, ..., 2k, j = 1, ..., ξ2 , let Li,j = Li,j + CT i,iq · xq · (Tright )jq ,j .
(c) For all i = 1, ..., ξ1 , j = 1, ..., 2k, let Ni,j = Ni,j + (Tlef t )i,iq · xq · H′′jq ,j .
7. end
8. Construct
X∗ = argmin kN · X · L − Mk2F := argmin kTlef t AH′′ X(H′′ )T AT ATright − Tlef t ATright k2F .
rank(X)≤k
rank(X)≤k
9. Compute an orthonormal basis U ∈ Rm×k for span(CX∗ ).
37
7.3.2
Streaming PCA protocol when rank(A) > 2k
The idea here is to implement a streaming version of step 3 of the algorithm in Section 6.4.
Algorithm
1. Construct two dense Johnson-Lindenstrauss matrices S ∈ Rξ1 ×m , T ∈ Rn×ξ2 with ξ1 = O(kε−2 ), ξ2 =
O(kε−2 ) (see Lemma 27).
2. Initialize all-zero matrices: B̃ ∈ Rξ1 ×ξ2 , X̂ ∈ Rm×k .
3. For p := 1, ..., ξ1 , q := 1, ..., ξ2 , i := 1, ..., m, j := 1, ..., n
4. Let ri,j = −1/nD with probability 1/2 and ri,j = 1/nD with probability 1/2.
5. B̃p,q = B̃p,q + Sp,i · ri,j · Tj,q
6. end
7. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (first pass over the stream)
8. For all i = 1, ..., ξ1 , j = 1, ..., ξ2 , let B̃i,j = B̃i,j + Si,iq · xq · Tjq ,j .
9. end
T
10. Compute the SVD of B̃k = UB̃k ΣB̃k VB̃
(UB̃k ∈ Rξ1 ×k , ΣB̃k ∈ Rk×k , VB̃k ∈ Rξ2 ×k ). Then, we
k
round each of the entries of VB̃k to the nearest integer multiple of 1/nγ for a sufficient large constant
γ > 0. Let the matrix after the rounding be V̂B̃k .
11. For (iq , jq , xq ) := (i1 , j1 , x1 ), ..., (il , jl , xl ) (second pass over the stream)
12. For all i = 1, ..., ξ2 , j = 1, ..., k, let X̂iq ,j = X̂iq ,j + xq · Tjq ,i · (V̂B̃k )i,j .
13. end
14. Compute an orthonormal basis U ∈ Rm×k for span(X̂) (notice that rank(X̂) ≤ k).
7.3.3
Main result
The theorem below analyzes the approximation error, the space complexity, and the running time
of the previous algorithm. Notice that the space complexity of this algorithm is given in terms of
machine words.
Theorem 55. The matrix U ∈ Rm×k with k orthonormal columns satisfies with arbitrarily large constant
probability:
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F .
The space complexity of the algorithm is
O mk + poly(kε−1 )
machine words, the running time of each update operation is O(poly(kε−1 )), and the total running time is
of the order
O l · poly(kε−1 ) + mk2
where l is the total number of update operations.
Proof. The matrix U - up to the randomness in the algorithms - is exactly the same matrix as in the
algorithm in Theorem 43, hence the approximation bound in that theorem shows the claim.
To see the space complexity of the algorithm, observe that it suffices to maintain all the “sketch”
matrices in the both two protocols above.
Since ξ1 , ξ2 in both protocols are poly(kε−1 ), the running time for each update operation is
O(poly(kε−1 )). Additional O(mk 2 ) running time is caused by computing U in the final step.
38
8 Distributed PCA for sparse matrices in column-partition model
Recall that in the problem of Definition
15 we are given
P 1) an m × n matrix A partitioned columnwise as A = A1 A2 . . . As , with Ai ∈ Rm×wi ( wi = n); 2) a rank parameter k < rank(A);
3) an accuracy parameter ε > 0. We would like to design an algorithm that finds an m × k matrix
U with UT U = Ik and, upon termination, leaves this matrix U in each machine of the network.
The high level idea of our algorithm is to find, in a distributed way, a small set - O(kε−1 ) - of
columns from A and then find U in the span of those columns. To choose those O(kε−1 ) columns
of A in a distributed way we implement the following three-stage sampling procedure:
1. Local sampling: Each machine samples O(k) columns using the sampling algorithm from [24].
2. Global sampling: The server collects the columns from each machine and down-samples
them to O(k) columns using the deterministic algorithm from [17].
3. Adaptive sampling: the server sends back to each machine those O(k) columns; then, an
extra of O(kε−1 ) columns are selected randomly from the entire matrix A using [26].
We argue that if C̃ contains the columns selected with this three-stage approach, then, w.p. 0.99,
†
(A)k2F ≤ (1 + O(ε)) · kA − Ak k2F .
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
(A) to be the rank k matrix that approximates A, we are not
Though we could have used ΠF
C̃,k
(A). To address this issue, using
familiar with any communication-efficient computation of ΠF
C̃,k
(A)k2F ;
an idea from [37], we compute U ∈ span(C̃) such that kA−UUT Ak2F ≤ (1+O(ε))kA−ΠF
C̃,k
this U can be calculated with small communication cost and it is sufficient for our purposes.
Before presenting the new algorithm in detail, we discuss results from previous literature that
we employ in the analysis.
8.1 Background material
8.1.1
Column sampling algorithms
Our distributed PCA algorithm in Section 8 samples columns from the input matrix in three stages:
1. Local sampling: O(k) columns are selected locally in each machine.
2. Global sampling: O(k) columns are selected in the server.
3. Adaptive sampling: an extra O(kε−1 ) columns are selected from the entire matrix A.
In the first stage, we use a sampling algorithm mentioned in [24]. Actually, the sampling
algorithm is the same as the Batson, Spielman, and Strivastava (BSS) spectral sparsification algorithm [11]. But Cohen et al. showed that a small set of columns sampled by BSS sampling
algorithm can provide a projection-cost preserving sketch. In the second stage, we use a deterministic algorithm developed in [17], which itself extends the Batson, Spielman, and Strivastava
(BSS) spectral sparsification algorithm [11]. For the actual algorithm in the first stage we defer
the reader to Theorem 15 in [24]. Lemma 56 states the result. And for the actual algorithm in the
second stage we defer the reader to Lemma 3.6 in [17]. Lemma 57 and Lemma 58 below present
the relevant results. In the third sampling stage, we use an adaptive sampling algorithm from [26].
39
Lemma 56 (BSS Sampling for Projection-Cost Preserving Sketch. Theorem 15 in [24]). Let A ∈
Rm×w be an arbitrary matrix. For any integer 0 < k < m, real numbers 0 < ε < 1, 0 < δ, there
is a randomized algorithm that runs in O(nnz(A) log(m/δ) + m · poly(k, ε, log(1/δ))) time, and constructs a “sampling/rescaling” w × O(k/ε2 ) matrix S with probability at least 1 − δ such that S is
an (ε, k)-projection-cost preserving sketching matrix of A. We denote this sampling procedure as S =
BssSamplingI(A, k, ε, δ).
In words, there exists a randomized algorithm that runs in near input-sparsity running time
can construct a projection-cost preserving sketch of a given matrix A by sampling and rescaling a
small subset of columns of A.
Lemma 57 (Dual Set Spectral-Frobenius Sparsification. Lemma 3.6 in [17]). Let V ∈ Rw×k be a
matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Then, given an integer ℓ such
that k < ℓ ≤ w, there exists a deterministic algorithm that runs in O ℓwk2 + mw time, and constructs a
“sampling/rescaling” w × ℓ matrix S such that
p 2
σk2 V T S ≥ 1 − k/ℓ ,
kESk2F ≤ kEk2F .
Specifically, rank(V T S) = k. We denote this sampling procedure as S = BssSamplingII(V, E, ℓ).
In words, given V and E, there exists an algorithm to select (and rescale) a small number of
columns from E and rows from V such that: 1) the Frobenius norm squared of the sampled E is
less than the Frobenius norm squared of E; 2) the sampled V has rank equal to the rank of V; and
p 2
3) the smallest singular value squared of the sampled V is bounded from below by 1 − k/ℓ .
Lemma 58 (Constant factor column-based matrix reconstruction; Theorem 5 in [17]). Given matrix G ∈ Rm×α of rank ρ and a target rank k 1 , there exists a deterministic algorithm that runs in
O αm min{α, m} + αck2 time and selects c > k columns of G to form a matrix C ∈ Rm×c with
†
kG − CC
Gk2F
≤
rank
X(G)
p −2
1 + 1 − k/c
·
σi2 (G).
i=k+1
The algorithm in this theorem finds C as C = GS, where S = BssSamplingII(V, G − GVV T , c)
and V ∈ Rα×k contains the top k right singular vectors of G. We denote this sampling procedure as
C = DeterministicCssF robenius(G, k, c).
In words, there exists a deterministic algorithm, running in polynomial time, to select any
number of c > k columns from the given matrix G, such that the residual error, in Frobenius
norm, from projecting G onto the span of the sampled columns is bounded from above with
respect to the residual error of the best rank k matrix from the SVD of G. Notice that
rank
X(G)
i=k+1
σi2 (G) = kG − Gk k2F ,
where Gk ∈ Rm×α has rank at most k and is computed via the SVD of G.
1
The original Theorem 5 in [17] has the assumption that k < ρ, but this assumption can be dropped having the result
unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial.
40
Before presenting the adaptive sampling theorem from [26] we introduce some useful notation
m×n is the
used in the lemma. Let A ∈ Rm×n , k < n, and V ∈ Rm×c with k < c < n. ΠF
V,k (A) ∈ R
best rank k approximation to A - wrt the Frobenius norm - in the column span of V. Equivalently,
ΠF
V,k (A) = VXopt , where
Xopt =
argmin
kA − VXk2F .
X∈Rc×n ,rank(X)≤k
Lemma 59 (Adaptive sampling; Theorem 2.1 of [26]). Given A ∈ Rm×n and V ∈ Rm×c1 (with
c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . For j = 1, . . . , n, let pj be a probability
distribution such that pj ≥ βkΨ(j) k22 /kΨk2F , for some 1 > β > 0, where Ψ(j) is the j-th column of the
matrix Ψ. Sample c2 columns from A in c2 i.i.d. trials, where in each trial the j-th column is chosen with
probability pj . Let C2 ∈ Rm×c2 contain the c2 sampled columns and let C = [V C2 ] ∈ Rm×(c1 +c2 )
contain the columns of V and C2 . Then, for any integer k > 0,
rank
i
h
X(A)
2
F
†
2
E kA − CC AkF ≤ E kA − ΠC,k (A)kF ≤
σi2 (A) +
i=k+1
k
· kA − VV† Ak2F .
β · c2
Given A and C, this method requires O(c1 mn) time to compute Ψ, another O(mn) time to compute
the probabilities pj ’s and another O(n + c2 ) time for the sampling step - using the method in [51]. In
total, the method requires O(c1 mn + c2 ) time to compute C2 . We denote this sampling procedure as
C2 = AdaptiveCols(A, V, c2 , β).
In words, given the matrix A and the subspace V, there exists a randomized algorithm to
sample an additional of c2 columns from A, based on probabilities from the residual error matrix
A − VV† A, such that residual error, in Frobenius norm, from projecting A onto the span of the
union of the columns of V and the sampled columns is bounded from above with respect to the
best rank k approximation to A, the residual A − VV† A, and the number of sampled columns c2 .
8.1.2
Distributed adaptive sampling
In our distributed PCA algorithm below, we also need to use a distributed version of the previous
adaptive sampling procedure. We provide some preliminary results for that task in this section.
Lemma 60. Suppose that the columns of an m × n matrix A are partitioned arbitrarily across the machines
into matrices A1 , . . . , As . Let C be an arbitrary m × r matrix. Consider the distribution p on n columns
in which
kaj − CC† aj k2F
,
pj =
kA − CC† Ak2F
where aj is the j-th column of A (j = 1 : n here).
For each i ∈ [s], let some value βi satisfies
kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F .
For each j ∈ [n], if column aj is held on the i-th server (denoted aij ), then let
q j = Ps
βi
i′ =1 βi′
Then for each j ∈ [n],
·
kaij − CC† aij k22
kAi − CC† Ai k2F
pj /2 ≤ qj ≤ 2pj .
41
.
Proof. By definition of the β i , we have that
Hence,
kAi − CC† Ai k2F
2kAi − CC† Ai k2F
βi
P
≤
.
≤
s
2kA − CC† Ak2F
kA − CC† Ak2F
i′ =1 βi′
pj /2 ≤ qj ≤ 2pj .
Lemma 61. Suppose the coordinator has an m × r matrix C of columns of an m × n matrix A, where
r = O(k). Suppose the entries of A are integers bounded by poly(mns/ε) in magnitude, and let the
columns of A be partitioned arbitrarily across the servers into matrices A1 , . . . , As .
There is a protocol using O(skm) machine words of communication for the coordinator to learn values
i
β so that for all i ∈ [s],
kAi − CC† Ai k2F ≤ β i ≤ 2kAi − CC† Ai k2F .
Proof. The coordinator first sends C to all machines. The i-th server locally computes kAi −
CC† Ai k2F . If this number is 0, he/she sends 0 to the coordinator, and in this case β i satisfies
the requirement in the statement of the lemma.
Otherwise, consider the matrix Bi which is formed by concatenating the columns of Ai with
those of C. Then
kBi − CC† Bi k2F = kAi − CC† Ai k2F > 0,
(9)
since the columns of Bi in C contribute a cost of 0. However, since Bi contains the columns of C
and its cost is non-zero, it implies the rank of Bi is at least r + 1. By Corollary 38, this implies
kBi − CC† Bi k2F > (mns/ε)−O(k) ,
which by (9) gives the same lower bound on kAi − CC† Ai k2F . Note also that
kAi − CC† Ai k2F ≤ poly(mns/ε),
since kAk2F ≤ poly(mns/ε). This implies if the i-th machine sends β i to the coordinator, where β i
is the nearest power of 2 to kAi − CC† Ai k2F , there will only be O(k log(mns/ε)) possible values
of β i , and hence each can be specified using O(log k + log log(mns/ε)) bits, i.e., a single machine
word. This completes the proof.
8.1.3
Low-rank matrix approximations within a subspace
The final stage of our distributed PCA algorithm below finds U ∈ span(C̃) such that the error
of the residual matrix A − UUT A is “small”. To implement this step, we employ an algorithm
developed in [37].
Lemma 62. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume
that for some rank parameter k < c and accuracy parameter 0 < ε < 1 :
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF .
Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ ,
√
√
where W T ∈ Rn×ξ with ξ = O(c/ε2 ), each element of which is chosen i.i.d. to be {+1/ n, −1/ n} with
42
probability 1/2. Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least
1 − e−c ,
kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F .
Y, and ∆ can be computed in O(mnξ) time. We denote this procedure as
[Y, ∆] = ApproxSubspaceSV D(A, V, k, ε).
Proof. This result was essentially proven inside the proof of Theorem 1.1 in [36]. Specifically, the
error bound proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]).
As for the running time, given A, V, and k, one can compute (i) Y in O(mc2 ) time; (ii) Ξ in
O(mnξ + mcξ) time; and (iii) ∆ in O(c2 ξ) time.
In words, the lemma indicates that given the matrix A and the subspace V such that
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ǫ))kA − Ak kF ,
for some small ε > 0, there exists a randomized algorithm to compute matrices Y ∈ span(V)
and ∆ such that the residual error, in Frobenius norm, from projecting A onto the span of Y∆ is
also bounded by (1 + O(ǫ))kA − Ak k2F . Notice that ∆ contains the top k left singular vectors of
a “sketched” version of Y T A, a property which makes the computation particularly effective in
terms of running time.
8.2 Detailed description of the algorithm
Input:
1. A ∈ Rm×n partitioned column-wise A = A1
A2
2. rank parameter k < rank(A)
P
. . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n.
3. accuracy parameter ε > 0
Algorithm
1. Local Column Sampling
(a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from
Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows:
Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56).
(b) Machine i sends Ci to the server.
2. Global Column Sampling
(a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows:
G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns
from G as follows: C = DeterministicCssF robenius(G, k, c1 ) (see Lemma 58).
(b) Server sends C to all the machines.
3. Adaptive Column Sampling
(a) Machine i computes Ψi = Ai − CC† Ai ∈ Rm×wi and then computes βi as it was described in
Lemma 61. Machine i sends βi to server.
(b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement
i
⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s),
where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines.
43
(c) Machine i computes probabilities qji = kxk22 /kΨi k2F (j = 1 : wi ), where x is the jth column of
Ψi . And now machine i samples ti samples fromP
it’s local probability distribution and sends
the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉.
(d) Server collects the columns and assigns
them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the
m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉.
4. Rank-k matrix in the span of C̃
(a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of
C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular.
1/2. Implicitly
(b) Machine i generates W̃i ∈ Rξ×wi with ξ = O(c/ε2 ) to be i.i.d.
{+1, −1} w.p.ξ×n
, with W̃ ∈ R
. Machine i
all machines together generate W̃ = W̃1 W̃2 . . . W̃s
T
computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ . Machine i sends Hi to the server.
P
(c) Server computes Ξ = si=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines
√
compute Ξ := R−1 · Ξ · 1/ n(:= Y T AWT ), where
∈ Rξ×n is
W √= W1 W2 . . . Ws
√
random matrix each element of which is {+1/ n, −1/ n} w.p. 1/2, and then they compute
∆ ∈ Rc×k to be the top k left singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k .
Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage
(adaptive column sampling), implements the adaptive sampling method of Lemma 59. To see this,
note that each column in A (specifically the jth column in Ai ) is sampled with probability
gi · qji ≥
1 ||xij ||22
,
·
2 kΨk2F
where Ψ = A − CC† A. This follows from Lemma 60. Overall, this stage effectively constructs Ĉ
such that (see Lemma 59)
Ĉ = AdaptiveCols(A, C, c2 , 1/2).
The last stage in the algorithm implements the algorithm in Lemma 62. To see this, note that
W satisfies the properties in the lemma. Hence,
[Y, ∆] = ApproxSubspaceSV D(A, C̃, k, ε).
8.3 Main Result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm.
Theorem 63. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. at least 0.98,
†
(A)k2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F .
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
(10)
The matrix U ∈ Rm×k with k orthonormal columns satisfies with probability at least 0.97,
kA − UUT Ak2F ≤ (1 + O(ε)) · kA − Uk UkT Ak2F .
(11)
Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is
O skφε−1 + sk2 ε−4 and the running time is O (mns · poly(k, 1/ε)) .
44
8.4 Proof of Theorem 63
8.4.1
Proof of Eqn. 10
From Lemma 59:
h
†
E kA − C̃C̃
Ak2F
i
h
≤ E kA −
(A)k2F
ΠF
C̃,k
i
≤
rank
X(A)
σi2 (A) +
i=k+1
2ε
· kA − CC† Ak2F .
50
(12)
Therefore, we need to bound kA − CC† Ak2F now.
Lemma 64. With probability at least 0.99, matrix G is a (4k, 1/2)-projection-cost preserving sketch of A.
Proof. For each i, Ci = Ai Si is a (4k, 1/2)-projection-cost preserving sketch of Ai with probability
at least 1 − 0.01/s. Due to union bound, with probability at least 1 − 0.01, ∀i, Ci is a (4k, 1/2)projection-cost preserving sketch of Ai . Since Ci is a (4k, 1/2)-projection-cost preserving sketch of
Ai , we can assume ci is a constant which is independent from projection matrix P which has rank
at most 4k such that
3
1
kAi − PAi k2F ≤ kCi − PCi k2F + ci ≤ kAi − PAi k2F
2
2
Then, for any projection matrix P which has rank at most 4k we have:
s
1
1X
kAi − PAi k2F
kA − PAk2F =
2
2
i=1
≤
s
X
i=1
kCi − PCi k2F + ci
s
≤
3X
kAi − PAi k2F
2
i=1
3
≤ kA − PAk2F
2
Consider the right hand side of the first inequality, it is equal to
kG −
Let constant c =
Ps
i=1 ci ,
PGk2F
+
s
X
ci
i=1
we have:
1
3
kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F
2
2
Therefore, G is a (4k, 1/2)-projection-cost preserving sketch of A.
For convenience, we use PG to denote a rank-k projection matrix which provides the best
rank-k approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection
45
matrix which provides the best rank-k approximation Ak = PA A to matrix A. Thus,
1
kA − CC† Ak2F ≤ kG − CC† Gk2F + c
2
≤ 5kG − PG Gk2F + c
≤ 5kG − PA Gk2F + c
≤ 5 kG − PA Gk2F + c
15
kA − PA Ak2F
≤
2
The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A
and C has rank at most 4k. The second inequality is based on Lemma 58. The third inequality is
because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is
non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch
of A. Thus,
kA − CC† Ak2F ≤ 15kA − Ak k2F
Combining with equation 12, we have:
h
E kA − C̃C̃
†
Ak2F
i
h
≤ E kA −
(A)k2F
ΠF
C̃,k
i
30
≤ (1+ ε)
50
rank
X(A)
i=k+1
σi2 (A) = (1+O(ε))kA−Ak k2F (13)
Concluding the proof. Consider about
rank
i rank
i
h
h
X(A)
X(A)
†
2
2
≤
(A)
+
O(ε)
σ
σi2 (A).
(A)k
E kA − C̃C̃ Ak2F ≤ E kA − ΠF
i
F
C̃,k
i=k+1
(14)
i=k+1
Prank(A)
The expectation is taken w.r.t. the randomness in constructing C̃; hence, the term i=k+1 σi2 (A)
is a constant w.r.t. the expectation operation, which means that Eqn. 14 implies the bound:
rank
rank
X(A)
X(A)
F
2
2
E kA − ΠC̃,k (A)kF −
σi (A) ≤ O(ε) ·
σi2 (A).
i=k+1
(A)k2F −
Let Y := kA − ΠF
C̃,k
Prank(A)
i=k+1
i=k+1
σi2 (A). Y is a random variable with Y ≥ 0, because
(A)) ≤ k. Markov’s inequality on Y implies that with arbitrary constant probability,
rank(ΠF
C̃,k
kA −
ΠF
(A)k2F
C̃,k
kA −
(A)k2F
ΠF
C̃,k
−
rank
X(A)
σi2 (A)
≤
rank
X(A)
σi2 (A) +
i=k+1
≤ O(ε) ·
rank
X(A)
σi2 (A),
rank
X(A)
σi2 (A).
i=k+1
equivalently,
†
i=k+1
O(ε) ·
(A)k2F concludes the proof.
Using kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
46
i=k+1
8.4.2
Proof of Eqn. 11
We would like to apply Lemma 62 for the matrix U ∈ Rm×k in the algorithm. Note that we
have already proved that the matrix C̃ in the algorithm satisfies with probability at least 0.99:
(A)k2F ≤ (1 + O(ε))kA − Ak k2F . Lemma 62 and a simple union bound conclude the
kA − ΠF
C̃,k
proof.
8.4.3
Running time
Next, we give an analysis of the arithmetic operations required in various steps in the algorithm.
1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in
total.
(a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si
(b) -
2. Global Column Sampling: O(sk 3 + skm) arithmetic operations in total.
(a) O(sk 3 + skm) to construct C.
(b) 3. Adaptive Sampling O(sk 2 m + mnk + k/ε) arithmetic operations in total.
(a) O(k2 m) for each C† locally; O(wi mk) for each Ψi and O(mwi ) for each ψi .
(b) O(s) in total.
(c) O(k/ε) in total using the method of [51] locally.
(d) O(k/ε).
4. Rank-k matrix in span(C̃): O(mnk/ε3 + smk 2 /ε4 + sk 3 /ε5 ) arithmetic operations in total.
(a) O(smk 2 /ε2 ) in total
T
(b) O(mwi k/ε3 ) for each Ai WiT and another O(mk2 ε−4 ) for each C̃ (Ai WiT )
(c) O(sk 2 ε−3 ) to find Ξ in the server; then another O(sk 3 ε−3 + sk 3 ε−5 )) to update Ξ locally in each machine and another O(sk 3 ε−5 ) to find ∆ locally in each machine; and
O(smk 2 /ε) to find U locally in each machine.
8.4.4
Communication Complexity
Assume that we can represent each element in the input matrix A with at most b bits. Also, we
assume that one word has length b bits and b = O(log(mns/ε)).
1. Local Column Sampling: O(skφ) words.
(a) (b) O(skφ) elements of A.
2. Global Column Sampling:O(skφ) words.
(a) 47
(b) O(skφ) elements of A.
3. Adaptive Sampling: O(s + φk/ε) words.
(a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61).
(b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits.
(c) O(φk/ε) elements of A.
(d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 2 ε−4 ) words.
(a) O(skφε−1 ) elements of A.
(b) O(sk 2 ε−4 ) numbers each of which can be represented with b bits.
(c) O(sk 2 ε−4 ) numbers each of which can be represented with b bits.
In total the communication complexity is O(skφ/ε + sk 2 /ε4 ) words.
9 Faster Distributed PCA for sparse matrices
We now explain how to modify certain steps of the distributed PCA algorithm in Section 8 in order
to improve the total running time spent to compute the matrix U; this, at the cost of increasing the
communication cost slightly. Specifically, we replace the parts 2-(a), 3-(a), and 4-(b) with similar
procedures, which are almost as accurate as the original procedures but run in time proportional
to the number of the non-zero elements of the underlying matrices. Before presenting the new
algorithm in detail, we discuss results from previous literature that we employ in the analysis. We
remark that in the analysis below we have not attempted to optimize the constants.
9.1 Background material
9.1.1
Constant probability sparse subspace embeddings and sparse SVD
First, we present the so-called sparse subspace embedding matrices of Clarskon and Woodruff [23].
Definition 65. [Sparse Subspace Embedding [23]] We call W ∈ Rξ×n a sparse subspace embedding of
dimension ξ < n if it is constructed as follows, W = Ψ · Y, where
• h : [n] → [ξ] is a random map so that for each i ∈ [n], h(i) = ξ ′ , for ξ ′ ∈ [ξ] w.p. 1/ξ.
• Ψ ∈ Rξ×n is a binary matrix with Ψh(i),i = 1, and all remaining entries 0.
• Y ∈ Rn×n is a random diagonal matrix, with each diagonal entry independently chosen to be +1 or
−1, with equal probability.
Such sparse subspace embedding matrices have favorable properties which we summarize
below:
Lemma 66 ([23]). Let AT ∈ Rn×m have rank ρ and let W ∈ Rξ×n be a randomly chosen sparse subspace
embedding with dimension ξ = Ω(ρ2 ε−2 ), for some 0 < ε < 1. Then, 1) computing AW T requires
O(nnz(A)) time; 2) nnz(AW T ) ≤ nnz(A); and 3) with probability at least 0.99, and for all vectors
y ∈ Rm simultaneously,
(1 − ε)kA T yk22 ≤ kWA T yk22 ≤ (1 + ε)kA T yk22 .
48
Notice that the third property in the lemma fails with constant probability. Based on the above
sparse subspace embeddings, Clarkson and Woodruff [23] described a low-rank matrix approximation algorithm for A that runs in time nnz(A) plus low-order terms.
Lemma 67 (Theorem 47 in [23]; for the exact statement see Lemma 3.4 in [19]). Given A ∈ Rm×n
of rank ρ, a target rank 1 ≤ k < ρ, and 0 < ǫ ≤ 1, there exists a randomized algorithm that computes
Z ∈ Rn×k with ZT Z = Ik and with probability at least 0.99,
kA − AZZT k2F ≤ (1 + ǫ) kA − Ak k2F .
The proposed algorithm requires O nnz(A) + (m + n) · poly(k, ε−1 ) arithmetic operations. We denote
this procedure as Z = SparseSV D(A, k, ε).
Notice that the algorithm in the lemma fails with constant probability.
9.1.2
High probability sparse SVD
Lemma 67 above presents a randomized algorithm to compute quickly an SVD of a sparse matrix;
however, this lemma fails with constant probability. Since in our fast distributed PCA algorithm
we will use the lemma multiple times (specifically, s times, since we need such a fast SVD locally
in each machine), the overall failure probability would be of the order O(s) (by a union bound).
To boost this failure probability, we develop a simple scheme to obtain a high probability result.
Before we proceed, we quickly review the Johnson Lindestrauss transform, which we need in
the analysis.
Lemma 68. [Theorem 1 in [5] for fixed ε = 1/2] Let B ∈ Rm×n . Given β > 0, let r = (1/2)4+2β
2 −(1/2)3 log n.
√
r×m
Construct a matrix S ∈ R
, each element of which is a random variable which takes values ±1/ r with
equal probability. Let B̃ = SB. Then, if bi and b̃i denote the ith column of B and B̃, respectively, with
probability at least 1− n−β , and for all i = 1, ...n, (1− 21 )kbi k22 ≤ kb̃i k22 ≤ (1+ 12 )kbi k22 . Given B, it takes
O(nnz(B) log n) arithmetic operations to construct B̃. We will denote this procedure as B̃ = JLT (B, β).
Now, we are fully equipped to design the “high-probability” analog of Lemma 67:
Lemma 69. Given A ∈ Rm×n of rank ρ, a target rank 1 ≤ k < ρ, and 0 < δ, ǫ ≤ 1, there exists a
randomized algorithm that computes Z ∈ Rn×k with ZT Z = Ik and with probability at least 1 − δ− 1/n,
kA − AZZT k2F ≤ 3 (1 + ǫ) kA − Ak k2F . The proposed algorithm requires O nnz(A) log2 ( nδ ) + n ·
poly(k, ε, log( nδ )) arithmetic operations. We denote this procedure as Z = SparseSV DBoosting(A, k, ε, δ).
Proof. The idea is to use the algorithm in Lemma 67 and generate i.i.d. r = O(log( 1δ )) matrices
Z1 , Z2 , . . . , Zr , where Zi = SparseSV D(A, k, ε), and kA − AZi ZiT k2F ≤ (1 + ε)kA − Ak k2F , with
probability at least 0.99 for a single Zi .
Now, we could have chosen Z := Zi which minimizes kA − AZi ZiT k2F , and this would have
implied that kA − AZZT k2F ≤ (1 + ε)kA − Ak k2F , with probability 1 − δ (via a simple chernoff
argument), but evaluating the errors kA − AZi ZiT k2F is computationally intensive for the overall
running time that we would like to obtain.
Selection of Z. Instead, we use the Johnson Lindestrauss transform to speedup this computation
(evaluating the errors). Hence, for every Zi , we (implicitly) set Bi := A − AZi ZiT and then we
compute B̃i = JLT (Bi , 1) (see Lemma 68). Now, we choose the Zi that minimizes kB̃i k2F .
49
Correctness. For a fixed Zi , from Lemma 68 it follows that with probability 1 − 1/n it is: 21 kA −
AZi ZiT k2F ≤ kB̃i k2F ≤ 23 kA−AZi ZiT k2F , where the failure probability is over the randomness of S in
Lemma 68. Now, for some Zi with probability at least 0.99 it is kA− AZi ZiT k2F ≤ (1+ ε)kA − Ak k2F ,
where the failure probability is over the randomness in constructing Zi . Overall, given that n > 1,
with probability at least 0.49 (over the randomness of both S and Zi ; the failure probability follows
via a union bound) for each single Zi it is: kB̃i k2F ≤ 23 (1 + ε)kA − Ak k2F . Hence, since r = O(log 1δ )
and we have picked Z as the Zi that minimizes kB̃i k2F , it follows that with probability at least 1− δ,
kB̃i k2F ≤ 23 (1+ε)kA −Ak k2F . Combining with 21 kA−AZi ZiT k2F ≤ kB̃i k2F , and using a union bound,
it follows that with probability 1 − 1/n − δ: kA − AZi ZiT k2F ≤ 62 (1 + ε)kA − Ak k2F .
Running time. The following costs occur O(log( 1δ )) times: (i) O nnz(A) + (m + n) · poly(k, ε−1 )
to find Zi (via Lemma 67); (ii) O(nnz(A) log n + nk log(n)) to evaluate each cost, i.e., find kB̃i k2F .
9.1.3
Fast column sampling techniques
Section 8.1.1 presented the column sampling algorithms that we used in our distributed PCA
algorithm in Section 8. Next, we present the “fast” analogs of those algorithms. To design such
fast analogs we employ the sparse subspace embedding matrices in the previous section. All the
results in this section developed in [19]. There is a small difference in Lemma 70 below, hence we
present a short proof for completeness. Specifically, the original result in [19] has a constant failure
probability; here, via using standard arguments, we extended this result to a high probability
bound.
Lemma 70 (Input-Sparsity-Time Dual-Set Spectral-Frobenius Sparsification [19].). Let V ∈ Rw×k
be a matrix with w > k and V T V = Ik . Let E ∈ Rm×w be an arbitrary matrix. Let δ be a failure
probability parameter.
For i = 1, 2, . . . , r = O(log 1δ ), let Bi = EWiT ∈ Rm×ξ , where Wi ∈ Rξ×w is a randomly chosen
sparse subspace embedding with ξ = O(k2 /ε2 ) < w, for some 0 < ε < 1 (see Definition 65 and Lemma 66),
and run the algorithm of Lemma 57 with V, Bi , and some ℓ with k < ℓ ≤ w, to construct Si ∈ Rw×ℓ .
Choose some S from the Si ’s - see the proof for the details.
2
p 2
1+ε
· kEk2F .
Then, with probability at least 1 − δ, σk2 V T S ≥ 1 − k/ℓ and kESk2F ≤ 1−ε
The matrix S can be computed in O log 1δ · nnz(A) + ℓwk2 + mk 2 /ε2 + mℓ time. We denote this
procedure as S = BssSamplingSparse(V, A, r, ε, δ).
Proof. The algorithm constructs the Si ’s as follows, Si = BssSampling(V, Bi , r) - see Lemma 57.
p 2
From that lemma, we also have that σk2 V T Si ≥ 1 − k/ℓ and kBiT Sk2F ≤ kBiT k2F , i.e.,
kWi AT Si k2F ≤ kWi AT k2F . Since Wi is a subspace embedding, from Lemma 66 we have that with
probability at least 0.99 and for all vectors y ∈ Rn simultaneously, (1 − ε) kAT yk22 ≤ kWi AT yk22 .
Apply this r times for y ∈ Rn being columns from Si ∈ Rn×r and take a sum on the resulting
inequalities: (1 − ε) kAT Si k2F ≤ kWAT Si k2F ; also, apply this n times for the basis vectors in Rn
and take a sum on the resulting inequalities: kWA T k2F ≤ (1 + ε) kA T k2F . Combining all these
· kA T k2 .
inequalities together, we conclude that with probability at least 0.99, kAT Si k2F ≤ 1+ε
1−ε p F2
To summarize, for each Si and with probability at least 0.99, σk2 V T Si ≥ 1 − k/ℓ and
2
· kEk2F .
kESi k2F ≤ 1+ε
1−ε
50
Selection of S. Now that we have r matrices Si each of which satisfying the above bounds with
probability 0.99 we select one of them as follows: 1) we compute all σk2 V T Si and sort them from
the largest to the smallest value; 2) we compute all kAT Si k2F and sort them from the smallest to
the largest value; 3) we choose an Si which occurs in the top 2/3 fraction of each of the lists.
Correctness. Let Xi be an indicator random variable: Xi = 1 if the ith matrix Si satisfies σk2 V T Si ≥
p 2
P
1 − k/ℓ , and Xi = 0, otherwise. Then, Pr[Xi ] ≥ 0.99. Let X = ri Xi . The expected value of
X is µX = E [X] = 0.99r. A standard Chernoff bound applied on X gives: Pr[X ≤ (1 − α)µX ] ≤
µX α
e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get:
Pr[X ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[X ≤ 0.75r] ≤ δ/2. This means precisely
p 2
that 3/4 of the fraction of the Si ’s satisfy with probability 1 − δ/2 : σk2 V T Si ≥ 1 − k/ℓ .
Similarly, let Yi be an indicator random variable: Yi = 1 if the ith matrix Si satisfies kESi k2F ≤
2
P
1+ε
· kEk2F , and Yi = 0, otherwise. Then, Pr[Yi ] ≥ 0.99. Let Y = ri Xi . The expected value of
1−ε
Y is µY = E [Y ] = 0.99r. A standard Chernoff bound applied on Y gives: Pr[Y ≤ (1 − α)µY ] ≤
µY α
e− 2 . Let (1 − α)0.99r = 0.75r, i.e., α = 0.14/0.99. Applying this to the Chernoff bound, we get:
Pr[Y ≤ 0.75r] ≤ e−O(r) . Replacing r = O(log(1/δ)): Pr[Y ≤ 0.75r] ≤ δ/2. This means precisely
2
1+ε
· kEk2F .
that 3/4 of the fraction of the Si ’s satisfy w.p. 1 − δ/2 : kESi k2F ≤ 1−ε
Now a simple union bound indicates that with probability at least 1 − δ, the following two
events happen simultaneously: X > 0.75r and Y > 0.75r. Since we select an element Si on top of
the two sorted lists, it follows that this element should have Xi = Yi = 1.
Running time. The following costs occur O(log( 1δ )) times: (i) O(nnz(A)) to find Bi . (i) O(ℓwk2 +
mξ) to find Si (via Lemma 57); and (iii) O(k 2 ℓ + mℓ) to evaluate each cost and, i.e., find σk2 V T Si
and kESi k2F . Additionally, O(log( 1δ ) log log( 1δ )) time in total is spent in sorting.
The following Lemma is the “fast” analog of Lemma 58. The failure probability in the lemma is
constant, but this is sufficient for our purposes since we apply this lemma only once in the global
column sampling step of the distributed PCA algorithm in Section 9.2.
Lemma 71 (Input-Sparsity-Time constant factor column-based matrix reconstruction; Lemma 6.3
2
in [19]). Given matrix G ∈ Rm×α of rank ρ and a target
rank k , there exists a randomized algorithm
−1
that runs in O nnz(A) · log α + m · poly(log α, k, ε ) time and selects c = 4k columns of G to form a
matrix C ∈ Rm×c such that with probability at least 0.69:
kG − CC† Gk2F ≤ 4820 ·
rank
X(G)
σi2 (G).
i=k+1
We denote this procedure as C = DeterministicCssF robeniusSparse(G, k, c).
Finally, the lemma below presents the “fast” analog of Lemma 59. The failure probability in
the lemma is, again, constant; we have not attempted to obtain a high probability bound since we
employ this lemma only once in the algorithm in Section 9.2.
2
The original Lemma 6.3 in [19] has the assumption that k < ρ, but this assumption can be dropped having the
result unchanged. The only reason the assumption k < ρ exists is because otherwise column subset selection is trivial.
51
Lemma 72 (Input-sparsity-time Adaptive Sampling [19]). Given A ∈ Rm×n and V ∈ Rm×c1 (with
c1 ≤ n, m), define the residual matrix Ψ = A − VV† A ∈ Rm×n . Let Ψ̃ = JLT (Ψ, 1). For j = 1, . . . , n,
let pj be a probability distribution such that, for some positive constant β ≤ 1, pj ≥ βkΨ̃
(j)
(j) 2
k2 /kΨ̃k2F ,
where Ψ̃ is the j-th column of the matrix Ψ̃. Sample c2 columns from A in c2 i.i.d. trials, where in each
trial the j-th column is chosen with probability pi . Let C2 ∈ Rm×c2 contain the c2 sampled columns and
let C = [V C2 ] ∈ Rm×(c1 +c2 ) contain the columns of V and C2 . Then, for any integer k > 0, and with
probability 0.9 − n1
2
2
kA − ΠF
C,k (A)kF ≤ kA − Ak kF +
30 · k
kA − VV† Ak2F .
β · c2
Given A and V, the algorithm takes O(nnz(A) log n + mc1 log n + mc21 ) time to find C2 . We denote this
sampling procedure as C2 = AdaptiveColsSparse(A, V, c2 , β).
9.1.4
Fast Low-rank matrix approximations within a subspace
Finally, we present the fast analog of the result in Section 8.1.3. The failure probability in the
lemma is, again, constant; we have not attempted to obtain a high probability bound since we
employ this lemma only once in the algorithm in Section 9.2.
Lemma 73. Let A ∈ Rm×n be the input matrix and V ∈ Rm×c be the input subspace. We further assume
that for some rank parameter k < c and accuracy parameter 0 < ε < 1 :
2
2
kA − ΠF
V,k (A)kF ≤ (1 + O(ε))kA − Ak kF .
Let V = YΨ be a qr decomposition of V with Y ∈ Rm×c and Ψ ∈ Rc×c . Let Ξ = Y T AW T ∈ Rc×ξ ,
where W T ∈ Rn×ξ with ξ = O(c/ε2 ), is a sparse subspace embedding matrix (see Definition 65 and
Lemma 66). Let ∆ ∈ Rc×k contain the top k left singular vectors of Ξ. Then, with probability at least 0.99,
kA − Y∆∆T Y T Ak2F ≤ (1 + ε)kA − Ak k2F .
Y and ∆ can be computed in O(nnz(A) + mcξ) time. We denote this procedure as
[Y, ∆] = ApproxSubspaceSV DSparse(A, V, k, ε).
Proof. This result was proven inside the proof of Theorem 1.5 in [36]. Specifically, the error bound
proven in [36] is for the transpose of A (also Y, ∆ are denoted with U, V in [36]). The only requirement for the embedding matrix W (denoted with P in the proof of Theorem 1.5 in [36]) is to be a
subspace embedding for Y T A, in the sense that W is a subspace embedding for A in Lemma 66.
Since our choice of W with ξ = O(c2 /ε2 ) satisfies this requirement we omit the details of the proof.
The running time is O(nnz(A)+mcξ): one can compute (i) Y in O(mc2 ); (ii) Ξ in O(nnz(A)+mcξ);
and (iii) ∆ in O(cξ min{c, ξ}). The failure probability 0.01 from Lemma 66.
9.2 Detailed description of the algorithm
This algorithm is very similar to the algorithm in Section 8.2; we only replace the parts 2-(a), 3-(a),
and 4-(b) with faster procedures.
Input:
1. A ∈ Rm×n partitioned column-wise A = A1
A2
2. rank parameter k < rank(A)
52
P
. . . As ; for i = 1 : s, Ai ∈ Rm×wi ; i wi = n.
3. accuracy parameter ε > 0
4. failure probability δ
Algorithm
1. Local Column Sampling
(a) For each sub-matrix Ai ∈ Rm×wi , compute Ci ∈ Rm×ℓ containing ℓ = O(k) columns from
Ai as follows: Ci = Ai Si . Here, Si has dimensions wi × ℓ and is constructed as follows:
Si = BssSamplingI(Ai , 4k, 1/2, 0.01/s) (see Lemma 56).
(b) Machine i sends Ci to the server.
2. Global Column Sampling
(a) Server constructs m × (s · ℓ) matrix G containing (s · ℓ) actual columns from A as follows:
G = C1 C2 . . . Cs . Then, server constructs C ∈ Rm×c1 via choosing c1 = 4k columns
from G as follows: C = DeterministicCssF robeniusSparse(G, k, c1 ) (see Lemma 71).
(b) Server sends C to all the machines.
3. Adaptive Column Sampling
(a) Server initializes the random seed and communicates it to all the machines. Each machine constructs the same S ∈ Rr×m , with r = (1/2)4+2
2 −(1/2)3 log n, each element of which is a random vari√
able which takes values ±1/ r with equal probability. Machine i finds Ψ̃i = SAi − SCC† Ai ∈
Rm×wi and then computes βi as it was described in Lemma 61. Machine i sends βi to server.
(b) Server computes probability distribution gi = Pβiβi . Server samples i.i.d. with replacement
i
⌈ 50k/ε ⌉ samples (machines) from gi . Then, server determines numbers ti (i = 1, 2, . . . , s),
where ti is the number of times the ith machine was sampled. It sends the ti ’s to the machines.
(c) Machine i computes probabilities qji = kxk22 /kΨ̃i k2F (j = 1 : wi ), where x is the jth column of
Ψ̃i . And now machine i samples ti samples fromP
it’s local probability distribution and sends
the corresponding columns to the server. Let c2 = i ti = ⌈ 50k/ε ⌉.
(d) Server collects the columns and assigns
them to Ĉ ∈ Rm×c2 . Server constructs C̃ to be the
m × (c1 + c2 ) matrix: C̃ = C; Ĉ . Let c = c1 + c2 = 4k + ⌈ 50k/ε ⌉.
4. Rank-k matrix in the span of C̃
(a) Server sends C̃ to all the machines and each machine computes (the same) qr factorization of
C̃: C̃ = YR where Y ∈ Rm×c has orthonormal columns and R ∈ Rc×c is upper triangular.
(b) Server initializes the random seed and sends this to each machine, such that each machine
generates the same matrix Ψ ∈ Rξ×n , for ξ = O(c2 /ε2 ), (see Definition 65). Machine i generates
Di ∈ Rn×wi such that implicitly D = D1 D2 . . . Ds is an n × n matrix each element of
ξ×wi
.
which is ±1, with probability 1/2. Each machine constructs implicitly
i ∈ R
Wi = Ψ · Dξ×n
and W
Implicitly all machines together generate W = W1 W2 . . . Ws , with W ∈ R
T
is a subspace embedding as in Definition 65. Machine i computes Hi = C̃ (Ai WiT ) ∈ Rc×ξ .
Machine i sends Hi to the server.
Ps
(c) Server computes Ξ = i=1 Hi ∈ Rc×ξ and sends this back to all the machines. Now machines
compute Ξ := R−1 · Ξ(:= Y T Ai WiT ), and then they compute ∆ ∈ Rc×k to be the top k left
singular vectors of Ξ. Each machine computes U = Y · ∆ ∈ Rm×k .
53
Discussion. A few remarks are necessary for the last two stages of the algorithm. The third stage
(adaptive column sampling), implements the adaptive sampling method of Lemma 72. To see this
note that each column in A is sampled with probability
qji · gi ≥
1
· ||x||22 /kΨ̃k2F ,
2
where x is this column in Ψ̃. This follows from Lemma 60. Overall, this stage constructs Ĉ such
that Ĉ = AdaptiveColsSparse(A, C, c2 , 1/2).
The last stage in the algorithm implements the algorithm in Lemma 73. To see this, note that
W satisfies the properties in the lemma. Hence,
[Y, ∆] = ApproxSubspaceSV DSparse(A, C̃, k, ε).
9.3 Main result
The theorem below analyzes the approximation error, the communication complexity, and the
running time of the previous algorithm.
Theorem 74. The matrix C̃ ∈ Rm×c with c = O(k/ε) columns of A satisfies w.p. 0.59 −
s+1
n
rank
X(A)
(A)k2F ≤ (1 + O(ε)) ·
kA − C̃C̃ Ak2F ≤ kA − ΠF
σi2 (A) .
C̃,k
†
− 2δ:
(15)
i=k+1
The matrix U ∈ Rm×k with k orthonormal columns satisfies w.p. 0.58 −
kA − UUT Ak2F ≤ (1 + O(ε)) ·
rank
X(A)
i=k+1
s+1
n
− 2δ:
σi2 (A) .
(16)
Let each column of Ahas at most φ non-zero elements. Then, the communication cost of the algorithm is
O skφε−1 + sk3 ε−5 and the running time is
ns
ns
O nnz(A) · log2
+ (m + n)s · poly(k, ε−1 , log
.
δ
δ
9.4 Proof of Theorem 74
9.4.1
Proof of Eqn. 15
From Lemma 72, we have that with probability at least 0.9 − n1 :
†
(A)k2F ≤
kA − C̃C̃ Ak2F ≤ kA − ΠF
C̃,k
rank
X(A)
i=k+1
σi2 (A) +
60ε
· kA − CC† Ak2F .
50
(17)
According to Lemma 64, G is a (4k, 1/2)-projection-cost preserving sketch of A. It means that there
exists a constant c which is independent from projection matrix P and we have the following:
3
1
kA − PAk2F ≤ kG − PGk2F + c ≤ kA − PAk2F
2
2
54
For convenience, we use PG to denote a rank-k projection matrix which provides the best rank-k
approximation Gk = PG G to matrix G. We also use PA to denote a rank-k projection matrix
which provides the best rank-k approximation Ak = PA A to matrix A. With probability at least
0.68, the following will be held,
1
kA − CC† Ak2F ≤ kG − CC† Gk2F + c
2
≤ 4820kG − PG Gk2F + c
≤ 4820kG − PA Gk2F + c
≤ 4820 kG − PA Gk2F + c
4820
≤
kA − PA Ak2F
2
The first inequality is due to Lemma 64. G is a (4k, 1/2)-projection cost preserving sketch of A
and C has rank at most 4k. The second inequality is based on Lemma 71. The third inequality is
because PG provides the best rank-k approximation to G. The fourth inequality used the fact c is
non-negative. The fifth inequality held because G is a (4k, 1/2)-projection cost preserving sketch
of A. Thus,
kA − CC† Ak2F ≤ 4820kA − Ak k2F
Concluding the proof. Combining with Equation 17, we have:
†
kA − C̃C̃ Ak2F ≤ kA − ΠF
(A)k2F ≤
C̃,k
9.4.2
rank
X(A)
i=k+1
σi2 (A) + O(ε) ·
rank
X(A)
σi2 (A).
(18)
i=k+1
Proof of Eqn. 16
We would like to apply Lemma 73 for the matrix U ∈ Rm×k in the algorithm. Note that we already
proved that the matrix C̃ in the algorithm satisfies with probability 0.59 − s+1
n − 2δ:
kA − ΠF
(A)k2F ≤ (1 + O(ε))kA − Ak k2F .
C̃,k
Lemma 73 and a simple union bound conclude the proof.
9.4.3
Running time
1. Local Column Sampling: O(nnz(A) log(ms) + m · poly(k, ε, log(s))) arithmetic operations in
total.
(a) O(nnz(Ai ) log(ms) + m · poly(k, ε, log(s))) for each Si
(b) -
2. Global Column Sampling: O nnz(A) · log k + m · poly(k, ε−1 ) .
(a) O nnz(A) · log k + m · poly(k, ε−1 ) to construct C - from Lemma 71.
(b) -
55
3. Adaptive Sampling: O(nnz(A) · log n + m · s · poly(k, ε−1 , log n)).
(a) First, we analyze the cost to compute the matrix Ψ̃i . O(k2 m) for each C† locally; then,
we compute (SAi ) − (((SCi )C†i )Ai ). The costs are: SAi := D takes O(nnz(Ai )) time,
SCi := G takes O(nnz(Ai ) log(n)) time, GC†i := H takes O(m log(n)k/ε2 ) time, HA :=
L takes O(nnz(Ai ) log(n)) time, and D − L takes O(n log n) time. So, the total time to
compute one Ψ̃i is O(nnz(Ai ) log n + m · poly(k, ε−1 , log n)).
Also, there is a cost of computing ψi , which is O(log n · wi ) arithmetic operations.
(b) O(s) in total.
(c) O(k/ε) in total using the method of [51] locally.
(d) O(k/ε).
4. Rank-k matrix in span(C̃): O(nnz(A) + m · s · poly(k, ε−1 )) arithmetic operations in total.
(a) O(smk 2 /ε2 ) in total.
(b) O(sn) in total to generate s times the same Ψ. Then another O(n) in total to generate
the Di ’s. For all Ai WiT we need O(nnz(A)) operations and then another O(mk 3 ε−7 ) for
each Y T · (Ai WiT )
(c) O(sk 3 ε−5 ) to find Ξ; then another O(sk3 ε−3 + sk4 ε−6 )) to update Ξ locally in each
machine and another O(sk 4 ε−6 ) to find ∆; and O(smk 2 /ε) to find U (s times).
9.4.4
Communication Complexity
Assume that we can represent each element in the input matrix A with at most b bits. Also, we
assume that one word has length b bits and b = O(log(mns/ε)).
1. Local Column Sampling: O(skφ) words.
(a) (b) O(skφ) elements of A.
2. Global Column Sampling:O(skφ) words.
(a) (b) O(skφ) elements of A.
3. Adaptive Sampling: O(s + φk/ε) words.
(a) s integers each of which is representable with O(log k+log log(mns/ε)) (from Lemma 61).
(b) s integers (the ti ’s) each with magnitude at most n, hence representable with b bits.
(c) O(φk/ε) elements of A.
(d) 4. Best rank-k matrix in the span of C̃: O(sφk/ε + sk 3 ε−5 ) words.
(a) O(skφε−1 ) elements of A.
(b) O(sk 3 ε−5 ) numbers each of which can be represented with b bits.
(c) O(sk 3 ε−5 ) numbers each of which can be represented with b bits.
In total the communication complexity is O(skφ/ε + sk 3 /ε5 ) words.
56
10 Lower bounds
Only in Section 10.1, we discuss the result in arbitrary partition model. In Section 10.2, Section 10.3
and Section 10.4, we discuss results in column partition model which provides stronger lower
bounds than in arbitrary partition model.
10.1 Dependence on Ω(ε−2 ) bits for distributed PCA in arbitrary partition model
Lemma 75 (Theorem 8 in [54]). There are two machines, and each of them hold a matrix Ai ∈ Rm×n .
Let A = A1 + A2 . Suppose ε2 ≤ 2n, the communication of computing a rank-k matrix U with constant
probability such that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
needs Ω(1/ε2 ) bits.
Proof. (from [54]). The reduction is from GHD problem.
Lemma 76 (Theorem 1.1 in [20]). Each of two machines has an n-bit vector. There is a promise: either
√
√
the inputs are at Hamming distance less than n/2 − c n or greater than n/2 + c n. If they want to
distinguish these two cases with constant probability, the communication required Ω(n) bits.
Without loss of generality, we assume 1/ε2 is an integer, and machine 1 and machine 2 have
2
x, y ∈ {−1, 1}1/ε respectively. There is a promise that either xT y < −2/ε or xT y > 2/ε holds.
Consider about the following protocol:
1. Machine 1 constructs A1 ∈ R(k+1)×(1/ε
xT ε √0
0
2
A1 =
0
0
...
...
0
0
0
√ 0
2 +k)
, and machine 2 constructs A2 ∈ R(k+1)×(1/ε
...
...
0
0
...
...
...
0
...
0
...
√
2(1+ε)
ε
2(1+ε)
ε
A2 =
y T ε 0 0 ... 0
0
0 0 ... 0
0
0 0 0 0
... ... ... ... ...
0
0 0 ... 0
2 +k)
:
2. The server computes U such that
kA − UUT Ak2F ≤ (1 + ε) · kA − Ak k2F
and sends U to both of two machines, where A = A1 + A2 .
3. Let P = Ik+1 − UUT . Each machine construct v = P(1) /kP(1) k2
4. Each machine checks whether v12 < 21 (1 + ε). If yes, return the case xT y > 2/ε. Otherwise
return the case xT y < 2/ε
Suppose the server successfully computes U. Since the rank of A is at most k + 1:
kA − UUT Ak2F = kPAk2F
= kvAk22
= vAAT v T
57
An observation is that
AAT =
kx + yk22 ε2 0
0
2
0
0
...
...
0
0
0
0
2(1+ε)
ε2
...
0
...
...
...
...
...
0
0
0
...
2(1+ε)
ε2
We have kA − Ak k2F ≤ 2. Then,
k+1
2(1 + ε) X 2
vi =
ε2
i=3
2(1 + ε)
(1 − v12 − v22 )
ε2
< 2(1 + ε)
We have v12 + v22 > 1 − ε2 . When xT y > 2/ε, kx + yk22 ε2 ≥ 2 + 4ε
(1 + ε)kA − Ak k2F = 2(1 + ε)
> v12 (2 + 4ε) + 2v22
> 2 − 2ε2 + 4εv12
So, v12 < 12 (1 + ε). When xT y < −2/ε, kx + yk22 ε2 ≤ 2 − 4ε
(1 + ε)kA − Ak k2F = kx + yk22 ε2 (1 + ε)
> v12 kx + yk22 ε2 + 2v22
= 2(v12 + v22 ) − (2 − kx + yk22 ε2 )v12
> 2(1 − ε2 ) − (2 − kx + yk22 ε2 )v12
So,
v12 >
1
2(1 − ε2 ) − kx + yk22 ε2 (1 + ε)
≥ (1 + ε)
2
2
2
2 − kx + yk2 ε
Therefore, machines can distinguish these two cases. The only communication is computing U.
This cost shoulde be the same as Ω(1/ε2 ) bits lower bound of the gap hamming distance problem.
10.2 Lower bounds for distributed PCA on dense matrices
This section provides a communication cost lower bound for the Distributed PCA problem of
Definition 17. Specifically, we describe the construction of an m × n matrix A (hard instance), and
formally argue that for this A, any k ≤ 0.99m, and any error parameter C with 1 < C < poly(skm),
if there exists some algorithm to construct an m × k matrix U such that, with constant probability,
kA − UUT Ak2F ≤ C · kA − Ak k2F , then this algorithm has communication cost Ω(skm) words.
10.2.1
Preliminaries
We use the notation Gk,m to denote the set of k-dimensional subspaces of Rm , which we identify
with corresponding projector matrices Q ∈ Rm×m , with rank(Q) = k ≤ m, onto the subspaces,
i.e.,
Gk,m = {Q ∈ Rm×m : Q2 = Q, rank(Q) = k ≤ m.}
58
We also need a description of a subset from Gk,m:
Cδk (P) = {Q ∈ Gk,m : kP − Qk2 ≤ δ}.
This is the set of those projectors Q ∈ Gk,m which differ in operator norm by at most δ from
another fixed projector P ∈ Gk,m . In our analysis below we also need a result from [38]:
Theorem 77. (Net Bound - Corollary 5.1 of [38]) For any m, k, δ > 0, there is a family N = {P1 , . . . , PN },
N = 2Ω(k(m−k) log(1/δ)) , where Pi ∈ Gk,m and Cδk (Pi ) ∩ Cδk (Pj ) = ∅, for all i 6= j.
Theorem 77 proves the existence of a large, but finite, set N of projection matrices, such that if
one considers the ball of matrices of operator norm at most δ centered at each matrix in N , then
these balls are disjoint. Our hard instance matrix A is constructed from some member in N .
10.2.2
Hard instance construction
Recall that in the column-partition model of Definition 15 there are s servers holding matrices
A1 , . . . , As , respectively,
P where Ai has m rows and some subset of wi 3columns of some m × n
matrix A. Notice that wi = n. First of all, for arbitrary m, s we assume that n ≥ sm. Below, we
describe a specific construction for a matrix A.
First of all, we set δ = 1/(skm), the parameter to be used in Theorem 77. Next, fix a family N
of subspaces of Gk,m with the guarantees of Theorem 77. Let PR = RRT be a uniformly random
member of N , where R ∈ Rm×k has orthonormal columns (any projector can be expressed as
such a matrix, where the columns of R span the subspace that P projects onto). The entries of
A1 are equal to the entries of R, each rounded to the nearest integer multiple of 1/B, where
B = poly(skm) is a large enough parameter specified later. We denote this rounded matrix with
k
R̃ ∈ Rm×k . So, if αij is the (i, j)th entry in A1 , then αij = kmin
B , with kmin = argmin |Rij − B |. Each
k∈Z
Ai for i = 2, 3, . . . , s − 1 is 1/B times the m × m identity matrix. Finally, As is the m × t matrix of
all zeros with t = n − (s − 1)m − k. I.e.,
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
10.2.3
Intermediate results
First, we give a bound regarding the best rank k approximation for the above matrix A.
Lemma 78. For the matrix A ∈ Rm×n in Section 10.2.2, and any k ≤ 0.99m : kA − Ak k2F <
sm
.
B2
Proof. We have,
kA − Ak k2F ≤ kA − A1 A†1 Ak2F
X
=
k(I − A1 A†1 )Ai k2F
i>1
≤
X
i>1
kAi k2F
m
= (s − 2) · 2
B
sm
<
,
B2
As, otherwise we can choose a value s′ < s so that n − m ≤ s′ m ≤ n and apply the argument of Theorem 82 with
s replaced with s′ . Then, the lower bound in Theorem 82 will then be Ω(s′ mk), which assuming n ≥ 2d, is an Ω(n)
communication lower bound
3
59
where the first inequality uses the fact that A1 A†1 is a matrix of rank at most k, the first equality
uses the fact that (I − A1 A†1 )Ai is the all-zeros matrix, the second inequality uses that a projector
cannot increase a unitarily invariant norm, and the third inequality follows by construction.
Next, we bound, in the operator norm, the difference of A1 from the matrix R. The lemma
follows from the fact that A1 ∈ Rm×k is obtained by R ∈ Rm×k by rounding each entry to the
nearest integer multiple of 1/B, and then summing the squared differences across all km entries.
Lemma 79. (Precision Lemma) kA1 − Rk2 ≤
Proof. kA1 − Rk22 ≤ kA1 − Rk2F ≤
√
km
B .
km
.
B2
Next, we prove a pure linear algebraic result. The following lemma captures the fact that if
some P ∈ Gk,m is close to QP (in Frobenius norm) for Q ∈ Gk,m , then P is also close to Q (in
Frobenius norm). We will use this lemma later for P = PR .
Lemma 80. (Error Measure) Let P, Q ∈ Gk,m with kP − QPk2F ≤ ∆. Then kP − Qk2F ≤ 2∆.
Proof. By the matrix Pythagorean theorem,
k = kQk2F = kQPk2F + kQ(I − P)k2F .
(19)
Also by the matrix Pythagorean theorem,
k = kPk2F = kQPk2F + k(I − Q)Pk2F ,
and so using the premise of the lemma, kQPk2F ≥ k − ∆. Combining with (19),
kQ(I − P)k2F ≤ ∆.
(20)
Hence,
kP − Qk2F = k(P − Q)Pk2F + k(P − Q)(I − P)k2F
= kP − QPk2F + kQ − QPk2F
≤ ∆ + kQ(I − P)k2F
≤ 2∆,
where the first equality follows by the matrix Pythagorean theorem, the second equality uses
P2 = P (since P is a projector), the third equality uses the bound in the premise of the lemma, and
the fourth inequality uses (20).
10.2.4
Main Argument
Before presenting the main theorem, we give an intermediate technical lemma.
Lemma 81. (Implication of Correctness) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and
let A be distributed in s machines in the way it was described in Section 10.2.2:
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
Suppose n = Ω(sm), k < rank(A), and 1 < C < poly(skm). A is revealed to the machines by just
describing the entries in A and without specifying any other detail regarding the construction. Given
this A and assuming further that each machine knows some projector matrix Q ∈ Rm×m with rank at
most k such that kA − QAkF ≤ CkA − Ak kF , there is a deterministic algorithm (protocol) which, upon
termination, leaves on each machine the matrix R ∈ Rm×k which was used to construct A1 .
60
1
Proof. First, we prove that kRRT − Qk2 < 2skm
. Then, using this bound, we describe a protocol
that deterministically reveals the matrix R which was used to construct A1 .
, which in
Using Lemma 78 and the premise in the lemma, it follows that: kA − QAk2F ≤ C sm
B2
particular implies that
kA1 − QA1 k2F ≤ C
sm
.
B2
(21)
We further manipulate the term kA1 − QA1 kF as follows:
kA1 − QA1 kF = k(I − Q)A1 kF
= k(I − Q)RRT + (I − Q)(A1 − RRT )kF
≥ k(I − Q)RRT kF − k(I − Q)(A1 − RRT )kF
≥ k(I − Q)RRT kF − kI − QkF k(A1 − RRT )k2
√
√
km √
T
≥ k(I − Q)RR kF −
( m + k),
B
where the first inequality is the triangle inequality, the second inequality uses sub-multiplicativity,
and the third inequality uses the triangle inequality, i.e., that kI − QkF ≤
kIkF + kQk
, and Lemma
√ F
√
T
Csm
2m k
79. Combining this bound with (21), it follows that k(I − Q)RR kF ≤ B + B . At this point
we would like to apply Lemma 80 to conclude that kRRT − QkF is small. To do so, we need RRT
and Q to be of rank k. While R has rank k by construction, Q may not. However, increasing the
rank of Q cannot increase the error kA−QAkF . Hence, if rank(Q) < k, given Q, the protocol in the
premise of the lemma allows each server to locally add standard basis vectors to the column space
of Q until the column space of Q becomes k. This involves no communication and each server
ends up with the same new setting of Q, which for simplicity we still denote with Q. Therefore,
rank(Q) = k. Applying Lemma 80, it now follows that
√ !
√
√
Csm 2m k
T
T
+
.
kRR − Qk2 ≤ kRR − QkF ≤ 2
B
B
1
.
By setting B to be a sufficiently large poly(skm), we have kRRT − Qk2 < 2skm
i
Therefore, given Q, by Theorem 77 there is a unique matrix P in N for which Q ∈ Cδk (Pi ),
1
1
with δ = skm
. Indeed, since kR − Qk2 ≤ skm
< δ/2, there cannot be two matrices Pi and Pj for
i 6= j for which Q ∈ Cδk (Pi ) and Q ∈ Cδk (Pj ) since then by the triangle inequality kPi − Pj k2 < δ,
contradicting the construction of N . Hence, it follows that each machine can deterministically
identify this Pi , by enumeration over N , and therefore compute R, via, for example, an SVD.
We are now fully equipped to present the main argument about the communication cost lower
bound for distributed PCA.
Theorem 82. (Main) Let A ∈ Rm×n be the hard instance matrix in Section 10.2.2 and let A be distributed
in s machines in the way it was described in Section 10.2.2:
A = R̃ B1 Im B1 Im . . . B1 Im 0m×t .
Suppose n = Ω(sm), k ≤ .99m, and 1 < C < poly(skm). Assume that there is an algorithm (protocol)
which succeeds with probability at least 2/3 in having the i-th server output QAi , for all i, where Q ∈
Rm×m is a projector matrix with rank at most k such that kA − QAkF ≤ CkA − Ak kF . Then, this
algorithm requires Ω(skm log(skm)) bits of communication.
61
Further, the bound holds even if the input matrices Ai to the servers have all entries which are integer
multiples of 1/B, for a value B = poly(skm), and bounded in magnitude by 1, and therefore all entries can
be specified with O(log(skm)) bits.
Note that assuming a word size of Θ(log(skm)) bits, we obtain an Ω(skm) word lower bound.
Proof. If the protocol succeeds, then, since each server outputs QAi , and Ai is 1/B times the
identity matrix for all i = 2, 3, ...s − 1, each of those servers can compute Q. One of those servers
can now send this Q to the first and the last server. It follows by Lemma 81, that each server can
identify PR and R.
Letting E be the event that the protocol succeeds, and letting Πi be the ordered sequence of all
incoming and outgoing messages at the i-th server, it follows that
I(Πi ; Q | E) = Ω(log |N |) = Ω(km log(smk)),
where I(X; Y | F) = H(X | F)−H(X | Y, F) is the mutual information between random variables
X and Y conditioned on F. To see the first equality in the above, observe that I(Πi ; Q | E) = H(Q |
E) − H(Q | Πi , E), and conditioned on E, there is a uniquely determined matrix PR each server
identifies, which is uniform over a set of size |N |, and so H(Q | E) ≥ H(PR ) = Ω(log2P
|N |).
Here, H(X) is the Shannon entropyP
of a random variable X, given by H(X) = x Pr[X =
x] log(1/ Pr[X = x]), and H(X | Y ) = y Pr[Y = y]H(X | Y = y) is the conditional Shannon
entropy.
Hence, if Z is an indicator random variable which is 1 if and only if E occurs, then using that
I(X; Y ) ≥ I(X; Y | W ) − H(W ) for any random variables X, Y, and W , and that I(X; Y | W ) =
P
w Pr[W = w]I(X; Y | W = w), we have
I(Πi ; Q) ≥ I(Πi ; Q | Z) − 1
≥ I(Πi ; Q | Z = 1) Pr[Z = 1] − 1
= Ω(km log(smk)),
mapping X to Πi , Y to Q, and W to Z in the mutual information bound above. It follows that
Ω(km log(smk)) ≤ I(Πi ; Q) ≤ H(Πi ) ≤ EPR ,rand [|Πi |],
where |Πi | denotes the length, in bits, of the sequence Πi , and rand is the concatenation of the
private randomness of all s players Note that the entropy of Πi is a lower bound on the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation,
P
kΠi | = Ω(skm log(smk)), which implies there exists an R and setting of rand for which
Pi ER,rand
i
i kΠ | = Ω(skm log(smk)). It follows that the total communication is Ω(smk log(smk)) bits.
10.3 Lower bounds for distributed PCA on sparse matrices
Applying the previous theorem with m = φ gives a communication lower bound for sparse matrices.
Corollary 83. Let A ∈ Rφ×n be the hard instance matrix in Section 10.2.2 (with m replaced with φ in
noting the number of rows in A):
A = R̃ B1 Iφ B1 Iφ . . . B1 Iφ 0φ×t .
Suppose n = Ω(sφ), k ≤ .99φ, and 1 < C < poly(skφ). Now, for arbitrary m consider the matrix
 ∈ Rm×n which has A in the top part and the all-zeros (m − φ) × n matrix in the bottom part.  admits
the same column partition as A after padding with zeros:
62
 =
R̃
1
B Iφ
1
B Iφ
0(m−φ)×k 0(m−φ)×φ 0(m−φ)×φ
1
...
0φ×t
B Iφ
.
. . . 0(m−φ)×φ 0(m−φ)×t
We denote the new sub-matrices with Âi ∈ Rm×wi .
Assume that there is an algorithm (protocol) which succeeds with probability at least 2/3 in having the
i-th server output Q̂Âi , for all i, where Q̂ ∈ Rm×m is a projector matrix with rank at most k such that
k − Q̂ÂkF ≤ Ck − Âk kF . Then, this algorithm requires Ω(skφ log(skφ)) bits of communication.
Note that assuming a word size of Θ(log(skφ)) bits, we obtain an Ω(skφ) word lower bound.
10.4 Lower bounds for distributed column-based matrix reconstruction
In this section we develop a communication lower bound for the Distributed Column Subset Selection Problem of Definition 19.
10.4.1
A Net of discretized Deshpande-Vempala hard instances
We start by describing the construction of a special sparse matrix from the work of Desphande and
Vempala [27], which was further studied by [17]. This matrix gives a lower bound (on the number
of columns need to be selected in order to achieve a certain accuracy) for the standard column
subset selection problem (see the following Fact). Suppose φ ≥ 2k/ǫ. Consider a (φ + 1) × φ matrix
B for which the i-th column is e1 + ei+1 , where ei is the i-th standard basis vector in Rφ+1 . Now
define an ((φ + 1)k) × (φk) matrix A with k blocks along the diagonal, where each block is equal
to the matrix B. Let n = (φ + 1)k.
Fact 84. (Proposition 4 in [27], extended in Theorem 37 of [17]) Let A be as above. If P is an n×n projection
operator onto any subset of at most k/(2ǫ) columns of A, then kA − PAk2F > (1 + ǫ)kA − Ak k2F .
To prove a communication lower bound for distributed column subset selection, we will need
to transform the above matrix A by multiplying by a rounded orthonormal matrix, as follows. We
also need to prove a similar lower bound as in the previous fact for this transformed matrix.
Lemma 85. Let A, k, φ, 1/ε, and n be as above. For any n × n orthonormal matrix L, let L̃ denote
the matrix formed by rounding each of the entries of L to the nearest integer multiple of M , where M ≤
1/((φ + 1)k)c , for a sufficiently large constant c > 0. If P is an n × n projection operator onto any subset
of at most k/(6ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ)kL̃A − [L̃A]k k2F .
Proof. We will show that, assuming 1/ε < n/3, if P is an n × n projection operator onto any subset
of at most k/(2ǫ) columns of L̃A, then kL̃A − PL̃Ak2F > (1 + ǫ/3)kL̃A − [L̃A]k k2F . The lemma will
then follow by replacing ε with 3ε.
Suppose S is a subset of k/(2ǫ) columns of L̃A for which
kL̃A − PL̃Ak2F ≤ (1 + ǫ/3)kL̃A − [L̃A]k k2F ,
(22)
where P is the projection onto the columns in S and [L̃A]k is the best rank-k approximation to L̃A
The proof strategy is to relate the left hand side of (22) to kA − QAk2F where Q is the projection
onto the columns of A indexed by the same index set S, and simultaneously to relate the right
hand side of (22) to kA − Ak k2F .
We start by looking at kL̃A − [L̃A]k kF . Notice that L̃A = LA + EA, where E is a matrix whose
entries are all bounded in magnitude by M . Therefore, L̃A = LA + F, where F = EA and
1/2
1/2
kFk2 ≤ kEkF kAkF ≤ n2 M 2
· (2(n − 1))1/2 ≤ 2n3 M 2
,
63
where we have used kAkF ≤ (2(n − 1))1/2 . By Weyl’s inequality (Corollary 7.3.8 of [34]), for all
i ≤ φk,
1/2
|σi (LA) − σi (LA + F)| ≤ kFk2 ≤ 2n3 M 2
,
where σi (X) denotes the i-th singular value of a matrix X. Since L is orthonormal, σi (LA) = σi (A)
for all i. It follows that
X
kL̃A − [L̃A]k k2F =
σi2 (L̃A)
i>k
X
1/2 2
=
σi (LA) ± 2n3 M 2
i>k
X
1/2 2
=
σi (A) ± 2n3 M 2
i>k
= kA − Ak k2F ± O(nkAk2 n3 M 2
= kA − Ak k2F ± O(1/n2 ),
1/2
+ n4 M 2 )
(23)
where the final line follows for a sufficiently small choice of M ≤ 1/nc , using that kAk2 ≤ kAkF =
√
O( n).
We now look at kL̃A − PL̃AkF . By the triangle inequality,
kL̃A − PL̃AkF ≥ kLA − PLAkF − kEAkF − kPEAkF
≥ kLA − PLAkF − kEkF kAkF − kPk2 kEkF kAkF
= kA − LT PLAkF − O(1/n3 ),
(24)
where the equality uses that multiplying by LT preserves norms, as well as that kEkF ≤ 1/poly(n)
for an arbitrarily small poly(n) by making M ≤ 1/nc sufficiently small, whereas kPk2 ≤ 1 and
√
kAkF = O( n). We claim LT PL = Q, where Q is the projection onto the columns in A indexed
by the set S. To see this, let U be an orthonormal basis for the columns in A spanned by the index
set S, so that P = LUUT LT . Then LT PL = UUT = Q. Hence, using that kA − QAkF ≤ kAkF =
√
O( n) and squaring (24), we have,
kL̃A − PL̃Ak2F ≥ kA − QAk2F − O(1/n2 ).
(25)
Combining (22), (23), and (25),
kA − QAk2F ≤ (1 + ǫ/3)kA − Ak k2F + O(1/n2 ).
(26)
Note that kA − Ak kF ≥ 1 for any k < n, since if we remove the top row of A, creating a matrix B,
then kB − Bk kF ≤ kA − Ak kF , yet B is the identity matrix, and so kB − Bk kF ≥ 1. It follows that
the additive O(1/n2 ) error in (26) translates into a relative error, provided k < n and for 1/ε < n/3.
Hence, kA − QAk2F ≤ (1 + ǫ)kA − Ak k2F , and therefore by Fact 84, we have |S| > k/(2ǫ).
10.4.2
Column sharing of discretized orthonormal matrices
We need the following technical lemma about sampling random orthonormal matrices, concerning the number of columns they have in common after rounding.
64
Lemma 86. Let 1 ≤ r ≤ n, and let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we
choose two independently random orthogonal matrices A ∈ Rn×n and B ∈ Rn×n from the Haar measure
(so they each have orthonormal columns and orthonormal rows). We then round each of the entries in A to
the nearest integer multiple of M , obtaining a matrix Ã, and similarly obtain B̃. Let E denote the event that
there exist r distinct indices i1 , . . . , ir ∈ [n] and r distinct indices j1 , . . . , jr ∈ [n] for which Ã∗,iℓ = B̃∗,jℓ
for all ℓ = 1, 2, . . . , r, where Ã∗,iℓ denotes the iℓ -th column of Ã. Then, Pr[E] ≤ e−Θ(nr log M ) .
Proof. We fix a subset S of r distinct indices i1 , . . . , ir ∈ [n] and a subset T of r distinct indices
j1 , . . . , jr ∈ [n] and show that the probability Ã∗,iℓ = B̃∗,jℓ simultaneously for all ℓ ∈ [r] is at most
e−Θ(nr log M ) . It then follows by a union bound that
ne 2r
n
n
−Θ(nr log M )
e−Θ(nr log M ) ≤ e−Θ(nr log M ) ,
Pr[E] ≤
·
·e
≤
r
r
r
as desired.
Since A and B are independent and their distribution is permutation-invariant, we can assume
iℓ = jℓ = ℓ for ℓ ∈ [r]. Let F be the event that Ã∗,iℓ = B̃∗,jℓ occurs for all ℓ ∈ [r]. If F occurs, then
√
we need kA∗,iℓ − B∗,jℓ k∞ ≤ M for all ℓ ∈ [r], which implies kA∗,iℓ − B∗,jℓ k2 ≤ nM for all ℓ ∈ [r].
Let Ar be the leftmost r columns of A, and Br the leftmost r columns of B. Then, if F occurs
r
kA −
Br k22
r
≤ kA −
Br k2F
=
r
X
ℓ=1
kA∗,ℓ − B∗,ℓ k22 ≤ rnM 2 .
Note that Ar and Br have orthonormal columns, and so PAr = (Ar )(Ar )T and PBr = (Br )(Br )T
are projection matrices. Then,
kAr − Br k2 ≥ k(Ar )(Ar )T − Br (Ar )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2
= k(Ar )(Ar )T − (Ar )(Br )T k2 /2 + k(Ar )(Br )T − (Br )(Br )T k2 /2
≥ k(Ar )(Ar )T − (Br )(Br )T k2 /2,
(27)
where the first inequality follows since multiplying by a matrix on the right with orthonormal
rows cannot increase the spectral norm, the equality follows by taking transposes, and the second
inequality follows by the triangle inequality.
We need another result from [38].
Theorem 87. (Probability Bound - Claim 5.2 of [38]) Suppose we choose two independent random subspaces Y and S of Rn each of dimension r from the Haar measure, where we denote the projection operators
onto the subspaces by YY T and SST , respectively, where Y and S have r orthonormal columns. Then for
any δ ∈ (0, 1), Pr[kYY T − SST k2 ≤ δ] ≤ e−Θ(r(n−r) log(1/δ)) .
Combining (27) with Theorem 87, we have that for r ≤ n/2, Pr[F] ≤ e−Θ(rn log(M )) , since by
√
taking M ≤ 1/nc sufficiently small, we can ensure kAr − Br k2 ≤ rnM ≤ M 1/2 , and so 2M 1/2
upper bounds k(Ar )(Ar )T − (Br )(Br )T k2 .
Note that if r > n/2, then in particular we still have that Ã∗,iℓ = B̃∗,jℓ for all ℓ ∈ [r/2], and
therefore in this case we also have Pr[F] ≤ e−Θ(rn log M ) . Hence, Pr[E] ≤ e−Θ(rn log M ) , which
completes the proof.
We now extend Lemma 86 to a k-fold version.
65
Lemma 88. Let M ≤ 1/nc for a sufficiently large absolute constant c > 0. Suppose we independently
choose k pairs of matrices Az , Bz ∈ Rn×n , z ∈ [k], each with orthonormal columns (and hence also
orthonormal rows). We then round each of the entries in each Az and Bz to the nearest integer multiple
of M , obtaining matrices Ãz , and B̃z . Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k and let E be the event that for each
z ∈ [k], there exist distinct indices i1 , . . . , irz ∈ [n] and j1 , . . . , jrz ∈ [n] for which Ãz ∗,iℓ = B̃z ∗,jℓ for all
Pk
ℓ = 1, 2, . . . , rz . Then, Pr[E] ≤ e−Θ(n z=1 rz log M ) .
Proof. This follows by Lemma 86, and the fact that the matrices A1 , . . . , Ak , B1 , . . . , Bk are jointly
independent. Here we also use a union bound.
Corollary 89. Suppose 1 ≤ k < c0 n for an absolute constant c0 > 0. Let r = (r1 , . . . , rk ) ∈ (Z≥0 )k . Let
M ≤ 1/nc for a sufficiently large constant c > 0. There exists a set N of eΘ(nt log M ) k-tuples (Ã1 , . . . , Ãk )
of matrices each of dimensions n × n with entries that are integer multiples of M and bounded in magnitude
P
by 1, such that for every vector r = (r1 , . . . , rk ) ∈ (Z≥0 )k with kz=1 rz ≤ t, it holds that for all distinct ktuples (Ã1 , . . . , Ãk ), (B̃1 , . . . , B̃k ), there exists a z ∈ [k] for which there are no sets S = {i1 , . . . , irz }, T =
{j1 , . . . , jz } ⊂ [n] for which Ã∗,iℓ = B̃∗,jℓ for all ℓ = 1, 2, . . . , rz .
Proof. For a fixed vector r and a random choice of (A˜1 , . . . , A˜k ), (B˜1 , . . . , B˜k ), by the guarantee of
Lemma 88, the complement of the event in the statement of the corollary happens with probability
P
at most e−Θ(nt log M ) . The number of vectors r with kz=1 rz ≤ t is at most tk , and tk e−Θ(nt log M ) ≤
e−Θ(nt log M ) provided k < c0 n for an absolute constant c0 > 0, so we can apply a union bound
over all pairs in a random choice of eΘ(nt log M ) k-tuples.
10.4.3
Hard instance construction
We have s servers holding matrices A1 , . . . , A
Ps , respectively, where Ai has m rows and a subset
of wi columns of an m × n matrix A, where wi = n. For our lower bound we assume 2/ε ≤ φ
and kφ ≤ m. Note that for ε less than a sufficiently small constant, this implies that k < c0 kφ, and
so the assumption in Corollary 89 is valid (since the n of that corollary is equal to (k + 1)φ We set
M = 1/(mn)c for a sufficiently large constant c > 0.
We will have A1 being an m × k(φ − 1) matrix for which all but the first kφ rows are zero. We
assume 2/ε ≤ φ. On the first kφ rows, A1 is block diagonal containing k blocks, each block being
a φ × (φ − 1) matrix.
To specify A1 , let the parameters t and n of Corollary 89 equal k/(2ε) and φ, respectively. That
corollary gives us a net N of eΘ(kφ(log(mn))/ε) k-tuples of matrices each of dimensions φ × φ with
entries that are integer multiple of M and bounded in magnitude by 1.
For a random k-tuple (B1 , . . . , Bk ) in N , we create an m × m block diagonal matrix B, which is
0 on all but its first kφ rows and first kφ columns. On its first kφ rows, it is a block diagonal matrix
B whose blocks along the diagonal are B1 , . . . , Bk , respectively. Our matrix A1 is then the matrix
product of B and an matrix D, where D is m × k(φ − 1) is formed by taking the kφ × k(φ − 1)
matrix of Fact 84 and padding it with m − kφ rows which are all zeros. By Lemma 85, no k/(2ǫ)
columns of A1 contain a k-dimensional subspace in their span which is a (1 + ǫ)-approximation to
the best rank-k approximationt to A1 .
Each Ai for i = 2, 3, . . . , s − 1 is the m × m matrix of all zeros. Finally, As is the m × t matrix
of
all zeros with t = n − (s − 1)m − k(φ − 1), i.e., A = A1 0m×m 0m×m . . . 0m×m 0m×t . By
construction, each column of A has at most φ non-zero entries, since the only non-zero columns
are those in A1 , and each column in A1 has the form Bz∗,1 + Bz∗,i for a z ∈ [k] and an i ∈ [φ], so it
has at most φ non-zero entries.
66
10.4.4
Main theorem
In the Distributed Column Subset Selection Problem in Definition 18, a correct protocol should
have each of the s machines simultaneously output a matrix C ∈ Rm×c with c < n columns of A
such that
kA − CC† Ak2F ≤ (1 + ε)kA − Ak k2F .
Theorem 90. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π
which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem
of Definition 18, under the promise that each column of A has at most φ non-zero entries which are integer
multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0, requires Ω(sφk(log(mn))/ε)
bits of communication. If the word size is Θ(log(mn)), this implies the communication cost of the porticol
is Ω(sφk/ε) words.
Proof. By construction of A1 , whenever Π succeeds, each of the s machines outputs the same set
C of at least t ≥ k/(2ǫ) columns of A1 .
Let Πi denote the transcript (sequence of all messages) between the coordinator and the i-th
player. We look at the information Πi reveals about A1 , given the event E that Π succeeds, that is,
I(Πi ; A1 | E).
A critical observation is that any column C∗,i of C, is equal to Bz∗,1 + Bz∗,i for some z ∈ [k],
where Bz is as defined above (i.e., A1 = B · D). Hence, given Bz∗,1 and C∗,i , one can reconstruct
Bz∗,i . Now, for any random variable W ,
I(Πi ; A1 | E) ≥ I(Πi ; A1 | E, W ) − H(W ).
(28)
We let W = (B1∗,1 , . . . , Bk∗,1 ), and observe that H(W ) ≤ log2 ((2M )kφ ) since there are 2M choices
for each coordinate of each Bz∗,1 . Hence, H(W ) = O(kφ log(mn)). Note that I(Πi ; A1 | E, W ) =
H(A1 ) = log2 (|N |), since conditioned on the protocol succeeding, and given W , by Corollary 89
we can reconstruct A1 . By (28), it follows that
(Πi ; A1 | E) ≥ Θ(φk(log(mn))/ǫ) − O(kφ log(mn)) = Ω(φk(log(mn))/ǫ).
Note that if Z is an indicator random variable that indicates that E occurs, we have H(Z) ≤ 1, and
so
I(Πi ; A1 ) ≥ I(Πi ; A1 | E) Pr[E] − 1 = Ω(φk(log(mn))/ǫ),
since Pr[E] ≥ 2/3.
It follows that
Ω(φk(log(mn))/ǫ) ≤ I(Πi ; A1 ) ≤ H(Πi ) ≤ EA1 ,rand [|Πi |],
where |Πi | denotes the length, in bits, of the sequence Πi of messages, and rand is the concatenation of the private randomness of all s machines. Note that the entropy of Πi is a lower bound on
the expected encoding length of |Πi |, by the Shannon coding theorem. By linearity of expectation,
X
EA1 ,rand |Πi | = Ω(φk(log(mn))/ǫ),
i
which implies there exists an A1 and setting of rand for which
X
|Πi | = Ω(sφk(log(mn))/ǫ).
i
It follows that the total communication is Ω(sφk(log(mn))/ǫ) bits.
67
Corollary 91. Assume 2/ε ≤ φ and kφ ≤ min(m, n). Then, any, possibly randomized, protocol Π
which succeeds with probability at least 2/3 in solving the Distributed Column Subset Selection Problem
- rank k subspace version (see Definition 19), promise that each column of A has at most φ non-zero
entries which are integer multiples of 1/(mn)c and bounded in magnitude by 1, for a constant c > 0,
requires Ω(sφk(log(mn))/ε) bits of communication. If the word size is Θ(log(mn)), this implies the total
communication across all s machines is Ω(sφk/ε) words.
Proof. As any such protocol is also a protocol for the Distributed Column Subset Selection Problem of Definition 18 (the problem in Definition 19 is more general/difficult than the problem of
Definition 18), the proof follows immediately from Theorem 90.
68
| 8 |
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
1
Transmission Line Inspires A New Distributed
Algorithm to Solve the Linear System of Circuit
Fei Wei, Huazhong Yang, Senior Member, IEEE
Abstract—Transmission line, or wire, is always troublesome to
integrated circuits designers, but it could be helpful to parallel
computing researchers. This paper proposes the Virtual
Transmission Method (VTM), which is a new distributed and
stationary iterative algorithm to solve the linear system extracted
from circuit. It tears the circuit by virtual transmission lines to
achieve distributed computing. For the symmetric positive
definite (SPD) linear system, VTM is proved to be convergent. For
the unsymmetrical linear system, numerical experiments show
that VTM is possible to achieve better convergence property than
the traditional stationary algorithms. VTM could be accelerated
by some preconditioning techniques, and the convergence speed of
VTM is fast when its preconditioner is properly chosen.
Index Terms—Circuit simulation, distributed computing,
numerical analysis, transmission line, wire.
T
I. INTRODUCTION
RANSMISSION line, or interconnect, or wire, is one of the
main determinants of chip performance, because of the
long interconnect latency and large power dissipation [37].
However, the circuit could not work without transmission lines,
because the transmission line plays an irreplaceable role to
make the distributed circuit stable and scalable [13]. In this
paper, transmission lines are used to assist the distributed
computation of sparse linear system of circuit.
The basic problem of the distributed circuit simulation is to
distributedly solve the sparse linear system extracted from
circuit [34, 41, 46]. Generally speaking, the linear system of
circuit is unsymmetrical, because of the existence of controlled
sources. Restricted to the resistor-capacitor (RC) network, the
linear system would be symmetrical [39].
Many numerical algorithms are employed to solve the linear
system from circuit. KLU is an optimized LU factorization
algorithm for circuit, and it is broadly used in commercial and
non-commercial circuit simulators [49]. KLU is sequential.
SuperLU is an outstanding distributed algorithm to solve the
general unsymmetrical sparse linear system on a large number
of processors, and it has been widely adopted for circuit
simulation [15]. Xyce is a parallel circuit simulator designed
for supercomputers, and it uses the Block Jacobi
preconditioned GMRES method [50, 4, 3]. Schur complement
method is a non-overlapping domain decomposition method
making use of the master-slave model. It is simple to be
comprehended and implemented, and was frequently used [29,
65, 20]. [7] presents a parallel direct/iterative mixed approach,
based on the Schur complement method and preconditioned
GMRES method. [41] adopted the preconditioned overlapping
domain decomposition method, which is supported by PETSc,
a distributed scientific computing package [1]. The highlight of
[41] is that it improves the matrix property by exploring the
characters of transistor device models.
The symmetric linear system of circuit is mainly extracted
from the RC networks. Solving RC network is the key for the
power grid analysis and thermal analysis [30, 26]. Meanwhile,
the sparse linear system generated by the finite element method
from elliptic partial differential equations (PDE) is equivalent
to a resistor network.
The simulation of power grid has been intensively
researched in the past 10 years, and a variety of numerical
algorithms had been employed to solve the RC network, such
as stationary iterative methods [67], Krylov-subspace iterative
method [12], algebraic multigrid (AMG) [31, 69], coupled
iterative/direct method [32] and FFT method [48]. [42]
proposed a stochastic method, and this method was further
expanded as a preconditioning method for the diagonal
dominant matrix [43].
To compute the RC network on the parallel computing
platform, [68] makes use of the domain decomposition method
(DDM). [11] adopts a distributed matrix inversion algorithm.
The potential of GPU to solve the RC network was illustrated in
[6, 16, 17, 48].
VTM is a new distributed and stationary iterative algorithm
to solve the sparse linear systems [59]. VTM is similar to Block
Jacobi or Overlapped Block Jacobi method [56, 66].
VTM is inspired by the behavior of transmission line [40, 13].
It inserts virtual transmission lines into the circuit to achieve
distributed computing [58, 59]. The idea of VTM is derived
from the pseudo transient method [57]. Pseudo transient
method inserts pseudo capacitors or inductors into the circuit to
approve the convergence property of DC analysis. Similarly,
VTM inserts pseudo transmission lines into the circuit to
approve the convergence property of distributed simulation.
Inserting virtual or pseudo electrical element to assist the circuit
simulation is a common approach, and the advantage is that the
physical property of circuit could be utilized during numerical
computation.
VTM draws a parallel between distributed computing of
linear system and distributed simulation of linear circuit, and it
interprets the relationship between numerical analysis and
circuit analysis. To solve a sparse linear system in parallel is
equalized to simulate a linear circuit in parallel, and vice versa,
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
we might comprehend the distributed numerical algorithm from
the viewpoint of circuit theory and microwave network.
To partition a circuit, node tearing and branch tearing are two
important methods [64, 47]. This paper proposes the third way,
which is called wire tearing. Tearing the circuit by wires is not a
new idea, since all the subcircuits are connected by wires, but
we first apply this concept into the distributed numerical
algorithms [58, 59]. Wire tearing can be considered as the
insertion of transmission line to connect the torn nodes [61].
The advantage of wire tearing over the branch tearing and node
tearing is that it does not bring in any extra energy, because all
the wires are passive [27].
As a distributed numerical algorithm, VTM is similar to
overlapped Block Jacobi or Block SOR method [2, 45]. We
have proved that VTM is convergent to solve arbitrarily-large
SPD linear system on arbitrary number of processors [59, 62].
VTM could also be considered as a new type of algebraic
domain decomposition method [55]. VTM is similar to the
additive Schwarz method with Robin condition, i.e.
Schwarz-Robin method [35, 21, 22, 36]. Additive Schwarz
method is mainly used to solve the sparse linear system from
elliptic partial differential equations (PDE), and VTM is used to
solve the general sparse linear system. The partitioning method
for VTM, i.e. wire tearing, is different from the traditional
partitioning methods for algebraic additive Schwarz method
[22, 36]. Furthermore, the preconditioning technique for VTM
is more flexible than Optimized Schwarz Method [21].
This paper is organized as follows. Section 2 presents a brief
introduction to the linear system of circuit. Section 3 introduces
the mathematical description of transmission line. Section 4
proposes the physical background of VTM. Section 5 describes
how to partition the circuit by wire tearing. Section 6 details the
algorithm of VTM. Section 7 presents the convergence theory.
Section 8 provides a simple example. Section 9 discusses the
preconditioning techniques for VTM. Numerical experiments
are shown in Section 10. We conclude this work in Section 11.
In the appendix, we present a proof for the convergence theory.
II. LINEAR SYSTEM OF CIRCUIT
In virtue of the nodal analysis, one circuit could be described
by a sparse linear system [39].
Ax = b
(1)
Here x represents the nodes’ voltages, and b is the current
sources flowing into the nodes. A is the coefficient matrix,
which might be symmetrical, or unsymmetrical, depending on
the property of circuit.
If the circuit contains no voltage sources but only current
sources, we call it current-driven circuit. To construct the linear
system of current-driven circuit, we only need to use the nodal
analysis technique, and do not need the modified nodal analysis
technique [39]. If there were voltage sources in the circuit, they
might be equalized into current sources, according to the
Norton equivalent theory [18].
2
Fig. 1. Transmission line. (A) The circuit diagram of the transmission line. (B)
The equivalent circuit of the lossless transmission line.
Lemma 1: For a current-driven linear resistor network, its
coefficient matrix, A, is weakly diagonally dominant, and thus
symmetrical-non-negative-definite (SNND). Further, if there is
at least one resistor connecting to the ground, A is strictly
diagonally dominant, and thus symmetric-positive-definite
(SPD).
The physical insight of this lemma is that the energy of a
resistor network is always non-negative.
III. TRANSMISSION LINE
Transmission line is an important element in electrical and
microwave engineering. It is also called cable, wire or
interconnect in different contexts.
The circuit diagram of the transmission line is illustrated in
Fig. 1. The analytical description of the lossless or ideal
transmission line is the wave equation [40, 13].
∂ 2 u ( x, t )
∂ 2 u ( x, t )
LC
(2)
=
∂2 x
∂ 2t
Here L is the inductance per unit length, C is the capacitance
per unit length.
The time domain mathematical description of the lossless
transmission line is called Transmission Delay Equations, as
shown in (3) [40, 8, 59].
u1 (t ) + Z ⋅ i1 (t ) = u2 (t − τ ) − Z ⋅ i2 (t − τ )
u2 (t ) + Z ⋅ i2 (t ) = u1 (t − τ ) − Z ⋅ i1 (t − τ )
(3)
Here u1(t) and u2(t) represent the port voltages. i1(t) and i2(t)
represent port inflow currents. t is the time variable. τ is the
propagation delay. Z is the characteristic impedance, which is
positive.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
3
Z = L/C
The propagation delay of the transmission line is:
τ = l LC
Where l is the length of the transmission line.
The iterative formula of Transmission Delay Equations is
similar to the Robin boundary condition in Partial Differential
Equations and Schwarz-Robin method [35, 21]. There are two
main differences: First, the normal derivative in the robin
condition is replaced by a current; Second, (3) expresses the
time delay explicitly.
For a number of coupled transmission lines, (3) could be
re-expressed in the matrix-vector form:
u1 (t) + Z ⋅ i1 (t) = u 2 (t - τ) - Z ⋅ i 2 (t - τ)
u 2 (t) + Z ⋅ i 2 (t) = u1 (t - τ) - Z ⋅ i1 (t - τ)
(4)
Here Z is the characteristic impedance matrix of the
transmission lines. If there is no coupling among transmission
lines, Z is diagonal; if there is coupling, Z is a sparse matrix.
(4) could be re-expressed as (5):
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
(5)
Here W is the characteristic admittance matrix of the wires.
W = Z -1
Associated with the principle of parallel computer, we come
to realize that, there is conceptual similarity between the
distributed computer and the distributed circuit, as shown in
Fig. 2 [61].
First, different circuits are connected by wires, which is
similar to the situation where different processors are
connected by the digital data link.
Second, the wire has transmission delay, and there is also
communication delay between the processors.
As the result, if we assimilate each circuit to a processor, and
consider the wire as the data link between processors, then the
distributed circuit would be kind of a distributed computer.
Fig. 2. Similarity between the distribute circuit and distributed computer. (a)
Distributed circuit, two subcircuits are connected by a wire. (b) Distributed
computer, two processors are connected by a digital data link.
IV. PHYSICAL BACKGROUND
In this section, we present an observation from circuit and
microwave network. This lemma presents the stability property
of the resistor network with wires. Fig. 3 presents an illustration
for this lemma. Lemma 2 could be validated in SPICE [38, 44].
Lemma 2: A linear resistor network with wires inside never
oscillates unendingly, and it will finally settle down to the
steady state, which is the steady state of the resistor network
eliminating all the wires.
The physical insight of this lemma is that, the energy of a
resistor network is limited. Divergence means infinite energy,
which is impossible for the resistor network.
Lemma 2 is also valid for the resistor-capacitor network. But
for the general circuit with wires, it is not always valid. A
distributed circuit with wires inside might go unconvergent.
The stability is depending on the property of circuit and the
characteristic impedance of the wires.
Fig. 3. Illustration of the stability theory of resistor network with wires. (a) The resistor network with wires inside. (b) The resistor network without wires. (c) The
voltage of node 2a and node 2b in (a) woud converge to the steady state, which is the voltage of node 2 in (b).
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
V. WIRE TEARING
To solve the sparse linear system of a circuit, originally there
is no transmission line in it, but we might figure out some way
to insert transmission lines into the circuit by splitting the nodes.
This partitioning technique is called wire tearing.
By means of wire tearing, the original circuit is turned into a
distributed circuit. It is partitioned into a number of separate
sub-circuits by virtual transmission line. Later, we locate each
sub-circuit into one processor, and use the digital data link to
imitate the behavior of the transmission line. As the result, the
distributed circuit is simulated in a distributed way.
According to Lemma 2, the resistor network with wires
would finally go to the steady state, which is exactly the steady
state of the resistor network without wires. This lemma
explains the reason that VTM could always be convergent to
solve the resistor network. For the sparse linear system of a
general circuit, VTM might be unconvergent.
There are 4 steps to perform wire tearing for the circuit G .
Γ denotes the set of all the nodes in G .
Step 1. Set the splitting interface Γ interface ⊆ Γ . V is called
interfacial node if V ∈ Γinterface ; otherwise, V is called inner
node.
Step 2. Split each interfacial node into a pair of nodes, which
are called twin nodes.
Step 3. Split the resistors and current sources connected to
each interfacial node.
Step 4. Connect each pair of twin nodes by a length of
lossless wire. Add inflow currents to the twin nodes.
Example 1. Fig. 4 illustrates an example, in which a simple
resistor network is split into two sub-circuits.
4
First we define the set of inner nodes in Sub-circuit 1 as
Γ1,inner , the set of inner nodes in Sub-circuit 2 as Γ 2,inner .
By reordering the rows, the sparse linear system of circuit (1)
could be re-formatted as below by row reordering:
C
F1
F2
E1
D1
0
E2 u f
0 y 1 = g1
D2 y 2 g 2
(6)
Here u is the voltage vector of Γ interface . y1 and y2 are the
voltage vector of
Γ1,inner and Γ 2,inner , respectively.
After wire tearing, the interfacial nodes are split, and
Γinterface is split into two sets, the twin nodes in Sub-circuit 1,
Γ1,twin , and the twin nodes in Sub-circuit 2, Γ 2,twin . The
system of sub-circuit 1 is:
C1
F
1
E1 u1 f1 i1
(7)
=
+
D1 y 1 g1 0
u1 represents the voltage vector of Γ1,twin . i1 represents the
currents flowing into
Γ1,twin .
After wire tearing, the system of sub-circuit 2 is:
C 2
F
2
E 2 u 2 f 2 i 2
=
+
D2 y 2 g 2 0
(8)
Here u 2 represents the voltages vector of
Γ 2,twin . i 2
represents the currents flowing into each node of
Γ 2,twin .
Also we have,
Fig. 4. Illustration of the wire tearing. (a) The original resistor network, and node 2 is set to be the interfacial node. (b) Split
node 2 into a pair of twin nodes 2a and 2b, and insert a length of transmission line between them. 1/R2=1/R2a+1/R2b. I2=I2a+I2b.
(c) Replace the virtual transmission line with its equivalent circuit, and the original resistor network is partitioned into two
sub-networks.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
C1 + C2 = C
f1 + f 2 = f
u1 , i1 , u 2 , i 2 are called boundary variables, and they
satisfy the Transmission Delay Equations (5).
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
If we set the boundary condition as below:
u1 (t) = u 2 (t) = u(t)
i1 (t) = -i 2 (t) = i(t)
Then (6) could be re-obtained from (7) and (8).
The above splitting technique is called level-one wire tearing,
since the interfacial node is split once. If the interfacial node
was split for more than one times, this splitting technique is
called multilevel wire tearing [59].
VI. VIRTUAL TRANSMISSION METHOD
After partitioning of the circuit, there are 3 steps to perform
the parallel computing by Virtual Transmission Method.
Step 1. Replace the lossless transmission line with its
equivalent circuit.
Step 2. Load each sub-circuit into a processor.
Step 3. Use the data link to transfer the previous interfacial
variables from one processor to another by message
passing, and perform the distributed computing.
Example 2. Continuing with Example 1, the analytic
expression of sub-circuit 1 is obtained by merging (5) and (7):
E1 u1 (t) f1 i1 (t)
=
+
D1 y 1 (t) g1 0
C2 + W E 2 u 2 (t)
=
F
D2 y 2 (t)
2
f 2 + W ⋅ u1 (t - τ) - i1 (t - τ)
(13)
g2
i 2 (t) = − W ⋅ u 2 (t) + W ⋅ u1 (t - τ) - i1 (t - τ)
If all the delays of lines are 1, we obtain:
C2 + W E 2 u k2
=
F
D2 y k2
2
f 2 + W ⋅ u1k −1 - i1k −1
g2
k
k
k −1
k −1
i 2 = − W ⋅ u 2 + W ⋅ u1 - i1
(14)
Later, we locate (11) on Processor 1, and locate (14) on
Processor 2. After that, we set the initial values for boundary
variables:
u10 = u 02 = 0
i10 = i 02 = 0
At last, we do the distributed computing.
(9)
VII. CONVERGENCE THEORY
i1 (t) + W ⋅ u1 (t) = −i 2 (t - τ) + W ⋅ u 2 (t - τ)
Eliminate i 1 (t) , and we obtain:
C1 + W E1 u1 (t)
=
F
D1 y 1 (t)
1
f1 + W ⋅ u 2 (t - τ) - i 2 (t - τ)
g1
(12)
Eliminate i 2 (t) , and we obtain:
i 2 (t) + W ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
C1
F
1
C2 E 2 u 2 (t) f 2 i 2 (t)
F D y (t) = g + 0
2 2
2
2
i 2 (t) + Z ⋅ u 2 (t) = −i1 (t - τ) + W ⋅ u1 (t - τ)
5
Theorem 1 (Convergence Theory): Assume a linear resistor
network is partitioned into N sub-circuits by wire tearing, if the
characteristic impedance matrix of the virtual transmission lines
is symmetrical-positive-definite (SPD), then VTM converges at
the answer to the resistor network.
(10)
i1 (t) = − W ⋅ u1 (t) + W ⋅ u 2 (t - τ) - i 2 (t - τ)
Set all the delays of transmission lines to be 1, then,
C1 + W E1 u1k f1 + W ⋅ u 2k −1 - i 2k −1
=
F
D1 y1k
g1
1
(11)
i1k = − W ⋅ u1k + W ⋅ u 2k −1 - i 2k −1
(11) is an SPD sparse linear system, and it could be solved by
any sequential algorithms, such as cholesky factorization,
algebraic multigrid method (AMG) and conjugate gradient
method (CG).
Similarly, the analytic expression of sub-circuit 2 is obtained
by merging (5) and (8):
This conclusion is supported by Lemma 2, and the
mathematical proof is given in the appendix.
According to the proof of convergence theory, we know that
the convergence speed of VTM is depending on the choice of
the characteristic admittance matrix W. So W is also called the
preconditioner for VTM.
VIII. PRECONDITIONING
In this section, we discuss the preconditioning techniques for
VTM. We first define the input admittance matrix of a circuit or
microwave network [18, 13]. From the view of numerical
analysis, input admittance matrix is an alias of Schur
complement matrix associated with the interface variables u [45,
68].
Example 3. Refer to (7), for Sub-circuit 1, the Schur
complement matrix associated with the interface variables u1 is:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
S1 = C1 - E1D1-1F1
5.
S1 is also the input admittance matrix associated with the
interface variables u1 in Sub-circuit 1.
Similarly, in Sub-circuit 2, the Schur complement matrix
associated with the interface variables u2 is:
S 2 = C2 - E2 D-12 F2
T1 = ( W − S1 )( W + S1 )
W S 1 or S 2 . S 1 or S 2 are called the partial input
admittance matrix of the large circuit, which are defined as
below:
D
-1
S 1 = C1 - E
1 1 F1
D
-1F
S = C - E
2
S2 is also the input admittance matrix associated with the
interface variables u2 in Sub-circuit 2.
Then, the voltage reflection matrix on the interface of
Sub-circuit 1 is defined as:
−1
The voltage reflection matrix on the interface of Sub-circuit 2
is:
T2 = ( W − S 2 )( W + S 2 )
−1
6
2
2
2
2
E
1
is a submatrix of
1 D1
C 2 E
C 2
2
is a submatrix of
F2
F2 D2
C
Here 1
F
C1 E1
F D . Similarly,
1
1
E2
.
D2
This preconditioning technique is called Schur complement
or S is dense
approximation method (SCA). Usually S
1
2
matrix, and we need to drop the small elements inside the matrix.
After that, the fill-in pattern of W is similar to C1 or C2.
If the circuit is a general circuit with controlled sources, i.e.
the linear system of circuit is unsymmetrical, the above 5
CF = ρ (T1T2 )
preconditioning techniques could also be used, but VTM might
Here ρ ( A ) is the spectral radius of the square matrix A.
be unconvergent.
Consequently, we know that the convergence speed of VTM is
We have to say that, it is still an open problem to choose the
depending on the choice of the characteristic admittance matrix preconditioner for the unsymmetrical linear system. In the next
W. This viewpoint is identical to the impedance matching
section, we illustrate a simple example to show the potential of
technique in microwave engineering [13].
VTM to solve the unsymmetrical system.
In the ideal case, if we set the preconditioner,
W = S1 or S 2
IX. EXAMPLE
According to the convergence proof in the appendix, the
convergence factor of VTM is:
Then,
For the symmetrical linear system, a simple example could
be found in [59]. Here we illustrate another example to solve
As the result, only 1 iteration is needed to achieve convergence. the unsymmetrical linear system of the circuit. Fig. 5 proposes a
Based on the knowledge of microwave network, we know that, if tightly-coupled circuit with 4 operational amplifiers connected
one port is precisely matched, there would be no energy reflection end-to-end. The linear system of this circuit is:
on this port and the network would settle down after 1 reflection.
0 u1 I1
g1 g 21 0
In practice, it is impossible to obtain the accurate input
0 g
0 g 42 u2 I 2
2
admittance matrix of a large circuit, because the dimension of D1
(15)
=
ρ (T1T2 ) = 0
−1
or D2 might be very large, and it is impossible to obtain D1 and
D−21 . So we need to figure out some practical way to approximate
W to make W ≈ S1 or S 2 .
If the circuit is a resistor network, first we need to assure that
W is SPD. Continue with Example 2, there are several ways to
choose W.
1.
W = α ⋅ I, α > 0 . I is the identity matrix.
2.
W = diag ( C1 ) or diag ( C2 ) . We call it diagonal
g13
0
0
g3
0
g34
0 u3
g 4 u4
Here we set:
g1 = g 2 = g3 = g 4 = 1
g13 = g34 = g 42 = − g 21 = 10
The loop gain of this circuit is:
Gain = g13 g34 g 42 g 21 g1−1 g3−1 g 4−1 g 2−1 = −104
Then we partition this linear system by wire tearing,
preconditioner.
3.
W = C1 or C2 . This is called overlapped block
preconditioner. It is similar to the overlapped block Jacobi
method.
4.
I3
I4
W = α ⋅ C1 or α ⋅ C2 , α > 0 . This is called weighted
overlapped block preconditioner (WOB).
As the result, we obtain 2 sub-systems:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
g1
0
g13
g 2b
0
0
Here:
g 21
g2a
0
0
g 3b
g 34
0 u1 I1
0 u2 a = I 2 a + i2 a
g3a u3a I 3a + i2b
g 42 u2b I 2b + i2b
0 u3b = I 3b + i3b
g 4 u4 I 4
7
g 2 a + g 2 b = g 2 , g 3 a + g 3b = g 3
(16)
I 2 a + I 2 b = I 2 , I 3 a + I 3b = I 3
For simplicity, we set:
g 2 a = g 2b = g 3a = g3b = 0.5
The transmission delay equations of T2 are:
(17)
i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ )
i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ )
(18)
The transmission delay equations of T3 are:
Fig. 5. Solving the unsymmetric linear system by VTM . (a) The original circuit with operational amplifiers. (b) Equivalent
circuit of (a), with voltage controlled current sources (VCCS). (c) Partition the circuit by wire tearing. Node 2 and 3 is set to be
the interfacial node. (d) Partition the equivalent circuit by wire tearing. 1/R2=1/R2a+1/R2b. I2=I2a+I2b. 1/R3=1/R3a+1/R3b.
I3=I3a+I3b. (e) Replace the virtual transmission line with its equivalent circuit, and thus the original circuit is partitioned into
two sub-circuits.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ )
8
TABLE I
SPARSE MATRICES PROPERTY
i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ )
(19)
We set:
W2 = 0.5 , W3 = 20000
Merge (16), (18) and (19), we obtain the linear system for
Sub-circuit 1:
0 u2 a (t )
I 2 a + i2 a (t )
g2a
=
g g −1 g
−1
13 1 21 g3a u3a (t ) I 3a − g13 g1 I1 + i3a (t )
i2 a (t ) + W2 ⋅ u2 a (t ) = −i2b (t − τ ) + W2 ⋅ u2b (t − τ )
Name
Interface
nodes
Total nodes
Property
Source
Grid2d
100
10000
SPD
MESHPART
Grid3d
900
27000
SPD
H. Qian
Fv2
129
9801
SPD
UFpack
Wang
870
26064
Unsymm.
UFpack
Pchip
13
2298
Unsymm.
MCNC’90
TABLE II
ITERATION NUMBER TO ACHIEVE CONVERGENCE
Method
Grid2d
Grid3d
Fv2
Wang
Jacobi
27759
5238
212
50773
--
GS
18373
2950
109
27423
--
Similarly, we get the linear system for Sub-circuit 2:
SGS
11773
1571
79
26842
--
g 2b g 42 g g34 u2b (t ) I 2b − g 42 g I + i2b (t )
=
g 3b u3b (t )
I 3b + i3b (t )
0
i2b (t ) + W2 ⋅ u2b (t ) = −i2 a (t − τ ) + W2 ⋅ u2 a (t − τ )
SOR
14253
2049
66
16289
--
SSOR
8839
1073
74
29135
--
BJ
966
227
50
563
952
i3a (t ) + W3 ⋅ u3a (t ) = −i3b (t − τ ) + W3 ⋅ u3b (t − τ )
(20)
−1
4
−1
4 4
i3b (t ) + W3 ⋅ u3b (t ) = −i3a (t − τ ) + W3 ⋅ u3a (t − τ )
(21)
Finally we solve this example on 2 processors by VTM, and
the computing result is compared with a number of well-known
stationary iterative algorithms, e.g. Jacobi, Gauss Seidel (GS),
Successive Overrelaxation Method (SOR), Symmetric SOR
(SSOR), Block Jacobi (BJ) [45]. Here the global iterative index
k increases to k+1 until all the variables are updated.
As shown in Fig. 6, the traditional stationary algorithms are
Pchip
OBJ
490
114
23
287
162
VTM_Diag
963
335
42
854
160
VTM_OB
491
115
23
287
161
VTM_WOB
296
68
22
175
--
VTM_SCE
275
75
14
186
--
However, for the large unsymmetrical linear system, we
have not yet figure out an effective method to choose W. The
convergence property of VTM is depending on the property of
linear circuit, as well as the preconditioner W.
X. NUMERICAL EXPERIMENTS
Fig. 6. Comparison of the convergence speed of iterative algorithms for
resistor network.
unconvergent for this circuit, but VTM is convergent. The key
is to choose proper characteristic admittances for the virtual
transmission lines.
According to this example, we conclude that there exists a
parallel between the stability of VTM and the stability of
distributed linear circuit (or microwave network). The
traditional techniques to stabilize a distributed circuit might be
transplanted to stabilize VTM.
In this section we compare VTM with the traditional
stationary algorithms for both the symmetrical matrix and
unsymmetrical matrix. We use MATLAB and SIMULINK as
our test environment [53, 54], and use METIS and
MESHPART as our partitioning methods [28, 51, 19].
The test matrices are described in Table 1. Grid2d and
Grid3d are structured resistor networks [51, 43]. Fv2 is a 2D
mesh constructed by finite element method (FEM) [14]. Pchip
is extracted from a MOS integrated circuit of MCNC’90
testbench [52]. Wang is a sparse matrix from semiconductor
device simulation [14].
Table 2 illustrates the computing results of the stationery
iterative algorithms. BJ, OBJ and VTM are tested on 2
processors. Jacobi, GS, Symmetrical GS (SGS), SOR and
SSOR are tested on 1 processor.
VTM_Diag means VTM with diagonal preconditioner.
VTM_OB represents VTM with overlapped block
preconditioner. VTM_WOB is VTM with weighted overlapped
block preconditioner. VTM_SCA means VTM with Schur
complement approximation preconditioner. All these
preconditioning methods were previously described in Section
8.
According to Table 2, we conclude that VTM is convergent
to solve the SPD system, and its convergence speed is fast when
using the SCA or WOB preconditioner. The convergence speed
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
of OBJ and VTM_OB are same. For the unsymmetrical linear
systems, VTM might be unconvergent.
At last, we test VTM on a various number of processors, as
shown in Fig. 7. In this case, we use Grid3d as the testbench.
The test result indicates that the convergence speed of VTM is
slightly relative to the number of processors.
9
If the delays of virtual transmission lines are different and
stochastic, VTM would turn to be a fully asynchronous and
chaotic numerical algorithm [58]. If we replace each variable
by a piece of waveform, VTM would become a
waveform-relaxation algorithm [60].
To simulate the post-layout integrated circuit in parallel, we
have figured out another method to distributedly solve the
nonlinear delay differential equations extracted from the
distributed circuits [61].
APPENDIX
Here we prove that, if the graph of the resistor network is
2-partete, VTM converges.
Lemma 3: Assume a linear resistor network is partitioned into
2 sub-circuits by level-one wire tearing, if the characteristic
impedance matrix Z of the virtual transmission lines is SPD,
VTM converges at the answer to the resistor network.
Proof:
Fig. 7. Test VTM on a number of processors.
First, we consider the resistor network with inner nodes, and
eliminate these inner nodes by Schur complement technique.
Then, we prove Lemma 3 for the resistor network without inner
nodes.
The sparse linear system of the resistor network is:
C
F1
F2
XI. CONCLUSION AND FUTURE WORK
In this paper, we introduce VTM to solve the sparse linear
system of circuit in parallel. VTM is a distributed and stationary
iterative numerical algorithm, and it is efficient to solve the
resistor networks.
VTM proves many insightful conclusions linking numerics
and electrics. The physical background of VTM is electric
circuit, and this makes this algorithm different from the
traditional numerical algorithms. As presented in this paper, we
have borrowed many concepts from circuit theory to describe
this algorithm.
According to the simple example presented in Section 9, we
conclude that there exists similarity between the stability of
VTM and the stability of distributed linear circuit (or
microwave network).
The convergence speed of VTM is highly depending on the
characteristic admittance matrix of the virtual transmission
lines, i.e. its preconditioner W. A number of preconditioning
techniques are implemented to accelerate VTM. Experiments
indicate that, if W is properly chosen, the performance of VTM
would be appreciable; if not, VTM would be plain.
Nevertheless, the computation cost to design the preconditioner
W should be aware of [5].
For the SPD linear system, we have proved that VTM is
convergent; for the large unsymmetrical linear system, we have
not yet figure out an effective way to choose the characteristic
admittance matrix to guarantee convergence. This is an open
problem.
VTM could also be used to solve the nonlinear system, as we
pointed out in [59]. However, the convergence analysis of
nonlinear system is more complicated than the linear system.
This problem should be further studied.
E1
D1
0
E2 u f
0 y 1 = g1
D2 y 2 g 2
Eliminate the inner variables y1 and y2, we obtain:
(C - E D
1
F - E2 D-12 F2 ) u
-1
1 1
= f - E1 D1-1g1 - E2 D-12 g 2
y1 = -D1-1F1u + D1-1g1
y 2 = -D-12 F2u + D-12 g 2
Set,
S = C - E1D1-1F1 - E 2 D-12 F2 ,
r = f - E1D1-1g1 - E2 D-12 g 2 ,
then,
(22)
S ⋅u = r
S is called the Schur complement matrix associated with the
interface variables u.
C E
is SPD, then the Schur
F D
−1
complement matrix S = C - ED F is SPD.
Lemma 4: If A =
If the circuit is split into two sub-circuits by level-one wire
tearing, the system of Sub-circuit 1 is (7):
C1
F
1
E1 u1 f1 i1
=
+
D1 y 1 g1 0
Eliminate the inner variables y1:
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
(C
- E1D1-1F1 ) u1 = f1 - E1D1-1g1 + i1
1
u k2 = ( W + S 2 )
( W − S1 ) u1k −1
−1
+ ( W + S2 ) r
y 1 = -D1-1F1u1 + D1-1g1
-1
-1
Set S1 = C1 - E1 D1 F1 , r1 = f 1- E1 D1 g1 , then,
S1 ⋅ u1 = r1 + i1
(23)
u1k = ( W + S1 )
( W − S2 )
−1
× ( W + S 2 ) ( W − S1 ) u1k − 2
−1
−1
+ ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r
−1
+( W + S1 ) r
Eliminate the inner variables y2:
2
- E 2 D-12 F2 ) u 2 = f 2 - E2 D-12 g 2 + i 2
-1
2 2 2
-1
2 2 2,
T1 = ( W − S1 )( W + S1 )
-1
2 2
S 2 = C2 - E D F r2 = f 2- E2 D-12 g 2 , then,
S 2 ⋅ u 2 = r2 + i 2
(24)
−1
+ ( W − S1 ) T1T2 ⋅ r
−1
(28)
( W − S1 ) u1k = T1T2 ( W − S1 ) u1k −2
(29)
+T1T2 ⋅ r + T1 ⋅ r
If we make use a new variable:
= f - E1D1-1g1 - E2 D-12 g 2
a1k = ( W − S1 ) u1k
=r
Until now, we have eliminated all the inner nodes in the
resistor network by Schur complement technique, and all the
nodes are interfacial nodes. The linear system of (22) is
partitioned into two sub-systems of (23) and (24) by wire
tearing.
The iterative formula is Transmission Delay Equations (5),
i1k + W ⋅ u1k = −i 2k −1 + W ⋅ u 2k −1
i k2 + W ⋅ u 2k = −i1k −1 + W ⋅ u1k −1
then, (29) could be expressed as (30):
a1k = T1T2 ⋅ a1k − 2 + h1
where h1 = T1 ⋅ T2 ⋅ r + T1 ⋅ r .
(30)
In the following text, we will prove that (30) is convergent.
Here we use Z-1 instead of W.
T1 = ( Z −1 − S1 )( Z −1 + S1 )
−1
= Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z
−1
Here W is the characteristic admittance matrix of the
Z = W −1 .
i1k and i k2 by combine (23), (24) and (5), we find,
W ⋅ u1k + ( S1u1k - r1 ) = W ⋅ u 2k −1 - ( S 2u 2k −1 - r2 )
T2 = ( Z −1 − S 2 )( Z −1 + S 2 )
=Z
−1
(31)
−1
( I − Z ⋅ S 2 )( I + Z ⋅ S 2 )
−1
(32)
Z
Lemma 5: If Z is an SPD matrix of dimension n, then there
( W + S1 ) u1k − r1 = ( W − S 2 ) u 2k −1 + r2
exists a matrix
Thus,
Similarly, we obtain:
u1k = ( W − S1 ) T1T2 ( W − S1 ) u1k − 2
Reformat (28) as (29):
=S
r1 + r2 = f 1- E1D1-1g1 + f 2 - E 2 D-12 g 2
( W − S 2 ) u 2k −1
−1
+ ( W + S1 ) r
Then,
−1
= C - E1D1-1F1 − E2 D-12 F2
u1k = ( W + S1 )
−1
+( W − S1 ) T1 ⋅ r
S1 + S 2 = C1 - E1D1-1F1 + C2 - E2 D-12 F2
Eliminate
(27)
−1
T2 = ( W − S 2 )( W + S 2 )
S2 is called the Schur complement matrix associated with the
interface variables u2 in Sub-circuit 2.
Consequently, we have:
transmission lines. W is SPD.
−1
Set:
y 2 = -D F u + D g
Set
(26)
u1k ,
E 2 u 2 f 2 i 2
=
+
D2 y 2 g 2 0
(C
−1
Merge (25) and (26), we come to know the iterative formula for
S1 is called the Schur complement matrix associated with the
interface variables u1 in Sub-circuit 1.
The system of Sub-circuit 2 is (8):
C 2
F
2
10
−1
(25)
Z , which satisfies:
Z
T
Z = Z.
Proof: Because Z is SPD,
Z = Q T ΛQ = Q T Λ ΛQ = Z
T
Z
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
T1 = Z −1 ( I − Z ⋅ S1 )( I + Z ⋅ S1 ) Z
−1
T
where Q Q = I . I is the identity matrix.
Λ = diag (α1 , α 2 , , α n ) , α i ∈ + .
)( )
( ) ( )
( Z Q )( Z Q )
×
Z
+ Z Q Λ
(
) ( Z Q )
= Z ( Z Q )(I − Λ )( Z Q )
×( Z Q ) (I + Λ ) ( Z Q ) Z
= Z ( Z Q ) ( I − Λ )( I + Λ ) ( Z Q ) Z
1− λ
1− λ
= Z ( Z Q ) ⋅ diag
, ,
⋅ Z Q )
1+ λ (
1+ λ
(
−1
T
T
Z Q1
Z Q1
= Z −1
T
− Z TQ Λ
Z Q1
1
1
Λ = diag ( α1 , α 2 , , α n ) .
Z = ΛQ .
End of proof [25].
T
Lemma 6: If both Z and S are SPD matrix of dimension n,
then Z ⋅ S has the same eigenvalues as
T
Z ⋅S ⋅ Z .
Proof: Because S and Z are SPD, Z ⋅ S is positive-definite,
and
T
Z S Z is SPD.
T
Z ⋅ S ⋅ Z = QTQ T , where QQ T = I ,
T = diag (t1 , t 2 , , t n ) , t i > 0, i = 1,2, , n . Then,
Assume
(Z)
= Z ⋅ QTQ ⋅ ( Z )
= ( Z Q) ⋅ T ⋅ ( Z Q)
T
T -1
T
Z⋅S = Z ⋅ Z ⋅S ⋅ Z ⋅
T
T
-1
T
Similarly, we obtain,
λi > 0 , i = 1, , n ,
) (
T
Z Q1
)
-1
.
T
Z ⋅ S 2 ⋅ Z = Q 2 Λ 2Q 2 T
where Λ 2 = diag ( μ1 , μ 2 , , μ n ) , μi > 0 , i = 1, , n ,
Q 2Q 2 T = I . Z ⋅ S 2 =
(
T
) (
Z Q2 Λ 2
Then, (31) could be decomposed as below:
T
-1
T
1
1
1
-1
T
−1
1
1
1
T
−1
= Z −1
Z Q1 Λ 1
T
T
= Z −1
T
(
1
1
T
1
-1
T
−1
1
1
1
1
n
1
n
T
-1
1
Z
−1
Z ⋅ S1 ⋅ Z = Q1 Λ1Q1T
Q1Q1T = I . Z ⋅ S1 =
1
T2 = Z −1 ( I − Z ⋅ S 2 )( I + Z ⋅ S 2 ) Z
According to Lemma 5 and 6, we come to know that,
T
-1
T
1
Similarly, (32) could be decomposed as:
End of proof.
where Λ1 = diag (λ1 , λ2 , , λn ) ,
−1
1
T
−1
-1
−1
T
1
−1
T -1
T
11
Z Q2
)
-1
.
(
(
)
( )Z
1− μ
1− μ
, ,
Z Q ) ⋅ diag
⋅ Z Q )
1+ μ (
1+ μ
T
Z Q 2 ( I − Λ 2 )( I + Λ 2 )
T
2
−1
T
Z Q2
1
n
1
n
-1
T
2
The spectral radius of T1T2 is defined as:
ρ (T1T2 ) = lim ( T1T2 )
k 1/ k
k →∞
So we first calculate
( T1T2 )
norm of the square matrix A.
k
. Here A is the spectral
-1
Z
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
( T1T2 )
(
)
(
)
-1
T
T
−1
−1
Z
Z
Q
I
Λ
I
Λ
Z
Q
Z
−
+
(
)(
)
1
1
1
1
=
-1
×Z −1 Z TQ ( I − Λ )( I + Λ )−1 Z TQ
Z
2
2
2
2
Z
≤
Z
×
=
)
(
Q1 ( I − Λ1 )( I + Λ1 )−1 Q1T
Z
×Q 2 ( I − Λ 2 )( I + Λ 2 )−1 Q T2
≤
≤
(
−1
−1
Q1 ( I − Λ1 )( I + Λ1 ) Q1T
−1
Z
Z
Z
−1
−1
k
⋅
1 − λ1
1 − λn
⋅ diag
, ,
1 + λn
1 + λ1
k
Z
≤
Z
1 − λ1
1 − λn
Z ⋅ max
, ,
1+ λ
1 + λn
1
1 − μ1
1 − μn
× max k
, ,
⋅ Z
1 + μn
1 + μ1
−1
k
As the result,
ρ (T1 T2 ) = lim ( T1 T2 )
k 1/ k
1 − λ1
1 − λn
ρ (T1 ) = max
, ,
1 + λn
1 + λ1
Because μi > 0 , i = 1, , n ,
( W − S2 )
−1
× ( W + S 2 ) ( W − S1 ) u1k − 2
−1
−1
+ ( W + S1 ) ( W − S 2 ) ( W + S 2 ) r
−1
+( W + S1 ) r
k
−1
−1
−1
−1
u1∞ = I − ( W + S1 ) ( W − S 2 )( W + S 2 ) ( W − S1 )
−1
−1
−1
× ( W + S1 ) + ( W + S1 ) ( W − S 2 ) ( W + S 2 ) ⋅ r
= ( W + S1 ) − ( W − S 2 )( W + S 2 )
−1
( W − S1 )
−1
−1
× I + ( W − S 2 ) ( W + S 2 ) ⋅ r
(
(
)
)
(
)
−1
−1
I + W − S W + S −1 −1
(
2 )(
2)
=
r
−1
× I − ( W − S 2 )( W + S 2 ) W + S1
(
)
−1
( W + S ) ( ( W + S ) + ( W − S ) )−1
2
2
2
r
=
× ( ( W + S ) − ( W − S ) ) ( W + S )−1 W + S
2
2
2
1
= ( W + S 2 )( 2 W )
k →∞
1 − λ1
1 − λn
≤ max
, ,
1 + λn
1 + λ1
1 − μ1
1 − μn
, ,
× max
1 + μn
1 + μ1
= ρ (T1 ) ρ (T2 )
Because λi > 0 , i = 1, , n ,
So we conclude that VTM converges for 2-partite resistor
network [45].
According to (27), when this algorithm is convergent,
I − ( W − S )( W + S )−1 W +
2
2
=
−1
I + ( W − S 2 )( W + S 2 ) S1
−1
× I + ( W − S 2 ) ( W + S 2 ) ⋅ r
k
1 − μ1
1 − μn
× diag
, ,
⋅
1 + μn
1 + μ1
ρ (T1T2 ) < 1
Z
Q ⋅ ( I − Λ )( I + Λ )−1 ⋅ Q T
1
1
1
1
⋅
−1
T
× Q 2 ⋅ ( I − Λ 2 )( I + Λ 2 ) ⋅ Q 2
( I − Λ )( I + Λ )−1 ⋅
1
1
⋅
−1
× ( I − Λ 2 )( I + Λ 2 )
Consequently,
u1k = ( W + S1 )
⋅
×Q 2 ( I − Λ 2 )( I + Λ 2 ) Q T2
k
< 1 .
ρ (T2 ) = max
u1k = u1k − 2 = u1∞ , then,
Z
k
−1
⋅
)
k
−1
=
1 − μ1
1 − μn
, ,
1 + μn
1 + μ1
k
12
−1
( 2S 2 )( W + S 2 )
−1
−1
W + S1 r
−1
−1
= ( W + S 2 ) W −1S 2 ( W + S 2 ) W + S1 r
−1
−1
= ( I + S 2 W −1 ) S 2 ( I + W −1S 2 ) + S1 r
−1
−1
= ( S 2 + S 2 W −1S 2 )( I + W −1S 2 ) + S1 r
−1
−1
= S 2 ( I + W −1S 2 )( I + W −1S 2 ) + S1 r
< 1 ;
= [ S 2 + S1 ] r
−1
= S −1 ⋅ r
Until now, we have proved that, VTM is convergent for
2-partite resistor network when using level-one wire tearing.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
For the more general cases, the resistor network is k-partite, and
the wire tearing might be level-one or multilevel. A general
proof was presented in [62].
ACKNOWLEDGMENT
Discussions with Hao Zhang, Yi Su, Bin Niu, Yu Wang, Wei
Xue, Peng Zhang and Chun Xia were very helpful. Thanks are
due to Qi Wei, Bo Zhao, Xia Wei, Xiaojian Mao, Yongpan Liu,
Fei Qiao and Rong Luo for encouragement and support. We are
very grateful for the public domain softwares provided by John
R. Gilbert, Tim A. Davis, Robert Bridson, Haifeng Qian and et
al.
[17]
[18]
[19]
[20]
[21]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
S. Balay, K. Buschelman, V. Eijkhout, W. D. Gropp, D. Kaushik, M. G.
Knepley, L. Curfman McInnes, B. F. Smith and H. Zhang, PETSc Users
Manual, ANL-95/11 - Revision 2.1.5, Argonne National Laboratory.
R. Barrett, M. Berry, T. Chan, J. Demmel, J. Donato, J. Dongarra, V.
Eijkhout, R. Pozo, C. Romine and H. Van der Vorst. Templates for the
solution of Linear Systems: Building Blocks for Iterative Methods, 2nd
Edition, SIAM, 1994.
A. Basermann, U. Jaekel, and K. Hachiy. Preconditioning parallel sparse
iterative solvers for circuit simulation. In Proceedings of the 8th SIAM
Proceedings on Applied Linear Algebra, Williamsburg VA, 2003.
A. Basermann, U. Jaekel, and M. Nordhausen. Parallel iterative solvers for
sparse linear systems in circuit simulation. Fut. Gen. Fut. Gen.. Comput.
Sys., 21(8):1275–1284, 2005.
M. Benzi. Preconditioning techniques for large linear systems: A survey.
Journal of Computational Physics, 182:418–477, 2002.
J. Bolz, I. Farmer, E. Grinspun, and P. Schröoder. Sparse matrix solvers on
the GPU: conjugate gradients and multigrid. In ACM SIGGRAPH 2003
(San Diego, California, July 27 - 31, 2003).
C. W. Bomhof and H. A. Van der Vorst, A parallel linear system solver for
circuit simulation problems, Numerical Linear Algebra with Applications,
7 (2000).
F. H. Branin. Transient analysis of lossless transmission lines,
Proceedings of the IEEE, vol. 55, pp. 2012–2013, Nov. 1967.
R. Bridson. A MATLAB CMEX interface to the Metis library. Available
at http://www.stanford.edu/~rbridson/download/metismex.c
R. Bridson and W.-P. Tang. Refining an approximate inverse. Journal on
Computational and Applied Math, 123 (2000), Numerical Analysis 2000
vol. III: Linear Algebra, pp. 293-306.
S. Cauley, V. Balakrishnan, Cheng-Kok Koh, A parallel direct solver for
the simulation of large-scale power/ground networks, IEEE Transactions
on Computer-Aided Design of Integrated Circuits and Systems, v.29 n.4,
p.636-641, April 2010.
T. H. Chen and C. C.-P Chen. Efficient large-scale power grid analysis
based on preconditioned Krylov-subspace iterative methods. In Proc.
IEEE/ACM DAC, pages 559--562, 2001.
R. E. Collin. Foundations for microwave engineering, 2nd edition,
Wiley-IEEE Press, 2000.
T. A. Davis and Y. F. Hu. The University of Florida Sparse Matrix
Collection. Submitted to ACM Transactions on Mathematical Software.
Available at: http://www.cise.ufl.edu/research/sparse/matrices/
J. Demmel, J. Gilbert, and X. Li. An asynchronous parallel supernodal
algorithm for sparse gaussian elimination. SIAM J. Matrix Analysis and
Applications, 20(4): 915–952, 1999.
Zhuo Feng, Peng Li. Multigrid on GPU: tackling power grid analysis on
parallel SIMT platforms, Proceedings of the 2008 IEEE/ACM
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
13
International Conference on Computer-Aided Design, November 10-13,
2008, San Jose, California.
Zhuo Feng, Zhiyu Zeng. Parallel multigrid preconditioning on graphics
processing units (GPUs) for robust power grid analysis. In Proceedings of
the 47th Design Automation Conference (Anaheim, California, June 13 18, 2010). DAC '10. ACM, New York, NY, 661-666.
T. L. Floyd. Principles of electric circuits, 6th edition, Prentice Hall, 1999.
David Fritzsche, Andreas Frommer, and Daniel B. Szyld, Overlapping
blocks by growing a partition with applications to preconditioning,
Research Report 10-07-26, Department of Mathematics, Temple
University, July 2010.
N. Frohlich, B. M. Riess, U. A. Wever, and Q. Zheng A New Approach for
Parallel Simulation of VLSI Circuits on a Transsitor Level. TCAD, June
1998.
M. J. Gander, L. Halpern, and F. Nataf. Optimized Schwarz Methods. In T.
Chan, T. Kako, H. Kawarada, O. Pironneau (eds.), Proceedings of the
Twelveth International Conference on Domain Decomposition, DDM
press, 2001, pp. 15–27.
M. J. Gander, Schwarz Methods in the Course of Time, Electronic
Transactions on Numerical Analysis, 31:228–255, 2008.
A. George and J. W. Liu. Computer Solution of Large Sparse Positive
Definite Systems. Prentice-Hall, Englewood Cliffs, New Jersey, 1981.
John R. Gilbert, Gary L. Miller, and Shang-Hua Teng. Geometric mesh
partitioning: Implementation and experiments. SIAM J. Scientific
Computing 19:2091-2110, 1998.
G. H. Golub and C. F. Van Loan, Matrix computations. Johns Hopkins
University Press, 1989.
Wei Huang. HotSpot: A chip and package compact thermal modeling
methodology for VLSI design. Ph.D. Dissertation, University of Virginia,
2007.
Russell Kao. Piecewise Linear Models for Switch-Level Simulation.
Chapter 5.6.1, Node and Branch Tearing. Technical Report,
CSL-TR-92-532, Stanford University, 1992.
G. Karypis and V. Kumar. Metis 4.0: Unstructured graph partitioning and
sparse matrix ordering system, Technical report, Department of Computer
Science,
University
of
Minnesota,
1998.
Available
at
http://www.cs.umn.edu/metis
D. P. Koester. Parallel Block-Diagonal-Bordered Sparse Linear Solvers
for Power Systems Applications. Ph.D dissertation, Syracuse University.
1995.
J. N. Kozhaya and S. R. Nassif. Fast Power Grid Simulation. In
Proceedings of the 37th Design Automation Conference, 2000.
J. N. Kozhaya, S. R. Nassif, and F. N. Najm, A multigrid-like technique for
power grid analysis, IEEE Trans. Computer-aided Design, vol. 21, pp.
1148--1160, Oct. 2002.
Zhao Li, C.-J. Richard Shi. A coupled iterative/direct method for efficient
time-domain simulation of nonlinear circuits with power/ground networks.
ISCAS (5) 2004: 165-168.
Xiaoye S. Li. An overview of SuperLU: Algorithms, implementation, and
user interface. ACM Trans. Math. Softw. 2005.
Peng Li. What Is Parallel Circuit Simulation? ACM/SIGDA
E-NEWSLETTER, vol. 40, No. 4, April 1, 2010
P. L. Lions, On the Schwarz alternating method III: a variant for
nonoverlapping subdomains, Third International Symposium on Domain
Decomposition Methods for Partial Differential Equations, 1989, Houston,
Texas.
Sébastien Loisel and Daniel B. Szyld, On the convergence of Optimized
Schwarz Methods by way of Matrix Analysis , Domain Decomposition
Methods in Science and Engineering XVIII, Michel Bercovier, Martin
Gander, Ralf Kornhuber, and Olof B. Widlund, editors. Lecture Notes in
Computational Science and Engineering, Vol. 70, Springer, 2009, pages
363-370.
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
[37] J. D. Meindl. Beyond Moore's Law: The Interconnect Era. Computing in
Science and Engineering. 2003.
[38] L. Nagel. SPICE2: A Computer Program to Simulate Semiconductor
Circuits, Electronics Research Laboratory Report No. ERL-M520.
University of California, Berkeley, 1975.
[39] Jan Ogrodzki. Circuit simulation methods and algorithms. CRC Press,
1994.
[40] H. J. Pain. The physics of vibrations and waves, Wiley, 1976.
[41] He Peng, Chung-Kuan Cheng. Parallel transistor level full-chip circuit
simulation. DATE 2009: 304-307.
[42] H. Qian, S. R. Nassif, and S. S. Sapatnekar, Power grid analysis using
random walks, IEEE Trans. Computer-aided Design, vol. 24, pp.
1204--1224, Aug. 2005.
[43] H. Qian and S. S. Sapatnekar, Stochastic Preconditioning for Diagonally
Dominant Matrices, SIAM Journal on Scientific Computing, Vol. 30, No.
3, pp. 1178 – 1204, March, 2008.
[44] T. L. Quarles. Analysis of Performance and Convergence Issues for
Circuit Simulation. ERL Memo No. UCB/ERL M89/42 April 1989.
[45] Y. Saad. Iterative Methods for Sparse Linear Systems. The PWS
Publishing Company, Boston, 1996. Second edition, SIAM, Philadelphia,
2003.
[46] R. A. Saleh, K. A. Gallivan, M. C. Chang, et al. Parallel circuit simulation
on supercomputers. Proceedings of the IEEE, 1989.
[47] Alberto Sangiovanni-Vincentelli, Li-Kuan Chen, and Leon O. Chua. A
new tearing approach – node-tearing nodal analysis. In IEEE International
Symposium on Circuits and Systems, 1977.
[48] Jin Shi, Yici Cai, Wenting Hou, Liwei Ma, Sheldon X.-D. Tan, Pei-Hsin
Ho, Xiaoyi Wang. GPU friendly fast Poisson solver for structured power
grid network analysis, Proceedings of the 46th Annual Design Automation
Conference, July 26-31, 2009, San Francisco, California.
[49] Ken Stanley, T. A. Davis. KLU: a "Clark Kent" sparse LU factorization
algorithm for circuit matrices. 2004 SIAM Conference on Parallel
Processing for Scientific Computing (PP04). Originally appeared in NA
Digest, 1997.
[50] Heidi K. Thornquist, Eric R. Keiter, Robert J. Hoekstra, David M. Day,
Erik G. Boman, A parallel preconditioning strategy for efficient
transistor-level circuit simulation, Proceedings of the 2009 International
Conference on Computer-Aided Design, November 02-05, 2009, San Jose,
California.
[51] John R. Gilbert. Meshpart, a public domain matlab toolbox for sparse
matrix partitioning. Available at
http://www.cerfacs.fr/algor/Softs/MESHPART/
[52] CircuitSim90, 1990 Circuit Simulation and Modeling Workshop at
MCNC, Available at http://www.cbl.ncsu.edu/CBL_Docs/csim90.html
[53] Mathworks Corparation. Matlab User Manual. R13. 2002.
[54] Mathworks Corparation. Simulink User Manual. R13. 2002.
[55] A. Toselli and O. Widlund. Domain Decomposition Methods –
Algorithms and Theory. Springer Series in Computational, Mathematics
34, Springer, Berlin, Heidelberg, 2005.
[56] R. S. Varga. Matrix Iterative Analysis. Prentice-Hall, Englewood Cliffs,
New Jersey, 1962. Second Edition, Springer Series in Computational
Mathematics 27, Springer, Berlin, Heidelberg, New York, 2000.
[57] W. T. Weeks, A. J. Jimenez, G. W. Mahoney, and D. Mehta. Algorithms
for ASTAP - A Network-Analysis Program. IEEE Trans.Circuit Theory,
CT-20(4):628-634, 1973.
[58] Fei Wei, Huazhong Yang. Directed Transmission Method, A Fully
Asynchronous Approach to Solve Sparse Linear Systems in Parallel. In
ACM Proceedings of the 20th Symposium on Parallelism in Algorithms
and Architectures (Munich, Germany, June 14 - 16, 2008). SPAA 2008.
[59] Fei Wei, Huazhong Yang, Virtual Transmission Method, A New
Distributed Algorithm to Solve Sparse Linear Systems. The Fourth
International Conference on Networked Computing and Advanced
Information Management, vol. 1, pp.703-709, 2008.
14
[60] Fei Wei, Huazhong Yang. Waveform Transmission Method, A New
Waveform Relaxation Based Algorithm to Solve Ordinary Differential
Equations. Preprinted. 2009.
[61] Fei Wei, Huazhong Yang. Transmission Line Inspires a New Distributed
Algorithm to Solve the Nonlinear Dynamical System of Physical Circuits.
The 5th International Conference on Computer Sciences and Convergence
Information Technology, Nov. 30, Seoul, Korea, 2010.
[62] Fei Wei, Huazhong Yang. Virtual Transmission Method, Algorithm and
Theory. Preprinted. 2009.
[63] J. White, A. Sangiovanni-Vincentelli, Relaxation Techniques for the
simulation of VLSI circuits. Kluwer Academic Publishers, 1986.
[64] Felix F. Wu. Solution of large-scale networks by tearing. IEEE
Transactions on Circuits and Systems, 1976.
[65] Wei Xue, Jiwu Shu, Yongwei Wu, Weimin Zheng. Parallel Algorithm and
Implementation for Realtime Dynamical Simulation of Power System.
ICPP 2005: 137-144.
[66] D. M. Young. Iterative Solution of Large Linear Systems. Academic Press,
New York, 1971.
[67] Yu Zhong, M. D. F. Wong, Fast algorithms for IR drop analysis in large
power grid, Proceedings of the 2005 IEEE/ACM International conference
on Computer-aided design, p.351-357, November 06-10, 2005.
[68] Quming Zhou, Kai Sun, Kartik Mohanram, Danny C. Sorensen. Large
power grid analysis using domain decomposition, Proceedings of the
conference on Design, automation and test in Europe: Proceedings, March
06-10, 2006, Munich, Germany.
[69] C. Zhuo, J. Hu, M. Zhao, and K. Chen. Power grid analysis and
optimization using algebraic multigrid. IEEE Transactions on
Computer-aided Design, 27:738–751, April 2008.
Fei Wei received the B.S. degree in electronic engineering from Tsinghua
University, Beijing, China in 2004. He is currently a Ph.D student in
Department of Electronic Engineering, Tsinghua University. His research
interests are distributed numerical algorithms and transistor-level circuit
simulation.
Huazhong Yang (M’97–SM’00) received the B.S. degree in microelectronics
and the M.S. and Ph.D. degrees in circuits and systems from Tsinghua
University, Beijing, China, in 1989, 1993, and 1998, respectively. Since 1993,
he has been with the Department of Electronic Engineering, Tsinghua
University, where he has been a Full Professor since 1998. His research
interests include CMOS radio-frequency integrated circuits, VLSI system
structure for digital communications and media processing, low-voltage and
low power integrated circuits, and computer-aided design methodologies for
system integration. He has authored or coauthored 6 books and more than 180
journal and conference papers in this area and holds 9 China patents. He is also
a coeditor of the research monograph High-speed Optical
Transceivers-Integrated Circuits Designs and Optical Devices Techniques
(World Scientific, 2006).
Dr. Yang was a recipient of the fund for Distinguished Young Scholars from
NSFC in 2000, the outstanding researcher award of the National Keystone
Basic Research Program of China in 2004, and the Special Government
Allowance from the State Council of China in 2006.served as a TPC member of
the Asia-Pacific Conference on Circuits and Systems, the International
Conference on Communications, Circuits and Systems, and the Asia and South
Pacific Design Automation Conference. He is an Associate Editor of the
International Journal of Electronics.
| 5 |
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
PRT (PERSONAL RAPID TRANSIT)
NETWORK SIMULATION
Włodzimierz Choromański, Warsaw University of Technology, Faculty of Transport,
[email protected]
Wiktor B. Daszczuk, Warsaw University of Technology, Institute of Computer
Science, [email protected]
Jarosław Dyduch, Warsaw University of Technology, Faculty of Transport,
[email protected]
Mariusz Maciejewski, Warsaw University of Technology, Faculty of Transport,
[email protected]
Paweł Brach, Warsaw University of Technology, Faculty of Transport,
[email protected]
Waldemar Grabski, Warsaw University of Technology, Institute of Computer Science,
[email protected]
ABSTRACT
Transportation problems of large urban conurbations inspire search for new transportation
systems, that meet high environmental standards, are relatively cheap and user friendly. The
latter element also includes the needs of disabled and elderly people. This article concerns a
new transportation system PRT - Personal Rapid Transit. In this article the attention is
focused on the analysis of the efficiency of the PRT transport network. The simulator of
vehicle movement in PRT network as well as algorithms for traffic management and control
will be presented. The proposal of its physical implementation will be also included.
Keywords: PRT, simulation, traffic experiments
INTRODUCTION
In Warsaw University of Technology, a project on Personal Rapid Transit (PRT) (Irving at al.
1978, Andreasson 2010) is under development (Choromański et al. 2011a and 2011b,
Daszczuk at al. 2011).
Personal rapid transit (PRT), is a public transportation mode featuring small
automated vehicles operating on a network of specially-built guide ways. PRT is a type of
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
automated guideway transit (AGT), a class of system which also includes larger vehicles all
the way to small driverless subway systems. The whole system is electrically supplied.
In PRT designs, vehicles are sized for individual or small group travel, typically
carrying no more than 3 to 4 passengers per vehicle. Guide ways are arranged in a network
topology, with all stations located on sidings, and with frequent merge/diverge points. This
approach allows for nonstop, point-to-point travel, bypassing all intermediate stations. The
point-to-point service has been compared to a taxi.
There are three kinds of nodes in the PRT network: stations, capacitors and
intersections.
Stations are places where passengers book their trips and board the vehicles, or wait
for vehicles in a queue if there are no empty vehicles on a station. A capacitor is a source of
vehicles (and sometimes may serve as a parking place). Intersections are threefold: “fork”
(diverge), “join” (merge) and “junction” (such intersections are for technical purposes only).
It is assumed that a vehicle has its own control unit, which is linked via radio network with
control units of other vehicles and nodes (capacitors, stations and “join” intersections). Radio
connections are established to vehicles and nodes that are closest to the vehicle, i.e. not
farer that specified distance. This makes a subnet “visible” to the vehicle, the edge of which
is called “a horizon”. The horizon distance should be chosen carefully, too large causes too
much information to be transmitted (and routing problems), too small results in reduced
safety of the traffic.
A vehicle gets information about current parameters of movement of preceding
vehicles: their positions, velocities and mode of operation (acceleration/ constant velocity/
deceleration/ friction braking). From an intersection controller a vehicle receives the decision
on priority of crossing the intersection.
Among other mechanical, electrical and transportation research goals, simulation of PRT
network is performed, on two abstraction levels:
Coordination level is “behavioural simulation”. On this level, algorithms for following a
route, keeping up, coordination on “join” intersections, joining the traffic and similar
are tested for effectiveness.
Management level is “statistical simulation”. Simulation experiments identify the
impact of various parameters of management algorithms (mainly of empty vehicle
management and dynamic routing) on the passenger comfort (trip time and queue
size).
There are several PRT simulators available (Castangia and Guala 2011, Zheng, Jeffery and
McDonald 2009, Andreasson 2010, Hermes, Beamways, RUF), yet the authors have
decided to build the project’s own simulators, for two reasons:
Available simulators have fixed, inaccessible traffic algorithms (on both levels:
coordination and management); the user can only observe the operation of included
algorithms and he/she has no influence on their structure and parameters.
Simulators produce a number of synthetic output parameters; there is no access to
individual events (witch should be reported as a kind of “event log”); this lack does not
allow the researcher to build his/her own detailed characteristics of the traffic.
It seems that the own simulators build are more advanced. They permit the analysis of
various algorithms of coordination and management, and they give access to wide and
detailed set of traffic parameters and event logs. The purpose of simulators is:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Entry
buffer
Exit buffer
Debarking
berth
Other
berths
Boarding
berth
a) in-line
Entry
buffer
Exit buffer
Stubberths
b) stub-berths
Figure 1 – station types
analysis of various network topologies of PRT,
identification of capacity and ridership of various networks,
identification of saturation points (when performance is degraded to inaccessible
level)
research on dynamic algorithms (especially empty vehicles management and
dynamic routing), and identification the operational cost of performance improvement
(number of empty trips, distance of empty movement etc)
sensitivity of the system to variation of different traffic parameters values.
THE STRUCTURE OF THE PRT NETWORK
A structure of PRT network is a graph (Andreasson 2010). Nodes are capacitors, stations
and intersections. Edges are segments.
There are two types of stations: in-line (with the FIFO rule applied) and with stubberths. Vehicles must have ability to drive backwards to operate inside a berth. A structure of
both types of a station is shown in Figure 1.
From topography point of view, nodes are simply points of size zero. Yet the nodes
have internal structure necessary to model their roles in a network. The stations are most
complicated: they have parking places (berths), entry and exit buffers, passenger queues
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
etc. Several parameters characterize a station, including its type (in-line/stub-berths), number
of berths, sizes of entry and exit buffer. A capacitor is much simpler, because it is not related
to passengers. It has only one characteristic – a number of parking places.
Capacitor, station and “junction” intersection have one entry and one exit. “Fork”
intersection has two exits (to diverge) while “join” intersection has two entries (to merge).
Segments are edges of PRT graph. Segments are unidirectional and they have starting and
ending points in nodes (capacitors, stations and intersections). A segment is characterized
by its length and maximum velocity.
Nodes and edges conform a static structure of PRT network. Two types of dynamic
objects define a behaviour of the network: vehicles, which originate from capacitors, and
passengers appearing in stations. A Passenger group has a specific destination station.
Passengers wait for the vehicle (or take an empty one, standing in berth), then a trip is
realized, and after completing the journey, they ‘’disappear” from the system.
The basic goal of PRT network is to realize trips between stations for passengers. A
vehicle is characterized by: capacity, maximum velocity, maximum acceleration and
deceleration, maximum friction deceleration (emergency brake) and minimum (static)
separation between vehicles. Passengers are organized in groups for a trip to common
destination (station). A group is characterized by its cardinality and the target station.
THE MODEL
The control algorithm of the PRT network is specified in two levels: lower - coordination level,
and upper - management level:
Two coordination algorithms are defined: keeping up, and coordination on “join”
intersections (joining the traffic from a capacitor/station is realized as a special case
of coordination on “join” intersection).
Several management algorithms, including some empty vehicle management
algorithms and dynamic routing algorithm.
The coordination algorithms use traffic parameters like maximum velocities, maximum
acceleration and deceleration, separation between vehicles etc.
Some basic rules of behaviour are fixed in the simulator, including movement inside stations,
and movement along the track and keeping up rules, are fixed in the simulator. The routing is
based on Dijkstra’s algorithm, although edge weights in the algorithm are parameterized by
several values depending on static structure (segment lengths), traffic parameters (maximum
velocities) and dynamic traffic situation (traffic jams).
Various characteristics of the model have different variability:
The structure and topography of the network, type of individual stations (inline/stub
berths), capacity of nodes, number of vehicles, boarding and debarking times as well
as distribution of passenger group cardinality are constant.
Traffic parameters stay constant during single simulation.
Mean input of passenger groups and origin-destination matrix may be defined to be
valid in specific periods.
Maximal velocity of a segment may be changed in specified while.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
TWO APPROACHES TOWARDS PRT SIMULATION
Two independent simulators have been built: one event-driven and second based on cellular
automata. Both simulators use the same model of PRT network and the same base
parameters. This allows to compare the results and verify correctness of the two simulators.
The simulators have different usability properties: the former simulator is more accurate,
while the latter one is much faster.
Both simulators use micro-simulation (Daszczuk at al. 2011, Fox 1999, Barcelo 1999,
Gabard 1999, Nagel and Schreckenberg 1992). In the event-driven simulator, segments are
divided into sectors and passing a sector is a basic simulation step. The second simulator is
based on cellular automata, where every automaton corresponds to a singular node of the
network. The basic step of simulation is 1 second interval, in which all automata are updated.
The design of the model typically follows a hierarchy of design steps, from most
general to most detailed:
network structure and topography;
characteristics of network elements: station types, numbers of berths, maximal
velocities of segments etc.;
acceleration and deceleration, general velocity limits, separation, boarding and
debarking times, origin-destination matrix;
parameters of empty vehicle management, priority rules and dynamic routing;
number of vehicles and their individual characteristics (velocity limits for individual
vehicles);
passenger input distribution.
The simulation experiments may be used to compare throughput characteristics of various
network structures, various station and segment parameters, or particular network in which
empty vehicles management parameters or dynamic routing parameters vary. Ability to
perform the same experiments on two different simulators assures results verification that will
be model independent. Some research is described later.
EVENT-DRIVEN SIMULATION ENVIRONMENT
The movement of vehicles is performed in the event-driven manner, which is a typical
solution (Anderson 1998, Lopez et al. 2008). Every segment is divided into sectors. The
decisions on the behaviour of vehicles are made in the connections of sectors. Also, starting
some actions in capacitors/stations – passenger group occurring, coupling of passenger
group with a vehicle, beginning of boarding or debarking, start form parking place etc. are
simulation events.
The simulation environment is called Feniks 3.0. The main program of the simulator
(called “UI”) is responsible for building a model, setting its parameters and to organizing
simulation experiments. The external library (called “external simulator”) implements control
algorithms (on both layers). The whole simulator is written in C#. The interface is defined
between the simulator parts, which allows to define user’s own control algorithms instead of
supplied with external simulator.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Every event (for example start of movement, time of passing the sector) is served by
calling external simulator and performing adequate acts regarding obtained decision. The
main program (UI) is a simulation engine, an animation engine and a statistics collector.
Also, in UI are included procedures for defining a model structure and topography. External
simulator decides on every change of state of every vehicle, for instance:
coupling of passenger group with a vehicle;
beginning of boarding or debarking, passing a connection of sectors, stopping at
connection of sectors;
decision on the time of passing the sector; the time is calculated by the coordination
algorithm that guarantees safe distance between vehicles on a track.
The Simulator plans the vehicle movement analytically and therefore precisely (not
approximate). Although the simulation is event-driven, the result of simulation is similar to the
analogue simulator. The only inaccuracy comes from the fact that a vehicle may stop only at
the connection of sectors (rather than inside a sector).
Coordination - movement along a track
Vehicles move along a track with maximal possible velocity (which is a minimum from
maximum velocities of a model, a segment, a sector and a vehicle). A “horizon” is defined to
be a distance “observed” by the vehicle. The nodes and other vehicles closer than the
horizon influence the behaviour of the vehicle.
The velocity on an empty track (in a distance closer than the horizon) is limited by the
acceleration of the vehicle and by deceleration of the vehicle together with velocity limit on
the next sectors. If there is a preceding vehicle on a track, or a node (station/capacitor/”join”
intersection) which cannot be crossed because of traffic condition, a distance called
“separation” is kept. Static separation defines the minimum distance. The coordination
algorithm guarantees stopping after the preceding vehicle in static separation distance if
preceding vehicles starts to decelerate of brake at the moment.
If there is a “fork” intersection closer than the horizon, only the chosen outgoing track
(left or right) is analyzed.
If a node (capacitor or station) is closer than the horizon, and the node is the target of
the trip, the vehicle must reach the zero velocity in a point of diverging from the track towards
the node. The exception is when all the parking places and all entry buffers in the node are
occupied – in such a case the vehicle must stop in separation distance before the node.
If a vehicles wants to “drive through” a node, it runs with maximal allowed velocity, provided
that no vehicle starting from the node is in conflict (this case will be described in the next
subsection).
Coordination - behaviour on “join” intersections
A “join” intersection is allocated to one of approaching vehicles by the intersection controller.
Only the vehicles closer then the horizon distance are considered. And only closest vehicles
on both segments are taken into account, vehicles following them follow normal keeping up.
From a vehicle’s point of view, if there is a possible conflict:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
if the intersection is allocated to a vehicle on the other track leading to the
intersection, the considered vehicle is planned to stop prior to the intersection in static
separation distance;
otherwise the vehicle ask the intersection controller which vehicle has the priority; if
the other one – the considered vehicle stops as above.
Joining the traffic (from a capacitor or a station) is very similar, just the point of the capacitor
on the track (or the point of the station) is treated as intersection, and it is being allocated to
a vehicle on the move or to a vehicle joining the traffic, depending on priority rules
(parameters of coordination algorithm).
CELLULAR AUTOMATA SIMULATION ENVIRONMENT
Cellular automata is a structure defined by a matrix of cells and their states, transitions and
the rules of those transitions (Nagel and Schreckenberg 1992). Automata in such form are
mathematical models that construct an environment for a bigger, discrete classes of models,
because all the structures describing them are discrete.
Each simple cellular automaton consists of n-dimensional, discrete matrix of cells.
Each cell is the same (is a copy of the previous cell) and the whole space of the matrix must
be filled with the cells put next to each other. Each cell has exactly one state from the finite
number of available states. Transition of each cell takes place based on the same, precisely
defined local rules (homogeneity), that depend only on the previous state of the cell and
states of finite number of neighbouring cells. Transition is discrete and happens at the same
time for all cells (parallelism). In the cellular automata, a cell is finite automaton.
In order to model the PRT network and traffic a more elaborated adaptation of cellular
automata has been chosen – directed graph that represents the infrastructure.
The computational model is a directed graph, in which the nodes are the hubs and
the edges between the nodes are the segments. Each node and edge has all the parameters
that describe a given element (length of the segment, direction of movement, maximum
allowed speed, etc.). Each edge is tied to a discrete model of a segment, which is
represented by 1-dimensional array. One cell represents one unit of segment and is a
parameter of the model.
Each junction is represented as one cell. In a given unit of time, in a given cell, there
can be only one vehicle. The cell can have one of two available states – empty or occupied
by a vehicle. Each vehicle in the model moves with a velocity from the range 0…V-max.
In the simulator a topographic model has been implemented, that consists of 2-dimensional,
regular and discrete cell matrix. This model is a layer of abstraction over the directed graph.
In the graph the nodes are the elements of the segments and the edges define the direction
of movement between the nodes. Each node represents exactly one cell in the 2-dimensional
matrix.
The configuration describing the infrastructure and the initial state of the environment
– location of the vehicles, stations and capacitors and the passengers is one of the
parameters of the model. The simulator uses and optimal-path algorithm to define a route to
the target station. Such an approach allows for a dynamic control of the vehicles during the
movement and is an excellent template of the real life movement of the PRT vehicles.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Movement in the network
After defining all the elements of the cellular automata, the rules of transition can be applied
on the cell matrix. The transition process can be split into several parts (Schadschneidert and
Schreckenbergt 1993). Initial state, as mentioned previously, is a the definition of the initial
conditions of the cell. Usually those are neutral states, that do not cause any conflicts.
Update of the automata matrix is a walkthrough sequence of steps for each cell according to
the instructions below:
1. Verification of the transition rules – in this step a current state of the cell is verified
along with the states of the neighbouring cells and other parameters of automaton
2. Neighbours verification – during this step a verification of any conflict states of the
neighbouring cell takes place. If there are any conflicts they have to be resolved
according the predefined rules
3. Verification of boundary conditions – verification of the cell at the borders of the
matrix. They can be removed (absorbing closed neighbourhood) or new ones can be
created (periodic neighbourhood)
4. Verification of number of iterations- if this is a finite automaton, with predefined
lifecycle than in this step it is check whether the transition should stop.
In the case of the implemented PRT network prototype, updated model of the classic cellular
automaton has been implemented (Benjaminy et al. 1996, Li and Wu 2001). The model
consists of the following steps (each is performed in parallel for all vehicles in the
environment):
1. Acceleration: if the speed of the vehicle V is smaller than the maximum, allowed
speed (for a vehicle or road segment) and if the distance to the next vehicle is bigger
than V+1, than the velocity is increased by 1, e.g. V:= V + 1
2. Deceleration: if the vehicle at the position I, with velocity V, sees a vehicle at the
position i+j, for j smaller or equal to v, then the speed is reduced to j-1, e.g. V:= j-1
3. Randomization (optional): with a probability p1, the velocity of a vehicle is reduced by
1 (if bigger than 0), e.g. V:=V-1
4. Randomization (optional): with a probability p2, vehicle breaks down for a time period
J, e.g. the velocity of vehicle is 0 for J units of time
5. If in the next unit of time vehicle will drive through a junction, following conditions are
verified:
a. If there is no conflict on the junction, e.g. there is no other vehicle coming to
junction in the same time do nothing.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
b. Otherwise define the order of the vehicles (using weights-based function). The
priority vehicle does nothing (drives through the junction) and the other one
slows down, letting the priority vehicle to drive through. The order of passing
vehicles on the junction is defined by the weight of each vehicle - vehicle with
higher weight goes first on the crossroad. The weight of the vehicle is
determined based on the following function:
W ( p) Wt t Wd d W p p W pas pas
(1)
where:
W(p) – weight of the vehicle
Wt
- weight of waiting time
t – waiting time
Wd
- weight of the priority of the segment
d – priority of the segment
Wp
- weight of the priority of the vehicle
p – priority of the vehicle
W pas
- weight of the number of passengers
pas – number of passengers in the vehicle
6. Movement: move vehicles V cells in the direction of movement
SIMULATION RESEARCH
As an example of research work, a simulation experiment with empty trips in PRT network is
presented. A PRT network performs people transport on their demand. Yet, to achieve the
main goal, some trips without passengers (called empty trips) must be executed. The
examples are:
When a passenger group (typically 1-4 persons) occurs at a station, and there are no
empty vehicles available in the station, an empty trip must be organized to supply a
vehicle for the passenger group. It is the calling mechanism.
When a vehicle approaches a station, and there is no empty berth for it, one of empty
vehicles standing in the station must be expelled from the station.
Whether there are many empty vehicles in a given station, and there are no (or little)
empty vehicles in other station, an empty trip may be organized from the station to
the latter one (target station), especially if average passenger input at the target
station posits to expect new group soon. The mechanism is called balancing.
If an empty vehicle stays in the station for a long time, and there are no passengers
waiting or expected at the station, the vehicle may be withdrawn to a capacitor for
safety reasons (especially at night).
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
The former two mechanisms (calling and expelling) are necessary in PRT system, while the
latter two (balancing and withdrawing) are optional.
Figure 2 – The first PRT model (city)
In a simulation experiment, an impact of a passenger input rate on a number of empty trips is
examined. As a PRT network is complicated and the influence of many design parameters in
its behaviour is unknown, the research results may be obtained by simulation only. To show
that a found relation is general, various network structures and various behaviour parameters
should be applied.
For the research on the problem mentioned above, two PRT network structures were
used, presented in Figures. 2 (city) and 3 (seashore). The circles in the figures represent
stations while solid circles represent capacitors. Two numbers of vehicles were used. The
main parameters of the network are:
total tracks length 6064,5m (first model) or 5584m (second model),
12 or 24 vehicles,
4 passengers in every trip,
all stations of in-line type,
4 berths in each station.
maximal velocity 14m/s,
maximal acceleration and deceleration 2m/s2,
boarding and debarking times 10s.
static separation 4m (event-driven simulator) and 2m (cellular automata simulator),
passenger input rate differs in specific simulations,
trip destination chosen randomly
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
empty vehicle management algorithm: calling, expelling and withdrawing mechanism
used;
Figure 3 - The second PRT model (seashore)
calling principle: nearest empty vehicle is called, if any;
expelling principle: expelled empty vehicle is moved to a station on which there are
empty berths and w distance to which is close (weighted expelling rule);
withdrawing principle: if a vehicle stays in a station for longer then 120s, it is moved to
the capacitor (timeout 120s), provided that there is an empty berth in the capacitor.
During this time it may be called to other station (in which a passenger waits) or
expelled (if other vehicle approaches the station and there is no empty berth for it).
The models (as with every model) have their saturation points, i.e. maximum numbers of
trips per hour (depending on the model structure, number of vehicles etc.). The saturation
point defines maximal throughput of the network: maximal number of passengers that may
be moved to their destinations. For the research purposes, passenger groups input values
were applied at saturation point and at several (5) input values less than maximum
(passenger group input greater than in saturation point is useless because passenger
queues rise to infinity).
The results obtained from event-driven simulator are collected in Figure. 4, for the two
PRT structures and for two numbers of vehicles. The results from cellular automata simulator
are collected in Figure 5. Experiments in both simulators give similar results, where in every
plot there is a maximum of empty trips (though the input rates of the maximum and the
maximum values differ).
The explanation of the observed feature is simple, although it is hard to expect it
without simulation experiment. The reason of the plot shape is as follows:
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
for input rates near saturation point every vehicle freed by passengers is taken
immediately by successive passenger group, therefore empty trips seldom are
obeyed;
for low passenger input rates vehicles are seldom called (at most as many times as
new passenger group occur at the stations); situations requiring expelling occur rarely
(because of low number of trips with passengers); withdrawing may occur but at most
Model 1 - number of empty trips /12h
Model 1 - number of empty trips /12h
3500
6000
3000
5000
2500
4000
2000
12 vehicles
1500
24 vehicles
3000
2000
1000
1000
500
0
0
12,9
25,8
38,7
51,7
64,6
25,1
77,5
50,2
75,3
100,3
125,4 150,5
Passenger groups input /h
Passenger groups input /h
Model 2 - number of empty trips /12h
Model 2 - number of empty trips /12h
3000
5000
2500
4000
2000
3000
12 vehicles
1500
1000
24 vehicles
2000
1000
500
0
0
10,1
20,3
30,4
40,5
50,6
60,8
Passenger groups input /h
20,2
40,3
60,5
80,6
100,8 120,9
Passenger groups input /h
Figure 4 – Simulation results for both models and two numbers of vehicles (event-driven simulator)
as frequent as trips with passengers;
if passenger input grows then the numbers of calling situations and expelling
situations grow as well, while the number of withdrawing situations falls; the growth of
empty trips is limited by coincidences of passenger occurring with empty vehicle
standing in the same station; the coincidences lastly dominate and the total number
of empty trips begins to fall.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
Figure 5– Simulation results for both models and two numbers of vehicles (cellular automata simulator)
It is obvious that the described relation takes place in every reasonable model (perhaps
excluding pathological ones, for example if calling a vehicle to other station precedes taking
empty vehicle standing in the same station as passengers occur).
IMPLEMENTING PRT STEERING AND MANAGING
ALGORITHMS IN PHYSICAL LABORATORY ENVIRONMENT
In parallel with developing logical model of the PRT network, a physical one is being built on
the Warsaw University of Technology. It implements the algorithms described in the former
chapters. The security and safety of PRT system is governed by a central computer control
and dispatch system. The system consists of layers containing following subsystems
(Figure. 6):
dispatcher system – DS.
central control system – CCS
area control system – ACS
radio communication system – RCS
vehicle control system – VCS
The main task of the dispatcher system is the facilitation of the monitoring of the whole
system by the maintenance personnel. The PRT system is fully automatic and during regular
operation no human intervention is required. In case of emergency the personnel can switch
to manual control. Dispatchers monitor the current state of the traffic, power system, data
transmission and proper operability of computer systems. Dispatchers can mark any
component as faulty and plan maintenance tasks. The steering and controlling system is
equipped with surveillance video. The video cameras are mounted on the stations and PRT
vehicles. Both the stations and vehicles have systems enabling instant contact with the
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
dispatchers In case of emergency dispatchers have direct live feedback from each vehicle.
The video and voice transmissions are recorded and archived.
At the infrastructure level the system is redundant, therefore provides the continuous
operability in case of failure of single components of the system. The transmission system
Figure 6 - Structure of the steering system of PRT
also provided redundant connection in case of failure.
Central control system is of distributed type - different functions are deployed on
different steering layers. Central CCS system manages the vehicles. It sets the routes,
assigns vehicles to the orders and manages empty vehicles. Performance and optimization
of that part of the system is analyzed in the simulation environments. Optimization aims at
the defining most efficient ways of movement in PRT network in terms of travel and waiting
time as well as the energy efficiency. System react to emergency and faults situation by
dynamically reassigning routes. Each change in the traffic situation is archived with a
frequency of 100ms. The archived materials are available for analysis, elimination of
bottleneck and errors in the system.
Area control systems have the tasks of controlling single moving vehicles, controlling
the traffic on the stations and assigning right-of-way on crossroads. The whole system is
divided into areas that are managed by dedicated computers. The central system collects
information about location of each vehicle and distributes it to all area computers. The rightof-way algorithms are parameterized and can be adjusted according to the traffic state in
specific areas. ACS does not assign or manipulate routes. In case of emergency of CCS, the
ACS directs the vehicles to the nearest station or evacuation points according to predefined
scenario. If the connection with specific vehicle is lost, the ACS marks corresponding area as
unavailable in order to maximize the safety of all participants.
At the infrastructure level ACS is redundant. Additionally the information about
movements and state of a vehicle is distributed to corresponding area computer as well as to
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
neighbouring ones. Such setup assures that in case of emergency one of the neighbouring
computers can take over the control of the area.
The main tasks of vehicle control system is communication with area control system,
marking the position of the vehicle, assuring the safe distance to closest vehicle , maintaining
a safe velocity, monitoring of the door controlling system, air conditioning, lightning, etc. VCS
facilitates the voice and video communication between vehicles and dispatchers. Each
vehicle is equipped with displays showing the current state and location of vehicle.
Passenger can alter the target station at any moment and a new route will be assigned.
During the trip the main display can present commercials and news information. VCS
monitors the operation of the engine, breaking and power systems.
Communication between PRT vehicles and ACS is facilitated by digital transmission
system. The vehicle is in range of two independent base radio stations in any point of the
network. The transmission system is implemented in accordance with European standard
EN-50159. Data transmission is encoded and encrypted to disable access to the systems by
undesirable individuals. Implementation of the European standards EN-50126, EN-50128,
EN-50129 ensure highest safety, reliability and maintainability of the whole system. All the
critical technical components are configured in fail-safe technique, using 2 out of 2 model
CONCLUSIONS AND FURTHER WORK
The results from simulation experiments show that the simulation environment is useful for
observing and identification of effects occurring in PRT system. Also, it helps to compare
various conditions of network operation, especially to find optimal conditions or to avoid
traffic jams.
In the future, the comparison of various network structures, management algorithms
and other features may be performed from various points of view, for example from
passenger, network administrator or network maintenance engineer point of view.
The very wide set of output parameters measured give the possibility to observe the
behaviour of a PRT network from that outlined or other points of view. A detailed log of
events may be also obtained, which allows to build simulation statistics viewed from other
points of view.
Using the simulators, various design aspects may be viewed as complex optimization
tasks. For this purpose, “unit costs” of all PRT elements (length of the track, number of
vehicles, number of berths in a station, number of intersections of every type etc.) and PRT
services (time and distance of a travel, time of vehicle technical maintenance, cost of
amortisement, etc.) must be specified. Then, optimal usage parameters (passenger waiting
time, effective travel velocity, delays in comparison to optimal conditions) or maintenance
parameters (daily distance travelled, full/empty travel ratio etc.) may be identified in
simulation experiments.
Also, management algorithms build on other principles will be applied, i.e.
decentralized
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
ACKNOWLEDGMENT
The research work is carried out within the Eco‑Mobility Project that is being cofinanced by the European Regional Development Fund – Operational Program for
Innovative Economy. UND-POIG.01.03.01-14-154 – Project Co-ordinator Prof.
W. Choromański.
REFERENCES
Anderson J. E. (1998). Simulation of the operation of personal rapid transit systems, in
Computers in Railways VI, WIT Press, Boston Southampton, Computational
Mechanics Publications, 1998, 523-532
Andreasson I. J. (2010). Staged introduction of PRT with Mass Transit, in Proc. PRT@LHR
2010 Conference, September 21023, 2010, London Heathrow Airport,
Barceló, J., Casas, J., J.L. Ferrer, J.L., García D. (1999). Modelling Advanced Transport
Telematic Applications with Microscopic Simulators: the Case of AIMSUN2, Proc.
Micro-simulation workshop, Institute for Transport Studies, University of Leeds , July
1999, 11-24
Beamways, http://www.beamways.com/
Benjamin, S. C., Johnson, N. F., Hui, P. M. (1996) Cellular automata models of traffic flow
along a highway containing a junction, J. Phys. A: Math. Gen. 29 3119
Castangia, M., Guala, L. (2011). Modelling and simulation of a PRT network, in Proc . 17th
International Conference on Urban Transport and the Environment, June 6-8, 2011,
Pisa, Italy, pp 459-472
Choromański W., Dyduch J., Brach P. (2011a). Simulation research on innovative PRT
transportation system traffic, Logistyka 6/2011 November/October 2011 (in Polish)
Choromański W., Kowara J. (2011b). PRT–Modeling and Dynamic Simulation of Track and
Vehicle, in Proc. 13th International Conference on Automated People Movers and
Transit Systems, Paris, France, May 22-25, 2011 H. Leder W. H. and Sproule W. J.
(eds), ISBN (print): 978-0-7844-1193-3, 294-306
Daszczuk, W.B., Mieścicki, J., Grabski, W. (2011). Building simulation models and simulation
experiments in FeniksOnArena 1.0, WUT Research Report (in Polish)
Fox K. (1999). Introduction to the SMARTEST Project, in Proc. Micro-simulation workshop,
Institute for Transport Studies, University of Leeds, July 1999, 2-10
Gabard J.F., Breheret L. (1999). The SITRA-B+ Microscopic Traffic Simulation Model Examples of Use and Future Developments, in Proc. Micro-simulation workshop,
Institute for Transport Studies, University of Leeds , July 1999, 49-58
Hermes, http://students.ceid.upatras.gr/~xithalis/simulation_en.html
Irwing, J. et al. (1978). Fundamentals of Personal Rapid Transit, Lexington books, Lexington
MA, 1978, ISBN is 0-669-02520-8
Li, X., Wu, Q. (2001) Cellular automata model considering the velocity effect of a car on the
successive car, Physical Review E, Volume 64, 066128
Lopes C. V., Popov A., Kan L., Morla R. (2008). PRT simulation in an immersive virtual
world, in Proc. of the 1st international conference on Simulation tools and techniques
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
PRT (Personal Rapid Transit) Network Simulation
CHOROMAŃSKI, Włodzimierz; DASZCZUK, Wiktor; DYDUCH, Jarosław;
MACIEJEWSKI, Mariusz; BRACH, Paweł; GRABSKI, Waldemar
for communications, networks and systems, SIMTOOLS ’08, Marseille, France, 57:157:7
Nagel K., Schreckenberg M. (1992) Cellular automata model for freeway traffic. J. Phys. I 2,
2221-2229
RUF, http://www.ruf.dk/
Schadschneidert A. and Schreckenbergt M. (1993) Cellular automaton models and traffic
flow, 1993 J. Phys. A: Math. Gen. 26 L679
Zheng, P., Jeffery, D. and McDonald, M. (2009). Development and evaluation of traffic
management strategies for personal rapid transit, in Proc. Industrial Simulation
Conference 2009, Loughborough, UK, Jun 1-3, 2009, 191-195.
th
13 WCTR, July 15-18, 2013 – Rio de Janeiro, Brazil
| 5 |
Fast Algorithms for Robust PCA via Gradient Descent
Xinyang Yi∗
Dohyung Park∗
Yudong Chen†
The University of Texas at Austin∗
arXiv:1605.07784v2 [cs.IT] 19 Sep 2016
{yixy,dhpark,constantine}@utexas.edu∗
Constantine Caramanis∗
Cornell University†
[email protected]†
Abstract
We consider the problem of Robust PCA in the fully and partially observed settings. Without
corruptions, this is the well-known matrix completion problem. From a statistical standpoint
this problem has been recently well-studied, and conditions on when recovery is possible (how
many observations do we need, how many corruptions can we tolerate) via polynomial-time
algorithms is by now understood. This paper presents and analyzes a non-convex optimization
approach that greatly reduces the computational complexity of the above problems, compared
to the best available algorithms. In particular, in the fully observed case, with r denoting rank
and d dimension, we reduce the complexity from O(r2 d2 log(1/ε)) to O(rd2 log(1/ε)) – a big
savings when the rank is big. For the partially observed case, we show the complexity of our
algorithm is no more than O(r4 d log d log(1/ε)). Not only is this the best-known run-time for a
provable algorithm under partial observation, but in the setting where r is small compared to
d, it also allows for near-linear-in-d run-time that can be exploited in the fully-observed case as
well, by simply running our algorithm on a subset of the observations.
1
Introduction
Principal component analysis (PCA) aims to find a low rank subspace that best-approximates a
data matrix Y ∈ Rd1 ×d2 . The simple and standard method of PCA by singular value decomposition
(SVD) fails in many modern data problems due to missing and corrupted entries, as well as sheer
scale of the problem. Indeed, SVD is highly sensitive to outliers by virtue of the squared-error
criterion it minimizes. Moreover, its running time scales as O(rd2 ) to recover a rank r approximation
of a d-by-d matrix.
While there have been recent results developing provably robust algorithms for PCA (e.g., [8,
28]), the running times range from O(r2 d2 ) to O(d3 )1 and hence are significantly worse than SVD.
Meanwhile, the literature developing sub-quadratic algorithms for PCA (e.g., [16, 15, 3]) seems
unable to guarantee robustness to outliers or missing data.
Our contribution lies precisely in this area: provably robust algorithms for PCA with improved
run-time. Specifically, we provide an efficient algorithm with running time that matches SVD while
nearly matching the best-known robustness guarantees. In the case where rank is small compared
to dimension, we develop an algorithm with running time that is nearly linear in the dimension.
This last algorithm works by subsampling the data, and therefore we also show that our algorithm
solves the Robust PCA problem with partial observations (a generalization of matrix completion
and Robust PCA).
1
For precise dependence on error and other factors, please see details below.
1
1.1
The Model and Related Work
We consider the following setting for robust PCA. Suppose we are given a matrix Y ∈ Rd1 ×d2 that
has decomposition Y = M ∗ + S ∗ , where M ∗ is a rank r matrix and S ∗ is a sparse corruption matrix
containing entries with arbitrary magnitude. The goal is to recover M ∗ and S ∗ from Y . To ease
notation, we let d1 = d2 = d in the remainder of this section.
Provable solutions for this model are first provided in the works of [9] and [8]. They propose to
solve this problem by convex relaxation:
min |||M |||nuc + λkSk1 , s.t. Y = M + S,
M,S
(1)
where |||M |||nuc denotes the nuclear norm of M . Despite analyzing the same method, the corruption
models in [8] and [9] differ. In [8], the authors consider the setting where the entries of M ∗ are
corrupted at random with probability α. They show their method succeeds in exact recovery with
α as large as 0.1, which indicates they can tolerate a constant fraction of corruptions. Work in [9]
considers a deterministic corruption model, where nonzero entries of S ∗ can have arbitrary position,
but the sparsity of each row
√ and column does not exceed αd. They prove that for exact recovery,
it can allow α = O(1/(µr d)). This was subsequently further improved to α = O(1/(µr)), which
is in fact optimal [12, 19]. Here, µ represents the incoherence of M ∗ (see Section 2 for details). In
this paper, we follow this latter line and focus on the deterministic corruption model.
The state-of-the-art solver [21] for (1) has time complexity O(d3 /ε) to achieve error ε, and is
thus much slower than SVD, and prohibitive for even modest values of d. Work in [22] considers the
deterministic corruption model, and improves this running time without sacrificing the robustness
guarantee on α. They propose an alternating projection (AltProj) method to estimate the low
rank and sparse structures iteratively and simultaneously, and show their algorithm has complexity
O(r2 d2 log(1/ε)), which is faster than the convex approach but still slower than SVD.
Non-convex approaches have recently seen numerous developments for applications in low-rank
estimation, including alternating minimization (see e.g. [20, 18, 17]) and gradient descent (see e.g. [4,
11, 25, 26, 31, 32]). These works have fast running times, yet do not provide robustness guarantees.
One exception is [11], where the authors analyze a row-wise `1 projection method for recovering
S ∗ . Their analysis hinges on positive semidefinite M ∗ , and the algorithm requires prior knowledge
of the `1 norm of every row of S ∗ and is thus prohibitive in practice. Another exception is work
[17], which analyzes alternating minimization plus an overall sparse projection. Their algorithm is
shown to tolerate at most a fraction of α = O(1/(µ2/3 r2/3 d)) corruptions. As we discuss in Section
1.2, we can allow S ∗ to have much higher sparsity α = O(1/(µr1.5 )), which is close to optimal.
After the initial post of our paper on arxiv, Cherapanamjeri et al. [14] posted their paper on
solving robust PCA with partial observations by a method modified from AltProj. Their approach is
shown to have optimal robustness. The sample complexity they established is O(µ2 r2 d log2 d log2 (1/ε)),
which depends on the estimation error ε, since the analysis of AltProj under partial observations
requires sampling splitting. In contrast, the sample complexity O(µ2 r2 d log d) of our approach (see
Corollary 2) does not have such dependence. Moreover, their method requires computing rank-r
SVD of the observed matrices in every round of iterations. Our algorithm only needs to compute
rank-r SVD (approximately) once in the initialization step.
It is worth mentioning other works that obtain provable guarantees of non-convex algorithms or
problems including phase retrieval [5, 13, 30], EM algorithms [2, 27, 29], tensor decompositions [1]
and second order method [24]. It might be interesting to bring robust considerations to these works.
2
1.2
Our Contributions
In this paper, we develop efficient non-convex algorithms for robust PCA. We propose a novel
algorithm based on the projected gradient method on the factorized space. We also extend it to
solve robust PCA in the setting with partial observations, i.e., in addition to gross corruptions,
the data matrix has a large number of missing values. Our main contributions are summarized as
follows.2
1. We propose a novel sparse estimator for the setting of deterministic corruptions. For the lowrank structure to be identifiable, it is natural to assume that deterministic corruptions are
“spread out” (no more than some number in each row/column). We leverage this information
in a simple but critical algorithmic idea, that is tied to the ultimate complexity advantages
our algorithm delivers.
2. Based on the proposed sparse estimator, we propose a projected gradient method on the matrix
factorized space. While non-convex, the algorithm is shown to enjoy linear convergence under
proper initialization. Along with a new initialization method, we show that robust PCA can
be solved within complexity O(rd2 log(1/ε)) while ensuring robustness α = O(1/(µr1.5 )). Our
algorithm is thus faster than the best previous known algorithm by a factor of r, and enjoys
superior empirical performance as well.
3. Algorithms for Robust PCA with partial observations still rely on a computationally expensive convex approach, as apparently this problem has evaded treatment by non-convex methods. We consider precisely this problem. In a nutshell, we show that our gradient method
succeeds (it is guaranteed to produce the subspace of M ∗ ) even when run on no more than
O(µ2 r2 d log d) random entries of Y . The computational cost is O(µ3 r4 d log d log(1/ε)). When
rank r is small compared to the dimension d, in fact this dramatically improves on our bound
above, as our cost becomes nearly linear in d. We show, moreover, that this savings and robustness to erasures comes at no cost in the robustness guarantee for the deterministic (gross)
corruptions. While this demonstrates our algorithm is robust to both outliers and erasures, it
also provides a way to reduce computational costs even in the fully observed setting, when r
is small.
4. An immediate corollary of the above result provides a guarantee for exact matrix completion,
with general rectangular matrices, using O(µ2 r2 d log d) observed entries and O(µ3 r4 d log d log(1/ε))
time, thereby improving on existing results in [11, 25].
1.3
Organization and Notation
The remainder of this paper is organized as follows. In Section 2, we formally describe our problem
and assumptions. In Section 3, we present and describe our algorithms for fully (Algorithm 1) and
partially (Algorithm 2) observed settings. In Section 4.1, we establish theoretical guarantees of
Algorithm 1. The theory for partially observed setting are presented in Section 4.2. The numerical
results are collected in Section 5. Sections 6, 7 and Appendix A contain all the proofs and technical
lemmas.
To ease presentation, the discussion here assumes M ∗ has constant condition number, whereas our results below
show the dependence on condition number explicitly.
2
3
For any index set Ω ⊆ [d1 ]×[d2 ], we let Ω(i,·) := (i, j) ∈ Ω j ∈ [d2 ] , Ω(·,j) := (i, j) ∈ Ω i ∈ [d1 ] .
For any matrix A ∈ Rd1 ×d2 , we denote its projector onto support Ω by ΠΩ (A), i.e., the (i, j)-th
entry of ΠΩ (A) is equal to A if (i, j) ∈ Ω and zero otherwise. The i-th row and j-th column of
A are denoted by A(i,·) and A(·,j) . The (i, j)-th entry is denoted as A(i,j) . Operator norm of A is
|||A|||op . Frobenius norm of A is |||A|||F . The `a /`b norm of A is denoted by |||A|||b,a , i.e., the `a norm of
the vector formed by the `b norm of every row. For instance, |||A|||2,∞ stands for maxi∈[d1 ] kA(i,·) k2 .
2
Problem Setup
We consider the problem where we observe a matrix Y ∈ Rd1 ×d2 that satisfies Y = M ∗ + S ∗ , where
M ∗ has rank r, and S ∗ is corruption matrix with sparse support. Our goal is to recover M ∗ and S ∗ .
In the partially observed setting, in addition to sparse corruptions, we have erasures. We assume
that each entry of M ∗ + S ∗ is revealed independently with probability p ∈ (0, 1). In particular, for
any (i, j) ∈ [d1 ] × [d2 ], we consider the Bernoulli model where
(
(M ∗ + S ∗ )(i,j) , with probability p;
Y(i,j) =
(2)
∗,
otherwise.
We denote the support of Y by Φ = {(i, j) | Y(i,j) 6= ∗}. Note that we assume S ∗ is not adaptive to
Φ. As is well-understood thanks to work in matrix completion, this task is impossible in general –
we need to guarantee that M ∗ is not both low-rank and sparse. To avoid such identifiability issues,
we make the following standard assumptions on M ∗ and S ∗ : (i) M ∗ is not near-sparse or “spiky.”
We impose this by requiring M ∗ to be µ-incoherent – given a singular value decomposition (SVD)3
M ∗ = L∗ Σ∗ R∗> , we assume that
r
r
µr
µr
∗
∗
|||L |||2,∞ ≤
, |||R |||2,∞ ≤
.
d1
d2
(ii) The entries of S ∗ are “spread out” – for α ∈ [0, 1), we assume S ∗ ∈ Sα , where
n
o
Sα := A ∈ Rd1 ×d2 kA(i,·) k0 ≤ αd2 for all i ∈ [d1 ] ; kA(·,j) k0 ≤ αd1 for all j ∈ [d2 ] .
(3)
In other words, S ∗ contains at most α-fraction nonzero entries per row and column.
3
Algorithms
For both the full and partial observation settings, our method proceeds in two phases. In the first
phase, we use a new sorting-based sparse estimator to produce a rough estimate Sinit for S ∗ based on
the observed matrix Y , and then find a rank r matrix factorized as U0 V0> that is a rough estimate
of M ∗ by performing SVD on (Y − Sinit ). In the second phase, given (U0 , V0 ), we perform an
iterative method to produce series {(Ut , Vt )}∞
t=0 . In each step t, we first apply our sparse estimator
to produce a sparse matrix St based on (Ut , Vt ), and then perform a projected gradient descent
step on the low-rank factorized space to produce (Ut+1 , Vt+1 ). This flow is the same for full and
partial observations, though a few details differ. Algorithm 1 gives the full observation algorithm,
and Algorithm 2 gives the partial observation algorithm. We now describe the key details of each
algorithm.
3
Throughout this paper, we refer to SVD of rank r matrix by form LΣR> where Σ ∈ Rr×r .
4
Sparse Estimation. A natural idea is to keep those entries of residual matrix Y − M that have
large magnitude. At the same time, we need to make use of the dispersed property of Sα that every
column and row contain at most α-fraction of nonzero entries. Motivated by these two principles, we
introduce the following sparsification operator: For any matrix A ∈ Rd1 ×d2 : for all (i, j) ∈ [d1 ]×[d2 ],
we let
(
(αd )
(αd )
A(i,j) , if |A(i,j) | ≥ |A(i,·)2 | and |A(i,j) | ≥ |A(·,j)1 |
Tα [A] :=
,
(4)
0,
otherwise
(k)
(k)
where A(i,·) and A(·,j) denote the elements of A(i,·) and A(·,j) that have the k-th largest magnitude
respectively. In other words, we choose to keep those elements that are simultaneously among
the largest α-fraction entries in the corresponding row and column. In the case of entries having
identical magnitude, we break ties arbitrarily. It is thus guaranteed that Tα [A] ∈ Sα .
Algorithm 1 Fast RPCA
INPUT: Observed matrix Y with rank r and corruption fraction α; parameters γ, η; number of
iterations T .
// Phase I: Initialization.
1: Sinit ← Tα [Y ]
// see (4) for the definition of Tα [·].
2: [L, Σ, R] ← SVDr [Y − Sinit ] 4
3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7).
// Phase II: Gradient based iterations.
4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 )
5: for t = 0, 1, . . . , T − 1 do
6:
St ← Tγα Y − Ut Vt>
7:
Ut+1 ← ΠU Ut − η∇U L(Ut , Vt ; St ) − 12 ηUt (Ut> Ut − Vt> Vt )
8:
Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 21 ηVt (Vt> Vt − Ut> Ut )
9: end for
OUTPUT: (UT , VT )
Initialization. In the fully observed setting, we compute Sinit based on Y as Sinit = Tα [Y ]. In the
partially observed setting with sampling rate p, we let Sinit = T2pα [Y ]. In both cases, we then set
U0 = LΣ1/2 and V0 = RΣ1/2 , where LΣR> is an SVD of the best rank r approximation of Y − Sinit .
Gradient Method on Factorized Space. After initialization, we proceed by projected gradient
descent. To do this, we define loss functions explicitly in the factored space, i.e., in terms of U, V
and S:
L(U, V ; S) :=
e V ; S) :=
L(U,
1
|||U V > + S − Y |||2F ,
(fully observed)
2
1
|||ΠΦ U V > + S − Y |||2F .
(partially observed)
2p
(5)
(6)
4
SVDr [A] stands for computing a rank-r SVD of matrix A, i.e., finding the top r singular values and vectors of A.
Note that we only need to compute rank-r SVD approximately (see the initialization error requirement in Theorem
1) so that we can leverage fast iterative approaches such as block power method and Krylov subspace methods [23].
5
Recall that our goal is to recover M ∗ that satisfies the µ-incoherent condition. Given an SVD
M ∗ = L∗ ΣR∗> , we expect that the solution (U, V ) is close to (L∗ Σ1/2 , R∗ Σ1/2 ) up to some rotation.
In order to serve such µ-incoherent structure, it is natural to put constraints on the row norms of
U, V based on |||M ∗ |||op . As |||M ∗ |||op is unavailable, given U0 , V0 computed in the first phase, we rely
on the sets U, V defined as
r
r
2µr
2µr
d2 ×r
d1 ×r
|||A|||2,∞ ≤
U := A ∈ R
|||A|||2,∞ ≤
|||U0 |||op , V := A ∈ R
|||V0 |||op . (7)
d1
d2
Now we consider the following optimization problems with constraints:
min
U ∈U ,V ∈V,S∈Sα
min
U ∈U ,V ∈V,S∈Spα
1
L(U, V ; S) + |||U > U − V > V |||2F ,
8
e V ; S) + 1 |||U > U − V > V |||2 .
L(U,
F
64
(fully observed)
(partially observed)
(8)
(9)
The regularization term in the objectives above is used to encourage that U and V have the same
scale. Given (U0 , V0 ), we propose the following iterative method to produce series {(Ut , Vt )}∞
t=0 and
{St }∞
.
We
give
the
details
for
the
fully
observed
case
–
the
partially
observed
case
is
similar.
For
t=0
>
t = 0, 1, . . ., we update St using the sparse estimator St = Tγα Y − Ut Vt , followed by a projected
gradient update on Ut and Vt
1
>
>
Ut+1 = ΠU Ut − η∇U L(Ut , Vt ; St ) − ηUt (Ut Ut − Vt Vt ) ,
2
1
>
>
Vt+1 = ΠV Vt − η∇V L(Ut , Vt ; St ) − ηVt (Vt Vt − Ut Ut ) .
2
Here α is the model parameter that characterizes the corruption fraction, γ and η are algorithmic
tunning parameters, which we specify in our analysis. Essentially, the above algorithm corresponds
to applying projected gradient method to optimize (8), where S is replaced by the aforementioned
sparse estimator in each step.
Algorithm 2 Fast RPCA with partial observations
INPUT: Observed matrix Y with support Φ; parameters τ, γ, η; number of iterations T .
// Phase I: Initialization.
1: Sinit ← T2pα [ΠΦ (Y )]
2: [L, Σ, R] ← SVDr [ p1 (Y − Sinit )]
3: U0 ← LΣ1/2 , V0 ← RΣ1/2 . Let U, V be defined according to (7).
// Phase II: Gradient based iterations.
4: U0 ← ΠU (U0 ), V0 ← ΠV (V0 )
5: for t = 0, 1, . . . , T − 1 do
>
6:
St ← Tγpα Π
Y
−
U
V
t
Φ
t
e t , Vt ; St ) − 1 ηUt (U > Ut − V > Vt )
7:
Ut+1 ← ΠU Ut − η∇U L(U
t
t
16
1
e
8:
Vt+1 ← ΠV Vt − η∇V L(Ut , Vt ; St ) − 16 ηVt (Vt> Vt − Ut> Ut )
9: end for
OUTPUT: (UT , VT )
6
4
Main Results
In this section, we establish theoretical guarantees for Algorithm 1 in the fully observed setting and
for Algorithm 2 in the partially observed setting.
4.1
Analysis of Algorithm 1
We begin with some definitions and notation. It is important to define a proper error metric because
the optimal solution corresponds to a manifold and there are many distinguished pairs (U, V ) that
minimize (8). Given the SVD of the true low-rank matrix M ∗ = L∗ Σ∗ R∗> , we let U ∗ := L∗ Σ∗1/2 and
V ∗ := R∗ Σ∗1/2 . We also let σ1∗ ≥ σ2∗ ≥ . . . ≥ σr∗ be sorted nonzero singular values of M ∗ , and denote
the condition number of M ∗ by κ, i.e., κ := σ1∗ /σr∗ . We define estimation error d(U, V ; U ∗ , V ∗ ) as
the minimal Frobenius norm between (U, V ) and (U ∗ , V ∗ ) with respect to the optimal rotation,
namely
p
d(U, V ; U ∗ , V ∗ ) := min |||U − U ∗ Q|||2F + |||V − V ∗ Q|||2F ,
(10)
Q∈Qr
for Qr the set of r-by-r orthonormal matrices. This metric controls reconstruction error, as
p
|||U V > − M ∗ |||F . σ1∗ d(U, V ; U ∗ , V ∗ ),
(11)
p
when d(U, V ; U ∗ , V ∗ ) ≤ σ1∗ . We denote the local region around the optimum (U ∗ , V ∗ ) with radius
ω as
o
n
B2 (ω) := (U, V ) ∈ Rd1 ×r × Rd2 ×r d(U, V ; U ∗ , V ∗ ) ≤ ω .
The next two theorems provide guarantees for the initialization phase and gradient iterations,
respectively, of Algorithm 1. The proofs are given in Sections 6.1 and 6.2.
Theorem 1 (Initialization). Consider the paired (U0 , V0 ) produced in the first phase of Algorithm
1. If α ≤ 1/(16κµr), we have
√
√ p
d(U0 , V0 ; U ∗ , V ∗ ) ≤ 28 καµr r σ1∗ .
Theorem 2 (Convergence). Consider the second phase of Algorithm 1. Suppose we choose γ = 2
and η = c/σ1∗ for any c ≤ 1/36.
There exist constants c1 , c2 such that when α ≤ c1 /(κ2 µr), given
p
any (U0 , V0 ) ∈ B2 c2 σr∗ /κ , the iterates {(Ut , Vt )}∞
t=0 satisfy
c t 2
d2 (Ut , Vt ; U ∗ , V ∗ ) ≤ 1 −
d (U0 , V0 ; U ∗ , V ∗ ).
8κ
Therefore, using proper initialization and step size, the gradient iteration converges at a linear
rate with a constant contraction factor 1 − O(1/κ). To obtain relative precision ε compared to
the initial error, it suffices to perform
√ O(κ log(1/ε)) iterations. Note that the step size is chosen
according to 1/σ1∗ . When α . 1/(µ κr3 ), Theorem 1 and the inequality (11) together imply that
|||U0 V0> − M ∗ |||op ≤ 12 σ1∗ . Hence we can set the step size as η = O(1/σ1 (U0 V0> )) using being the top
singular value σ1 (U0 V0> ) of the matrix U0 V0>
Combining Theorems 1 and 2 implies the following result, proved in Section 6.3, that provides
an overall guarantee for Algorithm 1.
7
Corollary 1. Suppose that
(
α ≤ c min
1
1
√ 3, 2
µ κr µκ r
)
for some constant c. Then for any ε ∈ (0, 1), Algorithm 1 with T = O(κ log(1/ε)) outputs a pair
(UT , VT ) that satisfies
|||UT VT> − M ∗ |||F ≤ ε · σr∗ .
(12)
Remark 1 (Time Complexity). For simplicity we assume d1 = d2 = d. Our sparse estimator (4)
can be implemented by finding the top αd elements of each row and column via partial quick sort,
which has running time O(d2 log(αd)). Performing rank-r SVD in the first phase and computing the
gradient in each iteration both have complexity O(rd2 ).5 Algorithm 1 thus has total running time
O(κrd2 log(1/ε)) for achieving an accuracy as in (12). We note that when κ = O(1), our algorithm
is orderwise faster than the AltProj algorithm in [22], which has running time O(r2 d2 log(1/ε)).
Moreover, our algorithm only requires computing one singular value decomposition.
Remark 2 (Robustness). Assuming κ = O(1), our algorithm can tolerate corruption at a sparsity
√
√
level up to α = O(1/(µr r)). This is worse by a factor r compared to the optimal statistical
guarantee 1/(µr) obtained in [12, 19, 22]. This looseness is a consequence of the condition for (U0 , V0 )
in Theorem 2. Nevertheless, when µr = O(1), our algorithm can tolerate a constant α fraction of
corruptions.
Notably, we show that gradient descent works in the case of α = O(1/(µr)) if initialization is
sufficiently close. Accordingly, to provide an algorithm with optimal robustness, it is straightforward
to use a more complicated initial method such as AltProj that can tolerate 1/(µr) fraction of
corruptions while satisfying our initial condition. As gradient descent provides a simple and efficient
way to successively refine the estimation, such combination still gives a better running time than
prior arts.
4.2
Analysis of Algorithm 2
We now move to the guarantees of Algorithm 2. We show here that not only can we handle partial
observations, but in fact subsampling the data in the fully observed case can significantly reduce the
time complexity from the guarantees given in the previous section without sacrificing robustness.
In particular, for smaller values of r, the complexity of Algorithm 2 has near linear dependence on
the dimension d, instead of quadratic.
In the following discussion, we let d := max{d1 , d2 }. The next two results, proved in Sections
6.4 and 6.5, control the quality of the initialization step, and then the gradient iterations.
Theorem 3 (Initialization, partial observations). Suppose the observed indices Φ follow the Bernoulli
model given in (2). Consider the pair (U0 , V0 ) produced in the first phase of Algorithm 2. There
√
exist constants {ci }3i=1 such that for any ∈ (0, r/(8c1 κ)), if
2
1
µr
1
log d
α≤
, p ≥ c2
+
,
(13)
2
64κµr
α d1 ∧ d2
then we have
5
p
√
√ p
d(U0 , V0 ; U ∗ , V ∗ ) ≤ 51 καµr r σ1∗ + 7c1 κσ1∗ ,
In fact, it suffices to compute the best rank-r approximation with running time independent of the eigen gap.
8
with probability at least 1 − c3 d−1 .
Theorem 4 (Convergence, partial observations). Suppose the observed indices Φ follow the Bernoulli
model given in (2). Consider the second phase of Algorithm 2. Suppose we choose γ = 3, and
η = c/(µrσ1∗ ) for a sufficiently small constant c. There exist constants {ci }4i=1 such that if
α≤
κ4 µ2 r2 log d
c1
,
and
p
≥
c
2
κ2 µr
d1 ∧ d2
(14)
then with probability at least 1 − c3 d−1 , the iterates {(Ut , Vt )}∞
t=0 satisfy
2
∗
∗
d (Ut , Vt ; U , V ) ≤
c
1−
64µrκ
t
d2 (U0 , V0 ; U ∗ , V ∗ )
p
for all (U0 , V0 ) ∈ B2 c4 σr∗ /κ .
The above result ensures linear convergence to (U ∗ , V ∗ ) (up to rotation) even when the gradient
iterations are computed using partial observations. Note that setting p = 1 recovers Theorem 2 up
to an additional factor µr in the contraction factor. For achieving ε relative accuracy, now we need
O(µrκ log(1/ε)) iterations.
Putting Theorems 3 and 4 together, we have the following overall guarantee, proved in Section
6.6, for Algorithm 2.
Corollary 2. Suppose that
(
α ≤ c min
1
1
√ 3, 2
µ κr µκ r
)
, p ≥ c0
κ4 µ2 r2 log d
,
d1 ∧ d2
for some constants c, c0 . With probability at least 1 − O(d−1 ), for any ε ∈ (0, 1), Algorithm 2 with
T = O(µrκ log(1/ε)) outputs a pair (UT , VT ) that satisfies
|||UT VT> − M ∗ |||F ≤ ε · σr∗ .
(15)
This result shows that partial observations do not compromise robustness to sparse corruptions:
as long as the observation probability p satisfies the condition in Corollary 2, Algorithm 2 enjoys
the same robustness guarantees as the method using all entries. Below we provide two remarks on
the sample and time complexity. For simplicity, we assume d1 = d2 = d, κ = O(1).
Remark 3 (Sample complexity and matrix completion). Using the lower bound on p, it is sufficient
to have O(µ2 r2 d log d) observed entries. In the special case S ∗ = 0, our partial observation model
is equivalent to the model of exact matrix completion (see, e.g., [7]). We note that our sample
complexity (i.e., observations needed) matches that of completing a positive semidefinite (PSD)
matrix by gradient descent as shown in [11], and is better than the non-convex matrix completion
algorithms in [20] and [25]. Accordingly, our result reveals the important fact that we can obtain
robustness in matrix completion without deterioration of our statistical guarantees. It is known that
that any algorithm for solving exact matrix completion must have sample size Ω(µrd log d) [7], and a
nearly tight upper bound O(µrd log2 d) is obtained in [10] by convex relaxation. While sub-optimal
by a factor µr, our algorithm is much faster than convex relaxation as shown below.
9
d(U, V ; U ∗ , V ∗ )
GD p = 1
GD p = 0.5
GD p = 0.2
10 3
Time(secs)
d(U, V ; U ∗ , V ∗ )
10 1
10 0
10 -1
10 2
10 1
10 -2
10
GD p = 1
GD p = 0.5
GD p = 0.2
GD p = 0.1
AltProj
IALM
0
10 -1
10 -2
10 -3
0
2
4
6
8
10
Iteration count
(a)
10 3
10 4
10 5
Dimension d
(b)
0
20
40
60
80
100
Time(secs)
(c)
Figure 1. Results on synthetic data. (a) Plot of log estimation error versus number of iterations
when using gradient descent (GD) with varying sub-sampling rate p. It is conducted using d =
5000, r = 10, α = 0.1. (b) Plot of running time of GD versus dimension d with r = 10, α = 0.1, p =
0.15r2 log d/d. The low-rank matrix is recovered in all instances, and the line has slope approximately
one. (c) Plot of log estimation error versus running time for different algorithms in problem with
d = 5000, r = 10, α = 0.1.
Remark 4 (Time complexity). Our sparse estimator on the sparse matrix with support Φ can be
implemented via partial quick sort with running time O(pd2 log(αpd)). Computing the gradient
in each step involves the two terms in the objective function (9). Computing the gradient of the
first term Le takes time O(r|Φ|), whereas the second term takes time O(r2 d). In the initialization
phase, performing rank-r SVD on a sparse matrix with support Φ can be done in time O(r|Φ|). We
conclude that when |Φ| = O(µ2 r2 d log d), Algorithm 2 achieves the error bound (15) with running
time O(µ3 r4 d log d log(1/ε)). Therefore, in the small rank setting with r d1/3 , even when full
observations are given, it is better to use Algorithm 2 by subsampling the entries of Y .
5
Numerical Results
In this section, we provide numerical results and compare the proposed algorithms with existing
methods, including the inexact augmented lagrange multiplier (IALM) approach [21] for solving
the convex relaxation (1) and the alternating projection (AltProj) algorithm proposed in [22]. All
algorithms are implemented in MATLAB 6 , and the codes for existing algorithms are obtained
from their authors. SVD computation in all algorithms uses the PROPACK library.7 We ran all
simulations on a machine with Intel 32-core Xeon (E5-2699) 2.3GHz with 240GB RAM.
5.1
Synthetic Datasets
We generate a squared data matrix Y = M ∗ + S ∗ ∈ Rd×d as follows. The low-rank part M ∗ is
given by M ∗ = AB > , where A, B ∈ Rd×r have entries drawn independently from a zero mean
Gaussian distribution with variance 1/d. For a given sparsity parameter α, each entry of S ∗ is set
to be nonzero with probability α, and the values of the nonzero entries are sampled uniformly from
[−5r/d, 5r/d].
The results are summarized in Figure 1. Figure 1a shows the convergence of our algorithms
for different random instances with different sub-sampling rate p (note that p = 1 corresponds to
6
7
Our code is available at https://www.yixinyang.org/code/RPCA_GD.zip.
http://sun.stanford.edu/~rmunk/PROPACK/
10
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Figure 2. Foreground-background separation in Restaurant and ShoppingMall videos. In each line,
the leftmost image is an original frame, and the other four are the separated background obtained
from our algorithms with p = 1, p = 0.2, AltProj, and IALM. The running time required by each
algorithm is shown in the title.
the fully observed setting). As predicted by Theorems 2 and 4, our gradient method converges
geometrically with a contraction factor nearly independent of p. Figure 1b shows the running time
of our algorithm with partially observed data. We see that the running time scales linearly with d,
again consistent with the theory. We note that our algorithm is memory-efficient: in the large scale
setting with d = 2×105 , using approximately 0.1% entries is sufficient for the successful recovery. In
contrast, AltProj and IALM are designed to manipulate the entire matrix with d2 = 4×1010 entries,
which is prohibitive on a single machine. Figure 1c compares our algorithms with AltProj and IALM
by showing reconstruction error versus real running time. Our algorithm requires significantly less
computation to achieve the same accuracy level, and using only a subset of the entries provides
additional speed-up.
5.2
Foreground-background Separation
We apply our method to the task of foreground-background (FB) separation in a video. We use
two public benchmarks, the Restaurant and ShoppingMall datasets.8 Each dataset contains a video
with static background. By vectorizing and stacking the frames as columns of a matrix Y , the FB
separation problem can be cast as RPCA, where the static background corresponds to a low rank
matrix M ∗ with identical columns, and the moving objects in the video can be modeled as sparse
corruptions S ∗ . Figure 2 shows the output of different algorithms on two frames from the dataset.
Our algorithms require significantly less running time than both AltProj and IALM. Moreover, even
with 20% sub-sampling, our methods still appear to achieve better separation quality (note that in
each of the frames our algorithms remove a person that is not identified by the other algorithms).
Figure 3 shows recovery results for several more frames. Again, our algorithms enjoy better
running time and outperform AltProj and IALM in separating persons from the background images.
In Appendix B, we describe the detailed parameter settings for our algorithm.
8
http://perception.i2r.a-star.edu.sg/bk_model/bk_index.html
11
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (49.8s)
GD, 20% sample (18.1s)
AltProj (101.5s)
IALM (434.6s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Original
GD (87.3s)
GD, 20% sample (43.4s)
AltProj (283.0s)
IALM (801.4s)
Figure 3. More results of FB separation in Restaurant and ShoppingMall videos. The leftmost
images are original frames. The right four columns show the results from our algorithms with p =
1, p = 0.2, AltProj [22], and IALM [21]. The runtime of each algorithm is written in the title.
12
6
Proofs
In this section we provide the proofs for our main theoretical results in Theorems 1–4 and Corollaries 1–2.
6.1
Proof of Theorem 1
Let Y := Y − Sinit . As Y = M ∗ + S ∗ , we have Y − M ∗ = S ∗ − Sinit . We obtain Y − M ∗ ∈ S2α
because S ∗ , Sinit ∈ Sα .
We claim that kY −M ∗ k∞ ≤ 2kM ∗ k∞ . Denote the support of S ∗ , Sinit by Ω∗ and Ω respectively.
Since Y − M ∗ is supported on Ω ∪ Ω∗ , to prove the claim it suffices to consider the following three
cases.
• For (i, j) ∈ Ω∗ ∩ Ω, due to rule of sparse estimation, we have (S ∗ − Sinit )(i,j) = 0.
∗ | ≤ 2kM ∗ k . Otherwise, we have |Y
∗
• For (i, j) ∈ Ω∗ \ Ω, we must have |S(i,j)
∞
(i,j) | = |(S +
M ∗ )(i,j) | > kM ∗ k∞ . So |Y(i,j) | is larger than any uncorrupted entries in its row and column.
Since there are at most α fraction corruptions per row and column, we have Y(i,j) ∈ Ω, which
violates the prior condition (i, j) ∈ Ω∗ \ Ω.
∗ , trivially we have |(S
• For the last case (i, j) ∈ Ω \ Ω∗ , since (Sinit )(i,j) = M(i,j)
init )(i,j) | ≤
∗
kM k∞ .
The following result, proved in Section 7.1, relates the operator norm of Y − M ∗ to its infinite
norm.
Lemma 1. For any matrix A ∈ Rd1 ×d2 that belongs to Sα given in (3), we have
p
|||A|||op ≤ α d1 d2 kAk∞ .
We thus obtain
|||Y − M ∗ |||op ≤ 2α
p
p
d1 d2 kY − M ∗ k∞ ≤ 4α d1 d2 kM ∗ k∞ = 4αµrσ1∗ .
In the last step, we use the fact that M ∗ satisfies the µ-incoherent condition, which leads to
µr
kM ∗ k∞ ≤ |||M ∗ |||op |||L∗ |||2,∞ |||R∗ |||2,∞ ≤ √
|||M ∗ |||op .
d1 d2
(16)
(17)
We denote the i-th largest singular value of Y by σi . By Weyl’s theorem, we have |σi∗ − σi | ≤
∗
|||Y − M ∗ |||op for all i ∈ [d1 ∧ d2 ]. Since σr+1
= 0, we have σr+1 ≤ |||Y − M ∗ |||op . Recall that U0 V0> is
the best rank r approximation of Y . Accordingly, we have
|||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op
= σr+1 + |||Y − M ∗ |||op ≤ 2|||Y − M ∗ |||op ≤ 8αµrσ1∗ .
1
Under condition αµr ≤ 16κ
, we obtain |||U0 V0> − M ∗ |||op ≤ 21 σr∗ . Applying Lemma 5.14 in [26]
(we provide it as Lemma 15 for the sake of completeness), we obtain
d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √
10r|||U0 V0> − M ∗ |||2op
2 |||U0 V0> − M ∗ |||2F
≤
.
σr∗
σr∗
2−1
Plugging the upper bound of |||U0 V0> − M ∗ |||op into the above inequality completes the proof.
13
6.2
Proof of Theorem 2
We essentially follow the general framework developed in [11] for analyzing the behaviors of gradient
descent in factorized low-rank optimization. But it is worth to note that [11] only studies the
symmetric and positive semidefinite setting, while we avoid such constraint on M ∗ . The techniques
for analyzing general asymmetric matrix in factorized space is inspired by the recent work [26] on
solving low-rank matrix equations. In our setting, the technical challenge is to verify the local
descent condition of the loss function (8), which not only has a bilinear dependence on U and V ,
but also involves our sparse estimator (4).
We begin with some notations. Define the equivalent set of optimal solution as
o
n
(18)
E(M ∗ ) := (A, B) ∈ Rd1 ×r × Rd2 ×r A = L∗ Σ∗1/2 Q, B = R∗ Σ∗1/2 Q, where Q ∈ Qr .
p
Given (U0 , V0 ) ∈ B2 c2 σr∗ /κ , by (11), we have |||U0 V0> − M ∗ |||op ≤ 21 σr∗ when c2 is sufficiently
small. By Weyl’s theorem We thus have
q
q
q
q
∗
∗
∗
σ1 /2 ≤ |||U0 |||op ≤ 3σ1 /2, and σ1 /2 ≤ |||V0 |||op ≤ 3σ1∗ /2.
As a result, for U, V constructed according to (7), we have
E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V,
(19)
where
(
U :=
A ∈ Rd1 ×r
r
|||A|||2,∞ ≤
3µrσ1∗
d1
(
)
, V :=
A ∈ Rd2 ×r
r
|||A|||2,∞ ≤
3µrσ1∗
d2
)
.
We let
1
(20)
G(U, V ) := |||U > U − V > V |||2F .
8
For L(U, V ; S), we denote the gradient with respect to M by ∇M L(U, V ; S), i.e. ∇M L(U, V ; S) =
UV > + S − Y .
The local descent property is implied by combining the following two results, which are proved
in Section 6.7 and 6.8 respectively.
Lemma
2 (Local descent property of
L). Suppose U, V satisfy (19). For any (U, V ) ∈ (U × V) ∩
p
B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose γ = 2. Then we have that for (Uπ∗ , Vπ∗ ) ∈
argmin(A,B)∈E(M ∗ ) |||U − A|||2F + |||V − B|||2F and β > 0,
>
> 2
∗
hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
V ii ≥ |||U V − Uπ ∗ Vπ ∗ |||F − νσ1 δ − 3
q
σ1∗ δ 3 .
Here ∆U := U − Uπ∗ , ∆V := V − Vπ∗ , δ := |||∆U |||2F + |||∆V |||2F , and ν := 9(β + 6)αµr + 5β −1 .
√
Lemma 3 (Local descent property of G). For any (U, V ) ∈ B2 ( σr∗ ) and
(Uπ∗ , Vπ∗ ) ∈ arg
min
(A,B)∈E(M ∗ )
14
|||U − A|||2F + |||V − B|||2F ,
(21)
we have
hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii
r
σ1∗ δ 3 1
1 >
1 ∗
>
2
≥ |||U U − V V |||F + σr δ −
− |||U V > − Uπ∗ Vπ>∗ |||2F ,
8
8
2
2
where δ is defined according to Lemma 2.
As another key ingredient, we establish the following smoothness condition, proved in Section
6.9, which indicates that the Frobenius norm of gradient decreases as (U, V ) approaches the optimal
manifold.
p
Lemma 4 (Smoothness). For any (U, V ) ∈ B2 ( σ1∗ ), we let S = Tγα Y − U V > , where we choose
γ = 2. We have that
|||∇M L(U, V ; S)|||2F ≤ 6|||U V > − M ∗ |||2F ,
(22)
and
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F .
(23)
With the above results in hand, we are ready to prove Theorem 2.
Proof of Theorem 2. We use shorthands
δt := d2 (Ut , Vt ; U ∗ , V ∗ ), Lt := L(Ut , Vt ; St ), and Gt := G(Ut , Vt ).
For (Ut , Vt ), let (Uπt ∗ , Vπt∗ ) := argmin(A,B)∈E(M ∗ ) |||Ut − A|||2F + |||Vt − B|||2F . Define ∆tU := Ut − Uπt ∗ ,
∆tV := Vt − Vπt∗ .
We prove Theorem 2 by induction. It is sufficient
topconsider
one step of the iteration. For any
t ≥ 0, under the induction hypothesis (Ut , Vt ) ∈ B2 c2 σr∗ /κ . We find that
δt+1 ≤ |||Ut+1 − Uπt ∗ |||2F + |||Vt+1 − Vπt∗ |||2F
≤ |||Ut − η∇U Lt − η∇U Gt − Uπt ∗ |||2F + |||Vt − η∇V Lt − η∇V Gt − Vπt∗ |||2F
≤ δt − 2η hh∇U Lt + ∇U Gt , Ut − Uπt ∗ ii −2η hh∇V Lt + ∇V Gt , Vt − Vπt∗ ii
|
{z
}
|
{z
}
W1
2
W2
2
2
2
+ η |||∇U Lt + ∇U Gt |||F +η |||∇V Lt + ∇V Gt |||F ,
|
|
{z
}
{z
}
W3
(24)
W4
where the second step follows from the non-expansion property of projection onto U, V, which is
implied by E(M ∗ ) ⊆ U × V shown in (19). Since ∇U Lt = [∇M Lt ] V and ∇V Lt = [∇M Lt ]> U , we
have
t
t>
hh∇U Lt , Ut − Uπt ∗ ii + hh∇V Lt , Vt − Vπt∗ ii = hh∇M Lt , Ut Vt> − Uπt ∗ Vπt>
∗ + ∆U ∆V ii.
Combining Lemma 2 and 3, under condition δt < σr∗ , we have that
1
1
1
W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 4
2
8
8
15
q
σ1∗ δt3 .
On the other hand, we have
W3 + W4 ≤ 2|||∇U Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Lt |||2F + 2|||∇V Gt |||2F
≤ 2(|||Ut |||2op + |||Vt |||2op )|||∇M Lt |||2F + 2|||∇U Gt |||2F + 2|||∇V Gt |||2F
≤ 36σ1∗ |||Ut Vt> − M ∗ |||2F + 4σ1∗ |||Ut> Ut − Vt> Vt |||2F ,
p
where the last step is implied by Lemma 4 and the assumption (Ut , Vt ) ∈ B2 c2 σr∗ /κ that leads
p
p
to |||Ut |||op ≤ 3σ1∗ /2, |||Vt |||op ≤ 3σ1∗ /2.
By the assumption η = c/σ1∗ for any constant c ≤ 1/36, we thus have
q
1 ∗
2
∗
−2η(W1 + W2 ) + η (W3 + W4 ) ≤ − ησr δt + 2ηνσ1 δt + 8η σ1∗ δt3 .
4
In Lemma 2, choosingpβ = 320κ and assuming α . 1/(κ2 µr), we can have ν ≤ 1/(32κ). Assuming
1 ∗
δt . σr∗ /κ leads to 14 σ1∗ δt3 ≤ 16
σr δt . We thus obtain
ησr∗
δt+1 ≤ 1 −
δt .
(25)
8
Under initial condition δ0 . σr∗ /κ, we obtain that such condition holds for all t since estimation
error decays geometrically after each iteration. Then applying (25) for all iterations, we conclude
that for all t = 0, 1, . . .,
ησ ∗ t
δt ≤ 1 − r δ0 .
8
6.3
Proof of Corollary 1
We need α . κ21µr due to the condition of Theorem 2. In order to ensure the linear convergence
happens, it suffices to let the initial error shown in Theorem 1 be less than the corresponding
condition in Theorem 2. Accordingly, we need
p
√
√ p
28 καµr r σ1∗ . σr∗ /κ,
which leads to α .
1
√ 3.
µ rκ
Using the conclusion that gradient descent has linear convergence, choosing T = O(κ log(1/ε)),
we have
σ∗
d2 (UT , VT ; U ∗ , V ∗ ) ≤ ε2 d2 (U0 , V0 ; U ∗ , V ∗ ) . ε2 r .
κ
∗
∗
>
Finally, applying the relationship between d(UT , VT ; U , V ) and |||UT VT − M ∗ |||F shown in (11), we
complete the proof.
6.4
Proof of Theorem 3
Let Y := p1 (Y − Sinit ). Similar to the proof of Theorem 1, we first establish an upper bound on
|||Y − M ∗ |||op . We have that
1
1
|||Y − M ∗ |||op ≤ |||Y − ΠΦ M ∗ |||op + ||| ΠΦ (M ∗ ) − M ∗ |||op .
p
p
16
(26)
For the first term, we have Y − p1 ΠΦ M ∗ = p1 (ΠΦ (S ∗ ) − Sinit ) because Y = ΠΦ (M ∗ + S ∗ ). Lemma
d
10 shows that under condition p & α(dlog
, there are at most 32 pα-fraction nonzero entries in each
1 ∧d2 )
row and column of ΠΦ (S ∗ ) with high probability. Since Sinit ∈ S2pα , we have
ΠΦ (S ∗ ) − Sinit ∈ S4pα .
(27)
kΠΦ (S ∗ ) − Sinit k∞ ≤ 2kM ∗ k∞ .
(28)
In addition, we prove below that
Denote the support of ΠΦ (S ∗ ) and Sinit by Ω∗o and Ω. For (i, j) ∈ Ω∗o ∩ Ω and (i, j) ∈ Ω \ Ω∗o , we
∗ , respectively. To prove the claim,
have (ΠΦ (S ∗ ) − Sinit )(i,j) = 0 and (ΠΦ (S ∗ ) − Sinit )(i,j) = −M(i,j)
∗ | < 2kM ∗ k . If this is not true, then we must have
it remains to show that for (i, j) ∈ Ω∗o \ Ω, |S(i,j)
∞
∗
|Y(i,j) | > kM k∞ . Accordingly, |Y(i,j) | is larger than the magnitude of any uncorrupted entries in
its row and column. Note that on the support Φ, there are at most 32 pα corruptions per row and
column, we have (i, j) ∈ Ω, which violates our prior condition (i, j) ∈ Ω∗o \ Ω.
Using these two properties (27), (28) and applying Lemma 1, we have
p
p
1
|||Y − ΠΦ M ∗ |||op ≤ 4α d1 d2 kΠΦ (S ∗ ) − Sinit k∞ ≤ 8α d1 d2 kM ∗ k∞ ≤ 8αµrσ1∗ ,
(29)
p
where the last step follow from (17).
For the second term in (26), we use the following lemma proved in [10].
Lemma 5 (Lemma 2 in [10]). Suppose A ∈ Rd1 ×d2 is a fixed matrix. We let d := max{d1 , d2 }.
There exists a constant c such that with probability at least 1 − O(d−1 ),
s
!
n
o
1
log d
log d
>
||| ΠΦ (A) − A|||op ≤ c
kAk∞ +
max |||A|||2,∞ , |||A |||2,∞
.
p
p
p
Given the SVD M ∗ = L∗ ΣR∗> , for any i ∈ [d1 ], we have
∗
kM(i,·)
k2
=
kL∗(i,·) ΣR∗> k2
≤
σ1∗ kL∗(i,·) k2
≤
σ1∗
r
µr
.
d1
We can bound |||M ∗> |||2,∞ similarly. Lemma 5 leads to
1
log d µr
√
||| ΠΦ (M ∗ ) − M ∗ |||op ≤ c0
σ ∗ + c0
p
p
d1 d2 1
s
log d
p
r
√
µr
σ1∗ ≤ c0 σ1∗ / r
d1 ∧ d2
(30)
2
log d
under condition p ≥ 4µr
2 (d ∧d ) .
1
2
Putting (29) and (30) together, we obtain
√
|||Y − M ∗ |||op ≤ 8αµrσ1∗ + c0 σ1∗ / r.
Then using the fact that U0 V0> is the best rank r approximation of Y and applying Wely’s theorem
(see the proof of Theorem 1 for a detailed argument), we have
|||U0 V0> − M ∗ |||op ≤ |||U0 V0> − Y |||op + |||Y − M ∗ |||op
√
≤ 2|||Y − M ∗ |||op ≤ 16αµrσ1∗ + 2c0 σ1∗ / r
17
√
Under our assumptions, we have 16αµrσ1∗ + 2c0 σ1∗ / r ≤ 12 σr∗ . Accordingly, Lemma 15 gives
d2 (U0 , V0 ; U ∗ , V ∗ ) ≤ √
10r|||U0 V0> − M ∗ |||2op
2 |||U0 V0> − M ∗ |||2F
≤
.
σr∗
σr∗
2−1
We complete the proof by combining the above two inequalities.
6.5
Proof of Theorem 4
In this section, we turn to prove Theorem 4. Similar to the proof of Theorem 2, we rely on
establishing the local descent and smoothness conditions. Compared to the full observation setting,
e V ) := 1 |||U > U − V > V |||2 merely
we replace L by Le given in (6), while the regularization term G(U,
F
64
differs from G(U, V ) given in (20) by a constant factor. It is thus sufficient to analyze the properties
e
of L.
Define E(M ∗ ) according to (18). Under the initial condition, we still have
E(M ∗ ) ⊆ U × V, and U ⊆ U, V ⊆ V.
(31)
We prove the next two lemmas in Section 6.10 and 6.11 respectively. In both lemmas, for any
(U, V ) ∈ U × V, we use shorthands
(Uπ∗ , Vπ∗ ) = arg
min
(A,B)∈E(M ∗ )
|||U − A|||2F + |||V − B|||2F ,
∆U := U − Uπ∗ , ∆V := V − Vπ∗ , and δ := |||∆U |||2F + |||∆V |||2F . Recall that d := max{d1 , d2 }.
e Suppose U, V satisfy (31). Suppose we let
Lemma 6 (Local descent property of L).
i
h
S = Tγpα ΠΦ Y − U V > ,
√
where we choose γ = 3. For any β > 0 and ∈ (0, 41 ), we define ν := (14β +81)αµr +26 +18β −1 .
There exist constants {ci }2i=1 such that if
2 2
µ r
1
log d
p ≥ c1
+ +1
,
(32)
2
α
d1 ∧ d2
then with probability at least 1 − c2 d−1 ,
q
3
>
> 2
∗
e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
∗ V ∗ ||| − νσ δ − 10
hh∇M L(U,
ii
≥
|||U
V
−
U
σ1∗ δ 3 − 2δ 2 (33)
π
V
π F
1
16
p ∗
for all (U, V ) ∈ (U × V) ∩ B2
σ1 .
e Suppose U, V satisfy (31). Suppose we let S = Tγαp ΠΦ Y − U V >
Lemma 7 (Smoothness of L).
for γ = 3. There exist constants {ci }3i=1 such that for any ∈ (0, 41 ), when p satisfies
condition
p
(32), with probability at least 1 − c2 d−1 , we have that for all (U, V ) ∈ (U × V) ∩ B2 ( σ1∗ ),
i
h
e V ; S)|||2 + |||∇V L(U,
e V ; S)|||2 ≤ c3 µrσ ∗ |||U V > − Uπ∗ V >∗ |||2 + µrσ ∗ δ(δ + σ ∗ ) .
(34)
|||∇U L(U,
F
1
π F
1
1
F
18
In the remainder of this section, we condition on the events in Lemma 6 and 7. Now we are
ready to prove Theorem 4.
Proof of Theorem 4. We essentially follow the process for proving Theorem 2. Let the following
shorthands be defined in the same fashion: δt , (Uπt ∗ , Vπt∗ ), (∆tU , ∆tV ), Let , Get .
Here we show error decays in one step of iteration. The induction process is the same as the
proof of Theorem 2, and is thus omitted. For any t ≥ 0, similar to (24) we have that
δt+1 ≤ δt − 2η hh∇U Let + ∇U Get , Ut − Uπt ∗ ii −2η hh∇V Let + ∇V Get , Vt − Vπt∗ ii
{z
}
|
{z
}
|
W1
W2
+ η |||∇U Let + ∇U Get |||2F +η 2 |||∇V Let + ∇V Get |||2F .
|
|
{z
}
{z
}
2
W3
W4
We also have
t
t>
hh∇U Let , Ut − Uπt ∗ ii + hh∇V Let , Vt − Vπt∗ ii = hh∇M Let , Ut Vt> − Uπt ∗ Vπt>
∗ + ∆U ∆V ii,
which can be lower bounded by Lemma 6. Note that Ge differs from G by a constant, we can still
leverage Lemma 3. Hence, we obtain that
q
1
1
1
W1 + W2 ≥ |||Ut Vt> − M ∗ |||2F + |||Ut> Ut − Vt> Vt |||2F + σr∗ δt − νσ1∗ δt − 11 σ1∗ δt3 − 2δt2 .
8
64
64
On the other hand, we have
W3 + W4 ≤ 2|||∇U Let |||2F + 2|||∇U Get |||2F + 2|||∇V Let |||2F + 2|||∇V Get |||2F
h
i
≤ c µrσ1∗ |||Ut Vt> − M ∗ |||2F + µrσ1∗ δt (δt + σ1∗ ) + σ1∗ |||Ut> Ut − Vt> Vt |||2F ,
where c is a constant, and the last step is implied by Lemma 4 and Lemma 7.
By the assumption η = c0 /[µrσ1∗ ] for sufficiently small constant c0 , we thus have
q
1
−2η(W1 + W2 ) + η 2 (W3 + W4 ) ≤ − ησr∗ δt + 2ηνσ1∗ δt + 22η σ1∗ δt3 + 4ηδt2 .
32
√
Recall that ν := (14β + 81)αµr + 26 + 18β −1 . By letting β = c1 κ, = c2 /κ2 and assuming
α ≤ c3 /(µrκ2 ) and δt ≤ c4 σr∗ /κ for some sufficiently small constants {ci }4i=1 , we can have −2η(W1 +
1
W2 ) + η 2 (W3 + W4 ) ≤ − 64
ησr∗ δt , which implies that
ησr∗
δt+1 ≤ 1 −
δt ,
64
and thus completes the proof.
6.6
Proof of Corollary 2
We need α . µκ12 r due to the condition of Theorem 4. Letting the initial error provided in Theorem
3 be less than the corresponding condition in Theorem 4, we have
p
p
√
√ p
51 καµr r σ1∗ + 7c1 κσ1∗ . σr∗ /κ,
19
which leads to
1
1
α. √
, . √ .
µ r3 κ3
κ3
Plugging the above two upper bounds into the second term in (13), it suffices to have
p&
κ3 µr2 log d
.
d1 ∧ d2
Comparing the above bound with the second term in (14) completes the proof.
6.7
Proof of Lemma 2
Let M := U V > . We observe that
∇M L(U, V ; S) = M + S − M ∗ − S ∗ .
Plugging it back into the left hand side of (21), we obtain
∗
∗
∗
>
hh∇M L(U, V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
V ii = hhM + S − M − S , M − M + ∆U ∆V ii
≥ |||M − M ∗ |||2F − |hhS − S ∗ , M − M ∗ ii| − |hhM + S − M ∗ − S ∗ , ∆U ∆>
V ii| .
{z
} |
{z
}
|
T1
(35)
T2
Next we derive upper bounds of T1 and T2 respectively.
Upper bound of T1 . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Since S − S ∗ is
supported on Ω∗ ∪ Ω, we have
T1 ≤ |hhΠΩ (S − S ∗ ), M − M ∗ ii| + |hhΠΩ∗ \Ω (S − S ∗ ), M − M ∗ ii| .
|
{z
} |
{z
}
W1
W2
Recall that for any (i, j) ∈ Ω, we have S(i,j) = (M ∗ + S ∗ − M )(i,j) . Accordingly, we have
W1 = |||ΠΩ (M − M ∗ )|||2F .
(36)
Now we turn to bound W2 . Since S(i,j) = 0 for any (i, j) ∈ Ω∗ \ Ω, we have
W2 = |hhΠΩ∗ \Ω S ∗ , M − M ∗ ii|.
Let ui be the i-th row of M − M ∗ , and vj be the j-th column of M − M ∗ . For any k ∈ [d2 ], we let
(k)
ui denote the element of ui that has the k-th largest magnitude. Similarly, for any k ∈ [d1 ], we
(k)
let vj denote the element of vj that has the k-th largest magnitude.
From the design of sparse estimator (4), we have that for any (i, j) ∈ Ω∗ \ Ω, |(M ∗ + S ∗ − M )(i,j) |
is either smaller than the γαd2 -th largest entry of the i-th row of M ∗ + S ∗ − M or smaller than
the γαd1 -th largest entry of the j-th column of M ∗ + S ∗ − M . Note that S ∗ only contains at most
α-fraction nonzero entries per row and column. As a result, |(M ∗ + S ∗ − M )(i,j) | has to be less than
(γαd2 −αd2 )
the magnitude of ui
(γαd1 −αd1 )
. Formally, we have for (i, j) ∈ Ω∗ \ Ω,
n
o
(γαd −αd2 )
(γαd −αd1 )
|, |vj 1
| .
|(M ∗ + S ∗ − M )(i,j) | ≤ max |ui 2
|
{z
}
or vj
bij
20
(37)
Furthermore, we obtain
(γαd2 −αd2 ) 2
b2ij ≤ |ui
(γαd1 −αd1 ) 2
| + |vj
| ≤
kvj k22
kui k22
+
.
(γ − 1)αd2 (γ − 1)αd1
(38)
Meanwhile, for any (i, j) ∈ Ω∗ \ Ω, we have
∗
· (M − M ∗ )(i,j) | = |(M ∗ + S ∗ − M − M ∗ + M )(i,j) · (M − M ∗ )(i,j) |
|S(i,j)
≤ |(M − M ∗ )(i,j) |2 + |(M ∗ + S ∗ − M )(i,j) | · |(M − M ∗ )(i,j) |
≤ |(M − M ∗ )(i,j) |2 + bij · |(M − M ∗ )(i,j) |
b2ij
β
|(M − M ∗ )(i,j) |2 +
,
≤ 1+
2
2β
(39)
where β in the last step can be any positive number. Combining (38) and (39) leads to
X
∗
· (M − M ∗ )(i,j) |
W2 ≤
|S(i,j)
(i,j)∈Ω∗ \Ω
X b2ij
β
≤ 1+
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
2
2β
(i,j)∈Ω∗ \Ω
X kui k2
kvj k22
β
1
∗ 2
2
≤ 1+
|||ΠΩ∗ \Ω (M − M )|||F +
+
2
2β
(γ − 1)αd2 (γ − 1)αd1
∗
(i,j)∈Ω \Ω
β
1
≤ 1+
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
|||M − M ∗ |||2F .
2
β(γ − 1)
(40)
In the last step, we use
X
(i,j)∈Ω∗ \Ω
≤
1
1
kui k22 + kvj k22
d2
d1
X X
i∈[d] j∈Ω∗(i,·)
≤α
X
i∈[d]
1
kui k22 +
d2
kui k22 + α
X
≤
X 1
1
2
2
kui k2 + kvj k2
d2
d1
∗
(i,j)∈Ω
X X
j∈[d] i∈Ω∗(·,j)
1
kvj k22
d1
kvj k22 = 2α|||M − M ∗ |||2F .
(41)
j∈[d]
We introduce shorthand δ := |||∆U |||2F + |||∆V |||2F . We prove the following inequality in the end of this
section.
p
(42)
|||M − M ∗ |||F ≤ 5σ1∗ δ.
Combining (36), (40) and (42) leads to
β
5σ1∗ δ
T1 ≤ |||ΠΩ (M − M ∗ )|||2F + 1 +
|||ΠΩ∗ \Ω (M − M ∗ )|||2F +
2
β(γ − 1)
∗
5σ1 δ
≤ 9(2γ + β + 2)αµrσ1∗ δ +
,
β(γ − 1)
(43)
where the last step follows from Lemma 14 by noticing that ΠΩ (M − M ∗ ) has at most γα-fraction
nonzero entries per row and column.
21
Upper bound of T2 . To ease notation, we let C := M + S − M ∗ − S ∗ . We observe that C is
supported on Ωc , we have
>
T2 ≤ |hhΠΩ∗c ∩Ωc (M − M ∗ ), ∆U ∆>
V ii| + |hhΠΩ∗ ∩Ωc C, ∆U ∆V ii| .
|
{z
} |
{z
}
W3
W4
By Cauchy-Swartz inequality, we have
∗
W3 ≤ |||ΠΩ∗c ∩Ωc (M − M ∗ )|||F |||∆U ∆>
V |||F ≤ |||M − M |||F |||∆U |||F |||∆V |||F ≤
q
5σ1∗ δ 3 /2,
where the last step follows from (42) and |||∆U |||F |||∆V |||F ≤ δ/2.
It remains to bound W4 . By Cauchy-Swartz inequality, we have
∗
∗
>
W4 ≤ |||ΠΩ∗ ∩Ωc C|||F |||∆U ∆>
V |||F ≤ |||ΠΩ∗ ∩Ωc (M + S − M )|||F |||∆U ∆V |||F
1/2
s X
2
2
X
(a)
(b)
kvj k2
kui k2
≤
b2ij |||∆U |||F |||∆V |||F ≤
+
|||∆U |||F |||∆V |||F .
(γ − 1)αd2 (γ − 1)αd1
(i,j)∈Ω∗ \Ω
(i,j)∈Ω∗ \Ω
s
r
(c)
2
5σ1∗ δ 3
∗
|||M − M |||F |||∆U |||F |||∆V |||F ≤
,
≤
γ−1
2(γ − 1)
where step (a) is from (37), step (b) follows from (38), and step (c) follows from (41). Combining
the upper bounds of W3 and W4 , we obtain
s
q
5σ1∗ δ 3
T2 ≤ 5σ1∗ δ 3 /2 +
.
(44)
2(γ − 1)
Combining pieces. Now we choose γ = 2. Then inequality (43) implies that
T1 ≤ [9(β + 6)αµr + 5β −1 ]σ1∗ δ.
Inequality (44) then implies that
q
T2 ≤ 3 σ1∗ δ 3 .
Plugging the above two inequalities into (35) completes the proof.
Proof of inequality (42). We find that
hp
i2
σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F
2
p
1p ∗
1p ∗
∗
≤
σ1 (|||∆V |||F + |||∆U |||F ) +
σ1 |||∆U |||F +
σ1 |||∆V |||F
2
2
|||M − M ∗ |||2F ≤
≤ 5σ1∗ (|||∆U |||2F + |||∆V |||2F ),
where the first step follows from the upper bound of |||M p
− M ∗ |||F shown in Lemma 12, and the
second step follows from the assumption |||∆U |||F , |||∆V |||F ≤ σ1∗ .
22
6.8
Proof of Lemma 3
We first observe that
1
1
∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ),
2
2
Therefore, we obtain
hh∇U G(U, V ), U − Uπ∗ ii + hh∇V G(U, V ), V − Vπ∗ ii
1
= hhU > U − V > V , U > U − V > V − U > Uπ∗ + V > Vπ∗ ii
2
1
1 >
= |||U U − V > V |||2F + hhU > U − V > V , U > U − V > V − 2U > Uπ∗ + 2V > Vπ∗ ii
4
4
1 >
1
>
2
>
= |||U U − V V |||F + hhU > U − V > V , U > U − V > V − 2∆>
U Uπ ∗ + 2∆V Vπ ∗ ii,
4
4
(45)
>
>
>
>
>
where the last step follows from ∆>
U Uπ ∗ − ∆V Vπ ∗ = U Uπ ∗ − V Vπ ∗ since Uπ ∗ Uπ ∗ = Vπ ∗ Vπ ∗ . Note
that
U > U − V > V = (Uπ∗ + ∆U )> (Uπ∗ + ∆U ) − (Vπ∗ + ∆V )> (Vπ∗ + ∆V )
>
>
>
>
= Uπ>∗ ∆U + ∆>
U Uπ ∗ + ∆U ∆U − Vπ ∗ ∆V − ∆V Vπ ∗ − ∆V ∆V ,
where we use Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ again in the last step. Furthermore, since U > U −V > V is symmetric,
we have
>
>
hhU > U − V > V , Uπ>∗ ∆U + ∆>
U Uπ ∗ − Vπ ∗ ∆V − ∆V Vπ ∗ ii
>
= hhU > U − V > V , 2∆>
U Uπ ∗ − 2∆V Vπ ∗ ii.
Using these arguments, for the second term in (45), denoted by T2 , we have
1
>
T2 = hhU > U − V > V , ∆>
U ∆U − ∆V ∆V ii.
4
Furthermore, we have
>
>
>
2
2
4T2 ≤ |hhU > U − V > V , ∆>
U ∆U − ∆V ∆V ii| ≤ |||U U − V V |||F |||∆U |||F + |||∆V |||F
≤ |||U > U − Uπ>∗ Uπ∗ |||F + |||V > V − Vπ>∗ Vπ∗ |||F δ
q
≤ 2 (|||Uπ∗ |||op |||∆U |||F + |||Vπ∗ |||op |||∆V |||F ) δ ≤ 2 2σ1∗ δ 3 .
(46)
It remains to find a lower bound of |||U > U − V > V |||F . The following inequality, which we turn
to prove later, is true:
|||U > U − V > V |||2F ≥ |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − 2|||U V > − Uπ∗ Vπ>∗ |||2F .
(47)
Proceeding with the first term in (45) by using (47), we get
1 >
1
1
|||U U − V > V |||2F = |||U > U − V > V |||2F + |||U > U − V > V |||2F
4
8
8
1 >
1
1
1
≥ |||U U − V > V |||2F + |||U U > − Uπ∗ Uπ>∗ |||2F + |||V V > − Vπ∗ Vπ>∗ |||2F − |||U V > − Uπ∗ Vπ>∗ |||2F
8
8
8
4
1 >
1
1
>
2
>
>
2
>
>
2
= |||U U − V V |||F + |||F F − Fπ∗ Fπ∗ |||F − |||U V − Uπ∗ Vπ∗ |||F ,
(48)
8
8
2
23
where we let
U
Uπ∗
∗
F :=
, Fπ :=
.
V
Vπ ∗
Introduce ∆F := F − Fπ∗ . Recall that δ := |||∆U |||2F + |||∆V |||2F . Equivalently δ = |||∆F |||2F . We have
>
>
|||F F > − Fπ∗ Fπ>∗ |||F = |||∆F Fπ∗
+ Fπ∗ ∆>
F + ∆F ∆F |||F
>
2
>
>
≥ |||∆F Fπ∗
+ Fπ∗ ∆>
F |||F − |||∆F |||F = |||∆F Fπ∗ + Fπ ∗ ∆F |||F − δ.
For the first term, we have
>
2
> 2
>
>
|||∆F Fπ∗
+ Fπ∗ ∆>
F |||F = 2|||∆F Fπ∗ |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii
>
∗
2
>
>
≥ 2σr (Fπ∗ )2 |||∆F |||2F + hh∆F Fπ∗
, F π ∗ ∆>
F ii = 4σr |||∆F |||F + hh∆F Fπ∗ , Fπ ∗ ∆F ii.
For the cross term, by the following result, proved in [11] (we also provide a proof in Section 7.5 for
> , F ∗ ∆> ii ≥ 0.
the sake of completeness), we have hh∆F Fπ∗
π
F
√ ∗
Lemma 8. When |||F − Fπ∗ |||op < 2σr , we have that ∆>
F Fπ ∗ is symmetric.
p
p
Accordingly, we have |||F F > −Fπ∗ Fπ>∗ |||F ≥ 2 σr∗ δ −δ ≥ σr∗ δ under condition δ ≤ σr∗ . Plugging
this lower bound into (48), we obtain
1 >
1
1
1
|||U U − V > V |||2F ≥ |||U > U − V > V |||2F + σr∗ δ − |||U V > − Uπ∗ Vπ>∗ |||2F .
4
8
8
2
Putting (45), (46) and the above inequality together completes the proof.
Proof of inequality (47). For the term on the left hand side of (47), it is easy to check that
|||U > U − V > V |||2F = |||U U > |||2F + |||V V > |||2F − 2|||U V > |||2F .
(49)
The property Uπ>∗ Uπ∗ = Vπ>∗ Vπ∗ implies that |||Uπ∗ Uπ>∗ |||F = |||Vπ∗ Vπ>∗ |||F = |||Uπ∗ Vπ>∗ |||F . Therefore,
expanding those quadratic terms on the right hand side of (47), one can show that it is equal to
|||U U > |||2F + |||V V > |||2F − 2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii − 2|||U V > |||2F .
Comparing inequalities (49) and (50), it thus remains to show that
−2|||Uπ>∗ U |||2F − 2|||Vπ>∗ V |||2F + 4hhUπ>∗ U , Vπ>∗ V ii ≤ 0.
Equivalently, we always have |||Uπ>∗ U − Vπ>∗ V |||2F ≥ 0, and thus prove (47).
6.9
Proof of Lemma 4
First, we turn to prove (23). As
1
1
∇U G(U, V ) = U (U > U − V > V ), ∇V G(U, V ) = V (V > V − U > U ),
2
2
we have
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤
1
|||U |||2op + |||V |||2op |||U > U − V > V |||2F .
4
24
(50)
p
p
As (U, V ) p
∈ B2 ( σ1∗ ), we thus have |||U |||op ≤ |||Uπ∗ |||op + |||Uπ∗ − U |||op ≤ 2 σ1∗ , and similarly
|||V |||op ≤ 2 σ1∗ . We obtain
|||∇U G(U, V )|||2F + |||∇V G(U, V )|||2F ≤ 2σ1∗ |||U > U − V > V |||2F .
Now we turn to prove (22). We observe that
∇M L(U, V ; S) = M + S − M ∗ − S ∗ ,
where we let M := U V > . We denote the support of S, S ∗ by Ω and Ω∗ respectively. Based on the
sparse estimator (4) for computing S, ∇M L(U, V ; S) is only supported on Ωc . We thus have
|||∇M L(U, V ; S)|||F ≤ |||ΠΩc \Ω∗ (M − M ∗ )|||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F
≤ |||M − M ∗ |||F + |||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||F .
It remains to upper bound the second term on the right hand side. Following (37) and (38), we
have
|||ΠΩc ∩Ω∗ (M − M ∗ − S ∗ )|||2F ≤
X
(i,j)∈Ωc ∩Ω∗
kvj k22
2
kui k22
+
≤
|||M − M ∗ |||2F ,
(γ − 1)αd2 (γ − 1)αd1
γ−1
where the last step is proved in (41). By choosing γ = 2, we thus conclude that
√
|||∇M L(U, V ; S)|||F ≤ (1 + 2)|||M − M ∗ |||F .
6.10
Proof of Lemma 6
We denote the support of ΠΦ (S ∗ ), S by Ω∗o and Ω. We always have Ω∗o ⊆ Φ and Ω ⊆ Φ.
In the sequel, we establish several results that characterize the properties of Φ. The first result,
proved in Section 7.2, shows that the Frobenius norm of any incoherent matrix whose row (or
column) space are equal to L∗ (or R∗ ) is well preserved under partial observations supported on Φ.
Lemma 9. Suppose M ∗ ∈ Rd1 ×d2 is a rank r and µ-incoherent matrix that has SVD M ∗ =
log d
L∗ Σ∗ R∗> . Then there exists an absolute constant c such that for any ∈ (0, 1), if p ≥ c 2µr
,
(d1 ∧d2 )
then with probability at least 1 − 2d−3 , we have that for all A ∈ Rd2 ×r , B ∈ Rd1 ×r ,
(1 − )|||L∗ A> + BR∗> |||2F ≤ p−1 |||ΠΦ L∗ A> + BR∗> |||2F ≤ (1 + )|||L∗ A> + BR∗> |||2F .
We need the next result, proved in Section 7.3, to control the number of nonzero entries per row
and column in Ω∗o and Φ.
Lemma 10. If p ≥
56 log d
3 α(d1 ∧d2 ) ,
1
|Φ(i,·) | − pd2 ≤ pd2 ,
2
then with probability at least 1 − 6d−1 , we have
1
3
3
|Φ(·,j) | − pd1 ≤ pd1 , |Ω∗o(i,·) | ≤ αpd2 , |Ω∗o(·,j) | ≤ αpd1 ,
2
2
2
for all i ∈ [d1 ] and j ∈ [d2 ].
25
The next lemma, proved in Section 7.4, can be used to control the projection of small matrices
to Φ.
2 2
log d
Lemma 11. There exists constant c such that for any ∈ (0, 1), if p ≥ c µ2 (dr 1 ∧d
, then with
2)
probability p
at least 1 − O(d−1 ),pfor all matrices Z ∈ Rd1 ×d2 , U ∈ Rd1 ×r and V ∈ Rd2 ×r that satisfy
|||U |||2,∞ ≤ µr/d1 ,|||V |||2,∞ ≤ µr/d2 , we have
p−1 |||ΠΦ (U V > )|||2F ≤ |||U |||2F |||V |||2F + |||U |||F |||V |||F ;
(51)
p−1 |||ΠΦ (Z)V |||2F ≤ 2µr|||ΠΦ (Z)|||2F ;
(52)
p−1 |||U > ΠΦ (Z)|||2F ≤ 2µr|||ΠΦ (Z)|||2F .
(53)
In the remainder of this section, we condition on the events in Lemmas 9, 10 and 11. Now we
are ready to prove Lemma 6.
Proof of Lemma 6. Using shorthand M := U V > , we have
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) .
∇M L(U,
Plugging it back into the left hand side of (21), we obtain
e V ; S), U V > − Uπ∗ Vπ>∗ + ∆U ∆>
hh∇M L(U,
V ii
1
= hhΠΦ (M + S − M ∗ − S ∗ ), M − M ∗ + ∆U ∆>
V ii
p
1
1
1
≥ |||ΠΦ (M − M ∗ ) |||2F − |hhΠΦ (S − S ∗ ), M − M ∗ ii| − |hhΠΦ (M + S − M ∗ − S ∗ ), ∆U ∆>
V ii| .
p
p
p
|
{z
} |
{z
} |
{z
}
T1
T2
T3
(54)
Next we derive lower bounds of T1 , upper bounds of T2 and T3 respectively.
>
>
Lower bound of T1 . We observe that M −M ∗ = Uπ∗∗ ∆>
V +∆U Vπ ∗ +∆U ∆V . By triangle inequality,
we have
>
>
|||ΠΦ (M − M ∗ )|||F ≥ |||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F .
Note that when c ≥ a − b for a, b ≥ 0, we always have c2 ≥ 21 a2 − b2 . We thus have
T1 ≥
≥
≥
≥
≥
1
1
> 2
> 2
|||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F − |||ΠΦ (∆U ∆V )|||F
2p
p
1
1
> 2
> 2
(1 − )|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F − |||ΠΦ (∆U ∆V )|||F
2
p
1
2
2
2
∗
(1 − )|||M − M ∗ − ∆U ∆>
V |||F − |||∆U |||F |||∆V |||F − 9σ1 |||∆U |||F |||∆V |||F
2
1
1
(1 − )|||M − M ∗ |||2F − (1 − )|||∆U ∆V |||2F − |||∆U |||2F |||∆V |||2F − 9σ1∗ |||∆U |||F |||∆V |||F
4
2
1
∗ 2
(1 − )|||M − M |||F − 2δ 2 − 5σ1∗ δ.
4
where the second step is implied
by Lemma 9, the third p
step follows from (51) in Lemma 11 by
p
∗
noticing that |||∆U |||2,∞ ≤ 3 µrσ1 /d1 and |||∆V |||2,∞ ≤ 3 µrσ1∗ /d1 , which is further implied by
(31).
26
Upper bound of T2 . Since S − S ∗ is supported on Ω∗0 ∪ Ω, we have
pT2 ≤ |hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii| + |hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii|.
(55)
For any (i, j) ∈ Ω, we have (S − S ∗ )(i,j) = (M ∗ − M )(i,j) . Therefore, for the second term on the
right hand side, we have
|hhΠΩ (S − S ∗ ), ΠΩ (M − M ∗ )ii| ≤ |||ΠΩ (M − M ∗ )|||2F ≤ 18γpαµrσ1∗ δ,
(56)
where the last inequality follows from Lemma 14 and the fact that |Ω(i,·) | ≤ γpαd2 , |Ω(·,j) | ≤ γpαd1
for all i ∈ [d1 ], j ∈ [d2 ].
We denote the i-th row of ΠΦ (M − M ∗ ) by ui , and we denote the j-th column of ΠΦ (M − M ∗ )
(k)
(k)
by vj . We let ui denote the element of ui that has the k-th largest magnitude. We let vj denote
the element of vj that has the k-th largest magnitude.
For the first term on the right hand side of (55), we first observe that for (i, j) ∈ Ω∗o \ Ω, |(M ∗ +
∗
S − M )(i,j) | is either less than the γpαd2 -th largest element in the i-th row of ΠΦ (M ∗ + S ∗ − M ),
or less than γpαd1 -th largest element in the j-th row of ΠΦ (M ∗ + S ∗ − M ). Based on Lemma
10, ΠΦ (S ∗ ) has at most 3pαd2 /2 nonzero entries per row and at most 3pαd1 /2 nonzero entries per
column. Therefore, we have
n
o
((γ−1.5)pαd2 )
((γ−1.5)pαd1 )
|(M ∗ + S ∗ − M )(i,j) | ≤ max |ui
|, |vj
| .
(57)
In addition, we observe that
|hhΠΩ∗o \Ω (S ∗ ), ΠΩ∗o \Ω (M − M ∗ )ii|
X
≤
|(M ∗ + S ∗ − M )(i,j) ||(M ∗ − M )(i,j) | + |(M ∗ − M )(i,j) |2
(i,j)∈Ω∗o \Ω
≤
β
1+
2
|||ΠΩ∗o (M ∗ − M )|||2F +
≤ (27 + 14β)pαµrσ1∗ δ +
1
2β
1
2β
X
|(M ∗ + S ∗ − M )(i,j) |2 ,
(i,j)∈Ω∗o \Ω
X
|(M ∗ + S ∗ − M )(i,j) |2 ,
(58)
(i,j)∈Ω∗o \Ω
where the second step holds for any β > 0 and the last step follows from Lemma 14 under the size
constraints of Ω∗o shown in Lemma 10. For the second term in (58), using (57), we have
X
X
((γ−1.5)pαd2 ) 2
((γ−1.5)pαd1 ) 2
|(M ∗ + S ∗ − M )(i,j) |2 ≤
|ui
| + |vj
|
(i,j)∈Ω∗o \Ω
=
X
(i,j)∈Ω∗o
X
((γ−1.5)pαd2 ) 2
|ui
|
i∈[d1 ] j∈Ω∗o(i,·)
≤
X
i∈[d1 ]
+
X
X
((γ−1.5)pαd1 ) 2
|vj
|
j∈[d2 ] i∈Ω∗o(·,j)
X 1.5
1.5
3
kui k22 +
kvj k22 ≤
|||ΠΦ (M − M ∗ )|||2F .
γ − 1.5
γ − 1.5
γ − 1.5
(59)
j∈[d2 ]
Moreover, we have
> 2
> 2
|||ΠΦ (M − M ∗ )|||2F ≤ 2|||ΠΦ (Uπ∗ ∆>
V + ∆U Vπ ∗ )|||F + 2|||ΠΦ (∆U ∆V )|||F
> 2
2
2
∗
≤ 2(1 + )p|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F
≤ 4(1 + )p |||Uπ∗ |||2op |||∆V |||2F + |||Vπ∗ |||2op |||∆U |||2F + 2p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F
≤ (4 + 13)pσ1∗ δ + 2pδ 2 ,
(60)
27
where the second step follows from Lemma 9 and inequality (51) in Lemma 11. Putting (55)-(60)
together, we obtain
T2 ≤ (18γ + 14β + 27)αµrσ1∗ δ +
3[(2 + 7)σ1∗ δ + δ 2 ]
.
β(γ − 1.5)
Upper bound of T3 . By Cauchy-Schwarz inequality, we have
pT3 ≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F |||ΠΦ (∆U ∆>
V )|||F
q
≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F p|||∆U |||2F |||∆V |||2F + 9pσ1∗ |||∆U |||F |||∆V |||F
q
≤ |||ΠΦ (M − M ∗ + S − S ∗ )|||F pδ 2 + 5pσ1∗ δ.
where we use (51) in Lemma 11 in the second step.
We observe that ΠΦ (M − M ∗ + S − S ∗ ) is supported on Φ \ Ω. Therefore, we have
|||ΠΦ (M − M ∗ + S − S ∗ )|||F ≤ |||ΠΦ∩Ωc ∩Φ∗c (M − M ∗ )|||F + |||ΠΦ∩Ωc ∩Φ∗ (M − M ∗ − S ∗ )|||F
≤ |||ΠΦ (M − M ∗ )|||F + |||ΠΩc ∩Φ∗ (M − M ∗ − S ∗ )|||F
r
3
∗
≤ |||ΠΦ (M − M )|||F +
|||ΠΦ (M − M ∗ )|||F
γ − 1.5
r
q
3
(4 + 13)pσ1∗ δ + 2pδ 2 ,
≤ 1+
γ − 1.5
where the third step follows from (59), and the last step is from (60). Under assumptions γ = 3,
≤ 1/4 and δ ≤ σ1∗ , we have
q
q
q
√
T3 ≤ 3 9σ1∗ δ + 2δ 2 δ 2 + 5σ1∗ δ ≤ 10 σ1∗ δ 3 + 23 σ1∗ δ.
Combining pieces. Under the aforementioned assumptions, putting all pieces together leads to
e V ; S), U V > − Uπ∗ V >∗ + ∆U ∆> ii
hh∇M L(U,
π
V
q
√
3
18
∗ 2
∗
≥ |||M − M |||F − (14β + 81)αµrσ1 δ − 26 +
σ1∗ δ − 10 σ1∗ δ 3 − 2δ 2 .
16
β
6.11
Proof of Lemma 7
Let M := U V > . We find that
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ ) V,
∇U L(U,
e V ; S) = p−1 ΠΦ (M + S − M ∗ − S ∗ )> U.
∇V L(U,
Conditioning on the event in Lemma 11, since (U, V ) ∈ U × V, inequalities (52) and (53) imply that
e V ; S)|||2F + |||∇V L(U,
e V ; S)|||2F ≤ 12 µrσ1∗ |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F .
|||∇U L(U,
p
28
It remains to bound the term |||ΠΦ (M + S − M ∗ − S ∗ ) |||2F . Let Ω∗o and Ω be the support of ΠΦ (S ∗ )
and S respectively. We observe that
|||ΠΦ (M + S − M ∗ − S ∗ ) |||2F = |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ∗c ∩Ωc ∩Φ (M − M ∗ ) |||2F
≤ |||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F + |||ΠΦ (M − M ∗ ) |||2F .
In the proof of Lemma 6, it is shown in (59) that
|||ΠΩ∗o \Ω (M − M ∗ − S ∗ ) |||2F ≤
3
|||ΠΦ (M − M ∗ )|||2F .
γ − 1.5
Moreover, following (60), we have that
> 2
2
2
∗
|||ΠΦ (M − M ∗ )|||2F ≤ 2(1 + )p|||Uπ∗ ∆>
V + ∆U Vπ ∗ |||F + 2p|||∆U |||F |||∆V |||F + 18pσ1 |||∆U |||F |||∆V |||F
≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)p|||∆U |||2F |||∆V |||2F + 18pσ1∗ |||∆U |||F |||∆V |||F
≤ 4(1 + )p|||M − M ∗ |||2F + (6 + 4)pδ 2 + 9pσ1∗ δ.
We thus finish proving our conclusion by combining all pieces and noticing that γ = 3 and ≤ 1/4.
7
Proofs for Technical Lemmas
In this section, we prove several technical lemmas that are used in the proofs of our main theorems.
7.1
Proof of Lemma 1
We observe that
|||A|||op =
sup
sup x> Ay.
x∈Sd1 −1 y∈Sd2 −1
We denote the support of A by Ω. For any x ∈ Rd1 , y ∈ Rd2 and β > 0, we have
X 1
kAk∞ (β −1 x2i + βyj2 )
2
(i,j)∈Ω
(i,j)∈Ω
X X
X X
1
= kAk∞
β −1 x2i +
βyj2
2
x> Ay =
X
xi A(i,j) yj ≤
i
j∈Ω(i,·)
j
i∈Ω(·,j)
1
≤ kAk∞ αd2 β −1 kxk22 + αd1 βkyk22 .
2
It is thus implied that |||A|||op ≤ 21 α(β −1 d2 + βd1 )kAk∞ . Choosing β =
7.2
p
d2 /d1 completes the proof.
Proof of Lemma 9
We define a subspace K ⊆ Rd1 ×d2 as
n
o
K := X X = L∗ A> + BR∗> for some A ∈ Rd2 ×r , B ∈ Rd1 ×r .
29
Let ΠK be Euclidean projection onto K. Then according to Theorem 4.1 in [6], under our assumptions, for all matrices X ∈ Rd1 ×d2 , inequality
p−1 ||| (ΠK ΠΦ ΠK − pΠK ) X|||F ≤ |||X|||F
(61)
holds with probability at least 1 − 2d−3 .
In our setting, by restricting X = L∗ A> + BR∗> , we have ΠK X = X. Therefore, (61) implies
that
|||ΠK ΠΦ X − pX|||F ≤ p|||X|||F .
For |||ΠΦ X|||2F , we have
|||ΠΦ X|||2F = hhΠΦ X, ΠΦ Xii = hhΠΦ X, Xii
= hhΠK ΠΦ X, Xii ≤ |||ΠK ΠΦ X|||F |||X|||F ≤ p(1 + )|||X|||2F .
On the other hand, we have
|||ΠΦ X|||2F = hhΠK ΠΦ X, Xii = hhΠK ΠΦ X − pX + pX, Xii
= p|||X|||2F − hhX, −ΠK ΠΦ X + pXii
≥ p|||X|||2F − |||X|||F |||ΠK ΠΦ X − pX|||F ≥ p(1 − )|||X|||2F .
Combining the above two inequalities, we complete the proof.
7.3
Proof of Lemma 10
We observe that |Φ(i,·) | is a summation of d2 i.i.d. binary random variables with mean p and variance
p(1 − p). By Bernstein’s inequality, for any i ∈ [d1 ],
!
− 21 (pd2 /2)2
1
3
Pr |Φ(i,·) | − pd2 ≥ pd2 ≤ 2 exp −
≤
2
exp
−
pd
2 .
2
28
d2 p(1 − p) + 13 (pd2 /2)
By probabilistic union bound, we have
"
Pr sup |Φ(i,·) | − pd2
i∈[d1 ]
#
1
3
≥ pd2 ≤ 2d1 exp − pd2 ≤ 2d−1 ,
2
28
log d
where the last inequality holds by assuming p ≥ 56
3 d2 .
The term |Ω∗o(i,·) | is a summation of at most αd2 i.i.d. binary random variables with mean p and
variance p(1 − p). Again, applying Bernstein’s inequality leads to
h
i 1
3
∗
∗
Pr |Ωo(i,·) | − E |Ωo(i,·) | ≥ pαd2 ≤ exp − pαd2 .
2
28
Accordingly, by the assumption p ≥
"
56 log d
3 αd2 ,
we obtain
#
3
1
∗
Pr sup |Ωo(i,·) | − pk ≥ pk ≤ d1 exp − pαd2 ≤ d−1 .
2
28
i∈[d1 ]
The proofs for |Φ(·,j) | and |Ω∗o(·,j) | follow the same idea.
30
7.4
Proof of Lemma 11
d
d1 ×d2 , we
According to Lemma 3.2 in [8], under condition p ≥ c1 µd1log
∧d2 , for any fixed matrix A ∈ R
have
s
d log d
|||A − p−1 ΠΦ A|||op ≤ c2
kAk∞ ,
p
holds with probability at least 1 − O(d−3 ). Letting A be all-ones matrix, then we have that for all
u ∈ Rd1 , v ∈ Rd2 ,
X
p
ui vj ≤ pkuk1 kvk1 + c2 pd log dkuk2 kvk2 .
(i,j)∈Φ
We find that
|||ΠΦ (U V > )|||2F ≤
X
kU(i,·) k22 kV(j,·) k22
(i,j)∈Φ
sX
sX
p
4
≤ p|||U |||F |||V |||F + c2 pd log d
kU(i,·) k2
kV(j,·) k42
2
2
i∈[d1 ]
j∈[d2 ]
p
≤ p|||U |||2F |||V |||2F + c2 pd log d|||U |||F |||V |||F |||U |||2,∞ |||V |||2,∞
s
pµ2 r2 d log d
≤ p|||U |||2F |||V |||2F + c2
|||U |||F |||V |||F .
d1 d2
By the assumption p &
µ2 r2 log d
,
2 (d1 ∧d2 )
we finish proving (51).
d
According to the proof of Lemma 10, if p ≥ c dlog
, with probability at least 1 − O(d−1 ), we
1 ∧d2
3
3
have |Φ(i,·) | ≤ 2 pd2 and |Φ(·,j) | ≤ 2 pd1 for all i ∈ [d1 ] and j ∈ [d2 ]. Conditioning on this event, we
have
X X
|||ΠΦ (Z)V |||2F =
h(ΠΦ (Z))(i,·) , H(·,k) i2
i∈[d1 ] k∈[r]
≤
X X
k(ΠΦ (Z))(i,·) k22
2
V(j,k)
j∈Ω(i,·)
i∈[d1 ] k∈[r]
= |||ΠΦ Z|||2F
X
X
kV(i,·) k22
j∈Ω(i,·)
3
≤ |||ΠΦ Z|||2F pd2 · |||V |||22,∞ ≤ 2µrp|||ΠΦ Z|||2F .
2
We thus finish proving (52). Inequality (53) can be proved in the same way.
7.5
Proof of Lemma 8
Recall that we let F := [U ; V ] and Fπ∗ := [U ∗ ; V ∗ ]Q for some matrix Q ∈ Qr , which minimizes the
following function
|||F − [U ∗ ; V ∗ ]Q|||2F .
(62)
Let F ∗ := [U ∗ ; V ∗ ]. Expanding the above term, we find that Q is the maximizer of hhF, F ∗ Qii =
Tr(F > F ∗ Q). Suppose F > F ∗ has SVD with form Q1 ΛQ>
2 for Q1 , Q2 ∈ Qr . When the minimum
31
diagonal term of Λ is positive, we conclude that the minimizer of (62) is unique and Q = Q2 Q>
1.
To prove this argument, we note that
X
Λ(i,i) hpi , qi i,
Tr(F > F ∗ Q) =
i∈[r]
where
pi is the i-th column of Q1 and qi is the i-th column of Q> Q2 . Hence, Tr(F > F ∗ Q) ≤
P
i∈[r] Λ(i,i) and the equality holds if and only if pi = qi for all i ∈ [r] since every Λ(i,i) > 0. We
have Q1 = Q> Q2 and thus finish proving the argument.
√
Under our assumption |||F − Fπ∗ |||op < 2σr∗ , for any nonzero vector u ∈ Rr , we have
p
kF > Fπ∗ uk2 ≥ kFπ>∗ Fπ∗ uk2 − k(Fπ∗ − F )> Fπ∗ uk2 ≥ ( 2σr∗ − |||Fπ∗ − F |||op )|||Fπ∗ u|||F > 0.
In √
the second step, we use the fact that the singular values of Fπ∗ are equal to the diagonal terms
of 2Σ∗1/2 . Hence, F > Fπ∗ has full rank. Furthermore, it implies that F > F ∗ has full rank and only
contains positive singular values.
Proceeding with the proved argument, we have
>
>
F > Fπ∗ = Q1 ΛQ>
2 Q2 Q1 = Q1 ΛQ1 ,
which implies that F > Fπ∗ is symmetric. Accordingly, we have (F − Fπ∗ )> Fπ∗ is also symmetric.
Acknowledgment
Y. Chen acknowledges support from the School of Operations Research and Information Engineering,
Cornell University.
References
[1]
Animashree Anandkumar, Rong Ge, Daniel Hsu, Sham M. Kakade, and Matus Telgarsky.
“Tensor decompositions for learning latent variable models”. In The Journal of Machine Learning Research 15.1 (2014), pp. 2773–2832.
[2]
Sivaraman Balakrishnan, Martin J. Wainwright, and Bin Yu. “Statistical guarantees for the
EM algorithm: From population to sample-based analysis”. In arXiv preprint arXiv:1408.2156
(2014).
[3]
Srinadh Bhojanapalli, Prateek Jain, and Sujay Sanghavi. “Tighter low-rank approximation
via sampling the leveraged element”. In Proceedings of the Twenty-Sixth Annual ACM-SIAM
Symposium on Discrete Algorithms. SIAM. 2015, pp. 902–920.
[4]
Srinadh Bhojanapalli, Anastasios Kyrillidis, and Sujay Sanghavi. “Dropping convexity for
faster semi-definite optimization”. In arXiv preprint arXiv:1509.03917 (2015).
[5]
Emmanuel J. Candès, Xiaodong Li, and Mahdi Soltanolkotabi. “Phase retrieval via Wirtinger
flow: Theory and algorithms”. In IEEE Transactions on Information Theory 61.4 (2015),
pp. 1985–2007.
[6]
Emmanuel J. Candès and Benjamin Recht. “Exact matrix completion via convex optimization”. In Foundations of Computational mathematics 9.6 (2009), pp. 717–772.
32
[7]
Emmanuel J. Candès and Terence Tao. “The power of convex relaxation: Near-optimal matrix
completion”. In IEEE Transactions on Information Theory 56.5 (2010), pp. 2053–2080.
[8]
Emmanuel J. Candès, Xiaodong Li, Yi Ma, and John Wright. “Robust principal component
analysis?” In Journal of the ACM (JACM) 58.3 (2011), p. 11.
[9]
Venkat Chandrasekaran, Sujay Sanghavi, Pablo A. Parrilo, and Alan S. Willsky. “Ranksparsity incoherence for matrix decomposition”. In SIAM Journal on Optimization 21.2 (2011),
pp. 572–596.
[10]
Yudong Chen. “Incoherence-Optimal Matrix Completion”. In IEEE Transactions on Information Theory 61.5 (2015), pp. 2909–2923.
[11]
Yudong Chen and Martin J. Wainwright. “Fast low-rank estimation by projected gradient
descent: General statistical and algorithmic guarantees”. In arXiv preprint arXiv:1509.03025
(2015).
[12]
Yudong Chen, Ali Jalali, Sujay Sanghavi, and Constantine Caramanis. “Low-rank Matrix Recovery from Errors and Erasures”. In IEEE Transactions on Information Theory 59.7 (2013),
pp. 4324–4337.
[13]
Yuxin Chen and Emmanuel J. Candès. “Solving random quadratic systems of equations is
nearly as easy as solving linear systems”. In Advances in Neural Information Processing Systems. 2015, pp. 739–747.
[14]
Yeshwanth Cherapanamjeri, Kartik Gupta, and Prateek Jain. “Nearly-optimal Robust Matrix
Completion”. In arXiv preprint arXiv:1606.07315 (2016).
[15]
Kenneth L. Clarkson and David P. Woodruff. “Low rank approximation and regression in
input sparsity time”. In Proceedings of the forty-fifth annual ACM symposium on Theory of
computing. ACM. 2013, pp. 81–90.
[16]
Alan Frieze, Ravi Kannan, and Santosh Vempala. “Fast Monte-Carlo algorithms for finding
low-rank approximations”. In Journal of the ACM (JACM) 51.6 (2004), pp. 1025–1041.
[17]
Quanquan Gu, Zhaoran Wang, and Han Liu. “Low-Rank and Sparse Structure Pursuit via
Alternating Minimization”. In Proceedings of the 19th International Conference on Artificial
Intelligence and Statistics. 2016, pp. 600–609.
[18]
Moritz Hardt. “Understanding alternating minimization for matrix completion”. In 2014 IEEE
55th Annual Symposium on Foundations of Computer Science (FOCS). IEEE. 2014, pp. 651–
660.
[19]
Daniel Hsu, Sham M. Kakade, and Tong Zhang. “Robust matrix decomposition with sparse
corruptions”. In IEEE Transactions on Information Theory 57.11 (2011), pp. 7221–7234.
[20]
Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. “Low-rank matrix completion using
alternating minimization”. In Proceedings of the forty-fifth annual ACM symposium on Theory
of computing. ACM. 2013, pp. 665–674.
[21]
Zhouchen Lin, Minming Chen, and Yi Ma. “The Augmented Lagrange Multiplier Method
for Exact Recovery of Corrupted Low-Rank Matrices”. In Arxiv preprint arxiv:1009.5055v3
(2013).
33
[22]
Praneeth Netrapalli, UN Niranjan, Sujay Sanghavi, Animashree Anandkumar, and Prateek
Jain. “Non-convex robust PCA”. In Advances in Neural Information Processing Systems. 2014,
pp. 1107–1115.
[23]
Yousef Saad. Numerical Methods for Large Eigenvalue Problems: Revised Edition. Vol. 66.
Siam, 2011.
[24]
Ju Sun, Qing Qu, and John Wright. “When Are Nonconvex Problems Not Scary?” In arXiv
preprint arXiv:1510.06096 (2015).
[25]
Ruoyu Sun and Zhi-Quan Luo. “Guaranteed matrix completion via nonconvex factorization”.
In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS). IEEE.
2015, pp. 270–289.
[26]
Stephen Tu, Ross Boczar, Mahdi Soltanolkotabi, and Benjamin Recht. “Low-rank solutions
of linear matrix equations via procrustes flow”. In arXiv preprint arXiv:1507.03566 (2015).
[27]
Zhaoran Wang, Quanquan Gu, Yang Ning, and Han Liu. “High Dimensional EM Algorithm:
Statistical Optimization and Asymptotic Normality”. In Advances in Neural Information Processing Systems. 2015, pp. 2512–2520.
[28]
Huan Xu, Constantine Caramanis, and Sujay Sanghavi. “Robust PCA via Outlier Pursuit”.
In IEEE Transactions on Information Theory 58.5 (2012), pp. 3047–3064. issn: 0018-9448.
[29]
Xinyang Yi and Constantine Caramanis. “Regularized EM Algorithms: A Unified Framework
and Statistical Guarantees”. In Advances in Neural Information Processing Systems. 2015,
pp. 1567–1575.
[30]
Huishuai Zhang, Yuejie Chi, and Yingbin Liang. “Provable Non-convex Phase Retrieval with
Outliers: Median Truncated Wirtinger Flow”. In arXiv preprint arXiv:1603.03805 (2016).
[31]
Tuo Zhao, Zhaoran Wang, and Han Liu. “A Nonconvex Optimization Framework for Low Rank
Matrix Estimation”. In Advances in Neural Information Processing Systems. 2015, pp. 559–
567.
[32]
Qinqing Zheng and John Lafferty. “A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements”. In Advances in
Neural Information Processing Systems. 2015, pp. 109–117.
34
Appendices
A
Supporting Lemmas
In this section, we provide several technical lemmas used for proving our main results.
Lemma 12. For any (U ∗ , V ∗ ) ∈ E(M ∗ ), U ∈ Rd1 ×r and V ∈ Rd2 ×r , we have
p
|||U V > − U ∗ V ∗> |||F ≤ σ1∗ (|||∆V |||F + |||∆U |||F ) + |||∆U |||F |||∆V |||F ,
where ∆U := U − U ∗ , ∆V := V − V ∗ .
∗> + ∆ ∆> . Hence,
Proof. We observe that U V > − U ∗ V ∗> = U ∗ ∆>
U V
V + ∆U V
∗>
|||U V > − U ∗ V ∗> |||F ≤ |||U ∗ ∆>
|||F + |||∆U ∆>
V |||F + |||∆U V
V |||F
≤ |||U ∗ |||op |||∆V |||F + |||V ∗ |||op |||∆U |||F + |||∆U |||F |||∆V |||F .
Furthermore, assuming (U, V ) ∈ U × V, where U and V satisfy the conditions in (19), we have
the next result.
Lemma 13. For any (i, j) ∈ [d1 ] × [d2 ], we have
r
r
µrσ1∗
µrσ1∗
>
∗ ∗>
|(U V − U V )(i,j) | ≤ 3
k∆V (j,·) k2 + 3
k∆U (i,·) k2
d1
d2
(63)
Proof. We observe that
∗
∗
|(U V > − M ∗ )(i,j) | ≤ |hU(i,·)
, ∆V (j,·) i| + |hV(j,·)
, ∆U (i,·) i| + |h∆U (i,·) , ∆V (j,·) i|
r
r
µrσ1∗
µrσ1∗
1
1
≤
k∆V (j,·) k2 +
k∆U (i,·) k2 + |||∆U |||2,∞ k∆V (j,·) k2 + |||∆V |||2,∞ k∆U (i,·) k2 .
d1
d2
2
2
By noticing that
r
∗
|||∆U |||2,∞ ≤ |||U |||2,∞ + |||U |||2,∞ ≤ 3
r
µrσ1∗
µrσ1∗
∗
, |||∆V |||2,∞ ≤ |||V |||2,∞ + |||V |||2,∞ ≤ 3
,
d1
d2
we complete the proof.
Lemma 13 can be used to prove the following result.
Lemma 14. For any α ∈ [0, 1], suppose Ω ⊆ [d1 ] × [d2 ] satisfies |Ω(i,·) | ≤ αd2 for all i ∈ [d1 ] and
|Ω(·,j) | ≤ αd1 for all j ∈ [d2 ]. Then we have
|||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤ 18αµrσ1∗ (|||∆V |||2F + |||∆U |||2F ).
35
Proof. Using Lemma 13 for bounding each entry of U V > − U ∗ V ∗> , we have that
X
|(U V > − U ∗ V ∗> )(i,j) |2
|||ΠΩ (U V > − U ∗ V ∗> )|||2F ≤
(i,j)∈Ω
X 18µrσ ∗
18µrσ1∗
1
≤
k∆V (j,·) k22 +
k∆U (i,·) k22
d1
d2
(i,j)∈Ω
X X 18µrσ ∗
X X 18µrσ ∗
1
1
≤
k∆V (j,·) k22 +
k∆U (i,·) k22
d1
d2
j
≤
i
i∈Ω(·,j)
18αµrσ1∗ (|||∆V |||2F
j∈Ω(i,·)
2
+ |||∆U |||F ).
Denote the i-th largest singular value of matrix M by σi (M ).
Lemma 15 (Lemma 5.14 in [26]). Let M1 , M2 ∈ Rd1 ×d2 be two rank r matrices. Suppose they have
SVDs M1 = L1 Σ1 R1> and M2 = L2 Σ2 R2> . Suppose |||M1 − M2 |||op ≤ 21 σr (M1 ). Then we have
1/2
1/2
1/2
1/2
d2 (L2 Σ2 , R2 Σ2 ; L1 Σ1 , R1 Σ1 ) ≤ √
B
2 |||M2 − M1 |||2F
.
2 − 1 σr (M1 )
Parameter Settings for FB Separation Experiments
We approximate the FB separation problem by the RPCA framework with r = 10, α = 0.2, µ = 10.
Our algorithmic parameters are set as γ = 1, η = 1/(2σ̂1∗ ), where σ̂1∗ is an estimate of σ1∗ obtained
from the initial SVD. The parameters of AltProj
are kept as provided in the default setting. For
√
IALM, we use the tradeoff paramter λ = 1/ d1 , where d1 is the number of pixels in each frame
(the number of rows in Y ).
Note that both IALM and AltProj use the stopping criterion
|||Y − Mt − St |||F /|||Y |||F ≤ 10−3 .
Our algorithm for the partial observation setting never explicitly forms the d1 -by-d2 matrix Mt =
Ut Vt> , which is favored in large scale problems, but also renders the above criterion inapplicable.
Instead, we use the following stopping criterion
|||Ut+1 − Ut |||2F + |||Vt+1 − Vt |||2F
≤ 4 × 10−4 .
|||Ut |||2F + |||Vt |||2F
This rule checks whether the iterates corresponding to low-rank factors become stable. In fact, our
stopping criterion seems more natural and practical because in most real applications, matrix Y
cannot be strictly decomposed into low-rank M and sparse S that satisfy Y = M + S. Instead of
forcing M + S to be close to Y , our rule relies on seeking a robust subspace that captures the most
variance of Y .
36
| 10 |
Square-free class sizes in products of groups
arXiv:1703.08363v1 [math.GR] 24 Mar 2017
M. J. Felipe · A. Martı́nez-Pastor · V. M. Ortiz-Sotomayor
∗
Abstract
We obtain some structural properties of a factorised group G = AB, given that the
conjugacy class sizes of certain elements in A ∪ B are not divisible by p2 , for some
prime p. The case when G = AB is a mutually permutable product is especially
considered.
Keywords Finite groups · Soluble groups · Products of subgroups · Conjugacy
classes
2010 MSC 20D10 · 20D40 · 20E45
1
Introduction
All groups considered thorogouth this paper are finite. Over the last years, many
authors have investigated the influence of conjugacy class sizes on the structure of finite
groups. In the meantime, numerous studies in the framework of group theory have
focused in factorised groups. In this setting, a central question is how the structure of the
factors affects the structure of the whole group, in particular when they are connected by
certain permutability properties. The purpose of this paper is to show new achievements
which combine both current perspectives in finite groups. More precisely, our aim is to
get some information about a factorised group, provided that the conjugacy class sizes
of some elements of its factors are square-free.
The earlier starting point of our investigation can be traced back to the paper of
Chillag and Herzog ([5]), where the structure of a group in which all elements have
square-free conjugacy class sizes was first analysed. Next, in [6], Cossey and Wang
localised one of the main theorems in [5] for a fixed prime p, that is, they considered
conjugacy class sizes not divisible by p2 , for certain prime p. Later on, this study was
∗
The first author is supported by Proyecto Prometeo II/2015/011, Generalitat Valenciana (Spain),
and the second author is supported by Proyecto MTM2014-54707-C3-1-P, Ministerio de Economı́a, Industria y Competitividad (Spain). The results in this paper are part of the third author’s Ph.D. thesis,
and he acknowledges the predoctoral grant ACIF/2016/170, Generalitat Valenciana (Spain). The authors wish to thank John Cossey for helpful conversations during his last visit to Valencia.
Instituto Universitario de Matemática Pura y Aplicada (IUMPA), Universitat Politècnica de València,
Camino de Vera, s/n, 46022, Valencia, Spain.
B: [email protected], [email protected], [email protected]
1
improved by Li in [12], and by Liu, Wang, and Wei in [13], by replacing conditions
on all conjugacy classes by those referring only to conjugacy classes of either p-regular
elements or prime power order elements, using the classification theorem of finite simple
groups (CFSG). These authors also first obtained some preliminary results in factorised
groups. This research was extended in 2012 by Ballester-Bolinches, Cossey and Li in [2],
through mutually permutable products. More recently, in 2014, Qian and Wang ([14])
have gone a step further by considering just conjugacy class sizes of p-regular elements
of prime power order (although not in factorised groups).
In the context of factorised groups, and aiming to obtain criteria for products of
supersoluble subgroups to be supersoluble, several authors have considered products in
which certain subgroups of the factors permute (see [3] for a detailed account). In this
scene, we are interested in mutually permutable products, factorised groups G = AB
such that the subgroups A and B are mutually permutable, i.e., A permutes with every
subgroup of B and B permutes with every subgroup of A (see also [4]). Obviously, if A
and B are normal in G, then they are mutually permutable.
We recall that, for a group G, the set xG = {g −1 xg : g ∈ G} is the conjugacy class
of the element x ∈ G, and xG denotes the conjugacy class size of x. If p is a prime
number, we say that x ∈ G is a p-regular element if its order is not divisible by p, and
that it is a p-element if its order is a power of p. Moreover, if n is an integer, let np
denote the highest power of p dividing n. The mth group of order n in the SmallGroups
library [8] of GAP will be identified by n#m. The remainder notation is standard and
is taken mainly from [7]. We also refer to this book for details about classes of groups.
In this paper, motivated by the above development, at first we focus on the case of
p-groups, extending for factorised groups the well-known Knoche’s theorem (see [11]).
Theorem A. Let p be a prime number and let P = AB be a p-group such that p2 does
not divide xP for all x ∈ A ∪ B. Then P ′ 6 Φ(P ) 6 Z(P ), P ′ is elementary abelian
and |P ′ | ≤ p2 .
Our next goal in the paper is to prove the following theorem, regarding mutually
permutable products.
Theorem B. Let G = AB be the mutually permutable product of the subgroups A and
B, and let p be a prime such that gcd(p − 1, |G|) = 1. If p2 does not divide xG for any
p-regular element x ∈ A ∪ B of prime power order, then:
(1) G is soluble.
(2) G is p-nilpotent.
(3) The Sylow p-subgroups of G/ Op (G) are elementary abelian.
In the particular case when G = A = B, we recover [14, Theorem A] (see Section 3,
Corollary 3.5). We remark that both results use the CFSG.
Moreover, in relation to the third assertion, we have found a gap in one of the
statements in [6, Theorem 1], as it is reported in Remark 3.7 (a).
On the other hand, we point out that it is possible to find examples of groups factorised as a product of two (mutually permutable) subgroups which satisfy the hypothe2
ses of Theorem B for some fixed prime p and, however, there exist elements x ∈ A ∪ B
such that p2 divides either xA or xB (see Remark 3.7 (b)).
The next theorem generalises the last assertion of [2, Theorem 1.3] regarding p-soluble
groups, by considering only prime power order elements:
Theorem C. Let G = AB be the mutually permutable product of the subgroups A and
B, and let p be a prime. Suppose that for every prime power order p-regular element
x ∈ A ∪ B, xG is not divisible by p2 . If G is p-soluble, then G is p-supersoluble.
In the line of [5, Theorem 1] and [6, Theorem 2], if we consider all prime numbers, then
we obtain some information about the structure of the derived subgroup of a factorised
group G.
Theorem D. Let G = AB be the product of the subgroups A and B, and assume that G
is supersoluble. Suppose that every prime power order element x ∈ A ∪ B has square-free
conjugacy class size. Then:
(1) G′ is abelian.
(2) The Sylow subgroups of G′ are elementary abelian.
(3) F(G)′ has Sylow p-subgroups of order at most p2 , for every prime p.
If we limit our conditions only to p-regular elements, as a consequence of Theorems
B and C, we obtain the following result which extends [2, Corollary 1.5] (see Corollary
4.3) for prime power order elements, and also a theorem of [12], for products of groups.
Theorem E. Let G = AB be the mutually permutable product of the subgroups A and B.
Suppose that for every prime p and every prime power order p-regular element x ∈ A∪B,
xG is not divisible by p2 . Then G is supersoluble, and G/ F(G) has elementary abelian
Sylow subgroups.
We remark that the first statement in Theorem D is not further true under the weaker
hypotheses of the above theorem, even for arbitrary groups not necessarily factorised,
as pointed out in [14]. Indeed, as a result of Theorem E, the supersolubility condition
in Theorem D can be exchanged by the mutual permutability of the factors.
On the other hand, with the stronger assumption that all p-regular elements of the
factors (not only those of prime power order) have conjugacy class sizes not divisible
by p2 , we get extra information about the orders of the Sylow p-subgroups of G/F (G),
extending partially [6, Theorem 2].
Theorem F. Let G = AB be the mutually permutable product of the subgroups A and
B. Suppose that for every prime p and every p-regular element x ∈ A ∪ B, xG is not
divisible by p2 . Then the order of a Sylow p-subgroup of G/ F(G) is at most p2 .
In summary, when dealing with mutually permutable products, the next corollary
follows directly from the above theorems.
Corollary G. Let G = AB be the mutually permutable product of the subgroups A and
B. Suppose that xG is square-free for each element x ∈ A ∪ B. Then G is supersoluble,
3
and both G/ F(G) and G′ have elementary abelian Sylow subgroups. Moreover, G′ is
abelian, and both groups G/ F(G) and F(G)′ have Sylow p-subgroups of order at most
p2 , for each prime p.
In Section 3 we prove Theorems A, B and C, which refer to class sizes not divisible
by p2 , for a fixed prime p. Theorems E, D and F, which consider square-free conjugacy
class sizes (for all primes), are proved in Section 4. In both cases we will illustrate the
scope of the results presented with some examples.
2
Preliminary results
We use the following elementary properties frequently, sometimes without further
reference.
Lemma 2.1. Let N be a normal subgroup of a group G, and let p be a prime. Then:
(a) xN divides xG , for any x ∈ N .
(b) (xN )G/N divides xG , for any x ∈ G.
(c) If xN is a p-element of G/N , then there exists a p-element x1 ∈ G such that
xN = x1 N .
We need specifically the following fact about Hall subgroups of factorised groups. It
is a reformulation of [1, 1.3.2] which is convenient for our purposes. We recall that a
group is a Dπ -group, for a set of primes π, if every π-subgroup is contained in a Hall
π-subgroup, and any two Hall π-subgroups are conjugate. In particular, all π-separable
groups are Dπ -groups for any set of primes π, and all groups are Dπ -groups when π
consists of a single prime.
Lemma 2.2. Let G = AB be the product of the subgroups A and B. Asume that A, B,
and G are Dπ -groups for a set of primes π. Then there exists a Hall π-subgroup H of G
such that H = (H ∩ A)(H ∩ B), with H ∩ A a Hall π-subgroup of A and H ∩ B a Hall
π-subgroup of B.
We collect here some results on mutually permutable products, which will be very
useful along the paper.
Lemma 2.3. Let the group G = AB be the product of the mutually permutable subgroups
A and B. Then we have:
(a) ([3, 4.1.10]) G/N is the product of the mutually permutable subgroups AN/N and
BN/N .
(b) ([3, 4.1.21]) If U is a subgroup of G, then (U ∩ A)(U ∩ B) is a subgroup, and
U ∩ A and U ∩ B are mutually permutable. Moreover, if N is a normal subgroup of G,
then (N ∩ A)(N ∩ B) is also normal in G.
Theorem 2.4. ([4, Theorem 1]) Let the non-trivial group G = AB be the product of the
mutually permutable subgroups A and B. Then AG BG is not trivial.
4
The following lemma will be essential in the proofs of our theorems.
Lemma 2.5. ([2, Lemma 2.4]) Let p be a prime, and Q be a p′ -group acting faithfully
on an elementary abelian p-group N with |[x, N ]| = p, for all 1 6= x ∈ Q. Then Q is
cyclic.
The next result is the first assertion of Theorem A in [14], which uses the CFSG.
Theorem 2.6. Let G be a group. For a fixed prime p with gcd(p − 1, |G|) = 1, if p2
does not divide xG for any p-regular element x ∈ G of prime power order, then G is
soluble.
Finally, the later lemma, which is a nice result due to Isaacs, will be very useful in
the proof of Theorem D.
Lemma 2.7. ([10, 4.17]) Let K be an abelian normal subgroup of a finite group G, and
let x ∈ G be non-central. Then |CG (x)| < |CG (y)|, where y = [k, x] and k ∈ K is
arbitrary.
3
Class sizes not divisible by p2 , for a fixed prime p
The well-known Knoche’s theorem (see [11]) asserts that if P is a p-group, p a prime,
then the conjugacy class sizes of P are square-free if, and only if, |P ′ | ≤ p. We begin
this section by proving Theorem A, which clearly extends it for factorised groups.
Proof of Theorem A. Since |P : CP (x)| ≤ p for each x ∈ A ∪ B, it follows
Φ(P ) 6 CP (x). Therefore, Φ(P ) commutes with both A and B, so P ′ 6 Φ(P ) 6 Z(P ).
Hence P/ Z(P ) is elementary abelian, and xp ∈ Z(P ) for all x ∈ P . Since P ′ 6 Z(P ) and
[x, y]p = [xp , y] = 1 (see [7, A - 7.3(a)]) for any x, y ∈ P , it follows that P ′ is elementary
abelian. Now it remains to prove that |P ′ | ≤ p2 .
Let [x, y] be a generator of P ′ . Since P ′ 6 Z(P ) and y = ya yb with ya ∈ A and
yb ∈ B, then [x, y] = [x, ya yb ] = [x, yb ][x, ya ]yb = [x, yb ][x, ya ] ∈ [P, B][P, A] . Thus
P ′ = [P, B][P, A]. Clearly, [P, B] is elementary abelian. Suppose [P, B] 6= 1, and let
1 6= [x, z] and 1 6= [x′ , z ′ ] be two generators of [P, B], with x, x′ ∈ P and z, z ′ ∈ B. We
distinguish three cases in order to prove that h[x, z]i = h[x′ , z ′ ]i:
i) Suppose first z, z ′ ∈ B \ Z(B). Let b ∈ B \ (CP (z) ∪ CP (z ′ )). Since |P : CP (z)| = p
then P = CP (z)hxi. Moreover, b ∈
/ CP (z) implies that 1 6= [b, z] = [xi t, z] = [xi , z] =
i
i
[x, z] , where b = tx with t ∈ CP (z). On the other hand, P = CP (b)hzi so z ′ =
z j k, with k ∈ CP (b). Hence 1 6= [b, z ′ ] = [b, z j k] = [b, z]j = [x, z]i+j . Finally, as
b ∈ P = CP (z ′ )hx′ i, then b = (x′ )m s with s ∈ CP (z ′ ). Therefore 1 6= [x, z]i+j =
[b, z ′ ] = [(x′ )m s, z ′ ] = [x′ , z ′ ]m , and recall that [x, z] and [x′ , z ′ ] both have order p. Thus,
h[x, z]i = h[x′ , z ′ ]i.
ii) Now suppose z, z ′ ∈ Z(B). Then B 6 CP (z) ∩ CP (z ′ ). There exists w ∈ P \
(CP (z) ∪ CP (z ′ )). Therefore, w = wa wb with wa ∈ A and wb ∈ B 6 CP (z) ∩ CP (z ′ ), so
wa ∈ A \ (CP (z) ∪ CP (z ′ )). Arguing analogously as in case i) with wa instead of b, we
conclude that h[x, z]i = h[x′ , z ′ ]i too.
5
iii) Finally, suppose z ∈ B \ Z(B) but z ′ ∈ Z(B). Let z ′′ = zz ′ ∈ B \ Z(B). Therefore,
we have [x′ , z ′′ ] = [x′ , z ′ ][x′ , z]. If [x′ , z ′′ ] = 1 then 1 6= [x′ , z ′ ]−1 = [x′ , z], and applying
case i) to both [x, z] and [x′ , z] we conclude that they generate the same cyclic group of
order p. On the other hand, if [x′ , z ′′ ] 6= 1 and [x′ , z] = 1, then we apply again the first
case. Finally, if both [x′ , z ′′ ] 6= 1 6= [x′ , z] then they generate the same cyclic group by
case i) again. Thus 1 6= h[x′ , z ′ ]i = h[x′ , z ′′ ][x′ , z]−1 i 6 h[x′ , z ′′ ]i. Since the last one has
order p, it follows h[x′ , z ′ ]i = h[x′ , z ′′ ]i. So we have h[x′ , z ′ ]i = h[x′ , z ′′ ]i, which is equal to
h[x, z]i by i) again.
In conclusion, if [P, B] 6= 1, then it has order p. Analogously with [P, A]. Hence
|P ′ | = |[P, B][P, A]| ≤ p2 and this establishes the result.
Example 3.1. The converse of the above result is not true in general, in contrast
to Knoche’s theorem. Let P be the group of the Small groups library of GAP with
identification number 32#35, which is the product of a cyclic group of order 4 and a
quaternion group of order 8. Then its derived group is P ′ = C2 × C2 , and P ′ = Φ(P ) =
Z(P ). Nevertheless, there are elements in the quaternion group with conjugacy class size
equal to 4.
Example 3.2. Let G = Q8 × D8 be the direct product of a quaternion group and a
dihedral group of order 8. Then every element contained in each factor has conjugacy
class size equal to either 1 or 2, so Theorem A applies. However, there are elements in
G with conjugacy class size divisible by 4, and Knoche’s result cannot be applied.
Now we proceed with a key result in the sequel.
Proposition 3.3. Let G be a group, and let p be a prime. Suppose that N is an abelian
minimal normal subgroup of G, which is a p′ -group. Then:
(1) If G is p-nilpotent, and xG is not divisible by p2 for every element x ∈ N , then
|Op (G/N Op (G))| ≤ p.
(2) If K/N Op (G) = Op (G/N Op (G)) has order p, and P is a Sylow p-subgroup of
K, then CN (P ) = 1.
Proof. (1) Suppose that the result is not true, and let G be a counterexample
of minimal order. Since the hypotheses are inherited by quotients, we may assume by
standard arguments that Op (G) = 1, and then also Φ(G) = 1. Since N is abelian, by a
Gaschütz’s result ([9, 4.4]) N is complemented, that is, G = N S with N ∩ S = 1. We
may assume that G/N is not a p′ -group, so Op (G/N ) ∼
= Op (S) 6= 1 by the minimality
of G. Let P be a Sylow p-subgroup of S (so P is a Sylow p-subgroup of G). Hence
it follows Op (S) ∩ Z(P ) 6= 1. Let Z be a minimal normal subgroup of Op (S) ∩ Z(P ).
Since S is p-nilpotent, we get S = P L, where L is normal in S and P ∩ L = 1. It
follows that [L, Z] 6 [L, Op (S)] 6 L ∩ Op (S) = 1, so Z 6 Z(S). Note that CN (Z) is
normal in G = SN . Consequently, by the minimality of N , we have either CN (Z) = 1
or CN (Z) = N . If CN (Z) = N , then Z 6 Z(G), which implies that Z 6 Op (G) = 1, a
contradiction. So we may affirm CN (Z) = 1, for every minimal normal subgroup Z of
Op (S) ∩ Z(P ).
6
Now let 1 6= x ∈ N such that a Sylow p-subgroup of CG (x), say P0 , is contained in P ,
so P0 = CP (x). By the hypotheses, xG p = |G : CG (x)|p = |P : P0 | is not divisible by
p2 , so it follows either |P : P0 | = 1 or |P : P0 | = p. The first case yields P = CP (x) and
then x ∈ CN (Z) = 1, a contradiction. Therefore, we may assume that |P : P0 | = p, and
so P0 is normal in P . In addition, since Op (S) ∩ Z(P ) is abelian, by the minimality of Z,
we have either P0 ∩ Z = 1 or P0 ∩ Z = Z. The last case gives Z 6 CP (x), a contradiction
again. Hence, P0 ∩ Z = 1 and it follows that P = P0 × Z and |Z| = |P : P0 | = p. We
only need to see that Z = Op (S) to finish the proof.
Note that Z(P ) = Z(P )∩P0 Z = Z(Z(P )∩P0 ), so it follows Z(P )∩Op (S) = Z(Z(P )∩
P0 ) ∩ Op (S) = Z(Z(P ) ∩ P0 ∩ Op (S)). If Z(P ) ∩ P0 ∩ Op (S) 6= 1, since it is normal in
Op (S) ∩ Z(P ), we can choose a minimal normal subgroup Z1 of Op (S) ∩ Z(P ) such that
Z1 6 Z(P )∩P0 ∩Op (S). But then Z1 6 P0 = CP (x), so x ∈ CN (Z1 ) = 1, a contradiction.
Therefore, we may assume that Z(P ) ∩ P0 ∩ Op (S) = 1. On the other hand, we have
Op (S) = Op (S)∩ZP0 = Z(P0 ∩Op (S)). If P0 ∩Op (S) is a non-trivial subgroup of P , since
it is normal in P , we have a contradiction with Z(P ) ∩ P0 ∩ Op (S) = 1. Consequently
we get the final contradiction Z = Op (S). The first assertion is then established.
(2) Let K/N Op (G) = Op (G/N Op (G)), which has order p, and let P be a Sylow psubgroup of K. Then K = P N . Moreover, [K, N ] is normal in G and [K, N ] = [P, N ] 6
N so, by the minimality of N , we have either [P, N ] = 1 or [P, N ] = N . The first case
leads to K = P × N , and then P 6 Op (G), a contradiction. Thus we have [P, N ] = N ,
and by coprime action it follows CN (P ) = 1.
Note that every dihedral group of order 2q (for q an odd prime) verifies the hypotheses
of the above proposition (take p = 2).
Theorem B (3) is indeed an immediate consequence of the next more general result.
Theorem 3.4. Let G = AB be a soluble group, which is the mutually permutable product
of the subgroups A and B. Assume that G is p-nilpotent for a prime p. If p2 does not
divide xG for any p-regular element x ∈ A ∪ B of prime power order, then G/ Op (G)
has elementary abelian Sylow p-subgroups.
Proof. Suppose that the result is false and let G be a minimal counterexample. We
may assume by the minimality of G that Op (G) = 1, and therefore Φ(G) = 1 too. By
Theorem 2.4, we can assume that there exists a minimal normal subgroup N of G such
that N 6 A. Moreover, N is q-elementary abelian, for some prime q 6= p. Furthermore,
since N ∩ Φ(G) = 1, by Gaschütz’s lemma we may write G = SN , with S ∩ N = 1.
Let P be a Sylow p-subgroup of S (so it is a Sylow p-subgroup of G). Let T = Op (S).
By the minimality of G we have T ∼
= Op (G/N ) 6= 1, and by Proposition 3.3 (1) it holds
|T | = p. We may choose 1 6= x ∈ N such that P0 = CP (x) is a Sylow p-subgroup of
CG (x). Since CN (T ) = 1 by Proposition 3.3 (2), it holds that P0 6= P , |P : P0 | = p, and
P0 ∩ T = 1. Hence P = P0 × T . Finally, since P0 ∼
= (P N/N )/ Op (G/N ), which
= P/T ∼
is elementary abelian by the minimality of G, it follows that P so is, and this leads to
the final contradiction.
Proof of Theorem B. Note that the quotients of G satisfy the hypotheses.
Moreover, if N is a normal subgroup of G such that N = (N ∩ A)(N ∩ B), then N
7
also inherits the hypotheses. (Observe that this occurs, for instance, if either N 6 A or
N 6 B.)
(1) We first see that G is soluble by induction over |G|. Since every group of odd
order is soluble, we may affirm that p = 2 because gcd(p − 1, |G|) = 1. By Theorem 2.4,
we can assume that there exists a normal subgroup M of G such that 1 6= M 6 A. If
M < G, then M is soluble by minimality. Analogously G/M is also soluble, and then
so is G. If M = G, we apply Theorem 2.6.
(2) Suppose that the result is false and let G be a counterexample of minimal order.
Since the quotients of G inherit the hypotheses, the class of p-nilpotent groups is a
saturated formation, and G is soluble, we may assume that G possesses a unique minimal
normal subgroup N , with N = CG (N ) = F(G). If N is a p′ -group, since G/N is pnilpotent by the minimality of G, it follows that G is p-nilpotent, which is a contradiction.
Thus, we may assume that N = Op (G). By Theorem 2.4, we can assume without loss of
generality that N 6 A, and that there exists a minimal normal subgroup E/N of G/N
such that either E/N ≤ A/N or E/N 6 BN/N . In the first case, we have E 6 A. In
the second case, it follows E = E ∩ BN = N (E ∩ B) 6 (E ∩ A)(E ∩ B) 6 E. Therefore,
we have E = (E ∩ A)(E ∩ B), where the factors are mutually permutable by Lemma 2.3
(b). In both cases, E is normal in G and E verifies the hypotheses. Hence, if E < G,
then E is p-nilpotent by the minimality of G. Since N = Op (G), we get that E/N is
q-elementary abelian for some prime q 6= p, so it follows that E = QN , with Q the
normal Sylow q-subgroup of E. Hence, Q is normal in G which implies that E = N , a
contradiction.
Therefore, we can assume that E = G. So we have G = E = N Q, where Q is
an abelian Sylow q-subgroup of G. By Lemma 2.2, we may assume that Q = (Q ∩
A)(Q ∩ B), with either Q ∩ A 6= 1 or Q ∩ B 6= 1. Suppose first that Q ∩ B 6= 1, and
take 1 6= x ∈ Q ∩ B. Let E1 = hxiN , which is normal in QN = G. Hence, we have
E1 = hxiN 6 (E1 ∩ B)(E1 ∩ A) 6 E1 . If Q ∩ B = 1, then G = A and we can choose
1 6= x ∈ Q, so that E1 = hxiN is normal in QN = G. Thus, in both cases, we have that
E1 inherits the hypotheses and, if E1 < G, it follows that it is p-nilpotent. Therefore
hxi is a normal Sylow q-subgroup of E1 , which is again a contradiction. Consequently,
we may assume that G = E1 = hxiN , for some q-element x.
Note that CN (x) is normal in G = hxiN , since N is abelian. By the minimality
of N , it follows that either CN (x) = 1 or CN (x) = N . The second case leads to
x ∈ CG (N ) = N , a contradiction. Hence, it follows that CG (x) = CG (x) ∩ N hxi =
hxi CN (x) = hxi. Then xG = |G : CG (x)| = |N hxi : hxi| = |N | , and so |N | = p, by the
hypotheses. Now, we get that hxi ∼
= G/N = NG (N )/ CG (N ) is isomorphic to a subgroup
of Aut(N ) ∼
C
,
the
cyclic
group
of order p − 1. Hence, |hxi| divides both p − 1 and
= p−1
|G|, which contradicts the fact that gcd(p − 1, |G|) = 1. This finishes the proof of the
p-nilpotency of G.
(3) It follows from Theorem 3.4.
In the particular case when G = A = B we recover:
Corollary 3.5. ([14, Theorem A]) Let G be a group. For a fixed prime p with gcd(p −
1, |G|) = 1, if p2 does not divide xG for any p-regular element x ∈ G of prime power
8
order, then G is soluble, p-nilpotent and G/ Op (G) has elementary abelian Sylow psubgroups.
Note that if G is the direct product of two symmetric groups of degree 3, then G
verifies the hypotheses of Theorem B for p = 2, but not those of Corollary 3.5. Moreover,
the asumption that gcd(p − 1, |G|) = 1 is necessary, which can be seen by considering
G = A5 , the alternating group of degree 5, and the prime p = 3.
We include here a theorem due to Cossey and Wang [6], which was the initial motivation for our results, to notify a gap that we have found in one of the statements.
Theorem 3.6. ([6, Theorem 1]) Let G be a finite group, and p be a prime divisor of |G|
such that if q is any prime divisor of |G|, then q does not divide p − 1. Suppose that no
conjugacy class size of G is divisible by p2 . Then G is a soluble p-nilpotent group, and
G/ Op (G) has a Sylow p-subgroup of order at most p. Further, if P is a Sylow p-subgroup
of G, then P ′ has order at most p, and if P 6= Op (G), then Op (G) is abelian.
Remark 3.7. (a) The statement “G/ Op (G) has a Sylow p-subgroup of order at most
p” in the above theorem (and so the corresponding one in [13, Theorem 6]) is not true.
To see this, consider the semidirect product G = [C5 × C5 ](Sym(3) × C2 ) (where
Sym(3) is a symmetric group of degree 3), which is the group of the Small groups library
of GAP with identification number 300#25, and the prime p = 2. Then G verifies the
hypotheses of Theorem 3.6 but O2 (G) = 1 and |G|2 = 4. We reveal that this example
has been communicated to us by John Cossey.
(b) The same example shows that the hypotheses in Theorem B for the conjugacy
class sizes of the elements x ∈ A ∪ B are not necessarily inherited by the factors, unless
they are (sub)normal in G. The above group G can be factorised as the mutually
permutable product of A = D10 × D10 and B = [C5 × C5 ]C3 (we checked this using GAP).
It is clear that G = AB satisfies the hypotheses of Theorem B for p = 2, but there are
elements x ∈ A with xA divisible by 4.
Remark 3.8. A natural question is how to extend the last assertion of Theorem 3.6 for
(mutually permutable) products. Concerning this, we show the following example:
Let A = D8 be a dihedral group of order 8 and B = [C5 ]C4 = ha, b | a5 = b4 =
1, ab = a4 i, and consider the prime p = 2. Then G = A × B is a mutually permutable
product of A and B, and G is 2-nilpotent. Moreover, 4 does not divide any conjugacy
class size of elements in A ∪ B. However, O2 (G) = (O2 (G) ∩ A)(O2 (G) ∩ B) = D8 × C2
is not abelian.
Regarding the claim “P ′ has order at most p” in Theorem 3.6, we get the next
extension for factorised groups, as an immediate consequence of Theorem A:
Corollary 3.9. Let G = AB be the product of the subgroups A and B. Assume that G
is p-nilpotent, and that for all p-elements in the factors, p2 does not divide xG . If P is
a Sylow p-subgroup of G, then P ′ 6 Φ(P ) 6 Z(P ), with P ′ elementary abelian of order
at most p2 .
9
In particular, from this fact and Theorem B, we get [13, Theorem 7] as a corollary,
taking G = A = B.
Finally, we prove Theorem C, which is motivated by [2, Theorem 1.3].
Proof of Theorem C. Suppose that the result is false and let G be a counterexample of minimal order. Note that G cannot be simple. Since the class of p-supersoluble
groups is a saturated formation, we may assume that there exists a unique minimal
normal subgroup N of G, and that Φ(G) = 1. By the minimality of G, we get that
G/N is p-supersoluble. Since G is p-soluble, it follows that N is either a p-group or
a p′ -group. In the second case, since G/N verifies the thesis by minimality, we get a
contradiction. Consequently, we may assume that N is p-elementary abelian and we
must show that |N | = p. As Φ(G) = 1 and G is p-soluble with Op′ (G) = 1, by [7, A
- 10.6] it follows that F(G) = Soc(G) = N = CG (N ), and also N = Op (G). Applying Theorem 2.4, we may assume that there exists a minimal normal subgroup Z/N
of G/N such that Z/N 6 AN/N , so Z = Z ∩ AN = N (Z ∩ A). Since G/N is psoluble, it follows that Z/N is either a p-group or a p′ -group. The first case leads to
Z/N 6 Op (G/N ) = Op (G/ Op (G)) = 1, a contradiction. Hence, we may assume that
Z/N is a p′ -group.
Let Q be a Sylow q-subgroup of Z ∩ A, where q 6= p is a prime (so Q is a Sylow
q-subgroup of Z). Therefore Q ∼
= QN/N is a Sylow q-subgroup of Z/N , which acts
faithfully on N . If 1 6= a ∈ Q 6 A, then N = [N, a]×CN (a). By the hypotheses, since p2
does not divide aG = |G : CG (a)|, then neither divides |N : CN (a)| = |[N, a]|, so either
|[N, a]| = 1 or |[N, a]| = p. The first case leads to a ∈ CG (N ) = N , a contradiction.
Thus, Lemma 2.5 yields QN/N is cyclic. Since this is valid for all primes q 6= p, we get
by [10, 5.15] that Z/N is soluble. By the minimality of Z/N , it follows that (Z/N )′ = 1
and Z/N is abelian with cyclic Sylow subgroups. Consequently Z/N = hxN i, where
x∈
/ N and the order of xN is q, for some prime q 6= p.
We may assume that x ∈ Z ∩ A and Z = N hxi. Hence CN (x) = CN (Z). By the
minimality of N , we have either CN (Z) = N or CN (Z) = 1. The first case leads to
x ∈ Z 6 CG (N ) = N , a contradiction. Therefore, since N = [N, x] × CN (x), it follows
|N | = |[N, x]| = p, and this final contradiction establishes the theorem.
Example 3.10. Let G be the symmetric group of degree 4. Then G = AB is a mutually
permutable product, where A denotes the alternating group of degree 4 and B is a Sylow
2-subgroup of G, which verifies the hypotheses of Theorem C, for p = 3.
4
Square-free class sizes
We begin this section with the proof of Theorem D.
Proof of Theorem D. (1) Suppose that the result is false and let G be a counterexample of least possible order. Since G supersoluble, G/ F(G) is abelian, and
so G′ 6 F(G). Moreover, the quotients of G inherit the hypotheses and the class
of metabelian groups is a formation, so we may assume that there exists a unique
minimal normal subgroup N of G with |N | = p, for some prime divisor p of |G|.
10
Hence, F(G) = Op (G) 6 P , a Sylow p-subgroup of G. Since G/ F(G) is abelian,
P = Op (G) = F(G). Hence P = (P ∩ A)(P ∩ B), where P ∩ A and P ∩ B are Sylow p-subgroups of A and B respectively, by Lemma 2.2. Applying Theorem A, we have
P ′ 6 Φ(P ) 6 Z(P ), and P ′ is elementary abelian of order at most p2 . Note that P ′ 6= 1,
because G′ ≤ P .
By Lemma 2.2, we may consider H a Hall p′ -subgroup of G, such that H = (H ∩
A)(H ∩ B), where H ∩ A and H ∩ B are Hall p′ -subgroups of A and B respectively.
Moreover, H ∼
= G/ F(G) is abelian. Let x ∈ H ∩ A be a prime power order element.
Since H 6 CG (x) 6 G, it follows by the hypotheses that xG ≤ p, and so Φ(G) 6
CG (x). Thus Φ(G) 6 CG (H ∩ A), and analogously for H ∩ B. Consequently we get
P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H). Since P ′ 6 Φ(P ) 6 Z(P ), it follows P ′ 6 Φ(P ) 6 Z(G).
In particular, Φ(G) 6= 1 6= Z(G).
If A, B 6 P , then G = P and G′ = P ′ 6 Z(G), a contradiction. Hence we have
either H ∩ A 6= 1 or H ∩ B 6= 1. Assume H ∩ A 6= 1. Let QA be a Sylow q-subgroup of
H ∩ A, for some prime q 6= p. Note that QA 66 Z(G), because Z(G) is a p-group. Let
QA = QA Z(G)/ Z(G), which acts on P = P/ Z(G), which is elementary abelian because
Φ(P ) 6 Z(G) 6 F(G) = P . Suppose w = w Z(G) ∈ CQA (P ). Then [w, y] = 1 for all y =
y Z(G) ∈ P , so [w, y] ∈ Z(G) 6 P . Let k = o(w) denote the order of w. Thus [w, y]k =
[wk , y] = 1. It follows [w, y] = 1 for all y ∈ P , so w ∈ CQA (P ) = CQA (F(G)) = 1. Then
CQA (P ) = 1 and the action is faithful. Let 1 6= αq = αq Z(G) ∈ QA . Therefore P =
[P , αq ] × CP (αq ), with [P , αq ] 6= 1. Moreover, [P , αq ] = P : CP (αq ) = P : CP (αq ) =
|P : CP (αq )| , which divides αG
q , because P is normal in G. Since H 6 CG (αq ) and αq
is a non-central prime power order element in A, it follows αG
q = p, and so [P , αq ] = p.
∼
Applying Lemma 2.5, we get that QA = QA is cyclic. Since this is valid for each prime
divisor q of |H ∩ A|, we deduce that H ∩ A has cyclic Sylow subgroups, but it is abelian,
so H ∩ A is cyclic. Analogously, if H ∩ B 6= 1, then it is cyclic.
Let H ∩ A = hαi. Assume first that 1 6= α is a q-element, for some prime q, and
that G = P hαi. By the above argument, hαi Z(G)/ Z(G) acts faithfully on P , and
[P , α] = |P : CP (α)| = p. Let y ∈ P \ CP (α). If [y, α] = 1, then [y, α] ∈ Z(G) 6
P . Hence [y, α]o(α) = [y, αo(α) ] = 1, so [y, α] = 1 and y ∈ CP (α), a contradiction.
Then [y, α] 6= 1, and since [P , α] = p, it follows [P , α] = h[y, α]i. Therefore we have
[P, α] = [P , α] = h[y, α]i = h[y, α]i, so [P, α] 6 [P, α] Z(G) = h[y, α]i Z(G), and then
G′ = P ′ [P, α] 6 h[y, α]i Z(G) which is abelian, a contradiction.
Hence, we may assume that, for every prime q, if αq is the q-part of α, then P hαq i <
G. Note that P hαq i is normal in G, and P hαq i = (P hαq i ∩ A)(P hαq i ∩ B). Therefore, by
the minimality of G, it follows that (P hαq i)′ is abelian. Notice that (P hαq i)′ = P ′ [P, αq ],
since P is normal in G. Let K = P ′ [P, αq ], which is an abelian normal subgroup of G,
and let t ∈ [P, αq ] 6 K. Then Lemma 2.7 leads to |CG (αq )| < |CG ([t, αq ])|. If p divides
[t, αq ]G we get a contradiction, because [t, αq ]G < αG
q = p. Hence, P 6 CG ([t, αq ])
and [t, αq ] ∈ Z(P ), for each t ∈ [P, αq ]. By coprime action, P = [P, αq ] CP (αq ). Thus
[P, αq ] = [[P, αq ] CP (αq ), αq ] = [P, αq , αq ]. If k is a generator of [P, αq , αq ], then k =
[t, αq ] ∈ Z(P ) with t ∈ [P, αq ], so [P, αq ] = [P, αq , αq ] 6 Z(P ). Since this is valid for each
11
prime divisor q of the order of H ∩ A = hαi, we get:
[P, H ∩ A] = [P, hαq1 i × · · · × hαqt i] = [P, αq1 ] · · · [P, αqt ] 6 Z(P ).
Analogously, if H ∩ B 6= 1, then [P, H ∩ B] ≤ Z(P ). Since G′ = P ′ [P, H] = P ′ [P, H ∩
A][P, H ∩ B], we get G′ ≤ Z(P ). This final contradiction establishes statement (1).
(2) Suppose that the second assertion is not true and let G be a counterexample of
minimal order. We point out that the hypotheses are inherited by every quotient group
of G and, by (1), G′ is abelian. There exists a prime divisor p of |G′ | such that G′ does
not have any elementary abelian Sylow p-subgroup. By the minimality of G, we may
consider that Op′ (G) = 1. Moreover, since G is supersoluble, then G/ F(G) is abelian,
and F(G) = Op (G) = P is a normal Sylow p-subgroup of G such that G′ 6 P . Using
Lemma 2.2 and Theorem A, we obtain respectively that P = (P ∩ A)(P ∩ B), and that
P ′ is elementary abelian with P ′ 6 Φ(P ) 6 Z(P ).
Let GN be the nilpotent residual of G. Note that GN 6= 1; in other case, G is a p-group
and then G′ = P ′ , a contradiction. Since GN 6 G′ , it follows that GN is abelian. By
using [7, III - 4.6, IV - 5.18], we have that GN is complemented in G, and its complements
are precisely the Carter subgroups of G. Accordingly, G = GN H with H = NG (H) a
nilpotent subgroup of G and GN ∩ H = 1. These facts yield G′ = GN × (H ∩ G′ ), and
CGN (H) = 1. On the other hand, the minimality of G implies that G′ /GN ∼
= (H ∩ G′ ) is
N
N
N
elementary abelian, and thus G is not so. If CH (G ) 6= 1, since CH (G ) is normal in
G, by the minimality of G we have (G/ CH (GN ))′ is an elementary abelian group, but
(G/ CH (GN ))′ = G′ CH (GN )/ CH (GN ) = GN CH (GN )/ CH (GN ) ∼
= GN ,
which is a contradiction. Hence, CH (GN ) = 1. In particular, we deduce that Z(G) = 1.
By Lemma 2.2, there exists a Hall p′ -subgroup H0 of G such that H0 = (H0 ∩
A)(H0 ∩ B). Let x ∈ H0 ∩ A be a non-trivial element of prime power order. Since
H0 6 CG (x), it follows that xG ≤ p, and so Φ(G) 6 CG (x). Thus Φ(G) 6 CG (H0 ∩ A),
and analogously for H0 ∩ B. Consequently, we get P ′ 6 Φ(P ) 6 Φ(G) 6 CG (H0 ). Since
P ′ 6 Φ(P ) 6 Z(P ) and G = P H0 , it follows P ′ 6 Φ(P ) 6 Z(G) = 1, which implies that
P is elementary abelian, the final contradiction.
(3) Assume that the result is false and take G a counterexample of minimal order. Consider a prime p such that | F(G)′ |p > p2 . By minimality, we can affirm that
Op′ (F(G)) = 1. Since G is supersoluble, we get that F(G) = Op (G) = P is a normal
Sylow p-subgroup of G. Then, we apply both Lemma 2.2 and Theorem A to get the
final contradiction.
Example 4.1. Let G = A × B be the direct product of two symmetric groups of degree
3. Then G is supersoluble, and every element contained in each factor (not only those of
prime power order) has square-free conjugacy class size, but neither the derived subgroup
G′ nor G/ F(G) are cyclic, in contrast to [6, Theorem 2].
Example 4.2. In view of [6, Theorem 2], it is natural to wonder if we can affirm in the
above result that the Sylow p-subgroups of G′ have order at most p2 . This fact is not
further true, as we show:
12
Let G = A×B, where A = D14 is a dihedral group of order 14, and B = D14 ×[C7 ]C3
is the direct product of such a dihedral group and a semidirect product of a cyclic group
of order 7 and a cyclic group of order 3 (B has identification number 294#9 in the Small
groups library of GAP). Then G is supersoluble, and satisfies that all prime power order
elements contained in each factor have square-free conjugacy class size, but G′ has order
73 .
Now we proceed with the proof of Theorem E.
Proof of Theorem E. Considering the smallest prime divisor of |G| and Theorem
B, we conclude that G is soluble. Hence, it is p-soluble for each prime divisor p of |G|.
Applying Theorem C, we get that G is p-supersoluble for each prime that divides |G|,
so it is supersoluble.
Now we prove the second assertion by induction on |G|. Let p be an arbitrary prime,
and P be a Sylow p-subgroup of G. We want to show that P F(G)/ F(G) ∼
= P/ Op (G) is
elementary abelian. Since G is supersoluble, we have that G/ F(G) is abelian. Moreover,
we may assume by induction that Op (G) = 1. Therefore, we have that F(G) 6 H 6 G,
where H is a Hall p′ -subgroup of G. Consequently, H is normal in G and G is p-nilpotent.
Finally, by Theorem 3.4 the result is established.
When considering in the above theorem all p-regular elements in the factors, we get
as a corollary:
Corollary 4.3. ([2, Corollary 1.5]) Let the group G = AB be the mutually permutable
product of the subgroups A and B. Suppose that for every prime p and every p-regular
element x ∈ A ∪ B, xG is not divisible by p2 . Then G is supersoluble.
Example 4.4. Consider G = A × B, where A = Sym(3) is a symmetric group of degree
3, and B = Sym(3) × D10 is the direct product of such a symmetric group and a dihedral
group of order 10. Then G satisfies the hypotheses of Theorem E. However there exists
some 2-regular element in B, not of prime power order, such that 4 divides its conjugacy
class size, so Corollary 4.3 cannot be applied.
In the particular case when A and B are normal in G, we obtain [13, Proposition 9].
Corollary 4.5. Let A and B be normal subgroups of G such that G = AB. Suppose
that xG is square-free for every element x of prime power order of A ∪ B. Then G is
supersoluble.
This development has its origins in the contributions of Chillag and Herzog [5, Theorem 1], and Cossey and Wang [6, Theorem 2]. Our next result Theorem F and Theorem
D can be considered somehow extensions of the ones above for (mutually permutable)
products. In fact, Theorem F provides further information on the Sylow subgroups of
G/ F(G).
Proof of Theorem F. Suppose the result is not true and let G be a counterexample of least order possible. Then if P is a Sylow p-subgroup of G, we have |P/ Op (G)| ≥
13
p3 . We can assume by the minimality of G that Op (G) = 1 = Φ(G) = Z(G), so
|P | ≥ p3 . By Lemma 2.2 we can choose P = (P ∩ A)(P ∩ B), with P ∩ A and P ∩ B
Sylow p-subgroups of A and B respectively. By Theorem E, we have that G is supersoluble and G/ F(G) has elementary abelian Sylow subgroups. In particular, P F(G)
is normal in G. Hence Lemma 2.3 (b) asserts that L = (P F(G) ∩ A)(P F(G) ∩ B) is
normal in G, and it is a mutually permutable product. Moreover, P = (P ∩ A)(P ∩ B) 6
(P F(G)∩A)(P F(G)∩B) = L 6 P F(G). If we suppose L < G, by the minimality of G it
follows |P/ Op (L)| = |P | ≤ p2 , a contradiction. Thus, we may assume L = G = P F(G),
and so G is p-nilpotent.
Let N be a minimal normal subgroup of G. We can assume without loss of generality
that it is contained in A by Theorem 2.4. Note |N | = q 6= p. By Proposition 3.3 (1), it
follows |Op (G/N )| ≤ p, and by the minimality of G we have |(P N/N )/ Op (G/N )| ≤ p2 .
Since P ∼
= P N/N , we may assume |P | = p3 . As Φ(G) = 1, [[7], A - 10.6 Theorem]
leads to F(G) = Soc(G). If N is the unique minimal normal subgroup of G, then
P ∼
= NP (N )/ CP (N ) which is isomorphic to a subgroup of Aut(Cq ) ∼
= Cq−1 , so P is
cyclic and elementary abelian, which implies that its order is p, a contradiction.
Now we denote by T the product of all minimal normal subgroups of G distinct of N ,
so T 6= 1 and T ∩ N = 1. It follows F(G) = Soc(G) = N × T . We denote Q1 = Op (P N )
and Q2 = Op (P T ). Since P N ∼
= G/T (and P T ∼
= G/N ), by the minimality of G we
may affirm Q1 6= 1 6= Q2 . On the other hand, since [Op (P N ), N ] 6 Op (P N ) ∩ N = 1,
we have Q1 6 C1 = CP (N ) (analogously Q2 6 C2 = CP (T )). In addition, it follows
C1 ∩ C2 6 CP (F(G)) 6 CG (F(G)) 6 F(G), so C1 ∩ C2 = 1. Let P0 be a Sylow psubgroup of CG (N ) such that P0 6 P . Hence P0 = C1 = CP (N ). In addition, since
N = hxi where x is a q-element contained in A, by the hypotheses it follows that p2 does
not divide xG p = |G : CG (x)|p = |P : C1 |. Moreover, since |P | = |P : C1 | · |C1 | = p3 ,
we may assume |C1 | ≥ p2 , and since 1 6= Q2 6 C2 , we have |C2 | ≥ p. Accordingly
|C1 C2 | = |C1 | · |C2 | ≥ p3 , and since P is abelian, we have necessarily P = C1 × C2 . This
leads to
G = P F(G) = C1 C2 N T = (C1 T ) × (C2 N ).
Suppose T ∩ A 6= 1, and let 1 6= y ∈ T ∩ A 6 C1 T ∩ A. Let 1 6= x ∈ N 6 A.
Then since xy ∈ F(G) ∩ A and F(G) is abelian, we have that xy is a p-regular element,
so by the hypotheses p2 does not divide (xy)G . As G is a direct product, we have
(xy)G = xG y G . In addition, (N × C1 T ) 6 CG (x) 6 G, and therefore xG divides
|G : (C1 T × N )| = |C2 | which is a p-number, so xG = p (recall that Z(G) = 1), and
analogously y G = p, a contradiction. We conclude T ∩ A = 1.
If F(G) = K × M with M normal in G and K a minimal normal subgroup of G
contained in B, by similar arguments we can deduce M ∩ B = 1. This means, in
particular, that neither A nor B can contain two distinct minimal normal subgroups of
G.
On the other hand, since F(G) is the unique p′ -Hall subgroup of G, Lemma 2.2 leads
to F(G) = (F(G) ∩ A)(F(G) ∩ B). Moreover, since F(G) ∩ A = N T ∩ A = N (T ∩ A) = N ,
it follows F(G) = N (F(G) ∩ B). Note that (F(G) ∩ B) ∩ N 6 N with |N | = q so we
distinguish two cases: either (F(G)∩ B)∩ N = N or (F(G)∩ B)∩ N = 1. In the first case
14
F(G) = F(G) ∩ B 6 B. Thus there exists another minimal normal subgroup contained
in B and distinct of N , a contradiction. Hence we conclude (F(G) ∩ B) ∩ N = 1 so
F(G) = N × (F(G) ∩ B).
Now suppose that F(G) is a q-group. Then, since F(G) = Soc(G), it follows that
F(G) is q-elementary abelian. In addition, P ∩ A acts faithfully over F(G). Let 1 6= x ∈
P ∩ A 6 A, then F(G) = [F(G), x] × CF(G) (x), with CF(G) (x) < F(G) since Z(G) = 1
and P is abelian. By the hypotheses, q 2 does not divide xG , and therefore it does not
divide F(G) : CF(G) (x) . Thus we may affirm |[F(G), x]| = q. By Lemma 2.5 we conclude
that P ∩ A is cyclic, and analogously P ∩ B is cyclic too. So they are both cyclic and
elementary abelian, that is, they both have order p. Thus |P | = |(P ∩ A)(P ∩ B)| ≤ p2 ,
a contradiction.
Hence we may suppose that there exists a prime r 6= q such that r divides |F(G)|.
Let 1 6= R be a Sylow r-subgroup of F(G) ∩ B (so it is a Sylow r-subgroup of F(G)).
Then 1 6= R = Or (G) 6 B, and since F(G) = Soc(G), necessarily we have that Or (G) is
the product of the minimal normal subgroups of G with order r. Let M 6 B be one of
those minimal normal subgroups. Arguing exactly in the same way as with N , it follows
F(G) = M ×(A∩F(G)). But A∩F(G) = N so F(G) = N ×M with both minimal normal
subgroups of G, N 6 A and M 6 B. Let P1 be a Sylow p-subgroup of CG (N ) = CG (x)
such that P1 6 P . Then by the hypotheses we have xG p = |P : P1 | ≤ p. Since |P | = p3 ,
it follows |P1 | ≥ p2 . However, P1 is normal in P N so P1 6 Op (P N ) ∼
= Op (G/M ), and
by Proposition 3.3 (1) we have |Op (G/M )| ≤ p. This final contradiction establishes the
theorem.
Example 4.6. Under the hypotheses of Theorem E (even under those of Theorem D),
it is not possible to assure that G/ F(G) has Sylow p-subgroups of order at most p2 , as
the following example shows:
Let {p1 , p2 , . . . , pn } be a finite set of pairwise distinct odd primes, and let G = D2p1 ×
D2p2 × · · · × D2pn be the direct product of dihedral groups of order 2pi , 1 ≤ i ≤ n. Then
G = A×B is a mutually permutable product of A = D2p1 and B = D2p2 ×· · ·×D2pn , and
each prime power order element contained in the direct factors has square-free conjugacy
class size. However, G/ F(G) has order 2n .
References
[1] B. Amberg, S. Franciosi and F. de Giovanni:
University Press, New York, 1992.
Products of groups. Oxford
[2] A. Ballester-Bolinches, J. Cossey and Y. Li: Mutually permutable products
and conjugacy classes. Monatsh. Math. 170 (2012) 305–310.
[3] A. Ballester-Bolinches, R. Esteban-Romero and M. Asaad: Products of
finite groups. Vol. 53 of de Gruyter Expositions in Mathematics, Berlin, 2010.
[4] J. C. Beidleman and H. Heineken: Group classes and mutually permutable
products. J. Algebra 297 (2006) 409–416.
15
[5] D. Chillag and M. Herzog: On the length of the conjugacy classes of finite
groups. J. Algebra 131 (1990) 110–125.
[6] J. Cossey and Y. Wang: Remarks on the length of conjugacy classes of finite
groups. Commun. Algebra 27 (1999) 4347–4353.
[7] K. Doerk and T. Hawkes: Finite Soluble Groups. Vol. 4 of de Gruyter Expositions in Mathematics, Berlin, 1992.
[8] The GAP Group:
GAP – Groups, Algorithms, and Programming.
http://www.gap-system.org, Version 4.7.7, 2015.
[9] B. Huppert: Endliche Gruppen I. Springer-Verlag, Berlin, 1967.
[10] I. M. Isaacs: Finite Group Theory. American Mathematical Society, USA, 2008.
[11] H. G. Knoche: Über den Frobeniusschen Klassenbegriff in nilpotenten Gruppen.
Math. Z. 55 (1951) 71–83.
[12] S. Li: On the class length of elements of prime power order in finite groups.
Guangxi Sci. 6(1) (1999) 12–13.
[13] X. Liu, Y. Wang and H. Wei: Notes on the length of conjugacy classes of finite
groups. J. Pure Appl. Algebra 196 (2005) 111–117.
[14] G. Qian and Y. Wang: On conjugacy class sizes and character degrees of finite
groups. J. Algebra Appl. 13 (2014) 1350100-1–9.
16
| 4 |
A deep learning model integrating FCNNs and CRFs for brain tumor segmentation
Xiaomei Zhao1,2, Yihong Wu1, Guidong Song3, Zhenye Li4, Yazhuo Zhang,3,4,5,6 , and Yong Fan7
National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences
1
2
3
4
Beijing Neurosurgical Institute, Capital Medical University, Beijing, China
Department of Neurosurgery, Beijing Tiantan Hospital, Capital Medical University, Beijing, China
5
6
7
University of Chinese Academy of Sciences, Beijing, China
Beijing Institute for Brain Disorders Brain Tumor Center, Beijing, China
China National Clinical Research Center for Neurological Diseases, Beijing, China
Department of Radiology, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA
*Correspondence to:
Dr. Yihong Wu
National Laboratory of Pattern Recognition
Institute of Automation
Chinese Academy of Sciences
Beijing, 100190, China
Email: [email protected]
Or
Dr. Yong Fan
Department of Radiology
Perelman School of Medicine
University of Pennsylvania
Philadelphia, PA 19104, USA
Email: [email protected]; [email protected]
Tel: +1 215-746-4065
1
1
This article was accepted in the journal Medical Image Analysis.
Please cite this article as: X. Zhao et al., A deep learning model integrating FCNNs and CRFs for brain tumor segmentation,
Medical Image Analysis, Volume 43, January 2018, Pages 98-111.
http://doi.org/10.1016/j.media.2017.10.002
1
ABSTRACT
Accurate and reliable brain tumor segmentation is a critical component in cancer diagnosis, treatment planning,
and treatment outcome evaluation. Build upon successful deep learning techniques, a novel brain tumor
segmentation method is developed by integrating fully convolutional neural networks (FCNNs) and Conditional
Random Fields (CRFs) in a unified framework to obtain segmentation results with appearance and spatial
consistency. We train a deep learning based segmentation model using 2D image patches and image slices in
following steps: 1) training FCNNs using image patches; 2) training CRFs as Recurrent Neural Networks
(CRF-RNN) using image slices with parameters of FCNNs fixed; and 3) fine-tuning the FCNNs and the
CRF-RNN using image slices. Particularly, we train 3 segmentation models using 2D image patches and slices
obtained in axial, coronal and sagittal views respectively, and combine them to segment brain tumors using a
voting based fusion strategy. Our method could segment brain images slice-by-slice, much faster than those based
on image patches. We have evaluated our method based on imaging data provided by the Multimodal Brain
Tumor Image Segmentation Challenge (BRATS) 2013, BRATS 2015 and BRATS 2016. The experimental results
have demonstrated that our method could build a segmentation model with Flair, T1c, and T2 scans and achieve
competitive performance as those built with Flair, T1, T1c, and T2 scans.
Index Terms— Brain Tumor Segmentation, Fully Convolutional Neural Networks, Conditional Random Fields,
Deep learning
1. Introduction
Accurate brain tumor segmentation is of great importance in cancer diagnosis, treatment planning, and treatment
outcome evaluation. Since manual segmentation of brain tumors is laborious [1], an enormous effort has devoted
to the development of semi-automatic or automatic brain tumor segmentation methods. Most of the existing brain
tumor segmentation studies are focusing on gliomas that are the most common brain tumors in adults and can be
measured by Magnetic Resonance Imaging (MRI) with multiple sequences, such as T2-weighted fluid attenuated
inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c), and T2-weighted (T2). The
segmentation of gliomas based on MRI data is challenging for following reasons: 1) gliomas may have the same
appearance as gliosis and stroke in MRI data [2]; 2) gliomas may appear in any position of the brain with varied
shape, appearance and size; 3) gliomas invade the surrounding brain tissues rather than displacing them, causing
fuzzy boundaries [2]; and 4) intensity inhomogeneity of MRI data further increases the difficulty.
The existing automatic and semi-automatic brain tumor segmentation methods can be broadly categorized as
either generative model based or discriminative model based methods [3]. The generative model based brain
tumor segmentation methods typically require prior information, which could be gained through probabilistic
image atlases [4-6]. Based on probabilistic image atlases, the brain tumor segmentation problem can be modeled
2
as an outlier detection problem [7].
On the other hand, the discriminative model based methods solve the tumor segmentation problem in a
pattern classification setting, i.e., classifying image voxels as tumor or normal tissues based on image features.
The performance of discriminative model based segmentation methods are hinged on the image features and
classification algorithms. A variety of image features have been adopted in tumor segmentation studies, including
local histograms [8], image textures [9], structure tensor eigenvalues [10], and so on. The most commonly
adopted pattern classification algorithms in brain tumor segmentation studies are support vector machines (SVMs)
[11-13] and random forests [8-10, 14].
More recently, deep learning techniques have been adopted in brain tumor segmentation studies following
their success in general image analysis fields, such as images classification [15], objects detection[16], and
semantic segmentation [17-19]. Particularly, Convolutional Neural Networks (CNNs) were adopted for brain
tumor image segmentation in the Multimodal Brain Tumor Image Segmentation Challenge (BRATS) 2014
[20-22]. More deep learning based brain tumor segmentation methods were presented in the BRATS 2015 and
different deep learning models were adopted, including CNNs [23-25], convolutional restricted Boltzman
machines [26], and Stacked Denoising Autoencoders [27].
Among the deep learning based tumor segmentation methods, the methods built upon CNNs have achieved
better performance. Particularly, both 3D-CNNs [22, 28, 29] and 2D-CNNs [20, 21, 23-25, 30, 31] models were
adopted to build tumor segmentation methods. Although 3D-CNNs can potentially take full advantage of 3D
information of the MRI data, the network size and computational cost are increased too. Therefore, 2D-CNNs
have been widely adopted in the brain tumor segmentation methods. Davy et al. proposed a deep learning method
with two pathways of CNNs, including a convolutional pathway and a fully-connected pathway [21]. Dvorak et al.
modeled the multi-class brain tumor segmentation task as 3 binary segmentation sub-tasks and each sub-task was
solved using CNNs [23]. Very deep CNNs [32] were adopted to segment tumors by Pereira et al. [25]. Most of
these brain tumor segmentation methods train CNNs using image patches, i.e., local regions in MR images. These
methods classify each image patch into different classes, such as healthy tissue, necrosis, edema, non-enhancing
core, and enhancing core. The classification result of each image patch is used to label its center voxel for
achieving the tumor segmentation. Most of the above CNN brain tumor segmentation methods assumed that each
voxel’s label is independent, and they didn’t take the appearance and spatial consistency into consideration. To
take the local dependencies of labels into account, Havaei et al. constructed a cascaded architecture by taking the
pixel-wise probability segmentation results obtained by CNNs trained at early stages as additional input to their
following CNNs [24, 30]. To take into consideration appearance and spatial consistency of the segmentation
results, Markov Random Fields (MRFs), particularly Conditional Random Fields (CRFs), have been integrated
with deep learning techniques in image segmentation studies, either used as a post-process step of CNNs [28, 33]
or formulated as neural networks [18, 19]. In the latter setting, both CNNs and MRFs/CRFs can be trained with
3
back-propagation algorithms, tending to achieve better segmentation performance.
Multiple 2D CNNs could be integrated for segmenting 3D medical images. In particular, Prasoon et al.
proposed a triplanar CNN [34] for knee cartilage segmentation. The triplanar network used 3 CNNs to deal with
patches extracted from xy, yz and zx planes and fused them using a softmax classifier layer. Fritscher et al.
proposed a pseudo 3D patch-based approach [35], consisting of 3 convolutional pathways for image patches in
axial, coronal, and sagittal views respectively and fully connected layers for merging them. Setio et al. used
multi-view convolutional networks for pulmonary nodule detection [36]. Their proposed network architecture
composed multiple streams of 2D CNNs, each of which was used to deal with patches extracted in a specific
angle of the nodule candidates. The outputs of the multiple streams of 2D CNNs were finally combined to detect
pulmonary nodules. However, all these methods built CNNs upon image patches, not readily extendable for
building FCNNs.
Preprocessing of MRI data plays an important role in the discriminative model based tumor segmentation
methods that assume different MRI scans of the same modality have comparable image intensity information. The
intensities of different MRI scans can be normalized by subtracting their specific mean values and dividing by
their specific standard deviation values or by matching histograms [10, 22]. However, the mean values of
intensities of different MRI scans do not necessarily correspond to the same brain tissue, and the histogram
matching might not work well for tumor segmentation studies [8]. A robust intensity normalization has been
adopted in tumor segmentation studies by subtracting the gray-value of the highest histogram bin and normalizing
the standard deviation to be 1 [8].
Inspired by the success of deep learning techniques in medical image segmentation, we propose a new brain
tumor segmentation method by integrating Fully Convolutional Neural Networks (FCNNs) and CRFs in a unified
framework. Particularly, we formulate the CRFs as Recurrent Neural Networks [18], referred to as CRF-RNN.
The integrative model of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using image patches; 2)
training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the whole network
using image slices. To make use of 3D information provided by 3D medical images, we train 3 segmentation
models using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine
them to segment brain tumors using a voting based fusion strategy. The proposed method is able to segment brain
images slice-by-slice, which is much faster than the image patch based segmentation methods. Our method could
achieve competitive segmentation performance based on 3 MR imaging modalities (Flair, T1c, T2), rather than 4
modalities (Flair, T1, T1c, T2) [3, 8-10, 14, 20-31], which could help reduce the cost of data acquisition and
storage. We have evaluated our method based on imaging data provided by the Multimodal Brain Tumor Image
Segmentation Challenge (BRATS) 2013, the BRATS 2015, and the BRATS 2016. The experimental results have
demonstrated that our method could achieve promising brain tumor segmentation performance. Preliminary
results have been reported in a conference proceeding paper of the BRATS 2016 [37].
4
2. Methods and materials
2.1 Imaging data
All the imaging data used in this study were obtained from the BRATS 20132, the BRATS 20153 and the BRATS
20164. The BRATS 2013 provided clinical imaging data of 65 glioma patients, including 14 patients with
low-grade gliomas (LGG) and 51 patients with high-grade gliomas (HGG). The patients were scanned with MRI
scanners from different vendors at 4 different centers, including Bern University, Debrecen University, Heidelberg
University, and Massachusetts General Hospital. Each patient had multi-parametric MRI scans, including
T2-weighted fluid attenuated inversion recovery (Flair), T1-weighted (T1), T1-weighted contrast-enhanced (T1c),
and T2-weighted (T2). All the MRI scans of the same patient were rigidly co-registered to their T1c scan and
resampled at 1 mm isotropic resolution in a standardized axial orientation with a linear interpolator [3]. All
images were skull stripped. Ground truths were produced by manual annotations. The cases were split into
training and testing sets. The training set consists of 20 HGG and 10 LGG cases. The testing set consists of
Challenge and Leaderboard subsets. The Challenge dataset has 10 HGG cases and the Leaderboard dataset
contains 21 HGG and 4 LGG.
The imaging dataset provided by BRATS 2015 contains imaging data obtained from the BRATS 2012, 2013,
and the NIH Cancer Imaging Archive (TCIA). Each case has Flair, T1, T1c, and T2 scans aligned onto the same
anatomical template space and interpolated at 1 mm3 voxel resolution. The testing dataset consists of 110 cases
with unknown grades, and the training dataset consists of 220 HGG and 54 LGG cases. In the testing dataset, the
ground truth of each case was produced by manual annotation. In the training dataset, all the cases from the
BRATS 2012 and 2013 were labeled manually, and the cases from the TCIA were annotated by fusing
segmentation results obtained using top-ranked methods of the BRATS 2012 and 2013. The annotations were
inspected visually and approved by experienced raters. The tumor labels of the training cases are provided along
with their imaging scans, while only imaging data are provided for the testing cases for blind evaluation of the
segmentation results.
BRATS 2016 shares the same training dataset with BRATS 2015, which consists of 220 HGG and 54 LGG.
Its testing dataset consists of 191 cases with unknown grades. The ground truth of each testing case was produced
by manual annotation, not released to the competition participants.
2.2 Brain tumor segmentation methods based on FCNNs trained using image patches
Deep learning techniques, particularly CNNs, have been successfully adopted in image segmentation studies. A
deep learning model of CNNs usually has millions or even billions of parameters. To train the deep CNNs with
sufficient training samples, image patch-based techniques are adopted [20-25, 28, 30, 31, 38-40]. With the image
2
3
4
https://www.virtualskeleton.ch/BRATS/Start2013
https://www.virtualskeleton.ch/BRATS/Start2015
https://www.virtualskeleton.ch/BRATS/Start2016
5
patch based representation, the image segmentation problem can be solved as a classification problem of image
patches.
An image patch is a local region extracted from an image to characterize its central pixel/voxel in 2D/3D,
and has the same label as its center pixel/voxel’s label in the classification problem. In the training phase, a large
number of image patches can be extracted to train the CNNs. In the testing phase, image patches extracted from a
testing image are classified one by one by the trained CNNs. Then, the classification results of all image patches
make up a segmentation result of the testing image. However, FCNNs can segment a testing image slice by slice
with improved computational efficiency [30], even though the model is trained using image patches. Since the
number and location of training image patches for each class can be easily controlled by changing the image patch
sampling scheme, image patch-based deep learning segmentation methods can avoid the training sample
imbalance problem. However, a limitation of image patch-based segmentation methods is that relationship among
image patches is typically lost. Integrating CRF-RNN with FCNNs tends to overcome such a limitation in tumor
segmentation.
2.3 The proposed brain tumor segmentation method
The proposed brain tumor segmentation method consists of 4 main steps: pre-processing, segmenting image slices
using deep learning models with integrated FCNNs and CRF-RNN from axial, coronal and sagittal views
respectively, fusing segmentation results obtained in the three different views, and post-processing.
2.3.1 Pre-processing of the imaging data
Since MRI scans typically have varied intensity ranges and are affected by bias fields differently, we adopted a
robust intensity normalization method to make MRI scans of different patients comparable, besides correcting the
bias field of MRI data using N4ITK [41]. Our normalization method is built upon the image mode based method
[8], which normalizes image intensity by subtracting the image mode (e.g. the gray-value of the highest histogram
bin) and normalizing the standard deviation to be 1. As almost half of the brain is the whiter matter [42], the
gray-value of the highest histogram bin typically corresponds to the gray-value of the white matter, and therefore
matching intensity values of the white matter across MRI scans and normalizing the intensity distributions
accordingly would largely make different MRI scans comparable. However, the standard deviation calculated
based on intensity mean value does not necessarily have a fixed tissue meaning. Therefore, in our study a robust
intensity deviation is adopted to replace the standard deviation used in [8]. The robust deviation is computed
based on the gray-value of the highest histogram bin, representing the discreteness of intensity to the gray-value
of white matter. Besides, the intensity mean is more sensitive to noise than the gray value of the highest histogram
bin. Thus the standard deviation calculated based on intensity mean is more sensitive to noise than the robust
deviation.
Given an MRI scan
with voxels { , ,⋯,
} , and each voxel
has intensity
,
V , ,⋯, , the
6
robust deviation
V
V
, where
denotes the gray-value of the highest histogram bin. Our
intensity normalization procedure is following:
Step 1. Transform the intensity range to 0-255 linearly.
Step 2. Calculate the intensity histogram, with 256 bins.
Step 3. Subtract the gray-value of the highest histogram bin
and divide the robust deviation .
Step 4. Multiply each voxel’s intensity by a constant σ and plus a constant
are below 0 or above 255 to 0 and 255 respectively. In the present study, we set
. Then, set the intensities that
and
equal to the gray-value
of the highest histogram bin and robust deviation of NO. 0001 HGG clinical training image data of BRATS 2013,
which has been pre-processed by N4ITK and the step 1. For the Flair, T1c, and T2 scans, =30, 31, 37 and
=75,
99, 55 respectively.
The image intensity normalization effect is illustrated with T2 scans in Fig. 1. Particularly, we randomly
selected 3 subjects from the BRATS 2013 and 3 subjects from the BRATS 2015. The results shown in Fig. 1
clearly demonstrated that the image intention normalization could improve comparability of different scans. The
improvement is further confirmed by image intensity histograms of 30 subjects from the BRATS 2013 training
dataset, as shown in Fig.2.
Fig.1. T2 scans before (top row) and after (bottom row) the proposed intensity normalization. (a-1)-(a-3) and (b-1)-(b-3) are
randomly selected subjects from the BRATS 2013, and (a-4)-(a-6) and (b-4)-(b-6) are randomly selected subjects from the
BRATS 2015. (a-1)-(a-6): before normalization; (b-1)-(b-6): after normalization. All the scans were preprocessed by N4ITK
and the proposed normalization step 1.
Fig.2. Image intensity histograms of T2 scans of 30 subjects from the BRATS 2013 training dataset before (left) and after
(right) the intensity normalization. All the scans were preprocessed by N4ITK and the proposed normalization step 1.
2.3.2 A deep learning model integrating FCNNs and CRFs
The proposed deep learning model for brain tumor segmentation integrates Fully Convolutional Neural Networks
7
(FCNNs) and Conditional Random Fields (CRFs), as illustrated by Fig. 3. We formulated CRFs as Recurrent
Neural Networks (RNNs), referred to as CRF-RNN [18]. The proposed method could segment brain images slice
by slice.
Fig.3. Flowchart of the proposed deep learning model integrating FCNNs and CRFs for brain tumor segmentation.
(1) FCNNs
The structure of our proposed FCNNs is illustrated by Fig. 4. Similar to the network architectures proposed in [28,
30], the inputs to our network are also in 2 different sizes. Passing through a series of convolutional and pooling
layers, the larger inputs turn into feature maps with the same size of smaller inputs. These feature maps and
smaller inputs are sent into following networks together. In this way, both local image information and context
information in a larger scale can be taken into consideration for classifying image patches. Different from the
cascaded architecture proposed in [30], the two branches in our FCNNs are trained simultaneously, rather than
trained in different steps. Furthermore, our model has more convolutional layers.
Our deep FCNNs are trained using image patches, which are extracted from slices of the axial view, coronal
view or sagittal views randomly. Equal numbers of training samples for different classes are extracted to avoid
data imbalance problem. There are 5 classes in total, including healthy tissue, necrosis, edema, non-enhancing
core, and enhancing core.
As shown in Fig. 4, in our deep FCNNs, the kernel size of each max pooling layer is set to
, and the
size of image patches used to train FCNNs is proportional to the kernel size. Different settings of the kernel size
or equivalently the image patch size may affect the tumor segmentation performance. The max pooling layers of
our FCNNs are used to capture image information in large scales with a relatively small number of network
parameters. We set the stride of each layer to be 1. Therefore, in the testing stage, our model can segment brain
images slice by slice.
8
Fig.4. The network structure of our deep FCNNs.
(2) CRF-RNN
CRF-RNN formulates 2D fully connected Conditional Random Fields as Recurrent Neural Networks [18]. Given
a 2D image
, comprising a set of pixels {
V ,…,u} , the image segmentation problem is solved as an
optimization problem using fully connected CRFs by minimizing an energy function [43] :
u
V
V
where
,h,
is a certain label assignment to , ,h
denotes the assignment of label
to pixel
h,
measures the cost of assigning label
assigning label
and
jointly to
and
to pixel
V
,h,
h
denotes the probability of assigning label
Differentiating Eqn. (2) with respect to
,
h
(1)
denotes the assignment of label
to pixel
, and the pairwise term
to [19], minimizing
to pixel
h,h
h
measures the cost of
,
h
where
V
V th
V
is the number of Gaussian kernel;
coordinates of
h
and
(
and
h,
,
h
,
h
,
,
V
(3)
},
h
h
,
and
h
h
is defined
,
is a Gaussian kernel,
denote the intensity of
and
(2)
, which is the variable that we aim to estimate.
as
h
h
equals to minimizing an energy
,
h
,
can be obtained from the FCNNs, and the pairwise potential
,
,
and setting the differentiation result equal to 0, we have
th {
The unary term
,
V { , ,⋯, } are segmentation labels, the unary term
,
h . According
function:
where
{ ,…,u},
h
(4)
V exp
respectively,
are parameters of the Gaussian kernels);
h
and
h
h
and
denote spatial
is a weight for the
9
Gaussian kernel
intensity ( ,
h)
;
and
denote image feature vectors of
h
and spatial position information ( ,
h );
Substituting (4) into (3), we get:
,
,
th {
V
and
indicates the compatibility of labels
,
h
Fully connected CRF predicts the probability of assigning label
respectively, encoding their
h
to pixel
h
and .
(5)
}.
h
according to Eqn. (5), and
can
be calculated using a mean field iteration algorithm formulated as Recurrent Neural Networks so that CNNs and
the fully connected CRF are integrated as one deep network and can be trained using a back-propagation
algorithm [18]. Fig. 5 shows the network structure of CRF-RNN. G and G in Fig. 5 are two gating functions:
V
where
output
V{
, ,…,u ,
of one mean-field iteration;
output of FCNNs, and
and
t
th
th
Vt
V t
t
V
,
t
,
,
V
denotes the input
},
h
t
,
t , V
,
,
h
provided by Flair, T1c and T2 slices with
t
denotes the final prediction results of CRF-RNN.
denotes the
that after softmax operation. represents the
V t,
V t while
t
denotes the
denotes the
mean-field iteration,
is the output of FCNNs,
are computed based on pixel features
V h ,
(6)
(7)
of one mean-field iteration;
is the total number of mean-field iterations. In our study, the unary term
and the pairwise potential
,
and
and
h
with information
are learned in the training
phase [18]. By integrating FCNNs and CRF-RNN in one deep network, we are able to train the network
end-to-end with a typical back-propagation algorithm [18].
Fig.5. The network structure of CRF-RNN.
(3) The integration of FCNNs and CRF-RNN
The proposed brain tumor segmentation network consists of FCNNs and CRF-RNN. The FCNNs predict the
10
probability of assigning segmentation labels to each pixel, and the CRF-RNN takes the prediction results and
image information as its input to globally optimize appearance and spatial consistency of the segmentation results
according to each pixel’s intensity and position information.
The proposed deep learning network of FCNNs and CRF-RNN is trained in 3 steps: 1) training FCNNs using
image patches; 2) training CRF-RNN using image slices with parameters of FCNNs fixed; and 3) fine-tuning the
whole network using image slices.
Once the fine-tune of deep learning based segmentation model is done, the model can be applied to image
slices one by one for segmenting tumors. Given an
t image slice with 3 channels, i.e., pre-processed Flair,
T1c, and T2 scans respectively, we first pad the image slice with zeros to create 2 larger images with sizes of
t
t
t
t and
tG
h
t
tG
h
t
respectively. Using these 2 larger
images as inputs of the FCNNs, we obtain 5 label predication images
, , ,
,h
,
V , ,t,G,橔,
V {h ,h
, , ,th}, with the same size of the original image slices. h ,h represents one pixel’s predicted
probability of brain tissue labels, such as healthy tissue, necrosis, edema, non-enhancing core or enhancing core.
Then, these label predication images
V{
V , ,t,G,橔} along with the image slice V {
h,
h,
} are
used as inputs to the CRF-RNN. Finally, the CRF-RNN obtains a globally optimized segmentation result of the
original image slice. Fig. 3 shows the flowchart of the proposed deep learning model integrating FCNNs and
CRF-RNN for brain tumor segmentation.
In the training steps 2 and 3, we first calculate softmax loss according to the current segmentation results and
the ground truth, and then the loss information is back-propagated to adjust network parameters of the integrated
FCNNs and CRF-RNN. In the training step 2, we fix FCNNs and adjust the parameters in CRF-RNN. In the
training step 3, we set a small learning rate and fine-tune the parameters of the whole network. In our experiments,
the initial learning rate was set to
橔
and the learning rate was divided by 10 after each 20 epoches in the
training step 1, and the learning rate was set to
㌳
and
respectively in the training steps 2 and 3.
2.3.3 Fusing segmentation results obtained in axial, coronal and sagittal views
We train 3 segmentation models using patches and slices of axial, coronal and sagittal views respectively. During
testing, we use these 3 models to segment brain images slice by slice in 3 different views, yielding 3 segmentation
results. A majority voting strategy is adopted to fuse the segmentation results. Let h , hh , and h
denote the
segmentation results of one voxel gotten in axial, coronal and sagittal views respectively, let h denote the
segmentation result after fusion, let
, , ,t,G denote a voxel labeled as healthy tissue, necrosis, edema,
non-enhancing core, and enhancing core respectively, the fused segmentation result is obtained by following
voting procedure:
Step 1. If two or more than two of h , hh, and h are above 0, let h V .
Step 2. If two or more than two of h , hh, and h equal to 1, let h V .
11
Step 3. If two or more than two of h , hh, and h equal to 3, let h V t.
Step 4. If two or more than two of h , hh, and h equal to 4, let h V G.
2.3.4 Post-processing
To further improve the brain tumor segmentation performance, a post-processing method is proposed. Hereinafter,
h,
h,
denote pre-processed Flair, T1c, T2 MR images respectively,
result obtained by our integrated deep learning model,
denote the value of voxel t, ,
the voxel
h
h,
h,
, and
,
t, ,
h
respectively,
t, ,
,
t, ,
, and
t, ,
V , , ,t,G indicates that
t, ,
is labeled as healthy tissue, necrosis, edema, non-enhancing core, and enhancing core
t, ,
respectively, u
in
in
h
denotes the segmentation
h
and
and u
denote the average intensity of the whole tumor region indicated by
scans. For a segmentation result
t
denote the average intensity of the
with
3D connected tumor regions,
3D connected tumor area in
h
The post-processing method consists of following step:
Step 1. If
and
h
t
to be 0 so that the
t
, set all voxels in the
3D connected tumor region is removed from
and
h
and
respectively.
3D connected tumor area in
, taking into consideration that
isolated local areas with super high intensities are usually caused by imaging noise rather than tumors. In the
present study,
V 橔 .
V
Step 2. If a voxel t, ,
①
set
t, ,
h
t, ,
V .
satisfies the following conditions at the same time:
h ,②
u
h
, ③
t, ,
t, ,
, ④
u
t
t, ,
G,
In general, tumor tissues have high signal in at least one modality of Flair, T1c, and T2. Voxels with low
signal in Flair, T1c, and T2 at the same time are generally not tumor tissues. Thus, this step removes those
segmented tumor regions whose intensities in Flair, T1c, T2 are below 3 thresholds respectively. However,
enhancing core is an exception. In the present study,
Step 3. Let t
denote the volume of the
V h㌳,
t
volume of the maximum 3D connected tumor area in
connected segmented tumor region in
Step 5. If
h
t, ,
G
. In the present study,
and
t, ,
橔,
t
V h .
3D connected tumor area in
. If t
Step 4. Fill the holes in Re s with necrosis. Holes in
V
t
V h .
t
.
t
t
t
, remove the
t
is the
t
3D
are very likely to be necrosis.
V G , set
t, ,
V
. Our model may mistakenly label
necrosis areas as enhancing core. This step corrects this potential mistake through a threshold in T1c. In the
present study,
Step 6. Let
G
V
t
the whole tumor. If
.
denote the volume of enhancing core represented in
t
t
h
,
h
t, ,
h
, and
t, ,
, and
V , set
t
denote the volume of
t, ,
V t . Our tumor
segmentation model is not sensitive to non-enhancing core. In our model, non-enhancing regions might be
12
mistakenly labeled as edema, especially when the enhancing core region is very small. In the present study,
h 橔,
h
V ㌳橔.
h
V
The parameters were set based on the BRATS 2013 dataset. Since the number of training cases of the
BRATS 2013 is small, we did not cross-validate the parameters, therefore they are not necessarily optimal. We
used the same parameters in all of our experiments, including our experiments on BRATS 2013, 2015 and 2016.
In addition to the aforementioned post-processing steps, we could also directly use CRF as a post-processing step
of FCNNs as did in a recent study [28].
3. Experiments
Our experiments were carried out based on imaging data provided by the BRATS 2013, 2015 and 2016 on a
computing server with multiple Tesla K80 GPUs and Intel E5-2620 CPUs. However, only one GPU and one CPU
were useable at the same time for our experiments. Our deep learning models were built upon Caffe [44].
Based on the BRATS 2013 data, a series of experiments were carried out to evaluate how different
implementation of the proposed method affect tumor segmentation results with respect to CRF, post-processing,
image patch size, number of training image patches, pre-processing, and imaging scans used. We also present
segmentation results obtained for the BRATS 2013. The segmentation model was built upon the training data and
then evaluated based on the testing data. Since no ground truth segmentation result for the testing data was
provided, all the segmentation results were evaluated by the BRATS evaluation website. The tumor segmentation
performance was evaluated using the BRATS segmentation evaluation metrics for complete tumor, core region,
and enhancing region, including Dice, Positive Predictive Value (PPV), and Sensitivity. Particularly, the complete
tumor includes necrosis, edema, non-enhancing core, and enhancing core; the core region includes necrosis,
non-enhancing core, and enhancing core; and the enhancing region only includes the enhancing core. The tumor
segmentation evaluation metrics are defined as follows:
where
h
V
,
indicates complete, core or enhancing region,
segmented region,
and
,
,
V
,
,
V
,
denotes the manually labeled region,
denotes the overlap area between
and
, and
and
denotes the
denote the areas of
respectively.
3.1. Experiments on BRATS 2013 dataset
The BRATS 2013 training dataset contains 10 LGG and 20 HGG. Its testing dataset consists of two subsets,
namely Challenge and Leaderboard. The Challenge dataset has 10 HGG cases and the Leaderboard dataset
contains 21 HGG and 4 LGG.
A number of experiments were carried out based on the BRATS 2013 dataset, including 1) comparing the
segmentation performance of FCNNs with and without post-processing, and the performance of the proposed
deep learning network integrating FCNNs and CRF-RNN (hereinafter referred to as FCNN+CRF) with and
13
without post-processing, in order to validate the effectiveness of CRFs and post-processing; 2) evaluating the
segmentation performance of FCNN+CRF with 5 post-processing steps (6 post-processing steps in total), in order
to test the effectiveness of each post-processing step; 3) evaluating the segmentation performance of FCNNs
trained using different sizes of patches; 4) evaluating the segmentation performance of FCNNs trained using
different numbers of patches; 5) comparing the segmentation performance of segmentation models built upon
scans of 4 imaging sequences (Flair, T1, T1c, and T2) and 3 imaging sequences (Flair, T1c, and T2); and 6)
evaluating how the image preprocessing step affect the segmentation performance. All the above experiments
were performed in axial view. Apart from these experiments described above, we show the effectiveness of fusing
segmentation results of three views in Section 3.1.7 and summarize comparison results with other methods in
Section 3.1.8.
3.1.1. Evaluating the effectiveness of CRFs and post-processing
Table 1 shows the evaluation results of FCNNs with and without post-processing, and FCNN+CRF (our
integrated network of FCNNs and CRF-RNN) with and without post-processing on the BRATS 2013 Challenge
dataset and Leaderboard dataset. These results demonstrated that CRFs improved the segmentation accuracy and
so did the post-processing. With respect to both Dice and PPV, FCNN+post-process and FCNN+CRF improved
the segmentation performance in all complete tumor, core region, and enhancing region. However, CRFs and
post-process reduced Sensitivity. It is worth noting that CRFs improved Sensitivity of the enhancing region. In
summary, CRFs improved both the Dice and PPV and decreased the Sensitivity on the complete and core regions,
FCNN+CRF+post-process obtained the best performance with respect to Dice and PPV, but degraded the
performance with respect to the Sensitivity, especially on the complete tumor region.
We also adopted a 3D CRF based post-processing step as did in a recent study [28]. Particularly, the
parameters of the 3D CRF were optimized by grid searching based on the training dataset of BRATS 2013. Table
1 summarizes segmentation scores obtained by our method with different settings. These results indicated that 3D
CRF as a post-processing step could improve the segmentation performance as 3D information was taken into
consideration. However, our proposed post-processing procedure could further improve the segmentation
performance.
Fig. 6 shows representative segmentation results on the BRATS 2013 Challenge dataset. These segmentation
results demonstrated that FCNN+CRF could improve the spatial and appearance consistence of segmentation
results, and FCNN+CRF+post-process could reduce false positives.
Table 1. Evaluation results of FCNNs with and without post-processing, FCNN+CRF with and without post-processing, and
FCNN+3D-CRF with and without post-processing. (The sizes of image patches used to train FCNNs were 33*33*3 and
65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20. FCNN+CRF is short for the
integrated network of FCNNs and CRF-RNN)
Dataset
Methods
Challenge
FCNNs
FCNN+post-process
Dice
complete
core
0.74
0.81
0.72
0.75
PPV
enhancing complete
0.67
0.73
0.62
0.73
core
0.63
0.70
Sensitivity
enhancing complete
0.60
0.73
0.94
0.94
core
enhancing
0.86
0.85
0.77
0.74
14
Leaderboard
FCNN+CRF
FCNN+CRF+post-process
FCNN+3D-CRF
FCNN+3D-CRF
+post-process
FCNNs
FCNN+post-process
FCNN+CRF
FCNN+CRF+post-process
FCNN+3D-CRF
FCNN+3D-CRF
+post-process
0.85
0.87
0.85
0.80
0.83
0.80
0.70
0.76
0.73
0.87
0.92
0.84
0.80
0.87
0.78
0.63
0.77
0.69
0.84
0.83
0.88
0.81
0.81
0.83
0.80
0.77
0.80
0.87
0.83
0.78
0.89
0.85
0.78
0.86
0.83
0.79
0.70
0.81
0.83
0.86
0.84
0.61
0.65
0.66
0.73
0.65
0.54
0.61
0.57
0.62
0.61
0.58
0.74
0.85
0.89
0.81
0.57
0.63
0.71
0.76
0.71
0.49
0.62
0.50
0.64
0.57
0.96
0.94
0.85
0.84
0.90
0.74
0.78
0.69
0.78
0.71
0.67
0.66
0.71
0.68
0.71
0.87
0.71
0.63
0.88
0.74
0.63
0.88
0.79
0.70
Fig.6. Example segmentation results on the BRATS 2013 Challenge dataset. The first and second rows show the
segmentation results of the 50th and 80th slice of the axial view of Subject 0301. The third and fourth rows show the
segmentation results of the 40th and 70th slice of the axial view of Subject 0308. From left to right: Flair, T1c, T2,
segmentation results of FCNNs, segmentation results of FCNN+CRF, and segmentation results of FCNN+CRF+post-process.
In the segmentation results, each gray level represents a tumor class, from low to high: necrosis, edema, non-enhancing core,
and enhancing core.
3.1.2. Evaluating the effectiveness of each post-processing step
To investigate the effectiveness of each post-processing step, we obtained segmentation results of
FCNN+CRF+post-x, x=1, 2, …, 6. In particular, FCNN+CRF+post-x indicates FCNN+CRF with all other
post-processing steps except the step x. As described in section 2.3.4, our post-processing consists of 6 steps in
total. All the evaluation results are summarized in Table 2. These results indicated that the post-processing step 3
played the most important role in the tumor segmentation, although all these post-processing steps might
contribute the segmentation.
Table 2. The evaluation results of FCNN+CRF with 5 of 6 post-processing steps (FCNN+CRF+post-x indicates
FCNN+CRF with all other post-processing steps except the step x, the sizes of patches used to train FCNNs were 33*33*3
and 65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20.)
Dataset
Methods
Challenge
FCNN+CRF+post-process
FCNN+CRF+post-1
Dice
complete
core
0.87
0.87
0.83
0.83
PPV
enhancing complete
0.76
0.76
0.92
0.92
core
0.87
0.87
Sensitivity
enhancing complete core
0.77
0.77
0.83
0.83
0.81
0.81
enhancing
0.77
0.77
15
FCNN+CRF+post-2
FCNN+CRF+post-3
FCNN+CRF+post-4
FCNN+CRF+post-5
FCNN+CRF+post-6
FCNN+CRF+post-process
FCNN+CRF+post-1
FCNN+CRF+post-2
Leaderboard
FCNN+CRF+post-3
FCNN+CRF+post-4
FCNN+CRF+post-5
FCNN+CRF+post-6
0.86
0.85
0.86
0.87
0.87
0.86
0.84
0.86
0.85
0.85
0.86
0.86
0.83
0.80
0.82
0.83
0.83
0.73
0.71
0.73
0.70
0.71
0.72
0.70
0.76
0.72
0.76
0.74
0.76
0.62
0.62
0.62
0.59
0.62
0.59
0.62
0.90
0.88
0.92
0.92
0.92
0.89
0.88
0.88
0.87
0.89
0.89
0.89
0.87
0.80
0.88
0.87
0.87
0.76
0.75
0.76
0.73
0.77
0.76
0.76
0.77
0.69
0.77
0.70
0.77
0.64
0.64
0.64
0.57
0.64
0.57
0.64
0.84
0.83
0.82
0.83
0.83
0.84
0.82
0.86
0.84
0.82
0.84
0.84
0.81
0.81
0.78
0.81
0.81
0.78
0.77
0.77
0.75
0.74
0.76
0.71
0.77
0.77
0.77
0.79
0.77
0.68
0.68
0.68
0.68
0.68
0.71
0.68
3.1.3. Evaluating the impact of image patch size
We used different kernel sizes in all the pooling layers to train different FCNNs. The training image patch size
changed with the kernel size, as shown in Fig. 4, while the number of parameters in FCNNs was unchanged. We
evaluated the segmentation performance of our segmentation models with n=1,3,5, as summarized in Table 3.
When n=1,3,5, the corresponding sizes of training patches are 21*21*3 (small input patch) and 41*41*3 (large
input patch), 27*27*3 and 53*53*3, 33*33*3 and 65*65*3. Bar plots of the Dice of complete regions on the
Challenge dataset with different training patch sizes are shown in Fig. 7. These segmentation results indicated that
1) a bigger patch provided more information and helped improve FCNNs’ performance; 2) the CRF-RNN could
reduce the performance differences caused by patch size as CRF-RNN could optimize the segmentation results
according to the information in a whole image slice; and 3) the post-processing could further reduce the
performance difference caused by patch size.
Fig.7. Bar plots for the Dice of complete regions on the Challenge dataset with different training patch sizes.
Table 3. Evaluation results of our segmentation model with n=1,2,3 (The number of patches used to train FCNNs was
5000*5*20.)
Dataset
n
1
Challenge
3
5
Leaderboard
1
Methods
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
Dice
complete
core
0.70
0.83
0.86
0.71
0.83
0.86
0.74
0.85
0.87
0.64
0.62
0.78
0.83
0.67
0.77
0.82
0.72
0.80
0.83
0.54
PPV
enhancing complete
0.64
0.69
0.76
0.65
0.69
0.76
0.67
0.70
0.76
0.49
0.57
0.85
0.92
0.58
0.83
0.91
0.62
0.87
0.92
0.50
core
0.50
0.79
0.88
0.56
0.74
0.84
0.63
0.80
0.87
0.45
Sensitivity
enhancing complete core enhancing
0.55
0.63
0.77
0.57
0.63
0.78
0.60
0.63
0.77
0.42
0.94
0.83
0.82
0.95
0.85
0.84
0.94
0.84
0.83
0.96
0.87
0.79
0.80
0.86
0.82
0.82
0.86
0.81
0.81
0.76
0.79
0.79
0.77
0.78
0.79
0.76
0.77
0.80
0.77
0.71
16
3
5
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
0.82
0.85
0.67
0.83
0.86
0.70
0.83
0.86
0.65
0.72
0.57
0.66
0.72
0.61
0.66
0.73
0.57
0.61
0.52
0.57
0.62
0.54
0.57
0.62
0.83
0.88
0.54
0.82
0.88
0.58
0.85
0.89
0.70
0.76
0.50
0.67
0.74
0.57
0.71
0.76
0.51
0.59
0.45
0.51
0.60
0.49
0.50
0.64
0.85
0.84
0.96
0.87
0.86
0.96
0.85
0.84
0.69
0.76
0.75
0.72
0.79
0.74
0.69
0.78
0.72
0.70
0.70
0.71
0.69
0.67
0.71
0.68
3.1.4. Evaluating the impact of the number of image patches used to train FCNNs
The BRATS 2013 training dataset contains 10 LGG and 20 HGG. In our experiments, we trained our
segmentation model using the 20 HGG cases, and our model worked well for segmenting LGG cases. To
investigate the impact of the number of training patches on the segmentation performance, we trained FCNNs
with varied numbers of image patches. In particular, we sampled training imaging patches randomly from each
subject and kept the number of training samples for different classes equal (5 classes in total, including normal
tissue, necrosis, edema, non-enhancing core, and enhancing core). We generated 3 sets of image patches by
sampling, consisting of 1000*5*20, 3000*5*20, and 5000*5*20 patches respectively, and used them to train
different segmentation models. The evaluation results are summarized in in Table 4. Bar plots of the Dice of
complete regions on the Challenge dataset with different numbers of training patches are shown in Fig. 8.
The results shown in Table 4 and Fig.8 indicated that the brain tumor segmentation accuracy of FCNNs
increased with the increasing of the number of training patches. However, both CRFs and post-processing could
reduce the performance difference.
Fig.8. Bar plots for the Dice of complete regions on the Challenge dataset with different numbers of training image patches.
Table.4 Evaluation results of the segmentation models trained using different numbers of training image patches (the sizes of
image patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5)
Dataset
Challenge
No. of
patches
Methods
complete
FCNNs
0.71
1000*5*20
FCNN+CRF
0.84
FCNN+CRF+post-process
0.87
FCNNs
0.73
3000*5*20
FCNN+CRF
0.84
FCNN+CRF+post-process
0.86
FCNNs
0.74
5000*5*20
FCNN+CRF
0.85
FCNN+CRF+post-process
0.87
Dice
core enhancing complete
0.68
0.62
0.57
0.78
0.68
0.84
0.82
0.76
0.91
0.70
0.66
0.60
0.80
0.69
0.86
0.83
0.77
0.92
0.72
0.67
0.62
0.80
0.70
0.87
0.83
0.76
0.92
PPV
Sensitivity
core enhancing complete core enhancing
0.58
0.54
0.95
0.86
0.76
0.78
0.61
0.85
0.81
0.79
0.86
0.77
0.84
0.81
0.77
0.61
0.59
0.94
0.86
0.76
0.79
0.62
0.84
0.82
0.80
0.86
0.77
0.83
0.82
0.77
0.63
0.60
0.94
0.86
0.77
0.80
0.63
0.84
0.81
0.80
0.87
0.77
0.83
0.81
0.77
17
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
3000*5*20
FCNN+CRF
Learderboard
FCNN+CRF+post-process
FCNNs
5000*5*20
FCNN+CRF
FCNN+CRF+post-process
1000*5*20
0.66
0.83
0.86
0.69
0.83
0.85
0.70
0.83
0.86
0.58
0.65
0.72
0.60
0.65
0.72
0.61
0.66
0.73
0.51
0.56
0.61
0.52
0.56
0.61
0.54
0.57
0.62
0.53
0.82
0.88
0.57
0.84
0.89
0.58
0.85
0.89
0.53
0.71
0.76
0.56
0.70
0.75
0.57
0.71
0.76
0.45
0.51
0.63
0.47
0.49
0.59
0.49
0.50
0.64
0.96
0.86
0.85
0.96
0.85
0.84
0.96
0.85
0.84
0.74
0.69
0.77
0.74
0.69
0.77
0.74
0.69
0.78
0.67
0.70
0.68
0.67
0.71
0.68
0.67
0.71
0.68
In summary, all the experimental results demonstrated that both CRFs and the post-processing method can
narrow the performance difference caused by training patch sizes and training patch numbers, indicating that
CRFs and the post-processing method might be able to narrow the performance difference caused by other
training tricks. We will confirm this inference in our future work.
3.1.5. Performance Comparison between segmentation models built upon 4 and 3 imaging modalities
We also built a segmentation model using all available 4 imaging modalities, i.e., Flair, T1, T1c, and T2, and
compared its segmentation performance with that of the segmentation model built upon 3 imaging modalities, i.e.,
Flair, T1c, and T2. The segmentation results of these segmentation models are summarized in Table 5. These
results demonstrated that these two segmentation models achieved similar performance, indicating that a
segmentation model built upon Flair, T1c, and T2 could achieve competitive performance as the model built upon
4 imaging modalities.
Table.5 Performance comparison of segmentation models built upon scans of 4 imaging modalities and 3 imaging modalities
(the sizes of patches used to train FCNNs were 33*33*4 and 65*65*4, or 33*33*3 and 65*65*3 respectively, n=5, and the
number of patches used to train FCNNs was 5000*5*20)
Dataset
No. of
modalities
4
Challenge
3
4
Learderboard
3
Methods
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
FCNNs
FCNN+CRF
FCNN+CRF+post-process
complete
0.74
0.85
0.87
0.74
0.85
0.87
0.69
0.82
0.85
0.70
0.83
0.86
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.72
0.67
0.61
0.64
0.60
0.95
0.86
0.77
0.80
0.71
0.85
0.79
0.67
0.87
0.82
0.78
0.83
0.76
0.91
0.85
0.78
0.84
0.82
0.76
0.72
0.67
0.62
0.63
0.60
0.94
0.86
0.77
0.80
0.70
0.87
0.80
0.63
0.84
0.81
0.80
0.83
0.76
0.92
0.87
0.77
0.83
0.81
0.77
0.59
0.55
0.57
0.56
0.49
0.95
0.72
0.68
0.64
0.58
0.82
0.70
0.55
0.85
0.67
0.68
0.74
0.62
0.89
0.75
0.62
0.83
0.79
0.66
0.61
0.54
0.58
0.57
0.49
0.96
0.74
0.67
0.66
0.57
0.85
0.71
0.50
0.85
0.69
0.71
0.73
0.62
0.89
0.76
0.64
0.84
0.78
0.68
3.1.6. Evaluation of different pre-processing strategies on the tumor segmentation
We preprocessed the imaging data using our robust deviation based intensity normalization and the standard
deviation based intensity normalization [8], and then evaluated segmentation models built on them separately. As
the results shown in Table 6 indicated, the robust deviation based intensity normalization could slightly improve
the segmentation performance.
Table.6 Performance comparison of segmentation models built upon images normalized by the robust deviation and the
standard deviation (the sizes of patches used to train FCNNs were 33*33*3 and 65*65*3 respectively, n=5, and the number
of patches used to train FCNNs was 5000*5*20)
Dataset
Deviation
Methods
standard
FCNNs
FCNN+CRF
Dice
PPV
Sensitivity
complete core enhancing complete core enhancing complete core enhancing
0.73
0.69
0.67
0.61
0.60
0.61
0.94
0.86
0.75
0.84
0.80
0.71
0.87
0.79
0.68
0.82
0.82
0.75
18
Challenge
FCNN+CRF+post-process
FCNNs
robust
FCNN+CRF
FCNN+CRF+post-process
FCNNs
standard
FCNN+CRF
FCNN+CRF+post-process
Learderboard
FCNNs
robust
FCNN+CRF
FCNN+CRF+post-process
0.86
0.74
0.85
0.87
0.69
0.83
0.86
0.70
0.83
0.86
0.83
0.72
0.80
0.83
0.60
0.66
0.73
0.61
0.66
0.73
0.76
0.67
0.70
0.76
0.54
0.58
0.61
0.54
0.57
0.62
0.93
0.62
0.87
0.92
0.57
0.85
0.89
0.58
0.85
0.89
0.86
0.63
0.80
0.87
0.55
0.71
0.75
0.57
0.71
0.76
0.80
0.60
0.63
0.77
0.50
0.56
0.66
0.49
0.50
0.64
0.81
0.94
0.84
0.83
0.97
0.85
0.84
0.96
0.85
0.84
0.81
0.86
0.81
0.81
0.75
0.70
0.78
0.74
0.69
0.78
0.74
0.77
0.80
0.77
0.67
0.67
0.66
0.67
0.71
0.68
3.1.7. Evaluating the effectiveness of fusing the segmentation results gotten in three views
We trained 3 segmentation models using patches and slices obtained in axial, coronal and sagittal views
respectively. During testing, we used these three models to segment brain images from 3 views and got three
segmentation results. The results of different views were fused and the evaluation results are shown in Table 7.
Evaluation results in Table 7 indicated that, for both Challenge and Leaderboard datasets, fusing the
segmentation results typically led to better segmentation performance without the post-processing procedure.
However, the improvement became insignificant after the post-processing procedure was applied to the
segmentation results.
Table.7 Evaluations of segmentation results obtained in axial, coronal, sagittal views before and after post-processing, and
evaluations of fusion results before and after post-processing (the sizes of patches used to train FCNNs were 33*33*3 and
65*65*3 respectively, n=5, and the number of patches used to train FCNNs was 5000*5*20)
Dataset
2013
Methods
FCNN+CRF
Challenge
fusing (FCNN+CRF)
axial
coronal
sagittal
fusing (FCNN+CRF)+post-process
axial
FCNN+CRF
coronal
sagittal
fusing (FCNN+CRF)
axial
FCNN+CRF+post-process
coronal
sagittal
fusing (FCNN+CRF)+post-process
FCNN+CRF+post-process
Learderboard
axial
coronal
sagittal
complete
0.85
0.82
0.83
0.85
0.87
0.87
0.87
0.88
0.83
0.80
0.80
0.84
0.86
0.86
0.84
0.86
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.80
0.70
0.87
0.80
0.63
0.84
0.81
0.80
0.80
0.70
0.77
0.78
0.62
0.90
0.83
0.82
0.80
0.71
0.80
0.79
0.64
0.87
0.83
0.82
0.83
0.74
0.85
0.84
0.68
0.88
0.82
0.82
0.83
0.76
0.92
0.87
0.77
0.83
0.81
0.77
0.82
0.76
0.86
0.83
0.74
0.89
0.83
0.79
0.82
0.77
0.88
0.83
0.75
0.86
0.82
0.79
0.84
0.77
0.90
0.87
0.76
0.86
0.82
0.80
0.66
0.57
0.85
0.71
0.50
0.85
0.69
0.71
0.65
0.56
0.75
0.69
0.50
0.90
0.69
0.70
0.66
0.55
0.78
0.69
0.49
0.86
0.69
0.70
0.67
0.60
0.84
0.74
0.54
0.87
0.68
0.72
0.73
0.62
0.89
0.76
0.64
0.84
0.78
0.68
0.73
0.62
0.86
0.73
0.60
0.89
0.79
0.67
0.71
0.60
0.85
0.74
0.59
0.84
0.74
0.67
0.73
0.62
0.89
0.77
0.60
0.85
0.77
0.69
3.1.8. Comparison with other methods
Comparison results with other methods are summarized in Table 8. In particular, evaluation results of the top
ranked methods participated in the BRATS 2013, shown on the BRATS 2013 website, are summarized in Table 8,
along with the results of our method and other two state of art methods. Particularly, the method proposed by
Sergio Pereira et al [31] ranked first on the Challenge dataset and second on the Leaderboard dataset right now,
while our method ranked second on the Challenge dataset and first on the Leaderboard dataset right now. In
general, it took 2-4 min for one of the three views of our method to segment one subject’s imaging data. We do
19
not have an accurate estimation of the training time for our segmentation models since we used a shared GPU
server. On the shared GPU server, it took ~12 days to train our segmentation models.
Table. 8 Comparisons with other methods on BRATS 2013 dataset
Dataset
Challenge
Leaderboard
Methods
Nick Tustison
Raphael Meier
Syed Reza
Mohammad Havaei[30]
Sergio Pereira[31]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
Nick Tustison
Liang Zhao
Raphael Meier
Mohammad Havaei[30]
Sergio Pereira[31]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
complete
0.87
0.82
0.83
0.88
0.88
0.87
0.87
0.87
0.88
0.79
0.79
0.72
0.84
0.84
0.86
0.86
0.84
0.86
Dice
core
0.78
0.73
0.72
0.79
0.83
0.83
0.82
0.82
0.84
0.65
0.59
0.60
0.71
0.72
0.73
0.73
0.71
0.73
Positive Predictive Value
enhancing complete core
enhancing
0.74
0.85
0.74
0.69
0.69
0.76
0.78
0.71
0.72
0.82
0.81
0.70
0.73
0.89
0.79
0.68
0.77
0.88
0.87
0.74
0.76
0.92
0.87
0.77
0.76
0.86
0.83
0.74
0.77
0.88
0.83
0.75
0.77
0.90
0.87
0.76
0.53
0.83
0.70
0.51
0.47
0.77
0.55
0.50
0.53
0.65
0.62
0.48
0.57
0.88
0.79
0.54
0.62
0.85
0.82
0.60
0.62
0.89
0.76
0.64
0.62
0.86
0.73
0.60
0.60
0.85
0.74
0.59
0.62
0.89
0.77
0.60
complete
0.89
0.92
0.86
0.87
0.89
0.83
0.89
0.86
0.86
0.81
0.85
0.88
0.84
0.86
0.84
0.89
0.84
0.85
Sensitivity
core
enhancing
0.88
0.83
0.72
0.73
0.69
0.76
0.79
0.80
0.83
0.81
0.81
0.77
0.83
0.79
0.82
0.79
0.82
0.80
0.73
0.66
0.77
0.53
0.69
0.64
0.72
0.68
0.76
0.68
0.78
0.68
0.79
0.67
0.74
0.67
0.77
0.69
3.2. Segmentation performance on the BRATS 2015
The BRATS 2015 training dataset contains 54 LGG and 220 HGG, and its testing dataset contains 110 cases with
unknown grades. All the training cases in BRATS 2013 are reused in BRATS 2015 as a subset of its training
dataset. As what we have done in our experiments with BRATS 2013 dataset, we just used HGG training cases to
train our segmentation models in this section. We extracted 1000*5 patches from each of 220 HGG to train
FCNNs and initialed the CRF-RNN by the CRF-RNN trained by BRATS 2013 dataset. The whole network was
fine-tuned using slices in BRATS 2013 training dataset, which is a subset of BRATS 2015 training dataset. The
evaluation results of BRATS 2015 testing dataset are shown in Table 9, including evaluations of segmentation
results that were segmented by the models trained by BRATS 2013 training dataset and evaluations of
segmentation results that were segmented by the models trained in this section.
The results shown in Table. 9 indicated that fusing the segmentation results of multi-views could improve the
segmentation accuracy. These results also indicated that a larger training dataset might improve the segmentation
performance.
Table.9 Evaluation results of 110 testing cases in BRATS 2015 testing dataset (the sizes of image patches used to train
FCNNs were 33*33*3 and 65*65*3 respectively, n=5)
Methods
FCNN+CRF
axial
coronal
sagittal
Models
trained based
fusing (FCNN+CRF)
on the BRATS
axial
2013 training
FCNN+CRF+post-process
coronal
dataset
sagittal
fusing (FCNN+CRF)+post-process
complete
0.77
0.74
0.74
0.79
0.78
0.78
0.77
0.81
Dice
PPV
Sensitivity
core enhancing complete core enhancing complete core enhancing
0.56
0.52
0.85
0.71
0.46
0.74
0.53
0.67
0.53
0.48
0.70
0.69
0.44
0.84
0.50
0.65
0.54
0.49
0.74
0.67
0.43
0.78
0.52
0.66
0.56
0.56
0.82
0.78
0.52
0.79
0.50
0.68
0.64
0.58
0.87
0.75
0.57
0.73
0.61
0.65
0.61
0.57
0.77
0.68
0.58
0.84
0.63
0.63
0.62
0.57
0.80
0.71
0.56
0.78
0.60
0.63
0.65
0.60
0.87
0.79
0.60
0.78
0.61
0.65
20
FCNN+CRF
axial
coronal
sagittal
Models
trained based
fusing (FCNN+CRF)
on the BRATS
axial
2015 training
FCNN+CRF+post-process
coronal
dataset
sagittal
fusing (FCNN+CRF)+post-process
0.78
0.77
0.76
0.80
0.80
0.80
0.78
0.82
0.64
0.66
0.63
0.66
0.68
0.69
0.69
0.72
0.54
0.56
0.47
0.57
0.61
0.61
0.57
0.62
0.78
0.73
0.75
0.81
0.82
0.77
0.80
0.84
0.76
0.73
0.71
0.79
0.75
0.70
0.74
0.78
0.48
0.52
0.38
0.50
0.59
0.61
0.51
0.60
0.81
0.86
0.80
0.83
0.81
0.87
0.80
0.83
0.62
0.67
0.63
0.64
0.71
0.76
0.71
0.73
0.71
0.67
0.75
0.72
0.68
0.65
0.72
0.69
There were only 53 testing cases available during the BRATS 2015, but now there are 110 testing cases.
Therefore, we are not able to directly compare our method with the methods that participated in the BRATS 2015.
We are aware that K. Kamnitses et al [28] have published their evaluation results with 110 BRATS 2015 testing
cases. The comparisons with K. Kamnitses et al’s method are shown in Table 10.
Table. 10 Comparisons with other methods on BRATS 2015 dataset
Dataset
Methods
BRATS
2015 testing
dataset
DeepMedic+CRF[28]
Our method(axial)
Our method(coronal)
Our method(sagittal)
Our method(fusing)
Our FCNN(axial)+3D CRF
Our FCNN(coronal)+3D CRF
Our FCNN(sagittal)+3D CRF
Our FCNN+3D CRF (fusing)
complete
0.847
0.80
0.80
0.78
0.82
0.84
0.83
0.82
0.84
Dice
core
0.67
0.68
0.69
0.69
0.72
0.72
0.72
0.72
0.73
Positive Predictive Value
enhancing complete core
enhancing
0.629
0.85
0.848
0.634
0.61
0.82
0.75
0.59
0.61
0.77
0.70
0.61
0.57
0.80
0.74
0.51
0.62
0.84
0.78
0.60
0.62
0.88
0.75
0.62
0.62
0.88
0.75
0.62
0.60
0.88
0.75
0.59
0.62
0.89
0.76
0.63
complete
0.876
0.81
0.87
0.80
0.83
0.82
0.82
0.81
0.82
Sensitivity
core
enhancing
0.607
0.662
0.71
0.68
0.76
0.65
0.71
0.72
0.73
0.69
0.76
0.67
0.75
0.66
0.76
0.67
0.76
0.67
3.3. Segmentation performance on the BRATS 2016
We also participated in the BRATS 2016. However, during the competition we just segmented brain images in
axial view. Since the BRATS 2016 shares the same training dataset with BRATS 2015, we used the same
segmentation models trained based on the BRATS 2015 training dataset. The BRATS 2015 training dataset has
been pre-processed with rigid registration, bias field correction and skull stripping. However, the BRATS 2016
test dataset contains a number of unprocessed or partially pre-processed images [45], as shown in Fig. 9. To
reduce false positives caused by incomplete pre-processing, apart from the post-processing steps described in
Section 2.3.4, we manually placed rectangular bounding boxes around tumors in images and applied the
post-processing step 2 to the segmentation results. Among 19 teams participated in the BRATS 2016, we ranked
first on the multi-temporal evaluation. The ranking details of our method are shown in Table.11.
Fig.9 An example of partial skull stripping case in BRATS 2016 testing dataset. From left to right: Flair, T1c, T2
21
Table. 11 The ranking details of our method on different items on BRAST 2016 (including tie)
Items
Ranking
complete
4
Dice
core
3
Tumor Segmentation
enhancing
1
complete
7
Hausdorff
core
enhancing
6
2
Multi-temporal
evaluation
1
4. Discussions and Conclusion
In this study, we proposed a novel deep learning based brain tumor segmentation method by integrating Fully
Convolutional Neural Networks (FCNNs) and Conditional Random Fields (CRFs) in a unified framework. This
integrated model was designed to obtain tumor segmentation results with appearance and spatial consistency. In
our method, we used CRF-RNN to implement CRFs [18], facilitating easy training of both FCNNs and CRFs as
one deep network, rather than using CRFs as a post-processing step of FCNNs. Our integrated deep learning
model was trained in 3 steps, using image patches and slices respectively. In the first step, image patches were
used to train FCNNs. These image patches were randomly sampled from the training dataset and the same number
of image patches for each class was used as training image patches, in order to avoid the data imbalance problem.
In the second step, image slices were used to train the following CRF-RNN, with parameters of FCNNs fixed. In
the third step, image slices were used to fine-tune the whole network. Particularly, we train 3 segmentation models
using 2D image patches and slices obtained in axial, coronal and sagittal views respectively, and combine them to
segment brain tumors using a voting based fusion strategy. Our experimental results also indicated that the
integration of FCNNs and CRF-RNN could improve the segmentation robustness to parameters involved in the
model training, such as image patch size and the number of training image patches. Our experimental results also
demonstrated that a tumor segmentation model built upon Flair, T1c, and T2 scans achieved competitive
performance as those built upon Flair, T1, T1c, and T2 scans.
We also proposed a simple pre-processing strategy and a simple post-processing strategy. We pre-processed
each MR scan using N4ITK and intensity normalization, which normalized each MR image’s intensity mainly by
subtracting the gray-value of the highest frequency and dividing the robust deviation. The results shown in Fig. 1
and Fig. 2 demonstrated that the proposed intensity normalization method could make different MRI scans
comparable, i.e., similar intensity values characterize similar brain tissues across scans. We post-processed the
segmentation results by removing small 3D-connected regions and correcting false labels by simple thresholding
method. Our experimental results have demonstrated that these strategies could improve the tumor segmentation
performance.
Our method has achieved promising performance on the BRATS 2013 and BRATS 2015 testing dataset.
Different from other top ranked methods, our method could achieve competitive performance with only 3 imaging
modalities (Flair, T1c, and T2), rather than 4 (Flair, T1, T1c, and T2). We also participated in the BRATS 2016
and our method ranked first on its multi-temporal evaluation.
22
Our method is built upon 2D FCNNs and CRF-RNN to achieve computational efficiency. For training
CRF-RNN and fine-tuning the integrated FCNNs and CRF-RNN, we use image slices as training data. However,
in image slices, the numbers of pixels for different classes are different, which may worsen the segmentation
performance of the trained network. To partially overcome the imbalanced training data problem, we trained
CRF-RNN with the parameters of FCNNs were fixed so that the CRF-RNN are trained to optimize the appearance
and spatial consistency of segmentation results. Such a strategy in conjunct with a fine-tuning of the whole
network with a small learning rate improved the tumor segmentation performance. However, 2D CNNs are not
equipped to take full advantage of 3D information of the MRI data [28, 29]. Our experimental results have
demonstrated adopting 3D CRF as a post-processing step could improve the tumor segmentation performance.
Our ongoing study is to build a fully 3D network to further improve the tumor segmentation performance.
Acknowledgements
This work was supported in part by the National High Technology Research and Development Program of China
(2015AA020504), the National Natural Science Foundation of China under Grant Nos. 61572499, 61421004,
61473296, and NIH grants EB022573, CA189523.
References
[1] S. Bauer, R. Wiest, L.-P. Nolte, and M. Reyes, "A survey of MRI-based medical image analysis for brain tumor studies,"
Physics in medicine and biology, vol. 58, pp. 97-129, 2013.
[2] M. Goetz, C. Weber, F. Binczyk, J. Polanska, R. Tarnawski, B. Bobek-Billewicz, et al., "DALSA: domain adaptation for
supervised learning from sparsely annotated MR images," IEEE transactions on medical imaging, vol. 35, pp. 184-196,
2016.
[3] B. H. Menze, A. Jakab, S. Bauer, J. Kalpathy-Cramer, K. Farahani, J. Kirby, et al., "The multimodal brain tumor image
segmentation benchmark (BRATS)," IEEE Transactions on Medical Imaging, vol. 34, pp. 1993-2024, 2015.
[4] A. Gooya, K. M. Pohl, M. Bilello, L. Cirillo, G. Biros, E. R. Melhem, et al., "GLISTR: glioma image segmentation and
registration," IEEE transactions on medical imaging, vol. 31, pp. 1941-1954, 2012.
[5] M. B. Cuadra, C. Pollo, A. Bardera, O. Cuisenaire, J.-G. Villemure, and J.-P. Thiran, "Atlas-based segmentation of
pathological MR brain images using a model of lesion growth," IEEE transactions on medical imaging, vol. 23, pp.
1301-1314, 2004.
[6] B. H. Menze, K. Van Leemput, D. Lashkari, M.-A. Weber, N. Ayache, and P. Golland, "A generative model for brain
tumor segmentation in multi-modal images," in International Conference on Medical Image Computing and
Computer-Assisted Intervention, 2010, pp. 151-159.
[7] M. Prastawa, E. Bullitt, S. Ho, and G. Gerig, "A brain tumor segmentation framework based on outlier detection,"
Medical image analysis, vol. 8, pp. 275-283, 2004.
[8] M. Goetz, C. Weber, J. Bloecher, B. Stieltjes, H.-P. Meinzer, and K. Maier-Hein, "Extremely randomized trees based
brain tumor segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 6-11, 2014.
[9] S. M. S. Reza and K. M. Iftekharuddin, "Improved brain tumor tissue segmentation using texture features," Proceedings
MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 27-30, 2014.
[10] J. Kleesiek, A. Biller, G. Urban, U. Kothe, M. Bendszus, and F. Hamprecht, "Ilastik for multi-modal brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 12-17, 2014.
[11] S. Ruan, S. Lebonvallet, A. Merabet, and J.-M. Constans, "Tumor segmentation from a multispectral MRI images by
using support vector machine classification," in 2007 4th IEEE International Symposium on Biomedical Imaging: From
Nano to Macro, 2007, pp. 1236-1239.
[12] H. Li and Y. Fan, "Label propagation with robust initialization for brain tumor segmentation," in 2012 9th IEEE
International Symposium on Biomedical Imaging (ISBI), 2012, pp. 1715-1718.
23
[13] H. Li, M. Song, and Y. Fan, "Segmentation of brain tumors in multi-parametric MR images via robust statistic
information propagation," in Asian Conference on Computer Vision, 2010, pp. 606-617.
[14] R. Meier, S. Bauer, J. Slotboom, R. Wiest, and M. Reyes, "Appearance- and context-sensitive features for brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 20-26, 2014.
[15] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in
Advances in neural information processing systems, 2012, pp. 1097-1105.
[16] R. Girshick, J. Donahue, T. Darrell, and J. Malik, "Rich feature hierarchies for accurate object detection and semantic
segmentation," in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 580-587.
[17] J. Long, E. Shelhamer, and T. Darrell, "Fully convolutional networks for semantic segmentation," in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3431-3440.
[18] S. Zheng, S. Jayasumana, B. Romera-Paredes, V. Vineet, Z. Su, D. Du, et al., "Conditional random fields as recurrent
neural networks," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 1529-1537.
[19] Z. Liu, X. Li, P. Luo, C.-C. Loy, and X. Tang, "Semantic image segmentation via deep parsing network," in Proceedings
of the IEEE International Conference on Computer Vision, 2015, pp. 1377-1385.
[20] D. Zikic, Y. Ioannou, M. Brown, and A. Criminisi, "Segmentation of brain tumor tissues with convolutional neural
networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 36-39, 2014.
[21] A. Davy, M. Havaei, D. Warde-farley, A. Biard, L. Tran, P.-M. Jodoin, et al., "Brain tumor segmentation with deep
neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-5, 2014.
[22] G. Urban, M. Bendszus, F. Hamprecht, and J. Kleesiek, "Multi-modal brain tumor segmentatioin using deep
convolutional neural networks," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 31-35, 2014.
[23] P. Dvorak and B. H. Menze, "Structured prediction with convolutional neural networks for multimodal brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 13-24, 2015.
[24] M. Havaei, F. Dutil, C. Pal, H. Larochelle, and P.-M. Jodoin, "A convolutional neural network approach to brain tumor
segmentation," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 29-33, 2015.
[25] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Deep convolutional neural networks for the segmentatin of gliomas in
multi-sequence MRI," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 52-55, 2015.
[26] M. Agn, O. Puonti, I. Law, P. M. a. Rosenschold, and K. V. Leemput, "Brain tumor segmentation by a generative model
with a prior on tumor shape," Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), pp. 1-4, 2015.
[27] K. Vaidhya, R. Santhosh, S. Thirunavukkarasu, V. Alex, and G. Krishnamurthi, "Multi-modal brain tumor segmentation
using stacked denoising autoencoders," in Proceedings MICCAI BraTS (Brain Tumor Segmentation Challenge), 2015,
pp. 60-64.
[28] K. Kamnitsas, C. Ledig, V. F. Newcombe, J. P. Simpson, A. D. Kane, D. K. Menon, et al., "Efficient multi-scale 3D
CNN with fully connected CRF for accurate brain lesion segmentation," Medical Image Analysis, vol. 36, pp. 61-78,
2017.
[29] D. Yi, M. Zhou, Z. Chen, and O. Gevaert, "3-D Convolutional Neural Networks for Glioblastoma Segmentation," arXiv
preprint arXiv:1611.04534, 2016.
[30] M. Havaei, A. Davy, D. Warde-Farley, A. Biard, A. Courville, Y. Bengio, et al., "Brain tumor segmentation with deep
neural networks," Medical image analysis, vol. 35, pp. 18-31, 2017.
[31] S. Pereira, A. Pinto, V. Alves, and C. A. Silva, "Brain tumor segmentation using convolutional neural networks in MRI
images," IEEE transactions on medical imaging, vol. 35, pp. 1240-1251, 2016.
[32] K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint
arXiv:1409.1556, 2014.
[33] L.-C. Chen, G. Papandreou, I. Kokkinos, K. Murphy, and A. L. Yuille, "Semantic image segmentation with deep
convolutional nets and fully connected crfs," arXiv preprint arXiv:1412.7062, 2014.
[34] A. Prasoon, K. Petersen, C. Igel, F. Lauze, E. Dam, and M. Nielsen, "Deep feature learning for knee cartilage
segmentation using a triplanar convolutional neural network," in International conference on medical image computing
and computer-assisted intervention, 2013, pp. 246-253.
[35] K. Fritscher, P. Raudaschl, P. Zaffino, M. F. Spadea, G. C. Sharp, and R. Schubert, "Deep Neural Networks for Fast
Segmentation of 3D Medical Images," in International Conference on Medical Image Computing and
Computer-Assisted Intervention, 2016, pp. 158-165.
[36] A. A. A. Setio, F. Ciompi, G. Litjens, P. Gerke, C. Jacobs, S. J. van Riel, et al., "Pulmonary nodule detection in CT
images: false positive reduction using multi-view convolutional networks," IEEE transactions on medical imaging, vol.
35, pp. 1160-1169, 2016.
[37] X. Zhao, Y. Wu, G. Song, Z. Li, Y. Fan, and Y. Zhang, "Brain Tumor Segmentation Using a Fully Convolutional Neural
Network with Conditional Random Fields," in International Workshop on Brainlesion: Glioma, Multiple Sclerosis,
Stroke and Traumatic Brain Injuries, 2016, pp. 75-87.
24
[38] W. Zhang, R. Li, H. Deng, L. Wang, W. Lin, S. Ji, et al., "Deep convolutional neural networks for multi-modality
isointense infant brain image segmentation," NeuroImage, vol. 108, pp. 214-224, 2015.
[39] P. Moeskops, M. A. Viergever, A. M. Mendrik, L. S. de Vries, M. J. Benders, and I. Išgum, "Automatic segmentation of
MR brain images with a convolutional neural network," IEEE transactions on medical imaging, vol. 35, pp. 1252-1261,
2016.
[40] A. de Brebisson and G. Montana, "Deep neural networks for anatomical brain segmentation," in Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015, pp. 20-28.
[41] N. J. Tustison, B. B. Avants, P. A. Cook, Y. Zheng, A. Egan, P. A. Yushkevich, et al., "N4ITK: improved N3 bias
correction," IEEE transactions on medical imaging, vol. 29, pp. 1310-1320, 2010.
[42] R. D. Fields, "Change in the brain's white matter," Science, vol. 330, pp. 768-769, 2010.
[43] P. Krahenbuhl and V. Koltun, "Efficient inference in fully connected crfs with gaussian edge potentials," NIPS, 2011.
[44] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, et al., "Caffe: Convolutional architecture for fast
feature embedding," in Proceedings of the 22nd ACM international conference on Multimedia, 2014, pp. 675-678.
[45] L. Le Folgoc, A. V. Nori, S. Ancha, and A. Criminisi, "Lifted Auto-Context Forests for Brain Tumour Segmentation," in
International Workshop on Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2016, pp.
171-183.
25
| 1 |
A COPULA APPROACH FOR DEPENDENCE MODELING IN
MULTIVARIATE NONPARAMETRIC TIME SERIES
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
arXiv:1705.07605v1 [math.ST] 22 May 2017
1
Department of Mathematics, University of Hamburg, Bundesstrasse 55, 20146 Hamburg,
Germany
2 Department of Probability and Statistics, Faculty of Mathematics and Physics, Charles
University, Sokolovská 83, 186 75 Praha 8, Czech Republic
May 23, 2017
Abstract. This paper is concerned with modeling the dependence structure of two (or
more) time-series in the presence of a (possible multivariate) covariate which may include past
values of the time series. We assume that the covariate influences only the conditional mean
and the conditional variance of each of the time series but the distribution of the standardized
innovations is not influenced by the covariate and is stable in time. The joint distribution
of the time series is then determined by the conditional means, the conditional variances
and the marginal distributions of the innovations, which we estimate nonparametrically, and
the copula of the innovations, which represents the dependency structure. We consider a
nonparametric as well as a semi-parametric estimator based on the estimated residuals. We
show that under suitable assumptions these copula estimators are asymptotically equivalent
to estimators that would be based on the unobserved innovations. The theoretical results
are illustrated by simulations and a real data example.
Keywords and phrases: Asymptotic representation; CHARN model; empirical copula process;
goodness-of-fit testing; nonparametric AR-ARCH model; nonparametric SCOMDY model;
weak convergence.
1. Introduction
Modeling the dependency of k observed time series can be of utmost importance for applications, e. g. in risk management (for instance to model the dependence between several
exchange rates). We will take the approach to model k dependent nonparametric AR-ARCH
time series
Yji = mj (X i ) + σj (X i ) εji , i = 1, . . . , n, j = 1, . . . , k,
where the covariate X i may include past values of the process, Yj i−1 , Yj i−2 , . . . (j = 1, . . . , k),
or other exogenous variables. Further the innovations (ε1i , . . . , εki ), i ∈ Z, are assumed to
be independent and identically distributed random vectors and (ε1i , . . . , εki ) is independent
∗
The second and the third authors gratefully acknowledge support from the grant GACR 15-04774Y.
1
2
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
of the past and present covariates X ` , ` ≤ i, ∀i. For identifiability we assume E εji = 0,
var(εji ) = 1 (j = 1, . . . , k), such that the functions mj and σj represent the conditional
mean and volatility function in the jth time series. Such models are also called multivariate
nonparametric CHARN (conditional heteroscedastic autoregressive nonlinear) models and
have gained much attention over the last decades, see Fan and Yao (2005) and Gao (2007)
for extensive overviews.
Note that due to the structure of the model and Sklar’s theorem (see e.g., Nelsen, 2006),
for zj = (yj − mj (x))/σj (x) (j = 1, . . . , k) one has
P(Y1i ≤ y1 , . . . , Yki ≤ yk | X i = x) = P(ε1i ≤ z1 , . . . , εki ≤ zk ) = C(F1ε (z1 ), . . . , Fkε (zk )),
where Fjε (j = 1, . . . , k) denote the marginal distributions of the innovations and C their
copula. Thus the joint conditional distribution of the observations, given the covariate, is
completely specified by the individual conditional mean and variance functions, the marginal
distributions of the innovations, and their copula. The copula C describes the dependence
structure of the k time series, conditional on the covariates, after removing influences of the
conditional means and variances as well as marginal distributions.
We will model the conditional mean and variance function nonparametrically like Härdle
et al. (1998), among others. Semiparametric estimation, e. g. with additive structure for mj
and multiplicative structure for σj2 as in Yang et al. (1999) can be considered as well and
all presented results remain valid under appropriate changes for the estimators and assumptions. Further we will model the marginal distributions of the innovations nonparametrically,
whereas we will take two different approaches to estimate the copula C: nonparametrically
and parametrically. As the innovations are not observable, both estimators will be based
on estimated residuals. We will show that the asymptotic distribution is not affected by
the necessary pre-estimation of the mean and variance functions. This remarkable result is
intrinsic for copula estimation, while the asymptotic distribution of empirical distribution
functions is typically influenced by pre-estimation of mean and variance functions. Moreover,
comparison of the nonparametric and parametric copula estimator gives us the possibility to
test goodness-of-fit of a parametric class of copulas.
Our approach extends the following parametric and semiparametric approaches in time
series contexts. Chen and Fan (2006) introduced SCOMDY (semiparametric copula-based
multivariate dynamic) models, which are very similar to the model considered here. However,
the conditional mean and variance functions are modeled parametrically, while the marginal
distributions of innovations are estimated nonparametrically and a parametric copula model
is applied to model the dependence. See also Kim et al. (2007) for similar methods for some
parametric time series models including nonlinear GARCH models, Rémillard et al. (2012),
Kim et al. (2008) and the review by Patton (2012). Chan et al. (2009) give a goodness-of fit
test for the innovation copula in the GARCH context. Further, in an i.i.d. setting Gijbels et al.
A COPULA APPROACH FOR DEPENDENCE MODELING
3
(2015) show that in nonparametric location-scale models the asymptotic distribution of the
empirical copula is not influenced by pre-estimation of the mean and variance function. This
results was further generalized by Portier and Segers (2015) to a completely nonparametric
model for the marginals.
The remainder of the paper is organized as follows. In Section 2 we define the estimators and
state some regularity assumptions. In Subsection 2.1 we show weak convergence of the copula
process, while in Subsection 2.2 we show asymptotic normality of a parameter estimator when
considering a parametric class of copulas. Subsection 2.3 is devoted to goodness-of-fit testing.
In Section 3 we present simulation results and in Section 4 a real data example. All proofs
are given in the Appendix.
2. Main results
For the ease of presentation we will focus on the case of two time series, i. e. k = 2, but all
results can be extended to general k ≥ 2 in an obvious manner. Suppose we have observed
for i = 1, . . . , n a section of the stationary stochastic process Y1i , Y2i , X i i∈Z that satisfies
(1)
Y1i = m1 (X i ) + σ1 (X i ) ε1i ,
Y2i = m2 (X i ) + σ2 (X i ) ε2i ,
i = 1, . . . , n,
where X i = (Xi1 , . . . , Xid )T is a d-dimensional covariate and the innovations (ε1i , ε2i ) i∈Z
are independent identically distributed random vectors. Further (ε1i , ε2i ) is independent of
the past and present covariates X k , k ≤ i, ∀i, and E ε1i = E ε2i = 0, var(ε1i ) = var(ε2i ) = 1.
If the marginal distribution functions F1ε and F2ε of the innovations are continuous, then the
copula function C of the innovations is unique and can be expressed as
(2)
−1
−1
(u2 ) ,
C(u1 , u2 ) = Fε F1ε
(u1 ), F2ε
(u1 , u2 ) ∈ [0, 1]2 .
As the innovations (ε1i , ε2i ) are unobserved, the inference about the copula function C is
based on the estimated residuals
(3)
εbji =
Yji − m
b j (X i )
,
σ
bj (X i )
i = 1, . . . , n,
j = 1, 2,
where m
b j and σ
bj are the estimates of the unknown functions mj and σj . In what follows
we will consider the local polynomial estimators of order p; see Fan and Gijbels (1996) or
Masry (1996), among others. I.e. m
b j (x) is for a given x = (x1 , . . . , xd )T defined as βb0 , the
b with multi-index 0 = (0, . . . , 0), where β
b is the solution to the minimization
component of β
problem
(4)
min
β=(βi )i∈I
n h
X
X
i 2
Yj` −
βi ψi,hn X ` − x Khn (X ` − x).
`=1
i∈I
4
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
Here I = I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with i. = i1 + · · · + id ≤ p and
ik 1
Q
k
ψi,hn (x) = dk=1 x(k)
ik ! . Further
hn
Khn (X ` − x) =
d
Y
(k)
k=1
with k being a kernel function and hn =
Further σj2 (x) is estimated as
1
hn
k
X`k −xk
(k)
hn
(1)
(d)
hn , . . . , hn
,
the smoothing parameter.
σ
bj2 (x) = sbj (x) − m
b 2j (x),
where sbj (x) is obtained in the same way as m
b j (x) but with Yj` replaced with Yj`2 .
For any function f defined on J, interval in Rd , define for ` ∈ N, δ ∈ [0, 1),
kf k`+δ = max sup |Di f (x)| + max sup
i∈I(d,`) x,x0 ∈J
i.=`
x6=x0
i∈I(d,`) x∈J
where Di =
∂ i.
i ,
i
∂x11 ...∂xdd
|Di f (x) − Di f (x0 )|
,
kx − x0 kδ
`+δ
(J) the set of
and k · k is the Euclidean norm on Rd . Denote by CM
e `+δ (J) the subset
`-times differentiable functions f on J, such that kf k`+δ ≤ M . Denote by C
2
of C2`+δ (J) of the functions that satisfy inf x∈J f (x) ≥ 21 .
In what follows we are going to prove that under appropriate regularity assumptions using
the estimated residuals (3) instead of the (true) unobserved innovations εji affects neither the
asymptotic distribution of the empirical copula estimator nor the parametric estimator of a
copula.
2.1. Empirical copula estimation. Mimicking (2) the copula function C can be estimated
nonparametrically as
en (u1 , u2 ) = Fbεb Fb−1 (u1 ), Fb−1 (u2 ) ,
(5)
C
2b
ε
1b
ε
where
(6)
n
1 X
Fbεb(y1 , y2 ) =
wni 1 εb1i ≤ y1 , εb2i ≤ y2 ,
Wn
Wn =
i=1
n
X
wnj
j=1
is the estimate of the joint distribution function Fε (y1 , y2 ) and
n
1 X
b
Fjbε (y) =
wni 1 εbji ≤ y ,
Wn
j = 1, 2,
i=1
the corresponding marginal empirical cumulative distribution functions. Here we make use
of a weight function wn (x) = 1{x ∈ Jn } and put wni = wn (X i ). For some real positive
sequence cn → ∞ we set Jn = [−cn , cn ]d .
(or)
Now let Cn be the ‘oracle’ estimator based on the unobserved innovations, i.e.
−1
−1
(7)
Cn(or) (u1 , u2 ) = Fbε Fb1ε
(u1 ), Fb2ε
(u2 ) ,
A COPULA APPROACH FOR DEPENDENCE MODELING
5
P
where Fbε (z1 , z2 ) = n1 ni=1 1 ε1i ≤ z1 , ε2i ≤ z2 is the estimator of Fε (z1 , z2 ) based on the
unobserved innovations and Fbjε (j = 1, 2) the corresponding marginal empirical cumulative
distribution functions.
Regularity assumptions.
(β) The process (X i , Y1i , Y2i )i∈Z is strictly stationary and absolutely regular (β-mixing)
with the mixing coefficient βi that satisfies βi = O(i−b ) with
1 + (s − 1)(1 + d)
s−2
where s is specified in assumption (M) below.
(1,1)
(1,2)
(2,2)
(Fε ) The second-order partial derivatives Fε , Fε
and Fε
of the joint cumula(j,k)
tive distribution function Fε (y1 , y2 ) = P(ε1 ≤ y1 , ε2 ≤ y2 ), with Fε (y1 , y2 ) =
2
∂ Fε (y1 ,y2 )
∂yj ∂yk , satisfy
b>
max
sup
j,k∈{1,2} y1 ,y2 ∈R2
Fε(j,k) (y1 , y2 )(1 + yj )(1 + yk ) < ∞.
Further the innovation density fjε (j = 1, 2) satisfies
−1
−1
−1
−1
lim 1 + Fjε
(u) fjε Fjε
(u) = 0 and
lim 1 + Fjε
(u) fjε Fjε
(u) = 0.
u→0+
u→1−
(FX ) The observations X i (i ∈ Z) have density fX that is bounded and differentiable
with bounded uniformly continuous first order partial derivatives. We assume the
existence of some qf > 0 and some positive sequence cn = O (log n)1/d such that
(1)
(j)
(j)
d
for αn (log n)−qf and J+
n = ×j=1 [−cn − hn , cn + hn ],
inf fX (x) ≥ αn(1) .
x∈J+
n
(M) For some s > 2, for j = 1, 2, E |εj0 |2s < ∞, the functions σj2s fX and |mj σj |s fX are
bounded and there are some i∗ ∈ N, B > 0 such that for all i ≥ i∗ ,
sup σj2 (x0 )σj2 (xi )fX 0 ,X i (x0 , xi ) ≤ B,
x0 ,xi
sup mj (x0 )mj (xi ) σj (x0 )σj (xi )fX 0 ,X i (x0 , xi ) ≤ B,
x0 ,xi
where fX 0 ,X i denotes the joint density of (X 0 , X i ) and is bounded (for i ≥ i∗ ).
p+γ
(mσ) Let, for j = 1, 2 and for each n ∈ N, mj and σj be elements of CM
(Jn ) for
n
q
some γ ∈ (0, 1] and a sequence Mn = O((log n) m ) for some qm ≥ 0. Further,
(2)
E[σj4 (X 1 )] < ∞ and inf x∈Jn σj (x) ≥ αn for some positive sequence that fulfils
(2)
αn (log n)−qσ for some qσ ≥ 0.
(k)
(Bw) There exists a sequence hn such that hhnn → ak , where ak ∈ (0, ∞), k = 1, . . . , d.
Further, for γ from assumption (mσ) and for some δ > 0,
nh2p+2γ
(log n)D = o(1),
n
nh3d+2δ
(log n)−D → ∞
n
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
6
for all D > 0, and
b−1−d−
log n
= o(1) for θ =
θ
d
n hn
b+3−d−
1+b
s−1
1+b
s−1
with b from assumption (β) and s from assumption (M).
(k) k : R → R is a symmetric (d+2)-times continuously differentiable probability density
function supported on [−1, 1].
Remark 1. Using Fε (y1 , y2 ) = C F1ε (y1 ), F2ε (y2 ) assumption (Fε ) requires that
n
−1
−1
sup
C (j,k) (u1 , u2 ) fjε Fjε
(uj ) fkε Fkε
(uk )
u1 ,u2 ∈[0,1]2
o
−1
−1
−1
0
+ C (j) (u1 , u2 ) fjε
Fjε
(uj ) 1{j = k} 1 + Fjε
(uj )
1 + Fkε
(uk ) < ∞,
2
C(u1 ,u2 )
1 ,u2 )
and C (j,k) (u1 , u2 ) = ∂ ∂u
stand for the first and second
where C (j) (u1 , u2 ) = ∂C(u
∂uj
j ∂uk
order partial derivatives of the copula function.
Thus provided that for some δ > 0
C (j,k) (u1 , u2 ) = O u2 δ (1−u )2 δ1u2 δ (1−u )2 δ ,
j
k
j
k
−1
−1
then we need that the functions fjε Fjε (u) (1 + Fjε (u) ) are of order O(uδ (1 − u)δ ).
Remark 2. Parts of our assumptions are reproduced from Hansen (2008) because we apply his
results about uniform rates of convergence for kernel estimators several times in our proofs.
Note that in his Theorem 2 we set q = ∞.
Theorem 1. Suppose that assumptions (β), (Fε ), (FX ), (Bw), (M), (k), (Jn ) and (mσ)
are satisfied. Then
√
en (u1 , u2 ) − C (or) (u1 , u2 ) = oP (1).
sup
n C
n
(u1 ,u2 )∈[0,1]2
(or)
Note that Theorem 1 together with the weak convergence of Cn (u1 , u2 ) (see e.g., Propo
e n = √n C
en − C weakly converges in
sition 3.1 of Segers, 2012) implies that that process C
the space of bounded functions `∞ ([0, 1]2 ) to a centred Gaussian process GC , which can be
written as
GC (u1 , u2 ) = BC (u1 , u2 ) − C (1) (u1 , u2 ) BC (u1 , 1) − C (2) (u1 , u2 ) BC (1, u2 ) ,
where BC is a Brownian bridge on [0, 1]2 with covariance function
E BC (u1 , u2 )BC (u01 , u02 ) = C(u1 ∧ u01 , u2 ∧ u02 ) − C(u1 , u2 ) C(u01 , u02 ) .
P
Nevertheless in applications we recommend to use rather Wn = ni=1 wni instead of n as the
sample size.
A COPULA APPROACH FOR DEPENDENCE MODELING
7
2.2. Semiparametric copula estimation. The copula C describes the dependency between the two time series of interest, given the covariate. For applications modeling this
dependency structure parametrically is advantageous because a parametric model often gives
easier access to interpretations. Goodness-of-fit testing will be considered in the next section.
Suppose that the joint distribution of (ε1i , ε2i ) is given by the copula function C(u1 , u2 ; θ),
where θ = (θ1 , . . . , θp )T is an unknown parameter that belongs to a parametric space Θ ⊂ Rp .
In copula settings we are often interested in semi-parametric estimation of the parameter θ, i.e.
estimation of θ without making any parametric assumption on the marginal distributions F1ε
and F2ε . The methods of semi-parametric estimation for i.i.d. settings are summarized in
Tsukahara (2005). The question of interest is what happens if we use the estimated residuals (3) instead of the unobserved innovations εji . Generally speaking, thanks to Theorem 1
the answer is that using εbji instead of εji does not change the asymptotic distribution provided that the parameter of interest can be written as a Hadamard differentiable functional
of a copula.
2.2.1. Method-of-Moments using rank correlation. This method is in a general way described
for instance in Embrechts et al. (2005, Section 5.5.1). To illustrate the application of Theorem 1 for this method consider that the parameter θ is one-dimensional. Then the method of
the inversion of Kendall’s tau is a very popular method of estimating the unknown parameter.
For this method the estimator of θ is given by
θbn(ik) = τ −1 (b
τn ),
where
Z
1Z 1
C(u1 , u2 ; θ) dC(u1 , u2 ; θ) − 1
τ (θ) = 4
0
0
is the theoretical Kendall’s tau and τbn is an estimate of Kendall’s tau. In our settings the
Kendall’s tau would be computed from the estimated residuals (b
ε1i , εb2i ) for which wni > 0.
By Theorem 1 and Hadamard differentiability of Kendall’s tau proved in Veraverbeke et al.
(2011, Lemma 1), the estimators of Kendall’s tau based on εbji or on εji are asymptotically
equivalent. Thus provided that τ 0 (θ) 6= 0 one gets that
n
o
d
√
2
τ
n θbn(ik) − θ −−−→ N 0, [τ 0σ(θ)]
where στ2 = var 8 C(U11 , U21 ; θ) − 4 U11 − 4 U21 ,
2 ,
n→∞
and
(8)
U11 , U21 = F1ε (ε11 ), F2ε (ε21 ) .
Analogously one can show that working with residuals has asymptotically negligible effects
also for the method of moments introduced in Brahimi and Necir (2012).
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
8
2.2.2. Minimum distance estimation. Here one can follow for instance Tsukahara (2005, Section 3.2). Note that thanks to Theorem 1 the proof of Theorem 3 of Tsukahara (2005) does not
(or)
en . Thus provided assumptions (B.1)-(B.5) of Tsukahara
change when Cn is replaced with C
1 ,u2 ;θ)
(2005) are satisfied with δ(u1 , u2 ; θ) = ∂C(u∂θ
, then the estimator defined as
ZZ
(md)
en (u1 , u2 ) − C(u1 , u2 ; t) 2 du1 du2
θbn
= arg min
C
[0,1]2
t∈Θ
is asymptotically normal and satisfies
√ (md)
d
n θbn − θ −−−→ N 0p , Σ(md) ,
n→∞
where
(md)
Σ
ZZ
= var
[0,1]2
h
γ(u1 , u2 ; θ) 1{U11 ≤ u1 , U21 ≤ u2 }
−
2
X
C (j) (u1 , u2 ; θ) 1{Uj1
)
i
≤ uj } du1 du2 ,
j=1
with
#−1
" ZZ
δ(v1 , v2 ; θ) δ T (v1 , v2 ; θ) dv1 dv2
γ(u1 , u2 ; θ) =
δ(u1 , u2 ; θ).
[0,1]2
2.2.3. M-estimator, rank approximate Z-estimators. To define a general M -estimator let us
introduce
e1i , U
e2i = Wn Fb1bε εb1i , Fb2bε εb2i
U
(9)
Wn +1
n
that can be viewed as estimates of the unobserved (U1i , U2i ). Note that the multiplier WWn +1
e1i , U
e2i bounded away
is introduced in order to have both of the coordinates of the vector U
from zero and one. The M -estimator of the parameter θ is now defined as
θbn = arg min
t∈Θ
n
X
e1i , U
e2i ; t
wni ρ U
i=1
where ρ(u1 , u2 ; θ) is a given loss function. This class of estimators includes among others the
(pl)
pseudo-maximum likelihood estimators (θb ), for which ρ(u1 , u2 ; θ) = − log c(u1 , u2 ; θ), with
n
c(·) being the copula density function.
Note that the estimator θbn is usually searched for as a solution to the estimating equations
(10)
n
X
e1i , U
e2i ; θbn = 0p ,
wni φ U
i=1
where φ(u1 , u2 ; θ) = ∂ρ(u1 , u2 ; θ)/∂θ. In Tsukahara (2005) the estimator defined as the
solution of (10) is called a rank approximate Z-estimator.
A COPULA APPROACH FOR DEPENDENCE MODELING
9
In what follows we give general assumptions under which there exists a consistent root
(θbn ) of the estimating equations (10) that is asymptotically equivalent to the consistent root
(or)
(θb ) of the ‘oracle’ estimating equations given by
n
n
X
b1i , U
b2i ; θb(or) = 0p ,
φ U
n
(11)
i=1
where
b1i , U
b2i =
U
(12)
n
n+1
Fb1ε (ε1i ), Fb2ε (ε2i )
are the standard pseudo-observations calculated from the unobserved innovations and their
marginal empirical distribution functions Fbjε (y).
Unfortunately, these general assumptions exclude some useful models (e.g. pseudo-maximum likelihood estimator in the Clayton family of copulas) for which the function φ(u1 , u2 ; θ)
viewed as a function of (u1 , u2 ) is unbounded. The reason is that for empirical distribution
functions calculated from estimated residuals εbji we lack some of the sophisticated results
for an empirical distribution function calculated from (true) innovations εji . For such copula
families one can use for instance the Method-of-Moments using rank correlation (see Section 2.2.1) to stay on the safe side. Nevertheless the simulation study in Section 3 suggests
that the pseudo-maximum likelihood estimation can be used also for the Clayton copula (and
probably also for other families of copulas with non-zero tail dependence) provided that the
dependence is not very strong.
Regularity assumptions. In what follows let θ stand for the true value of the parameter and
V (θ) for an open neighbourhood of θ.
(Id) θ is a unique minimizer of the function r(t) = E ρ(U1i , U2i ; t) and θ is an inner point
of Θ.
(φ) There exists V (θ) such that for each l1 , l2 ∈ {1, . . . , p} the functions φl1 (u1 , u2 ; t) =
∂φ(u1 ,u2 ;t)
1 ,u2 ;t)
and φl1 ,l2 (u1 , u2 ; t) = ∂φ(u
∂tl1
∂tl1 ∂tl2 are for each t ∈ V (θ) continuous in (u1 , u2 )
and of uniformly bounded Hardy-Kraus variation (see e.g., Berghaus et al., 2017).
(j)
(φ ) There exists V (θ) and a function h(u1 , u2 ) such that for each t ∈ V (θ)
(j)
(j)
max max φl (u1 , u2 ; t) ≤ h(u1 , u2 ), where φl (u1 , u2 ; t) =
j=1,2 l=1,...,p
∂φl (u1 ,u2 ;t)
∂uj
and E h(U11 , U21 ) < ∞.
2 ;t)
(Γ) Each element of the (matrix) function Γ(t) = E ∂φ(U∂t1 ,U
is a continuous function
T
and the matrix Γ = Γ(θ) is positively definite.
Theorem 2. Suppose that the assumptions of Theorem 1 are satisfied and that also (Id),
(φ), (φ(j) ), and (Γ) hold. Then with probability going to one there exists a consistent root θbn
10
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
of the estimating equations (10), which satisfies
√
d
(13)
n θbn − θ −−−→ Np 0p , Γ−1 Σ Γ−1 ,
n→∞
where
(
ZZ
Σ = var φ U11 , U21 ; θ +
ZZ
+
1{U11 ≤ v1 } − v1
1{U21 ≤ v2 } − v2
∂φ(v1 ,v2 ;θ)
∂v1
dC(v1 , v2 ; θ)
)
∂φ(v1 ,v2 ;θ)
∂v2
dC(v1 , v2 ; θ) .
The proof of Theorem 2 is given in Appendix B. Note that the asymptotic distribution of
the estimator θbn coincides with the distribution given in Section 4 of Genest et al. (1995)
(or)
that corresponds to the consistent root θb
of the estimating equations (11). Thus using
n
the residuals instead of the true innovations has asymptotically negligible effect on the (first(or)
order) asymptotic properties. In fact, it can be even shown that both θbn and θb
have the
n
same asymptotic representations and thus
√
(or)
n θbn − θbn
= oP (1).
2.3. Goodness-of-fit testing. When modeling multivariate data using copulas parametrically one needs to choose a suitable family of copulas. When choosing the copula family tests
of goodness-of-fit are often a useful tool. Thus we are interested in testing H0 : C ∈ C0 , where
C0 = {Cθ , θ ∈ Θ} is a given parametric family of copulas.
Many testing methods have been proposed (see e.g. Genest et al., 2009; Kojadinovic and
Holmes, 2009, and the references therein). The most standard ones are based on the comparison of nonparametric and parametric estimators of a copula. For instance the Cramér-von
Mises statistics is given by
ZZ
en (u1 , u2 ) − C(u1 , u2 ; θbn ) 2 dC
en (u1 , u2 ),
(14)
Sn =
C
where θbn is an estimate of the unknown parameter θ. As the asymptotic distributions of
en (u1 , u2 ) and θbn are the same as the asymptotic distribution of C
en(or) (u1 , u2 ) and θb(or)
C
n
we suggest that the significance of the test statistic can be assessed in the same way as in
i.i.d. settings. Thus one can use for instance the parametric bootstrap by simply generating
independent and identically distributed observations from the copula function C(u1 , u2 ; θbn ).
The test statistic is then simply recalculated from this observations in the same way as if
we directly observed the innovations. The only difference is that instead of generating n
observations we recommend to generate only Wn observations.
A COPULA APPROACH FOR DEPENDENCE MODELING
11
Similar remarks hold when testing other hypotheses about the copula such as symmetry, for
instance. Note that testing H0 : C(u1 , u2 ) ≡ u1 u2 provides a test for conditional independence
of the two time series, given the covariate.
3. Simulation study
A small Monte Carlo study was conducted in order to compare the semiparametric estimators based on the residuals with the ‘oracle’ estimators based on (unobserved) innovations.
The inversion of Kendall’s tau (IK) method and the maximum pseudo-likelihood (MPL)
method were considered for the following five copula families: Clayton, Frank, Gumbel, normal, and Student with 4 degrees of freedom. The values of the parameters are chosen so that
they correspond to the Kendall’s tau τ = 0.25, 0.50 and 0.75. The data were simulated from
the following four models:
(Model 1)
Y1i = 0.5(Xi + 1)2 + e1+0.1Xi ε1i ,
Y2i = 0.8(Xi − 1)2 + e1+0.2Xi ε2i ,
(Model 2)
Y1i = 0.7Y1,i−1 + ε1i ,
Y2i = −0.5Y2,i−1 + ε2i ,
(Model 3)
(Model 4)
zY1i = 0.5
Y1,i−1
+ ε1i ,
2
1 + 0.1Y1,i−1
Y1i = σ1i ε1i ,
2
2
σ1i
= 1 + 0.3Y1,i−1
,
Y2i = −0.4Y2,i−1 + ε2i ,
Y2i = σ2i ε2i ,
2
2
σ2i
= 5 + 0.2Y2,i−1
,
where the innovations εji , j = 1, 2, follow marginally the standard normal distribution, and
Xi is an exogenous variable following the ARMA model Xt = 0.5Xt−1 + ξt + 0.4ξt−1 with
ξi being i.i.d. from a standard normal distribution. The simulations were conducted also for
innovations εji , j = 1, 2 with Student marginals with 5 degrees of freedom but the results are
similar. For brevity of the paper we do not present them here.
The nonparametric estimates m
b j and σ
bj are constructed as local polynomial estimators of
order p = 1 with K being the triweight kernel and the bandwidth hn chosen by the crossvalidation method for each estimate separately. The bandwidth is chosen from the interval
(0, H), where H is the range of the corresponding explanatory variable. Finally, cn = log n.
For each setting, we compute the estimate of the copula parameter θ from the true (but
(ik,or)
unobserved) innovations using the inversion of Kendall’s tau method (θbn
) and the max(pl,or)
imum pseudo-likelihood method (θbn
). These oracle estimators are compared with their
(ik)
(pl)
counterparts computed from the residuals (θbn ) and (θbn ). The performance of the estimators is measured by the bias, variance (VAR) and the mean square error (MSE), which are
estimated from the 1 000 random samples. Finally, the sample sizes n = 200, 500 and 1000 are
considered. The obtained results are listed for the five copulas separately in Tables 1,2,3,4 and
(ik)
(pl)
5. As θbn and θbn are natural competitors, the bigger of the two corresponding performance
measures (bias, VAR, MSE) is stressed by the bold font.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
12
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
0.008
0.019
0.019
0.008
0.008
0.009
-0.001
0.005
0.005
0.026
0.015
0.016
0.019
0.007
0.008
0.007
0.004
0.004
(ik,or)
θbn
(pl,or)
θbn
0.022
0.066
0.067
0.019
0.027
0.028
0.003
0.015
0.016
0.027
0.054
0.054
0.017
0.024
0.024
0.002
0.014
0.014
(ik,or)
θbn
(pl,or)
θbn
0.052
0.383
0.386
0.055
0.162
0.165
0.014
0.084
0.085
-0.065
0.287
0.291
-0.029
0.126
0.126
-0.036
0.073
0.075
(ik)
θbn
(pl)
θbn
0.014
0.029
0.029
0.005
0.011
0.011
0.002
0.005
0.005
0.027
0.023
0.023
0.010
0.009
0.009
0.002
0.004
0.004
(ik)
θbn
(pl)
θbn
0.007
0.104
0.104
-0.004
0.039
0.039
-0.006
0.019
0.019
-0.058
0.080
0.084
-0.057
0.031
0.034
-0.047
0.016
0.018
-0.158
0.569
0.594
-0.123
0.223
0.238
-0.098
0.107
0.117
-0.723
0.509
1.032
-0.566
0.237
0.557
-0.443
0.151
0.347
0.005
0.029
0.029
0.004
0.010
0.010
-0.002
0.005
0.005
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
τ
0.25
1
n = 500
0.50
0.50
0.75
0.75
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.018
0.023
0.023
0.013
0.008
0.009
0.003
0.004
0.004
-0.034
0.096
0.097
-0.006
0.033
0.033
-0.010
0.017
0.017
-0.092
0.077
0.086
-0.038
0.028
0.030
-0.028
0.015
0.016
-0.485
0.522
0.757
-0.194
0.205
0.243
-0.120
0.099
0.113
-1.166
0.481
1.842
-0.592
0.209
0.559
-0.368
0.105
0.240
0.003
0.028
0.028
0.002
0.010
0.010
-0.004
0.005
0.005
0.016
0.023
0.023
0.011
0.008
0.009
0.002
0.004
0.004
0.095
0.096
-0.012
0.033
0.033
-0.016
0.017
0.017
-0.093
0.077
0.086
-0.047
0.028
0.030
-0.036
0.015
0.016
-0.488
0.495
0.733
-0.242
0.189
0.247
-0.168
0.092
0.120
-1.128
0.427
1.699
-0.648
0.177
0.597
-0.432
0.094
0.281
0.005
0.030
0.030
0.004
0.010
0.010
-0.003
0.005
0.005
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
-0.037
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
MSE
0.016
0.024
0.024
0.010
0.009
0.009
0.000
0.004
0.004
-0.018
0.099
0.099
-0.004
0.033
0.033
-0.011
0.016
0.017
-0.083
0.079
0.086
-0.050
0.028
0.030
-0.046
0.015
0.017
-0.233
0.542
0.596
-0.098
0.200
0.209
-0.088
0.091
0.099
-0.837
0.421
1.122
-0.517
0.185
0.452
-0.402
0.102
0.264
Table 1. Estimation for Clayton copula.
In agreement with the results of Genest et al. (1995) and Tsukahara (2005) the results for
the (oracle) estimates based on (unobserved) innovations are in favour of MPL method. This
continues to hold also when working with estimated residuals provided that the dependence
is not very strong (i.e. τ = 0.25 or τ = 0.50). But if the dependence is strong (i.e. τ = 0.75)
then one should consider using the IK method. This seems to be true in particular for the
Clayton copula and to some extent also to the Frank copula and the Gumbel copula. A closer
inspection of the results reveals that while the variance of MPL method is almost always
slightly smaller than the variance of the IK method, the bias can be substantially larger. On
A COPULA APPROACH FOR DEPENDENCE MODELING
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
MSE
0.25
(ik,or)
θbn
(pl,or)
θbn
0.026
0.142
0.143
-0.006
0.071
0.071
0.012
0.037
0.037
0.032
0.142
0.143
-0.002
0.071
0.071
0.013
0.037
0.037
(ik,or)
θbn
(pl,or)
θbn
0.044
0.237
0.239
-0.001
0.117
0.117
0.018
0.062
0.063
0.044
0.234
0.236
0.000
0.116
0.116
0.017
0.061
0.062
(ik,or)
θbn
(pl,or)
θbn
0.073
0.774
0.780
0.009
0.388
0.388
0.038
0.199
0.201
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
τ
0.25
1
n = 500
13
0.50
0.50
0.75
0.75
-0.031
0.758
0.759
-0.040
0.377
0.379
0.006
0.197
0.197
(ik)
θbn
(pl)
θbn
-0.017
0.218
0.218
-0.010
0.091
0.091
-0.009
0.043
0.043
-0.005
0.218
0.218
-0.005
0.091
0.091
-0.005
0.043
0.043
(ik)
θbn
(pl)
θbn
-0.059
0.358
0.362
-0.043
0.151
0.153
-0.024
0.072
0.073
-0.055
0.349
0.352
-0.040
0.149
0.150
-0.023
0.072
0.072
(ik)
θbn
(pl)
θbn
-0.424
1.225
1.405
-0.287
0.509
0.591
-0.168
0.244
0.272
-0.555
1.154
1.462
-0.336
0.499
0.611
-0.192
0.242
0.278
(ik)
θbn
(pl)
θbn
-0.018
0.221
0.222
-0.020
0.085
0.085
0.002
0.041
0.041
-0.010
0.222
0.222
-0.016
0.085
0.085
0.004
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.093
0.366
0.375
-0.054
0.140
0.143
-0.014
0.070
0.070
-0.093
0.361
0.369
-0.055
0.138
0.141
-0.016
0.069
0.069
(ik)
θbn
(pl)
θbn
-0.899
1.390
2.198
-0.415
0.513
0.685
-0.195
0.252
0.290
-1.048
1.325
2.424
-0.481
0.501
0.732
-0.234
0.250
0.305
0.041
(ik)
θbn
(pl)
θbn
-0.021
0.222
0.222
-0.025
0.085
0.085
-0.001
0.041
-0.012
0.223
0.223
-0.020
0.085
0.085
0.000
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.107
0.359
0.371
-0.070
0.139
0.143
-0.028
0.069
0.070
-0.108
0.354
0.366
-0.071
0.137
0.142
-0.030
0.068
0.069
-0.930
1.298
2.163
-0.511
0.492
0.753
-0.291
0.238
0.323
(ik)
θbn
(pl)
θbn
-1.076
1.219
2.376
-0.575
0.479
0.810
-0.331
0.236
0.345
(ik)
θbn
(pl)
θbn
-0.015
0.230
0.230
-0.022
0.084
0.085
0.000
0.041
0.041
-0.006
0.230
0.230
-0.017
0.084
0.085
0.002
0.041
0.041
(ik)
θbn
(pl)
θbn
-0.059
0.381
0.385
-0.053
0.142
0.144
-0.017
0.070
0.070
-0.058
0.375
0.379
-0.053
0.140
0.143
-0.018
0.069
0.069
-0.483
1.353
1.587
-0.259
0.511
0.578
-0.144
0.238
0.258
-0.632
1.267
1.667
-0.317
0.493
0.594
-0.176
0.233
0.264
(ik)
θbn
(pl)
θbn
Table 2. Estimation for Frank copula.
the other hand the results suggest that for the normal and the Student copula one can stay
with MPL method even in case of a strong dependence.
Finally note that for large sample sizes the performance of the estimates based on residuals
is usually almost as good as of the oracle estimates based on (unobserved) innovations. But
there is still some price to pay even for the sample size n = 1000 and this price relatively
increases with the level of dependence. The question for possible further research is how to
explain the bad performance of PML method when based on residuals for the Clayton copula
with a strong dependence.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
14
n = 200
Known innovations
Model
estim
bias
VAR
MSE
bias
VAR
MSE
bias
VAR
MSE
0.25
(ik,or)
θbn
(pl,or)
θbn
0.057
0.047
0.047
0.007
0.022
0.022
0.011
0.013
0.013
0.142
0.047
0.049
0.062
0.021
0.022
0.040
0.012
0.012
(ik,or)
θbn
(pl,or)
θbn
0.103
0.153
0.154
0.034
0.069
0.069
0.024
0.040
0.040
0.207
0.148
0.152
0.109
0.066
0.067
0.057
0.037
0.037
(ik,or)
θbn
(pl,or)
θbn
0.211
0.799
0.804
0.098
0.359
0.360
0.040
0.201
0.201
0.026
0.713
0.713
0.055
0.321
0.321
-0.034
0.173
0.174
0.25
0.50
0.50
0.75
0.75
0.25
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
n = 1000
tau
0.25
1
n = 500
0.50
0.50
0.75
0.75
(ik)
θbn
(pl)
θbn
0.080
0.074
0.074
0.026
0.028
0.028
-0.023
0.014
0.014
0.173
0.067
0.070
0.062
0.026
0.027
0.003
0.013
0.013
(ik)
θbn
(pl)
θbn
0.025
0.243
0.243
-0.006
0.089
0.089
-0.070
0.045
0.046
0.042
0.218
0.219
-0.038
0.082
0.082
-0.106
0.043
0.044
-0.595
1.227
1.262
-0.386
0.442
0.457
-0.394
0.235
0.250
-1.607
1.038
1.296
-1.228
0.411
0.562
-1.041
0.259
0.367
0.013
0.068
0.068
-0.018
0.027
0.027
-0.002
0.014
0.014
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.099
0.066
0.067
0.034
0.026
0.026
0.026
0.013
0.013
-0.158
0.227
0.230
-0.095
0.083
0.084
-0.041
0.044
0.044
-0.152
0.211
0.213
-0.070
0.079
0.079
-0.037
0.041
0.041
(ik)
θbn
(pl)
θbn
-2.175
1.182
1.655
-0.986
0.451
0.548
-0.532
0.236
0.265
-3.347
1.019
2.139
-1.537
0.425
0.661
-0.918
0.216
0.300
(ik)
θbn
(pl)
θbn
0.003
0.067
0.067
-0.023
0.027
0.027
-0.007
0.014
0.014
0.086
0.066
0.066
0.029
0.026
0.026
0.018
0.013
0.013
(ik)
θbn
(pl)
θbn
-0.173
0.227
0.230
-0.119
0.082
0.083
-0.064
0.044
0.044
-0.165
0.210
0.213
-0.095
0.078
0.079
-0.063
0.040
0.041
(ik)
θbn
(pl)
θbn
-2.118
1.150
1.598
-1.154
0.444
0.577
-0.733
0.223
0.277
-3.150
0.988
1.980
-1.667
0.406
0.684
-1.105
0.200
0.322
0.015
0.069
0.069
-0.017
0.027
0.027
-0.006
0.014
0.014
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.093
0.068
0.068
0.030
0.026
0.026
0.012
0.013
0.013
-0.061
0.234
0.234
-0.069
0.085
0.085
-0.042
0.044
0.045
-0.081
0.210
0.211
-0.064
0.079
0.080
-0.073
0.040
0.041
-0.713
1.268
1.319
-0.429
0.453
0.471
-0.291
0.223
0.231
-1.736
1.087
1.389
-0.965
0.399
0.492
-0.740
0.198
0.253
Table 3. Estimation for Gumbel copula (10 multiples of BIAS, VAR and MSE).
4. Application
To illustrate the proposed methods let us consider daily log returns of USD/CZK (US
Dollar/Czech Koruna) and GBP/CZK (British Pound/Czech Koruna) exchange rates from
4th January 2010 to 31st December 2012. Note that we take only data till the end of 2012
(total of 758 observations for each series), because in November 2013 the Czech National
Bank started its intervention aimed at CZK/EUR exchange rate, and this might violate the
assumption of stationarity and independence for more recent data.
A COPULA APPROACH FOR DEPENDENCE MODELING
n = 200
Known innovations
Model
tau
estim
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
-0.051
0.710
(ik,or)
θbn
(pl,or)
θbn
-0.052
0.418
(ik,or)
θbn
(pl,or)
θbn
(ik)
θbn
(pl)
θbn
0.25
0.50
0.50
0.75
0.75
0.25
0.25
1
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
0.50
0.50
0.75
0.75
n = 500
MSE
bias
VAR
0.290
0.290
-0.072
0.262
0.267
0.388
0.103
0.103
-0.052
0.087
0.089
0.242
-0.031
0.009
0.009
-0.049
0.008
0.008
-0.580
0.439
0.273
0.402
(ik)
θbn
(pl)
θbn
-0.644
-0.264
(ik)
θbn
(pl)
θbn
-0.406
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
15
n = 1000
MSE
bias
VAR
MSE
0.141
0.141
-0.041
0.071
0.071
0.127
0.129
0.224
0.061
0.062
0.050
0.050
-0.029
0.026
0.026
0.043
0.043
0.139
0.021
0.021
-0.022
0.005
0.005
-0.010
0.002
0.002
-0.021
0.004
0.004
-0.011
0.002
0.002
0.443
-0.130
0.171
0.172
0.026
0.087
0.087
0.403
0.183
0.155
0.156
0.144
0.077
0.077
0.163
0.167
-0.234
0.064
0.064
-0.084
0.031
0.031
0.142
0.142
-0.168
0.055
0.055
-0.116
0.027
0.027
0.016
0.018
-0.209
0.006
0.007
-0.115
0.003
0.003
-0.676
0.016
0.020
-0.483
0.007
0.009
-0.336
0.003
0.004
-0.476
0.452
0.454
-0.287
0.161
0.162
-0.179
0.079
0.079
0.530
0.413
0.416
0.200
0.149
0.150
0.098
0.068
0.068
-0.912
0.169
0.177
-0.402
0.060
0.062
-0.228
0.028
0.029
-0.349
0.142
0.143
-0.122
0.052
0.052
-0.074
0.023
0.023
-1.061
0.022
0.033
-0.441
0.007
0.009
-0.224
0.003
0.003
-1.246
0.021
0.036
-0.526
0.006
0.009
-0.267
0.002
0.003
(ik)
θbn
(pl)
θbn
-0.530
0.448
0.451
-0.343
0.162
0.163
-0.216
0.079
0.079
0.469
0.409
0.412
0.137
0.150
0.150
0.060
0.068
0.068
(ik)
θbn
(pl)
θbn
-0.967
0.168
0.177
-0.489
0.059
0.062
-0.291
0.028
0.029
-0.401
0.138
0.140
-0.219
0.051
0.052
-0.133
0.023
0.024
(ik)
θbn
(pl)
θbn
-1.013
0.020
0.030
-0.504
0.006
0.009
-0.290
0.003
0.004
-1.179
0.019
0.032
-0.580
0.006
0.009
-0.328
0.002
0.003
-0.425
0.478
0.480
-0.352
0.166
0.168
-0.200
0.080
0.080
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
0.528
0.438
0.440
0.092
0.154
0.154
0.035
0.069
0.069
-0.648
0.180
0.185
-0.387
0.061
0.062
-0.238
0.029
0.029
-0.125
0.150
0.151
-0.174
0.053
0.054
-0.138
0.024
0.024
-0.407
0.019
0.021
-0.206
0.006
0.006
-0.131
0.003
0.003
-0.565
0.017
0.020
-0.301
0.005
0.006
-0.197
0.002
0.003
Table 4. Estimation for normal copula (100 multiples of BIAS, VAR and MSE).
Daily foreign exchange rates have been successfully modelled using the nonparametric
autoregression, e.g., in Härdle et al. (1998) and Yang et al. (1999). Here, we apply a simple
model of two separate nonparametric autoregressions of order 1 and search for a feasible
copula for the innovations. The conditional means and variances are modelled using local
polynomials with degree p = 1. The smoothing parameters are chosen using the crossvalidation (CV) method as 0.038, 0.061, 0.025, 0.056 for mU SD , mGBP , σU SD , and σGBP
respectively. The fitted conditional means and standard deviations are plotted together with
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
16
n = 200
Known innovations
Model
tau
estim
bias
VAR
0.25
(ik,or)
θbn
(pl,or)
θbn
-0.276
0.309
(ik,or)
θbn
(pl,or)
θbn
-0.184
0.185
(ik,or)
θbn
(pl,or)
θbn
(ik)
θbn
(pl)
θbn
-0.303
0.294
(ik)
θbn
(pl)
θbn
-0.491
-0.268
(ik)
θbn
(pl)
θbn
0.25
0.50
0.50
0.75
0.75
0.25
0.25
1
0.50
0.50
0.75
0.75
0.25
0.25
2
0.50
0.50
0.75
0.75
0.25
0.25
3
0.50
0.50
0.75
0.75
0.25
0.25
4
0.50
0.50
0.75
0.75
n = 500
MSE
bias
VAR
0.350
0.351
-0.051
0.351
0.352
0.267
0.130
0.130
-0.032
0.119
0.120
0.143
-0.066
0.013
0.013
-0.098
0.011
n = 1000
MSE
bias
VAR
MSE
0.179
0.179
-0.131
0.093
0.093
0.176
0.176
0.064
0.092
0.092
0.067
0.067
-0.084
0.035
0.035
0.061
0.061
0.033
0.032
0.032
-0.015
0.006
0.006
-0.028
0.003
0.003
0.011
-0.046
0.005
0.005
-0.041
0.003
0.003
0.513
0.514
-0.139
0.210
0.210
-0.239
0.113
0.114
0.514
0.514
0.084
0.207
0.208
-0.081
0.112
0.112
0.204
0.206
-0.256
0.079
0.080
-0.249
0.042
0.043
0.183
0.183
-0.231
0.072
0.073
-0.236
0.040
0.040
-0.396
0.022
0.024
-0.230
0.008
0.009
-0.178
0.004
0.005
-0.641
0.020
0.024
-0.435
0.007
0.009
-0.327
0.004
0.005
(ik)
θbn
(pl)
θbn
-0.995
0.520
0.529
-0.230
0.209
0.210
-0.254
0.103
0.104
-0.423
0.526
0.528
0.070
0.209
0.209
-0.094
0.102
0.102
(ik)
θbn
(pl)
θbn
-1.235
0.201
0.216
-0.381
0.081
0.082
-0.276
0.039
0.040
-1.067
0.189
0.201
-0.317
0.074
0.075
-0.232
0.036
0.037
-1.214
0.028
0.043
-0.449
0.009
0.011
-0.251
0.004
0.005
-1.594
0.027
0.052
-0.651
0.009
0.013
-0.356
0.004
0.005
0.104
(ik)
θbn
(pl)
θbn
(ik)
θbn
(pl)
θbn
-1.061
0.515
0.526
-0.305
0.210
0.210
-0.308
0.104
-0.469
0.521
0.524
-0.028
0.209
0.209
-0.163
0.102
0.102
(ik)
θbn
(pl)
θbn
-1.302
0.202
0.219
-0.466
0.081
0.083
-0.361
0.040
0.041
-1.113
0.190
0.203
-0.416
0.075
0.076
-0.331
0.037
0.038
(ik)
θbn
(pl)
θbn
-1.162
0.026
0.039
-0.508
0.009
0.012
-0.328
0.004
0.005
-1.475
0.024
0.046
-0.686
0.008
0.013
-0.434
0.004
0.005
(ik)
θbn
(pl)
θbn
-0.881
0.525
0.533
-0.175
0.215
0.216
-0.278
0.103
0.104
-0.243
0.530
0.531
0.071
0.215
0.215
-0.157
0.101
0.101
(ik)
θbn
(pl)
θbn
-0.902
0.202
0.210
-0.291
0.082
0.083
-0.277
0.039
0.040
-0.658
0.191
0.196
-0.254
0.077
0.078
-0.282
0.036
0.037
-0.503
0.023
0.025
-0.197
0.009
0.009
-0.153
0.004
0.004
-0.734
0.021
0.026
-0.359
0.008
0.009
-0.268
0.003
0.004
(ik)
θbn
(pl)
θbn
Table 5. Estimation for Student copula (100 multiples of BIAS, VAR and MSE).
the data in Figure 1. It is visible that the conditional mean functions are rather flat and
range around zero.
We use the goodness-of-fit test proposed in Section 2.3 in order to decide which copula
should be used for modelling the innovations from the two autoregressions. The significance of
the test statistics is assessed with the help of the bootstrap test based on B = 999 bootstrap
samples. We test Clayton, Frank, Gumbel, normal and Student copula with 4 degrees of
freedom respectively and obtain p-values 0.001, 0.001, 0.002, 0.062, 0.289. Hence, we conclude
0.02
0.00
−0.01
0.00
GBP
0.01
0.01
0.02
0.03
data
fitted cond. mean
fitted st.dev.
−0.02
−0.03 −0.02 −0.01
USD
17
0.03
A COPULA APPROACH FOR DEPENDENCE MODELING
−0.03
data
fitted cond. mean
fitted st.dev.
0
200
400
600
0
200
Time
400
600
Time
Figure 1. Fitted conditional mean and variance for the analyzed log returns.
1.0
that the Student copula seems to be the best choice for the innovations. The normal copula
is also not rejected on the 5% level, but the corresponding p-value is rather borderline, so
the Student copula seems to provide a better fit. The maximum likelihood method estimates
4.693 degrees of freedom and parameter ρ = 0.782. Figure 2 shows plot of pseudo-observations
e1i , U
e2i ) given by (9), together with contours of the fitted Student copula.
(U
●
●
●●●
●
●● ●●
●●
●
●● ●
●
● ●● ●
●
● ●●●●
●
●
●● ●
●●
●
●●
●●
● ● ●●
● ●●●
●
●● ● ● ●
●
●
●
●
● ●●
●
● ●●
● ●
●
●
● ● ●● ●●
●
●
● ●●
● ●
●
●
●
●
●
●
● ●
●
● ●
●
●
●
●
●● ●
●
●
●
●
●
● ●
●
●
●
●
●
●● ●
●
●● ●
●
●
●●
● ●
●
●
●
●● ● ●
●●●
●
● ●
●
●
●
●
●
● ●●
●●
●
●● ●
●
● ●● ●
●
●
● ● ●●
●
●
●
●
●
●
●
●
●
●
● ●
●
● ●● ●
●
●●
●
●
●
●
●
● ●
●
●●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
● ●
●
●
●
●
●● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●●
● ●
●
●
●
●
●
●
●
●●
●
●
●
● ●
● ●●
●●
●
●
● ●
●
●
●
●
●
● ●
●●
●
●● ●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
● ●
●
●
●
●
●
●
● ●
●
●
● ●
●● ●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●
●●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
● ●
●
● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●●
● ●
●
●
●●●
● ●
●
●
●
● ●
●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
● ●
● ● ●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
● ● ● ●
●
●
●
●
●●●
●
●
●
● ●●
● ●
●
●
●
●
●
●
●
● ●
●● ●
●
● ●
●
●
●
●
●
●
● ● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●●
● ●
●
●
●
●
● ●●
●
● ●●●
●
● ●
●
●
● ● ●
●● ●
●●
●
●
●●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●● ●
●
●
●
●
● ●
●
●●
●
●
● ●
●
●
● ●
● ●
●
●
●
●
●
●
● ●
●
●
●
●●
● ●
● ●
●
● ●● ●
●●
●
●
●
●
● ●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
● ● ● ●
●
● ●●
●
●
●
●●●
●●
●
●
●
● ●●
●
●
●
●
●
●
●●●
●
●
● ●
●●●●
●●
●
● ●
●
●
●● ●● ●
●●
●
●
● ● ● ●●● ●
●
●
●
● ●
●● ●
●
●
●
●●●●●
●
●
●● ●
● ● ● ● ●●
●●●
●
●
●
●
●
●
●
0.0
0.2
0.4
0.6
0.8
●
0.0
0.2
0.4
●
0.6
●
●
●●
0.8
1.0
e1i , U
e2i ) given by (9) together with contours
Figure 2. Pseudo-observations (U
of the fitted Student copula (black curves).
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
18
Appendix A - Proof of Theorem 1
P
Recall the definition Wn = nj=1 wnj . Introduce
n
1 X
−1
−1
wni 1 εb1i ≤ F1ε
(u1 ), εb2i ≤ F2ε
(u2 )
Wn
i=1
−1
−1
= Fbεb F1ε
(u1 ), F2ε
(u2 )
b n (u1 , u2 ) =
G
and note that
bn G
b −1 (u1 ), G
b −1 (u2 ) ,
en (u1 , u2 ) = G
C
1n
2n
b 1n and G
b 2n denote the marginals of G
b n . Further G
b n is a distribution function on [0, 1]2
where G
b 1n (0) = G
b 2n (0) = 0. Thus one can make use of the
with the marginals cdfs satisfying G
−1
Hadamard differentiability of the ‘copula mapping’ Φ : G 7→ G(G−1
1 , G2 ) proved in Theorem 2.4 of Bücher and Volgushev (2013) provided we show that the process
√
b n (u1 , u2 ) = n G
b n (u1 , u2 ) − C(u1 , u2 ) , (u1 , u2 ) ∈ [0, 1]2 ,
(A1)
G
converges in distribution in the space `∞ ([0, 1]2 ) to a process G with continuous trajectories
such that G(u, 0) = G(0, u) = G(1, 1) = 0 for each u ∈ [0, 1].
b n . Denote
A1: Decomposition and weak convergence of G
G(or)
n (u1 , u2 ) =
n
1X
−1
−1
(u2 ) ,
(u1 ), ε2i ≤ F2ε
1 ε1i ≤ F1ε
n
i=1
n
X
e (or) (u1 , u2 ) = 1
G
n
Wn
−1
−1
(u2 ) .
(u1 ), ε2i ≤ F2ε
wni 1 ε1i ≤ F1ε
i=1
b n as
Now one can decompose the process G
√
√
√
bn = n G
en + G
e (or) + G(or) ,
bn − G
e (or) + n G
e (or) − G(or) + n G(or) − C = G
(A2) G
n
n
n
n
n
n
(or)
(or)
e n, G
e n and Gn stand for the first, second and third term respectively on the
where G
right-hand side of the first equation in (A2).
In Section A2 it will be shown that the first term on the right-hand side of (A2) satisfies
uniformly in (u1 , u2 ) ∈ [0, 1]2 ,
n h
−1
i
(1) (u , u ) f
X
C
F
(u
)
1
2
1ε
1
F −1 (u )
1ε
e n (u1 , u2 ) =
√
G
ε1i + 1ε 2 1 (ε21i − 1)
n
i=1
n
−1
i
(2)
C (u1 , u2 ) f2ε F2ε (u2 ) X h
F −1 (u )
√
+
ε2i + 2ε 2 2 (ε22i − 1) + oP (1)
(A3)
n
i=1
where (in agreement with the last two conditions in (Fε )) for u1 ∈ {0, 1} the first term on
the right-hand side of (A3) is defined as zero and analogously for u2 ∈ {0, 1}.
A COPULA APPROACH FOR DEPENDENCE MODELING
19
In Section A3, we will show the asymptotic negligibility of the second term on the righthand side of (A2), i.e.
√
e (or) (u1 , u2 ) =
e (or) (u1 , u2 ) − G(or) (u1 , u2 ) = oP (1).
(A4)
sup
G
sup
n G
n
n
n
(u1 ,u2 )∈[0,1]2
(u1 ,u2 )∈[0,1]2
Now combining (A2) with (A3) and (A4) yields that uniformly in (u1 , u2 )
(A5)
b n (u1 , u2 ) = An (u1 , u2 ) + Bn (u1 , u2 ) + oP (1),
G
where
(A6)
n
1 X
√
An (u1 , u2 ) =
1{U1i ≤ u1 , U2i ≤ u2 } − C(u1 , u2 ) ,
n
i=1
n
2
h
1 X X (j)
−1
Bn (u1 , u2 ) = √
C (u1 , u2 ) fjε Fjε
(uj ) εji +
n
−1
Fjε
(uj ) 2
(εji
2
i
− 1) .
i=1 j=1
The asymptotic representation (A5) together with standard techniques yields the weak conb n.
vergence of the process G
Now thanks to Hadamard differentiability of the copula functional and Theorem 3.9.4 of van
der Vaart and Wellner (1996),
√
√
en (u1 , u2 ) − C(u1 , u2 ) = n G
bn G
b −1 (u2 ) − C(u1 , u2 )
b −1 (u1 ), G
n C
2n
1n
(A7)
b n (u1 , u2 ) − C (1) (u1 , u2 )G
b n (u1 , 1) − C (2) (u1 , u2 )G
b n (1, u2 ) + oP (1).
=G
Note that for each (u1 , u2 ) ∈ [0, 1]2
(A8)
Bn (u1 , u2 ) − C (1) (u1 , u2 )Bn (u1 , 1) − C (2) (u1 , u2 )Bn (1, u2 ) = 0.
Further combining (A7) with (A5), (A6) and (A8) gives
√
en (u1 , u2 ) − C(u1 , u2 )
n C
(A9)
= An (u1 , u2 ) − C (1) (u1 , u2 )An (u1 , 1) − C (2) (u1 , u2 )An (1, u2 ) + oP (1).
Now the right-hand side of (A9) coincides with the asymptotic representation of the ‘oracle’
√ (or)
copula process n Cn − C , which implies the statement of Theorem 1.
A2: Showing (A3). Let us introduce the process
n
1 X
Zn (f ) = √
f (X i , ε1i , ε2i ),
n
i=1
that is indexed be the following set of functions
n
F = (x, y1 , y2 ) 7→ 1 x ∈ [−c, c]d 1 y1 ≤ z1 b1 (x) + a1 (x), y2 ≤ z2 b2 (x) + a2 (x) ,
o
c ∈ R+ , z1 , z2 ∈ R, a1 , a2 ∈ G, b1 , b2 ∈ Ge ,
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
20
where, for δ from assumption (Bw) and some ν > d(1 + dδ ),
(A10)
G = a : Rd → R | a ∈ C1d+δ Rd , sup kxkν |a(x)| ≤ 1 ,
x
(A11)
Ge =
d
b:R →R|b∈
e d+δ
C
2
d
R , sup kxkν |b(x) − 1| ≤ 1 .
x
Denote the centred process as
(A12)
Z̄n (f ) = Zn (f ) − E Zn (f ),
f ∈ F,
and note that f may be formally identified by (c, z1 , z2 , a1 , b1 , a2 , b2 ). We will use the notation
f =(c,
ˆ z1 , z2 , a1 , b1 , a2 , b2 ).
Consider the semi-norm given by
Z 1
kf k2,β =
β −1 (u) Q−1
f (u) du,
0
where
β −1 (u) = inf x > 0 : βbxc ≤ u},
Q−1
f (u) = inf x > 0 : P f (ε11 , ε21 , X 1 ) > x ≤ u .
Then completely analogously as in the proof of Lemma 1 in Dette et al. (2009) one can show
that the logarithm of the bracketing number N[ ] (, F, k · k2,β ) can be bounded by
d
d
e k · k2
(A13)
log O(−2d )N[ ] 2 , G, k · k2 N[ ] 2 , G,
= O log() + O −2 ν + d+δ ,
where the rate follows from our Lemma 2 in Appendix C. Further one bracket is sufficient for
≥ 1. Thus by (A13) and because ν > d(1 + dδ ),
Z ∞q
log N[ ] (, F, k · k2,β ) d < ∞.
0
From Dedecker and Louhichi (2002), Section 4.3, it follows that the centred process Z̄n given
by (A12) is asymptotically k.k2,β -equicontinuous.
To apply this result in order to prove (A3) note that
√ X
n
n
n
b 1 (Xi )−m1 (Xi )
−1
i)
e
Gn (u1 , u2 ) =
wni 1 ε1i ≤ F1ε
(u1 ) σσb11 (X
+m
,
(X
)
σ1 (Xi )
i
Wn
i=1
o
m
b 2 (Xi )−m2 (Xi )
−1
i)
ε2i ≤ F2ε
(u2 ) σσb22 (X
+
(Xi )
σ2 (Xi )
−1
−1
−1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 )
and introduce the process
√ X
n
n
o
n
−1
−1
wni 1 ε1i ≤ F1ε
(u1 )bb1 (Xi ) + b
a1 (Xi ), ε2i ≤ F2ε
(u2 )bb2 (Xi ) + b
a2 (Xi )
Ǧn (u1 , u2 ) =
Wn
i=1
n
o
−1
−1
− 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 )
A COPULA APPROACH FOR DEPENDENCE MODELING
21
with b
aj , bbj , j = 1, 2, from Lemma 1 and Remark 3 in Appendix C. Then one obtains by
monotonicity arguments applying Lemma 1(i) that, on an event with probability converging
to one
Wn e
Zn fn` − Zn gn ) ≤
Gn (u1 , u2 ) − Ǧn (u1 , u2 ) ≤ Zn fnu − Zn gn )
n
for some deterministic positive sequence γn = o(n−1/2 ). Here,
−1
−1
−1
−1
fn` =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 − γn , bb1 − γn sign(F1ε
(u1 )), b
a2 − γn , bb2 − γn sign(F2ε
(u2 )) ,
−1
−1
−1
−1
fnu =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 + γn , bb1 + γn sign(F1ε
(u1 )), b
a2 + γn , bb2 + γn sign(F2ε
(u2 )) ,
−1
−1
gn =
ˆ cn , F1ε
(u1 ), F2ε
(u2 ), b
a1 , bb1 , b
a2 , bb2 .
We only consider the upper bound, the lower one can be handled completely analogous. First
note that Zn fnu − Zn gn ) = Z̄n fnu − Z̄n gn ) + Rn , where with probability converging to
one,
√
(A14)
|Rn | ≤ 2 n max
sup
|Fjε (uv + w) − Fjε (u(v + sγn ) + w + γn )| = o(1),
j=1,2
u∈R,s∈{−1,1}
v∈(1/2,1),w∈(−1,1)
where the last equality follows by a Taylor expansion, assumption (Fε ) and γn = o(n−1/2 ).
Now introducing the notation (j = 1, 2)
−1
−1
−1
(A15)
Fjε
(u, x, γ) = Fjε
(u) bbj (x) + γ sign(Fjε
(u)) + b
aj (x) + γ
one can show that for a sufficiently large M similarly as in the proof of Lemma 1 in Dette
et al. (2009)
n
o
−1
−1
kfnu − gn k2,β ≤ M P 1 X 1 ∈ Jn , ε11 ≤ F1ε
(u1 , X 1 , γn ), ε21 ≤ F2ε
(u2 , X 1 , γn )
o
n
−1
−1
(u2 , X 1 , 0) > 0
(u1 , X 1 , 0), ε21 ≤ F2ε
− 1 X 1 ∈ Jn , ε11 ≤ F1ε
−1
−1
(u1 , X 1 , γn )
≤ M P X 1 ∈ Jn , F1ε
(u1 , X 1 , 0) ≤ ε11 ≤ F1ε
−1
−1
+ M P X 1 ∈ Jn , F2ε
(u2 , X 1 , 0) ≤ ε21 ≤ F2ε
(u2 , X 1 , γn )
and this can be bounded by M n−1/2 times the bound on the right hand side of (A14) and
thus converges to zero in probability uniformly in u1 , u2 . From k.k2,β -equicontinuity of Z̄n
one obtains
Z̄n (fnu ) − Z̄n (gn ) = oP (1)
uniformly with respect to u1 , u2 and in combination with (A14) and analogous considerations
for the lower bound Zn fn` − Zn gn ) we obtain
e n (u1 , u2 ) − Ǧn (u1 , u2 ) = oP (1).
sup G
u1 ,u2
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
22
The remaining proof of (A3) is divided into two parts. First we prove that
sup Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = oP (1)
(A16)
u1 ,u2
and then we calculate E∗ [Ǧn (u1 , u2 )]. Here, with slight abuse of notation, E∗ denotes expectation, considering the functions b
aj , bbj as deterministic.
Showing (A16). Note that we have
Ǧn (u1 , u2 ) − E∗ [Ǧn (u1 , u2 )] = Z̄n (fn ) − Z̄n (gn ),
(A17)
where
−1
−1
(u2 ), b
a1 , bb1 , b
a2 , bb2 ,
(u1 ), F2ε
fn = cn , F1ε
−1
−1
(u2 ), 0, 1, 0, 1 ,
(u1 ), F2ε
gn = cn , F1ε
with 0 and 1 standing for functions that are constantly equal to zero and one respectively.
Similarly to before one can show that for a sufficiently large M
i
h
−1
(u1 , X 1 , 0) − u1 1 X 1 ∈ Jn
kfn − gn k2,β ≤ M E F1ε F1ε
i
h
−1
(u2 , X 1 , 0) − u2 1 X 1 ∈ Jn
+ E F2ε F2ε
using notation (A15).
Now note that with Lemma 1 (iii) in Appendix C we obtain kfn − gn k2,β = oP (1) uniformly
in u1 , u2 . Finally with the help of (A17) and the asymptotic k.k2,β -equicontinuity of the
process Z̄n one can conclude (A16).
Calculating E∗ [Ǧn (u1 , u2 )]. With the help of a second-order Taylor series expansion of the
right-hand side one gets
−1
−1
−1
−1
E∗ [Ǧn (u1 , u2 )] = Fε F1ε
(u1 , X, 0), F2ε
(u2 , X, 0) − Fε F1ε
(u1 ), F2ε
(u2 )
=
2
√ X
−1
−1
n
E∗ wn (X) Fε(j) F1ε
(u1 ), F2ε
(u2 ) YjX (uj )
j=1
√
(A18)
+
n
2
2 X
2
X
−1
−1
E∗ wn (X) Fε(j,k) F1ε
(u1X ), F2ε
(u2X ) YjX (uj ) YkX (uk ) ,
j=1 k=1
where
−1
−1
−1
Yjx (u) = Fjε
(u, x, 0) − Fjε
(u) = b
aj (x) + Fjε
(u)(bbj (x) − 1),
j = 1, 2,
A COPULA APPROACH FOR DEPENDENCE MODELING
23
−1
and the point ujx lies between the points Fjε Fjε
(uj , x, 0) and uj . Now using Lemma 1 (iv)
in Appendix C for j = 1, 2
√
−1
−1
n E∗ wn (X) Fε(j) F1ε
(u1 ), F2ε
(u2 ) YjX (uj )
h
i
√
−1
−1
−1
∗ b
+
= n Fε(j) F1ε
(u1 ), F2ε
(u2 ) E∗ b
aj (X)1{X ∈ J+
}
+F
(u
)E
(
b
(X)
−
1)
1
{X
∈
J
}
j
j
n
n
jε
n h
i
1 X
F −1 (uj )
√
εji + jε 2
(ε2ji − 1) + oP (1)
n
i=1
−1
n
i
Fjε (uj ) X h
F −1 (uj )
εji + jε 2
(ε2ji − 1) + oP (1)
−1
−1
F1ε
(u1 ), F2ε
(u2 )
=
Fε(j)
=
C (j) (u1 , u2 ) fjε
√
n
i=1
uniformly in (u1 , u2 ).
To conclude the proof of (A3) we need to show that ‘the second order terms’ in (A18) are
asymptotically negligible. To show that note that by assumption (Fε ) and Lemma 1 (iii)
there exists a finite constant M such that with probability going to one
−1
−1
(uk )
(uj ) 1 + Fkε
1 + Fjε
−1
−1
−1
−1
(uk )
(uj ) 1 + Fkε
(u2x ) 1 + Fjε
(u1x ), F2ε
≤ Fε(j,k) F1ε
−1
−1
(ukx )
(ujx ) 1 + Fkε
1 + Fjε
−1
−1
1 + Fjε
(ujx ) 1 + Fkε
(ukx )
−1
−1
(uk )
(uj ) 1 + Fkε
1 + Fjε
≤M
−1
−1
1 + Fjε
(ujx ) 1 + Fkε
(ukx )
−1
−1
(uk )
(uj ) 1 + Fkε
M 1 + Fjε
≤
1
1
1
1
−1
−1
(uk ) 1 + op (n− 4 ) + op (n− 4 )
(uj ) 1 + op (n− 4 ) + op (n− 4 ) 1 + Fkε
1 + Fjε
−1
−1
(u2x )
(u1x ), F2ε
Fε(j,k) F1ε
≤ 2M
uniformly in (u1 , u2 ) ∈ [0, 1]2 and x ∈ Jn .
Thus to prove
−1
−1
EX wn (X) Fε(j,k) F1ε
(u1X ), F2ε
(u2X ) YjX (uj ) YkX (uk ) = oP (1),
it is sufficient to use once more Lemma 1 (iii).
A3: Showing (A4). Note that with the notation Wn =
Pn
i=1 wni
one can decompose
√
(or)
e (or)
n G
n (u1 , u2 ) − Gn (u1 , u2 )
√
√
(or)
e (or)
= n G
n (u1 , u2 ) − C(u1 , u2 ) − n Gn (u1 , u2 ) − C(u1 , u2 )
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
24
(A19)
=
n
−1 X
−1
−1
√
wni 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 ) − C(u1 , u2 )
n
n
Wn
i=1
n
1 X
−1
−1
+√
(wni − 1) 1 ε1i ≤ F1ε
(u1 ), ε2i ≤ F2ε
(u2 ) − C(u1 , u2 )
n
i=1
1
= Wn − 1 Bn1 (u1 , u2 ) + Bn2 (u1 , u2 ),
where Bn1 (u1 , u2 ) stands for the first term on the right-hand side of the equation (A19)
(except for the factor Wnn − 1) and Bn2 (u1 , u2 ) for the second term. Further using standard
techniques one can show that both Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) viewed as processes on [0, 1]2
are asymptotically equi-continuous. Moreover as
n
−
1
=
o
(1),
and
E
w
(X
)
−
1
= −P(X 1 6∈ Jn ) = o(1),
n
1
P
Wn
one can conclude that both processes W1n − 1 Bn1 (u1 , u2 ) and Bn2 (u1 , u2 ) are uniformly
asymptotically negligible in probability, which together with (A19) implies (A4).
Appendix B - Proof of Theorem 2
Thanks to assumption (φ), the estimator θbn is a solution to the estimating equations (10).
In what follows, first we prove the existence of a consistent root of the estimating equations (10) and then we derive that this root satisfies
(B1)
√
n
1 X b b
n θbn − θ = Γ−1 √
φ U1i , U2i ; θ + oP (1),
n
i=1
b1i , U
b2i ) are introduced in (12). The statement of the theorem now follows for p = 1
where (U
by Proposition A 1(ii) of Genest et al. (1995) and for p > 1 by Theorem 1 of Gijbels et al.
(2017).
en0 (u1 , u2 ) = 1 Pn wni 1 U
e1i ≤ u1 , U
e2i ≤ u2 , where pseudoProving consistency. Put C
i=1
Wn
e1i , U
e2i ) are defined in (9). Note that
observations (U
(B2)
en (u1 , u2 ) − C
e 0 (u1 , u2 ) = OP
C
n
sup
(u1 ,u2 )∈[0,1]2
1
Wn
= OP
1
n
.
Fix l ∈ {1, . . . , p}. By Corollary A.7 of Berghaus et al. (2017) one gets
Z 1Z 1
n
1 X
e
e
en0 (v1 , v2 )
wni φl U1i , U2i ; t =
φl (v1 , v2 ; t) dC
Wn
0
0
i=1
Z 1Z 1
en0 (v1 , v2 ) dφl (v1 , v2 ; t) + φl (1, 1; t
=
C
0
Z
(B3)
−
0
0
1
en0 (v1 , 1) dφl (v1 , 1; t) −
C
Z
0
1
e 0 (1, v2 ) dφl (1, v2 ; t).
C
n
A COPULA APPROACH FOR DEPENDENCE MODELING
25
Note that thanks to assumption (φ(j) ) (uniformly in t ∈ V (θ))
Z 1
Z 1
n
1 X
0
e
1{Ue1i ≤ v1 } dφl (v1 , 1; t)
Cn (v1 , 1) dφl (v1 , 1; t) =
wni
Wn
0
0
i=1
1
=
Wn
Wn
X
i=1
Z
1
i
Wn +1
Z 1
= φl (1, 1; t) −
(B4)
Wn
1 X
φl ( Wni+1 , 1; t)
dφl (v1 , 1; t) = φl (1, 1; t) −
Wn
i=1
φl (v1 , 1; t) dv1 + OP
0
and analogously also
Z 1
Z
en0 (1, v2 ) dφl (1, v2 ; t) = φl (1, 1; t) −
(B5)
C
0
1
Wn
1
φl (1, v2 ; t) dv2 + OP
0
1
Wn
.
Now combining (B3), (B4) and (B5) yields
Z 1Z 1
n
1 X
e
e
e 0 (v1 , v2 ) dφl (v1 , v2 ; t) + Al (t) + OP
(B6)
wni φl U1i , U2i ; t =
C
n
Wn
0
0
1
n
,
i=1
where
(B7)
Al (t) = −φl (1, 1; t +
Z
1
Z
φl (v1 , 1; t) dv1 +
0
1
φl (1, v2 ; t) dv2 .
0
Analogously one gets
(B8)
E φl U11 , U21 ; t =
Z
1Z 1
C(v1 , v2 ) dφl (v1 , v2 ; t) + Al (t).
0
0
Now using (B2), (B6), (B8) and assumption (φ) gives that uniformly in t ∈ V (θ)
n
1 X
e1i , U
e2i ; t − E φl (U11 , U21 ; t)
wni φl U
Wn
i=1
Z 1Z 1
0
e (v1 , v2 ) − C(v1 , v2 ) dφl (v1 , v2 ; t) + OP
=
C
n
0
0
1
n
= oP (1),
where we have used Theorem 1 and assumption (φ). The existence of a consistent root of
estimating equations (10) now follows by assumptions (Id) and (Γ).
Analogously one can show the existence of a consistent root of estimating equations (11).
Showing (B1). Let θbn be a consistent root of the estimating equations (10). Then by the
mean value theorem applied to each coordinate of the vector-valued function
n
1 X
e1i , U
e2i ; t
wni φ U
Ψn (t) =
Wn
i=1
one gets
n
1 X
e1i , U
e2i ; θbn
0p =
wni φ U
Wn
i=1
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
26
n
n
1 X
1 X
∗
e
e
e
e
=
wni φ U1i , U2i ; θ +
wni Dφ U1i , U2i ; θ n θbn − θ ,
Wn
Wn
i=1
i=1
1 ,u2 ;t)
and θ ∗n is between θbn and θ. Note that as the mean value
where Dφ stands for ∂φ(u∂t
∗,p
theorem is applied to a vector valued function there are in fact p different points θ ∗,1
n , . . . , θn
for each coordinate of the function Ψn (t) but all of them are consistent so for simplicity of
notation we do not distinguish them.
Thus to finish the proof of (B1) it is sufficient to show that
n
1 X
e1i , U
e2i ; θ ∗ = Γ + oP (1)
wni Dφ U
n
Wn
(B9)
i=1
and
√ X
n
n
X
n
e1i , U
e2i ; θ = √1
b1i , U
b2i ; θ + oP (1).
wni φ U
φ U
Wn
n
(B10)
i=1
i=1
When proving (B9) one can mimic the proof of consistency of θbn and show that there
exists V (θ) (an open neighbourhood of θ such that)
sup
t∈V (θ)
n
1X
e1i , U
e2i ; t − E Dφ (U11 , U21 ; t) = oP (1).
wni Dφ U
n
i=1
Using the consistency of θbn and assumption (Γ) yields (B9).
0(or)
Thus one can concentrate on proving (B10). Put Cn
b1i , U
b2i ) are defined in (12). Note that
u2 , where (U
(B11)
sup
(u1 ,u2 )∈[0,1]2
(u1 , u2 ) =
1
n
Cn(or) (u1 , u2 ) − Cn0(or) (u1 , u2 ) = OP
Pn
i=1
1
n
1 Ub1i ≤ u1 , Ub2i ≤
.
Analogously as (B6) one can also show that for l = 1, . . . , p
Z 1Z 1
n
1X
b
b
φl U1i , U2i ; θ =
φl (v1 , v2 ; θ) dCn0(or) (v1 , v2 )
n
0
0
i=1
Z 1Z 1
(B12)
=
Cn0(or) (v1 , v2 ) dφl (v1 , v2 ; θ) + Al (θ) + OP
0
0
where Al (θ) is given in (B7).
Now using (B2), (B6), (B11), (B12), Theorem 1 and (φ) one gets
√ X
n
n
n
1 X
e
e
b1i , U
b2i ; θ
wni φl U1i , U2i ; θ − √
φl U
Wn
n
i=1
i=1
Z 1Z 1
√ 0
e (u1 , u2 ) − C 0(or) (u1 , u2 ) dφl (u1 , u2 ; θ) + oP
=
n C
n
n
0
0
which verifies (B10) and finishes the proof of (B1).
√1
n
1
n
,
= oP (1),
A COPULA APPROACH FOR DEPENDENCE MODELING
27
Appendix C - Auxiliary results
Lemma 1. Assume that (β), (Fε ), (M), (FX ), (Bw), (k), (Jn ) and (mσ) are satisfied.
Then there exist random functions b
aj and bbj on Jn such that for j = 1, 2
(i) sup
x∈Jn
m
b j (x) − mj (x)
σ
bj (x) b
−b
aj (x) = oP n−1/2 , sup
− bj (x) = oP n−1/2 ,
σj (x)
x∈Jn σj (x)
(ii) kb
aj kd+δ = oP (1),
aj (x) = oP
(iii) sup b
kbbj − 1kd+δ = oP (1) for δ > 0 from assumption (Bw),
n−1/4 ,
sup bbj (x) − 1 = oP n−1/4 ,
x∈Jn
x∈Jn
Z
(iv)
b
aj (x)fX (x) dx =
Jn
1
n
n
X
εji + oP n−1/2 ,
i=1
n
X
bbj (x) − 1 fX (x) dx = 1
ε2ji − 1 + oP n−1/2 .
2n
Jn
Z
i=1
Proof. For ease of presentation we set j = 1 and assume hn = hn , . . . , hn . We will first
prove the assertions for m
b 1 . The proof basically goes along the lines of the proof of Lemma
1 by Müller et al. (2009), but changes are necessary due to the dependency of observations
in our model and because our covariate density is not assumed to be bounded away from
zero on its support. Recall that I(d, p) denotes the set of multi-indices i = (i1 , . . . , id ) with
i. = i1 + · · · + id ≤ p and we set I = I(d, p), where p is the order of the polynomials used in
the local polynomial estimation.
b denote the solution of the minimizaProof of assertion (i) for m
b 1 . Fix some x ∈ Jn and let β
b satisfies the normal equations
tion problem (4). Then β
X
b = 0 ∀i ∈ I,
b ik (x)β
Ai (x) + Bi (x) −
Q
k
k∈I
where
n
Ai (x) =
1X
σ1 (X ` ) ε1` ψi,hn (X ` − x) Khn (X ` − x),
n
Bi (x) =
n
1X
m1 (X ` )ψi,hn (X ` − x)Khn (X ` − x),
n
`=1
b ik (x) =
Q
1
n
`=1
n
X
ψi,hn (X ` − x) ψk,hn (X ` − x) Khn (X ` − x).
`=1
1/2
From Theorem 2 in Hansen (2008) we obtain for %n = log n/(nhdn )
,
(C1)
b ik (x) − Qik (x) = OP (%n ),
sup Q
x∈Jn
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
28
b ik (x) , i, k ∈ I. Note that
where we define Qik (x) = E Q
Z
Qik (x) = ψi,(1,..1) (u) ψk,(1,..1) (u) fX (x + hn u) K(u) du,
and for x ∈ Jn , consider the matrices Q(x) with entries Qik (x), i, k ∈ I. Analogously put
b
b ik (x), i, k ∈ I.
Q(x)
for the matrix with entries Q
It follows from assumption (FX ) that 0 < λn ≤ aT Q(x) a ≤ Λ < ∞ for all vectors a of
unit Euclidean length, where λn is a sequence of positive real numbers of the same rate as
(1)
αn in assumption (FX ). Thus Q(x) has eigenvalues in the interval [λn , Λ], and on the event
λn
b
En = sup Q(x) − Q(x) ≤
2
x∈Jn
b
b
one has aT Q(x)
a ≥ λn /2 for all a of unit Euclidean length, such that the matrix Q(x)
is
invertible as well. Here and throughout kQk denotes the spectral norm of a matrix Q. Note
(1)
that P(En ) → 1 by (C1) and %n = o αn , which holds under assumption (Bw). For the
remainder of the proof we assume that the event En takes place because its complement does
not matter for the assertions of the lemma. It follows from the normal equations that for
x ∈ Jn ,
b −1 (x) A(x) + B(x) ,
m
b 1 (x) = eT Q
1
where e1 = (1, 0, . . . , 0)T and A(x) and B(x) denote the vectors with components Ai (x) and
Bi (x), i ∈ I, respectively. Now define
−1
b
a1 (x) = eT
1 Q (x)A(x)
(C2)
1
,
σ1 (x)
x ∈ Jn ,
then we have the decomposition
m
b 1 (x) − m1 (x)
−b
a1 (x) = r1 (x) + r2 (x)
σ1 (x)
(C3)
with remainder terms
1
,
σ1 (x)
1
b −1
b
r2 (x) = eT
,
1 Q (x) B(x) − Q(x)β(x)
σ1 (x)
−1
b −1
r1 (x) = eT
1 Q (x) − Q (x) A(x)
where β(x) is the vector with components β i (x) = hi.n Di m1 (x), i ∈ I. From Theorem 2 in
Hansen (2008) we obtain
(C4)
sup Ai (x) = OP (%n ),
i ∈ I.
x∈Jn
For the treatment of the inverse matrices in r1 (x) we use Cramer’s rule and write
b −1 (x) − Q−1 (x) =
Q
T
1
1
b
C(x) T
−
C(x)
b
det Q(x)
det Q(x)
A COPULA APPROACH FOR DEPENDENCE MODELING
29
b
T
T
det Q(x) − det Q(x)
1
b
b
C(x)
− C(x) ,
+
C(x)
b
det Q(x)
det Q(x)
det Q(x)
=
b
b
where C(x)
and C(x) denote the cofactor matrices of Q(x)
and Q(x), respectively. Due to
b
the boundedness of the functions Qik each element of C(x) − C(x) can be absolutely bounded
b
by OP (%n ) by (C1) and the same rate is obtained for det(Q(x)) − det(Q(x))
, uniformly in
|I|
x. Using the lower bound λn for the determinant of Q(x), and assumption (mσ) to bound
1/σ1 gives the rate
(%n )2
(C5)
sup r1 (x) = OP
= oP n−1/2
(1) 2|I| (2)
(αn )
x∈Jn
αn
by assumption (Bw). In order to show negligibility of r2 (x) first note that the spectral
b −1 (x) is given by the reciprocal of the square root of the smallest eigenvalue of
norm of Q
T Q(x).
b
b
Q(x)
With
1/2
λn
Tb
b
b
b
≥ (aT Q(x)T Q(x)a)1/2 − Q(x)
− Q(x) ≥
aT Q(x)
Q(x)a
= Q(x)a
2
b −1
(on En ) for all a with ||a|| = 1, we obtain the rate O(λ−1
n ) for Q (x) . Further, by Taylor
expansion of m1 (X ` ) in the definition of Bi (x) and using assumption (mσ) we have
n
1X
≤ Mn
kX ` − xkp+γ kψi,hn (X ` − x)k Khn (X ` − x)
n
`=1
= O Mn hp+γ
fbX (x),
n
b
Bi (x) − Q(x)β(x)
i
P
where the kernel density estimator fbX (x) = n1 n`=1 Khn (X ` − x) converges to fX (x) uniformly in x ∈ Jn , see Theorem 6 by Hansen (2008). Altogether we have
p+γ
n hn
= oP n−1/2
(C6)
sup r2 (x) = OP M(1)
(2)
αn αn
x∈Jn
using assumption (Bw).
Now assertion (i) for m
b 1 follows from (C2), (C3), (C5) and (C6).
Proof of assertion (ii) for b
a1 .
kb
a1 kd+δ = max sup Di b
a1 (x)
i∈I(d,d) x∈Jn
+ max max
i∈I(d,d)
i.=d
sup
x,x0 ∈Jn
kx−x0 k≤hn
|Di b
a1 (x)
kx
− Dib
a1 (x0 )|
,
− x0 kδ
sup
x,x0 ∈Jn
kx−x0 k>hn
≤ max sup Di b
a1 (x)
i∈I(d,d) x∈Jn
+ max
i∈I(d,d+1)
i.=d+1
sup Di b
a1 (x) h1−δ
+ 2 max sup Di b
a1 (x) h−δ
n
n
x∈Jn
i∈I(d,d)
i.=d
x∈Jn
|Di b
a1 (x)
kx
− Dib
a1 (x0 )|
− x0 kδ
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
30
by the mean value theorem. Again by Theorem 2 of Hansen (2008) we have
sup hi.n Di Ak (x) = OP (%n ),
i ∈ I(d, d + 1).
x∈Jn
Further note that
∂
∂
−1
−1
Q (x) = Q (x)
Q(x) Q−1 (x)
∂xk
∂xk
(1)
and that the spectral norm of Q−1 (x) can be bounded by O 1/αn
before. We apply the product rule for derivatives to obtain
kb
a1 kd+δ ≤ max
j
` X
X
`=1,...,d
+2
OP
j=0 k=0
j
d X
X
OP
j=0 k=0
= OP
%n h−d
n
(1) (2)
αn αn
= OP
%n
(1)
hd+δ
α
n
n αn
`−j
%n h−k
n Mn
(2) `−j+1
(1) j−k+1
(αn )
(αn )
d−j
%n h−k
n Mn
(1) j−k+1
(2) d−j+1
(αn )
(αn )
+
j
d+1 X
X
OP
j=0 k=0
with considerations as
d+1−j
%n h−k
n Mn
(2)
(1) j−k+1
(αn )d−j+2
(αn )
hn1−δ
h−δ
n
−d−1
hn
%n h−d
1−δ
−δ
n
+ OP %n(1)
h
+
O
P
(2)
(1) (2) hn
n
αn αn
αn αn
= oP (1)
(2)
by assumption (Bw). Assertion (ii) for b
a1 follows.
Proof of assertion (iii) for b
a1 . From the definition of b
a1 and (C4) we obtain that
a1 (x) = OP (1)%n (2) = oP n−1/4
sup b
αn αn
x∈Jn
and thus (iii) follows for b
a1 .
Proof of assertion (iv) for b
a1 . To prove (iv) note that
Z
n
1X
ε1i ∆n (X i )
b
a1 (x)fX (x) dx =
n
Jn
i=1
with
Z
1
eT Q−1 (x) ψ hn (X i − x) Khn (X i − x) fX (x) dx
σ1 (x) 1
Z
fX (X i − uhn )
= σ1 (X i )
eT
Q−1 (X i − uhn ) ψ(u) K(u)
du.
1
X i −cn X i +cn
σ1 (X i − uhn )
,
∆n (X i ) = σ1 (X i )
hn
hn
From the support properties of the kernel function it follows that ∆n (X i )1{X i 6∈ J+
n } = 0.
−
d
Further, for Jn = [−cn + hn , cn − hn ] note that
n
(C7)
1X
−
−1/2
ε1i ∆n (X i ) 1{X i ∈ J+
n \ Jn } = oP n
n
i=1
because the expectation is zero and the variance is bounded by
1
1 1
−
2
sup
sup fX (x) E 1 X 1 ∈ J+
n \ Jn σ1 (X 1 )
n x∈Jn σ1 (x) λn x∈Rd
A COPULA APPROACH FOR DEPENDENCE MODELING
≤
31
1 Mn hn
1 1
\ J−
= O (1) (2) = o n−1 .
O (1) (2) Mn P X 1 ∈ J+
n
n
αn αn
αn αn
n
n
It remains to consider
n
1X
ε1i ∆n (X i )1{X i ∈ J−
n },
n
i=1
(1)
(2)
with ∆n (X i ) = ∆n (X i ) + ∆n (X i ), where
Z
−1
(1)
eT
∆n (X i ) =
1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) du,
[−1,1]d
Z
∆(2)
n (X i ) =
[−1,1]d
σ1 (X i )
−1
eT
1 Q (X i − uhn ) ψ(u) K(u) fX (X i − uhn ) σ1 (X i −uhn ) − 1 du.
(2)
Now, by applying the mean value theorem for σ1 , for X i ∈ J−
n , ∆n (X i ) can be bounded
(1) (2)
absolutely by O Mn hn /(αn αn ) = o(1). Thus analogously as when showing (C7) one can
use Markov’s inequality to get
Z
n
n
1X
1X
−
−1/2
b
a1 (x)fX (x) dx −
ε1i =
ε1i ∆(1)
.
n (X i ) − 1 1{X i ∈ Jn } + oP n
n
n
Jn
i=1
i=1
(1)
2
To obtain the desired negligibility it remains to show E ∆n (X i ) − 1 1{X i ∈ J−
n } → 0.
To this end we write
Z
−1
1=
eT
1 Q∗ (x − hn u)ψ(u)K(u)fX (x − hn u) du,
[−1,1]d
where for x ∈ J+
n the matrix Q∗ (x) has entries
Z
Q∗ik (x) = fX (x) ψi (u)ψk (u)K(u) du,
i, k ∈ I.
Note that Q∗ (x) has the smallest eigenvalue of order λn . Thus we obtain the bound
2
−
E ∆(1)
n (X i ) − 1 1{X i ∈ Jn }
Z
−1
−1
eT
=E
1 Q (X i − uhn ) − Q∗ (X i − uhn )
[−1,1]d
ψ(u)K(u)fX (X i − uhn ) du
Z
≤ O(1)
Z
J−
n
[−1,1]d
2
Q−1 (x − uhn ) − Q−1
∗ (x − uhn )
1{X i ∈
2
J−
n}
du fX (x) dx
2
≤ O(1) sup kQ−1 (x)k2 sup kQ−1
∗ (x)k
x∈J+
n
x∈J+
n
Z
J−
n
Z
[−1,1]d
kQ(x − uhn ) − Q∗ (x − uhn )k2 du fX (x) dx.
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
32
Now with bounds for the matrix norms similar to before, and inserting the definitions of Q
and Q∗ we obtain
2
−
E (∆(1)
n (X i ) − 1) 1{X i ∈ Jn }
Z
Z Z
1
|fX (x − uhn + hn v) − fX (x − uhn )|2 K(v) dv du fX (x) dx
≤O
(1) 4
(αn )
=O
J−
n
h2n
(1)
(αn )4
[−1,1]d
[−1,1]d
= o(1)
by the mean value theorem and assumptions (FX ) and (k).
Proof of assertions (i)–(iv) for σ
b1 . Recall the definition σ
b12 = sb1 − m
b 21 , where sb1 is the local
polynomial estimator based on (X i , Y1i2 ), i = 1, . . . , n. With the notation s1 (x) = E[Y1i2 |
X i = x] = σ12 (x) + m21 (x) we obtain
σ
b1 (x)
σ1 (x)
= 1+
sb1 (x) − s1 (x) m
b 1 (x) − m1 (x) m1 (x)
−
+ r(x),
σ1 (x)
σ1 (x)
2σ12 (x)
where
r(x) = −
1 (m
(b
σ12 (x) − σ12 (x))2
b 1 (x) − m1 (x))2
−
.
2
σ12 (x)
2σ12 (x)(b
σ1 (x) + σ1 (x))2
Put
−1
e
b
c1 (x) = eT
1 Q (x)A(x)
1
,
2 σ12 (x)
x ∈ Jn ,
e
where A(x)
denotes the vector with components
n
1 X
e
Ai (x) =
2 m1 (X ` )σ1 (X ` ) ε1` + σ12 (X ` ) ε21` − 1 ψi,hn (X ` − x) Khn (X ` − x),
n
i ∈ I.
`=1
Along the lines of the proof of (i) and (ii) for m
b 1 one can prove that
sup
x∈Jn
sb1 (x) − s1 (x)
%2n
Mn hp+γ
n
−
b
c
(x)
=
O
+
O
= oP n−1/2
1
P
P
(1) |I|
(2) 2
(1)
(2) 2
2
(αn ) (αn )
αn (αn )
2σ1 (x)
and
sup |b
c1 (x)| = OP
x∈Jn
Now noticing that
the rate
σ
b12 (x)−σ12 (x)
%n
(1)
(2)
αn (αn )2
= oP n−1/4 .
= sb1 (x)−s1 (x)−(m
b 1 (x)−m1 (x))(m
b 1 (x)+m1 (x)) we obtain
sup |r(x)| = oP n−1/2 + OP
x∈Jn
%2n
(1)
(2)
(αn )2 (αn )4
= oP n−1/2
and (i) follows for σ
b1 .
If we define bb1 (x) = 1 + b
c1 (x) − b
a1 (x)m1 (x)/σ1 (x), then (ii) and (iii) follow analogously to
before. The only difference is an additional factor σ1 (x) in the denominator that needs to be
considered.
A COPULA APPROACH FOR DEPENDENCE MODELING
33
To show validity of (iv) note that the regression model Y1i2 = s1 (X i ) + ηi holds with error
term ηi = σi2 (X i )(ε21i − 1) + 2m1 (X i )σ1 (X i )ε1i . From this one obtains analogously to the
derivation of (iv) for b
a1 that
Z
n
n
sb1 (x)
1 X 2
1 X m1 (X i )
f
(x)
dx
=
(ε
−
1)
+
ε1i + oP n−1/2 .
X
1i
2
2n
n
σ (X i )
Jn 2σ1 (x)
i=1
i=1 1
R
But the second sum is also the dominating term in Jn b
a1 (x)m1 (x)/σ1 (x)fX (x) dx, which is
again shown analogously to the proof of (iv) for b
a1 . Thus (iv) follows for bb1 .
Remark 3. Note that due to property (iii) of Lemma 1 and assumption (FX ) we have for
x ∈ Jn = [−cn , cn ]d ,
kxkν |b
a1 (x)| ≤ O((log n)ν/d )o(n−1/4 ) = o(1)
for every ν > 0. In the proof of Lemma 1, b
a1 (x) was only defined for x ∈ Jn . Now we define
d+δ
d
b
a1 on R in a way that if b
a1 ∈ C1 (Jn ) and kxkν |b
a1 (x)| ≤ 1, then b
a1 ∈ G defined in (A10).
d
Then P b
a1 ∈ G → 1 by Lemma 1. Analogously bb1 is defined on R such that P bb1 ∈ Ge → 1
for Ge from (A11).
Lemma 2. Let H = G or Ge denote one of the function classes defined in (A10) and (A11),
then we have with ν > d(1 + d/δ) and δ from assumption (Bw),
d
d
log N (, H, k · k∞ ) = O − ν + d+δ
for & 0, and thus the same bound holds for log N[ ] (, H, k · k2 ).
e and let > 0. Choose D = D() = −1/ν .
Proof. Let H = G (the proof is similar for G)
Let B denote the ball of radius D around the origin. Let a1 , . . . , am : B → R denote the
centers of -balls with respect to the supremum norm that cover C1d+δ (B), that is m =
N (, C1d+δ (B), k · k∞ ). Then for each a ∈ G we have a|B ∈ C1d+δ (B) and thus there exists
j0 ∈ {1, . . . , m} such that supx∈B |a(x) − aj0 (x)| ≤ . Now define aj (x) = 0 for x ∈ Rd \ B,
j = 1, . . . , m. Then
n
o
sup |a(x) − aj0 (x)| ≤ max , sup |a(x)| ≤
x∈Rd
kxkν |a(x)|
kxk≥D
because
≤ 1 by definition of G. We obtain N (, G, k · k∞ ) = m and due to van der
Vaart and Wellner (1996), Theorem 2.7.1, we have for some universal K
d
d
d
− νd + d+δ
d
1 − d+δ
d − d+δ
log m ≤ K λ B
= O (D + 2)
=O
,
where B 1 = x : kx − Bk < 1
Thus the first assertion follows. The second assertion follows by van der Vaart and Wellner
(1996), proof of Cor. 2.7.2.
34
NATALIE NEUMEYER1 , MAREK OMELKA2 , ŠÁRKA HUDECOVÁ2
References
Berghaus, B., Bücher, A., and Volgushev, S. (2017). Weak convergence of the empirical copula
process with respect to weighted metrics. Bernoulli, 23(1):743–772.
Brahimi, B. and Necir, A. (2012). A semiparametric estimation of copula models based on
the method of moments. Stat. Methodol., 9(4):467–477.
Bücher, A. and Volgushev, S. (2013). Empirical and sequential empirical copula processes
under serial dependence. J. Multivariate Anal., 119:61–70.
Chan, N.-H., Chen, J., Chen, X., Fan, Y., and Peng, L. (2009). Statistical inference for
multivariate residual copula of GARCH models. Statist. Sinica, 19:53–70.
Chen, X. and Fan, Y. (2006). Estimation and model selection of semiparametric copula-based
multivariate dynamic models under copula misspecification. J. Econometrics, 135:125–154.
Dedecker, J. and Louhichi, S. (2002). Maximal inequalities and empirical central limit theorems. In Dehling, H., Mikosch, T., and Sorensen, M., editors, Empirical process techniques
for dependent data, pages 137–160. Birkhäuser Boston.
Dette, H., Pardo-Fernández, J. C., and Keilegom, I. V. (2009). Goodness-of-fit tests for
multiplicative models with dependent data. Scand. J. Statist., 36(4):782–799.
Embrechts, P., Frey, R., and McNeil, A. (2005). Quantitative Risk Management: Concepts,
Techniques, and Tools. Princeton Series in Finance, Princeton.
Fan, J. and Gijbels, I. (1996). Local Polynomial Modelling and Its Applications. Chapman &
Hall/CRC, London.
Fan, J. and Yao, Q. (2005). Nonlinear Time Series : Nonparametric and Parametric Methods.
Springer series in statistics. Springer, New York.
Gao, J. (2007). Nonlinear Time Series: Semiparametric and Nonparametric Methods. Chapman & Hall/CRC, Boca Raton.
Genest, C., Ghoudi, K., and Rivest, L.-P. (1995). A semiparametric estimation procedure of
dependence parameters in multivariate families of distributions. Biometrika, 82:543–552.
Genest, C., Rémillard, B., and Beaudoin, D. (2009). Goodness-of-fit tests for copulas: A
review and a power study. Insurance Math. Econom., 44:199–213.
Gijbels, I., Omelka, M., Pešta, M., and Veraverbeke, N. (2017). Score tests for covariate effects in conditional copulas. J. Multivariate Anal. Available online, doi:
10.1016/j.jmva.2017.05.001.
Gijbels, I., Omelka, M., and Veraverbeke, N. (2015). Estimation of a copula when a covariate
affects only marginal distributions. Scand. J. Statist., 42(4):1109–1126.
Hansen, B. E. (2008). Uniform convergence rates for kernel estimation with dependent data.
Econometric Theory, 24:726–748.
Härdle, W., Tsybakov, A., and Yang, L. (1998). Nonparametric vector autoregression.
J. Statist. Plann. Inference, 68(2):221–245.
A COPULA APPROACH FOR DEPENDENCE MODELING
35
Kim, G., Silvapulle, M. J., and Silvapulle, P. (2007). Semiparametric estimation of the error
distribution in multivariate regression using copulas. Aust. N. Z. J. Stat., 49(3):321–336.
Kim, G., Silvapulle, M. J., and Silvapulle, P. (2008). Estimating the error distribution in
multivariate heteroscedastic time-series models. J. Statist. Plann. Inference, 138(5):1442–
1458.
Kojadinovic, I. and Holmes, M. (2009). Tests of independence among continuous random vectors based on Cramér–von Mises functionals of the empirical copula process. J. Multivariate
Anal., 100(6):1137–1154.
Masry, E. (1996). Multivariate local polynomial regression for time series: uniform strong
consistency and rates. J. Time Series Anal., 17(6):571–599.
Müller, U. U., Schick, A., and Wefelmeyer, W. (2009). Estimating the error distribution
function in nonparametric regression. Statist. Probab. Lett., 79:957–964.
Nelsen, R. B. (2006). An Introduction to Copulas. Springer, New York. Second Edition.
Patton, A. J. (2012). A review of copula models for economic time series. J. Multivariate
Anal., 110:4–18.
Portier, F. and Segers, J. (2015). On the weak convergence of the empirical conditional copula
under a simplifying assumption. arXiv preprint arXiv:1511.06544.
Rémillard, B., Papageorgiou, N., and Soustra, F. (2012). Copula-based semiparametric models for multivariate time series. J. Multivariate Anal., 110:30–42.
Segers, J. (2012). Weak convergence of empirical copula processes under nonrestrictive
smoothness assumptions. Bernoulli, 18:764–782.
Tsukahara, H. (2005). Semiparametric estimation in copula models. Canad. J. of Statist.,
33:357–375.
van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes.
Springer, New York.
Veraverbeke, N., Omelka, M., and Gijbels, I. (2011). Estimation of a conditional copula and
association measures. Scand. J. Statist., 38:766–780.
Yang, L., Härdle, W., and Nielsen, J. (1999). Nonparametric autoregression with multiplicative volatility and additive mean. J. Time Series Anal., 20(5):579–604.
| 10 |
arXiv:1611.00507v1 [cs.DS] 2 Nov 2016
Worst Case Competitive Analysis of Online
Algorithms for Conic Optimization
Reza Eghbali
Department of Electrical Engineering
University of Washington
Seattle, WA 98195
[email protected]
Maryam Fazel
Department of Electrical Engineering
University of Washington
Seattle, WA 98195
[email protected]
Abstract
Online optimization covers problems such as online resource allocation, online
bipartite matching, adwords (a central problem in e-commerce and advertising),
and adwords with separable concave returns. We analyze the worst case competitive
ratio of two primal-dual algorithms for a class of online convex (conic) optimization
problems that contains the previous examples as special cases defined on the
positive orthant. We derive a sufficient condition on the objective function that
guarantees a constant worst case competitive ratio (greater than or equal to 12 ) for
monotone objective functions. We provide new examples of online problems on
the positive orthant and the positive semidefinite cone that satisfy the sufficient
condition. We show how smoothing can improve the competitive ratio of these
algorithms, and in particular for separable functions, we show that the optimal
smoothing can be derived by solving a convex optimization problem. This result
allows us to directly optimize the competitive ratio bound over a class of smoothing
functions, and hence design effective smoothing customized for a given cost
function.
1
Introduction
Given a proper convex cone K ⊂ Rn , let ψ : K 7→ R be an upper semi-continuous concave function.
Consider the optimization problem
!
m
X
maximize ψ
At x t
(1)
t=1
subject to xt ∈ Ft ,
∀t ∈ [m],
where for all t ∈ [m] := {1, 2, . . . , m}, xt ∈ Rk are the optimization variables and Ft are compact
convex constraint sets. We assume At ∈ Rn×k maps Ft to K; for example, when K = Rn+ and
Ft ⊂ Rk+ , this assumption is satisfied if At has nonnegative entries. We consider problem (1) in the
online setting, where it can be viewed as a sequential game between a player (online algorithm) and
an adversary. At each step t, the adversary reveals At , Ft and the algorithm chooses x̂t ∈ Ft . The
performance of the algorithm is measured by its competitive ratio, i.e., the ratio of objective value at
x̂1 , . . . , x̂m to the offline optimum.
Problem (1) covers (convex relaxations of) various online combinatorial problems including online
bipartite matching [25], the “adwords” problem [31], and the secretary problem [27]. More generally,
it covers online linear programming (LP) [9], online packing/covering with convex cost [4, 7, 11],
and generalization of adwords [13]. Online LP is an important example on the positive orthant:
maximize
subject to
m
X
cTt xt
t=1
m
X
Bt xt ≤ b
t=1
T
1 xt ≤ 1, xt ∈ Rk+ ,
∀t ∈ [m].
Here Ft = {x ∈ Rk+ | 1T x ≤ 1}, ATt = [ct , BtT ] and ψ(u, v) = u + I{·≤b} (v) where I{·≤b} (v) is
the concave indicator function of the set {v ≤ b}.
The competitive performance of online algorithms has been studied mainly under the worst-case
model (e.g., in [31]) or stochastic models (e.g., in [27]). In the worst-case model one is interested
in lower bounds on the competitive ratio that hold for any (A1 , F1 ), . . . , (Am , Fm ). In stochastic
models, adversary chooses a probability distribution from a family of distributions to generate
(A1 , F1 ), . . . , (Am , Fm ), and the competitive ratio is calculated using the expected value of the
algorithm’s objective value. The two most studied stochastic models are random permutation and i.i.d.
models. In the random permutation model the adversary is limited to choose distributions that are
invariant under random permutation while in the i.i.d. model (A1 , F1 ), . . . , (Am , Fm ) are required
to be independent and identically distributed. Note that the worst case model can also be viewed as
an stochastic model if one allows distributions with singleton support.
Online bipartite matching, and its generalization the “adwords” problem, are two main examples that
have been studied under the worst case model. The greedy algorithm achieves a competitive ratio of
1/2 while the optimal algorithm achieves a competitive ratio of 1 − 1/e as bid to budget ratio goes
to zero [31, 8, 25, 23]. A more general version of adwords in which each agent (advertiser) has a
concave cost has been studied in [13]. On the other hand, secretary problem and its generalizations are
stated for random permutation model since the worst case competitive ratio of any online algorithm
can be arbitrary small [5, 27]. The convex relaxation of the online secretary problem is a simple linear
program (LP) with one constraint. Therefore, the competitive ratio of online algorithms for LP has
either been analyzed under random permutation or i.i.d models [3, 16, 14, 20, 26] or under the worst
case model with further restrictions on the problem data [9]. Several authors have also proposed
algorithms for adwords and bipartite matching problems under stochastic models which have a better
competitive ratio than the competitive ratio under the worst case model [29, 24, 17, 30, 21, 12].
The majority of algorithms proposed for the problems mentioned above rely on a primal-dual
framework [8, 9, 4, 13, 7]. The differentiating point among the algorithms is the method of updating
the dual variable at each step, since once the dual variable is updated the primal variable can be
assigned using a simple assignment rule based on complementary slackness condition. A simple
and efficient method of updating the dual variable is through a first order online learning step. For
example, the algorithm stated in [14] for online linear programming uses mirror descent with entropy
regularization (multiplicative weight updates algorithm) once written in the primal dual language.
Recently, the work in [14] was independently extended to the random permutation model in [19, 15, 2].
In [2], the authors provide competitive difference bound for online convex optimization under random
permutation model as a function of the regret bound for the online learning algorithm applied to the
dual.
In this paper, we consider two versions of the greedy algorithm for problem (1) The first algorithm,
Algorithm 1, updates the primal and dual variables sequentially. The second algorithm, Algorithm 2,
provides a direct saddle-point representation of what has been described informally in the literature
as “continuous updates” of primal and dual variables. This saddle point representation allows us to
generalize this type of updates to non-smooth function. In section 2, we bound the competitive ratios
of the two algorithms. A sufficient condition on the objective function that guarantees a non-trivial
worst case competitive ratio is introduced. We show that the competitive ratio is at least 12 for a
monotone non-decreasing objective function. Examples that satisfy the sufficient condition (on
the positive orthant and the positive semidefinite cone) are given. In section 3, we derive optimal
algorithms, as variants of greedy algorithm applied to a smoothed version of ψ. For example,
Nesterov smoothing provides optimal algorithm for online LP. The main contribution of this paper
is to show how one can derive the optimal smoothing function (or from the dual point of view the
optimal regularization function) for separable ψ on positive orthant by solving a convex optimization
2
problem. This gives a implementable algorithm that achieves the optimal competitive ratio derived in
[13]. We also show how this convex optimization can be modified for the design of the smoothing
function specifically for the sequential algorithm. In contrast, [13] only considers continuous updates
algorithm.
Notation. We denote the transpose of a matrix A by AT . The inner product on Rn is denoted by
h·, ·i. Given a function ψ : Rn 7→ R, ψ ∗ denotes the concave conjugate of ψ defined as
ψ ∗ (y) = inf hy, ui − ψ(u),
u
for all y ∈ Rn . For a concave function ψ, ∂ψ(u) denotes the set of supergradients of ψ at u, i.e., the
set of all y ∈ Rn such that
∀u0 ∈ Rn : ψ(u0 ) ≤ hy, u0 − ui + ψ(u).
The set ∂ψ is related to the concave conjugate function ψ ∗ as follows. For an upper semi-continuous
concave function ψ we have
∂ψ(u) = argmin hy, ui − ψ ∗ (y).
y
Under this condition, (ψ ∗ )∗ = ψ.
A differentiable function ψ has a Lipschitz continuous gradient with respect to k·k with continuity
parameter µ1 > 0 if for all u, u0 ∈ Rn ,
1
∗
k∇ψ(u0 ) − ∇ψ(u)k ≤ ku − u0 k ,
µ
∗
where k·k is the dual norm to k·k. For an upper semi-continuous concave function ψ, this is
∗
equivalent to ψ ∗ being µ-strongly concave with respect to k·k (see, for example, [36, chapter 12]).
The dual cone K ∗ of a cone K ⊂ Rn is defined as K ∗ = {y | hy, ui ≥ 0 ∀u ∈ K}. Two examples
of self-dual cones are the positive orthant Rn+ and the cone of n × n positive semidefinite matrices
n
S+
. A proper cone (pointed convex cone with nonempty interior) K induces a partial ordering on Rn
which is denoted by ≤K and is defined as
x ≤K y ⇔ y − x ∈ K.
For two sets F, G ⊂ Rn , we write F ≤K G when u ≤K v for all u ∈ F, v ∈ G.
1.1
Two greedy algorithms
The (Fenchel) dual problem for problem (1) is given by
m
X
minimize
σt (ATt y) − ψ ∗ (y),
(2)
t=1
where the optimization variable is y ∈ Rn , and σt denotes the support function for the set Ft defined
as σt (z) = supx∈Ft hx, zi. We denote the optimal dual objective with D? .
A pair (x∗ , y ∗ ) ∈ (F1 × . . . Fm ) × K ∗ is an optimal primal-dual pair if and only if
x∗t ∈ argmax x, ATt y ∗
∀t ∈ [m],
x∈Ft
m
X
y ∗ ∈ ∂ψ(
At x∗t ).
(3)
(4)
t=1
Based on these optimality conditions, we consider two algorithms. Algorithm 1 updates the primal
and dual variables sequentially, by maintaining a dual variable ŷt and using it to assign x̂t ∈
argmaxx∈Ft x, ATt ŷt . The algorithm then updates the dual variable based on the second optimality
condition (4) 1 . By the assignment rule, we have At x̂t ∈ ∂σt (ŷt ), and the dual variable update can
be viewed as
* t
+
X
ŷt+1 ∈ argmin
As x̂s , y − ψ ∗ (y).
y
s=1
Therefore, the dual update is the same as the update in dual averaging [34] or Follow The Regularized
Leader (FTRL) [39, 1][37, section 2.3] algorithm with regularization −ψ ∗ (y).
1
we assume that ∂ψ nonempty on the boundary of K, otherwise, we can modify the algorithm to start from a
point in the interior of the cone very close to zero.
3
Algorithm 1 Sequential Update
Initialize ŷ1 ∈ ∂ψ(0)
for t ← 1 to m do
Receive At , Ft
x̂t ∈ argmaxx∈Ft x, ATt ŷt
Pt
ŷt+1 ∈ ∂ψ( s=1 As x̂s )
end for
Algorithm 2 updates the primal and dual variables simultaneously, ensuring that
x̃t ∈ argmax
x∈Ft
x, ATt ỹt
,
ỹt ∈ ∂ψ(
t
X
As x̃s ).
s=1
This algorithm is inherently more complicated than algorithm 1, since finding x̃t involves solving a
saddle-point problem. This can be solved by a first order method like the mirror descent algorithm
for saddle point problems. In contrast, the primal and dual updates in algorithm 1 solve two separate
maximization and minimization problems 2
Algorithm 2 Simultaneous Update
for t ← 1 to m do
Receive At , Ft
(ỹt , x̃t ) ∈ arg miny maxx∈Ft
D
E
Pt−1
y, At x + s=1 As x̃s − ψ ∗ (y)
end for
For a reader more accustomed to optimization algorithms, we would like to point to alternative
views on these algorithms. If 0 ∈ Ft for all t, then an alternative view on Algorithm 2 is coordinate
minimization. Initially, all the coordinates are set to zero, then at step t
!
t
X
x̃t ∈ argmax ψ
At x̃s + At x .
(5)
x∈Ft
s=1
If in addition ψ is differentiable, Algorithm 1, at each time step t, applies one iteration of Frank-Wolfe
algorithm [18] for solving (5).
2
Competitive ratio bounds and examples for ψ
In this section, we derive bounds on the competitive ratios of Algorithms
P1mand 2 by bounding their
respective duality gaps. Let ỹm+1 to be the minimum element in ∂ψ( t=1 At x̃t ) with respect to
ordering ≤K ∗ (such an element exists in the superdifferential by Assumption (1),
which appears
Pm
later in this section). We also choose ŷm+1 to be the minimum element in ∂ψ( t=1 At x̂t ) with
respect to ≤K ∗ . Note that ŷm+1 is used for analysis and does not play a role in the assignments of
Algorithm 1. Let Pseq and Psim denote the primal objective values for the primal solution produced
by the algorithms 1 and 2, and Dseq and Dsim denote the corresponding dual objective values,
!
!
m
m
X
X
Pseq = ψ
At x̂t ,
Psim = ψ
At x̃t ,
t=1
Dseq =
m
X
t=1
σt (ATt ŷt ) − ψ ∗ (ŷm+1 ),
Dsim =
t=1
m
X
σt (ATt ỹt ) − ψ ∗ (ỹm+1 ).
t=1
2
Also if the original problem is a convex relaxation of an integer program, meaning that each Ft = convFt
where Ft ⊂ Zl , then x̂t can always be chosen to be integral while integrality may not hold for the solution of
the second algorithm.
4
The next lemma provides a lower bound on the duality gaps of both algorithms.
Lemma 1 The duality gap for Algorithm 2 is lower bounded as
Psim − Dsim ≥ ψ ∗ (ỹm+1 ) + ψ(0),
and the duality gap for Algorithm 1 is lower bounded as
Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) +
m
X
hAt x̂t , ŷt+1 − ŷt i .
t=1
Furthermore, if ψ has a Lipschitz continuous gradient with parameter 1/µ with respect to k·k, then
Pseq − Dseq ≥ ψ ∗ (ŷm+1 ) + ψ(0) −
m
X
1
2
kAt x̂t k .
2µ
t=1
(6)
Note that right hand side of (6) is exactly the regret bound of the FTRL algorithm (with a negative
sign) [38]. The proof is given in Appendix A. To simplify the notation in the rest of the paper, we
assume ψ(0) = 0.
Now we state a sufficient condition on ψ that leads to non-trivial competitive ratios, and we assume
this condition holds in the rest of the paper. One can interpret this assumption as having “diminishing
returns” with respect to the ordering induced by a cone. Examples of functions that satisfy this
assumption will appear later in this section.
Assumption 1 Whenever u ≥K v, there exists y ∈ ∂ψ(u) that satisfies
y ≤K ∗ z,
for all z ∈ ∂ψ(v).
When ψ is differentiable, Assumption 1 simplifies to
u ≥K v ⇒ ∇ψ(u) ≤K ∗ ∇ψ(v).
That is, the gradient, as a map from Rn (equipped with ≤K ) to Rn (equipped with ≤K ∗ ), is orderreversing (also known as antitone). If ψ satisfies Assumption 1, then so does ψ ◦ A, when A is a linear
map such that hy, Avi ≥ 0, for all v ∈ K and y ∈ K ∗ . When ψ is twice differentiable, Assumption
1 is equivalent to w, ∇2 ψ(u)v ≤ 0, for all u, v, w ∈ K. For example, this is equivalent to Hessian
being element-wise non-positive when K = Rn+ .
Competitive ratio for non-decreasing ψ
2.1
To quantify the competitive ratio of the algorithms, we define αψ : K 7→ R as
αψ (u) = sup {c | ψ ∗ (y) ≥ cψ(u), ∀y ∈ ∂ψ(u)},
(7)
which for u 6= 0 can also be written as
αψ (u) =
ψ ∗ (y)
.
y∈∂ψ(u) ψ(u)
inf
Since ψ ∗ (y) + ψ(u) = hy, ui for all y ∈ ∂ψ(u), αψ is equivalent to3
αψ (u) = sup{c | hy, ui ≥ (c + 1)ψ(u), ∀y ∈ ∂ψ(u)}
(8)
= sup{c | ψ 0 (u; u) ≥ (c + 1)ψ(u)},
where ψ 0 (u, v) is the directional derivative of ψ at u in the direction of v. Note that for any u ∈ K,
we have −1 ≤ αψ (u) ≤ 0 since for any y ∈ ∂ψ(u), by concavity of ψ and the fact that y ∈ K ∗ ,
we have 0 ≤ hy, ui ≤ ψ(u) − ψ(0). If ψ is a linear function then αψ = 0, while if 0 ∈ ∂ψ(u) for
some u ∈ K, then αψ (u) = −1. Figure 1 shows a differentiable function ψ : R+ 7→ R. The value of
α(u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ) as shown.
The next theorem provides lower bounds on the competitive ratio of the two algorithms.
3
If ψ(0) 6= 0, then the definition of αψ should be modified to αψ (u) = sup{c | hy, ui ≥ (c + 1)(ψ(u) −
ψ(0)), y ∈ ∂ψ(u)}.
5
ψ(u0 )
−ψ ∗ (ψ 0 (u0 ))
u0
u
Figure 1: ψ 0 is the derivative of ψ and −ψ ∗ (ψ 0 (u0 )) is the y-intercept of the tangent to the function
graph at u0 . αψ (u0 ) is the ratio of ψ ∗ (ψ 0 (u0 )) to ψ(u0 ).
Theorem 1 If Assumption 1 holds, then for the simultaneous update algorithm we have 4 :
Psim ≥
1
D? .
1 − ᾱψ
where D∗ is the dual optimal objective and
ᾱψ = inf{αψ (u) | u ∈ K}.
(9)
For the sequential update algorithm,
Pseq ≥
m
X
1
(D? +
hAt x̂t , ŷt+1 − ŷt i).
1 − ᾱψ
t=1
Further, if ψ is differentiable with gradient Lipschitz continuity parameter
Pseq ≥
Proof:
1
µ
with respect to k·k,
m
X
1
1
2
kAt x̂t k ).
(D? −
1 − ᾱψ
2µ
t=1
(10)
We first show that Assumption 1 implies that
m
X
σt (ATt ỹt ) ≥
t=1
m
X
m
X
σt (At ŷt ) ≥
σt (ATt ỹm+1 ),
t=1
m
X
t=1
(11)
σt (At ŷm+1 ),
t=1
To do so, we prove that for all t, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ). The proof for σt (ATt ŷt ) ≥ σt (ATt ŷm+1 )
follows the same steps.
Pt
Pm
For any t, we have
for all s. Since ỹt ∈
s=1 As x̃s ≤K
s=1 As x̃s since As Fs ⊂ KP
Pt
m
∂ψ( s=1 As x̃s ) and ỹm+1 was chosen to be the minimum element in ∂ψ( s=1 As x̃s ) with respect
to ≤K ∗ , by the Assumption 1, we have
ỹt ≥K ∗ ỹm+1 .
Since At x ∈ K for all x ∈ Ft , we get hAt x, yt i ≥ hAt x, ym i . Therefore, σt (ATt ỹt ) ≥ σt (ATt ỹm+1 ).
Now by (11)
Dsim =
m
X
σt (ATt ỹt )
∗
− ψ (ỹm+1 ) ≥
m
X
t=1
σt (ATt ỹm+1 ) − ψ ∗ (ỹm+1 ) ≥ D? .
t=1
?
Similarly, Dseq ≥ D . Lemma 1 and definition of ᾱψ give the desired result.
4
If ψ(0) 6= 0, then the conclusion becomes Psim − ψ(0) ≥
6
1
1−αψ
(D? − ψ(0)).
Competitive ratio for non-monotone ψ
2.2
If ψ is not non-decreasing with respect to K, the algorithms are not guaranteed to increase the
objective at each step; therefore, Pseq and Psim are not guaranteed to be non-negative. However, if we
add the assumption that 0 ∈ Ft for all t, then Algorithm 2 will not decrease the objective at any step,
t
t−1
X
X
ψ(
As x̃s ) − ψ(
As x̃s ) ≥ x̃t , ATt ỹt = max x, ATt ỹt ≥ 0,
s=1
x∈Ft
s=1
(12)
which follows from concavity of ψ.
In other words, the algorithm simply assigns 0 to xt if any other feasible point in Ft reduces the
objective value. Define
m
X
ũ =
At x̃t ,
t=1
and note that under the assumption 0 ∈ Ft , we have ψ(ũ) ≥ 0. Further, we have:
1
Psim ≥
D? .
1 − αψ (ũ)
(13)
We provide examples of non-monotone ψ and their competitive ratio analysis in this section and
section 3.1. Given appropriate conditions on Ft and At , in order to find a lower bound on the
competitive ratio independent of ũ, we only need to lower bound αψ over a subset of K. Note that
when ψ is not non-decreasing, then there exists a supergradient that is not in K ∗ . Therefore, αψ (ũ)
for general ψ can be less than −1. In this case, the lower bound for the competitive ratio of Algorithm
(2) is less than 12 .
We now consider examples of ψ that satisfy Assumption 1 and derive lower bound on αψ for those
examples.
2.3
Examples on the positive orthant.
Let K = Rn+ and note that K ∗ = K. To simplify the notation we use ≤ instead of ≤Rn+ . When ψ has
continuous partial second derivatives with respect to all the variables, Assumption 1 is equivalent to the
Hessian being element-wise non-positive over Rn+ . Assumption 1 is closely related to submodularity.
In fact, on the positive orthant this assumption is sufficient for submodularity of ψ on the lattice
defined by ≤. However, this assumption is not necessary for submodularity. When ψ has continuous
partial second derivatives with respect to all the variables, the necessary and sufficient condition only
requires the off-diagonal elements of the Hessian to be non-positive [28].
If ψ is separable, i.e.,
ψ(u) =
n
X
ψi (ui ),
(14)
i=1
Assumption 1 is satisfied since by concavity for each ψi we have ∂ψi (ui ) ≤ ∂ψi (vi ) when ui ≤ vi .
If ψ satisfies the Assumption 1, then so does ψ(Au), where A is an element-wise non-negative
matrix.
Adwords In the basic adwords problem, for all t, Ft = {x ∈ Rl+ | 1T x ≤ 1}, At is a diagonal
matrix with non-negative entries, and
n
n
X
X
ψ(u) =
ui −
(ui − 1)+ ,
(15)
i=1
∗
i=1
T
where (·)+ = max{·, 0}. In this problem, ψ (y) = 1 (y − 1). Since 0 ∈ ∂ψ(1) we have αψ = −1
by (8); therefore, the competitive ratio of algorithm 2 is 12 . Let r = maxt,i,j At,ij , then we have
Pm
1
t=1 hAt x̂t , ŷt+1 − ŷt i ≤ nr. Therefore, the competitive ratio of algorithm 1 goes to 2 as r (bid to
budget ratio) goes to zero. In adwords with concave returns studied in [13], At is diagonal for all t
and ψ is separable 5 .
5
Note that in this case one can remove the assumption that ∂ψi ⊂ R+ since if ỹt,i = 0 for some t and i,
then x̃s,i = 0 for all s ≥ t.
7
Online linear program and non-separable budget Recall that online LP is given by
!
m
m
X
X
T
maximize
ct xt + I{·≤1}
Bt xt
t=1
t=1
x t ∈ Ft ,
∀t ∈ [m].
where Ft = {x ∈ Rk+ | 1T x ≤ 1} is the simplex. If a lower bound on the optimal dual variable
mini yi∗ ≥ −l is given, then the LP can be written in the exact penalty form [6]:
!
m
m
X
X
T
maximizext ∈Ft
ct x t + G
Bt xt .
(16)
t=1
t=1
where G is an l-Lipschitz continuous function with respect to l1 norm given by
n
X
G(u) = −l
(ui − 1)+ .
i=1
−l is a lower bound on dual variable if
ct,j
l > max
| Bt,ij > 0, j ∈ [k], i ∈ [n] .
Bt,ij
(17)
To prove this, by way of contradiction, we assume that yi∗ ≤ −l for some i ∈ [n]. Now by the
definition of l, we have ct,j + (BtT y ∗ )j < 0 for all j such that Bt,ij > 0. On the other hand by the
optimality condition (3), ct + BtT y ∗ ∈ NFt (x∗t ) where NFt (x∗t ) is the normal cone of the simplex at
x∗t . Therefore, we should have x∗t,j = 0 for all j such that Bt,ij > 0. This results in (Bt x∗t )i = 0
Pm
which yield ( t=1 Bt x∗t )i = 0. This means that the corresponding variable yi∗ = 0 which is a
contradiction. With this choice of l, Algorithm 2 always maintains a feasible solution for the original
problem when applied to (16). This follows from the fact that if ỹt,i = −l for some t and i, then
(Bt x̃t )i = 0. Note that in the adwords problem Bt = diag(ct ) and l = 1.
For any p ≥ 1 let Bp be
Pnthe lp -norm ball. In order to provide examples of non-separable G,
we rewrite the function i=1 (ui − 1)+ using the distance from B∞ . For any set C ⊂ Rn+ , let
d1 (u, C) = inf ū∈C ku − ūk1 and note that d1 (u, C) is 1-Lipschitz continuous with respect to l1
norm. We have:
n
X
(1 − ui )+ = d1 (u, B∞ ).
(18)
i=1
Pm
Consider a problem with constraint k t=1 Bt xt kp ≤ 1. Given the bound on dual variable in (17),
this problem can be equivalently written in the form of (16) with the exact penalty [10, Theorem 5.5]
G(u) = −ld1 (u, Bp ).
When p = ∞, we get back (18).
For p ≥ 1, although not separable, the function G(u) = −d1 (u, Bp ) satisfies Assumption 1. For B1 ,
that follows from the fact that d1 (u, B1 ) = (1T u − 1)+ ; therefore, ∂d1 (u, B1 ) = 1∂f (1T u), where
f (x) = (x − 1)+ . The proof for p > 1 is given in Appendix B.
When ψ is given by 16 with G(u) = −ld1 (u, Bp ), we have αψ (ũ) ≥ − θl , where θ =
mint minx∈Ft
2.4
cT
t x
.
1T Bt x
The derivation of this bound is also given in Appendix B.
Examples on the positive semidefinite cone.
n
Let K = S+
and note that K ∗ = K. An interesting example that satisfies Assumption 1 is
p
ψ(U ) = trU with p ∈ (0, 1), where ∇ψ(U ) = pU p−1 and ᾱψ = p − 1. This objective function is
used in pth mean optimal experiment design. Another example is ψ(U ) = log det(U + A0 ), where
∇ψ(U ) = (U + A0 )−1 and ᾱψ = −1 since
h∇ψ(U ), U i
n − tr(A0 + U )−1 A0
=
→ 0 as trU → ∞.
ψ(U ) − ψ(0)
log det((A0 + U )A−1
0 )
8
Maximizing log det arises in several offline applications including D-optimal experiment design
[35], maximizing the Kirchhoff complexity of a graph [41], Optimal sensor selection [22, 40]. An
example of applications for maximizing the logdet of a projected Laplacian, as a function of graph
edge weights, appears in connectivity control of mobile networks [41]. We derive the competitive
ratio of the greedy algorithm with smoothing for online experiment design and Kirchhoff complexity
maximization of a graph in section 3.
3
Smoothing of ψ for improved competitive ratio
The technique of “smoothing” an objective function, or equivalently adding a strongly convex
regularization term to its conjugate function, has been used in several areas. In convex optimization,
a general version of this is due to Nesterov [32], and has led to faster convergence rates of first order
methods for non-smooth problems. In this section, we study how replacing ψ with a appropriately
smoothed function ψS helps improve the performance of the two algorithms discussed in section 1.1,
and show that it provides optimal competitive ratio for two of the problems mentioned in section 2,
adwords and online LP. We then show how to maximize the competitive ratio of Algorithm 2 for a
separable ψ and compute the optimal smoothing by solving a convex optimization problem. This
allows us to design the most effective smoothing customized for a given ψ: we maximize the bound
on the competitive ratio over the set of smooth functions.(see subsection 3.2 for details).
Let ψS denote an upper semi-continuous concave function (a smoothed version of ψ), and suppose
ψS satisfies Assumption 1. The algorithms we consider in this section are the same as Algorithms
1 and 2, but with ψ replacing ψS . Note that the competitive ratio is computed with respect to the
original problem, that is the offline primal and dual optimal values are still the same P ? and D? as
before. If we replace ψ with ψS in algorithms 1 and 2, the dual updates are modified to
* t
+
X
ŷt+1 ∈ argmin
As x̂s , y − ψS ∗ (y),
y
s=1
*
(x̃t , ỹt ) ∈ arg min max
y
x∈Ft
y, At x +
t−1
X
+
As x s
− ψS ∗ (y).
s=1
From Lemma 1, we have that
Dsim ≤ ψS
Dseq ≤ ψS
m
X
t=1
m
X
!
At x̃t
− ψ ∗ (ỹm+1 )
!
At x̂t
− ψ ∗ (ŷm+1 ) −
t=1
(19)
m
X
hAt x̂t , ŷt+1 − ŷt i .
(20)
t=1
Similar to our assumption on ψ(0), to simplify the notation, by replacing ψS (·) with ψS (·) − ψS (0),
we assume ψS (0) = 0. Define
αψ,ψS (u) = sup{c |ψ ∗ (y) ≥ ψS (u) + (c − 1)ψ(u), ∀y ∈ ∂ψS (u)},
and
ᾱψ,ψS = inf{αψ,ψS (u) | u ∈ K}.
Now the conclusion of Theorem 1 holds with ᾱψ replaced by ᾱψ,ψS . Similarly, when ψS is nonmonotone, inequality (13) holds with αψ replaced by αψ,ψS .
3.1
Nesterov Smoothing
We first consider Nesterov smoothing [32], and apply it to examples on non-negative orthant. Given a
proper upper semi-continuous concave function φ : Rn 7→ R ∪ {−∞}, let
ψS = (ψ ∗ + φ∗ )∗ .
Note that ψS is the hypo-sum (sup-convolution) of ψ and φ.
ψS = ψφ(u) = sup ψ(v) + φ(u − v).
v
9
This is called hypo-sum of ψ and φ since the hypo-graph of ψS is the Minkowski sum of hypo-graphs
of ψ and φ.
If ψ and φ are separable, then ψφ satisfies Assumption 1 for K = Rn+ . Here we provide example
of Nesterov smoothing for functions on non-negative orthant.
Adwords and Online LP: Consider the problem (16) with G(u) = −l
problem we smooth G with:
Pn
i=1 (ui
− 1)+ . For this
m
1 X
(e − 1)
θ
φ∗ (y) = ( ((yi −
) log(1 −
yi )) − (1 + γ)1T y),
γ i=1
(e − 1)
θ
where γ = log(1 +
l(e−1)
),
θ
cTt x
T
x∈Ft 1 Bt x
θ = min min
t
and l is defined as in (17). In this case, we have;
1
)γ.
e−1
αψ,ψφ (ũ) ≥ 1 − (1 +
(see the Appendix C for the derivation). This gives the competitive ratio of γ1 (1 − 1/e). In the case of
adwords where θ = l, this yield the optimal competitive ratio of 1 − e−1 and the smoothed function
coincides with the one derived in the previous paragraph. For a general LP, this approach provides
the optimal competitive ratio, which is known to be O(γ −1 ) [9].
Online experiment design and online graph formation: As pointed in section 2.4, maximizing
the determinant arises in graph formation, sensor selection and optimal experiment design. In the
offline form, these problems can be cast into maximizing log det subject to linear constraints as
follows:
m
X
maximize log det(A0 +
at aTt xt )
(21)
t=1
subject to
m
X
xt ≤ b,
t=1
xt ∈ [0, 1],
∀t,
where A0 0 and at ∈ Rn . We describe the online version of this problem for graph formation
and experiment design case. Consider the following online problem on a graph: given an underlying
connected graph with the Laplacian matrix L0 , at round t, the online algorithm is presented with
an edge and should decide whether to pick or drop theP
edge by choosing xt ∈ {0, 1}. There is a
n
bound on the number of the edges that can be picked, t=1 xt ≤ b. The goal is to maximize the
Kirchhoff complexity of the graph. The convex relaxation of the optimization problem is given by
21 where A0 = L0 + 11T and at is the incidence vector of the edge presented at round t. The
online experiment design or sensor selection is the same as (21). In that problem the vectors at are
experiment or measurement vectors.
The dual to 21 is as follows
maximize
m
X
(aTt Y at + y)+ + n − log det(Y ) + trA0 Y − by
t=1
subject to y ≤ 0, Y ≥ 0.
The hard budget constraint in problem 21 can be replaced by the exact penalty function G(u) =
−l(u − b)+ when −l is a given lower bound on the optimal dual variable corresponding to the
constraint. −l is a lower bound on the optimal dual variable corresponding to the constraint if
l>
2
.
λmin (A0 )
10
(22)
Pn
This follows from the fact that by the optimality condition (4), Y ∗ = (A0 + t=1 at aTt x∗t )−1 . If
y ∗ ≤ −l, then aTt Y ∗ at + y ∗ < 0 for all t. ThisP
combined with the the primal optimality condition
m
(3) forces x∗t = 0 for all t. Therefore, we get t=1 x∗t = 0 and y ∗ = 0, which is a contradiction.
Similar to the previous problems, we smooth G with:
b
θ
e−1
((y −
) log(1 −
y) − (1 + γ)y).
γ
e−1
θ
φ∗ (y) =
Here γ = log(1 + θl ) and θ = log(1 + 1/n). For this problem we have:
αψ,ψφ (ũ) ≥ 1 − (1 +
1
1
)γ + ᾱlog det ≥ −(1 +
)γ.
e−1
e−1
This results in the following competitive ratio bound
1
Psim − log det(A0 ) ≥
1+ 1+
1
e−1
(D? − log det(A0 )).
γ
The proof is included in the Appendix C. In the graph formation problem, λmin (A0 ) = λ2 (L0 ), that
is the second smallest eigenvalue of L0 . For a connected graph λ2 (L0 ) ∈ [1/n, n] with lower bound
achieved by the path graph and the upper bound achieved by the complete graph. Therefore, the
competitive ratio in this case is Ω( log1 n ).
3.2
Computing optimal smoothing for separable functions on Rn+
We now tackle the problem of finding the optimal smoothing for separable functions on the positive
orthant, which as we show in an example at the endP
of this section is not necessarily
Pn given by Nesterov
n
smoothing. Given a separable monotone ψ(u) = i=1 ψi (ui ) and ψS (u) = i=1 ψS i (ui ) on Rn+
we have that ᾱψ,ψS ≥ mini ᾱψi ,ψS i .
To simplify the notation, drop the index i and consider ψ : R+ 7→ R. We formulate the problem
of finding ψS to maximize αψ,ψS as an optimization problem. In section 4 we discuss the relation
between
this optimization method and the optimal algorithm presented in [13]. We set ψM (u) =
Ru
y(s)ds
with y a continuous function, and state the infinite dimensional convex optimization
0
problem with y as a variable,
minimize β
Z
subject to
(23)
u
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, ∞)
0
y ∈ C[0, ∞).
where β = 1− ᾱψ,ψS (theorem 1 describes the dependence of the competitive ratios on this parameter).
Note that we have not imposed any condition on y to be non-increasing (i.e., the corresponding ψS
to be concave). The next lemma establishes that every feasible solution to the problem (23) can be
turned into a non-increasing solution.
Lemma 2 Let (y, β) be a feasible solution for problem (23) and define ȳ(u) = inf s≤u y(s). Then
(ȳ, β) is also a feasible solution for problem (23).
In particular if (y, β) is an optimal solution, then so is (ȳ, β). The proof is given in the supplement.
Re-
visiting the adwords problem, we observe that the optimal solution is given by y(u) =
e−exp(u)
e−1
+
,
which is the derivative of the smooth function we derived using Nesterov smoothing in section
3.1. The optimality of this y can be established by providing a dual certificate, a measure ν corresponding to the inequality constraint, that together with y satisfies the optimality condition. If we
set dν = f (u) du with f (u) = exp (1 − u)/(e − 1), the optimality conditions are satisfied with
11
β = (1 − 1/e)−1 .
Z
∞
f (u)ψ(u) du = 1, f 0,
Zu=0
∞
f (s) ds ∈ f (u)∂ψ ∗ (y(u)),
∀u ≥ 0,
Zs=u
u
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ≥ 0,
0
Z u
f (u)(
y(s)ds − ψ ∗ (y(u)) − βψ(u)) = 0,
∀u ≥ 0.
0
Also note that if ψ plateaus (e.g., as in the adwords objective), then one can replace problem (23)
with a problem over a finite horizon.
Theorem 2 Suppose ψ(u) = c on [u0 , ∞). Then problem (23) is equivalent to the following problem,
minimize β
(24)
Z u
subject to
y(s)ds − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, u0 ]
0
y(u0 ) = 0,
y ∈ C[0, u0 ].
So for a function ψ with a plateau, one can discretize problem (24) to get a finite dimensional
problem,
minimize β
subject to h
(25)
t
X
y[s] − ψ ∗ (y[t]) ≤ βψ(ht),
∀t ∈ [d]
s=1
y[d] = 0,
where h = u0 /d is the discretization step. Figure 2a shows the optimal smoothing for the piecewise
linear function ψ(u) = min(.75, u, .5u + .25) by solving problem (25). We point out that the
optimal smoothing for this function is not given by Nesterov’s smoothing (even though the optimal
smoothing can be derived by Nesterov’s smoothing for a piecewise linear function with only two
pieces, like the adwords cost function). Figure 2d shows the difference between the conjugate of
the optimal smoothing function and ψ ∗ for the piecewise linear function, which we can see is not
concave.
Pm
In cases where a bound umax on t=1 At Ft is known, we can restrict t to [0, umax ] and discretize
problem (23) over this interval. However, the conclusion of Lemma 2 does not hold for a finite
horizon and we need to impose additional linear constraints y[t] ≤ y[t − 1] to ensure the monotonicity
of y. We find the optimal √
smoothing for two examples of this kind: ψ(u) = log(1 + u) over [0, 100]
(Figure 2b), and ψ(u) = u over [0, 100] (Figure 2c). In Figure 2e, we show the competitive ratio
achieved with the optimal smoothing of ψ(u)
√ = log(1 + u) over [0, umax ] as a function of umax .
Figure 2f depicts this quantity for ψ(u) = u.
3.3
Bounds for the sequential algorithm
In this section we provide a lower-bound on the competitive ratio of the sequential algorithm
(Algorithm 1). Based on this competitive ratio bound we modify Problem (23) for designing the
smoothing function for the sequential algorithm.
Theorem 3 Suppose ψS is differentiable on an open set containing K and satisfies Assumption 1. In
addition suppose there exists c ∈ K is such that At Ft ≤K c for all t, then
1
Pseq ≥
D? ,
1 − ᾱψ,ψS + κc,ψ,ψS
where κ is given by
κc,ψ,ψS = inf{r | hc, ∇ψS (0) − ∇ψS (u)i ≤ rψ(u), u ∈ K}
(26)
12
0.8
0.6
5
25
4
20
3
15
2
10
0.4
0.2
ψS
ψ
1
ψS
ψ
0
0
0
0
0.5
1
1.5
2
0
20
40
u
60
80
0
100
0.9
0.2
0.1
0.4
0.6
0.8
1
0.85
0.8
0.9
0.85
0.8
0.75
0
1
100
0.95
0.7
-0.1
80
(c)
0.75
0
60
u
comp. ratio
0.3
comp. ratio
0.95
0.2
40
(b)
0.4
0
20
u
(a)
ψS∗ (y) − ψ∗ (y)
ψS
ψ
5
500
0.7
1000
0
200
400
umax
y
(e)
(d)
600
800
1000
umax
(f)
Figure 2: Optimal√smoothing for ψ(u) = min(.75, u, .5u+.25) (a), ψ(u) = log(1+u) over [0, 100]
(b), and ψ(u) = u over [0, 100] (c). The competitive ratio
√ achieved by the optimal smoothing as a
function of umax for ψ(u) = log(1 + u) (e) and ψ(u) = u (f). ψS ∗ − ψ ∗ for the piecewise linear
function (d).
Proof:
Since ψS satisfies Assumption 1, we have ŷt+1 ≤K ∗ ŷt . Therefore, we can write:
m
X
hAt x̂t , ŷt − ŷt+1 i ≤
t=1
m
X
hc, ŷt − ŷt+1 i
t=1
= hc, ŷ0 − ŷm+1 i
(27)
Now by combining 20 with 27, we get
Dseq ≤ ψS
m
X
!
At x̂t
*
+
c, ∇ψS (0) − ∇ψS
t=1
m
X
!+
At x̂t
.
t=1
The conclusion of the theorem follows from the definition of ᾱψ,ψS , κc,ψ,ψS and the fact that
D̂ ≥ D? .
Based on the result of the previous theorem we can modify the optimization problem set up in
Section 3.2 for separable functions on Rn+ to maximize the lower bound on the competitive ratio of
the sequential algorithm. Note that in this case we have κc,ψ,ψS ≤ maxi κci ,ψi ,ψS i . Similar to the
previous section to simplify the notation we drop the index i and assume ψ is a function of a scalar
variable. The optimization problem for finding ψS that minimizes κc,ψ,ψS − ᾱψ,ψS is as follows:
minimize β
Z
subject to
(28)
u
y(s)ds + c(ψ 0 (0) − y(u)) − ψ ∗ (y(u)) ≤ βψ(u),
∀u ∈ [0, ∞)
0
y ∈ C[0, ∞).
In the case of Adwords, the optimal solution is given by
u−1
1
β=
y(u) = β 1 − exp
,
−1 ,
1+c
1 − exp( c+1
)
+
−1
which gives a competitive ratio of 1 − exp c+1
. In Figure 3b we have plotted the competitive
ratio achieved by solving problem 28 for ψ(u) = log det(1 + u) with umax = 100 as a function
13
0.8
Competitive ratio
Competitive ratio
0.7
0.6
0.5
0.4
0.3
0.6
0.4
0.2
0
0
0.2
0.4
0.6
0.8
1
0
20
40
60
c
c
(a)
(b)
80
100
Figure 3: The competitive ratio achieved by the optimal smoothing for the sequential algorithm as a
function of c for ψ(u) = min(.75, u, .5u + .25) (a) and ψ(u) = log(1 + u) with umax = 100 (b).
of c. Figure 3a shows the competitive ratio as a function of c for the piecewise linear function
ψ(u) = min(.75, u, .5u + .25).
4
Discussion and related work
We discuss results and papers from two communities, computer science theory and machine learning,
related to this work.
Online convex optimization. In [13], the authors proposed an optimal algorithm for adwords with
differentiable concave returns (see examples in section 2). Here, “optimal” means that they construct
an instance of the problem for which competitive ratio bound cannot be improved, hence showing
the bound is tight. The algorithm is stated and analyzed for a twice differentiable, separable ψ(u).
The assignment rule for primal variables in their proposed algorithm is explained as a continuous
process. A closer look reveals that this algorithm falls in the framework of algorithm 2, with the
only difference being that at each step, (x̃t , ỹt ) are chosen such that where vi : R+ 7→ R+ is an
increasing differentiable function given as a solution of a nonlinear differential equation that involves
ψi and may not necessarily have a closed form. The competitive ratio is also given based on the
differential equation. They prove that this gives the optimal competitive ratio for the instances where
ψ1 = ψ2 = . . . = ψn .
Note that this is equivalent of setting ψS i (ui ) = ψ(vi (ui ))). Since vi is nondecreasing ψS i is a
concave function. On the other hand, given a concave function ψS i (R+ ) ⊂ ψi (R+ ), we can set
vi : R+ 7→ R+ as vi (u) = inf{z | ψi (z) ≥ ψS i (u)}. Our formulation in section 3.2 provides a
constructive way of finding the optimal smoothing. It also applies to non-smooth ψ.
Recently, authors in [4, 7, 11] have provided a primal-dual onlineP
algorithm for the
Pmdual probm
lemP
(2) that corresponds to the non-monotone primal objective ψ ( t=1 At xt ) = t=1 cTt xt +
m
G ( t=1 Bt xt ).The primal and dual updates in their algorithm are presented as a continuous update
based on a differential equation. They assume that G∗ is differentiable and that ∇G∗ is monotone
on Rn+ , i.e., If y ≥ y 0 , then ∇G∗ (y) ≤ ∇G∗ (y 0 ). In contrast, our assumption written in terms of
G∗ for a differentiable function will become: If ∇G∗ (y) < ∇G∗ (y 0 ), then y ≥ y 0 , which is not
equivalent to the assumption in [7]. When G is separable the two assumptions coincide and this
algorithm is similar
Pn Rtoy algorithm 2 applied to the smooth function GM whose conjugate is given by
G∗M (y) = γ1 i=1 0 i G∗i 0 (z) log(1 − z/θ) dz. This smoothing coincides with Nesterov smoothing
in the case of LP.
Online learning. As mentioned before, the dual update in Algorithm 1 is the same as in Follow-theRegularized-Leader (FTRL) algorithm with −ψ ∗ as the regularization. This primal dual perspective
has been used in [39] for design and analysis of online learning algorithms. In the online learning
literature, the goal is to derive a bound on regret that optimally depends on the horizon, m. The goal
in the current paper is to provide competitive ratio for the algorithm that depends on the function ψ.
Regret provides a bound on the duality gap, and in order to get a competitive ratio the regularization
14
function should be crafted based on ψ. A general choice of regularization which yields an optimal
regret bound in terms of m is not enough for a competitive ratio argument, therefore existing results
in online learning do not address our aim.
Acknowledgments
The authors would like to thank James Saunderson, Ting Kei Pong, Palma London, and Amin Jalali
for their helpful comments and discussions.
References
[1] Jacob Abernethy, Elad Hazan, and Alexander Rakhlin. Competing in the dark: An efficient
algorithm for bandit linear optimization. In COLT, pages 263–274, 2008.
[2] Shipra Agrawal and Nikhil R Devanur. Fast algorithms for online stochastic convex programming. arXiv preprint arXiv:1410.7596, 2014.
[3] Shipra Agrawal, Zizhuo Wang, and Yinyu Ye. A dynamic near-optimal algorithm for online
linear programming. arXiv preprint arXiv:0911.2974, 2009.
[4] Yossi Azar, Ilan Reuven Cohen, and Debmalya Panigrahi. Online covering with convex
objectives and applications. arXiv preprint arXiv:1412.3507, 2014.
[5] Moshe Babaioff, Nicole Immorlica, David Kempe, and Robert Kleinberg. Online auctions and
generalized secretary problems. SIGecom Exch., 7(2):7:1–7:11, June 2008.
[6] Dimitri P Bertsekas. Necessary and sufficient conditions for a penalty method to be exact.
Mathematical programming, 9(1):87–99, 1975.
[7] Niv Buchbinder, Shahar Chen, Anupam Gupta, Viswanath Nagarajan, et al. Online packing and
covering framework with convex objectives. arXiv preprint arXiv:1412.8347, 2014.
[8] Niv Buchbinder, Kamal Jain, and Joseph Seffi Naor. Online primal-dual algorithms for maximizing ad-auctions revenue. In Algorithms–ESA 2007, pages 253–264. Springer, 2007.
[9] Niv Buchbinder and Joseph Naor. Online primal-dual algorithms for covering and packing.
Mathematics of Operations Research, 34(2):270–286, 2009.
[10] James V Burke. An exact penalization viewpoint of constrained optimization. SIAM Journal on
control and optimization, 29(4):968–998, 1991.
[11] TH Chan, Zhiyi Huang, and Ning Kang. Online convex covering and packing problems. arXiv
preprint arXiv:1502.01802, 2015.
[12] Nikhil R. Devanur and Thomas P. Hayes. The adwords problem: Online keyword matching
with budgeted bidders under random permutations. In Proceedings of the 10th ACM Conference
on Electronic Commerce, EC ’09, pages 71–78, New York, NY, USA, 2009. ACM.
[13] Nikhil R Devanur and Kamal Jain. Online matching with concave returns. In Proceedings of
the forty-fourth annual ACM symposium on Theory of computing, pages 137–144. ACM, 2012.
[14] Nikhil R Devanur, Kamal Jain, Balasubramanian Sivan, and Christopher A Wilkens. Near
optimal online algorithms and fast approximation algorithms for resource allocation problems.
In Proceedings of the 12th ACM conference on Electronic commerce, pages 29–38. ACM, 2011.
[15] Reza Eghbali, Jon Swenson, and Maryam Fazel. Exponentiated subgradient algorithm for
online optimization under the random permutation model. arXiv preprint arXiv:1410.7171,
2014.
[16] Jon Feldman, Monika Henzinger, Nitish Korula, Vahab S. Mirrokni, and Cliff Stein. Online
stochastic packing applied to display ad allocation. In Proceedings of the 18th Annual European
Conference on Algorithms: Part I, ESA’10, pages 182–194, Berlin, Heidelberg, 2010. SpringerVerlag.
[17] Jon Feldman, Aranyak Mehta, Vahab Mirrokni, and S Muthukrishnan. Online stochastic
matching: Beating 1-1/e. In Foundations of Computer Science, 2009. FOCS’09. 50th Annual
IEEE Symposium on, pages 117–126. IEEE, 2009.
15
[18] Marguerite Frank and Philip Wolfe. An algorithm for quadratic programming. Naval research
logistics quarterly, 3(1-2):95–110, 1956.
[19] Anupam Gupta and Marco Molinaro. How the experts algorithm can help solve lps online.
arXiv preprint arXiv:1407.5298, 2014.
[20] Patrick Jaillet and Xin Lu. Near-optimal online algorithms for dynamic resource allocation
problems. arXiv preprint arXiv:1208.2596, 2012.
[21] Patrick Jaillet and Xin Lu. Online stochastic matching: New algorithms with better bounds.
Mathematics of Operations Research, 2013.
[22] Siddharth Joshi and Stephen Boyd. Sensor Selection via Convex Optimization. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 57(2), 2009.
[23] Bala Kalyanasundaram and Kirk R Pruhs. An optimal deterministic algorithm for online
b-matching. Theoretical Computer Science, 233(1):319–325, 2000.
[24] Chinmay Karande, Aranyak Mehta, and Pushkar Tripathi. Online bipartite matching with
unknown distributions. In Proceedings of the forty-third annual ACM symposium on Theory of
computing, pages 587–596. ACM, 2011.
[25] Richard M Karp, Umesh V Vazirani, and Vijay V Vazirani. An optimal algorithm for on-line
bipartite matching. In Proceedings of the twenty-second annual ACM symposium on Theory of
computing, pages 352–358. ACM, 1990.
[26] Thomas Kesselheim, Klaus Radke, Andreas Tönnis, and Berthold Vöcking. Primal beats dual
on online packing lps in the random-order model. In Proceedings of the 46th Annual ACM
Symposium on Theory of Computing, STOC ’14, pages 303–312, New York, NY, USA, 2014.
ACM.
[27] Robert Kleinberg. A multiple-choice secretary algorithm with applications to online auctions.
In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pages
630–631. Society for Industrial and Applied Mathematics, 2005.
[28] GG Lorentz. An inequality for rearrangements. The American Mathematical Monthly, 60(3):176–
179, 1953.
[29] Mohammad Mahdian and Qiqi Yan. Online bipartite matching with random arrivals: an
approach based on strongly factor-revealing lps. In Proceedings of the forty-third annual ACM
symposium on Theory of computing, pages 597–606. ACM, 2011.
[30] Vahideh H Manshadi, Shayan Oveis Gharan, and Amin Saberi. Online stochastic matching:
Online actions based on offline statistics. Mathematics of Operations Research, 37(4):559–573,
2012.
[31] Aranyak Mehta, Amin Saberi, Umesh Vazirani, and Vijay Vazirani. Adwords and generalized
online matching. Journal of the ACM (JACM), 54(5):22, 2007.
[32] Yu Nesterov. Smooth minimization of non-smooth functions. Mathematical programming,
103(1):127–152, 2005.
[33] Yurii Nesterov. Introductory lectures on convex optimization, volume 87. Springer Science &
Business Media, 2004.
[34] Yurii Nesterov. Primal-dual subgradient methods for convex problems. Mathematical programming, 120(1):221–259, 2009.
[35] Friedrich Pukelsheim. Optimal design of experiments, volume 50. siam, 1993.
[36] R Tyrrell Rockafellar, Roger J-B Wets, and Maria Wets. Variational analysis, volume 317.
Springer, 1998.
[37] Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations and Trends
in Machine Learning, 4(2):107–194, 2011.
[38] Shai Shalev-Shwartz and Yoram Singer. Online learning: Theory, algorithms, and applications.
2007.
[39] Shai Shalev-Shwartz and Yoram Singer. A primal-dual perspective of online learning algorithms.
Machine Learning, 69(2-3):115–142, 2007.
16
[40] Manohar Shamaiah, Siddhartha Banerjee, and Haris Vikalo. Greedy sensor selection: Leveraging submodularity. In 49th IEEE Conference on Decision and Control (CDC), pages 2572–2577.
IEEE, dec 2010.
[41] Michael M Zavlanos and George J Pappas. Distributed connectivity control of mobile networks.
Robotics, IEEE Transactions on, 24(6):1416–1428, 2008.
Appendix
A
Proofs
Proof of Lemma 1: Using the definition of Dsim , we can write:
Dsim =
m
X
σt (ATt ỹt ) − ψ ∗ (ỹm+1 )
t=1
=
m
X
hAt x̃t , ỹt i − ψ ∗ (ỹm+1 )
t=1
≤
m
X
t
t−1
X
X
(ψ(
As x̃s ) − ψ(
As x̃s )) − ψ ∗ (ỹm+1 )
t=1
= ψ(
m
X
s=1
s=1
As x̃s ) − ψ(0) − ψ ∗ (ỹm+1 ),
s=1
where in the inequality follows from concavity of ψ, and the last line results from the sum telescoping.
Similarly, we can bound Dseq :
Dseq =
=
m
X
t=1
m
X
σt (ATt ŷt ) − ψ ∗ (ŷm+1 )
(29)
hAt x̂t , ŷt i − ψ ∗ (ŷm+1 )
t=1
=
m
X
hAt x̂t , −ŷt+1 + ŷt i +
t=1
≤
m
X
t=1
=
m
X
t=1
m
X
hAt x̂t , ŷt+1 i − ψ ∗ (ŷm+1 )
t=1
hAt x̂t , −ŷt+1 + ŷt i +
m
X
t
t−1
X
X
(ψ(
As x̂s ) − ψ(
As x̂s )) − ψ ∗ (ŷm+1 )
t=1
s=1
s=1
m
X
hAt x̂t , −ŷt+1 + ŷt i + ψ(
As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ).
s=1
To provide intuition about the above inequalities
Pm we have plotted the derivative of a concave function
ψ defined on R+ in Figure 4. The quantity t=1 hAt x̃t , ỹt i is a right Riemann
Pm sum approximation
of the integral of ψ 0 and lower bounds the integral (Figure 4a). The quantity t=1 hAt x̂t , ŷt i is a left
Riemann sum approximation of the integral and upper bounds the integral (Figure 4b). The area of
hatched rectangle bounds the error of the left Riemann sum and is equal to hAt x̂t , −ŷt+1 + ŷt i.
When ψ is differentiable with Lipschitz gradient, we can use the following inequality that is equivalent
to Lipschitz continuity of the gradient:
ψ(u0 ) ≥ ψ(u) + h∇ψ(u), u0 − ui −
17
1
2
ku − u0 k
2µ
u, u0 ∈ K
ψ 0 (u)
ψ 0 (u)
ŷ1
ỹ1
ŷt
ỹ2
ŷ3
ỹ3
A1 x̃1 A2 x̃2
u
A3 x̃3
A1 x̂1
(a)
Figure 4: Interpretation of
At x̂t At x̂3
u
(b)
Pm
t=1
σt (ATt ỹt ) and
Pm
t=1
σt (ATt ŷt ) as Riemann sums.
(see, for example, [33, section 2.1.1]) to get
Dseq =
=
m
X
t=1
m
X
σt (ATt ŷt ) − ψ ∗ (ŷm+1 )
(30)
hAt x̂t , ŷt i − ψ ∗ (ŷm+1 )
t=1
≤
t−1
t
m
m
X
X
X
X
1
2
As x̂s )) − ψ ∗ (ŷm+1 )
As x̂s ) − ψ(
(ψ(
kAt x̂t k +
2µ
s=1
s=1
t=1
t=1
=
m
m
X
X
1
2
kAt x̂t k + ψ(
As x̂s ) − ψ(0) − ψ ∗ (ŷm+1 ).
2µ
t=1
s=1
Proof of Lemma 2: Let (y, β) be a feasible solution for problem (23). Note that y ≥ 0 since
dom ψ ∗ ⊂ R+ by the fact that ψ is non-decreasing. Let ȳ(u) = inf s≤u y(s). Note that ȳ is
continuous. Define
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
,
β̄(u) = s=0
,
ψ(u)
ψ(u)
with the definition modified with the right limit at u = 0. For any u such that ȳ(u) = y(u), we have:
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
≥ s=0
= β̄(u).
ψ(u)
ψ(u)
Now, we consider the set {u | ȳ(u) 6= y(u)}. By the definition of ȳ, we have ȳ(0) = y(0). Since
both functions are continuous, the set {u | ȳ(u) 6= y(u)} is an open subset of R and hence can be
written as a countable union of disjoint open intervals. Specifically, we can define the end points of
the intervals as:
a0 = b0 = 0,
ai = inf{u > bi−1 | y(u) > ȳ(u)}, ∀i ∈ {1, 2, . . .}
bi = inf{u > ai | y(u) = ȳ(u)}, ∀i ∈ {1, 2, . . .}.
S
then {u | ȳ(u) 6= y(u)} = i∈{1,2,...} (ai , bi ).(See Figure 5)
For any i ∈ {1, 2, . . .}, we show that β(u) ≥ β̄(u) on (ai , bi ). If ai = ∞, then bi = ∞, so we
assume that ai < ∞. By the definition of ai and bi , ȳ(u) is constant on (ai , bi ). Also, we have
y(ai ) = ȳ(ai ). Similarly, we have y(bi ) = ȳ(bi ) whenever bi < ∞.
18
a1
b1 a2
b2 u
Figure 5: An example of y(u) (solid blue) and ȳ(u) (dashed red).
Since ȳ(u) ≤ y(u) for all u and y(ai ) = ȳ(ai ), we have
β(ai ) ≥ β̄(ai ).
(31)
If bi < ∞, similarly by the fact that y(bi ) = ȳ(ai ) = ȳ(bi ), we have
β(bi ) ≥ β̄(bi ).
(32)
Now we consider the case where bi = ∞. In this case we have ȳ(u) = ȳ(ai ) on (ai , ∞). We
consider two cases based on the asymptotic behavior of ψ. If limu→∞ ψ(u) = +∞ (ψ is unbounded),
then we have
Ru
Ru
y(s) ds
ȳ(ai ) ds
s=0
lim sup β(u) = lim sup
≥ lim sup s=0
= lim β̄(u).
(33)
u→∞
ψ(u)
ψ(u)
u→∞
u→∞
u→∞
Here we used the fact that −ψ ∗ (y(u)) is bounded. This follows from the fact ψ ∗ is monotone thus:
−ψ ∗ (y(u)) ≤ −ψ ∗ (ȳ(ai )),
and −ψ ∗ (ȳ(ai )) < ∞ because if −ψ ∗ (ȳ(ai )) = ∞, then β(ai ) ≥ β̄(ai ) = ∞ which contradicts the
feasibility of (y, β).
Now consider the case when limu→∞ ψ(u) = M for some positive constant M . In this case,
−ψ ∗ ≤ M . We claim that y(ai ) = 0 and lim inf t→∞ y(u) = 0. Suppose lim inf u→∞ y(u) > 0,
then lim supu→∞ β(u) = ∞ since the numerator in the definition of β tends to infinity while
the denominator is bounded. But this contradicts feasibility of (y, β). On the other hand, by the
definition of ai and bi we should have y(ai ) = ȳ(ai ) ≤ lim inf u→∞ y(u). Combining this with
the fact that ȳ(ai ) ∈ dom ψ ∗ ⊂ R+ , we conclude that y(ai ) = 0. Using that y(ai ) = 0 and
lim inf u→∞ y(u) = 0, we get:
Ru
y(s) ds − ψ ∗ (y(u))
lim sup β(u) = lim sup s=0
ψ(u)
u→∞
u→∞
Ru
y(s) ds − ψ ∗ (0)
≥ lim s=0
u→∞
M
R ai
ȳ(s)
ds
−
ψ ∗ (0)
≥ s=0
= lim β̄(u),
(34)
u→∞
M
where in the last inequality we used the fact that ȳ(u) = 0 for u ≥ ai .
Let ψ 0 be the right derivative of ψ. Since ψ is concave, ψ 0 is non-increasing. Therefore, the interval
(ai , bi ) can be written as (ai , u0 ] ∪ [u0 , bi ) such that ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] and ψ 0 (u) ≤ ȳ(ai ) on
[u0 , bi ). Since ψ 0 (u) ≥ ȳ(ai ) on (ai , u0 ] we have:
Z u
Z u
ȳ(s) ds =
ȳ(ai ) ds
ai
ai
Z u
≤
ψ 0 (s) ds = ψ(u) − ψ(ai ),
ai
19
for all u ∈ (ai , u0 ]. This yields:
R ai
β̄(ai ) =
≥
ȳ(s) ds − ψ ∗ (ȳ(ai ))
ψ(u)
Ru
R ai
ȳ(s) ds + ai ȳ(s) ds − ψ ∗ (ȳ(ai ))
s=0
s=0
ψ(ai ) + ψ(u) − ψ(ai )
= β̄(u).
for all u ∈ (ai , u0 ]. Here we used the fact that if c1 ≥ c2 > 0 and d2 ≥ d1 ≥ 0, then
c1
c1 + d1
≥
.
c2
c2 + d2
Similarly, we have β̄(bi ) ≥ β̄(u) for any u ∈ [u0 , bi ). Combining this with (31),(32),(33), and (34),
we get:
sup β̄(u) = max(β̄(ai ), β̄(bi ))
ai ≤u≤bi
≤ max(β(ai ), β(bi )) ≤
sup β(u).
ai ≤u≤bi
We conclude that β̄(u) ≤ β(u) for all t ≥ 0 hence (ȳ, β) is a feasible solution for the problem.
Proof of Theorem 2: Let (y, β) be a feasible solution for problem (23). By Lemma 2, we can
assume that y is non-increasing. First, note that y ≥ 0 since dom ψ ∗ = [0, ∞). Define ȳ(u) = y(u)
for u ≤ u0 and ȳ(u) = 0 for u > u0 . We show that (ȳ, β) is also a feasible solution for (23) modulo
the continuity condition. Define
Ru
Ru
y(s) ds − ψ ∗ (y(u))
ȳ(s) ds − ψ ∗ (ȳ(u))
s=0
β(u) =
,
β̄(u) = s=0
.
ψ(u)
ψ(u)
By the definition of ȳ, for all u, we have:
Z u
Z
y(s) ds ≥
0
u
ȳ(s) ds,
(35)
0
and β(u) = β̄(u) for u ∈ [0, u0 ]. Since y(u) is non-increasing and y(u) ≥ 0, limu→∞ y(u) exists.
We claim that limu→∞ y(u) = 0. To see this note that if limu→∞ y(u) > 0, then
Z u
y(s) ds = ∞,
lim
u→∞
s=0
which contradicts the fact that β(u) ≤ β for all u. For all u ≥ u0 , now we have:
Ru
limu→∞ s=0 y(s) ds − ψ ∗ (0)
sup β(u) ≥ lim β(u) =
u→∞
ψ(u0 )
u≥u0
Ru
limu→∞ s=0 ȳ(s) ds − ψ ∗ (0)
= β̄(u0 ),
≥
ψ(u0 )
where the equality follows from the fact that limu→∞ y(u) = 0, and in the last inequality, we used
(35). Since ȳ(u) = 0 for u > u0 , β(u) is constant on [u0 ∞). Therefore, supu≥u0 β̄(u) = β̄(u0 ).
Combining this with the previous inequality we get:
sup β(u) ≥ sup β̄(u0 ).
u≥u0
u≥u0
Therefore, we conclude that β̄(u) ≤ β for all u. Thus (ȳ, β) is also a feasible solution for (23)
modulo the continuity condition. Note that ȳ(u) may not be continuous at u0 . However, we can find
a sequence of continuous functions z (j) that converge pointwise to y and z (i) (u) = 0 for all i and
u ≥ u0 . To do so we consider a sequence of real number i → 0. We define z (i) (u) = ȳ(u) for
u ∈ [0, u0 − i ) ∪ [u0 , ∞). On [u0 − i , u0 ] we define z (i) (u) to be a linear function that take values
y(u0 − ) and 0 on the endpoints. Define
R u (i)
z (s) ds − ψ ∗ (z (i) (u))
βz(i) = sup s=0
.
ψ(u)
u>0
20
By upper semi-continuity of ψ ∗ , βz(i) converges to β̄.
Let β ∗ be the optimal solution for problem (23). By the definition, there exits a feasible sequence
(y (j) , β (j) ) such that β (j) converges to β ∗ . Let ȳ (j) (u) = y (j) (u) for t ≤ u0 and ȳ (j) (u) = 0 for
t > u0 . Note that ȳ (j) (u) may not be continuous at u0 . However, we can find a sequence of continuous
functions (z (ji) , βz(ji) ) as in above. Now βz(jj) converges to β ∗ .
Distance from lp norm ball
B
In this section we prove that the function:
G(u) = −d1 (u, Bp )
satisfies Assumption 1 and find a lower bound on ᾱψ when ψ is given by 16 with G(u) =
−ld1 (u, Bp ).
For any u ∈ Rn+ , there exists ū ∈ Bp such that d1 (u, Bp ) = ku − ūk1 . the subdifferential of distance
function is6 :
∂d1 (u, Bp ) = ∂ ku − ūk1 ∩ NBp (ū),
where NBp (u) = {ξ | hξ, v − ui ≥ 0, ∀v ∈ Bp } is the normal cone of Bp at u. In fact d1 (u, Bp ) =
ku − ūk1 if and only if ∂ ku − ūk1 ∩ NBp (ū) 6= ∅. When u ∈ intBp , ū = u and ∂d1 (u, Bp ) = {0}.
In order to find ∂d1 (u, Bp ) when u ∈
/ intBp , we first find ū in this case. For any r ≥ 0, define
u ∧ r ∈ Rn+ to be:
(u ∧ r)i = min(ui , r) ∀i.
Note that ku ∧ 0kp = 0 and ku ∧ (maxi ui )kp = kukp ≥ 1. Since ku ∧ rkp is a continuous function
of r, by the intermediate value theorem, there exists ru ∈ (0, maxi ui ] such that ku ∧ ru kp = 1.
Now ū = u ∧ r. To see this note that:
∂ ku − ūk1 ∩ NBp (ū) =
∂ ku − ūk1 ∩ NBp (ū) =
1
◦(p−1)
(u ∧ ru )
for ru < max ui ;
i
rup−1
z
◦(p−1)
|0≤z≤1
for ru = max ui ;
p−1 (u ∧ ru )
i
ru
(36)
(37)
where ◦(p−1) denotes element-wise exponentiation. Now if u0 ≤ u, then ru ≤ ru0 since ku ∧ rkp ≥
ku0 ∧ rkp for all r. Thus by (36) and (37), there exists y ∈ ∂d1 (u, Bp ) such that y ≥ ∂d1 (u0 , Bp ).
Now
bound αψ when ψ is given by 16 with G(u) = −ld1 (u, Bp ). Let (v, u) =
Pm we canPlower
m
( t=1 ct x̃t , t=1 Bt x̃t ). Note that by (36) when y ∈ ∂ψ(u) with u ∈
/ Bp , then mini yi = −l. Now
by the definition of l in (17) and the explanation that followed it, we must have u ∈ Bp . If u ∈ intBp ,
then G is differentiable at u and ∇G(u) = 0 which yields αψ (v, u) = 0. Now suppose u ∈ bdBp .
In this case we have:
− kykq
− kykq
G∗ (y)
Pm
αψ (v, u) = min
= min Pn
≥ min
.
y∈∂G(u)
y∈∂G(u) ψ (
y∈∂G(u) θ1T u
t=1 At xt )
t=1 ct x̄t
Recall that θ = mint minx∈Ft
cT
t x
.
1T Bt x
By (37), we have:
min − kykq = −
y∈∂G(u)
l
.
(maxi ui )p−1
Therefore,
αψ (v, u) ≥ −
l
1
.
θ (1T u)(maxi ui )p−1
As u varies on the bdBp , the right hand side is lower bounded by
6
For convex function we use ∂ to denote subdifferential.
21
−l
θ .
This yields αψ ≥ − θl .
C
Derivation of lower bounds on αψ,ψφ
We first derive a general inequality which will be specialized to different examples for bounding
αψ,ψφ . Let K = K1 × K2 , with K1 and K2 two proper cones. Suppose ψ(v, u) = H(v) + G(u),
where H : K1 7→ R is a non-decreasing, and G : K
P2m7→ R is non-increasing and l Lipschitz
continuous. We assume H(v) ≥ θu for all (v, u) ∈ t=1 At Ft . Note that ψ ∗ (z, y) = H ∗ (z) +
G∗ (y). We set
m
X
θ
(e − 1)
1
∗
yi −
log 1 −
yi − (1 + γ)yi ,
φ (y) =
γ
(e − 1)
θ
i=1
Pm
where γ = log(1 + l(e−1)
). We let ψφ(v, u) = H(v) + Gφ(u). Let (v, u) ∈ t=1 At x̃t . Since
θ
ψφ(0) = 0, and the simultaneous algorithm does not decrease the objective,
H(v) + Gφ(u) ≥ ψφ(0) = 0.
(38)
Let (z, y) ∈ ∂ψφ(u), then we have:
˜ i G∗ (y)
ui = ∇i φ∗ (y) + ∇
1
(e − 1)yi
˜ i G∗ (y),
= log(1 −
)−1+∇
γ
θ
(39)
˜ ∗ (y) ∈ ∂G∗ (y). Using the previous identity, we can derive the following upper bound
for some ∇G
for Gφ(u):
Gφ(u) = hy, ui − G∗ (y) − φ∗ (y)
D
E
˜ ∗ (y) − G∗ (y) + hy, ∇φ∗ (y)i − φ∗ (y)
= y, ∇G
˜ ∗ (y)) + φ(∇φ∗ (y))
= G(∇G
m
X
θ
˜ ∗ (y)) +
˜ i G∗ (y) + 1) + 1 1T y
= G(∇G
(ui − ∇
(e − 1) i=1
γ
m
X
1
θ
˜ i G∗ (y)) + 1 1T y.
H(v) +
(1 − ∇
(40)
(e − 1)
(e − 1) i=1
γ
Pm
Now we specialize the bound to the case where G : Rm
+ 7→ R and G(u) = −l
i=1 (ui − 1)+ . We
∗
˜
lower bound αψ,ψφ (v, u) when u ≤ 1. In that case, (39) is satisfied with ∇i G (y) = 1. Thus from
(40) simplifies to:
1
1
Gφ(u) ≤
H(v) + 1T y.
(41)
(e − 1)
γ
˜ ∗ (y)) +
≤ G(∇G
Combining this with (38), we get:
H(v) + G(u) = H(v) ≥
(1/e − 1) T
1 y.
γ
(42)
In the view of definition of αψ,ψφ , by using (41) and the fact that G∗ (y) = 1T y, we derive the
following inequality:
1
1
H(v) + Gφ(u) − G∗ (y) ≤ (1 +
)H(v) + ( − 1)1T y.
(43)
e−1
γ
Combining (42) and (43), we get the following lower bound on αψ,ψφ :
αψ,ψφ (v, u) ≥ 1 − (1 +
1
)γ + ᾱH .
e−1
(44)
Online LP: In this problem,
ψ
m
X
t=1
!
At x t
=
m
X
cTt xt
t=1
+G
m
X
t=1
22
!
Bt xt
,
(45)
Pn
with G(u) = −l i=1 (ui − 1)+ . In this problem H(v) = v is the identity function.
Pm
Pm
Let (ṽ, ũ) = ( t=1 cTt x̃t , t=1 Bt x̃t ). If ỹt,i ≤ −l for some t and i, then by the definition of l
in (17) and the explanation that followed it, we have (Bt x̃t )i = 0. On the other hand, we have
∇i Gφ(u) ≤ −l when ũi ≥ 1. Therefore, we conclude that ũ ≤ 1. Also, by the definition of θ, we
have H(ṽ) ≥ θ1T ũ. Since H is a linear function, αH = 0. Thus (44) yields
αψ,ψφ (ṽ, ũ) ≥ 1 − (1 +
1
)γ.
e−1
(46)
Online graph formation and online Experiment design : In this problem, H(U ) = log det(U +
A0 ) − log det(A0 ), G(u) = −l(b − u)+ and At x = (aTt at x, x).
We can use the following identity for determinant of rank one update of a matrix
det(A + vv T ) = det(A)(1 + v T A−1 v T ),
to derive a lower bound on log det(U + A0 ) − log det(A0 ),
H(U ) = log det(U + A0 ) − log det(A0 )
=
m
X
log det(A0 +
s=1
=
m
X
s
X
at aTt x̃t )
− log det(A0 +
t=1
s−1
X
at aTt x̃t )
t=1
log(1 + aTt Ỹt at x̃t )
t=1
≥ log(1 +
m
1 X
)
x̃t = θu.
n t=1
Pm
Pm
Let (Ũ , ũ) = ( t=1 at aTt x̃t , t=1 x̃t ). If ỹt ≤ −l for some t, then by the definition of l in (22),
aTt Ỹt at + ỹt < 0 which results in x̃t = 0. Given the fact that Gφ0 (u) = −l when u ≥ b, we
conclude that ũ ≤ b. Therefore, by (44), we get
αψ,ψφ (Ũ , ũ) ≥ −(1 +
23
1
)γ.
e−1
| 8 |
ASYMPTOTIC GROWTH OF ASSOCIATED PRIMES
OF CERTAIN GRAPH IDEALS
arXiv:1204.3315v2 [math.AC] 5 Dec 2012
SARAH WOLFF
Abstract. We specify a class of graphs, Ht , and characterize
the irreducible decompositions of all powers of the cover ideals.
This gives insight into the structure and stabilization of the corresponding associated primes; specifically, providing an answer to
the question “For each integer t ≥ 0, does there exist a (hyper)
graph Ht such that stabilization of associated primes occurs at
n ≥ (χ(Ht ) − 1) + t?” [4]. For each t, Ht has chromatic number 3
and associated primes that stabilize at n = 2 + t.
1. Introduction
We work at the intersection of graph theory and commutative algebra
by relating powers of square-free monomial ideals in polynomial rings
to vertex covers of finite simple graphs. Ideal constructions give two
correspondences, both of which associate to each such graph a monomial ideal. These correspondences have been established and studied
in, for example, [9], [8], [3], and [4].
Motivated by the Strong Perfect Graph Theorem, Francisco, Hà,
and Van Tuyl [3] expand the link between graph theory and algebra in
order to provide an algorithm for determining if a graph is perfect—
neither it nor its complementary graph has an induced odd cycle of
length five or greater. Their algorithm results from relating odd cycles
to the associated primes of powers of monomial ideals. Francisco, Hà,
and Van Tuyl continue to investigate this connection in [4], establishing
a lower bound on the stabilization of these associated primes that is
derived from the chromatic number of the corresponding graphs. They
find that stabilization does not occur when n < χ(G) − 1, for χ(G)
the chromatic number of the graph and n the power of the ideal [4,
Corollary 4.9]. They further show that this bound is not optimal,
leading to the question: “For each integer t ≥ 0, does there exist a
(hyper)graph Ht such that the stabilization of associated primes occurs
Date: March 24, 2018.
2000 Mathematics Subject Classification. 05C25, 05E40, 05C38, 13F20.
1
2
SARAH WOLFF
at n ≥ (χ(Ht ) − 1) + t?” [4, Question 4.10]. In this paper we answer
this question in the affirmative.
More precisely, let G be a graph with vertex set VG = {v1 , . . . , vm }
and edge set EG consisting of unordered pairs of distinct vertices of
G. Let K be a field. We identify the vertices of G with the variables in the polynomial ring RG = K[v1 , . . . , vm ]. Further, we associate two square-free monomial ideals to G: the edge ideal, IG , generated by {vi vj | {vi , vj } ∈ EG }, and the cover ideal, JG , generated
by {vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. These ideal constructions were first introduced in [9] and give the correspondences
mentioned above.
Francisco, Hà, and Van Tuyl study the associated primes of RG /(JG )2 ,
denoted Ass(RG /(JG )2 ), and find that P is in Ass(RG /(JG )2 ) if and
only if either P = (vi , vj ) where {vi , vj } is an edge of G, or P =
(vi1 , . . . , vis ) where the subgraph induced by {vi1 , . . . , vis } is an odd cycle of G [3, Corollary 3.4]. These results are derived by determining the
irreducible decomposition of (JG )2 , i.e., writing (JG )2 as an intersection
of irreducible monomial ideals.
They then extend these ideas in [4] by studying Ass(RG /(JG )n ) for
n ≥ 2. Brodmann [2] in 1979 proved that the set of associated primes
of powers of ideals stabilizes, i.e., for a ring R and an ideal I of R,
there exists some positive integer s such that Ass(R/I s ) = Ass(R/I n )
for all n ≥ s. Francisco, Hà, and Van Tuyl [4] find a lower bound on the
stabilization of Ass(RG /(JG )n ), proving for a graph G that stabilization
does not occur when n < χ(G) − 1 [4, Corollary 4.9]. They then pose
the question mentioned above [4, Question 4.10], which we answer in
the affirmative by providing a family of graphs, Ht , each with chromatic
number three such that for each t, Ass(RHt /(JHt )n ) stabilizes at n =
(χ(Ht ) − 1) + t = 2 + t.
The main result of this paper is:
Theorem 4.1. For t ∈ Z+ , let Rt := RHt be the polynomial ring
associated to Ht and let Jt := JHt denote the cover ideal of Ht . Then
the associated primes of Rt /(Jt )n stabilize at n = (χ(Ht )−1)+t = 2+t.
As in [3], we characterize the associated primes of Rt /(Jt )n by studying the monomial ideal powers (Jt )n . Just as the cover ideal is generated
by vertex covers of the graph, we find that the generators of the ideals
in the irreducible decompositions of (Jt )n are closely related to vertex
covers. In Section 2 we develop the necessary tools from algebra and
graph theory for our results. In Section 3 we introduce the family of
graphs and explore the structure of these graphs with several key lemmas. In Section 4 we use these lemmas to characterize the irreducible
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
3
decompositions of (Jt )n (Theorem 4.11). Theorem 4.1 is then a direct
consequence of Theorem 4.11.
2. Graph Theory and Associated Primes
In this section we briefly introduce the important definitions from
graph theory and algebra needed for our results. We use the basic
conventions, notation, and definitions from [1], [3], and [7].
For a graph G we enumerate its vertex set VG = {v1 , . . . , vm }. We
assume that G is a simple graph so that its edge set, EG , consists of
unordered pairs {vi , vj } of distinct vertices. Two vertices are adjacent
if they are joined by an edge.
A coloring of G is an assignment of colors to the vertices of G such
that no two adjacent vertices are assigned the same color. The chromatic number of G is the minimal number of colors in a coloring of
G.
A subset A of VG is a vertex cover if every edge of G is incident to at
least one vertex of A. The subset is a minimum vertex cover if it is a
vertex cover of smallest cardinality. In this paper we consider minimum
vertex covers rather than minimal vertex covers as this distinction is
necessary for the proof of Theorem 4.11.
For a subset A of VG , the neighbors of A, denoted N (A), are the
vertices of G that are adjacent to vertices of A, but do not lie in A.
The subgraph of G induced by A is the subgraph with vertex set A and
edge set consisting of those edges of G with both vertices in A.
A graph with vertex set {w1 , . . . , wk } is a k-cycle if its edge set
consists precisely of edges connecting wk to w1 and wi to wi+1 , 1 ≤ i <
k. We call the cycle odd (respectively, even), if k is odd (respectively,
even).
Let K be a field. We identify the vertices of G with variables in
the polynomial ring RG = K[v1 , . . . , vm ]. Let IG denote the edge
ideal of G, and let JG denote the cover ideal of G, generated by
{vi1 · · · vij | {vi1 , . . . , vij } a vertex cover of G}. We note that JG is
often equivalently defined as the Alexander dual of IG (see, e.g., [3],
[4]). For an explanation of Alexander duality, see [7].
A typical monomial element of the cover ideal JG is of the form
a1 a2
am
v1 v2 · · · vm
for nonnegative integers ai . Just as the variables v1 , . . . , vm
correspond to vertices of the graph G, the vector (a1 , . . . , am ) also has
a graph theoretic interpretation. We refer to any such a = (a1 , . . . , am )
(corresponding to the vertices v1 , . . . , vm of G) as a degree vector and
say a nonzero degree vector a is a k-cover if ai + aj ≥ k whenever
{vi , vj } ∈ EG .
4
SARAH WOLFF
The concept of k-cover was first introduced in [6] as a generalization
of a vertex cover. Note that if a subset A of VG is a minimum vertex
cover then a degree vector a with ai = 1 if vi ∈ A and ai = 0 otherwise
is a one-cover of G. We call such a one-cover a minimum one-cover.
am
)
An irreducible monomial ideal is an ideal of the form V a = (v1a1 , . . . , vm
ai
n
for a ∈ N , where if ai = 0, we omit vi from the set of generators.
Every monomial ideal I can be written as the finite intersection of irreducible monomial ideals: I = V a1 ∩ · · · ∩ V as , called an irreducible
decomposition of I [7]. The decomposition is called irredundant if no
V ai can be omitted.
Let R be a commutative ring and M an R-module. The set of
associated primes of M , denoted Ass(M ), consists of prime ideals P
such that P annihilates some m in M .
T For a graph G, the cover ideal JG has irreducible decomposition JG =
{vi ,vj }∈EG (vi , vj ) (see e.g., [3]); hence, Ass(R/JG ) = {(vi , vj ) | {vi , vj } ∈
EG }. Generalizing to (JG )n , we compute the irreducible decompositions of (JG )n for our family of graphs in order to deduce the set of
associated primes of R/(JG )n . We refer to this set as the associated
primes of G.
3. A Family of Graphs
We proceed to define a family of graphs, Ht , to give an affirmative
answer to the question posed in [4, Question 4.10]: “For each integer
t ≥ 0, does there exist a (hyper)graph Ht such that the stabilization of
associated primes occurs at n ≥ (χ(Ht ) − 1) + t?” Note by [3, Remark
3.3, Corollary 3.4] that the associated primes of an odd cycle, G, stabilize at n = χ(G) − 1 + 0 = 2. We thus answer the above question for
t ≥ 1.
Definition 3.1. The graph H1 has vertex set {x1 , . . . , x5 , y1 } and edge
set such that the subgraph induced by {x1 , . . . , x5 } is a 5-cycle and the
neighbors of y1 are precisely {x1 , x2 , x3 }.
For t > 1, Ht has vertex set {x1 , . . . , x4t−1 , y1 , . . . , yt } and edge set
such that the subgraph induced by {x1 , . . . , x4t−1 } is a (4t − 1)-cycle,
the neighbors of y1 are precisely {x1 , x2 , x3 }, and for 1 < i ≤ t the
neighbors of yi are precisely {x4i−4 , x4i−3 , x4i−2 , x4i−1 } (Figure 1).
We first note that the graphs Ht have chromatic number three for all
t ≥ 1. To see this, assign color 1 to the vertices {x1 , x3 } ∪ {yi | i > 1},
color 2 to the vertices {x2 } ∪ {x2k+1 | k > 1}, and color 3 to the
remaining vertices. Each Ht has at least one odd cycle; thus, this
3-coloring is a minimum coloring.
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
H1
H2
x2
H3
x1
x1
x1
y1
x2
y1
x2
x3
x3
x3
x4
x4
x4
x5
x5
x6
x7
5
y2
x5
x6
y1
y2
...
x7
x8
x9
x10
y3
x11
Figure 1. Ht
Let Jt := JHt be the cover ideal of Ht for each t ≥ 1 and let Rt := RHt
be the polynomial ring associated to Ht . We show that Ass(Rt /(Jt )n )
stabilizes at n = 2 + t. This result will follow from a characterization
of the irreducible decompositions of (Jt )n for all t ≥ 1 and n ≥ 1.
For this characterization, we use the structure of the graphs together
with the following technical lemmas, all of which follow easily from the
definitions:
Lemma 3.2. Let G be a graph with vertex set {v1 , . . . , vm }. Let RG be
the polynomial ring associated to G, and let JG be the cover ideal of G.
If M is a minimal generator of (JG )n , then
\
M∈
(vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ).
{vi ,vj }∈EG
Lemma 3.3. Let G be a graph with vertex set {v1 , . . . , vm } and cover
am
ideal JG . Then the mononomial v1a1 · · · vm
is an element of (JG )n if
and only if a = (a1 , . . . , am ) is an n-cover of G that can be written as
the sum of n one-covers, ai , of G: a = a1 + · · · + an .
We note that a degree vector, a, for a graph G can also be interpreted as a degree vector for a subgraph of G induced by A ⊆ VG by
considering only the ai corresponding to the vertices of A. We denote
this subgraph degree vector by a|A .
Lemma 3.4. For a graph G, let a be a degree vector for G. Let
G1 , . . . , Gl be induced subgraphs of G such that EG ⊆ EG1 ∪ · · · ∪ EGl .
6
SARAH WOLFF
Then a is a one-cover of G iff a|Gi is a one-cover of Gi for all i,
1 ≤ i ≤ l.
Our interest is in studying (Jt )n . By Lemma 3.3, elements of (Jt )n
correspond to n-covers of Ht . These n-covers can be written as the sum
of n one-covers of Ht , which in turn arise from one-covers of induced
subgraphs, by Lemma 3.4. Since minimum vertex covers give rise to
one-covers, it will be informative to look at the structure of minimum
vertex covers of induced subgraphs of our family Ht .
Lemma 3.5. A minimum vertex cover of an odd k-cycle consists of
k+1
vertices.
2
Lemma 3.6. For the graph Ht , a minimum vertex cover of the induced
subgraph on {y1 } ∪ N (y1 ) consists of the vertices {x2 , y1 }. For i > 1, a
minimum vertex cover of the induced subgraph on {yi } ∪ N (yi ) consists
of exactly 3 vertices, one of which is yi .
4. Stability of Associated Primes
We restate our main theorem. Recall that Jt is the cover ideal of Ht
and Rt the polynomial ring associated to Ht .
Theorem 4.1. Let t ∈ Z+ . The associated primes of Rt /(Jt )n stabilize
at n = (χ(Ht ) − 1) + t = 2 + t.
This result will follow from the determination of the irreducible decompositions of (Jt )n in Theorem 4.11. Each component of the irreducible decomposition of (Jt )n is an irreducible monomial ideal of the
form (via11 , . . . , viakk ), for vij vertices of Ht (either x or y vertices). The
powers of the variables are in fact determined by the structure of the
subgraph induced by {vi1 , . . . , vik }. Thus, we abuse terminology in the
following way: for an ideal (via11 , . . . , viakk ) ⊆ Rt , we refer to each variable vij as a vertex, each power aj as a degree, and a = (a1 , . . . , ak ) as
a degree vector.
For any simple graph G with vertex set {v1 , . . . , vm }, let JG be the
cover ideal. Then by [3, Theorem 3.2], the irredundant irreducible
decomposition of (JG )2 is:
\
\
\
(JG )2 =
[(vi2 , vj ) ∩ (vi , vj2 )]
(vi21 , . . . , vi2k ),
{vi ,vj }∈EG
{vi1 ,...,vik }
an odd cycle
where the last intersection is over all subsets {vi1 , . . . , vik } such that
the subgraph induced by {vi1 , . . . , vik } is an odd cycle.
For our family of graphs, we generalize the above irreducible decomposition of (Jt )2 to one for (Jt )n , n > 2, by inductively adding
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
7
a minimum one-cover’s worth of degrees to each degree vector appearing in the irreducible decomposition of (Jt )n−1 . In other words,
if V c = (vic11 , . . . , vickk ) is an ideal in the irreducible decomposition of
(Jt )n−1 , and b is a minimum one-cover of the subgraph induced by
{vi1 , . . . , vik }, we show that V c+b is an ideal in the irreducible decomposition of (Jt )n .
To be more explicit, if the induced subgraph on {vi1 , vi2 , vi3 } ⊆ VHt is
a 3-cycle, then by [3, Theorem 3.2], (vi21 , vi22 , vi23 ) is a component of the
irreducible decomposition of (Jt )2 . We lift this to (Jt )n by showing that
(via11 , via22 , via33 ) is a component of the irreducible decomposition of (Jt )n
whenever a = (a1 , a2 , a3 ) is a degree vector for the induced subgraph
on {vi1 , vi2 , vi3 } obtained by adding (n − 2) minimum one-covers of
this subgraph to the degree vector c = (2, 2, 2). This results in many
different possibilities for a: by Lemma 3.5, a minimum one-cover of the
subgraph is of form (0, 1, 1),(1, 0, 1), or (1, 1, 0). Thus, adding (n − 2)
minimum one-covers to c leads to n2 possibilities for a.
Rather than writing out all these possibilities, we introduce below
the terminology n-admissible and n̂-admissible to distinguish degree
vectors of specific induced subgraphs of Ht . As the irreducible decompositions of (Jt )n are known for n ≤ 2, we work with n > 2 in the
following definitions.
Consider an arbitrary subset of vertices, V = {vi1 , . . . , vik } ⊆ VHt . If
the subgraph induced by V is an odd cycle, we call V an induced odd
cycle. Consider the corresponding degree vector a = (a1 , . . . , ak ).
Definition 4.2. A degree vector a corresponding to an induced odd
cycle V is n-admissible if a = (2, . . . , 2) + b1 + · · · + bn−2 where each
bi is a minimum one-cover of the cycle.
Remark 4.3. Note by Lemma 3.5 that for V an induced odd k-cycle,
if the corresponding degree vector a is n-admissible, then
k
X
i=1
ai = 2k + (n − 2)
k + 1
.
2
Now fix a positive integer r ≤ t and consider a subgraph induced by
vertices V ∪Yr = {vi1 , . . . , vik , yj1 , . . . , yjr } where V ⊆ VHt is an induced
odd cycle, Yr ⊆ {y1 , . . . , yt } (the specified y-vertices in Definition 3.1),
and N (Yr ) ⊆ V . We call such a subgraph an r-cluster, or an r-cluster
induced by V ∪ Yr , when we want to specify the vertices. Note that in
the definition of r-cluster, V can be an induced odd cycle of any length
on any of the vertices of Ht , so long as N (Yr ) ⊆ V . On the other hand,
Yr must contain exactly r vertices, and they must be y-vertices.
8
SARAH WOLFF
Recall that we assume n > 2 for the following definition.
Definition 4.4. A degree vector c corresponding to an r-cluster induced by V ∪ Yr , is n̂-admissible if c = d + e + f1 + · · · + fn−3 , where:
2 vji ∈ V \ N (Yr )
(1) di =
,
3
otherwise
(2) e|Yr ∪N (Yr ) = (0, . . . , 0),
(3) e|V \N (Yr ) is a minimum one-cover of the subgraph induced by
V \ N (Yr ),
(4) for all 1 ≤ i ≤ n − 3, fi |V \N (Yr ) is a minimum one-cover of the
subgraph induced by V \ N (Yr ),
(5) for all 1 ≤ i ≤ n − 3 and yjl ∈ Yr , fi |{yjl }∪N (yjl ) is a minimum
one-cover of the subgraph induced by {yjl } ∪ N (yjl ).
Example 4.5. Let n = 5. Consider the following 2-cluster of H4 : the
subgraph induced by
V ∪ Y2 = {x1 , x2 , x3 , x4 , y2 , x7 , x8 , y3 , x11 , x12 , x13 , x14 , x15 , y1 , y4 }.
Then d = (3, 3, 3, 2, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 3), one of the two possibilities for e is (0, 0, 0, 0, 1, 0, 1, 0, 1, 0, 0, 0, 0, 0, 0) and two of the six possibilities for each fi , i ∈ {1, 2}, are (0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 0, 1, 1)
and (0, 1, 0, 0, 1, 0, 1, 0, 1, 0, 1, 1, 0, 1, 1). Thus, the degree vector
c = (3, 5, 3, 3, 4, 3, 4, 3, 4, 4, 4, 5, 3, 5, 5)
is 5̂-admissible.
Remark 4.6. Consider the subgraph induced by {x1 , x2 , x3 , y1 }. By
Lemma 3.6, the minimum vertex cover of this subgraph is {x2 , y1 }.
Thus, for an arbitrary r-cluster, induced by V ∪ Yr , if y1 ∈ Yr , the
corresponding degrees for x2 and y1 would be 1 in each fj . By the same
lemma, for i > 1, a minimum vertex cover of the subgraph induced by
{yi } ∪ N (yi ) consists of yi and two vertices in N (yi ); thus, if yi ∈ Yr ,
then in each fj the corresponding degrees for yi and two vertices in
N (yi ) would be 1.
The following lemma is key to the proof of Theorem 4.11.
Lemma 4.7. Let r ≥ 1 and n > r + 1. Consider an arbitrary r-cluster
of Ht , induced by V ∪ Yr . Let c = (c1 , . . . , ck+r ) be a degree vector for
Pk+r
the r-cluster. If c is n̂-admissible then i=1
ci < r + k + n k+1
+r .
2
Proof. Consider an arbitrary r-cluster of Ht , induced by V ∪ Yr , and
suppose the corresponding degree vector, c, is n̂-admissible. We compute the degree sum imposed by the definition of n̂-admissible. This
degree sum depends on whether y1 ∈ Yr , or not.
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
9
First suppose y1 ∈ Yr . If c is n̂-admissible, then c = d + e + f1 +
· · · + fn−3 , with each degree vector as specified in Definition 4.4. We
first note that
k+r
X
di = 12 + 15(r − 1) + 2(k − 4r + 1).
i=1
Next, we claim
k+r
X
ei ≤
i=1
k − 4r + 1
.
2
To see this, we find a bound on the number of vertices in a minimum
vertex cover of the subgraph induced by V \ N (Yr ). First note that
k − 4r + 1 vertices comprise V \ N (Yr ). Further, the subgraph of Ht
induced by V \ N (Yr ) consists of disjoint subgraphs of V induced by
one or more subsets V1 , . . . , Vl ⊂ V . Let vα be the number of vertices
in Vα , 1 ≤ α ≤ l. If vα is even, a minimum vertex cover of the subgaph
induced by Vα consists of v2α vertices, while if vα is odd, a minimum
vertex cover consists of vα2−1 vertices. Hence,
k+r
X
i=1
l
X vα − 1
X vα
1X
k − 4r + 1
ei =
+
≤
vα =
,
2
2
2
2
v
even
α=1
v odd
α
α
as claimed.
Finally, by Lemma 3.6 and the above claim we see that for each fj ,
1 ≤ j ≤ n − 3,
k+r
X
fji ≤ 2 + 3(r − 1) +
i=1
Since the degree sum of fj ,
k+r
X
i=1
ci =
k+r
X
Pk+r
i=1
di +
i=1
k − 4r + 1
.
2
fji , is independent of j, we have:
k+r
X
ei + (n − 3)
i=1
k+r
X
f ji ,
i=1
for any j ∈ {1, . . . , n − 3}. The inequality of the lemma then reduces
to showing that r + 1 < n, which is true by assumption.
Next suppose y1 ∈
/ Yr . Here,
k+r
X
di = 15r + 2(k − 4r),
i=1
and we claim
k+r
X
i=1
ei ≤
k − 4r − 1
.
2
10
SARAH WOLFF
To see this, note that in this case k − 4r vertices comprise V \ N (Yr ).
As above, the subgraph of Ht induced by V \ N (Yr ) consists of disjoint
subgraphs of V induced by subsets V1 , . . . , Vl ⊂ V . Further, because V
is an induced odd cycle, k − 4r is odd, so at least one of the subsets,
without loss V1 , has an odd number of vertices, v1 . Hence, as above,
k+r
X
i=1
l
X vα − 1
X vα
X
k − 4r − 1
1
ei =
+
≤ v1 − 1 +
vα =
,
2
2
2
2
v even
α=2
v odd
α
α
as claimed.
Finally, by Lemma 3.6 and the above claim we see that for each fj ,
1 ≤ j ≤ n − 3,
k+r
X
k − 4r − 1
fji ≤ 3r +
.
2
i=1
Pk+r
Again, the degree sum of fj ,
i=1 fji , is independent of j, and the
inequality of the lemma reduces to showing r + 1 < n.
We now define several ideals to simplify the statement of Theorem
4.11. Fix a graph Ht and a positive integer n. For an arbitrary set
of vertices V = {vi1 , . . . , vik } of Ht with corresponding degree vector
a = (a1 , . . . , ak ), let V a denote the ideal (via11 , . . . , viakk ). Again, we
a
remind the reader of our convention to omit vijj when aj = 0.
Definition 4.8.
\
At,n =
(vin , vj ) ∩ (vin−1 , vj2 ) ∩ · · · ∩ (vi2 , vjn−1 ) ∩ (vi , vjn ).
{vi ,vj }∈EHt
\
Definition 4.9. Bt,n =
V a.
subgraph of Ht induced
by V an odd cycle,
a n-admissible
r
Definition 4.10. Dt,n
=
\
(V ∪ Yr )c .
subgraph of Ht induced
by V ∪Yr an r-cluster,
c n̂-admissible
We now give the irreducible decompositions of (Jt )n :
Theorem 4.11. Let t ∈ Z+ and let Jt be the cover ideal of Ht . For
n > 2, (Jt )n has the following irredundant irreducible decomposition:
n
(Jt ) = At,n ∩ Bt,n ∩
n−2
\
r=1
r
Dt,n
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
11
T
r
Proof. For t ∈ N and n > 2, let L be the ideal At,n ∩ Bt,n ∩ n−2
r=1 Dt,n .
Let M be a minimal generator of (Jt )n . We
show M is in L by showing
Tn−2
r
separately.
it is in each of the ideals At,n , Bt,n , and r=1 Dt,n
First suppose M ∈
/ Bt,n . Since M is a minimal generator of the
am
, for {v1 , . . . , vm } the vertices of
monomial ideal (Jt )n , M = v1a1 · · · vm
Ht . By Lemma 3.3 the powers, a = (a1 , . . . , am ), when viewed as a
degree vector of Ht form an n-cover that can be written as the sum of
n one-covers, bi , of Ht : a = b1 + · · · + bn . Let V = {vj1 , . . . , vjk } be an
arbitrary induced odd cycle of Ht . Since a is an n-cover of Ht , a|V is an
n-cover of the odd cycle. Further, for 1 ≤ i ≤ n, since bi is a one-cover
of Ht , bi |V is a one-cover of the cycle. Then a|V = b1 |V + · · · + bn |V
with each bi |V a one-cover of the subgraph induced by V . Thus, a|V =
(aj1 , . . . , ajk ) is an n-cover of the cycle that can be written as the sum
P
of n one-covers. Then by Lemma 3.5, ki=1 aji ≥ n k+1
. However,
2
M ∈
/ Bt,n , so M ∈
/ V u for some n-admissible u. Thus, in M each
variable vij ∈ V has degree less than uj , so
k
X
i=1
aj i ≤
k
X
(ui − 1) = k + (n − 2)
i=1
k + 1
,
2
k+1
by Remark 4.3. But k + (n − 2) k+1
<
n
, so a|V is not an n2
2
cover of the cycle that can be written as the sum of n one-covers, a
contradiction. Thus, M ∈ Bt,n .
T
a1
r
am
Now suppose M ∈
/ n−2
r=1 Dt,n . Again, M = v1 · · · vm is a minimal
generator of (Jt )n so the powers, a = (a1 , . . . , am ), when viewed as a
degree vector of Ht form an n-cover that can be written as the sum of
n one-covers, bi , of Ht : a = b1 + · · · + bn . For r ≤ n − 2, consider
an arbitrary r-cluster of Ht , induced by V ∪ Yr . As above, a|V ∪Yr is
an n-cover of the r-cluster and for 1 ≤ i ≤ n, bi |V ∪Yr is a one-cover of
the r-cluster, so a|V ∪Yr = (al1 , . . . , alk+r ) is an n-cover of the r-cluster
that
as the sum of n one-covers.
Tn−2 r Then by Lemma 3.6,
Pk+rcan be written
k+1
+ r . However, M ∈
/ r=1 Dt,n , so M ∈
/ (V ∪ Yr )c ,
i=1 ali ≥ n
2
for some n̂-admissible c. Thus, as in the previous case,
k+r
X
i=1
ali ≤
k+r
X
(ci − 1).
i=1
But since n ≥ r + 2, Lemma 4.7 shows
k+r
X
i=1
(ci − 1) < n
k+1
+r ,
2
12
SARAH WOLFF
so a|V ∪Yr is not an n-cover of the r-cluster that can
be written as the
Tn−2
r
sum of n one-covers, a contradiction. Thus, M ∈ r=1 Dt,n
.
We finally note by Lemma 3.2 that M ∈ At,n . Hence, (Jt )n ⊆ L.
Now let P be a minimal generator of L. The ideal L is an intersection
of monomial ideals, so P = via11 · · · viamm . By definition, P ∈ At,n ; therefore, the powers a = (a1 , . . . , am ), of the variables of P when viewed
as a degree vector of Ht form an n-cover. By Lemma 3.3, it suffices to
show a can be written as the sum of n one-covers of Ht .
Consider an arbitrary one-cluster of Ht , induced by V ∪ Y1 . Note
that Ht can be written as a union of one-clusters. Thus, by Lemma 3.4,
it suffices to show that a|V ∪Y1 can be written as a sum of n one-covers
of the one-cluster. Applying Lemma 3.4 again to the subgraph induced
by V ∪ Y1 = {vi1 , . . . , vik , yj1 }, it suffices to show a|V and a|{yj1 }∪N (yj1 )
can be written as a sum of n one-covers of the subgraphs induced by
V and {yj1 } ∪ N (yj1 ), respectively.
Let V be an induced odd k-cycle of Ht . Since P ∈ Bt,n , P ∈ V u
for some n-admissible u = (u1 , . . . , uk ). Thus, we need to show that
u can be written as the sum of n one-covers of V . By Definition 4.2,
u = (2, . . . , 2) + b1 + · · · + bn−2 with each bi a one-cover of V . Thus,
we need only show that (2, . . . , 2) can be written as a sum of two onecovers of V , but this is clear because (2, . . . , 2) = (1, . . . , 1) + (1, . . . , 1),
which are trivially one-covers of V .
Now consider the subgraph induced by {yj1 } ∪ N (yj1 ). Since P ∈
Tn−2 r
c
r=1 Dt,n , P ∈ (V ∪ Y1 ) , for some n̂-admissible c. Thus, we need
to show c|{yj1 }∪N (yj1 ) can be written as a sum of n one-covers of the
subgraph induced by {yj1 } ∪ N (yj1 ). By Definition 4.4, c = d + e +
f1 + · · · + fn−3 with each fi a one-cover of the subgraph induced by
{yj1 } ∪ N (yj1 ). Further, di = 3 for each vertex in {yj1 } ∪ N (yj1 ), so we
need only show that (3, . . . , 3) can be written as a sum of 3 one-covers
of the subgraph induced by {yj1 } ∪ N (yj1 ), but this is clear by Lemma
3.6.
Thus, for an arbitrary one-cluster, induced by V ∪ Y1 , a|V ∪Y1 can be
written as the sum of n one-covers of the subgraph induced by V ∪ Y1 .
This proves that a can be written as the sum of n one-covers of Ht .
Hence, L ⊆ (Jt )n .
Our main theorem now follows as a corollary to Theorem 4.11:
Proof of Theorem 4.1. For t ∈ Z+ consider the graph Ht and label
the vertices VHt = {v1 , . . . , vm } = X ∪ Y , where X (respectively, Y )
represents the set of x-vertices (respectively, y-vertices) as in Definition
ASSOCIATED PRIMES OF CERTAIN GRAPH IDEALS
13
3.1 . By Theorem 4.11, for n > 2 it follows that a prime P is in
Ass(Rt /(Jt )n ) if and only if:
(a) P = (vi , vj ) where {vi , vj } ∈ EHt ,
(b) P = (vi1 , . . . , vik ), where the subgraph induced by {vi1 , . . . , vik }
is an odd cycle,
or,
(c) For 1 ≤ r ≤ n − 2, P = (vi1 , . . . , vik , yj1 , . . . , yjr ), where the
subgraph induced by {vi1 , . . . , vik , yj1 , . . . , yjr } is an r-cluster.
By definition, Ht has exactly t y-vertices, so Ht has a t-cluster, namely
the graph Ht itself. Thus, by (c) above, the ideal (v1 , . . . , vm ) is an
element of Ass(Rt /(Jt )n ) for n ≥ t + 2, but not for n < t + 2. Thus, the
associated primes do not stabilize until at least t+2. Further, note that
the ideals of (a) and (b) are elements of Ass(Rt /(Jt )n ) for all n ≥ 2,
so the only prime ideals not in Ass(Rt /(Jt )2+t ) that could appear in
Ass(Rt /(Jt )n ) for n > 2 + t would be ideals that fall into category (c).
However, for 1 ≤ r ≤ t, ideals whose generators correspond to the
vertices of r-clusters are elements of Ass(Rt /(Jt )2+t ), so the only new
ideals in Ass(Rt /(Jt )n ) for n > 2 + t would be those whose generators
correspond to the vertices of r-clusters for r > t. The largest r for
which Ht has an r-cluster is r = t; thus, no such new ideals exist in
Ass(Rt /(Jt )n ) for n > 2 + t. Thus, the associated primes of Ht stabilize
at 2 + t.
Remark 4.12. We note that our family of graphs can be generalized
slightly. The proof of Theorem 4.11 used the definition n̂-admissible in
two ways— to show that the degree vectors can be written as n onecovers, and to use the degree argument of Lemma 4.7. Both facts remain unchanged if the induced (4t − 1)-cycle is instead an odd cycle of
any length greater than 4t − 1 (or in the case of H1 , if the 5-cycle is
any odd cycle of length greater than 5). Further, for i > 1, yi could
have more than 4 neighbors, as long as these neighbors are distinct from
N (yj ), j 6= i, and the degree argument of Lemma 4.7 is still satisfied.
5. Acknowledgements
Many of the results of this paper started as computer experiments
using the program Macaulay 2 [5]. The author would like to thank
Amelia Taylor for introducing her to the subject and for her invaluable
support and guidance throughout the research and writing processes,
Thomas Shemanske for his help in the editing process, and Adam Van
Tuyl for a helpful discussion of Lemma 3.3. We also thank an anonymous referee for their insights and suggestions for improvement.
14
SARAH WOLFF
References
1. Béla Bollobás, Modern graph theory, Graduate Texts in Mathematics, vol. 184,
Springer-Verlag, New York, 1998. MR 1633290 (99h:05001)
2. M. Brodmann, Asymptotic stability of Ass(M/I n M ), Proc. Amer. Math. Soc.
74 (1979), no. 1, 16–18. MR 521865 (80c:13012)
3. Christopher A. Francisco, Huy Tài Hà, and Adam Van Tuyl, Associated primes
of monomial ideals and odd holes in graphs, J. Algebraic Combin. 32 (2010),
no. 2, 287–301. MR 2661419 (2011e:05133)
, Colorings of hypergraphs, perfect graphs, and associated primes of
4.
powers of monomial ideals, J. Algebra 331 (2011), 224–242. MR 2774655
(2012b:13054)
5. Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic geometry,
Available at
http://www.math.uiuc.edu/Macaulay2/.
6. Jürgen Herzog, Takayuki Hibi, and Ngô Viêt Trung, Symbolic powers of monomial ideals and vertex cover algebras, Adv. Math. 210 (2007), no. 1, 304–322.
MR 2298826 (2007m:13005)
7. Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate
Texts in Mathematics, vol. 227, Springer-Verlag, New York, 2005. MR 2110098
(2006d:13001)
8. Aron Simis, Wolmer V. Vasconcelos, and Rafael H. Villarreal, On the ideal theory
of graphs, J. Algebra 167 (1994), no. 2, 389–416. MR 1283294 (95e:13002)
9. Rafael H. Villarreal, Cohen-Macaulay graphs, Manuscripta Math. 66 (1990),
no. 3, 277–293. MR 1031197 (91b:13031)
| 0 |
arXiv:1705.04282v1 [cs.CV] 5 May 2017
Learning to see people like people
Amanda Song
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
Linjie Li
Purdue University
610 Purdue Mall, West Lafayette, IN 47907
[email protected]
[email protected]
Chad Atalla
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
Garrison Cottrell
University of California, San Diego
9500 Gilman Dr, La Jolla, CA 92093
[email protected]
[email protected]
Abstract
alignment[39], and face detection[25]. However, humans not only read objective properties from a face, such
as gender, expression, race, age and identity, but also
form subjective impressions of the social aspects of a
face[31, 32], such as facial attractiveness[28], friendliness,
trustworthiness[29], sociability, dominance[18], and typicality. Despite the relative less attention received by the
social perception of faces, social judgment is an important
part of people’s daily interactions, and it has significant impact on social outcomes, ranging from electoral success to
sentencing decisions[19, 35]. Whereas current computer vision techniques exceed human abilities at recognizing a face
and identifying the objective properties of a face [27, 25],
awareness of human subjective judgments is important for
social robotics theory-of-mind inferences. Accurate predictions of social aspects of faces can help robots better understand how humans interact with and perceive each other,
and can make a robot aware of inherent human biases, as
these judgments rarely correspond to reality (except, perhaps, attractiveness) [32].
The human perceptual system can make complex inferences on faces, ranging from the objective evaluations regarding gender, ethnicity, expression, age, identity, etc. to
subjective judgments on facial attractiveness, trustworthiness, sociability, friendliness, etc. Whereas the objective aspects have been extensively studied, less attention has been
paid to modeling the subjective perception of faces. Here,
we adapt 6 state-of-the-art neural networks pretrained on
various image tasks (object classification, face identification, face localization) to predict human ratings on 40 social judgments of faces in the 10k US Adult Face Database.
Supervised ridge regression on PCA of the conv5 2 layer
in VGG-16 network gives best predictions on the average
human ratings. Human group agreement was evaluated by
repeatedly randomly splitting the raters into two halves for
each face, and calculating the Pearson correlation between
the two sets of averaged ratings. Due to this methodology,
the models correlations with the average human ratings can
exceed this score. We find that 1) model performance grows
as the consensus on a face trait increases, and 2) model correlations are always higher than human correlations with
each other. These results illustrate the learnability of the
subjective perception of faces, especially when there is consensus, and the striking versatility and transferability of
representations learned for object recognition. This work
has strong applications to social robotics, allowing robots
to infer human judgments of each other.
In this paper, we teach a machine to infer social impressions, that match human judgments, from faces. We examine a list of 20 pairs of social features that are typically
studied by social psychologists, and that are relevant to social interactions between people [33, 32, 19]. Examples are
attractiveness [7, 28, 5, 10, 8], trustworthiness [6, 29], sociability, aggressiveness [18], friendliness, kindness, happiness, familiarity [20], and memorability [2, 11]). Although
social perceptions of faces are subjective, there is often a
consensus among human raters in how they perceive facial
attractiveness, trustworthiness and dominance[6, 5]. This
indicates that faces contain high-level visual cues for social
interactions, and therefore it is possible to model this process with machine learning techniques. We take advantage
of the state-of-the-art neural network models trained for ob-
1. Introduction
Recent advances in deep convolutional networks have
driven tremendous progress in a variety of challenging
face processing tasks including face recognition[27], face
1
ject recognition and face recognition tasks and use their internal representations for social perception learning. In all
40 social dimensions, our model correlates with human averaged ratings better than the humans correlate with each
other.
The contributions of the paper are summarized below:
• To the best of our knowledge, this work is the first
attempt to systematically examine the consistency of
human social perceptions of faces, to explore the landscape of social feature semantic space, and to predict
human judgments of 40 social attributes of faces;
• We adapted 6 state of the art neural network algorithms
trained for various visual tasks to make social judgment predictions on faces and achieve high correlations with human ratings in all 40 dimensions;
• We evaluate the tuning properties of nodes in the best
network and visualize the patterns that maximally ignite the perceptions for each specific social dimensions
to facilitate a better understanding of the neural networks’ behavior in face processing.
The rest of the paper is organized as follows. In Section
2, we review related work on social perception modeling.
Section 3 and 4 summarize the methodology and the experimental framework. The experimental results and visualizations are presented in Section 5 and 6. Section 7 concludes
the paper.
2. Related work
The focus of our paper is to infer as much social judgment information as possible from a face image and to predict the subjective impression of faces by learning from human group data. We review related work in terms of the
visual features they use, the dataset they choose, the evaluation metric they adopt, and the social attributes they examine.
Visual features Since the early 1990s, psychologists
have identified that high level visual features, such as the
averageness of a face[14, 21] and the symmetry of the face
[23] can explain why certain faces look more attractive.
Machine learning researchers have developed various
computer vision features and models to predict social perceptions of faces, especially facial attractiveness. Yael et
al.[5] used geometric ratios and distances between facial
features based on facial landmarks to build an attractiveness predictor (0.65 correlation with human raters, face
database size=184). End-to-end neural networks were applied to predict facial attractiveness in 2010[8] (correlation 0.458, face database size=2056, young female faces
only). Amit Kagian and his colleagues have used a combination of landmark-derived features along with global
features to obtain a high correlation with human group
averages on facial attractiveness [10](0.82 Pearson correlation, face database size=91). Traditional computer vision features such as SIFT, HoG, Gabor filters have been
blended to predict the relative ranking of facial attractiveness in [1](rank order correlation 0.63, face database
size=200). Rothe et al. incorporate collaborative filtering
techniques with visual features extracted from pretrained
VGG networks[24] to achieve individual-level prediction
of facial attractiveness[22](correlation 0.671 on female face
queries, database size = 13,000). McCurrie et al. [17]
build a model based on a pretrained VGG network to predict trustworthiness, dominance and IQ in faces (R2 values
on trustworthiness, dominance and IQ are 0.5687, 0.4601,
0.3548 respectively, face database size=6000). Previous papers have achieved correlations with human performance
between 0.458 to 0.82 in attractiveness predictions, depending on the dataset and method used. However, to date, there
is no standard dataset that has been used to compare these
approaches.
Dataset Earlier studies employ datasets with relatively
small numbers of faces (a few hundred) and most face
datasets use young Caucasian faces only, as pointed out by
[15]. In contrast, the MIT dataset[2] we use contains 2,222
high quality color images that vary in ethnicity, gender, age
and expression, with ratings on 40 attributes. This dataset
is smaller than two of the ones mentioned above. The first
is collected from howhot.io, an online dating website[22]
and contains 13,000 face images, but that work focused on
personalized prediction of facial attractiveness, rather than
average ratings. There are only binary choices (like or dislike) indicating implicit preference of facial attractiveness.
The second one is collected from testmybrain.com, contains
6,000 grayscale face images [17], and includes just three
social features: dominance, IQ and trustworthiness.
Evaluation metric Social perceptions of faces are collected from human participants in various ways. The most
common way is to ask for a discrete rating, say from 1-9
[2], or 1-7 [5] from a number of raters, and then use the
group average as the score for a face in the specified feature
dimension (e.g. attractiveness). The consistency of ratings
between humans is checked by repeatedly randomly splitting human participants into two subgroups and then computing the correlation between the two groups’ mean ratings. To compare model predictions with human ratings,
Pearson correlation[10, 3], Spearman rank correlation[2]
and R-squared values[17] are used, depending on the nature
of the data. Another method is to present a pair of faces
or multiple faces and ask for a relative ranking in a particular dimension (e.g., attractiveness). Prediction accuracy is
measured using Kendall’s Tau and the Gamma Test [1]. In
Rothe et al. [22], a person indicates his/ her preference by
choosing to like or dislike another user’s face photo. In this
paper, since our goal is to predict a continuous score of human average ratings, and our raters do not all rate the same
faces, we also use Pearson correlation with average human
ratings on a per-face basis.
Social attributes Although social perceptions are a subjective judgment, and may not reflect a person’s actual traits
or mental states, humans tend to share consensus on their
first impressions. Kiapour et al.[12] and Wang et al.[34] find
that the social styles of people (bikers vs. hipsters, for example) can be identified and classified from image features.
Dhar et al. (2011) show that the interestingness of an image
can be quantified and predicted [4]. Bainbridge et al. (2013)
prove that the memorability of a face image can be predicted
and modified to make it more memorable [2]. Todorov et al.
[30, 31, 32] used synthesized faces to study the perception
of competence, dominance, extroversion, likeability, threat,
trustworthiness and attractiveness in faces [29]. However
their face photos lack realism compared to real-world photos and therefore cannot predict human’s social perceptions
of real faces in a more natural environment. McCurrie et al.
[17] have worked toward removing this limitation by using
real human faces to make predictions of trustworthiness and
dominance ratings. 12 From the literature, we can observe
two trends: (i) Besides McCurrie et al. [17] and Todorov. et
al[29], most machine learning work on social perception of
faces focuses on attractiveness prediction, leaving the prediction of other social perceptions largely unstudied. We
aim to bridge this gap in our paper. (ii) As summarized
by Laurentini et al[15] usually small datasets are used, with
few variations on expression, gender, ethnicity and age. The
dataset we chose overcomes the above limitations and has
comprehensive coverage of a list of 40 social feature ratings.
The papers closest to ours are McCurrie et al. [17] and
Todorov. et al[29]. Our paper differs from theirs in three
major ways: (1) Todorov. et al’s work is on synthesized
faces whereas ours is on realistic photos; (2) McCurrie et al.
[17] predict three social features, dominance, trustworthiness, and IQ, whereas we look at 40 social features including trustworthiness, aggressiveness (a term close to their
dominance), and intelligence (close to their IQ term), so
our feature set can be considered to be a superset of theirs;
and (3) we compared various feature extraction methods,
including traditional geometric features and 6 neural networks pretrained for various tasks (face identification, face
localization, object recognition). We also examine the effect
of fine-tuning the network compared with directly applying
ridge regression on extracted features from higher layer of
the networks.
3. Method
In this section we first describe the dataset used in our
experiments. Next, we introduce our method for predict-
ing social perceptions of faces. Finally, we explain how we
visualize the features that contribute most to social trait predictions.
3.1. Dataset
To predict how human evaluate social traits of a face at a
glance, we use the dataset collected by Aude Oliva’s group
[2]. The dataset consists of 2,222 images of faces sampled
from the 10k US Adult Face Database and annotated for 20
pairs of social attributes. Each attribute is rated on a scale of
1-9 (1 means not at all, 9 means extremely) and each image
is rated by 15 subjects. We take the average rating across
all raters as a collective estimation of the social feature for
every face.
The 20 pairs of social traits are: (attractive, unattractive),
(happy, unhappy), (friendly, unfriendly), (sociable, introverted), (kind, mean), (caring, cold), (calm, aggressive),
(trustworthy, untrustworthy), (responsible, irresponsible),
(confident, uncertain), (humble, egotistical),(emotionally
stable, emotionally unstable), (normal, weird), (intelligent,
unintelligent), (interesting, boring), (emotional, unemotional), (memorable, forgettable), (typical, atypical), (familiar, unfamiliar) and (common, uncommon).
Clearly, some of these traits will be highly correlated,
and are predictable from the others. We compute the Spearman’s rank correlation between every pair of social features
and show their correlations in a heatmap (see the left figure in Figure 1). We put features together in the map based
on similarity and positive/negativeness. From the figure,
we can see that negative social features such as untrustworthy, aggressiveness, cold, introverted, irresponsible form a
correlated block, while most positive features such as attractive, sociable, caring, friendly, happy, intelligent, interesting, confident are highly correlated with each other. Although we chose 20 pairs of opposite features, they are not
completely complementary and redundant. Principal component analysis shows that it takes 24 principal components
to cover 95% of the variance.
3.2. Regression Model for Social Attributes
After we average human ratings on each face, each face
receives a continuous score from 1 to 9 in all social dimensions. We model these social scores with a regression model. Our proposed algorithm is a ridge regression
model on features extracted from deep convolutional neural networks (CNN). Since CNN features are usually highdimensional, we first perform Principal Component Analysis (PCA) on the extracted features of the training set to
reduce the dimensionality. The PCA dimensionality is chosen by cross-validation on a validation set, separately for
each trait. The PCA weights are saved and further used in
fine-tuning our CNN-regression model.
Figure 1: Correlation heatmaps among social features. Left: human. Right: network.
3.3. Feature Visualization
4.1. Baseline I: Human Correlations
Attempting to understand what features are most helpful in social attribute prediction, we visualize the features
extracted from the CNN. Two different methods were proposed in past feature visualization studies: dataset-centric
methods [36, 38], and a network-centric method[36, 37].
Since these social attributes are all subjective perceptions
rated by people, it is informative to examine to what extent
people agree with each other upon those social judgments.
We performed the following procedure 50 times for each
attribute and then averaged the results:
The dataset-centric method we employed is to display
image patches from the training set that cause high activation for the feature units and use the deconvolution method
to highlight the portions of the image that are responsible
for firing the important feature neurons [36, 38].
1. For each face, we randomly split the 15 raters evenly
into two groups of 7 and 8. (Note: the raters for each
face will, in general, be different sets).
The network-centric approach is usually used in classification networks. This method produces an image that is
based on adapting the input by maximizing the output category activation using gradient ascent, i.e., it is mainly a
function of the network. [36, 37]. The key idea is to optimize the input image so that the target neuron can be highly
activated. We apply this idea to the output (regression) neuron as well as the top nine neurons that influence that output
individually.
4. Experimental framework
In this section, we report our experimental framework
using 6 CNN-based regression models with respect to two
baselines, human correlation between groups of raters, and
a baseline model using the geometric features.
2. We calculate the two group’s average ratings for each
face, obtaining two vectors of length 2,222 (there are
2,222 faces in the dataset).
3. We calculate the correlation between the two vectors.
The results are shown in the second column of Table 1. For
every social attribute, the averaged correlation between human subgroups serves as an index of the rating consistency.
4.2. Baseline II: Regression on geometric features
Past studies on facial attractiveness have found that attractiveness can be inferred from the geometric ratios and
configurations of a face[5, 10]. We suggest that other social attributes can also be inferred from geometric features.
We compute 29 geometric features based on definitions described in [16] and further extract a ”smoothness” feature
and skin color features according to the procedure in [5, 10].
The ”smoothness” of a face was evaluated by applying a
Canny edge detector to windows from the cheek/forehead
area [5]. The more edges detected by edge detectors within
the window, the less smooth the skin is. The regions we
chose to compute smoothness and skin color are highlighted
in the right subplot of Figure 2). The ”skin color” feature
is extracted from the same window as ”smoothness”, converted from RGB to HSV. Regressing on these handcrafted
features alone are not enough to capture the richness of geometric details about a face, we therefore use a computer
vision library (dlib, C++) to automatically label 68 face
landmarks (see Figure 2) for each face and compute distances and slopes between any two landmarks. Combining
29 handcrafted geometric features, smoothness, color and
the distance-slope features, we obtain 4592 features in total. Since the features are highly correlated, we apply PCA
to reduce dimensionality. Again, the PCA dimensionality is
chosen by cross-validating on the hold out set separately for
each facial attribute. Then a ridge regression model is applied to predict social attribute ratings of a face. The hyperparameter of ridge regression is selected by leave-one-out
validation within the training set.
Figure 2: 68 face landmarks labeled by dlib software automatically. The gray regions are the locations used for computing smoothness and skin color.
4.3. CNN-based Regression Model
We initially compared six neural network architectures:
(1) VGG16, (2) VGG-Face from the Oxford Visual Geometry Groups VGG networks[24], (3) AlexNet (the publicly
available CaffeNet reference model) [13] (4) Inception from
Google [26] (5) a shallow face identification Siamese neural network that we trained from scratch: Face-SNN and
(6) a state of the art VGG-derived network trained for the
face landmark localization task: Face-LandmarkNN. These
comparisons were performed with the Caffe deep learning
framework [9].
To find the best CNN to predict social attribute ratings
among all six networks, we first find the best-performing
feature layers of each network (with the ridge regression
model), and then we compare the results among the networks to select the best network. For each layer of each
network, before the ridge regression, we performed PCA
and picked the PCA dimension that gave the best results on
the validation set.
5. Results
Surprisingly, we found that features from conv5 2 layer
of VGG16 trained for object classification slightly outperformed the AlexNet and Inception networks, while the
three networks trained solely on faces, VGG-Face, FaceLandmarkNN and Face-SNN did not achieve performance
as competitive as the other three for most of the social attributes. The best performing VGG16 layer was conv5 2.
We speculate that the reason for the relatively poorer performance of the face recognition networks is that they are
optimized either to learn differences between faces which
define identity or to learn the face landmark configurations,
whereas for this task at hand, we are looking for commonalities behind certain social features which go beyond identity. The landmark network presumably should give results
similar to the geometric features, but did not learn features
corresponding to all of the features we used in that model.
These speculations need to be checked, of course, for example by trying to predict all of our measured features, using
the landmark network, but we did not do that here.
We tried fine-tuning the model as follows. We used backpropagation to fine tune the weights into the conv5 2 layer,
the weights to the PCA layer from conv5 2 (initialized by
the PCA weights), and the weights from the PCA layer to
the output regression unit. However, this fine-tuning did not
improve performance, so the results reported in Table 1 are
without fine-tuning.
We evaluate the performance on 50 random train / validation / test splits of the data with a 64/16/20 percent split for
training, cross-validation and testing, respectively. The prediction performance of our model is evaluated using Pearson’s correlation with the human ratings on the test set. For
each social attribute, we report its human consistency as described in Section 4.1.
Table 1 summarizes the prediction performance of our
model for all the social attributes compared to Baseline
I and II. The table is organized in a descending order of
human agreement on the putative positive attribute of the
paired attributes. The three attributes where there is greater
agreement among humans for the negative component of
the pair are bolded.
Among all the social attributes, human subjects agree
most with each other about ”happy” and disagree most
about ”unfamiliar.” For both regression models (Baseline II
and our model), model performance grows as the consensus on a social trait increases and human correlations with
each other are consistently lower than the models’ correlations with the average human ratings. Normally, one might
consider the human correlations to be an upper bound on
performance, but here they are different kinds of correlations.
Since the change in expression would produce a change
in landmark locations, it is not surprising that landmark-
based geometric features (Baseline II) achieve comparable
or slightly higher correlation as our model for predicting
those social attributes that are highly related to expressions
(such as ”happy”, ”unhappy”, ”cold” and ”friendly” etc.).
While for other social attributes, our model slightly outperforms landmark-based geometric features by about 0.04
correlation on average and significantly outperforms human correlation by about 0.12 correlation on average. This
implies that CNN features encode much more information
than just landmark-based features. It is essential to visualize
those features and understand what features extracted from
CNN make our model powerful enough to predict social attributes.
To quantitatively compare the face social features perceived by humans and those predicted by our best performing model, we take the model predictions on all social features, and compute the Spearman correlation between every
pair in the set (see the right figure in Figure 1). Not surprisingly, this has very similar patterns compared the heatmap
generated from human ratings (see the right panel in Figure 1). Pearson Correlation between the upper triangle of
the two similarity matrices (human and model prediction)
is 0.9836. However, note that each predictor was trained
independently.
6. Feature Visualization
In this section, we visualize the features that are of importance to social perceptions. We choose facial attractiveness as an example. The same method can be applied to the
other social features. We employ the two methods described
in section 3.3 to visualize features learned by our model.
6.1. Data-centric Visualization
To identify visual features that ignite attractiveness perception, we find the top 9 units of highest influence on attractiveness at conv5 2 as follows. First, we compute a
product of three terms: (1) A unit’s activation from conv5 2,
(2) that unit’s weight to the following fc pca layer, (3) the
fc pca unit’s weight to the output unit. We then sort all
conv5 2 units’ average products of the three terms and identify the top 9 neurons as the ones that contribute most to the
output neuron for the corresponding social feature. Then
we employ the method described in [36, 38] to find top-9
input images that cause high activations in each of the top-9
conv5 2 neurons. Also we further produce the deconvolutional images by projecting each activation separately down
to pixel space.
Figure 3 captures the features that are important to predict the attractiveness of a face. The feature importance
descends from left to right and top to bottom. The important features identified by our model are related to eyes, hair
Social Attributes
happy
unhappy
friendly
unfriendly
sociable
introverted
attractive
unattractive
kind
mean
caring
cold
trustworthy
untrustworthy
responsible
irresponsible
confident
uncertain
humble
egotistic
emotionally stable
emotionally unstable
normal
weird
intelligent
unintelligent
interesting
boring
calm
aggressive
emotional
unemotional
memorable
forgettable
typical
atypical
common
uncommon
familiar
unfamiliar
Baseline I
0.84
0.75
0.78
0.72
0.74
0.50
0.72
0.62
0.72
0.69
0.72
0.71
0.62
0.60
0.58
0.55
0.55
0.45
0.55
0.52
0.53
0.50
0.49
0.52
0.49
0.43
0.42
0.39
0.41
0.65
0.33
0.56
0.30
0.27
0.28
0.24
0.25
0.27
0.24
0.18
Baseline II
0.86
0.81
0.83
0.80
0.78
0.64
0.66
0.62
0.79
0.75
0.78
0.81
0.72
0.69
0.65
0.64
0.55
0.62
0.64
0.62
0.64
0.62
0.58
0.50
0.53
0.53
0.64
0.54
0.47
0.72
0.60
0.76
0.38
0.40
0.41
0.40
0.37
0.38
0.42
0.40
Our Model
0.84
0.80
0.82
0.79
0.78
0.65
0.75
0.70
0.79
0.73
0.79
0.79
0.73
0.70
0.70
0.67
0.61
0.63
0.63
0.62
0.67
0.64
0.61
0.56
0.62
0.58
0.67
0.60
0.50
0.72
0.60
0.75
0.48
0.48
0.43
0.43
0.40
0.40
0.44
0.44
Table 1: Prediction performance of all the social attributes. The reported performance is averaged on 50 random train/validation/test splits of the data.
with bangs, high nose-bridge, high cheeks, dark eyebrows,
strong commanding jawline, chin and red lips. Note that
among the 9 cropped input image patches, not all the faces
are perceived as attractive or rated as attractive. An attractive face needs to activate more than one feature in order to
be considered attractive. This observation agrees with our
intuition that attractiveness is a kind of holistic judgment,
requiring a combination of multiple features.
It also seems to be the case that several of the features
include relationships between the parts. For example, while
the first feature in the upper left of the figure emphasizes
the eye, it also includes the nose. This is also true of the
upper right feature. Smiling is also important in order to
be perceived attractive, as emphasized by the feature in the
lower left of the figure.
6.2. Network-centric Visualization
In section 6.1, we have identified the top-9 units and their
feature maps from the con5 2 layer that maximally activates
the attractiveness neuron. Here, we use the gradient-ascent
method to optimize the input image that would highly activate a specific neuron of the network. This method is
also performed on the pretrained-VGG16 regression model,
which is trained to predict attractiveness.
Figure 4a shows the optimized image corresponding to
the output neuron from a random input image. Optimizing the input image for the output neuron of a regression
model does not result in a particularly interpretable figure,
although it does appear to emphasize the eyes. Our second approach is to optimize the input image with respect to
the top-9 contributing neurons from conv5 2 layer that have
been identified in section 6.1. Figure 4b presents 9 optimized images with respect to the corresponding top-9 feature maps of the top-9 neurons from conv5 2 layer. Since
we use a pretrained-VGG16 network for visualization, it is
not surprising that the corresponding top-9 feature maps at
conv5 2 layer are not particularly encoding facial patterns.
We also present the optimized image initialize with a
face image, along with the original face image for comparison in Figure 5. The optimized image tends to highlight the
eyes, nose, cheeks and the contour of the face, which is consistent with the features identified by data-centric method.
7. Conclusion
We have shown that a deep network can be used to predict human social judgments with high correlation with the
average human ratings. As far as we know, this is the
widest exploration of social judgment predictions, showing
human-like perceptions on 40 social dimensions. Unsurprisingly, given previous work recognizing facial expressions, where happiness is the easiest to recognize, our highest correlation is on the happy feature. However, previous
work in this area tended to classify a face as happy or not,
rather than the degree of rated happiness.
We find that for attributes that correspond to elements
of the face that require muscle movement, or a lack of it
(such as happy, unhappy, cold, aggressive, unemotional) a
simple regression model based on the placement of facial
landmarks works well. For ones that don’t appear to suggest
emotions, such as friendly, note that friendly and happy are
highly correlated (see Figure 1, and the red block indexed
by happy and friendly). Similarly, aggressive and mean are
highly correlated, which presumably requires not smiling.
Perhaps of more significance are the correlations with
judgments of traits, such as trustworthiness, responsibleness, confidence, and intelligence, which would correspond
to more static features of the face. In this area, the deep
network, which responds to facial textures as well as shape,
has superior performance. While these judgments do not
correspond to a notion of ”ground truth,” they are things for
which humans have a fair amount of agreement, suggesting
that there is a signal to be recognized.
Of further note is that we have shown, yet again, that a
machine can recognize attractiveness, presumably without
any hormonal influences. For this dataset, our deep network correlates with human ratings at 0.75. This provides a
benchmark for this dataset.
Finally, it is of note that we can see that some of the
traits considered to be ”opposite” in this list are not simply
the reverse of one another. For example, there is a large
difference in human agreements on ”sociable” (0.74) versus
”introverted” (0.50), suggesting they are not opposites.
These results are significant for the field of social
robotics. While a robot should not judge a human based
completely on their appearance, it can be useful knowledge
that humans might judge a person to be trustworthy, while
the robot can be more objective. Similarly, a robot need
not treat an attractive and unattractive person differently,
but this knowledge could affect how the robot interacts with
the unattractive person, knowing in advance that this person
may have had many negative experiences interacting with
people.
In this paper, we train each social feature separately, due
to their varied consistency and reliability. In the future, it
is worth trying to train one single convnet to learn multiple
tasks simultaneously and evaluate whether shared representation may further improve the model performance.
In summary, we have provided the first machine learning system to learn subjective human judgments of a wide
spectrum of traits. We found that the more humans agree on
such subjective judgments, the more the system could pick
up on the features driving those judgments. It will be of interest to investigate further what those features are, beyond
the attractiveness features we displayed here.
One step further from predicting the value in a certain
social feature is to move faces on the social manifold and
to increase a face’s elicited social perceptions in positive
ways (e.g. to make a face look more sociable/ trustworthy/
attractive). Although the images generated by our current
visualization method are still far away from being photorealistic, it may be a fruitful area in the future to develop
generative models that can achieve this goal.
Figure 3: Visualization of features in the pretrained-VGG16 regression network. For conv5 2 layer, we show the top 9
activations of the top 9 neurons that maximally activate the attractiveness neuron across the training data, projected down to
pixel space using the deconvolutional network approach [38] and their corresponding cropped image patches. Best viewed
in electronic form, and zoomed in.
References
[1] H. Altwaijry and S. Belongie. Relative ranking of facial attractiveness. In Applications of Computer Vision (WACV),
2013 IEEE Workshop on, pages 117–124. IEEE, 2013. 2
[2] W. A. Bainbridge, P. Isola, and A. Oliva. The intrinsic memorability of face photographs. Journal of Experimental Psychology: General, 142(4):1323, 2013. 1, 2, 3
[3] A. Dantcheva and J. Dugelay. Female facial aesthetics based
on soft biometrics and photo-quality. In Proceedings of
ICME, 2011. 2
[4] S. Dhar, V. Ordonez, and T. L. Berg. High level describable attributes for predicting aesthetics and interestingness.
In Computer Vision and Pattern Recognition (CVPR), 2011
IEEE Conference on, pages 1657–1664. IEEE, 2011. 3
[5] Y. Eisenthal, G. Dror, and E. Ruppin. Facial attractiveness:
Beauty and the machine. Neural Computation, 18(1):119–
142, 2006. 1, 2, 4, 5
[6] V. Falvello, M. Vinson, C. Ferrari, and A. Todorov. The robustness of learning about the trustworthiness of other people. Social Cognition, 33(5):368, 2015. 1
[7] K. Grammer and R. Thornhill. Human (homo sapiens) facial attractiveness and sexual selection: the role of symmetry and averageness. Journal of comparative psychology,
108(3):233, 1994. 1
[8] D. Gray, K. Yu, W. Xu, and Y. Gong. Predicting facial beauty
without landmarks. In Computer Vision–ECCV 2010, pages
434–447. Springer, 2010. 1, 2
[9] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint
arXiv:1408.5093, 2014. 5
[10] A. Kagian, G. Dror, T. Leyvand, I. Meilijson, D. Cohen-Or,
and E. Ruppin. A machine learning predictor of facial attractiveness revealing human-like psychophysical biases. Vision
research, 48(2):235–243, 2008. 1, 2, 4
[11] A. Khosla, W. A. Bainbridge, A. Torralba, and A. Oliva.
Modifying the memorability of face photographs. In Computer Vision (ICCV), 2013 IEEE International Conference
on, pages 3200–3207. IEEE, 2013. 1
[12] M. H. Kiapour, K. Yamaguchi, A. C. Berg, and T. L. Berg.
Hipster wars: Discovering elements of fashion styles. In
European conference on computer vision, pages 472–488.
Springer, 2014. 3
[13] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
Advances in neural information processing systems, pages
1097–1105, 2012. 5
[14] J. H. Langlois and L. A. Roggman. Attractive faces are only
average. Psychological science, 1(2):115–121, 1990. 2
[15] A. Laurentini and A. Bottino. Computer analysis of face
beauty: A survey. Computer Vision and Image Understanding, 125:184–199, 2014. 2, 3
[16] D. S. Ma, J. Correll, and B. Wittenbrink. The chicago face
database: A free stimulus set of faces and norming data. Behavior research methods, 47(4):1122–1135, 2015. 4
(a) Original input image
(b) Optimized image
Figure 5: Visualization of the optimized image with a input face image: Figure 5a is the original face image before
optimization. Figure 5b is produced by performing optimization with respect to the output unit.
(a) Optimized input image with respect to
the output unit
[20]
[21]
[22]
[23]
[24]
[25]
(b) Optimized input images with respect to top-9 neurons from
conv5 2 layer
[26]
Figure 4: Visualization of features using network-centric
method. To produce Fig 4a, we use gradient ascent to optimize the output neuron. Fig 4b shows 9 optimized images
for the feature maps corresponding to top-9 contributor neurons from conv5 2 layer.
[27]
[28]
[17] M. McCurrie, F. Beletti, L. Parzianello, A. Westendorp,
S. Anthony, and W. Scheirer. Predicting first impressions
with deep learning. arXiv preprint arXiv:1610.08119, 2016.
2, 3
[18] A. Mignault and A. Chaudhuri. The many faces of a neutral
face: Head tilt and perception of dominance and emotion.
Journal of nonverbal behavior, 27(2):111–132, 2003. 1
[19] N. N. Oosterhof and A. Todorov. The functional basis of
[29]
[30]
face evaluation. Proceedings of the National Academy of
Sciences, 105(32):11087–11092, 2008. 1
M. Peskin and F. N. Newell. Familiarity breeds attraction:
Effects of exposure on the attractiveness of typical and distinctive faces. PERCEPTION-LONDON-, 33(2):147–158,
2004. 1
G. Rhodes, L. Jeffery, T. L. Watson, C. W. Clifford, and
K. Nakayama. Fitting the mind to the world face adaptation and attractiveness aftereffects. Psychological science,
14(6):558–566, 2003. 2
R. Rothe, R. Timofte, and L. Van Gool. Some like it hotvisual guidance for preference prediction. arXiv preprint
arXiv:1510.07867, 2015. 2
J. E. Scheib, S. W. Gangestad, and R. Thornhill. Facial attractiveness, symmetry and cues of good genes. Proceedings of the Royal Society of London. Series B: Biological
Sciences, 266(1431):1913–1917, 1999. 2
K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. arXiv preprint
arXiv:1409.1556, 2014. 2, 5
R. Stewart, M. Andriluka, and A. Y. Ng. End-to-end people detection in crowded scenes. In The IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), June
2016. 1
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich.
Going deeper with convolutions. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition,
pages 1–9, 2015. 5
Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. Deepface:
Closing the gap to human-level performance in face verification. In Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, pages 1701–1708, 2014. 1
R. Thornhill and S. W. Gangestad. Facial attractiveness.
Trends in cognitive sciences, 3(12):452–460, 1999. 1
A. Todorov, S. G. Baron, and N. N. Oosterhof. Evaluating
face trustworthiness: a model based approach. Social cognitive and affective neuroscience, 3(2):119–127, 2008. 1, 3
A. Todorov, R. Dotsch, J. M. Porter, N. N. Oosterhof, and
V. B. Falvello. Validation of data-driven computational models of social perception of faces. Emotion, 13(4):724, 2013.
3
[31] A. Todorov, P. Mende-Siedlecki, and R. Dotsch. Social
judgments from faces. Current opinion in neurobiology,
23(3):373–380, 2013. 1, 3
[32] A. Todorov, C. Y. Olivola, R. Dotsch, and P. MendeSiedlecki. Social attributions from faces: Determinants, consequences, accuracy, and functional significance. Psychology, 66(1):519, 2015. 1, 3
[33] A. Todorov, C. P. Said, A. D. Engell, and N. N. Oosterhof. Understanding evaluation of faces on social dimensions.
Trends in cognitive sciences, 12(12):455–460, 2008. 1
[34] Y. Wang and G. W. Cottrell. Bikers are like tobacco shops,
formal dressers are like suits: Recognizing urban tribes with
caffe. In 2015 IEEE Winter Conference on Applications of
Computer Vision, pages 876–883. IEEE, 2015. 3
[35] J. Willis and A. Todorov. First impressions making up your
mind after a 100-ms exposure to a face. Psychological science, 17(7):592–598, 2006. 1
[36] J. Yosinski, J. Clune, A. Nguyen, T. Fuchs, and H. Lipson.
Understanding neural networks through deep visualization.
arXiv preprint arXiv:1506.06579, 2015. 4, 6
[37] S. Yu and K. Zipser. A deep neural net trained for person categorization develops both detailed local features and broad
contextual specificities. Journal of Vision, 16(12):411–411,
2016. 4
[38] M. D. Zeiler and R. Fergus. Visualizing and understanding
convolutional networks. In European Conference on Computer Vision, pages 818–833. Springer, 2014. 4, 6, 8
[39] X. Zhu, Z. Lei, X. Liu, H. Shi, and S. Z. Li. Face alignment across large poses: A 3d solution. arXiv preprint
arXiv:1511.07212, 2015. 1
| 2 |
arXiv:1607.00743v1 [math.ST] 4 Jul 2016
A Residual Bootstrap for High-Dimensional
Regression with Near Low-Rank Designs
Miles E. Lopes
Department of Statistics
University of California, Berkeley
Berkeley, CA 94720
[email protected]
Abstract
We study the residual bootstrap (RB) method in the context of high-dimensional
linear regression. Specifically, we analyze the distributional approximation of linear contrasts c⊤ (βbρ − β), where βbρ is a ridge-regression estimator. When regression coefficients are estimated via least squares, classical results show that RB
consistently approximates the laws of contrasts, provided that p ≪ n, where the
design matrix is of size n × p. Up to now, relatively little work has considered
how additional structure in the linear model may extend the validity of RB to the
setting where p/n ≍ 1. In this setting, we propose a version of RB that resamples
residuals obtained from ridge regression. Our main structural assumption on the
design matrix is that it is nearly low rank — in the sense that its singular values
decay according to a power-law profile. Under a few extra technical assumptions, we derive a simple criterion for ensuring that RB consistently approximates
the law of a given contrast. We then specialize this result to study confidence
intervals for mean response values Xi⊤ β, where Xi⊤ is the ith row of the design. More precisely, we show that conditionally on a Gaussian design with near
low-rank structure, RB simultaneously approximates all of the laws Xi⊤ (βbρ − β),
i = 1, . . . , n. This result is also notable as it imposes no sparsity assumptions on
β. Furthermore, since our consistency results are formulated in terms of the Mallows (Kantorovich) metric, the existence of a limiting distribution is not required.
1 Introduction
Until recently, much of the emphasis in the theory of high-dimensional statistics has been on “first
order” problems, such as estimation and prediction. As the understanding of these problems has
become more complete, attention has begun to shift increasingly towards “second order” problems,
dealing with hypothesis tests, confidence intervals, and uncertainty quantification [1, 2, 3, 4, 5,
6]. In this direction, much less is understood about the effects of structure, regularization, and
dimensionality — leaving many questions open. One collection of such questions that has attracted
growing interest deals with the operating characteristics of the bootstrap in high dimensions [7, 8, 9].
Due to the fact that bootstrap is among the most widely used tools for approximating the sampling
distributions of test statistics and estimators, there is much practical value in understanding what
factors allow for the bootstrap to succeed in the high-dimensional regime.
The regression model and linear contrasts. In this paper, we focus our attention on highdimensional linear regression, and our aim is to know when the residual bootstrap (RB) method
consistently approximates the laws of linear contrasts. (A review of RB is given in Section 2.)
1
To specify the model, suppose that we observe a response vector Y ∈ Rn , generated according to
Y = Xβ + ε,
n×p
(1)
p
where X ∈ R
is the observed design matrix, β ∈ R is an unknown vector of coefficients, and
the error variables ε = (ε1 , . . . , εn ) are drawn i.i.d. from an unknown distribution F0 , with mean
0 and unknown variance σ 2 < ∞. As is conventional in high-dimensional statistics, we assume
the model (1) is embedded in a sequence of models indexed by n. Hence, we allow X, β, and p to
vary implicitly with n. We will leave p/n unconstrained until Section 3.3, where we will assume
p/n ≍ 1 in Theorem 3, and then in Section 3.4, we will assume further that p/n is bounded strictly
between 0 and 1. The distribution F0 is fixed with respect to n, and none of our results require F0
to have more than four moments.
Although we are primarily interested in cases where the design matrix X is deterministic, we will
also study the performance of the bootstrap conditionally on a Gaussian design. For this reason,
we will use the symbol E[. . . |X] even when the design is non-random so that confusion does not
arise in relating different sections of the paper. Likewise, the symbol E[. . . ] refers to unconditional
expectation over all sources of randomness. Whenever the design is random, we will assume X ⊥
⊥ ε,
denoting the distribution of X by PX , and the distribution of ε by Pε .
Within the context of the regression, we will be focused on linear contrasts c⊤ (βb − β), where c ∈ Rp
is a fixed vector and βb ∈ Rp is an estimate of β. The importance of contrasts arises from the fact
that they unify many questions about a linear model. For instance, testing the significance of the ith
coefficient βi may be addressed by choosing c to be the standard basis vector c⊤ = e⊤
i . Another
important problem is quantifying the uncertainty of point predictions, which may be addressed by
choosing c⊤ = Xi⊤ , i.e. the ith row of the design matrix. In this case, an approximation to the law
of the contrast leads to a confidence interval for the mean response value E[Yi ] = Xi⊤ β. Further
applications of contrasts occur in the broad topic of ANOVA [10].
Intuition for structure and regularization in RB. The following two paragraphs explain the core
conceptual aspects of the paper. To understand the role of regularization in applying RB to highdimensional regression, it is helpful to think of RB in terms of two ideas. First, if βbLS denotes the
ordinary least squares estimator, then it is a simple but important fact that contrasts can be written
as c⊤ (βbLS − β) = a⊤ ε where a⊤:= c⊤ (X ⊤ X)−1 X ⊤ . Hence, if it were possible to sample directly
from F0 , then the law of any such contrast could be easily determined. Since F0 is unknown, the
second key idea is to use the residuals of some estimator βb as a proxy for samples from F0 . When
p ≪ n, the least-squares residuals are a good proxy [11, 12]. However, it is well-known that leastsquares tends to overfit when p/n ≍ 1. When βbLS fits “too well”, this means that its residuals are
b
“too small”, and hence they give a poor proxy for F0 . Therefore, by using a regularized estimator β,
b
overfitting can be avoided, and the residuals of β may offer a better way of obtaining “approximate
samples” from F0 .
The form of regularized regression we will focus on is ridge regression:
βbρ := (X ⊤ X + ρIp×p )−1 X ⊤ Y,
(2)
where ρ > 0 is a user-specificed regularization parameter. As will be seen in Sections 3.2 and 3.3,
the residuals obtained from ridge regression lead to a particularly good approximation of F0 when
the design matrix X is nearly low-rank, in the sense that most of its singular values are close to
0. In essence, this condition is a form of sparsity, since it implies that the rows of X nearly lie
in a low-dimensional subspace of Rp . However, this type of structural condition has a significant
advantage over the the more well-studied assumption that β is sparse. Namely, the assumption that
X is nearly low-rank can be inspected directly in practice — whereas sparsity in β is typically
unverifiable. In fact, our results will impose no conditions on β, other than that kβk2 remains
bounded as (n, p) → ∞. Finally, it is worth noting that the occurrence of near low-rank design
matrices is actually very common in applications, and is often referred to as collinearity [13, ch.
17].
Contributions and outline. The primary contribution of this paper is a complement to the work of
Bickel and Freedman [12] (hereafter B&F 1983) — who showed that in general, the RB method fails
2
to approximate the laws of least-squares contrasts c⊤ (βbLS − β) when p/n ≍ 1. Instead, we develop
an alternative set of results, proving that even when p/n ≍ 1, RB can successfully approximate the
laws of “ridged contrasts” c⊤ (βbρ − β) for many choices of c ∈ Rp , provided that the design matrix
X is nearly low rank. A particularly interesting consequence of our work is that RB successfully
approximates the law c⊤ (βbρ − β) for a certain choice of c that was shown in B&F 1983 to “break”
RB when applied to least-squares. Specifically, such a c can be chosen as one of the rows of X with
a high leverage score (see Section 4). This example corresponds to the practical problem of setting
confidence intervals for mean response values E[Yi ] = Xi⊤ β. (See [12, p. 41], as well as Lemma 2
and Theorem 4 in Section 3.4). Lastly, from a technical point of view, a third notable aspect of our
results is that they are formulated in terms of the Mallows-ℓ2 metric, which frees us from having to
impose conditions that force a limiting distribution to exist.
Apart from B&F 1983, the most closely related works we are aware of are the recent papers [7]
and [8], which also consider RB in the high-dimensional setting. However, these works focus on
role of sparsity in β and do not make use of low-rank structure in the design, whereas our work deals
only with structure in the design and imposes no sparsity assumptions on β.
The remainder of the paper is organized as follows. In Section 2, we formulate the problem of
approximating the laws of contrasts, and describe our proposed methodology for RB based on ridge
regression. Then, in Section 3 we state several results that lay the groundwork for Theorem 4, which
shows that that RB can successfully approximate all of the laws L(Xi⊤ (βbρ − β)|X), i = 1, . . . , n,
conditionally on a Gaussian design. Due to space constraints, all proofs are deferred to material that
will appear in a separate work.
Notation and conventions. If U and V are random variables, then L(U |V ) denotes the law of U ,
conditionally on V . If an and bn are two sequences of real numbers, then the notation an . bn
means that there is an absolute constant κ0 > 0 and an integer n0 ≥ 1 such that an ≤ κ0 bn for all
n ≥ n0 . The notation an ≍ bn means that an . bn and bn . an . For a square matrix A ∈ Rk×k
whose eigenvalues are real, we denote them by λmin (A) = λk (A) ≤ · · · ≤ λ1 (A) = λmax (A).
2 Problem setup and methodology
Problem setup. For any c ∈ Rp , it is clear that conditionally on X, the law of c⊤ (βbρ − β) is
completely determined by F0 , and hence it makes sense to use the notation
Ψρ (F0 ; c) := L c⊤ (βbρ − β)
(3)
X .
The problem we aim to solve is to approximate the distribution Ψρ (F0 ; c) for suitable choices of c.
Review of the residual bootstrap (RB) procedure. We briefly explain the steps involved in the
residual bootstrap procedure, applied to the ridge estimator βbρ of β. To proceed somewhat indirectly,
consider the following “bias-variance” decomposition of Ψρ (F0 ; c), conditionally on X,
Ψρ (F0 ; c) = L c⊤ βbρ − E[βbρ |X]
(4)
X + c⊤ E[βbρ |X] − β .
|
{z
}
{z
}
|
=: Φρ (F0 ;c)
=: bias(Φρ (F0 ;c))
Note that the distribution Φ(F0 ; c) has mean zero, and so that the second term on the right side is
the bias of Φρ (F0 ; c) as an estimator of Ψρ (F0 ; c). Furthermore, the distribution Φρ (F0 ; c) may be
viewed as the “variance component” of Ψρ (F0 ; c). We will be interested in situations where the
regularization parameter ρ may be chosen small enough so that the bias component is small. In this
case, one has Ψρ (F0 ; c) ≈ Φρ (F0 ; c), and then it is enough to find an approximation to the law
Φρ (F0 ; c), which is unknown. To this end, a simple manipulation of c⊤ (βbρ − E[βbρ ]) leads to
Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε
(5)
X).
Now, to approximate Φρ (F0 ; c), let Fb be any centered estimate of F0 . (Typically, Fb is obtained by
using the centered residuals of some estimator of β, but this is not necessary in general.) Also, let
ε∗ = (ε∗1 , . . . , ε∗n ) ∈ Rn be an i.i.d. sample from Fb . Then, replacing ε with ε∗ in line (5) yields
Φρ (Fb ; c) = L(c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗
(6)
X).
3
At this point, we define the (random) measure Φρ (Fb ; c) to be the RB approximation to Φρ (F0 ; c).
Hence, it is clear that the RB approximation is simply a “plug-in rule”.
A two-stage approach. An important feature of the procedure just described is that we are free
to use any centered estimator Fb of F0 . This fact offers substantial flexibility in approximating
Ψρ (F0 ; c). One way of exploiting this flexibility is to consider a two-stage approach, where a “pilot”
ridge estimator βb̺ is used to first compute residuals whose centered empirical distribution function
is Fb̺ , say. Then, in the second stage, the distribution Fb̺ is used to approximate Φρ (F0 ; c) via the
relation (6). To be more detailed, if (b
e1 (̺), . . . , ebn (̺)) = eb(̺) := Y − X βb̺ are the residuals of βb̺ ,
b
then we define F̺ to be the distribution that places mass 1/n at each of the values ebi (̺) − ē(̺) with
P
ē(̺) := n1 ni=1 ebi (̺). Here, it is important to note that the value ̺ is chosen to optimize Fb̺ as an
approximation to F0 . By contrast, the choice of ρ depends on the relative importance of width and
coverage probability for confidence intervals based on Φρ (Fb̺ ; c). Theorems 1, 3, and 4 will offer
some guidance in selecting ̺ and ρ.
Resampling algorithm. To summarize the discussion above, if B is user-specified number of
bootstrap replicates, our proposed method for approximating Ψρ (F0 ; c) is given below.
1. Select ρ and ̺, and compute the residuals eb(̺) = Y − X βb̺ .
2. Compute the centered distribution function Fb̺ , putting mass 1/n at each ebi (̺) − ē(̺).
3. For j = 1, . . . , B:
• Draw a vector ε∗ ∈ Rn of n i.i.d. samples from Fb̺ .
• Compute zj := c⊤ (X ⊤ X + ρIp×p )−1 X ⊤ ε∗ .
4. Return the empirical distribution of z1 , . . . , zB .
Clearly, as B → ∞, the empirical distribution of z1 , . . . , zB converges weakly to Φρ (Fb̺ ; c), with
probability 1. As is conventional, our theoretical analysis in the next section will ignore Monte Carlo
issues, and address only the performance of Φρ (Fb̺ ; c) as an approximation to Ψρ (F0 ; c).
3 Main results
The following metric will be central to our theoretical results, and has been a standard tool in the
analysis of the bootstrap, beginning with the work of Bickel and Freedman [14].
The Mallows (Kantorovich) metric. For two random vectors U and V in a Euclidean space, the
Mallows-ℓ2 metric is defined by
n h
i
o
(7)
d22 (L(U ), L(V )) := inf E kU − V k22 : (U, V ) ∼ π
π∈Π
where the infimum is over the class Π of joint distributions π whose marginals are L(U ) and L(V ).
It is worth noting that convergence in d2 is strictly stronger than weak convergence, since it also
requires convergence of second moments. Additional details may be found in the paper [14].
3.1 A bias-variance decomposition for bootstrap approximation
To give some notation for analyzing the bias-variance decomposition of Ψρ (F0 ; c) in line (4), we
define the following quantities based upon the ridge estimator βbρ . Namely, the variance is
vρ = vρ (X; c) := var(Ψρ (F0 ; c)|X) = σ 2 kc⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 .
To express the bias of Φρ (F0 ; c), we define the vector δ(X) ∈ Rp according to
δ(X) := β − E[βbρ ] = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X β,
4
(8)
and then put
b2ρ = b2ρ (X; c) := bias2 (Φρ (F0 ; c)) = (c⊤ δ(X))2 .
(9)
We will sometimes omit the arguments of vρ and b2ρ to lighten notation. Note that vρ (X; c) does not
depend on β, and b2ρ (X; c) only depends on β through δ(X).
The following result gives a regularized and high-dimensional extension of some lemmas in Freedman’s early work [11] on RB for least squares. The result does not require any structural conditions
on the design matrix, or on the true parameter β.
Theorem 1 (consistency criterion). Suppose X ∈ Rn×p is fixed. Let Fb be any estimator of F0 , and
let c ∈ Rp be any vector such that vρ = vρ (X; c) 6= 0. Then with Pε -probability 1, the following
inequality holds for every n ≥ 1, and every ρ > 0,
b2
(10)
d22 √1vρ Ψρ (F0 ; c), √1vρ Φρ (Fb ; c) ≤ σ12 d22 (F0 , Fb ) + vρρ .
√
Remarks. Observe that the normalization 1/ vρ ensures that the bound is non-trivial, since the
√
distribution Ψρ (F0 ; c)/ vρ has variance equal to 1 for all n (and hence does not become degenerate
for large n). To consider the choice of ρ, it is simple to verify that the ratio b2ρ /vρ decreases monotonically as ρ decreases. Note also that as ρ becomes small, the variance vρ becomes large, and
likewise, confidence intervals based on Φρ (Fb; c) become wider. In other words, there is a trade-off
between the width of the confidence interval and the size of the bound (10).
Sufficient conditions for consistency of RB. An important practical aspect of Theorem 1 is that
for any given contrast c, the variance vρ (X; c) can be easily estimated, since it only requires an
estimate of σ 2 , which can be obtained from Fb. Consequently, whenever theoretical bounds on
d22 (F0 , Fb) and b2ρ (X; c) are available, the right side of line (10) can be controlled. In this way,
Theorem 1 offers a simple route for guaranteeing that RB is consistent. In Sections 3.2 and 3.3 to
follow, we derive a bound on E[d22 (F0 , Fb)|X] in the case where Fb is chosen to be Fb̺ . Later on in
Section 3.4, we study RB consistency in the context of prediction with a Gaussian design, and there
we derive high probability bounds on both vρ (X; c) and b2ρ (X; c) where c is a particular row of X.
3.2 A link between bootstrap consistency and MSPE
If βb is an estimator of β, its mean-squared prediction error (MSPE), conditionally on X, is defined
as
mspe(βb |X) := n1 E kX(βb − β)k22
(11)
X .
The previous subsection showed that in-law approximation of contrasts is closely tied to the approximation of F0 . We now take a second step of showing that if the centered residuals of an estimator
βb are used to approximate F0 , then the quality of this approximation can be bounded naturally in
terms of mspe(βb |X). This result applies to any estimator βb computed from the observations (1).
Theorem 2. Suppose X ∈ Rn×p is fixed. Let βb be any estimator of β, and let Fb be the empirical
b Also, let Fn denote the empirical distribution of n i.i.d.
distribution of the centered residuals of β.
samples from F0 . Then for every n ≥ 1,
2
E d22 (Fb, F0 )X
≤ 2 mspe(βb |X) + 2 E[d22 (Fn , F0 )] + 2σn .
(12)
Remarks. As we will see in the next section, the MSPE of ridge regression can be bounded in a
sharp way when the design matrix is approximately low rank, and there we will analyze mspe(βb̺ |X)
for the pilot estimator. Consequently, when near low-rank structure is available, the only remaining
issue in controlling the right side of line (12) is to bound the quantity E[d22 (Fn , F0 )|X]. The very
recent work of Bobkov and Ledoux [15] provides an in-depth study of this question, and they derive
a variety bounds under different tail conditions on F0 . We summarize one of their results below.
Lemma 1 (Bobkov and Ledoux, 2014). If F0 has a finite fourth moment, then
E[d22 (Fn , F0 )] . log(n)n−1/2 .
5
(13)
Remarks. The fact that the squared distance is bounded at the rate of log(n)n−1/2 is an indication that d2 is a rather strong metric on distributions. For a detailed discussion of this result, see
Corollaries 7.17 and 7.18 in the paper [15]. Although it is possible to obtain faster rates when more
b
stringent tail conditions are placed on F0 , we will only need a fourth moment, since the mspe(β|X)
term in Theorem 2 will often have a slower rate than log(n)n−1/2 , as discussed in the next section.
3.3 Consistency of ridge regression in MSPE for near low rank designs
In this subsection, we show that when the tuning parameter ̺ is set at a suitable rate, the pilot ridge
estimator βb̺ is consistent in MSPE when the design matrix is near low-rank — even when p/n is
large, and without any sparsity constraints on β. We now state some assumptions.
A1. There is a number ν > 0, and absolute constants κ1 , κ2 > 0, such that
b ≤ κ2 i−ν
κ1 i−ν ≤ λi (Σ)
for all i = 1, . . . , n ∧ p.
A2. There are absolute constants θ, γ > 0, such that for every n ≥ 1,
̺
n
= n−θ and
ρ
n
= n−γ .
A3. The vector β ∈ Rp satisfies kβk2 . 1.
Due to Theorem 2, the following bound shows that the residuals of βb̺ may be used to extract a
consistent approximation to F0 . Two other notable features of the bound are that it is non-asymptotic
and dimension-free.
Theorem 3. Suppose that X ∈ Rn×p is fixed and that Assumptions 1–3 hold, with p/n ≍ 1. Assume
1
ν
1
further that θ is chosen as θ = 2ν
3 when ν ∈ (0, 2 ), and θ = ν+1 when ν > 2 . Then,
(
2ν
if ν ∈ (0, 21 ),
n− 3
ν
(14)
mspe(βb̺ |X) .
− ν+1
n
if ν > 12 .
Also, both bounds in (14) are tight in the sense that β can be chosen so that βb̺ attains either rate.
b are observable, they may be used to estimate ν and guide
Remarks. Since the eigenvalues λi (Σ)
the selection of ̺/n = n−θ . However, from a practical point of view, we found it easier to select ̺
via cross-validation in numerical experiments, rather than via an estimate of ν.
A link with Pinsker’s Theorem. In the particular case when F0 is a centered Gaussian distribution, the “prediction problem” of estimating Xβ is very similar to estimating the mean parameters of
a Gaussian sequence model, with error measured in the ℓ2 norm. In the alternative sequence-model
format, the decay condition on the eigenvalues of n1 X ⊤ X translates into an ellipsoid constraint on
the mean parameter sequence [16, 17]. For this reason, Theorem 3 may be viewed as “regression
version” of ℓ2 error bounds for the sequence model under an ellipsoid constraint (cf. Pinsker’s Theorem, [16, 17]). Due to the fact that the latter problem has a very well developed literature, there
may be various “neighboring results” elsewhere. Nevertheless, we could not find a direct reference
for our stated MSPE bound in the current setup. For the purposes of our work in this paper, the more
important point to take away from Theorem 3 is that it can be coupled with Theorem 2 for proving
consistency of RB.
3.4 Confidence intervals for mean responses, conditionally on a Gaussian design
In this section, we consider the situation where the design matrix X has rows Xi⊤ ∈ Rp drawn
i.i.d. from a multivariate normal distribution N (0, Σ), with X ⊥
⊥ ε. (The covariance matrix Σ may
vary with n.) Conditionally on a realization of X, we analyze the RB approximation of the laws
Ψρ (F0 ; Xi ) = L(Xi⊤ (βbρ − β)|X). As discussed in Section 1, this corresponds to the problem of
setting confidence intervals for the mean responses E[Yi ] = Xi⊤ β. Assuming that the population
eigenvalues λi (Σ) obey a decay condition, we show below in Theorem 4 that RB succeeds with high
PX -probability. Moreover, this consistency statement holds for all of the laws Ψρ (F0 ; Xi ) simultaneously. That is, among the n distinct laws Ψρ (F0 ; Xi ), i = 1, . . . , n, even the worst bootstrap
approximation is still consistent. We now state some population-level assumptions.
6
A4. The operator norm of Σ ∈ Rp×p satisfies kΣkop . 1.
Next, we impose a decay condition on the eigenvalues of Σ. This condition also ensures that Σ is
invertible for each fixed p — even though the bottom eigenvalue may become arbitrarily small as p
becomes large. It is important to notice that we now use η for the decay exponent of the population
eigenvalues, whereas we used ν when describing the sample eigenvalues in the previous section.
A5. There is a number η > 0, and absolute constants k1 , k2 > 0, such that for all i = 1, . . . , p,
k1 i−η ≤ λi (Σ) ≤ k2 i−η .
A6. There are absolute constants k3 , k4 ∈ (0, 1) such that for all n ≥ 3, we have the bounds
k3 ≤ np ≤ k4 and p ≤ n − 2.
The following lemma collects most of the effort needed in proving our final result in Theorem 4.
Here it is also helpful to recall the notation ρ/n = n−γ and ̺/n = n−θ from Assumption 2.
Lemma 2. Suppose that the matrix X ∈ Rn×p has rows Xi⊤ drawn i.i.d. from N (0, Σ), and that
Assumptions 2–6 hold. Furthermore, assume that γ chosen so that 0 < γ < min{η, 1}. Then, the
statements below are true.
(i) (bias inequality)
Fix any τ > 0. Then, there is an absolute constant κ0 > 0, such that for all large n, the following
event holds with PX -probability at least 1 − n−τ − ne−n/16 ,
max b2ρ (X; Xi ) ≤ κ0 · n−γ · (τ + 1) log(n + 2).
1≤i≤n
(15)
(ii) (variance inequality)
There are absolute constants κ1 , κ2 > 0 such that for all large n, the following event holds with
γ
PX -probability at least 1 − 4n exp(−κ1 n η ),
1
max
1≤i≤n vρ (X;Xi )
γ
≤ κ2 n1− η .
(16)
(iii) (mspe inequalities)
η
when
Suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 21 ), and that θ is chosen as θ = 1+η
1
η > 2 . Then, there are absolute constants κ3 , κ4 , κ5 , κ6 > 0 such that for all large n,
(
2η
with PX -probability at least 1 − exp(−κ3 n2−4η/3 ), if η ∈ (0, 21 )
κ4 n− 3
η
mspe(βb̺ |X) ≤
2
− η+1
κ6 n
with PX -probability at least 1 − exp(−κ5 n 1+η ),
if η > 21 .
Remarks. Note that the two rates in part (iii) coincide as η approaches 1/2. At a conceptual level,
the entire lemma may be explained in relatively simple terms. Viewing the quantities mspe(βb̺ |X),
b2ρ (X; Xi ) and vρ (X; Xi ) as functionals of a Gaussian matrix, the proof involves deriving concentration bounds for each of them. Indeed, this is plausible given that these quantities are smooth
functionals of X. However, the difficulty of the proof arises from the fact that they are also highly
non-linear functionals of X.
We now combine Lemmas 1 and 2 with Theorems 1 and 2 to show that all of the laws Ψρ (F0 ; Xi )
can be simultaneously approximated via our two-stage RB method.
Theorem 4. Suppose that F0 has a finite fourth moment, Assumptions 2–6 hold, and γ is chosen
η
so that 1+η
< γ < min{η, 1}. Also suppose that θ is chosen as θ = 2η/3 when η ∈ (0, 12 ), and
η
when η > 12 . Then, there is a sequence of positive numbers δn with limn→∞ δn = 0, such
θ = η+1
that the event
h
i
E max d22 √1vρ Ψρ (F0 ; Xi ), √1vρ Φρ (Fb̺ ; Xi )
(17)
X ≤ δn
1≤i≤n
has PX -probability tending to 1 as n → ∞.
Remark. Lemma 2 gives explicit bounds on the numbers δn , as well as the probabilities of the
corresponding events, but we have stated the result in this way for the sake of readability.
7
4 Simulations
In four different settings of n, p, and the decay parameter η, we compared the nominal 90% confidence intervals (CIs) of four methods: “oracle”, “ridge”, “normal”, and “OLS”, to be described
below. In each setting, we generated N1 := 100 random designs X with i.i.d. rows drawn from
N (0, Σ), where λj (Σ) = j −η , j = 1, . . . , p, and the eigenvectors of Σ were drawn randomly by
setting them to be the Q factor in a QR decomposition of a standard p × p Gaussian matrix. Then,
for each realization of X, we generated N2 := 1000 realizations of Y according to the model (1),
where β = 1/k1k2 ∈ Rp , and F0 is the centered t distribution on 5 degrees of freedom, rescaled to
have standard deviation σ = 0.1. For each X, and each corresponding Y , we considered the problem of setting a 90% CI for the mean response value Xi⊤⋆ β, where Xi⊤⋆ is the row with the highest
leverage score, i.e. i⋆ = argmax1≤i≤n Hii and H := X(X ⊤ X)−1 X ⊤ . This problem was shown in
B&F 1983 to be a case where the standard RB method based on least-squares fails when p/n ≍ 1.
Below, we refer to this method as “OLS”.
To describe the other three methods, “ridge” refers to the interval [Xi⊤⋆ βbρ − qb0.95 , Xi⊤⋆ βbρ − qb0.05 ],
where qbα is the α% quantile of the numbers z1 , . . . , zB computed in the proposed algorithm in
Section 2, with B = 1000 and c⊤ = Xi⊤⋆ . To choose the parameters ρ and ̺ for a given X and Y ,
we first computed rb as the value that optimized the MSPE error of a ridge estimator βbr with respect
to 5-fold cross validation; i.e. cross validation was performed for every distinct pair (X, Y ). We then
put ̺ = 5b
r and ρ = 0.1b
r, as we found the prefactors 5 and 0.1 to work adequately across various
settings. (Optimizing ̺ with respect to MSPE is motivated by Theorems 1, 2, and 3. Also, choosing ρ
to be somewhat smaller than ̺ conforms with the constraints on θ and γ in Theorem 4.) The method
“normal” refers to the CI based on the normal approximation L(Xi⊤⋆ (βbρ −β)|X) ≈ N (0, τb2 ), where
r, and σ
b2 is the usual unbiased estimate of σ 2 based
τb2 = σ
b2 kXi⊤⋆ (X ⊤ X +ρIp×p )−1 X ⊤ k22 , ρ = 0.1b
on OLS residuals. The “oracle” method refers to the interval [Xi⊤⋆ βbρ − q̃0.95 , Xi⊤⋆ βbρ − q̃0.05 ], with
ρ = 0.1b
r, and q̃α being the empirical α% quantile of Xi⊤ (βbρ − β) over all 1000 realizations of Y
based on a given X. (This accounts for the randomness in ρ = 0.1b
r.)
Within a given setting of the triplet (n, p, η), we refer to the “coverage” of a method as the fraction of
the N1 ×N2 = 105 instances where the method’s CI contained the parameter Xi⊤⋆ β. Also, we refer to
“width” as the average width of a method’s intervals over all of the 105 instances. The four settings of
(n, p, η) correspond to moderate/high dimension and moderate/fast decay of the eigenvalues λi (Σ).
Even in the moderate case of p/n = 0.45, the results show that the OLS intervals are too narrow
and have coverage noticeably less than 90%. As expected, this effect becomes more pronounced
when p/n = 0.95. The ridge and normal intervals perform reasonably well across settings, with
both performing much better than OLS. However, it should be emphasized that our study of RB
is motivated by the desire to gain insight into the behavior of the bootstrap in high dimensions
— rather than trying to outperform particular methods. In future work, we plan to investigate the
relative merits of the ridge and normal intervals in greater detail.
Table 1: Comparison of nominal 90% confidence intervals
setting 1
n = 100, p = 45, η = 0.5
setting 2
n = 100, p = 95, η = 0.5
setting 3
n = 100, p = 45, η = 1
setting 4
n = 100, p = 95, η = 1
width
coverage
width
coverage
width
coverage
width
coverage
oracle
0.21
0.90
0.22
0.90
0.20
0.90
0.21
0.90
ridge
0.20
0.87
0.26
0.88
0.21
0.90
0.26
0.92
normal
0.23
0.91
0.26
0.88
0.22
0.91
0.23
0.87
OLS
0.16
0.81
0.06
0.42
0.16
0.81
0.06
0.42
Acknowledgements. MEL thanks Prof. Peter J. Bickel for many helpful discussions, and gratefully acknowledges the DOE CSGF under grant DE-FG02-97ER25308, as well as the NSF-GRFP.
8
A
Proof of Theorem 1
Proof. Due to line (4) and Lemma 8.8 in B&F 1981,
d22 (Ψρ (F0 ; c), Φρ (Fb ; c)) = d22 Φρ (F0 ; c), Φρ (Fb ; c) + (c⊤ δ(X))2 .
(18)
If ε∗ ∈ Rn is a random vector whose entries are drawn i.i.d. from Fb , then the definition of Φρ gives
the matching relations
Φρ (F0 ; c) = L(c⊤ (X ⊤ X + ρ)−1 X ⊤ ε
X)
(19)
⊤
⊤
−1
⊤
∗
Φρ (Fb; c) = L(c (X X + ρ) X ε
X).
To make use of these relations, we apply Lemma 8.9 in B&F 1981, which implies that if w ∈ Rn is
a generic deterministic vector, and if U = (U1 , . . . , Un ) and V = (V1 , . . . , Vn ) are random vectors
with i.i.d. entries, then
d22 (w⊤ U, w⊤ V ) ≤ kwk22 · d2 (U1 , V1 )2 .
Therefore,
d22 Φρ (F0 ), Φρ (Fb) ≤ kc⊤ (X ⊤ X + ρ)−1 X ⊤ k22 · d22 (ε1 , ε∗1 )
=
1
σ2
(20)
· vρ (X; c) · d22 (F0 , Fb ).
Combining this with line (18) and dividing through by vρ proves the claim.
B Proof of Theorem 2
Proof. By the triangle inequality,
d22 (Fb , F0 ) ≤ 2 d22 (Fb, Fn ) + 2 d22 (Fn , F0 ).
(21)
b which places mass 1/n at
Let F̃n be the (uncentered) empirical distribution of the residuals eb of β,
each value ebi , for i = 1, . . . , n. The proofs of Lemmas 2.1 and 2.2 in Freedman 1981, show that
Pn
2
E d2 (Fb, Fn )2
+ E d2 (F̃n , Fn )2
X ≤ E n1 i=1 εi
X
(22)
≤ n1 σ 2 + n1 E kb
e − εk22
X
b 2
= n1 σ 2 + n1 E kX(β − β)k
2 X ,
b which holds for any estimator β.
b This
where we have used the algebraic identity eb − ε = X(β − β),
completes the proof.
C
Proof of Theorem 3
Proof. We begin with a simple bias-variance decomposition,
i
h
2
X
+
mspe(βb̺ |X) = n1 E X βb̺ − E βb̺ |X
2
1
n
X(E βb̺ |X − β)
2
.
2
(23)
We will handle the bias and variance terms separately. To consider the bias term, note that E[βbρ |X]−
β = Bβ, where
B = (X ⊤ X + ̺Ip×p )−1 X ⊤ X − Ip×p .
Hence,
1
b
n kX(E[β̺ |X]
− β)k22 =
1
2
n kXBβk2
= β ⊤ B( n1 X ⊤ X)Bβ.
9
(24)
If we let li = λi ( n1 X ⊤ X), then the eigenvalues of B( n1 X ⊤ X)B are of the form µi :=
In particular, it is simple to check1 that maxi µi ≍ ̺/n whenever θ ≤ ν, and so
li (̺/n)2
(li +̺/n)2 .
β ⊤ B( n1 X ⊤ X)Bβ . n̺ kβk22 = n−θ kβk22 .
(25)
Note that this bound is tight, since it is achieved whenever β is parallel to the top eigenvector of
B( n1 X ⊤ X)B.
To consider the variance term, note that βb̺ − E[βb̺ |X] = (X ⊤ X + ̺Ip×p )−1 X ⊤ ε, and so
h
i
2
1
b̺ − E[βb̺ |X]) 2
X = 1 tr X ⊤ X X ⊤ X + ̺Ip×p −1
E
X(
β
n
n
2
2
Pn∧p
li
.
= n1 i=1 li +̺/n
It is natural to decompose the sum in terms of the index set
I(n) := {i ∈ {1, . . . , n ∧ p} : li ≥ ̺/n},
(26)
(27)
θ
ν
which satisfies |I(n)| ≍ n . We will bound the variance term in two complementary cases; either
ν > 1/2 or ν ≤ 1/2. First assume ν > 1/2. Then,
1
n
p
X
i=1
2
li
li +̺/n
=
1
n
X
i∈I(n)
.
1
n
2
li
li +̺/n
|I(n)| +
1
n
Z
+
n∧p
|I(n)|
1
n
X
i6∈I(n)
2
li
li +̺/n
(28)
x−2ν
(̺/n)2 dx
(29)
θ
using ν >
. n−1 n ν + n2θ · (|I(n)|)1−2ν
θ
θ
≍ n−1 n ν + n2θ · (n ν )(1−2ν)
1
2
(30)
(31)
θ−ν
ν
= 2n
.
(32)
To see that this upper bound is tight, note that in line (28), we can use the term-wise lower bounds
( 1
if i ∈ I(n)
2
4
li
(33)
≥
l2i
1
li +̺/n
if i 6∈ I(n),
4 (̺/n)2
and then apply an integral approximation from below (which leads to the same rate). Combining the
bias and variance pieces, we have shown that
θ−ν
1
if ν > 1 .
EkX(βb̺ − β)k2 . n ν + n−θ
2
n
2
The bound is optimized when the two terms on the right side have the same rate, which leads to the
ν
.
choice θ = ν+1
In the case where ν ∈ (0, 21 ), the calculation proceeds in the same way up to line (30), where we
obtain the bound
n∧p
θ
X
2
li
1
. n−1 n ν + n2θ · n1−2ν
(34)
n
li +̺/n
i=1
θ−ν
(35)
= n ν + n2(θ−ν) .
This bound is also tight due to the same reasoning as above. Note that in order for the bound to tend
to 0 as n → ∞, we must choose θ < ν. Furthermore, since we are working under the assumption
ν ∈ (0, 12 ), it follows that the right side of line (35) has rate equal to n2(θ−ν) . Combining the rates
for the bias and variance shows that
1
2
2(θ−ν)
b
+ n−θ
if ν ∈ (0, 21 ).
n EkX(β̺ − β)k2 . n
The bound is optimized when the two terms on the right side have the same rate, which leads to the
choice θ = 2ν
3 .
2
t(̺/n)
Note that if t ∈ R and f (t) := (t+̺/n)
2 , then f is maximized at t = ̺/n. Also, if θ ≤ ν, then there at
least one li that scales at the rate of ̺/n.
1
10
D
Proof of Lemma 2
The proof is split up into three pieces, corresponding to parts (i), (ii), and (iii) in the statement of the
result.
D.1
The bias inequality (15)
We prove inequality (15) by combining Lemmas 3 and 5 below.
Lemma 3. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there are independent
random vectors ui (X), w(X) ∈ Rp such that the random variable Xi⊤ δ(X) can be represented
algebraically as
bρ (X; Xi ) = Xi⊤ δ(X) = ui (X)⊤ w(X).
Here, the vectors ui (X) can be represented in law as
L
ui (X) =
1
kzk2 Πp (z),
(36)
where z ∈ Rn is a standard Gaussian vector, and Πp (z) := (z1 , . . . , zp ). Also, the vector w(X)
satisfies the bound kw(X)k22 ≤ ρ4 kβk22 almost surely.
Proof. To fix notation, we write X ⊤ = Σ1/2 Z ⊤ where Z ⊤ ∈ Rp×n is a standard Gaussian matrix.
Recall that δ(X) = Bβ, where
B = Ip×p − (X ⊤ X + ρIp×p )−1 X ⊤ X.
Let Z = HLG⊤ be a “signed s.v.d.” for Z, as defined in Appendix E.2, where H ∈ Rn×p , L ∈
Rp×p , and G ∈ Rp×p . Now define ui (X) and w(X) according to
⊤
1/2
Xi⊤ δ(X) = e⊤
Bβ =
i XBβ = ei ZΣ
e⊤
H LG⊤ Σ1/2 Bβ .
{z
}
|i{z } |
=: ui (X)⊤ =: w(X)
From Lemma 17 in Appendix E.2, the rows e⊤
i H can be represented in distribution as
The same lemma also shows that the three matrices H, L, and G are independent.
(37)
1
kzk2 Πp (z).
Hence, to show that ui (X) and w(X) are independent, it suffices to show that w(X) is a function
only of G and L. In turn, it is enough to show that B is a function only of G and L. But this is
simple, because B is a function only of the matrix X ⊤ X, which may be written as
X ⊤ X = Σ1/2 Z ⊤ ZΣ1/2 = Σ1/2 GL2 G⊤ Σ1/2 .
(38)
It remains to show that kw(X)k22 ≤ ρ4 kβk22 almost surely. Combining the definition of w(X) with
line (38) gives
(39)
kw(X)k22 = β ⊤ BX ⊤ XB β.
2
li
1
⊤
The eigenvalues of BX ⊤ XB are of the form µi := n (l(ρ/n)
2 where li = λi ( n X X), and it is
i +ρ/n)
ρ
simple to check that the inequality maxi µi ≤ 4 holds for every realization of X.
Before proceeding to the second portion of the proof of inequality (15), we record some well-known
tail bounds for Gaussian quadratic forms due to Laurent and Massart [18], which will be useful at
various points later on.
Lemma 4 (Laurent & Massart, 2001). Let A ∈ Rn×n be a fixed symmetric matrix, and let z ∈ Rn
be a standard Gaussian vector. Then, for every t > 0,
h
i
√
P z ⊤ Az ≥ tr(A) + 2 |||A|||F t + 2 |||A|||op t ≤ exp(−t)
(40)
and
h
√i
P z ⊤ Az ≤ tr(A) − 2 |||A|||F t ≤ exp(−t).
11
(41)
The next lemma completes the proof of inequality (15).
Lemma 5. Assume the conditions of Lemma 2, and let τ > 0 be a constant. Then for every n ≥ 1,
the following event holds with probability at least 1 − n−τ − ne−n/16 ,
max b2ρ (X; Xi ) ≤ 5kβk22 · n−γ · (τ + 1) log(n + 2).
1≤i≤n
(42)
Proof. Applying the representation for bρ (X; Xi ) given in Lemma 3, there is a standard Gaussian
L
vector z ∈ Rn , such that ui (X) = Πp (z)/kzk2. Consequently,
L
1
⊤
b2ρ (X; Xi ) = kzk
Πp (z),
2 · Πp (z) w(X)w(X)
(43)
The same lemma also implies that for all t′ ∈ (0, 14 ),
i
h
1
1
√
≤ exp(−nt′ ).
P kzk
2 ≥
(1−2 t′ )n
(45)
2
where we may take z and w(X) to be independent by the same lemma. Using Lemma 4 on Gaussian
quadratic forms, as well as the fact that kw(X)k22 ≤ ρ4 kβk22 almost surely, we have for all t > 0,
"
#
√
ρ
⊤
⊤
2
P Πp (z) w(X)w(X) Πp (z) ≥ 4 kβk2 1 + 2 t + 2t)
w(X) ≤ exp(−t).
(44)
2
Now, we combine the bounds by integrating out w(X) in line (44) and choosing t′ = 1/16 in
line (45). Taking a union bound, we conclude that for any t > 0, and any fixed i = 1, . . . , n,
"
#
√
ρ
2
2 1
P bρ (X; Xi ) ≤ n · kβk2 · 2 1 + 2 t + 2t ≥ 1 − e−t − e−n/16 .
(46)
Finally, another union bound shows that the maximum of the bρ (X, Xi⊤ ) satisfies
P
"
max
1≤i≤n
b2ρ (X; Xi )
≤
ρ
n
·
kβk22
·
1
2 (1
#
√
+ 2 t + 2t) ≥ 1 − e−t+log(n) − ne−n/16 ,
(47)
which implies the
√stated result after choosing t = (τ + 1) log(n + 2), and noting that since t ≥ 1,
we have 21 (1 + 2 t + 2t) ≤ 5t = 5(τ + 1) log(n + 2), as well as e−t+log(n) ≤ e−τ log(n+2) ≤ n−τ
for every n ≥ 1.
D.2
The variance inequality (16)
The following “representation lemma” will serve as the basis for controlling the variance
vρ (X; Xi ) = σ 2 kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 .
Lemma 6. Assume the conditions of Lemma 2. For each i ∈ {1, . . . , n}, there is a random vector
vi (X) ∈ Rp and a random matrix M (X) ∈ Rp×p that are independent and satisfy the algebraic
relation
kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = vi (X)⊤ M (X)vi (X).
Here, the vector vi (X) can be represented in law as
L
vi (X) =
1
kzk2 Πp (z),
(48)
where z ∈ Rn is a standard Gaussian vector and Πp (z) = (z1 , . . . , zp ). Also, the matrix M (X)
satisfies the algebraic relation
tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ k2F .
An explicit formula for M (X) is given below.
12
(49)
Proof. Define the matrix A := (X ⊤ X + ρIp×p )−1 X ⊤ X(X ⊤X + ρIp×p )−1 . Then,
⊤
kXi⊤ (X ⊤ X + ρIp×p )−1 X ⊤ k22 = e⊤
i XAX ei .
(50)
Using the notation in the proof of the previous lemma, let X = ZΣ1/2 where Z ∈ Rn×p is a
standard Gaussian random matrix. Furthermore, let Z = HLG⊤ be a signed s.v.d. for Z, as defined
in Appendix E.2. Then, we define vi (X) and M (X) according to
⊤
⊤
e⊤
LG⊤ Σ1/2{z
AΣ1/2 GL⊤} H ⊤ ei .
i XAX ei = ei H |
| {z }
(51)
=:M(X)
=:vi (X)⊤
Some algebra shows that M (X) satisfies the relation (49). As in the proof of Lemma 3, the argument
is completed using two properties of the signed s.v.d. of a standard Gaussian matrix: The rows of H
can be represented as Πp (z)/kzk2 where z ∈ Rn is a standard Gaussian vector, and the matrices H,
L, and G⊤ are independent. (See Lemma 17 in Appendix E.2.) To show that vi (X) and M (X) are
independent, first note that vi (X) only depends on H. Also, it is simple to check that M (X) only
depends on G and L, because A is a function only of X ⊤ X = Σ1/2 GL2 G⊤ Σ1/2 .
D.2.1 Concentration of the variance and bounds on its expected value
Due to Lemma 6, for each i = 1, . . . , n, we have the representation
L
vρ (X; Xi ) =
1
Π (z)⊤ M (X)Πp (z),
kzk22 p
(52)
where z ∈ Rn is a standard Gaussian vector, independent of M (X). Conditionally on M (X),
the quadratic form Πp (z)⊤ M (X)Πp (z) concentrates around tr(M (X)) by Lemma 4. The same
2
lemma
p also implies that kzk2 concentrates around n. In the next three subsections, we will show
that tr(M (X)) concentrates around its expected value, and obtain upper and lower bounds on the
expected value. We will need two-sided bounds in preparation for Theorem 4.
D.2.2 Concentration of
p
tr(M (X))
Lemma 7. Assume the conditions of Lemma 2. Then for every t > 0, and every n ≥ 1,
#
"
p
p
64 n1−γ t2
tr(M (X)) − E tr(M (X)) ≥ t ≤ 2 exp(− 54
P
kΣkop ).
(53)
p
Proof. We will show that tr(M (X)) is a Lipschitz function of a standard Gaussian matrix. Define
s2
, which satisfies the Lipschitz condition
the function gρ : R+ → [0, 1] by gρ (s) = s2 +(ρ/n)
|gρ (s) − gρ (s′ )| ≤ Ln |s − s′ |,
for all s, s′ ≥ 0, where Ln :=
√
3 3
8
√1 .
ρ/n
If σ(A) = (σ1 (A), . . . , σk (A)) denotes the vector of singular values of a rank k matrix A, then we
define gρ to act on σ(A) component-wise, i.e. gρ (σ(A)) = (gρ (σ1 (A)), . . . , gρ (σk (A))). Recall
from Lemma 6 that
p
(54)
tr(M (X)) = kX(X ⊤X + ρIp×p )−1 X ⊤ kF
and note that the ith singular value of the matrix X(X ⊤ X +ρIp×p )−1 X ⊤ is given by gρ (σi ( √1n X)).
Viewing the Frobenius norm of a matrix as the ℓ2 norm of its singular values, we have
p
tr(M (X)) = kgρ (σ( √1n X))k2 .
(55)
Write X ⊤ = Σ1/2 Z ⊤ for a standard Gaussian matrix Z ∈ Rn×p , and let f : Rn×p → R be defined
according to
p
f (Z) := tr(M (X)).
13
We claim that f is Lipschitz with respect to the Frobenius norm. Let W ⊤ ∈ Rp×n be a generic
matrix, and put A = √1n Σ1/2 Z ⊤ and B = √1n Σ1/2 W ⊤ . Then,
|f (Z) − f (W )| = kgρ (σ(A))k2 − kgρ (σ(B))k2
≤ gρ (σ(A)) − gρ (σ(B))
(56)
(57)
2
≤ Ln kσ(A) − σ(B)k2
(58)
≤ Ln kA − BkF
(59)
√1 Σ1/2
n
= Ln
≤
Ln
√
n
(Weilandt-Hoffman)
Z⊤ − W ⊤ F
p
kΣkop · Z ⊤ − W ⊤
F
,
(60)
(61)
where we have used a version of the Weilandt-Hoffman inequality for singular values [19, p.186],
as well as the inequality kM1 M2 kF ≤ kM1 kop kM2 kF , which holds for any square matrix M1 that
is compatible with M2 . (See Lemma 12 in Appendix E.) The statement of the lemma now follows
from the Gaussian concentration inequality. (See Lemma 15 in Appendix E).
p
D.2.3 Upper bound on E tr(M (X))
Lemma 8. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies
(
1
p
n(γ−η)+ 2 if η ∈ (0, 21 )
γ
E tr(M (X)) .
if η > 21 .
n 2η
(62)
p
Proof. By Jensen’s inequality, it is enough to bound E[tr(M (X))] from above. Define the unis
variate function ψ : R+ → R+ by ψ(s) := (√s+ρ/n)
2 , and observe that
2
tr(M (X)) = tr (X ⊤ X + ρIp×p )−1 X ⊤ X
=
p
X
b
λ2i (Σ)
2
b
(λi (Σ)+ρ/n)
i=1
b 2 ))
ψ(λi (Σ
i=1
=
p
X
(63)
b 2) .
= tr ψ(Σ
Here where we use the “operator calculus” notation ψ(A) = U ψ(D)U ⊤ where A is a symmetric
matrix with spectral decomposition A = U DU ⊤ , and ψ(D) is the diagonal matrix whose ith diagb 2 )) is a concave matrix
onal entry is ψ(Dii ). It is simple to check that ψ is a concave, and so tr(ψ(Σ
2
b
functional of Σ by Lemma 13 in Section E.1 of Appendix A. Therefore, Jensen’s inequality implies
b 2 ]))
E[tr(M (X))] ≤ tr(ψ(E[Σ
(64)
P
= pi=1 ψ(λi (S)),
b 2 ]. Since X is Gaussian, Σ
b is a Wishart matrix up to scaling,
where we define the matrix S := E[Σ
and so Lemma 16 in Appendix E shows that this expectation may be evaluated exactly as
S = (1 + n1 )Σ2 +
tr(Σ)
n Σ.
(65)
We will now use this relation to apply an integral approximation to the right side of line (64). Clearly,
the eigenvalues of S are given by
λi (S) = (1 + n1 )λ2i (Σ) +
≍ i−2η +
tr(Σ) −η
.
n i
14
tr(Σ)
n λi (Σ)
(66)
Let r ∈ (0, 1) be a constant to be specified later. On the set of indices 1 ≤ i ≤ ⌈nr ⌉ we use the bound
1
ψ(λi (S)) ≤ 1, and on the set of indices i > ⌈nr ⌉ we use the bound ψ(λi (S)) ≤ (ρ/n)
2 λi (S).
−γ
2
Recalling the assumption ρ/n = n , we may decompose the inequality (64) as
E[tr(M (X))] ≤
⌈nr ⌉
X
ψ(λi (S)) +
i=1
. nr + n2γ
Z
p
X
ψ(λi (S))
(67)
i=⌈nr ⌉+1
p
x−2η +
nr
=: nr + n2γ hn (η, r).
tr(Σ) −η
dx
n x
(68)
(69)
where the function hn is defined in the last line. The bound is optimized when the two terms on the
right are of the same order; i.e. when r solves the rate equation
nr ≍ n2γ hn (η, r).
Noting that
tr(Σ)
n
≍
−η
n
n−1
(70)
if η ∈ (0, 1)
if η > 1,
the quantity hn (η, r) may be computed directly as
1−2η
n
hn (η, r) ≍ nr(1−2η)
r(1−2η)
n
+ nr(1−η)−1
if η ∈ (0, 12 ),
if η ∈ ( 12 , 1),
if η > 1.
(71)
(72)
If we let r = r∗ (η, γ) denote the solution of the rate equation (70), then some calculation shows that
under the assumption γ ∈ (0, 1),
(
2(γ − η) + 1 if η ∈ (0, 12 ),
(73)
r∗ (η, γ) = γ
if η > 21 .
η
When η ∈ (0, 1) this is straightforward. To show the details for η > 1, note that the rate equation (70) may be written as
nr ≍ n2γ+r(1−2η) + n2γ+r(1−η)−1 ,
(74)
which is the same as
1 ≍ n2(γ−ηr) + n2γ−ηr−1 .
In order for both terms on the right to be O(1), the number r must satisfy the constraints
r ≥ γη ,
r≥
γ
η
+
(75)
(76)
γ−1
η .
(77)
Since Lemma 2 assumes γ ∈ (0, 1), only the first constraint matters. Furthermore, when r ≥ γη ,
the second term in line (75) is o(1), and we are reduced to choosing r so that 1 ≍ n2(γ−ηr) , which
gives r = r∗ (η, γ) = γη . Substituting this value into line (69) completes the proof. (Note from the
discussion preceding line (69) that r must lie in the interval (0, 1), and this requires γ/η < 1, which
explains the assumption γ < min{η, 1} in Lemma 2.)
p
D.2.4 Lower bound on E tr(M (X))
Lemma 9. Assume the conditions of Lemma 2. Then, the matrix M (X) satisfies
p
γ
E tr(M (X)) & n 2η .
(78)
2
Note that if p/n ≍ 1, it is possible that nr > p for small values of n. Since we want nr ≤ p for the
integral in line (68), Lemma 2 is stated for “all large n”.
15
p
Proof. The variable tr(M (X)) may be written as kX ⊤X(X ⊤ X +ρIp×p )−1 kF . Since the Frobenius norm is a convex matrix functional, Jensen’s inequality implies
i
h
p
E tr(M (X)) ≥ E X ⊤ X(X ⊤ X + ρIp×p )−1
F
(79)
i
h
b −1 −1
,
= E Ip×p + nρ Σ
F
b :=
where the last step follows algebraically with Σ
If we define the univariate function
f : R+ → R+ by f (s) = (1 + nρ s)−1 , then last inequality is the same as
p
b −1
.
(80)
E tr(M (X)) ≥ E f Σ
F
1
⊤
n X X.
It is a basic fact that f is operator convex on the domain of positive semidefinite matrices [20,
p.117]. This yields an operator version of Jensen’s inequality with respect to the Loewner ordering
(Lemma 14 in Appendix E):
−1
b
b −1 f E Σ
.
(81)
E f Σ
Furthermore, if two matrices satisfy A B 0, then kAkF ≥ kBkF [21, Corollary 7.7.4]. Using
this fact, as well as the formula for the expected inverse of a Wishart matrix [22, p. 97], we obtain
p
−1
b
E tr(M (X)) ≥ f E Σ
F
= f
=
n
−1
n−p−1 Σ
p
X
i=1
=
p
X
i=1
1+
ρ
n
·
F
1
n
−1 ) 2
n−p−1 λi (Σ
λ2i (Σ)
λi (Σ) +
ρ
n
·
2
n
n−p−1
!1/2
!1/2
(82)
.
n
. For any i ∈ J, the ith summand in
Define the index set J = i ∈ {1, . . . , p} : λi (Σ) ≥ nρ n−p−1
the previous line is at least 1/4. Also, assumption A6 that p/n is bounded strictly between 0 and 1,
as well as the decay condition on the λi (Σ), imply that |J| ≍ nγ/η , which completes the proof.
D.2.5 Putting the variance pieces together
Combining Lemmas 7, 8, and 9 with the Gaussian concentration inequality (Lemma 15 in Section E.2 of Appendix A) p
immediately gives the following result. (We choose t to be proportional to
the relevant bound on E[ tr(M (X))] in the Gaussian concentration inequality.)
Lemma 10. Assume the conditions of Lemma 2 and let tr(M (X)) be as in line (49). Then, there are
absolute constants κ1 , κ2 , . . . , κ6 > 0 such that the following upper-tail bounds hold for all large
n,
i
h
(83)
P tr(M (X)) ≥ κ1 n2(γ−η)+1 ≤ exp(−κ2 n2(1−η)+γ ), if η ∈ (0, 21 ),
and
i
h
γ(1−η)
P tr(M (X)) ≥ κ3 nγ/η ≤ exp(−κ4 n1+ η ),
and the following lower-tail bound holds for all large n,
i
h
γ(1−η)
P tr(M (X)) ≤ κ5 nγ/η ≤ exp(−κ6 n1+ η ),
if η > 12 ,
(84)
if η > 0.
(85)
Remarks. Note that in order for the last two probabilities to be small for large values of η > 0,
it is necessary that γ < 1, as assumed in Lemma 2. The next result completes the assembly of the
results in this Subsection D.2. Although the first two bounds in Lemma 11 are not necessary for the
statement of Theorem 4, they show that the variance vρ (X; Xi ) tends 0 as n → ∞ when γ < η,
as assumed in Theorem 4. In other words, we imposed the assumption γ < η so that confidence
intervals based on Φρ (Fb̺ ; Xi ) have width that tends to 0 asymptotically.
16
Lemma 11. Assume the conditions of Theorem 4 and let tr(M (X)) be as in line (49). Assume
γ < min{η, 1}. Then, there are absolute constants k1 , k2 , . . . , k6 > 0 such that the following
upper-tail bounds hold for all large n,
i
h
γ
P max vρ (X; Xi ) ≤ k1 n2(γ−η) ≥ 1 − 4n exp(−k2 n η ), if η ∈ (0, 21 )
(86)
1≤i≤n
and
i
h
γ
γ
P max vρ (X; Xi ) ≤ k3 n η −1 ≥ 1 − 4n exp(−k4 n η ),
1≤i≤n
and
h
P max
1
1≤i≤n vρ (X;Xi )
i
γ
γ
≤ k5 n1− η ≥ 1 − 4n exp(−k6 n η ),
if η > 12 ,
(87)
if η > 0.
(88)
Proof. We only prove the last inequality (88), since the other two inequalities are proven in a similar
way. By Lemma 6, we have
L
vρ (X; Xi ) =
1
Π (z)⊤ M (X)Πp (z)
kzk22 p
(89)
where z ∼ N (0, Ip×p ) and z ⊥
⊥ M (X). To apply the lower-tail
bound for Gaussian quadratic
p
forms, note that Hölder’s inequality implies kM (X)kF ≤
tr(M (X)) since kM (X)kop ≤ 1
almost surely. Therefore, letting t = t′ tr(M (X)) with t′ ∈ (0, 1) in inequality (41) gives
i
h
√
′
(90)
P Πp (z)⊤ M (X)Πp (z) ≥ (1 − 2 t′ ) tr(M (X))
M (X) ≥ 1 − exp − t tr(M (X))
Next, observe that inequality (41) with t = t′ · n for t′ ∈ (0, 1) gives,
h
i
√
P kzk22 ≤ (1 + 4 t′ )n ≥ 1 − exp(−t′ n).
If we define the event
(91)
)
(92)
then the previous two inequalities imply
P E1
M (X) ≥ 1 − exp(−t′ tr(M (X))) − exp(−t′ · n)
(93)
E1 :=
(
1
kzk22
1
≤
Πp (z)⊤ M (X)Πp (z)
√
n
1+4√t′
(1−2 t′ ) tr(M(X))
≥ 1 − 2 exp(−t′ tr(M (X))),
since tr(M (X)) ≤ n almost surely. Next, let κ5 , κ6 > 0 be as in the previous lemma, and define
the event
o
n
γ
n
(94)
E2 := tr(M(X))
≤ κ15 n1− η ,
which has probability P(E2 ) ≥ 1 − exp(−κ6 n1+
γ(1−η)
η
).
We now put these items together. Starting with line (89), if we work on the intersection of E1 and
E2 , then for any fixed i = 1, . . . , n we have
P
h
1
vρ (X;Xi )
≤
√
1− γ
1+4√t′ 1
n η
(1−2 t′ ) κ5
i
h
i
≥ E 1E1 · 1E2
h
i
≥ 1 − E 1E1c + 1E2c
c
= 1 − E E 1E1c
M (X) − P(E2 )
h
i
≥ 1 − 2E exp(−t′ tr(M (X)) − P(E2c)
h
′
i
= 1 − 2E exp(−t tr(M (X))) · (1E2 + 1 ) −
E2c
γ
≥ 1 − exp(−t′ κ5 n η ) − 3P(E2c )
γ
1+
≥ 1 − exp(−t′ κ5 n η ) − 3 exp(−κ6 n
γ
≥ 1 − 4 exp(− min{t′ κ5 , κ6 } · n η )
17
γ(1−η)
η
)
(95)
P(E2c )
where we have used the previous lemma to bound P(E2c ), and also the assumption γ ∈ (0, 1) to
conclude that γη ≤ 1 + γ(1−η)
. Taking a union bound over i = 1, . . . , n, proves the claim.
η
The last component of Lemma 2 is to prove the MSPE inequalities.
D.3
Proof of the MSPE inequalities
The proof of Theorem (3) shows that for any realization of X we have
h
i
mspe(βb̺ |X) := n1 E kX(βb̺ − β)k22
X . n−θ kβk22 +
1
n
p∧n
X
i=1
2
li
li +̺ ,
(96)
where li = λi ( n1 X ⊤ X). Now observe that the second term on the right side matches the expression
for tr(M (X)) given in line (63) by replacing ρ with ̺ and multiplying by a factor of n1 . Therefore,
using Lemma 10 and recalling ̺/n = n−θ shows that there are absolute constants κ1 , κ2 , κ3 , κ4 > 0
such that for all large n,
and
h
i
P mspe(βb̺ |X) ≥ κ1 n−θ + n2(θ−η) ≤ exp(−κ2 n2(1−η)+θ ), if η ∈ (0, 12 ).
h
θ(1−η)
i
θ
P mspe(βb̺ |X) ≥ κ3 n−θ + n η −1 ≤ exp(−κ4 n1+ η ),
if η > 21 .
(97)
(98)
In line (97), the bound mspe(βb̺ |X) is optimized when n−θ ≍ n2(θ−η) , which explains the choice
θ
in line (98), the bound is optimized when n−θ ≍ n η −1 , which explains the
θ = 2η
3 . Similarly,
η
choice θ = η+1 . Substituting in these values θ yields the stated result.
E Background results
E.1
Results on matrices and convexity
Lemma 12. Let M1 ∈ Rk1 ×k1 and M2 ∈ Rk1 ×k2 . Then,
kM1 M2 kF ≤ kM1 kop kM2 kF .
(99)
Proof. Observe that
kM1 M2 k2F = tr(M2⊤ M1⊤ M1 M2 )
= tr((M1⊤ M1 )(M2 M2⊤ ))
≤
k1
X
i=1
λi (M1⊤ M1 ) · λi (M2 M2⊤ )
≤ kM1 k2op
k1
X
(100)
λi (M2 M2⊤ )
i=1
2
kM1 kop kM2 k2F ,
=
where we have used von Neumann’s trace inequality (also known as Fan’s inequality) [23, p.10] in
the third line.
A result on convex trace functionals. In the following lemma, an interval of the real line refers to
any set of the form (a, b),(a, b],[a, b), or [a, b], where −∞ ≤ a ≤ b ≤ ∞. We also define spec(M )
p×p
to be the set of eigenvalues of a square matrix M . The collection of symmetric
is
Pmatrices in R
p×p
denoted by S
. For a univariate function ϕ, the symbol tr(ϕ(M )) denotes i ϕ(λi (M )).
Lemma 13. Let I ⊂ R be an interval, and let M ⊂ Sp×p be a convex set such that spec(M ) ⊂ I
for all M ∈ M. Let ϕ : I → R be a convex function. Then, the functional
M 7→ tr(ϕ(M ))
(101)
is convex on M.
A proof may be found in the paper [24, Proposition 2].
18
Operator Jensen inequality. A function f : Sp×p → Sp×p is said to be operator convex if for all
λ ∈ [0, 1], and all A, B ∈ Sp×p ,
f (λA + (1 − λ)B) λf (A) + (1 − λ)f (B),
(102)
where A B means that B − A is positive semidefinite.
Lemma 14 (Operator Jensen inequality). Suppose f : Sp×p → Sp×p is operator convex, and let A
be a random Sp×p -valued matrix that is integrable. Then,
f (E[A]) E[f (A)].
(103)
Proof. It is enough to show that for all x ∈ Rp ,
x⊤ f (E[A])x ≤ x⊤ E[f (A)]x.
(104)
For any fixed x, consider the function g : Sp×p → R defined by g(A) = x⊤ f (A)x. It is clear that
g is a convex function in the usual sense, and so the ordinary version of Jensen’s inequality implies
g(E[A]) ≤ E[g(A)], which is the same as (104).
E.2
Results on Gaussian vectors and matrices
The following lemma is standard and is often referred to as the Gaussian concentration inequality [25].
Lemma 15. Let Z ∈ Rp be a standard Gaussian vector and let f : Rp → R be an L-Lipschitz
function with respect to the ℓ2 norm. Then for all t > 0,
−t2
(105)
P |f (Z) − E[f (Z)]| ≥ t ≤ 2 exp 2L
2 .
Next, we give a formula for the expected square of a Wishart matrix.
b=
Lemma 16. Let X ∈ Rn×p have rows drawn i.i.d. from N (0, Σ), and let Σ
b =
Proof. Write Σ
then
1
n
Pn
i=1
b 2 ] = (1 + 1 )Σ2 +
E[Σ
n
1
⊤
n X X.
Then,
tr(Σ)
n Σ.
Xi Xi⊤ where Xi⊤ ∈ Rp is the ith row of X. If we put Mi = Xi Xi⊤ ,
b 2 = 12 Pn M 2 + 12 P Mi Mj .
Σ
i
i6=j
i=1
n
n
Clearly, the Mi are independent with E[Mi ] = Σ for all i, and so
b 2 ] = 1 E[M 2 ] + 22 n Σ2 .
E[Σ
1
n
n 2
It remains to compute E[M12 ]. Write Xi = Σ1/2 Zi where Zi is a standard Gaussian vector in Rp ,
and let Σ1/2 = U Λ1/2 U ⊤ be a spectral decomposition of Σ1/2 where U ∈ Rp×p is orthogonal,
and Λ is diagonal with Λii = λi (Σ). By the orthogonal invariance of the normal distribution,
L
Xi = U Λ1/2 Zi , and so
h
i
E[M12 ] = E[X1 X1⊤ X1 X1⊤ ] = U Λ1/2 E Z1 Z1⊤ ΛZ1 Z1⊤ Λ1/2 U ⊤ .
(106)
Define the matrix M̃1 := Z1 Z1⊤ ΛZ1 Z1⊤ . It is straightforward to verify that E[M̃1 ] is diagonal, and
its jth diagonal entry is
E[M̃1 ]jj = tr(Σ) + 2λj .
Therefore,
E[M̃1 ] = tr(Σ)Ip×p + 2Λ,
and combining this with line (106) gives
E[M12 ] = tr(Σ)Σ + 2Σ2 .
19
Signed s.v.d. The following lemma describes the factors of an s.v.d. of a standard Gaussian matrix
Z ∈ Rn×p with n ≥ p. To make the statement of the lemma more concise, we define the term signed
s.v.d. below. This is merely a particular form of the s.v.d. that ensures uniqueness. Specifically, if
Z ∈ Rn×p is a full rank matrix with n ≥ p, then the signed s.v.d. of Z is given by
Z = HLG⊤ ,
(107)
where H ∈ Rn×p has orthonormal columns, the matrix L ∈ Rp×p is diagonal with L11 ≥ L22 ≥
· · · ≥ Lpp > 0, and G ∈ Rp×p is orthogonal with its first row non-negative, i.e. G1i ≥ 0 for all
i = 1, . . . , p. It is a basic fact from linear algebra that the signed s.v.d. of any full rank matrix in
Rn×p exists and is unique [21, Lemma 7.3.1]. This fact applies to Gaussian matrices, since they are
full rank with probability 1.
Lemma 17. Suppose n ≥ p, and let Z ∈ Rn×p be a random matrix with entries drawn i.i.d. from
N (0, 1). Let
Z = HLG⊤ ,
(108)
be the unique signed s.v.d. of Z as defined above. Then, the matrices H, L and G are independent.
Furthermore, if Hi⊤ ∈ Rp denotes the ith row of H, then for each i = 1, . . . , n, the marginal law of
Hi⊤ is given by
L
Hi⊤ =
1
kzk2
· Πp (z),
(109)
where z ∈ Rn is a standard Gaussian vector, and Πp (z) is the projection operator onto the first p
coordinates, i.e. Πp (z) = (z1 , . . . , zp ).
Proof. We first argue that H, L, and G are independent, and then derive the representation for Hi⊤
in the latter portion of the proof.
Due to the fact that the transformation Z 7→ (H, L, G) is invertible, it is possible to obtain the joint
density of (H, L, G) from the density of Z by computing the matrix Jacobian of the factorization
Z = HLG. (See the references [22], [26], and [27] for more background on Jacobians of matrix
factorizations.) To speak in more detail about the joint density, let Vn×p denote the Stiefel manifold
of n×p matrices with orthonormal columns. Also, let Dp×p denote the set of p×p diagonal matrices,
and Op×p the set of orthogonal p × p matrices. The subset of Op×p with non-negative entries in the
n×p
.
first row will be denoted by O+
Let fH,L,G : Vn×p × Dp×p × Op×p
→ [0, ∞) denote the joint density of (H, L, G), where the base
+
measure is the product of Haar measure on Vn×p , Lebesgue measure on Dp×p , and Haar measure
on Op×p restricted to Op×p
+ . (See the book [28] for background on these measures). From lines
8.8-8.10 in the paper [29], it is known that such a density exists, and that fH,L,G factors according
to
fH,L,G(h, l, g) = fH (h) · fL (l) · fG (g),
(110)
where the function fH denotes the density of H with respect to Haar measure on Vn×p , the function
fL denotes the density of L with respect to Lebesgue measure on Dp×p , and the function fG denotes
the density of G with respect to the restriction of Haar measure to Op×p
+ . This proves that H, L, and
G are independent.
We now prove the representation (109). From line 8.10 in the paper [29], it is known that fH is constant on Vn×p . In other words, the matrix H follows the Haar distribution on Vn×p . Consequently,
Theorem 2.2.1(ii) in the book [28] implies that the rows Hi⊤ can be represented as
L
Hi⊤ = Πp (Ji⊤ )
(111)
where Ji⊤ ∈ Rn is the ith row of a Haar-distributed random matrix in On×n . Furthermore, the rows
Ji⊤ are uniformly distributed on the unit sphere on Rn , and hence can be represented as z/kzk2,
where z ∈ Rn is a standard Gaussian vector.
20
References
[1] C.-H. Zhang and S. S. Zhang. Confidence intervals for low dimensional parameters in high
dimensional linear models. Journal of the Royal Statistical Society: Series B, 76(1):217–242,
2014.
[2] A. Javanmard and A. Montanari. Hypothesis testing in high-dimensional regression under the
Gaussian random design model: Asymptotic theory. arXiv preprint arXiv:1301.4240, 2013.
[3] A. Javanmard and A. Montanari. Confidence intervals and hypothesis testing for highdimensional regression. arXiv preprint arXiv:1306.3171, 2013.
[4] P. Bühlmann. Statistical significance in high-dimensional linear models.
19(4):1212–1242, 2013.
Bernoulli,
[5] S. van de Geer, P. Bühlmann, and Y. Ritov. On asymptotically optimal confidence regions and
tests for high-dimensional models. arXiv preprint arXiv:1303.0518, 2013.
[6] J. D. Lee, D. L. Sun, Y. Sun, and J. E. Taylor. Exact inference after model selection via the
lasso. arXiv preprint arXiv:1311.6238, 2013.
[7] A. Chatterjee and S. N. Lahiri. Rates of convergence of the adaptive lasso estimators to the
oracle distribution and higher order refinements by the bootstrap. The Annals of Statistics,
41(3):1232–1259, 2013.
[8] H. Liu and B. Yu. Asymptotic properties of lasso+mls and lasso+ridge in sparse highdimensional linear regression. Electronic Journal of Statistics, 7:3124–3169, 2013.
[9] V. Chernozhukov, D. Chetverikov, and K. Kato. Gaussian approximations and multiplier bootstrap for maxima of sums of high-dimensional random vectors. The Annals of Statistics,
41(6):2786–2819, 2013.
[10] E. L. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer, 2005.
[11] D. A. Freedman. Bootstrapping regression models. The Annals of Statistics, 9(6):1218–1228,
1981.
[12] P. J. Bickel and D. A. Freedman. Bootstrapping regression models with many parameters. In
Festschrift for Erich L. Lehmann, pages 28–48. Wadsworth, 1983.
[13] N. R. Draper and H. Smith. Applied Regression Analysis. Wiley-Interscience, 1998.
[14] P. J. Bickel and D. A. Freedman. Some asymptotic theory for the bootstrap. The Annals of
Statistics, pages 1196–1217, 1981.
[15] S. Bobkov and M. Ledoux. One-dimensional empirical measures, order statistics, and Kantorovich transport distances. preprint, 2014.
[16] A. B. Tsybakov. Introduction to Nonparametric Estimation. Springer, 2009.
[17] L. Wasserman. All of Nonparametric Statistics. Springer, 2006.
[18] B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection.
Annals of Statistics, 28(5):1302–1338, 2000.
[19] R. A. Horn and C. R. Johnson. Topics in matrix analysis. Cambridge University Press, 1991.
[20] R. Bhatia. Matrix Analysis. Springer, 1997.
[21] R. A. Horn and C. A. Johnson. Matrix Analysis. Cambridge University Press, 22nd printing
edition, 2009.
[22] R. J. Muirhead. Aspects of Multivariate Statistical Theory. John Wiley & Sons, 1982.
[23] J. M. Borwein and A. S. Lewis. Convex Analysis and Nonlinear Optimization Theory and
Examples. CMS Bookks in Mathematics. Canadian Mathematical Society, 2000.
21
[24] D. Petz. A survey of certain trace inequalities. Functional analysis and operator theory,
30:287–298, 1994.
[25] S. Boucheron, G. Lugosi, and P. Massart. Concentration Inequalities: A Nonasymptotic Theory
of Independence. Oxford University Press, 2013.
[26] A. M. Mathai. Jacobians of Matrix Transformations and Functions of Matrix Argument. World
Scientific, 1997.
[27] A. Edelman and N. R. Rao. Random matrix theory. Acta Numerica, 14:233–297, 2005.
[28] Y. Chikuse. Statistics on Special Manifolds, volume 174. Springer Science & Business Media,
2003.
[29] A. T. James. Normal multivariate analysis and the orthogonal group. The Annals of Mathematical Statistics, pages 40–75, 1954.
22
| 10 |
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
arXiv:1607.01530v1 [math.NT] 6 Jul 2016
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
1. Introduction
This is the first of three papers giving detailed proofs of the results announced in
[BGS16]. The main result here is strong approximation for Markoff triples for prime
moduli. In paper two this is extended to more general moduli and applied to seiving in
Markoff numbers. In the third paper, we formulate a strong approximation conjecture
for more general affine Markoff surfaces and develop the techniques to obtain similar
results in these cases.
We review briefly the notation and setup from [BGS16] where background and
references can be found. The Markoff surface X is the affine surface in A3 given by
(1)
X : x21 + x22 + x23 − 3x1 x2 x3 = 0.
The Markoff triples M are the positive integer solutions to (1). Let Γ be a group
of affine integral morphisms of A3 generated by the permutations of the coordiantes
and the Vieta involutions R1 , R2 , , R3 , where
R3 (x1 , x2 , x3 ) = (x1 , x2 , 3x1 x2 − x3 )
and R2 , R3 are defined similarly. The orbit of (1, 1, 1) under Γ yields all of M [Mar79],
[Mar80]. If ∆ is the group of integral morphisms generated by Γ and the involutions
which replace two of the coordinates of x by their negatives, then X(Z) consists of
two ∆ orbits, namely of (0, 0, 0) and (1, 1, 1).
For p a prime number the action of Γ and ∆ on X descends to a permutation action
on the finite set X(Z/pZ) of solutions to (1) in Z/pZ. Our interest is in the orbits of
this action which we often refer to as the components.
Conjecture 1 (Strong Approximation Conjecture). For any prime p, X(Z/pZ) consists of two Γ orbits, namely {(0, 0, 0)} and X ∗ (Z/pZ) = X(Z/pZ)\{(0, 0, 0)}
Clearly the above conjecture implies strong approximation for M and X(Z) in the
form that their reductions mod p
M → X ∗ (p)
1
2
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
and
X(Z) → X(Z/pZ)
are onto.
In particular, one of the consequences is that the only prime congruence obstruction
for a Markoff number m (that is a number which is a coordinate of an x ∈ M) is the
one noted in [Fro13]: m 6= 23 , 0 mod p if p = 3 mod 4, p 6= 3.
Our first result asserts that there is a very large orbit.
Theorem 1. Fix ε > 0. Then for p large there is a Γ orbit C(p) in X ∗ (p) for which
|X ∗ (p)\C(p)| ≤ pε
(note that |X ∗ (p)| ∼ p2 ), and any Γ orbit D(p) satisfies
1
|D(p)| ≫ (log p) 3 .
The proof of Theorem (1) establishes the strong approximation conjecture unless
p − 1 is a very smooth number. In particular, the set of primes for which the strong
approximation conjecture fails is very small.
2
Theorem 2. Let E be the set of primes for which the strong approximation conjecture
fails. For ε > 0, the number of primes p ≤ T with p ∈ E is at most T ε , for T large.
We end the introduction by outlining the rest of the paper. In Section 2 we define
the fundamental rotations in Γ that are associated to an x ∈ X ∗ (p) and one of
its coordinates. These act on the conic sections gotten by intersecting X ∗ (p) with
the plane corresponding to the particular coordinate. Some basic properties of the
incidence graph of the intersections of the conic sections are established.
In Section 3, which we call the endgame, we define the cage C(p) which is shown
to be a large component of X ∗ (p). Specifically any x ∈ X ∗ (p) for which the rotation
associated to one of its coordinates (see Section 2 for definitions) has order at least
1
p 2 +δ0 (δ0 > 0) is shown to be in C(p).
In Section 4 , the middle game, the last statement is extended to x’s for which the
corresponding rotation has order pε0 (ε0 > 0 any fixed small number).
The methods used in Sections 3 and 4 rely on nontrivial upper bounds for the
number of points lying on curves over finite fields. In Section 3 Weil’s Riemann
Hypothesis [Wei41] is a key tool, but this is not strong enough when the order is less
1
than p 2 +δ0 . In its stead we use Stepanov’s auxiliary polynomial method [Ste69] in the
Appendix, or the recent gcd(u − 1, v − 1) bounds of Corvaja-Zannier [CS13], or the
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
3
combinatorial method based on the projective Szemeredi-Trotter Theorem [Bou12]
developed in section 4.
Section 5, the opening, deals with x’s for which the orders of the associated rotations
are very small (for example, being uniformly bounded). This is done by lifting the
equations to characteristic zero which leads to an equation in (Q̄)3 in roots of unity.
In general (that is, in the setting of Paper III) we invoke Lang’s Gm conjecture at this
point (proven in [Lau83] for example), however for the special case at hand one can
show directly that X∗ (Q̄) has no finite Γ orbits (the last is a necessary condition for
strong approximation, in the form of Conjecture 1, to hold). This Q̄ analysis leads to
to part 2 of Theorem 1.
In Section 6 we assemble the various stages of our argument, explicated in Sections
3, 4, 5 and give a proof of Theorem 1 in a form from which strong approximation
follows if p2 − 1 is not very smooth: see (70). To prove Theorem 2 we combine the
above with a variant of the results in [CKSZ14] concerning the multiplicative orders
of coordinates of points of curves on A2 over Fp .
2. Preliminaries
2.1. Analysis of the conic sections. Theorem 1 in the weaker form that |C(p)| ∼
|X ∗ (p)| as p → ∞, can be viewed as the finite field analogue of [Gol03], where it is
shown that the action of Γ on the compact real components of the character variety
of the mapping class group of the once punctured torus is ergodic. As in [Gol03], our
proof makes use of the rotations τij ◦ Ri , i 6= j where τij permutes xi and xj . For
example,
τ2,3 ◦ R2 (x1 , x2 , x3 ) = (x1 , x3 , 3x1 x3 − x2 ),
so the action on (x2 , x3 ) for fixed x1 is given by the rotation rot(3x1 )
!
!
!
!
x2
x3
0
1
x2
(2)
rot(3x1 )
=
=
.
x3
3x1 x3 − x2
−1 3x1
x3
This rotation preserves the conic section obtained by intersecting X ∗ (p) with the
plane defined by the first coordinate being equal to the value of x1 ; in general, we
define the conic section Cj (a) as follows:
(3)
Cj (a) = {xj = a} ∩ X ∗ (p).
We give an explicit description of this action, depending
2on whether x = 3x1
is parabolic (x2 − 4 = 0, that is x = ±2), hyperbolic ( x p−4 = 1) or elliptic
2
( x p−4 = −1) with ·· being the Legendre symbol.
4
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
= −1, that is if p ≡ −1 mod 4, then C1 (x) is
Lemma 3. Let x = ±2. If −1
p
empty. If −1
= 1, that is if p ≡ 1 mod 4, then
p
(4)
C1 (2) = (2, t, t ± 2i),
where i2 ≡ −1 mod p;
(5)
C1 (−2) = (−2, t, −t ± 2i),
which are pairs of disjoint lines. The action of ρ1 = rot(x) is
(6)
ρ1 (2, t, t ± 2i) = (2, t ± 2i, t ± 4i),
(7)
ρ1 (−2, t, −t ± 2i) = (−2, −t ± 2i, −t ∓ 4i),
so rot(2) preserves each line and rot(−2)interchanges them.
Now when x 6= ±2 we write
x = χ + χ−1 ,
2
2
where χ ∈ Fp if x p−4 = 1 and χ ∈ Fp2 if x p−4 = −1.
Note that
!
!
!
!
!
!−1
1
−1
1
−1
1
1
χ 0
χ
0
1
1
1 1
χ
−χ
=
rot(x) ==
χ
χ χ1
0 χ1
0 χ1
χ χ1
χ χ1
−χ 1
and consequently
!
1
1
χℓ
rot(x)ℓ =
χ χ1
0
and
hrot(x)i =
0
1
χℓ
1
χ
!
1 1
χ χ1
−1
−χ
!−1
(
=
χ1
χ
−
χ1 −
Consequently C1 (x) contains all elements
1 1
χ χ1
χ
χ1
1
χ1
!
χℓ
0
1
− χ1
χ1
1
− χχ1
χ1
0
1
χℓ
!
!
!
−1
−1 1
−χ
χ
−χ 1
1
χ
)
; χ1 ∈ hχi .
1 −1
x2
1
1 −1
x3 1
χ−
x3 −
χ1 + (χx2 − x3 )
, χ−
(χx3 − x2 )χ1 + x2 −
χ
χ
χ1
χ
χ χ1
with χ1 ∈ hχi.
Note that
where
o
n
b
Projx2 (Cx ) ⊃ aχ1 + ; χ1 ∈ hχi
χ1
x2
1 −1
1 −1
x3 −
and b = χ −
a= χ−
(χx2 − x3 )
χ
χ
χ
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
satisfy
σ = ab =
5
1
x 2 χ + χ 2
=
6 1.
=
χ − χ1
χ − χ1
Denoting by ρ a primitive root of Fp , a hyperbolic element x can be written in the
form
x = ρj + ρ−j .
(8)
For a hyperbolic element we let ord(x) = p−1
.
j
An elliptic element x can be written in the form
x = ξ j + ξ −j ,
(9)
where ξ is an element in Fp2 , ξ = (ρ̃)p+1 , where ρ̃ is a generator or the multiplicative
group of Fp2 . For an elliptic element we let ord(x) = p+1
.
j
Lemma 4. Let x be hyperbolic; write
x = w + w −1,
(10)
where w = ρj ∈ Fp . Then C1 (x) is a hyperbola with p − 1 points. Set
(11)
κ(x) =
Let
(12)
x2
.
x2 − 4
κ(x)
H(x) = { t,
t
| t ∈ Fp ∗ }.
Then we have the following map from H(x) to C1 (x):
κ(x)
κ(x)
κ(x)
→ x, t +
.
, tw +
(13)
t,
t
t
tw
In these coordinates
(14)
κ(x)
κ(x)
= tw,
.
ρ1 t,
t
tw
Lemma 5. Let x be elliptic; write
(15)
x = v + vp,
where v ∈ Fp2 − Fp , v p+1 = 1. Then C1 (x) is an ellipse with p + 1 points. Set
(16)
Let
(17)
κ(x) =
x2
.
x2 − 4
E(x) = {(t, tp ) | t ∈ Fp2 , tp+1 = κ(x)}.
6
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
Then we have the following map from E(x) to C1 (x):
κ(x)
κ(x)
p
.
, tv +
(18)
(t, t ) → x, t +
t
tv
In these coordinates
(19)
ρ1
κ(x)
t,
t
κ(x)
= tv,
.
tv
2.2. Incidence graph for the conic sections. We treat the case of p ≡ 3(mod4)
(the case of p ≡ 1(mod4) is simpler because of the special point in Lemma 3). Let
X ∗ (p) be the Markoff triples mod p; ξ any coordinate of a triple, ξ 6= 0, ± 23 .
For j 6= k and ξ, η
(20)
|Cj (ξ) ∩ Ck (η)| = 0, 1, 2.
To determine which it is, the intersection consists of all z’s such that
ξ 2 + η 2 + z 2 = 3ξηz,
(21)
which has a solution if
is a square in Fp .
In terms of Legendre’s symbol
(22)
9ξ 2 η 2 − 4(ξ 2 + η 2 )
|Cj (ξ) ∩ Ck (η)| = 1 +
9ξ 2 η 2 − 4(ξ 2 + η 2 )
p
.
So each Cj (ξ) meets p−1
Ck (η)’s. Define the incidence graph I(p) of X ∗ (p) to have
2
vertices Cj (ξ)’s with the number of edges between Cj (ξ) and Ck (η) being |Cj (ξ) ∩
Ck (η)|.
Proposition 6. For p large (p > 10) the incidence graph I(p) is connected and in
fact diam(I(p)) = 2.
Proof. Fix ξ1 , ξ2 and i, j, say i, j ∈ {1, 2}. We seek y ∈ Fp such that C3 (y)∩Ci (ξ1 ) 6= φ
and C3 (y) ∩ Cj (ξ2 ) 6= φ. This leads to solving the pair of equations:
(23)
(
(9ξ12 − 4)y 2 − λ2 = 4ξ12
(9ξ22 − 4)y 2 − µ2 = 4ξ22
for y, λ, µ ∈ Fp . In ξ12 = ξ22 then (23) reduces to the first equation (take λ = µ) and
since 9ξ12 − 4 6= 0 and ξ12 6= 0, it defines a conic section. Thus for p large it has a
solution and provides us with our y. If ξ12 6= ξ22 then (23) defines an irreducible curve
in A3 . Thus again for p large it has solutions over Fp providing us with our desired
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
7
y. It follows that the distance in I(p) between any two points is at most 2. On the
other hand, Ci (ξ) and Ci (η) are not joined if ξ 6= η nor is Ci (ξ) joined to half of the
Cj (η)’s for j 6= i. Hence diam(I(p)) = 2.
3. Endgame
3.1. Use of Weil’s bound. We begin with the following
Proposition 7. If x = (x1 , x2 , x3 ) is in X ∗ (p) and for some j ∈ {1, 2, 3} the order of
1
the induced rotation rot(xj ) is at least p 2 +δ (δ > 0 fixed) then x is joined to a point
y in X ∗ (p) one of whose induced rotations is of maximal order.
Proof. Consider first the case that x1 (say j = 1) is hyperbolic. In light of the
discussion in section 2, x = (x1 , x2 , x3 ) is connected to the points in X ∗ (p) of the
form
(24)
(x1 , α1 t + α2 t−1 , α3 t + α4 t−1 )
with t ∈ H, a cyclic subgroup of Fp ∗ . Here |H| | (p − 1); we set eH = p−1
. Our aim
|H|
∗
is to produce t’s in H for which there is a primitive root y ∈ Fp satisfying
(25)
α1 t + α2 t−1 = y + y −1.
Let P (H)(= Pα1 ,α2 (H)) denote the number of such solutions.
A subgroup K of Fp ∗ is determined by its order |K| which divides p−1; let dK =
Let fH (K) = fH (dK ) be the number of solutions to
(26)
p−1
.
|K|
α1 t + α2 t−1 = y + y −1 , t ∈ H , y ∈ K
(note that the traces of the matrices that we produce, namely the common values of
the left- and right-hand side of (26), are hit with multiplicity 2 in both t and y in our
counting). Clearly
(27)
fH (K) ≤ 2 min(|K|, |H|).
1
We can estimate fH (K), at least if |H| ≥ p 2 +δ , using Weil’s Riemann Hypothesis for
curves over finite fields. The map
ξ → ξ dK , η → η eH
sends solutions of
(28)
Cα1 ,α2 : α1 η eH + α2 η −eH = ξ dK + ξ −dK
8
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
to solutions of (26) and it is eH dK to 1. Hence if N(Cα1 ,α2 ) is the number of solutions
to (28) then
(29)
fH (K) =
N(Cα1 ,α2 )
.
eH dK
As we prove below (see Lemma 8) the curve Cα1 ,α2 i is absolutely irreducible. Since
its genus is O(eH dK ), applying Weil bound yields
√
(30)
N(Cα1 ,α2 ) = p + O( peH dK ).
Hence
(31)
fH (K) =
p
√
+ O( p).
eH dK
By inclusion/exclusion
(32)
X
P (H) =
µ(d)fH (Kd ),
d|(p−1)
where µ is the Mobius function. Hence
(33)
X µ(d)
X
1
1
√
ϕ(p − 1)
|H|
+ O( p) = |H|
+Oε (p 2 +ε ) = |H|
+Oε (p 2 +ε ).
P (H) =
µ(d)
d
d
p−1
d|(p−1)
d|(p−1)
Here ϕ is the Euler function and it satisfies ϕ(n) ≫ε n1−ε and hence from (33)
1
we deduce that P (H) > 1 under the assumption that |H| ≥ p 2 +δ . This proves
Proposition 7 in the hyperbolic case.
Now consider the case of x elliptic. Let D be a non-square element in Fp . Then
√
Fp2 = Fp [ D] and we can parametrize the subgroup H1 as follows
√
(34)
{(ξ + Dη)d1 ; ξ, η ∈ Fp ; ξ 2 − Dη 2 = 1},
where d1 =
p+1
.
|H1 |
The conic section C1 (x) is an ellipse which can be parametrized as
α2 − Dβ 2 = κ(x),
(35)
where κ(x) =
root in Fp ∗ .
Now
(36)
x2
.
x2 −4
We seek α which can be written as α = u + u−1 with u a primitive
(ξ +
√
√
D)n = gn (ξ) + hn (ξ) D,
where gn , hn are integral polynomials
(37)
gn (ξ) =
⌊n/2⌋
X
i=0
n
D i ξ n−2i ,
2i
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
(38)
hn (ξ) =
⌊n/2⌋
X
i=0
9
n
D i ξ n−2i+1 .
2i + 1
Let
(39)
gn (ξ, η) =
⌊n/2⌋
X
i=0
(40)
hn (ξ, η) =
n
D i ξ n−2i η 2i ,
2i
n
D i ξ n−2i+1 η 2i−1 .
2i + 1
⌊n/2⌋
X
i=0
Then we have
(41)
(ξ +
√
√
Dη)n = gn (ξ, η) + hn (ξ, η) D.
Now we seek to bound f (H1 , K) with K subgroup of Fp ∗ with d2 =
p−1
.
|K|
As in the
hyperbolic case this is given by M d(d11d,d2 2 ) where M(d1 , d2) now counts the number of
points on the following curve in Fp 3 :
(
(42)
ξ 2 − Dη 2 = 1
gd1 (ξ, η) = µd2 + µ−d2
This is a curve of genus O(d1 d2 ) and we can apply Weil bound and inclusionexclusion as in the hyperbolic case to produce the primitive u. This completes the
proof of Proposition 7.
Lemma 8. Suppose α1 α2 6= 1 mod p . Then the curve
α1 y e + α2 y −e = xd + x−d
is absolutely irreducible.
Proof. Consider
P (x, y) = α1 xd y 2e + α2 xd − x2d − y e ∈ Fp [X, Y ].
For d = 1 P is clearly irreducible. Let d > 1 and assume that P is not irreducible
P
and f (x, y) =
ajk xj y k ∈ Fp [X, Y ] an irreducible factor. Assume d ≥ e and u a d-th
root of unity. Since for 0 ≤ s ≤ d, P (x, y) = P (us x, y), also
X
fs (x, y) = f (us x, y) =
ajk usj xj y k
10
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
is an irreducible component of P . Thus either fs and fs′ are coprime or fs ∼ fs′ .
Since a0k 6= 0 for some k (otherwise x would be a factor of f (x, y)), it follows that
fs = fs′ if fs ∼ fs′ .
Case 1 The fs are not pairwise coprime.
The f (x, y) = fs (x, y) for some 0 < s < d, implying that usj = 1, i.e. sj ≡ 0(
mod d) if ajk 6= 0. It follows that d has a divisor d1 > 1 such that d1 |j if ajk 6= 0
and hence f (x, y) has form f (x, y) = g(xd1 , y). The polynomial g(x, y) is therefore a
factor of Q(x, y) = α1 xd2 y 2e + α2 xd2 − x2d2 y e − y e with d2 = dd1 and we lowered d.
Case 2 The fs (0 ≤ s ≤ d) are mutualy coprime. Define
P1 (x, y) =
d−1
Y
fs (x, y),
s=0
which divides P . Degree considerations show that
2d ≥ d degx f, 2e ≥ d degy f, 2d + e ≥ d deg f.
Case 2.1 degx f > 1, degy f > 1.
It follows that degx f = 2, degy f = 2, e = d, deg f = 3, and P (x, y) = P1 (x, y).
With u as above, ϕ(x, y) = f (x, uy) is an irreducible factor of P (x, y). Therefore for
some 0 ≤ s ≤ d
X
X
ajk uk xj y k ∼ fs (x, y) =
ajk usj xj y k .
ϕ(x, y) =
j,k≤2
Consequently, there is some 0 ≤ l ≤ d such that k − sj ≡ l( mod d) if ajk 6= 0. Since
Y
fs (x, y),
α1 xd y 2d + α2 xd − x2d y d − y d =
0≤s≤d
clearly a0,1 =
6 0, a1,0 6= 0, and therefore 1 ≡ l ≡ −s( mod d), i.e. k + j = 1( mod d)
if ajk 6= 0. Since deg f = 3, 2 ≡ 0( mod d), hence d = 2 and a1,1 = a2,0 = a0,2 = 0.
Thus
α1 x2 y 4 + ga1 x2 − x4 y 2 − y 2 ∼ (a21 x2 y + a12 xy 2 + a10 x + a01 y)(a21 x2 y − a12 xy 2 − a10 x + a01 y)
∼ y 2(a21 x2 + a01 )2 − x2 (a12 y 2 + a10 )2 .
Setting a0,1 = 1 gives −y 2 (a21 x2 +1)2 +x2 (a12 y 2 +a10 )2 and a221 = 1, a21 −a12 a10 = 0,
a212 = α1 , a210 = α2 . But this contradicts the assumption α1 α2 6= 1.
Case 2.2 degx f = 1 or degy f = 1.
Assume degy f = 1, say. Then there are coprime a(x), b(x) ∈ Fp [X] such that
P (x, a(x)
) = 0, that is
b(x)
α1 xd a(x)2e + α2 xd b(x)2e − x2d a(x)e b(x)e − a(x)e b(x)e = 0.
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
11
Since a(x), b(x) are coprime, it follows that a(x)e |xd , b(x)e |xd , hence a(x) or b(x) is
constant. If, say, b(x) is constant, previous equation implies xd |a(x)e , hence a(x)e =
γxd and
α1 γ 2 x2d + α2 b2e − γb2 x2d − γb2 = 0.
It follows that α1 γ = b2 , α2 b2 = γ, hence α1 α2 = 1, contradicting the assumptions
that α1 α2 6= 1.
3.2. The Cage. A point x = (x1 , x2 , x3 ) ∈ X ∗ (p) is called maximal if ord(rot(xj )) is
maximal for some j. Note that the condition that the order of rot(3xj ) be maximal
depends only on xj and not on the other coordinates of x (since it depends on the
order of λ, where λ + λ−1 = 3x1 in F∗p of F∗p2 ). We call ξ ∈ Fp maximal if it is of
maximal order.
By the cage we mean a set of maximal elements in X ∗ (p). We claim that the cage
is connected, that is to say if x̂ and ŷ are in the cage then x̂ is connected to ŷ. Let ξ
be the coordinate of maximal order of x̂ and η be the coordinate of maximal order of
ŷ, so that x̂ is connected to all points in Cj (ξ) and similarly ŷ is connected to all the
points in Ck (η).
Now according to Proposition 6, which when extended with and inclusion/exclusion
argument as in Proposition 7 gives a y of maximal order such that
P ∈ Cj (ξ) ∩ Cl (y);
Q ∈ Ck (η) ∩ Cl (y).
Since y is maximal, P and Q are connected by Γ and P is Γ- connected to x̂ and Q
to ŷ. Thus x̂ is Γ connected to ŷ.
Denote by C(p) the connected component of X ∗ (p) (under the Γ action) that contains the cage, then C(p) is our large component.
4. Middle Game
In the endgame (section 3) we connected any x ∈ X ∗ (p) of order (that is max(ord(rot(xj ))))
1
l ≥ p 2 +δ0 (δ0 > 0) to the cage in one step. In this section we allow any number of
moves to do the connecting. In particular any x of order at least pε is shown to be
in the giant component. As in section 3 the y’s which are joined to a given x whose
order is l1 via the corresponding rotation and which have orders l2 (here l1 and l2
divide p − 1 or p + 1) correspond to solutions of an equation (with σ ∈ Fp , σ 6= 1):
1
σ
= h2 + , σ 6= 1
h1 +
h1
h2
(43)
with h1 ∈ H1 , h2 ∈ H2 with H1 , H2 subgroups of Fp ∗ or Fp2 ∗ .
12
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
In (43) we have |H1 | = l1 , |H2 | = l2 .
If we have an upper bound on the number of solutions to (43) so that on summing
over all l2 ≤ l1 with l2 dividing p − 1 or p + 1, yields a quantitiy which is less than l1 ,
then there is at least one h1 for which the corresponding y will have order bigger than
l1 . We then repeat this procedure replacing x by this y and so on, until the order of
1
the element is at least p 2 +δ0 . At that point we are in the endgame and can finish.
The key therefore is a suitable upper bound to the number of solutions to (43).
Our original treatment used Stepanov’s technique of auxiliary polynomials in his
elementary proof of this Riemann Hypothesis for curves. This yields explicit and
reasonably sharp estimates which are ample for our application. We carry this out in
the Appendix partly to illustrate the flexibility of this method.
Subsequently the recent powerful technique for estimating from above the g.c.d. of
(u − 1, v − 1), of Corvaja and Zannier [CS13] yields sharper bounds. This is relevant
for the purpose of giving efffective bounds on p after which Theorem 1 takes effect.
The precise upper bound to (43) established by [CS13] is
n
|H1 |.|H2 | o
20 max (|H1|.|H2 |)1/3 ,
.
p
The third treatment, and the one which we develop in this section, while special
to (43), is robust in that the upper bound requires little further structure and it
is suitable for generalisation for more general moduli as demonstrated in Paper II.
It is based on the following projective Szemeredi-Trotter theorem (Proposition 2 in
[Bou12]).
Theorem 9. Let Φ : Fp → Mat2 (Fp ) such that det Φ does not vanish identically and
ImΦ ∩ PGL2 (Fp ) is not contained in a set of the form F∗p · gH for some g ∈ SL2 (Fp )
and H a proper subgroup of SL2 (Fp ). Then the following holds.
Given ε > 0, r > 1, there is δ > 0 such that if A ⊂ P 1 (Fp ) and L ⊂ Fp satisfy
(44)
1 ≪ |A| < p1−ε
(45)
log |A| < r log |L|.
Then
(46)
where for g =
|{(x, y, t) ∈ A × A × L; y = τΦ(t) (x)}| < |A|1−δ |L|,
!
a b
ax+b
.
, τg (x) = cx+d
c d
Using Theorem 9 we prove the following:
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
13
Proposition 10. Given δ > 0 there is τ < 1 and Cτ depending on δ such that if
pδ < |H1 | < p1−δ then the number of solutions to (43) is at most Cτ |H1 |τ .
Proof. For h ∈ H, a subgroup of F∗p or F∗p2 , denote by h̃ = h + h−1 . Similarly we
e = {h̃ | h ∈ H}.
denote by H
Suppose that (43) has T solutions. Then
σ
=u
h1
σ
= v,
h1 t +
h1 t
h1 +
(47)
f2 , has at least T 2 solutions.
where h1 , t ∈ H1 and u, v ∈ H
Elimination of h1 in (47) yields
(48)
1 2
1
uv + σ t −
=0
u2 + v 2 − t +
t
t
f2 × H
f2 .
which, by assumption, has at least T 2 solutions in (t, u, v) ∈ H1 × H
Next, let u = f˜1 , v = f˜2 with f1 and f2 ∈ H2 and define the following elements
f2 :
x, y ∈ H
1
^
,
x = (f
1 f2 ) = f1 f2 +
f1 f2
f1 f2
−1
y = (f^
+ .
1 f2 ) =
f2 f1
Thus uv = x + y, u2 + v 2 = xy + 4 and equation (48) gets transformed into
(49)
xy − t̃(x + y) + σ(t̃)2 + 4(1 − σ) = 0.
Denoting
(50)
α = t̃ and β = σ(t̃)2 + 4(1 − σ)
we obtain
(51)
y=
with
g=
αx − β
= τg (x)
x−α
α β
1 −α
!
= g(t̃)
and τg the Mobius transformation.
e2 × H
e2 × H
e1.
Equation (51) has at least T 2 solutions in (x, y, t̃) ∈ H
14
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
We apply Theorem 9 taking Φ(t)
(52)
Φ(t) =
t −σt2 − 4(1 − σ)
1
−t
!
e2, L = H
e1.
and A = H
We verify the assumption on Φ. Since σ 6= 1, det Φ(t) = (1 − σ)(4 − t2 ) does not
vanish identically. It remains to show that
n
det Φ(s)
Φ(s)−1 Φ(t)
; s, t ∈ Fp }
det Φ(t)
is not contained in a proper subgroup H of SL2 (p).
By (52)
!
!
2
2
−s
σs
+
4(1
−
σ)
t
−σt
−
4(1
−
σ)
Φ(s)−1 Φ(t) =
−1
s
1
−t
=
−st + σs2 + 4(1 − σ)
s−t
(s − t)(4(1 − σ) − σst)
−st + σt2 + 4(1 − σ))
!
Taking
s = σt +
4(1 − σ)
t
gives
σ(1 + σ)t +
(53) (1 − σ) − t
t
1
4
4(1−σ)
t
−σ 2 t2 + 4(1 − σ)2
0
!
= (1 − σ)
4
t
− t gt .
As the proper subgroups of SL(2, Fp ) have trivial second commutator [Suz82], it
suffices to show that
(54)
)(gt2 gt1 gt−1
gt−1
)(gt4 gt3 gt−1
gt−1
)
gt−1
)(gt3 gt4 gt−1
gt−1
(gt1 gt2 gt−1
4
3
1
2
3
4
2
1
is not identically one for t1 , t2 , t3 , t4 ∈ F∗p . If this were the case, the same would be
true for t1 , t2 , t3 , t4 taken in an extension field of Fp so as to make
t2 =
(55)
4(1 − σ)2 − ε
(ε = ±1)
σ2
solvable.
Taking t = ±κ satisfying (55), we get
2 −ε
(56)
g±κ =
± σκ [(1 + σ) 4(1−σ)
σ2
1
!
+ 4(1 − σ)] ε
.
0
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
15
We choose ε = ±1 as to ensure that
(1 + σ)(4(1 − σ)2 − ε) + 4σ 2 (1 − σ) 6= 0
and obtain matrices
(57)
g± =
±η ε
1 0
!
that clearly generate SL2 (p).
Consequently, Theorem 9 is applicable, yielding the bound T 2 ≪ |H2|1−τ |H1 |.
5. Opening
The analysis of the previous sections shows that we can connect x ∈ X ∗ (p) whose
order is at least pε (or smaller if the divisors of p2 − 1 are not too numerous) to the
cage. To deal with all x’s and in particular ones whose orders are uniformly bounded
(indepndent of p) we lift to characteristic zero. In this connection we observe first
that if the action of Γ on X ∗ (Q̄) has a finite orbit F then the strong approximation
conjecture cannot hold. To see this consider more generally any finite orbit F of the
Γ action on A3 (C). The coordinate of any ξ in such an F must lie in a cyclotomic
field Ln = Q(ζn ), where ζn is a primitive n-th root of 1. For if ξ = (ξ1 , ξ2, ξ3 ) then
ord(rot(ξj )) must be finite and hence
3ξj = tj + t−1
j
(58)
with tj a root of unity. If n is the least common multiple of all the orders of all the
tj ’s corresponding to the ξ’s in F then ξj ∈ Ln and hence F ⊂ A3 (Ln ). In fact the ξj ’s
(3)
are all integral except possibly for denominators powers of 3, so that F ⊂ A3 (OLn )
(3)
where OLn is the ring of S-integers in Ln , with S consisting of the primes dividing
3. If p is a rational prime (p 6= 3) which splits completely in Ln and P is a prime of
(3)
(3)
Ln with P |(p) then OLn /P ∼
= Z/pZ). The Γ action of A3 (OLn ) factors through
= Fp (∼
the reduction π mod P
(3)
A3 (OLn )
π
y
(3)
Γ
−−−→
Γ̄
(3)
A3 (OLn )
π
y
(3)
A3 (OL /P ) −−−→ A3 (OL /P )
and hence
(59)
F̄ = π(F ) ⊂ A3 (Fp ), is Γ̄ − invariant.
16
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
Since Γ preserves the level sets Xk :
x21 + x22 + x23 − 3x1 x2 x3 = k,
(60)
(3)
any such F is contained in Xk (OL ) for a suitable k. Thus for any such F , there is a
positive density of p’s which split completely in Ln , and hence for which F̄ ⊂ Xk (Fp )
is a fixed size Γ̄ -orbit (|F̄ | ≤ |F |). That is, the finite Γ-orbits in A3 (Q̄) must be part
of any description of the Γ̄-orbits on A3 (Fp ), for p large.
In our setting of this paper, k = 0 and we have (we thank E. Bombieri for this
simple proof)
Proposition 11. X ∗ (Q̄) has no finite Γ-orbit.
Proof. As in the discussion above, if F is such an orbit and ξ ∈ F then the ξj satisfy
(58) with tj an lj -th root of one. The Markoff equation for t1 , t2 , t3 becomes
(61)
−1
−1
−1
−1 2
2
−1 2
(t1 + t−1
1 ) + (t2 + t2 ) + (t3 + t3 ) − (t1 + t1 )(t2 + t2 )(t3 + t3 ) = 0.
Now (61) has no solutions with |tj | = 1 (let alone being roots of unity) except for
tj = ±i, j = 1, 2, 3. To see this note that if
−1
−1
¯
a = t1 + t−1
1 (= t1 + t1 ), b = t2 + t2 , c = t3 + t3
then a, b, c, lie in [−2, 2] and by the inequality of the geometric and arithmetic means
2
|a|3 + |b|3 + |c|3
≤ (a2 + b2 + c2 ).
(62)
0 ≤ a + b + c = |abc| ≤
3
3
Hence the only solutions to (61) correspond to a = b = c = 0 or tj = ±i. In terms
of ξj this gives ξ = (0, 0, 0), which is the only invariant set for the action of Γ on
X(Q̄).
We remark that in the context of the general surfaces that are studied in Paper III,
for example the surfaces Xk in (60) with k 6= 0, there can be a continuum of solutions
to the analogue of equation (61) with |tj | = 1. However the solutions with tj a root of
unity (with unspecified order) are still restricted to a finite number of nondegenerate
solutions. This follows from Lang’s Gm conjecture, see [Lau83] and [SA94] for proofs
which give the solutions effectively. In various special cases these finite Q̄ orbits for
the Γ-action correspond to the determination of the algebraic Painleve VI solutions
([DM00], [LT14]); we leave the details to paper III .
Returning to the Markoff surface X, let ξ = (ξ1 , ξ2 , ξ3) ∈ X ∗ (p) with ord(rot(ξj )) =
lj for j = 1, 2, 3. Let n = lcm(l1 , l2 , l3 ) and Ln = Q(ζn ) and let ζl1 , ζl2 , ζl3 be primitive
roots of one respectively. Let
2
2
2
(63) η = (ζl1 +ζl−1
)2 +(ζl2 +ζl−1
)2 +(ζl3 +ζl−1
)2 −(ζl1 +ζl−1
)(ζl2 +ζl−1
)(ζl3 +ζl−1
) ∈ OLn .
2
2
3
2
2
3
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
17
According to Proposition 11 unless l1 = l2 = l3 = 2 (i.e. ζlj = ±i), η 6= 0.
Now |η| ≤ 20 and hence
(64)
Norm(η) ≤ 20φ(n) ≤ 20n .
If P is a prime in OLn and η ∈ P , then P |(η) and hence
(65)
N(P ) ≤ Norm(η) ≤ 20n .
Put differently, if
log20 N(P ) > n
then
(66)
η 6= 0( mod P ).
For our point ξ in X ∗ (p), 3ξj = λj + λ−1
j with λj in Fp or Fp2 and λj an lj -th root
of 1, and (l1 , l2 , l3 ) 6= (2, 2, 2) since ξ 6= (0, 0, 0). If all the λj ’s are in Fp then Q(ζn )
splits completely at p, that is there is a prime P dividing (p) such that
OLn /P ∼
= Fp , N(P ) = p
and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence from (66) we conclude that
(67)
log20 p ≤ n.
If the field generated by λj ’s (over Fp ) is Fp2 then there is a prime P of OLn dividing
(p) such that
OL /P ∼
= Fp2 , N(P ) = p2
n
and π(ζlj ) = λj in OLn /P and η ≡ 0( mod P ). Hence again from (66) we conclude
that
(68)
2 log20 p ≤ n.
Hence in either case n ≥ log20 p where n = lcm(l1 , l2 , l3 ), and hence
(69)
1
max(l1 , l2 , l3 ) ≥ (log20 p) 3 .
We have proven
Proposition 12. Let ξ ∈ X ∗ (p) have maximal order l, i.e. max(l1 , l2 , l3 ) = l with
1
lj = ord(rot(ξj )), then l ≥ (log20 p) 3 . In particular, any component F of X ∗ (p)
satisfies
1
|F | ≥ (log20 p) 3 .
18
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
6. Proofs of Theorems 1 and 2
Proposition 12 establishes the second part of Theorem 1 and combined with the
analysis in sections 3 and 4 yields a proof of the strong approximation conjecture if
p2 − 1 is not very smooth. For example, the strong approximation conjecture is true
for X ∗ (p) if the prime p satisfies
(70)
X
2
d 3 < y; for any y.
1
(log p) 3 ≤d≤y
d|(p2 −1)
We do this by using the arguments and results in [Cha13] and [CKSZ14] concerning
points (x, y) on irreducible curves over Fp for which ord(x) + ord(y) is small (here
ord(x) is the order of x in F∗p ).
Theorem 13. Fix d ∈ Z+ and δ > 0. There is an ε > 0, ε = ε(d, δ), such that for
all primes p ≤ z (z sufficiently large) with the exception of at most z δ of them, the
following property holds. Let f (x, y) ∈ Fp [x, y] be of degree at most d and not divisible
by any polynomial of the form ρxα y β − 1 or ρy β − xα for any ρ ∈ F¯p and integers α
and β. Then all solutions (x, y) ∈ (F¯p × F¯p )∗ of f (x, y) = 0 satisfy
(71)
ord(x) + ord(y) ≥ pε
except for at most 11d3 + d of them.
Proof. Theorem 1.2 in [CKSZ14] establishes what we want except that pε in (71) is
replaced by the stronger bound pα(d) , with
α(d) =
2
,
89d2 + 3d + 14
while the exceptional set of primes is of zero density. For our purpose the exponent
in (71) is allowed to be small and in exchange we want the exceptional set to be much
smaller. To this end we follow verbatum the discussion in Section 4 of [CKSZ14]. For
d fixed and T a large parameter they show that there is a U = U(d, T ) which has at
1
most O(T α(d) ) prime factors (their log T in the denominator is irrelevant for us) with
the property: If p does not divide U and f as in Theorem 13 and f (x, y) = 0 in Fp ,
then
(72)
ord(x) + ord(y) ≥ T
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
19
except for at most 11d3 + d such (x, y) in Fp ∗ × Fp ∗ . For our given δ > 0 and large
parameter z choose T to be
T = z δα(d) .
(73)
Then the number of primes p with p|U is O(z δ ) , and if p does not divide U then
Theorem 13 holds with (72) and (73), that is with ε = δα(d).
To prove Theorem 2 we apply Theorem 13 to the curves fσ (x, y) given by equation
x+
1
σ
=y+
x
y
1
with σ 6= 1. If (log20 p) 3 > 1000, then according to Proposition 12, for any ξ ∈ X ∗ (p)
we have ord(rot(ξj0 )) is at least 1000 for j0 one of the j’s in {1, 2, 3}. Hence if p is
not in the exceptional set in Theorem 13 with d = 4, then in the typical equation
x + σx = y + y1 corresponding to the orders of the rotations in the rot(ξj0 ) orbit, there
is (x, y) which is not one of the exceptional 11d3 + d < 1000 possible points. For such
(x, y) the induced rotation has order at least pε and hence ξ is joined to the cage by
the middle game.
Our methods fall short of dealing with all p, specifically for those rare p’s for which
p −1 is very smooth. The following hypothesis which is a strong variant of conjectures
of M.C. Chang and B. Poonen [Cha13, Vol10] would suffice to deal with all large p’s.
2
Hypothesis: Given d ∈ N, there is δ > 0 and K = K(d) such that for p large
and f (x, y) absolutely irreducible over Fp and of degree d and f (x, y) = 0 is not a
translate of a subtorus of (F̄∗p )2 , the set of (x, y) ∈ (F∗p )2 for which f (x, y) = 0 and
max(ordx, ordy) ≤ pδ , is at most K.
Appendix A.
Stepanov’s auxiliary polynomial method [Ste69] for bounding the number of solutons to equations like (43) is quite flexible. We demonstrate this for some special cases
(the general case can be handled similarly). The proposition below is an extension of
the approach and bounds in [HK00] (where S(x) = x, T (x) = 1 − x and t1 = t2 ).
In what follows S(x) and T (x) are rational functions in Fp (x) of total degree d1
and d2 respectively and with disjoint divisors; e = d1 + d2 is fixed.
Proposition 14. For p a large prime, t1 , t2 dividing p − 1, t1 ≥ t2 , let
Y = {y ∈ Fp : S(y)t1 = T (y)t2 = 1}.
20
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
1
Then if t1 ≪e p1− 2e ,
−
1
|Y | ≪e min{t2 , t1 t2 4e }.
Remarks:
(1) The trivial bound is O(t2) so the Proposition gives an improvement (power
4e
saving) if t2 ≥ t14e−1 .
(2) If h(ξ, η) = 0 is a plane curve of genus 0 over Fp , then the Proposition gives
an upper bound on the number of solutions with ξ t1 = η t2 = 1 (cf. [CS13]).
Applying Proposition 14 with t1 = t2 , S(y) = y, T (y) =
ay+b
cy+d
yields
3
Corollary 15. For p large prime, t|(p − 1), t ≤ p 4 and Ut = {y ∈ Fp : y t = 1} the
t-th roots of 1,
3
|σ(Ut ) ∩ Ut | ≪ t 4
for σ ∈ PGL2 (Fp ), σ 6= 1.
3
Corollary 16. For t|(p − 1), t ≤ p 4 , b ∈ Fp , b 6= 1,
3
|{w, ρ ∈ Fp : w + w −1 = ρ + bρ−1 , w t = ρt = 1}| ≪ t 4 .
Proof. Put ρw = ξ, wρ = η, then ξ t = η t = 1 and each such solution with ξ = bη−1
η−1
corresponds to at most two solutions (w, ρ) above. Applying Corollary 15 yields
Corollary 16.
Proof of Proposition 14: First we need a generalization of Proposition 3.2 in
[VS12] where their common t is replaced by t0 , t1 , . . . , tn . The result is the following
Lemma, whose proof is the same
Lemma 17. Let t0 , t1 , . . . , tn , as well as B and J be integers, p a large prime, and
α1 , . . . , αn distinct elements in Fp ∗ . Assume that
1
min(t0 , . . . , tn ) ≥ (n − 1)B 2n + JB
2
and that
p ≥ (2nB + 2) max(t0 , t1 , . . . , tn ).
Then
xai xt0 b0,i (x − α1 )t1 b1,i . . . (x − αn )tn bn,i
with aj ≤ J and b0,i , . . . bn,i ≤ B are linearly independent in Fp [x].
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
21
Let α1 , . . . , αk ∈ Fp be distinct and ν1 , ν2 , . . . νk ∈ Z; set
Rν (x) = (x − α1 )ν1 . . . (x − αk )νk .
For m ≥ 1,
X m dj1
dj k
dm
ν1
[R
(x)]
=
[(x
−
α
)
]
.
.
.
[(x − α1 )νk ] =
ν
1
j1
jk
dxm
dx
dx
j
j1 +...jk =m
X
Bm,j (x − α1 )ν1 −j1 . . . (x − αk )νk −jk .
j1 +j2 +...jk =m
Hence
dm
(74)
[(x − α1 )(x − α2 ) . . . (x − αk ]
Rν (x) = Rν (x)Pm,ν (x),
dxm
where Pm,ν is a polynomial of degree at most km.
Stepanov’s polynomial method is based on constructing a polynomial which vanishes to high order on Y . Let λa,b1 ,b2 be in Fp with 0 ≤ a ≤ J and 0 ≤ bj ≤ B and
form
X
(75)
φ(x) =
λa,b1 ,b2 xa (S(x))t1 b1 (T (x))t2 b2 .
m
Write S(x), T (x) in the form (we assume that both factor into linear factors Fp [x]):
A(x − α1 ) . . . (x − αt )
,
(x − β1 ) . . . (x − βτ )
B(x − γ1 ) . . . (x − γµ )
T (x) =
.
(x − δ1 ) . . . (x − δν )
S(x) =
(76)
For simplicity we assume that S(x) and T (x) are square-free and we are assuming
that the α, β, γ, δ’s are all distinct. The constants A and B can be absorbed into the
λ’s, so without loss of generality we can take A = B = 1. For m ≥ 0
(77)
[(x − α1 ) . . . (x − αt )(x − β1 ) . . . (x − βτ ) . . . (x − δν )]m
dm a
t1 b1
t2 b2
x
(S(x))
(T
(x))
=
dxm
xa S(x)t1 b1 T (x)t2 b2 Pm,a,b1 ,b2 (x)
with Pm of degree at most em. Hence for x = y ∈ Y and m ≤ M
(78)
X
X
dm
dm a
t1 b1
t2 b2
λa,b1 ,b2 y a Pm,a,b1 ,b2 (y),
φ(x)|
=
λ
x
S(x)
T
(x)
=
x=y
a,b1 ,b2
x=y
dxm
dxm
a,b ,b
1
2
by the definition of Y . We can make (78) equal to 0 for all y in Y by noting that
y a Pm (y) is a polynomial of degree J + em. So (78) can be made 0 with not all of the
22
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
λa,b1 ,b2 ’s equal to 0 and for all m ≤ M as long as
(J + eM)M < B 2 J.
(79)
Assuming that this is satisfied, we have φ(x) which is not identically zero and has
degree (as a rational function) at most J + eBt1 .
Hence if φ(x) is not identically zero, then its order of vanishing on Y is at least M
and hence
M|Y | ≤ J + eBt1
or
(80)
|Y | ≤
J + eBt1
.
M
We now check that under suitable constraints on the sizes of parameters, φ(x) does
not vanish identically. We have
φ(x) =
consequently
X
λa,b1 ,b2 xa
(x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − γ1 )t2 b2 . . . (x − γµ )t2 b2
,
(x − β1 )t1 b1 . . . (x − βτ )t1 b1 (x − δ1 )t2 b2 . . . (x − δν )t2 b2
(x − β1 )B . . . (x − βτ )B (x − δ1 )B . . . (x − δν )B φ(x) =
X
λa,b1 ,b2 xa (x − α1 )t1 b1 . . . (x − αt )t1 b1 (x − β1 )(B−b1 )t1 . . . (x − βτ )(B−b1 )t1 ·
· (x − γ1 )t2 b2 . . . (x − γµ )t2 b2 (x − δ1 )(B−b2 )t2 . . . (x − δν )(B−b2 )t2 .
Now the monomials appearing in the last expression are linearly independent over
Fp [x] according to Lemma 17 as long as
(81)
p ≥ (2eB + 2)t1
1
t2 ≥ eB 2e + JB e .
2
Thus, if (81) and (79) hold, so does (80).
Choose J ≤ M and
M 2 = Ce B 2 J.
Then
M=
p
√
Ce B J
1
1
and M ≥ J iff J ≪e B 2 . Now choose B + t12e and if t1 ≪ p1− 2e then (81) and (79)
hold and
−
1
|Y | ≪e t1 t2 4e .
This completes the proof of Proposition 14.
MARKOFF SURFACES AND STRONG APPROXIMATION: 1
23
Acknowledgements: While working on this paper, the authors were supported, in
part, by the following NSF DMS awards: 1301619 (Bourgain), 1603715 (Gamburd),
1302952 (Sarnak).
References
[BS02]
F. Beukers and C. J. Smyth, Cyclotomic points on curves, Number theory for the
[Bom07]
millenium (Urbana, Illinois, 2000), I, A.K. Peters, (2002), 67-85.
E. Bombieri, Continued fractions and the Markoff tree, Expo. Math. 25 (2007), no
[Bou12]
3, 187–213.
J. Bourgain, A modular Szemeredi-Trotter theorem for hyperbolas, C.R. Acad. Sci.
Paris Ser 1, 350 (2012), 793–796.
[BG08]
J. Bourgain and A. Gamburd, Uniform expansion bounds for Cayley graphs of
SL2 (Fp ), Ann. Math. 167 (2008), 625–642.
[BGS10]
J. Bourgain, A. Gamburd and P. Sarnak, Affine linear sieve, expanders and sum
product, Invent. Math. 179 (2010), 559–644.
[BGS16]
J. Bourgain, A. Gamburd, P. Sarnak, Markoff triples and strong approximation, C.
R. Math. Acad. Sci. Paris 354 (2016), no. 2, 131-135.
[Cas78]
[Cha13]
J. W. S. Cassels, Rational Quadratic Forms, Academic Press, 1978.
Chang, Mei-Chu Elements of large order in prime finite fields. Bull. Aust. Math.
[CKSZ14]
Soc. 88 (2013) 169-176.
M-C. Chang, B. Kerr, I. Shparlinski and U. Zannier, Elements of large orders on
[CS13]
varieties over prime finite fields, J. Theor. Nombres Bordeaux 26 (2014) 579-594.
P. Corvaja, U. Zannier, Greatest common divisors of u − 1, v − 1 in positive charac-
teristic and rational points on curves over finite fields, J. Eur. Math. Soc. (JEMS)
15 (2013) 1927-1942.
[DKS13]
C. D’Andrea, T. Krick and M. Sombra, Heights of varieties in multiprojective spaces
[DM00]
and arithmetic Nullstellensatz, Annales Sci. de l’ENS, 46, (2013),549-627.
B. Dubrovin, M. Mazzocco, Monodromy of certain Painleve-VI transcendents and
[Fro13]
reflection groups, Invent. Math. 141 (2000) 55-147.
G. Frobenius, Über die Markoffschen Zahlen, Akad. Wiss. Berlin, (1913), 458–487.
[Gol03]
W. Goldman, The modular group action on real SL(2)-characters of a one-holed
torus, Geom. and Top. Vol. 7 (2003), 443–486.
[HK00]
R. Heath-Brown and S. Konyagin, New bounds for Gauss sums derived from k-th
powers and for Heilbronn’s exponential sum, QUAR. J MATH (2000), 221–235.
[Lau83]
[Mar79]
M. Laurent, Exponential diophantine equations, CR Acad Sc. 296 (1983), 945–947.
A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 15 (1879)
[Mar80]
381–409.
A. Markoff, Sur les formes quadratiques binaires indéfinies, Math. Ann. 17 (1880)
[LT14]
379–399.
O. Lisovyy and Y. Tykhyy, Algebraic solutions of the sixth Painleve equation,
Journal of Geometry and Physics, 85 (2014) 124-163.
24
JEAN BOURGAIN, ALEXANDER GAMBURD, AND PETER SARNAK
[MW13]
D. McCullough and M. Wanderley, Nielsen equivalence of generating pairs in
[SA94]
SL(2, q), Glasgow Math. J. 55 (2013), 481–509.
P. Sarnak and S. Adams, Betti numbers of congruence groups, with an appendix
[Sch04]
by Z. Rudnick, Israel J. Math, 88, 1994, 31-72.
Schmidt, W. M Equations over finite fields: an Elementary approach, Kendrick
[Ste69]
Press 2004.
S.A. Stepanov, The number of points of a hyperelliptic curve over a prime field,
[Suz82]
MATH USSR-IZV 3:5 (1969), 1103–1114.
M. Suzuki, Group Theory I, Springer-Verlag, Berlin-Heidelberg-New York, 1982.
[Vol10]
Voloch, Elements of high order on finite fields from elliptic curves, Bull. Aust. Math.
Soc. 81 (2010), 425-429.
[VS12]
[Wei41]
Vyugin, I. V., Shkredov, I. D., Sb. Math. 203(2012), 844-863.
A. Weil, On the Riemann Hypothesis in function fields, Proc. Nat. Acad. Sci. USA
27 (1941), 345–347.
IAS
E-mail address: [email protected]
The Graduate Center, CUNY
E-mail address: [email protected]
IAS and Princeton University
E-mail address: [email protected]
| 4 |
arXiv:1706.02858v2 [math.ST] 14 Mar 2018
On rumour propagation among sceptics
Farkhondeh A. Sajadi and Rahul Roy1
University of Isfahan, Isfahan and Indian Statistical Institute, Delhi
Keywords: complete coverage, eventual coverage, rumour process.
AMS Classification: 60K35
Abstract: Junior, Machado and Zuluaga (2011) introduced a model to understand the
spread of a rumour. This model consisted of individuals situated at i.i.d. points of the
line N. An individual at the origin 0 starts a rumour and passes it to all individuals
in the interval [0, ρ0 ], where ρ0 is a positive random variable. An individual located in
this interval receives the rumour and transmits it further. The rumour process is said to
survive if all the individuals in the model receive the rumour. We study this model, when
the individuals are more sceptical and they transmit only if they receive the rumour from
at least two different sources.
In stochastic geometry the equivalent of this rumour process is the study of coverage
of the space Nd by random sets. Our study here extends the study of coverage of space
and considers the case when each vertex of Nd is covered by at least two distinct random
sets.
1
Introduction
Let {Xi : 1 ≥ 1} be a collection of i.i.d. Bernoulli (p) random variables, i.e.,
(
1 with probability p
Xi =
0 with probability 1 − p.
(1)
Also let {ρi : 1 ≥ 1} be a collection of i.i.d. N valued random variables, independent of the
collection {Xi : 1 ≥ 1}. Let ρ denote a generic random variable with the same distribution
as ρi .
In addition, let ρ0 an independent N valued random variables, independent of the
collections {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1}, with ρ0 having the same distribution as ρ.
Taking X0 ≡ 1, consider the region
[
([i, i + ρi ]).
C :=
{i≥0:Xi =1}
1
[email protected], [email protected]
1
Junior, Machado and Zuluaga (2011) takes {i : Xi = 1} as the location of individuals
on N and a rumour is started at the origin which is received by individuals located in
[0, ρ0 ]. An individual at i on receiving the rumour spreads it among all individuals in
the region [i, i + ρi ], and thus the rumour propagates. This model they call the firework
process. They also introduce another model of rumour propagation, called the reverse
firework process, where they study the region
[
([i − ρi , i]).
C̃ :=
{i≥0:Xi =1}
Their object of interest is under what conditions on the processes {Xi : 1 ≥ 1} and {ρi :
1 ≥ 1} are the regions C and C̃ unbounded connected regions with positive probability,
i.e. the rumour process ‘percolates’.
Remark 1.1. A simple argument using Kolmogorov’s 0-1 law yields that C (or C̃) being an
unbounded connected region with positive probability is equivalent to C (or C̃) containing
a region [t, ∞), for some t ≥ 1 with probability 1.
We study the spread of rumour among sceptics. A sceptic individual at i spreads it
among all individuals in the region [i, i + ρi ] only if s/he received the rumour from at least
two distinct sources, i.e.,
(i) for the firework process, there are two individuals at j and k (say) with j 6= k and
−1 ≤ j, k < i such that i ∈ [j, j + ρj ] ∩ [k, k + ρk ]; here we assume that there is
an individual at location −1, who spreads the rumour in the region [−1, −1 + ρ−1 ],
where ρ−1 is a random variable independent of all other random variables and
having the same distribution as ρ,
(ii) for the reverse firework process, there are two individuals at j and k (say) with
j 6= k and −1 ≤ j, k < i such that j, k ∈ [i − ρi , i].
Towards this we define the regions
D := {x ∈ R : there exist j, k ≥ −1 with j 6= k and Xj = Xk = 1
such that x ∈ ([j, j + ρj ] ∩ [k, k + ρk ])},
D̃ := {x ∈ R : x ∈ [i − ρi , i] for some i with Xi = 1 and there exist
− i ≤ j, k < i with j 6= k and Xj = Xk = 1 such that j, k ∈ [i − ρi , i]}.
We look for conditions on on the processes {Xi : 1 ≥ 1} and {ρi : 1 ≥ 1} such that the
regions D and D̃ are unbounded connected regions with positive probability.
Remark 1.2. As in the case of rumour propagation in C and C̃, a simple argument
using Kolmogorov’s 0-1 law yields that D (or D̃) being an unbounded connected region
with positive probability is equivalent to D (or D̃) containing a region [t, ∞), for some
t ≥ 1 with probability 1.
Thus we define
2
Definition 1.3. The firework process (respectively, reverse firework process,) percolates
among sceptics if, with probability 1, D (respectively, D̃,) contains a region [t, ∞), for
some t ≥ 1.
Remark 1.4. Using this equivalent definition obtained by the tail event properties allows
us to study the model without considering the influence of the two initiators X−1 and X0 .
Proposition 1.5. Let
l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞.
j→∞
j→∞
We have that both the firework process and the reverse firework process percolate if p > 1/l
and neither of them percolates if p < 1/L.
We note here that this is the same condition that Junior, Machado and Zuluaga (2011)
obtain for the percolation among ‘non-sceptical’ individuals. Indeed, the above proposition
goes through among more radical sceptics too, i.e. if individuals need to receive the rumour
from k ≥ 1 distinct sources before they transmit the rumour.
As noted in the review article Junior, Machado and Ravishankar (2016), the above
model is related to the study of coverage processes in stochastic geometry. Athreya, Roy
and Sarkar (2004) introduce a notion of ‘eventual coverage’ which, for 1-dimension, is
identical to the equivalent formulation of the percolation of rumour process as given in
Remark 1.1. We state the model in brief here and present the results obtained.
Let {Xi : i ∈ Nd } be a collection of i.i.d. Bernoulli (p) random variables and {ρi :
i ∈ Nd } a collection of i.i.d. N valued random variables, independent of the collection
{Xi : i ∈ Nd }. Let ρ denote a generic random variable with the same distribution as ρi .
Let
C := ∪i:Xi =1 (i + [0, ρi ]d )
denote the covered region of Nd .
Athreya, Roy and Sarkar (2004) define a notion of eventual coverage as follows: Nd is
eventually covered if there exists a t ∈ Nd such that t + Nd ⊆ C. For our purposes we say
Nd is eventually doubly covered if there exists a t ∈ Nd such that t + Nd ⊆ D, where
D := {x ∈ Rd : there exist i, j ∈ Nd with i 6= j and Xi = Xj = 1
such that x ∈ (i + [0, ρi ]d ) ∩ (j + [0, ρj ]d )}.
We have
Proposition 1.6. (i) For d = 1, let
l := lim inf jP(ρ ≥ j) > 1 and L := lim sup jP(ρ ≥ j) < ∞.
j→∞
j→∞
We have
Pp (N is eventually doubly covered) =
3
(
1
0
if p > 1/l
if p < 1/L.
(ii) For d ≥ 2, we have
Pp (Nd is eventually doubly covered) =
(
1
0
if lim inf j→∞ jP(ρ ≥ j) > 0
if limj→∞ jP(ρ ≥ j) = 0.
In stochastic geometry the notion of coverage of space has received widespread attention. In particular Hall (1988) and Chiu, et al (2013) provide a review of the topics
studied. Our endeavour in this paper may be viewed as an effort to introduce a notion of
‘reinforced coverage’.
2
Proof of Proposition 1.5
Let S be the event that "the firework process percolates" and S̃ be the event that "the
reverse firework process percolates". Observe that,
S=
∞ [
∞
\
∞
[
([ρn−i ≥ i + 1] ∩ [ρn−j ≥ j + 1]) ,
n=1 i=1 j=1,j6=i
and
S̃ =
∞ [
∞
\
∞
[
([ρn+i ≥ i] ∩ [ρn+j ≥ j]) .
n=1 i=1 j=1,j6=i
We will show that if p > 1/l, then we have P(S) = 1, P(S̃) = 1 and if p < 1/L, then
P(S) = 0, P(S̃) = 0.
We prove the proposition for the firework process, a similar proof works for the reverse
firework process. Using De Morgan’s law, we have
Sc =
∞ \
∞
[
∞
\
([ρn−i ≤ i] ∪ [ρn−j ≤ j]) .
n=1 i=1 j=1,j6=i
4
Since p > 1/l, there exists η > 1 such that l > η/p. Also let i0 be such that iP(ρ ≥ i) > ηp ,
for all i ≥ i0 . Therefore, for all i, j ≥ i0 and each fixed n,
∞
∞
\
\
P
([ρn−i ≤ i] ∪ [ρn−j ≤ j])
i=i0 j=i0 ,j6=i
∞
∞
∞
∞
\
\
\
\
[ρn−i ≤ i]
[ρn−j ≤ j]) ∪
= P
j=i0 i=j+1
i=i0 j=i+1
∞
∞
∞
∞
\
\
\
\
[ρn−i ≤ i]
[ρn−j ≤ j] + P
= P
j=i0 i=j+1
i=i0 j=i+1
≤ P
=
≤
≤
∞
\
∞
Y
[1 −
j=i0 +1
∞
Y
[1 −
[ρn−i ≤ i]
i=i0 +1
[1 − P(ρ ≥ j + 1)] +
j=i0 +1
∞
Y
1
j+1 ]
∞
\
[ρn−j ≤ j] + P
j=i0 +1
j=i0 +1
Q
But, ∞
j=i0 +1 [1 −
Finally
∞
Y
!
[1 − P(ρ ≥ i + 1)]
i=i0 +1
∞
Y
η
η
[1 −
]+
]
p(j + 1)
p(i
+ 1)
i=i +1
0
∞
Y
1
]+
j+1
i=i
= 0 as well as
[1 −
0 +1
Q∞
i=i0 +1 [1
1
].
i+1
−
1
i+1 ]
= 0. Therefore, P(S c ) = 0.
P(percolation among sceptic individuals)
≤ P(percolation among ‘non sceptical’ individuals)
=0
for p < 1/L , where the equality above follows from Theorem 2.1 of Junior, Machado and
Ravishankar (2016).
3
Proof of Proposition 1.6
As mentioned earlier (i) of Proposition 1.6 is just Proposition 1.5 rephrased. Thus we need
to prove (ii).
First note that from Proposition 3.2(a) of Athreya, Roy and Sarkar (2004), we know
that if limj−→∞ jP(ρ ≥ j) = 0 then Pp (Nd is eventually covered) = 0, and so
Pp (Nd is eventually doubly covered) = 0.
5
We prove Proposition 1.6 (ii) for the case d = 2; the proof carries through in a
straightforward fashion for higher dimensions. Fix 0 < p < 1 and we assume that
lim inf j−→∞ jP(ρ ≥ j) > 0.
For (i, j) ∈ N2 , define
Bi,j := {(i, j) 6∈ D}.
If we show that, for some N ≥ 1,
X
Pp (Bi,j ) < ∞,
i,j≥N
then Borel-Cantelli lemma guarantees that, with probability 1, there exists N0 ≥ 1 such
that (i, j) ∈ D for all i, j ≥ N0 , i.e. we have eventual coverage.
For u := (i − l1 , j − l2 ) ∈ N2 with 1 ≤ l1 ≤ i, 1 ≤ l2 ≤ j, we observe that (i, j) ∈
u + [0, ρu ]2 if and only if ρu ≥ max{l1 , l2 }. Also note that for i ≥ j and 0 ≤ t ≤ j − 1 there
are exactly 2t + 1 vertices (i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 =
t and 0 ≤ l2 ≤ t or l2 = t and 0 ≤ l1 ≤ t}), while for j ≤ t ≤ i there are exactly j vertices
(i − l1 , j − l2 ) with max{l1 , l2 } = t (viz. {(i − l1 , j − l2 ) : l1 = t and 0 ≤ l2 ≤ j − 1}).
Thus, for Ai,j := {(i, j) 6∈ C}, and, for i ≥ j,
Pp (Bi,j )
= Pp (Ai,j )+
i−j
Y
[1 − pG(k + j − 1)]
k=1
j−1
Y
[1 − pG(t)]
2t+1
j−1
X
j
pG(t) [1 − pG(t)]
t=0
j−1
Y
2t
[1 − pG(l)]
2l+1
+
l6=t,l=0
t=0
×
i−j
X
pG(k + j − 1) [1 − pG(k + j − 1)]
j−1
i−j
Y
[1 − pG(l + j − 1)]
Noting that for i ≥ j
Pp (Ai,j ) =
j−1
Y
[1 − pG(l)]
2l+1
l=0
i−j
Y
[1 − pG(k + j − 1)]
.
(2)
l6=k,l=1
k=1
j
j
k=1
(the last product is taken to be 1 if i = j), (2) simplifies to
Pp (Bi,j ) = Pp (Ai,j ) + pPp (Ai,j )
i−1
X
t=0
G(t)
.
1 − pG(t)
(3)
Before we proceed we fix some quantities. Since lim inf jP(ρ ≥ j) > 0 we may choose
j−→∞
η > 0 such that lim inf jP(ρ ≥ j) > η. Also, for this η and our fixed p ∈ (0, 1) let a be
j−→∞
6
such 0 < e−pη < a < 1. Now we choose N ≥ 1 such that for all j ≥ N the following hold:
(i) jP(ρ ≥ j) > η,
(ii) (1 − pηj −1 )j < a,
(4)
(iii) pjη > 1.
Note that (ii) above guarantees that for all j ≥ N , we have (1 − pG(j))j < a.
From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that,
for j ≥ N ,
∞
X
Pp (Ai,j ) < ∞.
i=1
Thus if we show that, for j ≥ N ,
∞
X
Pp (Ai,j )
i−1
X
t=0
i=1
G(t)
<∞
1 − pG(t)
(5)
then we will have
∞
X
Pp (Bi,j ) < ∞ whenever j ≥ N.
(6)
i=1
Note that,
i−1
X
t=0
∞
X
Pp (Ai,j )
i=j
=
j−1
k=1
i−j
X
k=1
∞ j−1
Y
X
G(k + j − 1)
1 − pG(k + j − 1)
[1 − pG(t)]2t+1
i=j t=0
=
j−1
Y
j−1
Y
i−j
Y
[1 − pG(l + j − 1)]j
l=1
[1 − pG(t)]2t+1
t=0
=
i−j
X G(t)
X G(k + j − 1)
G(t)
=
+
. Now, for fixed j ≥ N ,
1 − pG(t)
1 − pG(t)
1 − pG(k + j − 1)
t=0
∞ i−1
Y
X
k=1
[1 − pG(l)]j−1
2t+1
t=0
∞ X
∞ i−1
X
Y
i−1
X
i=j l=j
[1 − pG(t)]
i−j
X
G(k + j − 1)
1 − pG(k + j − 1)
G(k)
j−1
[1 − pG(h)]
h6=k,h=j
k=j
[1 − pG(l)]
i−1
Y
G(k)
i−1
Y
[1 − pG(h)] for j ≥ N.
Taking
∞ i−1
X
Y
[1 − pG(l)]
h6=k,h=j
k=j i=k+1 l=j
ek :=
j−1
G(k)
i−1
Y
h6=k,h=j
i=k+1 l=j
7
[1 − pG(h)]
(7)
as the inner sum in (7), we have
ek =G(k)
k
Y
[1 − pG(l)]j−1
l=j
k−1
Y
[1 − pG(h)]
h=j
×
∞
X
1+
i
Y
[1 − pG(l)]
i=k+1 l=k+1
=G(k)
k
Y
[1 − pG(l)]j−1
l=j
k−1
Y
i
Y
j−1
[1 − pG(h)]
h=k+1
!
[1 − pG(h)] 1 + [1 − pG(k)]j
h=j
h
× 1+
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+2 l=k+2
i
Y
[1 − pG(h)]
h=k+2
i
!
.
(8)
!
(9)
Similarly, for ek+1 , as in the term in the first equality above, we have
ek+1 =G(k + 1)
k+1
Y
[1 − pG(l)]j−1
l=j
×
k
Y
[1 − pG(h)]
h=j
1+
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+3 l=k+3
i
Y
[1 − pG(h)] .
h=k+3
Taking
C(k, j) := 1 +
∞
X
i
Y
[1 − pG(l)]
j−1
i=k+2 l=k+2
i
Y
[1 − pG(h)]
h=k+2
we see that
j−1
ek+1
[1 − pG(k)]
G(k + 1) [1 − pG(k + 1)]
= C(k, j)
j .
ek
G(k)
1 + C(k, j) [1 − pG(k + 1)]
Now,
G(k+1)
G(k)
(10)
≤ 1 for all k ≥ 0, and, for fixed j,
j−1
(i) for k large enough, 0.9 < [1 − pG(k + 1)]
[1 − pG(k + 1)] ≤ 1;
(ii) for j ≥ N , from equation (3.5) of Athreya, Roy and Sarkar (2004), we have
P∞
Qi
j−1
< ∞ and hence
i=k+2
l=k+2 [1 − pG(l)]
∞
X
i
Y
[1 − pG(l)]
i=k+2 l=k+2
j−1
i
Y
[1 − pG(h)] < ∞;
h=k+2
which ensures that, for k large enough, 1 ≤ C(k, j) < 1.1.
1.1
Thus, for j ≥ N and k large enough, we have ek+1
ek < 1.9 , and so, by ratio test,
∞. This shows, from (7), that (5) and thereby (6) hold.
8
P∞
k=1 ek
<
P
Now we show that, for N as above,
i,j≥N Pp (Bi,j ) < ∞. Towards this, we first
observe that, for i, j ≥ 1, by symmetry we have Pp (Bi,j ) = Pp (Bj,i ), thus we need to show
X
Pp (Bi,j ) = 2
i,j≥N
∞ X
i−1
X
Pp (Bi,j ) +
i=N j=N
∞
X
(11)
Pp (Bi,i ) < ∞.
i=N
We will show separately that
∞ X
i−1
X
Pp (Bi,j ) < ∞ and
i=N j=N
∞
X
(12)
Pp (Bi,i ) < ∞.
i=N
First, for any i, j ≥ 1,
"
Pp (Bi,j ) = 1 + p
i−1
X
t=0
#
G(t)
Pp (Ai,j ).
1 − pG(t)
From the proof of Proposition 3.2(b) of Athreya, Roy and Sarkar (2004) we know that,
∞ X
i−1
X
Pp (Ai,j ) < ∞ and
i=N j=N
∞
X
Pp (Ai,i ) < ∞,
i=N
thus we need to show that
∞ X
i−1 X
i−1
X
i=N j=N t=0
∞ X
i−1
X
G(t)
G(t)
Pp (Ai,j ) < ∞ and
Pp (Ai,i ) < ∞.
1 − pG(t)
1
−
pG(t)
t=0
(13)
i=N
For the first sum, interchanging the order of summation we have
∞ X
i−1 X
i−1
X
i=N j=N t=0
∞
∞
X
X
G(t)
G(t)
Pp (Ai,j ) =
1 − pG(t)
1 − pG(t)
t=0
∞
X
Pp (Ai,j ).
j=N +1 i=max(t+1,j+1)
Also breaking up the inner two sums according to the values taken by i, writing out the
expression for Pp (Ai,j ) and collecting terms together, we have
∞
X
∞
X
Pp (Ai,j )
j=N +1 i=max(t+1,j+1)
=
∞
X
∞
X
Pp (AN +r,N +m )
m=1 r=max(t−N +1,m+1)
=
t−N
X
∞
X
m=1 r=t+1−N
+
∞
X
N +m−1
Y
[1 − pG(l)]2l+1
l=0
∞
X
m=t−N +1 r=m+1
r−m
Y
[1 − pG(k + N + m − 1)]N +m
k=1
N +m−1
Y
[1 − pG(l)]
2l+1
l=0
r−m
Y
k=1
9
N +m
[1 − pG(k + N + m − 1)]
).
G(t)
1−pG(t) ,
To simplify the expressions we take σt :=
N +m
g(k, m) := [1 − pG(k + N + m − 1)]
equations we have
∞ X
i−1 X
i−1
X
i=N j=N t=0
[1 − pG(l)]
2l+1
and
l=0
. Using this notation, from the previous two
∞
t−N
X
X
G(t)
Pp (Ai,j ) =
σt
1 − pG(t)
t=1
m=1
+
N +m−1
Y
sm :=
∞
X
∞
X
sm
r=t+1−N
∞
X
σt
r−m
Y
g(k, m)
k=1
∞
X
sm
m=t−N +1 r=m+1
t=1
r−m
Y
g(k, m).
(14)
k=1
We start with the first term on the right in the above equation. Reordering the sums, we
have
∞
X
t=1
σt
t−N
X
∞
X
sm
m=1 r=t+1−N
r−m
Y
g(k, m) =
∞
X
sm
m=1
k=1
Let
∞
X
αm := sm
∞
X
∞
X
σt
t=m+N
σt
t=m+N
∞
X
r−m
Y
r−m
Y
g(k, m).
(15)
r=t+1−N k=1
g(k, m)
r=t+1−N k=1
denote the summand. Observe that
∞
X
sm+1 t=m+1+N
αm+1
=
∞
αm
sm
X
r=t+1−N
∞
X
r−m−1
Y
σt
t=m+N
= [1 − pG(N +
∞
X
σt
k=1
r−m
Y
∞
X
σt
t=m+1+N
∞
r−m
X
Y
r=t+1−N
∞
X
r−m−1
Y
k=1
r−m
Y
σt
= [1 − pG(N + m)]N +m
∞
X
∞
X
σt
t=m+N
σm+N
[1−pG(N +m)]N +m+1
g(k, m)
r=t+1−N k=1
t=m+1+N
m)]2(N +m)+1
∞
X
×
g(k, m + 1)
∞
X
g(k, m) +
g(k, m)
r=t+1−N k=1
r=t+1−N
r=m+1 k=1
g(k, m + 1)
r−m−1
Y
k=1
∞
X
g(k, m + 1)
t=m+1+N
σt
∞
X
r=t+1−N
r−m−1
Y
.
g(k, m + 1)
k=1
By our choice of N and 0 < a < 1 as in (4), we have [1 − pG(N + m)]N +m < a. All
P∞
P∞
Qr−m−1
terms above being non-negative, if t=m+1+N σt r=t+1−N k=1
g(k, m + 1) < ∞,
10
then ααm+1
< a; and so an application of the ratio test will yield that the sum in (15) is
m
finite.
P∞
P∞
Qr−m−1
To show t=m+1+N σt r=t+1−N k=1
g(k, m + 1) < ∞, we again apply a ratio
P∞
Qr−m−1
test. Let τt := σt r=t+1−N k=1
g(k, m + 1) < ∞. Then,
G(t + 1)
τt+1
=
[1 − pG(t)]
τt
G(t)
[1 − pG(t + 1)]
N +m
∞
X
1+
r
Y
!
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
∞
r
X
Y
×
N +m+1
1+
1 + [1 − pG(t + 1)]
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
Note that
∞
X
r
Y
!.
g(k, m + 1) < ∞ (from Athreya, Roy and Sarkar (2004))
r=t+2−N −m k=t+2−N −m
and so we may obtain a t0 such that, for all t ≥ t0 ,
(i) 1 ≤ 1 +
∞
X
r
Y
g(k, m + 1) < 1.1 and
r=t+2−N −m k=t+2−N −m
N +m+1
(ii) [1 − pG(t + 1)]
1+
∞
X
r
Y
!
g(k, m + 1)
r=t+2−N −m k=t+2−N −m
This choice of t0 ensures that for all t ≥ t0 we have
∞
X
t=m+1+N
σt
∞
X
r=t+1−N
r−m−1
Y
τt+1
τt
> 0.9.
< 1.1/1.9, and hence
g(k, m + 1) < ∞.
k=1
Thus the first term on the right of (14) is finite.
A similar calculation and a use of ratio test shows that the second term on the right
of (14) is finite, thereby showing that the sum in (14) is finite.
Reordering the second sum in (11) and using the notation we introduced earlier, we
have
∞ X
i−1
X
i=N t=0
N
−1 X
∞
∞ X
∞
X
X
G(t)
σt Pp (Ai,i ).
Pp (Ai,i ) =
σt Pp (Ai,i ) +
1 − pG(t)
t=0
i=t+1
i=N
(16)
t=N
From the end of Section 3.1 of Athreya, Roy and Sarkar (2004) we know that with N as
PN −1 P∞
P∞
above, i=N σt Pp (Ai,i ) < ∞ and hence t=0
i=N σt Pp (Ai,i ) < ∞.
Expanding the term Pp (Ai,i ), we have
∞ X
∞
X
t=N i=t+1
σt Pp (Ai,i ) =
∞ X
∞
X
t=N i=t+1
11
σt
i−1
Y
l=0
[1 − pG(l)]
2l+1
(17)
Taking at := σt
see that
P∞
i=t+1
at := σt
Qi−1
t
Y
l=0
[1 − pG(l)]
[1 − pG(l)]
2l+1
2l+1
l=1
from which we have
and lt :=
P∞
r=t+2
Qr
l=t+2
[1 − pG(l)]
2l+1
, we
n
o
2t+3
1 + [1 − pG(t + 1)]
(1 + lt ) ;
2t+3
at+1
[1 − pG(t)] [1 − pG(t + 1)]
(1 + lt )
G(t + 1)
=
2t+3
at
G(t) [1 − pG(t + 1)] 1 + [1 − pG(t + 1)]
(1 + lt )
2t+2
=
(1 + lt )
G(t + 1) [1 − pG(t)] [1 − pG(t + 1)]
2t+3
G(t)
1 + [1 − pG(t + 1)]
(1 + lt )
≤
(1 + lt )
G(t + 1) [1 − pG(t + 1)]
2t+3
G(t) 1 + [1 − pG(t + 1)]
(1 + lt )
2t+2
Also, with a as in (4),
Qr+1
l=t+2
Qr
l=t+2
[1 − pG(l)]
2l+1
[1 − pG(l)]
2l+1
2r+3
= [1 − pG(r + 1)]
pη
< 1−p
r+1
2r+3
< a for r ≥ N,
so, by the ratio test lt < ∞ for t ≥ N . Now, since lt → 0 as t → ∞, from the remark
2t+2
following (4) we may obtain a t0 such that for t ≥ t0 , we have [1 − pG(t + 1)]
(1 + lt ) <
G(t+1)
a < 1. Also G(t) < 1 for all t, thus
at+1
< a for all t ≥ t0 ,
at
and by ratio test we have that the sum in (16) is finite.
This completes the proof of Proposition 1.6 (ii).
References
1. Athreya, S., Roy, R. and Sarkar, A. (2004). On the coverage of space by random
sets. Adv. Appl. Probab. (SGSA), 36, 1–18.
2. Chiu, S.N, Stoyan, D., N., Kendall, W.S., V. and Mecke, J. (2013). Stochastic
geometry and its applications 3rd Ed., John Wiley, Chichester.
12
3. Gallo, S., Garcia, N., Junior, V. and Rodríguez, P. (2014). Rumor Processes
on N and discrete renewal processes. J. Stat. Physics, 155, 591–602.
4. Hall, P. (1988). Introduction to the theory of coverage processes John Wiley, New
York.
5. Junior, V., Machado, F. and Zuluaga, M. (2011), Rumor processes on N. J..
Appl. Probab., 48, 624–636.
6. Junior, V., Machado, F. and Ravishankar, K. (2016) The rumor percolation
model and its variations. arXiv:1612.03853.
13
| 10 |
A Note on Fault Tolerant Reachability for Directed Graphs
Loukas Georgiadis1
Robert E. Tarjan2
arXiv:1511.07741v1 [cs.DS] 24 Nov 2015
February 26, 2018
In this note we describe an application of low-high orders [2] in fault-tolerant network design.
Baswana et al. [1] study the following reachability problem. We are given a flow graph G = (V, A)
with start vertex s, and a spanning tree T = (V, AT ) rooted at s. We call a set of arcs A′ valid if
the subgraph G′ = (V, AT ∪ A′ ) of G has the same dominators as G. The goal is to find a valid set
of minimum size. Baswana et al. [1] show that there is a valid set containing at most n − 1 arcs,
and they give an algorithm to compute a minimum-size valid set in O(m log n) time, where n = |V |
and m = |A|. Their algorithm is based on generalizing the notion of semi-dominators [3] from a
depth-first spanning tree to an arbitrary spanning tree.
Here we give a simple algorithm, Algorithm 9 below, to compute a minimum-size valid set in
O(m) time, given the dominator tree D and a low-high order of it. Since D and a low-high order
can be computed in O(m) time [2], so can a minimum-size valid set.
Algorithm 9: Construction of a minimum-size valid set A′
Initialize A′ to be empty. For each vertex v 6= s, apply the appropriate one of the following cases,
where t(v) and d(v) are the parent of v in T and D respectively (d(v) is the immediate dominator
of v):
Case 1: t(v) = d(v). Do nothing.
Case 2: t(v) 6= d(v) and (d(v), v) ∈ A. Add (d(v), v) to A′ .
Case 3: (d(v), v) 6∈ A.
Subcase 3a: t(v) > v. Add to A′ an arc (x, v) with x < v.
Subcase 3b: t(v) < v. Add to A′ an arc (x, v) with x > v and x not a descendant of v in D.
Theorem 1. The set A′ computed by Algorithm 9 is a minimum-size valid set.
Proof. First, we show that in each occurrence of Cases 2 and 3, an arc will be added to A′ . This is
obvious for Case 2. To show that this is true for Case 3, we use the definition of a low-high order
[2, Section 2]: for any vertex v 6= s such that (d(v), v) 6∈ A, there are two arcs (u, v) and (w, v)
such that u < v < w and w is not a descendant of v in D. Only one of these arcs can be in T . It
1
Department of Computer Science & Engineering, University of Ioannina, Greece. E-mail: [email protected].
Department of Computer Science, Princeton University, 35 Olden Street, Princeton, NJ, 08540, and Intertrust
Technologies. E-mail: [email protected].
2
1
follows that in both Case 3a and Case 3b, there is an arc that satisfies the stated constraint, and
hence such an arc will be added to A′ .
Second, we show that A′ is valid. To do this, we use the notion of a pair of divergent spanning
trees from [2]. Two spanning trees B and R, both rooted at s, are divergent if, for every vertex
v, the paths from s to v in B and R have only the dominators of v in common. Algorithm 1′
below, which simplifies Algorithm 1 in [2] as discussed just before Theorem 2.10 in [2], constructs
two divergent spanning trees, provided that each step is successful: the proof of Theorem 2.8 in [2]
applies to Algorithm 1′ equally as well as to the original Algorithm 1. Indeed, as does Algorithm
1, Algorithm 1′ constructs a pair of strongly divergent spanning trees, but here we need only the
weaker property of divergence.
Algorithm 1′ : Construction of Two Divergent Spanning Trees B and R
Let D be the dominator tree of flow graph G = (V, A), with a preorder that is a low-high order of
G. For each vertex v 6= s, apply the appropriate one of the following cases to choose arcs (b(v), v)
in B and (r(v), v) in R:
Case 1: (d(v), v) ∈ A. Set b(v) = r(v) = t(v).
Case 2: (d(v), v) 6∈ A. Choose two arcs (u, v) and (w, v) such that u < v < w in low-high order
and w is not a descendant of v in D. Set b(v) = u and r(v) = w.
Suppose we apply Algorithm 1′ to G, but only allow it to choose arcs that are in subgraph G′ .
Suppose Case 1 of Algorithm 1′ applies to v. Then (d(v), v) is in G. But the construction of A′
guarantees that (d(v), v) is in G′ as well. Hence this case will add an arc in G′ , namely (d(v), v), to
both B and R. Suppose Case 2 of Algorithm 1′ applies to v. Then (d(v), v) is not in G. Algorithm 9
will apply Case 3 to v, which guarantees that G′ contains arcs (u, v) and (w, v) such that u < v < w
(in low-high order) and w is not a descendant of v in D: if t(v) > v, t(v) cannot be a descendant of
v in D since there is a v-avoiding path in T from s to t(v). Hence this case can successfully choose
arcs in G′ to add to B and R. We conclude that G′ contains two spanning trees that are divergent
in G. It follows that if v dominates w in G′ , v dominates w in G. The converse is immediate, since
G′ is a subgraph of G. Thus A′ is valid.
Finally, we show that A′ is minimum-size. Set A′ contains an arc (u, v) only if t(v) 6= d(v).
Any valid set must contain an arc entering v, since otherwise t(v) dominates v in G′ , contradicting
validity.
References
[1] S. Baswana, K. Choudhary, and L. Roditty. Fault tolerant reachability for directed graphs.
In Yoram Moses, editor, Distributed Computing, volume 9363 of Lecture Notes in Computer
Science, pages 528–543. Springer Berlin Heidelberg, 2015.
[2] L. Georgiadis and R. E. Tarjan. Dominator tree certification and divergent spanning trees.
ACM Transactions on Algorithms, 12(1):11:1–11:42, November 2015.
[3] T. Lengauer and R. E. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM
Transactions on Programming Languages and Systems, 1(1):121–41, 1979.
2
| 8 |
Asymptotic equivalence of paired Hotelling test and
conditional logistic regression
arXiv:1610.06774v1 [math.ST] 21 Oct 2016
Félix Balazard1,2
1
2
Sorbonne Universités, UPMC Univ Paris 06, CNRS
INSERM U1169, Hôpital Bicêtre, Université Paris-Sud,
[email protected]
Abstract
Matching, the stratification of observations, is of primary importance for the analysis of
observational studies. We show that the score test of conditional logistic regression and the
paired Student/Hotelling test, two tests for paired data, are asymptotically equivalent.
Keywords: matching, conditional logistic regression, asymptotic equivalence, paired
Student test, observational studies.
1
Introduction
Observational studies are the main source of information in many areas of science such
as epidemiology or the social and political sciences (Rosenbaum, 2002). Such studies aim
at estimating the effect of a treatment on an outcome and they differ from randomized
experiments by the absence of random allocation of treatment. This lack of randomization
is due to ethical or economical considerations and as a consequence, observational studies
are subject to confounding. In the typical context of an observational study, we have n
observations of a random outcome Y and a random predictor or treatment X. The analysis
is complicated by the possibility of confounding i.e., the influence of a third variable Z on X
or Y . To take an example, suppose Y is lung cancer, X is yellow coloration of the teeth and Z
is smoker status. If we do not take into account Z, we will find an association between Y and
X but if we control for Z, the association will disappear since both lung cancer and yellow
coloration of the teeth are caused by smoking. In a randomized experiment, randomization
will ensure that the treated and non-treated group have similar values for all confounders.
Matching is an important method to control for bias in observational studies. Matching is
the grouping of observations in strata. Such a grouping is necessary when the observations in
a strata cannot be considered independent. For example, consider a continuous variable, such
as blood pressure, which is measured before and after the beginning of a medical treatment
given to a group of patients. In order to show that the treatment is effective, an incorrect
1
approach would be to compare the mean of the group before treatment to the mean after
treatment using a two-samples Student test. This naive approach relies on the unwarranted
assumption of independence of the measurement of the same patient before and after the
treatment. The correct approach is to compute the difference between blood pressure before
and after treatment for each patient and then to test if the differences have zero mean using
a Student test. This is called the paired Student test. In this simple example, the stratas
are the pairs of observations of the same patient.
In presence of confounding, matching on the values of the confounder remove bias (Rubin,
1973) or when there are several confounders, other techniques based on matching can be
used (Rosenbaum and Rubin, 1983). Matching can also guide the data collection of an
observational study. This is best illustrated by the case-control study in epidemiology. Such a
study begins by gathering disease cases for example at hospitals. The recruitment of controls
is less straightforward than the recruitment of cases and must try and limit confounding.
One way of achieving this is to choose controls that are naturally matched to cases: for
each case, controls are chosen among friends or neighbors whose –potentially unobserved–
confounders are similar to that of the case. As the case and his controls have been chosen
for their similarity, they cannot be considered independent and must be grouped in a strata.
Once a matching is obtained, adapted statistical procedures are needed and especially
statistically sound testing procedures. A good reference on statistical methods for matched
data is the monograph by Breslow and Day (1981). For strata limited to pairs of one case and
one control (or before and after treatment) and when the predictor X is a binary variable,
the so-called McNemar test can be used (McNemar, 1947). In this simple case, there are
only 4 possibilities for each pair. The data can be summarized in the following two-by-two
contingency table.
Table 1: McNemar test
Y =1
X=0 X=1
X=0
a
b
Y =0
X=1
c
d
In the table above, a + d is the number of pairs of a case and a control concordant for the
predictor X and b + c is the number of discordant pairs. The statistic ξmc of the McNemar
test depends only on the numbers of discordant pairs b and c and has the following form:
ξmc =
(b − c)2
.
b+c
Under the null hypothesis of independence between Y and X, ξmc follows the χ2 distribution
asymptotically (McNemar, 1947). This test statistic has the advantage of being computationally simple.
However, in many settings, we have access to more than one control for each case. For
example, in the Isis-Diab study (Balazard et al., 2016), each patient was asked to recruit two
controls . A test for strata of arbitrary size and a binary predictor was proposed in Mantel
and Haenszel (1959) and is now referred to as the Cochran-Mantel-Haenszel (CMH) test. It
2
also provides an estimate of the odd-ratio associated with the predictor. The original article
contains an interesting discussion of practical aspects of the prospective study of disease.
If the predictor is not binary but continuous, appropriate tests are available if the matching is a pairing i.e., each case has exactly one control. If the vector of differences between
cases and controls can be assumed to be normally distributed, a Student test can be applied on this vector to decide if its mean is zero as in our first example. The resulting test
is called the paired Student test (McDonald, 2009, p180-185). The paired Hotelling test
is the generalization of the paired Student test when there are several predictors. When
the normality assumption is not respected, a non-parametric alternative is available via the
Wilcoxon signed rank test.
None of the above procedures allow for analysis of continuous variables with arbitrary
strata size. This was made possible by conditional logistic regression (CLR) first introduced
in Breslow et al. (1978). CLR is however not limited to continuous variables and can be
applied in all settings of the previous tests. As CLR is based on logistic regression, it is more
flexible than the previous tests and allows for multivariate analyses.
When different statistical tests are available for the same data, it is desirable to prove
that their results are similar. For procedures based on maximum likelihood such as CLR,
the three tests of significance for predictors (the Wald test, the likelihood ratio test and the
score test) have been shown to be asymptotically equivalent (Engle, 1984). This result of
asymptotic equivalence is with respect to the null hypothesis as well as to a sequence of local
alternatives.
For the analysis of matched data with a binary predictor, the available tests have been
shown to be identical. When the strata are pairs, both the CMH test and the McNemar test
can be applied and their statistic is identical (Agresti and Kateri, 2011, p413). When the
strata size is arbitrary, CMH and CLR can be applied and the CMH statistic is identical to
the score test statistic of CLR (Day and Byar, 1979) and therefore if the strata are pairs,
the McNemar statistic will be identical to the score test statistic of CLR.
When the strata are pairs and the predictor (resp. predictors) is continuous, the paired
Student test (resp. paired Hotelling test) and CLR can be applied. However, to the best of
the author’s knowledge, there are no results comparing the two procedures in that case. The
objective of this note is to prove that the paired Hotelling test is asymptotically equivalent
to the score test of CLR and therefore also to the Wald and likelihood ratio tests.
We start by deriving the exact form of the two test statistics in section 2. Finally, we
present our result and prove it in section 3.
2
Test statistics
Let Yi` be the label of the `-th individual of the i-th stratum and Xi` ∈ Rp its continuous
predictor value. The paired Hotelling test can be applied when stratas are pairs of discordant
observations and therefore ` ∈ {1, 2}. Without loss of generality, we can assume that Yi1 = 1
and Yi2 = 0.
We are interested in testing the null hypothesis:
H0 : There is no association between Y and X
3
(1)
against the alternative hypothesis:
H1 : There is an association between Y and X.
To test this null hypothesis in this setting, we have two options: the paired Hotelling
test whose test statistic we denote ξhot or CLR whose score test statistic we denote ξsc . We
now derive the expressions of those two test statistics. As we will show below, the paired
Hotelling test and CLR depend only on the vector of differences between pairs. We therefore
denote Zi = Xi1 − Xi2 the difference between pairs.
Paired Hotelling test The hypotheses tested by the paired Hotelling test are expressed
by the parameter µ = (E[Zj ])j∈{1,...,p} , the mean of the difference between pairs. Using this
parameter, the hypothesis (2) becomes H0 : µ = 0.
Let the unbiased sample covariance be defined as:
n
C=
where Z̄ =
1
n
Pn
i=1
1 X
(Zi − Z̄)(Zi − Z̄)> ,
n − 1 i=1
Zi and ∗> is the transposition operator. The statistic of the test is:
ξhot = nZ̄ > C −1 Z̄.
(2)
When Z follows a centered Gaussian distribution, the distribution of ξhot is called the
Hotelling distribution.
Conditional Logistic Regression score test In logistic regression, the likelihood of an
observation, given the parameters α ∈ R and β ∈ Rp , equals:
>
ey(α+β X)
P(Y = y|X) =
,
>
1 + eα+β X
with y ∈ {0, 1}.
Logistic regression can take into account stratification by having a different constant term
αi for each stratum. However, when the strata are small e.g., pairs, this leads to a large
number of parameters and biases parameter estimation (Breslow and Day, 1981, p249-251).
Conditional logistic regression adresses the problem by conditioning the likelihood on the
number of cases in each stratum. This eliminates the need to estimate the αi . In the case
of pairings, when the first observation is a case and the second is a control, the conditional
likelihood of the i-th strata is:
4
P(Yi1 = 1, Yi2 = 0|Xi1 , Xi2 , Yi1 + Yi2 = 1)
P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 )
=
P(Yi1 = 1|Xi1 )P(Yi2 = 0|Xi2 ) + P(Yi1 = 0|Xi1 )P(Yi2 = 1|Xi2 )
=
=
=
exp(αi +β > Xi1 )
1+exp(αi +β > Xi1 )
×
1
1+exp(αi +β > Xi2 )
exp(αi +β > Xi1 )
exp(αi +β > Xi2 )
× 1+exp(α 1+β> X ) + 1+exp(α 1+β> X ) × 1+exp(α
>
1+exp(αi +β > Xi1 )
i
i2
i
i1
i +β Xi2 )
exp(β > Xi1 )
(The αi have been eliminated.)
exp(β > Xi1 ) + exp(β > Xi2 )
1
.
1 + exp(β > (Xi2 − Xi1 ))
In the general case, when there is k cases in a strata of size m, with the cases being the first
k observations, the conditional likelihood of a strata can be written:
P
m
X
exp( kj=1 β > Xij )
P(Yij = 1 for j ≤ k, Yij = 0 for j > k|Xi1 , . . . , Xim ,
Yij = k) = P
,
P
>
exp(β
X
)
m
ij
J∈C
j∈J
j=1
k
where Ckm is the set of all subsets of size k of the set {1, . . . , m}.
To obtain the full conditional likelihood, we multiply over each stratum and take the log
to obtain the log-likelihood L(β, Z):
L(β, Z) = −
n
X
log(1 + e−β
>
Zi
).
i=1
The score s(β, Z) is then defined by:
n
X
Zi
∂L
(β, Z) =
s(β, Z) =
.
>
∂β
exp(β Zi ) + 1
i=1
If β = β 0 , the covariance matrix of s(β 0 , Z) is Fisher’s information matrix:
!
n
X
Zij Zik exp(β >
Z
)
∂ 2L
i
0
I(β 0 ) = E[−
(β , z)|β 0 ]
=
>
∂β j ∂β k 0
(exp(β
Z
)
+
1)2
0 i
j,k∈{1,...,p}
i=1
.
j,k∈{1,...,p}
To test the hypothesis H0 : β = β 0 , the score test statistic is:
ξsc = s(β 0 , Z)> I(β 0 , z)−1 s(β 0 , Z)
Expressed using β, hypothesis (2) becomes H0 : β = 0. As shown above, the null
hypothesis of the paired Hotelling test is expressed using µ, the mean of the difference
between pairs, rather than β, the regression coefficient. There is no general correspondence
between the two parameters. However, the two null hypotheses that are of interest in practice
are the same: µ = 0 ⇐⇒ β = 0.
5
For β = 0, the score, Fisher’s information matrix and the test statistic become:
n
s(0, Z) = Z̄,
2
n
1X
Zi Zi>
I(0, Z) =
4 i=1
and
n
ξsc = nZ̄ >
1X
Zi Zi>
n i=1
!−1
Z̄.
(3)
Now that we have expressed analytically ξhot and ξsc , we state our result in the following
section.
3
Asymptotic equivalence
In this section, we introduce the sequence of local alternatives and state the result of asymptotic equivalence between the two tests.
We adopt the framework of Engle (1984) for asymptotic equivalence. The motivation for
considering a sequence of local alternatives is that any reasonable test will have the right
size and will reject a fixed alternative when the number of observations becomes large. The
sequence of local alternatives considers deviations from the null that approach the null as
sample size increases. This allows to compare tests more precisely.
(n)
We model the sequence of local alternatives by a triangular array of observations (Zi )n∈N,i∈{1,...,n}
that respects the following assumption. Let δ ∈ Rp and Σ be a positive definite matrix of
dimension p.
(n)
Assumption 1. For all n ∈ N, i ∈ {1, . . . , n}, we have E[Zi ] =
(n)
In addition, Wi
(n)
= Zi
−
√δ
n
√δ
n
(n)
and Cov[Zi ] = Σ.
are independent and identically distributed.
The triangular array of Assumption 1 is the sequence of local alternatives. The parameter δ controls the deviation from the null. The
√ null hypothesis is the special case of
the sequence of local alternatives when δ = 0. The n in the denominator of the deviation
shrinks the deviation towards the null as the sample size increases. This particular power of
n ensures that the test statistics are well-behaved as they converge in distribution.
We denote ξsc,n (resp. ξhot,n ) the statistic of the score test (resp. of the paired Hotelling
test) associated with Z (n) , the n-th line of the triangular array of Assumption 1. In
the same fashion as for the Student distribution and the χ2 distribution, the Hotelling
distribution with degrees of freedom p and n − 1 and the χ2p distribution are different for
P
finite samples but they are the same asymptotically. Therefore, ξsc,n −ξhot,n −
→ 0 is enough to
guarantee asymptotic equivalence. Our theorem is more precise as it includes the convergence
rate and limiting distribution of this difference. We note the convergence in distribution d.
Theorem 1. Under the null or a sequence of local alternatives, the paired Hotelling test and
the score test of CLR are asymptotically equivalent. More precisely, under Assumption 1,
we have:
d
n(ξsc,n − ξhot,n ) →
− K
6
where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ) and N
refers to the normal distribution.
Examples of distribution of K for p = 1, Σ = σ 2 = 1 and different values of δ are shown
in figure 1. We see that for small values of δ, K is concentrated between 0 and 1/4. As δ
grows, the distribution shifts to large, negative values.
For the practitioner, the result of Theorem 1 will not affect the choice of test but ensures
that similar conclusions are reached regardless of that choice. The result also implies that
CLR can be considered a generalization of the paired Hotelling or Student test when the
conditions for the latter do not apply.
Proof of Theorem 1 To facilitate the notation, we omit the dependence in n in most
quantities, writing Z instead of Z (n) . The quantity we want to estimate is:
n(ξsc,n − ξhot,n ) = n2 Z̄ > (Ĩ −1 − C −1 )Z̄ = n2 Z̄ > Ĩ −1 (C − Ĩ)C −1 Z̄,
(4)
P
where Ĩ = n1 ni=1 Zi Zi> .
The Lindeberg-Feller Central Limit Theorem for triangular arrays (Hall and Heyde, 1980,
(n)
Theorem 3.2 p58) applied on the Wi gives:
√
d
nZ̄ →
− (δ + V ),
(5)
with V ∼ N (0, Σ). The weak law of large numbers for triangular arrays implies:
P
C−
→ Σ.
(6)
1X
1X
P
Ĩ =
Zi Zi> =
(Zi − Z̄)(Zi − Z̄)> + Z̄ Z̄ > −
→Σ
n i=1
n i=1
(7)
Combining (5) and (6), we see:
n
n
and, using the second identity in (7), we obtain:
d
n(C − Ĩ) = C − nZ̄ Z̄ > →
− Σ − (δ + V )(δ + V )> .
Applying Slutsky’s lemma to all of the above, we conclude:
d
n(ξsc,n − ξhot,n ) →
− K
where K = (δ + V )> Σ−1 Σ − (δ + V )(δ + V )> Σ−1 (δ + V )> with V ∼ N (0, Σ). This
concludes the proof of Theorem 1.
Acknowledgements
The author thanks Gérard Biau for his supervision and his many comments on the manuscript.
Funding: The author acknowledges a PhD grant from École Normale Supérieure.
7
Delta=1
Density
3
6
0
0
1
2
2
4
Density
4
8
5
6
10
Delta=0
−0.8
−0.6
−0.4
−0.2
0.0
0.2
−1.0
−0.8
−0.6
−0.4
−0.2
K
K
Delta=2
Delta=3
0.0
0.2
0.0
0.2
0.0
0.00
0.2
0.05
0.10
Density
0.6
0.4
Density
0.8
1.0
0.15
1.2
−1.0
−1.0
−0.8
−0.6
−0.4
−0.2
0.0
0.2
−1.0
K
−0.8
−0.6
−0.4
−0.2
K
Figure 1: Distribution of K. Distribution of the limit variable for p = 1, Σ = σ 2 = 1 and
δ ∈ {0, 1, 2, 3}.
8
References
References
P. Rosenbaum. Observational Studies. Springer, New York, 2002.
D. Rubin. Matching to remove bias in observational studies. Biometrics, 29:159–183, 1973.
P. Rosenbaum and D. Rubin. The central role of the propensity score in observational studies
for causal effects. Biometrika, 70:41–55, 1983.
N.E. Breslow and N.E. Day. Statistical methods in cancer research. The analysis of casecontrol studies. International Agency for Research on Cancer, Lyon, 1981.
Q. McNemar. Note on the sampling error of the difference between correlated proportions
or percentages. Psychometrika, 12:153–157, 1947.
F. Balazard, S. Le Fur, S. Valtat, Isis Diab collaborative group, A.-J. Valleron, and
P. Bougnères. Association of environmental markers with childhood type 1 diabetes mellitus revealed by a long questionnaire on early life exposures and lifestyle in a case-control
study. BMC Public Health, 2016.
N. Mantel and W. Haenszel. Statistical aspects of the analysis of data from retrospective
studies. Journal of the national cancer institute, 22:719–748, 1959.
J.H. McDonald. Handbook of Biological Statistics. Sparky House Publishing, Baltimore,
2009.
N.E. Breslow, N.E. Day, K.T. Halvorsen, R.L. Prentice, and C. Sabai. Estimation of multiple
relative risk functions in matched case-control studies. American Journal of Epidemiology,
108:299–307, 1978.
R.F. Engle. Wald, likelihood ratio, and lagrange multiplier tests in econometrics. Handbook
of Econometrics, 2:775–826, 1984.
A. Agresti and M. Kateri. Categorical Data Analysis. Springer, Berlin, Heidelberg, 2011.
N.E. Day and D.P. Byar. Testing hypotheses in case-control studies-equivalence of mantelhaenszel statistics and logit score tests. Biometrics, 35:623–630, 1979.
P. Hall and C.C. Heyde. Martingale limit theory and its application. Academic Press., New
York, 1980.
9
| 10 |
Flexible and Creative Chinese Poetry Generation Using Neural Memory
Jiyuan Zhang1,2 , Yang Feng3,1,4 , Dong Wang1∗,
Yang Wang1 , Andrew Abel6 , Shiyue Zhang1,5 , Andi Zhang1,5
1
Center for Speech and Language Technologies(CSLT), RIIT, Tsinghua University, China
2
Shool of Software & Microelectronics, Peking University, China
3
Key Laboratory of Intelligent Information Processing,Institute of Computing Technology,CAS
4
Huilan Limited, Beijing, China
5
Beijing University of Posts and Telecommunications, China
6
Xi’an Jiaotong-Liverpool University, China
zhangjy [email protected], [email protected]
arXiv:1705.03773v1 [cs.AI] 10 May 2017
Abstract
It has been shown that Chinese poems can be successfully generated by
sequence-to-sequence neural models, particularly with the attention mechanism. A
potential problem of this approach, however, is that neural models can only learn
abstract rules, while poem generation is a
highly creative process that involves not
only rules but also innovations for which
pure statistical models are not appropriate in principle. This work proposes a
memory-augmented neural model for Chinese poem generation, where the neural
model and the augmented memory work
together to balance the requirements of
linguistic accordance and aesthetic innovation, leading to innovative generations
that are still rule-compliant. In addition, it is found that the memory mechanism provides interesting flexibility that
can be used to generate poems with different styles.
1
Introduction
Classical Chinese poetry is a special cultural heritage with over 2,000 years of history and is still
fascinating us today. Among the various genres, perhaps the most popular one is the quatrain,
a special style with a strict structure (four lines
with five or seven characters per line), a regulated
rhythmical form (the last characters in the second
and fourth lines must follow the same rhythm),
and a required tonal pattern (tones of characters in
some positions should satisfy a predefined regulation) (Wang, 2002). This genre flourished mostly
in the Tang Dynasty, and so are often called ‘Tang
1
Corresponding author: Dong Wang; RM 1-303, FIT
BLDG, Tsinghua University, Beijing (100084), P.R. China.
poems’. An example of a quatrain written by
Wei Wang, a famous poet in the Tang Dynasty, is
shown in Table 1.
Due to the stringent restrictions in both rhythm
and tone, it is not trivial to create a fully
rule-compliant quatrain. More importantly, besides such strict regulations, a good quatrain
should also read fluently, hold a consistent theme,
and express a unique affection. Therefore, poem
generation is widely recognized as a very intelligent activity and can be performed only by knowledgeable people with a lot of training.
乐游原
Climbing the Paradise Mound
向晚意不适, (* Z Z P Z)
As I was not in a good mood this
evening round,
驱车登古原。 (P P P Z P)
I went by cart to climb the Ancient
Paradise Mound.
夕阳无限好, (* P P Z Z)
It is now nearing dusk,
只是近黄昏。 (* Z Z P P)
When the setting sun is infinitely fine,
which is a must.
Table 1: An example of a 5-char quatrain. The
tonal pattern is shown at the end of each line,
where ’P’ indicates a level tone, ’Z’ indicates a
downward tone, and ’*’ indicates the tone can be
either. The translation is from (Tang, 2005).
In this paper we are interested in machine poetry generation. Several approaches have been
studied by researchers. For example, rule-based
methods (Zhou et al., 2010), statistical machine
translation (SMT) models (Jiang and Zhou, 2008;
He et al., 2012) and neural models (Zhang and Lapata, 2014; Wang et al., 2016a,c). Compared to
previous approaches (e.g., rule-based or SMT), the
neural model approach tends to generate more fluent poems and some generations are so natural that
even professional poets can not tell they are the
work of machines (Wang et al., 2016a).
In spite of these promising results, neural models suffer from a particular problem in poem generation, a lack of innovation. Due to the statistical
nature of neural models, they pay much more attention to high-frequency patterns, whereas they
ignore low-frequency ones. In other words, the
more regular and common the patterns, the better the neural model is good at learning them and
tends to use them more frequently at run-time.
This property certainly helps to generate fluent
sentences, but it is not always useful: the major
value of poetry is not fluency, but the aesthetic innovation that can stimulate some unique feelings.
This is particularly true for Chinese quatrains that
are highly compact and expressive: it is nearly
impossible to find two similar works in the thousands of years of history in this genre, demonstrating the importance of uniqueness or innovation.
Ironically, the most important thing, innovation, is
largely treated as trivial, if not noise, by present
neural models.
Actually this problem is shared by all generation models based on statistics (although it is
more serious for neural models) and has aroused a
long-standing criticism for machine poem generation: it can generate, and sometimes generate well,
but the generation tends to be unsurprising and not
particularly interesting. More seriously, this problem exists not only in poem generation, but also in
all generation tasks that require innovation.
This paper tries to solve this extremely challenging problem. We argue that the essential problem is that statistical models are good at learning general rules (usage of regular words and their
combinations) but are less capable of remembering special instances that are difficult to cover
with general rules. In other words, there is only
rule-based reasoning, no instance-based memory.
We therefore present a memory-augmented neural model which involves a neural memory so that
special instances can be saved and referred to at
run-time. This is like a human poet who creates
poems by not only referring to common rules and
patterns, but also recalls poems that he has read
before. It is hard to say whether this combination
of rules and instances produces true innovation
(which often requires real-life motivation rather
than simple word reordering), but it indeed offers
interesting flexibility to generate new outputs that
look creative and are still rule-compliant. Moreover, this flexibility can be used in other ways, e.g.,
generating poems with different styles.
In this paper, we use the memory-augmented
neural model to generate flexible and creative Chinese poems. We investigate three scenarios where
adding a memory may contribute: the first scenario involves a well trained neural model where
we aim to promote innovation by adding a memory, the second scenario involves an over-fitted
neural model where we hope the memory can regularize the innovation, and in the third scenario,
the memory is used to encourage generation of poems of different styles.
2
Related Work
A multitude of methods have been proposed for
automatic poem generation. The first approach
is based on rules and/or templates. For example,
phrase search (Tosa et al., 2009; Wu et al., 2009),
word association norm (Netzer et al., 2009), template search (Oliveira, 2012), genetic search (Zhou
et al., 2010), text summarization (Yan et al., 2013).
Another approach involves various SMT methods,
e.g., (Jiang and Zhou, 2008; He et al., 2012). A
disadvantage shared by the above methods is that
they are based on the surface forms of words or
characters, having no deep understanding of the
meaning of a poem.
More recently, neural models have been the subject of much attention. A clear advantage of the
neural-based methods is that they can ‘discover’
the meaning of words or characters, and can therefore more deeply understand the meaning of a
poem. Here we only review studies on Chinese
poetry generation that are mostly related to our research. The first study we have found in this direction is the work by Zhang and Lapata (2014),
which proposed an RNN-based approach that produces each new line character-by-character using a
recurrent neural network (RNN), with all the lines
generated already (in the form of a vector) as a
contextual input. This model can generate quatrains of reasonable quality. Wang et al. (2016b)
proposed a much simpler neural model that treats
a poem as an entire character sequence, and poem
generation is conducted character-by-character.
This approach can be easily extended to various
genres such as Song Iambics. To avoid theme drift
caused by this long-sequence generation, Wang
et al. (2016b) utilized the neural attention mechanism (Bahdanau et al., 2014) by which human intention is encoded by an RNN to guide the generation. The same model was used by Wang
et al. (2016a) for Chinese quatrain generation.
Yan (2016) proposed a hierarchical RNN model
that conducts iterative generation. Recently, Wang
et al. (2016c) proposed a similar sequence generation model, but with the difference that attention
is placed not only on the human input, but also on
all the characters that have been generated so far.
They also proposed a topic planning scheme to encourage a smooth and consistent theme.
All the neural models mentioned above try
to generate fluent and meaningful poems, but
none of them consider innovation.
The
memory-augmented neural model proposed in this
study intends to address this issue. Our system
was built following the model structure and training strategy proposed by Wang et al. (2016a) due
to its simplicity and demonstrated quality, but the
memory mechanism is general and can be applied
to any of the models presented above.
The idea of memory argumentation was inspired by the recent advance in neural Turing machine (Graves et al., 2014, 2016) and memory network (Weston et al., 2014). These new models
equip neural networks with an external memory
that can be accessed and manipulated via some
trainable operations. In comparison, the memory
in our work plays a simple role of knowledge storage, and the only operation is simple pre-defined
READ. In this sense, our model can be regarded
as a simplified neural Turing machine that omits
training.
Figure 1: The memory-augmented neural model
used for Chinese poetry generation.
In this section, we first present the idea of memory
augmentation, and then describe the model structure and training method.
able. The memory component involves a set of
‘direct’ mappings from input to output, and therefore can be used to memorize some special cases
of the generation that can not be represented by
the neural model. For poem generation, the memory stores the information regarding which character should be generated in a particular context.
The output from the two components are then integrated, leading to a consolidated output.
There are several ways to understand the
memory-augmented neural model. Firstly, it can
be regarded as a way of combining reasoning (neural model) and knowledge (memory). Secondly, it
can be regarded as a way of combining rule-based
inference (neural model) and instance-based retrieval (memory). Thirdly, it can be regarded
as a way of combining predictions from complementary systems, where the neural model is
continuous and parameter-shared, while the memory is discrete and contains no parameter sharing. Finally, the memory can be regarded as an
effective regularization that constrains and modifies the behavior of the neural model, resulting
in generations with desired properties. Note that
this memory-augmented neural model is inspired
by and related to the memory network proposed
by Weston et al.(2014) and Graves et al.(2016), but
we more focus on an accompanying memory that
plays the role of assistance and regularization.
3.1
3.2
3
Memory-augmented neural model
Memory augmentation
The idea of memory augmentation is illustrated
in Fig. 1. It contains two components, the neural model component on the left, and the memory component on the right. In this work, the
attention-based RNN generation model presented
by (Wang et al., 2016a) is used as the neural model
component, although any neural model is suit-
Model structure
Using the Chinese poetry generation model shown
in Fig. 1 as an example, this section discusses the
creation of a memory-augmented neural model.
Firstly, the neural model part is an attentionbased sequence-to-sequence model (Bahdanau
et al., 2014). The encoder is a bi-directional
RNN (with GRU units) that converts the in-
put topic words, denoted by the embeddings
of the compositional characters (x1 , x2 , ..., xN ),
into a sequence of hidden states (h1 , h2 , ..., hN ).
The decoder then generates the whole quatrain
character-by-character, denoted by the corresponding embeddings (y1 , y2 , ...). At each step t,
the prediction for the state st is based on the last
generation yt−1 , the previous status st−1 of the decoder, as well as all the hidden states (h1 , h2 , ...)
of the encoder. Each hidden state hi contributes to
the generation according to a relevance factor αt
that measures the similarity between st−1 and hi .
This is written as:
st = fd (yt−1 , st−1 ,
N
X
αt,i hi )
i=1
where αt,i represents the contribution of hi to the
present generation, and can be implemented as any
function. The output of the model is a posterior
probability over the whole set of characters, written by
zt = σ(st W )
where W is the projection parameter.
The memory consists of a set of elements
{mi }K
i=1 , where K is the size of the memory. Each
element mi involves two parts, the source part
mi (s), that encodes the context, i.e. when this element should be selected, and the target part mi (g),
that encodes what should be output if this element
is selected. In our study, the neural model is firstly
trained, and then the memory is created by running
fd (the decoder of the neural model). Specifically,
for the k-th poem selected to be in the memory, the
character sequence is input to the decoder one by
one, with the contribution from the encoder set to
zero. Denoting the starting position of this poem
in the memory is pk , the status of the decoder at the
j-th step is used as the source part of the (pk +j)-th
element of the memory, and the embedding of the
corresponding character, xj , is set to be the target
part. this is formally written as:
mi (s) = fd (xj−1 , sj−1 , 0)
(1)
st , and then the outputs of the selected elements
are averaged as the output of the memory component. We choose cosine distance to measure the
fitting degree, and have1 :
vt =
K
X
cos(st , mi (s))mi (g).
(2)
i=1
The output of the neural model and the memory
can be combined in various ways. Here, a simple
linear combination before the softmax is used, i.e.,
zt = σ(st W + βvt E)
(3)
where β is a pre-defined weighting factor, and E
contains word embeddings of all the characters.
Although it is possible to train β from the data,
we found that the learned β is not better than the
manually-selected one. This is probably because
β is a factor to trade-off the contribution from
the model and the memory, and how to make the
trade-off should be a ‘prior knowledge’ rather than
a tunable parameter. In fact, if it is trained, than it
will be immediately adapted to match the training
data, which will nullify our effort to encourage innovative generation.
3.3
Model Training
In our implementation, only the neural model
component is required to be trained. The training
algorithm follows the scheme defined in (Wang
et al., 2016a), where the cross entropy between the
distributions over Chinese characters given by the
decoder and the ground truth is used as the objective function. The optimization uses the SGD
algorithm together with AdaDelta to adjust the
learning rate (Zeiler, 2012).
4
Memory augmentation for Chinese
poetry generation
This section describes how the memory mechanism can be used to trade-off between the requirements for rule-compliant generation and aesthetic
innovation, and how it can also be used to do more
interesting things, for example style transfer.
and
mi (g) = xj
where
i = pk + j.
4.1
In this section, we describe how the memory
mechanism promotes innovation. Monitoring the
1
At run-time, the memory elements are selected
according to their fit to the present decoder status
Memory for innovative generation
In fact, we run a parallel decoder to provide st in Eq.(2).
This decoder does not accept input from the encoder and so
is consistent with the memory construction process as Eq.(1).
training process for the attention-based model, we
found that the cost on the training set will keep
decreasing until approaching zero, but on the validation set, the degradation stops after only one
iteration. This can be explained by the fact that
Chinese quatrains are highly unique, so the common patterns can be fully learned in one iteration,
resulting in overfitting with additional iterations.
Due to the overfitting, we observe that with the
one-iteration model, reasonable poems can be generated, and with the over-fitted model, the generated poems are meaningless, in that they do not
resemble feasible character sequences.
The energy model perspective helps to explain
this difference. For the one-iteration model, the
energy surface is smooth and the energy of the
training data is not very low, as illustrated in plot
(a) in Fig. 2, where the x-axis represents the input
and y-axis represents the output, and the z-axis
represents the energy. With this model, inputs
with small variance will be attracted to the same
low-energy area, leading to similar generations.
These generations are trivial, but at least reasonable. If the model is overfitted, however, the energy at the locations of the training data becomes
much lower than their surrounding areas, leading to a bumpy energy surface as shown in plot
(b) in Fig. 2. With this model, inputs with a
small variation may be attracted to very different
low-energy areas, leading to significantly different generations. Since many of the low-energy areas are nothing to do with good generations but
are simply caused by the complex energy function, the generations can be highly surprising for
human readers, and the quality is not guaranteed.
In some sense, these generations can be regarded
as ‘innovative’ , but based on observations made
in our experiments, most of them are meaningless.
The augmented memory introduces a new energy function, which is combined with the energy
function of the neural model to change the energy
surface of the generation system. This can be seen
in Eq. (3), where st W and βvt E can be regarded
as the energy function of the neural model component and the memory component, respectively,
and the energy function of the memory-augmented
system is the sum of the energy functions of these
two components. For this reason, the effect of the
memory mechanism can be regarded as a regularization of the neural model that will adjust its generation behavior.
This regularization effect is illustrated in Fig. 2,
where the energy function of the memory shown
in plot (c) is added to the energy function of the
one-iteration model and the overfitted model, as
shown in plot (e) and plot (f) respectively. It
can be seen that with the memory involved, the
energy surface becomes more bumpy with the
one-iteration model, and more smooth with the
overfitted model. In the former case, the effect
of the memory is to encourage innovation, while
still focusing on rule-compliance, and in the latter
case, the effect is to encourage rule compliance,
while keeping the capability for innovation.
It is important to notice that the energy function
of the memory component is a linear combination
of the energy functions of the compositional elements (see Eq.(2)), each of which is convex and
is minimized at the location represented by the
element. This means that the energy surface of
the memory is rather ‘healthy’, in the sense that
low-energy locations mostly correspond to good
generations. For this reason, the regularization
provided by the memory is safe and helpful.
4.2
Memory for style transfer
The effect of the memory is easy to control. For
example, the complexity of the behavior can be
controlled by the memory size, the featured bias
can be controlled by memory selection, and the
strength of the impact can be controlled by the
weighting parameter β. This means that the memory mechanism is very flexible and can be used to
produce poems with desired properties.
In this work, we use these capabilities to generate poems with different styles. This has been
illustrated in Fig. 2, where the energy function of
the style memory shown in plot (d) is biased towards a particular style, and once it is added to
energy function of the one-iteration model, the resulting energy function shown in plot (g) obtains
lower values at locations corresponding to the locations of the memory, which encourages generation of poems with similar styles as those poems
in the memory.
5
Experiments
This section describes the experiments and results
carried out in this paper. Here, The baseline system was a reproduction of the Attention-based system presented in (Wang et al., 2016a). the model
in This system has been shown to be rather flexi-
Figure 2: The energy surface for (a) one-iteration model (b) overfitted model (c) memory (d) style
memory (e) one-iteration model augmented with memory (f) overfitted model augmented with memory
(g) one-iteration model augmented with style memory.
ble and powerful: it can generate different genres
of Chinese poems, and when generating quatrains
it has been shown to be able to fool human experts in many cases (Wang et al., 2016a) and the
authors had did a thorough comparison with competitive methods mentioned in the related work
of this paper. We obtained the database and the
source code (in theano), and reproduced their system using Tensorflow from Google2 . We didn’t
make comparisons with some previous methods
such as NNLM, SMT, RNNPG as they had been
fully compared in (Wang et al., 2016a) and all of
them were much worse than the attention-based
system. Another reason was that the experts were
not happy to evaluate poems with clearly bad quality. We also reproduced the model in (Wang et al.,
2016c) with the help of the first author. However,
since their implementation did not involve any restrictions on rhythm and tone, the experts were reluctant to recognize them as good poems. With
a larger dataset (e.g., 1 Million poems), it is assumed that the rhythm and tone can be learned and
their system would be good in both fluency and
rule compliance. It should be also emphasized that
the memory approach proposed in this paper is a
general technique and is complementary to other
efforts such as the planning approach (Wang et al.,
2016c) and the recursive approach (Yan, 2016).
Based on the baseline system, we built the
memory-augmented model, and conducted two
2
https://www.tensorflow.org/
experiments to demonstrate its power. The first is
an innovation experiment which employs memory
to promote or regularize the generation of innovative poems, and the second is a style-transfer experiment which employs memory to generate flexible poems in different styles.
We invited 34 experts to participate in the experiments, and all of them have rich experience
not only evaluating poems, but also in writing
them. Most of the experts are from prestigious institutes, including Peking university and the Chinese Academy of Social Science (CASS). Following the suggestions of the experts, we use five metrics to evaluate the generation, as listed below:
• Compliance: if regulations on tones and
rhymes are satisfied;
• Fluency: if the sentences read fluently and
convey reasonable meaning;
• Theme consistency: if the entire poem adheres to a single theme;
• Aesthetic innovation: if the quatrain stimulates any aesthetic feeling with elaborate innovation;
• Scenario consistency: if the scenario remains
consistent.
5.1
Datasets
The baseline system was built with two customized datasets. The first dataset is a Chinese
poem corpus (CPC), which we used in this work to
train the embeddings of Chinese characters. Our
CPC dataset contains 284,899 traditional Chinese
poems in various genres, including Tang quatrains,
Song Iambics, Yuan Songs, and Ming and Qing
poems. This large quantity of data ensures reliable
learning for the semantic content of most Chinese
characters.
Our second dataset is a Chinese quatrain corpus (CQC) that we have collected from the internet, which consists of 13, 299 5-char quatrains
and 65, 560 7-char quatrains. This corpus was
used to train the attention-based RNN baseline.
We filtered out the poems whose characters are
all low-frequency (less than 100 counts in the
database). After the filtering, the remaining corpus
contains 9,195 5-char quatrains and 49,162 7-char
quatrains. We used 9,000 5-char and 49,000
7-char quatrains to train the attention model, and
the rest for validation.
Another two datasets were created for use in
the memory-augmented system. Our first dataset,
MEM-I, contains 500 quatrains randomly selected
from our CQC corpus. This dataset was used
to produce the memory in the innovation experiment; the second dataset, MEM-S, contains 300
quatrains with clear styles, including 100 pastoral,
100 battlefield and 100 romantic quatrains. It was
used to generate memory with different styles in
the style-transfer experiment. All the datasets will
be released online3 .
5.2
Evaluation Process
We invited 34 experts to evaluate the quality of
the poem generation. In the innovation experiment, the evaluation consisted of a comparison
between different systems and configurations in
terms of the five metrics. The innovation questions
presented the expert with two poems, and asked
them to judge which of the poems was better in
terms of the five metrics; in the style-transfer experiment, the evaluation was performed by identifying the style of a generated poem. The evaluation was conducted online, with each questionnaire containing 11 questions focusing on innovation and 4 questions concerned with style-transfer.
Each of the style-transfer questions presented the
expert with a single poem and asked them to score
it between 1 to 5, with a larger score being better, in terms of compliance, aesthetic innovation,
3
http://vivi.cslt.org
scenario consistency, and fluency. They were also
asked to specify the style of the poem.
Using the poems generated by our systems, we
generated many different questions of both types,
and then created a number of online questionnaires
that randomly selected from these questions. This
meant that as discussed above, each questionnaire
had 11 randomly selected innovation questions,
and 4 randomly selected style transfer questions.
Each question was only used once, meaning that
it was not duplicated on multiple questionnaires,
and so each questionnaire was different.
Experts could choose to answer multiple questionnaires if they wished, as each one was different. From the 34 experts, we collected 69 completed questionnaires, which equals to 759 innovation questions and 276 style-transfer questions.
5.3
Innovation experiment
This experiment focuses on the contribution of
memory for innovative poem generation. We experimented with two configurations: one is with
a one-iteration model (C1 ) and the other is with
an overfitted model (C∞ ). The memory was generated from the 500 quatrains in MEM-I, and the
weighting factor was defined empirically as 16 for
C1 and 49 for C∞ .
The topics of the generation were 160 keywords
randomly selected from Shixuhanyinge (Liu,
1735). Given a pair of poems generated by two
different configurations using the same topic, the
experts were asked to choose which one they preferred. The evaluation is therefore pair-wised, and
each pair of configurations contains at least 180
evaluations. The results are shown in Table 2,
where the preference ratio for each pair of configurations was tested in terms of the 5 metrics.
From the first row of Table 2, we observe that
the experts have a clear preference for the poems
generated by the C1 model, the one that can produce fluent yet uninteresting poems. In particular, the ‘aesthetic innovation’ score for C∞ is not
better than C1 , which was different from what
we expected. Informal offline discussions with
the poetry experts found that the experts identified some innovative expression in the C∞ condition, but most of the them was regarded as being
nonsense in the opinion of many of the experts.
In comparison to sparking innovation, fluency and
being meaningful is more important not only for
non-expert readers, but also for professional po-
C1 vs C∞
C1 vs C1 +Mem
C∞ vs C∞ +Mem
C1 vs C∞ +Mem
Compliance
Fluency
0.59:0.41
0.41:0.59
0.40:0.60
0.43:0.57
0.68:0.32
0.36:0.64
0.26:0.74
0.58:0.42
Preference Ratio
Theme
Consistency
0.70:0.30
0.37:0.63
0.32:0.68
0.59:0.41
Aesthetic
Innovation
0.68:0.32
0.33:0.67
0.30:0.70
0.50:0.50
Scenario
Consistency
0.69:0.31
0.43:0.57
0.36:0.64
0.59:0.41
Table 2: Preference ratios for systems with or without overfitting and with or without memory augmentation.
ets. In other words, only meaningful innovation is
regarded as innovation, and irrational innovation
is simply treated as junk.
From the second and third rows of Table 2, it
can be seen that involving memory significantly
improves both C1 and C∞ , particularly for C∞ .
For C1 , the most substantial improvement is observed in terms of ‘Aesthetic innovation’, which
is consistent with our argument that memory can
help encourage innovation for this model. For
C∞ , ‘Fluency’ seems to be the most improved
metric. This is also consistent with our argument
that involving memory constrains over-innovation
for over-fitted models.
The last row of Table 2 is an extra experiment that investigates if C∞ is regularized well
enough after introducing the memory. It seems
that with the regularization, the overfitting problem is largely solved, and the generation is nearly
as fluent and consistent as the C1 condition. Interestingly, the score for aesthetic innovation is
also significantly improved. Since the regularization is not supposed to boost innovation, this
seems confusing at first glance (in comparison to
the result on the same metric in the first row),
but this is probably because the increased fluency
and consistency makes the innovation more appreciated, therefore doubly confirming our argument that true innovation should be reasonable and
meaningful.
5.4
Style-transfer experiment
In the second experiment, the memory mechanism is used to generate poems in different styles.
We chose three styles: pastoral, battlefield, and
romantic. A style-specific memory, which we
call style memory, was constructed for each style
by the corresponding quatrains in the MEM-S
dataset. The system with one-iteration model C1
was used as the baseline. Two sets of topics were
used in the experiment, one is general and the
other is style-biased. The experiments then investigate if the memory mechanism can produce
a clear style if the topic is general, and can transfer to a different style if the topic is style-biased
already. The experts were asked to specify the
style from four options including the three defined
above and a ‘unclear style’ option. In addition,
the experts were asked to score the poems in terms
of compliance, fluency, aesthetic innovation, and
scenario consistency, which we can use to check if
the style transfer impacts the quality of the poem
generation. Note that we did not ask for the theme
consistency to be scored in this experiment because the topic words were not presented to the
experts, in order to prevent the topic affecting their
judgment regarding the style. The score ranges
from 1 to 5, with a larger score being better.
Table 3 presents the results with the general topics. The numbers show the probabilities that the
poems generated by a particular system were labeled as having various styles. Since the topics
are unbiased in types, the generation of the baseline system is assumed to be with unclear styles.
For other systems, the style of the generation is
assumed to be the same as the style of their memories. The results in Table 3 clearly demonstrates
these assumptions. The tendency that romantic
poems are recognized as pastoral poems is a little surprising. Further analysis shows that experts
tend to recognize romantic poems as pastoral poems only if there are any related symbols such as
trees, mountain, river. These words are very general in Chinese quatrains. The indicator words of
romantic poems such as skirt, rouge, and singing
are not as popular and their indication power is not
as strong, leading to less labeling of romantic poems, as shown in the results.
Model
C1 (Baseline)
C1 + Pastoral Mem
C1 + Battlefield Mem
C1 + Romantic Mem
Pastoral
0.09
0.94
0.05
0.17
Probability
Battlefield
Romantic
0.04
0.18
0.00
0.06
0.93
0.00
0.00
0.61
Unclear
0.69
0.00
0.02
0.22
Table 3: Probability that poems generated by each
configuration with general topics are labeled as
various styles.
We also tested transferring from one style to another. This was achieved by generating poems
with some style-biased topics, and then using a
style memory to force the generation to change the
style. Our experiments show that in 73% cases the
style can be successfully transferred.
Finally, the scores of the poems generated with
and without the style memories are shown in Table 4, where the poems generated with both general and style-biased topics are accounted for. It
can be seen that overall, the style transfer may degrade fluency a little. This is understandable, as
enforcing a particular style has to break the optimal generation with the baseline, which is assumed to be good at generating fluent poems.
Nevertheless the sacrifice is not significant.
Method
C1
C1
C1
C1
C1
Compliance
Fluency
4.10
4.07
3.82
4.00
3.95
3.01
3.00
2.63
2.78
2.80
(baseline)
+ Pastoral Mem
+ Battlefield Mem
+ Romantic Mem
+ All Mem
Aesthetic
Innovation
2.53
3.07
2.60
2.59
2.74
Scenario
Consistence
2.94
3.17
2.95
3.00
3.05
Table 4: Averaged scores for systems with or without style memory.
5.5
Examples
Table 5 to Table 7 shows example poems generated by the system C1 , C1 +Mem and C1 +Style
Mem where the style in this case is set to be romantic. The three poems were generated with the
same, very general, topic (‘(oneself)’). More examples are given in the supporting material.
自从此意无心物,
Nothing in my heart,
一日东风不可怜。
Spring wind is not a pity.
莫道人间何所在,
Don’t ask where it is,
我今已有亦相传。
I’ve noticed that and tell others.
一山自有无人语,
Nobody speaking in the mountain,
不是青云入水边。
Also no green cloud stepping into the river.
莫把春风吹落叶,
Spring wind does not stir leaves,
花开绿树满江船。
But flowers blooming in trees and flying to
boats.
Table 6:
Example poems generated by the
C1 +Mem system.
花香粉脸胭脂染,
Beautiful face addressed by rouge,
帘影鸳鸯绿嫩妆。
Mandarin duck outside the curtain.
翠袖红蕖春色冷,
Green sleeves and red flowers in cold spring,
柳梢褪叶暗烟芳。
Willow leaves gone in fragrant mist.
Table 7:
Example poems generated by the
C1 +Style Mem system where the style is romantic.
ory can boost innovation from two opposite directions: either by encouraging creative generation for regularly-trained models, or by encouraging rule-compliance for overfitted models. Both
strategies work well, although the former generated poetry that was preferred by experts in our experiments. Furthermore, we found that the memory can be used to modify the style of the generated poems in a flexible way. The experts we collaborated with feel that the present generation is
comparable to today’s experienced amateur poets.
Future work involves investigating a better memory selection scheme. Other regularization methods (e.g., norm or drop out) are also interesting
and may alleviate the over-fitting problem.
Acknowledgments
Table 5:
system.
6
Example poems generated by the C1
Conclusions
In this paper, we proposed a memory mechanism to support innovative Chinese poem generation by neural models augmented with a memory. Experimental results demonstrated that mem-
This paper was supported by the National
Natural Science Foundation of China (NSFC)
under the project NO.61371136, NO.61633013,
NO.61472428.
References
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly
learning to align and translate. arXiv preprint
arXiv:1409.0473 .
Alex Graves, Greg Wayne, and Ivo Danihelka.
2014. Neural turing machines. arXiv preprint
arXiv:1410.5401 .
Alex Graves, Greg Wayne, Malcolm Reynolds,
Tim Harley, Ivo Danihelka, Agnieszka GrabskaBarwińska, Sergio Gómez Colmenarejo, Edward
Grefenstette, Tiago Ramalho, John Agapiou, et al.
2016.
Hybrid computing using a neural network with dynamic external memory.
Nature
538(7626):471–476.
Jing He, Ming Zhou, and Long Jiang. 2012. Generating Chinese classical poems with statistical machine
translation models. In Twenty-Sixth AAAI Conference on Artificial Intelligence.
Long Jiang and Ming Zhou. 2008. Generating Chinese
couplets using a statistical mt approach. In Proceedings of the 22nd International Conference on
Computational Linguistics. Association for Computational Linguistics, volume 1, pages 377–384.
Wenwei Liu. 1735. ShiXueHanYing.
Yael Netzer, David Gabay, Yoav Goldberg, and
Michael Elhadad. 2009. Gaiku: Generating haiku
with word associations norms. In Proceedings of the
Workshop on Computational Approaches to Linguistic Creativity. Association for Computational Linguistics, pages 32–39.
H Oliveira. 2012. Poetryme: a versatile platform for
poetry generation. In Proceedings of the ECAI 2012
Workshop on Computational Creativity, Concept Invention, and General Intelligence.
Yihe Tang. 2005. English Translation for Tang Poems
(Ying Yi Tang Shi San Bai Shou). Tianjin People
Publisher.
Naoko Tosa, Hideto Obara, and Michihiko Minoh.
2009. Hitch haiku: An interactive supporting system for composing haiku poem. Entertainment
Computing-ICEC 2008 pages 209–216. Springer.
Li Wang. 2002. A Summary of Rhyming Constraints of
Chinese Poems (Shi Ci Ge Lv Gai Yao), volume 1.
Beijin Press.
Qixin Wang, Tianyi Luo, and Dong Wang. 2016a.
Can machine generate traditional Chinese poetry? a
feigenbaum test. In BICS 2016.
Qixin Wang, Tianyi Luo, Dong Wang, and Chao Xing.
2016b. Chinese song iambics generation with neural
attention-based model. In IJCAI 16.
Zhe Wang, Wei He, Hua Wu, Haiyang Wu, Wei Li,
Haifeng Wang, and Enhong Chen. 2016c. Chinese
poetry generation with planning based neural network. In COLING 2016.
Jason Weston, Sumit Chopra, and Antoine Bordes. 2014. Memory networks. arXiv preprint
arXiv:1410.3916 .
Xiaofeng Wu, Naoko Tosa, and Ryohei Nakatsu. 2009.
New hitch haiku: An interactive renku poem composition supporting tool applied for sightseeing navigation system. Entertainment Computing-ICEC 2009
pages 191–196. Springer.
Rui Yan. 2016. i, Poet: Automatic poetry composition
through recurrent neural networks with iterative polishing schema. In IJCAI2016.
Rui Yan, Han Jiang, Mirella Lapata, Shou-De Lin,
Xueqiang Lv, and Xiaoming Li. 2013. i, Poet: automatic Chinese poetry composition through a generative summarization framework under constrained
optimization. In Proceedings of the Twenty-Third
international joint conference on Artificial Intelligence. AAAI Press, pages 2197–2203.
Matthew D Zeiler. 2012. Adadelta: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 .
Xingxing Zhang and Mirella Lapata. 2014. Chinese
poetry generation with recurrent neural networks.
In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing
(EMNLP). pages 670–680.
Cheng-Le Zhou, Wei You, and Xiaojun Ding. 2010.
Genetic algorithm and its implementation of automatic generation of Chinese Songci. Journal of Software 21(3):427–437.
| 2 |
AMAS: optimizing the partition and filtration of adaptive seeds to
speed up read mapping
Ngoc Hieu Tran1,*
Email: [email protected]
1
Xin Chen
Email: [email protected]
1
School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
* Corresponding author
1
ABSTRACT
Background: Identifying all possible mapping locations of next-generation sequencing (NGS) reads
is highly essential in several applications such as prediction of genomic variants or protein binding
motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc.
However, this task is very time-consuming and majority of mapping tools only focus on one or a few
best mapping locations.
Results: We propose AMAS, an alignment tool specialized in identifying all possible mapping
locations of NGS reads in a reference sequence. AMAS features an effective use of adaptive seeds to
speed up read mapping while preserving sensitivity. Specifically, an index is designed to pre-store the
locations of adaptive seeds in the reference sequence, efficiently reducing the time for seed matching
and partitioning. An accurate filtration of adaptive seeds is further applied to substantially tighten the
candidate alignment space. As a result, AMAS runs several times faster than other state-of-the-art
read mappers while achieving similar accuracy.
Conclusions: AMAS provides a valuable resource to speed up the important yet time-consuming
task of identifying all mapping locations of NGS reads. AMAS is implemented in C++ based on the
SeqAn library and is freely available at https://sourceforge.net/projects/ngsamas/.
Keywords: next-generation sequencing, read mapping, sequence alignment, adaptive seeds, seed
partition, filtration
2
Background
Recent advances in next-generation sequencing (NGS) technologies have produced massive
amounts of short reads data, bringing up promising opportunities in several biomedical research
areas such as RNA-seq, ChIP-seq, de novo genome sequencing, resequencing, metagenome
sequencing, etc [1]. In many applications, the first key step is to map NGS reads to a reference
sequence of interest. Thus, dozens of rapid alignment algorithms have been developed to improve
the read mapping [2, 3], especially to address the problem of errors tolerance (mismatches, indels)
and the increasing read length. To achieve an optimal combination of speed, accuracy, and memoryefficiency, many popular mapping tools such as Bowtie 1, 2 [4, 5], BWA [6-8], etc, apply heuristic
approaches to prune the search space, prioritize candidate locations, and finally return one or a few
best mapping locations for each read. They can be referred to as best-mappers. Another class of
mapping tools, which can be referred to as all-mappers, are specialized in identifying as many as
possible, if not all, matches within a reasonable time. This all-mapping task is highly essential in
several applications such as prediction of genomic variants or protein binding motifs located in repeat
regions, isoform expression quantification, metagenomics analysis [9-12]. Some prominent allmappers include SOAP 2 [13], SHRiMP 2 [14], mrsFAST [10, 15], mrFAST [9, 16], RazerS 3 [17],
GEM [18], Masai [19], Hobbes 1, 2 [20, 21].
Exhaustive search for all mapping locations of NGS reads in a reference sequence is a
computationally intensive task. The problem is even more complicated for large genomes with highly
repetitive regions, e.g. the human genome, and when sequencing errors as well as genomic variants
are taken into account. In order to narrow down the search space, most all-mappers are designed
with the seed-and-extend strategy. In particular, a read is first partitioned into a few non-overlapping
seeds. If the read can be mapped to the reference sequence with some allowed errors, its seeds must
also have exact/approximate matches in the reference sequence, and moreover, the read’s mapping
locations can be found in the neighbourhood regions of its seeds’ locations. Hence, the seeds are
quickly mapped to the reference sequence and their identified locations are then used as candidates
for further extending the alignment to the rest of the read by using standard dynamic programming
algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. The mapping sensitivity is
guaranteed by the pigeonhole principle. For example, to map a read to the reference sequence with
up to e errors, one can partition it into e+1 non-overlapping seeds. By the pigeonhole principle, at
least one of those e+1 seeds must have an exact match in the reference sequence. Thus, all possible
mapping locations with up to e errors of the read can be found by extending all exact matches of
those seeds.
Most all-mappers partition a read into seeds of equal lengths, where the seed length is specified
by users or may also be determined from the number of errors allowed and the pigeonhole principle.
In any cases, the seed length is several times shorter than the read length and the seeds are usually
mapped exactly (i.e. without errors) to the reference sequence. To further speed up the seed mapping
process, most all-mappers (except for RazerS 3) index the reference sequence using some special
data structures. In particular, SHRiMP 2, mrsFAST, mrFAST, and Hobbes use hash tables to index
3
the reference sequence. For a fixed length k (which is less than or equal to the seed length), the hash
tables contain all possible k-mers as the keys and each key is associated with a list of locations where
the corresponding k-mer is observed in the reference sequence. Masai, on the other hand, constructs
a suffix tree of the reference sequence to perform the seed matching. Both suffix array and the much
more memory-efficient Ferragina-Manzini (FM) index [24] with Burrows-Wheeler Transform (BWT)
can be used in Masai to mimic the suffix tree top-down traverse. Hash tables can also be combined to
accelerate the searching in the BWT-FM index, as demonstrated in SOAP 2. Among those commonly
used data structures, the FM index is well-known for its small memory footprint, which is only ~3-4 GB
for the human genome. Interestingly, in the latest version of mrsFAST [15], the authors proposed a
new compact structure for hash tables significantly reducing the index size to ~2GB for the human
genome, which is even smaller than the FM index.
In addition to indexing the reference sequence, some all-mappers also index the input reads so
that multiple reads can be handled simultaneously rather than in a one-by-one fashion. For instance,
in the read index of mrsFAST, each k-mer is associated with a list of read IDs, locations of the k-mer
in the reads, etc. In the extension step, for each k-mer, the two lists (from the reference index and
from the read index) are compared in a divide-and-conquer fashion to achieve cache efficiency.
Similarly, in Masai, all seeds of the input reads are organized in a radix tree. Then, by walking through
the reference suffix tree along with the read radix tree, all seeds can be mapped to the reference
sequence simultaneously.
After the seeds of a read have been mapped to the reference sequence, their identified locations
are then used as candidates for further extending the alignment to the rest of the read. This step is
usually called the extension or the verification step, and is performed by using standard dynamic
programming algorithms such as Smith-Waterman [22] or Needleman-Wunsch [23]. In fact, this step
is the bottleneck and consumes the most computations of the whole mapping task. As the seed length
is several orders of magnitudes shorter than the reference length and the reference sequence often
contains highly repetitive regions, the candidate space generated by the seeds is huge. Moreover,
majority of the locations actually are false positives which will not lead to acceptable alignment results
yet waste computing resources. Hence, filtration strategies are needed to reduce the number of
locations
The first filtration strategy widely used by the all-mappers is based on the pigeonhole principle. In
particular, if a read is aligned with up to e errors and exact seed matching is employed, only e+1 nonoverlapping seeds are required to guarantee the full mapping sensitivity. More advanced strategies
are further implemented in different all-mappers. For instance, the FastHASH algorithm in the latest
version of mrFAST [16] applies two procedures called Cheap K-mer Selection and Adjacency Filtering
to reduce the number of locations while preserving sensitivity. In the first procedure, the seeds of a
read are sorted according to their frequencies in the reference sequence and e+1 seeds with the
lowest frequencies are selected. The second procedure filters out the obviously false locations based
on the idea that the potentially true locations (i.e. those that may return correct alignments) of
adjacent seeds must be close to each other in the reference sequence.
4
In Hobbes [20] the authors proposed a more complicated procedure of seed selection. Instead of
partitioning the read into contiguous seeds, Hobbes considers all possible partitions and applies a
dynamic programming to select the one that minimizes the sum of frequencies of the seeds. In the
latest version, Hobbes 2 [21], the authors further suggested to use extra seeds to improve filtering
specificity: instead of e+1, e+2 (or more) non-overlapping seeds can be employed. Then, by the
pigeonhole principle, at least two of those seeds must have exact matches in the reference sequence
and hence only those locations reported by at least two seeds will be selected as candidates for the
extension step. This technique has also been applied previously in GSNAP [25].
The filtration in Masai [19] is based on the use of long approximate seeds rather than short exact
seeds to achieve better specificity. For example, if a read of length 100bp is aligned to the reference
sequence with up to e=5 errors, by the pigeonhole principle, it can be partitioned into 6 nonoverlapping seeds of length 16bp and the seeds are mapped exactly to the reference genome. To
increase the seed length, Masai partitions the read into 3 seeds of 33bp and each seed is mapped to
the reference genome with up to 1 error. The approximate matching of all seeds is performed
simultaneously by applying a multiple backtracking algorithm on the reference index and the read
index.
It is worth to note that most all-mappers partition a read into equal-length seeds and prefer to use
short k-mers as seeds. However, the occurrences of equal-length seeds in a reference sequence may
not be uniformly distributed and the seed frequencies may differ by orders of magnitudes (see
Supplementary Figure S1 for the frequency distribution of 10-mers in the human genome). Highly
repetitive seeds may substantially enlarge the candidate space with false positives and hence waste
computing resources. This problem was addressed by introducing seed selection mechanisms in
mrFAST, Hobbes, or by using long approximate seeds in Masai. However, the seed frequencies are
still not fully controllable. A more efficient strategy of seed partition was proposed in GEM [18] using
adaptive seeds. Specifically, GEM allows seeds to have variable lengths while restricting the number
of candidate locations generated by each seed to be less than a predefined threshold. Figure 1A
shows an example of such efficient partition where the number of candidate locations of the read was
reduced by 44.66 times by using adaptive seeds instead of equal-length seeds. In general, adaptive
seeds provide better control on the candidate space while consuming similar computing resources as
equal-length seeds. Similar ideas have also been used in some best-mappers [7, 8, 26, 27] to avoid
unnecessary extension for highly repetitive seeds.
As we have briefly reviewed above, intensive efforts have been put into optimizing the use of
equal-length seeds in the all-mapping task, including sequence indexes for fast exact/approximate
seed matching and filtration strategies to reduce candidate locations. However, little attention has
been paid into adaptive seeds and their advantages have not been fully explored to speed up the
read mapping. Hence, in this work we carefully study the strengths and weaknesses of adaptive
seeds and attempt to find an optimal strategy for their mapping, partition and filtration. The main
contributions of our all-mapping tool with adaptive seeds, AMAS, are summarized below.
5
Firstly, to speed up the mapping of adaptive seeds, we pre-compute all possible adaptive seeds
and their locations in the reference sequence for a given frequency threshold. Then, our index of the
reference sequence consists of all possible adaptive seeds as the keys and each key is associated
with a list of locations where the corresponding seed is observed. The index is stored in a local file
and can be reused for every mapping task. The idea is similar to hash tables, but instead of fix-length
k-mers, the keys in our index are variable-length substrings with frequencies less than a predefined
threshold.
Secondly, in the adaptive seed partition, the number of seeds is not controllable and varies across
different reads. For some reads, there may not be sufficient seeds for the pigeonhole principle to
guarantee the mapping sensitivity. Hence, we refine the partition of adaptive seeds by adding one
more constraint on the seed lengths in order to guarantee the minimum number of seeds in the
partition. On the other hand, there may also be more than enough seeds available from the partition.
In such cases, we make effective use of the extra seeds to filter out false positives from the candidate
space.
Thirdly, due to the shortage of nucleotides assigned to the last seed in the adaptive partition of a
read, that seed may be too short and the number of candidate locations it reported may far exceed
the desired threshold. Majority of such locations are false positives which increase the candidate
space dramatically. However, blindly ignoring all of the last seeds will lead to a considerable loss of
mapping sensitivity. Hence, we also pay special attention to an accurate filtration of the last seeds.
Overall, by optimizing the partition and filtration of adaptive seeds, our tool AMAS runs several
times faster than other state-of-the-art all-mappers while achieving comparable sensitivity and
accuracy. Detailed methods and performance results are presented in the next sections.
AMAS was implemented in C++ based on the source code of Masai and the SeqAn library. Our
main contributions include the index, the partition, and the filtration of adaptive seeds. For the
extension step with edit distance, we borrowed Masai’s implementation [17, 19] of the Myers’ bitvector dynamic programming algorithm [28]. We also borrowed I/O components of Masai for handling
the reference, the read sequences, and the alignment results in SAM format. AMAS is freely available
at https://sourceforge.net/projects/ngsamas/. A user guide and sample data sets are also provided.
Methods
To find an effective strategy for the partition and filtration of adaptive seeds, we first performed
experiments on a data set of 100k reads of length 100bp, which were simulated from the human
genome (UCSC hg19) using Mason [29] with the Illumina model. The reads were mapped to the
human genome with up to e=5 errors. In the following, we shall describe our strategy and use the
simulated data set for illustration.
Partition of adaptive seeds
An example of adaptive seeds versus equal-length seeds is illustrated in Figure 1A. To partition a
read into adaptive seeds, we scan the read against the reference sequence in the forward (left-to-right)
6
direction, base by base. When the number of matches of the current seed drops below a predefined
frequency threshold F, its locations are added to the candidate space and a new seed is started. That
process is continued until the desired number of seeds is obtained or the read’s end is reached. In the
latter case, the number of matches of the last seed might be still higher than the threshold F. In the
example in Figure 1A, the read was mapped to the human genome and F was set at 300. The
number of candidate locations of the read was reduced by 44.66 times by using 6 adaptive seeds
instead of 6 seeds of equal lengths 16bp. Similarly, for the whole simulated data set of 100k reads,
the total number of candidate locations was reduced by 6.61 times (Supplementary Table S1).
Index of adaptive seeds
To search for the locations of adaptive seeds in the reference sequence, GEM uses the FM index to
achieve both speed and low memory footprint [18]. As all-mapping is a very time-consuming task, it
may be desirable to further boost up the mapping speed at the expense of a reasonable amount of
memory, like using hash tables in Hobbes, mrsFAST, mrFAST, or suffix arrays, enhanced suffix
arrays in Masai. Here we pre-compute all possible adaptive seeds and their locations in the reference
sequence for a given frequency threshold F. Then, our index of the reference sequence consists of all
possible adaptive seeds as the keys and each key is associated with a list of locations where the
corresponding seed is observed. The idea is similar to hash tables, but instead of fix-length k-mers,
the keys in our index are variable-length substrings with frequencies less than a predefined threshold
F.
To represent all possible adaptive seeds in the reference sequence, we implement a lookup table
and extend it with a radix tree (Figure 1B). In particular, we first pick a length k, organize all k-mers in
the lookup table and search for their locations in the reference sequence. Then, for each k-mer, we
further extend the search to its 4 child nodes which correspond to adding the 4 bases “A”, “C”, “G”,
and “T”. The search and extension are continued until the numbers of matches of the nodes drop
below the threshold F (shaded leaf nodes in Figure 1B). Thus, all leaf nodes in the radix tree
correspond to all possible adaptive seeds and each of them is linked to an array of its locations in the
reference sequence. A similar idea has been used in SOAP 2 [13] where a hash table was combined
to accelerate the searching in the FM index. Note that the leaf nodes in our index represent adaptive
seeds with desired frequencies, not suffixes like in common suffix-array based data structures.
By default, we consider adaptive seeds with a minimum length of k=10 bases. In general, using
lower values of F helps to tighten the candidate space reported by the seeds but also enlarges the
index. We choose F to be about 10 times less than the average frequency of k-mers in the reference
sequence. For instance, we set F=300 for the human genome (Figure 1B), F=10 for the worm
genome, and F=17 for the fruit-fly genome (Supplementary Table S2). The index only needs to be
built once for each genome and it can be stored on a local disk for future mapping tasks.
7
Constraint on the maximum seed length
As we use exact seed matching, by the pigeonhole principle, at least e+1 seeds are needed to
achieve full sensitivity for mapping a read with up to e errors. The number of adaptive seeds, however,
is not controllable and varies across different reads (see Supplementary Figure S2 for the seed
count’s distribution of the simulated data set). Some reads may not have sufficient seeds to guarantee
the mapping sensitivity. Hence, in addition to the frequency constraint, we also impose a constraint on
the maximum length of the seeds. The maximum length threshold l allows to control the minimum
number of seeds in the partition and hence to improve the mapping sensitivity. For example, for a
read of length 100bp, setting l=33 guarantees that there will be at least 3 seeds in the partition and all
matching locations with up to 2 errors will be found (Supplementary Figure S2). This feature greatly
improves the sensitivity of our tool over GEM, as we will show later in the section Results.
Filtration using the last seeds in the adaptive partition
We also pay special attention to the last seeds in the adaptive partition. Due to the lack of nucleotides
remaining, the last seed in the adaptive partition of a read may be too short and its number of
matches may far exceed those of the other seeds as well as the threshold F. For instance, in the
simulated data set, the number of candidate locations reported by the last seeds contributed up to
64% of the total candidate space. Apparently, majority of those locations were false positives, but
removing all of them may lead to a considerable loss of mapping sensitivity. Our tool chooses to filter
out only those last seeds whose numbers of matches are higher than the expected frequency of kmers and contribute to more than 95% of the candidate locations of their respective reads (i.e. the last
seed reports too many locations compared to other seeds in the same read). Nevertheless, we avoid
removing the last seeds from those reads that have too few seeds required by the pigeonhole
principle. For the simulated data set, this filtration step only affected a small amount of reads (1.6%,
Supplementary Figure S3), but significantly reduced the total candidate space by more than 50%
(Supplementary Table S1).
Filtration using the extra seeds in the adaptive partition
Last but not least, when there are more than e+1 seeds available from the adaptive partition, we
make effective use of the extra seeds to filter out false positives. For instance, the simulated reads
were mapped with up to e=5 errors and hence e+1=6 seeds were required. However, the reads could
be partitioned up to 9 seeds, where majority of them were partitioned into 8 seeds (Supplementary
Figure S2). If a read was partitioned into 7, 8, or 9 seeds, only those locations reported by at least 2, 3,
or 4 seeds, respectively, were selected as candidates. This filtration step further reduced the total
candidate space by more than 70% (Supplementary Table S1). Our tool stores candidate locations in
a binary search tree that allows quickly sorting and identifying those reported by multiple seeds. Using
more extra seeds increases the filtering specificity but also requires longer filtration time. Our
experiment with the simulated data set showed that using only one extra seed, i.e. total e+2=7 seeds,
8
achieved the best overall mapping time (Supplementary Table S1). This is similar to the observation
in Hobbes 2 [21], GSNAP [25].
Overall, the combination of two filtration steps using the last seeds and the extra seeds
substantially reduced the candidate space of the simulated data set by more than 85%
(Supplementary Table S1). Obviously, such effective filtration will save a lot of computing resources in
the extension step.
Seed extension
To perform seed extension with edit distance (i.e. including both mismatches and indels), we reused
Masai’s implementation [17, 19] of the Myers’ bit-vector dynamic programming algorithm [28].
Results and discussion
In this section, we compare the performance of AMAS and the latest state-of-the-art all-mappers GEM
[18], Masai [19], Hobbes 2 [21], mrFAST (with FastHASH) [16], and mrsFAST-ultra [15]. We also
included two popular best-mappers Bowtie 2 and BWA in the comparison. The mappers were
configured to search for all possible mapping locations with up to e=5 errors and then output the
alignment results in the SAM format. Details of parameters configuration can be found in the
Supplementary Table S3. The experiments were performed on a Linux server with 12 Intel Xeon
processors (E5-2640, 2.50 GHz), 64 GB of RAM, CentOS 6.3, GCC 4.4.7. All mappers were tested
using one single thread and eight threads, except for Masai and mrFAST which do not support multithreading.
Rabema benchmark
Following previous studies of Masai and Hobbes 2 [19, 21], we used the Rabema benchmark [30] to
measure the sensitivity of the mappers. First, RazerS 3 [17] was run in its full-sensitive mode to build
the gold-standard set of all possible mapping locations with up to 5 errors. Any other mappers that
can guarantee full mapping sensitivity can also be used to build the gold-standard set [30]. The goldstandard set was then used by Rabema to assess the sensitivity of each mapper in three categories
“All”, “All-best”, and “Any-best”. For the “All” category, the mappers need to find all mapping locations
in the gold-standard set. Similarly, for the “All-best” and “Any-best” categories, the mappers need to
find all of the best mapping locations and any of the best mapping locations of the reads, respectively.
Note that the term “best” here is in terms of the edit distance between the read and the reference
sequence. Some mappers such as Bowtie 2 or BWA have their own scoring schemes to evaluate the
mapping quality of the alignments. As original locations were available for the simulated reads, we
also assessed the recall and the precision of the mappers on the simulated data set. Recall is
defined in Rabema as the fraction of the input reads that were correctly mapped and precision is
defined as the fraction of the uniquely mapped reads that were correctly mapped. A read is said to be
mapped correctly if its original location was reported by the mapper. A read is said to be mapped
uniquely if only one location was reported by the mapper.
9
Performance on the simulated data set
Table 1 shows the Rabema benchmark for mapping the simulated data set of 100k reads to the
human genome (UCSC hg19). The column “All” shows that AMAS was able to identify 98.11% of all
mapping locations and achieved full sensitivity (100%) for those locations with up to 2 errors. Hobbes
2 achieved the highest sensitivity 99.85%, i.e. 1.74% more sensitive than AMAS, and was followed by
Masai (99.83%), mrFAST (99.33%), AMAS (98.11%), GEM (97.65%), and mrsFAST (78.52%). AMAS
and GEM had lower sensitivity than Masai, Hobbes 2, and mrFAST, especially when searching for
mapping locations with 4 or 5 errors. This is because the adaptive seed partition does not guarantee
the number of seeds and hence there may not be sufficient seeds required by the pigeonhole
principle. The additional constraint on the maximum seed length introduced in AMAS guaranteed the
full sensitivity (100%) for all mapping locations with up to 2 errors and also improved the overall
sensitivity for locations with 3, 4, 5 errors. Hence, AMAS was 0.46% more sensitive than GEM.
mrsFAST had much lower mapping rate (79.35%) and sensitivity (78.52%) than the others because it
only allows mismatches and cannot detect indels.
In the “All-best” and “Any-best” categories, AMAS achieved 99.99% and 100% sensitivity,
respectively. That was similar to Hobbes 2 and better than the rest. AMAS also achieved the best
recall rate 99.09%, while its precision was 99.99%, the second best among the tools.
The best-mappers Bowtie 2, BWA, and GEM-best only searched for one or a few best mapping
locations. Hence, they ran faster than the all-mappers while having lower sensitivity. We noticed that
GEM-best outperformed Bowtie 2 and BWA in terms of both running time and sensitivity,
demonstrating the advantages of adaptive seeds. We tried to configure Bowtie 2 and BWA as allmappers (Supplementary Table S3) but their running times were too long and the results were not
reported here. We also configured Bowtie 2 in its -k mode to report up to -k=100 alignments for each
read so that it could finish within a reasonable time. Its sensitivity was 96.04%, i.e. 2.07% lower than
AMAS.
Performance on real data sets
Next, we run the mappers on a real NGS data set SRR063408 from the 1000 Genomes Project
(individual HG01495). The data set includes 25.6 million reads of length 100bp which were generated
from the Illumina Genome Analyzer II. Table 2 shows the running time, memory footprint, and
Rabema benchmark of mapping the first one million reads to the human genome. AMAS took about
30 minutes to finish the job using one single thread and 5 minutes using eight threads. AMAS was
able to map 93.75% of the reads and identified 98.14% of all mapping locations, including nearly all of
the best mapping locations (99.98%). AMAS only lose behind Masai and Hobbes 2, which achieved
highest sensitivity, 99.93% and 99.90% of all mapping locations, 100% of all best mapping locations.
In both single-thread and eight-thread tests, AMAS was more than 3 times faster than Hobbes 2.
AMAS was also more than 3 times faster than Masai in the single-thread test (Masai does not support
multi-threading). While using the same idea of adaptive seeds, AMAS outperformed GEM in terms of
mapping rate (0.06% higher), sensitivity (0.25% higher in the “All” category), and running time (2-7
10
times faster). This clearly shows the benefits of the optimized partition and filtration implemented in
AMAS. AMAS was more than 6 times faster than mrFAST in the single-thread test (mrFAST does not
support multi-threading). In this experiment, mrFAST produced invalid SAM output with many
inconsistent CIGAR strings, which could not be converted to BAM for further analysis with Rabema.
mrsFAST had similar running time as AMAS in the single-thread test but was more than 2 times
slower than AMAS in the eight-thread test. AMAS also had better mapping rate (1.37% higher) and
sensitivity (1.02% higher in the “All” category) than mrsFAST.
To map the full data set SRR063408 of 25.6 million reads to the human genome, AMAS took
about 12 hours using one single thread and 2 hours using eight threads (Table 3). Masai required 31
hours and Hobbes 2 required nearly 50 hours, that is, 2.6 times and 4.2 times slower than AMAS
when using one single thread. When eight threads were deployed, Hobbes 2 took about 8 hours, 4
times slower than AMAS. mrsFAST was the fastest in the single-thread test (9 hours), but was 2 times
slower than AMAS in the eight-thread test (4 hours). mrFAST could not finish the mapping within 3
days, thus we did not record its results. For this data set, GEM was not able to output its alignment
results in the SAM format. Thus we were only able to record its mapping time, which was already 1.55 times slower than the total running time of AMAS.
We also performed similar experiments on Caenorhabditis elegans (data set SRR065388 mapped
to the worm genome UCSC ce10) and Drosophila melanogaster (data set SRR497711 mapped to the
fruit-fly genome UCSC dm3). The results are presented in Supplementary Tables S4-S7. AMAS took
9 minutes to map 36 million reads to the worm genome. AMAS outperformed GEM and mrsFAST in
terms of running time, mapping rate, and sensitivity. It was nearly 2 times faster than Hobbes 2, 2.5
times faster than Masai and 4.6 times faster than mrFAST. AMAS fell behind Masai and Hobbes 2 by
no more than 0.04% of reads and 1.35% of all mapping locations. Similar results were also obtained
for the fruit-fly genome.
Most all-mappers use the seed-and-extend strategy in which locations reported by the seeds of a
read are used as candidates for extending the alignment to the rest of the read. Many locations
reported by different seeds of a read may actually correspond to one single location of the read in the
reference sequence. Thus it is important to mark duplicate candidates to reduce the time for seed
extension, and more importantly, to avoid duplicate alignments in the output. We measured the
percentage of the true alignments (according to Rabema benchmark) found by the mappers among
the alignments they reported. Table 4 shows that AMAS and mrsFAST were the most accurate while
Masai reported quite a large number of duplicate alignments.
Finally, we tested the mappers on a longer read length and more errors. A data set of one million
reads of length 200bp were simulated from the human genome and then were mapped with up to
e=10 errors (i.e. 5% error rate). The results are shown in Table 5. AMAS was able to map 99.90% of
the reads and identified 99.02% of all mapping locations, including nearly all (99.99%) of the best
mapping locations. Masai and Hobbes 2 achieved full sensitivity, but were 4-5 times slower than
AMAS. GEM did not scale well with this experiment. In the single-thread test its memory footprint
increased dramatically and in the eight-thread test it crashed due to memory errors. mrFAST was 3
11
times slower than AMAS and produced invalid SAM output. mrsFAST had similar running time as
AMAS, but much lower mapping rate (62.56%) and sensitivity (61.42% of all mapping locations)
because mrsFAST cannot handle indels.
Index and memory footprint
As AMAS processes reads in blocks of one million, the memory foot-print is kept stable regardless of
the size of the input NGS data (Tables 2 and 3). To map the full data set SRR063408 of 25.6M 100bp
reads to the human genome, AMAS requires 19.5 GB. The memory consumption includes 15.9 GB
for the index and 3 GB for the reference sequence. The memory footprint is not well optimized yet and
shall be the focus of our future development. Hobbes 2 uses hash tables and requires 16.7 GB. Masai
uses suffix arrays and requires 25 GB. GEM uses FM index with much less memory footprint 5.7 GB
for mapping. However, the memory footprint of GEM increases significantly or even crashes when
outputting the alignments to SAM format (using “gem-to-sam” tool) or when handling longer reads
with more errors (Tables 3, 5). mrsFAST uses hash tables but only needs 6.6 GB. Note that for
smaller data sets (with 1M reads), mrsFAST and mrFAST have very low memory footprint, 2 GB,
which is even less than the FM index (Table 2).
Our index of the human genome takes about 3 hours to build, and it can be stored on a local disk
with 13.8 GB for future mapping tasks (Supplementary Table S2). As our index needs to identify all
possible adaptive seeds with desired frequencies and their locations in the reference sequence, it
may take more time to build than other indexes. However, this indexing task only needs to be done
once for each genome and does not affect the mapping time.
Conclusions
In this study, we proposed an effective strategy for the partition and filtration of adaptive seeds to
speed up the exhaustive search for all possible mapping locations of NGS reads in a reference
sequence. Our tool, AMAS, features a new index designed specifically to accelerate the alignment of
adaptive seeds to the reference sequence. Frequency and length constraints on adaptive seeds allow
better control on the candidate alignment space while preserving enough seeds to guarantee the
mapping sensitivity. Finally, an accurate filtration strategy based on the last seeds and the extra
seeds is further applied to substantially tighten the candidate alignment space, efficiently reducing the
time for seed extension. As a result, AMAS runs several times faster than other competitors while
achieving comparable sensitivity and accuracy.
Multi-mapping reads are highly essential in several applications such as prediction of genomic
variants or protein binding motifs located in repeat regions, isoform expression quantification, metagenomics analysis, etc. However, searching for them is a very time-consuming task. Current stateof-the-art all-mappers such as GEM, Masai, Hobbes 2, mrsFAST, mrFAST, and best-mappers such
as Bowtie 2, BWA, etc, may take up to 1-2 days to find all possible mapping locations of reads from a
single NGS run for the human genome. Our tool offers a more efficient way to significantly speed up
that process. We have shown that AMAS run 2-7 times faster and was more sensitive than GEM.
12
AMAS was also up to 4 times faster than Masai, Hobbes 2, and mrFAST. Although AMAS did not
achieve nearly full sensitivity like Masai, Hobbes 2, and mrFAST, it only missed out less than 1.76%
of all mapping locations and 0.02% of all best mapping locations, while guaranteeing full sensitivity for
matches with small numbers of errors. Most of missing locations by AMAS were those with high
numbers of errors and may not be of interest in practice.
AMAS scales well in multi-threading environment and keeps the memory footprint stable
regardless of the size of input data. AMAS also supports pair-end read mapping, best-mapping mode,
and –k mapping mode (reporting up to –k alignments for each read). Hence, we believe that AMAS
will become a useful resource for read mapping in NGS data analysis.
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
XC and NHT designed the project. NHT developed the software and performed the analysis. NHT and
XC wrote the manuscript. Both authors read and approved the manuscript.
Acknowledgements
We thank the SeqAn team, especially the authors of Masai package for making their source codes
available. Our tool uses the SeqAn library and some well-developed components of Masai.
This work was supported by the Singapore National Medical Research Council (CBRG11nov091)
and the Singapore Ministry of Education Academic Research Fund (MOE2012-T2-1-055)
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
Metzker ML: Sequencing technologies - the next generation. Nat Rev Genet 2010, 11(1):3146.
Fonseca NA, Rung J, Brazma A, Marioni JC: Tools for mapping high-throughput sequencing
data. Bioinformatics 2012, 28(24):3169-3177.
Li H, Homer N: A survey of sequence alignment algorithms for next-generation sequencing.
Brief Bioinform 2010, 11(5):473-483.
Langmead B, Salzberg SL: Fast gapped-read alignment with Bowtie 2. Nat Methods 2012,
9(4):357-359.
Langmead B, Trapnell C, Pop M, Salzberg SL: Ultrafast and memory-efficient alignment of
short DNA sequences to the human genome. Genome Biol 2009, 10(3):R25.
Li H, Durbin R: Fast and accurate short read alignment with Burrows-Wheeler transform.
Bioinformatics 2009, 25(14):1754-1760.
Li H, Durbin R: Fast and accurate long-read alignment with Burrows-Wheeler transform.
Bioinformatics 2010, 26(5):589-595.
Li H: Aligning sequence reads, clone sequences and assembly contigs with BWA-MEM.
arXiv: 13033997 [q-bioGN] 2013.
Alkan C, Kidd JM, Marques-Bonet T, Aksay G, Antonacci F, Hormozdiari F, Kitzman JO, Baker
C, Malig M, Mutlu O et al: Personalized copy number and segmental duplication maps
using next-generation sequencing. Nat Genet 2009, 41(10):1061-1067.
13
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
Hach F, Hormozdiari F, Alkan C, Birol I, Eichler EE, Sahinalp SC: mrsFAST: a cache-oblivious
algorithm for short-read mapping. Nat Methods 2010, 7(8):576-577.
Newkirk D, Biesinger J, Chon A, Yokomori K, Xie X: AREM: aligning short reads from ChIPsequencing by expectation maximization. J Comput Biol 2011, 18(11):1495-1505.
Roberts A, Pachter L: Streaming fragment assignment for real-time analysis of sequencing
experiments. Nat Methods 2013, 10(1):71-73.
Li R, Yu C, Li Y, Lam TW, Yiu SM, Kristiansen K, Wang J: SOAP2: an improved ultrafast tool
for short read alignment. Bioinformatics 2009, 25(15):1966-1967.
David M, Dzamba M, Lister D, Ilie L, Brudno M: SHRiMP2: sensitive yet practical SHort Read
Mapping. Bioinformatics 2011, 27(7):1011-1012.
Hach F, Sarrafi I, Hormozdiari F, Alkan C, Eichler EE, Sahinalp SC: mrsFAST-Ultra: a compact,
SNP-aware mapper for high performance sequencing applications. Nucleic Acids Res 2014,
42(Web Server issue):W494-500.
Xin H, Lee D, Hormozdiari F, Yedkar S, Mutlu O, Alkan C: Accelerating read mapping with
FastHASH. BMC Genomics 2013, 14 Suppl 1:S13.
Weese D, Holtgrewe M, Reinert K: RazerS 3: faster, fully sensitive read mapping.
Bioinformatics 2012, 28(20):2592-2599.
Marco-Sola S, Sammeth M, Guigo R, Ribeca P: The GEM mapper: fast, accurate and versatile
alignment by filtration. Nat Methods 2012, 9(12):1185-1188.
Siragusa E, Weese D, Reinert K: Fast and accurate read mapping with approximate seeds
and multiple backtracking. Nucleic Acids Res 2013, 41(7):e78.
Ahmadi A, Behm A, Honnalli N, Li C, Weng L, Xie X: Hobbes: optimized gram-based methods
for efficient read alignment. Nucleic Acids Res 2012, 40(6):e41.
Kim J, Li C, Xie X: Improving read mapping using additional prefix grams. BMC
Bioinformatics 2014, 15:42.
Smith TF, Waterman MS: Identification of common molecular subsequences. J Mol Biol
1981, 147(1):195-197.
Needleman SB, Wunsch CD: A general method applicable to the search for similarities in
the amino acid sequence of two proteins. J Mol Biol 1970, 48(3):443-453.
Ferragina P, Manzini G: Opportunistic data structures with applications. In: Proceedings of
the 41st Annual Symposium on Foundations of Computer Science. IEEE Computer Society;
2000: 390.
Wu TD, Nacu S: Fast and SNP-tolerant detection of complex variants and splicing in short
reads. Bioinformatics 2010, 26(7):873-881.
Kielbasa SM, Wan R, Sato K, Horton P, Frith MC: Adaptive seeds tame genomic sequence
comparison. Genome Res 2011, 21(3):487-493.
Liu Y, Popp B, Schmidt B: CUSHAW3: sensitive and accurate base-space and color-space
short-read alignment with hybrid seeding. PLoS One 2014, 9(1):e86869.
Myers G: A fast bit-vector algorithm for approximate string matching based on dynamic
programming. J ACM 1999, 46:395-415.
Holtgrewe M: Mason - a read simulator for second generation sequencing data. Technical
report TR-B-10-06, Institut fur Mathematik und Informatik, Freie Universitat Berlin 2010.
Holtgrewe M, Emde AK, Weese D, Reinert K: A novel and well-defined benchmarking
method for second generation read mapping. BMC Bioinformatics 2011, 12:210.
14
Figure Legends
Figure 1. Partition of adaptive seeds. (A) Partition of the read
“AGGTCAAGAAATTGAGACCATCCCGGCCAACTTGGTGAAACCCCGTCTCGTCTCTACTAAAAGT
AAAAAAAATTAGCTGGGCGTGGTGGCGGGTGCATAT” against the human genome using 6 equallength16bp seeds (upper) and 6 adaptive seeds with frequencies less than F=300 (lower). Using
adaptive seeds significantly reduced the total number of candidate locations by ~44.66 times. (B) A
partial sub-tree of our index with k=10, F=300 for the human genome. Nodes were extended until their
numbers of matches dropped below 300 (shaded leaf nodes). The path corresponding to the first
adaptive seed of the read in (A) with length 13bp and frequency 157 is illustrated with bold lines.
15
Tables
Table 1. Rabema benchmark for mapping the simulated data set of 100k reads of length 100bp
to the human genome with up to e=5 errors. The first seven tools are all-mappers and the last
three are best-mappers. The column “All” shows the percentage of all mapping locations that the
mappers were able to find. Numbers in bold show the overall percentage, numbers in the smaller font
size show detailed percentages for mapping locations with 0, 1, 2 (upper) and 3, 4, 5 (lower) errors.
Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers
for identifying all of the best mapping locations and any of the best mapping locations of the reads.
The last two columns, “Rec” and “Prec”, show the recall and the precision of the mappers,
respectively (see the main text for the definitions of recall and precision).
Mappers
Reads
mapped
(%)
AMAS
99.11
All (%)
100
Bowtie2
(k=100)
99.06
GEM
(all)
99.06
Masai
99.06
Hobbes2
mrFAST
mrsFAST
98.55
79.35
Bowtie2
(best)
98.58
GEM
(best)
99.06
BWA
98.04
100
98.11
100
100
Any-best (%)
100
99.99
98.71
90.76
72.53
99.97
99.82
98.73
96.04
93.02
76.36
52.47
100
99.99
99.82
97.65
99.94
99.77
99.94
99.71
99.69
99.34
67.40
100
100
100
99.74
99.38
97.46
100
100
100
99.83
99.20
98.92
97.26
100
99.87
99.78
99.64
99.24
96.52
100
100
100
99.70
99.05
98.35
99.94
97.28
100
100
100
99.33
100
100
100
99.99
87.95
100
74.50
53.65
78.52
100
99.97
99.92
100
100
100
37.93
48.97
97.91
96.59
92.00
90.12
100
100
55.16
100
74.09
52.27
51.96
20.70
100
99.29
97.25
94.19
31.88
11.55
02.46
96.58
96.27
94.61
67.59
32.80
97.91
96.68
92.71
75.48
42.92
14.71
89.43
99.92
99.70
99.65
99.27
97.50
100
99.98
99.87
99.82
99.44
96.86
100
100
100
99.70
99.05
98.47
100
100
100
100
100
99.92
100
100
100
100
100
55.31
100
74.16
52.33
31.93
11.60
02.50
100
99.47
97.53
97.25
96.13
95.49
100
99.96
99.87
99.77
99.50
96.94
100.00
99.68
99.20
93.00
80.16
68.20
99.27
94.15
93.14
92.20
100
99.86
99.76
99.85
90.26
100
79.76
96.01
79.43
100
99.44
79.72
39.40
99.89
100
99.44
100
99.97
99.95
100
100
100
99.92
99.95
99.85
100
99.88
99.85
88.26
100
100
99.59
97.27
99.11
100
All-best (%)
99.91
99.54
99.21
96.50
96.58
96.54
96.21
90.13
77.24
65.54
95.53
98.76
16
Rec
(%)
Prec
(%)
99.09
99.99
98.40
99.76
98.72
99.73
99.05
100
98.99
99.89
98.00
99.43
78.14
98.75
94.88
96.25
98.61
99.70
93.92
95.79
Table 2. Rabema benchmark, running time, and memory footprint for mapping the first one
million reads of the real Illumina data set SRR063408 to the human genome with up to e=5
errors. The read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not
support multi-threading. The column “All” shows the percentage of all mapping locations that the
mappers were able to find. Similarly, the two columns “All-best” and “Any-best” respectively show the
sensitivity of the mappers for identifying all of the best mapping locations and any of the best mapping
locations of the reads. In this experiment, mrFAST produced invalid SAM output with many
inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not
available.
Mappers
1-thread
Time
(mm:ss)
8-thread
Time
(mm:ss)
Memory
(GB)
Reads
mapped
(%)
All
(%)
All-best
(%)
Any-best
(%)
AMAS
29:43
04:59
19.4
93.75
98.14
99.98
99.99
Bowtie2
(k=100)
55:30
07:31
3.6
93.70
95.89
99.60
99.91
GEM
(all)
71:41
36:45
5.3
93.69
97.89
99.91
99.92
Masai
91:12
NA
16.7
93.75
99.93
100
100
Hobbes2
110:24
15:16
14.9
93.76
99.90
100
100
mrFAST
189:47
NA
2.0
NA
NA
NA
NA
mrsFAST
29:41
11:28
2.1
92.38
97.12
98.48
98.50
Table 3. Details of mapping the full data set SRR063408 of 25.6 million reads to the human
genome with up to e=5 errors. The read mapping was performed using 1 thread and 8 threads.
Masai and mrFAST do not support multi-threading. For this full data set, GEM was not able to output
the alignment results in the SAM format. Thus we only recorded its running time and memory
consumption for the mapping step, but not the writing step. mrFAST could not finish the mapping
within 3 days, thus we did not record its results. NA: not available.
Mappers
1-thread Time
(hh:mm)
8-thread Time
(hh:mm)
Memory (GB)
AMAS
Bowtie2
(k=100)
GEM*
(all)
Masai
Hobbes2
mrFAST
mrsFAST
12:09
24:23
18:07
31:02
49:56
NA
08:48
01:59
03:19
10:41
NA
08:13
NA
04:06
19.5
3.8
5.7
25.0
16.7
NA
6.6
17
Table 4. Percentage of the true alignments found by the mappers among the alignments they
reported. For the real data set of one millions reads, mrFAST produced invalid SAM output with
many inconsistent CIGAR strings, which could not be converted to BAM for further analysis. NA: not
available.
AMAS
GEM
(all)
Masai
Hobbes 2
mrFAST
mrsFAST
Number of true alignments found
8,886,145
8,624,695
13,813,089
13,735,743
13,806,005
10,785,780
Number of alignments reported
8,886,270
8,628,751
21,954,696
13,762,313
13,918,070
10,785,975
100
99.95
62.92
99.81
99.20
100
Number of true alignments found
99,339,852
105,459,737
148,827,680
148,526,618
NA
134,412,384
Number of alignments reported
99,447,106
105,602,112
243,162,835
148,743,923
149,368,650
134,506,255
99.89
99.87
61.21
99.85
NA
99.93
Mappers
Simulated data set of 100k reads
Percentage
Real data set of 1M reads
Percentage
Table 5. Rabema benchmark, running time, and memory footprint for mapping the simulated
data set of one million reads of length 200bp to the human genome with up to e=10 errors. The
read mapping was performed using 1 thread and 8 threads. Masai and mrFAST do not support multithreading. The multi-threading mode of GEM also crashed for this data set due to memory problem.
The column “All” shows the percentage of all mapping locations that the mappers were able to find.
Similarly, the two columns “All-best” and “Any-best” respectively show the sensitivity of the mappers
for identifying all of the best mapping locations and any of the best mapping locations of the reads. In
this experiment, mrFAST produced invalid SAM output with many inconsistent CIGAR strings, which
could not be converted to BAM for further analysis. NA: not available.
Mappers
1-thread
Time
(mm:ss)
8-thread
Time
(mm:ss)
Memory
(GB)
Reads
mapped
(%)
All
(%)
All-best
(%)
Any-best
(%)
Recall
(%)
Precision
(%)
AMAS
38:58
05:55
19.6
99.90
99.02
99.99
100
99.89
100
Bowtie2
(k=100)
185:30
24:41
3.6
99.90
98.20
99.76
99.94
99.64
99.90
GEM
(all)
332:47
NA
19.7
99.90
98.71
99.95
99.99
99.42
99.55
Masai
217:06
NA
17.0
99.90
100
100
100
99.90
100
Hobbes2
180:35
24:21
14.2
99.90
99.91
100
100
99.81
99.91
mrFAST
122:26
NA
2.3
NA
NA
NA
NA
NA
NA
mrsFAST
33:53
07:08
2.9
62.56
61.42
62.28
62.31
60.92
97.71
18
Additional files
Additional file 1 – Supplementary figures
Additional file 2 – Supplementary tables
19
(A)
16
16
16
16
16
16
55
3
35,778
1,585
6,534
3,246
13
15
17
13
15
24
157
134
184
293
282
7
∑=47,201
∑=1,057
(B)
AAAAAAAAAA: 3,000,786
A: 612
A: 2,272
A: 99
A: 208
C: 386
C: 700
C: 35
C: 323
AGGTCAAGAA: 5,466
G: 438
G: 1,136
G: 165
G: 148
T: 836
T: 1,358
TTTTTTTTTT: 3,015,555
T: 24
T: 157
| 5 |
A LINEAR TIME ALGORITHM FOR THE 3-NEIGHBOUR TRAVELLING
SALESMAN PROBLEM ON A HALIN GRAPH AND EXTENSIONS
arXiv:1504.02151v5 [cs.DM] 4 Sep 2017
BRAD WOODS, ABRAHAM PUNNEN, AND TAMON STEPHEN
Abstract. The Quadratic Travelling Salesman Problem (QTSP) is to find a least cost Hamiltonian cycle
in an edge-weighted graph, where costs are defined for all pairs of edges contained in the Hamiltonian cycle.
The problem is shown to be strongly NP-hard on a Halin graph. We also consider a variation of the QTSP,
called the k-neighbour TSP (TSP(k)). Two edges e and f , e 6= f , are k-neighbours on a tour τ if and only
if a shortest path (with respect to the number of edges) between e and f along τ and containing both e
and f , has exactly k edges, for k ≥ 2. In (TSP(k)), a fixed nonzero cost is considered for a pair of distinct
edges in the cost of a tour τ only when the edges are p-neighbours on τ for 2 ≤ p ≤ k. We give a linear time
algorithm to solve TSP(k) on a Halin graph for k = 3, extending existing algorithms for the cases k = 1, 2.
Our algorithm can be extended further to solve TSP(k) in polynomial time on a Halin graph with n nodes
when k = O(log n). The possibility of extending our results to some fully reducible class of graphs is also
discussed. TSP(k) can be used to model the Permuted Variable Length Markov Model in bioinformatics as
well as an optimal routing problem for unmanned aerial vehicles (UAVs).
1. Introduction
The Travelling Salesman Problem (TSP) is to find a least cost Hamiltonian cycle in an edge weighted
graph. It is one of the most widely studied combinatorial optimization problems and is well-known to be
NP-hard. The TSP model has been used in a wide variety of applications. For details we refer the reader to
the well-known books [2, 8, 18, 23, 27] as well as the papers [4, 13, 21, 22].
For some applications, more than linear combinations of distances between consecutive nodes are desirable in formulating an objective function. Consider the problem of determining an optimal routing of an
unmanned aerial vehicle (UAV) which has a list of targets at specific locations. This can be modelled as a
TSP which requires a tour that minimizes the distance travelled. However, such a model neglects to take
into account the physical limitations of the vehicle, such as turn radius or momentum. To illustrate this
idea, in Figure 1 we give a Hamiltonian path, in Figure 2 we give the corresponding flight path, and Figure 3
shows a route which is longer but can be travelled at a greater speed and hence reducing the overall travel
time. To model the traversal time, we can introduce penalties for pairs of (not necessarily adjacent) edges
to force a smooth curve for its traversal. In this paper we consider a generalization of the TSP which can
be used to model similar situations and contains many variations of the TSP, such as the angular-metric
TSP [1] and the TSP [5] as special cases.
Let G = (V, E) be an undirected graph on the node set V = {0, 1, . . . , n − 1} with the convention that
all indices used hereafter are taken modulo n. For each edge (i, j) ∈ E a nonnegative cost cij is given. Let
F be the set of all tours (Hamiltonian cycles) in G and let τ = (v0 , v1 , . . . , vn−1 , v0 ) ∈ F. Note that a tour
τ can be represented either by its sequence (permutation) of the vertices, or by the sequence, or simply the
set, of edges it traverses. In this paper, it is usually more convenient to work with the edge representation.
The edges e = (vi , vi+1 ) and f = (vj , vj+1 ), e 6= f , are k-neighbours on τ , if and only if a shortest path
between e and f on τ containing these edges has exactly k edges, for k ≥ 2. Here the shortest path refers to
the path with the least number of edges, rather than the minimum cost path. Thus e and f are 2-neighbours
in τ if and only if they share a common node in τ .
Let q(e, f ) be the cost of the pair (e, f ) of edges and δ(k, τ ) = {(e, f ) : e, f ∈ τ and e and f are pneighbours on τ for some 2 ≤ p ≤ k}. Assume that q(e, f ) = q(f, e) for every pair of edges e, f ∈ E. Then
the k-neighbour TSP (TSP(k)) is defined as in [31]
1
Figure 2. Smoothing of the optimal TSP tour.
Figure 1. Optimal TSP tour.
Figure
Figure
Figure
3. A
Figure 3. A route which
cantour
be
1.
Optimal
Figure
which
can
1. Optimal TSP tour.
TSP
tour
2. Smoothbe
travFigure
2. Smoothing
of the optimal TSP
tour.
with respect
ing of the
elled more
to length.
tour.
quickly.
T SP (k) :
X
Minimize
q(e, f ) +
(e,f )∈δ(k,τ )
Subject to
X
travelled more quickly
c(e)
e∈τ
τ ∈ F.
A closely related problem, the Quadratic TSP (QTSP), is defined as follows:
QT SP :
X
Minimize
(e,f )∈τ ⊗τ
Subject to
q(e, f ) +
X
c(e)
e∈τ
τ ∈ F.
where
τ ⊗ τ = τ × τ \ of
{(e,the
e) : e ∈
τ }. Note: TSP tour.
Figure 2.
Smoothing
optimal
(
Figure 3. A route which
can be iftravelled
more
1 quickly.
δ(n/2, τ )
n is even
gure 3.
τ ⊗τ =
δ((n + 1)/2, τ )
if n is odd.
Thus when k ≥ n/2 (for n even) or k ≥ (n + 1)/2 (for n odd), the k-neighbour TSP reduces to the
Quadratic TSP [33]. Define TSP(1) to be the original TSP. Elsewhere in the literature (e.g. [17], [14]), the
term Quadratic TSP is sometimes used for what we refer to as TSP(2). That is, quadratic terms are allowed,
but only for pairs of edges that share a node.
The bottleneck version of TSP(k) was introduced by Arkin et al. in [3], denoted as the k-neighbour
maximum scatter TSP. Jäger and Molitor [19] encountered TSP(2) while studying the Permuted Variable
Length Markov Model. Several heuristics are proposed and compared in [16, 19] as well as a branch and
bound algorithm for TSP(2) in [16]. A column generation approach to solve TSP(2) is given in [28], lower
bounding procedures discussed in [29], and polyhedral results were reported by Fischer and Helmberg [17],
Fischer [14], and Fischer and Fischer [15]. The k-neighbour TSP is also related to the k-peripatetic salesman
problem [12, 20] and the watchman problem [7]. Algorithms for maximization and minimization versions of
TSP(2) were studied by Staněk [30] and Oswin et al. [26]. To the best of our knowledge, no other works in
the literature address TSP(k).
Referringwhich
to the UAV
discussed earlier,
it isquickly.
clear that the flight subpaths depend on both the
A route
canexample
be travelled
more
angle and distances between successive nodes. By precalculating these and assigning costs to q(e, f ), for
e, f ∈ E, we see that QTSP is a natural model for this problem. In fact, the flight paths may be affected by
edges further downstream. Thus we can get successively better models by considering TSP(1), TSP(2),. . .,
12
TSP(k) in turn. In practice we expect diminishing returns to take hold quickly and hence TSP(k) with small
values of k are of particular interest.
In this paper we show that QTSP is NP-hard even if the costs are restricted to 0-1 values and the
underlying graph is Halin. In contrast, TSP and TSP(2) on a Halin graph can be solved in O(n) time [9, 33].
Interestingly, we show that TSP(3) can also be solved on a Halin graph in O(n) time, although as we move
from TSP(2) to TSP(3), the problem gets much more complicated. In fact, our approach can be extended to
obtain polynomial time algorithms for TSP(k) whenever k = O(log n). We note that while Halin graphs have
treewidth 3, the results on graphs with bounded treewidth (e.g. [6, 11]) usually cannot easily be extended
to optimization problems with quadratic objective functions.
The paper is organized as follows. In Section 2 we introduce some preliminary results and notations for the
problem. The complexity result for QTSP on Halin graphs is given in Section 3. An O(n) algorithm to solve
TSP(3) on Halin graphs is given in Section 4.1, which can be extended to obtain an O(n2(k−1)/2 ) algorithm
for TSP(k). Further extensions of this result to fully reducible classes of graphs are briefly discussed in
Section 5.
An earlier version of the NP-completeness results presented here were included as part of the M.Sc. thesis
of the first author [31].
2. Notations and definitions
A Halin graph H = T ∪ C is obtained by embedding a tree with no nodes of degree two in the plane and
connecting the leaf nodes of T in a cycle C so that the resulting graph remains planar. Unless otherwise
stated, we always assume that a Halin graph or its subgraphs are given in the planar embedded form. The
non-leaf nodes belonging to T are referred to as tree or internal nodes and the nodes in C are referred to
as cycle or outer nodes of H. A Halin graph with exactly one internal node is called a wheel. If H has at
least two internal nodes and w is an internal node of T which is adjacent to exactly one other internal node,
then w is adjacent to a set of consecutive nodes of C, which we denote by C(w). Note that |C(w)| ≥ 2.
The subgraph of H induced by {w} ∪ C(w) is referred to as a fan, and we call w the centre of the fan. See
Figure 4.
F
w
edge in C
edge in T
fan in H
Figure
1. A Halin graph with 3 fans. w is the centre of fan F .
Figure 4. A Halin graph H with 3 fans. w is the centre of fan F .
Lemma 2.1 (Cornuejols et al. [9]). Every Halin graph which is not a wheel has at least two fans.
Let G = (V, E) be a graph and let S ⊆ V be a connected subgraph of G. Let ϕ(S) be the cutset of S,
that is, the smallest set of edges whose removal disconnects S from the vertices in V \ S. Let G/S be the
graph obtained by contracting S into a single node, called a ‘pseudonode’ denoted by vS [9]. The edges in
G/S are obtained as follows:
3
(1) An edge with both ends in S is deleted;
AinHalin
with
3 fans. w is the centre
(2) An edge Figure
with both 1.
ends
G − Sgraph
remains
unchanged;
(3) An edge (v1 , v2 ) with v1 ∈ G − S, v2 ∈ S is replaced by the edge (v1 , vs ).
of fan F .
Lemma 2.2 (Cornuejols et al. [9]). If F is a fan in a Halin graph H, then H/F is a Halin graph.
Note that each time a fan F is contracted using the graph operation H/F , the number of non-leaf nodes
of the underlying tree is reduced by one. That is, after at most d(n − 1)/2e fan contractions, a Halin graph
will be reduced to a wheel.
Let w be the centre of a fan F , and label the outer nodes in F in the order they appear in C as,
u1 , u2 , . . . , ur (r ≥ 2). Let (j, k, l) be the 3-edge cutset ϕ(F ) which disconnect F from G such that j is
adjacent to u1 , k is adjacent to w but not adjacent to ui for any i, 1 ≤ i ≤ r, and l is adjacent to ur (See
Figure 5, r = 4).
Note that every Hamiltonian cycle τ in H contains exactly two edges of {j, k, l}. The pair of edges chosen
gives us a small number of possibilities for traversing F in a tour τ . For example, if τ uses k and l, it contains
the subsequence w, u1 , u2 , . . . , ur (call this a left-traversal of F ), if τ uses j and k it contains the subsequence
u1 , u2 , . . . ur , w (call this a right-traversal of F ) and if τ uses j and l, it contains a subsequence of the form
u1 , u2 , . . . , ui , w, ui+1 , . . . , ur , for some i ∈ {1, 2, . . . , r − 1} as it must detour through the centre of F (call
this a centre-traversal of F ).
j
F
u1
u2
u3
v
k
edge in C
edge in T
fan in H
u4
l
Figure
A Halin
H containing
fan
F a. 3-edge
{j, k,cutset
l} is which
a 3-edge
cutset
Figure
5. 2.
A Halin
graphgraph
H containing
fan F . {j, k,
l} is
disconnects
disconnects F from H.
Fwhich
from H.
1
3. Complexity of QTSP on Halin graphs
Many optimization problems that are NP-hard on a general graph are solvable in polynomial time on a
Halin graph [9, 24, 25]. In particular, TSP on a Halin graph is solvable in linear time. Unlike this special
case, we show that QTSP is strongly NP-hard on Halin graphs. The decision version of QTSP on a Halin
graph, denoted by RQTSP, can be stated as follows:
P
e∈τ c(e) +
P “Given a Halin graph H and a constant θ, does there exist a tour τ in H such that
q(e,
f
)
≤
θ?”
e,f ∈τ
Theorem 3.1 (Woods [31]). RQTSP is NP-complete even if the values c(e) ∈ {0, 1} and q(e, f ) ∈ {0, 1}
for e, f ∈ H.
Proof. RQTSP is clearly in NP. We now show that the 3-SAT problem can be reduced to RQTSP. The
3-SAT problem can be stated as follows: “Given a Boolean formula R in Conjunctive Normal Form (CNF)
containing a finite number of clauses C1 , C2 , . . . , Ch on variables x1 , x2 , . . . , xt such that each clause contains
4
exactly three literals (L1 , . . . , L3h where for each i, Li = xj or Li = ¬xj for some 1 ≤ j ≤ t), does there
exists a truth assignment such that R yields a value ‘true’ ?”
From a given instance of 3-SAT, we will construct an instance of RQTSP. The basic building block of our
construction is a 4-fan gadget obtained as follows. Embed a star on 5 nodes with center v and two specified
nodes ` and r on the plane and add a path P from ` to r covering each of the pendant nodes so that the
resulting graph is planar (see Figure 6). Call this special graph a 4-fan gadget.
µ1
µ2
µ3
r
`
v
Figure
4-fan
gadget
constructed
by embedding
starinon
nodes
the
Figure 6.3.4-fan
gadget
constructed
by embedding
a star on 5anodes
the4plane
andinadding
a path.and adding a path connecting the pendant nodes so that the resulting
plane
graph is planar.
The nodes on path P of this gadget are called outer nodes and edges on P are called outer edges. Let
µ1 , µ2 , µ3 be edges with distinct end points in P . Note
C1 that any `-r Hamiltonian path of the gadget must
contain all the outer edges except one which
is
skipped
to detour through v. We will refer to an `-r
µ
2
µ1
µ3
Hamiltonian path in a 4-fan gadget as a center-traversal
as
r1 before.
l1
We will construct a Halin graph H using one copy of the gadget for each clause and let µ1 , µ2 , µ3 correspond
to literals contained in that clause. We will assign costs to pairs of edges such that every Hamiltonian cycle
with cost 0 must contain a centre-traversal for each clause. To relate a Hamiltonian cycle to a truth
vy which does not contain edge µi corresponds
assignment, a centre-traversal
to an assignment of a true value
l2
µ4
to literal Li .
v1
y clause C1 , . . . , Ch , create a copy of µthe 4-fan gadget. The r, `, and v
Now construct H as follows. For each
5
nodes of the 4-fan gadget corresponding to the clause Ci are denoted by ri , `i andCv2i respectively. Connect the
6
node ri to the node `i+1 , i = 1, 2, . . . , h. Introduce nodes vxv2and vy and theµedges
(`1 , vx ), (vx , vy ), (vy , rh ).
vx w and connect it to vw
Also introduce a new node
x , vy and vi for i = 1, 2, . r.2. , h − 1. The resulting graph is
the required Halin graph H. See Figure
x 7.
Assign the cost c(e) = 0 for every edge in H. Let x = (vx , w) and y = (vy , w). Note that every tour
which contains edges x and y traverses every gadget using a centre-traversal. For each gadget: assign costs of
v4
v3
q(e, f ) = 1 for pairs of edges which are neither outer edges nor both adjacent to the same literal edge µ1 , µ2
or µ3 , and for all other pairs of edges within the gadget assign cost 0. For each variable xj , j = 1, . . . , n,
and all literals Lm , Lq (m 6=r4q) if xj = Lm = ¬Lq , assign cost q(µ0ml,3µ0q ) = 1 where µ0m and µ0q are edges
connecting µm (and µq ) to the
paired costs are assumed to be 0.
µ7
µ12respective 4-fan gadget centre v. All other
Suppose B is a valid truth assignment.
Then
in
each
clause
there
exists
at least one true literal. Consider
µ
8
µ11
C3gadget such that τ detours around
C4 the
a tour τ in H which contains
edges
r3 µ9 every
µ10 l4x and y and traverses
exactly one literal edge which corresponds to a literal which is true in B. Since the truth assignment is
valid, such a τ exists. Clearly τ has cost 0, since no costs are incurred by pairs of edges contained in a single
Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
gadget, nor are costs incurred of the form q(µ0a , µ0b ) where La = ¬Lb . The latter
must be true because in
any truth assignment, the variable corresponding to La , say xa , must be either assigned a value of true or
false. Suppose a cost of 1 is incurred by q(µ0a , µ0b ) and hence La = ¬Lb . If xa is true, and xa = La , then
Lb clearly must be false, so τ cannot detour to miss both µ0a and µ0b . The same contradiction arises, if xa is
false. Hence a yes instance of 3-SAT can be used to construct a yes instance for RQTSP with θ = 0.
Now suppose there is a tour which solves RQTSP with θ = 0. Suppose τ 0 is such a tour. Clearly it
must use edges x and y, and hence must traverse every gadget via a centre-traversal. Such a detour must
5
v
Figure 3. 4-fan gadget constructed by embedding a star on 4 nodes in the
plane and adding a path connecting the pendant nodes so that the resulting
graph is planar.
C1
µ1
µ2
µ3
r1
l1
vy
l2
v1
y
µ5
µ6
v2
vx
C2
r2
w
x
v4
v3
r4
l3
µ12
µ7
C4
µ4
µ8
µ11
r3 µ 9
µ10 l4
C3
Figure 4. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
Figure 7. Example of the Halin graph constructed from F = C1 ∧ C2 ∧ C3 ∧ C4 .
skip a literal edge in every gadget, otherwise a cost of 1 is incurred. Suppose D = {L1 , . . . , Ls } is the set
of literals which are skipped. Li 6= ¬Lj for any i, j, otherwise a cost of 1 is incurred. This implies that a
truth assignment which results in every literal in D being true is a valid truth assignment to the variables
x1 , . . . , xt . That is, for each literal edge which is skipped in τ 0 , assign true or false to the corresponding
variable such that the literal evaluates to true (if Li = xj , set xj = true and if Li = ¬xj , set xj = f alse).
The truth values for any remaining variables can be assigned arbitrarily. This truth assignment returns true
for each clause since exactly one literal in each clause is detoured, and evaluates to true. Hence this truth
assignment is a valid assignment for 3-SAT.
4. Complexity of k-neighbour TSP on Halin graphs
Let G be a planar embedding of a planar graph and e and f are two distinct edges of G. Then e and f
2 contains both e and f . This may include the outer
are said to be cofacial if there exists a face of G which
face.
Theorem 4.1. Let τ be a tour in the planar embedding H = T ∪ C of a Halin graph. Then, any two edges
adjacent in τ must be cofacial.
Proof. Suppose the result is not true. Then, there exists a tour τ in H containing two adjacent edges
e = (u, x), f = (x, v) such that e and f are not cofacial. From our previous discussion on fan traversals, we
can assume that x 6∈ C. Since e and f are not cofacial at x, there exists edges g = (y, x) and h = (x, z) in
H such that the clockwise ordering of edges incident on x is of the form f, . . . , g, . . . , e, . . . , h (See Figure 8).
Without loss of generality, assume T is rooted at x. Then T has at least four subtrees Tu , Tv , Ty , Tz rooted
respectively at u, v, y and z. Since τ is a tour containing the edge e, it must contain a path, say P1 , through
the subtree Tu from u to uc ∈ C. Note that uc could be the same as u and in this case the subtree Tu is
the isolated node u. Similarly, τ must contain a path P2 in Tv from v to vc ∈ C (See Figure 8). Note that
P = P1 ∪ P2 ∪ {e, f } is a path in τ . Deleting the vertex set V (P ) of P and its incident edges from H yields
a disconnected graph. Thus, τ − V (P ) must be disconnected, a contradiction.
A preliminary version of this result is given in [31].
6
yc
y
g
uc
P1
u
e
x
v
f
vc
P2
h
z
zc
Figure8.5.A A
Halin
graph
H non-consecutive
with non-consecutive
edges
andx.f Hat− node
x.
Figure
Halin
graph
H with
edges e and
f at enode
P where
P
P2 ∪ {e,Pf }=has
hence
no components,
τ contains bothhence
edges enoand
f.
H =−PP1 ∪where
P1 two
∪ Pcomponents,
two
τ contains
2 ∪ {e, f } has
both edges e and f .
x
A path in the planar embedding H = T ∪ C of a Halin
graph is called a candidate paths if its consecutive
α
α
5
edges are cofacial. A candidate path with k-edges is called 6a candidate k-path. Note that only candidate
paths can be subpaths of a tour but it is possible that kthere are candidate paths that are not part of a tour.
Corollary 4.2. Let H = T ∪ C be a planar embedding of a Halin graph
a specified edge of H.
α4 and eαbe
α2
3
w
Then, H has at most k α
· 21k−1 candidate
k-paths containing
e.
Proof. Consider extending e, if necessary in either directions in H, to a candidate k-path P . For a given
u
u0
end point of a sub path of P , say
vertex u, tby
are onlyr+1
two possible edges incident on
1 Theorem 4.1,tthere
r
u, which may belong to P . Thus, there are at most 2k−1 candidate k-paths when the position of e is fixed.
Since e can take any of the k positions
in a candidate k-path, there arel at most k · 2k−1 candidate k-paths
j
u1
ur
containing e.
yr−1
y1
As an immediate consequence of Corollary 4.2, we have an upper bound of 2n−2 on the number of
Hamiltonian cycles in a Halin graph. To see this, let r be the number of Hamiltonian cycles in H. From
Figure 6. A fan F with centre w. Every τ containing j and k contains
each such cycle, we can generate n distinct Hamiltonian paths (candidate (n − 1)-paths) by ejecting an edge.
edges
. . ,Hamiltonian
yr−1 , tr . Every
l contains
y1and
, . . . all
, yr−1
, t1paths
.
1 , .all
Repeating
this yfor
cyclesτ incontaining
H, we get k
rnand
candidate
(n − edges
1)-paths
these
are
Every
τ
containing
j
and
l
must
contain
one
of
the
subpaths
from
the
set
distinct. Hence rn is a lower bound on the number of candidate (n − 1)-paths in H. By Corollary 4.2,
(n − 1)2n−2
upper
Thus,
{α1is−anj −
l − bound
α3 , α1on
− the
j −number
l − α4 ,ofαcandidate
− −α1)-paths
l−
α4 }.rn ≤ (n − 1)2n−2 and
2 − j − l (n
3 , α2 − jin−H.
n−1 n−2
n−2
hence r ≤ n 2
≤2
.
Noting that there are at most 2(n − 1) edges in H and that the number of quadratic costs which are
relevant is the number of candidate k-paths, it follows from Corollary 4.2, that the number of quadratic
costs which are relevant is bounded above by k · 2k · (n − 1) = O(n) for any fixed k and O(nt+2 ) if k ≤ t log n.
Note that any face of H must contain an outer edge. Moreover, the following Corollary will prove useful.
Corollary 4.3. If H is embedded in the plane such that it is planar and C defines the outer face, for any
outer edge e which is contained in the outer face and face Fe , every tour which does not contain e must
contain all other edges of Fe .
7
3
4.1. TSP(3) on Halin graphs. As indicated earlier, TSP(1) is the same as TSP, which is solvable in linear
time on Halin graphs [9]. TSP(2) can also be solved in linear time by appropriate modifications of the
algorithm of [25] as indicated in [33]. However, for k ≥ 3, such modifications do not seem a viable option.
We now develop a linear time algorithm to solve TSP(3).
Let us start with an alternative formulation of TSP(3). For any subgraph G of H, let P3 (G) be the
collection of all distinct candidate 3-paths in G. For each candidate 3-path (e, f, g) ∈ P3 (H), define
q(e, f, g) = q(e, g) +
q(e, f ) + q(f, g) c(e) + c(f ) + c(g)
+
.
2
3
(4.1)
Now consider the simplified problem:
ST SP (3) :
Minimize
X
q(e, f, g)
(e,f,g)∈P3 (τ )
Subject to
τ ∈ F.
Theorem 4.4. Any optimal solution to the STSP(3) is also optimal solution to TSP(3).
Proof. For any τ ∈ F,
X
q(e, f, g)
(e,f,g)∈P3 (τ )
q(e, f ) + q(f, g) c(e) + c(f ) + c(g)
+
=
q(e, g) +
2
3
(e,f,g)∈P3 (τ )
X
X
=
q(e, f ) +
c(e).
X
(e,f )∈δ(3,τ )
e∈δ(τ )
Thus, the objective function values of STSP(3) and TSP(3) are identical for identical solutions. Since the
family of feasible solutions of both these problems are the same, the result follows.
In view of Theorem 4.4, we restrict our attention to STSP(3).
For TSP(1), Cornuejols et al. [9] identified costs of new edges generated by a fan contraction operation
by solving a linear system of equations. This approach cannot be extended for any k-neighbour TSP for
k ≥ 3 as it leads to an over-determined system of equations which may be infeasible. Instead, we extend the
penalty approach used in Phillips et al. [25]. The idea here is to introduce a node-weighted version of the
problem STSP(3) where we use a penalty function for the nodes of C, the value of which depends on the
edges chosen to enter and exit the node, along with some other ‘candidate’ edges. We iteratively contract
the fans in H, storing the appropriate values of suitable subpaths as we traverse the fans in a recursive
way. Once we reach a wheel, we can compute an optimal tour for the resulting problem. Backtracking by
recovering appropriate subpaths from contracted fans in sequence, an optimal solution can be identified.
To formalize the general idea discussed above, let us first discuss the case where H is a Halin graph which
is not a wheel. In this case, H will have at least two fans.
Let F be an arbitrary fan in H with w as the centre. Label the outer nodes of F in the order they
appear in C, say, u1 , u2 , . . . , ur (r ≥ 2). Let {j, k, l} be the 3-edge cutset ϕ(F ) which disconnects F from H
such that j is adjacent to u1 , k is adjacent to w and l is adjacent to ur . Let j = (u1 , u0 ), k = (w, x) and
l = (ur , ur+1 ). There are exactly two edges not connected to F which are cofacial with k and incident on
x. The first edge which follows k in the clockwise orientation of edges incident on x is denoted α5 , and the
other edge incident on x and cofacial with k is denoted by α6 . (See Figure 9.) There are exactly two edges
not connected to F and incident on u0 . These edges are labelled α1 , α2 . Likewise, there are exactly two
edges not connected to F and incident on ur+1 . These edges are labelled α3 , α4 . (See Figure 9.) Without
loss of generality α1 , α3 are in C and α2 , α4 are in T . It is possible that α2 could be the same as α5 and also
possible that α4 could be the same as α6 .
To complete a fan contraction operation, we consider the 3 types of traversals of F . We define a penalty
function stored at nodes (pseudonodes) of C which contains attributes of a minimum traversal of F of each
type. For any left- or right-traversal of F , there is a single path through F using all cycle edges. Any tour
which includes j and k must pass through one edge of the pair incident on u0 lying outside F together with
edges y1 , . . . , yr−1 , tr , k, α6 . Similarly, any tour which includes k and l must pass through one edge of the
pair incident on ur+1 lying outside F together with edges yr−1 , . . . , y1 , t1 , k, α5 . Any tour which includes j
and l must also pass through one edge in each of the pairs of edges incident on u0 (or ur+1 ) lying outside
8
z
zc
F . That is, every tour τ containing j and l must contain a path containing one collection of edges from the
set {(α1 ,Figure
j, l, α3 ), (α5.
l, α
, j, l, α3 ),
α4 )}. We refer to aedges
centre-traversal
of Fnode
whichx.bypasses
1 , j,A
4 ), (α2graph
2 , j, l, non-consecutive
Halin
H(αwith
e and f at
y1 ∈ F ∩ C as a left path, one which bypasses ys ∈ F ∩ C for some s ∈ [2, r − 2] as a middle path, and one
H − P where P = P ∪ P ∪ {e, f } has two components, hence no τ contains
which bypasses yr−1 ∈ F ∩ C as 1a right2 path.
both edges e and f .
α5
x
α6
k
α2
α1
α4
w
u0
t1
ur+1
tr
j
u1
α3
ur
l
yr−1
y1
Figure9. 6.
A Ffan
F centre
withw.centre
Every jτand
containing
j and
Figure
A fan
with
Every τw.
containing
k contains edges
y1 ,k. . .contains
, yr−1 , tr .
Every
τ
containing
k
and
l
contains
edges
y
,
.
.
.
,
y
,
t
.
Every
τ
containing
j
and
l must
edges y1 , . . . , yr−1 , tr . Every τ containing
k and
, t1 .
1
r−1 l 1contains edges y1 , . . . , yr−1
contain
one
of
the
subpaths
from
the
set
{α
−
j
−
l
−
α
,
α
−
j
−
l
−
α
,
α
−
j
−
l
−
α
1
4
2 from the
3 , αset
2−
Every τ containing j and l must contain
one3 of1 the subpaths
j − l − α4 }.
{α1 − j − l − α3 , α1 − j − l − α4 , α2 − j − l − α3 , α2 − j − l − α4 }.
Let S be the set of nodes (pseudonodes) in C at some iteration in the contraction process. In TSP(3),
quadratic costs are ‘absorbed’ during each fan contraction operation, depending both on the edges in F and
within a distance 2 from F , so care must be taken to retain the proper information. That is, in order to
develop an extension of the penalty approach used in Phillips et al. [25] for TSP(3), we extend the penalty
function stored at the nodes (pseudonodes) in C that depends on an additional parameter ρ, which specifies
the structure of edges around each pseudonode. Note that due to the recursive property of pseudonodes where
a fan contraction operation may ‘absorb’ pseudonodes, the parameter ρ specifies a shape of the structure
rather than explicitly stating the edges surrounding a pseudonode. Further, we define a function β which
stores the penalty values associated with ρ.
3 0), L = (1, 0), R = (0, 1), B = (1, 1)} and A2 be the
Let A1 be the collection of ordered pairs {M = (0,
collection of ordered pairs {(1, 3), (1, 4), (1, 6), (2, 3), (2, 4), (2, 6), (5, 3), (5, 4)}. At each node i ∈ S we define
12
1
2
21 22
2
ρi = (ρ1i , ρ2i ) where ρ1i = (ρ11
i , ρi ) ∈ A and ρi = (ρi , ρi ) ∈ A . ρi indicates which penalty value (to be
defined shortly) stored at pseudonode i is to contribute to the objective function value. The first component
of ρi is a binary vector of length 2 which specifies the inner structure of i (edges y1 , t1 , yr−1 and tr prior
to any fan contractions such that the first component is 0 if y1 is selected, and 1 if t1 is instead, and the
second component is 0 if yr−1 is selected, and 1 if tr is instead), and the second component of ρi , the outer
structure (α1 to α6 prior to any contraction of adjacent pseudonodes). Let ρ be the vector containing ρi for
every i ∈ S. Let ρH/F be the restriction of ρ to the vertices in H/F and augmented by ρvF ∈ {(a, b)}. Let
βi (ρi ) be the penalty that is incurred if ρi occurs at i.
For i ∈ C define:
(
βi (ρi ) if ρi is defined,
Pi (τ, ρi ) =
0
otherwise.
Since the penalties stored at i ∈ S depend on edges which are not incident with i, and the dependent
edges may be ‘absorbed’ into adjacent pseudonodes so that not every ρ is feasible for a given τ . That is, the
inner and outer structures of adjacent pseudonodes in C must agree. Formally, we say that ρ is feasible for
τ if the following conditions are satisfied for every pseudonode i
(1) j, k ∈ τ ⇐⇒ ρ22
i = 6 and
(2) k, l ∈ τ ⇐⇒ ρ21
i = 5,
9
Figure 7. A tour τ in a wheel, which skips edge ci .
ci−1
ci+1
ti+1
ti
w
ui+1
i
and for every pair of consecutive upseudonodes
i, i + 1 ∈ C
(1)
(2)
(3)
(4)
ρ12
i
ρ12
i
ρ22
i
ρ22
i
=1
=0
=3
=4
⇐⇒
⇐⇒
⇐⇒
⇐⇒
ρ21
i+1
ρ21
i+1
ρ11
i+1
ρ11
i+1
= 2,
ci
= 1,
= 0 and
= 1.
ti+1
ti
ci
ui+1
ui
c
ci+1 For an example i−1
Let F 0 be the set of all feasible (τ, ρ) pairs.
of a feasible (τ, ρ) pair, see Figure 10.
Figure 8. Wheel H with center w considered as a fan.
F1
F2
F3
Figure
of Hofwhich
becomes
a fan after
contracting
F1 , F2 and F3F. ,The
Figure10.9. AAsubgraph
subgraph
H which
becomes
a fan
after contracting
1 F2
bold edges depict a centre-traversal of F contained in Hamiltonian cycle τ . Since τ contains
and F3 . The
bold edges depict a centre-traversal of F contained in Hamilton
the edges
t1 and yr−1 (relative to F1 ), the inner structure of vF1 must be (1, 0), and since
cycle
τ
.
A
(τ,
ρ F11 ),=the
((1,
0), (2,
3)), ρvofF2 v=
((0, 1), (1, 3))
τ contains edges ρ)
α2 pair
and αcontaining
outer
structure
3 (relative to vF
F1 must be (2, 3).
and ρis,vF3a =
((0, 0),
6)) is
feasible.
which
correspond
That
feasible
(τ, (2,
ρ) pair
must
contain The
ρvF1 edges
= ((1, 0),
(2, 3)).
Consideringtoallthe
of Finner
1 , F2
and
F
,
every
feasible
(τ,
ρ)
pair
contains
ρ
=
((1,
0),
(2,
3)),
ρ
=
((0,
1),
(1,
3))
and
3
vF2 correspond to the
structure
of ρvF2 are coloured in blue vand
the edges which
F1
ρ
=
((0,
0),
(2,
6)).
The
edges
which
correspond
to
the
inner
structure
of
ρ
are
coloured
vF3
vF2
outer
structure of ρvF2 are coloured in red.
in blue and the edges which
correspond to the outer structure of ρvF2 are coloured in red.
The problem now contains a cost for every triplet of consecutive edges in tour τ and additionally, a penalty
4
at each outer node i. Consider the modified 3-Neighbour
TSP on a Halin graph defined as follows:
M T SP (3) :
Minimize
X
z(τ, ρ) =
(e,f,g)∈P3 (τ )
Subject to
q(e, f, g) +
X
i∈C
Pi (τ, ρi )
(τ, ρ) ∈ F 0 .
The necessary costs to construct MTSP(3) can be obtained as required by applying (4.1) or by first
embedding H in the plane, and evaluating the candidate k-paths from Corollary 4.2. Note that Pv (τ, ρv )
can be computed in O(1) time by storing penalty 24-tuples containing the βv -values described in Table 1, at
each cycle node v. Also note that there may be O(2n ) feasible ρ vectors for a given τ , however, we show that
the optimal (τ, ρ) pair can be found in O(n)-time. It is also important to note that the set of pseudonodes
is retained for reasons which will become apparent.
In the initial graph, and for all ρi , i ∈ C, set βi (ρi ) = 0. For fan F in H, the penalties must be updated
to store the costs of traversing F when F is contracted to pseudonode vF . Let K represent
P the traversal of
F which contains only edges in C. That is, K = j − y1 − · · · − yr−1 − l. Then q(K) = e−f −g∈K q(e, f, g)
represents the cost incurred by selecting the edges in K. Let τ (F ) and ρ(F ) be the restrictions of τ and ρ
to F , respectively.
Assign the minimum cost of the right-traversal (which contains αs , s ∈ {1, 2} and α6 ), with inner structure
of the first pseudonode a ∈ {L = (1, 0), M = (0, 0)} to βvF (a, (s, 6)). That is, assign to βvF (a, (s, 6)) the
sum of the costs along the traversal, q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ), together with the minimum
feasible set of penalties on the outer nodes contained in F , u1 , u2 . . . , ur . Note that for the case that u1 6∈ S,
10
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Penalty
Description
βvF ((0, ∗), (1, 6)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((1, ∗), (1, 6)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((0, ∗), (2, 6)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((1, ∗), (2, 6)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((∗, 0), (5, 3)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((∗, 1), (5, 3)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((∗, 0), (5, 4)) traversal of F with inner structure (0, ∗) and outer structure
βvF ((∗, 1), (5, 4)) traversal of F with inner structure (1, ∗) and outer structure
βvF ((0, 0), (1, 3)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (1, 3)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (1, 3)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (1, 3)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (1, 4)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (1, 4)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (1, 4)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (1, 4)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (2, 3)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (2, 3)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (2, 3)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (2, 3)) traversal of F with inner structure (1, 1) and outer structure
βvF ((0, 0), (2, 4)) traversal of F with inner structure (0, 0) and outer structure
βvF ((0, 1), (2, 4)) traversal of F with inner structure (0, 1) and outer structure
βvF ((1, 0), (2, 4)) traversal of F with inner structure (1, 0) and outer structure
βvF ((1, 1), (2, 4)) traversal of F with inner structure (1, 1) and outer structure
Table 1. Description of penalty 24-tuple stored at pseudonodes in C.
(1, 6)
(1, 6)
(2, 6)
(2, 6)
(5, 3)
(5, 3)
(5, 4)
(5, 4)
(1, 3)
(1, 3)
(1, 3)
(1, 3)
(1, 4)
(1, 4)
(1, 4)
(1, 4)
(2, 3)
(2, 3)
(2, 3)
(2, 3)
(2, 4)
(2, 4)
(2, 4)
(2, 4)
it is not possible to have an inner structure L or B, and βvF (L, (s, 6)) = βvF (B, (s, 6)) = ∞. Otherwise
( r
)
X
βvF (a, (s, 6)) = q(αs − j − y1 − · · · − yr−1 − tr − k − α6 ) +
min 0
βui (ρui )
(τ (F ),ρ(F ))∈F (F ):
ρ1u =a or B,ρ22
ur =6
i=1
1
= q(αs , j, y1 ) + q(K) − q(yr−2 , yr−1 , l) + q(yr−2 , yr−1 , tr ) + q(yr−1 , tr , k) + q(tr , k, α6 ) (4.2)
( r
)
X
+
min 0
βui (ρui ) .
(τ (F ),ρ(F ))∈F (F ):
ρ1u =a or B,ρ22
ur =6
i=1
1
We will explain how the minimum in (4.2) can be calculated efficiently later in this paper.
Similarly, assign the minimum cost of the left-traversal (which contains αt , t ∈ {3, 4}, and α5 ) with inner
structure a ∈ {M = (0, 0), R = (0, 1)} to βvF (a, (5, t)). In the case that ur 6∈ S, it is not possible to have an
inner structure R or B, and βvF (R, (5, t)) = βvF (B, (5, t)) = ∞. Otherwise
βvF (a, (5, t)) = q(α5 , k, t1 ) + q(k, t1 , y1 ) + q(t1 , y1 , y2 ) + q(K) − q(j, y1 , y2 ) + q(yr−1 , l, αt )
( r
)
X
+
min 0
βui (ρui ) .
(τ (F ),ρ(F ))∈F (F ):
ρ1ur =a or B,ρ21
u =5
(4.3)
i=1
1
Let K(yi ), i ∈ {1, . . . , r − 1}, be the centre-traversal of F which does not contain yi . Then q(K(yi ))
represents the cost incurred by the edges in K(yi ). That is,
q(K(y1 )) = q(K) + q(j, t1 , t2 ) + q(t1 , t2 , y2 ) + q(t2 , y2 , y3 ) − q(j, y1 , y2 ) − q(y1 , y2 , y3 ),
11
q(K(yp )) = q(K) + q(yp−2 , yp−1 , tp ) + q(yp−1 , tp , tp+1 ) + q(tp , tp+1 , yp+1 ) + q(tp+1 , yp+1 , yp+2 )
− q(yp−2 , yp−1 , yp ) − q(yp−1 , yp , yp+1 ) − q(yp , yp+1 , yp+2 ),
for p ∈ {2, . . . , r − 2}, and
q(K(yr−1 )) = q(K) + q(yr−3 , yr−2 , tr−1 ) + q(yr−2 , tr−1 , tr ) + q(tr−1 , tr , l)
− q(yr−3 , yr−2 , yr−1 ) − q(yr−2 , yr−1 , l).
Assign the minimum cost of the centre-traversal which contains αs , s ∈ {1, 2}, and αt , t ∈ {3, 4}, which has
inner structure a ∈ {L = (1, 0), M = (0, 0), R = (0, 1), B = (1, 1)} to βvF (a, (s, t)). In the case that u1 6∈ S
and a = L, there is a single path traversing F with inner structure L, namely, j − t1 − t2 − y2 − · · · − yr−1 − l,
so
( r
)
X
βvF (L, (s, t)) = q(αs , j, t1 ) + q(K(y1 )) + q(yr , l, αt ) +
min 0
βui (ρui ) ,
(4.4)
(τ (F ),ρ(F ))∈F (F ):
22
ρ12
ur =0,ρu2 =6
i=2
and when u1 ∈ S, we assign the cost of the minimum centre-traversal with inner structure L. Note that this
path detours some yg , g ∈ {2, . . . , r − 1}.
( r
)
X
q(αs , j, t1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
.
βui (ρui )
βvF (L, (s, t)) =
min
g∈{2,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
12
ρ11
u1 =1,ρr =0,
21
22
ρug =5,ρu
g+1
=6
(4.5)
Similarly, when a = R and ur 6∈ S, there is a single path traversing F with inner structure R, namely,
j − y1 − · · · − yr−2 − rr−1 − tr − l so
(r−1
)
X
βvF (R, (s, t)) = q(αs , j, y1 ) + q(K(y1 )) + q(tr , l, αt ) +
min 0
βui (ρui ) ,
(4.6)
(τ (F ),ρ(F ))∈F (F ):
22
ρ11
=6
u =0,ρu
1
i=1
r−1
and when ur 6∈ S, we assign the cost of the minimum centre-traversal with structure R. Note that this path
detours some yg , g ∈ {1, . . . , r − 2}.
( r
)
X
βvF (R, (s, t)) =
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
min
g∈{1,...,r−2}
(τ (F ),ρ(F ))∈F (F ):
i=1
11
12
ρu1 =0,ρr =1,
21
22
ρug =5,ρu
g+1
=6
(4.7)
Now consider a = M . If u1 ∈ S, ur ∈ S then βvF (M, (s, t)) is assigned the cost of the minimum path
detouring yg for g ∈ {1, . . . , r − 1}. If u1 (ur ) is not a pseudonode then the centre-traversal must contain y1
(yr−1 ) and 1 (r − 1) is removed from g from the following equation.
(r−1
)
X
βvF (M, (s, t)) =
min
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
g∈{1,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
12
ρ11
u1 =0,ρur =0,
21
22
ρug =5,ρu
g+1
=6
(4.8)
12
Now consider a = B. This is the same as the case where a = M except for the inner structure.
(r−1
)
X
βvF (B, (s, t)) =
min
q(αs , j, y1 ) + q(K(yg )) + q(yr , l, αt ) +
min 0
βui (ρui )
.
g∈{1,...,r−1}
(τ (F ),ρ(F ))∈F (F ):
i=1
11
12
ρu1 =1,ρur =1,
21
22
ρug =5,ρu
g+1
=6
(4.9)
All βvF which have not been assigned are not associated with a feasible ρvF and are assigned a value ∞.
Theorem 4.5. Suppose H = T ∪ C is a Halin graph which is not a wheel and F is a fan in H. If (τ ∗ , ρ∗ )
is an optimal tour pair in H then there exists a feasible ρ∗H/F in H/F such that (τ ∗ /F, ρ∗H/F ) is optimal in
H/F and z(τ ∗ , ρ∗ ) = z(τ ∗ /F, ρ∗H/F ).
Proof. Let S be the set of pseudonodes in H. Let vF be the pseudonode which results from the contraction
of F , and label the vertices and edges of F as in Figure 9. Given (τ ∗ , ρ∗ ), we construct (τ ∗ /F, ρ∗H/F ) as
follows. Let ρ∗H/F,i = ρ∗i ∀i 6∈ F and ρ∗H/F,vF corresponding to the structure of (τ ∗ , ρ∗ ) around F in H. That
is, τ contains an αi , αj path through F in H, so let
ρ∗H/F,vF = ((a, b), (c, d))
where
(
0
a=
1
if (u1 6∈ S and y1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗11
u1 = 0)
∗
if (u1 ∈
6 S and y1 6∈ τ ) or (u1 ∈ S and ρ∗11
u1 = 1),
(
if (ur 6∈ S and yr−1 ∈ τ ∗ ) or (ur ∈ S and ρ∗12
u1 = 0)
∗
∗12
if (ur ∈
6 S and yr−1 6∈ τ ) or (ur ∈ S and ρu1 = 1),
b=
0
1
1
c= 2
5
if (u1 6∈ S and α1 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21
u0 = 1)
∗
if (u1 ∈
6 S and α2 ∈ τ ) or (u1 ∈ S and ρ∗21
u0 = 2)
if (u1 ∈
6 S and α5 ∈ τ ∗ ) or (u1 ∈ S and ρ∗21
u0 = 5),
3
d= 4
6
if (ur 6∈ S and tr 6∈ τ ∗ ) or (ur ∈ S and ρ∗22
ur = 3)
∗
if (ur ∈
6 S and tr ∈ τ ) or (ur ∈ S and ρ∗22
ur = 4)
∗
∗22
if (ur ∈
6 S and tr ∈ τ ) or (ur ∈ S and ρur = 6).
and
Then (τ ∗ /F, ρ∗H/F,vF ) is feasible in H/F .
Using equations (4.2)-(4.9) and noting that all new triples which contain vF have q(e, f, g) = 0, we get
X
X
z(τ ∗ , ρ∗ ) =
q(e, f, g) +
Pi (τ ∗ , ρ∗i )
(e,f,g)∈P3 (τ ∗ )
=
X
=
X
X
q(e, f, g) +
(e,f,g)∈
P3 (τ ∗ −F )
=
i∈C
(e,f,g)∈
P3 (τ ∗ )\P3 (τ ∗ −F )
q(e, f, g) +
(e,f,g)∈
P3 (τ ∗ /F −vF )
z(τ ∗ /F, ρ∗H/F ).
X
X
q(e, f, g) +
i∈C\F
βi (ρ∗i ) +
X
βi (ρ∗i )
i∈F
βi (ρ∗i ) + βvF (ρvF )
i∈C\F
It remains to show that (τ ∗ /F, ρ∗H/F ) is optimal in H/F . Towards a contradiction, suppose there exists
a tour pair (τ 0 /F, ρ0H/F ) 6= (τ ∗ /F, ρ∗H/F ) such that z(τ 0 /F, ρ0H/F ) < z(τ ∗ /F, ρ∗H/F ). The calculations of the
minimums in equations (4.2)-(4.9) imply that τ 0 /F 6= τ ∗ /F . Using equations (4.2)-(4.9), we can expand F ,
extending (τ 0 /F, ρ0H/F ) to (τ 00 , ρ00 ) in H with z(τ 0 /F, ρ0H/F ) = z(τ 00 , ρ00 ). Then z(τ 00 , ρ00 ) = z(τ 0 /F, ρ0H/F ) <
13
z(τ ∗ /F, ρ∗H/F ) = z(τ ∗ , ρ∗ ), contradicting the optimality of (τ ∗ , ρ∗ ). Hence (τ ∗ /F, ρ∗H/F ) is optimal in H/F .
We now show that βvF can be updated in O(|F |)-time, by introducing a structure which allows to optimally
chain together the β-values for consecutive nodes in F ∩ C. Refer to the subgraph induced by the nodes
{w} ∪ {ua , ua+1 , . . . , ub } as pseudo-fan P Fa,b for (1 ≤ a ≤ b ≤ r). Define the minimum penalty associated
with pseudo-fan P Fa,b to be P Fa,b (c, d) for a, b ∈ {1, . . . , r} with inner structure c ∈ {0, 1}2 and outer
structure d = (d1 , d2 ) ∈ {(1, 3), (1, 4), (2, 3), (2, 4)}. Note that the inner structure of pseudo-fan P Fa,b refers
to the edges y1 , t1 and yr−1 , tr within fans Fa and Fb (which are contracted to pseudonodes ua and ub ),
respectively. The outer structure refers to the edges α1 , α2 and α3 , α4 with respect to fans Fa and Fb , if ua
and ub are considered as pseudonodes.
To compute P Fa,b (c, d) we use the following recursion which chains together the minimum β-values
through consecutive nodes in C while maintaining feasibility of ρ.
For c1 , c2 ∈ {0, 1}, d1 ∈ {1, 2} and d2 ∈ {3, 4}, and 1 ≤ i ≤ r − 1
P F1,1 ((c1 , c2 ), (d1 , d2 )) = βu1 ((c1 , c2 ), (d1 , d2 ))
(4.10)
P Fr,r ((c1 , c2 ), (d1 , d2 )) = βur ((c1 , c2 ), (d1 , d2 ))
(4.11)
P F1,i+1 ((c1 , c2 ), (d1 , d2 )) =
min
{P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 ))}
(4.12)
min
{βui−1 ((c1 , t − 1), (d1 , s + 3)) + P Fi,r ((s, c2 ), (t, d2 ))}
(4.13)
s∈{0,1},t∈{3,4}
and
P Fi−1,r ((c1 , c2 ), (d1 , d2 )) =
s∈{0,1},t∈{1,2}
To prove that the recursions defined by (4.10)-(4.13) are correct, first consider the optimal
P F1,i+1 ((c1 , c2 ), (d1 , d2 )). The minimum feasible assignment of penalties for the nodes within pseudo-fan
P F1,i+1 is simply the minimum among optimal assignments of penalties for the nodes within pseudo-fan
P F1,i and the penalty at pseudonode ui+1 , such that these penalties are feasible. That is, the outer
structure of P F1,i must match the inner structure of ui+1 and vice-versa. By definition, this is precisely
min
P F1,i ((c1 , s), (d1 , t)) + βui+1 ((t − 3, c2 ), (s + 1, d2 )). An analogous argument holds for
s∈{0,1},t∈{3,4}
P Fi−1,r ((c1 , c2 ), (d1 , d2 )).
It is now possible to compute the minimum traversals of F used in equations (4.2)-(4.9). For example,
middle paths through F have a cost which minimizes the sum of the penalties on P F1,i−1 + βi and βi+1 +
P Fi+2,r , such that both pairs are feasible. Note that the minimum ρ(F ) has been found while performing
the recursion defined by equations (4.10)-(4.13). In the worst case, when all outer nodes in F belong to
S, we must compute P F1,1 , . . . , P F1,r−1 and P Fr,r , . . . , P F2,r , which can be done in O(|F |)-time. By precomputing these, one can evaluate the minimum traversals of F used in equations (4.2)-(4.9), in O(|F |)-time
and hence one can update βvF in O(|F |)-time.
We iteratively perform the fan contraction operation, updating costs and penalties until we are left with
a wheel. The optimal tour in H skirts the cycle C and detours exactly once through centre w, skipping
exactly one edge of C. Orient the cycle C in the clockwise direction. τ contains all edges in C except for the
skipped edge, say ci = (ui , ui+1 ), together with the two edges which detour around ci . Define function φ(ci )
for each edge ci = (ui , ui+1 ) ∈ E(C). Let ti and ti+1 be the tree edges adjacent to ui and ui+1 , respectively.
We will define
φ(ci )
=
q(ci−2 , ci−1 , ti ) + q(ci−1 , ti , ti+1 ) + q(ti , ti+1 , ci+1 )
+q(ti+1 , ci+1 , ci+2 ) − q(ci−2 , ci−1 , ci ) − q(ci−1 , ci , ci+1 )
−q(ci , ci+1 , ci+2 ).
Then, the optimal tour pair has
X
z(τ ∗ , ρ∗ ) = q(C) + min φ(ci ) + min
βuj (ρuj ) .
i:ci ∈C
feasible ρ
uj ∈C
Suppose that we fix an edge ci in τ . Then H can be considered to be a fan as shown in Figure 12.
14
ci
ui
ci−1
ti
ci−2
ui
ci−1
ci+1
ti+1
ci
w
ti
ci−2
ui+1
ui+1
ci+2
ci+1
ti+1
ci+2
w
Figure
wheel,which
which
skips
Figure7.
11.AAtour
tour ττ in
in aa wheel,
skips
edgeedge
ci . ci .
ci−1
ci+1
ti+1
ti
w
Figure
ui
7.
ci−1
ui+1 edge c .
A tour τ in a wheel, which skips
i
ti+1
ti
ci
ci
ci+1
ti+1
ti u
u
i+1
ui
w
i
ci−1
ci+1
ui+1
t
Figure 8. Wheel i+1
H with center twi considered as a fan.
ci
ci
ui+1
ui
ci−1
ci+1
Figure 8. Wheel H with center w considered as a fan.
Figure 12. Wheel H with centre w considered as a fan. Note that edge ci is fixed and the
fan ‘wraps’ around the wheel, reusing edges ci−1 , ci , ci+1 , ti−1 , ti and ti+1 .
F1
F2
F3
Figure 9. A subgraph of H which becomes a fan after contracting F1 , F2
and F3 . The bold edges depict a centre-traversal of F contained in Hamilton
cycle τ . A (τ, ρ) pair containing ρvF1 = ((1, 0), (2, 3)), ρvF2 = ((0, 1), (1, 3))
and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner
F1
F2
F3
structure of ρvF2 are coloured
in blue
and the edges
which correspond to the
outer structure
of ρvF2 are
red.
Figure
9. A subgraph
of coloured
H whichinbecomes
a fan after contracting F , F
Fix edge cr in τ and consider H to be a fan Fcr . Then the minimum tour in H can be determined
by
1
2
calculating
theFminimum
of theedges
minimum
centre-traversal
of Fcr and
which bypasses
cr (using, say,
and
depict
a centre-traversal
ofthe
F tour
contained
in Hamilton
3 . The bold
fan Fc1 ). cycle
This can
in O(r)-time
using
technique
above.
τ . be
A computed
(τ, ρ) pair
containing
ρvFthe
=pseudofan
((1, 0), (2,
3)), ρvdescribed
= ((0,
1), (1, 3))
F2
1
The preceeding discussion yields the following algorithm.
and ρvF3 = ((0, 0), (2, 6)) is feasible. The edges which correspond to the inner
15
4
structure of ρvF2 are coloured in blue and
the edges which correspond to the
outer structure of ρvF2 are coloured in red.
Algorithm 1 HalinTSP(3)(H, q, β)
Input: Halin graph H, quadratic cost function q, and penalty function β
if H is a wheel then
Use the wheel procedure to find an optimal tour τ in H
else
Let F be a fan in H
Contract F to a single node vF , using the Case 1 procedure. That is, assign penalties β to vF , assign
costs of 0 to all triples in H/F and assign costs of q to all remaining triples which are 3-neighbours in
H.
HalinTSP(3)(H/F , q, β)
end if
Expand all pseudonodes in reverse order and update τ
return τ
Each time that a fan is contracted, the number of tree nodes is reduced by 1, and hence the fan contraction
operation is performed one less than the number of non-leaf nodes in H. The fan contraction operation can
be performed in O(|F |)-time, and each time it is performed, the number of nodes in H is reduced by |F | − 1.
Since the wheel procedure takes O(n)-time, the total time for the algorithm is O(n).
4.2. TSP(k). We now show that the previous ideas can be extended to solve TSP(k). For any subgraph
G of H, let Pk (G) be the collection of all distinct candidate k-paths in G. For each candidate k-path
(e1 , e2 , . . . ek ) ∈ Pk (H), define
q(e1 , ek−1 ) + q(e2 , ek ) q(e1 , ek−2 ) + q(e2 , ek−1 ) + q(e3 , ek )
+
2
3
c(e1 ) + c(e2 ) + . . . + c(ek )
+ ... +
.
k
Now consider the simplified problem:
X
ST SP (k) : Minimize
q(e1 , e2 , . . . , ek )
q(e1 , e2 , . . . , ek ) =q(e1 , ek ) +
(4.14)
(e1 ,e2 ,...,ek )∈Pk (τ )
Subject to
τ ∈ F.
Theorem 4.6. Any optimal solution to the STSP(k) is also optimal for TSP(k).
Proof. Using equation (4.14), the proof of this follows along the same way as that of Theorem 4.4 and hence
is omitted.
As a result of Corollary 4.2, the preceding algorithm can be extended to solve TSP(k) by extending the
penalty functions at outer nodes to accommodate subpaths of length 2d(k+1)/2e .
A complete description of these varies as the information that needs to be stored is more involved and
is hence omitted. Some details however will be available in [32]. The complexity increases by a factor of
(2d(k+1)/2e ), which is constant for fixed k and polynomially bounded when k = t log n.
5. TSP(k) on fully reducible graph classes
We say that a class C of 3-connected graphs is fully reducible if it satisfies the following:
(1) If G ∈ C has a 3-edge cutset which partitions G into components S and S̄, then both G/S and G/S̄
are in C and we call G a reducible graph in C; and
(2) TSP can be solved in polynomial time for the graphs in C that do not have non-trivial 3-edge cutsets,
i.e. 3-edge cutsets that leave both components Hamiltonian. We call such graphs irreducible.
For instance, Halin graphs can be understood as graphs built up from irreducible fans connected to the
remainder of the graph via 3-edge cutsets. Cornuejols et al. [10] show that the ability to solve TSP in
polynomial time on irreducible graphs in C allows to solve TSP in polynomial time on all of C using facts
about the TSP polyhedron.
16
We remark that the algorithm of Section 4 can be used to show a somewhat similar statement for TSP(k).
Here we consider a graph class C that is fully k-reducible in the sense that either it can be subdivided
into irreducible graphs via 3-edge cutsets, or it is irreducible and it is possible to solve the k-neighbour
Hamiltonian path problem in polynomial time.
This requires solving the following problem:
X
X
M T SP (k) : Minimize
q(e1 , . . . , ek ) +
Pi (τ )
(e1 ,...,ek )∈Pk (τ )
Subject to
i∈V
τ ∈F
where Pi (τ ) is a penalty function for the pseudonode which depends on how tour τ traverses i, analogous to
the construction for the 3-neighbour TSP of section 4.
We recursively perform the contraction operation on the irreducible subgraphs of G, storing the necessary
tour information in the penalty at the resulting pseudonode. A similar result to Corollary 4.2 may be derived
to show that for any fixed k, this requires a polynomial number of penalties. The least cost traversals of S
can be computed in polynomial time using a generalization of the pseudo-fan strategy above.
Suppose the contraction operation is performed on a subgraph of size r in time O(P (r)), where P (r) is
a polynomial in r. Each time this operation is performed, the number of nodes in the graph is reduced by
r. This operation is performed at most n times and it follows that the entire algorithm can be performed in
polynomial time.
6. Conclusions
In this paper, we have shown that QTSP is NP-hard even when the costs are restricted to taking 0-1 values
on Halin graphs. We have presented a polynomial time algorithm to solve a restriction of QTSP, denoted
TSP(k) on any fully k-reducible graph for any fixed k. To illustrate this, we have given an algorithm which
solves TSP(3) on a Halin graph in O(n) time.
The k-neighbour bottleneck TSP on a Halin graph can be solved by solving O(log(n)) problems of the
type TSP(k). However, it is possible to solve the problem faster. Details will be reported elsewhere.
We would also like to thank Ante Ćustić for his useful comments.
References
[1] A. Aggarwal, D. Coppersmith, S. Khanna, R. Motwani, and B. Schieber. The angular-metric traveling salesman problem.
SIAM Journal on Computing, 29:697–711, 2000.
[2] D. Applegate, R. Bixby, V. Chvatal, and W. Cook. The traveling salesman problem: a computational study. Princeton
University Press, 2011.
[3] E. Arkin, Y. Chiang, J. Mitchell, S. Skiena, and T. Yang. On the maximum scatter traveling salesperson problem. SIAM
Journal on Computing, 29:515–544, 1999.
[4] E. Balas, R. Carr, M. Fischetti, and N. Simonetti. New facets of the STS polytope generated from known facets of the
ATS polytope. Discrete Optimization, 3:3–19, 2006.
[5] E. Balas, M. Fischetti, and W. Pulleyblank. The precedence-constrained asymmetric traveling salesman polytope. Mathematical Programming, 68:241–265, 1995.
[6] H. Bodlaender. Dynamic programming on graphs with bounded treewidth. In Automata, languages and programming
(Tampere, 1988),Lecture Notes in Comput. Sci., 317:105–118. Springer, Berlin, 1988.
[7] W. Chin and S. Ntafos. Optimum watchman routes. In Proceedings of the Second Annual Symposium on Computational
Geometry, 24–33. ACM, 1986.
[8] W. Cook. In pursuit of the traveling salesman: mathematics at the limits of computation. Princeton University Press,
2012.
[9] G. Cornuéjols, D. Naddef, and W. Pulleyblank. Halin graphs and the travelling salesman problem. Mathematical Programming, 26:287–294, 1983.
[10] G. Cornuéjols, D. Naddef, and W. Pulleyblank. The traveling salesman problem in graphs with 3-edge cutsets. Journal of
ACM, 32:383–410, April 1985.
[11] B. Courcelle. The monadic second-order logic of graphs. I. Recognizable sets of finite graphs. Inform. and Comput., 85:12–
75, 1990.
[12] F. Della Croce, V. Paschos, and R. Calvo. Approximating the 2-peripatetic salesman problem. In Proc. Workshop on
Modelling and Algorithms for Planning and Scheduling Problems, MAPSP, 114–116, 2005.
[13] O. Ergun and J. Orlin. A dynamic programming methodology in very large scale neighborhood search applied to the
traveling salesman problem. Discrete Optimization, 3:78–85, 2006. The Traveling Salesman Problem.
17
[14] A. Fischer. An analysis of the asymmetric quadratic traveling salesman polytope. SIAM Journal on Discrete Mathematics,
28:240–276, 2014.
[15] A. Fischer and F. Fischer. An extended approach for lifting clique tree inequalities. Journal of Combinatorial Optimization,
30:489–519, 2015.
[16] A. Fischer, F. Fischer, G. Jäger, J. Keilwagen, P. Molitor, and I. Grosse. Exact algorithms and heuristics for the quadratic
traveling salesman problem with an application in bioinformatics. Discrete Applied Mathematics, 166:97–114, 2014.
[17] A. Fischer and C. Helmberg. The symmetric quadratic traveling salesman problem. Mathematical Programming, 142:205–
254, 2013.
[18] G. Gutin and A. Punnen, editors. The traveling salesman problem and its variations, volume 12 of Combinatorial Optimization. Springer New York, 2002.
[19] G. Jäger and P. Molitor. Algorithms and experimental study for the traveling salesman problem of second order. In B.
Yang, D. Du, and C. Wang, editors, Combinatorial Optimization and Applications, Lecture Notes in Computer Science,
5165:211–224. Springer Berlin, 2008.
[20] J. Krarup and I. Spadille. The peripatetic salesman and some related unsolved problems. Combinatorial programming:
methods and applications: proceedings of the NATO Advanced Study Institute held at the Palais des Congrès, Versailles,
France, 2-13 September 1974, 173, 1975.
[21] J. LaRusic and A. Punnen. The asymmetric bottleneck traveling salesman problem: algorithms, complexity and empirical
analysis. Computers & Operations Research, 43:20–35, 2014.
[22] J. LaRusic, A. Punnen, and E. Aubanel. Experimental analysis of heuristics for the bottleneck traveling salesman problem.
Journal of heuristics, 18:473–503, 2012.
[23] E. Lawler, J. Lenstra, A. Kan, and D. Shmoys. The Traveling Salesman Problem: a guided tour of combinatorial optimization, volume 3. Wiley New York, 1985.
[24] D. Lou. An algorithm to find the optimal matching in Halin graphs. IAENG International Journal of Computer Science,
34:220–226, 2007.
[25] J. Phillips, A. Punnen, and S. Kabadi. A linear algorithm for the bottleneck traveling salesman problem on a Halin graph.
Information Processing Letters, 67:105–110, 1998.
[26] A. Oswin, A. Fischer, F. Fischer, F. Meier, U. Pferschy, A. Pilz, and R. Staněk Minimization and maximization versions
of the quadratic travelling salesman problem. Optimization, 66:521–546, 2017.
[27] G. Reinelt. The traveling salesman: computational solutions for TSP applications. Springer-Verlag, 1994.
[28] B. Rostami, F. Malucelli, P. Belotti and S. Gualandi. Quadratic TSP: A lower bounding procedure and a column generation
approach Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, 377-384, September 2013.
[29] B. Rostami, F. Malucelli, P. Belotti, and S. Gualandi. Lower bounding procedure for the asymmetric quadratic traveling
salesman problem. European Journal of Operational Research, 253:584–592, 2016.
[30] R. Staněk, Problems on tours and trees in combinatorial optimization, PhD Thesis, Graz University of Technology, 2016.
[31] B. Woods. Generalized travelling salesman problems on Halin graphs. Master’s thesis, Simon Fraser University, Canada,
2010.
[32] B. Woods. The quadratic travelling salesman problem: complexity, approximations, and exponential neighbourhoods. PhD.
thesis In preparation, Simon Fraser University, Canada.
[33] B. Woods and A. Punnen. The quadratic travelling salesman problem on Halin graphs. Working paper, Simon Fraser
University, Canada, 2016.
(SFU) Department of Mathematics, Simon Fraser University, 250-13450 102 Avenue, Surrey, British Columbia,
V3T 0A3, Canada
18
| 8 |
arXiv:1708.03981v1 [cs.SY] 14 Aug 2017
PSSE Redux: Convex Relaxation, Decentralized,
Robust, and Dynamic Approaches
Vassilis Kekatos, Gang Wang, Hao Zhu, and Georgios B. Giannakis
∗
August 15, 2017
1
Introduction
With the advent of digital computers, power system engineers in the 1960s
tried computing the voltages at critical buses based on readings from current and potential transformers. Local personnel manually collected these
readings and forwarded them by phone to a control center. Nevertheless,
due to timing, modeling, and instrumentation inaccuracies, the power flow
equations were always infeasible. In a seminal contribution [61], the statistical foundations were laid for a multitude of grid monitoring tasks, including
topology detection, static state estimation, exact and linearized models, bad
data analysis, centralized and decentralized implementations, as well as dynamic state tracking. Since then, different chapters, books, and review articles have nicely outlined the progress in the area; see for example [74, 55, 1].
The revolutionary monitoring capabilities enabled by synchrophasor units
have been put forth in [58].
This chapter aspires to glean some of the recent advances in power system state estimation (PSSE), though our collection is not exhaustive by
any means. The Cramér-Rao bound, a lower bound on the (co)variance
∗
V. Kekatos is with the Bradley Department of Electrical and Computer Engineering,
Virginia Tech, Blacksburg, VA 24061, USA. G. Wang is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA,
and also with the State Key Lab of Intelligent Control and Decision of Complex Systems, Beijing Institute of Technology, Beijing 100081, P. R. China. H. Zhu is with the
Department of Electrical and Computer Engineering, University of Illinois, Urbana, IL
61801. G. B. Giannakis is with the Department of Electrical and Computer Engineering, University of Minnesota, Minneapolis, MN 55455, USA. E-mails: [email protected];
{gangwang, georgios}@umn.edu; [email protected].
1
of any unbiased estimator, is first derived for the PSSE setup. After reviewing the classical Gauss-Newton iterations, contemporary PSSE solvers
leveraging relaxations to convex programs and successive convex approximations are explored. A disciplined paradigm for distributed and decentralized
schemes is subsequently exemplified under linear(ized) and exact grid models. Novel bad data processing models and fresh perspectives linking critical
measurements to cyber-attacks on the state estimator are presented. Finally, spurred by advances in online convex optimization, model-free and
model-based state trackers are reviewed.
Notation: Lower- (upper-) case boldface letters denote column vectors (matrices), and calligraphic letters stand for sets. Vectors 0, 1, and
en denote respectively the all-zero, all-one, and the n-th canonical vectors
of suitable dimensions. The conjugate of a complex-valued object (scalar,
vector or matrix) x is √
denoted by x∗ ; <{x} and ={x} are its real and imaginary parts, and j := −1. Superscripts T and H stand for transpose and
conjugate-transpose, respectively, while Tr(X) is the trace of matrix X. A
diagonal matrix having vector x on its main diagonal is denoted by dg(x);
whereas, the vector of diagonal entries of X is dg(X). The range space of X
is denoted by range(X); and its null space (kernel) by null(X). The notation
N (µ, Σ) represents the Gaussian distribution with mean µ and covariance
matrix Σ.
2
Power Grid Modeling
This section introduces notation and briefly reviews the power flow equations; for detailed exposition see e.g., [1], [19] and references therein. A
power system can be represented by the graph G = (B, L), where the node
set B comprises its Nb buses, and the edge set L its Nl transmission lines.
Given the focus on alternating current (AC) power systems, steady-state
voltages and currents are represented by their single-phase equivalent phasors per unit.
A transmission line (n, k) ∈ L running across buses n, k ∈ B is modeled
by its total series admittance ynk = gnk + jbnk , and total shunt susceptance
jbsnk . If Vn is the complex voltage at bus n, the current Ink flowing from
bus m to bus n over line (m, n) is
Ink = (ynk + jbsnk /2)Vn − ynk Vn .
(1)
The current Inm coming from the other end of the line can be expressed
symmetrically. That is not the case if the two buses are connected via a
2
transformer with complex ratio ρnk followed by a line, where
ynk + jbsnk /2
ynk
Vn − ∗ Vn
2
|ρnk |
ρnk
ynk
= (ynk + jbsnk /2)Vn −
Vn .
ρnk
Ink =
(2a)
Inm
(2b)
Kirchhoff’s
current law dictates that the current injected into bus n is
P
In = n∈Bn Ink , where Bn denotes the set of buses directly connected to
bus n. If vector i ∈ CNb collects all nodal currents, and v ∈ CNb all nodal
voltages, the two vectors are linearly related through the bus admittance
matrix Y = G + jB as
i = Yv.
(3)
Similar to (3), line currents can be stacked in the 2Nl -dimensional vector if ,
and expressed as a linear function of nodal voltages
if = Yf v
(4)
for some properly defined 2Nl × Nb complex matrix Yf [cf. (1)–(2)].
The complex power injected into bus n will be denoted by Sn := Pn +
jQn . Since by definition Sn = Vn In∗ , the vector of complex power injections
s = p + jq can be expressed as
s = dg(v)i∗ = dg(v)Y∗ v∗ .
(5)
∗ .
The power flowing from bus n to bus n over line (m, n) is Snk = Vn Ink
jθ
If voltages are expressed in polar form Vn = Vn e n , the power flow
equations in (5) per real and imaginary entry can be written as
Nb
X
Pn =
n=1
Nb
X
Qn =
Vn Vn [Gnk cos(θn − θn ) + Bnk sin(θn − θn )]
(6a)
Vn Vn [Gnk sin(θn − θn ) − Bnk cos(θn − θn )] .
(6b)
n=1
Since power injections are invariant if voltages are shifted by a common
angle, the voltage phase is arbitrarily set to zero at a particular bus called
the reference bus.
Alternatively to (6), if voltages are expressed in rectangular coordinates
Vn = Vr,m + jVi,m , power injections are quadratically related to voltages
Pn = Vr,m
Nb
X
(Vr,n Gnk − Vi,n Bnk ) + Vi,m
n=1
Nb
X
(Vi,n Gnk + Vr,n Bnk )
n=1
3
(7a)
Qn = Vi,m
Nb
X
(Vr,n Gnk − Vi,n Bnk ) − Vr,m
Nb
X
(Vi,n Gnk + Vr,n Bnk ).
(7b)
n=1
n=1
To compactly express (7), observe that Sn∗ = Vn∗ In = (vH en )(eTn i) =
vH en eTn Yv from which it readily follows that
Pn = vH HPn v
(8a)
Qn = vH HQn v
(8b)
where the involved matrices are defined as
1
en eTn Y + YH en eTn
2
1
en eTn Y − YH en eTn .
:=
2j
HPn :=
(9a)
HQn
(9b)
Similar expressions hold for the squared voltage magnitude at bus n:
Vn2 = vH HVn v, where HVn := en eTn .
(10)
Realizing that a line current can also be provided as Ink = eTnk if , the
∗ = V ∗I
power flow on line (n, k) as seen from bus n is expressed as Snk
n nk =
H
T
H
T
(v en )(enk if ) = v en enk Yf v, from which it follows that
Pnk = vH HPnk v
H
Qnk = v HQnk v
(11a)
(11b)
where HPnk and HQnk are defined by substituting eTn Y and YH en by eTnk Yf
and YfH enk in (9), accordingly.
Equations (8), (10) and (11) explain how power injections, flows, and
squared voltage magnitudes are quadratic functions of voltage phasors as
described by vH Hm v for certain complex Nb × Nb matrices Hm . Regardless
if Y and/or Yf are symmetric or Hermitian, Hm are Hermitian by definition.
T = <{H }, and
This means that Hm = HH
m
m , or equivalently, <{Hm }
={Hm }T = −={Hm }. It can be easily verified that the quadratic functions
can be expressed in terms of real-valued quantities as
vH Hm v = v̄T H̄m v̄
(12)
for the expanded real-valued voltage vector v̄ := [<{v}T ={v}T ]T , and the
real-valued counterpart of Hm , namely
<{Hm } −={Hm }
H̄m :=
.
(13)
={Hm } <{Hm }
4
3
Problem Statement
It was seen in Section 2 that given grid parameters collected in Y and Yf , all
power system quantities can be expressed in terms of the voltage vector v,
which justifies its term as the system state. Meters installed across the grid
measure electric quantities, and forward their readings via remote terminal
units to a control center for grid monitoring. Due to lack of synchronization,
conventional meters cannot utilize the angle information of phasorial quantities. For this reason, legacy measurements involve phaseless power injections and flows along with voltage and current magnitudes at specific buses.
The advent of the global positioning system (GPS) facilitated a precise timing signal across large geographical areas, thus enabling the revolutionary
technology of synchrophasors or phasor measurement units (PMUs) [58].
Recovering bus voltages given network parameters and the available measurements constitutes the critical task of power system state estimation.
This section formally states the problem, provides the Cramér-Rao bound
on the variance of any unbiased estimator, and reviews the Gauss-Newton
iterations. Solvers based on semidefinite relaxation and successive convex
approximations are subsequently explicated, and the section is wrapped up
with issues germane to PMUs.
3.1
Weighted Least-Squares Formulation
Consider M real-valued measurements {zm }M
m=1 related to the complex
power system state v through the model
zm = hm (v) + m
(14)
where hm (v) : CNb → R is a (non)-linear function of v, and m captures
the measurement noise and modeling inaccuracies. Collecting measurements
and noise terms in vectors z and accordingly, the vector form of (14) reads
z = h(v) +
(15)
for the mapping h : CNb → RM . Model (15) is instantiated for different
types of measurements next.
Traditionally, the system state v is expressed in polar coordinates, namely
nodal voltage magnitudes and angles. Then h(v) maps the 2Nb -dimensional
state vector to SCADA measurements through the nonlinear equations (6).
Expressing the states in polar form has been employed primarily due to two
reasons. First, the Jacobian matrix of h(v) is amenable to approximations.
5
Secondly, voltage magnitude measurements are directly related to states.
Nevertheless, due to recent computational reformulations, most of our exposition models voltages in the rectangular form. Then, as detailed in (12),
the m-th SCADA measurement zm involves the quadratic function of the
state hm (v) = vH Hm v for a Hermitian matrix Hm .
Expressing voltages in rectangular coordinates is computationally advantageous when it comes to synchrophasors too. As evidenced by (3)–(4),
PMU measurements feature linear mappings hm (v). If PMU measurements
are expressed in rectangular coordinates, the model in (14) simplifies to
z = Hv +
(16)
for an M × Nb complex matrix H, and complex-valued noise . Following
the notation of (12)–(13), the linear measurement model of (16) can be
expressed in terms of real-valued quantities as
z̄ = (H∗ )v̄ + ¯.
(17)
The random noise vector in (15) is usually assumed independent of
h(v), zero-mean and circularly symmetric, that is E[H ] = Σ and E[T ] =
0. The last assumption holds if for example the real and imaginary components of are independent and have identical covariance matrices. This is
true for a PMU measurement, where the actual state lies at the center of a
spherically-shaped noise cloud on the complex plane.
Moreover, the entries of are oftentimes assumed uncorrelated yielding
2 }) with σ 2 being the variance of the
a diagonal covariance Σ = dg({σm
m
m-th entry m . However, that may not always be the case. For example,
active and reactive powers at the same grid location are derived as products
between the readings of a current transformer and a potential transformer.
Further, noise terms may be correlated between the real and imaginary parts
of the same phasor in a PMU.
Adopting the weighted least-squares (WLS) criterion, power system state
estimation can be formulated as
minimize kΣ−1/2
(z − h(v))k22
v∈CNb
(18)
−1/2
where Σ
is the matrix square root of the inverse noise covariance matrix.
If the noise is independent across measurements, then (18) simplifies to
M
X
(zm − hm (v))2
minimize
.
2
v
σm
m=1
6
(19)
Either way, the PSSE task boils down to a (non)-linear least-squares (LS) fit.
When the mapping h(v) is linear or when the entries of are uncorrelated,
the measurement model in (15) can be prewhitened. For example, the linear
measurement model z = Hv + can be equivalently transformed to
Σ−1/2
z = (Σ−1/2 H)v + Σ−1/2
(20)
−1/2
so that the associated noise Σ
is now uncorrelated. To ease the presentation, the noise covariance will be henceforth assumed Σ = IM , yielding
v̂ := arg min
v
M
X
(zm − hm (v))2 .
(21)
m=1
For Gaussian measurement noise ∼ N (0, IM ), the minimizer of (21) coincides with the maximum likelihood estimate (MLE) of v [29].
3.2
Cramér-Rao Lower Bound Analysis
According to standard results in estimation theory [29], the variance of
any unbiased estimator is lower bounded by the Cramér-Rao lower bound
(CRLB). Appreciating its importance as a performance benchmark across
different estimators, the ensuing result shown in the Appendix derives the
CRLB for any unbiased power system state estimator based on the so-termed
Wirtinger’s calculus for complex analysis [41].
Proposition 1. Consider estimating the unknown state vector v ∈ CNb
from the noisy SCADA data {zm }M
m=1 of (15), where the Gaussian measurement error m is independent across meters with mean zero and variance
2 . The covariance matrix of any unbiased estimator v̂ satisfies
σm
Cov(v̂) [F† (v, v∗ )]1:Nb ,1:Nb
(22)
where the Fisher information matrix (FIM) is given as
" PM
#
PM
1
1
H
∗ ∗ H
2 (Hm v)(Hm v)
2 (Hm v)(Hm v )
m=1 σm
m=1 σm
∗
PM
F(v, v )= PM
.
1
1
∗ ∗
H
∗ ∗
∗ ∗ H
2 (Hm v )(Hm v)
2 (Hm v )(Hm v )
m=1 σm
m=1 σm
(23)
∗
In addition, matrix F(v, v ) has at least rank-one deficiency even when all
possible SCADA measurements are available.
Although rank-deficient, the pseudo-inverse of F(v, v∗ ) qualifies as a
valid lower bound on the mean-square error (MSE) of any unbiased estimator [63]. Rank deficiency of the FIM originates from the inherent voltage
7
angle ambiguity: SCADA measurements remain invariant if nodal voltages
are shifted globally by a unimodular phase constant. Fixing the angle of
the reference bus waives this issue. It is also worth stressing that the CRLB
in Prop. 1 is oftentimes attainable and benchmarks the optimal estimator
performance [63]. Having derived the CRLB for the PSSE task, our next
subsection deals with PSSE solvers.
3.3
Gauss-Newton Iterations
Consider for specificity model (16), though the real-valued model in (17)
or the model involving polar coordinates could be employed as well. When
the noise covariance matrix Σ = IM , the PSSE task in (18) reduces to the
nonlinear LS problem
minimize kz − h(v)k22
(24)
v∈CNb
for which the Gauss-Newton iterations are known to offer the “workhorse”
solution [3, Ch. 1], [1, Ch. 2]. According to the Gauss-Newton method,
the function h(v) is linearized at a given point vi ∈ CNb using Taylor’s
expansion as
h̃(v, vi ) := h(vi ) + Ji (v − vi )
where Ji := ∇h(vi ) is the M × Nb Jacobian matrix of h evaluated at vi ,
whose (m, n)-th entry is given by the Wirtinger derivative ∂hm /∂Vn ; see
e.g., [41] for Wirtinger’s calculus. The Gauss-Newton method subsequently
approximates the nonlinear LS fit in (24) with a linear one of h̃, and relies
on its minimizer to obtain the next iterate as
vi+1 ∈ arg min
v
= arg min
v
z − h̃(v, vi )
z − h(vi )
2
2
− 2(v − vi )H (Ji )H (z − h(vi ))
+ (v − vi )H (Ji )H Ji (v − vi ).
(25)
When matrix (Ji )H Ji is invertible, vi+1 can be found in closed form as
−1
vi+1 = vi + (Ji )H Ji (Ji )H (z − h(vi )).
(26)
The state estimate is iteratively updated using (26) until some stopping
criterion is satisfied.
If, on the other hand, the WLS cost (18) is minimized, the Gauss-Newton
−1/2
−1/2
iterations can be similarly obtained by treating Σ z as z and Σ h(v)
as h(v) in (24), yielding
i −1 i H −1
(J ) Σ (z − h(vi )).
(27)
vi+1 = vi + (Ji )H Σ−1
J
8
It is well known that the pure Gauss-Newton iterations in (26) or (27)
may not guarantee convergence, which in fact largely depends on the starting
point v0 [3, Ch. 1.5]. A common way to improve convergence and ensure
descent of the cost in (18) consists of including a backtracking line search in
(27) to end up with
i −1 i H −1
vi+1 = vi + µi (Ji )H Σ−1
(J ) Σ (z − h(vi ))
J
(28)
where the step size µi > 0 is found through the backtracking line search
rule [3, Ch. 1.2]. Due to its intimate relationship with ordinary gradient descent alternatives for nonconvex optimization however, this Gauss-Newton
iterative procedure can be trapped by local solutions [3, Ch. 1.5]. In a
nutshell, the grand challenge remains to develop PSSE solvers capable of attaining or approximating the global optimum at manageable computational
complexity. A few recent proposals in this direction are presented next.
3.4
Semidefinite Relaxation
A method to tackle the nonlinear measurement model that can convert the
PSSE problem of (21) to a convex semidefinite program (SDP) has been
introduced in [83], [84]. Consider first expressing each measurement in z
linearly in terms of the outer-product matrix V := vvH . In this way, the
quadratic models in (8), (10), and (11) can be transformed to linear ones in
terms of the matrix variable V. Thus, each noisy measurement in (14) can
be written as zm = vH Hm v + m = Tr(Hm V) + m . Rewriting the PSSE
task in (21) accordingly in terms of V reduces to
V̂1 := arg
min
V∈CNb ×Nb
M
X
2
zm − Tr(Hm V)
(29a)
m=1
s. to V 0, and rank(V) = 1
(29b)
where the positive semi-definite (PSD) and the rank-1 constraints jointly
ensure that for any V obeying (29b), there always exists a vector v such
that V = vvH .
Although zm and V are linearly related as in (29), nonconvexity is still
present in two aspects: (i) the cost function in (29a) has degree 4 in the
entries of V; and (ii) the rank constraint in (29b) is nonconvex. Aiming
for an SDP reformulation of (29), Schur’s complement lemma, see e.g., [5,
Appx. 5.5], can be leveraged to tightly bound each summand in (29a) using
9
an auxiliary variable χm > 0. Collecting all χm ’s in χ ∈ Rm , the problem
in (29) can be expressed as
{V̂2 , χ̂2 } := arg min 1T χ
(30a)
V, χ
s. to V 0, and rank(V) = 1
(30b)
χm
zm − Tr(Hm V)
0, ∀m. (30c)
zm − Tr(Hm V)
1
The equivalence among all three SE problems (21), (29), and (30) has been
shown in [83], where their optimal solutions satisfy:
2
V̂1 = V̂2 = v̂v̂H , and χ̂2,m = zm − Tr(Hm V̂2 ) , ∀m.
(31)
The only source of nonconvexity in the equivalent SE problem of (30)
comes from the rank-1 constraint. Motivated by the technique of semidefinite relaxation (SDR); see e.g., the seminal work of [21], one can obtain the
following convex SDP upon dropping the rank constraint
{V̂, χ̂} := arg min 1T χ
V, χ
s. to V 0, and (30c).
(32a)
(32b)
For the SDR-PSSE formulation in (32), a few assumptions have been
made in [84] to establish its global optimality in a specific setup.
(as1) The graph G = (B, L) has a tree topology;
(as2) Every bus is equipped with a voltage magnitude meter; and
(as3) All measurements in z are noise-free, that is = 0.
Proposition 2. Under (as1)-(as3), solving the relaxed problem (32) attains the global optimum of the original PSSE problem (30) or (21); that is,
rank(V̂) = 1.
Assumptions (as1)-(as3) may offer a close approximation of the realistic
PSSE scenario, thanks to characteristics of transmission systems such as
sparse connectivity, almost flat voltage profile, and high metering accuracy.
Although they do not hold precisely in realistic transmission systems, nearoptimality of the relaxed problem (32) has been numerically supported by
extensive tests [84]. A more crucial issue is to recover a feasible SE solution
from the relaxed problem (32), as V̂ is very likely to have rank greater than
1. This is possible either by finding the best rank-1 approximation to V̂ via
eigenvalue decomposition, or via randomization [46].
10
SDR endows SE with a convex SDP formulation for which efficient
schemes are available to obtain the global optimum using for example the
interior-point solver. The computational complexity for eigen-decomposition
is in the order of matrix multiplication, and thus negligible compared to
solving the SDP; see [46] and references therein. However, the polynomial
complexity of solving the SDP could be a burden for real-time power system monitoring, which motivates well the distributed implementation of
Section 4.2.
3.5
Penalized Semidefinite Relaxation
Building on an alternative formulation of the power flow problem, a penalized
version of the aforementioned SDP-based state estimator has been devised
in [48, 47, 78]. Commencing with the power flow task, it can be interpreted
as a particular instance of PSSE, where:
• Measurements (henceforth termed specifications) are noiseless;
• Excluding the reference bus, buses are partitioned into the subset BPV
for which active injections and voltage magnitudes are specified, and
the subset BPQ , for which active and reactive injections are specified.
The power flow task can be posed as the feasibility problem; that is,
find v ∈ CNb
s. to Pn = vH HPn v,
H
Qn = v HQn v,
Vn2 = vH HVn v,
(33)
∀n ∈ BPV ∪ BPQ
∀n ∈ BPQ
2
= V0 .
∀n ∈ BPV , and Vref
Using the SDP reformulation presented earlier, the power flow task can be
equivalently expressed as
find V ∈ CNb ×Nb
(34)
s. to zm = Tr(Hm V),
m = 1, . . . , 2Nb − 1
V 0, and rank(V) = 1
where the specifications (constraints) of (33) have been generically captured
b −1
by the pairs {(zm ; Hm )}2N
m=1 .
Although the optimization in (34) is non-convex, a convex relaxation
can be obtained by dropping the rank constraint. To promote rank-one
solutions, the feasibility problem is further reduced to [48]
V̂ := arg min Tr(H0 V)
(35)
V0
11
s. to zm = Tr(Hm V), m = 1, . . . , 2Nb − 1.
(36)
If the Hermitian matrix H0 is selected such that H0 0, rank(H0 ) = Nb −1,
and H0 1 = 0; then any state v close to the flat voltage profile 1 + j0 can
be recovered from the rank-one minimizer V̂ of (35); see [48, Thm. 2]. The
stated conditions exclude the case H0 = INb that would have led to the
nuclear-norm heuristic commonly used in low-rank matrix completion.
Spurred by this observation, the PSSE task can be posed as [47]
V̂µ := arg min Tr(H0 V) + µ
V0
M
X
fm zm − Tr(Hm V)
(37)
m=1
for some regularization parameter µ ≥ 0, where M now can be larger than
2Nb − 1. The second term in the cost of (37) is a data-fitting term ensuring
that the recovered state is consistent with the collected measurements based
on selected criteria. Two cases for fm of special interest are the LS fit
LS () := 2 , and the least-absolute value (LAV) one f LAV () := ||, ∀m =
fm
m
1, . . . , M . On the other hand, the first term in (37) can be understood as a
regularizer to promote rank-one solutions V̂µ ; see more details in [47].
In the noiseless setup, where all measurements comply with the model
zm = v0H Hm v0 , the minimization in (37) has been shown to possess a rankLS and f LAV ; see
one minimizer V̂µ = v̂µ v̂µH for all µ ≥ 0 under both fm
m
details in [47]. Interestingly, the solution v̂µ obtained under the LS fit does
not coincide with v0 for any µ ≥ 0, whereas the LAV solution v̂µ provides
the actual state v0 for a sufficiently large µ. Error bounds between V̂µ
and v0 v0H under the regularized LAV solution for noisy measurements are
established in [78].
3.6
Feasible Point Pursuit
The feasible point pursuit (FPP) method studied in [51] offers another
computationally manageable solver for approximating the globally optimal
PSSE. As a special case of the convex-concave procedure [44], FPP is an iterative algorithm for handling general nonconvex quadratically constrained
quadratic programs (QCQPs) [77]. It approximates the feasible solutions of
a nonconvex QCQP by means of a sequence of convexified QCQPs obtained
with successive convex inner-restrictions of the original nonconvex feasibility
set [77].
The first step in applying FPP to PSSE is a reformulation of (18) into
12
a standard QCQP [71, 70]
minimize
v∈CNb ,
χ∈RM
χT Σ−1 χ
(38a)
s. to vH Hm v ≤ zm + χm ,
H
v (−Hm ) v ≤ −zm + χm ,
1≤m≤M
(38b)
1≤m≤M
(38c)
where vector χ ∈ RM collects the auxiliary variables {χm ≥ 0}M
m=1 . For
power flow and power injection measurements, the corresponding Hermitian
measurement matrices {Hm } are indefinite in general; thus, both constraints
(38b) and (38c) are nonconvex. On the contrary, squared voltage magnitude
measurements relate to positive semidefinite matrices {Hm }, so that only
the related constraint (38c) is nonconvex. Either way, problem (38) is NPhard, and hence computationally intractable [57].
Using eigen-decomposition, every measurement matrix Hm can be expressed as the sum of a positive and a negative semidefinite matrix as
−
Hm = H+
m + Hm , so that the constraints in (38) are rewritten as
H −
vH H+
m v + v Hm v ≤ zm + χm
v
H
H+
mv
+v
H
H−
mv
≥ z m − χm
(39a)
(39b)
for m = 1, . . . , M . Observe now that since vH H−
m v is a concave function of
v, it is upper bounded by its first-order (linear) approximation at any point
vi ; that is,
i H −
i H − i
vH H−
m v ≤ 2<{(v ) Hm v} − (v ) Hm v .
The concave function vH (−H+
m )v can be upper bounded similarly.
Based on this observation, the FPP technique replaces the concave functions in the constraints of (39) with their linear upper bounds. The point of
linearization at every iteration is chosen to be the previous state estimate.
Specifically, initializing with v0 , the FPP produces the iterates
{vi+1 , χi+1 } := arg min χT Σ−1
χ
v, χ≥0
(40)
i H −
i H − i
s. to vH H+
m v + 2<{(v ) Hm v} ≤ zm + (v ) Hm v + χm , ∀m
i H +
i H + i
vH H−
m v + 2<{(v ) Hm v} ≥ zm + (v ) Hm v − χm , ∀m.
At every iteration, the FPP technique solves the now convex QCQP in
(40). The procedure has been shown to globally converge to a stationary
point of the WLS formulation (18) of the PSSE task [71]. Extensions of the
developed FPP solver to cope with linear(ized) measurements and bad data
are straightforward; see [71] for details.
13
100
Mean-square error (p.u.)
Angle error (degrees)
102
102
10-2
Magnitude error (p.u.)
10-4
100
10-5
GN-based SE
SDR-based SE
FPP-based SE
5
10
15
20
25
10
100
10-1
10-2
10
30
GN-based SE
SDR-based SE
FPP-based SE
Cramer-Rao bound
1
-3
1
2
3
4
5
Types of measurements
bus index
Figure 1: Left: Voltage magnitude and angle estimation errors per bus for
the IEEE 30-bus system. Right: MSEs and CRLB versus types of measurements used for the IEEE 14-bus system using: (i) Gauss-Newton iterations;
ii) the SDR-based PSSE; and iii) the FPP-based PSSE.
Figure 1 compares Gauss-Newton iterations, the SDR-based solver, and
the FPP-based solver on the IEEE 14- and 30-bus systems [64]. The actual nodal voltage magnitudes and angles were generated uniformly at random over [0.9, 1.1] and [−0.4π, 0.4π], respectively. Independent zero-mean
Gaussian noise with standard deviation 0.05 for power and 0.02 for voltage
measurements was assumed, and all reported results were averaged over 100
independent Monte Carlo realizations. The measurements for the IEEE 30bus system include all nodal voltage magnitudes and the active power flows
at both sending and receiving ends. The left panel of Fig. 1 depicts that
the magnitude and angle estimation errors attained by the FPP solver are
consistently below its competing alternatives [71].
The second experiment examines the MSE performance of the three approaches relative to the CRLB of (22) for the IEEE 14-bus test system.
Initially, all voltage magnitudes as well as all sending- and receiving-end active power flows were measured, which corresponds to the base case 1 in the
x-axis of the right panel of Fig. 1. To show the MSE performance relative for
an increasing number of measurements, additional types of measurements
were included in a deterministic manner. All types of SCADA measurements
were ordered as {Vn2 , Pkn , Pnk , Qkn , Qnk , Pn , Qn }. Each x-axis value in the
right panel of Fig. 1 implies that the number of ordered types of measurements was used in the experiment to obtain the corresponding MSEs.
14
3.7
Synchrophasors
To incorporate synchrophasors into the PSSE formulation, let ζn = Φn v+εn
collect the noisy PMU data at bus n [cf. (16)]. The related measurement
matrix is Φn , and the measurement noise εn is assumed to be complex zeromean Gaussian, independent from the noise in legacy meters and across
buses. Following the normalization convention in (21), the noise vector εn
is assumed prewhitened, such that all PMU measurements exhibit the same
accuracy. The PSSE task now amounts to estimating v given both z and
{ζn }n∈P , where P ⊆ B denotes the subset of the PMU-instrumented buses.
Hence, the MLE cost in (21) needs to be augmented by the log-likelihood
induced by PMU data as
v̂ := arg min
v
M
X
(zm − hm (v))2 +
m=1
X
kζn − Φn vk22 .
(41)
n∈P
The SDR methodology is again well motivated to convexify the augmented
PSSE problem (41) into
X
H
minimize 1T χ +
Tr(ΦH
(42a)
n Φn V) − 2<{ζn Φn v}
V, v, χ
n∈P
s. to
V v
vH 1
0, and (30c).
(42b)
By Schur’s complement, the left SDP constraint in (42b) can be expressed
equivalently as V vvH . If the latter constraint is enforced with equality,
the matrix V becomes rank-one. Imposing a rank-one constraint in (42)
renders it equivalent to the augmented PSSE task of (41). The SDP here
also offers the advantages of (32), in terms of the near-optimality and the
distributed implementation deferred to Section 4.2. To recover a feasible
solution, one can again use the best rank-1 approximation or adopt the
randomization technique as elucidated in [84].
Alternatively, the two types of measurements can be jointly utilized upon
interpreting the SCADA-based estimate as a prior for PMU-based estimation [58, 32]. Specifically, if v̂s is the SCADA-based estimate, the prior
probability density function of the actual state can be postulated to be a
circularly symmetric complex Gaussian with mean v̂s and covariance Σ̂s .
Given PMU data and the SCADA-based prior, the state can be estimated
following a maximum a-posteriori probability (MAP) approach as
X
v̂ := arg min (v − v̂s )H Σ̂−1
kζn − Φn vk22
(43)
s (v − v̂s ) +
v
n∈P
15
where the first summand is the negative logarithm of the prior distribution,
and the second one is the negative log-likelihood from the PMU data. In
essence, the approach in (43) treats the SCADA-based estimate as pseudomeasurements relying on the model v̂s = v + with circularly symmetric
zero-mean noise having E[H ] = Σ̂s .
4
Distributed Solvers
Upcoming power system requirements call for decentralized solvers. Measurements are now collected at much finer spatio-temporal scales and the
number of states increases exponentially as monitoring schemes extend to
low-voltage distribution grids [13]. Tightly interconnected power systems
call for the close coordination of regional control centers [22], while operators and utilities perform their computational operations on the cloud.
This section reviews advances in distributed PSSE solvers. As the name
suggests, distributed PSSE solutions spread the computational load across
different processors or control centers to speed up time, implement memoryintensive tasks, and/or guarantee privacy. A network of processors may be
coordinated by one or more supervising control centers in a hierarchical
fashion, or completely autonomously, by exchanging information between
processors. To clarify terminology, the latter architecture will be henceforth
identified as decentralized.
Distributed solvers with a hierarchical structure have been proposed
since the statistical formulation of PSSE [61, Part III]. Different versions
of this original scheme were later developed in [10], [27], [80], [22], [38].
Decentralized schemes include block Jacobi iterations [43], [9]; an approximate algorithm building on the related optimality conditions [18]; or matrixsplitting techniques for facilitating matrix inversion across areas running
Gauss-Newton iterations [53]. Most of the aforementioned approaches presume local identifiability (i.e., each area is identifiable even when shared
measurements are excluded) or their convergence is not guaranteed. Assuming a ring topology, every second agent updates its state iteratively through
the auxiliary problem principle in [16]. Local observability is waived in the
consensus-type solver of [75], where each control center maintains a copy of
the entire high-dimensional state vector resulting in slow convergence. For
a relatively recent review on distributed PSSE solves, see also [23].
16
Figure 2: Left: The IEEE 14-bus system partitioned into four areas [64, 38].
Dotted lassos show the buses belonging to area state vectors vk ’s. PMU bus
voltage (line current) measurements depicted by green circles (blue squares).
Right: The matrix structure for the left system with the distributed SDR
solver: green square denotes the overall V, while dark and light blue ones
correspond to the four area submatrices {Vk } and their overlaps.
4.1
Distributed Linear Estimators
Consider an interconnected system partitioned in K areas supervised by
separate control centers. Without loss of generality, an area may be thought
of as an independent system operator region, a balancing authority, a power
distribution center, or a substation [58]. Area k collects Mk measurements
obeying the linear model
zk = Hk vk + k
(44)
where vector vk ∈ CNk collects the system states related to zk through
the complex matrix Hk . The random noise vector k is zero-mean with
identity covariance upon prewhitening, if measurements are uncorrelated
across areas. The model in (44) is exact for PMU measurements, but it
may also correspond to a single Gauss-Newton iteration as explained in
Section 3.3.
Performing PSSE locally at area k amounts to solving
minimize fk (vk )
vk ∈Xk
(45)
where the convex set Xk captures possible prior information, such as zero17
injection buses or short circuits [55], [1]. If fk (vk ) = kzk − Hk vk k22 /2, the
minimizer of (45) is the least-squares estimate (LSE) of vk , which is also
the MLE of vk for Gaussian k .
As illustrated in Fig. 2, the per-area state vectors {vk }K
k=1 overlap partially. Although area 4 supervises buses {9, 10, 14}, it also collects the current reading on lines (10, 11). Thus, its state vector v4 extends to bus
{11} that is nominally supervised by area 3. To setup notation, define Skl
as the shared states for a pair of neighboring areas (k, l). Let also vk [l]
(vl [k]) denote the sub-vector of vk (vl ) consisting of their overlapping variables ordered as they appear in v. For example, v3 [4] = v4 [3] contain the
bus voltages of {11}. Solving the K problems in (45) separately is apparently suboptimal since the estimates of shared states will disagree, tie-line
measurements have to be ignored, and boundary states may thus become
unobservable.
Coupling the per-area PSSE tasks can be posed as
minimize
{vk ∈Xk }
K
X
fk (vk )
(46)
k=1
s. to vk [l] = vl [k],
∀l ∈ Bk , ∀k
where Nk is the set of areas sharing states with area k. The equality constraints of (46) guarantee consensus over the shared variables. Although
(46) is amenable to decentralized implementations (cf. [16]), areas need a
coordination protocol for their updates. To enable a truly decentralized solution, we follow the seminal approach of [60, 82]. An auxiliary variable vkl
is introduced per pair of connected areas (k, l); the symbols vkl and vlk are
used interchangeably. The optimization in (46) can then be written as
minimize
{vk ∈Xk }, {vkl }
K
X
fk (vk )
(47)
k=1
s. to vk [l] = vkl ,
∀l ∈ Bk , k = 1, . . . , K.
Problem (47) can be solved using the alternating direction method of
multipliers (ADMM) [4], [20]. In its general form, ADMM tackles convex
optimization problems of the form
minimize f (x) + g(z)
x∈X , z∈Z
s. to Ax + Bz = c
18
(48a)
(48b)
for given matrices and vectors (A, B, c) of proper dimensions. Upon assigning a Lagrange multiplier λ for the coupling constraint in (48a), the (x, z)
minimizing (48a) are found through the next iterations for some µ > 0
µ
kAx + Bzi − c + λi k22
2
µ
:= arg min g(z) + kAxi+1 + Bz − c + λi k22
z∈Z
2
:= λi + Axi+1 + Bzi+1 − c.
xi+1 := arg min f (x) +
(49a)
zi+1
(49b)
x∈X
λi+1
(49c)
Towards applying the ADMM iterations to (46), identify variables {vk }
as x in (48a) and {vkl } as z with g(z) = 0. Moreover, introduce Lagrange
multipliers λk,l for each constraint in (47). Observe that λk,l and λl,k correspond to the distinct constraints vk [l] = vkl and vl [k] = vkl , respectively.
According to (49a), the per-area state vectors {vk } can be updated separately as
µX
i
vki+1 := arg min fk (vk ) +
kvk [l] − vkl
+ λik,l k22 .
(50)
vk ∈Xk
2
l∈Bk
From (49b) and assuming every state is shared by at most two areas, the
auxiliary variables vkl can be readily found in closed form given by
i+1
vkl
=
1 i+1
vk [l] + vli+1 [k] + λik,l + λil,k
2
(51)
while the two related multipliers are updated as
i+1
i+1
i
λi+1
k,l := λk,l + (vk [l] − vkl )
λi+1
l,k
:=
λil,k
+
(vli+1 [k]
−
i+1
).
vkl
(52a)
(52b)
i+1
Adding (52) by parts and combining it with (51) yields λi+1
k,l = −λl,k at
all iterations i if the multipliers are initialized at zero. Hence, the auxiliary
variable vkl ends up being the average of the shared states; that is,
i+1
vkl
=
1 i+1
vk [l] + vli+1 [k] .
2
(53)
To summarize, at every iteration i:
(i) Each control area solves (50). If fk (vk ) is the LS fit and for unconstrained problems, the per-area states are updated as the LSEs using
legacy software. The second summand in (50) can be interpreted as
pseudo-measurements on the shared states forcing them to consent
across areas.
19
−2
10
Error curves averaged over areas
LSE
D−RPSSE
−3
10
−4
10
−5
10
−6
10
0
10
20
30
40
50
60
70
80
Iteration
P300 t
P
t
Figure 3: Average error curves 300
k=1 ek,o /300
k=1 ek,c /300 (bottom) and
(top) for the LSE, and its robust counterpart D-RPSSE (see Section 5.1) on
a 4,200-bus grid.
(ii) Neighboring areas exchange their updated shared states. This step involves minimal communication, and no grid models need to be shared.
Every area updates its copies of the auxiliary variables vkl using (53).
(iii) Every area updates the Lagrange multipliers λkl based on the deviation of the local from the auxiliary variable as in (52).
For convex pairs {fk (vk ), Xk }K
k=1 , the aforementioned iterates reach the
optimal cost in (46), under mild conditions. If the overall power system is
observable, the ADMM iterates converge to the unique LSE. The approach
has been extended in [33] for joint PSSE and breaker status verification.
The decentralized algorithms were tested on a 4,200-bus power grid synthetically built from the IEEE 14- and 300-bus systems. Each of the 300
buses of the latter was assumed to be a different area, and was replaced by
a copy of the IEEE 14-bus grid. Additionally, every branch of the IEEE
300-bus grid was an inter-area line whose terminal buses are randomly selected from the two incident to this line areas. Two performance metrics
were adopted: the per area error to the centralized solution of (46), denoted
(c)
by etk,c :=kvk − vkt k2 /Nk , and the per-area error to the true underlying
state defined as etk,o :=kvk − vkt k2 /Nk . Figure 3 shows the corresponding
error curves averaged over 300 areas. The decentralized LSE approached
the underlying state at an accuracy of 10−3 in approximately 10 iterations
20
or 6.2 msec on an Intel Duo Core @ 2.2 GHz (4GB RAM) computer using
MATLAB; while the centralized LSE finished in 93.4 msec.
4.2
Distributed SDR-based Estimators
Although the SDR-PSSE approach incurs polynomial complexity √
when im4
plemented as a convex SDP, its worst-case complexity is still O(M Nb log(1/))
for a given solution accuracy > 0 [46]. For typical power networks, the
number of measurements M is on the order of the number of buses Nb , and
thus the worst-case complexity becomes O(Nb4.5 log(1/)). This complexity
could be prohibitive for large-scale power systems, which motivates accelerating the SDR-PSSE method using distributed parallel implementations.
Following the area partition in Fig. 2, the m-th measurement per area k
can be written as
zk,m = hk,m (vk ) + k,m = Tr(Hk,m Vk ) + k,m , ∀k, m
where Vk denotes a submatrix of V formed by extracting the rows and
columns corresponding to buses in area k; and likewise for each Hk,m . Due
to the overlap among the subsets of buses, the outer-product Vk of area k
overlaps also with Vl for each neighboring area l ∈ Nk , as shown in Fig. 2.
By reducing the measurements atP
area k to submatrix Vk , one can de2
k
fine the PSSE error cost fk (Vk ) := M
m=1 [zk,m − Tr(Hk,m Vk )] per area
k, which only involves the local matrix Vk . Hence, the centralized PSSE
problem in (32) becomes equivalent to
V̂ = arg min
K
X
V0
fk (Vk ).
(54)
k=1
This equivalent formulation effectively expresses the overall PSSE cost as the
superposition of each local cost fk . Nonetheless, even with such a decomposable cost, the main challenge to implement (54) in a distributed manner
lies in the PSD constraint that couples the overlapping local matrices {Vk }
(cf. Fig. 2). If all submatrices {Vk } were non-overlapping, the cost would
be decomposable as in (54), and the PSD of V would boil down to a PSD
constraint per area k, as in
V̂ = arg min
{Vk 0}
K
X
fk (Vk ).
(55)
k=1
Similar to PSSE for linearized measurements in (46), the formulation in
(55) can be decomposed into sub-problems, thanks to the separable PSD
21
constraints. It is not always equivalent to the centralized (54) though, because the PSD property of all submatrices does not necessarily lead to a
PSD overall matrix. Nonetheless, the decomposable problem (55) is still
a valid SDR-PSSE reformulation, since with the additional per-area constraints rank(Vk ) = 1, it is actually equivalent to (30). While it is totally
legitimate to use (55) as the relaxed SDP formulation for (30), the two
relaxed problems are actually equivalent under mild conditions.
The fresh idea here is to explore valid network topologies to facilitate
such PSD constraint decomposition. To this end, it will be instrumental to leverage results on completing partial Hermitian matrices to obtain
PSD ones [24]. Upon obtaining the underlying graph formed by the specified entries in the partial Hermitian matrices, these results rely on the
so-termed graph chordal property to establish the equivalence between the
positive semidefiniteness of the overall matrix and that of all submatrices
corresponding to the graph’s maximal cliques. Interestingly, this technique
was recently used for developing distributed SDP-based optimal power flow
(OPF) solvers in [28, 12, 42].
Construct first a new graph B 0 over B, with all its edges corresponding
to the entries in {Vk }. The graph G 0 amounts to having all buses within
each subset Nk to form a clique. Furthermore, the following are assumed:
(as4) The graph with all the control areas as nodes, and their edges defined
by the neighborhood subset {Nk }K
k=1 forms a tree.
(as5) Each control area has at least one bus that does not overlap with any
neighboring area.
Proposition 3. Under (as4)-(as5), the two relaxed problems (54) and (55)
are equivalent.
Proposition 3 can be proved by following the arguments in [84] to show
that the entire PSD matrix V can be “completed” using only the PSD
submatrices Vk . The key point is that in most power networks even those
not obeying (as4) and (as5), (55) can achieve the same accuracy as the
centralized one. At the same time, decomposing the PSD constraint in (55)
is of paramount importance for developing distributed solvers. One can
adopt the consensus reformulation to design the distributed solver for (55) as
in (46) of Section 4.1. Accordingly, the ADMM iterations can be employed
to solve (55) through iterative information exchanges among neighboring
areas, and this is the basis of the distributed SDR-PSSE method.
This distributed SDR-PSSE method was tested on the IEEE 118-bus
system using the three-area partition in [31]. All three areas measure their
22
1
10
Area 1
Area 2
Area 3
Local matrix error
10
0
Area 1
Area 2
Area 3
10
Local estimation error
0
−1
10
−2
−1
10
10
−3
10
0
20
40
60
0
80
20
40
60
80
Iteration index
Iteration index
Figure 4: (Left) Per area state matrix error and (Right) state vector estimation error, versus the number of ADMM iterations for the distributed
SDR-PSSE solver using the IEEE 118-bus system.
local bus voltage magnitudes, as well as real and reactive power flow levels
at all lines. The overlaps among the three areas form a tree communication
graph used to construct the area-coupling constraints. To demonstrate convergence of the ADMM iterations to the centralized SE solution V̂ of (55),
i − V̂ k is plotted versus the
the local matrix Frobenius error norm kV̂(k)
(k) F
iteration index i in the left panel of Fig. 4 for every control area k. Clearly,
all local iterates converge to (approximately with a linear rate) their counterparts in the centralized solution. As the task of interest is to estimate the
i − v k is also
voltages, the local estimation error for the state vector kv̂(k)
(k) 2
depicted in the right panel of Fig. 4, where v̂(k) is the estimate of bus volti using the eigen-decomposition
ages at area k obtained from the iterate V̂(k)
method. Interestingly, the estimation error costs converge within the estimation accuracy of around 10−2 after about 20 iterations (less than 10
iterations for area 1), even though the local matrix has not yet converged.
In addition, these error costs decrease much faster in the first couple of iterations. This demonstrates that even with only a limited number of iterations,
the PSSE accuracy can be greatly boosted in practice, which in turn makes
inter-area communication overhead more affordable.
5
Robust Estimators and Cyber Attacks
Bad data, also known as outliers in the statistics parlance, can challenge
PSSE due to communication delays, instrument mis-calibration, and/or line
23
parameter uncertainty. In today’s cyber-enabled power systems, smart meter and synchrophasor data could be also purposefully manipulated to mislead system operators. This section reviews conventional and contemporary
approaches to coping with outliers.
5.1
Bad Data Detection and Identification
Bad data processing in PSSE relies mainly on the linear measurement model
z = Hv + , where H ∈ RM ×N . Recall that this model is exact for PMU
measurements [cf. (16)–(17)], but approximate per Gauss-Newton iteration
or under the linearized grid model. In addition, the aforementioned model
assumes real-valued states and measurements, slightly abusing the symbols
introduced in (17). This is to keep the notation uncluttered and cover both
cases of exact and inexact grid models. Albeit the nominal measurement
noise vector is henceforth assumed zero-mean with identity covariance, results extend to colored noise as per (20).
To capture bad data, the measurement model is now augmented as
z = Hv + o +
(56)
where o ∈ RM is an unknown vector whose m-th entry om is deterministically non-zero only if zm is a bad datum [30, 39, 15]. Therefore, vector o is
sparse, i.e., many of its entries are zero. Under this outlier-cognizant model
in (56), the unconstrained LSE given as v̂LSE = (HT H)−1 HT z, yields the
residual error
r := z − Hv̂LSE = Pz = P(o + )
(57)
with P := IM − H(HT H)−1 HT being the so-called projection matrix onto
the orthogonal subspace of range(H). The last equality in (57) stems from
the fact that PH = 0. As a projection matrix, P is idempotent, that is,
P = P2 ; Hermitian PSD with (M − N ) eigenvalues equal to one and N
zero eigenvalues; while its diagonal entries satisfy Pm,m ∈ [0, 1] for m =
1, . . . , M ; see e.g., [6].
For ∼ N (0, IM ), it apparently holds that P ∼ N (0, P). The meansquared residual error is (see also [39] for its Bayesian counterpart)
E[krk22 ] = E[kPk22 ] + kPok22 = (M − N ) + kPok22 .
(58)
In the absence of bad data, or if o ∈ range(H), the squared residual error
follows a χ2 distribution with mean (M − N ). The χ2 -test compares krk22
against a threshold to detect the presence of bad data [1, 55].
24
Finding both v and o from measurements in (56) may seem impossible, given that the number of unknowns exceeds the number of equations.
Leveraging the sparsity of o though, interesting results can be obtained [30].
If τ0 bad data are expected, one would ideally wish to solve
o
n1
{v̂, ô} ∈ arg min
(59)
kz − Hv − ok22 : kok0 ≤ τ0 .
v, o
2
But the `0 -(pseudo) norm kok0 counting the number of non-zero entries of
o, renders (59) NP-hard in general; see also Definition 2 later in Section 5.2.
For the special case of τ0 = 1, problem (59) can be efficiently handled.
Consider the scenario where the only non-zero entry of ô is the m-th one,
and denote the related v̂ minimizer by v̂(m) . Apparently, the m-th entry of
the ô minimizer is ôm := zm − hTm v̂(m) . This choice nulls the m-th residual
(zm − hTm v̂(m) − ôm = 0). With the m-th residual zeroed, the cost in (59)
becomes kr(m) k22 := kz(m) − H(m) v̂(m) k22 , where z(m) is obtained from z
upon dropping its m-th entry and H(m) by removing the m-th row of H.
The problem in (59) is then equivalent to
minimize
m
1
kr k2 .
2 (m) 2
(60)
Problem (60) can be solved by exhaustively finding all M LSEs excluding
one measurement at a time. Fortunately, a classical result from the adaptive
filtering literature relates the error kr(m) k22 to the error attained using all
outlier-free measurements krk22 := kPzk22 ; see e.g., [25, Ch. 9]
krk22 = kr(m) k22 + rm ôm .
(61)
The same result links the a-posteriori error rm to the a-priori error ôm as
rm = Pm,m ôm . Through these links, solving (60) is equivalent to:
|rm |
rmax := maximize p
.
m
Pm,m
(62)
In words, a single bad datum can be identified by properly normalizing the
entries of the original residual vector r = Pz.
Interestingly, the task in (62) coincides with the largest normalized residual (LNR) test that compares rmax to a prescribed threshold to identify a
single bad datum [1, Sec. 5.7]. The p
threshold is derived after recognizing
that in the absence of bad data, rm / Pm,m is standard normal for all m.
The LNR test does not generalize for multiple bad data and problem
(59) becomes computationally intractable for larger τ0 ’s. Heuristically, if
25
a measurement is deemed as outlying, PSSE is repeated after discarding
this bad datum, the LNR test is re-applied, and the process iterates till no
corrupted data are identified. Alternatively, the least-median squares and
the least-trimmed squares estimators have provable breakdown points and
superior efficiency under Gaussian data; see e.g., [52] and references therein.
Nevertheless, their complexity scales unfavorably with the network size.
Leveraging compressed sensing [7], a practical robust estimator can be
found if the `0 -pseudonorm is surrogated by the convex `1 -norm as [30, 31]
n1
o
minimize
kz − Hv − ok22 : kok1 ≤ τ1
(63)
v, o
2
for a preselected constant τ1 > 0, or in its Lagrangian form
{v̂, ô} ∈ arg min
v, o
1
kz − Hv − ok22 + λkok1
2
(64)
for some tradeoff parameter λ > 0. The estimates of (64) offer joint state
estimation and bad data identification. Even when some measurements are
deemed as corrupted, their effect has been already suppressed. The optimization task in (64) can be handled by off-the-shelf software or solvers
customized to the compressed sensing setup. When λ → ∞, the minimizer
ô becomes zero, and thus v̂ reduces to the LSE. On the contrary, by letting λ → 0+ , the solution v̂ coincides with the least-absolute value (LAV)
estimator [40, 6, 17, 68]; presented earlier in (37), namely
v̂LAV := arg min kz − Hvk1 .
v
(65)
For finite λ > 0, the v̂ minimizer of (64) is equivalent to Huber’s Mestimator; see [30] and references therein. Based on this connection and
for Gaussian , parameter λ can be set to 1.34, which makes the estimator 95% asymptotically efficient for outlier-free measurements [50, p. 26].
Huber’s estimate can be alternatively expressed as the v-minimizer of [49],
minimizev, ω 21 kωk22 + λkv − Hv − ωk1 . The bad data identification performance of this minimization has been analyzed in [76].
Table 1 compares several bad data analysis methods on the IEEE 14bus grid of Fig. 2 under the next four scenarios: (S0) no bad data; (S1)
bad data on line (4, 7); (S2) bad data on line current (4, 7) and bus voltage 5; and (S3) bad data on bus voltage 5 and line currents (4, 7) and
(10, 11). In all scenarios, bad data are simulated by multiplying the real
and imaginary parts of the actual measurement by 1.2. The performance
metric here is the `2 -norm between the true state and the PSSE, which is
26
Table 1: Mean-Square Estimation Error in the Presence of Bad Data
Method
GA-LSE
LSE
LNRT
Huber’s
0.0278
0.0313
0.0336
0.0367
0.0278
0.0318
0.1431
0.1434
0.0286
0.0331
0.0404
0.0407
0.0281
0.0322
0.0390
0.0390
(S0)
(S1)
(S2)
(S3)
averaged over 1,000 Monte Carlo runs. Four algorithms were tested: (a)
an ideal but practically infeasible genie-aided LSE (GA-LSE), which ignores
the corrupted measurements; (b) the regular LSE; (c) the LNR test-based
(LNRT) estimator with the test threshold set to 3.0 [1]; and (d) Huber’s
estimator of (64) with λ = 1.34. For (S0)-(S1), the estimators perform
comparably. The few corrupted measurements in (S2)-(S3) can deteriorate
LSE’s performance, while Huber’s estimator performs slightly better than
LNRT. Computationally, Huber’s estimator was run within 1.3 msec, while
the LNRT required 1.5 msec. The computing times were also measured for
the IEEE 118-bus grid without corrupted data. Interestingly, the average
time on the IEEE 118-bus grid without corrupted data are 3.2 msec and
81 msec, respectively.
Towards a robust decentralized state estimator, the ADMM-based framework of Section 4.1 can be engaged here too. If the measurement model for
the k-th area is zk = Hk vk + ok + k , the centralized problem boils down to
minimize
{vk ∈Xk , ok }
K
X
1
k=1
2
kzk − Hk vk − ok k22 + λkok k1 .
(66)
To allow for decentralized implementation, the optimization in (66) can be
reformulated as
minimize
K
X
1
k=1
2
kzk − Hk vk − ok k22 + λkωk k1
(67a)
over {vk ∈ Xk , ok , ωk }, {vkl }
(67b)
s. to vk [l] = vkl , for all l ∈ Bk , k = 1, . . . , K.
(67c)
ok = ωk , for all k = 1, . . . , K.
(67d)
As in Section 4.1, the constraints in (67c) and the auxiliary variables {vkl }
enforce consensus of shared states. On the other hand, the variables {ok }
27
are duplicated as {ωk } in (67d). Then, variables {vk , ok } are put together
in the x-update of ADMM in (49a), whereas {vkl , ωk } fall into the z-update
in (49b). In this fashion, costs are separable over variable groups, and the
minimization involving the `1 -norm enjoys a closed-form solution expressed
in terms of the soft thresholding operator [31].
5.2
Observability and Cyber Attacks
In the cyber-physical smart grid context, bad data are not simply unintentional errors, but can also take the form of malicious data injections [54].
Amid these challenges, the intertwined issues of critical measurements and
stealth cyber-attacks on PSSE are discussed next.
It has been tacitly assumed so far that the power system is observable. A
power system is observable if distinct states v 6= v0 are mapped to distinct
measurements h(v) 6= h(v0 ) under a noiseless setup. Equivalently, if the
so-called measurement distance function is defined as [81]
D(h) := minimize
kh(v) − h(v0 )k0
0
v6=v
(68)
the power system is observable if and only if D(h) ≥ 1. Given the network
topology and the mapping h(v), the well-studied topic of observability analysis aims at determining whether the system state is uniquely identifiable,
at least locally in a neighborhood of the current estimate [1, Ch. 4]. If not,
mapping observable islands, meaning maximally connected sub-grids with
observable internal flows, is important as well.
Observability analysis relies on the decoupled linearized grid model, and
is accomplished through topological or numerical tests [8, 56]. Apparently,
under the linear or linearized model h(v) = Hv, the state v is uniquely
identifiable if and only if H is full column-rank. Phase shift ambiguities can
be waived by fixing the angle at a reference bus.
In the presence of bad data and/or cyber attacks, observability analysis
may not suffice. Consider the noiseless measurement model z = h(v) + o,
where the non-zero entries of vector o correspond to bad data or compromised meters; and let us proceed with the following definitions.
Definition 1 (Observable attack [81]). The attack vector o is deemed as
observable if for every state v there is no v0 6= v, such that h(v)+o = h(v0 ).
Definition 2 (Identifiable attack [81]). The attack vector o is identifiable
if for every v there is no (v0 , o0 ) with v0 6= v and ko0 k0 ≤ kok0 , such that
h(v) + o = h(v0 ) + o0 .
28
If the outlier vector o is observable, the operator can tell that the collected measurements do not correspond to a system state, and can hence
decide that an attack has been launched. Nevertheless, the attacked meters
can be pinpointed only under the stronger conditions of Definition 2.
The resilience of the measurement mapping h(v) against attacks can be
characterized through D(h) in (68): The maximum number of counterfeited
meters for an attack to be observable is Ko = D(h)−1 and to be identifiable,
it is Ki = b D(h)−1
c; see [81, 76]. Here, the floor function bxc returns the
2
greatest integer less than or equal to x.
Consider the linear mapping h(v) = Hv. Measurement m is termed
critical if once removed from the measurement set, it renders the power
system non-identifiable. In other words, although H is full column-rank, its
submatrix H(m) is not. It trivially follows that D(h) = 1, and the system
operator can be arbitrarily misled even if only measurement m is attacked.
Due to the typically sparse structure of H, critical measurements or multiple
simultaneously corrupted data do exist [1]. It was pointed out in [45] that if
an attack o can be constructed to lie in the range(H), it comprises a ‘stealth
attack.’ Although finding D(h) is not trivial in general, a polynomial-time
algorithm leveraging a graph-theoretic approach is devised in [39].
6
Power System State Tracking
The PSSE methods reviewed so far ignore system dynamics and do not
exploit historical information. Dynamic PSSE is well motivated thanks to its
improved robustness, observability, and predictive ability when additional
temporal information is available [26]. Recently proposed model-free and
model-based state tracking schemes are outlined next.
6.1
Model-free State Tracking via Online Learning
In complex future power systems, one may not choose to explicitly commit
to a model for the underlying system dynamics. The framework of online
convex optimization (OCO), particularly popular in machine learning, can
account for unmodeled dynamics and is thus briefly presented next [62].
The OCO model considers a multi-stage game between a player and an
adversary. In the PSSE context, the utility or the system operator assumes
the role of the player, while the loads and renewable generations can be
viewed as the adversary. At time t, the player first selects an action Vt from
a given action set V, and the adversary subsequently reveals a convex loss
29
function ft : V → R. In this round, the player suffers a loss ft (Vt ). The
ultimate goal for the player is to minimize the regret Rf (T ) over T rounds:
Rf (T ) :=
T
X
ft (Vt ) − minimize
V∈V
t=1
T
X
ft (V).
(69)
t=1
The regret is basically the accumulated cost incurred
the player relative
Pby
T
0
to that by a single fixed action V := arg minV∈V t=1 ft (V). This fixed
action is selected with the advantage of knowing the loss functions {ft }Tt=1
in hindsight. Under appropriate conditions, judiciously designed online optimization algorithms can achieve sublinear regret; that is, Rf (T )/T → 0 as
T → +∞.
Building on the SDR-PSSE formulation of Section 3.4, the ensuing method
considers streaming data for real-time PSSE. The data referring to and colt
lected over the control period t are {(zmt ; Hmt )}M
mt =1 with t = 1, . . . , T .
The number and type of measurements can change over time, while the matrix corresponding to measurement m may change over time as indicated by
t
{Hmt }M
mt =1 due to topology reconfigurations. The online PSSE task can be
now formulated as
T
X
minimize
ft (V)
(70)
V0
t=1
PMt
where ft (V) := mt =1 [zmt − Tr(Hmt V)]2 . Online PSSE aims at improving
the static estimates by capitalizing on previous measurements as well as
tracking slow time-varying variations in generation and demand.
Minimizing the cost in (70) may be computationally cumbersome for
real-time implementation. An efficient alternative based on online gradient
descent amounts to iteratively minimizing a regularized first-order approximation of the instantaneous cost instead [37]
Vt+1 := arg min Tr(VH ∇ft (Vt )) +
V0
1
kV − Vt k2F
2µt
(71)
for t = 1, . . ., and suitably selected step sizes µt > 0. Interestingly, the
optimization in (71) admits a closed-form solution given by
Vt+1 = ProjS+ [Vt − µt ∇ft (Vt )]
(72)
with ProjS+ denoting the projection onto the positive semidefinite cone,
which can be performed using eigen-decomposition followed by setting negative eigenvalues to zero. It is worth mentioning that the online PSSE in
30
(72) enjoys sublinear regret [37]. Upon finding Vt , a state estimate vt can be
obtained by eigen-decomposition or randomization as in Section 3.4. With
an additional nuclear-norm regularization term promoting low-rank solutions in (71), online ADMM alternatives were devised in [36]. Interestingly,
online learning tools has recently been advocated for numerous real-time
energy management tasks in [35], [34], [69].
6.2
Model-based State Tracking
Although the previous model-free solver can recover slow time-varying states,
model-based approaches facilitate tracking of fast time-varying system states.
A typical state-space model for power system dynamics is [65]
vt+1 = Ft vt + gt + ωt
(73a)
zt = h(vt ) + t
(73b)
where Ft denotes the state-transition matrix, gt captures the process mismatch, and wt is the additive noise. The nonlinear mapping h(·) comes from
conventional SCADA measurements. Values {(Ft , gt )} can be obtained in
real-time using for example Holt’s system identification method [11]. Two
common dynamic tracking approaches to cope with the nonlinearity in the
measurement model of (73b) include the (extended or unscented) Kalman
filters and moving horizon estimators [65, 14, 26, 73, 72], and they are outlined in order next.
The extended Kalman filter (EKF) handles the nonlinearity by linearizing h(v) around the state predictor. To start, let v̂t+1|t stand for the predicted estimate at time t + 1 given measurements {zτ }tτ =1 up to time t.
Let also v̂t+1|t+1 be the filtered estimate given measurements {zτ }t+1
τ =1 . If
the noise terms ωt and t in (73) are assumed zero-mean Gaussian with
known covariance matrices Qt 0 and Rt 0, respectively, the EKF can
be implemented with the following recursions
v̂t+1|t+1 = v̂t+1|t + Kt+1 zt+1 − h(v̂t+1|t )
(74)
where the state predictor v̂t+1|t and the Kalman gain Kt+1 are given by
v̂t+1|t = Ft v̂t|t + gt
(75a)
H
Kt+1 = Pt+1|t JH
t+1 Jt+1 Pt+1|t Jt+1 + Rt+1
Pt+1|t+1 = Pt+1|t − Kt+1 Jt+1 Pt+1|t
Pt+1|t = Ft Pt|t FH
t + Qt
31
−1
(75b)
(75c)
(75d)
with Jt+1 being the measurement Jacobian matrix of h evaluated at v̂t+1|t ,
and Pt+1|t+1 0 (Pt+1|t 0) denoting the corrected (predicted) state
estimation error covariance matrix at time t + 1. To improve on the approximation accuracy of the EKF, extended Kalman filters (UKF) have been
reported in [65]; see also [79] for their robust versions. Particle filtering
may also be useful if its computational complexity can be supported during
real-time power systems operations.
Because the EKF and UKF are known to diverge for highly nonlinear
dynamics, moving horizon estimation (MHE) has been suggested as an accurate yet tractable alternative with proven robustness to bounded model
errors [59]. Different from Kalman filtering, the initial state v0 , and noises
ωt and t in MHE are viewed as deterministic unknowns taking values from
given bounded sets S, W, and E, respectively. The sets W and E model
disturbances with truncated densities [59].
The idea behind MHE is to perform PSSE by exploiting useful information present in a sliding window of the most recent observations. Consider
here a sliding window of length L + 1. Let v̂t−L|t denote the smoothed
estimate at time t − L given L past measurements, as well as the current one, namely {zτ }tτ =t−L . MHE aims at obtaining the most recent L
t
state estimates {v̂t−L+s|t }L
s=0 based on {zτ }t−L and the available estimate
v̌t−L := v̂t−L|t−1 from time t − 1 and for t ≥ L. A key simplification is that
once v̂t−L|t becomes available, the other L recent estimates at time t can be
recursively obtained through ‘noise-free’ propagation based on the dynamic
model (73a); that is,
v̂t−L+s|t = Ft−L+s−1 v̂t−L+s−1|t
(76)
for s = 1, . . . , L. By relating all recent estimates to v̂t−L|t via successive
multiplications of transition matrices, the update in (76) simplifies to
v̂t−L+s|t = Tt−L+s v̂t−L|t
(77)
where Tt−L+s := Ft−L+s−1 Tt−L+s−1 for s = 1, . . . , L, with Tt−L = I. The
MHE-based state estimate v̂t−L|t is then given by
v̂t−L|t := arg min
v
L
X
zt−L+s − h(Tt−L+s v)
2
2
+ λkv − v̌t−L k22
(78)
s=0
where λ > 0 can be tuned relying on our confidence in the state predictor
v̌t−L , and the measurements {zτ }tt−L . Given the quadratic dependence of
32
the SCADA measurements {h(vt )} and the state v, the optimization problem in (78) is non-convex.
Finding the MHE-based state estimates in real time entails online solutions of dynamic optimization problems. The MHE formulation can be
convexified by exploiting the semidefinite relaxation: vector v is lifted to the
matrix V := vvH 0, and the m-th entry of h(vt−L+s ) for s = 0, . . . , L, is
expressed as
H
hm (Tt−L+s v) = vH TH
t−L+s Hm Tt−L+s v = Tr(Tt−L+s Hm Tt−L+s V).
Upon dropping the nonconvex rank constraint rank(V) = 1, the SDP-based
MHE yields
V̂t−L|t := arg min
V0
L
X
zt−L+s −Tr TH
t−L+s Hm Tt−L+s V
2
+λkv− v̌t−L k22
2
s=0
which can be solved in polynomial time using off-the-shelf toolboxes. Rankone state estimates can be obtained again through eigen-decomposition or
randomization. The complexity of solving the last problem is rather high
in its present form on the order of Nb4.5 [46]. Therefore, developing faster
solvers for the SDP-based MHE by exploiting the rich sparsity structure in
{Hm } matrices is worth investigating. Decentralized and localized MHE
implementations are also timely and pertinent. Devising FPP-based solvers
for the MHE in (78) constitutes another research direction.
7
Discussion
This chapter has reviewed some of the recent advances in PSSE. After developing the CRLB, an SDP-based solver, and its regularized counterpart
were discussed. To overcome the high complexity involved, a scheme named
feasible point pursuit relying on successive convex approximations was also
advocated. A decentralized PSSE paradigm put forth provides the means
for coping with the computationally-intensive SDP formulations, it is tailored for the interconnected nature of modern grids, while it can also afford
processing PMU data in a timely fashion. A better understanding of cyber
attacks and disciplined ways for decentralized bad data processing were also
provided. Finally, this chapter gave a fresh perspective to state tracking
under model-free and model-based scenarios.
Nonetheless, there are still many technically challenging and practically
pertinent grid monitoring issues to be addressed. Solving power grid data
33
processing tasks on the cloud has been a major trend to alleviate data storage, communication, and interoperability costs for system operators and
utilities. Moreover, with the current focus on low- and medium-voltage distribution grids, solvers for unbalanced and multi-phase operating conditions
[2] are desirable. Smart meters and synchrophasor data from distribution
grids (also known as micro-PMUs [67]) call for new data processing solutions. Advances in machine learning and statistical signal processing, such
as sparse and low-rank models, missing and incomplete data, tensor decompositions, deep learning, nonconvex and stochastic optimization tools, and
(multi)kernel-based learning to name a few, are currently providing novel
paths to grid monitoring tasks while realizing the vision of smarter energy
systems.
Acknowledgements
G. Wang and G. B. Giannakis were supported in part by NSF grants 1423316,
1442686, 1508993, and 1509040; and by the Laboratory Directed Research
and Development Program at the NREL. H. Zhu was supported in part by
NSF grants 1610732 and 1653706.
Appendix
2 })).
Proof of Prop. 1. Consider the AGWN model (15) with ∼ N (0, dg({σm
The data likelihood function is
M
Y
1
(zm − vH Hm v)2
p
p(z; v) =
(79)
exp −
2
2
2σm
2πσm
m=1
and the negative log-likelihood function denoted by f (v) = − ln p(z; x) is
f (v) =
M
X
2 1
1
H
2
z
−
v
H
v
+
ln
2πσ
.
m
m
m
2
2σm
2
(80)
m=1
The Fisher information matrix (FIM) is defined as the Hessian of the
real-valued function f (v) with respect to the complex vector v ∈ CNb . Deriving the CRLB amounts to finding the Hessian of a real-valued function
with respect to a complex-valued vector. Wirtinger’s calculus confirms that
f (v) can be equivalently rewritten as f (v, v∗ ); see e.g., [41]. Upon introducing the conjugate coordinates [vT (v∗ )T ]T ∈ C2Nb , the Wirtinger derivatives, namely the first-order partial differential operators of functions over
34
complex domains, are given by [41]
∂f
∂f (v, v∗ )
:=
∂v
∂vT
∂f
∂f (v, v∗ )
:=
∂v∗
∂(v∗ )T
∂f
∂f
···
=
∂V1
∂VN constant v∗
v∗
∂f
∂f
.
=
···
∗
∂V1∗
∂VN
v
constant v
constant
constant
These definitions follow the convention in multivariate calculus that derivatives are denoted by row vectors, and gradients by column vectors. Define
for notational brevity φm (v, v∗ ) := zm − (v∗ )T Hm v for m = 1, . . . , M .
Accordingly, the Wirtinger derivatives of f (v, v∗ ) in (80) are obtained as
M
L
X
X
∂f
1
∂φm
∂f
1
∂φm
=
φ
and
=
φ
2 m ∂vT
2 m ∂(v∗ )T
∂v
σm
∂v∗
σm
m=1
(82)
m=1
and the Wirtinger derivatives of φm (v, v∗ ) can be found likewise
∂φm
∂φm
= −(Hm v)H and
= −(H∗m v∗ )H .
∂vT
∂(v∗ )T
(83)
In the conjugate coordinate system, the complex Hessian of f (v, v∗ ) with
respect to the conjugate coordinates [vT (v∗ )T ]T is defined as
Hvv Hv∗ v
∗
2
∗
H(v, v ) := ∇ f (v, v ) =
(84)
Hvv∗ Hv∗ v∗
whose blocks are given as
Hvv
∂
:=
∂vT
Hvv∗
∂
:=
∂vT
∂f
∂v
H
∂f
∂v∗
,
Hv∗ v
∂f
∂v
Hv ∗ v ∗
∂
:=
∂(v∗ )T
∂f
∂v∗
H
,
H
∂
:=
∂(v∗ )T
H
.
Substituting (82) and (83) into the last equations and after algebraic manipulations yields
Hvv =
Hv ∗ v =
M
X
m=1
M
X
−2
σm
Hm v(Hm v)H − φm Hm
(85a)
−2
σm
Hm v(H∗m v∗ )H
(85b)
m=1
35
Hvv∗ =
Hv ∗ v ∗ =
M
X
m=1
M
X
−2 ∗ ∗
σm
Hm v (Hm v)H
(85c)
−2
σm
H∗m v∗ (H∗m v∗ )H − φm H∗m .
(85d)
m=1
Evaluating the Hessian blocks of (85) at the true value of v, and taking
the expectation with respect to , yields E[φm ] = 0. Hence, the φm -related
terms in (85) disappear, and the FIM F(v, v∗ ) := E[H(v, v∗ )] simplifies to
the expression in (23); see also [66].
To show that the FIM is rank-deficient,
define gm := [(Hm v)H (H∗m v∗ )H ]H ,
PM
−2 g gH . Observe now that the nonso that the FIM becomes F = m=1 σm
m m
T
∗
T
T
zero vector d(v) := [v − (v ) ] is orthogonal to gm for m = 1, . . . , M ;
that is,
H
gm
d = vH Hm v − (vH Hm v)∗ = 0.
Based on the latter, it is not hard to verify that Fd = 0, which proves that
the null space of F is non-empty.
References
[1] A. Abur and A. Gómez-Expósito, Power System State Estimation: Theory and Implementation. New York, NY: Marcel Dekker, 2004.
[2] M. Bazrafshan and N. Gatsis, “Comprehensive modeling of three-phase
distribution systems via the bus admittance matrix,” arXiv:1705.06782,
2017.
[3] D. P. Bertsekas, Nonlinear Programming, 2nd ed.
Athena Scientific, 1999.
Belmont, MA:
[4] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Found. Trends Mach. Learn., vol. 3,
pp. 1–122, 2010.
[5] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY:
Cambridge University Press, 2004.
[6] M. K. Celik and A. Abur, “A robust WLAV state estimator using transformations,” IEEE Trans. Power Syst., vol. 7, no. 1, pp. 106–113, Feb.
1992.
36
[7] S. S. Chen, D. L. Donoho, Michael, and A. Saunders, “Atomic decomposition by basis pursuit,” SIAM J. Sci. Comput., vol. 20, pp. 33–61,
Jul. 1998.
[8] K. A. Clements, G. R. Krumpholz, and P. W. Davis, “Power system state estimation with measurement deficiency: An observability/measurement placement algorithm,” IEEE Trans. Power App.
Syst., vol. 102, no. 7, pp. 2012–2020, Jul. 1983.
[9] A. J. Conejo, S. de la Torre, and M. Canas, “An optimization approach
to multiarea state estimation,” IEEE Trans. Power Syst., vol. 22, no. 1,
pp. 213–221, Feb. 2007.
[10] T. V. Cutsem and M. Ribbens-Pavella, “Critical survey of hierarchical
methods for state estimation of electric power systems,” IEEE Trans.
Power App. Syst., vol. 102, no. 10, pp. 3415–3424, Oct. 1983.
[11] A. L. Da Silva, M. Do Coutto Filho, and J. De Queiroz, “State forecasting in electric power systems,” IEE Proc. Generat. Transm. Distrib.,
vol. 130, no. 5, pp. 237–244, Sep. 1983.
[12] E. Dall’Anese, H. Zhu, and G. B. Giannakis, “Distributed optimal
power flow for smart microgrids,” IEEE Trans. Smart Grid, vol. 4,
no. 3, pp. 1464–1475, Sep. 2013.
[13] J. De La Ree, V. A. Centeno, J. Thorp, and A. Phadke, “Synchronized phasor measurement applications in power systems,” IEEE Trans.
Smart Grid, vol. 1, no. 1, pp. 20–27, Jun. 2010.
[14] A. S. Debs and R. E. Larson, “A dynamic estimator for tracking the
state of a power system,” IEEE Trans. Power App. Syst., no. 7, pp.
1670–1678, Sep. 1970.
[15] D. Duan, L. Yang, and L. L. Scharf, “Phasor state estimation from
PMU measurements with bad data,” in Proc. IEEE Workshop on
Comp. Adv. in Multi-Sensor Adaptive Proc., San Juan, Puerto Rico,
Dec. 2011.
[16] R. Ebrahimian and R. Baldick, “State estimation distributed processing,” IEEE Trans. Power Syst., vol. 15, no. 4, pp. 1240–1246, Nov.
2000.
37
[17] A. A. El-Keib, J. Nieplocha, H. Singh, and D. Maratukulam, “A decomposed state estimation technique suitable for parallel processor implementation,” IEEE Trans. Power Syst., vol. 7, no. 3, pp. 1088–1097,
Aug. 1992.
[18] D. M. Falcao, F. F. Wu, and L. Murphy, “Parallel and distributed state
estimation,” IEEE Trans. Power Syst., vol. 10, no. 2, pp. 724–730, May
1995.
[19] G. B. Giannakis, V. Kekatos, N. Gatsis, S.-J. Kim, H. Zhu, and B. Wollenberg, “Monitoring and optimization for power grids: A signal processing perspective,” IEEE Signal Process. Mag., vol. 30, no. 5, pp.
107–128, Sept. 2013.
[20] G. B. Giannakis, Q. Ling, G. Mateos, I. D. Schizas, and H. Zhu, “Decentralized learning for wireless communications and networking,” Splitting Methods in Communication, Imaging, Science, and Engineering,
pp. 461–497, Springer, 2016.
[21] M. X. Goemans and D. P. Williamson, “Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite
programming,” J. ACM, vol. 42, no. 6, pp. 1115–1145, Nov. 1995.
[22] A. Gómez-Expósito, A. Abur, A. de la Villa Jaén, and C. Gómez-Quiles,
“A multilevel state estimation paradigm for smart grids,” Proc. IEEE,
vol. 99, no. 6, pp. 952–976, Jun. 2011.
[23] A. Gómez-Expósito, A. de la Villa Jaén, C. Gómez-Quiles,
P. Rousseaux, and T. V. Cutsem, “A taxonomy of multi-area state
estimation methods,” Electr. Pow. Syst. Res., vol. 81, pp. 1060–1069,
Apr. 2011.
[24] R. Grone, C. R. Johnson, E. M. Sá, and H. Wolkowicz, “Positive definite
completions of partial hermitian matrices,” Linear Algebra & its Appl.,
vol. 58, pp. 109–124, Apr. 1984.
[25] S. Haykin, Adaptive Filter Theory. New York, NY: Prentice Hall, 2002.
[26] S.-J. Huang and K.-R. Shih, “Dynamic-state-estimation scheme including nonlinear measurement function considerations,” IEE Proc. Generat. Transm. Distrib., vol. 149, no. 6, pp. 673–678, Nov. 2002.
38
[27] S. Iwamoto, M. Kusano, and V. H. Quintana, “Hierarchical state estimation using a fast rectangular-coordinate method,” IEEE Trans.
Power Syst., vol. 4, no. 3, pp. 870–880, Aug. 1989.
[28] R. A. Jabr, “Exploiting sparsity in SDP relaxations of the OPF problem,” IEEE Trans. Power Syst., vol. 27, no. 2, pp. 1138–1139, May
2012.
[29] S. M. Kay, Fundamentals of Statistical Signal Processing, Vol. I: Estimation Theory. Prentice Hall, 1993.
[30] V. Kekatos and G. B. Giannakis, “From sparse signals to sparse residuals for robust sensing,” IEEE Trans. Signal Process., vol. 59, no. 7,
pp. 3355–3368, Jul. 2011.
[31] ——, “Distributed robust power system state estimation,” IEEE Trans.
Power Syst., vol. 28, no. 2, pp. 1617–1626, May 2013.
[32] V. Kekatos, G. B. Giannakis, and B. F. Wollenberg, “Optimal placement of phasor measurement units via convex relaxation,” IEEE Trans.
Power Syst., vol. 27, no. 3, pp. 1521–1530, Aug. 2012.
[33] V. Kekatos, E. Vlachos, D. Ampeliotis, G. B. Giannakis, and
K. Berberidis, “A decentralized approach to generalized power system state estimation,” in Proc. IEEE Wkshp. on Comp. Adv. in MultiSensor Adaptive Proc., Saint Martin, Dec. 2013.
[34] V. Kekatos, G. Wang, A. J. Conejo, and G. B. Giannakis, “Stochastic reactive power management in microgrids with renewables,” IEEE
Trans. Power Syst., vol. 30, no. 6, pp. 3386–3395, Nov. 2015.
[35] S. J. Kim, G. B. Giannakis, and K. Y. Lee, “Online optimal power flow
with renewables,” in Asilomar Conf. on Signals, Syst. and Comput.,
Pacific Grove, CA, Nov 2014, pp. 355–360.
[36] S.-J. Kim, “Online power system state estimation using alternating
direction method of multipliers,” in Proc. IEEE PES Summer Meeting,
Denver, CO, 2015.
[37] S.-J. Kim, G. Wang, and G. B. Giannakis, “Online semidefinite programming for power system state estimation,” in Proc. IEEE Intl. Conf.
on Acoustics, Speech, and Signal Process., Florence, Italy, May 2014,
pp. 6024–6027.
39
[38] G. N. Korres, “A distributed multiarea state estimation,” IEEE Trans.
Power Syst., vol. 26, no. 1, pp. 73–84, Feb. 2011.
[39] O. Kosut, L. Jia, J. Thomas, and L. Tong, “Malicious data attacks on
the smart grid,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645–658,
Dec. 2011.
[40] W. W. Kotiuga and M. Vidyasagar, “Bad data rejection properties of
weighted least-absolute-value techniques applied to static state estimation,” IEEE Trans. Power App. Syst., no. 4, pp. 844–853, Apr. 1982.
[41] K. Kreutz-Delgado, “The complex gradient operator and the CRcalculus,” arXiv:0906.4835, 2009.
[42] A. Y. Lam, B. Zhang, and T. David, “Distributed algorithms for optimal power flow problem,” in Proc. IEEE Conf. on Decision and Control,
Maui, HI, Dec. 2012, pp. 430–437.
[43] S.-Y. Lin and C.-H. Lin, “An implementable distributed state estimator and distributed bad data processing schemes for electric power systems,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1277–1284, Aug.
1994.
[44] T. Lipp and S. Boyd, “Variations and extension of the convex–concave
procedure,” Optim. Eng., vol. 17, no. 2, pp. 263–287, Jun. 2016.
[45] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against
state estimation in electric power grids,” ACM Trans. Info. and System
Security, vol. 14, no. 1, pp. 13:1–13:33, May 2011.
[46] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite
relaxation of quadratic optimization problems,” IEEE Signal Process.
Mag., vol. 27, no. 3, pp. 20–34, May 2010.
[47] R. Madani, A. Ashraphijuo, J. Lavaei, and R. Baldick, “Power system
state estimation with a limited number of measurements,” in Proc.
IEEE Conf. on Decision and Control, Las Vegas, NV, Dec. 2016.
[48] R. Madani, J. Lavaei, and R. Baldick, “Convexification of power flow
problem over arbitrary networks,” in Proc. IEEE Conf. on Decision
and Control, Osaka, Japan, Dec. 2015.
[49] O. L. Mangasarian and D. R. Musicant, “Robust linear and support
vector regression,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 22,
no. 9, pp. 950–955, Sep. 2000.
40
[50] R. A. Maronna, R. D. Martin, and V. J. Yohai, Robust Statistics: Theory and Methods. Wiley, 2006.
[51] O. Mehanna, K. Huang, B. Gopalakrishnan, A. Konar, and
N. Sidiropoulos, “Feasible point pursuit and successive approximation
of non-convex QCQPs,” vol. 22, no. 7, pp. 804–808, Nov. 2015.
[52] L. Mili, M. G. Cheniae, and P. J. Rousseeuw, “Robust state estimation
of electric power systems,” IEEE Trans. Circuits Syst. I, vol. 41, no. 5,
pp. 349–358, May 1994.
[53] A. Minot, Y. M. Lu, and N. Li, “A distributed Gauss-Newton method
for power system state estimation,” IEEE Trans. Power Syst., vol. 31,
no. 5, pp. 3804–3815, Sep. 2016.
[54] B. Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig,
and B. Sinopoli, “Cyber-physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
[55] A. Monticelli, “Electric power system state estimation,” Proc. IEEE,
vol. 88, no. 2, pp. 262–282, Feb. 2000.
[56] A. Monticelli and F. F. Wu, “Network observability: Theory,” IEEE
Trans. Power App. Syst., vol. 104, no. 5, pp. 1042–1048, May 1985.
[57] P. M. Pardalos and S. A. Vavasis, “Quadratic programming with one
negative eigenvalue is NP-hard,” J. Global Optim., vol. 1, no. 1, pp.
15–22, Mar. 1991.
[58] A. G. Phadke and J. S. Thorp, Synchronized Phasor Measurements and
Their Applications. New York, NY: Springer, 2008.
[59] C. V. Rao, J. B. Rawlings, and D. Q. Mayne, “Constrained state estimation for nonlinear discrete-time systems: Stability and moving horizon approximations,” IEEE Trans. Autom. Contr., vol. 48, no. 2, pp.
246–258, Feb. 2003.
[60] I. D. Schizas, A. Ribeiro, and G. B. Giannakis, “Consensus in ad hoc
WSNs with noisy links: Part I: Distributed estimation of deterministic
signals,” IEEE Trans. Signal Process., vol. 56, no. 1, pp. 350–364, Jan.
2008.
[61] F. C. Schweppe, J. Wildes, and D. Rom, “Power system static state
estimation: Parts I, II, and III,” IEEE Trans. Power App. Syst., vol. 89,
pp. 120–135, Jan. 1970.
41
[62] S. Shalev-Shwartz, “Online learning and online convex optimization,”
Found. and Trends Mach. Learning, vol. 4, no. 2, pp. 107–194, Mar.
2011.
[63] P. Stoica and T. L. Marzetta, “Parameter estimation problems with
singular information matrices,” IEEE Trans. Signal Process., vol. 49,
no. 1, pp. 87–90, Jan. 2001.
[64] Power systems test case archive. Univ. of Washington. [Online].
Available: http://www.ee.washington.edu/research/pstca/
[65] G. Valverde and V. Terzija, “Unscented Kalman filter for power system
dynamic state estimation,” IEE Proc. Generat. Transm. Distrib., vol. 5,
no. 1, pp. 29–37, Jan. 2011.
[66] A. Van den Bos, “A Cramér-Rao lower bound for complex parameters,”
IEEE Trans. Signal Process., vol. 40, no. 10, Oct. 1994.
[67] A. Von Meier, D. Culler, A. McEachern, and R. Arghandeh, “Microsynchrophasors for distribution systems,” in Proc. IEEE Conf. on Innovative Smart Grid Technologies, 2014, pp. 1–5.
[68] G. Wang, G. B. Giannakis, and J. Chen, “Robust and scalable power
system state estimation via composite optimization,” preprint, 2017.
[69] G. Wang, V. Kekatos, A. J. Conejo, and G. B. Giannakis, “Ergodic energy management leveraging resource variability in distribution grids,”
IEEE Trans. Power Syst., vol. 31, no. 6, pp. 4765–4775, Nov. 2016.
[70] G. Wang, A. S. Zamzam, G. B. Giannakis, and N. D. Sidiropoulos,
“Power system state estimation via feasible point pursuit,” in Proc.
IEEE Global Conf. on Signal and Inf. Process., Washington, D.C., Nov.
2016.
[71] ——, “Power system state estimation via feasible point pursuit: Algorithms and Crmér-Rao bound,” arXiv:1203.0853, 2017.
[72] G. Wang, S.-J. Kim, and G. B. Giannakis, “Moving-horizon dynamic
power system state estimation using semidefinite relaxation,” in Proc.
IEEE PES General Meeting, Washington, DC, Jul. 2014, pp. 1–5.
[73] S. Wang, W. Gao, and A. S. Meliopoulos, “An alternative method for
power system dynamic state estimation based on unscented transform,”
IEEE Trans. Power Syst., vol. 27, no. 2, pp. 942–950, May 2012.
42
[74] A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and
Control, 2nd ed. New York, NY: Wiley & Sons, 1996.
[75] L. Xie, D.-H. Choi, and S. Kar, “Cooperative distributed state estimation: Local observability relaxed,” in Proc. IEEE Power & Energy
Society General Meeting, Detroit, MI, Jul. 2011.
[76] W. Xu, M. Wang, J. F. Cai, and A. Tang, “Sparse error correction
from nonlinear measurements with applications in bad data detection
for power networks,” IEEE Trans. Signal Process., vol. 61, no. 24, pp.
6175–6187, Dec. 2013.
[77] A. S. Zamzam, N. D. Sidiropoulos, and E. Dall’Anese, “Beyond relaxation and Newton-Raphson: Solving AC OPF for multi-phase systems
with renewables,” IEEE Trans. Smart Grid, 2017.
[78] Y. Zhang, R. Madani, and J. Lavaei, “Conic relaxations for power system state estimation with line measurements,” IEEE Trans. Control
Netw. Syst., 2017 (to appear).
[79] J. Zhao, M. Netto, and L. Mili, “A robust iterated extended Kalman
filter for power system dynamic state estimation,” IEEE Trans. Power
Syst., 2016 (to appear).
[80] L. Zhao and A. Abur, “Multiarea state estimation using synchronized
phasor measurements,” IEEE Trans. Power Syst., vol. 20, no. 2, pp.
611–617, May 2005.
[81] H. Zhu and G. B. Giannakis, “Robust power system state estimation
for the nonlinear AC flow model,” in Proc. North American Power
Symposium, Urbana-Champaign, IL, Sep. 2012.
[82] H. Zhu, G. B. Giannakis, and A. Cano, “Distributed in-network decoding,” IEEE Trans. Signal Process., vol. 57, no. 10, pp. 3970–3983, Oct.
2009.
[83] H. Zhu and G. B. Giannakis, “Estimating the state of AC power systems using semidefinite programming,” in Proc. North American Power
Symposium, Boston, MA, Aug. 2011.
[84] ——, “Power system nonlinear state estimation using distributed
semidefinite programming,” IEEE J. Sel. Topics Signal Process., vol. 8,
no. 6, pp. 1039–1050, Dec. 2014.
43
| 3 |
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE
CANONICAL SHEAVES
arXiv:1207.1910v3 [math.AG] 4 Feb 2013
ZSOLT PATAKFALVI AND KARL SCHWEDE
Abstract. For a characteristic p > 0 variety X with controlled F -singularities, we state
conditions which imply that a divisorial sheaf is Cohen-Macaulay or at least has depth
≥ 3 at certain points. This mirrors results of Kollár for varieties in characteristic zero. As
an application, we show that relative canonical sheaves are compatible with arbitrary base
change for certain families with sharply F -pure fibers.
1. Introduction
In the paper [Kol11b], Kollár proved that sheaves OX (−D) satisfy strong depth conditions
if D is locally Q-linearly equivalent to a divisor ∆ such that (X, ∆) is SLC or KLT. These
results generalized [Ale08, Lemma 3.2], [Fuj09] and [KM98, Corollary 5.25]. Because depth
conditions can be interpreted as vanishing of local cohomology, these results were described
as a local version of the Kawamata-Viehweg vanishing theorem.
In this paper, we obtain characteristic p > 0 analogs of the main results of [Kol11b]. This
is particularly interesting because the (global) Kawamata-Viehweg vanishing theorem is false
in positive characteristic [Ray78]. We replace the KLT and SLC conditions by strongly F regular and sharply F -pure singularities respectively (such characteristic p > 0 singularity
classes are known as F -singularities). For the convenience of the reader, we recall that by
[HW02, MS12]
◦ KLT pairs correspond philosophically to strongly F -regular pairs, and
◦ SLC pairs correspond philosophically to sharply F -pure pairs.
Similar to [Kol11b], we can apply our results on depth to prove base change for relative
canonical sheaves.
(A special case of ) Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism
of finite type with S2 , G1 equidimensional fibers to a smooth variety and let ∆ ≥ 0 be a Qdivisor on X avoiding all the codimension zero and the singular codimension one points of
the fibers. Further suppose that KX + ∆ is Q-Cartier, p 6 | ind(KX + ∆) and (Xy , ∆y ) is
sharply F -pure for every y ∈ Y . Then ωX/Y is flat over Y and compatible with arbitrary base
change.
Corollary 4.13 is hoped to be useful in constructing a moduli space for varieties of general
type in positive characteristics. See [Pat10] for further explanation, and also for examples for
which the above compatibility does not hold. We also remark here that ωX/Y behaves surprisingly well with respect to base-change. It obeys base-change for example when the fibers are
Cohen-Macaualay [Con00, Theorem 3.6.1]. In particular, this pertains to families of normal
[m]
surfaces. In contrast, the higher reflexive powers, ωX/Y for m > 1, are not compatible with
base change in the surface case [HK10, Section 14.A]. Similar differences between canonical
and pluricanonical sheaves have been observed earlier [Kol87, page 2], [Kol90, Remark 4.4].
2010 Mathematics Subject Classification. 13A35, 14J10, 14J17, 14F18, 13C14, 13C15.
Key words and phrases. depth, Cohen-Macaulay, F -singularities, base change, relative canonical sheaf.
The second author was partially supported by the NSF grant DMS #1064485.
1
2
ZSOLT PATAKFALVI AND KARL SCHWEDE
The technical result on depth used to prove Corollary 4.13 is as follows. It is a characteristic
p > 0 version of [Kol11b, Theorem 3(1)], also compare with [Ale08, Lemma 3.2], [Fuj09,
Theorem 4.21], [AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5].
Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 and that
0 ≤ ∆ is an R-divisor on X = Spec R with no common components with the singular locus of
X and such that (X, ∆) is sharply F -pure. Set x ∈ X to be the closed point and assume that
x is not an F -pure center of (X, ∆). Suppose that 0 ≤ ∆′ ≤ ∆ is another R-divisor and that
r∆′ is integral for some r > 0 relatively prime to p. Further assume that M is any rank-1
reflexive subsheaf of K(X) such that M (−r) ∼
= OX (r∆′ ) (here (·) denotes reflexive power).
Then
depthx M ≥ min{3, codimX x}.
Another interesting depth statement, again completely analogous to a theorem of Kollár
is below. In the introduction we phrase it in the language of Frobenius splittings [BK05], but
in the text it is phrased slightly more generally.
Theorem 3.6, Remark 3.7. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is an S2 local
ring with Frobenius splitting ϕ : F∗e R −→ R which is not compatibly split with m. Additionally
suppose that Z is any union of compatibly ϕ-split subvarieties of X = Spec R such that
no irreducible component of Z coincides with an irreducible component of X. Suppose that
IZ ⊆ R is the ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
The other main statement on depth we obtain, Theorem 3.1, asserts that if (X, ∆) is
strongly F -regular and (pe − 1)D is an integral divisor linearly equivalent to (pe − 1)∆, then
OX (−D) is Cohen-Macaulay. Compare with [Kol11b, Theorem 2].
Remark 1.1. One should also compare the above results on depth, as well as the related
characteristic zero results, to [AE05, Theorem 4.8(vi)] where Aberbach and Enescu showed
that the depth of an F -pure ring R is always ≥ than the dimension of the minimal F -pure
center (ie, of the dimension of R modulo the splitting prime, which we know is equal to the
s-dimension of [AE05] by [BST11]).
Acknowledgements:
The authors began working on this project at the workshop ACC for minimal log discrepancies and termination of flips held at the American Institute of Mathematics and organized
by Tommaso de Fernex and Christopher Hacon. The authors would also like to thank Florian
Enescu for valuable discussions as well as thank the referee, János Kollár and Sándor Kovács
for many useful comments on a previous draft.
2. Preliminaries on F -singularities
Notation 2.1. Throughout this paper, all schemes are Noetherian, separated, of equal characteristic p > 0 and F -finite.1 Note that any such scheme X is automatically locally excellent
by [Kun76] and also has a dualizing complex by [Gab04]. In particular, we are implicitly
assuming all schemes are locally excellent and possess dualizing complexes. Little will be lost
to the reader if he or she considers only schemes that are essentially of finite type over a
perfect field.
1Meaning the Frobenius morphism is a finite morphism.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
3
We remind the reader of some special divisors on non-normal schemes.
Definition 2.2 (Divisors on non-normal schemes). We follow the notation of [K+92, Section
16]. For an S2 reduced local ring R, set X = Spec R. We define a W-divisor (or Weil divisor )
to be a formal sum of codimension one subsets of X whose generic points are not singular
points of X. This has the same data as divisors on the regular locus of X or as rank-1 S2
submodules M of K(R) (the total ring of fractions of R) such that Mη = Rη as a subset
of K(R), for every codimension 1 singular point η of X. Later in the paper, we will need
to instead work with the more general notion of Weil divisorial sheaves WSh(X), rank one
reflexive subsheaves of K(X) that are invertible in codimension 1.
In the non-local setting, such divisors are simply formal sums of irreducible subschemes that
satisfy this definition locally. We now set WDivQ (X) := WDiv(X)⊗Z Q and WDivR (X) :=
WDiv(X) ⊗Z R. Note we have containments:
WDiv(X) ⊆ WDivQ (X) ⊆ WDivR (X).
One can also form WShQ (X) := WSh(X) ⊗Z Q and WShZ(p) (X) := WShZ(p) (X) ⊗Z Z(p)
similarly, but the natural maps WSh(X) −
→ WShZ(p) (X) −
→ WShQ (X) are not necessarily
P
injective [K+92, Section 16]. Given
i ai Di = ∆ ∈ WDivR (X), we use ⌈∆⌉ to denote
P
⌈a
⌉D
(such
roundings
are
not
necessarily
well defined for WShZ(p) (X) or WShQ (x)).
i
i i
Finally, given D ∈ WDiv(X), we use OX (D) (or R(D)) to denote the corresponding subsheaf
of K (X) (or of K(R)) in the usual way. Note that D is effective if and only if OX (D) ⊇ OX .
Now we move away from divisors. Suppose that R is a ring of characteristic p > 0. Following
[Sch11, Bli09], we say a Cartier subalgebra C is a graded subring of the graded ring
M
HomR (F∗e R, R) =: C R
e≥0
where multiplication is done by Frobenius twisted composition2 such that the zeroth graded
piece [C ]0 = HomR (R, R) ∼
= R. We note that even though we call C a Cartier subalgebra, it
is not an R-algebra because R ∼
= [C ]0 is not necessarily central.
Example 2.3 (Cartier subalgebra associated to a divisor). Given an S2 and G1 ring R, set
X = Spec R and assume that 0 ≤ ∆ ∈ WDivR (X) on X (for example, if R is normal, ∆ is
simply an R-divisor). We can form the Cartier subalgebra C ∆ where
[C ∆ ]e := HomR (F∗e R(⌈(pe − 1)∆⌉), R) ⊆ HomR (F∗e R, R).
Example 2.4 (Cartier subalgebra generated by a map). Suppose that C R is as above and
ϕ ∈ [C R ]e for some e > 0. Then we can form the Cartier subalgebra Rhϕi generated by
R = [C ]0 and ϕ. Explicitly, this is the direct sum R ⊕ (ϕ · (F∗e R)) ⊕ (ϕ2 · (F∗2e R)) ⊕ · · · .
Now we define sharply F -pure pairs and F -pure centers.
Definition 2.5 (Sharply F -pure pairs). If C is a Cartier subalgebra on R, then we say that
the pair (R, C ) is sharply F -pure if there exists some ϕ ∈ [C ]e for some e ≥ 1 such that
ϕ(F∗e R) = R.
In particular, if (R, ∆) is a pair as in Example 2.3, then we say that (R, ∆) is sharply
F -pure if the associated (R, C ∆ ) is sharply F -pure.
If (R, C R ) is sharply F -pure, then we simply say that R is F -pure.
Definition 2.6 (Compatible ideals and F -pure centers). If (R, C ) is a pair as above, then
an ideal I ⊆ R is called C -compatible if ϕ(F∗e I) ⊆ I for all ϕ ∈ [C ]e and all e ≥ 0. In the
case that C = Rhϕi, we will sometimes simply say that I is ϕ-compatible.
2If ϕ ∈ [C R ] and ψ ∈ [C R ] , then ϕ · ψ = ϕ ◦ (F e ψ). See the aforementioned sources for more details.
e
d
∗
4
ZSOLT PATAKFALVI AND KARL SCHWEDE
An irreducible closed set W = V (Q) ⊆ Spec R = X, for some Q ∈ Spec R, is called an
F -pure center if the following two conditions hold:
(a) The localization (RQ , CQ ) is sharply F -pure, and
(b) For every for e ≥ 0 and ϕ ∈ [C ]e , we have ϕ(F∗e Q) ⊆ Q (in other words, if Q is
C -compatible).
Likewise we say that W is an F -pure center of (R, ∆) if it is an F -pure center of (R, C ∆ )
where C ∆ is associated to ∆ as in Example 2.3.
We also define strongly F -regular pairs.
Definition 2.7 (Strongly F -regular pairs). If R is a local ring, a pair (R, C ) is called strongly
F -regular if the only proper C -compatible ideals of R are 0 and R itself. If R is not local,
then we say (R, C ) is strongly F -regular if every localization is.
A pair (R, ∆) is strongly F -regular if (R, C ∆ ) is strongly F -regular.
Remark 2.8. Given a pair (X, ∆), all of the above definitions generalize to the non-affine
setting by requiring them to hold at each stalk. The notion of Cartier subalgebras is somewhat
more subtle in the non-affine setting however (but we will not need such generalities).
We recall some facts about compatible ideals and F -pure centers.
Lemma 2.9. Suppose that (R, C ) is a pair and I ⊆ J ⊆ R are ideals.
(i) The set of C -compatible ideals are closed under sum and intersection.
(ii) A prime ideal Q is C -compatible if and only if QRQ is CQ -compatible.
(iii) If C ′ ⊆ C are Cartier subalgebras and I is C -compatible, then I is C ′ -compatible.
(iv) Given ϕ ∈ HomR (F∗e R, R), we have ϕ(F∗e J) ⊆ J if and only if J is Rhϕi-compatible.
(v) Suppose that ϕ : F∗e R −→ R is surjective. Some Q ∈ Spec R is ϕ-compatible if and
only if it is ϕn -compatible where
(n−1)e
ϕn := ϕ ◦ (F∗e ϕ) ◦ · · · ◦ (F∗
{z
|
n-times
ϕ)
}
(vi) If I is ϕ-compatible, then there exists a map ϕ/I : F∗e (R/I) −→ (R/I) such that the
following diagram commutes:
F∗e R
ϕ
F∗e (R/I)
ϕ/I
// R
// (R/I).
Furthermore, J ⊇ I is ϕ-compatible if and only if J/I is ϕ/I-compatible. (This statement can also be done with Cartier subalgebras, but we will not need it).
(vii) (R, C ) is strongly F -regular if and only if for every c ∈ R \ {minimal primes}, there
exists a ϕ ∈ [C ]e for e > 0, in fact one may take e to be any larger multiple, such that
ϕ(F∗e c) = 1.
Proof. (v) follows from the argument of [Sch10, Proposition 4.1]. (vii) can be found in this
generality in [Sch11, Proposition 3.23]. The rest are obvious.
Our next goal is to give an example of a ϕ-compatible ideal that will be crucial in later
sections. The main idea is that Frobenius maps and Frobenius splittings induce maps on local
cohomology. Those induced maps can then be thought of as acting directly and explicitly on
Čech classes. For the convenience of the reader not already familiar with this construction,
recall that if X = Spec R and U = Spec R \ {m}, then for any coherent OX -module M , we
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
5
have Hmi (M ) = H i−1 (U, M ) for i > 1 and also that Hm1 (M ) = H 0 (U, M )/ image(H 0 (X, M )).
We can then use the Čech cohomology description of sheaf cohomology to define Hmi (M ).
For a more thorough description of local cohomology by the Čech complex, see for example
[BH93, Section 3.5].
We now consider Frobenius action on local cohomology. The Frobenius map R −
→ F∗ R
→ Hmi (F∗ R) ∼
yields Ψ : Hmi (R) −
= Hmi (R). Given a Čech class [z] = [. . . , zj , . . . ] ∈ Hmi (R), we
e
e
have Ψ([z]) ∈ Hmi (F∗ R). But certainly Ψ([z]) = F∗e [z]p = F∗e [. . . , zjp , . . . ] is identified with
raising the entries of [z] to the pe th power.
Now we do the same computation with a Frobenius splitting. Suppose that ϕ : F∗e R −
→R
ϕ
i
e
i
→ Hm (R) induced by ϕ.
is an R-linear Frobenius splitting, and so we have a map Hm (F∗ R) −
Certainly ϕ(F∗e [. . . , yj , . . . ]) = [. . . , ϕ(F∗e yj ), . . . ]. But now observe that for any [z] ∈ Hmi (R)
and r ∈ R we have that
e
e
ϕ(F∗e (r · [z]p )) = ϕ(F∗e [. . . , rzjp , . . . ]) = [. . . , ϕ(F∗e r)zj , . . . ] = ϕ(F∗e r)[z].
Lemma 2.10. (cf. [EH08, Theorem 4.1]) Suppose that (R, m) is a local ring. Then AnnR Hmi (R)
is compatible with every splitting3 ϕ : F∗e R −→ R of Frobenius R −→ F∗e R.
Proof. We have the following composition
1
ϕ
// F e R
∗
R
✤
// F e 1
∗
// R
// 1.
✤
Now suppose that r ∈ AnnR Hmi (R). Then choose [z] ∈ Hmi (R). We want to show that
ϕ(F∗e r).[z] = 0. Now, it follows from the Čech cohomology description of local cohomology,
and ϕ’s action on it, that
e
0 = ϕ(F∗e 0) = ϕ(F∗e (r.[z]p )) = ϕ(F∗e r).[z]
which completes the proof.
We also recall the following fact. We include the proof because the method will be generalized later.
Lemma 2.11. If (R, C ) is strongly F -regular, then R is normal and Cohen-Macaulay.
Proof. We first note that by Lemma 2.9(vii), the strong F -regularity hypothesis implies that
ψ
→ R is an isomorphism for some
there exists a Frobenius splitting ψ such that R −
→ F∗e R −
e > 0. It then easily follows that R must be reduced since if not, the map R −
→ F∗e R is not
injective. Normality follows since the conductor ideal is compatible with every ϕ ∈ C R by the
argument of [BK05, Proposition 1.2.5]. For the Cohen-Macaulay condition, by working locally
we assume that (R, m) is a local domain. By local duality [Har66, Chapter V, Theorem 6.2],
q
q
each Hmi (R) is Matlis dual to hi−dim R ωR for some normalized dualizing complex ωR . Since
an element c ∈ R annihilates a finitely generated R-module if and only if c annihilates the
Matlis dual of a module, it follows that there exists 0 6= c ∈ R such that c · Hmi (R) = 0 for all
i < dim R. Lemma 2.9(vii) then implies that there exists ϕ ∈ [C ]e such that the composition
F e (·c)
R−
→ F∗e R −−∗−−→ F∗e R −
→R
is an isomorphism. Taking local cohomology for i < dim R gives us an isomorphism:
F e (·c)
Hmi (R) −
→ Hmi (F∗e R) −−∗−−→ Hmi (F∗e R) −
→ Hmi (R)
where the middle map is the zero map. Thus Hmi (R) = 0 which completes the proof.
3A splitting is simply a map ϕ : F e R −
→ R that sends F∗e 1 to 1. Splittings are necessarily surjective.
∗
6
ZSOLT PATAKFALVI AND KARL SCHWEDE
We also state a generalization of [SS10, Theorem 4.3], similar computations were done in
[MS12].
Lemma 2.12. Suppose that X = Spec R is S2 and G1 and sharply F -pure. Then there exists
an element 0 ≤ ∆ ∈ WDivQ (X) such that (pe − 1)(KX + ∆) is Q-Cartier and (X, ∆) is
sharply F -pure.
Proof. A surjective map ϕ ∈ HomR (F∗e R, R) ∼
= H 0 (X, F∗e OX ((1 − pe )KX )) induces an effec4
tive Weil divisorial sheaf Γϕ by [Har94, Proposition 2.9] such that (pe − 1)KX + Γϕ ∼ 0. We
would like to show that Γϕ can be identified with an element of WDiv(X). At the singular
height one points η of X, OX,η is already Gorenstein. Thus we can consider the map Φη
which generates HomOX,η (F∗e OX,η , OX,η ) as an F∗e OX,η -module. Set m to be the maximal
ideal of OX,η and notice that m is the conductor ideal since F -pure rings are seminormal
[HR76] and in particular the conductor is radical. But then Φ(F∗e m) ⊆ m by the proof of
→ OX,η is equal to Φ(F∗e (r · )) for
[BK05, Proposition 1.2.5]. Now, we know ϕη : F∗e OX,η −
some r ∈ OX,η . We want to show that r is a unit, which would prove that Γϕ is trivial at
η. Since ϕη is surjective, we see that r ∈
/ m and thus r is a unit. This implies that the Weil
divisorial sheaf (Γϕ )η coincides with OX,η and thus Γϕ ∈ WDiv(X) as desired. Finally, set
∆ = pe1−1 Γϕ .
We conclude by recalling a well known lemma on the height of annihilators of local cohomology modules. However, because we lack a reference, we provide a proof.
Lemma 2.13. Suppose that (R, m) is a local ring and suppose that M is a finitely generated
R-module which is Sn in the sense5 of [BH93]. Set Yi = V AnnR (Hmi (M )) ⊆ Spec R = X.
Suppose that d is the minimum over the dimensions of the components of Supp M . Then
dim Yi ≤ i − n for i < d.
Remark 2.14. Note Yi may not be the same as Supp Hmi (M ) since Hmi (M ) is not finitely
generated.
Proof. Set ωX to be a normalized dualizing complex on X (recall that all our rings are
excellent and possess dualizing complexes). By local duality in the form of [Har66, Chapter
q
V, Theorem 6.2], it is equivalent to prove that dim Supp h−i R HomR (M, ωR ) ≤ i−n. Suppose
q
this is false, and thus that W ⊆ Supp h−i R HomR (M, ωR ) is an irreducible component of
dimension t > i − n for some i < d. Set γ to be the generic point of W (which we also view
as a prime ideal). By localizing at γ, we see that
q
(h−i R HomR (M, ωR ))γ = h−i R HomRγ (Mγ , ωRγ [t])) = h−i+t R HomRγ (Mγ , ωRγ ))
q
q
q
is supported at a point. The shift by [t] is necessary to keep the dualizing complexes normalized. Thus Hγi−t (Mγ ) 6= 0 by local duality again. Now, i − t < n. Also observe that
dim Mγ ≥ d − t (this is why the d is necessary since we do not know what component
of Supp M we will be restricting to). Since Mγ is still Sn , we see that Hγj (Mγ ) = 0 for
j < min(n, dim Mγ ). But then
min(n, dim Mγ ) ≥ min(n, d − t) > i − t
since n > i − t and d > i. Setting j = i − t we obtain a contradiction.
4in the terminology of [K+92, Section 16]
5In other words, depth M ≥ min(n, dim M ) for all z ∈ Spec R. Note that here we use dim M not dim R .
z
z
z
z
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
7
3. Depth and F -singularities
Our goal in this section is to prove several results on the depths of sheaves on schemes
with controlled F -singularities. First we prove our result for pairs (R, ∆) which are strongly
F -regular, this is the simplest case.
Theorem 3.1. (cf. [Kol11b, Theorem 2]) Suppose that (R, m) is local and that (X = Spec R, ∆)
is strongly F -regular. Further suppose that 0 ≤ ∆′ ≤ ∆ is such that rD ∼ r∆′ for some
integral divisor D and some integer r > 0 realtively prime to p. Then OX (−D) is CohenMacaulay.
Proof. By possibly multiplying r with an integer, we may assume that r = pe − 1. Choose,
using Lemma 2.13, 0 6= c ∈ R \ {minimal primes} such that c · Hmi (OX (−D)) = 0 for all
′
i < dim R. Note that since ∆′ ≤ ∆, C ∆ ⊆ C ∆ and then (X, ∆′ ) is strongly F -regular as well
by Lemma 2.9(iii). Therefore, by Lemma 2.9(vii) there exists an e > 0 and a splitting ϕ such
that the composition
F e (·c)
ϕ
OX −
→ F∗e OX −
→ F∗e OX ((pe − 1)∆′ ) −−∗−−→ F∗e OX ((pe − 1)∆′ ) −
→ OX
is an isomorphism. By replacing e by a multiple if necessary, we may assume that this e > 0
also satisfies the condition from the hypothesis.
Twisting by OX (−D), reflexifying, and applying Hmi ( ) we obtain the following composition which is also an isomorphism.
Hmi (OX (−D))
−
→ Hmi (F∗e OX ((pe − 1)(∆′ − D) − D))
F e (·c)
−−∗−−→ Hmi (F∗e OX ((pe − 1)(∆′ − D) − D))
ϕ
−
→ Hmi (OX (−D))
However, the map labeled F∗e (·c) is the zero map for i < dim X since
Hmi (F∗e OX ((pe − 1)(∆′ − D) − D)) = Hmi (F∗e OX (−D)).
Thus Hmi (OX (−D)) = 0 as desired.
Remark 3.2. If one assumes that (X, ∆) is purely F -regular (an analog of purely log terminal
[Tak08]), the same result holds by the same proof. The point is that we may take c annihilating
Hmi (R) and which simultaneously doesn’t vanish along the support of any component of ∆′ .
Corollary 3.3. (cf. [KM98, Corollary 5.25]) If (R, m) is local and (X = Spec R, ∆) is strongly
F -regular, then for every Q-Cartier integral divisor D, OX (−D) is Cohen-Macaulay.
Proof. If the index of D is not divisible by p then the statement is a special case of Theorem 3.1
by setting ∆′ := 0. Hence assume that the index m of D is divisible by p. Choose then an
effective divisor E linearly equivalent to D and set r := ms + 1, ∆′ := 1r E for some integer
s ≫ 0. In this situation r is relatively prime to p and
1
E = r∆′ .
rD = (ms + 1)D ∼ D ∼ E = r
r
Furthermore, for s ≫ 0, X, ∆ + 1r E is strongly F -regular. Hence, we may apply Theorem 3.1
for ∆ replaced by ∆+ 1r E and the above choices of r, D and ∆′ . This concludes our proof.
Before moving on to the sharply F -pure pairs, we need a Lemma on the existence of certain
Frobenius splittings.
Lemma 3.4. Suppose that (R, C ) is any pair where C is a Cartier subalgebra on a local ring (R, m). Suppose m is not C -compatible. Then there exists some Frobenius splitting
ϕ : F∗e R −→ R such that ϕ(F∗e m) = R ) m.
8
ZSOLT PATAKFALVI AND KARL SCHWEDE
Proof. There obviously exists a map in [C ]e , ψ : F∗e R −
→ R, such that ψ(F∗e m) 6⊆ m. It follows
e
that ψ(F∗ m) = R. We have two cases:
Case 1: Suppose that there is a unit d ∈ R \ m such that ψ(F∗e d) = u ∈
/ m. Thus
e
e
ψ(F∗e (u−p d)) = 1. Consider the map ϕ(F∗e ) = ψ(F∗e ((u−p d)· )) and notice that ϕ(F∗e 1) =
1 which shows that ϕ is a splitting. Also notice that m is not ϕ-compatible since ϕ is a unit
multiple of ψ. Thus we have found our ϕ.
Case 2: Since we have already handled Case 1, we may assume that ψ(F∗e d) ∈ m for all
units d ∈ R. Choose c ∈ m such that ψ(F∗e c) = 1. Now then ψ(F∗e 1) ∈ m since 1 is a unit.
Thus
ψ(F∗e (c + 1)) = ψ(F∗e c) + ψ(F∗e 1) ∈ 1 + m 6⊆ m
is a unit. But this is a contradiction since c is assumed not be a unit and so c+ 1 is a unit.
Remark 3.5. If, in addition to the hypotheses of Lemma 3.4, R is S2 and G1 , then by applying
the argument of Lemma 2.12 to the splitting ϕ constructed in the proof of Lemma 3.4, we
obtain a Q-divisor ∆ on X = Spec R such that
◦ (pe − 1)(KX + ∆) is Cartier.
◦ (X, ∆) is sharply F -pure.
◦ x = V (m) is not an F -pure center of (X, ∆).
The second two statements follow since ϕ ∈ [C ∆ ]e .
Theorem 3.6. (cf. [Kol11b, Theorem 3(2)]) Suppose that (R, m) is a local S2 -ring, and C
is a Cartier-subalgebra on R such that (R, C ) is sharply F -pure and V (m) is not an F -pure
center. Additionally suppose that Z ( X = Spec R is any union of F -pure centers of (R, C ).
We also assume that Z and X have no common irreducible components. If IZ is the (radical)
ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
→ R
Proof. Since shrinking C is harmless, we set C = Rhϕi for some splitting ϕ : F∗e R −
which by Lemma 3.4 is not compatible with the origin V (m). Indeed, by Lemma 2.9(iii) we
can only increase the number of centers when restricting a Cartier subalgebra.
We have the long exact sequence:
· · · Hm1 (IZ ) −
→ Hm1 (R) −
→ Hm1 (R/IZ ) −
→ Hm2 (IZ ) −
→ Hm2 (R) −
→ Hm2 (R/IZ ) −
→ Hm3 (IZ ) −
→ ···
and recall we are trying to show that Hmi (IZ ) = 0 for i < min{3, 1 + codimZ x}. Since R is S2 ,
Hm1 (R) = Hm0 (R) = 0. Since Z 6= V (m) and Z is reduced, Hm0 (OZ ) = 0 and so Hm1 (IZ ) = 0.
Thus depthm IZ ≥ 2. It is now sufficient to prove the case when codimZ x ≥ 2. This implies
that dim X ≥ 3 (since Z and X have no common components).
Furthermore, we can assume that every component of Z has dimension at least 2. Indeed,
suppose that Z1 is an irreducible component of Z such that dim Z1 = 1. If Z2 is the union of
the other components of Z and Z2 6= ∅, then Z1 ∩ Z2 = x (for dimension reasons and since
we working in a local ring). But this implies that x is an F -pure center since intersections
of F -pure centers are unions of F -pure centers by Lemma 2.9(i). Thus we can assume that
Z1 = Z is 1-dimensional. But then codimZ x = 1, which contradictions our assumption.
By Lemma 2.10, we know that AnnR (Hm2 (R)) is compatible with
p (R, C ) = (R, Rhϕi).
2
However, if Hm (R) 6= 0, then since R is S2 and of dimension ≥ 3, AnnR (Hm2 (R)) = m by
Lemma 2.13. But AnnR (Hm2 (R)) is radical (since C is sharply F -pure) so AnnR (Hm2 (R)) = m.
But V (m) is not an F -pure center, this is a contradiction. We conclude that Hm2 (R) = 0.
Now we come to Hm1 (R/IZ ). Again, since R/IZ is reduced, R/IZ is S1. Furthermore, since Z
has no 1-dimensional components we can apply Lemma 2.13 to conclude that AnnR Hm1 (R/IZ )
can either be m-primary or R. Suppose it is m-primary. Since ϕ|Z is still a splitting, it follows
that AnnR/IZ Hm1 (R/IZ ) is ϕ|Z -compatible and also radical and so equal to m/IZ . But then
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
9
m is ϕ-compatible by basic facts about Frobenius splitting or by Lemma 2.9(vi). We conclude
that Hm1 (R/IZ ) = 0. This forces Hm2 (IZ ) to be zero and completes the proof.
Remark 3.7. Another way to state a special case of Theorem 3.6 using the language of Frobenius splittings is as follows:
Suppose that (R, m) is an S2 local ring with Frobenius splitting ϕ : F∗e R −→ R which is not
compatibly split with m. Additionally suppose that Z is any union of compatibly split subvarieties of X = Spec R such that no irreducible component of Z coincides with an irreducible
component of X. Suppose that IZ ⊆ R is the ideal defining Z, then
depthm IZ ≥ min{3, 1 + codimZ x}.
Now we come to our main technical result on depth. It is a characteristic p > 0 version of
[Kol11b, Theorem 3(1)] but also compare with [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21],
[AH11, Theorem 1.5] and [Kov11, Theorem 1.2, 1.5].
Theorem 3.8. (cf. [Kol11b, Theorem 3(1)]) Suppose that R is local, S2 and G1 , X = Spec R
and that 0 ≤ ∆ ∈ WDivR (X) is such that (R, ∆) is sharply F -pure. Set x ∈ X to be the
closed point and assume that x is not an F -pure center of (R, ∆). Suppose that 0 ≤ ∆′ ≤ ∆
is another element of WDivR (X) and that r∆′ is integral for some r > 0 relatively prime
to p. Further assume that M is any rank-1 (along each component of X) reflexive coherent
subsheaf of K(X) such that M (−r) ∼
= OX (r∆′ ) (here (·) denotes reflexive power).6 Then
depthx M ≥ min{3, codimX x} = min{3, dim R}.
Proof. First observe that it is harmless to assume that dim R ≥ 3 since otherwise the statement is trivial since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We may also assume
that M ⊆ OX is an ideal sheaf since we are working locally. We thus identify M with an
ideal of R also denoted by M . Finally, by replacing r by a power if necessary, we may assume
that r = pe − 1 for some e > 0.
Using Lemma 3.4, we can find ϕ a splitting, not compatible with m, making the following
composition an isomorphism:
ϕ
OX −
→ F∗e OX ֒→ F∗e OX ((pe − 1)∆′ ) ֒→ F∗e OX (⌈(pe − 1)∆⌉) −
→ OX .
Twisting by M and reflexifying (which we denote by
∗∗ ),
we obtain
M
e
−
→ F∗e (M (p −1) ⊗ M )∗∗
e
֒→ F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗
e
֒→ F∗e (OX (⌈(pe − 1)∆⌉) ⊗ M (p −1) ⊗ M )∗∗
ϕ
−−M
→ M.
Using the fact that (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
)∗∗ ∼
= OX , we have a composition
M−
→ F∗e M −
→M
that is an isomorphism (note the first map is not the usual inclusion of ideal sheaves via
Frobenius).
Certainly Hm1 (M ) = 0 since M is reflexive and thus S2 by [Har94, Theorem 1.9]. We now
study Hm2 (M ). Since M is S2 , it follows that either AnnR Hm2 (M ) is equal to R or it is mprimary by Lemma 2.13. Since we have an injection Hm2 (M ) −
→ Hm2 (F∗e M ), it follows that
e
2
2
p
AnnR Hm (M ) is at the very least radical (since if r kills Hm (M ), so does r). In particular,
if AnnR Hm2 (M ) 6= R, then it must be m.
6Note that it is also common to use the notation
confused with Frobenius power.
[·]
. We do not use that notation since it might be
10
ZSOLT PATAKFALVI AND KARL SCHWEDE
Fix [z] ∈ Hm2 (M ), and recall that we are considering M as an ideal. If zj ∈ Γ(U, M )7, then
since ∆′ ≥ 0 we have
e
e
zjp ∈ Γ(U, M (p ) ) ⊆ Γ U, (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
⊗ M )∗∗ .
Thus we have a class
e
[F∗e z p ] ∈ Hm2 F∗e (OX ((pe − 1)∆′ ) ⊗ M (p
e −1)
⊗ M )∗∗ .
e
Now, when we apply ϕM to this class, it is just applied component-wise. Thus ϕM ([F∗e z p ]) =
e
[z]. For any r ∈ m, it follows that ϕM ((F∗e r).[F∗e z p ]) = ϕ(F∗e r).[z]. In particular, if an
e
arbitrary F∗e r ∈ F∗e m annihilates all classes [y] ∈ Hm2 (F∗e (OX ((pe − 1)∆′ ) ⊗ M (p −1) ⊗ M )∗∗ ) ∼
=
Hm2 (F∗e M ), then ϕ(F∗e r) also annihilates all such [z] ∈ Hm2 (M ).
This proves that m is ϕ-compatible, a contradiction.
4. Applications
Here we list the most important corollaries of the results of Section 3. The characteristic
zero analog of many of them are already mentioned in [Kol11b]. We still state them here for
the sake of completeness and we give a full proof of our main motivation, the compatibility
of the relative canonical sheaf with base change. In Section 4.A some lemmas are gathered
while in Section 4.B the promised corollaries are presented.
4.A. Auxilliary results. In this section, we prove a series of lemmas culminating with a
base change statement for relative canonical sheaves for families with sharply F -pure fibers
Lemma 4.7.
4.A.1. Basic lemmas on depth and relative canonical sheaves. We begin with a short section
where we make note of some simple results on depth and relative canonical sheaves that we
will use.
Fact 4.1. [BH93, Theorem 1.2.5] Let F be a coherent sheaf on a Noetherian scheme X, H
a Cartier divisor on X containing a point P , such that the local equation of H at P is not a
zero divisor of FP (in other words, it is a regular element for Fp ). Then
(a) depth FP ≥ d ⇔ depth(F |H )P ≥ d − 1,
(b) depth FP ≥ min{d, dim FP } ⇔ depth(F |H )P ≥ min{d − 1, dim(F |H )P }.
Lemma 4.2. If f : X −→ Y is a morphism of Noetherian schemes, F 6= 0 is a coherent
sheaf on X flat over Y , such that F |Xy is Sd for every y ∈ Y (i.e., F is relatively Sd over
Y ) and G 6= 0 is an Sd coherent sheaf on Y , then F ⊗ f ∗ G is Sd as well.
7Here U = X \ {x}, and local cohomology classes are treated as Čech classes on U as explained earlier.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
11
Proof. Fix an arbitrary P ∈ X and set Q := f (P ) and F := XQ . Then
depthOX,P (F ⊗ f ∗ G )P
= depthOF,P (F |F )P + depthOY,Q GQ
|
{z
}
F is flat over Y & [Gro65, Proposition 6.3.1]
≥ min d, dimOF,P (F |F )P
{z
|
F |F is Sd
+ depthOY,Q GQ
}
= min d + depthOY,Q GQ , dimOF,P (F |F )P + depthOY,Q GQ
≥ min d + depthOY,Q GQ , dimOF,P (F |F )P + min{d, dimOY,Q GQ }
|
{z
}
G is Sd
= min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOF,P (F |F )P + dimOY,Q GQ }
= min d + depthOY,Q GQ , min{dimOF,P (F |F )P + d, dimOX,P (F ⊗ f ∗ G )P }
|
{z
}
F is flat over Y and [Gro65, Corollaire 6.1.2]
≥ min d + depthOY,Q GQ , min{d, dimOX,P (F ⊗ f ∗ G )P }
≥ min d, dimOX,P (F ⊗ f ∗ G )P .
Lemma 4.3. If f : X −→ Y is a flat morphism of finite type to a Gorenstein scheme, then
q
q
ωX/Y and ωX [− dim Y ] are locally isomorphic. In particular if X is relatively Gorenstein over
Y , then it is Gorenstein, and ωX/Y and ωX are locally isomorphic over Y .
Proof. Locally on Y the following isomorphisms hold.
q
q
q
ωX/Y = f ! OY ∼
= ωX [− dim Y ]
= f ! ωY ∼
= f ! ωY [− dim Y ] ∼
Before continuing, let us remind ourselves of how F -adjunction works and how it can allow
us to restrict divisors.
4.A.2. Restricting divisors by F -adjunction: the F -different. Suppose that ∆ ≥ 0 is a Qdivisor on an S2 and G1 variety X and that (pe − 1)(KX + ∆) is Cartier. In fact, everything
we say even holds more generally if ∆ ≥ 0 is a Z(p) -Weil divisorial sheaf, which is intuitively
something like a Weil divisor having components also in the singular locus8. Further suppose
that D is a reduced Cartier divisor on X that is itself S2 and G1 and which has no common
components with ∆. We now explain how we can construct a canonical Z(p) -Weil divisorial
sheaf (not necessarily a Z(p) -Weil divisor) which we call Diff F,D ∆ on D. Here the subindex
F means that this is the F -singularity counterpart of the usual different known from minimal model program theory. However, contrary to the usual different, the construction of
Dif fF,D ∆ goes through without any further assumption requiring that ∆ is Q-Cartier at
certain points.
Without loss of generality we can assume that X = Spec R and that R is a local ring
and that D = V (f ). The fact that the divisor (pe − 1)(KX + ∆) is Cartier implies that
HomR (F∗e R((pe − 1)∆), R) is a free F∗e R-module. Choose a generator of this module ϕ, which
8See [K+92] and [MS12] for definitions, in the latter source these are called Z -AC-divisors.
(p)
12
ZSOLT PATAKFALVI AND KARL SCHWEDE
we can also view as an element of HomR (F∗e R, R) since ∆ is effective. Now define a new map
e
e
ψ : F∗e R −
→ R by the rule ψ(F∗e ) = ϕ(F∗e (f p −1 · )). Certainly ψ(F∗e hf i) = ϕ(F∗e hf p i) ⊆
hf i and thus ψ induces a map ψ ∈ HomR/hf i (F∗e R/hf i, R/hf i).
Note that for every height one prime η containing f ∈ R, i.e., a minimal associated prime
of D, we have that ∆η = 0 (since ∆ and D have no common components). Furthermore, Rη
is regular (since Rη /hf i is reduced and zero dimensional and hence regular). It follows from
inspection that ψ is non-zero at every such η. By [MS12, Theorem 2.4], it follows that ψ
induces an effective Z(p) -Weil divisorial sheaf on D. It is straightforward to verify that ∆|D
is independent of the choice of e and ϕ and so:
Definition 4.4. We use Diff F,D ∆ to denote the effective Z(p) -Weil divisorial sheaf described
above which coincides with ψ.
We also observe:
Observation 4.5 (F -adjunction [Sch09]). Notice now additionally that ψ (corresponding to
Diff F,D ∆) is surjective if and only if ψ (corresponding to ∆+D) is surjective. In other words,
(X, ∆ + D) is sharply F -pure near D if and only if (D, Diff F,D ∆) is sharply F -pure.
It will be useful for us to note that if (D, Diff F,D ∆) is sharply F -pure, then Diff F,D ∆
is in fact an honest Z(p) -Weil divisor and not just a Z(p) -divisorial sheaf. Suppose not, then
the Weil divisorial sheaf (pe − 1)(Diff F,D ∆) must properly contain OD , even at some generic
point of the non-normal locus. A contradiction can then be obtained from the fact that the
conductor is already compatible with every ϕ ∈ C R (this last fact follows from the argument
of [BK05, Proposition 1.2.5]).
The above introduced F -different Diff F,D ∆ is equal to ∆|D in most cases when the latter
is defined.
Lemma 4.6. With the notation above, suppose additionally that ∆ is Z(p) -Cartier at all of
the height-two primes primes of R containing f (the codimension 2 points of X that are
contained inside D). Then Diff F,D ∆ coincides with the restriction ∆|D of ∆ to D.
Proof. At each of those codimension 2 points q ∈ Spec R, Rq is already Gorenstein (since
R/hf i is G1 and so Rq /hf i is Gorenstein). It is enough to prove the result at each such q,
so fix one such q. Further choose e > 0 as above and also sufficiently divisible such that
(pe − 1)D is Cartier at q. We can thus write (pe − 1)∆ = divSpec Rq (g) for some g ∈ Rq .
Since Rq is Gorenstein, we can choose Φ ∈ HomRq (F∗e Rq , Rq ) generating the set as an F∗e Rq e
→ Rq defined by the rule Ψ(F∗e ) = Φ(F∗e (f p −1 · )).
module. Consider the map Ψ : F∗e Rq −
Certainly Ψ restricts to a map Ψ ∈ HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) as above. Furthermore, Ψ
generates the F∗e (Rq /hf i)-module HomRq /hf i (F∗e (Rq /hf i), Rq /hf i) by the diagrams in [Sch09,
Proof of Proposition 7.2]. It follows that ψ = (F∗e g) · Ψ restricts to ϕ = (F∗e g) · Ψ and hence
corresponds to the naive restriction ∆|W . This proves the lemma.
4.A.3. The relative canonical sheaf. We apply the above ideas on F -different to the following.
It is the inductional step in the proof of Corollary 4.13.
Lemma 4.7. Let f : X −→ Y be a flat morphism of finite type with S2 , G1 equidimensional
fibers to a smooth variety9 Y and ∆ ∈ WDivQ (X), such that KX + ∆ is Q-Cartier and
p 6 | ind(KX + ∆). Assume also that Z ⊆ Y is a smooth Cartier divisor such that for
W := X ×Y Z, ∆ does not contain any component of W and (W, Diff F,W ∆) is sharply
F -pure.10 Then ωX/Y |W ∼
= ωW/Z .
9Variety here means a separated, integral scheme of finite type over an algebraically closed base-field.
10The fact that (W, Diff
F,W ∆) is sharply F -pure implies that Diff F,W ∆ is a Z(p) -divisor and not simply a
Z(p) -Weil divisorial sheaf.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
13
Proof. By Lemma 4.2, both X and W are S2 . Similarly, both are G1 by Lemma 4.3. By F adjunction Observation 4.5, cf. [Sch09, Main Theorem, Proposition 7.2, Remark 7.3], (X, ∆+
W ) is sharply F -pure in a neighborhood of W . Hence, so is (X, ∆). We now claim:
Claim 4.8. No F -pure center of (X, ∆) is contained in W .
Proof of claim. Suppose that Z ⊆ X was an F -pure center of (X, ∆) contained in W . Let
η denote the generic point of Z and now we work in R = OX,η with maximal ideal m
→ OX,η of [C ∆ ]e , we
corresponding to η. For any element ϕ : F∗e OX,η ⊆ F∗e OX,η (⌈(pe −1)∆⌉) −
e
notice that ϕ(F∗ m) ⊆ m since Z is an F -pure center. Choose f ∈ m to be the defining equation
e
of the Cartier divisor W in OX,η . It follows from construction that (F∗e f p −1 ) · [C ∆ ]e =
e
[C ∆+W ]e . In other words, for any ψ ∈ [C ∆+W ]e , we can write ψ(F∗e ) = ϕ(F∗e (f p −1 · ))
e
for some ϕ ∈ [C ∆ ]e . With this notation, for any r ∈ R we have ψ(F∗e r) = ϕ(F∗e (f p −1 r)) ∈
ϕ(F∗e m) ⊆ m. This proves that (X, ∆ + W ) is not sharply F -pure at η, the generic point of
Z. But we assumed that (X, ∆ + W ) was sharply F -pure, a contradiction which proves the
claim.
We return to the proof of Lemma 4.7. By Theorem 3.8 then, for every x ∈ W ,
depthx ωX ≥ min{3, codimX x} = min{3, dim ωX,x }.
However, by Lemma 4.3, ωX and ωX/Y are isomorphic locally, and then in the above inequality ωX can be replaced by ωX/Y . Then by Fact 4.1, ωX/Y |W is S2 . To be precise, to apply
Fact 4.1, one needs to prove a priori that the local equation of W is not a zero-divisor of ωX/Y .
For this it is enough to show that ωX/Y is S1 , which follows using again that locally ωX/Y
and ωX are isomorphic and that ωX is S2 by [KM98, Corollary 5.69]. Therefore ωX/Y |W is S2
indeed. However, so is ωW/Z by using [KM98, Corollary 5.69] again. Furthermore, ωX/Y |W
and ωW/Z are isomorphic on the relative Gorenstein locus, since the relative canonical sheaf
is compatible with base-change for Gorenstein morphisms [Con00, Theorem 3.6.1]. Therefore
[Har94, Theorems 1.9 and 1.12] yields the statement of the lemma.
The next lemma is used in Corollary 4.15. It allows us to cite [Kol11a].
Lemma 4.9. Suppose that Y is a scheme of finite type over an algebraically closed field. If
f : X −→ Y is a projective, flat, relatively S2 and G1 , equidimensional morphism, then ωX/Y
is reflexive.
Proof. According to [HK04, Corollary 3.7], it is enough to exhibit an open set U contained
in the relative Gorenstein locus, such that
(a) for Z := X \ U , codimXy Zy ≥ 2 for every y ∈ Y and
(b) for the inclusion of open set j : U ֒→ X, the natural homomorphism ωX/Y −
→
j∗ (ωX/Y |U ) is an isomorphism.
Let W be the non-relatively Gorenstein locus. Fix a finite surjective morphism π : X −
→ PnY
over Y , after possibly shrinking Y (cf. [Kol11b, proof of Corollary 24]). Set then Z :=
π −1 (π(W )), V := PnY \ π(W ). Let q : V −
→ PnY be the natural inclusion. With the above
choices, codimXy Zy ≥ 2 is satisfied for all y ∈ Y . For the other condition, notice that it
is enough to prove that the natural homomorphism π∗ ωX/Y −
→ π∗ j∗ (ωX/Y |U ) is an isomorphism. However
π∗ j∗ (ωX/Y |U ) ∼
= q∗ ((π∗ ωX/Y )|V ) ∼
= q∗ Hom V ((π∗ OX )|V , ωV /Y )
{z
}
|
Grothendieck duality
∼
= Hom X (π∗ OX , q∗ ωV /Y ) ∼
=
|
{z
}
adjoint functors
Hom X (π∗ OX , ωPn /Y )
|
{z
Y
}
[HK04, Proposition 3.5] using that
ωPn /Y is flat and relatively S2
Y
∼
= π∗ ωX/Y ,
14
ZSOLT PATAKFALVI AND KARL SCHWEDE
and the composition of the above isomorphisms is the natural homomorphism π∗ ωX/Y −
→
π∗ j∗ (ωX/Y |U ).
4.B. Consequences.
We begin with a simple consequence on the depth of OX and ωX .
Corollary 4.10. (cf. [Ale08, Lemma 3.2], [Fuj09, Theorem 4.21], [Kol11b, 4.1, 4.2, 4.3],
[AH11, Theorem 1.5], [Kov11, Theorem 1.2, 1.5]) Suppose that X = Spec R is S2 and G1 . If
X is F -pure and x ∈ X is not an F -pure center of X, then
depthx OX ≥ {3, codimX x} and depthx ωX ≥ min{3, codimX x}.
Proof. We may assume that X = Spec R for a local ring (R, m) with x = V (m). Since X
is S2 and G1 , by using Remark 3.5, we can assume that there exists some ∆ ≥ 0 such that
(pe − 1)(KX + ∆) is Cartier, such that (X, ∆) is sharply F -pure and such that x is not
an F -pure center of (X, ∆). Now the second statement follows from Theorem 3.8 by setting
M = OX (KX ) and setting ∆′ = ∆. The first statement also follows from Theorem 3.8 by
setting M = OX and ∆′ = 0.
Question 4.11. Suppose that (R, m) is F -injective. If m is not an annihilator of any F -stable
submodule of Hmi (R), does that imply any depth conditions on R or ωR ?
To prove our main corollary, we need to introduce a generalization of Diff F,D ∆ to the case
when D has higher codimension. We focus only on our case of interest, that is, when D is
the fiber over a smooth base.
Definition 4.12. Let f : X −
→ Y be a flat morphism of finite type with S2 , G1 equidimensional fibers. Further suppose that Y is a smooth variety, and ∆ ∈ WDivQ (X) is such that
∆ does not contain any component of any fiber. Fix a point y ∈ Y . Working locally, we may
assume that Y = Spec A and X = Spec R for local rings (A, n) and (R, m). Further assume
that n = hf1 , . . . , fn i is regular system of generators with Yi = V (f1 , . . . , fi ) regular. Then,
let ∆i := Diff F,Yi ∆i−1 and define then Diff F,Xy ∆ := ∆n .
The only question is whether this construction of Diff F,Xy ∆ is independent of the choice of
fi . Following the method of F -adjunction, multiplying by each fi successively, we take a map
corresponding to ∆ and ϕ : F∗e R −
→ R and obtain another map ψf : F∗e R −
→ R defined by
e
e
e
the rule ψf (F∗ ) = ϕ(F∗ ((f1 · · · fn )p −1 · )). We then restrict this map to Xy by modding
out by n and so obtain ψ f .
Choosing different Yi ’s is simply choosing a different set of generators {g1 , . . . , gn } for n
which yields ψ g . To complete the proof of the claim, it is sufficient to show that these maps
e
differ only by multiplication by a unit. We use n[p ] to denote the ideal generated by the pe th
e
e
e
e
e
powers of the generators of n. Since n[p ] : n = h(f1 · · · fn )p −1 i+n[p ] = h(g1 · · · gn )p −1 i+n[p ] ,
e
e
see for example [Fed83, Proposition 2.1], it follows that (f1 · · · fn )p −1 = u(g1 · · · gn )p −1 +
P
e
vi hpi for some unit u ∈ A, elements vi ∈ A and hi ∈ n. But now we see that ψ f = (F∗e u)·ψ g
e
since any multiple of hpi will be sent into nR. This completes the proof.
Corollary 4.13. (cf. [Kol11b, 4.3]) Let f : X −→ Y be a flat morphism of finite type with
S2 , G1 , equidimensional fibers to a smooth variety and let ∆ ∈ WDivQ (X) be such that it
does not contain any component of any fiber. Additionally assume that KX + ∆ is Q-Cartier,
p 6 | ind(KX + ∆) and (Xy , Diff F,Xy ∆) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat
over Y and compatible with arbitrary base change.
Proof. We claim that ωX/Y is flat over Y and relatively S2 . By [BHPS12, Lemma 2.13],
flatness follows as soon as we prove that the restriction of ωX/Y to every fiber is S1 . On
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
15
the other hand relatively S2 means the stronger condition that the above restrictions are S2 .
Therefore to show the claim, it is enough to prove that ωX/Y |Xy is S2 for every y ∈ Y . By
[KM98, Corollary 5.69], ωXy is S2 and hence, it is enough to show that ωX/Y |Xy ∼
= ωXy locally
around every point x ∈ Xy . We thus replace both X and Y by Spec OX,x and Spec OY,y ,
respectively. Therefore, we may assume that there is a sequence of smooth subvarieties:
Y = Y0 ⊇ Y1 ⊇ · · · ⊇ Ym−1 ⊇ Ym = {y}, such that Yi−1 is a Cartier divisor in Yi . Set
Xi := XYi and ∆i := Diff F,Xi ∆i−1 with ∆0 = ∆. Note that then Deltam = Diff F,Xy ∆.
By applying Observation 4.5 (backwards) inductively and possibly further restricting X
around x, one obtains that (Xi , ∆i + Xi−1 ) and hence (Xi , ∆i ) is sharply F -pure for all i
(in fact, this also implies all the Z(p) -Weil divisorial sheaves ∆i are honest divisors). Finally,
applying Lemma 4.7 inductively again yields that ωXi /Yi |Xi−1 ∼
= ωXi−1 /Yi−1 for all i, and
consequently ωX/Y |Xy ∼
= ωXy . This finishes the proof of our claim.
By our claim and [HK04, Corollary 3.8] ωX/Y and all its pullbacks are reflexive. Hence, by
restricting to the relatively Cohen-Macaulay locus (whose complement has codimension ≥ 2)
and using [HK04, Proposition 3.6], for any morphism Z −
→ Y , ωXZ /Z ∼
= (ωX/Y )Z .
Remark 4.14. By Lemma 4.6, the appearance of Diff F,Xy ∆ can be replaced by an actual
“geometric” restriction, if we assume the following:
(1)
for each y ∈ Y , there is some r > 0 relatively prime to p such that r∆ is
Cartier at the codimension 1 points of the fiber Xy ⊆ X.
In particular, this is satisfied if Supp ∆ does not contain the singular codimension one points
of the fibers. Indeed, let ξ be a codimesnion 1 point of a fiber Xy . If ξ is in the singular locus
of Xy , then ξ 6∈ Supp ∆ and hence ∆ is Cartier at ξ. Otherwise, X is smooth around ξ, and
hence KX is Cartier at ξ. In particular then by p 6 | ind(KX + ∆), we obtain that ∆ is Z(p)
Cartier at ξ. In either cases ∆ satisfies (1), and therefore in the special case of Corollary 4.13
stated in Section 1, the use of ordinary restriction of ∆ was legitimate.
When f is projective, the compatibility of Corollary 4.13 follows for arbitrary reduced base
by an important result of Kollár [Kol11a].
Corollary 4.15. Let f : X −→ Y be a flat projective morphism with S2 , G1 equidimensional
fibers. Further suppose that Y is a reduced, separated scheme of finite type over an algebraically
closed field, and ∆ a Q-Weil-divisor that avoids all the codimension zero and the singular
codimension one points of the fibers. Additionally assume that there is a p 6 | N > 0, such
[N ]
that N ∆ is Cartier in relative codimension one and ωX/Y (N ∆) 11 is a line bundle and that
(Xy , ∆y ) is sharply F -pure for every y ∈ Y . Then ωX/Y is flat and compatible with arbitrary
base change.
Proof. First, we need some preparation about pulling back ∆. Suppose τ : Y ′ −
→ Y is a
′
′
′
′
′
′
morphism and set X := X ×Y Y , π : X −
→ X, and f : X −
→ Y the induced morphisms.
Then a natural pullback ∆′ of ∆ can be defined as follows. Let U ⊆ X be the open set
where f is Gorenstein and ∆ is Q-Cartier. Then, pull ∆|U back to π −1 U , and finally extend
it uniquely over X ′ . This extension is unique, since codimX ′ X ′ \ π −1 U ≥ 2. We claim that
(2)
[N ]
[N ]
π ∗ ωX/Y (N ∆) ∼
= ωX ′ /Y ′ (N ∆′ ).
11 Let U be the intersection of the relative Gorenstein locus and the locus where N ∆ is Cartier. Set
[N]
N
ι : U −→ X for the natural inclusion. The sheaf ωX/Y (N ∆) is the reflexive hull of ωU/Y
(N ∆|U ), i.e. the
N
unique reflexive sheaf that restricts on U to the above sheaf. It can be obtained as ι∗ (ωU/Y (N ∆|U )). Indeed,
N
ι∗ (ωU/Y
(N ∆|U )) is reflexive by [HK04, Corollary 3.7] and it is unique by [HK04, Proposition 3.6].
16
ZSOLT PATAKFALVI AND KARL SCHWEDE
[N ]
[N ]
Indeed, notice that by construction π ∗ ωX/Y (N ∆) and ωX ′ /Y ′ (N ∆′ ) agree over π −1 U , that
[N ]
is, in relative codimension one. Notice also that since ωX/Y (N ∆) is assumed to be a line
[N ]
[N ]
bundle, so is π ∗ ωX/Y (N ∆), and therefore π ∗ ωX/Y (N ∆) is reflexive. On the other hand, since
[N ]
ωX ′ /Y ′ (N ∆′ ) is defined as a pushforward of a line bundle from relative codimension one,
it is reflexive by [HK04, Corollary 3.7]. Therefore by [HK04, Proposition 3.6], (2) holds. In
[N ]
particular, ωX ′ /Y ′ (N ∆′ ) is a line bundle.
The main consequence of the previous paragraph, is that the conditions of the corollary
are invariant under pullback to another reduced, separated scheme Y ′ of finite type over k.
That is, X ′ , f ′ and ∆′ defined above satisfy all the assumptions of the corollary. Let us turn
now to the actual proof of the corollary. First, we may assume that Y is connected. Second,
according to [Kol11a, Corollary 24] and Lemma 4.9, there is a locally closed decomposition
∐Yi −
→ Y , such that if T −
→ Y , then ωXT /T is flat and commutes with base-change if and
only if T −
→ Y factors through some Yi −
→ Y . Now, for every irreducible component Y ′ of Y ,
→S
there is a regular alteration S −
→ Y ′ [dJ96, Thorem 4.1]. By the above discussion XS −
satisfies the assumptions of the corollary, and hence also of Corollary 4.13. Therefore, ωXS /S
is flat and compatible with arbitrary base-change. Hence S −
→ Y factors through one of the
Yi . In particular, since the image of S −
→ Y is the component Y ′ , Y ′ ⊆ Yi . That is, every
irreducible component of Y is contained in one Yi . However, Y is connected, therefore all
irreducible components of Y are contained in the same Yi , and hence by the reducedness of
Y , Yi = Y .
Remark 4.16. In the case of dim Y = 1, if instead of assuming that Xy is sharply F -pure,
one assumes that (X, Xy ) is F -pure for all y ∈ Y , the p 6 | ind(KX + ∆) assumption can be
dropped from the above corollaries using the trick of Lemma 2.12.
Question 4.17. Does the compatibility of the relative canonical sheaf with base change stated
in Corollary 4.13 hold for singular Y (with the adequate modification in the setup as in
Corollary 4.15)? From the modular point of view, especially interesting would be the case of
non-reduced Y . This case is open even in the projective case.
Remark 4.18. It should be noted that the characteristic zero analogue of Corollary 4.13 is
known if f is projective and Y is arbitrary [KK10, Theorem 7.9]. That is, the answer to the
characteristic zero analogue of Question 4.17 is positive when f is projective.
Question 4.19. Can one replace sharply F -pure by log-canonical (still assuming positive
characteristic) in the statement of Corollary 4.13? This would also be important from the
modular point of view, since sharply F -pure varieties can be deformed to log-canonical but
not sharply F -pure varieties.
Question 4.20. Can one remove the divisibility by p condition from the statement of Corollary 4.13?
Remark 4.21. [Kol11b, 4.10] The sheaf OX (−D) in Theorem 3.1 and Theorem 3.8 cannot be
replaced by OX (D) as shown in [Kol11b]. We refer to [Kol11b] for the actual example.
References
[AE05]
I. M. Aberbach and F. Enescu: The structure of F -pure rings, Math. Z. 250 (2005), no. 4,
791–806. MR2180375
[Ale08]
V. Alexeev: Limits of stable pairs, Pure Appl. Math. Q. 4 (2008), no. 3, Special Issue: In honor
of Fedor Bogomolov. Part 2, 767–783. 2435844 (2009j:14020)
[AH11]
V. Alexeev and C. Hacon: Non-rational centers of log canonical singularities, arXiv:1109.4164.
[BHPS12] B. Bhatt, W. Ho, Zs. Patakfalvi, and C. Schnell: Moduli of products of stable varieties,
arXiv:1206.0438.
DEPTH OF F -SINGULARITIES AND BASE CHANGE OF RELATIVE CANONICAL SHEAVES
[Bli09]
[BST11]
[BK05]
17
M. Blickle: Test ideals via algebras of p−e -liner maps, arXiv:0912.2255, to appear in J. Algebraic
Geom.
M. Blickle, K. Schwede, and K. Tucker: F -signature of pairs and the asymptotic behavior of
Frobenius splittings, arXiv:1107.1082.
M. Brion and S. Kumar: Frobenius splitting methods in geometry and representation theory, Progress in Mathematics, vol. 231, Birkhäuser Boston Inc., Boston, MA, 2005. MR2107324
(2005k:14104)
[BH93]
[Con00]
[dJ96]
[EH08]
[Fed83]
W. Bruns and J. Herzog: Cohen-Macaulay rings, Cambridge Studies in Advanced Mathematics,
vol. 39, Cambridge University Press, Cambridge, 1993. MR1251956 (95h:13020)
B. Conrad: Grothendieck duality and base change, Lecture Notes in Mathematics, vol. 1750,
Springer-Verlag, Berlin, 2000. MR1804902 (2002d:14025)
A. J. de Jong: Smoothness, semi-stability and alterations, Inst. Hautes Études Sci. Publ. Math.
(1996), no. 83, 51–93. 1423020 (98e:14011)
F. Enescu and M. Hochster: The Frobenius structure of local cohomology, Algebra Number
Theory 2 (2008), no. 7, 721–754. MR2460693 (2009i:13009)
R. Fedder: F -purity and rational singularity, Trans. Amer. Math. Soc. 278 (1983), no. 2, 461–480.
MR701505 (84h:13031)
[Fuj09]
[Gab04]
[Gro65]
O. Fujino: Introduction to the log minimal model program for log canonical pairs, arXiv:0907.1506.
O. Gabber: Notes on some t-structures, Geometric aspects of Dwork theory. Vol. I, II, Walter de
Gruyter GmbH & Co. KG, Berlin, 2004, pp. 711–734.
A. Grothendieck: Éléments de géométrie algébrique. IV. Étude locale des schémas et des morphismes de schémas. II, Inst. Hautes Études Sci. Publ. Math. (1965), no. 24, 231. 0199181 (33
#7330)
[HK10]
[HW02]
[Har66]
[Har94]
[HK04]
[HR76]
[Kol87]
C. D. Hacon and S. J. Kovács: Classification of higher dimensional algebraic varieties, Oberwolfach Seminars, vol. 41, Birkhäuser Verlag, Basel, 2010. 2675555 (2011f:14025)
N. Hara and K.-I. Watanabe: F-regular and F-pure rings vs. log terminal and log canonical
singularities, J. Algebraic Geom. 11 (2002), no. 2, 363–392. MR1874118 (2002k:13009)
R. Hartshorne: Residues and duality, Lecture notes of a seminar on the work of A. Grothendieck,
given at Harvard 1963/64. With an appendix by P. Deligne. Lecture Notes in Mathematics, No.
20, Springer-Verlag, Berlin, 1966. MR0222093 (36 #5145)
R. Hartshorne: Generalized divisors on Gorenstein schemes, Proceedings of Conference on Algebraic Geometry and Ring Theory in honor of Michael Artin, Part III (Antwerp, 1992), vol. 8, 1994,
pp. 287–339. MR1291023 (95k:14008)
B. Hassett and S. J. Kovács: Reflexive pull-backs and base extension, J. Algebraic Geom. 13
(2004), no. 2, 233–247. MR2047697 (2005b:14028)
M. Hochster and J. L. Roberts: The purity of the Frobenius and local cohomology, Advances
in Math. 21 (1976), no. 2, 117–172. MR0417172 (54 #5230)
J. Kollár: Subadditivity of the Kodaira dimension: fibers of general type, Algebraic geometry,
Sendai, 1985, Adv. Stud. Pure Math., vol. 10, North-Holland, Amsterdam, 1987, pp. 361–398.
MR946244 (89i:14029)
[Kol90]
J. Kollár: Projectivity of complete moduli, J. Differential Geom. 32 (1990), no. 1, 235–268. 1064874
(92e:14008)
[Kol11a]
[Kol11b]
[K+92]
J. Kollár: Hulls and husks, arXiv:0805.0576.
J. Kollár: A local version of the Kawamata-Viehweg vanishing theorem, Pure Appl. Math. Q. 7
(2011), no. 4, Special Issue: In memory of Eckart Viehweg, 1477–1494. 2918170
J. Kollár and 14 coauthors: Flips and abundance for algebraic threefolds, Société Mathématique
de France, Paris, 1992, Papers from the Second Summer Seminar on Algebraic Geometry held at
the University of Utah, Salt Lake City, Utah, August 1991, Astérisque No. 211 (1992). MR1225842
(94f:14013)
[KK10]
[KM98]
[Kov11]
[Kun76]
J. Kollár and S. J. Kovács: Log canonical singularities are Du Bois, J. Amer. Math. Soc. 23
(2010), no. 3, 791–813. 2629988
J. Kollár and S. Mori: Birational geometry of algebraic varieties, Cambridge Tracts in Mathematics, vol. 134, Cambridge University Press, Cambridge, 1998, With the collaboration of C. H.
Clemens and A. Corti, Translated from the 1998 Japanese original. MR1658959 (2000b:14018)
S. Kovács: Irrational centers, Pure Appl. Math. Q. 7 (2011), no. 4, Special Issue: In memory of
Eckart Viehweg, 1495–1515. 2918171
E. Kunz: On Noetherian rings of characteristic p, Amer. J. Math. 98 (1976), no. 4, 999–1013.
MR0432625 (55 #5612)
18
ZSOLT PATAKFALVI AND KARL SCHWEDE
[MS12]
[Pat10]
[Ray78]
[Sch09]
[Sch10]
[Sch11]
[SS10]
[Tak08]
L. E. Miller and K. Schwede: Semi-log canonical vs F -pure singularities, J. Algebra 349 (2012),
150–164. 2853631
Zs. Patakfalvi: Base change behavior of the relative canonical sheaf related to higher dimensional
moduli, arXiv:1005.5207, to appear in Algebra Number Theory.
M. Raynaud: Contre-exemple au “vanishing theorem” en caractéristique p > 0, C. P.
Ramanujam—a tribute, Tata Inst. Fund. Res. Studies in Math., vol. 8, Springer, Berlin, 1978,
pp. 273–278. 541027 (81b:14011)
K. Schwede: F -adjunction, Algebra Number Theory 3 (2009), no. 8, 907–950. 2587408 (2011b:14006)
K. Schwede: Centers of F -purity, Math. Z. 265 (2010), no. 3, 687–714. 2644316 (2011e:13011)
K. Schwede: Test ideals in non-Q-Gorenstein rings, Trans. Amer. Math. Soc. 363 (2011), no. 11,
5925–5941.
K. Schwede and K. E. Smith: Globally F -regular and log Fano varieties, Adv. Math. 224 (2010),
no. 3, 863–894. 2628797 (2011e:14076)
S. Takagi: A characteristic p analogue of plt singularities and adjoint ideals, Math. Z. 259 (2008),
no. 2, 321–341. MR2390084 (2009b:13004)
Department of Mathematics, Princeton University, Princeton, NJ, 08542, USA
E-mail address: [email protected]
Department of Mathematics, The Pennsylvania State University, University Park, PA, 16802,
USA
E-mail address: [email protected]
| 0 |
A Unified View of Entropy-Regularized
Markov Decision Processes
Gergely Neu
[email protected]
arXiv:1705.07798v1 [cs.LG] 22 May 2017
Universitat Pompeu Fabra, Barcelona, Spain
Vicenç Gómez
[email protected]
Universitat Pompeu Fabra, Barcelona, Spain
Anders Jonsson
[email protected]
Universitat Pompeu Fabra, Barcelona, Spain
Abstract
We propose a general framework for entropy-regularized average-reward reinforcement learning in Markov decision processes (MDPs). Our approach is based on
extending the linear-programming formulation of policy optimization in MDPs to
accommodate convex regularization functions. Our key result is showing that using
the conditional entropy of the joint state-action distributions as regularization yields
a dual optimization problem closely resembling the Bellman optimality equations.
This result enables us to formalize a number of state-of-the-art entropy-regularized
reinforcement learning algorithms as approximate variants of Mirror Descent or Dual
Averaging, and thus to argue about the convergence properties of these methods. In
particular, we show that the exact version of the TRPO algorithm of Schulman et al.
(2015) actually converges to the optimal policy, while the entropy-regularized policy
gradient methods of Mnih et al. (2016) may fail to converge to a fixed point. Finally,
we illustrate empirically the effects of using various regularization techniques on
learning performance in a simple reinforcement learning setup.
1. Introduction
Reinforcement learning is the discipline of model-based optimal sequential decisionmaking in unknown stochastic environments. In average-reward reinforcement learning,
the goal is to find a behavior policy that maximizes the long-term average reward,
taking into account the effect of each decision on the future evolution of the decisionmaking process. In known environments, this optimization problem has been studied
(at least) since the influential work of Bellman (1957) and Howard (1960): the optimal
behavior policy can be formulated as the solution of the Bellman optimality equations.
In unknown environments with partially known or misspecified models, greedily
solving these equations often results in policies that are far from optimal in the true
environment. Rooted in statistical learning theory (Vapnik, 2013), the notion of
Neu Gómez Jonsson
regularization offers a principled way of dealing with this issue, among many others.
In particular, entropy regularization has proven to be one of the most successful tools
of machine learning and related fields (Littlestone and Warmuth, 1994; Vovk, 1990;
Freund and Schapire, 1997; Kivinen and Warmuth, 2001; Arora et al., 2012).
The idea of entropy regularization has also been used extensively in the reinforcement learning literature (Sutton and Barto, 1998; Szepesvári, 2010). Entropyregularized variants of the classic Bellman equations and the entailing reinforcementlearning algorithms have been proposed to induce safe exploration (Fox et al., 2016) and
risk-sensitive policies (Howard and Matheson, 1972; Marcus et al., 1997; Ruszczyński,
2010), or to model observed behavior of imperfect decision-makers (Ziebart et al., 2010;
Ziebart, 2010; Braun et al., 2011), among others. Complementary to these approaches
rooted in dynamic programming, another line of work proposes direct policy search
methods attempting to optimize various entropy-regularized objectives (Williams and
Peng, 1991; Peters et al., 2010; Schulman et al., 2015; Mnih et al., 2016; O’Donoghue
et al., 2017), with the main goal of driving a safe online exploration procedure in an
unknown Markov decision process. Notably, the state-of-the-art methods of Mnih
et al. (2016) and Schulman et al. (2015) are both based on entropy-regularized policy
search.
In this work, we connect these two seemingly disparate lines of work by showing a
strong Lagrangian duality between the entropy-regularized Bellman equations and
a certain regularized average-reward objective. Specifically, we extend the linearprogramming formulation of the problem of optimization in MDPs to accommodate
convex regularization functions, resulting in a convex program. We show that using the
conditional entropy of the joint state-action distribution gives rise to a set of nonlinear
equations resembling the Bellman optimality equations. Observing this duality enables
us to establish a connection between regularized versions of value and policy iteration
methods (Puterman and Shin, 1978) and incremental convex optimization methods
like Mirror Descent (Nemirovski and Yudin, 1983; Beck and Teboulle, 2003) or Dual
Averaging (Xiao, 2010; McMahan, 2014; Hazan et al., 2016; Shalev-Shwartz, 2012). For
instance, the convex-optimization view we propose reveals that the TRPO algorithm
of Schulman et al. (2015) and the regularized policy-gradient method of Mnih et al.
(2016) are approximate versions of Mirror Descent and Dual Averaging, respectively,
and that both can be interpreted as regularized policy iteration methods.
Our work provides a theoretical justification for various algorithms that were first
derived heuristically. In particular, our framework reveals that the exact version of
TRPO is identical to the MDP-E algorithm of Even-Dar et al. (2009). This establishes
the fact that the policy updates of TRPO converge to the optimal policy, improving
on the theoretical results claimed by Schulman et al. (2015). We also argue that our
formulation is useful for pointing out possible inconsistencies of heuristic learning
algorithms. In particular, we show that the approximation steps employed by Mnih
et al. (2016) may break the convexity of the objective, thus possibly leading to
convergence to bad local optima or even divergence. This observation is in accordance
2
A unified view of entropy-regularized MDPs
with the very recent findings of Asadi and Littman (2016), who show that value iteration
with poorly chosen approximate updates may lead to divergence. To complement
these results, we suggest an alternative objective that can be optimized consistently,
avoiding the possibility of diverging.
A similar Lagrangian duality between the Bellman equations and entropy maximization has been previously noted by Ziebart (2010, Sec. 5.2) and Rawlik et al. (2012)
for a special class of episodic Markov decision processes where the time index within
the episode is part of the state representation. In this particular setting, the convexity
of the conditional entropy is more obvious. One of our key observations is pointing
out the convexity of the conditional entropy of distribution functions defined over
general state spaces, which enables us to develop a much broader theory of regularized
Markov decision processes. We note that our theory also readily extends to discounted
MDPs by replacing the stationary state-action distributions we consider by discounted
state-action occupancy measures. For consistency, we will discuss each particular
algorithm in their most natural average-reward version, noting that all conclusions
remain valid in the simpler discounted and episodic settings.
The rest of the paper is organized as follows. In Section 2, we provide background on
average-reward Markov decision processes, briefly discussing both linear-programming
and dynamic-programming derivations of the optimal control. In Section 3, we provide
a convex-programming formulation of regularized average-reward Markov decision
processes, and show the connection to the regularized Bellman equations. Section 4
provides a brief summary of the complementary dynamic-programming formulation
and discusses regularized equivalents of related concepts, such as expressions of the
regularized policy gradient. In Section 5, we describe several existing learning algorithms in our framework. We provide an empirical evaluation of various regularization
schemes in a simple reinforcement learning problem in Section 6.
P
P
set S, we will often use s as shorthand for s∈S , and we
Notation. Given a finite
P
use ∆(S) = {µ ∈ RS : s µ(s) = 1, µ(s) ≥ 0 (∀s)} to denote the set of all probability
distributions on S.
2. Preliminaries on Markov decision processes
We consider a finite Markov decision process (MDP) M = (X , A, P, r), where X is the
finite state space, A is the finite action space, P : X × A × X → [0, 1] is the transition
function, with P (y|x, a) denoting the probability of moving to state y from state x
when taking action a, and r : X × A → R is the reward function mapping state-action
pairs to rewards.
In each round t, the learner observes state Xt ∈ X , selects action At ∈ A, moves to
the next state Xt+1 ∼ P (·|Xt , At ), and obtains reward r(Xt , At ). The goal is to select
actions as to maximize some notion of cumulative
reward.iIn this paper we consider the
h P
T
1
average-reward criterion lim inf T →∞ E T t=1 rt (Xt , At ) . A stationary state-feedback
3
Neu Gómez Jonsson
policy (or policy for short) defines a probability distribution π(·|x) over the learner’s
actions in state x. MDP theory (see, e.g., Puterman (1994)) stipulates that under
mild conditions, the average-reward criterion can be maximized by stationary policies.
Throughout the paper, we make the following mild assumption about the MDP:
Assumption 1 The MDP M is unichain: All stationary policies
P π induce a unique
stationary distribution νπ over the state space satisfying νπ (y) = x,a P (y|x, a)π(a|x)νπ (x)
for all y ∈ X .
In particular, this assumption is satisfied if all policies induce an irreducible and
aperiodic Markov chain (Puterman, 1994). For ease of exposition in this section, we
also make the following simplifying assumption:
Assumption 2 The MDP M admits a single recurrent class: All stationary policies
π induce stationary distributions strictly supported on the same set X 0 ⊆ X .
In general, this assumption is very restrictive in that it does not allow policies to cover
different parts of the state space. We stress that our results in the later sections do
not require this assumption to hold. With the above assumptions in mind, we can
define the average reward of any policy π as
"
#
T
X
1
ρ(π) = lim E
rt (Xt , At ) ,
T →∞
T t=1
where At ∼ π(·|Xt ) in each round t and the existence of the limit is ensured by
Assumption 1. Furthermore,
the average reward of any policy π can be simply
P
written as ρ(π) = x,a νπ (x)π(a|x)r(x, a), which is a linear function of the stationary
state-action distribution µπ = νπ π. This suggests that finding the optimal policy
can be equivalently written as a linear program (LP) where the decision variable is
the stationary state-action distribution. Defining the set of all feasible stationary
distributions as
(
)
X
X
∆ = µ ∈ ∆(X × A) :
µ(y, b) =
P (y|x, a)µ(x, a) (∀y) ,
(1)
x,a
b
the problem of maximizing the average reward can be written as
µ∗ = arg max ρ(µ).
(2)
µ∈∆
Just as a policy π induces stationary distributions νπPand µπ , a stationary distribution
µ induces a state distribution νµ defined as νµ (x) = a µ(x, a) and a policy πµ defined
as πµ (a|x) = µ(x, a)/νµ (x), where the denominator is strictly positive for recurrent
states by Assumption 2. Since ∆ is a compact polytope (non-empty by Assumption 1)
4
A unified view of entropy-regularized MDPs
the maximum in (2) is well-defined and induces an optimal policy πµ∗ in recurrent
states. Due to Assumption 2, πµ∗ can be arbitrarily defined in transient states.
The linear program specified in Equation (2) is well studied in the MDP literature
(see, e.g., Puterman, 1994, Section 8.8), although most commonly as the dual of the
linear program
minρ∈R
ρ
subject to ρ + V (x) −
(3)
X
P (y|x, a)V (y) ≥ r(x, a),
∀(x, a).
(4)
y
Here, the dual variables V are commonly referred to as the value functions. By
strong LP duality and our Assumption 1, the solution to this LP equals the optimal
average reward ρ∗ and the dual variables V ∗ at the optimum are the solution to the
average-reward Bellman optimality equations
!
X
V ∗ (x) = max r(x, a) − ρ∗ +
P (y|x, a)V ∗ (x) ,
(∀x) .
(5)
a
y
Note that V ∗ is not unique as for any solution V , a constant shift V − c for any c ∈ R
is also a solution. However,
we can obtain a unique solution V ∗ by imposing the
P
additional constraint x,a µ∗ (x, a)V ∗ (x) = 0, which states that the expected value
should equal 0.
3. Regularized MDPs: A convex-optimization view
Inspired by the LP formulation of the average-reward optimization problem (2), we
now define a regularized optimization objective—a framework that will lead us to our
main results. Our results in this section only require the mild Assumption 1. Our
regularized optimization problem takes the form
(
)
X
1
max ρeη (µ) = max
µ(x, a)r(x, a) − R(µ) ,
(6)
µ∈∆
µ∈∆
η
x,a
where R(µ) : RX ×A → R is a convex regularization function and η > 0 is a learning
rate that trades off the original objective and regularization. Note that η = ∞ recovers
the unregularized objective. Unlike previous work on LP formulations for MDPs, we
find it useful to regard (6) as the primal.
We focus on two families of regularization functions: the negative Shannon entropy
of (X, A) ∼ µ,
X
RS (µ) =
µ(x, a) log µ(x, a),
(7)
x,a
5
Neu Gómez Jonsson
and the negative conditional entropy of (X, A) ∼ µ,
X
X
µ(x, a)
=
νµ (x)πµ (a|x) log πµ (a|x).
RC (µ) =
µ(x, a) log P
b µ(x, b)
x,a
x,a
(8)
In what follows, we refer to these functions as the relative entropy and the conditional
entropy. We also make use of the Bregman divergences induced by RS and RC which
take the respective forms
X
X
µ(x, a)
πµ (a|x)
DS (µkµ0 ) =
µ(x, a) log 0
and
DC (µkµ0 ) =
µ(x, a) log
.
0 (a|x)
µ
(x,
a)
π
µ
x,a
x,a
While the form of DS is standard (it is the relative entropy between two state-action
distributions), the fact that DC is the Bregman divergence of RC (or even that RC is
convex) is not immediately obvious1 . The following proposition asserts this statement,
which we prove in Appendix A.1. The only work we are aware of that establishes a
comparable result is the recent paper of Neu and Gómez (2017).
Proposition 1 The Bregman divergence corresponding to the conditional entropy
RC is DC . Furthermore, DC is nonnegative on ∆, implying that RC is convex and
DC is convex in its first argument.
We proceed to derive the dual functions and optimal solutions to (6) for our two
choices of regularization functions. Without loss of generality, we assume that the
reference policy πµ0 has full support, which implies that the corresponding stationary
distribution µ0 is strictly positive on the recurrent set X 0 . We only provide the
derivations for the Bregman divergences; the calculations are analogous for RS and
RC . Both of these solutions will be expressed with the help of dual variables V :
RX → R which are useful to think about as value functions, as in the case of the
LP formulation
(2). We also define the corresponding advantage functions A(x, a) =
P
r(x, a) + y P (y|x, a)V (y) − V (x).
3.1. Relative entropy
The choice R = DS (·kµ0 ) has been studied before by Peters et al. (2010) and Zimin
and Neu (2013); we defer the proofs to Appendix A.3. The optimal state-action
distribution for a given value of η is
∗
µ∗η (x, a) ∝ µ0 (x, a)eηAη (x,a) ,
(9)
where A∗η is the advantage function for the optimal dual variables Vη∗ . The dual
function is
X
1
g(V ) = log
µ0 (x, a)eηA(x,a) ,
(10)
η
x,a
1. In the special case of loop-free episodic environments, showing the convexity of RC is straightforward (Lafferty et al., 2001; Ziebart, 2010; Rawlik et al., 2012).
6
A unified view of entropy-regularized MDPs
that now needs to be minimized on RX with no constraints in order to obtain Vη∗ .
By strong duality, g is convex in V and takes the value ρe∗η = maxµ∈∆ ρeη (µ) at its
optimum.
3.2. Conditional entropy
The choice R = DC (·kµ0 ) leads to our main contributions. Similar to above, the
optimal policy is
∗
πη∗ (a|x) ∝ πµ0 (a|x)eηAη (x,a) .
(11)
In this case, the dual problem closely resembles the average-reward Bellman optimality
equations (5):
Proposition 2 The dual of the optimization problem (6) when R = DC (·kµ0 ) is
given by
minλ∈R
λ
!!
X
X
1
P (y|x, a)V (y)
, (∀x) .
πµ0 (a|x) exp η r(x, a) − λ +
subject to V (x) = log
η
y
a
We defer the proofs to Appendix A.4. Using strong duality, the optimum of the above
problem is ρe∗η , which implies that the optimal dual variables Vη∗ are given as a solution
to the system of equations
!!
X
X
1
P (y|x, a)Vη∗ (y)
, (∀x) .
πµ0 (a|x) exp η r(x, a) − ρe∗η +
Vη∗ (x) = log
η
y
a
(12)
By analogy with the Bellman optimality equations (5), we call this the regularized
average-reward Bellman optimality equations. Since ρe∗η is guaranteed to be finite
(because it is the maximum of a bounded function on a compact domain), the solution
to the above optimization problem is well-defined, bounded, and unique up to a
constant shift (as in the case of the LP dual variables). Again, we can make the
solution unique by imposing the constraint that the expected value should equal 0.
4. Dynamic programming in regularized MDPs
We now present a dynamic-programming view of the regularized optimization problem
(Bertsekas, 2007) for the choice R = DC (·kµ0 ). Similar derivations have been done
several times for discounted and episodic MDPs (Littman and Szepesvári, 1996;
Ruszczyński, 2010; Azar et al., 2011; Rawlik et al., 2012; Asadi and Littman, 2016;
Fox et al., 2016), but we are not aware of any work that considers the average-reward
case. That said, the generalization is straightforward, and the existence and unicity of
7
Neu Gómez Jonsson
the optimal solution to the Bellman optimality equation (12) follows from our results
in the previous section.
We first define the regularized Bellman equations for an arbitrary policy π and a
reference policy π 0 :
!
X
X
π(a|x)
1
− ρeη (π) +
P (y|x, a)Vηπ (y)
(∀x) ,
Vηπ (x) =
π(a|x) r(x, a) − log 0
η
π
(a|x)
y
a
(13)
where ρeη (π) is the regularized average reward of policy π defined as in Equation (6).
By our Assumption 1 and Proposition 4.2.4 of Bertsekas (2007), it is easy to show
that this system of equations has a unique solution satisfying the additional constraint
P
∗|π 0
π
and
x,a µπ (x, a)Vη (x) = 0. We also define the Bellman optimality operator Tη
π|π 0
the Bellman operator Tη that correspond to the Bellman equations (12) and (13),
0
respectively, as well as the greedy policy operator Gπη that corresponds to Equation (11)
(for completeness, the formal definitions appear in Appendix B).
We include two results that are useful for deriving approximate dynamic programming algorithms. We first provide a counterpart to the performance-difference lemma
(Burnetas and Katehakis, 1997, Prop. 1, Kakade and Langford, 2002, Lemma 6.1, Cao,
2007). This statement will rely on the regularized advantage function Aπη defined for
each policy π as
Aπη (x, a) = r(x, a) −
X
1 log π(a|x)
P (y|x, a)Vηπ (y) − Vηπ (x),
−
ρ
e
(π)
+
η
η log π 0 (a|x)
y
where Vηπ is the regularized value function corresponding to π with baseline π 0 .
Lemma 3 For any pair of policies π, π 0 , we have
X
µπ0 (x, a)Aπη (x, a).
ρe(π 0 ) − ρe(π) =
x,a
For completeness, we provide the simple proof in Appendix B.1.
Second, we provide an expression for the gradient of ρeη , thus providing a regularized
counterpart of the policy gradient theorem of Sutton et al. (1999). To formalize this
statement, let us consider a policy πθ parametrized by a vector θ ∈ Rd and assume
that the gradient ∇πθ (a|x) exists for all x, a and all θ. The form of the policy gradient
is given by the following lemma, which we prove in Appendix B.2:
Lemma 4 Assume that ∂πθ∂θ(a|x)
/πθ (a|x) > 0 for all θi , x, a. The gradient of ρeη exists
i
and satisfies
X
∇e
ρη (θ) =
µπθ (x, a)∇ log πθ (a|x)Aπη θ (x, a).
x,a
8
A unified view of entropy-regularized MDPs
5. Algorithms
In this section we derive several reinforcement learning algorithms based on our
results. For clarity of presentation, we assume that the MDP M is fully known, an
assumption that we later relax in the experimental evaluation. We will study a generic
sequential optimization framework where a sequence of policies πk are computed
iteratively. Inspired by the online convex optimization literature (see, e.g., ShalevShwartz, 2012; Hazan et al., 2016) and by our convex-optimization formulation, we
study two families of algorithms: Mirror Descent and Dual Averaging (also known as
Follow-the-Regularized-Leader).
5.1. Iterative policy optimization by Mirror Descent
A direct application of the Mirror Descent algorithm (Nemirovski and Yudin, 1983;
Beck and Teboulle, 2003; Martinet, 1978; Rockafellar, 1976) to our case is defined as
1
µk+1 = arg max ρ(µ) − DR (µkµk ) ,
(14)
η
µ∈∆
where DR is the Bregman divergence associated with the convex regularization function
R. We now proceed to show how various learning algorithms can be recovered from
this formulation.
5.1.1. Mirror Descent with the relative entropy
We first remark that the Relative Entropy Policy Search (REPS) algorithm of Peters
et al. (2010) can be formulated as an instance of Mirror Descent with the Bregman
divergence DS . This is easily seen by comparing the form of the update rule (14) with
the problem formulation of Peters et al. (2010, pp. 2), with the slight difference that
our regularization is additive and theirs is enforced as a constraint. It is easy to see
that this only amounts to a change in learning rate. This connection is not new: it
has been first shown by Zimin and Neu (2013)2 , and has been recently rediscovered by
Montgomery and Levine (2016). Independently of each other, Zimin and Neu (2013)
and Dick et al. (2014) both show that Mirror Descent achieves near-optimal regret
guarantees in an online learning setup where the transition function is known, but the
reward function is allowed to change arbitrarily between decision rounds. This implies
that REPS duly converges to the optimal policy in our setup.
5.1.2. Mirror Descent with the conditional entropy
We next show that the Dynamic Policy Programming (DPP) algorithm of Azar et al.
(2012) and the Trust-Region Policy Optimization (TRPO) algorithm of Schulman
et al. (2015) are both approximate variants of Mirror Descent with the Bregman
2. Although they primarily referred to Mirror Descent as the “Proximal Point Algorithm” following
(Rockafellar, 1976; Martinet, 1978).
9
Neu Gómez Jonsson
divergence DC . To see this, note that a full Mirror Descent update requires computing
the optimal value function Vη∗ for the baseline µk , e.g. by regularized value iteration or
regularized policy iteration (see Appendix B). Since a full update for Vη∗ is expensive,
DPP and TRPO provide two ways to approximate it. We remark that the algorithm
of Rawlik et al. (2012) can also be viewed as an instance of Mirror Descent for the
finite-horizon episodic setting, in which the exact update can be computed efficiently
by dynamic programming.
Dynamic Policy Programming. We first claim that each iteration of DPP is
a single regularized value iteration step: Starting from the previous value function
Vk , it extracts the greedy policy πk+1 = Gπη k [Vk ] and applies the Bellman optimality
∗|π
∗|π
operator Tη k to obtain Vk+1 = Tη k [Vk ]. This follows from comparing the form of
DPP presented in Appendix A of Azar et al. (2012): their update rules (19) and (20)
precisely match the discounted analogue of our expressions (26) in Appendix B with
π 0 = πk . The convergence guarantees proved by Azar et al. (2012) demonstrate the
soundness of this approximate update.
Trust-Region Policy Optimization. Second, we claim that each iteration of
TRPO is a single policy iteration step: TRPO first fully evaluates the policy πk to
compute its unregularized value function Vk = V∞πk and then extracts the regularized
greedy policy πk+1 = Gπη k [Vk ] with πk as a baseline. This can be seen by inspecting
the TRPO update3 that takes the form
(
)
X
X
π(a|x)
1
πk
πk+1 = arg max
νπk (x)
π(a|x) A∞
(x, a) − log
.
η
πk (a|x)
π
x
a
This objective approximates Mirror Descent by ignoring the effect of changing the
policy on the state distribution. Surprisingly, using our formalism, this update can be
expressed in closed form as
πk
πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) .
We present the detailed derivations in Appendix B.3. A particularly interesting
consequence of this result is that TRPO is completely equivalent to the MDP-E
algorithm of Even-Dar et al. (2009) (see also (Neu et al., 2010, 2014)), which is known
to minimize regret in an online setting, thus implying that TRPO also converges to
the optimal policy in the stationary setting. This guarantee is much stronger than
the ones provided by Schulman et al. (2015), who only claim that TRPO produces a
monotonically improving sequence of policies (which may still converge to a suboptimal
policy).
3. As in the case of REPS, we discuss here the additive-regularization version of the algorithm. The
entropy-constrained update actually implemented by Schulman et al. (2015) only differs in the
learning rate.
10
A unified view of entropy-regularized MDPs
5.2. Iterative policy optimization by Dual Averaging
We next study algorithms arising from the Dual Averaging scheme (Xiao, 2010;
McMahan, 2014), commonly known as Follow-the-Regularized-Leader in online learning (Shalev-Shwartz, 2012; Hazan et al., 2016). This algorithm is defined by the
iteration
1
(15)
µk+1 = arg max ρ(µ) − R(µ) ,
ηk
µ∈∆
where ηk is usually an increasing sequence to ensure convergence in the limit. We
are unaware of any pure instance of dual averaging using relative entropy, and only
discuss conditional entropy below.
5.2.1. Dual Averaging with the conditional entropy
Just as for Mirror Descent, a full update (15) requires computing the optimal value
function Vη∗ . Various approximations of this update have been long studied in the RL
literature—see, e.g., (Littman and Szepesvári, 1996) (with additional discussion by
(Asadi and Littman, 2016)), (Perkins and Precup, 2002; Ruszczyński, 2010; Petrik
and Subramanian, 2012; Fox et al., 2016). In this section, we focus on the stateof-the-art algorithms of Mnih et al. (2016) and O’Donoghue et al. (2017) that were
originally derived from an optimization formulation resembling our Equation (6). Our
main insight is that this algorithm can be adjusted to have a dynamic-programming
interpretation and a convergence guarantee.
Entropy-regularized policy gradients. The A3C algorithm of Mnih et al. (2016)
aims to maximize
X
1 X
ρ(π) −
νπk (x)
π(a|x) log π(a|x)
ηk x
a
by taking policy gradient steps. Interestingly, our formalism implies a connection
between TRPO and A3C. Due to P
Lemma 4,Pthe gradient of ρ(πθ ) with respect
to θ coincides with the gradient of x νπk (x) a πθ (a|x)Aπ∞k (x, a), so A3C actually
attempts to optimize the objective
X
X
1
πk
log πθ (a|x) .
(16)
νπk (x)
πθ (a|x) A∞ (x, a) −
η
k
x
a
This objective can be seen as the dual-averaging counterpart of the TRPO objective.
As in the case of TRPO, the maximizer of this objective can be computed in closed
form as
πk
πk+1 (a|x) ∝ eηk A∞ .
Unlike for TRPO, we are not aware of any convergence results for A3C, and we believe
the algorithm does not converge. Indeed, the objective (16) is non-convex in either
11
Neu Gómez Jonsson
of the natural parameters µ or π, which can cause premature convergence to a bad
local optimum. An even more serious concern is that the objective function changes
between iterations, so gradient descent may fail to converge to any stationary point.
This problem is avoided by TRPO since the sum of the TRPO objectives is a sensible
optimization objective (Even-Dar et al., 2009, Theorem 4.1). However, there is no
such clear interpretation for the objective (16).
O’Donoghue et al. (2017, Section 3.1) study the stationary points of the objective (16) and, similarly to us, show a connection between a certain type of value
function and a policy achieving the stationary point. However, they do not show that
this stationary point is unique nor that gradient descent converges to a stationary
point4 . As we argue above, this may very well not be the case. These observations
are consistent with those of Asadi and Littman (2016), who show that softmax policy
updates may lead to inconsistent behavior when used in tandem with unregularized
advantage functions.
To overcome these issues, we advocate for directly optimizing the objective (15)
instead of (16) via gradient descent. Due to the fact that (15) is convex in µ and to
standard results regarding dual averaging (McMahan, 2014), this scheme is guaranteed
to converge to the optimal policy. Estimating the gradients can be done analogously
as for the unregularized objective, by our Lemma 4.
6. Experiments
In this section we analyze empirically several of the algorithms described in the
previous section, with the objective of illustrating the interplay of regularization and
model-estimation error in a simple reinforcement learning setting. We consider an
iterative setup where in each episode k = 1, 2, . . . , N , we execute a policy πk , observe
the sample transitions and update the estimated model via maximum likelihood.
We focus on the regularization aspect, with no other approximation error than that
introduced by model estimation. It is important to emphasize that the comparison
may not extend to other variants of the algorithms or in the presence of other sources
of approximation.
We consider a simple MDP, defined on a grid (Fig. 1, left), where an agent has
four possible actions (up, down, left and right) that succeed with probability 0.9 but
fail with probability 0.1. In case of failure, the agent does not move or goes to any
random adjacent location. Negative (or positive) rewards are given after hitting a
wall (or reaching one of the white diamond locations, respectively). In both cases, the
agent is sent back to one of the starting locations (marked with ’X’ in the figure).
The reward of the diamonds is proportional to the distance from the starting
locations. Therefore, the challenge of this experiment is to discover the path towards
the top-right reward while learning the dynamics incrementally, and then exploit it.
4. Strictly speaking, O’Donoghue et al. (2017) do not even show that a stationary point (16) exists.
12
A unified view of entropy-regularized MDPs
8
0.05
8
0.04
0.03
0.02
6
6
DA-RV
DA
TRPO
DPP
RegVI
Opt
4
0.01
2
0
-0.01
0
10 -4 10 -3 10 -2 10 -1 10 0 10 1
2
avg reward
10
avg reward
0.06
4
DPP
ModRegPI-2
ModRegPI-20
TRPO
2
0
10 0
10 1
10 2
iteration k
Figure 1: Left: the MDP used for evaluation. Reward is −0.1 at the walls and
5, 50, 200 at the diamonds. The optimal policy is indicated by red arrows.
The cell colors correspond to the stationary state distribution for open
locations. Middle: Average reward as a function of the learning rate η for
all algorithms (see text for details). Number of iterations N and samples
per iteration S are N = S = 500. Results are taken over 20 random runs
per value of η. Right: Performance of DPP, TRPO and two version of
modified regularized Policy Iteration for a fixed η ≈ 0.1.
Note that the optimal agent ignores the intermediate reward at the center and even
prefers to hit a wall in locations too far away from the largest reward (bottom-left).
We fix the number of iterations N and samples per iteration S and analyze the
average reward of the final policy as a function of η. We compare the following
algorithms: regularized Value Iteration with a fixed reference uniform policy and fixed
η (RegVI); several variants of approximate Mirror Descent, including DPP and TRPO
(Section 5.1); and two Dual Averaging methods (DA and DA-RV). DA corresponds to
optimizing the objective (16), which is not guaranteed to lead to an optimal policy,
and DA-RV corresponds to the iteration (15), which has convergence guarantees
(Section 5.2). For both variants, we use a linear annealing schedule ηk = η · k.
Fig. 1 (middle) shows results as a function of η. The maximum reward is depicted
in blue at the top. For very small η (strong regularization), all algorithms perform
poorly and do not even reach the intermediate reward. In contrast, for very large η,
they converge prematurely to the greedy policy that exploits the intermediate reward.
Typically, for an intermediate value of η, the algorithms occasionally discover the
optimal path and exploit it. Note that this is not the case for RegVI, which never
obtains the optimal policy. This shows that using both a fixed value of η and a fixed
reference policy is a bad choice. In this MDP, we observe that the performance of
both Dual Averaging methods (DA and DA-RV) is very similar, and in general slightly
better than the approximate Mirror Descent variants.
13
Neu Gómez Jonsson
We also show an interesting relationship between the Mirror Descent approximations. Our analysis in Section 5.1.2 suggests an entire array of algorithms lying
between DPP and TRPO, just as Modified Policy Iteration lies between Value Iteration
and Policy Iteration (Puterman and Shin, 1978; Scherrer et al., 2012). Fig. 1 (right)
illustrates this idea, showing the convergence of DPP and TRPO for a fixed value of
η. TRPO tends to converge faster than DPP to a locally optimal policy, since DPP
uses a single value update per iteration. Using more value updates leads to a modified
regularized Policy Iteration algorithm (we call it ModRegPI-2 and ModRegPI-20, for
2 and 20 updates, respectively) that interpolates between DPP and TRPO.
7. Conclusion
We have presented a unifying view of entropy-regularized MDPs from a convexoptimization perspective. We believe that such unifying theories can be very useful
in moving a field forward: We recall that in the field of online learning theory, the
convex-optimization view has enabled a unified treatment of many existing algorithms
and acts today as the primary framework for deriving new algorithms (see the progress
from Cesa-Bianchi and Lugosi (2006) through Shalev-Shwartz (2012) to Hazan et al.
(2016)). In this paper, we argued that the convex-optimization view may also be
very useful in analyzing algorithms for reinforcement learning: In particular, we
demonstrated how this framework can be used to provide theoretical justification for
state-of-the-art reinforcement learning algorithms, and how it can highlight potential
problems with them. We expect that this newly-found connection will also open the
door for constructing more advanced reinforcement learning algorithms by borrowing
further ideas from the convex optimization literature, such as Composite Objective
Mirror Descent Duchi et al. (2010) and Regularized Dual Averaging (Xiao, 2010).
Finally, we point out that our work does not provide a statistical justification
for using entropy regularization in reinforcement learning. In the case of online
learning in known Markov decision processes with changing reward functions, entropyregularization has been known to yield near-optimal learning algorithms (Even-Dar
et al., 2009; Neu et al., 2010, 2014; Zimin and Neu, 2013; Dick et al., 2014). It remains
to be seen if this technique also provably helps in driving the exploration process in
unknown Markov decision processes.
References
S. Arora, E. Hazan, and S. Kale. The multiplicative weights update method: A
meta-algorithm and applications. Theory of Computing, 8:121–164, 2012.
Kavosh Asadi and Michael L. Littman. A new softmax operator for reinforcement
learning. CoRR, abs/1612.05628, 2016.
14
A unified view of entropy-regularized MDPs
Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy
programming with function approximation. In International Conference on Artificial
Intelligence and Statistics, pages 119–127, 2011.
Mohammad Gheshlaghi Azar, Vicenç Gómez, and Hilbert J Kappen. Dynamic policy
programming. Journal of Machine Learning Research, 13(Nov):3207–3245, 2012.
A. Beck and M. Teboulle. Mirror descent and nonlinear projected subgradient methods
for convex optimization. Operations Research Letters, 31(3):167–175, 2003.
R. Bellman. Dynamic Programming. Princeton University Press, Princeton, New
Jersey, 1957.
D. P. Bertsekas. Dynamic Programming and Optimal Control, volume 2. Athena
Scientific, Belmont, MA, 3 edition, 2007.
Daniel A Braun, Pedro A Ortega, Evangelos Theodorou, and Stefan Schaal. Path
integral control and bounded rationality. In Adaptive Dynamic Programming And
Reinforcement Learning (ADPRL), 2011 IEEE Symposium on, pages 202–209. IEEE,
2011.
A. N. Burnetas and M. N. Katehakis. Optimal adaptive policies for Markov Decision
Processes. 22(1):222–255, 1997.
Xi-Ren Cao. Stochastic Learning and Optimization: A Sensitivity-Based Approach.
Springer, New York, 2007.
N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge
University Press, New York, NY, USA, 2006.
T. Dick, A. György, and Cs. Szepesvári. Online learning in markov decision processes
with changing cost sequences. In ICML 2014, 2014.
John C Duchi, Shai Shalev-Shwartz, Yoram Singer, and Ambuj Tewari. Composite
objective mirror descent. In COLT, pages 14–26, 2010.
E. Even-Dar, S. M. Kakade, and Y. Mansour. Online Markov decision processes.
Mathematics of Operations Research, 34(3):726–736, 2009.
Roy Fox, Ari Pakman, and Naftali Tishby. Taming the noise in reinforcement learning
via soft updates. In Proceedings of the Thirty-Second Conference on Uncertainty in
Artificial Intelligence, 2016.
Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning
and an application to boosting. Journal of Computer and System Sciences, 55:
119–139, 1997.
15
Neu Gómez Jonsson
Elad Hazan et al. Introduction to online convex optimization. Foundations and
Trends R in Optimization, 2(3-4):157–325, 2016.
R. A. Howard. Dynamic Programming and Markov Processes. The MIT Press,
Cambridge, MA, 1960.
Ronald A Howard and James E Matheson. Risk-sensitive markov decision processes.
Management science, 18(7):356–369, 1972.
Sham M. Kakade and John Langford. Approximately optimal approximate reinforcement learning. In Proceedings of the Nineteenth International Conference on
Machine Learning (ICML 2002), pages 267–274, 2002.
J. Kivinen and M. Warmuth. Relative loss bounds for multidimensional regression
problems. Machine Learning, 45:301–329, 2001.
John Lafferty, Andrew McCallum, and Fernando Pereira. Conditional random fields:
Probabilistic models for segmenting and labeling sequence data. In ICML 2001, pages
282–289, 2001. URL citeseer.ist.psu.edu/lafferty01conditional.html.
N. Littlestone and M. Warmuth. The weighted majority algorithm. Information and
Computation, 108:212–261, 1994.
M.L. Littman and Cs. Szepesvári. A Generalized Reinforcement Learning Model:
Convergence and applications. In Int. Conf. on Machine Learning, pages 310–318,
1996.
Steven I Marcus, Emmanual Fernández-Gaucherand, Daniel Hernández-Hernandez,
Stefano Coraluppi, and Pedram Fard. Risk sensitive markov decision processes. In
Systems and control in the twenty-first century, pages 263–279. Springer, 1997.
B. Martinet. Perturbation des méthodes d’optimisation. applications. ESAIM: Mathematical Modelling and Numerical Analysis - Modélisation Mathématique et Analyse
Numérique, 12(2):153–171, 1978. URL http://eudml.org/doc/193317.
H Brendan McMahan. A survey of algorithms and analysis for adaptive online learning.
arXiv preprint arXiv:1403.3465, 2014.
Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy
Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods
for deep reinforcement learning. In International Conference on Machine Learning,
pages 1928–1937, 2016.
William H Montgomery and Sergey Levine. Guided policy search via approximate
mirror descent. In NIPS-29, pages 4008–4016, 2016.
16
A unified view of entropy-regularized MDPs
A. Nemirovski and D. Yudin. Problem Complexity and Method Efficiency in Optimization. Wiley Interscience, 1983.
G. Neu, A. György, and Cs. Szepesvári. The online loop-free stochastic shortest-path
problem. In Proceedings of the 23rd Annual Conference on Learning Theory (COLT),
pages 231–243, 2010.
Gergely Neu and Vicenç Gómez. Fast rates for online learning in Linearly Solvable
Markov Decision Processes. 2017.
Gergely Neu, András György, Csaba Szepesvári, and András Antos. Online Markov
decision processes under bandit feedback. IEEE Transactions on Automatic Control,
59:676–691, 2014.
Brendan O’Donoghue, Remi Munos, Koray Kavukcuoglu, and Volodymyr Mnih. PGQ:
Combining policy gradient and Q-learning. In 5th International Conference on
Learning Representations, 2017.
Theodore J. Perkins and Doina Precup. A convergent form of approximate policy
iteration. In Advances in Neural Information Processing Systems, pages 1595–1602,
2002.
Jan Peters, Katharina Mülling, and Yasemin Altun. Relative entropy policy search.
In Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence,
pages 1607–1612, 2010.
Marek Petrik and Dharmashankar Subramanian. An approximate solution method
for large risk-averse markov decision processes. In Proceedings of the Twenty-Eighth
Conference on Uncertainty in Artificial Intelligence, pages 805–814, 2012.
Martin L. Puterman. Markov Decision Processes. Wiley, 1994. ISBN 9780471727828. URL http://books.google.com/books/about/Markov_decision_
processes.html?id=Y-gmAQAAIAAJ.
Martin L. Puterman and Moon Chirl Shin. Modified policy iteration algorithms for
discounted Markov decision processes. Management Science, 24:1127–1137, 1978.
Konrad Rawlik, Marc Toussaint, and Sethu Vijayakumar. On stochastic optimal
control and reinforcement learning by approximate inference. In Proceedings of
Robotics: Science and Systems VIII, 2012.
R. Tyrrell Rockafellar. Monotone Operators and the Proximal Point Algorithm. SIAM
Journal on Control and Optimization, 14(5):877–898, 1976.
Andrzej Ruszczyński. Risk-averse dynamic programming for Markov decision processes.
Mathematical programming, 125(2):235–261, 2010.
17
Neu Gómez Jonsson
B. Scherrer, V. Gabillon, M. Ghavamzadeh, and M. Geist. Approximate modified
policy iteration. In ICML 2012, pages 1207–1214, 2012.
John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz.
Trust region policy optimization. In Proceedings of the 32nd International Conference
on Machine Learning (ICML-15), pages 1889–1897, 2015.
Shai Shalev-Shwartz. Online learning and online convex optimization. Foundations
and Trends in Machine Learning, 4(2):107–194, 2012.
R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour. Policy gradient
methods for reinforcement learning with function approximation. In NIPS-12, pages
1057–1063, 1999.
R.S. Sutton and A.G. Barto. Reinforcement Learning: An Introduction. MIT Press,
1998.
Cs. Szepesvári. Algorithms for Reinforcement Learning. Synthesis Lectures on Artificial
Intelligence and Machine Learning. Morgan & Claypool Publishers, 2010.
Vladimir Vapnik. The nature of statistical learning theory. Springer science & business
media, 2013.
V. Vovk. Aggregating strategies. In Proceedings of the third annual workshop on
Computational learning theory (COLT), pages 371–386, 1990.
Ronald J Williams and Jing Peng. Function optimization using connectionist reinforcement learning algorithms. Connection Science, 3(3):241–268, 1991.
Lin Xiao. Dual averaging methods for regularized stochastic learning and online
optimization. Journal of Machine Learning Research, 11(Oct):2543–2596, 2010.
Brian D Ziebart. Modeling Purposeful Adaptive Behavior with the Principle of Maximum Causal Entropy. PhD thesis, Carnegie Mellon University, 2010.
Brian D Ziebart, J Andrew Bagnell, and Anind K Dey. Modeling interaction via
the principle of maximum causal entropy. In International Conference on Machine
Learning (ICML), pages 1247–1254, 2010.
A. Zimin and G. Neu. Online learning in episodic Markovian decision processes by
relative entropy policy search. In NIPS-26, pages 1583–1591, 2013.
18
A unified view of entropy-regularized MDPs
Appendix A. Complementary Technical Results
A.1. Convexity of the negative conditional entropy
Let us consider
the joint state-action distribution µ on the finite set X × A. We denote
P
νµ (x) = a µ(x, a) and πµ (a|x) = µ(x, a)/νµ (x) for all x, a. We study the negative
conditional entropy of (X, A) ∼ µ as a function of µ:
RC (µ) =
X
x,a
X
µ(x, a)
µ(x, a)
=
µ(x, a) log
.
µ(x, a) log P
ν
(x)
µ
b µ(x, b)
x,a
We will study the Bregman divergence DRC corresponding to RC :
DRC (µkµ0 ) = RC (µ) − RC (µ0 ) − ∇RC (µ0 )> (µ − µ0 ),
P
where the inner product between two vectors v, w ∈ RX ×A is w> v = x,a v(x, a)w(x, a).
Our aim is to show that DRC is nonnegative, which will imply the convexity of RC .
We begin by computing the partial derivative of RC (µ) with respect to µ(x, a):
X µ(x, b)
µ(x, a)
µ(x, a)
∂RC (µ)
= log
+1−
= log
,
∂µ(x, a)
νµ (x)
ν
ν
µ (x)
µ (x)
b
where we used the fact that ∂νµ (x)/∂µ(x, a) = 1 for all a. With this expression, we
have
RC (µ0 ) + ∇RC (µ0 )> (µ − µ0 ) =
X
=
X
µ0 (x, a) log
µ0 (x, a)
µ0 (x, a) X
+
(µ(x, a) − µ0 (x, a)) log
νµ0 (x)
νµ0 (x)
x,a
µ(x, a) log
µ0 (x, a)
.
νµ0 (x)
x,a
x,a
Thus, the Bregman divergence takes the form
X
µ0 (x, a)
µ(x, a)
0
DRC (µkµ ) =
µ(x, a) log
− log
νµ (x)
νµ0 (x)
x,a
=
X
x,a
µ(x, a) log
X
X
πµ (a|x)
πµ (a|x)
=
ν(x)
πµ (a|x) log
.
πµ0 (a|x)
πµ0 (a|x)
x
a
This proves that the Bregman divergence corresponding to RC coincides with DC , as
claimed. To conclude the proof, note that DC is the average relative entropy between
the distributions πµ and πµ0 —that is, a sum a positive terms. Indeed, this shows that
DC is nonnegative on the set of state-action distributions ∆(X × A), proving that
RC (µ) is convex.
19
Neu Gómez Jonsson
A.2. Derivation of optimal policies
Here we prove the results stated in Equations (9)-(11) and Proposition 2, which give the
expressions for the dual optimization problems and the optimal solutions corresponding
to the primal optimization problem (6), for the two choices of regularization function
DS (·kµ0 ) and DC (·kµ0 ). We start with generic derivations that will be helpful for
analyzing both cases and then turn to studying the individual regularizers.
Recall that the primal optimization objective in (6) is given by
(
)
X
1
max ρeη (µ) = max
µ(x, a)r(x, a) − R(µ) ,
µ∈∆
µ∈∆
η
x,a
where ∆, the feasible set of stationary distributions, is defined by the following
constraints:
X
X
µ(y, b) =
µ(x, a)P (y|x, a), ∀y ∈ X ,
(17)
x,a
b
X
µ(x, a) = 1,
(18)
µ(x, a) ≥ 0, ∀(x, a) ∈ X × A.
(19)
x,a
We begin by noting that for all state-action pairs where µ0 (x, a) = 0, the optimal
solution µ∗η (x, a) will also be zero, thanks to the form of our regularized objective.
Thus, without loss of generality, we will assume that all states are recurrent under µ0 :
µ0 (x, a) > 0 holds for all state-action pairs.
For any choice of regularizer R, the Lagrangian of the primal (6) is given by
X
X
X
1
µ(y, b)
V (y)
µ(x, a)P (y|x, a) −
L(µ; V,λ, ϕ) =
µ(x, a)r(x, a) − R(µ) +
η
x,a
y
x,a
b
!
X
X
+λ 1−
µ(x, a) +
ϕ(x, a)µ(x, a)
X
x,a
x,a
!
=
X
=
X
x,a
x,a
µ(x, a) r(x, a) +
X
P (y|x, a)V (y) − V (x) − λ + ϕ(x, a)
y
1
− R(µ) + λ
η
1
µ(x, a) (A(x, a) − λ + ϕ(x, a)) − R(µ) + λ,
η
where V , λ and ϕ are the Lagrange multipliers5 , and A is the advantage function for
V . Setting the gradient of the Lagrangian with respect to µ to 0 yields the system of
5. Technically, these are KKT multipliers as we also have inequality constraints. However, these will
be eliminated by means of complementary slackness in the next sections.
20
!
A unified view of entropy-regularized MDPs
equations
∂L
1 ∂R(µ)
= (A(x, a) − λ + ϕ(x, a)) −
,
∂µ(x, a)
η ∂µ(x, a)
∂R(µ)
= η (A(x, a) − λ + ϕ(x, a)) ,
(20)
⇔
∂µ(x, a)
for all x, a. By the first-order stationary condition, the unique optimal solution µ∗η
satisfies this system of equations. To obtain the final solution we have to compute
the optimal values Vη∗ , λ∗η and ϕ∗η of the Lagrange multipliers by optimizing the dual
optimization objective g(V, λ, ϕ) = L(µ∗η ; V, λ, ϕ), and insert into the expression for
µ∗η . V and λ are unconstrained in the dual, while ϕ satisfies ϕ(x, a) ≥ 0 for each
(x, a) ∈ X × A. We give the derivations for each regularizer below.
0=
A.3. The relative entropy
P
Here we prove the results for R(µ) = DS (µkµ0 ) = x,a µ(x, a) log µµ(x,a)
0 (x,a) . The gradient
of R is
∂R(µ)
µ(x, a)
= log 0
+ 1.
∂µ(x, a)
µ (x, a)
The optimal state-action distribution µ∗η is now directly given by Equation (20):
µ∗η (x, a) = µ0 (x, a) exp (η (A(x, a) − λ + ϕ(x, a)) − 1) .
(21)
For µ∗η to belong to ∆, it has to satisfy Constraints (18) and (19). Because of
the exponent in (21), µ∗η (x, a) ≥ 0 trivially holds for any choice of ϕ(x, a), and
complementary slackness implies ϕ∗η (x, a) = 0 for each (x, a). Eliminating ϕ and
inserting µ∗η into Constraint (18) gives us
X
1=
µ0 (x, a) exp (ηA(x, a)) e−ηλ−1 ,
x,a
1
⇔ λ=
η
!
log
X
µ0 (x, a) exp (ηA(x, a)) − 1 .
(22)
x,a
Since the value of λ is uniquely determined by (22), we can optimize the dual over V
only. The dual function is given by
X
µ∗η (x, a)
1
1
∗
∗
g(V ) = L(µη ; V, λ) =
µη (x, a) A(x, a) − λ − log 0
+λ= +λ
η
µ (x, a)
η
x,a
X
1
= log
µ0 (x, a) exp (ηA(x, a)) .
η
x,a
This is precisely the dual given in Equation (10). Note that this dual function has
no associated constraints. The expression for the optimal state-action distribution in
Equation (9) is obtained by inserting the advantage function A∗η corresponding to the
optimal value function Vη∗ into (21).
21
Neu Gómez Jonsson
A.4. The conditional entropy
We next prove the results for R(µ) = DC (µkµ0 ) =
gradient of R is
P
x,a
µ(x, a) log ππµ0(a|x)
. The
(a|x)
µ
∂R(µ)
πµ (a|x) X µ(x, b) ∂πµ (b|x)
= log
+
·
.
∂µ(x, a)
πµ0 (a|x)
πµ (b|x) ∂µ(x, a)
b
Since the policy is defined as πµ (a|x) =
µ(x,a)
,
νµ (x)
its gradient with respect to µ is
I{a=b} µ(x, b)
∂πµ (b|x)
1
=
−
I
−
π
(b|x)
, ∀x ∈ X , a, b ∈ A.
=
µ
{a=b}
∂µ(x, a)
νµ (x)
νµ (x)2
νµ (x)
Inserting into the expression for the gradient of R yields
πµ (a|x) X πµ (b|x)
∂R(µ)
= log
+
I{a=b} − πµ (b|x)
∂µ(x, a)
πµ0 (a|x)
πµ (b|x)
b
X
πµ (a|x)
πµ (a|x)
πµ (b|x) = log
= log
+1−
.
πµ0 (a|x)
πµ0 (a|x)
b
The optimal policy πµ∗ is now directly given by Equation (20):
πη∗ (a|x) = πµ0 (a|x) exp (η (A(x, a) − λ + ϕ(x, a))) .
(23)
For µ∗η to belong to ∆, it has to satisfy Constraint (19). Because of the exponent
in (23) and the fact that µ∗η (x, a) ∝ πη∗ (a|x), µ∗η (x, a) ≥ 0 trivially holds for any choice
of ϕ(x, a), implying that ϕ∗η (x, a) = 0 for each (x, a) by complementary slackness.
Since πη∗ (a|x) =
µ∗η (x,a)
,
νη∗ (x)
X
we also obtain the following set of constraints:
πη∗ (a|x) =
a
X µ∗η (x, a)
a
νη∗ (x)
=
νη∗ (x)
= 1, ∀x ∈ X .
νη∗ (x)
Inserting the expression for πη∗ yields
1=
X
πµ0 (a|x) exp (ηA(x, a)) e−ηλ , ∀x ∈ X .
a
If we expand the expression for A(x, a) and rearrange the terms we obtain
!!
X
X
1
P (y|x, a)V (y)
πµ0 (a|x) exp η r(x, a) − λ +
, ∀x ∈ X .
V (x) = log
η
a
y
(24)
22
A unified view of entropy-regularized MDPs
The dual function is obtained by inserting the expression for µ∗ into the Lagrangian:
X
πη∗ (a|x)
1
∗
∗
g(V, λ) = L(µη ; V, λ) =
µη (a|x) A(x, a) − λ − log
+ λ = λ. (25)
0 (a|x)
η
π
µ
x,a
Together, Equations (24) and (25) define the dual optimization problem in Proposition 2. The expression for the optimal policy in Equation (11) is obtained by inserting
the optimal advantage function A∗η into (23).
We remark that to recover the optimal stationary state-action distribution µ∗η , we
would have to insert the expression for the optimal policy πη∗ into Constraints (17)
and (18), and solve for the stationary state distribution νη∗ . However, this is not
necessary since µ∗η and νη∗ are not required to solve the dual function or to compute
the optimal policy.
Appendix B. The regularized Bellman operators
In this section, we define the regularized Bellman operator Tπ|π0 corresponding to the
policy π and regularized with respect to baseline π 0 as
!
X
π(a|x) X
0
0
π|π 0
P (x |x, a)V (x )
(∀x) .
+
Tη [V ](x) =
π(a|x) r(x, a) − log 0
π (a|x)
a
x0
Similarly, we define the regularized Bellman optimality operator T∗|π0 with respect to
baseline π 0 as
!!
X
X
1
0
Tη∗|π [V ](x) = log
π 0 (a|x) exp η r(x, a) +
P (y|x, a)V (y)
(∀x) ,
η
a
y
and the regularized greedy policy with respect to the baseline π 0 as
!!
0
Gπη [V ](a|x) ∝ π 0 (a|x) exp η r(x, a) +
X
P (y|x, a)V (y) − V (x)
.
y
With these notations, we can define the regularized relative value iteration algorithm
with respect to π 0 by the iteration
0
πk+1 = Gπη [Vk ]
0
Vk+1 (x) = Tη∗|π [Vk ](x) − δk+1
(26)
∗|π 0
for some δk+1 lying between the minimal and maximal values of Tη [Vk ]. A common
∗|π 0
technique is to fix a reference state x0 and choose δk+1 = Tη [Vk ](x0 ).
Similarly, we can define the regularized policy iteration algorithm by the iteration
∞
π0
πk+1 |π 0
πk+1 = Gη [Vk ]
Vk+1 (x) = Tη
[Vk ](x) − δk+1 ,
(27)
23
Neu Gómez Jonsson
with δk+1 defined analogously.
For establishing the convergence of the above procedures, it is crucial to ensure
∗|π 0
that the operator Tη is a non-expansion: For any value functions V1 and V2 , we
need to ensure
0
0
Tη∗|π [V1 ] − Tη∗|π [V2 ] ≤ kV1 − V2 k
for some norm. We state the following result claiming that the above requirement
indeed holds and present the simple proof below. We note that analogous results
have been proven several times in the literature, see, e.g., (Fox et al., 2016; Asadi and
Littman, 2016).
∗|π 0
is a non-expansion for the supremum norm kf k∞ = maxx |f (x)|.
P
Proof For simplicity, let us introduce the notation Q1 (x, a) = r(x, a)+ y P (y|x, a)V1 (y),
with Q2 defined analogously, and ∆ = Q1 − Q2 . We have
Proposition 5 Tη
∗|π 0
Tη
∗|π 0
[V1 ](x) − Tη
!
1
[V2 ](x) =
η
log
X
π 0 (a|x) exp (ηQ1 (x, y)) − log
X
π 0 (a|x) exp (ηQ2 (x, y))
a
a
P
0
π
(a|x)
exp
(ηQ
(x,
y))
1
1
=
log Pa 0
π
(a|x)
exp
(ηQ
η
2 (x, y))
Pa 0
exp (η (Q2 (x, y) + ∆(x, y)))
1
a π (a|x)
P 0
=
log
η
a π (a|x) exp (ηQ2 (x, y))
X
1
p(x, a) exp (η∆(x, a))
(with an appropriately defined p)
= log
η
a
1
log max exp (η∆(x, a))
a
η
X
= max ∆(x, a) = max
P (y|x, a) (V1 (y) − V2 (y))
≤
a
a
y
≤ max |V1 (y) − V2 (y)| .
y
With an analogous technique, we can also show the complementary inequality
0
0
Tη∗|π [V2 ](x) − Tη∗|π [V1 ](x) ≤ max |V2 (y) − V1 (y)| ,
y
which concludes the proof.
∗|π 0
Together with the easily-seen fact that Tη is continuous, this result immediately
∗|π 0
implies that Tη has a fixed point by Brouwer’s fixed-point theorem. Furthermore,
this insight allows us to treat the value iteration method (26) as an instance of
generalized value iteration, as defined by Littman and Szepesvári (1996).
∗|π 0
We now argue that regularized value iteration converges to the fixed point of Tη .
If the initial value function V0 is bounded, then so is Vk for each k since the operator
24
A unified view of entropy-regularized MDPs
∗|π 0
Tη is a non-expansion. Similar to Section 3, we assume without loss of generality
that the initial reference policy π0 has full support, i.e. π0 (a|x) > 0 for each recurrent
0
state x and each action a. Inspecting the greedy policy operator Gπη , it is easy to
show by induction that πk has full support for each k. In particular, πk+1 (a|x) only
equals 0 if either πk (a|x) equals 0 or if the exponent Ak (x, a) equals −∞, which is
only possible if Vk is unbounded.
Now, since πk has full support for each k, any trajectory always has a small
probability of reaching a given recurrent state. We can now use a similar argument as
Bertsekas (2007, Prop. 4.3.2) to show that regularized value iteration converges to the
∗|π 0
fixed point for Tη .
B.1. The proof of Lemma 3
Let µ and µ0 be the respective stationary distributions of π and π 0 . The statement
follows easily from using the definition of Aπη :
X
x,a
µ
0
(x, a)Aπη (x, a)
X
1 log π(a|x)
=
µ (x, a) r(x, a) −
−
ρ
e
(µ)
+
P (y|x, a)Vηπ (y) − Vηπ (x)
0
η log π (a|x)
x,a
y
!
X
X
µ0 (x, a)
P (y|x, a)Vηπ (y) − Vηπ (x)
= ρe(µ0 ) − ρe(µ) +
X
0
x,a
y
0
= ρe(µ ) − ρe(µ),
where the last step follows from the stationarity of µ0 .
B.2. Regularized policy gradient
Here we prove Lemma 4 which gives the gradient of the regularized average reward
ρeη (θ) when the policy πθ is parameterized on θ. Following Sutton et al. (1999), we
first compute the gradient of Vηπθ :
!
X
1
πθ (a|x)
r(x, a) − log 0
− ρeη (θ) +
P (y|x, a)Vηπθ (y)
η
π (a|x)
y
!
X
∂Vηπθ (y)
1
∂πθ (a|x) ∂ ρeη X
+
πθ (a|x) −
−
+
P (y|x, a)
.
ηπθ (a|x) ∂θi
∂θi
∂θi
a
y
∂Vηπθ (x) X ∂πθ (a|x)
=
∂θi
∂θi
a
25
!
Neu Gómez Jonsson
Rearranging the terms gives us
X
1
1
πθ (a|x)
r(x, a) − log 0
− ρeη (θ) +
P (y|x, a)Vηπθ (y) −
η
π (a|x)
η
y
∂ ρeη X ∂πθ (a|x)
=
∂θi
∂θi
a
+
X
πθ (a|x)
X
a
=
P (y|x, a)
y
X ∂πθ (a|x)
∂θi
a
Aπη θ (x, a)
+
!
∂Vηπθ (y) ∂Vηπθ (x)
−
∂θi
∂θi
X
πθ (a|x)
a
X
y
∂Vηπθ (y) ∂Vηπθ (x)
P (y|x, a)
−
.
∂θi
∂θi
P
The last equality follows from the fact that since a ∂πθ (a|x)/∂θi = 0 for each x,
we can add any state-dependent constant to the multiplier of ∂πθ (a|x)/∂θi ; adding
the term η1 − Vηπθ (x) results in the given expression. Summing both sides over the
stationary state distribution νπθ yields
∂ ρeη X
∂πθ (a|x) πθ
∂ ρeη X
=
νπθ (x)
=
νπθ (x)
Aη (x, a)
∂θi
∂θ
∂θ
i
i
x
x,a
+
XX
y
=
X
=
X
x,a
x,a
νπθ (x)πθ (a|x)P (y|x, a)
x,a
∂Vηπθ (y) X
∂Vηπθ (x)
−
νπθ (x)
∂θi
∂θi
x
X
∂Vηπθ (y) X
∂Vηπθ (x)
∂πθ (a|x) πθ
Aη (x, a) +
νπθ (y)
−
νπθ (x)
νπθ (x)
∂θi
∂θi
∂θi
y
x
νπθ (x)
∂πθ (a|x) πθ
Aη (x, a).
∂θi
To conclude the proof it is sufficient to note that
µπθ (x, a)
∂ log πθ (a|x)
µπ (x, a) ∂πθ (a|x)
∂πθ (a|x)
= θ
= νπθ (x)
.
∂θi
πθ (a|x)
∂θi
∂θi
B.3. The closed form of the TRPO update
Here we derive the closed-form solution of the TRPO update. To do so, we first briefly
summarize the mechanism of the algorithm. The main idea of Schulman et al. (2015)
is replacing ρ(µ0 ) by the surrogate
X
X
Lπ (π 0 ) = ρ(π) +
νπ (x)
π 0 (a|x)Aπ∞ (x, a),
x
a
26
A unified view of entropy-regularized MDPs
where Aπ∞ is the unregularized advantage function corresponding to policy π.
Furthermore, TRPO uses the regularization term
DTRPO (µkµ0 ) =
X
νµ0 (x)
X
x
πµ (a|x) log
a
6
πµ (a|x)
.
πµ0 (a|x)
The difference between L + DTRPO and ρ + DC is that the approximate version ignores
the impact of changing the policy π on the stationary distribution. Given this surrogate
objective, TRPO approximately computes the distribution
1
(28)
µk+1 = arg max Lµk (µ) − DTRPO (µkµk ) .
η
µ∈∆
Observing that the TRPO policy update can be expressed equivalently as
(
)
X
X
1
π(a|x)
π(a|x) Aπ∞k (x, a) − log
πk+1 = arg max
νµk (x)
,
η
πk (a|x)
π
a
x
we can see that the policy update can be expressed in closed form as
πk
πk+1 (a|x) ∝ πk (a|x)eηA∞ (x,a) .
This update then can be seen as a regularized greedy step with respect to the value
function of the previous policy πk .
6. This form is inspired by the well-known identity we state as Lemma 3.
27
| 2 |
Learning Policies for Adaptive Tracking with Deep Feature Cascades
Chen Huang
Simon Lucey
Deva Ramanan
Robotics Institute, Carnegie Mellon University
arXiv:1708.02973v2 [cs.CV] 13 Sep 2017
[email protected]
{slucey,deva}@cs.cmu.edu
Pixel layer +
correlation
filters
Abstract
Visual object tracking is a fundamental and time-critical
vision task. Recent years have seen many shallow tracking methods based on real-time pixel-based correlation filters, as well as deep methods that have top performance but
need a high-end GPU. In this paper, we learn to improve the
speed of deep trackers without losing accuracy. Our fundamental insight is to take an adaptive approach, where easy
frames are processed with cheap features (such as pixel values), while challenging frames are processed with invariant but expensive deep features. We formulate the adaptive
tracking problem as a decision-making process, and learn
an agent to decide whether to locate objects with high confidence on an early layer, or continue processing subsequent
layers of a network. This significantly reduces the feedforward cost for easy frames with distinct or slow-moving
objects. We train the agent offline in a reinforcement learning fashion, and further demonstrate that learning all deep
layers (so as to provide good features for adaptive tracking) can lead to near real-time average tracking speed of
23 fps on a single CPU while achieving state-of-the-art performance. Perhaps most tellingly, our approach provides a
100X speedup for almost 50% of the time, indicating the
power of an adaptive approach.
Deep convolutional layers
Template frame
Current frame
Easy frame
Agent Output at this layer
or forward to the next layer
Hard frame
Figure 1. Learning policies for adaptive tracking with deep feature
cascades. The agent decides whether we can accurately locate objects on an early layer of the cascade. This avoids the need to always wait for the last layer to make decisions, saving a substantial
amount of feed-forwarding time.
designing a tracker that has both high accuracy and high
speed. Real-time tracking methods like TLD [21] and correlation filters [19] usually rely on low-level features that
are not descriptive enough to disambiguate target and background. Several recent works [15, 27, 11, 31, 10] overcome
this limitation by learning correlation filters on hierarchical
deep features, but the real-time capacity largely fades away.
Other deep trackers [41, 30, 40] take full advantage of the
end-to-end learning, and fine-tune the deep network online
to achieve top performance. However, even on a high-end
GPU, the speed of such trackers is usually around 1 fps
which is too slow for practical use.
1. Introduction
Visual Object Tracking (VOT) is a fundamental problem
in vision. We consider the single object tracking task, where
an object is identified in the first video frame and should
be tracked in subsequent frames, despite large appearance
changes due to object scaling, occlusion, and so on. VOT is
the basic building block of many time-critical systems such
as video surveillance and autonomous driving. Thus it is
important for a visual tracker to meet the strict constraints
of time and computational budget, especially on mobile or
embedded computing architectures where real-time analysis perception is often required.
Although much progress has been made in the tracking literature, there still exist tremendous challenges in
Two recent deep trackers [3, 18] significantly boost their
speed by deploying fixed convolutional networks without
any online learning. During tracking, the pre-trained network is simply traversed in a feed-forward pass for similarity evaluation or location regression, allowing to track objects at real-time speeds on GPU. Nevertheless, on a modern CPU, smartphone or tablet with much less computing
power, such deep trackers can only process a couple of
frames per second, far below the normal video frame-rate
30 fps. Obviously, the major computational burden comes
from the forward pass through the entire network, and can
1
be larger with deeper architectures.
We aim to improve both the accuracy and speed of deep
tracking, instead of trading off the quality for speed by e.g.
using compressed models [1]. We propose to learn to speed
up deep trackers in an adaptive manner. Our adaptive approach builds on the observation that the tracking complexity varies across frames. For example, it is usually effective
to use features from the last layer of a deep network to track
objects undergoing large appearance change (e.g. abrupt
motion) - as these higher-level features are more tolerant
to dramatic appearance variation [27]. However, when the
object is visually distinct or barely moves, early layers are
in most scenarios sufficient for precise localization - offering the potential for substantial computational savings. In
the extreme case, the “zeroth” pixel-level layer may suffice
for such easy frames, as evidenced by the success of pixelbased correlation filters.
Such an adaptive strategy crucially depends on making
the right decision - should the tracker stop at the current
feature layer or keep computing features on the next layer?
To this end, we learn an agent to automatically achieve this
goal as illustrated in Fig. 1. The agent learns to find the target at each layer, and decides if it is confident enough to output and stop there. If not, it moves forward to the next layer
to continue. This is equivalent to learning a “timely” decision policy to choose the optimal layer for tracking. We will
show such policy learning is much more robust than heuristically thresholding the response map of the current active
layer. It is also in sharp contrast to the layer selection mechanism in [40], which only selects from two fixed levels of
convolutional layers after the entire forward pass is finished.
Instead, we formulate this problem as a decision-making
process, making sequential decisions with early stopping
ability. Specifically, we learn the policy in a reinforcement
learning [29] fashion during the training phase, and simply
apply the policy for adaptive tracking at test time.
In doing so, we are able to provide a speedup of around
10× (on average) over the baseline deep tracker [3] and
achieve even higher accuracies on existing OTB [43] and
VOT [22] tracking benchmarks. Perhaps most tellingly, our
approach provides a 100× speedup almost 50% of the time,
indicating the power of an adaptive approach - it turns out
that most frames are quite easy to track! Accuracy is improved because each layer of the network is directly trained
to be informative for adaptive tracking, similar to the past
approaches for “deep supervision” [25]. Concretely, our
adaptive tracker works by defining object templates across
multiple layers of a network, including the “zeroth” pixel
layer. Templates are evaluated across Region of Interest
(ROI) with a convolutional filter. We use fast correlation
filters [19] to compute response maps for lower layers of
our network, where Fourier processing significantly speeds
up the convolutional procedure (Fig. 1). We refer to our
approach as EArly-Stopping Tracker (EAST). On a single
CPU, it has a near real-time average speed of 23.2 fps, and
is about 190 fps almost 50% of the time. This makes it
the first CPU-friendly deep tracker among the top benchmark performers. It is worth noting that our policy learning method is quite generic. Further, it is readily applied
to train end-to-end with an existing deep network for other
time-critical vision tasks besides visual tracking.
2. Related Work
Real-time tracking and correlation filters: Visual tracking methods can rely on either generative (e.g. [32]) or
discriminative (e.g. [16]) models. Discriminative models
are often found to outperform in accuracy by discriminating the target from background. Such trackers can usually run fast using hand-crafted features (e.g. HOG [9]) and
various learning methods of P-N learning [21], structured
SVM [16], multi-expert entropy minimization [45], and correlation filter [4].
Among them, Discriminative Correlation Filter (DCF)based methods [4, 19] are the family of tracking methods
with high efficiency and high accuracy as well. The fast
speed of DCF is due to its efficient use of all spatial shifts
of a training sample by exploiting the discrete Fourier transform. The pioneering MOSSE [4] and improved Kernelized
Correlation Filter (KCF) [19] trackers can operate at 669 fps
and 292 fps respectively on a single CPU, which far exceeds
the real-time requirement. Recent advances of DCF have
achieved great success by the use of multi-feature channels [14, 15, 27, 11, 31, 10], scale estimation [13, 26], longterm memory [28], and boundary effect alleviation [11, 12].
However, with increasing accuracy comes a dramatic decrease in speed (0.3–11 fps on a high-end GPU).
Tracking by deep learning: Directly applying correlation
filters on the multi-dimensional feature maps of deep Convolutional Neural Networks (CNNs) is one straight-forward
way of integrating deep learning for tracking. Usually the
deep CNN is fixed, and the DCF trackers trained on every convolutional layer are combined by a hierarchical ensemble method [27] or an adaptive Hedge algorithm [31].
Danelljan et al. [15] recently introduced a continuous spatial domain formulation C-COT, to enable efficient integration of multi-resolution deep features. C-COT and its improved ECO [10] can achieve top performance in the VOT
challenge [22], but the tracking speed is still slow due to the
high dimension of the entire deep feature space.
Another category of deep trackers [41, 30, 40] update
a pre-trained CNN online to account for the target-specific
appearance at test time. Such trackers usually take a classification approach to classify many patches and choose the
highest scoring one as the target object. Unfortunately, online training and exhaustive search severely hamper their
speed. The top performing tracker MDNet [30] has the
GPU speed of only 1 fps or so. Recent advances include
using Recurrent Neural Networks (RNNs) [20, 7] to model
temporal information using an attention mechanism, but the
speed remains slow.
One common reason for the slow speed of the abovementioned deep trackers is they always conduct a complete
feed-forward pass to the last CNN layer. This ignores the
fact that the tracking complexity differs across varying conditions. One of our conclusions is that most frames in current video benchmarks are rather easy. For those frames,
forwarding to only early layers may suffice. In principle,
such an insight can be used to speed up many recent realtime deep trackers, such as GOTURN [18] (165 fps on
GPU) and SiamFC [3] (86 fps on GPU), to make them more
CPU-friendly with near frame-rate speed.
Feature selection in tracking: Good features are important
to tracking. The initial DCF trackers were limited to a single feature channel, e.g. a grayscale image in MOSSE [4].
The DCF framework was later extended to multi-channel
features such as HOG [13, 19], Haar-like features [16], binary patterns [21] and Color Attributes [14]. Generally, the
hand-crafted features are cheap to compute, but they are not
discriminative enough to handle complex tracking scenarios. Many recent deep trackers (e.g. [41, 30]) exploit the
semantically robust features from the last CNN layer (fullyconnected). However, spatial details of the tracked object
are lost in the last layer which is not optimal for visual tracking. Danelljan et al. [11] found the first convolutional layer
is very suitable for tracking. Other works [15, 27, 31, 10]
choose to utilize all the hierarchical convolutional features,
where early layers can preserve high spatial resolution and
deep layers are more discriminative.
In this paper, we make the best of hand-crafted and deep
convolutional features in a cascaded structure, and learn an
agent to select a minimum sequence of feature layers for
fast tracking purposes. Unlike FCNT [40] that selects features from two pre-defined layers only after a complete forward pass, our selection is sequential and can stop early at
any layer with enough confidence.
Feature cascades: CNNs are a natural cascaded architecture with increasingly abstract feature representations. Contemporary works either improve the cascade’s optimality by
deep layer supervision [25], or stack multiple CNNs into a
deeper cascade for coarse-to-fine [35] or multi-task [8] predictions. Our work differs in learning a decision policy of
using only early feature layers in a cascade, and in combining feature cascades and reinforcement learning [36] to
achieve this goal. Our approach bears some similarity to the
“attentional cascade” structure [39] which uses a cascade of
gradually more complex classifiers. The difference is that
attentional cascade aims to use early classifiers to eliminate
easy negatives and reduce the burden of complex classifier
evaluation, whereas we aim to use these early layers to make
a strong decision as early as possible.
Reinforcement learning for tracking: Reinforcement
learning (RL) [29, 36] is capable of learning good policies
to take a sequence of actions based on trail and error. It
has been successfully applied to vision tasks (e.g. object detection [5]) by treating them as a decision-making process.
For visual tracking, there are two recent works that use RL
to temporally attend target regions [44] and select suitable
template [6]. Our work is the first one to use RL to learn an
early decision policy for speeding up deep tracking.
3. Method
We use the deep Convolutional Neural Network (CNN)
as a rich feature cascade for robust visual tracking. Given
an input video frame at time t, the process of tracking an
object with bounding box can be seen as the problem of
maximizing a confidence function fl : Ht → R over the set
of hypothesized object regions Rt :
rt∗ = arg max fl (r),
r∈Ht
(1)
where Ht usually consists of regions around the object location in the previous frame, and l denotes the feature layer at
which the object confidence is obtained. Many deep trackers [41, 30] exploit l = L as the last fully-connected layer
or last convolutional layer of AlexNet [24] or deeper VGGNet [34]. Other trackers [15, 27, 31, 10] exploit a full layer
set {l}L
l=1 of all the convolutional layers to take the best advantage of feature hierarchies. While these methods have
been successful and effective, they are still slow and may
not be needed when tracking during easy frames.
In this paper, we propose a principled sequential method
that accumulates confidence fl=1,...,Lt (r) from an adapt
tively small set of feature layers {l}L
l=1 in order to track
efficiently without losing accuracy. For example, Lt = 2
convolutional layers C1–C2 can suffice to track a distinct
face in Fig. 3; but for a blurry face in cluttered backgrounds,
we may want to gather more evidence from a deeper layer
C5. During such sequential search, our method needs to
adjust the bounding box to progressively localize the object
using more and more robust features. Ideally, we would
like to minimize the number of forwarded layers necessary
to locate objects. A naive approach might use a heuristic for
determining when to advance to the next layer: for example, one might advance if the maximum value of the current
response map is below a threshold. However, defining such
heuristics can be difficult when the response map is ambiguous or has multiple peaks (e.g. Fig. 3). Instead, we propose
to train a functioning agent end to end by deep reinforcement learning [29]. The agent learns the action and search
policy (including the early stopping criteria) so that it can
make decisions under uncertainty to reach the target. Fig. 2
shows the framework of our policy learning.
Pixel
layer
Template frame
Cropped image
127*127*3
HOG
layer
Deep convolutional layers
C2
C3
C4
C1
6*6*128
Q-Net
C5
Global
scaling
Action history
32-d
17*17
Averaged
128-d 128-d
score map
8 actions
Q-Net
Q-Net
Q-Net
Q-Net
Q-Net
Q-Net
Local
scaling
Reshaped Fully-connected
layers
score
289-d
Current frame
Search image
255*255*3
No
scaling
22*22*128
Stop
Figure 2. System framework of our EArly-Stopping Tracker (EAST) by policy learning.
C1
C2
C1
C2
C3
C4
C5
1
1,2
0
0
4,5
2,3
1
0
3
2
0,1
More examples of used
layers and box actions
Figure 3. Example sequences of actions taken to adjust the bounding box scale over deep convolutional layers. Box translation is determined
by the relative position of maximum score on the score map. Note each score map is averaged with all the maps from preceding layers. Our
agent learns to wisely act upon the score maps. It terminates the search early if the confidence score is highly peaked. When the score map
is ambiguous (e.g. has two peaks for a blurry face in cluttered backgrounds), the agent postpones decision and enlarges the box according
to the more unambiguous score map at the next layer. Further actions of box scaling are performed with stronger confidence.
3.1. Fully-Convolutional Siamese Network
In this section, we review the fully-convolutional
Siamese tracker [3], which we make use of for its good
trade-off between speed (86 fps on GPU) and accuracy in
exploiting deep convolutional layers. Other trackers are either too slow [15, 27, 31, 10] as a baseline (<11 fps on
GPU), or do not provide explicit response maps (direct regression instead in [18]) for our policy learning purposes.
The Siamese network [3] is trained offline to locate a
127 × 127 template image z within a larger 255 × 255
search image x. A similarity function is learned to compare the template image z to a candidate region of the same
size in the search image x, so as to return a high score for the
truth region and low score otherwise. Such similarity evaluation is fully-convolutional with respect to x in the network,
much more efficient than exhaustive search. Specifically, a
cross-correlation layer is proposed to compute similarity for
all translated sub-regions in x in one pass:
Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI,
(2)
where ϕl is the convolutional feature embedding at layer
l = 5 (i.e. C5 layer), and v ∈ R is an offset value. Here
Fl (·, ·) is a confidence score map of size 17×17, as opposed
to the single confidence score fl (·) in Eq. 1.
During tracking, this Siamese network simply evaluates
the similarity online between the template image in previous frame and the search region in current frame, leading to
fast speed. The relative position of the maximum score multiplied by the stride of the network, gives the object translation from frame to frame.
Our goal is to learn an early decision policy from these
confidence score maps Fl , to adaptively 1) predict the object bounding box across layers, and 2) stop early at a layer
l < 5 when sufficiently confident about the prediction. Note
the score map dimension depends on the size of input feature maps. The score map Fl on an early layer l will have
a larger resolution than 17 × 17, and so we downsample to
this size to facilitate learning. Also, SiamFC [3] searches
over multiple scales of the search image to handle scale
variations. We only work on the original scale for high
efficiency, and learn to gradually infer the box scale from
heatmaps computed during the single forward-pass.
3.2. Learning Policies with Reinforcement Learning
We treat the tracking problem as a Markov Decision Process (MDP) where an agent can make a sequence of actions
across feature layers, see Fig. 2. This agent learns when to
stop advancing to the next layer, as well as how to to gradually deform a bounding box once per layer, which is initialized to the estimated box from the previous frame. The
ultimate goal is to output a tight box around the object with
as few as layers as possible. The challenge is to be able to
operate with rewards that rule out supervision at each step,
and at the same time, to minimize the number of steps to
locate the target given its changing complexity.
We train the agent in a reinforcement learning (RL) setting to learn decision policies. In the RL setting there are a
set of states S and actions A, and a reward function R. At
each step on layer l, the agent examines the current state Sl ,
and decides on the action Al to either transform the box or
stop with a box output. The action Al is expected to reduce
the uncertainty in localizing the object, and receives positive or negative reward Rl reflecting how well the current
box covers the object and how few steps are used before action stop. By maximizing the expected rewards, the agent
learns the best policy to take actions and can explicitly balance accuracy (search for more layers) and efficiency (stop
early if highly confident).
Actions: Our action set A includes seven anisotropic scaling transformations to a box and one stop action to terminate search. We do not use the agent to predict the centroid
of the box, and instead compute it directly from the relative
position of the maximum score on score map as in Eq. 1.
We also experimented with requiring the agent to report
box translations, but found directly inferring them from the
score maps simplified training and increased convergence
(due to the smaller space of actions A).
For scaling actions, there are two global and four local
(modify aspect ratio) transformations as shown in Fig. 2.
Similar to [5], any of these actions makes a combined horizontal and vertical change to the box by a factor of 0.2
relative to its current size. We also introduce a no scaling
action that does not scale the box at all. This action allows
the agent to postpone decision when the current score map
is ambiguous or a decision simply cannot be made. Fig. 3
exemplifies this case where two peaks exist on the first-layer
score map for a cluttered scene. The agent decides not to act
on this map but waits for a more unambiguous map at the
next layer to act (enlarge the box).
States: The state Sl is represented as a tuple (Fl0 , hl ), where
Fl0 is the score map and hl is a vector of the history of taken
Pl
actions. We define Fl0 = k=1 Fk /l as the average of the
score map at current layer l and all its preceding maps from
earlier layers. Thus Fl0 not only encodes the currently observed confidence but also the confidence history that has
been collected. This is found to work better empirically than
using Fl only, and is similar to the hypercolumn representation [17] with the benefits of simultaneously leveraging
information from early layers that capture fine-grained spatial details and deeper layers that capture semantics. Also,
the resulting robustness comes at a negligible cost in averaging the score maps already obtained. The history vector hl
keeps track of the past 4 actions. Each action in the vector is
represented by an 8-dimensional one-hot vector or zero vector (when processing the first layer). We find that including
hl ∈ R32 helps stabilize action trajectories.
Rewards: The reward function R(Sl−1 , Sl ) reflects the localization accuracy improvement from state Sl−1 to Sl after taking a particular action Al . The accuracy is measured
by the Intersection-over-Union (IoU) between the predicted
box b and ground-truth box g. We can formally define IoU
as IoU (b, g) = area(b ∩ g)/area(b ∪ g). Since each state
Sl is associated with a box bl , the reward function is then
defined following [5]:
sign(IoU (bl , g) − IoU (bl−1 , g)), Al 6= stop
R(Sl−1 , Sl ) = +3,
IoU (bl , g) ≥ 0.6, Al = stop
−3,
IoU (bl , g) < 0.6, Al = stop,
(3)
where the accuracy improvement is quantized to ±1 if the
current action is not stop. This reward scheme encourages
positive transformations even with small accuracy improvement. If there is no transformation for further improvement,
or if the agent already arrives at the last layer l = L, the action should be stop. In this case, the reward function will
penalize the predicted box bl with IoU less than 0.6. Note
such a reward scheme implicitly penalizes a large number
of layers l since Q-learning (detailed next) models the expected future rewards when deciding on an action (positive
or negative).
Deep Q-learning: The optimal policy of selecting actions
should maximize the sum of expected rewards on a given
frame. Since we do not have a priori knowledge about
the correct layer or action to choose, we address the learning problem through deep Q-learning [29]. This approach
learns an action-value function Q(Sl , Al ) to select the action Al+1 that gives the highest reward at each layer. The
learning process iteratively updates the action-selection policy by:
Q(Sl , Al ) = R + γ max
Q(S 0 , A0 ),
0
A
(4)
where Q(S 0 , A0 ) is the future reward and γ the discount factor. The function Q(S, A) is learned by a deep Q-Network
as illustrated in Fig. 2. It takes as input the state representation S, i.e. the reshaped score vector and action history
vector. The network consists of two 128-dimensional fullyconnected layers, finally mapping to 8 actions. Each fully-
connected layer is randomly initialized, and is followed by
ReLU and dropout regularization [24].
Note during training, we not only update the weights of
the Q-Network, but also the pre-trained convolutional layer
when the agent receives rewards on that layer. Similar to the
deeply-supervised net [25], our approach provides a direct
target signal for learning the feature representation at each
layer, so as to improve performance of our adaptive tracker.
Testing with learned policies: During testing, the agent
does not receive rewards or update the Q-function. It just
follows the decision policy to deform the box and output it
when a stop action is performed. Our agent takes only 2.1
steps on average to locate the target between frames on the
OTB-50 dataset [42]. This means we can correctly track
most objects by using 2 deep layers. Only for those hard
frames, the search degenerates to a full forward pass. The
overall tracking algorithm follows SiamFC [3] to search
over candidate regions around the estimated location from
previous frame. As a result, one order of magnitude speedups are achieved over traditional non-adaptive deep trackers. Set aside efficiency, the policies are still appealing in
that they mimic the dynamic attention mechanism by progressively attending to the target region in feature cascades.
Implementation details: We use the AlexNet [24]-like
convolutional architecture as in SiamFC [3]. The whole network including Q-Net is trained on the ImageNet Video [33]
trainval set (4417 videos) for 50 epochs, each completed
after the agent has interacted with all training images.
We make use of an -greedy [36] optimization during Qlearning, taking a random action with probability to encourage exploration of diverse action policies. We anneal
linearly from 1 to 0.1 over the first 30 epochs, and fix to
0.1 in the remaining 20 epochs. We use a learning rate 1e-3,
discount factor γ = 0.9 and batch size 64. The network parameters are updated with direct stochastic gradient descent
using MatConvNet [38] on a single NVIDIA GeForce Titan
X GPU and an Intel Core i7 CPU at 4.0GHz.
3.3. Learning with cheap features
Our policy learning can be applied to a feature cascade
with any type of feature layers. We explore the use of additional cheap feature layers after the pixel-layer and before
the more expensive deep layers. Inspired by the success of
correlation filters defined on multi-channel HOG layers [9],
we explore an optional HOG layer. In theory, other cheap
features such as Color Attributes [14] might apply. When
processing our pixel and HOG layers, we make use of fast
correlation filters. We specifically make use of the Dual
Correlation Filter (DCF) [19], which exhibits a good tradeoff in CPU speed (270+ fps on CPU) and accuracy compared to alternatives such as the Kernelized Correlation Filter (2× slower), STC [46] (350 fps but lower accuracy) and
SRDCF [12] (5 fps).
4. Results
Before comparing our EArly-Stopping Tracker (EAST)
with prior works, we first conduct an ablation study of some
of its important variants. We compare EAST to variants using different feature cascades—EAST-Pixel-HOG, EASTHOG, EAST-Pixel, as well as the baseline SiamFC [3].
Fig. 4 shows the probability of stopping at different feature
layers and the associated speed on OTB-50 [42]. EAST indeed learns to use only early layers over 70% of the time,
as they suffice when tracking easy frames. Hard frames
are processed with additional layers, degenerating to a full
forward-pass (as in SiamFC) only when needed. Fig. 5 illustrates some examples of easy and hard frames (and their
stopped layers) on particular video sequences.
Obviously, the earlier layer we stop at, the greater the
speedup. EAST-Pixel-HOG (which lacks a pixel or HOG
layer) is about 4.5× faster than SiamFC on average, running at 10.7 fps on a CPU and 467.3 fps on a GPU. Recall that Pixel and HOG layers can be processed by fast
correlation filters [19] that run at 278 fps and 292 fps, respectively. By adding such layers, EAST achieves a CPU
speedup of 10× on average and 100× for those easy frames.
Even though HOG may incur an additional feature computation cost compared to the Pixel layer, it produces a greater
speedup because it enables more accurate pruning, and so
is selected more often by EAST. Note that the average GPU
speed is sacrificed to some extent due to larger reliance on
CPU computations. Nonetheless, EAST still produces a
near-real-time CPU rate of 23.2 fps, making it quite practical for CPU-bound tracking (required on many embedded
devices).
Table 1 (top) summarizes the speed and accuracy of these
EAST variants. We use the Overlap Success (OS) rate as a
strict evaluation metric for accuracy. One-Pass Evaluation
(OPE) is employed to compare accuracies in terms of Area
Under the Curve (AUC) of OS rates for different threshold
values. Table 1 shows that the use of more and stronger
feature layers systematically improves the accuracy of the
tracker, reaching to the AUC score of 0.638 for our full
EAST model. Speed is also improved due to the larger computational savings on cheap layers.
Table 1 (middle) further compares other EAST variants:
• EASTlast : tracking by always forwarding to the last
feature layer.
• EASTth : feed-forwarding if the maximum value of the
current response map is lower than 0.9. Scale is determined by the size of thresholded region.
• EAST−ch : policy learning without confidence hisPl
tory, i.e. we use Fl instead of Fl0 = k=1 Fk /l.
• EAST−ah : policy learning without action history hl .
EASTlast is similar to the baseline SiamFC [3] in that all
layers are always processed, but differs in that it is trained
Avg.
speed
SiamFC [3] with 3 scale-search
CPU: 1.9 fps
GPU: 86 fps
Stopping probability
1
EAST-Pixel-HOG
CPU: 10.7 fps GPU: 467.3 fps
EAST-HOG
CPU: 14.5 fps GPU: 197.6 fps
EAST-Pixel
CPU: 19.9 fps GPU: 223.6 fps
EAST
CPU: 23.2 fps GPU: 158.9 fps
0.6
0.6
0.6
0.6
0.8
0.5
0.5
0.5
0.5
0.6
0.4
0.4
0.4
0.4
0.3
0.3
0.3
0.3
0.2
0.2
0.2
0.2
0.1
0.1
0.1
0.1
0
0
0
0.4
0.2
0
C1
C2
C3
C4
C5
C1 C2 C3 C4 C5
CPU
10.7x 5.2x 3.3x 2.4x 2.0x
speedup
Pixel C1 C2 C3 C4 C5
CPU
98.7x 7.9x 4.5x 3.2x 2.2x 1.9x
speedup
HOG C1 C2 C3 C4 C5
CPU
101.3x 8.0x 4.5x 3.2x 2.2x 2.0x
speedup
0
CPU
speedup
Pixel HOG C1 C2 C3 C4 C5
98.7x 62.4x 6.2x 3.9x 2.9x 2.0x 1.8x
Figure 4. Stopping probability at different feature layers and the resulting speed on OTB-50 dataset [42]. For each of the 5 models with
different feature cascades, we show the average speed on both CPU and GPU (top), and the CPU speedup ratio over the baseline SiamFC [3]
(1.9 fps) at each layer (bottom). SiamFC searches over multi-scaled images to handle scale variations, while we predict the scale in a single
forward-pass, leading to a constant tracking speedup. Our early stopping policy further accelerates tracking (4.5×) by adaptively using
early layers as compared to SiamFC that always uses the last layer C5. When the early layer is the cheap HOG or pixel layer with fast CPU
speed (270+ fps), we are able to increase the average CPU speed by one order of magnitude and operate at around 100× faster speed for
almost 50% of the time. Our full model EAST operates at near real-time speed 23.2 fps on CPU. On the other hand, it is found the more
reliance on CPU computations will generally increase the CPU speed, but also lose the benefits of GPU speed to some acceptable extent.
C5
C4
C3
C2
C1
HOG
Pixel
C5
C4
C3
C2
C1
HOG
Pixel
Table 1. One-Pass Evaluation (OPE) results of Area Under the
Curve (AUC) score and speed (CPU/GPU fps) on OTB-50 dataset.
frame 50
frame
100
50
150
100
200
150
250
200
300
350
250
400
300
450
Method
EAST-Pixel-HOG
EAST-HOG
EAST-Pixel
EASTlast
EASTth
EAST−ch
EAST−ah
SiamFC [3]
EAST
AUC
0.619
0.628
0.631
0.645
0.597
0.621
0.610
0.612
0.638
Speed
10.7 / 467.3
14.5 / 197.6
19.9 / 223.6
3.4 / 76.3
45.7 / 172.0
21.1 / 137.2
17.4 / 127.6
1.9 / 86
23.2 / 158.9
350
Figure 5. Stopped feature layers for the frames in videos David
(frames 300-770 of the original video) and Tiger2. Easy and hard
frames are marked in green and red.
with deep supervision and does not require an image pyramid to model scale. As a result, it both works better and
faster (in CPU terms) than SiamFC. Interestingly, EASTlast
outperforms EAST but is much slower. This suggests that
our adaptive strategy is slightly hurting accuracy. EASTth
makes use of manually-designed heursitics for stopping,
avoiding the need to predict actions with a Q-Net, making it
2× faster on CPU. However, heuristic policies fail to work
as well as the one learned by Q-learning. Finally, eliminating scoremap and action histories also hurts performance,
likely because such histories stabilize the search process.
OTB-50 results: The OTB-50 [42] benchmark contains
50 video sequences for evaluation. Table 2 compares the
AUC scores of our EAST and the state-of-the-art trackers: TLD [21], GOTURN [18], Struck [16], KCF [19],
DSST [13], MEEM [45], RTT [7], FCNT [40], Staple [2],
HDT [31], HCF [27], LCT [28], SiamFC [3] and SINT [37].
CPU/GPU speeds (fps) are also reported.
EAST achieves the highest AUC of any method. It
does so while being significantly faster. For example, the
runner-up SINT is 4 fps on GPU, while other GPU-based
real-time deep trackers (GOTURN and SiamFC) are significantly slower on a CPU (2-3 fps). When compared to
fast correlation trackers e.g. KCF defined on cheap features,
EAST is significantly more accurate while still maintaining
near-real-time speeds. This is in contrast to correlation filters defined on deep features (HCF and HDF), who are not
real-time even with a GPU. The Staple tracker combines
HOG and color features by a ridge regression, while FCNT
tracks by selecting features from deep layers. EAST outperforms both in terms of accuracy. The Recurrently Targetattending Tracker (RTT) trains Recurrent Neural Networks
(RNNs) to capture attentions as a regularization on correlation filter maps. However, it is noticeably slower and less
accurate than EAST (3 fps on CPU, and an AUC of 0.588).
OTB-100 results: The OTB-100 [43] dataset is the extension of OTB-50 and is more challenging. We test on
the full 100 videos to compare with recent related trackers: RDT [6], SRDCF [12], MDNet [30], C-COT [15],
ECO [10]. Table 3 summarizes their AUC scores and
Table 2. The Area Under the Curve (AUC) score for One-Pass Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU
speed) on the OTB-50 dataset. The best results are shown in bold.
Method
AUC
Speed
TLD
[21]
0.438
22
GOTURN
[18]
0.450
165*
Struct
[16]
0.474
10
KCF
[19]
0.516
172
DSST
[13]
0.554
24
MEEM
[45]
0.572
10
RTT
[7]
0.588
3
Table 3. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE), and speed (fps, * indicates GPU speed, otherwise CPU speed) on the OTB-100 dataset. The best results are
shown in bold.
Method
AUC
Speed
RDT
[6]
0.603
43*
SRDCF
[12]
0.605
5
MDNet
[30]
0.685
1*
C-COT
[15]
0.686
0.3
ECO
[10]
0.694
6
EAST
0.629
23/159*
FCNT
[40]
0.599
3*
Staple
[2]
0.600
80
HDT
[31]
0.603
10*
HCF
[27]
0.605
11*
LCT
[28]
0.612
27
SiamFC
[3]
0.612
86*
SINT
[37]
0.625
4*
EAST
0.638
23/159*
Table 4. Raw scores and speed for our method and the top 4 trackers of the VOT-15 Challenge. The * indicates the speed in EFO
units. The CPU/GPU speeds for our EAST are given.
Tracker
MDNet [30]
EAST
DeepSRDCF [11]
EBT [47]
SRDCF [12]
Accuracy
0.60
0.57
0.56
0.47
0.56
Robustness
0.69
1.03
1.05
1.02
1.24
Overlap
0.38
0.34
0.32
0.31
0.29
Speed (fps)
1
21/148
<1*
5
5
35
30
Overall Rank
DCF
25
20
15
10
EAST
5
0
0
EASTlast
0.2
0.4
0.6
0.8
1
Runtime (EFO/frame)
Figure 6. Overall rank and runtime of our tracker (red) in comparison to the 38 trackers from VOT-14 Challenge. We show the
results of EAST and its two variants that always forward to the first
(i.e. DCF on pixel layer) and last (i.e. EASTlast ) feature layer.
CPU/GPU speeds. EAST is close to state-of-the-art in terms
of accuracy and is the fastest among the top performers
on OTB-100. The MDNet and correlation-filter-based advances SRDCF, C-COT and ECO all suffer from low speed,
while EAST does not sacrifice the run-time performance for
accuracy. RDT is a related Reinforcement Learning (RL)based method that selects the best template to track a given
frame. EAST (which also makes use of RL) proves more
accurate while being 4× faster on a GPU.
VOT-14 results: We test EAST on the 25 videos from
the VOT-14 [23] Tracking Challenge. Fig. 6 compares the
speed and overall rank of EAST to that of the 38 tracker submissions. For the rank computation, the challenge first evaluates the average accuracy and robustness ranking (refer to
the supplementary material for details) for each tracker, and
then averages the two rank values to get the overall rank. As
can be seen from Fig. 6, EAST achieves the best accuracyspeed trade-off, outperforming all competitors in the overall
rank. We also show two EAST variants at the opposite extreme: always forwarding to the first (i.e. DCF [19] on pixel
layer) and last (i.e. EASTlast ) feature layer. Our EAST is
able to adaptively take advantage of the speed and accuracy
benefits of two variants by policy learning.
VOT-15 results: The VOT-15 [22] Tracking Challenge has
60 testing videos chosen from a pool of 356. Trackers are
automatically re-initialized five frames after failure (zero
overlap). Table 4 compares our EAST with the top 4 trackers in terms of accuracy and speed (using the vot2015challenge toolkit). Our testing speed on this benchmark
are 21 fps on CPU and 148 fps on GPU, making EAST the
fastest and most CPU-friendly tracker among the top performers. We achieve comparable accuracy scores to MDNet, while providing a 148× speedup on GPU, indicating
the power of our adaptive policy learning approach.
5. Conclusion
This paper proposes an adaptive approach to tracking
with deep feature cascades. Our fundamental insight is that
most frames in typical tracking scenarios turn out to be easy,
in that simple features (such as pixels or HOG) suffice. That
said, some challenging frames do require “heavy-duty” invariant feature processing. The challenge is in determining which is which! By formulating the tracking problem
as a decision making process, we learn a reinforcementlearning agent that can make such distinctions. Importantly,
the agent learns to do so in an iterative manner, making efficient use of a feature cascade that proceeds to deeper layers only when the current one does not suffice. This dramatically reduces the feed-forwarding cost for those easy
frames (by 100X), leading to an overall significant speedup
for tracking. Such a policy learning method is appealing in
that it is trained end-to-end and can be applied to any deep
network designed for time-critical tasks.
Acknowledgment: This research was supported in part by
NSF grants CNS-1518865, IIS-1618903 and IIS-1526033
and the DARPA grant HR001117C0051. Additional support was provided by the Intel Science and Technology Center for Visual Cloud Systems (ISTC-VCS), Google, and Autel. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and
do not necessarily reflect the view(s) of their employers or
the above-mentioned funding sources.
References
[1] A. Alfvén. Object tracking with compressed networks. Master’s Theses in Mathematical Sciences, Mathematics (Faculty of Technology) and Numerical Analysis, Lund University, 2016.
[2] L. Bertinetto, J. Valmadre, S. Golodetz, O. Miksik, and
P. H. S. Torr. Staple: Complementary learners for real-time
tracking. In CVPR, 2016.
[3] L. Bertinetto, J. Valmadre, J. F. Henriques, A. Vedaldi, and
P. H. S. Torr. Fully-convolutional siamese networks for object tracking. In ECCV, 2016.
[4] D. S. Bolme, J. R. Beveridge, B. A. Draper, and Y. M. Lui.
Visual object tracking using adaptive correlation filters. In
CVPR, 2010.
[5] J. C. Caicedo and S. Lazebnik. Active object localization
with deep reinforcement learning. In ICCV, 2015.
[6] J. Choi, J. Kwon, and K. M. Lee. Visual tracking by reinforced decision making. arXiv preprint, 1702.06291, 2017.
[7] Z. Cui, S. Xiao, J. Feng, and S. Yan. Recurrently targetattending tracking. In CVPR, 2016.
[8] J. Dai, K. He, and J. Sun. Instance-aware semantic segmentation via multi-task network cascades. In CVPR, 2016.
[9] N. Dalal and B. Triggs. Histograms of oriented gradients for
human detection. In CVPR, 2005.
[10] M. Danelljan, G. Bhat, F. S. Khan, and M. Felsberg. ECO:
efficient convolution operators for tracking. In CVPR, 2017.
[11] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Convolutional features for correlation filter based visual tracking.
In ICCV Workshop, 2015.
[12] M. Danelljan, G. Häger, F. S. Khan, and M. Felsberg. Learning spatially regularized correlation filters for visual tracking. In ICCV, 2015.
[13] M. Danelljan, G. Hger, F. Shahbaz Khan, and M. Felsberg.
Accurate scale estimation for robust visual tracking. In
BMVC, 2014.
[14] M. Danelljan, F. S. Khan, M. Felsberg, and J. v. d. Weijer.
Adaptive color attributes for real-time visual tracking. In
CVPR, 2014.
[15] M. Danelljan, A. Robinson, F. Shahbaz Khan, and M. Felsberg. Beyond correlation filters: Learning continuous convolution operators for visual tracking. In ECCV, 2016.
[16] S. Hare, A. Saffari, and P. H. S. Torr. Struck: Structured
output tracking with kernels. In ICCV, 2011.
[17] B. Hariharan, P. Arbelez, R. Girshick, and J. Malik. Hypercolumns for object segmentation and fine-grained localization. In CVPR, 2015.
[18] D. Held, S. Thrun, and S. Savarese. Learning to track at 100
fps with deep regression networks. In ECCV, 2016.
[19] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista. Highspeed tracking with kernelized correlation filters. TPAMI,
37(3):583–596, 2015.
[20] S. E. Kahou, V. Michalski, and R. Memisevic. RATM: recurrent attentive tracking model. In CVPRW, 2017.
[21] Z. Kalal, K. Mikolajczyk, and J. Matas. Tracking-learningdetection. TPAMI, 34(7):1409–1422, 2012.
[22] M. Kristan, J. Matas, A. Leonardis, M. Felsberg, L. Čehovin,
G. Fernandez, T. Vojir, G. Häger, G. Nebehay, and
R. Pflugfelder. The visual object tracking VOT2015 challenge results. In ICCV 2015 Workshop, 2015.
[23] M. Kristan, R. Pflugfelder, A. Leonardis, J. Matas, L. Cehovin, G. Nebehay, T. Vojir, G. Fernandez, A. Lukezic, and
A. Dimitriev. The visual object tracking VOT2014 challenge
results. In ECCV 2014 Workshop, 2014.
[24] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks. In
NIPS, 2012.
[25] C.-Y. Lee, S. Xie, P. W. Gallagher, Z. Zhang, and Z. Tu.
Deeply-supervised nets. In AISTATS, 2015.
[26] Y. Li and J. Zhu. A scale adaptive kernel correlation filter
tracker with feature integration. In ECCV Workshop, 2014.
[27] C. Ma, J.-B. Huang, X. Yang, and M.-H. Yang. Hierarchical
convolutional features for visual tracking. In ICCV, 2015.
[28] C. Ma, X. Yang, C. Zhang, and M.-H. Yang. Long-term
correlation tracking. In CVPR, 2015.
[29] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness,
M. G. Bellemare, A. Graves, M. Riedmiller, and A. K. Fidjeland et al. Human-level control through deep reinforcement
learning. Nature, 518(7540):529–533, 2015.
[30] H. Nam and B. Han. Learning multi-domain convolutional
neural networks for visual tracking. In CVPR, 2016.
[31] Y. Qi, S. Zhang, L. Qin, H. Yao, Q. Huang, J. Lim, and M.-H.
Yang. Hedged deep tracking. In CVPR, 2016.
[32] D. A. Ross, J. Lim, R.-S. Lin, and M.-H. Yang. Incremental
learning for robust visual tracking. IJCV, 77(1-3):125–141,
2008.
[33] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh,
S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein,
A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual
Recognition Challenge. IJCV, 115(3):211–252, 2015.
[34] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. In ICLR, 2015.
[35] Y. Sun, X. Wang, and X. Tang. Deep convolutional network
cascade for facial point detection. In CVPR, 2013.
[36] R. Sutton and A. Barto. Reinforcement Learning: An introduction. MIT Press, 1998.
[37] R. Tao, E. Gavves, and A. W. M. Smeulders. Siamese instance search for tracking. In CVPR, 2016.
[38] A. Vedaldi and K. Lenc. Matconvnet: Convolutional neural
networks for matlab. In ACM MM, 2015.
[39] P. Viola and M. Jones. Rapid object detection using a boosted
cascade of simple features. In CVPR, 2001.
[40] L. Wang, W. Ouyang, X. Wang, and H. Lu. Visual tracking
with fully convolutional networks. In ICCV, 2015.
[41] N. Wang, S. Li, A. Gupta, and D. Yeung. Transferring rich
feature hierarchies for robust visual tracking. arXiv preprint,
1501.04587, 2015.
[42] Y. Wu, J. Lim, and M.-H. Yang. Online object tracking: A
benchmark. In CVPR, 2013.
[43] Y. Wu, J. Lim, and M. H. Yang. Object tracking benchmark.
TPAMI, 37(9):1834–1848, 2015.
[44] D. Zhang, H. Maei, X. Wang, and Y.-F. Wang. Deep reinforcement learning for visual object tracking in videos. arXiv
preprint, 1701.08936, 2017.
[45] J. Zhang, S. Ma, and S. Sclaroff. MEEM: robust tracking
via multiple experts using entropy minimization. In ECCV,
2014.
[46] K. Zhang, L. Zhang, Q. Liu, D. Zhang, and M.-H. Yang. Fast
visual tracking via dense spatio-temporal context learning. In
ECCV, 2014.
[47] G. Zhu, F. Porikli, and H. Li. Tracking randomly moving
objects on edge box proposals. arXiv preprint, 1507.08085,
2015.
Table 5. Network architecture and convolutional layer specifics.
Supplementary Material
Layer
A. Algorithmic Details
Network architecture: We use the exact convolutional architecture of SiamFC [3]. The convolutional layers C1−C5
and their parameter details are given in Table 5. Note maxpooling is employed for the convolutional layers C1 and
C2. We use the nonlinear ReLU function [24] after every
convolutional layer except for C5. Batch normalization is
inserted after every linear layer.
Deep Q-learning: During deep Q-learning [29], the optimal action-value function Q(Sl , Al ) obeys the Bellman
equation: it is optimal to select the action A0 that maximizes
the expected reward
Q(Sl , Al ) = R + γ max
Q(S 0 , A0 ),
0
A
0
C1
C2
C3
C4
C5
Input
conv1
pool1
conv2
pool2
conv3
conv4
conv5
Support
Stride
11×11
3×3
5×5
3×3
3×3
3×3
3×3
2
2
1
2
1
1
1
Method
LCT
[28]
0.612
0.594
0.518
27
AUC-OPE
AUC-TRE
AUC-SRE
Speed
0
A
(6)
The gradient of this loss function with respect to the network weights θl is as follows:
h
0
0
Q(S
,
A
;
θ
)
−
Q(S
,
A
;
θ
)
∇θl V (θl ) = E R + γ max
l−1
l
l
l
A0
i
·∇θl Q(Sl , Al ; θl ) .
(7)
B. Discussions and Results
The main idea of our EArly-Stopping Tracker (EAST) is
to track easy frames using only early layers of a deep feature
cascade, e.g. pixel values, while hard frames are processed
with invariant but expensive deep layers when needed.
An attached video demo.mp4 exemplifies such tracking
policies in video sequences. To further validate the advantages of EAST in both accuracy and speed, we compare
with the top 3 trackers on OTB-50 [42] in terms of speed,
and AUC score for One-Pass Evaluation (OPE), Temporal
Robustness Evaluation (TRE) and Spatial Robustness Evaluation (SRE). Table 6 shows that EAST achieves the highest
scores under all evaluation metrics, while maintaining fast
tracking speed.
Table 7 shows the detailed ranks of accuracy RA and robustness RR under baseline and region noise experiments
in VOT-14 challenge. The two experiments evaluate trackers with the initial target location from ground truth and that
perturbed with random noises. The table also lists the overall rank Ro and running speed to compare EAST with the
best 3 trackers out of 38 submitted ones. It is evident that
Search
activation
255×255
123×123
61×61
57×57
28×28
26×26
24×24
22×22
Chans.
3
96
96
256
256
192
192
128
Table 6. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE), Temporal Robustness Evaluation (TRE) and
Spatial Robustness Evaluation (SRE), and speed (fps, * indicates
GPU speed, otherwise CPU speed) on the OTB-50 dataset. The
best results are shown in bold.
(5)
where Q(S , A ) is the future reward and γ the discount factor. Since the action-value function is approximated by a QNet with weights θ, the Q-Net can be trained by minimizing
the loss function V (θl ) at each iteration l,
2
0
0
V (θl ) = E R + γ max
Q(S
,
A
;
θ
)
−
Q(S
,
A
;
θ
)
.
l−1
l
l l
0
Template
activation
127×127
59×59
29×29
25×25
12×12
10×10
8×8
6×6
SiamFC
[3]
0.612
0.621
0.554
86*
SINT
[37]
0.625
0.643
0.579
4*
EAST
0.638
0.662
0.591
23/159*
Table 7. The accuracy RA , robustness RR and average R ranks
under baseline and region noise experiments in VOT-14. Ro is the
overall (averaged) ranking for both experiments, which is used to
rank the 38 trackers in the main paper. Our CPU/GPU speeds are
reported in fps, while the speeds for the top 3 trackers are in EFO
units, which roughly correspond to fps (e.g. the speed of the NCC
baseline is 140 fps and 160 EFO).
Tracker
EAST
DSST
SAMF
KCF
RA
4.95
5.41
5.30
5.05
baseline
RR
5.42
11.93
13.55
14.60
R
5.19
8.67
9.43
9.82
region noise
RA
RR
R
5.11 4.73 4.92
5.40 12.33 8.86
5.24 12.30 8.77
5.17 12.49 8.83
Ro
5.06
8.77
9.10
9.33
Speed
22/155
7.66
1.69
24.23
EAST is one of the fastest trackers, while outperforming
other top performers in the overall rank.
Template Update
It is worth noting that, in our feature cascade we explore the pixel and HOG layers before expensive deep layers. When processing the cheap pixel and HOG layers, we
make use of fast correlation filters [19]. A correlation filter
w with the same size of image patch x is learned by solving
the Ridge Regression loss function
X
2
min
wT xi − yi + λkwk2 ,
(8)
w
i
where yi is the target response value, and λ is the regularization parameter.
Solving this loss function is fast due to the efficient use
of all shifted patches xi by exploiting the discrete Fourier
transform. Besides fast speed, the correlation filter has another benefit of updating the template w over time. However, this adaptive merit is not preserved for deep layers.
Recall that for the deep convolutional layers C1 − C5, we
AUC
0.641
EAST
0.638
0.635
C1
C2
C3
C4
C5
Layer
Figure 7. The Area Under the Curve (AUC) score for One-Pass
Evaluation (OPE) of template update for deep layers C1 − C5.
follow SiamFC [3] to compute the similarity of a template
image z to all translated regions in search image x by
Fl (z, x) = ϕl (z) ∗ ϕl (x) + vI,
(9)
where ϕl is the convolutional feature embedding at layer l,
and v ∈ R is an offset value.
Here ϕl (z) can be treated as the convolutional template
to compute the target responses, but is fixed to ϕl (zt=1 )
from the first frame and is never updated during tracking.
Then a question naturally arises: can we improve the performance by updating the template for deep layers?
To this end, we conduct the following experiment on
OTB-50: we simply update ϕl (zt ) as ϕl (zt−1 ) from the
previous frame, and record the accuracy if we separately
update the convolutional layer l from C1−C5. Fig.7 shows
the AUC score when we update the template for each deep
layer. Marginal gains are obtained on lower layers C1−C2,
suggesting that they are less invariant and so would need to
be updated more often. On the other hand, updating the top
layer C5 leads to no difference, which is actually in line
with the observations by SiamFC [3] that always uses this
invariant top layer for tracking. In the future, we can consider how to learn to update template online rather than just
use the previous frame. Another promising direction is to
further speedup the deep convolutional process by adopting
the Fourier transform techniques.
| 1 |
arXiv:1608.04809v1 [math.GR] 16 Aug 2016
GENERALIZING THE FUTURAMA THEOREM
J. ELDER AND O. VEGA
Abstract. The 2010 episode of Futurama titled The Prisoner of Benda centers around a machine that swaps the brains of any two people who use it.
The problem is, once two people use the machine to swap brains with each
other, they cannot swap back.
In this article, we present a new proof of this theorem and also a generalization of it to what would happen if, instead, the machine swapped cyclically
the brains of p characters, where p is prime.
1. Introduction
In the 2010 Writers Guild Award-winning episode of Futurama, The Prisoner of
Benda [5], Professor Farnsworth and Amy build a machine that can swap the brains
of any two people. The two use the machine to swap brains with each other, but
then discover that once two people have swapped with each other, the machine does
not swap them back. More characters get involved until the group is thoroughly
mixed up, and they start looking for ways to return to their own heads.
Clearly, the problem of undoing what the machine has done may be studied using
permutations; each brain swap can be described by a transposition in Sn , where
n is the number of characters involved in the brain-swapping. Hence, the problem
consists in writing the inverse of a permutation as a product of transpositions that
(1) are all distinct, and (2) were not already used in constructing the original
permutation.
The solution given in the episode relies on involving two additional people; these
two characters were not involved in any of the original swaps, and so have no
restrictions on who they can swap with now. For example, using the additional
people x and y, we have
(1 2)−1 = (x y)(2 x)(1 y)(2 y)(1 x)
Note that the transpositions used in the product above are all distinct, and that
none of them is an element of S2 , which is where the original element (1 2) was
taken from. This can be done in general for any permutation, and leads to the
following theorem.
Theorem 1 (Keeler, 2010). Let n ∈ N, n ≥ 2. The inverse of any permutation in
Sn can be written as a product of distinct transpositions in Sn+2 \ Sn .
2010 Mathematics Subject Classification. Primary 20B30; Secondary 20F05.
Key words and phrases. Permutations, products of cycles, Futurama.
The first author thanks the support of the Division of Graduate Studies at California State
University, Fresno in the form of the Robert & Norma Craig Graduate Scholarship and also for
travel support. She would also like to thank the College of Science and Mathematics at California
State University, Fresno for travel support.
1
Although Ken Keeler (writer and executive producer for Futurama at the time)
never published the proof of his theorem, the proof given in the episode as well as a
write up of the idea may be found in [3]. This was, most probably, the first time in
which a theorem was proved for the purpose to advance the narrative of a TV show,
and thus it was all over the internet [1, 4, 7] and was also mentioned in books, such
as Simon Singh’s The Simpsons and Their Mathematical Secrets [6]. Of course,
this aroused the interest of mathematicians (the authors of this article included),
and so in 2014, Evans, Huang, and Nguyen [2] proved that Keeler’s solution to the
problem is optimal in the sense that it uses the minimal number of cycles and the
minimal number of additional elements. In that article, they also gave necessary
and sufficient conditions on m and n for the identity permutation to be expressible
as a product of m distinct transpositions in Sn .
Although in the title of this article we used The Futurama Theorem, for the
remainder of this work we will refer to Theorem 1 as Keller’s Theorem.
2. Reproving Keeler’s Theorem
We want to reprove Keeler’s Theorem using a different, and possibly less optimal,
method. The goal is to present a method that can be generalized to larger cycles
in Sn . As in Keeler’s proof, we will need additional elements that could not have
been used in the permutation we wish to work with.
As expected, we will first study how to write the inverse of a cycle using ‘new’
transpositions to later putting all this together using that every permutation can
be written as the product of disjoint cycles.
Definition 2. Fix n ∈ N and let x, y ∈ N be such that x, y ≫ n. We consider the
set that we will use to define the elements of Sn+2 to be {1, 2, . . . , n, x, y}.
Throughout this paper, we will consider, without loss of generality, the k-cycle
(1 2 · · · k) instead of a generic k-cycle. We start by setting some notation.
Definition 3. Let m ∈ N such that m is odd and m ≤ n − 2. And let δm ∈ Sn+2
be defined as
m
Y
(i + 1 y)(i + 2 y)(i x)(i + 1 x).
δm =
i=1
i odd
Notice that δm , for any 1 ≤ m, will not contain any repeated transpositions. In
fact, every number 1 ≤ j ≤ m will appear at most twice in the product: once in
(j x) and once in (j y). Also, we can see that (x y) is not in the product.
Lemma 4. Let k ≥ 7 be odd and such that k ≡ 1 (mod 3). If σ is a k-cycle then
σ −1 = δk−2 .
Proof. We write k = 1 + 6t, for t ∈ N. We will prove the result by induction on t.
For t = 1, we get:
(1 2 3 4 5 6 7)−1 = (6 9)(7 9)(5 8)(6 8)(4 9)(5 9)(3 8)(4 8)(2 9)(3 9)(1 8)(2 8) = δ5
We now assume the result for all k-cycles, where k = 1 + 6s and s < t. Now let
σ be a j-cycle, where j = 1 + 6t. We let k = j − 6 and write
(2.1)
(1 2 · · · j)−1 = (j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 (1 2 · · · k)−1
From the induction hypothesis, we get
(1 2 · · · k)−1 = δj−8 ,
2
and from the base case we get
(j − 6 j − 5 j − 4 j − 3 j − 2 j − 1 j)−1 =
j−2
Y
(i + 1 y)(i + 2 y)(i x)(i + 1 x).
i=j−6
i odd
Putting all this together in Equation (2.1) yields:
j−2
Y
(1 2 · · · j)−1 =
(i + 1 y)(i + 2 y)(i x)(i + 1 x) δj−8 = δj−2 ,
i=j−6
i odd
which is what we wanted to obtain.
We will use this lemma to prove all remaining cases. First for k odd.
Lemma 5. Let k be an odd number and σ be a k-cycle.
1. If k ≥ 5 and k ≡ 2 (mod 3), then σ −1 = (x y)(k − 2 x)(k − 1 x)(k x)δk−4 .
2. If k ≥ 3 and k ≡ 0 (mod 3), then σ −1 = (x y)(k x)δk−2 .
Proof. Let k be an odd number and σ be a k-cycle.
1. For k = 5, we see that
(1 2 3 4 5)−1 = (6 7)(3 6)(4 6)(5 6)(2 7)(3 7)(1 6)(2 6)
For k > 5 and k ≡ 2 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 4)(k − 4 k − 3 k − 2 k − 1 k)
Since k − 4 is odd and k − 4 ≡ 1 (mod 3) we use Lemma 4 to get the
desired result.
2. For k = 3, we have
(1 2 3)−1 = (4 5)(3 4)(2 5)(3 5)(1 4)(2 4),
and when k > 3 and k ≡ 0 (mod 3), we know that k − 2 ≡ 1 (mod 3), with
k − 2 odd. Hence
(1 2 . . . k) = (1 2 . . . k − 2)(k − 2 k − 1 k).
At this point we use Lemma 4 to get the desired result.
Now we will proceed in a similar manner for the cases where k is even.
Lemma
1. If
2. If
3. If
6. Let k be a positive even number, and σ be a k-cycle.
k ≥ 6 and k ≡ 0 (mod 3), then σ −1 = (k y)(k − 1 x)(k x)δk−3 .
k ≥ 4 and k ≡ 1 (mod 3), then σ −1 = (x y)(k − 1 x)(k x)δk−3 .
k ≥ 8 and k ≡ 2 (mod 3), then
σ −1 = (k − 2 y)(k − 1 y)(k y)(k − 3 x)(k − 2 x)δk−5 .
Proof. Let k be even, and σ be a k-cycle.
1. For k = 6, we see that
(1 2 3 4 5 6)−1 = (6 8)(5 7)(6 7)(4 8)(5 8)(3 7)(4 7)(2 8)(3 8)(1 7)(2 7)
For k > 6, and k ≡ 0 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 5)(k − 5 k − 4 k − 3 k − 2 k − 1 k)
Since k − 5 is odd and k − 5 ≡ 1 (mod 3) we can use Lemma 4 to get the
desired result
3
2. For k = 4, we have
(1 2 3 4)−1 = (5 6)(3 5)(4 5)(2 6)(3 6)(1 5)(2 5)
and when k > 4 and k ≡ 1 (mod 3), we know that k − 3 ≡ 1 (mod 3),
k − 4 is odd. Hence
(1 2 . . . k) = (1 2 . . . k − 3)(k − 3 k − 2 k − 1 k)
At this point we use Lemma 4 to get the desired result.
3. For k = 8,
σ −1 = (6 y)(7 y)(k y)(5 x)(6 x)δ3
When k > 8 and k ≡ 2 (mod 3), we write
(1 2 . . . k) = (1 2 . . . k − 7)(k − 7 . . . k − 1 k)
Since k − 7 ≡ 1 (mod 3), we use Lemma 4 to get the desired result.
Remark 7. Lemmas 4, 5, and 6 allow us to write any given k-cycle as a product
of transpositions. Moreover, such products consist of transpositions that are all
distinct from each other, and each one of these 2-cycles is an element in Sn+2 \ Sn .
Finally, given a permutation σ ∈ Sn , we write its inverse as a product of disjoint
cycles, σ −1 = σ1 σ2 · · · σr , and then we write each σi as a product of transpositions
in Sn+2 \ Sn using Lemmas 4, 5, and 6. It is easy to see that the only transposition
that could appear more than once in this product is (x y). In this case, each (x y)
would appear at the beginning of a product representing a σi (see Lemmas 5 and
6), but this situation is easy to fix as if τ is a permutation in Sn+2 \ Sn then the
conjugation (x y)τ (x y) yields a permutation that is equal to τ where all the xs
and the ys have been exchanged. Keeler’s Theorem follows.
3. Products of larger cycles
Now we are interested in learning what would happen if Professor Farnsworth
and Amy had created a machine that swapped several brains in a cyclical way. For
example, the machine would do
Professor −→ Amy −→ Bender −→ Leela −→ Fry −→ Professor
The problem of undoing what the machine does in the example above would be
easy if the machine did not have any ‘issues’ and worked even when a set of five
people sat in the machine for a second time; we could use that (1 2 3 4 5)−1 =
(5 4 3 2 1) or that (1 2 3 4 5)−1 = (1 2 3 4 5)4 to solve the problem. That
would be too easy, there would be no TV network that would broadcast an episode
featuring such a simple problem/solution (the existence of the show Scooby-Doo
may go against this premise). Hence, to make this interesting, we will assume that
the machine does not always work when a set of people who have already sat in the
machine sits in it again. Our restriction will be technical, and so we will phrase it
explicitly in the statement of our results.
So, for the rest of this article, we will assume that we are working with a machine
that swaps cyclically the brains of p people at a time, where p is an odd prime.
Note that now, in terms of permutations, our problem will reside in An , as the
brain-swapping machine yields an odd cycle every time it functions.
We will start our study with what will end up being a special case: p = 3.
4
Products of 3-cycles. It turns out that, in this case, we only need one extra
character to undo the mess created by the machine.
Lemma 8. Let n ∈ N, n > 2, and let σ ∈ An be an odd cycle. Then, σ −1 can be
written as a product of 3-cycles
σ −1 = τ1 τ2 · · · τt
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. For k = 3 we get (1 2 3) = (x 3 1)(x 1 2), and for every 3 > k ≤ n, k odd,
and x ≫ n, consider the product
(1 2 · · · k − 1 k) = (x k 1)(x k − 2 k − 1) · · · (x 3 4)(x 1 2).
The result is now immediate, as the inverse of any odd cycle is also an odd cycle,
and the 3-cycles used in the products considered all fix different sets of elements.
Lemma 9. Let α, β ∈ Sn , n > 2, be two disjoint even cycles. Then, (αβ)−1 can
be written as a product of 3-cycles
(αβ)−1 = τ1 τ2 · · · τt ,
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. Let β −1 = (a1 a2 · · · ar ) and α−1 = (b1 b2 · · · bs ) be two disjoint cycles,
where r and s are even. Note that (αβ)−1 = β −1 α−1 ∈ An can be written as
β −1 α−1 = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs )
= (b2 b1 x)(b1 a2 x)(a2 a1 x)(a1 b1 x) (a2 a3 · · · ar )(b2 b3 · · · bs ).
Note that the last two cycles in the product are odd, and thus we can write them
as a product of 3-cycles, as indicated in Lemma 8. It is easy to see now that (αβ)−1
can be written as claimed.
The previous two lemmas indicate that we should only need one extra person to
undo whatever chaos the 3-brain-swapping machine might have created. We make
this result explicit in the following theorem.
Theorem 10. Let σ ∈ An , n > 2. Then, σ −1 can be written as a product of 3-cycles
σ −1 = τ1 τ2 · · · τt ,
where τi ∈ An+1 \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. Given σ ∈ An , we know we can write σ −1 as a product of disjoint cycles.
Moreover, after rearrangement (if needed) we can put all the appearing even cycles
(if any) in pairs. Hence, Lemmas 8 and 9 guarantee the desired factorization of
σ −1 .
Products of p-cycles, p > 5. In order to give an answer to what would happen if
the machine now swapped p brains cyclically, where p is a prime larger than three,
we need to set some notation first.
Fix n, p ∈ N, where p > 3 is prime and n > 2. Then, we define the following
ordered lists of numbers
[x]n,p = x1 x2 . . . xp−3
[x]−1
n,p = xp−3 . . . x2 x1
5
where xi ≫ n, for all i = 1, 2, . . . , p − 3. We will use these lists to write cycles. For
example (1 2 [x]3,7 ) = (1 2 x1 x2 x3 x4 ), where x1 , x2 , x3 , x4 ≫ 3.
Theorem 11. Let n ∈ N and p be a prime such that p > 3 and n > 2. If σ ∈ An ,
then, σ −1 can be written as a product of p-cycles
σ −1 = τ1 τ2 · · · τt ,
where τi ∈ An+(p−3) \ An , for all i = 1, 2, . . . , t, and τi ∈<
/ τj >, for all i 6= j.
Proof. We will first prove that every element σ ∈ An can be written as a product
of p-cycles, then we will prove that the factors used satisfy the conditions claimed
in the theorem.
We know that every element in An can be written as a product of odd cycles
and an even number of even cycles. We will first deal with odd cycles. For k = 3
we can write
(1 2 3) = (1 3 2 [x]−1
n,p )(2 1 3 [x]n,p ),
and so we need p − 3 new elements to write a 3-cycle as a product of p-cycles. For
k > 3 we know that every k-cycle in An can be written as a product of k−1
2 distinct
3-cycles as follows:
(3.1)
(a1 a2 · · · ak ) = (a1 a2 a3 )(a3 a4 a5 ) · · · (ak−2 ak−1 ak ).
So, if σ ∈ An is a k-cycle with k > 3, then we write it as in Equation (3.1). After
that we write each of the 3-cycles in that product as a product of two p-cycles, as
discussed in the case k = 3 above. Hence, we can write σ as a product of p-cycles
by incorporating p − 3 new elements.
For products of two even cycles we let σ = (a1 a2 · · · ar ) and τ = (b1 b2 · · · bs ),
where r and s are even. Note that στ ∈ An can be written as
στ = (a1 a2 )(b1 b2 ) (a2 a3 · · · ar )(b2 b3 · · · bs )
−1
= (b2 b1 a2 [x]n,p
)(a2 a1 b1 [x]n,p ) (a2 a3 · · · ar )(b2 b3 · · · bs )
where the first two cycles need p − 3 new elements to have length p, and all the
other cycles involved are odd, and thus can be written as products of p-cycles.
In order to see that all the p-cycles obtained in the final product describing σ −1
generate distinct subgroups of An+(p−3) we notice that, in the majority of the cases,
a pair of these p-cycles will not ‘move’ the same p elements, and thus the groups
they generate would intersect trivially. Thus, the only case that should be analyzed
is when we get two cycles of the form τ1 = (1 3 2 [x]−1
n,p ) and τ2 = (2 1 3 [x]n,p ).
In this case, if we assumed that these elements generate the same subgroups then
τ2i = τ1 , for some i. However, if we look at τ2i (2) we can see that the only possibility
for τ2i = τ1 to happen would be when i = p − 1, but it is easy to see that τ2p−1 =
τ2−1 6= τ1 . This finishes the proof.
We conclude that as long as the brain-swapping machine Professor Farnsworth
and Amy build swaps a prime number of brains cyclically, they can always fix the
chaos created by incorporating enough extra characters to the mix.
References
[1] Casey Chan, Futurama writer invented a new math theorem just to use in the show (2010)
http://gizmodo.com/5618502/futurama-writer-invented-a-new-math-theorem-just-to-use-in-the-show.
[2] Ron Evans, Lihua Huang, Tuan Nguyen, Keeler’s theorem and products of distinct transpositions, Amer. Math. Monthly 121 (2014) 136–144.
6
[3] Hristo Georgiev, The Futurama theorem explained. The Commutator 2 (2010) 18–20.
[4] Tony Phillips, Math in the Media, Amer. Math. Soc., Original math on Futurama (2010),
http://www.ams.org/news/math-in-the-media/10-2010-media.
[5] Previous Nominees & Winners of the Writers Guild Awards (last accessed on 08/15/16).
http://awards.wga.org/wga-awards/previous-nominees-winners.
[6] Simon Singh, The Simpsons and Their Mathematical Secrets. Bloomsbury, NY, 2013.
[7] The prisoner of Benda. The Infosphere, the Futurama Wiki (last accessed on 08/15/16).
http://theinfosphere.org/The_Prisoner_of_Benda.
Department of Mathematics. Arizona State University. Tempe, AZ 85287.
E-mail address: [email protected]
Department of Mathematics. California State University, Fresno.
93740.
E-mail address: [email protected]
7
Fresno, CA
| 4 |
Strong converse for the feedback-assisted classical capacity of
entanglement-breaking channels
arXiv:1506.02228v4 [quant-ph] 3 Nov 2017
Dawei Ding∗
Mark M. Wilde†
November 7, 2017
Abstract
Quantum entanglement can be used in a communication scheme to establish a correlation
between successive channel inputs that is impossible by classical means. It is known that the
classical capacity of quantum channels can be enhanced by such entangled encoding schemes,
but this is not always the case. In this paper, we prove that a strong converse theorem holds
for the classical capacity of an entanglement-breaking channel even when it is assisted by a
classical feedback link from the receiver to the transmitter. In doing so, we identify a bound on
the strong converse exponent, which determines the exponentially decaying rate at which the
success probability tends to zero, for a sequence of codes with communication rate exceeding
capacity. Proving a strong converse, along with an achievability theorem, shows that the classical
capacity is a sharp boundary between reliable and unreliable communication regimes. One of
the main tools in our proof is the sandwiched Rényi relative entropy. The same method of proof
is used to derive an exponential bound on the success probability when communicating over an
arbitrary quantum channel assisted by classical feedback, provided that the transmitter does
not use entangled encoding schemes.
1
Introduction
The classical theory of communication is one of the modern successes of applied mathematics [CT91,
GK12]. It is arguably one of the foundations of our current information age and provides new ways
of thinking about problems in many other fields of study, such as physics and in particular quantum
mechanics. The interaction between these two fields is mutual; while some problems in quantum
mechanics can be turned into communication problems, the existence of quantum phenomena
strongly suggests that we should rethink many aspects of communication theory. Not only does
the notion of a quantum state challenge what we mean by “information,” but the possibilities due
to quantum mechanics give rise to new classes of communication protocols. With respect to this
latter consideration, some fundamental motivating questions for quantum information theory have
traditionally been and still are the following:
1. Is the theory of classical communication affected at a fundamental level by the consideration
of quantum mechanical phenomena?
∗
Department of Applied Physics, Stanford University, Stanford, California 94305-4090, USA
Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and
Technology, Louisiana State University, Baton Rouge, Louisiana 70803, USA
†
1
2. Does using quantum states and measurement for classical communication have practical advantages over using classical techniques?
In an attempt to answer these questions, one of the primary goals is to study the ability of a
quantum channel to communicate classical information, that is, bits. Like many communication
problems, this ability is quantified by the notion of channel capacity. The classical capacity C
of a quantum channel N is defined to be the maximum rate of communication such that the
decoding error probability can tend to zero in the limit of many channel uses. With this definition,
one natural question is to determine how to compute the classical capacity. We know that the
Holevo-Schumacher-Westmoreland (HSW) theorem [Hol98, SW97] provides a lower bound:
CpN q ě χpN q ”
sup
IpX; Bqρ ,
(1.1)
tpX pxq,ρx u
where tpX pxq, ρx u is an ensemble of quantum states such that each ρx can be input to the channel,
and IpX; Bqρ ” HpXqρ ` HpBqρ ´ HpXBqρ is the quantum mutual information of the following
classical-quantum state:
ÿ
ρXB ”
pX pxq|xyxx|X b N pρx q,
(1.2)
x
where t|xyu is an orthonormal basis for the classical reference system and HpGqσ is the von Neumann
entropy of a quantum state σG on system G. The quantity χpN q is called the Holevo information
of the channel.
The classical capacity CpN q can actually be formally rewritten in terms of the Holevo information as well, via a procedure known as regularization. Before doing so, note that we obtain the
HSW theorem by considering only encoding procedures that do not use entangled inputs1 . That
is, each quantum system sent through the channel is not entangled with any other system that is
sent. To get the classical capacity, it is generally necessary to incorporate entangled inputs into
the calculation. The approach given by [Hol98, SW97] is to multiplex the channel such that one
use of this multiplexed channel corresponds to multiple uses of the original channel. A multipartite
entangled state describing several inputs across different uses of the original channel can now be
simulated by the corresponding single input state to the multiplexed channel. We can therefore
express the maximum rate for blocks of size n in terms of a Holevo information:
1
χpN bn q.
n
(1.3)
To obtain the classical capacity, we simply allow for inputs entangled across arbitrarily many
channel uses:
1
CpN q “ lim χpN bn q.
(1.4)
nÑ8 n
This idea put together with a converse theorem establishes the regularized expression in (1.4) as
being equal to the classical capacity.
Unfortunately, computing the classical capacity this way is clearly intractable. This prompts
us to look for special cases. We observe that the limit in (1.4) is equal to χpN q iff the Holevo
information satisfies a tensor-power additivity property (see Appendix A for a brief derivation):
@n
χpN bn q “ nχpN q.
1
(1.5)
The highest possible rate with this restriction, proven by the HSW theorem to be χpN q, is then a lower bound
on the classical capacity.
2
Another way to restate the above is that entangled inputs do not increase capacity iff (1.5) is
satisfied. However, this is not true for some channels, as was shown in [Has09]. The next question
then appears: What characterizes channels that satisfy (1.5)?
A sufficient condition for a quantum channel to satisfy tensor-power additivity is for it to be
entanglement-breaking (EB) [HSR03]. Let NAÑB denote a quantum channel, where the arrow
notation indicates that the channel maps a state of the input system A to a state in an output
system B. An EB channel is defined such that for any bipartite state ρAA1 , the output state
pNAÑB b idA1 q pρAA1 q
(1.6)
is separable. That is, the output of an EB channel can be written as a convex sum of product
states. Effectively, the channel “breaks” the entanglement between A and A1 . Previous results have
established that the Holevo information of EB channels is additive2 [Sho02]. This is intuitive since
any entanglement of the inputs is broken by the channel. Following this line of thinking, one could
consider making a stronger statement by allowing additional resources to assist the communication
but not to the point that entanglement can be established. Indeed, [BN05] proves a generalization
of tensor-power additivity for EB channels with noiseless classical feedback. Furthermore, their
results show that classical feedback does not increase the capacity of EB channels.
There are also possible stronger statements in another direction. The direct part of the original
HSW theorem states that if the rate R of communication is less than the Holevo information χ,
then there exists a sequence of protocols P n such that the probability of error for such a sequence
satisfies
lim pe pnq “ 0,
(1.7)
nÑ8
where n is the number of channel uses. A result from [Hay07] sharpens this claim by showing that
there exists a sequence P n such that
pe pnq ď 2´kn ,
(1.8)
for some k ą 0 determined by the channel. The converse part of the original HSW theorem can be
strengthened in a similar manner. It states that if R ą CpN q, for any sequence of protocols P n ,
then
lim pe pnq ą 0.
(1.9)
nÑ8
This is known as the weak converse. In contrast, a strong converse is symmetric to the achievability
result above and states that regardless of the protocols used, the success probability decreases to
zero in the asymptotic limit whenever R ą CpN q. The strong converse can be sharpened as well
whenever there is a constant separation between R and CpN q, such that the convergence of the
success probability to zero is exponential in n.
There are many reasons why we would want to prove a strong converse. First, a strong converse
enriches our understanding of the capacity. A strong converse along with an achievability theorem shows that the capacity is a sharp boundary between reliable and unreliable communication
regimes. This, amongst other results, indicates that the classical capacity of a quantum channel
is a fundamental quantity of interest. Second, a strong converse is more relevant in practice than
is the weak converse. A realistic quantum communication scheme has a finite blocklength; that is,
2
Shor proved that the Holevo information of a tensor product of an EB channel with any other channel is equal to
the sum of their respective Holevo informations. This form of additivity is stronger than (1.5) and is the one usually
found in the literature.
3
the encoding is across a finite number of channel uses. Although the weak converse does provide a
lower bound on the probability of error in the non-asymptotic regime, the strong converse improves
the bound considerably. It expresses a trade-off between rate, error probability, and blocklength
restrictive enough to be easily checked numerically or experimentally.
While a classical version of the strong converse is known for arbitrary discrete memoryless
classical channels [Wol78, Ari73], it is still open whether or not strong converses hold for memoryless
quantum channels. After some early work [ON99, Win99], the strong converse has been proved for
special cases, in particular for channels with certain symmetry [KW09], for EB channels [WWY14],
and for a wide class of quantum Gaussian channels [BGPWW15]. Given the strong converse
results for EB channels [WWY14] and the weak converse for EB channels with feedback [BN05],
it is natural to ask if these two statements are true at the same time. We can also ask directly for
the strong converse for unentangled inputs when a feedback link is available. These are the main
questions that we address in this paper.
2
Summary of Results
In this paper, we derive an explicit exponential bound on the success probability of a classical
communication scheme that uses an entanglement-breaking channel along with classical feedback.
The same method of proof can be used to establish a bound for arbitrary quantum channels with
classical feedback, provided that the inputs are not entangled across multiple uses of the channel.
When the communication rate exceeds the classical capacity, these exponential bounds immediately
imply strong converse theorems for these settings.
We now provide an outline of the proof:
1. First, taking as a starting point the general approach of [Nag01], relating hypothesis testing
to unassisted communication, we bound the success probability of an arbitrary feedbackassisted classical communication protocol by a sandwiched Rényi relative entropy [MLDS` 13,
WWY14].
2. Next, one of the main observations from [BN05] is that the sender and receiver’s systems
are separable at all times throughout such a protocol, whenever the communication channel
is entanglement-breaking. We use this fact and an entropy inequality from [Kin03] to split
the relative entropy into two terms. The first term is bounded by an α-information radius,
which is a measure of the range of states a channel can output. We then equate this to the
sandwiched α-Holevo information [WWY14], which is a Rényi generalization of the Holevo
information. The second term is bounded via monotonicity by another sandwiched Rényi
relative entropy, to which we recursively apply the same argument.
3. This gives the following bound on the probability of success for any finite blocklength n:
psucc ď 2´n supαą1
α´1
pR´χ
rα pN qq
α
,
(2.1)
where R is the rate of communication and N is the EB channel. It follows from previous
arguments [WWY14] that when R ą χpN q, the right hand side of (2.1) is a decaying exponential, thereby establishing the strong converse. We provide an alternate (arguably simpler)
proof of this fact (similar to those in [MH11, CMW16]) by establishing that the α-Holevo
information converges continuously to the Holevo information as α approaches 1.
Appendix B includes a brief review of the argument for the weak converse from [BN05].
4
3
Preliminaries
In this section we provide some necessary definitions, concepts, and previous results used in the
derivation of (2.1).
3.1
Quantum states, measurements, operator norms, and quantum channels
We start with definitions of relevant mathematical notions from quantum mechanics. Given a finitedimensional Hilbert space H, let BpHq denote the algebra consisting of linear operators acting on
H. A relevant measure of a operator X is its Schatten α-norm, which is defined as
}X}α ” tTr r|X|α su1{α ,
(3.1)
?
where α ě 1 and |X| ” X : X.
The set of quantum states is a convex subset of BpHq given by
SpHq “ tρ P BpHq : ρ ě 0, Tr ρ “ 1u ,
(3.2)
where the notation ρ ě 0 means that ρ is positive semidefinite. For composite states, we consider
the tensor product of two Hilbert spaces HA and HB , denoted by HA b HB . We can obtain from
the overall density operator ρAB P SpHA b HB q the reduced density operator ρA corresponding to
the quantum state on only the A system by performing a partial trace:
ρA ” TrB pρAB q.
(3.3)
TrB p|x1 yxx2 |A b |y1 yxy2 |B q ” |x1 yxx2 |A xy2 |y1 y
(3.4)
The partial trace can be defined as
for vectors |x1 y, |x2 y, |y1 y, and |y2 y, and then extended by linearity. A state ρAB is separable if it
can be written as
ÿ
ρAB “
ppxqρxA b ρxB ,
(3.5)
x
where ppxq is a probability distribution and tρxA u and tρxB u are sets of states.
A positive operator-valued measure (POVM) consists of a set tΛm u of positive semidefinite
operators
indexed by m and corresponding to different measurement results. The set satisfies
ř
m Λm “ I, which allows us to interpret the quantity
pm ” TrpρΛm q
(3.6)
as the probability of measuring m given a quantum state ρ.
We next consider maps on operators and in particular quantum states. A linear map Ψ :
BpHA q Ñ BpHB q is called positive if @τ P BpHA q, τ ě 0 implies Ψpτ q ě 0. It is called completely
positive if idR b Ψ is positive for an arbitrary auxiliary system R, where idR is the identity map on
R. A map Ψ is a quantum channel if it is linear, completely positive, and also trace-preserving.
5
M
A’0
X0
B’0
A’2
A’1
E1
A1
N
B1
E2
X1
D1
A2
B2
N
D2
B’1
E3
X2
A3
B3
N
D3
B’2
M̂
Figure 1: A general protocol for feedback-assisted classical communication. The sender manipulates
the systems labeled by A and the receiver those labeled by B. Every X system is classical and
represents noiseless classical feedback from the receiver to the sender.
3.2
Classical feedback-assisted classical communication protocols
Figure 1 depicts the most general three-round protocol for classical feedback-assisted classical communication. The generalization to n rounds is clear. The protocol begins with Alice preparing a
classical register M with the message to be sent. This is correlated with some system A10 . Bob uses
the classical feedback channel to send a classical system X0 correlated with some quantum system
B01 to Alice. The global state is then
ÿ
ÿ
ρM A10 X0 B01 ”
pM pmq |my xm|M b ρm
b
pX0 pxq |xy xx|X0 b ρxB 1 .
(3.7)
1
A
0
m
0
x
We will track the state conditioned on a particular value m of the message register M , given by
ÿ
m
ρm
pX0 pxq |xy xx|X0 b ρxB 1 .
(3.8)
A1 X0 B 1 ” ρA1 b
0
0
0
0
x
Alice performs an encoding EA1 1 X0 ÑA1 A1 . The state at this point is
0
ρm
A11 A1 B01
”
1
EA1 1 X0 ÑA1 A1
0
1
ÿ
“
´
ρm
A10 X0 B01
¯
(3.9)
´
¯
x
pX0 pxqEA1 1 X0 ÑA1 A1 ρm
A1 b |xy xx|X0 b ρB 1 ,
0
x
1
0
0
(3.10)
1
1
We note that the state ρm
A11 A1 B01 is separable with respect to the cut A1 A1 : B0 .
Next, Alice uses the EB channel NA1 ÑB1 for the first time by sending system A1 , leading to
the state
´
¯
m
.
(3.11)
ρm
”
N
ρ
1
1
1
1
A1 ÑB1
A B1 B
A A1 B
1
0
1
0
Since the channel is entanglement-breaking and the state before the channel was already separable
with respect to the A11 A1 : B01 cut, the state after the channel is fully separable, that is, it is
separable across all possible partitions. Now, consider instead that Alice uses an arbitrary channel
6
NA1 ÑB1 but with an input separable across the A11 : A1 cut (such that ρm
A11 A1 B01 is fully separable).
m
Then, the state ρA1 B1 B 1 is again fully separable. We write it in the form
1
0
ρm
A1 B1 B 1 “
1
ÿ
0
y,m
pY pyqρy,m
b ρy,m
B1 b ρB 1 .
A1
1
y
(3.12)
0
1
Bob now applies the decoding map DB
1
1 , where X1 is the classical system that is sent
1 B0 ÑX1 B1
back to Alice. The state at this point is
´
¯
1
m
ρm
(3.13)
A11 X1 B11 ” DB1 B01 ÑX1 B11 ρA11 B1 B01
ÿ
ÿ
“
pX1 px1 q |x1 y xx1 |X1 b pZ1 |X1 pz1 |x1 qρxA11 ,z1 b ρxB11,z1 .
(3.14)
x1
z1
1
1
which is fully separable. Hence, after Alice applies the second encoder E 2 and then sends it through
the channel, the state will still be fully separable. The key observation here is that if we use an EB
channel or an arbitrary channel with separable inputs, the state is always separable across a cut
that divides Alice and Bob’s systems.
The only difference in subsequent rounds is the final measurement. Say there are n rounds in
1
using a POVM given by tDm u
the protocol. At the last round, Bob measures the state ρBn Bn´1
with elements corresponding to different possible messages that Alice sent.
3.3
Rényi relative entropies and bounds on success probability
An important classical information theoretic quantity is the Rényi relative entropy, which can be
generalized to the quantum case in a number of ways. In this paper, we use the sandwiched quantum
Rényi relative entropy [MLDS` 13, WWY14] which is given by
” ´`
#
˘ ¯ı
1
p1´αq{p2αq ρσ p1´αq{p2αq α
log
Tr
σ
: ρ M σ ^ psupppρq Ď supppσq _ α P p0, 1qq
α´1
r α pρ}σq ”
D
`8
: otherwise
(3.15)
where α P p0, 1q Y p1, 8q and ρ M σ means ρ, σ are non-orthogonal quantum states. Note that all
logarithms in this paper are taken base two.
We now recall some properties of the sandwiched Rényi relative entropy. For fixed ρ and σ, the
r α pρ}σq is monotone non-decreasing [MLDS` 13]. It also converges to the quantum
function α ÞÑ D
relative entropy Dpρ}σq [Ume62] in the limit as α Ñ 1 [MLDS` 13, WWY14]:
r α pρ}σq “ Dpρ}σq,
lim D
αÑ1
where
"
Dpρ}σq ”
Tr rρ plog ρ ´ log σqs : supppρq Ď supppσq
.
`8
: otherwise
(3.16)
(3.17)
Furthermore, it satisfies the data-processing inequality for α P r1{2, 1q Y p1, 8q [FL13, Bei13]; that
is, for all quantum channels N ,
r α pN pρq}N pσqq ď D
r α pρ}σq.
D
7
(3.18)
In particular, consider the following replacement channel which simply replaces the input with some
state ω:
Rω pρq ” Trpρqω.
(3.19)
r α pω}ωq “ 0, implying that
It is easy to see that for all ω, D
r α pρ}σq ě D
r α pRω pρq}Rω pσqq “ 0,
D
(3.20)
which shows that the sandwiched Rényi relative entropy is non-negative whenever its arguments
are quantum states ρ and σ.
Using the sandwiched Rényi relative entropy, we can define the sandwiched α-Holevo information [WWY14] of an ensemble, that is, a classical probability distribution of quantum states,
tpX pxq, ρx u as
r α pρXR }ρX b σR q
rα ptpX pxq, ρx uq ”
χ
inf
D
(3.21)
σR PSpHR q
where
ρXR ”
ÿ
pX pxq|xyxx|X b pρx qR
(3.22)
x
and ρx are states of a system R. With this, we define the α-Holevo information of a quantum
channel N as
χ
rα pN q ” sup χ
rα ptpX pxq, N pρx quq .
(3.23)
tpX pxq,ρx u
We also define the α-information radius of a channel N : SpHA q ÞÑ SpHB q as
r α pN q ”
K
inf
r α pN pρq}σq.
sup D
(3.24)
σPSpHB q ρPSpHA q
r α is monotonically non-decreasing in α, so are χ
rα.
We note that since D
rα and K
4
Strong converse
This section is dedicated to proving the main theorem of this paper. We will need the following
lemmas. The first is proven using an inequality from [Nag01] in Lemma 5 of [CMW16] via monor α . The second will be used to take advantage of the separability of the quantum state
tonicity of D
observed in Section 3.2. The third is an equality between α-Holevo information and α-information
radius. The fourth states that α-Holevo information and α-information radius respectively tend to
the conventional Holevo information and information radius in the limit α Ñ 1, which we prove in
Appendix C. Note that this establishes Lemma 3 as a generalization of the equality χpN q “ KpN q
[OPW97, SW01, SW02].
Lemma 1. Let α ą 1, ρ, σ P SpHq, and Λ be such that 0 ď Λ ď I. Let
p ” Tr rΛρs , q ” Tr rΛσs .
Then
r α pρ}σq ě
D
“
‰
1
log pα q 1´α .
α´1
8
(4.1)
(4.2)
Lemma 2 ([Kin03, Hol06]). Let PAB be a positive semidefinite separable operator. Such an
operator can be written in the following form:
ÿ j
j
CA b DB
,
(4.3)
PAB “
j
j
j
where CA
, DB
ě 0 for all j. Let PB “ TrA tPAB u and let MA be a completely positive linear map
acting on the A system. Then, for all α ě 1,
}pMA b idB q pPAB q}α ď να pMA q ¨ }PB }α ,
(4.4)
where να pMA q is the 1 Ñ α norm of MA , defined as
να pMA q ”
}MA pXq}α
.
}X}1
X‰0,XPBpHA q
sup
(4.5)
Lemma 3 ([WWY14]). For α ą 1, the α-Holevo information and the α-information radius are
the same:
r α pN q.
rα pN q “ K
χ
(4.6)
Proof. This statement was essentially proved as Lemma 14 of [WWY14], but only for the interval
α P p1, 2s. To get the statement for all α ą 1, we actually need to extend Lemma 14 in [WWY14]
slightly. This follows from the proof given there and the observations that for all α ą 1, xp1´αq{α
r α is jointly quasi-convex.
is operator convex, Trtxα u is convex, and D
For completeness and convenience, we also give a full proof here, following the steps in the
r α pN q ď χ
rα pN q for α ą 1.
proof of Lemma 14 in [WWY14] closely. We first prove the inequality K
p1´αq{2α
p1´αq{2α
α
r α pρ}σq ” Trppσ
Defining Q
ρσ
q q, consider that
r α pN q “ inf sup D
r α pN pρq}σq
K
σ
1
r α pN pρq}σq
log Q
α´1
(4.8)
1
r α pN pρq}σq
log inf sup Q
σ
α´1
ρ
(4.9)
“ inf sup
σ
“
(4.7)
ρ
ρ
r α quantity and find that
So now we focus on the Q
ż
r
r α pN pρq }σq
inf sup Qα pN pρq }σq ď inf sup dµpρq Q
σ
σ µ
ρ
ż
r α pN pρq}σq
“ sup inf dµpρq Q
µ σ
ÿ
r α pN pρx q }σq
“ sup inf
pX pxqQ
tpX pxq,ρx u σ
“
sup
(4.11)
(4.12)
x
r α pρXB }ρX b σB q
inf Q
tpX pxq,ρx u σB
(4.10)
(4.13)
The first inequality follows by taking a supremum over all probability measures µ on the set of all
states ρ. The first equality is a result of applying the Sion minimax theorem [Sio58]—we can do
9
ş
r α pN pρq }σq is linear in the probability measure µ and convex in
so because the function dµpρq Q
r
states σ. Convexity of Qα pN pρq}σq in σ follows because
!´
¯α )
r α pN pρq}σq “ Tr rN pρqs1{2 σ p1´αq{α rN pρqs1{2
Q
,
(4.14)
xp1´αq{α is operator convex for α ą 1 and Trpxα q is convex for α ą 1. The second equality follows
by an application of the Fenchel-Eggleston-Caratheodory theorem (see [EGK12], for example): the
r α pN pρq}σq is continuous in ρ, which is a density operator acting on a d-dimensional
function Q
Hilbert space, so that for each µ, there exists a probability distribution pX pxq on no more than d2
letters such that
ż
ÿ
r α pN pρq}σq “
r α pN pρx q }σq .
(4.15)
dµpρq Q
pX pxqQ
x
r α and by defining
The last equality in (4.13) follows from the properties of Q
ÿ
ρXB ”
pX pxq |xy xx|X b rN pρx qsB .
(4.16)
x
So we can then conclude that
r α pN q ď
K
“
1
r α pρXB }ρX b σB q
log sup inf Q
α´1
tpX pxq,ρx u σB
(4.17)
1
r α pρXB }ρX b σB q
log Q
α´1
(4.18)
sup
inf
tpX pxq,ρx u σB
“χ
rα pN q .
(4.19)
r α pN q ě χ
rα pN q is simpler. Consider that
The proof of the other inequality K
χ
rα pN q “
sup
r α pρXB }ρX b σB q
inf D
(4.20)
sup
r α pρXB }ρX b σq
D
(4.21)
r α p|xy xx| b N pρx q } |xy xx| b σq
sup D
(4.22)
r α pN pρx q }σq
sup D
(4.23)
tpX pxq,ρx u σB
ď
tpX pxq,ρx u
sup
ď
tpX pxq,ρx u x
sup
“
tpX pxq,ρx u x
r α pN pρq }σq .
ď sup D
(4.24)
ρ
r α for α ą 1 [FL13, Bei13], where a
The second inequality follows from joint quasi-convexity of D
function f is jointly quasi-convex if
f pλx1 ` p1 ´ λqx2 , λy1 ` p1 ´ λqy2 q ď max tf px1 , y1 q, f px2 , y2 qu .
(4.25)
r α pN q ě χ
rα pN q.
Since the above inequality holds for all states σ, we can conclude that K
Lemma 4. For a quantum channel N , the following limits hold:
rα pN q “ χpN q
lim χ
αÑ1
10
(4.26)
and
r α pN q “ KpN q,
lim K
(4.27)
αÑ1
where
KpN q ”
inf
sup DpN pρq}σq
(4.28)
σPSpHq ρPSpHq
is the information radius.
We now state the theorem.
Theorem 5. Given any n-round protocol for classical feedback-assisted classical communication
over an entanglement-breaking channel N with rate R, the average probability of success is bounded
from above by an exponential in n:
psucc ď 2´n supαą1
α´1
pR´χ
rα pN qq
α
,
(4.29)
rα is the α-Holevo information. The same bound holds for an arbitrary channel N given
where χ
that the encoder does not entangle inputs across different uses of the channel.
Proof. We take as a starting point the approach of Nagaoka [Nag01], connecting hypothesis testing
with data processing of a Rényi information quantity. Let Pn be such a protocol. We are bounding
the average probability of success, so we assume Alice chooses her messages uniformly at random.
Using the notation of Section 3.2, the state we have at the final round of the protocol Pn is
1
“
ρM Bn Bn´1
L
1 ÿ
|myxm|M b ρm
,
1
Bn Bn´1
L m“1
(4.30)
where L is the number of possible messages.
Following the argument in [CMW16], we can write the success probability as
psucc
ı
ı
”
1ÿ ” m
m
1
1
“
Tr DBn B 1 ρBn B 1
“ Tr TM Bn Bn´1 ρM Bn Bn´1 ,
n´1
n´1
L m
(4.31)
where
1
TM Bn Bn´1
”
ÿ
m
|myxm|M b DB
1
nB
n´1
m
.
(4.32)
Note that 0 ď T ď I, so that tT, I ´ T u is a POVM.
1
We now consider the state τM Bn Bn´1
defined to be the final state if we had implemented Pn
using a replacement channel Rσ instead of the original channel (see Figure 2). The overall state in
this alternate scenario has a simple expression since Bob’s states are now independent of m:
1
1
τM Bn Bn´1
“ τM b σBn b τBn´1
,
(4.33)
where τM “ IM {L. In the above, we remind that Bn is a label for the output system of the nth
replacement channel Rσ , and the state of this system is equal to σ. We can then compute the
following:
”
ı
ı
1ÿ ” m
1
1
1
1
Tr TM Bn Bn´1
τM Bn Bn´1
“
Tr DBn B 1 σBn b τBn´1
“ ,
(4.34)
n´1
L m
L
11
M
A’0
X0
B’0
A’2
A’1
E1
A1
σ
B1
X1
D1
E2
A2
σ
X2
B2
D2
B’1
E3
A3
σ
B3
B’2
D3
M̂
Figure 2: A protocol for feedback-assisted classical communication when using the replacement
channel. Notice that the communication line between A1 and M̂ is broken.
ř
1
where the last equality follows because m Dm “ I and TrrσBn b τBn´1
s “ 1. This equality is
intuitive, since for a replacement channel, the receiver Bob cannot do any better than to guess the
input message m at random. Letting T be the operator Λ in Lemma 1, we conclude that for α ą 1,
„
1
1
α
r
1
1
qě
}τM Bn Bn´1
Dα pρM Bn Bn´1
log psucc 1´α ,
(4.35)
α´1
L
which can be re-written as follows:
α
r α pρM B B 1 }τM B B 1 q.
logppsucc q ` log L ď D
n n´1
n n´1
α´1
(4.36)
We note that if the support of the state σ does not contain the support of the image of the channel
r α upper bound is trivially equal to `8. So, in what follows, we choose σ such
NAÑB , then the D
that its support contains the support of the image of the channel in order to guarantee that all
quantities involved in the forthcoming proof are finite.
r α pρM B B 1 }τM B B 1 q. To do so, consider that
We would therefore like to bound D
n n´1
n n´1
r α pNAn ÑBn pρM A B 1 q}τM B 1 b σBn q
r α pρM B B 1 }τM B B 1 q “ D
D
n n´1
n n´1
n n´1
n´1
›˜
›
¸
›
´
¯›
α
›
p1´αq{p2αq
p1´αq{p2αq ›
1
“
τM B 1
log › Θ 1´α
˝ NAn ÑBn
ρM An Bn´1
τM B 1
› , (4.37)
α
n´1
n´1
›
›
α´1
σBn
α
where ˝ denotes function composition and in the last equality, we define Θ by
Θσ pρq ” σ 1{2 ρσ 1{2 ,
(4.38)
and the identity operation on the other systems is implied. We now use the key observation from
Section 3.2 (and used in [BN05]) that if N is EB or if Alice uses separable inputs, throughout Pn ,
1
Alice and Bob’s systems are always separable. Furthermore, the M system is classical, so ρM An Bn´1
1
is separable with respect to the An : M Bn´1 cut. This implies that
p1´αq{p2αq
τM B 1
n´1
p1´αq{p2αq
1
ρM An Bn´1
τM B 1
n´1
12
(4.39)
is a positive semidefinite separable operator:
p1´αq{p2αq
p1´αq{p2αq
1
τM B 1
ρM An Bn´1
τM B 1
n´1
n´1
“
p1´αq{p2αq
τM B 1
n´1
ÿ
“
˜
ÿ
¸
ppjqρjAn b ρjM B 1
n´1
j
´
p1´αq{p2αq j
ppjqρjAn b τM B 1
ρM B 1
n´1
j
p1´αq{p2αq
n´1
τM B 1
(4.40)
n´1
p1´αq{p2αq
¯
τM B 1
.
(4.41)
n´1
Since conjugation by a positive semidefinite operator is clearly a completely positive map, we can
apply Lemma 2 to conclude that
›
›˜
¸
›
´
¯›
›
p1´αq{p2αq
p1´αq{p2αq ›
1
τM B 1
τM B 1
˝ NAn ÑBn
ρM An Bn´1
›
› Θ 1´α
α
n´1
n´1
›
›
σBn
˜
¸ α
›
›
› p1´αq{p2αq
p1´αq{p2αq ›
1
ď να Θ 1´α
˝
N
¨
τ
ρ
τ
›
› . (4.42)
1
1
A
ÑB
M
B
n
n
MB
n´1 M B
α
n´1
σBn
n´1
α
We then have the following chain of inequalities:
´
¯
r α pρM B 1 }τM B 1 q
r α pρM B B 1 }τM B B 1 q ď α log να Θ 1´α ˝ N ` D
D
n n´1
n n´1
n´1
n´1
σ α
α´1
¯
´
α
r α pρM B B 1 }τM B B 1 q
ď
log να Θ 1´α
˝N `D
n´1 n´2
n´1 n´2
σ α
α´1
´
¯
α
r α pρM B 1 }τM B 1 q
ďn
log να Θ 1´α
˝N `D
0
0
σ α
α´1
¯
´
α
“n
log να Θ 1´α
˝N
σ α
α´1
›ˆ
›
˙
›
›
α
›
“n
log sup › Θ 1´α
˝ NAÑB pρA q›› .
α
α´1
σB
ρA PSpHA q
α
(4.43)
(4.44)
(4.45)
(4.46)
(4.47)
The first inequality follows by combining (4.37) and (4.42). The second inequality follows from
monotonicity of the sandwiched Rényi relative entropy under the partial trace channel. The third
r α pρM B B 1 }τM B B 1 q is the relative entropy at round
inequality follows by recognizing that D
n´1 n´2
n´1 n´2
n ´ 1 of Pn , which allows us to apply the above argument inductively. This is a crucial step of the
argument and proves a form of additivity similar to that of (1.5). The first equality is a consequence
of the fact that ρM B01 “ τM B01 , since no channels have been applied at that point in the protocol.
The last equality follows from the main result of [Aud09] which allows us to take the supremum
over quantum states instead of all operators (furthermore from the fact that quantum states have
trace equal to one). Hence, we have that
›ˆ
›
˙
›
›
α
α
›
› .
pρ
q
(4.48)
log psucc pPn q ` log L ď n
log sup › Θ 1´α
˝
N
AÑB
A
›
α´1
α´1
σB α
ρA PSpHA q
α
Hence, we have proven that the upper bound holds for all states σB , so we can conclude that
›ˆ
›
˙
›
›
α
α
›
log psucc pPn q ` log L ď n inf
sup
log › Θ 1´α
˝ NAÑB pρA q››
(4.49)
α
α´1
σB PSpHB q ρA PSpHA q α ´ 1
σB
α
r α pN q
“ nK
(4.50)
“ nr
χα pN q.
(4.51)
13
The first equality comes from the definition of the α-information radius, and the second equality
is due to Lemma 3.
Now, the protocol uses the channel n times and the rate R of Pn is defined to be the number
of bits per channel use, so that R ď logn L . This allows us to introduce R into the inequality:
1
α´1
rα pN qq.
log psucc pPn q ď ´
pR ´ χ
n
α
(4.52)
Since this is true for all α ą 1, we can take a supremum over α ą 1 and arrive at the bound stated
in (4.29).
The strong converse itself now follows from Theorem 5 and Lemma 4.
Corollary 6 (Strong Converse). The probability of success of any sequence of protocols which
use an entanglement-breaking channel with classical feedback at a rate greater than the classical
capacity is bounded from above by a decaying exponential. The same is true for arbitrary channels
with separable inputs.
r α is monotonically increasing in α, so is χ
Proof. Recall that since D
rα . This along with Lemma 4
implies
rα pN q “ lim χ
rα pN q “ χpN q.
inf χ
αą1
αŒ1
(4.53)
rα pN q as α Œ 1, there exists a value of α ą 1 such
Hence, if R ą χpN q, by the continuity of χ
pR
´
χ
r
that α´1
pN
qq
ą
0.
Then
the
bound
in (4.29) implies an exponential decay of the success
α
α
probability.
5
Conclusion
By studying the classical capacity of a quantum channel, quantum information theorists found
that an implication of quantum mechanics for classical communication is the possibility of superior
encoding schemes that use entanglement, a uniquely quantum phenomenon [Has09]. However, entanglement does not give an advantage for every channel. The results in this and previous papers
show that for entanglement-breaking channels, no communication protocols, even with classical
feedback, can take advantage of this extra resource. They cannot use it to increase their capacity, nor, as proved in this paper, to even lift the exponentially decaying ceiling on their success
probabilities. We perhaps expect this since by definition EB channels destroy entanglement, and
classical feedback channels cannot create entanglement. This is the guiding principle behind our
proof, in particular the key fact that the transmitter and receiver states are separable throughout
the protocol.
More generally, it is known that classical feedback can give a large boost to the classical capacity
of channels which are not entanglement-breaking in at least two different ways: first, there exist
channels for which the Holevo information is small but the classical capacity with feedback included
can be quite large [BDSS06]. Similarly, there exist channels for which the classical capacity is small
but becomes large when classical feedback is available [SS09]. Thus, showing that the Holevo
information is a strong-converse bound suggests that for feedback not to help, we require special
channels, such as the entanglement-breaking ones.
14
Going in the opposite direction, it is known that EB channels form a proper superset of classical
channels [KHH12]. We thus obtain the result of [PV10] as a direct corollary. Furthermore, since the
original posting of our paper as arXiv:1506.02228, an open question that we posed has now been
answered — the strong converse exponent from Theorem 5 is tight, due to the results in [MO17].
Hence, we obtain as a special case from this and our result the classical results of [Aug78, DK79,
CK82] as well.
A possible direction for future research is to ask the same question for Hadamard channels,
which are defined to be complements of EB channels. To define the complementary channel, we
first explain the interpretation of channel as a model for open quantum dynamics. That is, a
channel from system A to system B can be interpreted as the restriction of a unitary interaction
with larger system BR, where R is referred to as the “environment.” The complementary channel
is the map from A to BR tracing out the B system instead and is itself a channel from A to R.
Hence, Hadamard channels break any entanglement with the environment system that is traced
out and is thus related to our guiding principle. The strong converse has already been proved for
Hadamard channels [WWY14], but with the addition of classical feedback, even a weak converse
has yet to be proved. Examples of Hadamard channels include generalized dephasing channels,
cloning channels, and the Unruh channel [BHTW10].
Finally, we remark here that it should be possible to use the methods given here and in [CMW16]
in order to characterize a particular adaptive hypothesis testing scenario. Suppose that the goal is
to distinguish an entanglement-breaking channel from a replacement channel by means of adaptive,
separability-preserving channels. Then the optimal strong converse exponent should be given in
terms of a quantity similar to that in (4.29). However, we leave the details for future work.
Acknowledgements. We are grateful to Patrick Hayden, Milan Mosonyi, and Graeme Smith
for insightful discussions about the topic of this paper. We also thank an anonymous referee for
many helpful suggestions for improving the paper. MMW acknowledges support from startup funds
from the Department of Physics and Astronomy at LSU, the NSF under Award No. CCF-1350397,
and the DARPA Quiness Program through US Army Research Office award W31P4Q-12-1-0019.
DD acknowledges support from a Stanford Graduate Fellowship.
A
Additivity
Here we justify the statement in (1.5). The backward implication is trivial. As for the forward
implication, we first note that given n, for all k P Z` ,
1
1
χpN bn q ď
χpN bkn q,
n
kn
(A.1)
because we can split the kn channels into k blocks of n channels and encode each block independently. In particular, n1 χpN bn q ě χpN q. To show the opposite inequality, we assume the
contrapositive: n1 χpN bn q ą χpN q for some n. However, this means
1
1
χpN bkn q ´ χpN q ě χpN bn q ´ χpN q ą 0,
kn
n
for all k P Z` and thus the limit in (1.4) does not converge to χpN q.
15
(A.2)
B
Weak converse and finite bounds
We recall for motivation and the reader’s convenience the argument for the weak converse from
[BN05].
Theorem 7. Let Pn be a protocol for classical feedback-assisted classical communication over an
entanglement-breaking channel N such that it uses the channel n times, has communication rate
R, and has average probability of decoding error ε. Then, it satisfies the following inequality:
R ď χpN q ` gpn, εq,
(B.1)
where χpN q is the Holevo information of the channel and gpn, εq is a real valued function such that
lim lim gpn, εq “ 0.
(B.2)
εŒ0 nÑ8
The same is true for a protocol for communication over an arbitrary channel given that the encoder
does not entangle inputs across different uses of the channel.
Proof. We use the notation in Section 3.2 and take a general approach that is, for instance, presented
in Section 21.5.1 of [Wil16]. Let Φ denote the following “shared randomness” state:
1 ÿ
|my xm|M b |my xm|M̂ ,
ΦM M̂ “
(B.3)
|M| m
where |M| is the size of the message set M. Now, suppose the information processing task is
common randomness generation instead of classical communication. If we require the state ρ at
the end of the protocol to be ε1 -close to Φ
kΦ ´ ρk1 ď ε1 ,
(B.4)
the Fannes-Audenaert inequality for mutual information [Fan73, Aud07] gives
(B.5)
nR “ IpM ; M̂ qΦ
1
ď IpM ; M̂ qρ ` f pn, ε q,
(B.6)
where f pn, ε1 q is some continuous function of n and ε1 with the property: limε1 Œ0 limnÑ8 n1 f pn, ε1 q “
0. Continuing, we have
1
IpM ; M̂ qρ ď IpM ; Bn Bn´1
qρ
“
1
IpM ; Bn´1
qρ
`
(B.7)
1
IpM ; Bn |Bn´1
qρ ,
(B.8)
where we applied the data processing inequality and the chain rule for conditional quantum mutual
information. We use the chain rule again to get
1
1
IpM ; Bn |Bn´1
qρ ď IpM Bn´1
; Bn qρ .
(B.9)
From Section 3.2, if N is entanglement-breaking or if Alice uses separable inputs, Alice and Bob’s
systems are always separable. Hence, the global state before the nth channel use can be written as
ÿ
1
ρM A1n An Bn´1
“
pM pmq|myxm|M b ρm
(B.10)
A1n An B 1
n´1
m
ÿ
“
pM pmq |my xm|M b
m
ÿ
y
16
m,y
pY |M py|mqρm,y
.
A1 An b ρB 1
n
n´1
(B.11)
Hence, the state after the channel is given by
¯
´
ÿ
ÿ
m,y
1
.
“
pM pmq |my xm|M b pY |M py|mqNAn ÑBn ρm,y
ρM A1n Bn Bn´1
1
A An b ρB 1
n
y
m
(B.12)
n´1
We introduce an auxiliary system Y that labels the separable sum over the index y. That is, Y is
chosen such that the global state is
´
¯
ÿ
m,y
1
”
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y
. (B.13)
ρM Y A1n Bn Bn´1
1
A An b ρB 1
n
m,y
n´1
We trace over A1n to get
1
ρM Y Bn Bn´1
“
ÿ
m,y
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b ρm,y
,
Bn b ρB 1
where
(B.14)
n´1
m,y
´
´
¯¯
`
˘
m,y
1
ρm,y
”
Tr
N
ρ
“ NAn ÑBn ρm,y
An ÑBn
An
An .
Bn
A1 An
n
(B.15)
This allows us to argue
1
1
IpM Bn´1
; Bn qρ ď IpM Y Bn´1
; Bn qρ
“ IpM Y ; Bn qρ `
1
IpBn´1
; Bn |M Y qρ
(B.16)
(B.17)
“ IpM Y ; Bn qρ
(B.18)
ď χpN q,
(B.19)
where the first inequality is from data processing, the first equality from the chain rule, and the
1
second equality because the Bn´1
Bn system is in a product state when conditioning on M and Y .
Finally, given equation (B.15), the state ρM Y Bn is a classical-quantum state of the form:
´
¯
1
1
ρM Y Bn “ TrBn´1
ρM Y Bn Bn´1
(B.20)
ÿ
`
˘
“
pM pmq pY |M py|mq |my xm|M b |yy xy|Y b NAn ÑBn ρm,y
(B.21)
An .
m,y
Hence, the definition of the Holevo information of the channel N gives us final inequality. Putting
things together, we find that
1
IpM ; M̂ qρ ď χpN q ` IpM ; Bn´1
qρ
ď χpN q `
1
IpM ; Bn´1 Bn´2
qρ ,
(B.22)
(B.23)
where the last inequality follows from the data processing inequality. But now, we recognize the
1
1
quantity IpM ; Bn´1 Bn´2
qρ is of the same form as IpM ; Bn Bn´1
qρ in (B.7), so that we can iterate
through the same sequence of arguments to get
1
IpM ; M̂ qρ ď 2χpN q ` IpM ; Bn´2 Bn´3
qρ .
(B.24)
Continuing all the way back to the first channel use, we find
IpM ; M̂ qρ ď nχpN q
17
(B.25)
since IpM ; B01 q “ 0 (see (3.7)). Thus, we conclude
R ď χpN q `
1
f pn, ε1 q.
n
(B.26)
Now, the rate for classical communication with n channel uses and error ε is at most that of
randomness generation with n uses and error ε1 , where ε1 is some function of ε such that limεŒ0 ε1 “
0. Hence, gpn, εq ” n1 f pn, ε1 q is what we need.
Corollary 8 (Weak Converse). The classical capacity of entanglement-breaking channels with
classical feedback is given by the Holevo information. The same is true for arbitrary channels with
separable inputs.
Proof. This is immediate.
C
Limit value of the α-Holevo information
The arguments here are essentially the same as those in [MH11, CMW16], along with an additional
insight from [TWW17, Appendix A]. We first recall a minimax result due to [MH11, Corollary A2].
s where X is a compact topological space, Y is a
Lemma 9. Suppose a function f : X ˆ Y Ñ R,
s
subset of R, and R is the extended real numbers, satisfies
1. @y P Y , f p¨, yq is lower semicontinuous.
2. @x P X, f px, ¨q is monotonic.
Then,
inf sup f px, yq “ sup inf f px, yq.
xPX yPY
yPY xPX
(C.1)
If the first condition was instead
1. @y P Y , f p¨, yq is upper semicontinuous,
then
inf sup f px, yq “ sup inf f px, yq.
yPY xPX
xPX yPY
(C.2)
We now prove Lemma 4.
r α pρXR1 , ρX bσR1 q is lower semicontinuous (see, e.g., [CMW16,
Proof. For fixed ρXR1 and α, σR1 ÞÑ D
r α pρXR1 , ρX b σR1 q is monotone nonAppendix A]). Furthermore, for fixed ρXR1 and σR1 , α ÞÑ D
decreasing. We can therefore invoke Lemma 9 with X “ SpHR1 q and Y “ p0, 1q. We use this, the
definition of the Holevo information, and properties of the quantum relative entropy to find the
18
following one-sided limit of the α-Holevo information of a quantum channel N : BpHR q Ñ BpHR1 q:
rα pN q “ sup χ
rα pN q
lim χ
αÕ1
(C.3)
αPp0,1q
“ sup
sup
αPp0,1q tpX pxq,ρx u
“
“
“
“
sup
rα ptpX pxq, N pρx quq
χ
sup
inf
r α pρXR1 }ρX b σR1 q
D
(C.5)
r α pρXR1 }ρX b σR1 q
sup D
(C.6)
tpX pxq,ρx u αPp0,1q σR1 PSpHR1 q
sup
inf
(C.4)
tpX pxq,ρx u σR1 PSpHR1 q αPp0,1q
sup
inf
tpX pxq,ρx u σR1 PSpHR1 q
DpρXR1 }ρX b σR1 q
IpX : R1 qρ
sup
(C.7)
(C.8)
tpX pxq,ρx u
“ χpN q,
(C.9)
where
ρXR1 ”
ÿ
pX pxq|xyxx|X b rN pρx qsR1 .
(C.10)
x
The fourth equality follows from applying Lemma 9. The fifth follows from (3.16) and the fact that
the sandwiched Rényi relative entropy is monotone non-decreasing in α.
r α pN pρR q}σR1 q is monotone
To find the other limit, we note that for fixed ρR and σR1 , α ÞÑ D
non-decreasing. We then use an idea from [TWW17, Appendix A]. Note that for fixed α and
r α pN pρR q}σR1 q is continuous (and thus upper semicontinuous). Let
positive definite σR1 , ρR ÞÑ D
ε P p0, 1q and define σ pεq ” p1 ´ εq σ ` επ, where π is the maximally mixed state. Thus σpεq is
positive definite for σ positive semidefinite. Consider that
σpεq ě p1 ´ εq σ,
(C.11)
Dpρ}σpεqq ď Dpρ} p1 ´ εq σq “ Dpρ}σq ´ log p1 ´ εq .
(C.12)
which implies that
(This is because of the well known fact that σ ď σ 1 implies that Dpρ}σq ě Dpρ}σ 1 q.) Hence, using
Lemma 9, Lemma 3, and the identification of the Holevo information as an information radius
19
[OPW97, SW01], we can conclude the following chain of equalities:
rα pN q
rα pN q “ inf χ
lim χ
(C.13)
r α pN q
“ inf K
(C.14)
αą1
αŒ1
αą1
“ inf
inf
sup
r α pN pρR q}σR1 q
D
(C.15)
ď inf
inf
sup
r α pN pρR q}σpεqR1 q
D
(C.16)
sup
r α pN pρR q}σpεqR1 q
D
(C.17)
αą1 σR1 PSpHR1 q ρ PSpH q
R
R
αą1 σR1 PSpHR1 q ρ PSpH q
R
R
“
“
“
ď
inf
inf
σR1 PSpHR1 q αą1 ρR PSpHR q
inf
sup
r α pN pρR q}σpεqR1 q
inf D
(C.18)
inf
sup
DpN pρR q}σpεqR1 q
(C.19)
DpN pρR q}σR1 q ´ logp1 ´ εq
(C.20)
σR1 PSpHR1 q ρR PSpHR q αą1
σR1 PSpHR1 q ρR PSpHR q
inf
sup
σR1 PSpHR1 q ρR PSpHR q
“ χpN q ´ log p1 ´ εq .
(C.21)
The first inequality follows because there is an infimum with respect to σR1 , such that replacing σR1
with σpεqR1 can never decrease the quantity. The fifth equality follows from applying Lemma 9.
The sixth equality follows from (3.16) and the fact that the sandwiched Rényi relative entropy is
monotone non-decreasing in α. The last inequality follows from (C.12). The last equality uses
χpN q “ KpN q.
rα pN q ď χpN q. Combined with
Given that ε ą 0 was arbitrary, we can conclude that limαŒ1 χ
rα pN q ě χpN q for all α ě 1, we conclude that
the fact that χ
rα pN q “ χpN q.
lim χ
(C.22)
r α pN q “ KpN q.
lim K
(C.23)
αŒ1
This also implies that
αŒ1
r α pN q “ KpN q, which follows from a similar line of reasoning:
We now show that limαÕ1 K
r α pN q “ sup K
r α pN q
lim K
αÕ1
(C.24)
αPp0,1q
“ sup
inf
sup
r α pN pρR q}σR1 q
D
(C.25)
r α pN pρR q}σR1 q
D
(C.26)
r α pN pρR q}σR1 q
sup D
(C.27)
αPp0,1q σR1 PSpHR1 q ρR PSpHR q
“
“
“
inf
sup
sup
σR1 PSpHR1 q αPp0,1q ρR PSpHR q
inf
sup
σR1 PSpHR1 q ρR PSpHR q αPp0,1q
inf
sup
σR1 PSpHR1 q ρR PSpHR q
“ KpN q,
DpN pρR q}σR1 q
(C.28)
(C.29)
20
where the third equality follows from Lemma 9 and the fact that for fixed α and ρR , σR1 ÞÑ
r α pN pρR q}σR1 q is lower semicontinuous and that the pointwise supremum of lower semicontinuous
D
functions is lower semicontinuous.
References
[Ari73]
Suguru Arimoto. On the converse to the coding theorem for discrete memoryless
channels. IEEE Transactions on Information Theory, 19(3):357–359, May 1973.
[Aud07]
Koenraad M. R. Audenaert. A sharp continuity estimate for the von Neumann
entropy. Journal of Physics A: Mathematical and Theoretical, 40(28):8127, July
2007. arXiv:quant-ph/0610146.
[Aud09]
Koenraad M. R. Audenaert. A note on the p Ñ q norms of 2-positive maps. Linear Algebra and its Applications, 430(1):1436–1440, February 2009. arXiv:mathph/0505085.
[Aug78]
Udo Augustin. Noisy channels. Habilitation thesis, Universitat Erlangen-Nurnberg,
West Germany, September 1978.
[BDSS06]
Charles H. Bennett, Igor Devetak, Peter W. Shor, and John A. Smolin. Inequalities
and separations among assisted capacities of quantum channels. Physical Review
Letters, 96(15):150502, April 2006. arXiv:quant-ph/0406086.
[Bei13]
Salman Beigi. Sandwiched Rényi divergence satisfies data processing inequality.
Journal of Mathematical Physics, 54(12):122202, December 2013. arXiv:1306.5920.
[BGPWW15] Bhaskar Roy Bardhan, Raul Garcia-Patron, Mark M. Wilde, and Andreas Winter.
Strong converse for the classical capacity of all phase-insensitive bosonic Gaussian
channels. IEEE Transactions on Information Theory, 61(4):1842–1850, April 2015.
arXiv:1401.4161.
[BHTW10]
Kamil Brádler, Patrick Hayden, Dave Touchette, and Mark M. Wilde. Trade-off
capacities of the quantum Hadamard channels. Physical Review A, 81(6):062312,
June 2010. arXiv:1001.1732.
[BN05]
Garry Bowen and Rajagopal Nagarajan. On feedback and the classical capacity of a
noisy quantum channel. IEEE Transactions on Information Theory, 51(1):320–324,
2005. arXiv:quant-ph/0305176.
[CK82]
Imre Csiszar and Janos Korner. Feedback does not affect the reliability function of a
DMC at rates above capacity. IEEE Transactions on Information Theory, 28(1):92–
93, January 1982.
[CMW16]
Tom Cooney, Milan Mosonyi, and Mark M. Wilde. Strong converse exponents for a
quantum channel discrimination problem and quantum-feedback-assisted communication. Communications in Mathematical Physics, 344(3):797–829, June 2016.
arXiv:1408.3373.
21
[CT91]
Thomas M. Cover and Joy A. Thomas. Elements of Information Theory. WileyInterscience, August 1991.
[DK79]
Gunther Dueck and Janos Korner. Reliability function of a discrete memoryless channel at rates above capacity. IEEE Transactions on Information Theory, 25(1):82–85,
January 1979.
[EGK12]
Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge
University Press, January 2012.
[Fan73]
Mark Fannes. A continuity property of the entropy density for spin lattice systems.
Communications in Mathematical Physics, 31(4):291–294, December 1973.
[FL13]
Rupert L. Frank and Elliott H. Lieb. Monotonicity of a relative Rényi entropy.
Journal of Mathematical Physics, 54(12):122201, December 2013. arXiv:1306.5358.
[GK12]
Abbas El Gamal and Young-Han Kim. Network information theory. Cambridge
University Press, January 2012. arXiv:1001.3404.
[Has09]
Matthew B. Hastings. Superadditivity of communication capacity using entangled
inputs. Nature Physics, 5:255–257, April 2009. arXiv:0809.3972.
[Hay07]
Masahito Hayashi. Error exponent in asymmetric quantum hypothesis testing and its
application to classical-quantum channel coding. Physical Review A, 76(6):062301,
December 2007. arXiv:quant-ph/0611013.
[Hol98]
Alexander S. Holevo. The capacity of the quantum channel with general signal
states. IEEE Transactions on Information Theory, 44(1):269–273, January 1998.
arXiv:quant-ph/9611023.
[Hol06]
Alexander S. Holevo. Multiplicativity of p-norms of completely positive maps and the
additivity problem in quantum information theory. Russian Mathematical Surveys,
61(2):301–339, 2006.
[HSR03]
Michal Horodecki, Peter W. Shor, and Mary Beth Ruskai. Entanglement breaking channels. Reviews in Mathematical Physics, 15(6):629–641, August 2003.
arXiv:quant-ph/0302031.
[KHH12]
J. K. Korbicz, P. Horodecki, and R. Horodecki. Quantum-correlation breaking
channels, broadcasting scenarios, and finite Markov chains. Physical Review A,
86(4):042319, October 2012. arXiv:1208.2162.
[Kin03]
Christopher King. Maximal p-norms of entanglement breaking channels. Quantum
Information and Computation, 3(2):186–190, 2003. arXiv:quant-ph/0212057.
[KW09]
Robert Koenig and Stephanie Wehner. A strong converse for classical channel coding using entangled inputs. Physical Review Letters, 103(7):070504, August 2009.
arXiv:0903.2838.
22
[MH11]
Milán Mosonyi and Fumio Hiai. On the quantum Rényi relative entropies and related
capacity formulas. IEEE Transactions on Information Theory, 57(4):2474–2487,
April 2011. arXiv:0912.1286.
[MLDS` 13]
Martin Müller-Lennert, Frédéric Dupuis, Oleg Szehr, Serge Fehr, and Marco
Tomamichel. On quantum Rényi entropies: A new generalization and some
properties. Journal of Mathematical Physics, 54(12):122203, December 2013.
arXiv:1306.3142.
[MO17]
Milán Mosonyi and Tomohiro Ogawa. Strong converse exponent for classicalquantum channel coding. Communications in Mathematical Physics, 355(1):373–426,
October 2017. arXiv:1409.3562v7.
[Nag01]
Hiroshi Nagaoka. Strong converse theorems in quantum information theory. Proceedings of ERATO Workshop on Quantum Information Science, page 33, 2001. Also
appeared in Asymptotic Theory of Quantum Statistical Inference, ed. M. Hayashi,
World Scientific, 2005.
[ON99]
Tomohiro Ogawa and Hiroshi Nagaoka. Strong converse to the quantum channel coding theorem. IEEE Transactions on Information Theory, 45(7):2486–2489, November
1999. arXiv:quant-ph/9808063.
[OPW97]
Masanori Ohya, Denes Petz, and Noburu Watanabe. On capacities of quantum
channels. Probability and Mathematical Statistics-Wroclaw University, 17:179–196,
1997.
[PV10]
Yury Polyanskiy and Sergio Verdú. Arimoto channel coding converse and Rényi
divergence. Proceedings of the 48th Annual Allerton Conference on Communication,
Control, and Computation, pages 1327–1333, September 2010.
[Sho02]
Peter W. Shor. Additivity of the classical capacity of entanglement-breaking quantum channels. Journal of Mathematical Physics, 43(9):4334–4340, October 2002.
arXiv:quant-ph/0201149.
[Sio58]
Maurice Sion. On general minimax theorems. Pacific Journal of Mathematics,
8(1):171–176, 1958.
[SS09]
Graeme Smith and John A. Smolin. Extensive nonadditivity of privacy. Physical
Review Letters, 103(12):120503, September 2009. arXiv:0904.4050.
[SW97]
Benjamin Schumacher and Michael Westmoreland. Sending classical information via
noisy quantum channels. Physical Review A, 56(1):131–138, July 1997.
[SW01]
Benjamin Schumacher and Michael D Westmoreland. Optimal signal ensembles.
Physical Review A, 63(2):022308, January 2001. arXiv:quant-ph/9912122.
[SW02]
Benjamin Schumacher and Michael D Westmoreland. Relative entropy in quantum
information theory. Contemporary Mathematics, 305:265–290, 2002. arXiv:quantph/0004045.
23
[TWW17]
Marco Tomamichel, Mark M. Wilde, and Andreas Winter. Strong converse rates for
quantum communication. IEEE Transactions on Information Theory, 63(1):715–727,
January 2017. arXiv:1406.2946.
[Ume62]
Hisaharu Umegaki. Conditional expectation in an operator algebra. Kodai Mathematical Seminar Reports, 14(2):59–85, 1962.
[Wil16]
Mark M. Wilde. From classical to quantum Shannon theory.
arXiv:1106.1445v7.
[Win99]
Andreas Winter. Coding theorem and strong converse for quantum channels. IEEE
Transactions on Information Theory, 45(7):2481–2485, 1999. arXiv:1409.2536.
[Wol78]
Jacob Wolfowitz. Coding Theorems of Information Theory. Springer-Verlag New
York, Inc., Secaucus, NJ, USA, 3rd edition, 1978.
[WWY14]
Mark M. Wilde, Andreas Winter, and Dong Yang. Strong converse for the classical
capacity of entanglement-breaking and Hadamard channels via a sandwiched Rényi
relative entropy. Communications in Mathematical Physics, 331(2):593–622, October
2014. arXiv:1306.1586.
24
March 2016.
| 7 |
NORTH-SOUTH DYNAMICS OF HYPERBOLIC FREE GROUP
AUTOMORPHISMS ON THE SPACE OF CURRENTS
arXiv:1509.05443v3 [math.GR] 29 Jun 2017
MARTIN LUSTIG AND CAGLAR UYANIK
Abstract. Let ϕ be a hyperbolic outer automorphism of a non-abelian free group FN
such that ϕ and ϕ−1 admit absolute train track representatives. We prove that ϕ acts on
the space of projectivized geodesic currents on FN with generalized uniform North-South
dynamics.
1. Introduction
Thurston’s groundbreaking work on the classification of surface homeomorphisms (NielsenThurston classification) has triggered much of the progress on the mapping class group and on
the Teichmüller space in the past 30 years. This theory has inspired important developments
for several related groups; most notably for the group Out(FN ) of outer automorphisms of
a non-abelian free group FN of finite rank N ≥ 2.
Two rather different spaces on which Out(FN ) acts serve as analogues to Teichmüller
space: One is Culler-Vogtmann’s Outer space CVN [CV86], the other is the space of projectivized geodesic currents PCurr(FN ) [Bon91]. An intersection form, generalizing Thurston’s
celebrated intersection form for measured laminations [Thu88], intimately intertwines the
two spaces [KL09].
The space CVN is finite dimensional, and the action of Out(FN ) on CVN is properly
discontinuous. Moreover, CVN has a natural “Thurston boundary”, which gives rise to a
compactification CVN . The Out(FN )-action extends to this compactification, which mimics
closely Thurston’s compactification of the Teichmüller space via projective measured laminations [BF93], [CL95], [CV86], [Thu88].
On the other hand, the space of projectivized geodesic currents PCurr(FN ) is infinite
dimensional, but it is already compact, and has a projective structure. There is a natural
“interior” of PCurr(FN ) on which Out(FN ) acts properly discontinuously [KL10a].
The space CVN has received more attention in recent years than PCurr(FN ), due to the
connections with various curve complex analogues (see e.g. [BF14], [HM13]). Nevertheless,
for several purposes, including some rather fundamental ones, the space PCurr(FN ) seems to
have an advantage over CVN . In order get a deeper understanding one often needs to utilize
the action of Out(FN ) on both spaces simultaneously, see for instance [BR15], [Ham12].
February 12, 2018.
The authors gratefully acknowledge support from U.S. National Science Foundation grants DMS 1107452,
1107263, 1107367 “RNMS: GEometric structures And Representation varieties” (the GEAR Network).” The
first author was partially supported by the French research grant ANR-2010-BLAN-116-01 GGAA. The
second author was partially supported by the NSF grants of Ilya Kapovich (DMS 1405146 and DMS 1710868)
and Christopher J. Leininger (DMS 1510034).
1
2
MARTIN LUSTIG AND CAGLAR UYANIK
This paper concerns one of the fundamental features prominently present in NielsenThurston theory: the dynamics of the action of individual elements ϕ ∈ Out(FN ) on
PCurr(FN ), and the study of the relationship between aspects of this dynamics and the
algebraic structure of ϕ. More precisely, the paper aims to generalize Thurston’s result that
any pseudo-Anosov mapping class acts on compactified Teichmüller space with North-South
dynamics [Thu88, Iva92]
An important result in this direction is already known for both of the above mentioned
Out(FN )-analogues of Teichmüller space: If the automorphism ϕ ∈ Out(FN ) is fully irreducible, also known as iwip (“irreducible with irreducible powers”), then the ϕ-action
on both, CVN and PCurr(FN ), has uniform North-South dynamics, see [LL03], [Mar95],
[Uya14] and [Uya15]. The pairs of poles of these two actions are strongly related to each
other through the above mentioned intersection form, see [CHL08], [KL10b], [Uya15].
In this paper we concentrate on the following class of automorphisms: An element ϕ ∈
Out(FN ) is called hyperbolic if the length of any non-trivial conjugacy class grows exponentially under iteration of ϕ. This condition turns out to be equivalent to requiring that ϕ is
atoroidal, i.e. ϕ has no non-trivial periodic conjugacy class in FN .
Recall that both classes, fully irreducible and hyperbolic automorphisms, can be viewed as
natural analogues of pseudo-Anosov mapping classes. In a probabilistic sense, both of these
notions are “generic” in Out(FN )[Riv08], as is the case for pseudo-Anosov homeomorphisms
in mapping class groups [Riv08, Mah11]. Hyperbolic automorphisms have the advantage that
their mapping torus groups FN oϕ Z are Gromov hyperbolic, see [BF92], [Bri00]. However,
hyperbolic automorphisms can admit invariant free factors and hence these automorphisms
are harder to study than fully irreducible automorphisms. As a consequence of the more
complicated algebraic structure, one can not expect a classical North-South dynamics for
hyperbolic automorphisms. Counterexamples for both, CVN and PCurr(FN ) are easy to
construct.
Nevertheless, it turns out that there are still strong North-South dynamical features in the
action of any hyperbolic ϕ ∈ Out(FN ) on the space of currents. This paper aims to make
this statement precise: We define “generalized North and South poles” in PCurr(FN ), which
are finite dimensional simplexes ∆+ (ϕ) and ∆− (ϕ), and show:
Theorem 1.1. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism with the property that
both ϕ and ϕ−1 admit (absolute) train track representatives. Then ϕ acts on PCurr(FN ) with
“generalized uniform North-South dynamics from ∆− (ϕ) to ∆+ (ϕ)” in the following sense:
Given a neighborhood U of ∆+ (ϕ) and a compact set K ⊂ PCurr(FN ) r ∆− (ϕ), there
exists an integer M ≥ 1 such that ϕn (K) ⊂ U for all n ≥ M .
Similarly, given a neighborhood V of ∆− (ϕ) and a compact set K 0 ⊂ PCurr(FN ) r ∆+ (ϕ),
there exists an integer M 0 ≥ 1 such that ϕ−n (K 0 ) ⊂ V for all n ≥ M 0 .
Although there exist hyperbolic automorphisms that do not admit (absolute) train track
representatives (see Sections 2.3 and 2.4), the train track assumption in the above theorem
turns out to be not really restrictive (see Remark 2.6). Our train track technology (see
Section 4) has been purposefully set up in a way that it also applies to more general kind
of train track maps. Since the paper is already technically rather loaded, we have refrained
from adding such generalizations here.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
3
The second dynamics result obtained here concerns single orbits of rational currents, that
is, currents given by non-trivial conjugacy classes in FN , which form a dense subset of
PCurr(FN ), see Section 2.5:
Theorem 1.2. Let ϕ be as in Theorem 1.1, and let µ ∈ Curr(FN ) be a non-zero rational
current.
Then, after possibly replacing ϕ by a positive power, there are [µ∞ ] ∈ ∆+ (ϕ) and [µ−∞ ] ∈
∆− (ϕ) such that
lim ϕn [µ] = [µ∞ ]
n→∞
and
lim ϕ−n [µ] = [µ−∞ ].
n→∞
It is important to point out that this pointwise convergence is in general not uniform: On
the contrary, it is possible to construct examples of hyperbolic ϕ for which there exist rational
currents that linger for an arbitrary long iteration time in an arbitrary close neighborhood
of a (fixed) current that is different from the eventual limit current.
We now give a brief outline of the paper. We’d like to point out immediately that the
sections 3, 4 and 5 are written independently of each other and can be read in arbitrary
order.
• In Section 2 we recall some background information and set up notation that is
needed in the sections to follow.
• In Section 3 we define several versions of North-South dynamics (in a general context without reference to Out(FN ) or currents) and derive the main criterion (Propositions
3.3 and 3.4) used in the proof of Theorem 1.1.
• Section 4 is entirely devoted to train track technology, addressing issues such as indivisible Nielsen paths (INPs), exponential growth of the number of illegal turns under
backwards iteration, etc. Moreover, we recall and investigate the notion of “goodness” which plays a key role in our analysis. We conclude Section 4 with Proposition
4.20 (see also Remark 4.21). This proposition is a crucial tool in our approach,
since it permits the restriction of our attention in the convergence approximation to
conjugacy classes with large goodness.
• In Section 5 we present some standard notions from symbolic dynamics and use the
main result from our previous paper [LU17] on limit frequencies of substitutions in
order to define the limit simplexes ∆+ (ϕ) and ∆− (ϕ) and show their ϕ-invariance
(Corollary 5.12).
• In Section 6 the crucial convergence approximation is calculated for conjugacy classes
with large goodness (Lemma 6.1), done carefully over several pages. The main results
are derived from “putting together the pieces” derived previously. We finish this
section with a particular “free products” example of hyperbolic outer automorphisms
which are not fully irreducible.
Acknowledgements: We would heartfully like to thank Ilya Kapovich for his constant
encouragement and support, as well as for many helpful mathematical and organizational
suggestions. We would also like to thank Arnaud Hilion and Matt Clay for useful exchanges
and helpful comments. We thank the anonymous referee who provided detailed feedback,
4
MARTIN LUSTIG AND CAGLAR UYANIK
and prompted us to clarify several points and improve the exposition. The second author is
grateful to Chris Leininger for useful discussions, support, and helpful comments.
2. Preliminaries
We first recall facts about graphs, paths, and maps between graphs. For an even more
detailed discussion of these notions we refer reader to Section 2 of [DKL15]. For a streamlined
version which uses the standard conventions the reader is referred to [LU16].
2.1. Graphs. A topological graph Γ is a 1-dimensional finite cell complex. The 0-cells of
Γ are called vertices and the set of vertices is denoted by V Γ. The 1-cells of Γ are called
topological edges and the set of topological edges is denoted by Etop Γ. Each topological edge
admits exactly two orientations, and we call a topological edge with a choice of orientation
an oriented edge. The set of all oriented edges is denoted by EΓ. Given e ∈ EΓ, we denote
the edge with the opposite orientation by e. Given a finite set of points in a topological graph
Γ, one obtains a topological graph Γ0 as the subdivision, in which the vertex set contains the
original vertex set, together with the finite set of points.
Let Γ be a topological graph. We choose an orientation for each edge, and denote the
set of positively (resp. negatively) oriented edges by E + Γ ( resp. E − Γ). Given an edge
e ∈ E + Γ, the initial vertex of e is denoted by o(e) and the terminal vertex of e is denoted
by t(e).
The graph Γ is equipped with a natural metric called the simplicial metric which is
obtained by identifying each edge e of Γ with the interval [0, 1] via a characteristic map
αe : [0, 1] → e, meaning that α is continuous on [0, 1] and the restriction to (0, 1) is an
orientation preserving homeomorphism onto the interior of e.
2.2. Paths. A combinatorial edge path γ of simplicial length n ≥ 1 is a concatenation
e1 e2 . . . en of oriented edges of Γ where t(ei ) = o(ei+1 ). The simplicial length of an edge path
γ in Γ is denoted by |γ|Γ , and if it is clear from the context, we suppress Γ and write |γ|.
A topological edge path of simplicial length n ≥ 1 is a continuous map p : [a, b] → Γ such
that there exists a combinatorial edge path γp = e1 e2 . . . en and a subdivision a = c0 < c1 <
c2 < . . . < cn = b such that for each 1 ≤ i ≤ n we have p(ci−1 ) = o(ei ), and p(ci ) = t(ei ) and
the restriction of p to (ci−1 , ci ) is an orientation preserving homeomorphism onto the interior
of ei . We say that γp is the combinatorial edge path associated to p.
Let Γ be equipped with the simplicial metric as above. A topological edge path p : [a, b] →
Γ is a PL edge path if for every edge ei in the combinatorial edge path γp the composition
αe−1
◦ p : (ci−1 , ci ) → (0, 1) is the unique orientation preserving affine homeomorphism from
i
(ci−1 , ci ) to (0, 1). By not requiring that p(a) and p(b) are vertices in Γ, the concept of PL
edge paths easily extend to PL paths.
A combinatorial edge path of simplicial length 0 consists of a vertex in Γ. A (degenerate)
edge path γ that consists of a vertex is called trivial. A combinatorial edge path γ is called
reduced if ei 6= ei+1 for all i = 1, . . . , n − 1. A reduced edge path is called cyclically reduced
if t(en ) = o(e1 ) and en 6= e1 . A topological or PL edge path is called reduced (resp. trivial) if
the corresponding combinatorial edge path is reduced (resp. trivial). More generally, a PL
path is called reduced if p : [a, b] → Γ is locally injective.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
5
2.3. Graph maps. A topological graph map f : Γ → Γ is a continuous map that sends
vertices to vertices, and edges to topological edge paths. The latter means that for any edge
e and a characteristic map αe : [0, 1] → Γ, the composition f ◦ αe : [0, 1] → Γ is a topological
edge path as above.
A linear graph map is a topological graph map f : Γ → Γ as above which, in addition,
satisfies the following condition: For every e ∈ Γ, the restriction of f to e is a PL edge path
from f (o(e)) to f (t(e)).
Note that given a topological graph map f : Γ → Γ there is a linear graph map from Γ to
itself that is homotopic to f relative to vertices.
Definition 2.1. We say that a topological graph map f : Γ → Γ is regular if for all e ∈ EΓ
the (combinatorial) edge path (associated to) f (e) is non-trivial and reduced. The map f is
called expanding if for every edge e ∈ EΓ there is an exponent t ≥ 1 such that the edge path
f t (e) has simplicial length |f t (e)| ≥ 2.
A turn in Γ is a pair (e1 , e2 ) where o(e1 ) = o(e2 ). A turn is called non-degenerate if
e1 6= e2 , otherwise it is called degenerate. A regular graph map f : Γ → Γ induces a
derivative map Df : EΓ → EΓ where Df (e) is the first edge of the combinatorial edge
path associated to f (e). The derivative map induces a map T f on the set of turns defined
as T f ((e1 , e2 )) := (Df (e1 ), Df (e2 )). A turn (e1 , e2 ) is called legal if T f n ((e1 , e2 )) is nondegenerate for all n ≥ 0. An edge path γ = e1 e2 . . . en is called legal if every turn (ei , ei+1 )
in γ is legal.
Remark-Convention 2.2. (1) For the rest of this paper, a path means a PL path. Also note
that, given a combinatorial edge path γ in Γ there is always a PL edge path p : [a, b] → Γ such
that γp = γ. Hence, by an edge path we will either mean a PL edge path or a combinatorial
edge path and won’t make a distinction unless it is not clear from the context.
(2) Similarly, from now on, unless otherwise stated, a graph map means a linear graph map
as defined above.
Definition 2.3. A graph map f : Γ → Γ is called a train track map if for every edge e and
any t ≥ 1 the edge path f t (e) is legal.
2.4. Markings and topological representatives. Let FN denote a free group of finite
rank N ≥ 2 which we fix once and for all. A graph Γ is said to be marked, if it is equipped
∼
=
with a marking isomorphism θ : FN −→ π1 Γ. Markings are well defined only up to inner
automorphisms, which is why we suppress the choice of a base point in Γ.
A homotopy equivalence f : Γ → Γ is a topological representative of an automorphism
∼
=
ϕ ∈ Out(FN ) with respect to the marking θ : FN −→ π1 Γ if one has ϕ = θ−1 f∗ θ. A graph
map f : Γ → Γ is called a train track representative for ϕ if f is a topological representative
for ϕ and f is a train track map.
Remark 2.4. If a topological graph map f : Γ → Γ represents a hyperbolic outer automorphism ϕ of FN , then the hypothesis that f be expanding is easy to satisfy: It suffices to
contract all edges which are not expanded by any iterate f t to an edge path of length ≥ 2:
The contracted subgraph must be a forest, as otherwise some f t would fix a non-contractible
loop and hence ϕt would fix a non-trivial conjugacy class of π1 (Γ) ∼
= FN , contradicting the
6
MARTIN LUSTIG AND CAGLAR UYANIK
assumption that ϕ is hyperbolic. It is easy to see that, if f is a train track map, then this
property is inherited by the above “quotient map”.
Given an (not necessarily reduced) edge path γ ∈ Γ, let [γ] denote the reduced edge path
which is homotopic to γ relative to endpoints. The following is a classical fact for free group
automorphisms:
Lemma 2.5 (Bounded Cancellation Lemma). [Coo87] Let f : Γ → Γ be topological graph
map that is a homotopy equivalence. There exist a constant Cf , depending only on f , such
that for any reduced edge path ρ = ρ1 ρ2 in Γ one has
|[f (ρ)]| ≥ |[f (ρ1 )]| + |[f (ρ2 )]| − 2Cf .
That is, at most Cf terminal edges of [f (ρ1 )] are cancelled against Cf initial edges of [f (ρ2 )]
when we concatenate them to obtain [f (ρ)].
Remark 2.6. In Section 4 of this paper we will consider train track maps f : Γ → Γ that
are not assumed to be homotopy equivalences. We do, however, assume that f possesses
a cancellation bound: there is an integer C ≥ 0 such that for any two legal edge paths γ
and γ 0 with common initial vertex but distinct initial edges the backtracking path γ 00 at the
image of the concatenation point of the non-reduced path f (γ ◦ γ 0 ) has combinatorial length
|γ 00 | ≤ C. The smallest such integer C is denoted by C(f ).
The reason for not imposing the homotopy equivalence condition is to make the results and
techniques of this paper available for the study of free group endomorphisms, as well as for
the use of more general type of train track maps in the context of free group automorphisms.
Definition 2.7. A path η in Γ which crosses over precisely one illegal turn is called a periodic
indivisible Nielsen path (or INP, for short), if for some exponent t ≥ 1 one has [f t (η)] = η.
The smallest such t is called the period of η. A path γ is called pre-INP if its image under
f t0 is an INP for some t0 ≥ 1. The illegal turn on η = γ 0 ◦ γ is called the tip of η, while the
two maximal initial legal subpaths γ 0 and γ, of η and η respectively, are called the branches
of η. A multi-INP or a Nielsen path is a legal concatenation of finitely many INP’s.
If f is an expanding train track map, then any non-trivial reduced path η, such that f t (η)
is homotopic to η relative to endpoints for some t ≥ 1, can be written as a legal concatenation
of finitely many INP’s. This can be seen by a direct elementary argument; alternatively it
follows from Proposition 4.12.
The reader should be aware of the fact that a priori the endpoints of an INP may not be
vertices of Γ (compare with Convention 4.7 below).
2.5. Geodesic Currents on Free Groups. Let FN be the free group of finite rank N ≥ 2,
and denote by ∂FN the Gromov boundary of FN . The double boundary of FN is defined by
∂ 2 FN := (∂FN × ∂FN ) r ∆,
where ∆ denotes the diagonal. The flip map on ∂ 2 FN is defined by
(ξ, ζ) 7→ (ζ, ξ).
A geodesic current µ on FN is a locally finite, Borel measure on ∂ 2 FN which is flip and
FN -invariant. The set of all geodesic currents on FN is denoted by Curr(FN ). The space of
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
7
currents is naturally equipped with the weak*-topology. In particular, a sequence of currents
µn ∈ Curr(FN ) satisfies
lim µn = µ iff
n→∞
lim µn (S1 × S2 ) = µ(S1 × S2 )
n→∞
for any two disjoint Borel subsets S1 , S2 ⊂ ∂FN .
An immediate example of a geodesic current is given by any non-trivial conjugacy class
in FN : For an element g ∈ FN which is not a proper power (i.e. g 6= hk for any h ∈ FN
and any k ≥ 2) define the counting current ηg as follows: for any Borel set S ⊂ ∂ 2 FN the
value ηg (S) is the number of FN -translates of (g −∞ , g ∞ ) or of (g ∞ , g −∞ ) that are contained
in S. For an arbitrary element h ∈ FN r {1} write h = g k , where g is not a proper power,
and define ηh := kηg . It is easy to see that this definition is independent of the particular
representative of the conjugacy class of h, so that ηh depends only on [h] ⊂ FN . The set of
all non-negative real multiples of a counting current is called rational currents, and it is an
important fact that rational currents are dense in Curr(FN ), see [Kap05], [Kap06].
Let Φ ∈ Aut(FN ) be an automorphism of FN . Since Φ induces homeomorphisms on
∂FN and on ∂ 2 FN , there is a natural action of Aut(FN ) on the space of currents: For any
Φ ∈ Aut(FN ), µ ∈ Curr(FN ) and any Borel subset S ⊂ ∂ 2 FN one has
Φµ(S) := µ(Φ−1 (S)).
Note that any inner automorphism of FN acts trivially, so that the above action factors
through the quotient of Aut(FN ) by all inner automorphisms to give a well defined action of
Out(FN ) on Curr(FN ).
The space of projectivized geodesic currents is defined as the quotient
PCurr(FN ) =: Curr(FN ) ∼
where µ1 ∼ µ2 in Curr(FN ) if and only µ1 = λµ2 for some λ > 0. We denote the projective
class of the current µ by [µ].
We derive from the above stated facts:
Proposition 2.8. (1) The space PCurr(FN ) is a compact metric space, and the above actions
of Aut(FN ) and Out(FN ) on Curr(FN ) descend to well defined actions on PCurr(FN ) by
setting
ϕ[µ] := [ϕµ].
(2) The subset of PCurr(FN ) defined by all rational currents is dense in PCurr(FN ).
For any marked graph Γ the marking isomorphism θ : FN → π1 Γ gives rise to canonical
FN -equivariant homeomorphisms between the Gromov boundaries and double boundaries of
e which for simplicity we also denote by θ.
the group FN and of the universal cover Γ,
e We define the cylinder set associated to γ
Let γ
e be a reduced edge path in Γ.
e as follows:
Cyl(e
γ ) := {(ξ, ζ) ∈ ∂FN | γ
e is a subpath of [∂θ(ξ), ∂θ(ζ)]}
where [∂θ(ξ), ∂θ(ζ)] denotes the biinfinite reduced edge path that joins the end ∂θ(ξ) to the
e
end ∂θ(ζ) of Γ.
8
MARTIN LUSTIG AND CAGLAR UYANIK
e We
Let γ be a reduced edge path in Γ and let µ ∈ Curr(FN ). Let γ
e be a lift of γ to Γ.
define
hγ, µi := µ(Cyl(e
γ ))
and note that the FN -equivariance for geodesic currents implies that the value µ(Cylα (e
γ ))
does not depend on the particular lift γ
e we chose, so we have a well defined quantity hγ, µi.
Note also that in case of a rational current µ = ηg the quantity hγ, µi is given by the
number of occurrences of γ or of γ in the reduced loop [γ] which represents the conjugacy
class [g]. Moreover, the action of Out(FN ) on rational currents is given explicitly by the
formula
(2.1)
ϕηg = ηϕ(g) .
An important fact about cylinder sets is that they form a basis for the topology on ∂ 2 FN , so
that a geodesic current µ is uniquely determined by the set of values hγ, µi for all non-trivial
reduced edge paths γ in Γ, see [Kap06].
In particular, we have lim µn = µ if and only if lim hγ, µn i = hγ, µi for all reduced edge
n→∞
n→∞
paths γ in Γ.
Moreover, if we denote by P(Γ) the set of reduced edge paths in Γ, then the function
µΓ : P(Γ) → R≥0 , γ 7→ hγ, µi
satisfies for all γ ∈ P(Γ):
P
(1) µΓ (γ) =
µΓ (γ 0 ) =
γ 0 ∈E+ (γ)
P
µΓ (γ 00 ), and
γ 0 ∈E− (γ)
(2) µΓ (γ) = µΓ (γ),
where E+ (γ) ⊂ P(Γ) and E− (γ) ⊂ P(Γ) denote the set of reduced edge paths obtained from
γ by adding a further edge at the beginning or at the end respectively.
Any function µ0Γ : P(Γ) → R≥0 which satisfies (1) and (2) above is called a Kolmogorov
function, and it is well known (see [Kap05, Kap06]) that any such µ0Γ defines uniquely a
geodesic current µ on FN which satisfies µΓ = µ0Γ .
Let Γ be a marked graph as above. Given a geodesic current µ ∈ Curr(FN ), define the
weight of µ with respect to Γ as
X
(2.2)
kµkΓ :=
he, µi.
e∈E + Γ
The following criterion given in [Kap06] plays a key role in our convergence estimates in
Section 6.
Lemma 2.9. Let ([µn ])n∈N be a sequence of currents in PCurr(FN ). Then one has lim [µn ] =
n→∞
[µ] in PCurr(FN ) if and only if
hγ, µn i
hγ, µi
=
n→∞ kµn kΓ
kµkΓ
lim
holds for all reduced edge paths γ in Γ.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
9
3. North-South dynamics
In this section we describe some general considerations for maps with North-South dynamics. We will keep the notation simple and general; at no point we will refer to the specifics of
currents on free groups. However, in this section we will prove the main criteria used in the
remainder of the paper to establish the North-South dynamics result in our main theorem.
Definition 3.1. Let f : X → X be homeomorphism of a topological space X.
(a) The map f is said to have (pointwise) North-South dynamics if f has two distinct fixed
points P+ and P− , called attractor and repeller, such that for every x ∈ X r {P+ , P− } one
has:
lim f t (x) = P+
and
lim f t (x) = P− .
t→∞
t→−∞
(b) The map f is said to have uniform North-South dynamics if the following holds: There
exist two distinct fixed points P− and P+ of f , such that for every compact set K ⊂ X r{P− }
and every neighborhood U+ of P+ there exists an integer t+ ≥ 0 such that for every t ≥ t+
one has:
f t (K) ⊂ U+ .
Similarly, for every compact set K ⊂ X r {P+ } and every neighborhood U− of P− there
exists an integer t− ≤ 0 such that for every t ≤ t− one has:
f t (K) ⊂ U− .
It is easy to see that uniform North-South dynamics implies pointwise North-South dynamics.
Definition 3.2. A homeomorphism f : X → X of a topological space X has generalized
uniform North-South dynamics if there exist two disjoint compact f -invariant sets ∆+ and
∆− in X, such that the following hold:
(i) For every compact set K ⊂ X r ∆− and every neighborhood U+ of ∆+ there exists
an integer t+ ≥ 0 such that for every t ≥ t+ one has:
f t (K) ⊂ U+
(ii) For every compact set K ⊂ X r ∆+ and every neighborhood U− of ∆− there exists
an integer t− ≤ 0 such that for every t ≤ t− one has:
f t (K) ⊂ U−
More precisely, we say that the map f has generalized uniform North-South dynamics
from ∆− to ∆+ . Note that we interpret the phrase “f -invariant” in its strong meaning, i.e.
f (∆+ ) = ∆+ and f (∆− ) = ∆− .
Proposition 3.3. Let f : X → X be a homeomorphism of a compact metrizable space X.
Let Y ⊂ X be dense subset of X, and let ∆+ and ∆− be two f -invariant sets in X that are
disjoint. Assume that the following criterion holds:
For every neighborhood U of ∆+ and every neighborhood V of ∆− there exists an integer
m0 ≥ 1 such that for any m ≥ m0 and any y ∈ Y one has either f m (y) ∈ U or f −m (y) ∈ V .
Then f 2 has generalized uniform North-South dynamics from ∆− to ∆+ .
10
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. Let K ⊂ X r ∆− be compact, and let U and V be neighborhoods of ∆+ and ∆−
respectively. See Figure 1.
X
V
U
U0
∆−
∆+
W
K
Figure 1.
Let W be an open neighborhood of K such that W ∩ V = ∅. Since X is compact, the
closure W is compact. Then V1 := V r W is again an open neighborhood of ∆− , moreover it
is disjoint from W . Let U1 be a neighborhood of ∆+ which has the property that its closure
is contained in the interior of U . Such a neighborhood exists because X is a metrizable
space.
Let m0 be as postulated in the criterion, applied to the neighborhoods U1 and V1 , and
pick any m ≥ m0 . Consider any y ∈ Y ∩ f m (W ). Notice that f −m (y) is contained in W ,
which is disjoint from V1 . Thus, by the assumed criterion, f m (y) must be contained in U1 .
Since W is open and f is a homeomorphism, any dense subset of X must intersect f m (W )
in a subset that is dense in f m (W ). This implies that f m (f m (W )) ⊆ U1 ⊂ U . Since K ⊂ W ,
this shows that f 2m (K) ⊂ U .
Using the analogous argument for the inverse iteration we see that f 2 has generalized
uniform North-South dynamics from ∆− to ∆+ .
u
t
Proposition 3.4. Let f : X → X be a homeomorphism of a compact space X, and let ∆+
and ∆− be disjoint f -invariant sets. Assume that some power f s with s ≥ 1 has generalized
uniform North-South dynamics from ∆− to ∆+ .
Then the map f , too, has generalized uniform North-South dynamics from ∆− to ∆+ .
Proof. Let K ⊂ X r ∆− be compact, and let U be an open neighborhood of ∆+ .
Set K 0 := K ∪ f (K) ∪ . . . ∪ f s−1 (K), which is again compact. Note that the fact that
K ⊂ X r ∆− and f −1 (∆− ) = ∆− implies that K 0 ⊂ X r ∆− . Indeed, x ∈ K 0 implies that
x = f t (y) for some y ∈ K and for some 0 ≤ t ≤ s − 1.
Thus x ∈ ∆− would imply that y = f −t (x) ∈ f −1 (∆− ) = ∆− , contradicting the assumption K ∩ ∆− = ∅.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
11
From the hypothesis that f s has generalized uniform North-South dynamics from ∆− to
0
∆+ it follows that there is a bound t0 such that for all t0 ≥ t0 one has f t s (K 0 ) ⊂ U .
Hence, for any point x ∈ K and any integer t ≥ st0 , we can write t = k + st0 with t0 ≥ t0
and 0 ≤ k ≤ s − 1 to obtain the desired fact
0
0
f t (x) = f k+st (x) = f st f k (x) ∈ f st (K 0 ) ⊂ U.
The analogous argument for f −1 finishes the proof of the Lemma.
u
t
4. Train-Tracks
In this section we will consider train track maps which satisfy the following properties:
Convention 4.1. Let Γ be a finite connected graph, and let f : Γ → Γ be an expanding train
track map which possesses a cancellation bound Cf ≥ 0 as defined in Remark 2.6. We also
assume that f has been replaced by a positive power so that for some integers λ00 ≥ λ0 > 1
we have, for any edge e of Γ:
λ00 ≥ |f (e)| ≥ λ0
(4.1)
and λ0 , λ00 is attained for some edges.
4.1. Goodness.
The following terminology was introduced by R. Martin in his thesis [Mar95].
Definition 4.2. Let f : Γ → Γ, Cf and λ0 be as in Convention 4.1. Define the critical
Cf
constant C for f as C := 0
. Let γ be a reduced edge path in Γ. Any edge e in γ that is
λ −1
at least C edges away from an illegal turn on γ is called good, where the distance (= number
of edges traversed) is measured on γ. An edge is called bad if it is not good. Edge paths or
loops, in particular subpaths of a given edge path, which consist entirely of good (or entirely
of bad) edges are themselves called good (or bad).
For any edge path or a loop γ in Γ we define the goodness of γ as the following quotient:
#{good edges of γ}
g(γ) :=
∈ [0, 1]
|γ|
We will now discuss some basic properties of the goodness of paths and loops. We first
consider any legal edge path γ in Γ of length |γ| = C and compute:
(4.2)
|f (γ)| ≥ λ0 |γ| = λ0 C = Cf + C
Lemma 4.3. Let f : Γ → Γ and λ0 be as in Convention 4.1. Let γ be a reduced edge path or
a cyclically reduced loop in Γ. Then any good subpath γ 0 of γ has the property that no edge
of f (γ 0 ) = [f (γ 0 )] is cancelled when f (γ) is reduced, and that it consists entirely of edges that
are good in [f (γ)]. Hence, for any reduced loop γ in Γ we have:
#{good edges in [f (γ)]} ≥ λ0 · #{good edges in γ}
Proof. If γ is legal, then every edge is good, and the lemma follows directly from the definition
of λ0 in Convention 4.1. Now assume that the path γ has at least one illegal turn. Let
γ = γ1 B1 γ2 B2 . . . γn Bn
12
MARTIN LUSTIG AND CAGLAR UYANIK
b2
a1
γ1
a2
Figure 2. ai ’s are legal ends of maximal bad segments, γ is a good (legal) segment
be a decomposition of γ into maximal good edge paths γi and maximal bad edge paths Bi .
Note that each maximal bad segment Bi can be written as an illegal concatenation Bi =
ai bi ai+1 where ai is a legal segment of length C and bi is an edge path that (possibly) contains
some illegal turns.
Note that since |f (ai )| ≥ λ0 |ai | ≥ λ0 C = Cf +C, Lemma 2.5 implies that [f (Bi )] is an edge
path of the from [f (Bi )] = a0i b0i c0i where a0i , c0i are legal edge paths such that |a0i |, |c0i | ≥ C.
Moreover, the turn at f (γi )a0i is legal. Since by Convention 4.1 every edge grows at least by
a factor of λ0 , this implies the required result.
u
t
On the other hand, for any cyclically reduced loop γ the number of bad edges is related
to the number of illegal turns on γ, which we denote by ILT (γ), via:
(4.3)
ILT (γ) ≤ #{bad edges in γ} ≤ 2C · ILT (γ)
Since the number of illegal turns on γ can only stay constant or decrease under iteration of
the train track map, we obtain directly
(4.4)
#{bad edges in [f t (γ)]} ≤ 2C · ILT (γ) ≤ 2C · #{bad edges in γ}
for all positive iterates f t of f .
Notice however that the number of bad edges may actually grow (slightly) faster than the
number of good edges under iteration of f , so that the goodness of γ does not necessarily
grow monotonically under iteration of f . Nevertheless up to passing to powers one can
overcome this issue:
Proposition 4.4. Let f : Γ → Γ be as in Convention 4.1.
(a) There exists an integer s ≥ 1 such that for every reduced loop γ in Γ one has:
g([f s (γ)]) ≥ g(γ)
In particular, for any integer t ≥ 0 one has
g([(f s )t (γ)]) ≥ g(γ)
(b) If 0 < g(γ) < 1, then for any integer s0 > s we have
0
g([f s (γ)]) > g(γ)
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
13
and thus, for any t ≥ 0:
0
g([(f s )t (γ)]) > g(γ)
Proof. (a) We set s ≥ 1 so that λ0 s ≥ 2C and obtain from Lemma 4.3 for the number g 0 of
good edges in [f s (γ)] and the number g of good edges in γ that:
s
g 0 ≥ λ0 g
For the number b0 of bad edges in [f s (γ)] and the number b of bad edges in γ we have from
equation (4.4) that:
b0 ≤ 2Cb
Thus we get
g0
g
g0
λ0s g
g
≥
and
hence
≥
≥
0
0
0
b
2C b
b
g +b
g+b
s
which proves g([f (γ)]) ≥ g(γ). The second inequality in the statement of the lemma follows
directly from an iterative application of the first.
(b) The proof of part (b) follows from the above given proof of part (a), since λ0 s > 2C
unless there is no good edge at all in γ, which is excluded by our hypothesis 0 < g(γ). Since
the hypothesis g(γ) < 1 implies that there is at least one illegal turn in γ, in the above proof
we get b ≥ 1, which suffices to show
g0
g
> ,
0
b
b
s
and thus g([f (γ)]) > g(γ).
u
t
From the inequalities at the end of part (a) of the above proof one derives directly, for
g > 0, the inequality
1
g([f s (γ)]) ≥
.
2C
1
1 + λ0s ( g(γ)
− 1)
Hence we obtain:
Corollary 4.5. Let f : Γ → Γ be as in Convention 4.1, and let δ > 0 and ε > 0 be given.
Then there exist an integer M 0 = M 0 (δ, ε) ≥ 0 such that for any loop γ in Γ with g(γ) ≥ δ
we have g([f m (γ)]) ≥ 1 − ε for all m ≥ M 0 .
u
t
4.2. Illegal turns and iteration of the train track map.
The following lemma (and also other statements of this subsection) are already known in
differing train track dialects (compare for example Lemma 4.2.5 in [BFH00]); for convenience
of the reader we include here a short proof. Recall the definition of an INP and a pre-INP
from Definition 2.7.
Lemma 4.6. Let f : Γ → Γ be as in Convention 4.1. Then there are only finitely many
INP’s and pre-INP’s in Γ for f . Furthermore, there is an efficient method to determine
them.
14
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. We consider the set V of all pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 with common
initial vertex but distinct first edges, which have combinatorial length |γ1 | = |γ2 | = C. Note
that V is finite.
From the definition of the cancellation bound and the inequalities (4.1) it follows directly
that every INP or every pre-INP η must be a subpath of some path γ 1 ◦ γ2 with (γ1 , γ2 ) ∈ V.
Furthermore, we define for i = 1 and i = 2 the initial subpath γi∗ of γi to consist of all points
x of γi that are mapped by some positive iterate f t into the backtracking subpath at the
tip of the unreduced path f t (γ 1 ◦ γ2 ). We observe that the interior of any INP-subpath or
pre-INP-subpath η of γ 1 ◦ γ2 must agree with the subpath γ ∗1 ◦ γ2∗ . Thus any pair (γ1 , γ2 ) ∈ V
can define at most one INP-subpath of γ 1 ◦ γ2 . Since V is finite and easily computable, we
obtain directly the claim of the lemma.
u
t
In light of Lemma 4.6, we obtain a subdivision Γ0 of Γ by adding the endpoints of all the
finitely many INP’s or pre-INP’s, while keeping the property that f maps vertices to vertices.
This gives a train track map f 0 : Γ0 → Γ0 which represents the same outer automorphism
as f : Γ → Γ, thus justifying that from now on we concentrate on train track maps which
satisfy the following:
Convention 4.7. Let f : Γ → Γ be a train track map as in Convention 4.1. We assume in
addition that every endpoint of an INP or a pre-INP is a vertex.
Lemma 4.8. Let f : Γ → Γ be as in Convention 4.7. Then, there exists an exponent M1 ≥ 1
with the following property: Let γ be a path in Γ, and assume that it contains precisely two
illegal turns, which are the tips of INP-subpaths or pre-INP-subpaths η1 and η2 of γ. If η1
and η2 overlap in a non-trivial subpath γ 0 , then f M1 (γ) reduces to a path [f M1 (γ)] which has
at most one illegal turn.
Proof. For any point x1 in the interior of one of the two legal branches of an INP or a pre-INP
η there exists a point x2 on the other legal branch such that for a suitable positive power
of f one has f t (x1 ) = f t (x2 ). Hence, if we pick a point x in the interior of γ 0 , there are
points x0 on the other legal branch of η1 and x00 on the other legal branch of η2 such that for
some positive iterate of f one has f t (x0 ) = f t (x) = f t (x00 ). It follows that the decomposition
γ = γ1 ◦ γ2 ◦ γ3 , which uses x0 and x00 as concatenation points, defines legal subpaths γ1 and
γ3 which yield [f t (γ)] = [f t (γ1 ) ◦ f t (γ3 )], which has at most one illegal turn.
Since by Convention 4.7 the overlap γ 0 is an edge path, it follows from the finiteness result
proved in Lemma 4.6 that there are only finitely many constellations for η1 and η2 . This
shows that there must be a bound M1 as claimed.
u
t
Lemma 4.9. For every train track map f : Γ → Γ as in Convention 4.7 there exists a
constant M2 = M2 (Γ) ≥ 0 such that every path γ with precisely 1 illegal turn satisfies the
following:
Either γ contains an INP or pre-INP as a subpath, or else [f M2 (γ)] is legal.
Proof. Similar to the set V in the proof of Lemma 4.6 we define the set V+ be the set of all
pairs (γ1 , γ2 ) of legal edge paths γ1 , γ2 in Γ which have combinatorial length 0 ≤ |γ1 | ≤ C
and 0 ≤ |γ2 | ≤ C, and which satisfy:
The paths γ1 and γ2 have common initial point, and, unless one of them (or both) are
trivial, they have distinct first edges. Note that V+ is finite and contains V as subset.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
15
Following ideas from [CL15] we define a map
f# : V+ → V+
induced by f through declaring the f# -image of a pair (γ1 , γ2 ) ∈ V+ to be the pair f# (γ1 , γ2 ) :=
(γ100 , γ200 ) ∈ V+ which is defined by setting for i ∈ {1, 2}
f (γi ) =: γi0 ◦ γi00 ◦ γi000 ,
where γi0 is the maximal common initial subpath of f (γ1 ) and f (γ2 ), where |γi00 | ≤ C, and
where γi000 is non-trivial only if |γi00 | = C.
Then for any (γ1 , γ2 ) ∈ V+ we see as in the proof of Lemma 4.6 that there exists an
exponent t ≥ 0 such that the iterate f#t (γ1 , γ2 ) =: (γ3 , γ4 ) ∈ V+ satisfies one of the following:
(1) One of γ3 or γ4 (or both) are trivial.
(2) The turn defined by the two initial edges of γ3 and γ4 is legal.
(3) The path γ 3 ◦ γ4 contains an INP as subpath.
From the finiteness of V+ it follows directly that there is an upper bound M2 ≥ 0 such that
for t ≥ M2 one of the above three alternatives must be true for f#t (γ1 , γ2 ) =: (γ3 , γ4 ).
Consider now the given path γ, and write it as illegal concatenation of two legal paths
γ = γ10 ◦ γ20 . Then the maximal initial subpaths γ1 of γ 01 and γ2 of γ20 of γ2 of length |γi | ≤ C
form a pair (γ1 , γ2 ) in V+ . In the above cases (1) or (2) it follows directly that f t (γ) is a
(possibly trivial) legal path. In alternative (3) the path f t (γ) contains an INP.
u
t
Proposition 4.10. For any train track map as in Convention 4.7 there exists an exponent
r = r(f ) ≥ 0 such that every finite path γ in Γ with ILT(γ) ≥ 1 satisfies
ILT([f r (γ)]) < ILT(γ) ,
unless every illegal turn on γ is the tip of an INP or pre-INP subpath ηi of γ, where any two
ηi are either disjoint subpaths on γ, or they overlap precisely in a common endpoint.
Proof. Through considering maximal subpaths with precisely one illegal turn we obtain the
claim as direct consequence of Lemma 4.9 and Lemma 4.8.
u
t
Definition 4.11. A path γ in Γ is called pseudo-legal if it is a legal concatenation of legal
paths and INP’s.
From the same arguments as in the last proof we also deduce the following:
Proposition 4.12. Let f : Γ → Γ be as in Convention 4.7. Then for any finite edge path γ
in Γ there is a positive iterate f t (γ) which reduces to a path γ 0 := [f t (γ)] that is pseudo-legal.
The analogous statement also holds for loops instead of paths. The exponent t needed in
either case depends only on the number of illegal turns in γ.
Proof. Since the number of illegal turns in [f t (γ)] non-strictly decreases for increasing t, we
can assume that for sufficiently large t it stays constant. It follows from Lemma 4.9 (after
possibly passing to a further power of f ) that every illegal turn of [f t (γ)] is the tip of some
INP-subpath ηi of [f t (γ)]. From Lemma 4.8 we obtain furthermore that any two such ηi and
ηj that are adjacent on [f t (γ)] can not overlap non-trivially.
u
t
16
MARTIN LUSTIG AND CAGLAR UYANIK
In the next subsection we also need the following lemma, where illegal (cyclic) concatenation means that the path (loop) is a concatenation of subpaths where all concatenation
points are illegal turns.
Lemma 4.13. Let f : Γ → Γ be an expanding train track map. Let γ be a reduced loop in Γ
and let γ 0 = [f (γ)] be its reduced image loop. Assume that for some t ≥ 1 a decomposition
γ 0 = γ10 ◦γ20 ◦. . .◦γt0 as illegal cyclic concatenation is given. Then there exists a decomposition
as illegal cyclic concatenation γ = γ1 ◦ γ2 ◦ . . . ◦ γt with the property that the reduced image
paths [f (γi )] contain the paths γi0 as subpaths, for i = 1, 2, . . . , t.
Proof. We cut the loop γ at some illegal turn to get a (closed) path γ = e1 e2 . . . eq . We
consider the initial subpaths γ(k) = e1 e2 . . . ek of γ for k = 1, 2, . . .. Let k 0 be the smallest
positive integer such that the reduced image path [f (γ(k 0 ))] contains the path γ10 as a subpath.
Since k 0 is the smallest such integer, it follows that the path f (ek0 ) passes through the last
edge of γ10 . Note that f (ek0 ) is a legal path and that γi0 terminates at an illegal turn, so
that the endpoint of f (ek0 ) must lie somewhere in the backtracking subpath of the possibly
unreduced path [f (e1 e2 . . . ek0 ) ] ◦ [f (ek0 +1 ek0 +2 . . . eq )]. It follows that the reduced image path
[f (ek0 +1 ek0 +2 . . . eq )] contains the path γ20 ◦ . . . ◦ γt0 as subpath.
Thus we define γ1 := γ(k 0 ), and proceed iteratively in precisely the same fashion, thus
finding iteratively γ2 , γ3 , . . . γt−1 . As above, it follows that the “left-over” terminal subpath
of γ has the property that its reduced image contains γt0 as subpath, so that we can define
this left-over subpath to be the final factor path γt .
u
t
4.3. Goodness versus illegal turns. We recall from Definition 2.7 that a multi-INP is a
legal concatenation of finitely many INPs along their endpoints. For the remainder of this
section we will concentrate on graph maps f : Γ → Γ which satisfy the following:
Convention 4.14. Let f : Γ → Γ be an expanding train track map as in Convention 4.7.
We assume furthermore that there is an upper bound A(f ) to the number of INP factor
paths in any multi-INP path γ ∈ Γ. Note that this condition implies in particular that in Γ
there can not be a non-trivial loop which is a cyclic legal concatenation of INPs.
The next lemma shows in particular that an expanding train track map which represents
a hyperbolic outer automorphism naturally satisfies the conditions given in Convention 4.14.
Lemma 4.15. For any expanding train track map f : Γ → Γ, which has the property that no
positive power of f fixes the homotopy class of any non-trivial loop in Γ, there is an upper
bound to the number of INP factors on any multi-INP path.
Proof. There is an upper bound A ≥ 0 for number of INPs in Γ, see Lemma 4.6. Hence, any
multi-INP with more than A(f ) := 2A factors would have to run over the same INP twice
in the same direction. Thus we obtain as subpath a non-trivial loop which is fixed by some
positive power of f , violating the given assumption.
u
t
Lemma 4.16. For any train track map f : Γ → Γ as in Convention 4.14 there exists an
exponent s ≥ 1 such that for any reduced path γ ∈ Γ with reduced image path γ 0 = [f s (γ)]
the following holds: If g(γ 0 ) = 0 and satisfies ILT (γ 0 ) ≥ A(f ) + 1, then
ILT (γ) > ILT (γ 0 ).
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
17
Proof. Since the map f is expanding, for the critical constant C ≥ 0 given in Definition 4.2
there exists an integer s ≥ 1 such that |f s (e)| ≥ 2C + 1 for every edge e ∈ Γ. We can
furthermore assume s ≥ r, where r = r(f ) is given by Lemma 4.10. Thus, by Lemma 4.10
we have
ILT (γ) > ILT (γ 0 ) ,
unless every illegal turn on γ is the tip of an INP or pre-INP ηi , and any two such subpaths
ηi are disjoint or they overlap precisely at a common endpoint.
The case where two such paths are disjoint can be excluded as follows: If there is an edge
e in γ which doesn’t belong to any of the ηi , then f s (e) is a legal subpath of [f s (γ)] = γ 0 of
length greater than 2C + 1, contradicting the assumption that g(γ 0 ) = 0.
Thus we can assume that any two of the subpaths ηi overlap precisely in a common
endpoint, and that there is no non-trivial initial of final subpath of γ outside of the con0
catenation of all the ηi . Therefore, for some s0 ≥ 0, the iterate f s (γ 0 ) is a multi-INP with
ILT (γ 0 ) ≥ A(f ) + 1 factors, which contradicts Convention 4.14. Hence the conclusion of the
Lemma follows.
u
t
Lemma 4.17. Let f : Γ → Γ and A(f ) be as in Convention 4.14. Then there exists a
constant δ with 0 < δ ≤ 1 so that the following holds: Every reduced loop γ in Γ with
ILT (γ) ≥ A(f ) + 1 can be written as cyclic illegal concatenation
γ = γ1 ◦ γ2 . . . ◦ γ2m
such that for every odd index j, the subpath γj is either trivial or satisfies
g(γj ) ≥ δ .
For every even index k the subpath γk is non-trivial and satisfies g(γk ) = 0; moreover, we
have:
A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1
Proof. Let Lγ be the collection of maximal legal subpaths γi0 of γ of length |γi0 | ≥ 2C + 1, for
C ≥ 0 as given in Definition 4.2. Note that any two distinct elements γi0 , γj0 in this collection
are either disjoint or overlap at at single point. In the latter case the turn at the overlap
point is illegal, as otherwise they would merge into a longer legal subpath, which violates
0
the maximality of the γi0 . For any two (on γ) consecutive paths γi0 and γi+1
in Lγ , if the path
0
0
βi between them is trivial or satisfies ILT (βi ) ≤ A(f ), then we erase γi and γi+1
from the
0
0
collection Lγ and add in the new path γi βi γi+1 . We continue this process iteratively until
all the complementary subpaths βi between any two consecutive elements in our collection
satisfies ILT (βi ) ≥ A(f ) + 1. We call the obtained collection of subpaths Cγ .
We now pick a path γj in the collection Cγ and consider its “history” as being obtained
iteratively through joining what amounts to ` paths γi0 from Lγ . Thus γj can be written as
illegal concatenation
0
γj = γ10 ◦ β1 ◦ γ20 ◦ . . . ◦ γ`−1
◦ β`−1 ◦ γ`0 ,
where each γi0 is legal and of length |γi0 | ≥ 2C + 1. Each βi has at most A(f ) illegal turns,
and the legal subpaths of βi between these illegal turns have length ≤ 2C, so that we get
|βi | ≤ (A(f ) + 1)2C. Thus the set of good edges on γj is given precisely as disjoint union
18
MARTIN LUSTIG AND CAGLAR UYANIK
over all the γi0 of the sets of the |γi0 | − 2C edges of γi0 that are not on the two boundary
subpaths of length C of γi0 . Hence we compute for the goodness:
P`
P`
0
(|γ 0 | − 2C)
i=1 (|γi | − 2C)
g(γj ) =
= P` i=1 0 i P`−1
|γj |
i=1 |γi | +
i=1 |βi |
`
1
=
(2C + 1) · ` + (A(f ) + 1)2C · `
2C(A(f ) + 2) + 1
We finally add to the collection Cγ a suitable set of trivial subpaths at illegal turns to get
a collection Cγ0 , where these trivial paths are chosen as to get as complementary subpaths of
Cγ0 only subpaths γk which satisfy:
≥
A(f ) + 1 ≤ ILT (γk ) ≤ 2A(f ) + 1
Thus setting
δ=
1
2C(A(f ) + 2) + 1
u
t
finishes the proof.
Proposition 4.18. Let f : Γ → Γ be a train track map as in Convention 4.14, and let s ≥ 1
be the integer given by Lemma 4.16 and δ > 0 be the constant given by Lemma 4.17. Then
there exists a constant R > 1 such that for any reduced loop γ in Γ one has either
(1) g([f s (γ)]) ≥
δ
2
or
(2) ILT (γ) ≥ R · ILT ([f s (γ)]).
Proof. By 4.12 there is an exponent t ≥ 0 such that for any loop γ with less than A(f ) + 1
illegal turns the loop γ 0 = [f t (γ)] is pseudo-legal. From the assumption that f satisfies
Convention 4.14 it follows that γ 0 is not a legal concatenation of INPs, so that it must have
at least one good edge. Since iteration of f only decreases the number of illegal turns, we
obtain from equality (4.3) that
g(γ) ≥
1
.
2C(A(f ) + 1) + 1
Thus the first inequality from our assertion follows for a suitable choice of s from Proposition
4.4.
0
Thus we can now assume that ILT (γ) ≥ A(f ) + 1, and thus that [f s (γ)] = γ10 ◦ . . . ◦ γ2m
is a decomposition as given by Lemma 4.17. There are two cases to consider: Assume that
X
X
|γj0 | ≥
|γk0 |.
j odd
k even
For any odd index j the non-trivial path γj0 has g(γj0 ) ≥ δ, which together with the last
inequality implies:
δ
g([f s (γ)]) ≥
2
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
19
Now, assume that:
X
X
|γj0 | ≤
j odd
|γk0 |
k even
Let γ = γ1 ◦ . . . ◦ γ2m be an illegal cyclic concatenation given by Lemma 4.13 so that, for
each i = 1, . . . , 2m, the reduced image [f s (γi )] contains γi0 as a subpath. Hence, for every
even index, we apply Lemma 4.16 to see that
ILT (γk ) > ILT ([f s (γk )]) ≥ ILT (γk0 ).
Since the number if illegal turns never increases when applying a train track map, for each
odd index j, we have
ILT (γj ) ≥ ILT ([f s (γj )]) ≥ ILT (γj0 ).
Combining last two inequalities we obtain:
ILT (γ) > ILT ([f s (γ)]) + m.
(4.5)
We also observe that the number of illegal turns in [f s (γ)] is equal to the sum of the
number of illegal turns in the odd indexed subpaths, the number of illegal turns in the even
indexed subpaths, and the number of illegal turns at concatenation points:
X
X
ILT (γk0 ) + 2m
ILT (γj0 ) +
(4.6)
ILT ([f s (γ)]) ≤
k even
j odd
Now, note that
(4.7)
X
ILT (γj0 ) ≤
X
j odd
j odd
|γj0 | ≤
X
|γk0 |,
k even
by assumption.
For each γk0 (with even index k), since Lemma 4.17 assures g(γk0 ) = 0 and ILT (γk0 ) ≤
2(A(f ) + 1), we have
|γk0 | ≤ 2C(2(A(f ) + 1) + 1),
which together with (4.7) implies that:
X
(4.8)
ILT (γj0 ) ≤ 2mC(2(A(f ) + 1) + 1)
j odd
Furthermore, from ILT (γk0 ) ≤ 2(A(f ) + 1) for even index k we deduce
X
(4.9)
ILT (γk0 ) ≤ 2m(A(f ) + 1)
k even
Using (4.6), (4.8) and (4.9) we obtain:
(4.10)
ILT ([f s (γ)]) ≤ 2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m
20
MARTIN LUSTIG AND CAGLAR UYANIK
Using (4.5) and (4.10), we have:
ILT (γ)
m
≥
1
+
ILT ([f s (γ)])
ILT ([f s (γ)])
m
2mC(2(A(f ) + 1) + 1) + 2m(A(f ) + 1) + 2m
1
≥1+
2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2
≥1+
Therefore, the conclusion of the lemma holds for:
R=1+
1
2C(2(A(f ) + 1) + 1) + 2(A(f ) + 1) + 2
u
t
4.4. Uniform goodness in the future or the past. For the convenience of the reader
we first prove a mild generalization of Proposition 4.18, which will be a crucial ingredient in
the proof of the next proposition.
Proposition 4.19. Let f : Γ → Γ be as in Convention 4.14. Given any constants 0 < δ1 < 1
and R1 > 1, there exist an integer s1 > 0 so that for any reduced loops γ and γ 0 in Γ with
[f s1 (γ 0 )] = γ one has either
(i) g([f s1 (γ)]) ≥ δ1
or
(ii) ILT (γ 0 ) ≥ R1 · |γ|Γ .
Proof. We first replace f by a positive power (say f r , cited at the end of the proof) as given
by Proposition 4.4 so that for the rest of the proof we can assume that goodness is monotone.
Let s, δ and R be as in Lemma 4.18 and let γ be any reduced loop in Γ. Assume that for γ
that alternative (1) of Lemma 4.18 holds, i.e. g([f s (γ)]) ≥ 2δ . Then by Corollary 4.5 there is
an exponent M ≥ 1 such that
g([(f s )m (γ)]) ≥ δ1
for all m ≥ M . On the other hand, if g([f s (γ)]) < 2δ , then Lemma 4.18 assures that
ILT (γ) ≥ R · ILT ([f s (γ)]).
We now claim that
ILT (γ1 ) ≥ R · ILT (γ)
s
for any reduced loop γ1 with [f (γ1 )] = γ. To see this, apply Lemma 4.18 to the loop γ1 . If
one had
δ
g([f s (γ1 )]) = g(γ) ≥ ,
2
then by monotonicity of goodness this would also imply g([f s (γ)]) ≥ 2δ , which contradicts
with our assumption. Hence for γ1 alternative (2) of Lemma 4.18 holds, giving indeed
ILT (γ1 ) ≥ R · ILT (γ).
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
21
Repeating the same argument iteratively shows that for any sequence of reduced loops γM 0 ,
defined iteratively through [f s (γM 0 )] = γM 0 −1 for any M 0 ≥ 2, the inequality
0
γM 0 ≥ RM · ILT (γ).
holds. Also, notice that since g(γ) <
δ
2
we have
#{bad edges in γ}
δ
≥1− ,
|γ|Γ
2
and by the inequalities (4.3) we have furthermore
#{bad edges in γ} ≤ 2C · ILT (γ).
Hence we obtain
0
ILT (γM 0 ) ≥ RM · ILT (γ)
0
#{bad edges in γ}
2C
δ 1
· (1 − ) |γ|Γ
2 2C
≥ RM ·
≥ RM
0
0
1
≥ R1 . Then s1 = max{M, M 0 } satisfies the
Let M 0 ≥ 1 be such that RM · (1 − 2δ ) 2C
requirements of the statement of Proposition 4.19 up to replacing f by the power f r as done
at the beginning of the proof.
u
t
In addition to the train track map f we now consider a second train track map f 0 : Γ0 → Γ0 ,
which also satisfies the requirements of Convention 4.14 and which is related to f via maps
h : Γ → Γ0 and h0 : Γ0 → Γ such that f and h0 f 0 h are homotopy inverses. We also assume
that the lifts of h and h0 to the universal coverings are quasi-isometries (with respect to the
simplicial metrics), so that there exists a bi-Lipschitz constant B > 0 which satisfies for any
two “corresponding” reduced loops γ in Γ and γ 0 := [h(γ)] the inequalities
(4.11)
1 0
|γ |Γ0 ≤ |γ|Γ ≤ B |γ 0 |Γ0
B
We denote the goodness for the map f 0 by g0 , and the critical constant for f 0 from Definition
4.2 by C 0 .
Proposition 4.20. Let f : Γ → Γ and f 0 : Γ0 → Γ0 be as specified in the last paragraph.
Given a real number δ so that 0 < δ < 1, there exist a bound M > 0 such that (up to
replacing f and f 0 by a common power) for any pair of corresponding reduced loops γ in Γ
and γ 0 in Γ0 , either
(a) g([f n (γ)]) ≥ δ
or
(b) g0 ([(f 0 )n (γ 0 )]) ≥ δ
holds for all n ≥ M .
22
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. Let B be a bi-Lipschitz constant for the transition from Γ to Γ0 as in (4.11) above.
Set R1 = 4C 0 B 2 , and apply Proposition 4.19 to the loop γ. Assume first that alternative (i)
of this proposition holds. Then Corollary 4.5, applied to f s1 , gives a bound L ≥ 0 so that
inequality (a) holds for all n ≥ L (after having replaced f by f s1 ).
Now assume that for γ alternative (ii) of Proposition 4.19 holds. Then we have the
following inequalities, where γ 00 denotes the reduced loop in Γ corresponding to f 0s1 (γ 0 )
(which implies [f s1 (γ 00 )] = γ):
1 00
1
|γ |Γ ≥ ILT (γ 00 )
B
B
1
≥ R1 · |γ|Γ = 4C 0 B · |γ|Γ
B
= 4C 0 · |γ 0 |Γ0
|f 0s1 (γ 0 )|Γ0 ≥
This however implies that g0 (f 0s1 (γ 0 )) ≥ 1/2, since for any t ≥ 0 the number of bad edges in
f 0t (γ 0 ) is bounded above by
2C 0 · ILT (f 0t (γ 0 )) ≤ 2C 0 · ILT (γ 0 ) ≤ 2C 0 · |γ 0 |Γ0 .
Thus, by invoking Corollary 4.5 again, there exist L0 such that
0
g0 (f 0s1 L (γ 0 )) ≥ δ.
Hence for M 0 = max{L, L0 } the conclusion of the Lemma follows.
u
t
Remark 4.21. From the next section on we will restrict our attention to expanding train
track maps which are homotopy equivalences. For any such train track representative f of
some ϕ ∈ Out(FN ) and f 0 of ϕ−1 , which both satisfy Convention 4.14, the conditions stated
before Proposition 4.20 are satisfied, so that this proposition is valid for them.
5. Perron Frobenius Theorem for reducible substitutions and
automorphisms
The purpose of this section is to define the simplex of attraction ∆+ and the simplex of
repulsion ∆− explicitly by exhibiting the coordinate values for the defining currents. For
this purpose we crucially need the main result from our earlier paper [LU17]; details of how
to use this quote are given below.
5.1. Symbolic dynamics, substitutions and quotes from [LU17]. In this subsection
we recall some terminology, well known definitions and basic facts from symbolic dynamics.
Given any finite set of symbols A = {a1 , . . . , am }, called an alphabet, one considers the
free monoid A∗ over A, which is given by all finite words in A (without inverses), including
the empty word 1. The length |w| of a word w ∈ A∗ denotes the number of letters in w.
Furthermore one considers the full shift AZ , the set of all biinfinite words in A, which is
canonically equipped with the product topology and with the shift-operator. The latter
maps x = . . . xi−1 xi xi+1 . . . ∈ AZ to y = . . . yi−1 yi yi+1 . . . ∈ AZ , with yi = xi+1 ∈ A for any
i ∈ Z. A subset Σ ⊂ AZ is called a subshift if it is non-empty, closed and shift-invariant.
The language of Σ is the collection of all finite words occurring in elements of Σ. For any
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
23
w = x1 . . . xn ∈ A∗ we denote by Cylw the set of all y = . . . yi−1 yi yi+1 . . . ∈ AZ which satisfy
y1 = x1 , y2 = x2 , . . . , yn = xn .
An invariant measure µ on a subshift Σ is a finite Borel measure on Σ which is invariant
under the shift map. It extends canonically to an invariant measure on all of AZ by setting
µ(B) := µ(B ∩ Σ) for any measurable set B ⊂ AZ . For any invariant measure µ on AZ
obtained this way we say that µ has support in Σ.
Remark 5.1. (1) Any invariant measure µ defines a function
µA : A∗ → R≥0 , w 7→ µ(Cylw )
which satisfies for any w ∈ A∗ the following Kirchhoff conditions:
X
X
µA (w) =
µA (xw) =
µA (wx)
x∈A
x∈A
∗
∗
Conversely, for every such weight function µ : A → R≥0 (i.e. µ∗ satisfies the Kirchhoff
conditions) there exists a well defined invariant measure µ on AZ with µA = µ∗ , see [FM10].
(2) The measure µ has support in a subshift Σ ⊂ AZ if and only if µA (w) = 0 for any w ∈ A∗
with Cylw ∩ Σ = ∅.
A substitution ζ on the finite alphabet A = {a1 , . . . am } is a monoid morphism ζ : A∗ → A∗ .
It is well defined by knowing all ζ(ai ), and conversely, any map A → A∗ defines a substitution.
A substitution ζ : A → A∗ is called expanding if for each ai ∈ A, |ζ k (ai )| ≥ 2 for some k ≥ 1.
For any two words w1 , w2 ∈ A∗ , let us denote the number of occurrences of the word w1 in
w2 by |w2 |w1 . By proving a generalized version of the classical Perron–Frobenius Theorem
for reducible matrices, in [LU17] we obtain the following result.
Proposition 5.2 (Corollary 1.3 and Remark 3.14 of [LU17]). For any expanding substitution
ζ : A∗ → A∗ and any letter ai ∈ A there is a well defined invariant measure µai on AZ . For
any non-empty w ∈ A∗ and the associated cylinder Cylw the value of µai is given, after
possibly raising ζ to a suitable power (which does not depend on w), by the limit frequency
|ζ t (ai )|w
.
t→∞ |ζ t (ai )|
µai (Cylw ) = lim
Remark 5.3. (1) We note that in [LU17] the measure µai is defined on the substitution
subshift Σζ , while in the above quote we denote by µai the canonical extension to all of AZ .
Accordingly, in [LU17] the set Cylw denotes set Cylw ∩ Σζ . However, as explained in Remark
3.13 of [LU17], these differences are only superficial: the statement quoted above and the
one in [LU17] are indeed equivalent.
(2) It can be derived from [LU17] that the positive power to which ζ has to be raised in order
to get the frequency equality in Proposition 5.2 is not just independent of w but actually
independent of ζ. It only depends on the size of the alphabet A.
In the next subsection we also need the following:
Lemma 5.4 (Remark 3.3 of [LU17]). Let ζ : A∗ → A∗ be an expanding substitution. Then
(up to replacing ζ by a positive power) there exists a constant λai > 1 for each ai ∈ A such
24
MARTIN LUSTIG AND CAGLAR UYANIK
that:
|ζ t+1 (ai )|
= λai
t→∞ |ζ t (ai )|
lim
u
t
5.2. Train track maps reinterpreted as substitutions. We now apply the material
from the previous subsection to a particular substitution ζf which we construct from an
expanding train track map f : Γ → Γ as in the section 4. We first set up the following
general definitions:
For any graph Γ we recall (see section 2.1) that the set EΓ of oriented edges of Γ is
equipped with a fixed point free involution
ι : EΓ → EΓ, e 7→ e
where e denotes as before the edge e with reversed orientation.
We now use EΓ as alphabet, and consider the free monoid EΓ∗ and the both-sided full
shift EΓZ . The latter contains the subshift (of “finite type”) ΣΓ ⊂ EΓZ , which consists of
all biinfinite reduced edge paths in Γ. We denote the language of ΣΓ by P(Γ), it is the set
of all finite reduced edge paths in Γ. We observe that the involution ι induces an involution
on EΓ∗ which for convenience will be denoted also by ι. On EΓZ this involution induces the
flip involution which is given by
ι(. . . xi xi+1 xi+2 . . .) = . . . yi yi+1 yi+2 . . .
with yn = x−n+1 for all n ∈ Z. The subshift ΣΓ is clearly flip-invariant.
A shift-invariant measure µ∗ on ΣΓ is called flip-invariant if for any measurable subset
Σ0 ⊂ ΣΓ one has µ∗ (ι(Σ0 )) = µ∗ (Σ0 ). From Remark 5.1 we see that this is equivalent to
requiring that the weight function µ∗EΓ associated to µ∗ satisfies
µ∗EΓ (γ) = µ∗EΓ (γ)
for any γ ∈ P(Γ). We now observe:
Lemma 5.5. Let Γ be a graph provided with a marking θ : FN → π1 Γ. Then any shiftinvariant and flip-invariant measure µ∗ on ΣΓ defines a current µ on FN and conversely.
This canonical 1-1 correspondence is given by the fact that the Kolmogorov function µEΓ
associated to µ (see section 2.5) and the weight function µ∗EΓ associated to µ∗ satisfy
µEΓ (γ) = µ∗EΓ (γ)
for any finite reduced path γ in Γ.
Proof. It is well known that a current and the associated Kolmogorov function determine each
other vice versa (see section 2.5), and similarly for a shift-invariant measure and its weight
function (see Remark 5.1). Hence the statement of the lemma is a direct consequence of the
observation that any flip-invariant weight function on EΓ∗ , which is zero on EΓ∗ r P(Γ),
restricts on P(Γ) to a Kolmogorov function, and conversely, any Kolmogorov function on
P(Γ) gives canonically rise to a flip-invariant weight function on EΓ by setting it equal to 0
for any element of on EΓ∗ r P(Γ).
u
t
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
25
We now consider the occurrences of a path γ as subpath in a path γ 0 . As before, the
number of such occurrences is denoted by |γ 0 |γ . We denote the number of occurrences of γ
or of γ as subpath in a path γ 0 by hγ, γ 0 i and obtain:
hγ, γ 0 i = |γ 0 |γ + |γ 0 |γ
(5.1)
Let now f : Γ → Γ be any graph self-map. Then f induces a substitution ζf : EΓ∗ → EΓ∗ ,
but in general ζf -iterates of reduced paths in Γ will be mapped to non-reduced paths. An
exception is given if f is a train track map and if the path γ 0 is legal: In this case all f t (γ 0 )
will be reduced as well:
[f t (γ 0 )] = f t (γ 0 )
where [ρ] denotes as in section 2.1 the path obtained from an edge path ρ via reduction
relative to its endpoints. Hence the occurrences of any path γ or of γ in [f t (γ 0 )] are given by
(5.2)
hγ, [f t (γ 0 )]i = |f t (γ 0 )|γ + |f t (γ 0 )|γ
for any integer t ≥ 0.
We are now ready to prove:
Proposition 5.6. Let f : Γ → Γ be an expanding train-track map, and let e ∈ EΓ. Then,
after possibly replacing f by a positive power, for any reduced edge path γ in Γ the limit
hγ, f t (e)i
= aγ
n→∞ |f t (e)|
lim
exists, and the set of these limit values defines a unique geodesic current µ+ (e) on FN through
setting hγ, µ+ (e)i = aγ for any γ ∈ P(Γ).
Proof. Since every edge e of Γ is legal, we obtain for any γ ∈ P(Γ) from equation (5.2) above
that hγ, f t (e)i = hγ, [f t (e)]i = |f t (e)|γ + |f t (e)|γ for all exponents t ≥ 0. On the other hand,
for any element ω ∈ EΓ∗ r P(Γ) one has |f t (e)|ω + |f t (e)|ω = 0.
Furthermore the assumption that f is expanding implies directly that the substitution ζf
associated to f is also expanding.
Hence we can apply Proposition 5.2 to the substitution ζf to obtain that, after possibly
t (e)i
replacing f and ζf by a suitable positive power, the limit of the hγ,f
exists indeed, and
|f t (e)|
∗
∗
∗
that it is equal to µe (Cylγ ) + µe (Cylγ ), where µe is a shift-invariant measure on EΓ∗ with
support in the subshift ΣΓ . Hence γ 7→ µ∗e (Cylγ ) defines a weight function on EΓ∗ which
is zero outside P(Γ), and thus similarly γ 7→ µ∗e (Cylγ ). Their sum is thus also a weight
function with support in P(Γ), and furthermore it is flip invariant, so that we obtain from
Lemma 5.5 a Kolmogorov function. This in turn defines the current µ+ (e), as stated in our
proposition.
u
t
We now want to show that the currents µ+ (e) are projectively ϕ-invariant. For this purpose
we start by stating two lemmas; the first one is an elementary exercise:
Lemma 5.7. For any graph Γ without valence 1 vertices there exists a constant K ≥ 0 such
that for any finite reduced edge path γ in Γ there exists an edge path γ 0 of length |γ 0 | ≤ K
such that the concatenation γ ◦ γ 0 exists and is a reduced loop.
u
t
26
MARTIN LUSTIG AND CAGLAR UYANIK
Lemma 5.8. Let f : Γ → Γ as in Proposition 5.6, and let K1 ≥ 0 be any constant. For all
integers t ≥ 0 let γt0 ∈ EΓ∗ be any element with |γt0 | ≤ K1 . Set γt := f t (e)∗ γt0 , where f t (e)∗ is
obtained from f t (e) by erasing an initial and a terminal subpath of length at most K1 . Then
for any reduced path γ in Γ one has
hγ, γt i
lim
= hγ, µ+ (e)i
t→∞ |γt |
Proof. From the hypotheses |γt0 | ≤ K1 and |f t (e)∗ | ≥ |f t (e)| − 2K1 , and from the fact that
hγ,γt i
f is expanding and hence |f t (e)| → ∞ for t → ∞, we obtain directly lim hγ,f
t (e)i = 1 and
t→∞
t|
lim |f|γt (e)|
= 1. Hence the claim follows directly from Proposition 5.6.
t→∞
u
t
Proposition 5.9. Let ϕ ∈ Out(FN ) be an automorphism which is represented by an expanding train-track map f : Γ → Γ. We assume that ϕ and f have been replaced by positive
powers according to Proposition 5.6.
Then there exist a constant λe > 1 such that ϕ(µ+ (e)) = λe µ+ (e).
Proof. For the given graph Γ let K ≥ 0 be the constant given by Lemma 5.7, and for
any integer t ≥ 0 let γt0 ∈ P(Γ) with |γt0 | ≤ K be the path given by Lemma 5.7 so that
γt =: f t (e)γt0 ∈ P(Γ) is a reduced loop. Let [wt ] ⊂ FN ∼
= π1 Γ be the conjugacy class
represented by γt , and note that the rational current η[wt ] satisfies kη[wt ] k = |γt |, by equality
(2.2) from section 2.5.
Similarly, consider f (γn ) = f t+1 (e)f (γt0 ), and notice that |f (γt0 )| is bounded above by the
constant K0 = K max{|f (e)| | e ∈ EΓ}. Since f is a train track map, the path f t+1 (e) is
reduced. Hence the reduced loop γt00 := [f (γn )] = [f t+1 (e)f (γt0 )] can be written as product
f t+1 (e)∗ γt00 with |γt00 | ≤ K1 and |f t+1 (e)∗ | ≥ |f t+1 (e)| − 2K1 , where f t+1 (e)∗ is a subpath of
f t+1 (e) and K1 is the maximum of K0 and the cancellation bound Cf of f (see Lemma 2.5).
Thus we can apply Lemma 5.8 twice to obtain for any reduced path γ in Γ that
hγ, γt i
lim
= hγ, µ+ (e)i
t→∞ |γt |
and
hγ, γt00 i
lim
= hγ, µ+ (e)i .
t→∞ |γt00 |
The first equality implies that the rational currents η[wt ] satisfy
η[wt ]
lim
= µ+ (e).
t→∞ kη[wt ] k
From the continuity of the Out(FN )-action on current space and from ϕη[wt ] = ηϕ[wt ] (see
equality (2.1) from section 2.5) we thus deduce
ηϕ[wt ]
= ϕµ+ (e).
lim
t→∞ kη[wt ] k
However, since the reduced loops γt00 represent the conjugacy classes ϕ[wt ], the second of
the above equalities implies that
ηϕ[wt ]
lim
= µ+ (e).
t→∞ kηϕ[wt ] k
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
27
|γ 00 |
t|
Since lim |f|γt (e)|
= 1 and lim |f t+1t (e)| = 1, with |γt | = kη[wt ] k and |γt00 | = kηϕ[wt ] k, the conclusion
t→∞
t→∞
follows from Lemma 5.10 below.
u
t
Lemma 5.10. For every edge e of Γ there exists a real number λe > 1 which satisfies:
|f t+1 (e)|
= λe
t→∞ |f t (e)|
lim
Proof. This is a direct consequence of Lemma 5.4 and of the definition of ζf .
u
t
We now define ∆− (ϕ) and ∆+ (ϕ) that are used in the next section:
Definition 5.11. Let ϕ ∈ Out(FN ) be an outer automorphism. Assume that ϕ is replaced
by a positive power such that both, ϕ and ϕ−1 are represented by expanding train-track
maps as in Proposition 5.6. Let f : Γ → Γ be the representative of ϕ. Then the simplex of
attraction is defined as follows:
X
X
∆+ (ϕ) = {[
ai µ+ (ei )] | ai ≥ 0,
ai > 0}.
ei ∈E + Γ
Analogously, we define the simplex of repulsion as ∆− (ϕ) = ∆+ (ϕ−1 ).
It should be pointed out here that distinct edges ei of Γ may well give the same limit
current µ+ (ei ). Furthermore, even if a subset of currents µ+ (ei ) which define pairwise different vertices of the “simplex” ∆+ (ϕ), this subset may a priori not be linearly independent.
However, it follows from general results in dynamics (see for instance [FM10]) that the
extremal points of ∆+ (ϕ) correspond to ergodic currents, and that pairwise projectively distinct ergodic currents are linearly independent, so that ∆+ (ϕ) is indeed a finite dimensional
simplex.
From Proposition 5.9 we obtain directly:
Corollary 5.12. Let ϕ ∈ Out(FN ) be as in Definition 5.11. Then the simplexes ∆+ (ϕ) and
∆− (ϕ) are ϕ-invariant:
ϕ(∆+ (ϕ)) = ∆+ (ϕ)
and
ϕ(∆− (ϕ)) = ∆− (ϕ)
u
t
Remark 5.13. There seems to be an interesting question as to what the maximal possible
dimension of the limit simplexes ∆+ (ϕ) (or ∆− (ϕ) = δ+ (ϕ−1 )) can be. It has been shown
by G. Levitt [Lev09] that for any ϕ ∈ Out(FN ) the number of exponentially growing strata
in any train track representative of ϕ is bounded above by 3N4−2 (and that this bound is
attained, by certain geometric automorphisms). This gives:
3N − 6
4
We do not know whether there are hyperbolic automorphisms which realize this bound.
Preliminary considerations have lead us to construct for any integer k ≥ 1 a family of
k+1
hyperbolic automorphisms ϕk with rank(ϕk ) = 2 · 3k + 3 and dim(∆+ (ϕk )) = 3 2 −1 .
dim(∆+ (ϕ)) ≤
28
MARTIN LUSTIG AND CAGLAR UYANIK
In the next section we will specify the automorphism in question to be hyperbolic. Recall
that ϕ ∈ Out(FN ) is hyperbolic if there is no non-trivial ϕ-periodic conjugacy class in FN .
Let f : Γ → Γ be an absolute train track representative of ϕ. By Remark 2.4 we can assume
that f is expanding. We then replace ϕ and f by a positive power so that Convention 4.1
is satisfied, and furthermore subdivide edges in accordance to Convention 4.7. Furthermore
we have:
Lemma 5.14. Any expanding train track representative f : Γ → Γ of a hyperbolic automorphism ϕ ∈ Out(FN ) which satisfies Convention 4.7 also satisfies the hypotheses of
Convention 4.14.
Proof. This is a direct consequence of Lemma 4.15.
u
t
Convention 5.15. A hyperbolic automorphism ϕ ∈ Out(FN ) is said to have a properly
expanding train track representative f : Γ → Γ if f satisfies Conventions 4.1, 4.7 and 4.14,
and if both have been raised to a suitable positive power according to Propositions 5.6 and
5.9.
Remark 5.16. From Lemma 5.14 one obtains directly that every hyperbolic automorphism
ϕ which possesses an absolute train track representative has a positive power ϕt which
possesses a properly expanding train track representative.
6. Hyperbolic automorphisms
Let ϕ ∈ Out(FN ) be a hyperbolic automorphism which possesses a properly expanding
train track representative f : Γ → Γ as in Convention 5.15. Let [w] be a conjugacy class in
FN . Represent [w] by a reduced loop γ in Γ. Then the goodness of w, denoted by g([w]), is
defined by:
g([w]) := g(γ)
Lemma 6.1. Given a neighborhood U of the simplex of attraction ∆+ (ϕ) ∈ PCurr(FN ),
there exist a bound δ > 0 and an integer M = M (U ) ≥ 1 such that, for any [w] ∈ FN with
g([w]) ≥ δ, we have
(ϕM )n [ηw ] ∈ U
for all n ≥ 1.
Proof. We first replace ϕ by a positive power as in Proposition 4.4 so that the goodness
function for the train-track map f : Γ → Γ becomes monotone.
Recall from Section 2.5 that [ν] ∈ PCurr(FN ) is close to [ν 0 ] ∈ PCurr(FN ) if there exists
ε > 0 and R >> 0 such that for all reduced edge paths γ with |γ| ≤ R we have
hγ, νi hγ, ν 0 i
−
< ε.
kνkΓ
kν 0 kΓ
Thus, since ∆+ (ϕ) is compact, there exist ε > 0 and R ∈ R such that the above inequalities
imply for ν 0 ∈ ∆+ (ϕ) that ν ∈ U .
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
29
We proved the pointwise convergence for edges in Proposition 5.6. Since there are only
finitely many edges and finitely many edge paths γ in Γ with |γ| ≤ R, we can pick an integer
M0 ≥ 0 such that
(6.1)
hγ, f n (e)i
− hγ, µ+ (e)i < ε/4
|f n (e)|
for all n ≥ M0 , for all γ with |γ| ≤ R and for all edges e of Γ.
Let λ0 , λ00 > 1 be the minimal and the maximal expansion factors respectively as given in
1
Convention 4.1. For any reduced loop c in Γ with g(c) ≥ 1+ε/4
iterative application of the
fact, that f maps any good edge in c to to a path in [f (c)] which consists entirely of good
edges and has length at least λ0 , implies:
|f n (c)| ≥
1
|c|(λ0 )n .
1 + ε/4
Thus for any integer M1 > logλ0 R(1 + 4ε ) and all n ≥ M1 we get the following inequalities:
(6.2)
R|c|
R|c|Γ (1 + ε/4)
R(1 + ε/4)
ε
R(1 + ε/4)
≤
≤
=
≤
|f n (c)|
|c|(λ0 )n
(λ0 )M1
R(1 + 4/ε)
4
We note that for any integer m ≥ 1 and for each edge the minimum expansion factor for
f m is at least (λ0 )m and the maximum expansion factor for f m is at most (λ00 )m .
For the rest of the proof set
M = max{M0 , M1 }
and
δ := max{
1
1
},
,
0
λ
1 + ε/4 1 + ( λ00 )M ε/4
and let c be a reduced loop in Γ which represents a conjugacy class w with g(w) ≥ δ.
The assertion of Lemma 6.1 now follows if we show that for all integers n ≥ 1 the current
(ϕM )n ([ηw ]) is (ε, R)-close (in the above sense) to some point in ∆+ (ϕ). Indeed, since by the
first paragraph of the proof the goodness function is monotone, it suffices to assume n = 1
and apply the resulting statement iteratively.
For simplicity we denote from now on f M by f . Another auxiliary computation gives:
(6.3)
(λ00 )M · #{bad edges in c}
(λ00 )M (1 − g(w))|c|
λ00 M
1
λ00 M 1
ε
=
=( 0)
−1 ≤( 0)
−1 ≤ .
0
M
0
M
(λ ) · #{good edges in c}
(λ ) g(w)|c|
λ
g(w)
λ
δ
4
We now write c = c1 c2 . . . b1 . . . cp cp+1 . . . cr b2 cr+1 . . . bk . . . cs−1 cs , where the ci denote good
edges and the bj denote maximal bad subpaths of c. Note for the second of the inequalities
below that the definition of “good” implies that there can be no cancellation in f (c) between
adjacent f (ci ) and f (ci+1 ) nor between adjacent f (ci ) and f (bj ), see Lemma 4.3.
30
MARTIN LUSTIG AND CAGLAR UYANIK
Then we calculate:
hγ, f (c)i hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
Ps
−
|f (c)|
i=1 |f (ci )|
s
hγ, f (c)i X hγ, f (ci )i
≤
−
|f (c)|
|f (c)|
i=1
P
s
s
X
hγ, f (ci )i
hγ, f (ci )i
P
− i=1
+
s
|f (c)|
i=1 |f (ci )|
i=1
P
s
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
Ps
+ P
−
s
i=1 |f (ci )|
i=1 |f (ci )|
k
2R|c| X hγ, [f (bj )]i
+
|f (c)| j=1 |f (c)|
Ps
Ps
hγ,
f
(c
)i
i
i=1 hγ, f (ci )i
i=1
− P
+ Ps
Pk
s
i=1 |f (ci )|
j=1 |[f (bj )]|
i=1 |f (ci )| +
Ps
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
Ps
+ P
−
s
i=1 |f (ci )|
i=1 |f (ci )|
< ε/4 + ε/4 + ε/4 + ε/4 = ε.
≤
Here the first inequality is just a triangle inequality. In the second inequality the last two
terms are unchanged, and first two terms come from the first term in the previous quantity
and follows from counting frequencies as follows: An occurrence of an edge path γ or its
inverse can occur either inside the image of a good edge f (ci ) or inside of the image of a bad
segment [f (bj )], or it might cross over the concatenation points. This observation gives the
claimed inequality. In the final inequality, the first ε/4 follows from the equation (6.2). The
second one follows from the equation (6.3) as follows:
k
X
hγ, [f (bj )]i
j=1
|f (c)|
≤
k
X
|[f (bj )]|
j=1
|f (c)|
≤
k
X
j=1
(λ0 )M
|bj |(λ00 )M
ε
≤ .
4
· #{good edges in c}
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
31
The third ε/4 comes from the following observation:
Ps
Ps
i=1 hγ, f (ci )i
i=1 hγ, f (ci )i
− P
Ps
Pk
s
i=1 |f (ci )|
i=1 |f (ci )| +
j=1 |[f (bj )]|
Pk
Ps
i=1 hγ, f (ci )i
j=1 |[f (bj )]|
= Ps
Ps
Pk
i=1 |f (ci )|
i=1 |f (ci )| +
j=1 |[f (bj )]|
Pk
Ps
hγ,
f
(c
)i
i
j=1 |[f (bj )]|
i=1
· Ps
≤ P
s
i=1 |f (ci )|
i=1 |f (ci )|
P
(λ00 )M kj=1 |bj |
P
≤
≤ ε/4
(λ0 )M si=1 |ci |
by (6.3).
Finally, the last ε/4 can be verified using (6.1) as follows:
Ps
hγ, |f (c1 )|µ+ (c1 ) + . . . + |f (cs )|µ+ (cs )i
i=1 hγ, f (ci )i
P
Ps
−
s
i=1 |f (ci )|
i=1 |f (ci )|
Ps
hγ, f (ci )i
− hγ, µ+ (ci )i)
i=1 |f (ci )|(
|f (ci )|
Ps
=
i=1 |f (ci )|
Ps
i=1 |f (ci )|ε/4
≤ P
= ε/4
s
i=1 |f (ci )|
Since after applying ϕM to a conjugacy class with g(w) ≥ δ we still have g(ϕM (w)) ≥ δ
we get (ϕM )n ([ηw ]) ∈ U for all n ≥ 1.
u
t
Lemma 6.2. For any δ > 0 and any neighborhood U of ∆+ (ϕ) there exists an integer
M (δ, U ) > 0 such that (up to replacing ϕ by a positive power) for any conjugacy class w with
goodness g(w) > δ we have
ϕn [ηw ] ∈ U
for all n ≥ M .
Proof. This is a direct consequence of Corollary 4.5 and Lemma 6.1.
u
t
Proposition 6.3. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and
ϕ−1 both admit properly expanding train-track representatives.
Given neighborhoods U of the simplex of attraction ∆+ (ϕ) and V of the simplex of repulsion
∆− (ϕ) in PCurr(FN ), then (up to replacing ϕ by a positive power) there exist an integer
M ≥ 0 such that for any conjugacy class w ∈ FN we have
ϕn [ηw ] ∈ U
for all n ≥ M .
or
ϕ−n [ηw ] ∈ V
32
MARTIN LUSTIG AND CAGLAR UYANIK
Proof. This is a direct consequence of Proposition 4.20 (see Remark 4.21) and Lemma 6.2.
u
t
The following result also proves Theorem 1.1 from the Introduction:
Theorem 6.4. Let ϕ ∈ Out(FN ) be a hyperbolic outer automorphism such that ϕ and ϕ−1
admit absolute train-track representatives. Then, ϕ acts on PCurr(FN ) with uniform NorthSouth dynamics from ∆− (ϕ) to ∆+ (ϕ):
Given an open neighborhood U of the simplex of attraction ∆+ (ϕ) and a compact set
K ⊂ PCurr(FN ) r ∆− (ϕ) there exists an integer M > 0 such that ϕn (K) ⊂ U for all
n ≥ M.
Proof. According to Remark 5.16 we can pass to common positive powers of ϕ and ϕ−1 that
have a properly expanding train track representatives as in Convention 5.15. We can then
combine Propositions 2.8, 3.3, 3.4 and 6.3 to obtain directly the required result. For the
application of Proposition 3.3 we need that ∆+ (ϕ) and ∆− (ϕ) are disjoint, which is shown
in Remark 6.5 below. We also need for Proposition 3.3 that both, ∆+ (ϕ) and ∆− (ϕ), are
ϕ-invariant, which is shown in Corollary 5.12.
u
t
Remark 6.5 (Dynamics within ∆+ (ϕ)). (1) It is proved in Proposition 5.6 that every
vertex of the simplex ∆+ = ∆+ (ϕ) is an expanding ϕ-invariant current, i.e. a projectivized
current [µ] for which there exist λ > 1 and t ≥ 1 such that ϕt (µ) = λµ.
For the rest of this remark we replace ϕ by a suitable positive power so that every vertex
current of ∆+ is projectively fixed by ϕ. Of course, this implies that ϕ fixes also every face
∆0 of ∆+ (but not necessarily pointwise).
(2) A uniform face ∆0 is a face of ∆+ which is spanned by vertices [µ1+ ], . . . , [µk+ ] that all
have the same stretch factor λ > 1, i.e. ϕ(µj+ ) = λµj+ for all 1 ≤ j ≤ k.
(3) Since the action of ϕ on Curr(FN ) is linear, all the uniform faces of ∆+ are pointwise
fixed. Any non-vertex current [µ] is always contained in the interior of some face ∆0 ⊂ ∆+ .
Then the sequence of ϕn ([µ]) converges towards a point in the uniform face ∆0+ of ∆0 which
is spanned by all vertices that have maximal stretch factor among all vertices of ∆0 .
(4) Similarly, under backwards iteration n → −∞ the sequence of ϕn ([µ]) converges towards
a point in the uniform face ∆0− of ∆0 ⊂ ∆+ which is spanned by all vertices that have minimal
stretch factor among all vertices of ∆0 .
(5) As a consequence, it follows that a current [µ] can not belong to both, ∆+ (ϕ) and
∆− (ϕ): By symmetry in the previous paragraph, any [µ] ∈ ∆− (ϕ) converges under backwards
iteration of ϕ−1 to an expanding ϕ−1 -invariant current. But backwards iteration of ϕ−1 is the
same as forward iteration of ϕ, and the limit current can not be simultaneously expanding
ϕ-invariant and expanding ϕ−1 -invariant.
Remark 6.6. As recalled in Remark 6.5, every vertex of the convex cell ∆+ = ∆+ (ϕ) is an
expanding ϕ-invariant current. Furthermore, any point in a uniform face of ∆+ is also an
expanding ϕ-invariant current, and these are the only such in ∆+ . It follows from Theorem
6.4 and from Remark 6.5 (applied to ϕ−1 ) that there are no other expanding ϕ-invariant
currents in PCurr(FN ) r ∆+ .
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
33
It has been shown in [BHL15] in a slightly more general context that expanding fixed
currents (i.e. currents µ with ϕµ = λϕ for some λ > 1) are in 1-1 relation with the nonnegative eigenvectors with eigenvalue > 1 for the transition matrix M (f ) of any expanding
train track representative f : Γ → Γ of ϕ. It seems likely that a similar result can be obtained
by extending the methods of Section 5.
Moreover, pointwise dynamics for a dense subset follows from our machinery:
Theorem 6.7. Let ηg be a rational current in Curr(FN ). Then, there exist [µ∞ ] ∈ ∆+ such
that
lim ϕt [ηg ] = [µ∞ ].
t→∞
Proof. Let γ be a reduced loop representing the conjugacy class g. Apply a sufficiently large
power ϕk to g, hence [f k (γ)], the reduced edge path representing ϕk (g) is a pseudo-legal loop,
see Proposition 4.12. Then the arguments in in the proof of Lemma 6.1 give the pointwise
convergence by looking at the set of non-INP edges in [f k (γ)].
u
t
Remark 6.8. From the proof of Theorem 6.7 and from the results of our previous paper
[LU17] one can also derive a precise description of the limit current µ∞ for any given rational
current ηg : Let [f k (γ)] be the pseudo-legal loop representing the conjugacy class ϕk (g), and
assume without loss of generality that the initial point doesn’t lie on any INP-subpath. Let
[f k (γ)] = c1 c1 . . . cp ρ1 cp+1 cp+1 . . . ρ2 cr cr+1 . . . cs−1 cs
be a legal concatenation of edges ci and of INP’s ρj . Then the limit current µ∞ is given by
X
µ+ (ci )] ,
[µ∞ ] = [
ci ∈EΓ0
where Γ0 is the (possibly non-connected) subgraph of Γ consisting precisely of those strata Hi
of Γ which satisfy one of the following two conditions, where denotes the natural partial
order on strata defined by the non-zero off-diagonal coefficients of the transition matrix M (f )
(see [LU17]):
(1) There exists a chain Hi = Hd Hd−1 . . . H1 of pairwise distinct strata,
all with maximal Perron-Frobenius eigenvalue among the diagonal blocks of M (f ).
Furthermore d is the maximal length of any such chain.
(2) Hi Hj for some Hj as in (1).
The analogue of Theorem 6.7 for non-rational currents is delicate, but the authors expect
that it is actually true. However, as already cautioned in the Introduction, in general the
pointwise convergence on PCurr(FN ) will not be uniform.
To finish the paper, we would like to illustrate our main result by considering the particular
case of a hyperbolic ϕ ∈ Out(FN ) which is given as a “free product” of fully irreducible hyperbolic outer automorphisms: Theorem 6.4 then shows that such a free product automorphism
acts on the space of projectivized geodesic currents with generalized uniform North-South
dynamics, and the simplex of attraction is spanned by the forward limit currents for each of
the fully irreducible factors. More precisely:
34
MARTIN LUSTIG AND CAGLAR UYANIK
Example 6.9. Let ϕi ∈ Out(FNi ) (with Ni ≥ 3) be a finite family of hyperbolic fully
irreducible outer automorphisms, where each ϕi : FNi → FNi is represented by an absolute
train-track map fi : Γi → Γi .
For simplicity we now assume (for example by passing to a positive power) that every fi has
a fixed vertex vi in Γi , and we consider the lift Φi ∈ Aut(FN ) represented by fi on π1 (Γi , vi ).
We then get a global absolute train-track map f by wedging together the Γi at the fixed
points vi , and f represents the outer automorphism ϕ given by Φ = Φ1 ∗ . . . ∗ Φk ∈ Aut(FN ),
for FN := FN1 ∗ . . . ∗ FNk .
Then the Bestvina-Feighn Combination Theorem implies that the “free product” ϕ is
hyperbolic. We consider for any i the embedding κi : Curr(FNi ) ,→ Curr(FN ) as described
in [KL10c].
In [Uya14] it was proven that for each factor graph Γi the current µ+ (e) defined in Proposition 5.6 is the same for every edge e of Γi . Hence the simplex of attraction for ϕ is spanned
by k currents µ+ (ei ), each of which is given by an edge ei from a different Γi . In fact, each
µ+ (ei ) is the κi -image of the well defined forward limit current for ϕi in Curr(FN ). Analogously, the simplex of repulsion is equal to the linear span of the images in Curr(FN ) of the
backwards limit currents for all ϕ.
References
[BF92]
[BF93]
[BF14]
[BFH00]
[BHL15]
[Bon91]
[BR15]
[Bri00]
[CHL08]
[CL95]
[CL15]
[Coo87]
[CV86]
[DKL15]
M. Bestvina and M. Feighn. A combination theorem for negatively curved groups. J. Differential
Geom., 35(1):85–101, 1992.
Mladen Bestvina and Mark Feighn. Outer limits. 1993. http://andromeda.rutgers.edu/ feighn/papers/outer.pdf.
Mladen Bestvina and Mark Feighn. Hyperbolicity of the complex of free factors. Adv. Math.,
256:104–155, 2014.
Mladen Bestvina, Mark Feighn, and Michael Handel. The Tits alternative for Out(Fn ). I. Dynamics
of exponentially-growing automorphisms. Ann. of Math. (2), 151(2):517–623, 2000.
Nicolas Bédaride, Arnaud Hilion, and Martin Lustig. Invariant measures for train track towers.
arXiv preprint arXiv:1503.08000, 2015.
Francis Bonahon. Geodesic currents on negatively curved groups. In Arboreal group theory, pages
143–168. Springer, 1991.
Mladen Bestvina and Patrick Reynolds. The boundary of the complex of free factors. Duke Math.
J., 164(11):2213–2251, 2015.
P. Brinkmann. Hyperbolic automorphisms of free groups. Geom. Funct. Anal., 10(5):1071–1089,
2000.
Thierry Coulbois, Arnaud Hilion, and Martin Lustig. R-trees and laminations for free groups. III.
Currents and dual R-tree metrics. J. Lond. Math. Soc. (2), 78(3):755–766, 2008.
Marshall M. Cohen and Martin Lustig. Very small group actions on R-trees and Dehn twist automorphisms. Topology, 34(3):575–617, 1995.
Thierry Coulbois and Martin Lustig. Long turns, INP’s and indices for free group automorphisms.
Illinois J. Math., 59(4):1087–1109, 2015.
Daryl Cooper. Automorphisms of free groups have finitely generated fixed point sets. J. Algebra,
111(2):453–456, 1987.
Marc Culler and Karen Vogtmann. Moduli of graphs and automorphisms of free groups. Invent.
Math., 84(1):91–119, 1986.
Spencer Dowdall, Ilya Kapovich, and Christopher J Leininger. Dynamics on free-by-cyclic groups.
Geom. Topol, 19(5):2801–2899, 2015.
DYNAMICS OF HYPERBOLIC AUTOMORPHISMS OF FN
[FM10]
[Ham12]
[HM13]
[Iva92]
[Kap05]
[Kap06]
[KL09]
[KL10a]
[KL10b]
[KL10c]
[Lev09]
[LL03]
[LU16]
[LU17]
[Mah11]
[Mar95]
[Riv08]
[Thu88]
[Uya14]
[Uya15]
35
Sébastien Ferenczi and Thierry Monteil. Infinite words with uniform frequencies, and invariant
measures. In Combinatorics, automata and number theory, volume 135 of Encyclopedia Math.
Appl., pages 373–409. Cambridge Univ. Press, Cambridge, 2010.
Ursula Hamenstaedt. The boundary of the free splitting graph and the free factor graph. arXiv
preprint arXiv:1211.1630, 2012.
Michael Handel and Lee Mosher. The free splitting complex of a free group, I: hyperbolicity. Geom.
Topol., 17(3):1581–1672, 2013.
Nikolai V Ivanov. Subgroups of Teichmuller modular groups, volume 115. American Mathematical
Soc., 1992.
Ilya Kapovich. The frequency space of a free group. Internat. J. Algebra Comput., 15(5-6):939–969,
2005.
Ilya Kapovich. Currents on free groups. In Topological and asymptotic aspects of group theory,
volume 394 of Contemp. Math., pages 149–176. Amer. Math. Soc., Providence, RI, 2006.
Ilya Kapovich and Martin Lustig. Geometric intersection number and analogues of the curve complex for free groups. Geom. Topol., 13(3):1805–1833, 2009.
Ilya Kapovich and Martin Lustig. Domains of proper discontinuity on the boundary of outer space.
Illinois J. Math., 54(1):89–108, 2010.
Ilya Kapovich and Martin Lustig. Intersection form, laminations and currents on free groups. Geom.
Funct. Anal., 19(5):1426–1467, 2010.
Ilya Kapovich and Martin Lustig. Ping-pong and outer space. J. Topol. Anal., 2(2):173–201, 2010.
Gilbert Levitt. Counting growth types of automorphisms of free groups. Geometric and Functional
Analysis, 19(4):1119–1146, 2009.
Gilbert Levitt and Martin Lustig. Irreducible automorphisms of Fn have north-south dynamics on
compactified outer space. J. Inst. Math. Jussieu, 2(1):59–72, 2003.
Martin Lustig and Caglar Uyanik. North-south dynamics of hyperbolic free group automorphisms
on the space of currents. arXiv preprint arXiv:1509.05443v2, 2016.
Martin Lustig and Caglar Uyanik. Perron-Frobenius theory and frequency convergence for reducible
substitutions. Discrete and Continuous Dynamical Systems, 37(1):355–385, 2017.
Joseph Maher. Random walks on the mapping class group. Duke Mathematical Journal, 156(3):429–
468, 2011.
Reiner Martin. Non-uniquely ergodic foliations of thin-type, measured currents and automorphisms
of free groups. ProQuest LLC, Ann Arbor, MI, 1995. Thesis (Ph.D.)–University of California, Los
Angeles.
Igor Rivin. Walks on groups, counting reducible matrices, polynomials, and surface and free group
automorphisms. Duke Mathematical Journal, 142(2):353–379, 2008.
William P. Thurston. On the geometry and dynamics of diffeomorphisms of surfaces. Bull. Amer.
Math. Soc. (N.S.), 19(2):417–431, 1988.
Caglar Uyanik. Dynamics of hyperbolic iwips. Conformal Geometry and Dynamics of the American
Mathematical Society, 18(11):192–216, 2014.
Caglar Uyanik. Generalized north-south dynamics on the space of geodesic currents. Geometriae
Dedicata, 177(1):129–148, 2015.
Aix Marseille Université, CNRS, Centrale Marseille, I2M UMR 7373 13453, Marseille, France
E-mail address: [email protected]
Department of Mathematics, University of Illinois at Urbana-Champaign, 1409 West Green Street,
Urbana, IL 61801, USA, http://www.math.uiuc.edu/~cuyanik2
E-mail address: [email protected]
| 4 |
Further insights into the damping-induced self-recovery
phenomenon
Tejas Kotwal ∗, Roshail Gerard †and Ravi Banavar
‡
arXiv:1709.05596v4 [cs.SY] 11 Jan 2018
January 12, 2018
1
Abstract
In a series of papers [1, 2, 3, 4], D. E. Chang, et al., proved and experimentally demonstrated a phenomenon they termed “damping-induced self-recovery”. However, these papers left a few questions
concerning the observed phenomenon unanswered- in particular, the effect of the intervening lubricantfluid and its viscosity on the recovery, the abrupt change in behaviour with the introduction of damping,
a description of the energy dynamics, and the curious occurrence of overshoots and oscillations and
its dependence on the control law. In this paper we attempt to answer these questions through theory. In particular, we derive an expression for the infinite-dimensional fluid-stool-wheel system, that
approximates its dynamics to that of the better understood finite-dimensional case.
2
Introduction
The damping-induced self-recovery phenomenon refers to the fundamental property of underactuated
mechanical systems: if an unactuated cyclic variable is subject to a viscous damping-like force and the
system starts from rest, then the cyclic variable will always recover to its initial state as the actuated
variables are brought to rest. A popular illustration exhibiting self-recovery is when a person sits on
a rotating stool with damping, holding a wheel whose axis is parallel to the stool’s axis. The wheel
can be spun and stopped at will by the person (Refer to [5]). Initially, the system begins from rest;
when the person starts spinning the wheel (say anticlockwise), the stool begins moving in the expected
direction (i.e., clockwise). Then the wheel is brought to a halt; the stool then begins a recovery by
going back as many revolutions in the reverse direction (i.e., anticlockwise) as traversed before. This
phenomenon defies conventional intuition based on well-known conservation laws. Andy Ruina was the
first to report this phenomenon in a talk, where he demonstrated a couple of experiments on video
[6]. Independently, Chang et al., [1, 2] showed that in a mechanical system with an unactuated cyclic
variable and an associated viscous damping force, a new momentum-like quantity is conserved. When
∗ Department
of Mathematics
of Mechanical Engineering
‡ Systems and Control Engineering, Indian Institute of Technology Bombay, Mumbai, India
† Department
1
the other actuated variables are brought to rest, the conservation of this momentum leads to asymptotic
recovery of the cyclic variable to its initial position. Boundedness is another associated phenomenon, in
which the unactuated cyclic variable reaches a saturation eventually, when the velocity corresponding to
the actuated variable is kept constant; this occurs due to the presence of damping. In the experiment
explained above, this manifests as the angle of rotation of the stool reaching an upper limit, when the
wheel is spinning at a constant speed.
Chang et al. generalize this theory to an infinite-dimensional system in which the interaction of an
intermediate fluid is considered [3, 4]; they show that the fluid layers also display self-recovery, which
is confirmed via experiments as well [7]. Such a generalization of the model is considered because of
the interaction of the fluid in the bearing with the recovery phenomenon of the stool, in the experiment
explained above. In this work, we make the following points:
• We show that the dynamics of the stool and the wheel in the infinite-dimensional fluid system can
be approximated to that of the finite-dimensional case by finding an effective damping constant
that takes into account the effect of the viscous fluid on the system.
• We analyse the finite-dimensional system from a dynamical systems point of view, and show that
a bifurcation occurs when the damping constant switches from zero to a positive value. We also
derive an expression for the angle at which boundedness occurs.
• In addition to the recovery phenomenon described previously, further complex behaviour is observed
in the experiments reported in [5, 7]. In particular, the unactuated variable not only approaches
its initial state during recovery, but also overshoots and then oscillates about this initial position,
eventually reaching it asymptotically. This oscillation phenomenon has not been looked into in
previous works, and is one of the points that we address as well.
• In Chang et al. [5], in the experiment described, the oscillations are of significant amplitude, and
this would prompt one to assume that some sort of mechanical ‘spring-like’ energy is being stored,
as the stool appears to start moving after the entire system has come to a halt. The question of
energy has been touched upon in this work, and we present energy balance equations for the given
mechanical system.
The paper unfolds as follows. Initially we present mathematical models for the stool-wheel experiment
- the first is a finite-dimensional one, and the second one incorporates the intervening fluid (either in
the bearing or in a tank) using the Navier-Stokes equation for a Newtonian incompressible fluid. This
is followed by a section that presents an intuitive interpretation of recovery highlighting three distinct
types of behaviour. Then follows a theoretical section that presents a technique to reduce the infinitedimensional fluid effect to an effective damping constant and hence model the overall system in finite
dimensions. This part is followed up by a result on boundedness and the occurrence of a bifurcation
in the system dynamics. In the appendix, the derived results are used in conjunction with numerical
experiments to validate the expression for the effective damping constant. We then examine the case of
2
oscillations and overshoots, and present plausible explanations to why these occur, and possible sources
of future investigation.
3
Mathematical models
Finite-dimensional model: We first analyze a simplified, idealized version of the person with a wheel
in hand, sitting on a rotatable stool whose motion is opposed by damping, which for the purpose of
analysis is assumed to be linear viscous damping. This is a specific example of the model that Chang, et
al. studied [1, 2]. We assume two flat disks, one for the wheel and one for the stool-person mass as shown
in Fig. 1. The stool consists of an internal motor, that actuates the wheel, while the motor-rod-stool
setup rotates as one piece (henceforth just called the stool). There is linear viscous damping present in
the rotational motion of the stool, with damping coefficient k. The torque imparted on the wheel by the
motor is denoted by u(t).
Figure 1: A schematic diagram of the wheel-stool model.
The inertia matrix of the system is given by
(mij ) =
m11
m21
I
= w
m22
Iw
m12
Iw
Iw + Is
,
(1)
where Iw and Is are the moments of inertia of the wheel and stool respectively. The kinetic energy
of the described system is
K.E.(t) =
1
1
Iw (θ̇w + φ̇s )2 + Is φ̇2s ,
2
2
(2)
where θw denotes the angle rotated by the wheel relative to the stool, and φs denotes the angle
rotated by the stool relative to the ground frame. Since there is no external potential in our system, the
3
Lagrangian only comprises of the total kinetic energy. The Euler-Lagrange equations for the system are
given by
Iw φ̈s + Iw θ̈w = u(t)
(3a)
(Iw + Is )φ̈s + Iw θ̈w = −k φ̇s
(3b)
Although this model captures the damping-induced boundedness and recovery phenomena, further
behaviour that cannot be explained with this model are the overshoot and oscillations, which were
observed in experiments [5, 7]. It was suggested that the lubricating fluid inside the bearing of the
rotatable stool could be one of the reasons behind this additional behaviour. As a result, a generalized
model that involves the dynamics of the fluid interacting with the stool-wheel setup is analyzed [3, 4].
Infinite-dimensional fluid model: The model consists of two concentric infinitely long cylinders
with inner radius Ri and outer radius Ro . The outer radius is fixed, while the inner cylinder is free
to rotate (this is the stool in our case). A motor is installed in the inner cylinder (as described in the
previous case, i.e., φs ), to drive the wheel (i.e., θw ) attached to it. The annulus region between the two
cylinders is filled with an incompressible viscous fluid. Due to symmetry in the z direction, we may
regard this as a 2D system in a horizontal plane. The moments of inertia should be considered as per
unit depth, because of the infinite length in the z direction. Due to rotational symmetry, the fluid only
flows coaxially, i.e, there is no fluid flow in the radial direction. Let v(r, t) denote the tangential velocity
of the fluid at radius r and time t, where Ri ≤ r ≤ Ro . The subscripts t and
r
denote partial derivatives
with respect to time and radius respectively. As described before, u(t) is the driving torque on the wheel
imparted by the motor. The corresponding equations are
Iw φ̈s + Iw θ̈w = u(t)
(4a)
(Iw + Is )φ̈s + Iw θ̈w = 2πρνRi Ri vr (Ri , t) − v(Ri , t)
(4b)
vt = ν(vrr +
vr
v
− 2)
r
r
(4c)
where ν is the kinematic viscosity and ρ is the density of the fluid. The right hand side of Eq. (4b)
is the torque on the inner cylinder due to stress exerted by the surrounding fluid [8]. Equation (4c) is
the Navier-Stokes equation for an incompressible viscid fluid in radial coordiantes. The system (4) is
an infinite-dimensional fluid system, compared to the previous finite-dimensional system (3). The initial
and boundary conditions are given by
φs (0) = φ̇s (0) = θw (0) = θ̇w (0) = 0
(5a)
v(r, 0) = 0
(5b)
v(Ri , t) = Ri φ̇s (t)
(5c)
v(Ro , t) = 0
(5d)
4
where Eqs. (5c) and (5d) are the no-slip boundary conditions for the fluid. The given initial conditions
imply that the entire system begins from rest. In order to control the wheel independently of the effects of
inertia of the stool and damping of the fluid, we employ a method known as partial feedback linearization.
This is done by partially cancelling the nonlinearities in the dynamics, i.e. the wheel equations are
linearized by introducing a new input τ (t) and redefining the input u(t) as
u(t) =
Iw
Iw + Is
Is τ (t) + 2πρνRi Ri vr (Ri , t) − v(Ri , t)
(6)
where τ (t) is precisely equal to the acceleration of the wheel, i.e. θ̈w = τ (t). We assume a PD control
law for the new control variable given as
d
d
d
τ (t) = θ̈w
(t) + c1 θ̇w
(t) − θ̇w + c0 θw
(t) − θw
(7)
d
where θw
(t) is the desired trajectory of the wheel, and c0 and c1 are the proportional and differential
gains respectively. For the standard demonstration of recovery and/or boundedness, we require the wheel
to be driven from rest to constant velocity, and then abruptly braked to a stop. Such a desired trajectory
d
(t) = (1/2) θ̇steady |t| − |t − tstop | + tstop where θ̇steady is
of the wheel is given by a ramp function, θw
the desired constant velocity of the wheel, and tstop is the time at which the wheel is instantaneously
brought to rest (Refer to Fig. 2). By appropriately tuning the values of c0 and c1 , we can mimic the
desired trajectory. This tuning is important in accounting for the presence of oscillations, or lack thereof,
Desired trajectory of the wheel 3wd (rad)
as we shall see later.
slope = 3_steady
0
0
tstop
Time t (s)
d
Figure 2: An illustration of the desired trajectory θw
(t) in the control law of the wheel (7)
.
4
An intuitive interpretation of recovery
We present a qualitative interpretation of the boundedness and recovery phenomenon using the momentum equation of the finite dimensional stool-wheel case. A brief explanation of the recovery phenomenon
was also presented by Andy Ruina [6] which we summarize: Change in angular momentum is equal to
5
the net external torque, but since it is only due to linear viscous damping, we have L̇ = −cϕ̇ (where L is
the angular momentum, c is the damping constant and ϕ is the angle). If the system’s initial and final
state is the rest state, then ∆L = 0 =⇒ ∆ϕ = 0. Thus the net change in angle has to be zero, implying
that recovery must occur. We delve a little deeper into the phenomenon and attempt to provide an
intuitive interpretation for the reversal of direction of the stool.
Consider the case where the wheel follows the desired trajectory perfectly (i.e., the ramp function).
This means that at t = 0, an impulsive acceleration gets the wheel spinning instantaneously (to a constant
speed), and at t = tstop , an impulsive deceleration brings the wheel to a halt instantaneously (refer to
Fig. 3). Consider the damping-induced momentum equation, as derived by Chang, et al. [1, 2]
Acceleration of wheel 3Bw (rad=s2 )
Iw (θ̇w + φ̇s ) + Is (φ̇s ) + kφs = 0
(8)
2000
1000
0
-1000
-2000
0
2
4
6
8
10
Time t (s)
Figure 3: Acceleration vs time for the wheel. The first peak corresponds to the initial impulse to get the
wheel spinning to a constant velocity; the second negative impulse is to brake the wheel to a halt.
At t = 0, there is a jump in θ̇w , while φs remains constant (i.e., φs = 0) (refer to Figs. 8 and 9). The
momentum equation (8) then simplifies to
Iw (θ̇w (0) + φ̇s (0)) + Is (φ̇s (0)) = 0
(9)
which is the usual momentum conservation. Thus, at t = 0, the velocity of the stool is governed
by the conservation of standard angular momentum, and the velocity of the wheel. Let this velocity be
φ̇s (0) = φ̇fs .
At t = tstop , there is an instantaneous jump down to zero for θ̇w , while φs remains constant. This
time, the momentum equation (8) simplifies to
Iw (θ̇w (tstop ) + φ̇s (tstop )) + Is (φ̇s (tstop )) = C
(10)
where C is a constant (C = −kφs (tstop )). Once again, this equation may be interpreted as the
standard angular momentum conservation. We examine three distinct cases:
• Case 1: (No damping) The speed of the stool at t = tstop − ε is the same as what it was at t = 0,
6
(i.e. φ̇fs ), implying that at t = tstop , the stool comes to rest instantaneously (i.e., φ̇s (tstop ) = 0).
Recall, that this is the standard case, where the usual momentum conservation law holds. Refer
to Figs. 7 and 4.
Position of stool ?s (rad)
0
-0.2
-0.4
-0.6
-0.8
-1
0
2
4
6
8
10
Time t (s)
Figure 4: Case 1. k = 0, tstop = 5, vw = 2. This case corresponds to the usual momentum conservation.
• Case 2: (Damping present but damping induced boundedness not yet reached) During 0 < t <
tstop , the damping force keeps decreasing the speed of the stool. However, the momentum equation
(10) is still the same at t = tstop . Thus, the change in momentum of the stool would be the same (as
in Case 1). But since |φ̇s (tstop − ε)| < |φ̇fs |, the final momentum of the wheel ends up overshooting
zero at t = tstop , resulting in the change in direction of the stool. Refer to Figs. 7 and 5.
• Case 3: (Damping present and damping-induced boundedness has been attained) This case can
be viewed as a special instance of Case 2, where for 0 < t < tstop , the speed of the stool decreases
all the way to zero. The rest of the explanation follows as in Case 2. Refer to Figs. 7 and 6.
7
Position of stool ?s (rad)
0
-0.02
-0.04
-0.06
-0.08
-0.1
0
2
4
6
8
10
Time t (s)
Figure 5: Case 2. k = 1, tstop = 1, vw = 2. In this case, damping-induced boundedness is not yet
reached, but the recovery phenomenon can be seen.
Position of stool ?s (rad)
0
-0.05
-0.1
-0.15
0
2
4
6
8
10
Time t (s)
Figure 6: Case 3. k = 1, tstop = 5, vw = 2. In this case, both—damping-induced boundedness and
recovery phenomenon can be seen.
8
Change in velocity of the stool
before and after braking
0
Case 1
Case 2
Case 3
Figure 7: Comparison of the three cases before and after braking. Blue dots: velocity of stool just
before braking; red dots: velocity of stool immediately after braking. For cases 2, 3, the (magnitude of)
velocity of the stool before braking decreases due to damping; hence momentum transferred by the wheel
overshoots the stool velocity to something positive. This explains why the wheel changes direction.
9
5
Effective damping constant
In this section, we demonstrate that the dynamics of the infinite-dimensional fluid system can be approximated by that of a finite-dimensional one.
d
Claim 5.1. Let the desired trajectory of the wheel be the ramp function, given by θw
(t) = (1/2) θ̇steady |t|−
|t − tstop | + tstop . Then the solution of Eq. (4c) satisfies
lim v(r, t) = lim Ri φ̇s (t)
t→∞
t→∞
Ro − r
.
Ro − Ri
Proof: We consider an analytical solution to the PDE (4c), obtained by the method of separation
of variables. Since one of the boundary conditions is non-homogeneous (and in fact time dependent), we
perform a change of variables in order to make it homogeneous [9]. The change of variables is given as
v(r, t) = w(r, t) + Ri φ̇s (t)
Ro − r
Ro − Ri
(11)
where w(r, t) is transformed the variable. The correction term is taken as a linear interpolation
between the two boundary conditions for simplicity. The transformed PDE is given as
wt − ν(wrr +
w
wr
− 2 ) = F (r, t)
r
r
(12)
where F (r, t) is the driving force of the PDE resulting from the change of variables given by
F (r, t) = −Ri φ̈s (t)
Ro − r
Ro
− νRi φ̇s (t) 2
Ro − Ri
r (Ro − Ri )
(13)
The transformed initial and boundary conditions are given by
w(r, 0) = 0
(14a)
w(Ri , t) = 0
(14b)
w(Ro , t) = 0
(14c)
We assume the solution w(r, t) = W (r)T (t), and obtain the homogeneous solution of the spatial ODE
by analyzing the corresponding eigenvalue problem. The eigen solution obtained is given by
r
W (r) = aJ1
r
λ
λ
r + bY1
r
ν
ν
(15)
where J1 and Y1 are the Bessel’s functions of the first and second kind respectively, λ denotes the
eigen value, and a and b are arbitrary constants determined by the boundary conditions. Upon plugging
in the boundary conditions, and solving for λ, we find that the eigen values are positive due to the fact
that roots of Bessel’s functions are real [10]. Thus we have the following solution for v(r, t)
10
v(r, t) =
∞
X
r
J1
n=1
|
r
!
λn
λn
Ro − r
r + kn Y1
r
Tn (t) +Ri φ̇s (t)
ν
ν
Ro − Ri
{z
}
(16)
transient term
where kn and λn are constants obtained by solving the boundary conditions in the eigen value problem,
and Tn (t) is the time component of the solution, which is obtained by solving the corresponding initial
value problem. The series given in the right hand side of Eq. (16) is considered as a transient term
for the PDE (4c), and we show that it is insignificant as t → ∞. Consider the time component of the
solution (16)
Z
t
e
Tn (t) =
0
R Ro
−λn (t−τ ) Ri
F (r, τ )Wn (r)dr
R Ro
Ri
Wn (r)2 dr
dτ = e
−λn t
Z
t
eλn τ (mφ̈s (τ ) + lφ̇s (τ ))dτ
0
where Wn (r) is the nth term of the Fourier series, and m and l are constants obtained after evaluating
the integrals in the spatial variable. For our case, plug in θ̇w (t) equal to the desired ramp trajectory
d
(θw
(t) = (1/2) θ̇steady |t| − |t − tstop | + tstop ) in the momentum equation (8). Upon solving for φ̇s (t),
we see that it is exponentially decaying, and therefore Tn (t) → 0 as t → ∞ for all n.1 Thus, we have the
result.
.
In the limit where the transient term is insignificant, the solution (16) is plugged in Eq. (4b) and
simplified as follows
(Iw + Is )φ̈s + Iw θ̈w = −
2πρνRo Ri2
φ̇s
Ro − Ri
(17)
We would like to emphasize here that we have found an effective damping constant kef f for the
infinite-dimensional fluid system (4) that approximates its dynamics to that of a finite dimension case
(3). The effective damping constant is given by
kef f =
2πρνRo Ri2
Ro − Ri
(18)
We revisit this effective damping constant and its validity in the appendix, after we introduce a couple
of expressions from the boundedness and bifurcation section.
6
Boundedness and bifurcation
We now revisit the finite dimensional case (3), and rewrite the corresponding momentum equation as a
first order system. The damping-induced momentum equation (8) is given by
(Iw + Is )φ̇s + Iw θ̇w (t) + kφs = 0
(19)
1 In fact, the result holds for any wheel trajectory that grows polynomially for finite time before eventually coming to
rest.
11
where θ̇w (t) is written as a function of time, since it is an external driving force for the stool dynamics.
(Using partial feedback linearization, the wheel can be controlled independently of the stool).
Claim 6.1. Suppose k > 0. Then for a fixed speed of the wheel, say θ̇w (t) = vw = constant, we have the
following equality
lim φs (t) = φ∗s =
t→∞
−Iw vw
k
Proof: Rewritting Eq. (8) as a first order system in φs
φ̇s =
−k
−Iw
φs +
θ̇w (t) = −αφs − β θ̇w (t) = f (φs , t)
Iw + Is
Iw + Is
(20)
where α, β are constants. Since Eq. (20) is a nonautonomous system, we rewrite it in a higher
dimensional autonomous form as
φ̇s = −αφs − β θ̇w (t)
(21a)
ṫ = 1
(21b)
In the differential equation for the stool, for a fixed speed of the wheel, say θ̇w (t) = θ̇steady = vw =
constant, the solution is
Z
φs (t) = −β
t
[e−α(t−s) ]vw ds =
0
−βvw
[1 − e−αt ]
α
(22)
and as t → ∞, we have
φ∗s = lim φs (t) =
t→∞
−βvw
−Iw vw
=
α
k
.
The above equality corresponds to the damping-induced boundedness phenomenon, and is especially
relevant in Figs. 8 and 9. Now we get to the dynamical systems aspect of our discussion.
For the purpose of this discussion we present a few definitions from standard texts on dynamical
systems. A fixed point for a system of differential equations Ẋ = F (X) is defined as the set of points
that are solutions to the equation F (X) = 0. A fixed point for system (21) does not exist since ṫ 6= 0 for
any state (φs , t). We will consider (φ∗s , t∗ ) to be a fixed point if f (φ∗s , t∗ ) = 0. A bifurcation is defined as
a change in the qualitative structure of the flow as the parameters are varied. In particular, fixed points
can be created or destroyed, or their stability can change [11]. In this particular case, the drastic change
in behaviour occurs at k = 0.
d
Claim 6.2. Let the desired trajectory of the wheel be the ramp function, i.e., θw
(t) = (1/2) θ̇steady |t| −
|t − tstop | + tstop . Then
• If k = 0, the stool dynamics is neutrally stable
• If k > 0, the stool dynamics is asymptotically stable.
Thus, a bifurcation occurs when k is varied from 0 to a positive number.
12
Velocity of stool ?_ s (rad=s)
0.1
0
-0.1
-0.2
-0.8
-0.6
-0.4
-0.2
0
Position of stool ?s (rad)
Figure 8: Phase portrait of stool dynamics with varying values of damping coefficient k, and steady
state wheel velocity θ̇steady = 2. Green: k = 1; red: k = 0.1; blue: k = 0. Green: damping-induced
boundedness attained; red: damping induced boundedness is not yet reached; blue: neutral stability, no
recovery phenomenon. The final equilibrium point for the k = 0 case and k > 0 are drastically different.
Proof: k = 0: From eqn. (21),
k = 0 ⇒ φ̇s = −β θ̇w (t)
This implies that the stool dynamics has a fixed point only when the wheel is brought to a rest; the stool
is neutrally stable at any constant value φ∗s .
k > 0: The fixed point φ∗s for the stool dynamics is governed by
φ∗s =
−Iw
θ̇w (t∗ )
k
(23)
For a fixed point to occur, there are two possibilities:
The wheel is at a constant speed vw ⇒ φ∗s = −Iw vw /k
or
The wheel is at rest ⇒ φ∗s = 0
Clearly, if the wheel is braked (zero speed), the stool must go back to its initial state (φ∗s = 0) governed
by
φ̇s = −αφs
(24)
This is the damping-induced self recovery equilibrium state. As seen from the above analysis, the system
undergoes a change in its dynamical system behaviour, when k is switched from 0 to a positive number.
Eq. (23), rewritten as
φ∗s k = −Iw θ̇w (t∗ )
(25)
is the equation of a hyperbola in the variables φ∗s and k, and as k → 0, φ∗s → ∞. For k > 0 (no matter
how small it is), the recovery phenomenon occurs (implying that the stool must return to its initial
position regardless how many rotations it has completed). But for k = 0, the stool is neutrally stable,
implying a change in the stability behaviour. (Note that as φs is 2π−periodic, one should consider
13
Velocity of stool ?_ s (rad=s)
0.3
0.2
0.1
0
-0.1
-0.2
-0.15
-0.1
-0.05
0
Position of stool ?s (rad)
Figure 9: Phase portrait of stool dynamics with varying values of steady state wheel velocity θ̇steady .
Innermost to outermost loop: θ̇steady = 1, 2, 3 (k = 1 for all cases).
φs mod 2π to obtain the actual position of the stool. However, not doing so, gives us the number of
rotations the stool completes. For e.g., if φ∗s = 8π, then the damping-induced bound is attained after
four rotations)
.
7
Oscillations and energy description
Oscillations of the unactuated variable have been reported in a few experiments on the damping induced
self-recovery phenomenon [4, 5, 6, 7]. In our opinion, the cause of these oscillations has not been
adequately identified in previous works. We believe that a seemingly trivial, but important source of
these oscillations, is the nature of the control law used on the wheel. It is observed that if oscillations
are induced in the wheel via the control law, then the stool also mimics these oscillations, with a slight
time lag due to the damping. This type of oscillation can be produced in both, the finite-dimensional
as well as the infinite-dimensional system. Refer to Figs. 10 and 11 for an example via simulations. We
would like to emphasize that oscillations of this kind are a direct consequence of the actuation of the
wheel. It is likely that the oscillations in [4, 7] are of this kind.
However, the oscillations in Ref. [5] occur even though the wheel is stationary with respect to the
stool; in fact, at the extreme positions of the oscillation, it appears as though the entire system (stool
and wheel) begins moving again from a complete state of rest. That is, it appears that there is some
kind of mechanical ‘spring-like’ energy being stored at these extreme positions. These oscillations are
clearly not of the type mentioned above, as they are not a direct result of the actuation of the wheel.
Additionally, the observed oscillations in the stool are of high amplitude whereas those in the wheel, if
any, appear to be of small amplitude. This is contradictory to what is observed in the previous type of
oscillations (seen in Figs. 10 and 11) as the inertia of the stool-wheel system is greater than the inerita
of the wheel only. A simple order of magnitude analysis shows that a more complex model is probably
14
Position of wheel 3w (rad)
500
400
300
200
100
0
0
5
10
15
20
Time t (s)
Figure 10: Trajectory of the wheel (solid blue line) with control parameters c0 = 1 and c1 = 3. The red
dashed line denotes the desired trajectory, and the overshoot of the wheel may be seen at t = 2s.
Position of stool ?s (rad)
0.02
0
-0.02
-0.04
-0.06
-0.08
0
5
10
15
20
Time t (s)
Figure 11: Trajectory of the stool (solid blue line) under the influence of the wheel trajectory shown in
Fig. 10. The black dashed line denotes the zero position of the stool, and the overshoot of the stool may
be seen after it recovers (Note the slight delay when compared to the overshoot of the wheel; this is due
to the time constant of the system).
required to account for this phenomenon. In order to demonstrate this, we first consider the energy
dynamics of the system.
Energy description for the finite-dimensional system: In order to derive the energy equations
of the finite dimensional system, (3b) is multiplied by φ̇s , and (3a) with θ̇w , to yield
(Iw + Is )φ̈s φ̇s + Iw θ̈w φ̇s = −k φ̇s φ̇s
(26a)
Iw φ̈s θ̇w + Iw θ̈w θ̇w = uθ̇w
(26b)
Equations (26a) and (26b) are integrated, and then summed up, resulting in the following energy
balance (in the ground frame)
Z
t
Z
uθ̇w dt = K.E.(t) +
0
0
15
t
k φ̇2s dt
(27)
where K.E.(t) is the total kinetic energy of the system. The second term on the right hand side of
represents the cumulative energy lost due to damping losses up to time t. The energy lost in damping is
precisely equal to the work done by the damping force, that is
Z
φs (t)
L.E.(t) =
Z
k φ̇s dφs =
0
t
k φ̇2s dt.
(28)
0
The term on the left hand side of Eq. (27) represents the total energy pumped into the system by
the motor, up to time t. The power input into the system by the motor is the sum of power imparted to
the wheel by the actuation force u(t), and the power imparted to the stool by the reaction force. The
cumulative input energy (denoted by I.E.(t)) is given by
Z
t
Z
t
Z
(29)
0
0
0
t
uθ̇w dt
(−u)φ̇s dt =
u(θ̇w + φ̇s ) dt +
I.E.(t) =
We can simplify the energy balance (27) as
I.E.(t) = K.E.(t) + L.E.(t)
(30)
Energy description for the infinite-dimensional fluid system: The above energy equation can be
extended for the infinite dimensional case as follows.
1
I.E.(t) = K.E.(t) + ρ
2
Z
1
v dV + ρν
2
2
Z tZ
0
∂vi
∂vk
+
∂xk
∂xi
2
dV dt
(31)
where the second term on the right hand side is the kinetic energy of the fluid, while the third term
is the energy lost due to viscous damping [8]. The velocity of the fluid in cartesian coordinates is given
by v = −v sinθ î + v cosθ ĵ, where v is the tangential velocity of the fluid as discussed previously
(4). We consider the system at a state when the wheel is no longer being actuated and is in a state
of rest with respect to the stool. The system can be found in such a state at the extreme position of
an oscillation that occurs after the wheel has been brought to rest. This implies that I.E(t) in (31)
is zero and hence, the kinetic energy of the stool can only be exchanged with that of the fluid, or be
lost due to damping. We analyze this state with the parameters from table 1 for the fluid-stool-wheel
system. At the extremum of the oscillation, the stool-wheel system is momentarily at rest, and as is
clear from (31), must be imparted energy from the fluid to start rotating again. The maximum energy
that the stool-wheel system could possibly regain is therefore equal to the kinetic energy of the fluid at
this extreme position. This leads to an expression (32) for the minimum fluid velocity (averaged over
the thickness of the annulus) in terms of system constants and the velocity of the stool.
i 2
1h
1
(Iw + Is )φ̇2s = ρπ (Ri + t)2 − (Ri )2 h vavg
2
2
(32)
where t and h are the thickness and height of the bearing respectively, while vavg is the velocity of the
fluid averaged over the thickness of the annulus. Even for a stool velocity as low as 1 rpm, the required
average fluid velocity is around 11 rpm, which is quite high and unrealistic. Hence, it is likely that a
16
different model is required to address such behaviour.
Name
Moment of Inertia of Wheel-Stool System
Inner diameter of bearing
Thickness of bearing
Height of bearing
Density of Fluid
Value
1
0.1
0.01
0.01
1000
Units
kg/m2
m
m
m
kg/m3
Table 1: Parameter values of fluid-wheel-stool system that are representative of experiment in [5]
8
Conclusion
In this paper, we present certain aspects of the damping-induced self recovery phenomenon that have
not been investigated so far in the existing literature. We present a technique to reduce the infinitedimensional fluid model to the better understood finite dimensional case, by deriving a formula for an
effective damping constant. We show that a bifurcation takes place at k = 0, and upon varying the value
of k from zero to a positive number, the stability of the stool changes from neutral to asymptotically
stable. We also derive an expression for the angle at which boundedness occurs to validate the approximation of the fluid system (by comparing with numerical experiments). Finally, we present an energy
description of the system to give an intuitive understanding of the energy dynamics, and to point out
that further experimental and theoretical investigation is necessary to explain the peculiar oscillations
found in experiments [5, 6].
References
[1] Dong Eui Chang and Soo Jeon. Damping-induced self recovery phenomenon in mechanical systems with an unactuated cyclic variable. Journal of Dynamic Systems, Measurement, and Control,
135(2):021011, 2013.
[2] Dong Eui Chang and Soo Jeon. On the damping-induced self-recovery phenomenon in mechanical
systems with several unactuated cyclic variables. Journal of Nonlinear Science, 23(6):1023–1038,
2013.
[3] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon in the process of diffusion. arXiv
preprint arXiv:1305.6658, 2013.
[4] Dong Eui Chang and Soo Jeon. On the self-recovery phenomenon for a cylindrical rigid body
rotating in an incompressible viscous fluid. Journal of Dynamic Systems, Measurement, and Control,
137(2):021005, 2015.
[5] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the bicycle wheel and rotating stool system. https://youtu.be/og5h4QoqIFs.
17
[6] Andy
bikes,
Ruina.
arrows,
Dynamic
and
walking
muscle-smarts:
2010:
Cats,
astronauts,
Stability,
translation,
and
trucks,
rotation.
http://techtv.mit.edu/collections/locomotion:1216/videos/8007-dynamic-walking-2010-andyruina-cats-astronauts-trucks-bikes-arrows-and-muscle-smarts-stability-trans, 2010.
[7] Dong Eui Chang and Soo Jeon. Video of an experiment that demonstrates the self-recovery phenomenon in the vessel and fluid system. https://youtu.be/26qGQccK4Rc.
[8] L. D. Landau and E. M. Lifshitz. Fluid Mechanics, volume 6. 1959.
[9] Stanley J Farlow. Partial differential equations for scientists and engineers. Courier Corporation,
1993.
[10] Milton Abramowitz and Irene A Stegun. Handbook of mathematical functions: with formulas, graphs,
and mathematical tables, volume 55. Courier Corporation, 1964.
[11] S.H. Strogatz. Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry,
and Engineering. Advanced book program. Avalon Publishing, 1994.
Appendix A
Validation of effective damping constant
With the computed, effective damping constant kef f (18) of the infinite-dimensional fluid system (4),
we find the angle at which boundedness is attained, given by
φ∗s =
−Iw vw (Ro − Ri )
2πρνRo Ri2
(33)
We now present some numerical experiments by solving the PDE-system (4) using the method of
lines. Equation (18) is then verified by comparing the numerical values obtained using formula (33)
and the numerical solutions of the original PDE. It is observed that the error tends to zero as Ro /Ri
approaches 1, independent of the value of Ri . The material constants used for the simulation, and for
the theoretical calculation are tabulated below
18
Ri (cm)
Ro (cm)
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.5
13.51
13.68
13.75
14
14.5
15
15.5
20
27
27
27
27
27
27
27
27
27
27
27.02
27.36
27.5
28
29
30
31
40
54
0.07
1.33
1.85
3.70
7.41
11.11
14.81
48.15
100
With the PDE
Angle (rad)
6.16
108.7
149.8
291.7
553.8
790.3
1004
2265
3123
With kef f
Angle (rad)
6.16
109.5
151.3
297.1
573.7
831.9
1073
2704
4160
0.07
1.33
1.85
3.70
7.41
11.11
14.81
48.15
100
1.54
27.19
37.47
72.96
138.5
197.6
251.1
566.3
780.8
1.54
27.37
37.81
74.28
143.4
208
268.4
675.9
1039.9
(Ro −Ri )
Ri
× 100
% Error
0.00
0.74
1.00
1.85
3.59
5.26
6.87
19.38
33.21
0.00
0.66
0.91
1.81
3.54
5.26
6.89
19.35
33.18
Table 2: A comparison of the angles at which boundedness occurs, i.e., between the numerical simulations
and the theoretically derived formula (33), for different values of (Ro − Ri )/Ri .
Name
Moment of Inertia of Wheel
Moment of Inertia of Stool
Kinematic Viscosity of Fluid
Density of Fluid
Steady State Velocity of Wheel
Proportional Control Parameter
Derivative Control Parameter
Value
6 × 10−3
1.96
1.17 × 10−6
1.0147 × 103
60π
1
100
Units
kg/m2
kg/m2
m2 /s
kg/m3
rad/s
-
Table 3: Parameter constants used for the simulations.
19
| 3 |
Rate-Splitting for Multi-Antenna Non-Orthogonal
Unicast and Multicast Transmission
Yijie Mao∗ , Bruno Clerckx† and Victor O.K. Li∗
∗
arXiv:1802.05567v2 [cs.IT] 16 Feb 2018
The University of Hong Kong, Hong Kong, China
†
Imperial College London, United Kingdom
∗
Email: {maoyijie, vli}@eee.hku.hk, † [email protected]
Abstract—In a superimposed unicast and multicast transmission system, one layer of Successive Interference Cancellation
(SIC) is required at each receiver to remove the multicast stream
before decoding the unicast stream. In this paper, we show that a
linearly-precoded Rate-Splitting (RS) strategy at the transmitter
can efficiently exploit this existing SIC receiver architecture. By
splitting the unicast message into common and private parts and
encoding the common parts along with the multicast message into
a super-common stream decoded by all users, the SIC is used for
the dual purpose of separating the unicast and multicast streams
as well as better managing the multi-user interference between
the unicast streams. The precoders are designed with the objective
of maximizing the Weighted Sum Rate (WSR) of the unicast
messages subject to a Quality of Service (QoS) requirement of the
multicast message and a sum power constraint. Numerical results
show that RS outperforms existing Multi-User Linear-Precoding
(MU–LP) and power-domain Non-Orthogonal Multiple Access
(NOMA) in a wide range of user deployments (with a diversity
of channel directions and channel strengths). Moreover, since one
layer of SIC is required to separate the unicast and multicast
streams, the performance gain of RS comes without any increase
in the receiver complexity compared with MU–LP. Hence, in such
non-orthogonal unicast and multicast transmissions, RS provides
rate and QoS enhancements at no extra cost for the receivers.
Index Terms—non-orthogonal multicast and unicast transmission, rate-splitting, rate region, WMMSE algorithm
I. I NTRODUCTION
The scarcity of radio resources and the heterogeneity of wireless applications in 5G and beyond motivate recent research
on the non-orthogonal unicast and multicast transmission [1]–
[4], which is based on Layered Division Multiplexing (LDM)
in the literature of digital television systems [5]. The unicast
and multicast messages are precoded and superimposed at the
transmitter and then broadcast to the receivers in the same timefrequency resources. Each receiver decodes and removes the
multicast message using Successive Interference Cancellation
(SIC) before decoding its intended unicast message. Joint
unicast and multicast beamforming of multi-cell cooperative
transmission has been studied, e.g., for transmit power minimization [1], [2], Weighted Sum Rate (WSR) maximization
[3] and energy efficiency maximization [4]. However, all of the
above works consider the use of Multi-User Linear Precoding
(MU–LP) beamforming for the unicast messages. Once the
common message is successfully decoded and subtracted from
the received signal, each receiver fully decodes its intended
unicast message by treating the interference as noise. However,
MU–LP is sensitive to the user channel orthogonality and
strengths. Another method is to apply power-domain Nonorthogonal Multiple Access (NOMA) to decode the unicast
This work is partially supported by the U.K. Engineering and Physical
Sciences Research Council (EPSRC) under grant EP/N015312/1.
messages at the cost of more layers of SICs. Power-domain
NOMA relies on Superposition Coding (SC) at the transmitter
and SIC at the receivers [6]. It is denoted in short as SC–SIC
in this work. By using SC–SIC, some users are forced to fully
decode and cancel interference created by other users. Such
method is only suitable when the user channels are (semi-)
aligned and exhibit a large disparity of strengths.
In contrast to MU–LP and SC–SIC, linearly-precoded RateSplitting (RS) is an emerging multi-user multi-antenna transmission strategy where each unicast message is split into a
common part and a private part at the transmitter [7]. The
common part is required to be decoded by all the receivers
and removed from the received signal using SIC before each
receiver decodes its intended private part by treating the interference from other users as noise. RS can be viewed mathematically as a non-orthogonal unicast and multicast transmission
strategy given the superimposed transmission of common and
private messages. Hence, RS was termed joint multicasting
and broadcasting in [8]. However, common message in RS
has an objective different from that of a conventional multicast
message. The multicast message is intended and decoded by all
the users while the common message of RS is decoded by all
users but is intended to a subset of users. Its presence enables
the decoding of part of the multi-user interference and treating
the remaining part of the interference as noise.
In this work, motivated by the benefits of RS in multiantenna Broadcast Channels (BC) [7], [9], [10], we propose
the use of RS in non-orthogonal unicast and multicast transmissions. To the best of our knowledge, this is the first
work that applies RS to non-orthogonal unicast and multicast
transmissions. In such a setup, we split the unicast messages
into common and private parts and encode the common parts
along with the multicast message into a super-common stream
decoded by all users. A single layer of SIC in RS is then used
for the dual purpose of separating the unicast and multicast
streams as well as better managing the multi-user interference
of the unicast streams. We design the precoders by formulating
the WSR maximization problem of the unicast messages with a
Quality of Service (QoS) requirement of the multicast message
and a sum power constraint. The problem is transformed into an
equivalent Weighted Minimum Mean Square Error (WMMSE)
problem and solved using an Alternating Optimization (AO)
algorithm. We demonstrate in the numerical results that the
rate region of RS is always equal to or larger than that of MU–
LP and SC–SIC. Importantly, this performance gain comes at
no additional cost for the receivers since one layer of SIC
is required to separate unicast and multicast streams in the
conventional MU–LP strategy. In other words, RS makes a
better use of the existing SIC architecture.
The rest of the paper is organized as follows. In Section
II, the existing MU–LP beamforming is overviewed. The
proposed RS beamforming and the optimization framework are
respectively specified in Section III and Section IV. Section V
illustrates numerical results and Section VI concludes the paper.
Notations: C and E{·} respectively refer to the complex
space and the statistical expectation. The boldface uppercase
and lowercase letters represent matrices and vectors, respectively. k·k is the Euclidean norm. The superscripts (·)T and
(·)H correspond to transpose and conjugate-transpose operators. tr(·) and diag(·) are the trace and diagonal entries.
II. E XISTING MU–LP B EAMFORMING
In this work, we consider a BS equipped with Nt antennas
serving K single-antenna users. The users are indexed by
the set K = {1, . . . , K}. In each time frame, the BS wants
to transmit a multicast message W0 intended for all users
and K unicast messages W1 , . . . , WK intended for different users. The messages W0 , W1 , . . . , WK are independently
encoded into data streams s0 , s1 , . . . , sK . The stream vector
s = [s0 , s1 , . . . , sK ]T is precoded using the precoder P =
[p0 , p1 , . . . , pK ], where p0 ∈ CNt ×1 and pk ∈ CNt ×1 are the
respective precoders of the multicast stream s0 and the unicast
stream sk , ∀k ∈ K. Assuming that E{ssH } = I, the transmit
power is constrained by tr(PPH ) ≤ Pt . The resulting transmit
signal x ∈ CNt ×1 is given by
X
x = Ps = p0 s0 +
pk s k .
(1)
k∈K
The signal received at user-k is yk = hH
k x + nk , where
hk ∈ CNt ×1 is the channel between the BS and user-k. nk ∼
2
CN (0, σn,k
) is the Additive White Gaussian Noise (AWGN)
at user-k. Without loss of generality, we assume the noise
variances are equal to one. The transmit SNR is equal to the
total power consumption Pt . We assume perfect Channel State
Information at the Transmitter (CSIT) and perfect Channel
State Information at the Receivers (CSIR).
At user sides, each user first decodes the multicast stream by
treating the signal of all the unicast streams as interference. The
Signal-to-Interference-plus-Noise Ratio (SINR) of the multicast
2
2 P
H
+ 1).
stream at user-k is γk,0 = hH
k p0 /( j∈K hk pj
Once s0 is successfully decoded, its contribution to the original
received signal yk is subtracted. After that, user-k decodes
its unicast stream sk by treating the unicast streams of other
users as noise. The SINR of decoding the unicast stream sk
2
2 P
H
at user-k is γk = hH
+ 1). The
k pk /( j∈K,j6=k hk pj
corresponding achievable rates of s0 and sk at user-k are
Rk,0 = log2 (1 + γk,0 ) and Rk = log2 (1 + γk ) .
(2)
To ensure that s0 is successfully decoded by all users, the
achievable rate of s0 shall not exceed
R0 = min {R1,0 , . . . , RK,0 } .
(3)
In this work, we maximize the WSR of the unicast messages
while the rate constraint of the multicast message and the power
constraint of the BS should be met. For a given weight vector
u = [u1 , . . . , uK ], the WSR achieved by the unicast messages
Fig. 1: K-user RS assisted multi-antenna non-orthogonal unicast and multicast transmission model
in the K-user MU–LP assisted multi-antenna non-orthogonal
unicast and multicast is
X
uk Rk
(4a)
RMU−LP (u) = max
P
k∈K
s.t. Rk,0 ≥ R0th , ∀k ∈ K
(4b)
H
(4c)
tr(PP ) ≤ Pt
where R0th is the lower bound on the multicast rate.
III. P ROPOSED R ATE - SPLITTING B EAMFORMING
In this section, we introduce the use of RS to the system. We
highlight the difference between the proposed RS beamforming
and the existing MU–LP beamforming. The contents that are
not specified remain consistent with Section II.
The main difference between MU–LP and RS beamforming
lies in the generation of the data streams. Different from MU–
LP beamforming where the messages are directly encoded
into independent streams, the unicast message Wk intended
for user-k is split into a common part Wk,c and a private
part Wk,p , ∀k ∈ K. The common parts of the unicast messages W1,c , . . . , WK,c are encoded along with the multicast
message W0 into a super-common stream s0 . It is required
to be decoded by all users. Note that s0 includes not only
the whole multicast message, but parts of the unicast messages intended for different users. The private parts of the
unicast streams W1,p , . . . , WK,p are independently encoded
into the private streams s1 , . . . , sK . The stream vector s =
[s0 , s1 , . . . , sK ]T are linear precoded via the precoder matrix
P = [p0 , p1 , . . . , pK ] and broadcast to users. The system
model is illustrated in Fig. 1.
At user sides, the super-common stream and private streams
are decoded using SIC as in MU–LP. The achievable rate of the
super-common stream Rk,0 and the private stream Rk , ∀k ∈ K
are calculated based on equation (2). To ensure that the supercommon stream s0 is successfully decoded by all users, the
achievable super-common rate R0 is calculated by equation
(3). R0 is shared by the rate of transmitting the multicast
message W0 and the rates of transmitting the common parts of
the unicast messages of all users, W1,c , . . . , WK,c . Denote C0
as the portion of R0 transmitting W0 and Ck,0 as the user-k’s
portion of R0 transmitting Wk,c , the achievable super-common
rate is equal to
X
C0 +
Ck,0 = R0
(5)
k∈K
Following the RS structure described above, the total achievable rate of the unicast message of user-k is Rk,tot = Ck,0 +
Rk . For a given weight vector u, the WSR achieved by the
private messages in the K-user RS assisted multi-antenna nonorthogonal unicast and multicast is
RRS (u) = max
P,c
s.t.
C0 +
X
uk Rk,tot
(6a)
k∈K
X
Ck,0 ≤ Rk,0 , ∀k ∈ K
(6b)
k∈K
C0 ≥ R0th
(6c)
Ck,0 ≥ 0, ∀k ∈ K
(6d)
tr(PPH ) ≤ Pt
(6e)
where c = [C0 , C1,0 , . . . , CK,0 ] is the common rate vector.
We note that problem (6) boils down to problem (4) when no
power is allocated to the common messages W1,c , . . . , WK,c .
Hence, RS always achieves the same or superior performance
to MU–LP.
In the unicast-only transmission, RS requires one layer of
SIC to decode the common parts of the unicast messages
for the purpose of enabling the capability of decoding part
of the multi-user interference and treating part of the multiuser interference as noise [7], [9], [10]. In comparison, MU–
LP does not require any SIC at each receiver in the unicastonly transmission. However, one-layer of SIC is necessary at
each user to decode the multicast stream before decoding the
intended unicast stream in the MU–LP assisted joint unicast
and multicast transmission and RS still requires one layer of
SIC at no extra cost for the receivers. The SIC of RS in the
joint unicast and multicast transmission is used for separating
the unicast and multicast streams as well as better managing
the multi-user interference between the unicast streams.
to γk,0 = 1/εMMSE
− 1 and γk = 1/εMMSE
− 1 based on
k,0
k
(9). The rates become Rk,0 = − log2 (εMMSE
k,0 ) and Rk =
− log2 (εMMSE
).
The
WMSEs
are
given
by
k
ξk,0 = uk,0 εk,0 − log2 (uk,0 ), ξk = uk εk − log2 (uk ),
where uk,0 and uk are weights associated with the MSEs of
∗
MMSE
and gk∗ = gkMMSE
user-k. The optimum equalizers gk,0
= gk,0
∂ξk,0
∂ξk
are then derived by solving ∂gk,0 = 0 and ∂g
= 0.
k
MMSE
Substituting gk,0
and gkMMSE into (10), we have
MMSE
= uk,0 εMMSE
− log2 (uk,0 ),
ξk,0 gk,0
k,0
(11)
MMSE
MMSE
ξk gk
= u k εk
− log2 (uk ).
The optimum MMSE weights are obtained by solving
MMSE
MMSE
∂ξk (gk
∂ξk,0 (gk,0
)
)
= 0 and
= 0, which are given by
∂uk,0
∂uk
−1
u∗k,0 = uMMSE
, (εMMSE
, u∗k = uMMSE
, (εMMSE
)−1 (12)
k,0
k,0 )
k
k
The Rate-WMMSE relationships are finally established by
substituting (12) into (11). They are given by
MMSE
,
ξk,0
(7)
εk = |gk |2 Tk − 2ℜ{gk hH
k pk } + 1,
P
H
2
2
where Tk,0 , |hH
k p0 | +
j∈K |hk pj | + 1 and Tk , Tk,0 −
2
H
|hk p0 | . The optimum MMSE equalizers are then calculated
∂ε
∂εk
by solving ∂gk,0
= 0 and ∂g
= 0, which are given by
k,0
k
−1
−1
MMSE
MMSE
gk,0
= pH
= pH
0 hk Tk,0 , gk
k hk T k .
(8)
Substituting (8) into (7), the MMSEs are
−1
εMMSE
, min εk,0 = Tk,0
Ik,0 , εMMSE
, min εk = Tk−1 Ik ,
k,0
k
gk,0
gk
(9)
2
where Ik,0 = Tk and Ik = Tk − |hH
p
|
.
The
SINRs
of
k
k
decoding s0 and sk at user-k can be respectively transformed
(13)
uk ,gk
Based on the Rate-WMMSE relationships in (13), the optimization problem (6) is transformed equivalently into the
WMMSE problem given by
X
min
uk ξk,tot
(14a)
P,x,u,g
εk,0 = |gk,0 |2 Tk,0 − 2ℜ{gk,0 hH
k p0 } + 1,
min ξk,0 = 1 − Rk,0 ,
uk,0 ,gk,0
ξkMMSE , min ξk = 1 − Rk .
IV. O PTIMIZATION F RAMEWORK
The WMMSE algorithm to solve the sum rate maximization
problem in RS without a multicast message is proposed in
[9]. It is extended to solve the problem (4) and (6). We firstly
explain the procedure to solve the RS problem (6) and then
specify how (4) can be solved correspondingly.
User-k decodes s0 and sk sequentially using SICs. The
common stream s0 is decoded first. By using the equalizer
gk,0 , s0 is estimated as ŝ0 = gk,0 yk . sk is estimated using the
equalizer gk as ŝk = gk (yk − hH
k p0 s0 ) after s0 is successfully
decoded and removed from yk . The Mean Square Errors
(MSEs) of the common and private streams are defined as
εk,0 , E{|ŝk,0 − sk,0 |2 } and εk , E{|ŝk − sk |2 }, respectively.
They are given by
(10)
s.t.
X0 +
k∈K
X
Xk,0 + 1 ≥ ξk,0 , ∀k ∈ K
(14b)
k∈K
X0 ≤ −R0th
(14c)
Xk,0 ≤ 0, ∀k ∈ K
(14d)
H
tr(PP ) ≤ Pt
(14e)
where x = [X0 , X1,0 , . . . , XK,0 ] is the transformation of
the common rate c. u = [u1,0 , . . . , uK,0 , u1 , . . . , uK ] and
g = [g1,0 , . . . , gK,0 , g1 , . . . , gK ] are the weights and equalizers,
respectively. ξk,tot = Xk,0 + ξk , ∀k ∈ K.
Denote uMMSE and gMMSE as two vectors formed by the
corresponding MMSE equalizers and weights. According to
the KKT conditions of problem (14), it is easy to show that
(uMMSE , gMMSE ) are optimal and unique. We can obtain
(uMMSE , gMMSE ) by minimizing (14a) with respect to u and
g, respectively. Problem (14) can be transformed to problem
(6) based on the Rate-WMMSE relationship (13) and the
common rate transformation c = −x. The solution given by
(c∗ = −x∗ , P∗ ) meets the KKT optimality conditions of (6)
for any point (x∗ , P∗ , u∗ , g∗ ) satisfying the KKT optimality
conditions of (14). Therefore, problem (6) and problem (14)
are equivalent.
The joint optimization of (x, P, u, g) in problem (14) is nonconvex. With fixed (x, P, u), the MMSE equalizer gMMSE is
optimal. With fixed (x, P, g), the MMSE weight uMMSE is the
optimal weight. With fixed (u, g), the optimization problem
(14) is a convex Quadratically Constrained Quadratic Program
(QCQP) which can be solved using interior-point methods.
1
2
3
4
5
6
7
Initialize: n ← 0, P[n] , WSR[n] ;
repeat
n ← n + 1;
P[n−1] ← P;
u ← uMMSE (Pn−1 ); g ← gMMSE (Pn−1 );
update (x, P) by solving (14) using the updated u, g;
until |WSR[n] − WSR[n−1] | ≤ ǫ;
V. N UMERICAL R ESULTS
In this section, the performance of the proposed RS beamforming is illustrated by comparing with the existing MU–LP
and SC–SIC beamforming. We focus on the two-user case since
different two-user rate regions are easily compared in a twodimensional figure.
The SC–SIC assisted joint unicast and multicast transmission
is briefed before we illustrate the results. Different from RS
where the multicast message is encoded with the common parts
of the unicast messages, the multicast message in SC–SIC is
encoded along with the unicast message to be decoded first into
a super-common stream s0 . Hence, the super-common rate R0
of SC–SIC is shared by the rate of the multicast message as
well as the rate of the unicast message to be decoded first. Following the system model of RS in Section III and the difference
between SC–SIC and RS, we can formulate the problem of
SC–SIC and solve it by modifying the optimization framework.
Note that the receiver complexity of SC–SIC increases with the
number of users. More layers of SICs are required at each user
to decode the interference from more users. Moreover, SC–
SIC is a particular instance of the proposed RS strategy when
K = 2 [10]. RS should always achieve the same or superior
performance to MU–LP and SC–SIC.
We investigate the influence of the multicast rate constraint,
channel strength disparity and channel angle between the users
on the performance. The BS is equipped with four antennas
(Nt = 4) serving two single-antenna users (K = 2). The
simulation setting follows the underloaded two-user deployment in [10]. The channels of users are realized as h1 =
(b) θ=2π/9
10
10
8
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
6
4
2
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
10
(d) θ=4π/9
10
8
8
R2,tot (bit/s/Hz)
10
6
4
RS
SC-SIC
MU-LP
2
5
R1,tot (bit/s/Hz)
(c) θ=π/3
R2,tot (bit/s/Hz)
Hence, the AO algorithm is motivated to solve the problem.
In the nth iteration, the equalizers and weights are
calculated
by (u, g) = uMMSE (P[n−1] ), gMMSE (P[n−1] ) based on
the precoder P[n−1] in the (n − 1)th iteration. (x, P) are
then calculated by solving problem (14). (u, g) and (x, P)
are iteratively updated until the convergence of the WSR.
Algorithm 1 shows the steps of AO, where ǫ is the error
tolerance for convergence and WSR[n] is the WSR calculated
based on the updated (x, P) in nth iteration. Since WSR[n] is
increasing with n and it is bounded above for a given power
constraint, the AO algorithm is guaranteed to converge. Note
that the global optimality of the solution cannot be guaranteed
in general as the problem is non-convex. The initialization of
the precoder P will influence the final results.
The optimization framework described above are adopted
to solve the MU–LP problem (4) by reformulating it into its
equivalent WMMSE problem and using the AO algorithm to
solve it.
Algorithm 1: Alternating Optimization Algorithm
6
4
2
0
0
0
5
R1,tot (bit/s/Hz)
10
0
5
10
R1,tot (bit/s/Hz)
Fig. 2: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 1, R0th = 0.5 bit/s/Hz
H
H
[1, 1, 1, 1] , h2 = γ × 1, ejθ , ej2θ , ej3θ . In the following
results, γ = 1 and γ = 0.3, which respectively represent equal
channel strength and 5 dB channel strength
difference.
For each
π 4π
γ, we consider four different θ, θ ∈ π9 , 2π
,
,
9 3 9 . When
θ is less than π9 , the user channels are sufficiently aligned.
When θ is larger than 4π
9 , the user channels are sufficiently
orthogonal. The rate region is the set of all achievable points.
Its boundary is calculated by varying the weights assigned
to users. We follow the weights in [11], where the weight
of user-1 is fixed to u1 = 1 for each weight of user-2 in
u2 ∈ 10[−3,−1,−0.95,··· ,0.95,1,3] . The precoders of RS, MU–
LP and SC–SIC are initialized using the same methods as
discussed in [10]. SNR is fixed to 20 dB.
Fig. 2 shows the results when user-1 and user-2 have equal
channel strengths (γ = 1) and the multicast rate constraint
is R0th = 0.5 bit/s/Hz. In each subfigure, the rate region
achieved by RS is confirmed to be equal to or larger than
that of SC–SIC and MU–LP. RS performs well for any angle
between the user channels. As the SC–SIC strategy is motivated
by leveraging the channel strength difference of users, it is
sensitive to the channel strength disparity. When users have
equal channel strengths, SC–SIC has poor performance. RS
exhibits a clear rate region improvement over SC–SIC and
MU–LP when θ = π9 . The performance of MU–LP is poor
when the user channels are closely aligned to each other. MU–
LP is sensitive to the channel angle. As θ increases, the gap
between the rate regions of RS and MU–LP decreases. When
θ = 4π
9 , RS reduces to MU–LP.
Fig. 3 shows the results when γ = 1, R0th = 1.5 bit/s/Hz.
Comparing the corresponding subfigures of Fig. 2 and Fig.
3, the rate regions of all the strategies increase as the rate
threshold of the multicast message decreases. Moreover, the
rate region gain of RS over MU–LP and SC–SIC increases as
the rate threshold of the multicast message decreases. This is
due to the fact the super-common stream can absorb a larger
portion of the unicast messages as the rate of the multicast
message decreases. RS is able to overcome the limitations of
MU–LP and SC–SIC by dynamically determining the level of
the multi-user interference to decode and treat as noise. When
(b) θ=2π/9
10
8
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
10
6
4
2
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
(c) θ=π/3
10
(d) θ=4π/9
10
10
RS
SC-SIC
MU-LP
8
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
5
R1,tot (bit/s/Hz)
6
4
2
8
6
4
2
0
0
0
5
10
0
R1,tot (bit/s/Hz)
5
10
R1,tot (bit/s/Hz)
Fig. 3: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 1, R0th = 1.5 bit/s/Hz
(b) θ=2π/9
6
5
5
R2,tot (bit/s/Hz)
R2,tot (bit/s/Hz)
(a) θ=π/9
6
4
3
2
1
4
3
2
1
0
0
0
5
10
0
R1,tot (bit/s/Hz)
10
R1,tot (bit/s/Hz)
(c) θ=π/3
R EFERENCES
(d) θ=4π/9
6
6
5
R2,tot (bit/s/Hz)
5
R2,tot (bit/s/Hz)
5
4
3
2
RS
SC-SIC
MU-LP
1
4
3
2
1
0
0
0
5
R1,tot (bit/s/Hz)
VI. C ONCLUSIONS
To conclude, we exploit the benefit of the linearly-precoded
RS in the joint unicast and multicast transmission systems.
Comparing with the conventional MU–LP assisted unicast
and multicast transmission system where one layer of SIC is
required at each receiver to remove the multicast stream before
decoding the unicast stream, the proposed RS-assisted unicast
and multicast transmission system further exploits the merits
of the existing one layer of SIC. By utilizing a super-common
stream to encapsulate the multicast message and parts of the
unicast messages, RS uses one layer of SIC to not only separate
the unicast and multicast streams but also dynamically manage
the multi-user interference. We show in the numerical results
that the performance of MU–LP and SC–SIC is more sensitive
to the channel strength disparity and channel angles among
users. Thanks to its ability of partially decoding the interference
and partially treating the interference as noise, RS softly
bridges and outperforms MU–LP and SC–SIC in any user
deployments. Moreover, the performance gain of RS increases
as the rate threshold of the multicast message decreases. The
benefit of RS is obtained without any increase in the receiver
complexity compared with MU–LP. Therefore, RS is a more
powerful transmission scheme for downlink multi-antenna nonorthogonal unicast and multicast transmission systems.
10
0
5
10
R1,tot (bit/s/Hz)
Fig. 4: Achievable rate region comparison of different strategies
in perfect CSIT, γ = 0.3, R0th = 0.5 bit/s/Hz
the rate threshold of the multicast message decreases, more
power is allocated to the unicast stream. RS exhibits further
benefits of dynamic interference management.
Fig. 4 shows the results when γ = 0.3, R0th = 0.5 bit/s/Hz.
Comparing with the corresponding subfigures of Fig. 2, the
rate region of SC–SIC is closer to that of RS when there is
a 5 dB channel strength difference. However, the rate region
gap between RS and SC–SIC increases with θ despite the 5
dB channel strength difference. Comparing with RS, SC–SIC
is more sensitive to the angle between the user channels. In
Fig. 4(b), SC–SIC and MU–LP outperform each other at one
part of the rate region and the rate region of RS is larger than
the convex hull of the rate regions of SC–SIC and MU–LP. We
can easily draw the conclusion from Fig. 4(b) that RS softly
bridges and outperforms MU–LP and SC–SIC. Comparing with
MU–LP and SC–SIC, RS is more robust to a wide range of
channel gain difference and channel angles among users. RS
always outperforms MU–LP and SC–SIC. This performance
gain comes at no additional cost for the receivers since one
layer of SIC is required to separate unicast and multicast
streams in the conventional MU–LP strategy.
[1] J. Zhao, O. Simeone, D. Gunduz, and D. Gomez-Barquero, “Nonorthogonal unicast and broadcast transmission via joint beamforming
and LDM in cellular networks,” in 2016 IEEE Global Communications
Conference (GLOBECOM), Dec 2016, pp. 1–6.
[2] Y. F. Liu, C. Lu, M. Tao, and J. Wu, “Joint multicast and unicast
beamforming for the MISO downlink interference channel,” in 2017 IEEE
18th International Workshop on Signal Processing Advances in Wireless
Communications (SPAWC), July 2017, pp. 1–5.
[3] E. Chen, M. Tao, and Y.-F. Liu, “Joint base station clustering and
beamforming for non-orthogonal multicast and unicast transmission with
backhaul constraints,” arXiv preprint arXiv:1712.01508, 2017.
[4] O. Tervo, L.-N. Tran, S. Chatzinotas, M. Juntti, and B. Ottersten,
“Energy-efficient joint unicast and multicast beamforming with multiantenna user terminals,” arXiv preprint arXiv:1705.03723, 2017.
[5] L. Zhang, W. Li, Y. Wu, X. Wang, S. I. Park, H. M. Kim, J. Y. Lee,
P. Angueira, and J. Montalban, “Layered-division-multiplexing: Theory
and practice,” IEEE Transactions on Broadcasting, vol. 62, no. 1, pp.
216–232, March 2016.
[6] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and
K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future
radio access,” in 2013 IEEE 77th Vehicular Technology Conference (VTC
Spring), June 2013, pp. 1–5.
[7] B. Clerckx, H. Joudeh, C. Hao, M. Dai, and B. Rassouli, “Rate splitting
for MIMO wireless networks: A promising PHY-layer strategy for LTE
evolution,” IEEE Communications Magazine, vol. 54, no. 5, pp. 98–105,
May 2016.
[8] H. Joudeh and B. Clerckx, “Sum rate maximization for MU-MISO
with partial CSIT using joint multicasting and broadcasting,” in 2015
IEEE International Conference on Communications (ICC), June 2015,
pp. 4733–4738.
[9] ——, “Sum-rate maximization for linearly precoded downlink multiuser
MISO systems with partial CSIT: A rate-splitting approach,” IEEE
Transactions on Communications, vol. 64, no. 11, pp. 4847–4861, Nov
2016.
[10] Y. Mao, B. Clerckx, and V. O. K. Li, “Rate-splitting multiple access
for downlink communication systems: Bridging, generalizing and outperforming SDMA and NOMA,” arXiv preprint arXiv:1710.11018v3, 2017.
[11] S. S. Christensen, R. Agarwal, E. D. Carvalho, and J. M. Cioffi,
“Weighted sum-rate maximization using weighted MMSE for MIMO-BC
beamforming design,” IEEE Transactions on Wireless Communications,
vol. 7, no. 12, pp. 4792–4799, Dec 2008.
| 7 |
On a measurable analogue of small topological full
groups
François Le Maître
arXiv:1608.07399v1 [math.DS] 26 Aug 2016
August 29, 2016
Abstract
We initiate the study of a measurable analogue of small topological full
groups that we call L1 full groups. These groups are endowed with a Polish group topology which admits a natural complete right invariant metric.
We mostly focus on L1 full groups of measure-preserving Z-actions which are
actually a complete invariant of flip conjugacy.
We prove that for ergodic actions the closure of the derived group is topologically simple although it can fail to be simple. We also show that the closure
of the derived group is connected, and that for measure-preserving free actions
of non-amenable groups the closure of the derived group and the L1 full group
itself are never amenable.
In the case of a measure-preserving ergodic Z-action, the closure of the
derived group is shown to be the kernel of the index map. If such an action is moreover by homeomorphism on the Cantor space, we show that the
topological full group is dense in the L1 full group. Using Juschenko-Monod
and Matui’s results on topological full groups, we conclude that L1 full groups
of ergodic Z-actions are amenable as topological groups, and that they are
topologically finitely generated if and only if the Z-action has finite entropy.
Contents
1 Introduction
1.1 L1 full groups of measure-preserving transformations . . . . . . . . .
1.2 Some topological properties of L1 full groups . . . . . . . . . . . . . .
1.3 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
2
4
7
2 Preliminaries
8
2.1 Basic ergodic theory . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Graphings, equivalence relations and full groups . . . . . . . . . . . . 10
2.3 Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3 L1 full groups of graphings
14
3.1 Definition and first properties . . . . . . . . . . . . . . . . . . . . . . 14
3.2 The closure of the derived group is topologically generated by involutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1
3.3
3.4
3.5
Dye’s reconstruction theorem . . . . . . . . . . . . . . . . . . . . . . 22
Closed normal subgroups of the closure of the derived group . . . . . 23
Link with topological full groups . . . . . . . . . . . . . . . . . . . . . 27
4 L1 full groups of Z-actions
4.1 The index map . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 A characterization of supports of n-cycles . . . . . . . . . . . . . . .
4.3 The L1 full group is generated by induced transformations along with
periodic transformations . . . . . . . . . . . . . . . . . . . . . . . .
4.4 Escape time and non-simplicity results . . . . . . . . . . . . . . . .
4.5 Density of topological full groups, amenability and finiteness of the
topological rank . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5 Further remarks and questions
5.1 Non-amenability . . . . . . . . . . .
5.2 Absence of a natural closure property
5.3 Lp full groups . . . . . . . . . . . . .
5.4 Questions . . . . . . . . . . . . . . .
1
1.1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
. 30
. 32
. 33
. 36
. 39
.
.
.
.
41
41
41
43
44
Introduction
L1 full groups of measure-preserving transformations
The study of (invertible) measure preserving transformations on standard probability spaces has a long and rich history stemming from its connections with various
fields such as statistical mechanics, information theory, Riemannian geometry or
number theory. Over the years, various invariants have been introduced in order
to classify such transformations, although a result of Foreman, Rudolph and Weiss
shows that such a classification cannot “reasonably” be obtained for all measurepreserving transformations [FRW11].
The most well-behaved measure-preserving transformations are probably the
compact ones, i.e. those which arise as translation by a topological generator
in a compact abelian group (for instance, an irrational rotation is a compact transformation). Indeed, ergodic compact transformations are completely classified up to
conjugacy by the countable subgroup of the circle S1 consisting of all the eigenvalues
of the associated Koopman unitary (for an irrational rotation this is just the group
generated by its angle). To be more precise, a theorem of Halmos and von Neumann states that two such transformations T and T 0 of a standard probability space
(X, µ) are conjugate iff spec(T ) = spec(T 0 ) where spec(T ) is the group consisting of
all the λ ∈ S1 such that there is a non-null f ∈ L2 (X, µ) satisfying f ◦ T = λf . So
an ergodic compact transformation T is entirely described by the countable group
spec(T ).
The purpose of this paper is to initiate the study of a Polish group [T ]1 called
the L1 full group which one can associate to a measure-preserving transformation T .
Its main feature resembles that of the spectrum of compact transformations: two
2
ergodic measure-preserving transformations T and T 0 are flip-conjugate1 and if and
only if [T ]1 is abstractly (or topologically) isomorphic to [T 0 ]1 .
The idea for this group comes from full groups, which were defined by Dye as
subgroups of the group Aut(X, µ) of measure-preserving transformations of a standard probability space (X, µ) satisfying a strong closure property. The most basic
example of a full group is the full group of a measure-preserving invertible aperiodic
transformation T , which consists in all the measure-preserving transformations U
such that for almost all x ∈ X, there exists n ∈ Z such that U (x) = T n (x). This
full group is denoted by [T ] and every U ∈ [T ] is then completely described by the
cocycle map cU : X → Z defined by the equation
U (x) = T cU (x) (x).
Note that the full group [T ] only depends on the partition of the space into orbits
induced by T : it is an invariant of orbit equivalence. A theorem of Dye states
that all measure-preserving ergodic transformations are orbit equivalent [Dye59],
thus making the associated full group a trivial conjugacy invariant for such transformations. To obtain an interesting invariant, we will place an integrability restriction
on the cocycle maps.
Definition 1.1. The L1 full group of an aperiodic measure-preserving invertible
transformation T on a standard probability space (X, µ) is the group of all U ∈ [T ]
such that
Z
|cU (x)| dµ(x) < +∞.
X
The L1 full group is endowed with a natural metric given by the L1 metric
when viewing elements of [T ]1 as cocycle maps X → Z. Such a metric is actually
complete, separable and right-invariant (see Proposition 3.4) so that L1 full groups
are cli2 Polish groups.
Theorem 1.2 (see Thm. 4.2). Let T and T 0 be two measure-preserving ergodic
transformation of a standard probability space (X, µ). Then the following are equivalent:
(1) T and T 0 are flip-conjugate;
(2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic;
(3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic.
There are two results behind this theorem: the first is a reconstruction result à la
Dye which says that any isomorphisms between L1 full groups must be a conjugacy
by a measure-preserving transformation. The second is Belinskaya’s theorem [Bel68,
Cor. 3.7], which states that if two ergodic transformations share the same L1 full
group, then they must be flip-conjugate.
Two measure-preserving transformation T and T 0 are flip-conjugate if there is a measurepreserving transformation S such that T 0 = ST S −1 or T 0 = ST −1 S −1 .
2
A Polish group is cli if it admits a compatible left- (or equivalently right-) invariant metric
1
3
There are natural and well-studied analogues of full groups and L1 full groups in
the context of Cantor dynamics. Given a homeomorphism T of the Cantor space C,
its (topological) full group [T ]t is the group of all homeomorphisms U of the Cantor
space such that for all x ∈ C there is n ∈ N such that U (x) = T n (x). This full group
turns out to completely determine the partition of the Cantor space into orbits up
to a homeomorphisms. Such partitions are entirely described up to homeomorphism
in terms of the set of invariant measure: by a theorem of Giordano, Putnam and
Skau [GPS95], two minimal homeomorphisms T and T 0 of the Cantor space are orbit
equivalent if and only if there is a homeomorphism S such that S(MT ) = MT 0 where
MT denotes the set of T -invariant Borel probability measures. As in the measurable
case, an element of the topological full group of an aperiodic homeomorphism T
is completely described by the associated cocycle map cU : C → Z defined by
U (x) = T cU (x) (x).
The analogue of L1 full groups is sometimes called the small topological full
group and is also defined by putting a restriction on cocycles. Namely, given a
homeomorphism T of the Cantor space C, its small (topological) full group [T ]c
is the group of homeomorphisms U of the Cantor space whose cocycle map cU
is actually continuous. A result of Giordano-Putnam-Skau in complete analogy
with Theorem 1.2 states that when T is minimal, the flip conjugacy class of T is
completely determined by its small topological full group [T ]c (see [GPS99]). In the
end, L1 full groups can be seen as the missing piece in the following picture.
Topological setup
Measurable setup
Orbit equivalence
[T ]t = {U ∈ Homeo(C) :
∀x, U (x) = T cU (x) }
[T ] = {U ∈ Aut(X, µ) :
∀x, U (x) = T cU (x) }
Flip conjugacy
[T ]c = {U ∈ [T ]t :
cU is continuous}
[T ]1 = {U ∈ [T ] :
cU is integrable}
1.2
Some topological properties of L1 full groups
Theorem 1.2 implies that every ergodic theoretic property of a measure-preserving
transformation T should be reflected algebraically in the group [T ]1 . However since
the latter is an uncountable group, it is quite hard to find a purely group-theoretic
property allowing us to distinguish two L1 full groups. But as we already pointed
out, we also have at our disposal a Polish group topology, which provides richer tools
to study [T ]1 . Before we present our results, let us mention a fundamental tool for
the study of L1 full groups and topological full groups.
Given an aperiodic measure-preserving transformation, one defines the index
4
map I : [T ]1 → R by putting
Z
cU (x)dµ(x).
I(U ) =
X
If T is a minimal homeomorphism, we define the index map the same way picking
an invariant measure µ so as to view T as a measure-preserving transformation. The
resulting index map can be shown not to depend on the chosen invariant measure
[GPS99].
We can now give various descriptions of the closure of the derived group of the
1
L full group of an ergodic measure-preserving transformation.
Theorem 1.3 (see Cor. 4.20). Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal
to the following four groups:
• the kernel of the index map,
• the connected component of the identity,
• the group generated by periodic elements and
• the group topologically generated by involutions.
Since the index map actually takes values into Z we conclude from the first item
of the above theorem that the (topological) abelianization of the L1 full group of an
ergodic transformation is always equal to Z.
In the context of topological full groups of minimal homeomorphisms, it is also
true that the index map takes values into Z, but its kernel is often much larger than
the derived group. Nevertheless, Matui succesfully computed the abelianization of
[T ]c in K-theoretic terms and gave examples where this abelianisation is not even
finitely generated (see [Mat06]). So the situation for L1 full groups is much simpler
with respect to the (topological) abelianization.
An important feature of the derived group of the topological full group of a
minimal homeomorphism is that it is a simple group. The following result is a
natural analogue.
Theorem 1.4. Let T be a measure-preserving transformation. Then T is ergodic if
and only if D([T ]1 ) is topologically simple.
This result is actually true in a greater generality for L1 full groups of graphings
as defined by Levitt [Lev95], see section 3.4. We also prove that D([T ]1 ) is never
simple using the fact that there are many Borel sets whose escape time is not integrable (see section 4.4). Let us now seek finer invariants.
The topological rank of a separable topological group is the minimal number
of elements needed to generate a dense subgroup. The main result of this paper
is that the topological rank of the L1 full group of an ergodic measure-preserving
transformation T is related to the entropy of T .
Theorem 1.5. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent
5
(1) the L1 full group [T ]1 is topologically finitely generated;
(2) the closed subgroup D([T ])1 is topologically finitely generated;
(3) the transformation T has finite entropy.
A crucial tool in the previous theorem is Matui’s characterization of finitegeneratedness of topological full groups [Mat06, Thm. 5.4]. He proved that the
derived group of the topological full group of a minimal homeomorphism T is finitely
generated if and only if T is a subshift. He also characterised finite-generatedness of
the whole topological full group of T in terms of a strictly more restrictive condition.
In our context the situation is again simpler: Theorem 1.5 shows that for an ergodic
measure-preserving transformation T , the L1 full group of T is topologically finitely
generated if and only if the closure of its derived group is.
In order to use Matui’s aforementioned results so as to prove Theorem 1.5, we
establish the following important connection between L1 full groups and topological
full groups.
Theorem 1.6 (see Thm. 4.28). Let T be a minimal homeomorphism of the Cantor
space and let µ be an invariant measure. Then D([T ]c ) is dense in D([T ]1 ) and [T ]c
is dense in [T ]1 .
Our proof of Theorem 1.5 also relies on a deep theorem of Krieger which characterizes finite entropy transformations as those which can be realised as uniquely
ergodic minimal subshifts [Kri72]. It would be nice to have a purely ergodic-theoretic
proof of Theorem 1.5.
Theorem 1.6 has another interesting consequence. Recall that a topological
group is amenable if whenever it acts continuously on a compact space, the action
admits an invariant Borel probability measure. Juschenko and Monod have proven
that the topological full group of any minimal homeomorphism of the Cantor space
is amenable [JM13]. Using the Jewett-Krieger theorem we obtained the following
result.
Theorem 1.7. Let T be an ergodic measure-preserving transformation. Then the
L1 full group of T is amenable.
Note that since [T ]1 surjects onto Z via the index map, it is not extremely
amenable. However it would be intersting to understand wether the kernel of the
index map is extremely amenable. Let us now end extend these kind of questions
to the setup of measure-preserving actions of finitely generated groups.
Definition 1.8. Let Γ be a finitely generated group acting in a measure-preserving
manner on a standard probability space (X, µ). The full group of this action is
denoted by [Γ] and defined by
[Γ] = {T ∈ Aut(X, µ) : ∀x ∈ X, T (x) ∈ Γ · x}.
Let S be a finite generating set for Γ. Then every Γ-orbit is naturally equipped with
a Schreier graph metric dS , and we let the L1 full group of the Γ-action be the group
[Γ]1 of all T ∈ [Γ] such that the map x 7→ dS (x, T (x)) is integrable.
6
The definition of this group does not depend on the choice of a finite generating
set, and the L1 full group [Γ]1 has a natural Polish group topology. The following
result is a counterpart to Theorem 1.7.
Theorem 1.9 (see Thm. 5.1). Let Γ be a finitely generated non amenable group
acting freely in a measure-preserving manner on (X, µ). Then neither [Γ]1 nor
D([Γ]1 ) are amenable.
It would be interesting to understand which amenable finitely generated groups
admit measure-preserving free actions with an amenable L1 full group. It is also
natural to seek for generalizations of our results relating topological rank and entropy
in this context.
Finally, we should stress out that L1 full groups are not invariants of L1 orbit
equivalence but only of L∞ orbit equivalence (see Corollary 5.3). I do not know
wether they are complete invariants of L∞ orbit equivalence: if [Γ]1 = [Λ]1 , does it
follow that Γ and Λ are L∞ orbit equivalent?
1.3
Outline
This paper is organised as follows. Section 2 begins with some general facts from
ergodic theory. We then recall the definition of graphings, which provide a natural
setup for L1 full groups. The section ends with a few basic facts from entropy theory.
In section 3 we give the definition of the L1 full group of a graphing and establish
some basic properties such as stability under taking induced transformations. We
show that the closure of their derived group is topologically generated by involutions
and hence connected. We then establish that L1 full groups of ergodic graphings
satisfy a reconstruction theorem: any isomorphism between them arises as the conjugacy by a measure preserving transformation. We also use involutions to prove
that the only closed normal subgroups of the closure of their derived group are the
obvious ones when the graphing is aperiodic (Theorem 3.23). From this we conclude
that the graphing is ergodic if and only if the closure of the derived group of its L1
full group is topologically simple. Finally, we relate topological full groups to L1 full
groups in terms of density.
Section 4 contains the main results on L1 full groups of Z-actions. We first
prove Theorem 1.2 and then continue by defining the index map and studying its
behaviour with respect to induced transformations. We then study involutions more
closely by characterizing the Borel sets which arise as supports of involutions (and
more generally those which arise as supports of n-cycles). After that, we show that
the L1 full group of T ∈ Aut(X, µ) is generated by transformation induced by T
along with periodic transformations, using the work of Belinskaya. We then show
that D([T ]1 ) is never simple. Finally, we prove Theorem 1.7 and Theorem 1.5, using
the fact that the topological full group is dense in the L1 full group.
In section 5 we first prove Theorem 1.9. We then show that L1 full groups are
not stable under “L1 cutting and pasting”. After that we make a few observations
about Lp full groups which are defined analogously and we conclude with some more
questions.
7
2
2.1
Preliminaries
Basic ergodic theory
Let (X, µ) be a standard probability space, i.e. a standard Borel space equipped
with a Borel non-atomic probability measure µ. All such spaces are isomorphic to
the interval [0, 1] equipped with the Lebesgue measure, in particular they admit a
Borel linear order.
We will always work up to measure zero, e.g. for two Borel sets A and B if we
write A ⊆ B we mean µ(B \ A) = 0. For us a partition of a Borel set A ⊆ X will
be a countable family of disjoint Borel subsets of A whose reunion is equal to A up
to measure zero. Note that some of these sets may have measure zero or even be
empty.
A Borel bijection T : X → X is called a measure-preserving transformation
of (X, µ) if for all Borel A ⊆ X, one has µ(A) = µ(T −1 (A)). We denote by Aut(X, µ)
the group of all measure-preserving transformations, two such transformations being
identified if they coincide up to measure zero. An important fact to keep in mind is
that every Borel bijection between full measure Borel subsets of X which is measurepreserving can be seen as an element of Aut(X, µ): there is a measure-preserving
transformation T 0 of (X, µ) such that T (x) = T 0 (x) for almost all x ∈ X.
Definition 2.1. A measure-preserving transformation T is ergodic if every Borel
set which is a reunion of T -orbits has measure 0 or 1. It is aperiodic if all its orbits
are infinite.
A fundamental construction for us will be that of the induced transformation:
given T ∈ Aut(X, µ) and A ⊆ X of positive measure, the Poincaré recurrence
theorem ensures us that for almost all x ∈ A there are infinitely many n ∈ N∗ such
that T n (x). We let nA,T (x) denote the smallest such n, also called the return time
to A. When the transformation T we consider is clear from the context, we will
denote the return time simply by nA .
The transformation TA ∈ Aut(X, µ) induced by T on A by for all x ∈ X,
n
T A,T (x) if x ∈ A
TA (x) =
x
else.
It can easily be checked that TA is indeed a measure-preserving transformation, and
that moreover for all x ∈ A the TA -orbit of x is the intersection of the T -orbit of x
with A. Also note that (TA )−1 = (T −1 )A
The following lemma is a direct consequence of the fact that the orbits of the
restriction of TA to A are precisely the intersections of the T -orbits with A.
Lemma 2.2. Let S ∈ Aut(X, µ) be a measure-preserving transformation and A ⊆ X
intersects every S-orbit, then S is aperiodic if and only if SA is aperiodic when
restricted to A, and S is ergodic if and only if SA is ergodic when restricted to A.
Definition 2.3. An element T ∈ Aut(X, µ) is periodic if all its orbits are finite.
8
If T is periodic, the Borel set of minimums of T -orbits (for a fixed Borel total
order on X) intersects every T -orbit at exactly one point: it is a Borel fundamental
domain for T . Such fundamental domains actually exist if and only if T is periodic.
A nice way to build a new transformation from a periodic one is to compose it
with a transformation supported on a fundamental domain.
Lemma 2.4. Let T be a periodic measure-preserving transformation, and let A be a
fundamental domain of T . Let U be a measure-preserving transformation supported
on A. Then (U T )A = U = (T U )A .
Proof. Let x ∈ A, let n ∈ N∗ be the least positive integer such that T n (x) = x.
Since A is a fundamental domain for T , for all i ∈ {0, ..., n − 1} we have T i (x) 6∈ A.
Since U (y) = y for all y 6∈ A, we deduce by induction that (U T )i (x) = T i (x) 6∈ A for
all i ∈ {1, ..., n − 1}. In particular (U T )n−1 (x) = T n−1 (x) so (U T )n (x) = U T n (x) =
U (x) ∈ A, which proves that (U T )A = U as desired.
For the equality (T U )A = U , one can run a similar argument or apply the
previously obtained equality to T −1 and U −1 to get (U −1 T −1 )A = U −1 , which by
taking inverses yields (T U )A = U .
Proposition 2.5. Let T be a periodic measure-preserving transformation, and let
A be a fundamental domain of T . Let U be a measure-preserving transformation
supported on A. Then the following equivalences hold:
(1) The restriction of U to A is aperiodic ⇔ U T is aperiodic ⇔ T U is aperiodic.
(2) T restriction of U to A is ergodic ⇔ U T is ergodic ⇔ T U is ergodic.
Proof. It follows from the proof of Lemma 2.4 that A intersects every T U orbit and
every U T orbit. The conclusion then follows from Lemmas 2.4 and 2.2.
Let us observe that one can go the other way around in the above constructions:
starting from an aperiodic transformation T and a Borel set A which intersects
almost every T -orbit, the map TA−1 T is periodic with A as a Borel fundamental
domain and same return time to A as T . This fact is the key idea for the following
result of Belinskaya which we won’t use but which is an important step towards to
the proof of her Theorem 4.1.
Proposition 2.6 (Belinskaya, [Bel68, Thm. 3.6]). Let S and T be two measurepreserving transformations, let A be a Borel subset which intersects every S and
every T -orbit. Suppose that SA = TA and that the return times of S and T to A are
the same, i.e. nA,S = nA,T . Then S and T are conjugate.
We will use the following well-known proposition several times. A proof is provided for completeness.
Proposition 2.7. Let T ∈ Aut(X, µ). There is a partition (A1 , A2 , B1 , B2 , B3 ) of
supp T such that T (A1 ) = A2 , T (B1 ) = B2 and T (B2 ) = B3 .
9
Proof. Since X is a standard Borel space, there is a countable partition (Xi )i∈N of
supp T into Borel sets such that for all i ∈ N, T (Xi ) is disjoint from Xi (see for
instance [EG14, Lem. 5.1]).
We then define by recurrence an increasing family of sets (Yi )i∈N by letting Y0 =
X0 and then for all i ∈ N
Yi+1 = Yi t {x ∈ Xi+1 : T (x) 6∈ Yi and T −1 (x) 6∈ Yi }.
S
Let Y = n∈N Yn , then by construction Y and T (Y ) are disjoint. Moreover, we
have supp T = T −1 (Y ) ∪ Y ∪ T (Y ). Indeed, if x ∈ supp T \ Y there is i ∈ N such
that x ∈ Xi+1 , and since x 6∈ Yi+1 either T (x) ∈ Yi or T −1 (x) ∈ Yi so that in any
case x ∈ T −1 (Y ) ∪ T (Y ).
Since supp T is T -invariant, we conclude that supp T = Y ∪ T (Y ) ∪ T 2 (Y ). Now
let A1 = {x ∈ Y : T 2 (x) ∈ Y } and B1 = {Y \ A1 }. Then since Y and T (Y ) are
disjoint, the sets A1 , A2 := T (A1 ), B1 , B2 := T (B1 ) are disjoint. Let B3 := T 2 (B1 ).
By the definition of B1 the set B3 is disjoint from Y . Moreover since T (B1 ) is disjoint
from Y we also have T 2 (B1 ) disjoint from T (Y ) so that B3 is actually disjoint from
Y t T (Y ). We conclude that A1 , A2 , B1 , B2 , B3 are as desired.
Remark. Note that the proof does not use that T is measure-preserving and actually
works in the purely Borel context.
2.2
Graphings, equivalence relations and full groups
If (X, µ) is a standard probability space, and A, B are Borel subsets of X, a partial
isomorphism of (X, µ) of domain A and range B is a Borel bijection f : A → B
which is measure-preserving for the measures induced by µ on A and B respectively.
We denote by dom f = A its domain, and by rng f = B its range. Given two partial
isomorphisms ϕ1 : A → B and ϕ2 : C → D, we define their composition ϕ2 ◦ ϕ1 as
the map ϕ−1
1 (B ∩ C) → ϕ2 (B ∩ C) given by ϕ2 ◦ ϕ1 (x) = ϕ1 ϕ2 (x). We also define
the inverse ϕ−1 of a partial isomorphism ϕ : A → B by ϕ−1 : B → A and the
equation ϕ−1 ◦ ϕ = idA .
By definition a graphing is a countable set of partial isomorphisms. Every
graphing Φ generates a measure-preserving equivalence relation RΦ , defined
to be the smallest equivalence relation containing (x, ϕ(x)) for every ϕ ∈ Φ and
x ∈ dom ϕ. Given a graphing Φ, a Φ-word is a composition of finitely many
elements of Φ or their inverses. Obviously (x, y) ∈ RΦ iff and only if there exists a
Φ-word w such that y = w(x). Given a Borel set A, its Φ-closure is the reunion
of all w(A) where w is a Φ-word. Say that Φ is ergodic when the Φ-closure of any
non-null Borel set A has full measure.
The full group of a measure-preserving equivalence relation R is the group [R]
of automorphisms of (X, µ) which induce permutations in the R-classes, that is
[R] = {ϕ ∈ Aut(X, µ) : ∀x ∈ X, ϕ(x) R x}.
It is a separable group when equipped with the complete metric du defined by
du (T, U ) = µ({x ∈ X : T (x) 6= U (x)}.
10
The metric du is called the uniform metric and the topology it induces is called the
uniform topology. One also defines the pseudo full group of R, denoted by [[R]],
which consists of all partial isomorphisms ϕ such that ϕ(x) R x for all x ∈ dom ϕ.
Given a measure-preserving equivalence relation R, we denote by MR the σalgebra of all Borel sets A such that T (A) = A for all T ∈ [R]. Consider the Hilbert
space of R-invariant functions, i.e. the set of all f ∈ L2 (X, µ) such that for any
T ∈ [R], one has f ◦ T = f a.e. We denote this closed Hilbert space by L2R (X, µ)
and remark that it consists of all the MR -measurable elements of L2 (X, µ). By
definition R is ergodic if L2R (X, µ) only consists of constant functions. A graphing
Φ is ergodic if and only if RΦ is.
The orthogonal projection ER from the Hilbert space L2 (X) onto the closed
subspace L2R (X) satisfies the following equality, which defines it uniquely: for any
f ∈ L2 (X, µ) and g ∈ L2R (X, µ),
Z
Z
fg =
ER (f )g.
X
X
ER is called a conditional expectation. When A is a subset of X, its characteristic
function is an element of L2 (X, µ), and we call ER (χA ) the R-conditional measure
of A, denoted by µR (A) or µΦ (A) when R = RΦ . Often the equivalence relation R
will be clear from the context and we will simply call µR (A) the conditional measure
of A. Because ER is a contraction for the L∞ norm, µR (A) takes values in [0, 1]. For
those who are familiar with the ergodic decomposition, µR (A) is just the function
x 7→ µx (A) where (µx )x∈X is the ergodic decomposition of R. Given ϕ ∈ [[R]], we
have µR (dom ϕ) = µR (rng ϕ). The following well-known result is a kind of converse
(see [LM15, Sec. 2.1]).
Proposition 2.8 (Dye). Let R be a measure-preserving equivalence relation. Then
if two sets A and B have the same R-conditional measure, there exists ϕ ∈ [[R]]
whose domain is A and whose range is B.
Note that in the ergodic case, the previous proposition implies that any two sets
of the same measure can be mapped to each other by an element of the pseudo full
group of R. A measure-preserving equivalence relation is aperiodic if almost all its
equivalence classes are infinite. The following proposition is well-known, see [LM15,
Sec. 2.1] for a proof.
Proposition 2.9 ([Dye59], Maharam’s lemma). A measure-preserving equivalence
relation R is aperiodic iff for any A ⊆ X, and for any MR -measurable function f
such that 0 6 f 6 µR (A), there exists B ⊆ A such that the R-conditional measure
of B equals f .
Corollary 2.10. Let R be an aperiodic measure-preserving equivalence relation, and
let f : X → [0, 1] be an MR -measurable function. Let A be a subset of X such that
for almost all x ∈ A, one has f (x) > 0. Then there is a countable partition (An )n∈N
of A such that for all x ∈ X and all n ∈ N,
µR (An )(x) 6 f (x).
11
Proof. The proof relies the following basic fact: there is a countable family of MR measurable positive functions fP
n : X → [0, 1] such that for all x ∈ X, we have
fn (x) 6 f (x) for all n ∈ N and n∈N fn (x) = µR (x). Indeed, if for all x ∈ X we let
fn (x) = 0 if µR (A)(x) = 0 and else
f (x) j
k if n < bµR (A)(x)c
f (x)
f (x) − g(x) if n = bµR (A)(x)c
fn (x) =
0
else,
it is easily checked that such functions satisfy the desired properties. We can now use
the previous proposition to build by recurrence a sequence (An ) of disjoint
subsets
P
of A such that for every n ∈P
N, µR (An ) = fn F
6 f . Then µR (A) = n∈N µR (An )
hence by integrating µ(A) = n∈N µ(An ) = µ( n∈N An ) so that (An ) is a partition
of A meeting all our requirements.
Let us also record the following easy consequences of the previous results.
Lemma 2.11. Let R be a measure-preserving equivalence relation. Then if two
disjoint Borel sets A and B have the same R-conditional measure, there exists an
involution U ∈ [R] whose support is equal to A t B such that U (A) = B.
Proof. By Proposition 2.8 there exists ϕ ∈ [[R]] such that ϕ(A) = B. Then the
involution U ∈ [RΦ ] defined by
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ B
U (x) =
x
else
clearly works.
Lemma 2.12. Let R be a measure-preserving aperiodic equivalence relation and
let C be a Borel subset of X. Then there exists an involution U ∈ [R] such that
supp U = C.
Proof. By Maharam’s Lemma (Lemma 2.9), one can write C = AtB where µR (A) =
µR (B) = µR (C)/2. The previous lemma can then readily be applied.
Remark. In Section 4.2, we will characterise which sets arise as supports of involutions belonging to the L1 full group of T , where T is an ergodic transformation.
2.3
Entropy
The entropy of a countable partition (Ai )I∈I of (X, µ) is the quantity
X
H((Ai )i∈I ) := −
µ(Ai ) ln µ(Ai )
i∈I
where we use the convention 0 ln 0 = 0. It represents the average amount of information we get when we choose an element x ∈ X at random and only learn in
which piece Ai of the partition x is. The following statement was extracted from the
more general Lemma 2.1 in [Aus16]. It shows that cocycle partitions coming from
elements of L1 full groups of Z-actions have finite entropy.
12
Lemma 2.13. Let (An )n∈Z be a partition of X such that
Then H((An )n∈Z ) < +∞.
P
n∈Z
|n| µ(An ) < +∞.
Proof. Some elementary calculus yields the inequality
−t ln t 6 mt + e−m−1
for all t, m > 0. In particular for all n ∈ Z∗ we have
−µ(An ) ln µ(An ) 6 |n| µ(An ) + e−|n|−1 .
P
Summing this P
over n ∈ Z∗ and applying our hypothesis n∈Z∗ |n| µ(An ) < +∞, we
obtain that − n∈Z∗ µ(An ) ln µ(An ) < +∞. So H((An )n∈N ) < +∞ as wanted.
Remark. Austin’s result (Lemma 2.1 in [Aus16]) actually yields that whenever Γ
is a finitely generated group, the cocycle partitions of elements of the L1 full group
of any free Γ-action have finite entropy.
Given two partitions (Ai ) and (Bj ) of X, we let (Ai ) ∨ (Bj ) be their join, i.e.
the partition (Ai ∩ Bj ). We have the following natural inequality (for a proof see
e.g. [Dow11, 1.6.10]).
Lemma 2.14. Let (Ai ) and (Bj ) be two partitions of X. Then
H((Ai ) ∨ (Bj )) 6 H((Ai )) + H((Bj )).
Note that in particular, the join of finitely many partitions with finite entropy
has finite entropy.
Lemma 2.14 enables one to give the classical definition of the entropy of T ∈
Aut(X, µ). First, given a partition Q, we let
!
n−1
_
1
h(T, P) := lim H
T i (P) ,
n→+∞ n
i=0
where the limit exists by subadditivity of the sequence H(
2.14). The entropy of T is
h(T ) =
sup
Wn−1
i=0
T i (P)) (cf. Lemma
h(T, P).
P partition
A partition P is called generating if up to measure zero, the σ-algebra generated
by the T -translates of P is equal to the Borel σ-algebra of X. A more convenient
way to see this for us is in terms of the measure algebra of (X, µ).
Recall that given a standard probability space (X, µ), its measure algebra is
denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such sets being
identified if their symmetric difference has measure zero. It is naturally endowed
with a metric dµ defined by dµ (A, B) = µ(A 4 B) which is complete and separable
(see [Hal50, 40.A]). Then a partition P is generating if and only if the algebra
generated by the T -translates of P is dense in MAlg(X, µ).
13
Kolmogorov-Sinai’s theorem states that whenever P is a generating partition of
finite entropy, one has
h(T ) = h(T, P) < +∞
Conversely, Krieger’s finite generator theorem states that every transformation of finite entropy admits a finite generating partition [Kri70] (moreover, there is such
a partition whose cardinality k satisfies the inequality eh(T ) 6 k 6 eh(T ) + 1).
Krieger then proved that every such transformation is actually conjugate to a minimal uniquely ergodic subshift [Kri72], which will be relevant to us when we connect
topological full groups to L1 full groups (see Section 4.5).
3
3.1
L1 full groups of graphings
Definition and first properties
Let Φ be a graphing, and let RΦ be the measure-preserving equivalence relation it
generates. Such a graphing induces a metric dΦ on the orbits of RΦ by putting for
all (x, y) ∈ R
dΦ (x, y) = min{n ∈ N : ∃ϕ1 , ..., ϕn ∈ Φ±1 such that y = ϕn · · · ϕ1 (x)}.
The L1 full group of Φ, denoted by [Φ]1 , is then defined by
[Φ]1 := {T ∈ [RΦ ] : x 7→ dΦ (x, T (x)) is integrable}.
The triangle inequality implies that [Φ]1 is indeed a group, which we equip with a
right-invariant metric d˜Φ defined by
Z
dΦ (S(x), T (x)).
d˜Φ (S, T ) :=
X
Our first example is fundamental since the study of single measure-preserving transformations is a central subject in ergodic theory.
Example 3.1. Suppose we are given a measure-preserving aperiodic Z-action, that
is, an element T ∈ Aut(X, µ), all whose orbits are infinite. Then Φ = {T } is a
graphing, and we denote by [T ]1 the associated L1 full group. Given S ∈ [RT ],
for all x ∈ X there is a unique cS (x) ∈ Z such that S(x) = T cS (x) (x). The map
x 7→ cS (x) is called the cocycle associated to S and it completely determines S.
The partition ({x ∈ X : cS (x) = n})n∈Z is called the cocycle partition associated
to S. For all x ∈ X and all S, S 0 ∈ [RT ], we have the cocycle identity
cS 0 S (x) = cS 0 (S(x)) + cS (x).
The L1 full group [T ]1 := [RΦ ]1 consists of all the S ∈ [RT ] such that the corresponding cocycle cS is integrable. The metric d˜Φ is then given by
Z
0
˜
dΦ (S, S ) =
|cS (x) − cS 0 (x)| dµ(x)
X
This fundamental example will be explored in Section 4.
14
Example 3.2. Suppose Φ is a graphing, all whose connected components are complete graphs. Then dΦ is the discrete metric: for all (x, y) ∈ RΦ ,
0 if x = y,
dΦ (x, y) =
1 else.
Hence we have [Φ]1 = [RΦ ] and d˜Φ is equal to the uniform metric du .
Example 3.3. Let Γ be a finitely generated group and consider a measure-preserving
Γ-action on (X, µ). If S is a finite generating set of Γ, it defines a graphing which
generates RΓ , and we can consider the associated L1 full group [S]1 . Observe that
if S 0 is another finite generating set, then the metrics dS and dS 0 are bilipschitzequivalent on every orbit with a uniform constant. So the metrics d˜S and d˜S 0 are
bilipschitz-equivalent and we have [S]1 = [S 0 ]1 . We conclude that we can actually
define the L1 full group of the Γ-action by [Γ]1 = [S]1 since it does not depend on
the choice of a finite generating set.
Note that the L1 full group of the action of a finitely generated group comes
naturally equipped with a complete left invariant metric well-defined up to bilipschitz
equivalence. Of course Example 3.1 falls into this category with Γ = Z. Moreover, if
Γ acts freely, every T ∈ [Γ] is uniquely defined by the associated cocycle cT : X → Γ
defined by T (x) = cT (x) · x. Such a cocycle satisfies the cocycle identity cT 0 T (x) =
cT 0 (T (x))cT (x).
Proposition 3.4. Let Φ be a graphing. The metric d˜Φ is complete and separable.
Proof. Let (Tn ) be a Cauchy sequence for d˜Φ . Note that since a Cauchy sequence
converges iff it admits a converging subsequence we can freely replace (Tn ) by a
subsequence.
Clearly for all T, T 0 ∈ [Φ]1 we have du (T, T 0 ) 6 d˜Φ (T, T 0 ), so the sequence (Tn )
is du -Cauchy and admits a du -limit T ∈ [RΦ ]. Up to taking a subsequence, we may
assume that Tn → T pointwise and that for all n ∈ N we have d˜Φ (Tn , Tn+1 ) < 21n .
We deduce that
Z X
dΦ (Tn (x), Tn+1 (x))dµ(x) < 2.
X n∈N
Now for all n ∈ N and all x ∈ X we have
dΦ (Tn (x), T (x)) = lim dΦ (Tn (x), Tm (x))
m→+∞
6 lim
m→+∞
6
X
m−1
X
dΦ (Ti (x), Ti+1 (x))
i=n
dΦ (Ti (x), Ti+1 (x))
i∈N
By integrating this inequality for n = 0 we deduce that d˜Φ (T0 , T ) < +∞ so that
T ∈ [Φ]1 . Moreover this inequality allows us apply the Lebesgue dominated convergence theorem to the sequence of functions x 7→ dΦ (Tn (x), T (x)) to conclude that
dΦ̃ (Tn , T ) → 0. The metric d˜Φ is therefore complete.
15
The separability follows from the line of ideas present in [CLM16, Thm. 3.17].
Namely, let S be a family of involutions such that
[
{(x, s(x)) : x ∈ X} = GΦ ∪ {(x, x) : x ∈ X}
s∈S
and define Γ = hSi equipped with the word metric dS . We consider
the space
R
L1 (X, µ, Γ) of measurable functions taking values in Γ such that X dS (f (x), 1Γ ) <
+∞. Such a space is separable for the natural L1 metric, and [Φ]1 is a continuous
quotient of a subspace of the metric space L1 (X, µ, Γ) (namely, the subspace of
maps f ∈ L1 (X, µ, Γ) such that Tf : x 7→ f (x) · x belongs to Aut(X, µ)), hence
separable.
Remark. Because d˜Φ is right-invariant, the previous Proposition shows that [Φ]1
is a cli Polish group, which means it admits a complete left (or equivalently right)invariant metric compatible with its topology. Examples of cli Polish groups include
all the locally compact second-countable groups (see [Bec98, Prop. 3.C.2]), and nonexamples include the following Polish groups: Aut(X, µ), the group of unitaries of
an infinite dimensional Hilbert space and the group of permutation of the integers.
Using Rohlin’s lemma, it can be shown that whenever T ∈ Aut(X, µ) is aperiodic,
the L1 full group [T ]1 is never SIN (meaning that its topology does not admit a basis
at the identity made of conjugacy-invariant neighborhoods). To our knowledge, such
L1 full groups are the first examples of cli Polish groups which are non-SIN but at
the same time far from being locally compact groups.
A fundamental feature of L1 full groups is that they are stable under taking
induced maps.
Proposition 3.5. Let Φ be a graphing, let [Φ]1 be the associated L1 -full group. Then
for all T ∈ [Φ]1 , we have TA ∈ [Φ]1 , and
d˜Φ (TA , idX ) 6 d˜Φ (T, idX ).
Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a
partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The
family (Bn,m )06m<n is a collection of disjoint sets.
We now fix n ∈ N. By the triangle inequality, we have that for all x ∈ An ,
n
dΦ (x, TA (x)) = dΦ (x, T (x)) 6
n
X
dΦ (T m (x), T m+1 (x)).
m=0
By integrating and summing this over all n ∈ N, we deduce that
Z
dΦ (x, TA (x)) =
A
n Z
XX
n∈N m=0
Z
dΦ (x, T (x)) 6
Bn,m
dΦ (x, T (x)).
X
To conclude, we note that the left term above is equal to d˜Φ (TA , idX ), while the
right term is equal to d˜Φ (T, idX ).
16
Remark. The above proof is basically the same as that of Kac’s formula [Kac47,
Thm.2’]. We will use this proof again to get later a similar statement in the case of
L1 full groups of Z-actions (see Prop. 4.4).
The following lemma will provide us many involutions in L1 full groups.
Lemma 3.6. Let Φ be a graphing. Then for every involution U ∈ [RΦ ], there
S exists
an increasing sequence of U -invariant sets An ⊆ supp U such that supp U = n∈N An
and for all n ∈ N, UAn ∈ [Φ]1 .
Proof. Let U ∈ [RΦ ] be an involution and for all n ∈ N, let An = {x ∈ supp U :
dΦ (x, U (x)) < S
n}. Since U is an involution and dΦ is symmetric each An is U invariant, and n∈N An = supp U , so µ(supp U \ An ) → 0. By the definition of An ,
each UAn belongs to [Φ]1 .
Theorem 3.7. Let Φ be a graphing. Then [Φ]1 is dense in [RΦ ] for the uniform
topology.
Proof. Because full groups are generated by involutions (see [Kec10, Lem. 4.5]), we
only need to show that every involution in [RΦ ] can be approximated by elements
of [Φ]1 . Let U ∈ [RΦ ] be such an involution.
By the previous lemmaSwe have an increasing sequence (An ) of U -invariant subsets of supp U such that n∈N An = supp U and for all n ∈ N the involution UAn
belongs to [Φ]1 . So µ(supp U \ An ) → 0 and we conclude that du (UAn , U ) → 0 as
desired.
3.2
The closure of the derived group is topologically generated by involutions
As we will see later, given a graphing Φ and T ∈ [Φ]1 , the map A ∈ MAlg(X, µ) 7→
TA ∈ [Φ]1 is not continuous in general. We however have the following very useful
statement.
Proposition 3.8. Let A ⊆ X, let Φ be a graphingSand take T ∈ [Φ]1 . If (An ) is an
increasing sequence of subsets of A such that A = n∈N An then
TA = lim TAn .
n→+∞
Proof. Let k : X → N be defined by TA (x) = T k(x) (x) and similarly for all n ∈ N
define kn : X → N by TAn (x) = T kn (x) (x). Since µ(An 4 A) → 0, we have that
kn → k pointwise. So if we let Bn = {x ∈ X : k(x) 6= kn (x)}, we have µ(Bn ) → 0.
By the definition of Bn we get
Z
d˜Φ (TAn , TA ) =
dΦ (TAn (x), TA (x))
Bn
The triangle inequality now yields
Z
Z
˜
dΦ (TAn , TA ) 6
dΦ (TAn (x), x) +
Bn
Bn
17
dΦ (TA (x), x).
(1)
Since An ⊆ A we have (TA )An = TAn , so Proposition 3.5 yields
d˜Φ (TAn , idX ) 6 d˜Φ (TA , idX ).
By developing the left-hand term we get
Z
Z
Z
dΦ (TAn (x), x) +
dΦ (TAn (x), x) 6
d˜Φ (TA (x), x)).
Bn
X\Bn
X
Since for all x ∈ X \ Bn we have TA (x) = TAn (x), we may rewrite this as
Z
Z
Z
dΦ (TAn (x), x) 6
dΦ (TA (x), x) −
dΦ (TA (x), x)
Bn
X
X\Bn
Z
Z
dΦ (TAn (x), x) 6
dΦ (TA (x), x).
Bn
Bn
We now reinject this inequality into inequality (1) and obtain
Z
dΦ (TA (x), x).
d˜Φ (TAn , TA ) 6 2
Bn
By the dominated convergence theorem we now have
conclude that dΦ (TAn , TA ) → 0 as desired.
R
Bn
dΦ (TA (x), x) → 0 so we
The above proposition is a direct consequence of the dominated convergence
theorem when the sets An are already TA -invariant. We will often use it in this
easier case, but the general statement will appear at a crucial point towards proving
that the closure of the derived group of [Φ]1 is topologically generated by involutions.
Let us for the moment make sure that every involution belongs to the closure of the
derived group.
Lemma 3.9. Suppose Φ is aperiodic. Then every involution in [Φ]1 belongs to the
closure of derived group of [Φ]1 .
Proof. Let T ∈ [Φ]1 be an involution. We can find B ⊆ X such that supp T =
B t T (B). By aperiodicity, there is an involution Ũ ∈ [RΦ ] such that supp Ũ = B
(see Lemma 2.12). We then find C ⊆ B such that B = C t Ũ (C). Lemma
3.6 then
S
yields an increasing sequence of Ũ -invariant sets Bn such that B = n∈N Bn , and
for all n ∈ N, ŨBn ∈ [Φ]1 . We let Cn = C ∩ Bn , and Tn := TCn tT (Cn ) .
Now we define an involution Un in the L1 full group of Φ by
if x ∈ Bn t U (Bn ),
Ũ (x)
Un (x) :=
T Ũ T (x) if x ∈ T (Bn t U (Bn )),
x
else.
By construction, the commutator [Tn , Un ] is theS
tranformation induced by T on the
T -invariant set An := Bn t T (Bn ), and we have n∈N An = supp T . We conclude by
the previous proposition that [Tn , Un ] → T as desired.
18
Remark. I do not know wether involutions actually belong to the derived group
itself. As a more general question, when does it happen that D([Φ]1 ) is closed? Note
that full groups of measure-preserving equivalence relations (which are a special case
of L1 full groups by 3.2) are perfect if and only if the equivalence relation is aperiodic
(see [LM14b, Prop. 3.6]).
We will now gradually establish that conversely, the closure of D([Φ]1 ) is topologically generated by involutions.
Lemma 3.10. Let Φ be an aperiodic graphing. Then every periodic element of
[Φ]1 belongs to the closed subgroup of [Φ]1 generated by involutions and hence to the
closure of the derived group of [Φ]1 .
Proof. Let U ∈ [Φ]1 be periodic, and for all n ∈ N∗ let An denote the U -invariant
set of all x ∈ X whose U -orbit has cardinality n. By Proposition 3.8, we have
U = lim U
n→+∞
Sn
i=1
Ai
= lim
n→+∞
n
Y
UAi .
i=2
so it suffices to prove the statement for cycles, i.e. elements U of [Φ]1 for which
there is n ∈ N such that every non-trivial U -orbit has cardinality n. If U ∈ [Φ]1 is
such an element, we may find A ⊆ X such that
supp U =
n
G
U i (A).
i=1
For i ∈ {1, ..., n − 1} we let Ui ∈ [Φ]1 be the involution defined by
U (x) if x ∈ U i (A)
U −1 (x) if x ∈ U i+1 (A)
Ui (x) =
x
else.
It now follows from the well-known identity in symmetric groups
(1 2 · · · n) = (1 2)(2 3) · · · (n − 1 n)
that U = U1 U2 · · · Un−1 , which proves the first part of the lemma. The “as well as”
part follows from Lemma 3.9.
Lemma 3.11. Let Φ be an aperiodic graphing. The L1 full group [Φ]1 is generated
by elements whose support has Φ-conditional measure everywhere less than 1/4.
Remark. As the proof shows, 1/4 can be replaced by any > 0, but we won’t need
that.
Proof. First note that by breaking a fundamental domain into pieces of small conditional measure (using Maharam’s lemma 2.9), one can show every periodic element
is the product of elements whose support has Φ-conditional measure everywhere less
than 1/4.
19
Now if T ∈ [Φ]1 , one may write T = Tp T 0 where Tp is periodic and all the nontrivial T 0 -orbits are infinite. By Maharam’s lemma we then find A ⊆ supp T 0 such
that for all x ∈ supp T 0 , we have
0 < µT 0 (A)(x) < 1/4.
Then A intersects almost every non-trivial T 0 -orbit so that T 0 T 0 −1
A is periodic. Since
0
A has T -conditional measure everywhere less than 1/4, the same is true of its Φconditional measure. So the support of T 0 A has Φ-conditional measure everywhere
0
less than 1/4 as wanted, and T = Tp (T 0 T 0 −1
A )T A can be written as a product of
elements whose support has Φ-conditional measure everywhere less than 1/4.
Theorem 3.12. Let Φ be an aperiodic graphing. Then the closure of the derived
group of [Φ]1 is topologically generated by involutions.
Proof. Denote by S the set of T ∈ [Φ]1 whose support has Φ-conditional measure
everywhere less than 1/4. By the previous lemma S generates [Φ]1 . Since S is
moreover invariant under conjugacy, it suffices to show that the commutator of any
two elements of S belongs to the closed subgroup generated by involutions.
So let T, U ∈ S and let B = supp g ∪supp h. There exists an involution V ∈ [RΦ ]
such that B and V (B) are disjoint and supp V = B t V (B) =: A. By Lemma
3.6 there exists S
an increasing sequence (An ) of V -invariant subsets of A such that
VAn ∈ [Φ]1 and An = A.
By Proposition 3.8 we have TAn → T and UAn → U , so it suffices to show that
for every n ∈ N, the commutator [TAn , UAn ] belongs to the closed group generated
by involutions.
To this end, we fix n ∈ N and observe that the set supp TAn ∪ supp UAn is disjoint
from VAn (supp TAn ∪ supp UAn ). It follows that if we let Tn0 = VAn TA−1
V , then Tn0
n An
commutes with both TAn and UAn . So we have
[TAn , UAn ] = [TAn Tn0 , UAn ]
= [(TAn VAn TA−1
)VAn , UAn ]
n
and since taking a commutator means multiplying by a conjugate of the inverse, this
equality implies [TAn , UAn ] is a product of involutions in [Φ]1 . As explained before
[TAn , UAn ] → [T, U ] so this ends the proof.
As a consequence, we can easily derive that the closure of the derived group is
connected.
Corollary 3.13. Let Φ be an aperiodic graphing. Then D([Φ]1 ) is connected.
Proof. By the previous theorem it suffices to show that the group generated by
involutions in [Φ]1 is connected, and we will actually prove that it is path connected.
Let U ∈ [Φ]1 be an involution and let A be a fundamental domain for U . There is
an increasing family of Borel subsets (At )t∈[0,1] such that A0 = ∅ and A1 = A and
for all t ∈ [0, 1], µ(At ) = tµ(A).
Then by the dominated convergence theorem the family of involutions Ut :=
UAt ∪U (At ) is a continuous path from U0 = idX to U1 = U . So every involution in [Φ]1
is connected by a path to the identity, and we conclude that the group generated
by involutions is path connected as desired.
20
For ergodic Z-actions, D([T ]1 ) is actually the connected component of the identity (this follows from Corollary 4.20 along with the above result).
We end this section by refining the fact that the closure of the derived group
is topologically generated by involutions so as to obtain the same statements that
Kittrell and Tsankov had obtained for full groups in [KT10, Sec. 4.2]. The proof
is actually the same as Kittrell and Tsankov’s modulo the use of the dominated
convergence theorem and we reproduce it here for the reader’s convenience.
Let Φ be a graphing and ϕ ∈ Φ. If A is a Borel subset of dom ϕ such that
A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in Aut(X, µ) defined by: for all
x ∈ X,
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ ϕ(A)
Iϕ,A (x) =
x
else.
Note that Iϕ,A ∈ [Φ]1 since dΦ (x, Iϕ,A (x)) 6 1 for all x ∈ X.
Theorem 3.14. Let Φ be a graphing. Then the group D([Φ]1 ) is topologically generated by the set
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
Proof. By Theorem 3.12, we only need to show that involutions belong to the group
topologically generated by the set
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
So let U ∈ [Φ]1 be an involution, and let A be a fundamental domain for the
restriction of U to its support. Let (wn ) enumerate the Φ-words, and for each n ∈ N
let
An ={x ∈ A : U (x) = wn (x) and for all m ∈ N if U (x) = wm (x)
then either |wm | > |wn | or m > n}
Then (An ) forms a partition of A and for all n ∈ N, if wn = ϕ1 · · · ϕk , then for all
x ∈ An we have that for all i 6= j ∈ {1, ..., k}
ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x)
by minimality of the length of wn . By the dominated convergence theorem,
U = lim
N
Y
N →+∞
Iwn ,An ,
n=0
so we may actually assume that U = Iϕ1 ···ϕk ,B for some B ⊆ X and ϕ1 , ..., ϕk ∈ Φ±1
such that for all i 6= j ∈ {1, ..., k} and all x ∈ B, ϕi · · · ϕk (x) 6= ϕj · · · ϕk (x).
Since X is a standard Borel space, a well-known argument yields that we may
actually find a partition (Bm )m∈N of B such that for all m ∈ N and all i 6= j ∈
{1, ..., k},
ϕi · · · ϕk (Bm ) ∩ ϕj · · · ϕk (Bm ) = ∅
21
(see for instance [EG14, Lem. 5.2]). Again by the dominated convergence theorem
U = lim
N →+∞
N
Y
Iϕ1 ···ϕk ,Bm ,
n=0
so we may actually assume that U = Iϕ1 ···ϕk ,C for some C ⊆ X such that for all
i 6= j ∈ {1, ..., k},
ϕi · · · ϕk (C) ∩ ϕj · · · ϕk (C) = ∅
Then note that for all m ∈ N and i ∈ {1, ..., k − 1}, the identity
(i − 1 k) = (i − 1 i)(i k)(i − 1 i)
in the symmetric group over {0, ..., k} yields
Iϕi ···ϕk ,C = Iϕi ,ϕi+1 ···ϕk (C) Iϕi+1 ···ϕk ,C Iϕi ,ϕi+1 ···ϕk (C)
so that by a downward recurrence on i ∈ {1, ..., k} we have that Iϕi ···ϕk ,C belongs to
the group generated by
{Iϕ,A : ϕ ∈ Φ, A ⊆ dom ϕ and A ∩ ϕ(A) = ∅} .
In particular, U = Iϕ1 ···ϕk ,C belongs to such a group, as wanted.
3.3
Dye’s reconstruction theorem
We now show that L1 full groups as abstract groups can only be isomorphic through
a measure-preserving transformation, which is a key step in order to see than L1 full
groups of ergodic Z-actions are a complete invariant of flip conjugacy. Fortunately,
the main result that we need for this has already been proven by Fremlin in a much
more general context.
Definition 3.15 (Fremlin). A subgroup G 6 Aut(X, µ) has many involutions if
for every Borel A ⊆ X non-null, there exists a non-trivial involution U ∈ G such
that supp U ⊆ A.
Proposition 3.16. Let Φ be a graphing. The following are equivalent
(1) Φ is aperiodic;
(2) [Φ]1 has many involutions;
(3) D([Φ]1 ) has many involutions;
(4) D([Φ]1 ) has many involutions.
Proof. Note that (2) and (3) are equivalent since every involution in [Φ]1 belongs to
D([Φ]1 ) by Lemma 3.10.
Let us show by contrapositive that (2)⇒(1): if Φ is not aperiodic, then we may
find a non-null set A which intersects every Φ-orbit in at most one point. Clearly
22
every element of [Φ]1 (actually of [RΦ ]) supported in A is trivial, in particular [Φ]1
does not have many involutions.
For the converse (1)⇒(2), suppose that Φ is aperiodic and let A ⊆ X be nonnull. Then by Lemma 2.12, there exists an involution U ∈ [RΦ ] whose support is
equal to A. Now Lemma 3.6 ensures us that there is a non-null U -invariant set A0
such that UA0 ∈ [Φ]1 , witnessing that [Φ]1 has many involutions. So the implication
(1)⇒(2) also holds and we conclude that (1), (2) and (3) are equivalent.
Clearly (4) ⇒ (2), so we now only need to show that (2)⇒(4). Suppose that
[Φ]1 has many involutions and let A be a non-null Borel subset of X. Let U ∈ [Φ]1
be an involution supported in A, let B be a fundamental domain of the restriction
of U to its support. Finally, let V ∈ [Φ]1 be an involution supported in B. Since
B and U (B) are disjoint, U V U V is an involution supported in A and belonging to
D([Φ]1 ) as wanted: D([Φ]1 ) has many involutions.
We denote by Aut∗ (X, µ) the group of non-singular transformations of (X, µ),
i.e. Borel bijections T : X → X such that for all Borel A ⊆ X, one has µ(A) = 0 if
and only if µ(T (A)) = 0.
We can now state and use Fremlin’s theorem, which is a generalization of Dye’s
reconstruction theorem for full groups.
Theorem 3.17 (Fremlin [Fre04, 384D]). Let G, H 6 Aut(X, µ) be two groups with
many involutions. Then any isomorphism between G and H is the conjugacy by
some non-singular transformation: for all ψ : G → H group isomorphism, there is
S ∈ Aut∗ (X, µ) such that for all T ∈ G,
ψ(T ) = ST S −1 .
Corollary 3.18. Let Φ and Ψ be two ergodic graphings. Then every isomorphism
between [Φ]1 and [Ψ]1 is the conjugacy by some measure-preserving transformation.
Proof. By Proposition 3.16 and the previous theorem, if ψ : [Φ]1 → [Ψ]1 is a group
isomorphism then there is S ∈ Aut∗ (X, µ) such that for all T ∈ [Φ]1 one has
ψ(T ) = ST S −1 .
Let f be the Radon-Nikodym derivative of the probability measure S∗ µ with respect
to µ. Since µ is preserved by every T ∈ [Φ]1 , the measure S∗ µ is preserved by every
T 0 ∈ [Ψ]1 . So f ◦ T 0 = f a.e. for every T 0 ∈ [Ψ]1 . But Ψ is ergodic so this implies f
is constant: the measure µ is preserved by S as wanted.
3.4
Closed normal subgroups of the closure of the derived
group
Given a group G ⊆ Aut(X, µ), we denote by GA the subgroup of all T ∈ G such
that supp T ⊆ A. Note that if Φ is a graphing and A is Φ-invariant then D([Φ]1 )A
is a closed normal subgroup of D([Φ]1 ).
We will see that conversely if Φ is aperiodic then all the closed normal subgroups
of D([Φ]1 ) arise in this manner. Our approach is based on the study of closed normal
subgroups generated by involutions.
23
Lemma 3.19. Let Φ be a graphing. If A is a Φ-invariant set then
D([Φ]1 A ) = D([Φ]1 )A = D([Φ]1 )A .
Proof. To simplify notation we let G = [Φ1 ]A , so that we aim to prove that
D(GA ) = D(G)A = D(G)A .
To this end we show that the chain of inclusions D(GA ) ⊆ D(G)A ⊆ D(G)A ⊆
D(GA ) holds.
• We clearly have the inclusion D(GA ) ⊆ D(G)A so that D(GA ) ⊆ D(G)A .
• Next, note that D(G)A is a closed subgroup of G which contains every element
of D(G)A . It follows that D(G)A ⊆ D(G)A .
• For the last remaining inclusion D(G)A ⊆ D(GA ), let T ∈ D(G)A . Then T
is supported on A and is a limit of elements Tn belonging to D(G). Now
note that by definition of the topology T is also the limit of the sequence of
transformations (TnA )n∈N . Moreover each TnA can be rewritten as a product
of commutators of elements supported in A by taking the induced transformations instead, which is harmless since A is invariant by every element appearing
in such a product. We conclude that T ∈ D(GA ) as desired.
We now establish a crucial lemma allowing a better understanding closures of
conjugacy classes of involutions.
Lemma 3.20. Let Φ be a graphing. Let U and V be two involutions such that their
supports are disjoint and have the same Φ-conditional measure. Then V belongs to
the closure of the conjugacy class of U .
Proof. Let A and B be fundamental domains of the respective restrictions of U and
V to their support. Then µΦ (A) = µΦ (B) so there exists an involution T ∈ [RΦ ]
such that T (A) = B and we can moreover assume that T (x) = x for all x ∈ A ∩ B.
For all n ∈ N we let An = {x ∈ A : dΦ (x, T (x)) < n} and Bn = {x ∈ B :
dΦ (x, T (x)) < n}. Since T is an involution and T (A) = B, we also have B
Sn = T (An ).
Note
that
(A
)
and
(B
)
are
increasing
sequences
of
sets
and
that
n
n
n An = A,
S
0
n Bn = B. We now define a new involution Tn
T (x)
if x ∈ An t Bn
V
T
U
(x)
if x ∈ U (An )
Tn0 (x) =
U T V (x) if x ∈ V (Bn )
x
else.
The definition of An and the fact that V, U ∈ [Φ]1 yield that Tn0 ∈ [Φ]1 as well. For
all n ∈ N and all x ∈ X, an easy calculation yields that:
• if x ∈ (A ∪ U (A)) \ (An ∪ U (An )), then Tn0 U Tn0 (x) = U (x),
• else if x ∈ (Bn ∪ V (Bn ), then Tn0 U Tn0 (x) = V (x) and
24
• else Tn0 U Tn0 (x) = x.
So Tn0 U Tn0 → V pointwise. Moreover the trichotomy above also shows that for all
x ∈ X we have dΦ (x, Tn0 U Tn0 (x)) 6 dΦ (x, U (x)) + dΦ (x, V (x)), so by the dominated
convergence theorem d˜Φ (Tn0 U Tn0 , V ) → 0. We have therefore established that V
belongs to the closure of the conjugacy class of U .
Lemma 3.21. Let Φ be an aperiodic graphing, let U ∈ [Φ]1 be an involution such
that µΦ (supp U ) 6 1/2. Let A be the Φ-closure of the support of U . Then the closed
subgroup generated by conjugates of U by elements of D([Φ]1 ) contains D([Φ]1 )A .
Proof. By Lemma 3.19 we may as well assume that A = X so that our aim becomes
to show that whenever U has support whose Φ-closure is equal to X and which
satisfies µΦ (supp U ) 6 1/2, the closed subgroup generated by conjugates of U by
involutions contains D([Φ]1 ).
So let U be as such, let B = supp U and denote by G the closed subgroup
generated by conjugates of U by elements of D([Φ]1 ). Since µΦ (supp U ) 6 1/2 by
Maharam’s lemma we may find a set C disjoint from B such that µΦ (C) = µΦ (B).
There is an involution V ∈ [RΦ ] supported on B t C such that V (B) = C. For all
n ∈ N we let
Bn = {x ∈ B : dΦ (x, V (x)) < n and dΦ (U (x), V U (x)) < n}
Then
(Bn ) is an increasing sequence of U -invariant Borel subsets
of B such that
S
S
n∈N Bn = B. Let An be the Φ-closure of Bn . Observe that
n∈N An = X, so the
proof will be finished once the following claim is proven.
Claim. For all n ∈ N, the group G contains D([Φ])An .
We now prove the claim. Let n ∈ N; the sets and functions that are to be
defined depend on n but we will omit the subscript n for readability. Let F be a
fundamental domain of the restriction of U to its support, let Fn be its intersection
with Bn , which is a fundamental domain for the restriction of U to Bn .
Let f = µΦ (Fn ) = µΦ (Bn )/2. We know that D([Φ])An is topologically generated
by involutions, so it suffices to show that any involution in [Φ]1 supported in An
belongs to G.
So let W be an involution supported in An . Let D be a Borel fundamental domain
for the restriction of W to its support: then supp W = D t W (D). By Corollary
2.10 we have a partition (Dm )m∈N of D such that for all m ∈ N, µΦ (Dm ) 6 f6 . For
all m ∈ N we let Wm = WDm tW (Dm ) . By the dominated convergence theorem,
W = lim
k→+∞
k
Y
Wm
m=0
so we only need to show that every Wm belongs to G.
25
B
C
Bn
U
V
Fn
Let us fix m ∈ N, and for notational simplicity let Γ = hU, V i ' (Z/2Z × Z/2Z) o
(Fn )
Z/2Z. Since µΦ (Dm ) 6 µΦ10
we can find a subset E ⊆ Fn such that µΦ (E) =
µΦ (Dm )/2 and E is disjoint from Γ(Dm t W (Dm )). Then Γ(E) is disjoint from
Dm t W (Dm ) = supp Wm .
Consider the Γ-invariant set Ẽ = (E t U (E)) t V (E t U (E)) and the involution
Ṽ = VẼ . An easy calculation yields U Ṽ U Ṽ = UẼ so that UẼ ∈ G. Now the support
of UẼ has Φ-conditional measure
µΦ (Ẽ) = 4µΦ (E) = 2µΦ (Dm ) = µΦ (supp Wm ).
Since moreover Ẽ and supp Wm are disjoint, we infer by Lemma 3.20 that Wm belongs to the closure of the conjugacy class of of UẼ . Since we have already established
that UẼ ∈ G, we can conclude that Wm ∈ G. As already observed, this ends the
proof of the claim and therefore of the theorem.
Proposition 3.22. Let Φ be an aperiodic graphing, let T ∈ [Φ]1 and let A be the
Φ-closure of the support of T . Then the closed subgroup generated by conjugates of
T by elements of D([Φ]1 ) contains
D([Φ]1 )A .
Proof. Again by Lemma 3.19 we only need to show that whenever T has a support
whose Φ-closure is equal to X, the closed subgroup generated by conjugates of T by
involutions contains D([Φ]1 ).
Let G be the closed subgroup generated by conjugates of T by elements of
D([Φ]1 ). We start by applying Proposition 2.7 and find a partition (A1 , A2 , B1 , B2 , B3 )
of supp T such that A2 = T (A1 ), B2 = T (B1 ) and B3 = T 2 (B1 ). Let C = A1 t b1 ,
then by construction C ∩ T (C) = ∅ and C intersects every non-trivial T -orbit. Since
the Φ-closure of supp T is equal to X this implies C intersects every Φ-orbit.
Let G be the closed subgroup generated by conjugates of T by elements of
D([Φ]1 ). Let U be an involution in [Φ]1 whose support
is equal to C. For all
S
n ∈ N, let Cn = {x ∈ X, dΦ (x, U (x)) < n}. Then n∈N Cn = C and for all n ∈ N
we have UCn ∈ [Φ]1 . Now since U (C) is disjoint from C we also have that U (Cn )
26
and Cn are disjoint so that [T, UCn ] is an involution belonging to G whose support
is Cn t T (Cn ).
Applying Lemma 3.21
S we deduce that G contains D([Φ]1 )An where An is the
Φ-closure
of Cn . Since n∈N Cn = C and C intersects every Φ-orbit, we have that
S
A
=
X. Moreover the sequence (An ) is increasing, so a direct application of
n∈N n
S
Proposition refprop: weak order continuity yields that n∈N D([Φ]1 )An is dense in
D([Φ]1 ) so that G contains D([Φ]1 ) as wanted.
We can now easily prove our main results for this section.
Theorem 3.23. Let Φ be an aperiodic graphing. Then for every closed normal
subgroup N of D([Φ]1 ) there is a (unique up to measure zero) Φ-invariant Borel set
A such that
N = D([Φ]1 )A .
Proof. Let t = sup{µ(A) : A is Φ-invariant and D([Φ]1 )A ⊆ N }, and let An be a
sequence of subsets of X such that µ(An ) → t and D([Φ]1 )An ⊆ N . Note that
whenever A0 , A00 are two Φ-invariant subsets of X then the group generated by
D([Φ]1 )A0 ∪ D([Φ]1 )A00 is equal to D([Φ]1 )A0 ∪A00 . So we may assume the sequence
(An ) is increasing.
S
Let A = n∈N An , then µ(A) = t. By proposition 3.8 since N is closed we
actually have that N contains D([Φ]1 )A . Conversely, let T ∈ N and let B be the
Φ-closure of the support of T . By Proposition 3.22 the group N contains D([Φ]1 )B .
So N contains D([Φ]1 )A∪B hence µ(A ∪ B) 6 t. But µ(A) = t so B ⊆ A up to
measure zero, hence T ∈ D([Φ]1 A . So D([Φ]1 )A contains N and we conclude that
N = D([Φ]1 )A .
Finally, the uniqueness of A up to measure zero follows from the fact that given
any B ⊆ X of positive measure, there is a non trivial T ∈ D([Φ]1 ) supported in B
(see Proposition 3.16).
Corollary 3.24. Let Φ be an aperiodic graphing. Then Φ is ergodic if and only if
D([Φ]1 ) is topologically simple.
We will see that D([Φ]1 ) and D([Φ]1 ) are never simple when Φ = {T } and
T ∈ Aut(X, µ) is aperiodic (see Theorem 4.26).
3.5
Link with topological full groups
In this section we connect L1 full groups to the well-studied topological full groups.
Since we are dealing with L1 full groups associated to graphings, we need to introduce
their natural topological counterparts.
Let 2N be the Cantor space and let ν be a Borel probability measure on it. A
continuous graphing on the measured Cantor space (2N , ν) is a graphing Φ such
that for all ϕ ∈ Φ, the sets dom ϕ, rng ϕ are clopen and ϕ : dom ϕ → rng ϕ is a
homeomorphism.
27
Definition 3.25. Let Φ be a continuous graphing on (2N , ν). The topological full
group of Φ, denoted by [Φ]c , is the group of all homeomorphisms T of 2N such that
for all x ∈ 2N there is a neighborhood U of x and a Φ-word w such that for all y ∈ U ,
T (x) = w(x).
It follows from compactness that one can think equivalently of the topological
full group of a continuous graphing Φ as the group of all maps obtained by cutting
and pasting finitely many Φ-words along a partition into clopen sets. In particular,
[Φ]c is always a countable group. The most interesting case is when Φ is actually a
countable group acting by homeomorphisms on a compact set (or a generating set
for such a countable group): we then recover the usual definition of the topological
full group.
We denote by [Φ]c−inv denote the group generated by involutions in a topological full group [Φ]c . The following result is an L1 full group version of a result of
Miller [Mil05] for full groups, also proved by Kittrell-Tsankov [KT10, Prop. 4.1] and
Medynets [Med07] in the case of a single homeomorphism.
Theorem 3.26. Let ν be a Borel probability measure on 2N , and let Φ be a continuous graphing on (2N , µ). Then the group [Φ]c−inv is dense in D([Φ]1 ).
Proof. Let us recall that if ϕ ∈ Φ and A is a Borel subset of dom ϕ such that
A ∩ ϕ(A) = ∅, we denote by Iϕ,A the involution in [Φ]1 defined by: for all x ∈ X,
ϕ(x) if x ∈ A
ϕ−1 (x) if x ∈ ϕ(A)
Iϕ,A (x) =
x
else.
By Theorem 3.14, the group D([Φ]1 ) is topologically generated by such involutions,
so we only need to check that, given ϕ ∈ Φ and a Borel subset A of dom ϕ such that
A ∩ ϕ(A) = ∅, the involution Iϕ,A can be approximated by elements of [Φ]c−inv .
So let ϕ ∈ Φ and let A be a Borel subset of dom ϕ such that A∩ϕ(A) = ∅. Since ν
is regular, there is a sequence (An ) of clopen subsets of 2N such that ν(An 4 A) → 0.
Consider the set A0n := An \ϕ(An ). Note that since ϕ is a partial homeomorphism,
A0n is still clopen, and by definition A0n is disjoint from ϕ(A0n ) so the involution Iϕ,A0n
belongs to [Φ]c−inv . We now have
Z
Z
d˜Φ (Iϕ,A , Iϕ,A0n ) ) =
dΦ (ϕ(x), x) +
dΦ (x, ϕ(x))
A\A0n
A0n \A
Z
Z
−1
+
dΦ (ϕ (x), x) +
dΦ (x, ϕ−1 (x))
ϕ(A\A0n )
=2µ(A0n 4 A).
ϕ(A0n \A)
Moreover since ν(An 4 A) → 0, since ϕ preserves the measure and since A is disjoint
from ϕ(A), a straightforward computation yields µ(A0n 4 A) → 0. We conclude that
d˜Φ (Iϕ,A , Iϕ,A0n ) ) → 0 as desired.
Let us now show that the similar statement that [Φ]c is dense in [Φ]1 is not true
in general.
28
Example 3.27. Consider the odometer T0 on 2N . For every word s with letters
in {0, 1}, we let Ns ⊆ 2N be the set of infinite words which start by s. For every
n ∈ N, let ϕn be the restriction of T0 to N1n 0 , and then let Φ = {ϕn : n ∈ N}.
It is easily checked that the topological full group [Φ]c is the group S2∞ of dyadic
permutations. In particular [Φ]c is locally finite, hence contained in D([Φ]1 ). We
conclude from Theorem 3.26 that [Φ]c = D([Φ]1 ).
However the L1 full group of Φ is equal to the L1 full group of T0 since up to
measure zero they induce the same graph. But T0 has index 1 (see Definition 4.3)
hence cannot belong to D([T0 ]1 ) = D([Φ]1 ), and we conclude that [Φ]c is not dense
in [Φ]1 .
It is well-known that every countable group Γ of measure-preserving transformation of (X, µ) is up to measure zero conjugate by a measure-preserving isomorphism
to a group of homeomorphism of the Cantor space preserving a Borel probability
measure ν (see for instance [Gla03, Thm. 2.15]). Here we check that the same can
be done for graphings so as to be able to apply our density result above in the right
level of generality.
Recall that the group of homeomorphisms of the Cantor space is canonically
isomorphic to the group of automorphisms of the Boolean algebra of clopen subsets
of the Cantor space. Furthermore, the Boolean algebra of clopen subsets of the
Cantor space is the unique countable atomless Boolean algebra (see for instance
[GH09, Chap. 16]). We can now state and prove that any graphing is conjugate to
a continuous one up to measure zero.
Proposition 3.28. Let (X, µ) be a standard Borel space, and let Φ be a graphing
on X. Then there exists a Borel probability measure ν on 2N , a continuous graphing
Ψ on (2N , ν), a Φ-invariant full measure Borel subset X0 of X and Borel measurepreserving injection T : (X0 , µ) → (2N , ν) and a continuous graphing Ψ on 2N such
that
ΨT (X0 ) = T ΦX0 T −1 .
Proof. Let C be a countable separating family of Borel sets containing X. Let D
be set of finite Boolean combinations of sets of the form w(C) or w−1 (C) for w a
Φ-word and C ∈ C. Then D is countable separating, contains the domain and range
of every ϕ ∈ Φ, and is Φ-invariant in the sense that for every ϕ ∈ Φ and D ∈ D,
ϕ±1 (D) ∈ D.
Each atom of D is a singleton since D contains a separating family. Let A be
the reunion of the atoms of D, then A is countable and hence has measure zero. Let
X0 := X \ A, and consider the Boolean algebra DX0 := {D ∩ X0 : D ∈ D}. induced
by D on X0 .
By Stone duality, DX0 is isomorphic to the algebra of clopen subsets of its Stone
space Y . Since DX0 is a countable atomless algebra its Stone space Y is homeomorphic to 2N so we may as well assume that Y = 2N .
By construction every ϕ ∈ Φ induces a Boolean algebra isomorphism between the
Boolean algebra induced by DX0 on dom ϕ and the Boolean algebra induced by DX0
on rng ϕ, so every ϕ ∈ Φ induces a homeomorphism ϕ̃ between the corresponding
clopen subsets of Y . Let Ψ = {ϕ̃ : ϕ ∈ Φ}, we will check that such a continuous
graphing works.
29
We define a map T : X0 → Y by associating to every x ∈ X0 the unique element
T (x) of the Stone space of DX0 defined by x. Since DX0 contains a separating family
of X0 , the map T is injective. Moreover it conjugates the restriction ΦX0 and ΨT (X0 )
by the definition of Ψ. Finally the map T is also Borel since the preimage of a clopen
set belongs to DX0 , so by putting ν = T∗ µ we get the desired statement.
4
L1 full groups of Z-actions
We now focus on L1 full groups of Z-actions, for which we can say a lot more. The
main feature is that for Z-actions, L1 full groups become invariants of flip-conjugacy.
To see this, we need the following fundamental result of Belinskaya.
Theorem 4.1 (Belinskaya, [Bel68]). Let T and T 0 be two ergodic transformations
with the same orbits, and suppose furthermore that T 0 ∈ [T ]1 . Then there exists
S ∈ [T ] such that either
T = ST 0 S −1 or T −1 = ST 0 S −1 .
With this in hand, we can now prove that L1 full groups of ergodic Z-actions are
complete invariants of flip conjugacy.
Theorem 4.2. Let T and T 0 be two measure-preserving ergodic transformation of
a standard probability space (X, µ). Then the following are equivalent:
(1) T and T 0 are flip-conjugate;
(2) the groups [T ]1 and [T 0 ]1 are abstractly isomorphic;
(3) the groups [T ]1 and [T 0 ]1 are topologically isomorphic.
Proof. Clearly (1) implies (3) and (3) implies (2). Suppose that (2) holds and let
ψ : [T ]1 → [T 0 ]1 be an abstract group isomorphism. By Corollary 3.18, there is
S ∈ Aut(X, µ) such that for all U ∈ [T ]1 , we have
ψ(U ) = SU S −1 .
In particular, we have that ST S −1 ∈ [T 0 ]1 . Since ψ is surjective, ST S −1 must
have the same orbits as T 0 . So by Belinkskaya’s Theorem 4.1, ST S −1 and T 0 are
flip-conjugate, so T and T 0 are flip-conjugate. So (2) implies (1), which ends the
proof.
4.1
The index map
One of the specific features of L1 full groups of aperiodic Z-actions is the existence
of a natural homomorphism into R, given by integrating the corresponding cocycles.
We will see later that in the ergodic case, it actually takes values into Z.
30
Definition 4.3. Let T ∈ Aut(X, µ) be ergodic. The index of S ∈ [T ]1 is defined
by
Z
cS (x)dµ(x),
IT (S) :=
X
where cS is the cocycle associated to S ∈ [T ]. When the transformation T we are
considering is clear from the context, we will also simply write the index map as I.
From the cocycle identity cSS 0 (x) = c0S (S(x)) + cS (x) and the fact that elements
of [T ]1 are measure preserving we deduce that the index map is a homomorphism.
We will denote its kernel by [T ]0 .
Our first observation is that taking induced transformations does not change
the index. The proof is very similar to that of Kac’s formula, which should be no
surprise since Kac’s formula corresponds to the case S = T .
Proposition 4.4. Let S ∈ [T ]1 , and let A ⊆ X intersect every non trivial S-orbit.
Then we have the equality
I(SA ) = I(S).
Proof. For all n ∈ N, let An := {x ∈ X : TA (x) = T n (x)}. Then the An ’s form a
partition of A. For all n ∈ N and all 0 6 m < n, we let Bn,m := T m (An ). The
family (Bn,m )06m<n is a partition of the support of S since A intersects every non
trivial S-orbit. We now compute
Z
I(SA ) = cSA (x)dµ(x)
A
XZ
cSA (x)dµ(x)
=
An
n∈N
=
n−1
X
XZ
cS (S m (x))dµ(x),
An m=0
n∈N
the last equality being a consequence of the cocycle identity. We deduce that
I(SA ) =
n−1 Z
XX
An
n∈N m=0
=
XZ
n∈N
Z
cS (S m (x))dµ(x)
cS (x)dµ(x)
Bn,m
=
cS (x)dµ(x)
supp S
I(SA ) = I(S)
The following corollary can also be obtained directly by noting that if S ∈ [T ]1 ,
then on every finite S-orbit the average of nS must be equal to zero.
Corollary 4.5. Let T ∈ Aut(X, µ) be aperiodic. Every periodic element of [T ]1 has
index zero.
31
Proof. Let S ∈ [T ]1 be a periodic element, let A ⊆ X be a fundamental domain
for S (see the paragraph following Definition 2.3). Then SA = idX by definition so
I(SA ) = 0. By the previous proposition we conclude that I(S) = I(SA ) = 0.
One can completely describe the ergodic elements of the L1 full group of T ∈
Aut(X, µ) which are conjugate to T in terms of their index. This will be very useful
to us in the next section.
Theorem 4.6 (Belinskaya, [Bel68, Thm. 3.8]). Let T ∈ Aut(X, µ) be an ergodic
transformation, and let T 0 ∈ [T ]1 . Then T and T 0 are flip-conjugate iff T 0 is ergodic
and I(T 0 ) = ±1.
4.2
A characterization of supports of n-cycles
In full groups of aperiodic equivalence relations, every Borel set is the support of an
involution. Here we will see that this is not true in general for L1 full groups and
give a complete characterization of sets which arise as supports of involutions, or
more generally of n-cycles.
Definition 4.7. A measure-preserving transformation T is an n-cycle if every T orbit has cardinality either 1 or n.
Note that if p is prime, a p-cycle is precisely an element of Aut(X, µ) of order p.
Our result is that n-cycles in L1 -full groups arise only in the most obvious manner:
for instance there is an involution whose support is equal to X if and only if there
exists a Borel set B such that X = B t T (B).
Theorem 4.8. Let T be a measure-preserving ergodic transformation, let A be a
Borel subset of X and let n ∈ N. Then A is equal to the support of an n-cycle if
and only if there is B ⊆ A such that
A = B t TA (B) · · · t TAn−1 (B)
Remark. We should point out however that every Borel set arises as the support
of a periodic transformation all whose orbits have cardinality at most 3 (see Lemma
4.24).
Proof of Theorem 4.8. The sufficiency of the condition is easy: since TA ∈ [T ]1 by
Kac’s formula (see Prop. 3.5), if A = B t TA (B) · · · t TAn−1 (B) we can define an
n-cycle T0 ∈ [T ]1 whose support equates A by putting
F
i
if x ∈ n−2
TA (x)
i=0 TA (B)
−n−1
n−1
T0 (x) =
T
(x)
if x ∈ TA (B) .
A
x
else.
For the converse, let us recall that if G 6 Aut(X, µ) and A is a Borel subset of
X, we let GA denote the group of elements of G supported in A. Observe that if T ∈
Aut(X, µ) then for all x, y ∈ A we have dT (x, y) > dTA (x, y) so that [T ]1 A 6 [TA ]1
(we will see in Theorem 5.2 that the inclusion is actually strict). This observation
will be used implicitly in what follows.
32
Suppose that A is the support of an n-cycle T0 , let C be a fundamental domain
for T0 , and consider the transformation S = TC T0 whose support also equates A and
satisfies
A = C t S(C) t · · · t S n−1 (C).
By Proposition 2.5 the restriction of S to A is ergodic. Moreover note that TC =
(TA )C so the the TA -index of TC is ITA (TC ) = 1 by Proposition 4.4. Since T0 is
periodic, its TA -index is equal to 0 by Corollary 4.5 and we conclude that
ITA (S) = 1.
By applying Belinskaya’s theorem 4.6 to the restriction of S to A which is ergodic,
we conclude that TA and S are conjugate by a measure-preserving transformation
U supported in A. But recall that A = C t S(C) t · · · t S n−1 (C) so we have
A = U (C) t TA (U (C)) · · · t TAn−1 (U (C)) hence TA satisfies the desired conclusion
with B := U (C).
Example 4.9. Let T ∈ Aut(X, µ) be a weakly mixing transformation. Then for all
n ∈ N, there is no n-cycle in [T ]1 whose support equates X.
Remark. The existence of B ⊆ A such that A = B t TA (B) · · · t TAn−1 (B) is a
spectral property of TA : it is equivalent to the associated unitary operator on L2 (A)
having e2iπ/n as an eigenvalue.
4.3
The L1 full group is generated by induced transformations
along with periodic transformations
We will now use the index map to find a nice generating set for [T ]1 . Our ideas are
in the direct continuation of Belinskaya’s paper [Bel68]. Let us start by analyzing
the action of elements of [T ]1 on the T -orbits.
A sequence (nk )k∈N of integers is called almost positive if for all but finitely
k ∈ N, we have nk > 0. It is called almost negative if (−nk )k∈N is almost positive,
and a sequence which is either almost negative or almost positive is called almost
sign invariant. It is an easy exercise to check that an injective sequence is almost
positive iff it tends to +∞, while it is almost negative iff it tends to −∞. The
following lemma thus implies that under the identification of a T -orbit with Z via
k 7→ T k (x), every forward S-orbit either tends to +∞ or −∞.
Lemma 4.10 ([Bel68, Thm. 3.2]). Let T ∈ Aut(X, µ) be aperiodic and S ∈
[T ]1 . For almost every x ∈ X such that the S-orbit of x is infinite, the sequence
sign(cS k (x)) is almost sign invariant.
Definition 4.11. An element S ∈ [T ]1 such that for all x ∈ supp S, the sequence
(cS k (x))k∈N is almost positive is called almost positive. If for every x ∈ supp S
the sequence (cS k (x))k∈N is almost negative, we say that S is almost negative.
Note that every almost positive or almost negative element has to be aperiodic
when restricted to its support. Also the inverse of an almost positive element is
almost negative and vice-versa. We have a natural order on every T -orbit which
allows for a more natural formulation of the previous definition.
33
Definition 4.12. Let T ∈ Aut(X, µ) be aperiodic. We define a partial order 6T on
X by x 6T y if y = T n (x) for some n > 0.
Note that 6T is total when restricted to a T -orbit, and that such a restriction
corresponds to the natural ordering 6 on Z via n 7→ T n (x).
We may now reformulate the previous definition as: S ∈ [T ]1 is almost positive
if for almost every x ∈ supp S, S k (x) >T x for all but finitely many k ∈ N.
Proposition 4.13. Let T ∈ Aut(X, µ) be aperiodic. Every element s ∈ [T ]1 can be
written as a product S = Sp S+ S− , where Sp is periodic, S+ is almost positive, S− is
almost negative and these three elements have disjoint supports.
Proof. Let S ∈ [T ]1 . The set of x ∈ X such that the sequence (cS k (x))k∈N is
almost positive (respectively almost negative) is S-invariant. Call this set A+ (respectively A− ). Finally let Ap denote the set of x ∈ X whose S-orbit is finite.
Then (A− , A+ , Ap ) is a partition of X by the previous lemma, and since they are
S-invariant we deduce that S = SA− SA+ SAp . Clearly Sp := SAp , S+ := SA+ and
S− := SA− are as wanted.
Definition 4.14. Let T ∈ Aut(X, µ) be aperiodic. If S ∈ [T ]1 , we say that S is
positive if S(x) >T x for all x ∈ X.
The proof of the following proposition uses the same ideas as in [Bel68, Lem.
3.5].
Proposition 4.15. Let T ∈ Aut(X, µ) be aperiodic, and let S ∈ [T ]1 be almost
positive. Then there exists a positive element S 0 ∈ [T ]1 whose support is a subset of
supp S such that SS 0 −1 and S 0 −1 S are periodic.
Proof. Consider the set A := {x ∈ X : S k (x) >T x for all k > 0}. Note that TA (x)
may be defined as the first element greater than x which belongs to A, so by the
definition of A we have TA (x) 6T SA (x) for all x ∈ A.
Let us show that A intersects every non trivial S-orbit. Let x ∈ supp S. Since
S is almost positive, the sequence (nS k (x))k∈N is almost positive. Let k be the last
natural integer such that nS k (x) 6 0, then by definition S k (x) ∈ A as wanted.
Now for all x ∈ A we have SA (x) >T TA (x) >T x, in particular SA is positive.
Since A intersects every S-orbit, we moreover have that SSA−1 and SA−1 S are periodic,
so S 0 := SA is as desired.
Lemma 4.16. Let T ∈ Aut(X, µ) be aperiodic, let S ∈ [T ]1 be positive and let
A = supp S. Then STA−1 is positive.
Proof. Since S is positive, we have A = {x ∈ X : S(x) >T x}. But then by the
definition of TA ,for all x ∈ A we have S(x) >T TA (x). Since A is TA -invariant, we
deduce that for all x ∈ A, STA−1 (x) >T x. But the support of STA−1 is contained
in A so the previous inequality actually holds for all x ∈ X, and we conclude that
STA−1 is positive.
34
Proposition 4.17. Let T ∈ Aut(X, µ) be ergodic. Then every positive element is
the product of finitely many transformations which are induced by T : for all S ∈ [T ]+
1
there exists k ∈ N and A1 , ..., Ak ⊆ X such that
S = TA1 · · · TAk .
In particular, the index of a positive element is a (positive) integer.
Proof. Note that the index of a positive element has to belong to [0, +∞[, and that
the index of a positive element S is null if and only if S = idX . We prove the result
by induction on bI(S)c.
First, if bI(S)c = 0, suppose towards a contradiction that S is non-trivial. let
A = supp S, by the previous lemma STA−1 is positive. Since T is ergodic, A intersects
almost every T -orbit. Proposition 4.4 thus yields that I(TA ) = I(T ) = 1. So
I(STA−1 ) = I(S) − 1 < 0, but STA−1 is positive, a contradiction.
The inductive step is basically the same: if bI(S)c = n + 1 for some n ∈ N, the
support A of S is nontrivial so that S = TA S 0 where bI(S 0 )c = n.
Theorem 4.18. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set
P er([T ]1 ) ∪ Ind([T ]1 ), where P er([T ]1 ) is the set of periodic elements in [T ]1 and
Ind([T ]1 ) is its set of transformations induced by T .
Proof. By Proposition 4.13 the group [T ]1 is generated by almost positive elements
along with periodic elements. Now every almost positive element is the product of a
positive element by a periodic element (Proposition 4.15) and every positive element
is the product of finitely many induced transformations (Proposition 4.17).
Corollary 4.19. Let T ∈ Aut(X, µ) be ergodic, then [T ]1 is generated by the set
P er([T ]1 ) ∪ {T }, where P er([T ]1 ) is the set of periodic elements in [T ]1 .
Proof. If A is a non-null subset of X, then by ergodicity A intersects almost every T orbit so that TA−1 T is periodic. In other words every induced transformation belongs
to the group generated by periodic elements along with T , and since by the previous
theorem periodic elements along with induced transformations generate [T ]1 we are
done.
Corollary 4.20. Let T ∈ Aut(X, µ) be ergodic. Then D([T ]1 ) is equal to the following three groups:
• the group generated by periodic elements,
• the group topologically generated by involutions and
• the kernel of the index map.
Moreover we have the following short exact sequence
I
1 → D([T ]1 ) → [T ]1 →
− Z → 1.
35
Proof. Denote by Gper the group generated by periodic elements in [Φ]1 , and by
Ginv the group topologically generated by involutions. Note that both are normal
subgroups of [T ]1 . By Lemma 3.10, we have Gper 6 Ginv 6 D([T ]1 ). Since the index
map is continuous and takes values in an abelian group, we also have D([T ]1 ) 6
Ker (I).
Let S ∈ [T ]1 . We may write S as a product of periodic elements and powers
of T by the previous corollary. So modulo Gper , we have S = T n for some n ∈ Z.
So I(S) = n and we conclude that the index map takes values into Z. Moreover if
S ∈ Ker (I) we infer that n = 0 so that S ∈ Gper . So Gper = Ker (I) and since we
have already established that Gper 6 Ginv 6 D([T ]1 ) 6 Ker (I), we conclude that
all these four normal subgroups are equal.
Remark. Note that for topological full groups, the kernel of the index map can be
larger than the derived group due to the fact that some involutions may not belong
to the derived group. Matui has obtained a complete description of the quotient of
the kernel of the index map by the derived group, see [Mat06, Thm. 4.8].
4.4
Escape time and non-simplicity results
In this section, we show that the closure of the derived group of [T ]1 is never simple.
To this end, we will use the non-integrability of certain escape times.
Let us first recall that given a standard probability space (X, µ), its measure
algebra is denoted by MAlg(X, µ) and consists of all Borel subsets of X, two such
sets being identified if their symmetric difference has measure zero.
It is naturally endowed with a metric dµ defined by dµ (A, B) = µ(A 4 B) which
is complete and separable (see [Hal50, 40.A]).
Definition 4.21. Let T ∈ Aut(X, µ) and A ∈ MAlg(X, µ). The T -escape time of
A is the map τA : A → N defined by
• τA (x) = +∞ if there is no n ∈ N such that T n (x) 6∈ A,
• else τA (x) is the the first integer n ∈ N such that T n (x) 6∈ A or T −n (x) 6∈ A.
By Kac’s theorem, for any Borel set A ⊆ X the T -return time to A is integrable
and its integral is equal to 1. The situation for escape times is however very different.
Indeed, any non-null T -invariant set fails to have an integrable escape time so a
non ergodic transformation admits non-trivial sets with non-integrable escape time.
This is actually true of any measure-preserving transformation in a strong sense as
the following result shows.
Theorem 4.22. Let T be a measure-preserving transformation. Then there is a
dense Gδ of A ∈ MAlg(X, µ) whose T -escape time is not integrable.
Proof. For n ∈ N, let Fn be the set of A ∈ MAlg(X, µ) whose escape time is either
non integrable or has L1 norm stricly bigger than n. We have to show that each Fn
is open dense. To see that Fn is open, first note that for a fixed k ∈ N, if we let
Ak := {x ∈ A : nA (x) = k} then
!
k
[
Ak+1 = A \
Al ∩ T −(k+1) (A) ∪ T k+1 (A)
l=1
36
so that Ak depends continuously
P on A. Now take A ∈ Fn , by definition we may find
N ∈ N big enough so that N
k=1 kµ(Ak ) > n. Such an inequality will remain true
0
for A sufficiently close to A by continuity, so that Fn is indeed open.
Next, to check the density, we will be done if we can build a sequence (Am ) such
that kτAm k1 → +∞ but µ(Am ) → 0. Indeed, then A ∪ Am converges to A and for
any n ∈ N, it belongs to Fn for m large enough.
If the ergodic decomposition of T has a diffuse part, there is a sequence of T invariant sets (Am ) such that µ(Am ) → 0 and kτAm k1 = +∞ by T -invariance.
If the ergodic decomposition of T does not have a diffuse part, then T has to be
aperiodic. So we apply Rohlin’s lemma to T for N = 6m , = 21 to get Bm ⊆ X all
whose first 6m translates are disjoint such that 2·61m 6 µ(Bn ) 6 61n . Let
An :=
4m
−1
G
T i (Bm )
i=0
be the reunion of the first 4m translates of the base Bm of the Rohlin tower. We
now compute the integral of the escape time:
4m /2−1
Z
τAm = 2µ(Bm )
Am
= 2µ(Bm ) ·
1 16m
> m·
6
8
X
(i + 1)
i=0
m
4m 42
2
+1
2
which tends to +∞ while µ(Am ) 6 ( 46 )m tends to zero as m tends to +∞.
Remark. For any T ∈ Aut(X, µ) of rank one, it is easily checked that the set of
A ∈ MAlg(X, µ) whose T -escape time is bounded is also dense, but I do not know
wether this is true for any T ∈ Aut(X, µ).
The following corollary of Theorem 4.22 is in sharp contrast with the situation
for full groups of ergodic measure-preserving equivalence relations, which act transitively on elements of MAlg(X, µ) of the same measure.
Corollary 4.23. Let T ∈ Aut(X, µ) be ergodic. There is a dense Gδ of A ∈
MAlg(X, µ) such that for every B ∈ MAlg(X, µ) disjoint of A of the same measure, no element of [T ]1 maps A to B.
Proof. If T maps A to a set disjoint from A, then by definition the L1 -norm of T is
an upper bound of the integral of the escape time of A. By the previous theorem,
this cannot happen for a dense Gδ of A ∈ MAlg(X, µ).
We will now refine the preceding result to establish that for all T ∈ [R] aperiodic,
neither the derived group of [T ]1 nor its closure are simple. We will need the following
lemma, which is essentially contained in [Fat78].
Lemma 4.24. Let T ∈ Aut(X, µ) be aperiodic. For every A ∈ MAlg(X, µ), there
exists a periodic U ∈ [T ]1 whose support is equal to A and all whose orbits have
cardinality at most 3.
37
Proof. Consider the induced transformation TA , which belongs to [T ]1 by Proposition 3.5. Since T is aperiodic, supp TA = A. By a maximality argument, there
is a partition (A1 , A2 , B1 , B2 , B3 ) of A such that TA (A1 ) = A2 , TA (B1 ) = B2 and
TA (B2 = B3 ) (see [Fri70, Lem. 7.2]). We then have a naturally defined periodic
element U ∈ [T ]1 given by
TA (x) if x ∈ A1 t B1 t B2
−1
TA (x) if x ∈ A2
U (x) =
T −2 (x) if x ∈ B3
A
x
else.
It is easily checked that U is as desired.
Lemma 4.25. Let T ∈ Aut(X, µ) be aperiodic. For every Borel A ⊆ X, there exists
U ∈ D([T ]1 ) whose support is equal to A and all whose orbits have cardinality at
most 3.
Proof. Consider the transformation U ∈ [T ]1 provided by the previous lemma. Observe that U = U2 U3 where U2 is the transformation induced by U on the set of
points whose U -orbit has cardinality 2, and U3 is the transformation induced by U
on the set of points whose U -orbit has cardinality 3.
U3 is a commutator by the equality (1 2 3) = (1 2)(1 3)(1 2)(1 3) in the
symmetric group over {1, 2, 3}.
Let C be a fundamental domain of the restriction of U2 to its support. Applying
the above lemma again, we find V ∈ [T ]1 all whose orbits have cardinality at most 3
such that supp V = C. We then let Ũ2 = U2 V U2 V −1 ∈ D([T ]1 ) which has the same
support as U2 . Now U 0 = Ũ2 U3 is as desired.
If every A ∈ MAlg(X, µ) were the support of an involution belonging to [T ]1 , one
could take U from the previous lemma to be an involution. However X itself may
fail to be the support of an involution (see Theorem 4.8 and the example thereafter).
Theorem 4.26. Let T ∈ Aut(X, µ) be ergodic. Then neither D([T ]1 ) nor D([T ]1 )
are simple.
The previous theorem follows trivially from the following statement which we
will prove using Theorem 4.22.
Lemma 4.27. Let T ∈ Aut(X, µ) be ergodic. Then there exists S1 , S2 ∈ D([T ]1 )
such that S1 cannot be written as a product of conjugates of S2±1 by elements of [T ]1 .
Proof. Take A ∈ MAlg(X, µ) whose escape time is not integrable, which exists by
Theorem 4.22.
By Lemma 4.25, we may fix S1 ∈ D([T1 ]) whose support is equal to A and
S2 ∈ D([T ]1 ) whose support B is disjoint from A. Now assume
S1 is a product of
S
conjugates of S2±1 by T1 , ..., Tn ∈ [T ]1 . We must have A ⊆ ni=1 Ti (B), but then the
integral of the escape time of A must be less than
n
X
dT (Ti−1 , idX ) < +∞,
i=1
a contradiction.
38
Remark. The two above results result are also true in the more general aperiodic
case, but the non-trivial case is the ergodic one. Indeed, in the non-ergodic case we
can directly use Lemma 4.25 to build two non-trivial elements in D([Φ]1 ) whose supports are T -invariant and disjoint, so the normal subgroups they generate actually
intersect trivially.
4.5
Density of topological full groups, amenability and finiteness of the topological rank
Theorem 4.28. Let T be a homeomorphism of the Cantor space, and let ν be a
non-atomic ergodic probability measure preserved by T . Then the topological full
group [T ]c is dense in the L1 full group [T ]1 .
Proof. By Theorem 3.26, the group [T ]c contains D([Φ]1 ), in particular it contains
every periodic element of [Φ]1 by Lemma 3.10. By Corollary 4.19 the group [T ]1 is
generated by periodic elements along with T , and since T ∈ [T ]c we conclude that
[T ]c = [T ]1 .
So given a measure-preserving ergodic homeomorphism T of (2N , λ), we have the
following chain of Polish groups where each is dense in its successor:
[T ]c 6 [T ]1 6 [T ] 6 Aut(2N , ν).
I don’t know whether the above theorem can be generalised to other finitely generated groups acting by measure-preserving homeomorphisms. Recall however that
this result is wrong for graphings in general (see Example 3.27).
Recall that a topological group is amenable if all its continuous actions on compact spaces admit invariant probability measures. Note that if a topological group
contains a dense subgroup which is amenable as a discrete group, it has to be
amenable itself. We view countable groups as discrete groups. Juschenko and Monod
have shown that topological full groups of minimal Z-actions on the Cantor space are
amenable [JM13]. Since the Jewett-Krieger theorem ensures us that every ergodic
Z-actions can be modelled by a minimal uniquely ergodic homeomorphism (see e.g.
[Pet89]), the previous theorem has the following interesting application.
Theorem 4.29. Let T ∈ Aut(X, µ) be ergodic. Then its L1 full group [T ]1 is an
amenable topological group, and so is the closed subgroup D([T ]1 ).
It would be interesting to obtain a purely ergodic-theoretic proof of the previous
result. The same is true of our next result where we rely on Matui’s work on
finite generation of topological full groups (the commutator group of the topological
full group of a minimal homeomorphism is finitely generated if and only if the
homeomorphism is a subshift of finite type, see [Mat06, Thm. 5.4]). We should also
point out that our proof of (1)⇒(2) is a natural adaptation of his.
Theorem 4.30. Let T ∈ Aut(X, µ) be ergodic. Then the following are equivalent
1. the L1 full group [T ]1 is topologically finitely generated;
39
2. the closed subgroup D([T ])1 is topologically finitely generated;
3. the transformation T has finite entropy.
Proof. (1)⇒(3) Suppose that [T ]1 is topologically finitely generated, and let S1 , ..., Sk ∈
[T ]1 generate a dense subgroup of [T ]1 . For each i ∈ {1, ..., k} and each n ∈ Z let
Ai,n := {x ∈ X : cSi (x) = n}. Since S1 , ..., Sk ∈ [T ]1 , for every i ∈ {1, ..., k} we have
X
|n| µ(Ai,n ) < +∞
n∈Z
Lemma 2.13 thus yields that every partition (Ai,n )n∈N has finite entropy. The partiW
tion P := ki=1 (Ai,n )n∈Z thus has finite entropy. We will show that it is a generating
partition.
Let A be the algebra generated by the T -translates of P. Note that every element
of the group generated by S1 , ..., Sk must have a cocycle partition whose elements
belong to A.
Since P has finite entropy, in order to conclude that T has finite entropy we only
need to check that A is dense in MAlg(X, µ).
For every Borel set A the transformation induced by T on A has support equal to
A and can be approximated by elements of the group generated by S1 , ..., Sk in the
metric d˜T which refines the uniform metric du . So the supports of these transformations form a sequence (An ) whose elements belong to Q such that µ(An 4 A) → 0.
We can conclude that up to measure zero, Q generates the σ-algebra of X. As
explained before, this yields that T has finite entropy.
(3)⇒(2) : If T has finite entropy, Krieger’s finite generator theorem yields that
we can take T to be a minimal subshift of finite type [Kri72]. It then follows from
Matui’s result [Mat06, Thm. 5.4] that D([T ]c ) is finitely generated. So by Theorem
4.28 the Polish group D([T ]1 ) is topologically finitely generated.
(2)⇒(1): Suppose D([T ]1 ) is topologically finitely generated. It follows from
Corollary 4.20 that
[T ]1 = D([T ]1 ) o hT i ,
so [T ]1 is also topologically finitely generated.
We now give a concrete example where the topological rank is equal to 2.
Proposition 4.31. The topological rank of the L1 full group of an irrational rotation
is equal to 2.
Proof. The topological generators that Marks built in [Mar16] to show that the full
group of the ergodic hyperfinite equivalence relation is topologically 2-generated can
readily be used.
To be more precise, consider an irrational rotation Tα on [0, 1[ of irrational angle
α ∈ [0, 1[. Let β ∈ (0, α) be irrational and consider the involution ITα ,[0,β[ as defined
in the paragraph preceding Theorem 3.14.
The exact same proof as Marks’ shows that the group topologically generated by
Tα and ITα ,[0,β[ contains all the involutions ITα ,A where A is any Borel subset of [0, 1[
40
such that A ∩ Tα (A) = ∅ (indeed the uniform and the L1 topology coincide on the
set of involutions of the form ITα ,A so Marks’ proof readily applies). So the group
topologically generated by Tα and ITα ,[0,β[ contains D([Tα ]1 ) by Theorem 3.14. But
by Corollary 4.20 we have
[Tα ]1 = D([T ]1 ) o hT i ,
so the group topologically generated by Tα and ITα ,A is equal to [Tα ]1 which has
thus topological rank at most 2. Since [Tα ]1 is not abelian, we conclude that its
topological rank is equal to 2.
Remark. Matui’s work [Mat13, Prop. 3.2] can also be used to obtain the above
result for irrational rotations of angle α ∈ (0, 1/6).
5
5.1
Further remarks and questions
Non-amenability
Theorem 5.1. Let Γ be a finitely generated non amenable group acting freely in a
measure-preserving manner on (X, µ). Then neither [Γ]1 nor D([Γ]1 ) are amenable.
Proof. Let Γ be a finitely generated non amenable group acting freely in a measurepreserving manner on (X, µ). It follows from Theorem 3.7 that [Γ]1 is dense in
[RΓ ] for the uniform topology. Since Γ is infinite and acting freely, the equivalence
relation RΓ is aperiodic so the group [RΓ ] is perfect by [LM14b, Prop. 3.6]. So
D([Γ]1 ) is also dense in [RΓ ]. Furthermore, the group [RΓ ] is non-amenable for the
uniform topology by [GP07, Prop. 5.6]. So the dense subgroups [Γ]1 and D([Γ]1 )
are not amenable for the uniform topology, in particular they are not amenable for
the thinner L1 topology.
It would be very interesting to understand which amenable groups admit free
actions whose L1 full groups are amenable. Note that by Theorem 4.29, all the free
ergodic Z-actions induce an amenable L1 full group.
5.2
Absence of a natural closure property
Full groups as defined by Dye are stable under cutting and pasting a countable
family of elements along a countable partition of X. Here L1 full groups are only
stable under cutting and pasting a finite family of elements, and it seems natural
to wonder if they can be more abstractly characterised. Here we show that L1 full
groups are not “stable under L1 cutting and pasting”, showing that the most natural
closure property one could hope for does not hold.
Theorem 5.2. There exists an ergodic measure-preserving transformation T and a
non-null Borel set A ⊆ X such that [TA ]1 66 [T ]1 .
Remark. A reformulation of the theorem is that the inclusion [T ]1 A 6 [TA ]1 can be
strict. In particular, given S ∈ [T ]1 , it can happen that [S]1 66 [T ]1 .
41
Proof. We fix a Borel partition (Xn )n>1 of X such that for every n ∈ N, µ(Xn ) = 2−n .
4n −1
We then cut each Xn into 4n pieces (Bn,m )m=0
of equal measure (so µ(Bn,m ) = 8−n ).
Let T0 be a periodic transformation such that
• for all n ∈ N and m ∈ {0, ..., 4n − 2}, one has T0 (Bn,m ) = Bn,m+1 and
n
• for all n ∈ N and x ∈ Bn,0 one has T04 +1 (x) = x.
F
Then the set B0 := n∈N Bn,0 is a fundamental domain for T0 . Let U be a
measure-preserving transformation such that supp U = B0 and UB0 is ergodic, and
consider T := U T0 . By Proposition 2.5, T is ergodic. Moreover for all n ∈ N and
m ∈ {0, ..., 4n − 1} we have T (Bn,m ) = Bn,m+1 . Now for all n ∈ N we let
An :=
n −1
2G
Bn,2n m
m=0
and then A :=
G
An .
n∈N
Consider the transformation TA , and note that by construction for all n ∈ N,
n
all m ∈ {0, 2n − 2} and all x ∈ Bn,2n m we have TA (x) = T 2 (x). Now consider the
involution Un defined by
4n /2
F n /2−1
Bn,2n m
(x) if x ∈ 2m=0
T
F2n −1
n /2
−4
Un (x) =
T
(x) if x ∈ m=2n /2 Bn,2n m
x
else.
TA
T
B2,0
B2,3
B2,7
B2,11
U3
Figure 1: The construction of U3 . The set A3 is the gray part of the figure.
Note that for all x ∈ An we have dT (x, Un (x)) = 4n /2. We can then compute
dT (Un , idX ) =
n −1 Z
2X
m=0
n
Bn,2n m
n
4
2
×
n
8
2
1
=
2
=
42
dT (x, Un (x))
Also for all x ∈ An we have dTA (x, Un (x)) = 2n /2 so the same computation as before
yields
1
2n 2n
= n+1
dTA (Un , idX ) = n ×
8
2
2
Let U be the involution obtained by gluing together all the Un ’s, namely for all
x∈X
Un (x) if x ∈ An for some n ∈ N,
U (x) =
x
else.
We clearly have
X
X1
= +∞
2
n∈N
n∈N
X
X 1
1
and dTA (U, idX ) =
dTA (Un , idX ) =
= < +∞.
n+1
2
2
n∈N
n∈N
dT (U, idX ) =
dT (Un , idX ) =
We conclude that U witnesses the fact that [TA ]1 66 [T ]1 .
Recall that two actions of finitely generated groups Γ and Λ are L1 orbit equivalent if up to a measure-preserving transformation, they share the same orbits and
for every λ ∈ Λ and γ ∈ Γ, the maps
x 7→ dΓ (x, λ(x)) and x 7→ dΛ (x, γ(x))
are integrable, where dΓ and dΛ are respective Schreier graph distances (see e.g.
[Aus16] for more on this notion). Here we note that although sharing the same L1
full group implies L1 orbit equivalence, the converse does not hold a priori.
Corollary 5.3. There exists two measure-preserving actions of the free group on two
generators F2 such that the identity map is an L1 -orbit equivalence between them but
they do not share the same L1 full group.
Proof. Write F2 = ha, bi, fix T ∈ Aut(X, µ) and A ⊆ X as in the proof of the
previous theorem. Define a measure-preserving F2 -action α1 by α1 (a) = T and
α2 (b) = T . Then define a second action α2 by α2 (a) = TA and α2 (b) = T TA−1 . Since
TA ∈ [T ]1 these two actions are L1 orbit equivalent via the identity map. However
a map U as in the proof of the previous theorem belongs to the L1 full group of α2 ,
but not to the L1 full group of α2 .
Remark. Obviously L∞ orbit equivalence implies conjugacy of the L1 full groups.
It would be interesting to understand wether the converse holds.
5.3
Lp full groups
Let p ∈ [1, +∞]. One can then define Lp full group [Φ]p of a graphing Φ on a
standard probability space (X, µ) by letting
[Φ]p = {T ∈ [RΦ ] : the map x 7→ dΦ (T (x), x) belongs to Lp (X, µ)} .
43
The triangle inequality and Minkowski’s inequality yield that [Φ]p is indeed a group,
and the natural distance d˜pΦ given by
d˜pΦ (S, T ) = kx 7→ dΦ (S(x), T (x))kp
is right-invariant, complete and refines the uniform topology. Moreover Hölder’s
inequality implies that [Φ]q 6 [Φ]p whenever p < q. Note that the L∞ full group
is discrete since dΦ takes values in Z. It is also uncountable hence we view it as a
degenerate case. For p < +∞ however, one can show exactly like for p = 1 that [Φ]p
is separable, so that it is also a Polish group.
The proof that [Φ]1 is dense in [RΦ ] actually implies that [Φ]∞ is dense in [RΦ ]
so that all the [Φ]p are dense in [RΦ ]. Also D([Φ]∞ ) is dense in D([Φ]p ) for all
p ∈ [1, +∞[, but it is not clear wether [Φ]p is dense in [Φ]q for q < p.
The main difference with L1 full groups is that for p > 1 the Lp full groups are
not stable under taking induced transformations. Indeed, given a set A such that
0 < µ(A) < 1 and a map f : A → N of integral 1, one can use Lemma 2.4 to build a
measure-preserving ergodic transformation T whose return time to A equates f . So
if f was chosen not to be in Lp the transformation induced by T on A won’t belong
to the Lp full group of T .
If T is an ergodic measure-preserving transformation, the Lp full group of T is
a complete invariant of flip conjugacy since it also has many involutions and is a
subgroup of the L1 full group. The index map on [T ]1 restricts to its Lp full group
and yields a surjective homomorphism [T ]p → Z. The kernel of this homomorphism
clearly contains D([T ]p ) but it is unclear wether the converse holds, in which case we
would have that [T ]p is dense in [T ]q for q < p by arguments similar of those used for
Theorem 4.28. One way to establish the converse would be to obtain an analogue of
Theorem 4.18. To begin with, we can still write every element of [T ]p as a a product
of three elements of disjoint supports, the first being almost positive, the second
almost negative and the third periodic (the proof of 4.13 readily adapts). But the
problem is to understand wether almost positive elements admit a decomposition
as a product of periodic elements and induced transformations belonging to [T ]p (cf.
Prop. 4.14 and Prop. 4.16 for the case p = 1).
Since D([T ]1 ) = Ker I, a positive answer to the following general question would
also imply that D([T ]p ) = Ker I.
Question 5.4. Let Φ be an ergodic graphing. Is it true that for all p ∈]1, +∞[ we
have the equality
D([Φ]1 ) ∩ [Φ]p = D([Φ]p ),
where the closure in the left term is in the L1 topology while the closure in the right
term is in the Lp topology?
5.4
Questions
We close this paper by recalling some questions scattered through the text and
asking a few more. The first was contained in the previous section.
Question 5.5. Let 1 6 p < q 6 +∞. Is it true that [Φ]q is dense in [Φ]p ?
44
Note that a positive answer for q = +∞ yields a positive answer for every
1 6 p < q 6 +∞. When Φ is a continuous graphing, we obviously have [Φ]c 6 [Φ]∞ .
We thus also ask:
Question 5.6. Let Φ be a finite continuous graphing and 1 6 p < +∞. Is it true
that [Φ]c is dense in [Φ]p ?
Note that the answer is negative if we remove the condition that Φ is finite
(cf. Example 3.27). We have seen that the L1 full group of an ergodic measurepreserving transformation T is topologically finitely generated if and only if T has
finite entropy, and gave examples where the topological rank of [T ]1 is equal to 2.
One could hope that there is a formula linking the topological rank to entropy as is
true for cost and topological rank of full groups [LM14a], but for now we don’t even
know the answer to the following very basic and pessimistic question.
Question 5.7. Let T be an ergodic measure-preserving transformation of finite
entropy. Is the topological rank of [T ]1 necessarily equal to 2?
Using Lemma 2.1 from [Aus16], our proof that if [T ]1 is topologically finitely
generated then T has finite entropy can easily generalised to show that given a
measure-preserving ergodic free action of a finitely generated group Γ, if the L1 full
group of the action or the closure of its derived group are topologically finitely generated then the Γ-action has a generating partition of finite entropy (i.e. the action
has finite Rohlin entropy; see [Sew14] for more on Rohlin entropy). The following question is very general, but answering it for some non virtually cyclic infinite
amenable group would already be very nice (in the amenable case the Rohlin entropy
is equal to the usual entropy by a result of Seward and Tucker-Drob [STD14]).
Question 5.8. Let Γ be a finitely generated group acting freely and ergodically on
(X, µ). Suppose further that the action has finite Rohlin entropy. Is it true that
[Γ]1 has finite topological rank? That D([Γ]1 ) has finite topological rank?
It would also be interesting to try to generalise our structural results on L1 full
groups of ergodic Z-actions to Zn -actions. For instance, given a measure-preserving
ergodic Zn -action, one can still define an index map In : [Zn ]1 → Rn and ask for
analogues of Corollary 4.20.
Question 5.9. Does the index map In take values into Zn when the canonical
generators of Zn act ergodically? Is the kernel of In equal to the closure of the
derived group of [Zn ]?
Our positive answer to this question for n = 1 relied crucially on the decomposition of elements of [T ]1 as products of almost positive, almost negative and periodic
elements of disjoint supports, but it is not clear what an analogue of this in higher
dimension would be so that another approach is probably needed.
We should mention that in the case of a single ergodic measure-preserving transformation T , one can use the ideas from section 4.3 to show that the open unit ball
in [T ]1 only consists of periodic elements. Since those belong to D([T ]1 ) (cf. Lemma
3.10), this yields another way to prove that D([T ]1 ) is open. We thus ask:
45
Question 5.10. Let a finitely generated group Γ act freely on (X, µ) with all its
generators acting ergodically. When does the open unit ball in [Γ]1 only contain
periodic elements?
The fact that for an ergodic measure-preserving transformation T the open unit
ball of the L1 full group only contains periodic elements can be used to show that [T ]1
has Rosendal’s local property (OB) and is (OB) generated, so that by Rosendal’s
work it has a well defined quasi-isometry type as a topological group (see [Ros14]).
This will be the subject of a later work.
Finally, full groups of ergodic measure-preserving equivalence relations can be
seen as special cases of L1 full groups (see Example 3.2). They enjoy the automatic
continuity property as was shown by Kittrell and Tsankov [KT10, Thm. 1.5] and
hence admit a unique Polish group topology.
Question 5.11. Let Φ be an ergodic graphing. Does [Φ]1 satisfy the automatic
continuity property? Is its Polish group topology unique?
References
[Aus16]
Tim Austin. Behaviour of entropy under bounded and integrable orbit
equivalence. ArXiv e-prints, 2016.
[Bec98]
Howard Becker. Polish group actions: dichotomies and generalized elementary embeddings. J. Amer. Math. Soc., 11(2):397–449, 1998.
[Bel68]
R. M. Belinskaya. Partitions of lebesgue space in trajectories defined by ergodic automorphisms. Functional Analysis and Its Applications, 2(3):190–
199, 1968.
[CLM16] Alessandro Carderi and François Le Maître. Orbit full groups for locally
compact groups. accepted for publication in Transactions of the AMS,
2016.
[Dow11] Tomasz Downarowicz. Entropy in dynamical systems, volume 18 of New
Mathematical Monographs. Cambridge University Press, Cambridge, 2011.
[Dye59]
Henry A. Dye. On groups of measure preserving transformation. I. Amer.
J. Math., 81:119–159, 1959.
[EG14]
Amichai Eisenmann and Yair Glasner. Generic IRS in free groups, after
Bowen. to appear in Proc. Amer. Math. Soc., 2014.
[Fat78]
Albert Fathi. Le groupe des transformations de [0, 1] qui préservent la
mesure de Lebesgue est un groupe simple. Israel J. Math., 29(2-3):302–
308, 1978.
[Fre04]
D. H. Fremlin. Measure theory. Vol. 3. Torres Fremlin, Colchester, 2004.
Measure algebras, Corrected second printing of the 2002 original.
46
[Fri70]
Nathaniel A. Friedman. Introduction to ergodic theory. Van Nostrand
Reinhold Co., New York-Toronto, Ont.-London, 1970. Van Nostrand Reinhold Mathematical Studies, No. 29.
[FRW11] Matthew Foreman, Daniel J. Rudolph, and Benjamin Weiss. The conjugacy problem in ergodic theory. Ann. of Math. (2), 173(3):1529–1586,
2011.
[GH09]
Steven Givant and Paul Halmos. Introduction to Boolean algebras. Undergraduate Texts in Mathematics. Springer, New York, 2009.
[Gla03]
Eli Glasner. Ergodic theory via joinings, volume 101 of Mathematical
Surveys and Monographs. American Mathematical Society, Providence,
RI, 2003.
[GP07]
Thierry Giordano and Vladimir Pestov. Some extremely amenable groups
related to operator algebras and ergodic theory. J. Inst. Math. Jussieu,
6(2):279–315, 2007.
[GPS95] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Topological orbit equivalence and C ∗ -crossed products. J. Reine Angew. Math., 469:51–
111, 1995.
[GPS99] Thierry Giordano, Ian F. Putnam, and Christian F. Skau. Full groups of
Cantor minimal systems. Israel J. Math., 111:285–320, 1999.
[Hal50]
Paul R. Halmos. Measure Theory. D. Van Nostrand Company, Inc., New
York, N. Y., 1950.
[JM13]
Kate Juschenko and Nicolas Monod. Cantor systems, piecewise translations and simple amenable groups. Ann. Math. (2), 178(2):775–787, 2013.
[Kac47]
Mark Kac. On the notion of recurrence in discrete stochastic processes.
Bull. Amer. Math. Soc., 53:1002–1010, 1947.
[Kec10]
Alexander S. Kechris. Global aspects of ergodic group actions, volume
160 of Mathematical Surveys and Monographs. American Mathematical
Society, Providence, RI, 2010.
[Kri70]
Wolfgang Krieger. On entropy and generators of measure-preserving transformations. Trans. Amer. Math. Soc., 149:453–464, 1970.
[Kri72]
Wolfgang Krieger. On unique ergodicity. In Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability (Univ. California, Berkeley, Calif., 1970/1971), Vol. II: Probability theory, pages 327–
346. Univ. California Press, Berkeley, Calif., 1972.
[KT10]
John Kittrell and Todor Tsankov. Topological properties of full groups.
Ergodic Theory Dynam. Systems, 30(2):525–545, 2010.
47
[Lev95]
Gilbert Levitt. On the cost of generating an equivalence relation. Ergodic
Theory Dynam. Systems, 15(6):1173–1181, 1995.
[LM14a] François Le Maître. The number of topological generators for full groups
of ergodic equivalence relations. Invent. Math., 198:261–268, 2014.
[LM14b] François Le Maître. Sur les groupes pleins préservant une mesure de probabilité. PhD thesis, ENS Lyon, 2014. 2014ENSL0892.
[LM15]
François Le Maître. On full groups of non-ergodic probability measure
preserving equivalence relations. to appear in Ergodic Theory Dyn. Syst.,
2015.
[Mar16] Andrew Marks. Topological generators for full groups of hyperfinite pmp
equivalence relations. preprint, 2016.
[Mat06] Hiroki Matui. Some remarks on topological full groups of Cantor minimal
systems. Internat. J. Math., 17(2):231–251, 2006.
[Mat13] Hiroki Matui. Some remarks on topological full groups of Cantor minimal
systems II. Ergodic Theory Dynam. Systems, 33(5):1542–1549, 2013.
[Med07] Konstantin Medynets. On approximation of homeomorphisms of a Cantor
set. Fund. Math., 194(1):1–13, 2007.
[Mil05]
Benjamin David Miller. Density of topological full groups. Unpublished note available at https: // dl. dropboxusercontent. com/ u/
47430894/ Web/ notes/ density. pdf , 2005.
[Pet89]
Karl Petersen. Ergodic theory, volume 2 of Cambridge Studies in Advanced
Mathematics. Cambridge University Press, Cambridge, 1989. Corrected
reprint of the 1983 original.
[Ros14]
Christian Rosendal. Coarse geometry of topological groups. preprint,
2014.
[Sew14]
Brandon Seward. Krieger’s finite generator theorem for ergodic actions of
countable groups i. ArXiv e-prints, 2014.
[STD14] Brandon Seward and Robin D. Tucker-Drob. Borel structurability on the
2-shift of a countable group. ArXiv e-prints, 2014.
48
| 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.